M.Sc Computer Science
19/09/2024 2024-09-20 15:39M.Sc Computer Science
Course Outcomes - M Sc Computer Applications
I year – I Semester
- 1. Analyze programming problem statements.
- 2. Comprehend and select algorithm design approaches in a problem specific manner.
- 3. Choose appropriate data structures for a specific problem
- 4. Utilize necessary mathematical abstractions to solve problems
- 5. Come up with analysis of efficiency and proofs of correctness
- 1. Be able to program decorators, closures, lambda, iterators and generators comprehensions with in OOP
- 2. Learn modern data structures to include collections, array, and queues
- 3. Use platform independent file manipulation, file pattern matching using CSV, HTML, XML, JASON
- 4. Be able to set up a client-server program and also multi-process applications.
- 5. Be able to use python as an analytical and presentation tool
- 1. Design and analyse programming problem statements.
- 2. Choose appropriate data structures and algorithms, understand the ADT/libraries, and use it to design algorithms for a specific problem
- 3. Be familiar with programming language constructs available for rapid application development,
- 4. Understand the necessary programmatic abstraction to solve problems.
- 5. Gain the capacity to solve real life problems by matching to the available algorithms.
- 1. Apply exception handling and user defined exception(s) Develop Module(s) and Package(s) in python
- 2. Possess an ability to write database applications in Python
- 3. Implement Object Oriented concepts in programming Apply Collection modules for the data types
- 4. Possess the Object-oriented programming skills in Python. and the skill of to design graphical-user interfaces (GUI) in Python
- 5. Make use of Pandas and Numpy Libraries
- 1. Understand the concepts of Cloud and its services
- 2. Collaborate Cloud for Event & Project Management
- 3. Analyze on cloud in Word Processing, Spread Sheets, Mail, Calendar, Database
- 4. Analyze cloud in social networks
- 5. Explore cloud storage and sharing
- 1.AboutInternetofThingswherevariouscommunicatingentitiesarecontrolledandmanaged for decision making in the application domain.
- 2. Enable students to learn the Architecture of IoT and IoT Technologies
- 3. Developing IoT applications and Security in IoT, Basic Electronics for IoT, Arduino IDE, Sensors and Actuators Programming NodeMCU using Arduino IDE.
- To introduce the students to the recent trends in the field of Computer Architecture and identify performance related parameters.
- To learn the different multiprocessor issues.
- To expose the different types of multicore architectures.
- To understand the design of the memory hierarchy.
- 1. Understand the different phases of the compiler.
- 2. Design a lexical analyzer for a sample language.
- 3. Apply different parsing algorithms to develop the parsers for a given grammar.
- 4. Design and implement a scanner and a parser using LEX and YACC tools
- 5. Learn to implement code optimization techniques and a simple code generator.
- 1. To tag a given text with basic Language features
- 2. To design an innovative application using NLP components
- 3. To implement a rule-based system to tackle morphology/syntax of a language
- 4. To design a tag set to be used for statistical processing for real-time applications
- 5. To compare and contrast the use of different statistical approaches for different types of NLP applications.
- 1. Apply various fragmentation techniques given a problem
- 2. Analyse and calculate the cost of enforcing semantic integrity control
- 3. Use the steps of query processing
- 4. Apply optimization techniques are applies to Distributed Database
- 5. Apply effectively Query Optimization Algorithms
I year – II Semester
- 1. Enable the students to learn the concepts of Mining tasks, classification, clustering and Data Warehousing.
- 2. Develop skills using recent datamining software for solving practical problems.
- 3. Develop and apply critical thinking, problem-solving, and decision-making skills.
- To provide knowledge and abilities to develop web sites for the internet.
- To provide basic design principles to present ideas, information, products, and services on websites
- To induce basic programming principles to the construction of websites
- To grasp the concepts on Java Beans, servlets, JSP
- To comprehend the connection between Relational Database and Java
- 1. To enable the students to learn the concepts of Data Mining algorithms namely classification, clustering, regression….
- 2.To understand & write programs using the Data Mining algorithms
- 3. To apply statistical interpretations for the solutions
- 4. Able to use visualization techniques for interpretations
- 1. Implement Remote method invocations.
- 2. Apply servlet in web applications
- 3. Develop Servlets for creating Web based applications using JDBC
- 4. Develop JSP for creating Web based applications using JDBC.
- 5. Test java beans and session tracking
- 1. Solve basic AI based problems.
- 2. Define the concept of Artificial Intelligence.
- 3. Apply AI techniques to real-world problems to develop intelligent systems.
- 4. Select appropriately from a range of techniques when implementing intelligent systems.
- 5. Possess the basic knowledge of different machine learning techniques.
- 1. To understand, apply and summarize the basic concepts of Micro services communication Microsoft Azure and Dev Ops for software development life cycle.
- 2. To illustrate, and implement Azure Kubernetes Service tools for software development life cycle.
- 3. To recognize, analyse and summarize the functionalities of .NET Dev Ops for Azure applications.
- 4. To understand, design and evaluate the principles and architecture service tools for software development life cycle.
- 5. To comprehend, implement and review the functionalities of API and API gateways for cloud and Azure applications.
- 1. Understand different methodologies to create applications using deep nets.
- 2. Identify and apply appropriate deep learning algorithms for analyzing the data for a variety of problems.
- 3. Implement different deep learning algorithms
- 4. Design the test procedures to assess the efficacy of the developed model.
- 5. Combine several models in to gain better results
- 1. Ability to understand the computer vision pipeline. Ability to build solutions using computer vision algorithms.
