BTech IT 2024 DetailedSyllabus NEW NEP
BTech IT 2024 DetailedSyllabus NEW NEP
OF
INFORMATION TECHNOLOGY, SMIT, MAJITAR
APPLICABLE FOR
Total Credits:
1st Year
FIRST YEAR B. TECH CURRICULUM 2024 (Common to all branches)
GROUP A (FIRST SEMESTER) GROUP B (FIRST SEMESTER
PHYSICS GROUP CHEMISTRY GROUP
Semester
15 5 4 21 15 4 6 21
Total Contact Hours (L + T + P) 24 Total Contact Hours (L + T + P) 25
FOURTH SEMESTER
Year Course Course Title Total Number of Contact Hours Credits
Code Lecture Tutorial Practical Total
(L) (T) (P) Hours
MA206A1 Probability, Statistics, and 3 1 0 4 4
Stochastic Processes
IT221A1 JAVA Programming 3 1 0 4 4
SIXTH SEMESTER
Year Course Course Title Total Number of Contact Hours Credit
Code Lectu Tutori Practica Total s
re al l (P) Hour
(L) (T) s
BA346A1 Industrial Management 2 0 0 2 2
IT321A1 Operating System 3 1 0 4 4
IT322A1 Web Technology and Web 3 1 0 4 4
Services
IT3**A3 Program Elective-IV 3 1 0 4 4
IT3**A3 Program Elective-V 3 1 0 4 4
3rd IT3**A2/ Open Elective-IV /Minor 3 1 0 4 4
IT3**A8
IT323A4 Operating System Laboratory 0 0 2 2 1
IT324A4 Web Technology and Web 0 0 2 2 1
Services Laboratory
GN302A1 Quantitative Aptitude and 1 0 0 1 1
Logical Reasoning -II
IT325A5 Mini Project 0 0 2 1 1
TOTAL 16 5 08 31 26
SEVENTH SEMESTER
Year Course Course Title Total Number of Contact Hours Credit
Code Lectu Tutori Practic Total s
re al al Hour
(L) (T) (P) s
IT4**A2/ Open Elective-V/Minor 3 1 0 4 4
IT4**A8
4th IT4**A2 Choice-Based Elective 3 0 0 3 3
IT411A6 Major Project -Phase-I 0 0 20 20 10
PROGRAM ELECTIVE-V
IT329A3 Deep Learning 4
IT330A3 Pattern Recognition 4
IT331A3 Web Content Management and Web 3.0 4
IT332A3 Soft Computing 4
IT333A3 Cyber Physical Systems 4
IT334A3 Social Network Analysis 4
IT335A3 Remote Sensing And Geographic Information System 4
IT336A3 Wireless Sensor Networks 4
IT339A3 Augmented Reality 4
Course Objectives: The main aim of the course is to teach basic computer programming concepts and
apply them to computer based problem solving methods, to teach the students problem solving using C
and to introduce them to different data structures like stacks, lists, etc.
Course Outcomes (CO): On successful completion of this course, students should be able to:
1. Describe the working of hardware and software components necessary for functioning of a computer.
2. Describe the fundamentals of programming syntax and its definition by example of C language.
3. Explain the concepts of branching, loop construct, functions, pointers and structures of C language.
4. Write moderately difficult program for a specific goal.
5. Infer the syntax errors prompted by the C compiler and visualize the output of given code.
Text Books:
1. Programming in ANSI C by E. Balaguruswamy
Reference Books:
1. Mastering in C by K. Venugopal.
2. Fundamentals of C by Gottfried.
3. The C Programming by Kerningham and Ritchie.
4. Let Us C by Y. Kanetkar.
Subject Code: CS101A4 Credit: 1 (L-0, T-0, P-2)
Course Objectives: In Computational practice lab, each student is required to develop programs
based upon each UNIT of Theory paper-Computer Programming using C
• To teach basic computer programming concepts and apply them to computer based problem solving methods.
• To teach the student problem solving using C.
• To introduce the students to the field of programming using C language.
• To introduce the student to data structures such as arrays, lists, stacks etc.
Course Outcomes: After the completion of the complete syllabus, the student will be capable of the followings:
LIST OF EXPERIMENTS
Text Books:
1. Programming in ANSI C by E. Balaguruswamy
Reference Books:
1. Mastering in C by K. Venugopal.
2. Fundamentals of C by Gottfried.
3. The C Programming by Kerningham and Ritchie.
4. Let Us C by Y. Kanetkar.
Sub Code: MA205A1 Credit: 4 (L-3, T-1, P-0)
DISCRETE MATHEMATICS
Text Books:
1. Jean-Paul Tremblay and Manohar, R: Discrete Mathematical Structures with application to
Computer Science, McGraw Hill.
2. C.L. Liu: Elements of discrete mathematics, McGraw Hill.
3. Narasingh Deo: Graph theory with applications to Computer Science, PHI.
Reference Books:
1. B. Kolman, R.C. Busby & S. Ross.: Discrete Mathematical Structures, Pearson.
2. Principles of Artificial Intelligence; N. J. Nielson.
3. E. S. Page & L.B. Wilson: An introduction to Computational Combinatorics,
Cambridge University.
Sub Code: IT211A1 Credit: 4 (L-3, T-1, P-0)
Course Objectives: To provide basic knowledge in digital electronics and internal architecture of a computer.
Pre-requisites: Knowledge of Number system and logic gates
Course Outcomes (CO): On successful completion of the course, students should be ble to:
1. Identify various combinational logic circuits and their applications.
2. Identify various sequential logic circuits and their applications.
3. Design basic digital circuits using HDL.
4. Analyze the competence of a computer system architecture.
5. Design alternative computer systems for improved performance.
**not more than 20% of total topics to be allotted for assignment.
Module Topics Hrs CO PO PSO
Reference Books:
1. Joseph D. Dumas II,(2016), “Computer Architecture: Fundamentals and Principles of
Computer Design”, (2nd ed), CRC Publication.
2. C. H. Roth, (1998), “Digital System Design using VHDL”, (4th ed), PWS publication.
Sub Code: IT212A1 Credit:4 (L-3, T-1, P-0)
DATA STRUCTURES
Questions to be set: 05 (All Compulsory)
Course Objectives: This course emphasizes on the organization of information, the implementation of
linear data structures such as linked lists, stacks, queues, and non-linear data structures such as trees, and
graphs. This course also explores recursion principles, the close relationship between data structures and
algorithms and the analysis of algorithm complexity.
Pre-requisites: Programming concepts and ‘C’ language.
Course Outcomes (CO): On successful completion of this course, students should be able to:
1. Describe the working of data structures like array, stack, queue, linked list, tree and graph
2. Explain common applications for array, stack, queue, linked list, tree and graph
3. Solve a given problem using appropriate data structures and algorithm
4. Discuss about the working of the principal algorithms for sorting, searching, and hashing
5. Correlate the performance of a program with respect to the choice of data structure & algorithm
** not more than 20% of total topics to be allotted for assignment
Module Mode Topics Hrs CO PO PSO
Module 5: in class Sorting: Insertion, 2-way merge, Heap sort and 7 4,5
<Sorting and quick sort, Comparison of different sorts. Hashing
searching > technique: Hash tables, Different hashing functions,
Overflow handling, Methods for collision handling,
Theoretical evaluation.
**Assignment Radix sort. Searching: Linear, Binary search,
Topics Comparison of different methods. H
Text Books:
Textbooks:
1. Herbert Schildt, “The Complete Reference C++”, Tata McGraw Hill.
2. E. Balagurusamy, “Object Oriented Programming with C++”, Tata McGraw Hill.
Reference Books:
1. Bjarne Stroustrup, “C++ Programming Language”, Pearson.
2. Stanley B Lippman and Lajoie, “C++ Primer”, Pearson.
3. Saurav Sahay, “OOP with C++”, Oxford University Press.
4. B.L. Juneja and Anita Sethi, “Programming with C++”, New Age International Publication
Sub Code: IT214A4 Credit: 1 (L-0, T-0, P-2)
DATA STRUCTURES LABORATORY
Course Objectives: The objective of this course is to get insight into the practical applications of various
algorithms.
Pre-requisites: Theory paper CS 1302 Data Structures and associated prerequisites
Course Outcomes (CO): On successful completion of this course, students should be able to:
1. Write program related to application of data structures using programming constructs of a language
like C programming language
2. Identify the suitable input and output for a specified problem statement
3. Conclude the working of various algorithms in terms of time and space complexity
4. Examine the errors encountered in the program using appropriate tools and fix them
5. Write well-indented and well-documented code
Module 4: in class 7.1 Create two classes DM and DB which stores the value 4
Friend in distances. DM stores distance in meters and
function centimeters and DB in feet and inches. Write a program
Implementi that can read values for the class objects and add one
ng linked object of DM with another object of DB. Use a friend
list in C++ function to carry out the addition operation. The object
Operator that stores the results may be a DM object or DB object,
overloadin depending on the units in which the results are required.
g The display should be in the format of feet and inches or
meters and centimeters depending on the object on
display. Use the concept of friend function.
7.2 Write an OOP in C++ to create a Class Twovalues
with two integer type data members and member function
to read values in those data members. Create another
Class Min_Max and declare it as friend of Class
Twovalues. Min_Max should have member functions
to find the minimum and maximum of two values.
Course Outcomes (CO): After completing the course, the students will be able to
CO1: demonstrate basic principles of probability and understand a random variable that describe
randomness or an uncertainty in certain realistic situation.
CO2: comprehend concepts of discrete, continuous probability distributions and able to solve problems of
probability using various distributions.
CO3: analyse the statistical data for inference and apply various tests for testing the Hypothesis,
CO4: understand the various classifications of Random Processes that arise frequently and model them.
CO5: apply different Queuing models that appear in Computer Science
Module I: Probability Theory, Random Variables, and distribution: Introduction, Classical definition of
probability, Axiomatic definition of probability, Conditional probability, Baye’s theorem. Random
variables, Mean, Variance, Chebyshev’s inequality, Central limit theorem. [10 HR]
Module II: Conditional Probability and known distribution: Correlation coefficient, conditional
distributions, conditional expectations, and regression curves, Standard probability distributions
(Binomial, Poisson, Uniform, Normal, exponential, chi-square.), Reliability and MTTF. [10 HR]
Module III: Introduction to Statistics: Random sample, Sampling distribution, Statistic, Least square
curve fitting Parameter estimation: Unbiased estimate, Consistent estimate, Maximum likelihood
estimate, interval estimate. Testing of Hypothesis for mean with known variance for normal population.
[6 HR]
Module IV: Stochastic Processes: Introduction to Stochastic Process, Poisson Process, Discrete
parameter Markov Chains,. [8 HR]
Module V: Queuing Models: Concept of a queues: Basic idea of continuous parameter Markov chain,
Birth and death processes, 𝑀⁄𝑀⁄1⁄∞ , 𝑀⁄𝑀⁄1⁄𝑁,queuing systems. [6 HR]
Textbook:
K.S Trivedi, Probability & Statistics with Reliability, Queuing and Computer Science Applications, 2008,
Wiley.
P.L. Meyer : Introductory Probability theory and statistical Applications, Second Ed. Oxford & IBM
Publishers.
Miller & Freund: Probability & Statistics for Engineers, Eight Ed. Pearson Ltd.
Reference Books:
1. Introduction to Probability Theory and its Applications, William Feller, 2008, Wiley.
2. Introduction to Probability with Statistical Applications, Geza Schay, 2007, Birkhaus.
Sub Code: IT221A1 Credit:4 (L-3, T-1, P-0)
JAVA PROGRAMMING
Questions to be set: 05 (All Compulsory)
Course Objectives: The Java Programming Language course provides students with a solid foundation for
programming with JAVA. It also highlights the creation of graphical user interfaces (GUIs), exceptions, file
input/output (I/O), and threads; and network programming.
Pre-requisites: Object Oriented Programming.
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Demonstrate an ability describe and recall the various object-oriented concept
2. Formulate and interpret an object-oriented model and design solution using object oriented concepts.
3. Illustrate a diverse set of design solutions using techniques of Interface, Packages, File Handling,
Multi-threading, etc.
4. Select and design methodology using bottom up approach and solve open ended problems using Java.
5. Define and create modern engineering tools, techniques and resources to build software using
Java programming language.
** not more than 20% of total topics to be allotted for assignment
Module Topics to be Topics Hrs CO PO PSO
covered
Module 1: In Evolution and features of java, Overview of java, 8 1,2
< Introduction Class Data types, Variables and arrays, Type conversion
to Java & and casting, Type promotion in expression, arrays.
Classes> Class fundamentals, Declaring objects, Assigning
object reference Variables, Introducing methods,
Constructors, ‘this’ keyword, The finalize() method.
**Assignment Two control statements, Lexical issues, Literals,
Topics Variables, Operators, Bitwise operators, Relational
operators, Boolean and logical operators, Assignment
Operators, The ‘?’ operator, Operator precedence,
JAVA statements. Garbage collection and stack class.
Module 2: In Overloading methods and constructors, using object 8 2,3
<Methods and Class as parameters, Argument passing, Returning objects,
classes & Access control, Static methods, Nested and inner
Strings classes, Command line argument.
handling> String constructors, String length, Special string
operators, Character extraction, String comparison,
String searching, String modification, Changing case
of characters within a string, Compression and String
buffer, String builder.
**Assignment Recursion
Topics
Module 4: in class Java I/O classes and interfaces, The stream classes, 8 4,5
<Input/Output Byte streams, The character streams, The console
and file class, File class, Byte-stream class, Random access
handling & files.
Multithreaded Thread basics, Java’s thread model, Thread priorities,
programming> Messaging, Thread class and runnable interface. The
main thread, Creating a thread, Creating multiple
threads, Interthread communication,
Suspending/resuming and stopping threads.
**Assignment Synchronization.
Topics
Text Books:
1. Programming With JAVA, 2nd Edition, E. Balaguruswami and TMH Publication.
2. Java: The Complete Reference, 7th Edition, Herbert Scheldt, TMH Publication
Reference Books:
1. The Java Programming Language: K.Arnold and J. Gosling.
2. Professional java Server Programming: Allamaraju.
3. JAVA2: The Complete Reference, 3rd Edition, Patrick Naughton
and HarbertSchildt, TMHPublication.
4. Internet & Java Program: R.Krishnamoorthy& S. Prabhu, New Age
Internet Publisher
Sub Code: IT222A1 Credit:4 (L-3,T-1, P-0)
DATABASE MANAGEMENT SYSTEMS
Questions to be set: 05 (All Compulsory)
Course Objectives: This course provides the basic information about relational Database
Management System and their development. The major objectives of the course is to
provide an introduction of DBMS and their use, be familiar with the basic DBMS
architecture, components, and interfaces, have experience using at least one modern
Database Management System, understand and use database models in database and
application design
Pre-requisites: Programming Concepts
Course Outcomes (CO): On successful completion of this course, students should be able to:
Text Books:
1. Elmasri and Navathe: “Fundamentals of Database Systems”, Addison Wesley.
2. Silberschatz, Korth, Sudarshan, “Database System Concepts”, McGraw-Hill
Reference Books:
1. Thomas Connolly, Carolyn Begg, “Database Systems – A Practical Approach to
Design, Implementationand Management”, Pearson Education.
2. Jefrey D. Ullman, Jenifer Widom, “A First Course in Database Systems”, Pearson Education.
3. Bipin C Desai, “An Introduction to Database Systems”, Galgotia.
4. Atul Kahate, “Introduction to Database Management Systems”, Pearson.
5. Ian Robinson, Jim Webber, Emil Eifrem,”Graph Databases”,O'Reilly Media.
6. Gaurav Vaish, ”Getting started with NoSQL”, Packt.
Sub Code: GN201A1 CREDIT 3: [L-3, T-0, P-0]
Course Objectives:
This introductory course input is intended:
1. To help the students appreciate the essential complementarily between 'VALUES' and
'SKILLS' to ensure sustained happiness and prosperity which are the core aspirations of all
human beings.
2. To facilitate the development of a Holistic perspective among students towards life and
profession as well as towards happiness and prosperity based on a correct understanding of the
Human reality and the rest of existence. Such a holistic perspective forms the basis of
Universal Human Values and movement towards value-based living in a natural way.
3. To highlight plausible implications of such a Holistic understanding in terms of ethical human
conduct, trustful and mutually fulfilling human behaviour and mutually enriching interaction
with Nature.
Thus, this course is intended to provide a much needed orientational input in value education to
the young enquiring minds.
Pre-requisites: None. However, it is desired that students may have gone through UHV-I: Universal
Human Values-Introduction
Text Book
A Foundation Course in Human Values and Professional Ethics, R R Gaur, R Asthana, G P
Bagaria, 2nd Revised Edition, Excel Books, New Delhi, 2019. ISBN 978-93-87034- 47-1
Reference Books
1. Jeevan Vidya: EkParichaya, A Nagaraj, Jeevan Vidya Prakashan, Amarkantak, 1999.
2. Human Values, A.N. Tripathi, New Age Intl. Publishers, New Delhi, 2004.
3. The Story of Stuff (Book).
4. The Story of My Experiments with Truth - by Mohandas Karamchand Gandhi
5. Small is Beautiful - E. F Schumacher.
6. Slow is Beautiful - Cecile Andrews
7. Economy of Permanence - J C Kumarappa
8. Bharat Mein Angreji Raj – Pandit Sunderlal
9. Rediscovering India - by Dharampal
10. Hind Swaraj or Indian Home Rule - by Mohandas K. Gandhi
11. India Wins Freedom - Maulana Abdul Kalam Azad
12. Vivekananda - Romain Rolland (English)
13. Gandhi - Romain Rolland (English)
Sub Code: IT223A4 Credit: 1 (0L+0T+2P)
Objectives: To impart the programming knowledge and skill of Java. The major objective of this
course is to make the students aware of various features of Java programming language through
practical experiments.
Course Outcomes (CO): On successful completion of this course, students will be able to
1. Create Java programs using the basic concepts of class, datatypes, variables, and arrays, operators etc.
2. Use the concepts of control statements, methods, inheritance etc. in Java programs.
3. Build packages and interfaces and develop multi-threaded Java models for synchronizing as well
as Inter thread communications & work with enumeration and metadata annotations.
4. Develop I/O applets.
5. Understand and apply Java networking and GUI concepts to develop client-server applications
and interactive interfaces.
Text Books:
1. Elmasri and Navathe: “Fundamentals of Database Systems”, Addison Wesley.
2. Silberschatz, Korth, Sudarshan, “Database System Concepts”, McGraw-Hill
Reference Books:
1. Thomas Connolly, Carolyn Begg, “Database Systems – A Practical Approach to
Design, Implementationand Management”, Pearson Education.
2. Jefrey D. Ullman, Jenifer Widom, “A First Course in Database Systems”, Pearson
Education.
3. Bipin C Desai, “An Introduction to Database Systems”, Galgotia.
4. Atul Kahate, “Introduction to Database Management Systems”, Pearson.
5. Ian Robinson, Jim Webber, Emil Eifrem,”Graph Databases”,O'Reilly Media.
6. Gaurav Vaish, ”Getting started with NoSQL”, Packt.
Sub Code: IT311A1 Credit: 4(L-3, T-1, P-0)
ARTIFICIAL INTELLIGENCE
Questions to be set: 05 (All Compulsory)
Course Objectives: The aim of this course is to provide an introduction to some fundamental issues
and algorithms in artificial intelligence (AI). The course approaches AI from an algorithmic, computer
science- centric perspective. The course aims to provide some fundamental tools and algorithms
required to produce AI systems able to exhibit limited human-like abilities, particularly in the form of
problem solving by search, representing and reasoning with knowledge, planning, natural language
understanding, computer vision, automatic programming and machine learning.
Pre-requisites: Algorithms will be an essential component, in addition the course requires some mathematics
specially Calculus, Probability and statistics. Natural Sciences Mathematics or equivalent, and Discrete
Mathematics, are likely to be helpful although not essential. Mathematical Methods for Computer Science,
Probability, Logic and Proof, Prolog and Complexity Theory are likely to be useful.
Course Outcomes (CO): On successful completion of this course, the student should be able to:
1. Distinguish between the popular view of the field and the actual research results.
2. Appreciate the fact that the computational complexity of most AI problems requires us
regularly to deal with approximate techniques.
3. Describe different perspectives on what the problems of artificial intelligence are and how
different approaches are justified.
4. Design basic problem solving methods based on AI-based search, knowledge
representation, reasoning, planning, and machine learning algorithms.
5. Identify problems requiring AI based solutions.
Text Books:
1. Russell, S. & Norvig, P. (2010). Artificial intelligence: a modern approach. Prentice Hall (3rd ed.).
2. Elaine Rich, Kevin Knight & Shivashankar B. Nair (2008). Artificial Intelligence (Third Edition) TMH.
3. Bishop, C. M. (2006) Machine Learning and Pattern Recognition. Berlin: Springer.
Reference Book:
1. Poole, D. L. & Mackworth, A. K. (2010). Artificial intelligence: foundations of computational
agents. Cambridge University Press.
2. Nilsson, N. J. (1998) Artificial Intelligence - A Modern Synthesis. Palo Alto: Morgan Kaufmann
Sub Code: IT312A1 Credit:4(L-3, T-1, P-0)
FORMAL LANGUAGES AND AUTOMATA THEORY
Questions to be set: 05 (All Compulsory)
Course Objectives: This course builds upon preliminary knowledge delivered in discrete structure for computer
science and computer programming concepts. The main objectives of the course are to provide learners with a
detailed understanding of the mathematical models of the machines and their evolution through requirement
generation and advancement in languages. Thorough the concepts and operations in Formal Language and
Automata Theory, their use in Compiler Design and their application in Natural Language Processing.
Pre-requisites: Knowledge in discrete mathematics and in programming.
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Explain different concepts in automata theory and formal languages.
2. Produce various grammars and their acceptors.
3. Analyze the various language acceptors.
4. Acquire a fundamental understanding of computational models related to decidability and
recursive enumerability.
5. Illustrate various proofs using mathematical principles
Text Books:
1. John. E. Hopcroft, Rajeev Motwani, Jeffry.Ullman, Introduction to Automata Theory, Languages
and Computation, Pearson Education.
2. Peter Linz, An Introduction to Formal Languages and Automata, Narosa
Reference Books:
1. James. L. Hein, Discrete Structures, Logic and Computability, Narosa
2. Partha Niyogi, The Computational Nature of Language Learning and Evolution, PHI.
3. C.K. Nagpal, Formal Languages and Automata Theory, Oxford University Press, 2011.
4. John Martin , Introduction to Languages and the Theory of Computation, Tata McGraw Hill.
Sub Code: IT313A1 Credit:4 (L-3, T-1, P-0)
COMPUTER NETWORKS
Questions to be set: 05 (All Compulsory)
Course Objectives: This course emphasizes on several computer network concepts, applications
and protocols in OSI as well as TCP/IP layered architecture. It also covers the various protocols of
various layers, their operations and applications. Further it discusses the concept of network
security, challenges and their counter measures.
Pre-requisites: Communication Techniques.
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Understand and identify the engineering fundamentals concerning Data Communication and
Computer Network.
2. Identify the complex engineering problem involved in Data communication and its architecture
for a successful network based communication.
3. Ability to Practice and formulate a solution for an engineering problem concerning any layers in
Data Communication model
4. Demonstrate an ability to formulate and interpret a model based on the fundamentals of
Computer Networks
5. Compare and understand the IOS reference model and TCP-IP reference model for data
communication
**Assignment
Topics
**Assignment
Topics
Text Books:
1. Behrouz A. Forouzan, “Data Communications and Networking”, Tata McGraw Hill.
2. William Stallings, “Data and Computer Communications”, PHI.
Reference Books:
1. Andrew S. Tanenbaum, “Computer Networks”, PHI.
2. A S Godbole, “Data Communication and Networking”, Tata McGraw Hill.
3. William C Y Lee, “Mobile Communication Engineering”, Tata McGraw Hill.
4. Larry L. Peterson, Bruce S. Davie, “Computer Networks: A Systems Approach”, Wiley
Sub Code: IT314A1 Credit:4 (L-3, T-1, P-0)
SOFTWARE ENGINEERING
Questions to be set: 05 (All Compulsory)
Course Objectives: This course presents a comprehensive study of software quality assurance, including
software quality control management, processes, systems, methods, standards, certification, and reliability
measurement.
Pre-requisites: Procedure oriented and object-oriented programming paradigm.
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Demonstrate competence in using engineering fundamentals to visualize solutions using
knowledge of software engineering skills.
2. Extend an ability to formulate a solution plan and methodology for an engineering problem using
software engineering.
3. Apply an ability to formulate and interpret a model for project management.
4. Explain an ability to define complex problem, find and analyze requirements
5. Apply new software models, techniques and technologies to bring out innovative and novelistic
solutions for the growth of the society in all aspects and evolving into their continuous professional
development.
** not more than 20% of total topics to be allotted for assignment
Module Mode Topics Hrs CO PO PSO
** Assignment Topics: Exercises to be formulated by the course instructor to cover a range of AI and ML
topics and provide students with practical experience in implementing algorithms and models using Python.
Text Books:
1. Russell, S. & Norvig, P. (2010). Artificial intelligence: a modern approach. Prentice Hall (3rd ed.).
2. Elaine Rich, Kevin Knight & Shivashankar B. Nair (2008). Artificial Intelligence (Third Edition)
TMH.
3. Bishop, C. M. (2006) Machine Learning and Pattern Recognition. Berlin: Springer.
Reference Book:
1. Poole, D. L. & Mackworth, A. K. (2010). Artificial intelligence: foundations of computational
agents. Cambridge University Press.
2. Nilsson, N. J. (1998) Artificial Intelligence - A Modern Synthesis. Palo Alto: Morgan Kaufman.
Sub-Code: IT316A4 Credit:1 (L-0, T-0, P-2)
COMPUTER NETWORKS LABORATORY
Course Objectives: At least 10 experiments covering the entire syllabus of the corresponding theory paper to
be carried out using the theory studied /programming skill of the subject concerned to get insight into
thepractical applications of the theoretical studies. The outcome of the lab classes must lead to a skilled and
self-sustained program developer.
Pre-requisites: Communication Technique and Data Communication
Course Outcomes (CO): On successful completion of this course, the student should be able to:
1. Identify and understand various functions used in socket programs
2. Develop and test of socket program for client server interaction for various purpose.
3. Implementing and Validate Sub network with static and various dynamic routing protocols.
4. Analyze the packet structure of various protocols used for communication
5. Understand the fundamentals of SDN
** not more than 20% of total topics to be allotted for assignment
Module Topics to be Topics Hrs CO PO PSO
covered
Module 1: in Introduction to client-server architecture, 4 1,2
TCP Socket class Introduction to working of TCP, functions
Programs related to TCP Socket Programming.
**Assignment Program to write a simple Message passing 3 1,2
Topics TCP socket program, TCP Socket program with
specific aim, TCP socket program involving
multiple clients.
Module 2: in Introduction to client-server architecture, 4 1,2
UDP Socket class Introduction to working of UDP, functions
Programs related to UDP Socket Programming.
**Assignment Program to write a simple Message passing 3 1,2
Topics UDP socket program, UDP Socket program
with specific aim.
Module 3: In Introduction to classless IP, Introduction to 3 3
Creating/Designing Class CIDR and VLSM, Introduction to Network
Sub-network with Devices and Sub-netting, Basic Router
Static routing configuration followed by Static route
configuration
**Assignment To configure the sub-network with given 3 3
Topics requirements and configure the static route in
the topology for routing.
Module 4: in class Revision to CIDR and VLSM, revision to Basic 3 3
Creating/Designing Router configuration followed by Dynamic
Sub-network with route configuration
Dynamic routing **Assignment To configure the sub-network with given 3 3
Topics requirements and configure the Dynamic route
in the topology for routing.
Module 5: in class Introduction to Software Defined Network, 3 4,5
Introduction to Introduction to Installation of Mininet,
SDN and traffic Overview of Mininet environment,
Monitoring Introduction to tools like ipref and wire shark.
**Assignment To establish and configure the simple SDN 3 4,5
Topics network topology and use tools like ipref and
wire shark for necessary analysis.
Text Books:
1. Behrouz A. Forouzan, “Data Communications and Networking”, Tata McGraw-Hill
2. Andrew S. Tanenbaum, “Computer Networks”, PHI.
Reference Books:
1. William Stallings, “Data and Computer Communications”, PHI.
2. Alberto Leon-Garcia, Indra Widjaja, “Communication Networks – Fundamental Concepts and
Key Architectures”, Tata McGraw-Hill
Sub-Code:GN301A1 Credit: 1 (L-1, T-0, P-0)
Course Objective: The main aim of introducing “Quantitative Aptitude & Logical Reasoning” to university
students is to develop numerical skills among students and to prepare them for various examinations to enhance
better job prospects. This initiative is being taken to include essential mathematical principles to build students'
confidence. It is expected to expand students' knowledge and foster their logical reasoning and analytical thinking
abilities.
Pre-requisites: NIL
Course Outcomes (CO): On successful completion of this course, the student should be able to:
Text books:
1. Aggarwal, R. S. (2008). Quantitative Aptitude. S. Chand., ISBN: 9788121924986, 8121924987
2. Devi, S. (2005). Puzzles to puzzle you. Orient Paperbacks., ISBN: 8122200141, 9788122200140
Sub-Code: IT318A9 Credit:1 (L-0, T-0, P-2)
INDUSTRIAL TRAINING-I
Course Objectives: The students are required either to undergo after 4th semester in the summer
break/Vacation Straining in industries or to attend summer training course on courses beyond the scope of
normal curriculum organized by the Department by calling experts from outside or to visit in industry for
gaining valuable knowledge
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Select and provide comprehensive learning platform to students where they can enhance
their employ ability skills and become job ready along with real corporate exposure.
2. Adapt and enhance knowledge in one particular technology
3. Express and demonstrate self-confidence and helps in finding their own proficiency.
4. Develop leadership ability and responsibility to perform or execute the given task
5. Illustrate and practice within a real job situation.
Sub Code: BA346A1 Credit: 2 (L-2, T-0, P-0)
INDUSTRIAL MANAGEMENT
Course Objective: To provide basic knowledge of functions of management along with their practical implications
Pre-requisites: No pre-requisites
Course Outcomes (CO): On successful completion of this course, the student should be able to:
Text Books:
Text Books:
1. Abraham Silberschatz, Peter Baer Galvin, Greg Gagne, “Operating System Concepts”,
Wiley & Sons.Inc..
2. D M Dhamdhere, “Systems Programming & Operating Systems”, Tata McGraw-Hill.
Reference Books:
1. Andrew S. Tanenbaum, “Modern Operating systems”, PHI.
2. Mukesh Singhal, Niranjan G.Shivaratri, “Advanced Concepts in Operating Systems”, Tata McGraw-
Hill.
3. P. Balakrishna Prasad, “Operating Systems”, Scitech Publication.
4. William Stallings, “Operating Systems-Internals and Design Principles”, Pearson Education
Sub Code: IT322A1 Credit: 4 (L-3, T-1, P-0)
WEB TECHNOLOGY AND WEB SERVICES
Questions to be set: 05 (All Compulsory)
Course Objectives:
1. To equip learners with adequate skills to conceptualize, design and develop well-engineered websystems.
2. To enable learners to apply free and open source web technologies for developing powerful and
scalable web applications.
Module 4: in class LAMP Technology, PHP: Origins and uses of PHP, 3,5
<Server Side Overview of PHP, General syntactic characteristic,
Programming Primitives, operations and expressions, Control
& Database statements, Looping, Arrays, Functions, Form
Access handling, Files.
through the Relational Databases, An introduction to SQL, The
Web > MySQL Database system, Database access with PHP
and MySQL.
**Assignment Cookies, Session tracking. Architectures for Database
Topics access
Text Books:
1. M. Deitel, P.J. Deitel, A. B. Goldberg, “Internet & World Wide Web How to program”, 3rd
Edition, Pearson Education, 4 th edition, PHI, 2011.
2. Robert W. Sebesta, “Programming the World Wide Web”, 4th Edition, Pearson Education.
Reference Books:
1. Chris Bates, “Web Programming Building Internet Applications”, 3rd Edition, Wiley India.
Joyce Farrell, XueBai, Michael Ekedahl, “The Web Warrior Guide to Web Programming”, Thomson
Sub Code: IT323A4 Credit:1(L-0, T-0, P-2)
OPERATING SYSTEMS LABORATORY
Questions to be set: 05 (All Compulsory)
Course Objectives: At least 10 experiments covering the entire syllabus of the corresponding theory
paper to be carried out using the theory studied /programming skill of the subject concerned to get
insight into the practical applications of the theoretical studies. The outcome of the lab classes must
lead to a skilled and self-sustained program developer.
Pre-requisites: Corresponding theory paper Operating Systems and the associated prerequisites
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Analyze and debug various technical issues related to operating systems services and use
different types of Modern OS
2. Illustrate the concept of process and thread creation for executing user's task.
3. Apply the theory for implementing various process scheduling algorithms.
4. Produce optimal solution for data inconsistency problem by synchronizing processes and
threads and deadlock handling.
5. Examine the various memory management strategies for efficient resource utilization
and implement it.
** not more than 20% of total topics to be allotted for assignment
Module Topics to be Topics Hrs CO PO PSO
covered
Module 1: in Introduction to Process Creation, Termination, 1.5 1
Implementation class and use of various system call.
Shell command
of System Call Unix Process Implementation of different Linux tools and the 7.5 1
Control Shell proc file system.
Programming
Implementation Write a shell program to calculate the factorial
of System Calls of a given number.
Interprocess
Communication Implement the fork() system call that generates
using PIPE. the factorial and gives a sequence of series like
Interprocess 1, 2, 6, 24, 120… in the child process. The
Communication number of the sequence is provided in the
using SIGNALS command line.
Text Books:
1. Abraham Silberschatz, Peter Baer Galvin, Greg Gagne, “Operating System Concepts”, Wiley &
Sons.Inc..
2. D M Dhamdhere, “Systems Programming & Operating Systems”, Tata McGraw-Hill.
Reference Books:
3. Andrew S. Tanenbaum, “Modern Operating systems”, PHI.
4. Mukesh Singhal, Niranjan G.Shivaratri, “Advanced Concepts in Operating Systems”, Tata McGraw-
Hill.
5. P. Balakrishna Prasad, “Operating Systems”, Scitech Publication.
6. William Stallings, “Operating Systems-Internals and Design Principles”, Pearson Education
Sub Code: IT324A4 Credit: 1 (L-0, T-0, P-2)
Objectives: The objective of this laboratory is to develop an ability to design and implement static and dynamic
website and also further develop web application.
Course Outcomes (CO): At the end of the course, the student will be able to:
List of Programs:
1. Writing a validate function in java script to check the information submitted in the form is correct.
4. Write a function in java script to opens printer dialogue to print current page.
5. Write a function in java script to show the date and time dynamically in the browser title bar.
6. Write a function in java script to disable both left and right button of a mouse and display an alert message.
7. Write a function in java script that asks the visitor for his or her name when entering your page, then prints a
"Hello" welcome message anywhere you wish in the body of the page. If the visitor does not type in a message, a
default message shows, instead.
8. Write a function in java script to presents text surrounded by three changing 'glow' colors, while also shifting
the vertical and horizontal layout for a striking animation effect strongly resembling neon light displays. Colors,
dimensions, and rate are all settable.
9. Write a function in java script to create links with over- and under-lines that move from side to side on
mouseOver.
10. Write a function in java script to launch a popup window without the Windows frame or titlebar.
Course Objective:
The key objective of this course is to strengthen the numerical skills and logical abilities & skills of university
students and prepare them for various competitive exams, thereby improving their employment opportunities.
This initiative aims to incorporate fundamental mathematical principles to build students' confidence.
Additionally, it seeks to broaden their knowledge and foster their logical reasoning and analytical thinking
skills.
Pre-requisites: NIL
Course Outcomes (CO): On successful completion of the course, the students will be able to:
1. Student will be able to solve variety of problems simple to complex in the space of
quantitative domain.
2. Students will be able to use data to determine or to deduce other facts from a set of given
data which are simple to complex.
3. Students will be able to use shortcuts, tricks and techniques to solve the problems with high
accuracy.
4. Students will be able to demonstrate essential skills pertaining to business communications.
5. Students will be able to demonstrate advanced skills required at the time of placement
interviews.
Course Objective: The students are required to undertake innovative and research-oriented project
under the direct supervision of a faculty member of the department. The mini project should not only to
reflect their knowledge gained in the previous semesters but also to acquire additional knowledge and
skill of their own effort.
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Describe the basic concepts of computer science related to the problem under consideration
2. Identify an appropriate engineering problem to be solved
3. Construct an appropriate design methodology for software development and demonstrate
effective communication and writing skills
4. Experiment on a designed model and develop an ability to work in a team.
5. Evaluate the project based on application of knowledge and practical understanding of the model.
Sub Code: IT411A6 Credit:10 (L-0, T-0, P-20)
MAJOR PROJECT-PHASE I
Course Objective: The students are required to undertake innovative and research-oriented project, not
only to reflect their knowledge gained in the previous semesters but also to acquire additional knowledge
and skill of their own effort.
During this phase, the students are required to submit progress of their work in phases to make the
department aware of his/her project. At the end, students have to report to the internal guides/faculty
members for final refinement and documentation. It is mandatory to follow the engineering methodologies
in carrying out the project work. The project is evaluated through internal presentation before the panel
of faculty members followed by the evaluation by external examiner appointed by the university.
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Analyse, design and implement a computational system to meet desired needs within realistic
constraints.
2. Apply modern programming languages and technologies to develop a sustainable and robust
software / hardware application or perform qualitative analysis on computational systems using
appropriate tools.
3. Propose set of alternative design solutions to problems for which standard algorithmic solutions
do not exist.
4. Express ethics, values and respects legal as well as social issues for the computing profession
or computational application.
5. Justify the technical design incorporated in the computational system with the help of in-depth
analysis, presentation as well as document pertaining to the project work.
Sub-Code: IT412A9 Credit:1 (L-0, T-0, P-2)
INDUSTRIAL TRAINING-II
Course Objectives: The students are required either to undergo after 6th semester in the summer
break/Vacation Straining in industries or to attend summer training course on courses beyond the scope of
normal curriculum organized by the Department by calling experts from outside or to visit in industry
for gaining valuable knowledge.
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Select and provide comprehensive learning platform to students where they can enhance
their employ ability skills and become job ready along with real corporate exposure.
2. Adapt and enhance knowledge in one particular technology
3. Express and demonstrate self-confidence and helps in finding their own proficiency.
4. Develop leadership ability and responsibility to perform or execute the given task
5. Illustrate and practice within a real job situation.
Sub Code: IT421A6 Credit:9 (L-0, T-0, P-18)
MAJOR PROJECT-PHASE II
Course Objective: The students are required to undertake innovative and research-oriented project, not
only to reflect their knowledge gained in the previous semesters but also to acquire additional knowledge
and skill of their own effort.
During this phase, the students are required to submit progress of their work in phases to make the
department aware of his/her project. At the end, students have to report to the internal guides/faculty
members for final refinement and documentation. It is mandatory to follow the engineering
methodologies in carrying out the project work. The project is evaluated through internal presentation
before the panel of faculty members followed by the evaluation by external examiner appointed by the
university.
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Analyse, design and implement a computational system to meet desired needs within realistic
constraints.
2. Apply modern programming languages and technologies to develop a sustainable and robust
software / hardware application or perform qualitative analysis on computational systems
using appropriate tools.
3. Propose set of alternative design solutions to problems for which standard algorithmic
solutions do not exist.
4. Express ethics, values and respects legal as well as social issues for the computing profession
or computational application.
5. Justify the technical design incorporated in the computational system with the help of in-depth
analysis, presentation as well as document pertaining to the project work.
Sub Code: IT211A3 Credit:4 (L-3, T-1, P-0)
PYTHON PROGRAMMING
Questions to be set: 05 (All Compulsory)
Course Objectives: This course introduces Python as imperative, functional, procedural and object oriented
programming language. Python also serves as a scripting language for web applications. The units cover the
Python language with a focus on its object-oriented features, web applicability and how these can be implemented
as part of program designs and implementation. The students shall also gain knowledge on practical applications
of python in scientific computing using libraries such as NumPy, Matplotlib etc.
Pre-requisites: Computer Programming concepts of C, C++ etc.
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Define the basic structure of python programming.
2. Differentiate imperative, functional and procedural programming features in Python
3. Practice features for designing and implementing python program.
4. Compose applications using various libraries and concepts of Python.
5. Select methods to build and package Python modules for reusability
Module 3: in
< Error and class Difference between an error and Exception,
Exceptions & Handling Exception, try except block, Raising
Python Exceptions, User Defined Exceptions. 8 3
Regular Powerful pattern matching and searching, Real
Expression time parsing of networking or system data,
and GUI Widgets and basic components, Layout options,
design > Event handling.
Text Books:
1. Mark Lutz, “Programming Python”, O'Reilly.
2. W.Chun, “Core Python Programming”, Pearson.
Reference Books:
1. Allen Downey, “Think Python”, Green Tea Press
2. Mark Lutz, “Learning Python”, 3rd Edition, O'Reilly
3. Guido van Rossum and Jr. Fred L. Drake , “An Introduction to Python”, Network Theory Ltd.
Sub Code: IT212A3 Credit: 4(L-3, T-1, P-0)
Text Books:
1. Averill M Law, “Simulation Modeling and Analysis”, Tata McGraw Hill.
2. Banks, Carson, Nelson, Nicol, “Discrete-Event System Simulation”, Pearson Education.
Reference Books:
1. Raj Jain, “The Art of Computer Systems Performance Analysis: Techniques for
Experimental Design,Measurement, Simulation, and Modeling”, John Wiley &
Sons.
2. Gordon, “System Simulation”, Prentice Hall.
3. Singh V.P, “System Modeling and Simulation”, New Age International.
4. Frank L. Severence, “System ModelingAnd Simulation: An Introduction”, Wiley
Sub Code: IT213A3 Credit: 4(L-3, T-1, P-0)
Pre-requisites: Nil
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Understand the basic principles of Management Information System and distinguish planning
and control of management system.
2. Identify the benefits and challenges of enterprise systems.
3. Examine the security risk assessment, control and measure the various security
management processes.
4. Demonstrate the security audit tasks and the key aspects of legal and ethical issues.
5. Develop skills in security auditing, logging, and audit trail analysis and understand the dynamics of
intellectual property, privacy, and ethical issues.
Text Books:
1. W. Stallings, Computer Security: Principles and Practice, 2nd Edition, Prentice Hall, ISBN: 0132775069,
2011.
2. M. Stamp, Information Security: Principles and Practice, 2nd Edition, Wiley, ISBN:
0470626399, 2011.
3. James A O’Brien, Management Information Systems, Tata McGraw Hill.
Reference Books:
Text Books:
1. Microprocessor Architecture, Programming and Applications with 8085, by Ramesh Gaonkar,
PenramInternational Publishing (India) Pvt. Ltd., Fifth Edition.
2. The 8088 and 8086 Microprocessors: Programming, Interfacing, Software, Hardware, and
Applications,by Walter A. Triebel and Avtar Singh, Pearson Education, Fourth Edition.
3. Microprocessors and Microcomputer based system design, by MahamedRafiquzzaman, UBS,
1994(Only for MOTORALA 68000 Microprocessor)
Reference Books:
1. Microprocessor X86 Programming - K R Venugopal and Raj Kumar, BPB Publications, 1995.
2. IBM PC Assembly Language Programming, by Peter Abel, Pearson Education Asia, Fifth edition.
3. Advanced Microprocessors & Peripherals Architecture, Programming &Interfacing , by A K Ray,
K MBhurchandi, Tata Mcgraw Hill Publishing Company Limited, 2000.
Sub Code: IT215A3 Credit: 4 (L-3, T-1, P-0)
E-COMMERCE
Course Objectives: To provide advanced concepts and technologies in depth for e-commerce, provide
with the necessary quantitative reasoning and analysis to deal with critical questions for modern e-
business development, introduce models for satisfying performance from a complex e-commerce
application and introduce related topics such as security and legal, ethical, and social issues.
Pre-requisites: Nil
Course Outcomes (CO): At the end of the course, the student will be able to:
1. Understand E-commerce activities and apply E-commerce business models in various applications.
2. Identify various E-commerce marketing concepts.
3. Identify various security threats in E-commerce environment.
4. Apply basic cryptography techniques to enable secure E-commerce.
5. Illustrate E-commerce payment systems and explain intellectual property rights.
Text Books:
1. E-Commerce: Business, Technology, Society, Kenneth C.Laudon & Carol G.Traver, 2008, Pearson
Education.
Reference Books:
1. Digital Money: The New Era of Internet Commerce, Daniel Lynch and Lundquist,1996, John
Wiley
2. Web Commerce Technology Handbook, Daniel Minoli & Emma Minoli, 1998,McGraw Hill
3. Frontiers of Electronics Commerce, Kalakota Whinston Stone, 1996, Addison Wesley
4. Developing E-Commerce Sites: An Integrated Approach, Vivek Sharma & Rajiv Sharma, 2000,
Pearson Education
5. E-Business and E-commerce Management, Dave Chaffey, 2009, Pearson Education
Sub Code: IT216A3 Credit: 4(L-3, T-1, P-0)
SOFT SKILLS AND INTERPERSONAL COMMUNICATION
Questions to be set: 05 (All Compulsory)
Course Objectives: This course aims at holistic development of students and improves their
employability skills.
Pre-requisites: Prior knowledge of any particular subject is not a mandatory requirement. Ability to
read, write and understand English language is expected from students. After completion of the course a
student is expected to show improved communication skills
Course Outcomes(CO): On completion of the course, the students will be able to:
1. Apply knowledge of human communication and language processes as they
occur across various contexts.
2. Evaluate key theoretical approaches used in inter disciplinary field of communication.
3. Choose and apply at least one of the appropriate approaches to the
analysis and evaluation of human communication.
4. Assess and evaluate primary academic writing associated
with the communication discipline.
5. Develop knowledge, skills, and judgment around human communication that
facilitate their ability to work collaboratively with others
**Assignment
Topics
Text Books
1. Technical Communication – Principles and Practices by Meenakshi Raman& Sangeeta Sharma, Oxford
Univ. Press, 2007, New Delhi.
2. Personality Development and Soft Skills by Barun K. Mitra, OUP, 2012, New Delhi.
Reference Books
1. Spoken English- A Manual of Speech and Phonetics by R.K.Bansal &J.B.Harrison, Orient
Blackswan, 2013, New Delhi.
2. Business Correspondence and Report Writing by Prof. R.C. Sharma &Krishna Mohan, Tata McGraw
Hill & Co. Ltd., 2001, New Delhi.
3. Practical Communication: Process and Practice by L.U.B. Pandey;
4. A.I.T.B.S. Publications India Ltd.; Krishan Nagar, 2014, Delhi.
5. Skills for Effective Business Communication by Michael Murphy,Harward University, U.S.
6. Business Communication for Managers by Payal Mehra, Pearson Publication, Delhi
7. Ashraf M.Rizvi., Effective Technical Communication. Tata-McGraw, 2005
Sub Code: IT221A3 Credit: 4 (L-3, T-1, P-0)
DESIGN AND ANALYSIS OF ALGORITHMS
Questions to be set: 05 (All Compulsory)
Course Objectives: This course builds upon preliminary knowledge delivered in Data Structures. The main
objectives of the course are to provide thorough knowledge and understanding of different algorithm
analysis techniques, design strategies and their applications. Special purpose machines, some critical
problems and innovative techniques are used in solving them.
Pre-requisites: Data Structures and Programming concepts.
Course Outcomes (CO): On successful completion of this course, students should be able to:
1. Define asymptotic notations and solve problems related to it
2. Calculate time and space complexities for recursive/non-recursive algorithm based on following
algorithmdesign techniques - divide and conquer, greedy, dynamic programming and branch and
bound.
3. Select appropriate algorithm design technique to solve a given problem.
4. Explain the working of existing algorithm / algorithm design techniques
5. Discuss and describe the classes P, NP, and NP-Complete
** not more than 20% of total topics to be allotted for assignment
Text Books:
1. T. H. Cormen, C. E. Leiserson, R. L. Rivest, C. Stein, “Introduction to Algorithms”, PHI.
2. Sartaj Sahni, “Data Structures, Algorithms amd Applications in C++”, University Press.
Reference Books:
1. A. Levitin, “Introduction to the Design and Analysis of Algorithms”, Pearson Education.
2. S. Basse, A. Van Gelder, “Computer Algorithms-Introduction to Design and Analysis”, Pearson.
3. Alfred V. Aho, John E. Hop croft, Jeffrey D. Ullman, “Data Structures and Algorithms”, Addison
Wesley.
4. M. A. Weiss, “Data Structure and Algorithm Analysis in C”, Pearson Education.
Sub Code: IT222A3 Credit: 4 (L-3, T-1, P-0)
MICROCONTROLLERS
Course Objectives: To know the difference between microprocessor and microcontroller, deal with
several microcontroller-based embedded systems and know microcontroller-based assembly language
programming.
Pre-requisites: Microprocessors.
Course Outcomes (CO): On successful completion of this course, students should be able to:
1. Understand different types of microcontrollers, their pin configurations, and internal architectures.
2. Understand the 8051 microcontroller's architecture, I/O operations, special function registers, and
addressing modes.
3. Apply various instruction sets of 8051 microcontrollers for developing programs.
4. Apply knowledge of interrupts, timers, and serial communications within the 8051 microcontroller
system.
5. Illustrate interfacing of peripheral devices with 8051 microcontrollers
Textbooks:
1. 8051 Microcontroller: Internals, Instructions, Programming and Interfacing, Subrata Ghoshal, 2010, Pearson
Education.
Reference Books:
1. Microcontrollers: Architecture, Programming, Interfacing and System Design, Raj Kamal, 2009, Pearson
Education
2. Embedded systems and Robots: Projects using the 8051 microcontroller by Subrata Ghoshal, 2009, Cengage
Learning India.
3. The 8051 Microcontroller by Kenneth J. Ayala, 2008, Cengage Learning India
Sub Code: IT223A3 Credit:4 (L-3, T-1, P-0)
COMPUTER GRAPHICS
Module 2: In Line styles, Color and intensity, Solid area scan 8 2,4
< Attributes of Class conversion, Character attributes, Inquiry
output primitives functions, Bundled attributes.
& Two Basic Transformations, Homogenous co-
dimensional ordinates, Composite Transformations,
transformations> Reflections, Shear
**Assignment
Topics
Text Books:
1. Donald Hearn & M. Pauline Baker, “Computer Graphics”, PHI.
2. William M. Newman Robert F. Spronill, “Principles of Interactive Computer Graphics, McGraw-Hill.
Reference Books:
1. Steven Harington, “Interactive Computer Graphics”, Tata McGraw Hill.
2. Dabod G. Rfgers, “Procedure elements for Computer Graphics”, McGraw Hill.
3. A. Plastick & Gordon Kalley , “Computer Graphics, Schaum’s Outline series”, McGraw Hill.
4. Amarendra N Sinha and Arun D Udai , “Computer Graphics”, McGraw Hill.
Sub Code: IT311A3 Credit:3 (L-3, T-0, P-0)
USER INTERFACE / USER EXPERIENCE DESIGN (UI/UX DESIGN)
Questions to be set: 05 (All Compulsory)
Course Objectives: To understand the basic process of web designing. To grasp the concept of
user experience with respect to the user interface. To understand the trends of UI/UX development.
Pre-requisites: Coordinate Geometry, Basic Computing Knowledge
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Select and utilize design thinking processes and UX/UI tools
2. Differentiate between user interface and user experience design
3. Discover how typography and layout enrich the user experience
4. Distinguish various tools available for user interface design
5. Assess various HCI (human-computer interaction) and the psychology behind user decision-making.
** not more than 20% of total topics to be allotted for assignment.
Module Topics to be Topics Hrs CO PO PSO
covered
Module 1: In What is UI? What is UX? History of UI and UX 7 1,2
<Introduction Class Design
to UI/UX
design history> **Assignment
Topics
Module 5: in class Build It, Eat Your Own Dogfood, Feed 8 4,5
Your
<Product Dogfood to Others, Use What Works and
Scrap the
Implementation Rest.
& lunch Create a Product Launch, Plan, Create
content to
Process & empower customers and sales teams, Pack a
punch
Documentation with your product launch.
Essentials> **Assignment
Topics
Text Books:
1. Dominik Pacholczyk, Web UI Design Best Practices, UXPin
2. Jerry Cao, Chris Bank, The Guide To UX DESIGN PROCESS & DOCUMENTATION ,-
UXPin – 2015
3. Frank Chimero, The Shape of Design, First Edition 2012, Licensed under the Creative
Commons Attribution Non-Commercial Share-Alike 3.0 Unported License
http://creativecommons.org/licenses/by-nc-sa/3.0/
Reference Books:
1. https://pidoco.com/en/help/ux/user-interface-design
2. https://www.interaction-design.org/literature/topics/ui-design
3. https://ebooks.webflow.com/ebook/the-modern-web-design-process
Sub Code: IT312A3 Credit: 3(L-3, T-0, P-0)
DIGITAL IMAGE PROCESSING
Course Objectives: The objective of this course is to provide the students a general
understanding of the fundamentals of digital image processing. It also introduces analytical
toolswhich are currently used in digital image processing. By the end of the course student will
be able to develop any software/programs that uses image enhancement, segmentation,
restoration, enhancement, representation and description, etc.
Course Outcomes: On successful completion of this course, students will be able to:
1. Describe the fundamental concepts of a digital image processing system.
2. Analyze images in the spatial domain using mathematical transformation function.
3. Write the procedure for implementing various image enhancement techniques.
4. Interpret image segmentation and representation techniques.
5. Select the morphological operation for extracting different features from an image.
**Assignment
Topics
Module 3: in Fundamentals, Image Compression Models. 9 4
< Image class Similarity based and dissimilarity based image
Compression segmentation, various threshold techniques, Point,
Text Books:
1. Rafael C Gonzalez, Richard E Woods, “Digital Image Processing”, Pearson EducationPublications.
2. RajjanShinghal, “Pattern Recognition”, Oxford Publications.
Reference Books:
1. Chanda and Majumder, “Digital Image Processing and Analysis”, Prentice Hall Publications.
2. Rafael C Gonzalez, Richard E Woods, “Digital Image Processing with
Matlab”,Pearson EducationPublications.
3. S. Sridhar, “Digital Image Processing”, Oxford University Press.
4. Jayaraman, “Digital Image Processing”, McGraw Hill.
Sub Code: IT313A3 Credit: 3(L-3, T-0, P-0)
INFORMATION RETRIEVAL
Questions to be set: 05 (All Compulsory)
Course Objectives:
The course explores information retrieval models, Web Search Engines, Link Analysis, Hadoop, Map
Reduce, and document text mining techniques for a holistic understanding.
Text Books:
1. C. Manning, P. Raghavan, and H. Schütze, Introduction to Information Retrieval , Cambridge
UniversityPress, 2008.
2. Ricardo Baeza -Yates and Berthier Ribeiro - Neto, Modern Information Retrieval: The Concepts
andTechnology behind Search 2 nd Edition, ACM Press Books 2011.
Reference Books:
1. Bruce Croft, Donald Metzler and Trevor Strohman, Search Engines: Information Retrieval in
Practice,1st Edition Addison Wesley, 2009.
2. Mark Levene, An Introduction to Search Engines and Web Navigation, 2 nd Edition Wiley, 2010.
3. Stefan Buettcher, Charles L. A. Clarke, Gordon V. Cormack, Information Retrieval:
Implementing andEvaluating Search Engines, The MIT Press, 2010.
Sub Code: IT314A3 Credit: 3(L-3, T-0, P-0)
DESIGN THINKING
Questions to be set: 05 (All Compulsory)
Course Objectives: Design Thinking is a systematic approach to innovation and creative problem-solving that
can be used in many disciplines. Design Thinking applies the methodologies of design to challenges in business
and society—which makes it central to innovation and creativity.
Pre-requisites: Innovative Problem-Solving ability, design and design theory, organizational behavior, and
social psychology.
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Express the design process as a tool for innovation
2. Understand the unique needs of a company around specific challenges
3. Demonstrate the value of developing a local network and assist students in making lasting
connectionswith the business community.
4. Develop communication skills necessary to facilitate high performance team formation and
maintenanceand build empathy for target audiences from different “cultures”.
5. Develop and test innovative ideas through a rapid iteration cycle.
Text Books:
1. Change by Design: How Design Thinking Transforms Organizations and Inspires Innovation by Tim
Brown Kindle Edition
2. HBR's 10 Must Reads on Design Thinking (with featured article "Design Thinking" By Tim Brown)
Paperback by Harvard Business Review (Author), Tim Brown (Author), Clayton M. Christensen
(Author), Indra Nooyi (Author), Vijay Govindarajan (Author)
Reference Books:
1. Design Thinking: Understanding How Designers Think and Work , Kindle Edition by Nigel Cross
(Author) Format: Kindle Edition.
2. Solving Problems with Design Thinking: Ten Stories of What Works (Columbia Business School
Publishing) Kindle Edition by Jeanne Liedtka (Author), Andrew King (Author), Kevin Bennett (Author).
3. Idris Mootee, "Design Thinking for Strategic Innovation: What They Can't Teach You at Business or
Design School", John Wiley & Sons 2013. (Unit IV).
4. Book - Solving Problems with Design Thinking - Ten Stories of What Works (Columbia Business School
Publishing) Hardcover – 20 Sep 2013 by Jeanne Liedtka (Author), Andrew King (Author), kevin Bennett
(Author).
Sub Code: IT315A3 Credit: 3(L-3, T-0, P-0)
DATA WAREHOUSING AND DATA MINING
Questions to be set: 05 (All Compulsory)
Course Objectives: This course is indent for understanding the techniques behind the recent development in
data warehousing and data mining. The data warehousing part of the module aims to give students a good
overview of the ideas and the techniques, which are behind recent developments in the data warehousing and
On-Line Analytical Processing (OLAP) fields, in terms of data models, query languages, conceptual design
methodologies, and storage techniques. The data mining part discusses various tools and techniques used to
find out the interesting patterns from data.
Pre-requisites: Data structures, Concepts of Algorithms, Fundamentals of probability & statistics
and programming skills
Course Outcomes: On successful completion of this course, students will be able to:
1. Distinguish the concepts of data warehousing and data mining
2. Illustrate the dimensional modelling technique for designing a data warehouse and data
warehouse architectures and OLAP
3. Explain the knowledge discovery process.
4. Deduction of data mining tasks and study their well-known techniques
5. Apply various data mining techniques in varied problem scenarios
Text Books:
1. Jiawei Han, MichelineKamber, “Data Mining: Concepts and Techniques”, Elsevier.
2. A K Pujari, “Data Mining Concepts”, University Press.
Reference Books:
1. Ian H. Witten, Eibe Frank, “Data Mining Practical Machine Learning Tools and Techniques with
JavaImplementations”, Morgan Kaufmann Publishers.
2. Alex Berson, Stephen J. Smith, “Data Warehousing, Data Mining and OLAP”, Tata McGrawHill.
3. Richard O. Duda, Peter E. Hart, “Pattern Recognition and Scene Analysis”, Wiley.
4. VikramPudi, P. Radha Krishna, “Data Mining”, Oxford University Press.
Sub Code: IT316A3 Credit: 3(L-3, T-0, P-0)
BIG DATA ANALYTICS
Course Objectives: To provide an in-depth understanding of a Big Data system and its features.
Course Outcomes (CO): At the end of the course, the student will be able to
1. Understand NoSQL.
2. Understand Properties of a Big Data system.
3. Understand Computing on the batch layer
4. Apply Storing real-time views
5. Analyze performance metrics and develop solutions for serving layer databases, focusing on
normalization and dynamic data management.
TEXT BOOK
1. Nathan Marz, James Warren, “Big Data: Principles and best practices of scalable real-time data
stems, Manning Publishing.
REFERENCE BOOK(S)
1. Research Articles
Sub Code: IT317A3 Credit:3(L-3, T-0, P-0)
OPTIMIZATION TECHNIQUES
Questions to be set: 05 (All Compulsory)
Course Objectives: The objective of this course is to understand the need and origin of the optimization
methods andto get a broad picture of the various applications of optimization methods used in engineering.
This course is indentfor designing and controlling complex systems, solving hard problems of efficiently
allocating scarce resources usingin complete information, and developing sustainable strategies to master
situations of conflict and co-operation usingscientific methods and information technology.
Pre-requisites: Quantitative Analysis using C/C++, Design and Analysis of Algorithms and Probability &
Statistics.
Course Outcomes: On successful completion of this course, students will be able to:
1. Demonstrate the knowledge and understanding of the basic ideas underlying optimization
techniques.
2. Apply the mathematical approach to optimization problems relevant to engineering
3. Analyze the robustness of continuous linear optimization problems solutions using sensitivity
analysis.
4. Ability to understand and interpret the results and information provided by a particular method.
5. Compare the robustness of continuous linear optimization problems solutions using various
techniques
Text Books:
1. Hamdy A. Taha, “Operations Research”, Fifth edn., Macmillan Publishing Company.
2. Kumar Gupta, Prem and Hira, D.S., “Operations Research”, S Chand & Company Limited.
3. Swarup, Kanti, Gupta, P.K. and Manmohan, “Operations Research”, Sultan Chand & Sons.
Reference Books:
1. Operations Research – Schaum outline series, MH
2. V.K. Kapoor-- Operations Research
3. Hiller F. and Leibermann G. J., “Operation Research”, Holder Day Inc.
4. Srinath L.S., “PERT & CPM Principles and Applications”, Affiliate East West Press (P).
Sub Code: IT318A3 Credit: 3(L-3, T-0, P-0)
INTERNET OF THINGS
Questions to be set: 05 (All Compulsory)
Course Objectives: To provide students with a foundation in computing, communication and
information technologies.by making student to realize the revolution of Internet in Mobile Devices,
Sensor Networks and Cloud technology. Also, to develop the teamwork skills, multidisciplinary
approach, and an ability to relate information technology to overcome real world and social issues
inducing students with good computing and communication knowledge so as to understand, analyze,
design, and innovate a new system.
Pre-requisites: Computer Networks, knowledge of basic Wireless & Wired Networking, Wireless
Sensor Networks and programming language.
Course Outcomes (CO): On completion of the course, it is expected to endow the students with skills to:
1. Visualize the impact of information technology solutions on the society.
2. Identify the application areas of IOT.
3. Identify building blocks of Internet of Things and characteristics.
4. Establish interconnection and integration of the physical world and the cyber space.
5. Design & develop IOT Devices.
**Assignment
Topics
Module 2: in Domain Specific IOTs : Home Automation, Cities, 6 2
< Domain class Environment, Energy, Retail, Logistics,
Specific IOTs > Agriculture, Industry, Health & Life Style.
**Assignment
Topics
Module 3: in Architectural overview, Components of IoT system, 10 3
< IoT class Devices and gateways, Local and wide area
Technology networking, Data management, Business processes
Fundamentals> in IoT, IoT analytics, Knowledge management
**Assignment
Topics
Module 4: in class Design principle for connected devices, IoT system 10 4
< Design layers and design standardization, Networks and
principle for Communication: Networking Technology and
IoT > Communication Technology, Protocols in IOT,
Security, Privacy & Trust in IoT.
**Assignment
Topics
Module 5: in class Hands-on-IoT : IoT Physical Devices & Endpoints: 10 5
< Hands-on-IoT What is an IoT Device, Exemplary Device, Board,
& IoT Linux on Raspberry Pi, Interfaces, Types of sensors.
opportunity and IoT opportunity and challenges : Various case
challenges > studies, opportunity and challenges in IoT.
**Assignment
Topics
Text Books:
1. Ovidiu Vermesan,Peter Friess"Internet of Things –From Research and Innovation to market
Deployment",River Publishers.
2. Jan Ho¨ ller, Vlasios Tsiatsis, Catherine Mulligan, Stamatis Karnouskos, Stefan Avesand,
3. David Boyle "From Machine-to-Machine to the Internet of Things Introduction to a New Age of
Intelligence",Academic Press Elsevier.
4. Vijay Madisetti and ArshdeepBahga, “Internet of Things (A Hands-onApproach)”, 1 st Edition, VPT,
2014.
Reference Books:
1. "Internet of Things" Copyright 2016 by Tutorials Point (I) Pvt. Ltd.
2. Tim O’Reilly & Cory Doctorow "Opportunities and Challenges in the IoT",O’Reilly
publication.
Pethuru Raj, Anupama C.Raman,"The Internet of Things, Enabling Technologies,platforms and use
cases", CRC Press.
Sub Code: IT321A3 Credit: 4(L-3, T-1, P-0)
MACHINE LEARNING
Questions to be set: 05 (All Compulsory)
Course Objectives: It reflects recent developments while providing a comprehensive introduction to the fields
of pattern recognition and machine learning. It is aimed at advanced undergraduates assuming no previous
knowledge of pattern recognition or machine learning concepts.
Pre-requisites: Knowledge of multivariate calculus and basic linear algebra and basic probability theory.
Course Outcomes (CO): On completion of the course it is expected to endow the students with
skills to:
Text Books:
1. Christopher M. Bishop, “Pattern Recognition and Machine Learning”, Springer.
2. David J.C. Mackay, “Information Theory, Inference and Learning Algorithms”, Cambridge University
Press, 2003.
Reference Books:
1. Andrew Ng, “Lecture Notes on Machine Learning”.
Sub Code: IT322A3 Credit: 4(L-3, T-1, P-0)
NATURAL LANGUAGE PROCESSING
Questions to be set: 05 (All Compulsory)
Course Objectives:
1. To introduce the fundamental concepts and theory of Natural Language Processing and its practical
applications
2. To highlight Linguistic (knowledge-based) and statistical approaches to language processing in the three major
subfields of NLP: syntax (language structures), semantics (language meaning), and pragmatics/discourse
(the interpretation of language in context).
Pre-requisites: A strong mathematical background, Proficiency with algorithms, Critical thinking and
problem-solving skills
Course Outcomes(CO): On completion of the course it is expected to endow the students withs kills to:
Text Books:
1. Daniel Jurafsky, James H. Martin―Speech and Language Processing: An Introduction to Natural
Language Processing, Computational Linguistics and Speech, Pearson Publication, 2014David J.C.
Mackay, “Information Theory, Inference and Learning Algorithms”, Cambridge UniversityPress, 2003.
Reference Books:
1. James Allen, “Natural Language Understanding”, 2/e Pearson Education
2. L.M. Ivansca, S. C. Shapiro, “Natural Language Processing and Language Representation”, University Press
3. Sowmya Vajjala, Bodhisattwa Majumder, Anuj Gupta, Harshit Surana. 2020. Practical Natural Language
Processing. O'Reilly.
4. Hobson Lane, Cole Howard, Hannes Hapke. 2019. Natural Language Processing in Action
Sub Code: IT323A3 Credit: 4(L-3, T-1, P-0)
Pre-requisites: Nil
Course Outcomes(CO): On completion of the course it is expected to endow the students withs kills to:
Text books:
Artificial Intelligence, Elaine Rich and Kevin Knight, 3rd ed., 2009, McGraw Hill.
Reference books:
1. Latest Research articles as decided by the instructor.
2. Machine Learning for Dummies, John Paul Mueller and Luca Massaron, 1st ed. 2016, For Dummies.
3. Pattern Recognition and Machine Learning, Christopher Bishop, 2016, Springer New York.
4. The Elements of Statistical Learning: Data Mining, Inference, and Prediction, Trevor Hastie, Robert
Tibshirani & Jerome Friedman, Springer.
5. Deep Learning, Ian Goodfellow and Yoshua Bengio and Aaron Courville, 2016, MIT Press.
6. Securing the Internet of Things, Shancang Li Li Da Xu, 2017, Syngress, Elsivier.
7. Internet of Things and its Applications, Satish Jain, Shashi Singh, 1st ed. 2020, BPB Publications.
8. Introduction to Information Security and Cyber Laws, Surya Prakash Tripathi, 2014, Dreamtech Press.
Sub Code: IT324A3 Credit: 4(L-3, T-1, P-0)
SYSTEM PROGRAMMING
Questions to be set: 05 (All Compulsory)
Course Objectives: This course emphasizes on systems programs: operating systems, assemblers,
compilers, interpreters, macro processors and loaders. This course also discusses the design of the system
programs: assembler, linkers and loaders.
Pre-requisites: Programming language Design, Data Structures and Microprocessor and Peripheral
Devices.
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Describe the evolution of Programming and understand how an Operating and other system software
haveevolved since its inception.
2. Examine various system programs and it's usage for proper functioning of Computer System.
3. Analyze the theory and design the procedure for implementing assembler and macro-processor
systemprograms.
4. Compare various program loading schemes and discuss issues pertaining to design of some
loadingschemes.
5. Understand the basic concepts of Compiler Program and issues related to its design.
** not more than 20% of total topics to be allotted for assignment
Module Topics to be Topics Hrs CO PO PSO
covered
Module 1: in Introduction to application software and systems 7 1,2
< Scope of class software, Concept of hardware, System software
Systems concept, System design and methods of system design,
Programming Properties of good and structured system, Software and
and software hierarchy, Machine structure.
Background **Assignment Components of a system programming, Evolution of
> Topics Operating Systems, Operating System functions
Text Books:
1. John J. Donovan, “Systems Programming”, Tata McGraw Hill.
2. Srimanta Pal, “Systems Programming”, Oxford.
Reference Books:
1. D M Dhamdhere, “Systems Programming & Operating Systems”, Tata McGraw Hill.
2. Aho, Ulmann, Sethi , “Compiler Design”, Pearson Education.
3. Leland L.Beck, D.Manjula, “System Software-An Introduction to System Programming”, Pearson
A.C. Shalini, “System Software”, SCITECH Publication
Sub Code: IT325A3 Credit: 4(L-3, T-1, P-0)
BIO INSPIRED COMPUTING
Questions to be set: 05 (All Compulsory)
Course Objectives: The course aims to cover bio-inspired theorems and algorithms, including random
walk, simulated annealing, genetic algorithm, differential evolution, swarm optimization, and ant colony
for feature selection. Additionally, it explores their applications in image processing.
Pre-requisites: Programming language Design, Data Structures and Microprocessor and Peripheral
Devices.
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Understand bio-inspired computing algorithms, such as genetic algorithms and swarm optimization,
for optimization tasks.
2. Apply random walk and annealing techniques in stochastic optimization and search problems.
3. Analyze meta heuristic algorithms, including firefly algorithm and particle swarm optimization, for
solving complex optimization problems.
4. Comprehend the application of bio-inspired computing in image processing
5. Analyze the convergence and performance of bio-inspired algorithms through parameter tuning and
control mechanisms.
Text Books:
1. Yang, Xin-She, et al., eds. Swarm intelligence and bio-inspired computation: theory and applications. Newnes,
2013.
2. Eiben, A.E., Smith, James E, "Introduction to Evolutionary Computing", Springer 2015.
3. Xin-She Yang, Jaao Paulo papa, "Bio-Inspired Computing and Applications in Image Processing", Elsevier
2016
Sub Code: IT326A3 Credit: 4(L-3, T-1, P-0)
AUTONOMOUS MOBILE ROBOTICS AND COMPUTATIONAL INTELLIGENCE
Questions to be set: 05 (All Compulsory)
Course Objectives: The course will cover basic principles of design and practice of intelligent
robotics systems including the algorithms for the analysis of the data obtained by vision and range
sensors, basic principles of modeling kinematics and dynamics and design of basic control strategies.
Emphasize will alsobe given on formulating interesting robotics tasks and show how they can be
accomplished by individual robot or cooperative robot teams (such as flocking, foraging as well as
robotic soccer).
Pre-requisites: Design and Analysis of Algorithms, Basic Mathematics (linear algebra,
calculus andprobability), Soft computing.
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Identify application of Robots
2. Describe the evolution, kind of robots and basics of design of a Robotics System
3. Choose correct choices of Locomotion, Kinematics, Perception techniques
4. Apply Intelligent Algorithms for decision making in Motion Planning and path optimization
5. Develop simple robot control systems integrating perception, planning, and action
Text Books:
1. Rajiv Mall, “Real Time Systems, Theory and Practice”, 2nd Edition, Pearson Education, 2007.
2. J.W. Liu, “Real Time systems”, Pearson Education, 5th Edition, 2004.
Reference Books:
1. Phillip Laplante, Prentice Hall, “Real Time Systems Design and Analysis”, 3rd Edition.
2. Krishna & Shin, “Real Time systems”, Tata McGraw Hill, 1999.
Mark H. Klein, Thomas Ralya, “Practitioner’s Handbook for Real-Time Analysis”, 2nd
Edition, Kluwers Academic Publishers, 1994.
4. Hassan Gomaa, “Software Design Methods for Concurrent and Real-time
Systems”, AddisonWesley.
5. Stuart Bennett, “Real Time Computer Control – An Introduction”, Prentice Hall of India, 1998.
6. S.T. Allworth and R.N.Zobel, “Introduction to real time software design”, Macmillan,
2nd Edition, 1987.
Sub Code: IT328A3 Credit: 4(L-3, T-1, P-0)
CLOUD COMPUTING
Questions to be set: 05 (All Compulsory)
Course Objectives: This course gives an introduction to cloud computing and its techniques -
Infrastructureas a Service (IaaS), Platform-as-a-Service (PaaS), Software as a Service (SaaS), issues,
ecosystem and case studies
Pre-requisites: Operating Systems and Computer Network.
Course Outcomes(CO): On completion of the course it is expected to endow the
studentswith skills to:
1. Analyse the Service Oriented Architecture and Cloud Computing paradigms.
2. Implement and evaluate a service mashup.
3. Analyse the enterprise models in cloud computing.
4. Evaluate a Software as a Service (SaaS) application.
5. Illustrate the Security issues associated with the Cloud Computing paradigm.
Text Books:
1. Michael Miller, “Cloud computing: Web based applications that change the way you work
andcollaborateonline”, Pearson.
2. Haley Beard, “Cloud computing best practices for managing and measuring processes for on
demandcomputing, Applications and data centers in the cloud with SLAs”, Emereo.
Reference Books:
1. Guy Bunker and Darren Thomson, “Delivering Utility Computing”, John Wiley & Sons.
2. George Reese, “Cloud Application Architectures”, O’Reilly.
3. Lee Gillam, “Cloud Computing: Principles, Systems and Applications”, Springer.
4. Brian J. S. Chee, Curtis Franklin, Jr., “Cloud Computing: Technologies and Strategies of theUbiquitous
Data Center”, CRC Press
Sub Code: IT337A3 Credit: 4(L-3, T-1, P-0)
AD HOC WIRELESS NETWORKS
Questions to be set: 05 (All Compulsory)
Course Objectives: This course will introduce the students to the diverse literature on ad-hoc
wireless networks, and expose them to the fundamental issues in designing and analyzing ad-
hocwireless network systems. A detailed study on related technologies and standards ranging
from networking, OS support and algorithms, to security will constitute the syllabus. The
primary concern will be protocol design, communication and computational challenges
posed by ad hoc wireless networking systems.
Module 4: in class Issues and challenges for designing transport layer 10 1,4
Transport protocol, Transport layer solutions – Feedback based
Layer: TCP, Split TCP, Ad hoc TCP. Introduction on QoS
Introduction services in Adhoc network, Issues and challenges in
to Transport providing QoS in Ad hoc networks, Frameworks for
Layer, Ad hoc networks – QoS Model, RSVP, SWAN
Quality of
Service in Ad **Assignment
Hoc Wireless Topics
Networks
Module 5: in class Introduction on Security of ad hoc wireless 7 3,4
Security in networks, Issues and challenges in securityprovision
Ad hoc for ad hoc wireless protocols, Network layer attack,
Network transport layer attack, Requirement of secure routing
Energy protocol for adhoc wireless network – Security-
Management Aware AODV protocol Introduction, Need for
in Ad Hoc energy management in Ad hoc network. Battery
Wireless management schemes – DLL solutions, Network
Networks layer solutions Unaddressed issues in Ad hoc
Recent networks.
Trends in Ad **Assignment Ad hoc Internet, Ultra-Wide-Band-Radio
hoc networks Topics communication Wireless Fidelity, Optical wireless
networks
Text Books:
1. C. Siva Ram Murthy, B.S. Manoj, “Ad Hoc Wireless Networks
Architectures andProtocols”,Pearson Publication.
2. Charles E Perkins, “Ad Hoc Networking” Addison-Wesley.
Reference Books:
1. Toh CK, “Ad Hoc Mobile Wireless Networks”, PHI.
2. LabiodHouda, “Wireless Ad Hoc and Sensor Networks”, Wiley.
3. William Stallings “Wireless Communication and Networks”, Pearson.
4. Prashant Mohapatra, SrikanthKrishnamurthy,“Ad Hoc Networks
TechnologyandProtocols”,Springer.
.
Sub Code: IT338A3 Credit: 4(L-3, T-1, P-0)
Text Books:
1. Michael J Quinn, “Parallel Programming in C with MPI and OpenMP”,
McGraw-HillHigher Education.
2. Ananth Grama, Anshul Gupta, George Karypis and Vipin
Kumar,“Introduction toParallel Computing”, Pearson Education India.
3. V. Rajaraman and C. Siva Ram Murthy, “Parallel Computers –
Architecture andProgramming”, Prentice-Hall of India, 2003.
Reference Books:
Georg Hager, Gerhard Wellein, "Introduction to High Performance Computing for Scientists and
Engineers",Chapman & Hall / CRC Computational Science series, 2011
Sub Code: IT329A3 Credit: 4(L-3, T-1, P-0)
DEEP LEARNING
Questions to be set: 05 (All Compulsory)
Course Objective: Deep Learning has received a lot of attention over the past few years and has
been employed successfully by companies like Google, Microsoft, IBM, Facebook, Twitter etc.
This course is an introduction to deep learning, a branch of machine learning concerned with the
development and application of modern neural networks. Deep learning algorithms extract layered
high-level representations of data in a way that maximizes performance on a given task.
Course Outcomes: Upon successful completion of the course, the students are expected to be able to:
1. Describe deep learning techniques and computing environment that are suitable for the
applicationsunder consideration.
2. Discuss various solution plans and methodologies for an engineering problem using Deep Learning.
3. Classify the different technical issues related to Deep Architectures consistent with their level
ofknowledge and understanding.
4. Develop a set of alternative design solutions to problems for which standard algorithmic solutions do
notexist.
5. Apply Deep Learning techniques to solve real-life problems which directly or indirectly benefits to
thesociety.
** not more than 20% of total topics to be allotted for assignment
Module Mode Topics Hrs CO PO PSO
**Assignment
Topics
Text Books:
1. Ian Goodfellow, Yoshua Bengio, Aaron Courville. “Deep Learning”.
2. Duda, R.O., Hart, P.E., and Stork, D.G. “Pattern Classification”. Wiley-
Interscience. 2ndEdition, 2001.
3. Laurene Fausett, “Fundamentals of Neural Networks”.
Reference Books:
1. Theodoridis, S. and Koutroumbas, K. “Pattern Recognition”. Edition 4. Academic
Press,2008.
2.Francois Chollet , “Deep Learning with Python”
3. Bishop, C. M. “Neural Networks for Pattern Recognition”. Oxford University Press.
1995. 4.Hastie, T., Tibshirani, R. and Friedman, J. T”he Elements of Statistical Learning”.
Springer.2001.
Sub Code: IT330A3 Credit: 4(L-3, T-1, P-0)
PATTERN RECOGNITION
Questions to be set: 05 (All Compulsory)
Course Objective: The objective of this course is to provide an introduction to basic concepts and
methodologies for Pattern Recognition, and to develop a foundation that can be used as the basis
for further study and research in this field.
Course Outcomes: Upon successful completion of the course, the students are expected to be able to:
**Assignment
Topics
Module 3: in Underlying Idea – Numeric Attribute Values – Non- 8 3
Nearest class numeric Attribute Values – Mixed Attribute Values –
Neighbour Performance of Nearest Neighbor Classifier, Training
Classification, a Linear Classifier – The Two-class case – Higher
Linear Dimensional Attribute Space.
Classification
**Assignment
Topics
Module 4: in class Agglomerative Hierarchical Clustering – k- 7 4
Clustering: Means Clustering – Non-numeric Attributes.
Basics
**Assignment
Topics
Text Book:
1. Pattern Recognition: Techniques and Applications, Rajjan Shinghal, Oxford University Press
Reference Books:
1. Pattern Recognition: Statistical, Structural and Neural networks, Robert Schalkoff, 2005, John Wiley &
Sons Inc.
2. Pattern Classification, Richard O.Duda, Peter E. Hart & David G. Strok, John Wiley & Sons, Inc.
Sub Code: IT331A3 Credit: 4(L-3, T-1, P-0)
Course Outcomes: Upon successful completion of the course, the students are expected to be able to:
1. Describe the fundamentals of Web 3.0 is and its key features and applications.
2. Explain the concepts of distributed computing and decentralized systems.
3. Discuss symmetric key cryptography, including substitution and transposition techniques.
4. Outline the principles of public key cryptography and message authentication.
5. Summarize the types and uses of block chains.
Text Book
1. Blockchain and Web 3.0- Social, Economic, and Technological Challenges, 2019, Publisher: Taylor &
Francis, Giuseppe Destefanis, Massimo Ragnedda
2. Distributed Computing, Ajay D. Kshemakalyani, Mukesh Singhal, 2008, Cambridge University Press
3. Cryptography and Network Security-Principles and Practices, William Stallings, 2003, Pearson
Education
Reference Book(S)
1. Web 3.0 Startups- Online Marketing Strategies for Launching & Promoting Any Business on the Web, By
R. L. Adams · 2013
2. Blockchain and Crypto Currency, 2020, Springer Singapore, Chris Dai, Kenichi Masuda, Makoto Yano,
Yoshio Kishimoto
Sub Code: IT332A3 Credit: 4(L-3, T-1, P-0)
SOFT COMPUTING
Questions to be set: 05 (All Compulsory)
Course Objectives: This course provides a comprehensive study on various computational techniques (suchas
Genetic Algorithm, ANN, Fuzzy Logic etc.) used in computer science for modelling or solving complex
problems for which more conventional methods have not yielded low cost, analytic and complete solutions.
Pre-requisites: Data Structures, Design and Analysis of Algorithms and Artificial Intelligence.
Course Outcomes (CO): On completion of the course the students will be able to:
1. Identify Soft Computing principles and techniques and apply them in logical reasoning.
2. Identify fuzzy and predicate logic logic applications and implement them in solving basic
engineeringproblems.
3. Visualize and employ Rough decision systems.
4. Formulate solutions to real life engineering problems Basic ANN models.
5. Employ Genetic Algorithms for solving real life optimization problems.
**Assignment
Topics
Module 2: Generalized Modus Ponens, Fuzzy Inference,
< Fuzzy Generalized Modus Tollens
Logic & Propositional Logic: Propositions, Propositionallogic
Propositional well-formed formulae, Properties of wffs,
Logic > Interpretation of logical expression, Logical
equivalence, Tautology/ Contradiction/ Consistency,
Validity of an argument
**Assignment
Topics
Module 3: in Predicate Logic: Limitations of propositional logic, 11 2,3
< Predicate class Predicate logic well-formed formulae,
Logic & Properties of FOPL wffs, Rules of Inference,
RoughSets > Deductive Rules, Modus ponens, Universal
Specialization, Chain Rule, Simplification,
Resolution, Modus Tollens, Addition, Non-
deductive Rules, Abduction, Induction, Analogy.
Rough Sets : Information Systems & Decision
Systems, Indiscernibility, Set Approximations-
Lower & Upper Approximations, Rough set
properties, Rough Membership: Rough
Membership Function, Properties, Rough set
Categories, Roughly B-definable, Internally B-
definable, Externally B- definable, Totally B-
definable, Reducts: Reduct & Minimal Reduct,
Discernibility Mattrix & Discernibility Function
**Assignment
Topics
Module 4: in class Artificial Neural Networks : Basic Concepts-The 5 4
< Artificial Biological Neuron, The Artificial Neuron,
Neural Characteristics of the Brain, Computation in Termsof
Networks > Patterns -Pattern Classification, Pattern Association,
The McCulloch- Pitts Neural Model,The Perceptron,
Neural Network Architectures - Learning by Neural
Nets, Multilayer Feed forward, The Back
propagation Algorithm - Learning,
Parameter Choice, Initialization, Stopping criteria,
Training set, Data Representation, Hidden Layers.
**Assignment
Topics
Module 5: in class Genetic Algorithms - Natural Evolution, 5 5
<Advanced Chromosomes, Natural Selection , Cross-over,
Search Mutation, Basic GA, Encoding a solution as
Algorithms > chromosome / decoding it, Fitness Function,
Population, GA operators- Selection, Tournament,
Roulette Wheel, Cross-over, Mutation, GA
parameters , Convergence
**Assignment
Topics
Text Books:
1. J.-S.R. Jang, C. -T. Sun, E.Mizutani, “Neuro-Fuzzy And Soft Computing-A
Computational Approach to Learning and Machine Learning”, Pearson Education.
2. LaureneFausett, “Fundamentals of Neural Networks – Architechture, Algorithms andApplications”,
Prentice Hall.
Reference Books:
1. Simon Haykin, “Neural Networks – A Comprehensive Foundation”, Prentice Hall.
2. Jerry M. Mendel, “Uncertain Rule-Based Fuzzy Logic Systems: Introduction and NewDirections”,
Prentice Hall
3. Melanie Mitchell, “An Introduction to Genetic Algorithms”, MIT Press.
4. Jan Komorowski, Lech Polkowski, Andrej Skowron, "Rough Sets- A Tutorial",(Electronic Copy)
5. ZbigniewSuraj, "An Introduction to Rough Set Theory and Its Applications- A
Tutorial", , ICENCO'2004, Cairo, Egypt, (Electronic Copy).
Sub Code: IT333A3 Credit: 4(L-3, T-1, P-0)
CYBER PHYSICAL SYSTEMS
Course Objective: The objective of this course is to develop an exposition of the challenges in
implementing a cyber-physical system from a computational perspective, but based equally on the
principles of automated control. The course aims to expose the student to real world problems in
this domain and provide a walk through the design and validation problems for such systems.
Pre-requisites: Nil
Course Outcomes: Upon successful completion of the course, the students are expected to be able to:
1. Understand the basic building blocks of Cyber Physical Systems (CPS), and basic principles of design
and validation of CPS.
2. Apply the principles of dynamical systems for designing controller.
3. Identify the CPS implementation issues.
4. Illustrate safe reinforcement learning, secure task mapping, and partitioning.
5. Understand the principles of secure task mapping and partitioning in Cyber-Physical Systems (CPS)
deployments, as well as the concept of state estimation for attack detection.
**Assignment
Topics Metrics for CPS performance analysis.
Module 4: In Safe Reinforcement Learning – Robot motion 7 4
Intelligent CPS Class Topics control – Autonomous Vehicle control –
Gaussian Process Learning – Smart Grid
Demand Response – Building Automation
Text Book
Reference Book(S)
1. Lee, Edward A., and Sanjit A. Seshia. "An introductory textbook on cyber-physical systems." Proceedings of the
2010 Workshop on Embedded Systems Education. ACM, 2010.
2. Talcott, Carolyn. "Cyber-physical systems and events." Software-Intensive Systems and New Computing
Paradigms. Springer, Berlin, Heidelberg, 2008. 101-115.
Sub Code: IT334A3 Credit: 4(L-3, T-1, P-0)
SOCIAL NETWORK ANALYSIS
Questions to be set: 05 (All Compulsory)
Course Objectives: To understand how the world is connected -- socially, strategically and
technologically and why it matters and to introduce the basic notions and model used for social
networkanalysis.
**Assignment
Topics
**Assignment
Topics
Text Books:
1. S. Wasserman and K. Faust. Social Network Analysis: Methods and
Applications,Cambridge University Press, 1994
2. D. Easley and J. Kleinberg, Networks, Crowds and Markets: Reasoning about a
highlyconnected world, Cambridge University Press, 2010
Reference Books:
1. Peter R. Monge, Noshir S. Contractor, Theories of communication networks.
OxfordUniversity Press, 2003.
2. Duncan Watts. Six degrees: the science of a connected age. Norton, 2004.
Sub Code: IT335A3 Credit: 4(L-3, T-1, P-0)
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEM
Questions to be set: 05 (All Compulsory)
Course Objectives: Introduce the principles of remote sensing to students who are beginners in this
field. Much as the text book has laid out, fundamental knowledge on the physics of remote sensing,
aerial photographic techniques, photogrammetric, multispectral, hyper-spectral, and thermal imaging,
and RADARand LIDAR image analysis will be introduced. The newest technology in the field will also
be discussed. The subject will be synthesized by developing an overall application of the discipline, not
just knowledge in one aspect. The course will be taught with an emphasis on the geographical
applications of remote sensing; however, in certain instances other disciplines will be introduced as well.
Lab assignments will supplement classroom discussion and reading assignments. At the end of the
semester students should have a good understanding and basic skills of remote sensing.
Course Outcomes (CO): On completion of the course, it is expected to endow the students with skills to:
1. Define the concepts and recognize the characteristics of a real-time system.
2. Identify and implement important software engineering principles for real-time system
development.
3. Produce an architectural design of a real-time system.
4. Evaluate the real-time systems in appropriate terminology and the real-time characteristics of a
given system to assist in deciding which software or kernel is appropriate for a problem.
5. Interpret and contrast the design of a real-time system in a range of commonly understood formats
Text Books:
1. Jensen, John R., 2000, Remote Sensing of the Environment: An Earth Resource
Perspective, NewJersey: Prentice Hall, 544 pages. ISBN 0-13-489733-1.
Reference:
1. Lillsand T.M. and Keifer, R.W. Remote sensing and Image Interpretation, VI edition of John
Wiley& Sons-2000.
2. John R. Jesen, Introductory Digital Image Processing: A Remote Sensing Perspective, 2nd
Edition,1995.
3. John A.Richards, Springer-Verlag, Remate Sensing Digital Image Analysis 1999.
4. Paul Curran P.J. Principles of Remote Sensing, ELBS, 1995.
5. Charles Elachi and JakobJ.vanZyl, Introduction to the Physics and Techniques of Remote
Sensing,Wiley Series in Remote Sensing and Image Processing, 2006.
6. Sabins, F.F.Jr, Remote Sensing Principles and Image Interpretation, W.H. Freeman &co,
1978.
Sub Code: IT336A3 Credit:4 (L-3, T-1, P-0)
WIRELESS SENSOR NETWORKS
Questions to be set: 05 (All Compulsory)
Course Objectives: This course provides an introduction to the area of wireless sensor networks. A detailed
study on related technologies and standards ranging from networking, OS support and algorithms,to security will
constitute the syllabus. Its primary concern will be protocol design, communication and computational
challenges posed by Wireless Sensor based networking systems
Pre-requisites: Data Communication, Computer Networks, Knowledge of Ad Hoc WirelessNetworks
desirable.
Course Outcomes: On completion of the course, it is expected to endow the students with skillsto:
1. List and describe the engineering fundamentals of wireless communication applied insensor
network.
2. Identify and relate the complex engineering problem relating to sensor network
architectures and functions.
3. Formulate a solution plan and methodology by Applying appropriate theory, practicesandtools
to the development of wireless sensor network with respect to its applications area.
4. Differentiate and select optimal design scheme suitable for wireless sensor network.
5. Discuss and compare the design principles and implementation of a variety of key sensor networking
protocols and algorithms.
** not more than 20% of total topics to be allotted for assignment
Module Mode Topics Hrs CO PO PSO
**Assignment
Topics
AUGMENTED REALITY
Questions to be set: 05 (All Compulsory)
Course Objectives: The syllabus is aimed to provide students with a solid background in alternative
3D compositing techniques using computer vision with applications in interactive interfaces – most
notably augmented reality interfaces on mobile devices. It also provides students with a comprehensive
knowledgein 3D vision and develop skills in the design and development of interactive augmented
reality games.
Course Outcomes: On successful completion of this course, students will be able to:
1. Develop interactive augmented reality applications for both PC based mobile devices using a
varietyof novel input devices.
2. Describe a knowledge of the research literature in Augmented Reality for both compositing
andinteractive applications.
3. Create environment using AR/VR technology which can help us in our life.
4. It is easy to use this kind of technology to illustrate applications with AR toolkit and mobile AR.
5. Estimate the knowledge of the research literature in Augmented Reality for both compositing
andinteractive applications.
Text Books:
1. Burdea, G. C. and P. Coffet. Virtual Reality Technology, Second Edition. Wiley-IEEE Press,
2003/2006.
2. Alan B. Craig, Understanding Augmented Reality, Concepts and Applications, Morgan
Kaufmann, 2013.
References Books:
1. Alan Craig, William Sherman and Jeffrey Will, Developing Virtual Reality Applications,
Foundations of Effective Design, Morgan Kaufmann, 2009.
Sub Code: IT481A2 Credit: 3(L-3, T-0, P-0)
SCIENCE, TECHNOLOGY AND SOCIETY
Questions to be set: 05 (All Compulsory)
Course Objectives: This course aims to foster an understanding of science as a cultural and societal
practice, exploring its historical, philosophical, and sociological dimensions and the dynamic interplay
between science, technology, and society.
Pre-requisites: Nil
Course Outcomes (CO): On completion of the course it is expected to endow the students with skills to:
**Assignment
Topics
References:
1. A.F. Chalmers (1976) What is this thing called Science? Milton Keynes: The Open University Press
2. T.S. Kuhn (1970) The Structure of Scientific Revolutions. Chicago: Chicago University Press (first
published in 1962).
3. D. Oldroyd (1986) The Arch of Knowledge: An Introductory Study of the Philosophy and Methodology
of Science. New York and London: Methuen.
4. D. Bloor (1991) Knowledge and Social Imagery. Chicago: The University of Chicago Press (first
published in 1976).
5. M. Biagioli ed., (1999) The Science Studies Reader.
Sub Code: IT482A2 Credit: 3(L-3, T-0, P-0)
ESSENCE OF INDIAN TRADITIONAL KNOWLEDGE
Questions to be set: 05 (All Compulsory)
Course Objectives: To facilitate the students with the concepts of Indian traditional knowledge and
to make them understand the Importance of roots of knowledge system.
Pre-requisites: Nil
Course Outcomes (CO): On completion of the course it is expected to endow the students with skills to:
**Assignment
Topics
Module 3: in class A: The Scheduled Tribes and Other Traditional 8 3
Legal Forest Dwellers (Recognition of Forest Rights)
framework and Act, 2006, Plant Varieties Protection and
Traditional Farmers Rights Act, 2001 (PPVFR Act);
Knowledge B: The Biological Diversity Act 2002 and
Rules 2004, the protection of traditional
knowledge
bill, 2016. Geographical indications act 2003
**Assignment
Topics
Module 4: in class Systems of traditional knowledge protection, 6 4
Traditional Legal concepts for the protection of traditional
knowledge and knowledge, Certain non IPR mechanisms of
intellectual traditional knowledge protection, Patents and
property traditional knowledge, Strategies to increase
protection of traditional knowledge, global legal
FORA for increasing protection of Indian
Traditional Knowledge.
**Assignment
Text Books:
1. Traditional Knowledge System in India, by Amit Jha, 2009.
2. Traditional Knowledge System and Technology in India by Basanta Kumar Mohanta and Vipin
Kumar Singh, Pratibha Prakashan 2012.
References:
1. Traditional Knowledge System in India by Amit Jha Atlantic publishers, 2002
2. "Knowledge Traditions and Practices of India" Kapil Kapoor, Michel Danino
Sub Code: IT210A2/ IT210A8 Credit:4 (L-3, T-1, P-0)
INTRODUCTION TO CRYPTOGRAPHY
Questions to be set: 05 (All Compulsory)
Course Objectives: Objectives: The objective of this subject is to understand the principles of
various encryption algorithms including symmetric and public key cryptography. It also deals with
various hashing algorithms and network security mechanisms.
Pre-requisites: Computer Networks.
Course Outcomes (CO): On successful completion of this course, students should be able to:
1. Identify the services, mechanisms, and attacks outlined in the OSI Security Architecture relevant
to information security
2. Explain the principles of symmetric ciphers, including substitution and transposition techniques,
and analyze the strengths and operations of block ciphers and DES.
3. Apply public-key encryption techniques such as RSA and Diffie-Hellman, calculate using basic
number theory, and evaluate digital signature and authentication protocols.
4. Implement secure communication protocols for electronic mail and IP security, and assess the
effectiveness of these security measures.
5. Implement secure communication protocols for electronic mail and IP security, and assess the
effectiveness of these security measures.
** not more than 20% of total topics to be allotted for assignment
Module Mode Topics Hrs CO PO PSO
**Assignment
Topics
**Assignment
Topics
**Assignment
Topics
**Assignment
Topics
Module 5: in class Web Security considerations – Secure Socket and 8 5
Web Security transport layer security – Secure Electronic
Transaction – Viruses and related threats – Firewalls:
Firewall Design Principles
**Assignment
Topics
Text Book
1. Cryptography and Network Security-Principles and Practices, William Stallings, 2003, Pearson Education
Reference Books
**Assign
ment
Topics
Text Books:
1. John R Vacca, “Computer and Information Security Handbook”, 3rd Edition, Elsevier,2013,
ISBN: 9780128038437.
2. Albert Marcella, Jr., DougMenendez, “Cyber Forensics: A Field Manual for Collecting,
Examining, and Preserving Evidence of Computer Crimes”, Second Edition, CRC Group, Taylor
& Francis, ISBN 9780849383281.
3. William Stallings, “Cryptography and Network Security”, Pearson.
Reference Books:
1. George K Kostopoulus, “Cyber space and Cyber Security “, Second Edition, CRCGroup,
Taylor & Francis, ISBN 9781138057715
2. Behrouz A Frouzan, “Cryptography and Network Security”, Tata McGraw Hill.
Sub Code: IT310A2/ IT310A8 Credit:4 (L-3, T-1, P-0)
CYBER SECURITY SOLUTIONS
Questions to be set: 05 (All Compulsory)
Course Objectives: To make aware of existing cybersecurity solutions
Text Books:
1. Computer Network Security Theory and Practice, Jie Wang, ISBN 978-3-540-79697-8
Springer Berlin Heidelberg New York.
2. Cyber Security Solutions, N K Goyal.
Reference Books:
1. Cryptography and Network Security, B.A. Forouzan,2008, MaGraw Hill.
2. Internet Cryptography, Richard E. Smith, 1997, Addison Wesley.
3. Internet Security, Professional Reference, Derek Atkins et al, 1997, TechMedia.
4. Cryptography and Network Security, Atul Kahate, 2007, McGraw Hill.
5. Applied Cryptography, Bruce Schneier, 1995, John Wiley and Sons Inc.
6. Modern Cryptography: Theory and Practice, Wenbo Mao, 2004, Pearson Education.
Sub Code : IT320A2/IT320A8 Credit: 4 (L-3, T-1, P-0)
Cyber Forensics
Questions to be set: 05 (All Compulsory)
Course Objectives: This is a basic undergraduate-level course covers the fundamentals of cyber forensics,
types of forensic systems, evidence collection, cyber law and cyber crime.
Pre-requisites: Nil
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Evaluate various types of computer forensics technologies for uncovering hidden data and identifying malicious
software..
2. Employ a range of cyber forensics tools to investigate digital security systems and analyze case studies.
4. Analyze the basic principles of law as they apply to cyberspace, including jurisdictional issues and legal
precedents.
5. Analyze the concepts of digital signatures, public-key infrastructure, and certification authorities in the context
of cybercrime investigation.
Reference Books:
1. Understanding Cryptography: A Textbook for Students and Practitioners,ChristofPaar, Jan Pelzl, 2010,
Second Edition,Springer.
2. Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers &
IT Security Experts, Ali Jahangiri,First edition, 2009
3. Computer Forensics: Investigating Network Intrusions and Cyber Crime (Ec-Council Press 12 Series:
Computer Forensics),2010
4. “Internet Complete Reference, Harley Hahn, Second Edition, 1996, Osborne/McGraw- Hill
5. Internet and Web design, , Ramesh Bangia Firewall Media, (An imprint of Lakshmi Publications Pvt.
Ltd. ). Second Edition 2006.
6. Cyber Laws Simplified,ViveekSood, Fourth reprint 2008,McGrawHill.
Sub Code: IT410A2/ IT410A8 Credit: 4(L-3, T-1, P-0)
BLOCKCHAIN TECHNOLOGY
Questions to be set: 05 (All Compulsory)
Course Objectives: The syllabus is aimed at giving a basic understanding of cryptocurrency, its
importanceand the use of block chain technology. It is focused on defining the technological backbone
of Bitcoin fundamentals and expands the concepts to building the block chain technology. It guides us
to understand the history of digital currency, the polices involving laws and organizations, the latest
trends, and the communities involved; which facilitates us to construct, visualize and understand the
ecosystem of block chain technology and its environment on which it is deployed.
Pre-requisites: Basics of Cryptography and Economics
Course Outcomes (CO): On completion of the course it is expected to endow the students with skills to:
1. Describe crypto currencies and block chain fundamentals.
2. Explain individual building blocks and understand the working mechanism of any block
chaintechnology.
3. Discover the modern engineering tools, techniques and resources in the field of block chain
technology.
4. Differentiate between different versions of block chain technology.
5. Illustrate use of block chain technology in a broader context like health, banking sector and
identifysecurity concerns in block chain technology.
**Assignment
Topics
Module 4: in class What is it?, Security Implications, 1 PC 1 vote , 9 4
Consensus Environmental, Segwit and Forks, What is a smart
Building, contract? Smart contract legal issues. Regulation
Regulation and and Anonymity: ICO and SEC ruling, its anonymity,
Anonymity Governments regulating bitcoin, Anti Money
Problems with Laundering ,Political Implications on blockchain,
Blockchain Government’s current position and its effects on
blockchain. Anonymity - Zcash, Security and
Safeguards, Protection from attackers, Hacks on
exchanges, What is stopping adoption?, Scalability
problems, Network attacks to destroy Bitcoin, Case
Study: Failed currencies & Blockchain
**Assignment
Topics
Module 5: in class Bitcoin creation and economy, Limited Supply and 5 4,5
Bitcoin and Deflation, Hacks , Ethereum concept and Ethereum
Ethereum classic, Altcoins : Major Altcoins - Zcash, Ripple,
Blockchain NEO Building on the Blockchain - Pros and cons of
applications different implementations , Use cases of the
different types Government, Identity management,
Auto executing contracts, Three signature escrow,
Triple entry accounting, Elections and voting?,
Ethereum Interaction - Smart Contract and Token ,
Languages , How to create your own blockchain.
**Assignment
Topics
Text Books:
1. Arvind Narayanan, Joseph Bonneau, Edward Felten, “Bitcoin and
CryptocurrencyTechnologies: A Comprehensive Introduction”, Kindle
Edition.
2. Andreas M. Antonopoulo,”Mastering Bitcoin: Programming the Open
Blockchain”,2ndEdition, Kindle Edition.
Other References:
1. https://bitcoin.org/bitcoin.pdf
2. http://scet.berkeley.edu/wp-content/uploads/BlockchainPaper.pdf.
3. http://chimera.labs.oreilly.com/books/1234000001802/ch07.html#_introduction_2
4. https://www.evry.com/globalassets/insight/bank2020/bank-2020---block chain-powering-the-
internet-of-value---whitepaper.pdf
Sub Code: IT420A2/ IT420A8 Credit: 4(L-3, T-1, P-0)
ETHICAL HACKING AND DATA PRIVACY
Questions to be set: 05 (All Compulsory)
Course Objectives: The course is focused at understanding and analyzing the behavior of hackers to
learn and evaluate their thought and actions which is aimed at harnessing information and hardware that
they are not authorized to use. It also helps the learner understand the architecture of modern
communication tools and protocols to apprehend their limitations, vulnerability and places of security
issues and concerns. The course introduces the modern practices used by hackers and also reflects on
the countermeasures taken by the system to keep a check on the vulnerabilities it is being exposed to.
**Assignment
Topics
**Assignment
Topics
Text Books:
1. Rafay Baloch,”Ethical Hacking and Penetration Testing Guide”, CRC Press, 2015.
2. Patrick Engebretson,”The Basics of Hacking and Penetration Testing: Ethical Hacking and
PenetrationTesting Made Easy”, Syngress Media, Second Revised Edition, 2013.
Reference Books:
2. Michael T. Simpson, Kent Backman, James E. Corley, “Hands On Ethical Hacking and
NetworkDefense”, Cengage Learning, 2012.
Sub Code: IT219A2/IT219A8 Credit: 4 (L-3, T-1, P-0)
MULTIMEDIA FUNDAMENTALS
1. Understand multimedia data digitization principles of analog signals with encoder and decoder design, and to
become familiar with multimedia data representation for text, images, audio, and video with special emphasis on
PCM speech, and basic concept of broadcast Television.
2. Become acquainted with color fundamentals for images and video signals, digitization formats for video
signals, and the basics of Image processing with special emphasis on filters, binary Image analysis,
processing of 2D images, thresholding, convolution, edge and corner detection, mathematical morphology,
and shape descriptors.
3. Implement various compression algorithms such as Static Huffman Coding, Arithmetic Coding, Lempel-Ziv-
Welsh coding for text compression, and to understand various image compression techniques such as Joint
Photographic Expert Group (JPEG) with special emphasis on Transform Coding.
4. Apply audio and video processing fundamentals with special emphasis on audio compression techniques such
as Pulse Code Modulation (PCM), Differential Pulse Code Modulation (DPCM), Predictive Differential Pulse
Code Modulation, Adaptive Differential Pulse Code Modulation (ADPCM) with subband coding, Perceptual
Coding with special emphasis on sensitivity of the human ear, frequency masking, temporal masking, and key
concepts of Linear Predictive Coding (LPC).
5. Explain basics of multimedia networks, multiplexing technologies in multimedia networks, wired and wireless
networks, multipath fading with special emphasis on various fading models, radio propagation models, and to
become familiar with multimedia network communications and applications with special emphasis on
multimedia communication standards and protocols.
Text Book(s):
1. Ze-Nian Li, Mark S. Drew, Jiangchuan Liu “Fundamentals of Multimedia”, Springer, Third Edition, 2021
Reference Books:
1. P. Havaldar and G. Medioni “Multimedia Systems – Algorithms, Standards and Industry Practices”, Cengage
Learning – First Edition, 2009.
2. W. Burger & M. Burge “Digital Image Processing: An algorithmic introduction using Java”, Springer - Second
Edition, 2016
3. F. Halsall, “Multimedia Communications: Applications, Networks, Protocols, and Standards”, Pearson, 2001.
Sub Code: IT229A2/ IT229A8 Credit: 4(L-3, T-1, P-0)
MOBILE COMPUTING AND COMMUNICATION
Questions to be set: 05 (All Compulsory)
Course Objectives: To introduce the characteristics, basic concepts and systems issues in mobile
computing. To illustrate architecture and protocols in mobile computing and to identify the trends
andlatest development of the technologies in the area. Location of mobile devices, judicious use
of bandwidth, relocation of computation, are some of the key issues which will constitute the topics
for further exploration. To evaluate critical design tradeoffs associated with different mobile
technologies, architectures, interfaces and business models and how they impact the usability,
security, privacy and commercial viability of mobile computing services and applications.
Text Books:
1. Raj Kamal, Mobile Computing, 2/e , Oxford University Press-New Delhi.
2. J. Schiller, “Mobile Communication”, Addison Wesley, 2000.
3. Asoke K Taukder, Roopa R Yavagal, Mobile Computing, Tata McGraw Hill
Pub Co., NewDelhi, 2005.
Reference Books:
1. Reza B'Far (Ed), "Mobile Computing Principles", Cambridge University Press.
2. MukeshSinghal, NiranjanG.Shivaratri, “Advanced Concepts in Operating Systems”, Tata
McGraw- Hill.
Sub Code: IT319A2/ IT319A8 Credit: 4 (L-3, T-1, P-0)
DIGITAL SIGNAL PROCESSING
Course Objectives: This course aims to develop proficiency in analyzing signals and systems in both time
and frequency domains, fostering strong analytical skills in digital filter design, and exploring various
applications of digital signal processing.
Pre-requisites: Calculus
Course Outcomes (CO): Upon successful completion of the course, students should be able to:
1. Illustrate signals, systems and their significance.
2. Analyze the signals using various digital transforms DFT, FFT etc.
3. Design IIR filters with desired frequency responses.
4. Design FIR filters with desired frequency responses.
5. Use MATLAB/OCTAVE software in implementing real-world applications of digital signal
processing.
**Assignment
Topics
Module 2: in Discrete Time Fourier Transform (DTFT), Discrete 8 2
Frequency class Fourier Transform (DFT)
Analysis Discrete Cosine Transform (DCT), Z-Transform,
ROC, Poles & Zeros,
Estimating Power Spectral Density
Frequency analysis of signals and systems using
MATLAB/OCTAVE
**Assignment
Topics
Module 3: in Characterizing Digital Filters: Filter Coefficients, 8 3
Design of IIR class Filter Responses , Zeros and Poles
Filter Introduction to Analog IIR Filters; Design of Digital
IIR Filters & Structures
**Assignment
Topics
Module 4: in class Design of FIR filter using Window and Constrained 8 4
Design of FIR Least-Squares methods, FIR filter structures
Filters **Assignment
Topics
Module 5: in class Basics of Adaptive filters; Real-world applications of 8 5
Adaptive Filters digital signal processing in Engineering using
and DSP MATLAB/OCTAVE
Applications **Assignment
Topics
Text Books:
1. Alan V. Oppenheim, Alan S. Willsky, S. Hamid Nawab (1996).Signals and Systems (2nd ed.). PHI
2. John G Proakis, Dimitris Manolakis (2007). Digital Signal Processing (4th ed. ). Pearson
3. S.K.Mitra (2013). Digital Signal Processing: A Computer - Based Approach (4th edition). McGraw Hill
Education.
Reference Books:
1. K.S. Thyagarajan (2019). Introduction to Digital Signal Processing Using MATLAB with Application to
Digital Communications (1st Edition)Springer
2. Vinay K. Ingle and John G. Proakis (2011). Digital Signal Processing Using MATLAB (3rd Edition). CL
Engineering.
Sub Code: IT329A2/IT329A8 Credit:4 (L-3, T-1, P-0)
Course Objectives: The main objective of this course is to introduce various aspects of multimedia
components like text, images and graphics, audio, sound, and video, and provide the students the fundamental
knowledge of multimedia animation with special emphasis on the use of image and video editing tools with
software.
2. Understand the role played by various multimedia such as images and Graphics.
3. Learn to add pictures, graphics, sound and animation to prepare a project for the web.
Text Books:
1. Tay Vaughan, “Multimedia: Making it Work”, McGraw Hill Professional Ninth Edition, 2014
2. Ranjan Parekh, "Principles of Multimedia", Tata McGraw-Hill, Second Edition, 2012
Reference Books:
1. Ze-Nian Li, Mark S. Drew, Jiangchuan Liu “Fundamentals of Multimedia”, Springer, Third Edition, 2021
2. P. Havaldar and G. Medioni “Multimedia Systems – Algorithms, Standards and Industry Practices”,
Cengage Learning – First Edition, 2009.
Sub Code : IT419A2/ IT419A8 Credit: 4 (L-3, T-1, P-0)
SPEECH PROCESSING
Questions to be set: 05 (All Compulsory)
Course Objectives: The objectives of this course are for students to learn the fundamental theories and
techniques of speech processing. This will be achieved through the mathematical derivation and treatment of
the topics as well as through implementation in programming assignments.
Pre-requisites: Digital Signal Processing
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Identify speech production and classification, demonstrating proficiency in analyzing speech acoustics.
2. Apply windowing, spectral analysis, and time-domain parameters to discriminate speech from silence
and estimate pitch periods using autocorrelation functions.
3. Explain principles of Automatic Speech Recognition (ASR) systems, including Linear Predictive
Analysis and Hidden Markov Models, evaluate systems, and solve implementation issues.
4. Demonstrate proficiency in utilizing homomorphic systems for tasks such as pitch detection and
formant estimation and understanding LP analysis methods.
5. Apply speech enhancement techniques like spectral subtraction, Wiener filtering, and multi-
microphone approaches, understanding Text-to-Speech synthesis and its applications.
Text Books:
1. Richard Szeliski, Computer Vision: Algorithms and Applications, Springer-Verlag London Limited
2011.
2. D. A. Forsyth, J. Ponce, Computer Vision: A Modern Approach, Pearson Education,
2003.
Reference Books:
1. Richard Hartley and Andrew Zisserman, Multiple View Geometry in Computer Vision, Second
Edition, Cambridge University Press, March 2004.
2. K. Fukunaga; Introduction to Statistical Pattern Recognition, Second Edition, Academic Press,
Morgan Kaufmann, 1990.
3. R.C. Gonzalez and R.E. Woods, Digital Image Processing, Addison- Wesley, 1992.
Sub Code: IT429A2/IT429A8 Credit: 4 (L-3, T-1, P-0)
Course Objectives: To introduce to the students the fundamentals of information theory and coding theory
with special emphasis on the concepts of amount of information of a source, entropy of a source, channel
capacity, error-detection and error-correction codes with illustrations of linear block codes, cyclic codes, BCH
codes, convolution codes etc.
Course Outcomes (CO): On successful completion of this course, students will be able to:
1. Explain concept of dependent and independent Sources, measure of information, Entropy, Mutual
information, Entropy Rates of a Stochastic Process.
2. Represent the information using Shannon Encoding, Shannon Fano, Prefix and Huffman Encoding
Algorithms
3. Model the continuous and discrete communication channels using input, output and joint probabilities
4. Determine a codeword comprising of the check bits computed using Linear Block codes, Cyclic Codes,
and Reed-Solomon codes.
5. Design the encoding and decoding circuits for BCH codes, Reed-Solomon codes, and Convolution codes.
Reference Books: