R2023 CSE Curriculum and Syllabus
R2023 CSE Curriculum and Syllabus
Vision
To promote highly ethical and innovative computer professionals through excellence in teaching, training and
research.
Mission
● To produce globally competent professionals, motivated to learn the emerging technologies and to be
innovative in solving real world problems.
● To promote research activities amongst the students and the members of faculty that could benefit the society.
PEO 1: To equip students with essential background in computer science, basic electronics and applied
mathematics.
PEO 2: To prepare students with fundamental knowledge in programming languages and tools and enable them to
develop applications.
PEO 3: To encourage the research abilities and innovative project development in the field of networking, security,
data mining, web technology, mobile communication and also emerging technologies for the cause of social benefit.
PEO 4: To develop professionally ethical individuals enhanced with analytical skills, communication skills and
organizing ability to meet industry requirements.
PO1: Engineering knowledge: Apply the knowledge of Mathematics, Science, Engineering fundamentals, and
an engineering specialization to the solution of complex engineering problems.
PO2: Problem analysis: Identify, formulate, review research literature, and analyze complex engineering
problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and
engineering sciences.
PO3: Design/development of solutions: Design solutions for complex engineering problems and design system
components or processes that meet the specified needs with appropriate consideration forthe public health and
safety, and the cultural, societal, and environmental considerations.
PO 4: Conduct investigations of complex problems: Use research-based knowledge and research methods
including design of experiments, analysis and interpretation of data, and synthesis of the information to provide
valid conclusions.
PO 5: Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering
and IT tools including prediction and modeling to complex engineering activities with an understanding of the
limitations.
PO 6: The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal,
health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional
engineering practice.
PO 7: Environment and sustainability: Understand the impact of the professional engineering solutions in
societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable development.
PO 8: Ethics: Apply ethical principles and commit to professional ethics and responsibilities and normsof the
engineering practice.
PO 9: Individual and team work: Function effectively as an individual, and as a member or leader in diverse
teams, and in multidisciplinary settings.
PO11: Project management and finance: Demonstrate knowledge and understanding of the engineering and
management principles and apply these to one‟s own work, as a member and leader in a team, to manage projects
and in multidisciplinary environments.
PO12: Life-long learning: Recognize the need for, and have the preparation and ability to engage inindependent
and life-long learning in the broadest context of technological change.
PSO 1: Foundation Skills: Ability to understand, analyze and develop computer programs in the areas related to
algorithms, system software, web design, machine learning, data analytics, and networking for efficient design of
computer-based systems of varying complexity. Familiarity and practical competence with a broad range of
programming language and open source platforms.
PSO 2: Problem-Solving Skills: Ability to apply mathematical methodologies to solve computational task,
model real world problem using appropriate data structure and suitable algorithm. To understand the standard
practices and strategies in software project development, using open- ended programming environments to
deliver a quality product.
PSO 3: Successful Progression: Ability to apply knowledge in various domains to identify research gaps and to
provide solution to new ideas, inculcate passion towards higher studies, creating innovative career paths to be an
entrepreneur and evolve as an ethically social responsible computer science professional.
Mapping of Program Educational Objectives (PEOs) and Program Outcomes (POs) with correlation levels (1:
Slight, 2: Moderate, 3: Substantial, -: No correlation), based on the provided information:
PEOs/POs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
PEO1 3 3 2 2 3 - - - 2 2 2 2 3 3 2
PEO2 2 2 3 2 3 - - - 2 2 2 2 3 3 2
PEO3 2 2 3 3 3 3 3 2 2 2 2 2 3 3 3
PEO4 2 2 2 2 2 2 2 3 3 3 3 2 2 2 3
SEMESTER I
SI. COURSE Contact
COURSE TITLE Category L T P C
NO. CODE Periods
THEORY COURSES
1. HS23111 Technical Communication I HS 2 2 0 0 2
2. MA23111 Linear Algebra and Calculus BS 4 3 1 0 4
3. GE23117 தமிழர் மரபு /Heritage of Tamils HS 1 1 0 0 1
LAB ORIENTED THEORY COURSES
4. GE23131 Programming using C ES 7 1 0 6 4
5. EE23133 Basic Electrical and Electronics Engineering ES 5 3 0 2 4
6. PH23132 Physics for Information Science BS 5 3 0 2 4
LABORATORY COURSES
7 GE23121 Engineering Practices-Civil and Mechanical ES 2 0 0 2 1
NON-CREDIT COURSES
8. MC23111 Indian Constitution and Freedom Movement MC 3 3 0 0 0
TOTAL 29 16 1 12 20
.
SEMESTER II
SI. COURSE Contact
COURSE TITLE Category L T P C
NO. CODE Periods
THEORY COURSES
1. MA23213 Discrete Mathematical Structures BS 4 3 1 0 4
2. தமிழரும் ததொழில் நுட்பமும் /Tamils and
GE23217 HS 1 1 0 0 1
Technology
LAB ORIENTED THEORY COURSES
3. EC23232 Digital Logic and Microprocessor ES 5 3 0 2 4
4. GE23111 Engineering Graphics ES 6 2 0 4 4
5. CS23231 Data Structures PC 7 3 0 4 5
LABORATORY COURSES
6. HS23221/ Technical Communication II / English for HS 2 0 0 2 1
HS23222 Professional Competence
7. GE23122 Engineering Practices- Electrical and Electronics ES 2 0 0 2 1
8. CS23221 Python Programming Lab PC 4 0 0 4 2
NON-CREDIT COURSES
9. MC23112 Environmental Science and Engineering MC 3 3 0 0 0
TOTAL 34 15 1 18 22
TOTAL 31 16 1 14 24
SEMESTER IV
SI. COURSE Contact
COURSE TITLE Category L T P C
NO. CODE Periods
THEORY COURSES
1. Open Elective – I OE 3 3 0 0 3
2. Professional Elective-I PE 3 3 0 0 3
LAB ORIENTED THEORY COURSES
3. MA23435 Probability, Statistics and Simulation BS 5 3 0 2 4
4. CS23431 Operating Systems PC 7 3 0 4 5
5. CS23432 Software Construction PC 5 3 0 2 4
6. GE23627 Design Thinking and Innovation EEC 4 0 0 4 2
EMPLOYABILITY ENHANCEMENT COURSES
7. GE23421 Soft Skills–I EEC 2 0 0 2 1
8. CS23421 Internship (2 weeks) EEC 0 0 0 2 1
TOTAL 29 15 0 14 23
SEMESTER VI
SI. COURSE Contact
COURSE TITLE Category L T P C
NO. CODE Periods
LAB ORIENTED THEORY COURSES
1. CS23631 Compiler Design PC 5 3 0 2 4
2. CS23632 Cryptography and Network Security PC 4 2 0 2 3
3. CS23633 Cloud Computing PC 4 2 0 2 3
4. CS23634 Fundamentals of Generative AI and Prompt PC 4 2 0 2 3
Engineering
5. AI23331 Fundamentals of Machine Learning PC 5 3 0 2 4
LABORATORY COURSES
6. CS23621 Mobile Application Development Laboratory PC 4 0 0 4 2
EMPLOYABILITY ENHANCEMENT COURSES
7. GE23621 Problem Solving Techniques EEC 2 0 0 2 1
TOTAL 27 13 0 14 20
SEMESTER VIII
SI. COURSE Contact
COURSE TITLE Category L T P C
NO. CODE Periods
THEORY COURSES
1. Professional Elective-VII PE 3 3 0 0 3
LABORATORY COURSES
2. CS23821 Project Phase II EEC 12 0 0 12 6
TOTAL 15 3 0 12 9
Cyber Security
SI. COURSE Contact
NO. CODE COURSE TITLE Category Periods L T P C
1. CR23A11 Security Assessment and Risk Analysis PE 3 3 0 0 3
2. CS23A11 Malware Detection and Analysis PE 3 3 0 0 3
3. CR23A31 Ethical Hacking and Security PE 4 2 0 2 3
4. CR23A32 Digital and Mobile Forensics PE 4 2 0 2 3
5. CR23A33 Cryptocurrency and Blockchain Technologies PE 4 2 0 2 3
6. CR23A34 Security and Privacy in Cloud PE 4 2 0 2 3
7. CR23A35 Social Network Security PE 4 2 0 2 3
8. CS23A35 Web Application Security PE 4 2 0 2 3
9. CR23A36 Information Security and Management PE 4 2 0 2 3
Data Science
SI. COURSE Contact
NO. CODE COURSE TITLE Category Periods L T P C
1. AI23A31 Social Network Analysis PE 4 2 0 2 3
2. AD23A32 Explorative and Forecasting Analytics PE 4 2 0 2 3
3. AI23A35 Recommendation Systems PE 4 2 0 2 3
4. IT23D11 Deep Learning Concepts PE 3 3 0 0 3
5. AD23B33 Text and Speech Analysis PE 4 2 0 2 3
6. CS23A31 Business Analytics PE 4 2 0 2 3
7. AD23A37 Image and Video Analytics PE 4 2 0 2 3
8. AD23B31 Image Processing and Computer Vision PE 4 2 0 2 3
9. AI23A36 Big Data Analytics PE 4 2 0 2 3
10. AI23632 Natural Language Processing PE 4 2 0 2 3
11. CS23C31 Data Analytics and Insights in MindSphere PE 5 1 0 4 3
Credit Distribution
Total 20 22 24 23 24 20 18 9 160
Objectives:
● To facilitate students, develop their comprehension skills
● To enable students to improve their receptive skills
● To equip learners with better vocabulary and enhance their writing skills
● To aid students speak effectively in all kinds of communicative contexts.
● To improve the learners’ basic proficiency in workplace communication
Text Book(s):
1. Effective Technical Communication by M. Ashraf Rizvi, 2nd Edition, 2017
2. Sylvan Barnet and Hugo Bedau, ‘Critical Thinking Reading and Writing’, Bedford/st. Martin’s: Fifth Edition,
2004
3. Meenakshi Upadhyay, Arun Sharma – Verbal Ability and Reading Comprehension.
4. Teaching Speaking: A Holistic Approach, Book by Anne Burns and Christine ChuenMeng Goh, Cambridge
University Press
Reference Book(s):
1. Basic Vocabulary in Use: 60 Units of Vocabulary Practice in North American English with Answers 2nd Edition
by Michael McCarthy, Felicity O'Dell, John D. Bunting
2. Reading Development and Difficulties By Kate Cain
3. The 7 Habits of Highly Effective People by Stephen Covey, Simon and Schuster, UK
4. Everybody Writes: Your Go-To Guide to Creating Ridiculously Good Content Hardcover by Ann Handley
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
HS23111. 1 - - - 1 - - - - - 3 - - - 2 -
HS23111. 2 - - - 1 - - - - - 3 - - 2 - -
HS23111. 3 - 1 - 1 - - - - - 3 - - 2 - -
HS23111. 4 - - - 2 - - - - 1 3 - - 3 - 1
HS23111. 5 - - - 1 - - - - 1 3 - - 1 - -
Average - 1.0 - 1.2 - - - - 1 3 - - 2.0 2 1.0
Objectives:
● To introduce the matrix techniques and to explain the nature of the matrix.
● To collect the matrix algebra techniques and the concepts of basis and dimension in vector spaces.
● To construct normalization of vectors and ortho-normal vectors.
● To understand techniques of calculus which are applied in the Engineering problems.
● To apply the techniques of Integration in finding area and volumes.
UNIT-I MATRICES 12
Matrices - Eigenvalues and eigenvectors - Diagonalization of matrices using orthogonal transformation - Cayley-
Hamilton Theorem (without proof) - Quadratic forms - Reduction to canonical form using orthogonal transformation -
Numerical computation of Eigen value using Power method.
UNIT-II LINEAR TRANSFORMATION 12
Vector spaces – Subspaces – Linear combinations and system of Linear equations – Linear independence and Linear
dependence – Bases and Dimensions – Linear Transformation – Matrix representation of Linear Transformation – Null
space, Range space and dimension theorem (without proof).
UNIT-III INNER PRODUCT SPACES 12
Inner product and norms - Gram Schmidt orthonormalization process - QR Factorization - Singular value
decomposition.
UNIT-IV FUNCTIONS OF SEVERAL VARIABLES 12
Partial differentiation–Total derivative–Change of variables–Jacobians–Partial differentiation of implicit functions–
Taylor’s series for functions of two variables–Maxima and minima of functions of two variables–Lagrange’s method
of undetermined multipliers.
UNIT-V MULTIPLE INTEGRALS 12
Double integrals–Change of order of integration–Area enclosed by plane curves–Triple integrals–Volume of solids–
Numerical computation of double integrals-trapezoidal rule.
Total Contact Hours: 60
Text Book(s):
1. Grewal B.S., “Higher Engineering Mathematics”, Khanna Publishers, New Delhi, 43rd Edition, 2014.
2. T Veerarajan , Linear Algebra and Partial Differential Equations, Mc Graw Hill Education,2019.
3. Friedberg, A.H., Insel, A.J. and Spence, L., Elementary Linear Algebra, a matrix approach,2 nd edition, Pearson,
2014.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
MA23111.1 3 2 1 - - - - - - - 1 - 1 1 -
MA23111.2 3 3 - - - - - - - - - - 1 1 -
MA23111.3 3 2 - - - - - - - - - - - - -
MA23111.4 2 2 - - - - - - - - 1 1 - - -
MA23111.5 2 2 - - - - - - - - - 1 1 - -
Average 2.6 2.2 1 - - - - - - - 1 1 1 1 -
நடுகல் முதல் நவீன சிற் பங் கள் வமர - ஐம் ததபொன் சிமலகள் - பழங் குடியினர் மற் றும் அவரக்
ள் ததயொரிக்கும் மகவிமனப் ததபொருட்கள் , ததபொம் மமகள் - மதர் ததய் யும் கமல - சுடுமண்
சிற் பங் கள் - தநொட்டுப் புறத் ததய் வங் கள் - குமரிமுமனயில் திருவள் ளுவர் சிமல - இதமக்
கருவிகள் - மிருதங் கம் , பமற, வீமண, தயொழ் , தநொதஸ் வரம் - தமிழரக் ளின் த மூக
ததபொருதளொததொர தவொழ் வில் மதகொவில் களின் பங் கு.
அலகு III தநொட்டுப் புறக் கறலகள் மற் றும் வீர விறளதயொட்டுகள் : 3
ததருக்கூத்F, கரதகொட்டம் , வில் லுப் தபொட்டு, கணிதயொன் கூத்F, ஒயிதலொட்டம் , மததொல்
தபொமவக் கூத், சிலம் தபொட்டம் , வளரி, புலிதயொட்டம் , தமிழரக் ளின் விமளதயொட்டுகள் .
5. Social Life of Tamils (Dr. K. K. Pillay) A joint publication of TNTB & ESC and RMRL – (in print)
6. Social Life of the Tamils – The Classical Period (Dr. S. Singaravelu)(Published by: International Institute of
Tamil Studies.
7. Historical Heritage of the Tamils (Dr. S. V. Subatamanian, Dr.K.D. Thirunavukkarasu) (Published by:
International Institute of Tamil Studies).
8. The Contributions of the Tamils to Indian Culture (Dr.M.Valarmathi) (Published by: International Institute of
Tamil Studies).
9. Keeladi – ‘Sangam City Civilization on the banks of river Vaigai’ (Jointly Published by: Department of
archaeology & Tamil Nadu Text Book and Educational Services Corporation, Tamil Nadu)
10. Studies in the History of India with Special Reference to Tamil Nadu (Dr.K.K.Pillay) (Published by: The Author)
11. Porunai Civilization (Jointly Published by: Department of Archaeology & Tamil Nadu Text Book and
Educational Services Corporation, Tamil Nadu)
12. Journey of Civilization Indus to Vaigai (R.Balakrishnan) (Published by: RMRL) – Reference Book.
Objectives:
● To develop C Programs using basic programming constructs
● To develop C programs using arrays and strings
● To do searching and sorting algorithms in C
● To develop applications in C using user defined functions and recursive functions
● To develop applications in C using pointers and structures
List of Experiments
1 Overview of C, Constants, Variables and Data Types
2 Operators and Expressions, Managing Input and Output Operations
3 Decision Making and Branching
4 Decision Making and Looping
5 Nested Loops - while and for, Jumps in Loops
6 One-Dimensional Arrays
7 Searching Algorithms - Linear and Binary
8 Sorting Algorithms - Bubble and Selection
9 Two-Dimensional and Multi-dimensional Arrays
10 Character Arrays and Strings Handling Functions
11 User-Defined Functions - Recursive Functions
12 Passing Arrays and Strings to Functions
13 Scope, Visibility and Lifetime of Variables
14 Structures and Unions
15 Pointers
16 The Preprocessor
Platform Needed: GCC Compiler for Windows/Linux Total Contact Hours 90
Text Book(s):
1. Brian W. Kernighan and Dennis M. Ritchie, “The C Programming Language”, Second Edition, Pearson,2015
2. Byron Gottfried, “Programming in C”, Second Edition, Schaum Outline Series,1996.
Reference Book(s):
1. Herbert Schildt, “C: The Complete Reference”, Fourth Edition, McGraw Hill,2017
2. YashavantKanetkar, “Let Us C”, BPB Publications,15th Edition,2016.
3. Balagurusamy, Programming in ANSI C, Tata McGraw-Hill,9th Edition,2019.
4. NPTEL course, “Problem Solving Through Programming In C”, By Prof. Anupam Basu, IIT Kharagpur
Suggested Activities
● Practice small and tricky codes
● Practice problems in portals like Digital Café Debugging the codes
● Completing the function definitions etc
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
GE23131.1 1 2 2 2 1 - - - 1 2 1 1 2 3 -
GE23131.2 1 1 1 1 1 - - - - - 1 1 2 2 -
GE23131.3 1 1 2 1 1 - - - - - 1 1 2 2 -
GE23131.4 2 2 3 2 1 - - - 1 - 2 1 2 2 2
GE23131.5 2 2 3 2 1 - - - - - 2 1 2 2 2
Average 1.4 1.6 2.2 1.6 1.0 - - - 1.0 2.0 1.4 1.0 2.0 2.2 2.0
Objectives:
● To provide knowledge on the analysis of DC circuits.
● To provide knowledge on the analysis of AC circuits
● To expose the principles of electrical machines and electronic devices.
● To teach the concepts of different types of electrical measuring instruments and transducers.
● To experimentally analyze the electrical circuits and machines, electronic devices and transducers.
UNIT-I DC CIRCUITS 9
Electrical circuit elements (R, L and C), Voltage and current sources, Kirchhoff ‘s laws, Analysis of simple circuits with
DC excitation, Superposition, Thevenin and Norton Theorems.
UNIT-II AC CIRCUITS 9
Representation of sinusoidal waveforms, Power and Power factor, Analysis of single-phase AC circuits consisting of R,
L, C, RL, RC, RLC combinations, Series resonance, Three phase balanced circuits
UNIT-III ELECTRICAL MACHINES 9
Construction, Principles of operation of DC machines, Single phase Transformers, Synchronous machines, Single phase
induction motors. (Qualitative Treatment Only).
UNIT-IV ELECTRONIC DEVICES & CIRCUITS 9
Review of PN Junction diode – Forward and Reverse Bias – Bipolar Junction Transistor – Common Emitter
haracteristics – MOSFET - Introduction to operational Amplifier –Inverting and Non-Inverting Amplifier.
UNIT-V MEASUREMENTS & INSTRUMENTATION 9
Introduction to transducers - Classification of Transducers: Resistive, Inductive, Capacitive, Piezoelectric, -
Classification of instruments - PMMC and MI Ammeters and Voltmeters – Digital Storage Oscilloscope.
Total Contact Hours: 45
List of Experiments
1 Verification of Kirchhoff’s Laws.
2 Load test on DC Shunt Motor (Virtual Lab)
3 Load test on Single phase Transformer (Virtual Lab)
4 Load test on Single phase Induction motor (Virtual Lab)
5 Characteristics of P-N junction Diode.
6 Characteristics of CE based NPN Transistor.
7 Characteristics of MOSFET
8 Characteristics of LVDT, RTD and Thermistor.
Contact Hours : 30
Total Contact Hours: 75
Text Book(s):
1. J.B.Gupta, “Fundamentals of Electrical Engineering and Electronics” S.K.Kataria & Sons Publications, 2010.
2. Joseph A. Edminister, Mahmood, Nahri, “Electric Circuits” – Shaum Series and Systems”, Schaum‟s Outlines,
Tata McGrawHill, Indian. 5th Edison, 2017
3. Thereja .B.L., “Fundamentals of Electrical Engineering and Electronics”, S. Chand & Co. Ltd., 2008
Reference Books(s):
1. Del Toro, “Electrical Engineering Fundamentals”, Pearson Education, New Delhi, 2015
2. John Bird, “Electrical Circuit Theory and Technology”, Elsevier, First Indian Edition, 2007
3. Allan S Moris, “Measurement and Instrumentation Principles”, Elseveir, Third Edition, 2006
4. Rajendra Prasad, “Fundamentals of Electrical Engineering”, Prentice Hall of India, Third Edition, 2014
5. A.E.Fitzgerald, David E Higginbotham and Arvin Grabel, “Basic Electrical Engineering”, McGraw Hill
Education(India) Private Limited, 2009
6. D P Kothari and I.J Nagarath, “Basic Electrical and Electronics Engineering”, McGraw Hill Education(India)
Private Limited, Third Reprint ,2016
7. https://nptel.ac.in/courses/108108076
7 Characteristics of MOSFET
1. MOSFET (IRF510) 1
2. Resistors- 100kΩ, 1kΩ 1
3. Bread Board 1
4. DC Regulated Power supply (0 - 30 V variable) 1
5. Multimeter 1
6. Connecting wires As Required
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
EE23133.1 3 3 3 3 - 3 1 1 2 1 1 1 2 2 2
EE23133.2 3 3 3 3 - 3 1 1 2 1 1 1 1 - 1
EE23133.3 3 3 3 3 - 3 1 1 2 1 1 1 2 2 2
EE23133.4 3 3 3 3 - 3 1 1 2 1 1 1 2 1 2
EE23133.5 3 3 3 3 - 3 1 1 2 1 1 1 2 3 2
Average 3 3 3 3 - 3 1 1 2 1 1 1 1.8 2.0 1.8
Objectives:
● To understand the principles of laser and fiber optics in engineering and technology.
● To analyze the properties of magnetic and superconducting materials.
● To understand the advanced concept of quantum theory and applications.
● To become proficient in semiconductor applications
● To become proficient in optoelectronic devices
List of Experiments
1 Determine the wavelength of the laser using grating and size of the particle using diode laser.
2 Determine the numerical aperture and acceptance angle of optical fiber.
3 Study the permeability of the free space using Helmoltz coil.
4 Determine the hysteresis loss in the transformer core using B-H curve unit.
5 Determine the band gap of given semiconductor.
6 Determine the Hall coefficient of semiconducting material.
7 Determine specific resistance of the material of given wires using metre bridge.
8 Study the resonance frequency in series connected LCR circuits.
9 Determine the V-I characteristics of the solar cell.
10 Determine the thickness of the given specimen by using air wedge method.
Contact Hours: 30
Total Contact Hours: 75
Suggested Activities
● Problem solving sessions
Suggested Evaluation Methods
● Quizzes
● Class Presentation / Discussion
Text Book(s):
1. Bhattacharya, D.K. & Poonam, T. “Engineering Physics”. Oxford University Press, 2015.
2. Jasprit Singh, “Semiconductor Devices: Basic Principles”, Wiley 2012.
3. Kasap, S.O. “Principles of Electronic Materials and Devices”, McGraw-Hill Education, 2007.
Reference Books(s):
1. S. O. Pillai, Solid state physics, New Age International, 2015.
2. Serway, R.A. & Jewett, J.W. “Physics for Scientists and Engineers”. Cengage Learning, 2010.
3. Hanson, G.W. “Fundamentals of Nanoelectronics”. Pearson Education, 2009.
List of Equipment Available
(Common to B.E. CSD and CSE & B.Tech. AI&DS, AI & ML, IT)
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
PH23132.1 3 3 2 2 2 1 - - - - - 2 1 1 1
PH23132.2 3 3 2 2 3 1 1 - - - - 2 1 1 1
PH23132.3 3 3 2 2 3 1 1 - - - - 2 2 1 1
PH23132.4 3 3 2 2 3 1 1 - - - - 2 2 1 1
PH23132.5 3 3 2 2 3 1 1 - - - - 2 2 1 1
Average 3 3 2 2 2.80 1 1 - - - - 2 1.80 1 1
Objectives:
● To provide exposure to the students with hands on experience on various basic engineering practices in Civil
and Mechanical Engineering
List of Experiments
CIVIL ENGINEERING PRACTICE
Study of pipeline joints, its location and functions: valves, taps, couplings, unions, reducers, andelbows in
1.
household fittings.
2. Preparation of basic plumbing line sketches for wash basins, water heaters, etc.
3. Hands-on-exercise: Basic pipe connections – Pipe connections with different joining components.
Carpentry Works:
4. Study of joints in roofs, doors, windows and furniture.
5. Hands-on-exercise: Woodwork, joints by sawing, planning and chiselling.
MECHANICAL ENGINEERING PRACTICE
6. Preparation of butt joints, lap joints and T- joints by Shielded metal arc welding.
7 Gas welding practice.
Basic Machining:
8 Simple Turning and Taper turning
9 Drilling Practice
Sheet Metal Work:
10 Forming & Bending:
11 Model making – Trays and funnels
12 Different type of joints.
Machine Assembly Practice:
13 Study of centrifugal pump
14 Study of air conditioner
Total Contact Hours : 30
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
GE23121.1 1 1 1 - - 2 1 - 2 - - 2 - 2 1
GE23121.2 1 1 1 - - 2 1 - 2 - - 2 - 2 1
GE23121.3 1 1 1 - - 2 1 - 2 - - 2 - 2 1
GE23121.4 1 1 1 - - 2 1 - 2 - - 2 - 2 1
GE23121.5 1 1 1 - - 2 1 - 2 - - 2 - 2 1
Average 1 1 1 - - 2 1 - 2 - - 2 - 2 1
Objectives:
● To apprehend the sacrifices made by the freedom fighters.
● To inculcate the values enshrined in the Indian constitution.
● To instill a sense of responsibility as the citizens of India.
● To familiarize about the functions of the various levels of Government.
● To be informed about Constitutional and Non- Constitutional bodies.
Course Outcomes: Upon completion of the course, students will be able to:
● Appreciate the sacrifices made by freedom fighters during freedom movement.
● Be responsible citizens and abide by the rules of the Indian constitution.
● Be aware of the functions of the Indian government.
● Be knowledgeable about the functions of the state Government and the Local bodies.
● Apply the knowledge on constitutional functions and role of constitutional bodies and non-constitutional bodies.
SUGGESTED ACTIVITIES
● Famous speeches from around the world relating to independence
● Case study
● Quiz on Portfolio and Cabinet
● Discussions on International Associations like the UN, BRICS, QUAD
● Presentation on issues around the world
Text Book(s):
1. M. Laxmikanth, “Indian Polity, McGraw-Hill, New Delhi.
2. Durga Das Basu, “Introduction to the Constitution of India “, Lexis Nexis, New Delhi. 21 sted 2013.
3. P K Agarwal and K N Chaturvedi, Prabhat Prakashan, New Delhi, 1st ed, 2017.
Reference Books(s):
1. Sharma, Brij Kishore, “Introduction to the Constitution of India, Prentice Hall of India, New Delhi.
2. U.R. Gahai, “Indian Political System “, New Academic Publishing House, Jalaendhar
3. Bipan Chandra, India’s Struggle for Independence, Penguin Books, 2016.
4. Maciver and Page, “Society: An Introduction Analysis “, Mac Milan India Ltd., New Delhi.2 nded, 2014.
5. Bipan Chandra, History of Modern India, Orient Black Swan, 2009.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
MC23111.1 - - - - - - - - - - - - - - -
MC23111.2 - - - - - - - - - - - - - -
MC23111.3 - - - - - 1 - 1 - - - - - - -
MC23111.4 - - - - - - - 1 - - - - - - -
MC23111.5 - - - - - 1 - 1 1 - - - - - -
Average - - - - - 1 - 1 1 - - - - - -
Objectives:
● To extend student’s Logical and Mathematical maturity and ability to deal with abstraction.
● To provide discrete structures of many levels and to know the principle of counting.
● To give an understanding of relations and functions and to determine their properties.
● To provide the basic principles of sets and operations in sets and to Prove basic set equalities.
● To model problems in Computer Science using graphs and trees.
SUGGESTED ACTIVITIES
● Problem solving sessions
● Visio for drawing graphs
● Online Calculators for PDNF and PCNF, recurrence relations and sets
● Calculators for Logic gates
● GeoGebra for Hasse diagrams and graphs
Text Book(s):
1. Elements of Discrete Mathematics, (Second Edition) C. L. LiuMc Graw Hill, New Delhi.
2. Digital Logic & Computer Design, M. Morris Mano, Pearson.
3. Rosen, K.H., "Discrete Mathematics and its Applications", 7th Edition, Tata McGraw Hill Pub. Co. Ltd.,New
Delhi, Special Indian Edition, 2011.
4. Tremblay, J.P. and Manohar. R, " Discrete Mathematical Structures with Applications to Computer
Science",Tata McGraw Hill Pub. Co. Ltd, New Delhi, 30th Reprint, 2011.
5. Graph Theory with Applications, J. A. Bondy and U. S. R. Murty, Macmillan Press, London.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
MA23213.1 3 2 1 - - - - - - - - - 1 - -
MA23213.2 3 2 1 - - - - - - - - - 1 - -
MA23213.3 3 3 3 1 - - - - - - - - 1 1 -
MA23213.4 3 2 3 - - - - - - - - - - 1 -
MA23213.5 3 2 3 - - - - - - - - 1 1 - -
Average 3 2.2 2.2 1 - - - - - - - 1 1 1 -
5. Social Life of Tamils (Dr. K. K. Pillay) A joint publication of TNTB & ESC and RMRL – (in print)
6. Social Life of the Tamils – The Classical Period (Dr. S. Singaravelu) (Published by: International
Institute of Tamil Studies.
8. The Contributions of the Tamils to Indian Culture (Dr.M.Valarmathi) (Published by: International
Institute of Tamil Studies).
9. Keeladi – ‘Sangam City Civilization on the banks of river Vaigai’ (Jointly Published by: Department
of archaeology & Tamil Nadu Text Book and Educational Services Corporation, Tamil Nadu)
10. Studies in the History of India with Special Reference to Tamil Nadu (Dr.K.K.Pillay) (Published by:
The Author)
11. Porunai Civilization (Jointly Published by: Department of Archaeology & Tamil Nadu Text Book and
Educational Services Corporation, Tamil Nadu)
12. Journey of Civilization Indus to Vaigai (R.Balakrishnan) (Published by: RMRL) – Reference Book.
Objectives:
● To learn basic postulates of Boolean algebra and infer the methods for simplifying Boolean expressions.
● To illustrate the formal procedures for the analysis and design of Combinational and Sequential circuits.
● To understand the basic functionalities of 8085 and programming logic.
● To understand the concepts and basic functionalities of 8051 architecture and its functionalities.
● To peruse the knowledge of programming, peripherals and interface various devices.
SUGGESTED EVALUATION METHODS (if Any) (UNIT/ Module Wise) – could suggest topic
● Tutorial problems – K-map, Quine Mc-Cluskey method
● Assignment problems – Boolean expression-based problems
● Quizzes- 8085, 8051 concepts
● Class Presentation/Discussion- Architecture topics
Text Book(s):
1 M. Morris Mano, “Digital Design”, 4th Edition, Prentice Hall of India Pvt. Ltd., 2008 / Pearson Education
(Singapore) Pvt. Ltd., New Delhi, 2003.
2 Ramesh S. Gaonkar, “Microprocessor Architecture, Programming and Applications with 8085”, Sixth edition,
Penram International Publishing, 2012.
3 Mohamed Ali Mazidi, Janice GillispieMazidi, RolinMcKinlay, “The 8051 Microcontroller and Embedded
Systems: Using Assembly and C”, Second Edition, Pearson education, 2011.
Reference Book(s):
1 Charles H.Roth. “Fundamentals of Logic Design”, 7th Edition, Thomson Learning, 2014.
2 Krishna Kant, Microprocessor and Microcontroller Architecture, Programming and System design using 8085,
8086, 8051 and 8096, PHI, 2007, Seventh Reprint, 2011.
3 Douglas V. Hall, “Microprocessor and Interfacing, Programming and Hardware”, Revised 2nd Edition 2006,
eleventh reprint 2010.Tata McGraw Hill.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
EC23232.1 3 3 3 3 3 2 2 2 3 2 3 3 3 3 2
EC23232.2 3 3 3 3 3 2 1 1 3 2 2 3 3 3 2
EC23232.3 3 3 2 3 3 2 2 2 2 1 2 2 3 3 1
EC23232.4 3 3 3 3 3 2 1 1 3 2 3 3 3 3 1
EC23232.5 3 3 3 3 3 2 2 1 3 2 3 3 3 3 1
Average 3.0 3.0 2.8 3.0 3.0 2.0 1.6 1.4 2.8 1.8 2.6 2.8 3.0 3.0 1.4
Objectives:
● To understand the importance of the drawing in engineering applications
● To develop graphic skills for communication of concepts, ideas and design of engineering products
● To expose them to existing national standards related to technical drawings.
● To improve their visualization skills so that they can apply this skill in developing new products.
● To improve their technical communication skill in the form of communicative drawings
Course Outcomes: After learning the course, the students should be able
● To construct different plane curves and to comprehend the theory of projection
● To draw the basic views related to projection of lines and planes
● To draw the projection of simple solids and to draw the projection of development of surfaces of
Sectioned solids in simple vertical position
● To draw the orthographic projection from pictorial objects and Isometric projections of simple solids
● To visualize Perspective view of simple solids
Text Book(s):
1. Bhatt N.D. and Panchal V.M., “Engineering Drawing”, Charotar Publishing House, 50th Edition, 2010.
2. Natarajan K.V., “A text book of Engineering Graphics”, Dhanalakshmi Publishers, Chennai, 2017.
3. Graph Theory with Applications, J. A. Bondy and U. S. R. Murty, Macmillan Press, London.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
GE23111.1 3 2 2 1 - 1 - 2 2 2 - 2 - - -
GE23111.2 3 2 2 1 - 1 - 2 2 2 - 2 - - -
GE23111.3 3 2 2 1 - 1 - 2 2 2 - 2 - - -
GE23111.4 3 2 2 1 - 1 - 2 2 2 - 2 - - -
GE23111.5 3 2 2 1 - 1 - 2 2 2 - 2 - - -
Average 3 2 2 1 - 1 - 2 2 2 - 2 - - -
Objectives:
● To apply the concepts of Linked List in the applications of various linear data structures.
● To demonstrate the understanding of stacks, queues and their applications.
● To apply the concepts of Linked List in the applications of various nonlinear data structures.
● To understand the implementation of graphs and their applications.
● To be able to incorporate various sorting and hashing techniques in real time scenarios
List of Experiments
1 Implementation of Single Linked List (Insertion, Deletion and Display).
2 Implementation of Doubly Linked List (Insertion, Deletion and Display).
3 Implementation of Stack using Array and Linked List implementation.
4 Implementation of Queue using Array and Linked List implementation.
5 Implementation of Binary Search Tree and perform Tree Traversal Techniques.
6 Program to perform Quick Sort
7 Program to perform Merge Sort
8 Program to perform Linear Probing.
9 Program to perform Rehashing.
10 Mini Project:
● Contact book application using Linked List.
● Dictionary using Binary search trees.
● Snake Game.
● Chess Game.
● Travel Planner (Shortest Path Algorithm).
● Tic-Tac-Toe Game.
● Library Management System.
● Project Management System.
● other projects.
Contact Hours : 60
Total Contact Hours: 105
Platform Needed: GCC Compiler for Windows/Linux
SUGGESTED ACTIVITIES
● Role play- Linked List (Unit 1).
● Mind Map, Poster Design - Stack and Queue (Unit 2).
● Flipped Classroom - Binary Heap (Unit 3).
● Poster Design - Graph (Unit4).
● Implementation of small module- Hashing (Unit5).
Text Book(s):
1 “Data Structures and Algorithm Analysis in C”, Mark Allen Weiss, 2nd Edition, Pearson Education, 2005
2 “Data Structures and Algorithm Analysis in C++ - Anna University, Mark Allen Weiss, Pearson Education, 2017.
Reference Books(s):
1 “Data Structures Using C and C++”, Langsam, Augenstein and Tanenbaum, 2nd Edition, Pearson Education, 2015.
2 Thomas H. Cormen, Charles E. Leiserson, Ronald L.Rivest, Clifford Stein, Introduction to Algorithms”, Fourth
Edition, Mcgraw Hill/ MIT Press, 2022.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23231.1 1 2 1 2 1 - - - - - - 1 1 2 -
CS23231.2 1 1 2 1 1 - - - - - - 2 2 2 -
CS23231.3 1 1 2 1 1 - - - - - - 2 2 2 -
CS23231.4 1 1 2 1 1 - - - - - - 2 2 2 -
CS23231.5 1 1 2 1 1 - - - - - - 1 1 2 -
Average 1.0 1.2 1.8 1.2 1.0 - - - - - - 1.6 1.6 2.0 -
Objectives:
● To facilitate students to improve their vocabulary for a better communication
● To enable learners to understand and reproduce language
● To aid students to write technical reports in a convincing manner
● To expose students to different sentence structures
● To equip learners to present their ideas in an efficient manner
Text Book(s):
1 Raymond Murphy, “Intermediate English Grammar,” Second Edition, Cambridge University Press, 2018
2 Meenakshi Raman & Sangeeta Sharma, “Technical Communication” Third Edition, Oxford University
Press, 2015
3. Teaching Speaking: A Holistic Approach, Book by Anne Burns and Christine ChuenMeng Goh, Cambridge
University Press
Reference Book(s):
1 Michael McCarthy (Author), Felicity O'Dell (Author), John D. Bunting (Contributor), “Basic Vocabulary in
Use: 60 Units of Vocabulary Practice in North American English with Answers” 2nd Edition
2 Dale Carnegie, “The Art of Public Speaking,” Insight Press
3. Jack C. Richards & Theodore S. Rodgers, “Approaches and Methods in Language Teaching, Second Edition,
Cambridge University Press
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
HS23221. 1 - - - 1 - - - - - 2 - - - - -
HS23221. 2 - - - 1 - - - - - 3 - - - - -
HS23221. 3 - 2 - 1 - - - - - 3 - - - - -
HS23221. 4 - - - 1 - - - - 2 3 - - - - -
HS23221. 5 - - - 1 - - - - 2 2 - - - - -
Average - 2 - 1 0 0 0 0 2 2.6 - - - - -
Objectives:
● To facilitate the learners in acquiring listening and reading competence
● To enable the learners to communicate effectively through written and oral medium
● To assist the learners in preparing for competitive examinations
● To train the students in acquiring corporate skills
● To inculcate professional standards among the students and make them realize their responsibility
in addressing the challenges
Course Outcomes: After learning the course, the students should be able
● Interpret and respond appropriately in the listening and reading contexts.
● Express themselves effectively in spoken and written communication
● Apply their acquired language skills in writing the competitive examinations
● Exhibit their professional skills in their work place
● Identify the challenges in the work place and suggest strategies solutions
SUGGESTED ACTIVITIES
● Online Quizzes on Vocabulary
● Online Quizzes on grammar
● Communication Gap Exercises
● Presentations
● Word Building Games
● Case study
Reference Books(s):
1. Board of Editors. Sure Outcomes. A Communication Skills Course for Undergraduate Engineers and
Technologists. Orient Black Swan Limited, Hyderabad, 2013.
2. Hartley, Mary. “The Power of Listening,” Jaico Publishing House; First Edition (2015).
3. Chambers, Harry. “Effective Communication Skills for Scientific and Technical Professionals,” Persues
Publishing, Cambridge, Massachusetts, 2000.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
HS23222. 1 - 1 - - - - - - - 3 - - - - -
HS23222. 2 - 1 - - - - - - - 3 - - - - -
HS23222. 3 - - - - - - - - - 3 - - - - -
HS23222. 4 - - - - - - 2 2 - 3 - - - - -
HS23222. 5 - - 1 - - - 2 - - 3 - - - - -
Average - 1 1 - - - 2 2 - 3 - - - - -
Objectives:
● To provide hands-on experience on various basic engineering practices in Electrical Engineering.
● To provide hands-on experience on various basic engineering practices in Electronics Engineering.
List of Experiments
1 Residential house wiring using switches, fuses, indicators, lamp and energy meter.
2 Fluorescent lamp wiring.
3 Stair case wiring.
4 Measurement of electrical quantities – voltage, current, power & power factor in RL circuit.
5 Measurement of earth resistance using Megger.
6 Study of Ceiling Fan and Iron Box
B. ELECTRONICS ENGINEERING PRACTICE
Study of electronic components and equipment – Resistor, colour coding, measurement of AC signal parameters
1 (peak-peak, rms period, frequency) using CRO/DSO.
(a) Measurement of electrical quantities using Multimeter
2 (b) Testing of electronic components.
3 Study of logic gates: AND, OR, EXOR and NOT.
4 Generation of Clock Signals.
5 Soldering practice – Components Devices and Circuits – Using general purpose PCB.
6 Measurement of ripple factor of Half-wave and Full-wave Rectifiers.
Total Contact Hours : 30
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
GE23122.1 3 3 3 2 - - 2 - 3 2 - 3 - - -
GE23122.2 3 3 2 2 - - 2 - 3 2 - 3 - - -
GE23122.3 3 3 3 2 - - 2 - 3 2 - 3 - - -
GE23122.4 3 3 3 2 - - - - 3 2 - 3 - - -
GE23122.5 3 3 3 2 - - - - 3 2 - 3 - - -
Average 3 3 2.67 2 - - 2 - 3 2 - 3 - - -
Objectives:
● Learn the basics of Python Programming and Control statements
● Demonstrate various Python data structures like Lists, Tuples, Sets and dictionaries
● Understand about Strings, Functions, Modules and Regular Expressions in Python Programming
● Understand the concepts of file handling using Python
● Understand the concepts of Numpy, Pandas, sciPy modules
Text Book(s):
1. Charles Dierbach, “Introduction to Computer Science using Python - A computational Problem-solving
Focus”, Wiley India Edition, 2015.
2. Martin C. Brown, Python: The Complete Reference, Osborne/McHraw Hill, 2001
3. Wesley J. Chun, “Core Python Programming”, Pearson Education, Second Edition, 2007
● https://python-iitk.vlabs.ac.in/
● https://www.hackerrank.com/domains/python
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23221.1 3 2 2 1 - 1 - 2 2 2 - 2 - - -
CS23221.2 3 2 2 1 - 1 - 2 2 2 - 2 - - -
CS23221.3 3 2 2 1 - 1 - 2 2 2 - 2 - - -
CS23221.4 3 2 2 1 - 1 - 2 2 2 - 2 - - -
CS23221.5 3 2 2 1 - 1 - 2 2 2 - 2 - - -
Average 3 2 2 1 - 1 - 2 2 2 - 2 - - -
Objectives:
● To develop the understanding of environmental and associated issues
● To develop an attitude of concern for the environment
● To promote enthusiasm in participating environmental protection initiatives
● To develop skills to solve environmental degradation issues
Text Book(s):
1 Benny Joseph, ‘Environmental Science and Engineering’, Tata McGraw-Hill, New Delhi, 2016
2 Anubha Kaushik and C. P. Kaushik’s “Perspectives in Environmental Studies”, 6th Edition, New Age
International Publishers ,2018.
3 Johri R., E-waste: implications, regulations, and management in India and current global best practices, TERI Press,
New Delhi
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
MC23112. 1 - - - 1 - - - - - 3 - - - 2 -
MC23112. 2 - - - 1 - - - - - 3 - - 2 - -
MC23112. 3 - 1 - 1 - - - - - 3 - - 2 - -
MC23112. 4 - - - 2 - - - - 1 3 - - 3 - 1
MC23112. 5 - - - 1 - - - - 1 3 - - 1 - -
Average - 1.0 - 1.2 - - - - 1 3 - - 2.0 2 1.0
Objectives:
● To express Fourier series to study the behaviour of periodic functions and their applications in system
communications, digital signal processing and field theory.
● To represent continuous function arising in wave and heat propagation, signals and systems using Fourier
Transforms
● To provide various numerical methods in solving problems that occurs in the field of Engineering and
Technology.
● To introduce and apply the concepts of finite fields and congruences.
● To present a rigorous development of Number Theory using axioms, definitions, examples, theorems and
their proofs.
SUGGESTED ACTIVITIES
● Problem solving sessions
● Tutorial Sessions by involving two faculty members
Text Books:
Erwin Kreyszig, "Advanced Engineering Mathematics", 10th Edition, Wiley India, 2015.
1
Veerarajan. T., "Transforms and Partial Differential Equations", Tata McGraw Hill Education Pvt.Ltd.,New Delhi,
2 Second reprint, 2016.
Grimaldi, R.P and Ramana, B.V., "Discrete and Combinatorial Mathematics", Pearson Education, 5th Edition, New
3 Delhi, 2007.
Koshy, T., “Elementary Number Theory with Applications”, Elsevier Publications, New Delhi, 2002.
4
Grewal B.S., "Higher Engineering Mathematics", 43rd Edition, Khanna Publishers, Delhi, 2014.
5
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
MA23312.1 3 3 3 2 1 - - - - - - 1 2 1 2
MA23312. 2 3 3 3 2 1 - - - - - - 1 2 1 2
MA23312. 3 3 3 3 2 2 - - - - - 1 2 1 2 2
MA23312. 4 3 3 3 2 2 - - - - - 1 2 1 2 2
MA23312.5 3 3 3 3 2 - - - - - - 2 1 2 2
Objectives:
● To learn the basic Instructions, its operations and the concept of runtime in a system.
To familiarize the students with arithmetic and logic unit and implementation of fixed point and floating-point
●
arithmetic operations.
● To create a pipelined MIPS processor with optimized data and control paths and how the pipeline processor
works based on the execution of overlapping instructions
● To explore instruction-level parallelism with the aim of comprehending and enhancing the efficiency of
multicore processors.
To expose students to memory system design and methods of interfacing with I/O devices and standard I/O
●
interfaces to facilitate learning and understanding.
Text Books:
1 David A. Patterson and John L. Hennessey, “Computer organization and design”, 5th edition, Elsevier, 2014.
Reference Books:
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23311.1 2 2 1 1 - - 1 - - - - - 2 2 2
CS23311.2 3 3 1 2 - - - - 2 - 1 - 2 2 2
CS23311.3 2 2 3 1 2 1 2 - - - 2 - 2 2 2
CS23311.4 2 2 2 1 2 2 2 - - - 2 1 2 2 2
CS23311.5 2 2 3 1 2 2 2 - - - 2 - 3 3 2
Average 2.2 2.2 2.0 1.2 2.0 1.7 1.8 - 2.0 - 1.8 1.0 2.2 2.2 2.0
Objectives:
● Learn and understand the algorithm analysis techniques and complexity notations
● Become familiar with the different algorithm design techniques for effective problem solving in computing.
● Learn to apply the design techniques in solving various kinds of problems in an efficient way.
● Understand the limitations of Algorithm power.
● Solve variety of problems using different design techniques
List of Experiments
1 Finding Time Complexity of algorithms
2 Design and implement algorithms using Divide and Conquer Technique
3 Design and implement algorithms using Greedy Technique
4 Design and implement algorithms using Dynamic Programming
5 Competitive Programming-Certain Techniques
Contact Hours: 30
Total Contact Hours: 75
Textbooks:
1. Anany Levitin, “Introduction to the Design and Analysis of Algorithms”, Third Edition, Pearson Education,
2012.
2. Ellis Horowitz, Shani, Sanguthevar Rajasekaran, "Computer Algorithms" Universities Press, Second Edition
2008.
3. Thomas H.Cormen, Charles E.Leiserson, Ronald L. Rivest and Clifford Stein, “Introduction to Algorithms”,
Third Edition, PHI Learning Private Limited, 2012.
5. https://www.hackerrank.com/domains/algorithms
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23331.1 3 - - - - - - - - - - 1 3 2 2
CS23331.2 2 3 2 2 - - - - - - - 1 3 3 1
CS23331.3 2 3 2 2 - - - - - - - 1 3 3 1
CS23331.4 2 3 2 2 - - - - - - - 1 3 3 1
CS23331.5 1 2 2 2 - - - - - - - 1 3 3 1
Average 2.0 2.8 2.0 2.0 - - - - - - - 1.0 3.0 2.8 1.2
Objectives:
● Understand the role of a database management system and construct simple and moderately advanced
database queries using Structured Query Language (SQL).
● Apply logical database design principles, including E-R diagrams, Relational Algebra, Tuple Relational
calculus Representation and Query Processing
● Know the importance of functional dependency and normalization, and what role it plays in the database
design process and File Organization.
● Understand the concept of a database transaction including concurrency control, backup and recovery, and
data object locking and handling deadlocks.
● Work with the foundation for No SQL technologies and web page designing
Textbooks:
1. Abraham Silberschatz, Henry F. Korth and S. Sudharshan, “Database System Concepts”, Seventh Edition,
Mc Graw Hill, March 2019.
2. P. J. Sadalage and M. Fowler, "NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot
Persistence", Addison-Wesley Professional, 2013.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23332.1 2 2 2 - - - - - 1 - - 1 2 2 -
CS23332.2 2 2 3 3 3 - - - 2 1 2 1 2 1 -
CS23332.3 2 2 2 2 2 - - - 2 1 2 1 1 2 1
CS23332.4 2 2 2 2 2 - - - 1 1 - - 1 2 1
CS23332.5 2 2 2 4 2 - - - 2 - 2 2 1 2 3
Average 2.0 2.0 2.2 2.8 2.3 - - - 1.6 1.0 2.0 1.3 1.4 1.8 1.7
Objectives:
● To understand Object Oriented Programming concepts and characteristics of Java.
● To know the principles of classes, abstraction and inheritance.
● To create packages, define exceptions and use interface.
● To use I/O streams and collections in applications.
● To design and build simple programs using Streams, Lambda and JDBC
List of Experiments
1 Programs using control structures.
2 Programs using arrays.
3 Programs using strings and string buffer.
4 Programs using classes and objects.
5 Programs using inheritance.
6 Programs using default & static methods in interfaces.
7 Programs using functional interface.
8 Programs to create user defined exceptions.
9 Programs to implement Object Serialization.
10 Programs using collections-LIST.
11 Programs using collections-SET.
12 Programs using collections-MAP.
13 Programs using STREAMS.
14 Programs using LAMBDA.
15 Simple applications using JDBC.
Contact Hours: 90
Total Contact Hours: 105
Suggested Activities:
● Quizzes – basic concepts of JAVA & language basics.
● Tutorial – Class & Inheritance.
● Flipped Classroom – Packages & Interface.
● Mind Map, Poster Design – IO & Collections.
● Implementation of small Systems- JDBC.
Textbooks:
1. Herbert Schildt, “Java the Complete Reference”, 9th Edition, McGraw Hill Education, 2014
2. Cay S. Horstmann, Gary Cornell, “Core Java Volume –I Fundamentals”, 9th Edition, Prentice Hall, 2013.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23333.1 3 3 3 2 - - - - - - - - 3 3 2
CS23333.2 3 3 3 2 - - - - - - - - 3 3 2
CS23333.3 3 3 3 3 - - - - - - - - 3 3 3
CS23333.4 3 3 3 3 3 - - - - - - 3 3 3 3
CS23333.5 3 3 3 3 3 - 2 - 2 2 3 3 3 3 3
Average 3 3 3 2.6 3 - 2 - 2 2 3 3 3 3 2.6
Objectives:
● To understand the fundamental concepts of data science.
● To understand data cleaning and processing for data science.
● To learn the fundamentals of exploratory data analysis (EDA).
● To understand inferential data analytics
● To understand the Machine Learning concepts.
List of Experiments
1. Do a data exploratory analysis to develop deep insights from a dataset.
2. A python program to perform pre-processing on tabular and text data.
3. A python program to perform augmentation on Image data.
4. A python program to compute outlier in a given data set.
5. A python program to handle Missing and inappropriate data in a given data set.
6. A python program to perform EDA-Quantitative and Qualitative analysis.
7. A python program to perform Random Sampling and Sampling Distribution.
8. A python program to perform Z test, T test and Annova Test.
9. Time Series Analysis - sentimental Analysis.
10. A python program to analyse Linear & logistic Regression.
11. A python program to do classification using Support Vector Machines.
12. A python program to analyse KNN and K-means clustering.
Contact Hours: 30
Total Contact Hours: 75
● Explain how data is collected, managed and processed for data science
Suggested Activities:
● Assignment problems, Quiz.
● Class presentation/Discussion
Textbooks:
1. Sanjeev J. Wagh, Manisha S. Bhende, Anuradha D. Thakare, “Fundamentals of Data Science”, CRC Press,
2022
2. Introducing Data Science, Davy Cielen, Arno D. B. Meysman, Mohamed Ali, Manning Publications Co., 1st
edition, 2016
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23334.1 2 2 1 2 2 - - - 1 1 1 2 2 2 2
CS23334.2 2 1 - 1 1 - - - 2 1 1 2 2 3 1
CS23334.3 2 2 1 2 2 1 1 - 1 2 1 3 2 2 3
CS23334.4 3 2 2 1 2 - - - 1 1 2 2 3 3 2
CS23334.5 2 2 1 2 2 - - - 1 1 1 2 2 2 2
Average 2.2 1.8 1.25 1.6 1.8 1 1 - 1.2 1.2 1.2 2.2 2.2 2.4 2
Common to IV Sem. B.E. – Computer Science and Engineering & Computer Science and Engineering
(Cyber Security) and B.Tech. – Information Technology
Objectives:
● To introduce the basic concepts of probability, one dimensional random variable.
● To solve the problems those are faced in testing of a hypothesis with reference to the errors in decision
making.
● To construct and analyse models using Markov Chains.
● To acquire skills in analysing queuing models.
● To set up appropriate simulation models together with their parameterization and the analysis of simulator
output data.
UNIT-I PROBABILITY 9
One dimensional Discrete and continuous random variables – Moments – Moment generating functions – Binomial,
Poisson, Uniform and Normal distributions, Two dimensional Discrete and continuous random variables – Conditional
and Marginal densities.
UNIT-II STATISTICAL TESTING 9
Maximal Likelihood estimation – Parameters of Binomial and Poisson distribution - Tests of significance – Z test:
Single
mean, difference of means- Chi square - F test.
UNIT-III MARKOV MODELS 9
Introduction to Discrete stochastic process - Definition and examples - Markov Process – Discrete Parameter Markov
chain – Chapman Kolmogorov theorem (without proof) -State transitions- state probabilities - properties – steady state
analysis – absorbing chains – Case study: Markov Analysis of Dynamic memory allocations, Markov models for
Manufacturing production capability.
UNIT-IV QUEUING THEORY 9
Markovian queues – Birth and Death processes – Queueing Models - (M/M/1) :(GD/∞/∞), (M/M/1) :(GD/K/∞),
(M/M/C) :( GD/∞/∞), (M/M/C) :( GD/K/∞), (M/G/1) :(GD/∞/∞).
UNIT-V SIMULATION 9
Simulation: simulation concepts, simulation of a queuing system using event list - Pseudo random numbers -
Multiplication Congruential Algorithm - Inverse transformation method - Basic ideas of Monte-Carlo simulation.
Total Contact Hours: 45
SUGGESTED ACTIVITIES
● Problem solving sessions
● Smart Class room sessions
Text Book(s):
1. Hamdy A Taha, Operations Research: An Introduction, Prentice Hall India, Tenth Edition, 2019.
2. Hwei Hsu, “Schaums Outline of Theory and Problems of Probability, Random Variables and Random
Processes”, Tata Mcgraw Hill Edition, New Delhi, 1997.
3. Al-Begain. H., and Bargiela, A., Eds., “Seminal Contributions to Modelling and Simulation.” Springer,
2016.
4. Thomas L. Saaty Elements of Queueing theory with applications, 1983.
5. M. W. Carter, C. C. Price and G. Rabadi, “Operations research a practical introduction” second edition,
2019. CRC Press.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
MA23435.1 3 3 2 2 1 - - - - - - 2 2 1 2
MA23435.2 3 3 2 2 1 - - - - - - 2 2 1 2
MA23435.3 3 3 3 3 2 - - - - - 2 2 3 1 2
MA23435.4 3 3 3 3 3 - - - - - 1 2 3 1 2
MA23435.5 3 3 3 3 2 - - - - - 2 2 3 1 2
Average 3.0 3.0 2.6 2.6 1.8 - - - - - 1.7 2.0 2.6 1.0 2.0
Objectives:
● To study the basic concepts and functions of operating systems.
● To learn about Processes, Threads, Scheduling algorithms
● To understand the process of synchronization and deadlock issues
● To learn and understand the Memory management systems.
● To learn I/O Management and File Systems.
List of Experiments
1 Basic Unix/Linux commands
2 Study of Unix editors: sed,vi,emacs
3 Text processing using Awk script
4 System calls –fork(), exec(), getpid(),opendir(), readdir()
5 Scheduling algorithms – FCFS, SJF, Priority and RR
6 Inter-process Communication using Shared Memory
7 Producer Consumer Problem Solution using Semaphore
8 Bankers Deadlock Avoidance algorithm
9 Contiguous Memory Allocation - First Fit and Best Fit
10 Page Replacement Algorithms - FIFO & LRU
11 File Organization Technique- single- and Two-level directory
12 Installation and Configuration of Linux in a Virtual Machine
13 Schedule Cron Tasks – scripts to run on boot, backup and shutdown at a particular time
14 Building a Simple Loadable Kernel Module for basic operations
15 Building Linux RPM package from source
Contact Hours 60
Total Contact Hours 105
Suggested Activities:
● Compare the DOS and Linux Commands
● Design and Analysis of various CPU scheduling algorithm
● Implement an algorithm for synchronization
● Analysis various page replacement algorithms
● Study the various management algorithms used in Windows, Linux am Android OS
Textbooks:
1. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating System Concepts”, 10th Edition, John
Wiley and Sons Inc., 2018.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23431.1 2 - - - 3 - 1 - 1 2 2 2 3 - 1
CS23431.2 2 2 2 1 2 - - - 2 - 2 2 2 3 2
CS23431.3 2 2 2 1 2 - - - 1 - 2 2 2 3 2
CS23431.4 2 2 - - 2 - - - 2 - 2 2 3 2 1
CS23431.5 2 - 1 - 2 - - 1 1 - 2 2 3 - 2
Average 2.0 2.0 1.7 1.0 2.2 - 1.0 1.0 1.4 2.0 2.0 2.0 2.6 2.7 1.6
Objectives:
● Students can gain a comprehensive understanding of Azure's infrastructure, including virtual machines,
networking, storage, and security services, to effectively deploy and manage software applications.
● Students can learn cloud-native development practices and principles, leveraging Azure services such as
Azure App Service, Azure Functions for building scalable and resilient software solutions.
● Students can explore CI/CD pipelines using Azure DevOps, GitHub Actions, or Azure Pipelines to automate
the build, test, and deployment processes, ensuring rapid and reliable software delivery.
● Students can develop skills in monitoring and diagnostics using Azure Monitor and Application Insights,
enabling proactive identification and resolution of performance issues and errors in software applications.
● Students can understand security best practices for software construction in Azure, including identity and
access management (IAM), data encryption, network security to build secure and compliant software solutions.
List of Experiments
1 Develop User Stories for the respective projects that has been assigned (both FR and NFR) in Azure Board
2 Develop the Business Architecture, Conceptual and Logical Model for the entities defined in the project
3 Develop the Class Diagram for these defined entities with all attributes and the associated methods
4 Develop the Sequence diagram for atleast 2 use stories for the respective project
5 Develop the Architecture diagram (using MVC) for the respective project (picking a template for Azure
Architecture Center)
6 Identify which SOLID design principles would be applicable and write the design document for the same
7 Develop a view of the github repository in terms of code, design, test plans, test cases etc and showcase the
same in Azure Repos
8 Develop Test Plans, test cases for the user stories
9 Develop a CI/CD pipeline using Azure DevOps to test the Architecture and Design
10 Showcase the CI/CD pipeline using Azure DevOps for a single user story
Contact Hours : 30
Suggested Activities:
● Assignment problems, Quiz.
● Class presentation/Discussion
Textbooks:
1. Design Patterns, Elements of Reusable Object-Oriented Software (Gang of Four) (Erich Gamma, Richard
Helm, Ralph Johnson etc.)
2. Patterns of Enterprise Application Architecture (Martin Fowler)
3. Beginning Software Engineering by Rod Stephens
4. Fowler, MartinBeck, Kent, Roberts, Refactoring Improving the Design of Existing Code
5. Clean Architecture by Robert C. Martin
6. Head First Design Patterns by Eric Freeman, Elisabeth Robson
7. Building Microservices Designing Fine-Grained Systems by Sam Newman
8. Vladimir Khorikov. Unit Testing Principles, Practices, and Patterns
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23432.1 2 2 3 2 2 2 2 2 2 2 3 2 1 3 -
CS23432.2 2 3 1 2 2 1 - 1 1 1 2 - 1 2 -
CS23432.3 2 2 1 1 1 1 1 1 1 1 1 1 2 2 1
CS23432.4 2 2 3 2 2 2 1 0 2 2 2 1 1 2 1
CS23432.5 2 2 2 1 1 1 1 0 2 1 1 1 2 1 -
Average 2.0 2.2 2.0 1.6 1.6 1.4 1.3 1.3 1.6 1.4 1.8 1.3 1.4 2.0 1.0
Objectives:
● To understand the design thinking concepts and deep understanding of user needs and experiences.
● To find the problem statement and to develop innovative design solutions that address identified user challenges
● To master the process of prototyping and iterating on designs
● To conduct thorough market analysis and financial planning
● To effectively communicate design concepts and findings.
Assessment:
● Encourage students to work on real-world design challenges based on the user needs
● Group presentations
● Quizzes and exams
● Evaluation of Project report and viva and also encourage the students for filing patent/ copyright / presenting in
conference / publishing in journal
Text Book(s):
1 Handbook of Design Thinking by Christian Müller-Roterberg, Kindle Direct Publishing, 2018.
2 Design Thinking – A Beginner’s Perspective, by E Balagurusamy, Bindu Vijakumar, MC Graw Hill, 2024
Reference Books:
1 Design Thinking for Entrepreneurs and Small Businesses: Putting the Power of Design to Work – by Beverly Rudkin
Ingle, Apress; 1st ed. Edition, 2013
2 Design Thinking: Understanding How Designers Think and Work by Nigel Cross, Bloomsbury Visual Arts; 2 editions
2023
Web links:
1 Design thinking Guide https://www.rcsc.gov.bt/wp-content/uploads/2017/07/dt-guide-book-master-copy.pdf
2 NPTEL Course on Design Thinking and Innovation By Ravi Poovaiah;
https://onlinecourses.swayam2.ac.in/aic23_ge17/preview
3 IITB Design course tools and Resources https://www.dsource.in/resource
CO - PO – PSO matrices of course
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
GE23627.1 3 2 3 3 3 2 2 3 3 3 3 3 3 2 2
GE23627.2 3 2 3 3 3 2 2 3 3 3 3 3 3 2 2
GE23627.3 3 2 3 3 3 2 2 3 3 3 3 3 3 2 2
GE23627.4 3 2 3 3 3 2 2 3 3 3 3 3 3 2 2
GE23627.4 3 2 3 3 3 2 2 3 3 3 3 3 3 2 2
Average 3 2 3 3 3 2 2 3 3 3 3 3 3 2 2
Objectives:
● To help students break out of shyness.
● To build confidence
● To enhance English communication skills.
● To encourage students’ creative thinking to help them frame their own opinions.
Learning and Teaching Strategy:
The program is completely student centric where the focus is on activities led by students which include role plays,
discussions, debates other games as well. These activities would be supplemented by interactive use of technology and brief
trainer input.
Week Activity Name Description Objective
1 Introduction The trainer and the college facilitator talk to To set expectations about the course and the
the students about the course and in turn the students are made aware of the rules and
students introduce themselves. regulations involved in this program
2 If I ruled the world This is a quick and useful game by getting The aim of this activity is to for students to
students to form a circle and provide their get to know each other and also develop their
point of view. Each student then repeats what listening skills as well as learning how to
the other has said and comes up with their agree and disagree politely.
own opinion.
3 Picture Narrating This activity is based on several sequential The aim of this activity is to make the
pictures. Students are asked to tell the story students develop creative way of thinking.
taking place in the sequential pictures by
paying attention to the criteria provided by
the teacher as a rubric. Rubrics can include
the vocabulary or structures they need to use
while narrating.
4 Brainstorming On a given topic, students can produce ideas The activity aims at making the students
in a limited time. Depending on the context, speak freely without the fear of being
either individual or group brainstorming is criticized. It also encourages students to
effective and learners generate ideas quickly come up with their own opinions.
and freely. The good characteristics of
brainstorming are that the students are not
criticized for their ideas so students will be
open to sharing new ideas.
5 Debate Is competition necessary in regards to the The aim of this activity is to develop the
learning process? students ability to debate and think out of the
box
6 Short Talks Here the students are given topics for which The activity aims at breaking the students’
they take one minute to prepare and two shyness and encouraging them to standup in
minutes to speak. They can write down front of the class and speak. It also aims at
points but can’t read them out they can only creating awareness that they are restricted for
use it as a reference. time so they only speak points that are
relevant and important.
7 Debate Will posting students’ grades on bulletin This activity aims at enhancing the students
boards publicly motivate them to perform unbiased thought process when it comes to
better or is it humiliating? exams and grades as well as develop their
skills to debate
8 The Art of The facilitator proceeds to share multiple The aim of the lesson is to provide an
diplomacy concepts of conversation and helps the opportunity for the participants to learn about
participants to identify the various methods body language and choosing the appropriate
of being diplomatic and how do deal with words for conversation.
misinformation.
9 Debate Are humans too dependent on computers? The aim of this activity is to test the students
debating skills and thought process with a
topic that affects everybody in daily life.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
GE23421.1 - - - - - 2 - 2 3 3 2 3 - - 3
GE23421.2 - - - - - 2 - 2 3 3 2 3 - - 3
GE23421.3 2 3 3 3 2 - - 2 2 2 2 3 2 3 3
GE23421.4 - 2 - - - - - - 3 3 2 3 - - 3
GE23421.5 - 2 - - - - - - 3 3 2 3 - - 3
Average 2 2.33 3 3 2 2 - 2 2.8 2.8 2 3 2 3 3
Objectives:
● To understand basic concepts of formal languages of automata.
● To build regular expression and language models.
● To construct context-free grammar and automata
● To comprehend Turing machines and their capabilities.
● To evaluate a computing problem's decidability and intractability
Suggested Activities:
● Assignment problems, Quiz.
● Class presentation/Discussion
Textbooks:
1. John E. Hopcroft, Rajeev Motwani and Jeffrey D. Ullman, “Introduction to Automata Theory, Languages,
and Computation”, Third Edition, Pearson Education, 2013.
2. John C Martin, “Introduction to Languages and the Theory of Computation”, Fourth Edition, Tata McGraw
Hill Publishing Company, New Delhi, 2011.
2. Peter Linz, "An Introduction to Formal Language and Automata", 6th Edition, Jones & Bartlett, 2016.
3. Harry R Lewis and Christos H Papadimitriou, "Elements of the Theory of Computation", 2nd Edition, Prentice
Hall of India, 2015.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23511.1 2 2 - - - - - - - - - - 2 - -
CS23511.2 2 3 1 1 - - - - - - 1 - 2 1 -
CS23511.3 2 2 1 - - - - - - - - - 2 2 -
CS23511.4 2 3 2 1 - - 1 - 1 - 1 - 2 2 -
CS23511.5 2 2 2 - - 1 - - - 1 - - 2 1 2
Average 2.0 2.4 1.5 1.0 - 1.0 1.0 - 1.0 1.0 1.0 - 2.0 1.5 2.0
Objectives:
● To learn about the principles, characteristics, trends, latest development, systems issues in mobile
technology
● To understand the fundamentals of mobile computing and background knowledge to understand quantum
computing concepts and their relevance to mobile computing.
● To infer knowledge about the various technologies used in mobile computing
● To be familiar with wireless technologies and learn about Quantum encryption for mobile security in
Mobile devices
● To gain knowledge about different mobile platforms and application development
Textbooks:
1. Asoke Talukder, Hasan Ahmed and Roopa R yavagal “Mobile computing Technology, Application and
service creation”, Second edition, McGraw Hill, 2010
2. Jochen Schiller, “Mobile Communications”, Second Edition, Pearson, 2004
3. Eleanor G. Rieffel and Wolfgang H. Polak, “Quantum Computing: A Gentle Introduction"
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23512.1 3 2 0 0 1 2 2 2 2 1 0 1 2 1 1
CS23512.2 2 2 0 0 1 1 2 1 2 0 0 2 1 1 1
CS23512.3 2 2 0 0 2 1 1 2 2 0 0 1 1 2 1
CS23512.4 1 1 0 0 1 1 3 2 3 1 0 1 2 2 2
CS23512.5 3 2 0 0 2 1 2 1 3 1 0 2 3 3 3
Average 2.2 1.8 - - 1.4 1.2 2.0 1.6 2.4 1.0 - 1.4 1.8 1.8 1.6
Objectives:
● To convey the Internet and Its Application in Real world.
● To introduce the fundamentals of web programming through HTML and CSS.
● To establish the application of Javascript in designing interactive web pages.
● To investigate various elements of ReactJS and design user interfaces to deploy in the real time.
List of Experiments
1 Explore various terminologies related to Internet (ISP, Email, Telnet, FTP, Web browsers, Search Engines)
2 Experiment the use of basic HTML elements.
3 Demonstrate the applications of Lists, Tables, Images, Section, article and aside elements.
4 Investigate the various components of CSS.
5 Develop web pages using HTML and various elements of CSS.
6 Designing simple dynamic webpages using Javascript.
7 Build web pages using While Loop, External JavaScript Files, do Loop, Radio Buttons, Checkboxes, for Loop -
fieldset and legend Elements.
8 Manipulating CSS with JavaScript- Using z-index to Stack Elements-Textarea Controls - Pull-Down Menus- List
Boxes- Canvas and Drawing - Event Handler and Listener.
9 React Environment Setup - ReactJS Basics - React JSX - React Components: React Component API.
10 Understand React Component Life Cycle and apply React Constructors - React Dev Tools - React Native vs
ReactJS
11 Envisage React Dataflow: React State - React Props - React Props Validation - Styling React - Hooks and
Routing
12 Deploying React - Case Studies for building dynamic web applications.
Contact Hours: 90
Textbooks:
1. Dean, J., Web Programming with HTML5, CSS, and JavaScript. Jones & Bartlett Learning, 2018. 2. Minnick
2. C. Beginning ReactJS foundations building user interfaces with ReactJS: An Approachable Guide, OReillly,
2022.
Reference books:
Harvey M Deitel, Paul J Deitel and Tem R Nieto, Internet and World Wide Web How to Program, Pearson,
1.
6th Edition, 2020.
Rebah, H.B., Boukthir, H. and Chedebois, A., Website Design and Development with HTML5 and CSS3.
2.
John Wiley & Sons, 2022.
Laura Lemay, Rafe Colburn and Jennifer Kyrnin, Mastering HTML, CSS and Javascript Web Publishing,
3.
BPB Publication, 1st Edition, 2016.
Alex Banks and Eve Porcello, Learning React: Functional Web Development with React and Redux, O’Reilly
4.
Publishers, 1st Edition, 2017
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23531.1 3 3 3 3 3 3 2 2 3 - 1 3 3 3 2
CS23531.2 3 3 3 3 3 3 - - - - 1 1 3 3 2
CS23531.3 3 3 3 3 3 - - 2 2 - 2 2 3 3 3
CS23531.4 3 3 3 3 3 - - - 2 2 2 3 3 3 3
CS23531.5 3 3 3 3 3 2 2 2 - - 3 3 3 3 3
Average 3 3 3 3 3 1.8 2 2 2.3 2 1.8 2.4 3 3 2.6
Objectives:
● Understand the concepts of computer networks and error detection-correction of data.
● Be exposed to various addressing schemes and routing protocols.
● Learn the Transport Layer, flow control and congestion control algorithms
● Be familiar with real time applications of networking devices and tools.
● To configure different devices and trace the flow of information between nodes in the network using
various tools
List of Experiments
1 Basic Networking Commands in Linux and Windows operating systems
2 Learning and Assignment of IP Address manually to computers
3 Study of different types of Network Cables and Crimping of cable with RJ45 connector
4 Implement packet sniffing using raw sockets in python
5 Develop a customized ping command to test the server connectivity
6 Building anonymous FTP Scanner using ftplib module
7 Develop a simple calculator using XMLRPC
8 Develop a program to create reverse shell using TCP sockets
9 Design a simple topology and configure with one router, two switches and PCs using Cisco Packet
Tracer
10 Customize Switch with Network Modules using Cisco Packet Tracer
11 Examine Network Address Translation (NAT) using Cisco Packet Tracer
12 Nmap to discover live hosts using ARP scan, ICMP scan, and TCP/UDP ping scan in TryHackMe
Platform.
13 Demonstrate network forensics using PcapXray tool
14 To capture, save, and analyze network traffic on TCP / UDP / IP / HTTP / ARP /DHCP /ICMP /DNS
using Wireshark Tool
15 To Analyze the different types of servers using Webalizer tool
Contact Hours: 60
Total Contact Hours: 105
Suggested Activities:
● Assignment problems based on GATE, Quiz.
● Class presentation/Discussion
Text Books(s):
Larry L. Peterson, Bruce S. Davie, “Computer Networks: A Systems Approach”, Sixth Edition,
1
Morgan Kaufmann Publishers Inc., 2021.
2 Behrouz A. Forouzan, “Data Communications and Networking”, Fifth Edition, McGrawHill, 2017.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23532.1 3 2 1 0 3 1 1 1 1 0 1 1 2 1 1
CS23532.2 2 2 1 0 2 1 1 0 0 0 2 2 1 1 1
CS23532.3 3 3 1 0 3 0 1 0 0 0 2 1 2 3 2
CS23532.4 2 3 0 0 3 1 1 1 0 0 2 2 1 2 3
CS23532.5 3 2 2 2 3 0 1 1 0 0 3 3 3 3 3
Average 2.6 2.4 1.3 2.0 2.8 1.0 1.0 1.0 1.0 0.0 2.0 1.8 1.8 2.0 2.0
Objectives:
● To introduce the fundamentals of Artificial Intelligence and intelligent agents.
● To develop an understanding of heuristic-based problem-solving approaches.
● To apply game theory and constraint satisfaction strategies for intelligent decision making.
● To learn logical reasoning through propositional and first-order logic systems.
● To understand and apply probabilistic reasoning under uncertainty using Bayesian networks.
List of Experiments
1. Implement Depth-Limited Search (DLS) in Python
2. Implement Uniform Cost Search to Find the Least-Cost Path in a Graph.
3. Create a Python program to perform A* search on a weighted graph.
4. Solve the water jug/8 puzzle problem with depth first search using python.
5. Solve the 8 puzzle problem using python.
6. Implement the Minimax algorithm in Python to determine the best move in a simplified game tree.
7. Solve a Python Program to Solve N-Queens Using Recursion and Backtracking.
8. Implement a Console-Based Tic-Tac-Toe Game in Python.
9. Write a Python program that solves the Travelling Salesman Problem (TSP) using a backtracking algorithm.
10. Implement a simple Bayesian Network in Python to demonstrate probabilistic reasoning.
11. Mini- Project
Contact Hours : 30
Total Contact Hours : 75
Text Books:
1 S. Russell and P. Norvig, Artificial Intelligence: A Modern Approach, Pearson, Fourth Edition, 2022.
Reference Books:
1 Elaine Rich, Kevin Knight, & Shivashankar B Nair, Artificial Intelligence, McGraw Hill, 3 rd ed.,2017.
2 Introduction to Artificial Intelligence & Expert Systems, Patterson, Pearson, 1 st ed. 2015
3 Logic & Prolog Programming, Saroj Kaushik, New Age International, Ist edition, 2002
4 Expert Systems: Principles and Programming,11 March 1998. Edition: 4th. ISBN: 9788131501672
Reference Links:
1 https://sites.cs.ucsb.edu/~yuxiangw/classes/AICourse-2022Spring/
2 https://web.stanford.edu/class/archive/cs/cs221/cs221.1196/
3 https://redirect.cs.umbc.edu/~ypeng/AICourseOld/471-671.html
4 http://ai.berkeley.edu/lecture_slides.html
5 https://www.cs.utexas.edu/~mooney/cs343/
6 https://courses.cs.washington.edu/courses/csep573/22wi/
7 https://www.cse.iitd.ac.in/~rohanpaul/teaching/2022-col333.html
8 https://courses.grainger.illinois.edu/ece448/sp2022/
SUGGESTED ACTIVITIES
● Case study Discussion
● Flipped classroom – Comparing of Different Algorithms
● Activity Based Learning, Quiz, Mind Mapping
CO-PO-PSO-Mappings
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23533.1 3 3 - 2 2 - - - - - - 2 3 2 2
CS23533.2 3 3 2 2 3 - - - - - - 2 3 3 2
CS23533.3 3 3 2 2 3 - - - - - - 2 3 2 2
CS23533.4 3 3 3 3 3 2 2 2 2 2 2 3 3 3 2
CS23533.5 3 3 2 2 3 - - - - - - 2 3 2 2
3 3 2.25 2.2 2.8 2 2 2 2 2 2 2.2 3 2.4 2
Correlation levels 1, 2 or 3 are as defined below:
1: Slight (Low) 2: Moderate (Medium) 3: Substantial (High) No correlation: “-”
Objectives:
● To help students break out of shyness.
● To build confidence
● To enhance English communication skills.
● To encourage students’ creative thinking to help them frame their own opinions.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
GE23521.1 - - - - - - - - 3 3 2 3 - - 2
GE23521.2 - - - - - - - - 3 3 2 3 - - 2
GE23521.3 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2
GE23521.4 - - - - - - - - 3 3 2 3 - - 2
GE23521.5 - - - - - - - - 3 3 2 3 - - 2
Objectives:
● Gain a solid understanding of Generative AI, its applications, and ethical considerations.
● Learn the foundations of NLP and how transformer models work
● Develop the skills to design, refine and optimize prompts for various tasks
● Create practical AI powered tools like chatbots and content generators
● Analyze and mitigate ethical and technical challenges in Generate AI
List of Experiments
1 Generative AI
a Explore Pre-Trained Gen AI Tools
- Use ChatGPT to generate text and DALL-E to create images
- Analyze the outputs and discuss their quality and limitations
Ethical Implications Exercise
- Identify potential ethical issues in AI-generated content
- Write a short report on how to mitigate these issues
2 Foundations of NLP
Text processing with Python
a
- Use libraries like spaCy or NLTK to tokenize and preprocess text data
Fine Tune a Pre-Trained Model
- Use Hugging Face to fine-tune a transformer model to simple NLP task(eg sentimental analysis)
Text Book(s):
Ian Goodfellow, Yoshua Bengio, and Aaron Courville, Deep Learning, MIT Press, 2016, 1st Edition.
1
Lane, Howard, and Hapke, Natural Language Processing in Action, Manning Publications, 2019, 1st Edition.
2
Ben, The Art of Prompt Engineering, Self-Published, 2023, 1st Edition.
3
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23634.1 3 2 2 2 3 2 2 3 - 2 - 3 3 3 3
CS23634.2 3 3 2 2 3 - - - - 2 - 3 3 3 2
CS23634.3 3 3 2 2 3 - - 2 - 3 - 3 3 3 3
CS23634.4 3 3 3 3 3 2 2 2 3 3 3 3 3 3 3
CS23634.5 3 3 2 3 2 3 3 3 2 2 2 3 3 3 3
Average 3 2.8 2.2 2.4 2.8 2.33 2.33 2.5 2.5 2.4 2.5 3 3 3 2.8
Correlation levels 1, 2 or 3 are as defined below:
1: Slight (Low) 2: Moderate (Medium) 3:Substantial (High) No correlation:”-“
Objectives:
● To provide fundamental knowledge of various language translators
● To make students familiar with lexical analysis and parsing techniques.
● To understand the various actions carried out in semantic analysis
● To make the students get familiar with how the intermediate code is generated.
● To understand the principles of code optimization techniques.
Text Book(s):
1 A. V. Aho, Monica S. Lam, Ravi Sethi and Jeffrey D. Ullman, Compilers: Principles, techniques, & tools, Second
Edition, Pearson Education, 2007
2 K. D. Cooper and L. Torczon, Engineering a compiler, Morgan Kaufmann, 2nd edition, 2011.
3 Steven S.Muchnick “Advanced Compiler design implementation”, Elsevier Science India, 2003.
List of Experiments
1 Write a LEX program to recognize valid arithmetic expressions. Identifiers in the expression could be only integers
and operators could be + and *. Count the identifiers & operators present and print them separately.
2 Write a LEX program to eliminate comment lines in a C program and copy the resulting program into a separate file
3 Write a YACC program to recognize all strings for which starts with n number of “a‟ followed by n number of “b‟.
4 Write a YACC program to recognize valid identifiers, operators and keywords in the given text (C program) file.
5 Implementation of calculator using lex and yacc.
6 Convert the bnf rules into yacc form and write code to generate abstract syntax trees.
7 Write a scheme expression that evaluates the polynomial. Write 5 *(4.5 - 8.5) + 77 as a scheme expression, and find
its value. Define a function middle that takes five numbers as argument and returns the middle of the five.
8 Intro to Flex and Bison: Modify the scanner and parser so that terminating a statement with ";b" instead of ";" results
in the output being printed in binary.
9 Write a recursive descent parser for the CFG language and implement it using LLVM
10 Write a LR parser for the CFG language and implement it in the using LLVM
Contact Hours : 30
Total Contact Hours : 75
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23631.1 - - 1 - 1 - - - - - - - 1 - -
CS23631.2 - - 2 - 2 - - - - - - - 2 - -
CS23631.3 - - 2 - 2 - - - - - - - 2 - -
CS23631.4 - - 2 - 2 - - - - - - - 2 - -
CS23631.5 - - 3 - 2 - - - - - - - 2 - -
2. 1.
Average - - - - - - - - - - 1.8 - -
0 8
Objectives:
● Learn basics of encryption and Number Theory.
● Understand the methods of public key encryption.
● Acquire knowledge of hash functions and digital signatures.
● Apply techniques of system level securities.
● Know the current trends in e-mail, IP and web security
List of Experiments
1 Installation and Configuration of Kali Linux/Parrot OS in a VMware/VirtualBox.
2 Encryption Crypto 101 in TryHackMe Platform
3 Perform Man-in-the-middle (MITM) attacks using the Ettercap tool.
4 Demonstrate hash cracking using John the Ripper tool.
5 Perform various configurations of Iptables Firewall in Linux.
6 Snort IDS/IPS to detect and prevent real time threats in TryHackMe Platform.
7 Perform Code Injection on Application Process using Ptrace.
8 Privilege Escalation in TryHackMe Platform
9 Demonstrate various exploits of Window OS using Metasploit Framework
10 Perform Wireless Audit on routers and decrypt the WPA keys using Aircrack-ng
Contact Hours: 30
Total Contact Hours : 60
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23632.1 3 3 1 2 0 2 0 0 1 0 0 3 2 2 2
CS23632.2 3 3 2 1 0 0 0 0 1 0 0 3 2 2 2
CS23632.3 3 3 2 2 2 0 0 2 0 0 0 3 1 1 2
CS23632.4 0 1 2 2 2 0 0 0 2 0 0 3 1 1 2
CS23632.5 0 2 2 2 2 0 0 0 2 1 0 3 1 1 2
Average 3.0 2.4 1.8 1.8 2.0 2.0 - 2.0 1.5 1.0 - 3.0 1.4 1.4 2.0
Objectives:
● To learn the fundamentals of Cloud Computing and designing Private Cloud and Public Cloud Environment.
● Understand Virtual Machines and workload, Cloud Infrastructure
● To learn the cloud management and cloud native.
● To gain knowledge on various cloud computing architecture
● To learn the cloud security
UNIT-I INTRODUCTION 6
Basic concepts and terminology-roles and boundaries-cloud characteristics-cloud delivery model and deployment
Model (Public, Private and Hybrid models). Understand Cloud computing models IaaS, SaaS and PaaS and its
differences and when to use what model
UNIT- VIRTUAL MACHINES AND WORKLOADS, UNDERSTAND CLOUD 6
II INFRASTRUCTURE
Virtual Private Server (VPS), difference between dedicated and VPS server. Cloud Migration: Backup, Restore of the
same and its associated costing. Cloud Infrastructure Resources: File, Block, Object Storage and CDN (Content
Delivery Networks)
UNIT- CLOUD MANAGEMENT AND CLOUD NATIVE 6
III
Understand how to maintain control and oversight of cloud computing infrastructure, resources, and services in public,
private, or hybrid cloud environments – Interoperability, Cloud Sprawl, Automation, Cloud Governance, Monitoring
and Logging, Performance and Cost Reporting
UNIT- CLOUD COMPUTING ARCHITECTURE 6
IV
Understand the services like storage, databases, software, analytics, and other platforms that are accessible via the
internet. Understand how to build, design, and manage applications on the cloud platform.
UNIT-V CLOUD SECURITY 6
AWS and the shared responsibility model, Azure and the shared responsibility model, GCP and the shared
responsibility model. Command-Line tools: AWS CLI, Azure CLI, Google Cloud SDK.
Contact Hours: 30
List of Experiments
1 Private Cloud
a Setup a Private Cloud by performing the procedure using a Single node OPENSTACK implementation.
2 Public Cloud
Develop a simple application to understand the concept of PAAS using GAE/Amazon Elastic Beanstalk/IBM
a
Blue Mix/GCC and launch it.
3 Hybrid Cloud
a Setting Up Hybrid Connectivity
5. Experiment with setting up a secure VPN connection between an on-premises data center and a public cloud
provider such as AWS or Azure.
6. Configure a hybrid network topology using virtual private clouds (VPCs), subnets, and route tables.
4 Basic VPS Server Setup
a2. Provision a VPS instance from a cloud provider or set up a virtual machine on your local system using software
like VirtualBox or VMware.
3. Install a Linux distribution such as Ubuntu, CentOS, or Debian as the operating system.
4. Configure network settings, including IP address, subnet mask, gateway, and DNS.
5 Cloud Migrtion-Backup Setup:
Text Book(s):
Eyal Estrin- “Cloud Security Handbook”, Packt Publishing Ltd, First published: March 2022.
1
Thomas Erl, Zaigham Mahood, Ricardo Puttini- “Cloud Computing, Concept, Technology and Architectural”,
2
Prentice Hall, First Edition, 2013.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23633.1 3 2 2 2 2 1 1 1 3 1 3 2 3 2 3
CS23633.2 3 3 3 3 3 2 2 2 3 2 3 2 3 3 3
CS23633.3 3 3 3 3 3 2 3 2 2 2 3 2 3 3 3
CS23633.4 3 3 3 3 3 3 2 2 2 2 3 2 2 2 2
CS23633.5 3 3 3 2 2 2 2 2 2 2 3 2 3 2 3
Average 3 2.8 2.8 2.6 2.6 2 2 1.8 2.4 1.8 3 2 2.8 2.4 2.8
Objectives:
To know the fundamentals of machine learning.
Be exposed to linear models.
Be familiar with basic machine learning algorithms with classification.
To understand machine learning algorithms with clustering.
To learn and apply reinforcement learning techniques.
List of Experiments
1 A python program to implement univariate regression, bivariate regression and multivariate regression.
2 A python program to implement Simple linear regression using Least Square Method
3 A python program to implement logistic model.
4 A python program to implement single layer perceptron.
5 A python program to implement multi-layer perceptron with back propagation.
6 A python program to do face recognition using SVM classifier.
7 A python program to implement decision tree.
8 A python program to implement boosting.
9 A python program to implement KNN and K-means.
10 A python program to implement dimensionality reduction – PCA.
11 Mini project – develop a simple application using tensorflow / keras.
Contact Hours : 30
Total Contact Hours : 75
Text Books:
Aurélien Géron - Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, 2nd Edition. September
1
21019, Reilly Media, Inc., ISBN: 9781492032649.
Stephen Marsland, ―Machine Learning – An Algorithmic Perspective‖, Second Edition, Chapman and Hall/CRC
2
Machine Learning and Pattern Recognition Series, 2014.
Shai Shalev-Shwartz and Shai Ben-David,” Understanding Machine Learning: From Theory to Algorithms”,
3
Cambridge University Press 2014.
Reference Books:
1 Alex Smola and S.V.N. Vishwanathan,” Introduction to Machine Learning”, Cambridge University Press 2011.
Andreas C. Müller and Sarah Guido,” Introduction to Machine Learning with Python: A Guide for Data
2
Scientists”, O'Reilly Media, Inc,2016.
3 S. Russel and P. Norvig, “Artificial Intelligence: A Modern Approach”, Third Edition, Prentice Hall, 2009.
4 C. M. Bishop, “Pattern Recognition and Machine Learning”, Springer, 2007.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
AI23331.1 3 3 2 - - - - - 1 - - - 3 1 -
AI23331.2 3 3 3 2 - 2 - - - - - 2 2 3 -
AI23331.3 3 3 3 2 3 - - 2 2 - - - - 3 -
AI23331.4 3 3 3 - 3 1 - - - - 1 2 2 - -
AI23331.5 3 3 2 3 2 - - 1 3 - 3 3 3 3 1
Average 3 3 2.6 1.4 1.4 0.6 - 0.6 0.8 - 0.6 1.4 2 2 0.2
Objectives:
● Get started developing in Kotlin, and learn the basics of the Kotlin programming language: data types,
operators, variables, control structures, and nullable versus non-nullable variables.
● Get an introduction to Android development and UI basics.
● Learn Android app architecture using Kotlin.
● Learn best practices, guidelines, and tools for effective Android app design.
● To understand the capabilities and limitations of mobile devices
List of Experiments
1. Kotlin Basics
2. Functions
3. Classes and Objects
4. Build First Android App
5. Layouts
6. App Navigation
7. Activity and Fragment Lifecycles
8. App Architecture (UI Layer)
9. App Architecture (Persistence)
10 Advanced RecyclerView Use Cases
11. Connect to the Internet
12. Repository Pattern and WorkManager
13. App UI Design
14. Mini Project
Total Contact Hours : 60
Text Books:
1. Head First Android Development: A Learner's Guide to Building Android Apps with Kotlin, by Dawn Griffiths,
David Griffiths, Shroff/O'Reilly, Third Edition.
2. Learn Kotlin for Android Development: The Next Generation Language for Modern Android Apps Programming,
Peter Späth, Apress, First Edition.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23621.1 3 2 - - 3 - - - - - 2 3 3 3 2
CS23621.2 3 3 3 2 3 2 2 - - 2 2 3 3 3 3
CS23621.3 3 3 3 3 3 2 2 - - 2 2 3 3 3 3
CS23621.4 3 3 3 3 3 3 3 2 - 2 2 3 3 3 3
CS23621.5 3 3 3 2 3 3 3 - - 2 2 3 3 3 3
Average 3 2.8 3 2 3 2 2 2 - 2 2 3 3 3 2.8
Objectives:
● To improve the numerical ability
● To improve problem-solving skills.
Course topics:
S.No. Topics
1 Numbers system
2 Reading comprehension
3 Data arrangements and Blood relations
4 Time and Work
5 Sentence correction
6 Coding & Decoding, Series, Analogy, Odd man out and Visual reasoning
7 Percentages, Simple interest and Compound interest
8 Sentence completion and Para-jumbles
9 Profit and Loss, Partnerships and Averages
10 Permutation, Combination and Probability
11 Data interpretation and Data sufficiency
12 Logarithms, Progressions, Geometry and Quadratic equations.
13 Time, Speed and Distance
Objectives:
Understand the fundamental principles of information security and the threat landscape.
Understand various security assessment methodologies.
Develop the ability to identify, assess, and manage information security risks through risk profiling and risk
management concepts.
Learn risk evaluation and mitigation strategies.
Gain an introduction to common security frameworks and standards (NIST CSF and ISO 27001).
UNIT I INTRODUCTION 9
Fundamentals of information security- CIA triad: Confidentiality, Integrity, Availability. Threat landscape overview:
Common security threats, actors, and motivations. Introduction to vulnerability management.
Security assessment methodologies: Penetration testing - Vulnerability scanning - Security audits. Penetration testing
types: White-box, black-box, grey-box testing. Vulnerability scanning tools and their functionalities.
Introduction to security frameworks and standards (NIST CSF, ISO 27001) -Aligning security assessments and risk
analysis with frameworks - Implementing security controls based on identified risks.
Total Contact Hours : 45
Suggested Activities:
Quizzes
Class presentation/Discussion
Group Presentation
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CR23A11.1 3 3 - 2 2 2 1 2 - 1 - 2 3 3 2
CR23A11.2 2 3 - 3 3 - - - - 1 - 1 3 3 2
CR23A11.3 3 3 3 3 3 2 1 2 - - - 2 3 3 2
CR23A11.4 3 2 3 3 3 - 2 2 - - - 1 3 3 2
CR23A11.5 3 3 2 3 3 2 2 3 - - - 2 3 3 2
Average 2.8 2.8 2.6 2.8 2.8 2 1.5 2.25 - 1 - 1.6 3 3 2
Objectives:
To introduce the malware components and behaviour
To detect and analyze malware affected documents.
To introduce malware fundamentals and basic analysis.
To enable to identify and analyze various malware types by static analysis.
To enable to identify and analyze various malware types by dynamic analysis.
2. Abhijit Mohanta, Anoop Saldanha, Malware Analysis and Detection Engineering a Comprehensive Approach
to Detect and Analyze Modern Malware, 2020, 1st edition, Apress .
3. M. Sikorski and A. Honig, Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious
Software. 2012, 1st edition, No Starch Press.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23A11.1 3 3 2 2 3 2 2 2 - 2 - 3 3 3 3
CS23A11.2 3 3 3 3 3 2 2 2 - 2 - 3 3 3 3
CS23A11.3 3 3 3 3 3 2 2 2 - 2 - 3 3 3 3
CS23A11.4 3 3 3 3 3 2 2 2 3 3 2 3 3 3 3
CS23A11.5 3 3 3 3 3 2 2 2 3 3 2 3 3 3 3
Average 3 3 2.8 2.8 3 2 2 2 3 2.4 2 3 3 3 3
Objectives:
To understand the ethical hacker’s role, the hacking methodology, and the legal boundaries distinguishing
●
ethical from malicious hacking.
● To identify system weaknesses, network vulnerabilities, and use scanning tools to find security gaps.
● To understand using ethical hacking tools and techniques to simulate real-world attacks for defensive purposes.
● To learn how to prioritize risks, recommend security measures and report vulnerabilities.
● To understand social engineering tactics, zero-day vulnerabilities.
UNIT I INTRODUCTION 6
Overview of Ethical Hacking- Importance of ethical hacking for Businesses-Key concepts of Ethical Hacking-
Difference between Ethical Hacking and Malicious Hacking-Most used tools in Ethical Hacking Incidents (NMAP,
Metasploit)-Ethical hacking challenges and their solutions.
UNIT II NETWORK VULNERABILITIES AND VARIOUS SCANNING TOOLS 6
Overview of Network vulnerability scanning- Types of network vulnerability scanning-Key features of network
vulnerability scanner-Network vulnerability scanning vs network scanning- Network scanning tools (Burp Suite)
UNIT-
ETHICAL HACKING TOOLS AND TECHNIQUES 6
III
Overview, Tools and Techniques in Ethical Hacking (Metasploit Framework, Nessus, Wireshark, Burp Suite,
Nmap, John-the-Ripper, OWASP Zap.
UNIT IV RISK ASSESSMENT AND TYPES OF SYSTEM HARDENING 6
Overview, Types of system hardening (Network hardening, Server hardening, Application hardening,
Database hardening, Operating system hardening), Types of Security Risk assessments (Physical security
assessment, IT security assessment, Data security assessment, Application security assessment, Insider
Threat assessment)
UNIT-V SOCIAL ENGINEERING AND ZERO DAY ATTACKS 6
Overview of Social Engineering and zero-day attacks, Impact of social Engineering and zero-day attacks, Prevention
and mitigation techniques, Best practices for protecting against social engineering and zero day attacks.
Total Contact Hours : 30
List of Experiments
1 Conduct a basic penetration test using Metasploit to exploit a known vulnerability in a controlled
environment.
2 Use NMAP to scan a network and identify open ports and services.
3 Perform a web vulnerability scan using Burp Suite and document the identified vulnerabilities and their
potential impacts.
4 Perform a vulnerability scan using Nessus and generate a detailed report on the findings, including
recommended remediation steps.
5 Conduct a web application security test using OWASP ZAP. Document vulnerabilities and provide
remediation recommendations.
6 Assess the security of a sample application and provide a detailed report on vulnerabilities and
recommended hardening measures.
7 Perform a risk assessment on a sample IT system and present a risk management plan.
8 Perform Social Engineering attack
9 View and capture network traffic using Wireshark
10 Explore dig tool for vulnerabilities
Contact Hours: 30
Total Contact Hours: 60
Suggested Activities:
● Code implementing sessions in NMAP, Metasploit, Burp Suite
● Mini projects
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CR23A31.1 3 2 1 2 2 2 - 3 1 2 - 2 3 2 1
CR23A31.2 3 3 2 3 3 1 1 2 2 2 - 3 3 3 2
CR23A31.3 2 3 3 3 3 2 - 2 2 3 - 3 3 3 3
CR23A31.4 2 3 2 3 2 2 - 3 2 2 - 3 3 3 2
CR23A31.5 3 3 2 3 2 2 2 3 2 2 1 3 3 2 3
Average 2.6 2.8 2 2.8 2.4 1.8 1.5 2 2.6 2.2 1 2.8 3 13 2.2
Objectives:
To understand basic digital forensics and techniques.
To understand digital crime and investigation.
To understand how to be prepared for digital forensic readiness.
To understand and use forensics tools for Android devices.
To understand and use Anti Forensics.
UNIT I INTRODUCTION 6
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensics Process: Introduction – The
Identification Phase – The Collection Phase – The Examination Phase – The Analysis Phase – The Presentation Phase.
Sqlite Database Forensics: Relational Databases - Other Viewers - Anti Forensics: Introduction - Steganography –
Cryptography - Password Cracking.
Total Contact Hours : 30
List of Experiments
1 Installation of Sleuth Kit on Linux. List all data blocks. Analyze allocated as well as unallocated blocks of a disk
image.
2 Data extraction from call logs using Sleuth Kit.
3 Data extraction from SMS and contacts using Sleuth Kit.
4 Extract installed applications from Android devices.
5 Extract diagnostic information from Android devices through the adb protocol.
6 Generate a unified chronological timeline of extracted records,
7 Implement the sql query database and to handle sqlite in browser
8 Hide InvisibleSecrets in the initial screen using Steganography
Contact Hours: 30
Total Contact Hours: 60
Suggested Activities:
Assignment problems, Quiz.
Class presentation/Discussion
Textbooks:
1 Andre Arnes, “Digital Forensics”, Wiley, 2018.
2 Chuck Easttom, “An In-depth Guide to Mobile Device Forensics”, First Edition, CRC
Press, 2022.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CR23A32.1 3 2 2 3 3 - 2 3 - - 2 3 3 2 2
CR23A32.2 2 3 3 2 3 2 2 3 2 2 - 3 3 3 2
CR23A32.3 3 3 2 3 3 - - 3 2 - 3 3 3 2 3
CR23A32.4 3 3 3 3 3 2 - 3 - 2 - 3 3 3 3
CR23A32.5 2 2 3 2 3 - 2 3 - - - 3 2 3 2
Average 2.6 2.6 2.6 2.6 3 2 2 3 2 2 2.5 3 2.8 2.6 2.4
Objectives:
To understand how blockchain operates and its potential applications beyond cryptocurrency
To understand various types of cryptocurrencies, mining processes, wallets, and their economic principles
To understand how smart contracts and decentralized applications transform the Ethereum
To understand common security challenges in cryptocurrencies and blockchain
Explore in setting up a cryptocurrency wallet, interacting with blockchain platforms, and exploring dApps for
diverse applications.
UNIT I INTRODUCTION 9
Overview, distributed ledger, how it works, and its key components like blocks, hashing functions, and consensus
mechanisms (Proof of Work, Proof of Stake). Blockchain operation and its potential to revolutionize various industries
beyond just cryptocurrency.
UNIT II CRYPTOCURRENCIES 9
Overview of history and evolution of leading cryptocurrencies like Bitcoin and Ethereum, different types of
cryptocurrencies available, the mining process that creates new coins, how to securely store them in wallets, and the
economic principles that govern their value.
UNIT-III SMART CONTRACTS AND DAPPS 9
Overview of smart contracts and decentralized applications (dApps), Smart contracts functionalities, limitations, and
real-world applications, dApp platforms like Ethereum and how these applications are transforming industries such as
finance, supply chain management, and even voting systems.
UNIT IV BLOCKCHAIN SECURITY, REGULATION, AND FUTURE APPLICATIONS 9
Overview on common security challenges associated with cryptocurrencies and blockchain platforms, like
hacking attempts and fraudulent activities, explore the current regulations and potential future frameworks
being developed globally, Future applications of blockchain technology across different sectors like healthcare,
data management, and the Internet of Things (IoT).
UNIT-V BLOCKCHAIN IN PRACTICE 9
Provide practical experience with blockchain and cryptocurrency tools, Set up a cryptocurrency wallet, interact with a
blockchain platform like Ethereum or another chosen platform, or explore dApps for different purposes (e.g.,
decentralized finance applications or NFT marketplaces).
Total Contact Hours : 45
List of Experiments
1 Simulate a Simple Blockchain creation
2 Simple implementation of Proof of Work
3 Simulate Bitcoin Mining
4 Creating a Crypto-currency Wallet
5 Creating and Deploying a Simple Smart Contract on Ethereum (Remix)
6 Developing a Simple App with Web3 and Python
7 Writing a Simple Smart Contract with Python or Solidity
8 Public and Private key generation and basic encryption for Wallet security
9 Creating a cryptocurrency wallet on a platform like MetaMask or Trust Wallet, and perform transactions
on a testnet
10 Exploring and Interacting with a Decentralized Finance (DeFi) Application or NFT Marketplace
Contact Hours: 30
Total Contact Hours: 75
Suggested Activities:
Problem solving sessions
Mini projects
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CR23A33. 1 3 2 3 - 1 - - - 1 - 1 2 2 1 2
CR23A33. 2 2 2 2 - 1 - - - 1 - 1 2 2 1 2
CR23A33. 3 2 2 3 - 2 - - - 1 - 1 2 2 1 2
CR23A33. 4 2 2 2 - 2 - - - 1 - 1 2 2 1 2
CR23A33. 5 2 2 2 - 2 - - - 1 - 1 2 2 1 2
Average 2.2 2 2.6 - 1.6 - - - 1 - 1 2 2 1 2
Objectives:
To learn the fundamentals of Cloud Computing.
To learn the infrastructure security in cloud environment.
To learn the cloud application.
To learn the data life cycle and privacy in cloud.
To learn the cloud privacy and risk management.
List of Experiments
1. Private Cloud
a Setup a Private Cloud by performing the procedure using a Single node OPENSTACK implementation.
b Perform Creation, Management and Termination of a CirrOS instance in OPENSTACK.
Show the virtual machine migration based on certain conditions from one node to the other.
c
2 Public Cloud
Develop a simple application to understand the concept of PAAS using GAE/Amazon Elastic Beanstalk/IBM Blue
a
Mix/GCC and launch it.
b Test how a SaaS applications scales in response to demand.
c Find the procedure to launch a Cloud instance using a Public IaaS cloud like AWS/GCP.
3 Data Encryption
a Encrypt data both in transit and at rest using robust encryption algorithms.
b Implement Transport Layer Security (TLS) for securing communication channels.
c Use disk encryption to protect data stored on physical or virtual disks.
4 Access Control Policies
a Develop access control policies defining who can access what resources.
Implement role-based access control (RBAC) to assign permissions based on roles.
b
Identity Access Management
5
Capture all the flags in AWS bigiam challenges that consists of common misconfigurations in IAM.
a
Contact Hours : 30
Total Contact Hours : 60
Text Book(s):
Tim Mather, Subra Kumaraswamy, and Shahed Latif” Cloud Security and Privacy”, O’Reilly, First Edition 2009.
1
Eyal Estrin, “Cloud Security Handbook”, Packt, 2022.
2
10 https://www.youtube.com/watch?v=qTRmgP3oaqk
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CR23A34.1 3 2 1 - 2 - - - - 1 - 2 2 1 -
CR23A34.2 2 3 2 2 3 1 - 2 - - 1 2 3 2 -
CR23A34.3 2 2 3 - 3 - - 1 1 - - 1 2 2 -
CR23A34.4 2 2 1 - 2 2 1 3 - 1 - 1 2 1 1
CR23A34.5 2 3 2 1 2 2 1 3 - 1 2 1 2 1 2
Average 2.2 2.4 1.8 1.5 2.4 1.6 1 2.25 1 1 1.5 1.4 2.2 1.4 1.5
Objectives:
To understand and develop semantic web related applications
To understand privacy and security issues in Social Networking
To learn about the data extraction and mining of social networks
To discuss the prediction of human behaviour in social communities
To learn about the Access Control and identity management
List of Experiments
1 Developing a social media application.
2 Create a Network model using Neo4j.
3 Read and write Data from Graph Database.
4 Find “Friend of Friends” using Neo4j.
5 Implement secure search in social media.
6 Create a simple Security & Privacy detector.
Contact Hours: 30
Total Contact Hours: 60
Suggested Activities:
Assignment problems.
Class presentation/Discussion
Textbooks:
1. Peter Mika, “Social Networks and the Semantic Web”, First Edition, Springer 2007.
2. BorkoFurht, “Handbook of Social Network Technologies and Application”, First Edition, Springer, 2010.
3. Jerome Baton and Rik Van Bruggen, "Learning Neo4j 3.x", Second Edition, Packt publishing, 2017
4. David Easley, Jon Kleinberg, "Networks, Crowds, and Markets: Reasoning about a Highly Connected World",
First Edition, Cambridge University Press, 2010.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CR23A35.1 2 3 3 2 3 - - - 1 2 - 2 3 2 1
CR23A35.2 3 3 2 - 3 3 - 3 - 1 - 2 3 2 2
CR23A35.3 2 3 2 3 3 - - 2 - 1 - 2 3 3 1
CR23A35.4 1 3 2 - 2 - - 2 - 1 - 1 2 2 1
CR23A35.5 2 3 3 2 3 2 - 3 - 1 2 2 3 2 2
Average 2 3 2.4 2.3 2.8 2.5 - 2.5 1 1.2 2 1.8 2.8 2.2 1.4
Objectives:
● To understand the fundamentals of Web Application Security
● To know about web application authentication and authorization mechanism
● To identify common web application vulnerabilities
● To focus on wide aspects of secure development and deployment of web applications
● To get insight about mitigations and countermeasures against web application attacks
UNIT I INTRODUCTION 6
History of Software Security – OWASP Top Ten List 2021 – Input Validation – Attack Surface Reduction –
Classifying and Prioritizing Threats
Cross Site Scripting- Reflected XSS- Stored XSS- DOM based XSS- Mutation based XSS – Cross Site Request
Forgery - SQL Injection – Code Injection – Insecure Direct Object References (IDOR)
Anti XSS Coding Best Practices- Sanitizing User Input – Anti CSRF Coding Best Practices – Mitigating Against
SQL Injection – Generic Injection Defenses – Defending Against IDOR – Architecture Level Mitigations
Total Contact Hours : 30
List of Experiments
1 Identify security issues in web application – Walking an Application in TryHackMe Platform
2 Burp Suite Basics in TryHackMe Platform
3 OWASP ZAP to scan authenticated web application in TryHackMe Platform
4 SQL Injection Lab in TryHackMe Platform
5 Explore OWASP Top Ten -2021 Vulnerabilities in TryHackMe Platform
6 SQLmap to exploit web application in TryHackMe Platform
7 Exploit File Inclusion and Path Traversal Vulnerabilities in TryHackMe Platform
8 Server-Side Template Injection in TryHackMe Platform
9 DejaVu Code Injection Vulnerability in TryHackMe Platform
10 NoSQL Injection on MongoDB in TryHackMe Platform
Contact Hours: 30
Suggested Activities:
● Assignment problems, Quiz.
● Class presentation/Discussion
Textbooks:
1. Andrew Hoffman, “Web Application Security: Exploitations and Countermeasures for Modern Web
Applications”, 2nd Edition, O’Reilly, 2024
2. Brian Sullivan and Vincent Liu, “Web Application Security: A Beginners Guide”, 1 st Edition, McGrawHill,
2012
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23A35.1 1 2 2 1 3 - - - - - - 1 - - -
CS23A35.2 2 1 2 1 3 - - - - - - - - - -
CS23A35.3 1 1 1 2 3 - - - - - - 1 - - -
CS23A35.4 1 2 1 1 2 - - - - - - - - - -
CS23A35.5 1 2 2 2 2 - - - - - - 1 - - -
Average 1.2 1.6 1.6 1.4 2.6 - - - - - - 1 - - -
Objectives:
To understand the basics of Information Security and legal and ethical issues in Information Security.
To understand the information security policy and concepts of access control.
To learn about intrusion detection and prevention techniques and tools.
To learn about auditing techniques and tools.
To Learn to analyze and validate forensics data
UNIT-I INTRODUCTION 6
Security Trends, OSI security architecture, Security attacks, security services, security mechanisms, Security System
Development Life cycle – Legal, Ethical and Professional issues.
UNIT-II SECURITY ANALYSIS 6
Risk Management - Identifying and Assessing Risk - Assessing and Controlling Risk. Blueprint for Information Security -
Information Security Policy. Case Study: Healthcare Data Security
UNIT-III SECURITY TECHNOLOGY 6
Intrusion Detection and Prevention Systems (IDPS)-Terminology-Types-Detection methods. Honeypots, Honeynets and
padded cell systems. Scanning and Analysis Tools-Port Scanners-Firewall analysis tools, Operating system detection tools-
Vulnerability scanners-Packet Sniffers-Wireless security Tools
UNIT-IV AUDITING 6
Overview, Access control, IT Audit, Authentication. Open Web Application Security Project (OWASP), Web Site Audit
and Vulnerabilities assessment- Case Study: Web Application Security Assessment for Online Retailer
UNIT-V ANALYSIS AND VALIDATION 6
Validating Forensics Data – Data Hiding Techniques – Performing Remote Acquisition – Network Forensics – Email
Investigations – Cell Phone and Mobile Devices Forensics. -Case Study: WannaCry Ransomware Attack
Contact Hours : 30
List of Experiments
Implementation to gather information from any PC‟s connected to the LAN using whois, port scanners, network
1
scanning, Angry IP scanners etc.
2 Implementation of Steganography
3 Implementation of Mobile Audit and generate the report of the existing Artifacts.
4 Implementation of IT Audit, malware analysis and Vulnerability assessment and generate the report.
Implementation of Cyber Forensics tools for Disk Imaging, Data acquisition, Data extraction and Data Analysis
5
and recovery.
Perform mobile analysis in the form of retrieving call logs, SMS log ,all contacts list using the forensics tool like
6
SAFT
7 Implementation to identify web vulnerabilities, using OWASP project.
Contact Hours : 30
Total Contact Hours : 60
Text Book(s):
Michael E Whitman and Herbert J Mattord, “Principles of Information Security with Mindtap”, Cengage Learning,
1
Seventh Edition 2023.
2 Nelson, Phillips, Enfinger, Steuart, “Computer Forensics and Investigations”, Cengage Learning, India Edition, 2008.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CR23A36.1 3 2 1 - - 2 2 3 1 - - 2 3 1 1
CR23A36.2 2 3 2 2 - - 2 3 - 2 2 2 2 2 1
CR23A36.3 2 3 3 3 3 - - 2 - 1 - 2 3 2 1
CR23A36.4 2 2 3 3 3 - - - - - - 1 3 3 1
CR23A36.5 3 2 2 3 - - 2 3 - - 1 2 3 3 2
Average 2.4 2.4 2.2 2.2 3 2 2 2.75 1 1.5 1.5 1.8 2.8 2.2 1.2
OBJECTIVES:
● To understand the concept of semantic web and social network analysis
● To apply ontology for knowledge representation and integration of social network data
● To identify and analyse communities within social networks using various detection methods
● To examine human behaviour in social web and related communities
● To analyse various visualizing tools for social networks.
UNIT I INTRODUCTION 6
Introduction to Semantic Web: Limitations of current Web - Development of Semantic Web - Emergence of the
Social Web - Social Network analysis: Development of Social Network Analysis - Key concepts and measures in
network analysis - Electronic sources for network analysis: Electronic discussion networks, Blogs and online
communities - Web-based networks - Applications of Social Network Analysis.
UNIT II MODELLING, AGGREGATING AND KNOWLEDGE REPRESENTATION 6
Ontology and their role in the Semantic Web: Ontology-based knowledge Representation - Ontology languages for
the Semantic Web: Resource Description Framework - Web Ontology Language - Modelling and aggregating
social network data: State-of-the-art in network data representation - Ontological representation of social
individuals - Ontological representation of social relationships - Aggregating and reasoning with social network
data - Advanced representations.
UNIT III EXTRACTION AND MINING COMMUNITIES IN WEB SOCIAL NETWORKS 6
Extracting evolution of Web Community from a Series of Web Archive - Detecting communities in social networks
- Definition of community - Evaluating communities - Methods for community detection and mining - Applications
of community mining algorithms - Tools for detecting communities social network infrastructures and communities
- Decentralized online social networks - Multi-Relational characterization of dynamic social network communities
– Web analytics – Page ranking algorithm.
UNIT IV PREDICTING HUMAN BEHAVIOUR AND PRIVACY ISSUES 6
Understanding and predicting human behaviour for social communities - User data management - Inference and
Distribution - Enabling new human experiences - Reality mining - Context - Awareness - Privacy in online social
networks - Trust in online environment - Trust models based on subjective logic - Trust network analysis - Trust
transitivity analysis - Combining trust and reputation - Trust derivation based on trust comparisons - Attack
spectrum and countermeasures.
UNIT V VISUALIZATION AND APPLICATIONS OF SOCIAL NETWORKS 6
Graph Networks- Centrality - Clustering - Node-Edge Diagrams - Matrix representation - Visualizing online social
networks, Visualizing social networks with matrix-based representations - Matrix and Node-Link Diagrams -
Hybrid representations - Applications - Cover networks - Community welfare - Collaboration networks - Co-
Citation networks.
TOTAL: 30 PERIODS
List of Experiments (can be implemented using any tools: Python (NetworkX), MATLAB,Gephi.
1) Implement a program to compute centrality measures
2) Implementation of community detection using various algorithms
3) Simulation of Diffusion of Information or Influence
4) Implementation of Link Prediction
5) Write a program and analyse Network Resilience and Robustness
6) Simulation of Opinion Dynamics
7) Simulation of Social Influence in Marketing Campaigns
8) Implementation of Sentiment Analysis in Social Media Networks
9) Creation of Network Visualization using different Layouts
10) Mini Project -Modelling and tracking the evolution of a network over time, studying the addition of nodes and
edges based on specific growth models (e.g., preferential attachment).
Contact Hours : 30
Total Contact Hours : 60
COURSE OUTCOMES: On completion of the course, the students will be able to:
Develop semantic web related applications.
Represent knowledge using ontology.
Predict human behaviour in social web and related communities.
Visualize social networks.
Social awareness and its laws
TEXT BOOKS:
1 John Scott, “Social Network Analysis: Research Methods”, 1st Edtion, Kindle Edition, 2021
2 David Knickerbocker, “Network Science with Python:Explore the networks around us using network
science, Social network analysis, and Machine learning” ,Packt Publishers, 2023
3. Stephen P Bongatti “Analyzing Social Networks using R”. SAGE publishers Ltd., 2021
REFERENCES:
1. Guandong Xu, Yanchun Zhang and Lin Li, “Web Mining and Social Networking – Techniques and
applications”, First Edition Springer, 2019.
2. Dion Goh and Schubert Foo, “Social information Retrieval Systems: Emerging Technologies and
Applications for Searching the Web Effectively”, IGI Global Snippet, 2021.
3. Max Chevalier, Christine Julien and Chantal Soulé-Dupuy, “Collaborative and Social Information
Retrieval and Access: Techniques for Improved user Modelling”, IGI Global Snippet, 2021.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
AI23A31.1 3 3 2 2 3 2 1 2 2 2 2 3 3 2 2
AI23A31.2 3 3 2 2 3 2 1 1 2 2 2 3 3 2 3
AI23A31.3 3 3 3 2 3 2 1 2 2 2 2 3 3 3 3
AI23A31.4 3 3 3 2 3 2 1 2 2 2 2 3 3 3 2
AI23A31.5 3 3 3 3 3 2 1 2 3 3 3 3 3 3 3
Average 3 3 2.6 2.2 3 2 1 1.8 2.2 2.2 2.2 3 3 2.6 2.6
.
Correlation levels 1, 2 or 3 are as defined below:
1: Slight (Low) 2: Moderate (Medium) 3: Substantial (High) No correlation: “-”
Objectives:
To acquire proficiency in preparing datasets and applying Python-based techniques for exploratory data
visualization.
To gain expertise in performing univariate, bivariate, and multivariate data analyses using advanced EDA
techniques.
To develop a comprehensive understanding of time series data processing, analysis, and visualization.
To understand and apply statistical and machine learning models for time series forecasting.
To explore and implement cutting-edge forecasting models, leveraging tools like auto ARIMA, Facebook
Prophet, and deep learning architectures.
List of Experiments
Clean and analyze the Bitcoin Historical Data from Kaggle to calculate daily summary statistics and identify any
missing values.
1
Evaluation Parameters: Accuracy in handling time-specific missing values and the relevance of summary
statistics generated.
Create line plots and decompose the Daily Temperature of Major Cities dataset from Kaggle to reveal trends,
2 seasonality, and residuals.
Evaluation Parameters: Effectiveness in revealing underlying patterns and anomalies in data.
Develop a series of box plots and violin plots for the Global Financial Indices dataset from the Data Market
repository, focusing on capturing distribution variations over time.
3
Evaluation Parameters: Ability to interpret and articulate findings from the distribution shapes and their
changes over time.
Visualize the correlation matrix for multiple time series variables from the Multivariate Economic Statistics
dataset using heat maps and network diagrams, emphasizing the strength and direction of relationships.
4
Evaluation Parameters: Clarity in displaying correlations, effectiveness in using colors and layout to represent
data complexities.
Perform data cleaning, transformation, and feature engineering on the Stock Market Data from Kaggle to prepare
5 it for time series modeling.
Evaluation Parameters: Creativity in feature engineering and thoroughness in preprocessing steps.
Apply Moving Average and Exponential Smoothing models to establish baseline forecasts using the Electricity
6 Consumption Data from Kaggle.
Evaluation Parameters: Accuracy of forecasts and suitability of the model chosen for the data's nature.
Course Outcomes:At the end of the course the student will be able to:
Understand the exploratory data analysis
Apply Univariate and multivariate analysis
Analyse and visualize time series data to derive insights and establish baseline forecasts.
Analyse the forecasting techniques to model and predict time series data
Design and implement robust forecasting solutions using statistical and deep learning methodologies.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
AD23A32.1 3 2 3 2 - 1 - - 2 - - - 3 2 -
AD23A32.2 2 3 - 3 2 - - - 2 - - - 2 3 -
AD23A32.3 3 2 2 3 2 - - - 3 - - 2 3 3 -
AD23A32.4 2 3 - 2 - 3 - 2 3 - 2 3 - 2 3
AD23A32.5 - - 3 - 2 3 3 2 - 3 2 - 3 - 3
Average 2.5 2.5 2 2.5 1.6 1.4 0.6 1 2 0.6 0.8 1 2.6 2 1.4
UNIT-I Introduction 6
Introduction: Goals of Recommender System, Basic models of Recommender Systems, Domain-Specific
Challenges in Recommender System, Applications
UNIT-II Collaborative Filtering 6
User-based nearest neighbour recommendation, Item based nearest neighbour recommendation, Clustering and
Neighbourhood-Based Model, Graph models for Neighbourhood-Based Model
UNIT-III Content-based recommendation 6
Basic components of content-based systems, Preprocessing and Feature Extraction, Learning User Profiles and
Filtering, Content based versus Collaborative Filtering
UNIT-IV Knowledge based recommendation and Hybrid approaches 6
Knowledge based recommendation: Constraint based recommenders; Case based recommenders. Hybrid
approaches: Weighted, Switching, Cascade, Meta-level Hybrids, Mixed Hybrids
UNIT-V Evaluating Recommender System 6
Introduction, Evaluation Paradigms, General goals of evaluation Design, Design issues: Case Study of Netflix,
Accuracy metrics, Limitations of Evaluation metrics.
Total Contact Hours: 30
Text Book(s):
1. Charu C. Aggarwal,,Recommender Systems: The Textbook., 1st edition, Springer ,2016
List of Experiments
1 Implement Data similarity measures using Python
2 Implement dimension reduction techniques for recommender systems
3 Implement user profile learning
4 Implement content-based recommendation systems
5 Implement collaborative filter techniques
Contact Hours : 30
Total Contact Hours : 60
SUGGESTED ACTIVITIES
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
AI23A35.1 3 3 2 2 1 - 3 - - - - - 3 - -
AI23A35.2 3 3 2 2 2 - - - - - - - 3 3 -
AI23A35.3 3 2 3 2 2 - - 2 - 2 - 1 3 3 -
AI23A35.4 3 3 3 2 3 - - 2 1 1 - 1 3 3 -
AI23A35.5 3 3 3 2 3 - - 2 1 1 - 1 3 3 1
Average 3 3 2.6 2 2.2 0.6 1.2 0.4 0.8 0 0.6 3 2.4 0.2
Objectives:
● To understand the fundamental principles, theory and approaches for learning with deep neural networks.
● To learn the main variants of deep learning (such convolutional and recurrent architectures), and their typical
applications
● To understand the key concepts, issues and practices when training and modelling with deep architectures
● To understand how deep learning fits within the context of other ML approaches
● To evaluate and optimize deep learning models.
Course Outcomes: At the end of the course, the students should be able to
SUGGESTED ACTIVITIES (if any) (UNIT/ Module Wise) – Could suggest topic
● Problem solving sessions
● Capstone Projects
● Activity Based Learning
3. Charu C. Aggarwal, Neural Networks and Deep Learning, Springer International Publishing AG, 2023.
4. J Lavika Goel, Artificial Intelligence: Concepts and Applications, Wiley, 2021.
CO-PO-PSO Mapping
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
IT23D11.1 3 2 3 - 1 - - 1 2 2 3 3 3 2 2
IT23D11.2 3 2 3 - 2 - - - 1 2 2 2 3 2 2
IT23D11.3 3 2 3 - 1 - - 1 - 2 2 2 3 2 2
IT23D11.4 3 2 3 - 2 - - - 1 2 1 1 3 1 2
IT23D11. 5 3 2 3 - 1 - - 1 - 2 2 1 3 1 2
Objectives:
Gain foundational knowledge in natural language processing (NLP) and speech recognition.
Explore fundamental techniques used in speech processing.
Study various feature extraction methods, such as MFCC and LPC.
Evaluate techniques for speech recognition and synthesis, including algorithms and systems.
Acquire hands-on experience in implementing and applying text and speech analysis models and algorithms
List of Experiments
Text Preprocessing and Analysis
a. Implementing tokenization, stemming, and lemmatization.
1
b. Performing POS tagging and NER on text data.
c. Building a sentiment analysis classifier using machine learning.
Language Models and Text Classification
a. Creating and analyzing N-gram models
2
b. Training and evaluating text classification models.
c. Applying word embeddings for semantic similarity tasks.
Speech Processing
a. Extracting MFCC features from speech signals.
3
b. Implementing basic speech recognition using HMM or DTW.
c. Developing a simple ASR system using open-source tools.
Advanced Projects
a. Building a text-to-speech synthesis system.
4
b. Implementing a neural network model for text classification.
c. Developing a cross-lingual NLP application.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
AD23B33.1 3 3 2 2 2 1 1 1 2 2 1 2 3 2 1
AD23B33.2 3 3 2 2 3 1 1 1 2 2 1 3 3 2 2
AD23B33.3 2 3 3 3 3 2 1 1 2 2 2 2 3 2 3
Objectives:
● Understand the Fundamentals of Business Analytics.
● Develop Spreadsheet Proficiency for Analytics.
● Master Data Visualization Techniques.
● Learn Descriptive Statistical Analysis.
● Explore Probability Distributions and Data Modeling.
List of Experiments
1 Excel essentials:
. Introduction to the Interface an Source Data
Formatting
Navigation Shortcuts
Format Painter
Insert Delete Rows and Columns
Autofill Data
Sorting
Filtering
Custom Lists
2 Excel Formulas
Logical Formulas
IF & IFS Formulas
Statistical Formulas
Lookup Formulas
Index and Match
Switch
Text Formulas
Date and Time Formulas
Text Book(s):
R. Evans James, Business Analytics, 2nd Edition, Pearson, 2017.
1
R N Prasad, Seema Acharya, Fundamentals of Business Analytics, 2 nd Edition, Wiley, 2016.
2
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23A31.1 2 2 3 1 1 - - - 1 2 1 1 3 2 1
Objectives:
To Understand the basics of image processing techniques for computer vision and video analysis.
To Explain the techniques used for image pre-processing.
To Develop various object detection techniques.
To Understand the various face recognition mechanisms.
To Understand deep learning-based video analytics.
UNIT I INTRODUCTION 6
Computer Vision – Image representation and image analysis tasks - Image representations – digitization – properties –
color images – Data structures for Image Analysis - Levels of image data representation - Traditional and Hierarchical
image data structures.
UNIT II IMAGE PRE-PROCESSING 6
Local pre-processing - Image smoothing - Edge detectors - Zero-crossings of the second derivative - Scale in image
processing - Canny edge detection - Parametric edge models - Edges in multispectral images - Local pre-processing in
the frequency domain - Line detection by local preprocessing operators - Image restoration.
UNIT III OBJECT DETECTION USING MACHINE LEARNING 6
Object detection– Object detection methods – Deep Learning framework for Object detection– bounding box
approach-Intersection over Union (IoU) –Deep Learning Architectures - R-CNN-Faster R-CNN-You Only Look Once
(YOLO) - Salient features - Loss Functions - YOLO architectures.
UNIT IV FACE RECOGNITION AND GESTURE RECOGNITION 6
Face Recognition - Introduction - Applications of Face Recognition - Process of Face Recognition - DeepFace solution
by Facebook - FaceNet for Face Recognition- Implementation using FaceNetGesture Recognition.
UNIT V VIDEO ANALYTICS 6
Video Processing – use cases of video analytics-Vanishing Gradient and exploding gradient problem - RestNet
architecture-RestNet and skip connections-Inception Network-GoogleNet architecture Improvement in Inception v2-
Video analytics-RestNet and Inception v3.
Contact Hours : 30
List of Experiments
1 Write a program that computes the T-pyramid of an image.
Write a program that derives the quad tree representation of an image using the homogeneity criterion of equal
2
intensity
Develop programs for the following geometric transforms: (a) Rotation (b) Change of scale (c) Skewing (d)
3 Affine transform calculated from three pairs of corresponding points (e) Bilinear transform calculated from four
pairs of corresponding points.
4 Develop a program to implement Object Detection and Recognition
5 Develop a program for motion analysis using moving edges and apply it to your image sequences.
6 Develop a program for Facial Detection and Recognition
7 Write a program for event detection in video surveillance system
Contact Hours : 30
Total Contact Hours : 60
Course Outcomes:
To understand the basics of image processing techniques for computer vision.
To apply the techniques used for image pre-processing.
To analyze the various object detection techniques.
To apply the various Object recognition mechanisms.
To examine on the video analytics techniques.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
AD23A37.1 3 2 3 2 2 1 2 1 1 1 1 2 3 2 1
AD23A37.2 3 3 3 3 2 2 2 2 1 1 2 3 3 3 2
AD23A37.3 2 3 3 3 2 2 3 2 2 1 2 3 3 3 2
AD23A37.4 3 3 2 3 3 2 3 3 2 1 3 3 3 3 3
AD23A37.5 3 3 3 3 3 2 3 3 3 2 3 3 3 3 3
Average 2.8 2.8 2.8 2.8 2.4 1.8 2.6 2.2 1.8 1.2 2.2 2.8 3 2.8 2.2
Objectives:
To Learn the basic concepts of image processing and computer vision.
To explore the use of computer vision for object detection and image segmentation problems.
To understand the ideas about image Recognition and Restoration
Explore the ideas of object detection and Segmentation using Vision Datasets.
To demonstrate the model prediction and to solve a variety of problems
UNIT I INTRODUCTION 6
Introduction to Image Processing and Computer Vision-Features-Applications- Image formation -Geometric
primitives and transformations - Photometric image formation - The digital camera- Image processing - Point
operators - Linear filtering -More neighbourhood operators -Fourier transforms - Pyramids and wavelets - Geometric
transformations - Global optimization - Feature detection and matching Points and patches - Edges – Lines
UNIT II Image Segmentation and Alignment 6
Segmentation: Active contours - Split and merge - Mean shift and mode finding - Normalized cuts -Graph cuts and
energy-based methods - Feature-based alignment - 2D and 3D feature-based alignment - -Geometric intrinsic
calibration.
UNIT III Object Detection, Recognition, and 3D Reconstruction 6
Object detection -Face recognition -Instance recognition - Category recognition -Context and scene understanding -
Recognition databases and test set, 3D reconstruction: Shape from X - Active range finding - Surface representations -
Point-based representations - Volumetric representations - Model-based reconstruction -Recovering texture maps and
albedos
UNIT IV Vision Datasets and Model Predictions 6
Object Detection – Segmentation. Creating Vision Datasets: Collecting Images – Data types – Manual Labeling –
Labeling at Scale – Automated Labeling – Bias – Creating a Dataset -Model Predictions: Making Predictions – Online
Prediction- Example
UNIT V Object Measurement, Pose Estimation, and Image Understanding 6
Object Measurement – Counting – No-Code Computer Vision - Pose estimation- Image Search, Image and Text
Generations: Image Understanding – Image Generation –Image Captioning.
Contact Hours : 30
List of Experiments
1 Installation of Open CV & To perform the basic image handling processing operation on the image
2 Implement Edge Detection, Line Detection and Corner Detection
3 Demonstrate Camera Calibration using python
4 Implement Image Histogram and Histogram Equalization
5 Develop a python program for Skin color Detection
6 Create a python program for Warping and Estimation
7 Develop a python program for Motion Tracking
8 Design a program for Object Detection using YOLO
9 Develop a python program for Stereo Vision and Depth Estimation
10 Demonstrate Augmented reality using feature matching
Mini Project:
Real-Time Object Detection with YOLO (You Only Look Once)
Camera Calibration and Stereo Vision for Depth Estimation
11
Skin Color Detection and Tracking in Real-Time
Augmented Reality using Feature Matching and Homography
Motion Tracking System for Object Detection
Contact Hours : 30
Total Contact Hours : 60
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
AD23B31.1 3 3 2 2 3 2 2 1 1 1 1 2 3 3 2
AD23B31.2 3 3 3 3 3 2 2 2 1 1 2 3 3 3 2
AD23B31.3 3 3 3 3 2 2 3 2 2 1 2 3 3 3 2
AD23B31.4 3 3 3 3 3 2 3 3 2 2 2 3 3 3 3
AD23B31.5 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
Average 3 3 2.8 2.8 2.8 2.2 2.6 2.2 1.8 1.6 2 2.8 3 3 2.4
Text Books:
1 Seema Acharya and Subhashini Chellappan “Big data and Analytics” Wiley India Publishers, 2nd Edition, 2019.
Rajkamal and Preeti Saxena, “Big Data Analytics, Introduction to Hadoop, Spark and Machine Learning”,
2
McGraw Hill Publication, 2019.
Reference Books:
1 Tom White, “Hadoop: The Definitive Guide” 4th Edition, O’reilly Media, 2015.
Thomas Erl, Wajid Khattak, and Paul Buhler, Big Data Fundamentals: Concepts, Drivers & Techniques, Pearson
2
India Education Service Pvt. Ltd., 1st Edition, 2016.
John D. Kelleher, Brian Mac Namee, Aoife D'Arcy -Fundamentals of Machine Learning for Predictive Data
3
Analytics: Algorithms, Worked Examples, MIT Press 2020, 2nd Edition
4 Mohammed Guller, “Big Data Analytics with Spark”, Apress, 2015
PO/PSO
C PO PO PO PO PO PO PO PO PO PO1 PO1 PO1 PSO PSO PSO
o 1 2 3 4 5 6 7 8 9 0 1 2 1 2 3
r CO
r AI23A36.1 3 3 2 2 1 - - 1 - - - 1 3 3 1
e AI23A36.2 3 3 2 2 2 - - 2 - - - 1 3 3 2
l AI23531.3 3 3 3 2 2 - - 2 - - - 1 3 3 1
a AI23A36.4 3 3 3 2 3 1 1 2 1 1 - 1 3 3 3
t AI23A36.5 3 3 3 2 3 1 1 2 1 1 - 1 3 3 3
i Average 3 3 2.6 2 2.2 1 1 1.8 1 1 - 1 3 3 2
o
n levels 1, 2 or 3 are as defined below:
Objectives:
To introduce the fundamental concepts of Natural Language Processing (NLP for analysing words based
on statistical measures and CORPUS.
To understand the principles of morphological analysis and language modelling using finite state
machines and n-gram models.
To explore vector semantics and learn how to represent words and their relationships through
embeddings and similarity measures.
To analyse and implement Hidden Markov Models (HMMs) and their applications in Part-Of-Speech
(POS) tagging
To study the architecture of transformers and large language models, including pre-training and
evaluation techniques.
List of Experiments
Develop a morphological analyser to process and analyse various sentence structures, including
interrogative, declarative, and complex sentences with conjunctions. Perform word segmentation and
1.
sentence segmentation as part of the analysis.
Suggested Dataset/Corpus: Universal Dependencies (UD) English Treebank
Design a basic NLP pipeline to preprocess raw text data by performing tokenization, sentence
segmentation, and part-of-speech (POS) tagging. Automate the pipeline to process large-scale text
2.
efficiently.
Suggested Dataset/Corpus: Universal Dependencies (UD) English Treebank
Textbooks:
1 Daniel Jurafsky and James H. Martin “Speech and Language Processing”, 3rd edition, Prentice Hall, 2024
T V Geetha,” Understanding Natural Language Processing” (Machine Learning and Deep Learning
2 Perspectives),1st edition, Pearson,2024
Reference Books:
Christopher D. Manning and HinrichSchutze, “Foundations of Natural Language Processing”, 6th Edition, The
1
MIT Press Cambridge, Massachusetts London, England, 2003 2009.
NitinIndurkhya, Fred J. Damerau “Handbook of Natural Language Processing”, Second Edition, CRC Press,
2
2010.
3 James Allen “Natural Language Understanding”, Pearson Publication, 8th Edition. 2012
Hobson lane, Cole Howard, Hannes Hapke, “Natural language processing in action” MANNING Publications,
4
2nd edition, 2019.
Alexander Clark, Chris Fox, Shalom Lappin, “The Handbook of Computational Linguistics and Natural
5
Language Processing”, Wiley-Blackwell, 2016
Rajesh Arumugam, Rajalingappa Shanmugamani “Hands-on natural language processing with python: A
6 practical guide to applying deep learning architectures to your NLP application”. PACKT publisher, 2018.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
AI23632.1 3 3 2 2 3 2 1 2 2 2 2 3 3 2 2
AI23632.2 3 3 2 2 3 2 1 1 2 2 2 3 3 2 3
AI23632.3 3 3 3 2 3 2 1 2 2 2 2 3 3 3 3
AI23632.4 3 3 3 2 3 2 1 2 2 2 2 3 3 3 2
AI23632.5 3 3 3 3 3 2 1 2 3 3 3 3 3 3 3
Average 3 3 2.6 2 2.2 1 1 1.8 1 1 - 1 3 3 2
OBJECTIVES:
To Understand MindSphere Architecture
To Analyze data visualization and management in Mindsphere
To Develop mindsphere application
To Apply the Security and integration in Mindsphere
To develop Final Project using Mindsphere kit
List of Experiments
Device Connectivity and Data Ingestion
1
Objective: Connect a simulated or physical device to MindSphere and ingest data.
Data Storage and Model Definition
2 Objective: Organize and store collected data in MindSphere.
Lab 3: Real-Time Data Monitoring
3
Objective: Set up a dashboard for live data monitoring using MindSphere Visual Analyzer.
Lab 4: Anomaly Detection using Analytical Tools
4 Objective: Apply anomaly detection algorithms on collected data.
Textbooks:
1. Official Siemens MindSphere Documentation
Siemens provides comprehensive online documentation on MindSphere through its MindSphere Academy and
MindSphere Documentation Portal.
2. "Industrial IoT: Challenges, Design Principles, Applications, and Security" by Sabina Jeschke, Christian K. Becker,
and others.
3. Machine Learning for the Internet of Things" by Nuno M. Garcia, Sergio V. Oliveira, and Joao P. Silva — addresses
machine learning techniques designed for IoT applications, closely related to the analytics you can perform on
MindSphere.
Reference Books(s):
"Data Science for IoT Engineers" by Daniel K. Gardner.
1
"Applied Predictive Analytics: Principles and Techniques for the Professional Data Analyst" by Dean Abbott
2
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23C31.1 1 - - - - - 1 - 2 3 1 3 - 2 -
CS23C31.2 - 3 - 2 - - - - - 2 1 1 2 - -
CS23C31.3 - - - 1 - - - - - 3 - - 2 - -
CS23C31.4 - 1 - 1 - - - - - 3 - 2 3 - 1
CS23C31.5 1 1 1 1 1 1 1 1 2 3 1 1 1 - -
Average 1.0 1.7 1.0 1.3 1.0 1.0 1.0 1.0 2.0 2.8 1.0 1.8 2.0 2.0 1.0
Objectives:
● To gain the knowledge of historical and modern overviews and perspectives on virtual reality.
● To learn the fundamentals of sensation, perception, and perceptual training.
● To have the scientific, technical, and engineering aspects of augmented and virtual reality systems.
● To learn the Haptics and modelling from the lens of design.
● To learn the technology of augmented reality and implement it various applications to have practical
knowledge.
List of Experiments
1 Study of tools like Unity, Maya, 3DS MAX, AR toolkit, Vuforia and Blender
2 Use the primitive objects and apply various projection types by handling camera. 3. Download objects from asset
store and apply various lighting and shading effects
3 Model three dimensional objects using various modelling techniques and apply textures over them.
4 Create three dimensional realistic scenes and develop simple virtual reality enabled mobile applications which
have limited interactivity.
5 Develop VR enabled applications using motion trackers and sensors incorporating full haptic interactivity.
6 Develop AR enabled applications with interactivity like E learning environment, Virtual walkthroughs and
visualization of historic places.
7 Develop AR enabled simple applications like human anatomy visualization, DNA/RNA structure visualization
and surgery simulation.
8 Develop simple MR enabled gaming applications.
Contact Hours: 30
Total Contact Hours: 60
Text Book(s):
1 Ralf Doerner - “Virtual and Augmented Reality (VR/AR) Foundations and Methods of Extended Realities
(XR)”, Springer Cham, March 2022.
Charles Palmer, John Williamson, “Virtual Reality Blueprints: Create compelling VR experiences for mobile”,
2
Packt Publisher, 2018.
Dieter Schmalstieg, Tobias Hollerer, “Augmented Reality: Principles & Practice”, Addison Wesley, 2016
3
Courses:
1 Introduction to Augmented Reality and ARCore, Coursera
2 Intro to AR/VR/MR/XR: Technologies, Applications & Issues, Coursera
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23A37.1 3 2 2 - 3 - - - 2 2 1 2 2 1 2
CS23A37.2 3 2 2 1 3 - - - 3 2 2 3 3 1 2
CS23A37.3 3 3 2 2 3 - - - 3 2 1 2 3 2 2
CS23A37.4 3 3 3 2 3 - - - 3 2 2 3 3 2 2
CS23A37.5 3 3 3 3 3 - - - 3 3 3 3 3 3 3
Average 3 2.6 2.4 2 3 - - - 2.8 2.2 1.8 2.6 2.8 1.8 2.2
Correlation levels 1, 2 or 3 are as defined below:
1: Slight (Low) 2: Moderate (Medium) 3:Substantial (High) No correlation: “- “
Objectives:
● To introduce students to Excel's basic and advanced data visualization techniques.
● To familiarize students with Tableau.
● To develop skills in using Power BI.
● To enable students to design comprehensive visual dashboards.
● To apply knowledge through a capstone project.
List of Experiments
Excel for Data Visualization
Data Manipulation and Cleaning
1 Using Functions and formulae for Data Cleaning.
Sorting, Filtering and Data Validation techniques.
Excel Charts and Tools
2 Getting started with charts (Bar, Line, Pie).
Advanced charts (Histograms, Box plots, Area Chart, Bubble chart).
Excel Advanced Features
3 Using PivotTables for data analysis.
Dynamic Dashboards with Slicers and Timeline.
Data Visualization with Tableau
Getting Started with Tableau
Connecting to data and basic visualizations.
4
Interactive Dashboards and Storytelling.
Filters, Pages, Hierarchies, Sorting and Dates.
Advanced Data Manipulation Techniques
Calculated fields and parameters.
5 Calculations and Expressions -Total and Aggregations, Automatic and Custom split.
Organizing Data and Visual Analytics – Reference lines and bands, Clusters, Forecasting,
Trend lines, Summary Card.
Data Visualization with Power BI
Introduction to Power BI
Getting started with Data importing and transforming with Power Query.
6 Report designing with basic visualizations and using the visualization pane.
Measures, Filters.
Features of Power BI- Drill through, Hierarchies.
Advanced Power BI
7 DAX.
Creating complex reports and dashboards.
Capstone Project - Students will select a real-world dataset and use any tools ( Excel, Tableau, and
8
Power BI) to create comprehensive dashboards.
Total Contact Hours 90
https://learn.microsoft.com/en-us/training/browse/?products=power-bi
2.
https://www.tableau.com/learn/training
Online Course: Coursera — Data Visualization with Tableau
3.
Excel Visualizations
4. Power BI Documentation
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CD23C22.1 3 2 2 1 2 - - - - - - - 3 2 1
CD23C22.2 3 3 2 2 3 1 - - - - - - 3 3 2
CD23C22.3 3 2 3 2 3 - 1 - - - - - 3 3 2
CD23C22.4 3 3 3 2 3 - 1 1 - - - - 3 3 3
CD23C22.5 3 3 3 3 3 2 2 1 1 1 2 1 3 3 3
Average 3 2.6 2.6 2 2.8 1.5 2 0.5 1 1 2 1 3 3 2.2
Objectives:
● To understand the history and overview of game design
● To develop the Game design document
● To apply the concepts of game loop, collision detection and Cameras
● To understand the concepts of graphics in game design
● To be able to incorporate various Mechanics in Developing game
List of Experiments
1 Create a simple sprite animation using an open source tool.
2 Narrate a simple game using scratch 2.0 (Character narration).
3 Implement a scoring mechanism, such as collecting items or reaching certain milestones.
4 Enhance the visual appeal of the game by adding animated sprites for player movement and other game elements.
5 Implement basic AI behaviors, such as following the player when in range or patrolling between predefined
points.
6 Implement level transitions and progression.
7 Incorporate sound effects for player movement, jumping, and interactions.
8 Create menu screens for starting the game, pausing/resuming, and displaying game over information
9 Optimize game performance, fix bugs, and polish game elements to improve the overall quality.
Contact Hours: 30
Total Contact Hours: 60
Text Book(s):
1 “2D Game Development: From Zero to Hero”, Daniele Penazzo, Python Edition, 2020
2 “Game Development Patterns and Best Practices”, John P. Doran, Matt Casanova, Packt Publishing, 2017.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23A39.1 3 2 2 1 2 - - - - - - - 2 2 2
CS23A39.2 1 2 2 1 2 - - - - - - - 2 2 1
CS23A39.3 1 1 1 2 1 - - - - - - - 2 2 2
CS23A39.4 3 3 1 3 3 - - - - - - - 2 2 3
CS23A39.5 3 3 2 1 3 - - - - - - - 2 2 3
Average 2.2 2.2 1.6 1.6 2.2 - - - - - - - 2 2 2.2
Objectives:
To learn the basics of Metaverse characteristics, concepts and layers.
To understand and analyse Metaverse technologies, tools and platforms.
To discuss design theories and practices relevant to the Metaverse.
To explore cybersecurity and cybercrime in the Metaverse.
To explore metaverse applications and examine open challenges in the Metaverse.
List of Experiments
1 Create and customize an avatar in a Metaverse platform (Decentraland, Second Life, or Roblox).
2 Analyze different layers of the Metaverse (Experience, Discovery, Creator Economy, etc.).
3 Build a simple AR application using WebAR or Unity.
4 Create a simple NFT and understand its role in the Metaverse.
5 Measure motion sickness symptoms when using VR applications.
6 Design a simple 3D virtual space.
7 Identify phishing and scam techniques used in the Metaverse.
8 Create a virtual classroom using a Metaverse platform.
Tools: Mozilla Hubs, Spatial.io, Gather.town. Unity, Unreal Engine, culus Quest 2, VRChat, Unity VR.
Contact Hours: 30
Total Contact Hours: 60
Text Books:
1 Terry Winters,” The Metaverse: Prepare Now For the Next Big Thing!”, Independently published, 2021 (ISBN:
979-8450959283)
Reference Books:
Ball, M., 2022, “The Metaverse and How It Will Revolutionize Everything “, Liveright, ISBN: 978-
1. 1324092032
Christodoulou, K. Katelaris, L., Themistocleous, M, Christoudoulou P. and Iosif E, 2022, “NFTs and the
2. Metaverse Revolution: Research Perspectives and Open Challenges", Blockchains and the Token Economy:
Theory and Practice, Eds: Lacity M., Treiblmaier H., (2022), Palgrave Macmillan, Cham, pp. 139-178
Damar, M. (2021). Metaverse shape of your life for future: A bibliometric snapshot. Journal of Metaverse, 1(1),
3.
1–8.
Day, J. (2022) Metaverse will see cyberwarfare attacks unlike anything before: ’Massively elevated’, February
4 28, https://www.express.co.uk/news/science/1570844/metaverse-news-cyberwarfare-attacks-virtual-worlds-
russia-china-spt.
Davis, A., Khazanchi, D., Murphy, J., Zigurs Ilze, & Owens, D. (2009). Avatars, people, and virtual worlds:
5 Foundations for research in metaverses. Journal of the Association for Information Systems, 10(2), 90–117.
https://doi.org/10.17705/1jais.00183
Assessment Methods:
Interactive Activities
Assignments / Project
Quiz
CAT & Final Exams
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23B31.1 3 2 2 2 3 3 2 3 - 2 - 3 3 2 3
CS23B31.2 3 3 3 3 3 2 2 2 - 2 - 3 3 3 3
CS23B31.3 3 3 3 3 3 2 2 2 - 2 - 3 3 3 3
CS23B31.4 3 3 3 3 3 3 2 3 - 3 - 3 3 3 3
CS23B31.5 3 3 3 3 3 2 2 2 3 3 2 3 3 3 3
Average 3 2.8 2.8 2.8 3 2.4 2 2.4 3 2.4 3 3 3 3 3
Correlation levels 1, 2 or 3 are as defined below:
Objectives:
To gain knowledge about graphics hardware devices and software used.
To understand the two-dimensional graphics and their transformations.
To understand the three-dimensional graphics and their transformations.
To appreciate illumination and color models
To become familiar with hypermedia models
UNIT-I INTRODUCTION 6
An Introduction Graphics System: Computer Graphics and Its Types, Application of computer graphics - Graphics
Systems: Video Display Devices, Raster Scan Systems, Random Scan Systems, Graphics Monitors and Work Stations,
Input Devices, Hard Copy Devices, Graphics Software - Scan Conversion Basics, Line, Circle and Ellipse drawing
algorithms – Parallel Curve Algorithm – Filled Area Primitives.
UNIT-II 2D PRIMITIVES 6
Two-dimensional Geometric Transformations: Basic Transformations, Matrix Representation and Homogeneous
Coordinates, Composite Transformations, Reflection and Shearing. Two-Dimension Viewing: The viewing Pipeline,
Window to view port coordinate transformation, Clipping Operations, Point Clipping, Line Clipping, Polygon
Clipping, Text Clipping, Exterior Clipping.
UNIT-III 3D CONCEPTS 6
Three-Dimensional Concepts: Three-Dimensional Display Methods, 3D Transformations, Parallel Projection and
Perspective Projection Parallel and Perspective projections - 3D Concepts – 3D Object Representation, Polygons,
Curved Lines, Splines, Quadratic Surfaces, Splines, B-Splines, Bezier Curves, Beta Splines, 3D Transformations, 3D
Viewing – Visible surface identification, Elements of Color, Color Perception, Color Matching, Color Models – XYZ,
RGB, YIQ, CMY, HSV -
UNIT-IV MULTIMEDIA SYSTEM DESIGN 6
Multimedia basics − Multimedia applications − Multimedia system architecture – Evolving technologies for
multimedia − Defining objects for multimedia systems − Multimedia data interface standards − Multimedia databases.
Compression and decompression − Data and file format standards − Multimedia I/O technologies − Digital voice and
audio − Video image and animation − Full motion video − Storage and retrieval technologies.
UNIT-V HYPERMEDIA 6
Hypermedia messaging -Mobile messaging − Hypermedia message component − Creating hypermedia message −
Integrated multimedia message standards − Integrated document management − Distributed multimedia systems.
CASE STUDY: BLENDER GRAPHICS Blender Fundamentals – Drawing Basic Shapes – Modelling – Shading &
Textures
Total Contact Hours: 30
SUGGESTED ACTIVITIES (if any) (UNIT/ Module Wise) – Could suggest topic
● Problem solving sessions
● Flipped classroom - Comparing SOA with Client-Server and Distributed architectures
● Survey on various storage technologies
● Activity Based Learning
● Implementation of small module
Text Book(s):
1.Donald Hearn and Pauline Baker M, “Computer Graphics “, 2nd Edition, Prentice Hall, 2014.
2. Richard E. Mayer, “Multimedia Learning “, 3rd Edition, Cambridge University Press, 2020
CO-PO-PSO Mapping
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
IT23E31.1 3 2 3 - 1 - - 1 2 2 3 3 3 2 2
IT23E31.2 3 2 3 - 2 - - - 1 2 2 2 3 2 2
IT23E31.3 3 2 3 - 1 - - 1 - 2 2 2 3 2 2
IT23E31.4 3 2 3 - 2 - - - 1 2 1 1 3 1 2
IT23E31. 5 3 2 3 - 1 - - 1 - 2 2 1 3 1 2
Average 3 2 3 - 1.4 - - 1 1.3 2 2 1.8 3 1.7 2
Objectives:
● The primary objective of this module is to examine and explore the role and importance of digital marketing
in today’s rapidly changing business environment.
● It also focusses on how digital marketing can be utilised by organisations and how its effectiveness can
measure.
List of Experiments
1 Subscribe to a weekly/quarterly newsletter and analyze how its content and structure aid with the branding of the
company and how it aids its potential customer segments.
2 Perform keyword search for a skincare hospital website based on search volume and competition using Google
keyword planner tool. 3. Demonstrate how to use the Google Web Masters Indexing API
3 Discuss an interesting case study regarding how an insurance company manages leads.
4 Discuss negative and positive impacts and ethical implications of using social media for political advertising.
5 Discuss how Predictive analytics is impacting marketing automation.
Contact Hours: 30
Total Contact Hours: 60
Reference Book(s):
Ryan, D. (2014). Understanding Digital Marketing: Marketing Strategies for Engaging the Digital Generation,
1
Kogan Page Limited
2 Pulizzi,J Beginner's Guide to Digital Marketing , Mcgraw Hill Education.
Barker, Barker, Bormann and Neher (2017), Social Media Marketing: A Strategic Approach, 2E South-Western,
3
Cengage Learning.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23A38.1 3 3 2 1 3 - - - 1 2 3 3 3 3 3
CS23A38.2 2 2 2 1 3 - - - 1 2 3 3 3 3 3
CS23A38.3 1 1 1 2 2 - - - 1 2 1 1 3 2 1
CS23A38.4 3 2 2 3 1 - - - 1 3 2 3 2 3 2
CS23A38.5 2 3 1 3 3 - - - 2 3 1 2 1 2 1
Average 2.2 2.2 1.6 2 2.4 - - - 1.2 2.4 2 2.4 2.4 2.6 2
Objectives:
● To Undestand the basic principles of visual effects, including CGI, compositing, and integration with
liveaction footage.
● To learn how to combine multiple elements (live-action,CGI, background) seamlessly into a single frame.
● To explore techniques for creating and animating 3D models and environments for VFX projects.
● To understand how to track motion in footage to integrate 3D elements effectively with real-world video.
● To learn to simulate natural phenomena such as fire, smoke,water, nd explosions for realistics effects.
LIST OF EXPERIMENTS
GREEN SCREEN COMPOSITING
1 Green Screen Compositing
Tools: Adobe After Effects, Nuke, or DaVinci Resolve.
Experiment Variants: Experiment with different lighting setups on the green screen to minimize spill and
maximize keying quality.
2 Rot scoping Techniques
Tools: After Effects, Nuke, Mocha.
Focus Areas: Vary the complexity by tracking subjects with different motions and adding elements behind or
in front of the rotoscoped layer
3 Motion Tracking and Match Moving
Tools: After Effects, Blender, Cinema 4D.
Variants: Try planar tracking for surfaces and 3D tracking to simulate the camera movement for more
immersive VFX scenes
4 Particle Simulation for Environmental Effects
Tools: Blender, Houdini, Maya.
Experiment Variants: Adjust particle behaviour to control effects like the density of snow or smoke spread
based on environmental conditions
5 Dynamic Lighting and Shadow Matching
Tools: Maya, Blender, or Nuke.
Experiment Variants: Test different lighting angles, intensities, and shadow softness to match the original
footage’s conditions.
6 Physics-Based Animation
Tools: Blender, Houdini, Cinema 4D.
Focus: Experiment with gravity, elasticity, and friction settings to see how they impact object interactions.
7 Time Manipulation Effects
Tools: After Effects, Premiere Pro.
Variants: Test speed-ramping (changing speeds mid-shot) and frame blending to make fast actions smoother
or simulate slow-motion effects
Total Contact Hours 90
Course Outcomes:
Identify user interface for compositing, Views and Previews, Layers and Properties & Animation,
Colours, Masks, Transparency and Keying, Text, Drawing and Painting, Motion Tracking, Effects and
Animation, Presents, Rendering and Exporting.
Differentiate Image Based Motion Graphics & Video Based Motion Graphics.
Create Effects & Title effects.
Do colour correction & Keying after effects tools.
Use Match mover, Motion tracking Overview, Motion Tracking, Workflow and Controls, Rotoscoping, Wire
Removal
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CD23721.1 2 2 2 1 1 - - - 3 2 2 2 2 2 2
CD23721.2 2 3 2 1 1 - - - 3 2 3 2 2 2 2
CD23721.3 2 3 2 2 2 - - - - - - 2 2 3 2
CD23721.4 2 - - 2 3 - - - - - - - 2 2 -
CD23721.5 2 2 - 3 3 - 1 2 3 2 1 3 2 3 -
Average 2 2.5 2 1.8 2 - 1 2 3 2 2 2.25 2 2.4 2
Objectives:
List of Experiments
1 Create a short video focusing on different shot types (close-up, medium, wide), camera angles, and movement
techniques (panning, tilting, tracking).
2 Set up different lighting setups (3-point lighting, high key, low key) and capture a scene to understand their
impact on mood and aesthetics.
3 Record audio separately from video and then synchronize it in post-production, focusing on lip-sync and ambient
sound.
4 Shoot footage with a green screen, remove the background in post-production, and place the subject into a virtual
environment.
5 Write a short script and direct a scene with actors, focusing on dialogue delivery, blocking, and character
motivation.
6 Design and mix sound effects, music, and dialogue for a short film clip.
Mini project: Produce a short documentary (5-7 minutes) on a subject of choice, utilizing interviews, voice-over
narration, and B-roll footage and create a 2–3-minute stop-motion animation using physical objects or clay
figures.
Contact Hours: 30
Total Contact Hours: 60
Text Book(s):
1 John J. Lee, “The Roadmap for the Balanced Film Producer”, Routledge, edition:1st, 2024.
2 Steven D. Katz, “Film Directing Shot by Shot: Visualizing from Concept to Screen”, Routledge, edition: 1st,
2024.
4 Andrew Thom’s, “The Radio Producer's Handbook”, Sage Publications, dition:1st, 2023.
Reference Book(s):
1 John O. M. McCarthy, “The Encyclopaedia of Film Making Techniques", Focal Press, 1 Edition, 2020.
st
2 https://www.amazon.com/Filmmakers-Handbook-Comprehensive-Digital-ebook/dp/B00E19FWG0
3 https://www.amazon.com/Film-Directing-Shot-Techniques-Aesthetics/dp/0941188268
4 https://www.amazon.com/Directing-Techniques-Aesthetics-Michael-Rabiger/dp/1285428982
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CD23731.1 2 2 2 1 1 - - - 3 2 2 2 2 2 2
CD23731.2 2 3 2 1 1 - - - 3 2 3 2 2 2 2
CD23731.3 2 3 2 2 2 - - - - - - 2 2 3 2
CD23731.4 2 - - 2 3 - - - - - - - 2 2 -
CD23731.5 2 2 - 3 3 - 1 2 3 2 1 3 2 3 -
Average 2 2.5 2 1.8 2 - 1 2 3 2 2 2.2 5 2 2.4 2
Objectives:
● Analyze application structures to organize content clearly.
● Construct Navigation that enables users to easily accomplish tasks.
● Design page layouts that support findability of hierarchical content and task completion.
● Determine how to display data to meet user needs.
● Construct effective forms with focused input controls.
UNIT I INTRODUCTION 6
An overview of the user interface. Human factors in interface design: memory, chunking, recognition vs. recall. User
interface design principles: user familiarity, consistency, minimal surprise, recoverability, user guidance, user
diversity. Characteristics of Graphical User Interface: command line, menu selection, form fill-in, direct
manipulation, anthropomorphic. Models of user interface - Generation of user interfaces-Graphical User Interface
(GUI), Web User Interface (WUI), Voice User Interfaces (VUI), Tangible User Interfaces (TUI), Ubiquitous User
Interfaces (UUI. Next generation of user interfaces.
UNIT II INTERFACE DESIGN METHODS 6
Interface Design Methods: Characteristics of a GUI. Information presentation. Interaction styles. Direct
manipulation. Direct Manipulation advantages. Indirect manipulation. Command interfaces. Problems with command
interfaces. Command languages. Natural language interfaces. User interface design process. Lifecycle models. A
simple interaction design model. Traditional ‘waterfall’ life cycle. A life cycle for RAD (Rapid Applications
Development). The Star lifecycle model. Usability engineering lifecycle model: features. Menu systems. Problems
with menu systems. Multiple user interfaces. Help and message system. Guidelines for error messages. Task analysis
and modeling. Content analysis. Work environment analysis.
UNIT-III IMPLEMENTATION OF GRAPHICAL USER INTERFACES 6
Correctly designed software- Software layers. Widgets, buttons, callbacks. Working principles of widgets. Project
plan. UI design. Low-level prototypes. Evaluation: user-centered. Users’ steps.Evolving user understanding. Result.
Colors. Layout.
UNIT IV DIALOG AND STORYBOARDS 6
Alignment on grids. I/O. Dialogs. Dialogs and storyboards. Input prototyping and design. Checks for inputs. Output.
Data visualization. Examples. Challenges of visualization. Error messages.
UNIT-V TESTING AND USABILITY ASSESSMENT 6
Testing and Usability Assessment: User interface evaluation. Guiding principles for evaluation. Simple evaluation
techniques. Process of evaluation. Approaches to evaluation. User observation. Preparing for user observation.
Advantages of observation. Disadvantages of observation. Observation research tips. Importance of usability.
Usability testing. Usability testing methods. Qualitative vs. Quantitative observation. Usability attributes. Testing.
Formal vs. informal testing. Testing basics process
Total Contact Hours : 30
Suggested Activities:
● Assignment problems, Quiz.
● Class presentation/Discussion
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23A34.1 2 3 - - 2 2 3 - - 3 - - - 3 -
CS23A34.2 3 3 3 3 2 - 3 2 3 3 2 3 - 3 3
CS23A34.3 2 3 3 2 3 1 2 3 3 3 - 3 2 3 3
CS23A34.4 2 3 3 3 3 3 3 3 3 3 3 3 3 3 3
CS23A34.5 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3
Average 2.4 3 3 2.75 2.6 2.25 2.8 2.75 3 3 2.67 3 2.67 3 3
OBJECTIVES:
To learn basics of AR/VR
To create 3D Modeling
To create AR Application
To create VR Application
To develop a Real-Time Project in AR/VR
Definition and key concepts of Augmented Reality (AR) and Virtual Reality (VR), Historical context and evolution,
Current trends and applications. Hardware components (sensors, displays, etc.), Software components (SDKs,
engines), Platforms (ARKit, AR Core, Oculus, Etc.), Understanding 3D space and spatial computing, Choosing
Development tools (Unity, Blender), Introduction to AR Development Frameworks, Hands-on experience with a
simple Project.
UNIT-II 3D Modelling 3
Vuforia Engine and its AR Functionalities, Marker-based vs Marker less Tracking, Common issues in AR
development, Image Detection Applications. Common issues in AR development, Common issues in AR
development, Common issues in AR development, Common issues in AR development.
UNIT-IV VR Development 3
Overview of VR development tools (Unity), Introduction to VR development frameworks, Hands-on experience with
a simple VR project, VR user interfaces (UI), Implementing Basic VR Integration, User experience considerations in
VR, Advanced VR Interactions, Implementing in VR, VR Optimization technique. Motion sickness Mitigation,
Performance Optimization in VR
Design Principles for immersive experiences, User testing in AR/VR, Iterative design process. Emerging trends in
AR/VR. Project Development with AR/VR. Real Time Use Cases in AR/VR
Contact Hours : 15
List of Experiments
1. Marker-Based AR Experiments
Objective: Develop and test AR applications using fiducial markers.
Activities:
Identify markers using AR libraries (e.g., ARToolkit, Vuforia).
Experiment with marker designs and recognition under varying conditions (lighting, angle, distance).
Overlay virtual 3D objects on detected markers.
Measure marker tracking accuracy.
4. Gesture Recognition in AR
Objective: Integrate AR applications with hand gestures or body movements.
Activities:
Use a depth-sensing camera (e.g., Leap Motion, Microsoft Kinect).
Implement hand-tracking SDKs and algorithms to manipulate AR objects.
Test usability and responsiveness.
5. AR Navigation and Wayfinding
Objective: Implement AR-based navigation systems.
Activities:
Develop a path-guidance system overlaying routes on real-world environments.
Experiment with indoor and outdoor environments using ARCore/ARKit or similar tools.
Evaluate accuracy and user experience under different lighting and terrain conditions.
6. Motion Tracking and Locomotion Techniques
Objective: Test and compare different VR locomotion methods.
Activities:
Implement teleportation, joystick-based movement, and natural walking.
Measure user performance and susceptibility to motion sickness.
Evaluate how each technique affects task efficiency and user comfort.
7.VR-Based Simulation Training
Objective: Develop and test training modules in a VR environment.
Activities:
Simulate scenarios like flight training, surgery, or disaster response.
Assess the effectiveness of VR training compared to traditional methods.
8. Interaction Methods in VR
Objective: Compare various interaction techniques for manipulating virtual objects.
Activities:
Experiment with hand tracking, controllers, and gesture-based interactions.
Measure task completion times, accuracy, and user preference.
9. Visual Perception and Depth Cues in VR
Objective: Explore how depth perception influences interaction and navigation.
Activities:
Study the effects of stereoscopy, occlusion, shadows, and motion parallax on depth perception.
Evaluate user performance in spatial tasks under varying visual conditions.
10. VR and Cognitive Load
Objective: Measure the impact of VR tasks on cognitive load and mental effort.
Activities:
Use VR environments to test multitasking capabilities.
Monitor physiological responses (e.g., EEG, heart rate) alongside subjective feedback.
Software Requirements:
1.Unity
2.Blender
Textbooks:
1. "Augmented Reality and Virtual Reality: Empowering Human, Place and Business" by M. Claudia tom Dieck and
Patrick M. T. Griffin
2. "Programming 3D Applications with HTML5 and WebGL: 3D Animation and Visualization for Web" by Tony
Parisi
3. "Understanding Virtual Reality: Interface, Application, and Design" by William R. Sherman and Alan B. Craig.
Reference Books(s):
"Augmented Reality: Principles and Practice" by Dieter Schmalstieg and Tobias Hollerer
1
"Unity Virtual Reality Projects" by Jonathan Linowes
2
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CO1 1 - - - - - 1 - 2 3 1 3 - 2 -
CO2 - 3 - 2 - - - - - 2 1 1 2 - -
CO3 - - - 1 - - - - - 3 - - 2 - -
CO4 - 1 - 1 - - - - - 3 - 2 3 - 1
CO5 1 1 1 1 1 1 1 1 2 3 1 1 1 - -
AVERAGE 1.0 1.7 1.0 1.3 1.0 1.0 1.0 1.0 2.0 2.8 1.0 1.8 2.0 2.0 1.0
Objectives:
● Prepare to become Junior RPA Developers.
● Learn the basic concepts of Robotic Process Automation.
● Develop familiarity and deep understanding of UiPath tools.
● Develop the ability to design and create robots for business processes independently.
● Develop skills required to pass UiPath Automation Developer Associate v1.0.
List of Experiments
1. Downloading and Installing UiPath Academic Alliance and connect to Orchestrator.
2. Installing UiPath Extension in Browsers.
3. Installing Activity Packages in UiPath Studio - Manage Packages feature to find, install, update and remove
packages.
4. Experiments based on variables and arguments.
5. Algorithmic Approach: Selection control structures.
6. Algorithmic Approach: Iteration control structures.
7. Debugging - Debug modes, debug actions and the debug ribbon option to debug a file or the entire
Project and simple and conditional breakpoints and simple and conditional trace points.
8. Exception Handling - Try Catch, Throw, Rethrow and Retry Scope.
9. Logging - Apply logging best practices during development.
10. UI Automation – Modern Recorder, Modern UI Automation Input Activities and Input Methods, Modern UI
Automation Output Activities and Output Methods, UI Synchronization with activities available in the Modern
Design Experience, static and dynamic Descriptors.
11. Excel Automation.
12. Email Automation.
13. PDF Automation.
14. Working with Files and Folders.
15. Data Manipulation.
16. Version Control Integration.
17. Libraries and Templates.
18. Workflow Analyzer
19. Orchestrator: Invoice Processing – Dispatcher.
20. Orchestrator: Invoice Processing – Performer.
Contact Hours : 75
Text Books:
1. UiPath Associate Certification Guide: The go-to guide to acing your Associate certification exam with the help of
mock tests and quizzes, Niyaz Ahmed, Lahiru Fernando, Rajaneesh Balakrishnan, Packt Publishing Limited, 2022.
2. Learning Robotic Process Automation: Create Software Robots and Automate Business Processes with the Leading
RPA Tool – UiPath, Alok Mani Tripathi, Packt Publishing Limited, 2018.
Reference Books:
1. Robotic Process Automation Projects: Build real-world RPA solutions using UiPath and Automation Anywhere,
Nandan Mullakara, Arun Kumar Asokan, Packt Publishing Ltd., 2020.