- 2. Identify basic concepts, terminology, theories, models and methods in the field of computer vision
- 3. Describe known principles of human visual system
- 4. Describe basic methods of computer vision related to multi-scale representation, edge detection and detection of other primitives, stereo, motion and object recognition
- 5. Suggest a design of a computer vision system for a specific problem
- 1. Realize the importance of interacting with business stakeholders in determining the requirements for a software system
- 2. Perform iterative software development processes: how to plan them, how to execute them.
- 3. Point out the impact of social aspects on software development success. develop techniques and tools for improving team collaboration and software quality.
- 4. Perform Software process improvement as an ongoing task for development teams.
- 5. Show how agile approaches can be scaled up to the enterprise level.
- 1. Design effective dialog for HCI
- 2. Design effective HCI for individuals and persons with disabilities.
- 3. Assess the importance of user feedback.
- 4. Explain the HCI implications for designing multimedia/ ecommerce/ elearning Web sites.
- 5. Develop a meaningful user interface.
II year – III Semester
- 1. Identify Big Data and its Business Implications.
- 2. List the components of Hadoop and Hadoop Eco-System
- 3. Access and Process Data on Distributed File System
- 4. Manage Job Execution in Hadoop Environment
- 5. Develop Big Data Solutions using Hadoop Eco System
- 1. Recognize the characteristics of machine learning strategies. Apply various supervised learning methods to appropriate problems.
- 2. Identify and integrate more than one technique to enhance the performance of learning.
- 3. Analyze the co-occurrence of data to find interesting frequent patterns.
- 4. Preprocess the data before applying to any real-world problem and can evaluate its performance.
- 5. Create probabilistic and unsupervised learning models for handling unknown pattern.
- 1. Use the concepts and techniques of discrete mathematics for theoretical computer science
- 2. Design Finite Automata for different Regular Expressions and Languages
- 3. Identify and use different formal languages and their relationship.
- 4. To solve various problems of applying normal form techniques, push down automata and Turing Machines
- 5. Analyze various concepts of undecidability and Computable Function and Discuss analytically and intuitively for problem-solving situation
- 1. Understand the implementation procedures for the machine learning algorithms.
- 2. Design Java/Python programs for various Learning algorithms.
- 3. Apply appropriate data sets to the Machine Learning algorithms.
- 4. Identify and apply Machine Learning algorithms to solve real world problems.
- 5. be capable of confidently applying common Machine Learning algorithms in practice and implementing their own
- 1. Understand the process of the cryptographic algorithms
- 2. Compare and apply different encryption and decryption techniques to solve problems related to confidentiality and authentication
- 3. Applyandanalyzeappropriatesecuritytechniquestosolvenetworksecurity problem
- 4. Explore suitable crypto graphic algorithms
- 5. Analyze different digital signature algorithms to achieve authentication and design secure applications
- 1. Analyze the cryptographic algorithms for information security.
- 2. Identify the authentication schemes for membership authorization.
- 3. Identify computer and network security threats, classify the threats and develop a security model for detect and mitigate the attacks.
- 4. Identify the requirements for secure communication and challenges related to the secure web services
- 5. Ability to identify the need of ethical and professional practices, risk management Using emerging security solutions.
- 1. Develop and apply knowledge of parallel and distributed computing techniques and methodologies.
- 2. Apply design, development, and performance analysis of parallel and distributed applications.
- 3. Use the application of fundamental Computer Science methods and algorithms in the development of parallel applications.
- 4. Explain the design, testing, and performance analysis of a software system, and to be able to communicate that design to others
- 5. Understand the requirements for programming parallel systems and how they can be used to facilitate the programming of concurrent systems.
- 1. Analyze cyber-attacks, types of cybercrimes, cyber laws and also how to protect them self and ultimately the entire Internet community from such attacks.
- 2. Interpret and forensically investigate security incidents
- 3. Apply policies and procedures to manage Privacy issues
- 4. Design and develop secure software modules
- 5. Understand different forms of hacking techniques
II year – IV Semester
- 1. Know and understand the basics and fundamentals of digital image processing, such as digitization, sampling, quantization, and 2D-transforms.
- 2. Operate on images using the techniques of smoothing, sharpening and enhancement.
- 3. Perform the restoration concepts and filtering techniques.
- 4. Demonstrate the segmentation, features extraction, compression and recognition methods for color models.
- 5. Compress images and use tools for image recognition.
- 1. Demonstrate the benefits and ethics of RPA
- 2. Understand the Automation cycle and its techniques
- 3. Draw inferences and information processing of RPA
- 4. Implement & Apply RPA in Business Scenarios
- 5. Analyze on Robots & leveraging automation
- 1. Demonstrate block chain technology and crypto currency
- 2. Understand the mining mechanism in block chain
- 3. Apply and identify security measures, and various types of services that allow people to trade and transact with bitcoins
- 4. Apply and analyze Block chain in health care industry
- 5. Analyze security, privacy, and efficiency of a given Blockchain system
- 1. Understandtheconceptof8051microcontroller
- 2. Understand the Instruction Set and Programming
- 3. Analyze the concepts of RTOS
- 4. Analyze and design various real time embedded systems using RTOS
- 5. Debug the malfunctioning system using various debugging techniques
- 1. Identify use cases and develop the Use Case model.
- 2. Identify the conceptual classes and develop a Domain Model and also derive a Class Diagram from that.
- 3. Using the identified scenarios, find the interaction between objects and represent them
- 4. Using UML Sequence and Collaboration Diagrams and Draw relevant State Chart and Activity Diagrams for the same system.
- 5. Implement the modified system and test it for various scenarios
- 1. Understand the purpose of interviews
- 2. Be aware of the processes involved in different types of interviews
- 3. Know how to prepare for interview
- 4. Be clear about the importance of self-presentation
- 5. Be clear about the importance of documentation