04_Syllabus_2024_25
04_Syllabus_2024_25
(AUTONOMOUS)
ACCREDITED BY NAAC WITH A++ GRADE
IBRAHIMBAGH, HYDERABAD-500 031
Sponsored by
Vision
Striving for a symbiosis of technological excellence and human
values.
Mission
To arm young brains with competitive technology and nurture
holistic development of the individuals for a better tomorrow.
Quality Policy
Education without quality is like a flower without fragrance. It is
our earnest resolve to strive towards imparting high standards of
teaching, training and developing human resources.
Vision
To be a center of excellence in the emerging areas of
Information Technology.
Mission
UNIT 1:
Formal Languages and regular expressions: Introduction, Central
Concepts of Automata Theory, Chomsky Hierarchy of Languages, DFA, NFA,
NFA to DFA. Finite Automata and Regular Expressions, Applications of Regular
Expressions, Algebraic Laws for Regular Expressions, Conversion of Finite
Automata to Regular Expressions.
Introduction to Compilers and Lexical Analysis:
Introduction, Language Processors, the Structure of a Compiler. Lexical
Analysis – The Role of Lexical Analyzer, Input Buffering, Specification of
Tokens, Recognition of Tokens, The Lexical-Analyzer Generator- LEX.
UNIT 2:
Context Free Grammars: Definition of Context Free Grammars, Grammars
and Languages Generated, Derivations, Parse Trees, Ambiguity in Grammars,
and Languages, PDA, Simplification of CFG’s
With effect from Academic Year 2024-25 (R-21)
CYBER SECURITY
SYLLABUS FOR B.E VII-SEMESTER
L:T:P (Hrs./week): 3:0:0 Course Code :
SEE Marks : 60
U21PC730IT
Credits : 3 CIE Marks : 40 Duration of SEE: 3 Hrs
UNIT – I
Fundamentals of Image Processing and Image Transforms: Basic steps of
Image Processing System, Sampling and Quantization of an image, relationship
between pixels. Image Transforms: 2 D- Transformations, Discrete Fourier
Transform, Discrete Cosine Transform (DCT)
UNIT – II
Image Processing Techniques: Image Enhancement: Spatial domain methods:
Histogram processing, Fundamentals of Spatial filtering, Smoothing spatial
filters, Sharpening spatial filters. Frequency domain methods: Basics of filtering
in frequency domain, image smoothing, image sharpening, Selective filtering.
With effect from Academic Year 2024-25 (R-21)
UNIT – III
Image Segmentation: Segmentation concepts, Point, Line and Edge Detection.
Thresholding, Region Based segmentation.
UNIT – IV
Image Compression: Image compression fundamentals - Coding Redundancy,
Spatial and Temporal redundancy, Compression models: Lossy & Lossless,
Huffman coding, Arithmetic coding, LZW coding, Run length coding, Bit plane
coding, Transform coding, Predictive coding, Wavelet coding, JPEG Standards.
UNIT-V
Preliminaries of morphological Image processing - Erosion and Dilation, Closing,
Opening, HIT, MISS operations, Basic Morphological algorithms , boundary
extraction,Thining,Thikening,Skeletons
Video processing fundamentals:
Inter-frame redundancy, motion estimation techniques –full search, fast
search strategies, forward and backward motion prediction, frame
classification – I, P and B; Video sequence hierarchy – Group of pictures,
frames, slices, macro-blocks and blocks; Video coding standards – MPEG and
H.26X.
Learning Resources:
1. Gonzalez and Woods ,Digital Image Processing , 3rd ed., Pearson
Education.
2. .William K. Pratt – Digital Image Processing – John Wiley & Sons-2/e, 2004
3. Digital Image and video process for GTU, Dhananjay k Theckedath
4. Multimedia Image and video processing 2nd ed, Ling Guan , Taylor & Francis
5. http://www.nptelvideos.in/2012/12/digital-image-processing.html
UNIT – I:
Introduction to cryptography, Number Theory: Divisibility and the
Division Algorithm, The Euclidean Algorithm , Modular Arithmetic , Prime
Numbers Fermat’s and Euler’s Theorems , Testing for Primality.
Security Concepts: Introduction, The need for security, Security
approaches, Principles of security, Types of Security attacks, Security services,
Security Mechanisms, A model for Network Security
UNIT – II:
Symmetric Ciphers: Symmetric Cipher Model, Classical Encryption
Techniques-,Substitution Techniques ,Transposition Techniques.
