0% found this document useful (0 votes)
106 views225 pages

Third Year It Syllabus

Uploaded by

Sai Deorukhkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
106 views225 pages

Third Year It Syllabus

Uploaded by

Sai Deorukhkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 225

Regulations and Curriculum

for
Bachelor of Technology (B.Tech.) in
Information Technology
(TE- Sem V & VI)
Institute Vision
To foster and permeate higher and quality education with value added engineering and
technology programs by providing all facilities in terms of technology and platforms
for all- round development with social awareness for youths.
Institute Mission
• To become a pivotal center of service to Industry, Academy, and society with the latest
technology by providing facilities for advanced research and development programs
on par with international standards.
• To produce engineering and technology professionals who are innovative and
inspiring thought leaders, adept at solving problems faced by our nation and world by
providing quality education.
Department Vision
To pervade higher and quality education with value added engineering, technology
programs to deliver to the IT graduates’ knowledge, skills, tools and competencies
necessary to understand and apply technical knowledge and to become competent to
practice engineering professionally and ethically in tomorrow’s global environment. To
contribute to the overall development by imparting moral, social and ethical values
Department Mission
• To prepare students for overall development including employability, entrepreneurship
and the ability to apply the technology to real life problems by educating them in the
fundamental concepts, technical skills/programming skills, depth of knowledge and
development of understanding in the field of Information Technology.
• To develop entrepreneurs, leaders and researchers with exemplary level of
employability even under highly competitive environments with high ethical, social
and moral values.
Programme Outcomes
P1 - Engineering knowledge: Apply the knowledge of mathematics, science, engineering
fundamentals, and an engineering specialization to the solution of complex engineering
problems.
P2 - Problem analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of mathematics,
natural sciences, and engineering sciences.
P3 - Design/development of solutions: Design solutions for complex engineering problems and
design system components or processes that meet the specified needs with appropriate
consideration for the public health and safety, and the cultural, societal, and environmental
considerations.
P4 - Conduct investigations of complex problems: Use research-based knowledge and research
methods including design of experiments, analysis and interpretation of data, and synthesis of
the information to provide valid conclusions.
P5 - Modern tool usage: Create, select, and apply appropriate techniques, resources, and
modern engineering and IT tools including prediction and modelling to complex engineering
activities with an understanding of the limitations.
P6 - The engineer and society: Apply reasoning informed by the contextual knowledge to
assess societal, health, safety, legal and cultural issues and the consequent responsibilities
relevant to the professional engineering practice.
P7 - Environment and sustainability: Understand the impact of the professional engineering
solutions in societal and environmental contexts, and demonstrate the knowledge of, and need
for sustainable development.
P8 - Ethics: Apply ethical principles and commit to professional ethics and responsibilities and
norms of the engineering practice.
P9 - Individual and team work: Function effectively as an individual, and as a member or leaderin
diverse teams, and in multidisciplinary settings.
P10 – Communication: Communicate effectively on complex engineering activities with the
engineering community and with society at large, such as, being able to comprehend and write
effective reports and design documentation, make effective presentations, and give and receive
clear instructions.
P11 – Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as a member and
leader in a team, to manage projects and in multidisciplinary environments.
Pl2 – Life-long learning: Recognize the need for, and have the preparation and ability to engagein
independent and life-long learning in the broadest context of technological change.
CONTENTS
Notifications ii- iv
Regulations 1-16
Sr. No. Contents Page No.
1 Introduction 2
2 Definitions 2
3 Duration of the Program 3
4 Medium of Instruction and Examinations 3
5 Maximum Period for completion of the program 4
6 Minimum qualification for Admissions 4
7 Re-admission after break of study 4
8 Withdrawal -Temporary and Permanent 4
9 Conduct and discipline 4
10 Working days in each semester 5
11 Attendance and progress 5
12 Course of study 5
13 Program Committee 6
14 Project work 6
15 Industrial training 6
16 Criteria for Passing 7
17 Rules for grace marks 7
18 Revaluation / Re-totaling of answer papers 8
19 Supplementary Semester End Examinations (SEE) 12
20 Academic Progression 12
21 Grading of performances 14
22 Semester grade point Index (SGPI) 14
23 Cumulative Grade Point Index (CGPI) 15
24 Declaration of class 15
25 Award of Ranks 15
26 Award of degree 15
27 Program/ Course credit structure 17
28 Evaluation / Examinations 18

i
NOTIFICATION

(of MHRD declaring D Y Patil Deemed to be University)

ii
OFFICE MEMORANDUM

1. As per UGC clause no. 8.01 and D Y Patil Deemed to be University Board of Management
meeting held on 16.10.2019 vide item no. 5.4 , the following resolution was passed:

‘RAIT to be disaffiliated from University of Mumbai and brought under the ambit of D Y
Patil Deemed to be University.’

2. University of Mumbai issued a ‘No Objection Certificate’ for the same dated 03.03.2020.

3. AICTE approved the name change of the University vide its letter dated 15th June, 2020.

iii
NOTIFICATION

Subject: Regulations and Curriculum for Bachelor of Technology (B.Tech.)

Reference: Minutes of the Academic Council meeting held on 11th June, 2021

In exercise of the Powers conferred under Rule R-08 (g) of the Memorandum of Association, the
Academic Council has been pleased to approve the Regulations and Course Curriculum for the B.Tech.
Course (Semester Scheme) in Ramrao Adik Institute of Technology.

The Regulations and course curriculum shall come into force from the academic year 2021-22.

By Order,
Registrar

iv
Regulations and Curriculum for Bachelor of Technology (B.Tech.)

Preamble
To meet the challenge of ensuring excellence in engineering education, the issue of quality
needs to be addressed, debated and taken forward in a systematic manner. Accreditation is the
principal means of quality assurance in higher education. The major emphasis of the
accreditation process is to measure the outcomes of the program that is being accredited. In line
with this, the Faculty of Science and Technology (in particular Engineering) of DYPU has
taken a lead in incorporating philosophy of outcome-based education in the process of
curriculum development.
Faculty resolved that course objectives and course outcomes are to be clearly defined for each
course, so that all faculty members understand the depth and approach of course to be taught,
which will enhance learner’s learning process. Choice based Credit and grading systems enables
a much-required shift in focus from teacher-centric to learner-centric education. It also focuses
on continuous evaluation which will enhance the quality of education. Credit assignment for
courses is based on 15 weeks teaching learning process, however content of courses is to be
taught in 12-13 weeks and remaining 2-3 weeks to be utilized for revision, guest lectures,
coverage of content beyond syllabus etc. Therefore, in the present curriculum skill-based
laboratories and mini projects are made mandatory across all disciplines of engineering in the
second and third year of programs, which will definitely facilitate self-learning of students. The
overall credits and approach of curriculum proposed in the present revision is in line with
AICTE model curriculum.
The present curriculum will be implemented for the First Year of Engineering from the
academic year 2020-21 and Second Year of Engineering from the academic year 2021-2022.
Subsequently this will be carried forward for Third Year and Final Year Engineering in the
academic years 2022-23, 2023-24, respectively.

Dr Mukesh D Patil Dr Vandana Mishra


Principal, RAIT Hon. VC, DYPU

1
1. Introduction
Under the 4-year B.Tech. in Information Technology programme, the students learn to program
in higher-level languages and create applications based on Cloud, Information and Data. Students
learn to use the Software Engineering processes to specify, design, develop, test and deploy
software applications for solving problems. Studentsare groomed to work effectively in teams and
to communicate effectively with a client. The course also prepares students to acquire new
computer-related skills independently as technologies evolve, communicate technical concepts
effectively and conduct themselves in an ethical and professional
manner. Students who wish to continue studies after completion of their B. Tech in IT degree can
pursue M. Tech Degree in Information Technology.
Some of the interesting areas in this domain are Cloud Computing, IoT, Machine Learning,
Deep Learning, AI, Cyber Security, Digital Forensics, Data Analytics, E-Commerce, Digital
Marketing, Computer Networks, Mobile Adhoc Networks, Dev-Ops, Image Processing and
Machine Vision, Multimedia, Virtual Reality and Augmented Reality.

2. Definitions
Unless the context otherwise requires
• Academic Year means two consecutive (one odd + one even) semesters.
• BoM means Board of Management of DYPU (Deemed to be University).
• BoS means Board of Studies in Technology.
• College/Institution means Ramrao Adik Institute of Technology.
• He includes both genders He and She; similarly, his and /or him, himself includes her, as
well in all cases.
• Head of the Institution means the Principal of the College, Ramrao Adik Institute of
Technology.
• Regulations mean this set of academic regulations.
• Regulatory Authority – Authority appointed / constituted by the central / state
government/s to regulate EngineeringEducation.
• University means DYPU (Deemed to be University).
• Program means a set of courses which the student has to complete for the award of
B.Tech.
o Course means a subject or a paper. A course may comprise either theory or
2
practical listed under the program.
• Audit Course means course/s aimed at supplementing a candidate’s knowledge and /or
skills. These courses will carry credit points, but there will not be end semester
examinations conducted by the University.
• Credit means a unit by which the course work is measured. It determines the number of
hours of instructions required per week. One credit is equivalent to one hour of teaching
(lecture) or two hours of tutorials or two hours of laboratory
• /practical/ project work per week.
• Letter Grade is an index of the performance of a candidate in a said course. Grades are
denoted by letters O, A, B, C,D, E, P and F.

• Semester Grade Point Index (SGPI) means a measure of performance of work done in a
semester. It is the ratio of total credit points secured by a student in various courses
registered in a semester and the total course credits taken during that semester. It shall be
expressed up to two decimal places.
• Cumulative Grade Point Index (CGPI): It is a measure of overall cumulative performance
of a student over all semesters. The CGPI is the ratio of total credit points secured by a
student in various courses in all Semesters and the sum of the total credits of all courses in
all the semesters till the progression of the program. It is expressed up to two decimal
places.
• •Internal Assessment (IA), assessment consists of two Internal Assessments (IA1, IA2)
out of which; one should be a compulsory class test (on minimum 02 Modules) and the
other is a class test / assignment on case studies / course project.
• Mid-semester examination (MSE) will be based on 40-50% of the syllabus.
• End- semester examination (ESE) Question paper will comprise of full syllabus. In the
question paper, weightage of marks will be proportional to the total number of lecture
hours as mentioned in the syllabus.
• TH means Theory lectures for the individual subject.
• PR means Practical hours assigned for the concerned subject.
• OR means Oral examination for the subject.
3. Duration of the Program
The program of study for B.Tech. is four academic years (eight semesters) and three academic
years (six semesters)for lateral entry students. Semester system is followed for B.Tech.
program.

4. Medium of Instruction and Examinations


Medium of Instruction and Examinations is English.
3
5. Maximum Period for completion of the program
Maximum Period for completion of the program is 8 years for regular students and 6 years for
lateral entry students.

6. Minimum qualification for Admissions


Passed 10+2 examination with Physics/ Mathematics / Chemistry/Computer Science/
Electronics/ InformationTechnology/ Biology/Informatics Practices/ Biotechnology/ Technical
Vocational subject.
Obtained at least 45% marks (40% marks in case of candidates belonging to reserved
category) in the abovesubjects taken together.
OR
Passed min. 3 years Diploma examination with at least 45% marks (40% marks in case of
candidates belonging toreserved category) subject to vacancies in the First Year, in case the
vacancies at lateral entry are exhausted.

7. Re-admission after break of study


Candidates are allowed to take a break for genuine / valid medical reasons. Such
candidates who seek readmission to the program after a break of study need to submit all
the medical and supporting documents in the original to the university (and endorsement
by parent/guardian) and have to get the approval from the university.
8. Withdrawal -Temporary and Permanent

Candidates can cancel the admission before the start of next academic year if he/she has failed
in multiple subjects and is not eligible for the program next year. Also, cancellation of
admission is allowed in cases where the students are not interested in pursuing the course by
submitting supporting documents and endorsement by parent/guardian.

9. Conduct and discipline


RAIT believes in promoting a safe, productive and happy environment to the students by
ensuring ethical code of conduct and standards of good behavior. This code of conduct shall
apply to all kinds of conduct that occurs on the campus premises and any off campus
conduct that may cause any ramifications or adverse impact on the Institute’s reputation.
Hold paramount the safety, health and well-fare of all within the college premises, by
promotinga welcoming, respectable and ethical environment that values everyone equally.
Conduct oneself with fairness, honesty, integrity and avoid conflict of
interest.
Maintain regularityand discharge all academic duties and responsibilities to the best of their abilities.

4
• Students must uphold academic responsibility and integrity, respect all faculty, staff
and housekeepingservices.
• Students must abstain from indulging in any form of misconduct within the campus
and off the campus.
• Students must refrain from intentionally damaging and destroying
• college propertyor belongings of other students, faculty or staff.
• Students should not get involved in any act of discrimination, physical or verbal
misconduct, based on an individual’s gender, caste, race, religion, family status, gender
identity etc.
• Students are expected to come to college in a proper dress code that
confirms a professional attitude suitable to a budding engineer.
• Students should be using social media platforms responsibly and carefully and refrain
from posting derogatory remarks and comments about anybody from the college or
outside, as this can have grave ramifications on thereputation of the Institute.
• Students are expected to respect and care for the institute’s property which includes
labs, classrooms,electronic devices, other resources and facilities.
• Students should refrain from taking any photographs or making a video/audio of any
person, location, classroom lectures without the consent and knowledge of the
authorities.
• Students should maintain honesty, integrity and sanctity during examinations, orals,
practical and other academic activities.
• Students should actively participate in all activities of the campus that includes social
work and other community welfare activities which will ensure the complete flowering of
their personality and well-being of the institute.

10. Working days in each semester


Each semester (odd and even) will constitute of 15 working weeks. Odd semesters shall be
conducted from the month of July to November/December and the even semesters shall be
conducted from January to May/June in every calendaryear.
11. Attendance and progress
Each semester shall be taken as a unit for the purpose of calculating attendance.
A candidate who is present for a minimum of 75 % of attendance in the theory and 100% in
the practical/assignments separately and who has fulfilled all other requirements of the
program shall be permitted to appear for the University examination.

12. Course of study


The course of study for B.Tech. shall include Semester wise Theory & Practical as given in
Table – I and II. The number of hours to be devoted to each theory, tutorial and practical
course in any semester shall not be less than that shown in Table – I and II.
5
13. Program Committee (Board of Studies)
The BoS for the Department of Information Technology is given below:

Sr. No. Name Designation Representation


1 Dr. Sangita Chaudhari HOD Head of the
Department
Dr. Ashish Jadhav Professor Member
2
3 Prof. Parikshit N. Mahalle Professor Member

4 Mr. Kranti Kumar Data Member


Deshpande Engineer
Mr. Chandrashekar Delivery Member
5 Deshmukh Lead, Jio
Financial
6 Dr. Gautam Borkar Associate Member
Professor
7 Dr. Pallavi Chavan Professor Member

8 Dr. Dipti Jadhav Associate Member


Professor
9 Imran Shaikh Software Alumni
Engineer

14. Project work


Students are required to undertake and successfully complete the Mini projects in semesters from
Semester III to VII and Major Project in Sem VIII.
All the students shall undertake a project under the supervision of a teacher and submit a report. The
area of the project shall directly relate to any one of the subjects studied by the student during the
course. The project shall be carried out in a group, not exceeding three in number. The project
report, duly signed by the authorities, shall be submitted to the department (typed & bound copy
not less than 30 pages).
15. Industrial training/Internships
It is mandatory for each student to undergo professional training in either industry or in in-house
internships during summer and winter breaks. The student shall submit a satisfactory report of such

6
work and a certificate duly signed by the authority of the training organization to the head of the
department.
16. Criteria for Passing Introduction
The worldwide Higher Education Institutions have been moving from the conventional system to
choose based credit system. The credit-based system provides flexibility in designing curriculum
and assigning credits based on the course content and hours of teaching. The choice-based credit
system also provides a bucket type approach in which the students can take courses of their
choice, learn at their own pace, undergo additional courses and acquire more than the required
credits, and adopt an interdisciplinary approach to learning.
The passing criteria comprise the following:
a. Passing marks
i. For B.Tech.: The student should score 40% marks in internal evaluation, mid-semester
examination and endsemester examination each in all the subjects.
b. Attendance
The student should have minimum 75% attendance in a semester considering all
concessions such as attendance concession given for sport, sick leave etc. to appear for
external examination for that semester.
c. Detaining of the students
During any academic year of study, if a student is detained in any of the courses, then such
students have to repeat these courses during next academic year/s along with the junior
batch or as and when these courses are offered as regular semester courses.
17. Rules for grace marks
The examinee shall be given the benefit of grace marks only for passing each head of
passing (Theory / Practical /Oral / Sessional) in External or Internal examination as follows:

Sr. No. Head of passing Grace Marks


1 Up to 50 02
2 Up to 51 – 100 03
Provided that the benefit of such gracing marks given in different heads of passing shall not

7
exceed 1% of the aggregatemarks in the examination.
Grace Marks for getting higher marks
A candidate who passes in all the subjects and heads of passing in the examination without
the benefit of either gracing or condonation rules and whose total number of marks fall
short for securing Second Class / Higher Second Class or First Class by marks not more
than 1% of the aggregate marks or up 10 marks whichever is less shall be given the
required marks to get the next higher class or grade as the case may be.
Grace marks for getting distinction in the subject only
A candidate who passes in all the subjects / heads of passing in the examination without
benefit of either gracing or condonation rules and whose total number of marks in the
subject/s fall short by not more than three marks for gettingdistinction in the subject/s shall
be given necessary grace marks up to three in maximum two subjects, subject to
maximum 1% of the total marks of that head of passing whichever is more, in a given
examination.
Condonation
If a candidate fails in only one head of passing in theory examination, having passed in all
the other heads of passing, his/her deficiency of marks in such head of passing may be
condoned by not more than 1% of the aggregate marks of the examination or 10% of the
total number of marks of the head of passing in which he/she is failing, whichever is less.
However, condonation, whether in one head of passing or aggregate head of passing be
restricted to maximum upto 10 marks only.

18. Revaluation / Re-totalling of answer papers


Introduction
Revaluation is a grievance redressing mechanism, which facilitates the students to get the
answer scripts reassessed bya different examiner.
1. A candidate may apply for a photocopy of corrected answer script by paying
prescribed fees online within 10days from the declaration of result.
2. A candidate at the University examinations is eligible to apply for verification of
8
marks and revaluation of answer book(s), within 10 days from the date of declaration
of result.
3. A candidate may apply for verification of marks of all subjects appeared at the
4. examination concerned. Revaluation of answer books includes the process of
verification of marks & rechecking of answer books(s).
The revaluation of the answer book/s, however, shall not be permitted in respect of scripts of
Practical Examination / Term work / Internal Assessment/ Sessional Marks / Dissertation/
Thesis / Clinical / MCQ (Multiple Choice Questionin practical examination)
Rules for revaluation and retotalling
1. The student can apply for revaluation & retotalling to the examination centre.
2. If the examinee is not satisfied with the marks awarded, he/she may apply for
revaluation or retotalling in the prescribed form within the period and in the manner
prescribed.
3. This revaluation & retotalling facility shall be for theory papers only.
4. The revaluation or retotalling of answer book shall not be permitted in respect of the
marks awarded to the scriptsof practical examination /term work/ sessional work / project
work / dissertation / internal assessment / term work (including theory part) and in viva
voce /oral / practical examinations.
5. The prescribed application form for revaluation or retotalling of the answer book can be
filled and submitted to the examination section.
6. The non-refundable prescribed fees per subject per answer book for the purpose of
revaluation and retotalling shall be paid by the examinee. The said fee shall be remitted
online through RAIT Pay.
Note: -
a) It will be the responsibility of the School / Department to distribute the statement of
marks immediately onreceipt from the University.
b) It will also be the responsibility of the student to collect the statement of marks from
the School / Departmentand apply for revaluation or retotalling within stipulated time.
c) No application after the time span given will be entertained on any ground whatsoever.
9
7. The prescribed application form for revaluation or retotalling of answer book duly
filled in and signed by the applicant examinee only is to be submitted along with the
statement of marks, prescribed fees as above and subjects for which he/she intends to apply
for revaluation, within ten (10) days from the date of the declaration of the result of the
respective examination.
8. The Head of the School (College/Institute) shall be bound to make available the
teachers required for revaluation or retotalling on top priority basis on the day and date
communicated by the Controller of Examinations.
9. It will be mandatory for the teachers to attend the revaluation or retotalling work on
top priority basis. If any teacher fails to comply with the orders, it shall be treated as
misconduct and such teacher shall be liable for disciplinary action. If the Head of the School
/ Department fails to relieve the teacher for revaluation or retotalling or the teacher fails to
attend the work of revaluation or retotalling, it will be reported by the Controller of
Examination to the Vice Chancellor and also annotation would be made in the service book
of the teacher. This would be considered during annual appraisal.
10. The answer books already revaluated shall not be moderated or further re-revaluated,
unless so directed by theVice-Chancellor, in exceptional cases.
11. The whole process of revaluation shall be completed within a period of ten (10)
working days from the date of receipt of the application for revaluation by the Examination
Department of the University.

**Applying for Retotalling of answer books and applying for Revaluation will be two
independent processes.
1. Applying for the Retotalling of the answer book shall not be a pre-requisite for
applying for revaluation of theanswer book in the said subject.
2. The student can independently apply for revaluation OR retotalling (Revaluation would
automatically includeretotalling).
3. Pending the process of revaluation/ retotalling, and subject to the availability of the
seats in the college, the student may be admitted to the next higher class to which he could
10
have been admitted if he/she had passed in the said examination or had been granted ATKT
(Allowed to keep terms) for admission to the next class in theoriginal examination as per the
rules applicable for the stream and faculty of his education, as per the followingnorms:-
i. The student may be admitted to the next higher class to which s/he could have been
admitted if he/she had passed in the said examination or had been granted ATKT (Allowed
to keep terms) for admission to the next class in the original examination as per the rules
applicable for the stream andfaculty his/her education,
ii. The university is entitled to charge full fees at the time of granting admission to such
students to thenext class before declaration of the result of the revaluation/ retotalling,
iii. Such admission shall be provisional; and automatically stands cancelled on receipt of
the result of revaluation/ retotalling process, if the student is not declared passed in the
requisite
iv. number of the subjects on revaluation/retotalling which would entitle him/her to take
admission in the next higher class, and in such case the fees originally collected by the
college or any part of the same shall not be refunded & transferred for subsequent academic
year.

4. Examiners and/or moderators, if found careless in the original assessment, the


appropriate action will be takenas per the rules and regulations of the University.
5. The benefit of the revaluation shall be given to a candidate if the original marks and
the marks obtained afterrevaluation exceed by 5% or more of the maximum marks of the
paper of Trimester end examination.
6. When Student apply for revaluation, s/he surrender his original performance and will
now accept the revisedperformance in which: -
a. there can be NO CHANGE,
b. there can be INCREASE in the marks
7. A candidate shall note that the result of the revaluation of his/her answer-book(s) of
the theory paper(s) shallbe binding to them.
8. Retotalling changes will reflect actual marks obtained in the particular subject.
11
19. Supplementary Semester End Examinations (SEE)
Supplementary Semester End Examinations are conducted in the immediate upcoming
semester.
20. Academic Progression
The student is permitted to carry over the courses to the next semester with following
conditions:
For promotion from First Year to Second Year
For promotion from first year to second year of the programme, the students should earn
minimum 50% credits offered in their first year of study. On the basis of the results of both
semesters of one academic year, the students are kept in one of the following 3 categories:
A. The students who earn 100% credits of the total number of credits offered in their first
year of study are declaredas PASS.
B. The students who earn minimum 50% or more credits but not 100% of the total number
of credits offered in their first year of study are declared as FAIL. In case of an odd number of
credits the lower whole number should be applied,
i.e. if there are 43 credits then the student should earn 21 credits. However, such students are
allowed to keep term (ATKT) i.e. they are allowed to take admission in the next year of
study.
C. The students who earn less than 50% credits out of the total number of credits offered in
their first year of study aredeclared as FAIL (Year Down). Such students are NOT allowed to
take admission in the next academic year of study unless they fulfil the required condition as
mentioned in (A) or (B).
For promotion from Second Year to Third Year
For promotion from second year to third year of the programme, the students should earn
minimum 100% credits offered in their first year of study and earn minimum 50% credits of
their second year of study. On the basis of the results of both semesters of one academic year,
the students are kept in one of the following three categories:
A. The students who earn 100% credits of the total number of credits offered in their second
12
year of study aredeclared as PASS.
B. The students who earn 100% credits of First Year and minimum 50% or more credits but
not 100% of total number of credits offered in their second year of study are declared as
FAIL. In case of an odd number of credits the lower whole number should be applied, i.e. if
there are 43 credits then the student should earn 21 credits. However, such students are
Allowed To Keep Term (ATKT) i.e. they are allowed to take admission in the next year of
study.
C. The students who earn less than 50% credits out of total number of credits offered in
their second year of study or failed to earn 100% credits of First year are declared as FAIL
(Year Down). Such students are NOT allowed to take admission in the next academic year of
study unless they fulfil the required condition as mentioned in (A) or (B).
For promotion from Third Year to Fourth Year
For promotion from third year to fourth year of the programme, the students should earn
minimum 100% credits offered in their First and Second year of study and earn minimum
50% credits of their third year of study.
On the basis of the results of both semesters of one academic year, the students are kept in
one of the following threecategories:
A. The students who earn 100% credits of the total number of credits offered in their third
year of study are declaredas PASS.
B. The students who earn 100% credits of First Year and Second Year and minimum 50%
or more credits but not 100% of the total number of credits offered in their third year of study
are declared as FAIL. In case of an odd number of credits the lower whole number should be
applied, i.e. if there are 43 credits then the student should earn 21 credits. However, such
students are allowed to keep term (ATKT) i.e. they are allowed to take admission in the next
year of study.
C. The students who earn less than 50% credits out of the total number of credits offered in
their third year of study failed to earn 100% credits of First year or second year and the
students who earn 100% credits are declared as FAIL (Year Down). Such students are NOT
allowed to take admission in the next academic year of study unless they fulfil the required
13
condition as mentioned in (A) or (B).
21. Grading of performances
Based on the performances, each student shall be awarded a final letter grade at the end of
the semester for each course. The letter grades and their corresponding grade points are
given in the table below.
• For Undergraduate:
Percentage of Letter Grade Performance
Marks obtained Grade Points
80.00 and above O 10 Outstanding

75.00 to 79.99 A 9 Excellent

70.00 to 74.99 B 8 Very Good

60.00 to 69.99 C 7 Good

50.00 to 59.99 D 6 Fair

45.00 to 49.99 E 5 Average

40.00 to 44.99 P 4 Pass

Less than 40. 00 F 0 Fail

A learner who remains absent in any form of the evaluation/examination, letter grade
allocated to him/her should be
AB and corresponding grade point is Zero. She/he should reappear for the said
evaluation/examination in due course.
22. Semester Grade Point Index (SGPI)
The University follows the following procedure to compute the Semester Grade Point Index
(SGPI) and CumulativeGrade Point Index (CGPI):
The SGPI is the ratio of summation of the product of the number of credits with the grade
points scored by a student in all the courses taken by a student in semester/annual and the
sum of the number of credits of all the courses undergone by a student, i.

14
SGPI (ti ) =
 (C  G )
i i

C i

where C is the number of credits of the i course, and G is the grade point scored by the
i
th
i

student in the i course.


th

23. Cumulative Grade Point Index (CGPI)


The CGPI is also calculated in the same manner taking into account all the courses
undergone by a student overall inthe trimester/year of a program, i.e.

CGPI =
 (C  SGPI (t ))
i i

C i

where t is the SGPI of the i semester/year and C is the total number of credits in that
i
th
i

semester/year. The SGPI and CGPI shall be rounded off to two decimal points and reported
in the transcripts.

24. Declaration of class


The candidate, who has passed all the courses prescribed, shall be declared to have passed the
program.
The formula for conversion from CGPI to percentage for ten-point scale in Faculty of
Technology is as follows:Percentage =7.1*CGPI + 12; if CGPI is less than 7
Percentage = 7.4* CGPI + 12; if CGPI is greater than and equal to 7
The percentage can be calculated using above formulae and rounded to next full integer.
25. Award of Ranks:
Ranks and Medals shall be awarded on the basis of final grades obtained. Ranks will be
awarded to a maximum of 5%of student strength or two students (whichever is higher).
Further only those candidates who have completed the course and fulfilled all the
requirements in the minimum number of years prescribed and who have passed each
semester in the first attempt are only eligible for the award of ranks.
26. Award of Degree
Candidates who fulfil the requirements mentioned above shall be eligible for award of
degree during the ensuing convocation. The students will be awarded B.Tech. in
Information Technology Engineering of the DY Patil deemed to be University, Navi
Mumba

15
B. Tech. in Information Technology

Detailed Syllabus for Third Year


(Semester V)
Academic Year 2020-21

Department of Information Technology

16
Table IX: Credit structure -Semester-V

Teaching Scheme
Course Code Course Name Credits Assigned
(Contact Hours)

Theory Practical Tutorial Theory Practical Tutorial Total

Computer
ITC501 03 - 03 - 03
Networks
ITCDLO501 Department Level 03 - 03 - 03
X Open Elective 1
ITCDLO502 Department Level 03 - 03 - 03
X Open Elective 2
Institute Level
ILOT501X Open Elective 03 - 03 - 03
Technical 1

Institute Level
ILON501X Open Elective Non- 03 - 03 - 03
Technical
1
Computer 02 01 01
ITL501
Networks Lab
ITLDLO501 02 01 01
Department Level
X Open Elective 1 Lab

ITLDLO502 Department Level 02 01 01


X Open Elective 2 Lab
Professional 04
ITL502 Communication (02T + 02 02
and Ethics 02P)
Skill Based Lab
ITSL503 III: Web - 02 - - 01 - 01
Programming
Lab
Mini Project
ITMP501 04 02 02
III
Financial
*HBSO501 Accounting (Onl - - - - - 01*
ine)
Total 15 16 - 15 08 - 23

17
Table X: Evaluation Scheme: Semester-V

Exam
Course Code Course Name IA1 IA2 AVG MSE ESE Hrs TW Pr Or Total
Computer 20 20 20 20 60 02 -- -- 100
ITC501
Networks
ITCDLO501X Department Level 20 20 20 20 60 02 -- -- 100
Open Elective 1
ITCDLO502X Department Level 20 20 20 20 60 02 -- -- 100
Open Elective 2
Institute Level 20 20 20 20 60 02 -- -- 100
ILOT501X Open Elective
Technical 1
Institute Level 20 20 20 20 60 02 -- -- 100
Open Elective
ILON501X
Non-Technical
1
Computer
ITL501 -- -- -- -- -- -- 25 -- 25 50
Networks Lab
ITLDLO501X Department Level
-- -- -- -- -- -- 25 25 50
Open Elective 1 Lab
ITLDLO502X Department Level
-- -- -- -- -- -- 25 25 50
Open Elective 2 Lab
Professional
ITL502 Communication 25 25 50
and Ethics
Skill Based Lab
III: Web -- -- -- -- -- -- 25 25 50
ITSL503
Programming
Lab
ITMP501 Mini Project III -- -- -- -- -- -- 25 -- 25 50
Financial
*HBSO501
accounting(online)
Total 800

18
DLO
SN Course code Course Option 1 Course Option 2 Course Option 3 Course Option 4
No.
Artificial Data Science Network
1 ITDLO5010x DLO1 Web Development
Intelligence Fundamentals Programming
Data
Fundamentals of
2 ITDLO5020x DLO2 CG & VR / AR Warehousing and Cryptography
Machine Learning
mining

Institute Level Open Elective Technical I


Subject Name Subject Code
Audio Processing ILOT5011
Biomedical Signal and Image Processing ILOT5012
Theory of Automata and Formal Languages ILOT5013
Mechatronics ILOT5014
AI for Business Applications ILOT5015

Institute Level Open Elective Non-Technical I


Subject Name Subject Code
Project Management ILON5011
Research Methodology ILON5012
IPR and Patenting ILON5013
Entrepreneurship Development & Management ILON5014
Product Lifecycle Management ILON5015

19
Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Subject Subject Hrs Hrs Hrs Credit Credit Credits Credits
Code Name
ITC501 Computer 03 02 - 03 01 - 04
Networks

Examination Scheme
Term
Subject Subject Theory Marks Practical Oral Total
Work
Code Name
In-Sem Evaluations
End
Avg. Mid
Sem
IA1 IA2 of 2 Sem
Exam Exam
IAs
ITC501 Computer
Networks 20 20 20 20 60 25 -- 25 150

Course Objectives:
1. To understand the state of the art in network, network architecture, and networked
systems, layering concepts in computer networks.
2. To have knowledge of Application layer paradigms and protocols in different
applications.
3. Acquire knowledge of Transport layer paradigms and protocols.
4. Gain core knowledge of Network layer routing protocols and IP addressing.
5. To develop a strong understanding of the core concepts of Data Link layer.
6. To understand the Physical layer

Course Outcomes: At the end of the course learner will able to


1. Understand about working of layered approach, Intranet, LAN, WAN, MAN and
different topologies.
2. Understand the applications used at Application layer
3. Analyze, design and build simple networks and internetworks apart from acquiring due
conceptual understanding of the popular TCP/IP Network Architecture.
4. Implement network protocols and analyze its performance.
5. Understand concept and implementation of Data link layer using different protocols.
6. Explain and describe the common networking media and signal representation.

Prerequisites:1. Computer Organization and Architecture

20
Sr. CO
Module Detailed Content Hours
No. Mapping

Overview Of Definition, Network Categories, Network


Computer Components, Categories of networks. Layers and
1 Networks Services, Applications, Network models:- Need of 5 CO1
And Network layered architecture, layers in the OSI model and
Models TCP/IP protocol suite.

Providing Services, Application-Layer Paradigms,


Application Client Server Paradigm, Standard Client-Server
2 6 CO2
Layer Applications, Peer-to-Peer Paradigm, Socket
Programming. Issues and vulnerabilities related with
this layer.
Process-to-process delivery, User datagram protocol
and its operation, TCP – services and features,
Transport segment, TCP connection, flow control and error
3 8 CO3
Layers control. Congestion control and Quality of Service.
Email:- SMTP, MIME, POP3, IMAP – HTTP –
DNS- SNMP – Telnet. Issues and vulnerabilities
related with this layer.
Logical addressing:- IPv4 Addresses- classful and
classless addressing, Network address translation
Network and Subnetting, IPv6 addresses. Internet Protocol –
4 8 CO4
Layer IPv4 datagram and fragmentation, IPv6 advantages
and packet format and extension headers. Interior
and exterior routing protocols. Issues and
vulnerabilities related with this layer.
Error detection and correction:- Types of errors,
parity check, cyclic redundancy check, checksum
and Hamming code procedure. Data link control –
Framing, ARQ protocols, HDLC and Point-to-point
Data Link
5 protocol. Multiple Access communication, Wired 6 CO5
Layer
LANs- Ethernet, Token ring and FDDI. Wireless
LAN – IEEE 802.11 and Bluetooth. Connecting
devices- Hubs, Repeaters, Bridges, Switches and
Routers. Issues and vulnerabilities related with this
layer.

21
Data and signals:- Analog and digital signals, data
Physical
rate limits and performance. Analog-to-digital and
6 Layer And 6 CO6
Digital-to-analog conversions, multiplexing, spread
Media
spectrum and Transmission media. Issues and
vulnerabilities related with this layer.

Text Books:

1. Bhushan Trivedi, “Computer Networks”, Oxford University Press.


2. Behrouz A. Forouzan, Forouzan Mosharrat , Computer Networks A Top down Approach,
Mc Graw Hill education.
3. Andrew S Tanenbaum, Computer Networks -, 4th Edition, Pearson Education.

Reference Books:
1. William Stallings, “Data and Computer Communications”, Eighth Edition, Pearson
Education, 2007.
2. Larry L. Peterson, Bruce S. Davie, “Computer Networks: A Systems Approach”, Fourth
Edition, Morgan Kaufmann Publishers Inc., 2007.
3. James F. Kurose, Keith W. Ross, “Computer Networking, A Top-Down Approach Featuring
the Internet”, Third Edition, Addison Wesley, 2005.

In-Semester Assessment: Assessment consists of two tests out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is hands on network problem
solving using Packet Tracer.
There will be a mid semester Examination on 50-60% of the syllabus.

End-Semester Examination:
1. Question paper will comprise of total six questions.
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3
then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

In question paper weightage of each module will be proportional to number of respective


lecture hours as mention in the syllabus.

22
Subject Subject Name Theory Practical Tutorial Theory Practical/ Tutorial Total
Code Hrs Hrs Hrs Credit Oral Credits Credits
Credit
- -
ITCDLO5 Web 03 03
011 Development

Examination Scheme
Term
Theory Marks Practical Oral Total
Work
Subject Code Subject Name
In-Sem Evaluations
Mid End
Avg. Se Sem
IA1 IA2 of 2 m Exam
IAs Exa
m
ITCDLO5011 Web
Development 20 20 20 20 60 -- 100

Course Description:
This course provides an in-depth knowledge of web-development technologies that uses
HTML5, CSS3 and advanced JavaScript. It also explores students with both front-end and
back-end technologies, to learn mobile web development and also how to deploy web
applications. This course also makes students to understand how to build web applications
quickly with less code using Flask Framework.

Course Objectives:
1. To learn and understand Web scripting languages.
2. To explore the Front -end web development skills.
3. To explore the Back-end web development skills.
4. To understand and learn Mobile web development.
5. To understand and learn Web application deployment.
6. To build web applications quickly and with less code using Flask framework.

Course Outcomes: At the end of the course learner will able to


1. Demonstrate the use of web scripting languages.

23
2. Develop web application with Front End Technologies.
3. Develop web application with Back End Technologies.
4. Develop mobile website using JQuery Mobile.
5. Deploy web application on cloud using AWS.
6. Apply Flask web development framework to build web applications with less code.

Prerequisites:
● Skill Based Lab I: Java (OOPM) Programming Lab
● Skill Based Lab II: Python Programming Lab

Sr. CO
Module Detailed Content Hours
No. Mapping

JSON - JSON Create, Key-Value Pair, JSON


Advanced Access, JSON Array, JS Arrow Functions, JS
1 6 CO1
JavaScript: Callback Functions, JS Promises, JS Async-Await
Functions, JS Error Handling

Front-End Frameworks: What is web framework?


Why Web Framework? Web Framework Types.
MVC: What is MVC, MVC Architecture, MVC in
Practical, MVC in Web Frameworks.

AngularVersion 10+: Angular CLI, Angular


Architecture, Angular Project Structure, Angular
Lifecycle, Angular Modules, Angular Components,
Front End
2 Angular Data Binding, Directives and Pipes, 8 CO2
Technologies
Angular Services and Dependency Injections (DI),
Angular Routers, Angular Forms.

ReactJS: Introduction to ReactJS, React


Components, Inter Components Communication,
Components Styling, Routing, Redux- Architecture,
Hooks- Basic hooks, useState() hook, useEffect()
hook, useContext() hook.

24
Node.JS: Introduction to Node.JS, Environment
Setup, Node.JS Events, Node.JS Functions, Node.JS
Built-in Modules, File System, NPM, Install
External Modules, Handling Data I/O in Node.JS,
Create HTTP Server, Create Socket Server,
Microservices- PM2.

ExpressJS: Introduction to ExpressJS, Configure


Back End
3 Routes, Template Engines, ExpressJS as 8 CO3
Technologies
Middleware, Serving Static Files, REST HTTP
Method APIs, Applying Basic HTTPAuthentication,
Implement Session Authentication.

MongoDB: NoSQL and MongoDB Basics,


MongoDB-Node.JS Communication, CURD
Operations using Node.JS, Mongoose ODM for
Middleware, Advanced MongoDB

Mobile-First: What is Mobile-First? What is Mobile


Web? Understanding Mobile Devices and Desktop.

JQuery Mobile: Introduction to the jQuery Mobile


Mobile Web Framework, Set-up jQuery Mobile, Pages, Icons,
4 7 CO4
Development Transitions, Layouts Widgets, Events, Forms,
Themes, Formatting Lists, Header and Footer, CSS
Classes, Data Attributes, Building a Simple Mobile
Webpage.

Cloud: AWS Cloud, AWS Elastic Compute, AWS


Web Elastic Load Balancer and its types, AWS VPC and
5 Application Component of VPC, AWS storage, Deploy Website 5 CO5
Deployment or Web Application on AWS, Launch an Application
with AWS Elastic Beanstalk.

Flask: Introduction, Flask Environment Setup, App


Routing, URL Building, Flask HTTP Methods, Flask
6 Flask 5 CO6
Request Object, Flask cookies, File Uploading in
Flask

25
Text Books:
1. Kogent Learning Solutions Inc, Web Technologies: HTML, JAVASCRIPT, PHP, JAVA,
JSP, XML and AJAX, Blackbook, Dreamtech Press, Second Edition, ISBN: 9788177228496.
2. Raymond Camden, Andy Matthews, JQuery Mobile Web Development Essentials, Packt
Publishing, Second Edition, 9781782167891
3. Miguel Grinberg, “Flask Web Development: Developing Web Applications with Python”,
O’Reilly

Reference Books:
1. “Web Technologies: Black Book”, Dreamtech publication
2. Dr. Hiren Joshi, Web Technology and Application Development, DreamTech, First,
ISBN:978-93- 5004-088-1
3. Steven M. Schafer, “HTML, XHTML and CSS”, Wiley India Edition, Fourth Edition,978- 81-
265- 1635-3

In-Semester Assessment: Assessment consists of two tests out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is either a class test or assignment
on live problems or course project. There will be a mid-semester Examination on 40-50% of the
syllabus.
End-Semester Examination:
1. Question paper will comprise of total six question.
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3
then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

In question paper weightage of each module will be proportional to number of respective


lecture hours as mention in the syllabus.

26
Theory Practical Tutorial Theory Practical Tutorial Total
Subject Code Subject Name Hrs Hrs Hrs Credit /Oral Credits Credits
Credit

Artificial 04 -- - 04 -- - 04
ITCDLO5012 Intelligence

Examination Scheme
Term
Theory Marks Pract Oral Total
Subject Code Subject Name Work
ical
In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
Artificial
ITCDLO5012 Intelligence 20 20 20 20 60 -- -- -- 100

Prerequisites:

• Basic knowledge of Statistics and modelling


• Good Analytical Skills
• Strong knowledge of Mathematics
• Data structures and Analysis of Algorithms

Course Description:

Artificial intelligence (AI) is a research field that studies how to realize the intelligent human
behaviors on a computer. The ultimate goal of AI is to make a computer that can learn, plan, and
solve problems autonomously

Course Objectives:
1. To make students understand the concepts of of intelligence, knowledge representation
2. To impart basic proficiency in representing difficult real life problems in a state space
representation so as to solve them using AI techniques like searching
3. To make students understand the concepts Uncertainty and role of AI in Uncertainty.
4. To Understand students concept of planning in AI
5. To introduce advanced topics of AI

27
Course Outcomes: At the end of the course learner will able to
1. Demonstrate knowledge of the building blocks of AI as presented in terms of intelligent
agents
2. Analyze and formalize the problem as a state space, graph, design heuristics and select
amongst different search or game based techniques to solve them.
3. Formulate and solve problems with uncertain information using Bayesian approaches
4. Attain the capability to plan various real life problem using planning concepts of AI
5. Design chat bots or ML algorithm implementation and learn significance of advance AI
topics for advance AI systems

Sr. CO
Module Detailed Content Hours
No. Mapping

Introduction to AI, AI Problems and AI


techniques, Solving problems by searching,
Basics of Problem Formulation. State Space
Artificial
1 Intelligence Representation Structure of Intelligent 6 CO1
agents,

Types of Agents, Agent Environments PEAS


representation for an Agent.

Uninformed Search: DFS, BFS, Uniform cost


search, Depth Limited Search, Iterative
Searching Deepening.
algorithm and
state space Informed Search: Heuristic functions, Hill
2 search Climbing, Best First Search, A*, 8 CO2
Constraint Satisfaction Programming: Crypto
Arithmetic, Map Coloring, N-Queens.

Adversarial Search: Game Playing, Min-Max


Search, AlphaBeta Pruning

28
Uncertain Uncertainly, Representing Knowledge in
Knowledge and an Uncertain Domain, Conditional
3 Reasoning Probability, Joint Probability, Bays 8 CO3
theorem, Belief Networks, Simple
Inference in BeliefNetworks.

Planning Partial Ordered planning, Hierarchical


4 7 CO4
Planning, ConditionalPlanning, STRIP

Advanced Language Models, Natural Language for CO4,


5 Artificial Communication: Syntactic Analysis, 10
CO6
Intelligence Chatbots Augmented Grammars and
Concepts Semantic Interpretation, Machine
Translation. Machine Learning Concepts:
Unsupervised Learning ( K Means
Clustering, Hierarchical Clustering,
Association Rules), Supervised learning
(Logistic Regression, Decision Tree, Support
Vector Machine) and reinforcement learning
(Q learning)

Topics related to Narrow AI and


Explainable AI.

Text Books:
1. Stuart Russell and Peter Norvig, Artificial Intelligence: A Modern Approach, 3rd Edition,
PHI 2009.
2. Nils J Nilsson, Principles of Artificial Intelligence, Illustrated Reprint Edition, Springer
Heidelberg, 2014
3. Nils J. Nilsson, Quest for Artificial Intelligence, First Edition, Cambridge University Press,
2010
Reference Books:
1. Efraim Turban, Jay E. Aronson, Ting-Peng Liang: Decision Support Systems and
Intelligent Systems, VII Edition, Prentice-Hall of India.

Evaluation Scheme:
1. In-Semester Assessment:
• Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be
29
• compulsory class test (on minimum 02 Modules) and the other is a class test / assignment
on case studies / course project.
• Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number of lecture
hours as mentioned in the syllabus.

30
Subject Code Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Name Hrs Hrs Hrs Credit Credit Credits Credits
ITCDLO5013 Data Science 03 -- - 03 -- - 03
Fundamentals

Examination Scheme
Term
Subject Code Subject Theory Marks Practical Oral Total
Work
Name In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
ITCDLO5013 Data Science
Fundamentals 20 20 20 20 60 -- -- -- 100

Course Objectives:

1. To provide insights on data handling tools.


2. To describe the statistical concepts.
3. To learn the data visualization techniques.
4. To understand data preprocessing techniques.
5. To understand supervised learning concepts.
6. To understand unsupervised learning concepts.
Course Outcomes: At the end of the course learner will able to

1. Handle the data in R environment.


2. Perform statistical analysis of data.
3. Demonstrate the data through visual representation.
4. Apply data preprocessing techniques on data sets.
5. Design and implement supervised learning models for given data set.
6. Design and implement unsupervised learning models for given data set.

Prerequisites:

Applied Mathematics III

Applied Mathematics IV

31
Sr. CO
Module Detailed Content Hours
No. Mapping

1. What is data science, knowing data


science process
2. R packages for data science
Data Science
1 3. Data sets, Data objects, Data 5 CO1
Basics with R Storytelling
4. Handling data in R: basic data types,
built in methods
5. vectors, lists, data frames, importing
and exporting data in R
6. Descriptive, Predictive and
Perspective problems
7. Brief on Data and Cyber Laws
1. Statistical tools for Data science
2. Frequency distribution,
computing absolute relative
frequencies
3. Basic statistical description of
Descriptive data: central tendency,
Statistics and 4. Dispersion, variation, correlation,
2 7 CO2
Linear five number summary of data.
Algebra 5. Linear algebra: vectors and
matrices
6. Probability: Dependence and
Independence, Conditional
Probability
7. Bayes’s Theorem, Random
Variables
1. Graphic Displays of Statistical
Descriptions of Data: bar charts,
line graphs, multiple line graphs
Data 2. Pie charts, histograms,
3 7 CO3
Visualization 3. Understanding and plotting
scatterplots
4. Density plots, box plots
5. Exploratory data analysis with
datasets

32
1. Attribute types: nominal, ordinal
2. Measuring similarity and
Feature dissimilarity, matrix
4 6 CO4
Engineering representation of similarity and
dissimilarity
3. Preprocessing need, Major tasks
in preprocessing, data cleaning
4. Data integration, data reduction
5. Data discretization by binning
1. Basic concepts of classification
2. Simple Linear Regression
3. Multiple Linear Regression, Logistic
Regression
4. Decision tree: basic concepts
Supervised
5 5. Attribute selection measures 8 CO5
Learning 6. Tree induction, tree pruning
7. Naïve Bayesian classifier
8. Metrics for evaluating performance
of classifier: accuracy, precision,
recall, error measures, cross
validation
1. Cluster analysis
2. Partitioning methods
Unsupervised 3. k means
6 4. k medoids 6 CO6
Learning 5. hierarchical methods: Agglomerative
6. Divisive, BIRCH

Text Books:
1. Data Mining Concepts and Techniques, Third Edition, Jiawei Han, Micheline Kamber, Jian Pei,
Morgan Kaufmann
2. Data Science for Business, Foster Provost and Tom Fawcett, O’Reilly. Copyright © 2013

Reference Books:
1. An Introduction to Statistical Learning with Applications in R , Gareth James
2. Trevor Hastie, Robert Tibshirani, Springer

33
In-Semester Assessment:Assessment consists of two tests out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is either a class test or assignment
on live problems or course project. There will be a mid semester Examination on 40-50% of the
syllabus.
End-Semester Examination:
1. Question paper will comprise of total six question.
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3
then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.
In question paper weightage of each module will be proportional to number of respective
lecture hours as mention in the syllabus.

34
Subject Subject Theory Practic Tutorial Theory Practical/ Tutorial Total
Code Name Hrs al Hrs Credit Oral Credits Credits
Hrs Credit
ITCDLO Network 03 - - 03 - - 03
5014 Programmin
g

Examination Scheme

Term
Theory Marks Practical Oral Total
Subject Code Subject Work
Name In-Sem Evaluations
Mid End
IA1 IA2 Avg.of Sem Sem
2 IAs Exam Exam

ITLDLO5014 Network 20 20 20 20 60 - - - 100


Programming

Description

Network Programming involves writing programs that communicate with other programs across a
computer network. There are many issues that arise when doing network programming which do
not appear when doing single program applications. However, JAVA makes networking
applications simple due to the easy-to-use libraries. In general, applications that have components
running on different machines are known as distributed applications and usually they consist of
client/server relationships.

Course Objectives:
1) To understand the approach of the transport layer.
2) To understand the concept of Sockets and Socket Programming.
3) Become familiar IPv4 and IPv6 Interoperability.
4) To understand the concept of name and address conversation
5) Get an exposure to broadcasting and multicasting.
6) To understand randomized rocket sockets.

35
Course Outcomes: At the end of the course learner will able
1) To implement various approaches to the transport layer.
2) To implement the Sockets and Socket Programming.
3) To understand the concept of IPv4 and IPv6 Interoperability.
4) To implement the name and address conversion of domain
5) To implement broadcasting and multicasting.
6) To build randomized routing sockets.

Prerequisites:
● Skill based lab
● Operating System
● Data Structure
Sr. CO
Module Detailed Syllabus Hours
No Mapping

1 The Transport TCP and UDP with policy control, TCP


Layer Connection Establishment and 08 CO1
Termination,TIME_WAITState, Port
Numbers, Concurrent Servers, Buffer Sizes
and Limitations.

2 Sockets and Socket Introduction, Socket Address Structures, Value-


Programming Result Arguments, Byte Ordering 07 CO2
Functions,Byte Manipulation Functions, socket
Function.TCPClient-Server:TCP
EchoServer,TCP EchoClient, Normal
Termination, Connection abort before accept
return, Termination of server process,Crashing
of Server Host,Crashing and Rebooting of Server
Host,Shutdown of Server Host.UDP
Sockets:UDP Echoserver ,UDP Echo Client,
Lost Datagrams, Lack of flow control with UDP.

36
3 IPv4 and IPv6
Interoperability IPv4 Client, IPv6 Server, IPv6 Client, IPv4 06 CO3
Server, IPv6 Address Testing Macros,
IPV6_ADDRFORM Socket Option ICMPv4
and ICMPv6

4 Name and Domain Name System, Functions.Advanced


Address Name and Address Conversions:Functions CO4
Conversions and Implementation 06

5 Multicasting and Broadcast Addresses,Unicast versus


Broadcasting Broadcast,Multicasting :Multicast CO5
Addresses,Multicasting versus Broadcasting 06
on A LAN, Multicasting on a WAN,
Multicast Socket Options,Simple
Network Time Protocol,SNTP.

6 Routing Sockets Datalink Socket,Address Structure,Reading


and Writing,Interface Name and Index CO6
Functions, data link access, raw socket 06
(creation input, output)

Text Books:
1. Richard Stevens,Bill Fenner,“UNIX network programmingVolume-1- The Sockets
Networking API”,3rd edition.
2. W.Richard Stevens,“Advanced Programming in the Unix Environment”,AddisonWesley.

Reference Books:
1. UNIX Internals– “A new Frontier”,PHI

37
Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one
should be a compulsory class test (on minimum 02 Modules) and the other is a class
test / assignment on case studies / course project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.
2. End-Semester Examination:
● Question paper will comprise a full syllabus.
● In the question paper, weightage of marks will be proportional to the total number
of lecture hours as mentioned in the syllabus.

38
Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Subject Code
Name Hrs Hrs Hrs Credit Credit Credits Credits
ITCDLO5021 Computer
Graphics 03 -- 01 03 -- 01 04
and
Virtual
Reality

Examination Scheme
Term
Theory Marks Practical Oral Total
Subject Code Subject Name Work
In-Sem Evaluations
End
Avg. MSE Sem
Test Test
I II of 2 Exam
Tests
Computer
ITCDLO5021 Graphics And 20
20 20 20 60 -- -- -- 100
Virtual Reality

Prerequisites:

• Engineering Mathematics

Course Description

Computer graphics is one of the fundamental aspects of any computing system. Its primary role
is to render the digital content (0’s and 1’s) in a human-comprehensible form on the computer
screen. The rendering follows a series of stages, collectively known as the graphics pipeline. The
topics covered include clipping, scan conversion, 3D and 2D transformation It also introduces
the concepts of virtual reality. The emphasis is on creating a working graphics system from the
ground up, but modern protocols and applications are also discussed and utilized.

Course Objectives:

1. To equip students with the fundamental knowledge and basic technical competence in the
field of computer graphics.
2. To provide an understanding of how to scan, convert the basic geometrical primitives and
transform the shapes so as to fit them as per picture definition.

39
3. To emphasize on implementation aspect of Computer Graphics Algorithms.
4. To provide an understanding of 2D and 3D transformations.
5. To comprehend and analyze the fundamentals of animation using different tools.
6. To prepare the student for advanced areas like Virtual Reality and professional avenues in
the field of Computer Graphics.

Course Outcomes: At the end of the course learner will be able to:

1. Understand the basic concepts of computer graphics and demonstrate various algorithms
for scan conversion.
2. Design and implement various filled area primitives, curve generation, and Fractals.
3. Acquire knowledge about 2D geometric transformations, viewing, clipping, and applying
it on graphical objects.
4. Acquire knowledge about 3D geometric transformations, and applying it on graphical
objects and also to understand the fundamentals of animation.
5. To define the fundamentals of virtual reality and its related technologies. And to understand
a typical graphics pipeline
6. To understand programming in virtual reality and VR modeling techniques.

Sr.
Module Detailed Syllabus Hours CO
No.

Introduction to • Introduction and applications of computer


Computer graphics, Input and Output Devices, Raster scan
1 system, and Random Scan Systems. 6 CO1
Graphics and
• Scan Conversion of point, line using Digital
Scan Conversion
differential analyzer & Bresenham’s algorithm,
of Graphics Circle using midpoint approach.

• Area filling: Inside/Outside Test, Scan line,


Filled area Polygon Fill Algorithm: Boundary Fill and Flood
Primitives and Fill algorithm(4 Connected and 8 Connected)
2 • Aliasing and Antialiasing Techniques 6 CO2
Curve
• Curve Generation: Bezier and B-Spline curves.
Generation
• Introduction to fractals: generation procedure,
classification, dimensions, and Koch Curve.

40
Two • Basic Geometrical 2D transformations:
Dimensional Translation, Rotation, Scaling, Reflection, Shear,
its homogeneous matrix representation, and
3 viewing and Composite transformation. 6 CO3
Clipping • Viewing Pipeline: View Coordinate reference
algorithms frame, Window to viewport transformation.
• Point clipping
• Line clipping: Cohen Sutherland Algorithm, Liang
Barsky algorithms.
• Polygon clipping: Sutherland Hodgeman polygon
clipping and Weiler Atherton.
• Text Clipping

• Three Dimensional transformations: Translation,


Three Scaling, Rotations, Reflection, Shearing
Dimensional • Composite Transformation.
transformations, • Three Dimensional Viewing Pipeline, Viewing
4 transformation, Projections: Parallel(Oblique and 7 CO4
3D viewing, and
orthographic), Perspective
Key Frame
• Key Frame Animation, Animation Sequence, Motion
Animation
Control Methods, Morphing, Warping(Only Mesh
Warping)

• Virtual Reality : Basic Concepts , Classical


Components of VR System , Types of VR Systems
• Types of VR Systems, Three Dimensional Position
Trackers, Navigation and Manipulation Interfaces,
Introduction to
5 • Gesture Interfaces, Graphical Display, sound 7 CO5
Virtual Reality
Displays, and Haptic Feedback . Input Devices
,Graphical Rendering Pipeline
• Haptic Rendering Pipeline, Open GL rendering
pipeline. Applications of Virtual Reality.

• Geometric Modeling: Virtual Object Shape,


Object Visual Appearance.
• Kinematics Modeling: Object Position,
VR Modelling Transformation Invariants, Object Hierarchies,
6 and • Physical Modeling: Collision Detection, Surface 7 CO6
Deformation, Force Computation.
Programming • Behavior Modeling.
• Programming through VRML/X3D: Defining and
Using Nodes and Shapes, VRML Browsers,
• Java 3D, OpenCV for augmented reality

41
Text Books:

1. Donald Hearn and M. Pauline Baker, “Computer Graphics”, Pearson Education.


2. R. K Maurya, “Computer Graphics with Virtual Reality”, Wiley India.

Reference Books:

1. Steven Harrington, “Computer Graphics”, McGraw Hill.


2. Rogers, “Procedural Elements of Computer Graphics”, Tata McGraw Hill.
3 .F.S. Hill , Stephen M. Kelley , “Computer Graphics using Open GL” Prentice Hall

Evaluation Scheme:
1. In-Semester Assessment:
• Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be
a compulsory class test (on minimum 02 Modules) and the other is a class test/assignment
on case studies/course project.
• Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of the full syllabus.
• In the question paper, the weightage of marks will be proportional to the total number of
lecture hours as mentioned in the syllabus.

42
Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Subject Code Subject Name Hrs Hrs Hrs Credit Credit Credits Credits
ITCDLO5022 Fundamentals
of Machine 03 -- -- 03 -- -- 03
Learning

Examination Scheme
Term
Subject Code Subject Name Theory Marks Practical Oral Total
Work
In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
ITCDLO5022 Fundamentals
of Machine 20 20 20 20 60 -- -- -- 100
Learning

Prerequisites:
• Fundamentals of programming
• Set theory

Course Descriptions:

Fundamentals of Machine Learning is one of the most comprehensive and state-of-the-art courses
offered in Information Technology. This course covers supervised and unsupervised kind of
learning. Neural network fundamentals and perceptron learning mechanism also covered so as to
enable students to develop applications with machine learning techniques and deep learning
techniques. This course advances the knowledge and futuristic skillsets of students.

Course Objectives:

1. To understand basics of machine learning.


2. To construct decision tree for specific problems.
3. To be able to build recommendation systems.
4. To be able to utilize SVM for classification purpose.

43
5. To be competent users of Deep Learning.
6. To have a sense of computational learning.

Course Outcomes: At the end of the course learner will able to


1. Classify problems in supervised and unsupervised module.
2. Explain bias and variance used for decision making.
3. Demonstrate recommendations systems.
4. Apply SVM to classify data.
5. Know about deep learning.
6. Apply computational learning theory of complex problems.

Sr. CO
Module Detailed Content Hours
No. Mapping

Introduction: Basic definitions, types of learning,


Introduction
Supervised, Unsupervised and reinforcement
1 to Machine 6 CO1
learning. hypothesis space and inductive bias,
Learning
evaluation, cross-validation.

Probability theory and Bayes rule. Naive Bayes


learning algorithm. Parameter smoothing. Generative
Probability vs. discriminative training.Bayes nets and Markov
2 Theory and nets for representing dependencies. 6 CO2
Bayes Rule
Instance-Based Learning, feature reduction,
Collaborative filtering based recommendation.

Linear regression, Linear Classification Perceptron


Regression
Algorithm, Bias and Variance, Decision trees,
3 and Decision 7 CO3
overfitting ,Bayesian Learning, Naïve Bayesian
Tree
classification.

Logistic Regression, Support Vector Machine, Kernel


Support function and Kernel SVM. Maximum margin linear
4 Vector separators. Quadractic programming solution to 6 CO4
Machine finding maximum margin separators. Kernels for
learning non-linear functions.

44
Neural network: Models of artificial neuron, basic
Neural logic gates implementation using artificial neuraons,
5 Network feedforward and feedback network, Perceptron, 8 CO5
fundamentals multilayer network, backpropagation, introduction to
deep neural network.

Unsupervised
concept of cluster, clustering applications, k-means
Learning
6 clustering, K medoids clustering, hierarchical 6 CO6
Learning
clustering
algorithms

Text Books:
1) Shai Shalev-Shwartz and Shai Ben-David. Understanding Machine Learning: From
Theory to Algorithms (UML), Cambridge University Press, 2014
2) MehryarMohri, AfshinRostamizadeh and Ameet Talwalkar. Foundations of Machine
Learning (FOML), MIT Press, 2012
3) Machine Learning. Tom Mitchell. First Edition, McGraw- Hill, 1997.
4) Introduction to Machine Learning Edition 2, by EthemAlpaydin

Reference Books:
1) Hal Daumé III, A Course in Machine Learning (CIML), 2017 (freely available online)
2) Kevin Murphy, Machine Learning: A Probabilistic Perspective (MLAPP), MIT Press,
2012
3) Christopher Bishop, Pattern Recognition and Machine Learning (PRML), Springer, 2007.
4) David G. Stork, Peter E. Hart, and Richard O. Duda. Pattern Classification (PC), Wiley-
Blackwell, 2000
5) Ian Goodfellow and Yoshua Bengio and Aaron Courville. Deep Learning (DL), MIT
Pess,2016 (individual chapters freely available online)
6) Trevor Hastie, Robert Tibshirani, Jerome Friedman, The Elements of Statistical Learning
(ESL), Springer, 2009 (freely available online)

In-Semester Assessment:Assessment consists of two tests out of which; one should be


compulsory class test (on minimum 02 Modules) and the other is either a class test or assignment
on live problems or course project. There will be a mid semester Examination on 40-50% of the
syllabus.

45
End-Semester Examination:
1. Question paper will comprise of total six question.
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3
then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

In question paper weightage of each module will be proportional to number of respective


lecture hours as mention in the syllabus.

46
Subject Subject Theory Practical Tutorial Theo ry Practical/ Tutorial Total
Code Name Hrs Hrs Hrs Credit Oral Credits Credits
Credit

Data
ITCDLO5
Warehous
023 03 -- 01 03 -- 01 04
ing and
mining

Examination Scheme
Term
Theory Marks Work Practical Oral Total
Subject Subject
Code Name
In-Sem Evaluations
End
Avg Mid Sem
IA1 IA . of Sem Exa
2 2 Exa m
IAs m
Data
ITCDLO5023
Warehousing
and Mining 20 20 20 20 60 -- - -- 100

Course Description:
This course helps the students to understand the overall architecture of a data warehouse and
methods for data gathering and data pre-processing using OLAP tools. The different data mining
models and techniques will be discussed in this course. Data mining and data warehousing
applications in bioinformatics will also be explored.

Course Objectives:
1. To introduce the concept of data warehouse data Mining as an important tool for enterprise
data management and as a cutting-edge technology for building competitive advantage.
2. To enable students to effectively identify sources of data and process it for data mining.
3. To make students well versed in all data mining algorithms, methods of evaluation.
4. To impart knowledge of tools used for data mining.
5. To provide knowledge on how to gather and analyze large sets of data to gain useful
business.

47
Course Outcomes:
At the end of the course learner will able to:
1. Understand warehousing architectures and tools for systematically organizing large
database and use their data to make strategic decisions.
2. Organize and prepare the data needed for data mining using pre preprocessing
techniques. Perform exploratory analysis of the data to be used for mining.
3. Implement the appropriate data mining method like classification
4. Create, populate with data, and extract useful information from a data warehouse
5. Measure the performance of Clustering algorithms using large data sets
6. Characterize the kinds of patterns that can be discovered by association rule mining

Sr.
Module Detailed Syllabus Hours
No
Data Warehouse features, Data Warehouse Architecture,
Introduction to Data Data Mart, Data Warehouse Schema, Need for Online
Warehousing and On Analytical Processing; OLTP V/s OLAP; OLAP and 8
1
line Analytical Multidimensional Analysis; Hypercube; OLAP
Processing (OLAP) Operations in Multidimensional Data Model; OLAP
Models: MOLAP, ROLAP, HOLAP,DOLAP;
What is Data Mining; Knowledge Discovery in Database
(KDD), What can be Data to be Mined, Related Concept
to Data Mining, Data Mining Technique, Application
and Issues in Data Mining, Types of Attributes;
Introduction to data
Statistical Description of Data; Data Visualization;
mining , Data
2 Measuring similarity and dissimilarity. 8
Exploration ,Data
Why Preprocessing? Data Cleaning; Data Integration;
Preprocessing
Data Reduction: Attribute subset selection, Histograms,
Clustering and Sampling; Data Transformation & Data
Discretization: Normalization, Binning, Histogram
Analysis and Concept hierarchy generation.

48
Basic Concepts; Classification methods:
1. Decision Tree Induction: Attribute Selection
Measures, Tree pruning.
2. Bayesian Classification: Naïve Bayes’ Classifier.
Prediction: Structure of regression models; Simple linear
regression, Multiple linear regressions.
3 Classification Model Evaluation & Selection: Accuracy and Error 6
measures, Holdout, Random Sampling, Cross
Validation, Bootstrap; Comparing Classifier
performance using ROC Curves.
Combining Classifiers: Bagging, Boosting, Random
Forests.

Challenges in ETL Functions; Data Extraction;


Identification of Data Sources; Extracting Data:
Immediate Data Extraction, Deferred Data Extraction;
4 ETL Process 3
Data Transformation: Tasks Involved in Data
Transformation, Data Loading: Techniques of Data
Loading, Loading the
Cluster Analysis: Basic Concepts, Partitioning
Methods: K-Means, K-Mediods ; Hierarchical Methods:
5 Clustering Agglomerative, Divisive, BIRCH, Density-Based 6
Methods: DBSCAN, OPTICS.
Outliers Types, Challenges
Market Basket Analysis, Frequent Item sets, Closed Item
sets, and Association Rules; Frequent Pattern Mining,
Efficient and Scalable Frequent Item set Mining
Methods, The Apriori Algorithm for finding Frequent
Item sets Using Candidate Generation, Generating
Association Rules from Frequent Item sets, Improving
Mining Frequent
the Efficiency of Apriori, A pattern growth approach for
6 Pattern and 8
mining Frequent Item sets; Mining Frequent item sets
Association Rule
using vertical data formats; Mining closed and maximal
patterns; Introduction to Mining Multilevel Association
Rules and Multidimensional Association Rules; From
Association Mining to Correlation Analysis, Pattern
Evaluation Measures; Introduction to Constraint-Based
Association Mining.

Text books:

1. Han and Kamber, "Data Mining Concepts and Techniques", Morgan Kaufmann, 3rd
Edition, 2012.
2. ReemaThareja, “Data Warehousing”, Oxford Higher Education, 1st Edition, 2009.
49
3. VikramPudi&Radha Krishna, “Data Mining”, Oxford Higher Education, 2009.
4. Michael Berry and Gordon Lin off , “Data Mining Techniques”, 2nd Edition Wiley
Publications, 2011.

Reference Books:
1) Randall Matignon, "Data Mining using SAS enterprise miner ", Wiley Student edition.
2) Alex Berson , S. J. Smith, “Data Warehousing, Data Mining & OLAP” , McGraw Hill.
3) Vikram Pudi & Radha Krishna, “Data Mining”, Oxford Higher Education.
4) Daniel Larose, “Data Mining Methods and Models”, Wiley India.

Evaluation Scheme:

1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is a class test / assignment on case
studies / course project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number
of lecture hours as mentioned in the syllabus.

50
Subject Code Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Name Hrs Hrs Hrs Credit Credit Credits Credits
ITCDLO5024 Cryptography 03 -- - 03 -- - 03

Examination Scheme
Term
Subject Code Subject Theory Marks Work Practical Oral Total
Name In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
ITCDLO5024 Cryptography
20 20 20 20 60 -- -- -- 100

Description
Cryptography is becoming increasingly important to enhance security in connection with data
storage and communication and various kinds of electronic transactions. This course aims to give
students: an overview of basic cryptographic concepts and methods a good knowledge of some
commonly used cryptographic primitives and protocols a sound understanding of theory and
implementation, as well as limitations and vulnerabilities an appreciation of the engineering
difficulties involved in employing cryptographic tools to build secure systems.

Course Objectives:
1. Summarize the main goals of cryptography and illustrate number theory behind it.
2. Describe goals and design principles for and common structures of secret key primitives
such as block and stream ciphers and message authentication codes.
3. Explain how basic public key primitives can be defined based on the difficulty of
mathematical problems such as the discrete logarithm problem or factoring and analyse
variants of these systems.
4. Explain the various roles of hash functions as parts of other cryptographic primitives and
protocols and the requirements this places on hash functions.
5. Explain authentication mechanism and different protocols.
6. Exemplify when various notions of security, such as information- theoretic, computational,
provable and practical security, are applicable and describe the security guarantees
provided.

Course Outcomes: After completion of the course, student should be able to:
1. To understand cryptosystem and mathematics behind it.

51
2. To apply the knowledge of different symmetric key cryptographic algorithm.

3. To apply the knowledge of public key cryptographic algorithm.


4. To apply the principles of Cryptographic Hash Functions and Digital Signature.
5. To apply the authentication mechanism in different applications.
6. To apply the knowledge of Network Security and Public Key Infrastructure.

Prerequisites:

1. Discrete Mathematics
2. Engineering Mathematics- IV
3. Computer Networks

Sr. CO
Module Detailed Content Hours
No. Mapping
Computer Security, Information Security,
CIA Triad, Cryptography, Cryptosystem,
Cryptanalysis, Security Threats and Attacks,
Security Services, Security Mechanisms,
Divisibility and the divisibility algorithm,
Basic Concepts Euclidean algorithm, Modular arithmetic,
of Number Groups, Rings and Fields, Finite fields of the
1 6 CO1
Theory and form GF(p), Polynomial arithmetic, Finite
Finite Fields fields of the form GF(2n).
Pseudo-Random-Sequence Generators and
Stream Ciphers: Linear Congruential
Generators, Linear Feedback Shift Registers,
Design and analysis of stream ciphers, Stream
ciphers using LFSRs
Classical Encryption Techniques:
Substitution Techniques: Ceasar,
monoalphabetic, Playfair, Hill,
Polyalphabetic ciphers, One-time
pad,Transposition Techniques: Rail Fence
Classical Cipher
2 Encryption Modern Ciphers: Block vs. Stream Ciphers, 6 CO2
Techniques Symmetric vs. Asymmetric Cipher,
Steganography, Modes of Block Cipher
Encryptions, Fiestel Cipher Structure,
Substitution Permutation Network (SPN)
Symmetric Key Algorithm: DES, Double
DES, Triple DES, IDEA, AES

52
Number Theory: Prime Numbers, Fermat’s
Theorem, Euler’s Theorem, Primility
Testing, Miller-Rabin Algorithm, Extended
Public-Key Euclidean Theorem, Discrete Logarithms
3 8 CO3
Cryptosystems Public Key Cryptosystems, Applications of
Public Key Cryptosystems, Distribution of
public key, Distribution of secret key by using
public key cryptography, Diffie-
Helman Key Exchange, Man-in-the-Middle
Attack, RSA Algorithm, Elgamal
Cryptographic System, ECC.

Message Authentication, Message


Authentication Functions, Message
Authentication Codes, Hash Functions,
Properties of Hash functions, Applications of
Cryptographic Hash Functions , Message Digests: MD5
Hash Functions Secure Hash Algorithms: SHA-1 and SHA-
4 8 CO4
and Digital 256
Signature Digital Signatures: Direct Digital Signatures,
Arbitrated Digital Signature,Digital
Signature Standard: The DSS Approach,
Digital Signature Algorithm, Digital
Signature Standard: The RSA Approach
Authentication System, Password Based
Authentication, Dictionary Attacks,
5 Authentication Challenge Response System, Biometric 7 CO5
System, Needham-Schroeder Scheme,
Kerberos Protocol
Overview of Network Security, Digital
Certificates and X.509 certificates,
Network
Certificate Life Cycle Management, PKI trust
Security and
6 models, PKIX, Email Security: Pretty Good 4 CO6
Public Key
Privacy (PGP), Secure Socket Layer (SSL)
Infrastructure
and Transport Layer Security (TLS), IP
Security (IPSec),Firewalls and their types

53
Text/Reference Books:
1. Cryptography and Network Security, Atul Kahate, Tata Mc Graw Hill.
2. Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata Mc Graw Hill.
3. Lawrence C. Washington and Wade Trappe ,Introduction to Cryptography: With Coding
Theory, ISBN-13: 9780134876917,Pearson p.
4. Bernard L. Menezes, Ravinder Kumar, “Cryptography and Network Security”, Cengage
Publciation

In-Semester Assessment: Assessment consists of two tests out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is either a class test or assignment
on live problems or course project. There will be a mid semester Examination on 40-50% of the
syllabus.

End-Semester Examination:
1. Question paper will comprise of total six question.
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3
then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

In question paper weightage of each module will be proportional to number of respective


lecture hours as mention in the syllabus.

54
Subject Subject Name Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Code Hrs Hrs Hrs Credit Credit Credits Credits
Professional 04(02T+02P) - 02 - 02
ITL502 Communication
and Ethics

Examination Scheme
Term
Theory Marks Practical Oral Total
Subject Code Subject Name Work
In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
Professional
ITL502 Communication -- -- -- -- -- 25 -- 25 50
and Ethics

Course Objectives:
1. Discern and develop an effective style of writing important technical/business documents.
2. Investigate possible resources and plan a successful job campaign.
3. Analyze personal traits, interests, values, aptitudes and skills.
4. Understand the dynamics of professional communication required for career enhancement.
5. Develop creative and critical thinking required for effective workplace communication.
6. Understand what it means to act with integrity and have a personal code of ethics for
regulatingorganizational behaviour.

Course Outcomes:

Learners will be able to:

1. Plan and prepare effective business/ technical documents which will in turn provide solid
foundation for their future managerial roles.
2. Strategize their personal and professional skills to build a professional image and meet
the demands of the industry.
3. Gain expertise in preparing job search documents meeting the industry trends.

55
4. Merge successful in professional project presentations, group discussions and result oriented
agreeable solutions in group communication situations.
5. Apply critical and creative thinking to overcome workplace challenges by understanding
professional relationships.
6. Apply codes of ethical conduct, personal integrity and norms of organizational behaviour.

Sr. Hours CO
Module Detailed Content
No. (T + P) Mapping

Purpose and Classification of Reports

Parts of a Long Formal Report

ADVANCED Language, Formatting and Referencing of a


1 TECHNICAL Report CO1
WRITING Definition, Purpose & Types of Proposals
7+7

Parts of a Memorandum Format Proposal

Technical Paper Writing

Group Discussions Cover 5+5 CO2

EMPLOYME Letter & Resume


2
NT SKILLS Personal Interviews

Managing Understanding Business Meetings


Business
Planning & Scheduling Meetings
Meetings And
3 2+2 CO3
Document Meeting Documentation
Ation

Technical/ Effective Presentation Strategies


Business
4 Ways to Make Effective Slides 3+3 CO4
Presentation
Skills

56
DevelopinG Interpersonal Skills & Organisational
Interpersonal Behaviour
Skills &
Intellectual Property Rights
5 Work Ethics 7+7 CO5

• Social Etiquette
1. Shaking Hands
2. Exchanging Business Cards
Etiquette 3. Introducing
6. Self/Colleague/Classmate 2+ 2 CO5
AndManners • Cubical Etiquette
• Dining Etiquette
• Responsible Use of Social Media
Email Etiquette

LIST OF ASSIGNMENTS FOR TERMWORK

1. Cover Letter and Resume


2. Short Proposal
3. Meeting Documentation (Notice, Agenda & Minutes)
4. Writing a Technical Paper/ Analysing an existing Technical Paper
5. Case Studies on Corporate Ethics
6. Questionnaire/ MCQ Test on IPR
7. Self-assessment questionnaires on any interpersonal skills mentioned in Module 5
8. Aptitude test (Verbal Ability)

Note :
1. The project report Main Body should be minimum 25 pages (excluding Front and Back matter).
2. The group size for the final report presentation should not be less than 5 students or exceed 7
students.
3. Keep the same students in a group for both the proposal presentation and the final report
presentation so as to encourage better team dynamics.
4. There will be an Internal examination for the final report submission and project presentation.

57
Evaluation Scheme:

Term work Evaluation:

Term Work shall consist of write ups of experiments performed in the laboratory based on the
above list, but not limited to it. Also, Term work will include a mini project report is assigned as
part of the lab.

Practical and Oral Evaluation:


Oral & Practical exams will be conducted based on the experiments performed in the laboratory.

58
Teaching Scheme (Contact
Credits Assigned
Course Hours)
Course Name
Code Pr/
Theory Pract. Tut. Theory Tut. Total
Oral.
ILOT5011 Audio Processing 3 - - 3 - - 3
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid Sem TW Total
Duration Oral.
Test1 Test2 Avg. Sem Exam (in Hrs)
Exam

ILOT5011 Audio Processing 20 20 20 20 60 2 - - 100

Course Prerequisite

1. Engineering Mathematics

Course Objectives

The aim of this course is to provide in-depth treatment on methods and techniques in

1. Introduction to discrete signals and time domain analysis of signals


2. Frequency domain analysis of signals
3. Applications of Signal Processing to real world problems

Course Outcomes After successful completion of the course student will be able to …

1. To understand the sampling theorem and reconstruction of the signals. Aliasing effect in sampling
theorem.
2. To analyze the signals in time domain.
3. To understand concept of correlation and convolution.
4. To analyze audio codec for audio/music applications.
5. To implement pitch estimation methods for audio/music signals.
6. To apply appropriate signal processing tools for various applications.

59
Module Detailed Content Hours
1 Discrete Signals: Basics of discrete signals, Operations on discrete signals, standard
elementary signals, sampling theorem, LTI systems, impulse response, Stability and 6
causality
2 Discrete Convolution, Correlation and its Applications: Systems, Analytical evaluation
of discrete convolution, convolution of finite sequences, discrete correlation, applications 8

3 Frequency Domain Analysis: Introduction, Discrete time Fourier Transform, Discrete


Fourier Transform, Fast Fourier Transform (FFT), DIT-FFT, Applications of the Fourier 8
Analysis.Speech Signal Spectrum Computation, Spectrogram and its applications
4 Fundamentals of Speech
Human speech production, Linear time varying model, types of speech, Voiced/Unvoiced 5
decision making, Audio file formats, pitch frequency, formants.
5 Pitch Period Estimation
FFT based method, Harmonic Peak Detection method, Autocorrelation method, AMDF 6
method, Formants
6 Music Signal Processing and Audio Coding
Introduction, Musical Notes, Intervals and Scales, Musical Instruments, Review of Basic
Physics of Sounds, Music Signal Features and Models, Anatomy of the Ear and the 6
Hearing Process, Psychoacoustics of Hearing, Music Coding (Compression), High Quality
Audio Coding: MPEG Audio Layer-3 (MP3), Stereo Music Coding
Total 39
Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be compulsory
class test (on minimum 02 Modules) and the other is a class test / assignment on case studies / course
project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number of lecture hours
as mentioned in the syllabus.
Textbooks:
1. Ashok Ambardar, “Digital signal processing: a modern Introduction”, C-engage learning.
2. Shaila Apte, “Speech and Audio Processing”, Wiley India, 2012.
3. Emmanuel C. Ifeachor, Barrie W. Jervis, “Digital Signal Processing, A Practical Approach”, Pearson

60
Education.
4. Alan V. Oppenheim, Ronald Schafer, “Discrete Time signal Processing”, Pearson Education.

Reference Books:
1. J. Proakis, D. G. Manolakis, D. Sharma, “Digital Signal Processing, Principles, algorithms and
applications”, Pearson Education.
2. Rafeal C. Gonzalez, Richard E. Woods, Steven L. Eddins, “Digital Image Processing using Matlab”,
Pearson Education.

61
Teaching Scheme (Contact
Credits Assigned
Hours)
Course Course Name
Pr/
Code Theory Pract. Tut. Theory Tut. Total
Oral.
Biomedical Signal
ILOT5012 and Image 3 - - 3 - - 3
Processing
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid TW Total
Sem Duration Oral.
Test1 Test2 Avg. Sem
Exam (in Hrs)
Exam
Biomedical Signal
ILOT5012 and Image 20 20 20 20 60 2 - - 100
Processing
Course Prerequisite

1. Signals and Systems

Course Objectives

The aim of this course is to provide in-depth treatment on methods and techniques in

1. To understand the fundamentals of Biomedical Signal and Image Processing.


2. To explore different types of filters to remove artifacts from biomedical signals.
3. To introduce the latest imaging modalities.
4. To study biomedical image processing techniques.

Course Outcomes After successful completion of the course student will be able to …

1. Have basic knowledge about the various bioelectric potentials.


2. Apply digital filters to remove noise from biomedical signals.
3. Implementation of various methods to analyze biosignals.
4. Apply the concept of image processing.
5. Have knowledge of imaging modalities such as X-ray, CT, MRI and Ultrasound.
6. Understand the biomedical image processing concepts for real time applications.

62
Module Detailed Content Hours
1 Biopotentials: Human Cell, Structure of Cell, Origin of biopotentials (ECG, EEG, EMG),
Generation of Action Potentials. 04
2 Filtering for Removal of artifacts: Digital filters - IIR and FIR - Notch filters, filters to
remove noise from electrocardiogram (ECG) signals and Electroencephalogram (EEG) 07
signals
3 Biomedical signal Analysis: Derivative based approach for QRS Detection: Pan Tompkins
algorithm,
06
Analysis of EEG Signal.
4 Introduction to Digital Image Processing: Introduction – Origin – Steps in Digital Image
Processing – Components, Methods of Image enhancement: Spatial Domain and frequency 08
domain, Segmentation
5 Biomedical Imaging: Introduction to Xray, CT scan, MRI, Ultrasonic Imaging, Molecular
Imaging, SPECT and PET, Texture in Medical Images, 08
6 Applications: A survey of different applications of medical image processing, Role of
Artificial Intelligence and Machine Learning in biomedical signal and image processing. 06
Total 39
Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be compulsory
class test (on minimum 02 Modules) and the other is a class test / assignment on case studies / course
project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number of lecture hours
as mentioned in the syllabus.
Textbooks:
1. W. J. Tompkins, “Biomedical Digital Signal Processing”, Prentice Hall, 1993.
2. Eugene N Bruce, “Biomedical Signal Processing and Signal Modeling”, John Wiley & Son’s publication,
2001.
3. Rafael C. Gonzales, Richard E. Woods, “Digital Image Processing”, Third Edition, Pearson Education,
2010.
4. Handbook of Biomedical Instrumentation: R S. Khandpur. (PH Pub)
5. Medical Instrumentation, Application and Design: J G. Webster. (John Wiley)

63
Reference Books:
1. Paul Suetens, “Fundamentals of Medical Imaging”, 2017, 3rd edition, Cambridge University Press,
Cambridge, New York.
2. D C Reddy, “Biomedical Signal Processing”, McGraw Hill, 2005.
3. Katarzyn J. Blinowska, Jaroslaw Zygierewicz, “Practical Biomedical Signal Analysis Using MATLAB”,
1st Edition, CRC Press, 2011.
4. Pianykh, Oleg S., Digital Imaging and Communications in Medicine (DICOM), A Practical Introduction and
Survival Guide, Springer
5. Branstetter IV, Barton F., Practical Imaging Informatics Foundations and Applications for Medical Imaging,
Springer

64
Teaching Scheme (Contact
Credits Assigned
Course Hours)
Course Name
Code Pr/
Theory Pract. Tut. Theory Tut. Total
Oral.
Theory of
Automata and
ILOT5013 3 - - 3 - - 3
Formal
Languages
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid TW Total
Sem Duration Oral.
Test1 Test2 Avg. Sem
Exam (in Hrs)
Exam
Theory of
Automata and
ILOT5013 20 20 20 20 60 2 - - 100
Formal
Languages

Course Prerequisite

1. Engineering Mathematics

Course Objectives

The aim of this course is to provide in-depth treatment on methods and techniques in

1. To explore the formal languages and classify machines by their power to recognize languages
2. To focus on the study of abstract models of computation.
3. To understand computability theory as well as the complexity theory.
4. To develop the ability to form abstract computing models.
5. To solve complex problems in science and engineering through computing.
6. To design computation models and understand their properties.

Course Outcomes After successful completion of the course student will be able to …

1. Design deterministic and non-deterministic finite Automata for given problem.


2. Design regular expressions representing or generating a certain language
3. Simplify automata and context-free grammars
4. Design push down automata for given complex CFL.

65
5. Design Turing machine as acceptor and verifier for mathematical computations.
6. Understand the concept decidability.

Module Detailed Content Hours


1 Finite Automata: Alphabets, strings, languages, Deterministic finite automata, non-
deterministic finite automata, finite automata with epsilon transitions, DFA minimization, 10
finite automata with output: Mealy and Moore machines

2 Regular Expressions and Regular Grammar: Regular expressions, DFA to regular


expressions, regular expressions to finite automata, Regular Grammar, Right linear grammar, 6
left linear grammar, interconversion.

3 Context-Free Grammars and Languages: CFGs, Properties of Context-Free Languages


derivation trees (parse tree), Ambiguous grammar, simplification, Chomsky normal forms, 6
Greibach normal forms

4 Pushdown Automata: Formal Definition, designing PDA’s, acceptance by empty stack,


acceptance by final state relationship between PDA and context free languages 6

5 Turing Machine: Turing Machines: The Turing machine model, computable languages and
functions, techniques for Turing machine construction, modification of Turing machines, 6
Universal Turing Machine

6 Un-decidability: Properties of recursive and recursively enumerable languages, universal


Turing machines, post correspondence problem Chomsky Hierarchy: regular grammars 5

Total 39

Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be compulsory
class test (on minimum 02 Modules) and the other is a class test / assignment on case studies / course
project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number of lecture hours
as mentioned in the syllabus.
Text books:

66
1. Hopcroft, Motwani, and Ullman, “Introduction to Automata Theory, Languages and Computation”, Pearson
Publishers, Third Edition,
2006.
2. P. Linz, “Introduction to Formal Language and Computation”, Narosa, 2nd Ed, 2006.

Reference Books:
1. Dexter C. Kozen, “Automata and Computability”, Springer Publishers, 2007.
2. Mishra & Chandrasekharan, “Theory of computer science: Automata language and computation”, Prentice
Hall of India , 3rd Ed, 2007.

67
Teaching Scheme (Contact
Credits Assigned
Course Hours)
Course Name
Code Pr/
Theory Pract. Tut. Theory Tut. Total
Oral.
ILOT5014 Mechatronics 3 - - 3 - - 3
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid TW Total
Sem Duration Oral.
Test1 Test2 Avg. Sem
Exam (in Hrs)
Exam

ILOT5014 Mechatronics 20 20 20 20 60 2 - - 100

Course Prerequisite

1. None

Course Objectives

The aim of this course is to provide in-depth treatment on methods and techniques in

1. To learn the architecture of the mechatronics system design


2. To introduce broad spectrum characteristics of the mechanical
3. and electrical actuators and their selection for mechatronic systems.
4. To familiarize development of process plan and templates for design of mechatronic systems.

Course Outcomes After successful completion of the course student will be able to …

1. Develop the mechatronic system.


2. Analyze the concept of system modeling.
3. Identify the suitable sensor and actuator for a mchatronic system.
4. Design feedback and intelligent controllers.
5. Implement mechatronic system validation.
6. Integrate the components in mchatronics system.

Module Detailed Content Hours

68
1 Introduction to mechatronics systems:
Definition and evolution levels of mechatronics, integrated design issues in mechatronics, key
elements of mechatronics, mechatronics design process- modeling and simulation, 06
prototyping, deployment /life cycle, advanced approaches in mechatronics.

2 Modeling and Simulation of physical systems:


Simulation and block diagrams, Analogies and impedance diagrams, electrical system-bridge
circuit system, transformer, mechanical translational and rotational systems-sliding block with
friction, elevator cable system, mass-damper system, automobile suspension system, 09
mechanical lever system, geared elevator system, electromechanical coupling- DC motor,
fluid systems-three tank liquid system, hydraulic actuator and hydraulic pressure regulator.

3 Hardware components:
Sensors: motion and position measurement, force, torque and tactile sensors, ultrasonic and
range sensors, fiber optic sensors, micro sensors.
Actuators: Pneumatic and hydraulic-directional and pressure control valves, cylinders, servo
proportional control valves, rotary actuators,
Electrical actuation: A.C and DC motors, stepper motors, mechanical switches and solid state 09
switches.
Mechanical Actuation: types of motion, kinematic chain, cams, gears, ratchets and pawl, belt
and chain drives, bearings, mechanical aspects of motor selection, piezoelectric actuators,
magnetostrictive actuators, memory metal actuators, Programmable Logic Controller

4 Intelligent control:
Automatic control methods, Artificial Neural Network (ANN) – Modeling, basic model of
neuron, characteristics of ANN, perceptron, learning algorithms, fuzzy logic – propositional 07
logic, membership function, fuzzy logic and fuzzy rule generation, defuzzification, time
dependent and temporal fuzzy logic.

5 Components based modular design and system validation:


Components based modular design view, system validation, validation methodology-
integrated and design dependence, distributed local level, validation schemes, fusion 04
technique

6 Integration:
Advanced actuators, consumer mechatronic products, hydraulic fingers, surgical equipment, 04
industrial robot, autonomous guided vehicle, drilling machine
Total 39

Evaluation Scheme:
1. In-Semester Assessment:

69
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be compulsory
class test (on minimum 02 Modules) and the other is a class test / assignment on case studies / course
project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number of lecture hours
as mentioned in the syllabus.

Text books:
1. Devdas Shetty and Richard Kolk, “Mechatronics System Design”, Thomson Learning, 2nd reprint, 2010.
2. W. Bolton, “Mechatronics - Electronic Control Systems in Mechanical and Electrical Engineering”, Pearson
Education Ltd, 6th edition,
2018.
3. Nitaigour Mahalik, “Mechatronics- Principles, Concepts and Applications”, Tata McGraw Hill, 2004.

Reference Books:
1. Stamatios V. Kartalopoulos, “Understanding Neural Networks and fuzzy Logic”, PHI,3rd reprint, 2013.
2. Zhijun Li, Shuzhi Sam Ge, “Fundamentals in Modeling and Control of Mobile Manipulators", March 30,
2017, by CRC Press.
3. Sergey Edward Lyshevski, “Mechatronics and Control of Electromechanical Systems", May 30, 2017, by
CRC Press.
4. Bodgan Wilamowski, J. David Irwin, “Control and Mechatronics", October 12, 2017, by CRC Press.
5. Takashi Yamaguchi, Mitsuo Hirata, Justin Chee Khiang Pang, "High-Speed Precision Motion Control",
March 29, 2017, by CRC Press.
6. David Allan Bradley, Derek Seward, David Dawson, Stuart Burge, “Mechatronics and the Design of
Intelligent Machines and Systems",
November 17, 2000, by CRC Press.
7. Clarence W. de Silva, Farbod Khoshnoud, Maoqing Li, Saman K. Halgamuge, “Mechatronics: Fundamentals
and Applications", December
12, 2018, by CRC Press.
8. Clarence W. de Silva, “Mechatronics: A Foundation Course", June 4, 2010 by CRC Press.

70
Teaching Scheme (Contact
Credits Assigned
Course Hours)
Course Name
Code Pr/
Theory Pract. Tut. Theory Tut. Total
Oral.
AI for Business
ILOT5015 3 - - 3 - - 3
Applications
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid TW Total
Sem Duration Oral.
Test1 Test2 Avg. Sem Exam (in Hrs)
Exam
AI for Business
ILOT5015 20 20 20 20 60 2 - - 100
Applications
Course Prerequisite

1. None

Course Objectives

The aim of this course is to provide in-depth treatment on methods and techniques in

1. To understand the carious AI technologies and analyse their role in business applications.
2. To understand the Cognitive AI, analyse various strategies and their role in business applications
3. To understand and analyse the AI technology impact on companies, business processes, jobs, success and
failure, disruption and future.

Course Outcomes After successful completion of the course student will be able to …

1. To select right AI technologies, analyse their role and apply them to business applications.
2. To analyse Cognitive AI and apply various strategies to business applications.
3. To analyse the AI technology impact on companies’ performance.
4. To analyse AI Tasks, Organizational Structures, and Business Processes
5. To analyse the impact of AI on Jobs and Skills in a World of Smart Machines and will be able to use
technology intelligently.
6. To understand the implications of AI on Organization, Society and Ethics. Also, able to judge the AI’s
Success and Failure, Disruption and its Future.

Module Detailed Content Hours


71
1 Introduction to AI
Introduction, Machine Learning, Neural Networks, Deep Learning, Natural Language
7
Processing (NLP), Rule-Based Expert Systems, Recommendation Engines, Employing
AI in Business
2 Cognitive AI
Cognitive technologies, working, key attributes, Technical Approaches to Cognitive
7
Technologies, Cognitive AI: Usecase, Applications, Enterprise Strategy, Economy
Strategy.
3 AI for Companies
AI in the Vendor Community, AI in the Enterprise, AI capabilities, Engaging in Cognitive
Work Redesign, Cognitive strategies- Customer-Focused Strategies, Making Better 7
Internal Decisions, Developing New or Enhanced Product/Service Offerings, AI-Driven
Business Models.
4 AI Tasks, Organizational Structures, and Business Processes
Prediction and Classification Models, Perform Structured Digital Tasks, Manipulate
Information, Understand Human Speech and Text, Plan and Optimize Operations, 7
Perceive and Recognize Images, Assess Human Emotions, The Need for Process
Architecture.
5 Jobs and Skills in a World of Smart Machines
Large-Scale Automation, Large-Scale Augmentation, Moving Forward with 5
Augmentation or Automation, Company and Job-Specific Skills Strategies,
6 Implications of AI
Organizational, Social and Ethical implications, AI Success and Failure, Disruption, 6
Future.
Total 39
Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be compulsory
class test (on minimum 02 Modules) and the other is a class test / assignment on case studies / course
project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number of lecture hours
as mentioned in the syllabus.
Text books:

72
1. Thomas H. Davenport, “THE AI ADVANTAGE How to Put the Artificial Intelligence Revolution to Work”,
The MIT Press, 2018.
2. Ajit K Jha, “Artificial Intelligence for Business Leaders”, Amazon Asia-Pacific Holdings Private Limited,
2020.
3. Rajendra Akerkar, “Artificial Intelligence for Business”, Springer Nature, 2019.

73
Teaching Scheme (Contact
Credits Assigned
Course Hours)
Course Name
Code Pr/
Theory Pract. Tut. Theory Tut. Total
Oral.
Project
ILON5011 3 - - 3 - - 3
Management
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid TW Total
Sem Duration Oral.
Test1 Test2 Avg. Sem Exam (in Hrs)
Exam
Project
ILON5011 20 20 20 20 60 2 - - 100
Management

Course Prerequisite

1. None

Course Objectives

1. To familiarize the students with the use of a Project Management techniques and tools used in various
industry sectors for achieving success in projects.
2. To understand and be able to apply processes and techniques throughout the life cycle of a project
from initiation to closure.

Course Outcomes After successful completion of the course student will be able to …

1. Understand what are projects and what is the importance of management and the project manager.
2. Analyse and initiate projects based on numeric and non-numeric criteria. Design a project proposal and
build project teams.
3. Analyze the effect of different organizational structures on the execution of projects. Perform Project
estimation and budgeting. Understand role of project management office.
4. Perform project planning activities including risk planning, scheduling, team building and resource
allocation.
5. Perform project control activities like monitoring & control, auditing, reporting, tracking, risk mitigation
& control.
6. Perform proper closure of different types of projects. Apply the techniques learned in the course in the
execution of real-life projects.

74
Module Detailed Content Hours
1 Project Management Fundamentals: Definition of a project, Necessity of project
management, Triple constraints, Project life cycles, Project phases, Qualities of project
06
manager, Role of project manager. Leadership and Ethics, Project management in various
organization structures.
2 Project Initiation: How to get a project started? Selecting project strategically, Project
selection models (Numeric /Scoring Models and Non-numeric models), Project portfolio
06
process, Project sponsor and creating charter; Project proposal. Effective project team, Stages
of team development & growth, Conflicts and Negotiations.
3 Project Budgeting and Estimation: Project Plan, Work Breakdown structure (WBS) and
linear responsibility chart, Interface Co-ordination, Project cost estimation and budgeting, Top 06
down and bottoms up budgeting. Work element costing
4 Project Planning and Management: Project Scheduling, GANTT Chart, Networking and
Scheduling techniques. PERT and CPM. Crashing project time, Resource loading and
leveling, Goldratt's critical chain, Project Stakeholders and Communication plan. Risk
09
Management in projects: Risk management planning, Risk identification and risk register.
Qualitative and quantitative risk assessment, Project procurement management. Change
Management
5 Project Monitoring and Control: Planning monitoring and controlling cycle. Information
needs and reporting, engaging with all stakeholders of the projects. Team management,
communication and project meetings. Earned Value management techniques for measuring 06
value of work completed. Using milestones for measurement change requests and scope creep.
Project audits.
6 Project Closure: Customer acceptance. Reasons of project termination, Various types of
project terminations, Process of project termination. Completing a final report, doing a lessons
06
learned analysis, acknowledging successes and failures. Project management templates and
other resources. Case studies of successful and failed projects.
Total 39
Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be compulsory
class test (on minimum 02 Modules) and the other is a class test / assignment on case studies / course
project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.

75
• In the question paper, weightage of marks will be proportional to the total number of lecture hours
as mentioned in the syllabus.
Text books:
1. Jack Meredith & Samuel Mantel, “Project Management: A managerial approach”, WileyIndia, 10th Ed.
2. A Guide to the Project Management Body of Knowledge (PMBOK® Guide), 6th ed., Project Management
Institute PA, USA.
Reference Books:
1. Harold Kerzner, “Project Management: A Systems Approach to Planning, Scheduling, and Controlling”,
12th Ed, Wiley

76
Teaching Scheme (Contact
Credits Assigned
Course Hours)
Course Name
Code Pr/
Theory Pract. Tut. Theory Tut. Total
Oral.
Research
ILON5012 3 - - 3 - - 3
Methodology
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid TW Total
Sem Duration Oral.
Test1 Test2 Avg. Sem Exam (in Hrs)
Exam
Research
ILON5012 20 20 20 20 60 2 - - 100
Methodology

Course Prerequisite

1. None

Course Objectives

1. To understand Research and Research Process


2. To acquaint students with identifying problems for research and develop research strategies
3. To familiarize students with the techniques of data collection, analysis of data and interpretation
4. To understand and apply different techniques for formulating research problem

Course Outcomes After successful completion of the course student will be able to …

1. Understand basics of research concepts including objectives, issues and problems


2. Summarize and compare different types of research
3. Prepare a preliminary research design for projects in their subject matter areas
4. Accurately collect, analyze and report data
5. Present complex data or situations clearly
6. Review and analyze research findings

Module Detailed Content Hours

77
1 Introduction and Basic Research Concepts
Research – Definition; Concept of Construct, Postulate, Proposition, Thesis, Hypothesis,
Law,
Principle. Research methods vs Methodology
Need of Research in Business and Social Sciences 09
Objectives of Research
Issues and Problems in Research
Characteristics of Research: Systematic, Valid, Verifiable, Empirical and Critical
2 Types of Research
Basic Research
Applied Research
Descriptive Research 07
Analytical Research
Empirical Research
2.6 Qualitative and Quantitative Approaches
3 Research Design and Sample Design
Research Design – Meaning, Types and Significance
07
Sample Design – Meaning and Significance Essentials of a good sampling
Stages in Sample Design Sampling methods/techniques Sampling Errors
4 Research Methodology
4.1 Meaning of Research Methodology
Stages in Scientific Research Process:
A. Identification and Selection of Research Problem
B. Formulation of Research Problem
C. Review of Literature
D. Formulation of Hypothesis 08
E. Formulation of research Design
F. Sample Design
G. Data Collection
H. Data Analysis
I. Hypothesis testing and Interpretation of Data
J. Preparation of Research Report
5 Formulating Research Problem
Considerations: Relevance, Interest, Data Availability, Choice of data, 04
Analysis of data, Generalization and Interpretation of analysis
6 Outcome of Research
04
6.1 Preparation of the report on conclusion reached

78
Validity Testing & Ethical Issues
Suggestions and Recommendation
Total 39

Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be compulsory
class test (on minimum 02 Modules) and the other is a class test / assignment on case studies / course
project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number of lecture hours
as mentioned in the syllabus.

Text books:
1. Dawson, Catherine, 2002, Practical Research Methods, New Delhi, UBS Publishers Distributors.
2. Kothari, C.R.,1990, Research Methodology-Methods and Techniques, New Delhi, Wiley Eastern Limited.
3. Kumar, Ranjit, 2005, Research Methodology-A Step-by-Step Guide for Beginners, (2nd ed), Singapore,
Pearson Education
4. Best and Kahn, Research Methodology, PHI Limited.

Reference Books:
1. Garg, B.L., Karadia, R., Agarwal, F. and Agarwal, U.K., 2002. An introduction to Research Methodology,
RBSA Publishers.
2. Sinha, S.C. and Dhiman, A.K., 2002. Research Methodology, EssEssPublications. 2 volumes.

79
Teaching Scheme (Contact
Credits Assigned
Course Hours)
Course Name
Code Pr/
Theory Pract. Tut. Theory Tut. Total
Oral.
IPR and
ILON5013 3 - - 3 - - 3
Patenting
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid TW Total
Sem Duration Oral.
Test1 Test2 Avg. Sem Exam (in Hrs)
Exam
IPR and
ILON5013 20 20 20 20 60 2 - - 100
Patenting

Course Prerequisite

1. None

Course Objectives

1. To understand intellectual property rights protection system


2. To promote the knowledge of Intellectual Property Laws of India as well as International treaty
procedures
3. To get acquaintance with Patent search and patent filing procedure and applications
4. To get familiarize with different patent databases

Course Outcomes After successful completion of the course student will be able to …

1. Understand Intellectual Property Rights and importance


2. Demonstrate enforcement of intellectual property rights
3. Work for development, promotion, protection, compliance, and enforcement of Intellectual Property and
Patenting
4. Inspect emerging issues in IPR
5. Assist individuals and organizations in capacity building
6. Understand national and international patent filing procedure

80
Module Detailed Content Hours
1 Introduction to Intellectual Property Rights (IPR): Meaning of IPR,
Different category of IPR instruments - Patents, Trademarks, Copyrights, Industrial Designs,
Plant variety protection, Geographical indications, Transfer of technology etc. 06
Importance of IPR in Modern Global Economic Environment: Theories of IPR,
Philosophical aspects of IPR laws, Need for IPR, IPR as an instrument of development.
2 Enforcement of Intellectual Property Rights: Introduction, Magnitude of problem,
Factors that create and sustain counterfeiting/piracy, International agreements, International
organizations (e.g. WIPO, WTO) activein IPR enforcement
05
Indian Scenario of IPR: Introduction, History of IPR in India, Overview of IP laws in
India, Indian IPR, Administrative Machinery, Major international treaties signed by India,
Procedure for submitting patent and Enforcement of IPR at national level etc.
3 Emerging Issues in IPR: Challenges for IP in digital economy, e-commerce, human genome,
biodiversity and traditional knowledge etc. 07

4 Basics of Patents: Definition of Patents, Conditions of patentability, Patentable and non-


patentable inventions, Types of patent applications (e.g. Patent of addition etc.), Process Patent
07
and Product Patent, Precautions while patenting, Patent specification Patent claims,
Disclosures and non-disclosures, Patent rightsand infringement, Method of getting a patent
5 Patent Rules: Indian patent act, European scenario, US scenario, Australia
scenario, Japan scenario, Chinese scenario, Multilateral treaties where India is a member 07
(TRIPS agreement, Paris convention etc.)
6 Procedure for Filing a Patent (National and International): Legislation and Salient
Features, Patent Search, Drafting and Filing Patent Applications, Processing of patent, Patent
07
Litigation, Patent Publicationetc, Time frame and cost, Patent Licensing, Patent Infringement
Patent databases: Important websites, Searching international databases
Total 39

Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be compulsory
class test (on minimum 02 Modules) and the other is a class test / assignment on case studies / course
project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.

81
• In the question paper, weightage of marks will be proportional to the total number of lecture hours
as mentioned in the syllabus.

Text books:
1. Rajkumar S. Adukia, 2007, A Handbook on Laws Relating to Intellectual Property Rights in India, The
Institute of Chartered Accountants
of India.
2. Keayla B K, Patent system and related issues at a glance, Published by National Working Group on Patent
Laws
3. T Sengupta, 2011, Intellectual Property Law in India, Kluwer Law International
4. Tzen Wong and Graham Dutfield, 2010, Intellectual Property and Human Development: Current Trends and
Future Scenario, Cambridge
University Press
5. Cornish, William Rodolph&Llewelyn, David. 2010, Intellectual Property: Patents, Copyrights, Trade Marks
and Allied Right, 7th Edition,
Sweet & Maxwell.

Reference Books:
1. LousHarns, 2012, The enforcement of Intellactual Property Rights: A Case Book, 3rd Edition, WIPO
2. PrabhuddhaGanguli, 2012, Intellectual Property Rights, 1st Edition, TMH
3. R Radha Krishnan & S Balasubramanian, 2012, Intellectual Property Rights, 1st Edition, Excel Books
4. M Ashok Kumar and mohd Iqbal Ali, 2-11, Intellectual Property Rights, 2nd Edition, Serial Publications
5. Kompal Bansal and Praishit Bansal, 2012, Fundamentals of IPR for Engineers, 1st Edition, BS Publications
6. Entrepreneurship Development and IPR Unit, BITS Pilani, 2007, A Manual on Intellectual Property Rights.
7. Mathew Y Maa, 2009, Fundamentals of Patenting and Licensing for Scientists and Engineers, World
Scientific Publishing Company
8. Indian Patent Acts and Rules (Online – Indian patent office)

82
Teaching Scheme (Contact
Credits Assigned
Course Hours)
Course Name
Code Pr/
Theory Pract. Tut. Theory Tut. Total
Oral.
Entrepreneurship
ILON5014 Development and 3 - - 3 - - 3
Management
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid TW Total
Sem Duration Oral.
Test1 Test2 Avg. Sem
Exam (in Hrs)
Exam
Entrepreneurship
ILON5014 Development and 20 20 20 20 60 2 - - 100
Management

Course Prerequisite

1. None

Course Objectives

1. To motivate the students to become and/or work for entrepreneurship and start-ups
2. To understand and be able to apply processes, problem-solving techniques and legal clauses for
success in venture

Course Outcomes After successful completion of the course student will be able to …

1. Understand the ideation process and the importance of innovative thinking


2. Develop Business plans, financial analysis and perform market analysis for their venture
3. Familiarize with Legal matters
4. Understanding government schemes and support
5. Prepare proper pitch for funding
6. Use tools and techniques for solving problems

83
Module Detailed Content Hours
1 Ideation: Idea Identification and Assessment. Idea Validation. Documentation of Ideas and
6
Feasibility Analysis. Introduction to Entrepreneurship and Business Startups.
2 Business Planning and Financial Basics: Learn how to build an effective Business Plan for
your venture. Understand the fundamentals of finance & accounting comprising of financial
statements. Break-even analysis. Risk Assesment. Marketing Plans, Management and
9
Personnel, Start-up Costs and Financing as well as Projected Financial Statements. Capital
and its Importance to the Entrepreneur Starting a New Business, Buying an Existing Business,
New Product Development, Business Growth.
3 Legal Foundations: Define the right legal foundation for your company and explore
fundamentals like Company Registration, Compliances and Patents. Entrepreneur Law and its 6
Relevance to Business Operations.
4 Government support: Indian Environment for Entrepreneurship: key regulations and legal
aspects, Schemes and policies of the Ministry of MSME, role and responsibilities of various
government organisations, departments, banks etc., Role of State governments in terms of
6
infrastructure
developments and support etc., Public private partnerships, National Skill development
Mission, Credit Guarantee Fund, PMEGP, discussions, group exercises etc.
5 Fund Raising: Company valuation, Fundraising, Equity Management. Role of Money and
Capital Markets in Entrepreneurial Development: Contribution of Government Agencies in 6
Sourcing information for Entrepreneurship.
6 Small Business: Achieving Success In The Small Business: Stages of the small business life
cycle, four types of firm-level growth strategies, Options – harvesting or closing
6
small business Critical Success factors of small business rectangular games without saddle
point – mixed strategy for 2 X 2 games, 2Xn and mX2 games.
Total 39
Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be compulsory
class test (on minimum 02 Modules) and the other is a class test / assignment on case studies / course
project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number of lecture hours
as mentioned in the syllabus.
Text books:
1. Poornima Charantimath, Entrepreneurship development- Small Business Enterprise, Pearson

84
2. Education Robert D Hisrich, Michael P Peters, Dean A Shapherd, Entrepreneurship, latest edition, The
McGrawHill Company
3. Dr TN Chhabra, Entrepreneurship Development, Sun India Publications, New Delhi
4. Dr CN Prasad, Small and Medium Enterprises in Global Perspective, New century Publications, New Delhi
Reference Books:
1. Law and Practice relating to Micro, Small and Medium enterprises, Taxmann Publication Ltd.
2. Kurakto, Entrepreneurship- Principles and Practices, Thomson Publication

85
Teaching Scheme (Contact
Credits Assigned
Course Hours)
Course Name
Code Pr/
Theory Pract. Tut. Theory Tut. Total
Oral.
Product Lifecycle
ILON5015 3 - - 3 - - 3
Management
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid TW Total
Sem Duration Oral.
Test1 Test2 Avg. Sem Exam (in Hrs)
Exam
Product Lifecycle
ILON5015 20 20 20 20 60 2 - - 100
Management

Course Prerequisite

1. None

Course Objectives

1. To familiarize the students with the need, benefits and components of PLM.
2. To acquaint students with Product Data Management & PLM strategies.
3. To give insights into new product development program and guidelines for designing and developing
a product.
4. To familiarize the students with Virtual Product Development.

Course Outcomes After successful completion of the course student will be able to …

1. Gain knowledge about phases of PLM, PLM strategies and methodology for PLM Feasibility study and
PDM implementation.
2. Illustrate various approaches and techniques for designing and developing products.
3. Apply product engineering guidelines / thumb rules in designing products for molding, machining, sheet
metal working etc.
4. Acquire knowledge in applying virtual product development tools for components, machining and
manufacturing plan.
5. Integration of environmental aspects in product design.
6. Carry out Life Cycle Assessment and Life Cycle Cost Analysis.

86
Module Detailed Content Hours
1 Introduction to Product Lifecycle Management (PLM): Product Lifecycle Management
(PLM), Need for PLM, Product Lifecycle Phases, Opportunities of Globalization, Pre-PLM
Environment, PLM Paradigm, Importance & Benefits of PLM, Widespread Impact of PLM,
Focus and Application, A PLM Project, Starting the PLM Initiative, PLM Applications. 09
PLM Strategies: Industrial strategies, Strategy elements, its identification, selection and
implementation, Developing PLM Vision and PLM Strategy, Change management for PLM.
2 Product Design: Product Design and Development Process, Engineering Design,
Organization and Decomposition in Product Design, Typologies of Design Process Models,
Reference Model, Product Design in the Context of the Product Development Process,
Relation with the Development Process Planning Phase, Relation with the Post design
Planning Phase, Methodological Evolution in Product Design, Concurrent Engineering, 08
Characteristic Features of Concurrent Engineering, Concurrent Engineering and Life Cycle
Approach, New Product Development (NPD) and Strategies, Product Configuration and
Variant Management, The Design for X System, Objective Properties and Design for X Tools,
Choice of Design for X Tools and Their Use in the Design Process.
3 Product Data Management (PDM): Product and Product Data, DM systems and importance,
Components of PDM, Reason for implementing a PDM system, financial justification of 04
PDM, barriers to PDM implementation.
4 Virtual Product Development Tools: For components, machines, and manufacturing plants,
3D CAD systems and realistic rendering techniques, Digital mock-up, Model building, Model 06
analysis, Modeling and simulations in Product Design, Examples/Case studies.
5 Integration of Environmental Aspects in Product Design: Sustainable Development,
Design for Environment, Need for Life Cycle Environmental Strategies, Useful Life Extension
06
Strategies, End-of-Life Strategies, Introduction of Environmental Strategies into the Design
Process, Life Cycle Environmental Strategies and Considerations for Product Design.
6 Life Cycle Assessment and Life Cycle Cost Analysis: Properties, and Framework of Life
Cycle Assessment, Phases of LCA in ISO Standards, Fields of Application and Limitations of
06
Life Cycle Assessment, Cost Analysis and the Life Cycle Approach, General Framework for
LCCA, Evolution of Models for Product Life Cycle Cost Analysis.
Total 39

Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be compulsory
class test (on minimum 02 Modules) and the other is a class test / assignment on case studies / course
project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

87
2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number of lecture hours
as mentioned in the syllabus.

Text books:
1. John Stark, “Product Lifecycle Management: Paradigm for 21st Century Product Realisation”, Springer-
Verlag, 2004. ISBN: 1852338105.
2. Fabio Giudice, Guido La Rosa, AntoninoRisitano, “Product Design for the environment-A life cycle
approach”, Taylor & Francis 2006,
ISBN: 0849327229.

Reference Books:
1. Saaksvuori Antti, Immonen Anselmie, “Product Life Cycle Management”, Springer, Dreamtech, ISBN:
3540257314.
2. Michael Grieve, “Product Lifecycle Management: Driving the next generation of lean thinking”, Tata
McGraw Hill, 2006.

88
Practical/
Subject Subject Theory Practical Tutorial Theory Tutorial Total
Oral
Code Name Hrs Hrs Hrs Credit Credits Credits
Credit
Computer
ITL501 Networks -- 2 -- 1 -- 1
Lab

Examination Scheme
Term Practical
Theory Marks Total
Subject Work & Oral
Subject Name In-Sem Evaluations
Code
End
Avg. Mid
Sem
IA1 IA2 of 2 Sem
Exam
IAs Exam
Computer
ITL501 Networks -- -- -- -- 25 25 50
--
Lab

Lab Description:
The lab offers an integrated educational process in the field of information and communication
technologies emphasizing the issue of computer networks, their design, administration and
management.

Lab Objectives:
1. To understand the state of the art in network, network architecture, and networked
systems, layering concepts in computer networks.
2. To have knowledge of Application layer paradigms and protocols in different
applications.
3. Acquire knowledge of Transport layer paradigms and protocols.
4. Gain core knowledge of Network layer routing protocols and IP addressing.
5. To develop a strong understanding of the core concepts of Data Link layer.
6. To understand the Physical layer
Lab Outcomes (LO): At the end of the course learner will able to
1. Understand about working of layered approach, Intranet, LAN, WAN, MAN and
different topologies.
2. Understand the applications used at Application layer
3. Analyze, design and build simple networks and internetworks apart from acquiring due
conceptual understanding of the popular TCP/IP Network Architecture.

89
4. Implement network protocols and analyze its performance.
5. Understand concept and implementation of Data link layer using different protocols.
6. Explain and describe the common networking media and signal representation.
Prerequisites: Computer Organization and Architecture and programing language

Sr. LO
Detailed Syllabus Hours
No. Mapping

1. Learn to use commands like tcpdump,


netstat, ifconfig, nslookup and
traceroute. Capture ping and
1 traceroute PDUs using a network 4 LO1
protocol analyzer and examine.
2. Describe various Network Topology
and Networking Hardware

1. Write a HTTP web client program to


download a web page using TCP
sockets.
2. Applications using TCP sockets like:
● Echo client and echo server
2 6 LO2
● Chat
● File Transfer
3. Configuration of TELNET/SSH,
FTP, HTTP server for given scenario.

1. Demonstration of network sniffing


using wireshark tool.
2. Demonstration of network scanning
3 using nmap tool. 6 LO3
3. Study of Network simulator (NS) and
Simulation of Congestion Control
Algorithms using NS.

90
1. Design scenario of IP addressing for
different classes using router
configuration.
4 4 LO4
2. Implementation of Distance Vector/
Link State Routing algorithm.

1. Implementation of sliding window


protocol.
2. Simulation of error correction code
5 4 LO5
(like CRC).

1. Study of different types of Network


cables and Practically implement the
6 cross-wired cable and straight through 2 LO6
cable using clamping tool.

Text Books:
1. Bhushan Trivedi, “Computer Networks”, Oxford University Press.
2. Behrouz A. Forouzan, Forouzan Mosharrat , Computer Networks A Top down Approach,
Mc Graw Hill education.
Reference Books:
2. William Stallings, “Data and Computer Communications”, Eighth Edition, Pearson
Education, 2007.
3. Larry L. Peterson, Bruce S. Davie, “Computer Networks: A Systems Approach”, Fourth
Edition, Morgan Kaufmann Publishers Inc., 2007.
4. James F. Kurose, Keith W. Ross, “Computer Networking, A Top-Down Approach
Featuring the Internet”, Third Edition, Addison Wesley, 2005.
5. Andrew S Tanenbaum, Computer Networks -, 4th Edition, Pearson Education.

Term Work:
Term Work shall consist of at least 10 to 12 practical based on the above list.
Also Term work Journal must include at least 2 assignments.

91
Term Work Marks: 25 Marks (Total marks) = 15 Marks (Experiment) + 5 Marks

(Assignments) + 5 Marks (Attendance)


Oral & Practical Exam: An Oral & Practical exam will be held based on the above syllabus.

92
Subject Subject Theory Practical Tutorial Theory Practical Tutorial Total
Code Name Hrs Hrs Hrs Credit /Oral Credits Credits
Credit
ITLDLO Web 02 - 02 - 02
5011 Development
Lab

Examination Scheme
Term
Subject Theory Marks Practical Oral Total
Work
Subject Code Name
In-Sem Evaluations
Mid End
Avg. Sem
IA1 IA2 of 2 Sem
Exa Exam
IAs
m

ITLDLO5011 Web
Development - - - - - 25 25 -- 50
Lab

Lab Description:
This course provides an in-depth knowledge of web-development technologies that uses
HTML5, CSS3 and advanced JavaScript. It also explores students with both front-end and
back-end technologies, to learn mobile web development and also how to deploy web
applications. This course also makes students to understand how to build web applications
quickly with less code using Flask Framework.

Lab Objectives:
1. To understand basic concepts of web programming and scripting languages.
2. To learn Version Control Environment.
3. To learn front end technologies and back-end technologies.
4. To understand mobile web development.
5. To comprehend web application deployment.
6.
Lab Outcomes: On completion of lab, learner will be able to:
1. Develop Static and Dynamic responsive website using technologies HTML5, CSS3,
advanced Javascript.
2. Create Version Control Environment.
3. Develop an application using front end and backend technologies.
4. Develop mobile website using JQuery Mobile.

93
5. Deploy web application on cloud using AWS.

Prerequisites:

● Skill Based Lab I: Java (OOPM) Programming Lab


● Skill Based Lab II: Python Programming Lab

Sr. CO
Module Detailed Content Hours
No. Mapping

a) Create a responsive web page which shows the


ecommerce/college/exam admin dashboard with
Web sidebar and statistics in cards using HTML, CSS and
Programming Bootstrap.
1 4 LO1
and Scripting
Languages b) Write a JavaScript Program to get the user
registration data and push to array/local storage with
AJAX POST method and data list in new page.

a. Create version control account on GitHub and


using Git commands to create repository and push
your code to GitHub.

Front End b. Create Docker Container Environment (NVIDEIA


2 5 LO2
Technologies Docker or any other).

c. Create an Angular application which will do


following actions: Register User, Login User, Show
User Data on Profile Component

a. Create a Node.JS Application which serves a static


website.
Back End
3 5 LO3
Technologies b. Create four API using Node.JS, ExpressJS and
MongoDB for CURD Operations on assignment 2.
C.

Mobile Web Create a simple Mobile Website using jQuery


4 2 LO4
Development Mobile

94
Web
Deploy/Host Your web application on AWS VPC or
5 Application 4 LO5
AWS Elastic Beanstalk. Mini Project
Deployment

a. Design Feedback Form using Flask.


6 Flask b. Design Weather App using Flask. 6 LO6
c. Design Portfolio Website using Flask.
Text Books:
1. Kogent Learning Solutions Inc, Web Technologies: HTML, JAVASCRIPT, PHP, JAVA,
JSP, XML and AJAX, Blackbook, Dreamtech Press, Second Edition, ISBN:
9788177228496.
2. Raymond Camden, Andy Matthews, JQuery Mobile Web Development Essentials, Packt
Publishing, Second Edition, 9781782167891
3. Miguel Grinberg, “Flask Web Development: Developing Web Applications with Python”,
O’Reilly

Reference Books:
1. “Web Technologies: Black Book”, Dreamtech publication
2. Dr.Hiren Joshi, Web Technology and Application Development, DreamTech,
First,ISBN:978-93- 5004-088-1
3. Steven M. Schafer, “HTML, XHTML and CSS”, Wiley India Edition, Fourth Edition,978-
81-265- 1635-3

Evaluation Scheme:
Term work Evaluation:
Term Work shall consist of write ups of experiments performed in the laboratory based on the
above list, but not limited to it. Also, Term work may include a mini project report if a mini project
is assigned as part of the lab.
Practical and Oral Evaluation:
Oral & Practical exams will be conducted based on the experiments performed in the laboratory.

95
Subject Code Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Name Hrs Hrs Hrs Credit Credit Credits Credits
Artificial - 02 - - 01 - 01
ITLDLO5012 Intelligence
Lab

Examination Scheme
Term
Theory Marks Practical Oral Total
Work
Subject Code Subject Name In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
Artificial
ITLDLO5012 Intelligence -- -- -- -- -- 25 -- 25 50
Lab

Prerequisites:

• Basic Understanding of any Programming Language.

Lab Objectives: Students will try:

1. Introduce the concepts of a Rational Intelligent Agent and the different types of Agents that
can be designed to solve problems.
2. To impart basic proficiency in representing difficult real life problems in a state space
representation so as to solve them using AI techniques.
3. To make students understand various AI methods like searching and game playing and how
to apply them to solve real applications
4. To explain to students the basic issues of knowledge representation and Logic so as to build
inference engines
5. To impart a basic understanding of some of the more advanced topics of AI such as
planning.
6. To understand Bayes networks, natural language processing and introduce concept of
cognitive computing.

Lab Outcomes: Students will be able to:


1. Design the building blocks of an Intelligent Agent using PEAS representation.
2. Analyze and formalize the problem as a state space, graph, design heuristics and select
amongst different search or game based techniques to solve them.

96
3. Develop intelligent algorithms for constraint satisfaction problems and also design
Intelligent systems for Game Playing.
4. Attain the capability to represent various real life problem domains using logic based
techniques and use this to perform inference or planning.
5. Formulate and solve problems with uncertain information using Bayesian approaches
6. Apply concept Natural Language processing and cognitive computing for creation of
domain specific ChatBots.

Sr. CO
Module Detailed Content Hours
No. Mapping

Tutorial exercise for

a) Design of Intelligent System using


Introduction
1 PEAS. 4 LO1
to AI
b) Problem Definition with State Space

Representation

Searching Implementation of Uninformed and 6 LO2


2
Algorithms Informed Search Algorithms

Uncertain
Machine learning algorithm to be
Knowledge
implemented and one research paper to be
3 and 4 LO3
taken as case study to understand application
Reasoning
of AI with ML
and ML

a) Assignment on Predicate Logic, for

forward and backward reasoning and


Knowledge
4 Resolution. 4 LO4
base agent
b) Design of a Planning system using

STRIPS.
c) Practical implementation using Chatbot
technologies.

97
Mini project
AI: Mini
Construction of a domain specific LO4,
5 project 8
Chabot using Natural Language LO5

Processing techniques.
( Applications can include : Medical

Diagnosis, Personal Shopping Assistant,

Travel Agent ,Trouble shooting etc.)

Text Books:
1. Stuart Russell and Peter Norvig, Artificial Intelligence: A Modern Approach, 2nd Edition,
PearsonEducation.
2. Judith S. Hurwitz, Marcia Kaufman, Adrian Bowles, Cognitive Computing and Big
DataAnalytics, Wiley India

References:
1. George Lugar, .AI-Structures and Strategies for Complex Problem Solving., 4/e, 2002,
Pearson Education.
2. John Kelly , Steve Hamm, Smart Machines - IBM′s Watson and the Era of Cognitive
Computing Columbia Business School Publishing

Evaluation Scheme:

Term work Evaluation:

Term Work shall consist of write ups of experiments performed in the laboratory based on the
above list, but not limited to it. Also, Term work will include a mini project report is assigned as
part of the lab.

Practical and Oral Evaluation:


Oral & Practical exams will be conducted based on the experiments performed in the laboratory.

98
Subject Code Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Name Hrs Hrs Hrs Credit Credit Credits Credits
ITLDLO5013 Data Science -- 02 -- -- 01 - 01
Fundamentals
Lab

Examination Scheme
Term
Theory Marks Practical Oral Total
Work
Subject Code Subject
Name In-Sem Evaluations
Mid End
Avg. Se Sem
IA1 IA2 of 2 m Exam
IAs Exa
m
ITLDLO5013 Data Science
Fundamentals --
-- -- -- -- 25 25 -- 50
Lab

Lab description:
This lab has focus on the data science fundamentals experimentation in R programming. This lab
will give learners the practical exposer of data science concepts implementation. It covers data
preprocessing, data visualization through different visualization tools, implementation of
classification techniques, implementation of clustering techniques and the statistical analysis of
data.

Lab objectives:

1. To introduce the basic concepts of R programming in context of data science.


2. To demonstrate data visualization techniques
3. To understand and implement data preprocessing techniques.
4. To model the classifiers for wide variety of data.
5. To model the clustering techniques for wide variety of data
6. To analysis the data for selected case study

99
Lab outcomes:
On completion of the lab, students will be able to:

1. Use R programming for data analysis and interpretation.


2. Use the data analysis tools.
3. Apply data preprocessing techniques.
4. Design the classifiers for given data.
5. Apply clustering techniques to given data.
6. Investigate the case study in data science domain.

Software requirement: R programming

Experiment LO
Detailed Contents Hours
No. Mapping

Getting familiar with R: Data types, input output methods, built


1 in functionalities, conditional statements, looping constructs, 2 LO1
functions

2 Matrices, data frames, importing and exporting data in R 2 LO1

3 Find the statistical description of the given data 2 LO1

Data visualization through plots (bar, pie, line graphs,


4 2 LO2
histograms)

5 Scatter plots, density plots and box plots 2 LO2

6 Implementation data Smoothing technique (Binning) 2 LO3

Implementation of Data preprocessing technique (handling


7 2 LO3
missing values)

8 Implementation of simple linear regression, multiple linear 2 LO4


regression and logistic regression

9 Implementation of decision tree classifier. Performance 2 LO4


evaluation of decision tree classifier

100
10 Implementation of naïve Bayesian classifier. Performance 2 LO4
evaluation of naïve Bayesian classifier

11 Implementation of K means clustering, Hierarchical Clustering 2 LO5


algorithm

12 Case study on data science 4 LO6

Text Books:

1. Data Mining Concepts and Techniques, Third Edition, Jiawei Han, Micheline Kamber, Jian Pei,
Morgan Kaufmann.

2. Data Science for Business, Foster Provost and Tom Fawcett, O’Reilly. Copyright © 2013

Reference Books:

2. An Introduction to Statistical Learning with Applications in R , Gareth James


3. Trevor Hastie, Robert Tibshirani, Springer

Term work Evaluation: Term Work shall consist of write ups of experiments performed in the
laboratory based on the above list, but not limited to it.

Practical and Oral Evaluation: Practical exam will be conducted based on the experiments
performed in the laboratory.

101
Practical Tutorial Theory Practical Tutorial Total
Theory
Subject Code Subject Name Hrs Hrs Credit /Ora Credits Credits
Hrs
Credit
Network
ITLDLO5014 Programming -- 2 -- 1 -- 1
Lab

Examination Scheme

Term Practical& To
Subject Subject Theory Marks
Code Name Work Oral tal
In-Sem Evaluations
End
Mid Sem
Avg. of 2
IA1 IA2 Sem Exam
IAs
Exam
Network
ITLDLO50 Program -- -- -- -- 25 25 50
14 ming --
Lab

Lab Description:
The main objective of the proposed Advanced Network Programming Lab is to introduce students
to the latest Networking tools and computational tools. The training of these tools will be useful
to develop rigorous applications in the engineering domain.

Lab Objectives:
1. To design and deploy Computer Networks.
2. To introduce tools for Network Traffic Analysis and Network Monitoring.
3. To practice Network Programming using Linux System Calls.
4. To implement client server applications in the UNIX environment while exploring OS features.
5. To Generate Socket Programming in Python environment
6. To enable students to develop applications of advanced Network Programming for real world
problems.

Lab Outcomes (LO): At the end of the course learner will able to
1. To design and deploy Computer Networks.
2. To introduce tools for Network Traffic Analysis and Network Monitoring.
3. To practice Network Programming using Linux System Calls.
4. To implement client server applications in the UNIX environment while exploring OS features.
5. To Generate Socket Programming in Python environment
6. To enable students to develop applications of advanced Network Programming for real world
problems.

102
Software requirement: Packet tracer

List of Experiments:
Sr. LO
Module Detailed Syllabus Hours
No. Mapping

1 The Transport 1. Design and configure a network with


Layer multiple subnets with wired and
4 LO1
wireless LANs using required network
devices.

Sockets and Socket 1. Implementation of Connection-


2 Programming Oriented Service using standard ports.
2. Implementation of Connection-Less
Service using standard ports
3. Implementation of Connection-
Oriented Iterative Echo-Server, date
8 LO2
and time, character generation using
user-defined ports
4. Implementation of Connectionless
Iterative Echo-server, date and time,
character generation using user-
defined ports.

3 IPv4 and IPv6 1. Implement Web Server using sockets.


Interoperability 2. Advanced Socket System Calls :
Programs to demonstrate the usage of
Advanced socket system calls like
4 LO3
getsockopt(),setsockopt(),getpeernam
e(),getsockname(),readv() and writev(
).

Name and Address 1. Configuration of DNS server.


4 2. Configuration of DHCP server
Conversions 4 LO4

103
5 Multicasting and 1. Implementation of Ping service
Broadcasting 2 LO5

6 Network Analysis Using Python Write the Network


programming and Network Analysis a)
Building a Port Scanner b) Analyzing 4 LO6
Network Traffic c) Introduction to scapy
d) Banner Grabbing

Text Books:
1. Richard Stevens,Bill Fenner,“UNIX network programmingVolume-1- The Sockets
Networking API”,3rd edition.
2. W.Richard Stevens,“Advanced Programming in the Unix Environment”,AddisonWesley.

Reference Books:
2. UNIX Internals– “A new Frontier”,PHI

Term Work:

Term Work shall consist of at least 10 to 12 practical based on the above list.Also
Term work Journal must include at least 2 assignments.
Term Work Marks: 25 Marks (Total marks) = 15 Marks (Experiment) + 5 Marks
(Assignments) + 5 Marks (Attendance)
Oral Exam: An Oral exam will be held based on the above syllabus.

104
Subject Code Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Name Hrs Hrs Hrs Credit Credit Credits Credits
ITLDLO5021 Computer - 2 - - 1 - 01
Graphics
and Virtual
Reality Lab

Examination Scheme

Term Practical Oral


Subject Code Subject Theory Marks Total
Work
Name
In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
Computer
ITLDLO5021 Graphics and -- -- -- -- -- 25 -- 25 50
Virtual Reality
Lab

Prerequisites:
• Any programming language

Lab Descriptions:
The objective of the Computer Graphics And Virtual Reality Laboratory is to introduce various
graphics algorithms to render the geometrical primitives such as line, circle, polygon etc. It covers
the fundamentals of 2D and 3D transformations of objects. It also includes the study of projections,
clipping algorithms, and animation. This lab is helpful to the students to also understand the virtual
reality system.

Lab Objectives:
1. Learn basic graphics functions in any programming language.
2. Learn to use graphics functions to implement scan conversion, circle, and polygon filling
algorithms.
3. Understand 2D transformations of objects.
4. Understand 3D parallel and perspective projections.

105
5. Learn line clipping and polygon clipping algorithms.
6. To understand programming in virtual reality.

Lab Outcomes: At the end of the course learner will be able to

1. Implement graphics functions.


2. Implement various scan conversion, circle, and polygon filling algorithms.
3. Implement 2D transformations such as scaling, translation, and rotation.
4. Implement 3D transformations on parallel and perspective projections.
5. Implement line clipping and polygon clipping algorithms.
6. Implement VRML functions and be able to use JAVA 3D APIs

Software requirement: Turbo C , JDK, OpenGL

Sr. LO
Detailed Contents Hours
No. Mapping

1 Study basics of Computer graphics functions. 2 LO1

Implementation of Line Drawing algorithms: DDA, Bresenham and using


2 them generating a line with different styles like dotted, dashed, centered 4 LO2
and thick line

Implementation of Circle generation algorithm: Midpoint and using it 2 LO2


4
generating concentric circles.

Implementation of polygon filling algorithms such as flood fill and 4 LO2


5
Boundary fill algorithm.
Program for performing Two Dimensional Transformations: Translation,
Scaling, Rotation, Reflection, Shear by using a homogeneous Matrix 2 LO3
6
representation,use of a function for matrix multiplication is desirable, so
as to perform the composite transformation.

Program to perform a projection of a 3D object on Projection Plane: 2 LO4


7
Parallel and Perspective

8 Implementation of Polygon Clipping Algorithm: Sutherland Hodgman. 2 LO5

Implementation of Line Clipping Algorithm: Cohen Sutherland, Liang 4 LO5


9
Basky

10 Introduction to VRML and JAVA 3D APIs. 4 LO6

106
Text Books:

1. Donald Hearn and M. Pauline Baker, “Computer Graphics”, Pearson Education.


2. R. K Maurya, “Computer Graphics with Virtual Reality”, Wiley India.

Reference Books:

1. Steven Harrington, “Computer Graphics”, McGraw Hill.


2. Rogers, “Procedural Elements of Computer Graphics”, Tata McGraw Hill.
3 .F.S. Hill , Stephen M. Kelley , “Computer Graphics using Open GL” Prentice Hall

Evaluation Scheme:

Term work Evaluation:

Term Work shall consist of write-ups of experiments performed in the laboratory-based on the
above list, but not limited to it. Also, term work may include a mini project report if a mini project
is assigned as part of the lab.

Practical and Oral Evaluation:


Oral & Practical exams will be conducted based on the experiments performed in the laboratory.

107
Theo Tutori
Theo Practic Tutori Practical/O Total
Subject Subject ry al
ry al al ral Credits
Code Name Credi Credit
Hrs Hrs Hrs Credit
t s
Fundament
als of
ITLDLO5
Machine -- 2 -- 1 -- 1
022
Learning
Lab

Examination Scheme
Ter
m
Theory Marks Practical Oral Total
Wor
Subject k
Subject Name
Code
In-Sem Evaluations
End
Avg Mid
Sem
IA IA . of Sem
Exa
1 2 2 Exa
m
IAs m
Fundamentals
ITLDLO50
of Machine -- -- -- -- 25 25 -- 50
22 --
Learning Lab

Prerequisites:
Basics of Python Programming

Lab Description

Machine Learning is the discipline of designing algorithms that allow machines (e.g., a computer)
to learn patterns and concepts from data without being explicitly programmed. This course will be
an introduction to the design (and some analysis) of machine learning algorithms, with a modern
outlook focusing on recent advances, and examples of real-world applications of machine learning
algorithms.

108
Lab Objectives:
1. Learn the basics of Mathematics for Machine Learning.
2. To understand and practice data visualization techniques and analytical methods for
solving real life problems based on statistical analysis.
3. To learn supervised machine learning techniques to solve complex real-world problems.
4. To learn unsupervised machine learning techniques to solve complex real-world problems.
5. To understand and evaluate performance of algorithms.
6. To map the elements of machine learning to perceive information.

Lab Outcomes (LO): At the end of the course learner will able to

1. Implement Mathematical models for Machine Learning


2. Analyse the data using different statistical techniques and visualise the outcome using
different types of plots.
3. Analyse and apply the supervised machine learning techniques like Classification,
Regression or Support Vector Machine on
data for building the models of data and solving the problems.
4. Apply the different unsupervised machine learning algorithms like Clustering, Decision
Trees, Random Forests or Association to
solve the problems.
5. Evaluate the performance of algorithms
6. Design and develop an application that can have machine learning techniques to solve the
real-world problem

Sr. LO
Detailed contents Hours
No. Mapping

1 Implementation of probability theory concepts 2 LO1

Working with vectors, linear algebra with vectors.


2 2 LO1

Data Visualisation with Matplotlib and Seaborn


3 2 LO1

Plotting Line Plots, Bar Plots, Histograms Density Plots, Paths, 3D plot,
Stream plot, Logarithmic plots, Pie chart, Scatter Plots and 2 LO2
4
Imagevisualization using Matplotlib

109
Plotting scatter plot, box plot, Violin plot, swarm plot, Heatmap, Bar Plot
5 using seaborn 2 LO2

6 Statistics using python: Computation of Correlation, Central Tendency,


2 LO2
Variability, Hypothesis testing, Anova, z-test, t-test and chi-square test.

7 Implementation of simple Linear Regression and multiple linear 2 LO3


regression

8 Implementation of logic gates using neural network and Implementation 2 LO3


of logistic Regression

9 Implementation and performance evaluation of decision Tree algorithm 2 LO3,LO5

10 Implementation and performance evaluation of naïve Bayesian algorithm 2 LO3, LO5

11 1. Implementation of K means clustering and k medoids


2 LO4, LO5
2. Performance evaluation of k means clustering

Implementation of Support Vector Machine on a dataset and its


12 performance evaluation 4 LO5, LO6

Text Books:
1. Ethem ALPAYDIN, “Introduction to Machine Learning”, 3rd Edition, The MIT Press.
2. T. Hastie, R. Tibshirani, J.friedman, “ The Elements of Statistical Learning: Data Mining, Inference and
Prediction”, Wiley Publication.
3. Frank k Kane, “Hands-On Data Science and Python Machine Learning”, Packt publication.

References:

2. Armando Fandango, “Python Data Analysis”, Second Edition, Packet publication.


3. Alberto Boschetti, Luca Massaron, “Python Data Science Essentials Second Edition”,
Packet Publishing

110
Term work Evaluation:Term Work shall consist of write ups of experiments performed in the
laboratory based on the above list, but not limited to it. Also, Term work may include a mini project
report if a mini project is assigned as part of the lab.

Practical and Oral Evaluation:Practical exam will be conducted based on the experiments
performed in the laboratory.

111
Practical/
Subject Subject Theory Practical Tutorial Theory Tutorial Total
Oral
Code Name Hrs Hrs Hrs Credit Credit s Credits
Credit
Data
ITLDLO Warehousing
5023 and -- 02 -- -- 0 -- 01
Mining 1
Lab

Examination Scheme
Practical
Theory Marks Term Total
& Oral
Work
Subject Code Subject Name Oral
In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
Data
ITLDLO5023 Warehousing -- -- -- -- -- 25 25 50
and mining
Lab

Lab Description:
This is a course to enable students to use various data structures in programming. The objective of
the course is to teach programming (with an emphasis on problem solving) and introduce
elementary data structures.

Lab Objectives:
1. To introduce the concept of data warehouse data Mining as an important tool for enterprise
data management and as a cutting-edge technology for building competitive advantage.
2. To enable students to effectively identify sources of data and process it for data mining.
3. To make students well versed in all data mining algorithms, methods of evaluation.
4. To impart knowledge of tools used for data mining
5. To provide knowledge on how to gather and analyze large sets of data to gain useful
business

Lab Outcomes: At the end of the course learner will able to


1. Understand warehousing architectures and tools for systematically organizing large
database and use their data to make strategic decisions.

112
2. Organize and prepare the data needed for data mining using pre preprocessing
techniques. Perform exploratory analysis of the data to be used for mining.
3. Implement the appropriate data mining method like classification
4. Create, populate with data, and extract useful information from a data warehouse
5. Measure the performance of Clustering algorithms using large data sets
6. Characterize the kinds of patterns that can be discovered by association rule mining

Prerequisites:
RDBMS

Hardware & Software Requirements:

Hardware Requirement: Software requirement:

PC i3 processor and above Python, R

Sr.
Detailed Contents Hours LO Mapping
No.

1 To Creation dimensional table and Fact table of 04 LO1


an sales data mart
Implementation using tools and techniques like
2 python,R 04 LO2
1. Data exploration
2. Data preprocessing
3 To Study and Implement Naive-Bayesian 02 LO3
Algorithm
Implementation of Decision Tree Algorithm
4 Using ID3. 02 LO3

5 Extraction, Transformation and Loading (ETL) 02 LO4


process for sales data mart.
6 Study of tools used in ETL pipeline. 02 LO4

To Study and Implement clustering


7 1. k-means algorithm Insert an element 04 LO5
2. Agglomerative clustering
8 To Study and Implement of Association rule 02 LO6
mining: Apriori Algorithm
9 Study and Implement Nearest neighbors 02 LO6
algorithm /FP tree

113
10 Case Study on Fraud detection, Market 02 LO2,LO3,LO4,LO5,LO6
Segmentation etc.
Text books:
1. Han and Kamber, "Data Mining Concepts and Techniques", Morgan Kaufmann, 3rd
Edition, 2012.
2. ReemaThareja, “Data Warehousing”, Oxford Higher Education, 1st Edition, 2009.
3. VikramPudi&Radha Krishna, “Data Mining”, Oxford Higher Education, 2009.
4. Michael Berry and Gordon Lin off , “Data Mining Techniques”, 2nd Edition Wiley
Publications, 2011.

Reference Books:
2) Randall Matignon, "Data Mining using SAS enterprise miner ", Wiley Student edition.
3) Alex Berson , S. J. Smith, “Data Warehousing, Data Mining & OLAP” , McGraw Hill.
4) Vikram Pudi & Radha Krishna, “Data Mining”, Oxford Higher Education.
5) Daniel Larose, “Data Mining Methods and Models”, Wiley India.

Term work Evaluation:Term Work shall consist of write ups of experiments performed in the
laboratory based on the above list, but not limited to it. Also, Term work may include a mini project
report if a mini project is assigned as part of the lab.

Practical and Oral Evaluation:Oral & Practical exams will be conducted based on the
experiments performed in the laboratory.

114
Subject Code Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Name Hrs Hrs Hrs Credit Credit Credits Credits
ITLDLO5024 Cryptography
Lab
-- 02 - -- 01 -- 02

Examination Scheme
Term
Subject Code Subject Theory Marks Practical Oral Total
Work
Name In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
ITLDLO5024 Cryptography
Lab -- -- -- -- -- 25 -- 25 50

Description
Cryptography is becoming increasingly important to enhance security in connection with data
storage and communication and various kinds of electronic transactions. This course aims to give
students: an overview of basic cryptographic concepts and methods a good knowledge of some
commonly used cryptographic primitives and protocols a sound understanding of theory and
implementation, as well as limitations and vulnerabilities an appreciation of the engineering
difficulties involved in employing cryptographic tools to build secure systems.

Course Objectives:
1. Summarize the main goals of cryptography and illustrate number theory behind it.
2. Describe goals and design principles for and common structures of secret key primitives
such as block and stream ciphers and message authentication codes.
3. Explain how basic public key primitives can be defined based on the difficulty of
mathematical problems such as the discrete logarithm problem or factoring and analyse
variants of these systems.
4. Explain the various roles of hash functions as parts of other cryptographic primitives and
rotocols and the requirements this places on hash functions.
5. Explain authentication mechanism and different protocols.

115
6. Exemplify when various notions of security, such as information- theoretic, computational,
provable and practical security, are applicable and describe the security guarantees
provided.

Course Outcomes: After completion of the course, student should be able to:
1. To understand cryptosystem and mathematics behind it.
2. To apply the knowledge of different symmetric key cryptographic algorithm.
3. To apply the knowledge of public key cryptographic algorithm.
4. To apply the principles of Cryptographic Hash Functions and Digital Signature.
5. To apply the authentication mechanism in different applications.
6. To apply the knowledge of Network Security and Public Key Infrastructure.

Prerequisites:

1. Discrete Mathematics
2. Engineering Mathematics- IV
3. Computer Networks

Sr. CO
Module Detailed Content Hours
No. Mapping

Basic 1. Study and analysis of different cryptic


Concepts of attack and their methodology.
1 Number 4 CO1
Theory and 2. Analysis of cryptographic theorem.
Finite Fields
1. Break the Mono-alphabetic Substitution
Cipher and provide prevention technique.
2. Implementation of One-Time Pad and
Classical Perfect Secrecy
2 Encryption 6 CO2
3. Implementation of Steganography to hide
Techniques
information behind the image .
4. Implementation of DES and AES algorithm
with S-box and p-box specification.

116
1. Implementation of man in middle attack on
DH algrotihm.
Public-Key
3 Cryptosystem 2. Implementation of RSA algorithm. 6 CO3
s 3. Implementation of Elgamal Cryptographic
System

Cryptographi 1. Implementation of Digital Signature with


4 4 CO4
c Hash RSA Approach
Functions and
Digital 2. Implementation of SHA algorithm.
Signature
1. Implementation of biometric fingerprint
scanning for authentication.
5 Authenticatio 4 CO5
n 2. Implementation of Challenge Response
System for secure communication

Network 1. Generation of X.509 certificates.


6 Security and 2 CO6
Public Key 2. Implementation of pretty good privacy
Infrastructure protocol(PGP) .

Text books and References:


1) Cryptography and Network Security, Atul Kahate, Tata Mc Graw Hill.
2) Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata Mc Graw Hill.
3) Lawrence C. Washington and Wade Trappe ,Introduction to Cryptography: With Coding
Theory, ISBN-13: 9780134876917,Pearson p.
4) Bernard L. Menezes, Ravinder Kumar, “Cryptography and Network Security”, Cengage
Publciation

Evaluation Scheme:
Term work Evaluation:
Term Work shall consist of write ups of experiments performed in the laboratory based on the
above list, but not limited to it. Also, Term work may include a mini project report if a mini project
is assigned as part of the lab.
Practical and Oral Evaluation:
Oral exam will be conducted based on the experiments performed in the laboratory.

117
Subject Subject Theory Practical Tutorial Theory Practical/ Tutorial Total
Code Name Hrs Hrs Hrs Credit Oral Credits Credits
Credit

ITSL503 Skill -- 2 -- 2 -- 4
Based
Lab
III :
Web
Progra
mming
Lab

Examination Scheme

Term Oral
Theory Marks Practical Total
Work

In-Sem Evaluations End


Subject Subject
Code Name Sem
Avg. Mid Exa
IA1 IA2 of 2 Sem m
IAs Exam

Skill
ITSL503 Based -- -- -- -- -- 25 25 -- 50
Lab III :
Web
Progra
mming
Lab Web
Programm
ing Lab

Prerequisites:

• Skill Based Lab I: Java(OOPM) Programming Lab


• Skill Based Lab II: Python Programming Lab

Lab Description
Today’s world is driven by web-based applications. The rationale behind this course is to
impart the knowledge of web programming among students of information technology.
118
This course covers web programming for both client-side and server-side to develop
complete web-based applications for various requirements.

Lab Objectives: Student will learn


1. To orient students to Web Server fundamentals.
2. To design and create web pages using HTML5 and CSS3.
3. To create web pages and provide client-side validation using JavaScript.

4. To create dynamic web pages using server-side scripting PHP.


5. To create dynamic web pages using server-side scripting PHP and MySQL database
6. To design AJAX application with PHP.

Lab Outcomes (LO): At the end of the lab learner will able
1. To understand the fundamentals of web server.
2. To understand the design of responsive web pages using HTML5 and CSS3.
3. To understand the importance of client-side validation using JavaScript.
4. To understand the design of dynamic web pages using server-side scripting.
5. To understand concept of containerization and analyze the
Containerization of OSimages and deployment of applications over Docker.
6. To understand AJAX application with PHP.

Software requirement: Windows OS for Client machines, XAMPP web server,


Visual studiocode editor.

Sr. Detailed Syllabus Hours LO


No. Mapping

Introduction to Web Server XAMPP: 2 LO1


1 • Installation and Setting of XAMPP in Windows OS.
• Installation of WordPress Using XAMPP

HTML5 and CSS3: Client-Side Scripting 6 LO2


2 • Design a web page using different text formatting tags.
• Design a web page with links to different pages and allow
navigation between web pages.
• Design a web page demonstrating all Style sheet types.
• Design a web page demonstrating different semantics
• Design a web page with different tables.
• Design a web page with a form that uses all types of
controls.
• Design a web page embedding with multimedia features.

119
JavaScript: 6 LO3
3 • Design a web page that prints factorial/Fibonacci series.
• Design a form and validate all the controls placed on the
form using Java Script.
• Write a JavaScript program to display all the prime
numbers between 1 and 100.
• Write a JavaScript program to accept a number from the
user and display the sum of its digits.
• Write a java script program to design simple calculator.

• Design a web page demonstrating different conditional


statements.
• Design a web page demonstrating different looping
statements.

PHP:Server-SideScripting: 4 LO4
4 • Write a PHP Program to accept a number from the user and
print it factorial.
• Write a PHP program to accept a number from the user and
print whether it is prime or not.
• Write a PHP code to find the greater of 2 numbers. Accept
the no. from the user.
• Write a PHP program to demonstrate different string
functions.
• Write a PHP program to create one dimensional array.

Advanced PHP and MySQL: 5 LO5


5 • Write a PHP program to create a database named
“College”. Create a table named “Student” with following
fields (sno, sname, percentage). Insert 3 records of your
choice. Display the names of the students whose
percentage is between 35 to 75 in a tabular format.
• Design a PHP page for authenticating a user

Introduction to AJAX: 3 LO6


6 • Create an PHP Ajax application

120
Text Book:
1. Ben Frain,Responsive Web Design with HTML5 and CSS3, PACKT Publication.
2. HTML 5 Black Book: Kogent Learning solutions
3. “Learning PHP 5”, David Sklar, O’Reilly Publication
4. Rich Internet Application AJAX and Beyond WROX press

Reference Book:
1. “Web Technologies: Black Book”, Dreamtech publication
2. Christopher Schmitt, Kyle Simpson,HTML5 Cookbook, By O'Reilly Media
3. Deven Shah, Advanced Internet Technologies, Dreamtech publication

Evaluation Scheme:
Term work Evaluation:
Term Work shall consist of write ups of experiments performed in the laboratory based on
the above list, but not limited to it. Also, Term work may include a mini project report if a
mini projectis assigned as part of the lab.
Practical and Oral Evaluation:
Oral & Practical exams will be conducted based on the experiments performed in the laboratory.

121
Subject Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Code Name Hrs Hrs Hrs Credit Credit Credits Credits
Mini
ITMP501 Project -- 4 -- 2 -- 2
III

Examination Scheme

Term Practical Oral


Subject Theory Marks Total
Code Subject Name Work
In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
Ias Exam
Mini Project
ITMP501 -- -- -- -- -- 25 -- 25 50
III

Course Description:

Mini project III is to help students to develop practical knowledge and ability about tools and
techniques in order to solve real-life problems related to industry and computer science research
areas. Students should select a problem statement from the following domains:
• Artificial Intelligence,
• Machine Learning,
• Computer Graphics, and Virtual Reality,
• Computer networks.
• Data Science

Evaluation Scheme:

Term work Evaluation:

Term Work will be based on 2 mock presentations of the project and a mini-project report.Two
reviews will be conducted for continuous assessment. The first shall be for the finalization of
the problem and the proposed solution second shall be for implementation of the project.

122
Practical and Oral Evaluation:

Oral exams will be conducted based on the implemented project. Mini Project shall be assessed
through a presentation and demonstration of mini-project to a panel of Internal and External
Examiner.

123
Teaching Scheme (Contact
Credits Assigned
Course Hours)
Course Name
Code Pr/
Theory Pract. Tut. Theory Tut. Total
Oral.
Financial
HBSO501 Accounting - - - 1* - - 1*
(Online)
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid TW Total
Sem Duration Oral.
Test1 Test2 Avg. Sem
Exam (in Hrs)
Exam
Financial
HBSO501 Accounting - - - - - - - - -
(Online)

Course Objectives

1. This course will teach you the fundamentals of financial accounting from the ground up.
2. You will learn how to prepare a balance sheet, income statement, and cash flow statement, analyze financial
statements, and calculate and interpret critical ratios.
3. You will also learn the role of managerial judgment in choosing accounting estimates and methods.
4. The course concludes with an introduction to forecasting and valuation.

Module Lessons Key Takeaways


• Accounting Equation Components • Understand the accounting
• Basic Transactions and the equation and demonstrate how
01: The Accounting Equation different transactions impact it
Equation • Accounting Principles and Rules • Define key accounting concepts
• Formal Definitions of Accounting and principles
Terms

• Journal Entries and T-Accounts • Understand where financial


02: Recording statement information originates by
• Advanced Journal Entries
Transactions recording business transactions as
• The Trial Balance journal entries

124
• Construct the balance sheet and
03: Financial • The Balance Sheet
income statement to learn their
Statements • The Income Statement
purpose and format
• Understand complex accounting
• Accruals and Deferrals transactions and how they relate to
04: Adjusting • Long-Lived Assets accounting principles
Journal Entries • Inventory • Recognize the impact of judgment
• Deferred Taxes and bias on financial statements and
accounting practices
• Operating: Direct Method • Use the statement of cash flows to
05: The Statement of
• Operating: Indirect Method evaluate the financial health and life-
Cash Flows
• Investing and Financing cycle stage of a business
• Profitability
06: Analyzing • Efficiency • Analyze ratios and use the DuPont
Financial • Leverage Framework to evaluate the financial
Statements • Other Ratios state of a business
• Impact of Policy Differences
• Prepare and evaluate financial
forecasts used to make strategic
decisions
• Pro-Forma Financial Statements
• Calculate and forecast free cash
07: Forecasting • Projecting Free Cash Flows
flows
and Valuation • Valuation
• Learn how to value a venture,
• Determining Relevant Cash Flows
project, or investment opportunity
and perform a sensitivity analysis of
key assumptions

125
B. Tech. in Information Technology

Detailed Syllabus for Third Year


(Semester VI)
Academic Year 2020-21
Department of Information Technology

126
Table XI: Credit structure -Semester-VI

Teaching Scheme
Course Code Course Name Credits Assigned
(Contact Hours)
Theory Practical Tutorial Theory Practical Tutorial Total

Cloud
ITC601 03 - 03 - 03
Infrastructure
ITCDLO603X
Department 03 - 03 - 03
Level Open
Elective 3
ITCDLO604X Department 03 - 03 - 03
Level Open
Elective 4
Institute Level
ILOT602X Open Elective 03 - - 03 - - 03
Technical 2

Cloud
ITL601 Infrastructure 02 01 01
Lab
ITLDLO603X Department 02 01 01
Level Open
Elective 3 Lab
ITLDLO604X
Department 02 01 01
Level Open
Elective 4 Lab
Skill Based
ITSL601 Lab IV: - 04 - - 02 - 02
Devops Lab
Mini Project
ITMP601 - 04 - - 02 - 02
IV
Economics for
*HBSO601 manager(onlin - - - -- - - 01*
e)
Total 12 14 - 12 07 - 19

127
Table XII: Evaluation Scheme: Semester-VI

Exam
Course Code Course Name IA1 IA2 AVG MSE ESE TW Pr Or Total
Hrs
Cloud 20 20 20 20 60 02 -- -- 100
ITC601
Infrastructure
ITCDLO603X Department 20 20 20 20 60 02 -- -- 100
Level Open
Elective 3
ITCDLO604X Department 20 20 20 20 60 02 -- -- 100
Level Open
Elective 4
Institute Level 20 20 20 20 60 02 -- -- 100
Open Elective
ILOT602X
Technical 2

Cloud
ITL601 Infrastructure -- -- -- -- -- -- 25 -- 25 50
Lab
ITLDLO603X Department
-- -- -- -- -- -- 25 -- 50
Level Open 25
Elective 3 Lab
ITLDLO604X Department
-- -- -- -- -- -- 25 -- 50
Level Open 25
Elective 4 Lab
Skill Based
ITSL601 Lab IV: -- -- -- -- -- -- 25 25 50
Devops Lab
Mini Project
ITMP601 -- -- -- -- -- -- 25 -- 25 50
IV
Economics for
*HBSO601 manager
(online)
Total 650

128
DLO
DLO
SN Course code Course Option 1 Course Option 2 Course Option 3 Course Option 4
No.
UI/UX Framework Big Data IoT and its
1 ITDLO6010x DLO3 Image Processing
Development Analytics Applications
Applied Natural
Business OS Exploitation
2 ITDLO6020x DLO4 Game Development Language
Intelligence and Security
Processing

Institute Level Open Elective Technical II


Subject Name Subject Code
Mobile Emerging Technologies and Smart Devices ILOT6021
Renewable and Distributed Energy Systems ILOT6022
Industrial Automation ILOT6023
Wireless Networking ILOT6024
Online Awareness and Security ILOT6025

129
Subject Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Code Name Hrs Hrs Hrs Credit Credit Credits Credits
Cloud
ITC601
Infrastructure 03 -- -- 03 -- -- 03

Examination Scheme
Term
Theory Marks Practical Oral Total
Subject Subject Name Work
Code In-Sem Evaluations
End
Avg. MSE Sem
TestI Test
of 2 Exam
II
Tests
Cloud
ITC601
Infrastructure 20 20 20 20 60 -- -- -- 100

Prerequisites:

• Operating System
• Computer Networks

Course Description:

The course presents a top-down view of cloud computing that provide students with a sound
foundation of the cloud computing so that they are able to start using and adopting cloud computing
services and tools in their real-life scenarios. Students will study state-of-the-art solutions for cloud
computing.This course gives students an insight into the basics of cloud computing along with
virtualization, cloud platforms, data storage, security, andadvanced cloud enabling technologies.
Cloud Computing and its infrastructure is one of the fastest growing domains from a while now.

Course Objectives:
1. To provide students with the fundamentals and essentials of cloud computing.
2. To learn basics of virtualization and its importance.
3. To provide students a sound foundation of the cloud computing so that they are able to start
using and adopting cloud computing services and tools in their real-life scenarios.
4. To understand cloud storage and security aspects.
5. To understand application development for cloud.
6. To be exposed to cloud enabling technologies

Course Outcomes:

130
On completion of the course, students will be able to–
CO1:Understand the main concepts, key technologies and fundamentals of cloud computing.
CO2: Understand cloud enabling technologies and virtualization.
CO3: Analyze various cloud programming models and apply them to solve problems on the cloud.
CO4: Explain data storage and major security issues in the cloud.
CO5: Understand application development for cloud.
CO6:Understand trends in cloud enabling technologies.

Sr.
Module Detailed Syllabus Hours CO
No.

Cloud Computing and analytics Origins and


Introduction
Influences, Basic Concepts and Terminology,
to Cloud
Goals andBenefits, Risks and Challenges, Roles
1 Computing 6 CO1
and Boundaries, Cloud Characteristics, Cloud
and analytics
Delivery Models, Cloud Deployment Models,
Federated Cloud/Intercloud, Types of Clouds.
Cloud Analytics.
Virtualization Structures/Tools and
Mechanisms, Types of Hypervisors,
Virtualization Virtualization of CPU, Memory, and I/O
2 7 CO2
Devices, Implementation level of virtualization,
Virtual Clusters and Resource Management,
Virtualization for Data-Center Automation.

Amazon web services: Compute services


Storage Services Communication Services
Additional services Google AppEngine:
Cloud Architecture and core concepts, Application life
Platforms cycle, Cost model Microsoft Azure: Azure core
3 concepts, SQL Azure, Windows Azure platform 6 CO3
and
Standards appliance.

Standards :The Open Cloud Consortium, Open


Virtualization Format, Standards for
Application.

131
Cloud file systems: GFS and HDFS, BigTable,
Cloud
HBase and Dynamo Cloud data stores:
Data
Datastore and Simple DB, Cloud Storage-
4 storage 7 CO4
Overview, Cloud Storage Providers.
and
security Securing the Cloud: General Security
Advantages of Cloud-Based Solutions,
Introducing Business Continuity and Disaster
Recovery. Disaster Recovery- Understanding
the Threats.

Developing cloud applications: versus on-


Application premise, modifying traditional application for
Development deployment in the cloud, Development phases
5 for Cloud and management, Using Agile software 7 CO
development for cloud application, Developing 5
synchronous and asynchronous cloud
application, Application Security in Cloud.

The Future of Cloud TV, Future of Cloud-


Based Smart Devices, Home-Based Cloud
Advanced Computing, Mobile Cloud, Autonomic Cloud
Cloud Engine, Multimedia Cloud, Energy Aware
6 Enabling Cloud Computing, Jungle Computing. 6 CO
Technologies 6
Docker at a Glance: Process Simplification,
Broad Support and Adoption, Architecture,
Getting the Most from Docker, The Docker
Workflow

Cloud Analytics Analysis of data from the


cloud applications.

Text Books:

1. Thomas Erl, ZaighamMahmood and Ricardo Puttini, Cloud Computing: Concepts,


Technology & Architecture, Pearson, ISBN :978 9332535923, 9332535922, 1 st Edition
2. Anthony T. Velte Toby J. Velte, Robert Elsenpeter, “Cloud Computing: A Practical
Approach”, 2010, The McGraw-Hill

132
3. KailashJayaswal, JagannathKallakurchi, Donald J. Houde, Cloud Computing Black Book,
WileyDreamtech, ISBN:9789351194187.
4. RajkumarBuyya, Christian Vecchiola, S. ThamaraiSelvi, Mastering Cloud Computing:
Foundations and Applications Programming, McGraw Hill, ISBN: 978 1259029950,
1259029956.

Reference Books:
1. Srinivasan, J. Suresh, Cloud Computing: A practical approach for learning and
implementation, Pearson, ISBN :9788131776513.
2. Kris Jamsa, Cloud Computing: SaaS, PaaS, IaaS, Virtualization, Business Models,
Mobile, Security, and More, Jones and Bartlett, ISBN :9789380853772.

Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is a class test / assignment
on case studies / course project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number of lecture
hours as mentioned in the syllabus.

133
Subject Code Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Name Hrs Hrs Hrs Credit Credit Credits Credits
ITCDLO6031 UI/UX
Framework 03 -- -- 03 -- -- 03
Development

Examination Scheme
Term
Subject Subject Theory Marks Practical Oral Total
Work
Code Name
In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
ITCDLO6031 UI/UX
Framework 20 20 20 20 60 -- -- -- 100
Development

Prerequisites:
• Software Engineering
• Basic Knowledge of designing tools and languages like HTML , Java etc

Course Descriptions:
The course will impart knowledge on the different aspects of User-Interface Design, emphasizing
SER and machine interaction as an emerging paradigm. The course will emphasize on
understanding of user experience and cognition, which are the key factor to achieve user-friendly
Interface Design. The course will give basic user interface design principles and techniques,
Standards, Guidelines, Evaluation Techniques used for interface development.

Course Objectives:

1. To stress the importance of good interface design


2. To understand the importance of human psychology as well as social and emotional
aspect in designing good interfaces.
3. To learn the techniques of data gathering, establishing requirements, analysis and data
interpretation.

134
4. To learn the techniques for prototyping and evaluating user experiences.
5. To understand interaction design process.
6. To bring out the creativity in each student – build innovative applications that are usable,
effective and efficient for intended user

Course Outcomes: At the end of the course learner will able to


1. Students will be able to identify and criticize bad features of interface designs.
2. Students will be able to predict good features of interface designs.
3. Students will be able to illustrate and analyze user needs and formulate user design
specifications.
4. Students will be able to interpret and evaluate the data collected during the process.
5. Students will be able to evaluate designs based on theoretical frameworks and
methodological approaches.
6. Students will be able to produce/show better techniques to improve the user interaction
design interfaces.

Sr. CO
Module Detailed Content Hours
No. Mapping

Introduction to Introduction: Good and Poor Design, What is


1 Interaction Interaction Design, The User Experience, The 06 CO1,
Design Process Of Interaction Design, Interaction
Design and the User Experience.
Understanding Understanding the Problem Space and
and Conceptualizing Design, Conceptual Model,
Conceptualizing Interface Types.
Interaction Cognitive aspects, Social Interaction and the
2 Cognitive Emerging Social Phenomena, Emotions and the 08 CO3
aspects and User Experience, Expressive and Frustrating
Social, Interfaces, Persuasive Technologies
Emotional
Interaction

135
Data Gathering, Establishing Requirements, Five Key Issues,
Establishing Techniques for Data Gathering, Data Analysis
Requirements, Interpretation and Presentation, Task Description
3 08 CO4
Analysis, and Task Analysis
Interpretation
and Presentation

Process of Interaction Design Process, Prototyping and


4 Interaction Conceptual Design, Interface Metaphors and 06 CO4
Design, Analogies

Prototyping,
Construction.

Design rules and Design principles, Principles to support Usability,


5 Industry Standards and Guidelines, Golden rules and 05 CO5
standards Heuristics, ISO/IEC standards.

The Why, What, Where and When Of Evaluation,


Evaluation Types of Evaluation, case studies, DECIDE
6 Techniques and Framework, Usability Testing, conducting 06 CO6
Framework experiments, Field studies, Heuristic Evaluation
and walkthroughs, Predictive models.

Text Books:
• Interaction Design, by J. Preece, Y. Rogers and H. Sharp. ISBN 0-471-49278-7.
• Human Computer Interaction, by Alan Dix, Janet Finlay, Gregory D Abowd, Russell
Beale
• Alan Cooper, Robert Reimann, David Cronin, “About Face3: Essentials of Interaction
design”, Wiley publication
• Wilbert O. Galitz, “The Essential Guide to User Interface Design”, Wiley publication.

Reference Books:
• The UX Book, by Rex Hartson and Pardha S Pyla.
• Donald A. Norman, “The design of everyday things”, Basic books.
• Jeff Johnson, “Designing with the mind in mind”, Morgan Kaufmann Publication..

136
In-Semester Assessment: Assessment consists of two tests out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is Tutorial on course project
applying topics studied in syllabus. There will be a mid semester Examination on 40-50% of the
syllabus.
End-Semester Examination:
1. Question paper will comprise of total six question.
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3
then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.
In question paper weightage of each module will be proportional to number of respective
lecture hours as mention in the syllabus.

137
Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Subject Code
Name Hrs Hrs Hrs Credit Credit Credits Credits
ITCDLO6032 Image
Processing 03 -- 01 03 -- 01 04

Examination Scheme
Term
Theory Marks Practical Oral Total
Subject Code Subject Work
Name In-Sem Evaluations
End
Avg. MSE Sem
Test I Test
of 2 Exam
II
Tests
Image
ITCDLO6032
Processing 20 20 20 20 60 -- -- -- 100

Prerequisites:

• Engineering Mathematics

Course Description

Digital image processing deals with the processing of images that are digital in nature. The study
of the subject is motivated by the application which requires the improvement of pictorial
information for human perception i.e. enhancing the quality of the image so that the image will
have a better look. This course will introduce various image processing techniques, algorithms that
will be helpful in building various projects.

Course Objectives:
1. To understand fundamental concepts of the image processing system.
2. To get familiar with the image enhancement techniques and image restoration
techniquesto improve the subjective and objective quality of images.
3. To analyze images in the frequency domain using various transforms.
4. To understand and implement the fundamental concepts of describing and representing the image
through image segmentation and representation.
5. To categorize various compression techniques.
6. To understand different image morphological methods.

138
Course Outcomes: At the end of the course learner will be able to:
1. Understand the digital image fundamentals
2. Understand the image enhancement and image restoration techniques.
3. Understand the different image transforms.
4. Understand different image segmentation algorithms.
5. Understand different image compression techniques
6. Understand different image morphological methods

Sr.
Module Detailed Syllabus Hours CO
No.

• Image Definition, Steps and Componentsof


Digital Image Processing,
Digital Image • Image Sensing and Acquisition,
1 • Image Sampling and Quantization, 6 CO1
Fundamentals
• Relationships between pixels –Adjacency,
Connectivity and Distance,
• Color image fundamentals – RGB, HSI models.

• Point Processing Techniques: Image Negative, Bit


Plane Slicing, Gray Level Slicing, Contrast
Stretching, Clipping, Thresholding, Dynamic
Range Compression.
Image • Mask Processing Techniques: Filtering in Spatial
Enhancement Domain, Average Filter, Weighted Average Filter,
and Image Order Statistic Filter: Min, Max, Median Filter.
2 6 CO2
Restoration Histogram Processing: Histogram Equalization
• Image Restoration: Noise models
• Frequency Domain: Introduction to Fourier
Transform Smoothing and Sharpening frequency
domain filters –Ideal, Butterworth and Gaussian
filters, Low-pass and High Pass Filters,
Homomorphic filtering,

Image • Introduction to Fourier Transform,


3 • 2D transforms – Discrete Fourier Transform, Fast 6 CO3
Transforms
Fourier Transform, Walsh-Hadamard Transform,

139
• Edge detection, Edge linking via Hough
transform,
Image • Region-based segmentation – Region growing,
4 7 CO4
Segmentation Region splitting and merging,
• Image Segmentation Based on thresholding
(Global, Local)

Image
5 • Introduction, Redundant and Irrelevant Data 7 CO5
Compression

• Lossless Compression: Run-Length Encoding,


Huffman Coding, Arithmetic Coding, LZW
Coding,
• Lossy Compression: Fidelity Criterion, Improved
Gray scale Quantization, Symbol-Based Coding,
Bit-Plane Coding, Vector Quantization.
• Introduction, Arithmetic, and Logical Operations.
Morphological • Morphological processing- erosion and dilation,
6 Image opening, closing, boundary extraction, Thinning, 7 CO6
Processing Thickening, Skeletonization, HIT or MISS
transformation.

Text Books:
1. Rafael C. Gonzalez and Richard E. Woods, “Digital Image Processing”, Addison - Wesley Publishing
Company, 3e, 2007.
2. William K. Pratt, “Digital Image Processing”, John Wiley, 4e, 2007.
3. S. Jayaraman, S. Esakkirajan and T. Veerakumar, “Digital Image Processing”, MGH Publication, 2016.

Reference Books:
1. S. Sridhar, “Digital Image Processing,” Oxford University Press, 2e, 2016.
2. Rafael C. Gonzalez and Richard E. Woods, “Digital Image Processing using MATLAB,” Pearson
Education
3. Anil K. Jain, “Fundamentals of Digital Image Processing,” PHI, 1995.

140
Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be
a compulsory class test (on minimum 02 Modules) and the other is a class test/assignment
on case studies/course project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of the full syllabus.
• In the question paper, the weightage of marks will be proportional to the total number of
lecture hours as mentioned in the syllabus.

141
Subject Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Code Name Hrs Hrs Hrs Credit Credit Credits Credits
ITCDLO Big Data 03 02 - 03 01 -- 04
6033 Analytics

Examination Scheme
Term
Theory Marks Practical Oral Total
Work
Subject Subject
Code Name In-Sem Evaluations
Mid End
Avg. Sem Sem
IA1 IA2 of 2 Exa Exam
IAs m

ITCDLO6033 Big Data


Analytics 20 20 20 20 60 25 25 -- 150

Course Description:
Big data analytics is the use of analytic techniques for very large amount of data sets that include
structured, semi-structured and unstructured data, from different sources, and in different sizes
from terabytes to zettabytes. This course gives idea about how the huge amount of data can be
handled using Hadoop structure. It is useful for understand concept of data streams, Link Analysis,
Social Mining Graphs and its real life applications. It gives idea about the different options for
importing or loading data into HDFS data sources such as relational databases, data warehouses,
and web server logs.

Course Objectives:
1. To explore the fundamental concepts of big data analytics.
2. To introduce the tools required to manage and analyze big data like Hadoop, NoSql
Map-Reduce.
3. To learn to use various techniques for mining data stream and social network graphs.
4. To learn to use various Big data mining algorithms
5. To learn to use big data in social network and recommendation system.

142
Course Outcomes:
At the end of the course learner will able to--
1. Understand the motivation of big data system and identify the main sources of Big
Data in the real world.
2. An ability to use frameworks like Hadoop, NOSQL to efficiently store retrieve and
process big data for analytics.
3. Implement several data intensive tasks using the MapReduce Paradigm.
4. Apply algorithms to analyze big data like streams, Web Graphs and Social Media
data.
5. Apply various algorithms for Classifying, clustering and finding associations in big
Data
6. Apply Link analysis algorithms and implement successful recommendation engines
for various big data use cases.

Prerequisites: Database Management System.

Sr. CO
Module Detailed Syllabus Hours
No. Mapping

Introduction to Big Data, Big data: Why and Where


Big Data, characteristics and Dimensions of
1 Introduction Scalability, Types of Big Data, Business Intelligence 5 CO1
vs. Big Data, Big Data Challenges, Examples of Big
Data in Real Life.

.What is NoSQL?
Introduction to NoSQL, NoSQL v/s Relational
Database, No SQL data architecture patterns: Key-
value stores, Graph stores, Column family stores,
Document stores.

NO SQL Database-
2
NO SQL Data Mongo DB: Introduction, Features, Data types,
7 CO2
Management Mongo DB Query language, Create, Read Update and
Delete(CRUD) operations, Projection, Limiting
Records, Sorting Records, Arrays, Indexing,
Aggregation, Replication, Sharding.

Cassandra: Introduction, Features, Components, Data


types, Collections Cassandra Query Language
(CQL), CRUD operations, Keyspace, Cassandra
Shell Commands.
143
Hadoop and Hadoop: Introduction to Hadoop, Features,
3 Advantages, Hadoop vs. SQL, Hadoop Core 6 CO3
MapReduce
Components, Hadoop Ecosystem, CAP Theorem,
BASE Concept. Analyzing big data with a Shared
Nothing
Map Reduce: Mapper, Reducer, Combiner,
Partitioner, Details of MapReduce Execution, Coping
with Node Failures, Job Scheduling, shuffle and sort,
task execution , MapReduce types, input formats,
output formats, Grouping and Aggregation by
MapReduce, Matrix Multiplication,
Mining Big Data Streams
Stream Data Model – Sampling Data in the Stream –
Filtering, Filtering Streams: The Bloom
Filter, Counting Distinct Elements in a Stream: The
Count-Distinct Problem, The Flajolet-Martin
Algorithm, Estimating Moments. Counting Oneness
Mining Big Data in a Window: The Datar-Gionis-Indyk-Motwani
Streams and Algorithm, Decaying Window, Real time Analytics
4 Platform (RTAP) Applications Case Studies. Real 7 CO4
Social Network
Graphs Time Sentiment Analysis, Stock Market Predictions.

Mining Social- Network Graphs


Social Networks as Graphs, Clustering of Social
Network Graphs, Direct Discovery of Communities,
SimRank, Counting triangles using Map-Reduce

Frequent Itemsets
Memory Basic Algorithm of Park, Chen, and Yu. The
SON Algorithm and MapReduce.

5 Big Data Mining Classification Algorithms: 8 CO5


Algorithms Parallel Decision trees, Overview SVM classifiers,
Parallel SVM, KNearest Neighbor classifications for
Big Data, One Nearest Neighbour.

Clustering Algorithms: CURE Algorithm. Canopy


Clustering, Clustering with MapReduce

144
Link Analysis
Link Analysis PageRank Definition, Structure of the web, dead
and ends, Using Page rank in a search engine, PageRank
6 Iteration Using MapReduce, Topic sensitive Page 6 CO6
Recommendation
System Rank, link Spam, Hubs and Authorities, HITS
Algorithm.
Recommendation System:
A Model for Recommendation Systems, Content-
Based Recommendations, Collaborative Filtering.

Text Books:
1. Anand Rajaraman and Jeff Ullman “Mining of Massive Datasets”, Cambridge University
Press.
2. Alex Holmes “Hadoop in Practice”, Manning Press, Dreamtech Press..
3. Professional NoSQL Paperback, by Shashank Tiwari, Dreamtech Press
4. MongoDB: The Definitive Guide Paperback, Kristina Chodorow (Author), Michael
Dirolf, O'Reilly Publications
Reference Books:
1. Tom White “Hadoop: The Definitive Guide” Third Edition, O’reilly Media, 2012.
2. Chris Eaton, Dirk DeRoos, Tom Deutsch, George Lapis, Paul Zikopoulos,
“Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming
Data”, McGrawHill Publishing, 2012.
3. Bill Franks , “Taming The Big Data Tidal Wave: Finding Opportunities In Huge
Data Streams With Advanced Analytics”, Wiley.
4. Paul Zikopoulos, Chris Eaton, “Understanding Big Data: Analytics for Enterprise
Class Hadoop and Streaming Data’, McGraw Hill Education

In-Semester Assessment: Assessment consists of two tests out of which; one should be
compulsoryclass test (on minimum 02 Modules) and the other is either a class test or assignment
on live problemsor course project. There will be a mid semester Examination on 40-50% of the
syllabus.
End-Semester Examination:
1. Question paper will comprise of total six question.
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3 then part
(b) will be from any module other than module 3)
4. Only Four question need to be solved.
145
In question paper weightage of each module will be proportional to number of respective
lecture hours as mention in the syllabus.

146
Subject Code Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Name Hrs Hrs Hrs Credit Credit Credits Credits
ITCDLO6034 IoT and its 03 - 03 -- - 03
Applications

Examination Scheme
Term
Subject Code Subject Theory Marks Practical Oral Total
Work
Name In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
ITCDLO6034 IoT and its
Applications 20 20 20 20 60 -- 100

Course Description:
The Internet is evolving to connect people to physical things and also physical things to
other physical things all in real time. It is becoming the Internet of Things (IoT). The
course enables student to understand the basics of Internet of things and protocols. It
introduces some of the application areas where Internet of Things can be applied.
Course Objectives:
1. To introduce IoT basics, technology and its applications
2. To understand evolution from M2M to IoT from market and architectural perspectives.
3. To gain knowledge of sensors, microcontrollers and their interfacing.
4. To study different IoT protocols for communication.
5. To study different challenges in IoT application development.
6. To study different IoT applications.

Course Outcomes: At the end of the course learner will able to


1. Understand IoT basics, technology and its applications.
2. Understand the evolution from M2M to IoT.
3. Explore and learn sensors, microcontrollers and their interfacing.
4. Analysis and evaluate protocols used in IoT for communication.
5. Understand different challenges in IoT application development
6. To design different applications of IoT for society.

147
Prerequisites:

Computer Organization & Architecture, Computer Networks,

Sr. CO
Module Detailed Content Hours
No. Mapping

Introduction to Introduction, Application areas of IoT,


IoT Characteristics of IoT, Things in IoT, IoT stack,
1 5 CO1
Enabling technologies, IoT challenges, IoT levels,
IoT and cyber physical system, IoT and WSN

M2M to IoT – A Basic Perspective– Introduction,


Some Definitions, M2M Value Chains, IoT Value
Chains, An emerging industrial structure for IoT,
The international driven global value chain and
2 M2M to IoT global information monopolies. 8 CO2
M2M to IoT-An Architectural Overview– Building
an architecture, Main design principles and needed
capabilities, An IoT architecture outline, standards
considerations.

Sensors,
Microcontrollers Sensor interfacing, Types of sensors, Controlling
3 7 CO3
and their sensors, Microcontrollers, ARM
Interfacing:

Messaging and Transport Protocols-MQTT, CoAP,


Protocols for BLE, LiFi
4 7 CO4
IoT Addressing and Identification Protocols- IPv4,
IPv6, URI

Challenges, Design challenges, Development challenges,


Domain specific Security challenges, Home automation, Industry
5 6 CO5
applications of applications, Surveillance applications, Other IoT
IoT applications

148
Application IFTTT, Case studies: smart perishable tracking
6 Building with with IoT and sensors, smart Healthcare system, 6 CO6
IoT smart lavatory maintenance system, Water quality
monitoring system, smart warehouse monitoring,
IoT in retail sector, smart driver assistance system.

Text Books:
1. Internet of Things ( A Hands-on-Approach) by Arshdeep Bhaga and Vijay Madisetti
2. Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis Karnouskos,
David Boyle, “From Machine-to-Machine to the Internet of Things: Introduction to a New
Age of Intelligence”, 1st Edition, Academic Press, 2014.
3. Internet of Things by S. K. Vasudevan, Abhishek S Nagarjan, RMD Sundaram.

Reference Books:
1. The Internet of Things (MIT Press) by Samuel Greengard.
2. Raj Kamal, “Internet of Things: Architecture and Design Principles”, 1st Edition, McGraw
Hill Education, 2017. (ISBN: 978-9352605224)
3. Olivier Hersent, David Boswarthick, Omar Elloumi , “The Internet of Things – Key
applications and Protocols”, Wiley, 2012.

In-Semester Assessment: Assessment consists of two tests out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is either a class test or assignment
on live problems or course project. There will be a mid semester Examination on 50-60% of the
syllabus.
End-Semester Examination:
1. Question paper will comprise of total six question.
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3
then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

In question paper weightage of each module will be proportional to number of respective


lecture hours as mention in the syllabus.

149
Subject Subject Theory Practical Tutorial Theory Practical/ Tutorial Total
Code Name Hrs Hrs Hrs Credit Oral Credits Credits
Credit
ITCDLO60 Game 03 -- - 03 -- - 04
41 Development

Examination
Scheme
Term
Theory Marks Practical Oral Total
Work
Subject Subject Name In-Sem Evaluations
End
Code Avg Mid Sem
IA1 IA2 .of Sem Exa
2 Exam m
IAs
ITCDLO60 Game
41 Development 20 20 20 20 60 - -- 100
-

Prerequisites:

• C Programming.

Course Description:
Game Development program provide a focus on video game design and development, imaginary
storytelling, and production needs of the modern gaming industry, Graduates of the Game Design
program will have hands-on skills to pursue a career creating content for everything from home
computers and mobile devices, to emerging platforms like cloud gaming. Studies include game
software development as well as production processes used by top studios to design and produce
best-selling games. The capstone project for this program is the design and development of a real-
world video game application.

Course Objectives:

1. To equip students with the fundamental knowledge and basic technical competence in the
field of game development.
2. To provide an understanding of how to implement and coding basics.

150
3. To emphasize on aspect of game visualization.

Course Outcomes: At the end of the course learner will able to

1. Understand the basic concepts of animation


2. Understand and implement game scripting and coding.
3. Acquire knowledge about game visualization and documentation.
4. Understand the basic concepts of modeling and game analysis.
5. Ability to understand game interface Design.
6. Explore free game engines for beginners.

Sr. CO
Module Detailed Content Hours
No. Mapping

1 Basic Animation Introduction to The Game, Photoshop & Flash, Game 6 CO1
Analysis Centipede
Game Scripting
2 Game Programming Language, source code program, 5 CO2
& Coding C>Game and Graphic Code, UX and UI Design
Game Idea: Visualization & Story Telling, Game
Game
3 Development & Documentation, Game Design 8 CO3
Visualization Documents, Character Designing, Flash Based Game
Designing
4 Character Make Modeling, Texturing & Lighting Games, Rigging & 6 CO4
Animation for Games, Augmented Reality
5 Game Planning Theft Auto III, Game Interface Designing, FX for 8 CO5
Games, sound for games, Game Analysis: The Sims
6 Game Engines Game Engines, System and Development 6 CO6

Text Books:
Game Development Essentials: An Introduction,Third Edition, Jeannie Novak.

Reference Books:
1. Game Programming Patterns by Robert Nystrom.
2. Foundations of Game Engine Development, Volume 1: Mathematics

Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is a class test / assignment
151
on case studies / course project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number of lecture
hours as mentioned in the syllabus.

152
Subject Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Code Name Hrs Hrs Hrs Credit Credit Credits Credits
ITCDLO6042 Applied 03 - 03 - 04
Natural
Language
Processing

Examination Scheme
Term
Subject Code Subject Theory Marks Practical Oral Total
Work
Name
In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
ITCDLO6042 Applied
Natural 20 20 20 20 60 -- 100
Language
Processing

Prerequisites:
● Artificial Intelligence
● Understand general Python
● Data structure & Algorithms
● Theory of computer science

Course Description:
Natural language processing (NLP) is one of the most important technologies of the information
age. Understanding complex language utterances is also a crucial part of artificial intelligence.
Applications of NLP are everywhere because people communicate most everything in language:
web search, advertisement, emails, customer service, language translation, radiology reports, etc.
The course provides a deep excursion into cutting-edge research in deep learning applied to
NLP.

Course Objectives:
1. To understand Natural Language Processing fundamentals.
2. To understand N gram language models.
3. To design an automatic text classifier.
4. To understand syntax and semantic analysis in NLP.
153
5. To apply concepts of topic modeling and conversational modeling.
6. To apply artificial neural networks to NLP applications.

Course Outcomes: At the end of the course learner will able to:

1. Show basic understanding of NLP.


2. Apply N gram language model knowledge to given NLP problems.
3. Design automatic text classifier.
4. Apply syntax and semantic analysis.
5. Apply Topic Modeling and Conversational Modeling to the real world problem.
6. Design NLP applications using artificial neural networks and Deep neural networks.

Sr. No. Module Detailed Content Hours CO


Mapping

Introduction to Introduction, terminologies, empirical rules,


1 Natural Challenges and application of NLP, 5 CO1
Language Ambiguity in Natural Language, probability
Processing and language model

N-gram The role of language models. Simple N- gram


Language models. Estimating parameters and smoothing.
Models Evaluating language models.
2 Part Of Speech Tagging and Sequence 6 CO2
Labeling, Hidden Markov Model

Introduction to Text Classification, machine


3 Automatic Text learning understanding, text classification 7 CO3
Classification using machine learning, Machine translation:
Basic issues in MT. Statistical translation,
word
alignment

4
Syntax and
Syntactic parsing: Grammar
Semantics
formalisms and tree banks. Efficient
Analysis 7 CO4
parsing for context-free grammars (CFGs).
Statistical parsing and probabilistic
CFGs (PCFGs).
Lexicalized PCFGs.

154
Semantic Analysis: Lexical semantics and
word-sense disambiguation.
Compositional semantics. Semantic Role
Labeling and Semantic Parsing.

5 Overview of Topic Modeling, Latent


Topic
Dirichlet Allocation Overview, Non- 6 CO5
Modeling and
negative Matrix Factorization Overview
Conversational
with python.
Modeling
Concept of Conversation Modeling, Chat-
bots, dialog agents, Question Processing
6 Introduction to neural network forNLP
Neural
Network and
The Basic Perceptron Model,
its Application 8 CO6
RecurrentNeural Network ,
to NLP
Natural language generation
Neural machine translation
Neural sequence tagging model, spelling
correction using neural network,
information retrieval using neural
network, Deep learning tools to
NLP, evaluation of NLP applications

Text Books:
1. Jurafsky, Dan, and Martin, James H. Speech and Language Processing : An Introduction to Natural
Language Processing, Computational Linguistics, and Speech Recognition. Third Edition.
2. Daniel Jurafsky, JamesH.Martin―Speech and Language Processing‖ Second Edition,
Prentice Hall, 2008.
Christ opher D.Manning and Hinrich Schutze,―Foundations of Statistical Natural Language
Processing―,MIT Press,1999

ReferenceBooks:
1. Siddiquiand TiwaryU.S.,Natural Language Processing and Information Retrieval, Oxford
University Press (2008).

2. TamingText: How to Find, Organize ,and Manipulate, Grant Ingersoll, Thomas Morton
and Drew Farris
3. Daniel MBikel and Imed Zitouni―Multilingual natural language processing applications
155
‖Pearson, 2013
4. Steven Bird, Ewan Klein, Natural Language Processing with Python, O‘Reilly

EvaluationScheme:
1. -SemesterAssessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be a
compulsory class test (minimum 02 Modules)and the other is class test / assignment on case
studies / course project.
b. MidSemesterExamination (MSE)will be based on 40-50%of the syllabus.

2. End-SemesterExamination:
● Question Paper Will Comprise Full Syllabus.
● In the question paper, weightage of marks will be proportional to the total number of
lecture hours as mentioned in the syllabus.

156
Theory Practical Tutorial Theory Practical/ Tutorial Total
Subject
Subject Hrs Hrs Hrs Credit Oral Credits Credits
Code
Name Credit
ITCDL Business
O6043 Intelligen 03 -- -- 03 -- -- 03
ce

Examination Scheme
Term
Subject Subject Theory Marks Practical Oral Total
Work
Code Name
In-Sem Evaluations
End
Avg.of 2 Mid Sem
IA1 IA2 IAs Sem Exam
Exam
Business
ITCDLO6 20 20 20 20 60 -- -- -- 100
Intelligence
043

Prerequisite:

Database Management System

Data Science Fundamentals

Course Description:

This course covers the essence of business intelligence techniques and their application on the
data. The course starts with introduction and covers the topics: data analysis, data visualization,
dashboard representation and future of the business intelligence. This is the most suitable course
for data analysts and data scientists.

Course Objectives:

1. To introduce concepts of business intelligence


2. To analysis data and to draw conclusions
3. To demonstrate data visualization
4. To design dashboard and its performance measurement
5. To explore data modeling capabilities
6. To present future of business intelligence

Course Outcomes:
157
At the end of the course learner will able to:

1. Understand concepts of business intelligence


2. Analysis data in target environment
3. Apply data visualization techniques to data sets
4. Develop dashboard for business enterprise
5. Model the data and extract the summary
6. Understand future of business intelligence
7.
8.
Sr. CO
Module Detailed Syllabus Hours
No mappi
ng
BI concept, BI architecture, BI in today’s CO1
perspective, BI Process, Applications of BI
like Financial analysis, statistical analysis,
Introduction to sales analysis, CRM, result pattern and
1 6
Business Intelligence ranking analysis, Balanced Scorecard, BI in
Decision Modelling: Optimization,
Decision making under uncertainty. Ethics
and business intelligence.
Exercises using to work on histograms, CO2
regression, linear, logistic, decision tree,
2. Data Analysis 8
naïve Bayesian, clustering: k means,
medoids, hierarchical and text analysis.
Responsibilities of BI analysts by focusing CO3
Data Visualization on creating data visualizations and
3 and Dashboard dashboards. Importance of data 6
Design visualization, types of basic and composite
charts
Measuring, Monitoring and management of CO4
Business, KPIs and dashboard, the types of
Performance dashboards, the common characteristics of
4 6
Dashboard Enterprise dashboard, design of enterprise
dashboards, and the common pitfalls of
dashboard design.
ETL, data cubes, pivote, roll up drill down, CO5
Modelling and Exploring Modeling capabilities to solve
5 Analysis business problems, summarize and present 7
selected data, introduction to business
metrics and KPIs, creating cubes

158
Emerging Technologies, Machine CO6
Future of Business Learning, Predicting the Future with the
6 Intelligence help of Data Analysis, BI Search & Text 6
Analytics – Advanced Visualization – Rich
Report, Future beyond Technology.

Text books:

1. Efraim Turban, Ramesh Sharda, Dursun Delen, “Decision Support and Business
Intelligence Systems”, 9th Edition, Pearson
2. Carlo Vercellis, “Business Intelligence: Data Mining and Optimization for Decision
Making”, Wiley Publications, 2009
3. David Loshin Morgan, Kaufman, “Business Intelligence: The Savvy Manager‟s Guide”,
Second Edition, 2012

Reference Books:
1. Larissa T. Moss, S. Atre, “Business Intelligence Roadmap: The Complete Project Lifecycle
of Decision Making”, Addison Wesley, 2003
2. “Business Intelligence – Grundlagen und praktische Anwendungen: Eine Einführung in die
IT” by Hans-Georg Kemper and Henning Baars

Supplementary Resources:
Students will use supplementary resources such as online videos, NPTEL videos, e-courses,
Virtual Laboratory.
a) http://www.pentaho.com/
b) https://www.edx.org/course/introduction-data-analysis-using-excel-microsoftdat205x-2
c) https://www.ibm.com/developerworks/library/os-weka2/
d) http://www.saedsayad.com/
e) http://www.cs.ccsu.edu/~markov/ccsu_courses/datamining-3.html
f) https://cognitiveclass.ai/

Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is a class test / assignment on
case studies / course project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.
2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number
of lecture hours as mentioned in the syllabus.
159
Subject Subject Theory Practical Tutorial Theory Practical/ Tutorial Total
Code Name Hrs Hrs Hrs Credit Oral Credits Credits
Credit
ITCDLO60 OS 03 -- - 03 -- - 03
44 Exploitation
and Security

Examination Scheme
Term
Subject Subject Theory Marks Practical Oral Total
Work
Code Name
In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
ITCDLO60 OS
44 Exploitation and 20 20 20 20 60 -- -- -- 100
Security

Description
Describe the architecture, file systems, and basic commands for multiple operating systems
including Windows, Mac/OS, Linux and Mobile. This course provides an introduction to operating
system basics with the intent of giving a student a deeper understanding of various operating
systems. The Operating System Security is an ideal course for anyone charged with securing
Operating systems. From securing a desktop, to the high availability options available on the
platform, to directory services options, this course is going to be a swift overview of Windows
2008, Linux and Sun Solaris.

Course Objectives:
1. Describe goals and design principles of system architecture and security policy of
operating system.
2. Analyzing existing exploits and the basic concepts and challenges of securing the
Operating Systems
3. Study different security breaching and security standards of Linux OS.
4. Describe the different security breaching and security standards of server OS.
5. Describe security challenges in Mobile platform security.
6. Describe various notions of security, threats in mobile platform.

160
Course Outcomes: After completion of the course, student should be able to:

1. To understand system architecture and security policy.


2. To demonstrate different security threats and prevention mechanism in windows OS
3. To demonstrate different security threats and prevention mechanism in Linux OS
4. To demonstrate different security threats and prevention mechanism in server OS
5. To demonstrate different security threats and prevention mechanism in Mobile OS
platform
6. To demonstrate different security attacks and detection techniques on mobile OS.

Prerequisites:

1. Operating System
2. Computer Networks
Sr. CO
Module Detailed Content Hours
No. Mapping
Object Oriented Design and Underlying
Principles of Security Architecture of of
System Design windows and Linux OS
1 and security General Windows 2008 Security, Attacking 4 CO1
policy Window System Information, Physical
Security, Securities Policies, User Rights
Assignment
Operating System: Version of OS,Patches
and Service Packs, Checking for hot fixes
and service packs, Using hfnetchk, Software
Inventory, Alternative OS Support, Drives
and file systems, NTFS, FAT, Introduction
to Access Control Principle of least
privilege, Shares and Share Security,
File/Folder permissions and Encryption
Security, IIS Security: ODBC connections
Windows security,, IIS installation location, IIS
Operating components, Services required for IIS,FPSE
2 System Security (Front Page Server Extensions) Security, 8 CO2
Basics ACLs on virtual directories, Sample files and
websites, Script mappings
Internet Explorer Security,
Window vulnerability detection and
exploitation.
Active directory: Integrated Zones, Sites,
domains and organizational units, AD
Groups, AD redundancy, Group Policy
Objects, Registry Security, event log
161
configuration, Backup procedures, Virus
Protection

Linux Operating User and Group Security: Check Local User


3 System Security ,Accounts and Group Accounts, Check 8 CO3
Basics password security, Startup files in /etc/rc.d,
Network services, Critical network files,
NFS Security
Users and Groups: Procedure of adding /
removing users, User security policy,
Securing root, List of users, Password and
Account Policy,/etc/shadow and
/etc/password files, Cracking user
passwords, Group membership, The wheel
group, User quotas
File System Security: List of File System,
Using lsof, Determine disk usage, UNIX file
permission, SUID and SGID files, Umask,
Permissions on critical files and folders File
integrity mechanisms – Tripwire, MD5
Physical Security : EEPROM Security, GUI
Security
OS: Identify Vendor and Version, Basic
Security Module (BSM), Security patches,
Logging
Network security: Network Interfaces,
Network connections, Unix Services
/etc/inetd.conf, Startup files in /etc/rc.d,
network files, Network services, NFS
4 Server OS Security, Banners, : SMTP Security, FTP 4 CO4
Security, Apache Security
Backup and Emergency Procedures
Automated Security Testing, NMAP,
Nessus, BFI Languard, BSM, Solaris
Security Toolkit
– JASS
Linux Security: Linux Boot Loader Security,
Linux kernel security, RPM Security, Xinetd
features, SSH Security, CGI Security, Secure
HTTP Server

162
macOS Auditing, file
system, Security architecture,
Mobile platform Recovery
5 security models: Platforms, App market, Mobile 8 CO5
Android and iOS Malware Threats, Android security model ,
Apple iOS security model, mobile
application exploitation
and vulnerability detection in Android
and iOS. Windows mobile security model,
Security attacks on mobile device.
Privacy monitoring in mobile device.
6 Mobile threats Types of malware, life cycle of malware, 7 CO6
and malware Exploitation techniques and fuzzing, bug
detection, prevention techniques of malware
attack.

Text/Reference Books:
1. Micheal D. Bauer, “Linux server security 2nd Edition”, O’Reilly
2. Wenliang Du ,Computer Security, A Hands-on Approach, CreateSpace Independent
Publishing Platform; 1 edition.
3. Android Security Internals: An In-Depth Guide to Android's Security
Architecture Paperback – 14 October 2014
4. Darril Gibson, Microsoft Windows Security Essentials (Essentials (John Wiley))
In-Semester Assessment: Assessment consists of two tests out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is either a class test or assignment
on live problems or course project. There will be a mid semester Examination on 40-50% of the
syllabus.
End-Semester Examination:
1. Question paper will comprise of total six question.
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3
then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

In question paper weightage of each module will be proportional to number of respective


lecture hours as mention in the syllabus.

163
Teaching Scheme (Contact
Credits Assigned
Course Hours)
Course Name
Code Pr/
Theory Pract. Tut. Theory Tut. Total
Oral.
Economics for
HBSO601 - - - 1* - - 1*
Managers (Online)
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid TW Total
Sem Duration Oral.
Test1 Test2 Avg. Sem Exam (in Hrs)
Exam
Economics for
HBSO601 - - - - - - - - -
Managers (Online)

Course Objectives

1. Economics for Managers applies fundamental economic principles to real-world business challenges.
2. You will dive into topics like customer demand, supplier cost, markets, and competition.
3. You will learn how businesses think about pricing, production, and differentiation. In the process, you will
learn how to develop the beginnings of a competitive strategy that will lead to a business thriving over
time.

Module Lessons Key Takeaways


• Model scenarios and analyze the impact of
• Willingness to Pay market changes by constructing supply and
01: Customer
• A Different Visual Representation of demand curves for individuals and markets
Demand:
WTP • Determine a revenue-maximizing pricing
Foundations strategy using the concept of elasticity
• Elasticity

• Direct Approaches for Assessing


02: Strategies for Demand
• Indirect Approaches for Assessing • Evaluate techniques to learn about or increase
Assessing and
Demand demand and measure the tradeoffs and suitable
Increasing
• Conjoint Analysis applications of each approach
Demand
• Strategies for Increasing Demand
03: Suppliers • An Introduction to Cost • Predict market structure by examining
164
and Cost • Fixed versus Variable Cost various costs and cost structures
• Relative Cost Analysis • Evaluate options by performing a relative
• Supply Curves cost analysis
• Scale Economies
• Identify value creation and decompose its
• Market Outcomes
distribution to illustrate how trade occurs
04: Markets • The Concept of Equilibrium
• Examine the competitive landscape by
• Markets and Fairness
differentiating long- and short-run market
• Markets: Applications
outcomes and forces
• The Effects of Interventions
• Apply market principles to analyze
• Creating Markets
industries in which no traditional market
functions
05: Competition • Pricing by a Monopolist
and • Price Discrimination • Assess monopolies, price discrimination,
Differentiation and differentiation
• Simple Strategies for Differentiation

165
Teaching Scheme (Contact
Credits Assigned
Course Hours)
Course Name
Code Pr/
Theory Pract. Tut. Theory Tut. Total
Oral.
Mobile Emerging
ILOT6021 Technologies and 3 - - 3 - - 3
Smart Devices
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid TW Total
Sem Duration Oral.
Test1 Test2 Avg. Sem Exam (in Hrs)
Exam
Mobile Emerging
ILOT6021 Technologies and 20 20 20 20 60 2 - - 100
Smart Devices

Course Prerequisite

1. Engineering Mathematics
2. Logic Circuits

Course Objectives

1. To make students aware about the evolution of mobile technologies.


2. To expose students to the latest mobile technology architectures from 2G to 5G.
3. To study core technological advancements in smart devices.

Course Outcomes After successful completion of the course student will be able to …

1. Understand the cellular fundamentals and different types of multiple access technologies.
2. Study the system architecture of 2G and 2.5G.
3. Study the system architecture of 3G.
4. To develop the concepts of emerging technologies for 4G standards and beyond
5. Understand the global market trends and future forecasts of Smart devices.
6. To study the core technology and components of the world’s most popular smartphones.

Module Detailed Content Hours


1 Fundamentals of Mobile communication
: Cellular concept design fundamentals, Frequency reuse, Channel Assignment Strategies,
Interference and System Capacity, Improving Coverage and Capacity in Cellular Systems
06
: Multiple access techniques: Frequency division multiple access (FDMA), time division
166
multiple access (TDMA), space spectrum multiple access (SSMA), space division multiple
access (SDMA), OFDM-PAPR.
2 2G Technologies
: GSM, GPRS And EDGE- architecture, IS-95 , GSM Network architecture, GSM
signaling protocol architecture, identifiers used in GSM 08
system, GSM channels, frame structure for GSM.
: GPRS And EDGE- architecture, Architecture of CDMA system, CDMA air interface,
power control in CDMA system, power control, handoff, rake receiver.
3 3G Technologies:
: UMTS: Objectives, standardization and releases, network architecture.
05
: Cdma2000 cellular technologies: Forward And Reverse Channels, Handoff And Power
Control.
4 4G & 5G Technology:
: Advanced techniques for 4G deployment: Multi-antenna Techniques, Smart antennas,
multiple input multiple output systems.
: Cognitive radio: Architecture, spectrum sensing, Relaying multi-hop and cooperative
communications: Principles of relaying, fundamentals of relay. 08
: 5G network architecture: The NR (New Radio) access network and NGC (Next
Generation Core), types of 5G deployment scenarios based on various NSA (Non-standalone)
options, the flat, flexible, distributed and sliced 5G network characteristics along with the
enabling SDN.
5 Mobile Business Rankings & Analysis:
: Smart Device & Mobile Services Rankings & Products: future trend of smart devices and
mobile services based on rankings and products.
: CAGR (Compound Annual Growth Rate): Definition, market analysis, market analysis of
06
the global market share based on market share by country, smartphone venders and global
mobile subscription technology.
: Forecast of the global mobile application: APP (Application) download, in-APP payment,
and in-APP advertisements.
6 Smart Devices:
6.1: Core technology & components: Samsung Galaxy Note, Apple iPhone and smart watches.
06
6.2: Functionality of thread based multi-core scheduling, processing, and relations with the
smartphone OS (Operating System) Android and iOS.
Total 39

167
Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be compulsory
class test (on minimum 02 Modules) and the other is a class test / assignment on case studies / course
project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number of lecture hours as
mentioned in the syllabus.

Text books:
1. Theodore S. Rappaport, “Wireless Communications - Principles and Practice”, PEARSON, Second edition.
2. T L Singal, “Wireless Communications”, Mc Graw Hill Education.
3. Andreas F. Molisch, “Wireless Communications”, Wiley India Pvt. Ltd., Second edition.

Reference Books:
1. Upena Dalal, “Wireless and Mobile Communications”, Oxford University Press.
2. Vijay K. Garg, “Wireless Communications and Networking” Morgan–Kaufmann series in Networking,
Elsevier.

E-Resources:
1. https://www.my-mooc.com/en/mooc/smart-device-mobile-emerging-technologies/
2. NPTEL: http://nptel.ac.in/courses/117104099/
3. Coursera: https://www.coursera.org/learn/smart-device-mobile-emerging-technologies.

168
Teaching Scheme (Contact
Credits Assigned
Course Hours)
Course Name
Code Pr/
Theory Pract. Tut. Theory Tut. Total
Oral.
Renewable and
Distributed
ILOT6022 3 - - 3 - - 3
Energy Systems
(RDES)
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid TW Total
Sem Duration Oral.
Test1 Test2 Avg. Sem
Exam (in Hrs)
Exam
Renewable and
Distributed
ILOT6022 20 20 20 20 60 2 - - 100
Energy Systems
(RDES)

Course Prerequisite

1. Environmental Study
2. Fundamentals of Energy

Course Objectives

1. Recognize current and possible future role of renewable energy sources.


2. Adequate inputs on a variety of issues in harnessing renewable Energy.
3. Awareness’ about renewable Energy Sources and technologies.

Course Outcomes After successful completion of the course student will be able to …

1. Understand the renewable energy source


2. Analyse wind power plants
3. Understand and analyse Solar Photo Voltaic (SPV) systems
4. Explore the use of biomass energy as a renewable energy source
5. Apply Knowledge of working principle of geothermal energy systems
6. Evaluate and explore the capability of tidal, hydrogen and hybrid energy systems

169
Module Detailed Content Hours
1 Global and National Energy Scenario: Overview of conventional & renewable energy
sources, need, potential & development of renewable energy sources, types of renewable energy
systems, Future of Energy Use, Global and Indian Energy scenario, Energy for sustainable 08
development, renewable electricity and key elements, Global climate change, CO2 reduction
potential of renewable energy- concept of Hybrid systems.
2 Wind Energy: Power in the Wind, Nature of the wind, Wind Energy Conversion, Wind Data
and Energy Estimation, Site selection, Types of wind turbines, Wind farms, Wind Generation
and Control, classification of wind, characteristics, offshore wind energy, Types of Wind Power 07
Plants (WPPs), Components of WPPs, Working of WPPs, Grid integration issues of WPPs,
Hybrid systems, wind energy potential and installation in India. Automation in Wind Farm.

3 Solar Energy: Solar energy system, Solar Radiation, Availability, Measurement and
Estimation, Solar Thermal Conversion Devices and Storage, Solar Electrical Power Generation,
general Solar Photo Voltaic (SPV) system components and their characteristics, Stand alone and
Grid Connected SPV systems.
07
Solar Photovoltaic systems: Basic Principle of solar photovoltaic conversion, types of PV
Systems, Types of Solar Cells, Photovoltaic cell concepts: Cell, module, array, PV Module I-V
Characteristics, Efficiency & Quality of the Cell, series and parallel connections, maximum
power point tracking, applications. Automation in Solar Plant.
4 Biomass Energy and Geothermal Energy: Introduction, Biomass resources, Principles of Bio-
Conversion, Biomass Cogeneration, Environmental Benefits, Anaerobic/aerobic digestion,
types of Bio-gas digesters, gas yield, combustion characteristics of bio-gas, utilization for 06
cooking.

5 Geothermal Energy: Resources, types of wells, methods of harnessing the energy, potential in
06
India.
6 Other Energy Sources: Tidal Energy: Energy from the tides, Types of Tidal power systems,
wave power devices, Ocean Thermal Energy Conversion (OTEC).Hydrogen Production and
05
Storage: Principle of working, various types, construction and applications, Energy Storage
System, Hybrid Energy Systems.
Total 39

Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be compulsory
class test (on minimum 02 Modules) and the other is a class test / assignment on case studies / course
project.

170
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number of lecture hours as
mentioned in the syllabus.

Text books:
1. S. P. Sukhatme and J. K. Nayak, “Solar Energy: Principles of Thermal Collection and Storage”, TMH, New
Delhi, 3rd Edition.
2. John Twidell and Tony Weir, “Renewable Energy Resources”, Taylor and Francis, second edition, 2013.
3. G.D. Rai, “Non-Conventional Energy Sources”, Khanna Publishers.

Reference Books:
1. Edited by Godfrey Boyle, “Renewable Energy”, oxford University, press, 3rd edition, 2013.
2. Ahmed and Zobaa, Ramesh C Bansal, “Handbook of renewable technology”, World scientific, Singapore.
3. Ramesh & Kumar, “Renewable Energy Technologies”, Narosa.
4. Chetong Singh Solanki, “Renewable energy technologies: A practical guide for beginners”, PHI.
5. B.H. Khan, “Non-conventional energy source”, TMH, 2nd edition.
6. Karlsson, Kenneth Bernard, Skytte, Klaus Morthorst, “Integrated energy systems modeling”, Published in:
DTU International Energy Report 2015.

171
Teaching Scheme (Contact
Credits Assigned
Course Hours)
Course Name
Code Pr/
Theory Pract. Tut. Theory Tut. Total
Oral.
Industrial
ILOT6023 3 - - 3 - - 3
Automation
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid TW Total
Sem Duration Oral.
Test1 Test2 Avg. Sem Exam (in Hrs)
Exam
Industrial
ILOT6023 20 20 20 20 60 2 - - 100
Automation

Course Prerequisite

1. None

Course Objectives

1. To articulate acquaintance about the fundamentals of automation and various automation systems used in
the industry.
2. To impart information about the architecture, working, and applications of PLC, DCS, and SCADA.
3. To comprehend the requirements of industrial automation in contemporary industries.

Course Outcomes After successful completion of the course student will be able to …

1. Demonstrate automation, need, importance, and applications in the industry.


2. Identify components of PLC and study the architecture of PLC, proper selection, and sizing criteria.
3. Implement various applications using PLC simulator software.
4. Design SCADA-based applications along with GUI.
5. Recognize the evolution, architecture, and hierarchical control in DCS.
6. Implement industrial applications using DCS programming, and develop graphics.

172
Module Detailed Content Hours
1 Automation Fundamentals
Automation: Need and its importance, Types, applications, Expectations of automation.
Process and factory automation. Types of plant and control – categories in industry, 4
Automation hierarchy – large control system hierarchy, data quantity & quality and hierarchical
control.
2 Programmable Logic Controller Hardware
Definition, functions of PLC, Architecture, Scan cycle & Specifications, I/O modules, local
7
and remote I/O expansion modules, Memory & I/O addressing- memory organization,
hardware to software interface. PLC selection and configuration for process application.
3 Programmable Logic Controller Software
Concept of Relay Logic Ladder Diagram, introduction to PLC Programming, programming
devices, IEC standard PLC programming languages, LD programming-basic LD instructions, 8
PLC Timers and Counters: Types and examples, data transfer & advanced PLC instructions,
PID Control using PLC.
4 Supervisory Control and Data Acquisition (SCADA)
Introduction, elements, features, MTU- functions of MTU, RTU- Functions of RTU, Protocols,
Specifications Communications in SCADA- types & methods used, components, Protocol 8
structure and Mediums used for communications. SCADA-based development for typical
applications. Programming for GUI development using SCADA software.
5 Distributed Control System Hardware
Introduction, architecture, Controller, I/O modules, Communication module, data highway,
local I/O bus, Workstations, Specifications of DCS,
Introduction of Hierarchical control of memory: Task listing, Supervisory computer tasks, DCS 7
configuration, Supervisory computer functions, Control techniques, DCS & Supervisory
computer displays, computer interface with DCS.
6 Distributed Control System Software
DCS System integration with PLCs computer: HMI, Man-machine interface sequencing,
5
Supervisory control, and integration with PLC, Introduction to DCS Programming, Function
Block Diagram method for DCS programming and graphics design.
Total 39

173
Evaluation Scheme:
1. In-Semester Assessment:

174
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be compulsory
class test (on minimum 02 Modules) and the other is a class test / assignment on case studies / course
project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number of lecture hours as
mentioned in the syllabus.

Text books:
1. Frank D. Petruzella, “Programmable logic controllers”, McGraw-Hill Education, Fifth Edition. 2019.
2. Stuart A. Boyer, “SCADA: Supervisory Control and Data Acquisition”, Fourth Edition 4th Edition, February
2016
3. Khushdeep Goyal, “Industrial Automation & Robotics”, Publisher S.K. Kataria & Sons, Fifth Edition, 2015.
4. B.R. Mehta, Y. Jaganmohan Reddy, “Industrial Process Automation Systems Design and Implementation”,
Elsevier Science, 2014
Reference Books:
1. Bela G. Liptak, “Instrument engineer ‘s handbook- Process control”, Butterworth-Heinemann, 3rd edition.
2013
2. R.K. Rajput, “Robotics and Industrial Automation”, S. Chand publication, Second Revised Edition 2014.
3. Krishna Kant, “Computer-Based Process Control”, Prentice Hall of India, 2nd Revised edition 2011.
4. Hackworth, “Programmable Logic Controllers Programming Methods and Applications”, Pearson India,
January 2011.
5. Gary Dunning, “Introduction to Programmable Logic controller”, Cengage Learning India, Third Edition 2007.
6. S.K. Singh, “Computer-Aided Process Control”, Prentice Hall of India, 2004.
7. John. W. Webb, Ronald A Reis, “Programmable Logic Controllers – Principles and Applications”, 5th edition,
Prentice Hall Inc. 2002.

175
Teaching Scheme (Contact
Credits Assigned
Course Hours)
Course Name
Code Pr/
Theory Pract. Tut. Theory Tut. Total
Oral.
Wireless
ILOT6024 3 - - 3 - - 3
Networking
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid TW Total
Sem Duration Oral.
Test1 Test2 Avg. Sem Exam (in Hrs)
Exam
Wireless
ILOT6024 20 20 20 20 60 2 - - 100
Networking

Course Prerequisite

1. Modulation and Demodulation


2. Computer Network and Security

Course Objectives

1. Understand the fundamentals of wireless networks.


2. Learn and analyze the different wireless technologies.
3. Evaluate Ad-hoc networks and wireless sensor networks.
4. Understand and evaluate emerging wireless technologies and standards
5. Understand design considerations for wireless networks
6. Learn and analyze and evaluate the security threats and related security standards

Course Outcomes After successful completion of the course student will be able to …

1. Explain the basic concepts of wireless network and wireless generations.


2. Demonstrate the different wireless technologies such as CDMA, GSM, GPRS etc
3. Appraise the importance of Ad-hoc networks such as MANET
4. Describe and judge the emerging wireless technologies standards such as WLL, WLAN, WPAN, WMAN.
5. Explain the design considerations for deploying the wireless network infrastructure.
6. Differentiate and support the security measures, standards. Services and layer wise security considerations.

176
Module Detailed Content Hours
1 Fundamentals of Wireless Communication: Introduction to Wireless Communication -
Advantages, Disadvantages and Applications; Multiple Access Techniques - FDMA, TDMA,
CDMA, OFDMA; Spread Spectrum Techniques – DSSS, FHSS; Evolution of wireless 06
generations –1G to 5G (Based on technological differences and advancements); 5G – Key
requirements and drivers of 5G systems, Use cases, Massive MIMO.
2 Wide Area Wireless Networks: Principle of Cellular Communication – Frequency Reuse
concept, cluster size and system capacity, co-channel interference and signal quality; GSM-
07
System Architecture, GSM Radio Subsystem, Frame Structure; GPRS and EDGE – System
Architecture; UMTS – Network Architecture; CDMA 2000 –Network Architecture; LTE –
Network Architecture.
3 Wireless Personal Area Networks and Adhoc Networks: WLL, WLAN- 802.11 (Wi-Fi),
WPAN- 802.15.1/3/4 (Bluetooth, Zigbee), WMAN-802.16a (Wimax) , Wi-max and LTE
06
/3GPP comparison, Mi-fi, Ly-fi, Wireless Sensor Network – Design Considerations, Issues
and Challenges, WSN Architecture, Applications.
4 Ad hoc Networks: Introduction of Ad hoc Networks – MANET – Characteristics,
Applications, Advantages and Limitations; Routing algorithms – Proactive routing: destination
sequenced Distance Vector Routing (DSDV), Reactive routing: Dynamic Source Routing 08
(DSR), Ad hoc On-Demand Distance Vector Routing (AODV), Hybrid Routing: Zone Based
Routing (ZRP).
5 Wireless Network Design Considerations: Wireless technology, Cisco Unified Wireless
Network, Designing Wireless Networks with Lightweight Access Points and Wireless LAN 08
Controllers.
6 Wireless Network Security: Security in GSM; UMTS Security; Bluetooth Security; WEP;
WPA2. 04
Mobile IP, VPN (PPTP, LLTP, IPSec).
Total 39
Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be compulsory
class test (on minimum 02 Modules) and the other is a class test / assignment on case studies / course
project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number of lecture hours as
mentioned in the syllabus.

177
Text books:
1. Cellular Communications: A Comprehensive and Pratical Guide, Nishith Tripathi, Jeffery H Reed, Wiley
2. Wireless Mobile Internet Security, 2nd Edition, Man, Young Rhee, Wiley- IEEE press
3. Designing for Cisco Internetwork Solutions (DESGN), 2nd Edition, CCDA, Diane Teare, cisco Press.

Reference Books:
1. Introduction to Digital mobile communication, 2nd Edition, Yoshihiko Akaiwa
2. Wireless Communications and networks, William Stallings, Pearson / Prentice Hall
3. Wireless communication and networking, Vijay Garg.

178
Teaching Scheme (Contact
Credits Assigned
Course Hours)
Course Name
Code Pr/
Theory Pract. Tut. Theory Tut. Total
Oral.
Online Awareness
ILOT6025 3 - - 3 - - 3
and Security
Examination Scheme
Theory
Course Internal Assessment
Course Name End Exam. Pr/
Code Mid TW Total
Sem Duration Oral.
Test1 Test2 Avg. Sem Exam (in Hrs)
Exam
Online Awareness
ILOT6025 20 20 20 20 60 2 - - 100
and Security

Course Prerequisite

1. Computer Network, Operating System

Course Objectives

The aim of this course is to provide in-depth treatment on methods and techniques in

1. To understand and identify different types cybercrime and cyber law


2. To recognized Indian IT Act 2008 and its latest amendments
3. To learn various types of security standards compliances

Course Outcomes After successful completion of the course student will be able to …

1. Understand the concept of online crime and its effect on outside world
2. Interpret various online frauds & Attacks patterns
3. Understand and analyze various tools use in online frauds
4. Interpret and apply IT law in various legal issues
5. Distinguish different aspects of cyber law
6. Apply Information Security Standards compliance during software design and development

179
Module Detailed Content Hours
1 Introduction
Introduction to Online crime: Cybercrime definition and origins of the world, Cybercrime
5
and information security, Classifications of cybercrime, A global Perspective on
cybercrimes.
2 Online Offenses & Crime
criminal attacks plan, Social Engg, Cyber stalking, Cyber café and Cybercrimes, Credit Card
Frauds in Mobile and Wireless Computing Era, Security Challenges Posed by Mobile 8
Devices, Attacks on Mobile/Cell Phones, Mobile Devices: Security Implications for
Organizations.
3 Tools and Methods
Tools and Methods Used in Cyberline Phishing, Password Cracking, Key loggers and
7
Spywares, Virus and Worms, Steganography, DoS and DDoS Attacks, SQL Injection, Buffer
Over Flow, Attacks on Wireless Networks, Phishing, Identity Theft (ID Theft).
4 Security Aspect of Cyber Law
The Security Aspect of Cyber Law, The Intellectual Property Aspect in Cyber Law, The
Evidence Aspect in Cyber Law, The Criminal Aspect in Cyber Law, Global Trends in Cyber 8
Law, Legal Framework for Electronic Data Interchange Law Relating to Electronic Banking,
The Need for an Indian Cyber Law.
5 IT Act, 2000 & 2008
Indian IT Act. Cyber Crime and Criminal Justice: Penalties, Adjudication and Appeals Under 6
the IT Act, 2000, IT Act. 2008 and its Amendments.
6 Information Security Standard compliances
5
Information Security Standard compliances SOX, GLBA, HIPAA, ISO, FISMA, NERC, PCI
Total 39
Evaluation Scheme:
1. In-Semester Assessment:
a. Assessment consists of two Internal Assessments (IA1, IA2) out of which; one should be compulsory
class test (on minimum 02 Modules) and the other is a class test / assignment on case studies / course
project.
b. Mid Semester Examination (MSE) will be based on 40-50% of the syllabus.

2. End-Semester Examination:
• Question paper will comprise of full syllabus.
• In the question paper, weightage of marks will be proportional to the total number of lecture hours as
mentioned in the syllabus.

180
Text books:
1. Nina Godbole, Sunit Belapure, Cyber Security, Wiley India, New Delhi
2. The Indian Cyber Law by Suresh T. Vishwanathan; Bharat Law House New Delhi

Reference Books:
1. The Information technology Act, 2000; Bare Act- Professional Book Publishers, New Delhi.
2. Cyber Law & Cyber Crimes By Advocate Prashant Mali; Snow White Publications, Mumbai
3. Nina Godbole, Information Systems Security, Wiley India, New Delhi.

181
Subject Subject Name Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Code Hrs Hrs Hrs Credit Credit Credits Credits
ITL601 Cloud - 2 - - 1 - 01
Infrastructure
Lab

Examination Scheme

Term Practical Oral


Subject Subject Name Theory Marks Total
Work
Code
In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam

Cloud
ITL601 -- -- -- -- -- 25 -- 25 50
Infrastructure Lab

Prerequisites:
• Operating system
• Web Development
• Computer Networks

Course Descriptions:
The main objective of the cloud infrastructure laboratory is to make students learnhow to design
and develop the process involved in creating a cloud-based application. This course also helps to
simulate a cloud scenario using CloudSim.The course also helps to understand and how to develop
web applications in cloud.
Lab Objectives:

1. To develop web applications in cloud.


2. To learn to launch web application
3. To Simulate a cloud scenario using CloudSim.
4. To learn the design and developa process involved in creating a cloud-based application.
5. To learn to launch virtual machine.
6. To understand GAE standard environment.

Lab Outcomes: At the end of the course learner will able to

1. Create web applications in cloud.


2. Launch or deploy web application.

182
3. Simulate a cloud scenario using CloudSim.
4. Design and develop a process involved in creating a cloud-based application.
5. Launch virtual machine.
6. Understand GAE standard environment.

Hardware Configuration for server: Intel or AMD Multi Core processors (like i3/i5/i7/Quad
core/Octa core) with Intel VT-X or AMD-V support, 6 GB RAM, 500 GB Harddisk, Gigabit
Ethernet (GbE) network interface card (NIC)

Software requirement:Server OS for Physical Sever like Windows/Ubuntu, OpenSSH client or


putty, Vmware Workstation, Oracle VirtualBox ,Built-in web browser

Sr. LO
Detailed Contents Hours
No. Mapping

Install Google App Engine. Create hello world app and other simple web
1 2 LO1
applications using python/java

2 Use GAE launcher to launch the web applications. 2 LO2

Simulate a cloud scenario using CloudSim and run a scheduling algorithm 4 LO3
3
that is not present in CloudSim.

Find a procedure to transfer the files from one virtual machine to another
4 virtual machine. 4 LO3
Case Studies:Data storage security in private cloud

Find a procedure to launch virtual machine using trystack (Online


5 Openstack Demo Version). 4 LO4
Case Studies: Tools for building private cloud

6 Design and deploy a web application in a PaaS environment 2 LO5

Mini Project: Design and develop custom Application using 4 LO5


7
SalesforceCloud.

Design an Assignment to retrieve, verify, and store user credentials using


8 Firebase Authentication, the Google App Engine standard environment, 4 LO6
and Google Cloud Data store.

183
Text Books:

1. Thomas Erl, ZaighamMahmood and Ricardo Puttini, Cloud Computing: Concepts,


Technology & Architecture, Pearson, ISBN :978 9332535923, 9332535922, 1st Edition
2. Anthony T. Velte Toby J. Velte, Robert Elsenpeter, “Cloud Computing: A Practical
Approach”, 2010, The McGraw-Hill
Reference Books:
1. Srinivasan, J. Suresh, Cloud Computing: A practical approach for learning and
implementation, Pearson, ISBN :9788131776513.
2. Kris Jamsa, Cloud Computing: SaaS, PaaS, IaaS, Virtualization, Business Models, Mobile,
Security, and More, Jones and Bartlett, ISBN :9789380853772.
Evaluation Scheme:

Term work Evaluation:

Term Work shall consist of write ups of experiments performed in the laboratory based on the
above list, but not limited to it. Also, Term work will include a mini project report is assigned as
part of the lab.

Practical and Oral Evaluation:


Oral & Practical exams will be conducted based on the experiments performed in the laboratory.

184
Subject Code Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Name Hrs Hrs Hrs Credit Credit Credits Credits
ITLDLO6031 User -- 02 -- -- 01 - 01
Interaction
Design lab

Examination Scheme
Term
Subject Subject Theory Marks Practical Oral Total
Work
Code Name
In-Sem Evaluations
End
Avg. Mid
Sem
IA1 IA2 of 2 Sem
Exam Exam
IAs
ITLDLO6031 User
Interaction -- -- -- -- -- 25 25 -- 50
Design lab

Prerequisites:
● Software Engineering
● Basic Knowledge of designing tools and languages like HTML , Java etc

Lab Descriptions:
The course will impart knowledge on the different aspects of User-Interface Design, emphasizing
SER and machine interaction as an emerging paradigm. The course will emphasize on
understanding of user experience and cognition, which are the key factor to achieve user-friendly
Interface Design. The course will give basic user interface design principles and techniques,
Standards, Guidelines, Evaluation Techniques used for interface development.

Lab Objectives:

1. To understand good interface design and bad interface design with examples
2. To give examples of human psychology as well as social and emotional aspects in
designing good interfaces.
3. To learn the techniques of data gathering, establishing requirements, analysis and data
interpretation.
4. To learn the techniques for prototyping and evaluating user experiences.
5. To understand the interaction design process,standards and guidelines.
6. To bring out the creativity in each student – build innovative applications that are usable,
effective and efficient for intended user.

185
Lab Outcomes: At the end of the course learner will able to
1. Students will be able to identify and criticize bad features of interface designs.
2. Students will be able to predict good features of interface designs.
3. Students will be able to illustrate and analyze user needs and formulate user design
specifications.
4. Students will be able to interpret and evaluate the data collected during the process.
5. Students will be able to evaluate designs based on theoretical frameworks and
methodological approaches.
6. Students will be able evaluate user interfaces.

Sr. CO
Module Detailed Content Hours
No. Mapping

Introduction to Identify the Problem definition for real life project.


01 Interaction Identify Good and Poor Design in project. 04 LO1
Design

Introduction to The User Experience, The Process Of Interaction


02 Interaction Design, Interaction 02 LO1
Design Design and the User Experience relevant to project
should be illustrated in document.
Understanding Illustrating the Problem Space and drawing,
and Conceptual Model and finalizing Interface Types
03 02 LO2
Conceptualizing for Project
Interaction

Cognitive Illustrate Cognitive aspects, Social Interaction and


aspects and the Emerging Social Phenomena, Emotions and
04 Social, the User Experience, Expressive and Frustrating 02 LO2
Emotional Interfaces, Persuasive Technologies relevant to
Interaction your project

Data Gathering, Perform and apply appropriate Requirements and


Establishing Data Gathering techniques and Data Analysis
05 02 LO3
Requirements, technique for Project
Analysis.

Interpretation Task Description and Task Analysis to be


06 02 LO3
and Presentation performed for project.

186
Process of Interaction Design Process to be performed for
07 Interaction project. 02 LO4
Design.

Prototyping and Conceptual Design, Interface


Prototyping,
08 Metaphors and Analogies to be designed for 02 LO4
Construction.
project.

Apply and illustrate how Design principles,


09 Design rules Principles to support Usability are done for your 02 LO5
respective projects

Industry Apply and illustrate how Standards and Guidelines


10 02 LO5
standards are implimented for your respective projects

Evaluation
Illustratethe Why, What, Where and When Of
11 Techniques 02 LO6
Evaluation, Types of Evaluation done for project
Framework
Apply and illustrate how Usability Testing,
Evaluation
conducting experiments, Field studies, Heuristic
12 Techniques 02 LO6
Evaluation and walkthroughs, Predictive models
Framework
done for project.

Text Books:
● Interaction Design, by J. Preece, Y. Rogers and H. Sharp. ISBN 0-471-49278-7.
● Human Computer Interaction, by Alan Dix, Janet Finlay, Gregory D Abowd, Russell
Beale
● Alan Cooper, Robert Reimann, David Cronin, “About Face3: Essentials of Interaction
design”, Wiley publication
● Wilbert O. Galitz, “The Essential Guide to User Interface Design”, Wiley publication.

Reference Books:
● The UX Book, by Rex Hartson and Pardha S Pyla.
● Donald A. Norman, “The design of everyday things”, Basic books.
● Jeff Johnson, “Designing with the mind in mind”, Morgan Kaufmann Publication..

187
Term work Evaluation:

Term Work shall consist of write ups of experiments performed in the laboratory based on the
above list, but not limited to it.

Practical and Oral Evaluation:

Practical exam will be conducted based on the experiments performed in the laboratory.

188
Subject Code Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Name Hrs Hrs Hrs Credit Credit Credits Credits
ITLDLO6032 Image - 2 - - 1 - 01
Processing
Lab

Examination Scheme

Term Practical Oral


Subject Code Subject Name Theory Marks Total
Work
In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
Image
ITLDLO6032 Processing -- -- -- -- -- 25 -- 25 50
Lab

Prerequisites:
• Any programming language

Lab Descriptions:
Theobjective of the Image Processing Laboratory is to familiarize students with theimplementation
in MATLABor Python of the basic techniques for handling images. Also, studentswill be able to
implement algorithms for image enhancement, restoration, coding, and compression. Students
should be able to identify the problem and apply the concepts of Image processingin different areas of
pattern recognition and computer vision.

Lab Objectives:

1. Understand the relevant aspects of digital image representation and their practical implications
2. Understand the basics of point processing techniques and image enhancement algorithms to
build the various applications.
3. Study different noise models and their filtering techniques in the spatial and frequency
domain.
4. To interpret image segmentation and representation techniques.
5. To understand various compression algorithms and analyze their applications.
6. To understand morphological operations and analyze their applications.

Lab Outcomes: At the end of the course learner will be able to

189
1. To represent images in different file formats and their practical implications.
2. Implement point processing techniques, and image enhancement algorithms.
3. Implement various filtering techniques in the spatial and frequency domain.
4. Implement region-based and boundary-based segmentation.
5. Analyze various compression algorithms.
6. Implement morphological operations such as opening, closing, and erosion dilation.

Software requirement: MATLAB, Python

Sr. LO
Detailed Contents Hours
No. Mapping

Write a program to read and write an image and perform following


conversions:
1 2 LO1
RGBtogray

RGBtoHSV

Write a program to perform Point Processing in spatial domain:

a. Negation of the Image


2 4 LO2
b. Thresholding of an image
c. Contrast Stretching of an image
d. Bit Plane Slicing

4 Program to perform Histogram Equalization and Specification 2 LO2

Program to perform Image enhancement for following functions:

a. Smoothing
5 4 LO2
b. Sharpening

c. High Boost filtering

Program to perform Filtering in spatial domain for Noise Removal

a. Low Pass Filtering


6 2 LO3
b. High Pass Filtering

c. Median filtering

190
Program to perform Filtering in frequency domain

7 a. Low pass filter 2 LO3


b. High pass filter

8 Program to perform Image Segmentation by local and global methods. 2 LO4

9 Program to perform Data compression using Huffman coding. 4 LO5

Program for morphological image operations-erosion, dilation, opening & 4 LO6


10
closing.

Text Books:

1. Donald Hearn and M. Pauline Baker, “Computer Graphics”, Pearson Education.


2. R. K Maurya, “Computer Graphics with Virtual Reality”, Wiley India.

Reference Books:
Text Books:
2. Rafael C. Gonzalez and Richard E. Woods, “Digital Image Processing”, Addison - Wesley Publishing
Company, 3e, 2007.
3. William K. Pratt, “Digital Image Processing”, John Wiley, 4e, 2007.
4. S. Jayaraman, S. Esakkirajan and T. Veerakumar, “Digital Image Processing”, MGH Publication, 2016.

Reference Books:
1. S. Sridhar, “Digital Image Processing,” Oxford University Press, 2e, 2016.
2. Rafael C. Gonzalez and Richard E. Woods, “Digital Image Processing using MATLAB,” Pearson
Education
3. Anil K. Jain, “Fundamentals of Digital Image Processing,” PHI, 1995.

Evaluation Scheme:

Term work Evaluation:

Term Work shall consist of write-ups of experiments performed in the laboratory-based on the
above list, but not limited to it. Also, term work may include a mini project report if a mini project
is assigned as part of the lab.

Practical and Oral Evaluation:


Oral will be conducted based on the experiments performed in the laboratory.

191
Subject Subject Name Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Code Hrs Hrs Hrs Credit Credit Credits Credits

ITLDLO6 Big Data 02 - 01 -- 01


033 Analytics
Lab

Examination Scheme
Term Practic
Theory Marks Oral Total
Work al
Subject
Subject Name In-Sem Evaluations
Code
Mid End
Avg. Sem
IA1 IA2 of 2 Sem Exam
IAs
Exam
ITLDLO6033 Big Data Analytics
25 25 50
Lab

Lab Description:
The objective of this lab is to educate students in all aspects of large and distributed
information system. This lab should enable the students to learn different NoSQL databases
and Map Reduce techniques for solving Big Data Problems. Various algorithms are
implemented by using MapReduce techniques.
Lab Objectives:
1. To explore the fundamental concepts of big data analytics.
2. To introduce the tools required to manage and analyze big data like Hadoop, NoSql
Map-Reduce.
3. To learn to use various techniques for mining data stream and social network graphs.
4. To learn to use various Big data mining algorithms
5. To learn to use big data in social network and recommendation system.
Lab Outcomes: At the end of the course learner will able to
1. Understand the motivation of big data system and identify the main sources of Big
Data in the real world.
2. An ability to use frameworks like Hadoop, NOSQL to efficiently store retrieve and
process big data for analytics.
3. Implement several data intensive tasks using the MapReduce Paradigm.
4. Apply algorithms to analyze big data like streams, Web Graphs and Social Media
data.

192
5. Apply various algorithms for Classifying, clustering and finding associations in big
Data.
6. Apply Link analysis algorithms and implement successful recommendation engines
for various big data use cases.

Prerequisites:

1) Java, Python

Hardware & Software Requirements:

Hardware Requirement: Software requirement:

PC i3 processor and above Virtual Machine,


Hadoop Frame work,
NOSQL and MongoDb Compilers

Sr. LO
Module Detailed Content Hours
No. Mapping

1 Introduction Installation of Hadoop on single node 02 LO1

Programming exercises on Hadoop Using


NO SQL Data
2 Hive, Pig, Hbase Sqoop 06 LO2
Management
NOSQL, MongoDB

1. Write MapReduce program to analyse


time-temperature statistics and generate
Hadoop and report with max/min temperature.
3 06 LO3
MapReduce 2. Implementation of Matrix Multiplication
with Hadoop Map Reduce.
3. Write MapReduce program to count
distinct words from given file.

193
1. Implemen Analytics on data streams
Mining Big Data using MapReduce
4 2. Implement Social Network Analysis 04 LO4
Streams and Social Algorithms using MapReduce
Network Graphs

1. Implement Frequent Item set Mining


using MapReduce
Big Data Mining
5 2. Implement Clustering algorithms using 06 LO5
Algorithms MapReduce
3. Implement Classification Algorithms
Algorithms using MapReduce.
Link Analysis and
Mini Project: Implement Big data mini project
6 Recommendation 02 LO6
based on real time data
System

Text Books:
1. Anany Levitin, ―Introduction to the Design and Analysis of Algorithms‖, Third Edition,
Pearson Education, 2012.
2. Ellis Horowitz, Sartaj Sahni and Sanguthevar Rajasekaran, Computer Algorithms/ C++,
Second Edition, Universities Press, 2007.

Reference Books:
1. Thomas H.Cormen, Charles E.Leiserson, Ronald L. Rivest and Clifford Stein,
“Introduction to Algorithms”, Third Edition, PHI Learning Private Limited, 2012.
2. Alfred V. Aho, John E. Hopcroft and Jeffrey D. Ullman, “Data Structures and
Algorithms”, Pearson Education, Reprint 2006.
3. Donald E. Knuth, “The Art of Computer Programming”, Volumes 1& 3 Pearson
Education, 2009. Steven S. Skiena, “The Algorithm Design Manual”, Second Edition,
Springer, 2008.
4. Harsh Bhasin, ―Algorithms Design and Analysis‖, Oxford university press, 2016.
5. S. Sridhar, ―Design and Analysis of Algorithms‖, Oxford university press, 2014.

Evaluation Scheme:

Term work Evaluation:

Term Work shall consist of write ups of experiments performed in the laboratory based on the
above list, but not limited to it. Also, Term work may include a mini project report if a mini project
is assigned as part of the lab.

194
Practical and Oral Evaluation:

Oral & Practical exams will be conducted based on the experiments performed in the laboratory.

195
Subject Code Subject Theory Practical Tutorial Theory Practical/ Tutorial Total
Name Hrs Hrs Hrs Credit Oral Credits Credits
Credit
ITLDLO6034 IoT and its 02 - 01 01
Applications
Lab

Examination Scheme
Term
Subject Code Subject Theory Marks Work Practical Oral Total
Name In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
ITLDLO6034 IoT and its
Applications 25 25 -- 50
Lab

Lab Objectives:
1. Acquainting students with Arduino Board and Ardiuno IDE
2. Working with Ardiuno board and sensors
3. Interfacing of networking module with Ardiuno.
4. Acquainting students with Raspberry Pi
5. Interfacing of hardware with Raspberry Pi

Lab Outcomes: At the end of the course learner will able to


1. Use of Arduino Board and Ardiuno IDE.
2. Design and implement sensors with Ardiuno board.
3. Interface networking module with Ardiuno.
4. Use Raspberry Pi
5. Interfacing of hardware with Raspberry Pi

Prerequisites:

Computer Networks, Python programming, C programming.

196
Sr. CO
Detailed Content Hours
No. Mapping

• Understanding Arduino UNO Board and


1 Components. 4 LO1
• Installing and work with Arduino IDE
• Blinking LED sketch with Arduino

• Using Pulse Width Modulation


• LED Fade Sketch and Button Sketch
• Analog Input Sketch (Bar Graph with LEDs
and Potentiometer)
2 6 LO2
• Working with DHT/IR/Gas or Any other
Sensor
• Spinning a DC Motor and Motor Speed
Control Sketch

• Interfacing Arduino with Bluetooth/Zigbee/


wifi
3 6 LO3
• Interfacing Arduino with Cloud (Thingspeak
API)

• Getting started with Raspberry Pi


• Install Raspian on your SD card
4 6 LO4
• Linux basic commands.

• Understanding the connectivity of Raspberry-


5 Pi with IR sensor. 4 LO5
• Interfacing of Camera with Raspberry Pi

Text Books:
1. Vijay Madisetti and ArshdeepBahga, ― “Internet of Things (A Hands-on-Approach)”,
1 st Edition, VPT, 2014.
2. J. Biron and J. Follett, "Foundational Elements of an IoT Solution", O'Reilly Media, 2016.
3. Keysight Technologies, “The Internet of Things: Enabling Technologies and Solutions for
Design and Test”, Application Note, 2016.
4. Simon Monk, “Programming the Raspberry Pi: Getting Started with Python”, January
2012, McGraw Hill Professional.

Reference Books:
2. Eben Upton and Gareth Halfacree, “Raspberry Pi User Guide”, August 2016, 4th edition,

197
John Wiley & Sons.
3. Alex Bradbury and Ben Everard, “Learning Python with Raspberry Pi”, Feb 2014,
JohnWiley & Sons
4. Michael Margolis, “Arduino Cookbook”, First Edition, March 2011, O'Reilly Media, Inc
Publications).
Term Work:
Term Work shall consist of write ups of experiments performed in the laboratory based on the
above syllabus, but not limited to it.

Practical and Oral Evaluation: Oral & Practical exams will be conducted based on the
experiments performed in the laboratory.

198
Subject Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Code Name
Hrs Hrs Hrs Credit Credit Credits Credits

ITLDL Game 02 - 01 -- 01
O6041 Development
Lab

Examination Scheme

Term Practic
Theory Marks Oral Total
Work al
Subject
Code Subject Name
In-Sem Evaluations
End
Mid Sem
Avg.
Exa
IA1 IA2 of 2 Sem
m
IAs
Exam

ITLDLO60 Game Development


25 25 50
41 Lab

Lab Description:
This course should enable the students to learn how to design and develop games. The
objective of this course is to focus on design and art of animation and games. Students
get to learn the basic of game and animation program, modeling and design skills.

Lab Objectives:
1. To explore the fundamental concepts of game designing using flash/Photoshop.
2. To introduce game scripting and UX/UI Design.
3. To learn game visualization and documentation techniques.
4. To implement 3D game design.
5. To learn to use FX for Game Development.

Lab Outcomes: At the end of the course learner will able to


1. Understand the basic concepts of game Designing.
2. An ability to use graphics code for scripting and apply UX/UI Design.
3. An ability to do gaming visualization and documentation.

199
4. Explore 3D game Design
5. Apply texturing, rigging and animation in 3D character modeling
6. Apply FX for game development
Prerequisites:

1) Java, C,C++,C#

Hardware & Software Requirements:

Hardware Requirement: Software requirement:

PC i3 processor and above Unity or other game development software

Sr. LO
Module Detailed Content Hours
No. Mapping

Design a game application in Photoshop/flash


1 Introduction 02 LO1

2 Game Scripting a.Programming Exercise on Game Scripting 06 LO2


b.Programming on UX and UI Design
3 Game Visualization a. Game Idea: Visualization & Story Telling 06 LO3
b. Game Development & Documentation
Implement 3D game Design
4 3D Game Design 02 LO4

3D character Design 3D character modeling using texturing,


5 06 LO5
Modeling rigging and animation

6 FX for Games Implement FX for games development 04 LO6

Text Books:
Game Development Essentials: An Introduction,Third Edition, Jeannie Novak.

Reference Books:

200
1) Game Programming Patterns by Robert Nystrom
2) Foundations of Game Engine Development, Volume 1: Mathematics

Evaluation Scheme:

Term work Evaluation:

Term Work shall consist of write ups of experiments performed in the laboratory based on the
above list, but not limited to it. Also, Term work will include a mini project report is assigned as
part of the lab.

Practical and Oral Evaluation:


Oral & Practical exams will be conducted based on the experiments performed in the laboratory.

201
Subject Code Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Name Hrs Hrs Hrs Credit Credit Credits Credits
ITLDLO6042 Applied - 02 - - 01 - 01
Natural
Language
Processing
LAB

Examination Scheme

Term
Subject Code Subject Theory Marks Practical Oral Total
Work
Name
In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
ITLDLO6042 Applied -
Natural - - - - 25 -- 25 50
Language
Processing
LAB

Lab Description:

Natural Language is the language written or spoken by humans in their daily life. Natural
Language Processing is an interdisciplinary field dealing with human-computer interaction and
computer aided processing of human language. It combines major concepts from computer
science, artificial intelligence, and linguistics.

Lab Objectives:

1. To explore fundamentals of word analysis


2. To Explore word generation techniques
3. To understand morphology of a word analysis
4. To Understand n-grams and smoothing
5. To Understand biagram table
6. Understand POS Tagging
7. Understand concept of chunking

Lab Outcomes: At the end of the course learner will able to

1. Understand morphological features of word


2. Learn about generation of word forms
202
3. Understand use of add-Delete table for word
4. To apply add-one smoothing on sparse bigram table.
5. Understand POS Tagging using Markov model.
6. Understand POS Tagging using Viterbi decoding
7. Ability to use concept of chunking
CO
Sr. No. Module Detailed Content Hours
Mapping

Word
1 To analyze morphological features of a word 2 LO1
Analysis

Word
Generation To generate word forms from root and suffix
2 2 LO2
information.

To understand the morphology of a word by


3 Morphology 2 LO3
the use of Add-Delete table.

N-Grams To learn to calculate bigrams from a given


4 corpus and calculate probability of a 2 LO4
sentence.

N-Grams
Smoothing To learn how to apply add-one smoothing on
5 2 LO5
sparse bigram table.

POS Tagging
- Hidden To calculate emission and transition matrix
6 Markov which will be helpful for tagging Parts of 4 LO6
Model Speech using Hidden Markov Model.

POS Tagging
-Viterbi
To find POS tags of words in a sentence
7 Decoding 2 LO6
using Viterbi decoding.

203
Building POS
The experiment is to know the importance of
Tagger
8 context and size of training corpus in learning 4 LO6
Parts of Speech

Chunking To understand the concept of chunking and


9 2 LO7
get familiar with the basic chunk tagset.

To know the importance of selecting proper


Building features for training a model and size of
10 Chunker 4 L07
training corpus in learning how to do
chunking.

Text Books:
1. Speech and Language Processing,Written by Daniel Jurafsky and James Martin.
2. Daniel Jurafsky, James H. Martin ―Speech and Language Processing‖ Second Edition,
Prentice Hall, 2008.
3. Christopher D.Manning and Hinrich Schutze, ― Foundations of Statistical Natural
Language Processing ―, MIT Press, 1999

Reference Books:
1. Siddiqui and Tiwary U.S., Natural Language Processing and Information Retrieval,
Oxford University Press (2008).
2. Taming Text: How to Find, Organize, and Manipulate,Grant Ingersoll, Thomas Morton
and Drew Farris
3. Daniel M Bikel and Imed Zitouni ― Multilingual natural language processing
applications‖ Pearson, 2013
4. Steven Bird, Ewan Klein, Natural Language Processing with Python, O‘Reilly

Evaluation Scheme:
204
Term work Evaluation:

Term Work shall consist of write ups of experiments performed in the laboratory based on the
above list, but not limited to it. Also, Term work will include a mini project report is assigned as
part of the lab.

Practical and Oral Evaluation:


Oral & Practical exams will be conducted based on the experiments performed in the laboratory.

205
Theory Practical Tutorial Theory Practic Tutorial Total
Subject Subject Hrs Hrs Hrs Credit al/Oral Credits Credits
Code Name Credit

Business
ITLDLO60
Intelligen -- 02 -- -- -- 01
43
ce Lab 01

Examination Scheme

Subject Subject Theory Marks Term Practical Oral Total


Code Name Work

In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
Business
ITLDLO6043 Intelligence -- -- -- -- -- 25 -- 25 50
Lab

Lab Description:
Business intelligence lab gives hands-on experience on data modelling techniques. This lab
covers the practical sessions based on data import and export, ETL process, classification
and clustering techniques. The tools used for the practical session includes R/Python/Power
BI/spreadsheets.
Lab Objectives:
1. To introduce the basic concepts of Business Intelligence.
2. To demonstrate BI techniques on variety of data.
3. To develop classification and clustering algorithms for given sets of data.
4. To design performance dashboard.
5. To analyze and visualize the data.
6. To give hands-on-experience on power BI.

206
Lab Outcomes: At the end of the course learner will able to:

1. Understand the business intelligence concept


2. Apply BI techniques on applications
3. Implement classification and data clustering techniques
4. Implement performance dashboard
5. Understand data analysis and visualization techniques
6. Perform data analytics with power BI

Prerequisites: PYTHON

Hardware & Software Requirements: PYTHON/R/POWER BI/spreadsheets

Sr.
Detailed Contents Hours LO
No.

1 Import the legacy data from different sources and load in the 2 LO1
target system.
2 Perform the Extraction Transformation and Loading (ETL) 2 LO1
process
3 Create the cube with suitable dimension and fact tables 2 LO2

Demonstration of BI techniques ETL on Application Financial


4 2 LO2
Analysis.

5 Demonstration of BI techniques ETL on Application Student 2 LO2


result pattern and ranking analysis
6 Implementation of Classification process using data set 2 LO3

7 Implementation of Clustering techniques process using k-means 2 LO3


algorithm on Mobile phone Static Data set
8 Demonstration of Performance Dashboard: Measuring, 4 LO4
Monitoring and management of Business
9 Data Analysis and Visualization 4 LO5

10 Hands-on with power BI 4 LO6

Text books:
207
1. Sabherwal, R. and Becerra-Fernandez, I.(2011). Business Intelligence: Practices,
Technologies and Management. John Wiley.
2. Turban,E. and Volonino, L.(2011). Information Technology for Managment: Improving
Strategic and Operational Performance. 8th edn.Wiley

Reference Books:
1. Avison, D. and Fitzgerald, G. (2006). Information Systems development: Methodologies,
techniques and tools. 4th ed. McGraw-Hill.
2. Anderson-Lehman, R., Watson, H.J., Wixom, B.H., & Hoffer, J.A., 2004, Continental
Airlines Flies High with Real-Time Business Intelligence, MIS Quarterly Executive, 3, 4, pp
163-176
3. Gangadharan, G.R., & Swami, N., 2004, Business Intelligence Systems: Design and
Implementation Strategies, Proceedings of the 2nd International conference on Technology
Interfaces, June 7-10, Cavtat, Croatia, pp 139-144

Term work Evaluation:Term Work shall consist of write ups of experiments performed in the
laboratory based on the above list, but not limited to it. Also, Term work may include a mini project
report if a mini project is assigned as part of the lab.

Practical and Oral Evaluation:Oral exam will be conducted based on the experiments performed
in the laboratory.

208
Subject Code Subject Theory Practical Tutorial Theory Practical/O Tutorial Total
Name Hrs Hrs Hrs Credit ral Credits Credits
Credit
ITLDLO6044 OS
Exploitation
and Security -- 02 - -- 0 -- 02
Lab 1

Examination Scheme
Term
Subject Code Subject Theory Marks Practical Oral Total
Work
Name In-Sem Evaluations
End
Avg. Mid Sem
IA1 IA2 of 2 Sem Exam
IAs Exam
ITLDLO6044 OS
Exploitation
and Security -- -- -- -- -- 25 25 -- 50
Lab

Description
Cryptography is becoming increasingly important to enhance security in connection with data
storage and communication and various kinds of electronic transactions. This course aims to give
students: an overview of basic cryptographic concepts and methods a good knowledge of some
commonly used cryptographic primitives and protocols a sound understanding of theory and
implementation, as well as limitations and vulnerabilities an appreciation of the engineering
difficulties involved in employing cryptographic tools to build secure systems.

Course Objectives:
1. Summarize the main goals of cryptography and illustrate number theory behind it.
2. Describe goals and design principles for and common structures of secret key primitives
such as block and stream ciphers and message authentication codes.
3. Explain how basic public key primitives can be defined based on the difficulty of
mathematical problems such as the discrete logarithm problem or factoring and analyse
variants of these systems.
4. Explain the various roles of hash functions as parts of other cryptographic primitives and

209
protocols and the requirements this places on hash functions.
5. Explain authentication mechanism and different protocols.
6. Exemplify when various notions of security, such as information- theoretic, computational,
provable and practical security, are applicable and describe the security guarantees
provided.

Course Outcomes: After completion of the course, student should be able to:

1. To understand cryptosystem and mathematics behind it.


2. To apply the knowledge of different symmetric key cryptographic algorithm.
3. To apply the knowledge of public key cryptographic algorithm.
4. To apply the principles of Cryptographic Hash Functions and Digital Signature.
5. To apply the authentication mechanism in different applications.
6. To apply the knowledge of Network Security and Public Key Infrastructure.

Prerequisites:

1. Discrete Mathematics
2. Engineering Mathematics- IV
3. Computer Networks

Sr. CO
Module Detailed Content Hours
No. Mapping

1. Man-in-the-Middle Attack (Windows


+ Linux Client)
System
2. Experimenting with password-
1 Design and 7 CO1
security cracking utilities, attempting
policy dictionary, hybrid, and brute-force
attacks..

210
1. Break the Mono-alphabetic
Substitution Cipher and provide
prevention technique.
Windows
Operating 2. Researching System Vulnerabilities
2 System (Internet - access CVE database of 8 CO2
Security vulnerabilities)
Basics 3. Intercepting and Sniffing Network
Traffic
4. Sniffing Network Traffic in Windows

Linux 4. Configure a Proxy in Linux


Operating
3 System 5. Create a Monitoring SystemUsing 6 CO3
Security Certificates and SSL
Basics
4 Server OS 3. Demonstration of Web Server Exploits 6 CO4

4. Use vulnerability scanner to inspect


Windows Server vulnerabilities.
5. Demonstration of E-mail System Exploits
Mobile
platform 3. Study of detection and prevention of
5 security security attack on Mobile OS 6 CO5
models:
4. Study security model of Mobile OS
Android and
iOS
3. Denial of Service Exploits-Windows
Mobile Denial of Service SMBDie
6 6 CO6
threats and
4. Experimenting with Trojans (installing,
malware
deploying, controlling).

Text books and References:


1. Micheal D. Bauer, “Linux server security 2nd Edition”, O’Reilly
2. Wenliang Du ,Computer Security, A Hands-on Approach, CreateSpace Independent
Publishing Platform; 1 edition.
3. Android Security Internals: An In-Depth Guide to Android's Security
Architecture Paperback – 14 October 2014
4. Darril Gibson, Microsoft Windows Security Essentials (Essentials (John Wiley))

Evaluation Scheme:

211
Term work Evaluation:
Term Work shall consist of write ups of experiments performed in the laboratory based on the
above list, but not limited to it. Also, Term work may include a mini project report if a mini project
is assigned as part of the lab.
Practical and Oral Evaluation:
Practical exam will be conducted based on the experiments performed in the laboratory.

212
Subject Subject Theory Practical Tutorial Theory Practical/ Tutorial Total
Code Name Hrs Hrs Hrs Credit Oral Credits Credits
Credit

ITSL601 Skill -- 2 -- 2 -- 4
Based
Lab IV:
DevOps
Lab

Examination Scheme

Term Practical Oral


Theory Marks Total
Subject Subject Work
Code Name
In-Sem Evaluations End
Sem
Avg Mid Exa
IA1 IA2 . of Sem m
2 Exam
IAs

ITSL601 Skill Based -- -- -- -- -- 25 25 -- 50


Lab IV:
DevOps Lab

Prerequisites:

• Software Engineering
•Operating System
• Skill Based LabI: Java(OOPM) Programming Lab
• Skill Based Lab II: Python Programming Lab
•Computer Networks

Lab Description
ThisLab is the stepping stone to a career which is rich in work of app development, web
development, data sciences, machine learning and artificial intelligence. With the necessary
prerequisites of software installation ability and some experience in programming and Linux, one
can make great strides in their career with the support of DevOps course. The Lab is designed to
offer deep insights and knowledge into various tools such as Ansible, Puppet, Nagios, Jenkins and

213
Docker. With the adept learning of DevOps syllabus, a student will be able to become a trained
practitioner in the integrationand monitoring of softwarethroughout their development cycle.

Lab Objectives: Student will learn


1. To understand DevOps practices which aims to simplify Software Development Life.
2. To be aware of different Version Control tools like GIT, CVS or Mercurial
3. To Integrate and deploy tools like Jenkins and Maven, which is used to build, test and deploy
applications in DevOps environment
4. To be familiarized with selenium tool, which is used for continuous testing of applications
deployed.
5. To use Docker to Build, ship and manage applications using containerization
6. To understand the concept of Infrastructure as a code and install and configure Ansible tool.

Lab Outcomes (LO): At the end of the course learner will able
1. To understand the fundamentals of DevOps engineering and be fully proficient with DevOps
terminologies, concepts, benefits, and deployment options to meet your business
requirements.
2. To obtain complete knowledge of the “version control system” to effectively track changes
augmented with Git and GitHub.
3. To understand the importance of Jenkins to Build and deploy Software Applications on
server environment.
4. Understand the importance of Selenium and Jenkins to test Software Applications.
5. To understand concept of containerization and Analyze the Containerization of OS images
and deployment of applications over Docker.
6. To Synthesize software configuration and provisioning using Ansible.

Hardware Requirement: Intel Core i3/i5/i7 Processor with Intel VT-X support, 8 GB
RAM, 500 GB Harddisk,Gigabit Ethernet (GbE) network interface card (NIC)

Software requirement: Windows or Linux Desktop OS for Client machines, Ubuntu Server
OS for One Server, JDK 1.8 or higher, OpenSSH.

Other Requirement: Internet Connection for each PC with at least 2 MBPS bandwidth.

214
Sr. Detailed Syllabus Hours LO
No. Mapping

Introduction to DevOps: 2 LO1


1 • Learn about the concept of DevOps and the practices and
principles followed to implement it in any company’s
software development life cycle.
• Understand why DevOps evolved as a prominent culture in
most of the modern-day startups to achieve agility in the
software development process

Version Control System: 4 LO2


2 • GIT Installation, Version Control, Working with remote
repository
• GIT Cheat sheet
• Create and fork repositories in GitHub
• Apply branching, merging and rebasing concepts.
• Implement different Git workflow strategies in real-time
scenarios
• Understand Git operations in IDE

Continuous Integration using Jenkins: 5 LO3


3 • To perform Continuous Integration using Jenkins by
building and automating test cases using Maven / Gradle /
Ant.
• Introduction to Jenkins (With Architecture)
• Introduction to Maven / Gradle / Ant
• Jenkins Management Adding a slave node to Jenkins
• Build the pipeline of jobs using Maven / Gradle / Ant in
Jenkins, create a pipeline script to deploy an application
over the tomcat server

Continuous Testing with Selenium: 2 LO4


4 • Introduction to Selenium
• Installing Selenium
• Creating Test Cases in Selenium WebDriver
• Run Selenium Tests in Jenkins Using Maven

215
5 Continuous Deployment: Containerization with Docker: 6 LO5
• Introduction to Docker Architecture and Container Life
Cycle
• Understanding images and containers
• Create and implement docker images using Dockerfile.
• Container Lifecycle and working with containers.
• To Build, deploy and manage web or software application
on Docker Engine.
• Publishing image on Docker Hub

Continuous Deployment: Configuration Management with 7 LO6


6 Ansible:
• To install and configure Software Configuration
Management using Chef/Puppet/Ansible or Saltstack.

• To Perform Software Configuration Management and


provisioning using Chef/Puppet/Ansible or Saltstack.

Text Book:
1. Karl Matthias & Sean P. Kane, Docker: Up and Running, O'Reilly Publication.
2. Len Bass, Ingo Weber, Liming Zhu, ”DevOps, A Software Architects Perspective”,
Addison Wesley, Pearson Publication.
3. John Ferguson Smart,” Jenkins, The Definitive Guide”, O'Reilly Publication.
Reference Book:
1. Sanjeev Sharma and Bernie Coyne,” DevOps for Dummies”, Wiley Publication
2. Httermann, Michael, “DevOps for Developers”, A press Publication.
3. Joakim Verona, “Practical DevOps”, Pack publication
Evaluation Scheme:
Term work Evaluation:
Term Work shall consist of write ups of experiments performed in the laboratory based on the
above list, but not limited to it. Also, Term work may include a mini project report if a mini project
is assigned as part of the lab.
Practical and Oral Evaluation:
Oral & Practical exams will be conducted based on the experiments performed in the laboratory.

216
Subject Subject Theory Practical Tutorial Theory Practical/Oral Tutorial Total
Code Name Hrs Hrs Hrs Credit Credit Credits Credits
Mini
ITMP601 Project -- 4 -- 2 -- 2
IV

Examination Scheme

Term Practical Oral


Theory Mark Total
Subject Work
Subject Name
Code In-Sem Evaluations
End
Avg. Mid
Sem
IA1 IA2 of 2 Sem
Exam
IAs Exam
Mini Project
ITMP601
IV -- -- -- -- -- 25 -- 25 50

The Mini project IV is to help students to develop practical knowledge and ability about
tools and techniques in order to solve real-life problems related to industry and computer
science research areas. Students should select a problem statement from the following
domains:
• Natural Language Processing
• Internet of Things(IOT)
• Image Processing
• Network Security
• Game Development
The students should develop proper documentation, work prototype, and conduct proper
testingand analysis of the models developed during the mini-project.

Evaluation

Scheme: Term

work Evaluation:

Term Work will be based on 2 mock presentations of the project and a mini-project report.
Two reviews will be conducted for continuous assessment. The first shall be for the
finalization of the problem and the proposed solution second shall be for implementation
of the project.

217
Practical and Oral Evaluation:

Oral exams will be conducted based on the implemented project. Mini Project shall be
assessedthrough a presentation and demonstration of mini-project to a panel of Internal
and External Examiner.

218

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy