0% found this document useful (0 votes)
60 views7 pages

FC5490 Emerging Trends

This document outlines the curriculum for the course "Emerging Trends in Computer Engineering/Information Technology" for the academic year 2020-2021 at Government Polytechnic, Amravati. The course aims to create awareness about major trends that will define technological disruption in fields like computer engineering and IT. It is a 3-credit course taught over 16 weeks with 32 hours of lectures and 16 hours of practical sessions. The course covers topics like artificial intelligence, machine learning, deep learning, Internet of Things, embedded systems, ethical hacking and network vulnerabilities. It involves both theory and practical sessions to help students understand and apply the concepts.

Uploaded by

Aradhana Hingne
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views7 pages

FC5490 Emerging Trends

This document outlines the curriculum for the course "Emerging Trends in Computer Engineering/Information Technology" for the academic year 2020-2021 at Government Polytechnic, Amravati. The course aims to create awareness about major trends that will define technological disruption in fields like computer engineering and IT. It is a 3-credit course taught over 16 weeks with 32 hours of lectures and 16 hours of practical sessions. The course covers topics like artificial intelligence, machine learning, deep learning, Internet of Things, embedded systems, ethical hacking and network vulnerabilities. It involves both theory and practical sessions to help students understand and apply the concepts.

Uploaded by

Aradhana Hingne
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

GOVERNMENT POLYTECHNIC, AMRAVATI

(AN AUTONOMOUS INSTITUTE OF GOVERNMENTOF MAHARASHTRA)


CURRICULUM DEVELOPMENT CELL
----------------------------------------------------------------------------------------------------------------
PROGRAMME TITLE: DIPLOMA IN COMPUTER ENGINEERING/
INFORMATION TECHNOLOGY
COURSE CODE: FC5490
COURSE TITLE: EMERGING TRENDS IN COMPUTER ENGINEERING/
INFORMATION TECHNOLOGY(For Academic year 2020-2021)

TEACHING SCHEME:
TOTAL CONTACT
LEVEL OF PRERE- WEEKLY TOTAL TOTAL HOURS
COURSE QUISITE CONTACT HRS. CREDITS WEEKS
L T P L T P
V 02 -- 01 03 16 32 -- 16

EXAMINATION SCHEME:
THEORY(Marks) PRACTICAL(Marks)
ESE ESE PA TOTAL ESE PA TOTAL
PAPER (Marks)
HRS.
MAX. 35$ 15* 50 25# 25^ 100
02 MIN. 14 20 10 10 -
@: Internal Assessment #: External Assessment Skill based $: online examination
(*) Under the Theory PA, Out Of 15 Marks, 10 Marks is the Average of Two Tests and 05Marks are for Micro project-
(^) Under practical PA Continuous Assessment of Practical Work is to be done by Course Teacher as per CDC norms.
For the courses having only practical examination, PA has two parts (i) Continuous Assessment of Practical work - 60% and (ii) -40%.

1. RATIONALE:
Advancements and Applications of Computer engineering and Information Technology are
ever changing Emerging trends aims at creating awareness about major trends that will define
technological disruption in the upcoming years in the field of Computer engine ering and
Information Technology. There are some emerging areas expected to generate revenue,
increasing demand as IT professionals and open avenues of entrepreneurship.

2. COURSE OUTCOMES (COs)


At the end of this course, student will be able to: -
1. Describe Artificial Intelligence ,machine learning and deep learning
2. Interpret Internet of Things concepts.
3. Describe Ethical Hacking process and Detect Network Vulnerabilities..

326
3. DETAILED CONTENTS: THEORY
Unit Unit Outcomes Topics and Subtopics CO Ma Ho
No. rks urs
Unit-1 1a.Describe the concept of 1.1 Introduction of AI 1 07 06
Artificial AI Concept
Intelligence Scope of AI
1b.State the components
Components of AI
of AI
Types of AI
1c.List Applications of AI Application of AI
1d.Differentiate between 1.2 Concept of Machine Learning
machine learning & and Deep Learning
deep Learning
Unit 2 2a. State the domains and 2.1 Embedded Systems: 2 14 14
Internet of application areas of Embedded system concepts.
Things Embedded Systems Purpose of Embedded system,
2b.Describe IoT systems Architecture of Embedded
in which information system,
and knowledge are Types of Embedded
inferred from data processors–PIC,ARM, AVR,
ASIC
2c.Describe designs of IoT
2.2 Internet of Things : Definition
2d. State IoT Issues and and Characteristics of IoT
challenges in Physical design of IoT
deployment Things of IoT
IoT Protocols
Logical design of IoT,
IoT functional Blocks,
IoT communication models,
IoT communication APIs,
IoT Enabling Technologies
IoT levels and Deployment
Templates,
Iot Issues and Challenges,
Applications
IoT devices and its features:
Arduino, Uno, Rasperry Pi,
Node Microcontroller unit
Unit 3 3a.define Hackers 3.1 Ethical Hacking 3 14 12
Basics of Defining hacker, Malicious users
3b.Describe the need of
Hacking 3.2 Need to hack your own system.
hack your systems
3.3 Mention the dangers your
3c.Descibe the dangers in systems face
systems Nontechnical attacks
3d.Describe the Ethical Network-infrastructure attacks
Hacking process Operating-system attacks
3e.Describe Network Application and other specialized
Infrastructure attacks
Vulnerabilities 3.4 Obeying the Ethical hacking
Principles
Working ethically
327
Respecting privacy
Not crashing your systems
3.5 The Ethical hacking process
Formulating your plan
Selecting tools
Executing the plan
Evaluating results
Moving on
3.6 Network Hacking
3.6.1 Network Infrastructure:
Network Vulnerabilities
Scanning-Ports
Ping sweep
Scanning SNMP
Grabbing Banners
Analyzing Network Data and Network
Analyzer
MAC-daddy attack

4.LIST OF PRACTICALS:

Sr PRACTICAL OUTCOMES (PrOs) CO


No. NO.
1. Write a simple program using PROLOG. 1
2 Write a program to transfer serial data on your thingspeak account using Node 2
MCU

3 Write a program to transfer serial data on your thingspeak account using 2


Raspberry Pi

4 Write a program to transfer data to thingspeak cloud using Interface LM35 2


Temperature sensor to Node MCU8266
5 Use of network reconnaissance tools like WHOIS, dig, traceroute, nslookup to 3
gather information about networks and domain registers
6 Download and install nmap. Use it with different options to scan open ports, 3
perform OS fingerprinting, do a ping scan, tcp port scan, udp port scan, etc.

Note
i. The entire above listed practical’s need to be performed compulsorily, so that the students
reach the `Precision level of Dave’s Psychomotor Domain’.
ii. The 'Process' and 'Product' related skills associated with each PrO are to be assessed
according to a suggested sample given below.

S. No. Performance Indicators Weightage in %


1 20
Preparation of experimental setup
2 Setting and operation 20
3 Follow safety precautions 10
4 Observations and Recording 10
5 Interpretation of result and Conclusion 20

328
S. No. Performance Indicators Weightage in %
6 Answer to sample questions 10
7 Submission of report in time 10
Total 100%

The above PrOs also comprise of the following social skills/attitudes which are Affective Domain
Outcomes (ADOs) that are best developed through the laboratory/field based experiences:
• Work collaboratively in team.
• Follow ethical Practices
The ADOs are not specific to any one PrO, but are embedded in many PrOs. Hence, the acquisition of
the ADOs takes place gradually in the student when s/he undertakes a series of practical experiences
over a period of time. Moreover, the level of achievement of the ADOs according to Krathwohl’s
‘Affective Domain Taxonomy’ should gradually increase as planned below:
• ‘Valuing Level’ in 1st year
• ‘Organization Level’ in 2nd year and
• ‘Characterization Level’ in 3rd year

5. SUGGESTED STUDENT ACTIVITIES


Other than the classroom and laboratory learning, following are the suggested student-related Co-
curricular activities which can be undertaken to accelerate the attainment of the various Outcomes in this
course: Students should conduct following activities following activities in group and prepare reports of
about 5 pages for each activity, also collect/record physical evidences for their (students) portfolio which
will be useful for their placement interviews:
a. Prepare report on suggestive case study of Hacking as given below:
i.) The Aaron Cafferey case-United Kingdom ,2003
http://digitalcommons.law.scu.edu/cgi/viewcontent.gi?article=1370&context=chtlj
ii) The Julie Amero case-Connecticut,2007
http://dfir.com.br/wp-content/uploads/2014/02/julieamerosummary.pdf
iii) The Michael Fiola case-Massachusetts,2008
http://truthinjustice.org/fiola.htm
b. Prepare report on any given case study of IoT..

6. SUGGESTED INSTRUCTIONAL STRATEGIES


These are sample strategies, which the teacher can use to accelerate the attainment of
the various learning outcomes in this course:
a. Massive open online courses (MOOCs) may be used to teach various topics/subtopics.
b. The teacher needs to ensure to create opportunities and provisions for co-curricular Activities.
c. About 10-15% of the topics/sub-topics which is relatively simpler or descriptive in nature is to be
given to the students for self-directed learning and assess the development of the LOs/COs
through classroom presentations (see implementation Guideline for details).
d. Procure various materials required for practical exercises
e. Guide student(s) in undertaking micro-projects.
f. Demonstrate students thoroughly before they start doing the practice.
g. Observe continuously and monitor the performance of students in Lab.

7. SUGGESTED MICRO-PROJECTS.
Only one micro-project is planned to be undertaken by a student assigned to him/her in the beginning of
the semester. She/he ought to submit it by the end of the semester to develop the industry oriented COs.
Each micro-project should encompass two or more COs which are in fact, an integration of practicals,
cognitive domain and affective domain LOs.
The microproject could be industry application based, internet-based, workshop-based, laboratory-based
or field-based. Each student will have to maintain dated work diary consisting of individual contribution
in the project work and give a seminar presentation of it before submission. The total duration of the
329
micro-project should not be less than 16 (sixteen) student engagement hours during the course. In the all
semesters, the micro-project could be group-based(4 to 5 students) to build up the skill and confidence in
every student to become problem solver so that she/he contributes to the projects of the industry.
A Suggestive list of micro-projects is given here. Similar micro-projects could be added by the concerned
faculty:
a.IoT Based Humidity and Temperature Monitoring

i. The need of IoT Based Humidity and Temperature Monitoring .


ii. The hardware requirements for designing this system.
iii. The software requirements for designing this system.
iv. Describe the circuit designed for this system along with its working
v. Design an IoT application and mention how to store and retrieve a data on it.

b.IoT based Weather Monitoring System

i. The need of IoT Based Weather Monitoring System


ii. The hardware requirements for designing this system
iii. The software requirements for designing this system.
iv. Describe the circuit designed for this system along with its working
v. Design an IoT application and mention how to store and retrieve a data on it .

c. Study Credit card fraud as an identity threat. Identify

i. Use of digital media in carrying out fraud.


ii. Vulnerability Exploided.
iii. Effect of fraud.
iv. Protection /Precaution to be taken against such frauds.

d. Study any Trojan attack. Identify the Trojan attack.

i. State the way Trojan got installed on particular Machine.


ii. State the effects of the Trojan
iii. Elaborate/ Mention /State protection /Blocking mechanism for this
Specific Trojan, Example specification of any anti-threats platform which
filters the Trojan.

8. MAJOR EQUIPMENTS/INSTRUMENTS REQUIRED


Sr Equipment Name with Broad Specification Practical No.
No.
1 PROLOG 1

2 Node MCU and Peripherals (e.g. LEDs, Sensors like Temp. sensor 2,3,4
LM35, Ultrasonic sensor etc.)
3 Raspberry Pi 2,3.,4

4 Arduino IDE (Open source software) 2,3,4


5 Python Software 2,3,4

6 Kali Linux 5,6


7 WHOIS, dig, traceroute, nslookup tools 5
8 n-map tool 5

330
9. SUGGESTED SPECIFICATION TABLE FOR QUESTION PAPER DESIGN

Unit Unit Title Marks Distribution of Theory Marks


No. per Unit R U A
Level Level Level

1 07 3 2 2
Artificial Intelligence

2 14 4 6 4
Internet of Things

3 Basics of Hacking 14 4 6 4

Total 35 11 14 10

R= Remember, U= Understanding, A=Application and above (Bloom’s Revised taxonomy)

Note: This specification table provides general guidelines to assist student for their learning and to
teachers to teach and assess students with respect to attainment of UOs. The actual distribution of
marks at different taxonomy levels (of R, U and A) in the question paper may vary from above table

10. SUGGESTED LEARNING RESOURCES:


Sr.No. Title Of Book Author Publication
1. Artificial Intelligence R.B.Mishra PHI Learning Pvt. Ltd
2. Introduction to Embedded Shibu K.V. Tata Mcgraw Hill
Systems ISBN 978-0-07-014589-4
3. Internet Of Things –A Arshadeep Bahga,Vijay McGraw Hill Education, Private
Hands –on Approach Madisetti Limited,New
Delhi,2010,ISBN:978-0-07-
068178-1
4. Hacking for Dummies Kevin Beaver CISSP Willey Publishing Inc.
ISBN:978-81-265-6554-2

11. SOFTWARE/LEARNING WEBSITES.


a. https://www.allitebooks.in/the-internet-of-things/
b. https://www.versatek.com/wp-content/uploads/2016/06/IoT-eBook-version5.pdf
c. Https://www.tutorialspoint.com/internet -of-things/intrnet-of-thins_tutorial.pdf
d. http://www.spmkck.co.in/Notes/Learning%20Internet%20of%20Things.pdf
e. https://docs.microsdoft.com/en-us/sysinternals/downloads/psloggedon
f. www.openwall.com/passwords/windows-pwdump
g. https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_process.htm
h. https://slideplayer.com/slide/7480056

331
12. COURSE CURRICULUM DEVELOPMENT COMMITTEE:

SR. NO. NAME DESIGNATION INDUSTRY/INSTITUTE


1. Dr.P.P.Karde H.O.D Information Govt. Polytechnic
Technology Amravati
2. Dr. P R Satav Lecturer in Computer Govt. Polytechnic
Engineering Amravati
3. A.P.Jane Lecturer in Information Govt. Polytechnic
Technology Amravati
4. R.R.Bhoge Lecturer in Information Govt. Polytechnic
Technology Amravati

Govt. Polytechnic, Programme Board of Studies of Computer Engineering has approved the
above course curriculum on 30/12/2020 and is adopted for Computer Engineering Programme.

CHAIRMAN
PROGRAMME BOARD OF STUDIES,
COMPUTER ENGINEERING
GOVERNMENT POLYTECHNIC,AMRAVATI.

The General Board of Studies has approved the above course curriculum on 06/02/2021
The Governing Body has approved the above course curriculum on 13/08/2021

332

You might also like