B.sc. Data Science
B.sc. Data Science
,
DATA SCIENCE
SYLLABUS
The course is enabled to include several interdisciplinary areas like: programming languages,
algorithms, operating systems, databases, machine learning, data mining, business intelligence, big
data, probability and statistics, data optimization, statistical simulation and data analysis,
management decision analysis, decision models and predictive analysis. Data Science has gained
paramount importance in the computer science domain. The need for scientists who understand data
in all its aspects will continue to grow strongly. Students graduating from the program will have
significantly more depth and breadth in the broad area of Data Science and receive all the
information they need to work with various kinds of data and statistical data. The program is
designed so that students have in-depth knowledge of the many approaches, aptitudes,
methodologies, and instruments needed to deal with corporate data. Students receive instruction in
the abilities needed to find the needed solutions and assist in making significant judgments.
This is the primary reason the syllabus of Data Science courses includes concepts that touch
base on cloud computing, big data, natural language processing, and data sentiment analysis. The
future of Data Science is estimated to bring opportunities in various areas of banking, finance,
insurance, entertainment, telecommunication, automobile, etc. A data scientist will help grow an
organization by assisting them in making better decisions. Data science has become important due to
recent technology disruptions. Most fundamental is Moore's Law which has driven an exponential
growth in computing, storage, and communications per rupee over the past 50 years. This rate of
growth shows no signs of abating. Consequently, today we have the Internet of Things: a plethora of
sensors costing 10s of rupees or less, a global Internet with almost limitless bandwidth, and
enormous storage in global clouds. The present era is full of technological advances in almost all
spectrum of life and we are flooded with enormous amount of data. There is an increasing demand of
capturing, analyzing, and synthesizing this large amount of data sets in a number of application
domains to better understand various phenomena and to convert the information available in the data
into actionable strategies such as new scientific discoveries, business applications, policy making,
and healthcare etc.
Data science is the area where applications of various tools and techniques from the
disciplines of applied statistics, mathematics and computer science are used to get greater insight and
to make better and informed decisions for various purposes by analyzing a large amount of data.
Consequently, the study of data science as a discipline has become essential to cater the growing
need for professionals and researchers to deal with the future challenges.
LEARNING OUTCOMES-BASED CURRICULUM FRAMEWORK GUIDELINES
BASED REGULATIONS FOR UNDER GRADUATE PROGRAMME
Programme: B.Sc., Data Science
Programme Code:
Semester-II
Semester-IV
Semester-VI
*Part I. II, and Part III components will be separately taken into account for CGPA calculation
and classification for the under graduate programme and the other components. IV, V have
to be completed during the duration of the programme as per the norms, to be eligible for
obtaining the UG degree.
Credit Distribution for all UG courses with LAB Hours
TOTAL 26 30
Semester – VI
Component Course List of courses Credits No. of
code Hrs
Core Course CC XIII 4 6
Part III IoT and Cloud
Technologies
Part III Core Course Lab CC XIV 4 6
IoT and Cloud Technologies Lab
Part III Core Course CC XV 4 6
Artificial Intelligence
Part III Elective Course VII 3 5
(Generic / Discipline Specific)
Refer Annexure II
ANNEXURE I
SUGGESTED TOPICS IN CORE COURSE COMPONENTS
1. Programming in C
2. Programming in C Lab
3. Object Oriented Programming Using C++
4. C++ Programming Lab
5. Software Metrics
6. Machine Learning Lab
7. Mobile Application Development
8. Mobile Application Development Lab
9. Software Project Management
10. Software Engineering Lab and more..
ANNEXURE I
SUGGESTED TOPICS IN GENERIC ELECTIVES
1. Discrete Mathematics – I
2. Discrete Mathematics – II
3. Numerical Methods – I
4. Numerical Methods – II
5. Mathematical Statistics – I
6. Mathematical Statistics – II
7. Electronics Science
8. Nanotechnology
9. Optimization Technique / Operational Research
10. Introduction to Linear Algebra
11. Graph Theory and Its Applications
12. Digital Logic Fundamentals
13. Microprocessor & Micro Controller
ANNEXURE I
DISCIPLINE SPECIFIC ELECTIVE
ANNEXURE II
SKILL ENCHANCEMENT
1 INTRODUCTION TO HTML
2 OFFICE AUTOMATION
3 QUALITATIVE APTITUDE
4 CYBER FORENSICS
5 MULTIMEDIA SYSTEMS
6 SOFTWARE TESTING
7 DATA MINING AND WAREHOUSING
8 BIO METRICS
10 WEB TECHNOLOGY
11 ROBOTICS AND APPLICATIONS
12 SIMULATION AND MODELING
13 PATTERN RECOGNITION
14 ADVANCED EXCEL
15 OPEN SOURCE SOFTWARE TECHNOLOGIES
16 PHP PROGRAMMING
17 NETWORK SECURITY
18 IMAGE PROCESSING and more…
FIRST YEAR –SEMESTER- I
Category
Credits
Code
Exter
Total
CIA
nal
PYTHON CC 5 - - I 4 25 75 100
PROGRAMMING I
Learning Objectives
LO1 To make students understand the concepts of Python programming.
LO2 To apply the OOPs concept in PYTHON programming.
LO3 To impart knowledge on demand and supply concepts
LO4 To make the students learn best practices in PYTHON programming
LO5 To know the costs and profit maximization
UNI Contents No.
T of
Hour
s
I Basics of Python Programming: History of Python-Features of
Python-Literal-Constants-Variables - Identifiers–Keywords-Built-in
Data Types-Output Statements – Input Statements-Comments – 15
Indentation- Operators-Expressions-Type conversions. Python
Arrays: Defining and Processing Arrays – Array methods.
TOTAL HOURS 75
Develop program using selection statement, Work with PO1, PO2, PO3,
CO2 Looping and jump statements, Do programs on Loops and jump PO4, PO5, PO6
statements.
Concept of function, function arguments, Implementing the
CO3 PO1, PO2, PO3,
concept strings in various application, Significance of
PO4, PO5, PO6
Modules, Work with functions, Strings and modules.
CO4 Work with List, tuples and dictionary, Write program using list, PO1, PO2, PO3,
tuples and dictionary. PO4, PO5, PO6
CO5 Usage of File handlings in python, Concept of reading and PO1, PO2, PO3,
writing files, Do programs using files. PO4, PO5, PO6
Textbooks
1 Reema Thareja, “Python Programming using problem solving approach”, First
Edition, 2017, Oxford University Press.
2 Dr. R. Nageswara Rao, “Core Python Programming”, First Edition, 2017, Dream
tech Publishers.
Reference Books
1. VamsiKurama, “Python Programming: A Modern Approach”, Pearson Education.
2. Mark Lutz, ”Learning Python”, Orielly.
3. Adam Stewarts, “Python Programming”, Online.
4. Fabio Nelli, “Python Data Analytics”, APress.
5. Kenneth A. Lambert, “Fundamentals of Python – First Programs”, CENGAGE
Publication.
Web Resources
1. https://www.programiz.com/python-programming
2. https://www.guru99.com/python-tutorials.html
3. https://www.w3schools.com/python/python_intro.asp
4. https://www.geeksforgeeks.org/python-programming-language/
5. https://en.wikipedia.org/wiki/Python_(programming_language)
Credits
Code
Exter
Total
CIA
nal
PYTHON LAB CCII - - 5 I 4 2 7 100
5 5
Course Objectives:
Course Outcomes
On completion of this course, students will
Demonstrate the understanding of syntax and semantics of
CO1
Identify the problem and solve using PYTHON programming techniques.
CO2
Identify suitable programming constructs for problem solving.
CO3
Analyze various concepts of PYTHON language to solve the problem in an
CO4 efficient way.
CO5 Develop a PYTHON program for a given problem and test for its correctness.
Category
Credits
Code
Exter
Total
CIA
nal
FUNDAMENTALS OF SEC 2 - - I 2 25 75 10
INFORMATION –I 0
TECHNOLOGY NME
Learning Objectives
LO1 Understand basic concepts and terminology of information technology.
LO2 Have a basic understanding of personal computers and their operation
LO3 Be able to identify data storage and its usage
LO4 Get great knowledge of software and its functionalities
LO5 Understand about operating system and their uses
UNI Contents No. Of.
T Hours
I Introduction to Computers:
Introduction, Definition, .Characteristics of computer, Evolution
of Computer, Block Diagram Of a computer, Generations of 6
Computer, Classification Of Computers, Applications of
Computer, Capabilities and limitations of computer
IV Software:
Software and its needs, Types of S/W. System Software:
Operating System, Utility Programs Programming Language:
Machine Language, Assembly Language, High Level Language 6
their advantages & disadvantages. Application S/W and its
types: Word Processing, Spread Sheets Presentation, Graphics,
DBMS s/w
V Operating System:
Functions, Measuring System Performance, Assemblers,
Compilers and Interpreters. Batch Processing,
6
Multiprogramming, Multi Tasking, Multiprocessing, Time
Sharing, DOS, Windows, Unix/Linux.
TOTAL HOURS 30
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Learn the basics of computer, Construct the structure of the PO1, PO2,
CO1 required things in computer, learn how to use it. PO3, PO4,
PO5, PO6
Develop organizational structure using for the devices present PO1, PO2,
CO2 currently under input or output unit. PO3, PO4,
PO5, PO6
Concept of storing data in computer using two header namely PO1, PO2,
CO3 RAM and ROM with different types of ROM with advancement PO3, PO4,
in storage basis. PO5, PO6
Work with different software, Write program in the software and PO1, PO2,
CO4 PO3, PO4,
applications of software.
PO5, PO6
Usage of Operating system in information technology which PO1, PO2,
CO5 really acts as a interpreter between software and hardware. PO3, PO4,
PO5, PO6
Textbooks
1 Anoop Mathew, S. Kavitha Murugeshan (2009), “ Fundamental of Information
Technology”, Majestic Books.
Reference Books
1. Bhardwaj Sushil Puneet Kumar, “Fundamental of Information Technology”
2. GG WILKINSON, “Fundamentals of Information Technology”, Wiley-Blackwell
3. A Ravichandran , “Fundamentals of Information Technology”, Khanna Book
Publishing
Web Resources
1. https://testbook.com/learn/computer-fundamentals
2. https://www.tutorialsmate.com/2020/04/computer-fundamentals-tutorial.html
3. https://www.javatpoint.com/computer-fundamentals-tutorial
4. https://www.tutorialspoint.com/computer_fundamentals/index.htm
5. https://www.nios.ac.in/media/documents/sec229new/Lesson1.pdf
Category
Credits
Code
Exter
Total
CIA
nal
PROBLEM SOLVING FC 2 - - I 2 25 75 10
TECHNIQUES 0
Learning Objectives
LO1 Familiarize with writing of algorithms, fundamentals of C and philosophy of problem
solving.
LO2 Implement different programming constructs and decomposition of problems into
functions.
LO3 Use data flow diagram, Pseudo code to implement solutions.
LO4 Define and use of arrays with simple applications
LO5 Understand about operating system and their uses
UNI Contents No. Of. Hours
T
I Introduction: History, characteristics and limitations of 6
Computer. Hardware/Anatomy of Computer: CPU,
Memory, Secondary storage devices, Input Devices and
Output devices. Types of Computers: PC, Workstation,
Minicomputer, Main frame and Supercomputer. Software:
System software and Application software. Programming
Languages: Machine language, Assembly language, High-
level language,4 GL and 5GL-Features of good
programming language. Translators: Interpreters and
Compilers.
II Data: Data types, Input, Processing of data, Arithmetic 6
Operators, Hierarchy of operations and Output. Different
phases in Program Development Cycle (PDC).Structured
Programming: Algorithm: Features of good algorithm,
Benefits and drawbacks of algorithm. Flowcharts:
Advantages and limitations of flowcharts, when to use
flowcharts, flowchart symbols and types of flowcharts.
Pseudocode: Writing a pseudocode. Coding, documenting
and testing a program: Comment lines and types of errors.
Program design: Modular Programming.
III Selection Structures: Relational and Logical Operators -
Selecting from Several Alternatives – Applications of
Selection Structures. Repetition Structures: Counter 6
Controlled Loops –Nested Loops– Applications of
Repetition Structures.
IV Data: Numeric Data and Character Based Data. Arrays:
One Dimensional Array - Two Dimensional Arrays – 6
Strings as Arrays of Characters.
V Data Flow Diagrams: Definition, DFD symbols and types
of DFDs. Program Modules: Subprograms-Value and
Reference parameters- Scope of a variable - Functions –
6
Recursion. Files: File Basics-Creating and reading a
sequential file- Modifying Sequential Files.
TOTAL HOURS 30
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Study the basic knowledge of Computers. PO1, PO2,
CO1 Analyze the programming languages. PO3, PO4,
PO5, PO6
Study the data types and arithmetic operations. PO1, PO2,
CO2 Know about the algorithms. PO3, PO4,
Develop program using flow chart and pseudocode. PO5, PO6
Determine the various operators. PO1, PO2,
CO3 Explain about the structures. PO3, PO4,
Illustrate the concept of Loops PO5, PO6
Study about Numeric data and character-based data. PO1, PO2,
CO4 Analyze about Arrays. PO3, PO4,
PO5, PO6
Explain about DFD PO1, PO2,
CO5 Illustrate program modules. PO3, PO4,
Creating and reading Files PO5, PO6
Textbooks
1 Stewart Venit, “Introduction to Programming: Concepts and Design”, Fourth
Edition, 2010, Dream Tech Publishers.
Web Resources
1. https://www.codesansar.com/computer-basics/problem-solving-using-computer.htm
2. http://www.nptel.iitm.ac.in/video.php?subjectId=106102067
3. http://utubersity.com/?page_id=876
Weightage of course 15 14 14 15 15 14
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Credits
Code
Exter
Total
CIA
nal
DATA CC 5 - - II 4 25 75 100
STRUCTURES AND III
ALGORITHMS
Learning Objectives
LO1 Understand the meaning asymptotic time complexity analysis and various data
structures
LO2 To enhancing the problem solving skills and thinking skills
LO3 To write efficient algorithms and Programs
LO4 To make the students learn best practices in PYTHON programming
LO5 To understand how to handle the files in Data Structure
UNIT Contents No. Of.
Hours
I Arrays and ordered Lists Abstract data types – asymptotic
notations – complexity analysis- Linked lists: Singly linked list
– doubly linked lists - Circular linked list, General lists- stacks 15
– Queues – Circular Queues – Evaluation of expressions
II Trees and Graphs Trees – Binary Trees – Binary Tree
Traversal – Binary Tree Representations – Binary Search Trees
- threaded Binary Trees - Application of trees (Sets). 15
Representation of Graphs – Graph implementation – graph
Traversals - Minimum Cost Spanning Trees – Shortest Path
Problems-Application of graphs
III Searching and Sorting Sorting – Bubble Sort, Insertion Sort,
Quick Sort, Merge Sort, Selection Sort. Searching – Linear search, 15
Binary search
IV Greedy Method and Dynamic programming Greedy Method:
Knapsack problem– Job Sequencing with deadlines – Optimal
storage on tapes. General method – Multistage Graph Forward
Method– All pairs shortest path – Single source shortest path – 15
Search Techniques for Graphs – DFS – Connected Components –
Bi-Connected Components
V Backtracking General Method – 8-Queen‟s – Sum Of Subsets –
Graph Colouring – Hamiltonian Cycles – Branch And Bound:
General Method – Travelling Sales Person Problem 15
TOTAL HOURS 75
Textbooks
1 Seymour Lipshutz(2011),Schaum‟s Outlines - Data Structures with C, Tata McGraw
Hill publications.
2 Ellis Horowitz and SartajSahni (2010), Fundamentals of Computer Algorithms,
Galgotia Publications Pvt., Ltd.
3 Dr. K. Nagesware Rao, Dr. Shaik Akbar, ImmadiMurali Krishna, Problem Solving
and Python Programming(2018)
Reference Books
1. Gregory L.Heileman(1996), Data Structures, Algorithms and Object-Oriented
Programming, McGraw Hill International Edition, Singapore.
2. A.V.Aho, J.D. Ullman, J.E.Hopcraft(2000). Data Structures and Algorithms, Addison
Wesley Publication.
3. Ellis Horowitz and SartajSahni, Sanguthevar Raja sekaran (2010) ,Fundamentals of
Computer Algorithms, Galgotia Publications Pvt.Ltd.
Web Resources
1. https://www.tutorialspoint.com/data_structures_algorithms/index.htm
2. https://www.programiz.com/dsa
3. https://www.geeksforgeeks.org/learn-data-structures-and-algorithms-dsa-tutorial/
Credits
Code
Exter
Total
CIA
nal
DATASTRUCTURES CC IV - - 5 I 4 25 75 100
ANDALGORITHMS I
LAB
Objectives
To predict the performance of different algorithms in order to guide design decisions,
provide theoretical estimation for the required resources of an algorithm to solve a specific
computational problem
Category
Credits
Code
Exter
Total
CIA
nal
COMPUTER SEC 2 - - II 2 25 75 10
FUNDAMENTALS -2 0
Learning Objectives
LO1 Discuss the Introduction about Computer and its Components.
LO2 To Perform the Microsoft Word, Excel, PowerPoint and its operations.
LO3 To get Knowledge about the Internet and Intranet
LO4 Insert heading levels within a web page.
LO5 Insert ordered and unordered lists within a web page. Create a web page.
UNI Contents No. Of.
T Hours
I Introduction to Computers - Generations of Computer – Data and
Information – Components of Computer – Software – Hardware – Input 6
Devices - Output Devices –– Types of Operating System.
II MS Word: Introduction – Elements of Window – Files, Folders and
Directories – Text Manipulating: Cut, Copy, Paste, Drag and Drop –
Text Formatting: Font – Style, Size, Face and Colors (Both foreground
6
and background) – Alignment - Bullets and Numbering - Header and
footer- watermark – inserting objects (images, other application
document) – Table creation – Mail merge.
III Ms Excel: Introduction – Inserting rows and columns – Sizing rows and
columns – Implementing formulas – Generating series - Functions in
6
excel – Creation of Chart – Inserting objects – Filter – Sorting –
Inserting worksheet.
IV MS PowerPoint: Introduction – Slides Manipulation (Inserting new, 6
Copy, paste, delete and duplicate slides) – Slide show– Types of Views
– Types of Animations – Inserting Objects – Implementing multimedia
(Video and Audio) – Templates (Built-in and User-Defined).
V Internet: Introduction to Internet and Intranet – Services of Internet -
Domain Name – URL – Browser – Types of Browsers – Search Engine
- E-Mail – Basic Components of E-Mail –.How to send group mail. E-
6
Commerce: Digital Signature – Digital Currency – Online shopping and
transaction.
TOTAL HOURS 30
2. https://www.tutorialspoint.com/basics_of_computers/index.htm
3. https://www.tutorialspoint.com/word/index.htm
4. https://www.tutorialspoint.com/excel/index.htm
5. https://www.tutorialspoint.com/powerpoint/index.htm
Category
Credits
Code
Exter
Total
CIA
nal
DATA SCIENCE CC 5 - - II 4 25 75 10
V I 0
Learning Objectives
LO1 To understand the basic concepts of Data Science
LO2 To understand the principles of algorithms, flowchart and source code
LO3 To acquire a solid foundation in Python.
LO4 To visualize data using plots in python
LO5 To understand and handle database and visualize.
UNI Contents No. Of.
T Hours
I Introduction to Data Science Introduction: Data Science - Big Data and
Data Science hype – getting past the hype - Datafication - Current
landscape of perspectives - Skill sets needed - Statistical Inference -
Exploratory Data Analysis and the Data Science Process - Basic tools 15
(plots, graphs and summary statistics) of EDA – Applications of Data
Science - Data Science in Business - Business Intelligence vs Data
Science – Data Analytics Life Cycle - Machine Learning
II Introduction to Python Features of Python - How to Run Python –
Identifiers- Reserved Keywords- Variables - Comments in Python -
Indentation in Python - Multi-Line Statements- Input, Output and Import
Functions- Operators. Data Types and Operations: Numbers -Strings -List
15
-Tuple - Set -Dictionary - Mutable and Immutable Objects - Data Type
Conversion. Flow Control: Decision Making-Loops-Nested Loops-
Control Statements- Types of Loops-List Comprehensions-Set
Comprehensions-Dictionary Comprehensions-Nested Dictionaries.
III Functions Function Definition - Function Calling - Function Arguments - 15
Anonymous Functions (Lambda Functions) - Recursive Functions -
Modules and Packages: Built-in Modules - Creating Modules - import
Statement- Namespaces and Scope - The dir() function - The reload()
function -Packages in Python - Date and Time Modules – Numpy
Libraries and Data Manipulation Using Pandas
IV File Handling and Object Oriented Programming Opening a File-
Closing a File - Writing to a File - Reading from a File - File Methods -
Renaming a File - Deleting a File - Directories in Python. Regular
Expressions. Class Definition - Creating Objects - Built-in Attribute 15
Methods - Built-in Class Attributes - Destructors in Python -
Encapsulation - Data Hiding – Inheritance-Method Overriding –
Polymorphism - Exception Handling
V Database Programming and Visualizations Connecting to a Database -
Creating Tables - INSERT Operation - UPDATE Operation - DELETE
Operation - READ Operation - Transaction Control -Disconnecting from
a Database - Exception Handling in Databases - GUI Programming - CGI 15
Programming- Data Visualizations using Matplotlib – histograms, bar
charts, pie charts.
TOTAL HOURS 75
2 Big Data Analytics, paperback 2nd ed., Seema Acharya, SubhasiniChellappan, Wiley
CO 1 3 2 3 3 3 3
CO 2 3 3 3 3 3 3
CO 3 3 3 3 3 3 3
CO 4 3 3 3 3 3 3
CO 5 2 3 3 3 3 3
Weightage of course 14 14 15 15 15 15
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Credits
Code
Exter
Total
CIA
nal
DATA SCIENCE LAB CC - - 4 II 4 25 75 10
VI I 0
OBJECTIVES:
To build websites and software, automate tasks, and conduct data analysis.Open Source and
Community Development.
Require
d Hours
LIST OF PROGRAMS 60
1. Demonstrate the working of “id” and “type” functions.
2. Find all prime numbers within a given range.
3. Print n terms of Fibonacci series using iteration.
4. Demonstrate use of slicing in string.
5. Compute the frequency of the words from the input. The output should output
after sorting thekey alphanumerically.
6. Write a program that accepts a comma separated sequence of words as input
and prints thewords in a comma-separated sequence after sorting them
alphabetically.
7. Demonstrate use of list & related functions.
8. Demonstrate use of Dictionary & related functions.
9. Demonstrate use of tuple & related functions.
10. Implement stack using list.
11. Implement queue using list.
12. Read and write from a file.
13. Copy a file.
14. Demonstrate working of classes and objects.
15. Demonstrate class method & static method.
16. Demonstrate constructors.
17. Demonstrate inheritance.
18. Demonstrate aggregation/composition.
19. Create a small GUI application for insert, update and delete in a table.
20. Bar charts, histograms and pie charts
CO 1 3 2 3 3 3 3
CO 2 3 3 3 3 3 3
CO 3 3 3 3 3 3 3
CO 4 3 3 3 3 3 3
CO 5 2 3 3 3 3 3
Weightage of course 14 14 15 15 15 15
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Credits
Code
Exter
Total
CIA
nal
ECOMMERCE SEC 2 - - II 1 25 75 10
4 I 0
Learning Objectives
LO1 Understanding of the foundations and importance of E-commerce
LO2 Understanding of retailing in E-commerce by in terms of branding and pricing
strategies and determining the effectiveness of market research.
LO3 Assess the Internet trading relationships including Business to Consumer, Business-
to-Business, Intra-organizational.
LO4 Knowing key features of Internet, Intranets and Extranets and how they relate to each
other.
LO5 Understanding legal issues and privacy in E-Commerce.
UNI Contents No. Of.
T Hours
I E-Commerce: E-Commerce Framework – E-Commerce and Media
Convergence – The anatomy of E-commerce applications - E-Commerce 6
Consumer Applications - E- Commerce Organization Applications.
II The Internet: The Internet Terminology – NSFNET – Architecture and
Components– National Research and Education Network – Internet
Governance – An overview of Internet Applications. The Business of 6
Internet Commercialization: Telco/Cable/Online companies - National
Independent ISPs – Regional level ISPs – Local level ISPs.
III E-Commerce and the World Wide Web: Architectural Framework for
E-commerce – WWW as the architecture – Technology behind the web 6
– Security and the web.
IV Electronic Payment Systems: Types of Electronic Payment Systems
– Digital token Electronic Payment Systems – Credit Card Based
6
Electronic Payment Systems – Risk and Electronic Payment Systems.
Electronic Data Interchange: Legal, Security and Privacy issues.
V Advertising and Marketing on the Internet: E-Commerce Catalogs
– Information Filtering – Consumer Data Interface – Emerging tools.
Software Agents: Characteristics and Properties of Software Agents –
Technology behind Software Agents - Applets, Browsers, and Software 6
Agents.
TOTAL HOURS 30
Reference Books
1.
EfraimTurvanJ.Lee, David Kug and Chung, “Electronic Commerce”, Pearson
Education, Asia.
Web Resources
1.
https://www.the-reference.com/en/expertise/creation-and.../e-commerce
1. https://en.wikipedia.org/wiki/E-commerce
2.
2. https://www.tutorialspoint.com/e_commerce/index.htm
3.
Weightage of course 15 14 14 14 14 15
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
C
ject
redits
Exter
Total
atego
CIA
nal
Co
ry
de
OBJECT CC 5 - - IV 4 25 75 100
ORIENTED VII
PROGRAMMING
WITH JAVA
Learning Objectives
LO1 Object Oriented Programming with Java.
LO2 Apply the OOPs concept in JAVA programming.
LO3 Become proficient programmers through the java programming language.
LO4 Give insight into real world applications.
LO5 Get the attentions of users in user interface using graphics
UNIT Contents No. Of.
Hours
I Introduction: Introduction to Java-Features of Java-Object
Oriented Concepts-Software Evolution – Software
Development, SDLC Models – SDLC steps – Software
Testing – Software Quality – Lexical Issues-Data Types –
15
Variables – Arrays – Operators – Control Statements –
Classes – Objects –Constructors – Overloading method –
Access control – static and fixed methods – Inner classes –
Inheritance-Overriding Methods-Using super-Abstract class.
II Packages & Threads: Packages-Access Protection-
Importing Packages-Interfaces-Exception Handling-Throw
and Throws- Thread-Synchronization-Messaging- Runnable 15
Interface-Inter thread communication-Deadlock-suspending,
resuming and stopping threads-Multithreading
III Input/Output & Collection API: I/O Streams-File Streams-
String Objects-String Buffer-Char Array – Java Utilities-
15
Collections interface – Collection classes-Enumeration –
Vector –Stack –Hash tables – String class.
IV Networking: Networking –Networking basics – java and the
Net – Inet Address- TCP/IP Client Sockets –URL- URL 15
Connection – TCP/IP Server Sockets – Datagrams.
V Graphical User Interface in Java: Working with windows
using AWT Classes – Class Hierarchy of Window and Panel –
AWT controls – Layout Managers – Menus- Menu bars -
Dialog Boxes- File Dialog- Applets-Lifecycle of Applet-Types 15
of Applets-Event handling-Applet tags - JDBC and connecting
to Databases – CRUD operations.
TOTAL HOURS 75
Textbooks
1 P.Naughton and H.Schildt(1999), Java 2 (The Complete Reference), Third Edition,
Tata MCGraw Hill Edition
2 K.K. Aggarwal &Yogesh Sing (2008), Software Engineering, Revised Third Edition, New
Age International Publishers.
Reference Books
1 Cay S. Horstmann, Gary Cornell(2012), Core Java 2 Volume I, Fundamentals- Ninth Edition Addision
. Wesley
2 K.Arnold and J.Gosling, The Java Programming Language- Second Edition, ACM Press/Addison-
. Wesley Publishing Co. New York
Web Resources
1 https://www.w3schools.com/java/java_oop.asp#:~:text=OOP%20provides%20a%20clear
. %20structure,code%20and%20shorter%20development%20time
2 https://www.geeksforgeeks.org/object-oriented-programming-oops-concept-in-java/
.
3 https://www.javatpoint.com/java-oops-concepts
.
4 https://www.coursera.org/learn/object-oriented-java
.
5 https://docs.oracle.com/javase/tutorial/java/concepts/index.html
.
Weightage of course 15 15 14 15 14 15
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Category
Credits
Code
Exter
Total
CIA
nal
OBJECT ORIENTED CC - - 4 I 4 25 75 10
PROGRAMMING WITH VIII V 0
JAVA LAB
Learning Objectives:
1. Use an integrated development environment to write, compile, run, and test simple
object-oriented Java programs.
2. Read and make elementary modifications to Java programs that solve real-world
problems.
3. Be able to create an application using string concept.
4. Be able to create a program using files in application.
5. Be able to create an Applet to create an application.
Required Hour
Lab Exercises: 60
1. Program using Class and Object.
2. Program using Constructors.
3. Program using Command-Line Arguments.
4. Program using Random Class.
5. Program using Vectors.
6. Program using String Tokenizer Class.
7. Program using Interface.
8. Program using all forms of Inheritance.
9. Program using String class.
10. Program using String Buffer class.
11. Program using Exception Handling.
12. Implementing Thread based applications
13. Program using Packages.
14. Program using Files.
Applets:
15. Working with Colors and Fonts.
16. Parameter passing technique.
17. Drawing various shapes using Graphical statements.
18. Usage of AWT components and Listener in suitable
applications.
CO 1 3 3 3 3 3 3
CO 2 3 3 3 3 3 3
CO 3 3 3 2 3 3 2
CO 4 3 3 3 3 3 3
CO 5 3 2 3 3 2 3
Weightage of course 15 14 14 15 14 14
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Credits
Code
Exter
Total
y
CIA
nal
RELATIONAL CC 6 - - V 4 25 75 10
DATABASE IX 0
MANAGEMENT SYSTEM
Learning Objectives
LO1 To understand the different issues involved in the design and implementation of a
database system.
LO2 To study the physical and logical database designs, database modeling, relational,
hierarchical, and network models
LO3 To understand and use data manipulation language to query, update, and manage a
database
LO5 To design and build a simple database system and demonstrate competence with
the fundamental tasks involved with modeling, designing, and implementing a
DBMS.
TOTAL HOURS 90
Textbooks
1 Pranab Kumar Das Gupta and P. Radha Krishnan, “Database Management
System Oracle SQL and PL/SQL”, Second Edition, 2013, PHI Learning Private
Limited.
Reference Books
1 RamezElmasri and Shamkant B. Navathe, “Fundamentals of Database
Systems”, Seventh Edition, Pearson Publications.
Web Resources
1 http://www.amazon.in/DATABASE-MANAGEMENT-SYSTEM-ORACLE-SQLebook/dp/
B00LPGBWZ0#reader_B00LPGBWZ0
CO 1 3 3 3 3 3 2
CO 2 3 3 3 2 3 3
CO 3 3 3 3 3 3 3
CO 4 2 3 3 3 3 3
CO 5 3 3 3 3 3 3
Weightage of course 14 15 15 14 15 14
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Category
Credits
Code
Exter
Total
CIA
nal
RDBMS LAB USING CC - - 5 V 4 25 75 10
ORACLE X 0
Learning Objectives:
LAB EXERCISES:
SQL:
1. DDL commands.
2. Specifying constraints-Primary Key, Foreign Key, Unique, Check, Not Null.
3. DML commands.
4. Set Operations.
5. Joins.
6. Sub-queries.
PL/SQL:
7. Control Constructs.
8. Exception Handlers.
9. Implicit Cursor.
10. Explicit Cursor.
11. Procedures.
12. Functions.
13. Triggers.
14. TCL Commands usage (Commit, Rollback, Savepoint)
Course Outcomes
CO On completion of this course, students will
To demonstrate the characteristics of Database Management Systems.
CO1 To study about the concepts and models of database.
To impart the concepts of System Development Life Cycle and E-R Model.
To classify the keys and the concepts of Relational Algebra.
CO2 To impart the applications of various Normal Forms
Classification of Dependency.
To elaborate the different types of Functions and Joins and their applications.
CO3 Introduction of Views, Sequence, Index and Procedure.
Representation of PL-SQL Structure.
CO4 To impart the knowledge of Sub Programs, Functions and Procedures.
Representation of Exception and Pre-Defined Exception.
CO5 To Point out the Importance of Triggers, Implicit and Explicit Cursors.
CO 1 3 3 3 3 3 2
CO 2 3 3 3 2 3 3
CO 3 3 3 3 3 3 3
CO 4 2 3 3 3 3 3
CO 5 3 3 3 3 3 3
Weightage of course 14 15 15 14 15 14
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Credits
Code
Exter
Total
y
CIA
nal
MACHINE LEARNING CC 5 - - V 4 25 75 10
XI 0
Learning Objectives
LO1 To Learn about Machine Intelligence and Machine Learning applications
LO2 To implement and apply machine learning algorithms to real-world applications
LO3 To identify and apply the appropriate machine learning technique to classification,
pattern recognition, optimization and decision problems
LO4 To create instant based learning
LO5 To apply advanced learning
UNIT Contents No. Of.
Hours
I Introduction Machine Learning - Difference between AI, Machine
15
Learning and Big data. Supervised and unsupervised learning,
parametric vs non-parametric models, parametric models for
classification and regression- Linear Regression, Logistic Regression,
Naïve Bayes classifier, simple non-parametric classifier-K-nearest
neighbour, support vector machines
II Neural networks and genetic algorithms Neural Network
Representation – Problems – Perceptions – Multilayer Networks and
Back Propagation Algorithms – Advanced Topics – Genetic Algorithms 15
– Hypothesis Space Search – Genetic Programming – Models of
Evaluation and Learning.
III Bayesian and computational learning Bayes Theorem – Concept
Learning – Maximum Likelihood – Minimum Description Length
Principle – Bayes Optimal Classifier – Gibbs Algorithm – Naïve Bayes
15
Classifier – Bayesian Belief Network – EM Algorithm – Probability
Learning – Sample Complexity – Finite and Infinite Hypothesis Spaces
– Mistake Bound Model.
IV Instant based learning K- Nearest Neighbour Learning – Locally
15
weighted Regression – Radial Basis Functions – Case Based Learning.
V Advanced learning Recommendation systems – opinion mining,
sentiment analysis. Learning Sets of Rules – Sequential Covering
Algorithm – Learning Rule Set – First Order Rules – Sets of First Order
Rules – Induction on Inverted Deduction – Inverting Resolution –
15
Analytical Learning – Perfect Domain Theories – Explanation Base
Learning – FOCL Algorithm – Reinforcement Learning – Task – Q-
Learning – Temporal Difference Learning.
TOTAL HOURS 75
Reference Books
1. EthemAlpaydin, ―Introduction to Machine Learning (Adaptive Computation and
Machine Learning), The MIT Press 2004.
2 Stephen Marsland, ―Machine Learning: An Algorithmic Perspective, CRC Press,
2009.
CO 1 3 3 3 3 3 3
CO 2 3 3 3 3 2 3
CO 3 3 3 3 3 3 3
CO 4 3 3 2 3 3 3
CO 5 3 3 3 3 3 2
Weightage of course 15 15 14 15 14 14
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Credits
Code
Exter
Total
CIA
nal
Reference Books
1. Ronald L. Krutz and Russell Dean Vines(2010), Cloud Security, Wiley – India
CO 1 3 3 3 3 3 2
CO 2 3 3 3 3 3 3
CO 3 3 3 3 3 3 3
CO 4 3 3 3 3 2 3
CO 5 3 2 3 3 3 3
Weightage of course 15 14 15 15 14 14
contributed to each PSO
S-Strong-3 M-Medium-2 L-Low-1
Credits
Code
Exter
Total
CIA
nal
LIST OF PROGRAMS
1. Familiarization with Arduino/Raspberry Pi and perform necessary software installation.
2. To interface LED/Buzzer with Arduino/Raspberry Pi and write a program to turn ON LED for
1 sec after every 2 seconds.
3. To interface Push button/Digital sensor (IR/LDR) with Arduino/Raspberry Pi and write a
program to turn ON LED when push button is pressed or at sensor detection.
4. To interface DHT11 sensor with Arduino/Raspberry Pi and write a program to print
temperature and humidity readings.
5. To interface motor using relay with Arduino/Raspberry Pi and write a program to turn ON
motor when push button is pressed.
6. To interface OLED with Arduino/Raspberry Pi and write a program to print temperature and
humidity readings on it.
7. To interface Bluetooth with Arduino/Raspberry Pi and write a program to send sensor data to
smart phone using Bluetooth.
8. To interface Bluetooth with Arduino/Raspberry Pi and write a program to turn LED ON/OFF
when “1”/”0” is received from smart phone using Bluetooth.
9. Write a program on Arduino/Raspberry Pi to upload temperature and humidity data to thing
speak cloud.
10. Write a program on Arduino/Raspberry Pi to retrieve temperature and humidity data from
thing speak cloud.
11. To install MySQL database on Raspberry Pi and perform basic SQL queries.
12. Write a program on Arduino/Raspberry Pi to publish temperature data to MQTT broker.
13. Write a program on Arduino/Raspberry Pi to subscribe to MQTT broker for temperature data
and print it.
14. Write a program to create TCP server on Arduino/Raspberry Pi and respond with humidity
data to TCP client when requested.
15. Write a program to create UDP server on Arduino/Raspberry Pi and respond with humidity
data to UDP client when requested.
Course Outcomes
CO On completion of this course, students will
Design an IoT system with cloud infrastructure.
CO1
CO 1 3 3 3 3 3 3
CO 2 3 3 3 2 3 3
CO 3 3 3 3 3 3 3
CO 4 3 3 2 2 2 3
CO 5 3 2 3 3 3 3
Weightage of course 15 14 14 13 14 15
contributed to each PSO
Credits
Code
Exter
Total
CIA
nal
ARTIFICIAL CC 5 - - V 4 25 75 10
INTELLIGENCE XV I 0
Learning Objectives
LO1 Describe the concepts of Artificial Intelligence
LO2 Understand the method of solving problems using Artificial Intelligence
LO3 Understand natural language processing
LO4 Introduce the concept of Expert system, Fuzzy logic
LO5 Understand about operating system and their uses
UNI Contents No. Of.
T Hours
I Introduction to Artificial Intelligence What is Artificial Intelligence? 15
AI Technique, Representation of a problem as State space search,
production systems, Problem characteristics, Production System
characteristics – Issues in the design of search programs, Heuristic Search
Techniques - Generate & Test Hill Climbing, Best First search, Problem
reduction, Constraint satisfaction, Means-End Analysis
II Knowledge Representation Approaches and issues in knowledge
representation –Using Predicate Logic – Representing simple facts in
logic – Representing Instance and ISA relationship – Computable
functions and predicates – resolution – Natural deduction - Representing
knowledge using rules –Procedural versus declarative knowledge – Logic 15
programming - Forward versus backward reasoning – Matching – Control
Knowledge - Symbolic reasoning under uncertainty - Logics for
Nonmonotonic reasoning – Implementation Issues – Augmenting a
problem solver – Implementation: Depth first search, Breadth first search
III Statistical Reasoning Probability and Bayes‟ Theorem - Certainty
factors and rule-based systems- Bayesian networks – Dempster - Shafer
Theory - Weak slot-filler structure - Semantic nets – frames. Strong slot-
15
filler structure- Conceptual dependency – Scripts – CYC – Syntatic –
Semantic spectrum of Representation – Logic and slot-and-filler structure
– Other representational Techniques
IV Game Playing, Planning & NLP Minimax search procedure-Adding
alpha-beta cutoffs- Additional Refinements – Iterative Deepening –
Reference on specific games Planning - Components of a Planning
system – Goal stack planning – Nonlinear planning using constraint 15
posting- Hierarchical planning – Reactive systems. Natural Language
Processing - Syntactic Analysis, Semantic Analysis, Discuses and
Pragmatic Processing – Statistical Natural Language processing
V Learning & Advanced Topics in AI What is learning? – Rote learning –
Learning by taking advice – Learning in problem solving – Learning
from examples: Induction – Explanation based learning – Discovery –
Analogy – Formal learning theory - Neural Net learning and Genetic
learning - Expert System: Representation-Expert System shells- 15
Knowledge Acquisition. Fuzzy logic system – Crisp sets – Fuzzy sets –
Fuzzy terminology – Fuzzy logic control – Sugeno style of Fuzzy
inference processing – Fuzzy Hedges – Neuro Fuzzy systems.
TOTAL HOURS 75
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Design user interfaces to improve human–AI interaction and real- PO1, PO2,
CO1 time decision-making. Evaluate the advantages, disadvantages, PO3, PO4,
challenges, and ramifications of human–AI augmentation. PO5, PO6
Textbooks
1 Elaine Rich, Kevin Knight (2008), Shivsankar B Nair, Artificial Intelligence,
Third Edition, Tata McGraw Hill Publication
Reference Books
1. Russel S, Norvig P (2010), Artificial Intelligence : A Modern approach,Third
Edition, Pearson Education
2. Dan W Patterson (2007), Introduction to Artificial Intelligence and Expert
System, Second Edition, Pearson Education Inc.
3. Jones M(2006), Artificial Intelligence application Programming, Second Edition,
Dreamtech Press
4. Nilsson (2000), Artificial Intelligence : A new synthesis, Nils J Harcourt Asia PTE
Ltd.
PROGRAMMING IN C
Subject Inst. Marks
L T P S Credits
Code Hours CIA External Total
CC 5 0 0 - 4 5 25 75 100
Learning Objectives
LO1 To familiarize the students with the understanding of code organization
LO2 To improve the programming skills
LO3 Learning the basic programming constructs.
Prerequisites:
Unit Contents No. of
Hours
Studying Concepts of Programming Languages- Language
Evaluation Criteria - Language design - Language Categories -
Implementation Methods – Programming Environments - Overview
I 15
of C: History of C- Importance of C- Basic Structure of C Programs-
Executing a C Program- Constants, Variables and Data types -
Operators and Expressions - Managing Input and Output Operations
Decision Making and Branching: Decision Making and Looping -
II 15
Arrays - Character Arrays and Strings
User Defined Functions: Elements of User Defined Functions-
Definition of Functions- Return Values and their Types- Function
III 15
Call- Function Declaration- Categories of Functions- Nesting of
Functions-Recursion
Structures and Unions: Introduction- Defining a Structure-
Declaring Structure Variables Accessing Structure Members-
IV 15
Structure Initialization- Arrays of Structures- Arrays within
Structures- Unions- Size of Structures.
