0% found this document useful (0 votes)
84 views110 pages

M.E. BCS

subject
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views110 pages

M.E. BCS

subject
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 110

ANNA UNIVERSITY, CHENNAI

NON - AUTONOMOUS COLLEGES AFFILIATED ANNA UNIVERSITY


M.E. BIOMETRICS AND CYBER SECURITY
REGULATIONS – 2021
CHOICE BASED CREDIT SYSTEM

1. PROGRAMME EDUCATIONAL OBJECTIVES(PEOs):

I. Systematically plan, implement, and monitor cyber security mechanisms to ensure


end-to-end security of IT assets and thus strengthen the cyber ecosystem.
II. Possess the technical knowledge and skills needed to protect and defend computer
systems and networks from cyber threats and attacks.
III. Effectively identify, analyze, and remediate cyber attacks, through sustainable
research-based biometric solutions for enterprises.
IV. Adopt ethical practices, collaborate with team members and team leaders, and
engage in constant updation of technical knowledge.
V. Strongly focus on ingenious ideas and critical analysis to serve the society, locally and
internationally as entrepreneurs in the field of cyber security.
2. PROGRAMME OUTCOMES

1 An ability to independently carry out research/investigation and development work


to solve practical problems
2 An ability to write and present a substantial technical report/document
3 Students should be able to demonstrate a degree of mastery over the area as per
the specialization of the program. The mastery should be at a level higher than
the requirements in the appropriate bachelor program
4 Apply reasoning informed by the contextual knowledge to assess societal, health,
safety, legal and cultural issues and the consequent responsibilities relevant to the
professional engineering practice.
5 Recognize the need for, and have the preparation and ability to engage in
independent and life-long learning in the broadest context of technological change.
6 Function effectively as an individual, and as a member or leader in diverse teams,
and in multidisciplinary settings.
PEO/PO Mapping:
POs
PEO
PO1 PO2 PO3 PO4 PO5 PO6

I. 3 2 2 2 3 3

II. 3 3 2 3 2 3

III. 3 1 3 2 3 1

IV. 3 2 1 2 1 1

V. 3 2 1 1 1 1

(3-High, 2- Medium, 1- Low)

1
MAPPING OF COURSE OUTCOMES AND PROGRAMME OUTCOMES

COURSE NAME PO1 PO2 PO3 PO4 PO5 PO6


Algebra and Probability 3 2 1 - 1 1
Research Methodology and IPR
SEMESTER I

Advanced Data Structures and Algorithms 3 2 1 - 1 1


Biometric Systems 2 1 1 - 1 1
Principles of Cyber Security 2 2 2.2 2.5 2 2.333
Cyber Forensics and Investigation 2.2 2.4 2 3 2.333 333
2
333
Advanced Data Structures and Algorithms Laboratory 3 2 1 - 1 1
YEAR I

Applied Cryptography 2.4 2 2.33 3 2 2


Machine Learning 3 2 1 1 2 1
SEMESTER II

Biometric Data Processing 3 2 1 - 2 1


Ethical Hacking 2.2 2.5 2 3 2 2.5
Biometric Data Processing Laboratory 3 2 1 - 1 1
Term Paper Writing and Seminar
SEMESTER III

Project Work I
YEAR II

SEMESTER IV

Project Work II

2
PROFESSIONAL ELECTIVE COURSES [PEC]

S.
COURSE TITLE PO1 PO2 PO3 PO4 PO5 PO6
NO.
1. Principles of Secure Coding 2.6 2 2.33 3 2 2
2. Network Security 2 2.33 3 2.5 2 2
3. Public Key Infrastructure 2.6 2 2 2 2 1.5
4. Operating Systems Security 2.4 2 3 2.5 2.33 1.5
5. Security Practices 2.4 2 3 3 2.33 1.75
6. Media Security 2.8 2.25 1.5 2 1.75 1.25
7. Biometric Security 3 2 1 2 2 1
8. Secure Systems Engineering 2.4 1.66 1.5 2 1 1.5
9 Cloud Security 2 1.5 2 2 2 1.66
10. Firewall and VPN Security 2.4 1.75 2 3 1.5 1.33
11. Mobile and Digital Forensics 2.4 1.66 2.66 - 2 2
Access Control and Identity Management
12. 2 1.8 2 2.5 1.33 1.66
Systems
13. Social Network Analysis 3 2 1 - 1 1
14. Data Privacy 2 1.8 2 2.5 2.33 1.75
15. Security in Cyber-Physical Systems 2.4 2.2 2.33 2 1 1.66
16. Cryptanalysis 2.6 1.6 2 3 1.66 2.25
17. Data Analytics for Fraud Detection 2.6 1.4 1 3 2 2.33
2.3
18. Internet of Things 2.8 2.25 2.33 2 2
3
19. Malware Analysis 2.6 2 2 2 1.5 2
20. Secure Software Design and Development 2.2 2 1.66 2.5 2 1.5
21. Security Assessment and Risk Analysis 2.4 1.4 1 - 1.5 1
22. Steganography and Digital Watermarking 2.6 1.4 1.66 3 2 2
23. Blockchain Technologies 2.8 1.8 2 2.5 1.5 2.25
24. Web Security 2.4 1.4 1 - 1.5 1

3
ANNA UNIVERSITY, CHENNAI
NON - AUTONOMOUS COLLEGES AFFILIATED ANNA UNIVERSITY
M.E. BIOMETRICS AND CYBER SECURITY
REGULATIONS – 2021
CHOICE BASED CREDIT SYSTEM
I TO IV SEMESTERS CURRICULA AND SYLLABI
SEMESTER I

PERIODS PER TOTAL


S. COURSE CATE-
COURSE TITLE WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. MA4113 Algebra and Probability FC 3 1 0 4 4
2. RM4151 Research Methodology and IPR RMC 2 0 0 2 2
Advanced Data Structures and
3. CP4151 PCC 3 0 0 3 3
Algorithms
4. BC4151 Biometric Systems PCC 3 0 2 5 4
5. CE4151 Principles of Cyber Security PCC 3 0 2 5 4
6. BC4152 Cyber Forensics and Investigation PCC 3 0 0 3 3
7. Audit Course – I* AC 2 0 0 2 0
PRACTICALS
Advanced Data Structures and
8. CP4161 PCC 0 0 4 4 2
Algorithms Laboratory
TOTAL 19 1 8 28 22
*Audit course is optional
SEMESTER II
PERIODS PER TOTAL
S. COURSE CATE-
COURSE TITLE WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. BC4201 Applied Cryptography PCC 3 0 2 5 4
2. CP4252 Machine Learning PCC 3 0 2 5 4
3. BC4202 Biometric Data Processing PCC 3 0 0 3 3
4. BC4291 Ethical Hacking PCC 3 0 2 5 4
5. Professional Elective I PEC 3 0 0 3 3
6. Audit Course – II* AC 2 0 0 2 0
PRACTICALS
Biometric Data Processing
7. BC4211 PCC 0 0 4 4 2
Laboratory
8. BC4212 Term Paper Writing and Seminar EEC 0 0 2 2 1
TOTAL 17 0 12 29 21
*Audit course is optional

4
SEMESTER III
PERIODS TOTAL
S. COURSE CATE-
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. Professional Elective II PEC 3 0 0 3 3
2. Professional Elective III PEC 3 0 0 3 3
3. Professional Elective IV PEC 3 0 2 5 4
4. Open Elective OEC 3 0 0 3 3
PRACTICALS
5. BC4311 Project Work I EEC 0 0 12 12 6
TOTAL 12 0 14 26 19

SEMESTER IV

PERIODS TOTAL
S. COURSE CATE-
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
PRACTICALS
1. BC4411 Project Work II EEC 0 0 24 24 12
TOTAL 0 0 24 24 12

TOTAL NO. OF CREDITS: 74

PROFESSIONAL ELECTIVES
SEMESTER II, ELECTIVE I
PERIODS TOTAL
S. COURSE CATE-
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. BC4001 Principles of Secure Coding PEC 3 0 0 3 3
2. NE4251 Network Security PEC 3 0 0 3 3
3. BC4002 Public Key Infrastructure PEC 3 0 0 3 3
4. BC4003 Operating Systems Security PEC 3 0 0 3 3
5. CP4391 Security Practices PEC 3 0 0 3 3
6. MU4252 Media Security PEC 3 0 0 3 3

5
SEMESTER III, ELECTIVE II
PERIODS TOTAL
S. COURSE CATE-
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. BC4004 Biometric Security PEC 3 0 0 3 3
2. BC4005 Secure Systems Engineering PEC 3 0 0 3 3
3. BC4006 Cloud Security PEC 3 0 0 3 3
4. BC4007 Firewall and VPN Security PEC 3 0 0 3 3
5. BC4008 Mobile and Digital Forensics PEC 3 0 0 3 3

SEMESTER III, ELECTIVE III


PERIODS TOTAL
S. COURSE CATE-
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
Access Control and Identity
1. BC4009 PEC 3 0 0 3 3
Management Systems
2. IF4095 Social Network Analysis PEC 3 0 0 3 3
3. BC4010 Data Privacy PEC 3 0 0 3 3
Security in Cyber-Physical
4. BC4011 PEC 3 0 0 3 3
Systems
5. BC4012 Cryptanalysis PEC 3 0 0 3 3
Data Analytics for Fraud
6. BC4013 PEC 3 0 0 3 3
Detection

SEMESTER III, ELECTIVE IV


PERIODS TOTAL
S. COURSE CATE-
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. CP4291 Internet of Things PEC 3 0 2 5 4
2. BC4014 Malware Analysis PEC 3 0 2 5 4
Secure Software Design and
3. BC4015 PEC 3 0 2 5 4
Development
Security Assessment and Risk
4. BC4016 PEC 3 0 2 5 4
Analysis
Steganography and Digital
5. BC4017 PEC 3 0 2 5 4
Watermarking
6. CP4072 Blockchain Technologies PEC 3 0 2 5 4
7. BC4018 Web Security PEC 3 0 2 5 4

6
AUDIT COURSES (AC)

Registration for any of these courses is optional to students

PERIODS PER
SL. COURSE CREDITS
COURSE TITLE WEEK
NO CODE
L T P
1. AX4091 English for Research Paper Writing 2 0 0 0
2. AX4092 Disaster Management 2 0 0 0
3. AX4093 Constitution of India 2 0 0 0
4. AX4094 நற் றமிழ் இலக்கியம் 2 0 0 0

7
LIST OF OPEN ELECTIVES FOR PG PROGRAMMES

PERIODS PER
SL. COURSE
COURSE TITLE WEEK
NO. CODE CREDITS
L T P
1. OCE431 Integrated Water Resources Management 3 0 0 3
2. OCE432 Water, Sanitation and Health 3 0 0 3
OCE433 Principles of Sustainable
3. 3 0 0 3
Development
4. OCE434 Environmental Impact Assessment 3 0 0 3
5. OME431 Vibration and Noise Control Strategies 3 0 0 3
6. OME432 Energy Conservation and Management in
3 0 0 3
Domestic Sectors
7. OME433 Additive Manufacturing 3 0 0 3
8. OME434 Electric Vehicle Technology 3 0 0 3
9. OME435 New Product Development 3 0 0 3
10. OBA431 Sustainable Management 3 0 0 3
11. OBA432 Micro and Small Business Management 3 0 0 3
12. OBA433 Intellectual Property Rights 3 0 0 3
13. OBA434 Ethical Management 3 0 0 3
14. ET4251 IoT for Smart Systems 3 0 0 3
15. ET4072 Machine Learning and Deep Learning 3 0 0 3
16. PX4012 Renewable Energy Technology 3 0 0 3
17. PS4093 Smart Grid 3 0 0 3
18. DS4015 Big Data Analytics 3 0 0 3
19. NC4201 Internet of Things and Cloud 3 0 0 3
20. MX4073 Medical Robotics 3 0 0 3
21. VE4202 Embedded Automation 3 0 0 3
22. CX4016 Environmental Sustainability 3 0 0 3
23. TX4092 Textile Reinforced Composites 3 0 0 3
24. NT4002 Nanocomposite Materials 3 0 0 3
25. BY4016 IPR, Biosafety and Entrepreneurship 3 0 0 3

FOUNDATION COURSES (FC)


S. COURSE PERIODS PER WEEK
COURSE TITLE CREDITS SEMESTER
NO CODE Lecture Tutorial Practical
1. MA4113 Algebra and Probability 3 1 0 4 I

PROFESSIONAL CORE COURSES (PCC)


S. COURSE PERIODS PER WEEK
COURSE TITLE CREDITS SEMESTER
NO CODE Lecture Tutorial Practical
1. Advanced Data Structures I
CP4151 3 0 0 3
and Algorithms
2. BC4151 Biometric Systems 3 0 2 4 I

8
3. CE4151 Principles of Cyber Security 3 0 2 4 I
4. Cyber Forensics and I
BC4152 3 0 0 3
Investigation
5. Advanced Data Structures and I
CP4161 0 0 4 2
Algorithms Laboratory
6. II
BC4201 Applied Cryptography 3 0 2 4
7. CP4252 Machine Learning 3 0 2 4 II

8. BC4202 Biometric Data Processing 3 0 0 3 II

9. II
BC4291 Ethical Hacking 3 0 2 4

10. Biometric Data Processing II


BC4211 0 0 4 2
Laboratory

RESEARCH METHODOLOGY AND IPR COURSES (RMC)


S. COURSE PERIODS PER WEEK
COURSE TITLE CREDITS SEMESTER
NO CODE Lecture Tutorial Practical
1. RM4151 Research Methodology and 2 0 0 2 1
IPR

EMPLOYABILITY ENHANCEMENT COURSES (EEC)


S. COURSE PERIODS PER WEEK
COURSE TITLE CREDITS SEMESTER
NO CODE Lecture Tutorial Practical
1. BC4212 Term Paper Writing and
0 0 2 1 II
Seminar
2. BC4311 Project Work I 0 0 12 6 III
3. BC4411 Project Work II 0 0 24 12 IV

9
SUMMARY

NAME OF THE PROGRAMME: M.E. BIOMETRICS AND CYBER SECURITY

Sl. CREDITS CREDITS


No. SUBJECT AREA
PER SEMESTER TOTAL

I II III IV
1. FC 04 00 00 00 04
2. PCC 16 17 00 00 33
3. PEC 00 03 10 00 13
4. RMC 02 00 00 00 02
5. OEC 00 00 03 00 03
6. EEC 00 01 06 12 19
7. Non Credit/Audit Course   00 00
8. TOTAL CREDIT 22 21 19 12 74

10
MA4113 ALGEBRA AND PROBABILITY L T P C
3 1 0 4

COURSE OBJECTIVES:
 To understand the basics of random variables with emphasis on the standard discrete and
continuous distributions.
 To make students understand the notion of a Markov chain, and how simple ideas of
conditional probability and matrices can be used to give a thorough and effective account of
discrete – time Markov chains.
 To apply the small / large sample tests through Tests of hypothesis.
 To introduce the basic notions of groups, rings, fields which will then be used to solve related
problems.
 To introduce and apply the concepts of rings, finite fields and polynomials.

UNIT I RANDOM VARIABLES 12


Random variables – Moments – Binomial, Biometric, Poisson, Uniform, Exponential and Normal
distributions – Joint distributions – Marginal – Correlation – Linear Regression distributions.

UNIT II RANDOM PROCESSES 12


Classification – Stationary random process – Markov process – Markov chain – Poisson process –
Gaussian process – Autocorrelation – Cross correlation.

UNIT III TESTING OF HYPOTHESIS 12


Sampling distributions – Type I and Type II errors – Small and large samples – Tests based on
Normal, t, Chi square and F distributions for testing of mean, variance and proportions, Tests for
independence of attributes and goodness of fit.

UNIT IV GROUPS AND RINGS 12


Groups: Definition – Properties – Homomorphism - Isomorphism – Cyclic groups – Cosets –
Lagrange’s theorem. Rings: Definition – Sub rings – Integral domain – Field – Integer modulo n –
Ring homomorphism.

UNIT V FINITE FIELDS AND POLYNOMIALS 12


Rings – Polynomial rings - Irreducible polynomials over finite fields - Factorizations of polynomials
over finite fields.
TOTAL : 60 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to

 analyze the performance in terms of probabilities and distributions achieved by the


determined solutions.
 classify various random processes and solve problems involving stochastic processes.
 apply the basic principles underlying statistical inference (estimation and hypothesis testing).
 apply the basic notions of groups, rings, fields which will then be used to solve related
problems.
 explain the fundamental concepts of advanced algebra and their role in modern mathematics
and applied contexts.

11
REFERENCES:
1. Devore J.L.,” Probability and Statistics for Engineering and sciences”, Cengage learning, 9th
Edition, Boston,2017.
2. Grimaldi R. P. and Ramana B.V., “Discrete and Combinatorial Mathematics”, Pearson
Education, 5th Edition, New Delhi, 2007.
3. Johnson R. A. and Gupta C.B., “Miller and Freund’s Probability and Statistics for Engineers”,
Pearson India Education, Asia, 9th Edition, New Delhi, 2017.
4. Ibe. O.C., “ Fundamentals of Applied Probability and Random Processes”, Elsevier U.P., 1 st
Indian Reprint, 2007.

CO-PO Mapping
CO POs

PO1 PO2 PO3 PO4 PO5 PO6


3 2 1 - 1 1
1
2 1 - - 1 1
2
3 2 1 - - 1
3
3 2 1 - 1 1
4
2 1 - - - -
5
Avg 3 2 1 - 1 1

RM4151 RESEARCH METHODOLOGY AND IPR L T P C


2 0 0 2

UNIT I RESEARCH DESIGN 6


Overview of research process and design, Use of Secondary and exploratory data to answer the
research question, Qualitative research, Observation studies, Experiments and Surveys.

UNIT II DATA COLLECTION AND SOURCES 6


Measurements, Measurement Scales, Questionnaires and Instruments, Sampling and methods.
Data - Preparing, Exploring, examining and displaying.

UNIT III DATA ANALYSIS AND REPORTING 6


Overview of Multivariate analysis, Hypotheses testing and Measures of Association.
Presenting Insights and findings using written reports and oral presentation.

UNIT IV INTELLECTUAL PROPERTY RIGHTS 6


Intellectual Property – The concept of IPR, Evolution and development of concept of IPR, IPR
development process, Trade secrets, utility Models, IPR & Biodiversity, Role of WIPO and WTO in
IPR establishments, Right of Property, Common rules of IPR practices, Types and Features of IPR
Agreement, Trademark, Functions of UNESCO in IPR maintenance.

UNIT V PATENTS 6
Patents – objectives and benefits of patent, Concept, features of patent, Inventive step,
Specification, Types of patent application, process E-filing, Examination of patent, Grant of patent,
12
Revocation, Equitable Assignments, Licences, Licensing of related patents, patent agents,
Registration of patent agents.
TOTAL : 30 PERIODS
REFERENCES
1. Cooper Donald R, Schindler Pamela S and Sharma JK, “Business Research Methods”,
Tata McGraw Hill Education, 11e (2012).
2. Catherine J. Holland, “Intellectual property: Patents, Trademarks, Copyrights, Trade Secrets”,
Entrepreneur Press, 2007.
3. David Hunt, Long Nguyen, Matthew Rodgers, “Patent searching: tools & techniques”, Wiley,
2007.
4. The Institute of Company Secretaries of India, Statutory body under an Act of parliament,
“Professional Programme Intellectual Property Rights, Law and practice”, September 2013.

CP4151 ADVANCED DATA STRUCTURES AND ALGORITHMS LTPC


3 003
COURSE OBJECTIVES:
 To understand the usage of algorithms in computing
 To learn and use hierarchical data structures and its operations
 To learn the usage of graphs and its applications
 To select and design data structures and algorithms that is appropriate for problems
 To study about NP Completeness of problems.

UNIT I ROLE OF ALGORITHMS IN COMPUTING & COMPLEXITY ANALYSIS 9


Algorithms – Algorithms as a Technology -Time and Space complexity of algorithms- Asymptotic
analysis-Average and worst-case analysis-Asymptotic notation-Importance of efficient algorithms-
Program performance measurement - Recurrences: The Substitution Method – The Recursion-Tree
Method- Data structures and algorithms.

UNIT II HIERARCHICAL DATA STRUCTURES 9


Binary Search Trees: Basics – Querying a Binary search tree – Insertion and Deletion- Red Black
trees: Properties of Red-Black Trees – Rotations – Insertion – Deletion -B-Trees: Definition of B -
trees – Basic operations on B-Trees – Deleting a key from a B-Tree- Heap – Heap Implementation
– Disjoint Sets - Fibonacci Heaps: structure – Mergeable-heap operations- Decreasing a key and
deleting a node-Bounding the maximum degree.

UNIT III GRAPHS 9


Elementary Graph Algorithms: Representations of Graphs – Breadth-First Search – Depth-First
Search – Topological Sort – Strongly Connected Components- Minimum Spanning Trees: Growing
a Minimum Spanning Tree – Kruskal and Prim- Single-Source Shortest Paths: The Bellman-Ford
algorithm – Single-Source Shortest paths in Directed Acyclic Graphs – Dijkstra‘s Algorithm; Dynamic
Programming - All-Pairs Shortest Paths: Shortest Paths and Matrix Multiplication – The Floyd-
Warshall Algorithm

UNIT IV ALGORITHM DESIGN TECHNIQUES 9


Dynamic Programming: Matrix-Chain Multiplication – Elements of Dynamic Programming – Longest
Common Subsequence- Greedy Algorithms: – Elements of the Greedy Strategy- An Activity-
Selection Problem - Huffman Coding.

13
UNIT V NP COMPLETE AND NP HARD 9
NP-Completeness: Polynomial Time – Polynomial-Time Verification – NP- Completeness and
Reducibility – NP-Completeness Proofs – NP-Complete Problems.
TOTAL : 45 PERIODS
SUGGESTED ACTIVITIES:
1. Write an algorithm for Towers of Hanoi problem using recursion and analyze the
complexity (No of disc-4)
2. Write any one real time application of hierarchical data structure
3. Write a program to implement Make_Set, Find_Set and Union functions for Disjoint Set Data
Structure for a given undirected graph G(V,E) using the linked list representation with simple
implementation of Union operation
4. Find the minimum cost to reach last cell of the matrix from its first cell
5. Discuss about any NP completeness problem

COURSE OUTCOMES:
CO1: Design data structures and algorithms to solve computing problems.
CO2: Choose and implement efficient data structures and apply them to solve problems.
CO3: Design algorithms using graph structure and various string-matching algorithms to solve
real-life problems.
CO4: Design one’s own algorithm for an unknown problem.
CO5: Apply suitable design strategy for problem solving.
REFERENCES:
1. S.Sridhar,” Design and Analysis of Algorithms”, Oxford University Press, 1st Edition, 2014.
2. Adam Drozdex, “Data Structures and algorithms in C++”, Cengage Learning, 4th Edition, 2013.
3. T.H. Cormen, C.E.Leiserson, R.L. Rivest and C.Stein, "Introduction to Algorithms", Prentice
Hall of India, 3rd Edition, 2012.
4. Mark Allen Weiss, “Data Structures and Algorithms in C++”, Pearson Education, 3rd Edition,
2009.
5. E. Horowitz, S. Sahni and S. Rajasekaran, “Fundamentals of Computer Algorithms”, University
Press, 2nd Edition, 2008.
6. Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman, “Data Structures and Algorithms”, Pearson
Education, Reprint 2006.

CO-PO Mapping
CO POs

PO1 PO2 PO3 PO4 PO5 PO6

1 3 2 1 - 1 1

3 2 1 - 1 1
2
2 1 - - - -
3
3 2 1 - 1 1
4
2 1 - - - -
5
3 2 1 - 1 1
Avg

14
BC4151 BIOMETRIC SYSTEMS L T PC
3 0 2 4
COURSE OBJECTIVES:
 To learn and understand biometric technologies and their functionalities.
 To learn the role of biometric in the organization
 To Learn the computational methods involved in the biometric systems.
 To expose the context of Biometric Applications
 To learn to develop applications with biometric security

UNIT I INTRODUCTION 9+6


Introduction – history – type of biometrics – General architecture of biometric systems – Basic
working of biometric matching – Biometric system error and performance measures – Design of
biometric systems – Applications of biometrics – Biometrics versus traditional authentication
methods – character recognition – authentication technologies, biometric technologies, Finger, face,
voice and iris biometric technologies.

UNIT II FINGERPRINT, FACE AND IRIS AS BIOMETRICS 9+6


Fingerprint biometrics – Fingerprint recognition system – Minutiae extraction – Fingerprint indexing
– experimental results – Biometrics using vein pattern of palm – Advantages and disadvantages –
Basics of hand geometry
Background of face recognition – Design of face recognition system – Neural network for face
recognition – Face detection in video sequences – Challenges in face biometrics – Face recognition
methods – Advantages and disadvantages
Iris segmentation method – Determination of iris region – Experimental results of iris localization –
applications of iris biometrics – Advantages and disadvantages.

UNIT III PRIVACY ENHANCEMENT AND MULTIMODAL BIOMETRICS 9+6

Privacy concerns associated with biometric developments – Identity and privacy – Privacy concerns
– biometrics with privacy enhancement – Comparison of various biometrics in terms of privacy –
Soft biometrics - Introduction to biometric cryptography – General purpose cryptosystem – Modern
cryptography and attacks – Symmetric key ciphers – Cryptographic algorithms – Introduction to
multimodal biometrics – Basic architecture using face and ear – Characteristics and advantages of
multimodal biometrics characters – AADHAAR : An Application of Multimodal Biometrics.

UNIT IV WATERMARKING TECHNIQUES & BIOMETRICS: SCOPE AND 9+6


FUTURE
Data hiding methods – Basic framework of watermarking – Classification, Applications, Attacks,
Performance Evaluation and Characteristics – General Watermarking process – Image
watermarking techniques – Watermarking algorithm – Effect of attacks on watermarking techniques
–Scope and future market of biometrics
Applications of Biometrics and information technology infrastructure – Role of biometrics in
enterprise security – Role of biometrics in border security – Smart card technology and biometric –
Radio frequency identification biometrics – DNA Biometrics – Comparative study of various
biometrics techniques.

15
UNIT V IMAGE ENHANCEMENT TECHNIQUES & BIOMETRICS STANDARDS 9+6
Current research in image enhancement techniques – Image enhancement algorithms– Frequency
domain filters – Databases and implementation – Standard development organizations – Application
programming interface – Information security and biometric standards – Biometric template
interoperability biometrics for network security and biometrics for transaction.

LIST OF EXPERIMENTS (Experiments can be designed with similar use cases as below):
1. Student school smart card
2. Secure lab access using card scanner plus face recognition
3. Student bus pass with barcode card scan
4. Student bus pass with webcam scan
5. Employee attendance system by Qr scan
6. Student examination datacard
7. School student attendance system by barcode scan
8. School student attendance system by Qr scan
9. School student attendance with fingerprint reader
10. Fingerprint voting system project
11. Employee hourly attendance by barcode scan
12. Visual product identification for blind

COURSE OUTCOMES:
CO1: Identify the various biometric technologies.
CO2: Design of biometric recognition for the organization.
CO3: Develop simple applications for privacy.
CO4: Understand the need of biometric in the society
CO5: Understand the research in biometric techniques.

TOTAL : 75 PERIODS
REFERENCES:
1. G R Sinha and Sandeep B. Patil, Biometrics: Concepts and Applications, Wiley, 2013
2. Paul Reid, Biometrics for Network Security, Pearson Education, 2003
3. Samir Nanavathi, Micheal Thieme, Raj Nanavathi, Biometrics – Identity verification in a
networked world, Wiley – dream Tech, 2002.
4. John D Woodward, Jr.; Nicholas M Orlans; Peter T Higgins, Biometrics – The Ultimate
Reference, Wiley Dreamtech.College Publications, 2015.
5. Khalid Saeed, “New Directions in Behavioral Biometrics', CRC Press 2020.
6. Ruud M. Bolle, Sharath Pankanti, Nalini K. Ratha, Andrew W. Senior, Jonathan H. Connell,
Guide to Biometrics, Springer 2009.
7. Rafael C. Gonzalez, Richard Eugene Woods, Digital Image Processing using MATLAB, 2 nd
Edition, Tata McGraw-Hill Education 2010.

CO-PO Mapping

CO POs

PO1 PO2 PO3 PO4 PO5 PO6


1 - - - - -
1
3 2 1 - 1 1
2
3 2 1 - 1 1
3
16
2 1 - - - -
4
2 1 - - - -
5
2 1 1 - 1 1
Avg

CE4151 PRINCIPLES OF CYBER SECURITY L T P C


3 0 2 4
COURSE OBJECTIVES:
 To know the cyber security principles, as well as the issues, policy and standards
 To understand the difference between threat, risk, attack and vulnerability and how threats
materialize into attacks .
 To be familiar with the typical threats, attacks and exploits and the motivations behind them.
 To study the defensive techniques against these attacks
 To describe remedies for various existing cyber security breaches and to show the
methodologies required to make future systems less prone to security failures

UNIT I INTRODUCTION TO CYBER SECURITY 9


Basic Cyber Security Concepts, layers of security, Vulnerability, Threat, Harmful acts, Internet
Governance - Controls - Authentication -Access Control and Cryptography – Challenges and
Constraints, Computer Criminals, CIA Triad, Motive of Attackers, Active Attacks, Passive Attacks,
Software Attacks, Hardware Attacks, Spectrum of Attacks, Browser Attacks - Web Attacks Targeting
Users - Obtaining User or Website Data - Email Attacks, Taxonomy of various attacks, IP spoofing,
Methods of defence, Security Models, risk management, Cyber Threats-Cyber Warfare, Cyber
Crime, Cyber terrorism, Cyber Espionage, Malicious code , Countermeasures.

UNIT II SECURITY IN OPERATING SYSTEMS & NETWORKS 9


Security in Operating Systems - Security in the Design of Operating Systems -Rootkit - Network
Security Attack- Threats to Network Communications - Wireless Network Security - Denial of Service
- Distributed Denial-of-Service.

UNIT III DEFENCES: SECURITY COUNTERMEASURES 9


Cryptography in Network Security - Firewalls - Intrusion Detection and Prevention Systems -
Network Management - Databases - Security Requirements of Databases - Reliability and Integrity
- Database Disclosure - Data Mining and Big Data. Cloud Security Tools & Techniques,

UNIT IV PRIVACY IN CYBERSPACE 9


Privacy Concepts -Privacy Principles and Policies -Authentication and Privacy - Data Mining -
Privacy on the Web - Email Security - Privacy Impacts of Emerging Technologies - Where the Field
Is Headed.

UNIT V MANAGEMENT AND INCIDENTS 9


Comprehensive Cyber Security Policy Security Planning - Business Continuity Planning - Handling
Incidents - Risk Analysis - Dealing with Disaster - Emerging Technologies - The Internet of Things -
Economics - Electronic Voting - Cyber Warfare- Cyberspace and the Law - International Laws -
Cyber-crime - Cyber Warfare and HomeLand Security.
TOTAL:45 PERIODS

17
LIST OF EXPERIMENTS:
1. Implementation to gather information from any PC connected to the LAN using
whois, port scanners, network scanning, Angry IP scanners etc.
2. Implementation of Claiming ownership of digital entity
3. Implementation of Tracing the digital theft in cyberspace
4. Implementation of Data hiding in different image types
5. Implementation of MITM- attack using wireshark/ network sniffers
6. Implementation of Windows security using firewall and other tools
7. Implementation to identify web vulnerabilities, using OWASP project
8. Implementation of IT Audit, malware analysis and Vulnerability assessment and generate the
report.
9. Implementation of OS hardening and RAM dump analysis to collect the artifacts and other
information.
10. Implementation of Cyber Forensics tools for Disk Imaging, Data acquisition, Data extraction
and Data Analysis and recovery.

