M.E. BCS
M.E. BCS
I. 3 2 2 2 3 3
II. 3 3 2 3 2 3
III. 3 1 3 2 3 1
IV. 3 2 1 2 1 1
V. 3 2 1 1 1 1
1
MAPPING OF COURSE OUTCOMES AND PROGRAMME OUTCOMES
Project Work I
YEAR II
SEMESTER IV
Project Work II
2
PROFESSIONAL ELECTIVE COURSES [PEC]
S.
COURSE TITLE PO1 PO2 PO3 PO4 PO5 PO6
NO.
1. Principles of Secure Coding 2.6 2 2.33 3 2 2
2. Network Security 2 2.33 3 2.5 2 2
3. Public Key Infrastructure 2.6 2 2 2 2 1.5
4. Operating Systems Security 2.4 2 3 2.5 2.33 1.5
5. Security Practices 2.4 2 3 3 2.33 1.75
6. Media Security 2.8 2.25 1.5 2 1.75 1.25
7. Biometric Security 3 2 1 2 2 1
8. Secure Systems Engineering 2.4 1.66 1.5 2 1 1.5
9 Cloud Security 2 1.5 2 2 2 1.66
10. Firewall and VPN Security 2.4 1.75 2 3 1.5 1.33
11. Mobile and Digital Forensics 2.4 1.66 2.66 - 2 2
Access Control and Identity Management
12. 2 1.8 2 2.5 1.33 1.66
Systems
13. Social Network Analysis 3 2 1 - 1 1
14. Data Privacy 2 1.8 2 2.5 2.33 1.75
15. Security in Cyber-Physical Systems 2.4 2.2 2.33 2 1 1.66
16. Cryptanalysis 2.6 1.6 2 3 1.66 2.25
17. Data Analytics for Fraud Detection 2.6 1.4 1 3 2 2.33
2.3
18. Internet of Things 2.8 2.25 2.33 2 2
3
19. Malware Analysis 2.6 2 2 2 1.5 2
20. Secure Software Design and Development 2.2 2 1.66 2.5 2 1.5
21. Security Assessment and Risk Analysis 2.4 1.4 1 - 1.5 1
22. Steganography and Digital Watermarking 2.6 1.4 1.66 3 2 2
23. Blockchain Technologies 2.8 1.8 2 2.5 1.5 2.25
24. Web Security 2.4 1.4 1 - 1.5 1
3
ANNA UNIVERSITY, CHENNAI
NON - AUTONOMOUS COLLEGES AFFILIATED ANNA UNIVERSITY
M.E. BIOMETRICS AND CYBER SECURITY
REGULATIONS – 2021
CHOICE BASED CREDIT SYSTEM
I TO IV SEMESTERS CURRICULA AND SYLLABI
SEMESTER I
4
SEMESTER III
PERIODS TOTAL
S. COURSE CATE-
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. Professional Elective II PEC 3 0 0 3 3
2. Professional Elective III PEC 3 0 0 3 3
3. Professional Elective IV PEC 3 0 2 5 4
4. Open Elective OEC 3 0 0 3 3
PRACTICALS
5. BC4311 Project Work I EEC 0 0 12 12 6
TOTAL 12 0 14 26 19
SEMESTER IV
PERIODS TOTAL
S. COURSE CATE-
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
PRACTICALS
1. BC4411 Project Work II EEC 0 0 24 24 12
TOTAL 0 0 24 24 12
PROFESSIONAL ELECTIVES
SEMESTER II, ELECTIVE I
PERIODS TOTAL
S. COURSE CATE-
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. BC4001 Principles of Secure Coding PEC 3 0 0 3 3
2. NE4251 Network Security PEC 3 0 0 3 3
3. BC4002 Public Key Infrastructure PEC 3 0 0 3 3
4. BC4003 Operating Systems Security PEC 3 0 0 3 3
5. CP4391 Security Practices PEC 3 0 0 3 3
6. MU4252 Media Security PEC 3 0 0 3 3
5
SEMESTER III, ELECTIVE II
PERIODS TOTAL
S. COURSE CATE-
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. BC4004 Biometric Security PEC 3 0 0 3 3
2. BC4005 Secure Systems Engineering PEC 3 0 0 3 3
3. BC4006 Cloud Security PEC 3 0 0 3 3
4. BC4007 Firewall and VPN Security PEC 3 0 0 3 3
5. BC4008 Mobile and Digital Forensics PEC 3 0 0 3 3
6
AUDIT COURSES (AC)
PERIODS PER
SL. COURSE CREDITS
COURSE TITLE WEEK
NO CODE
L T P
1. AX4091 English for Research Paper Writing 2 0 0 0
2. AX4092 Disaster Management 2 0 0 0
3. AX4093 Constitution of India 2 0 0 0
4. AX4094 நற் றமிழ் இலக்கியம் 2 0 0 0
7
LIST OF OPEN ELECTIVES FOR PG PROGRAMMES
PERIODS PER
SL. COURSE
COURSE TITLE WEEK
NO. CODE CREDITS
L T P
1. OCE431 Integrated Water Resources Management 3 0 0 3
2. OCE432 Water, Sanitation and Health 3 0 0 3
OCE433 Principles of Sustainable
3. 3 0 0 3
Development
4. OCE434 Environmental Impact Assessment 3 0 0 3
5. OME431 Vibration and Noise Control Strategies 3 0 0 3
6. OME432 Energy Conservation and Management in
3 0 0 3
Domestic Sectors
7. OME433 Additive Manufacturing 3 0 0 3
8. OME434 Electric Vehicle Technology 3 0 0 3
9. OME435 New Product Development 3 0 0 3
10. OBA431 Sustainable Management 3 0 0 3
11. OBA432 Micro and Small Business Management 3 0 0 3
12. OBA433 Intellectual Property Rights 3 0 0 3
13. OBA434 Ethical Management 3 0 0 3
14. ET4251 IoT for Smart Systems 3 0 0 3
15. ET4072 Machine Learning and Deep Learning 3 0 0 3
16. PX4012 Renewable Energy Technology 3 0 0 3
17. PS4093 Smart Grid 3 0 0 3
18. DS4015 Big Data Analytics 3 0 0 3
19. NC4201 Internet of Things and Cloud 3 0 0 3
20. MX4073 Medical Robotics 3 0 0 3
21. VE4202 Embedded Automation 3 0 0 3
22. CX4016 Environmental Sustainability 3 0 0 3
23. TX4092 Textile Reinforced Composites 3 0 0 3
24. NT4002 Nanocomposite Materials 3 0 0 3
25. BY4016 IPR, Biosafety and Entrepreneurship 3 0 0 3
8
3. CE4151 Principles of Cyber Security 3 0 2 4 I
4. Cyber Forensics and I
BC4152 3 0 0 3
Investigation
5. Advanced Data Structures and I
CP4161 0 0 4 2
Algorithms Laboratory
6. II
BC4201 Applied Cryptography 3 0 2 4
7. CP4252 Machine Learning 3 0 2 4 II
9. II
BC4291 Ethical Hacking 3 0 2 4
9
SUMMARY
I II III IV
1. FC 04 00 00 00 04
2. PCC 16 17 00 00 33
3. PEC 00 03 10 00 13
4. RMC 02 00 00 00 02
5. OEC 00 00 03 00 03
6. EEC 00 01 06 12 19
7. Non Credit/Audit Course 00 00
8. TOTAL CREDIT 22 21 19 12 74
10
MA4113 ALGEBRA AND PROBABILITY L T P C
3 1 0 4
COURSE OBJECTIVES:
To understand the basics of random variables with emphasis on the standard discrete and
continuous distributions.
To make students understand the notion of a Markov chain, and how simple ideas of
conditional probability and matrices can be used to give a thorough and effective account of
discrete – time Markov chains.
To apply the small / large sample tests through Tests of hypothesis.
To introduce the basic notions of groups, rings, fields which will then be used to solve related
problems.
To introduce and apply the concepts of rings, finite fields and polynomials.
11
REFERENCES:
1. Devore J.L.,” Probability and Statistics for Engineering and sciences”, Cengage learning, 9th
Edition, Boston,2017.
2. Grimaldi R. P. and Ramana B.V., “Discrete and Combinatorial Mathematics”, Pearson
Education, 5th Edition, New Delhi, 2007.
3. Johnson R. A. and Gupta C.B., “Miller and Freund’s Probability and Statistics for Engineers”,
Pearson India Education, Asia, 9th Edition, New Delhi, 2017.
4. Ibe. O.C., “ Fundamentals of Applied Probability and Random Processes”, Elsevier U.P., 1 st
Indian Reprint, 2007.
CO-PO Mapping
CO POs
UNIT V PATENTS 6
Patents – objectives and benefits of patent, Concept, features of patent, Inventive step,
Specification, Types of patent application, process E-filing, Examination of patent, Grant of patent,
12
Revocation, Equitable Assignments, Licences, Licensing of related patents, patent agents,
Registration of patent agents.
TOTAL : 30 PERIODS
REFERENCES
1. Cooper Donald R, Schindler Pamela S and Sharma JK, “Business Research Methods”,
Tata McGraw Hill Education, 11e (2012).
2. Catherine J. Holland, “Intellectual property: Patents, Trademarks, Copyrights, Trade Secrets”,
Entrepreneur Press, 2007.
3. David Hunt, Long Nguyen, Matthew Rodgers, “Patent searching: tools & techniques”, Wiley,
2007.
4. The Institute of Company Secretaries of India, Statutory body under an Act of parliament,
“Professional Programme Intellectual Property Rights, Law and practice”, September 2013.
13
UNIT V NP COMPLETE AND NP HARD 9
NP-Completeness: Polynomial Time – Polynomial-Time Verification – NP- Completeness and
Reducibility – NP-Completeness Proofs – NP-Complete Problems.
TOTAL : 45 PERIODS
SUGGESTED ACTIVITIES:
1. Write an algorithm for Towers of Hanoi problem using recursion and analyze the
complexity (No of disc-4)
2. Write any one real time application of hierarchical data structure
3. Write a program to implement Make_Set, Find_Set and Union functions for Disjoint Set Data
Structure for a given undirected graph G(V,E) using the linked list representation with simple
implementation of Union operation
4. Find the minimum cost to reach last cell of the matrix from its first cell
5. Discuss about any NP completeness problem
COURSE OUTCOMES:
CO1: Design data structures and algorithms to solve computing problems.
CO2: Choose and implement efficient data structures and apply them to solve problems.
CO3: Design algorithms using graph structure and various string-matching algorithms to solve
real-life problems.
CO4: Design one’s own algorithm for an unknown problem.
CO5: Apply suitable design strategy for problem solving.
REFERENCES:
1. S.Sridhar,” Design and Analysis of Algorithms”, Oxford University Press, 1st Edition, 2014.
2. Adam Drozdex, “Data Structures and algorithms in C++”, Cengage Learning, 4th Edition, 2013.
3. T.H. Cormen, C.E.Leiserson, R.L. Rivest and C.Stein, "Introduction to Algorithms", Prentice
Hall of India, 3rd Edition, 2012.
4. Mark Allen Weiss, “Data Structures and Algorithms in C++”, Pearson Education, 3rd Edition,
2009.
5. E. Horowitz, S. Sahni and S. Rajasekaran, “Fundamentals of Computer Algorithms”, University
Press, 2nd Edition, 2008.
6. Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman, “Data Structures and Algorithms”, Pearson
Education, Reprint 2006.
CO-PO Mapping
CO POs
1 3 2 1 - 1 1
3 2 1 - 1 1
2
2 1 - - - -
3
3 2 1 - 1 1
4
2 1 - - - -
5
3 2 1 - 1 1
Avg
14
BC4151 BIOMETRIC SYSTEMS L T PC
3 0 2 4
COURSE OBJECTIVES:
To learn and understand biometric technologies and their functionalities.
To learn the role of biometric in the organization
To Learn the computational methods involved in the biometric systems.
To expose the context of Biometric Applications
To learn to develop applications with biometric security
Privacy concerns associated with biometric developments – Identity and privacy – Privacy concerns
– biometrics with privacy enhancement – Comparison of various biometrics in terms of privacy –
Soft biometrics - Introduction to biometric cryptography – General purpose cryptosystem – Modern
cryptography and attacks – Symmetric key ciphers – Cryptographic algorithms – Introduction to
multimodal biometrics – Basic architecture using face and ear – Characteristics and advantages of
multimodal biometrics characters – AADHAAR : An Application of Multimodal Biometrics.
15
UNIT V IMAGE ENHANCEMENT TECHNIQUES & BIOMETRICS STANDARDS 9+6
Current research in image enhancement techniques – Image enhancement algorithms– Frequency
domain filters – Databases and implementation – Standard development organizations – Application
programming interface – Information security and biometric standards – Biometric template
interoperability biometrics for network security and biometrics for transaction.
LIST OF EXPERIMENTS (Experiments can be designed with similar use cases as below):
1. Student school smart card
2. Secure lab access using card scanner plus face recognition
3. Student bus pass with barcode card scan
4. Student bus pass with webcam scan
5. Employee attendance system by Qr scan
6. Student examination datacard
7. School student attendance system by barcode scan
8. School student attendance system by Qr scan
9. School student attendance with fingerprint reader
10. Fingerprint voting system project
11. Employee hourly attendance by barcode scan
12. Visual product identification for blind
COURSE OUTCOMES:
CO1: Identify the various biometric technologies.
CO2: Design of biometric recognition for the organization.
CO3: Develop simple applications for privacy.
CO4: Understand the need of biometric in the society
CO5: Understand the research in biometric techniques.
TOTAL : 75 PERIODS
REFERENCES:
1. G R Sinha and Sandeep B. Patil, Biometrics: Concepts and Applications, Wiley, 2013
2. Paul Reid, Biometrics for Network Security, Pearson Education, 2003
3. Samir Nanavathi, Micheal Thieme, Raj Nanavathi, Biometrics – Identity verification in a
networked world, Wiley – dream Tech, 2002.
4. John D Woodward, Jr.; Nicholas M Orlans; Peter T Higgins, Biometrics – The Ultimate
Reference, Wiley Dreamtech.College Publications, 2015.
5. Khalid Saeed, “New Directions in Behavioral Biometrics', CRC Press 2020.
6. Ruud M. Bolle, Sharath Pankanti, Nalini K. Ratha, Andrew W. Senior, Jonathan H. Connell,
Guide to Biometrics, Springer 2009.
7. Rafael C. Gonzalez, Richard Eugene Woods, Digital Image Processing using MATLAB, 2 nd
Edition, Tata McGraw-Hill Education 2010.
CO-PO Mapping
CO POs
17
LIST OF EXPERIMENTS:
1. Implementation to gather information from any PC connected to the LAN using
whois, port scanners, network scanning, Angry IP scanners etc.
2. Implementation of Claiming ownership of digital entity
3. Implementation of Tracing the digital theft in cyberspace
4. Implementation of Data hiding in different image types
5. Implementation of MITM- attack using wireshark/ network sniffers
6. Implementation of Windows security using firewall and other tools
7. Implementation to identify web vulnerabilities, using OWASP project
8. Implementation of IT Audit, malware analysis and Vulnerability assessment and generate the
report.
9. Implementation of OS hardening and RAM dump analysis to collect the artifacts and other
information.
10. Implementation of Cyber Forensics tools for Disk Imaging, Data acquisition, Data extraction
and Data Analysis and recovery.
TOTAL: 30 PERIODS
TOTAL:45+30=75 PERIODS
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Understand the broad set of technical, social & political aspects of Cyber Security
CO2: Describe the operational and organizational Cyber Security Aspects
CO3: Identify and assess different types of Cyber security breaches and possible solutions for a
robust system
CO4: understand cyber-attacks, and also how to protect the entire Internet community from such
attacks
CO5: Demonstrate the ability to select and design among available security solutions based on
different domains of cyber systems
REFERENCES:
1. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in Computing, 5th
Edition , Pearson Education , 2018
2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, Wiley India Pvt. Ltd. , 2011
3. B. B. Gupta, D. P. Agrawal, Haoxiang Wang, Computer and Cyber Security: Principles,
Algorithms, Applications, and Perspectives, CRC Press, 2018.
4. George K.Kostopoulos, Cyber Space and Cyber Security, CRC Press, 2013.
5. Martti Lehto, Pekka Neittaanmäki, Cyber Security: Analytics, Technology and Automation,
Springer International Publishing Switzerland 2015
6. Chwan-Hwa (John) Wu, J. David Irwin, Introduction to Computer Networks and Cyber security,
CRC Press T&F Group, 2013.
7. James Graham, Richard Howard and Ryan Otson, Cyber Security Essentials, CRC Press T&F
Group, 2011
CO-PO Mapping
CO POs
18
3 2 -
2 2 1 2
1 -
3 1 - 3
2 2 -
4 2 2
3
5 3 2 2 2 2
Avg 2 2 2.2 2.5 2 2.333333
19
UNIT IV CLOUD, NETWORK AND MOBILE FORENSICS 9
Working with the cloud vendor, obtaining evidence, reviewing logs and APIs
Mobile Forensics techniques, Mobile Forensics Tools - Android Device – Analysis- Android Malware
– iOS Forensic Analysis – SIM Forensic Analysis – Case study
Recent trends in Mobile Forensic Technique and methods to Search and Seize Electronic Evidence
COURSE OUTCOMES:
At the end of this course, the students will be able to :
CO1: Understand the responsibilities and liabilities of a computer forensic investigator
CO2: Identify potential sources of electronic evidence.
CO3: Understand the importance of maintaining the integrity of digital evidence.
CO4: Demonstrate the ability to perform basic forensic data acquisition and analysis using
computer and network based applications and utilities.
CO5: Understand relevant legislation and codes of ethics.
REFERENCES:
1. J. R. Vacca, Computer forensics: Computer Crime Scene investigation, 2nd Ed. Hanover,
NH, United States: Charles River Media, 2002, Laxmi Publications, 1st Edition, 2015.
2. C. Altheide, H. Carvey, and R. Davidson, Digital Forensics with Open Source Tools: Using
Open Source Platform Tools for Performing Computer Forensics on Target Systems:
Windows, Mac, Linux, Unix, etc, 1st Ed. United States: Syngress, 2011.
3. S. Bommisetty, R. Tamma, and H. Mahalik, Practical Mobile Forensics: Dive into Mobile
Forensics on IOS, Android, Windows, and blackBerry devices with this action-packed,
practical guide. United Kingdom: Packt Publishing, 2014.
4. G. Gogolin, Digital Forensics Explained, 1st Ed. Boca Raton, FL: CRC Taylor & Francis, 1st
Edition, Auerbach Publications, 2013.
5. A. Hoog and J. McCash, Android forensics: Investigation, Analysis, and Mobile Security for
Google Android. Waltham, MA: Syngress Media, U.S., 2011.
6. B. Nelson, A. Phillips, F. Enfinger, and C. Steuart, Guide to Computer Forensics and
Investigations, Second edition, 2nd Ed. Boston: Thomson Course Technology, 2009.
7. C. Altheide and H. Carvey, “Digital Forensics with Open Source Tools”, 2011 Publisher(s):
Syngress.
8. J. Sammons, “The Basics of Digital Forensics- The Primer for Getting Started in Digital
Forensics”, 1st Edition, Syngress, 2012.
9. Nelson, Phillips and Enfinger Steuart, “Guide to Computer Forensics and Investigations”, 6th
Edition, Cengage Learning, New Delhi, 2020.
20
CO-PO Mapping
CO POs
COURSE OBJECTIVES:
To acquire the knowledge of using advanced tree structures
To learn the usage of heap structures
To understand the usage of graph structures and spanning trees
To understand the problems such as matrix chain multiplication, activity selection
and Huffman coding
To understand the necessary mathematical abstraction to solve problems.
LIST OF EXPERIMENTS:
1: Implementation of recursive function for tree traversal and Fibonacci
2: Implementation of iteration function for tree traversal and Fibonacci
3: Implementation of Merge Sort and Quick Sort
4: Implementation of a Binary Search Tree
5: Red-Black Tree Implementation
6: Heap Implementation
7: Fibonacci Heap Implementation
8: Graph Traversals
9: Spanning Tree Implementation
10: Shortest Path Algorithms (Dijkstra's algorithm, Bellman Ford Algorithm)
11: Implementation of Matrix Chain Multiplication
12: Activity Selection and Huffman Coding Implementation
HARDWARE/SOFTWARE REQUIREMENTS
1: 64-bit Open source Linux or its derivative
2: Open Source C++ Programming tool like G++/GCC
TOTAL : 60 PERIODS
COURSE OUTCOMES:
CO1: Design and implement basic and advanced data structures extensively
CO2: Design algorithms using graph structures
21
CO3: Design and develop efficient algorithms with minimum complexity using design
techniques
CO4: Develop programs using various algorithms.
CO5: Choose appropriate data structures and algorithms, understand the ADT/libraries,
and use it to design algorithms for a specific problem.
REFERENCES:
1. Lipschutz Seymour, “Data Structures Schaum's Outlines Series”, Tata McGraw Hill, 3rd
Edition, 2014.
2. Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman, “Data Structures and Algorithms”,
Pearson Education, Reprint 2006.
3. http://www.coursera.org/specializations/data-structures-algorithms
4. http://www.tutorialspoint.com/data_structures_algorithms
5. http://www.geeksforgeeks.org/data-structures/
CO-PO Mapping
CO POs
22
UNIT II BLOCK CIPHERS AND MODES OF OPERATIONS 8
Simplified DES - Data Encryption Standard-Block cipher principles-block cipher modes of operation-
AES-TripleDES-Blowfish-RC5
23
4. Douglas R Stinson and Maura B. Paterson, “Cryptography – Theory and practice”, Fourth
Edition, CRC Press,2018 (UNIT -I)
5. William Stallings, Cryptography and Network Security, Seventh Edition, Pearson Education,
2017. (UNIT I,II,III,IV)
CO-PO Mapping
CO POs
CP4252 LTPC
MACHINE LEARNING
302 4
COURSE OBJECTIVES:
To understand the concepts and mathematical foundations of machine learning and types of
problems tackled by machine learning
To explore the different supervised learning techniques including ensemble methods
To learn different aspects of unsupervised learning and reinforcement learning
To learn the role of probabilistic methods for machine learning
To understand the basic concepts of neural networks and deep learning
24
UNIT IV PROBABILISTIC METHODS FOR LEARNING- 9
Introduction -Naïve Bayes Algorithm -Maximum Likelihood -Maximum Apriori -Bayesian Belief
Networks -Probabilistic Modelling of Problems -Inference in Bayesian Belief Networks – Probability
Density Estimation - Sequence Models – Markov Models – Hidden Markov Models
25
e. Project proposal You must turn in a brief project proposal. Your project proposal should
describe the idea behind your project. You should also briefly describe software you will
need to write, and papers (2-3) you plan to read.
List of Projects (datasets available)
1. Sentiment Analysis of Product Reviews
2. Stock Prediction
3. Sales Forecasting
4. Music Recommendation
5. Handwriting Digit Classification
6. Fake News Detection
7. Sports Prediction
8. Object Detection
9. Disease Prediction
COURSE OUTCOMES:
Upon the completion of course, students will be able to
CO1: Understand and outline problems for each type of machine learning
CO2: Design a Decision tree and Random forest for an application
CO3: Implement Probabilistic Discriminative and Generative algorithms for an application and analyze
the results.
CO4: Use a tool to implement typical Clustering algorithms for different types of applications.
CO5: Design and implement an HMM for a Sequence Model type of application and identify
applications suitable for different types of Machine Learning with suitable justification.
TOTAL:75 PERIODS
REFERENCES
1. Stephen Marsland, “Machine Learning: An Algorithmic Perspective”, Chapman & Hall/CRC, 2nd
Edition, 2014.
2. Kevin Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012
3. Ethem Alpaydin, “Introduction to Machine Learning”, Third Edition, Adaptive Computation and
Machine Learning Series, MIT Press, 2014
4. Tom M Mitchell, “Machine Learning”, McGraw Hill Education, 2013.
5. Peter Flach, “Machine Learning: The Art and Science of Algorithms that Make Sense of Data”,
First Edition, Cambridge University Press, 2012.
6. Shai Shalev-Shwartz and Shai Ben-David, “Understanding Machine Learning: From Theory to
Algorithms”, Cambridge University Press, 2015
7. Christopher Bishop, “Pattern Recognition and Machine Learning”, Springer, 2007.
8. Hal Daumé III, “A Course in Machine Learning”, 2017 (freely available online)
9. Trevor Hastie, Robert Tibshirani, Jerome Friedman, “The Elements of Statistical Learning”,
Springer, 2009 (freely available online)
10. Aurélien Géron , Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts,
Tools, and Techniques to Build Intelligent Systems 2nd Edition, o'reilly, (2017)
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
2 1 - - - -
1
26
2 3 2 1 - 3 2
3 3 2 1 - 1 -
4 3 2 1 1 3 2
5 3 2 1 - 3 2
Avg 3 2 1 1 2 1
27
IRIS recognition system, Active Contours, Flexible Generalized Embedded Coordinates, Fourier-
based Trigonometry and Correction for Off-Axis Gaze, Detecting and excluding eyelashes by
Statistical Inference, Alternative Score Normalization Rules
COURSE OUTCOMES:
CO1: Explain the principles and types of biometric data processing
CO2: Use Image processing operations for biometrics
CO3: Apply techniques required for object detection and face recognition
CO4: Develop techniques required for fingerprint and iris recognition
CO5: Design and evaluate biometric applications
TOTAL: 45 PERIODS
REFERENCES
1. Ruud M. Bolle, SharathPankanti, Nalini K. Ratha, Andrew W. Senior, Jonathan H. Connell,
“Guide to Biometrics",Springer 2013 (Unit 1)
2. Rafael C. Gonzalez, Richard Eugene Woods, "Digital Image Processing using MATLAB",
2nd Edition, Tata McGraw-Hill Education 2010 (Unit 2)
3. Claus Vielhauer, "Biometric user authentication for IT security: from fundamentals to
handwriting", Vol. 18. Springer Science & Business Media, 2005 (Unit 2)
4. Anil Jain, Patrick Flynn, and Arun A. Ross, eds. "Handbook of biometrics", Springer Science
& Business Media, 2007 (Unit 3 & 4)
5. Richard O. Duda, David G.Stork, Peter E. Hart, "Pattern Classification", Wiley 2007
6. Julian Ashbourn, "Biometrics in the New World”, Springer 2014.
7. Zhang, David, Lu, Guangming,“3D Biometrics Systems and Applications”, Springer 2013.
(Unit 5)
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
2 1 - - - -
1
2 1 - - - -
2
3 2 1 - 2 1
3
3 2 1 - 2 1
4
3 2 1 - 2 1
5
3 2 1 - 2 1
Avg
28
BC4291 ETHICAL HACKING LTPC
3 024
COURSE OBJECTIVES:
To understand and analyze security threats & countermeasures related to ethical hacking.
To learn the different levels of vulnerabilities at a system level.
To gain knowledge on the different hacking methods for web services and session hijacking.
To understand the hacking mechanisms on how a wireless network is hacked.
29
13. FTK: Bit level forensic analysis of evidential image and reporting the same.
14. Darkcomet : Develop a malware using Remote Access Tool Darkcomet to take a
remote access over network
15. HTTrack: Website mirroring using Httrack and hosting on a local network.
16. XSS: Inject a client side script to a web application
17. Emailtrackerpro: Email analysis involving header check, tracing the route. Also perform
a check on a spam mail and non-spam mail
TOTAL:30 PERIODS
COURSE OUTCOMES:
CO1: Understand vulnerabilities, mechanisms to identify vulnerabilities/threats/attacks
CO2: Use tools to identify vulnerable entry points
CO3: Identify vulnerabilities using sniffers at different layers
CO4: Handle web application vulnerabilities
CO5: Identify attacks in wireless networks
TOTAL:75 PERIODS
REFERENCES
1. Kimberly Graves, "Certified Ethical Hacker", Wiley India Pvt Ltd, 2010
2. Michael T. Simpson, "Hands-on Ethical Hacking & Network Defense", Course Technology,
2010
3. RajatKhare, "Network Security and Ethical Hacking", Luniver Press, 2006
4. Ramachandran V, “BackTrack 5 Wireless Penetration Testing Beginner’s Guide (3rd ed.).”
Packt Publishing, 2011
5. Thomas Mathew, "Ethical Hacking", OSB publishers, 2003
6. Matthew Hickey, Jennifer Arcuri, “Hands on Hacking: Become an Expert at Next Gen
Penetration Testing and Purple Teaming”, 1st Edition, Wiley, 2020.
7. Jon Ericson, Hacking: The Art of Exploitation, 2nd Edition, NoStarch Press, 2008.
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
- -
1 2 3 - 3
-
2 3 2 1 2
3 3 -
3 2 2
- - -
4 2
-
5 2 2
Avg 2.2 2.5 2 3 2 2.5
30
BC4211 BIOMETRIC DATA PROCESSING LABORATORY LTPC
0 042
COURSE OBJECTIVES:
To learn to implement Image Enhancement and Segmentation.
To learn to implement Fingerprint Acquisition and Feature Extraction.
To learn to implement Iris Acquisition and Face and Feature Extraction.
To learn to implement 3D Biometric and Mobile Biometrics.
LIST OF EXPERIMENTS:
1:Implementation of Image Enhancement
2:Implementation of Image Segmentation
3:Implementation of Fingerprint Image Acquisition
4:Implementation of Fingerprint Feature Extraction
5:Implementation of Face Image Acquisition
6: Implementation of Face Feature Extraction
7: Implementation of Iris Image Acquisition
8: Implementation of Iris Feature Extraction
9: Implementation of 3D Biometric – Palmprint
10: Implementation of Mobile biometrics
COURSE OUTCOMES:
CO1:Design and Apply Image Enhancement and Segmentation.
CO2:Design and Apply Fingerprint Acquisition and Feature Extraction
CO3: Design and Apply Face and Iris Acquisition and Feature Extraction
CO4:Design and Apply 3D Biometric
CO5: Implement Mobile Biometrics
TOTAL: 60 PERIODS
CO-PO Mapping
CO POs
31
1. Selecting a subject, narrowing the subject into a topic
2. Stating an objective.
3. Collecting the relevant bibliography (atleast 15 journal papers)
4. Preparing a working outline.
5. Studying the papers and understanding the authors contributions and critically analysing
each paper.
6. Preparing a working outline
7. Linking the papers and preparing a draft of the paper.
8. Preparing conclusions based on the reading of all the papers.
9. Writing the Final Paper and giving final Presentation
Please keep a file where the work carried out by you is maintained.
Activities to be carried out
32
Pick a recent survey of the field so
you can quickly gain an overview,
Find relationships with respect to
each other and to your topic area
(classification
scheme/categorization)
Mark in the hard copy of papers
whether complete work or
section/sections of the paper are
being considered
33
evaluation is based
on your conclusions
about each paper)
Draft outline 1 Prepare a draft Outline, your survey goals, 8th week 8%
and Linking along with a classification / categorization ( this component will
papers diagram be evaluated based
on the linking and
classification among
the papers)
Abstract Prepare a draft abstract and give a 9th week 6%
presentation (Clarity, purpose and
conclusion)
6% Presentation &
Viva Voce
Introduction Write an introduction and background 10th week 5%
Background sections ( clarity)
Sections of the Write the sections of your paper based on 11thweek 10%
paper the classification / categorization diagram (this component will
in keeping with the goals of your survey be evaluated based
on the linking and
classification among
the papers)
Your conclusions Write your conclusions and future work 12th week 5% ( conclusions –
clarity and your
ideas)
Final Draft Complete the final draft of your paper 13th week 10% (formatting,
English, Clarity and
linking)
4% Plagiarism Check
Report
Seminar A brief 15 slides on your paper 14th & 15th 10%
week (based on
presentation and
Viva-voce)
TOTAL: 30 PERIODS
34
UNIT I SOFTWARE SECURITY 8
Security Concepts, Security Policy, Security Flaws, Vulnerabilities, Exploitation and Mitigations.
Software Security problems, Classification of Vulnerabilities.
COURSE OUTCOMES:
CO1: Apply secure coding practices when developing a software.
CO2: Understand and perform a static analysis and security review of a software code.
CO3: Evaluate strings and integer vulnerabilities in a software code.
CO4: Handle inputs, overflow mechanisms, errors and exceptions in a software code.
CO5: Design a secure web application by performing input and output validation techniques on
the web.
TOTAL: 45 PERIODS
REFERENCES
1. Seacord, R. C., Secure Coding in C and C++, AddisonWesley, Software Engineering
Institute, 2nd edition, 2013. (UNIT- III)
2. Chess, B., and West, J., Secure Programming with Static Analysis, Addison Wesley
Software Security Series, 2007. (UNIT-II,IV,V)
3. Seacord, R. C., The CERT C Secure Coding Standard, Pearson Education, 2009.
4. Howard, M., LeBlanc, D., Writing Secure Code, 2nd Edition. Pearson Education, 2002.
35
CO-PO Mapping
CO POs
36
COURSE OUTCOMES:
CO1: To design cryptographic algorithms and carry out their implementation.
CO2: To carry out cryptanalysis on cipher.
CO3: To be able to design and implement security based internet protocols.
CO4: To carry out system security for other layers.
CO5: To understand the importance of intrusion detection and prevention system and
wireless hacking.
TOTAL: 45 PERIODS
REFERENCES
1. Behrouz A. Ferouzan, Debdeep Mukhopadhyay ―Cryptography & Network Security, 3rd
edition, Tata McGraw Hill, 2015.
2. William Stallings “Network Security Essentials Applications and Standards", Pearson
Education., 5th Edition, 2014.
3. Ryan Russell, " Hack Proofing your network ", Wiley,2nd Edition,2002.
4. David M. Durton, “Elementary Number Theory”, Tata Mcgraw Hill, Sixth Edition, 2009.
5. Jonathan Katz, Yehuda Lindell, "Introduction to Modern Cryptography: Principles and
Protocols (Chapman & Hall/CRC Cryptography and Network Security Series)", 1st Edition
,CRC Press Taylor and Francis Group, 2008.
6. Douglas R. Stinson," Cryptography: Theory and Practice, Third Edition (Discrete
Mathematics and Its Applications), Chapman & Hall/CRC, 2005.
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
1 3 2 2 1
3 - - 2
2 2
- 3
3 2 2 2
3 -
4 2 - 2
- 2
5 1 3 - 3
Avg 2 2.333333 3 2.5 2 2
37
Certificate Life Cycles, PKI Standards, Third Party CA Systems, Secure Socket Layer(SSL), CA
System Attacks, Key Escrow Vs Key Recovery, Certification Practices, Securing Business
Applications, PKI Readiness.
COURSE OUTCOMES:
After the completion of this course, students will be able to
CO1: Understand the core fundamentals of public key infrastructures
CO2: Develop and use secure Public Key Algorithms
CO3: Design, Implement and Manage the public key infrastructures
CO4: Identify the security threats to E-commerce
CO5: Evaluate use of PKI for different applications
TOTAL: 45 PERIODS
REFERENCES
1. Larry Caffrey, Rogers W’O. Okot-Uma, “Trusted Services and Public Key Infrastructure PKI)
International Council of Information Technology in Government Administration, 2000.
2. Cartisle Adams, Steve Lloyd, “Understanding PKI: Concepts, Standards and Deployment
Considerations:, Pearson Education, 2003.
3. Vacca R Vacca, “Public Key Infrastructure: Building Trusted Applications and Web Services”,
CRC Press LLC 2004.
4. Andrew Nash, William Daune, Celia Joseph and Derek Brink, “PKI – Implementing and
Managing E-Security, Tata McGraw-Hill Edition, 2001.
5. GrayP.Schneider, “Electronic Commerce”, Fourth Annual Edition, 2003.
38
6. Roberta Bragg, Mark Phodes-Ousley and Keith Strassberg, “The Complete Reference
Network Security”, Tata McGraw-Hill Edition, 2004.
7. Bruce Schneier, “Applied Cryptography”, John Willey and Sons, 2001.
CO-PO Mapping
CO POs
UNIT I INTRODUCTION 9
Introduction, Computer system organization and architecture, Operating system structure and
operations, Process Management, Memory Management, file systems management Protection and
security, Scheduling Algorithms, Interprocess Communication
39
UNIT IV SYSTEM ADMINISTRATION 9
Security Basics, Securing the Server Itself, Maintenance and Recovery, Monitoring and Audit,
Introduction to Linux Systems, Configuration Management, Log Auditing and Vulnerability
Assessment.
COURSE OUTCOMES:
CO1:Understand the operating system’s security concepts and its security control
mechanisms.
CO2:Demonstrate the Access control matrix, access control list and Lampson‘s access
matrix
CO3:Identify the Encryption Techniques, Authentication and Password Security issues
CO4:Understand the security threats and attacks on cryptographic systems
CO5: Apply the security and protection mechanisms for different operating systems
TOTAL: 45 PERIODS
REFERENCES
1. Abraham Silberschatz, Peter Baer Galvin, Greg Gagne, “Operating System Concepts”, 10th
Edition, Wiley Publication, 2018 (Unit 1)
2. Dhananjay M. Dhamdhere, “Operating Systems: A Concept-Based Approach”, 3rd Edition,
McGraw- Hill, 2015 (Unit 2, 3)
3. Jordan Krause, “Windows Server 2016 Security, Certificates, and Remote Access
Cookbook: Recipe-based guide for security, networking and PKI in Windows Server 2016”,
Pckt Publishing, 2018.
4. Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley, Dan Mackin,“Linux Administration
Handbook”, Fifth Edition, Addison-Wesley, 2017 (Unit 5)
5. Promod Chandra P Bhat,, “An Introduction to Operating Systems: Concepts and practice”,
5th Edition, Prentice Hall of India, 2019.
6. William Stalling, “Operating System: Internals and Design Principles”, 9th Edition, Pearson,
2017.
7. Tom Adelstein and Bill Lubanovic, “Linux System Administration”, 1st Edition, Shroff., 2012.
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
- -
1 2 3 -
2 3 2 3 2 2
- 2
3 2 1
- 3
4 2 2
-
5 3 2 3 2 1
40
Avg 2.4 2 3 2.5 2.333333 1.5
COURSE OUTCOMES:
CO1: Understand the core fundamentals of system security
CO2: Apply the security concepts to wired and wireless networks
CO3: Implement and Manage the security essentials in IT Sector
CO4: Explain the concepts of Cyber Security and Cyber forensics
CO5: Be aware of Privacy and Storage security Issues.
TOTAL: 45 PERIODS
REFERENCES
1. John R. Vacca, Computer and Information Security Handbook, Third Edition, Elsevier 2017
41
2. Michael E. Whitman, Herbert J. Mattord, Principles of Information Security, Seventh Edition,
Cengage Learning, 2022
3. Richard E. Smith, Elementary Information Security, Third Edition, Jones and Bartlett Learning,
2019
4. Mayor, K.K.Mookhey, Jacopo Cervini, Fairuzan Roslan, Kevin Beaver, Metasploit Toolkit for
Penetration Testing, Exploit Development and Vulnerability Research, Syngress publications,
Elsevier, 2007. ISBN : 978-1-59749-074-0
5. John Sammons, “The Basics of Digital Forensics- The Primer for Getting Started in Digital
Forensics”, Syngress, 2012
6. Cory Altheide and Harlan Carvey, “Digital Forensics with Open Source Tools”,2011 Syngress,
ISBN: 9781597495875.
7. Siani Pearson, George Yee "Privacy and Security for Cloud Computing" Computer
Communications and Networks, Springer, 2013.
CO-PO Mapping
CO POs
43
Suggested Evaluation Methods:
1. Group discussion on case studies.
COURSE OUTCOMES:
CO1:Identify the security challenges and issues that may arise in any system.
1. CO2:Implement the concepts of steganography, digital watermarking techniques.
2. CO3:Design secure applications using steganography and watermarking schemes
3. CO4:Apply concepts on digital rights management while developing secure systems
4. CO5:Design a secure multimedia system using encryption and privacy preservation techniques.
TOTAL: 45 PERIODS
REFERENCES
1. Frank Shih, “Digital Watermarking and Steganography: Fundamentals and Techniques”,
CRC Press,Second Edition 2017.
2. Fathi E. Abd El-Samie, HossamEldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen,
Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili , “Image Encryption: A
Communication Perspective”, CRC Press,First Edition 2013.
3. Douglas R. Stinson, “Cryptography Theory and Practice”, Fourth Edition, Chapman &
Hall/CRC,2006
4. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, 2006.
5. Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich and TonKalker, “Digital
Watermarking and Steganography”, Second Edition, Elsevier, 2007.
CO-PO Mapping
CO POs
44
UNIT I ATTACKS IN BIOMETRIC 9
Adversary attacks-attacks at the user Interface-Attacks on the biometric processing, Attacks on
template database –system security analysis – spoofing and mimicry attacks
COURSE OUTCOMES:
CO1: Implement basic security algorithms required by the biometric system
CO2: Analyze the vulnerabilities in biometric system and hence be able to design a security
Solution
CO3: Analyze the possible security attacks in complex real time systems and their effective
Countermeasures
CO4: Identify the security issues in the network and resolve it
CO5: Formulate research problems in the biometric security field
TOTAL: 45 PERIODS
REFERENCES
1. David Check Ling Ngo,Andrew Beng Jin Teoh,Jiankun Hu "Biometric Security", Cambridge
Scholars,2015
2. Els. J.Kindt, “Privacy and data protection issues of Biometric Applications “, Springer,2013.
3. Eliza Yinzi Du, “Biometrics from fiction to practice”, Panstandford Publishers 2012
4. James wayman, “Introduction to Biometrics”, Springer 2011
5. Liangwang,Xin Geng "Behavioral Biometrics for Human Identifications Intelligent
Applications" Medical Information Science Reference, IGI Global 2010
6. Patrizio campisi "Security and Privacy in Biometrics", Springer 2013
7. Sanjay G.Kanade “Enhancing Information Security and Privacy”, by combining Biometrics
with Cryptography, Morgan and Claypool Publishers,2012
45
CO-PO Mapping
CO POs
5 3 2 1 2 2 2
Avg 3 2 1 2 2 1
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
- 2 - -
1 2
- - - -
2 2 1
-
3 3 2 1 1 2
-
4 3 2 2 1 1
- - -
5 2
Avg 2.4 1.666667 1.5 2 1 1.5
COURSE OUTCOMES:
CO1: Understand the cloud concepts and fundamentals.
CO2: Explain the security challenges in cloud.
CO3: Define cloud policy and Identity and Access Managements.
CO4: Understand various risks, and audit and monitoring mechanisms in cloud.
CO5: Define the various architectural and design considerations for security in cloud.
TOTAL PERIODS:45
REFERENCES
1. Raj Kumar Buyya , James Broberg, andrzej Goscinski, ―Cloud Computing:‖, Wiley 2013
2. Dave shackleford, ―Virtualization Security‖, SYBEX a wiley Brand 2013.
3. Mather, Kumaraswamy and Latif, ―Cloud Security and Privacy‖, OREILLY 2011
4. Mark C. Chu-Carroll ―Code in the Cloud‖,CRC Press, 2011
5. Mastering Cloud Computing Foundations and Applications Programming Rajkumar
Buyya, Christian Vechhiola, S. Thamarai Selvi
48
CO-PO Mapping
CO POs
UNIT I INTRODUCTION 9
Introduction, Types of Firewalls, Ingress and Egress Filtering, Types of Filtering, Network Address
Translation (NAT), Application Proxy, Circuit Proxy, Content Filtering, Software versus Hardware
Firewalls, IPv4 versus IPv6 Firewalls, Dual-Homed and Triple-Homed Firewalls, Placement of
Firewalls.
COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Show the fundamental knowledge of Firewalls and it types
CO2: Construct a VPN to allow Remote Access, Hashing, connections with Cryptography
and VPN Authorization
CO3: Elaborate the knowledge of depths of Firewalls, Interpreting firewall logs, alerts,
Intrusion and Detection
CO4: Explain the design of Control Systems of SCAD, DCS, PLC‘s and ICS‘s
CO5: Evaluate the SCADA protocols like RTU, TCP/IP, DNP3, OPC,DA/HAD
TOTAL: 45 PERIODS
REFERENCES
1. J. Michael Stewart and Denise Kinsey "Network Security, Firewalls, and VPNs", 3rd Edition,
Jones & Bartlett Learning, October 2020, ISBN: 9781284183696
2. T. Macaulay and B. L. Singer, Cyber security for Industrial Control Systems: SCADA, DCS,
PLC, HMI, and SIS, Auerbach Publications, 2011.
3. J. Lopez, R. Setola, and S. Wolthusen, Critical Infrastructure Protection Information
Infrastructure Models, Analysis, and Defense, Springer-Verlag Berlin Heidelberg, 2012.
4. Robert Radvanovsky and Jacob Brodsky, editors. Handbook of SCADA/Control Systems
Security. Routledge, 2020, ISBN 9780367596668.
5. A.W. Colombo, T. Bangemann, S. Karnouskos, S. Delsing, P. Stluka, R. Harrison, et al.
Industrial cloud-based cyber-physical systems Springer International Publishing, 2014
6. D. Bailey, Practical SCADA for Industry. Burlington, MA: Newnes, 2003.
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
-
1 2 1 - 1 -
-
2 3 2 2 2 1
-
3 3 2 2 2 2
- - - -
4 2
- 3
5 2 2 1 1
Avg 2.4 1.75 2 3 1.5 1.33
COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Undertand the basics of mobile and digital security.
CO2: Explain mobile phone forensics and android forensics.
CO3: Analyse issues in Digital forensics.
CO4: Understand the common data privacy techniques.
CO5: Examine and analyze Digital forensics techniques.
TOTAL: 45 PERIODS
REFERENCES
1. Gregory Kipper, “Wireless Crime and Forensic Investigation”, Auerbach Publications, 2007
2. Iosif I. Androulidakis, “Mobile phone security and forensics: A practical approach”, Springer
publications, Second Edition, 2016
3. Andrew Hoog, “Android Forensics: Investigation, Analysis and Mobile Security for Google
Android”, Elsevier publications, 2011
4. Angus M.Marshall, “ Digital forensics: Digital evidence in criminal investigation”, John – Wiley
and Sons, 2008
51
CO-PO Mapping
CO POs
UNIT I INTRODUCTION 10
Why IAM – roadmap to IAM- concepts of identity and access-The Need for Identity Management-
Who Is in the IT Environment-The Need to Provide Access to Multiple Resources.
COMPLYING WITH REGULATIONS - Health Insurance Portability and Accountability Act (HIPAA),
Federal Security Information Security Act (FISMA).Sarbanes-Oxley Act. Managing Identities in
Distributed Environments Effective identity management.
INDUSTRY STANDARDS FOR IDENTITY MANAGEMENT- Industry standard protocols to enable
cost-effective identity management - Service Provisioning Markup Language (SPML), Security
Assertions Markup Language (SAML), extensible Access Control Markup Language (XACML),
Lightweight Directory Access Protocol (LDAP) and X.500, Directory Services Markup Language
(DSML), Universal Description Discovery Integration (UDDI), Web Services Security(WS-S).
52
Controls (RBAC), Task Based Access Controls (TBAC),Lattice-Based Access Controls. Access
Control Methodologies and Implementations - Access Control Administration - Account
Administration - Account, Log, and Journal Monitoring/Audits- Access Rights and Permissions.
COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Understand the role of IAM with emerging mobile information society, compliance and
regulations and industry standards for Identity management.
CO2: Perform risks assessment
CO3: Compare various access control techniques.
CO4: Choose the appropriate Programming Models and approach
CO5: Carry out analysis and report strength and weakness if IAM in a given typical online
applications.
TOTAL: 45 PERIODS
REFERENCES
1. MessaoudBenantar, ”Access Control Systems: Security, Identity Management and Trust
Models”, IBM Corp, Austin, TX, USA. Library of Congress, ISBN-13: 978-0-387-00445-7
e-ISBN-13: 978-0-387-27716-5.
2. Masha Garibyan, Simon McLeish and John Paschoud, “Access and Identity Management
for Libraries: Controlling access to online information”, Facet Publishing
2014 www.facetpublishing.co.uk.
3. Frank Bresz, Ernst & Young LLP et. al., “Identity and Access Management GTAG'', The
Institute of Internal Auditors, Altamonte Springs, FL32701-4201. 2007.
4. Ray Wagner, “Identity and Access Management”, Digital 2020, ISSA Journal , June 2014
, www.issa.org.
5. Dan Sullivan, “The Definitive Guide to Security Management”,
Realtimepublishers.com chapter5:Identity and Access Management
http://www3.ca.com/ebook/.
6. Elena Ferrari and M. Tamer A-zsu , “Access Control In Data Management Systems”, Morgan
& Claypool Publishers, 2010.
CO-PO Mapping
CO POs
IF4095 LTPC
SOCIAL NETWORK ANALYSIS
3 003
COURSE OBJECTIVES:
Formalise different types of entities and relationships as nodes and edges and represent this
information as relational data.
Understand the fundamental concepts in analyzing the large-scale data that are derived from
social networks
Understand the basic concepts and principles of different theoretical models of social
networks analysis.
Transform data for analysis using graph-based and statistics-based social network measures
Choose among social network designs based on research goals
54
UNIT V LINK ANALYSIS & COMMUNITY DETECTION 9
Search Engine. Crawling. Storage. Indexing. Ranking. Google. Data Structures. Crawling.
Searching. Web Spam Pages Strength of Weak Ties. Triadic Closure. Detecting Communities in a
Network. Girvan-Newman Algorithm. Modularity. Minimum Cut Trees. Tie Strengths in Mobile
Communication Network. Exact Betweenness Centrality. Approximate Betweenness Centrality.
SUGGESTED ACTIVITIES:
1: Twitter Intelligence project performs tracking and analysis of the Twitter
2: Large-Scale Network Embedding as Sparse Matrix Factorization
3: Implement how Information Propagation on Twitter
4: Social Network Analysis and Visualization software application.
5: Implement the Structure of Links in Networks
COURSE OUTCOMES:
CO1: Plan and execute network analytical computations.
CO2: Implement mining algorithms for social networks
CO3: Analyze and evaluate social communities.
CO4: Use social network analysis in behavior analytics
CO5: Perform mining on large social networks and illustrate the results.
TOTAL: 45 PERIODS
REFERENCES
1. Practical Social Network Analysis with Python, Krishna Raj P. M. Ankith Mohan and K. G.
Srinivasa. Springer, 2018
2. SOCIAL NETWORK ANALYSIS: METHODS AND APPLICATIONS, STANLEY
WASSERMAN, and KATHERINE F' AUST. CAMBRIDGE UNIVERSITY PRESS, 2012
3. Social Network Analysis: History, Theory and Methodology by Christina Prell, SAGE
Publications, 1st edition, 2011
4. Sentiment Analysis in Social Networks, Federico Alberto Pozzi, Elisabetta Fersini, Enza
Messina, and Bing. LiuElsevier Inc, 1st edition, 2016
5. Social Network Analysis, John Scott. SAGE Publications, 2012
CO-PO Mapping
CO POs
55
BC4010 DATA PRIVACY L T P C
3 0 0 3
COURSE OBJECTIVES:
To understand the basics of data privacy
To create architectural, algorithmic and technological foundations for the maintenance of the
privacy
To become knowledgeable in Static Data Anonymization Methods.
To analyse anonymization algorithms
To understand the concept of privacy preservation
UNIT I INTRODUCTION 9
Data Privacy and its importance, Need for Sharing Data, Methods of Protecting Data, Importance of
Balancing Data Privacy and Utility, Disclosure, Tabular Data, Micro data, Approaches to Statistical
disclosure control, Ethics, principles, guidelines and regulations, Microdata concepts, Disclosure,
Disclosure risk, Estimating re-identification risk, Non-perturbative microdata masking, Perturbative
microdata masking, Information loss in microdata
COURSE OUTCOMES:
CO1: Become familiar with the basics of privacy.
CO2: Understand how privacy is formalized.
CO3: Understand the common data privacy techniques.
CO4: Able to analyse Static Data Anonymization
CO5: Understand and analyse privacy preservation techniques
TOTAL: 45 PERIODS
56
REFERENCES
1. N. Venkataramanan and A. Shriram, "Data privacy: Principles and practice". CRC Press,
2016. ISBN: 978-1-49-872104-2
2. A. Hundepool, J. Domingo-Ferrer, L. Franconi, S. Giessing, and E. S. Nordholt, P.D. Wolf,
“Statistical disclosure control”, Wiley, John & Sons, 2012. ISBN No.: 978-1-11-997815-2
3. G. T. Duncan, M. Elliot, J.-J. Salazar-González, J.-J. Salazar-Gonzalez, and J. J. Salazar,
"Statistical confidentiality: Principles and practice", Springer-Verlag New York, 2011.
ISBN: 978-1-44-197801-1
4. C. C. Aggarwal and P. S. Yu, "Privacy-preserving data mining: Models and Algorithms",
Springer-Verlag New York, 2008. (ISBN No.: 978-0-387-70992-5)
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
- 2
1 2 3 - 1
- -
2 2 1 3 2
2 -
3 2 1 3 -
- 3
4 2 3 - 1
- -
5 2 1 1 3
Avg 2 1.8 2 2.5 2.333333 1.75
57
UNIT III USING MATLAB 8
Matlab toolboxes - Simulink, Stateflow CPS implementation: From features to software components,
Mapping software components to ECUs, CPS Performance Analysis - effect of scheduling, bus
latency, sense and actuation faults on control performance, network congestion
COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Understand the core principles behind CPS.
CO2: Identify safety specifications and critical properties.
CO3: Understand abstraction in system designs.
CO4: Express pre and postconditions and invariants for CPS models.
CO5: Identify CPS security threats and do the software analysis.
TOTAL: 45 PERIODS
REFERENCES
1. Raj Rajkumar, Dionisio De Niz , and Mark Klein, Cyber-Physical Systems, Addison-Wesley
Professional
2. Rajeev Alur, Principles of Cyber-Physical Systems, MIT Press, 2015.
3. André Platzer, Logical Analysis of Hybrid Systems: Proving Theorems for Complex
Dynamics., Springer, 2010. 426 pages,ISBN 978-3-642-14508-7.
4. Jean J. Labrosse, Embedded Systems Building Blocks: Complete and Ready-To-Use
Modules in C, The publisher, Paul Temme, 2011.
5. Jean-Paul A. Yaacoub, Ola Salman, Hassan N. Noura, NesrineKaaniche, Ali Chehab,
Mohamad Malli, "Cyber-physical systems security: Limitations, issues and future trends",
Microprocessors and Microsystems, Vol 77, 2020, ISSN 0141-9331 (Unit 5)
6. Sajal Das, Krishna Kant, and Nan Zhang, “Handbook on Securing Cyber-Physical
CriticalInfrastructure – Foundations & Challenges”, Morgan Kaufmann, 2012.
7. Awad, A.I., Furnell, S., Paprzycki, M., Sharma, S.K., Security in Cyber-Physical Systems
Foundations and Applications,Springer International Publishing, 2021
58
CO-PO Mapping
CO POs
UNIT I INTRODUCTION 9
Preliminaries, Defining Security in Cryptography, Monoalphabetic Ciphers: Using Direct Standard
Alphabets, The Caesar Cipher, Modular arithmetic, Direct Standard alphabets, Solution of direct
standard alphabets by completing the plain component, Solving direct standard alphabets by
frequency considerations, Alphabets based on decimations of the normal sequence, Solution of
decimated standard alphabets, Monoalphabets based on linear transformation. Polyalphabetic
Substitution: Polyalphabetic ciphers, Recognition of polyalphabetic ciphers, Determination of
number of alphabets, Solution of individual alphabets if standard, Polyalphabetic ciphers with a
mixed plain sequence, Matching alphabets, Reduction of a polyalphabetic cipher to a
monoalphabetic ciphers with mixed cipher sequences
UNIT II TRANSPOSITION 9
Columnar transposition, Solution of transpositions with Completely filled rectangles,
Incompletely filled rectangles, Solution of incompletely filled rectangles – Probable word method,
Incompletely filled rectangles general case, Repetitions between messages; identical length
messages. Sieve algorithms: Introductory example: Eratosthenes’s sieve, Sieving for smooth
composites
59
UNIT IV ALGORITHMS FOR FUNCTIONS 9
Birthday- based algorithms for functions: algorithmic aspects, analysis of random functions,
number-theoretic applications, a direct cryptographic application in the context of blockwise security,
collisions in hash functions. attacks on stream ciphers: LFSR-based key stream generators,
correlation attacks, noisy LFSR model, algebraic attacks, extension to some non- linear
shiftregisters, the cube attack.
COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Apply cryptanalysis in system design to protect it from various attacks.
CO2: Identify and investigate vulnerabilities and security threats and the mechanisms to
counter them.
CO3: Analyze security of cryptographic algorithm against brute force attacks, birthday
attacks.
CO4: Design cryptographic algorithms for functions and carry out their implementation.
CO5: Understand the importance lattice based cryptanalysis
TOTAL: 45 PERIODS
REFERENCES
1. Elementary Cryptanalysis A Mathematical Approach by Abraham Sinkov, The mathematical
Association of America (lnc).
2. Algorithmic Cryptanalysis, by Antoine joux, 1st Edition, CRC Press, 2009.
3. Algebraic Cryptanalysis, Bard Gregory, Springer, 2009
4. Cryptanalysis of Number Theoretic Ciphers, Sameul S. Wag staff, Chapman & Hall/CRC,
2002.
5. Cryptanalysis: A Study of Cipher and Their Solution, Helen F. Gaines,1989
CO-PO Mapping
CO POs
60
BC4013 DATA ANALYTICS FOR FRAUD DETECTION LT PC
3 00 3
COURSE OBJECTIVES:
Discuss the overall process of how data analytics is applied
Discuss how data analytics can be used to better address and identify risks
Help mitigate risks from fraud and waste for our clients and organizations
UNIT I INTRODUCTION 9
Introduction: Defining Fraud, Anomalies versus, Fraud, Types of Fraud, Assess the Risk of Fraud,
Fraud Detection, Recognizing Fraud, Data Mining versus Data Analysis and Analytics, Data
Analytical Software, Anomalies versus Fraud within Data, Fraudulent Data Inclusions and Deletions
COURSE OUTCOMES:
CO1:Formulate reasons for using data analysis to detect fraud.
CO2:Explain characteristics and components of the data and assess its completeness.
CO3:Identify known fraud symptoms and use digital analysis to identify unknown fraud
symptoms.
CO4:Automate the detection process.
CO5:Verify results and understand how to prosecute fraud
TOTAL: 45 PERIODS
REFERENCES
1. Sunder Gee, “Fraud and Fraud Detection: A Data Analytics Approach”, Wiley, 2014, ISBN:
978-1-118-77965-1
2. Bart Baesens, Veronique Van Vlasselaer, WouterVerbeke, "Fraud Analytics Using
Descriptive, Predictive, and Social Network Techniques: A Guide to Data Science for Fraud
Detection", Wiley and SAS Business Series, 2015
3. Han, Kamber, “Data Mining Concepts and Techniques”, 3rd Ed., Morgan Kaufmann
Publishers, 2012
4. Jure Leskovec, Anand Rajaraman, Jeffrey David Ullman, “Mining of Massive Datasets”,
Cambridge University Press, 2nd Ed., 2014.
61
CO-PO Mapping
CO POs
62
SUGGESTED ACTIVITIES:
1. Develop an application for LED Blink and Pattern using Arduino or Raspberry Pi
2. Develop an application for LED Pattern with Push Button Control using Arduino or Raspberry
Pi
3. Develop an application for LM35 Temperature Sensor to display temperature values using
arduino or Raspberry Pi
4. Develop an application for Forest fire detection end node using Raspberry Pi device and
sensor
5. Develop an application for home intrusion detection web application
6. Develop an application for Smart parking application using python and Django for web
application
COURSE OUTCOMES:
CO1: Understand the various concept of the IoT and their technologies
CO2: Develop the IoT application using different hardware platforms
CO3: Implement the various IoT Protocols
CO4: Understand the basic principles of cloud computing
CO5: Develop and deploy the IoT application into cloud environment
TOTAL: 75 PERIODS
REFERENCES:
1. Arshdeep Bahga, Vijay Madisetti, Internet of Things: A hands-on approach, Universities
Press, 2015
2. Dieter Uckelmann, Mark Harrison, Florian Michahelles (Eds), Architecting the Internet of
Things, Springer, 2011
3. Peter Waher, 'Learning Internet of Things', Packt Publishing, 2015
4. Ovidiu Vermesan Peter Friess, 'Internet of Things – From Research and Innovation to
Market Deployment', River Publishers, 2014
5. N. Ida, Sensors, Actuators and Their Interfaces: A Multidisciplinary Introduction, 2nd
EditionScitech Publishers, 202014
6. Reese, G. (2009). Cloud Application Architectures: Building Applications and Infrastructure
in the Cloud. Sebastopol, CA: O'Reilly Media, Inc. (2009)
CO-PO Mapping
CO POs
63
BC4014 MALWARE ANALYSIS L T PC
3 0 2 4
COURSE OBJECTIVES:
To introduce the fundamentals of malware, types and its effects
To enable to identify and analyse various malware types by static analysis
To enable to identify and analyse various malware types by dynamic analysis
To deal with detection, analysis, understanding, controlling, and eradication of malware
REFERENCES
1. Michael Sikorski and Andrew Honig, “Practical Malware Analysis” by No Starch Press,
2012,ISBN: 9781593272906
2. Bill Blunden, “The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System”,
Second Edition,Jones & Bartlett Publishers, 2009.
3. Jamie Butler and Greg Hoglund, “Rootkits: Subverting the Windows Kernel” by 2005,
Addison-Wesley Professional, ISBN:978-0-321-29431-9
4. Bruce Dang, Alexandre Gazet, Elias Bachaalany, SébastienJosse, "Practical Reverse
Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation", 2014,
ISBN: 978-1-118-78731-1
5. Victor Marak, "Windows Malware Analysis Essentials" Packt Publishing, O’Reilly, 2015,
ISBN: 9781785281518
6. Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere,
"Android Malware and Analysis",CRC Press, Taylor & Francis Group, 2015, ISBN:
9781482252194
7. Windows Malware Analysis Essentials by Victor Marak, Packt Publishing, 2015
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
65
- 2
1 3 3 - 1
- -
2 2 1 1 -
2 - 2 3
3 2 3
- - 2 2
4 3 1
- 2 -
5 3 1
Avg 2.6 2 2 2 1.5 2
REFERENCES
1. Theodor Richardson, Charles N Thies, "Secure Software Design", Jones & Bartlett
Publishers, 2013
2. Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley, "Enterprise Software
Security: A Confluence of Disciplines", Addison Wesley Professional, 1st edition, 2014
3. Loren Kohnfelder, Designing Secure Software, No Starch Press, 2021, ISBN:
9781718501928
4. Douglas A. Ashbaugh, Security Software Development Assessing and Managing Security
Risks, Auerbach Publications, 2019, ISBN 9780367386603
5. Mouratidis, H., "Software Engineering for Secure Systems: Industrial and Research
Perspectives",October, 2010, ISBN: 9781615208388
6. Mark S. Merkow, Lakshmikanth Raghavan, Secure and Resilient Software Development,
June 2010, Auerbach Publications, ISBN: 9781498759618
CO-PO Mapping
CO POs
67
BC4016 SECURITY ASSESSMENT AND RISK ANALYSIS LT PC
3 02 4
COURSE OBJECTIVES:
Describe the concepts of risk management
Define and differentiate various Contingency Planning components
Integrate the IRP, DRP, and BCP plans into a coherent strategy to support sustained
organizational operations.
Define and be able to discuss incident response options, and design an Incident Response
Plan for sustained organizational operations.
68
PRACTICALS::
1. To audit the C/ C++ / Python code using RATS code checking tool.
2. Implement Flawfinder stand-alone script to check for calls to know potentially vulnerable
library function calls.
3. Implement FindBugs standalone GUI application, or Eclipse plugin for loading custom rules
set.
4. Implement pychecker stand-alone script to find bugs in the code.
5. Installation of splunk and study basic working as to stores data in its index and therefore
separate database required
6. Implement splunk to discovers useful information automatically without searching manually
7. Implement splunk to converts log data into Visual graphs and reports to simplify analysis,
reporting and troubleshooting
8. Assess and submit a report on cyber security risk assessment for SCADA and DCS
networks.
TOTAL: 30 PERIODS
TOTAL:45+30=75 PERIODS
COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Recommend contingency strategies including data backup and recovery and alternate
site selection for business resumption planning.
CO2: Describe the escalation process from incident to disaster in case of security disaster.
CO3: Design a Disaster Recovery Plan for sustained organizational operations.
CO4: Design a Business Continuity Plan for sustained organizational operations.
CO5: Explain the concept of Operations Security and assessment of threat and
vulnerability.
REFERENCES
1. Michael Whitman and Herbert Mattord, "Principles of Incident Response and Disaster
Recovery", Thomson Course Technology, 2007, ISBN: 141883663X
2. http://www.cnss.gov/Assets/pdf/nstissi_4011.pdf
3. Atle Refsdal, Bj rnar Solhaug, Ketil St len.Cyber-Risk Management, Springer, 2015
4. Martin Weiss; Michael G. Solomon, "Auditing IT Infrastructures for Compliance", Second
Edition,Jones & Bartlett Learning, 2016, ISBN: 9781284090703
5. Mark Talabis and Jason Martin, "Information Security Risk Assessment Toolkit", 1st
Edition, Syngres /Elsevier, 2012, ISBN: 9781597497350
CO-PO Mapping
CO POs
UNIT I INTRODUCTION 6
Information Hiding, Steganography, and Watermarking. History of Watermarking. History of
Steganography, Importance of Digital Watermarking. Importance of Steganography
UNIT II STEGANOGRAPHY 10
Steganographic Communication, The Channel, The BuildingBlocks, Notation and Terminology,
Information - Theoretic Foundations of Steganography, Cachin’s Definition of Steganographic
Security, Practical Steganographic Methods, Statistics Preserving Steganography, Model-Based
Steganography, Steganalysis Scenarios, Detection, Forensic Steganalysis, The Influence of the
Cover Work on Steganalysis, Some Significant Steganalysis Algorithms, LSB Embedding and the
Histogram Attack.
UNIT V APPLICATIONS 9
Applications of Watermarking, Broadcast Monitoring, Copyrights, Proof of Ownership, Transaction
Tracking, Content Authentication, Copy Control, Device Control, Legacy Enhancement.
Applications of Steganography, Steganography for Dissidents, Steganography for Criminals
TOTAL: 45 PERIODS
PRACTICALS:
1. Implementation of secure/Secret Communication of data
2. Experiment on claiming ownership of digital entity
3. Implementation of tracing the digital theft in cyberspace
4. Implementation of application in Block Codes
5. Implementation of universal steganalysis
6. Experiment on target steganalysis
7. Experiment on data hiding in different image types
8. Implementation of statistical steganalysis
70
9. Implementation of reversible data hiding
10. Implementation of Steganography in transform domain and Steganography in
encrypted images
COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Design cryptographic algorithms and carry out their implementation.
CO2: Carry out cryptanalysis on cipher.
CO3: Design and implement security protocols.
CO4: Carry out system security for various threat environments.
CO5: Explain the importance of firewall security for networks.
TOTAL: 30 PERIODS
TOTAL: 45+30=75 PERIODS
REFERENCES
1. Ingemar J. Cox, Mathew L. Miller, Jefrey A. Bloom, Jesica Fridrich, Ton Kalker, “Digital
Watermarking and Steganography”, Morgan Kaufmann Publishers, New York, 2008.
2. Ingemar J. Cox, Mathew L. Miller, Jefrey A. Bloom, “Digital Watermarking”, Morgan
Kaufmann Publishers, New York, 2003
3. Ingemar Cox, Mathew Miller, Jefrey Blom,Jesica Fridrich and Ton Kalker, “Digital
Watermarking and Steganography”, Morgan Kaufmann Publishers, Nov 2007.
4. Juergen Seits, “Digital Watermarking for Digital Media”, IDEA Group Publisher, New York,
2005.
5. Jesica Fridrich, “Steganography in Digital Media: Principles, Algorithms, and Applications”,
Cambridge University press, 2010.
6. Michael Arnold, Martin Schmucker, Stephen D. Wolthusen, “Techniques and Applications
of Digital Watermarking and Content Protection”, Artech House, London, 2003.
7. Peter Wayner, “Disappearing Cryptography – Information Hiding: Steganography &
Watermarking”, Morgan Kaufmann Publishers, New York, 2002.
8. Stefan Katzenbelser and Fabien A. P. Peticolas, “Information hiding techniques for
Steganography and Digital Watermarking”, ARTECH House Publishers, January 2004.
9. Steganography, Ab as Chedad, Vdm Verlag and Dr. Muller, “Digital Image”
Aktiengesellschaft & Co. Kg, Dec 2009.
CO-PO Mapping
CO POs
71
CP4072 BLOCKCHAIN TECHNOLOGIES LT PC
3 02 4
COURSE OBJECTIVES:
This course is intended to study the basics of Blockchain technology.
During this course the learner will explore various aspects of Blockchain technology like
application in various domains.
By implementing, learners will have idea about private and public Blockchain, and smart
contract.
LIST OF EXPERIMENTS:
1. Create a Simple Blockchain in any suitable programming language.
2. Use Geth to Implement Private Ethereum Block Chain.
3. Build Hyperledger Fabric Client Application.
4. Build Hyperledger Fabric with Smart Contract.
5. Create Case study of Block Chain being used in illegal activities in real world.
6. Using Python Libraries to develop Block Chain Application.
TOTAL: 30 PERIODS
SUPPLEMENTARY RESOURCES:
NPTEL online course : https://nptel.ac.in/courses/106/104/106104220/#
Udemy: https://www.udemy.com/course/build-your-blockchain-az/
72
EDUXLABS Online training :https://eduxlabs.com/courses/blockchain-technology-
training/?tab=tab-curriculum
TOTAL: 75 PERIODS
COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Understand and explore the working of Blockchain technology
CO2: Analyze the working of Smart Contracts
CO3: Understand and analyze the working of Hyperledger
CO4: Apply the learning of solidity to build de-centralized apps on Ethereum
CO5: Develop applications on Blockchain
REFERENCES:
1. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology, Decentralization, and
Smart Contracts Explained”, Second Edition, Packt Publishing, 2018.
2. Narayanan, J. Bonneau, E. Felten, A. Miller, S. Goldfeder, “Bitcoin and Cryptocurrency
Technologies: A Comprehensive Introduction” Princeton University Press, 2016
3. Antonopoulos, Mastering Bitcoin, O’Reilly Publishing, 2014. .
4. Antonopoulos and G. Wood, “Mastering Ethereum: Building Smart Contracts and Dapps”,
O’Reilly Publishing, 2018.
5. D. Drescher, Blockchain Basics. Apress, 2017.
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
- 2 -
1 3 2 2
-
2 2 2 2 1
3
3 3 1 - 1 -
-
4 3 2 2 2 3
-
5 3 2 1 3
Avg 2.8 1.8 2 2.5 1.5 2.25
73
UNIT I WEB APPLICATION TECHNOLOGIES 9
Introduction – Evolution of web applications – Web application security – Core defense
mechanisms – Handling user access – Handling user input – Handling attackers – Managing the
application - The OWASP top ten list
Web Application Technologies : Web functionality – Encoding schemes – Mapping the Application
- Enumerating the content and functionality – Analysing the application – Bypassing client side
controls : Transmitting data via the client – Capturing user data – Handling client side data securely
- Input Validation, Blacklist Validation - Whitelist Validation - The Defence-in-Depth Approach -
Attack Surface Reduction Rules of Thumb
74
10. Experimentation on Web application security assessment
11. Sample projects that can be given to students :
12. Experimentation on Broken Authentication and Session Management
13. Experimentation on Cross-site scripting
14. Experimentation on Insecure direct object references
15. Experimentation on Security misconfiguration
16. Experimentation on Missing function level access control
17. Experimentation on Cross-site request forgery
18. Implement using components with known vulnerabilities
COURSE OUTCOMES:
CO1: To understand common vulnerabilities plaguing today's web applications
CO2: To understand security-related issues in web based systems and applications.
CO3: To understand the fundamental security mechanisms of a Web-based system.
CO4: To be able to develop and deploy customized exploits that can bypass common
defenses
CO5: To be able to evaluate a web based system with respect to its security requirements.
TOTAL: 30 PERIODS
TOTAL:45+30=75 PERIODS
REFERENCES
1. B. Sullivan, V. Liu, and M. Howard, Web Application Security, A Beginner’s Guide. New
York: McGraw-Hill Education, 2011.
2. D. Stuttard and M. Pinto, The Web Application Hacker’s Handbook: Discovering and
Exploiting Security Flaws, 2nd ed. Indianapolis, IN: Wiley, John & Sons, 2011.
3. W. Hanqing and L. Zhao, Web Security: A Whitehat Perspective. United Kingdom:
Auerbach Publishers, 2015.
4. M. Shema and J. B. Alcover, Hacking Web Apps: Detecting and Preventing Web
Application Security Problems. Washington, DC, United States: Syngress Publishing,
2014.
CO-PO Mapping
CO POs
75
AUDIT COURSES
REFERENCES:
1. Adrian Wallwork , English for Writing Research Papers, Springer New York Dordrecht
Heidelberg London, 2011
2. Day R How to Write and Publish a Scientific Paper, Cambridge University Press 2006
3. Goldbort R Writing for Science, Yale University Press (available on Google Books) 2006
4. Highman N, Handbook of Writing for the Mathematical Sciences, SIAM. Highman’s
book 1998.
76
AX4092 DISASTER MANAGEMENT LT PC
2 0 00
COURSE OBJECTIVES:
Summarize basics of disaster
Explain a critical understanding of key concepts in disaster risk reduction and humanitarian
response.
Illustrate disaster risk reduction and humanitarian response policy and practice from multiple
perspectives.
Describe an understanding of standards of humanitarian response and practical relevance in
specific types of disasters and conflict situations.
Develop the strengths and weaknesses of disaster management approaches
UNIT I INTRODUCTION 6
Disaster: Definition, Factors and Significance; Difference between Hazard And Disaster; Natural and
Manmade Disasters: Difference, Nature, Types and Magnitude.
77
REFERENCES:
1. Goel S. L., Disaster Administration And Management Text And Case Studies”,Deep & Deep
Publication Pvt. Ltd., New Delhi,2009.
2. NishithaRai, Singh AK, “Disaster Management in India: Perspectives, issues and strategies
“’NewRoyal book Company,2007.
3. Sahni, Pradeep Et.Al. ,” Disaster Mitigation Experiences And Reflections”, Prentice Hall
OfIndia, New Delhi,2001.
Elected Representative, CEO, Municipal Corporation. Pachayati raj: Introduction, PRI: Zila
Panchayat. Elected officials and their roles, CEO Zila Pachayat: Position and role. Block level:
Organizational Hierarchy(Different departments), Village level:Role of Elected and Appointed
officials, Importance of grass root democracy.
78
TOTAL: 30 PERIODS
COURSE OUTCOMES
Students will be able to:
● Discuss the growth of the demand for civil rights in India for the bulk of Indians before the arrival
of Gandhi in Indian politics.
● Discuss the intellectual origins of the framework of argument that informed the
conceptualization
● of social reforms leading to revolution in India.
● Discuss the circumstances surrounding the foundation of the Congress Socialist Party[CSP]
under the leadership of Jawaharlal Nehru and the eventual failure of the proposal of direct
elections through adult suffrage in the Indian Constitution.
● Discuss the passage of the Hindu Code Bill of 1956.
REFERENCES:
1. The Constitution of India,1950(Bare Act),Government Publication.
2. Dr.S.N.Busi, Dr.B. R.Ambedkar framing of Indian Constitution,1st Edition, 2015.
3. M.P. Jain, Indian Constitution Law, 7th Edn., LexisNexis,2014.
4. D.D. Basu, Introduction to the Constitution of India, LexisNexis, 2015.
80
- தமிழ் வளர் சி
் த் துகற (thamilvalarchithurai.com)
6. அறிவியல் களஞ் சியம்
- தமிழ் ப் பல் ககலக்கழகம் , தஞ் ொவூர்
OPEN ELECTIVES
OBJECTIVE
Students will be introduced to the concepts and principles of IWRM, which is inclusive of the
economics, public-private partnership, water & health, water & food security and legal & regulatory
settings.
CO1 Describe the context and principles of IWRM; Compare the conventional and integrated
ways of water management.
CO2 Select the best economic option among the alternatives; illustrate the pros and cons of PPP
through case studies.
81
CO3 Apply law and governance in the context of IWRM.
CO4 Discuss the linkages between water-health; develop a HIA framework.
CO5 Analyse how the virtual water concept pave way to alternate policy options.
REFERENCES:
1. Cech Thomas V., Principles of water resources: history, development, management and
policy. John Wiley and Sons Inc., New York. 2003.
2. Mollinga .P. etal “ Integrated Water Resources Management”, Water in South Asia Volume I,
Sage Publications, 2006.
3. Technical Advisory Committee, Integrated Water Resources management, Technical
Advisory Committee Background Paper No: 4. Global water partnership, Stockholm, Sweden.
2002.
4. Technical Advisory Committee, Dublin principles for water as reflected in comparative
assessment of institutional and legal arrangements for Integrated Water Resources
Management, Technical Advisory Committee Background paper No: 3. Global water
partnership, Stockholm, Sweden. 1999.
5. Technical Advisory Committee, Effective Water Governance”. Technical Advisory Committee
Background paper No: 7. Global water partnership, Stockholm, Sweden, 2003.
UNIT IV GOVERNANCE 9
Public health -Community Health Assessment and Improvement Planning (CHA/CHIP)-
Infrastructure and Investments on Water, (WASH) - Cost Benefit Analysis – Institutional Intervention-
Public Private Partnership - Policy Directives - Social Insurance -Political Will vs Participatory
Governance -
82
UNIT V INITIATIVES 9
Management vs Development -Accelerating Development- Development Indicators -Inclusive
Development-Global and Local- Millennium Development Goal (MDG) and Targets - Five Year Plans
- Implementation - Capacity Building - Case studies on WASH.
TOTAL: 45 PERIODS
OUTCOMES:
CO1 Capture to fundamental concepts and terms which are to be applied and understood all
through the study.
CO2 Comprehend the various factors affecting water sanitation and health through the lens
of third world scenario.
CO3 Critically analyse and articulate the underlying common challenges in water, sanitation
and health.
CO4 Acquire knowledge on the attributes of governance and its say on water sanitation and
health.
CO5 Gain an overarching insight in to the aspects of sustainable resource management in
the absence of a clear level playing field in the developmental aspects.
REFERENCES
1. Bonitha R., Beaglehole R.,Kjellstorm, 2006, “Basic Epidemiology”, 2nd Edition, World Health
Organization.
2. Van Note Chism, N. and Bickford, D. J. (2002), Improving the environment for learning: An
expanded agenda. New Directions for Teaching and Learning, 2002: 91–98.
doi: 10.1002/tl.83Improving the Environment for learning: An Expanded Agenda
3. National Research Council. Global Issues in Water, Sanitation, and Health: Workshop
Summary. Washington, DC: The National Academies Press, 2009.
4. Sen, Amartya 1997. On Economic Inequality. Enlarged edition, with annex by JamesFoster
and Amartya Sen, Oxford: Claredon Press, 1997.
5. Intersectoral Water Allocation Planning and Management, 2000, World Bank Publishers
www. Amazon.com
6. Third World Network.org (www.twn.org).
OBJECTIVES:
To impart knowledge on environmental, social and economic dimensions of sustainability
and the principles evolved through landmark events so as to develop an action mindset for
sustainable development.
83
UNIT II PRINCIPLES AND FRAME WORK 9
History and emergence of the concept of sustainable development - our common future - Stockholm
to Rio plus 20– Rio Principles of sustainable development – Agenda 21 natural step- peoples earth
charter – business charter for sustainable development –UN Global Compact - Role of civil society,
business and government – United Nations’ 2030 Agenda for sustainable development – 17
sustainable development goals and targets, indicators and intervention areas
REFERENCES:
1. Tom Theis and Jonathan Tomkin, Sustainability: A Comprehensive Foundation, Rice
University, Houston, Texas, 2012
84
2. A guide to SDG interactions:from science to implementation, International Council for
Science, Paris,2017
3. Karel Mulder, Sustainable Development for Engineers - A Handbook and Resource Guide,
Rouledge Taylor and Francis, 2017.
4. The New Global Frontier - Urbanization, Poverty and Environmentin the 21st Century -
George Martine,Gordon McGranahan,Mark Montgomery and Rogelio Fernández-Castilla,
IIED and UNFPA, Earthscan, UK, 2008
5. Nolberto Munier, Introduction to Sustainability: Road to a Better Future, Springer, 2006
6. Barry Dalal Clayton and Stephen Bass, Sustainable Development Strategies- a resource
book”, Earthscan Publications Ltd, London, 2002.
UNIT I INTRODUCTION 9
Historical development of Environmental Impact Assessment (EIA). Environmental Clearance- EIA
in project cycle. legal and regulatory aspects in India – types and limitations of EIA –EIA process-
screening – scoping - terms of reference in EIA- setting – analysis – mitigation. Cross sectoral issues
–public hearing in EIA- EIA consultant accreditation.
REFERENCES:
1. EIA Notification 2006 including recent amendments, by Ministry of Environment, Forest and
Climate Change, Government of India
2. Sectoral Guidelines under EIA Notification by Ministry of Environment, Forest and Climate
Change, Government of India
3. Canter, L.W., Environmental Impact Assessment, McGraw Hill, New York. 1996
4. Lawrence, D.P., Environmental Impact Assessment – Practical solutions to recurrent
problems, Wiley-Interscience, New Jersey. 2003
5. Lee N. and George C. 2000. Environmental Assessment in Developing and Transitional
Countries. Chichester: Willey
6. World Bank –Source book on EIA ,1999
7. Sam Mannan, Lees' Loss Prevention in the Process Industries, Hazard Identification
Assessment and Control, 4th Edition, Butterworth Heineman, 2012.
REFERENCES:
1. Singiresu S. Rao, “Mechanical Vibrations”, Pearson Education Incorporated, 2017.
2. Graham Kelly. Sand Shashidhar K. Kudari, “Mechanical Vibrations”, Tata McGraw –Hill
Publishing Com. Ltd., 2007.
3. Ramamurti. V, “Mechanical Vibration Practice with Basic Theory”, Narosa Publishing House,
2000.
4. William T. Thomson, “Theory of Vibration with Applications”, Taylor & Francis, 2003.
5. G.K. Grover, “Mechanical Vibrations”, Nem Chand and Bros.,Roorkee, 2014.
6. A.G. Ambekar, “Mechanical Vibrations and Noise Engineering”, PHI Learning Pvt. Ltd., 2014.
7. David A. Bies and Colin H. Hansen, “Engineering Noise Control – Theory and Practice”, Spon
Press, London and New York, 2009.
L T P C
3 0 0 3
COURSE OBJECTIVES:
To learn the present energy scenario and the need for energy conservation.
To understand the different measures for energy conservation in utilities.
87
Acquaint students with principle theories, materials, and construction techniques to create
energy efficient buildings.
To identify the energy demand and bridge the gap with suitable technology for sustainable
habitat
To get familiar with the energy technology, current status of research and find the ways to
optimize a system as per the user requirement
REFERENCES:
1. Yogi Goswami, Frank Kreith, Energy Efficiency and Renewable energy Handbook, CRC Press,
2016
2. ASHRAE Handbook 2020 – HVAC Systems & Equipment
3. Paolo Bertoldi, Andrea Ricci, Anibal de Almeida, Energy Efficiency in Household Appliances
and Lighting, Conference proceedings, Springer, 2001
4. David A. Bainbridge, Ken Haggard, Kenneth L. Haggard, Passive Solar Architecture: Heating,
Cooling, Ventilation, Daylighting, and More Using Natural Flows, Chelsea Green Publishing,
2011.
5. Guide book for National Certification Examination for Energy Managers and Energy Auditors
6. (Could be downloaded from www.energymanagertraining.com)
88
7. Ibrahim Dincer and Mark A. Rosen, Thermal Energy Storage Systems and Applications, John
Wiley & Sons 2002.
8. Robert Huggins, Energy Storage: Fundamentals, Materials and Applications, 2nd edition,
Springer, 2015
9. Ru-shiliu, Leizhang, Xueliang sun, Electrochemical technologies for energy storage and
conversion, Wiley publications, 2012.
UNIT I INTRODUCTION 9
Need - Development - Rapid Prototyping Rapid Tooling – Rapid Manufacturing – Additive
Manufacturing. AM Process Chain- Classification – Benefits.
9
Education and training - Automobile- pattern and mould - tooling - Building Printing-Bio Printing -
medical implants -development of surgical tools Food Printing -Printing Electronics. Business
Opportunities and Future Directions - Intellectual Property.
TOTAL: 45 PERIODS
REFERENCES:
1. Andreas Gebhardt and Jan-Steffen Hötter “Additive Manufacturing: 3D Printing for Prototyping
and Manufacturing”, Hanser publications, United States, 2015, ISBN: 978-1- 56990-582-1.
89
2. Ian Gibson, David W. Rosen and Brent Stucker “Additive Manufacturing Technologies: Rapid
Prototyping to Direct Digital Manufacturing”, 2nd edition, Springer., United States, 2015, ISBN13:
978-1493921126.
3. Amit Bandyopadhyay and Susmita Bose, “Additive Manufacturing”, 1st Edition, CRC Press.,
United States, 2015, ISBN-13: 978-1482223590
4. Andreas Gebhardt, “Understanding Additive Manufacturing: Rapid Prototyping, Rapid
Manufacturing”, Hanser Gardner Publication, Cincinnati., Ohio, 2011, ISBN :9783446425521.
5. Chua C.K., Leong K.F., and Lim C.S., “Rapid prototyping: Principles and applications”, Third
edition, World Scientific Publishers, 2010.
TEXT BOOK:
1. Ulrich K.T., Eppinger S. D. and Anita Goyal, “Product Design and Development “McGraw-
Hill Education; 7 edition, 2020.
REFERENCES:
1. Belz A., 36-Hour Course: “Product Development” McGraw-Hill, 2010.
2. Rosenthal S.,“Effective Product Design and Development”, Business One Orwin,Homewood,
1992,ISBN1-55623-603-4.
3. Pugh.S,“Total Design Integrated Methods for Successful Product Engineering”, Addison
Wesley Publishing,1991,ISBN0-202-41639-5.
4. Chitale, A. K. and Gupta, R. C., Product Design and Manufacturing, PHI Learning, 2013.
5. Jamnia, A., Introduction to Product Design and Development for Engineers, CRC Press, 2018.
COURSE OBJECTIVES:
To provide students with fundamental knowledge of the notion of corporate sustainability.
To determine how organizations impacts on the environment and socio-technical systems,
the relationship between social and environmental performance and competitiveness, the
approaches and methods.
92
UNIT IV SUSTAINABILITY AND INNOVATION 9
Socio-technical transitions and sustainability, Sustainable entrepreneurship, Sustainable pioneers in
green market niches, Smart communities and smart specializations.
REFERENCES:
1. Daddi, T., Iraldo, F., Testa, Environmental Certification for Organizations and Products:
Management, 2015
2. Christian N. Madu, Handbook of Sustainability Management 2012
3. Petra Molthan-Hill, The Business Student's Guide to Sustainable Management: Principles
and Practice, 2014
4. Margaret Robertson, Sustainability Principles and Practice, 2014
5. Peter Rogers, An Introduction to Sustainable Development, 2006
COURSE OBJECTIVES
To familiarize students with the theory and practice of small business management.
To learn the legal issues faced by small business and how they impact operations.
93
UNIT III BUILDING THE RIGHT TEAM AND MARKETING STRATEGY 9
Management and Leadership – employee assessments – Tuckman’s stages of group development
- The entrepreneurial process model - Delegation and team building - Comparison of HR
management in small and large firms - Importance of coaching and how to apply a coaching model.
Marketing within the small business - success strategies for small business marketing - customer
delight and business generating systems, - market research, - assessing market performance- sales
management and strategy - the marketing mix and marketing strategy.
REFERENCES
1. Hankinson,A.(2000). “The key factors in the profile of small firm owner-managers that influence
business performance. The South Coast Small Firms Survey, 1997-2000.” Industrial and
Commercial Training 32(3):94-98.
2. Parker,R.(2000). “Small is not necessarily beautiful: An evaluation of policy support for small
and medium-sized enterprise in Australia.” Australian Journal of Political Science 35(2):239-
253.
3. Journal articles on SME’s.
UNIT I INTRODUCTION 9
Intellectual property rights - Introduction, Basic concepts, Patents, Copyrights, Trademarks, Trade
Secrets, Geographic Indicators; Nature of Intellectual Property, Technological Research, Inventions
and Innovations, History - the way from WTO to WIPO, TRIPS.
94
UNIT II PROCESS 9
New Developments in IPR, Procedure for grant of Patents, TM, GIs, Patenting under Patent
Cooperation Treaty, Administration of Patent system in India, Patenting in foreign countries.
UNIT V MODELS 9
The technologies Know-how, concept of ownership, Significance of IP in Value Creation, IP
Valuation and IP Valuation Models, Application of Real Option Model in Strategic Decision Making,
Transfer and Licensing.
TOTAL: 45 PERIODS
COURSE OUTCOMES
CO1: Understanding of intellectual property and appreciation of the need to protect it
CO2: Awareness about the process of patenting
CO3: Understanding of the statutes related to IPR
CO4: Ability to apply strategies to protect intellectual property
CO5: Ability to apply models for making strategic decisions related to IPR
REFERENCES
1. Sople Vinod, Managing Intellectual Property by (Prentice hall of India Pvt.Ltd), 2006.
2. Intellectual Property rights and copyrights, EssEss Publications.
3. Primer, R. Anita Rao and Bhanoji Rao, Intellectual Property Rights, Lastain Book company.
4. Edited by Derek Bosworth and Elizabeth Webster, The Management of Intellectual Property,
Edward Elgar Publishing Ltd., 2006.
5. WIPO Intellectual Property Hand book.
95
UNIT II ETHICAL DECISION MAKING AND MANAGEMENT IN A CRISIS 9
Managing in an ethical crisis, the nature of a crisis, ethics in crisis management, discuss case
studies, analyze real-world scenarios, develop ethical management skills, knowledge, and
competencies. Proactive crisis management.
REFERENCES
1. Brad Agle, Aaron Miller, Bill O’ Rourke, The Business Ethics Field Guide: the essential
companion to leading your career and your company, 2016.
2. Steiner & Steiner, Business, Government & Society: A managerial Perspective, 2011.
3. Lawrence & Weber, Business and Society: Stakeholders, Ethics, Public Policy, 2020.
Wireless technologies for IoT: WiFi (IEEE 802.11), Bluetooth/Bluetooth Smart, ZigBee/ZigBee
Smart, UWB (IEEE 802.15.4), 6LoWPAN, Proprietary systems-Recent trends.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
At the end of this course, the students will have the ability to
CO1: Analyze the concepts of IoT and its present developments.
CO2: Compare and contrast different platforms and infrastructures available for IoT
CO3: Explain different protocols and communication technologies used in IoT
CO4: Analyze the big data analytic and programming of IoT
CO5: Implement IoT solutions for smart applications
REFERENCES:
1. ArshdeepBahga and VijaiMadisetti : A Hands-on Approach “Internet of Things”,Universities
Press 2015.
2. Oliver Hersent , David Boswarthick and Omar Elloumi “ The Internet of Things”, Wiley,2016.
3. Samuel Greengard, “ The Internet of Things”, The MIT press, 2015.
4. Adrian McEwen and Hakim Cassimally“Designing the Internet of Things “Wiley,2014.
5. Jean- Philippe Vasseur, Adam Dunkels, “Interconnecting Smart Objects with IP: The Next
Internet” Morgan Kuffmann Publishers, 2010.
6. Adrian McEwen and Hakim Cassimally, “Designing the Internet of Things”, John Wiley and
sons, 2014.
7. Lingyang Song/DusitNiyato/ Zhu Han/ Ekram Hossain,” Wireless Device-to-Device
Communications and Networks, CAMBRIDGE UNIVERSITY PRESS,2015.
8. OvidiuVermesan and Peter Friess (Editors), “Internet of Things: Converging Technologies
for Smart Environments and Integrated Ecosystems”, River Publishers Series in
Communication, 2013.
9. Vijay Madisetti , ArshdeepBahga, “Internet of Things (A Hands on-Approach)”, 2014.
97
10. Zach Shelby, Carsten Bormann, “6LoWPAN: The Wireless Embedded Internet”, John Wiley
and sons, 2009.
11. Lars T.Berger and Krzysztof Iniewski, “Smart Grid applications, communications and
security”, Wiley, 2015.
12. JanakaEkanayake, KithsiriLiyanage, Jianzhong Wu, Akihiko Yokoyama and Nick Jenkins, “
Smart Grid Technology and Applications”, Wiley, 2015.
13. UpenaDalal,”Wireless Communications & Networks,Oxford,2015.
98
COURSE OUTCOMES (CO):
At the end of the course the student will be able to
CO1 : Illustrate the categorization of machine learning algorithms.
CO2: Compare and contrast the types of neural network architectures, activation functions
CO3: Acquaint with the pattern association using neural networks
CO4: Elaborate various terminologies related with pattern recognition and architectures of
convolutional neural networks
CO5: Construct different feature selection and classification techniques and advanced neural
network architectures such as RNN, Autoencoders, and GANs.
REFERENCES:
1. J. S. R. Jang, C. T. Sun, E. Mizutani, Neuro Fuzzy and Soft Computing - A Computational
Approach to Learning and Machine Intelligence, 2012, PHI learning
2. Deep Learning, Ian Good fellow, YoshuaBengio and Aaron Courville, MIT Press, ISBN:
9780262035613, 2016.
3. The Elements of Statistical Learning. Trevor Hastie, Robert Tibshirani and Jerome Friedman.
Second Edition. 2009.
4. Pattern Recognition and Machine Learning. Christopher Bishop. Springer. 2006.
5. Understanding Machine Learning. Shai Shalev-Shwartz and Shai Ben-David. Cambridge
University Press. 2017.
OBJECTIVES:
To impart knowledge on
Different types of renewable energy technologies
Standalone operation, grid connected operation of renewable energy systems
UNIT I INTRODUCTION 9
Classification of energy sources – Co2 Emission - Features of Renewable energy - Renewable
energy scenario in India -Environmental aspects of electric energy conversion: impacts of renewable
energy generation on environment Per Capital Consumption - CO2 Emission - importance of
renewable energy sources, Potentials – Achievements– Applications.
99
UNIT IV WIND ENERGY CONVERSION SYSTEMS 9
Origin of Winds: Global and Local Winds- Aerodynamics of Wind turbine-Derivation of Betz’s limit-
Power available in wind-Classification of wind turbine: Horizontal Axis wind turbine and Vertical axis
wind turbine- Aerodynamic Efficiency-Tip Speed-Tip Speed Ratio-Solidity-Blade Count-Power curve
of wind turbine - Configurations of wind energy conversion systems: Type A, Type B, Type C and
Type D Configurations- Grid connection Issues - Grid integrated SCIG and PMSG based WECS.
OUTCOMES:
After completion of this course, the student will be able to:
CO1: Demonstrate the need for renewable energy sources.
CO2: Develop a stand-alone photo voltaic system and implement a maximum power point
tracking in the PV system.
CO3: Design a stand-alone and Grid connected PV system.
CO4: Analyze the different configurations of the wind energy conversion systems.
CO5: Realize the basic of various available renewable energy sources
REFERENCES:
1. S.N.Bhadra, D. Kastha, & S. Banerjee “Wind Electrical Systems”, Oxford UniversityPress,
2009.
2. Rai. G.D, “Non conventional energy sources”, Khanna publishes, 1993.
3. Rai. G.D,” Solar energy utilization”, Khanna publishes, 1993.
4. Chetan Singh Solanki, “Solar Photovoltaics: Fundamentals, Technologies and Applications”,
PHI Learning Private Limited, 2012.
5. John Twideu and Tony Weir, “Renewal Energy Resources” BSP Publications, 2006
6. Gray, L. Johnson, “Wind energy system”, prentice hall of India, 1995.
7. B.H.Khan, " Non-conventional Energy sources", , McGraw-hill, 2nd Edition, 2009.
8. Fang Lin Luo Hong Ye, " Renewable Energy systems", Taylor & Francis Group,2013.
100
Comparison of Micro grid and Smart grid, Present development & International policies in Smart
Grid, Smart Grid Initiative for Power Distribution Utility in India – Case Study.
REFERENCES
1. Stuart Borlase ‘Smart Grid: Infrastructure, Technology and Solutions’, CRC Press 2012.
2. JanakaEkanayake, Nick Jenkins, KithsiriLiyanage, Jianzhong Wu, Akihiko Yokoyama,
‘Smart Grid: Technology and Applications’, Wiley, 2012.
3. Mini S. Thomas, John D McDonald, ‘Power System SCADA and Smart Grids’, CRC Press,
2015
4. Kenneth C.Budka, Jayant G. Deshpande, Marina Thottan, ‘Communication Networks for
Smart Grids’, Springer, 2014
5. SMART GRID Fundamentals of Design and Analysis, James Momoh, IEEE press, A John
Wiley & Sons, Inc., Publication.
101
DS4015 BIG DATA ANALYTICS LTPC
3 003
COURSE OBJECTIVES:
To understand the basics of big data analytics
To understand the search methods and visualization
To learn mining data streams
To learn frameworks
To gain knowledge on R language
UNIT IV FRAMEWORKS 9
MapReduce – Hadoop, Hive, MapR – Sharding – NoSQL Databases - S3 - Hadoop Distributed
File Systems – Case Study- Preventing Private Information Inference Attacks on Social Networks-
Grand Challenge: Applying Regulatory Science and Big Data to Improve Medical Device
Innovation
UNIT V R LANGUAGE 9
Overview, Programming structures: Control statements -Operators -Functions -Environment and
scope issues -Recursion -Replacement functions, R data structures: Vectors -Matrices and arrays
-Lists -Data frames -Classes, Input/output, String manipulations
COURSE OUTCOMES:
CO1:understand the basics of big data analytics
CO2: Ability to use Hadoop, Map Reduce Framework.
CO3: Ability to identify the areas for applying big data analytics for increasing the business
outcome.
CO4:gain knowledge on R language
CO5: Contextually integrate and correlate large amounts of information to gain faster insights.
TOTAL:45 PERIODS
102
REFERENCE:
1. Michael Berthold, David J. Hand, Intelligent Data Analysis, Springer, 2007.
2. Anand Rajaraman and Jeffrey David Ullman, Mining of Massive Datasets, Cambridge
University Press, 3rd edition 2020.
3. Norman Matloff, The Art of R Programming: A Tour of Statistical Software Design,
No Starch Press, USA, 2011.
4. Bill Franks, Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data
Streams with Advanced Analytics, John Wiley & sons, 2012.
5. Glenn J. Myatt, Making Sense of Data, John Wiley & Sons, 2007.
REFERENCES
1. "The Internet of Things: Enabling Technologies, Platforms, and Use Cases", by Pethuru Raj
and Anupama C. Raman ,CRC Press, 2017
2. Adrian McEwen, Designing the Internet of Things, Wiley,2013.
3. EMC Education Services, “Data Science and Big Data Analytics: Discovering, Analyzing,
Visualizing and Presenting Data”, Wiley publishers, 2015.
4. Simon Walkowiak, “Big Data Analytics with R” PackT Publishers, 2016
5. Bart Baesens, “Analytics in a Big Data World: The Essential Guide to Data Science and its
Applications”, Wiley Publishers, 2015.
104
UNIT IV REHABILITATION AND ASSISTIVE ROBOTS 9
Pediatric Rehabilitation, Robotic Therapy for the Upper Extremity and Walking, Clinical-Based Gait
Rehabilitation Robots, Motion Correlation and Tracking, Motion Prediction, Motion Replication.
Portable Robot for Tele rehabilitation, Robotic Exoskeletons – Design considerations, Hybrid
assistive limb. Case Study
TOTAL:45 PERIODS
COURSE OUTCOMES:
CO1: Describe the configuration, applications of robots and the concept of grippers and actuators
CO2: Explain the functions of manipulators and basic kinematics
CO3: Describe the application of robots in various surgeries
CO4: Design and analyze the robotic systems for rehabilitation
CO5: Design the wearable robots
REFERENCES
1. Nagrath and Mittal, “Robotics and Control”, Tata McGraw Hill, First edition, 2003
2. Spong and Vidhyasagar, “Robot Dynamics and Control”, John Wiley and Sons, First edition,
2008
3. Fu.K.S, Gonzalez. R.C., Lee, C.S.G, “Robotics, control”, sensing, Vision and Intelligence,
Tata McGraw Hill International, First edition, 2008
4. Bruno Siciliano, Oussama Khatib, Springer Handbook of Robotics, 1st Edition, Springer,
2008
5. Shane (S.Q.) Xie, Advanced Robotics for Medical Rehabilitation - Current State of the Art
and Recent Advances, Springer, 2016
6. Sashi S Kommu, Rehabilitation Robotics, I-Tech Education and Publishing, 2007
7. Jose L. Pons, Wearable Robots: Biomechatronic Exoskeletons, John Wiley & Sons Ltd,
England, 2008
8. Howie Choset, Kevin Lynch, Seth Hutchinson, “Principles of Robot Motion: Theory,
Algorithms, and Implementations”, Prentice Hall of India, First edition, 2005
9. Philippe Coiffet, Michel Chirouze, “An Introduction to Robot Technology”, Tata McGraw Hill,
First Edition, 1983
10. Jacob Rosen, Blake Hannaford & Richard M Satava, “Surgical Robotics: System
Applications & Visions”, Springer 2011
11. Jocelyn Troccaz, Medical Robotics, Wiley, 2012
12. Achim Schweikard, Floris Ernst, Medical Robotics, Springer, 2015
TOTAL: 45 PERIODS
COURSE OUTCOMES:
On successful completion of this course, students will be able to
CO1: analyze the 8-bit series microcontroller architecture, features and pin details
CO2: write embedded C programs for embedded system application
CO3: design and develop real time systems using AVR microcontrollers
CO4: design and develop the systems based on vision mechanism
CO5: design and develop a real time home automation system
REFERENCES:
1. Dhananjay V. Gadre, "Programming and Customizing the AVR Microcontroller", McGraw-
Hill, 2001.
2. Joe Pardue, "C Programming for Microcontrollers ", Smiley Micros, 2005.
3. Steven F. Barrett, Daniel J. Pack, "ATMEL AVR Microcontroller Primer : Programming and
Interfacing", Morgan & Claypool Publishers, 2012
4. Mike Riley, "Programming Your Home - Automate With Arduino, Android and Your
Computer", the Pragmatic Programmers, Llc, 2012.
106
5. Richard Szeliski, "Computer Vision: Algorithms and Applications", Springer, 2011.
6. Kevin P. Murphy, "Machine Learning - a Probabilistic Perspective", the MIT Press
Cambridge, Massachusetts, London, 2012.
REFERENCES
1. Andrew Hoffman, Competitive Environmental Strategy - A Guide for the Changing Business
Landscape, Island Press.
2. Stephen Doven, Environment and Sustainability Policy: Creation, Implementation,
Evaluation, the Federation Press, 2005
3. Robert Brinkmann., Introduction to Sustainability, Wiley-Blackwell., 2016
4. Niko Roorda., Fundamentals of Sustainable Development, 3rd Edn, Routledge, 2020
5. Bhavik R Bakshi., Sustainable Engineering: Principles and Practice, Cambridge University
Press, 2019
UNIT I REINFORCEMENTS 9
Introduction – composites –classification and application; reinforcements- fibres and its properties;
preparation of reinforced materials and quality evaluation; preforms for various composites
UNIT II MATRICES 9
Preparation, chemistry, properties and applications of thermoplastic and thermoset resins;
mechanism of interaction of matrices and reinforcements; optimization of matrices
107
UNIT III COMPOSITE MANUFACTURING 9
Classification; methods of composites manufacturing for both thermoplastics and thermosets- Hand
layup, Filament Winding, Resin transfer moulding, prepregs and autoclave moulding,
pultrusion, vacuum impregnation methods, compression moulding; post processing of
composites and composite design requirements
UNIT IV TESTING 9
Fibre volume and weight fraction, specif ic gravity of composites, tensile, f lexural, impact,
compression, inter laminar shear stress and fatigue properties of thermoset and thermoplastic
composites.
UNIT V MECHANICS 9
Micro mechanics, macro mechanics of single layer, macro mechanics of laminate, classical
lamination theory, failure theories and prediction of inter laminar stresses using at ware
TOTAL: 45 PERIODS
REFERENCES
1. BorZ.Jang,“Advanced Polymer composites”,ASM International,USA,1994.
2. Carlsson L.A. and Pipes R.B., “Experimental Characterization of advanced
composite Materials”,SecondEdition,CRCPress,NewJersey,1996.
3. George LubinandStanley T.Peters, “Handbook of Composites”, Springer Publications,1998.
4. Mel. M. Schwartz, “Composite Materials”, Vol. 1 &2, Prentice Hall PTR, New Jersey,1997.
5. RichardM.Christensen,“Mechanics of compositematerials”,DoverPublications,2005.
6. Sanjay K. Mazumdar, “Composites Manufacturing: Materials, Product, and Process
Engineering”,CRCPress,2001
108
UNIT V NANOCOMPOSITE TECHNOLOGY 9
Nanocomposite membrane structures- Preparation and applications. Nanotechnology in Textiles
and Cosmetics-Nano-fillers embedded polypropylene fibers – Soil repellence, Lotus effect - Nano
finishing in textiles (UV resistant, anti-bacterial, hydrophilic, self-cleaning, flame retardant finishes),
Sun-screen dispersions for UV protection using titanium oxide – Colour cosmetics.
Nanotechnology in Food Technology - Nanopackaging for enhanced shelf life - Smart/Intelligent
packaging.
TOTAL : 45 PERIODS
REFERENCES:
1. Introduction to Nanocomposite Materials. Properties, Processing, Characterization- Thomas
E. Twardowski. 2007. DEStech Publications. USA.
2. Nanocomposites Science and Technology - P. M. Ajayan, L.S. Schadler, P. V.Braun 2006.
3. Physical Properties of Carbon Nanotubes- R. Saito 1998.
4. Carbon Nanotubes (Carbon , Vol 33) - M. Endo, S. Iijima, M.S. Dresselhaus 1997.
5. The search for novel, superhard materials- Stan Vepr¡ek (Review Article) JVST A, 1999
6. Nanometer versus micrometer-sized particles-Christian Brosseau, Jamal BeN Youssef,
Philippe Talbot, Anne-Marie Konn, (Review Article) J. Appl. Phys, Vol 93, 2003
7. Diblock Copolymer, - Aviram (Review Article), Nature, 2002
8. Bikramjit Basu, Kantesh Balani Advanced Structural Ceramics, A John Wiley & Sons, Inc.,
9. P. Brown and K. Stevens, Nanofibers and Nanotechnology in Textiles, Woodhead
publication, London, 2006
UNIT I IPR 9
Intellectual property rights – Origin of the patent regime – Early patents act & Indian
pharmaceutical industry – Types of patents – Patent Requirements – Application preparation filing
and prosecution – Patentable subject matter – Industrial design, Protection of GMO’s IP as a factor
in R&D,IP’s of relevance to biotechnology and few case studies.
109
UNIT IV GENETICALLY MODIFIED ORGANISMS 9
Definition of GMOs & LMOs – Roles of Institutional Biosafety Committee – RCGM – GEAC etc.
for GMO applications in food and agriculture – Environmental release of GMOs – Risk Analysis –
Risk Assessment – Risk management and communication – Overview of National Regulations
and relevant International Agreements including Cartegana Protocol.
REFERENCES
1. Bouchoux, D.E., “Intellectual Property: The Law of Trademarks, Copyrights, Patents, and
Trade Secrets for the Paralegal”, 3rd Edition, Delmar Cengage Learning, 2008.
2. Fleming, D.O. and Hunt, D.L., “Biological Safety: Principles and Practices”, 4th Edition,
American Society for Microbiology, 2006.
3. Irish, V., “Intellectual Property Rights for Engineers”, 2nd Edition, The Institution of
Engineering and Technology, 2005.
4. Mueller, M.J., “Patent Law”, 3rd Edition, Wolters Kluwer Law & Business, 2009.
5. Young, T., “Genetically Modified Organisms and Biosafety: A Background Paper for
Decision- Makers and Others to Assist in Consideration of GMO Issues” 1st Edition, World
Conservation Union, 2004.
6. S.S Khanka, “Entrepreneurial Development”, S.Chand & Company LTD, New Delhi, 2007.
110