Master of Computer Applications
Master of Computer Applications
PROGRAMME GUIDE
1
1
TABLE OF CONTENTS
INTRODUCTION 3
PROGRAMME OUTCOMES 3
SALIENT FEATURES 4
PROGRAMME CODE 4
MEDIUM OF INSTRUCTION/EXAMINATION 4
PROGRAMME STRUCTURE 5
2
INTRODCUTION
Step into a realm of practicality within MCA classes, where learning mirrors the real-world scenarios.
Embrace a diverse array of emerging specializations, ensuring your education resonates with the
dynamic landscape of technology.
PROGRAMME OUTCOMES
Program outcomes are narrower statements that describe what students are expected to know and
be able to do by the time of graduation. These relate to the skills, knowledge, and behaviors that
students acquire in their matriculation through the program
1. Analysis & design of complex problems: Ability to apply knowledge of computer science
concepts, principles & techniques to solve various computing problems.
2. Coding Skills: Apply and solve problems using computer programming and simulation.
3. Ethics: Apply ethical principles and commit to professional ethics and responsibilities for
societal benefits.
4. Communication: Communicate effectively problem findings, and to be able to assimilate,
write and present effective design documents to give and receive clear instructions.
5. Societal Impact: Acquire and apply advanced knowledge of concepts and participate in
sustainable development.
6. Individual and team work: Function effectively as an individual, and as a member or leader
in diverse teams, and in multidisciplinary settings.
7. Life-long learning: Recognize the need for, and have the preparation and ability to engage in
independent and life-long learning in the broadest context of upcoming information
technology changes.
PSOs are statements that describe what the graduates of a specific engineering program should be
able to do:
1. PSO1: Understand and comprehend advanced level of programming, data structures,
databases, networking, mobile computing, information security and data analysis.
2. PSO2: Demonstrate competence in using computer science concepts and computational tools
for simulation and digital transformation.
3. PSO3: Ability to effectively apply the information technology concepts to analyze, design
and develop cost effective solutions to the societal problems.
4. PSO4: Provide user friendly and need based mobile, web or cloud based solutions to the society.
5. PSO5: Utilize computational tools to simulate and transform domains with ML/AI techniques.
6. PSO6: Competence in applying computer science concepts to simulate immersive AR/VR experiences.
7. PSO7: Apply computational tools to simulate cyber threats and develop defense mechanisms.
3
SALIENT FEATURES
➢ Industrial Visits: Encourage students to have maximum industrial exposure through visits
for problem identification and emerging technologies
➢ Holistic Development: Participation in technical events, sports and cultural activities help in
the holistic development of students
➢ Projects: Project driven courses are designed to enhance technical and presentation skills
➢ Industry Immersion: Training, projects and guest lecturers collaborated with industries help
to learn from real life situations
➢ Software Skills: Curriculum is equipped with 21st century digital technologies for
game designing and web designing and Android/iPhone Application Development.
PROGRAMMECODE: 1624
DURATION OF THEPROGRAMME:
MEDIUM OF INSTRUCTION/EXAMINATION:
4
PROGRAMME STRUCTURE
MASTER OF COMPUTER APPLICATIONS
Core Courses Skill Enhancement
Discipline Specific Generic Electives (GE)
(CR I, CR II, CR III) Courses
Electives 4 x 4 Credits
Term CR I+II – (8+4) (SEC) Credits
(DSE)
12 x 4 Credits 4 x 4 Credits
4 x 4 Credits
CR III - 2x 4
Credits
Discipline Specific Core- I
Discipline Specific Core- II
Discipline Specific Core- III
I SEC- I 24
Discipline Specific Core- IV
Discipline Specific Core- V
5
PROGRAMME SCHEME
MASTER OF COMPUTER APPLICATIONS
COURSE CODE COURSE Cr. CA ETE ETE
TITLE (Theory) (Practical)
TERM 1
DECAP437 SOFTWARE ENGINEERING PRACTICES 4 30 70 0
DECAP444 OBJECT ORIENTED PROGRAMMING USING C++ 4 30 40 30
DECAP446 DATA WAREHOUSING AND DATA MINING 4 30 70 0
DECAP448 LINUX AND SHELL SCRIPTING 4 30 40 30
DECAP453 DATA COMMUNICATION AND NETWORKING 4 30 70 0
SEC-I SKILL ENHANCEMENT COURSE I 4 30 70 0
DECAP012 FUNDAMENTALS OF COMPUTER AND C PROGRAMMING S/U BRIDGE COURSE#
DEMTH006 ELEMENTARY MATHEMATICS S/U BRIDGE COURSE#
#Bridge courses are applicable only to candidates having no Computers or Mathematics background.
6
DISCIPLINE SPECIFIC ELECTIVES (DSE)
MACHINE LEARNING & AI
SR. COURSE ETE ETE
COURSE TITLE Cr. CA DSE TERM
NO. CODE (Theory) (Practical)
FUNDAMENTALS OF
1 DECAP515 4 30 40 30 DSE-I 3
MACHINELEARNING
2 DECAP516 NATURAL LANGUAGE PROCESSING 4 30 40 30 DSE-II 3
3 DECAP527 DEEP LEARNING 4 30 40 30 DSE-III 4
4 DECAP794 ADVANCE DATA VISUALIZATION 4 30 40 30 DSE-IV 4
DATA SCIENCE
SR. COURSE ETE ETE
COURSE TITLE Cr. CA DSE TERM
NO. CODE (Theory) (Practical)
1 DECAP790 PROBABILITY AND STATISTICS 4 30 40 30 DSE-I 3
2 DECAP792 DATA SCIENCE TOOL BOX 4 30 40 30 DSE-II 3
3 DECAP794 ADVANCE DATA VISUALIZATION 4 30 40 30 DSE-III 4
4 DECAP737 MACHINE LEARNING 4 30 40 30 DSE-IV 4
CYBER SECURITY
SR. COURSE ETE ETE(Pr.)
COURSE TITLE Cr. CA DSE TERM
NO. CODE (Th.)
1 DECAP660 NETWORK ADMINISTRATION 4 30 40 30 DSE 3
-I
2 DECAP796 CYBER FORENSIC 4 30 40 30 DSE 3
-II
SECURING NETWORKS AND
3 DECAP661 4 30 40 30 DSE- 4
ITINFRASTRUCTURE
III
VULNERABILITY ASSESSMENT
4 DECAP662 4 30 40 30 DSE- 4
ANDPENETRATION TESTING
IV
3 INTERNATIONAL
DEFIN548 FINANCIAL 4 30 70 0 FINANCE 3
MANAGEMENT
GENERIC ELECTIVE (GE) BASKET 3
SR. No. COURSE ETE ETE ELECTIVE
COURSE TITLE Cr. CA TERM
CODE (Theory) (Practical) AREA
DEMGN801 GENERAL 4
1 BUSINESS ANALYTICS 4 30 70 0 MANAGEMENT
2 DEMKT517 CUSTOMER
RELATIONSHIP 4 30 70 0 MARKETING 4
MANAGEMENT
3 DEFIN576 SECURITY ANALYSIS AND 4
PORTFOLIOMANAGEMENT 4 30 70 0 FINANCE
8
Note:
1. Students can adopt only one area from discipline specific elective basket that will be
applicable for the whole program.
2. Students can adopt only one area from generic elective basket that will be applicable
forthe whole program.
3. In case of Seminar on Summer Training, student may choose one Course from the GE
basket 1 which is not chosen as Generic Elective (GE) in lieu of Seminar on Summer
Training.
4. S and U grades are awarded only in case of courses with Zero credit: S for Satisfactory performance
and U for Unsatisfactory performance in a course.
5. For candidates having no Computers or Mathematics* background, Bridge course(s) will be
applicable in 1st Term as per following details:
• No Mathematics background: 01 Mathematics Bridge course DEMTH006 is
applicable
• No Computers background: 01 Computers Bridge course DECAP012 is applicable
• No Mathematics and No Computers background: 01 Mathematics course
DEMTH006 and 01 Computer course DECAP012 are applicable
9
SOFTWARE ENGINEERING
Course code DECAP437 Course Title
PRACTICES
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: apply theoretical foundation of software engineering in practical software development
CO2: analyze the need of software maintenance activities
CO3: discuss the software life cycle models
CO4: apply software engineering practices to create complex software designs
CO5: identify the importance of the software development process
READINGS:
1. FUNDAMENTALS OF SOFTWARE ENGINEERING by RAJIB MALL, PHI LEARNING
2. AN INTEGRATED APPROACH TO SOFTWARE ENGINEERING by PANKAJ JALOTE, NAROSA
PUBLISHING HOUSE
10
OBJECT-ORIENTED
Course code DECAP444 Course Title
PROGRAMMING USING C++
WEIGHTAGES
CA ETE(Th.) ETE(Pr.)
