BTech - 2019 Course Scse 1.1.1
BTech - 2019 Course Scse 1.1.1
(CSE) 2019-20
2019-20
Name of The Course Fundamental of Computer Programming
Prerequisite NA
Corequisite NA
Antirequisite NA
L T P C
3 0 0 3
Course Objectives:
Course Outcomes
CO1 The student would learn the basic concepts of Computer and acquire
various problem-solving techniques such as algorithms and flowchart.
CO2 To understand the basic terminology used in programming and able to write,
compile and debug programs in ‘C’ programming language and to develop
program logics using decision structures and loop structures.
CO3 To develop program logic using the concept of arrays and arrays of characters.
CO4 To understand the modular techniques such as functions and difference
between call by value and call by reference methods.
CO5 Implement and develop small projects using the concept Structures in C
programming language.
Text Book (s)
Prerequisite
Corequisite
Antirequisite
L T P C
3 1 0 3
Course Objectives:
• Provide an overview of computers and problem solving methods using ‘C’ language
• Serve as a foundation for the study of programming languages.
• Learn to develop program using ‘C’ language.
Course Outcomes
CO1 The student would learn the basic concepts of Computer and acquire various
problem solving techniques such as algorithms and flowchart.
CO2 To understand the basic terminology used in programming and able to write,
compile and debug programs in ‘C’ programming language and to develop
program logics using decision structures and loop structures.
CO3 To develop program logics using the concept of arrays and arrays of
characters.
CO4 To understand the modular techniques such as functions and difference
between call by value and call by reference methods.
CO5 Implement and develop small projects using the concept Structures in C
programming language.
CO6 Algorithms and Advanced Programming development in different field.
Text Book (s)
1. Alexis Leon and Mathews Leon (2001), Introduction to Information Technology, Tata
McGraw-Hill.
2. R.G. Dromey (2001), How to Solve it by Computer, Prentice Hall of India.
3. Al Kelley and Ira Pohl (1998), A Book on C Programming in C, 4th Edition, Pearson Education.
1.
List of Experiments
Course content
Mod
ule Topic
1 Writing first C Programme
2 Using different types of data in C Programme
3 Writing a programme to use decision control statements, cases
4 Writing a programme using loop structure, nested loop
5 Use of Arrays
6 Programme using pointers
Design a Database and create required tables, apply the
constraints like Primary Key, Foreign key, NOT NULL to the
7 tables.
Write a sql statement for implementing ALTER, UPDATE and
8 DELETE, Write the queries to implement the joins
Write the query for implementing the following functions:
• String Function
• Numeric/Math Functions
• Aggregate Functions
9 • Date/Time Functions
Create Functions, procedures, packages, triggers, Different types
10 of queries using Cases
Continuous Assessment Pattern
20 30 50 100
Name of The Course Introduction to Computer Science & Engineering
Course Code BCSE1001
Prerequisite
Corequisite
Antirequisite
L T P C
0 0 2 1
Course Objectives:
• Provide an overview of computers and different development areas.
• Learn and Identify different domains emerging.
• Develop for student seek and idea about Internet and application.
• Learn about the Data Analysis, Business Process and other fields.
Course Outcomes
Prerequisite
Corequisite
Antirequisite
L T P C
3 1 0 3
Course Objectives:
• Develop strategies and skills to enhance their ability to read and comprehend engineering
and technology texts.
• Foster their ability to write convincing job applications and effective reports.
• Strengthen their listening skill which will help them comprehend lectures and talks in their
areas of specialisation.
Course Outcomes
CO1 Read technical texts and write area- specific texts effortlessly.
CO2 Listen and comprehend lectures and talks in their area of specialisation successfully.
CO3 Speak appropriately and effectively in varied formal and informal contexts.
1. Board of editors. Fluency in English A Course book for Engineering and Technology.
Orient Blackswan, Hyderabad: 2016.
2. Sudharshana.N.P and Saveetha. C. English for Technical Communication. Cambridge
University Press: New Delhi, 2016.
2. Grussendorf, Marion, English for Presentations, Oxford University Press, Oxford: 2007
4. Means, L. Thomas and Elaine Langlois, English & Communication For Colleges.
Cengage Learning, USA: 2007
Course Objectives:
Course Outcomes
CO4 Compare the various techniques of water softening and determine the calorific value of
fuel .
CO5 Generalize the preparation methods applications of polymers and organic compounds.
1. Text book of Engineering Chemistry by Jain & Jain, 14th Ed., pp 1-21
Unit-2 Lecture
[08]
Spectroscopic techniques and Applications:
Elementary idea and simple applications of Rotational, Vibrational, Ultraviolet&
Visibleand Raman spectroscopy.
Unit-3 Lecture
[08]
Prerequisite
Corequisite
Antirequisite
L T P C
0 0 2 1
Course Outcomes
L
i
s
t
o
f
E
x
p
e
r
i
m
e
n
t
s
• To estimate the total permanent Hardness of the given hard water sample.
An
approximately 0.01M solution of EDTA are provided.
• Estimate the amount of Nickel ion in the given sample solution by complex-
metric
titration.
• To estimate the amount of Zinc in the given solution by using a standard solution
of
Potassium Ferro cyanide
• Estimate the amount of ferrous iron in the whole of the given ferrous Solution
using
external indicator
• To find out the amount of dissolved oxygen in the given sample of water.
Internal Assessment Mid Term Test (MTE) End Term Test Total Marks
(IA) (ETE)
50 50 100 100
Name of The Course Engineering Physics
Prerequisite
Corequisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
Course Outcomes
CO Discuss Classical and quantum physics and solve Schrodinger wave equations
1
• Dr. N. Subrahmanyam,
th BrijLal and Dr. M. N. Avadhanulu (2010) A Text
book ofOptics, 24 Edition, S. Chand Higher Academy. ISBN 8121926114
• B.K Pandey and S. Chaturvedi (2012) Engineering Physics, Cengage Learning,
ISBN 9788131517611
• B.B. Laud, Lasers and Non-Linear Optics (2011), 3rd Edition, New Ages
International.
Einstein’s coefficients, Population Inversion, Three level and four level laser, Laser
characteristics, He-Ne laser and applications.
Unit-4 Electromagnetics 8 lecture hours
Internal Assessment Mid Term Test (MTE) End Term Test Total Marks
(IA) (ETE)
20 30 50 100
Prerequisite
Corequisite
Antirequisite
L T P C
Course Outcomes
CO Analyze the physical principle involve in the various instruments and relate them
1 to new applications.
CO Operate CRO and various optical instruments such as- spectrometer, travelling
2 microscope
and speedometer.
CO Calculate the physical constants by various methods such as- Planck’s constant,
3 wavelength of monochromatic light, angle of prism and realize the accuracy in
measurements.
CO Develop the individual and team work for the performance of scientific works.
4
CO Develop the skill for making scientific graphs, error analysis and measurement
5 technology used in engineering.
L
I
S
T
O
F
E
X
P
E
R
I
M
E
N
T
S
• To study the polarization of light by reflection and to verify the Brewster’s law.
• To find the wavelength of monochromatic light with the help of Fresnel’s Biprism.
Name of The Course Basic English
Prerequisite
Corequisite
Antirequisite
L T P C
2 0 0 2
Course Objectives:
Course Outcomes
● Speaking Skills
lectures
● Vedic Mathematics
● Shortcuts to Calculations
● Number Systems
Internal Assessment Mid Term Test (MTE) End Term Test Total Marks
(IA) (ETE)
20 30 50 100
Course Outcomes
CO Describe the SCILAB code for solving mathematical problem and utilize different
1 function loops (if else, while , for) in SCILAB code.
List of Experiments
SCILAB -CODE for find addition, subtraction, multiplication and division of two matrices ,
transpose of a matrix and inverse of a non singular matrix.
SCILAB -CODE for 2-D : circle, parabola, ellipse and hyperbola and 3-D surfaces: Planes,
Sphere,
Cylinder, Paraboloid, Ellipsoid, Hyperboloid, cone.
SCILAB -CODE for Fourier series expansion of different wave forms and
comparison with the original function.
SCILAB -CODE for identifying the critical points of 2-D and 3-D. surface.
SCILAB -CODE for computing double integrals in Cartesian coordinates.
SCILAB –CODE for computing and plotting grad of scalar point function .
SCILAB –CODE for computing and plotting divergence of vector point functions.
SCILAB –CODE for computing and plotting curl of Vector point functions.
• To estimate the total permanent Hardness of the given hard water sample.
An
approximately 0.01M solution of EDTA are provided.
• Estimate the amount of Nickel ion in the given sample solution by complex-
metrictitration.
• To estimate the amount of Zinc in the given solution by using a standard solution
of
Potassium Ferro cyanide
• Estimate the amount of ferrous iron in the whole of the given errous Solution
using
external indicator
• To find out the amount of dissolved oxygen in the given sample of water.
Internal Assessment Mid Term Test (MTE) End Term Test Total Marks
(IA) (ETE)
50 50 100 100
Name of The Course Product Design using Graphics
Prerequisite
Corequisite
Antirequisite
L T P C
0 0 4 2
Course Outcomes
CO Understand the concept and principles of engineering graphics in
1 product
design.
CO Make isometric and orthographic projection of solids along with free hand
2 sketching
COURSE CONTENT
Hands-on Project in Groups: Choose a specific objective for Product Design, Design the
Product and Model it using AutoCAD, presentation.
Prerequisite
Corequisite
Antirequisite
L T P C
0 0 2 1
Course Objectives:
• The module will adopt an integrated approach to language learning and will
emphasize equally all four skills of reading, writing, listening and speaking
as
well as the acquisition of grammar structures and vocabulary.
• Audio and video materials will also be used to supplement the textbook and to
provide students with a better insight into Germany, her culture and the life of her
people.
Course Outcomes
Unit-1 Introduction 4
hours
Begrüssung / Greeting, Nummern/numbers Monate, Wochentage/ Name of months, days
Unit-2 2
hours
Sich vorstellen – Introduction Interviewspiel mit Fragen und Antworten
Unit-3 2
hours
Information zu Lӓndern, Nationalitӓten und ihre Sprachen/Name of countries,
nationalitiesand languages.
Unit-4 6
hours
W-fragen/ Questions Nominativ Kasus/ Nominative case Pronomen /
pronounsNominative)
Unit-5 6
hours
Regelmӓβige Verben / Regular Verbs Verbkonjugation/ Verb conjugation (sein und
haben)Landeskunde /History Film –Spielzeugland
Prerequisite
Corequisite
Antirequisite
L T P C
0 0 2 1
Course Outcomes
1. « Tech French » :Ingrid Le Gargasson, Shariva Naik, Claire Chaize. Goyal Publishers
and Distributors Private Ltd, Delhi, 2012. Units 1 & 2.
Prerequisite
Corequisite
Antirequisite
L T P C
0 0 2 1
Course Objectives:
• This course is designed for students who have little or no knowledge of Japanese.
Course Outcomes
•
Unit-1 Introduction KANA NYUUMON 08 Lectures
Introduction to Japanese syllabary. Vowels and Consonants, Hiragana, Katakana,&
Romaji. Japanese Numerals, Demonstrative pronoun, Greetings, Set phrases –
Onegaishimasu – Sumimasen, wakarimasen, Parts of body (look and learn)
Unit-2IIKATA NO NYUUMON 08
Lectures
1
.
H
a
j
i
m
e
m
a
s
h
i
t
e
.
2
.
H
o
n
n
o
K
i
m
o
c
h
i
.
Unit-3 OREI TO SHITSUMON 08
Lectures
3. kore wo kudasai.
4. Sochira wa nanjikara nanji made desu ka.
Prerequisite
Corequisite
Antirequisite
L T P C
3 1 0 3
Course Objectives:
• The ability to set up and solve optimization problems involving several variables,
Course Outcomes
th
• Robert T. Smith and Roland B. Minton, Calculus, 4 Edition, McGraw Hill
Education.
th
• George B. Thomas and Ross L. Finney, Calculus, 9 Edition, Pearson Education
th
• R. K. Jain and S. R. K. Iyengar, Advanced Engineering Mathematics, 4
Edition,Narosa publishers.
nd
• Michael D. Greenberg, Advanced Engineering Mathematics, 2 Edition,
PearsonEducation
Prerequisite NA
Corequisite NA
Antirequisite NA
L T P C
0 0 4 2
Course Objectives:
1. To help students distinguish between values and skills, and understand the
need,basic guidelines, content and process of value education.
Course Outcomes
C Understand the role of a human being in ensuring harmony in society and nature.
O4
C Distinguish between ethical and unethical practices, and start
O5 working out thestrategy to actualize a harmonious environment
wherever they work.
Text Book (s)
Unit-1
Course Introduction - Need, Basic Guidelines, Content and Process for Value
Education
1. Understanding the need, basic guidelines, content and process for Value Education
2. Self Exploration–what is it? - its content and process; ‘Natural Acceptance’ and
Experiential Validation- as the mechanism for self exploration
3. Continuous Happiness and Prosperity- A look at basic Human Aspirations
4. Right understanding, Relationship and Physical Facilities- the basic requirements for
fulfillment of aspirations of every human being with their correct priority
5. Understanding Happiness and Prosperity correctly- A criticalappraisal of the current
scenario
6. Method to fulfill the above human aspirations: understanding and living in harmony at
various levels
Prerequisite
Corequisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
1. To develop solid foundation for further study of electrical and electronics courses
2. To develop the analytical skills for solving the electrical and electronics circuits
3. To learn the utility of basic electronics devices and circuits
4. To understand the basic principles of electrical machines
Course Outcomes
C Learn and solve different electrical and electronic circuits applying different
O lawsand theorems.
1
C Develop concepts of the logic circuits, minimize and realize the digital circuits
O
2
C Implement electronic circuits involving semiconductor diodes and transistors
O
3
C Acquire the knowledge about working of transformers,
O DC, induction andsynchronous machines
4
C Explain the electrical and electronic circuit theories and verify
O them throughexperiments
5
Text Book (s)
4. A. P. Malvino and Donald Leach, “Digital Principles and Applications”, 6th Edition,
TataMcGraw Hill, 2006.
3. Jacob Millman, Christos C. Halkias, Satyabrata Jit, “Electronics Devices and Circuits”,
Ohm’s law, KCL, KVL, node voltage analysis, mesh current, circuits with independent
sources,Thevenin’s & Norton’s equivalent, maximum power transfer and superposition
theorem.
RL and RC transients in circuits with DC source, RMS values, the use of phasors for constant
frequency sinusoidal sources, steady state AC analysis of a series circuit, parallel circuits,
AC power calculations.
Basic logic circuit concepts, Basic Gates and Universal Gates, representation of numerical
data in binary form – Binary to decimal, Octal, Hexadecimal, Boolean algebra,
combinational logic circuits- Half adder, full adder, synthesis of logic circuits, minimization
of logic circuits.
Basic diode concepts, ideal diode model, rectifier and wave-shaping circuits, zener diode voltage
regulator concepts, bipolar junction transistors, current and voltage relationship, common
emittercharacteristics.
Course Code
3 0 0 3
Course Objectives:
ii) Learners will gain deep insights into the fundamental concepts
of disruptivetechnologies, their promises as well as their current
limitations
Course Outcomes
C Build the deep insight into the main methods used in machine learning (ML)
O
andartificial intelligence (AI) Utilize the potential impact of Artificial
2
Intelligence and
machine learning
C Acquire fundamental enabling techniques and scalable algorithms to Interpret
O
3 business models and scientific computing paradigms, and apply software tools
for
big data analytics.
C Analyse basic IOT protocols and its characteristics to determine the performance
O
4
C Implement the basic IoT applications on embedded platform
O
5
Prerequisite
Corequisite
Antirequisite
L T P C
3 0 0 2
Course Outcomes
Unit-1 Industrial
Psychology 8 hours
Unit-2 8 hours
Unit-3 8 hours
Unit-4 8
hours
Social and Industrial Concerns :
U
n
i
t
-
5
8
h
o
u
r
s
Corequisite
Antirequisite
L T P C
0 0 21
Course Outcomes
L
i
s
t
o
f
E
x
p
e
r
i
m
e
n
t
s
1 Review of working with Scilab
2 Using Scilab for basic operations on matrices including inverse, rank, trace
anddeterminant of a matrix.
4 Use of Scilab to find the Kernel, range and verification of rank and nullity
theorem.
5 Matrix representation of any linear transformation, using Scilab to find inverse
of alinear transformation.
6 Using Scilab to compute the Eigen Values and Vectors and check whether a
givenmatrix is symmetric, skew-symmetric, orthogonal.
7 Develop a code in Scilab for Gram-Schmidt orthogonalization process.
9 Solving an initial value problem of first and second order (domain specific)
andplotting the solution of problem
1 Using Scilab to solve one dimensional heat equation under specified conditions
1 andgraphing the solution.
1 Using Scilab to Solve a Laplace equation to find the steady state temperature in
2 thesquare plate satisfying specific boundary conditions and graphing isotherms
50 50 100 100
Corequisite
Antirequisite
L T P C
0 0 2 1
Course Outcomes
List of Experiments
1 Implement Python script to read person’s age from keyboard and display
whether heis eligible for voting or not.
9 Write a program which makes use of function to display all such numbers
which aredivisible by 7 but are not a multiple of 5, between 1000 and 2000.
Course Outcomes
CO Apply and verifying basic electrical laws.
1
CO Realize and apply basic theorems in electrical network and circuits.
2
CO Verify the truth tables of logic Gates.
3
CO Analyze characteristics of basic diodes and transistors.
4
CO Realize and verify the working of transformer.
5
List of
Experiments
Verification of Truth table for logic Gates- AND , OR, NOT, NAND, NOR and
5 XORand Half adder Circuit.
Study of open circuit and short circuit tests on a single phase transformer and
1 obtaining its equivalent circuit parameters.
0
Continuous Assessment Pattern
Internal Assessment Mid Term Test End Term Test Total Marks
(IA) (MTE) (ETE)
50 50 100 100
Name of The Course Basic Workshop
Course Code
Prerequisite
Corequisite
Antirequisite
L T P C
0 0 4 2
Course Outcomes
C
o
u
r
s
e
C
o
n
t
e
n
t
Unit-1 : Welding Shop
a. InstructionofBIstandardsandreadingofweldingdrawings.
b. T-
1 Joint
c.LapJo
int
d. TIGWelding
e.MIGWelding
Prerequisite
Co requisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
5. Cultivate a sense of familiarity and ease in working with mathematical notation and
common concepts in discrete mathematics.
6. Teach the basic results in set theory, logic, combinatorics, and graph theory.
7. Thoroughly prepare for the mathematical aspects of other computer science course.
Course Outcomes
2. B. Kolman, R.C. Busby, and S.C. Ross, Discrete Mathematical Structures, PHI
Theory Practical
2 15 3 1 2 100
0 0 5 0
Name of The Course Data Structures and Algorithms
Prerequisite
Co requisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
Course Outcomes
CO Understand the application of non linear data structure(s) to solve various problems
3
Text Books
Reference Books
1 Aaron M. Tenenbaum, Yedidyah Langsam and Moshe J. Augenstein “Data
Structures
Using C and C++” , PHI
3 R. Kruse etal, “Data Structures and Program Design in C”, Pearson Education
Unit II: Stacks and Queues: Abstract Data Type 8 lecture hours
Primitive Stack operations: Push & Pop, Array and Linked Implementation of Stack in C,
Application of stack: Prefix and Postfix Expressions, Evaluation of postfix expression,
Recursion, Tower of Hanoi Problem, Simulating Recursion, Principles of recursion, Tail
recursion, Removal of recursion
Unit III: Trees: Basic terminology 8 lecture hours
Theory Practical
2 1 3 1 2
0 5 0 5 0
Name of The Course Data Structures and Algorithms Lab
Prerequisite
Corequisite
Antirequisite
L T P C
0 0 2 1
Course Objectives:
Understand the data structure shortest path algorithms involving complicated data structures like
Graphs.
Course Outcomes
CO Understand the shortest path algorithms involving complicated data structures like
4 Graphs.
Text Book
3.
References
1. "Aaron M. Tenenbaum, YedidyahLangsam and Moshe J. Augenstein “Data
StructuresUsing C and C++” , PHI, 1996."
L
i
s
t
o
f
E
x
p
e
r
i
m
e
n
t
s
1. a) Write a Program
to implement linear
search algorithm.
b) Write a Program to
implement binary
search algorithm.
4. a) Write a program that uses stack operations to convert a given infix expression into its
postfix.
b) Write a program that uses stack operations to evaluate given postfix expression.
5. a) Write a Program to implement the operations of Queue using array.
b) Write a Program to implement the operations of Queue using linked list.
7. Write a
Program
to Sort
the set
of
element
s by
using
Quick
Sort. iii)
Merge
Sort.
10. Write a Program to Perform the Tree Traversal Techniques by using Iterative Method
11. Write a Program to Perform the Tree Traversal Techniques by using recursion.
12. Write a program to Implement Insertion and Deletion Operations on AVL Trees
Theory Practical
Corequisite “C-Programming”
Antirequisite
L T P C
3 0 0 3
Course Objectives:
Course Outcomes
Relational data model concepts, integrity constraints, entity integrity, referential integrity, Keys
constraints, Domain constraints, relational algebra, relational calculus, tuple and domain calculus.
Introduction on SQL: Characteristics of SQL, advantage of SQL. SQl data type and literals. Types
of SQL commands. SQL operators and their procedure. Tables, views and indexes. Queries and
sub queries. Aggregate functions. Insert, update and delete operations, Joins, Unions,
Intersection, Minus, Cursors, Triggers, Procedures in SQL/PL SQL
Concurrency control, Locking Techniques for concurrency control, Time stamping protocols for
concurrency control, validation based protocol, multiple granularity, Multi version schemes,
Recovery with concurrent transaction, case study of Oracle.
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in
the course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed in
the areas covered in the course.
Prerequisite
Co requisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
● To comprehend the structure of SQL Queries to retrieve data from the databases
Course Outcomes
CO Apply all constrains to develop a business application using cursors, triggers and
4 stored procedures.
The UNIX Programming Environment, B.W. Kernighan & R. Pike, Prentice Hall of India, Sixth
Edition, 2013.
L
i
s
t
o
f
E
x
p
e
r
i
m
e
n
t
s
Write the
queries for Data
Definition and
Data
Manipulation
Language.
Write SQL queries for extracting data from more than one table.
T Practical
h
e
o
r
y
Internal Mid End ETE Total
Assessment Term Term Marks
(Continuous
(IA) Test Test Assessment)
(MTE) (ETE IA
)
2 1 30 1 20 100
0 5 5
Co requisite
Antirequisite
L T P C
2 0 0 2
Course Objectives:
Course Outcomes:
CO2 Understand and configure the different types of network topologies and protocols.
CO4 Examine and analyze the network-layer concepts like Network-Layer services –Routing -IP
protocol -IP addressing
CO5 Examine and analyze the different link-layer and local area network concepts like Link-Layer
services –Ethernet -Token Ring -Error detection and correction -ARP protocol
Text Book (s)
Medium Access sub layer - Channel Allocations, LAN protocols -ALOHA protocols - Overview
of IEEE standards - FDDI. Data Link Layer - Elementary Data Link Protocols, Sliding Window
protocols, Error Detection and Correction: Block coding, cyclic codes, Linear block codes,
checksum.
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in
the course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed in
the areas covered in the course.
Name of The Course Data Communication & Networking Lab
Prerequisite
Co requisite
Antirequisite
L T P C
0 0 2 1
Course Objectives:
CO3 Analyze the various Data Link layer protocols and IEEE standards.
CO4 Analyze the network-layer, transport layer protocols, compression and security
mechanism.
1 Behrouz A. Frozen, Data Communications and Networking, McGraw Hill, 4th edition, 2007.
L
i
s
t
o
f
E
x
p
e
r
i
m
e
n
t
s
3 Write a program for hamming code generation for error detection and correction.
5 Write a program for congestion control using the leaky bucket algorithm.
7 Take a 64-bit plain text and encrypt the same using DES algorithm.
8 Using RSA algorithm encrypts a text data and decrypts the same.
Theory Practical
2 15 3 1 2 100
0 0 5 0
Name of The
Course:Java
Programming
Course Code BCSE2015
Prerequisite
Co requisite
Antirequisite
L T P C
0 0 2 1
UNIT – IV 9 Generics, Collections and Event Handling: Generics – Example – Parameters - General
Form- Bounded Types - Wildcard Arguments - Generic Method and Interfaces – Raw Types and Legacy
Code - Generic Class Hierarchies. Collection Classes – Array List – Linked List – Hash Set and Maps.
Event Handling – Mechanisms -Delegation Event Model - Event Classes - Sources of Events - Event
Listener Interfaces – Mouse and Keyboard events - Adapter Classes - Inner Classes.
UNIT – V 9 AWT: AWT Classes - Window Fundamentals - Frame Windows - Frame Window in an
Applet – Graphics –Color – Fonts - Font Metrics. AWT Controls - Layout Managers - Menu Bars and
Menus -Dialog Boxes - File Dialog - Handling Events by Extending AWT Components.
Unit VI: The advances and the latest trends in the course as well as the latest applications of the
areas covered in the course. The latest research conducted in the areas covered in the course.
Discussion of some latest papers published in IEEE transactions and ACM transactions, Web
of Science and SCOPUS indexed journals as well as high impact factor conferences as well as
symposiums. Discussion on some of the latest products available in the market based on the
areas covered in the course and patents filed in the areas covered in the course.
TEXT BOOKS: 1. Schildt, Herbert. ―Java: The Complete Reference‖, 9th Edition, Tata
McGraw Hill Publishing Company, New Delhi, 2014.
REFERENCE BOOKS:
1. Buyya Rajkumar., Thamarai Selvi S. and Xingchen Chu., ―Object Oriented Programming
with Java Essentials and Applications‖, Tata McGraw Hill, 2009.
2. Deitel, Paul and Deitel, Harvey. ―Java How to Program‖, 8th Edition, Eastern Economy
Edition, 2009. 3. www.javatpoint.com
4. https://www.w3schools.in/java-tutorial/
ELCTIVE
5. Program to illustrate exception handling in java and creation of user defined exception
10. Program to demonstrate the use of Array List, Linked List, HashSet and Map classes.
13. Develop a simple text editor with basic file and edit functionalities
Prerequisite
Corequisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
The primary objective of this course is to understand Cryptography Theories, Algorithms and
Systems. To understand necessary Approaches and Techniques to build protection mechanisms
in order to secure computer networks.
Course Outcomes
C Understand the fundamentals of networks security, security architecture, threats
O andvulnerabilities
1
C Apply the different cryptographic operations of symmetric
O cryptographicalgorithms
2
C Apply the different cryptographic operations of public key cryptography
O
3
C Apply the various Authentication schemes to simulate different applications
O
4
C Understand various Security practices and System security standards
O
5
Course Contents:
Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security
at Multiple levels, Security Policies - Model of network security – Security attacks,
services and mechanisms – OSI security architecture – Classical encryption techniques:
substitutiontechniques, transposition techniques, Steganography.
Unit II: SYMMETRIC KEY CRYPTOGRAPHY 9 hours
Unit VI: The advances and the latest trends in the course as well as the latest applications
of
the areas covered in the course. The latest research conducted in the areas covered in
the
course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed
in the areas covered in the course.
Theory Practical
2 15 3 1 2 100
0 0 5 0
Name of The Course Software Project Management
Prerequisite
Co requisite
Antirequisite
L T P C
3 0
Course Objectives:
Course Outcomes
CO1 Describe and determine the purpose and importance of project management
fromthe perspectives of planning, tracking and completion of project.
CO3 Implement a project to manage project schedule, expenses and resources with the
application of suitable project management tools.
Course Contents:
Dimensions of Project Monitoring & Control, Earned Value Analysis, Earned Value
Indicators:
23 Budgeted Cost for Work Scheduled (BCWS), Cost Variance (CV), Schedule Variance
(SV),Cost Performance Index (CPI), Schedule Performance Index (SPI), Interpretation of
Earned Value Indicators, Error Tracking, Software Reviews, Types of Review:
Inspections,
Deskchecks, Walk through, Code Reviews, Pair Programming.
Testing Objectives, Testing Principles, Test Plans, Test Cases, Types of Testing, Levels of
Testing, Test Strategies, Program Correctness, Program Verification & validation, Testing
Automation & Testing Tools, Concept of Software Quality, Software Quality Attributes,
Software Quality Metrics and Indicators, The SEI Capability Maturity Model CMM), SQA
Activities, Formal SQA Approaches: Proof of correctness, Statistical quality assurance,
Clean
room process.
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in the
course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web ofScience and SCOPUS indexed journals as well as high impact factor
conferences as well as symposiums. Discussion on some of the latest products available
in the market based onthe areas covered in the course and patents filed in the areas covered
in the course.
List of Experiments
2. Project Schedule preparation. Software Requirement Analysis: Describe the individual Phases/
modules of the project, Identify deliverables
. 3. Use Case diagram, Class Diagram, Sequence Diagram, Activity Diagram and prepare Software
Design Document using tools like Rational Rose.( For standard application problems)
4. Software Development and Debugging. Estimation of project size using Function Point(FP) for
calculation.
5. Design Test Script/Test Plan(both Black box and White Box approach) 6. Compute
Process and Product Metrics (e.g Defect Density, Defect Age, Productivity, Cost etc.) Cost
Estimation models. COCOMO
Theory Practical
Corequisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
2. Explain the motive and causes for cybercrime , detection and handling.
1 Sunit Belapure and Nina Godbole, “Cyber Security: Understanding Cyber Crimes,
Computer Forensics And Legal Perspectives”, Wiley India Pvt Ltd, ISBN: 978-81-265-
21791, Publish Date 2013
2 Dr. Surya Prakash Tripathi, Ritendra Goyal, Praveen Kumar Shukla, KLSI.
“Introduction to information security and cyber laws”. Dreamtech Press. ISBN:
9789351194736, 2015
2 James Graham, Ryan Olson, Rick Howard, “Cyber Security Essentials”, CRC Press,
15- Dec 2010.
3 Anti- Hacker Tool Kit (Indian Edition) by Mike Shema, Publication Mc Graw Hill.
Course Contents:
Mobile and Wireless Devices: Introduction, Proliferation of Mobile and Wireless Devices,
Trends in Mobility, Credit Card Frauds in Mobile and Wireless Computing Era, Security
Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication
Service Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security Implications for
organizations, Organizational Measures for Handling Mobile, Organizational Security Policies
and Measures in Mobile Computing Era, Laptops.
Introduction, Proxy Servers and Anonymizers, Phishing, Password Cracking, Keyloggers and
Spywares, Virus and Worms, Trojan-horses and Backdoors, Steganography, DoS and DDoS
Attacks, SQL Injection, Buffer Overflow, Attacks on Wireless Networks. Phishing and Identity
Theft: Introduction to Phishing, Identity Theft (ID Theft).
Introduction, Digital Forensics Science, The Need for Computer Forensics, Cyberforensics and
Digital Evidence, Forensics Analysis of E-Mail, Digital Forensics Life Cycle, Chain of Custody
Concept, Network Forensics, Approaching a Computer Forensics Investigation, Setting up a
Computer Forensics Laboratory: Understanding the Requirements, Computer Forensics and
Steganography, Relevance of the OSI 7 Layer Model to Computer Forensics, Forensics and
Social Networking Sites: The Security/Privacy Threats, Computer Forensics from Compliance
Perspective, Challenges in Computer Forensics, Special Tools and Techniques, Forensics
Auditing, Antiforensics.
Unit V : SECURITY POLICIES AND CYBER LAWS
9 Hours
Need for An Information Security Policy, Information Security Standards – ISO, Introducing
Various Security Policies and Their Review Process, Introduction to Indian Cyber Law,
Objective and Scope of the IT Act, 2000, Intellectual Property Issues, Overview of Intellectual -
Property – Related Legislation in India, Patent, Copyright, Law Related to Semiconductor Layout
and Design, Software License.
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in
the course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed
in the areas covered in the course.
LIST OF PRACTICALS:
1. Implementation to gather information from any PC’s connected to the LAN using
whois,port scanners, network scanning, Angry IP scanners etc.
3. Implementation of Steganography.
9. Implementation of Mobile Audit and generate the report of the existing Artiacts.
10. Implementation of Cyber Forensics tools for Disk Imaging, Data acquisition, Data
extraction and Data Analysis and recovery
Theory Practical
Internal Mid End ETE Total
Assessmen Term Term Marks
(Continuous
t (IA) Test Test Assessment
(MTE (ETE) ) IA
)
2 15 3 1 2 100
0 0 5 0
Prerequisite
Co requisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
The primary objective of this course is to introduce the topic of optimization techniques as
a precise mathematical concept, and study how to apply in engineering design, establish
their correctness, study their efficiency and performance analysis. The course consists of a
strong mathematical component in addition to the design of various techniques for
constrained and unconstrained problems.
Course Outcomes
CO Formulate the design problem in mathematical form which can be solved by suitable
2 optimization algorithm
1 Raju, N.V.S. (2014) Optimization methods for Engineers, PHI Publications, ISBN-978-81-
203- 4744-1.
Course Contents:
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in
the course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed
in the areas covered in the course.
Unit I:Unit -I: Origin & Development of Operations Techniques 4 lecture hours
CPM & PERT-Network minimization, shorter route problem, maximal – flow problem,
Project scheduling, critical path calculation, PERT Calculation
Unit VI: The advances and the latest trends in the course as well as the latest applications
of the areas covered in the course. The latest research conducted in the areas covered in
the course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact factor
conferences as well as symposiums. Discussion on some of the latest products available
in the market based on the areas covered in the course and patents filed in the areas
covered in the course.
Course Outcome
After the completion of the course, the students will be able to:
· Understand operation research modeling,
· Formulate and solve linear programming problems.
· Solve the problems on networks models such as Transportation, Assignment,
· Solve the problems of Project Management using CPM and PERT
Theory Practical
2 15 3 1 2 100
0 0 5 0
Name of The Course Artificial Intelligence
Prerequisite
Co requisite
Antirequisite
L T P C
3 0 0 3
Course Outcomes: At the end of the course student will be able to:
1. Analyze the dimensions along which agents and environments.
Text Books:
Reference Books
References:
1. Stuart Russell, Peter Norvig, “Artificial Intelligence – A Modern Approach”, Pearson
Education
2. E Charniak and D McDermott, “Introduction to Artificial Intelligence”, Pearson
Education
3. Dan W. Patterson, “Artificial Intelligence and Expert Systems”, Prentice Hall of India,
LIST OF PRACTICALS
2 15 3 1 2 100
0 0 5 0
Prerequisite
Co requisite
Antirequisite
L T P C
2 0 0 2
Course Objectives:
3. To enhance mathematical reasoning skills and apply them for problem solving
CO1 Demonstrate corporate skills required in a real life scenario using simulated
environment.
CO2 Enabling the students to germinate ideas, nurture them and take them to logical
conclusion with the help of various resources and real life situations.
CO3 Demonstrate skills required to participate in a simulated environment that helps learners build know
and deliver collaboratively.
CO4 Demonstrate effective writing skills for a variety of professional and corporate settings.
50 50 100
BCSE2 Tech 0 0 4 4 2 - - - 7 3 1
089 nical 0 0 0
0
Trai
ning-
I
BCSE2 Industrial/Sum
2 - - - 7 3 10
090 mer Training - 0 0 0 0
0 0 0
I
SEMESTER -IV
Prerequisite
Corequisite
Antirequisite
L T P C
2 0 0 2
Course Objectives:
.
Course Outcomes
U 7
n
i
t
I
I
:
G
r
a
m
m
a
r
l
e
c
t
u
r
e
s
● P
h
r
a
s
a
l
V
e
r
b
s
● S
u
b
j
e
c
t
V
e
r
b
A
g
r
e
e
m
e
n
t
● P
a
r
a
l
l
e
l
i
s
m
a
n
d
M
o
d
i
f
i
e
r
s
● I
d
i
o
m
s
a
n
d
P
h
r
a
s
e
s
● T
e
n
s
e
s
● C
o
m
m
o
n
e
r
r
o
r
s
i
n
E
n
g
l
i
s
h
50 50 100
Prerequisite
Corequisite
Antirequisite
L T P C
2 0 2 3
Course Objectives:
1. To understand the services provided by and the design of an operating
system.
2. To understand the structure and organization of the file system.
Course Outcomes
C Analyze the concept of memory management and paging concept in operating system.
O
4
C Demonstrate the learnt knowledge with a optimized solution in the
O functions like memory management, I/O management and various
5 scheduling algorithms and takecare of deadlocks.
Theory Practical
2 15 3 1 2 100
0 0 5 0
Name of The Course Design & Analysis of Algorithms
L T P C
3 0 0 3
Course Objectives:
The primary objective of this course is to introduce the topic of algorithms as a precise mathematical
concept, and study how to design algorithms, establish their correctness, study their efficiency and
memory needs. The course consists of a strong mathematical component in addition to the design of
various algorithms.
Course Outcomes
CO Analyze the complexity of the algorithms and use technique divide and conquer
1 to solve the problems
CO Identify feasible solutions for different problems through greedy method and
2 minimize the solutions space and to solve the problems through dynamic
programming.
3 Aho, Hopcraft, Ullman, “The Design and Analysis of Computer Algorithms” Pearson
Education.
Course Contents:
Advanced Data Structures: Red-Black trees, B – trees, Binomial Heaps, Fibonacci Heaps.
Divide and Conquer with examples such as Sorting, Matrix Multiplication, Convex hull and
Searching. Greedy methods with examples Huffman Coding, Knapsack, Minimum Spanning
trees –
Prim’s and Kruskal’s algorithms, Single source shortest paths - Dijkstra’s and Bellman Ford
algorithms.
Dynamic programming with examples such as Knapsack, All pair shortest paths – Warshal’s and
Floyd’s algorithms, Resource allocation problem. Backtracking, Branch and Bound with examples
such as Travelling Salesman Problem, Graph Coloring, n-Queen Problem, Hamiltonian Cycles and
Sum of subsets.
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in the
course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed in the areas
covered in the course.
Prerequisite
Co requisite
Antirequisite
L T P C
0 0 2 1
Course Objectives:
To identify and apply the concept of computational intractability.
Course Outcomes
2. RCT Lee, SS Tseng, RC Chang and YT Tsai, “Introduction to the Design and Analysis
5. Aho, Hopcraft, Ullman, “The Design and Analysis of Computer Algorithms” Pearson
Education, 2008.
List of Experiments:
1. Write a program to sort given set of numbers in ascending/descending order using
Bubblesort and also search a number using binary search.
2 15 3 1 2 100
0 0 5 0
Name of The Course Computer Graphics
Prerequisite CPPS in C
Corequisite NA
Antirequisite NA
L T P C
2 0 2 3
Course Outcomes
Types of computer graphics, Graphic Displays- Random scan displays, Raster scan
displays, Frame buffer and video controller, Points and lines, Line drawing algorithms,
Circle generating algorithms, Midpoint circle generating algorithm, and parallel
version ofthese algorithms.
Hidden Lines and Surfaces: Back Face Detection algorithm, Depth buffer method, A-
buffermethod, Scan line method, basic illumination models – Ambient light, Diffuse
reflection, Specular reflection and Phong model, Combined approach, Warn model,
Intensity
Attenuation, Color consideration, Transparency and Shadows.
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in
the course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed in
the areas covered in the course.
L
i
s
t
o
f
E
x
p
e
r
i
m
e
n
t
s
(
C
o
m
p
u
t
e
r
G
r
a
p
h
i
c
s
L
a
b
)
Implementation of Algorithms for drawing 2D Primitives – Line (DDA,
Bresenham) –all slopes Circle (Midpoint)
2D Geometric transformations – Translation Rotation Scaling
Reflection ShearWindow-Viewport
Composite 2D Transformations
3D Transformations - Translation, Rotation, Scaling.
3D Projections – Parallel, Perspective.
Creating 3D Scenes.
Image Editing and Manipulation - Basic Operations on image using any image
editingsoftware, Creating gif animated images, Image optimization.
2D Animation – To create Interactive animation using any authoring tool
1 Internet of Things 2 0 2 3
2 Data Sciences 2 0 2 3
Course Code
Prerequisite Theoretical understanding of basic electronics.
Antirequisite None
L T P C
0 0 2 1
UNIT - I Introduction to Internet of Things –Definition and Characteristics of IoT, Physical Design
of IoT – IoT Protocols, IoT communication models, Iot Communication APIs, IoT enabled
Technologies
– Wireless Sensor Networks, Cloud Computing, Big data analytics, Communication protocols,
Embedded Systems, IoT Levels and Templates, Domain Specific IoTs – Home, City, Environment,
Energy, Retail, Logistics, Agriculture, Industry, health and Lifestyle.
UNIT - II IoT and M2M – Software defined networks, network function virtualization, difference
between SDN and NFV for IoT. Basics of IoT System Management with NETCOZF, YANG-
NETCONF, YANG, SNMP NETOPEER.
UNIT - III Introduction to Python - Language features of Python, Data types, data structures,
Control of flow, functions, modules, packaging, file handling, data/time operations, classes,
Exception handling. Python packages - JSON, XML, HTTP Lib, URL Lib, SMTP Lib. R16
B.TECH CSE.
UNIT - IV IoT Physical Devices and Endpoints - Introduction to Raspberry PI - Interfaces (serial,
SPI, I2C). Programming – Python program with Raspberry PI with focus of interfacing external
gadgets, controlling output, reading input from pins.
UNIT - V IoT Physical Servers and Cloud Offerings – Introduction to Cloud Storage models and
communication APIs. Web server – Web server for IoT, Cloud for IoT, Python web application
framework. Designing a RESTful web API
Course Code
Antirequisite None
L T P C
0 0 2 1
Course Objectives:
To be able to design IOT frameworks for automation system applications using arduino,
IntelGalileo Gen 2 and raspberry pi boards.
Course Outcomes
4. Cuno Pfister, Getting Started with the Internet of Things, O‟Reilly Media,
2011, ISBN:978-1-4493- 9357-1
1. Introduction to various sensors and various actuators & its Application (Students
have toprepare Report for the same).
c) Moisture Sensor.
d) Temperature Sensor.
e) Touch Sensor.
f) Infrared Sensor.
g) Servo Moto.
h) RFID Sensor.
i) Bluetooth Module.
j) Wi-Fi Module.
2. Perform Experiment using Arduino Uno to measure the distance of any object
usingUltrasonic Sensor.
3. Create a circuit using Arduino and sensors. Perform experiment using Arduino
Uno toLearn Working of Servo Motor
11. Experiment on Interfacing light sensor with Intel Galileo Gen 2 and
sending data
to mobile application via Bluetooth.
Theory Practical
L T P C
3 0 0 3
Course Objectives:
The primary objective of this course is to develop both theoretical knowledge on data
analysis skills, which can be applied to practical problems for explain how math and
information sciences can contribute to building better algorithms and software. To develop
applied experience with data science software, programming, applications and processes.
Course Outcomes
1 Data Science from Scratch: First Principles with Python 1st Edition, by Joel
Grus ,O’Reilly Publication,2020.
2 Data Science and Big Data Analytics: Discovering, Analyzing, Visualizing and
PresentingData, EMC Education Services , 2015.
3 Murphy, K. Machine Learning: A Probabilistic Perspective. - MIT Press, 2012
Course Contents:
Unit VI: The advances and the latest trends in the course as well as the latest applications of
the areas covered in the course. The latest research conducted in the areas covered in the course.
Discussion of some latest papers published in IEEE transactions and ACM transactions, Web of
Science and SCOPUS indexed journals as well as high impact factor conferences as well as
symposiums. Discussion on some of the latest products available in the market based on the
areas covered in the course and patents filed in the areas covered in the course.
LIST OF PRACTICALS:
5. Write a programme in Python to indentify the tweets which are hate tweets and
which arenot.
7. Mini project to predict the time taken to solve a problem given the current
status of theuser.
Prerequisite
Co requisite
Antirequisite
L T P C
0 0 2 1
COURSE OUTCOME:
CO1: Knowledge in the basic concepts of data warehousing and data mining.
CO2: Ability to create large multidimensional data storage and carry out OLAP operations.
CO3: Ability to apply the concepts, algorithm, techniques and tools for developing practical
applications.
Unit –I: Overview, Definition, Data Warehousing Components, Building a Data Warehouse,
Warehouse Database, Mapping the Data Warehouse to a Multiprocessor Architecture,
Difference between Database System and Data Warehouse, Multi Dimensional Data Model,
Data Cubes, Stars, Snow Flakes, Fact Constellations.
UNIT II: Data Warehouse Process and Technology: Warehousing Strategy, Warehouse
/management and Support Processes, Warehouse Planning and Implementation, Hardware and
Operating Systems for Data Warehousing, Client/Server Computing Model & Data
Warehousing. Parallel Processors & Cluster Systems, Distributed DBMS implementations,
Warehousing Software, Warehouse Schema Design, 08
UNIT III Data Mining: Overview, Motivation, Definition & Functionalities, Data Processing,
Form of Data Pre-processing, Data Cleaning: Missing Values, Noisy Data, (Binning,
Clustering, Regression, Computer and Human inspection), Inconsistent Data, Data Integration
and Transformation. Data Reduction:-Data Cube Aggregation, Dimensionality reduction, Data
Compression, Numerosity Reduction, Discretization and Concept hierarchy generation,
Decision Tree.
UNIT IV Classification: Definition, Data Generalization, Analytical Characterization,
Analysis of attribute relevance, Mining Class comparisons, Statistical measures in large
Databases, Statistical-Based Algorithms, Distance-Based Algorithms, Decision Tree-Based
Algorithms. Clustering: Introduction, Similarity and Distance Measures, Hierarchical and
Partitioned Algorithms. Hierarchical Clustering- CURE and Chameleon. Density Based
Methods DBSCAN, OPTICS. Grid Based Methods- STING, CLIQUE. Model Based Method
– Statistical Approach, Association rules: Introduction, Large Item sets, Basic Algorithms,
Parallel and Distributed Algorithms, Neural Network approach.
UNIT V Data Visualization and Overall Perspective: Aggregation, Historical information,
Query Facility, OLAP function and Tools. OLAP Servers, ROLAP, MOLAP, HOLAP, Data
Mining interface, Security, Backup and Recovery, Tuning Data Warehouse, Testing Data
Warehouse. Warehousing applications and Recent Trends: Types of Warehousing
Applications, Web Mining, Spatial Mining and Temporal Mining.
Unit VI: The advances and the latest trends in the course as well as the latest applications of the
areas covered in the course. The latest research conducted in the areas covered in the course.
Discussion of some latest papers published in IEEE transactions and ACM transactions, Web
of Science and SCOPUS indexed journals as well as high impact factor conferences as well as
symposiums. Discussion on some of the latest products available in the market based on the
areas covered in the course and patents filed in the areas covered in the course.
REFRENCES:
1. Alex Berson, Stephen J. Smith “Data Warehousing, Data-Mining & OLAP”, TMH
It is expected that student should implement concept of Data Mining and Warehousing.
The open source Data Mining Tools like Rapid Miner, Weka etc. can be used to implement
the concept of Data Mining and Warehousing. Some examples are as follows (Subject
Teacher may add more):
10. Demonstration of clustering rule process on data-set iris.arff using simple k-means.
Prerequisite
Co-requisite
Anti-requisite
L T P C
3 0 0 3
Course Objectives:
Course Outcomes
Course Contents:
Course Code
Prerequisite
Co-requisite
Anti-requisite
List of Experiments
1. Get five nucleotide and five protein sequences in FASTA format from NCBI and EMBL.
2. To find out five similar sequences for any nucleotide and protein query sequence
usingBLAST and FASTA.
3. Access and use of different online nucleotide and protein alignment tools (Pairwise
andMultiple sequence alignment).
4. Genes and Exons identification related search for a given genome sequence in
order topredict the gene.
6. Secondary structure prediction for given amino acid sequences of a given protein
usingChou Fasman, GOR method and Neural Network method.
Prerequisite
Co requisite
Antirequisite
L T P C
0 0 2 1
Course Objectives:
Course Outcomes
Course Code
Prerequisite
Co requisite
Antirequisite
List of Experiments:
4 Block Chain 2 0 2 3
5 Software Defined Network 2 0 2 3
Prerequisite
Co requisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
The primary objective of this course is to introduce the topic of algorithms as a precise
mathematical concept, and study how to design algorithms, establish their correctness, study their
efficiency and memory needs. The course consists of a strong mathematical component in addition
to the design of various algorithms.
Course Outcomes
CO To analyze and trouble shoot the problems while deploying application on cloud
2
CO Use web application based technologies for developing application using cloud
3
CO Use public cloud like IBM Blue mix, Amazon AWS, Google cloud platform or
4 Microsoft Azure for developing an application
2 Henry Li, “Introducing Windows Azure” Apress; 1 edition [ISBN: 978-1- 4302-2469-3],2009
3 Eugenio Pace, Dominic Betts, Scott Densmore, Ryan Dunn, Masashi Narumoto,
MatiasWoloski, Developing Applications for the Cloud on the Microsoft
Windows Azure Platform [ISBN: 9780735656062]
Course Contents:
Unit-1: Cloud Based Applications 9 hours
Introduction, Contrast traditional software development and development for the cloud. Public
v private cloud apps. Understanding Cloud ecosystems – what is SaaS/PaaS, popular APIs,
mobile.
Class and Method design to make best use of the Cloud infrastructure; Web Browsers
and the Presentation Layer: Understanding Web browsers attributes and differences.
Building blocks of the presentation layer: HTML, HTML5, CSS, Silverlight, and Flash.
Building Ajax controls, introduction to Javascript using JQuery, working with JSON,
XML, REST. Application development Frameworks e.g. Ruby on Rails , .Net, Java API's
or JSF; Deployment Environments – Platform As A Service (PAAS) ,Amazon, vmForce,
Google App Engine, Azure, Heroku, AppForce
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in
the course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed
in the areas covered in the course.
Prerequisite
Co requisite
Antirequisite
1 Install Oracle Virtual box and create two VMs on your laptop.
2 Install Turbo C in guest OS and execute C program.
3 3 Test ping command to test the communication between
the guest OSand Host OS
4 Install Hadoop single node setup.
5 5 Hopkinson‘s test on DC shunt machines.
6 Develop hadoop application to count no of characters, no
of words andeach character frequency.
7 Develop hadoop application to process given data and
produce resultssuch as finding the year of maximum
usage, year of minimum usage.
8 Develop hadoop application to process given data and
produce resultssuch as how many female and male
students in both schools the resultsshould be in following
format. GP-F #number GP-M #numbers MS-F #number
MS-M #number.
9 Establish an AWS account. Use the AWS
Management Console tolaunch an EC2 instance
and connect to it.
10 Design a protocol and use Simple Queue Service(SQS)to
implement thebarrier synchronization after the first phase .
11 Use the Zookeeper to implement the coordination model in Problem ;
12 Develop a Hello World application using Google App Engine.
13 Develop a Guestbook Application using Google App Engine
14 Develop a Windows Azure Hello World application using.
15 15 Create a Mashup using Yahoo! Pipes.
2 15 3 1 2 100
0 0 5 0
Name of The Course Adhoc & Sensor Networks
L T P C
3 0 0 3
Course Objectives:
▪ The student should be made to:
Learn Ad hoc network and Sensor Network fundamentals
understand the different routing protocols
have an in-depth knowledge on sensor network architecture and design issues understand
the transport layer and security issues possible in Ad hoc and Sensor networks Have an
exposure to mote programming platforms and tools
Course Outcomes
CO Apply this knowledge to identify the suitable routing algorithm based on the network and user
2 requirement
CO Apply the knowledge to identify appropriate physical and MAC layer protocols
3
CO Understand the transport layer and security issues possible in Ad hoc and sensor networks.
4
CO Be familiar with the OS used in Sensor Networks and build basic modules
5
1 Ad Hoc and Sensor Networks — Theory and Applications, Car/os Corderlo Dharma R Aggarwal,
World Scientific Publications /Cambridge University Press, March 2018
2 Wireless Sensor Networks: An Information Processing Approach, Feng Zhao, Leonidas Guibas,
Elsevier Science imprint, Morgan Kauffman Publishers, 2005, rp 2017.
3 C. Siva Ram Murthy, and B. S. Manoj, "Ad hoc Wireless Networks: Architectures and Protocols ",
Prentice Hall Professional Technical Reference, 2016.
2 Wireless Sensor Networks — Principles and Practice, Fei Hu, Xiaojun Cao,
An Auerbachbook, CRC Press, Taylor & Francis Group, 2017
Course Contents:
Unit-1: Introduction 9
h
o
u
r
s
Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive
routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer
solutions-TCP over Ad hoc wireless Networks.
single node architecture: hardware and software components of a sensor node - WSN
Network architecture: typical network architectures-data relaying and aggregation
strategies -MAC layer protocols: self-organizing, Hybrid TDMA/FDMA and CSMA based
MAC- IEEE 802.15.4.
Issues in WSN routing – OLSR- Localization – Indoor and Sensor Network Localization-absolute
and relative localization, triangulation-QOS in WSN-Energy Efficient Design-Synchronization-
Transport Layer issues.
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in
the course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed in
the areas covered in the course.
L T P C
3 0 0 3
Theory Practical
2 15 3 1 2 100
0 0 5 0
Name of The Course Statistical Analysis using R
Prerequisite
Corequisite
Antirequisite
L T P C
3 0 0 3
Course Objectives: This is an introductory course on how to use the R programming language
and software environment for data manipulations and munging, exploratory data analysis and
data visualizations.
Course Outcomes
CO Students will be familiar to the R ecosystem and learn how to use R for the most
3 common data analysis tasks, including loading, cleaning, transforming, summarizing
and visualizing data.
1 Ugarte, M.D., Militino, A.F., Arnholt, A.T. (2008). Probability and Statistics with R. CRC
Press.
Course Contents:
Subdivided Bar Plots and Pie Diagrams, 3D Pie Diagram and Histogram-Kernel Density and Stem
- Leaf Plots- Arithmetic Mean- Median- Quantiles-Mode, Geometric Mean and Harmonic Mean.
Absolute Deviation and Absolute Mean Deviation- Range, Interquartile Range and Quartile
Deviation- Mean Squared Error, Variance and Standard Deviation-Coefficient of Variation and
Boxplots. Raw and Central Moments-Skewness and Kurtosis. Univariate and Bivariate Scatter
Plots.
Least Squares Method - R Commands and More than One Variables-Extending R with add-on
packages and the R-ecosystem. Dynamic and web reporting: Knitr and Shiny. Running R as part of
a business pipeline—the R terminal. Simulation I.
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in the
course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed in the areas
covered in the course.
Continuous Assessment Pattern:
Theory Practical
2 15 3 1 2 100
0 0 5 0
Co requisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
The primary objective of this course is to cover the technical aspects of crypto currencies, block
chain technologies, and distributed consensus. The potential applications for Bit coin-like crypto
currencies are enormous. The course will enable an individual to learn, how these systems work and
how to engineer secure software that interacts with the Bit coin network and other crypto currencies.
C Familiarise the functional/operational aspects of crypto currency ECOSYSTEM
O
1
1. Melanie Swan, “Block Chain: Blueprint for a New Economy”, O’Reilly, 2015
2. Josh Thompsons, “Block Chain: The Block Chain for Beginners- Guide to Block chain
Technology and Leveraging Block Chain Programming”
4. Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
6. Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build Smart Contracts for
Ethereum and Block Chain”, Packt Publishing
7. Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O’Dowd, Venkatraman
Ramakrishna, “Hands-On Block Chain with Hyperledger: Building Decentralized Applications
with Hyperledger Fabric and Composer”, Import, 2018
2 J.A.Garay et al, The bitcoin backbone protocol - analysis and applications EUROCRYPT 2015 LNCS VOl 9057, (
281-310.