TOTAL: 30 PERIODS
TOTAL:45+30=75 PERIODS
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Understand the broad set of technical, social & political aspects of Cyber Security
CO2: Describe the operational and organizational Cyber Security Aspects
CO3: Identify and assess different types of Cyber security breaches and possible solutions for a
robust system
CO4: understand cyber-attacks, and also how to protect the entire Internet community from such
attacks
CO5: Demonstrate the ability to select and design among available security solutions based on
different domains of cyber systems

REFERENCES:
1. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in Computing, 5th
Edition , Pearson Education , 2018
2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, Wiley India Pvt. Ltd. , 2011
3. B. B. Gupta, D. P. Agrawal, Haoxiang Wang, Computer and Cyber Security: Principles,
Algorithms, Applications, and Perspectives, CRC Press, 2018.
4. George K.Kostopoulos, Cyber Space and Cyber Security, CRC Press, 2013.
5. Martti Lehto, Pekka Neittaanmäki, Cyber Security: Analytics, Technology and Automation,
Springer International Publishing Switzerland 2015
6. Chwan-Hwa (John) Wu, J. David Irwin, Introduction to Computer Networks and Cyber security,
CRC Press T&F Group, 2013.
7. James Graham, Richard Howard and Ryan Otson, Cyber Security Essentials, CRC Press T&F
Group, 2011
CO-PO Mapping
CO POs

PO1 PO2 PO3 PO4 PO5 PO6


3 3 -
1 2 3

18
3 2 -
2 2 1 2
1 -
3 1 - 3
2 2 -
4 2 2
3
5 3 2 2 2 2
Avg 2 2 2.2 2.5 2 2.333333

BC4152 CYBER FORENSICS AND INVESTIGATION LT PC


3 00 3
COURSE OBJECTIVES:
 To gain a comprehensive understanding of cyber forensic principles and the collection,
preservation, and analysis of digital evidence
 To combine both the technical expertise and the knowledge required to investigate, detect
and prevent digital crimes.
 To understand the different applications and methods for conducting network and digital
forensic acquisition and analysis
 To learn the E-evidence collection and preservation, investigating operating systems and file
systems, network, cloud and mobile device forensics
 To gain knowledge on digital forensics legislations, digital crime, forensic processes and
procedures.

UNIT I CYBER FORENSICS SCIENCE 9


Cyber Forensics Science: Forensics Science, Forensics Fundamentals, Computer Forensics, and
Digital Forensics.
Cyber Crime: Criminalistics as it relates to the Investigative Process, Analysis of Cyber Criminalistics
Area, Holistic Approach to Cyber-forensics, Computer Forensics and Law Enforcement- Indian
Cyber Forensic - Forensics Services, Professional Forensics Methodology- Types of Forensics
Technology

UNIT II NETWORK SECURITY FORENSICS SYSTEM AND SERVICES 9


Forensics system and Services : Forensics on - Internet Usage – Intrusion - Firewall and Storage
Area Network; Occurrence of Cyber-crimes- Cyber Detectives- Fighting Cyber Crimes- Forensic
Process
Open-source Security Tools for Network Forensic Analysis, Requirements for Preservation of
Network Data
Computer Forensics - Data Backup and Recovery - Test Disk Suite.

UNIT III DIGITAL FORENSICS PRESERVATION AND FORENSIC DATA 9


ANALYSIS
Digital Repositories - Evidence Collection – Data Preservation Approaches – Meta Data and Historic
records – Legal aspects. Basic Steps of Forensic Analysis in Windows and Linux – Forensic
Scenario – Email Analysis – File Signature Analysis – Hash Analysis – Forensic Examination of log
files
Data-Recovery Solution, Hiding and Recovering Hidden Data, Evidence Collection and Data Seizure

19
UNIT IV CLOUD, NETWORK AND MOBILE FORENSICS 9
Working with the cloud vendor, obtaining evidence, reviewing logs and APIs
Mobile Forensics techniques, Mobile Forensics Tools - Android Device – Analysis- Android Malware
– iOS Forensic Analysis – SIM Forensic Analysis – Case study
Recent trends in Mobile Forensic Technique and methods to Search and Seize Electronic Evidence

UNIT V LEGAL ASPECTS OF DIGITAL FORENSICS 9


IT Laws and Ethics, Digital Evidence Controls, Evidence Handling Procedures, Basics of Indian
Evidence ACT IPC and CrPC , Electronic Communication Privacy ACT, Legal Policies, Act 2000,
amendment of IT Act 2008.
Current Cyber Forensic Tools: Overview of different software packages – Encase-Autopsy-
Magnet – Wireshark - Mobile Forensic Tools – SQLite
TOTAL : 45 PERIODS

COURSE OUTCOMES:
At the end of this course, the students will be able to :
CO1: Understand the responsibilities and liabilities of a computer forensic investigator
CO2: Identify potential sources of electronic evidence.
CO3: Understand the importance of maintaining the integrity of digital evidence.
CO4: Demonstrate the ability to perform basic forensic data acquisition and analysis using
computer and network based applications and utilities.
CO5: Understand relevant legislation and codes of ethics.

REFERENCES:
1. J. R. Vacca, Computer forensics: Computer Crime Scene investigation, 2nd Ed. Hanover,
NH, United States: Charles River Media, 2002, Laxmi Publications, 1st Edition, 2015.
2. C. Altheide, H. Carvey, and R. Davidson, Digital Forensics with Open Source Tools: Using
Open Source Platform Tools for Performing Computer Forensics on Target Systems:
Windows, Mac, Linux, Unix, etc, 1st Ed. United States: Syngress, 2011.
3. S. Bommisetty, R. Tamma, and H. Mahalik, Practical Mobile Forensics: Dive into Mobile
Forensics on IOS, Android, Windows, and blackBerry devices with this action-packed,
practical guide. United Kingdom: Packt Publishing, 2014.
4. G. Gogolin, Digital Forensics Explained, 1st Ed. Boca Raton, FL: CRC Taylor & Francis, 1st
Edition, Auerbach Publications, 2013.
5. A. Hoog and J. McCash, Android forensics: Investigation, Analysis, and Mobile Security for
Google Android. Waltham, MA: Syngress Media, U.S., 2011.
6. B. Nelson, A. Phillips, F. Enfinger, and C. Steuart, Guide to Computer Forensics and
Investigations, Second edition, 2nd Ed. Boston: Thomson Course Technology, 2009.
7. C. Altheide and H. Carvey, “Digital Forensics with Open Source Tools”, 2011 Publisher(s):
Syngress.
8. J. Sammons, “The Basics of Digital Forensics- The Primer for Getting Started in Digital
Forensics”, 1st Edition, Syngress, 2012.
9. Nelson, Phillips and Enfinger Steuart, “Guide to Computer Forensics and Investigations”, 6th
Edition, Cengage Learning, New Delhi, 2020.

20
CO-PO Mapping

CO POs

PO1 PO2 PO3 PO4 PO5 PO6


2 3 2
1 2 3 -
3 - 3
2 2 2 3
2 - -
3 2 3 -
-
4 3 2 1 2 1
2 - -
5 2 2 2
Avg 2.2 2.4 2 3 2.333333 2

CP4161 ADVANCED DATA STRUCTURES AND ALGORITHMS LTPC


LABORATORY 0 042

COURSE OBJECTIVES:
 To acquire the knowledge of using advanced tree structures
 To learn the usage of heap structures
 To understand the usage of graph structures and spanning trees
 To understand the problems such as matrix chain multiplication, activity selection
and Huffman coding
 To understand the necessary mathematical abstraction to solve problems.

LIST OF EXPERIMENTS:
1: Implementation of recursive function for tree traversal and Fibonacci
2: Implementation of iteration function for tree traversal and Fibonacci
3: Implementation of Merge Sort and Quick Sort
4: Implementation of a Binary Search Tree
5: Red-Black Tree Implementation
6: Heap Implementation
7: Fibonacci Heap Implementation
8: Graph Traversals
9: Spanning Tree Implementation
10: Shortest Path Algorithms (Dijkstra's algorithm, Bellman Ford Algorithm)
11: Implementation of Matrix Chain Multiplication
12: Activity Selection and Huffman Coding Implementation

HARDWARE/SOFTWARE REQUIREMENTS
1: 64-bit Open source Linux or its derivative
2: Open Source C++ Programming tool like G++/GCC
TOTAL : 60 PERIODS
COURSE OUTCOMES:
CO1: Design and implement basic and advanced data structures extensively
CO2: Design algorithms using graph structures
21
CO3: Design and develop efficient algorithms with minimum complexity using design
techniques
CO4: Develop programs using various algorithms.
CO5: Choose appropriate data structures and algorithms, understand the ADT/libraries,
and use it to design algorithms for a specific problem.

REFERENCES:
1. Lipschutz Seymour, “Data Structures Schaum's Outlines Series”, Tata McGraw Hill, 3rd
Edition, 2014.
2. Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman, “Data Structures and Algorithms”,
Pearson Education, Reprint 2006.
3. http://www.coursera.org/specializations/data-structures-algorithms
4. http://www.tutorialspoint.com/data_structures_algorithms
5. http://www.geeksforgeeks.org/data-structures/

CO-PO Mapping
CO POs

PO1 PO2 PO3 PO4 PO5 PO6


3 2 1 - 1 2
1
3 2 1 - 1 1
2
3 2 1 - 1 2
3
3 2 1 - - 1
4
3 2 1 - 1 -
5
3 2 1 - 1 1
Avg

BC4201 APPLIED CRYPTOGRAPHY LTP C


3 02 4
COURSE OBJECTIVES:
 To understand OSI security architecture and classical encryption techniques.
 To acquire fundamental knowledge on the concepts of finite fields and number theory.
 Understand various block cipher and stream cipher models.
 Describe the principles of public key cryptosystems, hash functions and digital signature
 Acquire fundamental knowledge on applications of Digital Signature in payments etc.,

UNIT I MATHEMATICAL FOUNDATION AND NUMBER THEORY 10


Definitions – Cryptography, cryptanalysis, cryptology, classical cryptosystem- shift cipher, affine
cipher, vigenere cipher, substitution, transposition techniques, Types of attacks in OSI security
architecture-Number Theory concepts – Modular Arithmetic , Properties, Euclidean algorithm,
Fermat’s and Euler’s theorem, Chinese Remainder Theorem, Primitive roots, Discrete Logarithms,
Computational aspects, finite fields, Primes and unique factorization of integers, Computing discrete
logarithms

22
UNIT II BLOCK CIPHERS AND MODES OF OPERATIONS 8
Simplified DES - Data Encryption Standard-Block cipher principles-block cipher modes of operation-
AES-TripleDES-Blowfish-RC5

UNIT III PUBLIC KEY CRYPTOGRAPHY 8


Principles and characteristics - Need for public key cryptography - Primality Testing - Miller Rabin
Test - Diffie Hellman Key Exchange-MITM Attack - RSA, Fast Modular Exponentiation Algorithms,
RandomNumberGeneration – FiniteFields–PolynomialArithmetic-ECC –KeyManagement

UNIT IV HASH FUNCTIONS AND DIGITAL SIGNATURE 9


Authentication requirement – Authentication function – MAC – Hash function – Security of hash
function and MAC – MD5 - SHA - HMAC – CMAC - Digital signature and authentication protocols –
DSS – EI Gamal – Schnorr - Blind Signatures for unreachable payments

UNIT V APPLICATIONS OF CRYPTOGRAPHIC ALGORITHMS 10


Authentication – Kerberos , Zero Knowledge Proofs, System Security - Firewalls, Types, Design
considerations, Intrusion Detection Systems, IP Security - IPSec (AH and ESP),Web Security - SSL,
TLS, Electronic passports and ID cards - SDA/DDA/CDA Bank Cards,Secure Electronic
Transaction,Crypto currencies - Bitcoin, Email Security - PGP, Tor (The Onion Router).
TOTAL:45 PERIODS
PRACTICALS:
1. Demonstration of Symmetric conventional cryptographic techniques
2. Demonstration of Symmetric classic cryptographic techniques
3. Demonstration of Asymmetric cryptographic techniques
4. Demonstration of Hashing and Message digest techniques
5. Design and implementation of new cryptographic algorithms
6. Demonstration and Implementation of secure communication using standard crypto libraries
(OpenSSL, NTL, GMP)
7. Implementation of smart card based server/client applications
8. Demonstration of authentication techniques
9. Developing cryptographic algorithms for industrial applications
10. Developing cryptographic algorithms for innovative applications
TOTAL:30 PERIODS
COURSE OUTCOMES:
CO1: Compare various Cryptographic Techniques
CO2: Understand security issues, practices and principles in various applications
CO3: Learn to analyse the security of the in-built cryptosystems
CO4: Develop cryptographic algorithms for information security
CO5: Develop authentication schemes for identity and membership authorization
TOTAL: 75 PERIODS
REFERENCES
1. Bruce Schneier and Neils Ferguson, “Practical Cryptography”, First Edition, Wiley
Dreamtech India Pvt Ltd, 2003.
2. J. H. Silverman, A Friendly Introduction to Number Theory, 4th Ed. Boston: Pearson, 2019
(ISBN No.: 978 9353433079, 935343307X
3. Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security : Private
Communications in a Public World”, Prentice Hall of India, Second Edition, 2016. (UNIT V)

23
4. Douglas R Stinson and Maura B. Paterson, “Cryptography – Theory and practice”, Fourth
Edition, CRC Press,2018 (UNIT -I)
5. William Stallings, Cryptography and Network Security, Seventh Edition, Pearson Education,
2017. (UNIT I,II,III,IV)

CO-PO Mapping
CO POs

PO1 PO2 PO3 PO4 PO5 PO6


3 - 2 3
1 2 1
- 3 2 -
2 2 3
- -
3 2 2 2 2
-
4 3 2 2 2 1
-
5 3 2 2 2 2
Avg 2.4 2 2.333333 3 2 2

CP4252 LTPC
MACHINE LEARNING
302 4
COURSE OBJECTIVES:
 To understand the concepts and mathematical foundations of machine learning and types of
problems tackled by machine learning
 To explore the different supervised learning techniques including ensemble methods
 To learn different aspects of unsupervised learning and reinforcement learning
 To learn the role of probabilistic methods for machine learning
 To understand the basic concepts of neural networks and deep learning

UNIT I INTRODUCTION AND MATHEMATICAL FOUNDATIONS 9


What is Machine Learning? Need –History – Definitions – Applications - Advantages, Disadvantages &
Challenges -Types of Machine Learning Problems – Mathematical Foundations - Linear Algebra &
Analytical Geometry -Probability and Statistics- Bayesian Conditional Probability -Vector Calculus &
Optimization - Decision Theory - Information theory

UNIT II SUPERVISED LEARNING 9


Introduction-Discriminative and Generative Models -Linear Regression - Least Squares -Under-fitting /
Overfitting -Cross-Validation – Lasso Regression- Classification - Logistic Regression- Gradient Linear
Models -Support Vector Machines –Kernel Methods -Instance based Methods - K-Nearest Neighbours
- Tree based Methods –Decision Trees –ID3 – CART - Ensemble Methods –Random Forest -
Evaluation of Classification Algorithms

UNIT III UNSUPERVISED LEARNING AND REINFORCEMENT LEARNING 9


Introduction - Clustering Algorithms -K – Means – Hierarchical Clustering - Cluster Validity -
Dimensionality Reduction –Principal Component Analysis – Recommendation Systems - EM
algorithm. Reinforcement Learning – Elements -Model based Learning – Temporal Difference Learning

24
UNIT IV PROBABILISTIC METHODS FOR LEARNING- 9
Introduction -Naïve Bayes Algorithm -Maximum Likelihood -Maximum Apriori -Bayesian Belief
Networks -Probabilistic Modelling of Problems -Inference in Bayesian Belief Networks – Probability
Density Estimation - Sequence Models – Markov Models – Hidden Markov Models

UNIT V NEURAL NETWORKS AND DEEP LEARNING 9


Neural Networks – Biological Motivation- Perceptron – Multi-layer Perceptron – Feed Forward Network
– Back Propagation-Activation and Loss Functions- Limitations of Machine Learning – Deep Learning–
Convolution Neural Networks – Recurrent Neural Networks – Use cases
45 PERIODS
SUGGESTED ACTIVITIES:
1. Give an example from our daily life for each type of machine learning problem
2. Study at least 3 Tools available for Machine Learning and discuss pros & cons of each
3. Take an example of a classification problem. Draw different decision trees for the example
and explain the pros and cons of each decision variable at each level of the tree
4. Outline 10 machine learning applications in healthcare
5. Give 5 examples where sequential models are suitable.
6. Give at least 5 recent applications of CNN

PRACTICAL EXERCISES: 30 PERIODS


1. Implement a Linear Regression with a Real Dataset
(https://www.kaggle.com/harrywang/housing). Experiment with different features in building a model.
Tune the model's hyperparameters.
2. Implement a binary classification model. That is, answers a binary question such as "Are
houses in this neighborhood above a certain price?"(use data from exercise 1). Modify the classification
threshold and determine how that modification influences the model. Experiment with different
classification metrics to determine your model's effectiveness.
3. Classification with Nearest Neighbours. In this question, you will use the scikit-learn’s KNN
classifer to classify real vs. fake news headlines. The aim of this question is for you to read the scikit-
learn API and get comfortable with training/validation splits. Use California Housing Dataset
4. In this exercise, you'll experiment with validation sets and test sets using the dataset. Split
a training set into a smaller training set and a validation set. Analyze deltas between training set and
validation set results. Test the trained model with a test set to determine whether your trained model
is overfitting. Detect and fix a common training problem.
5. Implement the k-means algorithm using https://archive.ics.uci.edu/ml/datasets/Codon+usage
dataset
6. Implement the Naïve Bayes Classifier using
https://archive.ics.uci.edu/ml/datasets/Gait+Classification dataset
7. Project - (in Pairs) Your project must implement one or more machine learning algorithms and
apply them to some data.
a. Your project may be a comparison of several existing algorithms, or it may propose a
new algorithm in which case you still must compare it to at least one other approach.
b. You can either pick a project of your own design, or you can choose from the set of pre-
defined projects.
c. You are free to use any third-party ideas or code that you wish as long as it is publicly
available.
d. You must properly provide references to any work that is not your own in the write-up.

25
e. Project proposal You must turn in a brief project proposal. Your project proposal should
describe the idea behind your project. You should also briefly describe software you will
need to write, and papers (2-3) you plan to read.
List of Projects (datasets available)
1. Sentiment Analysis of Product Reviews
2. Stock Prediction
3. Sales Forecasting
4. Music Recommendation
5. Handwriting Digit Classification
6. Fake News Detection
7. Sports Prediction
8. Object Detection
9. Disease Prediction

COURSE OUTCOMES:
Upon the completion of course, students will be able to
CO1: Understand and outline problems for each type of machine learning
CO2: Design a Decision tree and Random forest for an application
CO3: Implement Probabilistic Discriminative and Generative algorithms for an application and analyze
the results.
CO4: Use a tool to implement typical Clustering algorithms for different types of applications.
CO5: Design and implement an HMM for a Sequence Model type of application and identify
applications suitable for different types of Machine Learning with suitable justification.
TOTAL:75 PERIODS
REFERENCES
1. Stephen Marsland, “Machine Learning: An Algorithmic Perspective”, Chapman & Hall/CRC, 2nd
Edition, 2014.
2. Kevin Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012
3. Ethem Alpaydin, “Introduction to Machine Learning”, Third Edition, Adaptive Computation and
Machine Learning Series, MIT Press, 2014
4. Tom M Mitchell, “Machine Learning”, McGraw Hill Education, 2013.
5. Peter Flach, “Machine Learning: The Art and Science of Algorithms that Make Sense of Data”,
First Edition, Cambridge University Press, 2012.
6. Shai Shalev-Shwartz and Shai Ben-David, “Understanding Machine Learning: From Theory to
Algorithms”, Cambridge University Press, 2015
7. Christopher Bishop, “Pattern Recognition and Machine Learning”, Springer, 2007.
8. Hal Daumé III, “A Course in Machine Learning”, 2017 (freely available online)
9. Trevor Hastie, Robert Tibshirani, Jerome Friedman, “The Elements of Statistical Learning”,
Springer, 2009 (freely available online)
10. Aurélien Géron , Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts,
Tools, and Techniques to Build Intelligent Systems 2nd Edition, o'reilly, (2017)

CO-PO Mapping

CO POs
PO1 PO2 PO3 PO4 PO5 PO6
2 1 - - - -
1

26
2 3 2 1 - 3 2

3 3 2 1 - 1 -

4 3 2 1 1 3 2

5 3 2 1 - 3 2

Avg 3 2 1 1 2 1

BC4202 BIOMETRIC DATA PROCESSING L T PC


3 0 0 3
COURSE OBJECTIVES:
 To understand the basics of Biometric Data processing
 To model and visualize the transformation of image
 To understand the evolution of object detection
 To learn the computational methods involved in the biometric systems

UNIT I INTRODUCTION TO BIOMETRIC DATA PROCESSING 9


Biometric Databases - Biometric traits - Biometric Modalities - Principles of Biometrics: Behavior and
Physiology, Data Acquisition, Liveness Detection, Active Biometric Traits- Voice Biometrics,
Handwriting Biometrics , Gait Biometrics, Other Active Traits, Passive Biometric Traits- Fingerprint
Biometrics, Iris Biometrics, Face Biometrics, ECG Biometrics, Other Passive Traits, Multimodal
biometrics -Taxonomy of multimodal biometrics, fusion levels - Biometric Standards.

IMAGE PROCESSING FUNDAMENTALS AND OPERATIONS OF


UNIT II 10
BIOMETRIC SYSTEM
Image processing and Basic image operations: - pattern recognition/statistics, Error types. image,
acquisition, type, point operations, Geometric transformations. Linear interpolation, brightness
correction, histogram, Convolution, linear/non-linear filtering, Guassian, Median, Min, gray level
reduction. Special filters, enhancement filter, Laplacian, unsharp masking, high boost filtering,
sharpening special filtering, Edge detection, DFT , inverse of DFT.
Operations of a biometric system - verification and identification, performance of a biometric system,
FAR, FRR, GAR, ERR, DET and ROC curve, Failure to Acquire (FTA), Failure to Enroll (FTE),
applications of biometrics, characteristics.

UNIT III OBJECT DETECTION AND FACE RECOGNITION 9


Object Detection- Boundary descriptors –Region descriptors –moving object detection –tracking
moving features- Moving extraction and description-Texture description –classification -
segmentation.
Face Recognition – Eigenfaces (PCA), Linear Discriminant Analysis (LDA) and Fisherfaces,
Independent Component Analysis (ICA), Neural Networks (NN) and Support Vector Machines
(SVM), Kernel Methods, Face biometric database

UNIT IV FINGERPRINT AND IRIS RECOGNITION 9


Fingerprint recognition – Sensing, feature extraction, Enhancement and binarization, Minutiae
extraction, matching – correlation based methods, minutiae based methods, ridge feature based
methods, performance evaluation, synthetic fingerprint generation

27
IRIS recognition system, Active Contours, Flexible Generalized Embedded Coordinates, Fourier-
based Trigonometry and Correction for Off-Axis Gaze, Detecting and excluding eyelashes by
Statistical Inference, Alternative Score Normalization Rules

UNIT V 3D BIOMETRIC and BIOMETRIC DATA APPLICATIONS 8


Classification of 3D biometric imaging methods -3D biometric Technologies- 3D palm print capturing
systems-3D information in palm print- Feature Extraction from 3D palm print –matching and fusion.
Mobile Biometrics- Biometric Application Design – Biometrics in society

COURSE OUTCOMES:
CO1: Explain the principles and types of biometric data processing
CO2: Use Image processing operations for biometrics
CO3: Apply techniques required for object detection and face recognition
CO4: Develop techniques required for fingerprint and iris recognition
CO5: Design and evaluate biometric applications
TOTAL: 45 PERIODS
REFERENCES
1. Ruud M. Bolle, SharathPankanti, Nalini K. Ratha, Andrew W. Senior, Jonathan H. Connell,
“Guide to Biometrics",Springer 2013 (Unit 1)
2. Rafael C. Gonzalez, Richard Eugene Woods, "Digital Image Processing using MATLAB",
2nd Edition, Tata McGraw-Hill Education 2010 (Unit 2)
3. Claus Vielhauer, "Biometric user authentication for IT security: from fundamentals to
handwriting", Vol. 18. Springer Science & Business Media, 2005 (Unit 2)
4. Anil Jain, Patrick Flynn, and Arun A. Ross, eds. "Handbook of biometrics", Springer Science
& Business Media, 2007 (Unit 3 & 4)
5. Richard O. Duda, David G.Stork, Peter E. Hart, "Pattern Classification", Wiley 2007
6. Julian Ashbourn, "Biometrics in the New World”, Springer 2014.
7. Zhang, David, Lu, Guangming,“3D Biometrics Systems and Applications”, Springer 2013.
(Unit 5)

CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
2 1 - - - -
1
2 1 - - - -
2
3 2 1 - 2 1
3
3 2 1 - 2 1
4
3 2 1 - 2 1
5
3 2 1 - 2 1
Avg

28
BC4291 ETHICAL HACKING LTPC
3 024
COURSE OBJECTIVES:
 To understand and analyze security threats & countermeasures related to ethical hacking.
 To learn the different levels of vulnerabilities at a system level.
 To gain knowledge on the different hacking methods for web services and session hijacking.
 To understand the hacking mechanisms on how a wireless network is hacked.

UNIT I ETHICAL HACKING OVERVIEW & VULNERABILITIES 9


Understanding the importance of security, Concept of ethical hacking and essential Terminologies-
Threat, Attack, Vulnerabilities, Target of Evaluation, Exploit. Phases involved in hacking

UNIT II FOOTPRINTING & PORT SCANNING 9


Footprinting - Introduction to foot printing, Understanding the information gathering methodology of
the hackers, Tools used for the reconnaissance phase, Port Scanning - Introduction, using port
scanning tools, ping sweeps, Scripting Enumeration-Introduction, Enumerating windows OS & Linux
OS

UNIT III SYSTEM HACKING 9


Aspect of remote password guessing, Role of eavesdropping ,Various methods of password
cracking, Keystroke Loggers, Understanding Sniffers ,Comprehending Active and Passive Sniffing,
ARP Spoofing and Redirection, DNS and IP Sniffing, HTTPS Sniffing.

UNIT IV HACKING WEB SERVICES & SESSION HIJACKING 9


Web application vulnerabilities, application coding errors, SQL injection into Back-end Databases,
cross-site scripting, cross-site request forging, authentication bypass, web services and related
flaws, protective http headers. Understanding Session Hijacking, Phases involved in Session
Hijacking,Types of Session Hijacking, Session Hijacking Tools

UNIT V HACKING WIRELESS NETWORKS 9


Introduction To 802.11, Role Of WEP, Cracking WEP Keys, Sniffing Traffic, Wireless DOS Attacks,
Wlanscanners, Wlansniffers,Hackingtools,Securing Wireless Network
TOTAL:45 PERIODS
LIST OF EXPERIMENTS:
1: Study of Guessing username and passwords using Hydra
2: Experiment onRecovering password Hashes
3: Implementation to crack Linux passwords
4: Experiments on SQL injections
5: Analysis of WEP flaws
6: Experiments on Wireless DoS Attacks
7:Implementation of Buffer Overflow Prevention
8: Prevention against Cross Site Scripting Attacks
9: Experiments on Metasploit Framework
10: Implementation to identify web vulnerabilities
11. Wireshark: Experiment to monitor live network capturing packets and analyzing over
the live network
12. LOIC: DoS attack using LOIC

29
13. FTK: Bit level forensic analysis of evidential image and reporting the same.
14. Darkcomet : Develop a malware using Remote Access Tool Darkcomet to take a
remote access over network
15. HTTrack: Website mirroring using Httrack and hosting on a local network.
16. XSS: Inject a client side script to a web application
17. Emailtrackerpro: Email analysis involving header check, tracing the route. Also perform
a check on a spam mail and non-spam mail
TOTAL:30 PERIODS
COURSE OUTCOMES:
CO1: Understand vulnerabilities, mechanisms to identify vulnerabilities/threats/attacks
CO2: Use tools to identify vulnerable entry points
CO3: Identify vulnerabilities using sniffers at different layers
CO4: Handle web application vulnerabilities
CO5: Identify attacks in wireless networks

TOTAL:75 PERIODS
REFERENCES
1. Kimberly Graves, "Certified Ethical Hacker", Wiley India Pvt Ltd, 2010
2. Michael T. Simpson, "Hands-on Ethical Hacking & Network Defense", Course Technology,
2010
3. RajatKhare, "Network Security and Ethical Hacking", Luniver Press, 2006
4. Ramachandran V, “BackTrack 5 Wireless Penetration Testing Beginner’s Guide (3rd ed.).”
Packt Publishing, 2011
5. Thomas Mathew, "Ethical Hacking", OSB publishers, 2003
6. Matthew Hickey, Jennifer Arcuri, “Hands on Hacking: Become an Expert at Next Gen
Penetration Testing and Purple Teaming”, 1st Edition, Wiley, 2020.
7. Jon Ericson, Hacking: The Art of Exploitation, 2nd Edition, NoStarch Press, 2008.

CO-PO Mapping

CO POs
PO1 PO2 PO3 PO4 PO5 PO6
- -
1 2 3 - 3
-
2 3 2 1 2
3 3 -
3 2 2
- - -
4 2
-
5 2 2
Avg 2.2 2.5 2 3 2 2.5

30
BC4211 BIOMETRIC DATA PROCESSING LABORATORY LTPC
0 042
COURSE OBJECTIVES:
 To learn to implement Image Enhancement and Segmentation.
 To learn to implement Fingerprint Acquisition and Feature Extraction.
 To learn to implement Iris Acquisition and Face and Feature Extraction.
 To learn to implement 3D Biometric and Mobile Biometrics.

LIST OF EXPERIMENTS:
1:Implementation of Image Enhancement
2:Implementation of Image Segmentation
3:Implementation of Fingerprint Image Acquisition
4:Implementation of Fingerprint Feature Extraction
5:Implementation of Face Image Acquisition
6: Implementation of Face Feature Extraction
7: Implementation of Iris Image Acquisition
8: Implementation of Iris Feature Extraction
9: Implementation of 3D Biometric – Palmprint
10: Implementation of Mobile biometrics
COURSE OUTCOMES:
CO1:Design and Apply Image Enhancement and Segmentation.
CO2:Design and Apply Fingerprint Acquisition and Feature Extraction
CO3: Design and Apply Face and Iris Acquisition and Feature Extraction
CO4:Design and Apply 3D Biometric
CO5: Implement Mobile Biometrics
TOTAL: 60 PERIODS

CO-PO Mapping
CO POs

PO1 PO2 PO3 PO4 PO5 PO6


3 2 1 - 2 1
1
3 2 1 - 2 1
2
3 2 1 - 1 1
3
3 2 1 - 1 1
4
3 2 1 - 1 1
5
3 2 1 - 1 1
Avg

BC4212 TERM PAPER WRITING AND SEMINAR LT PC


0 02 1
In this course, students will develop their scientific and technical reading and writing skills that they
need to understand and construct research articles. A term paper requires a student to obtain
information from a variety of sources (i.e., Journals, dictionaries, reference books) and then place it
in logically developed ideas. The work involves the following steps:

31
1. Selecting a subject, narrowing the subject into a topic
2. Stating an objective.
3. Collecting the relevant bibliography (atleast 15 journal papers)
4. Preparing a working outline.
5. Studying the papers and understanding the authors contributions and critically analysing
each paper.
6. Preparing a working outline
7. Linking the papers and preparing a draft of the paper.
8. Preparing conclusions based on the reading of all the papers.
9. Writing the Final Paper and giving final Presentation

Please keep a file where the work carried out by you is maintained.
Activities to be carried out

Activity Instructions Submission Evaluation


week
nd
Selection of area You are requested to select an area of 2 week 3%
of interest and interest, topic and state an objective Based on clarity of
Topic thought, current
Stating an relevance and clarity
Objective in writing
rd
Collecting 1. List 1 Special Interest Groups or 3 week 3%
Information about professional society ( the selected
your area & topic 2. List 2 journals information must be
3. List 2 conferences, symposia or area specific and of
workshops international and
4. List 1 thesis title national standard)
5. List 3 web presences (mailing lists,
forums, news sites)
6. List 3 authors who publish regularly
in your area
7. Attach a call for papers (CFP) from
your area.
Collection of  You have to provide a complete list of 4th week 6%
Journal papers in references you will be using- Based on ( the list of standard
the topic in the your objective -Search various digital papers and reason
context of the libraries and Google Scholar for selection)
objective – collect  When picking papers to read - try to:
20 & then filter  Pick papers that are related to each
other in some ways and/or that are in
the same field so that you can write a
meaningful survey out of them,
 Favour papers from well-known
journals and conferences,
 Favour “first” or “foundational” papers
in the field (as indicated in other
people’s survey paper),
 Favour more recent papers,

32
 Pick a recent survey of the field so
you can quickly gain an overview,
 Find relationships with respect to
each other and to your topic area
(classification
scheme/categorization)
 Mark in the hard copy of papers
whether complete work or
section/sections of the paper are
being considered

Reading and Reading Paper Process 5th week 8%


notes for first 5  For each paper form a Table ( the table given
papers answering the following questions: should indicate your
 What is the main topic of the article? understanding of the
 What was/were the main issue(s) the paper and the
author said they want to discuss? evaluation is based
 Why did the author claim it was on your conclusions
important? about each paper)
 How does the work build on other’s
work, in the author’s opinion?
 What simplifying assumptions does
the author claim to be making?
 What did the author do?
 How did the author claim they were
going to evaluate their work and
compare it to others?
 What did the author say were the
limitations of their research?
 What did the author say were the
important directions for future
research?
Conclude with limitations/issues not
addressed by the paper ( from the
perspective of your survey)
Reading and Repeat Reading Paper Process 6th week 8%
notes for next5 ( the table given
papers should indicate your
understanding of the
paper and the
evaluation is based
on your conclusions
about each paper)
Reading and Repeat Reading Paper Process 7th week 8%
notes for final 5 ( the table given
papers should indicate your
understanding of the
paper and the

33
evaluation is based
on your conclusions
about each paper)

Draft outline 1 Prepare a draft Outline, your survey goals, 8th week 8%
and Linking along with a classification / categorization ( this component will
papers diagram be evaluated based
on the linking and
classification among
the papers)
Abstract Prepare a draft abstract and give a 9th week 6%
presentation (Clarity, purpose and
conclusion)
6% Presentation &
Viva Voce
Introduction Write an introduction and background 10th week 5%
Background sections ( clarity)
Sections of the Write the sections of your paper based on 11thweek 10%
paper the classification / categorization diagram (this component will
in keeping with the goals of your survey be evaluated based
on the linking and
classification among
the papers)
Your conclusions Write your conclusions and future work 12th week 5% ( conclusions –
clarity and your
ideas)
Final Draft Complete the final draft of your paper 13th week 10% (formatting,
English, Clarity and
linking)
4% Plagiarism Check
Report
Seminar A brief 15 slides on your paper 14th & 15th 10%
week (based on
presentation and
Viva-voce)

TOTAL: 30 PERIODS

BC4001 PRINCIPLES OF SECURE CODING LTPC


300 3
COURSE OBJECTIVES:
 Identify and analyze security problems and their vulnerabilities in software.
 Understand the various static analysis methods for secure programming.
 Understand the different secure coding techniques for handling inputs, errors, integer
and string operations in a software.
 Effectively apply their knowledge to write a secure web application

34
UNIT I SOFTWARE SECURITY 8
Security Concepts, Security Policy, Security Flaws, Vulnerabilities, Exploitation and Mitigations.
Software Security problems, Classification of Vulnerabilities.

UNIT II STATIC ANALYSIS 7


Problem Solving with static analysis: Type Checking, Style Checking, Program understanding,
verifications and property checking, Bug finding and Security Review.

UNIT III STRINGS AND INTEGER SECURITY 10


Strings: Common String manipulating Errors, String Vulnerabilities and Exploits, Mitigation
Strategies for strings, String handling functions, Runtime protecting strategies, Dynamic Memory
Management: Memory Management errors in C and C++ , Notable Vulnerabilities. Integer Security:
Integer data Type, Integer Conversions, Integer Operations, Integer Vulnerabilities, Mitigation
Strategies.

UNIT IV HANDLING INPUTS AND EXCEPTIONS 10


Handling Inputs: What to validate, How to validate, Preventing metadata Vulnerabilities, Buffer
Overflow: Introduction, Exploiting buffer overflow vulnerabilities, Buffer allocation strategies,
Tracking buffer sizes, buffer overflow in strings, Buffer overflow in Integers Runtime Protections.
Errors and Exceptions: Handling Error with return code, Managing exceptions, Preventing Resource
leaks, Logging and debugging.

UNIT V SECURE WEB APPLICATIONS 10


Input and Output Validation for the Web: Browser Subverted, HTTP Considerations: Use POST, Not
GET, Request Ordering, Error Handling, Request Provenance. Maintaining Session State: Use
Strong Session Identifiers, Enforce a Session Idle Timeout and a Maximum Session Lifetime, Begin
a New Session upon Authentication.

COURSE OUTCOMES:
CO1: Apply secure coding practices when developing a software.
CO2: Understand and perform a static analysis and security review of a software code.
CO3: Evaluate strings and integer vulnerabilities in a software code.
CO4: Handle inputs, overflow mechanisms, errors and exceptions in a software code.
CO5: Design a secure web application by performing input and output validation techniques on
the web.
TOTAL: 45 PERIODS
REFERENCES
1. Seacord, R. C., Secure Coding in C and C++, AddisonWesley, Software Engineering
Institute, 2nd edition, 2013. (UNIT- III)
2. Chess, B., and West, J., Secure Programming with Static Analysis, Addison Wesley
Software Security Series, 2007. (UNIT-II,IV,V)
3. Seacord, R. C., The CERT C Secure Coding Standard, Pearson Education, 2009.
4. Howard, M., LeBlanc, D., Writing Secure Code, 2nd Edition. Pearson Education, 2002.

35
CO-PO Mapping

CO POs

PO1 PO2 PO3 PO4 PO5 PO6


-
1 3 2 3 2
3
2 2 - 2
-
3 3 2 3 2
3
4 2 - -
-
5 3 2 1 2
Avg 2.6 2 2.333333 3 2 2

NE4251 NETWORK SECURITY LTPC


3 003
COURSE OBJECTIVES:
 To learn the fundamentals of cryptography and its application to network security.
 To understand the mathematics behind cryptography.
 To learn about the security issues in internet protocol.
 To understand the security issues in other layers
 To study about intrusion detection and prevention system and wireless hacking.

UNIT I INTRODUCTION TO NETWORK SECURITY 9


Security Services and Mechanisms – Vulnerabilities in wireless communications –security basics
– Attack and its types Security essentials on layers - Electronic signatures – PKI and electronic
certificate

UNIT II SYMMETRIC AND ASYMMETRIC CIPHERS 9


Classical Techniques – Substitution Ciphers - Transposition Ciphers. Modern symmetric ciphers :
Stream cipher - RC4, Block cipher - DES – AES – Uses of Modes of operation. Modern
Asymmetric block ciphers - RSA, ElGamal., MAC – Cryptographic Hash Functions- Key
management system- Key Distribution & Key Agreements.

UNIT III SECURITY ISSUES IN INTERNET PROTOCOL 9


Reconnaissance-Wireshark- TCPDump - Netdiscover - Shodan ,NESSUS,Hping3 NSE Scripts:
Introduction - How to write and read NSE script - TCP session Hijacking - UDP session Hijacking
-HTTP Session – Hijacking - Spoofing basics - IP, DNS and ARP Spoofing

UNIT IV SECURITY IN OTHER LAYERS 9


EMail Security and its services – PGP - S/MIME – DNS Security - VPN Concept and its
configuration - AAA Concept, RADIUS, TACACS+ technologies, SSL architecture and protocol.

UNIT V INTRUSION DETECTION AND PREVENTION 9


SYSTEM(IDPS) AND WIRELESS HACKING
IDPS introduction - Uses of IDPS Technologies - Key functions of IDPS Technologies , Signature
Based Detection , Anomaly Based Detection - Wireless networks - WPA Handshaking - Wireless
hacking tools.

36
COURSE OUTCOMES:
CO1: To design cryptographic algorithms and carry out their implementation.
CO2: To carry out cryptanalysis on cipher.
CO3: To be able to design and implement security based internet protocols.
CO4: To carry out system security for other layers.
CO5: To understand the importance of intrusion detection and prevention system and
wireless hacking.
TOTAL: 45 PERIODS
REFERENCES
1. Behrouz A. Ferouzan, Debdeep Mukhopadhyay ―Cryptography & Network Security, 3rd
edition, Tata McGraw Hill, 2015.
2. William Stallings “Network Security Essentials Applications and Standards", Pearson
Education., 5th Edition, 2014.
3. Ryan Russell, " Hack Proofing your network ", Wiley,2nd Edition,2002.
4. David M. Durton, “Elementary Number Theory”, Tata Mcgraw Hill, Sixth Edition, 2009.
5. Jonathan Katz, Yehuda Lindell, "Introduction to Modern Cryptography: Principles and
Protocols (Chapman & Hall/CRC Cryptography and Network Security Series)", 1st Edition
,CRC Press Taylor and Francis Group, 2008.
6. Douglas R. Stinson," Cryptography: Theory and Practice, Third Edition (Discrete
Mathematics and Its Applications), Chapman & Hall/CRC, 2005.

CO-PO Mapping

CO POs
PO1 PO2 PO3 PO4 PO5 PO6

1 3 2 2 1
3 - - 2
2 2
- 3
3 2 2 2
3 -
4 2 - 2
- 2
5 1 3 - 3
Avg 2 2.333333 3 2.5 2 2

BC4002 PUBLIC KEY INFRASTRUCTURE LTPC


3 003
COURSE OBJECTIVES:
 Understand public key infrastructure technology
 Understand Public Key Algorithms
 Understand centralized and decentralized infrastructure
 Understand concept of digital certificates
 Learn various security threats to E-commerce

UNIT I OVERVIEW OF PKI TECHNOLOGY 9


Overview of PKI Technology: Symmetric Vs. Asymmetric Ciphers, PKI Services, PKI Enabled
Services, Certificates and Certification, Digital Signatures, Securing Web Transactions, Key and

37
Certificate Life Cycles, PKI Standards, Third Party CA Systems, Secure Socket Layer(SSL), CA
System Attacks, Key Escrow Vs Key Recovery, Certification Practices, Securing Business
Applications, PKI Readiness.

UNIT II PKI ALGORITHMS 9


Public Key Algorithms, Knapsack, RSA, Pohlig-Hellman, Rabin, Elgamal, McEliece, Elliptic Curve
Cryptosystems, LUC, Finite Automation Public Key Cryptosystems, Public Key, Digital Signature
Cryptosystems: GOST, ESIGN.

UNIT III DESIGN, IMPLEMENTATION, MANAGEMENT 9


Design, Implementation and Management of PKI: PKI Design Issues, PKI-ROI, Architecture for PKI
(APKI), Implementing Secure Web services Requirements using PKI, Versign’s Foundation in
Managed Security Services, Implementation and Deployment, Implementation Costs, PKI
Performance, Obtaining a Certificate, Certification Revocation with Managed PKI, Open Revocation
Solutions for Today’s Enterprise PKI needs.

UNIT IV E-COMMERCE SECURITY THREATS 9


Security Threats to E-commerce: Internet Security Issues Overview, Intellectual Property Threats,
Threats to the Security-Client Computers, Communication Channels, Server Computers,
Implementing Electronics Commerce Security: Objects, Protecting- Client Computers,
Communication Channels, Web Server, Access Control: Authentication, Authorization and
Accountability Controls.

UNIT V APPLICATIONS OF PKI 9


Applications of PKI: Trust Models, Deployment and Operation, X.509 Certificates, E-commerce: the
building blocks – Trusted Business Environment for E-commerce, Certification, Certification Practice
and Policy, Registration, Certification usage and revocation, PKI in Electronic Government; Trusted
Services and PKI: Technology Commonality in Approaches and Government Initiatives.

COURSE OUTCOMES:
After the completion of this course, students will be able to
CO1: Understand the core fundamentals of public key infrastructures
CO2: Develop and use secure Public Key Algorithms
CO3: Design, Implement and Manage the public key infrastructures
CO4: Identify the security threats to E-commerce
CO5: Evaluate use of PKI for different applications
TOTAL: 45 PERIODS
REFERENCES
1. Larry Caffrey, Rogers W’O. Okot-Uma, “Trusted Services and Public Key Infrastructure PKI)
International Council of Information Technology in Government Administration, 2000.
2. Cartisle Adams, Steve Lloyd, “Understanding PKI: Concepts, Standards and Deployment
Considerations:, Pearson Education, 2003.
3. Vacca R Vacca, “Public Key Infrastructure: Building Trusted Applications and Web Services”,
CRC Press LLC 2004.
4. Andrew Nash, William Daune, Celia Joseph and Derek Brink, “PKI – Implementing and
Managing E-Security, Tata McGraw-Hill Edition, 2001.
5. GrayP.Schneider, “Electronic Commerce”, Fourth Annual Edition, 2003.

38
6. Roberta Bragg, Mark Phodes-Ousley and Keith Strassberg, “The Complete Reference
Network Security”, Tata McGraw-Hill Edition, 2004.
7. Bruce Schneier, “Applied Cryptography”, John Willey and Sons, 2001.

CO-PO Mapping

CO POs

PO1 PO2 PO3 PO4 PO5 PO6


-
1 2 - - 3
-
2 3 2 1 2 1
2 -
3 3 2 1
- -
4 2 3 -
-
5 3 2 2 1
Avg 2.6 2 2 2 2 1.5

BC4003 OPERATING SYSTEM SECURITY L T PC


3 0 0 3
COURSE OBJECTIVES:
 To learn the basics of operating system concepts and its security mechanisms.
 To understand the protection threats to an operating system and various protection
mechanisms.
 To understand the security goals and protect the operating system from threats and
attacks.
 To learn the security concepts for a server and analyze the various networking
technologies for the Linux operating system.

UNIT I INTRODUCTION 9
Introduction, Computer system organization and architecture, Operating system structure and
operations, Process Management, Memory Management, file systems management Protection and
security, Scheduling Algorithms, Interprocess Communication

UNIT II OPERATING SYSTEMS PROTECTION 9


Protection Goals, Protection Threats, Access Control Matrix, Access Control Lists(ACL‘s), Capability
Lists(C-lists), Protection systems, Lampson‘s access matrix, mandatory protection systems,
Reference monitor, Secure operating system definition

UNIT III OPERATING SYSTEM SECURITY 9


Security Goals, Security Threats, Security Attacks- Trojan Horses, Viruses and Worms, Buffer
Overflow attacks and Techniques, Formal Aspects of Security, Encryption- Attacks on Cryptographic
Systems, Encryption Techniques, Authentication and Password Security, Intrusion detection,
malware defenses, UNIX and Windows Security

39
UNIT IV SYSTEM ADMINISTRATION 9
Security Basics, Securing the Server Itself, Maintenance and Recovery, Monitoring and Audit,
Introduction to Linux Systems, Configuration Management, Log Auditing and Vulnerability
Assessment.

UNIT V LINUX NETWORKING 9


Networking Technologies: DHCP, DNS, NFS/ISCSI, SMTP, SNMP, LAMP, Firewall/IDS/SSH,
Securing Linux. Case Studies: Security and Protection- MULTICS, UNIX, LINUX and Windows,
Windows and Linux Coexisting.

COURSE OUTCOMES:
CO1:Understand the operating system’s security concepts and its security control
mechanisms.
CO2:Demonstrate the Access control matrix, access control list and Lampson‘s access
matrix
CO3:Identify the Encryption Techniques, Authentication and Password Security issues
CO4:Understand the security threats and attacks on cryptographic systems
CO5: Apply the security and protection mechanisms for different operating systems

TOTAL: 45 PERIODS
REFERENCES
1. Abraham Silberschatz, Peter Baer Galvin, Greg Gagne, “Operating System Concepts”, 10th
Edition, Wiley Publication, 2018 (Unit 1)
2. Dhananjay M. Dhamdhere, “Operating Systems: A Concept-Based Approach”, 3rd Edition,
McGraw- Hill, 2015 (Unit 2, 3)
3. Jordan Krause, “Windows Server 2016 Security, Certificates, and Remote Access
Cookbook: Recipe-based guide for security, networking and PKI in Windows Server 2016”,
Pckt Publishing, 2018.
4. Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley, Dan Mackin,“Linux Administration
Handbook”, Fifth Edition, Addison-Wesley, 2017 (Unit 5)
5. Promod Chandra P Bhat,, “An Introduction to Operating Systems: Concepts and practice”,
5th Edition, Prentice Hall of India, 2019.
6. William Stalling, “Operating System: Internals and Design Principles”, 9th Edition, Pearson,
2017.
7. Tom Adelstein and Bill Lubanovic, “Linux System Administration”, 1st Edition, Shroff., 2012.

CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
- -
1 2 3 -
2 3 2 3 2 2
- 2
3 2 1
- 3
4 2 2
-
5 3 2 3 2 1

40
Avg 2.4 2 3 2.5 2.333333 1.5

CP4391 SECURITY PRACTICES L T PC


3 0 0 3
COURSE OBJECTIVES:
 To learn the core fundamentals of system and web security concepts
 To have through understanding in the security concepts related to networks
 To deploy the security essentials in IT Sector
 To be exposed to the concepts of Cyber Security and cloud security
 To perform a detailed study of Privacy and Storage security and related Issues

UNIT I SYSTEM SECURITY 9


Model of network security – Security attacks, services and mechanisms – OSI security architecture -
A Cryptography primer- Intrusion detection system- Intrusion Prevention system - Security web
applications- Case study: OWASP - Top 10 Web Application Security Risks.

UNIT II NETWORK SECURITY 9


Internet Security - Intranet security- Local Area Network Security - Wireless Network Security -
Wireless Sensor Network Security- Cellular Network Security - Mobile security - IOT security - Case
Study - Kali liunx.

UNIT III SECURITY MANAGEMENT 9


Information security essentials for IT Managers- Security Management System - Policy Driven System
Management- IT Security - Online Identity and User Management System. Case study: Metasploit

UNIT IV CYBER SECURITY AND CLOUD SECURITY 9


Cyber Forensics- Disk Forensics – Network Forensics – Wireless Forensics – Database Forensics –
Malware Forensics – Mobile Forensics – Email Forensics- Best security practices for automate Cloud
infrastructure management – Establishing trust in IaaS, PaaS, and SaaS Cloud types. Case study:
DVWA

UNIT V PRIVACY AND STORAGE SECURITY 9


Privacy on the Internet - Privacy Enhancing Technologies - Personal privacy Policies - Detection of
Conflicts in security policies- privacy and security in environment monitoring systems. Storage Area
Network Security - Storage Area Network Security Devices - Risk management - Physical Security
Essentials.

COURSE OUTCOMES:
CO1: Understand the core fundamentals of system security
CO2: Apply the security concepts to wired and wireless networks
CO3: Implement and Manage the security essentials in IT Sector
CO4: Explain the concepts of Cyber Security and Cyber forensics
CO5: Be aware of Privacy and Storage security Issues.
TOTAL: 45 PERIODS

REFERENCES
1. John R. Vacca, Computer and Information Security Handbook, Third Edition, Elsevier 2017
41
2. Michael E. Whitman, Herbert J. Mattord, Principles of Information Security, Seventh Edition,
Cengage Learning, 2022
3. Richard E. Smith, Elementary Information Security, Third Edition, Jones and Bartlett Learning,
2019
4. Mayor, K.K.Mookhey, Jacopo Cervini, Fairuzan Roslan, Kevin Beaver, Metasploit Toolkit for
Penetration Testing, Exploit Development and Vulnerability Research, Syngress publications,
Elsevier, 2007. ISBN : 978-1-59749-074-0
5. John Sammons, “The Basics of Digital Forensics- The Primer for Getting Started in Digital
Forensics”, Syngress, 2012
6. Cory Altheide and Harlan Carvey, “Digital Forensics with Open Source Tools”,2011 Syngress,
ISBN: 9781597495875.
7. Siani Pearson, George Yee "Privacy and Security for Cloud Computing" Computer
Communications and Networks, Springer, 2013.

CO-PO Mapping

CO POs

PO1 PO2 PO3 PO4 PO5 PO6


1 2 3
2 3 2 3 2 1
3 3 2 3 2 1
4 2 3 2
5 2 3
Avg 2.4 2 3 3 2.333333 1.75

MU4252 MEDIA SECURITY LT PC


3 0 03
COURSE OBJECTIVES:
 To understand the cryptanalysis on standard algorithms meant for confidentiality, integrity
and authenticity.
 To know about Digital rights management.
 To know about the concepts of Digital Watermarking techniques.
 To understand the concept of Steganography
 To learn the privacy preserving techniques on Multimedia data.

UNIT I CRYPTANALYSIS AND DIGITAL RIGHTS MANAGEMENT 9


Cryptanalysis Techniques – Encryption Evaluation metrics – Histogram Deviation - Introduction to
DRM – DRM Products –DRM Laws
Suggested Activities:
1. External learning - cryptanalysis for algorithms such as AES, RSA.
2. Analysis for DRM products.
Suggested Evaluation Methods:
1. Group discussion on linear and differential cryptanalysis of cryptographic algorithms.
42
2. Tutorial on DRM products.

UNIT II DIGITAL WATERMARKING BASICS 9


Introduction – Basics Models of Watermarking – Basic Message Coding – Error Correction
coding – Mutual Information and Channel Capacity – Designing a Good Digital Watermark –
Information Theoretical Analysis of Digital Watermarking.
Suggested Activities:
1. Problems on Error Correction Coding.
2. Designing a good watermark.
Suggested Evaluation Methods:
1. Assignment on ECC.
2. Tutorial on DRM products.

UNIT III DIGITAL WATERMARKING SCHEMES AND PROTOCOLS 9


Spread Spectrum Watermarking – Block DCT-domain Watermarking – Watermarking with Side
Information – Dirty-paper Coding – Quantization Watermarking – buyer Seller Watermarking
Protocol – Media Specific Digital Watermarking: Image WM, Video WM , Audio WM–
Watermarking for CG-Models: Watermarking for Binary Images and 3D Contents – Data Hiding
Through Watermarking Techniques.
Suggested Activities:
1. Implementation of buyer seller watermarking protocol.
2. Analyzing the performance of different media specific WM and WM for CG models.
Suggested Evaluation Methods:
1. Tutorial - Media specific watermarking techniques.
2. Group discussion on the performance evaluation of watermarking techniques.

UNIT IV STEGANOGRAPHY AND STEGANALYSIS 9


Stenographic Communication – Notation and Terminology – Information –Theoretic Foundations
of Steganography – Cachin’s Definition of Steganographic Security – Statistics Preserving
Steganography – Model-Based Steganography – Masking Embedding as Natural Processing –
Minimizing the Embedding Impact – Matrix Embedding –Nonshared Selection Rule – Steganalysis
Algorithms: LSB Embedding and the Histogram Attack – Sample Pairs Analysis.
Suggested Activities:
1. An application to be developed using Steganography.
Suggested Evaluation Methods:
 Can be done by hiding capacity,Distortion measure and Security
 Project.

UNIT V MULTIMEDIA ENCRYPTION 9


Multimedia Processing in the Encryption Domain – Information Processing – Data Sanitization –
Finger Printing – Digital Forensics: Intrusive and Non- Intrusive –Forgeries Detection– Privacy
Preserving – Surveillance.
Suggested Activities:
1. Case study on forensic data.
2. Case study on forgery detection.

43
Suggested Evaluation Methods:
1. Group discussion on case studies.

COURSE OUTCOMES:
CO1:Identify the security challenges and issues that may arise in any system.
1. CO2:Implement the concepts of steganography, digital watermarking techniques.
2. CO3:Design secure applications using steganography and watermarking schemes
3. CO4:Apply concepts on digital rights management while developing secure systems
4. CO5:Design a secure multimedia system using encryption and privacy preservation techniques.
TOTAL: 45 PERIODS
REFERENCES
1. Frank Shih, “Digital Watermarking and Steganography: Fundamentals and Techniques”,
CRC Press,Second Edition 2017.
2. Fathi E. Abd El-Samie, HossamEldin H. Ahmed, Ibrahim F. Elashry, Mai H. Shahieen,
Osama S. Faragallah, El-Sayed M. El-Rabaie, Saleh A. Alshebeili , “Image Encryption: A
Communication Perspective”, CRC Press,First Edition 2013.
3. Douglas R. Stinson, “Cryptography Theory and Practice”, Fourth Edition, Chapman &
Hall/CRC,2006
4. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, 2006.
5. Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich and TonKalker, “Digital
Watermarking and Steganography”, Second Edition, Elsevier, 2007.

CO-PO Mapping
CO POs

PO1 PO2 PO3 PO4 PO5 PO6


- - - -
1 2 3
-
2 3 2 1 2 1
2
3 3 2 2 1
-
4 3 2 1 2 1
-
5 3 2 2 1 2
Avg 2.8 2.25 1.5 2 1.75 1.25

BC4004 BIOMETRIC SECURITY LT P C


3 0 0 3
COURSE OBJECTIVES:
 To understand the various attacks in biometric systems.
 To acquire knowledge on biometric authentication protocols
 To understand the various key distribution and management strategies.
 To understand how to deploy encryption techniques to secure data using biometric
 To gain knowledge on security criteria and adopt security measures for a biometric
system

44
UNIT I ATTACKS IN BIOMETRIC 9
Adversary attacks-attacks at the user Interface-Attacks on the biometric processing, Attacks on
template database –system security analysis – spoofing and mimicry attacks

UNIT II BIOMETRIC AUTHENTICATION PROTOCOLS 9


Introduction-biometric based secure cryptographic protocols – biometrics based cryptographic key
Regeneration and sharing – Biometrics based session key generation and sharing protocol –
performance evaluation strategies.

UNIT III BIOMETRIC CRYPTOGRAPHY 9


Protection of biometric data –biometric data shuffling scheme- experimental results –security
analysis - cryptographic key Reservation - cryptographic key with biometrics-Revocability in key
generation system-Adaptations of Generalized key Regeneration scheme –IRIS Biometrics –Face
Biometrics –Extension of Key Regeneration scheme.

UNIT IV BIOMETRIC DATA PROTECTION 9


Biometric data – Concept of personal data – Data protection and privacy – Security criteria for
Biometric system – Adoption of security – Revocation procedures – Security and organizational
aspects of biometric system.

UNIT V BIOMETRIC MULTIMODAL APPLICATIONS 9


Integration – Multiple traits – Multiple snapshots – Score fusion methods – Applications – Board
Security – Identification cards – Biometrics on smart cards – Overview of local and global structure
– Mechanism for on card comparison – Off card and On card alignment – Smart textile sensors –
Bio signals – Biometrics and intelligence services.

COURSE OUTCOMES:
CO1: Implement basic security algorithms required by the biometric system
CO2: Analyze the vulnerabilities in biometric system and hence be able to design a security
Solution
CO3: Analyze the possible security attacks in complex real time systems and their effective
Countermeasures
CO4: Identify the security issues in the network and resolve it
CO5: Formulate research problems in the biometric security field
TOTAL: 45 PERIODS
REFERENCES
1. David Check Ling Ngo,Andrew Beng Jin Teoh,Jiankun Hu "Biometric Security", Cambridge
Scholars,2015
2. Els. J.Kindt, “Privacy and data protection issues of Biometric Applications “, Springer,2013.
3. Eliza Yinzi Du, “Biometrics from fiction to practice”, Panstandford Publishers 2012
4. James wayman, “Introduction to Biometrics”, Springer 2011
5. Liangwang,Xin Geng "Behavioral Biometrics for Human Identifications Intelligent
Applications" Medical Information Science Reference, IGI Global 2010
6. Patrizio campisi "Security and Privacy in Biometrics", Springer 2013
7. Sanjay G.Kanade “Enhancing Information Security and Privacy”, by combining Biometrics
with Cryptography, Morgan and Claypool Publishers,2012

45
CO-PO Mapping

CO POs

PO1 PO2 PO3 PO4 PO5 PO6


3 2 1 - 2 1
1
3 2 1 - 2 1
2
3 2 1 - 2 1
3
- - - - - -
4

5 3 2 1 2 2 2

Avg 3 2 1 2 2 1

BC4005 SECURE SYSTEMS ENGINEERING LTPC


3 003
COURSE OBJECTIVES:
 Study of designing secure systems.
 Understandthe micro architectural level of security.
 Understand hardware, operating system, and application layer vulnerabilities.
 Study countermeasures for system level attacks.

UNIT I HARDWARE SECURITY 8


Hardware Security - Hardware Trojans and Detection, PUFs - Power Analysis Attacks and
Countermeasures - Fault Attacks - Implementation Aspects of Crypto Algorithms (A case study of
AES and ECC)

UNIT II MICRO ARCHITECTURAL SECURITY 7


Micro Architectural Security - Timing attacks and Covert Channels - RAM based attacks - Cold boot
– Rowhammer

UNIT III OPERATING SYSTEM SECURITY 10


Operating System Security - Stack Smashing Attacks - Dynamic Memory Allocation Attacks - Format
String Vulnerabilities - return-to-libc attacks - ROP attacks - Side Channel Attacks in Operating
Systems - Countermeasures - Non-executable stacks - Capability based Systems - Canaries -
Malware Analysis Techniques

UNIT IV APPLICATION SECURITY 10


Application Security SQL Insertion - ShellShock - Heart bleed bug, Covert Channels, Flush+Reload
Attacks, Prime+Probe, Meltdown, Spectre

UNIT V SYSTEMS SECURITY 10


Systems Security- Formal Verification of Security Protocols, Power Analysis Attacks,
PowerAnalysisAttacks, Hardware Trojans, FANCI: Identification of Stealthy Malicious Logic,
Detecting Hardware Trojans in ICs, Protecting against Hardware Trojans, Side Channel Analysis,
Fault Attacks on AES
46
COURSE OUTCOMES:
CO1: Identify and analyse vulnerabilities at hardware level
CO2: Identify micro architectural level security
CO3: Analyse and apply countermeasures to operating system level attacks
CO4: Apply malware analysis techniques at system level
CO5: Understand and analyse application level security
TOTAL: 45 PERIODS
REFERENCES
1. Chester Rebeiro, Debdeep Mukhopadhyay and Sarani Bhattacharya, "Timing Channels in
Cryptography, A Micro- Architectural Perspective ", Springer, 2015
2. Secure Systems Engineering, https://nptel.ac.in/courses/106/106/106106199 (Unit 4,5)
3. Swarup Bhunia, Mark Tehranipoor, “Hardware Security: A Hands-on Learning Approach”,
Morgan Kauffmann, 2018.
4. S. Garfinkel and L. F. Cranor, "Security and Usability: Designing Secure Systems That
People Can Use", O’Reilly, 2008
5. Matt Bishop , "Computer Security: Art and Science”, 2nd Edition, Addison-Wesley, 2018.

CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
- 2 - -
1 2
- - - -
2 2 1
-
3 3 2 1 1 2
-
4 3 2 2 1 1
- - -
5 2
Avg 2.4 1.666667 1.5 2 1 1.5

BC4006 CLOUD SECURITY L T P C


3 0 0 3
COURSE OBJECTIVES:
 To Introduce Cloud Computing terminology, definition & concepts
 To understand the security design and architectural considerations for Cloud
 To understand the Identity, Access control in Cloud
 To follow best practices for Cloud security using various design patterns
 To be able to monitor and audit cloud applications for security

UNIT I FUNDAMENTALS OF CLOUD COMPUTING 9


Understand what is Cloud computing, Architectural and Technological Influences of Cloud
Computing, Understand the Cloud deployment models, Public, Private, Community and Hybrid
models, Scope of Control, Software as a Service (SaaS), Platform as a Service (PaaS),
Infrastructure as a Service (IaaS), Cloud Computing Roles, Risks and Security Concerns
47
UNIT II SECURITY DESIGN AND ARCHITECTURE FOR CLOUD 9
Guiding Security design principles for Cloud Computing, Comprehensive data protection, End-to-
end access control, CSA, NIST and ENISA guidelines for Cloud Security, Common attack vectors
and threats, Compute, Network and Storage, Secure Isolation Strategies, Multitenancy,
Virtualization strategies, Inter-tenant network segmentation strategies, Storage isolation
strategies, Data Protection strategies, Data retention, deletion and archiving procedures for tenant
data, Encryption, Data Redaction, Tokenization, Obfuscation, PKI and Key

UNIT III ACCESS CONTROL AND IDENTITY MANAGEMENT 10


Understand the access control requirements for Cloud infrastructure, Enforcing Access Control
Strategies, Authentication and Authorization, Roles-based Access Control, Multi-factor
authentication, Host, storage and network access control options, OS Hardening and minimization,
securing remote access, Verified and measured boot, Firewalls, Intruder Detection, Intruder
prevention and honeypots, User Identification, Authentication, and Authorization in Cloud
Infrastructure, Identity & Access Management, Single Sign-on, Identity Federation, Identity
providers and service consumers, The role of Identity provisioning

UNIT IV CLOUD SECURITY DESIGN PATTERNS 9


Introduction to Design Patterns, Platform-to-Virtualization & Virtualization-to-Cloud, Cloud
bursting, Geo-tagging, Cloud VM Platform Encryption, Secure Cloud Interfaces, Cloud Resource
Access Control, Secure On-Premise Internet Access, Secure External Cloud Connection, Cloud
Denial-of-Service Protection, Cloud Traffic Hijacking Protection, Cloud Authentication Gateway,
Federated Cloud Authentication, Cloud Key Management

UNIT V MONITORING, AUDITING AND MANAGEMENT 8


Proactive activity monitoring, Incident Response, Monitoring for unauthorized access, malicious
traffic, abuse of system privileges, intrusion detection, events and alerts, Auditing – Record
generation, Reporting and Management, Tamper-proofing audit logs, Quality of Services, Secure
Management, User management, Identity management, Security Information and Event
Management

COURSE OUTCOMES:
CO1: Understand the cloud concepts and fundamentals.
CO2: Explain the security challenges in cloud.
CO3: Define cloud policy and Identity and Access Managements.
CO4: Understand various risks, and audit and monitoring mechanisms in cloud.
CO5: Define the various architectural and design considerations for security in cloud.
TOTAL PERIODS:45
REFERENCES
1. Raj Kumar Buyya , James Broberg, andrzej Goscinski, ―Cloud Computing:‖, Wiley 2013
2. Dave shackleford, ―Virtualization Security‖, SYBEX a wiley Brand 2013.
3. Mather, Kumaraswamy and Latif, ―Cloud Security and Privacy‖, OREILLY 2011
4. Mark C. Chu-Carroll ―Code in the Cloud‖,CRC Press, 2011
5. Mastering Cloud Computing Foundations and Applications Programming Rajkumar
Buyya, Christian Vechhiola, S. Thamarai Selvi

48
CO-PO Mapping

CO POs

PO1 PO2 PO3 PO4 PO5 PO6


- -
1 2 - 3
2 -
2 2 1 1 -
- -
3 2 2 - 1
- 2
4 2 1 3 -
- - -
5 2 2 1
Avg 2 1.5 2 2 2 1.666667

BC4007 FIREWALL AND VPN SECURITY L T P C


3 0 0 3
COURSE OBJECTIVES:
 Identify and assess current and anticipated security risks and vulnerabilities
 Develop a network security plan and policies
 Establish a VPN to allow IPSec remote access traffic
 Monitor, evaluate and test security conditions and environment
 Develop critical situation contingency plans and disaster recovery plan
 Implement/test contingency and backup plans and coordinate with stakeholders
 Monitor, report and resolve security problems

UNIT I INTRODUCTION 9
Introduction, Types of Firewalls, Ingress and Egress Filtering, Types of Filtering, Network Address
Translation (NAT), Application Proxy, Circuit Proxy, Content Filtering, Software versus Hardware
Firewalls, IPv4 versus IPv6 Firewalls, Dual-Homed and Triple-Homed Firewalls, Placement of
Firewalls.

UNIT II VPN FUNDAMENTALS 9


VPN Deployment Models and Architecture, Edge Router, Corporate Firewall, VPN Appliance,
Remote Access, Site-to-Site, Host-to-Host, Extranet Access, Tunnel versus Transport Mode, The
Relationship Between Encryption and VPNs, Establishing VPN Connections with Cryptography,
Digital Certificates, VPN Authorization.

UNIT III EXPLORING THE DEPTHS OF FIREWALLS 9


Firewall Rules, Authentication and Authorization, Monitoring and Logging, Understanding and
Interpreting Firewall Logs and Alerts, Intrusion Detection, Limitations of Firewalls, Downside of
Encryption with Firewalls, Firewall Enhancements, and Management Interfaces.

UNIT IV OVERVIEW OF INDUSTRIAL CONTROL SYSTEMS 9


Overview of SCADA, DCS, and PLCs, ICS Operation, Key ICS Components, Control Components,
Network Components, SCADA Systems, Distributed Control Systems, Programmable Logic
Controllers, Industrial Sectors and Their Interdependencies.
49
UNIT V SCADA PROTOCOLS 9
Modbus RTU, Modbus TCP/IP, DNP3, DNP3 TCP/IP, OPC, DA/HAD, SCADA protocol fuzzing,
Finding Vulnerabilities in HMI: software- Buffer Overflows, Shell code. Previous attacks Analysis-
Stuxnet, Duqu.

COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Show the fundamental knowledge of Firewalls and it types
CO2: Construct a VPN to allow Remote Access, Hashing, connections with Cryptography
and VPN Authorization
CO3: Elaborate the knowledge of depths of Firewalls, Interpreting firewall logs, alerts,
Intrusion and Detection
CO4: Explain the design of Control Systems of SCAD, DCS, PLC‘s and ICS‘s
CO5: Evaluate the SCADA protocols like RTU, TCP/IP, DNP3, OPC,DA/HAD
TOTAL: 45 PERIODS
REFERENCES
1. J. Michael Stewart and Denise Kinsey "Network Security, Firewalls, and VPNs", 3rd Edition,
Jones & Bartlett Learning, October 2020, ISBN: 9781284183696
2. T. Macaulay and B. L. Singer, Cyber security for Industrial Control Systems: SCADA, DCS,
PLC, HMI, and SIS, Auerbach Publications, 2011.
3. J. Lopez, R. Setola, and S. Wolthusen, Critical Infrastructure Protection Information
Infrastructure Models, Analysis, and Defense, Springer-Verlag Berlin Heidelberg, 2012.
4. Robert Radvanovsky and Jacob Brodsky, editors. Handbook of SCADA/Control Systems
Security. Routledge, 2020, ISBN 9780367596668.
5. A.W. Colombo, T. Bangemann, S. Karnouskos, S. Delsing, P. Stluka, R. Harrison, et al.
Industrial cloud-based cyber-physical systems Springer International Publishing, 2014
6. D. Bailey, Practical SCADA for Industry. Burlington, MA: Newnes, 2003.
CO-PO Mapping

CO POs
PO1 PO2 PO3 PO4 PO5 PO6
-
1 2 1 - 1 -
-
2 3 2 2 2 1
-
3 3 2 2 2 2
- - - -
4 2
- 3
5 2 2 1 1
Avg 2.4 1.75 2 3 1.5 1.33

BC4008 MOBILE AND DIGITAL FORENSICS L T PC


3 0 0 3
COURSE OBJECTIVES:
 Understand the basics of wireless technologies and security.
 Become knowledgeable in mobile phone forensics and android forensics.
 Learn the methods of investigation using digital forensic techniques.
50
UNIT I INTRODUCTION 9
Overview of wireless technologies and security: Personal Area Networks, Wireless Local Area
Networks, Metropolitan Area Networks, Wide Area Networks. Wireless threats, vulnerabilities and
security: Wireless LANs, War Driving, WarChalking, War Flying, Common Wi-fi security
recommendations, PDA Security, Cell Phones and Security, Wireless DoS attacks, GPS Jamming,
Identity theft.

UNIT II CONFIDENTIALITY, INTEGRITY, AVAILABILITY TRIAD IN MOBILE 9


Confidentiality, integrity, availability (CIA) triad in mobile phones-Voice, SMS and Identification data
interception in GSM: Introduction, practical setup and tools, implementation- Software and Hardware
Mobile phone tricks: Netmonitor, GSM network service codes, mobile phone codes, catalog tricks
and AT command set- SMS security issues

UNIT III MOBILE PHONE FORENSICS 12


Mobile phone forensics: crime and mobile phones, evidences, forensic procedures, files present in
SIM card, device data, external memory dump, evidences in memory card, operators systems-
Android forensics: Procedures for handling an android device, imaging android USB mass storage
devices, logical and physical techniques

UNIT IV DIGITAL FORENSICS 7


Digital forensics: Introduction – Evidential potential of digital devices: closed vs. open systems,
evaluating digital evidence potential- Device handling: seizure issues, device identification,
networked devices and contamination

UNIT V DIGITAL FORENSICS EXAMINATION PRINCIPLES 8


Digital forensics examination principles: Previewing, imaging, continuity, hashing and evidence
locations- Seven element security model- developmental model of digital systems- audit and logs-
Evidence interpretation: Data content and context

COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Undertand the basics of mobile and digital security.
CO2: Explain mobile phone forensics and android forensics.
CO3: Analyse issues in Digital forensics.
CO4: Understand the common data privacy techniques.
CO5: Examine and analyze Digital forensics techniques.
TOTAL: 45 PERIODS
REFERENCES
1. Gregory Kipper, “Wireless Crime and Forensic Investigation”, Auerbach Publications, 2007
2. Iosif I. Androulidakis, “Mobile phone security and forensics: A practical approach”, Springer
publications, Second Edition, 2016
3. Andrew Hoog, “Android Forensics: Investigation, Analysis and Mobile Security for Google
Android”, Elsevier publications, 2011
4. Angus M.Marshall, “ Digital forensics: Digital evidence in criminal investigation”, John – Wiley
and Sons, 2008

51
CO-PO Mapping

CO POs

PO1 PO2 PO3 PO4 PO5 PO6


3 -
1 2 2 -
- -
2 2 1 - 2
-
3 3 2 3 2 1
-
4 2 - 1 -
-
5 3 2 2 3 3
Avg 2.4 1.666667 2.666667 - 2 2

BC4009 ACCESS CONTROL AND IDENTITY MANAGEMENT SYSTEMS LTPC


3 003
COURSE OBJECTIVES:
 To understand the importance of Identity Access and Management (IAM),
 To understand the regulations and industry standards for Identity management
 To build the capability to assess the risks, understand the techniques for Identity and
authentication
 To learn and devise various access control techniques and access control systems
 To do typical case studies of online applications

UNIT I INTRODUCTION 10
Why IAM – roadmap to IAM- concepts of identity and access-The Need for Identity Management-
Who Is in the IT Environment-The Need to Provide Access to Multiple Resources.
COMPLYING WITH REGULATIONS - Health Insurance Portability and Accountability Act (HIPAA),
Federal Security Information Security Act (FISMA).Sarbanes-Oxley Act. Managing Identities in
Distributed Environments Effective identity management.
INDUSTRY STANDARDS FOR IDENTITY MANAGEMENT- Industry standard protocols to enable
cost-effective identity management - Service Provisioning Markup Language (SPML), Security
Assertions Markup Language (SAML), extensible Access Control Markup Language (XACML),
Lightweight Directory Access Protocol (LDAP) and X.500, Directory Services Markup Language
(DSML), Universal Description Discovery Integration (UDDI), Web Services Security(WS-S).

UNIT II IDENTITY MANAGEMENT 8


Business Drivers, Identity and Access Management- key Concepts , Adoption risks, components,
Administration of Access Rights and Entitlements, provisioning process and enforcement process,
use of technology in IAM, auditing IAM. Managing identity including Internet of Things. Identification
and Authentication Techniques -Passwords, Biometrics, Tokens, Tickets, Single Sign-on (SSO),
Multiple Authentication Factors.

UNIT III ACCESS MANAGEMENT 9


Types of access control, Layered access controls and “defense in depth”, The Process of
Accountability. Access Control Techniques- DiscretionaryAccess Controls (DAC), Non
Discretionary Access Controls (NAC), Mandatory Access Controls (MAC), Role-Based Access

52
Controls (RBAC), Task Based Access Controls (TBAC),Lattice-Based Access Controls. Access
Control Methodologies and Implementations - Access Control Administration - Account
Administration - Account, Log, and Journal Monitoring/Audits- Access Rights and Permissions.

UNIT IV ACCESS CONTROL SYSTEMS 9


Security, Identity Management and Trust Models Current access management technologies.
Authentication technologies-overview, authentication by third parties, choosing an authentication
system. Authorization based on physical location-IP address-based licensing, Authorization based
on user identity or affiliation.

UNIT V CASE STUDIES 9


Technology, Architecture and Controlling Access to Online/Mobile Applications-Library, Banking
and Shopping

COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Understand the role of IAM with emerging mobile information society, compliance and
regulations and industry standards for Identity management.
CO2: Perform risks assessment
CO3: Compare various access control techniques.
CO4: Choose the appropriate Programming Models and approach
CO5: Carry out analysis and report strength and weakness if IAM in a given typical online
applications.
TOTAL: 45 PERIODS
REFERENCES
1. MessaoudBenantar, ”Access Control Systems: Security, Identity Management and Trust
Models”, IBM Corp, Austin, TX, USA. Library of Congress, ISBN-13: 978-0-387-00445-7
e-ISBN-13: 978-0-387-27716-5.
2. Masha Garibyan, Simon McLeish and John Paschoud, “Access and Identity Management
for Libraries: Controlling access to online information”, Facet Publishing
2014 www.facetpublishing.co.uk.
3. Frank Bresz, Ernst & Young LLP et. al., “Identity and Access Management GTAG'', The
Institute of Internal Auditors, Altamonte Springs, FL32701-4201. 2007.
4. Ray Wagner, “Identity and Access Management”, Digital 2020, ISSA Journal , June 2014
, www.issa.org.
5. Dan Sullivan, “The Definitive Guide to Security Management”,
Realtimepublishers.com chapter5:Identity and Access Management
http://www3.ca.com/ebook/.
6. Elena Ferrari and M. Tamer A-zsu , “Access Control In Data Management Systems”, Morgan
& Claypool Publishers, 2010.

CO-PO Mapping
CO POs

PO1 PO2 PO3 PO4 PO5 PO6


- -
1 2 3 - 2
2 -
2 2 1 1 -
53
- 3 - -
3 2 1
2 -
4 2 3 2 1
- 2
5 2 1 1 2
Avg 2 1.8 2 2.5 1.333333 1.666667

IF4095 LTPC
SOCIAL NETWORK ANALYSIS
3 003
COURSE OBJECTIVES:
 Formalise different types of entities and relationships as nodes and edges and represent this
information as relational data.
 Understand the fundamental concepts in analyzing the large-scale data that are derived from
social networks
 Understand the basic concepts and principles of different theoretical models of social
networks analysis.
 Transform data for analysis using graph-based and statistics-based social network measures
 Choose among social network designs based on research goals

UNIT I GRAPH THEORY AND STRUCTURE 10


Breadth First Search (BFS) Algorithm. Strongly Connected Components (SCC) Algorithm. Weakly
Connected Components (WCC) Algorithm. First Set of Experiments—Degree Distributions. Second
Set of Experiments—Connected Components. Third Set of Experiments—Number of Breadth First
Searches. Rank Exponent R. Out-Degree Exponent O. Hop Plot Exponent H. Eigen Exponent E.
Permutation Model. Random Graphs with Prescribed Degree Sequences. Switching Algorithms.
Matching Algorithm. “Go with the Winners” Algorithm. HyperANF Algorithm. Iterative Fringe Upper
Bound (iFUB) Algorithm. Spid. Degree Distribution. Path Length. Component Size. Clustering
Coefficient and Degeneracy. Friends-of-Friends. Degree Assortativity. Login Correlation.

UNIT II SOCIAL NETWORK GRAPH ANALYSIS 9


Social network exploration/ processing and properties: Finding overlapping communities, similarity
between graph nodes, counting triangles in graphs, neighborhood properties of graphs. Pregel
paradigm and Apache Giraph graph processing system.

UNIT III INFORMATION DIFFUSION IN SOCIAL NETWORKS 9


Strategic network formation: game theoretic models for network creation/ user behavior in social
networks. Information diffusion in graphs: Cascading behavior, spreading, epidemics,
heterogeneous social network mining, influence maximization, outbreak detection. Opinion analysis
on social networks: Contagion, opinion formation, coordination and cooperation.

UNIT IV CASCADING IN SOCIAL NETWORKS 8


Cascading in Social Networks. Decision Based Models of Cascade. Collective Action. Cascade
Capacity. Co-existence of Behaviours. Cascade Capacity with Bilinguality. Probabilistic Models of
Cascade. Branching Process. Basic Reproductive Number. SIR Epidemic Model. SIS Epidemic
Model. SIRS Epidemic Model. Transient Contact Network. Cascading in Twitter.

54
UNIT V LINK ANALYSIS & COMMUNITY DETECTION 9
Search Engine. Crawling. Storage. Indexing. Ranking. Google. Data Structures. Crawling.
Searching. Web Spam Pages Strength of Weak Ties. Triadic Closure. Detecting Communities in a
Network. Girvan-Newman Algorithm. Modularity. Minimum Cut Trees. Tie Strengths in Mobile
Communication Network. Exact Betweenness Centrality. Approximate Betweenness Centrality.

SUGGESTED ACTIVITIES:
1: Twitter Intelligence project performs tracking and analysis of the Twitter
2: Large-Scale Network Embedding as Sparse Matrix Factorization
3: Implement how Information Propagation on Twitter
4: Social Network Analysis and Visualization software application.
5: Implement the Structure of Links in Networks

COURSE OUTCOMES:
CO1: Plan and execute network analytical computations.
CO2: Implement mining algorithms for social networks
CO3: Analyze and evaluate social communities.
CO4: Use social network analysis in behavior analytics
CO5: Perform mining on large social networks and illustrate the results.
TOTAL: 45 PERIODS

REFERENCES
1. Practical Social Network Analysis with Python, Krishna Raj P. M. Ankith Mohan and K. G.
Srinivasa. Springer, 2018
2. SOCIAL NETWORK ANALYSIS: METHODS AND APPLICATIONS, STANLEY
WASSERMAN, and KATHERINE F' AUST. CAMBRIDGE UNIVERSITY PRESS, 2012
3. Social Network Analysis: History, Theory and Methodology by Christina Prell, SAGE
Publications, 1st edition, 2011
4. Sentiment Analysis in Social Networks, Federico Alberto Pozzi, Elisabetta Fersini, Enza
Messina, and Bing. LiuElsevier Inc, 1st edition, 2016
5. Social Network Analysis, John Scott. SAGE Publications, 2012

CO-PO Mapping
CO POs

PO1 PO2 PO3 PO4 PO5 PO6


3 2 1 - 2 1
1
3 2 - - 2 1
2
3 2 - - 1 -
3
3 2 - - 1 1
4
2 1 - - - 1
5
3 2 1 - 1 1
Avg

55
BC4010 DATA PRIVACY L T P C
3 0 0 3
COURSE OBJECTIVES:
 To understand the basics of data privacy
 To create architectural, algorithmic and technological foundations for the maintenance of the
privacy
 To become knowledgeable in Static Data Anonymization Methods.
 To analyse anonymization algorithms
 To understand the concept of privacy preservation

UNIT I INTRODUCTION 9
Data Privacy and its importance, Need for Sharing Data, Methods of Protecting Data, Importance of
Balancing Data Privacy and Utility, Disclosure, Tabular Data, Micro data, Approaches to Statistical
disclosure control, Ethics, principles, guidelines and regulations, Microdata concepts, Disclosure,
Disclosure risk, Estimating re-identification risk, Non-perturbative microdata masking, Perturbative
microdata masking, Information loss in microdata

UNIT II STATIC DATA ANONYMIZATION ON MULTIDIMENSIONAL DATA 9


Static Data Anonymization on Multidimensional Data, Classification of Privacy Preserving Methods,
Classification of Data in a Multidimensional Data Set, Group-Based Anonymization, k-Anonymity, l-
Diversity, t-closeness

UNIT III STATIC DATA ANONYMIZATION ON COMPLEX DATA STRUCTURES 9


Static Data Anonymization on Complex Data Structures, Privacy Preserving Graph Data, Privacy
Preserving Time Series Data, Time Series Data Protection Methods, Privacy Preservation of
Longitudinal Data, Privacy Preservation of Transaction Data

UNIT IV STATIC DATA ANONYMIZATION ON THREATS TO ANONYMIZED 9


DATA
Static Data Anonymization on Threats to Anonymized Data, Threats to Data Structures, Threats by
Anonymization Techniques, Randomization, k-Anonymization, l-Diversity, t-Closeness. Dynamic
Data Protection: Tokenization, Understanding Tokenization, Use Cases for Dynamic Data
Protection, Benefits of Tokenization Compared to Other Methods, Components for Tokenization

UNIT V PRIVACY PRESERVING 9


Privacy Preserving, Data Mining: Key Functional Areas of Multidimensional Data, Association Rule
Mining, Clustering - Privacy Preserving Test Data Manufacturing Generation, Test Data
Fundamentals, Utility of Test Data: Test Coverage, Privacy Preservation of Test Data, Quality of
Test Data, Anonymization Design for PPTDG, Insufficiencies of Anonymized Test.

COURSE OUTCOMES:
CO1: Become familiar with the basics of privacy.
CO2: Understand how privacy is formalized.
CO3: Understand the common data privacy techniques.
CO4: Able to analyse Static Data Anonymization
CO5: Understand and analyse privacy preservation techniques
TOTAL: 45 PERIODS

56
REFERENCES
1. N. Venkataramanan and A. Shriram, "Data privacy: Principles and practice". CRC Press,
2016. ISBN: 978-1-49-872104-2
2. A. Hundepool, J. Domingo-Ferrer, L. Franconi, S. Giessing, and E. S. Nordholt, P.D. Wolf,
“Statistical disclosure control”, Wiley, John & Sons, 2012. ISBN No.: 978-1-11-997815-2
3. G. T. Duncan, M. Elliot, J.-J. Salazar-González, J.-J. Salazar-Gonzalez, and J. J. Salazar,
"Statistical confidentiality: Principles and practice", Springer-Verlag New York, 2011.
ISBN: 978-1-44-197801-1
4. C. C. Aggarwal and P. S. Yu, "Privacy-preserving data mining: Models and Algorithms",
Springer-Verlag New York, 2008. (ISBN No.: 978-0-387-70992-5)

CO-PO Mapping

CO POs
PO1 PO2 PO3 PO4 PO5 PO6
- 2
1 2 3 - 1
- -
2 2 1 3 2
2 -
3 2 1 3 -
- 3
4 2 3 - 1
- -
5 2 1 1 3
Avg 2 1.8 2 2.5 2.333333 1.75

BC4011 SECURITY IN CYBER-PHYSICAL SYSTEMS LTPC


300 3
COURSE OBJECTIVES:
 To learn about design of cyber-physical systems
 To know about MATLAB usage
 To learn about analysis of cyber-physical systems
 How to implement safety assurance in these systems
 To do the software analysis
 To know basic security measures to take in Cyber-Physical Systems

UNIT I INTRODUCTION TO CYBER-PHYSICAL SYSTEMS 6


Cyber-Physical Systems (CPS) in the real world, Basic principles of design and validation of CPS,
Industry 4.0, AutoSAR, IIOT implications, Building Automation, Medical CPS.

UNIT II CPS - PLATFORM COMPONENTS 10


CPS - Platform components: CPS HW platforms - Processors, Sensors, Actuators, CPS Network -
WirelessHart, CAN, Automotive Ethernet, CPS Sw stack – RTOS, Scheduling Real Time control
tasks Principles of Automated Control Design: Dynamical Systems and Stability Controller Design
Techniques, Stability Analysis: CLFs, MLFs, stability under slow switching, Performance under
Packet drop and Noise

57
UNIT III USING MATLAB 8
Matlab toolboxes - Simulink, Stateflow CPS implementation: From features to software components,
Mapping software components to ECUs, CPS Performance Analysis - effect of scheduling, bus
latency, sense and actuation faults on control performance, network congestion

UNIT IV CPS SAFETY ASSURANCE AND SOFTWARE ANALYSIS 12


Formal Methods for Safety Assurance of Cyber-Physical Systems: Advanced Automata based
modeling and analysis, Basic introduction, and examples, Timed and Hybrid Automata, Definition of
trajectories, Formal Analysis: Flow pipe construction, reachability analysis
Analysis of CPS Software: Weakest Pre-conditions, Bounded Model checking, CPS SW Verification:
Frama-C, CBMC Secure Deployment of CPS: Attack models, Secure Task mapping and
Partitioning, State estimation for attack detection Automotive Case study: Vehicle ABS hacking
Power Distribution Case study: Attacks on Smart Grids

UNIT V CPS SECURITY 8


CPS vulnerabilities, threats, attacks & failures, CPS security threats, CPS vulnerabilities, Cyber-
physical system attacks, CPS failures, Evaluating risks, Securing CPS, CPS security challenges,
CPS security solutions, CPS forensics, Limitations, CPS protection recommendations

COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Understand the core principles behind CPS.
CO2: Identify safety specifications and critical properties.
CO3: Understand abstraction in system designs.
CO4: Express pre and postconditions and invariants for CPS models.
CO5: Identify CPS security threats and do the software analysis.
TOTAL: 45 PERIODS
REFERENCES
1. Raj Rajkumar, Dionisio De Niz , and Mark Klein, Cyber-Physical Systems, Addison-Wesley
Professional
2. Rajeev Alur, Principles of Cyber-Physical Systems, MIT Press, 2015.
3. André Platzer, Logical Analysis of Hybrid Systems: Proving Theorems for Complex
Dynamics., Springer, 2010. 426 pages,ISBN 978-3-642-14508-7.
4. Jean J. Labrosse, Embedded Systems Building Blocks: Complete and Ready-To-Use
Modules in C, The publisher, Paul Temme, 2011.
5. Jean-Paul A. Yaacoub, Ola Salman, Hassan N. Noura, NesrineKaaniche, Ali Chehab,
Mohamad Malli, "Cyber-physical systems security: Limitations, issues and future trends",
Microprocessors and Microsystems, Vol 77, 2020, ISSN 0141-9331 (Unit 5)
6. Sajal Das, Krishna Kant, and Nan Zhang, “Handbook on Securing Cyber-Physical
CriticalInfrastructure – Foundations & Challenges”, Morgan Kaufmann, 2012.
7. Awad, A.I., Furnell, S., Paprzycki, M., Sharma, S.K., Security in Cyber-Physical Systems
Foundations and Applications,Springer International Publishing, 2021

58
CO-PO Mapping

CO POs

PO1 PO2 PO3 PO4 PO5 PO6


- - - 2
1 3 3
2 -
2 2 1 1 -
3 2
3 2 3 1 -
- -
4 3 1 - 1
2 - 2
5 2 3 1
Avg 2.4 2.2 2.333333 2 1 1.666667

BC4012 CRYPTANALYSIS LTPC


3 003
COURSE OBJECTIVES:
 To understand the importance of cryptanalysis in our increasingly computer-driven world.
 To understand the fundamentals of Cryptography
 To understand the Lattice- based cryptanalysis and elliptic curves and pairings
 To understand birthday- based algorithms for functions and attacks on stream ciphers
 To apply the techniques for secure transactions in real world applications

UNIT I INTRODUCTION 9
Preliminaries, Defining Security in Cryptography, Monoalphabetic Ciphers: Using Direct Standard
Alphabets, The Caesar Cipher, Modular arithmetic, Direct Standard alphabets, Solution of direct
standard alphabets by completing the plain component, Solving direct standard alphabets by
frequency considerations, Alphabets based on decimations of the normal sequence, Solution of
decimated standard alphabets, Monoalphabets based on linear transformation. Polyalphabetic
Substitution: Polyalphabetic ciphers, Recognition of polyalphabetic ciphers, Determination of
number of alphabets, Solution of individual alphabets if standard, Polyalphabetic ciphers with a
mixed plain sequence, Matching alphabets, Reduction of a polyalphabetic cipher to a
monoalphabetic ciphers with mixed cipher sequences

UNIT II TRANSPOSITION 9
Columnar transposition, Solution of transpositions with Completely filled rectangles,
Incompletely filled rectangles, Solution of incompletely filled rectangles – Probable word method,
Incompletely filled rectangles general case, Repetitions between messages; identical length
messages. Sieve algorithms: Introductory example: Eratosthenes’s sieve, Sieving for smooth
composites

UNIT III BRUTE FORCE CRYPTANALYSIS 9


Introductory example: Dictionary attacks, Brute force and the DES, Algorithm, Brute force as a
security mechanism, Brute force steps in advanced cryptanalysis, Brute force and parallel
computers. The birthday paradox: Sorting or not?: Introductory example:
Birthday attacks on modes of operation, Analysis of birthday paradox bounds, Finding collisions,
Application to discrete logarithms in generic groups.

59
UNIT IV ALGORITHMS FOR FUNCTIONS 9
Birthday- based algorithms for functions: algorithmic aspects, analysis of random functions,
number-theoretic applications, a direct cryptographic application in the context of blockwise security,
collisions in hash functions. attacks on stream ciphers: LFSR-based key stream generators,
correlation attacks, noisy LFSR model, algebraic attacks, extension to some non- linear
shiftregisters, the cube attack.

UNIT V LATTICE BASED CRYPTANALYSIS 9


Direct attacks using lattice reduction, Coppersmith’s small roots attacks. Elliptic curves and pairings:
Introduction to elliptic curves, The Weil pairing, the elliptic curve factoring method.

COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Apply cryptanalysis in system design to protect it from various attacks.
CO2: Identify and investigate vulnerabilities and security threats and the mechanisms to
counter them.
CO3: Analyze security of cryptographic algorithm against brute force attacks, birthday
attacks.
CO4: Design cryptographic algorithms for functions and carry out their implementation.
CO5: Understand the importance lattice based cryptanalysis
TOTAL: 45 PERIODS
REFERENCES
1. Elementary Cryptanalysis A Mathematical Approach by Abraham Sinkov, The mathematical
Association of America (lnc).
2. Algorithmic Cryptanalysis, by Antoine joux, 1st Edition, CRC Press, 2009.
3. Algebraic Cryptanalysis, Bard Gregory, Springer, 2009
4. Cryptanalysis of Number Theoretic Ciphers, Sameul S. Wag staff, Chapman & Hall/CRC,
2002.
5. Cryptanalysis: A Study of Cipher and Their Solution, Helen F. Gaines,1989

CO-PO Mapping
CO POs

PO1 PO2 PO3 PO4 PO5 PO6


-
1 3 2 1 2 3
- 3 - -
2 2 1
-
3 3 2 2 2 1
-
4 3 2 3 - 3
-
5 2 1 1 2
Avg 2.6 1.6 2 3 1.666667 2.25

60
BC4013 DATA ANALYTICS FOR FRAUD DETECTION LT PC
3 00 3
COURSE OBJECTIVES:
 Discuss the overall process of how data analytics is applied
 Discuss how data analytics can be used to better address and identify risks
 Help mitigate risks from fraud and waste for our clients and organizations

UNIT I INTRODUCTION 9
Introduction: Defining Fraud, Anomalies versus, Fraud, Types of Fraud, Assess the Risk of Fraud,
Fraud Detection, Recognizing Fraud, Data Mining versus Data Analysis and Analytics, Data
Analytical Software, Anomalies versus Fraud within Data, Fraudulent Data Inclusions and Deletions

UNIT II DATA ANALYSIS CYCLE 9


The Data Analysis Cycle, Evaluation and Analysis, Obtaining Data Files, Performing the Audit, File
Format Types, Preparation for Data Analysis, Arranging and Organizing Data, Statistics and
Sampling, Descriptive Statistics, Inferential Statistics

UNIT III DATA ANALYTICAL TESTS 9


Benford’s Law, Number Duplication Test, Z-Score, Relative Size Factor Test, Same-Same-Same
Test, Same-Same-Different Test

UNIT IV ADVANCED DATA ANALYTICAL TESTS 9


Correlation, Trend Analysis, , GEL-1 and GEL-2 , Skimming and Cash Larceny, Billing schemes and
Data Familiarization, Benford’s Law Tests, Relative Size Factor Test, Match Employee Address to
Supplier data

UNIT V ELECTRONIC PAYMENTS FRAUD PREVENTION 9


Payroll Fraud, Expense Reimbursement Schemes, Register disbursement schemes

COURSE OUTCOMES:
CO1:Formulate reasons for using data analysis to detect fraud.
CO2:Explain characteristics and components of the data and assess its completeness.
CO3:Identify known fraud symptoms and use digital analysis to identify unknown fraud
symptoms.
CO4:Automate the detection process.
CO5:Verify results and understand how to prosecute fraud
TOTAL: 45 PERIODS
REFERENCES
1. Sunder Gee, “Fraud and Fraud Detection: A Data Analytics Approach”, Wiley, 2014, ISBN:
978-1-118-77965-1
2. Bart Baesens, Veronique Van Vlasselaer, WouterVerbeke, "Fraud Analytics Using
Descriptive, Predictive, and Social Network Techniques: A Guide to Data Science for Fraud
Detection", Wiley and SAS Business Series, 2015
3. Han, Kamber, “Data Mining Concepts and Techniques”, 3rd Ed., Morgan Kaufmann
Publishers, 2012
4. Jure Leskovec, Anand Rajaraman, Jeffrey David Ullman, “Mining of Massive Datasets”,
Cambridge University Press, 2nd Ed., 2014.

61
CO-PO Mapping
CO POs

PO1 PO2 PO3 PO4 PO5 PO6


- - 3
1 2 1
- - -
2 2 1 -
- 3
3 3 1 1 2
-
4 3 2 1 2 3
-
5 3 2 1 2 2
Avg 2.6 1.4 1 3 2 2.333333

CP4291 INTERNET OF THINGS L T P C


3 0 2 4
COURSE OBJECTIVES:
 To Understand the Architectural Overview of IoT
 To Understand the IoT Reference Architecture and Real World Design Constraints
 To Understand the various IoT levels
 To understand the basics of cloud architecture
 To gain experience in Raspberry PI and experiment simple IoT application on it

UNIT I INTRODUCTION 9+6


Internet of Things- Domain Specific IoTs - IoT and M2M-Sensors for IoT Applications–Structure of
IoT– IoT Map Device- IoT System Management with NETCONF-YANG

UNIT II IoT ARCHITECTURE, GENERATIONS AND PROTOCOLS 9+6


IETF architecture for IoT - IoT reference architecture -First Generation – Description &
Characteristics–Advanced Generation – Description & Characteristics–Integrated IoT Sensors –
Description & Characteristics

UNIT III IoT PROTOCOLS AND TECHNOLOGY 9+6


SCADA and RFID Protocols - BACnet Protocol -Zigbee Architecture - 6LowPAN - CoAP -Wireless
Sensor Structure–Energy Storage Module–Power Management Module–RF Module–Sensing Module

UNIT IV CLOUD ARCHITECTURE BASICS 9+6


The Cloud types; IaaS, PaaS, SaaS.- Development environments for service development; Amazon,
Azure, Google Appcloud platform in industry

UNIT V IOT PROJECTS ON RASPBERRY PI 9+6


Building IOT with RASPBERRY PI- Creating the sensor project - Preparing Raspberry Pi - Clayster
libraries – Hardware Interacting with the hardware - Interfacing the hardware- Internal representation
of sensor values - Persisting data - External representation of sensor values - Exporting sensor data

62
SUGGESTED ACTIVITIES:
1. Develop an application for LED Blink and Pattern using Arduino or Raspberry Pi
2. Develop an application for LED Pattern with Push Button Control using Arduino or Raspberry
Pi
3. Develop an application for LM35 Temperature Sensor to display temperature values using
arduino or Raspberry Pi
4. Develop an application for Forest fire detection end node using Raspberry Pi device and
sensor
5. Develop an application for home intrusion detection web application
6. Develop an application for Smart parking application using python and Django for web
application

COURSE OUTCOMES:
CO1: Understand the various concept of the IoT and their technologies
CO2: Develop the IoT application using different hardware platforms
CO3: Implement the various IoT Protocols
CO4: Understand the basic principles of cloud computing
CO5: Develop and deploy the IoT application into cloud environment
TOTAL: 75 PERIODS
REFERENCES:
1. Arshdeep Bahga, Vijay Madisetti, Internet of Things: A hands-on approach, Universities
Press, 2015
2. Dieter Uckelmann, Mark Harrison, Florian Michahelles (Eds), Architecting the Internet of
Things, Springer, 2011
3. Peter Waher, 'Learning Internet of Things', Packt Publishing, 2015
4. Ovidiu Vermesan Peter Friess, 'Internet of Things – From Research and Innovation to
Market Deployment', River Publishers, 2014
5. N. Ida, Sensors, Actuators and Their Interfaces: A Multidisciplinary Introduction, 2nd
EditionScitech Publishers, 202014
6. Reese, G. (2009). Cloud Application Architectures: Building Applications and Infrastructure
in the Cloud. Sebastopol, CA: O'Reilly Media, Inc. (2009)

CO-PO Mapping
CO POs

PO1 PO2 PO3 PO4 PO5 PO6


2
1 3 3 - 1 2
2
2 3 2 1 2 2
-
3 3 2 3 3 1
- - 3
4 2 -
3
5 3 2 3 2 2
Avg 2.8 2.25 2.333333 2.333333 2 2

63
BC4014 MALWARE ANALYSIS L T PC
3 0 2 4
COURSE OBJECTIVES:
 To introduce the fundamentals of malware, types and its effects
 To enable to identify and analyse various malware types by static analysis
 To enable to identify and analyse various malware types by dynamic analysis
 To deal with detection, analysis, understanding, controlling, and eradication of malware

UNIT I INTRODUCTIONAND BASIC ANALYSIS 9


Goals of Malware Analysis, AV Scanning, Hashing, Finding Strings, Packing and Obfuscation, PE
file format, Static, Linked Libraries and Functions, Static Analysis tools, Virtual Machines and their
usage in malware analysis, Sandboxing, Basic dynamic analysis, Malware execution, Process
Monitoring, Viewing processes, Registry snapshots, Creating fake networks

UNIT II ADVANCED STATIC ANALYSIS 9


X86 Architecture- Main Memory, Instructions, Opcodes and Endianness, Operands, Registers,
Simple Instructions, The Stack, Conditionals, Branching, Rep Instructions, Disassembly, Global and
local variables, Arithmetic operations, Loops, Function Call Conventions, C Main Method and
Offsets. Portable Executable File Format, The PE File Headers and Sections, IDA Pro, Function
analysis, Graphing, The Structure of a Virtual Machine, Analyzing Windows programs, Anti-static
analysis techniques, obfuscation, packing, metamorphism, polymorphism.

UNIT III ADVANCED DYNAMIC ANALYSIS 9


Live malware analysis, dead malware analysis, analyzing traces of malware, system calls, api calls,
registries, network activities. Anti-dynamic analysis techniques, VM detection techniques, Evasion
techniques, , Malware Sandbox, Monitoring with Process Monitor, Packet Sniffing with Wireshark,
Kernel vs. User-Mode Debugging, OllyDbg, Breakpoints, Tracing, Exception Handling, Patching

UNIT IV MALWARE FUNCTIONALITY 9


Downloaders and Launchers, Backdoors, Credential Stealers, Persistence Mechanisms, Handles,
Mutexes, Privilege Escalation, Covert malware launching- Launchers, Process Injection, Process
Replacement, Hook Injection, Detours, APC injection, YARA rule based detection

UNIT V ANDROID MALWARE ANALYSIS 9


Android Malware Analysis: Android architecture, App development cycle, APKTool, APKInspector,
Dex2Jar, JD-GUI, Static and Dynamic Analysis, Case studies,
TOTAL: 45 PERIODS
PRACTICALS:
1. Experimentation on Initial Infection Vectors and Malware Discovery
2. Implementation on Sandboxing Malware and Gathering Information From Runtime
Analysis
3. Implementation on Portable Executable (PE32) File Format
4. Implementation on Executable Metadata and Executable Packers
5. Experimentation on Malware Self - Defense, Compression, and
Obfuscation Techniques
6. Experimentation on Malware behaviour analysis
7. Experimentation on analyzing Malicious Microsoft Office and Adobe PDF Documents
8. Experimentation on Mobile malware analysis
64
9. Experimentation on Packing and Unpacking of malware
10. Experimentation on Rootkit AntiForensics and Covert Channels
11. Experimentation on Modern Rootkit Analysis
12. Experimentation on Malware traffic analysis

Implement of real time applications for the following malware analysis


1. Static analysis of malwares
2. Dynamic analysis of malwares.
3. Classification of malwares based on their behaviour.
4. Usage of tools to classify malware
5. Advanced malware analysis
6. Android malware analysis
7. Applying antivirus tools in various applications
8. Malware report documentation
TOTAL: 30 PERIODS
TOTAL: 45+30=75 PERIODS
COURSE OUTCOMES:
CO1:Understand the various concept of malware analysisand their technologies used.
CO2:Possess the skills necessary to carry out independent analysis of modern malware
samples using both static and dynamic analysis techniques
CO3: Understand the methods and techniques used by professional malwareanalysts
CO4:To be able to safely analyze, debug, and disassemble any malicious software by
malware analysis
CO5: Understand the concept of Android malware analysis their architecture, and App
development

REFERENCES
1. Michael Sikorski and Andrew Honig, “Practical Malware Analysis” by No Starch Press,
2012,ISBN: 9781593272906
2. Bill Blunden, “The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System”,
Second Edition,Jones & Bartlett Publishers, 2009.
3. Jamie Butler and Greg Hoglund, “Rootkits: Subverting the Windows Kernel” by 2005,
Addison-Wesley Professional, ISBN:978-0-321-29431-9
4. Bruce Dang, Alexandre Gazet, Elias Bachaalany, SébastienJosse, "Practical Reverse
Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation", 2014,
ISBN: 978-1-118-78731-1
5. Victor Marak, "Windows Malware Analysis Essentials" Packt Publishing, O’Reilly, 2015,
ISBN: 9781785281518
6. Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere,
"Android Malware and Analysis",CRC Press, Taylor & Francis Group, 2015, ISBN:
9781482252194
7. Windows Malware Analysis Essentials by Victor Marak, Packt Publishing, 2015

CO-PO Mapping

CO POs
PO1 PO2 PO3 PO4 PO5 PO6

65
- 2
1 3 3 - 1
- -
2 2 1 1 -
2 - 2 3
3 2 3
- - 2 2
4 3 1
- 2 -
5 3 1
Avg 2.6 2 2 2 1.5 2

BC4015 SECURE SOFTWARE DESIGN AND DEVELOPMENT LTPC


3 024
COURSE OBJECTIVES:
 To fix software flaws and bugs in various software.
 To make aware of various issues like weak random number generation, information
leakage, poor usability and weak or no encryption on data traffic.
 Techniques for successfully implementing and supporting network services on an
enterprise scale and heterogeneous systems environment.
 Methodologies and tools to design and develop secure software containing minimum
vulnerabilities and flaws.

UNIT I SECURE SOFTWARE DESIGN 8


Software vulnerabilities identification - software security analysis, security programming practices,
fundamental software security design concepts, security testing and quality assurance.

UNIT II ENTERPRISE APPLICATION DEVELOPMENT 10


Scope of enterprise software applications, Distributed N-tier software application design,
Research technologies available for the presentation, Business and data tiers of an enterprise
software application, Enterprise database system, Different tiers in an enterprise system, Present
software solution.

UNIT III ENTERPRISE SYSTEMS ADMINISTRATION 9


Directory-based server infrastructure in a heterogeneous systems environment, Server resource
utilization for system reliability and availability, Administer network services (DNS/DHCP/Terminal
Services/Clustering/Web/Email).

UNIT IV ENTERPRISE NETWORK 9


Troubleshoot a network running multiple services management, Requirements of an enterprise
network, enterprise network management

UNIT V DEFENDING APPLICATIONS 9


Handle insecure exceptions and command/SQL injection, web and mobile application defences
against attackers, vulnerabilities and flaws in software.
TOTAL: 45 PERIODS
PRACTICALS:
1. Study of various open source security tools for Application testing, Code Review,
Penetration Testing, Vulnerability Assessment, Vulnerability Scanner etc.
66
2. Design and develop multi-tier applications for an enterprise.
3. Installation of Directory based Server and monitoring resource utilization.
4. Practicals based on network services such as DNS/DHCP/Terminal
Services/Clustering/Web/Email
5. Study of SQL Injection Problem.
6. Developing applications that can defend against SQL injection problems.
TOTAL: 30 PERIODS
TOTAL:45+30=75 PERIODS
COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Differentiate between various software vulnerabilities.
CO2: Explain the Software process vulnerabilities for an organization.
CO3: Demonstrate the Monitor resources consumption in software.
CO4: Explain the Interrelate security and software development process.
CO5: Discuss the Case study of DNS server, DHCP configuration and SQL injection attack.

REFERENCES
1. Theodor Richardson, Charles N Thies, "Secure Software Design", Jones & Bartlett
Publishers, 2013
2. Kenneth R. van Wyk, Mark G. Graff, Dan S. Peters, Diana L. Burley, "Enterprise Software
Security: A Confluence of Disciplines", Addison Wesley Professional, 1st edition, 2014
3. Loren Kohnfelder, Designing Secure Software, No Starch Press, 2021, ISBN:
9781718501928
4. Douglas A. Ashbaugh, Security Software Development Assessing and Managing Security
Risks, Auerbach Publications, 2019, ISBN 9780367386603
5. Mouratidis, H., "Software Engineering for Secure Systems: Industrial and Research
Perspectives",October, 2010, ISBN: 9781615208388
6. Mark S. Merkow, Lakshmikanth Raghavan, Secure and Resilient Software Development,
June 2010, Auerbach Publications, ISBN: 9781498759618

CO-PO Mapping
CO POs

PO1 PO2 PO3 PO4 PO5 PO6


2 -
1 2 3 1
- 3 2 -
2 2 1
3 3 2 1 - 2 2
- 2 2 2
4 2 1
2 -
5 2 3 1
Avg 2.2 2 1.666667 2.5 2 1.5

67
BC4016 SECURITY ASSESSMENT AND RISK ANALYSIS LT PC
3 02 4
COURSE OBJECTIVES:
 Describe the concepts of risk management
 Define and differentiate various Contingency Planning components
 Integrate the IRP, DRP, and BCP plans into a coherent strategy to support sustained
organizational operations.
 Define and be able to discuss incident response options, and design an Incident Response
Plan for sustained organizational operations.

UNIT I SECURITY BASICS 8


Information Security Overview: critical information characteristics – availability information states
– processing security Countermeasures- education, training and awareness, critical information
characteristics -confidentiality - critical information characteristics – integrity, information states –
storage, information states – transmission, security countermeasures-policy, procedures and
practices, threats, vulnerabilities.

UNIT II THREATS AND VULNERABILITIES OF SYSTEMS & RISK 9


MANAGEMENT
Threats and Vulnerabilities of Systems: Major categories of threats, threat impact areas,
Countermeasures: assessments, Concepts of Risk Management: consequences, cost/benefit
analysis of controls, implementation of cost-effective controls, monitoring the efficiency and
effectiveness of controls , threat and vulnerability assessment.

UNIT III SECURITY PLANNING 10


Security Planning: directives and procedures for policy mechanism, Risk Management:
acceptance of risk corrective actions information identification, risk analysis and/or vulnerability
assessment components, risk analysis results evaluation, roles and responsibilities, Contingency
Planning/Disaster Recovery: agency response procedures and continuity of operations,
contingency plan components, determination of backup requirements, development of plans for
recovery actions after a disruptive event, development of procedures for off-site processing,
emergency destruction procedures, guidelines for determining critical and essential workload,
team member responsibilities in responding to an emergency situation

UNIT IV PHYSICAL SECURITY MEASURES, PRACTICES AND 10


PROCEDURES
Physical Security Measures: alarms, building construction, cabling, communications centre,
environmental controls, filtered power, physical access control systems. Security Practices and
Procedures: access authorization/verification, contractors, employee clearances, position
sensitivity, security training and awareness, systems maintenance personnel, Administrative
Security Procedural Controls: attribution, copyright protection and licensing, Auditing and
Monitoring: conducting security reviews, effectiveness of security programs, investigation of
security breaches, privacy review of accountability controls, review of audit trails and logs.

UNIT V OPERATIONS SECURITY 8


Operations Security (OPSEC): OPSEC surveys/OPSEC planning INFOSEC: computer security –
audit, cryptography-encryption - Cryptography-strength - Case study of threat and vulnerability
assessment
TOTAL: 45 PERIODS

68
PRACTICALS::
1. To audit the C/ C++ / Python code using RATS code checking tool.
2. Implement Flawfinder stand-alone script to check for calls to know potentially vulnerable
library function calls.
3. Implement FindBugs standalone GUI application, or Eclipse plugin for loading custom rules
set.
4. Implement pychecker stand-alone script to find bugs in the code.
5. Installation of splunk and study basic working as to stores data in its index and therefore
separate database required
6. Implement splunk to discovers useful information automatically without searching manually
7. Implement splunk to converts log data into Visual graphs and reports to simplify analysis,
reporting and troubleshooting
8. Assess and submit a report on cyber security risk assessment for SCADA and DCS
networks.
TOTAL: 30 PERIODS
TOTAL:45+30=75 PERIODS
COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Recommend contingency strategies including data backup and recovery and alternate
site selection for business resumption planning.
CO2: Describe the escalation process from incident to disaster in case of security disaster.
CO3: Design a Disaster Recovery Plan for sustained organizational operations.
CO4: Design a Business Continuity Plan for sustained organizational operations.
CO5: Explain the concept of Operations Security and assessment of threat and
vulnerability.
REFERENCES
1. Michael Whitman and Herbert Mattord, "Principles of Incident Response and Disaster
Recovery", Thomson Course Technology, 2007, ISBN: 141883663X
2. http://www.cnss.gov/Assets/pdf/nstissi_4011.pdf
3. Atle Refsdal, Bj rnar Solhaug, Ketil St len.Cyber-Risk Management, Springer, 2015
4. Martin Weiss; Michael G. Solomon, "Auditing IT Infrastructures for Compliance", Second
Edition,Jones & Bartlett Learning, 2016, ISBN: 9781284090703
5. Mark Talabis and Jason Martin, "Information Security Risk Assessment Toolkit", 1st
Edition, Syngres /Elsevier, 2012, ISBN: 9781597497350

CO-PO Mapping
CO POs

PO1 PO2 PO3 PO4 PO5 PO6


- -
1 2 1 1 1
- - - -
2 2 1
-
3 3 2 1 2 1
-
4 3 2 1 2 1
- -
5 2 1 1 -
Avg 2.4 1.4 1 - 1.5 1
69
BC4017 STEGANOGRAPHY AND DIGITAL WATERMARKING L T PC
3 02 4
COURSE OBJECTIVES:
 To provide the importance of digital watermarking and Steganography
 To discuss the properties of watermarking and steganography systems
 To discuss the different models of watermarking and steganography
 To understand the various evaluation metrics
 To examine various applications of watermarking and steganography

UNIT I INTRODUCTION 6
Information Hiding, Steganography, and Watermarking. History of Watermarking. History of
Steganography, Importance of Digital Watermarking. Importance of Steganography

UNIT II STEGANOGRAPHY 10
Steganographic Communication, The Channel, The BuildingBlocks, Notation and Terminology,
Information - Theoretic Foundations of Steganography, Cachin’s Definition of Steganographic
Security, Practical Steganographic Methods, Statistics Preserving Steganography, Model-Based
Steganography, Steganalysis Scenarios, Detection, Forensic Steganalysis, The Influence of the
Cover Work on Steganalysis, Some Significant Steganalysis Algorithms, LSB Embedding and the
Histogram Attack.

UNIT III WATERMARKING 10


Evaluating watermarking systems. Notation – Communications – Communication based models
– Geometric models – Mapping messages into message vectors – Error correction coding –
Detecting multi-symbol watermarks – Attacks

UNIT IV MODELS OF WATERMARKING 10


Notation, Communications, Components of Communications Systems, Classes of Transmission
Channels, Secure Transmission, Communication-Based Models of Watermarking, Basic Model,
Watermarking as Communications with Side Information at the Transmitter, Watermarking as
Multiplexed Communications, Geometric Models of Watermarking, Distributions and Regions in
Media Space, Marking Spaces, Modeling Watermark Detection by Correlation, Linear Correlation,
Normalized Correlation, Correlation Coefficient, Summary

UNIT V APPLICATIONS 9
Applications of Watermarking, Broadcast Monitoring, Copyrights, Proof of Ownership, Transaction
Tracking, Content Authentication, Copy Control, Device Control, Legacy Enhancement.
Applications of Steganography, Steganography for Dissidents, Steganography for Criminals
TOTAL: 45 PERIODS
PRACTICALS:
1. Implementation of secure/Secret Communication of data
2. Experiment on claiming ownership of digital entity
3. Implementation of tracing the digital theft in cyberspace
4. Implementation of application in Block Codes
5. Implementation of universal steganalysis
6. Experiment on target steganalysis
7. Experiment on data hiding in different image types
8. Implementation of statistical steganalysis

70
9. Implementation of reversible data hiding
10. Implementation of Steganography in transform domain and Steganography in
encrypted images

COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Design cryptographic algorithms and carry out their implementation.
CO2: Carry out cryptanalysis on cipher.
CO3: Design and implement security protocols.
CO4: Carry out system security for various threat environments.
CO5: Explain the importance of firewall security for networks.
TOTAL: 30 PERIODS
TOTAL: 45+30=75 PERIODS

REFERENCES
1. Ingemar J. Cox, Mathew L. Miller, Jefrey A. Bloom, Jesica Fridrich, Ton Kalker, “Digital
Watermarking and Steganography”, Morgan Kaufmann Publishers, New York, 2008.
2. Ingemar J. Cox, Mathew L. Miller, Jefrey A. Bloom, “Digital Watermarking”, Morgan
Kaufmann Publishers, New York, 2003
3. Ingemar Cox, Mathew Miller, Jefrey Blom,Jesica Fridrich and Ton Kalker, “Digital
Watermarking and Steganography”, Morgan Kaufmann Publishers, Nov 2007.
4. Juergen Seits, “Digital Watermarking for Digital Media”, IDEA Group Publisher, New York,
2005.
5. Jesica Fridrich, “Steganography in Digital Media: Principles, Algorithms, and Applications”,
Cambridge University press, 2010.
6. Michael Arnold, Martin Schmucker, Stephen D. Wolthusen, “Techniques and Applications
of Digital Watermarking and Content Protection”, Artech House, London, 2003.
7. Peter Wayner, “Disappearing Cryptography – Information Hiding: Steganography &
Watermarking”, Morgan Kaufmann Publishers, New York, 2002.
8. Stefan Katzenbelser and Fabien A. P. Peticolas, “Information hiding techniques for
Steganography and Digital Watermarking”, ARTECH House Publishers, January 2004.
9. Steganography, Ab as Chedad, Vdm Verlag and Dr. Muller, “Digital Image”
Aktiengesellschaft & Co. Kg, Dec 2009.

CO-PO Mapping
CO POs

PO1 PO2 PO3 PO4 PO5 PO6


-
1 3 2 1 2
- 3 2
2 2 1 -
-
3 3 2 1 1
3 3
4 2 1 1 3
- -
5 3 1 2
Avg 2.6 1.4 1.666667 3 2 2

71
CP4072 BLOCKCHAIN TECHNOLOGIES LT PC
3 02 4
COURSE OBJECTIVES:
 This course is intended to study the basics of Blockchain technology.
 During this course the learner will explore various aspects of Blockchain technology like
application in various domains.
 By implementing, learners will have idea about private and public Blockchain, and smart
contract.

UNIT I INTRODUCTION OF CRYPTOGRAPHY AND BLOCKCHAIN 9


Introduction to Blockchain, Blockchain Technology Mechanisms & Networks, Blockchain Origins,
Objective of Blockchain, Blockchain Challenges, Transactions and Blocks, P2P Systems, Keys as
Identity, Digital Signatures, Hashing, and public key cryptosystems, private vs. public Blockchain.

UNIT II BITCOIN AND CRYPTOCURRENCY 9


Introduction to Bitcoin, The Bitcoin Network, The Bitcoin Mining Process, Mining Developments,
Bitcoin Wallets, Decentralization and Hard Forks, Ethereum Virtual Machine (EVM), Merkle Tree,
Double-Spend Problem, Blockchain and Digital Currency, Transactional Blocks, Impact of
Blockchain Technology on Cryptocurrency.

UNIT III INTRODUCTION TO ETHEREUM 9


Introduction to Ethereum, Consensus Mechanisms, Metamask Setup, Ethereum Accounts, ,
Transactions, Receiving Ethers, Smart Contracts.

UNIT-IV INTRODUCTION TO HYPERLEDGER AND SOLIDITY PROGRAMMING 10


Introduction to Hyperledger, Distributed Ledger Technology & its Challenges, Hyperledger &
Distributed Ledger Technology, Hyperledger Fabric, Hyperledger Composer. Solidity - Language of
Smart Contracts, Installing Solidity & Ethereum Wallet, Basics of Solidity, Layout of a Solidity Source
File & Structure of Smart Contracts, General Value Types.

UNIT V BLOCKCHAIN APPLICATIONS 8


Internet of Things, Medical Record Management System, Domain Name Service and Future of
Blockchain, Alt Coins.
TOTAL: 45 PERIODS

LIST OF EXPERIMENTS:
1. Create a Simple Blockchain in any suitable programming language.
2. Use Geth to Implement Private Ethereum Block Chain.
3. Build Hyperledger Fabric Client Application.
4. Build Hyperledger Fabric with Smart Contract.
5. Create Case study of Block Chain being used in illegal activities in real world.
6. Using Python Libraries to develop Block Chain Application.
TOTAL: 30 PERIODS
SUPPLEMENTARY RESOURCES:
 NPTEL online course : https://nptel.ac.in/courses/106/104/106104220/#
 Udemy: https://www.udemy.com/course/build-your-blockchain-az/

72
 EDUXLABS Online training :https://eduxlabs.com/courses/blockchain-technology-
training/?tab=tab-curriculum

TOTAL: 75 PERIODS
COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Understand and explore the working of Blockchain technology
CO2: Analyze the working of Smart Contracts
CO3: Understand and analyze the working of Hyperledger
CO4: Apply the learning of solidity to build de-centralized apps on Ethereum
CO5: Develop applications on Blockchain

REFERENCES:
1. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology, Decentralization, and
Smart Contracts Explained”, Second Edition, Packt Publishing, 2018.
2. Narayanan, J. Bonneau, E. Felten, A. Miller, S. Goldfeder, “Bitcoin and Cryptocurrency
Technologies: A Comprehensive Introduction” Princeton University Press, 2016
3. Antonopoulos, Mastering Bitcoin, O’Reilly Publishing, 2014. .
4. Antonopoulos and G. Wood, “Mastering Ethereum: Building Smart Contracts and Dapps”,
O’Reilly Publishing, 2018.
5. D. Drescher, Blockchain Basics. Apress, 2017.

CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
- 2 -
1 3 2 2
-
2 2 2 2 1
3
3 3 1 - 1 -
-
4 3 2 2 2 3
-
5 3 2 1 3
Avg 2.8 1.8 2 2.5 1.5 2.25

BC4018 WEB SECURITY L T PC


3 0 2 4
COURSE OBJECTIVES:
 To provide the importance of Web Security
 To discuss the fundamentals of web application authentication and session management
 To study and practice fundamental techniques in developing secure web based
applications
 To identify and find the vulnerabilities of web based applications and to protect those
applications from attacks
 To examine the exploiting and preventing of path traversal vulnerability

73
UNIT I WEB APPLICATION TECHNOLOGIES 9
Introduction – Evolution of web applications – Web application security – Core defense
mechanisms – Handling user access – Handling user input – Handling attackers – Managing the
application - The OWASP top ten list
Web Application Technologies : Web functionality – Encoding schemes – Mapping the Application
- Enumerating the content and functionality – Analysing the application – Bypassing client side
controls : Transmitting data via the client – Capturing user data – Handling client side data securely
- Input Validation, Blacklist Validation - Whitelist Validation - The Defence-in-Depth Approach -
Attack Surface Reduction Rules of Thumb

UNIT II WEB APPLICATION AUTHENTICATION AND SESSION 9


MANAGEMENT
Web Application Authentication : Authentication Fundamentals- Two factor and Three Factor
authentication - Password Based, Built in HTTP, single sign-on Custom Authentication- Secured
Password based authentication: Attacks against password, Importance of password complexity –
Design flaws in authentication mechanisms – Implementation flaws in authentication mechanisms
– Securing authentication
Session Management: Need – Weaknesses in Session Token Generation – Weaknesses in
Session Token Handling – Securing Session Management; Access Control : Access Control
overview, Common vulnerabilities – attacking access controls – Securing Access Controls

UNIT III WEB SECURITY PRINCIPLES: 9


Web Security Principles: Origin Policy, Exceptions Cross Site Scripting, Cross site Forgery
Scripting; File Security Principles: Source code Security, Forceful Browsing, Directory Traversals-
Classifying and Prioritizing Threats Origin Policy

UNIT IV WEB APPLICATION VULNERABILITY 9


Web Application Vulnerability: Understanding vulnerabilities in traditional client server application
and web applications, client state manipulation, Cookie based attacks, SQL injection, cross
domain attack (XSS/XSRF/XSSI) http header injection. SSL vulnerabilities and testing - Proper
encryption use in web application - Session vulnerabilities and testing - Cross-site request forgery

UNIT V EXPLOITING SYSTEMS 9


Exploiting Systems: Path traversal - Finding and exploiting path traversal vulnerability – Preventing
path traversal vulnerability – Information disclosure - Exploiting error messages – Securing
compiled applications – Buffer overflow vulnerability – Integer vulnerability – Format string
vulnerability
TOTAL: 45 PERIODS
PRACTICALS::
1. Exploration of web security in popular websites
2. Experimentation on Crawling a website
3. Implement the Vulnerability scanning
4. Implement the Cookie Stealing with cross site scripting
5. Implement the Commit identity theft
6. Implement the Website Security implementation – Apache hardening, MySQL hardening,
PHP hardening
7. Implement the XSS and SQL injections
8. Experimentation on Password security
9. Experimentation on Browser security

74
10. Experimentation on Web application security assessment
11. Sample projects that can be given to students :
12. Experimentation on Broken Authentication and Session Management
13. Experimentation on Cross-site scripting
14. Experimentation on Insecure direct object references
15. Experimentation on Security misconfiguration
16. Experimentation on Missing function level access control
17. Experimentation on Cross-site request forgery
18. Implement using components with known vulnerabilities

COURSE OUTCOMES:
CO1: To understand common vulnerabilities plaguing today's web applications
CO2: To understand security-related issues in web based systems and applications.
CO3: To understand the fundamental security mechanisms of a Web-based system.
CO4: To be able to develop and deploy customized exploits that can bypass common
defenses
CO5: To be able to evaluate a web based system with respect to its security requirements.
TOTAL: 30 PERIODS
TOTAL:45+30=75 PERIODS

REFERENCES
1. B. Sullivan, V. Liu, and M. Howard, Web Application Security, A Beginner’s Guide. New
York: McGraw-Hill Education, 2011.
2. D. Stuttard and M. Pinto, The Web Application Hacker’s Handbook: Discovering and
Exploiting Security Flaws, 2nd ed. Indianapolis, IN: Wiley, John & Sons, 2011.
3. W. Hanqing and L. Zhao, Web Security: A Whitehat Perspective. United Kingdom:
Auerbach Publishers, 2015.
4. M. Shema and J. B. Alcover, Hacking Web Apps: Detecting and Preventing Web
Application Security Problems. Washington, DC, United States: Syngress Publishing,
2014.

CO-PO Mapping
CO POs

PO1 PO2 PO3 PO4 PO5 PO6


2 1 - - - 1
1
2 1 - - - 1
2
2 1 - - 1 -
3
3 2 1 - - 1
4
3 2 1 - 2 1
5

Avg 2.4 1.4 1 - 1.5 1

75
AUDIT COURSES

AX4091 ENGLISH FOR RESEARCH PAPER WRITING LT PC


2 0 00
COURSE OBJECTIVES:
 Teach how to improve writing skills and level of readability
 Tell about what to write in each section
 Summarize the skills needed when writing a Title
 Infer the skills needed when writing the Conclusion
 Ensure the quality of paper at very first-time submission

UNIT I INTRODUCTION TO RESEARCH PAPER WRITING 6


Planning and Preparation, Word Order, Breaking up long sentences, Structuring Paragraphs and
Sentences, Being Concise and Removing Redundancy, Avoiding Ambiguity and Vagueness

UNIT II PRESENTATION SKILLS 6


Clarifying Who Did What, Highlighting Your Findings, Hedging and Criticizing, Paraphrasing and
Plagiarism, Sections of a Paper, Abstracts, Introduction

UNIT III TITLE WRITING SKILLS 6


Key skills are needed when writing a Title, key skills are needed when writing an Abstract, key skills
are needed when writing an Introduction, skills needed when writing a Review of the Literature,
Methods, Results, Discussion, Conclusions, The Final Check

UNIT IV RESULT WRITING SKILLS 6


Skills are needed when writing the Methods, skills needed when writing the Results, skills are needed
when writing the Discussion, skills are needed when writing the Conclusions

UNIT V VERIFICATION SKILLS 6


Useful phrases, checking Plagiarism, how to ensure paper is as good as it could possibly be the first-
time submission
TOTAL: 30 PERIODS
COURSE OUTCOMES
CO1 –Understand that how to improve your writing skills and level of readability
CO2 – Learn about what to write in each section
CO3 – Understand the skills needed when writing a Title
CO4 – Understand the skills needed when writing the Conclusion
CO5 – Ensure the good quality of paper at very first-time submission

REFERENCES:
1. Adrian Wallwork , English for Writing Research Papers, Springer New York Dordrecht
Heidelberg London, 2011
2. Day R How to Write and Publish a Scientific Paper, Cambridge University Press 2006
3. Goldbort R Writing for Science, Yale University Press (available on Google Books) 2006
4. Highman N, Handbook of Writing for the Mathematical Sciences, SIAM. Highman’s
book 1998.

76
AX4092 DISASTER MANAGEMENT LT PC
2 0 00
COURSE OBJECTIVES:
 Summarize basics of disaster
 Explain a critical understanding of key concepts in disaster risk reduction and humanitarian
response.
 Illustrate disaster risk reduction and humanitarian response policy and practice from multiple
perspectives.
 Describe an understanding of standards of humanitarian response and practical relevance in
specific types of disasters and conflict situations.
 Develop the strengths and weaknesses of disaster management approaches

UNIT I INTRODUCTION 6
Disaster: Definition, Factors and Significance; Difference between Hazard And Disaster; Natural and
Manmade Disasters: Difference, Nature, Types and Magnitude.

UNIT II REPERCUSSIONS OF DISASTERS AND HAZARDS 6


Economic Damage, Loss of Human and Animal Life, Destruction Of Ecosystem. Natural Disasters:
Earthquakes, Volcanisms, Cyclones, Tsunamis, Floods, Droughts And Famines, Landslides And
Avalanches, Man-made disaster: Nuclear Reactor Meltdown, Industrial Accidents, Oil Slicks And
Spills, Outbreaks Of Disease And Epidemics, War And Conflicts.

UNIT III DISASTER PRONE AREAS IN INDIA 6


Study of Seismic Zones; Areas Prone To Floods and Droughts, Landslides And Avalanches; Areas
Prone To Cyclonic and Coastal Hazards with Special Reference To Tsunami; Post-Disaster
Diseases and Epidemics

UNIT IV DISASTER PREPAREDNESS AND MANAGEMENT 6


Preparedness: Monitoring Of Phenomena Triggering a Disaster or Hazard; Evaluation of Risk:
Application of Remote Sensing, Data from Meteorological And Other Agencies, Media Reports:
Governmental and Community Preparedness.

UNIT V RISK ASSESSMENT 6


Disaster Risk: Concept and Elements, Disaster Risk Reduction, Global and National Disaster Risk
Situation. Techniques of Risk Assessment, Global Co-Operation in Risk Assessment and Warning,
People’s Participation in Risk Assessment. Strategies for Survival
TOTAL : 30 PERIODS
COURSE OUTCOMES:
CO1: Ability to summarize basics of disaster
CO2:Ability to explain a critical understanding of key concepts in disaster risk reduction and
humanitarian response.
CO3: Ability to illustrate disaster risk reduction and humanitarian response policy and practice
from multiple perspectives.
CO4: Ability to describe an understanding of standards of humanitarian response and practical
relevance in specific types of disasters and conflict situations.
CO5: Ability to develop the strengths and weaknesses of disaster management approaches

77
REFERENCES:
1. Goel S. L., Disaster Administration And Management Text And Case Studies”,Deep & Deep
Publication Pvt. Ltd., New Delhi,2009.
2. NishithaRai, Singh AK, “Disaster Management in India: Perspectives, issues and strategies
“’NewRoyal book Company,2007.
3. Sahni, Pradeep Et.Al. ,” Disaster Mitigation Experiences And Reflections”, Prentice Hall
OfIndia, New Delhi,2001.

AX4093 CONSTITUTION OF INDIA L T P C


2 0 0 0
COURSE OBJECTIVES:
Students will be able to:
 Understand the premises informing the twin themes of liberty and freedom from a civil rights
perspective.
 To address the growth of Indian opinion regarding modern Indian intellectuals’
constitutional
 Role and entitlement to civil and economic rights as well as the emergence of nationhood
in the early years of Indian nationalism.
 To address the role of socialism in India after the commencement of the Bolshevik
Revolution 1917 And its impact on the initial drafting of the Indian Constitution.

UNIT I HISTORY OF MAKING OF THE INDIAN CONSTITUTION


History, Drafting Committee, (Composition & Working)

UNIT II PHILOSOPHY OF THE INDIAN CONSTITUTION


Preamble, Salient Features

UNIT III CONTOURS OF CONSTITUTIONAL RIGHTS AND DUTIES


Fundamental Rights, Right to Equality, Right to Freedom, Right against Exploitation, Right to
Freedom of Religion, Cultural and Educational Rights, Right to Constitutional Remedies, Directive
Principles of State Policy, Fundamental Duties.

UNIT IV ORGANS OF GOVERNANCE


Parliament, Composition, Qualifications and Disqualifications, Powers and Functions, Executive,
President, Governor, Council of Ministers, Judiciary, Appointment and Transfer of Judges,
Qualifications, Powers and Functions.

UNIT V LOCAL ADMINISTRATION

Elected Representative, CEO, Municipal Corporation. Pachayati raj: Introduction, PRI: Zila
Panchayat. Elected officials and their roles, CEO Zila Pachayat: Position and role. Block level:
Organizational Hierarchy(Different departments), Village level:Role of Elected and Appointed
officials, Importance of grass root democracy.

UNIT VI ELECTION COMMISSION


Election Commission: Role and Functioning. Chief Election Commissioner and Election
Commissioners - Institute and Bodies for the welfare of SC/ST/OBC and women.

78
TOTAL: 30 PERIODS
COURSE OUTCOMES
Students will be able to:
● Discuss the growth of the demand for civil rights in India for the bulk of Indians before the arrival
of Gandhi in Indian politics.
● Discuss the intellectual origins of the framework of argument that informed the
conceptualization
● of social reforms leading to revolution in India.
● Discuss the circumstances surrounding the foundation of the Congress Socialist Party[CSP]
under the leadership of Jawaharlal Nehru and the eventual failure of the proposal of direct
elections through adult suffrage in the Indian Constitution.
● Discuss the passage of the Hindu Code Bill of 1956.

REFERENCES:
1. The Constitution of India,1950(Bare Act),Government Publication.
2. Dr.S.N.Busi, Dr.B. R.Ambedkar framing of Indian Constitution,1st Edition, 2015.
3. M.P. Jain, Indian Constitution Law, 7th Edn., LexisNexis,2014.
4. D.D. Basu, Introduction to the Constitution of India, LexisNexis, 2015.

AX4094 நற் றமிழ் இலக்கியம் L T P C


2 0 0 0

UNIT I சங் க இலக்கியம் 6


1. தமிழின் துவக்க நூல் ததொல் கொப் பியம்
– எழுத்து, த ொல் , தபொருள்
2. அகநொனூறு (82)
- இயற் கக இன்னிக அரங் கம்
3. குறிஞ் சிப் பொட்டின் மலர்க்கொட்சி
4. புறநொனூறு (95,195)
- பபொகர நிறுத்திய ஒளகவயொர்

UNIT II அறநநறித் தமிழ் 6


1. அறதநறி வகுத்த திருவள் ளுவர்
- அறம் வலியுறுத்தல் , அன்புகடகம, ஒப் புறவு அறிதல் , ஈகக,
புகழ்
2. பிற அறநூல் கள் - இலக்கிய மருந்து
– ஏலொதி, சிறுபஞ் மூலம் , திரிகடுகம் , ஆ ொரக்பகொகவ (தூய் கமகய
வலியுறுத்தும் நூல் )

UNIT III இரட்டடக் காப் பியங் கள் 6


1. கண்ணகியின் புரட்சி
- சிலப் பதிகொர வழக்குகர கொகத
2. மூகப கவ இலக்கியம் மணிபமககல
- சிகறக்பகொட்டம் அறக்பகொட்டமொகிய கொகத
79
UNIT IV அருள் நநறித் தமிழ் 6
1. சிறுபொணொற் றுப் பகட
- பொரி முல் கலக்குத் பதர் தகொடுத்தது, பபகன் மயிலுக்குப்
பபொர்கவ தகொடுத்தது, அதியமொன் ஒளகவக்கு தநல் லிக்கனி
தகொடுத்தது, அர ர் பண்புகள்
2. நற் றிகண
- அன்கனக்குரிய புன்கன சிறப் பு
3. திருமந்திரம் (617, 618)
- இயமம் நியமம் விதிகள்
4. தர்ம ் ொகலகய நிறுவிய வள் ளலொர்
5. புறநொனூறு
- சிறுவபன வள் ளலொனொன்
6. அகநொனூறு (4) - வண்டு
நற் றிகண (11) - நண்டு
கலித்ததொகக (11) - யொகன, புறொ
ஐந்திகண 50 (27) - மொன்
ஆகியகவ பற் றிய த ய் திகள்

UNIT V நவீன தமிழ் இலக்கியம் 6


1. உகரநகடத் தமிழ் ,
- தமிழின் முதல் புதினம் ,
- தமிழின் முதல் சிறுககத,
- கட்டுகர இலக்கியம் ,
- பயண இலக்கியம் ,
- நொடகம் ,
2. நொட்டு விடுதகல பபொரொட்டமும் தமிழ் இலக்கியமும் ,
3. முதொய விடுதகலயும் தமிழ் இலக்கியமும் ,
4. தபண் விடுதகலயும் விளிம் பு நிகலயினரின் பமம் பொட்டில் தமிழ்
இலக்கியமும் ,
5. அறிவியல் தமிழ் ,
6. இகணயத்தில் தமிழ் ,
7. சுற் று சூ
் ழல் பமம் பொட்டில் தமிழ் இலக்கியம் .
TOTAL: 30 PERIODS
தமிழ் இலக்கிய நெளியீடுகள் / புத்தகங் கள்
1. தமிழ் இகணய கல் விக்கழகம் (Tamil Virtual University)
- www.tamilvu.org
2. தமிழ் விக்கிப் பீடியொ (Tamil Wikipedia)
-https://ta.wikipedia.org
3. தர்மபுர ஆதீன தவளியீடு
4. வொழ் வியல் களஞ் சியம்
- தமிழ் ப் பல் ககலக்கழகம் , தஞ் ொவூர்
5. தமிழ் ககலக் களஞ் சியம்

80
- தமிழ் வளர் சி
் த் துகற (thamilvalarchithurai.com)
6. அறிவியல் களஞ் சியம்
- தமிழ் ப் பல் ககலக்கழகம் , தஞ் ொவூர்

OPEN ELECTIVES

OCE431 INTEGRATED WATER RESOURCES MANAGEMENT LT PC


3 0 0 3

OBJECTIVE
 Students will be introduced to the concepts and principles of IWRM, which is inclusive of the
economics, public-private partnership, water & health, water & food security and legal & regulatory
settings.

UNIT I CONTEXT FOR IWRM 9


Water as a global issue: key challenges – Definition of IWRM within the broader context of
development – Key elements of IWRM - Principles – Paradigm shift in water management -
Complexity of the IWRM process – UN World Water Assessment - SDGs.

UNIT II WATER ECONOMICS 9


Economic view of water issues: economic characteristics of water good and services – Non-market
monetary valuation methods – Water economic instruments – Private sector involvement in water
resources management: PPP objectives, PPP models, PPP processes, PPP experiences through
case studies.

UNIT III LEGAL AND REGULATORY SETTINGS 9


Basic notion of law and governance: principles of international and national law in the area of water
management - Understanding UN law on non-navigable uses of international water courses –
International law for groundwater management – World Water Forums – Global Water Partnerships
- Development of IWRM in line with legal and regulatory framework.

UNIT IV WATER AND HEALTH WITHIN THE IWRM CONTEXT 9


Links between water and health: options to include water management interventions for health –
Health protection and promotion in the context of IWRM – Global burden of Diseases - Health impact
assessment of water resources development projects – Case studies.

UNIT V AGRICULTURE IN THE CONCEPT OF IWRM 9


Water for food production: ‘blue’ versus ‘green’ water debate – Water foot print - Virtual water trade
for achieving global water and food security –- Irrigation efficiencies, irrigation methods - current
water pricing policy– scope to relook pricing.
TOTAL: 45 PERIODS
OUTCOMES
 On completion of the course, the student is expected to be able to

CO1 Describe the context and principles of IWRM; Compare the conventional and integrated
ways of water management.
CO2 Select the best economic option among the alternatives; illustrate the pros and cons of PPP
through case studies.
81
CO3 Apply law and governance in the context of IWRM.
CO4 Discuss the linkages between water-health; develop a HIA framework.
CO5 Analyse how the virtual water concept pave way to alternate policy options.
REFERENCES:
1. Cech Thomas V., Principles of water resources: history, development, management and
policy. John Wiley and Sons Inc., New York. 2003.
2. Mollinga .P. etal “ Integrated Water Resources Management”, Water in South Asia Volume I,
Sage Publications, 2006.
3. Technical Advisory Committee, Integrated Water Resources management, Technical
Advisory Committee Background Paper No: 4. Global water partnership, Stockholm, Sweden.
2002.
4. Technical Advisory Committee, Dublin principles for water as reflected in comparative
assessment of institutional and legal arrangements for Integrated Water Resources
Management, Technical Advisory Committee Background paper No: 3. Global water
partnership, Stockholm, Sweden. 1999.
5. Technical Advisory Committee, Effective Water Governance”. Technical Advisory Committee
Background paper No: 7. Global water partnership, Stockholm, Sweden, 2003.

OCE432 WATER, SANITATION AND HEALTH LTPC


3003
OBJECTIVES:
• Understand the accelerating health impacts due to the present managerial aspects and
initiatives in water and sanitation and health sectors in the developing scenario

UNIT I FUNDAMENTALS WASH 9


Meanings and Definition: Safe Water- Health, Nexus: Water- Sanitation - Health and Hygiene –
Equity issues-Water security - Food Security. Sanitation And Hygiene (WASH) and Integrated Water
Resources Management (IWRM) - Need and Importance of WASH

UNIT II MANAGERIAL IMPLICATIONS AND IMPACT 9


Third World Scenario – Poor and Multidimensional Deprivation--Health Burden in Developing
Scenario -Factors contribute to water, sanitation and hygiene related diseases-Social: Social
Stratification and Literacy Demography: Population and Migration- Fertility - Mortality- Environment:
Water Borne-Water Washed and Water Based Diseases - Economic: Wage - Water and Health
Budgeting -Psychological: Non-compliance - Disease Relapse - Political: Political Will.

UNIT III CHALLENGES IN MANAGEMENT AND DEVELOPMENT 9


Common Challenges in WASH - Bureaucracy and Users- Water Utilities -Sectoral Allocation:-
Infrastructure- Service Delivery: Health services: Macro and Micro- level: Community and Gender
Issues- Equity Issues - Paradigm Shift: Democratization of Reforms and Initiatives.

UNIT IV GOVERNANCE 9
Public health -Community Health Assessment and Improvement Planning (CHA/CHIP)-
Infrastructure and Investments on Water, (WASH) - Cost Benefit Analysis – Institutional Intervention-
Public Private Partnership - Policy Directives - Social Insurance -Political Will vs Participatory
Governance -

82
UNIT V INITIATIVES 9
Management vs Development -Accelerating Development- Development Indicators -Inclusive
Development-Global and Local- Millennium Development Goal (MDG) and Targets - Five Year Plans
- Implementation - Capacity Building - Case studies on WASH.
TOTAL: 45 PERIODS
OUTCOMES:
CO1 Capture to fundamental concepts and terms which are to be applied and understood all
through the study.
CO2 Comprehend the various factors affecting water sanitation and health through the lens
of third world scenario.
CO3 Critically analyse and articulate the underlying common challenges in water, sanitation
and health.
CO4 Acquire knowledge on the attributes of governance and its say on water sanitation and
health.
CO5 Gain an overarching insight in to the aspects of sustainable resource management in
the absence of a clear level playing field in the developmental aspects.
REFERENCES
1. Bonitha R., Beaglehole R.,Kjellstorm, 2006, “Basic Epidemiology”, 2nd Edition, World Health
Organization.
2. Van Note Chism, N. and Bickford, D. J. (2002), Improving the environment for learning: An
expanded agenda. New Directions for Teaching and Learning, 2002: 91–98.
doi: 10.1002/tl.83Improving the Environment for learning: An Expanded Agenda
3. National Research Council. Global Issues in Water, Sanitation, and Health: Workshop
Summary. Washington, DC: The National Academies Press, 2009.
4. Sen, Amartya 1997. On Economic Inequality. Enlarged edition, with annex by JamesFoster
and Amartya Sen, Oxford: Claredon Press, 1997.
5. Intersectoral Water Allocation Planning and Management, 2000, World Bank Publishers
www. Amazon.com
6. Third World Network.org (www.twn.org).

OCE433 PRINCIPLES OF SUSTAINABLE DEVELOPMENT LT PC


3 0 0 3

OBJECTIVES:
 To impart knowledge on environmental, social and economic dimensions of sustainability
and the principles evolved through landmark events so as to develop an action mindset for
sustainable development.

UNIT I SUSTAINABILITY AND DEVELOPMENT CHALLEGES 9


Definition of sustainability – environmental, economical and social dimensions of sustainability -
sustainable development models – strong and weak sustainability – defining development-
millennium development goals – mindsets for sustainability: earthly, analytical, precautionary, action
and collaborative– syndromes of global change: utilisation syndromes, development syndromes, and
sink syndromes – core problems and cross cutting Issues of the 21 century - global, regional and
local environmental issues – social insecurity - resource degradation –climate change –
desertification.

83
UNIT II PRINCIPLES AND FRAME WORK 9
History and emergence of the concept of sustainable development - our common future - Stockholm
to Rio plus 20– Rio Principles of sustainable development – Agenda 21 natural step- peoples earth
charter – business charter for sustainable development –UN Global Compact - Role of civil society,
business and government – United Nations’ 2030 Agenda for sustainable development – 17
sustainable development goals and targets, indicators and intervention areas

UNIT III SUSTAINABLE DEVELOPMENT AND WELLBEING 9


The Unjust World and inequities - Quality of Life - Poverty, Population and Pollution - Combating
Poverty - - Demographic dynamics of sustainability - Strategies to end Rural and Urban Poverty and
Hunger – Sustainable Livelihood Framework- Health, Education and Empowerment of Women,
Children, Youth, Indigenous People, Non-Governmental Organizations, Local Authorities and
Industry for Prevention, Precaution , Preservation and Public participation.

UNIT IV SUSTAINABLE SOCIO-ECONOMIC SYSTEMS 10


Sustainable Development Goals and Linkage to Sustainable Consumption and Production –
Investing in Natural Capital- Agriculture, Forests, Fisheries - Food security and nutrition and
sustainable agriculture- Water and sanitation - Biodiversity conservation and Ecosystem integrity –
Ecotourism - Sustainable Cities – Sustainable Habitats- Green Buildings - Sustainable
Transportation –– Sustainable Mining - Sustainable Energy– Climate Change –Mitigation and
Adaptation - Safeguarding Marine Resources - Financial Resources and Mechanisms

UNIT V ASSESSING PROGRESS AND WAY FORWARD 8


Nature of sustainable development strategies and current practice- Sustainability in global, regional
and national context –Approaches to measuring and analysing sustainability– limitations of GDP-
Ecological Footprint- Human Development Index- Human Development Report – National initiatives
for Sustainable Development - Hurdles to Sustainability - Science and Technology for sustainable
development –Performance indicators of sustainability and Assessment mechanism – Inclusive
Green Growth and Green Economy – National Sustainable Development Strategy Planning and
National Status of Sustainable Development Goals
TOTAL: 45 PERIODS
OUTCOMES:
 On completion of the course, the student is expected to be able to
CO1 Explain and evaluate current challenges to sustainability, including modern world
social, environmental, and economic structures and crises.
CO2 Identify and critically analyze the social environmental, and economic dimensions of
sustainability in terms of UN Sustainable development goals
CO3 Develop a fair understanding of the social, economic and ecological linkage of Human
well being, production and consumption
CO4 Evaluate sustainability issues and solutions using a holistic approach that focuses on
connections between complex human and natural systems.
CO5 Integrate knowledge from multiple sources and perspectives to understand
environmental limits governing human societies and economies and social justice
dimensions of sustainability.

REFERENCES:
1. Tom Theis and Jonathan Tomkin, Sustainability: A Comprehensive Foundation, Rice
University, Houston, Texas, 2012

84
2. A guide to SDG interactions:from science to implementation, International Council for
Science, Paris,2017
3. Karel Mulder, Sustainable Development for Engineers - A Handbook and Resource Guide,
Rouledge Taylor and Francis, 2017.
4. The New Global Frontier - Urbanization, Poverty and Environmentin the 21st Century -
George Martine,Gordon McGranahan,Mark Montgomery and Rogelio Fernández-Castilla,
IIED and UNFPA, Earthscan, UK, 2008
5. Nolberto Munier, Introduction to Sustainability: Road to a Better Future, Springer, 2006
6. Barry Dalal Clayton and Stephen Bass, Sustainable Development Strategies- a resource
book”, Earthscan Publications Ltd, London, 2002.

OCE434 ENVIRONMENTAL IMPACT ASSESSMENT LT PC


3 0 03
OBJECTIVES:
 To make the students to understand environmental clearance, its legal requirements and to
provide knowledge on overall methodology of EIA, prediction tools and models, environmental
management plan and case studies.

UNIT I INTRODUCTION 9
Historical development of Environmental Impact Assessment (EIA). Environmental Clearance- EIA
in project cycle. legal and regulatory aspects in India – types and limitations of EIA –EIA process-
screening – scoping - terms of reference in EIA- setting – analysis – mitigation. Cross sectoral issues
–public hearing in EIA- EIA consultant accreditation.

UNIT II IMPACT INDENTIFICATION AND PREDICTION 10


Matrices – networks – checklists – cost benefit analysis – analysis of alternatives – expert systems
in EIA. prediction tools for EIA – mathematical modeling for impact prediction – assessment of
impacts – air – water – soil – noise – biological –– cumulative impact assessment

UNIT III SOCIO-ECONOMIC IMPACT ASSESSMENT 8


Socio-economic impact assessment - relationship between social impacts and change in community
and institutional arrangements. factors and methodologies- individual and family level impacts.
communities in transition-rehabilitation

UNIT IV EIA DOCUMENTATION AND ENVIRONMENTAL MANAGEMENT PLAN 9


Environmental management plan - preparation, implementation and review – mitigation and
rehabilitation plans – policy and guidelines for planning and monitoring programmes – post project
audit – documentation of EIA findings – ethical and quality aspects of environmental impact
assessment

UNIT V CASE STUDIES 9


Mining, power plants, cement plants, highways, petroleum refining industry, storage & handling of
hazardous chemicals, common hazardous waste facilities, CETPs, CMSWMF, building and
construction projects
TOTAL: 45 PERIODS
OUTCOMES:
 On completion of the course, the student is expected to be able to
85
CO1 Understand need for environmental clearance, its legal procedure, need of EIA, its
types, stakeholders and their roles
CO2 Understand various impact identification methodologies, prediction techniques
and model of impacts on various environments
CO3 Understand relationship between social impacts and change in community due to
development activities and rehabilitation methods
CO4 Document the EIA findings and prepare environmental management and
monitoring plan
CO5 Identify, predict and assess impacts of similar projects based on case studies

REFERENCES:
1. EIA Notification 2006 including recent amendments, by Ministry of Environment, Forest and
Climate Change, Government of India
2. Sectoral Guidelines under EIA Notification by Ministry of Environment, Forest and Climate
Change, Government of India
3. Canter, L.W., Environmental Impact Assessment, McGraw Hill, New York. 1996
4. Lawrence, D.P., Environmental Impact Assessment – Practical solutions to recurrent
problems, Wiley-Interscience, New Jersey. 2003
5. Lee N. and George C. 2000. Environmental Assessment in Developing and Transitional
Countries. Chichester: Willey
6. World Bank –Source book on EIA ,1999
7. Sam Mannan, Lees' Loss Prevention in the Process Industries, Hazard Identification
Assessment and Control, 4th Edition, Butterworth Heineman, 2012.

OME431 VIBRATION AND NOISE CONTROL STRATEGIES L T PC


3 0 0 3
OBJECTIVES
 To appreciate the basic concepts of vibration in damped and undamped systems
 To appreciate the basic concepts of noise, its effect on hearing and related terminology
 To use the instruments for measuring and analyzing the vibration levels in a body
 To use the instruments for measuring and analyzing the noise levels in a system
 To learn the standards of vibration and noise levels and their control techniques

UNIT- I BASICS OF VIBRATION 9


Introduction – Sources and causes of Vibration-Mathematical Models - Displacement, velocity and
Acceleration - Classification of vibration: free and forced vibration, undamped and damped vibration,
linear and non-linear vibration - Single Degree Freedom Systems - Vibration isolation - Determination
of natural frequencies

UNIT- II BASICS OF NOISE 9


Introduction - Anatomy of human ear - Mechanism of hearing - Amplitude, frequency, wavelength
and sound pressure level - Relationship between sound power, sound intensity and sound pressure
level - Addition, subtraction and averaging decibel levels - sound spectra -Types of sound fields -
Octave band analysis - Loudness.

UNIT- III INSTRUMENTATION FOR VIBRATION MEASUREMENT 9


Experimental Methods in Vibration Analysis.- Vibration Measuring Instruments - Selection of Sensors
- Accelerometer Mountings - Vibration Exciters - Mechanical, Hydraulic, Electromagnetic and
86
Electrodynamics – Frequency Measuring Instruments -. System Identification from Frequency
Response -Testing for resonance and mode shapes

UNIT- IV INSTRUMENTATION FOR NOISE MEASUREMENT AND ANALYSIS 9


Microphones - Weighting networks - Sound Level meters, its classes and calibration - Noise
measurements using sound level meters - Data Loggers - Sound exposure meters - Recording of
noise - Spectrum analyser - Intensity meters - Energy density sensors - Sound source localization.

UNIT- V METHODS OF VIBRATION CONTROL, SOURCES OF NOISE AND ITS


CONTROL 9
Specification of Vibration Limits – Vibration severity standards - Vibration as condition Monitoring
Tool – Case Studies - Vibration Isolation methods - Dynamic Vibration Absorber – Need for
Balancing - Static and Dynamic Balancing machines – Field balancing - Major sources of noise -
Noise survey techniques – Measurement technique for vehicular noise - Road vehicles Noise
standard – Noise due to construction equipment and domestic appliances – Industrial noise sources
and its strategies – Noise control at the source – Noise control along the path – Acoustic Barriers –
Noise control at the receiver -- Sound transmission through barriers – Noise reduction Vs
Transmission loss - Enclosures
TOTAL: 45 PERIODS
OUTCOMES:
On Completion of the course the student will be able to
1. apply the basic concepts of vibration in damped and undamped systems
2. apply the basic concepts of noise and to understand its effects on systems
3. select the instruments required for vibration measurement and its analysis
4. select the instruments required for noise measurement and its analysis.
5. recognize the noise sources and to control the vibration levels in a body and to control noise
under different strategies.

REFERENCES:
1. Singiresu S. Rao, “Mechanical Vibrations”, Pearson Education Incorporated, 2017.
2. Graham Kelly. Sand Shashidhar K. Kudari, “Mechanical Vibrations”, Tata McGraw –Hill
Publishing Com. Ltd., 2007.
3. Ramamurti. V, “Mechanical Vibration Practice with Basic Theory”, Narosa Publishing House,
2000.
4. William T. Thomson, “Theory of Vibration with Applications”, Taylor & Francis, 2003.
5. G.K. Grover, “Mechanical Vibrations”, Nem Chand and Bros.,Roorkee, 2014.
6. A.G. Ambekar, “Mechanical Vibrations and Noise Engineering”, PHI Learning Pvt. Ltd., 2014.
7. David A. Bies and Colin H. Hansen, “Engineering Noise Control – Theory and Practice”, Spon
Press, London and New York, 2009.

OME432 ENERGY CONSERVATION AND MANAGEMENT IN DOMESTIC SECTORS

L T P C
3 0 0 3
COURSE OBJECTIVES:
 To learn the present energy scenario and the need for energy conservation.
 To understand the different measures for energy conservation in utilities.

87
 Acquaint students with principle theories, materials, and construction techniques to create
energy efficient buildings.
 To identify the energy demand and bridge the gap with suitable technology for sustainable
habitat
 To get familiar with the energy technology, current status of research and find the ways to
optimize a system as per the user requirement

UNIT I ENERGY SCENARIO 9


Primary energy resources - Sectorial energy consumption (domestic, industrial and other sectors),
Energy pricing, Energy conservation and its importance, Energy Conservation Act-2001 and its
features – Energy star rating.

UNIT II HEATING, VENTILLATION & AIR CONDITIONING 9


Basics of Refrigeration and Air Conditioning – COP / EER / SEC Evaluation – SPV system design &
optimization for Solar Refrigeration.

UNIT III LIGHTING, COMPUTER, TV 9


Specification of Luminaries – Types – Efficacy – Selection & Application – Time Sensors –
Occupancy Sensors – Energy conservation measures in computer – Television – Electronic devices.

UNIT IV ENERGY EFFICIENT BUILDINGS 9


Conventional versus Energy efficient buildings – Landscape design – Envelope heat loss and heat
gain – Passive cooling and heating – Renewable sources integration.

UNIT V ENERGY STORAGE TECHNOLOGIES 9


Necessity & types of energy storage – Thermal energy storage – Battery energy storage, charging
and discharging– Hydrogen energy storage & Super capacitors – energy density and safety issues
– Applications.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
Upon completion of this course, the students will be able to:
1. Understand technical aspects of energy conservation scenario.
2. Energy audit in any type for domestic buildings and suggest the conservation measures.
3. Perform building load estimates and design the energy efficient landscape system.
4. Gain knowledge to utilize an appliance/device sustainably.
5. Understand the status and current technological advancement in energy storage field.

REFERENCES:
1. Yogi Goswami, Frank Kreith, Energy Efficiency and Renewable energy Handbook, CRC Press,
2016
2. ASHRAE Handbook 2020 – HVAC Systems & Equipment
3. Paolo Bertoldi, Andrea Ricci, Anibal de Almeida, Energy Efficiency in Household Appliances
and Lighting, Conference proceedings, Springer, 2001
4. David A. Bainbridge, Ken Haggard, Kenneth L. Haggard, Passive Solar Architecture: Heating,
Cooling, Ventilation, Daylighting, and More Using Natural Flows, Chelsea Green Publishing,
2011.
5. Guide book for National Certification Examination for Energy Managers and Energy Auditors
6. (Could be downloaded from www.energymanagertraining.com)

88
7. Ibrahim Dincer and Mark A. Rosen, Thermal Energy Storage Systems and Applications, John
Wiley & Sons 2002.
8. Robert Huggins, Energy Storage: Fundamentals, Materials and Applications, 2nd edition,
Springer, 2015
9. Ru-shiliu, Leizhang, Xueliang sun, Electrochemical technologies for energy storage and
conversion, Wiley publications, 2012.

OME433 ADDITIVE MANUFACTURING L T P C


3 0 0 3

UNIT I INTRODUCTION 9
Need - Development - Rapid Prototyping Rapid Tooling – Rapid Manufacturing – Additive
Manufacturing. AM Process Chain- Classification – Benefits.

UNIT II DESIGN FOR ADDITIVE MANUFACTURING 9


CAD Model Preparation - Part Orientation and Support Structure Generation -Model Slicing - Tool
Path Generation Customized Design and Fabrication - Case Studies.

UNIT III VAT POLYMERIZATION 9


Stereolithography Apparatus (SLA)- Materials -Process -Advantages Limitations- Applications.
Digital Light Processing (DLP) - Materials – Process - Advantages - Applications. Multi Jet Modelling
(MJM) - Principles - Process - Materials - Advantages and Limitations.

UNIT IV MATERIAL EXTRUSION AND SHEET LAMINATION 9


Fused Deposition Modeling (FDM)- Process-Materials - Applications and Limitations. Sheet
Lamination Process: Laminated Object Manufacturing (LOM)- Basic Principle- Mechanism: Gluing
or Adhesive Bonding – Thermal Bonding- Materials- Application and Limitation - Bio-Additive
Manufacturing Computer Aided Tissue Engineering (CATE) – Case studies
POWDER BASED PROCESS
Selective Laser Sintering (SLS): Process –Mechanism– Typical Materials and Application- Multi Jet
Fusion - Basic Principle-– Materials- Application and Limitation - Three Dimensional Printing -
Materials -Process - Benefits and Limitations. Selective Laser Melting (SLM) and Electron Beam
Melting (EBM): Materials – Process - Advantages and Applications. Beam Deposition Process: Laser
Engineered Net Shaping (LENS)- Process -Material Delivery - Process Parameters -Materials -
Benefits -Applications.

UNIT V CASE STUDIES AND OPPORTUNITIES ADDITIVE MANUFACTURING PROCESSES

9
Education and training - Automobile- pattern and mould - tooling - Building Printing-Bio Printing -
medical implants -development of surgical tools Food Printing -Printing Electronics. Business
Opportunities and Future Directions - Intellectual Property.
TOTAL: 45 PERIODS

REFERENCES:
1. Andreas Gebhardt and Jan-Steffen Hötter “Additive Manufacturing: 3D Printing for Prototyping
and Manufacturing”, Hanser publications, United States, 2015, ISBN: 978-1- 56990-582-1.

89
2. Ian Gibson, David W. Rosen and Brent Stucker “Additive Manufacturing Technologies: Rapid
Prototyping to Direct Digital Manufacturing”, 2nd edition, Springer., United States, 2015, ISBN13:
978-1493921126.
3. Amit Bandyopadhyay and Susmita Bose, “Additive Manufacturing”, 1st Edition, CRC Press.,
United States, 2015, ISBN-13: 978-1482223590
4. Andreas Gebhardt, “Understanding Additive Manufacturing: Rapid Prototyping, Rapid
Manufacturing”, Hanser Gardner Publication, Cincinnati., Ohio, 2011, ISBN :9783446425521.
5. Chua C.K., Leong K.F., and Lim C.S., “Rapid prototyping: Principles and applications”, Third
edition, World Scientific Publishers, 2010.

OME434 ELECTRIC VEHICLE TECHNOLOGY L T P C


3 0 0 3

UNIT I NEED FOR ELECTRIC VEHICLES 9


History and need for electric and hybrid vehicles, social and environmental importance of hybrid and
electric vehicles, impact of modern drive-trains on energy supplies, comparison of diesel, petrol,
electric and hybrid vehicles, limitations, technical challenges

UNIT II ELECTRIC VEHICLE ARCHITECHTURE 9


Electric vehicle types, layout and power delivery, performance – traction motor characteristics,
tractive effort, transmission requirements, vehicle performance, energy consumption, Concepts of
hybrid electric drive train, architecture of series and parallel hybrid electric drive train, merits and
demerits, mild and full hybrids, plug-in hybrid electric vehicles and range extended hybrid electric
vehicles, Fuel cell vehicles.

UNIT III ENERGY STORAGE 9


Batteries – types – lead acid batteries, nickel based batteries, and lithium based batteries,
electrochemical reactions, thermodynamic voltage, specific energy, specific power, energy
efficiency, Battery modeling and equivalent circuit, battery charging and types, battery cooling, Ultra-
capacitors, Flywheel technology, Hydrogen fuel cell, Thermal Management of the PEM fuel cell

UNIT IV ELECTRIC DRIVES AND CONTROL 9


Types of electric motors – working principle of AC and DC motors, advantages and limitations, DC
motor drives and control, Induction motor drives and control, PMSM and brushless DC motor -drives
and control , AC and Switch reluctance motor drives and control – Drive system efficiency – Inverters
– DC and AC motor speed controllers

UNIT V DESIGN OF ELECTRIC VEHICLES 9


Materials and types of production, Chassis skate board design, motor sizing, power pack sizing,
component matching, Ideal gear box – Gear ratio, torque–speed characteristics, Dynamic equation
of vehicle motion, Maximum tractive effort – Power train tractive effort Acceleration performance,
rated vehicle velocity – maximum gradability, Brake performance, Electronic control system, safety
and challenges in electric vehicles. Case study of Nissan leaf, Toyota Prius, tesla model 3, and
Renault Zoe cars.
TOTAL: 45 PERIODS
REFERENCES:
1. Iqbal Hussein, Electric and Hybrid Vehicles: Design Fundamentals, 2nd edition CRC Press, 2011.
90
2. Mehrdad Ehsani, Yimi Gao, Sebastian E. Gay, Ali Emadi, Modern Electric, Hybrid Electric and
Fuel Cell Vehicles: Fundamentals, Theory and Design, CRC Press, 2004.
3. James Larminie, John Lowry, Electric Vehicle Technology Explained - Wiley, 2003.
4. Ehsani, M, “Modern Electric, Hybrid Electric and Fuel Cell Vehicles: Fundamentals, Theory and
Design”, CRC Press, 2005

OME435 NEW PRODUCT DEVELOPMENT L T P C


3 0 0 3
COURSE OBJECTIVES:
The main learning objective of this course is to prepare the students for:
 Applying the principles of generic development process; and understanding the organization
structure for new product design and development.
 Identfying opportunity and planning for new product design and development.
 Conducting customer need analysis; and setting product specification for new product design
and development.
 Generating, selecting, and testing the concepts for new product design and development.
 Appling the principles of Industrial design and prototype for new product design and
development.

UNIT I INTRODUCTION TO PRODUCTDESIGN & DEVELOPMENT 9


Introduction – Characteristics of Successful Product Development – People involved in Product
Design and Development – Duration and Cost of Product Development – The Challenges of
Product Development – The Product Development Process – Concept Development: The Front-
End Process – Adapting the Generic Product Development Process – Product Development
Process Flows – Product Development Organizations.

UNIT II OPPORTUNITY DENTIFICATION & PRODUCT PLANNING 9


Opportunity Identification: Definition – Types of Opportunities – Tournament Structure of Opportunity
Identification – Effective Opportunity Tournaments – Opportunity Identification Process – Product
Planning: Four types of Product Development Projects – The Process of Product Planning.

UNIT III IDENTIFYING CUSTOMER NEEDS & PRODUCT SPECIFICATIONS 9


Identifying Customer Needs: The Importance of Latent Needs – The Process of Identifying Customer
Needs. Product Specifications: Definition – Time of Specifications Establishment – Establishing
Target Specifications – Setting the Final Specifications

UNIT IV CONCEPT GENERATION, SELECTION & TESTING 9


Concept Generation: Activity of Concept Generation – Structured Approach – Five step method of
Concept Generation. Concept Selection: Methodology – Concept Screening and Concepts Scoring.
Concept testing: Seven Step activities of concept testing.

UNITV INDUSTRIAL DESIGN & PROTOTYPING 9


Industrial Design: Need and Impact–Industrial Design Process. Prototyping – Principles of
Prototyping – Prototyping Technologies – Planning for Prototypes.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
Upon completion of this course, the students will be able to:
 Apply the principles of generic development process; and understand the organization
structure for new product design and development.
91
 Identify opportunity and plan for new product design and development.
 Conduct customer need analysis; and set product specification for new product design and
development.
 Generate, select, and test the concepts for new product design and development.
 Apply the principles of Industrial design and prototype for design and develop new products.

TEXT BOOK:
1. Ulrich K.T., Eppinger S. D. and Anita Goyal, “Product Design and Development “McGraw-
Hill Education; 7 edition, 2020.

REFERENCES:
1. Belz A., 36-Hour Course: “Product Development” McGraw-Hill, 2010.
2. Rosenthal S.,“Effective Product Design and Development”, Business One Orwin,Homewood,
1992,ISBN1-55623-603-4.
3. Pugh.S,“Total Design Integrated Methods for Successful Product Engineering”, Addison
Wesley Publishing,1991,ISBN0-202-41639-5.
4. Chitale, A. K. and Gupta, R. C., Product Design and Manufacturing, PHI Learning, 2013.
5. Jamnia, A., Introduction to Product Design and Development for Engineers, CRC Press, 2018.

OBA431 SUSTAINABLE MANAGEMENT LT P C


3003

COURSE OBJECTIVES:
 To provide students with fundamental knowledge of the notion of corporate sustainability.
 To determine how organizations impacts on the environment and socio-technical systems,
the relationship between social and environmental performance and competitiveness, the
approaches and methods.

UNIT I MANAGEMENT OF SUSTAINABILITY 9


Management of sustainability -rationale and political trends: An introduction to sustainability
management, International and European policies on sustainable development, theoretical pillars in
sustainability management studies.

UNIT II CORPORATE SUSTAINABILITY AND RESPONSIBILITY 9


Corporate sustainability parameter, corporate sustainability institutional framework, integration of
sustainability into strategic planning and regular business practices, fundamentals of stakeholder
engagement.

UNIT III SUSTAINABILITY MANAGEMENT: STRATEGIES AND APPROACHES 9


Corporate sustainability management and competitiveness: Sustainability-oriented corporate
strategies, markets and competitiveness, Green Management between theory and practice,
Sustainable Consumption and Green Marketing strategies, Environmental regulation and strategic
postures; Green Management approaches and tools; Green engineering: clean technologies and
innovation processes; Sustainable Supply Chain Management and Procurement.

92
UNIT IV SUSTAINABILITY AND INNOVATION 9
Socio-technical transitions and sustainability, Sustainable entrepreneurship, Sustainable pioneers in
green market niches, Smart communities and smart specializations.

UNIT V SUSTAINABLE MANAGEMENT OF RESOURCES, COMMODITIES AND


COMMONS 9
Energy management, Water management, Waste management, Wild Life Conservation, Emerging
trends in sustainable management, Case Studies.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
CO1: An understanding of sustainability management as an approach to aid in evaluating and
minimizing environmental impacts while achieving the expected social impact.
CO2: An understanding of corporate sustainability and responsible Business Practices
CO3: Knowledge and skills to understand, to measure and interpret sustainabilityperformances.
CO4: Knowledge of innovative practices in sustainable business and community
management
CO5: Deep understanding of sustainable management of resources and commodities

REFERENCES:
1. Daddi, T., Iraldo, F., Testa, Environmental Certification for Organizations and Products:
Management, 2015
2. Christian N. Madu, Handbook of Sustainability Management 2012
3. Petra Molthan-Hill, The Business Student's Guide to Sustainable Management: Principles
and Practice, 2014
4. Margaret Robertson, Sustainability Principles and Practice, 2014
5. Peter Rogers, An Introduction to Sustainable Development, 2006

OBA432 MICRO AND SMALL BUSINESS MANAGEMENT LTPC


3 003

COURSE OBJECTIVES
 To familiarize students with the theory and practice of small business management.
 To learn the legal issues faced by small business and how they impact operations.

UNIT I INTRODUCTION TO SMALL BUSINESS 9


Creation, Innovation, entrepreneurship and small business - Defining Small Business –Role of
Owner – Manager – government policy towards small business sector –elements of
entrepreneurship –evolution of entrepreneurship –Types of Entrepreneurship – social, civic,
corporate - Business life cycle - barriers and triggers to new venture creation – process to assist start
ups – small business and family business.

UNIT II SCREENING THE BUSINESS OPPORTUNITY AND FORMULATING THE


BUSINESS PLAN 9
Concepts of opportunity recognition; Key factors leading to new venture failure; New venture
screening process; Applying new venture screening process to the early stage small firm Role
planning in small business – importance of strategy formulation – management skills for small
business creation and development.

93
UNIT III BUILDING THE RIGHT TEAM AND MARKETING STRATEGY 9
Management and Leadership – employee assessments – Tuckman’s stages of group development
- The entrepreneurial process model - Delegation and team building - Comparison of HR
management in small and large firms - Importance of coaching and how to apply a coaching model.
Marketing within the small business - success strategies for small business marketing - customer
delight and business generating systems, - market research, - assessing market performance- sales
management and strategy - the marketing mix and marketing strategy.

UNIT IV FINANCING SMALL BUSINESS 9


Main sources of entrepreneurial capital; Nature of ‘bootstrap’ financing - Difference between cash
and profit - Nature of bank financing and equity financing - Funding-equity gap for small firms.
Importance of working capital cycle - Calculation of break-even point - Power of gross profit margin-
Pricing for profit - Credit policy issues and relating these to cash flow management and profitability.

UNIT V VALUING SMALL BUSINESS AND CRISIS MANAGEMENT 9


Causes of small business failure - Danger signals of impending trouble - Characteristics of poorly
performing firms - Turnaround strategies - Concept of business valuation - Different valuation
measurements - Nature of goodwill and how to measure it - Advantages and disadvantages of
buying an established small firm - Process of preparing a business for sale.
TOTAL: 45 PERIODS
COURSE OUTCOMES
CO1. Familiarise the students with the concept of small business
CO2. In depth knowledge on small business opportunities and challenges
CO3. Ability to devise plans for small business by building the right skills and marketing
strategies
CO4. Identify the funding source for small start ups
CO5. Business evaluation for buying and selling of small firms

REFERENCES
1. Hankinson,A.(2000). “The key factors in the profile of small firm owner-managers that influence
business performance. The South Coast Small Firms Survey, 1997-2000.” Industrial and
Commercial Training 32(3):94-98.
2. Parker,R.(2000). “Small is not necessarily beautiful: An evaluation of policy support for small
and medium-sized enterprise in Australia.” Australian Journal of Political Science 35(2):239-
253.
3. Journal articles on SME’s.

OBA433 INTELLECTUAL PROPERTY RIGHTS LTPC


300 3
COURSE OBJECTIVE

 To understand intellectual property rights and its valuation.

UNIT I INTRODUCTION 9
Intellectual property rights - Introduction, Basic concepts, Patents, Copyrights, Trademarks, Trade
Secrets, Geographic Indicators; Nature of Intellectual Property, Technological Research, Inventions
and Innovations, History - the way from WTO to WIPO, TRIPS.

94
UNIT II PROCESS 9
New Developments in IPR, Procedure for grant of Patents, TM, GIs, Patenting under Patent
Cooperation Treaty, Administration of Patent system in India, Patenting in foreign countries.

UNIT III STATUTES 9


International Treaties and conventions on IPRs, The TRIPs Agreement, PCT Agreement, The
Patent Act of India, Patent Amendment Act (2005), Design Act, Trademark Act, Geographical
Indication Act, Bayh- Dole Act and Issues of Academic Entrepreneurship.

UNIT IV STRATEGIES IN INTELLECTUAL PROPERTY 9


Strategies for investing in R&D, Patent Information and databases, IPR strength in India, Traditional
Knowledge, Case studies.

UNIT V MODELS 9
The technologies Know-how, concept of ownership, Significance of IP in Value Creation, IP
Valuation and IP Valuation Models, Application of Real Option Model in Strategic Decision Making,
Transfer and Licensing.
TOTAL: 45 PERIODS
COURSE OUTCOMES
CO1: Understanding of intellectual property and appreciation of the need to protect it
CO2: Awareness about the process of patenting
CO3: Understanding of the statutes related to IPR
CO4: Ability to apply strategies to protect intellectual property
CO5: Ability to apply models for making strategic decisions related to IPR

REFERENCES
1. Sople Vinod, Managing Intellectual Property by (Prentice hall of India Pvt.Ltd), 2006.
2. Intellectual Property rights and copyrights, EssEss Publications.
3. Primer, R. Anita Rao and Bhanoji Rao, Intellectual Property Rights, Lastain Book company.
4. Edited by Derek Bosworth and Elizabeth Webster, The Management of Intellectual Property,
Edward Elgar Publishing Ltd., 2006.
5. WIPO Intellectual Property Hand book.

OBA434 ETHICAL MANAGEMENT LTPC


3 003
COURSE OBJECTIVE
 To help students develop knowledge and competence in ethical management and decision
making in organizational contexts.

UNIT I ETHICS AND SOCIETY 9


Ethical Management- Definition, Motivation, Advantages-Practical implications of ethical
management. Managerial ethics, professional ethics, and social Responsibility-Role of culture and
society’s expectations- Individual and organizational responsibility to society and the community.

95
UNIT II ETHICAL DECISION MAKING AND MANAGEMENT IN A CRISIS 9
Managing in an ethical crisis, the nature of a crisis, ethics in crisis management, discuss case
studies, analyze real-world scenarios, develop ethical management skills, knowledge, and
competencies. Proactive crisis management.

UNIT III STAKEHOLDERS IN ETHICAL MANAGEMENT 9


Stakeholders in ethical management, identifying internal and external stakeholders, nature of
stakeholders, ethical management of various kinds of stakeholders: customers (product and service
issues), employees (leadership, fairness, justice, diversity) suppliers, collaborators, business,
community, the natural environment (the sustainability imperative, green management,
Contemporary issues).

UNIT IV INDIVIDUAL VARIABLES IN ETHICAL MANJAGEMENT 9


Understanding individual variables in ethics, managerial ethics, concepts in ethical psychology-
ethical awareness, ethical courage, ethical judgment, ethical foundations, ethical
emotions/intuitions/intensity. Utilization of these concepts and competencies for ethical decision-
making and management.

UNIT V PRACTICAL FIELD-GUIDE, TECHNIQUES AND SKILLS 9


Ethical management in practice, development of techniques and skills, navigating challenges and
dilemmas, resolving issues and preventing unethical management proactively. Role modelling and
creating a culture of ethical management and human flourishing.
TOTAL: 45 PERIODS
COURSE OUTCOMES
CO1: Role modelling and influencing the ethical and cultural context.
CO2: Respond to ethical crises and proactively address potential crises situations.
CO3: Understand and implement stakeholder management decisions.
CO4: Develop the ability, knowledge, and skills for ethical management.
CO5: Develop practical skills to navigate, resolve and thrive in management situations

REFERENCES
1. Brad Agle, Aaron Miller, Bill O’ Rourke, The Business Ethics Field Guide: the essential
companion to leading your career and your company, 2016.
2. Steiner & Steiner, Business, Government & Society: A managerial Perspective, 2011.
3. Lawrence & Weber, Business and Society: Stakeholders, Ethics, Public Policy, 2020.

ET4251 IoT FOR SMART SYSTEMS LT P C


3003
COURSE OBJECTIVES:
 To study about Internet of Things technologies and its role in real time applications.
 To introduce the infrastructure required for IoT
 To familiarize the accessories and communication techniques for IoT.
 To provide insight about the embedded processor and sensors required for IoT
 To familiarize the different platforms and Attributes for IoT

UNIT I INTRODUCTION TO INTERNET OF THINGS 9


Overview, Hardware and software requirements for IOT, Sensor and actuators, Technology drivers,
Business drivers, Typical IoT applications, Trends and implications.
96
UNIT II IOT ARCHITECTURE 9
IoT reference model and architecture -Node Structure - Sensing, Processing, Communication,
Powering, Networking - Topologies, Layer/Stack architecture, IoT standards, Cloud computing for
IoT, Bluetooth, Bluetooth Low Energy beacons.

UNIT III PROTOCOLS AND WIRELESS TECHNOLOGIES FOR IOT 9


PROTOCOLS:
NFC, SCADA and RFID, Zigbee MIPI, M-PHY, UniPro, SPMI, SPI, M-PCIe GSM, CDMA, LTE,
GPRS, small cell.

Wireless technologies for IoT: WiFi (IEEE 802.11), Bluetooth/Bluetooth Smart, ZigBee/ZigBee
Smart, UWB (IEEE 802.15.4), 6LoWPAN, Proprietary systems-Recent trends.

UNIT IV IOT PROCESSORS 9


Services/Attributes: Big-Data Analytics for IOT, Dependability,Interoperability, Security,
Maintainability.
Embedded processors for IOT :Introduction to Python programming -Building IOT with
RASPERRY PI and Arduino.

UNIT V CASE STUDIES 9


Industrial IoT, Home Automation, smart cities, Smart Grid, connected vehicles, electric vehicle
charging, Environment, Agriculture, Productivity Applications, IOT Defense

TOTAL: 45 PERIODS
COURSE OUTCOMES:
At the end of this course, the students will have the ability to
CO1: Analyze the concepts of IoT and its present developments.
CO2: Compare and contrast different platforms and infrastructures available for IoT
CO3: Explain different protocols and communication technologies used in IoT
CO4: Analyze the big data analytic and programming of IoT
CO5: Implement IoT solutions for smart applications

REFERENCES:
1. ArshdeepBahga and VijaiMadisetti : A Hands-on Approach “Internet of Things”,Universities
Press 2015.
2. Oliver Hersent , David Boswarthick and Omar Elloumi “ The Internet of Things”, Wiley,2016.
3. Samuel Greengard, “ The Internet of Things”, The MIT press, 2015.
4. Adrian McEwen and Hakim Cassimally“Designing the Internet of Things “Wiley,2014.
5. Jean- Philippe Vasseur, Adam Dunkels, “Interconnecting Smart Objects with IP: The Next
Internet” Morgan Kuffmann Publishers, 2010.
6. Adrian McEwen and Hakim Cassimally, “Designing the Internet of Things”, John Wiley and
sons, 2014.
7. Lingyang Song/DusitNiyato/ Zhu Han/ Ekram Hossain,” Wireless Device-to-Device
Communications and Networks, CAMBRIDGE UNIVERSITY PRESS,2015.
8. OvidiuVermesan and Peter Friess (Editors), “Internet of Things: Converging Technologies
for Smart Environments and Integrated Ecosystems”, River Publishers Series in
Communication, 2013.
9. Vijay Madisetti , ArshdeepBahga, “Internet of Things (A Hands on-Approach)”, 2014.
97
10. Zach Shelby, Carsten Bormann, “6LoWPAN: The Wireless Embedded Internet”, John Wiley
and sons, 2009.
11. Lars T.Berger and Krzysztof Iniewski, “Smart Grid applications, communications and
security”, Wiley, 2015.
12. JanakaEkanayake, KithsiriLiyanage, Jianzhong Wu, Akihiko Yokoyama and Nick Jenkins, “
Smart Grid Technology and Applications”, Wiley, 2015.
13. UpenaDalal,”Wireless Communications & Networks,Oxford,2015.

ET4072 MACHINE LEARNING AND DEEP LEARNING LTPC


3 003
COURSE OBJECTIVES:
The course is aimed at
 Understanding about the learning problem and algorithms
 Providing insight about neural networks
 Introducing the machine learning fundamentals and significance
 Enabling the students to acquire knowledge about pattern recognition.
 Motivating the students to apply deep learning algorithms for solving real life problems.

UNIT I LEARNING PROBLEMS AND ALGORITHMS 9


Various paradigms of learning problems, Supervised, Semi-supervised and Unsupervised
algorithms

UNIT II NEURAL NETWORKS 9


Differences between Biological and Artificial Neural Networks - Typical Architecture, Common
Activation Functions, Multi-layer neural network, Linear Separability, Hebb Net, Perceptron, Adaline,
Standard Back propagation Training Algorithms for Pattern Association - Hebb rule and Delta rule,
Hetero associative, Auto associative, Kohonen Self Organising Maps, Examples of Feature Maps,
Learning Vector Quantization, Gradient descent, Boltzmann Machine Learning.

UNIT III MACHINE LEARNING – FUNDAMENTALS & FEATURE SELECTIONS &


CLASSIFICATIONS 9
Classifying Samples: The confusion matrix, Accuracy, Precision, Recall, F1- Score, the curse of
dimensionality, training, testing, validation, cross validation, overfitting, under-fitting the data, early
stopping, regularization, bias and variance. Feature Selection, normalization, dimensionality
reduction, Classifiers: KNN, SVM, Decision trees, Naïve Bayes, Binary classification, multi class
classification, clustering.

UNIT IV DEEP LEARNING: CONVOLUTIONAL NEURAL NETWORKS 9


Feed forward networks, Activation functions, back propagation in CNN, optimizers, batch
normalization, convolution layers, pooling layers, fully connected layers, dropout, Examples of
CNNs.

UNIT V DEEP LEARNING: RNNS, AUTOENCODERS AND GANS 9


State, Structure of RNN Cell, LSTM and GRU, Time distributed layers, Generating Text,
Autoencoders: Convolutional Autoencoders, Denoising autoencoders, Variational autoencoders,
GANs: The discriminator, generator, DCGANs
TOTAL : 45 PERIODS

98
COURSE OUTCOMES (CO):
At the end of the course the student will be able to
CO1 : Illustrate the categorization of machine learning algorithms.
CO2: Compare and contrast the types of neural network architectures, activation functions
CO3: Acquaint with the pattern association using neural networks
CO4: Elaborate various terminologies related with pattern recognition and architectures of
convolutional neural networks
CO5: Construct different feature selection and classification techniques and advanced neural
network architectures such as RNN, Autoencoders, and GANs.

REFERENCES:
1. J. S. R. Jang, C. T. Sun, E. Mizutani, Neuro Fuzzy and Soft Computing - A Computational
Approach to Learning and Machine Intelligence, 2012, PHI learning
2. Deep Learning, Ian Good fellow, YoshuaBengio and Aaron Courville, MIT Press, ISBN:
9780262035613, 2016.
3. The Elements of Statistical Learning. Trevor Hastie, Robert Tibshirani and Jerome Friedman.
Second Edition. 2009.
4. Pattern Recognition and Machine Learning. Christopher Bishop. Springer. 2006.
5. Understanding Machine Learning. Shai Shalev-Shwartz and Shai Ben-David. Cambridge
University Press. 2017.

PX4012 RENEWABLE ENERGY TECHNOLOGY LTPC


3 003

OBJECTIVES:
To impart knowledge on
 Different types of renewable energy technologies
 Standalone operation, grid connected operation of renewable energy systems
UNIT I INTRODUCTION 9
Classification of energy sources – Co2 Emission - Features of Renewable energy - Renewable
energy scenario in India -Environmental aspects of electric energy conversion: impacts of renewable
energy generation on environment Per Capital Consumption - CO2 Emission - importance of
renewable energy sources, Potentials – Achievements– Applications.

UNIT II SOLAR PHOTOVOLTAICS 9


Solar Energy: Sun and Earth-Basic Characteristics of solar radiation- angle of sunrays on solar
collector-Estimating Solar Radiation Empirically - Equivalent circuit of PV Cell- Photovoltaic cell-
characteristics: P-V and I-V curve of cell-Impact of Temperature and Insolation on I-V characteristics-
Shading Impacts on I-V characteristics-Bypass diode -Blocking diode.

UNIT III PHOTOVOLTAIC SYSTEM DESIGN 9


Block diagram of solar photo voltaic system : Line commutated converters (inversion mode) - Boost
and buck-boost converters - selection of inverter, battery sizing, array sizing - PV systems
classification- standalone PV systems - Grid tied and grid interactive inverters- grid connection
issues.

99
UNIT IV WIND ENERGY CONVERSION SYSTEMS 9
Origin of Winds: Global and Local Winds- Aerodynamics of Wind turbine-Derivation of Betz’s limit-
Power available in wind-Classification of wind turbine: Horizontal Axis wind turbine and Vertical axis
wind turbine- Aerodynamic Efficiency-Tip Speed-Tip Speed Ratio-Solidity-Blade Count-Power curve
of wind turbine - Configurations of wind energy conversion systems: Type A, Type B, Type C and
Type D Configurations- Grid connection Issues - Grid integrated SCIG and PMSG based WECS.

UNIT V OTHER RENEWABLE ENERGY SOURCES 9


Qualitative study of different renewable energy resources: ocean, Biomass, Hydrogen energy
systems, Fuel cells, Ocean Thermal Energy Conversion (OTEC), Tidal and wave energy,
Geothermal Energy Resources.
TOTAL : 45 PERIODS

OUTCOMES:
After completion of this course, the student will be able to:
CO1: Demonstrate the need for renewable energy sources.
CO2: Develop a stand-alone photo voltaic system and implement a maximum power point
tracking in the PV system.
CO3: Design a stand-alone and Grid connected PV system.
CO4: Analyze the different configurations of the wind energy conversion systems.
CO5: Realize the basic of various available renewable energy sources

REFERENCES:
1. S.N.Bhadra, D. Kastha, & S. Banerjee “Wind Electrical Systems”, Oxford UniversityPress,
2009.
2. Rai. G.D, “Non conventional energy sources”, Khanna publishes, 1993.
3. Rai. G.D,” Solar energy utilization”, Khanna publishes, 1993.
4. Chetan Singh Solanki, “Solar Photovoltaics: Fundamentals, Technologies and Applications”,
PHI Learning Private Limited, 2012.
5. John Twideu and Tony Weir, “Renewal Energy Resources” BSP Publications, 2006
6. Gray, L. Johnson, “Wind energy system”, prentice hall of India, 1995.
7. B.H.Khan, " Non-conventional Energy sources", , McGraw-hill, 2nd Edition, 2009.
8. Fang Lin Luo Hong Ye, " Renewable Energy systems", Taylor & Francis Group,2013.

PS4093 SMART GRID L T P C


3 0 0 3
COURSE OBJECTIVES
 To Study about Smart Grid technologies, different smart meters and advanced metering
infrastructure.
 To know about the function of smart grid.
 To familiarize the power quality management issues in Smart Grid.
 To familiarize the high performance computing for Smart Grid applications
 To get familiarized with the communication networks for Smart Grid applications

UNIT I INTRODUCTION TO SMART GRID 9


Evolution of Electric Grid, Concept, Definitions and Need for Smart Grid, Smart grid drivers,
functions, opportunities, challenges and benefits, Difference between conventional & Smart Grid,

100
Comparison of Micro grid and Smart grid, Present development & International policies in Smart
Grid, Smart Grid Initiative for Power Distribution Utility in India – Case Study.

UNIT II SMART GRID TECHNOLOGIES 9


Technology Drivers, Smart Integration of energy resources, Smart substations, Substation
Automation, Feeder Automation ,Transmission systems: EMS, FACTS and HVDC, Wide area
monitoring, Protection and control, Distribution systems: DMS, Volt/Var control, Fault Detection,
Isolation and service restoration, Outage management, High-Efficiency Distribution Transformers,
Phase Shifting Transformers, Plug in Hybrid Electric Vehicles (PHEV) – Grid to Vehicle and Vehicle
to Grid charging concepts.

UNIT III SMART METERS AND ADVANCED METERING INFRASTRUCTURE 9


Introduction to Smart Meters, Advanced Metering infrastructure (AMI) drivers and benefits, AMI
protocols, standards and initiatives, AMI needs in the smart grid, Phasor Measurement Unit(PMU) &
their application for monitoring & protection. Demand side management and demand response
programs, Demand pricing and Time of Use, Real Time Pricing, Peak Time Pricing.

UNIT IV POWER QUALITY MANAGEMENT IN SMART GRID 9


Power Quality & EMC in Smart Grid, Power Quality issues of Grid connected Renewable Energy
Sources, Power Quality Conditioners for Smart Grid, Web based Power Quality monitoring, Power
Quality Audit.

Unit V HIGH PERFORMANCE COMPUTING FOR SMART GRID APPLICATIONS 9


Architecture and Standards -Local Area Network (LAN), House Area Network (HAN), Wide Area
Network (WAN), Broadband over Power line (BPL), PLC, Zigbee, GSM, IP based Protocols, Basics
of Web Service and CLOUD Computing, Cyber Security for Smart Grid.
TOTAL : 45 PERIODS
COURSE OUTCOME:
Students able to
CO1: Relate with the smart resources, smart meters and other smart devices.
CO2: Explain the function of Smart Grid.
CO3: Experiment the issues of Power Quality in Smart Grid.
CO4: Analyze the performance of Smart Grid.
CO5: Recommend suitable communication networks for smart grid applications

REFERENCES
1. Stuart Borlase ‘Smart Grid: Infrastructure, Technology and Solutions’, CRC Press 2012.
2. JanakaEkanayake, Nick Jenkins, KithsiriLiyanage, Jianzhong Wu, Akihiko Yokoyama,
‘Smart Grid: Technology and Applications’, Wiley, 2012.
3. Mini S. Thomas, John D McDonald, ‘Power System SCADA and Smart Grids’, CRC Press,
2015
4. Kenneth C.Budka, Jayant G. Deshpande, Marina Thottan, ‘Communication Networks for
Smart Grids’, Springer, 2014
5. SMART GRID Fundamentals of Design and Analysis, James Momoh, IEEE press, A John
Wiley & Sons, Inc., Publication.

101
DS4015 BIG DATA ANALYTICS LTPC
3 003
COURSE OBJECTIVES:
 To understand the basics of big data analytics
 To understand the search methods and visualization
 To learn mining data streams
 To learn frameworks
 To gain knowledge on R language

UNIT I INTRODUCTION TO BIG DATA 9


Introduction to Big Data Platform – Challenges of Conventional Systems - Intelligent data analysis
–Nature of Data - Analytic Processes and Tools - Analysis Vs Reporting - Modern Data Analytic
Tools- Statistical Concepts: Sampling Distributions - Re-Sampling - Statistical Inference -
Prediction Error.

UNIT II SEARCH METHODS AND VISUALIZATION 9


Search by simulated Annealing – Stochastic, Adaptive search by Evaluation – Evaluation
Strategies –Genetic Algorithm – Genetic Programming – Visualization – Classification of Visual
Data Analysis Techniques – Data Types – Visualization Techniques – Interaction techniques –
Specific Visual data analysis Techniques

UNIT III MINING DATA STREAMS 9


Introduction To Streams Concepts – Stream Data Model and Architecture - Stream Computing -
Sampling Data in a Stream – Filtering Streams – Counting Distinct Elements in a Stream –
Estimating Moments – Counting Oneness in a Window – Decaying Window - Real time Analytics
Platform(RTAP) Applications - Case Studies - Real Time Sentiment Analysis, Stock Market
Predictions

UNIT IV FRAMEWORKS 9
MapReduce – Hadoop, Hive, MapR – Sharding – NoSQL Databases - S3 - Hadoop Distributed
File Systems – Case Study- Preventing Private Information Inference Attacks on Social Networks-
Grand Challenge: Applying Regulatory Science and Big Data to Improve Medical Device
Innovation

UNIT V R LANGUAGE 9
Overview, Programming structures: Control statements -Operators -Functions -Environment and
scope issues -Recursion -Replacement functions, R data structures: Vectors -Matrices and arrays
-Lists -Data frames -Classes, Input/output, String manipulations

COURSE OUTCOMES:
CO1:understand the basics of big data analytics
CO2: Ability to use Hadoop, Map Reduce Framework.
CO3: Ability to identify the areas for applying big data analytics for increasing the business
outcome.
CO4:gain knowledge on R language
CO5: Contextually integrate and correlate large amounts of information to gain faster insights.
TOTAL:45 PERIODS

102
REFERENCE:
1. Michael Berthold, David J. Hand, Intelligent Data Analysis, Springer, 2007.
2. Anand Rajaraman and Jeffrey David Ullman, Mining of Massive Datasets, Cambridge
University Press, 3rd edition 2020.
3. Norman Matloff, The Art of R Programming: A Tour of Statistical Software Design,
No Starch Press, USA, 2011.
4. Bill Franks, Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data
Streams with Advanced Analytics, John Wiley & sons, 2012.
5. Glenn J. Myatt, Making Sense of Data, John Wiley & Sons, 2007.

NC4201 INTERNET OF THINGS AND CLOUD L T P C


3 0 0 3
COURSE OBJECTIVES:
 To understand Smart Objects and IoT Architectures
 To learn about various IOT-related protocols
 To build simple IoT Systems using Arduino and Raspberry Pi.
 To understand data analytics and cloud in the context of IoT
 To develop IoT infrastructure for popular applications

UNIT I FUNDAMENTALS OF IoT 9


Introduction to IoT – IoT definition – Characteristics – IoT Complete Architectural Stack – IoT
enabling Technologies – IoT Challenges. Sensors and Hardware for IoT – Hardware Platforms –
Arduino, Raspberry Pi, Node MCU. A Case study with any one of the boards and data acquisition
from sensors.

UNIT II PROTOCOLS FOR IoT 9


Infrastructure protocol (IPV4/V6/RPL), Identification (URIs), Transport (Wifi, Lifi, BLE), Discovery,
Data Protocols, Device Management Protocols. – A Case Study with MQTT/CoAP usage-IoT
privacy, security and vulnerability solutions.

UNIT III CASE STUDIES/INDUSTRIAL APPLICATIONS 9


Case studies with architectural analysis: IoT applications – Smart City – Smart Water – Smart
Agriculture – Smart Energy – Smart Healthcare – Smart Transportation – Smart Retail – Smart waste
management.

UNIT IV CLOUD COMPUTING INTRODUCTION 9


Introduction to Cloud Computing - Service Model – Deployment Model- Virtualization Concepts –
Cloud Platforms – Amazon AWS – Microsoft Azure – Google APIs.

UNIT V IoT AND CLOUD 9


IoT and the Cloud - Role of Cloud Computing in IoT - AWS Components - S3 – Lambda - AWS IoT
Core -Connecting a web application to AWS IoT using MQTT- AWS IoT Examples. Security
Concerns, Risk Issues, and Legal Aspects of Cloud Computing- Cloud Data Security
TOTAL:45 PERIODS
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO1: Understand the various concept of the IoT and their technologies..
CO2: Develop IoT application using different hardware platforms
103
CO3: Implement the various IoT Protocols
CO4: Understand the basic principles of cloud computing.
CO5: Develop and deploy the IoT application into cloud environment

REFERENCES
1. "The Internet of Things: Enabling Technologies, Platforms, and Use Cases", by Pethuru Raj
and Anupama C. Raman ,CRC Press, 2017
2. Adrian McEwen, Designing the Internet of Things, Wiley,2013.
3. EMC Education Services, “Data Science and Big Data Analytics: Discovering, Analyzing,
Visualizing and Presenting Data”, Wiley publishers, 2015.
4. Simon Walkowiak, “Big Data Analytics with R” PackT Publishers, 2016
5. Bart Baesens, “Analytics in a Big Data World: The Essential Guide to Data Science and its
Applications”, Wiley Publishers, 2015.

MX4073 MEDICAL ROBOTICS LT PC


3 0 03
COURSE OBJECTIVES:
 To explain the basic concepts of robots and types of robots
 To discuss the designing procedure of manipulators, actuators and grippers
 To impart knowledge on various types of sensors and power sources
 To explore various applications of Robots in Medicine
 To impart knowledge on wearable robots

UNIT I INTRODUCTION TO ROBOTICS 9


Introduction to Robotics, Overview of robot subsystems, Degrees of freedom, configurations and
concept of workspace, Dynamic Stabilization
Sensors and Actuators
Sensors and controllers, Internal and external sensors, position, velocity and acceleration sensors,
Proximity sensors, force sensors Pneumatic and hydraulic actuators, Stepper motor control circuits,
End effectors, Various types of Grippers, PD and PID feedback actuator models

UNIT II MANIPULATORS & BASIC KINEMATICS 9


Construction of Manipulators, Manipulator Dynamic and Force Control, Electronic and pneumatic
manipulator, Forward Kinematic Problems, Inverse Kinematic Problems, Solutions of Inverse
Kinematic problems
Navigation and Treatment Planning
Variable speed arrangements, Path determination – Machinery vision, Ranging – Laser – Acoustic,
Magnetic, fiber optic and Tactile sensor

UNIT III SURGICAL ROBOTS 9


Da Vinci Surgical System, Image guided robotic systems for focal ultrasound based surgical
applications, System concept for robotic Tele-surgical system for off-pump, CABG surgery, Urologic
applications, Cardiac surgery, Neuro-surgery, Pediatric and General Surgery, Gynecologic
Surgery, General Surgery and Nanorobotics. Case Study

104
UNIT IV REHABILITATION AND ASSISTIVE ROBOTS 9
Pediatric Rehabilitation, Robotic Therapy for the Upper Extremity and Walking, Clinical-Based Gait
Rehabilitation Robots, Motion Correlation and Tracking, Motion Prediction, Motion Replication.
Portable Robot for Tele rehabilitation, Robotic Exoskeletons – Design considerations, Hybrid
assistive limb. Case Study

UNIT V WEARABLE ROBOTS 9


Augmented Reality, Kinematics and Dynamics for Wearable Robots, Wearable Robot technology,
Sensors, Actuators, Portable Energy Storage, Human–robot cognitive interaction (cHRI), Human–
robot physical interaction (pHRI), Wearable Robotic Communication - case study

TOTAL:45 PERIODS
COURSE OUTCOMES:
CO1: Describe the configuration, applications of robots and the concept of grippers and actuators
CO2: Explain the functions of manipulators and basic kinematics
CO3: Describe the application of robots in various surgeries
CO4: Design and analyze the robotic systems for rehabilitation
CO5: Design the wearable robots

REFERENCES
1. Nagrath and Mittal, “Robotics and Control”, Tata McGraw Hill, First edition, 2003
2. Spong and Vidhyasagar, “Robot Dynamics and Control”, John Wiley and Sons, First edition,
2008
3. Fu.K.S, Gonzalez. R.C., Lee, C.S.G, “Robotics, control”, sensing, Vision and Intelligence,
Tata McGraw Hill International, First edition, 2008
4. Bruno Siciliano, Oussama Khatib, Springer Handbook of Robotics, 1st Edition, Springer,
2008
5. Shane (S.Q.) Xie, Advanced Robotics for Medical Rehabilitation - Current State of the Art
and Recent Advances, Springer, 2016
6. Sashi S Kommu, Rehabilitation Robotics, I-Tech Education and Publishing, 2007
7. Jose L. Pons, Wearable Robots: Biomechatronic Exoskeletons, John Wiley & Sons Ltd,
England, 2008
8. Howie Choset, Kevin Lynch, Seth Hutchinson, “Principles of Robot Motion: Theory,
Algorithms, and Implementations”, Prentice Hall of India, First edition, 2005
9. Philippe Coiffet, Michel Chirouze, “An Introduction to Robot Technology”, Tata McGraw Hill,
First Edition, 1983
10. Jacob Rosen, Blake Hannaford & Richard M Satava, “Surgical Robotics: System
Applications & Visions”, Springer 2011
11. Jocelyn Troccaz, Medical Robotics, Wiley, 2012
12. Achim Schweikard, Floris Ernst, Medical Robotics, Springer, 2015

VE4202 EMBEDDED AUTOMATION LTP C


3 00 3
COURSE OBJECTIVES:
 To learn about the process involved in the design and development of real-time embedded
system
 To develop the embedded C programming skills on 8-bit microcontroller
 To study about the interfacing mechanism of peripheral devices with 8-bit microcontrollers
105
 To learn about the tools, firmware related to microcontroller programming
 To build a home automation system

UNIT - I INTRODUCTION TO EMBEDDED C PROGRAMMING 9


C Overview and Program Structure - C Types, Operators and Expressions - C Control Flow - C
Functions and Program Structures - C Pointers And Arrays - FIFO and LIFO - C Structures -
Development Tools

UNIT - II AVR MICROCONTROLLER 9


ATMEGA 16 Architecture - Nonvolatile and Data Memories - Port System - Peripheral Features :
Time Base, Timing Subsystem, Pulse Width Modulation, USART, SPI, Two Wire Serial Interface,
ADC, Interrupts - Physical and Operating Parameters

UNIT – III HARDWARE AND SOFTWARE INTERFACING WITH 8-BIT SERIES


CONTROLLERS 9
Lights and Switches - Stack Operation - Implementing Combinational Logic - Expanding I/O -
Interfacing Analog To Digital Convertors - Interfacing Digital To Analog Convertors - LED Displays :
Seven Segment Displays, Dot Matrix Displays - LCD Displays - Driving Relays - Stepper Motor
Interface - Serial EEPROM - Real Time Clock - Accessing Constants Table - Arbitrary Waveform
Generation - Communication Links - System Development Tools

UNIT – IV VISION SYSTEM 9


Fundamentals of Image Processing - Filtering - Morphological Operations - Feature Detection and
Matching - Blurring and Sharpening - Segmentation - Thresholding - Contours - Advanced Contour
Properties - Gradient - Canny Edge Detector - Object Detection - Background Subtraction

UNIT – V HOME AUTOMATION 9


Home Automation - Requirements - Water Level Notifier - Electric Guard Dog - Tweeting Bird Feeder
- Package Delivery Detector - Web Enabled Light Switch - Curtain Automation - Android Door Lock
- Voice Controlled Home Automation - Smart Lighting - Smart Mailbox - Electricity Usage Monitor -
Proximity Garage Door Opener - Vision Based Authentic Entry System

TOTAL: 45 PERIODS
COURSE OUTCOMES:
On successful completion of this course, students will be able to
CO1: analyze the 8-bit series microcontroller architecture, features and pin details
CO2: write embedded C programs for embedded system application
CO3: design and develop real time systems using AVR microcontrollers
CO4: design and develop the systems based on vision mechanism
CO5: design and develop a real time home automation system

REFERENCES:
1. Dhananjay V. Gadre, "Programming and Customizing the AVR Microcontroller", McGraw-
Hill, 2001.
2. Joe Pardue, "C Programming for Microcontrollers ", Smiley Micros, 2005.
3. Steven F. Barrett, Daniel J. Pack, "ATMEL AVR Microcontroller Primer : Programming and
Interfacing", Morgan & Claypool Publishers, 2012
4. Mike Riley, "Programming Your Home - Automate With Arduino, Android and Your
Computer", the Pragmatic Programmers, Llc, 2012.
106
5. Richard Szeliski, "Computer Vision: Algorithms and Applications", Springer, 2011.
6. Kevin P. Murphy, "Machine Learning - a Probabilistic Perspective", the MIT Press
Cambridge, Massachusetts, London, 2012.

CX4016 ENVIRONMENTAL SUSTAINABILITY L T P C


3 0 0 3
UNIT I INTRODUCTION 9
Valuing the Environment: Concepts, Valuing the Environment: Methods, Property Rights,
Externalities, and Environmental Problems

UNIT II CONCEPT OF SUSTAINABILITY 9


Sustainable Development: Defining the Concept, the Population Problem, Natural Resource
Economics: An Overview, Energy, Water, Agriculture

UNIT III SIGNIFICANCE OF BIODIVERSITY 9


Biodiversity, Forest Habitat, Commercially Valuable Species, Stationary - Source Local Air Pollution,
Acid Rain and Atmospheric Modification, Transportation

UNIT IV POLLUTION IMPACTS 9


Water Pollution, Solid Waste and Recycling, Toxic Substances and Hazardous Wastes, Global
Warming.

UNIT V ENVIRONMENTAL ECONOMICS 9


Development, Poverty, and the Environment, Visions of the Future, Environmental economics and
policy by Tom Tietenberg, Environmental Economics
TOTAL : 45 PERIODS

REFERENCES
1. Andrew Hoffman, Competitive Environmental Strategy - A Guide for the Changing Business
Landscape, Island Press.
2. Stephen Doven, Environment and Sustainability Policy: Creation, Implementation,
Evaluation, the Federation Press, 2005
3. Robert Brinkmann., Introduction to Sustainability, Wiley-Blackwell., 2016
4. Niko Roorda., Fundamentals of Sustainable Development, 3rd Edn, Routledge, 2020
5. Bhavik R Bakshi., Sustainable Engineering: Principles and Practice, Cambridge University
Press, 2019

TX4092 TEXTILE REINFORCED COMPOSITES LTPC


3 003

UNIT I REINFORCEMENTS 9
Introduction – composites –classification and application; reinforcements- fibres and its properties;
preparation of reinforced materials and quality evaluation; preforms for various composites

UNIT II MATRICES 9
Preparation, chemistry, properties and applications of thermoplastic and thermoset resins;
mechanism of interaction of matrices and reinforcements; optimization of matrices
107
UNIT III COMPOSITE MANUFACTURING 9
Classification; methods of composites manufacturing for both thermoplastics and thermosets- Hand
layup, Filament Winding, Resin transfer moulding, prepregs and autoclave moulding,
pultrusion, vacuum impregnation methods, compression moulding; post processing of
composites and composite design requirements

UNIT IV TESTING 9
Fibre volume and weight fraction, specif ic gravity of composites, tensile, f lexural, impact,
compression, inter laminar shear stress and fatigue properties of thermoset and thermoplastic
composites.

UNIT V MECHANICS 9
Micro mechanics, macro mechanics of single layer, macro mechanics of laminate, classical
lamination theory, failure theories and prediction of inter laminar stresses using at ware
TOTAL: 45 PERIODS
REFERENCES
1. BorZ.Jang,“Advanced Polymer composites”,ASM International,USA,1994.
2. Carlsson L.A. and Pipes R.B., “Experimental Characterization of advanced
composite Materials”,SecondEdition,CRCPress,NewJersey,1996.
3. George LubinandStanley T.Peters, “Handbook of Composites”, Springer Publications,1998.
4. Mel. M. Schwartz, “Composite Materials”, Vol. 1 &2, Prentice Hall PTR, New Jersey,1997.
5. RichardM.Christensen,“Mechanics of compositematerials”,DoverPublications,2005.
6. Sanjay K. Mazumdar, “Composites Manufacturing: Materials, Product, and Process
Engineering”,CRCPress,2001

NT4002 NANOCOMPOSITE MATERIALS LT PC


3 0 03

UNIT I BASICS OF NANOCOMPOSITES 9


Nomenclature, Properties, features and processing of nanocomposites. Sample Preparation and
Characterization of Structure and Physical properties. Designing, stability and mechanical properties
and applications of super hard nanocomposites.

UNIT II METAL BASED NANOCOMPOSITES 9


Metal-metal nanocomposites, some simple preparation techniques and their properties. Metal-
Oxide or Metal-Ceramic composites, Different aspects of their preparation techniques and their
final properties and functionality. Fractal based glass-metal nanocomposites, its designing and
fractal dimension analysis. Core-Shell structured nanocomposites

UNIT III POLYMER BASED NANOCOMPOSITES 9


Preparation and characterization of diblock Copolymer based nanocomposites; Polymer Carbon
nanotubes based composites, their mechanical properties, and industrial possibilities.

UNIT IV NANOCOMPOSITE FROM BIOMATERIALS 9


Natural nanocomposite systems - spider silk, bones, shells; organic-inorganic nanocomposite
formation through self-assembly. Biomimetic synthesis of nanocomposites material; Use of synthetic
nanocomposites for bone, teeth replacement.

108
UNIT V NANOCOMPOSITE TECHNOLOGY 9
Nanocomposite membrane structures- Preparation and applications. Nanotechnology in Textiles
and Cosmetics-Nano-fillers embedded polypropylene fibers – Soil repellence, Lotus effect - Nano
finishing in textiles (UV resistant, anti-bacterial, hydrophilic, self-cleaning, flame retardant finishes),
Sun-screen dispersions for UV protection using titanium oxide – Colour cosmetics.
Nanotechnology in Food Technology - Nanopackaging for enhanced shelf life - Smart/Intelligent
packaging.
TOTAL : 45 PERIODS
REFERENCES:
1. Introduction to Nanocomposite Materials. Properties, Processing, Characterization- Thomas
E. Twardowski. 2007. DEStech Publications. USA.
2. Nanocomposites Science and Technology - P. M. Ajayan, L.S. Schadler, P. V.Braun 2006.
3. Physical Properties of Carbon Nanotubes- R. Saito 1998.
4. Carbon Nanotubes (Carbon , Vol 33) - M. Endo, S. Iijima, M.S. Dresselhaus 1997.
5. The search for novel, superhard materials- Stan Vepr¡ek (Review Article) JVST A, 1999
6. Nanometer versus micrometer-sized particles-Christian Brosseau, Jamal BeN Youssef,
Philippe Talbot, Anne-Marie Konn, (Review Article) J. Appl. Phys, Vol 93, 2003
7. Diblock Copolymer, - Aviram (Review Article), Nature, 2002
8. Bikramjit Basu, Kantesh Balani Advanced Structural Ceramics, A John Wiley & Sons, Inc.,
9. P. Brown and K. Stevens, Nanofibers and Nanotechnology in Textiles, Woodhead
publication, London, 2006

BY4016 IPR, BIOSAFETY AND ENTREPRENEURSHIP L T PC


3 00 3

UNIT I IPR 9
Intellectual property rights – Origin of the patent regime – Early patents act & Indian
pharmaceutical industry – Types of patents – Patent Requirements – Application preparation filing
and prosecution – Patentable subject matter – Industrial design, Protection of GMO’s IP as a factor
in R&D,IP’s of relevance to biotechnology and few case studies.

UNIT II AGREEMENTS, TREATIES AND PATENT FILING PROCEDURES 9


History of GATT Agreement – Madrid Agreement – Hague Agreement – WIPO Treaties –
Budapest Treaty – PCT – Ordinary – PCT – Conventional – Divisional and Patent of Addition –
Specifications – Provisional and complete – Forms and fees Invention in context of “prior art” –
Patent databases – Searching International Databases – Country-wise patent searches
(USPTO,espacenet(EPO) – PATENT Scope (WIPO) – IPO, etc National & PCT filing procedure
– Time frame and cost – Status of the patent applications filed – Precautions while patenting –
disclosure/non-disclosure – Financial assistance for patenting – Introduction to existing schemes
Patent licensing and agreement Patent infringement – Meaning, scope, litigation, case studies

UNIT III BIOSAFETY 9


Introduction – Historical Backround – Introduction to Biological Safety Cabinets – Primary
Containment for Biohazards – Biosafety Levels – Biosafety Levels of Specific Microorganisms –
Recommended Biosafety Levels for Infectious Agents and Infected Animals – Biosafety guidelines
– Government of India.

109
UNIT IV GENETICALLY MODIFIED ORGANISMS 9
Definition of GMOs & LMOs – Roles of Institutional Biosafety Committee – RCGM – GEAC etc.
for GMO applications in food and agriculture – Environmental release of GMOs – Risk Analysis –
Risk Assessment – Risk management and communication – Overview of National Regulations
and relevant International Agreements including Cartegana Protocol.

UNIT V ENTREPRENEURSHIP DEVELOPMENT 9


Introduction – Entrepreneurship Concept – Entrepreneurship as a career – Entrepreneurial
personality – Characteristics of successful Entrepreneur – Factors affecting entrepreneurial
growth – Entrepreneurial Motivation – Competencies – Mobility – Entrepreneurship Development
Programmes (EDP) - Launching Of Small Enterprise - Definition, Characteristics –
Relationship between small and large units – Opportunities for an Entrepreneurial career – Role
of small enterprise in economic development – Problems of small scale industries – Institutional
finance to entrepreneurs - Institutional support to entrepreneurs.
TOTAL : 45 PERIODS

REFERENCES
1. Bouchoux, D.E., “Intellectual Property: The Law of Trademarks, Copyrights, Patents, and
Trade Secrets for the Paralegal”, 3rd Edition, Delmar Cengage Learning, 2008.
2. Fleming, D.O. and Hunt, D.L., “Biological Safety: Principles and Practices”, 4th Edition,
American Society for Microbiology, 2006.
3. Irish, V., “Intellectual Property Rights for Engineers”, 2nd Edition, The Institution of
Engineering and Technology, 2005.
4. Mueller, M.J., “Patent Law”, 3rd Edition, Wolters Kluwer Law & Business, 2009.
5. Young, T., “Genetically Modified Organisms and Biosafety: A Background Paper for
Decision- Makers and Others to Assist in Consideration of GMO Issues” 1st Edition, World
Conservation Union, 2004.
6. S.S Khanka, “Entrepreneurial Development”, S.Chand & Company LTD, New Delhi, 2007.

110

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy