0% found this document useful (0 votes)
148 views10 pages

Course Outcomes:: 19-202-0708 Mobile Application Development

The course outlines the key concepts and skills students will learn in mobile application development. They will: 1. Learn the architectures and infrastructure used in mobile development and identify user interfaces. 2. Evaluate security issues involved and design both Android and iOS applications. 3. The course covers topics like mobile architectures, user interfaces, existing application migration, security concerns, and hands-on development of apps for Android and iOS platforms.

Uploaded by

pipatec675
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
148 views10 pages

Course Outcomes:: 19-202-0708 Mobile Application Development

The course outlines the key concepts and skills students will learn in mobile application development. They will: 1. Learn the architectures and infrastructure used in mobile development and identify user interfaces. 2. Evaluate security issues involved and design both Android and iOS applications. 3. The course covers topics like mobile architectures, user interfaces, existing application migration, security concerns, and hands-on development of apps for Android and iOS platforms.

Uploaded by

pipatec675
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

19-202-0708 MOBILE APPLICATION DEVELOPMENT

Course Outcomes:
On completion of this course the student will be able to:
1. Outline the architectures and infrastructure used in Mobile application development.
2. Identify user interface and client applications.
3. Evaluate the security issues involved in Mobile application development.
4. Design and develop android and iOS applications.

Module I
Introduction-Mobility, Developing Mobile Applications. Mobile application architectures-
Client-Server, Client, Server, Connection-types, synchronization. Mobile Infrastructure-Mobile
Device Types, Mobile Device Components, Connection Methods.
Module II
Mobile client user interface-User interface, Application content, User experience. Mobile Client
Applications- Thin client, Fat Client, Web page hosting. Client-Server data transfer-HTTP and
HTML, WAP and WML.
Module III
Mobilizing Existing Application Architectures-Evolution of Enterprise Architectures, Anatomy
of Enterprise Web Architecture. Security- Mobilized Enterprise Web Architecture, User to
Mobile client security issues, Mobile client security issues, client-server communication security
issues, existing web architectures and back-end systems security issues.
Module IV
Developing android app-Using eclipse for android development, android navigation and
interface design, persistent data in android, lists in android, maps and locations in android,
access to hardware and sensors in android. Developing iOS app- Using Xcode for iOS
development, iOS navigation and interface design, persistent data, tables, maps and locations,
access to hardware and sensors in iOS

References:
1. Valentino Lee, Heather Schneider and Robbie Schell, Mobile Applications: Architecture,
Design and Development, Prentice Hall, 2004.
2. Jakob Iversen and Michael Eierman, Learning Mobile App Development, A hands-on
Guide to building apps with iOS and android, Addison-wesley,2014.
3. Dawn Griffiths, Head First Android Development, O'Reilly Media, Inc, 2015.
4. Jeff McWherter, Scott Gowell, “Professional Mobile Application Development” , Wiley
India Private Limited
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)

19-204-0701 Principles of Management

Course Outcomes:
On completion of this course, students will be able to:
1. Understand the basic principles underlying in the management of organizations.
2. Familiarize with all Industrial management functions.
3. Analyse the financial statements and ratios.
4. Understand the basic concept of economics and Intellectual property rights.

Module I
Basic concept of Management: Introduction, definitions of managements, characteristics of
management, levels of management, management skills, Scientific management, Contributions
of Gilbreth and Gantt.
Functions of Management: Planning, forecasting, organizing, staffing, directing, motivating,
controlling, co-coordinating, communicating, decision making.
Organization: Introduction, definition of organization, elements of organization, process of
organization, principles of organization, formal and informal organization, organization structure,
types of organization structure.
Forms of Business Organization: Concept of ownership organization, types of ownership,
Individual ownership, partnership, joint stock company, private and limited company, co-
operative organizations, state ownership, public corporation.
Module II
Production planning and control: Objectives and functions.
Production management: Structure, objectives, productivity index, modern productivity
improvement techniques.
Inventory Management: Functions, classifications of inventory, basic inventory models,
inventory costs, Economic order quantity (EOQ).
Materials Requirement Planning: Objectives, Functions and methods.
Project Management: Functions, Characteristics, Feasibility studies, Project network analysis-
PERT / CPM.
Module III
Human Resource Management: Introduction, definition, objectives, characteristics, functions,
principles and organization of HR management, Recruitment, selection process and training
methods, Wages and incentives, Job evaluation and merit rating, Industrial accidents causes and
related issues.
Marketing Management: Introduction, Functions and objectives, Marketing environment and
Information, Market segmentation, Distribution channels, Consumer and Industrial markets,
Consumer behaviour, Pricing methods, Sales promotion and Advertisement. Market research:
Objectives and methods.
Module IV
Financial Management: Basic functions, Capital classifications, Sources of funds, Financial
accounts types, basic concepts and importance, Financial ratios and its significance, Types of
budgets and budgetary controls, Overheads, Standard costing, Marginal costing.

