B.Tech Syll
B.Tech Syll
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO PO PO PSO1 PSO2
10 11 12
CO1 1 1 - - - - - 1 1 1 - 1 - -
CO2 1 1 - - - - - 1 1 - - - - -
CO3 - 1 - - - - - 2 - 1 - 1 - -
CO4 - - - - - - - - - - - - - -
CO5 1 - - - - - - 2 1 1 - 1 - -
Average 0.6 0.6 - - - - - 1.2 0.6 0.6 - 0.6 - -
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔
CSE GENDER INSTITUTION AND SOCIETY 2 0 0 0
Course Objective:
The course helps the student to understand concepts of social justice and gender justice. It provides the
student with the knowledge of various institutions functioning worldwide which aim to eradicate
discrimination against women. The course further aids students in understanding feminism and gender
in relation to the society and to study the basic constitutional remedies available to women.
UNIT – I
Social Justice and Gender Justice – Theories relating to Social Justice – Theories relating to Gender Justice
– Interrelationship between Gender justice and Social Justice
UNIT – II
International Conventions for protection of Women – Convention on the Elimination of All Forms of
Discrimination Against Women (CEDAW) – National Commission for women – Constitutional remedies
available for women under Indian Constitution.
UNIT – III
United Nations Entity for Gender Equality and the Empowerment of Women (UN Women) - Association
for Women’s Rights in Development (AWID) –Women kind worldwide – Centre for reproductive rights -
Women’s Environment and Development Organization (WEDO) - Global Fund for Women
UNIT – IV
International Center for Research on Women (ICRW) - European Institute for Gender Equality (EIGE) –
Promundo - International Alliance of Women (IAW) - International Women’s Development Agency
(IWDA).
UNIT – V
World Health organisation – Sex and Gender – Feminism – Theories relating to Feminism – Gender and
society
TEXT BOOKS
1. Law relating to Women and children, Mamta Rao
2. Gender, Politics and Institutions: Towards a Feminist Institutionalism, by Mona Lena krook and Fiano
Mackay,2010
3. Gender Justice and Feminist Jurisprudence, Dr.Sheetal Kanwal,2015
4. Narain’s Gender and society, P.Jain
REFERENCE BOOKS
1. Gender Justice and feminist Jurisprudence by Dr.Ishitha Chatterjee
2. Gender and Institutions, Moira Gatens and Alison Mackkinon
SUGGESTED READINGS:
1. Women and Gender : Society and Community , Siddhartha Sarkar
COURSE OUTCOMES:
After the completion of this Course, the student would be able to:
CO 1: Understand the Concept of Social Justice and Gender Justice.
CO 2: Learning the International Conventions and constitutional remedies available for women.
CO 3: Identify the various gender Institutions and its functions for the development of women.
CO 4: Assessing the International agencies.
CO 5: Summarising the study on feminism and relation of gender and society.
CSE Java and Web Programming 3 0 0 3
Course Objectives
Review of object oriented programming - Objects and classes in Java – Defining classes – Methods -
Access specifiers – static members – static fields - static methods - static variables – constructors - Default
constructor - parameterized constructor – finalize method – Arrays – Strings – Packages – user defined
packages – Java Doc comments
Understanding Internet - Understanding websites and web servers - HTML - – forms – frames – tables –
web page design – CSS - Java Script: An introduction to JavaScript–JavaScript DOM Model-Date and
Objects,-Regular Expressions- JavaScript Events - Event Handling and Validation -Exception Handling-
Understanding Java Server Pages-JSP Standard Tag Library(JSTL)-Creating HTML forms by embedding JSP
code- Servlets: Java Servlet Architecture- Servlet Life Cycle- Form GET and POST actions- Session
Handling- Understanding Cookies- Installing and Configuring Apache Tomcat Web Server;- DATABASE
CONNECTIVITY: JDBC perspectives, JDBC program example – JSP:.
Rest API development with spring boot, Spring boot project with STS/MAVEN, Controller and Rest
Controller annotations, RequestBody, ResponseBody annotations, Error handling with spring boot
TOTAL : 45 Hours
Text Books:
T3: Herbert Schildt, “Java The complete reference”, 8th Edition, McGraw Hill Education, 2011.
T4: Jeffrey C. Jackson, "Web Technologies--A Computer Science Perspective", Pearson
Education, 2006.
Reference Books:
R3: Paul Deitel, Harvey Deitel, “Java SE 8 for programmers”, 3rd Edition, Pearson, 2015.
R4: Cay S. Horstmann, Gary cornell, “Core Java Volume –I Fundamentals”, 9th Edition,
Web Links:
1. https://onlinecourses.nptel.ac.in/noc22_cs47/preview
COURSE OUTCOMES
CO1: K2
Develop Java programs using OOP principles
CO2: K4
Develop Java programs with the concepts inheritance and interfaces
CO3: K3
Design simple web pages using markup languages like HTML and XHTML.
CO4: Program server side web pages that have to process request from client side web K4
pages.
CO5: K1
Understand various web services and how these web services interact..
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 3 3 2 - - - - - - - - 3
CO2 3 2 2 2 2 - - - - - - - - 3
CO3 3 2 3 2 2 - - - - - - - - 3
CO4 3 2 2 2 3 - - - - - - - - 3
CO5 2 2 3 2 3 - - - - - - - - 3
2.8 2 2.6 2.2 2.4 - - - - - - - - 3
ASSESSMENT METHODS:
Course Objectives:
To comprehend the fundamental concepts of graphics and multimedia.
● To gain and apply the acquired knowledge pertaining to 2D and 3D concepts in graphics
● programming.
● To understand the basic 3D modeling and rendering techniques.
● To realize the importance of multimedia towards building the virtual environment and
●
communication.
REFERENCES:
R1: Judith Jeffcoate, ―Multimedia in practice: Technology and Applications‖, PHI, 1998.
R2: Foley, Vandam, Feiner and Hughes, ―Computer Graphics: Principles and Practice, 2nd Edition, Pearson
Education, 2003.
R3: Jeffrey McConnell, ―Computer Graphics: Theory into Practice, Jones and Bartlett Publishers,2006.
R4: Hill F S Jr., "Computer Graphics", Maxwell Macmillan , 1990.
R5: Peter Shirley, Michael Ashikhmin, Michael Gleicher, Stephen R Marschner, Erik Reinhard, KelvinSung, and
AK Peters, ―Fundamentals of Computer Graphics, CRC Press, 2010.
R6: William M. Newman and Robert F.Sproull, ―Principles of Interactive Computer Graphics, Mc Graw Hill
1978. https://www.blender.org/support/tutorials/
Course Outcomes
CO 1: Design two-dimensional graphics.
CO 2: Apply two dimensional transformations.
CO 3: Apply three dimensional transformations and clipping techniques to graphics
CO 4: Understood Different types of Multimedia File Format
CO 5: Design Basic 3d Scenes using Blender
ASSESSMENT METHODS:
End Semester
CAT 1 CAT 2 Model Exam Assignments
Exams
✔ ✔ ✔ ✔ ✔
Demonstration /
Quiz MCQ Projects Seminars
Presentation
✔ ✔
CSE FUNDAMENTALS OF BLOCKCHAIN & USE CASES 3 0 0 3
Course Objectives
The Double-Spend Problem, Byzantine Generals’ Computing Problems, Public-Key Cryptography, Hashing,
Distributed Systems, Distributed Consensus. Technology Stack: Blockchain, Protocol, Currency
Ethereum Blockchain: Smart Contracts, Ethereum Structure, Operations, Consensus Model, Incentive
Model.
Blockchain 1.0, Blockchain 2.0, Blockchain 3.0, Types of Blockchain: Public Blockchain, Private Blockchain,
Semi-Private Blockchain, Sidechains.
Proof of Stake, Proof of Work, Delegated Proof of Stake, Proof Elapsed Time, Deposite-Based Consensus,
Proof of Importance, Federated Consensus or Federated Byzantine Consensus, Practical Byzantine Fault
Tolerance. Blockchain Use Case: Supply Chain Management.
TOTAL : -- 45 hours
Text Books:
T1: Mastering Blockchain: Deeper insights into decentralization, cryptography, Bitcoin, and popular
Blockchain frameworks by Imran Bashir, Packt Publishing (2017).
T2: Mastering Bitcoin: Unlocking Digital Cryptocurrencies, by Andreas Antonopoulos O’Reilly, First
Edition, 2014
Reference Books:
Web Links:
1. https://www.coursera.org/specializations/blockchain.
2. https://nptel.ac.in/courses/106105184/
3. https://swayam.gov.in/nd1_noc20_cs01/preview
COURSE OUTCOMES
CO1: Explain the basic notion of distributed systems & block chain technology stack K2
CO5: K3
Apply Blockchain in future use cases for security
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 2 - - - - - - - - 3
CO2 2 2 1 2 2 - - - - - - - - 3
CO3 3 3 3 2 2 - - - - - - - - 3
CO4 3 3 1 2 3 - - - - - - - - 3
CO5 3 2 3 2 3 - - - - - - - - 3
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔ ✔
CSE JAVA AND WEB PROGRAMMING LAB 0 0 2 1
Course Objectives
⮚ To be familiar with Web page design using HTML/XML and style sheets
⮚ To learn to create dynamic web pages using server side scripting.
⮚ To be exposed to creating applications with AJAX
⮚ To be familiar in API development with Spring boot
Experiments:
TOTAL : 30 hours
COURSE OUTCOMES
CO1: K4
Design simple web pages using markup languages like HTML and XHTML.
Create dynamic web pages using DHTML and java script that is easy to navigate
CO2: K6
and use.
Program server side web pages that have to process request from client side web
CO3: K6
pages.
CO4: Represent web data using XML and develop web pages using JSP. K4
PO1 PO2 PO3 PO4 PO PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO
5 2
CO1 3 2 2 2 2 3 2
- - - - - - -
CO2 2 2 2 2 2 3 3
- - - - - - -
CO3 2 2 2 2 2 2 2
- - - - - - -
CO4 2 2 3 3 2 3 2
- - - - - - -
CO5 2 3 2 3 3 1 3
- - - - - - -
AVG 2.2 2.2 2.2 2.4 2.2 2.4 2.4
- - - - - - -
ASSESSMENT METHODS:
✔ ✔ ✔
Demonstration /
Record MCQ Projects Viva
Presentation
✔ ✔ ✔
CSE Computer Graphics and Multimedia Lab 0 0 2 1
Course Objectives
To make the students understand graphics concepts and develop, design and implement two-
⮚
and three-dimensional graphical structures using OpenGL.
⮚ To understand multimedia compression techniques and applications of multimedia.
Experiments:
COURSE OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 3 2 3 3 2 3 2 1 2 1
CO2 3 2 3 3 2 3 2 1 3 2 3 2 3 3
CO3 2 3 2 2 2 2 1 3 2 3 3 3 2 3
CO4 2 3 2 2 3 2 3 3 2 2 3 3 3 3
CO5 2 3 3 3 3 3 3 3 3 3 3 3 3 3
AVG 2.4 2.6 2.4 2.4 2.6 2.4 2.4 2.6 2.4 2.6 2.8 2.4 2.6 2.6
ASSESSMENT METHODS:
✔ ✔ ✔
Demonstration /
Record MCQ Projects Viva
Presentation
✔ ✔ ✔
CSE PERSONALITY DEVELOPMENT III 2 0 0 2
COURSE OBJECTIVE:
⮚ To enhance the communication, interpersonal, group skills.
Phonetics / Neutral Accent / Pronunciation – Speech Mechanism / Mouth & Face Exercise – Vowels &
Consonants – Sounds – Syllable and Syllable Stress/ Word Stress – Sentence Stress & Intonation
Articulation Exercise – Rate of Speech / Flow of Speech / Idiomatic Phrases.
Singular/plural – present tense / past tense – genders Prepositions – conjunctions – Choice of words –
simple sentences – compound sentences – summarizing phrases Synonyms – Antonyms – Analogies –
Similar Words.
Meaning – Aspects of team building – Process of team building – Types of Teams – Team Ethics and
Understanding – Team trust and commitment.
TOTAL: 30 h
TEXT/REFERENCE BOOKS:
T1. B N Ghosh, Managing Soft Skills and Personality, Mc graw Hill Publications
T2. Shejwalkar and Ghanekar,Principles and Practices of Management,Mc Graw Hill Latest.
T3. Roberta Roesch ,Time management for Busy people, Tata McGraw–Hill Edition
REFERENCE BOOKS:
R1. D. P. Sabharwal, Personality Development Handbook, Fingerprint publishing, 2021
R2. Dr V M Selvaraj, Personality Development, Bhavani Publications
COURSE OUTCOMES
CO2: Choose words and phrases appropriately for any verbal communication. K3
CO4: Prioritize important and urgent tasks using the four quadrants method. K4
CO5: Practice team ethics and understanding when working with teams. K3
ASSESSMENT METHODS:
✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔ ✔ ✔
To assist the learner to understand the .NET Architecture, Object oriented concepts, to use ADO.NET for
database connectivity and developing the ability to solve any type of problems by mapping with real world
environment using ASP.NET and C#.
UNIT I INTRODUCTION TO C# 9
Introducing C# - Introduction to .Net framework and Architecture - Understanding .NET-Overview of C#-
Literals Variables-Constant Variables – Scope of Variables – Boxing and Unboxing - Data Types- Operators-
Expressions Branching- Looping- Methods- Arrays- Strings- Structures- Enumerations.
Building Windows Forms Applications -Programming Web Applications with Web Forms using ASP.NET -
ASP.NET controls - Understand Data Binding and various Data Sources in ASP.NET - Understand the
creation of Master Pages and themes - Configuration of web applications using IIS configurations - State
management in ASP.NET Programming Web Services.
TOTAL:45 h
TEXT BOOKS:
T1: Balagurusamy. E, “Programming in C#”, Tata McGraw-Hill, 2004. (Unit I, II)
T2: Liberty.J, “Programming C#”, 2nd Edition., O’Reilly, 2002. (Unit III, IV, V)
T3: Bill Hamilton, Matthew MacDonald , “ ADO.NET in a Nutshell “ ,O'Reilly Media (Unit III)
T4: Jesse Liberty, Dan Maharry, Dan Hurwitz . “Programming ASP.NET 3.5” 4th Edition , O'Reilly Media
(Unit IV)
REFERENCES:
R1: Herbert Schildt, “The Complete Reference: C#”, Tata McGraw-Hill, 2004.
R2: Robinson et al, “Professional C#”, 2nd ed., Wrox Press, 2002.
