0% found this document useful (0 votes)
64 views50 pages

Bca 7th 8th Semester Syllabus

nvhg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views50 pages

Bca 7th 8th Semester Syllabus

nvhg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

$

Course Name: Cyber Law & Professional Ethics (3 Cr)


Course Code: CACS401
Year/Semester: IY/VII
Class Load: 4 Hrs. / Week (Theory: 3Hrs. Tutorial: 1 Hrs.)

Course Description:
This course presents different concepts of cyber law, cybersecurity, and ethics for IT
professionals and IT Organizations. This course also presents different concepts related to
intellectual properties and their protections, privacy, and social networking issues.

Course Objectives:
The primary objective of this course is to provide knowledge of cyber law, cybersecurity,
privacy protection, intellectual property protection, and ethics for IT professionals and IT
organizations.

Course Contents:
Unit 1: An Overview of Ethics, Ethics for IT Workers and IT Users (10 Hrs.)
Ethics, Ethics in the Business World; Corporate Social Responsibility; Fostering Corporate
Social Responsibility and Good Business Ethics; Improving Business Ethics; Ethical
Considerations in Decision Making; Ethics in Information Technology; Managing IT Worker
Relationship; Encouraging Professionalism of IT Workers - Professional Codes of Ethics,
Professional Organizations, Certifications and Licensing ; Encouraging Ethical Use of IT
Resources among Users

Unit 2: Cyberattacks, Cybersecurity, and Cyber Law (l2llrs.)


Threat Landscape - Computer Incidents, Types of Exploits; CIA Security Triad -
Confidentiality, Integrity, Availability, Implementing CIA at Orgarizational, Network,
Application, and End-User Level; Response to Cyberattack - Incident Notification Protection
of Evidence and Activity Logs Incident Containment Eradication Incident Follow-Up Using
an MSSP, and Computer Forensics; Cyber Law; Provision of Cyber Law and Electronic
Transaction Act of Nepal

Unit 3: Privacy and Freedom of Expression (10 Hrs")


Privacy Protection and the Law - Information Privacy, Privacy Laws, Applications, and Court
Rulings; Key Privacy and Anonymity Issues - Consumer Profiling, Electronic Discovery,
Workplace Monitoring, Surveillance; First Amendment Rights; Freedom Expressions: Key
Issues; Social Networking Ethical Issues

Unit 4: Intellectual Property (8 Hrs.)


Intellectual Property, Copyright; Patient; Trade Secrets; Intellectual Property Issues:
Plagiarism, Reverse Engineering, Open Source Code, Competitive Intelligence, Trademark
Infringement, and Cybersquatting

Unit 5: Ethical Decision in Software Development and Ethics of IT Organizations (8 Hrs.)


Software Quality and its Importance; Strategies for Developing Quality Software; Use of
Contingent Workers; H-18 Workers; Outsourcing; Whistle-Blowing; Green Computing

Teaching Methods
The teaching faculties are expected to create environment where students can
upgrade themselves with the of computing and information

l/ .{1 ./
the help of topics listed in the syllabus. The general teaching pedagogy that can be followed by
teaching faculties for this course includes class lectures, laboratory activity, group discussions,
case studies, guest lectures, research work, project work, assignments (Theoretical and
Practical), and written and verbal examinations.

Evaluation
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
40 60

Recommended Books:
1. Ethics in Information Technology, Sixth Edition, George W. Reynolds"
2. Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing,
Fifth Edition, Herman T. Tavani, John Wiley and Sons, 2Arc. a

3. Ethics for Information Age, Eighth Edition, Michael J. euinn, pearson. .i

'r"
11c'
l*'d4
I
'r1' '"i.'''
--- .-" '''
. ',:''.*i
*i I q;1 g(

2
+ Course Title: Cloud Computing (3 Cr.)
Course Code: CACS402
Year/Semester: IV/V[
Class Load: 6 Hrs. / Week (Theory: 3Hrs. practical: 3 Hrs.)

Course Description
This course oflers detailed concept, applications, principles and implementation of cloud
cornputing. It includes introduction, Cloud Computing Architecture, Cloud Yirtualization, Cloud
Programming Models, Cloud security and applications. It does not entirely focus on theoretical
concept but also strongly focuses on practical skill based learning.
Course obiectives
The general objectives of this course are to provide theoretical as well as practical knowledge of
cloud computing to make students capable of designing, implementing and managing the issues
of cloud computing in their personal as well professional life.
Course Co+tents
* Unit l: Introduction to Cloud Computing [6 Hrs.]
1.1 Overview of Cloud Computing
1.2 Evolution of Cloud Computing
1.3 Characteristics of Cloud Computing
1.4 Types of cloud and its Cloud services
1.5 Benefits and challenges of cloud computing
1.6 Applications cloud computing
1.7 Cloud Storage
1.8 Cloud services requirements,
1.9 cloud and dynamic infrastructure
1.10 Cloud adoption

Unit 2: Cloud Computing Architecture [6 Hrs]


2.1 Cloud reference model
2.1.1 Platform as service
2.1.2 Software as a service
2.1.3 Infrastructure as service
2.2 Cloud deployment models
2.2.lPnblic clouds
2.2"2Private clouds
2.2.3 Community cloud
2.2.4 Hybrid clouds
2.3 Cloud design and implementation using SOA,
2.4 security, trust and privacy

Unit 3: Cloud Virtualization technology [10 Hrs]


3. 1 Overview of Virtualization techniques
3,2 Types of Virtualization
3,3 Implementation Levels of Virtualization Structures
-h
.&"
3.4 virtuali zalion benefits
$','.kffi
j!
-/t
**y' \ pry srw
hq-ffifr'd
,,fl e

{/nloi?r",
W-'"S
. lg>HI:*( 6-
3.5 server virlualization
3.6 hypervisor management software
3 .7 virtual infrastructure requirements

Unit 4: MapReduce(8 Hrs)

4.1 Introduction to parallel computing


4.2Map-reduce model
4.3 Applications of map reduce
4.4 Parallel efficiency of Map-Reduce
4.5. MapReduce infrastructure

Unit 5: Cloud securify [6 Hrs]


5"1 Introduction to Security,
5.2 Cloud Security challenges and Risks,
5.3 Software-as-a-Service Security
5.4 Security Monitoring
5.5 Security Architecture Design
5.6 Data Security
5.7 Application Security
5.8 Virtual Machine Security
5.9Identity Management and Access Control

Unit 6: Cloud platforms and applications [12 Hrsl


6.1 Weh services
6.2 AppEngine
6.3 Azures Platform
6.4 Aneka
6.4 Open challenges
6.5 Scientific applieations
6.6 Business and Consumer applications

Practical Works
1. The practical work consists of all features of cloud computing and field visit.
2. Visit the cloud service provider (cloud industries) nearby you and prepare a report based on
organizational structure and technology implemented consulting with your subject teacher.

Teaching Methods
+ The teaching faculties are expected to create environment where students can update and
upgrade themselves with the current scenario of computing and information technology with the
help of topics listed in the syllabus. The general teaching pedagogy that can be followed by
teaching faculties for this course includes class lectures, laboratory activity, group discussions,
case studies, guest lectures, research work, project work, assignments (Theoretical and Practical ),
and written and verbal examinations

/@
h 7r

ryiii"${
Evaluation
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
20 20 (3 Hrs.) 60 (3 Hrs.)

Text Books
1. Dr. Kumar Saurabh, Cloud Computing
2. Raj Kumar Buyya, Christian Vecchiola, S. ThamaraiSelvi, Mastering Cloud
Computing

Reference Books
1. David S. Linthicum, Cloud Computing and SOA Convergence in your enterprise
2. Barrie Sosinsky, Cloud Computing Bible
3. Saurabh, K. (2011). Cloud Computing - Insights into New -Era Infrastructure, Wiley
India. A ( 4

154-A
z-__
,f,-,
''i!:;
.1

, e1'.l'-' .

' j'"Ifr
il't, -:,''
-,":?
d
(fro*

3\
Course Title: Internship (3 Cr.)
Course Code: CAIN403
Year/Semester: IV/V[
Class Load:

Course Description: The intemship course is practical industry experiencing course. This
course is expected to provide opportunity for career exploration and development in industry.
It includes applying theoretical and practical knowledge for solving real world problems while
working in industry"
Course Objectives: The objective of this course is to expose and penetrate final year students
into market space industry so as to acquire experience. It gives students the opportunity to enter
the real world industry so that students will be pragmatic and able to start their professional
career.

Course Details:
Nature of Internship:

The intemship work should be related to computer applications and information technologies.
The nature of work during intemship should impart practical knowledge in computer system
and its applications development, administration and management. The internship period
should be minimum of 8 (Eight) weeks. Students should start their internship within 3.to 4
weeks of start of seventh semester. The intemship can be practiced at government, non-
govemment organizations having appropriate computer system applications and information
technology usages. Generally, the internship is an individual activity however can be practiced
together in groups in the host organization. However, each student must prepare and submit
individual internship report on the basis of his/her work done during the internship period.
Students working in group at the same organization should be able to distinguish their nature
of work. Each student should be facilitated with a mentor and supervisor. Mentor from the
intern providing company is assigned to guide each student during internship in the company.
Supervisor from college/campus is assigned to supervise each student during internship.

Phases of Internship:

The following are the phases of intemship evaluation:


l. Proposal Submission: Students must submit and present project proposal after 2"d
week of start of the internship.

2" Mid-Term: Students must submit progress report and defend midterm progress of their
internship work in the 12& week of the seventh semester.

3. Final Submission: Students must submit and orally defend the internship work during
last week of the seventh semester but before final board examination. Students must
have to submit the internship final report to their respective department before at least
ten days of final defence date. The report should be submitted in standard format as
prescribed. The hard/soft copy of report should be made available to the external expert
before a week of presentation date. A viva voice will be conducted by
committee.
/r(-,
/H d4
Provision of Supervision : l- --it&
.?1 ?:i
i+*.
"'J ;.i'
.q
'*,., l---.
t- ii'
,
,rlr
s*.r,
There should be a regular faculty of campus/college assigned as a supervisor. The role of
supervisor is to guide the students throughout the internship and provide constructive
suggestions. A supervisor can supervise at most five internship students in a class section.

Provision of Mentorship:

There should be a regular employee in the intern providing organization assigned as a mentor.
The role of mentor is to guide the students throughout the internship period at the organization.

Evaluation Scheme:

1. Proposal Defense of 5Yo of total marks based on internship proposal and its
presentation.

2. Midterm of 75o/o of total marks based on the progress of the work of internship.
3. Final Defense of 20o/o of total marks based onpresentation of intemship work and viva-
voice.