83
Division of Information Technology
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)

Economics: Principles of economics, problem of scarcity, demand, supply, utility, time value of
money, inflation and deflation, Consumer Demand Curve.
IPR Aspects: General introduction to IPR, eligibility for patent, patent information and prior art
search, procedure for filing patent application, rights of patent owner and duration, ownership of
patent and commercialization.

References:
1. Fraidoon Mazda. (1997). Engineering Management. Addison Wesley,
2. Koontz and O’Donnell. (1978). Essentials of Management. McGraw Hill
3. Kotler P.(2011). Marketing Management. Prentice Hall.
4. Prasanna Chandra. (2008). Finance Management. Tata McGraw Hill.
5. Monks, J. G.(1982). Operations Management. McGraw Hill.
6. Production and Operations Management. PHI(2010)

84
Division of Information Technology
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)

19-204-0702 Data Security and Cryptography


Course Outcomes
On the completion of the course, students will be able to:
1. Explain the information security terminologies like confidentiality, integrity,
authentication, and access control.
2. Perform Encryption and Decryption of text using symmetric and asymmetric crypto
algorithms to provide confidentiality.
3. Compute hash and digital signature for the given message to provide integrity and
non-repudiation.
4. Examine the strength of any cryptographic algorithm by crypt analysis.

Module I
Introduction: Security basics, Aspects of network security, Attacks Different types, Security
attacks.
Cryptography: Basic Encryption and Decryption, Classical encryption techniques, symmetric
encryption, substitution ciphers, Caesar cipher, Monoalphabetic Cipher, Playfair Cipher,
Polyalphabetic cipher, Vigenère Cipher, Transposition ciphers
Module II
Modern Block Ciphers, Feistel Networks, DES Algorithm, Avalanche Effect.
Introduction to Number Theory, Prime Factorisation, Fermat's Theorem, Euler's Theorem,
Primitive Roots, Discrete Logarithms.
Public key Cryptography, Principles of Public key Cryptography Systems, RSA algorithms
Module III
Key Management: General aspects of key management, key distribution for asymmetrical
systems, Diffie Hellman Key Exchange. Message Authentication Requirements, Authentication
functions, Message authentication codes, Hash functions, Secure Hash Algorithm
Module IV
Digital signatures protocols: Digital signature standards, Digital Certificates
System Security: Intruders, Intrusion Detection, Password Management, Viruses and Related
Threats, Virus Counter measure.

References:
1. William Stallings. (2006). Cryptography and Network Security Principles and
Practices. Pearson Education.
2. Charles P. Pflieger. (2005). Security in Computing. Pearson Education.
3. Behrouz A. Forouzan, Dedeep Mukhopadhyay. (2010.) Cryptography & Network
Security, Second Edition, Tata McGraw Hill, New Delhi,
4. Jan C A, “Basic Methods of Cryptography”,Cambridge University Press.
5. Thomas Calabrese, “Information Security Intelligence: Cryptographic Principles &
Applications”. Thomson Learning,

85
Division of Information Technology
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)

19-204-0703 Computer Graphics and Visual Computing

Course Outcomes:
On completion of this course the student will be able to :
1. Understand the fundamental principles that underline the computer graphics algorithms.
2. Develop and implement two and three dimensional graphical structures.
3. Design two and three dimensional graphical structures.
4. Implement graphics programming using OpenGL.
5. Understand computer animation.

Module I
Overview of graphic systems: Computer-Aided Design, Virtual Reality Environments, Data
Visualization, Computer art, Entertainment, Education and Training, Visualization, Image
Processing, Graphical User Interfaces.
Points and Lines, Line drawing algorithms, Circle Generation algorithms, Ellipse generating
algorithms, Parallel curve algorithms, Attributes of output primitives.
Module II
Basic transformations, Matrix representations and homogeneous co-ordinates, Composite
transformations, Raster methods for transformations.
The viewing Pipe Line, Viewing Co-ordinate reference frame, Window to viewport co-ordinate
transformation, 2D viewing functions, Clipping operations.
Module III
Transformation, Rotation scaling, Other transformations, composite Transformations, 3D
Transformation functions, Modeling and co-ordinate transformations, 3D Viewing concepts. 3D
Display methods, 3D Graphics packages.
Polygon surfaces, Curved lines and surfaces, spline representations, Bezier curves and surfaces,
B spline curves and surfaces, Beta splines, Relational splines, Conversion between spline
representations, Displaying spline curves, Sweep representations.
Module IV
Constructive Solid Geometry Methods, Octrees, BSP trees, Fractal Geometry methods.
OpenGL primitives Functions, pipeline, event handling and view manipulations
Classification of visible surface detection algorithms, Back face detection, Depth Buffer method,
A-Buffer method, Scan Line method, Depth Sorting method, BSP Tree method, Area subdivision
method, Octree methods, Ray Casting methods, Curved surfaces, Wireframe methods, Visibility
Detection functions, Illumination models and surface rendering methods, colour applications,
Computer Animation.
Graphics Card: Processing on the Graphics Card, Graphics Pipeline, NVDIA CUDA Libraries

References:
1. Hearn, D., & Baker, M. (2011). "Computer graphics with OpenGL (4th ed., International
ed.). Upper Saddle River, N.J.: Pearson Education.
2. Hughes, J. (2013). Computer graphics: Principles and practice (3rd ed.). Addison Wesley.
3. Foley, van Dam, Feiner & Hughes, Computer Graphics Principles & Practice.
4. Hill, F., & Kelley, S. (2007). Computer graphics: Using OpenGL (3rd ed.). Upper Saddle
River, NJ: Pearson Prentice Hall.
86
Division of Information Technology
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)

19-204-0707 Ethical Hacking


Course Outcomes:
On completion of this course, students will be able to
1. Understand steps in hacking.
2. Analyse Information security threats and countermeasures.
3. Illustrate the issues relating to ethical hacking.
4. Analyse session Hijacking, SQL Injection and security in various aspects.
Module I
Ethical Hacking Overview & Vulnerabilities: Evolution of hacking, Ethical Hacker Code of
Conduct and Ethics, Hacking Methodologies, Incident Response Ethics and the Law Introduction
to steps in Ethical Hacking
Module II
Footprinting and Scanning: Footprinting, Need and Goals of footprinting, Terminologies,
Threats, The Footprinting Process. Scanning, Introduction, Types of scans, Checking the Status
of Ports, The Family Tree of Scans, OS Fingerprinting.
Module III
Enumeration and System Hacking: Enumeration, Enumeration in different OS, SMTP
Enumeration. System Hacking: Password Cracking, Authentication on Microsoft Platforms,
Executing Applications, Covering tracks
Module IV
Session Hijacking and Sql Injection : Session Hijacking, Spoofing, Hijacking, Application Level
and Network Session Hijacking, Defensive Strategies.
SQL Injection, Results and Anatomy of a SQL Injection, Attack Altering Data, Injecting Blind
Information Gathering Evading, Detection Mechanisms, Counter measures. Hacking Wi‐Fi and
Bluetooth, Mobile Device Security

References
1. Kimberly Graves, "Certified Ethical Hacker", Wiley India Pvt Ltd, 2010
2. Michael T. Simpson, "Hands on Ethical Hacking & Network Defense", Course
Technology, 2010
3. Rajat Khare, "Network Security and Ethical Hacking", Luniver Press, 2006
4. Ramachandran V, "BackTrack 5 Wireless Penetration Testing Beginner’s Guide" (3rd
ed.). Packt Publishing, 2011
5. Thomas Mathew, "Ethical Hacking", OSB publishers, 2003

90
Division of Information Technology
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)
19-204-0714 Entrepreneurship Development

Course Outcomes:
On completion of this course, students will be able to :
1. Develop awareness about the importance of entrepreneurship opportunities available in
the society
2. Get acquainted with the challenges faced by the entrepreneur

Exercises:

1. To study the types of entrepreneurs and the factors affecting entrepreneurial growth.
2. To make an assessment of the major motives influencing an entrepreneur
3. To make an overview of the various stress management techniques
4. How to identify and select a good business opportunity?
5. Preparation of a techno economic feasibility report for a given project
6. Preparation of a preliminary project report for a given project
7. To identify the various sources of finance and management of working capital
8. Carry out the costing and break even analysis of a proposed project
9. Preparation of a PERT / CPM chart for the various activities involved in a project
10. To make a study of the various causes and consequences of sickness in small business
and identify corrective measures.

References:
1. Roy, R. (2011). Entrepreneurship (2nd ed.) Oxford University Press. Oxford.
2. Gordon, E., & Natarajan, K. (2009). Entrepreneurship development. Himalaya Pub.
House. India.
3. Coulter, M. (2001). Entrepreneurship in action. Prentice Hall. Upper Saddle River, N.J.
4. Jain, P. (1998). Handbook for new entrepreneurs. Oxford University Press. Delhi.
5. Khanka, S. (2010). Entrepreneurial development S.S. Khanka. S.Chand&.Co, New Delhi,
India.

97
Division of Information Technology
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)

19-204-0712 Computer Graphics Laboratory

Course Outcomes:
On completion of this course the student will be able to :
1. Implement image manipulation and enhancement.
2. Create animations.
3. Develop applications using GPU.
4. Create 3D graphical scenes using open graphics library suites.

A: Implement the Exercises Using C / OpenGL / Java


1. Implementation of Algorithms for drawing 2D Primitives
a. Line (DDA, Bresenham) all slopes
b. Circle (Midpoint)
2. 2D Geometric transformations
a. Translation
b. Rotation
c. Scaling
d. Reflection
e. Shear
f. Window Viewport
3. Clipping
B: Implement the Exercises Using OpenGL
4. 3D Transformations, Translation, Rotation, Scaling
5. 3D Projections Parallel, Perspective
6. Creating 3D Scenes
7. 2D Animation To create Interactive animation using any authoring tool

C: Develop Applications Using GP GPU


8. Load the GP GPU processor device with 10,000 random numbers, sort them using
CUDA program and, get the sorted output on the host machine and print the output.

References :
1. Hearn, D., & Baker, M. (2011). Computer graphics with OpenGL (4th ed., International
ed.). Upper Saddle River, N.J.: Pearson Education.
2. Hughes, J. (2013). Computer graphics: Principles and practice (3rd ed.). Addison Wesley.
3. Hill, F., & Kelley, S. (2007). Computer graphics: Using OpenGL (3rd ed.). Upper Saddle
River, NJ: Pearson Prentice Hall

95
Division of Information Technology
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)
19-204-0713 Mini Project - Multimedia Project

Course Outcomes:
On completion of this course the student will be able to :
1. Use current techniques, skill and tools necessary for animation, Frame and Video
Capturing and special Effects Authoring and Presentation and will be able to work in a
team in the atmosphere of a professional industry.
2. Implement Multimedia project involving Interactive Computer Graphics technology,
working with audio and video capturing.

Projects can be done using software’s like Blender with Python scripting, OpenCV, Kinect,
OpenGL, DirectX etc.

The projects can be of any of the following type.


1. Development of Augmented Reality in the areas like education, marketing, advertisement
in magazines, movies, astronomy, map, navigator, 3D games, weather condition,
Healthcare etc.
2. Development of Virtual Reality in the areas like Military, Education, Healthcare,
Entertainment, Fashion, Business, Scientific visualization, Construction, Film,
Telecommunication etc.
3. Motion Capturing in Interactive Graphics
4. Lossless and Lossy Media Encoding and Compression
5. Development of media player in multimedia framework like gstreamer, ffmpegetc
6. Real Time communication using media and IP streaming
Increment 1: Determine the Objective
 Perform and document System requirement analysis and Software requirement analysis
activities.
 Description of the expected software features, constraints, interfaces and other attributes.
 Prepare the Software Requirements Specifications (SRS) to document the agreed
requirements; to provide the basis for design; to provide the basis for system test
Increment2: Design the application
 Description of how the software will meet the requirements. Also describes the rationale
for design decisions taken.
 Design document including database design, UI design, Data definition, Manifest file as
appropriate to the work.
 Prepare the Software Design Description (SDD) to document the design and design
decisions in order to provide the basis for implementation and unit test.
 Description of the plan and specifications to verify and validate the software and the
results.
 Prepare the Software Test Documentation (STD) to document how the software will be
tested, and record the results.
Increment 3: Develop and refine the application
 Create the application using the chosen languages, databases and platform.
 Test the application using the test document
 Demonstrate the application.

96
Division of Information Technology
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)
19-204-0715 Project Phase I
Course Outcomes:
On completion of this course a student will be able to:
1. Conduct literature survey in a relevant area of one’s course of study and finally identify
and concentrate on a particular problem.
2. Formulate a project proposal through extensive study of literature and / or discussion
with learned resource persons in industry and around.
3. Generate a proper execution plan of the project work to be carried out in Phase II through
thorough deliberations and improve presentation skills
4. The major project work shall commence in the seventh semester and completed by the
end of eighth semester. Students are expected to identify a suitable project and complete
the analysis and design phases by the end of seventh semester.

Each batch comprising of 3 to 5 students shall identify a project related to the curriculum of
study. At the end of the semester, each student shall submit a project synopsis comprising of the
following.

1. Application and feasibility of the project


2. Complete and detailed design specifications.
3. Block level design documentation
4. Detailed design documentation including circuit diagrams and algorithms / circuits
5. Bill of materials in standard format and cost model, if applicable
6. Project implementation action plan using standard presentation tools

Guidelines for evaluation:

1. Attendance and Regularity 10


2. Quality and adequacy of design documentation 10
3. Concepts and completeness of design 10
4. Theoretical knowledge and individual involvement 10
5. Quality and contents of project synopsis 10
Total 50 Marks

Note:
Points (1)-(2) to be evaluated by the respective project guides and project coordinator based
on continuous evaluation.
Points (3)-(5) to be evaluated by the final evaluation team comprising of 3 internal examiners
including the project guide.

98
Division of Information Technology

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy