sylabi
sylabi
sylabi
Regulation 2021
To be a world class institution for technical education and scientific research for public good.
PEO1: Apply domain knowledge and skills of information technology to succeed in professional
careers and/or higher studies
PEO2: Design and implement hardware and/or software-related engineering projects applying the
principles and practices of computing, grounded in mathematics and science, to meet industrial &
societal demands and/or productively engage in research
PEO4: Contribute to society, by functioning ethically and responsibly, and involving in professional
and social activities for sustainable developments
PO2. Problem analysis: Identify, formulate, review research literature, and analyse complex
engineering problems reaching substantiated conclusions using first principles of mathematics,
natural sciences, and engineering sciences.
PO3. Design/development of solutions: Design solutions for complex engineering problems and
design system components or processes that meet the specified needs with appropriate consideration
for the public health and safety, and the cultural, societal, and environmental considerations.
PO4. Conduct investigations of complex problems: Use research-based knowledge and research
methods including design of experiments, analysis and interpretation of data, and synthesis of the
information to provide valid conclusions.
PO5. Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern
engineering and IT tools including prediction and modelling to complex engineering activities with
an understanding of the limitations.
PO6. The engineer and society: Apply reasoning informed by the contextual knowledge to assess
societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to the
professional engineering practice.
PO7. Environment and sustainability: Understand the impact of the professional engineering
solutions in societal and environmental contexts, and demonstrate the knowledge of, and need for
sustainable development.
PO8. Ethics: Apply ethical principles and commit to professional ethics and responsibilities and
norms of the engineering practice.
PO9. Individual and teamwork: Function effectively as an individual, and as a member or leader
in diverse teams, and in multidisciplinary settings.
PO11. Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as a member and leader
in a team, to manage projects and in multidisciplinary environments.
PO12. Life-long learning: Recognize the need for and have the preparation and ability to engage in
independent and life-long learning in the broadest context of technological change.
PSO1: Understand, analyse, and design software intensive systems by applying knowledge of
mathematical and algorithmic techniques, solution processes and architectures, and integrating
modules that address larger social and professional concerns and are deployable in a production
environment.
PSO2: Design, develop and deploy smart software intensive solutions based on cumulative
knowledge acquired in thrust areas such as artificial intelligence, IoT, data analytics, cloud
computing and cyber security, and by selecting appropriate IT tools, to create sustainable and
scalable IT solutions to complex engineering problems.
PEO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
PEO1
3 3 3 2 3 1 1 1 2 2 2 3 3 3
3 3 3 3 3 1 1 1 2 2 2 3 3 3
PEO2
1 1 1 2 3 3 3 2 2 2
PEO3
3 3 3 2 2 1 1 1 1
PEO4
CO-PO-PSO Mapping
PO PSO
Course
1 2 3 4 5 6 7 8 9 10 11 12 1 2
SEMESTER I
Technical English 2 3 2
Matrices and Calculus 3 3 1
Engineering Physics 3 2 1
Engineering Chemistry 3 2 1
Problem Solving and
2 2 2 1
Programming in Python
Engineering Graphics 3 2 2 2 3
Programming in Python
3 3 1 1 3 2
Lab
Physics and Chemistry
3
Lab
SEMESTER II
Complex Functions and
3 3 1
Laplace Transforms
Basic Electrical and
3 2 1 2 1 1 1 1
Electronics Engineering
Programming and Data
Structures (TCP - EFP) 2 2.14 1.66 2 2.5 3 1.5 1 2
Environmental Science
3 2 1
(Non-credit)
Physics for Information
Science and Technology
Design Thinking and
2 1 1 1 3
Engineering Practices Lab
SEMESTER III
Discrete Mathematics 2 1 1 1
Universal Human Values 2 1 1 1 2
Programming and Design
Patterns 2.2 2.2 1.6 1 1 1 1.66
Database Technology 3 2.75 2 1 1 1 2
Digital Logic and
Computer Organization 2 1 1 1
Introduction to Digital
Communication 2 1 1 1 2
Database Technology Lab 2 1.75 2 3 2 2 3 2 2 1
Programming and Design
Patterns Lab 1 1.6 1 2 1.8 1.6
SEMESTER IV
SDG Description
SDG1 No Poverty End poverty in all its forms everywhere
End hunger, achieve food security and improved nutrition,
SDG 2 Zero Hunger
and promote sustainable agriculture
Good health and well Ensure healthy lives and promote well-being for all at all
SDG 3
being ages
Ensure inclusive and equitable quality education and
SDG 4 Quality education
promote lifelong learning opportunities for all
SDG 5 Gender Equality Achieve gender equality and empower all women and girls
Clean water and Ensure availability and sustainable management of water
SDG 6
sanitation and sanitation for all
Affordable and clean Ensure access to affordable, reliable, sustainable and
SDG 7
energy modern energy for all
Promote sustained, inclusive and sustainable economic
Decent work and
SDG 8 growth, full and productive employment and decent work
Economic Growth
for all
Industry, Innovation and Build resilient infrastructure, promote inclusive and
SDG 9
Infrastructure sustainable industrialization, and foster innovation
SDG 10 Reducing Inequality Reduce income inequality within and among countries
Sustainable cities and Make cities and human settlements inclusive, safe,
SDG 11
communities resilient, and sustainable
Responsible consumption Ensure sustainable consumption and production patterns
SDG 12
and production
Take urgent action to combat climate change and its
SDG 13 Climate action impacts by regulating emissions and promoting
developments in renewable energy
Conserve and sustainably use the oceans, seas and marine
SDG 14 Life below water
resources for sustainable development
Protect, restore and promote sustainable use of
terrestrial ecosystems, sustainably manage forests, combat
SDG 15 Life on Land
desertification, and halt and reverse land degradation and
halt biodiversity loss
Promote peaceful and inclusive societies for sustainable
Peace, justice and string
SDG 16 development, provide access to justice for all and build
Institutions
effective, accountable and inclusive institutions at all levels
Strengthen the means of implementation and revitalize the
SDG 17 Partnerships for the goals
global partnership for sustainable development
MAPPING OF SUBJECT RELEVANT TO SDG
Sustainable Development Goals
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Technical English ✓
Matrices and Calculus ✓
Engineering Physics ✓
Engineering Chemistry ✓
Problem Solving and ✓
Programming in
Python
Engineering Graphics ✓
Programming in ✓
Python Lab
Physics and Chemistry ✓
Lab
Complex Functions and ✓
Laplace Transforms
Basic Electrical and ✓
Electronics
Engineering
Programming and Data ✓
Structures (TCP - EFP)
Environmental Science ✓ ✓ ✓ ✓ ✓ ✓ ✓
(Non-credit)
Physics for Information ✓
Science and
Technology
Design Thinking and ✓
Engineering Practices
Lab
Discrete Mathematics ✓
Universal Human ✓
✓ ✓
Values
Programming and ✓
Design Patterns
Database Technology ✓ ✓
Digital Logic and ✓
✓
Computer Organization
Introduction to Digital ✓
Communication
Database Technology ✓
✓
Lab
Programming and ✓ ✓
Design Patterns Lab
Probability and ✓
Statistics
Microprocessor and ✓ ✓
Microcontroller
Essence of Indian ✓
Traditional Knowledge
/ Indian Constitution
Sustainable Development Goals
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Advanced Data ✓
Structures and ✓
Algorithm Analysis
Data Communication ✓
✓ ✓
and Networks
Automata Theory and ✓
✓
Compiler Design
Network Programming ✓
✓
Lab
Digital Systems and ✓
✓
Microprocessor Lab
Principles of Software ✓
Engineering and
Practices
Data Analytics and ✓
✓
Visualization
Principles of Operating ✓
Systems
Artificial Intelligence ✓ ✓ ✓
Software Development ✓
✓
Project – II
Operating Systems ✓
✓
Practices Lab
Pattern Recognition ✓
✓
and Machine Learning
Web Programming ✓
Internet of Things and ✓
✓
C programming
Mobile Application ✓
✓
Development Lab
Network and ✓
Communication ✓ ✓ ✓
Security
Cloud and Distributed ✓
✓ ✓
Computing
Industrial Training ✓
✓
/Internship*
Project Work – Phase 1 ✓ ✓ ✓ ✓ ✓ ✓
Project Phase II ✓ ✓ ✓ ✓ ✓ ✓
Information Theory ✓
✓
and Applications
Optimization ✓
Techniques for ✓ ✓
Machine Learning
Data Warehousing and ✓
✓ ✓
Data Mining
Cyber Security ✓ ✓ ✓
Sensors and Actuators ✓ ✓ ✓
Software Architecture ✓ ✓
Sustainable Development Goals
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
and Principles
Computer Graphics and ✓
Multimedia
Electronic Devices and ✓
✓ ✓ ✓
Circuits
Signals, Systems and ✓
✓
Applications
Advanced Artificial ✓
Intelligence ✓
Techniques
Business Analytics ✓
Software Quality ✓
✓ ✓
Assurance
Block Chain ✓
✓ ✓
Technologies
Control Systems ✓ ✓ ✓
Introduction to ✓
✓
AR/VR/MR/XR
Deep Learning ✓
Concepts and ✓
Architectures
Bio-inspired ✓
Optimization
Techniques
Big Data Management ✓ ✓ ✓
Software Project ✓
Management
Information Privacy ✓ ✓ ✓ ✓
Software Defined ✓ ✓
Networks
Video: Editing, ✓
Production, and ✓
Cinematography
Natural Language ✓
✓
Processing
Image Processing and ✓
✓ ✓
Computer Vision
Healthcare Analytics ✓ ✓ ✓
Microservices and ✓
DevOps
Cyber Forensics and ✓
✓ ✓ ✓
Information Security
IOT Architectures and ✓
✓ ✓ ✓
Applications
3D Modeling, ✓
Rendering, Animation, ✓
and Motion Graphics
Text Analysis ✓
Image and Video ✓ ✓ ✓ ✓
Sustainable Development Goals
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
Analysis
Social Network ✓
✓ ✓ ✓ ✓
Analysis
Full Stack ✓
✓
Development
Ethical Hacking ✓ ✓ ✓
Real Time Embedded ✓ ✓
✓
Systems
Emerging ✓ ✓
Technologies for ✓
AR/VR/MR/XR
Reinforcement ✓ ✓
✓
Learning
Speech Technology ✓ ✓
Forensic Analytics ✓ ✓ ✓ ✓
Human Computer ✓ ✓
✓
Interaction
FinTech Security ✓ ✓ ✓
Mobile Autonomous ✓ ✓
✓
Robots
User Experience and ✓ ✓
Interaction Design for ✓
AR/VR/MR/XR
Language and ✓
✓
Communication
Fundamentals of ✓
✓
Linguistics
Film Appreciation
Human relations at ✓
✓ ✓ ✓
work
Application of ✓
Psychology in ✓
everyday life
Understanding Society ✓
and Culture through ✓
Literature
Principles of ✓ ✓ ✓
management
Total quality ✓ ✓ ✓
✓
management
Work ethics, Corporate ✓ ✓ ✓
social responsibility ✓ ✓ ✓ ✓
and Governance
I to VIII semesters Curriculum (Choice Based Credit System)
SEMESTER I
COURSE CONTACT
S. No. COURSE TITLE CATEGORY L T P C
CODE PERIODS EL
THEORY
1 UEN2176 Technical English HS 4 2 0 2 0 3
2 UMA2176 Matrices and Calculus BS 4 3 1 0 0 4
3 UPH2176 Engineering Physics BS 3 3 0 0 0 3
Engineering
4 UCY2176 BS 3 3 0 0 0 3
Chemistry
Problem Solving and
5 UGE2176 Programming in ES 3 3 0 0 0 3
Python
6 UGE2177 Engineering Graphics ES 5 1 0 4 0 3
PRACTICALS
Programming in
7 UGE2197 ES 3 0 0 3 0 1.5
Python Lab
Physics and Chemistry
8 UGS2197 BS 3 0 0 3 0 1.5
Lab
TOTAL 28 15 1 12 0 22
SEMESTER II
COURSE CONTACT
S.No. COURSE TITLE CATEGORY L T P C
CODE PERIODS EL
THEORY
Complex Functions
1 UMA2276 and Laplace BS 4 3 1 0 0 4
Transforms
Basic Electrical and
2 UEE2276 Electronics ES 3 3 0 0 0 3
Engineering
Programming and
3 UIT2201 ES 5 3 0 2 0 4
Data Structures
Environmental
4 ACY2276 MC* 3 3 0 0 0 0
Science
5 Humanities I Elective HS 4 2 0 2 0 3
Physics for
6 UPH2251 Information Science BS 3 3 0 0 0 3
and Technology
PRACTICALS
Design Thinking and
7 UGE2297 Engineering Practices ES 3 0 0 3 0 1.5
Lab
Software Development
8 UIT2211 ES 3 0 0 3 0 1.5
Project – I
TOTAL 28 17 1 10 0 20
*Non credit
SEMESTER III
COURSE CONTACT
S. No. COURSE TITLE CATEGORY L T P C
CODE PERIODS EL
THEORY
1 UMA2377 Discrete Mathematics BS 4 3 1 0 0 4
Universal Human
Values 2:
2 UHS2376 HS 4 2 0 2 0 3
Understanding
Harmony
Programming and
3 UIT2301 ES 3 3 0 0 0 3
Design Patterns
4 UIT2302 Database Technology PC 3 3 0 0 0 3
Digital Logic and
5 UIT2304 PC 3 3 0 0 0 3
Computer Organization
Introduction to Digital
6 UIT2305 ES 3 3 0 0 0 3
Communication
PRACTICALS
Database Technology
7 UIT2311 PC 3 0 0 3 0 1.5
Lab
Programming and
8 UIT2312 ES 3 0 0 3 0 1.5
Design Patterns Lab
TOTAL 26 17 1 8 0 22
SEMESTER IV
COURSE CONTACT
S. No. COURSE TITLE CATEGORY L T P C
CODE PERIODS EL
THEORY
Probability and
1 UMA2476 BS 4 3 1 0 0 4
Statistics
Microprocessor and
2 UIT2401 PC 3 3 0 0 0 3
Microcontroller
3 AHS2476 Indian Constitution MC* 3 3 0 0 0 0
Advanced Data
4 UIT2402 Structures and PC 8 3 0 2 3 5
Algorithm Analysis
Data Communication
5 UIT2403 PC 3 3 0 0 0 3
and Networks
Automata Theory and
6 UIT2404 PC 3 3 0 0 0 3
Compiler Design
PRACTICALS
Network Programming
7 UIT2411 PC 3 0 0 3 0 1.5
Lab
Digital Systems and
8 UIT2412 PC 3 0 0 3 0 1.5
Microprocessor Lab
TOTAL 30 18 1 8 3 21
*Non credit
SEMESTER V
S. COURSE CONTACT
COURSE TITLE CATEGORY L T P EL C
No. CODE PERIODS
THEORY
Principles of Software
1 UIT2501 Engineering and PC 3 3 0 0 0 3
Practices
Data Analytics and
2 UIT2502 PC 5 3 0 2 0 4
Visualization
Principles of Operating
3 UIT2503 PC 3 3 0 0 0 3
Systems
4 UIT2504 Artificial Intelligence PC 3 3 0 0 0 3
5 Professional Elective I PE 3 3 0 0 0 3
6 Management Elective HS 3 3 0 0 0 3
PRACTICALS
Software Development
7 UIT2511 PC 3 0 0 3 0 1.5
Project – II
Operating Systems
8 UIT2512 PC 3 0 0 3 0 1.5
Practices Lab
TOTAL 26 18 0 8 0 22
SEMESTER VI
S. COURSE CONTACT
No. COURSE TITLE CATEGORY L T P EL C
CODE PERIODS
THEORY
Pattern Recognition
1 UIT2601 PC 5 3 0 2 0 4
and Machine Learning
2 UIT2602 Web Programming PC 8 3 0 2 3 5
UIT2603 Internet of Things and
3 PC 5 3 0 2 0 4
C programming
4 Professional Elective II PE 3 3 0 0 0 3
5 Open Elective I OE 3 3 0 0 0 3
PRACTICALS
Mobile Application
6 UIT2611 PC 4 0 0 4 0 2
Development Lab
TOTAL 28 15 0 10 3 21
SEMESTER VII
S. COURSE CONTACT
No. COURSE TITLE CATEGORY L T P EL C
CODE PERIODS
THEORY
Network and
1 UIT2701 Communication PC 3 3 0 0 0 3
Security
Cloud and Distributed
2 UIT2702 PC 4 2 0 2 0 3
Computing
3 Professional Elective III PE 3 3 0 0 0 3
4 Professional Elective IV PE 3 3 0 0 0 3
5 Professional Elective V PE 3 3 0 0 0 3
PRACTICALS
7 UIT2718 Project Work – Phase 1 EEC 9 0 0 0 9 3
Industrial Training
8 UIT2716 EEC 0 0 0 0 0 2
/Internship*
TOTAL 25 14 0 2 9 20
* The students will undergo 4 weeks Industrial training / Internship during previous vacation.
SEMESTER VIII
S. COURSE CONTACT
No. COURSE TITLE CATEGORY L T P EL C
CODE PERIODS
THEORY
1 Professional Elective VI PE 3 3 0 0 0 3
`2 Open Elective II OE 3 3 0 0 0 3
PRACTICALS
3 UIT2818 Project Work – Phase 2 EEC 24 0 0 0 24 8
TOTAL 30 6 0 0 24 14
COURSE CONTACT
S. No. COURSE TITLE L T P C
CODE PERIODS
1 UEN2241 Language and Communication 3 3 0 0 3
2 UHS2244 Fundamentals of Linguistics 3 3 0 0 3
3 UEN2244 Film Appreciation 3 3 0 0 3
4 UHS2241 Human relations at work 3 3 0 0 3
Application of Psychology in everyday
5 UHS2245 3 3 0 0 3
life
Understanding Society and Culture
6 UHS2242 3 3 0 0 3
through Literature
S. COURSE CONTACT
No. COURSE TITLE L T P C
CODE PERIODS
1 UBA2541 Principles of Management 3 3 0 0 3
2 UBA2542 Total quality Management 3 3 0 0 3
Work Ethics, Corporate Social
3 UBA2543 3 3 0 0 3
Responsibility, and Governance
S. CONTACT
No. COURSE CODE COURSE TITLE L T P C
PERIODS
1 UIT2521 Information Theory and Applications 3 3 0 0 3
UIT2522 Optimization Techniques for
2 3 3 0 0 3
Machine Learning
3 UIT2523 Data Warehousing and Data Mining 3 3 0 0 3
4 UIT2524 Cyber Security 3 3 0 0 3
5 UIT2525 Sensors and Actuators 3 3 0 0 3
6 UIT2526 Software Architecture and Principles 3 3 0 0 3
7 UIT2527 Computer Graphics and Multimedia 4 2 0 2 3
8 UEE2303 Electronic Devices and Circuits 3 3 0 0 3
Professional Elective II (VI semester)
S. COURSE CONTACT
No. COURSE TITLE L T P C
CODE PERIODS
Signals, Systems and
1 UIT2621 3 3 0 0 3
Applications
Advanced Artificial Intelligence
2 UIT2622 4 2 0 2 3
Techniques
3 UIT2623 Business Analytics 4 2 0 2 3
4 UIT2624 Software Quality Assurance 3 3 0 0 3
5 UIT2625 Block Chain Technologies 3 3 0 0 3
6 UIT2626 Control Systems 3 3 0 0 3
7 UIT2627 Introduction to AR/VR/MR/XR 3 3 0 0 3
COURSE CONTACT
S. No. COURSE TITLE L T P C
CODE PERIODS
Deep Learning Concepts and
1 UIT2721 4 2 0 2 3
Architectures
Bio-inspired Optimization
2 UIT2722 4 2 0 2 3
Techniques
3 UIT2723 Big Data Management 4 2 0 2 3
4 UIT2724 Software Project Management 3 3 0 0 3
5 UIT2725 Information Privacy 3 3 0 0 3
6 UIT2726 Software Defined Networks 3 3 0 0 3
Video: Editing, Production, and
7 UIT2727 4 2 0 2 3
Cinematography
COURSE CONTACT
S. No. COURSE TITLE L T P C
CODE PERIODS
1 UIT2728 Natural Language Processing 4 2 0 2 3
Image Processing and Computer
2 UIT2729 4 2 0 2 3
Vision
3 UIT2731 Healthcare Analytics 4 2 0 2 3
4 UIT2732 Microservices and DevOps 4 2 0 2 3
Cyber Forensics and Information
5 UIT2733 4 2 0 2 3
Security
6 UIT2734 IOT Architectures and Applications 4 2 0 2 3
3D Modeling, Rendering,
7 UIT2735 4 2 0 2 3
Animation, and Motion Graphics
Professional Elective V (VII semester)
COURSE CONTACT
S. No. COURSE TITLE L T P C
CODE PERIODS
1 UIT2736 Text Analysis 4 2 0 2 3
2 UIT2737 Image and Video Analysis 4 2 0 2 3
3 UIT2738 Social Network Analysis 4 2 0 2 3
4 UIT2739 Full Stack Development 4 2 0 2 3
5 UIT2741 Ethical Hacking 4 2 0 2 3
6 UIT2742 Real Time Embedded Systems 4 2 0 2 3
Emerging Technologies for
7 UIT2743 4 2 0 2 3
AR/VR/MR/XR
V. Information Security
1) Cyber Security
2) Block Chain Technologies
3) Information Privacy
4) Cyber Forensics and Information Security
5) Ethical Hacking
6) Fintech Security
TOTAL HOURS: 45
TEXTBOOK:
REFERENCES:
• Sudharshana, N.P., and Saveetha, C., English for Technical Communication, Cambridge
University Press, New Delhi,2016.
• Raman, Meenakshi, Sharma, and Sangeetha, Technical Communication Principles and
practice, Oxford University Press, New Delhi,2014.
• Kumar, Suresh,E.,EngineeringEnglish,OrientBlackswan,Hyderabad,2015.
• BoothL. Diana, Project Work, Oxford University Press,2014.
• Grussendorf, Marion, English for Presentations, Oxford UniversityPress,2007.
• Means,L.Thomas and Elaine Langlois, English & Communication For + Colleges, Cengage
Learning, USA, 2007.
COURSEOUTCOMES:
1 2 3 4 5 6 7 8 9 10 11 12
CO1 - - - - - - - - 2 3 - 2
CO2 - - - - - - - - 2 3 - 2
CO3 - - - - - - - - 2 3 - 2
CO4 - - - - - - - - 2 3 - 2
CO5 - - - - - - - - 2 3 - 2
OBJECTIVES:
TEXTBOOKS:
1. Grewal B.S, Higher Engineering Mathematics, Khanna Publishers, 44th Edition, 2018.
2. Erwin Kreyszig, Advanced Engineering Mathematics, John Wiley & Sons, Inc., 10th Edition, 2016.
REFERENCES:
1. Bali N. P and Manish Goyal, “A Text book of Engineering Mathematics”, Ninth Edition, Laxmi
Publications Pvt Ltd., 2016.
2. James Stewart, Calculus: Early Transcendental, Cengage Learning, New Delhi, 7th Edition, 2013.
3. Dass, H.K., and Er. Rajnish Verma,” Higher Engineering Mathematics”, S. Chand Private Ltd., 2011.
4. Srimanta Pal and Subodh C. Bhunia, Engineering Mathematics, Oxford University Press, 2015.
COURSE OUTCOMES
On successful completion of this course, the student will able to
CO1: Reduce quadratic form to canonical form by orthogonal transformation and identify
the nature of the quadratic form
CO2: Analyse the convergence of a given infinite series
CO3: Find evolute of a given curve and envelope of family of curves
CO4: Find the extrema of function of two variables
CO5: Evaluate the double and triple integrals
CO6: Application of extreme points of functions and multiple integrals in engineering
Problems
CO – PO Mapping
COs/POs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2
CO2 3 2
CO3 3 2
CO4 3 2
CO5 3 2
CO6 3 2 1
Thermal Physics: Modes of heat transfer – thermal conduction, convection and radiation – Newton’s law of
cooling - thermal conductivity- Lee’s disc method for bad conductor – Radial heat flow – Rubber tube method
– conduction through compound media (series and parallel) – Formation of ice on ponds.
TEXTBOOKS:
1. Gaur, R.K., and Gupta, S.L., Engineering Physics, Dhanpat Rai Publishers, 2012.
2. Serway, R.A., & Jewett, J.W., Physics for Scientists and Engineers, Cengage Learning, 2010.
REFERENCES:
1. Halliday, D., Resnick, R. & Walker, J. Principles of Physics, Wiley, 2015.
2. Tipler, P.A. & Mosca, G. Physics for Scientists and Engineers with Modern Physics, WH
Freeman, 2007.
3. Avadhanulu, M. N., Kshirsagar, P. G, A textbook of Engineering Physics, S. Chand &
Co. Ltd., Ninth Revised Edition, 2012.
COURSE OUTCOMES:
At the end of this course, students will be able to
CO1: Analyze crystal structures and the influence of imperfections on their properties.
CO2: Demonstrate and explain the general concepts of elastic and thermal properties of materials.
CO3: Explain quantum mechanical theories to correlate with experimental results and their
applications to material diagnostics.
CO4: Analyze the applications of acoustics and ultrasonics to engineering and medical disciplines.
CO5: Elucidate the principle and working of lasers and optical fibers, and their applications in the
field of industry, medicine and telecommunication.
CO-PO Mapping:
UNIT II ELECTROCHEMISTRY 9
Conductivity of electrolytes - factors influencing conductivity- Conductometric titration and its applications
-estimation of strong acid, estimation of mixture of strong and weak acids and estimation of BaCl 2.
Electrochemical cell-redox reaction-origin of electrode potential, Types of electrodes, Measurement of
electrode potential and emf of the electrochemical cell -reference electrode- saturated calomel electrode and
Ag/AgCl electrode - Ion selective electrode-glass electrode measurement of pH –Potentiometric titrations-
estimation of ferrous ion and estimation of strong acid. Problems based on all the above concepts.
UNIT III CORROSION AND ITS CONTROL 9
Corrosion-Definition-Classification of corrosion-Chemical corrosion – Pilling – Bedworth rule –
electrochemical corrosion – different types – galvanic corrosion – differential aeration corrosion – factors
influencing corrosion – corrosion control – selection of materials - sacrificial anode and impressed current
cathodic methods – corrosion inhibitors – protective coatings – paints – constituents and functions – metallic
coatings – electroplating (Au) and electroless (Ni) plating.
. REFERENCES:
1. T. Pradeep- NANO: The Essentials: Understanding Nanoscience and Nanotechnology, McGraw Hill
Education; 2017(1st edition)
2. Gurdeep Raj, Phase Rule, GOEL Publishing House, Meerut, 2011.
3. R. Gopalan, K. Rangarajan, P.S. Subramanian. “Elements of Analytical Chemistry” Sultan Chand &
Sons,2003.
4. F.W. Billmayer, Textbook of Polymer Science, 3rd Edison, Wiley. N.Y. 1991.
COURSE OUTCOMES:
On successful completion of this course, the students will be able to demonstrate understanding on:
CO1-The unique properties of nanoparticles and their applications
CO2 -The principles of electrochemistry and its application for quantitative analysis
CO3-The various types of corrosion under normal to severe corrosive environments and
their control measures
CO4 -Construction of phase diagram and its application to analyse simple eutectic
Systems
CO5 - The synthesis, properties and applications of important industrial polymers
CO-PO Mapping:
Course Code & Name: PO’s
UCY 2176 ENGINEERING CHEMISTRY
1 2 3 4 5 6 7 8 9 10 11 12
OBJECTIVES:
• To learn algorithmic problem-solving techniques.
• To learn the fundamentals of python programming.
• To compose programs in Python using conditions, iterations and decompose a problem into functions
• To construct programs in Python sequenced data type.
• To develop python programs using advanced constructs like dictionaries and files.
COURSE OUTCOMES:
After the completion of this course, students will be able to:
CO 1: Solve programming problems and express solutions in pseudo code.
CO 2: Develop simple programs using basic constructs.
CO 3: Construct programs using conditions and iterations decompose a problem into functions.
CO 4: Make use of strings, lists, tuples and dictionaries data structures.
CO 5: Perform Input/Output Operations using files.
TEXT BOOKS:
1. Karl Beecher, ``Computational Thinking – A beginner's Guide to Problem Solving and
Programming'', British Computer Society (BCS), 2017.
2. Allen B. Downey, ``Think Python: How to Think Like a Computer Scientist'', 2nd edition, Green Tea
Press, Shroff/O'Reilly Publishers, 2015 (http://greenteapress.com/wp/think-python/)
REFERENCES:
1. John V Guttag, ``Introduction to Computation and Programming Using Python'', 3rd edition, MIT
Press, 2021.
2. Ashok Namdev Kamthane, Amit Ashok Kamthane, ``Programming and Problem Solving with
Python'', McGraw Hill Education (India) Private Limited, 2018.
3. Robert Sedgewick, Kevin Wayne, Robert Dondero, ``Introduction to Programming in Python: An
Inter-disciplinary Approach'', Pearson India Education Services Pvt. Ltd., 2016.
4. Timothy A. Budd, ``Exploring Python'', Mc-Graw Hill Education (India) Private Ltd., 2015.
5. Kenneth A. Lambert, ``Fundamentals of Python: First Programs'', 2nd Edition, CENGAGE Learning,
2018.
CO-PO Mapping:
UGE 2176 PO’s
PROBLEM SOLVING AND
PROGRAMMING IN PYTHON 1 2 3 4 5 6 7 8 9 10 11 12
TEXTBOOKS:
1. Natarajan, K.V., A Textbook of Engineering Graphics, Dhanalakshmi Publishers, Chennai, 33rd Edition,
2020. [ISBN:9788190414089]
2. Venugopal, K. and Prabhu Raja, V., Engineering Graphics, New Age International (P) Limited, 15th
Edition, 2018. [ISBN :9789386649249]
REFERENCES:
1. Bhatt, N.D., Engineering Drawing, Charotar Publishing House, 53rd Edition, 2014. [ISBN:
9789380358963]
2. Basant Agarwal, and Agarwal, C.M., Engineering Drawing, McGraw Hill, 3rd Edition, 2019. [ISBN:
9789353167448]
3. Gopalakrishna, K.R., Engineering Drawing (Vol. I & II Combined), Subhas Publications, 27th Edition,
2017. [ISBN: 9789383214235]
4. Luzzader J Warren, and Jon M Duff, Fundamentals of Engineering Drawing with an introduction to
Interactive Computer Graphics for Design and Production, Pearson Education, 11th Edition, 2005. [ISBN
:9789332549982]
1. IS 10711 – 2001: Technical products Documentation – Size and lay out of drawing sheets.
2. IS 9609 (Parts 0 & 1) – 2001: Technical products Documentation – Lettering.
3. IS 10714 (Part 20) – 2001 & SP 46 – 2003: Lines for technical drawings.
4. IS 11669 – 1986 & SP 46 – 2003: Dimensioning of Technical Drawings.
1. IS 15021 (Parts 1 to 4) – 2001: Technical drawings – Projection Methods.
1. There will be five questions, each of either-or type covering all units of the syllabus.
2. All questions will carry equal marks of 20 each making a total of 100.
3. The answer paper shall consist of drawing sheets of A3 size only. The students will be permitted to
use appropriate scale to fit solution within A3 size.
4. The examination will be conducted in appropriate sessions on the same day.
COURSE OUTCOMES:
Upon successful completion of the course, students will be able to
CO1: Draw Plane curves and perform Free hand sketching of three - dimensional objects.(BL: L3)
CO2: Draw the Orthographic projections of points, lines and plane surfaces. (BL: L3)
CO3: Draw the Projections of solids. (BL: L3)
CO4: Draw the Projections of sectioned solids and Development of surfaces. (BL: L3)
CO5: Draw the Isometric and Perspective projections of solids. (BL: L3)
CO-PO Mapping:
OBJECTIVES:
• To write, test, and debug simple Python programs.
• To apply conditions and loops to solve problems using python.
• To implement programs using functions
• To write programs using different data types such as strings, lists tuples and dictionaries
• To perform read and write operations into the files.
SUGGESTIVE EXERCISES:
1. Use Linux shell commands, use Python in interactive mode, and an editor
2. Write simple programs (area of a geometric shape, simple interest, solve quadratic equation, net
salary).
3. Write programs using conditional statements (leap year, maximum of 2 numbers, maximum of 3
numbers, simple calculator, grade of the total mark).
4. Develop programs using loops and nested loops (gcd, prime number, integer division, sum of digits
of an integer, multiplication table, sum of a series, print patterns, square root using Newton's
method).
5. Develop programs using functions (sine and cosine series, Pythagorean triplets).
6. Develop programs using recursion (efficient power of a number, factorial, Fibonacci number).
7. Develop programs using strings (palindrome, finding substring) without using in-built functions.
8. Develop programs using lists and tuples (linear search, binary search, selection sort, insertion sort,
quicksort).
9. Develop programs using nested lists (matrix manipulations).
10. Develop simple programs using dictionaries (frequency histogram, nested dictionary).
11. Develop programs using Files (read and write files).
12. Develop programs to perform any task by reading arguments from command line.
13. Implement a simple application using appropriate datatypes and files
TOTAL HOURS: 45
COURSE OUTCOMES:
After the completion of this course, students will be able to:
CO 1: Write, test, and debug simple Python programs.
CO 2: Build Python programs with conditionals and loops.
CO 3: Solve a problem using functions in python programming.
CO 4: Construct python programs using compound data like lists, tuples, and dictionaries.
CO 5: Build a simple application in teams using files and appropriate datatypes by applying the
best programming practices.
Course Code & Name: PO’s
UGE 2197
PROGRAMMING IN PYTHON LAB 1 2 3 4 5 6 7 8 9 10 11 12
A. PHYSICS LABORATORY
COURSE OBJECTIVE:
The objective of this course is to enable the students to
● Obtain basic Knowledge about physics concepts applied in optics, thermal physics
and properties of matter.
LIST OF EXPERIMENTS
(A minimum of 5 experiments to be performed from the given list)
COURSE OUTCOMES
Upon successful completion of the course, students will be able to
CO1: Apply principles of elasticity, optics, viscosity, thermal and band gap determination for
engineering applications
CO-PO/PSO MAPPING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 1
B. CHEMISTRY LABORATORY
OBJECTIVE:
To impart hands on training for all the possible concepts learned in Engineering Chemistry Course
List of Experiments
(A minimum of 6 experiments to be performed from the given list)
TEXTBOOK:
Manual Prepared by Faculty of Chemistry Department, SSNCE
REFERENCE:
1. Practical Physical Chemistry, B.Viswanath and P.S.Raghavan, ViVa Books Pvt. Ltd., New Delhi, 2012.
COURSE OUTCOMES:
Upon successful completion of this course, the students will be able to
CO2 - Determine the Molecular weight and Degree of Polymerisation using viscometer
CO-PO mapping
OBJECTIVES:
The objective of this course is to enable the student to
1. Grewal, B.S., Higher Engineering Mathematics, 44th Edition, Khanna Publishers, 2018.
2. Erwin Kreyszig, Advanced Engineering Mathematics, 10th Edition, John Wiley & Sons, Inc., 2016.
REFERENCE BOOKS:
1. Bali, N.P., Goyal, M., Watkins, C., Advanced Engineering Mathematics, Laxmi Publications Pvt.
Limited, 2007.
2. Boyce, W.E., and DiPrima, R.C., Elementary Differential Equations and Boundary Value Problems,
11th Edition, Global Edition, Wiley, 2017.
3. George B. Thomas Jr., Maurice D. Weir, Joel R. Hass, Thomas' Calculus: Early Transcendental, 13th
Edition, Pearson Education, 2014.
4. O’Neil. P. V., Advanced Engineering Mathematics, 7th Edition, Cengage Learning India Pvt., Ltd,
New Delhi, 2012.
5. Howard Anton, Irl C. Bivens, Stephen Davis, Calculus Early Transcendentals, 11th Edition, Global
Edition, John Wiley & Sons, Inc., 2017.
6. Srimanta Pal and Subodh C. Bhunia, Engineering Mathematics, Oxford University Press, 2015.
7. Srivastava, A.C., and Srivastava, P.K., Engineering Mathematics Volume I and II, PHI learning Pvt.
Ltd, 2011.
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
CO1: solve problems in Analytic functions and construction of analytic functions using C-R equations
CO2: solve problems using integration techniques, find Taylor’s and Laurent’s Series expansions
CO3: obtain the Laplace Transforms and inverse transforms of standard functions.
CO4: solve Differential Equations using different techniques
CO5: evaluate Line, Surface and Volume integrals
CO6: application of Complex integration, Laplace transforms, Ordinary differential equations, and vector
calculus in engineering problems
CO-PO Mapping:
COs/POs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2
CO2 3 2
CO3 3 2
CO4 3 2
CO5 3 2
CO6 3 2 1
OBJECTIVES:
• To learn the basic concepts of electric circuits.
• To know the operation of various electrical machines.
• To study the concepts of utilization of electrical power.
• To comprehend the working principle of electronic devices and its applications.
• To grasp the working principle of various sensors and transducers.
TOTAL HOURS: 45
TEXT BOOKS:
1. Kothari DP and I.J Nagrath, “Basic Electrical and Electronics Engineering”, McGraw Hill
Education,2014
2. Alan S. Moris, Principles of Measurements and Instruments, Prentice Hall of India Pvt. Ltd., New
Delhi,1999.
3. S.Salivahanan, R.Rengaraj and G.R.Venkatakrishnan, Basic Electrical, Electronics and
Measurement Engineering, McGrawHill, 2017.
REFERENCES:
1. S.B. Lal Seksena and Kaustuv Dasgupta, Fundaments of Electrical Engineering, Cambridge, 2016.
2. M.S. Sukhija and T.K. Nagsarkar, Basic Electrical and Electronic Engineering, Oxford, 2016.
3. S.K.Sahdev, Basic of Electrical Engineering, Pearson, 2015.
4. Edward Hughes, John Hiley, Keith Brown and Ian McKenzie Smith "Electrical And Electronic
Technology" Pearson Education Ltd, 10 th Edition, 2008
5. H.Cotton, "Electrical Technology" 7th Edition,CBS; 2005
COURSE OUTCOMES:
Upon successful completion of the course, students will be able to
CO1: Solve and analyse DC and AC circuits.
CO2: Explain the operating principle of AC and DC machines.
CO3: Know the concepts electrical power utilization.
CO4: Describe the working principle of various electronic devices and its applications
CO5: Describe the working principle of various sensors and transducers.
COs POs
1 2 3 4 5 6 7 8 9 10 11 12
1 3 3 2 2 1 1
2 3 2 1 1
3 3 2 1 2 1
4 3 2 1
5 3 2 1
COURSE CODE COURSE TITLE L T P EL C
PROGRAMMING AND DATA
UIT2201 3 0 2 0 4
STRUCTURES
OBJECTIVES:
The objective of this course is to enable the students to
● understand the concepts of ADTs and implement them using Python
● design and implement linear data structures – lists, stacks, and queues
● design, analyze, and implement sorting, searching, and hashing algorithms
● formulate problems using tree and graph structures and solve them using Python
LAB COMPONENT:
COURSE
COURSE TITLE L T P EL C
CODE
Students will be divided into teams of size not exceeding seven. Each team will be given a project as a
context. Teams will be mentored to follow best software engineering practices to develop data-structure-
intensive software. The grading rubrics are as outlined below:
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
CO1: Design and develop data structure intensive software systems by applying best practices for IT
project management.
CO2: Communicate efficiently in team meetings & presentations and prepare documents for data
structure intensive software systems.
OBJECTIVES:
The students of Engineering undergoing this Course would develop a
• Better understanding of human relationships, perceptions and policies towards the
environment
• Focus on design and technology for improving environmental quality
UNIT V ENVIRONMENTALREGULATIONS 9
Environmental Ethics for sustainable development- Human rights- Environmental Impact Assessment–
Ecomark-role of NGO- Central and state pollution control boards- Air (Prevention and Control of Pollution)
act 1981– Water (Prevention and control of Pollution) act 1974– Wildlife protection act 1972 – Forest
conservation act 1980- The National Green Tribunal Act 2010.
TOTAL HOURS: 45
TEXT BOOKS:
1. Anubha Kaushik and C. P. Kaushik, Environmental Science and Engineering, New Age International
Publishers,14thEdition, 2014.
2. Benny Joseph, ‘Environmental Science and Engineering’, Tata McGraw-Hill, New Delhi,2006
REFERENCES:
1. Gilbert M. Masters, ‘Introduction to Environmental Engineering and Science’, 2nd edition,Pearson
Education, 2004.