V Pointers: Understanding Pointers- Accessing the Address of a 15
Variable- Declaring Pointer Variables- Initializing of Pointer
Variables- Accessing a Variable through its Pointer- Chain
of Pointers- Pointer Expressions- Pointer and Scale Factor- Pointer
and Arrays- Pointers and Character Strings- Array of Pointers- Pointer
as Function Arguments- Functions Returning Pointers- Pointers to
Functions- File Management in C
TOTAL 75
CO Course Outcomes
CO1 Outline the fundamental concepts of C programming languages, andits features
Textbooks
Robert W. Sebesta, (2012), ―Concepts of Programming Languages‖, Fourth
Edition, Addison Wesley (Unit I : Chapter – 1)
E. Balaguruswamy, (2010), ―Programming in ANSI C‖, Fifth Edition, Tata
McGraw Hill Publications
Reference Books
Ashok Kamthane, (2009), ―Programming with ANSI & Turbo C‖, Pearson
1.
Education
Byron Gottfried, (2010), ―Programming with C‖, Schaums Outline Series, Tata
2.
McGraw Hill Publications
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1. http://www.tutorialspoint.com/cprogramming/
2. http://www.cprogramming.com/
3. http://www.programmingsimplified.com/c-program-examples
4. http://www.programiz.com/c-programming
5. http://www.cs.cf.ac.uk/Dave/C/CE.html
6. http://fresh2refresh.com/c-programming/c-function/
C PROGRAMMING PRACTICAL
TOTAL 75
CO Course Outcomes
Outline the C++ programming fundamentals and the concepts of object-oriented
CO1 programming like object and class, Encapsulation, inheritance and polymorphism.
Classify the control structures, types of constructors, inheritance and different type
CO2 conversion mechanisms.
Analyze the importance of object oriented programming features like polymorphism,
CO3 reusability, generic programming, data abstraction and the usage of exception handling.
Determine the use of object oriented features such as classes, inheritance and templates to
CO4 develop C++ programs for complex problems.
CO5 Create a program in C++ by implementing the concepts of object-oriented programming.
Textbooks
E. Balaguruswamy, (2013), “Object Oriented Programming using C++”, 6th Edition, Tata
McGraw Hill.
Reference Books
BjarneStroustrup, “The C++ Programming Language”, Fourth Edition, Pearson
1 Education.
2 Hilbert Schildt, (2009), “C++ - The Complete Reference”, 4th Edition, Tata McGrawHill
Analyze the concept of inheritance with the understanding of early and late binding, usage
CO3 of exception handling, constructors, destructors, generic programming and type
conversions
Determine the use of various data structures such as stacks, queues and lists to solve various
CO4
computing problems in C++ by incorporating OOPS concepts.
Develop a program in C++ with the concepts of object oriented programming to solve real-world
CO5
problems.
SOFTWARE METRICS
Marks
Subject Inst.
L T P S Credits Externa
Code Hours CIA Total
l
4 0 0 0 3 4 25 75 100
Learning Objectives
LO1 Gain a solid understanding of what software metrics are and their significance
Learn how to identify and select appropriate software metrics based on project
LO2
goals
LO3 Acquire knowledge and skills in collecting and measuring software metrics
Learn how to analyze and interpret software metrics data to extract valuable
LO4
insights
LO5 Gain the ability to evaluate software quality using appropriate metrics
Unit Contents No. of
Hours
Fundamentals of Measurement: Need for Measurement: 12
Measurement in Software Engineering, Scope of Software Metrics,
I The Basics of measurement: The representational theory of
measurement, Measurement and models, Measurement scales and
scale types, meaningfulness in measurement
A Goal-Based Framework For Software Measurement: 12
Classifying
software measures, Determining what to Measure, Applying the
framework, Software measurement validation, Performing Software
II
MeasurementValidation
Empirical investigation: Principles of Empirical Studies, Planning
Experiments, Planning case studies as quasi-experiments, Relevant
and Meaningful Studies
Software Metrics Data Collection: Defining good data, Data 12
collection for incident reports, How to collect data, Reliability of data
collectionProcedures
III Analyzing software measurement data: Statistical distributions and
hypothesis testing, Classical data analysis techniques, Examples of
simple analysis techniques
TOTAL 60
CO Course Outcomes
Understand various fundamentals of measurement and software metrics
CO1
CO2 Identify frame work and analysis techniques for software measurement
Apply internal and external attributes of software product for effort estimation
CO3
Use appropriate analytical techniques to interpret software metrics data and derive
CO4
meaningful insights
CO5 Recommend reliability models for predicting software quality
Textbooks
Software Metrics A Rigorous and Practical Approach, Norman Fenton, James
Bieman , ThirdEdition, 2014
Reference Books
1 Software metrics, Norman E, Fenton and Shari Lawrence Pfleeger,
International Thomson Computer Press, 1997
2 Metric and models in software quality engineering, Stephen H.Kan, Second
edition, 2002, AddisonWesley Professional
3 Practical Software Metrics for Project Management and Process
Improvement, Robert B.Grady, 1992, Prentice Hall.
NOTE: Latest Edition of Textbooks May be Used
Web Resources
https://lansa.com/blog/general/what-are-software-metrics-how-can-i-measure-
1.
these-metrics/
2 https://stackify.com/track-software-metrics/
.
CO 1 3 3 3 2 3 2
CO 2 3 2 3 2 3 3
CO 3 3 3 3 2 3 3
CO 4 3 3 3 3 2 3
CO 5 3 2 3 3 3 3
Weightage of course 15 13 15 12 14 14
contributed to each
PSO
Credits
Code
Exter
Total
CIA
nal
MACHINE LEARNING CC - - 5 - 4 25 75 10
LAB 0
Learning Objectives:
To apply the concepts of Machine Learning to solve real-world problems and to implement
basic algorithms in clustering & classification applied to text & numeric data
Required
LAB EXERCISES Hour
75
Course Outcomes
CO On completion of this course, students will
Effectively use the various machine learning tools
CO1
Understand and implement the procedures for machine learning algorithms CO3
CO2
CO 1 3 3 3 3 3 2
CO 2 3 3 3 2 3 3
CO 3 3 3 3 3 3 3
CO 4 2 3 3 3 3 3
CO 5 3 3 3 3 3 3
Weightage of course 14 15 15 14 15 14
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Categor
Credits
Code
Exter
Total
y
CIA
nal
MOBILE APPLICATION CC 6 - - - 4 25 75 10
DEVELOPMENT 0
Learning Objectives
LO1 Develop in-depth Knowledge about the architecture and features of Android
LO2 Implementing the various options available in views.
LO3 Understand the file handling concepts and thereby enabling to manage data
efficiently.
LO4 Able to describe clearly the features of SMS messaging.
LO5 Illustrate the concepts of Location Based Services
UNIT Contents No. Of.
Hours
I Android Fundamentals: Android overview and Versions –Features of
Android – Architecture of Android - Setting up Android Environment
(Eclipse/Android Studio, SDK, AVD)- Anatomy of an Android 18
Application - Simple Android Application Development.
II Android User Interface: Layouts: Linear, Relative, Frame and
Scrollview- Managing changes to Screen Orientation. Views:
TextView, Button, ImageButton, EditText, CheckBox, RadioButton, 18
RadioGroup, ProgressBar, AutoCompleteTextView, ListViews and
WebView
III Data Persistence: Saving and Loading User Preferences. File
Handling: File System-Internal and External Storage-Permissions-File
18
Manipulation-Managing Data using Sqlite: Creation of database-
Insertion, Retrieval and Updation of records.
IV SMS Messaging: Sending and Receiving messages - Sending E-mail–
18
Networking: Downloading Binary Data – Downloading Text Files.
V Location Based Services: Displaying maps- Displaying zoom control-
Changing view – Adding Markers- Getting the location – Geo-coding
Publishing Android Applications: Preparing for publishing-Deploying 18
APK Files.
TOTAL HOURS 90
Textbooks
1 WeiMeng Lee (2012), “Beginning Android Application Development”,
WroxPublications (John Wiley, New York)
Reference Books
1. Ed Burnette, “Hello Android: Introducing Google's Mobile Development
Platform”, 3rd edition, 2010, The Pragmatic Publishers.
Web Resources
1. https://www.tutorialspoint.com/mobile_development_tutorials.htm
CO 1 3 3 3 3 3 3
CO 2 3 3 3 2 2 3
CO 3 3 2 3 2 3 3
CO 4 3 3 2 3 3 3
CO 5 3 3 3 3 3 3
Weightage of course 15 14 14 13 14 15
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Credits
Code
Exter
Total
y
CIA
nal
MOBILE APPLICATION CC - - 5 - 4 25 75 10
DEVELOPMENT LAB 0
Course Objectives:
75
1. Develop an application for Simple Counter.
2. Develop an application to display your personal details using GUI
Components.
3. Develop a Simple Calculator that uses radio buttons and text view.
4. Develop an application that uses Intent and Activity.
5. Develop an application that uses Dialog Boxes.
6. Develop an application to display a Splash Screen.
7. Develop an application that uses Layout Managers.
8. Develop an application that uses different types of Menus.
9. Develop an application that uses to send messages from one mobile to
another mobile.
10. Develop an application that uses to send E-mail. Develop an
application that plays Audio and Video.
11. Develop an application that uses Local File Storage.
12. Develop an application for Simple Animation.
13. Develop an application for Login Page using Sqlite.
14. Develop an application for Student Marksheet processing using Sqlite.
Course Outcomes
CO On completion of this course, students will
To understand the concepts of counters and dialogs.
CO1
Concepts of Layout Managers. Perform sending email on audio and video
CO2 To enable the applications of audio and video.
To apply Local File Storage and Development of files.
CO3
To determine the concepts of Simple Animation To apply searching pages.
CO4
CO5 Usage of Student mark sheet- preparation in MAD.
Concepts of processing Sqlite are implemented.
CO 1 3 3 3 3 3 2
CO 2 3 3 3 2 3 3
CO 3 3 3 3 2 3 3
CO 4 3 3 3 3 3 3
CO 5 3 3 3 3 3 3
Weightage of course 15 15 15 13 15 14
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
5 0 0 - 4 4 25 75 100
Learning Objectives
CO5 Evaluate and mitigate risks associated with software development process
Textbooks
Robert T. Futrell, Donald F. Shafer, Linda I. Safer, “Quality Software Project
Management”, Pearson Education Asia 2002.
Reference Books
1 Pankaj Jalote, “Software Project Management in Practice”, Addison Wesley 2002.
.
Hughes, “Software Project Management”, Tata McGraw Hill 2004, 3rd Edition.
2.
NOTE: Latest Edition of Textbooks May be Used
Web Resources
2. www.smartworld.com/notes/software-project-management
MAPPING TABLE
List of Exercises
Do the following 8 exercises for any project projects (Eg. Student Portal, Online exam
registration)
10) Develop test cases for various white box and black box testing techniques
TOTAL 75
CO Course Outcomes
CO1 An ability to use the methodology and tools necessary for engineering practice.
CO5 Apply software engineering perspective through requirements analysis, software design and
construction, verification, and validation to develop solutions to modern problems
MAPPING TABLE
CO1 3 2 3 2 2 2
CO2 2 3 3 3 3 2
CO3 2 2 3 3 3 3
CO4 3 2 2 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
to each PSO 13 12 14 14 14 13
Category
Credits
ect
Extern
Total
Code
CIA
al
ANALYTICS FOR Elect 4 - - - 3 25 75 10
SERVICE INDUSTRY 0
Learning Objectives
LO1 Recognize challenges in dealing with data sets in service industry.
LO2 Identify and apply appropriate algorithms for analyzing the healthcare, Human
resource, hospitality and tourism data.
LO3 Make choices for a model for new machine learning tasks.
LO4 To identify employees with high attrition risk.
LO5 To Prioritizing various talent management initiatives for your organization.
UNI No. Of.
T Contents Hours
I Healthcare Analytics : Introduction to Healthcare Data Analytics-
Electronic Health Records– Components of EHR- Coding Systems-
Benefits of EHR- Barrier to Adopting HER Challenges-Phenotyping
Algorithms. Biomedical Image Analysis and Signal Analysis- Genomic 12
Data Analysis for Personalized Medicine. Review of Clinical Prediction
Models.
II Healthcare Analytics Applications : Applications and Practical
Systems for Healthcare– Data Analytics for Pervasive Health- Fraud
Detection in Healthcare- Data Analytics for Pharmaceutical
Discoveries- Clinical Decision Support Systems- Computer- Assisted 12
Medical Image Analysis Systems- Mobile Imaging and Analytics for
Biomedical Data.
III HR Analytics: Evolution of HR Analytics, HR information systems 12
and data sources, HR Metric and HR Analytics, Evolution of HR
Analytics; HR Metrics and HR Analytics; Intuition versus analytical
thinking; HRMS/HRIS and data sources; Analytics frameworks like
LAMP, HCM:21(r) Model.
IV Performance Analysis: Predicting employee performance, Training
requirements, evaluating training and development, Optimizing 12
selection and promotion decisions.
V Tourism and Hospitality Analytics: Guest Analytics – Loyalty
Analytics – Customer Satisfaction – Dynamic Pricing – optimized
disruption management – Fraud detection in payments. 12
TOTAL HOURS 60
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Understand and critically apply the concepts and methods of PO1, PO2,
CO1 business analytics PO3, PO4,
PO5, PO6
Identify, model and solve decision problems in different settings. PO1, PO2,
CO2 PO3, PO4,
PO5, PO6
Interpret results/solutions and identify appropriate courses of PO1, PO2,
CO3 action for a given managerial situation whether a problem or an PO3, PO4,
opportunity. PO5, PO6
Create viable solutions to decision making problems. PO1, PO2,
CO4 PO3, PO4,
PO5, PO6
Instill a sense of ethical decision-making and a commitment to PO1, PO2,
CO5 the long-run welfare of both organizations and the communities PO3, PO4,
they serve. PO5, PO6
Textbooks
1 Chandan K. Reddy and Charu C Aggarwal, “Healthcare data analytics”, Taylor &
Francis, 2015.
2 Edwards Martin R, Edwards Kirsten (2016),“Predictive HR Analytics: Mastering
the HR Metric”, Kogan Page Publishers, ISBN-0749473924
3 Fitz-enzJac (2010), “The new HR analytics: predicting the economic value of your
company’s human capital investments”, AMACOM, ISBN-13: 978-0-8144-1643-
3
4 RajendraSahu, Manoj Dash and Anil Kumar. Applying Predictive Analytics
Within the Service Sector.
Reference Books
1. Hui Yang and Eva K. Lee, “Healthcare Analytics: From Data to Knowledge to
Healthcare Improvement, Wiley, 2016
2. Fitz-enzJac, Mattox II John (2014), “Predictive Analytics for Human Resources”,
Wiley, ISBN- 1118940709.
Web Resources
1. https://www.ukessays.com/essays/marketing/contemporary-issues-in-marketing-
marketing-essay.php
2. https://yourbusiness.azcentral.com/examples-contemporary-issues-marketing-
field-26524.html
CO 1 3 3 3 3 3 3
CO 2 2 3 3 3 3 3
CO 3 3 3 2 3 3 2
CO 4 3 3 3 3 3 3
CO 5 3 3 3 3 3 3
Weightage of course 14 15 14 15 15 14
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Code Credits
Extern
Total
CIA
al
NATURAL LANGUAGE Elect 4 - - - 3 25 75 10
PROCESSING 0
Learning Objectives
LO1 To understand approaches to syntax and semantics in NLP.
LO2 To learn natural language processing and to learn how to apply basic algorithms in
this field.
To understand approaches to discourse, generation, dialogue and summarization
LO3
within NLP.
Toget acquainted with the algorithmic description of the main language levels:
LO4
morphology, syntax, semantics, pragmatics etc.
LO5 To understand current methods for statistical approaches to machine translation.
UNIT Contents No. Of.
Hours
I Introduction : Natural Language Processing tasks in syntax, semantics, 12
and pragmatics – Issue- Applications – The role of machine learning –
Probability Basics –Information theory – Collocations -N-gram
Language Models – Estimating parameters and smoothing – Evaluating
language models.
II Word level and Syntactic Analysis: Word Level Analysis: Regular
Expressions-Finite-State Automata-Morphological Parsing-Spelling
Error Detection and correction-Words and Word classes-Part-of Speech 12
Tagging. Syntactic Analysis: Context-free Grammar-Constituency-
Parsing-Probabilistic Parsing.
III Semantic analysis and Discourse Processing: Semantic Analysis:
Meaning Representation-Lexical Semantics- Ambiguity-Word Sense
Disambiguation. Discourse Processing: cohesion-Reference Resolution- 12
Discourse Coherence and Structure.
IV Natural Language Generation: Architecture of NLG Systems-
Generation Tasks and Representations- Application of NLG. Machine
Translation: Problems in Machine Translation. Characteristics of Indian 12
Languages- Machine Translation Approaches-Translation involving
Indian Languages.
V Information retrieval and lexical resources: Information Retrieval:
Design features of Information Retrieval Systems-Classical, Non-
classical, Alternative Models of Information Retrieval – valuation
Lexical Resources: WorldNet-Frame Net Stemmers- POS Tagger- 12
Research Corpora SSAS.
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Describe the fundamental concepts and techniques of natural PO1, PO2,
language processing. PO3, PO4,
CO1 PO5, PO6
Explain the advantages and disadvantages of different NLP
technologies and their applicability in different business
situations.
Distinguish among the various techniques, taking into account PO1, PO2,
the assumptions, strengths, and weaknesses of each PO3, PO4,
CO2 PO5, PO6
Use NLP technologies to explore and gain a broad understanding
of text data.
Textbooks
1 Daniel Jurafsky, James H. Martin, “Speech & language processing”, Pearson
publications.
2 Allen, James. Natural language understanding. Pearson, 1995.
Reference Books
1. Pierre M. Nugues, “An Introduction to Language Processing with Perl and
Prolog”,Springer
Web Resources
1. https://en.wikipedia.org/wiki/Natural_language_processing
2. https://www.techtarget.com/searchenterpriseai/definition/natural-language-
processing-NLP
CO 1 3 3 3 3 3 3
CO 2 2 3 3 3 2 3
CO 3 3 3 3 3 3 3
CO 4 3 2 3 3 2 3
CO 5 3 3 3 3 3 3
Weightage of course 14 14 15 15 13 15
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Category
Credits
Code
Extern
Total
CIA
al
FINANCIAL Elect 4 - - - 3 25 75 100
ANALYTICS
Learning Objectives
LO1 To analyze and model financial data.
LO2 To construct and optimize asset portfolios.
LO3 To evaluate and model Risk on various financial assets.
LO4 To use the most powerful and sophisticated routines in R for analytical finance.
LO5 To acquire logical & analytical skills in financial analytics.
UNIT Contents No. Of.
Hours
I Financial Analytics: Introduction: Meaning-Importance of
Financial Analytics uses-Features-Documents used in Financial
Analytics: Balance Sheet, Income Statement, Cash flow statement-
Elements of Financial Health: Liquidity, Leverage, Profitability. 12
Financial Securities: Bond and Stock investments - Housing and
Euro crisis - Securities Datasets and Visualization - Plotting multiple
series.
II Descriptive Analytics: Data Exploration, Dimension Reduction and
Data Clustering Geographical Mapping, Market Basket Analysis.
Predictive Analytics, Fraud Detection, Churn Analysis, Crime
Mapping, Content Analytics, Sentiment Analysis. Analyzing
financial data and implement financial models. Process of Data 12
analytics: obtaining publicly available data, refining such data,
implement the models and generate typical output, Prices and
individual security returns, Portfolio returns, Risks, Factor Models.
III Forecasting Analytics: Estimating Demand Curves and Optimize 12
Price, Price Bundling, Non Linear Pricing and Price Skimming,
Forecasting, Simple Regression and Correlation Multiple Regression
to forecast sales. Modeling Trend and Seasonality Ratio to Moving
Average Method, Winter’s Method.
IV Business Intelligence &Tableau: Definition of BI – A Brief History
of BI – The Architecture of BI. The origin and Drivers of BI.
Successful BI Implementation – Analytics Overview – Descriptive,
Predictive and Perspective Analytics. Business reporting and
Visualization – components - A brief history of data visualization –
Different types of charts and graphs – The emergence of data 12
visualization and visual analytics – Performance dashboards –
Dashboard design – Best practices in dashboarddesign – Business
performance management – Balanced Scorecards – Six sigma as a
performance measurement system.
V Visualizations: Using Tableau to Summarize Data, Slicing and
Dicing Financial Data, Charts to Summarize Marketing Data.
Functions to Summarize Data, Pricing Analytics, Risk based pricing,
Fraud Detection and Prediction, Recovery Management, Loss Risk 12
Forecasting, Risk Profiling, Portfolio Stress Testing.
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Interpret and discuss the outputs of given financial models and PO1, PO2,
CO1 create their own models. PO3, PO4,
PO5, PO6
Design and create visualizations that clearly communicate PO1, PO2,
CO2 financial data insights. PO3, PO4,
PO5, PO6
Gain essential knowledge and hands-on experience in the data PO1, PO2,
CO3 analysis process, including data scraping, manipulation, and PO3, PO4,
exploratory data analysis. PO5, PO6
Be prepared for more advanced applied financial modeling
courses. PO1, PO2,
CO4 PO3, PO4,
PO5, PO6
Textbooks
1 Analysis of Economic Data, Gary Koop, (4th Edition), Wiley.
2 Statistics and Data Analysis for Financial Engineering: with R examples; David
Ruppert, David S. Matteson, Springers
Reference Books
1. Analyzing Financial Data and Implementing Financial Models Using „R‟, Ang
Clifford, Springers.
2. Microsoft Excel 2013: Data Analysis and Business Modeling, Wayne L. Winston,
Microsoft Publishing
Web Resources
1. https://www.techtarget.com/searcherp/definition/financial-analytics
2. https://www.teradata.com/Glossary/What-is-Finance-Analytics
CO 1 3 3 3 3 3 3
CO 2 2 3 3 3 2 3
CO 3 3 3 3 3 2 2
CO 4 3 3 3 3 2 3
CO 5 3 3 3 3 3 3
Weightage of course 14 15 15 15 12 14
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Credits
Code
Exter
Total
CIA
nal
MARKETING ELECT 4 - - - 3 25 75 10
ANALYTICS 0
Learning Objectives
LO1 Understand the importance of marketing analytics for forward looking and
systematic allocation of marketing resources 2.
LO2 Know how to use marketing analytics to develop predictive marketing dashboard
for organization
LO3 Recognize challenges in dealing with data sets in marketing.
LO4 Identify and apply appropriate algorithms for analyzing the social media and web
data
LO5 Make choices for a model for new machine learning tasks.
UNIT Contents No. Of.
Hours
I Marketing Analytics : Introduction to marketing research, Research
design setup, Qualitative research, Quantitative research, Concept
development, scale development, Exploring Data, Descriptive Statistics. 12
Product analytics- features, attributes, benefits, Price analytics,
Promotion analytics, Channel analytics, Multiple Discriminate analysis.
II Customer Analytics: Customer Analytics, Analyzing customer
satisfaction, Prospecting and Targeting the Right Customers,
Covariance and Correlation analysis, Developing Customers, Retaining
Customers, Customer lifetime value case, Factor analysis. Market 12
Segmentation & Cluster Analysis, Scatterplots & Correlation Analysis,
Linear Regression, Model Validation & Assessment, Positioning
analytics, Cross tabulation.
III Social Media Analytics (SMA) :Social media landscape, Need for SMA;
SMA in Small organizations; SMA in large organizations; Application
of SMA in different areas Network fundamentals and models: The
social networks perspective - nodes, ties and influencers, Social network 12
and web data and methods. Graphs and Matrices- Basic measures for
individuals and networks. Information visualization.
IV Facebook Analytics: Introduction, parameters, demographics. Analyzing
page audience. Reach and Engagement analysis. Post- performance on
FB. Social campaigns. Measuring and Analyzing social campaigns,
defining goals and evaluating outcomes, Network Analysis. 9 12
(LinkedIn, Instagram, YouTube Twitter etc. Google analytics.
Introduction. (Websites)
V Web Analytics and making connections : Link analysis. Random graphs
and network evolution. Social contexts: Affiliation and identity. Web
analytics tools: Clickstream analysis, A/B testing, online surveys, Web 12
crawling and Indexing.
TOTAL HOURS 60
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Critically evaluate the key analytical frameworks and tools used PO1, PO2,
CO1 in marketing. PO3, PO4,
Apply key marketing theories, frameworks and tools to solve PO5, PO6
marketing problems.
5 Jim Sterne. Social Media Metrics: How to Measure and Optimize Your Marketing
Investment. Wiley, 2020.
6 Marshall Sponder. Social Media Analytics. McGraw Hill Latest edition.
Reference Books
1. Marketing Analytics: A practical guide to real marketing science, Mike Grigsby,
Kogen Page, ISBN 9780749474171
2. Cutting Edge Marketing Analytics: Real World Cases and Data Sets for Hands on
Learning, Raj Kumar Venkatesan, Paul Farris, Ronald T. Wilcox.
3. Marketing Metrices3e, Bendle, Farris, Pferfery, Reibstein
Web Resources
1. https://www.coursera.org/learn/uva-darden-market-analytics
2. https://www.wrike.com/marketing-guide/marketing-analytics/
Credits
Code
Extern
Total
CIA
al
DATA Elective 4 - - - 3 25 75 10
COMMUNICATION 0
AND COMPUTER
NETWORKS
Learning Objectives
LO1 To introduce the fundamental network architecture concepts and their core
principle issues in the emerging communication / data networks.
LO2 To have a complete picture of the data and computer networks systematically
LO3 To provide a strong foundation in networking concepts and technology
LO4 To know the significance of various Flow control and Congestion control
Mechanisms
LO5 To know the Functioning of various Application layer Protocols.
UNIT No. Of.
Contents Hours
I Data Communications: Introduction– Networks – The Internet – 12
Protocols and Standards- Network Models: OSI model – TCP/IP
protocol suite – Transmission Media: Guided media – Unguided Media.
II Data Link Layer: Error Detection and Correction: Introduction- Block
coding – Linear block codes – Cyclic Codes – Checksum. Framing –
Flow and Error Control: Protocols –Noiseless Channels: Stop- and – 12
Wait – Noisy Channel: Stop-and Wait Automatic Repeat Request-Go-
Back –N.
III Medium Access and Network Layer: Multiple Access: Random
Access – Controlled access- Channelization. Network Layer Logical
addressing: IPv4 addresses – IPv6 addresses. Transport Layer: Process 12
to Process delivery: UDP – TCP. Congestion Control – Quality of
Service
IV Application Layer: Domain Naming System: Name Space - Domain
Name Space - Distribution of Name Space - DNS in the INTERNET - 12
Resolution–Remote logging – E-mail – FTP.
V Wireless Networks: Wireless Communications – Principles and
Fundamentals. WLANs – WPAN- Satellite Networks - Ad-hoc
Networks 12
TOTAL HOURS 60
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Understand the basics of data communication, networking, PO1, PO2,
CO1 internet and their importance. PO3, PO4,
PO5, PO6
Analyze the services and features of various protocol layers in PO1, PO2,
CO2 data networks. PO3, PO4,
PO5, PO6
Differentiate wired and wireless computer networks PO1, PO2,
CO3 PO3, PO4,
PO5, PO6
Analyze TCP/IP and their protocols. PO1, PO2,
CO4 PO3, PO4,
PO5, PO6
Recognize the different internet devices and their functions. PO1, PO2,
CO5 PO3, PO4,
PO5, PO6
Textbooks
1 Forouzan, A. Behrouz. (2006), Data Communications & Networking, Fourth
Edition, Tata McGraw Hill Education
2 Nicopolitidis, Petros, Mohammad SalamehObaidat, G. L. Papadimitriou(2018),
Wireless Networks, John Wiley & Sons.
Reference Books
1. Fred Halsall(1996), Data Communications Computer Networks and Open Systems,
Fourth Edition, Addison Wesley.
Web Resources
1. https://www.tutorialspoint.com/data_communication_computer_network/
index.htm
2. https://www.geeksforgeeks.org/data-communication-definition-components-types-
channels/
Credits
Code
Extern
Total
CIA
al
BIG DATA ANALYTICS Elect 4 - - - 3 25 75 10
0
Learning Objectives
LO1 To know the fundamental concepts of big data and analytics..
LO2 To explore tools and practices for working with Big data
LO3 To learn about stream computing.
LO4 To know about the research that requires the integration of large amounts of data
LO5 To analyze data by utilizing clustering and classification algorithms.
UNIT Contents No. Of.
Hours
I Big data Introduction : Big Data introduction - definition and 12
taxonomy - Big data value for the enterprise - The Hadoop ecosystem
- Introduction to Distributed computing- Hadoop ecosystem – Hadoop
Distributed File System (HDFS) Architecture - HDFS commands for
loading/getting data - Accessing HDFS through Java program.
II Map reduce : Introduction to Map Reduce frame work - Basic Map
Reduce Programming: - Advanced Map Reduce programming: Basic
template of the Map Reduce program, Word count problem- 12
Streaming in Hadoop- Improving the performance using combiners-
Chaining Map Reduce jobs- Joining data from different sources.
III Pig and Hive : Applications on Big Data Using Pig and Hive – Data
processing operators in Pig – Hive services – HiveQL – Querying 12
Data in Hive - Fundamentals of HBase and ZooKeeper.
IV Mongo DB : No SQL databases: Mongo DB: Introduction – Features -
Data types - Mongo DB Query language - CRUD operations – Arrays
- Functions: Count – Sort – Limit – Skip – Aggregate - Map Reduce. 12
Cursors – Indexes - Mongo Import – Mongo Export.
V Cassandra: Introduction – Features - Data types – CQLSH - Key
spaces - CRUD operations – Collections – Counter – TTL - Alter
commands - Import and Export - Querying System tables. 12
TOTAL HOURS 60
Reference Books
1. Judith Hurwitz, Alan Nugent, Dr. Fern Halper, Marcia Kaufman, “Big Data for
Dummies”, John Wiley & Sons, Inc., 2013.
2. Tom White, “Hadoop: The Definitive Guide”, O‟Reilly Publications, 2011.
2. https://www.coursera.org/articles/big-data-analytics
CO 1 3 3 3 3 3 3
CO 2 2 3 3 3 2 3
CO 3 3 3 3 3 2 2
CO 4 3 3 3 3 2 3
CO 5 3 3 3 3 3 3
Weightage of course 14 15 15 15 12 14
contributed to each PSO
S-Strong-3 M-Medium-2 L-Low-1
Credits
Code
Exter
Total
CIA
nal
COMPUTER Elec 4 - - - 3 25 75 10
NETWORKS t 0
Learning Objectives
LO1 To make students understand the concepts of Network hardware and Network
Software.
LO2 To analyze different network models
LO3 To impart knowledge on Design Issues of Data Link Layer
LO4 To impart knowledge on IP Addresses and Routing algorithm
LO5 To make the students understand the establishment of Network connection
UNI Contents No. Of.
T Hours
I Introduction – Uses of Computer Networks – Network
Hardware- Network Software- OSI Reference Model – TCP/IP 12
Reference Model.
II Physical Layer – Guided Transmission media – Wireless
Transmission – Public Switched Telephone Network –Local 12
Loop – Trunks – Multiplexing- Switching.
III Data Link Layer – Design Issues- Error Detection and
Correction- Simplex Stop and Wait Protocol- Sliding Window 12
Protocol.
IV Network Layer – Design Issues – Routing Algorithm- IP
Protocol – IP 12
Addresses-Internet Control Protocols.
V Transport Layer: Addressing- Connection Establishment-
Connection Release. Internet Transport Protocol: UDP-TCP.
12
Application Layer: DNS- Electronic Mail-World Wide Web.
TOTAL HOURS 60
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Usage of computer networks. PO1, PO2,
CO1 Describe the functions of each layer in OSI and TCP/IP model. PO3, PO4,
PO5, PO6
Basics of Physical layer and apply them in real time applications. PO1, PO2,
CO2 Techniques in multiplexing and switching. PO3, PO4,
PO5, PO6
Design of Data link layer. PO1, PO2,
CO3 Deduction of errors and correction. Flow control using protocols PO3, PO4,
PO5, PO6
Textbooks
1 A. S. Tanenbaum, “Computer Networks”, Prentice-Hall of India 2008, 4th Edition.
Reference Books
1. Stallings, “Data and Computer Communications”, Pearson Education 2012, 7th
Edition
2. B. A. Forouzan, “Data Communications and Networking”, Tata McGraw Hill
2007, 4th Edition.
3. F. Halsall, “Data Communications, Computer Networks and Open Systems”,
Pearson Education 2008.
4. D. Bertsekas and R. Gallagher, “Data Networks”, PHI 2008, 2nd Edition.
Web Resources
1. https://www.geeksforgeeks.org/basics-computer-networking/
2. https://en.wikipedia.org/wiki/Computer_network
3. https://www.tutorialspoint.com/computer_fundamentals/computer_networking.htm
4. https://www.javatpoint.com/computer-network-tutorial
5. http://ceit.aut.ac.ir/~91131079/SE2/SE2%20Website/Lecture%20Slides.html
CO 1 3 3 3 3 3 3
CO 2 2 3 3 3 2 3
CO 3 3 3 3 3 2 2
CO 4 3 3 3 3 2 3
CO 5 3 3 3 3 3 3
Weightage of course 14 15 15 15 12 14
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Credits
Code
Exter
Total
CIA
nal
CRYPTOGRAPHY Elect 4 - - - 3 25 75 10
0
Learning Objectives
LO1 To understand the fundamentals of Cryptography
LO2 To acquire knowledge on standard algorithms used to provide confidentiality,
integrity and authenticity.
LO3 To understand the various key distribution and management schemes.
LO4 To understand how to deploy encryption techniques to secure data in transit across
data networks
LO5 To design security applications in the field of Information technology
UNIT Contents No. Of.
Hours
I Introduction: The OSI security Architecture – Security Attacks –
Security Mechanisms – Security Services – A model for network 12
Security.
II Classical Encryption Techniques: Symmetric cipher model –
Substitution Techniques: Caesar Cipher – Monoalphabetic cipher –
Play fair cipher – Poly Alphabetic Cipher – Transposition techniques – 12
Stenography
III Block Cipher and DES: Block Cipher Principles – DES – The Strength
of DES –RSA: The RSA algorithm. 12
IV Network Security Practices: IP Security overview - IP Security
architecture – Authentication Header. Web Security: SecureSocket 12
Layer and Transport Layer Security – Secure Electronic Transaction.
V Intruders – Malicious software – Firewalls.
12
TOTAL HOURS 60
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Analyze the vulnerabilities in any computing system and hence be PO1, PO2,
CO1 able to design a security solution. PO3, PO4,
PO5, PO6
Apply the different cryptographic operations of symmetric PO1, PO2,
CO2 cryptographic algorithms PO3, PO4,
PO5, PO6
Apply the different cryptographic operations of public key PO1, PO2,
CO3 cryptography PO3, PO4,
PO5, PO6
Apply the various Authentication schemes to simulate different PO1, PO2,
CO4 applications. PO3, PO4,
PO5, PO6
Understand various Security practices and System security PO1, PO2,
CO5 standards PO3, PO4,
PO5, PO6
Textbooks
1 William Stallings, “Cryptography and Network Security Principles andPractices”.
Reference Books
1. Behrouz A. Foruzan, “Cryptography and Network Security”, Tata McGraw-Hill,
2007.
Web Resources
1 https://www.tutorialspoint.com/cryptography/
2 https://gpgtools.tenderapp.com/kb/how-to/introduction-to-cryptography
CO 1 3 3 3 2 3 2
CO 2 3 2 3 2 3 3
CO 3 3 3 3 2 3 3
CO 4 2 3 3 3 2 3
CO 5 3 2 3 3 3 3
Weightage of course 14 13 15 12 14 14
contributed to each
PSO
Credits
Code
Exter
Total
CIA
nal
Textbooks
1 A. SilberschatzP.B.Galvin, Gange. “Operating System Concepts”, Ninth Edition,
2013, Addison WesleyPublishing Co..
Reference Books
1. Anderw S Tanenbaum, Albert S. Woodhull, ” Operating System Design and
Impletation”, prentice-Hall India Publication.
2. William Stallings, “Operating Systems Internals and Design Principles”, Pearson,
2018, 9th Edition.
3. Operating Systems: A Spiral Approach – Elmasri, Carrick, Levine, TMH Edition
4. Operating System Concepts (2nd Ed) by James L. Peterson, Abraham Silberschatz,
Addison – Wesley.
5. Operating Systems Design & implementation Andrew S. Tanenbam, Albert S.
Woodhull Pearson.
Web Resources
1. https://www.guru99.com/operating-system-tutorial.html
2. https://www.mygreatlearning.com/blog/what
3. https://en.wikipedia.org/wiki/Operating_system
4. https://www.geeksforgeeks.org/what-is-an-operating-system/
5. http://www.cs.kent.edu/~farrell/osf03/oldnotes/2. th-edition.pdf
CO 1 3 3 3 3 3 3
CO 2 2 3 3 3 2 3
CO 3 3 3 3 3 2 2
CO 4 3 3 3 3 2 3
CO 5 3 3 3 3 3 3
Weightage of course 14 15 15 15 12 14
contributed to each PSO
S-Strong-3 M-Medium-2 L-Low-1
Category
Credits
t Code
Exter
Total
CIA
nal
ARTIFICIAL NEURAL Elec 4 - - - 3 25 75 100
NETWORK t
Learning Objectives:
The objective of this course is to teach the basics of artificial neural networks, learning
process, single layer and multi-layer perceptron networks.
Course Outcomes:
CO1: Understand the basics of artificial neural networks and its architecture.
CO2: Understand the various learning algorithms and their applications.
CO3: Identify the appropriate neural network model to a particular application.
CO4: Apply the selected neural network model to a particular application.
CO5: Analyze the performance of the selected neural network.
Units Contents Required
Hours
Artificial Neural Model- Activation functions- Feed forward
and Feedback, Convex Sets, Convex Hull and Linear
Separability, Non-Linear Separable Problem - Multilayer
1
I Networks. Learning Algorithms- Error correction - Gradient
2
Descent Rules, Perceptron Learning Algorithm, Perceptron
Convergence Theorem.
Learning Resources:
Recommended Texts
1. Neural Networks A Classroom Approach- Satish Kumar, McGraw Hill- Second
Edition.
2. “Neural Network- A Comprehensive Foundation”- Simon Haykins, Pearson
Prentice Hall, 2nd Edition, 1999.
Reference Books
1. Artificial Neural Networks-B. Yegnanarayana, PHI, New Delhi 1998.
CO 1 3 3 3 2 3 2
CO 2 3 2 3 2 3 3
CO 3 3 3 2 2 3 3
CO 4 2 3 3 3 2 3
CO 5 3 2 3 3 3 3
Weightage of course 14 13 14 12 14 14
contributed to each
PSO
Credits
t Code
Exter
Total
CIA
nal
SOFTWARE Elec 4 - - - 3 25 75 10
ENGINEERING t 0
Learning Objectives:
• To understand the software engineering concepts and to create a system model in
real life applications
Reference Books
1. Richard Fairley, Software Engineering Concepts, Tata McGraw-Hill publishing
company Ltd, Edition 1997.
2. Roger S. Pressman, Software Engineering, Seventh Edition, McGraw-Hill.
3. James A. Senn, Analysis & Design of Information Systems, Second Edition,
McGraw-Hill International Editions.
CO 1 3 3 3 2 3 2
CO 2 2 2 3 2 3 3
CO 3 3 3 3 2 3 3
CO 4 2 3 3 3 2 3
CO 5 3 2 3 3 3 3
Weightage of course 13 13 15 12 14 14
contributed to each
PSO
ISO-9001-ElementsofISO9001-improvingqualitysystem– Case
V study. 12
TOTAL 60
CO Course Outcomes
MAPPING TABLE
Marks
Inst. Hours
Category
Subject Code Subject Name
External
Total
CIA
Ele
Organizational Behaviour 4 - - - 3 5 25 75 100
ct
Learning Objectives
CO1 To have extensive knowledge on OB and the scope of OB.
CO2 To create awareness of Individual Behaviour.
CO3 To enhance the understanding of Group Behaviour
CO4 To know the basics of Organisational Culture and Organisational Structure
CO5 To understand Organisational Change, Conflict and Power
Web Resources
1 https://www.iedunote.com/organizational-behavior
2 https://www.london.edu/faculty-and-research/organisational-behaviour
CO 1 3 3 3 2 3 2
CO 2 3 2 3 2 3 3
CO 3 3 3 3 2 3 3
CO 4 3 3 3 3 2 3
CO 5 3 2 3 2 3 3
Weightage of course 15 13 15 11 14 14
contributed to each
PSO
Credits
Exter
Total
CIA
nal
AGILE PROJECT Elec 4 - - - 3 25 75 100
MANAGEMENT t
Learning Objectives:
To provide students with a theoretical as well as practical understanding of Agile
software development practices and how small teams can apply them to creating
high-quality software.
To provide a good understanding of software design and a set of software
technologies and APIs.
To provide a detailed examination and demonstration of Agile development and
testing techniques.
To provide an understanding of the benefits and pitfalls of working in an Agile
team.
Course Outcomes:
CO1: Understanding of the Agile manifesto and its advantages over other SDLC paradigms.
CO2: Understanding essential Agile concepts.
CO3:Understanding how to plan and execute a project using Agile concepts
CO4: Understanding Agile management concepts.
CO5: Practical application of Agile principles.
Units Contents Required Hours
I Introduction: Modernizing Project Management: 12
Project Management Needed a Makeover –
Introducing Agile Project Management.
Applying the Agile Manifesto and Principles:
Understanding the Agile manifesto – Outlining the
four values of the Agile manifesto – Defining the 12
Agile Principles – Adding the Platinum Principles –
Changes as a result of Agile Values – The Agile
litmus test.
Why Being Agile Works Better: Evaluating Agile
benefits – How Agile approaches beat historical
approaches – Why people like being Agile.
Category
Credits
Code
Exter
Total
CIA
nal
COMPUTING Elect 4 - - - 3 25 75 100
INTELLIGENCE
Learning Objectives:
• To provide strong foundation on fundamental concepts in Computing Intelligence
• To apply basic principles of Artificial Intelligence and solutions that require
problem solving, influence, perception, knowledge representation and learning
Course Outcomes:
CO1: Describe the fundamentals of artificial intelligence concepts and searching
techniques.
CO2: Develop the fuzzy logic sets and membership function and defuzzification techniques.
CO3:Understand the concepts of Neural Network and analyze and apply the learning
techniques
CO4: Understand the artificial neural networks and its applications
CO5: Understand the concept of Genetic Algorithm and Analyze the optimization problems using
GAs.
Units Contents Required
Hours
Introduction to AI: Problem formulation – AI
Applications – Problems – State Space and Search –
1
I Production Systems – Breadth First and Depth First –
2
Travelling Salesman Problem – Heuristic search
techniques: Generate and Test – Types of Hill Climbing.
II Fuzzy Logic Systems: 1
Notion of fuzziness – Operations on fuzzy sets – T- 2
norms and other aggregation operators – Basics of
Approximate Reasoning – Compositional Rule of
Inference – Fuzzy Rule Based Systems – Schemes of
Fuzzification – Inferencing – Defuzzification – Fuzzy
Clustering – fuzzy rule-based classifier.
Neural Networks: What is Neural Network, Learning
rules and various activation functions, Single layer
Perceptions, Back Propagation networks, Architecture of
Backpropagation (BP) Networks, Back propagation 1
III
Learning, Variation of Standard Back propagation Neural 2
Network, Introduction to Associative Memory, Adaptive
Resonance theory and Self Organizing Map, Recent
Applications.
Artificial Neural Networks: Fundamental Concepts –
Basic Models of Artificial Neural Networks – Important
1
IV Terminologies of ANNs – McCulloch-Pitts Neuron –
2
Linear Separability – Hebb Network.
Learning Resources:
Recommended Texts
1. S.N. Sivanandam and S.N. Deepa, “Principles of Soft Computing”, 2 nd Edition,
Wiley India Pvt. Ltd.
Reference Books
1. F. Martin, Mc neill, and Ellen Thro, “Fuzzy Logic: A Practical approach”, AP
Professional, 2000. Chin Teng Lin, C. S. George Lee,” Neuro-Fuzzy Systems”,
PHI.
2. Chin Teng Lin, C. S. George Lee,” Neuro-Fuzzy Systems”, PHI.
Mapping with Programme Outcomes:
CO 1 3 3 3 2 3 2
CO 2 3 2 3 2 3 3
CO 3 3 3 3 2 3 3
CO 4 3 3 3 3 2 3
CO 5 3 3 3 2 3 3
Weightage of course 15 14 15 11 14 14
contributed to each
PSO
Category
Credits
Exter
Total
CIA
nal
INFORMATION Elec 4 - - - 3 25 75 100
SECURITY t
Learning Objectives:
To know the objectives of information security
Understand the importance and application of each of confidentiality, integrity,
authentication and availability
Understand various cryptographic algorithms
Understand the basic categories of threats to computers and networks
Course Outcomes:
CO1: Understand network security threats, security services, and countermeasures
CO2: Understand vulnerability analysis of network security
CO3: Acquire background on hash functions; authentication; firewalls; intrusion detection
techniques.
CO4: Gain hands-on experience with programming and simulation techniques for security
protocols.
CO5: Apply methods for authentication, access control, intrusion detection and prevention.
Units Contents Required
Hours
Introduction to Information Security : Security mindset,
Computer Security Concepts (CIA), Attacks,
Vulnerabilities and protections, Security Goals, Security 1
I
Services, Threats, Attacks, Assets, malware, program 2
analysis and mechanisms.
CO 1 3 3 3 2 3 2
CO 2 3 2 3 2 3 3
CO 3 3 3 3 2 3 3
CO 4 3 3 3 3 2 3
CO 5 3 3 3 2 3 2
Weightage of course 15 14 15 11 14 13
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Category
Credits
Exter
Total
CIA
nal
GRID COMPUTING Elec 4 - - - 3 25 75 100
t
Learning Objectives:
• To provide the knowledge on the basic construction and use of Grid computing.
• To know and understand the grid computing applications.
• To assess the efficiency of the grid computing in solving large scale scientific
problems
Course Outcomes:
CO1:To understand the basic elements and concepts related to Grid computing
CO2: To identify the Grid computing toolkits and Framework.
CO3:To know about the concepts of Virtualization
CO4: To analyze the concept of service oriented architecture.
CO5:To Gain knowledge on grid and web service architecture.
Units Contents Required
Hours
Introduction: Early Grid Activity, Current Grid Activity,
Overview of Grid Business areas, Grid Applications, Grid 1
I
Infrastructures. 2
Learning Resources:
Recommended Texts
1. Joshy Joseph and Craig Fellenstein, Grid computing, Pearson / IBM
Press, PTR, 2004.
Reference Books
2. Ahmer Abbas and Graig computing, A Practical Guide to technology
and applications, Charles River Media, 2003.
CO 1 3 3 3 2 3 2
CO 2 3 2 3 3 3 3
CO 3 3 3 3 2 3 3
CO 4 3 3 3 3 2 3
CO 5 3 3 2 3 3 3
Weightage of course 15 14 14 13 14 14
contributed to each
PSO
ANNEXURE II
SKILL ENHANCEMENT BASED
Credits
Code
Exter
Total
CIA
nal
INTRODUCTION TO SEC 2 - - - 2 25 75 10
HTML 0
Learning Objectives
LO1 Insert a graphic within a web page.
LO2 Create a link within a web page.
LO3 Create a table within a web page.
LO4 Insert heading levels within a web page.
LO5 Insert ordered and unordered lists within a web page. Create a web page.
UNI Contents No. Of.
T Hours
I Introduction: Introduction to Java-Features of Java-Object
Oriented Concepts-Software Evolution - Software
Development, SDLC Models – SDLC steps – Software Testing
– Software Quality - Lexical Issues-Data Types – Variables –
6
Arrays – Operators - Control Statements – Classes – Objects –
Constructors - Overloading method - Access control - static and
fixed methods - Inner classes -Inheritance-Overriding Methods-
Using super-Abstract class.
II Packages & Threads: Packages-Access Protection-Importing
Packages-Interfaces-Exception Handling-Throw and Throws-
Thread-Synchronization-Messaging- Runnable Interface-Inter 6
thread communication-Deadlock-suspending, resuming and
stopping threads-Multithreading
III Input/Output & Collection API: I/O Streams-File Streams-String
Objects-String Buffer-Char Array - Java Utilities-
6
Collectionsinterface - Collection classes-Enumeration – Vector -
Stack –Hash tables - String class.
IV Networking: Networking –Networking basics – java and the Net –
InetAddress- TCP/IP Client Sockets –URL- URLConnection – 6
TCP/IP Server Sockets – Datagrams.
V Graphical User Interface in Java: Working with windows using
AWT Classes - Class Hierarchy of Window and Panel -AWT
controls - Layout Managers – Menus- Menu bars - Dialog Boxes-
File Dialog- Applets-Lifecycle of Applet-Types of Applets-Event 6
handling-Applet tags - JDBC and connecting to Databases –
CRUD operations.
TOTAL HOURS 30
Textbooks
1 “Mastering HTML5 and CSS3 Made Easy”, TeachUComp Inc., 2014.
2
Thomas Michaud, “Foundations of Web Design: Introduction to HTML & CSS”
Web Resources
1. https://www.teachucomp.com/samples/html/5/manuals/Mastering-HTML5-CSS3.pdf
2. https://www.w3schools.com/html/default.asp
CO 1 3 3 3 3 3 3
CO 2 3 3 3 3 3 3
CO 3 3 3 2 3 3 2
CO 4 3 3 3 3 3 3
CO 5 3 3 3 3 3 3
Weightage of course 15 15 14 15 15 14
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Credits
Code
Exter
Total
CIA
nal
LearningObjectives:(forteachers:whattheyhavetodointheclass/lab/field)
The major objective in introducing the Computer Skills course is to
impart training for students in Microsoft Office which has different
components like MS Word, MS Excel and Power point.
Thecourseishighlypracticeorientedratherthanregularclassroomteaching.
To acquire knowledge on editor, spreadsheet and presentation software.
Reference Books
1. JenniferAckermanKettel,GuyHat-
Davis,CurtSimmons,“Microsoft2003”,TataMcGraw-Hill.
CO 1 3 3 3 3 3 3
CO 2 3 3 3 3 3 3
CO 3 3 3 2 3 3 2
CO 4 3 3 2 3 3 3
CO 5 3 3 3 3 3 3
Weightage of course 15 15 12 15 15 14
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Credits
Code
Exter
Total
CIA
nal
LearningObjectives:(forteachers:whattheyhavetodointheclass/lab/field)
Toimprovethequantitativeskillsofthestudents
Topreparethestudentsforvariouscompetitiveexams
CourseOutcomes:(forstudents:Toknowwhattheyaregoingtolearn)
CO1:To gain knowledge on LCM and HCF and its related problems
CO2:To get an idea of age, profit and loss related problem solving.
IV Permutationandcombination-probability-
TrueDiscount-BankersDiscount
- Height and Distances-Odd man out & Series.
MAPPING TABLE
CO1 3 2 3 2 2 3
CO2 3 3 3 3 3 3
CO3 3 2 2 2 3 3
CO4 3 3 2 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
to each PSO 15 13 13 13 14 15
Credits
Code
Exter
Total
CIA
nal
CYBER SEC 2 - - - 2 25 75 100
FORENSICS
Learning Objectives:
• To correctly define and cite appropriate instances for the application of computer
forensics.
• To Correctly collect and analyze computer forensic evidence and data seizure.
Identify the essential and up–to–date concepts, algorithms, protocols, tools, and
methodology of Computer Forensics.
Course Outcomes:
CO1: Understand the definition of computer forensics fundamentals.
CO2: Evaluate the different types of computer forensics technology.
CO3: Analyze various computer forensics systems.
CO4: Apply the methods for data recovery, evidence collection and data seizure.
CO5: Gain your knowledge of duplication and preservation of digital evidence.
Units Contents Required
Hours
Overview of Computer Forensics Technology:
Computer Forensics Fundamentals: What is
Computer Forensics? Use of Computer
Forensics in Law Enforcement, Computer
Forensics Assistance to Human
Resources/Employment Proceedings, Computer
I Forensics Services, Benefits of professional 6
Forensics Methodology, Steps taken by
Computer Forensics Specialists. Types of
Computer.
Forensics Technology: Types of Business
Computer Forensic, Technology–Types of
Learning Resources:
Recommended Texts
Reference Books
1. Nelson, Phillips Enfinger, Steuart, “Computer Forensics and Investigations”
Enfinger, Steuart, CENGAGE Learning, 2004.
2. Anthony Sammes and Brian Jenkinson, ”Forensic Computing: A
Practitioner's Guide”,Second Edition, Springer–Verlag London Limited,
2007.
3. Robert M.Slade,” Software Forensics Collecting Evidence from the Scene of
a DigitalCrime”, TMH 2005.
MAPPING TABLE
CO1 3 3 3 2 2 2
CO2 2 3 3 3 3 2
CO3 3 2 3 3 3 3
CO4 3 2 2 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
to each PSO 14 13 14 14 14 13
Credi
Exter
Total
atego
CIA
nal
ry
ts
MULTIMEDIA SEC 2 - - - 2 25 75 100
SYSTEMS
Learning Objectives:
• Tounderstandthestandardsavailablefordifferentaudio,videoandtext
applications
• Tolearnvariousmultimediaauthoringsystemsinmultimediaproductionte
am
Course Outcomes:
CO1: Write action script for a particular problem.
CO2: Design and Draw customized GUI components.
CO3: Apply Transformations on Components.
CO4: To make use of fundamental concepts and formulate best practices
CO5: Apply technical concepts and practices in specialized areas
Units Contents Required
Hours
Multimedia Definition- Use Of Multimedia-
Delivering Multimedia- Text: About Fonts
I and Faces - Using Text in Multimedia - 6
Computers and Text – Font Editing and
Design Tools-Hypermedia and Hypertext.
Images: Plan Approach - Organize Tools -
Configure Computer Workspace -Making
II Still Images - Color - Image File Formats. 6
Sound: The Power of Sound -DigitalAudio-
MidiAudio-Midivs.
Animation: The Power of Motion- Principles
of Animation – Animation by Computer -
Making Animations that Work. Video: Using
III 6
Video - Working with Video and Displays-
Digital Video Containers- Obtaining Video
Clips -Shooting and Editing Video.
Making Multimedia: The Stage of
Multimedia Project - The Intangible Needs -
IV The Hardware Needs - The Software Needs – 6
An Authoring System Needs- Multimedia
Production Team.
Planning and Costing: The Process of Making
Multimedia-Scheduling-Estimating - RFPs and Bid
V Proposals. Designing and Producing - Content and 6
Talent: Acquiring Content-Ownership of Content
Created for Project-Acquiring Talent.
Learning Resources:
Recommended Texts
1. Tay Vaughan, "Multimedia: Making It Work", 8th Edition, Osborne/McGraw-
Hill, 2001.
Reference Books
1. RalfSteinmetz&KlaraNahrstedt"MultimediaComputing,Communicati
on&Applications",PearsonEducation,2012
MAPPING TABLE
CO1 3 3 3 3 3 2
CO2 3 3 3 3 3 2
CO3 3 2 3 3 3 3
CO4 3 2 2 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
to each PSO 15 13 14 15 15 13
Credits
Code
Exter
Total
CIA
nal
SOFTWARE SEC 2 - - - 2 25 75 100
TESTING
Learning Objectives:
To study various Software techniques
To study fundamental concepts in software testing
Course Outcomes:
CO1: Understand and describe the basic concepts of functional (black box) software
testing.
CO2: Understand the basic application of techniques used to identify useful ideas for
tests.
CO3: Help determine the mission and communicate the status of your testing with the rest
of your project team.
CO4: Characterize a good bug report, peer-review the reports of your colleagues, and
improve your own report writing.
CO5: Understand where key testing concepts apply within the context of unified
processes.
Learning Resources:
Recommended Texts
1. B.Beizer,“SoftwareTestingTechniques”,IIEdn.,DreamTechI
ndia,NewDelhi,2003.
2. K.V.K.Prasad,“SoftwareTestingTools”,DreamTech.India,N
ewDelhi,2005.
Reference Books
1. Burnstein, 2003,“PracticalSoftwareTesting”,SpringerInternationalEdn.
MAPPING TABLE
CO1 3 2 3 2 2 2
CO2 2 3 3 2 3 2
CO3 3 3 3 3 3 3
CO4 3 2 2 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
to each PSO 14 13 14 13 14 13
Category
Credits
Code
Exter
Total
CIA
nal
DATA MINING SEC 2 - - - 2 25 75 100
AND
WAREHOUSING
Learning Objectives:
To provide the knowledge on Data Mining and Warehousing concepts and
techniques.
To study the basic concepts of cluster analysis
To study a set of typical clustering methodologies, algorithms
and applications.
Course Outcomes:
CO1:To understand the basic concepts and the functionality of the various data mining and
data warehousing component
CO2: To know the concepts of Data mining system architectures
CO3:To analyze the principles of association rules
CO4: To get analytical idea on Classification and prediction methods.
CO5: To Gain knowledge on Cluster analysis and its methods.
Recap:(notforexamination)Motivation/previouslecture/relevantportionsrequiredforthe
course)[Thisisdoneduring2Tutorialhours)
Units Contents Required
Hours
Introduction: Data mining – Functionalities –
Classification – Introduction to Data Warehousing – Data
I Preprocessing: Preprocessing the Data – Data cleaning – 6
MAPPING TABLE
CO1 3 3 3 2 2 2
CO2 3 3 3 3 3 2
CO3 3 3 3 3 3 3
CO4 3 2 2 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
to each PSO 15 14 14 14 14 13
Subject Subject Name L T P S Marks
Category
Credits
Code
Exter
Total
CIA
nal
BIOMETRICS SEC 2 - - - 2 25 75 100
Learning Objectives:(forteachers:whattheyhavetodointheclass/lab/field)
To learn and understand biometric technologies and their functionalities.
To learn the role of biometrics, computational methods, context of Biometric
Applications.
To learn to develop applications with biometric security
MAPPING TABLE
CO1 3 2 3 2 2 2
CO2 3 3 3 3 3 2
CO3 3 2 2 2 3 3
CO4 3 2 2 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
to each PSO 15 12 13 13 14 13
Credits
Code
Exter
Total
CIA
nal
Course Outcomes:(forstudents:Toknowwhattheyaregoingtolearn)
CO1: Understand the basic concepts of ERP.
CO2: Identify different technologies used in ERP
CO3:Understand and apply the concepts of ERP Manufacturing Perspective and ERP
Modules
CO4: Discuss the benefits of ERP
CO5:Apply different tools used in ERP
Units Contents Required
Hours
ERP Introduction, Benefits, Origin, Evolution and
Structure: Conceptual Model of ERP, the Evolution of
ERP, the Structure of ERP, Components and needs of
I 6
ERP, ERP Vendors; Benefits & Limitations of ERP
Packages.
Learning Resources:
Recommended Texts
1. Enterprise Resource Planning – Alexis Leon, Tata McGraw Hill.
Reference Books
1. Enterprise Resource Planning – Diversified by Alexis Leon, TMH.
2. Enterprise Resource Planning – Ravi Shankar & S. Jaiswal , Galgotia
MAPPING TABLE
CO1 3 3 3 2 2 2
CO2 2 3 3 3 3 2
CO3 2 3 3 3 3 3
CO4 3 3 3 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
to each PSO 13 15 15 14 14 13
Credits
Code
Exter
Total
CIA
nal
ROBOTICS AND SEC 2 - - - 2 25 75 100
ITS
APPLICATIONS
LearningObjectives:(forteachers:whattheyhavetodointheclass/lab/field)
To make the students familiar with the various drive systems of robots, sensors
and their applications in robots
To introduce the parts of robots, basic working concepts and types of robots
Reference Books
1. Industrial robotic technology-programming and application by M.P.Groover
et.al, McGrawhill2008
2. Robotics technology and flexible automation by S.R.Deb, THH-2009
MAPPING TABLE
CO1 3 2 3 2 2 2
CO2 3 3 3 3 3 2
CO3 3 2 3 3 3 3
CO4 3 2 2 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
to each PSO 15 12 14 14 14 13
Credits
Code
Exter
Total
CIA
nal
Learning Resources:
Recommended Texts
1. Jerry Banks, “Handbook of Simulation: Principles, Methodology, Advances,
Applications, and Practice”, John Wiley & Sons, Inc., 1998.
Reference Books
1. Andrew F. Seila, Vlatko Ceric, Pandu Tadikamalla, “Applied Simulation
Modeling”, Thomson Learning Inc., 2003.
MAPPING TABLE
CO1 3 2 3 2 2 2
CO2 3 3 3 3 3 2
CO3 3 2 3 3 3 3
CO4 3 2 3 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
to each PSO 15 12 15 14 14 13
Credits
Code
Exter
Total
CIA
nal
PATTERN SEC 2 - - - 2 25 75 100
RECOGNITION
Learning Objectives: (forteachers:whattheyhavetodointheclass/lab/field)
To study the Pattern Recognition techniques and its applications
Learning Resources:
Recommended Texts
1. Robert Schalkoff, “Pattern Recognition: Statistical Structural and Neural
Approaches”, John wiley & sons.
Reference Books
1. Earl Gose, Richard Johnson baugh, Steve Jost, “Pattern Recognition and Image
Analysis”, Prentice Hall of India, Pvt Ltd, New Delhi.
2. Duda R.O., P.E.Hart & D.G Stork, “ Pattern Classification”, 2nd Edition,
J.Wiley.
3. Duda R.O.& Hart P.E., “Pattern Classification and Scene Analysis”, J.wiley.
4. Bishop C.M., “Neural Networks for Pattern Recognition”, Oxford University
Press.
MAPPING TABLE
CO1 3 2 3 3 2 2
CO2 2 3 3 3 3 2
CO3 3 2 3 3 3 3
CO4 3 3 3 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
to each PSO 14 13 15 15 14 13
Inst. Hours
Course/
Category
Credits
External
Paper
Total
CIA
Skill ADVANCED EXCEL SEC 2 - - - 2 2 25
Enhanceme
75 100
nt course
Course Objective
C1 Handle large amounts of data
MAPPING TABLE
CO/PSO PSO1 PSO2 PSO3 PSO4 PSO5 PSO6
CO1 3 2 3 2 2 2
CO2 3 3 3 2 3 2
CO3 3 2 3 3 3 3
CO4 3 2 2 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
to each PSO 15 12 14 13 14 13
Inst. Hours
Category
Credits
External
Total
CIA
SKILL Open Source Software SEC 2 - - - 2 2 25
ENHANCEMENT Technologies 75 100
COURSE
Course Objective
C1 Able to Acquire and understand the basic concepts in Java,application of OOPS concepts.
C2 Acquire knowledge about operators and decision-making statements.
C3 To Identify the significance and application of Classes, arrays and interfaces and
analyzing java arrays
C4 Understand about the applications of OOPS concepts and analyze overriding and
packages through java programs.
C5 Can Create window-based programming using applet and graphics programming.
UNIT Details No. of C
Hours O
I Open Source – open source vs. commercial software – What is Linux? 6 C1
– Free Software – Where I can use Linux? - Linux kernel – Linux
distributions.
II Introduction Linux Essential Commands – File System concept – 6 C2
Standard Files –The Linux Security Model – Introduction to Unix –
Unix Components Unix Files –
III Introduction - Apache Explained – Starting, Stopping and Restarting 6 C3
Apache –Modifying the Default configuration – Securing Apache – Set
user and Group
Total 30
Course Outcomes Programme Outcome
CO On completion of this course, students will
1 Acquire and understand the basic concepts in Java,
Po1
application of OOPS concepts.
2 Acquire knowledge about operators and decision-making
Po1,Po2
statements.
3 Identify the significance and application of Classes,
Po4,Po6
arrays and interfaces and analyzing java arrays
4 Understand about the applications of OOPS concepts
and analyze overriding and packages through java Po4,Po5,Po6
programs.
5 Create window-based programming using applet and
Po3,Po8
graphics programming.
Text Book
1 1. James Lee and Brent Ware “Open Source Web Development with LAMP
using
2 2. LINUX, Apache, MySQL, Perl and PHP”, Dorling Kindersley (India) Pvt. Ltd,
2008.
Reference Books
1. Eric Rosebrock, Eric Filson, “Setting up LAMP: Getting Linux, Apache, MySQL and
PHP and
working together”, John Wiley and Sons, 2004.
Web Resources
1. Introduction to Open-Source and its benefits - GeeksforGeeks
2. https://www.bing.com/
MAPPING TABLE
CO1 3 2 3 2 3 2
CO2 2 3 3 3 3 2
CO3 2 2 3 3 3 3
CO4 3 3 2 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
to each PSO 13 13 14 14 15 13
Credits
External
Total
CIA
LearningResources:
RecommendedTexts
Head First PHP & MySQL: A Brain-Friendly Guide- 2009-Lynn mighley and Michael
Morrison.
ReferenceBooks
The Joy of PHP: A Beginner's Guide to Programming Interactive Web Applications with PHP
and MySQL- Alan Forbes
MAPPING TABLE
CO1 3 2 3 2 2 2
CO2 3 3 3 3 3 2
CO3 3 2 3 3 3 3
CO4 3 2 2 3 3 3
CO5 3 3 2 3 3 3
Weightage of
course contributed
to each PSO 15 12 13 14 14 13
Inst. Hours
Category
Credits
External
Total
CIA
SKILL PHP Programming SEC 2 - - - 2 2 25
ENHANCEMEN 75 100
T COURSE
LearningObjectives:(forteachers:whattheyhavetodointheclass/lab/field)
To learn the basic web concepts and to create rich internet applications that use most recent
client-side programming technologies.
To learn the basics of HTML, DHTML, XML, CSS, Java Script and AJAX.
Course Outcomes:(forstudents:Toknowwhattheyaregoingtolearn)
CO1: Ability to Develop and publish Web pages using Hypertext Markup Language(HTML).
CO2: Ability to optimize page styles and layout with Cascading Style Sheets(CSS).
CO3: Ability to Understand, analyze and apply the role of languages to create acapstone
CO4: Website using client-side web programming languages like HTML, DHTML, CSS, XML,
JavaScript, and AJAX
CO5: Able to understand the concept of jQuery and AngularJS
Units Contents Required
Hours
HTML: HTML-Introduction-tag basics- page structure-adding 6
comments working with texts, paragraphs and line break. Emphasizing
I
test- heading and horizontal rules-list-font size, face and color-
alignment- links-tables-frames
II Forms & Images Using Html: Graphics: Introduction-How to work 6
efficiently with images in web pages, image maps, GIF animation,
adding multimedia, data collection with html forms textbox, password,
list box, combo box, text area, tools for building web page front page
XML & DHTML: Cascading style sheet (CSS)-what is CSS-Why we use CSS- 6
III adding CSS to your web pages-Grouping styles-extensible markup language
(XML).
JavaScript: Client side scripting, What is JavaScript, How to develop 6
IV JavaScript, simple JavaScript, variables, functions, conditions, loops and
repetition.
Ajax: Introduction, advantages &disadvantages, Purpose of it, ajax based web 6
application, alternatives of ajax Java Script & AJAX: Introduction to array-
V
operators, making statements-date & time-mathematics- strings-Event handling-
form properties. AJAX. Introduction to jQuery and AngularJS
Learning Resources:
Recommended Texts
1. Pankaj Sharma, “Web Technology”, Sk Kataria &SonsBangalore, 2011.(UNIT I, II, III &IV).
2. Achyut S Godbole & Atul Kahate, “Web Technologies”, 2002, 2nd Edition. (UNIT V:AJAX)
Reference Books
1. Laura Lemay, Rafe Colburn , Jennifer Kyrnin, “Mastering HTML, CSS & Javascript Web
Publishing”,2016.
2. DT Editorial Services (Author), “HTML 5 Black Book (Covers CSS3, JavaScript, XML,
XHTML, AJAX, PHP, jQuery)”, Paperback 2016, 2ndEdition.
MAPPING TABLE
CO1 3 2 3 2 2 2
CO2 3 3 3 3 3 2
CO3 3 2 3 3 3 3
CO4 3 2 2 3 3 3
CO5 3 3 3 2 3 3
Weightage of
course contributed
to each PSO 15 12 14 13 14 13
Hours
egory
Total
Inst.
CIA
SKILL NETWORK SEC 2 - - - 2 2 25
ENHANCEMEN SECURITY 75 100
T COURSE
LearningObjectives:(forteachers:whattheyhavetodointheclass/lab/field)
To study the number theory used for network security
To understand the design concept of cryptography and authentication
To develop experiments on algorithm used for security
Course Outcomes:(forstudents:Toknowwhattheyaregoingtolearn)
CO1: Develop an understanding of the fundamentals of networking and security
CO2: Gain an appreciation for the complexities of protecting networks and systems from attack
CO3: Learn about the tools used to detect and protect against malicious attacks
CO4: Develop the skills to configure various security-related technologies
CO5: Utilize protocols such as TLS/SSL, IPSec, and SNMP in order to build secure systems.
Units Contents Required Hours
Model of network security–Security attacks,
services and attacks– OSI security architecture
– Classical encryption techniques – SDES –
I 6
Block cipher Principles DES– Strength of
DES–Block cipher design principles – Block
cipher mode of operation
Number Theory– Prime number–Modular
II 6
arithmetic– Euclid’s algorithm
Authentication requirement – Authentication
function – MAC – Hash function –Security of
III 6
hash function and MAC – SHA - HMAC –
CMAC
Authentication applications – Kerberos –
IV X.509 Authentication services - E-mail 6
security–IP security- Web security.
Intruder–Intrusion detection system–Virus and
related threats– Counter measures – Firewalls
V 6
design principles – Trusted systems – Practical
implementation of cryptography and security
Learning Resources:
Recommended Texts
1. WilliamStallings,“Cryptography&NetworkSecurity”,PearsonEducation,FourthEd
ition2010.
Reference Books
1. CharlieKaufman,RadiaPerlman,MikeSpeciner,“NetworkSecurity,Privatecom
municationinpublicworld”,PHISecondEdition,2002.
2. BruceSchneier,NeilsFerguson,“PracticalCryptography”,WileyDreamtechInd
iaPvtLtd,FirstEdition,2003.
3. DouglasRSimson“Cryptography–
Theoryandpractice”,CRCPress,FirstEdition,1995.
MAPPING TABLE
CO1 3 2 3 2 3 2
CO2 2 3 3 3 3 2
CO3 2 2 2 3 3 3
CO4 3 2 2 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
to each PSO 13 12 13 14 15 13
Credits
External
Total
CIA
Web resources
https://www.learnopencv.com/
https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-435j-digital-image-
processing-fall-2004/
http://web.stanford.edu/class/cs155/
MAPPING TABLE
CO1 3 2 3 2 2 2
CO2 2 3 3 3 3 2
CO3 2 2 3 3 3 3
CO4 3 2 2 3 3 3
CO5 3 3 3 3 2 3
Weightage of
course contributed
to each PSO 13 12 14 14 13 13