R3: Andrew Troelsen, “C# and the .NET Platform”, A! Press, 2003.
R4: ThamaraiSelvi, R. Murugesan, “A Textbook on C#”, Pearson Education
R5: ADO.NET in a Nutshell By Bill Hamilton, Matthew MacDonald Publisher: O'Reilly Media.
R6: Programming ASP.NET 3.5, 4th Edition By Jesse Liberty, Dan Maharry, Dan HurwitzPublisher: O'Reilly
Media
Web Links:
W1: https://ict.iitk.ac.in/courses/introduction-to-c-sharp/
W2: https://www.btechguru.com/training--dot-net--c-sharp-dot-net--framework--c-sharp-
programming-tutorial-part-1-video-lecture--11285--27--139.html
COURSE OUTCOMES
At the end of this course the students will be able to,
CO1: Construct various applications using C# in .Net framework 1
ASSESSMENT METHODS:
✔ ✔
CSE THEORY OF COMPUTATION AND COMPILER DESIGN 3 0 0 3
Course Objectives
⮚ Provides the required theoretical foundation for a computational model and compiler design
Discuss Turing machines as an abstract computational model
⮚
⮚ Compiler algorithms focus more on low-level system aspects..
CFG – Chomsky Normal Forms - NPDA – DPDA - Membership algorithm for CFG. SyntaxAnalysis - Top-
Down Parsing - Bottom-Up Parsing - Operator-Precedence Parsing - LR Parsers -Turing Machines –
Recursive and recursively enumerable languages – Linear bounded automata -Chomsky's hierarchy –
Halting problem.
Code Optimization - Basic Blocks and Flow Graphs – The DAG Representation of Basic Blocks -The
Principal Sources of Optimization - Optimization of Basic Blocks - Loops in Flow Graphs -Peephole
Optimization - Introduction to Global Data-Flow Analysis
Code Generation – Issues in the Design of a Code Generator - The Target Machine - Run-Time Storage
Management - Next-Use Information - Register Allocation and Assignment - A Simple Code Generator -
Generating Code from DAG - Runtime Environments – Source Language issues – Storage Organization
– Activation Records- Storage Allocation strategies – Static Allocation – Stack Allocation – Heap
Allocation - Access to non-local names – Parameter Passing.
TOTAL : -- 60 hours
Text Books:
1. Introduction to Automata Theory, Languages, and Computation (3rd Edition), John E Hopcroft, Rajeev
Motwani, Jeffery D. Ullman, Pearson education, 2013.
2. Principles of Compiler Design, Alferd V. Aho and Jeffery D. Ullman, Addison Wesley,2006
Reference Books:
1. Introduction to Languages and the Theory of Computation, John Martin, McGraw-Hill Higher
Education,2010
2. Modern Compiler Implementation in Java, 2nd ed., Andrew W. AppelCambrdige University Press,
2012
Web Links:
1. https://archive.nptel.ac.in/courses/106/105/106105183
2. https://nptel.ac.in/courses/106104148
COURSE OUTCOMES
Course Knowledge
Description
Outcome Level
Illustrate the translation of regular expression into parse tree using syntax
CO2 K2
analyzer
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 3 2 3 3 2 2 2 1 2 1
CO2 3 2 3 3 2 3 3 1 3 2 3 2 3 2
CO3 2 3 2 2 2 2 2 3 2 3 2 3 2 3
CO4 2 3 2 2 3 2 3 3 2 2 3 3 3 3
CO5 2 3 3 3 3 3 3 3 3 3 3 3 3 3
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Demonstration /
Quiz MCQ Projects Seminars
Presentation
✔ ✔
Course
Compiler Design lab 0 0 2 1
Code
Course Objectives
● To be familiar with Lexical Analyzer using Lex tool & parser using YACC Tool.
To learn to create front end of the compiler by means of generating Intermediate codes.
●
● To be familiar in code optimization techniques.
List of Experiments:
a) Program to recognize a valid variable which starts with a letter followed by any number of
letters or digits.
b) Program to recognize a valid variable which starts with a letter followed by any number of letter
or digits.
7. Convert the BNF rules Into YACC Form and Write code to Generate Abstract Syntax Tree Using
and YACC.
COURSE OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 - - - - - - - 2 3 2
CO2 2 2 2 2 - - - - - - - 2 3 3
CO3 2 2 2 2 - - - - - - - 2 2 2
CO4 2 2 3 3 - - - - - - - 2 3 2
CO5 2 3 2 3 - - - - - - - 3 1 3
✔ ✔ ✔
Demonstration /
Record MCQ Projects Viva
Presentation
✔ ✔ ✔
L T P Credits
CSE .NET ENVIRONMENT LABORATORY
0 0 2 1
LIST OF EXPERIMENTS
1. Implement C# program
a) Write a program in C# to count a total number of alphabets, digits and special characters in a
string.
2.Basic C# program
Text Books:
Reference Books:
R5: Herbert Schildt, “The Complete Reference: C#”, Tata McGraw-Hill, 2004.
R6: Robinson et al, “Professional C#”, 2nd ed., Wrox Press, 2002.
Web Links:
7. https://www.tutorialspoint.com/dot net/index.html
8. https://ict.iitk.ac.in/courses/introduction-to-c-sharp
CO5 Performing database operations for windows and web applications using K3
MVC
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO 8 PO9 PO 10 PO 11 PO PSO1 PSO
12 2
2 3 2 2 - - - - - - - 2 2 2
CO1
2 2 2 2 - - - - - - - 2 3 2
CO2
3 3 2 3 - - - - - - - 2 1 2
CO3
2 2 2 2 - - - - - - - 2 2 2
CO4
2 2 2 3 - - - - - - - 3 2 3
CO5
Avera 2.2 2.4 2 2.4 - - - - - - - 2.2 2 2.2
ge
ASSESSMENT METHODS:
✔ ✔ ✔
Demonstration /
Record MCQ Projects Viva
Presentation
✔ ✔ ✔
Course Objectives
⮚ Will gain knowledge in the basic concepts of Javascript
⮚ To acquire skills in frontend using Angular
⮚ To understand the concepts in NodeJS
⮚ To implement using ExpressJS
⮚ Create a web application with database
UNIT IV Ex 9
pr H
es o
s ur
JS s
Rest APIs & Routing - Wriitng middlewares - Cookies & Session -Authentication and authorization
- Error routing-JWT-Mongoose - MongoDB ORM-Sequelize - SQL ORM
UNIT V MongoDB 9
H
o
ur
s
Installation & setup - Mongo queries and CRUD - Aggregation framework - Replication &
Sharding concepts
TOTAL : 45 Hours
Text Books:
Reference Books:
R1: Colin J Ihrig , Adam Bretz Full Stack JavaScript Development With MEAN,FirstEdition
Web Links:
1. https://angular.io/
2. https://nodejs.org/en/
3. https://expressjs.com/
4. https://www.mongodb.com/
COURSE OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 2 - - - - - - - 3 3
CO2 3 2 2 3 2 - - - - - - - 3 3
CO3 3 3 3 3 1 - - - - - - - 3 3
CO4 3 3 2 3 2 - - - - - - - 3 3
CO5 2 2 3 3 2 - - - - - - - 2 3
2.8 2.6 2.6 3 1.8 - - - - - - - 2.8 3
ASSESSMENT METHODS:
Course Objectives
To implement Forms, inputs and Services using Angular JS
● To develop a simple web application using Nodejs; Angular JS and Express
● To implement data models using Mongo DB
●
List of Experiments:
COURSE OUTCOMES
CO1: Design and Implement Forms, inputs and Services using Angular JS K3
CO2: Develop a simple web application using Nodejs; Angular JS and Express K4
CO1 2 1 3 1 3 - - - - - - 3 2 2
CO2 1 1 1 1 3 - - - - - - 1 1 1
CO3 3 3 3 3 3 - - - - - - 2 2 2
CO4 2 3 3 2 3 - - - - - - 2 3 2
CO5 3 2 2 1 1 - - - - - - 2 1 3
✔ ✔ ✔
Demonstration /
Record MCQ Projects Viva
Presentation
✔ ✔ ✔
LIST OF ALL PROFESSIONAL ELECTIVE COURSES
Course Objective:
To understand the mathematical background for cryptography .
●
To understand the taxonomy of cryptography primitives
●
To understand the Symmetric key encryption system, public key encryption system
●
To implement cryptographic algorithms
●
UNIT I - INTRODUCTION 9
Cryptography goals – Taxonomy of cryptography primitives – Background on functions – Basic terminology – Definition
and examples – Block ciphers, stream cipher, substitution ciphers, transposition ciphers – Composition of ciphers –
Digital signature – Construction of digital signature – Public key cryptography – Hash functions – Protocol and
mechanism – Key establishment and management – Pseudo random numbers – Classes of attack.
TOTAL: 45 h
TEXT BOOK :
1. A.Menezes, P.Van Oorschot and S. Vanstone, “Hand book of Applied Cryptography” CRC Press, Fifth
Printing, 2001.
REFERENCEBOOKS :
1. Charlie Kaufman, Radia Perlman, Mike Speciner, “ Network Security, Private communication in public world” PHI
2nd edition 2002.
2. Bruce Schneier, Neils Ferguson, “Practical Cryptography”, Wiley Dreamtech India Pvt Ltd, 2003
3. Douglas R Simson “Cryptography – Theory and practice”, CRC Press 1995. 3. Stallings, “Cry ptography& Network
Security”, Pearson Education, 4th Edition 2006.
Course Knowledge
Description
Outcome Level
CO1 Understand the basics of cryptographic algorithms and protocols K3
Analyze the concept of Public key cryptography, Hash functions, Key establishment and
CO2 management K4
Acquire knowledge on encryption algorithms such as Block cipher, DES, FEAL, IDEA and
CO3 SAFAR K3
Evaluate the performance of Hash function, data integrity and message authentication
CO4 K5
Assess existing applications of cryptography and develop new protocols and applications that
CO5 K6
employ cryptography.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 3 1 1 2 3 1 1 2 - 1 2 -
CO2 2 3 2 2 2 3 1 2 3 2 2 2 2 2
CO3 2 3 2 2 1 3 1 2 3 2 2 2 2 2
CO4 2 3 2 3 3 3 2 3 2 2 3 2 3 3
CO5 2 3 3 2 3 3 3 2 2 3 3 3 3 3
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Demonstration /
Quiz MCQ Projects Seminars
Presentation
✔ ✔
⮚ To explore the fundamental concepts of big data analytics, Hadoop, R programming and HiveQL
To learn big data analytics using R Programming
⮚
Introduction to Big Data Platform – Challenges of Conventional Systems - Nature of Data- Evolution Of
Analytic Scalability - Intelligent data analysis- Analytic Processes and Tools - Analysis vs. Reporting -
Modern Data Analytic Tools - Statistical Concepts: Sampling Distributions - Re-Sampling - Statistical
Inference - Prediction Error
UNIT II Hadoop 9
History of Hadoop- The Hadoop Distributed File System – Components of Hadoop-Analyzing the Data with
Hadoop Scaling Out- Hadoop Streaming- Design of HDFS-Java interfaces to HDFS Basics- Developing a Map
Reduce Application-How Map Reduce Works-Anatomy of a Map Reduce Job run-Failures-Job Scheduling-
Shuffle and Sort – Task execution - Map Reduce Types and Formats- Map Reduce Features
Introduction to HiveQL- Databases in Hive-HiveQL: Queries- SELECT … FROM Clauses , Specify Columns
with Regular Expressions , Computing with Column Values , Arithmetic Operators, Using Functions-
Mathematical functions, Aggregate functions, Table generating functions, Other built-in functions ,LIMIT
Clause ,Nested SELECT Statements, CASE … WHEN … THEN Statements, WHERE Clauses, Predicate
Operators, LIKE and RLIKE, GROUP BY Clauses , HAVING Clauses ,JOIN Statements -Inner JOIN ,LEFT OUTER
JOIN,RIGHT OUTER JOIN, FULL OUTER JOIN, Cartesian Product JOINs , Map-side Joins, ORDER BY and SORT
BY, DISTRIBUTE BY with SORT BY , CLUSTER BY
Analyzing, Visualization and Exploring the Data, Statistics for Model Building and Evaluation, Introduction
to R and RStudio, Basic analysis in R, Intermediate R, Intermediate analysis in R, Advanced Analytics - K-
means clustering, Association rules-Speedup, Linear Regression, Logistic Regression, Naïve Bayes,
Decision Trees, Time Series Analysis, Text Analysis
UNIT V Frameworks 9
Applications on Big Data Using Pig and Hive – Data processing operators in Pig – Hive services –-
fundamentals of HBase and ZooKeeper - IBM InfoSphere BigInsights and Streams. Visualizations - Visual
data analysis techniques, interaction techniques; Systems and applications
TOTAL : -- 45 hours
Text Books:
T7: Prajapati, Big Data Analytics with R and Hadoop, 2014
T8: Stephan Kudyba, Big Data, Mining, and Analytics: Components of Strategic Decision Making, Auerbach
Publications, March 12, 2014 .
T9: Michael Minelli (Author), Michele Chambers (Author), Ambiga Dhiraj (Author) , Big Data, Big Analytics:
Emerging Business Intelligence and Analytic Trends for Today's Businesses, Wiley Publications,2013
T10: Jason Rutherglen, Dean Wampler and Edward Capriolo, Programming Hive, O’REILLY, 2012
Reference Books:
R7: Michael Berthold, David J. Hand, ―Intelligent Data Analysis‖, Springer, 2007.
R8: Tom White ― Hadoop: The Definitive Guide‖ Third Edition, O‘reilly Media, 2012.
R9: Chris Eaton, Dirk De Roos, Tom Deutsch, George Lapis, Paul Zikopoulos, ―Understanding Big Data:
Analytics for Enterprise Class Hadoop and Streaming Data‖, McGraw Hill Publishing, 2012
R10: Anand Rajaraman and Jeffrey David Ullman, ―Mining of Massive Datasets, Cambridge University Press,
2012.
R11: Bill Franks, ―Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data Streams with Advanced
Analytics, JohnWiley& sons, 2012.
R12: Glenn J. Myatt, ―Making Sense of Data, John Wiley & Sons, 2007
R13: Dr. Mark Gardener, Beginning R: The Statistical Programming Language (Wrox), 2013
R14: PeteWarden, ―Big Data Glossary, O‘Reilly, 2011.