3. G. Tyler Miller and Scott E. Spoolman, “Environmental Science”, Cengage Learning India PVT,
LTD, Delhi, 2014
COURSE OUTCOMES:
Upon successful completion of the course, students will be able to
CO1: The structure and functions of the ecosystems and diversity among life forms within an ecosystem
CO2: The importance of various natural resources and its sustainable use
CO3: The various environmental issues such as pollution, population explosion etc and suggest remedial
measures.
CO4: The role of engineering techniques to minimize environmental stress
CO5: The role of various environmental machineries and to ensure proper environmental regulation
COs POs
1 2 3 4 5 6 7 8 9 10 11 12
CO1 3 - 1
CO2 3 2 1
CO3 3 2 1
CO4 3 2 1
CO5 3 - -
COURSECODE COURSETITLE L T P C
TOTALHOURS:45
TEXTBOOKS:
1. Adaptation by Balasubramanian,R, Callister’s Material Science and Engineering, Wiley India
Pvt .Ltd., 2ndEdition, 2014.
2. Kasap,S.O., Principles of Electronic Materials and Devices, (Special Indian Edition) McGraw-
Hill Education, 3rdEdition, 2017.
REFERENCES:
1. Pallab Bhattacharya, Semiconductor Optoelectronic Devices,Pearson,2ndEdition,2017.
2. Umesh K Mishra & Jasprit Singh, Semiconductor Device Physics and Design, Springer, 2008.
3. Wahab,M.A.,Solid State Physics: Structure & Properties of Materials, Narosa Publishing House,
2009.
4. Gaur,R.K. & Gupta,S.L.,Engineering Physics, Dhanpat Rai Publishers,2012.
5. Salivahanan,S.,Rajalakshmi,A.,Karthie,S.,Rajesh,N.P., Physics for Electronics Engineering
&Information Science, McGraw Hill (India) PrivateLimited,2018.
6. Avadhanulu,M.N.,P.G.Shirsagar,ATextBookofEngineeringPhysics,S.Chand&Co.Ltd. Ninth
Revised Edition, 2012
7. Theuwissen,A.J., Solidstate imaging with Charge-Coupled Devices, Kluwer-Academic
Publisher, Springer1995.
COURSE OUTCOMES:
At the end of this course, students will be able to
CO1: Estimate the conducting properties of materials based on classical and quantum theories and
understand the formation of energy band structures.
CO2: Acquire knowledge on basics of semiconductor physics and its application to PN junction devices.
CO3: Elucidate the function of magnetic and optical properties of materials in data
storage devices.
CO4: Explain the functioning of modern display devices.
CO5: Apply quantum mechanics of nanostructures and their application to Nano devices
for optoelectronic switching.
References:
1. Willis H. Wagner, Howard "Bud" Smith, and Mark W. Huth Modern Carpentry, 12th Edition,
2015
2. P.C.Sharma, Production Technology (Manufacturing Process): Manufacturing Process,
S.Chand publisher, 2006
3. Robert W. Messler, Reverse Engineering: Mechanisms, Structures, Systems & Materials,
McGraw-Hill Education, 2014
4. David W Rongey , A Complete Guide to Home Electrical Wiring, 2013
5. K.Jeyachandran, S.Natarajan & S, Balasubramanian, “A Primer on Engineering Practices
Laboratory”, Anuradha Publications, (2007).
COs POs
1 2 3 4 5 6 7 8 9 10 11 12
1 3 2 1 2 1 1
2 3 2 1 2 1 1
3 3 2 1 2 1 1
4 3 3 3 3 3 1 1
5 3 3 3 3 3 1 1
UNIT II COMBINATORICS 12
Mathematical induction–Strong induction–The pigeon hole principle–Recurrence relations–Partition of
Integers-Solving linear recurrence relations using generating functions –Inclusion and Exclusion Principle
and its applications.
TOTAL HOURS: 60
TEXTBOOKS
1. Kenneth H Rosen, “Discrete Mathematics and its Applications”,7th Edition, Special Indian edition,
Tata McGraw Hill, New Delhi, 2017.
2. Tremblay JP and Manohar R, “Discrete Mathematical Structures with Applications to Computer
Science”, 30th Reprint, Tata McGraw Hill, New Delhi, 2011.
REFERENCE BOOKS
1. Ralph P Grimaldi, “Discrete and Combinatorial Mathematics: An Applied Introduction”,4th Edition,
Pearson Education Asia, 2007.
2. Eric Lehman, F Tom Leighton, Albert R Meyer, Mathematics for Computer Science, Samurai Media
Limited, 2017.
3. Thomas Koshy,“Discrete Mathematics with Applications”, Elsevier Publications, 2006.
4. Seymour Lipschutz, Mark Lipson,“Discrete Mathematics”, Schaum’s Outlines, 3rd Edition, Tata
McGraw Hill, 2010.
5. CLLiu, DP Mohapatra,“Elements of Discrete Mathematics”,4th Edition, McGraw Higher Education,
2017.
6. John M Harris, Jeffry L Hirst, Michael J Mossinghoff, “Combinatorics and Graph Theory”, Springer
verlag New York, 2008.
OUTCOMES
On successful completion of this course, the student will be able to
CO1: Write simple proofs using Propositional and First Order Logics
CO2: Solve problems using different counting techniques
CO3: Prove simple graph properties.
CO4: Explain basic concepts in group theory such as semigroups, monoids and groups.
CO5: Solve problems in partial ordering relations, equivalence relations and lattices.
CO6: Application of Graph theory and Boolean algebra in engineering problems
COs/POs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2
CO2 3 2
CO3 3 2
CO4 3 2
CO5 3 2
CO6 3 2 1
OBJECTIVES:
• To help students distinguish between values and skills, and understand the need, basic guidelines, content
and process of value education.
• To help students initiate a process of dialog within themselves to know what they ‘really want to be’ in
their life and profession
• To help students understand the meaning of happiness and prosperity for a human being.
• To facilitate the students to understand harmony at all the levels of human living, and live accordingly.
• To facilitate the students in applying the understanding of harmony in existence in their profession and
lead an ethical life Course
TEXT BOOKS:
1. R R Gaur, R Sangal, G P Bagaria, 2009, A Foundation Course in Human Values and
Professional Ethics, Excel Books, New Delhi, 2nd Revised Edition, 2019.
REFERENCES:
1. Jeevan Vidya: EkParichaya, A Nagaraj, Jeevan Vidya Prakashan, Amarkantak, 1999.
2. Human Values, A.N. Tripathi, New Age Intl. Publishers, New Delhi, 2004.
3. The Story of Stuff (Book).
4. The Story of My Experiments with Truth - by Mohandas Karamchand Gandhi
5. Small is Beautiful - E. F Schumacher.
6. Slow is Beautiful - Cecile Andrews
7. Economy of Permanence - J C Kumarappa
8. Bharat Mein Angreji Raj - PanditSunderlal
9. Rediscovering India - by Dharampal
10. Hind Swaraj or Indian Home Rule - by Mohandas K. Gandhi
11. India Wins Freedom - Maulana Abdul Kalam Azad
12. Vivekananda - Romain Rolland (English)
13. Gandhi - Romain Rolland (English)
COURSE OUTCOMES:
Upon successful completion of the course, students will be able to
CO1: Understand the significance of value inputs in a classroom, distinguish between values and skills,
understand the need, basic guidelines, content and process of value education, explore the meaning of
happiness and prosperity and do a correct appraisal of the current scenario in the society.
CO2: Distinguish between the Self and the Body, understand the meaning of Harmony in the Self the Co-
existence of Self and Body.
CO3: Understand the value of harmonious relationship based on trust, respect and other naturally acceptable
feelings in human-human relationships and explore their role in ensuring a harmonious society.
CO4: Understand the harmony in nature and existence, and work out their mutually fulfilling participation
in the nature.
CO5: Distinguish between ethical and unethical practices, and start working out the strategy to actualize a
harmonious environment wherever they work.
OBJECTIVES:
The objective of this course is to enable the students to
● understand the concepts of objects, classes, interfaces, modules and packages
● understand the concepts of inheritance, polymorphism and exceptions
● choose and apply the concepts of stings, data serialization, and different formats
● judiciously select and apply design patterns.
TOTAL: 45 HOURS
TEXTBOOKS:
1. Dusty Phillips, “Python 3 Object-Oriented Programming: Build robust and maintainable software
with object-oriented design patterns in Python 3.8”, Third Edition, Packt Publishing, 2018.
REFERENCES:
1. Matt Weisfeld, “Object-Oriented Thought Process”, Fifth Edition, Addison-Wesley Professional,
2019.
2. Matthias Noback, “Object Design Style Guide”, Manning Publications, 2020.
3. Stephen F. Lott, “Mastering Object-oriented Python”, Second Edition, Packt Publishing, 2019.
4. Mark Lutz, “Programming Python: Powerful Object-Oriented Programming”, Fourth Edition,
O’Reilly Media, 2011.
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
1. Solve problems using objects, classes, interfaces, modules and packages.
2. Apply the concepts of inheritance, polymorphism and exceptions in software design
3. Employ effective object serialization and data formats to solve problems
4. Select and apply design patterns in their design and analysis
OBJECTIVES:
The objective of this course is to enable the students to
● Understand database development life cycle and conceptual modeling
● Learn SQL for data definition, manipulation and querying a database
● Design relational databases using conceptual mapping and normalization
● Learn transaction concepts and serializability of schedules
● Learn data model and querying in object-relational and No-SQL databases
REFERENCES:
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, Database System Concepts, Sixth Edition,
Tata McGraw Hill, 2011.
2. Toby Teorey, Sam Lightstone, Tom Nadeau, H. V. Jagadish, “Database Modelingand Design–
Logical Design”, Fifth Edition, Morgan Kaufmann Publishers, 2011.
3. Carlos Coronel, Steven Morris, and Peter Rob, Database Systems: Design, Implementation, and
Management, Ninth Edition, Cengage learning, 2012
4. C.J.Date, A.Kannan, Swaminathan, “An Introduction to Database Systems”, Eighth Edition,
Pearson Education, 2003.
5. G.K.Gupta,"Database Management Systems”, Tata McGraw Hill, 2011.
6. Carlo Zaniolo, Stefano Ceri, Christos Faloutsos, Richard T.Snodgrass, V.S.Subrahmanian, Roberto
Zicari, “Advanced Database Systems”, Morgan Kaufmann publishers, 2006.
7. Hector Garcia-Molina, Jeffrey D Ullman, Jennifer Widom, "Database Systems:The Complete
Book", 2nd edition, Pearson.
8. S Sumathi, S Esakkirajan, “Fundamentals of Relational Database Management Systems '', (Studies
in Computational Intelligence), Springer-Verlag, 2007.
9. Raghu Ramakrishnan, “Database Management Systems'', 4th Edition, Tata McGraw Hill, 2010.
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
1. Explain the database development life cycle and apply conceptual modeling
2. Apply SQL and programming in SQL to create, manipulate and query the database
3. Apply the conceptual-to-relational mapping and normalization to design relational data base
4. Determine the serializability of any non-serial schedule using concurrency techniques
5. Apply the data model and querying in Object-relational and No-SQL data bases.
COs POs PSOs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 2 1 2
CO2 2 1 2
CO3 2 1 1 2
CO4 2 1 1 2
CO5 2 1 1 1 2
OBJECTIVES:
The objective of this course is to enable the students.
● To know about the number systems, different binary arithmetic operations, and logic gates
● To design combinational and sequential circuits.
● To know about the fundamentals of computers.
● To know about the design of control units in a processor
● To know about the memory and I/O management.
TOTAL:45 HOURS
TEXTBOOKS:
1. M. Morris Mano, Michael D. Ciletti, “Digital Design”, Fifth Edition, Pearson Education, 2013.
2. David A. Patterson, John L. Hennessy, “Computer Organization and Design, The
Hardware/Software Interface”, Fifth Edition, Morgan Kaufmann/Elsevier, 2013.
REFERENCES:
1. Carl Hamacher, Zvonko Vranesic, Safwat Zaky, Naraig Manjikian, “Computer Organization and
Embedded Systems”, Sixth Edition, Tata McGraw-Hill, 2012.
2. William Stallings, “Computer Organization and Architecture – Designing for Performance”, Tenth
Edition, Pearson Education, 2016.
3. M. Morris Mano, “Digital Logic and Computer Design”, Pearson Education, 2008.
COURSE OUTCOMES:
On successful completion of this course, the students should be able
1. Understand the concept of number systems, logic gates and different binary arithmetic operations.
2. Design and analyse the operation of different combinational logic circuits.
3. Design and analyse the operation of different sequential logic circuits
4. Understand the design and implementation of a digital system.
5. Understand the computer functional blocks and execution of instructions.
6. Understand the design of different circuits used in ALU, memory hierarchy and different issues in
parallelism
REFERENCES:
1. Thomas Cover, Joy Thomas, “Elements of Information Theory”, Wiley Inderscience, 2nd Edition,
2006
2. Herbert Taub, and Donald L Schilling, “Principles of Communication Systems”, 3rd Edition,
McGraw Hill Publishing Company, 1998.
3. Simon Haykin, “Communication Systems”, 4th Edition, John Wiley & Sons, 2004
COURSE OUTCOMES:
On successful completion of this course, the student should be able to:
1. Explain various data communication techniques.
2. Explain multiuser radio communication.
3. Use information entropy to design source and channel coding.
4. Appreciate the importance of digital communication in the physical layer of a network
OBJECTIVES:
The objective of this course is to enable the students
● To learn in creating and populating a database.
● To familiarize with a query language.
● To enforce integrity constraints on a database.
● To practice advanced SQL queries.
● To understand functions, procedures, and procedural extensions of databases.
● To design a database application with frontend tools.
LIST OF EXPERIMENTS:
SQL:
1. Data Definition commands, Data Manipulation commands for inserting, deleting, updating and
retrieving tables and Transaction Control statements.
2. Creating a database to set various constraints.
3. Database Querying – Simple queries, Nested queries, Sub queries, Join queries, Correlated
queries, Recursive queries.
4. Views, Sequences, Synonyms, Indexes.
PL/SQL:
5. Procedures and Functions.
6. Packages.
7. Implicit and Explicit Cursors.
8. Triggers.
9. Implementation of ADODB - Standalone and Web
10. Implementation of ADO - Standalone and Web
11. Database Connectivity with Front End tools.
12. Queries of MongoDB
13. Application Development using RDBMS and MongoDB.
● Inventory control system.
● Hospital management system.
● Railway reservation system.
● Web based user identification System.
● Timetable management system.
● Hotel management system.
● Library information system.
● Logistics management system.
● Retail-shop management system.
● Employee information system.
● Payroll system.
TOTAL: 45 HOURS
COURSE OUTCOMES:
On successful completion of this course, the student should be able to
1. Design and implement a database schema for a given problem-domain.
2. Design a database and query using SQL DML/DDL commands.
3. Create procedures using PL/SQL.
4. Design and build any GUI application.
OBJECTIVES:
The objective of this course is to enable the students
LIST OF EXPERIMENTS:
1. Implement simple ADTs using Python objects and classes.
2. Create Python modules and packages.
3. Programs with inheritance and polymorphism
4. Programs with abstract classes
5. Programs with exception handling
6. Object and Data Serialization
7. Programs with selected design patterns
8. Unit testing and Pytest
9. Programs using Concurrency and async i/o.
10.Mini project covering all the concepts.
TOTAL: 45 HOURS
COURSE OUTCOMES:
On completion of the course, the students will be able to
1. Design and implement ADTs using Python modules and packages
2. Judiciously select and apply object-oriented concepts for software development
3. Implement object persistence and serialization techniques
4. Develop test cases and perform systematic testing of object-oriented software
5. Develop software systems with sub-systems running concurrently communicating and
collaborating with each other
OBJECTIVES
The objective of this course is to enable the student to
● Identify the standard distributions and apply them in solving problems.
● Solve problems in joint probabilities and to find correlation between them.
● Perform hypothesis testing using normal, t, f, chi square distribution
● Evaluate the tests of significance in analysis of variance.
● Calculate the various statistical quality control measurements.
UNIT I RANDOM VARIABLES 12
Random Variables - Discrete and continuous random variables - Moments - Moment generating
functions - Binomial, Poisson, Geometric, Uniform, Exponential and Normal distribution –
Functions of Random Variable
REFERENCES
1. Devore, J.L., Probability and Statistics for Engineering and the Sciences,
Thomson Brooks/Cole, International Student Edition, New Delhi, 8th Edition, 2012.
2. Walpole, R.E., Myers, R.H., Myers, S.L. and Ye, K., Probability and Statistics for
Engineers and Scientists, Pearson Education, Asia, 9th Edition, 2012.
3. Ross, S.M., Introduction to Probability and Statistics for Engineers and Scientists,
Elsevier, New Delhi, 5th Edition, 2014.
4. Spiegel, M.R., Schiller, J. and Srinivasan, R.A., Schaum’s Outline of Theory and
Problems of Probability and Statistics, Tata McGraw Hill, New Delhi, 3rd Edition,
2017.
5. Gupta, S.C and Kapoor, V.K., Fundamentals of Mathematical Statistics, Sultan and
Chand Company, New Delhi, 12th Edition, 2020.
COURSE OUTCOMES
On successful completion of this course, the student will be able to
CO1: identify standard distributions and apply them.
CO2: solve problems in two dimensional random variables and find the correlation
between them.
CO3: identify and apply the suitable testing of hypothesis under normal, t, F and chi square
distribution
CO4: solve problems in analysis of variance.
CO5: analyze quality control by applying control chart methods.
CO6: application of Random variables, Design of Experiments and control charts in engineering
problems
CO-PO MAPPING
COs/POs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2
CO2 3 2
CO3 3 2
CO4 3 2 1
CO5 3 2
CO6 3 2 1
OBJECTIVES:
The objective of this course is to enable the students to
• Understand the architecture and operation of the 8086 microprocessor and ARM microcontroller.
• Learn the addressing mode and programming model of Intel X86 Processor, and ARM architecture
• Acquire Assembly language programming skills.
• Explore to basic peripherals, its programming and interfacing techniques of microprocessor and
controllers
• Develop applications using Intel X86 Processors and ARM Microcontrollers
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
1. Explain the addressing modes, assembly language programming of X86, and ARM.
2. Explain architecture of 8086.
3. Design and develop assembly language programs.
4. Interface different external memory and peripheral devices with microprocessors and micro
controller
5. Analyze a problem and formulate appropriate computing solution for microprocessor-based
application
OBJECTIVES:
The objective of this course is to enable the students to
• Use hierarchical data structures for solving problems
• Understand and apply different algorithm design techniques
• Analyze formulations of problems and algorithms for time and space efficiency
• Understand intractability and characterize NP problems
UNIT I ADVANCED NON-LINEAR DATA STRUCTURES 9
Review of Algorithm Analysis and Asymptotic Notations – Splay trees – amortized analysis – B+-Trees and
database indexing – Red-Black trees – Skew Heaps – Binomial Heaps – Fibonacci Heaps
UNIT V INTRACTABILITY 9
Branch and Bound – Knapsack problem – Traveling salesman problem – Introduction to intractability –
Polynomial reductions – SAT and 3-SAT – NP-complete and NP-Hard problems – Approximation
algorithms: Traveling salesman problem – Knapsack problem – Introduction to randomized and parallel
algorithms.
THEORY: 45 HOURS
LAB COMPONENT:
LIST OF EXPERIMENTS:
1. Implementation of splay trees
2. Implementation of B+ trees
3. Implementation of state space search algorithms
4. Implementation of divide-and-conquer algorithm for closest-pairs problem
5. Implementation of Huffman coding
6. Implementation of disjoint sets and Kruskal’s algorithm
7. Implementation of dynamic programming algorithms --- computing binomial coefficients, Bellman-
Ford algorithm
8. Implementation of backtracking algorithms to solve n-Queens and Hamilton circuits problems
9. Implementation of iterative improvement strategy for stable marriage and maxflow problems
10. Implementation of Branch and Bound technique to solve knapsack and TSP problems
11. Implementation of approximation algorithms for knapsack and TSP problems
12. Implementation of parallel and randomized algorithms
PRACTICAL: 30 HOURS
EXPERIENCIAL LEARNING:
Students are divided into teams of size not exceeding seven.
Each team will be given a project as a context.
1. Processes: PSP, Scrum, DevOps : 15%
2. Management: Estimation, WBS, Planning, Tracking : 10%
3. Risk Management : 5%
4. Coding Standards and Configuration Management : 15%
5. Automation of routine tasks : 10%
6. Meetings: “Customer” meetings, review meetings, brain-storming : 15%
7. Presentations : 15%
8. Documentations : 15%
PROJECT: 45 HOURS
TOTAL: 120 HOURS
TEXT BOOK:
1. Anany Levitin, “Introduction to the Design and Analysis of Algorithms”, Third Edition, Pearson
Education, 2012.
REFERENCES:
1. Jon Kleinberg and Eva Tardos, “Algorithm Design”, Pearson Education, 2006.
2. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C++”, Pearson Education, Fourth
Edition, 2014
3. S. Skiena, “The Algorithm Design Manual”, 2nd Edition, Springer, 2008.
4. Sara Baase and Allen Van Gelder, "Computer Algorithms", Third Edition, Pearson Education,
2000.
5. S. Sridhar, "Design and Analysis of Algorithms", Oxford university press, 2014.
6. Thomas H Cormen, Charles E Leiserson, Ronald L Rivest, Clifford Stein, "Introduction to
Algorithms'', 3rd Edition, PHI Learning Private Limited, 2012.
COURSE OUTCOMES:
At the end of the course, the students will be able to:
1. Design and implement algorithms using hierarchical data structures
2. Judiciously select and apply algorithm design techniques for efficiently solving problems
3. Analyze the time and space complexity of algorithms and their implementations
4. Explain intractability and characterization of NP problems
5. Apply best practices for IT project management for design and development of software intensive
systems
6. Communicate efficiently in team meetings & presentations and prepare documents in the context
of software development projects
OBJECTIVES:
The objective of this course is to enable the students to
• Understand the division of network functionalities into layers
• Be familiar with the components required to build distinct types of networks
• Understand the required functionality at each layer
• Develop network applications
TOTALHOURS: 45
TEXTBOOKS:
1. Behrouz A Forouzan, “Data Communication and Networking”, Fifth Edition, The McGraw Hills,
2013.
REFERENCES:
1. Larry L. Peterson and Bruce S. Davie, “Computer Networks – A systems Approach”, Fifth Edition,
Morgan Kaufmann, 2011.
2. James F Kurose, Keith W Ross, “Computer Networking, A Top-Down Approach Featuring the
Internet”, 6th Edition, Pearson Education, 2013.
3. William Stallings, “Data and Computer Communication”, 10th Edition, Pearson, 2014.
4. Andrew S. Tanenbaum and David J. Wetherall, “Computer Networks”, Fifth Edition, Pearson,
2013.
5. Nader F Mir, “Computer and Communication Networks”, 2nd Edition, Prentice Hall, 2014.
6. Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open-Source Approach”,
McGraw Hill Publisher, 2011.
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
1. Identify the components required to build different types of networks.
2. Choose the required functionality at each layer for given application.
3. Identify solution for each functionality at each layer.
4. Ability to trace and interpret information flow in the network
5. Understand the functionalities of network application services
UNIT II GRAMMARS 9
Grammar Introduction: Types of Grammar, Context Free Grammars and Languages, Derivations,
Simplification of CFG: Elimination of Useless Symbols Simplification of CFG: Unit productions, Null
productions, Chomsky normal form, Greibach Normal form – phases of a compiler – lexical analysis
UNIT V UNDECIDABILITY 9
Undecidability: Basic definitions – Decidable Problems – Examples of undecidable problems – Semi-
decidability – Rice’s Theorem, problems about Turing Machine – Post’s Correspondence Problem –
Properties of Recursive and Recursively enumerable languages.
TOTAL: 45 HOURS
TEXTBOOKS:
1. John E Hopcroft and Jeffery D Ullman, Introduction to Automata Theory, Languages and
Computations, Narosa Publishing House, 2002.
2. Alfred V Aho, Monica S. Lam, Ravi Sethi and Jeffrey D Ullman, Compilers – Principles,
Techniques and Tools, 2nd Edition, Pearson Education, 2007.
REFERENCES:
1. Michael Sipser, "Introduction of the Theory of Computation", Second Edition, Thomson
Brokecole, 2006.
2. J. Martin, "Introduction to Languages and the Theory of Computation", Third Edition, Tata
McGraw Hill, 2003.
3. V. Raghavan, Principles of Compiler Design, Tata McGraw Hill Education Publishers, 2010.
4. Muneeswaran. K, ―Compiler Design, Oxford University Press, 2012
5. Steven S. Muchnick, ―Advanced Compiler Design and Implementation, Morgan Kaufmann
Publishers - Elsevier Science, India, Indian Reprint 2003.
6. Randy Allen, Ken Kennedy, ―Optimizing Compilers for Modern Architectures: A Dependence-
based Approach, Morgan Kaufmann Publishers, 2002.
COURSE OUTCOMES:
On successful completion of this course, the students will be able to
1. Construct automata, regular expression for any pattern.
2. Write Context free grammar for any construct.
3. Build the different Phases of compiler and apply the various optimization techniques.
4. Design Turing machine for a given language
5. Explain decidability, semi-decidability, and undecidability
OBJECTIVES:
The objective of this course is to enable the students
The student should be made to:
• Learn socket programming.
• Be familiar with simulation tools.
• Have hands on experience on various networking protocols.
LIST OF EXCERCISES:
Tools: Python Twisted, Cisco Packet Tracer, Wireshark, NS2/NS3, Cooja
1. Dr. M.O. Faruque Sarker, Sam Washington, “Learning Python Network Programming”,
Packt Publisher, OReilly, June 2015.
2. Brandon Rhodes, John Goerzen, “Foundations of Python Network Programming”, 3rd
Edition, APress, 2014
3. https://www.w3schools.in/python-tutorial/network-programming/
COURSE OUTCOMES:
At the end of the course, the student should be able to
1. Ability to study and implement network sockets
2. Study and analyze the performance of networking protocols
3. Ability to work with network simulation tools
LIST OF EXPERIMENTS:
1. Study of Logic gates, flip-flops, and counters.
2. 8086 ALP Programs (Using Kit and MASM).
a. 8 and, 16-bit Arithmetic operations (Using Kit and MASM).
b. Sorting and searching of numbers.
c. String manipulation operations.
d. Implementing Digital clock.
3. Interfacing using Microprocessor and ARM Microcontroller (Using Kit)
a. DAC for waveform generation.
b. Interfacing to simulate Traffic Light controller signals.
c. Interfacing Stepper Motor.
4. Micro python programming using ARM Embedded Trainer Kit/ Raspberry Pi / Arduino
boards.
a. LED on/off control.
b. Triggering Notification using sensors.
c. Generation of PWM output.
d. Reading analog inputs and writing analog outputs.
5. Flutter / Kotlin Multiplatform applications using ARM
6. Mini projects using any microcontroller, sensors, actuators and Zigbee/communication module
TOTAL: 45 HOURS
COURSE OUTCOMES:
On successful completion of the course, the students should be able to
1. Write ALP for 8086 processor and ARM Processor
2. Develop systems with interfacing peripheral devices with microprocessor & Controller.
3. Create ALP to solve simple problems using ARM board
4. Develop real time applications using interfacing various peripherals and processor.
5. Solve simple problems using Micro python
6. Design and develop suitable autonomous applications for the given situation using ARM
Board/ARM Embedded Trainer Kit/ Raspberry Pi / Arduino board
OBJECTIVES:
The objective of this course is to enable the students
• To understand the process and its models.
• To understand fundamental concepts of Requirements Engineering and Analysis Modelling.
• To understand the design principles.
• To learn various testing and maintenance measures.
UNIT IV TESTING 9
Software testing fundamentals – Testing approaches – Black Box Testing: Equivalence partitioning,
Boundary Value Analysis – White box testing: basis path testing – Test coverage criteria based on Data
flow mechanisms – Regression Testing – Levels of Testing: Unit Testing, Integration Testing, System
Testing, Acceptance Testing.
TOTAL: 45 HOURS
TEXTBOOKS:
1. Roger S. Pressman, “Software Engineering – A practitioner’s Approach”, Seventh Edition, McGraw-
Hill International Edition, 2017.
2. Ian Sommerville, “Software Engineering”, Tenth Edition, Pearson Education Asia, 2017.
REFERENCES:
1. Rajib Mall, “Fundamentals of Software Engineering”, Third Edition, PHI Learning Private Limited,
2009
2. Kelkar S. A., “Software Engineering”, Prentice Hall of India Pvt Ltd, 2007
3. Pankaj Jalote, “Software Engineering – A Precise Approach”, Wiley India, 2010.
4. Ghezzi, “Fundamentals of Software Engineering”, Second Edition, Pearson Education India, 2015.
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
1. Identify the key phases and compare different process models.
2. Apply the concepts of Requirements Engineering and Analysis modelling.
3. Apply systematic procedure for software design and deployment.
4. Compare and contrast various testing strategies.
5. Apply umbrella activities from inception till maintenance.
OBJECTIVES:
● Understand the challenges and processes in data analytics
● Apply descriptive data analytics and visualization techniques
● Apply inferential data analytics
● Build and evaluate models for predictive analytics
REFERENCES:
1. Allen B. Downey, “Think Stats: Exploratory Data Analysis in Python”, Green Tea Press, 2014.
COURSE OUTCOMES:
On successful completion of this course, the student should be able to:
1. Explain end-to-end data analytics pipeline
2. Use appropriate tools to describe and visualize data
3. Perform various statistical analysis to make statistical inferences
4. Build, validate and communicate data analytical models for complex engineering problems
THEORY: 45 HOURS
TEXTBOOK:
1. Abraham Silberschatz, Peter Baer Galvin, and Greg Gagne, “Operating System Concepts”, Tenth
Edition, John Wiley and Sons Inc., 2018.
REFERENCES:
1. William Stallings, “Operating Systems – Internals and Design Principles”, Ninth Edition, Pearson,
2018.
2. Andrew S. Tanenbaum, Albert S. Woodhull, “Operating Systems Design and Implementation”,
Third Edition, Prentice Hall, 2006.
3. Brian L. Stuart, “Principles of Operating Systems: Design & Applications”, First Edition, Thomson
Learning, 2009.
4. Gary Nutt, “Operating Systems”, Third Edition, Pearson Education, 2004.
5. Harvey M. Deitel, Paul J. Deitel, and David R. Choffnes, “Operating Systems”, Third Edition,
Pearson Education, 2004.
6. Achyut S. Godbole, Atul Kahate, “Operating Systems”, Third Edition, McGraw Hill Education,
2017.
COURSE OUTCOMES:
On successful completion of this course, the students will be able to
1. Explain operating system services and operations.
2. Implement various scheduling algorithms.
3. Apply the principles of concurrency.
4. Compare and contrast various memory management schemes.
5. Analyze the various disk scheduling algorithms
6. Design and implement prototype file systems.
OBJECTIVES:
The objective of this course is to enable the students to
• Understand the basic concepts of intelligent agents
• Develop general-purpose problem-solving agents, logical reasoning agents, and agents that reason
under uncertainty
• Employ AI techniques to solve some of today’s real-world problems.
THEORY: 45 HOURS
TEXTBOOK:
1. Stuart Russell and Peter Norvig, “Artificial Intelligence – A Modern Approach”, Fourth Edition,
Pearson Education, 2021.
REFERENCES:
1. Dan W. Patterson, “Introduction to AI and ES”, Pearson Education,2007
2. Kevin Night, Elaine Rich, and Nair B., “Artificial Intelligence”, McGraw Hill, 2008
3. Patrick H. Winston, "Artificial Intelligence", Third Edition, Pearson Education, 2006
4. Deepak Khemani, “Artificial Intelligence”, Tata McGraw Hill Education, 2013 (http://nptel.ac.in/)
COURSE OUTCOMES:
On successful completion of this course, the students will be able to
1. Understand the foundations of artificial intelligence (AI) and autonomous agents that make
effective decisions in various environmental settings, their scope and limitations.
2. Apply basic principles of AI in solutions that require problem solving, inference under certainty
and uncertainty, perception, knowledge representation, and learning
3. Define complex problems in AI terms, and solve them by analyzing appropriate AI agents.
COs POs PSOs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 3 1 1 2 2
CO2 3 2 2 3 2
CO3 2 3 2 3 2
Carry out team project to solve a real-world problem that requires significant ideas from Artificial
Intelligence. Each team should follow the best principles and practices for software development,
and demonstrate their abilities to:
1. Choose and follow a team process
2. Identify and manage risks
3. Prepare Statement of Work (SoW)
4. Identify and document the functional and quality attributes of the product
5. Perform high-level and low-level design activities
6. Estimate and track the cost
7. Perform work break-down (WBS)
8. Prepare macro and micro plans and track them
9. Develop and test the software in iterations
10. Carry out configuration management and quality assurance activities
11. Conduct and contribute in different types of meetings
12. Prepare necessary documents and make effective presentations
TOTAL: 45 HOURS
COURSE OUTCOMES:
On successful completion of this course, the students will be able to
1. Apply systematic approach to software development using enduring principles and best practices
2. Design, implement, and evaluate software to meet business requirements of users
3. Judiciously select and apply artificial intelligence techniques in their computing solutions
4. Apply best practices for IT project management
5. Communicate efficiently in team meetings & presentations and prepare documents
LIST OF EXCERCISES:
1. Install and configure operating systems in bare metal and virtual machines
2. Implement selected operating system services
3. Develop software using operating system services
4. Develop software using processes and threads
5. Implement selected CPU scheduling algorithms
6. Implement selected memory management algorithms
7. Implementselected storage management algorithms
8. Mini-project
TOTAL: 45 HOURS
REFERENCES:
1. The Linux Knowledge Base and Tutorial:http://www.linux-tutorial.info/
2. http://nptel.ac.in/
COURSE OUTCOMES:
On successful completion of this course, the students will be able to
1. Install and configure operating systems
2. Implement operating system services
3. Automate routine operating system maintenance tasks
4. Develop software using operating system services
5. Analyze the performance of the various scheduling, memory management, and storage
management algorithms
OBJECTIVES:
The objective of this course is to enable the students to
• Understand the basic concepts and techniques of Machine Learning.
• design and implement machine learning solutions for classification, regression, and clustering
problems.
• design and analyse machine learning experiments
LECTURE HOURS: 45
LAB COMPONENT:
1. Predicting the age of Abalone (type of snail) using linear regression
2. Detecting spam mails using Naïve Bayes
3. Sentiment classification of movies using decision tress and random forest
4. Recognizing digits using multilayer perceptron
5. Deep neural networks for CIFAR-10
6. Ensemble algorithms
7. Clustering MNIST handwritten dataset using K-means algorithm
8. Model validation and selection using statistical tests
9. Mini-project: students work in team on any socially relevant problem that needs a machine learning
based solution, and evaluate the model performance.
LAB HOURS: 30
TOTALHOURS: 75
TEXTBOOK:
1. Ethem Alpaydin, “Introduction to Machine Learning”, MIT Press, Fourth Edition, 2020.
REFERENCES:
1. Christopher M. Bishop, “Pattern Recognition and Machine Learning”, Springer, 2006.
2. Tom Mitchell, “Machine Learning”, McGraw Hill, 3rd Edition,1997.
3. Charu C. Aggarwal, “Data Classification Algorithms and Applications”, CRC Press, 2014
4. Mehryar Mohri, Afshin Rostamizadeh, Ameet Talwalkar, “Foundations of Machine Learning”, MIT
Press, 2012.
5. Ian Goodfellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2016
6. Sebastain Raschka, “Python Machine Learning”, Packt publishing (open source).
COURSE OUTCOMES:
On successful completion of this course, students will be able to
1. Explain and appreciate the underlying mathematics and paradigms of Machine Learning algorithms.
2. Select the appropriate machine learning approach and suitable model parameters for a given
problem.
3. Design machine learning experiments, and implement machine learning solutions for regression,
classification and clustering problems, and interpret the results.
4. Implement various machine learning algorithms for real-world applications.
UNIT I INTRODUCTION 9
Introduction to web technology – Software-as-a-service – software development processes – quality assurance
– SaaS and service-oriented architecture – cloud computing – HTTP, HTML, and the web – mobile clients –
fallacies and pitfalls. How to learn a new language – learning to learn languages and frameworks – pair
programming – programming using Ruby – Ruby idioms – library management in Ruby – fallacies and pitfalls
LAB COMPONENT:
Selected CHIPS from the text book
LAB HOURS: 30
EXPERIENCIAL LEARNING:
Students are divided into teams; About 7--10 members in a team
Each team will be given a web programming project (using Ruby on Rails) as a context
PROJECT HOURS: 45
TOTALHOURS: 120
TEXTBOOK:
1. Armando Fox and David Patterson, “Engineering Software as a Service: An agile approach using
cloud computing”, Second Edition, Pogo Press, 2021.
REFERENCES:
1. Mark Pilgrim, “HTML5: Up and Running”, O’Reilly, 2010.
2. Brad Dayley, Brendan Dayley, Caleb Dayley, “Learning Angular: A Hands-On Guide to Angular
2 and Angular 4”, Second Edition, Addison-Wesley Professional, 2018.
3. Evan Hahn, “Express in Action: Node applications with Express and its companion tools”, First
Edition, Manning Publications, 2015.
4. Kristina Chodorow, Shroff, “Mongodb: The Definitive Guide – Powerful and Scalable Data
Storage”, Second Edition, O’Reilly, 2013.
5. Subbu Allamaraju, RESTful Web Services Cookbook, First Edition, O′Reilly, 2010.
COURSE OUTCOMES:
On successful completion of this course, the student will be able to:
1. Explain the basics of web technology and software-as-a-service
2. Employ ruby-on-rails platform for web software development
3. Develop and test micro-services and restful apis
4. Develop client-side code using javascript ecosystem
5. Judiciously select and employ design patterns in web programming
6. Employ software engineering best practices for web programming
7. Apply best practices for IT project management
8. Communicate efficiently in team meetings & presentations and prepare documents
OBJECTIVES:
The objective of this course is to enable the students
• To develop C Programs using basic programming constructs
• To develop C programs using arrays, strings and functions
• To develop applications in C using pointers, structures and files
• To introduce the IoT terminology, technology, and applications
• To introduce the concept of M2M (machine to machine) with necessary protocols
• To introduce the Python Scripting Language which is used in many IoT devices.
LECTURE HOURS: 45
LABORATORY COMPONENT:
1. Mini-project using the C programming language
2. Hands-on Tutorials on Arduino programming
3. Developing simple applications using open platform (like Raspberry Pi)
4. Mini-project using IoT
LAB HOURS: 30
TOTALHOURS: 75
TEXT BOOKS:
1. Arshdeep Bahga and Vijay Madisetti, “Internet of Things – A Hands-on Approach”, Universities
Press, 2015.
2. Reema Thareja, “Programming in C”, Oxford University Press, Second Edition, 2016.
3. Kernighan, B.W and Ritchie, D.M., “The C Programming language”, Second Edition, Pearson
Education, 2006
4. Matt Richardson & Shawn Wallace, “Getting Started with Raspberry Pi”, O'Reilly(SPD), 2014.
5. Simon Monk, “Raspberry Pi Cookbook: Software and Hardware Problems and solutions”, O'Reilly
(SPD), 2016.
REFERENCES:
1. Peter Waher, 'Learning Internet of Things', Packt Publishing, 2015 3. Editors OvidiuVermesan
2. Peter Friess,'Internet of Things – From Research and Innovation to Market Deployment',River
Publishers, 2014
3. Juneja, B. L and Anita Seth, ―Programming in C‖, CENGAGE Learning India Pvt. Ltd., 2011
4. Peter Friess, 'Internet of Things – From Research and Innovation to Market Deployment, River
Publishers, 2014
5. N. Ida, Sensors, Actuators and Their Interfaces, SciTech Publishers, 2014.
COURSE OUTCOMES:
On successful completion of this course, the students should be able to
1. Develop software solutions using C
2. Explain the IoT value chain structure (device, data cloud), application areas and technologies
involved
3. Explain IoT sensors and technological challenges faced by IoT devices, with a focus on wireless,
energy, power, and sensing modules
4. Perform market forecast for IoT devices with a focus on sensors
5. Develop smart solutions using IoT
COs POs PSOs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 3 1 1
CO2 1 3 1 2 3
CO3 2 1 1 1 2 3
CO4 1 2 1 3
CO5 3 2 1 2 2 2 2 3 3
OBJECTIVES:
The objective of this course is to enable the students to
● Use Flutter/Kotlin multi-platform environment for building cross-platform mobile applications.
● Demonstrate the knowledge of different programming techniques and patterns for mobile
application development.
● Identify the components and structure of mobile application development frameworks.
● Understand the capabilities and limitations of different platforms.
● Design and develop real-time mobile applications.
LIST OF EXPERIMENTS:
● Study and installation of Flutter/Kotlin multi-platform environment
● Develop an application that uses Widgets, GUI components, Font and Colors.
● Develop a native calculator application.
● Develop a gaming application that uses 2-D animations and gestures.
● Develop a movie rating application (similar to IMDB)
● Develop an application to connect to a web service and to retrieve data with HTTP.
● Develop a simple shopping application.
● Design a web server supporting push notifications.
● Develop an application by integrating Google maps
● Mini Projects involving Flutter/Kotlin multi-platform
TOTAL: 60 HOURS
TEXTBOOKS:
1. Simone Alessandria, Flutter Projects: A practical project-based guide to building real-world cross-
platform mobile applications and games,publisher: packt publishing, www.packt.com.
2. Carmine Zaccagnino, Programming Flutter: Native, Cross-Platform Apps the Easy Way (The
Pragmatic Programmers), publisher: packt publishing, www.packt.com.
3. Gergely Orosz, Building Mobile Applications at Scale:39 Engineering Challenges, amazon.in
4. Souvik Biswas & Codemagic, Flutter Libraries we love, pub.green.
5. ED Freitas, Daniel Jebaraj, Flutter Succinctly, Syncfusion, Inc.
6. Flutter Basics, www.tutorialpoints.com.
7. Learn Google Flutter Fast
8. Antonio Leiva, Kotlin for Android Developers Learn Kotlin the easy way while developing an
Android Applications
COURSE OUTCOMES:
On successful completion of this course, the student should be able to
1. Design and build simple mobile applications supporting multiple platforms.
2. Apply various programming techniques and patterns to build mobile applications.
3. Build real-time/gaming/multimedia/AI-based mobile applications for society/environment
following ethical practices
REFERENCES:
1. Wade Trappe and Lawrence C. Washington, Introduction to Cryptography with Coding Theory”
Second Edition, Pearson Education, 2007
2. Atul Kahate, Cryptography and Network Security, 2nd Edition, Tata McGraw Hill, 2008
3. Bruce Schneier, Applied Cryptography, John Wiley& Sons Inc, 2001.
4. Charles P Fleeger and Shari Lawrence P Fleeger, Security in Computing, Fourth edition, Pearson
Education,2015.
5. William Stallings, Network Security Essentials: Applications and Standards, Pearson Education
India; 4 edition (2011)
6. Behrouz A Forouzan, Debdeep Mukhopadhyay, Cryptography and Network Security (SIE), Tata
McGraw-Hill Education,2nd edition.2010
7. Catherine Paquet, “Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning
Guide”, 2nd Edition.
COURSE OUTCOMES:
On successful completion of this course, the students should be able to
1. Build basic security algorithms required by any computing system.
2. Analyze the vulnerabilities in any computing system and hence be able to design a security solution.
3. Analyze the possible security attacks in complex real time systems and their effective
countermeasures.
4. Classify the security issues in the network and resolve it.
5. Evaluate security mechanisms using rigorous approaches, including theoretical derivation,
modeling, and simulations.
COURSE OUTCOMES:
On successful completion of this course, the student should be able to
1. Understand how distributed system concepts apply inside cloud.
2. Apply the distributed algorithms for effective scheduling.
3. Analyze the need for virtualization and apply it in a cloud environment.
4. Understand the architecture, infrastructure, and delivery models of cloud computing.
5. Explore cloud tools and build applications.
COURSE OUTCOMES:
Student should be able to
1. Integrate theory and practice, and identify curriculum gap
2. Develop work competencies for a specific profession or occupation.
3. Communicate and collaborate effectively and appropriately with different professionals in the work
environment through written and oral means.
4. Exhibit critical thinking and problem solving skills in building real time applications.
5. Present a report on work experience and skill sets acquired.
COURSE OUTCOMES:
Student should be able to
COURSE OUTCOMES:
Student should be able to
TEXT BOOKS:
1. Stephen. C. Levenson, 1983, Pragmatics, Cambridge University press.
REFERENCES:
1.Austin, J.L., How to do things with word, Oxford Clarendon Press. Grice, P. 1989.
2. Studies in the way of words. Cambridge, M.A: Harvard University Press.
3. Chomsky, N.1966. Aspects of the theory of syntax, The MIT press, Cambridge.
4. Chomsky, N.2006. Language and Mind, Cambridge University Press.
5. Hymes. D.N. 1972, On communication competence in J.B. Pride and J. Holmes (ed), Sociolinguistics, pp
269-293, London Penguin.
6. Gilbert, H. Harman, 1976. Psychological aspect of the theory of syntax in Journal of Philosophy, page75-
87.
7. Stangley, J. 2007. Language inContext. Clarendon press, Oxford.
8. Shannon, 1942. A Mathematical Theory of Communication.
9. Searle, J.R. 1969. Speech acts: An essay in the philosophy of language. Cambridge: Cambridge
University Press.
COURSE OUTCOMES:
Upon successful completion of the course, students will be able to
CO1: To improve their communicative competency across all skills of language.
CO2: To improve their writing ability in writing for persuasion and convincing someone.
CO3: To attend job interviews more confidently,
CO4: To improve social communication sensitive to gender and other prejudices.
CO5: To do better in the spoken component of the placement tasks
Program Outcomes
COs PO1 PO1
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
1 2
CO1 2 3 2
CO2 2 3 2
CO3 2 3 2
CO4 2 3 2
CO5 2 3 2
OBJECTIVES:
• To introduce the students to Linguistics (the scientific study of language).
• To explore some basic issues and questions related to language such as what do we know when we
know a language, the relation between language and brain, language and society, how does a child learn
a language, how the languages of the world are similar as well as different, how can we analyze
language as a structure etc.
• To provide students to a brief outline of language studies in Indian and western tradition and many
applications of linguistics in different fields
UNIT IV APPLICATIONS 9
• Applications of Linguistics
• Natural Language Processing
• Clinical Linguistics
• Psycholinguistics etc.
REFERENCES:
1. Thomas Herbst, 'English Linguistics: A coursebook for students of English', De Gruyter Mouton
Publication, Germany: 2010.
2. Victoria A. Fromkin (ed.), Linguistics: An introduction to linguistic theory, Blackwell Publishers,
USA: 2001.
3. Jeff Connor - Linto and Ralph W Fasold, 'An Introduction to Language and Linguistics’, Cambridge
University Press, 2014.
COURSE OUTCOMES:
Upon successful completion of the course, students will be able to
CO1: understand what is linguistics
CO2: explore some basic issues and questions related to language
CO3: understand the subtle difference between the use of English in Indian and western tradition.
CO4: Familiarize themselves with the unique features of language in technology
CO5: Understand the basics of how children acquire languages
Program Outcomes
COs P
PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
O1
CO1 2 3 2
CO2 2 3 2
CO3 2 3 2
CO4 2 3 2
CO5 2 3 2
TEXT BOOKS:
1. Jim Piper, ‘The Film Appreciation Book’: The Film Course You Always Wanted to Take, Allworth
Press, New York: 2014.
REFERENCES:
1. Stanley Cavell, ‘The World Viewed: Reflections on the Ontology of Film, Enlarged Edition’, Harvard
University Press, 1979.
2. Joseph M. Boggs, Dennis W. Petrie, ‘The Art of Watching Films’, McGraw – Hill, 2006.
3. Bernard F. Dick, ‘Anatomy of Film’, St. Martins Press, 1990.
4. Understanding the Film: An Introduction to Film Appreciation by Jan Bone and Ron Johnson
COURSE OUTCOMES:
Upon successful completion of the course, students will be able to
CO1: the process of the development of film as an art and entertainment form.
CO2: the evolution of the language of cinema as it evolved over a century.
CO3: the script writing techniques of a film and appreciate the various nuances
CO4: the evolution of film industry from the past to present
CO5: how to appreciate all aspects of the film.
Program Outcomes
COs
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 3 2
CO2 2 3 2
CO3 2 3 2
CO4 2 3 2
CO5 2 3 2
OBJECTIVES:
The objectives of this course are to make students:
• aware of human relations at work its relationship with self.
• aware about the processes involved in interaction with people at work.
• understand the importance of psychological and physical health in maintaining human relations at work
and progressing in career.
• Understand the ways and means to improve human relations at work.
• Realize the importance of safeguarding themselves from any exploitation.
REFERENCES:
1. Greenberg, J. S. (2017). Comprehensive stress management (14th edition). New York: McGraw Hill.
2. Udai, Y. (2015). Yogasanaurpranayam. New Delhi: N.S. Publications.
COURSE OUTCOMES:
Upon successful completion of the course, students will be able to
CO1: will enhance their awareness about human relations at work and its relationship with self
CO2: become aware of the processes involved in interaction with people at work
CO3: understand the importance of psychological and physical health in maintaining human relations at
work.
CO4: will be able to understand the ways and means to improve human relations at work.
CO5: will realize the importance of safeguarding themselves from any exploitation.
Program Outcomes
COs
PO
PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
1
CO1 2 2 3 2 2
CO2 2 2 3 2 2
CO3 2 2 3 2 2
CO4 2 2 3 2 2
CO5 2 2 3 2 2
OBJECTIVES:
The objectives of this course are to make students:
• aware of the different applications of psychology to everyday issues of life,
• aware of the different social issues, workplace issues, and behavioural issues, and
• understand how the knowledge gained from this course can be used in their own personal and professional
work life.
• Understand the psychological principles relevant to human development.
• Understand the impact of Psychology on human life
Program Outcomes
COs
PO PO PO PO1
PO2 PO5 PO6 PO7 PO8 PO9 PO10 PO12
1 3 4 1
CO1 2 2 3 2 2
CO2 2 2 3 2 2
CO3 2 2 3 2 2
CO4 2 2 3 2 2
CO5 2 2 3 2 2
Course Code Course Title L T P C
UNDERSTANDING SOCIETY AND CULTURE
UEN2243 2 0 2 3
THROUGH LITERATURE
OBJECTIVES:
• To acquire skills not only the ones necessary for one’s “trade”, but also the ones to acquire knowledge
and become a better human being, as a means towards the end of creating a better society.
• To facilitate understanding a society, its people, their mind, prevalent traditions and culture with a view
to developing a holistic worldview, which is essential for a sustainable society.
• To introduce students to literary works of various countries/ regions / societies and attempt to understand
the respective traditions to which the works belong.
• To understand the relationship between life and literature
UNIT I LITERATURE AND LIFE 9
Traditional Knowledge.
• what is Literature?
• Significance of studying literature,
• Studying society and culture through literature,
• Understanding morality through literature.
• Reading of Literary texts –The literary piece will be given to students before hand so that they read it
and become familiar with the texts before coming to the class. In the class, the text will be read once
again, where doubts if any will be cleared.
• First Discussion – The reading will be followed by a discussion where the text will be analyzed in
detail. The students will been couraged to share their interpretation of the text.
UNIT V READINGS 9
Submission of a report–Having faced questions from their classmates, and after having a second
discussion on the text, the student would come across new ideas which will be in corporated in to the
analysis and submitted in the form of a report.
TOTAL HOURS: 45
TEXT BOOKS:
1. Literary works will be provided by the teacher. Author’s Background,
2. Historical and Social Background which are significant for a better understanding of the work will be
provided by the teacher.
REFERENCE:
Reference materials or other significant study material as required for an overall understanding of the
literary work will be sourced out by the students in consultation with the teacher
COURSE OUTCOMES:
Upon successful completion of the course, students will be able to
CO1:Improve their awareness of various traditions.
CO2: Not only understand the diversity found between various traditions but also celebrate them.
CO3:Strengthen their analytical capability.
CO4: Improve their language skills and ability of expressing complex ideas.
CO5: understand the relationship between life and literature
Program Outcomes
COs
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 3 2
CO2 2 3 2
CO3 2 3 2
CO4 2 3 2
CO5 2 3 2
MANAGEMENT ELECTIVES
OBJECTIVES:
To impart knowledge about the following topics:
• Sketch the Evolution of Management.
• Extract the functions and principles of management.
• Learn the application of the principles in an organization.
• Study the various HR related activities.
• Analyze the position of self and company goals towards business
UNIT II PLANNING 9
Nature and purpose of planning – Planning process – Types of planning – Objectives – Setting objectives
– Policies – Planning premises – Strategic Management – Planning Tools and Techniques – Decision
making steps and process.
UNIT IV DIRECTING 9
Foundations of individual and group behaviour– Motivation – Motivation theories – Motivational techniques
– Job satisfaction – Job enrichment – Leadership – types and theories of leadership – Communication –
Process of communication – Barrier in communication – Effective communication – Communication and IT.
UNIT V CONTROLLING 9
System and process of controlling – Budgetary and non - Budgetary control techniques – Use of computers
and IT in Management control – Productivity problems and management – Control and performance – Direct
and preventive control – Reporting
TOTAL HOURS: 45
TEXT BOOKS:
1. Harold Koontz and Heinz Weihrich “Essentials of Management”, Tata McGraw Hill, 1998.
2. Stephen P. Robbins and Mary Coulter, “Management”, Prentice Hall (India)Pvt. Ltd., 10th Edition,
2009.
REFERENCES:
1. Robert Kreitner and Mamata Mohapatra, “ Management”, Biztantra, 2008.
2. Stephen A. Robbins and David A. Decenzo and Mary Coulter, “Fundamentals of Management”, Pearson
Education, 7th Edition, 2011.
3. Tripathy PC and Reddy PN, “Principles of Management”, Tata McGraw Hill, 1999.
COURSE OUTCOMES:
Upon successful completion of the course, students will be able to
CO1: Upon completion of the course, students will be able to have clear understanding of managerial
functions like planning, organizing, staffing, leading & controlling.
CO2: Have same basic knowledge on international aspect of management.
CO3: Ability to understand management concept of organizing.
CO4: Ability to understand management concept of directing.
CO5: Ability to understand management concept of controlling.
Program Outcomes
Course
Outcomes PO1 PO PO PO PO PO PO PO PO PO1 PO1 PO1
2 3 4 5 6 7 8 9 0 1 2
CO1 2 1
CO2 2 3 1
CO3 2 2 1
CO4 3 2 2 1
CO5 1 1
COURSE CODE COURSE TITLE L T P C
OBJECTIVES:
To impart knowledge about the following topics:
• Teach the need for quality, its evolution, basic concepts, contribution of quality gurus, TQM
framework, Barriers and Benefits of TQM.
• Explain the TQM Principles for application.
• Define the basics of Six Sigma and apply Traditional tools, New tools, Benchmarking and FMEA.
• Describe Taguchi's Quality Loss Function, Performance Measures and apply Techniques like QFD,
TPM, COQ and BPR.
• Illustrate and apply QMS and EMS in any organization.
UNIT I INTRODUCTION 9
Introduction - Need for quality - Evolution of quality - Definition of quality - Dimensions of product and
service quality –Definition of TQM-- Basic concepts of TQM –-Gurus of TQM (Brief introduction)-- TQM
Framework- Barriers to TQM –Benefits of TQM.
TOTAL HOURS: 45
TEXT BOOKS:
1. Dale H.Besterfiled, Carol B.Michna,Glen H. Bester field,Mary B.Sacre, Hemant Urdhwareshe and
Rashmi Urdhwareshe, “Total Quality Management”, Pearson Education Asia, Revised Third Edition,
Indian Reprint, Sixth Impression,2013.
REFERENCES:
1. Joel.E. Ross, “Total Quality Management – Text and Cases”,Routledge.,2017.
2. Kiran.D.R, “Total Quality Management: Key concepts and case studies, Butterworth –Heinemann Ltd,
2016.
3. Oakland, J.S. “TQM – Text with Cases”, Butterworth – Heinemann Ltd., Oxford, Third Edition,2003.
4. Suganthi,L and Anand Samuel, “Total Quality Management”, Prentice Hall (India) Pvt. Ltd., 2006
COURSE OUTCOMES:
Upon successful completion of the course, students will be able to
CO1: Ability to apply TQM concepts in a selected enterprise.
CO2: Ability to apply TQM principles in a selected enterprise.
CO3: Ability to understand Six Sigma and apply Traditional tools, New tools, Benchmarking and FMEA.
CO4: Ability to understand Taguchi's Quality Loss Function, Performance Measures and apply QFD, TPM,
COQ and BPR.
CO5: Ability to apply QMS and EMS in any organization.
Program Outcomes
Course
Outcomes PO1 PO PO PO PO PO PO PO PO PO PO PO
2 3 4 5 6 7 8 9 10 11 12
CO1 3 2 1 1 1
CO2 3 2 1 1
CO3 2 3 1 1 1
CO4 3 1 1 1 1
CO5 3 2 1 1 1
OBJECTIVES:
To impart knowledge about the following topics:
• To impart the value of professional practices with code of conduct and ethical values
• Discuss the various outlooks of roles and responsibilities with work ethics.
• Introduce the Indian constitutional statutes for ethical practices by citizens
• Analyze the ethical commitments to be hold by industry with protecting environment
• Insist on corporate and social responsibilities through Governance practices and regulation
UNIT I INTRODUCTION 9
Ethics - Definition & nature, Characteristics, Attributes of Ethics - Business Ethics; Ethical theories; Causes
of unethical behavior; Ethical abuses; Work ethics; Code of conduct; Public good.
COURSE OUTCOMES:
Upon successful completion of the course, students will be able to
CO1: Understand ethical issues in workplace and have good practices in professional duties.
CO2: Learn roles and responsibilities in professional career as a team worker
CO3: Understand the legal aspects in Indian constitutional for protection of societal values
CO4:Analyze the economical development by industry with importance to environment protection.
CO5: Understand need of good Governance in a corporate with ethical organizational behavior.
Program Outcomes
Course
Outcomes PO1 PO PO PO PO PO PO PO PO PO PO PO
2 3 4 5 6 7 8 9 10 11 12
CO1 3 1 1 2
CO2 3 1 1 2
CO3 3 2 3 1 1 2
CO4 2 3 1 1 3 2
CO5 3 1 1 2 2
PROFESSIONAL ELECTIVES
OBJECTIVES:
The objective of this course is to enable the students
● To learn fundamentals of random variables
● To learn Shannon and Renyi entropy
● To understand error control coding
● To apply information theory in the fields of coding, image processing, and machine learning
COURSE OUTCOMES:
On successful completion of this course, the students should be able to
1. Explain and estimate information theory metrics, entropy, and cross entropy.
2. Design an application with error control.
3. Apply entropy as a cost function in image processing and machine learning algorithms.
4. Make use of MEE in small applications.
COs POs PSOs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 3 1 1 3
CO2 3 1 2 3
CO3 3 1 2 3
CO4 3 2 1 3 3
OBJECTIVES:
The objective of this course is to enable the students
● Apply basic concepts of mathematics to formulate an optimization problem
● To find the optimal solution of an optimization problem.
● To understand the importance of optimization for a defined process management.
● Analyse the of performance measures for various optimization problems
● To graphically display interdependent relationships between groups’ steps and tasks as they all
impact a project.
REFERENCES:
1. Dimitri Bertsekas, "Nonlinear Programming" Athena Scientific, Second Edition, 1999.
2. Dimitri Bertsekas, "Introduction to linear optimization" Athena Scientific, Second Edition, 1997.
3. Philip E Gill, “Practical optimization”, Emerald Group Publishing Limited, 1982.
4. Ravindran A and Reklaits G V, “Engineering optimization methods and applications”, Second
Edition, Wiley, 2006.
5. Daniel N Wilke and Jan Snyman, “Practical Mathematical Optimization: Basic Optimization
Theory and Gradient-Based Algorithms”, Second Edition, Springer, 2018
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
1. Explain efficient computational procedures to solve optimization problems.
2. Apply engineering minima/maxima problems into optimization framework.
3. Apply the concept of Dynamic programming and its applications to project implementation.
4. Formulate optimization problems for bio inspired algorithm.
OBJECTIVES:
The objective of this course is to enable the students
• To understand data warehouse concepts, architecture, business analysis and tools
• To understand data pre-processing and data visualization techniques
• To study algorithms for finding hidden and interesting patterns in data
• To understand and apply various classification and clustering techniques using tools.
UNIT V CLUSTERING 9
Clustering Techniques – Cluster analysis-Partitioning Methods - Hierarchical Methods – Density Based
Methods - Grid Based Methods – Evaluation of clustering – Clustering high dimensional data- Clustering
with constraints, Outlier analysis-outlier detection methods - Clustering real time data sets using WEKA / R.
TOTAL: 45 HOURS
TEXTBOOK:
1. Jiawei Han and Micheline Kamber, ―Data Mining Concepts and Techniques, Third Edition,
Elsevier, 2012.
REFERENCES:
1. Alex Berson and Stephen J.Smith, ―Data Warehousing, Data Mining & OLAP‖, Tata McGraw –
Hill Edition, 35th Reprint 2016.
2. K.P. Soman, Shyam Diwakar and V. Ajay, ―Insight into Data Mining Theory and Practice, Eastern
Economy Edition, Prentice Hall of India, 2006.
3. Ian H.Witten and Eibe Frank, ―Data Mining: Practical Machine Learning Tools and Techniques,
Elsevier, Second Edition.
COURSE OUTCOMES:
Upon completion of the course, the students should be able to
1. Design a Data warehouse system and perform business analysis with OLAP tools.
2. Apply suitable pre-processing and visualization techniques for data analysis.
3. Apply frequent pattern and association rule mining techniques for data analysis.
4. Apply appropriate classification and clustering techniques for data analysis.
OBJECTIVES:
The primary objective of the course is to understand
• the security basics and how it is applied to the Cyber landscape
• the cause of various attacks and possible ways available to mitigate them
• the different ways of injecting malicious code
• the functioning of different tools
• the concepts of intrusion detection and prevention system.
UNIT I CYBER SECURITY FUNDAMENTALS 9
Threats, attacks, vulnerability, CIA triad, Authentication, Authorization, Non-repudiation, Privacy, Basic
Cryptography, Symmetric Encryption, Public key Encryption, Attacker Techniques: How attackers cover
their tracks, Tunneling Techniques, Phishing, Smishing, Vishing, and Mobile Malicious Code, Rogue
Antivirus, Click Fraud, Case study- Cyber Crimes
UNIT II EXPLOITATIONTECHNIQUES 9
Shellcode, Integer Overflow Vulnerabilities, Stack-Based Buffer Overflows, Stacks upon Stacks, Buffer
Overflows, Protecting against overflows, Format String Vulnerabilities, SQL Injection, Protecting against
SQL Injection, Malicious PDF Files, PDF File Format, Creating Malicious PDF Files, Reducing the Risks
of Malicious PDF Files, Race Conditions, Detecting and Preventing Race conditions, Web Exploit Tools,
Updates, Statistics, and Administration, Proliferation of Web Exploit Tools, DoS Conditions, Brute Force and
Dictionary Attacks, Misdirection, Reconnaissance, and Disruption, Cross-Site Scripting (XSS) Social
Engineering, DNS Amplification Attacks.
TOTAL: 45 HOURS
TEXT BOOKS:
1. James Graham, Richard Howard and Ryan Olson, Cyber Security Essentials, CRC Press, USA,
2011.
2. Michael E Whitman and Herbert J Mattord, “Principles of Information Security”, Sixth Edition,
Cengage Learning, 2017.
REFERENCES:
1. Charles P. Pfleeger and Shari Lawrence Pfleeger, Analyzing Computer Security – A
threat/vulnerability / Counter measure approach, Pearson, New Delhi, 2014.
2. The Art of Deception by Kevin Mitnick. (Mitnick, Kevin D. and William L. Simon; The Art of
Deception. 2002. © Wiley–VCH Verlag GmbH & Co. KGaA.
3. Cyber Security and Its Ten domain : https://www.coursera.org/learn/cyber-security-domain
4. Introduction to cybersecurity tools & cyber attacks: https://www.coursera.org/learn/introduction-
cybersecurity-cyber-attacks
5. The Foundations of Cybersecurity:https://www.coursera.org/learn/foundations-cybersecurity
6. The GRC Approach to Managing Cybersecurity: https://www.coursera.org/learn/grc-approach-to-
managing-cybersecurity
7. Managing Cybersecurity Incidents and Disasters: https://www.coursera.org/learn/managing-
8. cybersecurity-incidents-and-disasters Road to the CISO – Culminating Project Course:
https://www.coursera.org/learn/road-to-ciso#syllabus
9. Managing cybersecurity specialization: https://www.coursera.org/specializations/managing-
cybersecurity
COURSE OUTCOMES:
After successful completion of this course, the students should be able to
1. Understand and apply the basics of cyber security
2. Recognize different exploitation techniques
3. Identify various security attacks and select appropriate security mechanisms
4. Explore various defense and vulnerability analysis tools
OBJECTIVES:
The objective of this course is to enable the students
● To be familiar with the fundamentals of various sensors, and actuators.
● To introduce MEMS Sensors and Actuators.
● To learn interfacing methods and circuits
● To learn interfacing of sensors and actuators with microprocessor
UNIT V INTERFACING 9
Amplifiers, Power Amplifiers, A/D and D/A Converters, Bridge Circuits, Data Transmission, Excitation
Methods and Circuits, Interfacing to microprocessor – signal level – impedance – signal conditioning –
errors
TOTAL: 45 HOURS
TEXT BOOKS:
1. Nathan Ida, “Sensors, Actuators and Their Interfaces”, Scitech Publishing, 2014
REFERENCES:
1. Hiroto Yasuura, Chong-Min Kyung, Yongpan Liu, Youn-Long Lin, “Smart Sensors at the
IoTFrontier”, Springer, 2017.
2. Clarence W de Silva, “Sensors And Actuators”, CRC press, 2016.
COURSE OUTCOMES:
On successful completion of this course, the students should be able to
1. Understand a given sensor
2. Choose an appropriate sensor and actuator for the given requirement.
3. Make use of interfacing circuits to interface with the sensors and actuators.
4. Demonstrate a full stack development using various sensors, actuators, interfacing circuits and
microcontrollers.
OBJECTIVES:
• Understand software architectural requirements and drivers.
• Be exposed to architectural styles and views.
• Be familiar with architectures with emerging technologies.
REFERENCES:
1. Paul Clements, Rick Kazman and Mark Klein, “Evaluating Software architectures: Methods and case
studies, Addison-Weseley, 2001.
2. Paul Clements, Felix Bachmann, Len Bass, Paulo Merson, “Documenting Software Architectures,
Views and Beyond”, 2nd Edition, Addison-Weseley, 2010.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Explain influence of software architecture on business and technical activities.
2. Identify key architectural styles.
3. Use styles and views to specify architecture.
4. Design document for a given architecture.
OBJECTIVES:
The objective of this course is to enable the students to:
• Understand the structure of basic electronic devices.
• Be exposed to active and passive circuit elements.
• Familiarize the operation and applications of transistor like BJT and FET.
• Explore the characteristics of amplifier gain and frequency response.
• Learn the required functionality of positive and negative feedback systems.
TOTAL: 45 HOURS
TEXTBOOKS:
1. David A. Bell, ”Electronic devices and circuits”, Oxford University higher education, 5thEdition 2008.
2. Sedra and smith, “Microelectronic circuits”, 7th Ed., Oxford University Press.
REFERENCES:
1. Balbir Kumar, Shail.B.Jain, “Electronic devices and circuits” PHI learning private limited, 2nd2014.
2. Thomas L.Floyd, “Electronic devices” Conventional current version, Pearson prentice hall,
10thEdition, 2017.
3. Donald A Neamen, “Electronic Circuit Analysis and Design” Tata McGraw Hill, 3rd Edition, 2003.
4. Robert L.Boylestad, “Electronic devices and circuit theory”, 2002.
COURSE OUTCOMES:
Upon Successful Completion of this course, the students should be able to:
1. Explain the structure and working operation of basic electronic devices.
2. Able to identify and differentiate both active and passive elements.
3. Analyse the characteristics of different amplifiers in high frequency.
4. Choose and adapt the required components to construct an amplifier circuit.
5. Employ the acquired knowledge in design and analysis of oscillators.
COs POs PSOs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 2 2 1 2 1 1
CO2 2 2 1 1 2 1 1
CO3 2 2 1 1 2 1 1
CO4 2 2 1 1 2 1 1
CO5 3 2 1 1 2 1 1
OBJECTIVES:
The objective of this course is to enable the students:
● To understand signals and linear systems
● To learn Fourier and wavelet analysis
● To understand integral transforms
● To apply transforms to solve the problems related to IT
COURSE OUTCOMES:
At the end of the course, the students should be able to
1. Define various types of continuous and discrete-time signals and systems, and to perform the
basic operations on the given signal
2. Estimate the frequency content of a given signal using Fourier transform
3. Apply wavelet transform to perform compression
4. Understand a given new transform using the integral transform generalization
OBJECTIVES:
The objective of this course is to enable the students to
● Learn the features of some of the advanced artificial intelligence techniques.
● Understand the fundamental concepts, strengths, weaknesses and appropriateness of advanced AI
techniques.
● Know about the ideas of advanced AI techniques in solving real world problems.
UNIT I PLANNING 6
Classic planning, planning as state-space search, planning graphs, hierarchical planning, planning and acting
in non-deterministic domains, multiagent planning
UNIT V PERCEPTION 6
Image formation, image processing operations, object recognition by appearance, reconstructing the 3D
world, object recognition from structural information
THEORY: 30 HOURS
LAB COMPONENT:
LIST OF EXPERIMENTS:
1. Implementation of Object recognition.
2. Implementation of text classification.
3. Implementation of language models.
4. Implementation of machine translation.
5. Implementation of different image processing operations.
6. Implementation of sequential decision problem.
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXT BOOKS
1. Russell, Stuart J., and Peter Norvig. "Artificial intelligence: a modern approach." Pearson Education
Limited, 2016.
REFERENCE BOOKS
1. Richard S. Sutton and Andrew G. Barto, “Reinforcement Learning: An Introduction”, MIT Press,
2nd edition, 2018.
COURSE OUTCOMES:
On successful completion of this course, the students should be able to
1. Describe the features of some of the advanced artificial intelligence techniques.
2. Understand the fundamental concepts, strengths, weaknesses and appropriateness of advanced AI
techniques.
3. Understand about the NLP and language models.
4. Learn about the different concepts related to perception.
5. Apply ideas of advanced AI techniques in solving real world problems
OBJECTIVES:
The student should be made to:
• Be exposed with the basic rudiments of business analytics.
• Understand the modelling aspects behind Business Intelligence.
• Understand about the business forecasting.
• Learn about the HR and supply chain analytics.
• Learn about the marketing and sales analytics.
THEORY: 30 HOURS
LAB COMPONET:
LIST OF EXPERIMENTS:
1. Introduction to SPSS, Sorting File, Split File, Compute File, Recode File and Select Cases.
2. Chi- Square Test (Parametric and Non-Parametric Test).
3. Exploratory Factor Analysis.
4. Cluster analysis
5. Logical regression.
6. Discriminant analysis.
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXT BOOKS:
1. Efraim Turban, Ramesh Sharda, Dursun Delen, “Decision Support and Business Intelligence
Systems”, 9th Edition, Pearson 2013.
2. R. Evans James, Business Analytics, 2017.
3. R N Prasad, Seema Acharya, Fundamentals of Business Analytics, 2016.
4. Philip Kotler and Kevin Keller, Marketing Management, 15th edition, PHI, 2016
5. VSP RAO, Human Resource Management, 3rd Edition, Excel Books, 2010.
6. Mahadevan B, “Operations Management -Theory and Practice”, 3rd Edition, Pearson
Education,2018.
REFERENCES:
1. Larissa T. Moss, S. Atre, “Business Intelligence Roadmap: The Complete Project Lifecycle of
Decision Making”, Addison Wesley, 2003.
2. Carlo Vercellis, “Business Intelligence: Data Mining and Optimization for Decision Making”, Wiley
Publications, 2009.
3. David Loshin Morgan, Kaufman, “Business Intelligence: The Savvy Manager‟s Guide”, Second
Edition, 2012.
4. Cindi Howson, “Successful Business Intelligence: Secrets to Making BI a Killer App”, McGraw-
Hill, 2007.
5. Ralph Kimball, Margy Ross, Warren Thornthwaite, Joy Mundy, Bob Becker, “The Data Warehouse
Lifecycle Toolkit”, Wiley Publication Inc.,2007
COURSE OUTCOMES:
At the end of the course, the students will be able to
1. Explain the fundamentals of business intelligence.
2. Apply various modelling techniques in business intelligence.
3. Explain the data analysis and knowledge delivery stages.
4. Perform business forecasting.
5. Apply business intelligence tools appropriate for various situations.
COs POs PSOs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 2 1 2
CO2 2 2 1 2 2 1 2
CO3 2 1 2
CO4 2 2 1 2 2 2 2 2 1 2 2
CO5 2 2 1 2 2 2 2 2 1 2 2
OBJECTIVES:
The objective of this course is to enable the students
• Understand the basic tenets of software quality and quality factors.
• Understand of how the SQA components can be integrated into the project life cycle.
• Be familiar with the software quality infrastructure and management.
• To learn the software quality assurance, metrics, defect prevention techniques
• To learn the techniques for quality assurance and applying for applications.
TOTAL: 45 HOURS
REFERENCES:
1. Software Testing and Quality Assurance-Theory and Practice, Kshirasagar Nak Priyadarshi
Tripathy, John Wiley & Sons Inc,2008
2. Daniel Galin, “Software Quality Assurance”, Pearson Publication, 2009.
3. Software Quality Engineering: Testing, Quality Assurance, and Quantifiable Improvement, Jeff
Tian, John Wiley & Sons, Inc., Hoboken, New Jersey. 2005.
4. Software Quality Assurance - From Theory to Implementation, Daniel Galin, Pearson Education
Ltd UK, 2004
5. Software Quality Assurance, Milind Limaye, TMH, New Delhi, 2011
COURSE OUTCOMES:
On successful completion of this course, the students should be able to
1. Understand the elements of Software Quality Assurance.
2. Demonstrate their capability to adopt quality standards.
3. Apply the concepts in preparing the quality plan & documents.
4. Identify defect prevention techniques and software quality assurance metrics.
5. Apply techniques of quality assurance for typical applications.
OBJECTIVES:
The objective of this course is to enable the students to
• Understand the basics of blockchain technology.
• Study the technologies behind cryptocurrencies.
• Learn how consensus algorithms are used in blockchain technology.
• Understand the Ethereum based blockchain networks.
• Acquire knowledge on trends and different applications of blockchain technology.
UNIT I INTRODUCTION 9
Basic Cryptographic primitives used in Blockchain - a short overview of Hashing, signature schemes,
encryption schemes and elliptic curve cryptography Secure, Collision-resistant hash functions, public key
cryptosystems, zero-knowledge proof systems. Need for Distributed Record Keeping, Modelling faults and
adversaries, Byzantine Generals problem, Consensus algorithms and their scalability problems, Why
Nakamoto Came up with Blockchain based cryptocurrency?
TOTAL: 45 HOURS
TEXT BOOKS:
1. S. Shukla, M. Dhawan, S. Sharma, S. Venkatesan, Blockchain Technology: Cryptocurrency and
Applications, Oxford University Press 2019.
REFERENCES:
1. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Gold Feder, Bitcoin
and cryptocurrency technologies: a comprehensive introduction. Princeton University Press, 2016.
2. Joseph Bonneau et.al, Research perspectives and challenges for Bitcoin and cryptocurrency IEEE
Symposium on security and Privacy, 2015
3. J.A. Garay et al, The bitcoin backbone protocol -analysis and applications EUROCRYPT, LNCS
Vol. 9057, (Vol II), pp 281-310,2015
4. R. Pass et al, Analysis of Blockchain protocol in Asynchronous networks, EUROCRYPT 2017
5. Josh Thompson Blockchain: The Blockchain for Beginnings, Guild to Blockchain Technology and
Blockchain Programming’, Create Space Independent Publishing Platform, 2017
COURSE OUTCOMES:
On successful completion of this course, the students should be able to
1. Define and explain the fundamentals of Blockchain.
2. Illustrate the technologies of blockchain.
3. Describe the models of blockchain.
4. Analyse and demonstrate the Ethereum.
OBJECTIVES:
The objective of this course is to enable the students
• To introduce the components and their representation of control systems
• To learn various methods for analyzing the time response, frequency response and stability of the
systems.
• To learn the various approach for the state variable analysis.
TOTAL: 45 HOURS
TEXTBOOKS:
1. M. Gopal, Control System – Principles and Design‖, Tata McGraw Hill, 4th Edition, 2012.
REFERENCES
1. J. Nagrath and M. Gopal, Control System Engineering‖, New Age International Publishers, 5 th
Edition, 2007.
2. K. Ogata, Modern Control Engineering, 5th edition, PHI, 2012.
3. S. K. Bhattacharya, Control System Engineering, 3rd Edition, Pearson, 2013.
4. Benjamin C. Kuo, Automatic control systems‖, Prentice Hall of India, 7th Edition,1995.
COURSE OUTCOMES:
On successful completion of this course, the students should be able to
1. Identify the various control system components and their representations.
2. Analyze the various time domain parameters and different types of control systems..
3. Analysis the various frequency response plots for analyzing the system.
4. Apply the concepts of various system stability criterions.
5. Design various
6. s transfer functions of digital control system using state variable models.
OBJECTIVES:
• To understand the concept of virtual reality and augmented reality
• To study visual computation in virtual reality
• To provide an opportunity to explore the research issues in Augmented Reality and Virtual Reality
(AR &VR).
• To know the basic concepts and framework of virtual reality.
TOTAL: 45 HOURS
TEXTBOOK:
1. Burdea, G. C. and P. Coffet. Virtual Reality Technology, Second Edition. Wiley-IEEE Press,
2003/2006.
2. Alan B. Crai`g, Understanding Augmented Reality, Concepts and Applications, Morgan Kaufmann,
2013.
REFERENCES:
1. Alan Craig, William Sherman and Jeffrey Will, Developing Virtual Reality Applications,
Foundations of Effective Design, Morgan Kaufmann, 2009.
COURSE OUTCOMES:
Upon completion of this course, the students will be able to:
1. Describe the concept of virtual reality and augmented reality.
2. Have an idea of VR and AR tools
3. Apply VR and AR concepts in real world applications.
THEORY: 30 HOURS
LAB COMPONENT:
LIST OF EXPERIMENTS:
1. Image caption Generator using CNN and LSTM.
2. Text to image synthesis using GAN.
3. Visualization of filters and feature maps in Convolution Neural Network.
4. Image classification using CNN.
5. Pre-trained CNN models for feature extraction.
6. Pre-trained CNN models for feature extraction.
PRACTICAL: 30 HOURS
TOTAL: 60HOURS
TEXT BOOK:
1. Ian Goodfellow, Yoshua Bengio, Aaron Courville, "Deep Learning”, MIT Press, 2016.
REFERENCES:
1. Josh Patterson, Adam Gibson, "Deep Learning: A Practitioner’s Approach”, O’Reilly Media,
2017.
2. Tom Mitchell, “Machine Learning”, McGraw Hill, 3rd Edition,1997.
3. Francois Chollet, “Deep Learning with Python”, Manning, 2018.
4. Charu C. Aggarwal, Neural Networks and Deep Learning: A Textbook, Springer, 2018.
5. Umberto Michelucci, Applied Deep Learning: A Case-Based Approach to Understanding Deep
Neural Networks, Apress, 2018.
COURSE OUTCOMES:
After completing this course, the student should be able to
1. Explain Deep Learning algorithms and their limitations
2. Apply Deep Learning algorithms in practice.
3. Apply CNN for different applications.
4. Perform sequence modelling using recurrent nets.
5. Apply unsupervised and deep reinforcement learning
OBJECTIVES:
The objective of this course is to enable the students to
● Learn the natural phenomena that motivate the bio-inspired algorithms.
● Understand the fundamental concepts, strengths, weaknesses and appropriateness of nature-
inspired algorithms.
● Study nature-inspired algorithms to optimization, design and learning problems.
UNIT I INTRODUCTION 6
Nature-based computing – three branches; General concepts – individuals, entities and agents, parallelism and
distributivity, adaptation, self-organization, bottom-up vs. top-down, determinism, chaos and fractals.
UNIT V IMMUNOCOMPUTING 9
Immune system – physiology, components, adaptive immune response; Artificial immune response –
immune algorithms; Bone marrow models; Negative selection algorithms; Artificial immune networks.
THEORY: 30 HOURS
LAB COMPONENT:
LIST OF EXPERIMENTS:
1. Implement classical optimization algorithms
2. Application of genetic algorithm - e.g., route navigation
3. Application of ant colony optimization - e.g., scheduling
4. Application of particle swarm optimization - e.g., prediction of pollution level
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXT BOOK
1. Leandro Nunes de Castro, " Fundamentals of Natural Computing, Basic Concepts, Algorithms and
Applications", Chapman & Hall/ CRC, Taylor and Francis Group, 2007
REFERENCE BOOKS
1. M. Wahde, “Biologically Inspired Optimization Methods: An Introduction”, WIT Press, 2008
2. Xin She-Yang, “Nature Inspired Optimization Algorithms”, Elsevier, 2014
COURSE OUTCOMES:
On successful completion of this course, the students should be able to:
1. Describe the natural phenomena that motivate the bio-inspired algorithms.
2. Understand the fundamental concepts, strengths, weaknesses and appropriateness of nature-
inspired algorithms.
3. Apply nature-inspired algorithms to optimization, design and learning problems.
OBJECTIVES:
• To understand about big data.
• To learn and use NoSQL big data management.
• To learn map-reduce analytics using Hadoop and related tools.
• To understand the usage of Hadoop related tools for Big Data Analytics.
LAB COMPONENT:
LIST OF EXPERIMENTS:
1. Installation of Hadoop.
2. File Management tasks in Hadoop.
3. Word Count Map program.
4. Program to analyse Time-Temperature statistics and generate report with maximum/minimum
temperature.
5. Implementation of matrix multiplication with Hadoop Map Reduce.
6. Pig Latin scripts to sort, group, join, project and filter the data.
7. Hive databases, tables, views, functions and Indexes.
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXT BOOK:
1. Tom White, "Hadoop: The Definitive Guide", Third Edition, O'Reilley, 2012.
2. P. J. Sadalage and M. Fowler, "NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot
Persistence", Addison-Wesley Professional, 2012.
REFERENCES:
1. Michael Minelli, Michelle Chambers, and Ambiga Dhiraj, "Big Data, Big Analytics: Emerging Business
Intelligence and Analytic Trends for Today's Businesses", Wiley, 2013.
2. 4. Eric Sammer, "Hadoop Operations", O'Reilley, 2012.
3. E. Capriolo, D. Wampler, and J. Rutherglen, "Programming Hive", O'Reilley, 2012.
4. Lars George, "HBase: The Definitive Guide", O'Reilley, 2011.
5. Eben Hewitt, "Cassandra: The Definitive Guide", O'Reilley, 2010.
6. Alan Gates, "Programming Pig", O'Reilley, 2011.
COURSE OUTCOMES:
Upon Completion of the course, the students will be able to
1. Describe big data and use cases from selected business domains.
2. Explain NoSQL big data management.
3. Install, configure, and run Hadoop and HDFS to perform map-reduce analytics using Hadoop.
4. Use Hadoop related tools such as HBase, Cassandra, Pig, and Hive for big data analytics.
OBJECTIVES:
• To outline the need for Software Project Management
• To highlight different techniques for software cost estimation and activity planning.
REFERENCES:
1. Robert K. Wysocki “Effective Software Project Management” – Wiley Publication,2011.
2. Walker Royce: “Software Project Management”- Addison-Wesley, 1998.
3. Gopalaswamy Ramesh, “Managing Global Software Projects” – McGraw Hill Education (India),
Fourteenth Reprint 2013.
COURSE OUTCOMES:
At the end of the course the students will be able to
1. Understand Project Management principles while developing software.
2. Gain extensive knowledge about the basic project management concepts, framework and the
process models.
3. Obtain adequate knowledge about software process models and software effort estimation
techniques.
4. Estimate the risks involved in various project activities.
5. Define the checkpoints, project reporting structure, project progress and tracking mechanisms
using project management principles.
6. Learn staff selection process and the issues related to people management
OBJECTIVES:
• To introduce the basics of Information Privacy
• To make the learner aware of the globally used privacy principles and guidelines
• To make the learner understand various privacy risk, threats, violation and adopt privacy by
designing IT solutions
• To understand and apply privacy enhancing technologies.
UNIT I PRIVACY IN DIGITAL AGE 7
What is privacy?Nissenbaum’s Contextual Integrity, AlanWestin’s privacy states, Ryan Calo’s Harm
Dimensions, Sloove’s taxonomy-Privacy, security and data governance – The data life cycle- Online issues
in privacy- case study: Technology challenges for privacy.
TOTAL: 45HOURS
TEXTBOOKS:
1. An Introduction to Privacy for Technology Professionals,Executive EditorTravis D. Breaux
2. Strategic Privacy by Design R. Jason Cronk, CIPP/US, CIPM, CIPT, FIP
REFERENCES:
1. Privacy in Technology Standards and Practices for Engineers and Security and IT Professionals by
JC Cannon
2. Alessandro Acquisti, Leslie John, and George Loewenstein, “What Is Privacy Worth?” Carnegie
Mellon University- Heinz College, Heinz CMU, 2010, accessed July 5, 2018,
www.heinz.cmu.edu/~acquisti/papers/acquisti-ISRworth.pdf
COURSE OUTCOMES:
At the end of the course, the student should be able to:
1. Understand and apply the basics of cyber security
2. Recognize different exploitation techniques
3. Identify various security attacks and select appropriate security mechanisms
4. Explore various defense and vulnerability analysis tools
OBJECTIVES:
● To learn the fundamentals of software defined networks.
● To understand the separation of the data plane and the control plane.
● To study about the SDN Programming.
● To study about the various applications of SDN
UNIT I INTRODUCTION 9
Introduction to Software Defined Networking (SDN) – Modern Data Center – Traditional Switch
Architecture – Why SDN – Evolution of SDN – How SDN Works – Centralized and Distributed Control
and Data Planes: SDN Data plane, Control Plane, Application Plane.
TEXT BOOKS:
1. Paul Goransson and Chuck Black, ―Software Defined Networks: A Comprehensive Approach,
First Edition, Morgan Kaufmann, 2014.
2. Thomas D. Nadeau, Ken Gray, ―SDN: Software Defined Networks, O’Reilly Media, 2013.
REFERENCES:
1. Siamak Azodolmolky, ―Software Defined Networking with Open Flow, Packet Publishing,
2013.
2. Vivek Tiwari, ―SDN and Open Flow for Beginners‖, Amazon Digital Services, Inc., 2013.
3. Fei Hu, Editor, ―Network Innovation through Open Flow and SDN: Principles and Design, CRC
Press, 2014.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to:
1. Analyze the evolution of software defined networks
2. Express the various components of SDN and their uses
3. Explain the use of SDN in the current networking scenario
4. Design and develop various applications of SDN
OBJECIVES:
The objective of this course is to enable the students
• To learn about the fundamentals of camera engineering and cinematography.
• To understand the postproduction video editing.
• To know about audio mixing and engineering.
• To learn about animation and special effects.
• To learn about the different tools used for video editing.
UNIT V LABORATORY 6
Manual mode photography: indoor and outdoor – Analyze and create videos for different platforms, video
production using multi-channel audio - Video editing: Adobe Premier Pro, Final Cut Pro X – Audio editing:
Sound processing with Adobe Audition CC, mono, stereo and multi-track audio – Unity: making of 360-
degree video, interactive 360-degree video, Introducing immersion, augmented reality.
THEORY: 30 HOURS
LAB COMPONENT:
LIST OF EXPERIMENTS:
1. Study of different software tools used for post production video editing.
2. Study of different tools used in audio mixing.
3. Study of different tools used in animation and special effects.
4. Study of different video editing tools.
5. Study of different audio editing tools.
6. Experiments using Augmented Reality.
PRACTICAL: 30 HOURS
TOTAL 60HOURS
TEXT BOOKS:
1. Fundamentals of multimedia, Ze-Nian Li, Springer-Verlag New York, 2nd Edition, 2014
2. Introduction to digital audio coding standards, Marina Bosi, Richard E. Goldberg, Springer
International Series in Engineering and Computer Science, 2003 edition
REFERENCES:
1. Adobe Premier Pro CC Classroom in a book, MaxinJago, Adobe Press, 1st Edition
2. Adobe Audition CC Classroom in a book, Maxim Jago, Adobe Press, 2nd Edition
3. Unity in Action: Multiplatform Game Development in C# with Unity 5, Joseph Hocking, Hanning,
June 2015
COURSE OUTCOMES:
At the end of the course, the student should be able to:
1. To learn about the fundamentals of camera engineering and cinematography.
2. To understand about the post production video editing.
3. To know about audio mixing and engineering.
4. To learn about animation and special effects.
5. To learn about the different tools used for video editing.
OBJECTIVES:
The primary objective of this course is to make the student
• Understand the language models
• Analyze semantic embeddings
• Understand sequence labelling and word senses
• Implement different parsing techniques
• Understand logical representations of text
• Perform semantic role labelling
UNIT I OVERVIEW ANDLANGUAGEMODELING 6
Origins and challenges of NLP – Knowledge in Language Processing – NLP tasks – NLP Applications –
Regular expressions, text normalization, edit distance – tokenization – stemmer – Language Modeling:
Language and Grammar – Grammar-based Language Models – Statistical Language Models – N-gram
Models, Smoothing Techniques
THEORY: 30 HOURS
LAB EXERCISES:
1. Regular expressions and n-grams
2. Naïve Bayes classification
3. Logistic Regression
4. Vector embeddings for NLP tasks
5. Word2vec
6. PoS tagging
7. Named Entity Recognition
8. Constituency parsing
9. Dependency parsing
10. Logical representations of text
11. Proposition bank and frame nets
12. Semantic Role Labelling
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXT BOOK:
1. Daniel Jurafsky and James H. Martin, “Speech and Language Processing: An Introduction to
Natural Language Processing, Computational Linguistics, and Speech Recognition”, Third
Edition, 2022.
REFERENCES:
COURSE OUTCOMES:
After completing this course, students should be able to
1. Build and apply languagemodels for NLP tasks
2. Build and apply word embeddings for NLP tasks
3. Implement basic NLP tasks such as PoS tagging, named entity recognition, and word sense
disambiguation
4. Implement and use different parsing techniques for natural languages
5. Build logical representations for text
6. Perform semantic role labelling
OBJECTIVES:
The objective of this course is to enable the students to
● Learn about the different techniques used for feature detection and matching.
● Learn about the different techniques used for image segmentation.
● Know about the depth estimation and 3-D reconstruction.
● Study about the different types of recognition used in computer vision.
● Study about the different deep learning models and networks used in computer vision.
THEORY: 30 HOURS
LAB COMPONENT:
LIST OF EXPERIMENTS:
1. Implementation of Edge detection algorithms.
2. Implementation of image segmentation algorithms.
3. Implementation of feature extraction techniques.
4. Implementation of object detection.
5. Implementation of object recognition using different deep learning models.
6. Implementation of Activity recognition.
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXT BOOKS:
1. Richard Szeliski, Computer Vision: Algorithms and Applications, Springer-Verlag London
Limited 2011.
2. Computer Vision: A Modern Approach, D. A. Forsyth, J. Ponce, Pearson Education, 2003.
REFERENCES:
1. Rick Szelisk, “Computer Vision: Algorithms and Applications”, Springer 2011.
COURSE OUTCOMES:
On successful completion of this course, the students should be able to
1. Use the different techniques used for feature detection and matching.
2. Apply the different techniques used for image segmentation.
3. Understand depth estimation and 3-D reconstruction.
4. Apply the different types of recognition used in computer vision.
5. Apply the different deep learning models and networks used in computer vision.
OBJECTIVES:
• To explore the various forms of electronic health care information.
• To learn the techniques adopted to analyse health care data.
• To understand the predictive models for clinical data
UNIT I INTRODUCTION 6
Introduction to Healthcare Data Analytics- Electronic Health Records– Components of EHR- Coding
Systems- Benefits of EHR- Barrier to Adopting EHRChallenges- Phenotyping Algorithms.
UNIT V APPLICATIONS 6
Applications and Practical Systems for Healthcare– Data Analytics for Pervasive Health- Fraud Detection in
Healthcare- Data Analytics for Pharmaceutical Discoveries- Clinical Decision Support Systems- Computer-
Assisted Medical Image Analysis Systems.
THEORY: 30 HOURS
LAB COMPONENT:
LIST OF EXPERIMENTS:
1. Implementation of prediction model for Diabetic retinopathy
2. Implementation of prediction model for covid-19.
3. Implementation of prediction model for cancer.
4. Implementation of fraud detection in healthcare.
5. Implementation of caption generator for generating the symptoms of diabetic retinopathy.
6. Implementation of feature extractor from medical images
7. Implementation of visualization in medical images.
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXT BOOK:
1. Chandan K. Reddy and Charu C Aggarwal, “Healthcare data analytics”, Taylor & Francis, 2015.
REFERENCES:
1. Hui Yang and Eva K. Lee, “Healthcare Analytics: From Data to Knowledge to Healthcare
Improvement, Wiley, 2016.
2. Trevor L. Strome, "Healthcare Analytics for Quality and Performance Improvement" John Wiley &
Sons, Inc, 2013.
COURSE OUTCOMES:
Students will be able to:
1. Analyse health care data using appropriate analytical techniques.
2. Apply analytics for decision making in healthcare services.
3. Apply data mining to integrate health data from multiple sources and develop efficient clinical
decision support systems.
UNIT I INTRODUCTION 6
Introduction: Evolution, Cloud native. Building Blocks: Communications, Services, bounded contexts and
domains, API layer, logging, tracing.
UNIT IV SECURITY 6
Introduction: basics, challenges. IAM: platforms, patterns, Reverse proxies, Gateway API, access
scenarios. Tokens: Introduction, OAuth2, OIDC, validation, maintenance. Inter microservices security:
mTLS, certificate rotation, East/West traffic, shared access token anti-pattern, token relay, token switch,
Logging, service mesh. Container and Application Security: Throttling, rate limiting, image security,
container runtime security, secure pipelines.
REFERENCES:
1. Stephen Fleming, Devops and Microservices Handbook: Non-Programmer's Guide to Devops
and Microservices. 2018.
2. Gigi Sayfan, Hands-On Microservices with Kubernetes: Build, deploy and manage scalable
microservices on Kubernetes, Packt Publishing Limited, 2019.
3. Deepu K Sasidharan, Sendil Kumar N, Full Stack Development with JHipster: Build modern
web applications and microservices with Spring and Angular, Packt Publishing Limited, 2018.
4. Sourabh Sharma, Mastering Microservices with Java 9, Packt Publishing Limited; 2nd Revised
edition, 2017.
5. Vinicius Feitosa Pacheco, Microservice Patterns and Best Practices: Explore Patterns Like
CQRS and Event Sourcing to Create Scalable, Maintainable, and Testable Microservices, Packt
Publishing Limited, 2018.
COURSE OUTCOMES:
Upon completion of the course, the student should be able to:
1. Explain the core concepts and benefits of microservices
2. Develop microservices using Java
3. Make use of microservices for devops
4. Build microservices with kubernetes
5. Create angular and spring boot microservices using JHipster
1. Study of Computer Forensics and different tools used for forensic investigation.
2. How to recover deleted files using foresenics tools.
3. Study the steps for hiding and extract any text file behind an image file/ Audio file using Command
Prompt.
4. Program to Extract Exchangeable image file format (EXIF) Data from Image Files using Exif reader
Software.
5. Program to make the forensic image of the hard drive using EnCase Forensics.
6. Program to Restore the Evidence Image using EnCase Forensics.
7. Program to Collect Email Evidence in Victim PC.
8. Program to Extract Browser Artifacts.
9. Program to View Last Activity of Your PC.
10. Program to Find Last Connected USB on your system (USB Forensics).
11. Comparison of two Files for forensics investigation by Compare IT software.
12. Live Forensics Case Investigation using Autopsy
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXT BOOKS:
1. Nelson, Phillips, Enfinger, Steuart, Computer Forensics and Investigations”, Cengage Learning,
India Edition, 2008.
2. Man Young Rhee, Internet Security: Cryptographic Principles, Algorithms and Protocols, Wiley
Publications, 2003.
REFERENCES:
1. John R.Vacca, Computer Forensics, Cengage Learning, 2005.
2. Richard E.Smith, Internet Cryptography, 3rd Edition Pearson Education, 2008.
3. Marjie T.Britz, Computer Forensics and Cyber Crime: An Introduction, 3rd Edition, Prentice Hall,
2013.
4. Peterson, Gilbert, and Sujeet Shenoi,Advances in Digital ForensicsIX, Vol. 410, Springer, 2013.
COURSE OUTCOMES:
Upon completion of the course, the student should be able to:
1. Explain the security issues with network layer and transport layer.
2. Understand computer forensics.
3. Make use of forensics tools to collect and store evidences.
4. Analyze and validate forensics data.
OBJECTIVES:
• To understand Smart Objects and IoT Architectures
• To learn about various IOT-related protocols
• To build simple IoT Systems using Arduino and Raspberry Pi.
• To understand data analytics and cloud in the context of IoT
• To develop IoT infrastructure for popular applications
TEXTBOOK:
1. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Rob Barton and Jerome Henry, ―IoT
Fundamentals: Networking Technologies, Protocols and Use Cases for Internet of Things, Cisco
Press, 2017
REFERENCES:
1. Arshdeep Bahga, Vijay Madisetti, ―Internet of Things – A hands-on approach‖, Universities Press,
2015
2. Olivier Hersent, David Boswarthick, Omar Elloumi , ―The Internet of Things – Key applications
and Protocols‖, Wiley, 2012 (for Unit 2).
3. Jan Ho¨ ller, Vlasios Tsiatsis , Catherine Mulligan, Stamatis , Karnouskos, Stefan Avesand. David
Boyle, "From Machine-to-Machine to the Internet of Things - Introduction to a New Age of
Intelligence", Elsevier, 2014.
4. Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds), ―Architecting the Internet of Things‖,
Springer, 2011.
5. Michael Margolis, Arduino Cookbook, Recipes to Begin, Expand, and Enhance Your Projects, 2nd
Edition, O'Reilly Media, 2011.
6. https://www.arduino.cc/
7. https://www.ibm.com/smarterplanet/us/en/?ca=v_smarterplanet
COURSE OUTCOMES:
Upon completion of the course, the student should be able to:
1. Explain the concept of IoT.
2. Analyze various protocols for IoT.
3. Design a PoC of an IoT system using Raspberry Pi/Arduino
4. Apply data analytics and use cloud offerings related to IoT.
5. Analyze applications of IoT in real time scenario
OBJECTIVES:
• Understand the definition of Computer Based Modeling techniques.
• Understand 3D modeling in simple objects with lines and connect with compound objects.
• Learn different types of lighting, camera and rendering.
• Understand the Animation and motion graphics techniques.
LAB COMPONENT:
LIST OF EXPERIMENTS:
1. Study of 3D Studio Max.
2. Study of different tools used in Animation and Motion graphics.
3. Program or tool to create and edit a surface.
4. Implementation of different sculpting operations.
5. Study of Cinema4D.
6. Program or tool to create a scene and edit using different operations.
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXT BOOKS:
1. Mortenson, Michael E, 3D Modeling, Animation, and Rendering: An Illustrated LexiconBlack and
White Edition, 2010.
2. Boris Kulagin, “3ds Max 8 from Modeling to Animation, BPB,2006.
3. Michael G., 3D Modeling and Animation, IRM Publishing,2005
4. Lance Flavell, Beginning Blender: Open Source 3D Modeling, Animation, and Game Design,
Apress, 2010.
REFERENCES:
1. TedBoardman, 3d’sMax5Fundamentals, Techmedia”2004.
2. Lance Flavell Beginning Blender: Open Source 3D Modeling,Animation, and Game Design Apress,
2008.
COURSE OUTCOMES:
Upon Successful Completion of this course, the students should be able to:
1. Design 3D modeling with 3d objects and scene.
2. Apply different types of lighting effects in real word scene.
3. Design a real-world application using rendering concepts.
4. Apply the Animation and motion graphics techniques.
OBJECTIVES:
The objective of this course is to enable the students to
● Understand neural language models
● Apply encoder-decoder and transformer models
● Understand conference and coherence
● Build question answering systems
● Build chatbots and dialogue systems
COURSE OUTCOMES:
On successful completion of this course, the students should be able to
1. Build language models based on neural networks, RNN, LSTM, and transformers
2. Apply encoder-decoder and transformer models for NLP tasks such as machine translation
3. Explain coreference and coherence
4. Build question answering systems
5. Build chatbots and dialogue systems
6. Learn emerging deep learning architectures for text processing
OBJECTIVES:
The primary objective of this course is to enable the students
▪ To review the image processing techniques
▪ To understand shape and region analysis
▪ To study the different techniques for motion analysis.