The 5 marks of the proposal defense will be evaluated by the research c'ommittee formed by
HoD/Coordinator/Supervisor as a part of proposal defense. The 75 marks of the midterm will.
be evaluated by the HOD/Coordinator, Supervisor and Mentor as a part of midterm defense.
Out of the 75 marks, the HOD/Coordinator will evaluate for 5 marks, the supervisor will
evaluate for 35 marks and the mentor examiner will evaluate for 35 marks. The marks from the
mentor should be provided to the corresponding campus/college in confidential manner. The
remaining 20 marks of final defense will be evaluated by the extemal examiner from the
university.

Out of 100 marks, the 80 marks (Proposal + Midterm Evaluation) will be considered as internal
assessment while the 20 marks Defense) will be considered as external assessment. Each
student in the internship should get passed in each of the intemal and external assessments
individually. Any student failing to pass each of the assessments will be considered as fail.

The evaluation committee and evaluation criteria should be as follow:

a. Evaluationcommittee
- InternshipSupervisor
- Mentor from Intern Company
- HoD/Coordinator
- External Examiner

b" X'ocus of the evaluation


- Presentation skills
- Level of work done during internship
- Understanding of internship activities
Internship report
Viva/Question answer &"%
Report Contents: @ P-?qE#t
ffitrs
7
1. Prescribed content flow for the internship proposal

1.Introduction
2. Problem Statement
3. Objectives
4. Description of Internship WorklProject (Expected)
5. Internship Plan (Expected)
6. Expected Outcome of Internship Activities
7. References

2. Prescribed content flow for the internship report

1. Cover & Title Page


2. Certificate Page
i. Mentors'RecommendationfromCompany
ii. Supervisors'Recommendation
iii. Examiners' Approval Letter
3. Acknowledgement
4. Abstract Page / Executive Summary
5. Table of Contents
6. List of Abbreviations, List of Figures, List of Tables, List of Abbreviations
7. Main Report
8. References
9. Bibliography (if any)
10. Appendices (Screen Shots/ Source Codes)

3. Prescribed chapters in the main report

1. Chapter 1: Introduction
1.1. Introduction (Introduce the project/ work done during intemship)
1.2- Problem Statement
1.3. Objectives
1.4. Scope and Limitation
1.5. Report Organization

2. Chapter 2: Introduction to Organization


. Organi zatioin Details
2. I
2.2. Or garuzational Hierarchy
2.3. Working Domains of Organization
2.4. Description of Intern Department/Unit

3. Chapter 3: Background Study and Literature Review / Related Works


3.1. Background Study (Description of fundamental theories, general concepts and
terminologies related to the intemship project)
3.2.Literature Review (Review of the similar projects during intemship, theories
and results similar the projects during internship)
b
,i.
4. Chapter 4: Internship Activities
I
4.1. Roles and Responsibilities
4.2. Weekly log ( Technical Details of Activities)
4.3. Description of the Project(s) Involved During Internsl@;

+;t-w@t 8
4.4. Tasks / Activities Performed

5. Chapter 5: Conclusion and Learning Outcomes


5.1. Conclusion
5.2. Learning Outcome

While writing above chapters students should avoid basic definitions. They should relate and
contextualize the above mentioned concepts with their project work done during internship at
the host organization.

Citation and Referencinq

The listing of references should be listed in the references section. The references contain the
list of articles, books, urls that are cited in the document. The books, articles, and others that
are studied during the study but are not cited in the document can be listed in the bibliography
section.

The citation and referencing standard should be APA referencing standard. The text inside the
document should be cited accordingly" The APA referencing standard can be found in the web
at http s //apasIyle. apa. org/
:

Report f,'ormat Standards


A. Page Number
The pages from certificate page to the list of tables/figures/abbreviations/approvals should
be numbered in roman starting from i. The pages from chapter I onwards should be
numbered in numeric starting from 1. The page number should be inserted at bottom, aligned
center.

e. Page Size and Margin

. The paper size must be a page size corresponding to .A.4. The margins must be set as

Top : l; Bottom : 1; Right : l;Lefr.1.25


C. Paragraph Style
. All paragraphs must be justified and have spacing of 1.5.
D. Text Font of Document
. The contents in the document should be in Times New Roman font
. The font size in the paragraphs of document should be 12
s. Section Headings
. Font size for the headings should be 16 for chapter headings, 14 for section headings, 12
for sub-section headings. All the headings should be bold faced.
F. Figures and Tables
. Position of figures and tables should be aligned center. The figure caption should be
centred below the figure and table captions should be centred above " All the
captions should be of bold face with 12 font size.

Final Report Binding and Submission:


/h'* ,%
-4fl

9
No of Copies: 3 (College Library + Self + Dean Office)

Look and Feel: Golden Embracing with Black Binding

A final approved signed copy of the report should be submitted to the Dean Office, Exam
Section, FOHSS.

Teachine Methods:

The major teaching methods that can be followed for this course includes industry practice,
class lectures, group discussions, presentations, and demonstrations.

Evaluation

Examination Scheme
Internal Assessment External Assessment Total
Proposal Midterm
Final Defence
Defence Defence
5 75 20 '1',:;r,rygg

lLia4 %''$b
' --- q"ntrryqdt

*ttr$

10
Elective Courses

Course Title: Image Processing (3 Cr.)


Course Code: CACS404
Year/Semester: IV/VII
Class Load: 5 Hrs. / Week (Theory: 3Hrs. Practical: 2Hrs.)

Course Description
This course presents introduction to several topics on image processing techniques and their
applications. It also explores the students to real-world applications of image processing.

Course obiectives
Upon completion of this course, students should be able to 1. Explain the basic concepts of
digital image processing and various image transforms. 2. Develop a broad range of image
processing techniques and their applications. 3. To familiarize the with the image
enhancement, image restoration and image segmentation techniques.

Course Contents
Hours
Unit 1: Fundamental of Image processing
Image representation, basic relationship between pixels, elements of DIP
system, elements of visual perception-simple image formation model,
8
Sampling and Quantization, Color fundamentals and models, File Formats,
Image operations. Brightness, contrast, hue, saturation, Mach band effect

Unit 2: Image Enhancement


Image Transforms, Fourier Transform and Discrete Fourier Transform, Fast
Fourier Transform. Cosine Transform, Frequency domain image
enhancement, low pass filtering, high pass filtering, homomorphic filter,
Gaussian filter
Spatial domain image enhancement, point processing, contrast stretching, t2
clipping and thresholding, digital negative, intensity level slicing. Histogram
processing: equalization, modification, Spatial filtering averaging,
Smoothing and sharpening, median filtering, spatial low, high and band pass
filters

Unit 3: Image Restoration:


Image Restoration - Image degradation model - Noise modeling - Blur,
Inverse filtering- removal of blur caused by uniform linear motion, Weiner 9
fi ltering, Morpholo gical operation, erosion and dilation,

Unit4: Image coding and compression


Need for compression, redundancy, pixel coding, run length coding,
Hufknancoding, Elements of information theory, Error free compression,
9
Lossy compression,Image compression standards- JPEG& MPEG, wavelet
based image compression.

Unit 5: Image segmentation and feature extraction


,%
Image Segmentation: Thresholding, Region based se edges,line
-b 10
and curve detection, edge operators, Image F, ,Types s,ryeqffi
Wt#.ry<
fr
of features, feature extraction , Texture , Feature reduction algorithms,
Image classifi cation, clustering techniques,
Case Studies in Image Security, Steganography and Digital watermarking,
Visual effects, Case studies in Medical Imaging and remote sensing.

Evaluation
Evaluation Scheme
Internal Assessment Extemal Assessment Total
Theory Practical Theory Practical
100
20 20 (3 Hrs.) 60 (3 FIrs.)

Laboratory Work
Laboratory work should be done covering all the topics listed above and a small project work
should be carried out using the concept learnt in this course using software like matlab, python.
Text Books:
l. Gorrzalez Rafel C, Digital lmage Processing, Pearson Education, 2009.
2" S.Sridhar, Digital Image Processing, Oxford University Press,2011

Reference Books:
1. Milan Sonka, Vaclav Hlavac and Roger Boyle, Image Processing, Analysis and ji
MachineVision,SecondEdition,ThompsonLeaming,2007

/(-. ''
/u@4
l-'
"
.-
'.
t;
,'
"'/ " t' .' _'
€it *'
,"6,\' ^
ir;; -.
.?*.,l!!{

L2
Course Title: Database Administration
Course Code: CACS405
Year/Semester: IV/VII
Class Load: 6 Hrs. /Week (Theory: 3Hrs, Practical3Hrs.)

Course Description
This course provides the comprehensive knowledge aboutrelational database management
system in administrative approach to integrate in enterprise levelof database in network
environment which encompasses with oracle databaselnstances Management, database
installment in network environment, implementing user role and privileger, mrltitenant database
management, back and recovery.

Objectives: The general objectives of this oourse is to provide core knowledge of administrative
works on relational database management system.

-- Unit llntroduction to an Oracle databasel2Hrs


Overview of the Oracle Database Architecture (process, memory, storage structure), DBA roles
and responsibilities, Familiar with SQl*Plus,Accepting Values at Runtime, Overiew of SeL
Command (DDL (Tables, Constraints, IndexesViews, Synonyms, SequencesPartitioning and
Materralized Views), DML, Join and Subquery)
Unit2 Managing Database Instances5Hrs
Oracle Database installation, Database creation,starting up and shutting down oracle instance,
Oracle Network component, communicating between Databases; Using Dynamic performance
Views, Using the Automatic Diagnostic Repository (ADR), Using the Alert Log and Trace Files,
Managing Initialization Parameter Files.
Unit 3: Tablespace and Storage management 4Hrs
Working with Tablespaces and Data Files, Creating and adding tablespace and
datafiles,Managing Control Files, Online Redo Logsand Archive logs;Multiplexing online redo
logs and control files, database archiving.
Unit -4Managing Users, Roles and Privileges 6Hrs
Assigning Quotas to Users, Applying the Principal of Least Privilege, Creating and Assigning
Profiles, Administering User Authentication Methods, Managing Oracle Database Users,
Privileges, and Roles"
Unit 5: Multitenant Database Architecture 7 Hrs
Understanding the Multitenant Architecture, Pluggable Architecture; Creating CDB; Creating
Pluggable Databases (PDBs) within a CDB; Manage CDBs and PDBs, Backup and Duplicate,
Manage Security in Multitenant databases
Unit-6Configure the Oracle Network Environment5Hrs
Overview of Network Configuration, Oracle Net Listener Configuration and Management,
oracle Net Naming Methods, Networking the Net Configuration Assistant, Configure Client
connections with Net Manager, view Listener configuration, Starl and Stop the Oracle Listener,
Use TNSPING to Test Oracle Net Connectivity, Connect to the Database, Confi gure NetS ervices
with Enterprise Manager

q"

,t /
d,

ffl/a**W' .ffi
5*ffio*E,
{4fi
'h
n*h"

4F
=^.rd
"?u't4'"
Unit -7:Backup and RecoverySHrs
Backup and Recovery Concepts, Database backup, restoration and recovery, defining a
backupand recovery strategy, Backup and Recovery options; Data Dump; User-Managed Backup
and Recovery; Configuring RMAN; RMAN Backups, Restore and Recovery, Perform CDB and
PDB flashback.
Unit-8
Automate Tasks with the Scheduler4Hrs
= Introduction to the Scheduler, Access fughts, Scheduler Components and Workflow, create a
Job, Job Classes, Use Time Based, Event-Based Schedules, Create an Event-Based Schedule.