R15: Jiawei Han, MichelineKamber ―Data Mining Concepts and Techniques, Second Edition, Elsevier,
Reprinted 2008.
R16: Da Ruan,Guoquing Chen, Etienne E.Kerre, GeertWets, Intelligent Data Mining, Springer,2007
R17: Paul Zikopoulos ,Dirk deRoos , Krishnan Parasuraman , Thomas Deutsch , James Giles , David Corrigan ,
Harness the Power of Big Data The IBM Big Data Platform, Tata McGraw Hill Publications, 2012.
R18: Michael Minelli (Author), Michele Chambers (Author), AmbigaDhiraj (Author) , Big Data, Big Analytics:
Emerging Business Intelligence and Analytic Trends for Today's Businesses,Wiley Publications,2013
R19: Zikopoulos, Paul, Chris Eaton, Understanding Big Data: Analytics for Enterprise Class Hadoop and
Streaming Data, Tata McGraw Hill Publications, 2011
COURSE OUTCOMES
CO1: Identify the purpose and need of big data programming and compare it with
K3
conventional systems.
CO2: Examine and compare various Components of Hadoop and develop a Map Reduce
K4
application.
CO3:
Develop Hive queries using HiveQL interface. K3
CO4: Discuss various statistics modeling techniques and its evaluation using R and other
K6
clustering methods.
Discuss various big data frameworks, Applications on Big Data Using Pig,
CO5:
fundamentals HBASE, Zookeeper, IBM Info Sphere Big Insights and also test Visual K6
data analysis techniques
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 3 3 3 2 - - - - - - - - 3
CO2 3 2 2 2 2 - - - - - - - - 3
CO3 3 3 3 2 2 - - - - - - - - 3
CO4 2 3 2 2 3 - - - - - - - - 3
CO5 2 2 3 2 3 - - - - - - - - 3
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔ ✔
CSE Bioinformatics 3 0 0 3
Course Objectives
⮚ To study the scope of Bioinformatics, types of Databases and their uses, Tools and Algorithms
To learn the Pair wise Sequence Alignment methods
⮚
UNIT I Bioinformatics: An Introduction 9
UNIT II Databases 9
Introduction- Need for Tools- Knowledge Discovery- Data- Mining Tools- Data Submission tools-
Nucleotide Sequence Submission and Protein Submission tools- Data Analysis tools- Prediction Tools-
Phylogenetic trees and Phylogenetic Analysis- Modelling Tools
UNIT IV Algorithms 9
Introduction- Genome Analysis- Genome mapping- The Sequence Assembly Problem- Genome
Sequencing- Biological Motivation of Alignment Problems Methods of Sequence Alignments- Using
Scoring matrices- Measuring Sequence Detection Efficiency- Working with FASTA and BLAST
TOTAL : -- 45 hours
Text Books:
T11: OrpitaBosu, Simminder KaurThukral , “Bioinformatics: Database, Tools, Algorithms”, Oxford University
Press, Chennai, 2007. (Part B---Unit-II, Part C---Unit-III, Part D---Unit-IV)
T12: Rastogi S. C., Namita Mendiratta, Parag Rastogi, “Bioinformatics: Methods and Applications: Genomics,
Proteomics and Drug Discovery”, Third Edition, PHI Learning Pvt. Ltd., New Delhi, 2011. (Chapter-1---Unit-I,
Chapter 3,4 and 6--Unit-V)
Reference Books:
R20: Bryan Bergeron, “Bioinformatics computing”, PHI Learning Pvt. Ltd, New Delhi, 2010.
R21: Rastogi S.C., Namita Mendiratta, Parag Rastogi, “Bioinformatics: Concepts”, Skills & Applications, Second
Edition, CBS Publishers & Distributors Pvt. Ltd, 2009
R22: Arthur M. Lesk, “Introduction to Bioinformatics”, Third Edition, Oxford University Press, Chennai, 2010
R23: Gautham N., “Bioinformatics: Databases and Algorithms”, alpha Science 2006
Web Links:
1. http://staff.aub.edu.lb/~webbic/nemer/index.html
2. http://bip.weizmann.ac.il/education/course/introbioinfo/04/lect1/introbi oinfo04/index.html
3. http://engineeringppt.net/algorithms-in-bioinformatics-pdf-lecture- notes/
COURSE OUTCOMES
CO1:
Comprehend the data management and analysis of Bio Informatics K3
CO2:
Understand the Structure Database Collaboration like PDB, CATH, SCOP K3
CO3:
Analyze the various Tools for data mining, submission and prediction K4
CO4:
Implement the Classification of Algorithms and prediction of protein structure K6
CO5:
Measure sequence detection efficiency in bioinformatics K5
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 2 - - - - - - - - 3
CO2 3 2 2 2 2 - - - - - - - - 3
CO3 3 3 3 2 2 - - - - - - - - 3
CO4 2 3 2 2 3 - - - - - - - - 3
CO5 2 2 3 2 3 - - - - - - - - 3
ASSESSMENT METHODS:
CAT 1 CAT 2 Model Exam End Semester Assignments Case Studies
Exams
✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔ ✔
OCSE01 CLOUD COMPUTING 3 0 0 3
Course Objectives
Cloud Computing : Vision, reference model, characteristics and challenges – historical development –
building cloud computing environment – computing platforms and Technologies – Parallel Vs distributed
computing – Elements of parallel and distributed computing – Technologies for distributed computing.
Cloud Computing Architecture: Cloud reference model - NIST Cloud Computing Reference Architecture –
types of Clouds - economics – open challenges.
UNIT II VIRTUALIZATION 9
Cloud Computing and Services Model – Public, Private and Hybrid Clouds – Cloud Eco System - IaaS - PaaS
– SaaS. Architectural Design of Compute and Storage Clouds – Layered Cloud Architecture Development
– Design Challenges - Inter Cloud Resource Management – Resource Provisioning and Platform
Deployment – Global Exchange of Cloud Resources. Case Study: Amazon Web Service reference, GoGrid,
Rackspace
Cloud capabilities and platform features – data features and databases - Parallel and Distributed
Programming Paradigms – MapReduce , Twister and Iterative MapReduce – Hadoop Library from Apache
– Dryad and DryadLINQ – sawzall and Pig Latin - Mapping Applications - Programming Support of Google
App Engine - Amazon AWS –Microsoft Azure - Cloud Software Environments -Eucalyptus, Open Nebula,
OpenStack. Case Study: Amazon Web Service reference, GoGrid, Rackspace.
TOTAL : 45 hours
Text Books:
T1: Kai Hwang, Geoffrey C Fox, Jack G Dongarra, “Distributed and Cloud
Computing, From Parallel Processing to the Internet of Things”, Morgan Kaufmann Publishers, 2012.
Reference Books:
R24: James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for
R25: George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in the
Cloud” O'Reilly.
R26: Ronald L. Krutz, Russell Dean Vines, “Cloud Security – A comprehensive Guide to Secure Cloud
Computing”, Wiley – India, 2010.
Web Links:
9. https://onlinecourses.nptel.ac.in/noc22_cs20/preview.
10. https://www.w3schools.in/cloud-computing.
COURSE OUTCOMES
Gain a basic knowledge of virtualization and its categorization and Design & develop
CO2: K3, K6
highly scalable cloud-based applications by creating and configuring virtual machines.
Compare, contrast, and evaluate the key trade-offs between multiple approaches to
CO3: cloud system design, and Identify appropriate design choices when solving real - world K4
cloud computing problems.
Interpret some important cloud computing driven commercial systems such as: Google
CO4: Apps, Microsoft Azure and Amazon Web Services and other businesses cloud K5
applications.
CO5: Build and deploy cloud application using popular cloud platforms. K6
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 3 0 3 - - - - - - - - 3
CO2 3 2 2 3 2 - - - - - - - - 3
CO3 3 2 3 3 3 - - - - - - - - 3
CO4 2 2 2 3 0 - - - - - - - - 3
CO5 0 2 3 3 3 - - - - - - - - 3
ASSESSMENT METHODS:
✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔
OCSE01 CRYTOGRAPHY AND NETWORK SECURITY 3 0 0 3
Course Objectives
To understand the fundamental principles, algorithms of cryptographic techniques and expose
⮚
them to various scenarios of cyber crime with an introduction to cyber law along with a thrust on
security on the internet
To develop an understanding of information assurance as practiced in computer operating
⮚
systems, distributed systems, networks and representative applications.
Text Books:
T1 William Stallings, “Cryptography and Network Security – Principles and Practices”, Prentice Hall of India,
Third Edition, 2003.
Reference Books:
R1 Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.
R2 Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Third Edition, Pearson education
Web Links:
1. https://www.tutorialspoint.com/cryptography/index.html
2. https://onlinecourses.nptel.ac.in/noc21_cs16/preview
COURSE OUTCOMES
CO1: Understand OSI security architecture and the design principles of Block cipher K3
CO2 3 3 2 3 2 - - - - - - - 3 3
CO3 3 2 3 3 3 - - - - - - - 3 2
CO4 2 2 2 3 - - - - - - - - 2 1
CO5 - 2 3 3 3 - - - - - - - 2 3
ASSESSMENT METHODS:
CAT 1 CAT 2 Model Exam End Assignments Case
Semester Studies
Exams
Course Objective:
Laws Affecting Forensic Investigations – Search Warrants and Subpoenas – Legislated Privacy Concerns –
The admissibility of Evidence – First Response and Digital Investigator
Data Acquisition – Finding Lost Files – Document Analysis – Case Management and Report Writing –
Building a Forensics Workstation
Tools of the Digital Investigator - Licensing and Certification – Case Studies: E-mail Forensics – Web
Forensics – Searching the Network – Excavating a Cloud – Mobile device Forensics.
TOTAL: 45 h
TEXT BOOKS:
1. Michael Graves, ―Digital Archaeology: The Art and Science of Digital Forensics, Addison-Wesley
Professional, 2014.
3. Albert J. Marcella and Frederic Guillossou, ―Cyber Forensics: From Data to Digital Evidence ―, Wiley,
2015.
REFERENCE BOOK:
1. Bill Nelson, Amelia Phillips and Christopher Steuart, ―Guide to Computer Forensics and Investigations‖,
Fourth Edition, Cengage, 2013.
Web Links:
https://nptel.ac.in/courses/106106129
https://www.techtarget.com/searchsecurity/definition/computer-forensics
COURSE OUTCOMES:
At the end of this course the students will be able to,
Course Knowledge
Description
Outcome Level
CO1 Acquire knowledge on Forensic Investigative smart practices. K3
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Demonstration /
Quiz MCQ Projects Seminars
Presentation
✔ ✔
Course Objective:
To introduce the concept of data warehousing with special emphasis on architecture and design.
✔
To introduce the concept of data mining with a detail coverage of basic tasks, metrics, issues,
✔
andimplication.
To learn the core topics like classification, clustering and association rules.
✔
UNIT I DATA WAREHOUSING 9
Data warehousing Components:Data Warehouse Database, Sourcing, Acquisition, Cleanup and
TransformationTool,Data Warehouse Administration and Management, Information Delivery System –
Building a Data warehouse –- Mapping the Data Warehouse to a Multiprocessor Architecture – DBMS
Schemas for Decision Support – Data Extraction, Cleanup, and Transformation Tools –Metadata.
UNIT II BUSINESS ANALYSIS 9
Reporting and Query tools and Applications – Tool Categories – The Need forApplications – Cognos
Impromptu Online Analytical Processing (OLAP) – Need –Multidimensional Data Model – OLAP Guidelines
–Multidimensional versusMultirelational OLAP – Categories of Tools – OLAP Tools and the Internet -Data
CubeTechnology, From Data warehousing to Data Mining.
UNIT III DATA MINING 9
Introduction – Data – Types of Data – Data Mining Functionalities – Interestingness ofPatterns –
Classification ofData Mining Systems- comparison of classification and prediction methods – Data Mining
Task Primitives –Integration of a Data Mining System with a Data Warehouse – Issues –
DataPreprocessing.-, Mining Descriptive
Statistical Measures in Large Databases.
UNIT IV ASSOCIATION RULE MINING AND CLASSIFICATION 9
Mining Frequent Patterns, Associations and Correlations – Mining Methods – Mining various Kinds of
Association Rules – Correlation Analysis – Constraint BasedAssociation Mining – Classification and
Prediction - BasicConcepts - Decision TreeInduction - Bayesian Classification – Rule Based Classification –
ClassificationByBackpropagation – Support Vector Machines – Associative Classification – LazyLearners –
Other Classification
Methods – Prediction
UNIT V CLUSTERING, APPLICATIONS AND TRENDS IN DATA MINING 9
Cluster Analysis - Types of Data – Categorization of Major Clustering Methods – K-means– Partitioning
Methods –Hierarchical Methods - Density-Based Methods –GridBased Methods – Model-Based Clustering
Methods –Clustering High Dimensional Data- Constraint – Based Cluster Analysis – Outlier Analysis – Data
Mining Applications.- Case Study.
TOTAL:45 h
TEXT BOOKS:
1. Alex Berson and Stephen J. Smith, “ Data Warehousing, Data Mining & OLAP”, TataMcGraw – Hill
Edition,Tenth Reprint 2007.(I & II)
2. Jiawei Han and Micheline Kamber, “Data Mining Concepts and Techniques”, SecondEdition, Elsevier,
2007.(IIIto V)
REFERENCES:
1. Pang-Ning Tan, Michael Steinbach and Vipin Kumar, “Introduction To Data Mining”,Person Education,
2007.
2. K.P. Soman, Shyam Diwakar and V. Ajay “, Insight into Data mining Theory andPractice”, Easter
EconomyEdition, Prentice Hall of India, 2006.
3. G. K. Gupta, “Introduction to Data Mining with Case Studies”, Easter EconomyEdition, Prentice Hall of
India,2006.
4. Daniel T.Larose, “Data Mining Methods and Models”, Wile-Interscience, 2006.
Web Links:
W1:https://onlinecourses.nptel.ac.in/noc21_cs06/preview
Course Outcomes
CO1 Apply the basic concepts of DBMS with datawarehousing and datamining K3
CO2 Identify the datawarehouse components to build a data warehouse. K3
CO5 Identify the issues and understand the integration of a data mining system K3
with a datawarehouse
CO5 Explain cluster analysis, outlier analysis and data mining applications K5
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 3 2 1 1 2 2 2 2 3 2
CO2 2 3 3 3 3 2 1 1 2 2 2 2 3 2
CO3 3 3 3 3 3 2 1 1 2 2 2 2 3 2
CO4 3 3 3 3 3 2 1 1 2 2 2 2 3 2
CO5 2 3 3 3 3 2 1 1 2 2 2 2 3 2
2.6 3 3 3 3 2 1 1 2 2 2 2 3 2
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Demonstration /
Quiz MCQ Projects Seminars
Presentation
✔ ✔
OCSE01 E COMMERCE 3 0 0 3
Course Objectives
To understand the nature of e-Commerce and recognize the business impact and potential of e-
⮚
Commerce
To learn the technologies required to make e-Commerce viable.