▪ To learn about object detection in images and video
▪ To study some applications of computer vision algorithms
THEORY: 30 HOURS
LAB COMPONENTS:
LIST OF EXPERIMENTS:
1. Implementation of different filters for edge detection.
2. Implementation of different filters for image smoothening.
3. Implementation of optical flow algorithm using openCV.
4. Implementation of object recognition using python and OpenCV.
5. Implementation of object detection using YOLO.
6. Implementation of face recognition in real time video
7. Design and implementation of video game bots.
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXTBOOK:
1. Reinhard Klette, Concise Computer Vision: An Introduction into Theory and Algorithms,
Springer, 2014
REFERENCES:
1. Simon J. D. Prince, Computer Vision: Models, Learning, and Inference, Cambridge
University Press, 2012.
2. D. A. Forsyth, J. Ponce, Computer Vision: A Modern Approach, Pearson Education, 2003.
COURSE OUTCOMES:
Upon completion of the course, the student should be able to
1. To apply the different image processing techniques
2. To perform shape analysis
3. To perform image and video segmentation.
4. To apply object detection in images and video.
5. To develop applications using computer vision techniques
OBJECTIVES:
The primary objective of this course is to
• Model social network
• Mine the communities for knowledge
• Understand the links in social network
• Understand privacy preservation in Online Social Network
• Learn visualization of social networks.
UNIT I INTRODUCTION 6
Introduction, Statistical properties of social networks: Static and dynamic properties, Random walk and
their applications: Random walk on graphs - Algorithms for Computing Personalized Pagerank and
Simrank.
REFERENCES:
1. Stanley Wasserman, Katherine Faust Social Network Analysis: Methods and Applications
Volume 8 of Structural Analysis in the Social Sciences, ISSN 0954- 366X, Cambridge
University Press, 1994
2. Borko Furht, Handbook of Social Network Technologies and Applications, 1st Edition,
Springer, 2010.
3. Peter Mika, Social Networks and the Semantic Web, First Edition, Springer 2007.
4. Guandong Xu ,Yanchun Zhang and Lin Li, Web Mining and Social Networking – Techniques
and applications, First Edition Springer, 2011.
5. John G. Breslin, Alexandre Passant and Stefan Decker, “The Social Semantic Web”, Springer,
2009.
COURSE OUTCOMES:
Upon completion of the course, the student should be able to
1. Explain the graph representation of knowledge
2. Predict human behaviour in social web and related communities.
3. Understand the evolution and predict community links
4. Visualize social networks.
OBJECTIVES:
• Learn the process of full stack web development
• Understand the working principles of the Internet
• Understand software version control
• Understand Servers, Security, Cloud, Containers, and Orchestration
• Understand HTTP, data, and web services
UNIT I INTRODUCTION 6
Introduction: What and Why?, Shells, Terminals, Command Line, Editor: Bash(Standard streams and
redirection, accessing files and directories, searching), VIM. Internet basics: Definition, Addressing,
Protocols, DNS, trace routes, packets.
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXT BOOK:
1. Chris Northwood, "The Full Stack Developer: Your Essential Guide to the Everyday Skills
Expected of a Modern Full Stack Web Developer", APRESS, 1st edition, 2018
2. Jaosn Cannon, "Shell Scripting: How to Automate Command Line Tasks Using Bash Scripting and
Shell Programming", Createspace Independent Pub, 2015
REFERENCES:
1. Jon Loeliger, Matthew Mccullough, "Version Control with Git 2e: Powerful Tools and Techniques
for Collaborative Software Development", O′Reilly, 2nd edition, 2012
2. Adam K. Dean, "Linux Administration Cookbook: Insightful recipes to work with system
administration tasks on Linux", Packt Publishing Limited, 2018
3. 3.Stephen Ludin, Javier Garza, "Learning HTTP/2: A Practical Guide for Beginners", O′Reilly,1st
edition,2017
4. Arnaud Lauret, "The Design of Web APIs", Manning Publications, 1st edition, 2019
COURSE OUTCOMES:
Students will be able to:
1. Getting comfortable with Bash commands and VIM editor
2. Use Git for SVC
3. Use cloud, containers, and orchestration for server setup, security configurations, load balancing, and
deployment
4. Use sql/no-sql data and web services/API for data integration and interoperability
COs POs PSOs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 2 1 1 1 2 1
CO2 1 1 1 1 2 2 2 3
CO3 1 3 2 1 3 2 3 3
CO4 1 1 2
OBJECTIVES:
• To understand and analyse Information security threats & countermeasures
• To perform security auditing & testing
• To understand issues relating to ethical hacking
• To understand penetration and security testing issues
COURSE OUTCOMES:
Upon successful completion of this course, a student will be able to:
1. Understand vulnerabilities, mechanisms to identify vulnerabilities/threats/attacks
2. Perform penetration & security testing
3. Become a professional ethical hacker
UNIT V APPLICATIONS 6
Embedded Boards: Raspberry, Arduino- Optimization of Application: Code level, Memory Level,
Execution Level-- Case Study: Design of Robot Controller, Weather Station, Web Bot.
THEORY: 30 HOURS
LAB COMPONENTS:
LIST OF EXPERIMENTS:
1. Study of different software tools used in embedded systems.
2. Study of different Linux commands.
3. Study of different steps involved in porting an OS into the target board.
4. Study of Arduino IDE
5. Arduino for designing weather station.
6. Arduino for designing health monitoring system.
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXT BOOK:
1. Wang K.C, “Embedded and Real Time operating Systems”, Springer International Publishing
AG 2017.
REFERENCES:
1. Ishfaq Ah mad, Sanjay Ranka, Handbook of Energy Aware and Green Computing, Chapman and
Hall/CRC, 2012.
2. WolfRam Donat, Learn RaspberryPi Programming with Python, Learn to program on the World's
Most Popular Tiny Computer, Second Edition.
3. Chong-Min Kyung, Sungioo yoo, Energy Aware system design Algorithms and Architecture,
Springer, 2011.
4. Bob steiger wald ,Chris:Luero, Energy Aware computing, Intel Press,2012.
5. Xiaocong Fan, Real-Time Embedded Systems: Design Principles and Engineering Practices,
Newnes, 2015
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
1. Appreciate the usefulness of embedded systems in building different systems specific to their
applications.
2. Understand the importance of system-on-chip and network-on-chip in designing power efficient
high-performance systems.
3. Understand the different energy efficient strategies used for designing the storage devices.
4. Understand the different energy saving algorithms in embedded systems.
5. Understand the different features and services officered by the RTOS in designing the embedded
system.
OBJECTIVES:
The objective of this course is to enable the students to
• Understand the concept of virtual reality and augmented reality
• Creation of 2D & 3D Scene
• Development of VR Application
• Development of AR Application
• Creation and Evaluation of applications using AR and VR applications
THEORY:30 HOURS
LAB COMPONENTS:
LIST OF EXPERIMENTS:
1. Study of different software tools used in AR/VR/XR technologies.
2. Experiment to Use AR to train new employees on how to operate and repair complex machinery.
3. Experiment to Simulate real-life situations and test learners’ responses to microaggressions with 360º
VR.
4. Experiment to Use AR plane detection to place a simulated cash register in front of learners and test
their customer service skills.
5. Experiment to Place learners in a simulated warehouse environment through full VR.
6. Experiment to study Build AI-based XR apps for better human-machine interaction
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXTBOOKS:
1. Alan Craig, William Sherman and Jeffrey Will, Developing Virtual Reality Applications,
Foundations of Effective Design, Morgan Kaufmann, 2009.
2. Alan B. Craig, Understanding Augmented Reality, Concepts and Applications, Morgan Kaufmann,
2013.
REFERENCE:
1. Burdea, G. C. and P. Coffet. Virtual Reality Technology, Second Edition. Wiley-IEEE Press,
2003/2006.
COURSE OUTCOMES:
Upon successful completion of this course, the students should be able to:
1. Develop XR application
2. Experience to use VR and AR tools
3. Use immersion technique to scene creation
4. Apply VR and AR concepts in real world applications
COs POs PSOs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 3 1 2 2
CO2 3 2 1 1 3 2
CO3 3 1 1 1 2 2
CO4 3 2 2 3 3 2 1 2 3
OBJECTIVES:
The objective of this course is to enable the students to
● Introduce the different basic concepts of reinforcement learning.
● Learn about the Finite Markov Decision Process.
● Study about the dynamic programming.
● Study about the Monte Carlo Methods.
● Learn about the temporal difference learning.
UNIT 1 INTRODUCTION 6
Reinforcement Learning (RL) – elements, limitations and scope; Probability basics - Axioms of probability,
concepts of random variables, PMF, PDFs, CDFs, Expectation. Concepts of joint and multiple random
variables, joint, conditional and marginal distributions. Correlation and independence.
REFERENCES:
1. Russell, Stuart J., and Peter Norvig. "Artificial intelligence: a modern approach.", Pearson
EducationLimited, 2016.
2. Kevin P. Murphy, “Machine Learning: A Probabilistic Perspective"
3. Csaba Szepesvari, “Algorithms for Reinforcement learning”
4. Recent journal articles on application of RL for real world problems
COURSE OUTCOMES:
On successful completion of this course, the students should be able to
1. Describe the features of reinforcement learning that distinguishes it other learning algorithms.
2. Understand and apply basic RL algorithms for simple sequential decision-making problems in
uncertain conditions.
3. Interpret state-of-the-art RL research and communicate their results
4. Apply the Finite Markov Decision Process.
LAB COMPONENTS:
LIST OF EXPERIMENTS:
1. Study of real time speech emotion recognition system.
2. Speech Emotion Recognition with librosa.
3. Write program to extract Mel Frequency Cepstral Coefficients from speech.
4. Study and use DisVoice Python framework to extract features from speech audio files.
5. Experiment to calculate pitch and pitch tracking.
6. Implementation of histogram equalization.
7. Study of Speech Brain speech toolkit.
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXTBOOKS:
1. Lawrence R. Rabiner, and Ronald W. Schafer, Digital Processing of Speech Signals, Englewood
Cliffs, NJ: Prentice-hall, 1978.
2. Thomas F Quatieri, Discrete-time Speech Signal Processing: Principles and Practice, Pearson
Education India, 2006.
3. John G Proakis, Dimitris G. Manolakis Digital Signal Processing: Principles, Algorithms, and
Applications, Pearson Education India, 4th edition, 2007.
REFERENCES:
1. Eric Moulines, and Francis Charpentier, “Pitch-synchronous waveform processing techniques for
text-to-speech synthesis using diphones”, Speech communication, vol 9, 1990, pp. 453-467.
2. Thomas Drugman, Mark Thomas, Jon Gudnason, Patrick Naylor, and Thierry Dutoit, “Detection of
glottal closure instants from speech signals: A quantitative review”, IEEE Transactions on Audio,
Speech, and Language Processing, vol 20, no. 3, 2012, pp. 994-1006.
3. Jani Nurminen, Hanna Silén, Victor Popa, Elina Helander, and Moncef Gabbouj, “Voice
conversion”;, Speech enhancement, modeling and recognition- algorithms and applications,
IntechOpen, 2012.
4. Seyed Hamidreza Mohammadi, and Alexander Kain, “An overview of voice conversion systems”
Speech Communication, vol 88, 2017, pp. 65-82.
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
1. Explain the usefulness of digital signal processing fundamentals in building speech- based systems.
2. Compare the time and frequency-domain parameters, and know how to compute / estimate those
parameters
3. Outline the relevant features that can be extracted from a given speech signal, and in what way the
features are relevant to build speech-based systems.
4. Explain the possible techniques to modify a given speech signal, based on the requirement, and to
develop the required algorithms.
OBJECTIVES:
• To understand the basic methods of forensic investigation.
• To learn to apply Benford's law in forensic data investigation
• To understand the statistical approaches in fraud identification
• To apply the techniques adopted in real time forensic data analysis
UNIT V APPLICATIONS 6
Applications and Practical Systems for Forensic Data Analytics – Detection of Financial Statement Fraud -
Analytics on Purchasing Card Transactions.
THEORY: 30 HOURS
LAB COMPONENT:
LIST OF EXPERIMENTS:
1. Numeric Data Analysis - Detection of Fraud and Errors using Benford’s Law.
2. Descriptive Analysis for Fraud Detection in Inventory Data using Largest Subset and Growth
Tests.
3. Descriptive Analysis for Fraud Detection in Insurance Claims using Abnormal Duplications Test.
4. Predictive Analysis for Detection of Fraud from sales data using correlation co-efficient.
5. Predictive Analysis for Detection of Fraud from Stock Market Data using Time-Series Analysis.
6. Application Development - Fraud Detection in Credit Card Transactions
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXT BOOK:
1. Mark J Nigrini, "Forensic Analytics - Methods and Techniques for forensic accounting investigations",
2nd edition, John Wiley & Sons, Inc, 2020.
REFERENCES:
1. Leonard W Vona, "Fraud Data Analytics Methodology", John Wiley & Sons, Inc, 2017.
2. Sunder Gee, "Fraud and Fraud Detection - A Data Analytics Approach", John Wiley & Sons, Inc, 2014.
COURSE OUTCOMES:
Students will be able to:
1. Analyse structured data using formulas to detect fraud
2. Apply concepts of Benford's law in analysis of fraudulent data.
3. Use correlation and time series analysis to detect frauds.
4. Use appropriate statistical method to detect frauds in financial statements and transactions.
LAB COMPONENT:
LIST OF EXPERIMENTS:
1. Design a system based on a user-centered approach.
2. Design the existing GUI with screen complexity.
3. Design web user interface based on Gestalt theory.
4. Implementation of various kinds of menus.
5. Implementation of various kinds of windows.
6. Implementation of various kinds of icons.
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXTBOOK:
1. Alan Dix, Janet Finlay, Gregory Abowd, Russell Beale, “Human Computer Interaction”, 3rd
Edition, Pearson Education, 2004.
REFERENCES:
1. Brian Fling, “Mobile Design and Development”, First Edition , O‟Reilly Media Inc., 2009.
2. Bill Scott and Theresa Neil, “Designing Web Interfaces”, First Edition, O‟Reilly, 2009.
3. Ben Shneiderman, Designing for Effective Human/Computer Interaction, Pearson, 2010.
4. Jenifer Tidwell, Designing Interfaces, Second Edition, O′Reilly publishers, 2011.
5. David Benyon, Designing Interactive Systems: A Comprehensive Guide to HCI, UX and
Interaction Design, Third Edition, Pearson, 2013.
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
1. Design effective dialog for HCI.
2. Design effective HCI for individuals and persons with disabilities.
3. Assess the importance of user feedback.
4. Explain the HCI implications for designing multimedia/ ecommerce/ e-learning Web sites.
5. Develop meaningful user interface.
OBJECTIVES:
1. To give awareness on foundational technologies in FinTech
2. To understand the Encryption methods and key management in FinTech.
3. To understand the security and privacy in FinTech
4. To analyze the limits, technology risks, security policies and social implications of FinTech
5. To learn about case studies on cyber-crimes, frauds and regulations to mitigate risks
UNIT I INTRODUCTION 6
Introduction - FinTech opportunity to improve the financial systems, Fintech – Financing: Crowd Funding,
Credit & Factoring, Asset Management: Social trading, Investment and Banking, Payments, Other Fintech:
Insurance, Technology and Infrastructure: Commercial Banking, Core Banking, Internet and Mobile Banking,
Customer - Centric Banking, Blockchains – Cryptocurrencies.
THEORY: 30 HOURS
PRACTICAL COMPONENTS:
1. Implementation of symmetric key cryptography for Fintech security
2. Implementation of public key cryptography for Fintech security
3. Role based access control
4. Secure application logic
• OTP
• Mandatory password change
• Monitoring
• Short login-session
• Adaptive authentication
5. DevSecOps
• Using tools – OWASP
6. Blockchain implementation and cryptocurrency demonstration
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXT BOOK:
1. Kannan Subramanian and Chithra Selvaraj, “Bank of the future – Minimise Technology risk,
Maximise Business Return, Wolters Kluwer publication, 2018.
2. Allen N. Berger, Philip Molyneux and John O.S. Wilson – The Oxford Handbook of Banking, 3rd
Edition.
REFERENCES:
1. J.W. Rittiaghouse and William M. Hancok, “Cyber Security Operations Handbook”, Elsevier.
2. William Stallings, “Cryptography and Network Security Principles and Practice Fourth Edition”,
Pearson Education
COURSE OUTCOMES:
On successful completion of this module, students should be able to:
1. Define all areas of FinTech
2. Understand the challenges and opportunities in various financial applications.
3. Analyze the risks related to FinTech and to pinpoint the areas where modernization is still required
4. Understand the linkage between certain technologies and regulations
5. Analyze the fintech regulations related to cyber use and cyber-crimes in financial institutions.
OBJECTIVES:
• To introduce and compare different robotic systems that navigate independently in complex
environments.
• To develop knowledge on basic sensor systems related to state measurements, navigation and
localization.
• To study computer vision perception and learn sensors for environment perception.
• To understand mobile robot locomotion, kinematics, probabilistic map based localization.
THEORY: 30 HOURS
PRACTICAL COMPONENTS:
1.Mobile object detection.
2.Application to perceive the environment.
3.Decision-based actions around obstacles.
4.Motion planning and navigation schemes for mobile robots.
5.Implementation of kinematics for mobile robots
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXT BOOK:
1. R. Siegwart, I. R. Nourbaksh, and D. Scarramuzza, “Introduction to Autonomous Mobile
Robots”, Second Edition, MIT Press, 2011.
REFERENCES:
1. Stuart Russel and Peter Norvig, “Artificial Intelligence: A Modern Approach”, Fourth Edition,
Pearson Education, 2020.
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
1. Understand and analysis algorithmic approaches, compare the mathematical models on various
mobile robots.
2. Address several key challenges in localization, and mapping, and find research issues in visual
object detection.
3. Develop knowledge on motion planning and navigation schemes for mobile robots
4. Apply and implement path planning and kinematics for mobile robots.
5. Plan and design mobile robots that act autonomously for practical applications.
PRACTICAL: 30 HOURS
TOTAL: 60 HOURS
TEXT BOOKS:
1. Don Norman, "The Design of Everyday Things", Basic Books, Revised edition, 2013
2. Russ Unger, Carolyn Chandler, "A Project Guide to UX Design: For User Experience Designers in
the Field or in the Making", New Riders Pub, 1st edition, 2009
3. Elizabeth Goodman, Mike Kuniavsky, Andrea Moed, "Observing the User Experience: A
Practitioner's Guide to User Research", Morgan Kaufmann, 2nd edition, 2012
4. Ben Coleman, Dan Goodwin, "Designing UX: Prototyping", SitePoint, 1st edition, 2017
5. Michal Levin, "Designing Multi-Device Experiences: An Ecosystem Approach to User Experiences
across Devices", O'Reilly Media, 1st edition, 2014
REFERENCES:
1. https://www.nngroup.com/
2. https://careerfoundry.com/en/blog/ux-design/what-is-user-experience-ux-design-everything-you-
need-to-know-to-get-started/
3. https://www.uxbooth.com/articles/complete-beginners-guide-to-design-research/
4. https://www.uxmatters.com/mt/archives/2015/09/ux-generalists-or-specialists.php
5. https://www.playbookux.com/what-type-of-qualitative-ux-research-method-should-i-run/
6. Bill Scott, Theresa Neil, "Designing Web Interfaces: Principles and Patterns for Rich Interactions",
O'Reilly Media, 1st edition. 2009
7. Alan Cooper, Robert Reimann, David Cronin, Christopher Noessel, "About Face: The Essentials of
Interaction Design", Wiley, 4th edition, 2014
8. Bill Moggridge, "Designing Interactions", MIT Press, 1st edition, 2007
9. Stephen P. Anderson, "Seductive Interaction Design: Creating Playful, Fun, and Effective User
Experiences", New Riders Pub, 1st edition, 2011
10.Claire Rowland, Elizabeth Goodman, Martin Charlier, Ann Light, Alfred Lui, "Designing
Connected Products: UX for the Consumer Internet of Things",
O'Reilly Media, 1st edition, 2015
COURSE OUTCOMES:
1. Learn, Understand and Apply user centered Design principles
2. Design Digital Experiences across devices and platforms
3. Build UX portfolios
4. Use Interaction Design skills to Explore, Test, and Validate your design decisions
Principles of Biomedical
14 UBM2041 3 0 0 3
Instrumentation
Materials for Biomedical
15 BME UBM2042 3 0 0 3
Applications
32 UPH2047 Astrophysics 3 0 0 3
33 UEN2044 Creative writing 2 1 0 3
English
34 UEN2045 Introduction to Children's literature 2 0 2 3