Lahoratqfy Worhs
Laboratory works should be done covering all the topics listed above and a small work should be
carried out using the concept learnt in each unit in the group. Work should be assigned on
individual basis.

Teaching Methods
The general teaching pedagogy includes class lectures, group discussions, case studies, guest
lectures, research work, project work, assignments (theoretical and practical). and examinations
(written and verbal), depending upon the nature of the topics. The teaching faculty will
detennine the choice of teaching pedagogy as per the need of the topics.

References
l. Fernandez, I" Beginning Oracle Database 12c Adrninistration. Apress.
2. Press, O. Oracle Database 19 C: Administration Workshop vol-l/ll.
3. Thomas, B. Oracle Database 12C Administration Cefiified Associate. Sybex.
4. Pro Oracle Database 18c Administration: Manage and Safeguard Your Organization's
Data, Michelle Malcher and Darl Kuhn. Third Edition.
5. Oracle Database 12c DBA Handbook, Manage a Secure Oracle Enterprise
Database Environment, Bob Bryla.

4
,s
%r
Course Title: Network Administration (3 Cr.)
Course Code: CACS406
Year/Semester: IV/Y[
Class Load: 6 Hrs. / Week (Theory: 3Hrs. Practical: 3 Hrs.)

Course Description: The course introduces the theoretical as well as practical concepts of
Network Administration. The course includes concepts of work station, server and services,
Network infrastructure, Implementing different network services.

Course Objectives: The objectives of this course is to make the students to design and
implement enterprise level network with its services.

Course Contents:
Unit I: Introduction [4Hrs.]
Network administrator as a Profession, Network administrator professional ethics,
Recent trends in network administration.
Unit I: Work Station, Server and Services [16Hrs.]
Workstation: Architecture design, Hardware strategies, OS installation. Servers:
Hardware Strategies, Hardware Features & Specifications. Service: Requirements,
Planning and Engineering, Service Launch, Disaster Recovery.
Unit II: Infrastructure [6Hrs.]
Network Architecfure, Network Operations, Datacentres Overview and Running
Datacentres.
Unit III: Service Recommendation [16Hrs.]
Server Upgrade, centralizing a service, Service Monitoring, Namespaces, Email
Service, Print Services, Data Storage, Backup and Restore, Software Repository, Web
Services.
Unit IV: [6Hrs.l
Preparing procurement plan/document for enterprise level network setup

Laboratory Works:
The laboratory work includes implementation of the mentioned content in syllabus using
LINUX and Windows operating system.

Teaching Methods
The major teaching methods that can be followed for this course includes class lectures,
laboratory activity, group discussions, presentations and case studies.
Evaluation
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
20 20 (3 Hrs.) 60 (3 Hrs.)

Text Book:
1. The Practice of System and network administration, 3'd Edition, Thomas A. Limoncelli,
Christina J. Hogan, Strata R. Chalpp
2. Mastering Windows Server 2019: The complete guide for IT professionals to
and manage Windows Server 2019 and capabilities, 2nd Edition
3. Ubuntu and Centos Linux server . Tanvir Rahman, 2019
&
,"$t
"g\
r-' ,"i15
r'^:r--
r'
Course Title: Software Project Management
Course Code: CACS407
Year/Semester: IY/YII
Class Load: 5 Hrs. /Week (Theory: 3Hrs, Practical: 2Hr.)

Course Deseription
This course provides the comprehensive knowledge about Software Project Management,
which encompasses with Software Projec! Planning, Scheduling, Cost Estimation, Risk
management, Quality management and Confi guration management.

Objectives: The general objective of this course is to provide fundamental knowledge of


soflware project management and corresponding software tool.

Unit -1
Software Project Management Concepts 8 Hrs
Introduction, Project and Software project, Software project vs other project, Importance and
Problems in software project management, Process of SPM. Characteristics of good project
manager, Successful Software Project Manager, Overview of Software Project Planning.

Unit-2
Software Project Scheduling 8 Hrs
Objectives of activity planning, Work breakdown structure, Network planning model:
Critical path method (CPM), Program evaluation and review technique (PERT), Precedence
diagramming method (PDM), Shortening project duration, Identifying critical activities.
Forward pass and Backward pass

Unit -3
Software Estimation Techniques 7 Hrs
Software Effort Estimation: Problems with over and under estimations, Basis of software
Estimating, Software effort estimation techniques, expert Judgment, Estimating by analogy.
Bottoms-up estimating, Top-down approach and parametric models.

Unit -4 8 Hrs
Software Evaluation and Costing
Project Evaluation: Strategic Assessment, Technical Assessment, cost-benefit analysis, Cash
flow forecasting, cost-benefit evaluation techniques, Risk Evaluation. Selection of Appropriate
Report, Project approach: Choosing technologies, choice of process models, structured
methods.

Unit -5
RiskManagement
Risk Identification, Planning, Evaluation and Management, Categories of Risk,
dealing with risk, evaluating Risks to the schedule.
,q^
"llJ
t!\
Unit -6 "m
Software Quality Management
TQM, Six Sigma, Software Quality: defining and importance software quality,
of software quality in software planning

Unit -7

G&***, \W /",fu
1.6
Software Configuration Management 7 Hrs
Concept, Requirement and Elements of SCM, Baseline, SCM Repository, Versioning and
version control, SCM Process, Change Control Process. Configuration Audit and Status
Reporting. Case Study: Version Control Software Tools (Git, CVS, SVN)

Laboratory Works
L"b"*t".y **kt thould be done covering all the topics listed above and a small work should
be carried out using the concept learnt in each unit in the group. Work should be assigned on
individual basis. Student may choose project Management tools like (MS Project, OpenProj,
dot Project, Trello, Asana, ClickUp).

Teaching Methods
The general teaching pedagogy includes class lectures, group discussions, case studies, guest
lectures, research work, project work, assignments (theoretical and practical), and
examinations (written and verbal), depending upon the nature of the topics. The
faculty will determine the choice of teaching pedagogy as per the need of the topics.

References
1. Cotterell, B. H. (2018). Software Project Management. McGraw-Hil[6^
2. Dutt, S. C. (n.d.). Software Project Management. Pearson Education I"@a. ,'I"i
3. A.S. Kelkar (""d"). Software Project Management. PHI Leaming. 'tl ?esqd(
,411"*

@ slft$

17
Course Title: Advanced .Net Technology (3 Cr.)
Course Code: CACS408
Year/Semester: IV/VII
Class Load: 6Hrs. Aileek (Theory: 3 Hrs. Practical: 3 Hrs)

Course
This course provides skill to develop modern software program with graphical user interface
using the language C# with ASP.net" Student will build Window-based and web-based forms,
adding controls and setting properties of these controls.

Couryq Qbiqelivs
The objective of this course is to understand the theoretical foundation as weli as its practical
aspects of Windows Application, ASP.NET Core web application framework and C# language
features.

Course Contents
Unit l: C# Basics 8 Hours
Introduction to .NET Architecture, Class and Object: Creating class, Interface, Creating
Objects, Access Modifiers, Arrays, Inheritance, Exception Handling and Threading: try, catch,
finally, throw and throws, Create multithread program, Thread lifecycle" File IO: File Stream,
Stream Reader, Stream Writer, Binary.Reader, Binary Writer, Serialization.

Unit 2: Windows Application Houri 6


Windows Forms: Benefits, Window Forms Control, Properties and Event, .NET Event, MDI
Forms, Form Inheritance. Dialogs, Tooltips, Resizing, Menus and Context Menus, Custom
Control Creations, Handling Multiple Events, Graphics and GDI+

Unit 3: Introduction to ADO.NET 7 Hours


Benefits of ADO.NET, ADD.NET compared to classic ADO, ADO.NET architecture
(Connected and Disconnected), Shared and Database-Specific Classes, Using Database
connection" Working with DataSets, Managed Providers, Data Binding, Typed DataSets,
Working with Data Reader, Transactions

Unit 4: ASP.NET working with Data and Security 12 Hours


Web Application Using ASP.NET, ASP.NET Architecture, Working with controls, User
Interface Elements, Deployments, Web sites, Applications and Virtual Directories in IIS.
Accessing Data using ADO.NET, Connecting to Data, Executing Commands, State
management ( Page-Level state, using Cookies to preserve state, ASP.NET Session State,
Storing Object in Session State, Configuring Session State )
Validation,IIS URL Authorization, Forms Authentication and Config File encryption

Unit 5: ASP.NET AJAX and MVC 10 Hours


Introduction to ASP.NET AJAX, ASP.NET AJAX Server Control, ASP.NET AJAX Server
Data ASP"NET AJAX Client-side Libraries. Introduction ASP.NET MVC, Web Application
Using MVC pattern Razor View and controller, Model

Unit 6: Hosting and Deploying ASP.NET Core Application 5


App Servers and Hosting Models: IIS, Nginx, Apache, ASP.NET Core
Docker and Containerization, Publish to Azure cloud

tu
"B
Laboratory works
The laboratory work includes writing programs covering most of the concepts of above units
using C# and .NET core SDK (3.0 or above)

Teachins Methods
The teaching faculties are expected to create environment where students can update and
upgrade themselves with the current scenario of computing and information technology with
the help of topics listed in the syllabus. The general teaching pedagogy that can be followed by
teaching faculties for this course includes class lectures, laboratory activity, group discussions,
case studies, guest lectures, research work, project work, assignments (Theoretical and
Practical), and written and verbal examinations.

Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
20 20 (3 Hrs.) 60 (3 Hrs.)

Reference Books
L" Herbert Shildt, "C#: The Complete Reference", TMH
2. C# 8.0 and .NET Core 3"0 - Modern Cross-Platform Development, Fourth Edition, by
Mark J. Price, 2019
3" ASP.NET Core in Action, by Andrew Lock,20l8
4. Ian Griffrths (2012), Programming C# 5.0, O'Reilly Medi4Inc.
5. Sharp, J. (2013). Microsoft Visual C# 2013 step by step.
6. Albahad, J., Albahari, B., & Drayton, P. Q0l2)" C# 5.0 in a nutshell (sth ed). Beijing;

tu
Sebastopol: O'Reilly

-f}fl
"%
@kqffil
$?w

19
/

Course Title: E-Governance (3 Cr.)


Course Code: CACS409
Year/Semester: IV/VII
Class Load: 4Hrs. Aileek (Theory: 3 Hrs. Tutorial: I Hrs)

Course Description:
This course familiarizes students with different concepts of E-Governance, different E-Governance
models and infrastructure development, use of data warehousing and data mining for e-govemance,
and different case studies ofdif[erent countries.

Course Objectives:
o To develop knowledge of e-govemance
o To know different e-governance models and infrastructure development
o To know to use conceFs of data warehousing and mining in e-governance
Course Contents:
Unit 1: Introduction (6 Hrs.)
E-Governance - An Overview; Why E-Govemance; Issues in E-Governance Applications and
the Digital Divide; Evolution of E-Governance, its Scope and Content; Present Global Trends
of Growth in E-Govemance; E-Governance Applications; E-Governance Initiatives inNepal

Unit 2: E-Governance Models (12 Hrs.)


Introduction; Models of Digital Governance - BroadcastinglWider Dissemination Model,
Critical Flow Model, Comparative Analysis Model, Mobilization and Lobbying Model,
Interactive Service Model/Government-to-Citizen-to-Government Model (G2C2G); Evolution
in E-Governance and Maturity Models - Five Maturity Levels; Characteristics of Maturity
Levels; Key Focus Areas; Towards Good Governance through E-Governance Models

Unit 3: E-Governance Infrastructure, Stages in Evaluation and Strategies for Success (8


Hrs.)
E-readiness - Data System Infrastructure, Legal Infrastructural Preparedness, Institutional
Infrastructural Preparedness, Human Infrastructural Preparedness, Technological
Infrastructural Preparedness; Evolutionary Stages in E-Governance

Unit 4: Applications of Data Warehousing and Data Mining in Government (6 Hrs.)


Introduction; National Data Warehouses - Census Data, Prices of Essential Commodities;
Other Areas for Data Warehousing and Data Mining - Agriculture, Rural Development,
Health, Planning, Education, Commerce and Trade, Other Sectors

Unit 5: CASE Studies (16 Hrs.)


Nepal (E-Governance Master Plan of Nepal; E-Governance in Local Government of Nepal;
Nagarik App)
India G\fICNET - Role of Nationwide Networking in E-Governance; Collectorate 2000;
Computer-aided Administration of Registration Department (CARD); Smart Nagarpalika -
Computerization of Urban Local Bodies (Municipalities); National Reservoir Levei and
Capacity Monitoring System; Computerization in Andra Pradesh State Trading
Ekal Seva Kendra; Sachivalaya Vahini or E-Governance Secretariat;
Judiciary; E-I(hazanafor Govemment Treasury, Andhra Pradesh; S

of Director General for Foreign Trade (DGFT); PRAJA - Rural e-S

w ?M 20
Paradigm in Citizen Services; E-Panchayat (Electronic Knowledge Based Panchayat); General
Information Services of National Informatics Centre)
Other Countries (E-Govemance initiative in USA; E-Governance Case Study in China -
Beijing Business E-Park; Brazil's Poupatempo or 'Time Saver' Centres; Sri Lanka -
Kothamale Community Radio Intemet Project)

Recommended Books:
4. E-Govemance: Concepts and Case Studies, C.S.R. Prabhu, Second Edition, PHI Learning,
2012.
5. Strategic Planning and Implementation of E-Governance, P.K.Suri and Sushil, Springer,
2019.
6. A Study of the Practice of E-govemance in the Developing Countries: A Qualitative
Approach In Measuring The Maturity of E-government, Kazi Hassan Robin and Md.
Mahmudul Hasan Rafee, 2012.
7. Implementing and managing e-Government, Richard Heeks, 2006.
Teaching Methods:
The teaching faculties are expected to create environment where students can update and
upgrade themselves with the current scenario of computing and information technology with
the help of topics listed in the syllabus. The general teaching pedagogy that can be followed by
teaching faculties for this course includes class lectures, tutorials, group discussions, case
studies, guest lectures, research work, project work, assignments (Theoretical and Practical),
and written and verbal examinations.

Evaluation
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
20 20 (3 Hrs.) 60 (3 Hrs.)

,[b;@4^
.;-{_
--/ '"r*,t
I :ie\
" ,3.

ffii'li.ffi

21.
t
t
Course Name: Artificial Intelligence (3 Cr.)
Course Code: CACS410
Year/Semester: IV/VII
Class Load: 5 Hrs. / Week (Theory: 3Hrs. practical: 2 FIrs.)

Course Description: The course introduces basics of artificial intelligent. It covers fundamental
concepts artificial intelligence, problem solving" hrrowledge representation, neural networks,
machine learning, natural language processing, machine vision and expert systems.

Objective:
The objective of this course is to introdlice the basic princ,iples, techniques, and applications
of
Artificial Intelligence. upon the completion students will be able to:
' Gain fundamental concepts of principles of AI toward problem solving, inference,
perception, knowledge representation, and Iearning.
r Investigate applications of AI techniques in experl systems, artifrcial neural networks and
other machine learning models.

Course Contents:

UNIT 1: INTRODUCTION
[6 Hrs.]
1.1 intelligence. Intelligent behavior, Artificial Intelligence, Understanding AI
baied on
thought process and behavior, Hard vs. Strong AI. So1't vs. weali AI
1.2 Foundations of AI
1.3 Applications of AI
1'4 Intelligent Agents: Introduction of agents, Structure of Intelligent agent, properties
of
Intelligent Agents,PEAS description of Agents, I'ypes of Agents: Simple Reflexive,
Model Based, Goal Based, Utility Basecl, Learning agent, Environment Types:
Deterministic, Stochastic, Static, Dynamic, Observablc, Semi-observable, Single Agent,
Multi Agent

UNIT 2:PRollLEM SOLVING METHODS [t2Hrs.]


2.1Definition of a Problem, Problem as a state space representation, Problem formulation,
Well-deflned problems,Constraint satislaction problem. Water jug problem,N-eleen
problem. Cry,ptarithmetic problem. Graph coloring pr.oblem
2.2 Problem solving by searching, t)'pes o1' scarching. MeasLrring problem solving
performance, General State Space Search
2.3 Uninformed:Breadth-First Search, Depth-First Search,Depth-Limited
Search, Iterative
Deepening depth first Search, Bidirectional Search" Using uninformed search
techniques
for solving N-Queens Problem, puzzle problem etc.
2.4 Infburecl search:Greedy Best-First Search.A Search, Optimality, of A*,
'' Local search:
FIil1 Climbing. Simulated Annealing, lJsing infbrmccl search techniques for solving
N-
Queens Problem, Puzzle problem etc.

i-r !,.'=', It \
*\.,.
E,j
/'!;fd'. .'
s .qgt.-, ,i:.i.
,t; "qh ,' :''
Y:" -*
+rt^
% ,r,-" Bh\
rS* rYi>-r.-'.-.
-/}\ tirrj

S 'qry';. . '
PFrqqd(
2.5 Game Playing, Optimal Decisions in Games, Alpha - Beta Pruning, Minimax Algorithm,
Tic-Tac -Toe Problem, Stochastic Games

UNIT 3: I(NOWLEDGE REPRESENT;\TION AND REASONING[15IIrs.]


3.1 Definition and importance of Knowledge, Issues in I(nou,ledge Representation,
Iftror,i'ledge Representation Systems. Properties of Knowledge Representation Systems,
Types of Knowledge, The Role of Knowledge
3.2 Knou,ledge representation techniques: Rule Based, Semantic Nets. Frames, Logic based
3.3 Propositional Logic, Syntax and Semantic of propositional logic,Proof by Resolution,
Conjunctive Normal Form (CNF). Resolution Algorithm,Limitations of Propositional
Logic. Forward and Backward Chaining
3.4 Predicate Logic, FOPL, Syntax. Semantics. Qr"rantification. horn clauses, Inference w th
FOPL: B,v converling into PL (Existcntial ar.rc'l uni'n'ersal instantiation). Rules of inference,
Unification and lifting, CNF for FOPI-, inf.erence r-rsing resolution. Resolution Refutation
System (RRS)
3.5Handling Uncertain Knowledge. I{adom Variablcs. Prior zrnd Posterior Probability,
Inlerence using Full Joint Distributiorl, llerycs' Rr-r1e and its use, Bayesian Networks,
Reasoning in Bayesian Netu,orks

UNIT 4: LEAITNING [4 Hrs.]


4.1 Concepts ofmachine learning
4.2 Rote learning, learning by analogy, inductive learning, Explanation based learning,
Supervised and unsupervised leaming.learning b-v evolution (genetic algorithm)

UNIT 5: NEUILAL NETWORKS AND NATURAL LANGUAGE PROCESSING [7Hrs.]


5.1 Intlodr-rction to artificial neural network,Mathematical model o1'neural network, types of
neltral netr,vork: feed-forward, feed-back,Gate realization using neural network, Learning
in neural netr,vorks: Back plopagation aigorithm,l{opfie1cl netrvork, Boltzmann machines
5.2 Concepts of natural language understanding and natr:ral language generation, Steps in
natural language processing, Syntax zuralysis, Sentantic anerI1,'sis, Pragmatic analysis

UNIT 6: EXPERT SYSTEM AND MACHINE VISION [,1 Hrs.]


6.i Expert System, Architecture olan exper1 systerrr. Srages of expert systems development
6.2 Concept of Machine Vision. Steps of machine vjsion, application of machine

/.?
q rfo{fl
..-+

stftE(
Laborafory work:
Laboratorl"exercises can be conciucted in LISP, PRol.oG
or.rnv other-high level programming
language' Laboratory exercises must cover theconcepts
ol ruie basecl intelligent agents, inference
and reasoning.searcir techniques, neural networks.
etc.for solving practical problems.

Reference Books:
1' Stuart Russel and Peter Norvig, Artifrcial lntelligence A
Mociern Approach, pearson
2' E' Rich' K. Knight, Shivashankar R. Nair, Artificial Inteiligence.
Tata McGraw Hill.
3' Geolge F' Luger, Artificial Intelligence: Struotures ancl Strategies fbr Complex problem
Solving, Benj amin/Cummings pubiication
4' D' W' Patterson, Artificial Intelligence and Expert Systerns, preltice
Hall.
5. P. H. Winston, Artificial Intelligence, Addison Wesie\,.

s-
*d
flre
Course Title: Operational Research (3 Cr.)
Course Code: CAOR451
YearlSemester: MWII
Class Load: 4Hrs. /Week (Theory: 3 Hrs. Tutorial: I Hrs)

Course Description
Operations Research is the study of scientific approaches to decision-making. Through mathematical
modeling, it seeks to design, improve and operate complex systems in the best possible way. The
mathematical tools used forthe solution of such models are either deterministic or stochastic, depending
on the nature of the system modeled. In addition, the course will learn very powerful modeling and
solution techniques for decision-making problems that are used today by many successful companies
to help them save/earn millions of dollars. The module covers topics that include: linear programming,
transportation, assignment, inventory control, replacement theory and game theory. Analytic techniques
and computer packages will be used to solve problems facing business managers in decision
environments

Course Objectives
The general objectives of this course to provide a broad orientation of the field of optimization, with
emphasis on basic theory and methods for continuous and discrete optimization problems in finite
dimension, and it also gives some insight into its use for analyzingpractical optimization problems.

Unit 1: Introduction to Operations Research 5


hrs.
Introduction, History of Operations Research, Stages of Development of Operations Research
Relationship between Manager and OR Specialist, OR Tools and Techniques, Applications of
Operations Research, Limitations of Operations Research
Unit 2: Linear Programming Problem 10
hrs.
lntroduction to Linear Programming, Linear Programming Problem Formulation, Formulation with
Different Types of Constraints, Graphical Analysis of Linear Programming, Graphical Linear
Programming Solution, Multiple Optimal Solutions, Unbounded Solution,Infeasible Solution, Basics
of Simplex Method, Simplex Method Computation, Simplex Method with More Than Two Variables,
Primal and Dual Problems, Economic Interpretation
Unit 3: Transportation and Assignment Problem 8
hrs"
Transportation Problems definition, linear form, Solution methods: North West corner method, least
cost method, Vogel's approximation method. Degeneracy in transportation, Modified Distribution
method, unbalanced problems and profit maximization problems. Transshipment Problems.
Assignment Problem Structure and Solution: Short-Cut Method (Hungarian Method), Unbalanced
Assignment Problem, Infeasible Assignment Problem, Maximization in an Assignment Problem,
Crew Assignment Problem.
Unit 4: Queuing Theory 6
hrs.
Basis of Queuing theory, elements of queuing theory , Kendall's Notation, Operating of
a queuing system, Classification of Queuing models.

25
Unit 5: Inventory Control 6
hrs.
Inventory classification, Different cost associated to Inventory, Economic order quantity, Inventory
models with deterministic demands, ABC analysis.
Unit 6: Replacement theory 6
hrs. Introduction, Replacement of capital equipment which depreciated with time, replacement by
alternative equipment, Group and individual replacement policy
Unit 7: Game Theory 7
hrs.
Introduction, Characteristics of Game Theory, Two Person, Zero sum gulmes, pure strategy. Dominance
theory, Mixed strategies (2x2,mx2), Algebraic and graphical methods
Teaching Methods
The general teaehing pedagogy includes class lecfures, presentations, group works, case
studies, guest lecturers research works, project works, assignments (Theoretical and Practical).

The teaching faculty will determine the shoice of teaching pedagogy and encouraged to select

software tools as per the requirements of topics for practical activities.

References/ Suggested Readings:


Hillier, F"S"& Lieberman, G.J. (1995). Introduction to Operations Research,Ttr edition.
The McGraw-Hill Companies, Inc.
Natarajan, A. M.; Balasubramani, P. & Tamilarasi, A. (2007). Operations Research.
Pearson Education Inc.
Sharm4 J.K. (2009). Operational Research: Theory and Application. Macmillan
Publishers India Ltd.
Taha H.A. (2017). Operations Research: A tntroduction, 10th edition, Global edition,
Pearson Education, Inc. Pearson Prentice Hall.
Wagner, H. N. (2003). Operations Research by, Prentice hall. N D Vohra Tata McGraw-
Hill.
Winston, L.W. (2004). Operations Research: Applications and Algorithms, lndian
University, 4th edition.
Evaluation
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
40 60 100

'r:ry

q
26
Course Title: Project III (6 Cr.)
Course Code: CACS452
Year/Semester: IV/VIII
Class Load: Hrs.Aileek (Practical: 12 Hrs.)

Course Description: This final year project is a practical course where students are expected
to implement the concepts learnt during four years of their study so as to build a system. The
course includes realization of project management, software development, and programming
skills.
Course Objectives: The objective ofthis course is to make students able to design and develop
software applications by following appropriate development methodology"

Course Details:
Nature of Project:

Students should develop a complete functioning system. The system should not be limited to
the basic CRUD operations only. Being a final year project, students are highly recommended
to implement appropriate algorithms relevant to the project. The project should include precise
system analysis, design, implementation and result analysis. The students can work in group
of at most two members. The students can choose appropriate language technologies that they
have learnt till eighth semester; however it is not limited. While implementing the project,
students should be able to write their own program modules rather than relying on predefined
APIs or Plugins except in some unavoidable circumstances.

Phases ofProject:

The following are the phases of project work:

4- Proposal Submission: Students must submit and present project proposal after 3rd
week of start of the eighth semester.

5 Mid-Term: Students must submit progress report and defend midterm progress of their
project work in the l2th week of the eighth semester.

6. Final Submission: Students must submit and orally defend the project work during last
week of the eight semester but before final board examination. Students must have to
submit the project final report to their respective department before at least ten days of
final defense date" The report should be submitted in standard format as prescribed. The
hard/soft copy of report should be made available to the external expert before a week
of presentation date. The final presentation should be followed by the demonstration
session, where students have to demonstrate the project" A viva voice will be conducted
by evaluation committee.

Provision of Supervision:

There should be a regular faculty of the campuslcollege assigned as a supervisor . The of


supervisor is to guide the students throughout the project and provide constructive
A supervisor can supervise at most four groups of the project in a class
should rigorously supervise, monitor and leedback the project groups under
:,! 1... . )

l,

tAt t''"-
-},''
.\ $fl"y**t
Evaluation Scheme:

4. Proposal Defense of l}oh of total marks based on project proposal and its presentation.

5. Midterm of 70%o of total marks based on;


a. Work Done 607o
i.System Analysis and Design
ii.Implementation
iii.Understanding of methods used in project
iv" Ability to work with others
v. Ability to identify problems
vi. Amount of work performed
b. Documentation 107"
i. Report Orgarization
ii" Writing Style
iii. Completeness of Report
iv" Readability
v. Organization and analysis of data and results
6. Final Defense of 2AYo of total marks based on presentation and project demonstration
and viva-voice. Each group member should present about the project followed by the
demonstration of project developed. The project should be ready to run for the demo
session"

The 10 marks of the proposal defense will be evaluated by the research committee formed
by HoD/Coordinator as a part of proposal defense. The 70 marks of the midterm will be
evaluated by the supervisor and internal examiner as a part of midterm defense" Out of the 70
marks, the supervisor will evaluate for 60 marks and intemal examiner will evaluate for 10
marks. The remaining 20 marks of final defense will be evaluated by the external examiner
from the university.

Out of 100 marks, the S0 rnarks (Proposal + Midterm Evaluatiau) will be considered as internal
assessment while the20 marks Ginal Defense) will be considered as external assessment" Each
student in the project should get passed in each of the internal and extemal assessments
individually. Any student failing to pass each of the assessments will be considered as fail.

The evaluation committee and evaluation criteria should be as follow;

c. Evaluation committee
- Project Supervisor
- HoD/Coordinator
- Internal Examiner (Regular Faculty)
- External Examiner 4,
\r" "tt,T.
,' --r::'l fl
d. Focus of the evaluation "1
-';':' i-':' -"

- Presentation Skills
- ProjectDemonstration -"fl-h"ffi*s
$, "! *ib -S
- Project Report
- VivaiQuestion Answer
- Level of Work and Understandino ccK
I
l*24
---' 28
Teamwork and Contribution

Report Contents:
4. Prescribed content flow for the project proposal
1.Introduction
2. Problem Statement
3. Objectives
4. Methodology
a. Requirement Identification
i. Study of Existing System
ii. Literature Review
iii. Requirement Analysis
b" Feasibility Study
i. Technical
ii. Operational
iii. Economic
c. High Level Design of System (Methodology of the
proposed system/ Flow Chart/ Working Mechanism of Proposed System
/ Description of Algorithms )
5. Gantt Chart (showing the project timeline)
6. Expected Outcome'
7. References

5. Prescribed content flow for the project report

11. Cover & Title Page


12. Certifrcate Page
iv. Supervisor Recommendation
v. Intemal and External Examiners' Approval Letter
13. Acknowledgement
14. Abstract Page
15. Table of Contents
16" List of Abbreviations, List of Figures, List of Tables, List of Abbreviations
17. Main Report
18. References
19. Bibliography (if any)
20. Appendices (Screen Shots/ Source Codes)

6" Prescribed chapters in the main report

6. Chapter 1: Introduction
6.1. Introduction
6.2. Problem Statement
6.3. Objectives .4 -fl
6.4. Scope and Limitation
yro
6.5. Development Methodology
6.6. Report Organization

7. Chapter 2: Background Study and Review

f"W 29
7.1. Background Study (Description of fundamental theories, general concepts and
terminologies related to the project)
7.2. Literattxe Review (Review of the similar projects, theories and results by other
' researchers)

8. Chapter 3: System Analysis and Design


8.1. System Analysis
8.1.1. Requirement Analysis.
i. Functional Requirements (Illustrated using use case diagram and
use case descriptions)
ii. Non Functional Requirements
8.1 "2. Feasibility Analysis
i.Technical
ii.Operational
iii.Economic
iv. Schedule
8.1.3. Object Modelling using Class and Object Diagrams
8.1.4. Dynamic Modelling using State and Sequence Diagrams
8.1.5. Process Modelling using Activity Diagrams
8.2. System Design
8.2.1. Refinement of Class,.Object, State, Sequence and Activity diagrams
8.2.2. Component Diagrams
8.2.3. Deployment Diagrams
8.3. Algorithm Details (if any)

9. Chapter 4: Implementation and Testing


9.1. Implementation
9.1.1. Tools Used (CASE tools, Programming languages, Database platforms)
9.1.2. Implementation Details of Modules (Description of
classe s/proc edures/functions/methods/al gorithms)
9.2. Testing
9"2.1. Test Cases for Unit Testing
9.2.2. Test Cases for System Testing
9.3. Result Analysis

10. Chapter 5: Conclusion and Future Recommendations


10.1. Conclusion
10.2. Future Recommendations

While writing above chapters students should avoid basic definitions. They should relate and
contextualize the above mentioned concepts with their project work.

Citation and Referencing

The listing of references should be listed in the references section. The references contain the
list ofarticles, books, urls, etc. that are cited in the 'The books, articles, and others
that are studied during the study but are not cited can be listed in the
bibliography section. The citation and referencing be IEEE referencing
standard. The text inside the document should be 1e. IEEE referencing
standard can be found in the web. S"
,%
/.bt qiw 30
I

Report Format Standards


G. Page Number

The pages from certificate page to the list of tables/figures/abbreviations/approvals should


be numbered in roman starting from i. The pages from chapter I onwards should be
numbered in numeric starting from 1" The page number should be inserted at bottom, aligned
center.

H. Page Size and Margin


. The paper size must be a page size corresponding to A4. The margins must be set as

Top: l; Bottom: 1; Right: l;Left.1.25


I. Paragraph Style
. A1l paragraphs must be justifred and have spacing of 1.5.

J. Text Font of Document


. The contents in the document should be in Times New Roman font
. The font size in the paragraphs of document should be 12
r. Section Headings
. Font size for the headings should be 16 for chapter headings, 14 for section headings, 12
for sub-section headings" All the headings should be bold faced.
L. Figures and Tables
. Position of figures and tables should be aligned center. The figure caption should be
centred below the figure and table captions should be centred above the table. All the
captions should be of bold face with 12 font size.

Final Report Binding and Submission:

No of Copies: 3 (College Library + Self + Dean Office)

Look and Feel: Golden Embracing with Black Binding

A final approved signed copy of the report should be submiued to the Dean Office, Exam
Section, FOHSS.

Teachins Methqds:

The major teaching methods that can be followed for this course includes class lectures,
laboratory activity, group discussions, presentations,.and demonstrations.
Evaluation
Examination Scheme
Internal Assessment External Assessment Total
Proposal Midterm "&
Defence Defence
, ,FinalsDefence
"-r '.- d'r'" r/
S;;"' ::

10 70 20 100

@ ryM 31
I

Elective Courses
Course Title: Database Programming
Course Code: CACS453
Year/Semester : IV/VIII
Class Load:6 Hrs. /Week (Theory: 3Hrs, Practical3Hrs.)

Course Description
This course provides the comprehensive knowledge about database programming in relational
database management system, which encompasses with overview of fundamental SQL
statement, PL/SQL Block, Exception, Cursors, Record, Triggers, Procedures, Funetions and
Packages

Objectives: The general objectives of this course is to enhance advance programming skills
in relational database management system.

Unit -1
Introduction of RDBMS 10 Hrs
Overview of the Oracle Database Architecture, Familiar with SQL*Plus, SQL*Plus
Commands (DESCRIBE, LIST, APPEND, CHANGE, INPUT, DEL, CLEAR BUFFER,
Using Script Files), Acceping Vdues at Runtime, Overview of Fundamental SQL
Fundamental Command (DDL, DML, DCL, Join and Subquery)

Unit -2
PLlSQL 13 Hrs
PL/SQL Concepts, Architecture, Block structure, Executing PLiSQL Script,
DBMS-OUTPUT.PUT-LINE Statement, substitution Variable ftature, PL/SQL Language
fundamentals, DML Statement in PLISQL, Transaction Control in PLISQL. Conditional
Control (if, nested if, Case), Repetitive Control (While, for, simple loop, Nested, continue, loop
label)

Unit -3 5 Hrs
PL/SQL Exception
Exception scope, user-defined exception, exception propagation, advance exception concepts
(RATSE_APPLrCATrON_ERRO& EXCEPTTON_rNrT)

Unit -4
Database Cursors 5 Hrs
Types of cursors, cursor loop, Nested cursors cursor for loops, parameterized cursors, Nested
cursors

Unit -5
I)atabase Triggers 5 Hrs
Database Triggers BEFORE, AFTER Triggers, row and statement triggers, INSTEAD OF
triggers

Unit -6
Record and procedures 5 Hrs
Record (Record types, Nested record) Procedure (Block structure, Anonymous
procedure, IN, OUT parameters in Procedure)
Unit-7 ,1 .

frz ;i ".
&&-**-a
Functions and Package 5 Hrs
Functions (creating and invoking function and optimizing function in execution, creating
packages, extending the package, package instantiation and initialization,

Laboratory Works
Laboratory works should be done covering all the topics listed above and a small work should
be carried out using the concept learnt in each unit in individual or group"

Teachins Methods
The general teaching pedagogy includes class lectures, group discussions, case studies, guest
lectures, research work, project work, assignments (theoretical and practical), and
examinations (written and verbal), depending upon the nature of the topics. The teaching
faculty will determine the choice of teaching pedagogy as per the need of the topics.

References
l. Benjamin Rosenzweig, E. R. (2015). Oracle PL/SQL by Example. New Yourk: Prentice
Hall.
2" Gupta, S. K. (2016). Advanced Oracle PL/SQL Developer's Guide . Birmingham: Packl
Publishing.
3. Lex de Haan, T. G. (2014). Beginning Oracle SQL. Apress.
.4" Mclaughliq M. (2014). Oracle Database 12c PLISQL Programming. New Delhi: !
McGrawHill Education.

'i .-

% ryr@t
#rfts

33
Course Title: Geographical Information System (3 Cr.)
Course Code: CACS454
Year/Semester: IVA/III
Class Load: 5 Hrs. / Week (Theory: 3Hrs. Practical: 2 Hrs.)
Course Description
This course offers detailed knowledge as well as practical skills on GIS theory, design and
implementation. It includes introduction, GIS and Map, GIS data sorlrces and structures, spatial
data analysis, GIS data modeling and creating map apart from this this encourages to students
to develop a real time basic GIS project.
Course obiectives
The general objectives of this course are to provide theoretical knowledge as well as practical
skills of geographical information system to make students capable of capturing,analyzing and
visualize real world data.
Course Contents
Unit 1: Introduction 6 Hrs.
1.1 Definition, functions and Applications of GIS
1.2 Components of GIS
1.3 GIS as Information System
1.4 Nature & Sources of GIS data
1.5 Recent trends and future of GIS
lJnit2i GIS and Map 8 Hrs.
2.1l:|1.ap and their characteristics
2.2Mapping concept and Techniques
2.3 Map Projection
Unit 3: GIS data Sources & Structures L2 Hrs.
3.1 Capturing GIS data
3.2 Sources: Maps, GPS, Images and Databases
3.3 Structures: Vector, Raster and TIN data structures
3.4 GIS data modeling
3.5 GIS database design
Unit 4: Spatial Data Modeling and Analysis 12 Hrs.
4.1 Spatial data modeling
4.2 Y ector based analysis
4.3 Raster based analysis
Unit 5: GIS data modeling & Creating Maps 10 Hrs.
5.1 Surface modeling
5.2 Hydrology modeling
5.3 Designing and printing the map \

{n {-"tr L@ 34
Laboratory Works
Sluaents sfro"ta aerrelop basic GIS project implementing the concepts given in course of study
and may add more (if required).
Teachins Methods
The teaching faculties are expected to create environment where students can update and
upgrade themselves with the current scenario of computing and information technology with
the help of topics listed in the syllabus. The general teaching pedagogy that can be followed by
teaching faculties for this course includes class lectures, laboratory activity, group discussions,
case studies, guest lectures, research work, project work, assignments (Theoretical and
Practical), and wdtten and verbal examinations.

Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
20 20 (3 Hrs.) 60 (3 Hrs.)

Reference Books
1. Kang-tsung Chang, (2010). "Introduction to Geographic Information Systems" Tata
McGraw Hill, New Delhi.
2. C.P.Lo and Albert K.W.Yeung (2006)" "Concepts and Techniques of Geographic
Inforrnation Systems" Prentice Hall of India, New Delhi.
3. Albert, C.T.L. and Yeung, K.V/. (2002). "Concbpts and Techniques of Geographical
Information Systems", New Delhi: Prentice Hall.
4. Chakraborty, D. and Sahoo, R.N. (2007)" Fundamentals of GIS. India: Viva Books.
5. ESRI guide to GIS analysis Andy Mitchell, ESRI press, Red lands
m== {4,
'/,4/):a4 4"-
''r" "'Y
--v&
'4*
-#id .,.h

"?ffis(

35
Course Title: Data Analysis and Visualization (3 Cr.)
Course Code: CACS455
Year/Semester: IV/VII
Class Load: 5 Hrs. / Week (Theory: 3Hrs" Practical: 2Hrs.)

Course Description
This course introduces to extend student's knowledge and practice in data analysis and
visualization, software, and applications. It provides the board overview of techniques of the
visualization process, detailed view of visual perception, the visualized data and the actual
visualization, interaction and distorting techniques.
Course obiectives
Upon completion of this course, students should be able to 1. Explain the concept of
visualization in the processing and analysis of data. 2. Develop visualization methods and
visualization systems using software applications. 3. Perform creative work in the field of
visualization.
Course Contents
Hours
Unit 1: Introduction to visualization
Introduction of visual perception, Visual representation of data" Data
Abstraction, Visual Encodings, Use of Color, Percepfual Issues,Information 6
overloads

Unit 2: Creating visual representations


Visualization reference model, Visual mapping, Visual analyics, Design of 7
Visualization applications.

Unit 3: Non spatial data visualization


Visualization of one, two and multi-dimensional data, Tabular data,
quantitative values (scatter plot), Separate, Order, and Align (Bar, staked
Bar, dots and line charts), Tree data, Displaying Hierarchical Structures,
graph dat4 rules for graph drawing and labeling, text and document data,
15
levels of text representation, visualizations of a single text document, word
cloud, flow data
Time series data, characteristics of time data, visualizattotttime series data,
mapping of time

Unit 4: Spatial Data Visualization


Scalar fields, Isocontours (Topographic Terrain Maps), scalar volumes,
Direct Volume Rendering(Multidimensional Transfer Functions), Maps
10
(dot, pixel ), vector fields
Defining Marks and Channels

Unit 5: Software tools and data for visualization


The iris data set, The Detroit Data Set, The Breakfast Cereal Data Set,
Dow Jones Industrial Average Data Set (time series), MS
Python, Matlab, Java, Tableau 10
.A

Evaluation
%
Evaluation Scheme

36
Intemal
External Assessment
Practical Total
Practical
20 20 Hrs. 60 Hrs. 100

Laboratory Work
Laboratory work should be done
covering-all the topics listed above
and a small project work
##,:nffi:i out using trr" .oo."pireamt i, ir,i,
;;;" using any one software tools
Text Books:
3 " Fry, visuar izne.Data-
o'Reilly Medi* 200',ISBN a5g65 r 45
4" yff;,,Information visualization: perception s7
for Design, 3rd ed. Morgan Kaufmann,

Reference Books:
5' principles and practice.
ff*?r?#?.visualization: A. K. peters, Ltd,,2a07, ISBN

.;d,

"-;'li'

eki.
'sjq
Course Title: Machine Learning (3 Cr.)
Course Code: CACS456
Year/Semester: IV/VII
Class Load: 6 Hrs. / Week (Theory: 3Hrs. Practical: 3Hrs.)

Course Description
This course presents comprehensive introduction to several topics on basic concepts and
techniques of Machine Learning (ML). It also explores the understanding of the Supervised
and unsupervised learning techniques, probability based learning techniques, performance
evaluation of ML algorithms and applications of ML.
Course obiectives
Upon completion of this course, students should be able to 1. Explain the concept of supervised,
unsupervised and semi-supervised learning. 2. Develop algorithms to learn linear and non-
linear models using software. 3. Perform creative work in the field machine learning to solve
given problem.
Course Contents
Hours
Unit 1: Introduction to machine learning
History of machine leaming, Brain-neuron learning system, Definition and
types of learning, need of machine learning, Data and tools, review of
statistics, training, validation and test data, theory of leaming - feasibility of .10
learning - error and noise - training versus testing, generalization bound -
approximation-generalizationtradeoff - bias and variance - learning curve

Unit 2 Introduction to Supervised Learning


Classification problems, Linear Regression- Predicting numerical value,
Finding best fit line with linear regression, Perceptron, learning neural
networks structures, Decision tree representation, appropriate problems for
decision tree leaming, basic decision tree algorithm, support vector l1
machines, Separating data with maximum margin, Finding the maximum
margin,

Unit 3: Bayesian and instance based learning


Probability theory and Bayes rule. Classifying with Bayes decision theory,
11
Conditional Probability, Bayesian Belief Network, K-nearest neighbor

Unit 4:Introduction to un-supervised learning and dimensionality


reduction
Introduction to clustering, K- Mean clustering, different distance functions
10
for clustering, Hierarchieal clustering, Supervised learning after clustering,
dimensionality reduction techniques, Principal component analysis

Unit 5: Measures for Performance Evaluation of ML algorithms


Classification accuracy, Confusion matrix Misclassification costs,
Sensitivity and specificity, ROC curve, Recall and precision, box ploij'
confidence interval

Evaluation
q
Evaluation
;l
:l
fr_t
"q\ 38
Internal Assessment External Assessment Total
Theory Practical Theory Practical
100
20 20 (3 Hrs.) 60 (3 Hrs.)

Laboratory Work
Laboratory work should be done covering all the topics listed above and a small project work
should be carried out using the concept learnt in this course using software like matlab, python.
Text Books:
1. Tom M Mitchell, Machine Leaming, First Edition, McGraw Hill Education,2Al3.
2. Stephen Marsland, Machine Learning - An Algorithmic Perspective, Second Edition,
Chapman and Hall/CRC Machine Learning and Pattem Recognition Series, 2014.

Reference Books:
3. Peter Flach, Machine Leaming: The Art and Science of Algorithms that Make Sense
of Data, First Edition, Cambridge University Press, 2012-

%
"h' q,?xr*#qn
ffiiry

39
Course Title: Multimedia System
Course Code: CACS457
Year/Semester: MVIII
Class Load: 5 Hrs. / Week (Theory: 3flrs. Practical: 2 Hrs.)
CourspleserrBltqq
This course offers detailed concept and structure of Multimedia system. It includes introduction,
Sound & Audio System,Images and Graphics, Video and Animation, Data Compression,
Abstractions for programming , Multimedia design and applications . It does not entirely focus on
theoretical concept but also strongly focuses on practical skill based learning
Course obiectives
The general objectives of this course are to provide theoretical as well as practical knowledge
of Multimedia System, applications and tools to make students capable of implementing,
managing and developing the issues of multimedia application in their personal as well
professional life.
Course Contents
Unit 1: Introduction (6 Hrs)
1.1 Multimedia and its applications
1.2 Global structure of Multirnedia
1.3 Medium
1.4 Multimedia system and properties
1.5 Characteristics of a Multime.dia system
1.6 Challenges for Multimedia Systems
1.7 Components of Multimedia System
1.8 Multimedia building blocks
1.9 Scope of Multimedia

Unit 2: Sound / Audio System (5Hrs)


2.1 Overview sound system
2.2 Producing digital audio
2.2 Music and speech
2.3 Speech Generation
2.4 Speech Analysis
2.5 Speech Transmission
2.6 Representation of audio files
2.7 Computer IVIusic -MIDI
\z.g MIDI versus Digital Audio

3: Images and Graphics (5 Hrs)


I Uses of images and Graphics
J Image Representation
3.3 Image and graphics Format
3.4 Working with image and graphics
3.5 Image Synthesis , analysis and Transmission

Unit 4: Yideo and Animation (6


4.l DigitalVideo
4.2 Yideo signal representation
4.3 Computer Video Format
4.4 Computer- Based animation
4.5 Animation Language

#E
4.6 Timeline and ftame based animation
4.7 Timeline and Tween-Based animation

h,^a*w*,s 40
4.8 Methods of controlling Animation
4.9 Display of Animation
4.10 Transmission of Animation
Unit 5: Data Compression (8 Hrs)
5.1 Need for Data Compression
5.2 Compression Basics
5.3 Storage Space
5.4 Coding Requirements
5.5 Lossless and Lossy Compression techniques
5.6 Source, Entropy and Hybrid Coding
5.7 Lossy Sequential DCT- based Mode
5"8 Expanded Lossy DCT-based Mode
5"9 JPEG and MPEG Compression

Unit 6: Abstractions for programming (6 Hrs)


6"1 Abstractions Levels
6.2 Libraries
6.3 System Software
6.4 Toolkits
6.5 Higher Programming Languages
6.6 Object -oriented approaches

Unit 7: Multimedia design ( 6 Hrs)


7.1 Development phases and development teams
7.2 Analysis phase
7.3 Design Phase
7.4 Development phase
7.5 Implementation Phase
T.6Evalaation and testing phase
7.7 Multimedia User Interface Design

Unit 8 : Multimedia Application (6 Hrs)


8.1 Media preparation and composition
8.2 Media integration and communication
8.2 Media Entertainment
8.4 Telemedicine
8"5 EJearning
8.6 Digital video editing and production systems
8.7 Video conferencing
8.8 Video-on-demand

Laboratory Works
Labs consist of at least 8 practical experiments and two assignments covering the topics of the
syllabus"
"'4at
Teaching Methods
The teaching faculties are expected to create environment where students can
upgrade themselves with the current scenario of computing and
,,lfu
with the help of topics listed in the syllabus. The general teaching pedagogy be .dY
-{lA
"#..
Evaluation
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
20 20 (3 Hrs.) 60 (3 Hrs.)

Text Books
1. Ralf Steinmetzand KlaraNahrstedt, Multimedia: Computing, Communications and
Applications, Pearson Education Asia
2. John F. Koegel Buford , Multimedia Systems, Pearson Education Asia

Reference Books
1. Fred Halsall , Multimedia Communications, Applications, Networks, Protocols and Standards,
Pearson Education Asia
2" Ralf Steinmetz and Klara Nahrstedt, Multimedia fundamentals, Pearson Education Asia

@d
&"B

42
Course Title: Knowledge Engineering (3 Cr.)
Course Code: CACS458
Year/Semester: IY/VII
Class Load: 5 Hrs. / Week (Theory: 3Hrs. Practical: 2 Hrs.)
Course Description
This course offers detailed concept about knowledge representation, logic, reasoning and
principles. It includes introduction, knowledge acquisition, knowledge representation and
reasoning. It does not entirely focus on th.eoretical concept but also strongly focuses on
practical skill based learning.
Course obiectives
The general objectives of this course are to provide theoretical as well as practical knowledge
of knowledge engineering to make students capable of analysis, desigq implementing and
managing of knowledge engineering in their personal as well professional life.
Course Contents
Unit 1: Introduction [6 Hrs.l
1.1 Overview of data" Information and knowledge
1.2 Knowledge engineering and Knowledge management
1.3 Artiflcial intelligence use in knowledge Engineering
1.4 Knowledge based system and its applications

Unit 2: Knowledge Acquisition [8 Hrs]


2. 1Information gathering
2.2 lnformation retrieval
2.3 Applications of Natural Language processing
2.3.1 Morphology, lexicon, syntax and semantics
2.3.2Parsing, POS tagging, named entity tagging

Unit3: Machine Learning [12 Hrs]


3.1 Machine Learning and its applications
3.2 Supervised and unsupervised learning
3.3 Classification and clustering
3.4 Classifi cation algorithms
3 .4.1 Linear classifi ers
3.4.2 nearest neighbor
3.4.3 Support Vector Machines
3.4.4 Decision tree
3.4.5 Random forest
3.4.6 Neural networks
3.4.7 Case based reasoning

Unit 4: Knowledge representation and reasoning [7Hrs]


4.1 Proposition logic, predicate logic and reasoning

q
4.2 Knowledge representation languages
4.3 Non-monotonic reasoning
4.4 Probabilistic reasoning
qr'tts*p"ffi
Unit 5: Ontology Engineering [6 Hrsl '\Hq !

5.1 Overview to Ontology q'^n ."fi.


5.2 Classifications of ontology
5.3 Methodology use in Ontology
p,Y
frx-.Paa. 43
5.4 Ontology VS Language

Unit 6: Knowledge Sharing [9 Hrs]


6.1 Information Distribution and Integration
6.2 Semantic web and its applications
6.2.i RDF and linked data
6.2.2 D escription logic
6.2.3Web Ontology language
6.3 Social web and semantics

Laboratory Works
The practical work consists of all features of knowledge engineering and case studies.

Teaching Methods
The teaching faculties are expected to create environment where students can update and
upgrade themselves with the current scenario of computing and information technology with
the help of topics listed in the syllabus. The general teaching pedagogy that can be followed by
teaching faculties for this course includes class lectures, laboratory activity, group discussions,
case studies, guest lectures, research work, project work, assignments (Theoretical and
Practical), and written and verbal examinations.
Evaluation
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
20 20 (3 Hrs.) 60 (3 Hrs.)

Text Books
3. Kendal, Simon, Creen, Malcolm, An Inkoduction to Knowledge engineering,
Springer first edition, 20A7
4. R.J. Brachman and H.J. Levesque. Knowledge representation and resoning
(Elsevier 2004)

Reference Books
1. Stuart Russell and Peter Norvig, Artificial Intelligence: A modern approach ( Prentice
Hall edition, second edition, 2002)
2. P. Jackson, Introduction to expert systems, Addison Wesley, 1999.
3. John Debenham, Knowledge Engineering: Unifying Knowledge Base
Design, Springer, 1998 ;l' .ii

M".
str*{q

44
Course Title: Information Security (3 Cr.)
Course Code: CACS459
Year/Semester:
Class Load: 6 Hrs. / Week (Theory: 3Hrs. Practical: 3 Hrs.)

Course Description: The course introduces the theoretical as well as practical concepts of
computer and information security" The course includes concepts of cryptographic algorithms,
authentication systems, access controls, malicious logics, network security and security audits.

Course Objectives: The objectives of this corrse are to familiarize the students with the
computer security concepts, security policies and security mechanisms so that students will be
able to design, implement and manage the secure computer systems.

Course Contents:
Unit I: Overview of Computer security (4 Hrs)
1.1. Computer Security Concepts
1.2. Computer Security, Information Security, Network Security
1.3. Threats, Attacks and Assets
1.4. Security Requirements
1.5. Seeurity Design Principles
1.6. Attack Surfaces and Attack Trees
1.7. Computer Security Strategy

Unit II: Cryptographic Algorithms (12 Hrs)


2.1. Classical Cryptosystems: Ceasar, Vignere, Playfair, Rail Fence Ciphers
2.2" Modern Ciphers: Block vs. Stream Ciphers, Symmetric vs. Asymmetric Ciphers
2.3. Symmetric Encryption: Fiestel Cipher Structure, Data Encryption Standards (DES), Basic
Concepts of Fields: Groups, Rings, Fields, Modular Arithmetic, Galois Fields,
Polynomial Arithmetic, Advanced Encryption Standards (AE S )
2.4. Number Theory: Prime Numbers, Fermat's Theorem, Primility Testing: Miller-Rabin
Algorithm, Euclidean Theorem, Extended Euclidean Theorem, Euler Totient Function
2.5" Asymmetric Encryption: Diffie-Helman Key Exchange, RSA Algorithm

Unit III: Message Authentication and Hash Functions (6 Hrs)


3.1. Message Authentication
3.2. Hash Functions
3.3. Message Digests: MD4 and MD5
3.4. Secure Hash Algorithms: SHA-I
3.5" HMAC
3.6. Digital Signatures

Unit IY: User Authentication (5 Hrs)


4.1. User Authentication Principles
4.2. Password-Based Authentication
4.3. Token-Based Authentication
4.4. Biometric Authentication
4.5. Remote User Authentication
4.6. Two Factor Authentication
\ vii dr"T
Unit Y: Access Control (5 Hrs) .,4
vE-l\
W)
".:1
--1

:, U ^: l.-;iiYd'
,['j'?fih..i. 'r k
--g /fiYYJ*,:.,:
aaau,ftr6d i A.
4\
ty 45
5.1. Access Control Principles
5.2. Subjects, Objects and Access Rights
5"3" Access Control Matrix and Capability Lists
5.4. Discretionary Access Control
5.5. Role Based Access Control
5"6. Attribute Based Access Control
5.7. Identity, Credential and Access Management
5.8. Trust Frameworks

Unit VI: Malicious Soffware and Intrusion (4 Hrs)


6.1. Malicious Software
6"2. Virus and its phases, Virus Classification
6"3. Worm, Worm Propagation Model, State of Worm Technology
6"4. Trojan Horse
6.5. Intrusion and Intruders
6"6. Intrusion Detection System
6"7. Analysis Approaches: Anomaly Based, Signature Based
6.8. Honeypots

Unit YII:Network Security (5 Hrs)


7.1. Overview ofNetwork Security
7.2.Email Security: SAIIIME, Pretty Good Privacy (PGP)
7.3. Secure Socket Layer (SSL) and Transport Layer Security (TLS)
7 "4.1P Security (IPSec)
7.5. Firewalls and their types

Unit VIII: Security Auditing (7 Hrs)


8.1. Security Audit
8.2. Security Auditing Architecture
8.3. Security Audit Trail
8.4. Implementing Logging Function
8"5. Audit Trail Analysis

Laboratory Works:
The laboratory work includes implementing and simulating the concepts of cryptographic
algorithms, hash functions, digital signatures, authentication & authorization systems, ffid
malicious logics. The laboratory work covers implementing programs for following;
- Classical ciphers like Caeser, Playfair, Railfence
-
DES, AES
-
Primality Testing, Euclidean Algorithm, RSA
-
MD5, SHA
-
Authentication systems like password based, Captcha, two factor authentication etc.
-
Role Based Access Controls
-
Malicious Logics
Teaching Methods

The major teaching methods that can be followed for this course lectures,
laboratory activity, group discussions, presentations and case studies. work,
the instructor can choose any programming language based on comfort of
Evaluation
/"W 46
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
2A 20 (3 Hrs.) 60 (3 Hrs.)

Text Book:
4. William Stallings and Lawrie Brown, Computer Security: Principles and Practice,
Pearson
5. William Stallings, Cryptography and Network Security: Principles and Practice,
Pearson.

Reference Books:
1. Mark Stamp, Information Security: Principles and Practices, Wiley
2" Matt Bishop, Introduction to Computer Security, Addison Wesley
3" Matt Bishop, Computer Security, Art and Science, Addison Wesley
4. Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing, Pearson

tw

47
Course Name: Internet of Things (3 Cr.)
Course Code: CACS460
Year/Semester : IV/V'I[I
Class Load: 5 Hrs. / \Yeek (Theon': 3Hrs. practical: 2 I.Irs.)

Course Description: The course introdr-rces basics of Io'I'. It covers introductions of IoT,
Devices and platfbrm lor deveiopingloT Sr,stems. I)esigri rnethoclology, Data Analytics for IoT,
Servers & Cloud oft'ering and ioT sy'stem securitr,.

Objective:
The objective of this course is to introduce the students about the principles, techniques,
development and applications of IoT 51,stem.

Course Contents:
Unit 1: Introduction to IoT [gHrs.]
l.l Definition and Characteristics of IoT.
I.2 Physical and Logical Design of IoT"
1.3 IoT Enabled Technologies
1.4 IoT and M2M
1.5 Dornain Specific IoTs: Home Automation, Cities, Environment, Fnergy. I{etail, Logistics,
AgricLrlture, Industry, Health and Lifestyle.

Unit 2: Sensor, Actuators and Interfacing [lg I{rs.]


2.1 RolesofSensorsandactuators,Typesofsensors: Activeandpassive,analoganddigital,
Contact and no-contact, Absolute and relative
2.2 Working of sensors: Position, occupancy and motion, r,elocily and acceleration, force, pressure,
flolv. Acoustic, Humidity, light, radiation, temperature, ohentical, biosensor, camera.
2.3 Developntent boards: Arduino and Raspberry pi installation. interfacing ancl programming using
python.

Unit 3: IoT Platlbrm Design Methodology t6 llrs.l


Case Study on IoT System for Weather Monitor

Unit 4: Dat:r and Arralytics for IoT [l0llrs.]


4.i An IntrodLrction to l)ata Analytics for IoT
4.2 Machine Learning
4.3 Big Data Analytics Tools and Technology
4.4 Edge Strearning Anall,tics
4.5 Netrvork Analytics

Unit 5: IoT Physical Servers and Cloud Offering


CloLrd storage models and Communication APIs of IoT Systems
[3FIrs.]
,A\,.
'',
Unit 6: Securing IoT Systems [3Hrs.]
6.1 IoT SecLrrit-v Challenges
6.2 lol'Sy,stern's Security Practices
\
ry,@6

t ./')
,I
tl
4 1t;*t.'t''
{"*#"' "'
,nXo'h.l--
lt']
I":r.-:{

.i-
w
,"i
" t 't&"/"J"L:ia"l?'/i
,./
S'F
' &, L-,-l.ir',i
// '/" "
!i'

.,i t-S
Course Name: Internet of Things (3 Cr.)
Course Code: CACS460
Year/Semester: IVIV'II
Class Load: 5 Hrs. 1\Yeek (Theory.: 3Hrs. Practical: 2 [Irs.)

Course Description: The course introduces basics o1' Io'I'. It covers introductions of IoT,
Devices and platlorm for deveiopinglol' Svstems. Design methoclology. Data Analytics for IoT,
Servers & CloLrd oftbring and IoT svstem securit,v.

0bjective:
The objective of this course is to introduce the students about the principles, techniques,
development and applications of IoT S1,stem.

Course Contents:
Unit l: Introduction to IoT [SHrs.]
l.lDefinition and Characteristics of Io'f.
1.2 Physical and Logical Design of IoT.
1.3 IoT Enabled Technologies
1.4 IoT and M2M
1.5 Domain Specific IoTs: Home Autornation, Cities, Environment, Energy. Retail, Logistics,
AgricLrltLrre. Industry, Health and Lifestyle.

Unit 2: Sensor, Actuators and Interfacing [18 Hrs.]


2.1 Roles of Sensors and actuators, Types of sensors: Active and passive, analog and digital,
Contact and no-contact, Absolute and relative
2.2 Working of sensors: Position, occupancy and motion, velociry arrd acceleration, force, pressure,
flor.v, Acoustic, Humidity, light, radiatior-r, temperature, chemical, biosensor, camera.
2.3 Development boards: Arduino and Raspberry pi installation. interfacing and programming using
pvthon.

Unit 3: IoT Platlbrrn Design Methodology [6 FIrs.]


Case Study on IoT' Systern for Weather Monitor

Unit 4: Data and Arralytics for IoT [10Hrs.]


4.I An Introdr-rction to Data Analytics for IoT
4.2 Machine Learning
4.3 Big Data Analytics Tools and Technology,
4.zl Edge Strearring Analytics
4.5 Netrr olk Arrr l1 tics

Unit 5: IoT Physical Servers and Cloud Ofl'ering


Cloud storage models and Communicatioir APIs of IoT Systerns
[3FIrs.] A,
Unit 6: Securing IoT Systems [3FIrs.]
6.1 IoT Security Challenges
6.2 lo'l'Systent's Securily Practices
\
ry@

//": i
q,ffi,"
Dhr#.. 'f'
,irq"6}
w
i..,' ) r
" {?"*",r]j-/,2,i S m.r;.$(s
// &.
-F!.:i

Laboratiiry Worli:
implement the concept mentioned in the course using Python as a programming language, Arduino or
Raspberry pi as a System board. A11 sensors mentioned in course should be irnplemented in a single
project or separately to obserye their rvorkirg mechanism.

Evaluation:

Eramination Scheme
Internal Assessment External Assessment Total
Theon, Practical Theory Practical
20 20 60

Reference Books:

l. ArshdeepBahga, Vijay Madisetti, "lnternet of Things (A Ilands-on-Approach)". University Press


Irrdia Pvt. i-td., 2015.
2. David [-lanes, Gonzalo Salgueiro, Patrick Grossetete. Itobert Bar-ton, Jerorne Henry,"loT
Fundamentals: Networking Technologies, Protocols, and Use Cases fbr the Internet of Things",
Pearson Education (Cisco Press Indian Reprint).
3. Raj I(amal, "Internet of Things: Architecture and Design Principles", McGraw Hill 2011
4. Gary Smafi, "Practical Python Programming for IoT", ISI}.\- I 0: 183 8982469
5. Gaston C. Hillar Internet of Things with Python,lSBN-10: i785881388

{uw
*?ffi$

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy