Академический Документы
Профессиональный Документы
Культура Документы
SCHEME OF STUDY
&SYLLABI
BE CSE
Batch 2015 – 2019 & 2016-19 (LEET)
(With Specializations)
SCHEME (B.E. CSE& CSE-LEET)
Batch 2015 – 2019 & 2016-19 (LEET)
8th Semester /4th year
ELECTIVES-Computational Intelligence
Electives Subject Code Subject Name
L T P Credit
3 00 - 3
Total Hours: 48
Course Objectives:
To recognize how Web application risks apply to Web Services, including SOAP and
REST Authentication, Authorization, and Auditing.
To recognize specific Web Services and XML attack patterns.
To recognize the benefits of using static analysis in Web Services.
To recognize the key security issues in SOA and Web Services.
UNIT-I
UNIT-II
Standards for Web Services Security: The Concept of Standard Web Services
Security,Standards Framework, An Overview of Current Standards, XML Data Security
,Security Assertions Markup Language (SAML), SOAP Message Security, Key and Trust
Management standards, Standards for Policy Specification, Access Control Policy Standards,
Implementations
of Web Services Security Standards. [12]
UNIT-III
Text Books:
1. Elisa Bertino, Lorenzo D. Martino, Federica Paci, Anna C. Squicciarini, “Security for Web
Services and Service Oriented Architectures”, Springer Science, 2009.
The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit.
CHANDIGARH UNIVERSITY, GHARUAN
Securing Windows and Linux (CSC-483)
L T P Credit
300- 3
Total Hours: 48
Course Objectives:
To use security risk assessments to identify security requirements and to select controls
for systems.
To use cryptographic controls to protect your information.
UNIT-I
Cryptography: Basic Cryptography Concepts, PKI Concepts, Implementing PKI and Certificate
Management. [6]
UNIT-II
System Security: General System Security Threats, Hardware and Peripheral Devices, OS
andApplication Security, Virtualization, System-Based Security Applications, Understanding
Linux
Security, System Monitoring and Auditing. [8]
UNIT-III
The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit.
CHANDIGARH UNIVERSITY, GHARUAN
Genetic Algorithms (CSA-462)
L T P Credits
3 0 0- 3
Total Hours:48
Course Objectives:
Concepts of Genetic Algorithms and its applications
Genetic Operators and modeling
Applications of Genetic Algorithms
Genetic Based Machine Learning
UNIT-I
Introduction To Genetic Algorithm: Introduction to Genetic Algorithm – History –
Basicconcepts – Creation of Off-springs – Working principle - Encoding – binary encoding –
octal encoding – hexadecimal encoding – permutation encoding- value encoding – tree encoding
– fitness function. [8]
UNIT-II
Genetic Modeling: Inversion and deletion : Inversion – deletion and duplication - deletion
andregeneration – segregation – cross over and inversion – Bit-wise operators – one’s
complement operator – logical bit-wise operators – shift operators – bit-wise operators used in
GA – generational cycle – convergence of GA - Differences and Similarities between GA and
Other Traditional Methods . [8]
UNIT-III
Genetics-Based Machine Learning: Genetics – Based Machined learning – Classifier system –
Rule & Message system – Apportionment of credit: The bucket brigade – Genetic Algorithm – A
simple classifier system in Pascal. – Results using the simple classifier system-The Rise of
GBMC – Development of CS-1, the first classifier system. – Smitch’s Poker player–Current
Applications. [16]
Text books
1. David E. Goldberg, “Genetic Algorithms in Search, Optimization & Machine
Learning”, Pearson Education, 2001.
2. S.Rajasekaran, G.A.Vijayalakshmi Pai, “ Neural Networks, Fuzzy Logic and
Genetic Algorithms”, Pearson Education , 2003.
Reference Book
1. Kalyanmoy Deb ,”Optimization for Engineering Design , Algorithms and examples”
PHI 1995.
The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit.
CHANDIGARH UNIVERSITY, GHARUAN
Information Retrieval (CSA-463)
L T P Credits
3 0 0- 3
Course Objectives:
Information retrieval techniques
Web Crawling techniques and page ranking
Index construction and sorting
UNIT I
The term vocabulary and postings lists: Text encoding: tokenization, stemming,lemmatization,
stop words, phrases. Optimizing indices with skip lists. Proximity and phrase queries. Positional
indices. [6]
UNIT II
Index construction: Postings size estimation, sort-based indexing, dynamic indexing,
positionalindexes, n-gram indexes, distributed indexing, real-world issues. [8]
Scoring : Term weighting and the vector space model. Parametric or fielded search.
Documentzones. The vector space retrieval model. tf.idf weighting. The cosine measure. Scoring
documents. [8]
UNIT III
Text Books:
1. C. Manning, P. Raghavan, and H. Schütze , Introduction to Information Retrieval, Cambridge
University Press,2008
Reference Books:
The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit.
Chandigarh University, Gharuan
Web Service Security Lab L T P C
Marks-100
Internal-60 External-40
Course Objectives
Understood about the working of web services, WSDL, UDDI, HTTP, etc.
Learn how to create and use digital certificates, keys and identity.
List of Experiments
UNIT I
3.Write a program the service provider can be implement a single get price (), static bind
() and get product operation.
4. Write a program to implement to create a simple web service that converts the
temperature from Fahrenheit to Celsius (using HTTP Post Protocol)
UNIT-II
5. Write a program to implement Web based service consumer.
6. Write a program to implement the operation can receive request and will return a
response in two ways.
a) One-Way operation
b) Request – Response
UNIT III
8. Write a program to generate the public and private key for sender and receiver.
Course Code
Web Service Security Lab
CSC-485
Department Teaching
Department of Computer Science and Engineering
the Subject
Program Outcome a b c d E F G h I j k
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category
Marks-100
Internal-60 External-40
Course Objectives
·To use the security risk assessments to identify security requirements and to select controls for
systems.
Knowledge about security threats, vulnerabilities and attacks and Familiarization with VI
editor and security of windows/website.
List of Experiments
UNIT I
5. To research the Various System Vulnerabilities for the target machine (Internet -
access CVE database of vulnerabilities)
UNIT III
10. Write a shell script that displays a list of all the files in the current directory to which
the user has read, write and execute permissions.
Course Code
Securing Windows and Linux Lab
CSC-487
Department Teaching
Department of Computer Science and Engineering
the Subject
Program Outcome a b c d E F G h I j k
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category
Marks-100
Internal-60 External-40
Course Objectives
List of Experiments
UNIT I
1.Write a MATLAB program to plot a few activation functions that are being used in
Genetic Algorithm.
4.Using Matlab program find the crisp lambda cut set relations for λ = 0.2,
the fuzzy matrix is given by
R=
0 0.8 1 0.6
0. 0.4 1 0.3
UNIT-II
UNIT III
8.Write a Matlab program (m.file) to calculate union, intersection, complement of two fuzzy sets
9. Write a MATLAB program to recognize the number 0, 1, 2, 39. A5*3 matrix forms the
numbers. For any valid point it is taken as 1 and invalid point it is taken as 0. The net has to be
trained to recognize all the numbers using The Bucket Brigade.
Course Code
Genetic Algorithm Lab
CSA-466
Department Teaching
Department of Computer Science and Engineering
the Subject
Program Outcome a b c d E f g h i j K
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category
Prerequisite:
Marks-100
Internal-60 External-40
Course Objectives
GUI Explorer
List of Experiments
UNIT I
1.To list all the categorical (or nominal) attributes and the real valued attributes using Weka mining tool
2.To identify the rules with some of the important attributes by a) manually and b) Using Weka
3. To create a Decision tree by training data set using Weka mining tool.
4.To find the percentage of examples that is classified correctly by using the above
created decision tree model i.e. testing on the training set.
UNIT-II
5.To create a Decision tree by cross validation training data set using Weka mining tool.
6.Delete one attribute from GUI Explorer and see the effect using Weka mining tool.
.
7.Select some attributes from GUI Explorer and perform classification and see the effect using Weka
mining tool.
UNIT III
8.To create a Decision tree by cross validation training data set by changing the cost matrix in Weka
mining tool.
9.To create a Decision tree by using Prune mode and reduced error Pruning and show accuracy for cross
validation trained data set using Weka mining tool.
10.To compare OneR classifier which uses single attribute and rule with J48 and PART classifier’s, by
training data set using Weka mining tool.
Course Code
Information Retrieval Lab
CSA-467
Department Teaching
Department of Computer Science and Engineering
the Subject
Program Outcome a b c d E f g h i j K
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category