With effect from Academic Year 2024-25 (R-21)
SOFTWARE TESTING
(Professional Elective-I)
SYLLABUS FOR B.E VII-SEMESTER
UNIT-I
Introduction: Software-Testing, Terminology and Methodology: Software
testing terminology, Software Testing Life Cycle (STLC),Software Testing
Methodology
Verification and Validation: V & V activities, verification of requirements,
verification of HLD and LLD, validation
UNIT-II
Dynamic Testing: Black Box Testing Techniques, White Box Testing
Techniques, Static Testing, Validation Activities, Regression Testing.
UNIT-III
Test Management: Test Organization, Structure, Planning, Detailed test
design and test specification, Software Metrics, Size Metrics, Testing Metrics for
With effect from Academic Year 2024-25 (R-21)
UNIT-IV
Testing Process: Testing Objected Oriented Software, Testing Web Based
Systems, Debugging
UNIT-V
Software Testing Tools-case study: Overview of Testing Tools, Testing an
Application using WinRunner, Load Runner, JMeter, QTP
Learning Resources :
1. Naresh Chauhan, Software Testing Principles and Practices, Oxford
University Press, 2010.
2. Dr.K.V.K.K.Prasad, Software Testing Tools, Dreamtech press, 2008.
3. William E. Perry, Effective Methods for Software Testing,Third Edition,
Wiley & Sons, 2006.
4. Srinivasan Desikan, Gopalaswamy Ramesh, Software Testing: Principles
and Practices, Pearson Education, 2006.
5. Testing and Quality Assurance for Component-based Software, by Gao,
Tsao and Wu, Artech House Publishers
6. Software Testing Techniques, by Bories Beizer, Second Edition,
Dreamtech Press
7. Managing the Testing Process, by Rex Black, Wiley
8. Handbook of Software Quality Assurance, by G. Gordon Schulmeyer,
James I.McManus, Second Edition, International Thomson Computer
Press
9. http://www.nptelvideos.in/2012/11/software-engineering.html
10. https://onlinecourses.nptel.ac.in/noc16_cs16/preview
DATA MINING
(Professional Elective-I)
SYLLABUS FOR B.E. - VII SEMESTER
L:T:P (Hrs./week):3:0:0 SEE Marks : 60 Course Code :
U21PE740IT
Credits : 3 CIE Marks : 40 Duration of SEE: 3 Hours
UNIT – I
Introduction: Why and What is Data Mining, Kinds of Data, Kinds of patterns,
Technologies used, Applications and Major Issues in Data Mining. Data
preprocessing – Basics.
Data Warehouse and OLAP Technology: Data warehouse – Basic concepts,
Modeling – Data cube and OLAP, warehouse design & usage, and warehouse
implementation.
UNIT – II
With effect from Academic Year 2024-25 (R-21)
UNIT – III
Classification: Introduction, Classification using frequent patterns.
Cluster Analysis: Introduction, Clustering high dimensional data, Clustering
Graph and Network data, Clustering with constraints.
Outlier Analysis: Basics, Outlier detection methods, Outlier detection in high
dimensional data.
UNIT – IV
Mining Stream, Time-series and Sequence data: Mining Data Streams,
Mining Time-Series data – Trend analysis, Mining sequence patterns.
Graph Mining, Social Network Analysis and Multi Relational Data
Mining: Mining Frequent subgraphs and applications. Social network analysis
– Basics, Link mining. What is Multi Relational Data Mining.
Unit-V
Mining Object, Spatial, Multimedia, Text and Web data Basics: Multi-
Dimensional analysis and mining of complex data objects, Spatial Data Mining,
Multimedia data mining, Text mining, Mining the World Wide Web.
Case Studies: Mining Twitter, Mining Facebook, Mining LinkedIn, Mining
Google+, Mining web pages, Mining GitHub, and Mining mailboxes.
Learning Resources:
1. Han J & Kamber M, Data Mining: Concepts and Techniques, Third Edition,
Elsevier, 2011.
2. Han J & Kamber M, Data Mining: Concepts and Techniques, Second Edition,
Elsevier, 2006.
3. Matthew A Russell, Mining The Social Web – Data Mining Twitter, Facebook,
Google+, GitHub, LinkedIn and more, Second edition. OReilly publications.
4. Pang-Ning Tan, Michael Steinback, Vipin Kumar, Introduction to Data
Mining, Pearson Education, 2008.
5. Arun K Pujari, Data mining Techniques, Second Edition, University
Press,2001.
6. Margaret H Dunham, S.Sridhar, Data mining: Introductory and Advanced
Topics, Pearson Education, 2008.
With effect from Academic Year 2024-25 (R-21)
UNIT- I
NLP with Probabilistic Models:
Regular Expressions, Text Normalization, Edit Distance: Introduction to
NLP, Applications of NLP, Regular Expressions, Words, Corpora, Text
Normalization, Minimum Edit Distance.
N-gram Language Models: N-Grams, Evaluating Language Models,
Generalization and Zeros, Smoothing, Kneser-Ney Smoothing, Huge Language
Models and Stupid Backoff.
Sequence Labeling for Parts of Speech and Named Entities: English
Word Classes, Part-of-Speech Tagging, Named Entities and Named Entity
Tagging, HMM for Part-of-Speech Tagging, Conditional Random Fields (CRFs).
UNIT- II
NLP with Classification:
Naive Bayes and Sentiment Classification: Naive Bayes Classifiers,
Training the Naive Bayes Classifier, Worked example, Optimizing for Sentiment
Analysis, Naive Bayes for other text classification tasks, Naive Bayes as a
With effect from Academic Year 2024-25 (R-21)
7. http://www.nptelvideos.in/2012/11/natural-language-processing.html
BLOCKCHAIN
(Professional Elective-II)
SYLLABUS FOR B.E VII-SEMESTER
UNIT-I:
Introduction: Need for decentralization, Decentralization with blockchain,
properties of blockchain, Definition, History, Distributed ledger.
Cryptographic primitives: Hash function, properties of hash, SHA 256,
Hash pointers, hashchain, Merkle tree, public key cryptography, signatures.
UNIT-II:
Bitcoin: Cryptocurrency Consensus over an open network, PoW, Block
header, Transaction flooding, block reward, double spending, scalability and
energy consumption.
Ethereum: Ethereum network, Ethereum smart contracts, Ethereum virtual
machine, solidity language, deploy and execute contracts.
With effect from Academic Year 2024-25 (R-21)
UNIT-III:
Permissioned blockchain: Distributed Systems, Permissioned Blockchains,
Design goals, Overview of Consensus models for permissioned block chain-
Distributed consensus in closed environment, Paxos, RAFT Consensus,
Byzantine general problem, Byzantine fault tolerant system
Hyperledger: Hyperledger foundation projects, fabric architecture, Identities
and Policies, Membership and Access Control, Channels, Transaction
Validation, Writing smart contract using Hyperledger Fabric.
UNIT-IV:
Identity management: Concept of identity, centralized identity
management, decentralized identity management.
Blockchain interoperability: Asset and data transfer, cross chain transfer
and exchange of asset,
Blockchain security: 51% vulnerability, private key security.
UNIT-V:
usecases: Identifying good blockchain use cases, and land records and other
kinds of record keeping between government entities, financial services,
Decentralized marketplace. National Strategy of Blockchain in India
Learning Resources:
Textbooks:
1. Mastering Blockchain: A deep dive into distributed ledgers, consensus
protocols, smart contracts, DApps, cryptocurrencies, Ethereum, and more,
3rd Edition, Imran Bashir, Packt Publishing, 2020, ISBN: 9781839213199,
book website: https://www.packtpub.com/product/mastering-
blockchain-third-edition/9781839213199
2. Kube, Nicolas. "Daniel Drescher: Blockchain basics: a non-technical
introduction in 25 steps: Apress, 2017, 255 pp, ISBN: 978-1-4842-2603-
2." (2018): 329-331.
3. LEE, WM. "Beginning Ethereum Smart Contracts Programming: With
Examples in Python." Solidity, and JavaScripty, Apress, Singapore (2019).
4. Gaur, Nitin, et al. Blockchain with Hyperledger fabric: Build decentralized
applications using Hyperledger fabric 2. Packt Publishing Ltd, 2020.
Online References:
1. NPTEL courses:
a. Blockchain and its Applications,
b. Blockchain Architecture Design and Use Cases
With effect from Academic Year 2024-25 (R-21)
UNIT II
Introduction to Scrum: Agile Scrum Framework, Scrum Artifacts, Meetings,
Activities and Roles, Scrum Team Simulation, Scrum Planning Principles Scrum
and self-organizing teams, Scrum Planning and Collective commitment.
Learning Resources:
Prescribed books:
1. Learning Agile Understanding Scrum, XP,Lean and Kanban – Andrew
Stellman and Jennifer Greene. O’reilly. Fourth Indian Reprint Aug 2019,
Shroff publishers
2. Cohn, Mike, Agile Estimating and Planning, Pearson Education, 2006.
3. Agile Project Management with Azure DevOps Concepts, Templates and
metrics - Joachim Rossberg, Apress, reprint year 2023.
Reference Books:
1. Robert C. Martin, Agile Software Development- Principles, Patterns and
Practices, Prentice Hall,2013.
2. James Shore and Shane Warden, The Art of Agile Development, O’Reilly
Media, 2007.
3. Cohn, Mike, User Stories Applied: For Agile Software Development
Addison Wisley, 2004.
4. David J. Anderson and Eli Schragenheim, ―Agile Management for
Software Engineering: Applying the Theory of Constraints for Business
Results, Prentice Hall, 2003.
5. Hazza and Dubinsky, ―Agile Software Engineering, Series: Undergraduate
Topics in Computer Science, Springer, 2009.
UNIT–I
Data Definitions: Elements, Variables, and Data categorization, NOIR
classification, Levels of Measurement, Data analytics.
Analytics with Data visualization: introduction, exploration, explanation,
insight visualization, insight to action, Data driven decision making, Data story
telling – Psychology, anatomy, narrative, visuals structure.
UNIT-II
Introduction to R: Install R studio, R markdown, data structures: Vector,
list, matrix, data frame, factors.
Data import/export: read/write csv files, excel files, loading datasets.
Descriptive stats: Central tendency, dispersion measurements.
Data Pre-processing: Tabularizing, cleaning, imputation, scaling,
normalizing, selection, filtering, sort, aggregate, joining with Tidyverse, dplyr
R libraries, Pandas Python library.
UNIT – III
Visualizations in R: Intro to ggplot2, Basic visualization – Histogram, Bar /
Line Chart, Box plot, Scatter plot. Advanced Visualization: Heat Map, Mosaic
Map, Map Visualization, 3D Graphs, Correlogram.
With effect from Academic Year 2024-25 (R-21)
LIST OF EXPERIMENTS
Learning Resources:
1. John E.Hopcroft, Rajeev Motwani, Jeffery D Ulman, Introduction to
Automata Theory Languages And Computation, Third edition,
Pearson Education.
2. V Aho, Monica S Lam, Ravi Sethi, Jeffrey D Ullman – Compilers:
Principles , Techniques &Tools – Pearson Education, Second Edition,
2007
3. John R Levine, Tony Mason, Dougn Broun, Lex and Yacc, Orielly, 2nd
Edition,2009
Online Resources:
1. http://cse.iitkgp.ac.in/~bivasm/notes/LexAndYaccTutorial.pdf
Learning Resources:
1. AMAZON WEB SERVICES: The Complete Guide From Beginners For
Amazon Web Services, Richard Derry, Amazon
2. Learning AWS, by Aurobindo Sarkar, Amit Shah, 2015, Packt Publishing
Digital Services LLC, 2019
3. Colouris, Dollimore, Kindberg, “ Distributed Systems concepts and Design”
5th Ed. Pearson Education, 2011
4. Rajkumar Buyya, James Broberg, Andrzej M Goscinski “Cloud Computing:
Principles & Paradigms, Wiley Series on Parallel and Distributed
computing, 2011
5. Herbert Schildt, “Java : the complete reference” McGraw-Hill Education,
2019
List of Experiments
Learning Resources:
1. Digital Image processing" and Gonzalez, Woods.
2. Digital Image Processing, WILLIAM K PRATT WILEY Publication.
Online Resources:
https://cse19-iiith.vlabs.ac.in/
List of Experiments
1. Working with Wire shark packet sniffer for monitoring network
communication.
2. Implement the following Substitution & Transposition Techniques:
a) Caesar Cipher
b) Play fair Cipher
c) Hill Cipher
d) Vigenere Cipher
e) Rail fence
f) Row & Column Transformation
3. Write a code for a random number generator
a) Using Python code
b) Using a secure pseudo-random number generator tool.
4. Implementation and Performance Evaluation following block cipher
cryptographic algorithms:
a) DES
b) AES
With effect from Academic Year 2024-25 (R-21)
Suggested Reading:
1. William Stallings, Cryptography and Network Security,
7th Edition, Pearson Education,2017.
2. Neal Koblitz, A course in number theory and cryptography,
Springer.
Online Resources:
https://www.wireshark.org/
https://nptel.ac.in/courses/106105162
List of Experiments
6. Testing an application for Load testing and Stress testing using testing
tool WinRunner.
7. Testing a Web application for regression testing using a testing tool
Selenium.
8. Identifying the bugs using Bug Tracking Tool Bugzilla for a GMAIL
application.
Virtual Lab:
9. Designing Test Suits: http://vlabs.iitkgp.ac.in/se/10/theory/
Suggested Reading:
List of Experiments
1. Install Open Source Data Mining Tool. Get accustomed to all the
components of the tool.
2. Load any dataset and explore its attributes, their types, find outliers and
computer summary statistics.
3. Experiment to check for missing values in any given dataset and handle
them using various options provided by the tool. Save the pre-processed
data.
4. Experiment to carry out numeric data transformation using normalization.
Save the pre-processed data.
5. Experiment to carry out numeric data transformation using
standardization or Z-score normalization. Save the pre-processed data.
With effect from Academic Year 2024-25 (R-21)
Suggested Reading:
3. Han J & Kamber M, Data Mining: Concepts and Techniques, Third
Edition, Elsevier, 2011.
4. Pang-Ning Tan, Michael Steinback, Vipin Kumar, Introduction to Data
Mining, Pearson Education, 2008.
Online Resources:
1. https://nptel.ac.in/courses/106/105/106105174/
2. https://cse20-iiith.vlabs.ac.in/exp/mst-based/index.html
3. https://www.javatpoint.com/orange-data-mining
4. https://www.tutorialspoint.com/weka/what_is_weka.htm
Virtual Lab:
13 Experiments 1-8: https://nlp-
iiith.vlabs.ac.in/List%20of%20experiments.html
Learning Resources:
1. https://pytorch.org/
2. https://chat.openai.com/
3. https://huggingface.co/
Suggested Reading:
5. LEE, WM. "Beginning Ethereum Smart Contracts Programming: With
Examples in Python." Solidity, and JavaScripty, Apress, Singapore
(2019).
6. Gaur, Nitin, et al. Blockchain with Hyperledger fabric: Build
decentralized applications using Hyperledger fabric 2. Packt Publishing
Ltd, 2020.
Online Resources:
https://onlinecourses.nptel.ac.in/noc22_cs44/preview
List of Experiments
1. Understand the background and driving forces for taking an Agile
approach to Software Development.
2. Build out a backlog and user stories.
3. Demonstrate and use automated build tool.
4. Demonstrate version control tool.
5. Demonstrate Continuous Integration tool
6. Perform Testing activities within an agile project.
7. Case Study based on tools and demonstration.
8. Hands on tools like Jira, Jenkins, Miro and Confluence OR Jira and
DevOps.
Suggested Reading:
1. Cohn, Mike, Agile Estimating and Planning, Pearson Education, 2006.
2. Cohn, Mike, User Stories Applied: For Agile Software Development
Addison Wisley, 2004.
With effect from Academic Year 2024-25 (R-21)
Online Resources:
https://miro.com/
https://www.atlassian.com/software/jira
https://www.atlassian.com/software/confluence
https://www.jenkins.io/
https://aws.amazon.com/devops/what-is-devops/
List of Experiments
7. Write a program for scaling and data normalization using Tidyverse, dplyr
R libraries.
8. Write a program for selection, filter, sort, aggregate and joins data using
Tidyverse, dplyr R libraries.
9. Write a program for creating line charts, bar plots, box plot, scatter plots,
3Dgraphs, Heatmaps and histograms using Seaborn.
10. Write a program for creating line charts, bar plots, box plot, scatter plots,
3D graphs and histograms using R ggplot2 library.
11. Visualize different types of Maps by loading dataset in ggplot2.
12. Write a program for Hypothesis testing using z-test , t-tests, and chi
square tests.
13. Write a program for EDA on Wine Quality Data Set.
14. Implement data visualization and basic dashboards in Tableau.
Virtual Lab:
15. Writing and Reading Sequence Data in R: https://bds-
au.vlabs.ac.in/exp/sequence-data-r/posttest.html
Suggested Reading:
1. Data visualization with python: create an impact with meaningful data
insights using interactive and engaging visuals, Mario Dobler, Tim
Grobmann, Packt Publications, 2019
2. Practical Tableau: 100 Tips, Tutorials, and Strategies from a Tableau
Zen Master, Ryan Sleeper, Oreilly Publications, 2018.
3. Data Visualization with R: 111 Examples by Thomas Rahlf, Springer,
2020
Online Resources:
1. Data visualizations in R
2. Comprehensive Guide to Data Visualization in R
3. https://www.datacamp.com/
4. https://seaborn.pydata.org/
5. https://www.r-project.org/
6. https://www.ibm.com/in-en/cloud/learn/exploratory-data-analysis
PROJECT SEMINAR
SYLLABUS FOR B.E VII- SEMESTER
L : T : P (Hrs./week): SEE Marks : 50 Course
0:0:2 Code:U21PW719IT
Credits : 1 CIE Marks : 30 Duration of SEE : 3 Hours
Seminar topics may be chosen by the students with advice from the faculty
members.
A seminar schedule will be prepared by the coordinator for all the students. It
should be from the 5th week to the last week of the semester and should be
strictly adhered to.
At least two teachers will be associated with the evaluation of the project
seminar for the award of the CIE marks which should be on the basis of
performance on all the three items stated above.
PRACTICALS
COMPUTER VISION
(Professional Elective-III)
SYLLABUS FOR B.E VIII-SEMESTER
Unit -1
Introduction: Background, requirements and issues, human vision
Image formation: Geometric primitives and transformations, Photometric
image formation, The digital camera.
Unit-2
Feature detection and matching: Points and patches, Edges, Lines
Statistical approaches for Feature Extraction: Mathematical Notation &
Background, Fourier Transform, Windowed Fourier Transform, Wavelets,
Bayesian Decision Theory, Principal and Independent Component Analysis
Unit-3
With effect from Academic Year 2024-25 (R-21)
Unit 4:
Artificial neural networks: CNNS, Deep Learning Methods for Image
classification, object detection and Instance recognition. Category recognition,
Context and scene understanding
Unit -5
Deep learning for Face recognition, Visual question answering, Tracking,
Gesture recognition
Learning Resources:
1. “Computer Vision: Algorithms and Applications”, Richard Szeliski, 2010
(online version available at no cost for personal use).
2. “Computer Vision: A Modern Approach”, D. Forsyth and J. Ponce, 2010.
3. “Deep Learning: Algorithms and Applications”, I. Goodfellow, Y. Bengio
and A. Courville, 2017 (online version available at no cost for personal
use).
4. “A Guide to Convolutional Neural Networks for Computer Vision”, S. Khan,
H. Rahmani, S. Shah and M. Bennamoun, 2018 (online version available
from a USC account).
INFORMATION SECURITY
(Professional Elective-III)
SYLLABUS FOR B.E VIII-SEMESTER
L : T : P (Hrs./week): SEE Marks :60 Course Code :
3:0:0 U21PE820IT
Credits : 3 CIE Marks: 40 Duration of SEE : 3 Hours
UNIT- I
Introduction: History, critical characteristics of information, NSTISSC security
model, Components of an information system, Securing the components,
balancing security and access, The SDLC, The security SDLC
Need for Security: Business needs, Threats, Attacks-secure software
development
UNIT-II
Legal, Ethical and Professional Issues: Law and ethics in information
security, relevant U.S laws-international laws and legal bodies, Ethics and
information security
With effect from Academic Year 2024-25 (R-21)
Learning Resources:
1. Michael E. Whitman and Hebert J Mattord, Principles of Information Security, 4th
edition, Ed. Cengage Learning 2011
2. Thomas R Peltier, Justing Peltier, John Blackley, Information Security.
Fundamentals, Auerbacj Publications 2010
3. Detmar W Straub, Seymor Goodman, Richard L Baskerville, Information Security.
Policy proceses and practices PHI 2008
4. Marks Merkow and Jim Breithaupt, Information Security. Principle and Practices,
Pearson Education, 2007.
5. https://onlinecourses.nptel.ac.in/noc17_cs08/preview
6. http://nptel.ac.in/courses/106106129/
UNIT-I
Conventional Software Management: The waterfall model, conventional
software Management performance, Evolution of Software Economics,
Improving Software Economics: Reducing Software product size. The old way
and the new: The principles of conventional software Engineering, principles of
modern software management, transitioning to an iterative process.
UNIT-II
Life cycle phases: Engineering and production stages, inception, Elaboration,
construction, transition phases.Artifacts of the process: The artifact sets,
Management artifacts, Engineering artifacts, pragmatic artifacts,Work Flows of
the process, Checkpoints of the process.
UNIT-III
Iterative Process Planning: work breakdown structures, planning
guidelines, cost and schedule estimating, Iteration planning process, Pragmatic
With effect from Academic Year 2024-25 (R-21)
UNIT-IV
Project Control and Process instrumentation: The seven core Metrics,
Management indicators, quality indicators, Tailoring the Process: Process
discriminants. Managing people and organizing teams.
UNIT-V
Future Software Project Management: modern Project Profiles, Next
generation Software economics, modern process transitions. Process
improvement and mapping to the CMM.
Learning Resources:
1. Walker Royce, Software Project Management: A Unified Framework,
Pearson Education 1998
2. Bob Hughes and Mike Cotterell – Software Project Management, 4th Edition
– Tata McGraw Hill – 2006
3. Pankaj Jalote, Software Project Management, Pearson Education – 2002
4. http://nptel.ac.in/courses/106101061/29
QUANTUM COMPUTING
(Professional Elective-III)
SYLLABUS FOR B.E VIII-SEMESTER
Unit-I
Introduction – The leap from classical to Quantum, Classical deterministic
systems, Probabilistic Systems, Quantum Systems, Assembling systems, Global
Perspectives- History of Quantum computation and Quantum information,
Nomenclature and Notation- Linear Algebra and Quantum Mechanics,
Information theory and probability, frequently used quantum gates and circuit
symbols, Quantum supremacy.
Unit- II
Basic Quantum theory- Quantum states: Superposition, Entanglement, the
role of Quantum Physics: Quantum interference, Quantum entanglement,
Quantum decoherence, Quantum bit: Qubit, Multiple Qubits, The state of
With effect from Academic Year 2024-25 (R-21)
Generative AI
(Professional Elective-IV)
SYLLABUS FOR B.E VIII-SEMESTER
L:T:P (Hrs./week): 3:0:0 SEE Marks : 60 Course Code:
U21PE850IT
Credits : 3 CIE Marks : 40 Duration of SEE : 3 Hrs
UNIT-I:
Introduction: Intro to Generative AI, Gen AI capabilities, limitations, and
Applications.
Prompt engineering, Techniques: Basic tips like clarity, context, guiding,
explicit instructions, formatting, multi steps and iterative refinement for
reading, writing, and chatting. NLP applications: Inferring, Summarizing,
Transforming and Chatbots.
UNIT-II:
GenAI using LLM: Advanced prompting techniques: Chain of thought, Meta
prompting, Few-shot learning, Chaining, Prompt augmentation, Retrieval-
Augmented Generation (RAG) and Lang Chain Framework.
LLM internals: OpenAI ChatGPT architecture, Pretraining on large corpus with
Transformer, Supervised fine tuning (SFT), Reinforcement leaning with
Human feedback (RLHF), Fine tuning LLMs: Data preparation, training, and
evaluation of LLMs.
With effect from Academic Year 2024-25 (R-21)
UNIT-III:
GenAI using Vision: Prompting Vision models, Image generation: Text
prompts and adjusting hyper params.
Image segmentation: Prompting with positive, negative, and bounding box co-
ordinates.
Object detection: Text prompts to identify objects.
In-Painting: Replace parts with GenAI.
Personalization of images with Fine tuning.
Introduction to Stable Diffusion 2.0 model for GenAI.
UNIT-IV:
Multi-model GenAI: Intro to Gemini multi-modal GenAI, prompting with
text, audio, and images.
Audio Prompting Tips: simple queries, combined with Text and summarization.
Image prompting Tips: descriptive text, combined with text prompts, Image
editing.
Intro to Microsoft Co-pilot.
UNIT-V:
Governance: Model vulnerabilities, Quality, Safety, and Security of LLMs,
Responsible AI.
Ethical frameworks: Bias and Fairness, Transparency and Explainability, Risk
mgmt., Public Trust.
Regulatory Compliance: Data privacy, Accountability and Liability, IP, frequent
Auditing and Certification.
Learning Resources:
1. “Artificial Intelligence & Generative AI for Beginners” by David M.
Patel.
2. "Generative Deep Learning: Teaching Machines to Paint, Write,
Compose, and Play" by David Foster
3. “Generative AI with Python and TensorFlow 2” by Joseph Babcock and
Raghav Bali.
4. “Generative AI for Business: The Essential Guide for Business
Leaders” by Matt White.
5. “Generative AI in Practice” by Bernard Marr.
6. https://www.deeplearning.ai/courses/generative-ai-for-everyone/
7. https://www.deeplearning.ai/short-courses/chatgpt-prompt-engineering-
for-developers/
8. https://www.deeplearning.ai/short-courses/building-systems-with-chatgpt/
With effect from Academic Year 2024-25 (R-21)
9. https://www.deeplearning.ai/short-courses/langchain-for-llm-application-
development/
10. https://www.deeplearning.ai/short-courses/finetuning-large-language-
models/
11. https://www.deeplearning.ai/short-courses/building-evaluating-advanced-
rag/
12. https://www.deeplearning.ai/short-courses/prompt-engineering-for-vision-
models/
13. https://www.deeplearning.ai/short-courses/how-diffusion-models-work/
14. https://www.deeplearning.ai/short-courses/building-multimodal-search-
and-rag/
15. https://gemini.google.com/
16. https://www.deeplearning.ai/short-courses/red-teaming-llm-applications/
17. https://www.deeplearning.ai/short-courses/quality-safety-llm-applications/
CLOUD SECURITY
(Professional Elective-IV)
SYLLABUS FOR B.E VIII-SEMESTER
UNIT-IV
Cloud Security and Trust Management, data Security in the Cloud: An
Introduction to the Idea of Data Security, The Current State of Data Security in
the Cloud, CryptDb: Onion Encryption layers – DET, RND, OPE, JOIN, SEARCH,
HOM and Homomorphic Encryption, FPE. Trust, Reputation and Security
Management. Case Study: Cloud Data Breach Protection
UNIT-V
Security at different levels: Infrastructure security; Network level security; Host
level security; Application level security; Data security and storage;
Jurisdictional issues - data location identity; Access management, access control
trust, reputation, risk authentication in cloud computing. Case Study : Securing
Amazon EC2 Cloud, Securing Azure Virtual Machines
Learning Resources:
1. Ronald L. Krutz, Russell Dean Vines Cloud Security: A Comprehensive
Guide to Secure Cloud Computing, , Wiley- India,2010
2. Thomas Erl ‘Cloud Computing Design Patterns’, Prentice Hall, 1st edition,
June, 2015
3. https://reconshell.com/wp-content/uploads/2022/07/Cloud-Security-
Handbook.pdf
4. https://dhoto.lecturer.pens.ac.id/lecture_notes/internet_of_things/CLOUD
%20COMPUTING%20Principles%20and%20Paradigms.pdf
5. Raluca Ada Popa, Catherine M.S. Redfiled, NickolaiZeldovich, and Hari
Balakrishnan, “Crypt DB” Protecting confidentiality with encrypted Query
Processing” 23rd ACM Symposium on Operating Systems principles (SOSP
2011), Cascais, Portugal October 2011.
6. Craig Gentry,A fully Homomorhic Encryption Scheme, Doctoral
Dissertation, September 2009
7. https://cloudtweaks.com/2014/07/computing-security-network-
application-levels/
The break-up of CIE: Internal Tests+ Assignments + Quizzes
1 No. of Internal Tests: 02 Max.Marks for each Internal Tests: 30
2 No. of Assignments: 03 Max. Marks for each Assignment: 05
3 No. of Quizzes: 03 Max. Marks for each Quiz Test: 05
Duration of Internal Test: 90 Minutes
With effect from Academic Year 2024-25 (R-21)
UNIT-I
Software reuse success factors, Reuse driven software engineering business,
Object oriented software engineering, applications and component sub
systems, use case components, object components.
UNIT-II
Design Patterns – Introduction, Creational patterns, factory, factory method,
abstract factory, singleton, builder prototype.
UNIT-III
Structural Patterns- Adapters, bridge, composite, decorator, façade, flyweight,
proxy.
Behavioral Patterns – Chain of responsibility, command, interpreter.
UNIT-IV
With effect from Academic Year 2024-25 (R-21)
UNIT-V
Architectural patterns – Layers,pipes and filters, black board, broker, model-
view controller,presentation- abstraction – control, micro kernel, reflection.
Learning Resources :
1. Ivar jacabson, Martin Griss, Patrick Hohson – Software Reuse. Architecture,
Process and Organization for Bussiness Success, ACM Press, 1997.
2. Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides – Design
Patterns- Addison, 1995, Pearson Education.
3. Frank Buschmann etc. – Pattern Oriented Software Architecture – Volume
1, Wiley 1996.
4. James W Cooper – Java Design Patterns, a tutorial, Addison 2000, Pearson
Education.
5. http://nptel.ac.in/courses/106101061/27
6. http://www.nptelvideos.com/video.php?id=910
UNIT I:
Internet of Things (IoT) and New Computing Paradigms: Introduction,
Relevant Technologies, Fog and Edge Computing Completing the Cloud,
Advantages of FEC: SCALE,How FEC Achieves These Advantages: SCANC
,Hierarchy of Fog and Edge Computing ,Business Models ,Opportunities and
Challenges, Out-of-Box Experience, Open Platforms, System Management.
UNIT II:
Addressing the Challenges in Federating Edge Resources :Introduction,
The Networking Challenge, The Management Challenge, Miscellaneous
Challenges.
Management and Orchestration of Network Slices in 5G, Fog, Edge,
and Clouds
With effect from Academic Year 2024-25 (R-21)
UNIT III
Middleware for Fog and Edge Computing: Design Issues
Introduction, Need for Fog and Edge Computing Middleware , Design Goals ,
State-of-the-Art Middleware Infrastructures, System Model , Proposed
Architecture.
UNIT IV:
Data Management in Fog Computing:
Introduction, Background, Fog Data Management , Fog Data Life Cycle, Data
Acquisition ,Lightweight Processing , Processing and Analysis , Sending
Feedback , Command Execution, Data Characteristics, Data Pre-Processing and
Analytics, Data Privacy , Data Storage and Data Placement
UNIT V:
A Lightweight Container Middleware for Edge Cloud: Architectures
Introduction, Background/Related Work , Edge Cloud Architectures, Clusters
for Lightweight Edge Clouds , Architecture Management – Storage and
Orchestration, OpenStack Storage , Docker Orchestration . IoT Integration ,
Security Management for Edge Cloud Architectures
Learning Resources:
1. Fog and Edge Computing: Principles and Paradigms, Edited by Rajkumar
Buyya and Satish Narayana Srirama, Wiley Online Books.
2. https://onlinecourses.nptel.ac.in/noc24_cs66/preview
PROJECT / INTERNSHIP
SYLLABUS FOR B.E VIII-SEMESTER
Faculty members should prepare project briefs well in advance. They should be
made available to the students at the departmental library.
The department will appoint a project coordinator who will be incharge of the
following:
Grouping of students ( a maximum of three in a group)
Allotment of projects and project guides
Project monitoring at regular intervals