Computer Science and Engineering
Overview
The department provides students with better computational infrastructure, knowledge in recent & advanced technologies so as to contribute to emerge as one of the best technology department. The department strives to help students build learning & adaptability in developing technical know-how through collaborative research.more
Vision & Mission
Vision
To emerge as the best Computer Science and Engineering department through quality education, industry alliances and collaborative research.
Mission
The mission of the department is.
1) To provide quality education to students.
2) To grow technically and give more knowledge for the betterment of mankind.
3) To develop e-awareness in students and society in general.
Salient Features
1. We provide Student Centric learning (Usage of ICT, virtual labs, topic beyond syllabus, open ended experiments, peer learning, Project Based learning, etc)
2. Our students have bagged Numerous University ranks in each semester.
3. We make sure that our Skill Development of students focused by conducting Value added courses.
4. We assist students for doing IIT and other MOOC Certification courses.
5. We focus on enhancing Student progression by conducting Campus Recruitment Training & training on Competitive exams preparation.
6. We enhance Industry linkage by doing MOU’s with renowned MNC’s.
7. We target for on 100% Live Mega Projects & 100% Internship of students to enhance student’s learning & interaction with industry persons.
8. We always encourage students to organize and participate in in-house and outside technical, curricular & extracurricular activities.
9. We conduct free of cost Computer training program (“DISHA”) for students from rural area.
10. We organize International/National Industry Tour and Visits for students.
11. Our department Student forum “Encypherist” helps students to showcase their knowledge and talents.
12. We have active Personal Mentoring of students (one to one counselling).
13. We encourage Faculties & Students for research (such as UGC, Scopus, web of science – journal publication, books chapter writing, pursuing further studies, participation in skill development seminars/STTP/FDP, workshops)
Prof. Mona Mulchandani
Designation: HOD (CSE)
Qualification: M.Tech, Ph.D (Pursuing)
Experience: 21 Years
Subject of Specialization: Programming Languages & Education, Machine Translation, Parallel Processing, Natural Language Processing.
It gives me great pleasure to lead the department of Computer Science & Engineering. Our college is emerging as one of the leading institutions through learning and co-curricular activities. Jhulelal Institute of Technology is striving hard towards the goal of providing innovative and quality education with high standard to achieve academic excellence. The Department of Computer Science and Engineering invites potential understudies, workforce, associates, backers and well-wishers to draw in with us. The department places emphasis on all the important aspects of Computer Science such as Computer Networks, Mobile Networks, Data Structure & Algorithm Design, Advance Database Systems, Theory of Computation, Computer Graphics and many more.
Course Offered with Intake:
Under Graduate: Bachelor of Technology: 120 Intake
Post Graduate: Master of Technology: 24 Intake
The Department was established in 2008 with intake of 60 and today we have grown up-to the intake of 120. Department provides students with better computational infrastructure, knowledge in recent & advanced technologies so as to contribute to emerge as one of the best technology department. The department strives to help students build learning & adaptability in developing technical knowledge through collaborative research
Name of faculty | Achievements(Patent published/grant, Publication in SCI/Scopus,Book/ Chapter Published, Grants Received,Awards, PhD Awarded with details) |
Ms. Mona Mulchandani |
|
Ms. Nisha Balani |
Received Outstanding Researcher Award by Education Excellence Awards 2022 |
Dr. S.A Bhura |
Published paper AUTOMATIC QUESTION GENERATION THROUGH WORD VECTOR SYNCHRONIZATION USING LAMMA (SCI) |
Ms. Reena Thakur |
Published Book Chapter in Springer Decision Analytics for Sustainable Development in Smart Society 5.0 |
Dr. Uma Patel |
Received the invention patent : DEEP LEARNING BASED CLASSIFICATION OF IMAGES CAPTURED USING VARIOUS IMAGING MEDICAL MODALITIES FOR KIDNEY RELATED AILMENTS ALONG WITH TREATMENT SUGGESTIVE TECHNIQUE (Application No.202241043738 A) |
Mr. Amit Pimpalkar |
Filed a patent Application Number: 368910-001 |
10 Students as 1st In University
Name of faculty | Achievements(Patent published/grant, Publication in SCI/Scopus,Book/ Chapter Published, Grants Received, PhD Awarded) |
Sr.No | Session | Semester/Year | University Roll no. | Name of the student | Percentage | University Rank |
1 | Summer-20 | 8th sem (4th year) | 282921 | PRACHI UMESH CHANANA | 99.08 | 1st |
2 | Winter-19 | 5th sem(3rd Year) | 346135 | HARSHA ASHOK MENDA | 81.54 | 1st |
3 | Winter-18 | 3rd sem (2nd Year) | 924129 | HARSHA ASHOK MENDA | 80.62 | 1st |
4 | Winter-18 | 3rd sem (M.tech) | 813648 | VARSHA OMPRAKASH KATIWAL | 85.25 | 1st |
5 | Summer 2017 | 4th sem(2nd Year) | 511966 | JANVI ABHAY ZOLDEO | 79.69 | 1st |
6 | Winter 2015 | 5th sem(3rd Year) | 154512 | RASIKA MAHESH KHANGARLE | 78.46 | 1st |
7 | Winter 2014 | 5th sem(3rd Year) | 186791 | GEETA KEWALRAMANI | 78.62 | 1st |
8 | Summer 2014 | 4sem(2nd Year) | 114020 | GEETA KEWALRAMANI | 81.38 | 1st |
9 | Summer 2014 | 6th sem (3rd year) | 200406 | JUHI ARORA | 82 | 1st |
10 | Summer 2013 | 4sem(2nd Year) | 160950 | JUHI ARORA | 79.38 | 1st |
9 Students as 2nd In University
Sr.No | Session | Semester/Year | University Roll no. | Name of the student | Percentage | University Rank |
1 | Winter-19 | 3rd sem (2nd Year) | 325816 | RONAK DEENDAYAL LALWANI | 80.92 | 2 |
2 | Summer-19 | 8th sem (4th year) | 355571 | JANVI ABHAY ZOLDEO | 83.69 | 2nd |
3 | Winter-18 | 3rd sem (M.tech) | 813640 | PINKY SURESH GANGWANI | 84.25 | 2nd |
4 | Summer-18 | 4th sem(2nd Year) | 825358 | PRACHI UMESH CHANANA | 79.85 | 2nd |
5 | Summer 2014 | 4sem(2nd Year) | 114058 | ABHISHEK ISRANI | 74.46 | 2nd |
6 | Winter 2013 | 3rd sem(2nd Year) | 173455 | GEETA KEWALRAMANI | 75.38 | 2nd |
7 | Winter 2013 | 5th sem(3rd Year) | 200406 | JUHI ARORA | 76.8 | 2nd |
8 | Winter 2012 | 3rd sem(2nd Year) | 225456 | JUHI ARORA | 81.53 | 2nd |
Faculty List
SR. NO. | NAME OF STAFF | DESIGNATION |
1 | Ms. MONA VICKY MULCHANDANI | ASSISTANT PROFESSOR |
2 | Ms. NISHA BALANI | ASSISTANT PROFESSOR |
3 | Dr. SACHIN DHANRAJ CHOUDHRI | ASSOCIATE PROFESSOR |
4 | Dr. SOHEL BHURA | ASSOCIATE PROFESSOR |
5 | Dr. PIYUSH INGOLE | ASSISTANT PROFESSOR |
6 | Dr. NILESH SHEKLE | ASSOCIATE PROFESSOR |
7 | Dr. UMA PATEL | ASSISTANT PROFESSOR |
8 | Ms. REENA THAKUR | ASSISTANT PROFESSOR |
9 | Mr. AMIT PIMPALKAR | ASSISTANT PROFESSOR |
10 | MS. SUVARNA WANARKAR | ASSISTANT PROFESSOR |
11 | Mr. CHANDRASHEKHAR GODE | ASSISTANT PROFESSOR |
12 | Mr. KISHOR PESHWANI | ASSISTANT PROFESSOR |
13 | Mrs. MEHER BHAWNANI | ASSISTANT PROFESSOR |
14 | Mr. SIDDHANT JAISWAL | ASSISTANT PROFESSOR |
15 | Ms. SWARA PAMPATWAR | ASSISTANT PROFESSOR |
16 | Ms. PRIYANKA DUDHE | ASSISTANT PROFESSOR |
17 | Ms. BHAVANA GOPCHANDANI | ASSISTANT PROFESSOR |
18 | Ms. BHARTI KUNGWANI | ASSISTANT PROFESSOR |
19 | Mr. PRASANNA LOHE | ASSISTANT PROFESSOR |
20 | Ms. GUNJAN JEWANI | ASSISTANT PROFESSOR |
21 | Ms. RITU TALEKAR | ASSISTANT PROFESSOR |
22 | Ms. KALPANA BHURE | ASSISTANT PROFESSOR |
23 | Mr. MOHAMMAD IMRAN KHAN | ASSISTANT PROFESSOR |
24 | Mr. AKHIL AJINKAR | ASSISTANT PROFESSOR |
25 | Ms. SWETA RAUT | ASSISTANT PROFESSOR |
26 | Ms. ARTI JANE | ASSISTANT PROFESSOR |
27 | Ms. SHRADHHA CHAURASIA | ASSISTANT PROFESSOR |
28 | Ms. VAISHALI KATARE | ASSISTANT PROFESSOR |
SEMESTER: 3rd | |||
Course Name | Course Outcome | Blooms Level | |
Applied Mathematics- III | CO1 | Demonstrate the ability of using Laplace transform in solving the ordinary differential Equations and partial differential equations | 2,3 |
CO2 | Apply the fundamental concept of Fourier series and be able to solve Fourier expansions of a given function | 3 | |
CO3 | Solve difference equations by using Z transforms | 3 | |
CO4 | Ability to interpret Complex variable and its application. Determine the power series expansion of a function | 2,5 | |
CO5 | Ability to evaluate Matrices and Eigen Value problem and should able to solve Differential Equation | 3,5 | |
CO6 | Apply the various distributions like binomial, Poisson and normal distributions in engineering applications. | 3 | |
Advanced C Programming and Logic Design | CO1 | Demonstrate the syntax of c language, develop programs using the basic elements like arrays and strings, structure and unions. | 2,3 |
CO2 | List file types and explain file handling and command line arguments, make use of file structure in implementing database management systems. | 1,2,3,4 | |
CO3 | Make use of pointers for effective memory allocation, choose memory allocation methods to solve the memory access problems. | 1,2,3,5 | |
CO4 | Make use of the graphics functions for designing and implementing engineering problems and projects. | 1,2,3,4,5 | |
CO5 | Demonstrate functional programming, and define correctness, efficiency issues in programming & time and space complexity. | 1,2 | |
CO6 | Demonstrate features of OOP: abstract data types, encapsulation, object classes, relate types of programming and languages. | 1,2,4 | |
Ethics in IT | CO1 | Describe the concept of Ethics, ethical behavior , explain in details the working of IT Users and IT Professionals with ethics of IT Industry | 1,2,3 |
CO2 | Define internet and computer crimes, list types exploits and perpetrators & summarize employees how to prevent, detect & respond to the threat | 1,2,4 | |
CO3 | Explain privacy with recent history of privacy protection and freedom of expression also list their key issues | 1,2 | |
CO4 | Identify the intellectual properties of IT professional with the concept of standards to develop, maintain software , analyze key intellectual property issues . | 1,2,4 | |
CO5 | Analyze the impact of information technology on the quality of life | 1,2 | |
CO6 | Explain ethics in IT organization and non-traditional workers , compare between contingent and HIB workers ,identify the issues in whistle blowing situation problem | 1,2,3 | |
Computer Architecture & Organization | CO1 | Understand the basic organization of computer, recognize, list different instruction formats and addressing modes. | 1,2 |
CO2 | Understand number representation and design fast adders for solving addition, subtraction, multiplication & division, apply booth’s algorithm for signed multiplication. | 1,2,3,5 | |
CO3 | Understand the basic organization of memory hierarchy, understand, apply the cache optimization techniques and produce the page fault ratio, evaluate the performance of processor based on page fault. | 1,3,5 | |
CO4 | Distinguish between sequential and random access methods, identify different secondary storage devices , categorize the different types of interrupts. | 1,2,4 | |
CO5 | Demonstrate pipelining for improving the speed of processor, understand the concepts of data and control hazards, analyse the performance pipeline architectures and superscalar processor | 1,2,4 | |
CO6 | Classify parallel processing architectures, interpreter parallelism and different types of parallel processor. | 1,2,4 | |
Digital Circuits & Fundamental of Microprocessor | CO1 | Recognize and compare the different number systems and acquire knowledge about the basic building blocks and fundamentals of any digital electronic circuit. | 1,2,3 |
CO2 | Design the Boolean equations using various combinational circuits, k-maps and illustrate the different codes and their conversion. | 1,2,3 | |
CO3 | Define and design the sequential elements like flip flops, relate the different flip flops and convert one flip flop to another. | 1,2,3 | |
CO4 | Apply the fundamental knowledge about digital electronics so as to analyze and design complex digital circuits like counters and shift registers. | 1,2,4 | |
CO5 | Classify and compare the different semiconductor memories, PLDs and exemplify 8085 architecture with its instruction set. | 1,2,4 | |
CO6 | Apply the knowledge of 8085 microprocessor in writing assembly language programs, draw timing diagrams and demonstrate about some advanced processors. | 1,2,4 | |
SEMESTER: 4th | |||
Course Name | Course Outcome | Blooms Level | |
DISCRETE MATHEMATICS AND GRAPH THEORY | CO1 | Identify the axioms of set theory and formulate the problem in the language of sets and perform set operations to solve them. | 4 |
CO2 | List and explain various types and properties of relations and functions. | 1,2,4,5 | |
CO3 | Recognize the properties and types of groups and use the concept of isomorphism- homomorphism in the computer filed. | 3,4 | |
CO4 | Recognize the properties and types of rings and use the concept of isomorphism & homomorphism, ideal and quotient rings in the computer filed. | 3,4 | |
CO5 | Formulate and solve real world problems using graphs and trees, both quantitatively and qualitatively. | 3,6 | |
CO6 | Formulate and solve the problems using combinatorial analysis. | 3,6 | |
Data Structures & Program Design | CO1 | Recall basic concept of algorithms and arrays, and analyze time and space complexity of different searching and sorting techniques using asymptotic notations. | 1,2,3,4 |
CO2 | Classify different types of linked list and implement it for polynomial representation. | 1,2,3,4,5 | |
CO3 | Differentiate stacks and queues and apply knowledge of stacks to solve polish notation. | 1,2,3,4,5 | |
CO4 | Acquire knowledge of trees and differentiate trees on the basis of applications | 1,2,3,4,5 | |
CO5 | Classify different types of graphs and apply the traversal techniques to find shortest distance for graph theory. | 1,2,3,4,5 | |
CO6 | Implement different types of symbol tables and hashing techniques. | 1,2,3,4 | |
Operating Systems | CO1 | Define operating system, compare objectives and functions of modern operating systems, types of operating system and services , system design and implementation. | 1,2,3 |
CO2 | Explain concept of File systems used in operating system, classify the access methods and disk arm scheduling strategies . | 1,2,3 | |
CO3 | Explain and compare various the cpu scheduling methods and goals of scheduling in operating system | 1,2,3 | |
CO4 | Outline memory management in operating system , categorize its methods and basic knowledge of paging, segmentation and thrashing concepts. | 2,3,4 | |
CO5 | Explain the process synchronization ,choose appropriate solution to solve problems of the process synchronization in operating system | 2,3 | |
CO6 | Interpret the concept of deadlocks in operating system, list the prevention ,detection & avoidance steps of deadlock and security steps in operating system. | 2,3 | |
Theoretical Foundations of Computer Sciences | CO1 | Describe basic concepts of mathematical preliminaries, and apply it for proof methods. | 1,2,3 |
CO2 | Construct and differentiate deterministic, non-deterministic Finite Automata. Design moore and mealy machine | 1,2,3,4 | |
CO3 | Acquire knowledge of regular grammar, context free grammar , regular language and obtain regular expression from Finite Automata | 1,2,3 | |
CO4 | Construct deterministic and non-deterministic push down automata for a given language and convert context free grammar into pushdown automata and push down automata into context free grammar | 1,2,3,4 | |
CO5 | Explain various types of Turing machine and design Turing machine. | 1,2,3,4 | |
CO6 | Evaluate post correspondence problem. Compute ackerman’s function and explain properties of recursive and recursively enumerable language. | 1,2,3,4,5 | |
SYSTEM PROGRAMMING | CO1 | Know the functionalities and components of a computer system into different layers, and have a good knowledge of the role of system programming and the scope of duties and tasks of a system programmer. | 1,2 |
CO2 | Acquire the concept of macroprocessor and design system program as macroprocessor. | 1,2,3 | |
CO3 | Comparison between various loading scheme and linker execution and illustrate the databases in the specified format of loader and linker | 1,2,3,4 | |
CO4 | Analyzing the common object file format and identifying the format of symbol table and string table. | 1,2,3,4 | |
CO5 | Focusing device driver, Comparative study between device drivers for UNIX & Windows. | 1,2,3,4 | |
CO6 | Explain the phases of compiler, coordination of all the phases by analyzing the expression | 1,2,3,4 | |
SEMESTER: 5th | |||
Course Name | Course Outcome | Blooms Level | |
Data Communication | CO1 | State and Explain the performance of a baseband and pass band digital communication system in terms of error rate and spectral efficiency. | 1,2 |
CO2 | Identify and Judge the time and frequency domain analysis of the signals in a digital communication system | 1,4 | |
CO3 | Discuss and Prepare the blocks in a design of digital communication system | 2,5 | |
CO4 | List and Categorize Performance of spread spectrum communication system | 1,4 | |
CO5 | Summarize and explain Data communication System and its components | 2,5 | |
CO6 | Independently Identify and understand the basic of digital and analog communication | 1,5 | |
Object Oriented Programming | CO1 | Explain basic fundamental OOP using C++, & apply features of object oriented programming. | 1,2,3 |
CO2 | Make use of operator Overloading, pointers & dynamic memory allocation and interpret the concept of data conversion to convert one type to another. | 1,2,3 | |
CO3 | Catagorize inheritance and illustrate containership concepts and the concept of Function overloading. | 1,2,3,4 | |
CO4 | Make use of virtual function, abstracts classes & pure virtual functions and compare static and dynamic type binding . | 1,2,3,4 | |
CO5 | Explain different types of file operations , concept of files. and to illustrate the modes of files and file pointers. | 1,2,3,4 | |
CO6 | summarize template and exception handling techniques and the concept of template and to design the problem with the help of Function & class template. | 1,2,3,5,6 | |
Database Management System | CO1 | Summarize the basic concepts of database management system, classify data modelling techniques, construct ER Model and to utilize the different database languages for constructing the database. | 1,2,3,5 |
CO2 | Acquire the concept of Relational data model, illustrate the Relational Operations from Set Theory, apply Relational Algebra and Relational Calculus to represent the SQL queries. | 1,3,4 | |