⮚ To know about the current drivers and inhibitors facing the business world in adopting and
⮚
using e-Commerce
UNIT I Introduction 9
Traditional commerce and Ecommerce - Categories of Electronic commerce – Business models – Revenue
models – Business processes. Internet and WWW–role of WWW–value chains–strategic business –
Revenue Strategy issues – Industry value chains - supply chain management–role of Ecommerce
Packet switched networks–Routing packets. TCP/IP protocol script: IP Addressing – Domain names – E-
mail protocols. Internet utility programs–SGML,HTML and XML–web client and servers–Web client/server
architecture– intranet and extranets – Public and private networks – Virtual private network
Web server: Server computers –performance evaluation – Hardware architectures. Web server software
feature sets–web server software and tools– Internet Utility programs – Data analysis software – Link
checking utilities. web protocol–search engines–intelligent agents –EC software– webhosting–cost
analysis
UNIT IV Security 9
TOTAL : -- 45 hours
Text Books:
CO1: K3
Construct the implement various business models of E-Commerce
CO2: K4
Develop a policy and regulatory issues in E-commerce
CO3: K5
Evaluate the basic networking concepts
CO4: K3
Make use of the web client server architecture
CO5: Develop and acquire knowledge on web server concepts and its performance K6
evaluation
MAPPING OF COURSE OUTCOMES TO PROGRAM OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 2 - - - - - - - - 3
CO2 3 2 2 2 2 - - - - - - - - 3
CO3 3 3 3 2 2 - - - - - - - - 3
CO4 2 3 2 2 3 - - - - - - - - 3
CO5 3 2 3 2 3 - - - - - - - - 3
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔ ✔
Course Objectives
To understand how intruders escalate privileges.
⮚ To understand Intrusion Detection, Policy Creation, Social Engineering, Buffer Overflows and
⮚
different types of Attacks and their protection mechanisms
⮚ To learn about ethical laws and tests
TOTAL : 45 hours
TEXT BOOKS:
T1: Michael T. Simpson, Kent Backman, James E. “Corley, Hands‐On Ethical Hacking and Network Defense”,
Second Edition, CENGAGE Learning, 2010.
REFERENCE BOOKS:
R1: Steven DeFino, Barry Kaufman, Nick Valenteen, “Official Certified Ethical Hacker Review Guide”,
CENGAGE Learning, 2009-11-01.
R2: Patrick Engebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration
Testing Made Easy”, Syngress Basics Series – Elsevier, August 4, 2011.
R3: Whitaker & Newman, “ Penetration Testing and Network Defense” , Cisco Press, Indianapolis, IN, 2006
COURSE OUTCOMES
CO1: Utilize the basics of ethical hacking, elements of Information Security, authenticity,
K3
non-repudiation and security challenges
CO2: Develop a acquire knowledge on Malicious Software (Malware), Protection Against
K4
Malware and Intruder Attacks on Computers
CO3: Evaluate the web tools for Foot Printing, Competitive Intelligence and Google
K5
Hacking.
CO4: Determine Proxy & Packet Filtering, Denial of Service, Sniffer, Social Engineering
K5
and shoulder surfing
CO5:
Develop Analyze Attacks and enhance Physical Security, and Protection K6
MAPPING OF COURSE OUTCOMES TO PROGRAM OUTCOMES
CO 3 3 3 3 2 - - - - - - - - 3
1
CO 2 2 2 2 2 - - - - - - - - 3
2
CO 3 3 3 2 2 - - - - - - - - 3
3
CO 2 3 2 2 3 - - - - - - - - 3
4
CO 2 2 3 2 3 - - - - - - - - 3
5
ASSESSMENT METHODS:
Course Objectives
To provide an in-depth introduction to technologies and techniques currently used in the game
⮚
industry
⮚ To understand game design and development
⮚ To understand the processes, mechanics, issues in game design, and game engine development
To understand modeling, techniques, handling situations, and logic
⮚ To build and then integrate technologies such as multimedia, artificial intelligence, and physics
⮚
modeling into a cohesive, interactive game application.
Overview of game programming -Structure of a typical game team - game industry - game engine history
-Real Time Game Architecture - Engine Support: Subsystem Start-Up and Shut-Down - Memory
Management - Containers and Strings - Resource Management: File System, Resource Manager.
UNIT II Basics of 2D & 3D Graphics and Mathematics in Gaming & Rendering engine 9
2D Graphics: Sprites, Tiled Images and Backgrounds - 3D Graphics: 3D Graphics Pipeline, 3D Math,
Coordinates and Coordinate Systems - Quaternion Mathematics - Transformations & Geometry - The
Rendering Engine: Triangle Rasterization, The Rendering Pipeline
Ray Tracing - Lighting in Computer Graphics - Types of Light Sources - Light Models - Materials: Lambert
Diffuse, Phong - Bump Mapping - Lighting Technique: Point Lights, Bloom - Shadows in Games: Real-Time
Versus Preprocessed Shadows, Types of Shadows, Texture mapping techniques - Special Effects: Blurring,
Particle Systems, Weapon Effects
Why Games for Artificial Intelligence - Why Artificial Intelligence for Games - Game AI Panorama:
Methods (Computer) Perspective, End User (Human) Perspective, Player-Game Interaction Perspective.
UNIT V Solving search problems for Game move prediction and optimization using AI 9
Tree Search: Uninformed Search, Best-First Search, Minimax, Monte Carlo Tree Search - Evolutionary
Algorithms - Supervised Learning: Artificial Neural Networks, Support Vector Machines.
TOTAL:45 h
TEXT BOOKS:
T1: Game Engine Architecture, 3rd Edition, Jason Gregory, A K Peters, 2019.
T2: Palmer G. Physics for game programmers. Berkeley: Apress; 2005
T3: Artificial Intelligence and Games, Georgios N. Yannakakis and Julian Togelius, January 26, 2018,
Springer
REFERENCES:
Web Links:
L1: https://onlinecourses.nptel.ac.in/noc19_ge32/preview
COURSE OUTCOMES
At the end of this course the students will be able to,
CO1: Understand the basics of Game Programming and Game Engine Architecture. 2
CO2: Develop 2D and 3D Images using Mathematical coordinates 4
CO3: Apply various Lighting and Texturing Effects in game environment. 3
CO4: Extend the Game Programming using Artificial Intelligence. 2
CO5: Solve search problems for Game move prediction and optimization using AI. 6
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Demonstration /
Quiz MCQ Projects Seminars
Presentation
✔ ✔
CSE INFORMATION RETRIEVAL TECHNIQUES 3 0 0 3
COURSE OBJECTIVES
Basic Concepts: Retrieval process – Architecture – Boolean retrieval; IR Models: Taxonomy and
characterization of IR models – Classical IR models – Alternative algebraic models – Models for Browsing
– Retrieval Evaluation: Performance evaluation.
Searching: Sequential searching – Pattern matching; Searching the Web: Characteristizing the Web –
Search engines – Browsing – Searching using hyperlinks.
Text Classification: Naive Bayes; Vector Space Classification: Rocchio – k-Nearest Neighbour; Flat
Clustering: K-Means – Model-based clustering – Hierarchical clustering – Matrix decompositions and
latent semantic indexing.
UNIT V APPLICATIONS 9
XML Retrieval – Multimedia IR – Parallel and Distributed IR – Digital Libraries – Social Media Retrieval –
Content-based Image Retrieval – Online Public Access Catalogs (OPACs).
Total Periods: 45
TEXT BOOKS
1. Ricardo Baeza Yates, BerthierRibeiroNeto, “Modern Information Retrieval: The Concepts and
Technology behind Search”, ACM Press Books, 2nd Edition, 2011.
REFERENCES
2. Cheng Xiang Zhai, Sean Massung, “Text Data Management and Analysis: A Practical Introduction
to Information Retrieval and Text Mining”, ACM Books, 2016.
3. Reza Zafarani, Mohammad Ali Abbasi, Huan Liu, “Social Media Mining: An Introduction”, 1st
Edition, Cambridge University Press, 2014.
4. VipinTyagi, “Content-Based Image Retrieval: Ideas, Influences, and Current Trends”, 1st Edition,
Springer, 2017.
COURSE OUTCOMES
3. Apply machine learning techniques to text classification and clustering for efficient Information
Retrieval (K3)
CO PO MAPPING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
K3 K4 K5 K5 K6 - - - - - - - K5 K3
CO1 K3 3 2 2 - 1 - - 1 1 1 - 1 2 3
CO2 K3 3 2 2 - 1 - - 1 1 1 - 1 2 3
CO3 K3 3 2 2 - 1 - - 1 1 1 - 1 2 3
CO4 K2 2 1 1 - 1 - - 1 1 1 - 1 1 2
CO5 K3 3 2 2 - 1 - - 1 1 1 - 1 2 3
Score 15 11 10 - 6 - - 5 5 5 - 5 10 15
Course Mapping 3 3 2 - 2 - - 1 1 1 - 1 2 3
COURSE OBJECTIVES:
⮚ To understand the basics of IoT and its application sectors
⮚ To understand M2M and IoT
⮚ To understand and become proficient in IoT platforms
To understand and apply IoT protocols appropriately
⮚ To design and develop IoT based applications
⮚
TOTAL: 45 hours
TEXT BOOKS:
T1: ArshdeepBahga, Vijay Madisetti, “Internet of Things, A Hands -on Approach”, 1st Edition 2015, University
Press, ISBN: 978-81-7371- 954-7
T2: Oliver Hersent, David Boswarthick, Omar Elloumy, “The Internet of Things”,1st Edition2015,ISBN: 978-81-
265-5686-1
T3: Michael Miller, “The Internet of Things, How Smart TVs, Smart Cars, Smart Homes, and Smart Cities are
changing the World”, First edition ,2015, Pearson, ISBN:978-93-325-5245-6
WEB LINKS:
1. https://archive.nptel.ac.in/courses/106/105/106105166/
2. https://nptel.ac.in/courses/108108098
3. https://thingsee.com/blog/quality-hardware-list-for-your-iot-projects
4. https://tools.ietf.org/html/rfc7452
5. http://dret.net/lectures/iot-spring15/protocols
6. http://iot.intersog.com/blog/overview-of-iot-development-standards-and-frameworks
COURSE OUTCOMES:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 1 2 3 3 3 2 - 3 2 2 2 2 3 2
CO2 1 3 3 3 3 2 - 3 2 2 2 2 3 2
CO3 1 3 3 3 3 2 1 3 2 2 2 2 3 2
CO4 1 3 3 3 3 2 - 3 2 2 2 2 3 2
CO5 2 3 3 3 3 2 1 3 2 2 2 2 3 2
1.2 2.8 3 3 3 2 0.4 3 2 2 2 2 3 2
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔
\
Course Objective:
• To understand the system modelling and design based on requirements, converting design to code.
• To use various UML design diagrams and to apply the appropriate design patterns.
• To learn the basic Object oriented analysis and design skills through an elaborate case study.
UNIT I INTRODUCTION 9
Introduction to OOAD – What is OOAD? – What is UML? An Overview of Object Oriented Systems
Development - Object Basics – Object Oriented Systems Development Life Cycle: The Software
Development Process – Building High-Quality Software – OOSD: A Use-Case Driven Approach - Use case
Modeling - Relating Use cases: include,extend and generalization.
Identifying use cases : Business object analysis –The unified approach- Business process modeling – Use
case model– Developing effective documentation - Object Analysis Classification : Classifications theory –
Approaches foridentifying classes – Noun phrase approach – Common class patterns approach – Use case
driven approach –Classes, responsibilities and collaborators – Naming classes - Identifying Object
relationships, Attributes and Methods:Associations – Super sub class relationship – A part of relationships
(aggregation) – Class responsibility – Objectresponsibility.
Design Axioms: The object oriented design process – Design axioms – Corollaries – Design patterns –
Designing Classes: The process - Class visibility – Refining attributes – Designing methods and protocols.
Access Layer: Object Storage and Object Interoperability: DBMS – Distributed databases and client server
computing – Object relational systems – Multidatabase systems – Designing Access layer classes.
View Layer : Designing Interface Objects : Designing view layer classes – Macro level , Micro level process
– Purpose of a view layer interface – Prototyping the user interface- Software Quality Assurance: Quality
Assurance Tests – Testing strategies – Impact of Object Orientation – Test Cases – Test Plan – Myer’s
Debugging Principles – System Usability and Measuring User Satisfaction : Usability Testing – User
Satisfaction Test ( Test Templates) – Mappingdesign to code.
TOTAL: 45 h
TEXT BOOKS:
2. Craig Larman,"Applying UML and Patterns: An Introduction to object-oriented Analysis and Design
and iterativedevelopment”, Third Edition, Pearson Education,2005.
REFERENCE BOOKS:
1. Mike O’Docherty, “Object-Oriented Analysis & Design: Understanding System Development with UML
2.0”, JohnWiley& Sons, 2005.
2. James W- Cooper, Addison-Wesley, “Java Design Patterns – A Tutorial”, 2000.
COURSE OUTCOMES
CO1 Construct the Software Development Process. K6
CO5 Be Familiar with thetest Cases, test Plan and Myer’s Debugging Principles K3
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Demonstration /
Quiz MCQ Projects Seminars
Presentation
✔ ✔
SOFT COMPUTING 3 0 0 3
COURSE OBJECTIVES
5. To learn hybrids of neuro, fuzzy and genetic algorithm, and their applications.
UNIT I INTRODUCTION TO SOFT COMPUTING 9
Introduction: Neural networks – Fuzzy logic – Genetic algorithm – Hybrid systems; Artificial Neural
Network: Fundamental concepts – Evolution of neural networks – Basic modals of ANN – McCulloch and
Pitts neuron – Linear separability – Hebb network.
Supervised Learning Network: Perceptron networks – Adaptive linear neuron – Multiple adaptive linear
neurons – Back propagation networks – Radial bias function network; Associative Memory Networks:
Autoassociative memory network – Bidirectional associative memory – Hopfield networks; Unspervised
Learning Networks: Hamming network – Kohonen neural network – Learning vector quantization –
Adaptive resonance theory networks.
Introduction to fuzzy logic – Classical sets – Fuzzy sets – Fuzzy relations – Membership functions –
Defuzzification methods – Fuzzy arithmetic – Fuzzy measures – Fuzzy rule base and approximate
reasoning – Fuzzy decision making.
Genetic Algorithm and search space – General genetic algorithm – Operators – Stopping condition –
Constraints – Classification – Genetic programming; Applications of genetic algorithm.
Neuro-Fuzzy hybrid systems – Genetic neuro hybrid systems – Genetic fuzzy hybrid and fuzzy genetic
hybrid systems; Applications of Soft Computing: A fusion approach of multispectral images with SAR –
Optimization of Traveling Salesman Problem using genetic algorithm – Soft computing based hybrid fuzzy
controllers.
Total Periods: 45
COURSE OUTCOMES
3. Analyse and apply fuzzy logic and fuzzy inference system (K3)
TEXT BOOKS
1. S N Sivanandam, S N Deepa, “Principles of Soft Computing”, Wiley India, 2nd Edition, 2011.
2. Jyh-Shing Roger Jang, Chuen-Tsai Sun, EijiMizutani, “Neuro-Fuzzy and Soft Computing”,
Prentice-Hall of India, 2002.
REFERENCES
1. Kwang H Lee, “First course on Fuzzy Theory and Applications”, Springer, 2005.
2. George J Klir, Bo Yuan, “Fuzzy Sets and Fuzzy Logic-Theory and Applications”, Prentice Hall,
1996.
5. N P Padhy, S P Simon, “Soft Computing with MATLAB Programming”, Oxford University Press,
2015.
CO PO MAPPING
CO1 K
3 2 - - - - - - - - - - 3 -
2
CO2 K
3 2 - - - - - - - - - - 3 -
3
CO3 K
3 - - - - - - - - - - - 2 -
3
CO4 K
3 2 - - - - - - - - - - 3 -
3
CO5 K
3 3 3 - 2 - - - - - - - 3 -
3
Score 15 9 3 - 3 - - - - - - - 14 -
Course
Mappin 3 3 3 - 2 - - - - - - - 3 -
g
Course Objective:
Introduction to Software Engineering, Software Process, Perspective and Specialized Process Models –
Introduction to Agility-Agile process-Extreme programming-XP Process.
Design process – Design Concepts-Design Model– Design Heuristic – Architectural Design -Architectural
styles, Architectural Design, Architectural Mapping using Data Flow- User Interface Design: Interface
analysis, Interface Design –Component level Design: Designing Class based components, traditional
Components.
Software testing fundamentals-Internal and external views of Testing-white box testing – basis path
testing-control structure testing-black box testing- Regression Testing – Unit Testing – Integration Testing
– Validation Testing – System Testing And Debugging –Software Implementation Techniques: Coding
practices-Refactoring-Maintenance and Reengineering-BPR model-Reengineering process model-Reverse
and Forward Engineering.
Software Project Management: Estimation – LOC, FP Based Estimation, Make/Buy Decision COCOMO I &
II Model – Project Scheduling – Scheduling, Earned Value Analysis Planning – Project Plan, Planning
Process, RFP Risk Management – Identification, Projection – Risk Management-Risk Identification-RMMM
Plan-CASE TOOLS
Total: 45h
TEXT BOOKS:
2. Ian Sommerville, ―Software Engineering, 9th Edition, Pearson Education Asia, 2011.
REFERENCE BOOKS:
1. Rajib Mall, ―Fundamentals of Software Engineering‖, Third Edition, PHI Learning PrivateLimited, 2009.
CO5 Manage project schedule, estimate project cost and effort required. K3
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Demonstration /
Quiz MCQ Projects Seminars
Presentation
✔ ✔
Course Objective:
• To develop the capability to work in a team environment and be aware of different modes of
communications.
Project Definition – Contract Management – Activities Covered by Software Project Management – Plans,
Methods and Methodologies – Management – Objectives – Stakeholders – Requirement Specification –
Management control – Activities Covered By Software Project Management – Overview Of Project
Planning – Stepwise Project Planning.
Strategic Assessment – Technical Assessment – Cost Benefit Analysis –Cash Flow Forecasting – Cost
Benefit Evaluation Techniques : Net Profit – Payback Period – Return on Investment – Net Present Value
– Internal Rate of Return – Risk Evaluation : Identification and Ranking – Cost-benefit Analysis – Risk Profile
Analysis – Using Decision Trees.
Objectives – Project Schedule – Sequencing and Scheduling Activities –Network Planning Models –
Forward Pass – Backward Pass – Activity Float – Shortening Project Duration – Activity on Arrow Networks
– Risk Management – Nature Of Risk – Types Of Risk – Managing Risk – Hazard Identification – Hazard
Analysis – Risk Planning and Control.
Creating Framework – Collecting The Data – Visualizing Progress – Cost Monitoring – Earned Value
Analysis – Prioritizing Monitoring – Getting Project Back to Target – Change Control – Managing Contracts
– Introduction – Types Of Contract – Stages In Contract Placement – Typical Terms Of A Contract –
Contract Management – Acceptance.
TOTAL : 45 h
TEXT BOOK:
1. Bob Hughes, Mikecotterell, “Software Project Management”, Third Edition, Tata McGraw Hill, 2004.
REFERENCE BOOKS:
1. Ramesh, Gopalaswamy, "Managing Global Projects", Tata McGraw Hill, 2001.
2. Royce, “Software Project Management”, Pearson Education, 1999.
3. Jalote, “Software Project Manangement in Practive”, Pearson Education, 2002.
COURSE OUTCOMES
Determine the Plans, Methods and Methodologies of Software project
CO1: K5
Management
CO2: Assess the project evaluation techniques based on cost and risk K5
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 3 - - - 1 - - - 2 3
CO2 3 2 2 3 3 - - - 1 - - - 2 3
CO3 3 3 3 3 3 - - - 1 - - - 2 3
CO4 3 3 2 3 3 - - - 1 - - - 2 3
CO5 2 2 3 3 3 - - - 1 - - - 2 3
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
✔ ✔ ✔ ✔ ✔
● To understand the quality management processes and to distinguish between various activities
of quality assurance, quality planning and quality control.
● To know the importance of standards in the quality management process and their impact on the
final product.
TOTAL : 45 h
TEXT BOOKS:
1. Mordechai Ben-Menachem / Garry S Marliss, “Software Quality”, Vikas Publishing House, Pvt, Ltd.,
New Delhi.(UNIT III to V), 2007.
2. Watts S Humphrey, “ Managing the Software Process”, Pearson Education Inc. (UNIT I and II)
REFERENCE BOOKS:
1. Gordon G Schulmeyer, “Handbook of Software Quality Assurance”, Third Edition, Artech House
Publishers 2007.
2. Nina S Godbole, “Software Quality Assurance: Principles and Practice”, Alpha Science
International, Ltd, 2004.
Course Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 3 3 3 1 2 2 2 2 3 2
CO2 2 3 3 3 3 3 3 1 2 2 2 2 3 2
CO3 3 3 3 3 3 3 3 1 2 2 2 2 3 2
CO4 3 3 3 3 3 3 3 1 2 2 2 2 3 2
CO5 2 3 3 3 2 3 3 1 2 2 2 2 3 2
Avg 2.6 3 3 3 2.8 3 3 1 2 2 2 2 3 2
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
✔ ✔ ✔ ✔ ✔
CSE SOFTWARE TESTING 3 0 0 3
Course Objectives
● To learn the principles of validation testing, defect testing, system and component testing
UNIT I Introduction 9
Testing as an Engineering Activity – Role of Process in Software Quality – Testing as a Process – Basic
Definitions – Software Testing Principles – The Tester’s Role in a Software Development Organization –
Origins of Defects – Defect Classes – The Defect Repository and Test Design – Defect Examples –
Developer/Tester Support for Developing a Defect Repository.
UNIT II TEST CASE DESIGN 9
Introduction to Testing Design Strategies – The Smarter Tester – Test Case Design Strategies – Using Black
Box Approach to Test Case Design Random Testing – Requirements based testing – positive and negative
testing -–– Boundary Value Analysis – decision tables - Equivalence Class Partitioning state-based testing–
cause effect graphing – error guessing - compatibility testing – user documentation testing – domain
testing Using White–Box Approach to Test design – Test Adequacy Criteria –static testing vs. structural
testing – code functional testing - Coverage and Control Flow Graphs – Covering Code Logic – Paths –
Their Role in White–box Based Test Design – code complexity testing – Evaluating Test Adequacy Criteria.
UNIT III LEVELS OF TESTING 9
The Need for Levels of Testing – Unit Test – Unit Test Planning –Designing the Unit Tests. The Test Harness
– Running the Unit tests and Recording results – Integration tests – Designing Integration Tests –
Integration Test Planning – scenario testing – defect bash elimination -System Testing – types of system
testing - Acceptance testing –performance testing - Regression Testing – internationalization testing – ad-
hoc testing -Alpha – Beta Tests – testing OO systems – usability and accessibility testing
UNIT IV TEST MANAGEMENT 9
People and organizational issues in testing – organization structures for testing teams –testing services -
Test Planning – Test Plan Components – Test Plan Attachments –Locating Test Items – test management
– test process - Reporting Test Results – The role of three groups in Test Planning and Policy Development
– Introducing the testspecialist – Skills needed by a test specialist – Building a Testing Group.
UNIT V CONTROLLING AND MONITORING 9
Software test automation – skills needed for automation – scope of automation – design and architecture
for automation – requirements for a test tool – challenges in automation- Test metrics and measurements
–project, progress and productivity metrics – Status Meetings – Reports and Control Issues – Criteria for
Test Completion – SCM – Types of reviews – Developing a review program – Components of Review Plans–
Reporting Review Results. – evaluating software quality – defect prevention – testing maturity Model.
TOTAL : -- 45 hours
TEXT BOOKS:
1. Srinivasan Desikan and Gopalaswamy Ramesh, “ Software Testing – Principles and Practices”, Pearson
education, 2006.
2. Aditya P.Mathur, “Foundations of Software Testing”, Pearson Education,2008.
REFERENCE BOOKS:
1. Boris Beizer, “Software Testing Techniques”, Second Edition, Dreamtech, 2003
2. Elfriede Dustin, “Effective Software Testing”, First Edition, Pearson Education, 2003.
3. Renu Rajani, Pradeep Oak, “Software Testing – Effective Methods, Tools and Techniques”, Tata
McGraw Hill,
COURSE OUTCOMES
CO1: Identify the defects by applying the testing principles K3
CO2: Develop test strategies and test cases to prioritize and execute them K6
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 3 3 3 1 2 2 2 2 3 2
CO2 2 3 3 3 3 3 3 1 2 2 2 2 3 2
CO3 3 3 3 3 3 3 3 1 2 2 2 2 3 2
CO4 3 3 3 3 3 3 3 1 2 2 2 2 3 2
CO5 2 3 3 3 2 3 3 1 2 2 2 2 3 2
2.6 3 3 3 2.8 3 3 1 2 2 2 2 3 2
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Course Objectives
UNIT I INTRODUCTION 9
System software and machine architecture – The Simplified Instructional Computer (SIC) Machine
architecture: Memory- Registers-Data and instruction formats - addressing modes -instruction sets –
Input / Output – SIC/XE Machine Architecture: Memory-Registers- Data and instruction formats -
addressing modes -instruction sets – Input / Output – Programming examples.
UNIT II ASSEMBLERS 8
Basic assembler functions : A simple SIC assembler – Assembler algorithm and data structures - Machine
dependent assembler features : Instruction formats and addressing modes – Program relocation -
Machine independent assembler features : Literals –Symbol-defining statements – Expressions –
Assembler Design Options : One pass assemblers and Multi pass assemblers - Implementation example :
MASM assembler.
TOTAL: 45 hours
Text Books:
T1: Leland L. Beck, “System Software – An Introduction to Systems Programming”, 3rd Edition, Pearson
education Asia, 2006.
T2: John R. Levine, “Linkers & Loaders”, Morgan Kauffman, 2003.
Reference Books:
R1: John J. Donovan “Systems Programming”, Tata McGraw-Hill Edition, 2000.
R2: D. M. Dhamdhere, “Systems Programming and Operating Systems”, Second Revised Edition, Tata McGraw
Hill, 2000.
R3: John R. Levine, Linkers & Loaders – Harcourt India Pvt. Ltd., Morgan Kaufmann Publishers, 2000.
R4: Srimanta Pal, “ Systems Programming “ , Oxford University Press, 2011.
COURSE OUTCOMES
After completion of course, students would be able to:
CO1: Demonstrate the machine architecture of SIC and SIC/XE.
CO2: Identify the different assembler modes and features.
CO3: Analyse different loaders with various linkage methods.
CO4: Identify the functionalities of macro processing and analyse the virtual machine
imeplementation.
CO5: Apply the basic concepts of data base management systems with programming coding
standards.
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Demonstration /
Quiz MCQ Projects Seminars
Presentation
✔ ✔
CSE INTRODUCTION TO DATA ANALYTICS 3 0 0 3
Course Objectives
⮚ To provide the knowledge and expertise to become a proficient data scientist
⮚ To explore the fundamental concepts of big data & data analytics.
⮚ To gain knowledge on Hadoop related tools such as MongoDB, Cassandra, Pig, and Hive for big
data analytics
TOTAL : -- 45 hours
TEXT BOOKS:
T1: Seema Acharya, Subhashini Chellappan, “Big Data and Analytics”, Wiley Publication, 2015
REFERENCE BOOKS:
R1: Judith Hurwitz, Alan Nugent, Dr. Fern Halper, Marcia Kaufman, “Big Data for Dummies”, John Wiley & Sons,
Inc., 2013.
R2: Tom White, “Hadoop: The Definitive Guide”, O’Reilly Publications, 2011.
R3: Kyle Banker, “Mongo DB in Action”, Manning Publications Company, 2012.
R4: Russell Bradberry, Eric Blow, “Practical Cassandra A developers Approach“, Pearson Education, 2014
COURSE OUTCOMES
CO2: K5
Interpret basic concepts of data analytics
CO3: K4
Analyze the framework for storing the data
CO4: K4
Examine about NoSQL databases
CO5: K3
Choose an appropriate framework to solve real world problems
CO 3 3 3 3 2 - - - - - - - - 3
1
CO 2 2 2 2 2 - - - - - - - - 3
2
CO 3 3 3 2 2 - - - - - - - - 3
3
CO 2 3 2 2 3 - - - - - - - - 3
4
CO 3 2 3 2 3 - - - - - - - - 3
5
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔ ✔
OCSE01 USER INTERFACE DESIGN 3 0 0 3
Course Objectives
⮚ To gain knowledge about how to create a User Interface, how to use different type of controls,
Menu usage.
To learn different types and components, different methodologies used to implement User
⮚
Interface and how to use multimedia, prototypes and analyzing different types of testing
UNIT I INTRODUCTION 9
Human Computer Interface – A brief History of Screen Design - Characteristics Of Graphics Interface –
Direct Manipulation Graphical System – Web User Interface –Popularity –Characteristic of Web Interface
Principles of User Interface Design
UNIT IVMULTIMEDIA 9
Text For Web Pages – Providing the Proper Feedback– Guidance & Assistance–International
Consideration – Accessibility– Icons– Image– Multimedia – Coloring.
TOTAL:45 h
TEXT BOOKS:
T1: Wilbent. O. Galitz ,“The Essential Guide To User Interface Design”, John Wiley& Sons, 2007.
T2: Ben Sheiderman, “Design The User Interface”, Pearson Education, 2008.
REFERENCES:
R1: Alan Cooper, “The Essential Of User Interface Design”, Wiley – Dream Tech Ltd.,2002
Web Links:
L1: https://onlinecourses.nptel.ac.in/noc21_ar05/preview
L2: https://www.coursera.org/specializations/user-interface-design
COURSE OUTCOMES
CO1: Identify the concept of Human Computer Interface and Direct Manipulation Graphical System.
CO2: Discuss User Interface Design Process, Obstacles andUsability
CO3: Compare Window Characteristics, Presentation Styles, Organizations andOperations.
CO4: Discuss International Consideration and Accessibility ofmultimedia
CO5: Analyze the concept of Visualization and Hypermedia
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Demonstration /
Quiz MCQ Projects Seminars
Presentation
✔ ✔
CSE VIRTUAL REALITY 3 0 0 3
Course Objectives
To understand geometric modeling and Virtual environment.
⮚
To study about Virtual Hardwares and Softwares
⮚
⮚
To develop Virtual Reality applications
UNIT V VR APPLICATION 9
Virtual Reality Applications: Introduction – Engineering – Entertainment – Science – Training – The Future:
Introduction – Virtual environments – modes of interaction.
TOTAL: 45 h
TEXT BOOK :
T1: John Vince, “Virtual Reality Systems “, Pearson Education Asia, 2007.
REFERENCE BOOKS:
R1: Adams, “Visualizations of Virtual Reality”, Tata McGraw Hill, 2000.
R2: Grigore C. Burdea, Philippe Coiffet , “Virtual Reality Technology”, Wiley Interscience, 2nd Edition,
2006.
R3: William R. Sherman, Alan B. Craig, “Understanding Virtual Reality: Interface, Application, and Design”,
Morgan Kaufmann, 2008.
Web Links:
L1: https://nptel.ac.in/courses/106106138
L2: www.vresources.org
L3: www.vrac.iastate.edu
L4: www.w3.org/MarkUp/VRML
COURSE OUTCOMES
At the end of this course the students will be able to,
CO1:Assess the concept of Virtual Reality, Virtual Environment and 3D Computer Graphics Shading
algorithms
CO2:Explain Geometric Modelling Know ,Geometric Transformations and Generic VR system
CO3:Appraise the details of Physical Simulation in Virtual Environment
CO4:Explain Integrated VR systems, VR Software and VRML
CO5:Develop a Virtual Reality Applications with different modes of interaction
MAPPING OF COURSE OUTCOMES TO PROGRAM OUTCOMES
PO1 PO2 PO3 P PO5 PO6 PO7 PO PO9 PO PO PO PSO1 PSO2
O4 8 10 11 12
3 2 2 2 2 3 2 - - 2 - 2 3 2
CO1
2 2 2 2 2 2 2 - - 2 - 2 3 3
CO2
3 2 2 2 2 2 2 - - 2 - 2 2 2
CO3
2 2 3 3 2 3 2 - - 3 - 2 3 2
CO4
2 3 2 3 2 2 3 - - 3 - 3 1 3
CO5
Average 2.4 2.2 2.2 2.4 2 2.4 2.2 - - 2.4 - 2.2 2.4 2.4
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Demonstration /
Quiz MCQ Projects Seminars
Presentation
✔ ✔
Course Objectives
Theories for Agile Management – Agile Software Development – Traditional Model vs. Agile Model -
Classification of Agile Methods – Agile Manifesto and Principles – Agile Project Management – Agile Team
Interactions – Ethics in Agile Teams - Agility in Design, Testing – Agile Documentations – Agile Drivers,
Capabilities and Values
Lean Production - SCRUM, Crystal, Feature Driven Development- Adaptive Software Development -
Extreme Programming: Method Overview – Lifecycle – Work Products, Roles and Practices.
Agile Information Systems – Agile Decision Making - Earl‘S Schools of KM – Institutional Knowledge
Evolution Cycle – Development, Acquisition, Refinement, Distribution, Deployment , Leveraging – KM in
Software Engineering – Managing Software Knowledge – Challenges of Migrating to Agile Methodologies
– Agile Knowledge Sharing – Role of Story-Cards – Story-Card Maturity Model (SMM).
Impact of Agile Processes in RE–Current Agile Practices – Variance – Overview of RE Using Agile –
Managing Unstable Requirements – Requirements Elicitation – Agile Requirements Abstraction Model –
Requirements Management in Agile Environment, Agile Requirements Prioritization – Agile Requirements
Modeling and Generation – Concurrency in Agile Requirements Generation.
Agile Product Development – Agile Metrics – Feature Driven Development (FDD) – Financial and
Production Metrics in FDD – Agile Approach to Quality Assurance - Test Driven Development – Agile
Approach in Global Software Development.
TOTAL : -- 45 Hours
Text Books:
T2: David J. Anderson and Eli Schragenheim, “Agile Management for Software Engineering: Applying the
Theory of Constraints for Business Results”, Prentice Hall, 2003.
T3: Hazza and Dubinsky, “Agile Software Engineering, Series: Undergraduate Topics in Computer Science”,
Springer, 2009.
Reference Books:
R4: Craig Larman, “Agile and Iterative Development: A Manager‘s Guide”, Addison-Wesley, 2004.
R5: Kevin C. Desouza, “Agile Information Systems: Conceptualization, Construction, and Management”,
Butterworth-Heinemann, 2007.
Web Links:
11. https://www.guru99.com/scrum-testing-beginner-guide.html
12. https://www.inflectra.com/Ideas/Whitepaper/Introduction%20to%20Agile%20Development%20Method
s.aspx
COURSE OUTCOMES
CO3: Point out the impact of social aspects on software development success K1
Develop techniques and tools for improving team collaboration and software
CO4: quality. K6
Perform Software process improvement as an ongoing task for development teams.
CO5: K3
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 3 - - - - - - - - 3
CO2 3 2 2 3 3 - - - - - - - - 3
CO3 3 3 3 3 3 - - - - - - - - 3
CO4 2 3 2 3 3 - - - - - - - - 3
CO5 1 2 3 3 3 - - - - - - - - 3
ASSESSMENT METHODS:
√ √ √ √ √ √
√ √ √ √ √
CSE INFORMATION SECURITY 3 0 0 3
Course Objective:
• To understand the basics of Information Security and to know the legal, ethical and professional issues in
Information Security.
• To know the aspects of risk management and to become aware of various standards and the technological
aspects of Information Security.
UNIT I INTRODUCTION 9
Need for Security- Business Needs: protecting the functionality of an organization, enabling the safe
operation of an application, protecting the data that organization collects and use, safeguarding
technology assets in organization- Threats-Attacks- Legal, Ethical and Professional Issues: Law and ethics
in Information security, relevant U.S Laws, International laws and legal bodies, ethics and information
security, codes of ethics and professional organization.
Risk Management: Introduction- Risk Identification: plan and organize the process, asset identification
and inventory, classifying and prioritizing information assets, information assets valuation, identifying and
prioritizing threats, vulnerability identification and Assessing Risk, Assessing and Controlling Risk
Blueprint for Security- Information Security Policy, Standards and Practices- ISO17799/BS 7799-NIST
Models-VISA International Security Model- Design of Security Architecture- Planning for Continuity:
Business impact analysis, incident response planning, disaster recovery planning, business continuity
planning, crisis management, model for a consolidated contingency plan, law enforcement involvement.
TOTAL: 45h
TEXT BOOK:
1. Michael E Whitman and Herbert J Mattord, “Principles of Information Security”, Vikas Publishing
House, New Delhi, 2003
REFERENCE BOOKS:
1. Micki Krause, Harold F. Tipton, “ Handbook of Information Security Management”, Vol 1-3 CRC Press
LLC, 2004.
2. Stuart Mc Clure, Joel Scrambray, George Kurtz, “Hacking Exposed”, Tata McGraw- Hill, 2003
Web Links:
http://web.cse.ohio-state.edu/~champion.17/4471/
https://slideplayer.com/slide/4409575/
COURSE OUTCOMES:
CO2 3 3 3 3 3 2 - 3 2 2 2 2 3 2
CO3 3 3 3 3 3 2 1 3 2 2 2 2 3 2
CO4 3 3 3 3 3 2 - 3 2 2 2 2 3 2
CO5 2 3 3 3 3 2 1 3 2 2 2 2 3 2
Averag 2.8 3 3 3 3 2 0.4 3 2 2 2 2 3 2
e
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Demonstration /
Quiz MCQ Projects Seminars
Presentation
✔ ✔
OCSE01 SOFTWARE DEFINED NETWORKS 3 0 0 3
Course Objectives
To learn about the use and application of SDN in Data centers
●
To understand the separation of the data plane and the control plane
●
History of Software Defined Networking (SDN) – Modern Data Center – Traditional Switch Architecture –
Why SDN – Evolution of SDN – How SDN Works – Centralized and Distributed Control and Date Planes
Open Flow Specification – Drawbacks of Open SDN, SDN via APIs, SDN via Hypervisor-Based Overlays –
SDN via Opening up the Device – SDN Controllers – General Concepts
Multitenant and Virtualized Multitenant Data Center – SDN Solutions for the Data Center Network –
VLANs – EVPN – VxLAN – NVGRE
UNIT IV SDN PROGRAMMING 9 hours
Programming SDNs: Northbound Application Programming Interface, Current Languages and Tools,
Composition of SDNs – Network Functions Virtualization (NFV) and Software Defined Networks: Concepts,
Implementation and Applications.
UNIT V SDN 9 hours
Juniper SDN Framework – IETF SDN Framework – Open Daylight Controller – Floodlight Controller –
Bandwidth Calendaring – Data Center Orchestration
TOTAL : -- 45 hours
Text Books:
1. Thomas D. Nadeau, Ken Gray, ―SDN: Software Defined Networks, O'Reilly Media, 2013.
2. Paul Goransson and Chuck Black, ―Software Defined Networks: A Comprehensive Approach,
First Edition, Morgan Kaufmann, 2014.
Reference Books:
1. Siamak Azodolmolky, ―Software Defined Networking with Open Flow, Packet Publishing, 2013.
2. Vivek Tiwari, ―SDN and Open Flow for Beginners, Amazon Digital Services, Inc., 2013.
Web Links:
13. https://opennetworking.org/wp-N_ARCH_1.0_06062014.pdfOnline
14. https://www.ciena.com/insights/what-is/What-Is-SDN.html
COURSE OUTCOMES
CO2: Articulate the design of open flow specification of SDN via Hypervisor K3
CO3: Hypothesizing the Virtualized Multitenant Data Center SDN and VxLAN K5
CO5: Mind mapping the view of IETF SDN Framework and Data Center Orchestration K4
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 3 2 3 - - - 1 1 2 1 2 2
CO2 3 2 2 2 2 - - - 1 1 2 1 2 2
CO3 2 2 2 2 3 - - - 1 1 2 1 2 2
CO4 2 2 2 2 2 - - - 1 1 2 1 2 2
CO5 2 2 3 2 3 - - - 1 1 2 1 2 2
ASSESSMENT METHODS:
OCSE01 APPLICATIONS OF AI 3 0 0 3
Course Objectives
⮚ To give deep knowledge of AI and how AI can be applied in various fields to make the life easy
UNIT I 9hours
Linguistic aspects of natural language processing, A.I. And Quantum Computing, Applications of
Artificial Intelligence (AI) in business.
UNIT II 9hours
Emotion Recognition using human face and body language, AI based system to predict the diseases
early, Smart Investment analysis, AI in Sales and Customer Support
UNIT IV 9 hours
AI-Optimized Hardware, Digital Twin i.e. AI Modelling, Information Technology & Security using AI.
UNIT V 9hours
Recent Topics in AI/ML: AI/ML in Smart solutions, AI/ML in Social Problems handling, Block chain and
AI.
Text Books:
T1: Sameer Dhanrajani, AI and Analytics, Accelerating Business Decisions, John Wiley & Sons.
T2: Life 3.0: Being Human in the Age of Artificial Intelligence by Max Tegmark, published July 2018.
T3: Homo Deus: A Brief History of Tomorrow by Yuval Noah Harari, published March 2017.
T4: Artificial Intelligence in Practice: How 50 Successful Companies Used AI and Machine Learning to Solve
Problems, Bernard Marr, Matt Ward, Wiley.
Reference Books:
R6: Somogyi, Zoltán. The Application of Artificial Intelligence: Step-by-Step Guide from Beginner to
Expert. Switzerland, Springer International Publishing, 2022.
R7: Artificial Intelligence Applications in Information and CommunicationTechnologies. Germany, Springer
International Publishing, 2015.
COURSE OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 2 - - - - - - - 2 3
CO2 3 2 2 2 2 - - - - - - - 2 3
CO3 3 3 3 2 2 - - - - - - - 2 3
CO4 3 3 2 2 3 - - - - - - - 2 3
CO5 2 2 3 2 3 - - - - - - - 2 3
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔ ✔
PROFESSIONAL ELECTIVE COURSE (BLENDED)
Course Objectives
To understand the basics of Data Explorations and the concepts of Data visualization
⮚ To explore and apply various data visualization techniques for a variety of tasks using R
⮚
language
Introduction to Single variable: Distribution Variables - Numerical Summaries of Level and Spread -
Scaling and Standardizing – Inequality - Smoothing Time Series.
TOTAL : 45 hours
Text Books:
T4: Catherine Marsh, Jane Elliott, Exploring Data: An Introduction to Data Analysis for Social Scientists, Wiley
Publications, 2nd Edition, 2008.
T5: Visualizing Data: Exploring and Explaining Data with the processing Environment, O Reily
Publications, 2007
T6: Claus.O.Wlike, Fundamentals of Data Visualization, A primer on making informative and
compelling Figures, O’Reily Publications, 2019
Reference Books:
R8: Xiang Zhou, Sean, Yong Rui, Huang, Thomas S., Exploration of Visual Data, Springer Publications, 2003
R9: Eric Pimple, Data Visualization and Exploration with R, Geo Spatial Training service, 2017
Web Links:
15. https://onlinecourses.nptel.ac.in/noc22_mg09/preview
16. www.geeksforgeeks.org/data-visualization-in-r/
COURSE OUTCOMES
CO2: Analyze the use of univariate and Multivariate Analysis for Data Exploration K4
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 2 2 3 - - - - - - - - 1 3
CO2 3 2 3 - 3 - - - - - - - 3 3
CO3 3 3 3 3 3 - - - - - - - 3 1
CO4 2 3 3 3 3 - - - - - - - 3 1
CO5 3 3 2 3 3 - - - - - - - 3 3
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔ ✔
Course Objectives:
Data Storage and Analysis - Characteristics of Big Data – Big Data Analytics - Typical Analytical Architecture
– Requirement for new analytical architecture – Challenges in Big Data Analytics –
Need of big data frameworks, Introduction to Hadoop ecosystems. Hadoop Framework: Hadoop –
Requirement of Hadoop Framework - Design principle of Hadoop –Comparison with other system -
Hadoop Components –Hadoop Daemon’s – Working with HDFS Commands
Map Reduce working principle, Map Reduce types and formats, MapReduce features, Combiner
optimization,Map side join, Reduce SideJoin, Secondary sorting, Pipelining MapReduce jobs.
History and overview of R , Install and configuration of R programming environment , Basic language
elements and data structures, Data input/output, Data storage formats , Subsettingobjects.
Vectorization, Control structures, Functions, Scoping Rules, Loop functions, R Graphs and visualization
using lattice, ggplot2
The project component should be taken as real time applications like e-commerce, social medial,
streaming data and so on . The students should use the technologies learnt in theory to develop and
implement the project.
Text Book(s)
Reference Books
Web links:
W1:https://nptel.ac.in/courses/106104189
W2: https://nptel.ac.in/courses/106106142
Course Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 2 2 0 1 2 2 2 2 3 2
CO2 3 3 3 3 2 2 0 1 2 2 2 2 3 2
CO3 3 3 3 3 2 2 1 1 2 2 2 2 3 2
CO4 3 3 3 3 2 2 0 1 2 2 2 2 3 2
CO5 2 3 3 3 2 2 1 1 2 2 2 2 3 2
AVG 2.8 3 3 3 2 2 0.4 1 2 2 2 2 3 2
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Demonstration /
Quiz MCQ Projects Seminars
Presentation
✔ ✔
CSE NOSQL DATABASE 3 0 0 3
Course Objectives
⮚ To explore the origins of NoSQL databases and the characteristics that distinguish them from
traditional relational database management systems
⮚ To understand the architectures and common features of the main types of NoSQL databases
(key-value stores, document databases, column-family stores, graph databases)
To discuss the criteria that decision makers should consider when choosing between relational
⮚
and non-relational databases and techniques for selecting the NoSQL database that best addresses
specific use cases
UNIT I NOSQL DATA ARCHITECTURE PATTERNS 12 hours
NoSQL Data model: Aggregate Models- Document Data Model- Key-Value Data Model- Columnar Data
Model, Graph Based Data Model Graph Data Model, NoSQL system ways to handle big data problems,
Moving Queries to data, not data to the query, hash rings to distribute the data on clusters, replication to
scale reads, Database distributed queries to Data nodes.
UNIT II KEY VALUE DATA STORES 12 hours
From array to key value databases, Essential features of key value Databases, Properties of keys,
Characteristics of Values, Key-Value Database Data Modeling Terms, Key-Value Architecture and
implementation Terms, Designing Structured Values, Limitations of Key- Value Databases, Design
Patterns for Key-Value Databases, Case Study: Key-Value Databases for Mobile Application
Configuration
Document, Collection, Naming, CRUD operation, querying, indexing, Replication, Sharding, Consistency
Implementation: Distributed consistency, Eventual Consistency, Capped Collection, Case studies:
document oriented database: Mongo DB and/or Cassandra
Comparison of Relational and Graph Modeling, Property Graph Model Graph Analytics: Link analysis
algorithm- Web as a graph, Page Rank- Markov chain, page rank computation, Topic specific page rank
(Page Ranking Computation techniques: iterative processing, Random walk distribution Querying Graphs:
Introduction to Cypher, case study: Building a Graph Database Application- community detection
TOTAL : -- 60 hours
Text Books:
Reference Books:
R1 Guy Harrison, Next Generation Database: NoSQL and big data, Apress
Web Links:
L1 https://www.mongodb.com/
L2 https://university.mongodb.com/
L3 https://www.ibm.com/cloud/learn/nosql-databases
L4 https://www.coursera.org/lecture/nosql-databases/introduction-to-nosql-VdRNp
COURSE OUTCOMES
CO1: Differentiate and identify right database models for real time applications K4
CO3: Design Schema and implement CRUD operations, distributed data operations K6
Compare data ware housing schemas and implement various column store
CO4: K4
internals
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 3 3 3 3 - - - - - - - 3 3
CO2 2 2 2 3 3 - - - - - - - 3 3
CO3 2 3 3 3 3 - - - - - - - 3 3
CO4 2 3 2 3 3 - - - - - - - 3 3
CO5 1 2 3 3 3 - - - - - - - 3 3
ASSESSMENT METHODS:
√ √ √ √ √ √
√ √ √ √ √
ROBOTICS AND ITS APPLICATION 3 0 0 3
COURSE OBJECTIVES
1. To understand the basic concepts associated with the design, functioning, applications
and social aspects of robots
2. To study about the electrical drive systems and sensors used in robotics for various
applications
3. To learn about analyzing robot kinematics, dynamics through different methodologies
and study various design aspects of robot arm manipulator and end-effector
4. To learn about various motion planning techniques and the associated control
architecture
5. To understand the implications of AI and other trending concepts of robotics.
UNIT I FOUNDATION 9
Types of electric motors : DC – Servo – Stepper; Specification – Drives for motors – Speed &
direction control and circuitry – Selection criterion for actuators – Direct drives – Non-traditional
actuators - Sensors for localization – Navigation – Obstacle avoidance and path planning in
known and unknown environments – Optical – Inertial – Thermal – Chemical – Biosensor – Other
common sensors – Case study on choice of sensors and actuators for maze solving robot and self
driving cars.
Mapping & Navigation – SLAM, Path planning for serial manipulators – Types of control
architectures – Cartesian control – Force control and hybrid position/force control – Behaviour
based control – Application of Neural network, fuzzy logic, optimization algorithms for navigation
problems – Programming methodologies of a robot.
Application of Machine learning – AI – Expert systems – Tele-robotics and Virtual reality – Micro
&Nanorobots – Unmanned vehicles – Cognitive robotics – Evolutionary robotics – Humanoids.
Total Periods: 45
COURSE OUTCOMES
TEXT BOOKS
REFERENCES
6. CO PO MAPPING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 K2 3 - - - - - - - - - - - 2 -
CO2 K2 3 2 - - - - - - - - - - 2 -
CO3 K3 3 2 - - - - - - - - - 3 -
CO4 K2 3 2 - - - - - - - 3 - 3 3 -
CO5 K2 3 2 - - - - - - - - 3 3
Score 15 8 - - - - - - - 3 - 3 13 3
Course 3 2 - - - - - - - 3 - 3 3 3
Mapping
CSE CONCEPTS OF VIRTUAL AND AUGMENTED REALITY 3 0 0 3
Course Objectives
To learn about the principles and multidisciplinary features of virtual reality.
⮚ To study the technology for multimodal user interaction and perception in VR,
⮚
in particular the visual, audial and haptic interface and behavior.
To teach students the technology for managing large scale VR environment
⮚
framework development tools in real time.
Input device characteristics, desktop input devices, tracking devices, 3d mice, special purpose input
devices, direct human input, home - brewed input devices, choosing input devices for 3D interfaces.
Software technologies: database - world space, world coordinate, world environment, objects -
geometry, position / orientation, hierarchy, bounding volume, scripts and other attributes, VR
environment - VR database, tessellated data, LODs, Cullers and Occluders, lights and cameras, scripts,
VR toolkits, available software in the market.
3D manipulation tasks, interaction techniques for 3D manipulation, design guidelines – 3D travel tasks,
travel techniques, design guidelines - theoretical foundations of wayfinding, user centered wayfinding
support, environment centered wayfinding support, evaluating wayfinding aids, design guidelines -
system control, classification, graphical menus, voice commands, Gestrual commands, tools,
multimodal system control techniques, design guidelines.
3D user interfaces for the real world, AR interfaces as 3D data browsers, 3D augmented reality
interfaces, augmented surfaces and tangible interfaces, agents in AR, transitional AR-VR interfaces -
3d interaction techniques, 3d UI design and development, 3D UI evaluation and other issues.
TOTAL : -- 45 hours
Text Books:
1. Paul Mealy, Virtual & Augmented Reality for Dummies, John Wiley & Sons.
2. Alan B Craig, William R Sherman and Jeffrey D Will, “Developing Virtual Reality
Applications: Foundations of Effective Design”, Morgan Kaufmann.
Reference Books:
1. Gerard Jounghyun Kim, “Designing Virtual Systems: The Structured Approach”.
2. Doug A Bowman, Ernest Kuijff, Joseph J LaViola, Jr and Ivan Poupyrev, “3D User Interfaces,
Theory and Practice”, Addison Wesley, USA
Web Links:
17. https://edu.gcfglobal.org/en/thenow/understanding-virtual-reality-and-augmented-reality
18. https://www.intel.com/content/www/us/en/tech-tips-and-tricks/virtual-reality-vs-augmented-
reality.html
COURSE OUTCOMES
CO2: Integrating the 3D user interface input hardware and Software technologies K3
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 3 2 3 - -- - 1 1 2 1 2 2
CO2 3 2 2 2 2 - - - 1 1 2 1 2 2
CO3 2 2 2 2 3 - - - 1 1 2 1 2 2
CO4 2 2 2 2 2 - - - 1 1 2 1 2 2
CO5 2 2 3 2 3 - - - 1 1 2 1 2 2
ASSESSMENT METHODS:
Course Objective:
Introduction -Origin – Fundamental Steps in Digital Image Processing – Components – Elements of Visual
Perception -Image Sensing and Acquisition – Image Sampling and Quantization -Relationships between
pixels -Introduction to Image processing toolbox in MATLAB
Spatial Domain: Gray level transformations – Histogram processing -Basics of Spatial Filtering–Smoothing
and Sharpening Spatial Filtering -Frequency Domain: Basics of filtering – Smoothing and Sharpening
frequency domain filters. -MATLAB code for histogram equalization, spatial and frequency domain filter.
Noise models – Mean Filters – Order Statistics – Adaptive filters – Band reject Filters – Band pass Filters –
Inverse Filtering – Wiener -Segmentation: Point, Line, and Edge Detection- Marr-Hildreth & Canny edge
detector -–Edge Linking and Boundary detection Local & Regional processing – Region based
segmentation -Morphological processing – Watershed segmentation algorithm. -MATLAB code for
restoring an image after degradation using adaptive and wiener filter – Edge detection operators
Wavelets – Sub band coding – Multi resolution expansions -Compression: Fundamentals – Image
Compression methods – Huffman, Arithmetic coding -LZW coding, Run Length Encoding, Block Transform
coding, Wavelet coding, JPEG standard. -MATLAB code for image compression: Huffman coding ,
Arithmetic coding, wavelet coding
TOTAL : 45 h
TEXT BOOK:
1. Rafael C.Gonzalez and Richard E.Woods, “Digital Image Processing”, Third Edition, Pearson Education,
2010.
REFERENCE BOOKS:
1. Rafael C.Gonzalez, Richard E.Woods, Steven L. Eddins, “Digital Image Processing using Matlab”, Third
Edition, Tata McGraw Hill Pvt. Ltd, 2011.
Web Links:
L1: https://nptel.ac.in/courses/117105135
COURSE OUTCOMES:
At the end of this course the students will be able to,
Course Knowledge
Description
Outcome Level
Develop various algorithms for restoring an image after
CO1 K6
degradation.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 3 2 - 1 2 3 2 3 3 2
CO2 3 3 3 3 3 2 - 1 2 3 2 3 3 2
CO3 3 3 3 3 3 2 1 1 2 3 2 3 3 2
CO4 3 3 3 3 3 2 - 1 2 3 2 3 3 2
CO5 2 3 3 3 3 2 1 1 2 3 2 3 3 2
Average 2.8 3 3 3 3 2 0.4 1 2 3 2 3 3 2
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Demonstration /
Quiz MCQ Projects Seminars
Presentation
✔ ✔
OPEN ELLECTIVE COURSES
OCSE01 Data Structures and Algorithms 3 0 0 3
COURSE OBJECTIVES:
⮚ To understand the basic concepts of data structures and algorithms.
To differentiate linear and non-linear data structures and the operations upon them.
⮚ To perform sorting and searching in a given set of data items.
⮚ To comprehend the necessity of time complexity in algorithms.
⮚
TOTAL: 60 hours
TEXT BOOKS:
T3: Thomas H. Cormen, C.E. Leiserson, R L.Rivest and C. Stein, Introduction to Algorithms, Third edition, MIT
Press, 2009.
T4: Mark A. Weiss,Data Structures & Algorithm Analysis in C++, 3rd edition, 2008, PEARSON.
REFERENCE BOOKS:
R2: Kurt Mehlhorn, and Peter Sanders – Algorithms and Data Sturctures, The Basic Toolbox, Springer-Verlag
Berlin Heidelberg, 2008.
R3: Horowitz, Sahni, and S. Anderson-Freed, Fundamentals of Data Structures in C UNIVERSITIES PRESS,Second
Edition,2008.
