B.tech New Updated
B.tech New Updated
B.tech New Updated
VISION
B.S. Abdur Rahman Institute of Science & Technology aspires to be a leader in
Education, Training and
Research
in
Engineering,
Science,
Technology and
Management and to play a vital role in the Socio-Economic progress of the Country.
MISSION
Expose the students to emerging and upcoming technologies through cocurricular events.
ii.
iii.
iv.
v.
"Dean (Academic Affairs)" means the Dean (Academic Affairs) of B.S. Abdur
Rahman University.
vi.
vii.
2.0 ADMISSION
2.1a) Candidates for admission to the first semester of the eight semester B.Tech.
degree programme shall be required to have passed the Higher Secondary Examination
of the (10+2) curriculum (Academic stream) prescribed by the appropriate authority or
any other examination of any university or authority accepted by the University as
equivalent thereto.
2.1b) Candidates for admission to the third semester of the eight semester
B.Tech. programme under lateral entry scheme shall be required to have passed the
Diploma examination in Engineering / Technology of the Department of Technical
Education, Government of Tamil Nadu or any other examination of any other authority
accepted by the University as equivalent thereto.
2.2 Notwithstanding the qualifying examination the candidate might have passed,
the candidate shall also write an entrance examination prescribed by the University for
admission. The entrance examination shall test the proficiency of the candidate in
Mathematics, Physics and Chemistry on the standards prescribed for plus two academic
stream.
2.3 The eligibility criteria such as marks, number of attempts and physical fitness
shall be as prescribed by the University from time to time.
3.0 BRANCHES OF STUDY
3.1 Regulations are applicable to the following B.Tech. degree programmes in
various branches of Engineering and Technology, each distributed over eight semesters
with two semesters per academic year.
B.TECH. DEGREE PROGRAMMES:
1. Aeronautical Engineering
2. Automobile Engineering
3. Civil Engineering
4. Computer Science and Engineering
5. Electrical and Electronics Engineering
6. Electronics and Communication Engineering
7. Electronics and Instrumentation Engineering
8. Information Technology
9. Manufacturing Engineering
10. Mechanical Engineering
11. Polymer Engineering
12. Biotechnology
13. Cancer Biotechnology
14. Food Biotechnology
ii.
iii.
iv.
v.
vi.
vii.
viii.
one credit for two to three periods and two credits for four periods of
laboratory or practical courses
one credit for two periods of seminar / project work per week
one credit for two weeks of industrial training
4.3 Each semester curriculum shall normally have a blend of lecture courses not
exceeding seven and practical courses not exceeding four.
4.4 For the award of the degree, a student has to earn a minimum total credits
specified in the curriculum of the relevant branch of study. This minimum will be between
175 and 185 credits, depending on the program.
4.5 The medium of instruction, examinations and project report shall be English,
except for courses on languages other than English.
Not less than a total of 40 credits, (20 for lateral entry) to move to the 5 th
semester
Not less than a total of 60 credits, (40 for lateral entry) to move to the 7 th
semester
Assessment No.
Course Coverage
in Weeks
Duration
Weightage of
Marks
Assessment 1
1 to 4
1.5 hours
15%
Assessment 2
5 to 8
1.5 hours
15%
Assessment 3
9 to 12
1.5 hours
15%
Attendance #
5%
Full course
3 hours
50 %
13.4 In the case of Industrial training, the student shall submit a report, which will
be evaluated along with an oral examination by a committee of faculty members,
constituted by the Head of the department. A progress report from the industry will
also be taken into account for evaluation.
13.5 In the case of project work, a committee of faculty members constituted by
the Head of the Department will carry out three periodic reviews. Based on the
project report submitted by the student(s), an oral examination (viva-voce) will be
conducted as the semester end examination, for which one external examiner,
approved by the Controller of Examinations, will be included. The weightage for
periodic review will be 50% and remaining 50% for the project report and Viva Voce
examination.
13.6
Assessment of seminars and comprehension will be carried out by a
committee of faculty members constituted by the Head of the Department.
13.7 The continuous assessment marks earned for a course during his/her first
appearance will be used for grading along with the marks earned in the semesterend examination / arrear examination for that course until he/she completes.
14.0 SUBSTITUTE EXAMINATIONS
14.1 A student who has missed, for genuine reasons, a maximum of one of the
four assessments of a course may be permitted to write a substitute examination.
However, permission to take up a substitute examination will be given under
exceptional circumstances, such as accident, admission to a hospital due to illness,
etc.
14.2 A student who misses any assessment in a course shall apply in a prescribed
form to the Head of the department / Dean within a week from the date of missed
assessment. However the substitute tests and examination for a course will be
conducted within two weeks after the last day of the semester-end examinations.
15.0 ATTENDANCE REQUIREMENT AND SEMESTER / COURSE REPETITION
15.1
A student should secure not less than 75% overall attendance in that
semester taking into account the total no. of periods in all courses put together
attended by the student as against the total no. of periods in all courses offered
during that semester. If a student who could secure overall attendance between
65% and 75% only in a particular semester due to medical reasons (hospitalization
/ accident / specific illness) or due to participation in the College / University / State
/ National / International level sports events with prior permission from the Officials
concerned shall be given exemption from the prescribed attendance requirement
and he / she shall be permitted to appear for the current semester examinations.
The students who do not fulfill the above attendance requirement will not be
permitted to write the semester end examination and will not be permitted to
move to next semester. Such students should repeat all the courses of the
semester in the next Academic year.
15.2 The faculty member of each course shall furnish the cumulative attendance
details to the class advisor. The class advisor will consolidate and furnish the list of
students who have earned less than 75% overall attendance, to the Dean
(Academic Affairs) through the Head of the Department / School Dean. Thereupon,
the Dean (Academic Affairs) shall issue orders preventing students from appearing
for the semester end examination of all the courses of that semester.
15.3 A student who is awarded U grade in a course will have the option of either
to write semester end arrear examination at the end of the subsequent semesters,
or to redo the course whenever the course is offered. Marks earned during the redo
period in the continuous assessment for the course, will be used for grading along
with the marks earned in the end-semester (re-do) examination. If any student
obtained U grade, the marks earned during the redo period for the continuous
assessment for that course will be considered for further appearance as arrears.
15.4 If a student with U grade prefers to redo any particular course fails to earn
the minimum 75% attendance while doing that course, then he/she will not be
permitted to write the semester end examination and his / her earlier U grade and
continuous assessment marks shall continue.
16.0 PASSING AND DECLARATION OF RESULTS AND GRADE SHEET
16.1 All assessments of a course will be made on absolute marks basis. However,
the Class Committee without the student members shall meet within 10 days after
the semester-end examination and analyze the performance of students in all
assessments of a course and award letter grade. The letter grades and the
corresponding grade points are as follows:
Letter Grade
S
A
B
C
D
E
U
W
AB
Grade Points
"W"
16.6 After successful completion of the programme, the Degree will be awarded
with the following classifications based on CGPA.
Classification
CGPA
First Class
Second Class
All others
However, to be eligible for First Class with Distinction, a student should not have
obtained U grade in any course during his/her study and should have completed
the U.G. programme within a minimum period covered by the minimum duration
plus authorized break of study, if any (clause 11). To be eligible for First Class, a
student should have passed the examination in all courses within the specified
minimum number of semesters reckoned from his/her commencement of study
plus two semesters. For this purpose, the authorized break of study will not be
counted. The students who do not satisfy the above two conditions will be
classified as second class. For the purpose of classification, the CGPA will be
rounded to two decimal places. For the purpose of comparison of performance of
students and ranking, CGPA will be considered up to three decimal places.
17.0 ELECTIVE CHOICE: OPTION TO DO PROJECT ALONE IN FINAL
SEMESTER
17.1 Apart from the various elective courses listed in the curriculum for each
branch of specialization, the student can choose a maximum of two electives from
any other specialization under any department, during the entire period of study,
with the approval of the Head of the parent department and the Head of the other
department offering the course.
17.2 In the curriculum of eighth Semester, along with the project work, if two
elective courses alone are listed, then the Dean (Academic Affairs) may permit a
student, as per approved guidelines, on the recommendation of the Head of the
department, to do a full semester major industrial project work. In such a case, the
above two elective courses or any other two elective courses in lieu thereof have to
be enrolled during any semester preceding or succeeding the project work, if
offered.
National Service Scheme (NSS) will have social service activities in and
around Chennai.
National Sports Organization (NSO) will have sports, games, drills and
physical exercises.
Youth Red Cross (YRC) will have social service activities in and around
Chennai.
19.0 DISCIPLINE
19.1 Every student is required to observe disciplined and decorous behavior both
inside and outside the campus and not to indulge in any activity which will tend to
bring down the prestige of the University.
19.2 Any act of indiscipline of a student, reported to the Dean (Student Affairs),
through the HOD / Dean will be referred to a Discipline and Welfare Committee,
nominated by the Vice-Chancellor, for taking appropriate action.
20.0 ELIGIBILITY FOR THE AWARD OF DEGREE
20.1 A student shall be declared to be eligible for the award of B.Tech. degree
provided the student has:
i. successfully completed all the required courses specified in the programme
curriculum and earned the number of credits prescribed for the specialization,
within a maximum period of 14 semester (12 semesters for lateral entry) from
the date of admission, including break of study.
ii. no dues to the Institution, Library, Hostels
iii. no disciplinary action pending against him/her.
20.2 The award of the degree must have been approved by the University.
21.0 POWER TO MODIFY
Notwithstanding all that has been stated above, the Academic Council has the right
to modify the above regulations from time to time.
Course
Course Title
Code
BS
MAB1181
HS
ENB1181
English*
FRB1181
French*
ISB1181
Arabic*
BS
PHB1181
Physics
BS
CHB1181
Chemistry
ESF
GEB1101
Engineering Graphics
HS
SSB1181
Introduction to Economics
BS
PHB1182
Physics Lab
BS
CHB1182
Chemistry Lab
GEB1102
GEB1103
10
ESF
ESF
25
SEMESTER II
Sl. Course
No. Group
Course
Course Title
Code
1.
BS
MAB1282
Advanced Calculus
2.
BS
PHB1283
3.
HS
SSB1182
4.
ESF
GEB1211
5.
ESF
EEB1281
6.
ESF
CSB1211
7.
HS
ENB1282
Written Communication
8.
ESF
EEB1282
9.
BS
PHB1284
23
SEMESTER III
Sl.
Course
No. Group
Course
Course Title
Code
1.
BS
MAB2181
2.
HS
SSB2181
3.
EC
CSB2101
4.
EC
CSB2102
Data structures
5.
EC
CSB2103
6.
EC
CSB2104
Computer Architecture
7.
HS
ENB2181
Oral Communication
8.
EC
CSB2105
9.
EC
CSB2106
10.
EC
CSB2107
Digital Lab
1
24
SEMESTER IV
Sl.
Course
No. Group
Course
Course Title
Code
1.
BS
MAB2285
Discrete Mathematics
2.
EC
CSB2211
3.
EC
CSB2212
Operating Systems
4.
EC
CSB2213
5.
EC
CSB2214
Principles of Programming
6.
BS
LSB2181
7.
HS
8.
EC
CSB2215
DBMS Lab
9.
EC
CSB2216
10.
EC
23
SEMESTER V
Sl.
Course
No. Group
Course
Course Title
Code
1.
EC
CSB3101
2.
EC
CSB3102
3.
EC
CSB3103
Computer Networks
4.
EC
CSB3104
Theory of Computation
5.
MS
MSB3181
Management of Business
Organization
6.
PE
7.
HS
8.
Professional Elective I
EC
CSB3105
9.
EC
CSB3106
10.
EC
CSB3107
Networks Lab
22
SEMESTER VI
Sl.
Course
No. Group
Course
Course Title
Code
1.
EC
2.
EC
3.
EC
CSB3213
Artificial Intelligence
4.
BS
GEB3201
5.
PE
Professional Elective II
6.
PE
7.
EC
8.
EC
CSB3215
9.
EC
CSB3216
FOSS Lab
21
SEMESTER VII
Sl.
Course
No. Group
Course
Course Title
Code
1.
EC
CSB4101
Information Security
2.
EC
CSB4102
3.
EC
CSB4103
Distributed Computing
4.
PE
Professional Elective IV
5.
PE
Professional Elective V
6.
GE
General Elective I
7.
EC
CSB4104
Mini Project
8.
EC
CSB4105
9.
EC
10
.
EC
CSB4107
22
SEMESTER VIII
Sl.
Course
No. Group
Course
Course Title
Code
1.
PE
Professional Elective VI
2.
GE
General Elective II
3.
EC
Project
CSB4211
18 9
1
Total Credits: 175
PROFESSIONAL ELECTIVES
Sl. Course
Course
No. Group
Code
Course Title
PE
CSBX01
Network Management
PE
CSBX02
PE
CSBX03
Graph Theory
PE
CSBX04
PE
CSBX05
PE
CSBX07
Routing Protocols
PE
CSBX08
Cloud Computing
PE
CSBX09
TCP/ IP
PE
CSBX10
Embedded Systems
10
PE
CSBX11
Hacking Techniques
PE
CSBX12
12
PE
CSBX13
Cyber Forensics
13
PE
CSBX14
14
PE
CSBX15
Internet of Things
15
PE
CSBX16
Complex Networks
16
PE
CSBX17
Mobile Commerce
17
PE
CSBX18
18
PE
CSBX19
Web Engineering
19
PE
CSBX20
Internet Technologies
20
PE
CSBX21
Game Theory
21
PE
CSBX22
22
PE
CSBX23
23
PE
CSBX24
Information Retrieval
24
PE
CSBX25
25
PE
CSBX26
Clustering Techniques
26
PE
CSBX27
Knowledge Engineering
27
PE
CSBX28
Visualization Techniques Q
28
PE
CSBX29
29
PE
CSBX30
Web Mining
30
PE
CSBX31
31
PE
CSBX32
32
PE
CSBX33
33
PE
CSBX34
Software Agents
34
PE
CSBX35
35
PE
CSBX36
Pattern Recognization
36
PE
CSBX37
37
PE
CSBX38
38
PE
CSBX39
Computer Graphics
39
PE
CSBX40
40
PE
CSBX41
41
PE
CSBX42
Software Maintenance
42
PE
CSBX43
43
PE
CSBX44
44
PE
CSBX46
Nosql Database
45
PE
CSBX47
Multicore Architecture
46
PE
CSBX48
Virtualization Techniques
47
PE
ECB3101
48
PE
CSBX49
Video Analytics
49
PE
CSBX50
GENERAL ELECTIVES
Sl. Course
Course
No. Group
Code
Course Title
Offering Department
1.
