Approved By: UGC AICTE
Duration: 2 Years |
Eligibility: Graduation |
COURSE SYLLABUS
Course Duration : Two Years
COURES CONTENT
Semester – I
Code |
Title |
CS 6101 |
Mathematical Foundations of Computer Science |
CS 6111 |
Algorithms and Complexity |
CS 6103 |
Software Systems Lab |
|
Elective |
|
Elective |
Semester – II
Code |
Title |
CS 6104 |
Term paper(optional) |
|
Elective |
|
Elective |
|
Elective |
|
Elective |
|
Elective(Optional) |
Semestre – III
Code |
Title |
CS 7198 |
Project |
|
Elective(optional) |
Semester – IV
Code |
Title |
CS 7199 |
Project |
Notes :
List of Electives
Code |
Title |
CS 6102 |
Compiler Design |
CS 6112 |
Operating System Design |
CS 6121 |
Computability Theory |
CS 6122 |
Computer Architecture |
CS 6123 |
Database Design |
CS 6124 |
Topics in Programming Languages |
CS 6125 |
Computer Networking |
CS 6131 |
Logic and Computation |
CS 6132 |
Topics in Algorithms |
CS 6133 |
Game Theory |
CS 6134 |
Quantum Computation |
CS 6135 |
Logic for Computer Science |
CS 6136 |
Topics in Combinatorial Algorithms |
CS 6141 |
Distributed Computing |
CS 6142 |
Topics in Computer Architecture |
CS 6143 |
Trends in Middleware Systems |
CS 6144 |
Multicore Systems |
CS 6151 |
Software Engineering |
CS 6152 |
Object Oriented Modeling and Design |
CS 6154 |
Topics in Database Design |
CS 6161 |
Embedded Systems and Applications |
CS 6171 |
Natural Language Processing |
CS 6172 |
Computational Intelligence |
CS 6173 |
Image Processing |
CS 6174 |
Pattern Recognition |
CS 6181 |
Bioinformatics |
CS 6201 |
Cryptography |
CS 6211 |
Formal Methods in Secure Computing |
CS 6212 |
Network Security |
CS 6213 |
Foundations of Information Security |
CS 6214 |
Advanced Topics in Information Security |
CS 6231 |
Theoretical aspects of cryptographic algorithms |
CS 6232 |
Cryptocomplexity |
CS 6233 |
Information Theory and Coding |
CS 6261 |
Perimeter Security |
CS 6271 |
Data Compression |
CS 6282 |
Pragmatics of Information Security |
CS 6283 |
Computer Laws and Ethics |
CS 6284 |
Security Policies and Assurance |
CS 6285 |
Information Security Management |
CS 6286 |
Metrics for Information Security Assessment |
MA 8152 |
Fuzzy Set Theory and Applications |
MA 7156 |
Advanced Topics in Graph Theory |