WEB LINKS:
2. https://nptel.ac.in/courses/106102064
3. https://archive.nptel.ac.in/courses/106/106/106106127/
COURSE OUTCOMES:
Understand the fundamental analysis and compute time complexity for a given
CO1: K3
problem
CO3: Design and applya suitable algorithm for searching and sorting problems K6
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔ ✔
OCSE02 INTERNET OF THINGS 3 0 0 3
COURSE OBJECTIVES:
To understand the basics of IoT and its application sectors
⮚ To understand M2M and IoT
⮚ To understand and become proficient in IoT platforms
⮚ To understand and apply IoT protocols appropriately
⮚ To design and develop IoT based applications
⮚
TOTAL: 45 hours
TEXT BOOKS:
T4: ArshdeepBahga, Vijay Madisetti, “Internet of Things, A Hands -on Approach”, 1st Edition 2015, University
Press, ISBN: 978-81-7371- 954-7
T5: Oliver Hersent, David Boswarthick, Omar Elloumy, “The Internet of Things”,1st Edition2015,ISBN: 978-81-
265-5686-1
T6: Michael Miller, “The Internet of Things, How Smart TVs, Smart Cars, Smart Homes, and Smart Cities are
changing the World”, First edition ,2015, Pearson, ISBN:978-93-325-5245-6
WEB LINKS:
7. https://archive.nptel.ac.in/courses/106/105/106105166/
8. https://nptel.ac.in/courses/108108098
9. https://thingsee.com/blog/quality-hardware-list-for-your-iot-projects
10. https://tools.ietf.org/html/rfc7452
11. http://dret.net/lectures/iot-spring15/protocols
12. http://iot.intersog.com/blog/overview-of-iot-development-standards-and-frameworks
COURSE OUTCOMES:
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔
OCSE03 PYTHON PROGRAMMING 3 0 0 3
COURSE OBJECTIVES:
⮚ To understand the basic and advanced features of core language built in functions
⮚ To handle and control system/OS level features
⮚ To communicate using sockets, write client and server-side scripts
⮚ To design and implement basic applications with database connectivity
TOTAL: 45 hours
TEXT BOOKS:
T1: Allen B. Downey, “Think Python: How to Think Like a Computer Scientist’’, 2nd edition, Shroff/O’Reilly
Publishers, 2016.
T2: Guido van Rossum and Fred L. Drake Jr, “An Introduction to Python” –Network Theory Ltd., 2011.
REFERENCE BOOKS:
R1: Mark Lutz, “Learning Python”, O Reily, 4thEdition, 2009, ISBN: 978-0-596 15806-4,5th edition, 2013
R2: Mark Lutz, “Programming Python”, O Reily, 4thEdition, 2010
R3: Tim Hall and J-P Stacey, “Python 3 for Absolute Beginners” , 2013
R4: Magnus Lie Hetland , “Beginning Python: From Novice to Professional”, 3rd Edition, 2013
WEB LINKS:
1. http://greenteapress.com/wp/think-python/
2. https://archive.nptel.ac.in/courses/106/106/106106182/
COURSE OUTCOMES:
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔ ✔
OCSE04 ARTIFICIAL INTELLIGENCE 3 0 0 3
COURSE OBJECTIVES:
⮚ To know about the basic knowledge representation, problem solving and learning methods,
⮚ To design an intelligent agent that can solve ontological problems and to learn about the search
strategies,
⮚ To learn the applicability, strengths and weaknesses to solve particular engineering problems.
TOTAL: 45 hours
TEXT BOOKS:
T1: Stuart Russell, Peter Norvig, “Artificial Intelligence – A Modern Approach”, 3rd Edition, Pearson
Education/ Prentice Hall of India 2010
T2: Poole, D. and Mackworth, A. 2010. Artificial Intelligence: Foundations of Computational Agents,
Cambridge University Press
T3: Nils J. Nilsson, “Artificial Intelligence: A new Synthesis”, Harcourt Asia Pvt. Ltd, 2003.
REFERENCE BOOKS:
R1: Elaine Rich and Kevin Knight, “Artificial Intelligence”, 2nd Edition, Tata McGraw-Hill, 2003.
R2: Luger, G.F. 2008. Artificial Intelligence -Structures and Strategies for Complex Problem Solving, 6th edition,
Pearson
WEB LINKS:
1. https://nptel.ac.in/courses/106105078
2. https://nptel.ac.in/courses/106105079
CO1: Evaluate Artificial Intelligence (AI) methods and describe their foundations. K5
Interpret the knowledge representation and reasoning for solving real world K2
CO3:
problems
CO5: K6
Determinean efficient strategy for various applications of AI
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔ ✔
OCSE05 CLOUD COMPUTING 3 0 0 3
Course Objectives
Cloud Computing : Vision, reference model, characteristics and challenges – historical development –
building cloud computing environment – computing platforms and Technologies – Parallel Vs distributed
computing – Elements of parallel and distributed computing – Technologies for distributed computing.
Cloud Computing Architecture: Cloud reference model - NIST Cloud Computing Reference Architecture –
types of Clouds - economics – open challenges.
UNIT II VIRTUALIZATION 9
Cloud Computing and Services Model – Public, Private and Hybrid Clouds – Cloud Eco System - IaaS - PaaS
– SaaS. Architectural Design of Compute and Storage Clouds – Layered Cloud Architecture Development
– Design Challenges - Inter Cloud Resource Management – Resource Provisioning and Platform
Deployment – Global Exchange of Cloud Resources. Case Study: Amazon Web Service reference, GoGrid,
Rackspace
Cloud capabilities and platform features – data features and databases - Parallel and Distributed
Programming Paradigms – MapReduce , Twister and Iterative MapReduce – Hadoop Library from Apache
– Dryad and DryadLINQ – sawzall and Pig Latin - Mapping Applications - Programming Support of Google
App Engine - Amazon AWS –Microsoft Azure - Cloud Software Environments -Eucalyptus, Open Nebula,
OpenStack. Case Study: Amazon Web Service reference, GoGrid, Rackspace.
Amazon web services - Compute services - Storage services - Communication services - Google AppEngine
- Architecture and core concepts – Cloud Security and Trust management. Application life cycle - Cost
model – Observations - Microsoft Azure - SQL Azure – Scientific Applications –Business and Consumer
Application – Energy efficiency in clouds - Market-based management of clouds - Federated
clouds/InterCloud - Third-party cloud services.
TOTAL : 45 hours
Text Books:
T1: Kai Hwang, Geoffrey C Fox, Jack G Dongarra, “Distributed and Cloud
Computing, From Parallel Processing to the Internet of Things”, Morgan Kaufmann Publishers, 2012.
Reference Books:
R10: James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for
R11: George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in the
Cloud” O'Reilly.
R12: Ronald L. Krutz, Russell Dean Vines, “Cloud Security – A comprehensive Guide to Secure Cloud
Computing”, Wiley – India, 2010.
Web Links:
19. https://onlinecourses.nptel.ac.in/noc22_cs20/preview.
20. https://www.w3schools.in/cloud-computing.
COURSE OUTCOMES
Gain a basic knowledge of virtualization and its categorization and Design & develop
CO2: K3, K6
highly scalable cloud-based applications by creating and configuring virtual machines.
Compare, contrast, and evaluate the key trade-offs between multiple approaches to
CO3: cloud system design, and Identify appropriate design choices when solving real - world K4
cloud computing problems.
Interpret some important cloud computing driven commercial systems such as: Google
CO4: Apps, Microsoft Azure and Amazon Web Services and other businesses cloud K5
applications.
CO5: Build and deploy cloud application using popular cloud platforms. K6
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 3 0 3 - - - - - - - - 3
CO2 3 2 2 3 2 - - - - - - - - 3
CO3 3 2 3 3 3 - - - - - - - - 3
CO4 2 2 2 3 0 - - - - - - - - 3
CO5 0 2 3 3 3 - - - - - - - - 3
ASSESSMENT METHODS:
✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔
OCSE01 E COMMERCE 3 0 0 3
Course Objectives
⮚ To understand the nature of e-Commerce and recognize the business impact and potential of e-
Commerce
To learn the technologies required to make e-Commerce viable.
⮚ To know about the current drivers and inhibitors facing the business world in adopting and
⮚
using e-Commerce
UNIT I Introduction 9
Traditional commerce and Ecommerce - Categories of Electronic commerce – Business models – Revenue
models – Business processes. Internet and WWW–role of WWW–value chains–strategic business –
Revenue Strategy issues – Industry value chains - supply chain management–role of Ecommerce
Packet switched networks–Routing packets. TCP/IP protocol script: IP Addressing – Domain names – E-
mail protocols. Internet utility programs–SGML,HTML and XML–web client and servers–Web client/server
architecture– intranet and extranets – Public and private networks – Virtual private network
Web server: Server computers –performance evaluation – Hardware architectures. Web server software
feature sets–web server software and tools– Internet Utility programs – Data analysis software – Link
checking utilities. web protocol–search engines–intelligent agents –EC software– webhosting–cost
analysis
UNIT IV Security 9
TOTAL : -- 45 hours
Text Books:
T1 Ravi Kalakota, Andrew B. Whinston “ Frontiers of Electronic Commerce”,Pearson Education, 2008
T2 Gary PSchneider “Electronic commerce”, Thomson learning & James TPeny Cambridge USA, 2001
T3 Manlyn Greenstein and Miklos “Electronic commerce” McGraw-Hill, 2002.
Reference Books:
CO1: K3
Construct the implement various business models of E-Commerce
CO2: K4
Develop a policy and regulatory issues in E-commerce
CO3: K5
Evaluate the basic networking concepts
CO4: K3
Make use of the web client server architecture
CO5: Develop and acquire knowledge on web server concepts and its performance K6
evaluation
MAPPING OF COURSE OUTCOMES TO PROGRAM OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 2 - - - - - - - - 3
CO2 3 2 2 2 2 - - - - - - - - 3
CO3 3 3 3 2 2 - - - - - - - - 3
CO4 2 3 2 2 3 - - - - - - - - 3
CO5 3 2 3 2 3 - - - - - - - - 3
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔ ✔
OCSE08 BLOCK CHAIN TECHNOLOGIES 3 0 0 3
Course Objectives
⮚ To introduce Bit coin and other crypto currencies
⮚ To study the algorithms and techniques in block chain
⮚ To understand the practical aspects in the design of crypto currency
⮚ To understand the function of Block chains as a method of securing distributed ledgers
⮚ To design, code, deploy and execute a smart contract
UNIT III Crypto Primitives, Securing and Interconnecting Public and Private Block 9 hours
Chains
Hash Function and Merle Tree-Security Properties-Security Considerations for block chain-Digital
Signature-Public Key Cryptography-Bit coinblock chain incentive structures- Nash Equilibriums-
evolutionary stable strategies, and Pareto- efficiency (game theory) Weaknesses and news Points of
Failure- Mitigation Methods-Redundancies and fall-back methods
UNIT IV Mining and Crypto Currencies - How to use and Interact 9 hours
Mining-Pools-Impact of CPU and GPU-Transaction in Bit coin Network- Block Mining-Block propagation
and block relay
TEXT BOOKS:
T1: Mastering Bitcoin: Unlocking Digital Cryptocurrencies, by Andreas Antonopoulos O’Reilly, First
Edition, 2014.
T2: Blockchain by Melanie Swa, O’Reilly Media 2015
T3: Zero to Block chain - An IBM Redbooks course, by Bob Dill, David Smits
REFERENCE BOOKS:
R1: The Basics of Bitcoins and Blockchains: An Introduction to Cryptocurrencies and the Technology that
Powers Them, 2018 by Antony Lewis
R2: The Truth Machine: The Blockchain and the Future of Everything Paperback – 5 March 2019
COURSE OUTCOMES
CO1: K5
Explain the structure of a block chain
CO2: K4
Analyze the incentive structure in a block chain based system
CO3: K5
Judge the scenario where “smart” contract is most appropriate
CO4: K3
Identify basic knowledge of Bitcoin, Ethereum
CO5: K3
Apply Blockchain in future use cases for security
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔ ✔
OCSE09 INTRODUCTION TO DATA ANALYTICS 3 0 0 3
Course Objectives
To provide the knowledge and expertise to become a proficient data scientist
⮚ To explore the fundamental concepts of big data & data analytics.
⮚ To gain knowledge on Hadoop related tools such as MongoDB, Cassandra, Pig, and Hive for big
⮚
data analytics
TOTAL : -- 45 hours
TEXT BOOKS:
T2: Seema Acharya, Subhashini Chellappan, “Big Data and Analytics”, Wiley Publication, 2015
REFERENCE BOOKS:
R5: Judith Hurwitz, Alan Nugent, Dr. Fern Halper, Marcia Kaufman, “Big Data for Dummies”, John Wiley & Sons,
Inc., 2013.
R6: Tom White, “Hadoop: The Definitive Guide”, O’Reilly Publications, 2011.
R7: Kyle Banker, “Mongo DB in Action”, Manning Publications Company, 2012.
R8: Russell Bradberry, Eric Blow, “Practical Cassandra A developers Approach“, Pearson Education, 2014
COURSE OUTCOMES
CO2: K5
Interpret basic concepts of data analytics
CO3: K4
Analyze the framework for storing the data
CO4: K4
Examine about NoSQL databases
CO5: K3
Choose an appropriate framework to solve real world problems
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔ ✔
OCSE10 Fundamentals of AI and ML 3 0 0 3
Course Objectives
To understand the basics of Machine Learning (ML)
⮚ To program in Python ML Packages
⮚ To understand the methods of Machine Learning
⮚ To visualize a dataset
⮚
TOTAL: 45 hours
TEXT BOOKS:
T1: Kevin P. Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012
T2: SebastainRaschka, “Python Machine Learning”, Packt publishing (open source).
REFERENCE BOOKS:
R1: Stephen Marsland, “Machine Learning –An Algorithmic Perspective”, CRC Press, 2009
R2: Hastie, Tibshirani, Friedman, “The Elements of Statistical Learning” (2nd ed)., Springer, 2008
WEB LINKS:
1. https://machinelearningmastery.com/types-of-learning-in-machine-learning/Online
2. https://www.coursera.org/learn/machine-learning
3. https://nptel.ac.in/courses/106/106/106106139/
4. https://www.timberlake.co.uk/machinelearning
COURSE OUTCOMES:
CO5: Apply basic principles of AI and ML in solutions that require problem solving, K4
inference, perception, knowledge representation, and learning.
ASSESSMENT METHODS:
✔ ✔ ✔ ✔ ✔ ✔
Quiz MCQ Projects Seminars Demonstration/ Open book
Presentation test
✔ ✔ ✔ ✔ ✔ ✔