GE
GEBX01
Disaster Management
Civil
2.
GE
GEBX02
Nano Technology
Physics
3.
GE
GEBX03
Control Systems
EEE
4.
GE
GEBX04
Civil
5.
GE
GEBX05
Knowledge Management
CSE
6.
GE
GEBX06
Appropriate Technology
Civil /
Mechanical
7.
GE
GEBX07
Mechanical
8.
GE
GEBX08
Mechanical
9.
GE
GEBX09
Optimization Techniques
Mathematics
10.
GE
GEBX10
Mechanical
11.
GE
GEBX11
CBS
12.
GE
GEBX12
Mechanical
13.
GE
GEBX13
Energy Studies
Mechanical
14.
GE
GEBX14
Robotics
Mechanical
15.
GE
GEBX15
Cyber security
IT
16.
GE
GEBX16
Usability Engineering
CSE
17.
GE
GEBX17
Industrial Safety
Mechanical
SEMESTER I
MAB1181
P C
OBJECTIVES:
The course is aimed at
MODULE I MATRICES
Direction cosines & ratios angle between two lines equations of a plane equations
of a straight line - coplanar lines - shortest distance between skew lines sphere
tangent plane plane section of a sphere orthogonal spheres.
MODULE IV DIFFERENTIAL GEOMETRY
Curvature Cartesian and polar coordinates centre and radius of curvature circle of
curvature involutes & evolutes envelopes properties of envelopes and evolutes.
MODULE V MULTI-VARIATE FUNCTIONS
Linear equations of second order with constant and variable coefficients Simultaneous
first order linear equations with constant coefficients homogeneous equations of
Eulers type method of undetermined co-efficients, method of variation of parameters.
Total Hours : 60
TEXT BOOKS:
1. Veerarajan.T., Engineering Mathematics (5th edition) Tata Mc Graw Hill
Publishing Co. New Delhi, 2012.
2. Grewal B.S., Higher Engineering Mathematics (42 nd edition), Khanna
Publishers, New Delhi, 2012.
REFERENCES:
1. Kreyszig, E., Advanced Engineering Mathematics, 10th edition, John Wiley
and Sons (Asia) Pvt Ltd., Singapore, 2001.
2. Peter V. O'Neil, Advanced Engineering Mathematics, 7 th edition, Cengage
Learning, 2011.
3. Dennis G. Zill, Warren S. Wright, Advanced Engineering Mathematics, 4 th
edition, Jones and Bartlett publishers, Sudbury, 2011.
4. Alan Jeffrey, Advanced Engineering Mathematics, Academic Press, USA,
2002.
5. Ramana, B.V, Higher Engineering Mathematics Tata Mc Graw Hill Publishing
Co. New Delhi, 2006.
6. Venkataraman, M.K., Engineering Mathematics, Volume I, 2 nd edition,
National Publishing Co., Chennai, 2003.
OUTCOMES:
On completion of the course the students will be able to
ENB1181
ENGLISH
L T
3
P C
0 3
OBJECTIVES:
To help learners improve their vocabulary and to enable them speak fluently
and appropriately in different contexts.
Conducting a language proficiency test in the language laboratory to assess the use of
various parts of speech, vocabulary, phrasal verbs and idiomatic expressions of
students.
MODULE II LISTENING
Listening to BBC radio plays and VOA special lessons to teach Phonetics, accent and
intonation of spoken English Appreciation and critical review of popular movies like My
Fair Lady, Sound of Music. (Excerpts from the movies) - Historical/popular speeches
made by Winston Churchill, Abraham Lincoln (Gettysbergs Address), Swami
Vivekananda.
MODULE III SPEAKING
(a) Self introduction pair work introducing one another short conversations
exchanging opinions agreement /disagreement
(b) Short presentation (extempore speech) based on visuals Personal narrations
MODULE IV READING
(a)
Science fiction- Issac Asimovs The Dead Past(Abridged version) - Wings of Fire
Creative thinking retelling a story with different ending; critical appreciation of
plot and characters
After completion of the course, students will have the ability to communicate
correctly and effectively in academic and professional contexts through exposure
and practice in LSRW skills.
FRB1181
FRENCH
L T
OBJECTIVES:
12
12
14
The students will be able to deal with their clients effectively at global level.
ISB1181
ARABIC
OBJECTIVES:
Communication:
Family, travel
Market, Prayer hall
Writing skills:
Note making.
Sequencing of sentences.
Developing answers from the questions.
Exercises.
MODULE V TECHNICAL ARABIC
Importance of technical communication.
Reading and writing skills.
Audio & Video aided listening.
Introduction to Arabic terms related to administration.
Situation communication:
Situation communication:
Contractual work, machineries and equipments..
Computer, internet browsing.
Banking,
Exercises.
Total Hours: 45
TEXT BOOK:
1. Arabic for professionals and employees, Kilakarai Bukhari Aalim Arabic
College, Chennai, India, 2013.
REFERENCES:
1. Arabic Reader for Non Arabs (Ummul Qura University, Makkah), Kilakarai
Bukhari Aalim Arabic College, 2005.
OUTCOMES:
On successful completion of the course, the student will be able to:
PHB1181
PHYSICS
OBJECTIVES:
Introduction Space lattice unit cell Bravais lattices Miller Indices for cubic crystals
Inter planar spacing in cubic lattice Simple crystal structures
SC, BCC, FCC and HCP structures Atomic radius, coordination number, Packing
factor calculation Crystal imperfections.
MODULE III QUANTUM PHYSICS
OUTCOMES:
At the end of the course, the students will be able to
Apply the knowledge of properties of matter in Engineering Mechanics and Fluid
Dynamics.
Characterize Engineering materials
Use Lasers for Fiber Optics Technology and Material Processing
Do non-destrictive testing using Ultrasonic Techniques
CHB1181
CHEMISTRY
OBJECTIVES:
To make students conversant with the
Basic principles of green chemistry and the need for green processes in
industries.
1. Jain P.C and Renuka Jain, Physical Chemistry for Engineers, Dhanpat Rai
and Sons, New Delhi. (2001).
2. Paul T. Anastas, John C. Warner, Green Chemistry: Theory and Practice,
Oxford University Press, (1998).
REFERENCES:
1. Bahl B.S., Tuli and Arun Bahl, Essentials of Physical Chemistry, S. Chand
and Company Ltd., New Delhi, (2004).
2. Kuriacose J.C. and Rajaram J, Chemistry in Engineering and Technology,
Volume1, Tata McGraw- Hill publishing company, New Delhi, (1996).
3. Puri B.R., Sharma L.R. and Madan S. Pathania, Principles of Physical
Chemistry, Shoban Lal Nagin Chand and Co., Jalandhar, (2000).
OUTCOMES:
At the end of the course, students will be able to
GEB1101
ENGINEERING GRAPHICS
OBJECTIVES:
10
Orthographic projection first angle, third angle projection methods, free hand sketching
of orthographic views of simple machine parts as per first angle projection. Projection of
points. Commands and demonstration of drafting packages.
MODULE III PROJECTION OF STRAIGHT LINES AND PLANES
10
Straight lines in first quadrant true length and true inclinations, traces rotating line
and trapezoidal methods. Projection of plane lamina in first quadrant trace of plane.
MODULE IV PROJECTION OF SOLIDS
10
Projection of solids: Axis inclined to one reference plane only - prism, pyramid, cone,
cylinder change of position and auxiliary projection methods.
10
Section of solids: prism, pyramid, cone, cylinder, and sphere sectional views
true shape of sections - solids in simple position and cutting plane inclined to one
reference plane only.
Development of surfaces: truncated solids - prism, pyramid, cone, cylinder, frustum of
cone and pyramid.
MODULE VI PICTORIAL PROJECTIONS
12
Isometric projection: isometric scale - isometric projection and view of prism, pyramid,
cylinder, cone, frustums and truncated solids.
Perspective projection: prism, pyramid, cylinder, frustums visual ray and vanishing
point methods.
Total Hours: 60
TEXT BOOK:
1. N.D. Bhatt, Engineering Drawing Charotar Publishing house, 46 th Edition,
(2003)
REFERENCES:
1. K.V. Natarajan, A text book of Engineering Graphics, Dhanalakshmi publishers,
Chennai. (2006)
2. Venugopal. K, and V. Prabhu Raja, Engineering Graphics, New Age International
3. (P) Ltd., Publication, Chennai. (2011)
OUTCOMES:
Students who complete this course will be able to:
SSB1181
INTRODUCTION TO ECONOMICS
OBJECTIVES:
MODULE I INTRODUCTION
National Income concepts GNP, GDP, disposable Income; Aggregate demand and
Aggregate supply, macroeconomic equilibrium - concepts of MPS, APS, MPC APC,
Inflation prices indices WPI, CPI and Inflation control.
MODULE III MONEY AND BANKING
Public and private sectors Contribution to the national economy, Industrial policy.
Markets labor, capital and debt market. Trade: domestic and International trade.
They will have learnt about the economic reforms introduced in Indian economy
and the role of engineers towards the economic growth and development of the
country.
PHB1182
PHYSICS LABORATORY
OBJECTIVES:
LIST OF EXPERIMENTS:
1. Torsional Pendulum- Determination of rigidity modulus of a given wire.
2. Determination of coefficient of viscosity of a liquid by Poiseuilles method.
3. Determination of Youngs modulus of a beam using non uniform bending
method.
4. Determination of a thickness of a given wire Air wedge.
5. Spectrometer- determination of wavelength of given source by using grating.
6. Determination of velocity of ultra sonic waves Ultrasonic Interferometer.
7. Determination of numerical aperture and acceptance angle of an optical fiber.
8. Determination of particle size using Laser.
9. Growth of crystal by slow evaporation technique.
10. Determination of angle of divergence of Laser beam.
11. Photo electric effect experiment.
OUTCOMES:
On completion of this course, the student will know
CHB1182
CHEMISTRY LABORATORY
OBJECTIVES:
To make students conversant with the
Estimation of pH of solutions.
LIST OF EXPERIMENTS:
1. Estimation of hardness in domestic water.
2. Estimation of total dissolved solids (TDS) in domestic water
3. Construction and determination of emf of a cell.
4. Determination of single electrode potential.
5. Estimation of strong acid in the industrial effluents
6. Estimation of Fe2+ present in unknown sample by Potentiometry
7. Verification of Beer-Lamberts law and estimation of Cu2+ present in unknown
sample.
8. Estimation of Na and K present in the agricultural field by flame photometry.
9. Study of effect of inhibitors in free radical polymerization (Demo)
OUTCOMES:
At the end of the course, students will be able to
GEB1102
L T P
LABORATORY
0 0 2
OBJECTIVES:
To enable the students to appreciate the practical difficulties and safety issues
OUTCOMES:
Students who complete this course
Should be able to attend minor defects especially in items used in day to day
life
Should be aware of the safety aspects involved in using tools and instruments
GEB1103
COMPUTER PROGRAMMING
L TP
& APPLICATIONS
2 0 2
OBJECTIVES:
30
OUTCOMES:
Students who complete this course will be able to:
Recognize
Build simple real time applications using the programming constructs and
algorithms.
the
basic
terminology
used
in
computer
programming.
SEMESTER II
MAB1282
ADVANCED CALCULUS
L T
3
OBJECTIVE:
The aim of the course is to
Line, surface and volume integrals Greens, Gauss Divergence and Stokes theorems
(without proof) verification and evaluation of integrals using them.
MODULE IV ANALYTIC FUNCTION
Analytic function - Necessary and Sufficient condition (Proof not included) CauchyRiemann equations in polar coordinates - properties of analytic function
determination of analytic function conformal mapping (w = z+a, az and 1/z) and
bilinear transformation.
MODULE V COMPLEX INTEGRATION
PHB1283
L T P
3 0 0
OBJECTIVE:
10
Electron ballistics : charged particle, force on charged particles in an electric field, force
on charged particles in Magnetic field - Parallel electric and magnetic field Perpendicular electric and magnetic field - Classical free electron theory of metals
Derivation for electrical conductivity Merits and drawbacks of classical theory
Quantum free electron theory of metals and its importance (qualitative) Energy
distribution of electrons in metals Fermi distribution function Density of energy states
and carrier concentration in metals (derivation) Fermi energy Classification of solids
into conductors, semiconductors and insulators on the basis of band theory.
MODULE II SEMICONDUCTING MATERIALS
Superconductivity - BCS theory - Meissner effect - Critical magnetic field - Type I and
Type II superconductors - High temperature superconductors - Applications of
superconductors: SQUID and magnetic levitation.
MODULE VI OPTICAL AND NEW ENGINEERING MATERIALS
SSB1182
OBJECTIVES:
Development Institutions, classes women and society impact of social laws, social
change in contemporary India secularism and communalism social exclusion and
inclusion.
MODULE III INDUSTRIAL SOCIOLOGY
GEB1211
L T
OBJECTIVES:
To impart knowledge about the basic laws of statics and dynamics and their
applications in problem solving
To acquaint with scalar and vector approaches for representing forces and
moments acting on particles and rigid bodies and their equilibrium
Free body diagram Types of supports and their reactions requirements of stable
equilibrium Moments and Couples Moment of a force about a point and about an axis
Vectorial representation of moments and couples Scalar components of a moment
Varignons theorem - Equilibrium of Rigid bodies in two dimensions Examples
MODULE IV PROPERTIES OF SURFACES
Determination of Areas First moment of area and the Centroid of sections Rectangle,
circle, triangle from integration T section, I section, Angle section, Hollow section by
using standard formula second and product moments of plane area Physical
relevance - Rectangle, triangle, circle from integration section, I section, Angle section, Hollow section by using standard formula Parallel
axis theorem and perpendicular axis theorem Polar moment of inertia.
10
MODULE V LAWS OF MOTION
Review of laws of motion Newtons law Work Energy Equation of particles
Impulse and Momentum Impact of elastic bodies.
MODULE VI FRICTION
Should be able to resolve forces, moments and solve problems using various
principles and laws
EEB1281
LT P
3 0 0
OBJECTIVES:
To impart knowledge on
DC generator and Motor Working Principle and Operating Characteristics Starters for
DC motors and speed control applications. Transformers - Single phase and three
phase transformers- Working Principle EMF equation - equivalent circuit and
performance calculations. Three phase and single phase induction motors - Working
Principle -Torque-Slip characteristics-Starting and speed control use of induction motor
as industrial drives.
MODULE III ELECTRIC POWER SYSTEMS
MODULE IV SEMICONDUCTORS
Bipolar junction transistor- CB, CE, CC configuration and characteristics-ComparisionField effect transistor-Configuration and characteristic-SCR, DIAC, TRIAC, UJTCharacteristics and simple applications-MOSFET: PMOS. NMOS- Structure and
characteristics
Total Hours : 45
REFERENCES:
1. William H. Hayt Jr, Jack E. Kemmerly, and Steven M. Durbin, Engineering
Circuit Analysis, Tata McGraw Hill Publishing Co Ltd, New Delhi, 200.2
2. Vedam Subrahmanyam, "Electric Drives", McGraw-Hill Education (India) Pvt
Limited, 2010.
3. Edward Hughes, Electrical and Electronics Technology, Pearson India, 9 th
Edition, 2007.
4. D.P.Kothari and I.J.Nagrath, Basic Electrical Engineering, Tata McGraw Hill
Publishing Co Ltd, 2nd Edition, 2002.
5. I.J. Nagrath and D.P.Kothari, Power System Engineering, Tata McGraw Hill
Publishing Co Ltd, 2nd Edition, 2007.
6. Ewald F.Fuchs and Mohammed A.S.Masoum, Elsevier Academic Press, 2008.
7. Indian Electricity Rules,1956.
8. Jacob Millman & Christos C.Halkias, Electronic Devices and Circuits Tata
McGrawHill, 1991.
9. Floyd, Electronic Devices: Conventional Current Version, 7/E Pearson
Education India, 2008
CSB1211
LTPC
3 003
OBJECTIVES:
Principles of Angle modulation FM and PM, phase deviation and frequency deviation,
Modulation Index, phase and frequency modulators and demodulators, frequency
spectrum of Angle Modulated waves. Bandwidth requirements, Power distribution and
average power; Phase modulators and demodulators, Frequency Modulators and
demodulators, Direct FM transmitters, Indirect FM transmitters, FM receivers: FM noise
suppression, frequency vs phase modulation.
MODULE III PULSE MODULATION
Shannon limit for information capacity, Shift Keying techniques, ASK modulators and
demodulators, FSK modulators and demodulators, BPSK Transmitter and receiver,
QPSK Transmitter and receiver, DPSK.
MODULE V DATA COMMUNICATION
Analyze the relevant error detection and correction techniques for data
transmission.
ENB1282
WRITTEN COMMUNICATION
OBJECTIVES:
Writing stories based on visuals - Preparing an outline for a story - Writing critical
reviews on an article / a paper
MODULE III CORPORATE CORRESPONDENCE
Tone in formal writing e-mail writing, memo, fax, agenda and minutes writing.
Lab: viewing e-mail etiquette, format and conventions of writing memo.
MODULE IV OFFICIAL LETTERS
Writing a technical proposal Format cover page, executive summary, timeline chart,
budget estimate, drafting, conclusion,.
Total Hours: 30
REFERENCES:
1. Riordan & Pauley. Report Writing Today. 9th Edition. Wadsworth Cengage
Learning, USA. 2005.
2. Gerson, Sharon & Steven M. Gerson, Technical Writing: Process and Product
Pearson Education, New Delhi. 2004.
3. M Ashraf Rizvi Effective Technical Communication. Tata McGraw-Hill
Education, 2005.
4. Sharma, R.C. & Krishna Mohan, Business Correspondence and Report
Writing. Tata MacGraw Hill Publishing Company Limited, New Delhi. 2002.
5. Anderson, Durston & Pool. Thesis and Assignment Writing. 4th Edition. John
Wiley & Sons. Australia. 2002.
OUTCOME:
On completion of the course, the students will have the ability to write all kinds
of formal correspondence like letters, reports and proposals.
EEB1282
LT P
ENGINEERING LAB
0 0 3
OBJECTIVES:
LIST OF EXPERIMENTS:
1. Verification of Thevenins theorem and Nortons theorem using MATLAB
2. Open circuit characteristics and Load Characteristics of Self Excited DC
Generator
3. Load Test on DC Shunt and DC Series Motor
4. Load Test on Single Phase Transformer
5. Load Test on Three Phase Induction Motor
6. Measurement of 3 phase power using 2 wattmeter method
7. PN Junction Diode characteristics.
8. Zener Diode characteristics.
9. Input and Output characteristics of BJT in CE configuration.
10. Characteristics of JFET.
11. SCR Characteristics.
OUTCOMES:
At the end of the course, the student should be able to:
Construct and simulate any given simple electric circuits and verify theorems
using MATLAB
PHB1284
LT P
LABORATORY
0 0 2
LIST OF EXPERIMENTS:
1. Determination of magnetic field along the axis of a circular coil Stewart and
Gees experiment.
2. Determination of electrical conductivity of a given metal by four point probe
method.
3. Determination of Hall coefficient of a given semiconductor material.
4. Determination of band gap of a semiconductor diode.
5. Determination of dielectric loss of a dielectric material using LCR bridge
method.
6. Determination of time constant of an RC circuit by charging and discharging of
a capacitor.
7. Determination of magnetic susceptibility of a paramagnetic material using
Quinckes method.
8. Determination of energy loss of a given transformer coil using Hysteresis BH curve.
9. Determination of Verdet constant of a material using Faraday Effect.
10. Determination of Kerr constant using electro optic modulators.
OUTCOMES:
At the end of the course, the student will be able to
Know the principle and working of Kerr modulator and Faraday rotator.
SEMESTER III
MAB 2181
L T P C
3 1 0 4
OBJECTIVES:
The course aims to
Develop the skills of the students in the areas of boundary value problems and
transform techniques.
Dirichlet's conditions - General Fourier series - Odd and even functions - Half-range sine
series - Half-range cosine series - Complex form of Fourier Series - Parseval's identity Harmonic Analysis.
MODULE III BOUNDARY VALUE PROBLEMS
Classification of second order quasi linear partial differential equations - Solutions of one
dimensional wave equation - One dimensional heat equation - Steady state solution of
two-dimensional heat equation (Insulated edges excluded) - Fourier series solutions in
Cartesian coordinates.
MODULE IV FOURIER TRANSFORM
Fourier integral theorem (without proof) - Fourier transform pair - Sine and Cosine
transforms - Properties - Transforms of simple functions - Convolution theorem Parseval's identity.
MODULE V Z -TRANSFORM AND DIFFERENCE EQUATIONS
SSB2181
LTPC
3003
OBJECTIVES:
Union executive, Legislature - Union - State and union territories, Union and state
relations, powers vested with parliament and state legislature, emergency provisions People's Representations Act - Election Commission - Election for parliament and state
legislature, Judiciary.
MODULE III HUMAN RIGHTS
Human rights - meaning and significance, International law on human rights, Covenant
on civil and political rights; Covenant on Economic, social and cultural rights - protocol,
UN mechanism and agencies, watch on human rights and enforcement - Role of
judiciary and commission, Right to information Act 2005 - Evolution - Concept - Practice.
MODULE IV CORPORATE AND LABOUR LAWS
Corporate laws - Meaning and scope - Laws relating to companies, Companies Act 1956
- Collaboration agreement for Technology transfer, Corporate liability - Civil and criminal
- Industrial employment (standing orders) Act 1946, Industrial Disputes Act, 1947,
Workmen's Compensation Act 1923, The Factories Act, 1948 - Industry related other
specific laws.
Types of contract - Standard form of contracts - General principles under Indian Contract
Act, 1872 - Protection against exploitation - Judicial approach to contracts, Arbitration
and conciliation - Meaning, scope and types, model law, judicial intervention,
international commercial arbitration - Arbitration agreement, arbitration tribunal - Powers
and jurisdiction, enforcement and revision, Geneva Convention, Awards, Confidentiality.
MODULE VI LAWS RELATED TO IPR
IPR - Meaning and scope, International Convention - Berne and Parrys Conventions,
International organization - WIPO - TRIPS, Major Indian IPR Acts - Copyright laws,
Patent and Design Act, Trademarks Act, Trade Secret Act, Geographical Indicator,
Securing of International patents.
Total Hours: 45
REFERENCES:
1. Jain M.P, Indian Constitutional Law, Wadhwa & Co., (2005)
2. Subhash G. & Kashyap, Our Constitution : An introduction to Indias
Constitution and Constitutional Law, 3rd Edition, National Book Trust, India
(2001)
3. Agarwal H.D., International Law and Human Rights, Central Law
Publications, (2008).
4. Meena Rao, Fundamental Concepts in Law of Contract, 3 rd Edition,
Professional offset, (2006).
5. Ramappa, Intellectual Property Rights Law in India, Asia Law House (2010)
6. Avtar Singh, Company Law, Eastern Book Co., (2007).
7. Rustamji R.F., Introduction to the Law of Industrial Disputes, Asia Publishing
House.
8. Acts : Right to Information Act, Industrial Employees (standing order) Act,
Factories Act, Workmen Compensate Act.
OUTCOMES:
Students will be
Familiar with Indian Constitution and Governance of our country, local and
International redressal mechanism.
Able to apply corporate laws, important industrial and labour laws of our
country.
CSB2101
L T P C
3 0 0 3
OBJECTIVES:
To give the foundation for Object oriented analysis and design of algorithms.
To convert the object oriented algorithms into programs using Object oriented
languages
To be able to analyze real time scenarios and design object oriented applications
Java: an Introduction, Life cycle of a Java program, Java virtual machine, Programming
in Java - Declaring Variables - Packages and Interfaces - Exception Handling. Java I/O
streaming - Filter and pipe streams - Byte Code interpretation - Threading -Swing.
MODULE III NETWORK PROGRAMMING IN JAVA
Sockets - Secure sockets - Custom sockets - UDP datagrams - Multicast sockets -URL
classes - Reading Data from the server - Writing data - Configuring the connectionReading the header- Java Messaging services.
MODULE IV APPLICATIONS IN DISTRIBUTED ENVIRONMENT
CSB2102
DATA STRUCTURES
LTPC
30 03
OBJECTIVES:
Data and Information - Data Structure Types - Concept of Data Types - Abstract Data
Types- Pointers - Structures - Unions - Arrays - Multidimensional Arrays.
MODULE II LISTS, STACKS AND QUEUES
List ADT - Stack ADT - Queue ADT - Array Implementation of Stack - Array
Implementation of Queue - Singly Linked List - Double Linked List - Stack and Queue
using Linked List - Circular Queue.
MODULE III TREES
Basic Terms - Binary Trees - Complete Binary Tree - Search Tree ADT - Binary Search
Tree - AVL Trees - Expression Trees - Tree Traversals - B Tree - Threaded Binary Tree.
MODULE IV SEARCHING AND HASHING
SORTING
MODULE VI
GRAPHS
Apply and compare the different sorting algorithms for the given data.
Write suitable shortest path algorithm for the given case study.
Identify and address the challenges of graph, sorting and searching algorithms in
real time scenario.
CSB2103
LTPC
31 04
OBJECTIVES:
Use the concepts of state and state transition for analysis and design of
sequential circuits
Use the functionality of flip-flops for analysis and design of sequential
circuits
Review of Binary Number Systems - Binary Arithmetic - Binary Codes - Boolean Algebra
and Theorems - Boolean Functions - Canonical and standard forms.
MODULE II GATE-LEVEL MINIMIZATION
Logic operations-Digital Logic Gates-The K-Map method-Two variable-Three variableFour Variable -Product of sums simplification - Don't care conditions-NAND and NOR
implementation - Other two-level implementations - Exclusive-OR function-Introduction to
HDL.
MODULE III COMBINATIONAL LOGIC
Registers-Shift Registers -Ripple Counters - Synchronous Counters-Other CountersHDL for Registers and Counters-Memory and Programmable Logic.
MODULE VI DESIGN AT THE REGISTER TRANSFER LEVEL
Introduction-Register Transfer Level Notation-Register transfer level in HDL-ASMsSequential Binary multiplier-Control Logic-HDL description of Binary Multiplier-Design
with Multiplexers.
Total Hours - 60
TEXT BOOK:
1. M. Morris Mano and Michael D.Ciletti, "Digital Design with an introduction to
the Verilog HDL", 5th Edition, Pearson Education, 2012.
REFERENCES:
1. Charles H.Roth Jr, "Fundamentals of Logic Design", 5 th Edition, Jaico
Publishing House, Mumbai, 2003.
2. Donald D. Givone, "Digital Principles and Design", 13 th reprint, Tata
McGraw Hill, 2003.
OUTCOMES:
Students who complete this course will be able to:
Apply the different switching algebra theorems and apply them for logic functions.
Demonstrate the use of Karnaugh map for a few variables and perform an
algorithmic reduction of logic functions.
CSB2104
COMPUTER ARCHITECTURE
LTPC
30 03
OBJECTIVES:
To explain the basic structure, operation of a digital computer and instruction sets.
To illustrate the basic principles of arithmetic and logic unit.
To describe the concept of pipelining and data transfer.
To discuss in detail the operation of the arithmetic unit including the algorithms &
implementation
of
fixed-point
and
floating-point
addition,
subtraction,
Functional units - Basic operational concepts - Bus structures - Software performance Memory locations and addresses - Memory operations - Instruction and instruction
sequencing - Addressing modes - Assembly language - Basic I/O operations - Stacks
and queues.
MODULE II ARITHMETIC UNIT
Fundamental concepts - Execution of a complete instruction - Multiple bus organization Hardwired control - Micro programmed control.
MODULE IV PIPELINING
Basic concepts - Semiconductor RAMs - ROMs - Speed - size and cost - Cache
memories - Performance consideration - Virtual memory- Memory Management
requirements - Secondary storage.
MODULE VI I/O ORGANIZATION
Accessing I/O devices - Interrupts - Direct Memory Access - Buses - Interface circuits Standard I/O Interfaces (PCI, SCSI, USB).
Total Hours: 45
TEXT BOOK:
1. Carl Hamacher, Zvonko Vranesic and Safwat Zaky, "Computer organization",
5th Edition, McGraw Hill, 2002.
REFERENCES:
1. William Stallings, "Computer Organization and Architecture - Designing for
Performance", 9th Edition, Pearson Education, 2012.
2. John P.Hayes, "Computer Architecture and Organization", 3rd Edition, McGraw
Hill, 1998.
OUTCOMES:
Students who complete this course will be able to:
Describe the organization of the control unit, Arithmetic and Logical unit, Memory
unit and I/O unit.
Demonstrate the working of central processing unit and RISC and CISC
Architecture
Describe the operations and language f the register transfer, micro operations and
input- output organization
ENB2181
ORAL COMMUNICATION
L T P C
0 0 2 1
OBJECTIVES:
MODULE I
i.
ii.
One-minute Presentations (JAM) on concrete and abstract topics that test their
creative thinking.
iii.
iv.
Group project - presentation on any social issue. The group will have to
research on the history of the problem, its cause, impact and outcome hoped
for and then make a presentation.
v.
MODULE II
Developing persuasive skills - Selling a product - Marketing skills - The topics will be on
advertising, convincing someone on social issues such as preservation of water, fuel,
protection of environment, gender discrimination.
4
MODULE IV
Debates on pros and cons on topics of relevance like Nuclear Energy, Appropriate
Technology, Internet, Social Media. This will be followed by Peer and Faculty feedback.
MODULE V
Brainstorming - Think, pair and share activity - Discussion etiquette - Assigning different
roles in a GD (Note-taker, Manager, Leader and Reporter) Peer and faculty feedback.
MODULE VI
Interview Skills - Assessing one's strengths and weaknesses, SWOC Analysis, Mock
interview - Verbal and Non-verbal Communication - Types of Job Interview - Telephone
Interview, Stress Interview.
Total Hours: 30
REFERENCES:
1. Hancock, Mark. "English Pronunciation in Use", Cambridge University Press, UK.
2005.
2. Anderson, Kenneth & et.al. "Study Speaking: A Course in Spoken English for
Academic
Purposes", 2nd Edition, Cambridge University Press, UK. 2004.
3. Hurlock, B. Elizabeth, "Personality Development", Tata McGraw Hill, New York,
2004.
OUTCOME:
On completion of the course, the students will have the ability to speak confidently
and effectively in Presentations and Group Discussions.
CSB2105
T P
OBJECTIVES:
To implement the basic concepts of object oriented programming using java.
Have the ability to write a computer program to solve specified problems.
Be able to use the Java SDK environment to create, debug and run simple Java
programs.
Be aware of the important topics and principles of software development
To understand fundamentals of object-oriented programming in classes,invoking
methods and functions.
Learn to create packages, interfaces and threads using java and oops concepts.
LIST OF EXPERIMENTS:
1. Simple java program with Control statements.
2. Getting input from user console.
3. Classes, Object and Constructors.
4. Method overloading.
5. Inheritance.
6. Final variable, method and class.
7. Creating packages.
8. User-defined interfaces.
9. Pre-defined interfaces.
10. Simple and Multiple threads.
11. Exception handling in java.
12. Graphics class.
13. File handling.
14. Web Page creation using Applet.
Total Hours: 45
OUTCOMES:
Students who complete this course will be able to:
CSB2106
LT PC
00 31
OBJECTIVES:
To implement the operations on stack, queues, trees and graphs for the given
data set.
Identify and implement the suitable sorting algorithm for the given data.
To represent the data in the form of graph and design the traversal algorithm for
the given scenario.
LIST OF EXPERIMENTS:
1. Study of List ADT: - Simple exercises, implementation of Stacks, Queues,
Circular Queues.
2. Study of Singly Linked List: - Operations on Singly Linked List,
implementation of Stacks, Queues.
3. Study of Doubly Linked List: - Operations on Doubly Linked List.
4. Applications of Linked Lists such as Polynomial addition.
5. Applications of Stacks and Queues such as infix to postfix expression
conversion and evaluation.
6. Binary tree implementation - Applications such as expression tree traversal
(inorder, preorder & postorder).
7. Binary search tree - insertion traversal and deletion operations.
8. Implementation of search algorithms - linear search and Binary Search.
9. Implementation of sorting algorithms (selection sort, bubble sort, quick sort,
Heap sort).
10. Representation of graph and traversal algorithm.
Total Hours: 45
OUTCOMES:
Students who complete this course will be able to:
Suggest and implement a suitable sorting algorithm for the given data
Design the graph for the given data and suggest a shortest path for the given
scenario
CSB2107
DIGITAL LAB
LTPC
0001
OBJECTIVES:
To learn different types of digital logic gates and truth table.
LIST OF EXPERIMENTS:
1. Verify the truth table of AND, OR, NOT, EX-OR, gate.
2. Verification of NAND, OR, EX-OR, NOR using 7400 IC.
3. Design a hardware circuit to perform the operation of half &full adder.
4. Design a hardware circuit to perform the operation of full subtractor.
5. Verify the truth table of RS, D, T, JK Flip Flop.
6. Study asynchronous counter in up & down mode.
7. To study multiplexer and demultiplexer.
8. To study decade counter.
9. To design D/A, A/D converter.
Total Hours: 45
OUTCOMES:
Students who complete this course will be able to:
Examine the operation of the logic gates.
Design simple combinational/sequential circuits.
Represent logical functions in Canonical form and with AND, OR, NOT, XOR,
NAND, NOR logic gates
SEMESTER IV
MAB2285
DISCRETE MATHEMATICS
LTP C
3 1 0 4
OBJECTIVES:
The aim of this course is to
Predicates - Statement function - Variables - Free and bound variables - Quantifiers Universe of discourse - Logical equivalences and implications for quantified statements Theory of inference - The rules of universal specification and generalization - Validity of
arguments.
MODULE III GRAPHS
Graphs and graph models - Graph terminology and special types of graphs - Presenting
graphs and graph isomorphism - Connectivity - Euler and Hamilton paths.
MODULE IV GROUPS
Rings - Some special classes of rings - Subrings - Field and subfields - Ideals - Quotient
Rings - Homomorphism.
MODULE VI LATTICES AND BOOLEAN ALGEBRA
Total Hours : 60
TEXT BOOKS:
1. Trembly J.P and Manohar R, "Discrete Mathematical Structures with
Applications to Computer Science", Tata McGraw-Hill Pub. Co. Ltd, New Delhi,
2003.
2. Kenneth H.Rosen, "Discrete Mathematics and its Applications", 5 th Edition,
Tata McGraw - Hill Pub. Co. Ltd., New Delhi, 2003.
REFERENCES:
1. Ralph. P. Grimaldi, "Discrete and Combinatorial Mathematics: An Applied
Introduction", 4th Edition, Pearson Education Asia, Delhi, 2002.
2. Richard Johnsonbaugh, "Discrete Mathematics", 5th Edition, Pearson
Education Asia, New Delhi, 2002.
3. C.L.Liu, "Elements of Discrete Mathematics" Tata McGraw - Hill Pub. Co. Ltd.,
New Delhi, 2003.
OUTCOMES:
At the end of the course, students will be able to
CSB2211
LTPC
3003
OBJECTIVES:
Understand basic database concepts, including the structure and operation of the
relational data model.
MODULE I INTRODUCTION
OUTCOMES:
Students who complete this course will be able to:
CSB2212
OPERATING SYSTEM
LTPC
3003
OBJECTIVES:
To provide a knowledge about how the memory management is done with the
help of operating systems.
To learn the techniques for managing the I/O devices and files.
Operating Systems Objectives and Functions - Evolution of the Operating systems Operating System Structures.
MODULE II PROCESS MANAGEMENT & SCHEDULING
Process Life cycle - Process control - Threads - Multi Threads - Scheduling criteria Types of scheduling - Scheduling Algorithms.
MODULE III PROCESS SYNCHRONIZATION
10
10
Find how to manage the resources like memory, I/O devices and files.
CSB2213
LT PC
CONTROLLERS
3 0 0 3
OBJECTIVES:
Instruction formats-Addressing modes-Instruction set-Assembler directives-MacrosSimple programs involving logical-Branch and call instructions-sorting-Evaluating
arithmetic expressions-String manipulations.
MODULE III I/O INTERFACE
8255 PPI various mode of operation and interfacing to 8086-Interfacing keyboardDisplay-Stepper motor interfacing-D/A and A/D converter.Memory interfacing to 8086Vector interrupt table-Interrupt service routine.
MODULE IV COMMUNICATION INTERFACE
Design and simulate real time applications using simulators and emulators.
CSB2214
LTPC
3003
OBJECTIVES:
Exemplify the features of a programming language and identify its suitability for
the given task
.MODULE I INTRODUCTION
Primitive, character, user defined, array, associative, record, union, pointer and
reference types - Names - Variable-concept of binding- Type checking-Type
compatibility- Named constants, Variable initialization- Arithmetic, relational and Boolean
expressions-Short circuit evaluation Mixed mode assignment-Assignment StatementsControl Structures - Statement Level, Compound Statements-Selection-IterationUnconditional Statements- Guarded command.
MODULE IV SUBPROGRAMS AND BLOCKS
Master using the appropriate data structure for the given scenario
Use the correct control structure for the given problem and trace its execution
Path
LSB2181
LTPC
30 03
OBJECTIVES:
Cells as unit of life - Basic chemistry of cell - Physical and chemical principles involved in
maintenance of life processes, cell structure and functions - Prokaryotic and Eukaryotic
cells, cell wall, plasma membrane, endoplasmic reticulum, nucleus, chromosomes- Cell
division - Mitosis, meiosis - Molecules controlling cell cycle.
MODULE II BIOCHEMISTRY
Genes - Structure and functions - Behavior, dominance and epigenetics, evolution Inheritance - Reproduction and gene distribution - Genome of living organisms - Plants bacteria and viruses - Animals - Humans, genetic engineering.
MODULE IV MICROBIOLOGY
processes
Bio-membranes,
7
diffusion,
absorption,
osmo-regulation,
ENB2282
LT PC
0 0 21
OBJECTIVE:
Topics Outline:
This course is practical oriented one and exercises will be given to the students
group users /individually depending upon the aspect considered. The following aspect
will form the broad outline content of the syllabi. The exercises will be designed by the
faculty member and coordinated by the overall course coordinator.
Lab Activities:
Prepared speech
Impromptu speech
Debate: Case studies - Attitude and Behavior: role play and exploration
Time keeping
Conduct in workplace
Conscientiousness
Work output
Professionalism
Motivation
Ownership of tasks
Adaptability/flexibility
Assessment:
The assessment will be continuous and portfolio based. The students must produce the
record of the work done through the course of the semester in the individual classes. The
portfolio may consist of a) the individual task outline and activities, b) worked out
activities c) Pre-designed sheets which may be provided by the Faculty member. The
portfolio will be used by the Faculty member for assessment. The course coordinator in
consultation with the course committee shall decide at the beginning of the semester, the
number of exercises, method of assessment of each and the weightage for the end
semester assessment.
Total Hours: 30
OUTCOMES:
The students should be able to:
CSB2215
DBMS
LAB
LTPC
0031
OBJECTIVES:
To develop conceptual understanding of database management system
To understand how a real world problem can be mapped to schemas
Able to create database with different types of integrity constraints and use the
SQL commands such as DDL, DML, DCL, TCL to access data from database
objects.
Able to access and manipulate data using PL/SQL blocks.
To develop understanding of different applications and constructs of SQL PL/SQL
Able to connect database to front end using JDBC and ODBC driver.