2. The Robotic Process Automation Handbook: A Guide to Implementing RPA Systems, Tom Taulli, Apress, 2020.
3. Democratizing Artificial Intelligence with UiPath: Expand automation in your organization to achieve operational
efficiency and high performance, Fanny IP, Jeremiah Crowley, Packt Publishing Limited, 2022.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23A32.1 3 2 2 1 3 - - - 1 3 3 2 2 2 1
CS23A32.2 1 1 2 3 3 - - - 1 2 3 1 3 2 1
CS23A32.3 2 3 2 3 3 - - - 2 3 1 1 3 3 3
CS23A32.4 1 2 1 2 2 - - - 1 2 1 3 3 3 2
CS23A32.5 3 3 3 3 3 - - - 3 1 1 1 3 2 1
Average 2 2.2 2 2.4 2.8 - - - 1.6 2.2 1.8 1.6 2.8 2.4 1.6
Objectives:
● To learn about Cyber Crime and Cyber Laws
● To understand Cyber-attacks and tools to mitigate it.
● To learn about Computer Forensics and understanding computer Investigation
● To become familiar with evidence collection and forensics tools
● To learn to analyze and validate forensic data
UNIT I INTRODUCTION 6
Cyber Security- History of Internet - Impact of Internet - Reason for Cyber Crime - Need for Cyber Security - History
of Cyber Crime–Cybercriminals – Classification of Cybercrimes– A Global Perspective on Cyber Crimes – Cyber
Laws-The Indian IT Act
UNIT II ATTACKS AND COUNTERMEASURES 6
Malicious Attack Threats and Vulnerabilities: Scope of Cyber-Attacks – Security Breach – Types of Malicious
Attacks – Malicious Software – Common Attack Vectors – Social engineering Attack – Wireless Network Attack –
Web Application Attack – Attack Tools – Countermeasures
UNIT-III INTRODUCTION TO COMPUTER FORENSICS 6
Introduction to Traditional Computer Crime and its problems – Introduction to Identity Theft & Identity Fraud –
Types of CF techniques - Incident and incident response methodology - Forensic duplication and investigation –
Preparation for IR: Creating response tool kit and IR team – Forensics Technology and Systems - Understanding
Computer Investigation – Data Acquisition.
UNIT IV EVIDENCE COLLECTION AND FORENSICS TOOLS 6
Processing Crime and Incident Scenes – Working with Windows and DOS Systems –Current Computer
Forensics Tools- Software/ Hardware Tools
Validating Forensics Data – Data Hiding Techniques – Performing Remote Acquisition – Network Forensics –
Email Investigations – Cell Phone and Mobile Devices Forensics
Total Contact Hours : 30
List of Experiments
1 Linux auditing using Lynis and increase the hardening index using security tools
2 Hardening Linux OS using various configuration to reduce the attack surface
3 Analyze Web Application Security using N-Stalker tool
4 Perform open-source intelligence gathering using Netcraft, Whois Lookups, DNS
Reconnaissance, Harvester and Maltego
5 Live Data Acquisition of a folder and take its image using FTKImager
6 Recover deleted file using FTKImager
7 Analyze RAM dump using Volatility tool
8 Collect Email Evidence in Victim PC and Extract Browser Artifacts (ChromeHistory view for Google
Chrome)
9 Perform Live Forensics Case Investigation using Autopsy
10 Study Email Tracking and Email Tracing and write a report on them.
Contact Hours: 30
Total Contact Hours: 60
Suggested Activities:
● Assignment problems, Quiz.
● Class presentation/Discussion
Textbooks:
1. Anand Shinde, “Introduction to Cyber Security Guide to the World of Cyber Security”,
Notion Press, 2021
2. Bill Nelson, Amelia Phillips, Frank Enfinger, Christopher Steuart, “Computer
Forensics and Investigations”, Cengage Learning, India Edition, 2016.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23A33.1 1 1 1 1 - 1 - - - - 1 - 2 2 2
CS23A33.2 1 3 1 3 2 1 - - - - - 2 2 1
CS23A33.3 2 1 1 1 - 1 - - - - 1 - 2 2 2
CS23A33.4 3 3 2 2 2 1 - - - - - 2 2 2
CS23A33.5 3 2 1 1 1 1 - 1 - - 1 - 2 2 2
Average 2 2 1.2 1.6 1.6 1 - 1 - - 1 - 2 2 1.8
Objectives:
● To understand the fundamentals of Web Application Security
● To know about web application authentication and authorization mechanism
● To identify common web application vulnerabilities
● To focus on wide aspects of secure development and deployment of web applications
● To get insight about mitigations and countermeasures against web application attacks
UNIT I INTRODUCTION 6
History of Software Security – OWASP Top Ten List 2021 – Input Validation – Attack Surface Reduction –
Classifying and Prioritizing Threats
Cross Site Scripting- Reflected XSS- Stored XSS- DOM based XSS- Mutation based XSS – Cross Site Request
Forgery - SQL Injection – Code Injection – Insecure Direct Object References (IDOR)
Anti XSS Coding Best Practices- Sanitizing User Input – Anti CSRF Coding Best Practices – Mitigating Against
SQL Injection – Generic Injection Defenses – Defending Against IDOR – Architecture Level Mitigations
Total Contact Hours : 30
List of Experiments
1 Identify security issues in web application – Walking An Application in TryHackMe Platform
2 Burp Suite Basics in TryHackMe Platform
3 OWASP ZAP to scan authenticated web application in TryHackMe Platform
4 SQL Injection Lab in TryHackMe Platform
5 Explore OWASP Top Ten -2021 Vulnerabilities in TryHackMe Platform
6 SQLmap to exploit web application in TryHackMe Platform
7 Exploit File Inclusion and Path Traversal Vulnerabilities in TryHackMe Platform
8 Server-Side Template Injection in TryHackMe Platform
9 DejaVu Code Injection Vulnerability in TryHackMe Platform
10 NoSQL Injection on MongoDB in TryHackMe Platform
Contact Hours: 30
Total Contact Hours: 60
Suggested Activities:
● Assignment problems, Quiz.
● Class presentation/Discussion
Textbooks:
1 Andrew Hoffman, “Web Application Security: Exploitations and Countermeasures for Modern Web
Applications”, 2nd Edition, O’Reilly, 2024
2 Brian Sullivan and Vincent Liu, “Web Application Security: A Beginners Guide”, 1 st Edition, McGrawHill,
2012
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23A35.1 1 2 2 1 3 - - - - - - 1 - - -
CS23A35.2 2 1 2 1 3 - - - - - - - - - -
CS23A35.3 1 1 1 2 3 - - - - - - 1 - - -
CS23A35.4 1 2 1 1 2 - - - - - - - - - -
CS23A35.5 1 2 2 2 2 - - - - - - 1 - - -
Average 1.2 1.6 1.6 1.4 2.6 - - - - - - 1 - - -
Objectives:
● To discuss on basis of 3D Printing
● To explain the file format of 3D Printing techniques
● To explain the processes of 3D Printing
● To explain and demonstrate INKJET technology
● To explain and demonstrate laser technology
Vat photo polymerization, Material jetting, Binder jetting, Powder bed fusion, Material extrusion, Directed energy
deposition, Sheet lamination, 3D printing Processes limitations and Industrial applications.
List of Experiments
1 Analyze the CAD software's interface and fundamental tools
2 Study 3D printers including print head, build envelope, materials used and related support removal systems
3 Review the Commands for moving from 2D to 3D
4 Adept CAD commands for exploring 3D objects
Design every Day Object Using Thingiverse, Shapeways, and GitFab
▪ Mobile Stand
5
▪ Football
▪ Tooth Brush
6 Use the CAM Software to prepare files for 3D Printing
7 Manipulate machine movement and material layering
Contact Hours: 30
Total Contact Hours: 60
Textbooks:
1 Christopher Barnatt, 3D Printing: The Next Industrial Revolution, CreateSpace Independent Publishing
platform,2013
2 Ibrahim Zeid, Mastering CAD CAM Tata Mc Graw- Hill Publishing Co.,2007
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23A36.1 1 1 2 2 3 1 - - 2 - 2 2 3 2 1
CS23A36.2 3 2 3 3 3 2 - - 3 - 3 2 3 2 3
CS23A36.3 2 2 2 2 2 2 - - 2 - 2 2 3 2 2
CS23A36.4 2 2 2 2 3 2 - - 2 - 2 2 3 3 2
CS23A36.5 1 3 3 3 3 3 - - 3 - 3 3 3 3 1
Average 1.8 2 2.4 2.4 2.8 2 - - 2.4 - 2.4 2.2 3 2.4 1.8
Objectives:
To learn about Quantum information.
To gain knowledge about Quantum algorithms.
To understand and learn about Quantum random number generators.
To study the basis of post-Quantum cryptography.
Course Outcomes:
On completion of the course, the students will be able to
Apply quantum gates and circuits using quantum information.
Apply quantum algorithms in cryptosystems.
Understand the importance of Quantum random number generator.
Understand the importance of Quantum key distribution.
Apply the concept of post-quantum cryptography.
Reference Books(s) :
1 P. Kaye, R. Laflamme, and M. Mosca, “An Introduction to Quantum Computing”. Oxford University Press,
New York, 2006.
2 N. David Mermin, “Quantum Computer Science”, Cambridge University Press, 2007.
3 Quantum Cryptography. D. Unruh, Available online:
https://courses.cs.ut.ee/all/MTAT.07.024/2017_fall/uploads/
4 SAPV Tharrmashastha, D. Bera, A. Maitra and S. Maitra, “Quantum Algorithms for Cryptographically
Significant Boolean Functions - An IBMQ Experience”, Springer, 2020.
5 Quantum Algorithm Zoo. https://quantumalgorithmzoo.org/
6 A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, “Handbook of Applied Cryptography”, CRC Press,2018.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CB23G11.1 3 3 3 3 3 2 - - - - 2 2 3 3 1
CB23G11.2 3 3 3 3 2 1 - - - - 2 2 3 3 1
CB23G11.3 3 3 2 2 2 1 - - - - 1 1 3 3 1
CB23G11.4 3 3 2 3 2 1 - - - - 1 1 3 3 1
CB23G11.5 3 3 2 2 2 1 - - - - 1 1 3 3 1
Average 3.0 3.0 2.4 2.6 2.2 1.2 - - - - 1.4 1.4 3.0 3.0 1.0
Course Objectives:
To provide students with an understanding of Oracle APEX as a platform for rapid application development using
Oracle Autonomous Database.
To enable students to create, design, and manage database-driven applications with interactive features.
To introduce advanced techniques for managing interactive reports, grids, and dynamic data visualization tools like
cards and smart filters.
To teach students how to enhance applications using dynamic actions, computations, processes, validations, and
implement robust security features.
To prepare students to handle application lifecycle tasks such as migrating development between environments and
managing application data effectively.
List of Experiments
1. Setting up the environment and getting started with Oracle APEX.
2. Exploring SQL Workshop, creating tables, and executing SQL queries.
3. Creating database application and deploying it on APEX.
4. Adding and customizing pages and regions in an application.
5. Creating and formatting reports to visualize data.
6. Modifying interactive reports to enhance user interaction.
7. Managing and personalizing interactive grids in an application.
8. Adding page controls like buttons, list items, and selectors.
9. Integrating computations, processes, and validations for application logic.
10. Implementing dynamic actions to enhance user interactivity.
11. Designing and implementing advanced search and filter options.
12. Creating interactive forms and connecting them with database tables.
13. Designing and implementing navigation menus and breadcrumbs.
14. Customizing application look and feel using themes and styles.
15. Adding plugins and JavaScript to extend functionality.
16. Importing, exporting, and managing data within an application.
17. Implementing security measures like authentication and authorization.
18. Integrating new pages into the existing application structure.
19. Deploying and migrating applications across different environments.
Contact Hours : 90
Course Outcomes:
Upon completing the course, students will be able to:
Demonstrate the ability to use Oracle APEX to create and deploy scalable database applications.
Develop and customize pages, regions, forms, and navigation components for a seamless user experience.
Integrate interactive reports, grids, dynamic actions, and search functionalities to enhance application interactivity and
usability.
Apply best practices for securing applications and managing data, including implementing authentication and
authorization techniques.
Exhibit proficiency in migrating applications between environments and extending their capabilities using themes,
plugins, and advanced customization techniques.
Software Requirements:
1. Oracle APEX Installation Requirements
URL: https://docs.oracle.com/en/database/oracle/apex/24.1/htmig/apex-installation-requirements.html#GUID-
02BE4A34-B631-412C-8A82-EB92DABBACE0
2. Oracle Database Requirements
Oracle APEX release 24.1 requires an Oracle Database release 19c or later. APEX runs on all database editions,
including Enterprise Edition (EE), Standard Edition (SE), and Oracle Database Free. APEX can be installed in single-
instance database and in Oracle Real Application Clusters (Oracle RAC) database.
3. Browser Requirements
Oracle APEX requires a JavaScript-enabled browser and supports the current and prior major release of Google
Chrome, Mozilla Firefox, Apple Safari, and Microsoft Edge.
Text Books:
1. Oracle APEX: The Essentials, Patrick Cimolini, Packt Publishing, 1st Edition, 2020.
2. Pro Oracle Application Express, John Scott and Scott Spendolini, Apress, 2nd Edition, 2021
3. Oracle APEX Cookbook, Marcel van der Plas, Packt Publishing, 3rd Edition, 2019.
Reference Books:
1. Beginning Oracle Application Express, Rick Greenwald, Apress, 1st Edition, 2022.
2. Oracle APEX Best Practices, Alex Nuijten, Iloon Ellen-Wolff, Learco Brizzi, Packt Publishing, 1st Edition, 2016.
3. Oracle Database 19c and 21c New Features, Bert Scalzo, Mukesh Sharma, Oracle Press (McGraw Hill), 1st Edition,
2021.
4. Oracle Application Express for Beginners: A Hands-on Approach, Riaz Ahmed, Independently Published, 1st
Edition, 2020.
5. Advanced Oracle PL/SQL Developer's Guide, Saurabh K. Gupta, Packt Publishing, 3rd Edition, 2019.
Websites:
1. Oracle APEX Official Documentation
URL: https://docs.oracle.com/en/database/oracle/application-express/index.html
2. Oracle APEX Community
URL: https://apex.oracle.com/community/
3. Oracle APEX Tutorials on Oracle Learning Library
URL: https://apex.oracle.com/en/learn/
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23B32.1 3 2 2 1 3 - 2 - 1 2 1 3 3 2 2
CS23B32.2 3 3 3 2 3 1 2 1 2 3 2 3 3 3 3
CS23B32.3 2 3 3 2 3 1 1 1 2 3 2 3 3 3 2
CS23B32.4 3 2 2 3 2 3 3 3 2 2 3 3 2 2 3
CS23B32.5 3 2 3 3 3 1 2 2 2 3 3 3 3 3 3
Average 2.8 2.4 2.6 2.2 2.8 1.5 2 1.8 1.8 2.6 2.2 3 2.8 2.6 2.6
Course Objectives:
To introduce the fundamental concepts of modern general-purpose databases and distinguish between relational and
non-relational database systems.
To provide practical exposure to MongoDB's features, architecture, and developer ecosystem, including MongoDB
Atlas.
To enable students to design, query, and manipulate complex data using MongoDB Query Language (MQL) and
aggregation frameworks.
To develop skills in data modeling, indexing, sharding, and implementing transactions in MongoDB for scalable and
efficient database applications.
To explore the integration of MongoDB with modern application development through drivers, connectors, and real-
time capabilities like change streams.
List of Experiments
1. Exploring the Features of a Modern General-Purpose Database.
2. Comparing Relational and Non-Relational Databases through Practical Examples.
3. Demonstrating Different Types of Non-Relational Databases.
4. Identifying Scenarios for Using Non-Relational Databases.
5. Understanding the Document Model and Getting Started with MongoDB.
6. Building Applications Using MongoDB as a Developer Data Platform.
7. Investigating MongoDB’s Architecture with Hands-On Exploration.
8. Managing Databases in the Cloud Using MongoDB Atlas.
9. Writing Queries in Relational and Non-Relational Databases.
10. Crafting Queries Using MongoDB Query Language (MQL)
11. Querying Complex Data Structures in MongoDB Using MQL.
12. Applying Operators and Compound Conditions in MongoDB Queries.
13. Inserting and Updating Documents in MongoDB Collections.
14. Deleting Data Efficiently in MongoDB Collections.
15. Exploring the MongoDB Aggregation Framework.
16. Using the Aggregation Framework to Query Data in MongoDB.
17. Designing Data Models and Schema Patterns in MongoDB.
18. Implementing Sharding to Distribute Data Across Multiple Nodes in MongoDB.
19. Optimizing Query Performance with Indexing in MongoDB.
20. Implementing Transactions in MongoDB for Multi-Document Operations.
21. Real-Time Data Streams with Change Streams in MongoDB.
22. Integrating MongoDB with Applications Using Drivers, Connectors, and Exploring the Ecosystem.
Contact Hours : 90
Course Outcomes:
Upon completing the course, students will be able to:
Differentiate between relational and non-relational databases and identify scenarios for the use of modern database
systems.
Utilize MongoDB to build, query, and manage databases effectively using MQL and aggregation techniques.
Design and implement optimized schemas and data models, leveraging indexing and sharding for performance and
scalability.
Demonstrate the ability to handle transactions, manage data integrity, and perform real-time data streaming using
MongoDB's advanced features.
Integrate MongoDB with various application platforms using drivers and connectors to build robust, data-driven
solutions.
Text Books:
1. MongoDB: The Definitive Guide, Shannon Bradshaw, Eoin Brazil, Kristina Chodorow, O'Reilly Media, 3rd Edition,
2019.
2. Modern Database Management, Jeffrey A. Hoffer, Ramesh Venkataraman, Heikki Topi, Pearson, 13th Edition, 2020.
3. Mastering MongoDB 6.x: Expert techniques to build scalable and high-performance databases, Alex Giamas, David
S. Guttman, Packt Publishing, 2nd Edition, 2022.
Websites:
1. MongoDB Official Documentation
URL: https://www.mongodb.com/docs/
2. MongoDB University
URL: https://university.mongodb.com/
3. MongoDB Blog
URL: https://www.mongodb.com/blog/
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23B33.1 3 3 2 2 3 - - - - - - 2 3 2 1
CS23B33.2 2 3 2 3 3 - - - - 1 - 2 3 2 2
CS23B33.3 3 3 3 3 3 - 2 - - - - 2 3 3 3
CS23B33.4 2 3 3 3 3 - 2 1 - 1 1 2 3 3 3
CS23B33.5 3 2 3 3 3 - 1 - 2 3 2 3 3 2 3
Average 2.6 2.8 2.6 2.8 3 - 1.7 1 2 1.7 1.5 2.2 3 2.4 2.4
Objectives:
● To create an awareness about the importance and usefulness of the accounting concepts and their managerial
implications.
● To develop an understanding of the financial statements and the underlying principles and learn to interpret
financial statements.
● To develop an understanding of project costing. Understand the different terms like cost, budget, estimate,
margins. Recognize the different components that contribute to project costs, including direct costs, indirect
costs, and overhead.
● Understand the concept of cost-benefit analysis: Learn how to evaluate the financial viability of a project by
comparing its costs to its benefits.
4 SinghviBodhanwala, “Management Accounting -Text and cases”, Third Edition, PHI Learning, 2018.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
BA23512.1 3 2 2 2 2 - - - - - 2 2 2 2 2
BA23512.2 3 3 3 3 3 - - - - - 3 2 3 3 2
BA23512.3 2 2 2 2 3 - - - - 3 3 2 3 3 2
BA23512.4 2 2 3 2 2 - - 2 3 3 3 3 2 2 3
BA23512.5 3 2 2 2 2 - - - - - 2 2 2 2 2
Average 2.6 2.2 2.4 2.2 2.4 - - 2 3 3 2.6 2.2 2.4 2.4 2.2
Objectives:
To learn the criteria for test cases
To learn the design of test cases.
To understand test management and test automation techniques
To understand test management and test structure group
To apply test metrics and measurements
UNIT-I INTRODUCTION 6
Testing as an Engineering Activity – Testing as a Process – Testing Maturity Model- Testing axioms – Basic
definitions – Software Testing Principles – The Tester‘s Role in a Software Development Organization – Origins of
Defects – Cost of defects – Defect Classes – The Defect Repository and Test Design
UNIT-II TEST CASE DESIGN STRATEGIES 6
Test case Design Strategies – Using Black Box Approach to Test Case Design – Using White Box Approach to Test
design – Test Adequacy Criteria – static testing vs. structural testing – code functional testing – Coverage and Control
Flow Graphs – Covering Code Logic – Paths – Secured Code Writing – code complexity testing
UNIT-III LEVELS OF TESTING 6
The need for Levels of Testing – Unit Test – Unit Test Planning – Designing the Unit Tests –Running the Unit tests
and Recording results – Integration tests – Designing Integration Tests – Integration Test Planning – Scenario testing –
Defect bash elimination System Testing – Acceptance testing – Performance testing – Regression Testing –
Internationalization testing – Ad-hoc testing – Alpha, Beta Tests – Testing OO systems – Usability and Accessibility
testing – Configuration testing –Compatibility testing .
Course Outcomes: At the end of the course the students will be able to
Design test cases suitable for a software development for different domains
Identify suitable tests to be carried out
Prepare test planning based on the document
Document test plans and test cases designed
Use Automatic Testing Tools and Develop and Validate a Test Plan
Text Book(s):
1. Andreas Spillner, Tilo Linz, “Software Testing Foundations“, 5th Edition, O’Reilly Publisher, 2021.
2. Arnon Axelrod, “Complete Guide to Test Automation: Techniques, Practices, and Patterns for Building and
Maintaining Effective Software Projects “, Apress Publisher, 1st Edition, September 2018
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
IT23C31.1 3 2 3 - 1 - - 1 2 2 3 3 2 2 2
IT23C31.2 3 2 3 - 2 - - - 1 2 2 2 3 2 2
IT23C31.3 3 2 3 - 1 - - 1 - 2 2 2 2 2 2
IT23C31.4 3 2 3 - 2 - - - 1 2 1 1 3 1 2
IT23C31. 5 3 2 3 - 1 - - 1 - 2 2 1 2 1 2
Objectives:
Understand the principles and practices of DevOps.
Gain proficiency in using DevOps tools like Git, Jenkins, Docker, Kubernetes, and Helm.
Learn to implement CI/CD pipelines for automation and efficiency.
Explore advanced topics like DevSecOps, security testing, and reducing deployment downtime.
Apply DevOps concepts to real-world applications and projects.
List of Experiments
1. Exploring Git Commands through Collaborative Coding.
2. Implement GitHub Operations
3. Exploring Git Commands through Collaborative Coding.
4. Implement GitHub Operations
5. Applying CI/CD Principles to Web Development Using Jenkins, Git, and Local HTTP Server
6. Exploring Containerization and Application Deployment with Docker
7. Applying CI/CD Principles to Web Development Using Jenkins, Git, using Docker Containers
8. Demonstrate Container Orchestration using Kubernets.
9. Create the GitHub Account to demonstrate CI/CD pipeline using Cloud Platform.
10. Reduce the Downtown using Blue-Green Deployment
11. Testing Project with ZAP and Postmen
Contact Hours : 30
Total Contact Hours: 60
SUGGESTED ACTIVITIES
Case Study:
Evolution of DevOps in industry-leading companies. Group discussion on the DevOps lifecycle and
workflow.
Code walkthrough:
Implementing a blue-green deployment strategy. Conducting security analysis using Sonar Cloud and GitHub
Actions and walkthrough the code to the group.
Text Book(s):
1. Mark Reed, " DevOps The ultimate beginners guide to learn DevOps step by-step", Amazon,2019.
2. Craig Berg, “DevOps For Beginners: A Complete Guide To DevOps Best Practices, Second edition, Amazon, 2020.
3. Mikael Krief, "Learning Devops" , Second Edition, Packt Publisher, 2022.
CO-PO-PSO Mapping
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
IT23B33.1 3 2 2 – 3 – – 2 3 2 – – 2 2 –
IT23B33.2 3 3 3 3 3 2 3 3 3 3 3 3 3 3 3
IT23B33.3 3 3 3 3 3 2 3 3 3 3 2 3 3 3 3
IT23B33.4 3 3 3 3 3 2 3 3 3 3 3 3 3 3 3
IT23B33. 5 3 3 3 3 3 2 3 3 3 3 3 3 3 3 3
Objectives:
To learn basic programming in C# and the object-oriented programming concepts
To study the advance programming concepts in C#
To understand the working of base class libraries, their operations and manipulation of data using XML
To update and enhance skills in writing Windows application, WPF, WCF and WWF with C# and .NET
To implement mobile applications using .Net compact framework
List of Experiments
1. Write a console application that obtains four int values from the user and displays the product.
Hint: you may recall that the Convert.ToDouble() command was used to convert the input from the console
to a double; the equivalent command to convert from a string to an int is Convert.ToInt32().
2. Write an application that receives the following information from a set of students: Student Id:
Student Name:
Course Name:
Date of Birth:
The application should also display the information of all the students once the data is Entered. Implement
this using an Array of Structures
3. Write a program to declare a class “staff” having data members as name and post. Accept this data 5 for 5
staffs and display names of staff who are HOD.
4. Write a program to implement multilevel inheritance from following figure. Accept and display data for one
student.
5. Write a program to create a delegate called TrafficDel and a class called TrafficSignal with the following
delegate methods.
Public static void Yellow(){
Console.WriteLine(“Yellow Light Signal To Get Ready”);
}
Public static void Green(){
Console.WriteLine(“Green Light Signal To Go”);
}
Public static void Red(){
Console.WriteLine(“Red Light Signal To Stop”);
}
Also include a method IdentifySignal() to initialize an array of delegate with the above methods and a
method show() to invoke members of the above array.
6. Write a program to accept a number from the user and throw an exception if the number is not an even number.
7. Create an application that allows the user to enter a number in the textbox named “getnum”. Check whether the
number in the textbox “getnum” is palindrome or not. Print the message accordingly in the label control named
lbldisplay when the user clicks on the button “check”.
Contact Hours: 30
Total Contact Hours: 60
Text Book(s):
1. Christian Nagel, Bill Evjen, Jay Glynn, Karli Watson, Morgan Skinner, “Professional C# 2012 and .NET 4”, Wiley,
2012.
2. Andy Wigley, Daniel Moth, Peter Foot, “Mobile Development Handbook”, Microsoft Press, 2007.
CO-PO-PSO Mapping
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
IT23B31.1 2 2 1 1 1 - - - 1 - - 1 2 1 -
IT23B31.2 2 2 1 2 1 - - - 1 - 2 2 2 2 -
IT23B31.3 2 2 2 1 1 - - - 1 - - 1 2 1 -
IT23B31.4 2 2 2 2 2 - - - 2 - 2 2 2 2 2
IT23B31.5 3 2 2 2 3 - - - 3 - 2 1 2 2 2
Objectives:
● To understand the basics of Internet of Things and communication protocols.
● To understand the basic principles, architecture, and components, Methods of IoT systems.
● To explore the hardware aspects, including microcontrollers (e.g., Arduino, Raspberry Pi) and sensors
commonly used in IoT projects.
● To gain hands-on experience with popular IoT platforms, Physical servers and cloud.
● To learn how to process, analyze, and visualize data collected from IoT devices to derive actionable insights
SUGGESTED ACTIVITIES
Case Study Analysis: Analyze case studies that implement Internet of Things on the following Sectors- Retail,
Health care, Transportation, Agriculture and environmental, Smart city, Government and military, Smart homes.
Text Book(s):
1.Honbo Zhou, “The Internet of Things in the Cloud: A Middleware Perspective“, CRC Press, First Edition, 2012
2.Dieter Uckelmann, Mark Harrison, Michahelles, Florian, “Architecting the Internet of Things “, 2011 Edition.
Springer,April 2011.
3.Olivier Hersent, David Boswarthick, Omar Elloumi , “The Internet of Things – Key Applications and Protocols“,
Second Edition, John Wiley & Sons Inc, 2012.
CO-PO-PSO Mapping
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
IT23A11.1 3 3 - 2 3 2 - - 2 - 1 2 3 2 3
IT23A11.2 3 3 - 2 3 2 - - 2 - 1 2 3 2 3
IT23A11.3 3 3 - 2 3 2 - - 2 - 1 2 3 2 3
IT23A11.4 3 3 - 2 3 2 - - 2 - 1 2 3 2 3
IT23A11. 5 3 3 - 2 3 2 - - 2 - 1 2 3 2 3
Average 3 3 - 2 3 2 - - 2 - 1 2 3 2 3
Objectives:
This course describes the key aspects of a software project.
It introduces the basic principles of Engineering Software Projects. Most, if not all, students’ complete
projects as part of assignments in various courses undertaken.
The course provides an understanding of the purpose, methods and benefits of process management by
exposing the student to the concepts, practices, processes, tools and techniques used in process management
for software development.
Course Outcomes:
Apply project management concepts and techniques to an IT project.
Identify issues that could lead to IT project success or failure.
Explain project management in terms of the software development process.
Describe the responsibilities of IT project managers.
Apply project management concepts through working in a group as team leader
SUGGESTED ACTIVITIES
● Problem solving sessions
● Activity Based Learning
● Implementation of small module
CO-PO-PSO Mapping
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
IT23C12.1 1 2 3 - 1 - - 1 2 2 3 3 2 2 2
IT23C12.2 2 1 2 - 2 - - - 1 2 2 2 3 2 1
IT23C12.3 2 2 2 - 1 - - 1 - 2 2 2 2 2 2
IT23C12.4 1 2 3 - 2 - - - 1 2 1 1 3 1 2
IT23C12. 5 2 2 3 - 1 - - 1 - 2 2 1 2 1 2
Average 1.7 1.8 2.6 - 1.4 - - 1 1.3 2 2 1.8 2.4 1.7 1.8
Objectives:
1. Understand the fundamental concepts and principles of ubiquitous computing.
2. Understand the architecture, lifecycle, and integration of smart devices and services in modern technological
ecosystems.
3. Design and develop basic ubiquitous computing systems or applications.
4. Explore the principles and design of intelligent systems, focusing on interaction, autonomy, and artificial life.
5. Communicate effectively about ubiquitous computing concepts and applications.
UNIT-I INTRODUCTION 9
Applications- Properties- Implicit Human Computer Interaction- Ubiquitous System Environment Interaction -
Architectural Design for UbiCom Systems- Applications and Requirements: Example Early UbiCom Research
Projects, Everyday Applications in the Virtual, Human and Physical World
UNIT-II SMART DEVICES 9
Smart Devices and Services - Service Architecture Models - Service Provision Life Cycle - Virtual Machines and
Operating Systems- Smart Mobile Devices, Users, Resources and Code- Operating Systems for Mobile Computers
and Communicator Devices - Smart Card Devices- Device Networks
UNIT-III HUMAN COMPUTER INTERACTION 9
Basic Concepts - User Interfaces and Interaction for Four Widely Used Devices - Hidden UI Via Basic Smart Devices
- Hidden UI Via Wearable and Implanted Devices - Human Centred Design (HCD) - Tagging the Physical World -
Sensors and Sensor Networks - Control Systems - Robots
UNIT-IV INTELLIGENT SYSTEMS 9
Basic Concepts, IS Architectures, IS System Operations - Interaction Multiplicity- Interaction Design -Generic
Intelligent Interaction Applications- Autonomous Systems and Artificial Life
UNIT-V UBIQUITOUS COMMUNICATION 9
Audio Networks, Data Networks, Wireless Data Networks and Ubiquitous Networks- Managing Smart Devices in
Virtual Environments and Human User Centered Environments
Course Outcomes:
1. Gain a comprehensive understanding of the principles and concepts underlying ubiquitous computing.
2. Design and implement service-oriented solutions leveraging smart devices and networks.
3. Understanding ubiquitous computing applications across various platforms, including mobile, wearable, and
IoT devices.
4. Design intelligent systems with effective interaction and autonomous capabilities.
5. Apply ubiquitous computing principles to solve real-world problems and challenges such as healthcare, smart
cities, and personalized services.
SUGGESTED ACTIVITIES (if any) (UNIT/ Module Wise) – Could suggest topic
● Case study on ubiquitous computing
● Survey on various application
● Activity Based Learning
● Implementation of small module
SUGGESTED EVALUATION METHODS (if Any) (UNIT/ Module Wise) – could suggest topic
● Tutorial problems
● Assignment problems
● Quizzes
● Class Presentation/Discussion
CO-PO-PSO Mapping
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
IT23C17.1 3 2 3 - 1 - - 1 2 2 3 3 2 2 2
IT23C17.2 3 2 2 - 2 - - - 1 2 2 2 3 2 2
IT23C17.3 3 2 2 - 1 - - 1 - 2 2 2 2 2 2
IT23C17.4 3 2 3 - 2 - - - 1 2 1 1 3 1 2
IT23C17. 5 3 2 3 - 1 - - 1 - 2 2 1 2 1 2
OBJECTIVES:
To introduce the terminology, technology and its applications
To introduce the concept of M2M (machine to machine) with necessary protocols
To introduce the Python Scripting Language which is used in many IoT devices
To introduce the Raspberry PI platform, that is widely used in IoT applications
To introduce the implementation of web-based services on IoT devices
UNIT-I Introduction 3
Definition and Characteristics of IoT, Sensors, Actuators, Physical Design of IoT – IoT Protocols, IoT communication
models, IoT Communication APIs, IoT enabled Technologies – Wireless Sensor Networks, Cloud Computing, Embedded
Systems, IoT Levels and Templates, Domain Specific IoTs – Home, City, Environment, Energy, Agriculture and Industry.
UNIT-II IoT and M2M 3
Software defined networks, network function virtualization, difference between SDN and NFV for IoT, Basics of IoT
System Management with NETCONF, YANG- NETCONF, YANG, SNMP NETOPEER
UNIT-III IoT Physical Devices and Controlling Hardware 3
IoT Physical Devices and Endpoints- Introduction to Arduino and Raspberry Pi- Installation, Interfaces (serial, SPI, I2C)
Controlling Hardware- Connecting LED, Buzzer, Switching High Power devices with transistors, Controlling AC Power
devices with Relays, Controlling servo motor, speed control of DC Motor, unipolar and bipolar Stepper motors
UNIT-IV Sensors 3
Light sensor, temperature sensor with thermistor, voltage sensor, ADC and DAC, Temperature and Humidity Sensor
DHT11, Motion Detection Sensors, Wireless Bluetooth Sensors, Level Sensors, USB Sensors, Embedded Sensors,
Distance Measurement with ultrasound sensor
UNIT-V IoT Physical Servers and Cloud Offerings 3
Introduction to Cloud Storage models and communication APIs Web Server – Web server for IoT, Cloud for IoT, Python
web application framework Designing a RESTful web API
Total Contact Hours : 15
List of Experiments
1 Use Light Dependent Resistor (LDR) and control an LED that should switch-on/off depending on the light.
2 Create a traffic light signal with three colored lights (Red, Orange and Green) with a duty cycle of 5-2-10 seconds
3 Switch on and switch of a DC motor based on the position of a switch.
4 Convert an analog voltage to digital value and show it on the screen.
5 Create a door lock application using a reed switch and magnet and give a beep when the door is opened.
6 Control a 230V device (Bulb) with Raspberry Pi using a relay.
7 Control a 230V device using a threshold temperature, using a temperature sensor.
Create an application that has three LEDs (Red, Green and white). The LEDs should follow the cycle (All Off, Red
8
On, Green On, White On) for each clap (use sound sensor).
Create a web application for the above applications wherever possible with suitable modifications to get input and to
9
send output.
Contact Hours : 60
Total Contact Hours : 75
Hardware Requirements:
1. Arduino board, ultrasonic sensor, IR sensor, breadboard, jumper wires.
2. Raspberry Pi
Software Requirements:
1. Jupyter Notebook (Python), Anaconda.
2. Arduino IDE.
3. MATLAB
Textbooks:
1. Arshdeep Bahga and Vijay Madisetti, Universities Press, “Internet of Things - A Hands-on Approach”, 2015, ISBN:
9788173719547
2. Matt Richardson & Shawn Wallace, “Getting Started with Raspberry Pi”, O'Reilly (SPD), 2014, ISBN:
9789350239759
3. Simon Monk, Raspberry Pi Cookbook,” Software and Hardware Problems and solutions”, O'Reilly (SPD), 2016,
ISBN 7989352133895
Reference Books(s):
1 Peter Waher, “Learning Internet of Things”, Packt Publishing, 2015 3. Editors Ovidiu Vermesan
2 Peter Friess,”Internet of Things – From Research and Innovation to Market Deployment”, River Publishers, 2014
CS23B35.2 - 3 - 2 - - - - - 2 1 1 2 - -
CS23B35.3 - - - 1 - - - - - 3 - - 2 - -
CS23B35.4 - 1 - 1 - - - - - 3 - 2 3 - 1
CS23B35.5 1 1 1 1 1 1 1 1 2 3 1 1 1 - -
AVERAGE 1.0 1.7 1.0 1.3 1.0 1.0 1.0 1.0 2.0 2.8 1.0 1.8 2.0 2.0 1.0
Objectives:
● To understand Object Oriented Programming concepts and characteristics of Java.
● To know the principles of classes, abstraction and inheritance.
● To create packages, define exceptions and use interface.
● To use I/O streams and Generics in applications.
● To learn how to organize and handle data effectively in Java programs, making them faster and easier to
manage using Collections
SUGGESTED ACTIVITIES
● Quizzes – basic concepts of JAVA & language basics
● Tutorial – Class & Inheritance
● Flipped Classroom – Packages & Interface
● Mind Map, Poster Design – IO & Generics
● Implementation of small Systems- Collections
Text Books(s):
1 Herbert Schildt, “Java The complete reference”, 9th Edition, McGraw Hill Education, 2014
2 Cay S. Horstmann, Gary cornell, “Core Java Volume –I Fundamentals”, 9th Edition, Prentice Hall, 2013.
Reference Books:
1 Paul Deitel, Harvey Deitel, “Java SE 8 for programmers”, 3rd Edition, Pearson, 2015.
2 Steven Holzner, “Java 2 Black book”, Dreamtech press, 2011.
Timothy Budd, “Understanding Object-oriented programming with Java”, Updated Edition, Pearson Education,
3
2000.
4 SCJP Sun Certified Programmer for Java 6 Study Guide. 6th edition, McGrawHill.
5 https://www.javatpoint.com/java-tutorial
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
OCS2331.1 3 3 3 2 - - - - - - - - 3 3 2
OCS2331.2 3 3 3 2 - - - - - - - - 3 3 2
OCS2331.3 3 3 3 3 - - - - - - - - 3 3 3
OCS2331.4 3 3 3 3 3 - - - - - - 3 3 3 3
OCS2331.5 3 3 3 3 3 - 2 - 2 2 3 3 3 3 3
Average 3 3 3 2.6 3 - 2 - 2 2 3 3 3 3 2.6
Correlation levels 1, 2 or 3 are as defined below:
1: Slight (Low) 2: Moderate (Medium) 3: Substantial (High) No correlation: “- “
Objectives:
● To introduce the basics of C programming language.
● To learn the concepts of advanced features of C.
● To understand the concepts of ADTs and linear data structures
● To know the concepts of non-linear data structure and hashing.
● To familiarize the concepts of sorting and searching techniques.
List of Experiments
1. C programs using single and multidimensional arrays
2. C program using Pointers
3. C program using structures
4. C programs for file handling
5. Implementation of Singly, Doubly, Circular Linked List
6. Implementation of Stack and Queue
7. Implementation of Binary Search Tree
8. Implementation of Hashing Techniques
9. Implementation of Searching algorithms using C
10. Implementation of Sorting algorithms using C
Contact Hours: 30
Total Contact Hours: 60
2. Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman, “Data Structures and Algorithms”, Pearson Education,
1983.
3. Paul J. Deitel, Harvey Deitel, “C How to Program”, Seventh Edition, Pearson Education, 2013.
Reference books:
1 Anany Levitin, “Introduction to the Design and Analysis of Algorithms”, 3rd Edition, Pearson Education, 2012.
2 Ellis Horowitz, SartajSahni and Susan Anderson-Freed, Fundamentals of Data Structures in C, 2nd
Edition, University Press, 2008.
3 https://www.hackerrank.com/
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
OCS2332.1 2 2 - - - - - - - - - 2 3 2 2
OCS2332.2 3 3 3 3 3 - - - - - - 2 3 3 2
OCS2332.3 3 3 3 3 3 3 2 - - - 2 3 3 3 3
OCS2332.4 3 3 3 3 2 - - - - - - 2 3 3 2
OCS2332.5 3 3 3 3 3 3 2 - 2 2 2 3 3 3 3
Average 2.8 2.8 3 3 2.6 3 2 - 2 2 2 2.4 3 2.8 2.4
Objectives:
● To learn assistive technologies for individuals with disabilities and to understand how technologies aid human
activity within different contexts
● To understand ethical considerations surrounding assistive technology, and learn effective service delivery
strategies.
● To explore user inputs, control interfaces, mainstream ICT, web technologies, and seating integration to enhance
functionality and participation in assistive technology contexts.
● To analyze technologies enabling mobility, transportation assistance, and manipulation/control of the
environment.
● To investigate sensory aids for visual and auditory impairments, cognitive augmentation technologies, and
augmentative communication systems.
Reference Books:
Bouck, E. C. (2017). Assistive technology. Sage Publications
1.
Draper, Sharon M. (2010). Out of my mind. Atheneum Books for Young Readers.
2.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
OCS2333.1 3 1 1 1 1 - - - - - - - - - -
OCS2333.2 3 1 1 1 1 - - - - - - - - - -
OCS2333.3 3 1 1 1 1 - - - - - - - - - -
OCS2333.4 3 1 1 1 1 - - - - - - - - - -
OCS2333.5 3 1 1 1 1 - - - - - - - - - -
Average 3 1 1 1 1 - - - - - - - - - -
Objectives:
● To understand the basic concepts in Web Design.
● To understand a dynamic web page using JavaScript
● To learn how to develop server-side programs using PHP
● To learn how to create Animations & Effect using JQuery
● To learn responsive websites using Bootstrap
List of Experiments
1 Create a web page to embed a map along with hot spot frames & links.
2 Create a web page using an embedded, external, and inline CSS file.
3 Create an online job registration page along with java script validations.
4 Write a PHP program for Employee Details, which includes EmpID, Name, Designation, Salary, DOJ, etc., to
connect with the database and execute queries to retrieve and update data. Also, prepare the report for single and
group of employees based on the end user needs.
5
Create an online application in any of the web application like PHP for Tourism management like the available trip
details in season based. Type of mode, Concession details for passengers and Booking / Cancelling tickets.
Suggested Activities:
Assignment problems, Quiz.
Class presentation/Discussion
Textbooks:
1. Robin Nixon, “Learning PHP, MySQL, JavaScript, CSS & HTML5” Third Edition, O’Reilly publishers, 2014.
2. Paul Deitel, Harvey Deitel, Abbey Deitel, “Internet & World Wide Web – How to Program”, 7th edition,
Pearson Education, 2012.
COs/
POs PO 1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO 10 PO 11 PO 12 PSO 1 PSO 2 PS0 3
OCS2334.1 3 3 3 3 3 3 2 2 3 - 1 3 3 3 2
OCS2334.2 3 3 3 3 3 3 - - - - 1 1 3 3 2
OCS2334.3 3 3 3 3 3 - - 2 2 - 2 2 3 3 3
OCS2334.4 3 3 3 3 3 - - - 2 2 2 3 3 3 3
OCS2334.5 3 3 3 3 3 3 2 2 - - 3 3 3 3 3
Average 3 3 3 3 3 2.0 2.0 2.0 2.3 2.0 1.8 2.4 3 3 2.6
Objectives:
● Understand Various App Development Paradigms.
● Master Native App Development.
● Explore Hybrid App Development.
● Develop Skills in Cross-Platform Application Development.
● Evaluate Non-Functional Aspects of Application Development.
Comparison of different App frameworks, Build Performance, App Performance, Debugging capabilities, Time to
Market, Maintainability, Ease of Development, UI/UX, Reusability.
Contact Hours: 30
List of Experiments
1. Introduction to MIT App Inventor.
2. Develop an application for a BMI calculator.
3. Develop an application for a simple expense manager, which allows entering expenses and income on each day
and displays category wise weekly income and expense.
4. Develop an application to convert units from imperial system to metric system (km to miles, kg to pounds etc.).
5. Design an application for a user login screen with username, password, reset button and a submit button. Also,
include header image and a label. Use layout managers.
6. Build a Music and Video application.
7. Create an Alarm application.
8. Develop an accelerometer and Shaking, Random Numbers and Dolphin Game.
9. Develop a Find my Phone application.
10. Develop an interactive quiz application.
11. Develop a browser app.
12. Develop a list picker app with DB.
13. Design and develop an application for day-to-day task (to-do) management.
14. Design and develop an application to find and display the current location of the user.
15. Mini Project.
Contact Hours: 30
Total Contact Hours: 60
Textbooks:
1. Head First Android Development, Dawn Griffiths, O’Reilly, 1 st edition.
2. Apache Cordova in Action, Raymond K. Camden, Manning, 2015.
3. Full Stack React Native: Create beautiful mobile apps with JavaScript and React Native, Anthony Accomazzo,
Houssein Djirdeh, Sophia Shoemaker, Devin Abbott, FullStack publishing.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
OCS2335.1 3 3 3 3 3 3 2 2 3 - 1 3 3 3 2
OCS2335.2 3 3 3 3 3 3 - - - - 1 1 3 3 2
OCS2335.3 3 3 3 3 3 - - 2 2 - 2 2 3 2 3
OCS2335.4 3 3 3 3 3 - - - 2 2 2 3 3 3 3
OCS2335.5 2 3 3 3 3 3 2 2 - - 3 3 3 3 3
Average 2.8 3 3 3 3 3.0 2.0 2.0 2.3 2.0 1.8 2.4 3 2.8 2.6
Objectives:
● To know the basics of algorithmic problems solving
● To develop Python programs with conditionals and loops
● To define Python functions and call them
● To use Python data structures–-lists, tuples, dictionaries
● To do input/output with files in Python
List of Experiments
1 Introduction to Python Programming and Python IDLE/Anaconda distribution.
2 Experiments based on Variables, Data types and Operators in Python.
3 Coding Standards and Formatting Output.
4 Algorithmic Approach: Selection control structures.
5 Algorithmic Approach: Iteration control structures.
6 Experiments based on Strings and its operations.
7 Experiments based on Lists and its operations.
8 Experiments based on Tuples and its operations.
9 Experiments based on Sets and its operations.
10 Experiments based on Dictionary and its operations.
11 Functions: Built-in functions.
12 Searching techniques: Linear and Binary.
13 Sorting techniques: Bubble and Merge Sort.
Contact Hours : 60
Total Contact Hours : 90
Text Books:
1. Allen B. Downey, Think Python: How to Think Like a Computer Scientist, Second edition, UpdatedforPython3, Shroff/
O’Reilly Publishers, 2016 (http://greenteapress.com/wp/think-python/)
2. Guido Van Rossum and Fred L. Drake Jr, An Introduction to Python-Revised and updated for Python3.2, Network
Theory Ltd., 2011.
Reference Books:
1. JohnVGuttag, Introduction to Computation and Programming Using Python, Revised and expanded Edition, MIT Press,
2013.
2. Robert Sedgewick, Kevin Wayne, Robert Dondero, Introduction to Programming in Python: An Inter-disciplinary
Approach, Pearson India Education Services Pvt. Ltd. 2016.
3. Timothy A.Budd, Exploring Python, Mc-Graw Hill Education (India) Private Ltd. 2015.
4. Kenneth A. Lambert, Fundamentals of Python: First Programs, Cengage Learning, 2012.
5. Charles Dierbach, Introduction to Computer Science using Python: A Computational Problem-Solving Focus, Wiley
India Edition,2013.
6. Paul Gries, Jennifer Campbell and Jason Montojo, Practical Programming: An Introduction to Computer Science using
Python3, Second edition, Pragmatic Programmers, LLC, 2013.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
GE23233.1 2 2 2 2 1 - - - 1 1 1 1 3 3 -
GE23233.2 2 1 1 1 1 - - - - - 1 1 3 2 -
GE23233.3 1 1 2 1 2 - - - - - 1 1 2 3 2
GE23233.4 2 2 3 2 2 - - - - - 2 1 2 2 2
GE23233.5 2 2 3 2 3 - - - - - 2 1 2 2 2
Average 1.8 1.6 2.2 1.6 1.8 - - 0.0 0.2 1 1.4 1 2.4 2.4 2
Objectives:
● To understand computers, programming languages and their generations and essential skills for a logical thinking for
problem solving.
● To write, test, and debug simple Python programs with conditionals, and loops and functions
● To develop Python programs with defining functions and calling them
● To understand and write python programs with compound data-lists, tuples, dictionaries
● To search, sort, read and write data from /to files in Python.
List of Experiments
1. Study of algorithms, flowcharts and pseudocodes.
2. Introduction to Python Programming and Python IDLE/Anaconda distribution.
3. Experiments based on Variables, Data types and Operators in Python.
4. Coding Standards and Formatting Output.
5. Algorithmic Approach: Selection control structures.
6. Algorithmic Approach: Iteration control structures.
7. Experiments based on Strings and its operations.
8. Experiments based on Lists and its operations.
9. Experiments based on Tuples and its operations.
10. Experiments based on Sets and its operations.
11. Experiments based on Dictionary and its operations.
12. Functions: Built-in functions.
13. Functions: User-defined functions.
14. Functions: Recursive functions.
15. Searching techniques: Linear and Binary.
16. Sorting techniques: Bubble and Merge Sort.
17. Experiments based on files and its operations.
Contact Hours : 75
Text Books:
1. Allen B. Downey, Think Python:How to Think Like a Computer Scientist, Second edition,UpdatedforPython3, Shroff/
O’Reilly Publishers, 2016 (http://greenteapress.com/wp/think-python/)
2. Guido Van Rossum and Fred L. Drake Jr, An Introduction to Python-Revised and updated for Python3.2, Network
Theory Ltd., 2011.
PO/PSO
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
GE23231.1 2 2 2 2 1 - - - 1 1 1 1 3 3 -
GE23231.2 2 1 1 1 1 - - - - - 1 1 3 2 -
GE23231.3 1 1 2 1 2 - - - - - 1 1 2 3 2
GE23231.4 2 2 3 2 2 - - - - - 2 1 2 2 2
GE23231.5 2 2 3 2 3 - - - - - 2 1 2 2 2
Objectives:
● To learn the features of C
● To learn about functions, pointers and structures
● To explore the applications of linear data structures list
● To explore the applications of linear data structures stack and queue
● To learn the basic sorting and searching algorithms and about hashing
List of Experiments
1 Programs using, I/O statements and expressions.
2 Programs using decision-making statements
3 Programs using Arrays and Strings
4 Programs using Functions
5 Programs using Structures
6 Linked list implementation of List
7 Array implementation of Stack and Queue ADTs
8 Linked list implementation of Stack and Queue ADTs
9 Applications of List, Stack and Queue ADTs
10 Implementation of Searching and Sorting algorithms
11 Hashing –Linear probing
Contact Hours : 60
Total Contact Hours : 105
Reference Book(s):
Ellis Horowitz, SartajSahni, Susan Anderson-Freed, ―Fundamentals of Data Structures in C, Second Edition,
1 University Press, 2008.
2 Alfred V. Aho, John E. Hopcroft and Jeffrey D. Ullman, ―Data Structures and Algorithms, Pearson Education, 2009.
3 ReemaThareja, Data Structures Using C, Second Edition, Oxford University Press, 2014.
Robert Kruse, C.L.Tondo, Bruce Leung, Shashi Mogalla , ― Data Structures and Program Design in C, Second
4 Edition, Pearson Education, 2007
Ellis Horowitz, SartajSahni and Susan Anderson Freed, Fundamentals of Data Structures in C, 2ndEdition, University
5 Press, 2008.
6 Herbert Schildt, C: The Complete Reference, Fourth Edition, McGraw Hill, 2017.
Web Link(s):
1 https://www.tutorialspoint.com/compile_c_online.php
2 https://www.codechef.com/ide
3 https://www.jdoodle.com/c-online-compiler
4 https://rextester.com/l/c_online_compiler_gcc
5 http://vlabs.iitb.ac.in/vlab/labscse.html
6 https://www.hackerrank.com/
7 https://www.geeksforgeeks.org/
8 https://leetcode.com/
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23232.1 1 2 2 2 1 - - - 1 2 1 1 2 3 -
CS23232.2 2 2 3 2 1 - - - 1 - 2 1 2 2 2
CS23232.3 1 2 1 2 1 - - - - - - 1 1 2 -
CS23232.4 1 1 2 1 1 - - - - - - 2 2 2 -
CS23232.5 1 1 2 1 1 - - - - - - 1 1 2 -
Average 1.2 1.6 2.0 1.6 1.0 - - - 1 2 1.5 1.2 1.6 2.2 2
Objectives:
● To understand the relationship of the data collected for decision making.
● To know the concept of principal components, factor analysis and cluster analysis for profiling and interpreting the data
collected.
● Lay the foundation of machine learning and its practical applications and prepare students for real-time problem-solving
in data science.
● Develop self-learning algorithms using training data to classify or predict the outcome of future datasets.
● Distinguish overtraining and techniques to avoid it such as cross-validation.
Text Books:
1. Wes McKinney, Python for Data Analysis - Data wrangling with pandas, Numpy, and ipython, Second Edition, O’Reilly
Media Inc, 2017.
2. Andreas C. Müller and Sarah Guido, Introduction to Machine Learning with Python - A Guide for Data Scientists, First
Edition, O’Reilly Media Inc, 2016.
PO/PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CS23422.1 2 2 2 2 1 - - - 1 1 1 1 3 3 -
CS23422.2 2 1 1 1 1 - - - - - 1 1 3 2 -
CS23422.3 1 1 2 1 2 - - - - - 1 1 2 3 2
CS23422.4 2 2 3 2 2 - - - - - 2 1 2 2 2
CS23422.5 2 2 3 2 3 - - - - - 2 1 2 2 2
Average 1.8 1.6 2.2 1.6 1.8 0.0 0.0 0.0 0.2 0.2 1.4 1 2.4 2.4 2
● To understand computers, programming languages and their generations and essential skills for a logical thinking
for problem solving.
● To write, test, and debug simple Python programs with conditionals, and loops and functions
● To develop Python programs with defining functions and calling them
● To understand and write python programs with compound data-lists, tuples, dictionaries
● To search, sort, read and write data from /to files in Python.
List of Experiments
1. Study of algorithms, flowcharts and pseudocodes.
2. Introduction to Python Programming and Python IDLE/Anaconda distribution.
3. Experiments based on Variables, Data types and Operators in Python.
4. Coding Standards and Formatting Output.
5. Algorithmic Approach: Selection control structures.
6. Algorithmic Approach: Iteration control structures.
7. Experiments based on Strings and its operations.
8. Experiments based on Lists and its operations.
9. Experiments based on Tuples and its operations.
10. Experiments based on Sets and its operations.
11. Experiments based on Dictionary and its operations.
12. Functions: Built-in functions.
13. Functions: User-defined functions.
14. Functions: Recursive functions.
15. Searching techniques: Linear and Binary.
16. Sorting techniques: Bubble and Merge Sort.
17. Experiments based on files and its operations.
Contact Hours : 75
Platform Needed: Linux
HARDWARE: Personal Computer with Dual Core Processor with 4 GB RAM.
SOFTWARE: GCC Compiler
Text Books:
1. Allen B. Downey, Think Python: How to Think Like a Computer Scientist, Second edition,UpdatedforPython3, Shroff/
O’Reilly Publishers, 2016 (http://greenteapress.com/wp/think-python/)
2. Guido Van Rossum and Fred L. Drake Jr, An Introduction to Python-Revised and updated for Python3.2, Network
Theory Ltd., 2011.
PO/PSO
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CS23336.1 - - - - - - - - - - - - 1 1 -
CS23336.2 1 1 1 1 1 - - - - - 1 1 2 2 -
CS23336.3 2 2 3 2 1 - - - 1 - 2 1 2 2 -
CS23336.4 1 1 2 1 1 - - - - - 1 1 2 2 -
CS23336.5 2 2 3 2 1 - - - - - 2 1 2 2 -
Average 1.5 1.5 2.25 1.5 1.0 - - - 1.0 - 1.5 1.0 1.8 1.8 -