DSI Syllabus1920
DSI Syllabus1920
SCHOOL OF ENGINEERING
(CST)
INTENT
In the past years of learning, the teaching/learning has been teacher centric. In the general university system, the teacher follows the prescribed
syllabus, delivers the lectures as per a well scheduled timetable and completes the teaching process. The prescribed labs also have a routine
structure where students carry out well laid out experiments’ week on week.
The expectations and demands in today's contest are mainly in terms of problem solving. The conventional classroom engagement on its own is
found to be inadequate for students to solve real world problems when they start working in an industry. The 1-credit ‘special topic’ course will
generally have involved design and implementation components.
DELIVERABLE(S)
1. Students organize hackathons/competitions/webinar/workshops/TEDx talks/talks by CST alumni/project exhibition
under the supervision of a faculty member.
2. Creating New Product/Service – Student or team creates a new product/service by applying the concepts learned thus
far.
3. Testing Product/Service – Students thoroughly test all the features and validate the products/services developed by their
CST peers and recommend a set of features that may be added to the product/service. They assist their peers involved in
start-ups in the design and implementation of the new features.
4. Visit to a University Abroad - A group of students participate in a well-structured program in a university abroad and
complete the requirements of the university.
5. Working under a Research Professor within DSU or from Premium Institutes such as IISc, IIT, IIIT on a specific
project/task.
SEMESTER/YEAR : III SEM/II YEAR
COURSE CODE : 19CS2301
TITLE OF THE COURSE : ENGINEERING MATHEMATICS – III – CSE & CST
L: T: P: S/P : C : 4:0: 0:0 :4
Textbooks:
1. A First course in complex analysis with applications, Dennis Zill and Patrick Shanahan, Jones and
Bartlett publishers.
3. Fundamentals of Mathematical Statistics, S. C. Gupta and V. K. Kapoor, Sultan Chand & Sons, 11th
Edition
Reference Books:
1. Complex Variables and applications, Brown and Churchill, Mc Graw Hill Education, Eighth Edition.
2. Probability, Statistics and Statistics with Reliability, Queuing, and Computer Science Applications,
Kishore Trivedi, Prentice Hall, 2nd Edition
3. Probability and Random Processes, S. Miller and Childers, Elsevier Inc.,Second Edition
SEMESTER/YEAR : III SEM/II YEAR
COURSE CODE : 19CS2302
TITLE OF THE COURSE : COMPUTATIONAL THINKING WITH PYTHON
L: T: P: S/P : C : 2:0:2:0:3
Course Objectives:
Course Content
Reference Books:
1. “Computer Science Using Python: A Computational Problem- Solving Focus”,
Charles Dierbach, Introduction John Wiley, 2012.
2.“Introduction to Computation and Programming Using Python”, John V Guttag,
Prentice Hall of India, 2015.
3."How to think like a Computer Scientist, Learning with Python", Allen Downey,
Jeffrey Elkner and Chris Meyers, Green Tea Press, 2014.
4.“Learning to Program with Python”, Richard L. Halterman, 2011.
SEMESTER/YEAR : III SEM/II YEAR
COURSE CODE : 19CS2303
TITLE OF THE COURSE : DIGITAL ELECTRONICS & LOGIC DESIGN
L: T: P: S/P : C : 3:0:2:0:4
Course Objectives
The objectives of the Course are:
● To understand various number systems and conversion from one to other number
systems
● To understand the difference between analog and digital signals
● To cite the basic characteristics of TTL and CMOS logic families
● To familiar with basic logic gates and their truth tables
● To introduce basic postulates of Boolean algebra
● To manipulate expressions into POS or SOP form.
● To introduce the methods for simplifying Boolean expressions like K-Map and Quine
Mclusky
● To understand the concept of don’t care conditions and how they can be used to further
optimize the logical functions
● To design simple combinational circuits such as multiplexers, decoders, encoders
● To understand the differences between combinational and sequential Logic circuits
● To familiar with basic sequential logic component-SR Latch
● To understand the basics of various types of memories.
● To present the working of various Flip- Flops (T flip-flop, D flip-flop, R-S flip-flop, JK flip-
flop)
● To design combinational circuits using programmable logic devices.
● To design sequential circuits such as different types of Counters, Shift Registers
Course Content
Module 1: NUMBER SYSTEMS, BOOLEAN ALGEBRA AND LOGIC GATES:
Review of number systems-Binary, Octal, Hexadecimal. Introduction to Analog
and Digital signals. TTL and CMOS technology, TTL and CMOS Parameters.
Truth table of Basic Gates: NOT, OR, AND, Universal Logic Gates: NOR, NAND,
Positive and Negative Logic, Laws of Boolean algebra, Theorems of Boolean
algebra, Boolean/Switching functions and their implementation.
SIMPLIFICATION OF BOOLEAN EXPRESSIONS AND FUNCTIONS:
Sum-of-Products Method, Truth Table to Karnaugh Map, Pairs Quads, and
Octets, Karnaugh Simplifications, Don’t-care Conditions.
Practical:
1. Study and verification of Basic gates with Truth Tables
2. Simplification of expressions using Karnaugh Maps and realizing circuits
using Basic Gates
3. Realize binary to gray code converter and vice versa
Module 2: SIMPLIFICATION OF BOOLEAN EXPRESSIONS AND FUNCTIONS:
Product-of-sums Method, Product-of-sums simplifications, Simplification by
Quine-McClusky Method.
DESIGN OF COMBINATIONAL LOGIC CIRCUITS:
Modular combinational logic elements- Multiplexers and Demultiplexers,
Decoders, Encoders, Priority encoders, Magnitude comparator – BCD converter,
Parity Generators and Checkers.
Practicals:
1. Simplify the given expression using tabular method and to realize
circuits using Multiplexers.
2. Design and implementation parallel adder and subtractor
3. Design and implementation of comparators
4. Design various combinational logic circuits like encoders, decoders
References:
Course Objectives
The objectives of the course are
● To introduce the concept of data structure and its applications
● To introduce C language concepts required for data structures
● To design data structure operations to solve problems
● To introduce applications of data structures
● To introduce non-primitive data structures
● To analyse the complexity of a data structure
● To introduce static and dynamic memory allocation using C language
● To explain linear data structures – stack, queue, linked list
● To explain non-linear data structures – trees and graphs
● To train students to design an application as part of the course mini- project using their
choice of data structure using C language.
Course Outcomes
After completing this course, students will be able to
Outline basic C program design for data structures
Implement stack & queue data structure and their applications
Apply concepts of dynamic memory allocation to real-time
problems
Implement tree data structure and its applications
Implement graph data structure and its applications
Outline the concepts of file structures
Course Content
Linked List: Types, Introduction to Singly Linked lists: Representation of Linked Lists in Memory,
Traversing, Searching, Insertion & Deletion from Linked List. Doubly Linked List, Operations on Doubly
Linked List (Insertion, Deletion, Traversal). Applications: Polynomial Representation & Basic
Operations, Stack & Queue Implementation using Linked Lists.
11 Hours
Module-5 File Structures: Physical storage media, File Organization, Linked Organization of File,
Inverted File, Organization Records into Blocks, Sequential Blocks, Indexing & Hashing, Multilevel
Indexing, Tree Index, Random File, Primary Indices, Secondary Indices.
11 Hours
Laboratory Experiments
Open-Ended Experiments
6. A man in an automobile searches for another man who is located at some point of a certain road.
He starts at a given point and knows in advance the probability that the second man is at any
given point of the road. Since the man being sought might be in either direction from the starting
point, the searcher will, in general, must turn around many times before finding his target. How
does he search to minimize the expected distance travelled? When can this minimum
expectation be achieved?
7. The computing resources of a cloud are pooled and allocated according to customer demand.
This has led to increased use of energy on the part of the service providers due to the need to
maintain the computing infrastructure. What data structure will you use for allocating
resources which addresses the issue of energy saving? Why? Design the solution.
Course Objectives
The objectives of the Course are:
● To familiarize the prospective engineers with elementary
● To give an introduction to market/firm structure.
● To understand tools that they are likely to find useful in their profession
● To introduce various economic concepts such as microeconomics and
macroeconomics
● To explain monetary and fiscal policy and Banking system.
● To introduce inventory analysis, cash control and cash flow
● To develop budgets and break even points
● To introduce the concept of linear programming
● To introduce the Indian economy.
Course Outcomes
After undergoing this course, students will be able to:
Outline basic concepts of Principles of Economics
Understand basic concepts of micro and macro economics
Outline aggregate models and financial system
Demonstrate Fiscal and Monetary tools
Solve the problems of Investment analysis
Outline concepts of Indian Economy
Course Content
Module 1:
Basic Principles and Methodology of Economics. Demand/Supply–elasticity Government Policies and
Application. Theory of the Firm and Market Structure. Basic Macro-economic Concepts (including
GDP/GNP/NI/Disposable Income) and Identities for both closed and open economies.
8 Hours
Module 2:
Aggregate demand and Supply(IS/LM).Price Indices (WPI/CPI),Interest rates ,Direct
and Indirect Taxes, Public Sector Economics–Welfare, Externalities, Labour Market-Components of
Monetary and Financial System, Central Bank–Monetary Aggregates; Commercial Banks& their
functions; Capital and Debt Markets. 8 Hours
Module 3
Monetary and Fiscal Policy Tools & their impact on the economy – Inflation and Phillips Curve -
Elements of Business/Managerial Economics and forms of organizations. Cost & Cost Control–
Techniques, Types of Costs, Budgets, Break even Analysis, Capital Budgeting, Application of Linear
Programming. 8 Hours
Module 4
Investment Analysis– NPV, ROI, IRR, Payback Period, Depreciation, Time value of money-Business
Forecasting–Elementary techniques. Statements – Cash flow, Financial. Case - Study Method.
9 Hours
Module 5
Indian economy Brief overview of post-independence period–plans. Post reform Growth, Structure of
productive activity. Issues of Inclusion–Sectors, States/Regions, Groups of people (M/F), Urbanization.
Employment–Informal, Organized, Unorganized, Public, Private - Challenges and Policy Debates in
Monetary, Fiscal, Social, External sectors.
9 Hours
References:
Course Objectives
Course Outcomes
Course Content
Module 2 : Logic and Propositional Calculus: Propositions and truth tables, tautologies and
contradictions, logical equivalence, algebra of propositions, logical implications ,
Introduction to Predicate Calculus
Module 3: Graph Theory: Introduction, data structures, graphs and multi-graphs, sub-graphs,
isomorphic and homomorphic graphs, paths, connectivity, the bridges of
Konigsberg,
traversable multi-graphs, labelled and weighted graphs, complete, regular and
bipartite graphs.
Course Objectives
The objectives of the Course are:
● To introduce the architecture of 8086
● To understand the importance and function of each pin of 8086 Microprocessor
● To familiarize with the architecture of 8086 microprocessor and its operation
● To understand the various addressing modes required for assembly language
Programming and to calculate the physical address.
● To learn the 8086 instruction set and write 8086 Assembly level programs
● To understand the importance of different peripheral devices and their interfacing to
8086
● Understand the concepts of Hardwired control and micro programmed control.
● To explain the current state of art in memory system design
● Discuss the concept of memory organization.
● Summarize the types of memory.
● Learn about various I/O devices and the I/O interface.
● Learn the different types of serial communication techniques.
● To understand DMA technique
● To provide the knowledge on Instruction Level Parallelism
● To understand the concepts of pipelining techniques.
Course Outcomes
After undergoing this course, students will be able to:
Identify the basic building blocks of 8086 microprocessor and use the addressing
modes for executing programs efficiently
Develop 8086 assembly language programs using modern assembler tools
Design interfacing of IO devices to 8086
Design data part and control part of a processor
Design different memory blocks
Understand pipeline Processing
Course Content
Module-1
Module-2
Programming 8086 and its Interfacing with I/O devices
Assembler directives, Data Movement Instructions, String Data Transfers, Miscellaneous Data Transfer
Instructions, Arithmetic and Logic Instructions, BCD and ASCII Arithmetic, Basic Logic Instructions,
Shift and Rotate, String Comparisons. Program Control Instructions: The Jump Group, Assembly
language programming with 8086, macros, procedures.
8255 - Programmable Peripheral Interface; Features, Pin diagram, block diagram, 8255 programming,
DC/Stepper motor interfacing, Keyboard and display interfacing. 9hrs
Module- 3
Basic organization of computers, Block level description of the functional units as related to the
execution of a program; Fetch, decode and execute cycle. Execution cycle in terms machine
instructions.
Information representation, Floating point representation (IEEE754), computer arithmetic and their
implementation;
Data Part Design: Fixed-Point Arithmetic-Addition, Subtraction, Multiplication and Division, Arithmetic
Logic Units control and data path, data path components, design of ALU and data-path, Control Part
Design: Control unit design; Hardwired and Micro programmed Control unit.
Discussions about RISC versus CISC architectures. 10hrs
Module-4
Memory Technology: Memory hierarchy, static and dynamic memory, RAM and ROM chips, Memory
address map, Auxiliary Memory, Associative Memory, Cache Memory and organization.
I/O subsystems: Input-Output devices such as Disk, CD-ROM, and Printer etc.; interfacing with IO
devices, Isolated versus Memory Mapped I/O
Synchronous and Asynchronous data transfer: Strobe pulse and Handshaking
Modes of data transfer: Programmed I/O, Interrupt-initiated I/O and Direct memory access (DMA)
10hrs
Module - 5
Pipeline Processing, Instruction and Arithmetic Pipeline, Pipeline hazards and their resolution, Parallel
Processing Systems, Multi-core Architectures 5hrs
1. Barry B Brey: The Intel Microprocessors, 8th Edition, Pearson Education, 2009
2. Douglas V Hall, “MICROPROCESSORS AND INTERFACING, PROGRAMMING AND
HARDWARE” TMH, 2006.
3. Mano, Morris M. Computer system architecture. Dorling Kindesley Pearson, 2005.
References:
Course Objectives
The objectives of the Course are:
1. Understand the Algorithm criteria
2. Ability to analyze time and space complexity
3. Analyze the asymptotic performance of algorithms.
4. Write rigorous correctness proofs for algorithms.
5. Understand the limitations of Algorithm power
6. Become familiar with the different algorithm design techniques.
7. Demonstrate a familiarity with major algorithms and data structures.
8. To apply Substitution method, Recursion tree method and Master’s method for
solving the recurrence relations
9. Understand the Divide and conquer design strategy
10. To Analyze the Time complexities of Divide and conquer Applications
11. To understand the Greedy Technique
12. To apply Greedy technique to Optimal storage on tapes- Minimum cost spanning
tree, Knapsack problem, Single Source Shortest Path Algorithm.
13. To learn the Dynamic programming techniques
14. To understand the difference between dynamic programming and divide and
conquer
15. To understand the concepts of Dynamic Programming Applications
16. To critically analyze the efficiency of alternative algorithmic solutions for the same
problem
17. To understand the Graph searching and Traversal methods
18. To learn about Strongly connected components, Graph matching, Network flow
Algorithm
19. To understand the Back tracking concept
20. To demonstrate the N queen’s problem
21. To understand the LC Branch and bound techniques
22. To apply LCBB for solving 0/1 Knapsack and TSP problem
23. Apply important algorithmic design paradigms and methods of analysis.
24. To understand the complexity measures
25. To compare the Polynomial vs Non-Polynomial time complexity
26. To understand the P, NP-hard and NP-Complete classes
27. Synthesize efficient algorithms in common engineering design situations.
Course Outcomes
After undergoing this course, students will be able to:
Outline the overview of Data structures and Algorithms
Understand the different Algorithmic Design strategies
Apply the Design principles and concepts to Algorithmic design
Describe the DAA paradigms and when an Algorithmic Design situation calls for it.
Analyze the efficiency of Algorithms using Time and Space complexity theory
Implement an existing algorithms to improve the run time efficiency
Course Content
Module 1 : INTRODUCTION
Notion of an Algorithm, Concept of algorithmic efficiency, Algorithm performance
Analysis- Insertion sort, Linear search. Asymptotic Notations, Analysis of
recursive algorithms through recurrence relations: Substitution method,
Recursion tree method, Master’s method.
GREEDY METHOD
General method – Optimal storage on tapes- Minimum cost spanning tree,
Knapsack problem, Single Source Shortest Path Algorithm.
Text Books:
1. T. H. Cormen, Leiserson, Rivest and Stein, “Introduction of Computer algorithm,” , 3rd
Edition, The MIT Press, 2015
2. Anany Levitin, ―Introduction to the Design and Analysis of Algorithms, Third Edition,
Pearson Education, 2012
Reference Books:
1. E. Horowitz, S. Sahni, and S. Rajsekaran, “ Fundamentals of Computer Algorithms,”
Galgotia Publication, 2015
2. Sara Basse, A. V. Gelder, “Computer Algorithms : Introduction Design &
Analysis”, 3rd Edition, Addison Wesley
3. J.E Hopcroft, J.D Ullman, “Design and analysis of Computer algorithms”,
Pearson Education, 2009
4. D. E. Knuth, “ The Art of Computer Programming , Volume 3” 2nd Edition,
Addison Wesley, 2014
5. Steven S. Skiena, “The Algorithm Design Manual”, Second Edition, Springer,
2008.
SEMESTER/YEAR : IV SEM/II YEAR
COURSE CODE : 19CS2404
TITLE OF THE COURSE : SIGNALS & SYSTEMS
L: T: P: S/P : C : 3:0:2:0:4
Course Objectives
The objectives of the Course are:
● Understand Continuous and Discrete Signals and Systems
● How to apply Fourier series, Laplace Transforms, Z transforms for signal
processing/representation
● Time Invariant System and Convolution its application to Image Processing
● To give the students’ knowledge about the most important issues in sampling and
● reconstruction
Course Outcomes
Course Content
Module 1: Introduction to Signals and Systems (10 hours):
Signals and systems as seen in everyday life, and in various branches of engineering and science. Signal
properties: periodicity, absolute integrability, determinism and stochastic character. Some special
signals of importance: the unit step, the unit impulse, the sinusoid, the complex exponential, some
special time-limited signals; continuous and discrete time signals, continuous and discrete amplitude
signals. System properties: linearity: additivity and homogeneity, shift-invariance, causality, stability,
realizability. Examples.
Text/References:
1. A. V. Oppenheim, A. S. Willsky and S. H. Nawab, “Signals and systems”, Prentice Hall India,
1997.
2. J. G. Proakis and D. G. Manolakis, “Digital Signal Processing: Principles, Algorithms, and
Applications”, Pearson, 2006.
3. H. P. Hsu, “Signals and systems”, Schaum’s series, McGraw Hill Education, 2010.
4. S. Haykin and B. V. Veen, “Signals and Systems”, John Wiley and Sons, 2007.
5. A. V. Oppenheim and R. W. Schafer, “Discrete-Time Signal Processing”, Prentice Hall,
2009.
6. M. J. Robert “Fundamentals of Signals and Systems”, McGraw Hill Education, 2007.
7. B. P. Lathi, “Linear Systems and Signals”, Oxford University Press, 2009
SEMESTER/YEAR : IV SEM/II YEAR
COURSE CODE : 19CS2405
TITLE OF THE COURSE : WEB TECHNOLOGIES
L: T: P: S/P : C : 2 : 0 : 2 : 0 :3
Course Objectives
● Understand the major areas and challenges of web programming.
● To create websites using HTML5, CSS3, JavaScript
● To create dynamic, interactive web pages using JavaScript
● Understand client-side JavaScript libraries and frameworks
● Understand server-side scripting language
● Use the techniques for creating data-driven websites using modern web technologies
Course Outcomes
After undergoing this course, students will be able to:
Know the fundamentals of web application architecture and front end technologies
like HTML5 and CSS3
Use JavaScript for client-side scripting and add dynamic content to pages.
Use of XML and JSON for data transfer between client and server
Use of Nodejs for server side programming
Use React for web development
Course Content
Markup Language (HTML5): Introduction to HTML and HTML5 - Formatting and Fonts -Commenting
Code – Anchors – Backgrounds – Images – Hyperlinks – Lists – Tables – HTML Forms.
CSS3: Levels of style sheets; Style specification formats; Selector forms; Property value forms; Font
properties; List properties; Color; Alignment of text; Background images, Conflict Resolution, CSS3
features: Box Shadow, Opacity, Rounded corners, Attribute selector.
Overview of Javascript; Object orientation and Javascript; General syntactic characteristics; Primitives,
operations, and expressions; Screen output and keyboard input. Control statements; Arrays;
Functions; Constructor; Pattern matching using regular expressions; DOM Events, Introduction to
asynchronous javascript-examples and applications, Introduction to callbacks-understanding
callbacks with an example
Text Books:
1. Programming the World Wide Web – Robert W. Sebesta, 7th Edition, Pearson Education,
2008.
2. Beginning JSON, BEN SMITH, 2015
3. Kirupa Chinnathambi, “Learning React”, 1 Edition, Addison-Wesley Professional
4. Ethan Brown, First Edition, “Web Development with Node and Express”, O’Reilly Media
Reference Books:
1. Internet & World Wide Web How to H program – M. Deitel, P.J. Deitel, A. B. Goldberg, 3rd Edition,
Pearson Education / PHI, 2004.
2. Web Programming Building Internet Applications – Chris Bates, 3rd Edition, Wiley India, 2006.
3. The Web Warrior Guide to Web Programming – Xue Bai et al, Thomson, 2003.
4. Thomas A Powell, Fritz Schneider, “JavaScript: The Complete Reference”, Third
Edition, Tata McGraw Hill, 2013.
5. Mike Mcgrath, “PHP & MySQL in easy Steps”, Tata McGraw Hill, 2012.
SEMESTER/YEAR : IV SEM/II YEAR
COURSE CODE : 19CS2407
TITLE OF THE COURSE : MANAGEMENT SCIENCES
L: T: P: S/P : C : 2 : 0 : 0 : 0 :2
Course Objectives
The objectives of the Course are:
● Acquire knowledge about the fundamental concepts of organization and management
● Make decision strategies, planning process, tools and techniques
● Inculcate the traits needed to be an effective leader and familiarize with the
organizational structures and design
● Gain valuable insights into strategic process, formulation and implementation
● Utilize the intricacies involved in cultural and ethical issues of people
● Utilize the dimensions of the planning-organizing-leading-controlling (P-O-L-C)
framework
● Gain knowledge of Micro and Small Enterprises (with the help of case studies ) and
Know the Institutional Support
Course Outcomes
After undergoing this course, students will be able to:
Observe and evaluate the various influencing factors on the current practice of organization
and management
Use the techniques and tools of planning and make prudent decisions
Identify how organizations adapt to uncertain environment, identify techniques managers
use to influence and control the internal environment
Apply and execute management goals and Managing Projects
Manage people and deal with cultural and ethical issues
Understand and use the knowledge of Micro and Small Enterprises (with the help of case
studies ) and know the Institutional Support for setting up Micro and Small Enterprises
Course Content
Module 1: Organization
The Individual and the Organization, Management, Primary Functions of Management, Role of
management in organisation, Advantages of Managing People Well, Types of Managers, Role of
managers, management Thought, Management Roles, Environmental Factors, Internal and External
Factors 6 hrs
Text Book
1. Schermerhorn, J.R., Introduction to Management, 13th ed., Wiley; 2017
2. P. C. Tripathi, P. N. Reddy; Principles of Management , Tata McGraw Hill, 4th / 6th Edition,
2010.
3. Harold Koontz, Heinz Weihrich, Essentials of management: An International & Leadership
Perspective, 10th ed., Tata McGraw -Hill Education, 2015
5. Poornima M Charantimath, Entrepreneurship Development -Small Business Enterprises – Pearson
Education – 2006
Reference Book:
1. Samuel C. Certo, Tervis Certo, Modern management: concepts and skills, 12th ed., Pearson, 2012
2. Charles W. L. Hill, Steven Mcshane, Principles of Management McGraw Hill Education,
2017
3. Stephen Robbins, Mary Coulter, Fundamentals of Management, 9th ed., Pearson
Education, 2016
SEMESTER V
YEAR III
COURSE CODE 19CS3501
TITLE OF THE COURSE FINITE AUTOMATA AND FORMAL LANGUAGES
Lecture Tutorial Practical Seminar/Projects Total Credits
SCHEME OF Instruction Hours Hours Hours Hours Hours
3 1 2 - 50 5
COURSE OBJECTIVES :
To learn general theory of automata, properties of regular sets and regular
expressions.
To understand basics of formal languages.
To know push-down automata, context- free languages, Turing machines.
COURSE OUTCOMES:
Bloom’s
CO
Outcomes Taxonomy
No. Level
CO1 Understand the concept of Automata L1
CO2 Explain the concept of Regular Expression, languages and L2
abstract machines to recognize them
CO3 Know the generalized computation model and different types L2
Computation
COURSE CONTENT:
MODULE 1 9Hrs
Introduction to Finite Automata: Study and Central concepts of automata theory, An informal
picture of finite automata, deterministic and non-deterministic finite automata, applications
of finite automata, finite automata with epsilon – transitions.
MODULE 2 12Hrs
Regular expression and languages: Regular expressions, finite automata and regular
expressions, algebraic laws of regular expressions. applications of regular expressions such
as Grep, and Lex etc.. Properties of Regular Languages: closure properties of regular
languages, Pumping Lemma, equivalence and minimization of automata
.
MODULE 3 10Hrs
Context – free Grammars and Languages: Context free grammars, Context-free languages,
Parse trees, Ambiguity in grammars and languages Pushdown Automata: Pushdown
automation (PDA), the language of PDA, equivalence of PDA’s and CFG’s, Deterministic
Pushdown Automata,
MODULE 4 9Hrs
Properties of Context – Free Languages: Normal forms of context free grammars, pumping
lemma for context free languages, closure properties of context free languages.
Applications of CFG - such as spec of programming languages, parsing techniques, and Yacc
MODULE 5 10Hrs
Introduction to Turing Machine- The Turing machine, programming techniques for Turing
machine, extensions to the basic Turing machine, restricted Turing Machines,
Turing Machines and Computers. Chomsky hierarchy
TEXT BOOKS :
1. Daniel I. A. Cohen, Introduction to Computer Theory, 2nd Edition, Wiley
India Student Edition, 2008.
2. J.E. Hopcroft , R. Motwani, and J. D. Ullman, Introduction to Automata
Theory, Languages and Computation, 3rd Edn. Pearson Education , New
Delhi 2008
REFERENCES :
1. K.L.P. Misra and N. Chandrashekaran. Theory of Computer Science-
Automata, Languages and Computation, 3rd Edn. PHI, New Delhi, 2007
COURSE OBJECTIVES:
COURSE OUTCOMES:
CO Bloom’s
No. Outcomes Taxonomy
Level
CO1 Describe the basic structure and functionality of Operating L2
System.
CO2 Analyse the performance of scheduling algorithms for the L4
given problems.
CO3 Apply the deadlock handling mechanisms to solve the given L3
problem.
CO4 Apply suitable techniques for management of different L3
Resources
CO5 L2
Understand the structure and organization of the file system.
CO6 Understand the principles of protection and security L2
Mechanisms
COURSE CONTENT:
MODULE 1 9Hrs
Operating System Overview Goals of an OS, What Operating Systems Do, Basic functions,
Computing environments, classes of Operating-System; Batch, Multiprogramming, Time
sharing, Real time, Distributed systems, Operating-System Operations, Virtualization,
Operating-System Services, System Calls, Types of System Calls, Operating-System Design
and Implementation, Operating-System Structure, System Boot, Case studies; Architecture
of Unix, The kernel of Linux, Architecture of windows
MODULE 2 12Hrs
Process Management Process Concept, Process Scheduling, Process synchronization; The
critical section problem, Peterson’s solution; Synchronization hardware, Mutex locks,
Semaphores, Classical problems of synchronization; Monitors, Inter process
Communication; Shared-Memory Systems, Message-Passing Systems, Threads Overview,
Multithreading models – Pthreads.
MODULE 3 10Hrs
Deadlocks, Memory Management :System Model, Deadlock Characterization, Methods
for Handling Deadlocks, Deadlock Prevention, Deadlock Avoidance, Deadlock Detection,
Recovery from Deadlock
Memory management strategies: Contiguous Memory Allocation, Segmentation, Paging,
Demand Paging, Page-Replacement algorithms
MODULE 4 9Hrs
File System & Implementation: File concept, Access methods, Directory structure, File-
System Mounting, Protection, Directory Implementation, Allocation Methods, Free-Space
Management, Disk Structure, Disk Scheduling
TEXT BOOKS :
1. Operating System Concepts- Abraham Silberchatz, Peter B. Galvin, Greg Gagne 9th
Edition, John Wiley
2. Operating systems- A Concept based Approach-D.M.Dhamdhere, 2nd Edition, TMH.
REFERENCES :
COURSE OBJECTIVES:
Understand the basic concepts of object-oriented design techniques.
Understand the fundamentals of object-oriented programming with Java.
Draw UML diagrams for the software system.
Impart basics of multi-threading and database connectivity.
Develop GUI using event handling techniques in Java.
COURSE OUTCOMES:
Outcomes Bloom’s
CO No.
Taxonomy
Level
CO1 Apply the concepts of object-oriented programming in software L3
design process.
CO2 Develop Java programs using Java libraries and construct to L3
solve real-time problems.
CO3 Understand, develop and apply various object-oriented L2
features using Java to solve computational problems
CO4 Implement exception handling and JDBC connectivity in Java. L3
MODULE 1 09 Hrs
An Overview of Object-Oriented Systems Development: Introduction; Two Orthogonal
Views of the Software; Object-Oriented Systems Development Methodology; Why an
Object-Oriented? Overview of the Unified Approach. Object Basics: Introduction; An
Object-Oriented Philosophy; Objects; Objects are Grouped in Classes; Attributes: Object
State and Properties; Object behaviour and Methods; Object Respond to Messages;
Encapsulation and Information Hiding; Class Hierarchy: Inheritance; Multiple Inheritance;
Polymorphism; Object Relationships and Associations: Consumer-Producer Association;
Aggregation and Object Containment; Case Study - A Payroll Program; Object-Oriented
Systems Development Life Cycle: Introduction; Software Development Process; Building
High-Quality Software; Object-Oriented Systems Development: A Use Case Driven
Approach; Reusability.
MODULE 2 08 Hrs
Unified Modelling Language :Introduction; Static and Dynamic models; Why Modeling?
Introduction to the UML; UML Diagrams; UML Class Diagram; Use-Case Diagram.
Introduction to Java: Java’s Magic: The Bytecode; JVM; Object-Oriented Programming;
Simple Java programs; Two Control Statements; Lexical Issues; Data Types; Variables,
Arrays and String constructors; Operators; Control Statements; Introducing Classes:
Class Fundamentals; objects; methods; constructors; this Keyword; Garbage Collection;
finalize() method; Parameter Passing; Overloading; Access Control Keywords. Inheritance
basics; method overriding; abstract classes; Packages and interfaces. Exception handling
fundamentals; multiple catch; nested try statements.
MODULE 3 09 Hrs
Multi-Threaded Programming :Multi-Threaded Programming: Java Thread Model; The
main Thread; Creating a thread and multiple threads; Extending threads; Implementing
Runnable; Synchronization; Inter Thread Communication; producer consumer problem.
Input/Output: I/O Basic; Reading console input Writing Console output.
MODULE 4 08 Hrs
Event and GUI Programming:Introducing Swing; The Origins of Swing; Swing Is Built
on the AWT; Two Key Swing Features; The MVC Connection; Components and
Containers; The Swing Packages; A Simple Swing Application; Event Handling; JLabel;
JTextField; JButton
MODULE 5 08 Hrs
Database Access:
The Concept of JDBC; JDBC Driver Types; JDBC Packages; A Brief Overview of the JDBC
process; Database Connection; Associating the JDBC/ODBC Bridge with the Database;
Statement Objects; ResultSet.
TEXT BOOK:
1. Bahrami A.; Object Oriented Systems Development using the Unified Modeling Language; McGraw
Hill; 1999.
2. Schildt; Herbert. Java The Complete Reference; 8th Edition. US: McGraw-Hill Osborne Media; 2011.
3. Jim Keogh; J2EE: The Complete Reference; McGraw Hill Education in 2002.
REFERENCES:
1. Barclay K., J. Savage, Object Oriented Design with UML and Java, Elsevier, 2004.
2.Y. Daniel Liang, Introduction to Java Programming, 7th edition, Pearson, 2013.
SEMESTER V
YEAR III
COURSE CODE 19CS3504
TITLE OF THE COURSE DATABASE MANAGEMENT SYSTEMS + Lab
SCHEME OF INSTRUCTION Lecture Tutorial Practical Seminar/Projects Total Credits
Hours Hours Hours Hours Hours
3 - 2 - 42 4
COURSE OBJECTIVES:
To learn data models, conceptualize and depict a database system using ER diagram
To understand the internal storage structures in a physical DB design
To know the fundamental concepts of transaction processing techniques
COURSE OUTCOMES:
Outcomes Bloom’s
CO No.
Taxonomy
Level
CO1 Demonstrate the basic elements of a relational database management L2
system
CO2 Identify the data models for relevant problems L2
CO3 Apply normalization for the development of application software’s L3
CO4 Use Structured Query Language (SQL) for database manipulation. L3
CO5 Understand transactions and their properties (ACID) L2
CO6 Design and develop a large database with optimal query processing L6
COURSE CONTENT:
MODULE 1 8Hrs
Introduction: Purpose of Database System-–Views of data–data models, database
management system, three-schema architecture of DBMS, components of DBMS. E/R Model
- Conceptual data modeling - motivation, entities, entity types, attributes, relationships,
relationship types, E/R diagram notation, examples.
MODULE 2 9 Hrs
Relational Model: Relational Data Model - Concept of relations, schema-instance distinction,
keys, referential integrity and foreign keys, relational algebra operators, SQL -Introduction,
data definition in SQL, table, key and foreign key definitions, update behaviors. Querying in
SQL, notion of aggregation, aggregation functions group by and having clauses.
MODULE 3 10 Hrs
Database Design: Dependencies and Normal forms, dependency theory – functional
dependencies, Armstrong's axioms for FD's, closure of a set of FD's, minimal covers,
definitions of 1NF, 2NF, 3NF and BCNF, decompositions and desirable properties of them,
algorithms for 3NF and BCNF normalization, 4NF, and 5NF
MODULE 4 9 Hrs
Transactions: Transaction processing and Error recovery - concepts of transaction processing,
ACID properties, concurrency control, locking based protocols for CC, error recovery and
logging, undo, redo, undo-redo logging and recovery methods.
MODULE 5 9 Hrs
Embedded SQL: triggers, procedures and database connectivity. Introduction to NoSQL
TEXT BOOK:
1. Silberschatz, Henry F. Korth, and S. Sudharshan, “Database System Concepts”,
5thEd, Tata McGraw Hill, 2006.
2. J. Date, A. Kannan and S. Swamynathan, “An Introduction to Database Systems”,
8thed, Pearson Education, 2006.
REFERENCES:
1. Ramez Elmasri and Shamkant B. Navathe, “Fundamentals of Database Systems”,
Fourth Edition, Pearson/Addision Wesley, 2007
2. Raghu Ramakrishnan, “Database Management Systems”, Third Edition, McGraw Hill, 2003
3. S. K. Singh, “Database Systems Concepts, Design and Applications”, First Edition,
Pearson Education, 2006
SEMESTER V
YEAR III
COURSE CODE 19CT3501
TITLE OF THE COURSE IDEA GENERATION & VALIDATION
Lecture Tutorial Practical Seminar/Projects Total Credits
SCHEME OF Instruction Hours Hours Hours Hours Hours
-- -- -- 04 39 02
COURSE OBJECTIVES:
Generate, develop, and pitch innovative new venture ideas
Evaluate the attractiveness and feasibility of new venture opportunities
Analyze industries, markets, and competitors
COURSE OUTCOMES:
Bloom’s
CO
Outcomes Taxonomy
No.
Level
CO1 Generate, develop, and pitch innovative new venture ideas L3
CO2 Analyze industries, markets, and competitors L3
COURSE CONTENT:
Process of Idea Generation; Problem Identification, Idea formation, Idea Generation
Techniques: Brainstorming, Mind Mapping, Story Boarding, Attribute Listing, Idea
Validation and Risk Assessment
TEXT BOOKS :
1. Kotter, J.P. and Whitehead, L.A. (2010). Buy-In: Saving Your Good Idea from Getting
Shot Down.
2. Belsky, S. (2010). Making Ideas Happen: Overcoming the Obstacles between Vision
and Reality.
SEMESTER V
YEAR III
COURSE CODE 19CT3502
TITLE OF THE COURSE PRODUCT ENGINEERING & ENTREPRENEURSHIP
Lecture Tutorial Practical Seminar/Projects Total Credits
SCHEME OF Instruction Hours Hours Hours Hours Hours
-- -- -- 04 39 02
COURSE OBJECTIVES:
Experience with a set of tools and methods for product engineering
Knowledge of the role of multiple functions in creating a new product
Ability to coordinate multiple, interdisciplinary tasks to achieve a common objective
Emphasis of specific knowledge from other courses through practice and reflection in
an action-oriented setting
COURSE OUTCOMES:
Bloom’s
CO
Outcomes Taxonomy
No.
Level
CO1 Identify customer needs and pain points L1
MODULE 1 06 Hrs
Introduction, Product Development Process and Organization, Opportunity Identification,
Product Planning, Identifying Customer Needs
MODULE 2 06 Hrs
Product Specifications, Concept Generation, Lean Thinking, Concept Selection, Concept
Testing, Value on Product Development, Waste in Product Development
MODULE 3 06 Hrs
Product Architecture, Industrial Design, Design for Environment, Design for Manufacturing and
Supply Chain
MODULE 4 04 Hrs
Prototyping, Robust Design, Patents and Intellectual Property, Service Design, Product
Development Economies, Product Management
MODULE 5 04 Hrs
Business Plan, Business Model Canvas
PROJECT DELIVERABLES
1. Proposal Handout & Presentation
a. The Problem
b. Need
c. Existing Alternatives
d. Potential Market
2. Wireframe Sketches, Target Specifications
a. List Critical Customer Needs
b. For a., Prepare a List of Target Specifications
c. Prepare Wireframe
3. Create App/Website
4. Business Model
5. Register your business
6.
TEXT BOOKS
1. Ulrich Karl T, Eppinger Steve D., and Yang, Maria C., Product Design and Development, 7th Edition,
McGraw-Hill Education 2020
2. Robin McKenzie, Design Theory: An Introduction for Product Design and Engineering, 1st Edition, July
2014
REFERENCE BOOKS
1. Pessoa, Marcus, Trabasso, Luis Gonzaga, The Lean Product Design and Development Journey – A Practical
View, Springer International Publishing, 2017
2. Ali Jamnia, Introduction to Product Design and Development for Engineers, 1st Edition, CRC Press, June
2018
3. Product Design and Development, MIT Open Courseware - https://ocw.mit.edu/courses/sloanschool-of-
management/15-783j-product-design-and-development-spring-2006/index.htm
SEMESTER V
YEAR III
COURSE CODE 19CT3511
TITLE OF THE COURSE DATA DRIVEN DECISION MAKING
Lecture Tutorial Practical Seminar/Projects Total Credits
SCHEME OF Instruction Hours Hours Hours Hours Hours
-- -- 02 02 39 02
COURSE OBJECTIVES :
To perform data cleaning & pre-processing on real-time datasets
To work on live projects on modelling data
To visualize data
COURSE OUTCOMES :
Bloom’s
CO
Outcomes Taxonomy
No.