3 R.Pass et al, Analysis of Block chain protocol in Asynchronous networks , EUROCRYPT 2017
Course Contents:
The consensus problem - Asynchronous Byzantine Agreement - AAP protocol and its analysis -
Nakamoto Consensus on permission-less, nameless, peer-to-peer network - Abstract Models for
BLOCKCHAIN - GARAY model - RLA Model - Proof of Work ( PoW) as random oracle - formal
treatment of consistency, liveness and fairness - Proof of Stake ( PoS) based Chains - Hybrid
models ( PoW + PoS) .
Ethereum - Ethereum Virtual Machine (EVM) - Wallets for Ethereum - Solidity - Smart
Contracts - some attacks on smart contracts.
LIST OF PRACTICALS
1. Install and understand Docker container, Node.js, Java and Hyperledger Fabric,
Ethereum and perform necessary software installation on local machine/create instance
on Cloud to run. https://github.com/hyperledger/ https://docs.docker.com/get-
started/https://console.ng.bluemix.net/docs/services/block chain/index.html.
2.Create and deploy a block chain network using Hyperledger Fabric SDK for Java Set up and
initialize the channel, install and instantiate chain code, and perform invoke and query on your
block chain network (https://developer.ibm.com/patterns/create-and-deploy-block chain-
network-using- fabric-sdk-java/)
3. Interact with a block chain network. Execute transactions and requests against a
block chain network by creating an app to test the network and its rules
(https://developer.ibm.com/patterns/interacting-with-a-block chain-network/)
4. Deploy an asset-transfer app using block chain. Learn app development within a Hyperledger
Fabric network (https://developer.ibm.com/patterns/deploy-an-asset-transfer-app-using-block
chain/).
5. Use block chain to track fitness club rewards Build a web app that uses Hyperledger Fabric to
track and trace member rewards (https://developer.ibm.com/patterns/fitness-club-rewards-points-
iot-and- retail-integration/)
6. Car auction network: A Hello World example with Hyperledger Fabric Node SDK and IBM
Block chain Starter Plan. Use Hyperledger Fabric to invoke chaincode while storing results and
data in the starter plan (https://developer.ibm.com/patterns/car-auction-network-hyperledger-
fabric-node-sdk- starter-plan/)
7. Develop an IoT asset tracking app using Block chain. Use an IoT asset tracking device to
improve a supply chain by using Block chain, IoT devices, and Node-RED
(https://developer.ibm.com/patterns/develop-an-iot-asset-tracking-app-using-block chain/)
8. Secure art using block chain digital certificates. Node.js-based auction application can help
democratize the art market (https://developer.ibm.com/patterns/securing-art-using-block chain-
digital- certificates/)
(i) Block chain for telecom roaming, fraud, and overage management. See how communication
service providers use block chain to enhance their value chains.
https://developer.ibm.com/patterns/block chain-for-telecom-roaming-fraud-and-
overagemanagement/
(ii) Use IoT dashboards to analyze data sent from a Block chain network. Build an IoT app
and IoT dashboards with Watson IoT Platform and Node-RED to analyze IoT data sent from
a Block chain network https://developer.ibm.com/patterns/iot-dashboards-analyze-data-block
chain-network/) (iii) Create an Android app with Block chain integration. Build a Block
chain enabled health and fitness app with Android and Kubernetes
https://developer.ibm.com/patterns/create-an-android-app-with- block chain-integration/
(iv) Create a global finance block chain application with IBM Block chain Platform Extension
for VS Code. Develop a Node.js smart contract and web app for a Global Finance with block
chain use case https://developer.ibm.com/patterns/global-financing-use-case-for-block chain/
(v) Develop a voting application using Hyperledger and Ethereum. Build a decentralized app that
combines Ethereum's Web3 and Solidity smart contracts with Hyperledger's hosting Fabric and
Chaincode EVM https://developer.ibm.com/patterns/voting-app-hyperledger-ethereum/
(vi) Create a block chain app for loyalty points with Hyperledger Fabric Ethereum Virtual Machine.
Deploy Fabric locally with EVM and create a proxy for interacting with a smart contract through a
Node.js web app https://developer.ibm.com/patterns/loyalty-points-fabric-evm/
Continuous Assessment Pattern:
Theory Practical
2 15 3 1 2 100
0 0 5 0
Prerequisite
Corequisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
This course introduces software defined networking, an emerging paradigm in computer networking
that allows a logically centralized software program to control the behaviour of an entire network.
Course Outcomes
CO Expand upon the knowledge learned and apply it to solve real world problems.
5
2 SDN - Software Defined Networks by Thomas D. Nadeau & Ken Gray, O'Reilly,
2013
1 Feamster, Nick, Jennifer Rexford, and Ellen Zegura. "The road to SDN: an intellectual
history of programmable networks." ACM SIGCOMM Computer Communication
Review 44.2
(2014): 87-98.
3 Nunes, Bruno AA, et al. "A survey of software-defined networking: Past, present, and
future of programmable networks." Communications Surveys & Tutorials, IEEE 16.3
(2014): 1617- 1634
4 Lantz, Bob, Brandon Heller, and Nick McKeown. "A network in a laptop: rapid
prototyping for software-defined networks." Proceedings of the 9th ACM SIGCOMM
Workshop on Hot Topics in Networks. ACM, 2010
6 https://www.coursera.org/learn/sdn#
http://www.cs.fsu.edu/~xyuan/cis5930/
Course Contents:
Unit I: Introduction to SDN 9 hours
SDN Origins and Evolution – Introduction – Why SDN? - Centralized and Distributed
Control and Data Planes - The Genesis of SDN
How SDN Works - The Open flow Protocol - SDN Controllers: Introduction - General
Concepts - VMware - Nicira - VMware/Nicira - OpenFlow-Related - Mininet - NOX/POX
- Trema - Ryu - Big Switch Networks/Floodlight - Layer 3 Centric - Plexxi - Cisco OnePK
SDN in the Data Center - SDN in Other Environments - SDN Applications - SDN Use
Cases - The Open Network Operating System 3
Unit VI: The advances and the latest trends in the course as well as the latest applications ofthe
areas covered in the course. The latest research conducted in the areas covered in the course.
Discussion of some latest papers published in IEEE transactions and ACM transactions, Web of
Science and SCOPUS indexed journals as well as high impact factor conferences as well as
symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed in the areas
covered in the course.
2 15 3 1 2 100
0 0 5 0
SEMESTER V
Prerequisite
Co requisite
Antirequisite
24 sessions of 100 L T P C
minutes each, 12
hours of online tests
3 0 4 2
Course Objectives:
● Enhance formal writing skills
● To understand soft-skills pertaining to industry
Course Outcomes
CO1 Able to develop a logical thought process related to every aspect of life
CO2 Able to widen the horizon of one’s thought process and data analysis skill
CO3 Able to interpret data and convert it into information
● CommunicationSkillsforEngineers, Mishra,Sunita&C.Muralikrishna,,Pearson
● CorporateSoftskills,SarveshGulati,2006.
● DevelopingCommunicationSkills,KrishnaMohanandMeeraBannerji,Ma
cmillan IndiaLtd.1990
L T P C
3 0 0 3
Course Objectives:
The primary objective of this course is to introduce the topic of algorithms as a precise mathematical
concept, and study how to design algorithms, establish their correctness, study their efficiency and
memory needs. The course consists of a strong mathematical component in addition to the design of
various algorithms.
Course Outcomes
CO Analyze the complexity of the algorithms and use technique divide and conquer
1 to solve the problems
CO Identify feasible solutions for different problems through greedy method and
2 minimize the solutions space and to solve the problems through dynamic
programming.
3 Aho, Hopcraft, Ullman, “The Design and Analysis of Computer Algorithms” Pearson
Education.
Course Contents:
Divide and Conquer with examples such as Sorting, Matrix Multiplication, Convex hull and
Searching. Greedy methods with examples Huffman Coding, Knapsack, Minimum Spanning
trees – Prim’s and Kruskal’s algorithms, Single source shortest paths - Dijkstra’s and Bellman
Ford
algorithms.
Dynamic programming with examples such as Knapsack, All pair shortest paths – Warshal’s
and Floyd’s algorithms, Resource allocation problem. Backtracking, Branch and Bound with
examples such as Travelling Salesman Problem, Graph Coloring, n-Queen Problem,
Hamiltonian Cycles and Sum of subsets.
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in
the course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed in
the areas covered in the course.
Prerequisite
Co requisite
Antirequisite
L T P C
0 0 2 1
Course Objectives:
To identify and apply the concept of computational intractability.
Course Outcomes
2. RCT Lee, SS Tseng, RC Chang and YT Tsai, “Introduction to the Design and Analysis
5. Aho, Hopcraft, Ullman, “The Design and Analysis of Computer Algorithms” Pearson
Education, 2008.
List of Experiments:
Theory Practical
Prerequisite
L T P C
3 0 0 3
Course Objectives: The scope of the course is concerns with the stages of the software engineering
process, including requirements gathering, specification, design, implementation, and testing.
Students will teach the various the testing techniques.
Course Outcomes:
CO Understand the key concerns that are common to all software development processes.
1
CO Able to elicit requirements for a software product and translate these into a
3 documented design.
CO Understand the principles and techniques underlying the process of inspecting and
5 testing software and making it free of errors and tolerable.
Testing Objectives ,Faults, Errors, and Failures, Basics of software testing, Testing objectives,
Principles of testing, Requirements, behavior and correctness, Testing and debugging, Test
metrics and measurements, Verification, Validation and Testing, Types of testing, Software
Quality and
Structural Testing (White Box Testing), Functional Testing (Black Box Testing), Integration
Testing, , Regression Testing, Testing for Functionality and Testing for Performance, Top-Down
and Bottom- Up, Acceptance Testing ,Alpha and Beta Testing of Products. Static Testing
Strategies: Formal Technical Reviews (Peer Reviews), Walk Through, Regression testing,
Regression test process, Initial Smoke or Sanity test, Tools for regression testing, Ad hoc
Testing: Pair testing, Exploratory testing, Iterative testing, Defect seeding.
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in
the course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed in
the areas covered in the course.
L T P C
0 0 2 1
Course Objectives:
Course Outcomes
10. Demonstration on Beta testing. Make a Case Based study on the experiment
11. Demonstration on User Acceptance testing. Make a Case Based study on the
experiment
Theory Practical
Prerequisite
Co requisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
This course focuses on 2D and 3D interactive and non-interactive graphics. This course
studies the principles underlying the generation and display of 2D and 3D computer graphics.
In this course topics include geometric modeling, 3D viewing and projection, lighting and
shading, color, and the use of one or more technologies and packages such as OpenGL, and
Blender. Course requirements usually include exam and several programming or written
homework assignments.
Course Outcomes
1 Donald Hearn and M Pauline Baker, “Computer Graphics C Version”, Pearson Education,
India; 2 edition 2002.
2 Computer Graphics Principles and Practice, Second Edition in C, James D.Foley, Andries
Van Dam, Steven K.Feiner, JhonF.Hughes, Addison Wesley, Third Edition, 2014.
Types of computer graphics, Graphic Displays- Random scan displays, Raster scan
displays, Frame buffer and video controller, Points and lines, Line drawing algorithms,
Circle generating
algorithms, Midpoint circle generating algorithm, and parallel version of these algorithms.
Unit-2Transformations 9 hours
Polygon clipping – Sutherland Hodgeman polygon clipping, Weiler and Atherton polygon
clipping, Curve clipping, Text clipping.
3-D geometric primitives, 3-D Object representation, 3-D Transformation, 3-D viewing,
projections, 3-D Clipping.
Unit-4Curves and Surfaces 9 hours
Quadric surfaces, Spheres, Ellipsoid, Blobby objects, Introductory concepts of Spline, Bspline
and Bezier curves and surfaces.
Unit VI: The advances and the latest trends in the course as well as the latest
applications of the areas covered in the course. The latest research conducted in
the areas covered in the course. Discussion of some latest papers published in IEEE
transactions and ACM transactions, Web of Science and SCOPUS indexed
journals as well as high impact factor conferences as well as symposiums.
Discussion on someof the latest products available in the market based on the areas
covered in the courseand patents filed in the areas covered in the course.
Course Code
Prerequisite
Corequisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
The primary objective of this course is to introduce the topic of Digital Signal Processing. Introduction
to digital signal processing and application, discrete time signals and structure of discrete time system.
Analysis of LTI systems, Filter designing techniques, DFT and FFT, Architecture of DSP Processors and
Multi-rate Signal Processing and applications.
Course Outcomes
CO Analyse discrete time signals in frequency domain and Design digital filters
3
3 “Digital Signal Processing: Principles, Algorithm & Application”, 4th edition, Proakis,
Manolakis, Pearson
Course Contents:
Overview: Signals, systems and signal processing, classification of signals, elements of digital
signal processing system, concept of frequency in continuous and discrete time signals, Periodic
Sampling, Frequency domain representation of sampling, Reconstructions of band limited
signals from its samples.
Unit II: Discrete-Time Signals and Analysis of Linear Time Invariant System
9hours
Discrete-Time Signals and Systems (Frequency Domain analysis): Z-transform & Inverse z-
transform, Linear convolution and its properties, Linear Constant Coefficient Difference
equations, Frequency domain representation of Discrete-Time Signals & Systems, Properties of
discrete time Fourier Transform, and correlation of signals, Fourier Transform Theorems.
Analysis of Linear Time Invariant System: Analysis of LTI systems in time domain System
functions for systems with linear constant-coefficient Difference equations
Unit III Structures for Discrete Time Systems and Filter Design Techniques 9 Hours
Unit VI: The advances and the latest trends in the course as well as the latest
applications ofthe areas covered in the course. The latest research conducted in the
areas covered in the
course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high
impact
Course Code
Corequisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
Course Outcomes
CO know techniques aimed to achieve the objective and expected results of a systems
3 development process
1 Grady Booch, James Rumbaugh, Ivar Jacobson : The Unified Modeling Language
User Guide,Pearson Education.
2 Hans-Erik Eriksson, Magnus Penker, Brian Lyons, David Fado: UML 2 Toolkit, WILEY-
DreamtechIndia Pvt. Ltd.
2 Pascal Roques: Modeling Software Systems Using UML2, WILEY- Dreamtech India Pvt. Ltd.
3 Appling UML and Patterns: An introduction to Object – Oriented Analysis and Design and
Unified Process, Craig Larman, Pearson Education.
Course Contents:
Unit I: UML DIAGRAMS 9 hours
Introduction to OOAD – Unified Process - UML diagrams – Use Case – Class Diagrams–
Interaction Diagrams – State Diagrams – Activity Diagrams – Package, component and
Deployment Diagrams.
Case study – the Next Gen POS system, Inception -Use case Modeling - Relating Use cases –
include, extend and generalization - Elaboration - Domain Models - Finding conceptual classes
and description classes – Associations – Attributes – Domain model refinement – Finding
conceptual class Hierarchies - Aggregation and Composition.
System sequence diagrams - Relationship between sequence diagrams and use cases
Logical architecture and UML package diagram – Logical architecture refinement - UML
class diagrams - UML interaction diagrams - Applying GoF design patterns
Mapping design to code – Testing: Issues in OO Testing – Class Testing – OO Integration Testing –
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in
the course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed
in the areas covered in the course.
Course Code
Corequisite
Antirequisite
L T P C
3 0 0 3
Course Objectives: To understand the advanced topics in the computer networks, with more emphasis
on the Internet architecture. To analyse the performance of different network functionalities.
Course Outcomes
CO4 Analyze various file systems and understand file server concepts.
CO5 Apply file server concepts in configuring server and its services
3 Bharat Bhusan , Understanding Linux , Khanna Publishing , Nai Sarak , New Delhi.
2 http://www.linuxstreet.net/articles/Samba/
http://news.samba.org/users/nine_user/
Unit-1 9 hours
Introduction to Operating Systems (Microsoft Windows, UNIX and Linux on the Desktop. Network Operating
Systems Overview). Network Setup and Management including Hardware/Software configuration of
Gateway, Routers, and Switches.
Unit-2 9 Hours
Network Operating System: Red Hat Linux, Installing Red Hat Linux. Preparing for installation. Booting from
CD. Graphical Installation Launch. Setting disk partition levels. Setting Boot Loader, First Boot. Creation of
User Account.
Unit-3 9 Hours
Connecting to Internet: Network Configuration Tool. Connecting to LAN. DNS. Installing Software: RPM.
Meaning, RPM Management Tool. Adding & Removing Packages. Querying RPM Packages.
Unit-4 9 Hours
File System: What is File System. Anatomy of File System. File Permissions and Directories permissions. File
Search Utilities. User Accounts: Super User Vs. Normal User. RedHat User Manager. Creating Groups. Server
Role: Linux as Web Server. Apache Web Server. Installing Apache. Starting Apache. Configuring Web server.
Setting up First Web Page.
Unit-5 9 Hours
FTP Server: Meaning, FTP Protocol. Installing vsftpd FTP Server. Starting FTP server. Testing FTP server. Using
FTP server. Using FTP Client to Test Anonymous Read Access.
File Server: Overview of Samba Server. Installing SAMBA server. Starting and Stopping the SAMBA server.
SAMBA configuration with SWAT. Starting SWAT Service. Adding SAMBA User. Creating and Configuring
SAMBA Share.
Unit VI: The advances and the latest trends in the course as well as the latest applications of
the areas covered in the course. The latest research conducted in the areas covered in the course.
Discussion of some latest papers published in IEEE transactions and ACM transactions, Web of
Science and SCOPUS indexed journals as well as high impact factor conferences as well as
symposiums. Discussion on some of the latest products available in the market based on
the areas covered in the course and patents filed in the areas covered in the course.
2 1 3 1 2 1
0 5 0 5 0 0
0
Prerequisite None
L T P
3 0 0
The objective of this course is to:
Course Outcomes: At the end of the course student will be able to:
CO2 Learn how to install UiPath community edition and Analyze the different types of variables.
CO4 Develop understanding and application of Data Manipulation & recording techniques.
CO5 Understand Selectors, Image, Text and Data Tables Automation and how they are used in
UiPath
Studio.
Module I
Programming Concepts Basics –: Understanding the application, Basic Web Concepts, Data Structures,
Control structures and functions, Variables & Arguments.
RPA Basics: History of Automation, RPA, Robot VS Automation, Processes & Flowcharts, What process
canbe automated, Types of Bots, Robotic control flow architecture,
Module II
Introduction to UiPath: Installing UiPath Studio community edition, The user Interface, Keyboard Shortcuts,
Automation Debugging,
Variables: Managing Variables, Naming Best Practice, The Variables Panel, Data Types, Managing
Arguments, The Arguments Panel, Using Arguments, About Imported Namespaces. Activities: Message Box,
Input Dialog, Type into, Click, Send HotKey, Write line, Read text File, Write Text File. Types of Button.
Module III
Control Flow: Introduction, If Else Statements, Loops, Advanced Control Flow, Sequences, Flowcharts,
Control Flow Activities, The Assign Activity, The Delay Activity, The Do While Activity, The If Activity,
The Switch Activity, The While Activity, The For Each Activity, The Break Activity
Module IV
Data Manipulation Introduction, Scalar variables, collections and Tables, Text Manipulation, Data
Manipulation, Gathering and Assembling
DataRecording Introduction, Basic and Desktop Recording, Web Recording,
Input/Output Methods, Screen Scraping, Data Scraping, Scraping advanced techniques
Module V
Selectors, Image, Text & Advanced Citrix Automation, Excel Data Tables & PDF, Email
Automation,Exceptional Handling, Introduction to Orchestrator.
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in the
course. Discussion of some latest papers published in IEEE transactions and ACM transactions,
Web of Science and SCOPUS indexed journals as well as high impact factor conferences as
well as symposiums. Discussion on some of the latest products available in the market
based on the areas covered in the course and patents filed in the areas covered in the course.
Theory Practical
2 15 3 1 2 100
0 0 5 0
Prerequisite
Corequisite
Antirequisite
L T P C
2 0 0 2
Course Objectives:
Course Outcomes
CO Appreciate and employ the thinking for self, and the development of confidence
3 in
one’s own thinking.
Internal Assessment Mid Term Test End Term Test Total Marks
(IA) (MTE) (ETE)
50 50 100
S Professional Elective-III L T P C
i
n
o
.
1 Microprocessor 2 0 2 3
2 Quantum Computing 2 0 2 3
3 Soft Computing 2 0 2 3
4 Machine Learning 2 0 2 3
Prerequisite
Co requisite
Antirequisite
L T P C
0 0 2 1
Course Objectives:
This course facilitates the students to familiar with Micro Processor (MP) based system
design which includes hardware, software and interfacing. After completing this course, the
student should be able to design a complete Microprocessor based system for a real-world
application. Course covers the introduction to basic digital devices and microcomputer
components, Architecture and programming of 8086 Microprocessors, Interrupts,
peripheral interfacing and direct memory access.
Course Outcomes
CO Write assembly language program for basic mathematical and logical operations.
1
1 Brey Barry B. & C R Sarma The Intel Microspore,: Arch, Prog. &
Interfacing Pearson Edu.,8thEdition, 2008.
1 The x86 processors, Architecture, programming and interfacing. Lyla B Das, Pearson 2010.
L
i
s
t
o
f
E
x
p
e
r
i
m
e
n
t
s
2 Logic operations – Shift and rotate – Converting packed BCD to unpacked BCD, BCD to
ASCII conversion.
3 By using string operation and Instruction prefix: Move Block, Reverse string, Sorting,
1 8255- Interface.
2
Course Code
Corequisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
The objective of this course is to provide the students an introduction to quantum computation. This
course teaches the fundamentals of quantum information processing, including quantum
computation, quantum cryptography, and quantum information theory. Quantum computation is an
emerging field whose goal is to design effectively atomic sized computers which exploit the
parallelism of the quantum mechanical laws of the universe.
Course Outcomes
CO Be familiar with basic quantum protocols such as teleportation and superdense coding
4 and quantum cryptography.
1 Benenti G., Casati G. and Strini G., Principles of Quantum Computation and
Information, Vol. I:Basic Concepts, Vol II: Basic Tools and Special Topics, World
Scientific. (2004)
Prerequisite
Co requisite
Antirequisite
L T P C
0 0 2 1
Course Objectives
The objective of this course is to introduce the students about the knowledge of
basicconcepts of machine learning systems, types of learning etc.
Course Outcomes
At the end of the course students will be able to:
1. Understand learning systems.
Text Books
3. Duda, Richard, Peter Hart, and David Stork. Pattern Classification. 2nd ed.
NewYork, NY: Wiley-Inderscience, 2000. ISBN: 9780471056690.
Reference Books
Course Content
Basic concepts: Definition of learning systems, Goals and applications of machine learning. Aspects
of developing a learning system: training data, concept representation, function approximation
Unit 3 Regression 8
L
e
c
t
u
r
e
h
o
u
r
s
Logistic regression, Perceptron, Exponential family, Generative learning algorithms, Gaussian
discriminant analysis, Naive Bayes, Support vector machines: Optimal hyper plane, Kernels. Model
selection and feature selection. Combining classifiers: Bagging, boosting (The Ada boost
algorithm),
Evaluating and debugging learning algorithms, Classification errors.
MDPs. Bellman equations, Value iteration and policy iteration, Linear quadratic regulation (LQR).
LQG, Q-learning, Value function approximation, Policy search, Reinforce, POMDPs
Theory Practical
2 15 3 1 2 100
0 0 5 0
VI SEM
L T P C
2 0 2 3
Course Objectives:
● Acquire knowledge and skills for creation of web site considering both client
andserver side.
● Gain ability to develop responsive web applications.
Course Outcomes
T1. Xavier, C, “ Web Technology and Design” , New Age International Publishers.
R2. Raj Kamal, “Internet and Web Technologies”, McGraw Hill Eduction.
R3. Jackson, “Web Technologies” Pearson Education
R4. Patel and Barik, ”Introduction to Web Technology & Internet”, Acme Learning.
R5. Steve Suehring, Tim Converse, Joyce Park, "PHP 6 and MySQL 6" WILLEY.
Unit-1 : Introduction to web and HTML 8
hours
Introduction to web, web development strategies, web team. HTML
introduction: basic tag, elements, attributes, formatting, comments,
marquee, list, table, images, frames, forms; Links : text, image and email.
XHTML: Syntax and Semantics.
U
n
i
t
-
4
:
J
S
P
8
h
o
u
r
s
Java server pages (JSP), JSP application design, declaring variables and
methods, debugging, sharing data between JSP pages, JSP objects,
Session, development of javabeans in Jsp, data base action with JSP.
U
n
i
t
-
5
:
P
H
P
8
h
o
u
r
s
PHP (Hypertext Pre-processor): Introduction, syntax, variables, strings,
operators, if- else, loop, switch, array, function, form ,mail, file upload,
session, error, exception, filter, PHP-ODBC.
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in the
course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web ofScience and SCOPUS indexed journals as well as high impact factor
conferences as well as symposiums. Discussion on some of the latest products available
in the market based onthe areas covered in the course and patents filed in the areas covered
in the course.
Theory Practical
2 15 3 1 2 100
0 0 5 0
S Professional Elective- L T P C
. IV
N
o
.
1 Cloud Application Development 2 0 2 3
2 Adhoc & Sensors Networks 2 0 2 3
3 Statistical Analysis using R 2 0 2 3
4 Block Chain 2 0 2 3
5 Software Defined Network 2 0 2 3
Prerequisite
Co requisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
The primary objective of this course is to introduce the topic of algorithms as a precise mathematical
concept, and study how to design algorithms, establish their correctness, study their efficiency and
memory needs. The course consists of a strong mathematical component in addition to the design of
various algorithms.
Course Outcomes
CO To analyze and trouble shoot the problems while deploying application on cloud
2
CO Use web application based technologies for developing application using cloud
3
CO Use public cloud like IBM Bluemix, Amazon AWS, Google cloud platform or
4 Microsoft Azure for developing an application
1 Chris Hay, Brian Prince, “Azure in Action” Manning Publications [ISBN: 978-
1935182481],2010.
2 Henry Li, “Introducing Windows Azure” Apress; 1 edition [ISBN: 978-1- 4302-2469-3],2009
3 Eugenio Pace, Dominic Betts, Scott Densmore, Ryan Dunn, Masashi Narumoto,
MatiasWoloski, Developing Applications for the Cloud on the Microsoft Windows Azure
Platform [ISBN: 9780735656062]
Course Contents:
Introduction, Contrast traditional software development and development for the cloud. Public
v private cloud apps. Understanding Cloud ecosystems – what is SaaS/PaaS, popular APIs,
mobile.
Class and Method design to make best use of the Cloud infrastructure; Web Browsers
and the Presentation Layer: Understanding Web browsers attributes and differences.
Building blocks of the presentation layer: HTML, HTML5, CSS, Silverlight, and Flash.
Building Ajax controls, introduction to Javascript using JQuery, working with JSON,
XML, REST. Application development Frameworks e.g. Ruby on Rails , .Net, Java API's
or JSF; Deployment Environments – Platform As A Service (PAAS) ,Amazon, vmForce,
Google App Engine, Azure, Heroku, AppForce
Unit IV : USE CASE 1 9 Hours
Developing and Deploying an Application in the Cloud : Building on the experience of the
first project students will study the design, development, testing and deployment of an
application in the cloud using a development framework and deployment platform
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in
the course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed in
the areas covered in the course.
L T P C
3 0 0 3
Course Objectives:
▪ Course Outcomes
CO Apply this knowledge to identify the suitable routing algorithm based on the network and user
2 requirement
CO Apply the knowledge to identify appropriate physical and MAC layer protocols
3
CO Understand the transport layer and security issues possible in Ad hoc and sensor networks.
4
CO Be familiar with the OS used in Sensor Networks and build basic modules
5
1 Ad Hoc and Sensor Networks — Theory and Applications, Car/os Corderlo Dharma R Aggarwal,World Scienti
Publications /Cambridge University Press, March 2018
2 Wireless Sensor Networks: An Information Processing Approach, Feng Zhao, Leonidas Guibas,Elsevier Scien
imprint, Morgan Kauffman Publishers, 2005, rp 2017.
3 C. Siva Ram Murthy, and B. S. Manoj, "Ad hoc Wireless Networks: Architectures and Protocols ",Prentice H
Professional Technical Reference, 2016.
2 Wireless Sensor Networks — Principles and Practice, Fei Hu, Xiaojun Cao, An
Auerbachbook, CRC Press, Taylor & Francis Group, 2017
Course Contents:
Unit-1: Introduction 9
h
o
u
r
s
Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive
routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer
solutions-TCP over Ad hoc wireless Networks.
single node architecture: hardware and software components of a sensor node - WSN
Network architecture: typical network architectures-data relaying and aggregation
strategies -MAC layer protocols: self-organizing, Hybrid TDMA/FDMA and CSMA based
MAC- IEEE 802.15.4.
Issues in WSN routing – OLSR- Localization – Indoor and Sensor Network Localization-absolute
and relative localization, triangulation-QOS in WSN-Energy Efficient Design-Synchronization-
Transport Layer issues.
Continuous Assessment Pattern:
Theory Practical
Prerequisite
Corequisite
Antirequisite
L T P C
3 0 0 3
Course Objectives: This is an introductory course on how to use the R programming language
and software environment for data manipulations and munging, exploratory data analysis and
data visualizations.
Course Outcomes
CO Students will be familiar to the R ecosystem and learn how to use R for the most
3 common data analysis tasks, including loading, cleaning, transforming, summarizing
and visualizing data.
1 Ugarte, M.D., Militino, A.F., Arnholt, A.T. (2008). Probability and Statistics with R. CRC
Press.
Course Contents:
Unit-1: Introduction 9 hours
The basics of R- first steps in writing code; variables; functions; vectors; simple calculations.
Working directory, reading and writing, loading and saving data, data frames. Vectors; matrices;
indexing, Built-in Commands and Missing Data Handling.
Absolute Deviation and Absolute Mean Deviation- Range, Interquartile Range and
Quartile Deviation-Mean Squared Error, Variance and Standard Deviation-
Coefficient of Variation and Boxplots. Raw and Central Moments-Skewness and
Kurtosis. Univariate and Bivariate Scatter Plots.
Least Squares Method - R Commands and More than One Variables-Extending R with add-
on packages and the R-ecosystem. Dynamic and web reporting: Knitr and Shiny. Running R
as part of a business pipeline—the R terminal. Simulation I.
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in
the course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed
in the areas covered in the course.
(MTE) IA
2 15 3 1 2 100
0 0 5 0
Name of The Course Block Chain Technology
Co requisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
The primary objective of this course is to cover the technical aspects of crypto currencies, block chain
technologies, and distributed consensus. The potential applications for Bit coin-like crypto currencies
are enormous. The course will enable an individual to learn, how these systems work and how to
engineer secure software that interacts with the Bit coin network and other crypto currencies.
Course Outcomes
2. Josh Thompsons, “Block Chain: The Block Chain for Beginners- Guide to Block chain
Technology and Leveraging Block Chain Programming”
4. Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
6. Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build Smart Contracts for
Ethereum and Block Chain”, Packt Publishing
7. Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O’Dowd, Venkatraman
Ramakrishna, “Hands-On Block Chain with Hyperledger: Building Decentralized Applications
with Hyperledger Fabric and Composer”, Import, 2018
1 Joseph Bonneau et al, SoK: Research perspectives and challenges for Bitcoin and
crypto currency, IEEE Symposium on security and Privacy, 2015
2 J.A.Garay et al, The bitcoin backbone protocol - analysis and applications EUROCRYPT
2015 LNCS VOl 9057, (VOLII ), pp 281-310.
Course Contents:
Unit I: Introduction 9
h
o
u
r
s
The consensus problem - Asynchronous Byzantine Agreement - AAP protocol and its analysis -
Nakamoto Consensus on permission-less, nameless, peer-to-peer network - Abstract Models for
BLOCKCHAIN - GARAY model - RLA Model - Proof of Work ( PoW) as random oracle - formal
treatment of consistency, liveness and fairness - Proof of Stake ( PoS) based Chains - Hybrid
models ( PoW + PoS) .
Ethereum - Ethereum Virtual Machine (EVM) - Wallets for Ethereum - Solidity - Smart
Contracts - some attacks on smart contracts.
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in
the course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed in
the areas covered in the course.
LIST OF PRACTICALS
1. Install and understand Docker container, Node.js, Java and Hyperledger Fabric,
Ethereum and perform necessary software installation on local machine/create instance
on Cloud to run. https://github.com/hyperledger/ https://docs.docker.com/get-
started/https://console.ng.bluemix.net/docs/services/block chain/index.html.
2.Create and deploy a block chain network using Hyperledger Fabric SDK for Java Set up and
initialize the channel, install and instantiate chain code, and perform invoke and query on your
block chain network (https://developer.ibm.com/patterns/create-and-deploy-block chain-
network-using- fabric-sdk-java/)
3. Interact with a block chain network. Execute transactions and requests against a
block chain network by creating an app to test the network and its rules
(https://developer.ibm.com/patterns/interacting-with-a-block chain-network/)
4. Deploy an asset-transfer app using block chain. Learn app development within a Hyperledger
Fabric network (https://developer.ibm.com/patterns/deploy-an-asset-transfer-app-using-block
chain/).
5. Use block chain to track fitness club rewards Build a web app that uses Hyperledger Fabric to
track and trace member rewards (https://developer.ibm.com/patterns/fitness-club-rewards-points-
iot-and- retail-integration/)
6. Car auction network: A Hello World example with Hyperledger Fabric Node SDK and IBM
Block chain Starter Plan. Use Hyperledger Fabric to invoke chaincode while storing results and
data in the starter plan (https://developer.ibm.com/patterns/car-auction-network-hyperledger-
fabric-node-sdk- starter-plan/)
7. Develop an IoT asset tracking app using Block chain. Use an IoT asset tracking device to
improve a supply chain by using Block chain, IoT devices, and Node-RED
(https://developer.ibm.com/patterns/develop-an-iot-asset-tracking-app-using-block chain/)
8. Secure art using block chain digital certificates. Node.js-based auction application can help
democratize the art market (https://developer.ibm.com/patterns/securing-art-using-block chain-
digital- certificates/)
(i) Block chain for telecom roaming, fraud, and overage management. See how communication
service providers use block chain to enhance their value chains.
https://developer.ibm.com/patterns/block chain-for-telecom-roaming-fraud-and-
overagemanagement/
(ii) Use IoT dashboards to analyze data sent from a Block chain network. Build an IoT app
and IoT dashboards with Watson IoT Platform and Node-RED to analyze IoT data sent from
a Block chain network https://developer.ibm.com/patterns/iot-dashboards-analyze-data-block
chain-network/) (iii) Create an Android app with Block chain integration. Build a Block
chain enabled health and fitness app with Android and Kubernetes
https://developer.ibm.com/patterns/create-an-android-app-with- block chain-integration/
(iv) Create a global finance block chain application with IBM Block chain Platform Extension for
VS
Code. Develop a Node.js smart contract and web app for a Global Finance with block chain use case
https://developer.ibm.com/patterns/global-financing-use-case-for-block chain/
(v) Develop a voting application using Hyperledger and Ethereum. Build a decentralized app that
combines Ethereum's Web3 and Solidity smart contracts with Hyperledger's hosting Fabric and
Chaincode EVM https://developer.ibm.com/patterns/voting-app-hyperledger-ethereum/
(vi) Create a block chain app for loyalty points with Hyperledger Fabric Ethereum Virtual Machine.
Deploy Fabric locally with EVM and create a proxy for interacting with a smart contract through a
Node.js web app https://developer.ibm.com/patterns/loyalty-points-fabric-evm/
Theory Practical
Prerequisite
Corequisite
Antirequisite
L T P C
3 0 0 3
Course Objective
This course provides knowledge on the various cyber threats and attacks. To learn the cyber security
policies and crime laws.
Course Outcome
CO Understand and implement the cryptographic techniques and know the real time
2 applications ofvarious cryptographic techniques.
1 Cryptography and Network security, William Stallings, Pearson Education, 7th Edition, 2016.
2 Cyber Security, Understanding cyber crimes, computer forensics and legal
perspectives, NinaGodbole, Sunit Belapure, Wiley Publications, Reprint 2016.
3 Writing Information Security Policies, Scott Barman, New Riders Publications, 2002.
2 Cryptography and Network security, Behrouz A. Forouzan , Debdeep Mukhopadhyay, Mcgraw Hill
Education, 2 nd Edition, 2011.
U
n
i
t
-
1
I
n
t
r
o
d
u
c
t
i
o
n
9
h
o
u
r
s
Finite Fields and Number Theory: Modular arithmetic – Euclidian Algorithm –
PrimalityTesting – Fermat’s and Euler’s theorem –Chinese Reminder theorem –
Discrete Logarithms
U
n
i
t
-
2
C
r
y
p
t
o
g
r
a
p
h
i
c
T
e
c
h
n
i
q
u
e
s
9
h
o
u
r
s
Symmetric key cryptographic techniques: Introduction to Stream cipher – Block
cipher:DES – AES- IDEA. Asymmetric key cryptographic techniques:
principles – RSA – ElGamal - Elliptic Curve cryptography – Key distribution
and Key exchange protocols.
U
n
i
t
-
3
A
u
t
h
e
n
t
i
c
a
t
i
o
n
a
n
d
C
y
b
e
r
c
r
i
m
e
s
9
h
o
u
r
s
Hash functions – Secure Hash Algorithm (SHA) Message Authentication –
Message Authentication Code (MAC) – Digital Signature Algorithm: RSA &
ElGamal based Classification of cybercrimes – planning of attacks – social
engineering: Human based –Computer based – Cyber stalking – Cybercafé and
Cybercrimes
U
n
i
t
-
4
C
y
b
e
r
T
h
r
e
a
t
s
,
A
t
t
a
c
k
s
a
n
d
P
r
e
v
e
n
t
i
o
n
9
h
o
u
r
s
Phishing – Password cracking – Key loggers and Spywares – DoS and DDoS
attacks –SQL Injection. Identity Theft (ID) : Types of identity theft –
Techniques of ID theft.
U
n
i
t
-
5
C
y
b
e
r
s
e
c
u
r
i
t
y
P
o
l
i
c
i
e
s
a
n
d
P
r
a
c
t
i
c
e
s
9
h
o
u
r
s
What security policies are – determining the policy needs – writing security
policies – Internet and email security policies – Compliance and Enforcement
of policies- Review
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in
the course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
available in the market based on the areas covered in the course and patents filed in
the areas covered in the course.
LIST OF PRACTICALS
3. Implementation of Steganography.
9. Implementation of Mobile Audit and generate the report of the existing Artiacts.
Theory Practical
Prerequisite
Corequisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
This course introduces software defined networking, an emerging paradigm in computer networking
that allows a logically centralized software program to control the behaviour of an entire network.
Course Outcomes
CO Learn how to use software programs to perform varying and complex networking tasks
4
CO Expand upon the knowledge learned and apply it to solve real world problems.
5
2 SDN - Software Defined Networks by Thomas D. Nadeau & Ken Gray, O'Reilly,
2013
3 Nunes, Bruno AA, et al. "A survey of software-defined networking: Past, present, and
future of programmable networks." Communications Surveys & Tutorials, IEEE 16.3
(2014): 1617-
1634
4 Lantz, Bob, Brandon Heller, and Nick McKeown. "A network in a laptop: rapid
prototyping for software-defined networks." Proceedings of the 9th ACM SIGCOMM
Workshop on Hot Topics in Networks. ACM, 2010
6 https://www.coursera.org/learn/sdn#
http://www.cs.fsu.edu/~xyuan/cis5930/
Course Contents:
SDN Origins and Evolution – Introduction – Why SDN? - Centralized and Distributed Control
andData Planes - The Genesis of SDN
How SDN Works - The Open flow Protocol - SDN Controllers: Introduction - General
Concepts -VMware - Nicira - VMware/Nicira - OpenFlow-Related - Mininet - NOX/POX -
Trema - Ryu - Big Switch Networks/Floodlight - Layer 3 Centric - Plexxi - Cisco OnePK
SDN in the Data Center - SDN in Other Environments - SDN Applications - SDN Use Cases -
TheOpen Network Operating System 3
For Lab:
Course Code
Prerequisite
Corequisite
Antirequisite
L T
3 0
Course Objectives:
This course instructs the students in the use of VHDL (Very High Speed Integrated Circuit Hardware
Description Language) for describing the behaviour of digital systems. VHDL is a standardized design
language used in computer/ semiconductor industry. This course will teach students the use of the
VHDL language for representation of digital signals, design description, design of arithmetic,
combinational, and synchronous sequential circuits.
Course Outcomes
CO Students must be able to simulate and debug digital systems described in VHDL
1
CO Students must demonstrate the use and application of Boolean Algebra in the
3 areas of digital circuit reduction, expansion, and factoring.
1 Fundamental of Digital Logic with VHDL Design, 3th edition, Stephen Brown
and Zvonko Vranesic, McGraw-Hill, 2008.
2 Mark Zwolinski, Digital System Design with VHDL, Second Edition, Pearson Education.2007
Course Contents:
VHDL description of combinational networks, Modeling flip-flops using VHDL, VHDL models for a
multiplexer, Compilation and simulation of VHDL code, Modeling a sequential machine, Variables,
Signals and constants, Arrays, VHDL operators, VHDL functions, VHDL procedures, Packages and
libraries, VHDL model for a counter.
Read-only memories, Programmable logic arrays (PLAs), Programmable array logic (PLAs), Other
sequential programmable logic devices (PLDs), Design of a keypad scanner. Static RAM, A
simplified 486 bus model, Interfacing memory to a microprocessor bus.
Design of a serial adder with accumulator, State graphs for control networks, Design
of a binary multiplier, Multiplication of signed binary numbers, Design of a binary
divider. Representation of floating-point numbers, Floating-point multiplication,
Other floating-point operations.
State machine charts, Derivation of SM charts, Realization of SM charts. Implementation of the dice
game, Alternative realization for SM charts using microprogramming, Linked state machines.
Unit-5 Designing With Programmable Gate Arrays And Complex Programmable Logic Devices
9 hours
Xlinx 3000 series FPGAs, Designing with FPGAs, Xlinx 4000 series FPGAs, using a one-hot state
assignment, Altera complex programmable logic devices (CPLDs), Altera FELX 10K series COLDs.
Unit VI: The advances and the latest trends in the course as well as the latest applications
ofthe areas covered in the course. The latest research conducted in the areas covered in the
course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact factor
conferences as well as symposiums. Discussion on some of the latest products available in
the market based on the areas covered in the course and patents filed in the areas covered in
the course.
LIST OF EXPERIMENTS:
2. Write VHDL programs for the following circuits, check the wave forms and the
hardwaregenerated a. half adder b. full adder
3. Write VHDL programs for the following circuits, check the wave forms and the
hardwaregenerated. a. multiplexer b. demultiplexer
4. Write VHDL programs for the following circuits, check the wave forms and the
hardwaregenerated a. decoder b. encoder
5. Write a VHDL program for a comparator and check the wave forms and the
hardware generated. 6. Write a VHDL program for a code converter and check the
wave forms and thehardware generated.
7. Write a VHDL program for a FLIP-FLOP and check the wave forms and the
hardwaregenerated .
8. Write a VHDL program for a counter and check the wave forms and the hardware
generated.
9. Write VHDL programs for the following circuits, check the wave forms and the
hardwaregenerated. a. register b. shift register 10. Implement any three (given above)
on FPGA/CPLDkit
Theory Practical
Course Code
Corequisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
To understand the advanced topics in the computer networks, with more emphasis on the
Internet architecture. To analyse the performance of different network functionalities.
Course Outcomes
C To understand wireless networks and the way access is controlled in these types of
O networks
3
C Analyze various fields of mobile and social networks in different perspectives.
O
4
C Design of cryptographic algorithms for Enterprise networks.
O
5
1 J.F. Kurose and K.W. Ross, Computer networking: A top-down approach, 6th edition, Adison
Wesley.
2 L.L. Peterson and BS. Davie, Computer Networks ISE: A System Approach, 5th edition, Morgan
Kaufman.
3 B.A. Frozen, Data communication & networking, 5th Edition, Tata Mc-Graw Hills.
Unit-1 9 hours
Introduction: Internet architecture and performance modeling: Review of Basic Network Architectures:
OSI reference model, TCP/IP reference model, ATM reference model. Physical Layer: Different types of
transmission media, and errors in transmission: attenuation, noise. Repeaters. Traffic Characterization
(CBR, VBR);
Unit-2 9 Hours
Switching Paradigms; Multiplexing. Error Control, Flow Control, FTH, DTH, PON, ISDN, DSL, CATV, SONET,
Optical Networks. Link. layer: switching, multiple access, error recovery: Data Link Layer MAC Layer: Local
Area Network Technologies: Fast Ethernet, Gigabit Ethernet, IEEE 802.11 WLAN, Bluetooth, Connecting
LANs, VLANS, STP.
Unit-3 9 Hours
Network Device, Routing algorithms, BGP, Advanced routing concepts, Router architectures,
internetworking: Inter domain Routing, BGP, IPv6, Multicast Routing Protocols, Multi Protocol Label
Switching, and Virtual Networks. Transport layer Transport protocols, TCP mechanics, congestion
control, resource allocation UDP mechanics. Socket Programming.
Unit-4 9 Hours
Overlay networks: RON, P2P, CDN, Web caching, cross-layer optimizations, Emerging network types: data
centre, DTN, 4G mobile networks (LTE, Wi-Max), Online social networks (OSN), wireless sensor networks
(WSN) – cross-layer sensor data dissemination
Unit-5 9 Hours
Internet Telephony- 1st Generation Protocols, Compression Techniques, 2nd Generation Systems, H.320
Standards, Directory Systems, IRC, LDAP, Integration with the PSTN, Gateways, VoIP Consortium, ETSI
TIPHON-Skype-Enterprise Network Security, SNAT, DNAT.
Unit VI: The advances and the latest trends in the course as well as the latest applications of the
areas covered in the course. The latest research conducted in the areas covered in the course. Discussion
of some latest papers published in IEEE transactions and ACM transactions, Web of Science and SCOPUS
indexed journals as well as high impact factor conferences as well as symposiums. Discussion on some of
the latest products available in the market based on the areas covered in the course and patents filed in
the areas covered in the course.
Course Code
Corequisite
Antirequisite
L T P C
3 0 0 3
List of Experiments:
1. Configuration and logging to a CISCO Router and introduction to the basic user Interfaces.
Introduction to the basic router configuration and basic commands.
3. Configure a DHCP Server to serve contiguous IP addresses to a pool of four IP devices with a
default gateway and a default DNS address. Integrate the DHCP server with a BOOTP demon to
automatically serve Windows and Linux OS Binaries based on client MAC address.
4. Configure, implement and debug the following: Use open source tools for debugging and
diagnostics. a. ARP/RARP protocols b. RIP routing protocols c. BGP routing d. OSPF routing
protocols e. Static routes (check using net stat)
5. Configure DNS: Make a caching DNS client, and a DNS Proxy; implement reverse DNS and
forward DNS, using TCP dump/Wireshark characterise traffic when the DNS server is up and
when it is down. 6. Configure FTP Server on a Linux/Windows machine using a FTP client/SFTP
client
characterise file transfer rate for a cluster of small files 100k each and a video file of 700mb.Use a
TFTP client and repeat the experiment
. 7. Configure a mail server for IMAP/POP protocols and write a simple SMTP client in C/C++/Java
client to send and receive mails.
8. Implement Open NMS+ SNMPD for checking Device status of devices in community MIB of a
Linux PC. Using yellow pages and NIS/NFS protocols implement Network Attached Storage
Controller (NAS). Extend this to serve a windows client using SMB. Characterise the NAS traffic
using wireshark.
Theory Practical
Prerequisite
Co-requisite
Anti-requisite
L T P C
3 0 0 3
Course Objectives:
1. Describe the concept of ERP and the ERP model; define key terms; explain the
transitionfrom MRP to ERP; identify the levels of ERP maturity.
2. Explain how ERP is used to integrate business processes; define and analyze a
process; create a process map and improve and/or simplify the process; apply
the result to an ERPimplementation.
3. Describe the elements of a value chain, and explain how core processes
relate; identifyhow the organizational infrastructure supports core business
processes; explain the effect
Course Outcomes
CO1 Develop model for ERP for large project
CO2 Develop model for E-commerce architecture for any application
CO3 Describe the advantages, strategic value, and organizational impact of utilizing an
ERP system for the management of information across the functional areas of a
business: sales and marketing, accounting and finance, human resource management,
and supply chain.
CO4 Demonstrate a working knowledge of how data and transactions are integrated in an
ERP system to manage the sales order process, production process, and procurement
process.
CO5 Evaluate organizational opportunities and challenges in the design system within a
business scenario.
Course Contents:
ERP & E-Commerce, Future Directives- in ERP, ERP and Internet, Critical success and
failure factors, Integrating ERP into organizational culture. Using ERP tool: either SAP or
ORACLE format to case study.
Unit VI: The advances and the latest trends in the course as well as the latest applications
of the areas covered in the course. The latest research conducted in the areas covered in the
course. Discussion of some latest papers published in IEEE transactions and ACM
transactions, Web of Science and SCOPUS indexed journals as well as high impact
factor conferences as well as symposiums. Discussion on some of the latest products
availablein the market based on the areas covered in the course and patents filed in the areas
covered inthe course.
Name of The Enterprise Resource Planning Lab
Course
Prerequisite
Co-requisite
Anti-requisite
L T P
3 0 0
LIST OF EXPERIMENTS:
This laboratory will be self-exploratory in nature with the undertaking of case studies
such asby culling information from the Internet on
a) Pay roll
c) Supply chain
d) Order Processing
e) Shipments
Prerequisite
Co requisite
Antirequisite
Unit I: Basics: Biological Neuron, Idea of computational units, McCulloch–Pitts unit and
Thresholding logic, Linear Perceptron, Perceptron Learning Algorithm, Linear separability.
Convergence theorem for Perceptron Learning Algorithm.
UNIT-II: Feedforward Networks & Deep Neural Networks: Difficulty of training deep neural
networks, Greedy layer wise training. Multilayer Perceptron, Gradient Descent, Back propagation,
Empirical Risk Minimization, regularization, auto encoders.
Unit –III: Better Training of Neural Networks: Newer optimization methods for neural networks
(Adagrad, ad delta, rmsprop, adam, NAG), second order methods for training, Saddle point problem
in neural networks, Regularization methods (dropout, drop connect, batch normalization).
Unit –IV: Recurrent Neural Networks: Back propagation through time, Long Short Term
Memory, Gated Recurrent Units, Bidirectional LSTMs, Bidirectional RNNs, Convolutional
Neural Networks: LeNet, AlexNet.
Recent trends: Variational Auto encoders, Generative Adversarial Networks, Multi-task Deep
Learning, Multi-view Deep Learning
Unit VI: The advances and the latest trends in the course as well as the latest applications of
the areas covered in the course. The latest research conducted in the areas covered in the course.
Discussion of some latest papers published in IEEE transactions and ACM transactions, Web
of Science and SCOPUS indexed journals as well as high impact factor conferences as well as
symposiums. Discussion on some of the latest products available in the market based on the
areas covered in the course and patents filed in the areas covered in the course.
Prerequisite
Co requisite
Antirequisite
L T P C
0 0 2 1
Course Outcomes
List of Experiments:
9 Analyse and Compare the Performance of CNN, Alex Net and Google Net.
Course Code
Prerequisite
Corequisite
Antirequisite
L T P C
3 0 0 3
Course Objectives:
Define the term UI UX and identify how it fits into the software development lifecycle. Conduct
generative user experience design activities to creatively fill user needs when designing a new user
interaction. Participate effectively in design critiques, and be able to use this experience to be a
more effective design team member. Design and produce an interactive prototype of a complete
design concept to present to a client for a new user interaction.
Course Outcomes:
CO Explain why you made design decisions, through presentations of assignments and your
5 personal portfolio.
2 UI design from the expert web UI design best practices, Advice from UI & UX experts
such as Luke Wroblewski, Jakob Nielsen, Jared Spool, and many others, Nov 20, 2014.
3 User Interface and User Experience (UI/UX) Design. Article (PDF Available), Nov 17, 2017.
Course Contents:
UX Principles, Blocking Gray scales + User Flow, Figma Prototype, Understanding user
testing, Gray scales + Usability Testing, Design of Everyday Things.
UI Principles, UI Analysis, Figma UI Part 1, Color and Font, UI Design in 3 Sprints, Refactoring UI.
Non-Traditional UI, Find UI in other Technologies, Figma UI Part 2, UI Special Topics, Create UI for
other Technologies, Creating UI Design, UI Components, Style Guide Analysis, Figma Advanced,
Responsive Design. Style Guide for Responsive UI, Visual Display of Information.
Unit VI: The advances and the latest trends in the course as well as the latest applica the areas
covered in the course. The latest research conducted in the areas covered in the Discussion of some
latest papers published in IEEE transactions and ACM transactions, Science and SCOPUS indexed
journals as well as high impact factor conferences as symposiums. Discussion on some of the latest
products available in the market b the areas covered in the course and patents filed in the areas
covered in the course.
Name of The Course UI UX
Course Code
Prerequisite
Corequisite
Antirequisite
L T PC
0 21
Course Objectives:
Course Outcomes
CO Understand the definition and principles of UI/UX Design in order
1 to design with intention.
UX Design Module - Research, User flow, Competitor analysis, Persona, Process models, Navigations,
Information Architecture, Sketching, Prototyping, Wire framing, Testing, Google Material design etc.
Experiments:
1: Visual design
Visual design
Creating storyboards
Product design
Colour theory
Layouts
Typography
Iconography
Info graphics
Branding design
Image editing
Creating UI elements
Mock-up
Basic interaction.
Design Engineering
Interactive prototype
MVC pattern
Usability testing
Theory Practical
Internal M End ETE T
Assessment i Term o
(Continuous
(IA) d Test Assessment t
T (ETE) ) IA a
e l
r M
m a
T r
e k
s s
t
(
M
T
E
)
2 15 3 1 2 100
0 0 5 0
Name of The Course Design and Innovation
Prerequisite
Corequisite
Antirequisite
L T P C
3 1 0 3
Course Objectives:
Course Outcomes
Idris Mootee, "Design Thinking for Strategic Innovation: What They Can't Teach
You at Business or Design School", John Wiley & Sons 2013. (Unit IV)
20 30 50 100
Name of The Course Professional Communication Lab
Prerequisite
Corequisite
Antirequisite
L T P C
3 1 0 3
Course Objectives:
Course Outcomes
1. Butterfield, Jeff Soft Skills for Everyone. Cengage Learning: New Delhi, 2015
2. E. Suresh Kumar et al. Communication for Professional Success. Orient Blackswan: Hyderabad, 2015
20 30 50 100
Name of The Course Application Programming using Python
Prerequisite
Corequisite
Antirequisite
L T P C
3 1 0 3
Course Objectives:
Course Outcomes
• Allen B. Downey, ``Think Python: How to Think Like a Computer Scientist’’, 2nd edition,
Updated for Python 3, Shroff/O’Reilly Publishers, 2016
(http://greenteapress.com/wp/think- python/)
• Guido van Rossum and Fred L. Drake Jr, “An Introduction to Python – Revised and updated
for Python 3.2, Network Theory Ltd., 2011.
Reference Book (s)
3 0 0 3
Course Objectives:
ii) Learners will gain deep insights into the fundamental concepts
of disruptivetechnologies, their promises as well as their current
limitations
C Build the deep insight into the main methods used in machine learning (ML)
O
andartificial intelligence (AI) Utilize the potential impact of Artificial
2
Intelligence and
machine learning
C Analyse basic IOT protocols and its characteristics to determine the performance
O
4
C Implement the basic IoT applications on embedded platform
O
5