Bca 7th 8th Semester Syllabus
Bca 7th 8th Semester Syllabus
Course Description:
This course presents different concepts of cyber law, cybersecurity, and ethics for IT
professionals and IT Organizations. This course also presents different concepts related to
intellectual properties and their protections, privacy, and social networking issues.
Course Objectives:
The primary objective of this course is to provide knowledge of cyber law, cybersecurity,
privacy protection, intellectual property protection, and ethics for IT professionals and IT
organizations.
Course Contents:
Unit 1: An Overview of Ethics, Ethics for IT Workers and IT Users (10 Hrs.)
Ethics, Ethics in the Business World; Corporate Social Responsibility; Fostering Corporate
Social Responsibility and Good Business Ethics; Improving Business Ethics; Ethical
Considerations in Decision Making; Ethics in Information Technology; Managing IT Worker
Relationship; Encouraging Professionalism of IT Workers - Professional Codes of Ethics,
Professional Organizations, Certifications and Licensing ; Encouraging Ethical Use of IT
Resources among Users
Teaching Methods
The teaching faculties are expected to create environment where students can
upgrade themselves with the of computing and information
l/ .{1 ./
the help of topics listed in the syllabus. The general teaching pedagogy that can be followed by
teaching faculties for this course includes class lectures, laboratory activity, group discussions,
case studies, guest lectures, research work, project work, assignments (Theoretical and
Practical), and written and verbal examinations.
Evaluation
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
40 60
Recommended Books:
1. Ethics in Information Technology, Sixth Edition, George W. Reynolds"
2. Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing,
Fifth Edition, Herman T. Tavani, John Wiley and Sons, 2Arc. a
'r"
11c'
l*'d4
I
'r1' '"i.'''
--- .-" '''
. ',:''.*i
*i I q;1 g(
2
+ Course Title: Cloud Computing (3 Cr.)
Course Code: CACS402
Year/Semester: IV/V[
Class Load: 6 Hrs. / Week (Theory: 3Hrs. practical: 3 Hrs.)
Course Description
This course oflers detailed concept, applications, principles and implementation of cloud
cornputing. It includes introduction, Cloud Computing Architecture, Cloud Yirtualization, Cloud
Programming Models, Cloud security and applications. It does not entirely focus on theoretical
concept but also strongly focuses on practical skill based learning.
Course obiectives
The general objectives of this course are to provide theoretical as well as practical knowledge of
cloud computing to make students capable of designing, implementing and managing the issues
of cloud computing in their personal as well professional life.
Course Co+tents
* Unit l: Introduction to Cloud Computing [6 Hrs.]
1.1 Overview of Cloud Computing
1.2 Evolution of Cloud Computing
1.3 Characteristics of Cloud Computing
1.4 Types of cloud and its Cloud services
1.5 Benefits and challenges of cloud computing
1.6 Applications cloud computing
1.7 Cloud Storage
1.8 Cloud services requirements,
1.9 cloud and dynamic infrastructure
1.10 Cloud adoption
{/nloi?r",
W-'"S
. lg>HI:*( 6-
3.5 server virlualization
3.6 hypervisor management software
3 .7 virtual infrastructure requirements
Practical Works
1. The practical work consists of all features of cloud computing and field visit.
2. Visit the cloud service provider (cloud industries) nearby you and prepare a report based on
organizational structure and technology implemented consulting with your subject teacher.
Teaching Methods
+ The teaching faculties are expected to create environment where students can update and
upgrade themselves with the current scenario of computing and information technology with the
help of topics listed in the syllabus. The general teaching pedagogy that can be followed by
teaching faculties for this course includes class lectures, laboratory activity, group discussions,
case studies, guest lectures, research work, project work, assignments (Theoretical and Practical ),
and written and verbal examinations
/@
h 7r
ryiii"${
Evaluation
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
20 20 (3 Hrs.) 60 (3 Hrs.)
Text Books
1. Dr. Kumar Saurabh, Cloud Computing
2. Raj Kumar Buyya, Christian Vecchiola, S. ThamaraiSelvi, Mastering Cloud
Computing
Reference Books
1. David S. Linthicum, Cloud Computing and SOA Convergence in your enterprise
2. Barrie Sosinsky, Cloud Computing Bible
3. Saurabh, K. (2011). Cloud Computing - Insights into New -Era Infrastructure, Wiley
India. A ( 4
154-A
z-__
,f,-,
''i!:;
.1
, e1'.l'-' .
' j'"Ifr
il't, -:,''
-,":?
d
(fro*
3\
Course Title: Internship (3 Cr.)
Course Code: CAIN403
Year/Semester: IV/V[
Class Load:
Course Description: The intemship course is practical industry experiencing course. This
course is expected to provide opportunity for career exploration and development in industry.
It includes applying theoretical and practical knowledge for solving real world problems while
working in industry"
Course Objectives: The objective of this course is to expose and penetrate final year students
into market space industry so as to acquire experience. It gives students the opportunity to enter
the real world industry so that students will be pragmatic and able to start their professional
career.
Course Details:
Nature of Internship:
The intemship work should be related to computer applications and information technologies.
The nature of work during intemship should impart practical knowledge in computer system
and its applications development, administration and management. The internship period
should be minimum of 8 (Eight) weeks. Students should start their internship within 3.to 4
weeks of start of seventh semester. The intemship can be practiced at government, non-
govemment organizations having appropriate computer system applications and information
technology usages. Generally, the internship is an individual activity however can be practiced
together in groups in the host organization. However, each student must prepare and submit
individual internship report on the basis of his/her work done during the internship period.
Students working in group at the same organization should be able to distinguish their nature
of work. Each student should be facilitated with a mentor and supervisor. Mentor from the
intern providing company is assigned to guide each student during internship in the company.
Supervisor from college/campus is assigned to supervise each student during internship.
Phases of Internship:
2" Mid-Term: Students must submit progress report and defend midterm progress of their
internship work in the 12& week of the seventh semester.
3. Final Submission: Students must submit and orally defend the internship work during
last week of the seventh semester but before final board examination. Students must
have to submit the internship final report to their respective department before at least
ten days of final defence date. The report should be submitted in standard format as
prescribed. The hard/soft copy of report should be made available to the external expert
before a week of presentation date. A viva voice will be conducted by
committee.
/r(-,
/H d4
Provision of Supervision : l- --it&
.?1 ?:i
i+*.
"'J ;.i'
.q
'*,., l---.
t- ii'
,
,rlr
s*.r,
There should be a regular faculty of campus/college assigned as a supervisor. The role of
supervisor is to guide the students throughout the internship and provide constructive
suggestions. A supervisor can supervise at most five internship students in a class section.
Provision of Mentorship:
There should be a regular employee in the intern providing organization assigned as a mentor.
The role of mentor is to guide the students throughout the internship period at the organization.
Evaluation Scheme:
1. Proposal Defense of 5Yo of total marks based on internship proposal and its
presentation.
2. Midterm of 75o/o of total marks based on the progress of the work of internship.
3. Final Defense of 20o/o of total marks based onpresentation of intemship work and viva-
voice.
The 5 marks of the proposal defense will be evaluated by the research c'ommittee formed by
HoD/Coordinator/Supervisor as a part of proposal defense. The 75 marks of the midterm will.
be evaluated by the HOD/Coordinator, Supervisor and Mentor as a part of midterm defense.
Out of the 75 marks, the HOD/Coordinator will evaluate for 5 marks, the supervisor will
evaluate for 35 marks and the mentor examiner will evaluate for 35 marks. The marks from the
mentor should be provided to the corresponding campus/college in confidential manner. The
remaining 20 marks of final defense will be evaluated by the extemal examiner from the
university.
Out of 100 marks, the 80 marks (Proposal + Midterm Evaluation) will be considered as internal
assessment while the 20 marks Defense) will be considered as external assessment. Each
student in the internship should get passed in each of the intemal and external assessments
individually. Any student failing to pass each of the assessments will be considered as fail.
a. Evaluationcommittee
- InternshipSupervisor
- Mentor from Intern Company
- HoD/Coordinator
- External Examiner
1.Introduction
2. Problem Statement
3. Objectives
4. Description of Internship WorklProject (Expected)
5. Internship Plan (Expected)
6. Expected Outcome of Internship Activities
7. References
1. Chapter 1: Introduction
1.1. Introduction (Introduce the project/ work done during intemship)
1.2- Problem Statement
1.3. Objectives
1.4. Scope and Limitation
1.5. Report Organization
+;t-w@t 8
4.4. Tasks / Activities Performed
While writing above chapters students should avoid basic definitions. They should relate and
contextualize the above mentioned concepts with their project work done during internship at
the host organization.
The listing of references should be listed in the references section. The references contain the
list of articles, books, urls that are cited in the document. The books, articles, and others that
are studied during the study but are not cited in the document can be listed in the bibliography
section.
The citation and referencing standard should be APA referencing standard. The text inside the
document should be cited accordingly" The APA referencing standard can be found in the web
at http s //apasIyle. apa. org/
:
. The paper size must be a page size corresponding to .A.4. The margins must be set as
9
No of Copies: 3 (College Library + Self + Dean Office)
A final approved signed copy of the report should be submitted to the Dean Office, Exam
Section, FOHSS.
Teachine Methods:
The major teaching methods that can be followed for this course includes industry practice,
class lectures, group discussions, presentations, and demonstrations.
Evaluation
Examination Scheme
Internal Assessment External Assessment Total
Proposal Midterm
Final Defence
Defence Defence
5 75 20 '1',:;r,rygg
lLia4 %''$b
' --- q"ntrryqdt
*ttr$
10
Elective Courses
Course Description
This course presents introduction to several topics on image processing techniques and their
applications. It also explores the students to real-world applications of image processing.
Course obiectives
Upon completion of this course, students should be able to 1. Explain the basic concepts of
digital image processing and various image transforms. 2. Develop a broad range of image
processing techniques and their applications. 3. To familiarize the with the image
enhancement, image restoration and image segmentation techniques.
Course Contents
Hours
Unit 1: Fundamental of Image processing
Image representation, basic relationship between pixels, elements of DIP
system, elements of visual perception-simple image formation model,
8
Sampling and Quantization, Color fundamentals and models, File Formats,
Image operations. Brightness, contrast, hue, saturation, Mach band effect
Evaluation
Evaluation Scheme
Internal Assessment Extemal Assessment Total
Theory Practical Theory Practical
100
20 20 (3 Hrs.) 60 (3 FIrs.)
Laboratory Work
Laboratory work should be done covering all the topics listed above and a small project work
should be carried out using the concept learnt in this course using software like matlab, python.
Text Books:
l. Gorrzalez Rafel C, Digital lmage Processing, Pearson Education, 2009.
2" S.Sridhar, Digital Image Processing, Oxford University Press,2011
Reference Books:
1. Milan Sonka, Vaclav Hlavac and Roger Boyle, Image Processing, Analysis and ji
MachineVision,SecondEdition,ThompsonLeaming,2007
/(-. ''
/u@4
l-'
"
.-
'.
t;
,'
"'/ " t' .' _'
€it *'
,"6,\' ^
ir;; -.
.?*.,l!!{
L2
Course Title: Database Administration
Course Code: CACS405
Year/Semester: IV/VII
Class Load: 6 Hrs. /Week (Theory: 3Hrs, Practical3Hrs.)
Course Description
This course provides the comprehensive knowledge aboutrelational database management
system in administrative approach to integrate in enterprise levelof database in network
environment which encompasses with oracle databaselnstances Management, database
installment in network environment, implementing user role and privileger, mrltitenant database
management, back and recovery.
Objectives: The general objectives of this oourse is to provide core knowledge of administrative
works on relational database management system.
q"
,t /
d,
ffl/a**W' .ffi
5*ffio*E,
{4fi
'h
n*h"
4F
=^.rd
"?u't4'"
Unit -7:Backup and RecoverySHrs
Backup and Recovery Concepts, Database backup, restoration and recovery, defining a
backupand recovery strategy, Backup and Recovery options; Data Dump; User-Managed Backup
and Recovery; Configuring RMAN; RMAN Backups, Restore and Recovery, Perform CDB and
PDB flashback.
Unit-8
Automate Tasks with the Scheduler4Hrs
= Introduction to the Scheduler, Access fughts, Scheduler Components and Workflow, create a
Job, Job Classes, Use Time Based, Event-Based Schedules, Create an Event-Based Schedule.
Lahoratqfy Worhs
Laboratory works should be done covering all the topics listed above and a small work should be
carried out using the concept learnt in each unit in the group. Work should be assigned on
individual basis.
Teaching Methods
The general teaching pedagogy includes class lectures, group discussions, case studies, guest
lectures, research work, project work, assignments (theoretical and practical). and examinations
(written and verbal), depending upon the nature of the topics. The teaching faculty will
detennine the choice of teaching pedagogy as per the need of the topics.
References
l. Fernandez, I" Beginning Oracle Database 12c Adrninistration. Apress.
2. Press, O. Oracle Database 19 C: Administration Workshop vol-l/ll.
3. Thomas, B. Oracle Database 12C Administration Cefiified Associate. Sybex.
4. Pro Oracle Database 18c Administration: Manage and Safeguard Your Organization's
Data, Michelle Malcher and Darl Kuhn. Third Edition.
5. Oracle Database 12c DBA Handbook, Manage a Secure Oracle Enterprise
Database Environment, Bob Bryla.
4
,s
%r
Course Title: Network Administration (3 Cr.)
Course Code: CACS406
Year/Semester: IV/Y[
Class Load: 6 Hrs. / Week (Theory: 3Hrs. Practical: 3 Hrs.)
Course Description: The course introduces the theoretical as well as practical concepts of
Network Administration. The course includes concepts of work station, server and services,
Network infrastructure, Implementing different network services.
Course Objectives: The objectives of this course is to make the students to design and
implement enterprise level network with its services.
Course Contents:
Unit I: Introduction [4Hrs.]
Network administrator as a Profession, Network administrator professional ethics,
Recent trends in network administration.
Unit I: Work Station, Server and Services [16Hrs.]
Workstation: Architecture design, Hardware strategies, OS installation. Servers:
Hardware Strategies, Hardware Features & Specifications. Service: Requirements,
Planning and Engineering, Service Launch, Disaster Recovery.
Unit II: Infrastructure [6Hrs.]
Network Architecfure, Network Operations, Datacentres Overview and Running
Datacentres.
Unit III: Service Recommendation [16Hrs.]
Server Upgrade, centralizing a service, Service Monitoring, Namespaces, Email
Service, Print Services, Data Storage, Backup and Restore, Software Repository, Web
Services.
Unit IV: [6Hrs.l
Preparing procurement plan/document for enterprise level network setup
Laboratory Works:
The laboratory work includes implementation of the mentioned content in syllabus using
LINUX and Windows operating system.
Teaching Methods
The major teaching methods that can be followed for this course includes class lectures,
laboratory activity, group discussions, presentations and case studies.
Evaluation
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
20 20 (3 Hrs.) 60 (3 Hrs.)
Text Book:
1. The Practice of System and network administration, 3'd Edition, Thomas A. Limoncelli,
Christina J. Hogan, Strata R. Chalpp
2. Mastering Windows Server 2019: The complete guide for IT professionals to
and manage Windows Server 2019 and capabilities, 2nd Edition
3. Ubuntu and Centos Linux server . Tanvir Rahman, 2019
&
,"$t
"g\
r-' ,"i15
r'^:r--
r'
Course Title: Software Project Management
Course Code: CACS407
Year/Semester: IY/YII
Class Load: 5 Hrs. /Week (Theory: 3Hrs, Practical: 2Hr.)
Course Deseription
This course provides the comprehensive knowledge about Software Project Management,
which encompasses with Software Projec! Planning, Scheduling, Cost Estimation, Risk
management, Quality management and Confi guration management.
Unit -1
Software Project Management Concepts 8 Hrs
Introduction, Project and Software project, Software project vs other project, Importance and
Problems in software project management, Process of SPM. Characteristics of good project
manager, Successful Software Project Manager, Overview of Software Project Planning.
Unit-2
Software Project Scheduling 8 Hrs
Objectives of activity planning, Work breakdown structure, Network planning model:
Critical path method (CPM), Program evaluation and review technique (PERT), Precedence
diagramming method (PDM), Shortening project duration, Identifying critical activities.
Forward pass and Backward pass
Unit -3
Software Estimation Techniques 7 Hrs
Software Effort Estimation: Problems with over and under estimations, Basis of software
Estimating, Software effort estimation techniques, expert Judgment, Estimating by analogy.
Bottoms-up estimating, Top-down approach and parametric models.
Unit -4 8 Hrs
Software Evaluation and Costing
Project Evaluation: Strategic Assessment, Technical Assessment, cost-benefit analysis, Cash
flow forecasting, cost-benefit evaluation techniques, Risk Evaluation. Selection of Appropriate
Report, Project approach: Choosing technologies, choice of process models, structured
methods.
Unit -5
RiskManagement
Risk Identification, Planning, Evaluation and Management, Categories of Risk,
dealing with risk, evaluating Risks to the schedule.
,q^
"llJ
t!\
Unit -6 "m
Software Quality Management
TQM, Six Sigma, Software Quality: defining and importance software quality,
of software quality in software planning
Unit -7
G&***, \W /",fu
1.6
Software Configuration Management 7 Hrs
Concept, Requirement and Elements of SCM, Baseline, SCM Repository, Versioning and
version control, SCM Process, Change Control Process. Configuration Audit and Status
Reporting. Case Study: Version Control Software Tools (Git, CVS, SVN)
Laboratory Works
L"b"*t".y **kt thould be done covering all the topics listed above and a small work should
be carried out using the concept learnt in each unit in the group. Work should be assigned on
individual basis. Student may choose project Management tools like (MS Project, OpenProj,
dot Project, Trello, Asana, ClickUp).
Teaching Methods
The general teaching pedagogy includes class lectures, group discussions, case studies, guest
lectures, research work, project work, assignments (theoretical and practical), and
examinations (written and verbal), depending upon the nature of the topics. The
faculty will determine the choice of teaching pedagogy as per the need of the topics.
References
1. Cotterell, B. H. (2018). Software Project Management. McGraw-Hil[6^
2. Dutt, S. C. (n.d.). Software Project Management. Pearson Education I"@a. ,'I"i
3. A.S. Kelkar (""d"). Software Project Management. PHI Leaming. 'tl ?esqd(
,411"*
@ slft$
17
Course Title: Advanced .Net Technology (3 Cr.)
Course Code: CACS408
Year/Semester: IV/VII
Class Load: 6Hrs. Aileek (Theory: 3 Hrs. Practical: 3 Hrs)
Course
This course provides skill to develop modern software program with graphical user interface
using the language C# with ASP.net" Student will build Window-based and web-based forms,
adding controls and setting properties of these controls.
Couryq Qbiqelivs
The objective of this course is to understand the theoretical foundation as weli as its practical
aspects of Windows Application, ASP.NET Core web application framework and C# language
features.
Course Contents
Unit l: C# Basics 8 Hours
Introduction to .NET Architecture, Class and Object: Creating class, Interface, Creating
Objects, Access Modifiers, Arrays, Inheritance, Exception Handling and Threading: try, catch,
finally, throw and throws, Create multithread program, Thread lifecycle" File IO: File Stream,
Stream Reader, Stream Writer, Binary.Reader, Binary Writer, Serialization.
tu
"B
Laboratory works
The laboratory work includes writing programs covering most of the concepts of above units
using C# and .NET core SDK (3.0 or above)
Teachins Methods
The teaching faculties are expected to create environment where students can update and
upgrade themselves with the current scenario of computing and information technology with
the help of topics listed in the syllabus. The general teaching pedagogy that can be followed by
teaching faculties for this course includes class lectures, laboratory activity, group discussions,
case studies, guest lectures, research work, project work, assignments (Theoretical and
Practical), and written and verbal examinations.
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
20 20 (3 Hrs.) 60 (3 Hrs.)
Reference Books
L" Herbert Shildt, "C#: The Complete Reference", TMH
2. C# 8.0 and .NET Core 3"0 - Modern Cross-Platform Development, Fourth Edition, by
Mark J. Price, 2019
3" ASP.NET Core in Action, by Andrew Lock,20l8
4. Ian Griffrths (2012), Programming C# 5.0, O'Reilly Medi4Inc.
5. Sharp, J. (2013). Microsoft Visual C# 2013 step by step.
6. Albahad, J., Albahari, B., & Drayton, P. Q0l2)" C# 5.0 in a nutshell (sth ed). Beijing;
tu
Sebastopol: O'Reilly
-f}fl
"%
@kqffil
$?w
19
/
Course Description:
This course familiarizes students with different concepts of E-Governance, different E-Governance
models and infrastructure development, use of data warehousing and data mining for e-govemance,
and different case studies ofdif[erent countries.
Course Objectives:
o To develop knowledge of e-govemance
o To know different e-governance models and infrastructure development
o To know to use conceFs of data warehousing and mining in e-governance
Course Contents:
Unit 1: Introduction (6 Hrs.)
E-Governance - An Overview; Why E-Govemance; Issues in E-Governance Applications and
the Digital Divide; Evolution of E-Governance, its Scope and Content; Present Global Trends
of Growth in E-Govemance; E-Governance Applications; E-Governance Initiatives inNepal
w ?M 20
Paradigm in Citizen Services; E-Panchayat (Electronic Knowledge Based Panchayat); General
Information Services of National Informatics Centre)
Other Countries (E-Govemance initiative in USA; E-Governance Case Study in China -
Beijing Business E-Park; Brazil's Poupatempo or 'Time Saver' Centres; Sri Lanka -
Kothamale Community Radio Intemet Project)
Recommended Books:
4. E-Govemance: Concepts and Case Studies, C.S.R. Prabhu, Second Edition, PHI Learning,
2012.
5. Strategic Planning and Implementation of E-Governance, P.K.Suri and Sushil, Springer,
2019.
6. A Study of the Practice of E-govemance in the Developing Countries: A Qualitative
Approach In Measuring The Maturity of E-government, Kazi Hassan Robin and Md.
Mahmudul Hasan Rafee, 2012.
7. Implementing and managing e-Government, Richard Heeks, 2006.
Teaching Methods:
The teaching faculties are expected to create environment where students can update and
upgrade themselves with the current scenario of computing and information technology with
the help of topics listed in the syllabus. The general teaching pedagogy that can be followed by
teaching faculties for this course includes class lectures, tutorials, group discussions, case
studies, guest lectures, research work, project work, assignments (Theoretical and Practical),
and written and verbal examinations.
Evaluation
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
20 20 (3 Hrs.) 60 (3 Hrs.)
,[b;@4^
.;-{_
--/ '"r*,t
I :ie\
" ,3.
ffii'li.ffi
21.
t
t
Course Name: Artificial Intelligence (3 Cr.)
Course Code: CACS410
Year/Semester: IV/VII
Class Load: 5 Hrs. / Week (Theory: 3Hrs. practical: 2 FIrs.)
Course Description: The course introduces basics of artificial intelligent. It covers fundamental
concepts artificial intelligence, problem solving" hrrowledge representation, neural networks,
machine learning, natural language processing, machine vision and expert systems.
Objective:
The objective of this course is to introdlice the basic princ,iples, techniques, and applications
of
Artificial Intelligence. upon the completion students will be able to:
' Gain fundamental concepts of principles of AI toward problem solving, inference,
perception, knowledge representation, and Iearning.
r Investigate applications of AI techniques in experl systems, artifrcial neural networks and
other machine learning models.
Course Contents:
UNIT 1: INTRODUCTION
[6 Hrs.]
1.1 intelligence. Intelligent behavior, Artificial Intelligence, Understanding AI
baied on
thought process and behavior, Hard vs. Strong AI. So1't vs. weali AI
1.2 Foundations of AI
1.3 Applications of AI
1'4 Intelligent Agents: Introduction of agents, Structure of Intelligent agent, properties
of
Intelligent Agents,PEAS description of Agents, I'ypes of Agents: Simple Reflexive,
Model Based, Goal Based, Utility Basecl, Learning agent, Environment Types:
Deterministic, Stochastic, Static, Dynamic, Observablc, Semi-observable, Single Agent,
Multi Agent
i-r !,.'=', It \
*\.,.
E,j
/'!;fd'. .'
s .qgt.-, ,i:.i.
,t; "qh ,' :''
Y:" -*
+rt^
% ,r,-" Bh\
rS* rYi>-r.-'.-.
-/}\ tirrj
S 'qry';. . '
PFrqqd(
2.5 Game Playing, Optimal Decisions in Games, Alpha - Beta Pruning, Minimax Algorithm,
Tic-Tac -Toe Problem, Stochastic Games
/.?
q rfo{fl
..-+
stftE(
Laborafory work:
Laboratorl"exercises can be conciucted in LISP, PRol.oG
or.rnv other-high level programming
language' Laboratory exercises must cover theconcepts
ol ruie basecl intelligent agents, inference
and reasoning.searcir techniques, neural networks.
etc.for solving practical problems.
Reference Books:
1' Stuart Russel and Peter Norvig, Artifrcial lntelligence A
Mociern Approach, pearson
2' E' Rich' K. Knight, Shivashankar R. Nair, Artificial Inteiligence.
Tata McGraw Hill.
3' Geolge F' Luger, Artificial Intelligence: Struotures ancl Strategies fbr Complex problem
Solving, Benj amin/Cummings pubiication
4' D' W' Patterson, Artificial Intelligence and Expert Systerns, preltice
Hall.
5. P. H. Winston, Artificial Intelligence, Addison Wesie\,.
s-
*d
flre
Course Title: Operational Research (3 Cr.)
Course Code: CAOR451
YearlSemester: MWII
Class Load: 4Hrs. /Week (Theory: 3 Hrs. Tutorial: I Hrs)
Course Description
Operations Research is the study of scientific approaches to decision-making. Through mathematical
modeling, it seeks to design, improve and operate complex systems in the best possible way. The
mathematical tools used forthe solution of such models are either deterministic or stochastic, depending
on the nature of the system modeled. In addition, the course will learn very powerful modeling and
solution techniques for decision-making problems that are used today by many successful companies
to help them save/earn millions of dollars. The module covers topics that include: linear programming,
transportation, assignment, inventory control, replacement theory and game theory. Analytic techniques
and computer packages will be used to solve problems facing business managers in decision
environments
Course Objectives
The general objectives of this course to provide a broad orientation of the field of optimization, with
emphasis on basic theory and methods for continuous and discrete optimization problems in finite
dimension, and it also gives some insight into its use for analyzingpractical optimization problems.
25
Unit 5: Inventory Control 6
hrs.
Inventory classification, Different cost associated to Inventory, Economic order quantity, Inventory
models with deterministic demands, ABC analysis.
Unit 6: Replacement theory 6
hrs. Introduction, Replacement of capital equipment which depreciated with time, replacement by
alternative equipment, Group and individual replacement policy
Unit 7: Game Theory 7
hrs.
Introduction, Characteristics of Game Theory, Two Person, Zero sum gulmes, pure strategy. Dominance
theory, Mixed strategies (2x2,mx2), Algebraic and graphical methods
Teaching Methods
The general teaehing pedagogy includes class lecfures, presentations, group works, case
studies, guest lecturers research works, project works, assignments (Theoretical and Practical).
The teaching faculty will determine the shoice of teaching pedagogy and encouraged to select
'r:ry
q
26
Course Title: Project III (6 Cr.)
Course Code: CACS452
Year/Semester: IV/VIII
Class Load: Hrs.Aileek (Practical: 12 Hrs.)
Course Description: This final year project is a practical course where students are expected
to implement the concepts learnt during four years of their study so as to build a system. The
course includes realization of project management, software development, and programming
skills.
Course Objectives: The objective ofthis course is to make students able to design and develop
software applications by following appropriate development methodology"
Course Details:
Nature of Project:
Students should develop a complete functioning system. The system should not be limited to
the basic CRUD operations only. Being a final year project, students are highly recommended
to implement appropriate algorithms relevant to the project. The project should include precise
system analysis, design, implementation and result analysis. The students can work in group
of at most two members. The students can choose appropriate language technologies that they
have learnt till eighth semester; however it is not limited. While implementing the project,
students should be able to write their own program modules rather than relying on predefined
APIs or Plugins except in some unavoidable circumstances.
Phases ofProject:
4- Proposal Submission: Students must submit and present project proposal after 3rd
week of start of the eighth semester.
5 Mid-Term: Students must submit progress report and defend midterm progress of their
project work in the l2th week of the eighth semester.
6. Final Submission: Students must submit and orally defend the project work during last
week of the eight semester but before final board examination. Students must have to
submit the project final report to their respective department before at least ten days of
final defense date" The report should be submitted in standard format as prescribed. The
hard/soft copy of report should be made available to the external expert before a week
of presentation date. The final presentation should be followed by the demonstration
session, where students have to demonstrate the project" A viva voice will be conducted
by evaluation committee.
Provision of Supervision:
l,
tAt t''"-
-},''
.\ $fl"y**t
Evaluation Scheme:
4. Proposal Defense of l}oh of total marks based on project proposal and its presentation.
The 10 marks of the proposal defense will be evaluated by the research committee formed
by HoD/Coordinator as a part of proposal defense. The 70 marks of the midterm will be
evaluated by the supervisor and internal examiner as a part of midterm defense" Out of the 70
marks, the supervisor will evaluate for 60 marks and intemal examiner will evaluate for 10
marks. The remaining 20 marks of final defense will be evaluated by the external examiner
from the university.
Out of 100 marks, the S0 rnarks (Proposal + Midterm Evaluatiau) will be considered as internal
assessment while the20 marks Ginal Defense) will be considered as external assessment" Each
student in the project should get passed in each of the internal and extemal assessments
individually. Any student failing to pass each of the assessments will be considered as fail.
c. Evaluation committee
- Project Supervisor
- HoD/Coordinator
- Internal Examiner (Regular Faculty)
- External Examiner 4,
\r" "tt,T.
,' --r::'l fl
d. Focus of the evaluation "1
-';':' i-':' -"
- Presentation Skills
- ProjectDemonstration -"fl-h"ffi*s
$, "! *ib -S
- Project Report
- VivaiQuestion Answer
- Level of Work and Understandino ccK
I
l*24
---' 28
Teamwork and Contribution
Report Contents:
4. Prescribed content flow for the project proposal
1.Introduction
2. Problem Statement
3. Objectives
4. Methodology
a. Requirement Identification
i. Study of Existing System
ii. Literature Review
iii. Requirement Analysis
b" Feasibility Study
i. Technical
ii. Operational
iii. Economic
c. High Level Design of System (Methodology of the
proposed system/ Flow Chart/ Working Mechanism of Proposed System
/ Description of Algorithms )
5. Gantt Chart (showing the project timeline)
6. Expected Outcome'
7. References
6. Chapter 1: Introduction
6.1. Introduction
6.2. Problem Statement
6.3. Objectives .4 -fl
6.4. Scope and Limitation
yro
6.5. Development Methodology
6.6. Report Organization
f"W 29
7.1. Background Study (Description of fundamental theories, general concepts and
terminologies related to the project)
7.2. Literattxe Review (Review of the similar projects, theories and results by other
' researchers)
While writing above chapters students should avoid basic definitions. They should relate and
contextualize the above mentioned concepts with their project work.
The listing of references should be listed in the references section. The references contain the
list ofarticles, books, urls, etc. that are cited in the 'The books, articles, and others
that are studied during the study but are not cited can be listed in the
bibliography section. The citation and referencing be IEEE referencing
standard. The text inside the document should be 1e. IEEE referencing
standard can be found in the web. S"
,%
/.bt qiw 30
I
A final approved signed copy of the report should be submiued to the Dean Office, Exam
Section, FOHSS.
Teachins Methqds:
The major teaching methods that can be followed for this course includes class lectures,
laboratory activity, group discussions, presentations,.and demonstrations.
Evaluation
Examination Scheme
Internal Assessment External Assessment Total
Proposal Midterm "&
Defence Defence
, ,FinalsDefence
"-r '.- d'r'" r/
S;;"' ::
10 70 20 100
@ ryM 31
I
Elective Courses
Course Title: Database Programming
Course Code: CACS453
Year/Semester : IV/VIII
Class Load:6 Hrs. /Week (Theory: 3Hrs, Practical3Hrs.)
Course Description
This course provides the comprehensive knowledge about database programming in relational
database management system, which encompasses with overview of fundamental SQL
statement, PL/SQL Block, Exception, Cursors, Record, Triggers, Procedures, Funetions and
Packages
Objectives: The general objectives of this course is to enhance advance programming skills
in relational database management system.
Unit -1
Introduction of RDBMS 10 Hrs
Overview of the Oracle Database Architecture, Familiar with SQL*Plus, SQL*Plus
Commands (DESCRIBE, LIST, APPEND, CHANGE, INPUT, DEL, CLEAR BUFFER,
Using Script Files), Acceping Vdues at Runtime, Overview of Fundamental SQL
Fundamental Command (DDL, DML, DCL, Join and Subquery)
Unit -2
PLlSQL 13 Hrs
PL/SQL Concepts, Architecture, Block structure, Executing PLiSQL Script,
DBMS-OUTPUT.PUT-LINE Statement, substitution Variable ftature, PL/SQL Language
fundamentals, DML Statement in PLISQL, Transaction Control in PLISQL. Conditional
Control (if, nested if, Case), Repetitive Control (While, for, simple loop, Nested, continue, loop
label)
Unit -3 5 Hrs
PL/SQL Exception
Exception scope, user-defined exception, exception propagation, advance exception concepts
(RATSE_APPLrCATrON_ERRO& EXCEPTTON_rNrT)
Unit -4
Database Cursors 5 Hrs
Types of cursors, cursor loop, Nested cursors cursor for loops, parameterized cursors, Nested
cursors
Unit -5
I)atabase Triggers 5 Hrs
Database Triggers BEFORE, AFTER Triggers, row and statement triggers, INSTEAD OF
triggers
Unit -6
Record and procedures 5 Hrs
Record (Record types, Nested record) Procedure (Block structure, Anonymous
procedure, IN, OUT parameters in Procedure)
Unit-7 ,1 .
frz ;i ".
&&-**-a
Functions and Package 5 Hrs
Functions (creating and invoking function and optimizing function in execution, creating
packages, extending the package, package instantiation and initialization,
Laboratory Works
Laboratory works should be done covering all the topics listed above and a small work should
be carried out using the concept learnt in each unit in individual or group"
Teachins Methods
The general teaching pedagogy includes class lectures, group discussions, case studies, guest
lectures, research work, project work, assignments (theoretical and practical), and
examinations (written and verbal), depending upon the nature of the topics. The teaching
faculty will determine the choice of teaching pedagogy as per the need of the topics.
References
l. Benjamin Rosenzweig, E. R. (2015). Oracle PL/SQL by Example. New Yourk: Prentice
Hall.
2" Gupta, S. K. (2016). Advanced Oracle PL/SQL Developer's Guide . Birmingham: Packl
Publishing.
3. Lex de Haan, T. G. (2014). Beginning Oracle SQL. Apress.
.4" Mclaughliq M. (2014). Oracle Database 12c PLISQL Programming. New Delhi: !
McGrawHill Education.
'i .-
% ryr@t
#rfts
33
Course Title: Geographical Information System (3 Cr.)
Course Code: CACS454
Year/Semester: IVA/III
Class Load: 5 Hrs. / Week (Theory: 3Hrs. Practical: 2 Hrs.)
Course Description
This course offers detailed knowledge as well as practical skills on GIS theory, design and
implementation. It includes introduction, GIS and Map, GIS data sorlrces and structures, spatial
data analysis, GIS data modeling and creating map apart from this this encourages to students
to develop a real time basic GIS project.
Course obiectives
The general objectives of this course are to provide theoretical knowledge as well as practical
skills of geographical information system to make students capable of capturing,analyzing and
visualize real world data.
Course Contents
Unit 1: Introduction 6 Hrs.
1.1 Definition, functions and Applications of GIS
1.2 Components of GIS
1.3 GIS as Information System
1.4 Nature & Sources of GIS data
1.5 Recent trends and future of GIS
lJnit2i GIS and Map 8 Hrs.
2.1l:|1.ap and their characteristics
2.2Mapping concept and Techniques
2.3 Map Projection
Unit 3: GIS data Sources & Structures L2 Hrs.
3.1 Capturing GIS data
3.2 Sources: Maps, GPS, Images and Databases
3.3 Structures: Vector, Raster and TIN data structures
3.4 GIS data modeling
3.5 GIS database design
Unit 4: Spatial Data Modeling and Analysis 12 Hrs.
4.1 Spatial data modeling
4.2 Y ector based analysis
4.3 Raster based analysis
Unit 5: GIS data modeling & Creating Maps 10 Hrs.
5.1 Surface modeling
5.2 Hydrology modeling
5.3 Designing and printing the map \
{n {-"tr L@ 34
Laboratory Works
Sluaents sfro"ta aerrelop basic GIS project implementing the concepts given in course of study
and may add more (if required).
Teachins Methods
The teaching faculties are expected to create environment where students can update and
upgrade themselves with the current scenario of computing and information technology with
the help of topics listed in the syllabus. The general teaching pedagogy that can be followed by
teaching faculties for this course includes class lectures, laboratory activity, group discussions,
case studies, guest lectures, research work, project work, assignments (Theoretical and
Practical), and wdtten and verbal examinations.
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
20 20 (3 Hrs.) 60 (3 Hrs.)
Reference Books
1. Kang-tsung Chang, (2010). "Introduction to Geographic Information Systems" Tata
McGraw Hill, New Delhi.
2. C.P.Lo and Albert K.W.Yeung (2006)" "Concepts and Techniques of Geographic
Inforrnation Systems" Prentice Hall of India, New Delhi.
3. Albert, C.T.L. and Yeung, K.V/. (2002). "Concbpts and Techniques of Geographical
Information Systems", New Delhi: Prentice Hall.
4. Chakraborty, D. and Sahoo, R.N. (2007)" Fundamentals of GIS. India: Viva Books.
5. ESRI guide to GIS analysis Andy Mitchell, ESRI press, Red lands
m== {4,
'/,4/):a4 4"-
''r" "'Y
--v&
'4*
-#id .,.h
"?ffis(
35
Course Title: Data Analysis and Visualization (3 Cr.)
Course Code: CACS455
Year/Semester: IV/VII
Class Load: 5 Hrs. / Week (Theory: 3Hrs" Practical: 2Hrs.)
Course Description
This course introduces to extend student's knowledge and practice in data analysis and
visualization, software, and applications. It provides the board overview of techniques of the
visualization process, detailed view of visual perception, the visualized data and the actual
visualization, interaction and distorting techniques.
Course obiectives
Upon completion of this course, students should be able to 1. Explain the concept of
visualization in the processing and analysis of data. 2. Develop visualization methods and
visualization systems using software applications. 3. Perform creative work in the field of
visualization.
Course Contents
Hours
Unit 1: Introduction to visualization
Introduction of visual perception, Visual representation of data" Data
Abstraction, Visual Encodings, Use of Color, Percepfual Issues,Information 6
overloads
Evaluation
%
Evaluation Scheme
36
Intemal
External Assessment
Practical Total
Practical
20 20 Hrs. 60 Hrs. 100
Laboratory Work
Laboratory work should be done
covering-all the topics listed above
and a small project work
##,:nffi:i out using trr" .oo."pireamt i, ir,i,
;;;" using any one software tools
Text Books:
3 " Fry, visuar izne.Data-
o'Reilly Medi* 200',ISBN a5g65 r 45
4" yff;,,Information visualization: perception s7
for Design, 3rd ed. Morgan Kaufmann,
Reference Books:
5' principles and practice.
ff*?r?#?.visualization: A. K. peters, Ltd,,2a07, ISBN
.;d,
"-;'li'
eki.
'sjq
Course Title: Machine Learning (3 Cr.)
Course Code: CACS456
Year/Semester: IV/VII
Class Load: 6 Hrs. / Week (Theory: 3Hrs. Practical: 3Hrs.)
Course Description
This course presents comprehensive introduction to several topics on basic concepts and
techniques of Machine Learning (ML). It also explores the understanding of the Supervised
and unsupervised learning techniques, probability based learning techniques, performance
evaluation of ML algorithms and applications of ML.
Course obiectives
Upon completion of this course, students should be able to 1. Explain the concept of supervised,
unsupervised and semi-supervised learning. 2. Develop algorithms to learn linear and non-
linear models using software. 3. Perform creative work in the field machine learning to solve
given problem.
Course Contents
Hours
Unit 1: Introduction to machine learning
History of machine leaming, Brain-neuron learning system, Definition and
types of learning, need of machine learning, Data and tools, review of
statistics, training, validation and test data, theory of leaming - feasibility of .10
learning - error and noise - training versus testing, generalization bound -
approximation-generalizationtradeoff - bias and variance - learning curve
Evaluation
q
Evaluation
;l
:l
fr_t
"q\ 38
Internal Assessment External Assessment Total
Theory Practical Theory Practical
100
20 20 (3 Hrs.) 60 (3 Hrs.)
Laboratory Work
Laboratory work should be done covering all the topics listed above and a small project work
should be carried out using the concept learnt in this course using software like matlab, python.
Text Books:
1. Tom M Mitchell, Machine Leaming, First Edition, McGraw Hill Education,2Al3.
2. Stephen Marsland, Machine Learning - An Algorithmic Perspective, Second Edition,
Chapman and Hall/CRC Machine Learning and Pattem Recognition Series, 2014.
Reference Books:
3. Peter Flach, Machine Leaming: The Art and Science of Algorithms that Make Sense
of Data, First Edition, Cambridge University Press, 2012-
%
"h' q,?xr*#qn
ffiiry
39
Course Title: Multimedia System
Course Code: CACS457
Year/Semester: MVIII
Class Load: 5 Hrs. / Week (Theory: 3flrs. Practical: 2 Hrs.)
CourspleserrBltqq
This course offers detailed concept and structure of Multimedia system. It includes introduction,
Sound & Audio System,Images and Graphics, Video and Animation, Data Compression,
Abstractions for programming , Multimedia design and applications . It does not entirely focus on
theoretical concept but also strongly focuses on practical skill based learning
Course obiectives
The general objectives of this course are to provide theoretical as well as practical knowledge
of Multimedia System, applications and tools to make students capable of implementing,
managing and developing the issues of multimedia application in their personal as well
professional life.
Course Contents
Unit 1: Introduction (6 Hrs)
1.1 Multimedia and its applications
1.2 Global structure of Multirnedia
1.3 Medium
1.4 Multimedia system and properties
1.5 Characteristics of a Multime.dia system
1.6 Challenges for Multimedia Systems
1.7 Components of Multimedia System
1.8 Multimedia building blocks
1.9 Scope of Multimedia
#E
4.6 Timeline and ftame based animation
4.7 Timeline and Tween-Based animation
h,^a*w*,s 40
4.8 Methods of controlling Animation
4.9 Display of Animation
4.10 Transmission of Animation
Unit 5: Data Compression (8 Hrs)
5.1 Need for Data Compression
5.2 Compression Basics
5.3 Storage Space
5.4 Coding Requirements
5.5 Lossless and Lossy Compression techniques
5.6 Source, Entropy and Hybrid Coding
5.7 Lossy Sequential DCT- based Mode
5"8 Expanded Lossy DCT-based Mode
5"9 JPEG and MPEG Compression
Laboratory Works
Labs consist of at least 8 practical experiments and two assignments covering the topics of the
syllabus"
"'4at
Teaching Methods
The teaching faculties are expected to create environment where students can
upgrade themselves with the current scenario of computing and
,,lfu
with the help of topics listed in the syllabus. The general teaching pedagogy be .dY
-{lA
"#..
Evaluation
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
20 20 (3 Hrs.) 60 (3 Hrs.)
Text Books
1. Ralf Steinmetzand KlaraNahrstedt, Multimedia: Computing, Communications and
Applications, Pearson Education Asia
2. John F. Koegel Buford , Multimedia Systems, Pearson Education Asia
Reference Books
1. Fred Halsall , Multimedia Communications, Applications, Networks, Protocols and Standards,
Pearson Education Asia
2" Ralf Steinmetz and Klara Nahrstedt, Multimedia fundamentals, Pearson Education Asia
@d
&"B
42
Course Title: Knowledge Engineering (3 Cr.)
Course Code: CACS458
Year/Semester: IY/VII
Class Load: 5 Hrs. / Week (Theory: 3Hrs. Practical: 2 Hrs.)
Course Description
This course offers detailed concept about knowledge representation, logic, reasoning and
principles. It includes introduction, knowledge acquisition, knowledge representation and
reasoning. It does not entirely focus on th.eoretical concept but also strongly focuses on
practical skill based learning.
Course obiectives
The general objectives of this course are to provide theoretical as well as practical knowledge
of knowledge engineering to make students capable of analysis, desigq implementing and
managing of knowledge engineering in their personal as well professional life.
Course Contents
Unit 1: Introduction [6 Hrs.l
1.1 Overview of data" Information and knowledge
1.2 Knowledge engineering and Knowledge management
1.3 Artiflcial intelligence use in knowledge Engineering
1.4 Knowledge based system and its applications
q
4.2 Knowledge representation languages
4.3 Non-monotonic reasoning
4.4 Probabilistic reasoning
qr'tts*p"ffi
Unit 5: Ontology Engineering [6 Hrsl '\Hq !
Laboratory Works
The practical work consists of all features of knowledge engineering and case studies.
Teaching Methods
The teaching faculties are expected to create environment where students can update and
upgrade themselves with the current scenario of computing and information technology with
the help of topics listed in the syllabus. The general teaching pedagogy that can be followed by
teaching faculties for this course includes class lectures, laboratory activity, group discussions,
case studies, guest lectures, research work, project work, assignments (Theoretical and
Practical), and written and verbal examinations.
Evaluation
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
20 20 (3 Hrs.) 60 (3 Hrs.)
Text Books
3. Kendal, Simon, Creen, Malcolm, An Inkoduction to Knowledge engineering,
Springer first edition, 20A7
4. R.J. Brachman and H.J. Levesque. Knowledge representation and resoning
(Elsevier 2004)
Reference Books
1. Stuart Russell and Peter Norvig, Artificial Intelligence: A modern approach ( Prentice
Hall edition, second edition, 2002)
2. P. Jackson, Introduction to expert systems, Addison Wesley, 1999.
3. John Debenham, Knowledge Engineering: Unifying Knowledge Base
Design, Springer, 1998 ;l' .ii
M".
str*{q
44
Course Title: Information Security (3 Cr.)
Course Code: CACS459
Year/Semester:
Class Load: 6 Hrs. / Week (Theory: 3Hrs. Practical: 3 Hrs.)
Course Description: The course introduces the theoretical as well as practical concepts of
computer and information security" The course includes concepts of cryptographic algorithms,
authentication systems, access controls, malicious logics, network security and security audits.
Course Objectives: The objectives of this corrse are to familiarize the students with the
computer security concepts, security policies and security mechanisms so that students will be
able to design, implement and manage the secure computer systems.
Course Contents:
Unit I: Overview of Computer security (4 Hrs)
1.1. Computer Security Concepts
1.2. Computer Security, Information Security, Network Security
1.3. Threats, Attacks and Assets
1.4. Security Requirements
1.5. Seeurity Design Principles
1.6. Attack Surfaces and Attack Trees
1.7. Computer Security Strategy
:, U ^: l.-;iiYd'
,['j'?fih..i. 'r k
--g /fiYYJ*,:.,:
aaau,ftr6d i A.
4\
ty 45
5.1. Access Control Principles
5.2. Subjects, Objects and Access Rights
5"3" Access Control Matrix and Capability Lists
5.4. Discretionary Access Control
5.5. Role Based Access Control
5"6. Attribute Based Access Control
5.7. Identity, Credential and Access Management
5.8. Trust Frameworks
Laboratory Works:
The laboratory work includes implementing and simulating the concepts of cryptographic
algorithms, hash functions, digital signatures, authentication & authorization systems, ffid
malicious logics. The laboratory work covers implementing programs for following;
- Classical ciphers like Caeser, Playfair, Railfence
-
DES, AES
-
Primality Testing, Euclidean Algorithm, RSA
-
MD5, SHA
-
Authentication systems like password based, Captcha, two factor authentication etc.
-
Role Based Access Controls
-
Malicious Logics
Teaching Methods
The major teaching methods that can be followed for this course lectures,
laboratory activity, group discussions, presentations and case studies. work,
the instructor can choose any programming language based on comfort of
Evaluation
/"W 46
Examination Scheme
Internal Assessment External Assessment Total
Theory Practical Theory Practical
2A 20 (3 Hrs.) 60 (3 Hrs.)
Text Book:
4. William Stallings and Lawrie Brown, Computer Security: Principles and Practice,
Pearson
5. William Stallings, Cryptography and Network Security: Principles and Practice,
Pearson.
Reference Books:
1. Mark Stamp, Information Security: Principles and Practices, Wiley
2" Matt Bishop, Introduction to Computer Security, Addison Wesley
3" Matt Bishop, Computer Security, Art and Science, Addison Wesley
4. Charles P. Pfleeger and Shari Lawrence Pfleeger, Security in Computing, Pearson
tw
47
Course Name: Internet of Things (3 Cr.)
Course Code: CACS460
Year/Semester : IV/V'I[I
Class Load: 5 Hrs. / \Yeek (Theon': 3Hrs. practical: 2 I.Irs.)
Course Description: The course introdr-rces basics of Io'I'. It covers introductions of IoT,
Devices and platfbrm lor deveiopingloT Sr,stems. I)esigri rnethoclology, Data Analytics for IoT,
Servers & Cloud oft'ering and ioT sy'stem securitr,.
Objective:
The objective of this course is to introduce the students about the principles, techniques,
development and applications of IoT 51,stem.
Course Contents:
Unit 1: Introduction to IoT [gHrs.]
l.l Definition and Characteristics of IoT.
I.2 Physical and Logical Design of IoT"
1.3 IoT Enabled Technologies
1.4 IoT and M2M
1.5 Dornain Specific IoTs: Home Automation, Cities, Environment, Fnergy. I{etail, Logistics,
AgricLrlture, Industry, Health and Lifestyle.
t ./')
,I
tl
4 1t;*t.'t''
{"*#"' "'
,nXo'h.l--
lt']
I":r.-:{
.i-
w
,"i
" t 't&"/"J"L:ia"l?'/i
,./
S'F
' &, L-,-l.ir',i
// '/" "
!i'
.,i t-S
Course Name: Internet of Things (3 Cr.)
Course Code: CACS460
Year/Semester: IVIV'II
Class Load: 5 Hrs. 1\Yeek (Theory.: 3Hrs. Practical: 2 [Irs.)
Course Description: The course introduces basics o1' Io'I'. It covers introductions of IoT,
Devices and platlorm for deveiopinglol' Svstems. Design methoclology. Data Analytics for IoT,
Servers & CloLrd oftbring and IoT svstem securit,v.
0bjective:
The objective of this course is to introduce the students about the principles, techniques,
development and applications of IoT S1,stem.
Course Contents:
Unit l: Introduction to IoT [SHrs.]
l.lDefinition and Characteristics of Io'f.
1.2 Physical and Logical Design of IoT.
1.3 IoT Enabled Technologies
1.4 IoT and M2M
1.5 Domain Specific IoTs: Home Autornation, Cities, Environment, Energy. Retail, Logistics,
AgricLrltLrre. Industry, Health and Lifestyle.
//": i
q,ffi,"
Dhr#.. 'f'
,irq"6}
w
i..,' ) r
" {?"*",r]j-/,2,i S m.r;.$(s
// &.
-F!.:i
Laboratiiry Worli:
implement the concept mentioned in the course using Python as a programming language, Arduino or
Raspberry pi as a System board. A11 sensors mentioned in course should be irnplemented in a single
project or separately to obserye their rvorkirg mechanism.
Evaluation:
Eramination Scheme
Internal Assessment External Assessment Total
Theon, Practical Theory Practical
20 20 60
Reference Books:
{uw
*?ffi$