Level
CO1 Write programs to clean and pre-process data L3
CO2 Write programs to process and model data L3
COURSE CONTENT:
MODULE 1 7 Hrs
Overview, Data Science Lifecycle and Process, Types of Analytics, Making Business-
Defined Decisions using Data Analytics, Steps to Clean and Pre-process Data, Data
Processing Techniques, Data Modelling, Ensemble Models
MODULE 2 7 Hrs
Cleaning and Data Pre-processing
Scrapy – Linear Algebra, Integration, Calculus, Ordinary Differential Equations, Signal
Processing
NumPy – Basic Array Operations (Multiply Slice, Flatten, Reshape, Index Arrays),
Advanced Array Operations (Stack, Split, Broadcast), Linear Algebra Pandas – Indexing,
Manipulating, Renaming, Sorting, Merging Data Frame, Impute Missing Files, Handle
Missing Data
MODULE 3 8 Hrs
Data Processing - Statsmodels – Linear Regression, Correlation, Ordinary Least Squares,
Survival Analysis, Generalized Linear Models, Bayesian Models, Univariate and Bi-variate
Analysis, Hypothesis Testing
MODULE 4 8 Hrs
Modelling
Scikit-Learn – Classification (Spam Detection, Image Recognition), Clustering (Drug
Response, Stock Price),
Regression (Customer Segmentation, Grouping Experiment Outcomes), Decision Tree, K-
NN and Naïve Bayes
MODULE 5 9 Hrs
Data Visualization
Matplotlib – Line Plots, Scatter Plots, Area Plots, Bar Charts & Histograms, Pie Charts,
Stem Plots, Contour plots, Quiver Plots, Spectrograms
Seaborn – Correlation, Aggregate Statistics, Uni-Variate & Bi-Variate Distributions,
Linear Regression Models,
Multi-Plot Grids
TEXT BOOKS :
1. Cathy O’Neil and Rachel Schutt, Doing Data Science, O’Reilly Publications, 2014.
2. Han, Kambar and Pei, Data Mining Concepts and Techniques, MK Publications, 3rd
Edition.
REFERENCES :
1 Data Pre-Processing https://scikit-learn.org/stable/modules/preprocessing.html
2 Python Data Science Handbook:
https://tanthiamhuat.files.wordpress.com/2018/04/pythondatasciencehandbook.pdf
SEMESTER V
YEAR III
COURSE CODE 19CT3512
TITLE OF THE COURSE CREATIVE CODING
Lecture Tutorial Practical Seminar/Projects Total Credits
SCHEME OF Instruction Hours Hours Hours Hours Hours
-- -- 02 02 39 02
COURSE OBJECTIVES:
The fundamentals of computational thinking applied through p5.js
Best practices for designing software within an event-driven, object-oriented, real-time
framework
How to ideate, conceptualize, and design original creative works in the medium of
software
COURSE OUTCOMES:
Bloom’s
CO
Outcomes Taxonomy
No.
Level
CO1 Examine fundamentals of computational thinking L2
CO2 Write scripts using p5.js L3
COURSE CONTENT:
MODULE 1 7 Hrs
Computational Thinking: Overview, Stages, Cornerstones, Pillars, Expressing and
Analyzing Algorithms, Concepts of Computational Thinking, Techniques Associated with
Computational Thinking, Computational Thinking in a Classroom
MODULE 2 7 Hrs
p5.js: Overview, Creative Graphics & Interactive Experiences, p5.js Web Editor, p5.js and
Processing, Using a Local Server, First Sketch, Color, Constants, DOM, Data,
Environment, Events, Foundation, I/O, Image, Lights, Camera, Math, Rendering, Shape
MODULE 3 8 Hrs
p5.js-contd: node.js and socket.io, 3D/WebGL, Coordinate System and Shapes, Structure,
Transform, Typography, Anatomy of Functions, Built-in p5.js Functions, Touch, Unit
Testing and Test-Driven Development
MODULE 4 8 Hrs
p5.js – Advanced Data, Sound, Mobile – Acceleration Ball Bounce, Simple Draw,
Acceleration Color, Shake Ball Bounce, Titled 3D Box, p5.js libraries, Linking p5.js to
HTML file
MODULE 5 9 Hrs
p5.ble.js – Overview, Introduction to Arduino and Bluetooth, Usage, p5.ble.js using
Arduino, Bluetooth Le and p5.ble
p5.bots – Overview, APIs, Servers, Functions
p5.clickable – Overview, Creating, Moving & Resizing a Clickable, Clickable Events
TEXT BOOKS:
1. Lauren McCarthy, Casey Reas, Ben Fry, Getting Started with p5.js: Making
Interactive Graphics in JavaScript and Processing, Maker Media Inc.
2. Karl Beecher, Computational Thinking: A Beginner's Guide to Problem Solving and
Programming, The Chartered Institute for IT
REFERENCES:
1 Creative Coding and Data Visualization with p5.js”, Scott Muray, O′Reilly (13 January
2017)
2 “Processing: Creative Coding and Computational Art”, Ira Greenberg Apress; 2nd
Printing Edition (June 1, 2007)
SEMESTER V
YEAR III
COURSE CODE 19CT3513
TITLE OF THE COURSE CRYPTOGRAPHY & CYBER SECURITY
Lecture Tutorial Practical Seminar/Projects Total Credits
SCHEME OF Instruction Hours Hours Hours Hours Hours
-- -- 02 02 39 02
COURSE OBJECTIVES:
Protect data with encryption and hashing
Make hashes, crack them, and understand why they are so different
Understand common errors in encryption, various encryption methods and how to
exploit them
Learn how to use three NIST-recommended systems: AES, SHA, and RSA
Explore the threat landscape and practical skillset in defeating basic online threats
COURSE OUTCOMES:
Bloom’s
CO
Outcomes Taxonomy
No.
Level
CO1 Protect data with encryption and hashing L2
CO2 Make hashes, crack them, and understand why they are so L3
different
CO3 Compare various encryption methods L3
COURSE CONTENT:
MODULE 1 7 Hrs
Introduction, Caesar Cipher, Other Shift Values and Modular Arithmetic, ROT13, Base64
& ASCII , Encoding, Binary Data and Encoding, XOR Truth Tables, XOR for Bytes,
Single-Byte and Multi-Byte XOR along with Looping
MODULE 2 7 Hrs
Strong Encryption – AES and Private-Key Encryption, Key and Block Size, Confusion and
Diffusion, ECB and CBC Modes, AES-CBC, Padding Oracle Attack, Public Key
Encryption
MODULE 3 8 Hrs
RSA Algorithm, Security, Vulnerabilities, Threats and Adversaries, Security Attributes,
Threat Modelling and Risk Assessments, Zero Trust Model, Malware, Viruses, Rootkits,
RATs
MODULE 4 8 Hrs
Hashing – MD5 and SHA-1/2/3 Hashes, MD4 and Unicode, Getting Hashes with Cain,
Cracking Hashes with Google and with Wordlists, Salting and Stretching Hashes, Hashing
Algorithms
MODULE 5 9 Hrs
Malwares – Spyware, Adware, Scareware, PUPs and Browser Hijacking, Darknets and
Dark Markets, Social Engineering – Scams, Cons, Tricks and Fraud
Hashing Techniques
import hashlib, binascii
https://cryptobook.nakov.com/cryptographic-hash-functions/hash-functions-examples
TEXT BOOKS:
1. Samuel Bowne, Hands-On Cryptography with Python: Leverage the Power of Python
to Encrypt and Decrypt Data, June 29, 2018
2. Nielson, Seth James, and Christopher K. Monson, Practical Cryptography in Python:
Learning Correct Cryptography by Example, Apress, 2019
REFERENCES:
1 Modern Cryptography Theory and Practice, Wenbo Mao, Pearson Education 2008
2 Network Security: The complete reference, Robert Bragg, Mark Rhodes, TMH
SEMESTER V
YEAR III
COURSE CODE 19CT3514
TITLE OF THE COURSE APPLICATIONS OF IoT TECHNOLOGY STACK
Lecture Tutorial Practical Seminar/Projects Total Credits
SCHEME OF Instruction Hours Hours Hours Hours Hours
-- -- 02 02 39 02
COURSE OBJECTIVES:
Identify the sensors and other devices needed for different IoT solutions
Understand and map out an IoT system incorporating specific devices
COURSE OUTCOMES:
Bloom’s
CO
Outcomes Taxonomy
No.
Level
CO1 Identify the sensors and other devices needed for different L2
IoT solutions
CO2 Design Basic IoT Systems L3
COURSE CONTENT:
MODULE 1 7 Hrs
Introduction to Internet of Things, IOT Architecture, Definition & Characteristics of IoT,
Physical Design of IoT, IoT Levels & Deployment Templates. Application of IOT in
different domains – Agriculture, Medical, Smart Cities, Home Automation, Logistics,
Weather Forecasting.
MODULE 2 7 Hrs
Electrical Circuits and Electronics – Basic IoT System, Electricity, Basic Electronics,
Analogue and Digital Electronics, Electronics Kits, Sensors and Actuators, Micro-
controllers and Micro-Processors, Programming Concepts, Selecting a Micro Platform,
Sensor Communication
MODULE 3 8 Hrs
Application layer Protocols – COAP, AMQP, MQTT, DDS, HTTP, REST, Transport layer
Protocols – TCP, UDP, Network Layer – 6LowPAN, IPv6, ZigBee, Lora, Datalink Layer –
802.15 set of standards, Physical Layer – Wi-Fi, Bluetooth Low Energy, Ethernet, NFC,
RFID, LTE, 5G, Introduction to M2M, NFV, SDN
MODULE 4 8 Hrs
Device Programming using Embedded C & MicroPython, An Introduction to Data
Analytics for IoT , IoT Data Analytics Overview, IoT Data Analytics Challenges , Big
Data Architectures for IoT Analytics, System Communication, Cloud, Fog and Edge
Processing, Processes and Systems, PID, Design a System, IoT Design Implications
MODULE 5 9 Hrs
Need for IoT Systems Management, Simple Network Management Protocol (SNMP),
Limitations of SNMP, Network Operator Requirements, Introduction to NETCONF,
YANG, IoT Systems Management with NETCONF-YANG, NETOPEER. Introduction to
DevOps and tools – Jenkin, Mavin, Selenium (System Test Automation), Unit Test (Junit),
GIT, Puppet and Chef, Docker, Storm, Kafka
TEXT BOOKS:
1. Qusay F. Hassan, Internet of Things A to Z – Technologies and Applications, IEEE
Press, Wiley, 2018
2. Ovidiu Vermesa, Peter Friess, Internet of Things – From Research and Innovation to
Market Deployment, River Publishers, 2014
REFERENCES:
1 Ian G Smith, The Internet of Things 2012 New Horizons, IERC - Internet of Things
European Research Cluster, 2012.
2 M. Wang, G. Zhang, C. Zhang, J. Zhang, C. Li, An IoT-based Appliance Control
System for Smart Homes, ICICIP 2013.
SEMESTER VI
YEAR III
COURSE CODE 19CS3601
TITLE OF THE COURSE Compiler Design and System Software
SCHEME OF INSTRUCTION Lecture Tutorial Practical Seminar/Projects Total Credits
Hours Hours Hours Hours Hours
3 1 2 - 52 5
COURSE OBJECTIVES:
To discuss the techniques of scanning, parsing & semantic elaboration well enough to build or modify
front end.
To expose the critical issues in modern compilers & provide them with the background to tackle those
problems.
COURSE OUTCOMES:
Outcomes Bloom’s
CO No.
Taxonomy
Level
CO1 Understand the major phases of compilation and to understand L2
the knowledge of Lex tool & YAAC tool
CO2 Develop the parsers and experiment the knowledge of L3
different parsers design without automated tools
CO3 Construct the intermediate code representations and L3
generation
CO4 Convert source code for a novel language into machine code for L3
a novel computer
CO5 Apply for various optimization techniques for dataflow analysis L3
COURSE CONTENT:
MODULE 1 10Hrs
Introduction to System Software, Machine Architecture of SIC and SIC/XE.
ASSEMBLERS: Basic assembler functions: A simple assembler, Assembler algorithm and
data structures, Machine dependent assembler features: Instruction formats and addressing
modes – Program relocation, Machine independent assembler features: Literals, Symbol-
defining statements, Expressions, Program blocks, Control Sections and Program Linking.
MODULE 2 9 Hrs
LOADERS AND LINKERS Basic loader functions: Design of an Absolute Loader, A
Simple Bootstrap Loader, Machine dependent loader features :Relocation, Program Linking
,Algorithm and Data Structures for Linking Loader, Machine-independent loader features:
Automatic Library Search, Loader Options, Loader design options :Linkage Editors, Dynamic
Linking
MODULE 3 11 Hrs
COMPILERS: Introduction: Language Processors, Structure of compiler, The science of
building a compiler, Applications of compiler technology.
LEXICAL AND SYNTAX ANALYSIS: Role of lexical Analyser, Specification of Tokens,
Lexical Analyzer generator Lex.
SYNTAX ANALYSIS I: Role of Parser, Syntax error handling, Error recovery strategies,
Writing a grammar: Lexical vs Syntactic Analysis, Eliminating ambiguity, Left recursion,
Left factoring.
MODULE 4: 12 hrs
SYNTAX ANALYSIS II-:Top down parsing: Recursive Descent Parsing, First and follow,
LL (1), –Bottom up parsing:Shift Reduce Parsing ,Introduction to LR parsing Simple LR:
Why LR Parsers, Items and LR0 Automaton, The LR Parsing Algorithm, Constructing SLR
Parsing Tables.
SYNTAX-DIRECTED TRANSLATION: Syntax-Directed Definitions: Inherited and
Synthesized Attributes, Evaluation orders for SDDs: Dependency graphs, Ordering the
evaluation of Attributes, S-Attributed Definition, L-Attributed Definition, Application:
Construction of Syntax Trees.
MODULE 5 10 Hrs
INTERMEDIATE CODE GENERATION: Three Address Code: Addresses and
Instructions, Quadruples, Triples, Static Single Assignment form.
CODE GENERATION: Issues in the design of code generator, Basic Blocks, Optimization
of Basic Blocks, The Code Generation Algorithm, Peephole optimization.
MACHINE INDEPENDENT OPTIMIZATION: The Principal Sources of Optimization
TEXT BOOK:
REFERENCES:
1. V. Raghavan, Principles of Compiler Design‖, Tata McGraw Hill Education Publishers, 2010.
2. Keith D Cooper and Linda Torczon, Engineering a Compiler‖, Morgan Kaufmann Publishers
Elsevier Science, 2004.
3. D.M.Dhamdhere, Systems Programming and operating systems, Second Revised edition,
Tata McGraw Hill.
SEMESTER VI
YEAR III
COURSE CODE 19CS3602
TITLE OF THE COURSE COMPUTER NETWORKS
SCHEME OF INSTRUCTION Lecture Tutorial Practical Seminar/Projects Total Credits
Hours Hours Hours Hours Hours
3 - 2 - 42 4
COURSE OBJECTIVES:
To introduce the fundamental aspects of various types of computer networks.
To demonstrate the TCP/IP and OSI models with merits and demerits.
COURSE OUTCOMES:
Outcomes Bloom’s
CO No.
Taxonomy
Level
CO1 Understand and explore the basics of Computer Networks and L2
Various Protocols.
CO2 Administrate a network and flow of information L2
CO3 Understand the concepts of network security, mobile, and ad hoc L2
network
COURSE CONTENT:
MODULE 1 9Hrs
Overview of the Internet: Protocol, Layering Scenario, TCP/IP Protocol Suite: The OSI
Model, Internet history standards and administration; Comparison of the OSI and TCP/IP
reference model.
Physical Layer: Introduction to Guided transmission media and wireless transmission media.
Transmission mode, Classification of networks. Parallel & Serial Transmissions, Analog &
Digital Signals, Periodic & Aperiodic Signals, Encoding Schemes. RS-233C Protocol.
Data Link Layer - Design issues, CRC codes, Elementary Data Link Layer Protocols, stop
and wait, sliding window, go-back-N protocols.
MODULE 2 9 Hrs
Multi Access Protocols - ALOHA, CSMA, Collision free protocols, Ethernet- Physical
Layer, Ethernet Mac Sub layer, data link layer switching & use of bridges, learning bridges,
spanning tree bridges, repeaters, hubs, bridges, switches, routers and gateways. LLC, WiFi,
Bluetooth Protocols.
MODULE 3 8 Hrs
Network Layer: Network Layer Design issues, store and forward packet switching
connection less and connection oriented networks-routing algorithms-optimality principle,
shortest path, flooding, Distance Vector Routing, Control to Infinity Problem, Hierarchical
Routing, Congestion control algorithms, admission control, Classful IP addresses(A,B,C,D)
,QoS, Details of IP Packet
MODULE 4 9 Hrs
The Internet Transport Protocols: Introduction to TCP and UDP, The TCP Service Model,
The TCP Segment Header, The Connection Establishment, The TCP Connection Release,
The TCP Connection Management Modeling, The TCP Sliding Window, The TCP
Congestion Control, The future of TCP.
MODULE 5 7 Hrs
Application Layer- Introduction, providing services, Applications layer paradigms, Client
server model, Standard client-server application-HTTP, FTP, electronic mail, TELNET,
DNS, SSH, SNMP. Socket Programming using TCP and UDP.
Introduction to Internet of Things, Introduction to Sensors, Actuator, Transducers,
Gateway, IOT Architecture, Introduction to Node MCU and Arduino. Overview of Edge, Fog
and Cloud computing and application of IOT in Home Automation
TEXT BOOK:
1. Behrouz A. Forouzan, Data Communications and Networking -, Fifth Edition TMH, 2013.
2. Computer Networks - Andrew S Tanenbaum, 4th Edition, Pearson Education.
REFERENCES:
1. Computer Networking- A top down approach- James F Kurose and Keith W Ross,6th Edition,
Pearson Education.
2. W. Tomasi, “Advanced Electronic Communication Systems”, 2000
3. James Martin, “Telecommunications & the Computer”, 3rd Edition, PHI. 2001
4. P. C. Gupta, “Data Communications, PHI, 2001.
SEMESTER VI
YEAR III
COURSE CODE 19CS3603
TITLE OF THE COURSE Software Engineering and Project Management
Lecture Tutorial Practical Seminar/Projects Total Credits
SCHEME OF Instruction Hours Hours Hours Hours Hours
3 - 2 - 42 4
COURSE OBJECTIVES :
This course is introduced to give the students necessary knowledge.
Understanding and Design aspects in Software Engineering
To understand the Software Project Planning and Evaluation techniques
COURSE OUTCOMES :
Bloom’s
CO
Outcomes Taxonomy
No.
Level
CO1 Understand software development life cycle models, L2
process models, and various design engineering
techniques.
CO2 Understand the importance of testing and use different L3
types of testing techniques.
CO3 Understand Project Management principles while L2
developing software.
COURSE CONTENT:
MODULE 1 9Hrs
Introduction to Software Engineering: FAQs about software engineering, Professional
and ethical responsibility. Socio-Technical systems: Emergent system properties,
Organizations, people and computer systems; Legacy systems, the evolving role of
software, Changing Nature of Software, Software myths.
A Generic view of process: Software engineering- A layered technology, a process
framework, The Capability Maturity Model Integration (CMMI), Process patterns, process
assessment, personal and team process models. Software Cost Estimation: Productivity;
Estimation techniques
MODULE 2 7Hrs
Process models: A simple safety- critical system; System dependability; Availability and
reliability, the waterfall model, Incremental process models, Evolutionary process models,
The Unified process. Comparison of different models with case studies, Agile
Development: Agile Tech, Extreme Programming, and other Agile Process Models: Scrum
Methodology
MODULE 3 9Hrs
Software Requirements: Functional and non-functional requirements, User requirements,
System requirements, Interface specification, the software requirements document.
Requirements engineering process: Feasibility studies, Requirements elicitation and
analysis, Requirements validation, Requirements management. System models: Context
Models, Behavioural models, Data models, Object models, structured methods.
MODULE 4 9Hrs
Testing Strategies: Verification and Validation: Planning; Software inspections;
Automated static analysis; Verification and formal methods. A strategic approach to
software testing, System testing, the art of Debugging; Component testing; Test case design;
Test automation - Selenium, Test strategies for conventional software: Black-Box and
White-Box testing, Validation tests, System testing.
MODULE 5 8Hrs
Software Project Management
Introduction to Software Project Management – all life cycle activities – Methodologies –
Categorization of Software Projects – Setting objectives – Management Principles –
Management Control – Project portfolio Management – Cost-benefit evaluation technology
– Risk evaluation – Strategic program Management – Stepwise Project Planning.
TEXT BOOKS :
REFERENCES :
1. Bob Hughes, Mike Cotterell and Rajib Mall: Software Project Management – Fifth Edition, Tata
McGraw Hill, New Delhi, 2012.
2. SoftwareEngineering-K.K.Agarwal&YogeshSingh,NewAgeInternationalPublishers
3. Software Engineering, an Engineering approach-JamesF. Peters, WitoldPedrycz, John Wiley.
4. Systems Analysis and Design –Shelly Cashman Rosenblatt, Thomson Publications.
5. Software Engineering principles and practice-Waman Jawadekar,The McGraw-Hill Companies
SEMESTER VI
YEAR III
COURSE CODE 19CT3601
TITLE OF THE COURSE LEAN START-UP METHODOLOGY
Lecture Tutorial Practical Seminar/Projects Total Credits
SCHEME OF Instruction Hours Hours Hours Hours Hours
- -- 03 03 52 03
COURSE OBJECTIVES:
Use the Business Model Canvas innovation tool to approach either a personal or
corporate challenge or opportunity.
Identify and communicate the nine key elements of a business model.
Explain how to develop a strategic business plan
COURSE OUTCOMES:
Bloom’s
CO
Outcomes Taxonomy
No.
Level
CO1 Communicate nine key elements of a Business Model L1
COURSE CONTENT:
Exposure to Business Model Techniques like, Channels, Customer Segments, Relationships,
Key Resources, Key Activities, Cost structures, Pain, and Gain Relief of Core Customers.
TEXTBOOKS
1. Timmons, Jeffry A. and Spinelli, Stephen Jr. (2009). New Venture Creation: Entrepreneurship for the 21st
Century, 8th edition. McGraw-Hill Irwin, Boston. Chapter 3
2. Lindsay, Noel (2010). Business Plan Template
SEMESTER VI
YEAR III
COURSE CODE 19CT3602
TITLE OF THE COURSE SMALL BUSINESS LAUNCH
Lecture Tutorial Practical Seminar/Projects Total Credits
SCHEME OF Instruction Hours Hours Hours Hours Hours
- -- 03 03 52 03
COURSE OBJECTIVES:
Experience with a set of tools and methods for setting up an online service
Knowledge of the role of multiple functions in creating a small business
Ability to coordinate multiple, interdisciplinary tasks to achieve a common objective
Emphasis of specific knowledge from other courses through practice and reflection in
an action-oriented setting
COURSE OUTCOMES:
Bloom’s
CO
Outcomes Taxonomy
No.
Level
CO1 Identify customer needs and pain points L1
COURSE CONTENT:
MODULE 1 10 Hrs
Introduction, Identifying Customer Needs, Opportunity Identification & Planning, Idea
Generation and Validation, Entrepreneurial Culture, Digital Business Opportunity
MODULE 2 10 Hrs
Business Plan & its Components, Business Model and Strategies, Selection of Appropriate
Business Model, Business Model Canvas, Feasibility Study
MODULE 3 10 Hrs
Lean Thinking, Specifications, Wireframe Generation & Validation
MODULE 4 11 Hrs
Bootstrap Themes and Templates, Basics of HTML, CSS & JavaScript, Meteor, Apache
Cordova, UI Frameworks – Blaze, Angular, React, Google Firebase, Firebase Realtime
Database
MODULE 5 11 Hrs
Service-Market Fit, legal Aspects & Entrepreneurial Law, New Venture Creation & Launch,
Sustainability Goals
PROJECT DELIVERABLES
7. Proposal Handout & Presentation
a. The Problem
b. Need
c. Existing Alternatives
d. Potential Market
8. Wireframe Sketches, Target Specifications
a. List Critical Customer Needs
b. For a., Prepare a List of Target Specifications
c. Prepare Wireframe
9. Create App/Website
10. Business Model
11. Register your business
TEXTBOOKS
1. Fisher, Steven, Duane, Ja-Nae (2016). Start-up Equation – A Visual Guidebook for Building your Start-
up, New Delhi: Tata McGraw-Hill
2. Houssem Yahiaoui, Firebase Cookbook: Over 70 Recipes to help you create real-time web and mobile
applications with Firebase, Packt Publishing, November 2017.
REFERENCE BOOKS
1. Holt H., David (2017). Entrepreneurship: New Venture Creation, New Delhi: Pearson Education
Zimmerer, W. Thomas and Scarborough, M. Norman and Doug Wilson (2009). Essentials of Entrepreneurship
and Small Business Management, 5/e; New Delhi: Prentice Hall India
SEMESTER VI
YEAR III
COURSE CODE 19CT3611
TITLE OF THE COURSE APPLICATIONS OF MACHINE LEARNING
Lecture Tutorial Practical Seminar/Projects Total Credits
SCHEME OF Instruction Hours Hours Hours Hours Hours
-- -- 02 02 52 04
COURSE OBJECTIVES:
The difference between the two main types of machine learning methods: supervised
and unsupervised
Supervised learning algorithms, including classification and regression
Unsupervised learning algorithms, including Clustering and Dimensionality Reduction
How statistical modelling relates to machine learning and how to compare them
Real-life examples of the different ways machine learning affect society
COURSE OUTCOMES:
Bloom’s
CO
Outcomes Taxonomy
No.
Level
CO1 Differentiate between the two main types of machine L2
learning methods: supervised and unsupervised
CO2 Program Supervised learning algorithms, including L3
classification and regression
CO3 Program Unsupervised learning algorithms, including L3
Clustering and Dimensionality Reduction
COURSE CONTENT:
MODULE 1 10 Hrs
Introduction to Machine Learning – Overview, Applications, Supervised Vs. Unsupervised
Learning, Linear Algebra Review, Machine Learning System Design, Principal Component
Analysis, Basics of Model Learning
MODULE 2 10 Hrs
Linear Regression, Non-Linear Regression, Model Evaluation Methods (Scikit-Learn),
Regularization, Anomaly Detection, Naïve Bayes, Feature Scaling
MODULE 3 11 Hrs
K-Nearest Neighbour, Decision Trees, Logistic Regression, Support Vector Machines, Model
Evaluation (Scikit-Learn), Association Analysis
MODULE 4 11 Hrs
K-Means Clustering, Hierarchical Clustering, Density-Based Clustering, Recommender Systems –
Content-Based Recommender Systems, Collaborative Filtering, Avoiding False Discoveries, Class
Imbalance Problem
MODULE 5 10 Hrs
Overview, Types of Reinforcement, Q-Learning, Epsilon-Greedy Algorithm, Neural Logic,
Applications, Large Scale Machine Learning, Transfer Learning for Natural Language Processing
TEXT BOOKS:
1. Tom M. Mitchell, Machine Learning, India Edition 2013, McGraw Hill Education
2. Pang-Ning Tan, Michael Steinbach, Vipin Kumar, Introduction to Data Mining, Pearson, First
impression, 2014
REFERENCES:
1 Rudolph Russell: Machine Learning: Step-By-Step Guide to Implement Machine
Learning Algorithms with Python, Createspace Independent Publishing Platform, May
2018
2 Shai Shalev-Shwartz, Shai Ben-David: Understanding Machine Learning from Theory
to Algorithms, Cambridge University Press, 2014
SEMESTER VI
YEAR III
COURSE CODE 19CT3612
TITLE OF THE COURSE HUMAN COMPUTER INTERACTION
Lecture Tutorial Practical Seminar/Projects Total Credits
SCHEME OF Instruction Hours Hours Hours Hours Hours
-- -- 02 02 52 04
COURSE OBJECTIVES:
Illustrate overall goals of human-computer interaction.
Map relationship between HCI, user experience design, human factors engineering,
and psychology.
Discuss trends in HCI technology including virtual reality, augmented reality, and
robotics.
Elaborate the role of design principles and heuristics in user interface design.
COURSE OUTCOMES:
Bloom’s
CO
Outcomes Taxonomy
No.
Level
CO1 Map relationship between HCI, user experience design, L2
human factors engineering, and psychology.
CO2 Analyze the use of HCI to domains like healthcare, L3
education, and cybersecurity.
CO3 Discuss trends in HCI technology including virtual reality, L3
augmented reality, and robotics.
CO4 Explore emerging ideas in HCI research, such as context- L3
sensitive computing, gesture-based interaction, and social
computing.
COURSE CONTENT:
MODULE 1 10 Hrs
Introduction, Design Principles and Feedback Cycles, Direct Manipulation & Invisible Interfaces,
Human Abilities, Design Principles and Heuristics
MODULE 2 10 Hrs
Characteristics of Interaction Design, Digital Materials and Interaction Design, Contextual
Design – Overview, Key Principles, Process, Task-Artifact Cycle, GOMS Model
MODULE 3 11 Hrs
Unity 3D – Basics of C#, Variables, Functions, Logic & Operators, Inheritance, Class
Constructors, Arrays, Overview, Unity 3D for HCI, Asset Workflow, Creating Gameplay,
Importing Models, Input – Input Manager, Mobile Device Input, Unity XR Input
MODULE 4 11 Hrs
Graphics – Render Pipelines, Visual Effects Components, Optimizing Graphics Performance,
Animation – Clips and Controllers, Performance and Optimization, User-Interfaces – Unity UI,
Immediate Mode GUI, Navigation and Pathfinding, 3D Physics for Object-Oriented Projects
MODULE 5 10 Hrs
Overview of JavaScript for Unity, Starting with Coding Physics, Using Advanced Physics
Concepts, Particle Emitters and Special Effects, Enhancing User Experience: GUI & Sound
TEXT BOOKS:
1. Andrew Monk, Fundamentals of Human-Computer Interaction, 1st Edition, ,
Academic Press, 28th January 1985
2. Alan DIX, Janet Finlay, Gregory D. Abowd, Russell Beale, Human-Computer
Interaction
REFERENCES:
1 Learning C# Programming with Unity 3D, Alex Okita, 1st Edition, CRC Press,
Routledge; 1 Edition
2 Learning Unity 3D Programming with Unity Script: Unity’s JavaScript for Beginners,
Janine Suvak, Technology in Action, Apress; 1st ed. edition
SEMESTER VI
YEAR III
COURSE CODE 19CT3613
TITLE OF THE COURSE CLOUD SECURITY SERVICES
Lecture Tutorial Practical Seminar/Projects Total Credits
SCHEME OF Instruction Hours Hours Hours Hours Hours
-- -- 02 02 52 04
COURSE OBJECTIVES:
Explain basics concepts of Cloud Computing.
Evaluate security issues with cloud infrastructure
Implement cloud features to secure and harden the infrastructure
Use tools to analyze system logs to detect possible security or performance problems
COURSE OUTCOMES:
Bloom’s
CO
Outcomes Taxonomy
No.
Level
CO1 Evaluate security issues with cloud infrastructure L2
CO2 Implement cloud features to secure and harden the L3
infrastructure
CO3 Use tools to analyze system logs to detect possible security L3
or performance problems
COURSE CONTENT:
MODULE 1 10 Hrs
Basics of Cloud Computing – Foundations and Models, Types, Designing a Cloud Computing
Infrastructure or Service, Deployment and Configuration, Insuring Cloud Security and
Mitigating Risks
MODULE 2 10 Hrs
Shared Responsibility Model, Security Compliance, Identify and Access Services, Directory
Services, Network Isolation-Fort and Beehive
MODULE 3 11 Hrs
Network Isolation VPC, VPC Endpoints and Private Link, Detective Controls, Auditing,
CloudWatch and CloudWatch Logs, Guard Duty
MODULE 4 11 Hrs
Security Hub, Encryption in Transit, Encryption at Rest, Database Encryption, Protecting
Compute Resources, Protecting & Securing Endpoints
MODULE 5 10 Hrs
Cloud Security Managed Services, Security Strategy, Intelligent Log Management, Security
Intelligence, Operations Consulting, Threat Insights
TEXT BOOKS:
1. Ronald L. Krutz , Cloud Security: A Comprehensive Guide to Secure Cloud Computing,
30 July 2010
2. John R. Vacca, Cloud Computing Security: Foundations and Challenges, 30 August
2016
3. Chris Dotson, Practical Cloud Security: A Guide for Secure Design and Deployment,
31 March 2019
REFERENCES:
1 Vic (J.R.) Winkler, Securing the Cloud: Cloud Computer Security Techniques and
Tactics Paperback – 1 June 2011
2 Adrian Pruteanu and Zeal Vora, Enterprise Cloud Security and Governance: Efficiently
set data protection and privacy principles Paperback – Import, 29 December 2017
3 Routavaara, Ilkka. "Security monitoring in AWS public cloud." (2020)
4 NIST Special Publication 500-292, NIST Cloud Computing Reference Architecture,
September 2011
SEMESTER VI
YEAR III
COURSE CODE 19CT3614
TITLE OF THE COURSE ROBOTIC PROCESS AUTOMATION
Lecture Tutorial Practical Seminar/Projects Total Credits
SCHEME OF Instruction Hours Hours Hours Hours Hours
-- -- 02 02 52 04
COURSE OBJECTIVES:
Overview of Robotic Process Automation
The pros and cons of the RPA technology
The working of UiPath Studio developer software
Building a simple software robot
Simulating RPA in an enterprise setting (high level)
COURSE OUTCOMES:
Bloom’s
CO
Outcomes Taxonomy
No.
Level
CO1 Analyze the pros and cons of software bots in an enterprise L3
setting
CO2 Build Simple Software Robot L3
COURSE CONTENT:
MODULE 1 10 Hrs
Introduction, What is RPA? Why RPA? Scope and Techniques of Automation, Pros and Cons,
UiPath, UiPath Studio, Types of Robots, Activities, Variables and Data Types, Control Flow,
Data Manipulation, Sequence, Flowchart and Control Flow
MODULE 2 10 Hrs
Components of RPA – Recorder, Extensions and Plugins, Bot Runner, Control Center, RPA
Platforms – Automation Anywhere, UiPath, Blue Prism, Work Fusion, Thoughtonomy, Task
Recorder, Loops and Decision Making, Data Manipulation – Variables & Scope, Collections,
Arguments, Data Tables
MODULE 3 11 Hrs
Excel Automation, User-Interface Automation, Recording, Advanced UI Automation,
Selectors, Virtual Environment Automation, PDF Automation, Email Automation, File
Operations, Finding and Attaching Windows, Taking Control of Controls, Working with
UiExplorer
MODULE 4 11 Hrs
Debugging and Exceptions, Agent Assisted Automation, User Events, Orchestrator, Chatbots,
UiPath and ThingsSpeak, Screen Scraping, Java Plugin, Handling User-Events and Assistant
Bots, Exception Handling, Debugging and Logging, Managing and Maintaining the Code,
Deploying and Maintaining the Bot
MODULE 5 10 Hrs
Use-Cases – Food and Beverage, Public Sector, Healthcare, Retail, Transportation, Financial
Services, Insurance, Chemicals, Pharmaceuticals
TEXT BOOKS:
1. Learning Robotic Process Automation: Create Software robots and automate business
processes with the leading RPA tool- UiPath: By Alok Mani Tripathi
2. Audacity of Automation: Catalyst for Third World Development by Osei Badu-
Nkansah
3. The Robotic Process Automation Handbook: A Guide to Implementing RPA Systems
by Tom Taulli
SEMESTER VII
YEAR IV
COURSE CODE 19CT4701
TITLE OF THE COURSE PRODUCT DEVELOPMENT
Lecture Tutorial Practical Seminar/Projects Total Credits
SCHEME OF Instruction Hours Hours Hours Hours Hours
03 -- -- 03 45 02
COURSE OBJECTIVES:
COURSE OUTCOMES:
Bloom’s
CO
Outcomes Taxonomy
No.
Level
CO1 Build solutions using various strategies L2
CO2 Develop a Prototype/MVP L3
CO3 Develop Product-Market Fit Strategy & Support it with Valid L3
Business Case
CO4 Improve Customer-Product Intimacy L1
CO5 Create Measures and Indicators to Drive Product-Market Fit L3
COURSE CONTENT:
Building Product Architect, Conceptual Design, and Visual principles, interactive prototypes, usability
testing with the experts.
Concept and Definition of the Customer Voice; Key factors that facilitate listening to the Customer
Voice; Concept and Definition of Customer Engagement; Customer Engagement Strategies and
Techniques to help gain competitive advantage; Concept and Definition of Customer Validation.
Measures and Indicators for Product Market Fit using Customer Validation
TEXT BOOKS:
1. Knowledge Perspectives of New Product Development: A Comparative Approach
2. Selling New Technology: Tips, Tactics and Tales from a Technology Salesperson
COURSE OBJECTIVES:
• To expose students to various perspectives and concepts of Business environment and
StrategicManagement
• The course would enable the students to understand the principles of strategy formulation,
implementation, and control in organizations
• To help students develop skills for applying these concepts to the solution of business problems
COURSE OUTCOMES:
Bloom’s
CO
Outcomes Taxonomy
No.
Level
CO1 Understand and appreciate the context in which his/her L2
engineering learning would be used in products or services.
TEXT BOOKS:
1. Strategic Management- Hitt, Ireland, Hoskisson, Manikutty, Cengage
COURSE OBJECTIVES:
To learn the information technology laws
To provide insight into the applicability of laws in the digital environment.
To understand the provisions of Information Technology laws to facilitate
electronic commerce – electronic signatures, data protection, cyber security;
penalties & offencesunder the IT Act, dispute resolution, and other contemporary
issues.
COURSE OUTCOMES:
CO No. Outcomes Bloom’s
Taxonomy
Level
Apply the knowledge of the Cyber literacy to become aware of L2
CO1
the fundamental rights and duties in their role as Engineers.
CO2 Understanding of ethical and legal aspects of Information L2
Technology Act and their redressal mechanism related Cyber
issues.
CO3 Demonstrate an advanced and integrated understanding of the L2
nature and extent of the e-governance, e-commerce principle
and to interpret various other Legislation and Act associated
with it.
CO4 Critically evaluate the extent and application of the Cyber L5
Laws, the security aspect.
COURSE CONTENT:
MODULE 1 6Hrs
INTRODUCTION:
Conceptual and theoretical perspective of cyber law - Computer and Web Technology -
Development of Cyber Law – National and International Perspective.
Regulatory Body; ICCAN Regulations.
Need of Information Technology Law; Harmonization and unification of I T Laws;
MODULE 2 6Hrs
INFORMATION TECHNOLOGY LAW:
Information Technology Act 2000 (with up to date amendments), Nature and Scope;
Regulatory bodies and dispute settlement Mechanism under the Act;
Privacy issues in the Cyber World; Data Protection Principles; Privacy rights of Data Subjects;
Protection of sensitive Data; Regulation of Trans Border Data;
E-governance: Legal recognition of Electronic records and electronic evidence; Digital
Signature Certificates; records; Cyber Law issues in E-governance; E-Records; E-Documents;
Dispute Resolution under IT Act.
MODULE 3 6Hrs
CYBER CRIME AND THE LAW
Introduction, Meaning and Definition of Cyber Crime; Crime on the Net; Cyber Criminals and
Victims of Cyber Crime. Online Games.
Cyber Crimes – financial frauds - money laundering, credit card frauds, social crimes – cyber
hacking, cyber stalking, Data Theft; Cyber Fraud; pornography, identity theft, Intellectual
Property related crimes, cyber terrorism, defamation; spams and virus; online lottery and
cheating etc.
Cyber Torts: - Civil and Tortious Liability; Defective Software; Negligence in Creating
software; Remedies and Damages:
Damage to computer and computer system – (s.43 read with s.66) – access/facilitates access,
data theft, virus attacks, email bombings, denial of service attack, damage to computer source
code
MODULE 4 6Hrs
E-Commerce
E-Banking; Relationship of Customer and Banker under IT Laws; Legal issues of E-Money;
Credit and Debit Cards; E-Fund transferring;
MODULE 5 6Hrs
E- Contracts; Trade Marks and Domain Names; and Jurisdiction in Cyber Space
Kinds of Contracts - email, web contracts, Standard form contracts Formation of E-contracts –
application of The Contract Act, 1872 and Information and Technology Act, 2005, United
Nations Convention on the Use of Electronic Communications in International Contract 2005;
Trade Marks and Domain Names, Jurisdiction of Cyber Space
TEXT BOOKS:
1. Yatindra Singh: Cyber Laws
COURSE OBJECTIVES:
• Use Apache Spark & Deep Learning to perform data analysis
• Use parallel programming to explore data sets
• Apply log mining, textual entity recognition and collaborative filtering techniques to real-world data
questions
COURSE OUTCOMES:
CO No. Outcomes Bloom’s
Taxonomy
Level
Use Apache Spark & Deep Learning to perform data analysis L2
CO1
CO3 Apply log mining, textual entity recognition and collaborative filtering L2
techniques to real-world data questions
COURSE CONTENT:
MODULE 1 6Hrs
INTRODUCTION:
MODULE 2 6Hrs
Introduction to Spark – Overview, Components, Resilient Distributed Dataset (RDD), Data
Frames, RDD Operations, Shared Variables and Key-Value Pairs, Spark Context, Functions,
Spark Libraries, Properties
MODULE 3 6Hrs
Introduction to Deep Learning – Overview, Neural Networks & Types, Deep Neural Networks
MODULE 4 6Hrs
Deep Learning Models – Restricted Boltzmann Machines, Deep Belief Nets, Convolutional
Networks, Recurrent Nets, Autoencoders, Recursive Neural Tensor Nets;
MODULE 5 6Hrs
Regularization, Multi-Layer Perceptions, Long-Short-Term Memory Networks, Deep
Reinforcement Learning, Transfer Learning, Self-Organizing Maps
TEXT BOOKS:
1. Learning Apache Spark with Python, Wenqiang
Feng, February 2020 -
https://runawayhorse001.github.io/LearningApacheSpark/pyspark.pdf
2. Big Data Analytics – Turning Big Data into Big Money, Frank Ohlhorst, John Wiley & Sons Inc.,
2013
3. Deep Learning with Python, Francois Chollet, Manning Shelter Island, Manning Publications Co.,
2018
SEMESTER VII
YEAR IV
COURSE CODE 19CT4712
TITLE OF THE COURSE Virtual Reality & Game-Theoretic
Simulation
SCHEME OF Instruction Lecture Tutorial Practical Seminar/Projects Total Credit
Hours Hours Hours Hours Hours s
2 -- -- 02 30 02
COURSE OBJECTIVES:
• Develop professional VR apps using Unity 3D
• Run Unity 3D applications in VR on a smartphone
• Build tools to help users navigate 3D environments
• Learn key usability goals and pitfalls for Virtual Reality
COURSE OUTCOMES:
CO No. Outcomes Bloom’s
Taxonomy
Level
Develop professional VR apps using Unity 3D L2
CO1
CO2 Run Unity 3D applications in VR on a smartphone L2
COURSE CONTENT:
MODULE 1 6Hrs
INTRODUCTION:
Introduction to VR – Definition, Difference between VR & AR, Applications versus Games,
Types of VR Experiences, Types of Head-Mounted Displays, How Virtual Reality Works? The
Benefits of VR, 3D Computer
Graphics, Human Factors
MODULE 2 6Hrs
VR & Game Engines – Overview, Unity3D, VR and 3D Environments, Physics and Gaze
Interaction, Virtual World Generator, Human Senses, Perceptual Psychology, Psychophysics,
Geometric Modelling, Transforming Rigid Bodies, Game-Theoretic Systems
MODULE 3 6Hrs
3D UI and Locomotion – Overview, 3D Menus, Locomotion, Building Interfaces and
Locomotion
Systems, 3D Rotation Inverses and Conversions, Look-at & Eye Transforms, Canonical
View
and Perspective Transforms, Viewport Transforms
MODULE 4 6Hrs
3D User Interaction – Overview, 3D Interaction Design, Selection and Manipulation, Building
Manipulation Systems, Graphical Rendering, Ray Tracing, Rasterization, Barycentric
Coordinates, Anti-Aliasing, Image Warping, Panoramic Rendering
MODULE 5 6Hrs
Wayfinding and VR Input – Overview, Implementing Wayfinding, Building Wayfinding Tools,
VR Usability and Pitfalls, Velocities, Tracking Systems, Drift Errors, Camera-Feature Detection
Model, Perspective npoint Problem, Brain-Machine Interfaces
TEXT BOOKS:
1. Virtual Reality - Steven M. LaValle, Cambridge University Press
2. Complete Virtual Reality and Augmented Reality Development with Unity - Jesse Glover,
Jonathan Linowes, Packt Publishing (April 17, 2019)
3. Understanding Virtual Reality: Interface, Application and Design - William R. Sherman, Alan B.
Craig, 1st Edition, September 2002
SEMESTER VII
YEAR IV
COURSE CODE 19CT4713
TITLE OF THE COURSE Blockchain & Cryptocurrency
COURSE OBJECTIVES:
• The alternative consensus mechanisms to Bitcoin’s Proof-of-work, including Proof-of-Stake, voting
based consensus algorithms, and federated consensus.
• The various enterprise-level blockchain implementations, such as JP Morgan’s Quorum, Ripple,
Tender Mint, and Hyperledger, including the industry use cases for blockchain, ICOs, and the
increasing regulations surrounding blockchain.
• The challenges with scaling and obstacles to widespread blockchain adoption, as well as the possible
solutions within vertical scaling (e.g. block size increases, Segregated Witness, and the Lightning
Network) and horizontal scaling (e.g. sidechains, sharding).
COURSE OUTCOMES:
CO No. Outcomes Bloom’s
Taxonomy
Level
Illustrate alternative consensus mechanisms to Bitcoin’s Proof-of- L2
CO1 work, including Proof-of-Stake, voting-based consensus algorithms,
and federated consensus.
CO2 Describe the properties of crypto economics as it relates to its two L2
compositional fields: cryptography and economics, as well as the
goals for crypto economics with respect to
distributed systems fundamentals
CO3 Analyse enterprise-level blockchain implementations, such as JP L1
Morgan’s Quorum, Ripple, Tender Mint, and Hyperledger
COURSE CONTENT:
MODULE 1 6Hrs
Distributed Systems and Alternative Consensus – Overview, Blockchain Architecture, CAP
Theorem, Byzantine General Problem, Alternative Consensus Mechanisms of Bitcoin’s Proof-
of-Work, Proof-of-Stake, Voting based Consensus Algorithms, Federated Consensus
MODULE 2 6Hrs
Crypto economics – Overview, Properties, Attacks, Enterprise Blockchain Overview, Platforms,
Getting
Started with Bitcoin – Setting up a Regtest Environment, Building a Payment Gateway, Bitcoin
Smart Contracts,
MODULE 3 6Hrs
Scaling Blockchain – Vertical Scaling on-Chain, Vertical Scaling Off-Chain, Horizontal Scaling,
Advanced Scaling and Generalizations, Tontine Game with Truffle and Drizzle, Tontine
Contract, Cplayer as a
CRUD Contract, Tontine Interfaces, Ctontine Contract, Truffle Unit Tests, Frontend with
Drizzle,
MODULE 4 6Hrs
Use Cases and Industries, Regulation and Caveats, Anonymity through Altcoins, Advanced
Anonymity & Generalizations, Connecting Ganache to MetaMask, Blockchain-Based
Futures System, Futures Smart Contract, Web3j, Initial Coin Offering, Token Contracts
MODULE 5 6Hrs
Enterprise Blockchain Implementations - JP Morgan’s Quorum, Ripple, Tender mint, and
Hyperledger,
Blockchains in Business – Public versus Private and Permissioned versus Permission less
Blockchains, The Ethereum Enterprise Alliance, Blockchain-as-a-Service, Quorum
TEXT BOOKS:
1. Mastering Bitcoin: Unlocking Digital Crypto-Currencies- Andreas M. Antonopoulos, O’Reilly
Media Inc. 2020
4. Programming Bitcoin: Learn How to Program Bitcoin from Scratch, Jimmy Song, O’Reilly
Media Inc.
5. Blockchain for Dummies, Manav Gupta, IBM Limited Edition, John Wiley & Sons, Inc. 2017
SEMESTER VII
YEAR IV
COURSE CODE 19CT4714
TITLE OF THE COURSE Edge Computing with IoT
COURSE OBJECTIVES:
• Provides insights on transitioning from current Cloud-centric and 4G/5G wireless environments to
FogComputing
• Examines methods to optimize virtualized, pooled, and shared resources
• Identifies potential technical challenges and offers suggestions for possible solutions
• Discusses major components of Edge computing architectures such as middleware, interaction
protocols, andautonomic management
COURSE OUTCOMES:
CO No. Outcomes Bloom’s
Taxonomy
Level
Discuss insights on transitioning from current Cloud-centric and L4
CO1 4G/5G wireless environments to Fog Computing.
CO2 Examine methods to optimize virtualized, pooled, and shared L2
resources
CO3 Identify potential technical challenges and offers suggestions for L2
possible solutions
C04 Explain major components of Edge computing architectures such as L4
middleware, interaction protocols, and autonomic
management
C05 Deploy edge systems using Amazon IoT Greengrass Software L3
Development Kit
COURSE CONTENT:
MODULE 1 6Hrs
Internet of Things and New Computing Paradigms – Overview of Edge Computing, Edge
Methodology,
Addressing the Challenges in Federating Edge Resources, Management and Orchestration of
Network Slices, Network Slicing Management in Edge, Optimization Problems in Edge
Computing
MODULE 2 6Hrs
MODULE 3 6Hrs
How 5G is driving Edge Adoption, Open Source Edge IoT Projects – Eclipse Kura, EdgeX
Foundry,
StarlingX, OpenEdge, MS IoT Edge, KubeEdge, Eclipse ioFog, Comparison of IoT Hardware
Boards and Frameworks, IOT Data Analysis: Data Source, Ingestion, Stream Processing,
Presentation
MODULE 4 6Hrs
Microsoft Azure: Event Hubs, Stream Analytics, Azure Cosmos DB, Power BI, Google:
Pub/Sub, Cloud Data
Flow, Big Query, Cloud data Labs and Data Studio, Amazon IoT Greengrass – Overview,
Architecture, Lambda Runtime, Shadows Implementation, Message Manager, Group
Management, Discovery Service, Stream Manager,
Local Resource Access
MODULE 5 6Hrs
Amazon: Kinesis Steaming, Kinesis Analytics, S3/Dynamo DB, Amazon Quick Sight, IOT
hardware Boards
Study, Intel Edison, Intel Galileo, Samsung Artik, Microsoft IOT Boar, Amazon IoT Greengrass
– Local Machine
Learning Inference, Local Secrets Manager, Connectors with built-in Integration with Services,
Protocols and
Software
TEXT BOOKS:
1. Principles of Fog and Edge Computing: With Applications and Case Studies, June 21, 2018 by S.
Balamurugan
2. Fog and Edge Computing: Principles and Paradigms (Wiley Series on Parallel and Distributed
Computing) Hardcover – 1 March 2019 by Rajkumar Buyya & Satish Narayana Srirama
3. Practical Internet of Things Security (Kindle Edition) by Brian Russell, Drew Van
Duren
4. Securing the Internet of Things Elsevier 3. Security and Privacy in Internet of Things (IoTs):
Models, Algorithms, and Implementations
SEMESTER VII
YEAR IV
COURSE CODE 19CS4719
TITLE OF THE AWS Web Services
COURSE
SCHEME OF Lecture Tutorial Practical Seminar/Projects Total Credits
INSTRUCTION Hours Hours Hours Hours Hours
3 - - - 39 3
COURSE OBJECTIVES:
1. To understand fundamental concepts and hands-on knowledge of Cloud Computing using
AWS Platform
2. Conceive, Design and Develop state-of-the-art AWS Networking, Database, Storage Services
3. Ability to understand and apply evolve Security and privacy in AWS Cloud across various
domains like Storage, Database and applications.
COURSE OUTCOMES:
CO Outcomes Bloom’s
No. Taxonomy
Level
CO1 To understand fundamentals of Cloud computing, Amazon L2
EC2, load balancing and Auto scaling.
COURSE CONTENT:
TEXT BOOK:
1. Ben Piper, David Clinton, ‘AWS Certified Solutions Architect Study Guide: Associate SAA-C02 Exam (Aws
Certified Solutions Architect Official: Associate Exam)” Paperback – 22 February 2021
SEMESTER VIII
YEAR IV
COURSE CODE 19CT4802
TITLE OF THE COURSE EXPERIENTIAL PRACTICUM - 4
Setting up a Venture
SCHEME OF Instruction Lecture Tutorial Practical Seminar/Projects Total Credit
Hours Hours Hours Hours Hours s
18 - -- 18 270 19
-
COURSE OBJECTIVES:
COURSE OUTCOMES:
CO No. Outcomes Bloom’s
Taxonomy
Level
Finalize a GTM Strategy L5
CO1
CO2 Finalize Business Channels L5
COURSE CONTENT:
TEXT BOOKS:
1.
Venture Deals: Be Smarter Than Your Lawyer and Venture Capitalist by Brad Feld, Jason
Mendelson
COURSE OBJECTIVES:
Understand the art of technology decision making, anticipate and respond to the
Understand how the high technology firms create, capture, and deliver value through
COURSE OUTCOMES:
CO No. Outcomes Bloom’s
Taxonomy
Level
It helps students on how to prepare and manage technology L4
CO1
strategy
CO2 Students get the knowledge on strategic frameworks, tools L2
for development of technical strategy.
CO3 Students will get to know nuances in technology strategy based L2
on cross industry
examples
C04 This subject brings in awareness on alliances, collaborations & L4
joint ventures as part of
technology strategy based on examples.
C05 By doing the intermediate and final write-ups students will get to know L3
how to manage
Technology strategy
COURSE CONTENT:
MODULE 1 9Hrs
Introduction to Technology and Technology Strategy
What is Technology and Technology strategy, Roles, Technology Push and market Pull,
Performance Dynamics & S-Curves
MODULE 2 10Hrs
Adoption and Industry Dynamics – Adoption Dynamics & Diffusion, Drivers of Diffusion
rates, Roger’s categories of adoption, Industry Dynamics - Industry patterns of entry/exit,
MODULE 3 10Hrs
Capturing Value from Technology – Drivers of Value capture, Patents, Standards,
Mechanism for appropriation
MODULE 4 10Hrs
Technology, Social Systems, and Society – Impact of Technology , Open Innovation, First
mover advantage
MODULE 5 9Hrs
Disruptions of incumbents, make or buy decision making, Innovation frontier,
Technology ecosystems
TEXT BOOKS:
1. Constantinos C. Markides and Paul A. Geroski. 2005. Fast Second: How Smart
Companies Bypass Radical Innovation to Enter and Dominate New Markets. Jossey-
Bass. San Francisco
2. The Innovator's DNA: Mastering the Five Skills of Disruptive Innovators, by
COURSE OBJECTIVES:
graph search algorithms
adversarial search
knowledge representation
logical inference
COURSE OUTCOMES:
CO No. Outcomes Bloom’s
Taxonomy
Level
Analyse Graph-Search Algorithms L1
CO1
CO2 Derive Logical Inference from Knowledge L4
COURSE CONTENT:
MODULE 1 9Hrs
AI Overview, Data for AI, Key Concepts – Models, Error, Cost Functions, Types of Search
Algorithms – A* Search, Adversarial Search, Search Problems, Heuristic Functions,
Optimization – Local Search, Alpha-Beta Pruning
MODULE 2 9Hrs
Knowledge Base, Knowledge-based Agents, Propositional Logic, First-Order Logic, Inference
Algorithms, Knowledge Engineering, Logic Puzzles, De-Morgan’s Law, Inference by
Resolution
MODULE 3 9Hrs
Probability, Bayes’ Rule, Marginalization, Approximate Inference, Markov Chain, Hidden
Markov Chain, Hill-Climbing, Simulated Annealing, Constraint Satisfaction Problem
MODULE 4 9Hrs
Markov Decision Process, Q-Learning, Greedy Decision-Making, Artificial Neural
Networks, Tensor Flow, Minimum Remaining Values (MRV) Heuristic
MODULE 5 9Hrs
Natural Language Processing, Semantics, Syntax, Formal Grammar, Tokenization, Markov
Models, Text Categorization, Bag-of-Words Model, Topic Modelling, Wordnet, Skip-Gram
Architecture
TEXT BOOKS:
1. Artificial Intelligence- Elaine Rich, Kevin K and S B Nair, 3rd Edition, McGraw Hill Education,
2017
2. Artificial Intelligence: A Modern Approach- Stuart Russell and Peter Norvig, Prentice Hall 3rd,
2009
3. Natural Language Processing and Information Retrieval- Tanveer Siddiqui, U.S. Tiwary, Oxford
University Press 2008
4. Artificial Intelligence: Structures and Strategies for Complex Problem-Solving George F Luger
Pearson Addison Wesley 6th Ed, 2008
5. Artificial Intelligence E Rich, K Knight, and S B Nair Tata Mc-Graw Hill 3rd Edition
SEMESTER VIII
YEAR IV
COURSE CODE 19CT4812
TITLE OF THE COURSE Augmented & Mixed Reality
COURSE OBJECTIVES:
Explore ARKit to create augmented reality scenes and objects for your apps
Build and debug your AR app
COURSE OUTCOMES:
CO No. Outcomes Bloom’s
Taxonomy
Level
Use ARKit to create augmented reality scenes and objects for your L1
CO1 apps
CO2 Test and debug your AR app L1
CO3 Connect to web services to fetch or send info to and from your app L1
COURSE CONTENT:
MODULE 1 9Hrs
Basics of Augmented Reality, Difference between Augmented Reality and Virtual Reality,
Hardware Requirements, Google AR, AR Applications – Shopping and Retail, Business, Social
Media, gaming, Education,
Healthcare, Non-profits
MODULE 2 9Hrs
Basics of AR Functionality – AR Core – Placing and Positioning Assets, Scale and the Size of
Assets,
Occlusion, Lighting for Increased Realism, Solid Augmented Assets, Context Awareness,
Tracking in AR, Outside-in Tracking, Inside-out Tracking, Motion Tracking
MODULE 3 9Hrs
Feature Points and Plane-Finding, Light Estimation, Anchors, Interface Issues and Lack of UI
Metaphors, AR’s Technical Constraints, 3D Barrier, User-flow, Design Drafting
MODULE 4 9Hrs
Surface Detection and Creating Planes, Hit-Testing and Pose, Placing with Anchor Points,
Occlusion Between Virtual Assets, Light Estimation: Matching Virtual Light to Real Light
MODULE 5 9Hrs
Multi-Plane Detection and Spatial Mapping, Processing Needs in Mobile AR, Breaking
Immersion, Framing as a Creative Device, Introduction to Poly, Poly Examples, Introduction to
Mixed reality, Mixed Reality using Unity
TEXT BOOKS:
1. Practical Augmented Reality: A Guide to the Technologies, Applications and
Human Factors for AR and VR- Steve Aukstakalnis, Addison-Wesley
Professional; 1 Edition (8
September 2016)
2. Augmented and Virtual Reality in
Libraries- Jolanda-Pieta van
Arnhem, Christine
Elliott, Marie Rose, Rowman & Littlefield Publishers (May 24, 2018
4. Unity Virtual Reality Projects: Learn Virtual Reality by developing more than 10 engaging
projects with unity 2018 – second edition by Jonathan Linowes
5. Designing for Mixed Reality, Kharis O’Connell, September 2016, O’Reilly Media Inc.
SEMESTER VIII
YEAR IV
COURSE CODE 19CT4813
TITLE OF THE COURSE Quantum Cryptography
COURSE OBJECTIVES:
Be armed with a fundamental toolbox for understanding, designing and analysing quantum protocols.
Understand quantum key distribution protocols.
Understand how untrusted quantum devices can be tested.
COURSE OUTCOMES:
CO No. Outcomes Bloom’s
Taxonomy
Level
Use fundamental toolbox for designing and analysing quantum L1
CO1 protocols.
CO2 Explain quantum key distribution protocols. L1
COURSE CONTENT:
MODULE 1 9Hrs
Introduction to Quantum Computing, Qubits, Quantum Gates, Measuring Qubits in a Basis,
Pure and Mixed Quantum States, The Partial Trace, Classical-Quantum States, Generalized
Measurements, Encrypting Quantum Bits with Quantum One-Time Pad
MODULE 2 9Hrs
The Power of Entanglement, Separable States, Entangled States and Purification, Sharing a
Classical Secret using Quantum States, Verifying Entanglement using a Bell Experiment,
Monogamy of Entanglement
MODULE 3 9Hrs
Quantifying Information, Trace Distance, Min-Entropy, Uncertainty Principles as a Guessing
Game, Introduction to Privacy Amplification, Strong Randomness Extractors, Randomness
Extraction using Two-
Universal Hashing
MODULE 4 9Hrs
Construction of Two-Universal Hash Functions, Introduction to Key Distribution, Challenge of
Being Correct and Secure, Key Distribution over a Noisy Channel, Practical Error Correction in
Key Distribution
Protocols
MODULE 5 9Hrs
BB84 Protocol, Warmup: Security Against a Classical Eavesdropper, E91 Protocol: Purifying
Protocols using Entanglement, Quantum Key Distribution: Definition and Concepts,
Introduction to Device Independent Quantum Cryptography
TEXT BOOKS:
1. Quantum Computing – A Gentle Introduction- Eleanor Rieffel and Wolfgang Polak, MIT Press,
2011
4. Quantum Cryptography and Computing, Ryszard Horodecki, Sergei Ya. Kilin, Janusz Kowalik,
IOS Press, 2010
5. https://qiskit.org/textbook/preface.html.
SEMESTER VIII
YEAR IV
COURSE CODE 19CT4814
TITLE OF THE COURSE Industrial Internet of Things
COURSE OBJECTIVES:
Explain the implementation of industrial processes, specialized control devices
and protocols
Connect basic sensors to AWS IoT, Azure IoT, OEM IoT, Google IoT platforms
and extract this data fromthe cloud itself to your devices
COURSE OUTCOMES:
CO No. Outcomes Bloom’s
Taxonomy
Level
Explain the implementation of industrial processes, specialized L4
CO1 control devices and protocols
CO2 Connect basic sensors to AWS IoT, Azure IoT, OEM IoT, Google IoT L5
platforms and extract this data from the cloud itself to your
devices
COURSE CONTENT:
MODULE 1 9Hrs
Introduction to Industrial IoT, IoT Key Technologies, IoT and I-IoT – Similarities and
Differences, Industry Environments and Scenarios covered by I-IoT, Industrial Process and
Devices
MODULE 2 9Hrs
CIM Pyramid – CIM Pyramid Architecture – Devices and Networks, I-IoT Data Flow –
Measurements and the Actuator Chain, Controllers, Industrial Protocols, Supervisory Control
and Data Acquisition (SCADA)
MODULE 3 9Hrs
Implementing the Industrial IoT Data Flow, Discovering OPC, IoT Edge versus the I-IoT Edge,
I-IoT Data Sources and Data Gathering, Securing I-IoT Data Flow
MODULE 4 9Hrs
eveloping I-IoT and Architecture – OSGi, Microservice, Containers and Serverless Computing,
Standard I-IoT Flow, Implementing a Custom Industrial IoT Platform – An Open Source
Platform in Practice, Mosquitto as MQTT Connector, Apache Kafta Overview, Kafta as a
Data Dispatcher
MODULE 5 9Hrs
Apache Cassandra Overview, Storing Time-Series Data on Apache Cassandra, Industrial OEM
Platforms, Predix Platform, MindSphere Platform, Open System Architecture, Overview of
Digital Twin
TEXT BOOKS:
1. Hands-On Industrial Internet of Things- Giacomo Veneri, Antonio Capasso, 2018
2. Industrial Internet of Things: Cyber Manufacturing Systems- Sabina Jeschke, Christian Brecher,
Houbing Song, Danda B. Rawat, Springer), 2017
5. Cristina Alcaraz, Security and Privacy Trends in the Industrial Internet of Things, 2019
6. Ioana Culic, Alexandru Radovici, Cristian Rusu, Commercial and Industrial Internet of Things
Applications with the Raspberry Pi: Prototyping IoT Solutions,2020