SQL:
1. Creating, altering and dropping tables with integrity constraints.
2. Retrieving and modifying data from a database.
3. Retrieving data from database using IN, BETWEEN, LIKE, ORDER BY,
GROUP BY and HAVING clause.
4. Use of scalar and aggregate functions.
5. Retrieving data from a database using Equi, Non Equi, Outer and Self Join.
6. Using sub queries, row id and row num for retrieving data.
7. Use of views, indexes and sequences.
PL/SQL:
1. Introduction to PL/SQL, using output from server.
2. Use of implicit & explicit cursors in data handling.
3. Exception handling - Oracle defined and User defined.
4. Use of stored procedures & functions in data manipulation.
5. Use of trigger in data manipulation.
Total Hours: 45
OUTCOMES:
Students who complete this course will be able to:
Normalize a database
CSB2216
LTPC
0 031
OBJECTIVES:
LIST OF EXPERIMENTS
1. Write programs using the following system calls of UNIX operating system:
fork, exec,getpid, exit, wait, close, stat, opendir, readdir.
2. Write programs using the I/O system calls of UNIX operating system (open,
read, write)
3. Write C programs to simulate UNIX commands like ls, grep, etc.
4. Given the list of processes, their CPU burst times and arrival times, display/
print the Gantt chart for FCFS and SJF. For each of the scheduling policies,
compute and print the average waiting time and average turnaround time.
5. Given the list of processes, their CPU burst times and arrival times,
display/ print the Gantt chart for Priority and Round robin. For each of the
scheduling policies, compute and print the average waiting time and average
turnaround time.
6. Developing Application using Inter Process Communication
7. Implement the Producer - Consumer problem using semaphores (using
CSB2217
LTP
0 03
OBJECTIVES:
LIST OF EXPERIMENTS
1. Programming with 8085-8-bit/16-bit multiplication/division using repeated
addition/subtraction.
2. Programming
with
8085-code
conversion,
decimal
arithmetic,
bit
manipulations.
3. Programming with 8085-matrix multiplication, floating point operations.
4. Programming with 8086-string manipulation, search, find and replace, copy
operations, sorting.
5. Using BIOS/DOS calls: keyboard control, display, file manipulation(PC
Required).
6. Using BIOS/DOS calls: Disk operations(PC Required).
7. Interfacing with 8085/8086-8255, 8253.
8. Interfacing with 8085/8086-8279, 8251.
9. 8051 Microcontroller based experiments-Simple assembly language programs.
10. 8051 Microcontroller based experiments-Simple control applications.
Total Hours: 45
OUTCOMES:
Students who complete this course will be able to:
Develop simple programs in arithmetic, input output operations.
SEMESTER V
CSB3101
LTPC
3003
OBJECTIVES:
Demonstrate how an algorithm has been applied in a number of different
domains.
Basic Definitions and Applications - Graph Connectivity and Graph Traversal Implementing Graph Traversal using Queues and Stacks - Testing Bipartiteness: An
Application of Breadth-First Search Connectivity in Directed Graphs - Directed Acyclic
Graphs and Topological Ordering.
MODULE III GREEDY ALGORITHMS
Polynomial-time Reductions - Efficient Certification and the Definition of NP - NPComplete Problems - Sequencing Problems - Partitioning Problems - Graph Coloring Numerical Problems - co-NP and the Asymmetry of NP - A Partial Taxonomy of Hard
Problems.
Total Hours: 45
TEXT BOOK:
1. Michael T. Goodrich and Roberto Tamassia, "Algorithm Design", 1st Edition,
John Wiley & Sons, Inc. 2002.
REFERENCE:
1. TH Cormen, CE Leiserson, and RL Rivest, "Introduction to Algorithms", 2 nd
Edition, MIT Press/ McGraw- Hill, 2001.
OUTCOMES:
Students who complete this course will be able to:
Describe, apply and analyze the complexity of divide and conquer, greedy,
and dynamic programming algorithms.
Describe the classes P, NP, and NP-Complete and be able to prove that a
certain problems are NP-Complete.
Show how algorithms and data structures are applied in problems in computer
science engineering.
CSB3102
LTPC
3003
OBJECTIVES:
To introduce the basic concepts of software engineering and software life cycle
models.
To provide an insight into the concepts of modeling and notations of the different
UML diagrams.
To expose the techniques for requirement gathering design and specification.
To emphasize the importance of testing.
To state the basic strategy behind planning a project and tracking its progress.
To learn about the software configuration management
MODULE I INTRODUCTION TO SOFTWARE ENGINEERING
Introduction- Overview of requirements elicitation- Requirement elicitation conceptsRequirement elicitation activities - Managing requirement elicitation.
MODULE III ANALYSIS AND SYSTEM DESIGN
Compare the different life cycle models and select appropriate one for a real time
project.
Identify the different roles, responsibilities and artifacts produced during the
different phases of software development process.
CSB3103
COMPUTER NETWORKS
L T
OBJECTIVES:
Forwarding and Routing - Network Service Models - Virtual Circuit and Datagram
Networks - Router - Internet Protocol (IP) - IPv4 and IPv6 - ICMP - Link State Routing Distance Vector Routing - Hierarchical Routing - RIP - OSPF - BGP - Broadcast and
Multicast Routing - MPLS - Mobile IP - IPsec.
MODULE IV TRANSPORT LAYER
Principles of Network Applications - The Web and HTTP - FTP - Electronic Mail - SMTP Mail Message Formats and MIME - DNS - Socket Programming with TCP and UDP.
MODULE VI MULTIMEDIA NETWORKING
CSB3104
THEORY OF COMPUTATION
LTPC
3003
OBJECTIVES:
The learning objectives of this course are to:
Why study Automata Theory- Introduction to Formal Proof - Additional Forms of ProofInductive Proofs- The Central Concepts of Automata Theory.
MODULE II FINITE AUTOMATA
The Turing Machine- Programming Techniques for Turing Machines- Extensions to the
Basic Turing Machine- Turing Machines and Computers.
Total Hours: 45
TEXT BOOKS:
1. John Hopcroft, Rajeev Motwani & Jeffry Ullman "Introduction to Automata
Theory, Languages & Computation", 3rd Edition, Pearson Education, 2012.
2. John C Martin, "Introduction to Languages and Automata Theory", 3 rd Reprint
Edition, Tata McGraw-Hill, 2008.
REFERENCES:
1. Michael Sipser, "Introduction to the Theory of Computation", 3rd Edition, PWS
Publishing Company, 2013.
2. George Tourlakis, "Theory of Computation", 1st Edition, John Wiley & Sons,
2012.
3. Kamala Krithivasan & R. Rama, "Introduction to Formal Languages, Automata
Theory and Computation", 1st Edition, Pearson Education, 2009.
OUTCOMES:
Students who complete this course will be able to:
and
MANAGEMENT OF BUSINESSS
ORGANISATION
MSB3181
LTPC
3 0 0 3
OBJECTIVES:
Functions of management - Planning - Organizing - Staffing - Direction - Motivation Communication - Coordination - Control, organizational structures - Line - Line and staff Matrix type, functional relationships - Span of control, Management by Objectives (MBO)
- Forms of Industrial ownership.
MODULE II OPERATIONS MANAGEMENT
Materials Planning - Types of inventory, Purchasing function - Source selection Negotiation - Ordering, Stores management - Functions - Types of stores - Overview of
inventory control, Introduction to newer concepts: MRP-I - MRP-II - ERP - JIT.
MODULE IV HUMAN RESOURCE MANAGEMENT
Human Resource Management - Objectives - Role of Human Resource Manager Manpower planning - Selection and placement - Training - Motivation - Performance
assessment - Introduction to grievances handling and labour welfare.
7
MODULE V MARKETING MANAGEMENT
Marketing - Concept and definition - Elements of marketing mix - PLC - Steps in new
product development - Pricing objectives and methods - Advertising types/media - Steps
in personal selling - Sales promotion methods - Distribution channels: functions, types.
MODULE VI FINANCIAL MANAGEMENT
The students would have gained basic knowledge of the concepts of management
and the functions of management.
ENB3181
LTPC
0 0 2 1
OBJECTIVE:
To prepare the students for building their competencies and career building
skills.
COURSE OUTLINE:
This course is practical oriented one and exercises will be given to the students group
users /individually depending upon the aspect considered. The following aspect will form
the broad outline content of the syllabi. The exercises will be designed by the faculty
member and coordinated by the overall course coordinator.
LAB ACTIVITIES:
Enabling students to prepare for different procedures / levels to enter into any
company - books / websites to help for further preparation.
Workplace skills
Presentation skills
Oral presentations
Technical presentations
Business presentations
Technical writing
ASSESSMENT:
As the course is practical one, it will be assessed using a portfolio based assessment.
The students must in consultation with the Faculty member, plan a portfolio of evidence
for the above mentioned activities. The students must develop a rsum or rsums that
promote own ability to meet specific job requirements and plan their portfolio in a format
appropriate to industry they wish to target. The case studies will contain direct
observation of the candidate developing career plans, rsums and skills portfolio, reflect
written or oral questioning to assess knowledge and problem-solving activities to assess
ability to align career aspirations with realistic career goals. The course coordinator in
consultation with the course committee will decide the number of exercises and mark to
be awarded for each beside the weightage for the end semester assessment.
Total Hours: 30
OUTCOMES:
Students who complete this course will be able to:
CSB3105
LTPC
0031
OBJECTIVES:
Demonstrate familiarity with major algorithms and the important data structures
Illustrate, implement and compare fundamental data structures.
Analyze asymptotic performance of algorithms
Apply algorithm design paradigms
Apply important algorithmic design paradigms and methods of analysis.
Synthesize efficient algorithms in common engineering design situations.
LIST OF EXPERIMENTS
1. Writing a simple program of analyzing the complexity of the algorithm.
2. Comparing of any two searching algorithms with respect to time complexity.
3. Using suitable data structure represent a graph and write algorithm to traverse
the graph (BFS, DFS)
4. Design and implement prim's algorithm to construct a minimum spanning tree
and analyze the same for its complexity.
5. Design and implement Kruskal's algorithm to construct a minimum spanning
tree and analyze the same for its complexity.
6. Using divide and conquer concept design and analyze an algorithm to
implement Quick sort.
7. Design and implement an algorithm for Merge sort and compute its time and
space complexity.
8. Implement priority queue using heapsort
9. Implement Dijkstra's algorithm using priority queues
10. Implement a backtracking algorithm for Knapsack problem
Total Hours: 45
OUTCOMES:
Students who complete this course will be able to:
Differentiate search algorithms and explain the situation when the algorithm
must be applied.
Implement various traversing techniques and construct graph and tree from
the given data to manipulate the complexity of the algorithm.
CSB3106
L T
OBJECTIVES:
LIST OF EXPERIMENTS:
The following analysis can be designed for each experiment
1. Problem Analysis Identify project scope, requirement and Objectives
2. Software Requirement Analysis It defines the individual Phases of the
project.
3. Data Modelling- use case diagrams and activity diagrams, build and test.
4. Class diagrams with the functions defined, sequence diagrams and add
interface to class diagrams.
5. Software Development and Debugging.
6. Software Testing Prepare test plan and perform validation testing.
7. Remote computer monitoring (using virtualization tools)
8. Create and launch an app.
9. Expert system for medical purpose.
10. Platform assignment system for the trains in a railway station
11. E-mail Client system.
12. Expert Systems for launching IoT at home.
13. Design an infrastructure model for large storage of an online selling website.
14. Design laboratory that operate remotely and thats secured through some i/o
devices. .
Total Hours: 45
OUTCOMES:
Students who complete this course will be able to:
diagram,
Class diagram,
Sequence
diagram
and
Test the software, memory usage of the software and validate the text box using
Rational Rose.
Design a project using CASE tools for socially relevant and real time problems.
Compare and contrast the fitness of existing CASE Tools to the needs of specific
software development context
.
CSB3107
NETWORKS LAB
L T P C
0
OBJECTIVES:
LIST OF EXPERIMENTS:
1. Write a socket Program for Echo / Ping / Talk commands.
2. Create a socket (TCP) between two computers and enable file transfer
between them.
3. Write a program to implement Remote Command Execution
4. Write a program to implement CRC and Hamming code for error handling.
5. Write a code simulating Sliding Window Protocols.
6. A Client Server application for chat.
7. Write a program for File Transfer in client-server architecture using following
methods.
a. USING RS232C
b. TCP/IP
8. Perform implementation of routing algorithms to select the network path with
its optimum and economical during data transfer.
a. Shortest path routing
b. Flooding
c. Link State
d. Hierarchical
Total Hours: 45
OUTCOMES:
Students who complete this course will be able to:
SEMESTER VI
CSB3211
LT PC
3003
OBJECTIVES:
To focus on moving from the graphical user interface to the ubiquitous computing
user interface.
To establish the role of design process, tools and issues in context aware
computing.
To trace how the issues of security, privacy and trust management takes place for
pervasive environment.
Wireless pervasive network basics- Designing the topology - Analysing the power,
receiving signal strength - IEEE 802.11 standard MAC protocols - Wireless Adhoc and
sensor network protocol for pervasive computing: AODV, DSR, DSDV, LEACH Wireless transport layer protocols for pervasive computing: TCP, UDP, Multimedia data
protocols: RTP, RTCP.
From Graphical User Interfaces to Context Data - Interaction Design - System design Design patterns -Classes of User Interface - Input Technologies - Interface Usability
Metrics.
MODULE V CONTEXT-AWARE COMPUTING
Agents, Control policies, credentials and action types, Trust negotiation and
management for Pervasive Computing, Securing Pervasive Computing Environments,
Privacy issues, Enhancing privacy for pervasive environments.