30 70 30
Course Outcomes:
CO1: understand the concepts of Object-oriented programming
CO2: distinguish between the procedure-oriented and object-oriented programming languages
CO3: apply the concept of file handling and exception handling mechanisms
CO4: develop applications using the concepts of Object-oriented programming
CO5: validate the code formulation by passing various test cases
11
LABORATORY WORK:
IMPLEMENTATION OF C++ PROGRAMMING CONCEPTS (CLASSES AND OBJECTS, CONSTRUCTOR AND
DESTRUCTORS, FUNCTION OVERLOADING AND OPERATOR OVERLOADING, INHERITANCE, WORKING
WITH FILES, TEMPLATES AND EXCEPTION HANDLING)
READINGS:
1. OBJECT ORIENTED PROGRAMMING WITH ANSI & TRUBO C++ by ASHOK N. KAMTHANE,
PERASON EDUCATION
2. OBJECT ORIENTED PROGRAMMING IN C++ by ROBERT LAFORE, GALGOTIA PUBLICATIONS
3. THE C++ PROGRAMMING LANGUAGE by BJARNE STROUSTRUP, PEARSON
12
Course code DECAP446 Course Title DATA WAREHOUSING AND DATA MINING
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: Understand the various concepts of data warehousing like metadata, data mart, summary
table, fact data and dimension data.
CO2: Sail along with the various approaches in data mining.
CO3: Familiarize with the various data ware housing and data mining tools.
CO4: Observe the various methods to extract knowledge using data mining techniques
CO5: Evaluate current trends in data mining such as web mining, spatial-temporal mining.
CO6: Apply different data mining methodologies with information systems.
CO7: Research of database systems and able to improve the decision-making process.
13
Clustering Algorithms and Cluster Analysis: Measures of similarity, K means
partitioning method, k-medoids method, CLARANS method, Agglomerative and divisive
Unit 10
clustering hierarchical method, BIRCH method,, Density based methods - Subspace
clustering, Graph- based clustering - MST clustering, Cluster evaluation, Outlier
detection and analysis
Classification: Introduction to classification, Introduction to Classification methods ,
Basic concepts of binary classification, Bayes theorem and Naive Bayes classifier,
Unit 11
Association based classification, Rule based classifiers, Nearest neighbor classifiers,
Decision Trees, Random Forest, Perceptrons, Multi-category classification, Model over
fitting, Cross validation
Prediction and Classification using WEKA Tool: Applying model for prediction,
Bayesian Classification on new imported data, Bayesian Classification on existed
Unit 12
dummy data set, Decision Tree classification on both new and dummy data sets,
Practice problems on classification methods, Applications of classification for web
mining
Clustering methods using WEKA Tool: Introduction to clustering, Introduction to
Unit 13 Clustering algorithms, Differentiate clustering and classification, K-means
clustering, Hierarchical clustering algorithm,
Applications of Data Warehousing and Data Mining: Case studies of Data
Warehousing in financial data analysis and retail industries, Case studies of Data
Unit 14
Warehousing in Indian Railway reservation system and other industrial use, Case
study on forecasting weather reports
READINGS:
1. DATA MINING: CONCEPTS AND TECHNIQUES by JAWEI HAN, MICHELINE KAMBER AND
JIAN PE, MORGAN KAUFMANN
2. DATA WAREHOUSING, DATA MINING AND OLAP by ALEX BERSON AND STEPHEN J. SMITH, MC
GRAW HILL
3. BUILDING THE DATA WAREHOUSE by INMON W. H, WILEY
14
Course code DECAP448 Course Title LINUX AND SHELL SCRIPTING
WEIGHTAGE
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: learn about Linux environment and basic Linux administration tasks.
CO2: demonstrate comprehensive introduction to shell scripting/programming in LINUX.
CO3: explain various basic Linux commands and C system programming and debugging techniques in
Linux environment.
CO4: analyze the usage of Linux utilities, organize directory structures, and develop useful shell scripts.
CO5: interpret and configure different Linux servers like samba, FTP, Apache and NFS
READINGS:
16
Course code DECAP453 Course Title DATA COMMUNICATION AND NETWORKING
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: recognize different networking devices and their functionalities
CO2: understand the importance of data communication
CO3: utilize the role of protocols in networking
CO4: analyze the services and features of the various layers of network
READINGS:
18
Fundamentals of Computer
Course code DECAP012 Course Title
and C Programming
Course Outcomes
CO1: Understand basic concepts and terminology of information technology.
CO2: understand the basic concepts of programming like data types, control structures, functions and arrays
CO3: perceive problem solving through C programming
CO4: build sequential steps and procedures to solve a given problem
CO5: demonstrate the use of pointers and dynamic memory allocation
CO6: implement the knowledge and insights to create solutions
Unit No. Contents
Computer Fundamentals: Characteristics & Generation of Computers, Block diagram of
Unit 1 Computer. Application of IT in various sectors. I/O Devices.
Memory: Types, Units of memory, RAM, ROM, Secondary storage devices – HDD, Flash
Drives and Optical Disks: DVD, SSD.
Unit 2 Operating Systems: operating system basics, Purpose of the operating system, types of
operating system, providing a user interface, Running Programs, Sharing Information,
Managing Hardware, Enhancing an OS with utility software.
Data Communications: Introduction to Data Communication: Definition and advantages,
Unit 3
Types of Networks, Network topologies, Transmission Media, Modems.
Data Base Management Systems: Introduction to Database Management System,
Unit 4
Components of DBMS, Database Vs. Tables, Data Models, Relational Model, Basics of RDBMS
and SQL.
Basics of C Language: Machine Language, Assembly Language, High Level Languages, C
Unit 5 Program Structure, Character Set, Identifiers and Keywords, Constants and Variables.
Unformatted and Formatted I/O: Functions- printf(), scanf(), getchar(), putchar(), gets(),
Unit 6
puts(), Expressions.
Data Types & Operators: Various data types - data range, size, Unary and Binary
Unit 7 operators, Arithmetic Operators, Relational Operators, Logical Operators, Conditional
Operators, Assignment Operator, Bitwise Operators.
Unit 8 Control Structure: Designing structured programs by using Top-Down design, Type
conversion and Type modifiers, if statements - simple if, if-else, multiple if, if-else ladder,
nested if, switch-case statement.
Looping Statements: While, do-while & for statements, break and continue statements,
Unit 9 goto statement.
Functions: Function Definition and Prototypes, Scope rules - Local and Global scope of
Unit 10 functions, Function arguments - passing arguments by value and passing arguments by
reference, Return Type of function, Recursion, Library Functions.
Arrays: Declaring arrays in C, Defining and Processing of 1-dimensional and 2-dimensional
Unit 11
arrays, Passing array as an argument to function, Multi-dimensional Arrays.
Array Applications - Sorting and Searching, Character Arrays.
Unit 12
Strings : Defining and Initializing strings, Reading and Writing strings, Processing of
Unit 13 strings, String Library Functions - strcat(), strcpy(), strcmp(), strlen(), strrev().
Storage Classes: Storage class specifiers, Scope of a variable, Auto, Static, Extern, Register,
Unit 14 Static variables and functions, Const Qualifier.
19
READINGS:
1. PRADEEP K. SINHA & PRITI SINHA COMPUTER FUNDAMENTALS, BPB PUBLICATIONS
2. C: THE COMPLETE REFERENCE by HERBERT SCHILDT, MC GRAW HILL
3. PROGRAMMING IN ANSI C by E. BALAGURUSWAMY, MC GRAW HILL
20
Course code DEMTH00 Course Title Elementary Mathematics
6
Course Outcome
CO1: describe basic concepts of set theory, relations and functions with the help of various
examples.
CO2: understand the basics of number system and use them to solve Quadratic equations and linear
inequalities.
CO3: analyze the arrangement and combinations of objects through permutations and
combinations and use it in binomial theorem.
CO4: determine the pattern in sequences and solve the infinite series.
CO5: explain the concept of matrices and determinants and solve the system of linear equations
with the help of matrices.
CO6: analyse and use the different kinds of techniques to find dispersion in a data and calculate the
probability of a random experiment.
Unit No. Contents
Sets 1: sets and their representations, the empty set, finite and infinite sets, equal sets,
Unit 1 subsets
Unit 2 Sets 2: universal sets, Venn Diagrams, Operations on sets, Compliment of a set
21
READINGS:
22
Course code DECAP615 Course Title PROGRAMMING IN JAVA
WEIGHTAGE
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: learn the structure and model of the Java programming language
CO2: understand the accessibility of fields and methods of an object through String and String
Builder classes
CO3: develop applications in Java programming language to solve problems
CO4: evaluate user requirements for software functionality and assess its implementation in java
CO5: implement Lambda functions.
CO6: demonstrate object serialization with file handling and exception handling to overcome run-
time errors
Laboratory Work:
Implementation of JAVA Programming Concepts (Classes and objects, constructor, function
overloading, inheritance, working with files, exception handling and multithreading, JDBC, network
programming)
READINGS:
1. JAVA: THE COMPLETE REFERENCE by HERBERT SCHILDT, MCGRAW HILL EDUCATION
2. INTRO TO JAVA PROGRAMMING (COMPREHENSIVE VERSION) by Y. DANIEL LIANG, PEARSON
PUBLICATION 23
3. PROGRAMMING WITH JAVA by E. BALAGURUSAMY, MC GRAW HILL PUBLICATION
Course code DECAP770 Course Title ADVANCED DATA STRUCTURES
WEIGHTAGE
CA ETE(Th.) ETE
30 40 30
Course Outcome:
CO1: perceive advanced data structures and perform operations on them
CO2: understand abstract data types and algorithmic complexity
CO3: apply suitable data structure for solving problems
CO4: implement hashing and collision resolution techniques
CO5: evaluate the performance of various algorithms
LABORATORY WORK:
Arrays vs linked lists: operations on arrays and linked lists.
Stacks: implementation of stacks, applications of stacks: quick sort, parenthesis checker,
arithmetic expression conversion and evaluation, tower of Hanoi problem, role of stack in
recursion,
Queues: implementation of queues, priority queue, applications of queues
Search trees: binary search trees: searching, insertion and deletion operations
Tree data structure 1: AVL Trees: balancing operations, b-trees: properties and operations,
Tree data structure 2: red-black trees. splay trees: properties and operations, 2-3 trees:
properties and operations
24
Heaps: introduction to heaps, min heap, max heap, operations on heap, applications of heap:
priority queue implementation
READINGS:
25
Course Code DECAP456 Course Title INTRODUCTION TO BIG DATA
WEIGHTAGE
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: analyze the need and importance of fundamental concepts and principles of Big Data
CO2: apply internal functioning of different modules of Big Data and Hadoop
CO3: evaluate the big data ecosystem and appreciate its key components
26
READINGS:
27
Course Code DECAP470 Course Title CLOUD COMPUTING
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: Apply the fundamental concepts in data centres to understand the trade-offs in power,
efficiency and cost.
CO2: Identify resource management fundamentals, i.e. resource abstraction, sharing and
sandboxing and outline their role in managing infrastructure in cloud computing.
CO3: Analyze various cloud programming models and apply them to solve problems on the
cloud.
29
MATHEMATICAL FOUNDATION FOR
Course code DEMTH403 Course Title
COMPUTER SCIENCE
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: recall formal logical arguments of propositional logic
CO2: perceive problem solving through the basics of combinatorics
CO3: compare the basic discrete structures and algorithms
CO4: apply the concepts of trees to find the shortest path
CO5: infer properties of graphs and be able to relate these to practical examples
CO6: formulate and prove theorems about trees, connectivity, coloring and planar graphs
READINGS:
30
Course code DECAP472 Course Title WEB TECHNOLOGIES
WEIGHTAGE
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: understand the website layout creation using HTML language.
CO2: apply the website planning, management and maintenance techniques
CO3: apply dynamic website creation using JavaScript and Query
CO4: illustrate logic implementation on a web page
CO5: understand how to manage versatile data on a web page
LABORATORY WORK:
1. Program to implement basic concepts of HTML.
2. Program to implement CSS3.
3. Program to implement the box model and positioning properties in CSS3.
4. Program to implement basics of bootstrap.
5. Program to implement the basics of JavaScript.
6. Program to implement Objects in JavaScript.
7. Program to implement Arrays in JavaScript.
8. Program to implement Functions in JavaScript.
31
9. Program to build web applications in JavaScript.
10 Program to implement the concept of Dynamic views in JavaScript.
.
READINGS:
1. HTML 5 Black Book, Covers CSS 3, JavaScript, XML, XHTML, AJAX, PHP and jQuery, 2nd DT
Editorial Services
2. HTML & CSS: The Complete Reference, by Thomas A. Powell, Mc Graw Hill
32
Course code DECAP776 Course Title PROGRAMMING IN PYTHON
WEIGHTAGE
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: understand the basic structure and features of Python programming
CO2: interpret object-oriented programming concepts such as encapsulation, inheritance and
polymorphism as implemented in Python
CO3: apply pandas and NumPy for data analysis
CO4: implement machine learning algorithms
CO5: analyze real-life situation specific problems and perceive solutions
CO6: build exploratory data analysis and visualizations
LABORATORY WORK:
Implementation of Python programming concepts (control statements, functions, strings, lists, sets,
tuples, dictionaries, OOP concepts, exception handling, NumPy arrays and functions, pandas, data
visualization, machine learning algorithms)
READINGS:
1. Programming and Problem Solving with Python by Ashok Kamthane, Amit Ashok kamthane,
McGraw Hill 2nd Edition
2. Hands-On Data Analysis with NumPy and pandas by Curtis Mille, Kindle Edition
3. Python for Data Analysis by Wes McKinney, O'Reilly Media
4. Machine Learning for Absolute Beginners by Oliver Theobald, Kindle Edition
33
FUNDAMENTALS OF MACHINE
Course code DECAP515 Course Title
LEARNING
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: define the concepts of linear algebra and multivariate calculus
CO2: demonstrate the usage of various python libraries for data handling and visualization
CO3: explain the concepts of dimensionality reduction using PCA.
CO4: make use of fuzzy logic to handle uncertainty in data
CO5: examine various swarm optimization techniques to solve optimization problems
34
Unit 14 Making Comparisons and Basic Calculation: Word Vectors and Their Interpretation,
Relationships Between Word Vectors, Inner Products Between Word Vectors, Intuition
into Meaning of Inner Products of Word Vectors, Introduction of Attention Mechanism,
Queries, Keys, and Values of Attention Network, Self-Attention and Positional
Encodings, Attention-Based Sequence Encoder, Coupling the Sequence Encoder and
Decoder, Cross Attention in the Sequence-to-Sequence Model, Multi-Head Attention,
The Complete Transformer Network
Readings:
35
Course code DECAP516 Course Title NATURAL LANGUAGE PROCESSING
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: Define the perceptions of Logistic Regression, Classification and Vector Spaces, Machine
Translation, Probabilistic Models, Sequence Models, Attention Models in Natural Language
Processing.
CO2: Understand the concepts of Sentiment Analysis, Vector Space Models, Hidden Markov Models,
Language Models, Recurrent Neural Networks, and Siamese Networks used for Natural
Language understanding and generation.
CO3: Apply Machine Learning algorithms, Semantic analysis, and Syntactic analysis to Natural
Language Processing leads to design Real-time NLP applications, NLP tools and systems.
CO4: analyze the notions of Autocorrect, Autocomplete, Word Embeddings with Neural Networks and
Syntax, Semantics, and Pragmatics of a Statement written in a Natural Language.
CO5: evaluate the sys tems using appropriate Descriptions, Visualizations, and Statistics to
communicate the problems of the English language for Natural Language Processing through
Semantic and Syntactic analysis.
CO6: develop NLP tools to Translate Words, Translate Languages, Text Generation, Summarize Text,
Word embedding, Build Chatbots, and question answering.
36
List of Practical/ Experiments
• Build a Binary Classifier for Tweets using a Logistic Regression.
• Build a Naive Bayes Tweet Classifier.
• Create Word Vectors that Capture Dependencies between Words, then Visualize their relationships
in Two Dimensions using PCA.
• Transform Word Vectors and Assign them to Subsets using Locality Sensitive Hashing.
• Build your own Spellchecker to Correct Misspelled Words.
• Create Part-of-Speech Tags for a Wall Street Journal Text corpus using Markov models.
• Build your own Autocomplete Language model using a Text corpus from Twitter using N-gram
Language models.
• Build your own Continuous Bag-of-Words model to Create Word Embeddings from Shakespeare
text.
• Build a Sophisticated Tweet Classifier that places Tweets into Positive or Negative Sentiment
categories, using a Deep Neural Network.
• Build your own Next-Word Generator using a simple RNN on Shakespeare Text data.
• Build your own Named Entity Recognition system using an LSTM and Data from Kaggle.
• Build your own Siamese Network that Identifies Question Duplicates in a Dataset from Quora.
• Build a Neural Machine Translation model with Attention that Translates English Sentences into
German.
• Create a Tool that Generates Text Summaries.
Readings:
1. NATURAL LANGUAGE PROCESSING by ELA KUMAR, DREAMTECH PRESS
2. SPEECH AND LANGUAGE PROCESSING: AN INTRODUCTION TO NATURAL LANGUAGE
PROCESSING, COMPUTATIONAL LINGUISTICS AND SPEECH RECOGNITION by DANIEL
JURAFSKY, JAMES H. MARTIN, PEARSON
37
Course code DECAP527 Course Title DEEP LEARNING
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: define TensorFlow and use it for building various deep learning algorithms
CO2: illustrate the use of Keras to assess different deep learning models
CO3: apply different architectures of deep convolutional neural networks for image classification
CO4: analyze the need of autoencoders and prioritize appropriate hyperparameters for optimization
CO5: explain recurrent neural networks for modeling sequential data
CO6: develop artificial neural networks using TensorFlow and Keras to solve real-world problems
38
using hyper parameter tuning.
• WAP to perform transfer learning and fine tuning.
• WAP to perform data augmentation.
• WAP to perform image denoising using autoencoders.
• WAP for anomaly detection using autoencoders.
• WAP to perform text classification using RNN.
• WAP to implement Generative Adversarial Networks (GANS).
Readings:
1. DEEP LEARNING by AMIT KUMAR DAS, Pearson Education India
2. ADVANCED DEEP LEARNING WITH TENSORFLOW 2 AND KERAS - SECOND EDITION by
ROWEL ATIENZA, PACKT PUBLISHING
39
Course Code DECAP794 Course Title ADVANCE DATA VISUALISATION
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: discuss the terminology used in Tableau Prep.
CO2: identify how Tableau Prep approaches data sampling.
CO3: construct and understand data prep flows that address common scenarios encountered in data
preparation, as applied to common data use cases.
CO4: review the quality of the data and perform exploratory analysis.
CO5: manage and Connect Data Source.
40
Shelf, Add Size, Shape, Labels
Publishing work: Sharing and collaborating dashboards, Story Points and how to
Unit-14 create them, Designing effective slide presentations to showcase data story,
Publish online business dashboards with Tableau, Exporting Pdfs, Sharing
Dashboard Securely
READINGS:
41
Course Code DECAP790 Course Title PROBABILITY AND STATISTICS
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: experiment to carry out simple data investigations for categorical variables. They interpret and
compare data displays. Students conduct chance experiments, list possible outcomes and
recognize variations in results.
CO2: measure a random variable that describe randomness or an uncertainty in certain realistic
situation
CO3: employ the different types of data and choose an appropriate way to display them.
CO4: identify and compare techniques for collecting data from primary and secondary sources, and
identify questions and issues involving different data types
42
and SPSS.
READINGS:
43
Course Code DECAP792 Course Title DATA SCIENCE TOOL BOX
WEIGHTAGE
CA ETE(Th.) ETE
(Pr.)
30 40 30
Course Outcomes:
CO1: Understand the concept and need for data science.
CO2: Discuss the various phases in the data analytics lifecycle.
CO3: Analyze the fundamental areas of study in data science
CO4: Understand the concept of data preprocessing.
CO5: Understand the importance of data visualization.
CO6: Learn the various data visualization software and libraries.
CO7: Understand different types of machine learning techniques
CO8: Use Python for developing machine learning algorithms
CO9: Use various data science tools for developing algorithms
44
• Build your own Autocomplete Language model using a Text corpus from Twitter using N-gram
Language models.
• Build your own Continuous Bag-of-Words model to Create Word Embeddings from Shakespeare
text.
• Build a Sophisticated Tweet Classifier that places Tweets into Positive or Negative Sentiment
categories, using a Deep Neural Network.
• Build your own Next-Word Generator using a simple RNN on Shakespeare Text data.
• Build your own Named Entity Recognition system using an LSTM and Data from Kaggle.
• Build your own Siamese Network that Identifies Question Duplicates in a Dataset from Quora.
• Build a Neural Machine Translation model with Attention that Translates English Sentences into
German.
• Create a Tool that Generates Text Summaries.
Readings:
45
Course Code DECAP794 Course Title ADVANCE DATA VISUALISATION
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: discuss the terminology used in Tableau Prep.
CO2: identify how Tableau Prep approaches data sampling.
CO3: construct and understand data prep flows that address common scenarios encountered in data
preparation, as applied to common data use cases.
CO4: review the quality of the data and perform exploratory analysis.
CO5: manage and Connect Data Source.
READINGS:
47
Course Code DECAP737 Course Title MACHINE LEARNING
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: apply python libraries for data analysis and machine learning model development
CO2: evaluate important features from a given dataset
CO3: apply machine learning models for real world problems
CO4: evaluate the performances of different machine learning models
READINGS:
48
Course code DECAP660 Course Title NETWORK ADMINISTRATION
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: describe the basic operations, addressing mechanisms and protocols used in the OSI and TCP
models.
CO2: examine the IP addressing techniques and understanding about IOS to configure and setup
networking devices.
CO3: articulate the various routing protocols and configuration process of the switches and VLANs
CO4: analyze a network for various types of application layer services and network address
translation process during internetwork communication.
49
• editing and help features
Administrative configurations
• hostname
• banners
• setting Passwords
• encrypting Your Passwords
• Telnet/SSH
• descriptions
Router and switch interfaces
• bringing up an interface
• viewing and saving the configuration
• deleting the configuration and reloading the device
• verifying your configuration
• backing up and restoring the configuration
Managing internetwork
• configuring DHCP
• network time protocol (NTP)
• cisco discovery protocol (CDP)
• resolving hostname
• checking network connectivity and troubleshooting
IP Routing
• static routing
• dynamic routing
• configuring routing information protocol (RIP)
• configuring routing information protocol version 2 (RIPv2)
• configuring enhanced interior gateway protocol (EIGRP)
• configuring open shortest path first (OSPF)
Layer-2 switch configuration
• administrative functions
• configuring the IP address and subnet mask
• setting the IP default gateway
• setting port security
• testing and verifying the network.
Configuring VLANs
• assigning switch ports to VLANs
• configuring trunk ports
• configuring inter-VLAN routing
Configuring and verifying access control lists
• wildcard masking
• standard access control list
• controlling VTY (TELNET/SSH) access
• extended access control list
• named access control list
• monitoring access control lists
Network address translation (NAT) configuration.
• static network address translation
• dynamic network address translation
• port address translation
• verification of NAT
• testing and troubleshooting NAT
Readings:
50
Course code DECAP796 Course Title CYBER FORENSIC
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: understand the concept of forensic science and cyber forensics
CO2: apply various cyber forensics tools to investigate the digital footprints for evidence
CO3: outline the investigation report based on the digital traces and their legal perspective
CO4: analyze antiforensics techniques and conclude the digital evidence used to commit cyber offenses
51
Creating disk imaging
• magnetic disk imaging
• USB disk imaging
Preserving integrity of forensic evidence
• error handling
• logging
• splitting and verification
• hashing (MD5, SHA1, SHA256, SHA384, and SHA512)
Recovering deleted files
• recover deleted files from disk drives
• generating report using FTK tool
• extract exchangeable image file format (EXIF) data from Image Files using Exifreader Software
Disk Imaging and Cloning
• magnetic disk imaging
• USB disk imaging using Guymager and FTK imager
• forensic image of the hard drive using EnCase forensics
• restoring the evidence image using EnCase forensics
Antiforensics
• deleting evidence
• encrypting files using antiforensics tools
• steganography for hiding data
• file infection using malware
• hiding and extract any text file behind an image file/ audio file using command prompt
Investigating Network Traffic and Ram Data Acquisition
• live packet capturing and packet analysis
• tracking emails and investigating email crimes
• collect email evidence in victim's PC
• email forensics
• comparison of two files for forensics investigation by comparing IT software
• live forensics case investigation using autopsy
Readings:
1. COMPUTER FORENSICS AND CYBER CRIME: AN INTRODUCTION by MARJIE T. BRITZ,
Pearson Education India
2. REAL DIGITAL FORENSICS: COMPUTER SECURITY AND INCIDENT RESPONSE by KEITH J.
JONES, ADDISON-WESLEY
52
SECURING NETWORK AND IT
Course code DECAP661 Course Title
INFRASTRUCTURE
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
40 30
Course Outcomes:
CO1: define the need of system security concepts, issues in computer security and user authentication
mechanisms.
CO2: explain the need and issues of software or application level security.
CO3: plan the working of cryptographic algorithms to secure transmission.
CO4: analyze the vulnerabilities of network security.
CO5: evaluate the countermeasures for keeping the software and operating systems secure.
53
a Security Plan, Business Continuity Planning: Assess Business Impact, Develop
Strategy, Develop the Plan
Unit 14 Handling Incidents: Incident Response Plans, Incident Response Teams, Risk Analysis,
The Nature of Risk, Steps of a Risk Analysis, Arguments for and Against Risk Analysis.
Dealing with Disaster: Natural Disasters, Power Loss, Human Vandals, Interception of
Sensitive Information, Contingency Planning, Physical Security
54
VULNERABILITY ASSESSMENT
Course Code DECAP662 Course Title
AND PENERATION TESTING
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: understand the basic concept, fundamentals and practice of penetration testing
CO2: apply the working of hacking and cracking techniques, know vulnerabilities in existing software
CO3: analyze legal and illegal techniques used by hackers and their counter measures
CO4: evaluate different and specific types of assaults and spoofing techniques
Unit No. Content
Introduction to Vulnerability: computer security, Types of threats, Types of attack,
Vulnerabilities, Major mail vulnerability, Server application vulnerabilities, Browser
Unit-1 based vulnerabilities, Web application vulnerabilities, Web server vulnerabilities,
Windows vulnerabilities.
Introduction to Scanning: Tools, Evolution of Scanners, How Scanners Work, Types of
Scanning, TCP Connect Scanning, Half-Open Scanning, UDP Scanning, IP Protocol
Unit-2 Scanning, Ping Scanning, Stealth Scanning. Review of Scanner Technology, Discovery,
Reconnaissance, Vulnerability Identification, Exploitation.
Vulnerability Assessment: Incomplete mediation vulnerability, Race condition
vulnerability, Time to-check or time-to-use vulnerability, Undocumented access point
Unit-3 vulnerability, Countermeasure, Malicious code attack, Malware, Voluntary introduction
vulnerability, Unlimited privilege vulnerability countermeasure using detection tools.
Vulnerability and Countermeasure: Key-logging attack, Data access threat, Data and
reputation harm, Physical access vulnerability, Misplaced trust vulnerability, Insider’s
Unit-4
vulnerability, Weak authentication vulnerabilities, Countermeasure
Sniffers: Introduction to Sniffer, Sniffer Types: Bundled Sniffers, Commercial sniffers,
Free Sniffers; Sniffer Operations: sniffer components, MAC addresses, Data transfer
Unit-5 over a network, Role of sniffers over a network Sniffer Programs: Wireshark
(Ethernet)
Spoofing and Session Hijacking: The process of IP spoofing attack, Types of spoofing,
Unit-6 Spoofing tools, Prevention and mitigation, TCP session hijacking, Session hijacking
tools, UDP hijacking, Prevention of session hijacking
TCP/IP Vulnerabilities: Introduction to TCP/IP Vulnerabilities: Data Encapsulation,
Unit-7 IP Spoofing, ICMP Attacks, TCP SYN Attacks, RIP Attacks.
Securing TCP/IP: IP (Internet Protocol), TCP, Connection Setup and Release, TCP/IP
Timers; Vulnerabilities in TCP/IP: IP Spoofing, Source Routing, Connection Hijacking,
Unit-8 ICMP Attacks, TCP SYN Attacks, RIP Attacks; Securing TCP/IP: IP Security
Architecture (IPSec)
Introduction to Penetration Testing: Impact of unethical hacking, Hacker
communities, Introduction to reconnaissance, social engineering, Dumpster diving,
Unit-9 Internet foot-printing, Introduction to scanning, Types of scanning, Sniffer types,
Sniffer operation, Sniffer program, Sniffer detection, Protecting against sniffer.
DNS Test, Network Latency Tests, Ping Test, Source-Route Method, Decoy Method,
Commands, Time Domain Reflectometer (TDR) Method, Protecting Against a Sniffer:
Unit-10 Secure Sockets Layer (SSL), Pretty Good Privacy (PGP) and Secure/Multipurpose
Internet Mail Extensions (S/MIME), Secure Shell (SSH), More Protection.
Encryption and Password Cracking: Introduction to Encryption and Password
Cracking, Cryptography; Symmetric and Asymmetric Key Encryption: Symmetric Key
Unit-11 Encryption, Asymmetric Key Algorithms, Cryptanalysis. Descriptions of Popular
Ciphers: Symmetric Key Ciphers, Asymmetric Key Ciphers, Cryptographic Hash
Functions.
Attacks on Passwords: Dictionary Attacks, Hybridization, Brute-Force Attacks,
Unit-12
Observation, Keyloggers, Social Engineering, Sniffing Methods, Password File Stealing.
Password Crackers: Aircrack, Cain & Abel, John the Ripper, THC Hydra, L0phtCrack
Unit-13
and Lc6
DOS Attacks: Attack on passwords, Password crackers Denial of Service Attack: Causes
Unit-14 of DoS attack, Types of DoS attacks, Known DoS and DDoS attack.
55
List of Practicals / Experiments:
Vulnerability Assessment:
•Vulnerabilities
•Major mail vulnerability
•Server application vulnerabilities
•Browser based vulnerabilities
•Web application vulnerabilities
•Web server vulnerabilities
•Windows vulnerabilities
Spoofing:
•IP spoofing attack,
•Spoofing tools
Sniffing and Scaning:
•Sniffing the packet through wireshark
•Scanning through nmap/zenmap
•Port scanning
•Host scanning
•Scanning target to attack
Introduction to Penetration Testing:
•Internet foot-printing
•Sniffer operation
•Sniffer program
•Sniffer detection
•Protecting against sniffer
Encryption and Password Cracking:
•Symmetric and asymmetric key encryption
•Descriptions of popular ciphers
•Attack on passwords
•Password crackers
Denial of Service Attack:
•To demonstrate the causes of DoS attack
•To demonstrate different types of DoS attacks
Readings:
1. COMPUTER SECURITY AND PENETRATION TESTING by ALFRED BASTA, NADINE BASTA AND
MARY BRROWN, CENGAGE LEARNING
2. ANALYZING COMPUTER SECURITY by CHARLES P. PFLEEGER, SHARI LAWRENCE PFLEEGER,
Pearson Education India
56
Course code DECAP510 Course Title FRONT END WEB DEVELOPER
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: apply basic HTML elements, CSS properties and Bootstrap to create visually appealing web
pages.
CO2: use JavaScript variables, functions, and events to enhance user interactivity on web pages.
CO3: develop interactive web forms and validate user input to enhance form handling.
CO4: manipulate HTML elements, handle events, and create dynamic web content using JavaScript and
DOM.
CO5: employ jQuery for efficient element manipulation and work with JSON objects for seamless data
exchange.
CO6: develop dynamic web applications using Angular, and HTTP requests with forms, components,
and directives.
List of Practicals
Design web page using table and list concept in HTML.
Design web page using images, links and frames in HTML.
Design forms and perform various types of validations in HTML.
Design attractive web page using CSS and JavaScript.
Implement the concept of event handlers in JavaScript using DOM object property.
Implement event bubbling in JavaScript.
Make Image gallery with thumbnails in JavaScript.
Design web page using jQuery Selectors and elements.
Use JSON objects, arrays and string concept in your web pages.
Design interactive website using Angular modules, directives concepts.
Design interactive website using Angular filters and events concepts.
Design customizable website using Bootstrap Grid System and Typography.
57
Implement Bootstrap list, table, buttons and dropdowns.
Implement HTTP requests and dependency injection in Angular
Readings:
58
WEB APP DEVELOPMENT WITH
Course code DECAP511 Course Title
REACTJS
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: understand advanced JavaScript concepts
CO2: develop JSX components and use props in React app
CO3: compose and manipulate states and should develop an understanding of events & Hooks
CO4: use forms with state and validating the form for errors and display errors
CO5: make a react app by using HTTP methods and routing the pages
CO6: validate or debug the react app and deploy app onto the server
List of Practicals
Demonstrate let, var and const in JavaScript with an example.
Demonstrate classes, arrow Functions, map() in JavaScript.
Demonstrate Destructuring, Spread Operator, Modules.
Demonstrate the difference between JSX and React.createElement() method in ReactJS.
Implement class components in ReactJS.
Implement function components in ReactJS.
Demonstrate styling in ReactJS – inline, stylesheets, CSS modules, Bootstrap.
Demonstrate hooks in ReactJS.
Implement event handling in ReactJS
59
Readings:
60
Course code DECAP513 Course Title ADVANCED WEB DEVELOPMENT
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: Describe server-side JavaScript in web application development
CO2: Analyze the web application development using HTTP, FS and Buffer modules
CO3: Assess the node express, JSON, Socket.IO to allow high scalability with asynchronous code
CO4: Demonstrate the use of CRUD application using Backend database in web application
development
CO5: Use MongoDB database with Node.js
CO6: Construct rich interactive environments for the Web-based applications
List of Practicals
Create JavaScript Objects and functions
Working with the arrays
Assessing file system from Node.js
Implementing HTTP Services in Node.JS
Use Jason API website development
Implementing Socket Services in Node.js
Create a basic website using node.js
Building the MongoDB Environment and Administering Databases
61
Readings:
62
WEB DEVELOPMENT IN PYTHON
Course code DECAP514 Course Title
USING DJANGO
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: understand Python/Django installation, editor setup, project creation, grasp Django commands,
and excel in app structuring
CO2: experiment views, map URLs for content display, handle HTTP methods, and manage errors for
enhanced functionality
CO3: apply Django templates for creation, variable handling, loops, conditions, inheritance, debugging,
and app testing
CO4: apply Django forms for handling GET, POST, HTTP, implementing CSRF security, and validating
data
CO5: apply Django for modeling, migrations, ORM, Admin, user management, and database setup
CO6: apply techniques for cookies, sessions, user management, login/logout URLs, and view-based login
within the system.
Unit 3 Views and URLs Basics: Creating views and mapping to URLs, Creating views
and view logic, HTTP requests Creating Requests and Responses
Unit 4 Advanced Views and URLs: Understanding URLs, Mapping URLs with Params, Regular
expressions in URLs, Error Handling
Unit 5 Templates in Django: Introduction to Templates in Django, Creating Templates
Working with Django Template Language (DTL), Using template tags
Unit 6 Dynamic Templates and Inheritance: Django variables, for loop and if-else statements,
Dynamic Templates in Django, Working with Template inheritance
Unit 7 Debugging and Testing: Debugging Django applications, Testing in Django
Unit 8 Forms Handling Basics: Introduction to Forms, Using GET, POST and HTTP
Unit 9 Building Forms in Django: Building forms using Django, Introduction to Cross-Site
Request Forgery (CSRF), CSRF support in Django
Unit 10 Advanced Forms Handling: Implementing POST redirect in Django, Data
validation with Django forms
Unit 11 Models and Migrations Basics: Creating models, Working with Migrations
Unit 12 Advanced Models and Migrations: Using the Django Shell to Explore Models (Insert,
Update and Delete), Using Object-Relational Mapping (ORM), Models using Foreign
Keys
Unit 13 Django Admin and Database Configuration: Django Admin, Adding groups and users,
Users and Permissions, Database configuration – Configuring and setting up database
connection
Unit 14 Authentication and Sessions: Creating Cookies and sessions in Django, Creating and
Managing Users in Django, Login and Logout URLs in Django, Using Django Login in
Views
List of Practicals
Create JavaScript Objects and functions
Working with the arrays
Assessing file system from Node.js
Implementing HTTP Services in Node.JS
Use Jason API website development
Implementing Socket Services in Node.js
Create a basic website using node.js
63
Building the MongoDB Environment and Administering Databases
Readings:
64
GAME DEVELOPMENT USING UNITY
Course code DECAP473 Course Title
ENGINE
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: analyze game requirements and mechanics to create effective design documents and
demonstrate comprehension
CO2: demonstrate proficiency in using Unity game engines to develop interactive game environments
CO3: apply scripting fundamentals in C# to implement game logic and decision-making
CO4: exhibit a comprehensive skill set in game development, enabling them to create immersive and
interactive game experiences across platforms
65
LABORATORY WORK:
1. Students will create a comprehensive design document for a game concept, outlining game
requirements, mechanics, and storytelling elements.
2. Students will familiarize themselves with Unity by creating a simple game project, exploring IDE
basics, and understanding key Unity concepts such as scenes, game objects, and components.
3. Students will practice writing scripts in C# to implement basic game logic, decision-making, and
variable management, and display relevant data in a Unity project.
4. Students will implement simple object movements, rotations, and basic physics interactions using
Unity's Rigidbody components and scripting.
5. Students will learn to organize game objects effectively using parent-child relationships, prefabs,
and object hierarchy in Unity.
6. Students will integrate sound files, and script sounds, and implement simple animations in Unity,
enhancing the audio-visual aspects of their game projects.
7. Students will implement basic AI behavior in games using flowcharts, algorithms, and scripting
techniques in Unity.
8. Students will design and implement user interfaces using Unity's UI controls, buttons, and other UI
elements, focusing on usability and aesthetics.
9. Students will optimize scripts, handle events, and organize code effectively to enhance the
interactivity and performance of their game projects.
10. Students will learn techniques for profiling and optimizing game performance, as well as
managing memory usage effectively to ensure smooth gameplay experiences across different
platforms.
READINGS:
1. MASTERING GAME DESIGN WITH UNITY 2021: IMMERSIVE WORKFLOWS, VISUAL SCRIPTING,
PHYSICS ENGINE, GAMEOBJECTS, PLAYER PROGRESSION, by SCOTT TYKOSKI, BPB PUBLICATION
2. HANDS-ON UNITY 2022 GAME DEVELOPMENT - THIRD EDITION, by NICOLAS ALEJANDRO
BORROMEO, PACKT PUBLICATION
66
Course code DECAP824 Course Title UNREAL PROGRAMMING USING C++
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: conceptualize, plan, and execute game development projects
CO2: exhibit proficiency in game design principles, documentation, and implementation
CO3: demonstrate mastery of Unreal Engine and C++ programming, enabling them to develop advanced
game systems and optimize game performance
CO4: competence in designing, developing, and deploying multiplayer game modes to create immersive
multiplayer experiences
67
Networked Games
Unit 14 Multiplayer Game Modes and Deployment: Designing and Developing Multiplayer
Game Modes and Mechanics, Balancing Multiplayer Gameplay for Competitive and
Cooperative Experiences, Deploying Multiplayer Games to Online Platforms and Servers,
Managing Game Servers and Player Communities
LABORATORY WORK:
1. Students will engage in brainstorming sessions to generate game ideas and create concept
documents for selected game concepts.
2. Students will develop a detailed project plan and timeline for game development, incorporating
milestones and deliverables.
3. Students will learn to create basic game systems using Blueprints Visual Scripting in Unreal
Engine.
4. Students will implement advanced gameplay mechanics such as physics-based interactions,
dynamic environments, and combat systems in Unreal Engine.
5. Students will optimize game performance by profiling code, managing resources, and
implementing performance scaling techniques.
6. Students will design and develop multiplayer game modes, focusing on competitive and
cooperative gameplay experiences.
7. Students will test and debug multiplayer networked games, ensuring smooth gameplay
experiences and robust server-client communication.
8. Students will deploy multiplayer games to online platforms and servers, managing game servers
and player communities.
9. Students will integrate different input devices and design responsive and customizable control
schemes for enhanced player experience.
10. Students will design AI behaviors for NPCs, implement pathfinding algorithms, and create dynamic
AI reactions and interactions.
READINGS:
1. Game Development with Unreal Engine 5: Learn the Basics of Game Development in Unreal
Engine 5, by Lynn Mitchell, Cliff Sharif, BPB Publication
2. Beginning Unreal Game Development: Foundation for Simple to Complex Games Using Unreal
Engine 4, by David Nixon, Apress Publication
68
GAME AI & REINFORCEMENT
Course code DECAP825 Course Title
LEARNING
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: Apply reinforcement learning concepts to design intelligent agents in Unity.
CO2: Evaluate performance of RL algorithms (DQN, Policy Gradients) in Unity environments
CO3: Observe and analyze agent behavior for debugging and optimization in Unity.
CO4: Analyze and implement collaborative/competitive multi-agent RL scenarios.
CO5: Analyze and customize RL agents with hyperparameter tuning and behavior design.
LABORATORY WORK:
1. Students will learn to set up the Unity ML-Agents Toolkit and create their first RL environment.
2. Students will implement the DQN algorithm to train an RL agent to navigate a Unity environment.
3. Students will explore policy gradient methods and implement algorithms such as REINFORCE in
Unity.
4. Students will learn debugging techniques specific to RL agents in Unity and troubleshoot common
issues.
5. Students will optimize the performance of RL agents in Unity by implementing techniques such as
reward shaping and action space reduction.
6. Students will implement collaborative RL scenarios in Unity, where multiple agents work together
to achieve a common goal.
7. Students will design and implement competitive RL scenarios in Unity, where agents compete
against each other to achieve individual goals.
8. Students will explore transfer learning techniques for RL in Unity and apply them to train RL agents
more efficiently.
9. Students will learn about hyperparameters in RL and experiment with different tuning techniques
to improve agent performance.
10. Students will explore methods for real-time training and inference of RL agents in Unity, allowing
69
agents to adapt and learn in real-world scenarios.
READINGS:
1. Learn Unity ML - Agents - Fundamentals of Unity Machine Learning, by Micheal Lanham, Packt
Publication
2. Hands-On Reinforcement Learning for Games, by Micheal Lanham, Packt Publication
70
VIRTUAL REALITY AND AUGMENTED
Course Code DECAP826 Course Title
REALITY IN GAME DEVELOPMENT
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
30 40 30
Course Outcomes:
CO1: demonstrate an understanding of the principles and concepts of Augmented Reality (AR) and
Virtual Reality (VR) development
CO2: design and develop immersive AR experiences using AR Foundation in Unity, including
implementing AR interactions, tracking, and mobile applications
CO3: create immersive VR experiences in Unity for various VR platforms, including Oculus and HTC
Vive, by implementing VR interactions, navigation, and optimization techniques
CO4: equipped with advanced skills in AR/VR development, including UI design, 3D modeling,
environmental design, advanced interactions, audio design, and optimization for performance
and deployment
Unity Basics for AR/VR: Getting Started with Unity Interface and Project Setup,
Understanding GameObjects, Components, and Transformations, Introduction to Unity
Unit-2
Scripting with C#, Implementing Basic Interactions and User Interfaces in Unity
Environmental Design for AR/VR: Understanding Scene Design Principles for AR/VR,
Creating Immersive Environments with Unity Terrain, Implementing Lighting and
Unit-7
Shading Techniques, Adding Visual Effects and Atmosphere to VR Environments
71
Unit-13 Future Trends and Emerging Technologies in AR/VR: Exploring the Future of AR/VR
Technology, Trends in AR/VR Hardware and Software Development, Introduction to AR
Glasses, Mixed Reality (MR), and Spatial Computing
Unit-14 Final Project and Showcase: Capstone Project: Developing an AR/VR Application from
Concept to Deployment, Presenting and Showcasing AR/VR Projects
LABORATORY WORK:
1. Students will set up Unity for AR/VR development, including installing necessary plugins and
configuring project settings.
2. Students will implement basic AR interactions such as object placement, rotation, and scaling using
AR Foundation in Unity.
3. Students will develop VR experiences in Unity for Oculus Rift or HTC Vive, including implementing
teleportation, grabbing objects, and navigating VR environments.
4. Students will design and implement immersive UI elements for AR/VR applications in Unity,
including menus, HUDs, and feedback systems.
5. Students will create 3D models and textures using Blender or Maya and integrate them into Unity for
use in AR/VR environments.
6. Students will design immersive environments for AR/VR applications using Unity Terrain, lighting,
shading techniques, and visual effects.
7. Students will implement advanced interactions in AR/VR environments, such as physics-based
interactions, object manipulation, and teleportation systems.
8. Students will implement spatial audio in Unity for AR/VR applications, including creating ambience,
sound effects, and integrating music and voiceovers.
9. Students will develop multiuser AR experiences using AR Cloud platforms, implementing
collaborative AR development techniques and designing shared AR spaces.
10. Students will optimize rendering performance for AR/VR applications in Unity, including
implementing LOD systems, memory management, and testing for performance profiling.
READINGS:
1. Unity Virtual Reality Projects: Explore the World of Virtual Reality by Building Immersive and Fun Vr
Projects Using Unity 3d, by Jonathan Linowes, Packt Publication
2. Unity 2018 Augmented Reality Projects: Build four immersive and fun AR applications using ARKit,
ARCore, and Vuforia, by Jesse Glover, Packt Publication
72
Course Code DEPEA515 Course Title ANALYTICAL SKILLS-I
WEIGHTAGES
CA ETE(Th.)
30 70
READINGS:
73
Course Code DEPEA516 Course Title ANALYTICAL SKILLS-II
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: apply logical reasoning to understand, interpret and handle different situations.
CO2: solve efficiently the company specific logical reasoning tests.
CO3: apply logical reasoning to prioritize and manage time.
CO4: decide to build the logic
CO5: examine the problem and handle it
CO6: apply the logics
74
READINGS:
75
Course Code DECAP538 Course Title ALGORITHM DESIGN AND ANALYSIS
WEIGHTAGES
CA ETE(Th.) ETE (Pr.)
Course Outcomes: 30 40 30
CO1: perceive the need of different algorithm design techniques
CO2: design and implement algorithms using divide and conquer, greedy approach, dynamic
programming and backtracking
CO3: apply specific algorithms for solving computational problems like pattern matching, minimum
spanning tree and shortest-path problems
CO4: analyze the asymptotic performance of algorithms
LABORATORY WORK:
Implementation of algorithm design and analysis concepts (Divide and conquer, greedy method,
dynamic programming, back tracking, branch and bound, pattern matching, lower bound theory,
intractable problems)
READINGS:
1. Fundamentals of computer algorithms by E. Horowitz and S. Sahani, Galgotia publications
2. Design and analysis of algorithms by Himanshu B. Dave, Pearson
3. Design & analysis of algorithms by R.C.T. Lee, Mcgraw Hill Education
4. Design and analysis of computer algorithms by John E. Hopcroft, Addison-Wesley
76
Course Code DECAP951 Course Title SOFTWARE PROJECT MANAGEMENT
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: apply python libraries for data analysis and machine learning model development
CO2: evaluate important features from a given dataset
CO3: apply machine learning models for real world problems
CO4: evaluate the performances of different machine learning models
77
LABORATORY WORK:
READINGS:
1. SOFTWARE PROJECT MANAGEMENT by BOB HUGHES, MIKE COTTERELL, RAJIB MALL, MCGRAW
HILL
2. SOFTWARE PROJECT MANAGEMENT IN PRACTICES by PANKAJ JALOTE, PEARSON
3. SOFTWARE PROJECT MANAGEMENT: A UNIFIED FRAMEWORK by WALKER ROYCE, PEARSON
78
Course Code DEMGN581 Course Title ORGANISATIONAL BEHAVIOUR AND
HUMAN RESOURCE DYNAMICS
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: enumerate the concept of management practices and organizational behavior
CO2: develop and sharpen acumen of how different management thoughts can be used to
improve organization functioning
CO3: analyze the importance of management practices and important organizational behavior
dimensions at different levels of organization
CO4: appraise the dynamics of industrial relations and to manage them as per statutory
regulations
CO5: apply human resource management functions to handle emerging issues
READINGS:
1. Organizational Behaviour by Stephen P. Robbins. Timothy A. Judge. Neharika Vohra, Pearson
2. Management by Management by Stephen P. Robbins. Mary Coulter. Neharika Vohra, Pearson
3. Human Resource Management by Dessler, G. and Varkkey, B, Pearson
80
Course Code DEMKT503 Course Title MARKETING MANAGEMENT
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: analyze and respond to environmental and competitive changes, their impact on marketing planning,
strategies and practices
CO2: apply the conceptual frameworks, theory and techniques to various marketing contexts
CO3: prepare marketing and sales plan appropriate to the needs of customers and contexts
CO4: determine strategies for developing new products and services that are consistent with evolving
market needs
Unit No. Content
Introduction: market and marketing, definition, nature and scope of marketing, exchange
Unit-1
process, functions of marketing, core marketing concepts
Marketing orientations: evolution of modern marketing concept, holistic marketing concepts,
Unit-2
new marketing orientations selling vs. marketing
Marketing mix: 7 P‘s & 7 C‘s of Marketing, 4 A‘s of Marketing, customer quality, value and
Unit-3 satisfaction, Michael E. Porters chain analysis model
Marketing environment: Significance of scanning marketing environment; Analysis of macro
Unit-4 environment of marketing – economic, demographic, socio-cultural, technological, political
legal and ecological; Impact of micro and macro environment on marketing decisions
Consumer behaviour: buyer behaviour, different consumer roles, need for studying buyer
Unit-5 behaviour, different buying motives, consumer buying decision process and influences,
consumer vs. business buying behaviour, industrial buying process
Segmentation decisions: market segmentation, characteristics of a segment, bases for
Unit-6 segmenting a consumer market, levels of market segmentation, factors influencing selection of
market segments
Targeting and positioning: Benefits of market segmentation; Criteria for effective market
Unit-7 segmentation; Target market selection and strategies; Positioning – concept, bases and process
Product decisions: concept and classification, layers of products, major product decisions,
Unit-8 product-mix, new product development stages, packaging and labelling, product life cycle
(PLC) – concept and appropriate strategies adopted at different stages
Pricing decisions: pricing – objectives, price sensitivity, factors affecting price of a product,
Unit-9 pricing methods and strategies, ethical issues in product and pricing decisions
Distribution planning: channels of distribution – concept and importance, different types of
Unit-10 distribution middlemen and their functions, selection, motivation and performance appraisal of
distribution middlemen
Distribution decisions: decisions involved in setting up the channel, channel management
Unit-11 strategies, distribution logistics – concept, importance and major logistics decisions, channel
integration and systems, ethical issues in distribution decisions
81
Distribution decisions: retailing and wholesaling, types of retail formats, retail theories,
Unit-12 retailing strategies, non-Store retailing, wholesaling – nature and importance, types of
wholesalers, developments in retailing and wholesaling in indian perspective
Promotion decisions: role of promotion in marketing, promotion mix, integrated marketing
communication, concept, communication process and promotion, determining promotion mix,
Unit-13
factors influencing promotion mix, developing promotion campaigns, sales promotion, direct
marketing, public relations, digital and social media
Trends in marketing: service Marketing, e-marketing, green marketing, customer relationship
Unit-14
management, rural marketing, other emerging trends, ethical issues in marketing
READINGS:
82
Course Code DEFIN542 Course Title CORPORATE FINANCE
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: understanding finance function with respect to its evolution and growth
CO2: understanding the concept of Time Value of Money and interpreting the results based on
calculations.
CO3: analyzing financing needs of the businesses and designing an optimum capital structure
CO4: understanding the retention and distribution of profits and impact on business valuation.
READINGS:
84
INTERNATIONAL BUSINESS
Course Code DEMGN578 Course Title
ENVIRONMENT
WEIGHTAGE
CA ETE(Th.)
30 70
Course Outcomes:
CO1: analyze business environment and trends to take decisions with respect to international business
operations
CO2: interpret and apply international trade theories in international business operations
CO3: identify and critically analyse the role of foreign exchange market and usage of fundamental
instruments for currency exchange
CO4: develop skills on analysing the business data, and problem solving in other functional areas such as
marketing, business strategy and human resources
CO5: develop responsiveness to contextual social issues/ problems and exploring solutions,
understanding business ethics and resolving ethical dilemmas
CO6: identify aspects of the global business and cross-cultural understanding
READINGS:
1. Daniels, Radebaugh, Sullivan & Salwan, International Business Environments and Operations by
Pearson
2. International Business - Competing in the Global marketplace by Charles W Hill, Arun Kumar Jain,
McGraw Hill
86
Course Code DEMKT509 Course Title CONSUMER BEHAVIOR
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: understand the implications of consumer behaviour concepts & theories for businesses and wider
society.
CO2: discern how individuals and groups influence consumer behaviour, and how marketers utilize this
knowledge to help achieve organizational objectives.
CO3: analyse the dynamic interplay of internal and external factors influencing consumer behaviour
and accordingly develop a marketing strategy.
CO4: articulate practical and comprehensive managerial understanding of consumer behaviour.
CO5: develop the understanding of marketing regulation, consumer protection act and contemporary
issues in consumer behaviour.
READINGS:
88
Course Code DEFIN548 Course Title INTERNATIONAL FINANCIAL
MANAGEMENT
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: understand the critical financial issues of international firms and international investors in
present scenario.
CO2: analyze the framework of exchange rates and foreign exchange exposures and forces affecting
exchange rates.
CO3: evaluate the international capital structure and international capital budgeting mechanism of
multinational corporations.
CO4: analyze the different modes of raising finance in international market and significance of
international finance in MNCs.
89
Unit 10 Working Capital Management of the Multinational Firm: international working capital
management – international cash management – decentralized vs centralized cash
management – bilateral vs multilateral netting – central cash pool.
Unit 11 Option Contracts American and European currency options, call and put option, option
and risk management strategies. introduction to currency swap, foreign exchange risk
management strategies through forward contracts, future contracts, money market
hedges, and options contracts.
Unit 12 Managing Foreign Operations: ADRs; benefits and costs of ADR holdings for investors;
benefits and costs of ADR issuance for corporations, external commercial borrowing and
international refinancing, issues and challenges before multinational subsidiaries.
Unit 13 Foreign Direct Investment and Cross Border Acquisitions: global trends in FDI, benefits of
investing overseas, political risk and FDI., cross border mergers and acquisitions.
Unit 14 Introduction to International Financial management: domestic vs. international
finance, International financial market integration, currency crisis, and global recession
and risk spill over.
READINGS:
90
Course Code DEMGN801 Course Title BUSINESS ANALYTICS
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: apply quantitative modelling and data analysis techniques to problems of real world
CO2: employ best practices in data visualization to develop charts, maps, tables, and other visual
representations techniques to communicate findings to diverse audiences
CO3: identify and describe complex business problems in terms of analytical models
CO4: apply appropriate analytical methods to find solutions to business problems that achieve stated
objective
Unit 12 Design fundamentals and visual analytics: Filters, sorting, groups and sets, interactive
filters, forecasting, use of tooltip, reference line, parameter, drill down and hierarchies
Unit 13 Decision analytics and calculations: Types of calculations, logic calculations (including
if comment, nested if command etc.), data calculations, string calculations
91
Unit 14 Mapping: Role of maps in business intelligence and visualization, editing unrecognized
locations
READINGS:
92
Course Code DEMKT505 Course Title DIGITAL AND SOCIAL MEDIA
MARKETING
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: define social media marketing goals necessary to achieve successful online campaigns.
CO2: describe the stages of the social media marketing strategy development process.
CO3: develop effective social media marketing strategies for various types of industries.
CO4: devise integrated social media marketing strategies using a variety of services, tools, and
platforms to accomplish marketing objectives.
CO5: analyze the progress in achieving social media goals using a variety of powerful measurement
tools, services, and metrics.
94
INTERNATIONAL BANKING AND FOREX
Course Code DEFIN508 Course Title
MANAGEMENT
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: understand the dimensions of international banking
CO2: establish legal and regulatory issues in international banking institutions
CO3: demonstrate foreign exchange market operations
CO4: analyze and understand the way in which the international financial system operates
READINGS:
1. International Banking by P. Subramanian, Macmillan
2. International Banking Operations by B. Y. Olkar, A. K. Trivedi, A. K. Patwardhan, A. R. Pawse, Macmillan
95
OPERATIONS MANAGEMENT
Course Code DEOPR639 Course Title
AND RESEARCH
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: analyze how to optimally utilize the resources.
CO2: apply the concepts in solving real life problems.
CO3: adapt different opinions and make correct judgment.
CO4: select right decision-making tools.
96
READINGS:
97
CUSTOMER RELATIONSHIP
Course Code DEMKT517 Course Title
MANAGEMENT
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: develop an insight and new learning in the area of customer relationship management.
CO2: identify and respond to customers’ needs, expectations and issues to build productive and
rewarding relationships with customers.
CO3: discuss the conceptual foundations of relationship marketing and its implications for further
knowledge development in the field of business.
CO4: develop a conceptual understanding and the knowledge pertaining to practical application for
building and managing partnering relationships with customers and suppliers.
CO5: analyse how CRM is being used in consumer and business markets-implementation,
management, benefits, problems and solutions.
98
CRM Application in B2B and B2C Market: importance of CRM in B2B and B2C market,
Unit-14 benefits of B2C and B2B CRM, B2B and B2C application in banking and hospitality
sectors.
READINGS:
99
SECURITY ANALYSIS AND PORTFOLIO
Course Code DEFIN576 Course Title
MANAGEMENT
WEIGHTAGES
CA ETE(Th.)
30 70
Course Outcomes:
CO1: assess the characteristics of different Investment alternatives and how to trade in the stock market
CO2: apply different valuation models to find the intrinsic value of the shares
CO3: use the fundamental and technical analysis to predict the stock price movement
CO4: construct, revise and evaluate portfolios of different securities
Unit No. Content
Introduction to Security Analysis: securities market structure, major Indian stock exchanges,
Unit-1 stock exchange players, investment objectives, investment process, investment alternatives,
investment alternatives evaluation,and common error in investment process
Risk and Return: concept of return, measurement of return, concept of risk, types of risk,
Unit-2
measurement of risk
Equity valuation: balance sheet valuation, dividend discount model, free cash flow model,
Unit-3
earning multiplier approach
Fixed Income and Other Investment Alternatives: pricing, yields and risks of investments in
Unit-4 fixed income securities, real estate, commodities, other alternative investments, strategies for
investments in various investment alternatives
Efficient Market Hypothesis: forms of EMH, test for EMH, depository system, depository
Unit-5
process and participants, calculation of sensex and nifty, listing of securities
Fundamental Analysis: industry analysis, economic analysis, company analysis, introduction
Unit-6
to fundamental analysis, financial health
Technical Analysis: technical indicators, Dow Theory, fundamental v/s technical analysis,
Unit-7
Elliot wave theory, chart patterns
Portfolio Construction and Management: portfolio risk, portfolio return, diversification,
Unit-8
Markowitz model
Portfolio Risk and Return Management: portfolio risk and return with different correlations,
Unit-9
efficient frontier, optimal portfolio
Asset Pricing: standard capital asset pricing model, capital asset pricing model, arbitrage
Unit-10
pricing theory
Derivative and Regulatory Aspect: meaning and reasons of derivative trading, types of
Unit-11
derivatives, forward, futures and options, regulation of derivative market
Evaluation of Portfolio Performance: Sharpe’s performance index, Treynor’s performance
Unit-12
index, Jensen performance index
Portfolio Revision: active and passive management, rupee cost averaging, constant rupee
Unit-13
plan, constant ratio plan, variable ratio plan
Contemporary Issues in Investment: fintech scope and challenges, algo trading issues and
Unit-14
development, robo advisors, high frequency trade
READINGS:
1. Security Analysis and Portfolio Management by K Sasidharan & Alex K Mathews, Mcgraw Hill Education
2. Security Analysis and Portfolio Management by Punithavathy Pandian, Vikas Publishing House
100