CO3 | Illustrate the concept of index and Functional Dependencies, analyze the different normalization techniques to design the normalized database. | 1,3,4,6 | |
CO4 | Summarize the complete process of Query processing, query evaluation plans and apply the query optimization techniques to optimizing the query. | 1,2,3 | |
CO5 | Make use of the concept of transactions, concurrency control, classify the different Database recovery and locking mechanism. on transaction. | 1,2,3,4 | |
CO6 | Analyze the different failure classification, explain the advanced recovery mechanism. Related to advanced concepts related to databases. | 1,2,4 | |
Computer Graphics | CO1 | Explain the basic terms of graphics ,list the areas and applications of computer graphics and state different types of display technologies. | 1,2 |
CO2 | Apply the knowledge of 2D primitive to solve problem , explain the algorithm for drawing the primitive and shading of polygon. | 1,2,3 | |
CO3 | Summarize OPENGL concepts , terms and the operation of OENGL, construct basic program of OPENEGL. | 1,2,3 | |
CO4 | Describe the concept and definition of clipping of any primitive, analyze different primitive clipping algorithm for clipping the primitive to perform transformation on the clipped primitive. | 1,2,4 | |
CO5 | Illustrate the concept of windows, view- to display images on screen, make use of normalized device coordinates and viewing transformations to design object on screen, analyze different 3D hidden surface removal algorithms. | 1,2,3,4 | |
CO6 | Explain the light travelling concepts, the ray tracing algorithm &, ray-object intersection shading, program of ray tracing, analyze the concept Curves and Surfaces for drawing curves. | 1,2,4 | |
Design & Analysis of Algorithms | CO1 | Classify, solve recurrence relation by applying different techniques and explaining designing principles of algorithms | 1,2,3 |
CO2 | Analyze and compare different Asymptotic notations and amortized notations, design of sorting network. | 1,2,3,4,6 | |
CO3 | Demonstrate, analyze and determine solutions of some basic strategy of greedy algorithms. | 1,2,3,4,5 | |
CO4 | Compare, apply, analyze and develop a base for advanced computer science study by using Dynamic Programming. | 1,2,3,4,5 | |
CO5 | Apply and categorize backtracking and define details of tree and graph problems. | 1,2,3,4,5 | |
CO6 | Classify, identify and analyze some basic concepts of NP-hard and NP-complete problems. | 1,2,3,4,5 | |
SEMESTER: 6th | |||
Course Name | Course Outcome | Blooms Level | |
Artificial Intelligence | CO1 | Explain key components of artificial intelligence (AI) , describe production system and problem solving, applying knowledge to formulate problem as a state space representation. | 1,2,3 |
CO2 | Classify artificial intelligence search techniques, define, analyze search heuristics, explain knowledge representation, Problem Reduction, and Constraint satisfaction | 1,2,3,4 | |
CO3 | Explain representation of knowledge along with its issues, design First order logic, Predicate Logic, resolution, Semantic Nets, Frames, and Scripts. | 1,2,3,6 | |
CO4 | Describe uncertainty while solving problem statement, explain Bayesian networks and Fuzzy Logic. | 1,2 | |
CO5 | Understand and list various learning methods & models in real world and describe formal learning theory in artificial intelligence. | 1,2 | |
CO6 | Describe fundamental of Knowledge acquisition, Expert Systems, Automated Reasoning and understanding Natural language basics. | 1,2 | |
Design Patterns | CO1 | Define & explain Basics of design pattern, catalog, and use of design pattern. | 1,2,3 |
CO2 | Define & explain Creational Patterns and compare types of Creational Patterns and analyze them. | 1,2,3,4 | |
CO3 | Define & explain Structural Patterns and compare types of Structural Patterns and analyze them. | 1,2,3,4 | |
CO4 | Define & explain Behavioral Patterns and compare types of Behavioral Patterns and analyze them. . | 1,2,3,4 | |
CO5 | Analyze & solve design pattern problem through case study. Choose & apply proper design pattern. | 1,2,3,4 | |
CO6 | Explain various implementation Techniques and application of design Patterns in game design also explain complexity analyzing methods of design pattern. | 1,2,3,4 | |
Software Engineering & Project Management | CO1 | Explain & define the basic fundamentals of software engineering ,software classify characteristics and categorize different types of software models | 1,2,4 |
CO2 | Explain, illustrate the concept software engineering principles and classify the software engineering practice | 1,2,4 | |
CO3 | Summarize system analysis of software engineering and categorize different types of analysis business models | 1,2,4 | |
CO4 | Explain , design, determine solution for comprehension software testing fundamental and categorize different types of testing techniques | 1,2,3,4,5,6 | |
CO5 | Understand, explain evolution of quality management and analyze the statistical quality assurance. | 1,2,4 | |
CO6 | Define the knowledge project management and explain , classify reverse engineering techniques in real time environment | 1,2,4 | |
Computer Networks | CO1 | Define,illustrate, investigate and compare the basic concept of Computer Networks and the basic components of a Network System. | 1,2,3 |
CO2 | Compare different types of errors, apply different techniques to control errors, analyze why networks need security and evaluate error control mechanism | 1,2,3 | |
CO3 | Explain the role of protocols in networking. Define the protocol and analyzing traffic on networks | 1,2,4 | |
CO4 | Classify, apply and analyze the concept of routing and routing table and measure the optimal route. | 1,2,4 | |
CO5 | Compare, Analyze the different protocols in the internet layerin TCP/IP protocol suite and determine the issue of packet droppin | 1,2,3 | |
CO6 | Explain the features and list operations of transport layer protocols and understanding wireless technologies. | 1,2,3 | |
Functional English | CO1 | Students should be able to fluently talk in english language | 2,3 |
CO2 | Understand language concepts & analyze the conceptual knowleged of language | 3,4 | |
CO3 | To gain first hand experience of presentation skills and soft skills | 4,6 | |
CO4 | To have a vericitile, well develop personality | ,3,5,6 | |
CO5 | Overall exposure to competitative exam. | 4,3 | |
CO6 | To gain working knowledge of grammar | 3,2,1 | |
SEMESTER: 7th | |||
Course Name | Course Outcome | Blooms Level | |
Data Warehousing & Mining | CO1 | Define the fundamental concept of data mining , data preprocessing and data warehousing along with data mining functionalities | 1,2,3,4 |
CO2 | eExplain Data Warehouse Architecture and implementation, construct Data Cube Computation and Data Generalization. | 1,2,3 | |
CO3 | Understand the different functionalities of Mining Frequent Associations and Correlations with different methods. | 1,2,4 | |
CO4 | Identify the use of extracting models to predict future data trends through classification and prediction to solve societal problems | 1,2,3,4 | |
CO5 | Describe the basic concepts in clustering, and its types. | 1,2,3,4 | |
CO6 | Inspect the problem of mining complex type of data and apply the concept of mining to stream, time-series, and sequence data to solve financial, industrial and scientific problem.. | 1,2,3,4 | |
Language Processor | CO1 | Describe various phases of compiler, construct state machine for Regular languages using finite automata, regular expressions, and use compiler writing tools like LEX and Flex. | 1,2,3 |
CO2 | List ,apply and compare the parsers and use the parser design tools like Yacc & bison. | 1,2,3 | |
CO3 | Explain & apply SDTS to transform source code to intermediate code. | 1,2,3,4 | |
CO4 | Explain various storage allocation strategies, list & choose data structure for symbol table management and understand error recovery in different parsers. | 1,2,3 | |
CO5 | Explain and apply various code optimization techniques , analyze control flow & data flow and compute reaching definitions using data flow equations, loop optimization, | 1,2,3,4 | |
CO6 | List basic issues in code generation, explain register allocation, assignment and code generation by code generator algorithm. | 1,2,3 | |
ELECTIVE-I TCP and IP | CO1 | List & illustrate the TCP/IP architecture and OSI layers, networking technologies. | 1,2,3 |
CO2 | Make use of classes of IP address for host configuration protocols & solve network addressing problems | 1,2,3 | |
CO3 | Compare & Analyze the ip packet format & routing protocols. | 1,2,3,4 | |
CO4 | Explain flow control & transmission Control in TCP protocol & analyze connection establishment and termination | 1,2,3,4 | |
CO5 | Acquire knowledge of switching techniques and find solutions over switching technologies and traffic engineering. | 1,2,3,4 | |
CO6 | Differentiate advanced internet protocols for transferring data across the internet , analyze the IP security protocols | 1,2,3,4 | |
ELECTIVE-II Mobile Computing | CO1 | Define, wireless communication along with illustration of 2G service system, radio channels & list antennas. | 1,2 |
CO2 | Describe cellular system, medium access control, multiplexing & compare CDMA/FDMA/TDMA/SDMA. | 1,2,4 | |
CO3 | Explain GSM system & analyze the working of its subsystem. | 1,2,4 | |
CO4 | Describe & analyze mobile network layer & transport layer protocols. | 1,2,4 | |
CO5 | Explain the concept of MANET and it’s security issues, list its properties & applications along with the classification of routing algorithm. | 1,2,4 | |
CO6 | Explain wireless application protocol & list its layer along with the concept of Bluetooth, wireless LAN & J2ME. | 1,2,4 | |
SEMESTER: 8th | |||
Course Name | Course Outcome | Blooms Level | |
Distributed Operating system | CO1 | Aquire basic knowledge of distributed systems & able to distinguish between operating system and distributed operating system. | 1,4 |
CO2 | Categorize the Mutual exclusion protocols of Distributed Systems, illustrate mutual exclusion algorithms. | 2,4 | |
CO3 | Demonstrate distributed algorithms for deadlocks detection and Agreement protocols | 2 | |
CO4 | Demonstrate knowledge about file system and shared memory, explain memory coherence and Coherence Protocols. | 2 | |
CO5 | Categorize scheduling techniques for distributed operating system, analyse load distribution algorithms. | 1,2,4 | |
CO6 | Identify failure recovery in the design of distributed application software, demonstrate fault tolerance protocols . | 2,3 | |
Information & Cyber Security | CO1 | Explain the need of Information Security , list and explain OSI security architecture, attacks, services ,mechanisms and summarize conventional encryption. | 1,2 |
CO2 | Explain secret key and cryptography , list encryption & decryption techniques ,solve problems on basic cryptography and classify modes of operation. | 1,2,4 | |
CO3 | Explain public key concepts in details, define encryption techniques using ECC , solve key generation problems, analyze and categorize cryptography algorithms ,classify key management. | 1,2,3,4 | |
CO4 | Explain message authentication and hash functions concepts ,classify & distinguish the types of Key Management, determine different Public Key Infrastructure-Functions. | 1,2,4,5 | |
CO5 | Define & explain networking concepts in brief , list & analyze the security protocols at different layers, & summarize Firewalls,Cryptography. | 1,2,4 | |
CO6 | Explain the concept of software Vulnerability in details ,classify different vulnerabilities and attacks , analyze the concepts of Electronic Payment and Electronic Mail Security. | 1,2,4 | |
ELECTIVE-III Clustering & Cloud Computing | CO1 | Summarize the concept and characteristics of cloud computing, compare the cloud computing with grid and cluster computing. | 2,5 |
CO2 | Describe the role of computer network in cloud computing and the concept of virtualization with its advantages and pitfalls, classify the services of cloud computing. | 1,2,4 | |
CO3 | Illustrate the concept of big data and hadoop along with its configuration and cluster set up, analyze types of big data | 3,4 | |
CO4 | Define security in Cloud computing, categorize the different levels of security in cloud computing and its business and commercial considerations. | 1,4 | |
CO5 | Explain and apply object-oriented programming concepts in C#.NET, ASP.NET creation and deployment of web application, database connectivity using ADO.NET, creation of console application and web application. | 2,3 | |
CO6 | Discuss and design the basic concepts of cloud computing and various services available on Microsoft Azure cloud and deployment of web application on Microsoft Azure cloud using cloud service. | 2,6 | |
ELECTIVE-IV Advance Wireless Sensor Network | CO1 | Define the concept of wireless sensor networks, summarize the characteristics, list components of sensor network, compare the WSN with MANET | 1,2,4 |
CO2 | Explain the role of operating system in WSN, classify the different programming paradigm used in and define the concept dynamic energy and power management. | 1,2,4 | |
CO3 | Explain the design principles of WSN define & apply the concepts of Gateway in WSN also explain the working of low duty and wakeup concepts | 1,2,3 | |
CO4 | Define the naming & addressing, explain the different naming and address management mechanisms in WSN. | 1,2 | |
CO5 | Define and explain the routing and different routing algorithms in WSN, also explain the concepts of data storage and aggregation. | 1,2 | |
CO6 | Define and explain the applications and advanced concepts in WSN, also to explain the different security design issues in WSN. | 1,2 | |
ELECTIVE-IV Digital Forensic | CO1 | Define Computer forensics fundamentals, illustrate digital devices with its role in society , device handling and its identification. | 1,2 |
CO2 | Explain digital system development, content and context of its data, internet and mobile devices technology. | 1,2 | |
CO3 | Acquire Basic concept of Computer Forensics and its processing, services and methodology | 1,2 | |
CO4 | Identify computer forensic technology and list methods for data recovery. | 1,2 | |
CO5 | Explain relate cyber crime, define its occurrence, detection and risk techniques. | 1,2 | |
CO6 | Classify the limitations imposed by data privacy laws and illustrate basic of Advanced computer Forensics systems | 1,2,5 |
PO1: Engineering knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an engineering specialization to the solution of complex engineering problems. | |||||||||
PO2: Problem analysis: Identify, formulate, research literature, and analyze complex engineering problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and engineering sciences. | |||||||||
PO3: Design/development of solutions: Design solutions for complex engineering problems and design system components or processes that meet the specified needs with appropriate consideration for the public health and safety, and the cultural, societal, and environmental considerations. | |||||||||
PO4: Conduct investigations of complex problems: Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions. | |||||||||
PO5: Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools including prediction and modeling to complex engineering activities with an understanding of the limitations. | |||||||||
PO6: The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional engineering practice. | |||||||||
PO7: Environment and sustainability: Understand the impact of the professional engineering solutions in societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable development. | |||||||||
PO8: Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering practice. | |||||||||
PO9: Individual and team work: Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings. | |||||||||
PO10: Communication: Communicate effectively on complex engineering activities with the engineering community and with society at large, such as, being able to comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions. | |||||||||
PO11: Project management and finance: Demonstrate knowledge and understanding of the engineering and management principles and apply these to one’s own work, as a member and leader in a team, to manage projects and in multidisciplinary environments. | |||||||||
PO12: Life-long learning: Recognize the need for, and have the preparation and ability to engage in independent and life-long learning in the broadest context of technological change. |
PSO 1- Students will be able to use professional engineering practices, strategies and tactics for the development, operation and maintenance of software. | |||||||||
PSO2- Students will have the ability to understand, analyze and develop computer programs in the areas related to algorithms, system software, data structures, web design, and networking for efficient design of software’s of varying complexity. |
1) To develop an ability to analyze the software, understand the technical specifications, design and provide novel engineering solutions and efficient product designs. | ||||||||
2) To develop professional skills that prepares them for immediate employment and for life-long learning in advanced areas of computer science and related fields. | ||||||||
3) To develop necessary communication skills to bridge the gap between advanced technology and end users in practice of computer science products. | ||||||||
4)To develop technical skills to adapt to an ever-changing professional environment |
Key Features
- The Department of Computer Science & Engineering was established in 2008, is well-equipped with state-of-the-art infrastructure.
- The Department has good collaboration with Software industries, Government organization and Private Sectors around the region.
- Various Memorandum of Understanding (MoUs) are signed for Student Projects, Faculty Trainings, and Research work.
- Students undergo industrial training in recent trends and technologies in the form of Open Elective courses. Guest lectures/Seminars/Workshops are organized by the department involving industry experts in the areas of Mobility, Big Data, and Storage Management, Programming languages, etc.
- Every year an industry tour is organized by department to reputed Software Industries in India to help students to get acquainted with the environment and working culture of software industry.
- The Department’s many strengths include high faculty-student ratio, highly experienced full time faculty.
- Students have achieved good positions in academic results including university rankers.
- The Department has good placement ratio of students through placement companies like Infosys, Persistent Systems, Infocepts, ZENSAR Technologies, Amazon, Smart Data, Syntego, Essence IT Solutions, Mphasis, Excellon Software etc.