Total Hours: 45
TEXT BOOKS:
1. John Krumm,"Ubiquitous Computing fundamentals", Taylor & Francis Group,
CRC Press, 2010.
2. Adam Greenfield,"Everyware: The Dawning Age of Ubiquitous Computing",1 st
Edition, New Riders, 2006.
3. Adelstein et al., "Fundamentals of Mobile and Pervasive Computing", Tata
McGraw Hill Publishers, 2005
4. Yang et al., "Handbook of Mobile and Pervasive Computing: Status and
perspective", CRC Press, 2012.
OUTCOMES:
Students who complete this course will be able to:
CSB3212
INTRODUCTION TO COMPILER
L T
PC
CONSTRUCTION
3 0
03
OBJECTIVES:
Introduction- Context-free Grammars; Writing a Grammar- Top-down Parsing - Bottomup Parsing- Introduction to LR Parsing: Simple LR - More powerful LR parsers- Using
ambiguous grammars -Parser Generators.
MODULE III SYNTAX-DIRECTED TRANSLATION
Issues in the design of Code Generator - The Target language; Addresses in the target
code- Basic blocks and Flow graphs - Optimization of basic blocks
A Simple Code Generator- Run time storage environment- storage organization-stack
allocation of space-Access to non local data on the heap management-introduction to
garbage collection.
MODULE VI CODE
OPTIMIZATION
CSB3213
ARTIFICIAL INTELLIGENCE
OBJECTIVES:
First order logic - Representation revisited - Syntax and semantics for first order logic Using first order logic - Knowledge engineering in first order logic - Inference in First
order logic - Prepositional versus first order logic - Unification and lifting - Forward
chaining - Backward chaining - Resolution - Knowledge representation - Ontological
Engineering - Categories and objects - Actions - Simulation and events - Mental events
and mental objects.
MODULE IV LEARNING
Communication - Communication as action - Formal grammar for a fragment of English Syntactic analysis - Augmented grammars - Semantic interpretation - Ambiguity and
disambiguation - Discourse understanding - Grammar induction - Probabilistic language
processing - Probabilistic language models - Information retrieval - Information
Extraction - Machine translation.
MODULE VI APPLICATIONS - GAMING AI IN THE AND
FIRST CENTURY
TWENTY
7
OUTCOMES:
Students who complete this course will be able to:
Work in teams to propose models for solving real world problems using artificial
intelligence
GE B3201
PC
0
OBJECTIVE:
Earth's surface - the Interior of Earth - Plate Tectonics - Composition of the Crust: Rocks
- formation & types, Soils - formation & components - Soil profile.
Atmosphere - Structure & composition - Weather & climate - Tropospheric airflow.
Hydrosphere - Water budget - Hydrological cycle - Rainwater & precipitation, River
Water & solids, Lake Water & stratification, Seawater & solids, soil moisture &
groundwater.
Bioelement cycling - The Oxygen cycles - The carbon cycle - The nitrogen cycle - The
phosphorous cycle - The sulfur cycle sodium, potassium & magnesium cycles.
MODULE II BIOLOGICAL ENVIRONMENT
Cellular basis of life - Prokaryotes & eukaryotes - Cell respiration - Photosynthesis - DNA
& RNA - Genetically modified life.
Population dynamics - Population - Population growth - Survival & growth curves Population regulation - Future of human population.
Biological communities - Five major interactions: competition, predation, parasitism,
mutualism and commensalism - Concepts of habitat & niche - Natural selection - Species
richness & species diversity - Ecological succession & climax.
Ecosystem & Biomes - Food Chains & food webs - Biomagnifications - Ecological
pyramids - Trophic levels - Energy flow in ecosystem - Ecosystem stability - Terrestrial &
aquatic biomes.
MODULE III IMPACTS ON NATURAL RESOURCES & CONSERVATION 9
Biological resources - Nature & importance - Direct damage - Introduced
Energy - Renewable and non renewable energy resources -Thermal power plants Nuclear fuels, fossil fuels, solar energy, wind energy, wave energy, tidal energy, ocean
thermal energy, hydropower, geothermal energy, biomass energy.
Environment crisis - State of environment in developed and developing countriesManaging environmental challenges for future - Disaster management, floods,
earthquake, cyclone and landslides.
MODULE VI ENVIRONMENTAL IMPACT ASSESSMENT AND
SUSTAINABILITY
Environmental Impact Assessment - Impacts: magnitude & significance - Steps in EIA methods - Precautionary principle & polluter pays principle - Role of NGOs & Public -
Value education -Environment protection act (air, water, wild life) and forest
Conservation act.
Concept of Sustainability - Sustainable Development - Gaia Hypothesis - Traditional
Knowledge for sustainability.
Total Hours: 45
TEXT BOOKS:
1. Andrew R. W. Jackson and Julie M. Jackson ,"Environmental Science (The
Natural Environment and Human Impact)", Pearson Education Limited,
Harlow, Essex, England, 2000.
2. G Tyler Miller, Jr., Thomson Brooks/Cole, "Environmental Science (Working
with the Earth)", 2006.
REFERENCES:
1. David McGeary & Charles C Plummer, "Physical Geology, Earth Revealed",
WCB McGraw Hill, 1998.
2. Bryan G. Norton,"Sustainability: A Philosophy of Adaptive Ecosystem
Management", 2005.
3. Larry W. Canter,"Environmental Impact Assessment", McGraw-Hill, 1996.
4. Lovelock, "The Revenge of Gaia: Why the Earth is Fighting Back and How We
Can Still Save Humanity", Penguin UK, 2007.
OUTCOMES:
Students who complete this course will be able to:
CSB3214
L T
C
1
OBJECTIVE
To
implement
pervasive
computing
constructs
from
data
management
perspective.
Lab Activities:
Implementing the wireless adhoc and sensor network protocol for pervasive
computing
AODV
DSR
DSDV
LEACH
TCP
UDP
RTP
RTCP
Application development
Sensor network
Context awareness
Privacy
Security
Total Hours: 45
OUTCOMES:
Students who complete this course will be able to:
CSB3215
OBJECTIVES:
To illustrate tools like LEX /FLEX and YACC/Bison to design lexical analyzer
and produce a parser for a given grammar.
To show various methods for converting three address code to assembly level
program.
.LIST OF EXPERIMENTS:
1. Implement a lexical analyzer in "C".
2. Use LEX tool to implement a lexical analyzer.
3. Implement a recursive descent parser for an expression grammar that
generates arithmetic expressions with digits, + and *.
4. Use YACC and LEX to implement a parser for the same grammar as given in
problem.
5. Write semantic rules to the YACC program in problem 5 and implement a
calculator that takes an expression with digits, + and * and computes and
prints its value.
6. Implement the front end of a compiler that generates the three address code
for a simple language with: one data type integer, arithmetic operators,
relational operators, variable declaration statement, one conditional construct,
one iterative construct and assignment statement.
7. Implement the back end of the compiler which takes the three address code
generated.
Total Hours: 45
OUTCOMES:
Students who complete this course will be able to:
CSB3216
FOSS LAB
L T
OBJECTIVES:
Version Control System setup and usage using RCS, CVS, SVN
Set up the complete network interface usinf ifconfig command liek setting
gateway, DNS, IP tables, etc
To develop GUI processing using Python.
Lab Activities:
Create a simple application for text processing regular expression using Java
o in Linux
Compare the impact of using the proprietary tools and specialized open source
component
Apache server
MySQL database
PHP script must be used to create a simple application and this must be
Take any one application domain like Data mining, Network security
Deploy it
Social Computing
OUTCOMES:
Students who complete this course will be able to:
Analyze the differences between the open source model and the
commercial proprietary model.
Expertise on using a variety of open source software.
Develop and deploy a project based purely on open source tools.
SEMESTER VII
CSB4101
INFORMATION SECURITY
OBJECTIVES:
MODULE I INTRODUCTION
Application Security: Vulnerabilities common to the software development processDatabase Security - Web Security.
Legal and Ethical Aspects: Protecting Programs and Data - Information and the Law Software Failures - Computer Crime - Privacy - Ethical Issues.
Total Hours:45
TEXTBOOKS:
1. Jason Andress,"The Basics of Information Security: Understanding the
Fundamentals of InfoSec in Theory and Practice", 1st Edition, Syngress Press,
2011.
2. Charles B. Pfleeger, and Shari Lawrence Pfleeger, "Security in Computing", 4 th
Edition, Prentice Hall, 2006.
REFERENCE:
1. Mark Stamp, "Information Security: Principles and Practices", 2 nd Edition,
Wiley Publications, 2011.
OUTCOMES:
On successful completion of this course, the students will be able to
Assess the different information security threats and take necessary action
using tools.
Recognize the legal and ethical aspects when taking decisions pertaining to
information handling.
CSB4102
T P
C
0
OBJECTIVES:
To illustrate the basic concepts and techniques of Data Mining.
Interpret the contribution of data warehousing and data mining to the decision
support level of organization
MODULE I INTRODUCTION
Introduction - Data warehouse delivery method - System process - typical process flow
within a Data warehouse - Data warehousing Components - Building a Data warehouse Mapping the Data Warehouse to a Multiprocessor Architecture - DBMS Schemas for
Decision Support - Data Extraction, Cleanup, and Transformation Tools - Metadata reporting - Query tools and Applications - Online Analytical Processing (OLAP) - OLAP
and Multidimensional Data Analysis.
MODULE II DATA MINING AND ASSOCIATION RULE
Classification and Prediction: - Issues Regarding Classification and Prediction Classification by Decision Tree Introduction - Bayesian Classification - Rule Based
Classification - Classification by Back propagation - Support Vector Machines Associative Classification - Lazy Learners - Other Classification Methods - Prediction Accuracy and Error Measures - Evaluating the Accuracy of a Classifier or Predictor Ensemble Methods - Model Section.
Mining Object, Spatial, Multimedia, Text and Web Data: Multidimensional Analysis and
Descriptive Mining of Complex Data Objects - Spatial Data Mining - Multimedia Data
Mining - Text Mining - Mining the World Wide Web.
MODULE VI MINING ENVIRONMENT - CASE STUDY
OUTCOMES:
Students who complete this course will be able to:
Evaluate emerging standards for data mining and apply them to practical
scenarios.
Illustrate the issues and challenges in data cleaning and processing with simple
examples
Perform basic data mining operations and apply standard data mining algorithms
for association rule mining, clustering and classification and solve real time
problems.
Show with examples how data mining and warehousing techniques can impact
the organizations.
Review the various latest research activities going on in the field of Data Mining.
CSB4103
DISTRIBUTED COMPUTING
L
3
T
0
OBJECTIVES:
To recognize and analyze the failure detection algorithms for fault tolerance
and how recovery from failure can be carried out.
Interprocess Communication Case Study - Distributed Objects and Remote Invocation Communication Between Distributed Objects - Remote Procedure Call - Events and
Notifications - Java RMI - Case Study - Message Passing: Fundamental Concept Features - Issues - Synchronization - Buffering - Message Encoding and Decoding Process addressing - Failure Handling - Remote Procedure Calls: RPC Model -
Transparency - Implementation - Stub Generation - RPC Messages - Marshaling Communication Protocols - Client-Server Binding - Lightweight RPC.
MODULE III MEMORY
Distributed shared Memory - Basic Concept - General Architecture - Advantages Design Issues - Structuring Approaches - Consistency Models - Replacement Strategy Thrashing - Synchronization Mechanisms: Clock Synchronization - Event ordering Mutual Exclusion - Deadlock - Election Algorithms.
MODULE IV RESOURCE MANAGEMENT
Naming Systems: Features - Fundamental Terminologies and Concepts System Oriented Names - Object Locating Mechanisms - Human Oriented
Names - Name Caches - Naming and Security - Case Studies: V-System Mach.
Total Hours: 45
TEXT BOOKS:
1. A.D. Kshemkalyani, M. Singhal, "Distributed Computing: Principles,
Algorithms and Systems", Paperback Edition, Cambridge University Press,
2011.
2. Pradeep K. Sinha, "Distributed Operating Systems - Concepts, Systems and
Applications", 3rd Edition, Prentice Hall India, New Delhi, 2008.
REFERENCES:
1. George Coulouris, Jean Dollimore and Tim Kindberg, "Distributed Systems
Concepts and Design", 3rd Edition ,Pearson Education , 2002.
2. Andrew S Tanenbaum , Maartenvan Steen, "Distributed Systems - Principles
and Pardigms",2nd Edition, Pearson Education, 2007.
OUTCOMES:
CSB4105
L T P C
0 0 3
OBJECTIVES:
LIST OF EXPERIMENTS:
1. Using Sniffers for monitoring network communication (Ethereal)
2. Understanding of cryptographic algorithms and implementation of the same
in C or C++
3. Using open SSI for web server - browser communication
4. Using GNU PGP
5. Performance evaluation of various cryptographic algorithms
6. Using IPTABLES on Linux and setting the filtering rules
7. Configuring S/MIME for e-mail communication
8. Understanding the buffer overflow and format string attacks
9. Using NMAP for ports monitoring
Total Hours: 45
OUTCOMES:
Students who complete this course will be able to:
CSB4106
OBJECTIVES:
To demonstrate the need for Data Mining and advantages to the business and
scientific world.
To implement Data Mining techniques various scenarios and the scope of their
applicability.
LIST OF EXPERIMENTS:
(Can be implemented in any one open source Data mining Tool)
1. To perform various commands given in PL/SQL in Oracle 8.0(For brushing up.)
2. To perform the correlation analysis between for the given data set.
3. To perform the attribute relevance analysis on the given data.
4. To perform the information gain for a particular attribute in the given data.
5. To perform the experiment to predict the class using the Bayesian classification.
6. To perform various data mining algorithms like
clustering,
Association rule mining
classification
Using the dataset from the UCI repository
Total Hours: 45
OUTCOMES:
Students who complete this course will be able to:
Solve real time problems based on data mining concepts using data mining tools.
CSB4107
LT P C
0 0
OBJECTIVES:
LIST OF EXPERIMENTS
1. To develop basic input/ output design
2. To develop Forms in the mobile devices
3. Connect applications to Databases in the device
4. Develop simple multimedia mobile applications
5. Develop Messaging systems
6. Use the Web access for developing applications
7. Establish Client server communication
8. An Application development - Mini project
Total Hours: 45
OUTCOMES:
Students who complete this course will be able to:
Design, develop, test and demonstrate a working application for a mobile device.
NETWORK MANAGEMENT
L TP C
30 0
OBJECTIVES:
To introduce the importance and meaning of Network Management.
network
management
Instigate the concepts and terminology associated with SNMP and TMN
PREQUISITES:
COMPUTER NETWORKS.
OPERATING SYSTEM.
MODULE I INTRODUCTION
System Utilities for management- Network Statistics- MIB Engineering- NMS design
Network Management system-TMN and Application Management.
MODULE V NETWORK MANAGEMENT APPLICATION
Configuration Management- Fault Management- Performance Management Security Management- Accounting Management- Report Management
MODULE VI BROADBAND NETWORK MANAGEMENT
Acquire the knowledge about network management standards (OSI and TCP/IP)
Acquire the knowledge about various network management tools and the skill to
use them in monitoring a network
Analyze and interpret the data provided by an NMS and take suitable actions.
CSBX02
OBJECTIVES:
To introduce the state-of-the-art in network protocols, architectures and
applications.
To analyze existing network protocols and networks.
To develop new protocols in networking.
To expose how networking research is done.
To investigate novel ideas in the area of Networking via term-long research
projects.
PREQUISITES:
COMPUTER NETWORKS
MODULE I ISDN AND FRAME RELAY
Asynchronous transfer mode - ATM Protocol Architecture, ATM logical Connection, ATM
Cell - ATM Service Categories - AAL - Traffic and Congestion control in ATM Requirements - Attributes - Traffic Management Frame work, Traffic Control - ABR traffic
Management - ABR rate control, RM cell formats, ABR Capacity allocations - GFR traffic
management.
MODULE III CONGESTION CONTROL AND QOS IN IP
NETWORKS
Networks: - The Need for Flow and Error Control - Link Control Mechanisms - ARQ
Performance - TCP Flow Control - TCP Congestion Control - Performance of TCP Over
ATM - Integrated Services Architecture - Queuing Discipline - Random Early Detection Differentiated Services - Resource Reservation : RSVP - Multi protocol Label Switching Real Time Transport Protocol.
MODULE IV WDM OPTICAL NETWORKS
Fast Ethernet - Switched fast Ethernet - Gigabit Ethernet - FDDI: Network configuration Physical Interface - Frame transmission and reception.
MODULE VI SONET
Evaluate various technologies and identify the most suitable one to meet the
given set of requirements for a hypothetical corporate network.
.
CSBX03
GRAPH THEORY
OBJECTIVES:
PREQUISITES:
BASIC MATHEMATICAL KNOWLEDGE OG GRAPH
MODULE I INTRODUCTION
Graph - Finite and Infinite graphs - Incidence and Degree - Isolated vertex, pendant
vertex and Null graphs. Paths and Circuits: Isomorphism - sub-graphs
- walks, paths and circuits - Connected and disconnected graphs- Euler Graphs.
Operations on Graphs - More on Euler Graphs - Hamiltonian Paths and circuits
- Relation of graphs and theoretical computing.
MODULE II TREES AND FUNDAMENTAL CIRCUITS
Trees - Some Properties of Trees - Pendant vertices in a Tree - Distance and centers in
a Tree. Spanning Trees - Fundamental circuits - Spanning trees in a weighted graph Application in terms of data structures
MODULE III CUT SETS AND CUT VERTICES
Cut sets - Properties of a cut set - all cut sets in a graph. Fundamental circuits and cut
sets - Connectivity and Separability - Relevance of cut sets to computing.
MODULE IV PLANAR GRAPHS
Incidence Matrix - Circuit matrix - Fundamental circuit matrix and Rank of circuit matrix Cut set matrix - Relationship among Af, Bf and Cf - Path matrix - Computational
implication of graph representations.
MODULE VI ALGORITHMS
CSBX04
OBJECTIVES:
PREQUISITE:
COMPUTER NETWORKS
MODULE I INTRODUCTION
Introduction - Issues in designing a routing protocol for Ad hoc wireless networks Classifications of routing protocols - Table-Driven routing protocols - Destination
Sequenced Distance Vector (DSDV) - Source-Initiated On-Demand approaches - Ad hoc
On-Demand Distance Vector Routing (AODV) - Dynamic Source Routing (DSR) Temporally Ordered Routing Algorithm (TORA)-Zone Routing Protocol (ZRP) .
MODULE III MULTICASTING PROTOCOLS
Introduction - Issues in designing a transport layer protocol for Ad hoc wireless networks
- Design goals of a transport layer protocol for Ad hoc wireless networks -Classification
of transport layer solutions - TCP over Ad hoc wireless networks.
MODULE V ENERGY MANAGEMENT
10
Introduction - Issues and challenges in providing QoS in Ad hoc wireless networks Classifications of QoS solutions - MAC layer solutions - Network layer solutions - QoS
frameworks for Ad hoc wireless networks energy management in Ad hoc wireless
networks - Security in Ad hoc wireless networks - Network security requirements - Issues
and challenges in security provisioning - Network security attacks - Key management Secure routing in Ad hoc wireless networks.
Total Hours: 45
TEXT BOOKS:
1. C.Siva Ram Murthy and B.S.Manoj, "Ad hoc Wireless Networks Architectures
and protocols", 2nd Edition, Pearson Education, 2007.
2. Charles E. Perkins," Ad hoc Networking", 1st Edition, Addison Wesley, 2000.
REFERENCES:
1. C.K. Toh, "Ad Hoc Mobile Wireless Networks: Protocols and Systems", 1 st
Edition, Prentice-Hall of India, 2001.
2. Stefano Basagni, Marco Conti, Silvia Giordano and Ivan stojmenovic, "Mobile
Ad Hoc Networking", Wiley-IEEE press, 2004.
3. Mohammad Ilyas, "The Handbook of Adhoc Wireless Networks", CRC press,
2002.
OUTCOMES:
Students who complete this course will be able to:
Describe the platform architectures that are suitable for mobile adhoc networks.
CSBX05
OBJECTIVES:
To know the need for localization algorithms for finding the location.
PREQUISITES:
COMPUTER NETWORKS
MODULE I
INTRODUCTION
PHYSICAL LAYER
12
Contention free, contention based medium access - Wireless MAC protocol : Carrier
Sense Multiple Access (CSMA), IEEE 802.11, IEEE 802.15.14 and Zigbee Characteristics of MAC protocols - Contention Free MAC protocol : Low Energy Adaptive
Clustering Hierarchy (LEACH) , Traffic Adaptive Medium Access(TAMA), Light weight
Medium Access Control(LMAC) - Contention Based MAC Protocol : SMAC, TMAC,
PMAC, WiseMAC.
MODULE IV NETWORK LAYER
10
Data Centric routing: Directed Diffusion , Rumor routing - Proactive Routing : DSDV Reactive Routing : Adhoc On Demand Distance Vector, Dynamic Source Routing Location Based Routing.
MODULE
V LOCALIZATION
VI APPLICATIONS
REFERENCES
1. Waltenegus Dargie and Christian Poellabauer, "Fundamentals of Wireless
Sensor Networks: Theory and Practice (Wireless Communications and Mobile
Computing)", 1st Edition, Wiley publications, 2010.
2. Holger Kerl, Andreas Willig, "Protocols and Architectures for Wireless Sensor
Network", John Wiley and Sons, 2011.
3. Kazem, Sohraby, Daniel Minoli, Taieb Zanti, "Wireless Sensor Network:
Technology, Protocols and Application", 1st Edition, John Wiley and Sons,
2007.
4. 4.N. P. Mahalik, "Sensor Networks and Configuration: Fundamentals,
Standards, Platforms and Applications", Springer, 2007.
5. B. Krishnamachari, "Networking Wireless Sensors", Cambridge University
Press, 2006.
OUTCOMES:
Students who complete this course will be able to:
Find the application where MAC layer routing protocol and network layer routing
protocol being used.
Decide which localization algorithm could be used for finding the location of a
target.
know how wireless sensor network could be used in remote area applications.
Find the suitable operating system and simulator for implementing the wireless
sensor net work.
CSBX07
ROUTING PROTOCOLS
OBJECTIVES:
To learn network routing basics and foundations.
To demonstrate routing in IP networks and router architectures.
To illustrate the steps involved in various routing algorithms.
To study the difference between distance vector routing and link state routing.
To gain knowledge on various issues in routing algorithms.
To introduce into next generation routing protocol.
PREQUISITES:
COMPUTER NETWORKS
MODULE I INTRODUCTION TO NETWORKING AND NETWORK
ROUTING
Bellman-Ford Algorithm and the Distance Vector Approach- Dijkstra's AlgorithmComparison of the Bellman-Ford Algorithm and Dijkstra's Algorithm-Shortest Path
Computation with Candidate Path Caching- Widest Path Computation with Candidate
Path Caching- Widest Path Algorithm- K- Shortest Paths Algorithm.
MODULE III ROUTING PROTOCOLS: FRAMEWORK AND PRINCIPLES
BGP: A Brief Overview- Basic Terminology- BGP Operations: Message Operations- BGP
Timers- BGP Configuration Initialization- Two Faces of BGP: External BGP and Internal
BGP- Path Attributes- BGP Decision Process-Internal BGP Scalability- Significance of
Route Flap Dampening- BGP Additional Features- Finite State Machine of a BGP
Connection.
Total Hours: 45
REFERENCES:
1. 1.Deepankar Medhi, Kartikeyan Ramasam , "Network Routing - Algorithms,
Protocols, Architecture", Morgan Kauffman Series Publication,2007.
2. Subir Kumar Sarkar, T G Basavaraju and C Puttamadappa, "Ad Hoc Mobile
Wireless Networks - Principles, Protocols and Applications", 2nd Edition,
Auerbach publications, 2008.
3. 3.Dharma Prakash Agrawal and Carlos De Morais Cordeiro, "Adhoc and
Sensor Networks - Theory and Applications", 2nd Edition, World Scientific
publication, 2011.
OUTCOMES:
Students who complete this course will be able to:
Recall the fundamentals and requirements for packet routing in computer
communication networks.
CSBX08
CLOUD COMPUTING
OBJECTIVES:
Illustrate the fundamental concepts of cloud storage and demonstrate their use in
storage systems such as Amazon.
PREREQUISITE:
COMPUTER NETWORKS
MODULE I VIRTUALIZATION
Cloud Scenarios - Benefits: Scalability , simplicity , vendors ,security - limitations application development - security concerns - privacy concern with a third party - security
level of third party - security benefits - Regularity issues: Government policies - Cloud
deployment model : Public clouds - Private clouds - Community clouds - Hybrid clouds Advantages of Cloud computing.
Cloud architecture: Cloud delivery model - Software as a Service (SaaS): SaaS service
providers - Google App Engine, Salesforce.com and google platfrom - Benefits Operational benefits - Economic benefits - Evaluating
SaaS - Platform as a Service ( PaaS ): PaaS service providers - Right Scale Salesforce.com - Rackspace - Force.com - Services and Benefits - Infrastructure as a
Service ( IaaS): IaaS service providers - Amazon EC2 , GoGrid - Microsoft soft
implementation and support - Amazon EC service level agreement - Recent
developments - Benefits.
MODULE V CLOUD COLLABORATION
Collaborating via Web-Based Communication Tools - Evaluating Web Mail Services Evaluating Web Conference Tools - Collaborating via Social Networks and Groupware Collaborating via Blogs and Wikis.
Total Hours: 45
TEXT BOOKS:
1. Anthony T.Velte, Toby J. Velte Robert Elsenpeter, "Cloud Computing a Practical
Approach", 1st Edition, TATA McGraw- Hill, 2010.
2. Michael Miller Que, "Cloud Computing: Web-Based Applications That Change the
Way You Work and Collaborate Online", 1st Edition, Que Publishing, 2008.
REFERENCE:
1. Haley Beard ,"Cloud Computing Best Practices for Managing and Measuring
Processes for On-demand Computing, Applications and Data Centers in the
Cloud With SLAs", Emereo Publishing Limited, 2008.
OUTCOMES:
Work with online cloud services and collaborate with online documents and web
based applications.
CSBX09
TCP/IP
P
0
C
3
OBJECTIVES:
PREQUISITE:
COMPUTER NETWORKS
MODULE I INTRODUCTION
IPv4 Addressing Concepts and Issues - IP Classful Addressing - IP Subnet Addressing Subnetting Concepts- IP Subnetting Practical Subnet Design and Address Determination
Example- IP Classless Addressing: Classless Inter-Domain Routing -Supernetting.
Internet Protocol Datagram Encapsulation and Formatting-IP
Fragmentation and Reassembly - IP Routing and Multicasting.
MODULE III INTERNET PROTOCOL - IPV6 AND SUPPORT
Datagram
Size,
TCP Persist Timer - Silly Window Syndrome - Keep alive Timer - Window Scale Option Analyzing TCP/IP traffic - Packet Analysis - TCP/IP Diagnostic Tools and Utilities.
Total Hours: 45
TEXT BOOKS:
1. Kevin R.Fall, W.Richard Stevens, "TCP/IP Illustrated, Volume 1: The
Protocols, 2nd Edition, Pearson Education, 2011.
2. Charles M. Kozierok "The TCP/IP Guide -A Comprehensive, Illustrated
Internet Protocols Reference", 2005.
REFERENCES:
1. Douglas E. Comer, "Internetworking with TCP/IP Principles, Protocols, and
Architecture", 5th edition, Volume-1, Prentice Hall, 2006.
2. Adrian Farrel, "The Internet and its Protocols- A Comparative Approach", 1st
Edition, Morgan Kaufmann, 2004.
3. W.Richard Stevens "TCP/IP Illustrated, The Protocols", Volume I, 2 nd Edition,
Pearson Education, 2012.
4. Behrouz A.Forouzan, "TCP/IP Protocol Suite", 3rd Edition, Tata McGraw Hill2006.
5. Pete Loshin "IPv6 Theory, Protocol and Practice, 2nd Edition, Morgon
Kaufmann, December, 2003.
OUTCOMES:
Students who complete this course will be able to:
Analyze the major networking protocols and select protocols based on the
application.
CSBX10
EMBEDDED SYSTEMS
OBJECTIVES:
PREQUISITE:
Tasks and Task States - Tasks and Data - Semaphores and Shared Data - Message
Queues - Mailboxes and Pipes - Timer Functions - Events - Memory Management Interrupt Routines in an RTOS Environment.
MODULE VI BASIC DESIGN USING A REAL-TIME OPERATING SYSTEM 8
Principles, Semaphores and Queues - Hard Real- Time Scheduling
Considerations - Saving Memory and Power- An example RTOS like uC-OS (Open
Source) - Embedded Software Development Tools: Host and Target machines Linker/Locators for Embedded Software -Getting Embedded Software into the Target
System - Debugging Techniques: Testing on Host Machine- Using Laboratory Tools- An
Example System.
Total Hours: 45
TEXT BOOKS:
1. Phillip A. Laplante, Seppo J. Ovaska, "Real-Time Systems Design and
Analysis: Tools for the Practitioner", 4th Edition, Wiley-IEEE Press, 2011.
2. Raj Kamal, "Embedded Systems: Architecture, Programming and Design", 2 nd
Edition, McGraw-Hill Education (India), 2009.
3. Kai Qian, David Den Haring, Li Cao, "Embedded Software Development with
C", Springer, 2009.
REFERENCES:
1. Tero Karvinen, Kimmo Karvinen, "Make: Arduino Bots and Gadgets: Six
Embedded Projects with Open Source Hardware and Software", 1 st Edition,
Maker Media Inc, 2011.
2. James W. Grenning, Test Driven Development for Embedded C", 1 st Edition,
Pragmatic Bookshelf, 2011.
3. Arnold S. Berger, "Embedded Systems Design: An Introduction to Processes,
Tools and Techniques", CMP Books, 2002.
4. Wayne Wolf, "Computers as Components, Principles of Embedded Computing
System Design", 2nd Edition, Elsevier, 2005.
OUTCOMES:
Students who complete this course will be able to:
Analyze a real time scenario, design an embedded system and analyze its
performance.
CSBX11
HACKING TECHNIQUES
L T
OBJECTIVES:
To discuss about security tools and testing applications for vulnerability and
authentication flaws.
PREQUISITE:
COMPUTER NETWORKS
MODULE I INTRODUCTION TO HACKING
Mapping the application - Bypassing client side control -- Attacking authentication Attacking session management -- Attacking access control - Attacking path traversal Attacking application logic - Attacking other users - XSS - Redirection attacks - HTTP
header injection - Frame injection- Request forgery- JSON hijacking - Session fixation Local privacy attacks -Advanced exploiting techniques -Its prevention.
MODULE IV VULNERABILITIES
Burp proxy - Automating bespoke attacks - Uses for bespoke automation - Enumerating
valid identifier - Fuzzing common vulnerabilities, Its prevention-Exploiting information
disclosure - Exploiting error message, Its prevention - Attacking compiled application Buffered overflow attacks - Integer and format string vulnerabilities, Its prevention Architectural attacks - Tiered architecture - Shared hosting and Application service
providers, Its prevention - Server attack - Vulnerable application configuration and
Software - Source code vulnerabilities - Different languages, Its prevention.
Hacker's toolkit - Web browsers - Integrated testing suites - Vulnerability scanners Nikto-hydra-custom Scripts - Hacker's methodology - Mapping application content Analyzing application-testing - Client side controls - Authentication mechanism - Session
management mechanism - Access controls - Input based vulnerabilities- Logic flawsSharing hosting vulnerabilities- Web server vulnerabilities- Miscellaneous checks.
MODULE VI CASE STUDY
System hacking- Case study: DNS High Jinx- Pwning the internet-Hacking windowsHacking unix-Infrastructure hacking- Case study: Read It and WEP-Wireless hackingApplication and data hacking-Case study: Session Riding.
Total Hours: 45
TEXTBOOKS:
1. Dafydd Stuttard, Marcus Pinto,"The Web Application Hacker's Handbook:
Finding and Exploiting Security Flaws", 2nd Edition, 2011.
2. Stuart McClure, Joel Scambray, George Kurtz,"Hacking Exposed 6 -Network
Security Secrets and Solutions", 6th Edition, Tata McGraw-hill edition, 2009.
3. Kenneth C.Brancik, "Insider Computer Fraud", 1st Edition, Auerbach
Publications Taylor & Francis Group,2008.
OUTCOMES:
Express detailed insight into various hacking techniques through case studies.
CSBX12
L T
OBJECTIVES:
To analyze how complex and functional high-level phenomena can emerge from
low-level interactions.
To illustrate natural models of the computational processes.
To derive the computational processes by applying genetic algorithm.
To discuss natural computational systems that solves some of the real time
problems.
PREQUISITE:
LINEAR PROGRAMMING
MATHEMATICAL FOUNDATION
MODULE I LIFE AND INFORMATION
What is Life - The Logical Mechanisms of Life - What is so cool about computation Universal Computation and Computability - Simulations and Realizations-Imitation of Life
- Computational Beauty of Nature (fractals, L-systems, chaos) Bio-inspired computing Natural computing-Biology through the lens of computer science.
MODULE II COMPLEX SYSTEMS AND ARTIFICIAL LIFE
Evolution and Adaptation - Von Neumann and Natural Selection -Systems and
Biocomplexity - Self-Similarity and L-Systems- Modeling Evolution:
Evolutionary Computation.
MODULE IV COLLECTIVE BEHAVIOR AND SWARM INTELLIGENCE 7
Social Insects, Stigmergy and Swarm Intelligence - Competition and Cooperation Communication and Multi-Agent simulation - Turing's Tape, Self-Reproduction Collective
Intelligence.
MODULE V IMMUNOCOMPUTING
Describe how complex and functional high-level phenomena can emerge from low-level
interactions.
CSBX13
CYBER FORENSICS
L T
OBJECTIVES:
PREQUISUTE:
COMPUTER NETWORKS
MODULE I INTRODUCTION
Main frame systems, Desktop systems - Multiprocessor systems - Distributed systems Clustered systems - Real time systems - Hand held Systems. Important Technical
Terminologies-Weapons of cyber crime -Types of cyber crime -Credit card and cyber
crime-Web hacking.
MODULE II COMPUTER AND DIGITAL FORENSICS
Computer Forensics and Digital Detective Work-Cell Phone Forensics - Email and
Webmail Forensics-Legal Ethical and Testimony Topics-Ethical and Professional
Responsibility in Testimony-Computer Forensics and Digital Detective Work.
MODULE III EVIDENCE
Preparing for evidence collection and preservation- Tools, Environments, Equipment and
Certifications, Policies and Procedures-Data, PDA and cell phone forensics.
MODULE IV FORENSICS EXAMINATION AND HACKING TECHNIQUES
Detecting Intrusions Malware and Fraud-Tracking down those Who Intend to do harmFraud and Forensics Accounting Investigation-Legal Ethical and Testimony TopicsEthical and Professional Responsibility in Testimony.
MODULE VI
Cryptography -Futuristic crime- Cyber laws of different countries- Social Networking site
bane or boon- Search and seizure.
Total Hours: 45
TEXT BOOKS:
1. Sujit Mukharjee,Sitanchu Mohan Ray,Bivas,Chittarjee, "Your Ultimate Cyber
Crime Protection Guide", Power Publishers, 2012.
2. Reynaldo
Anzaldua,Linda
Volonino,Jana
Godwin,"Computer
Forensics:
CSBX14
OBJECTIVES:
To develop skills of finding solutions and building software for mobile computing
applications
PREQUISITE:
COMPUTER NETWORKS
MODULE I MOBILE COMMUNICATIONS
Introduction to Mobile Communications and Computing: Mobile Computing (MC) Introduction to MC- Novel applications- Limitations and architecture. GSM: Mobile
services- System architecture- Radio interface- Protocols-Localization and callingHandover- security and new data services.
MODULE II MEDIUM ACCESS CONTROL
Motivation for a specialized MAC (Hidden and exposed terminals, near and far
terminals)- SDMA- FDMA- TDMA- CDMA.
MODULE III MOBILE NETWORK LAYER
Traditional TCP- Indirect TCP- Snooping TCP- Mobile TCP- Fast retransmit/ fast
recovery- Transmission /time-out freezing- Selective retransmission-Transaction oriented
TCP.
Compare and contrast the architecture and protocol of various wireless devices.
Implement the concepts of mobile computing and compare its performance with
conventional wired network applications.
CSBX15
Internet of Things
L T P C
3 0 0 3
OBJECTIVES:
Attain exposure to varied software and hardware platforms for realization of IoT
PREQUISITE:
COMPUTER NETWORKS.
MODULE I
Definitions Technological Aspects - Design Principles of Connected Devices Fundamentals of IPv6 Addressing and Protocols relevant to IoT - Smart Cities and
Environments Smart Metering Applications in Security Healthcare Retail
Industrial Control Smart Farming and Agriculture.
MODULE II IoT Prototyping Concepts
TEXT BOOKS:
1. 1. Adrian McEwen and Hakim Cassimally , Designing the Internet of Things,
Wiley, 2013.
2. Cuno Pfister, "Getting Started with the Internet of Things,1st Edition, Shroff,
2011.
REFERENCE:
1. Donlad Norris, The Internet of Things: Do-It-Yourself at Home Projects for
Arduino, Raspberry Pi and BeagleBone Black, Tab Electronics, 2015
OUTCOMES:
Students who complete this course will be able to
Compare and choose appropriate software and hardware platform for realization
of IoT devices
CSBX16
COMPLEX NETWORKS
L T
OBJECTIVES:
PREQUISITE:
Computer Networks
Graph theory
MODULE I INTRODUCTION
Fragments in complex networks - Accounting for all parts of sub graphs Communicability functions in networks - Centrality measures - Global network invariants.
MODULE IV NETWORK CLASSES
Expansion and network classes - Community structure of networks - Network bipartivity Random models of networks.
MODULE V OPTIMIZATION
Genetic networks - Protein residue networks - Protein - Protein interaction networks Structure of reaction networks.
Total Hours: 45
REFERENCES:
1. Reuven Cohen ,Shlomo Havlin, "Complex Networks: Structure, Robustness
and Function", Cambridge University Press, 2010.
2. Ernesto Estrada ,"The Structure of Complex Networks: Theory and
Applications", 1st Edition, Oxford University Press, 2011.
3. Maarten van Steen , "Graph Theory and Complex Networks: An Introduction",
Maarten Van Steen Publishers, 2010.
OUTCOMES:
Students who complete this course will be able to:
CSBX17
MOBILE COMMERCE
L T
OBJECTIVES:
Put forth the emerging issues in mobile commerce and management of services.
PREQUISITE:
COMPUTER NETWORKS
MODULE I M-COMMERCE
Introduction to m-commerce: Emerging applications - Different players in m-commerce M-commerce life cycle Mobile financial services - Mobile entertainment services and
proactive service management.
MODULE II MANAGEMENT OF MOBILE COMMERCE SERVICES
The role of emerging wireless LANs and 3G/4G wireless networks - Personalized
content management - Implementation challenges in m-commerce - Futuristic mcommerce services.
MODULE IV KNOWLEDGE MANAGEMENT IN A MOBILE COMPUTING 8
Knowledge Management in a mobile computing context-Query formation and Information
retrievel-Knowledge discovery in mobile business data-Modelling the dynamics of mobile
data services markets.
MODULE V MOBILE MESSAGE AND DATA SERVICES
Modelling the dynamics of mobile data services-Short message service and applicationsMultimedia message peer-Mobile banking-Agent based secured E-Payment system.
8
CSBX18
OBJECTIVES:
PREQUISITE:
DISTRIBUTED COMPUTING
MODULE I INTRODUCTION TO SOA
Introduction - Fundamental SOA - Contemporary SOA -Misperceptions about SOA Benefits of SOA - Pitfalls of SOA - Evolution of SOA - Web Services & Primitive SOA.
MODULE II ACTIVITY MANAGEMENT & COMPOSITION
Service Classification - Business Process Management - SOA & OrganizationMessage Exchange Patterns - Service Life Cycle - Service Activity - Coordination Business Activities - Orchestration - SOA and Performance - Reusability,
Compensability, Modularity.
MODULE III MESSAGING AND SECURITY
SOA and Security - Addressing - Reliable Messaging - Correlation - Policies Metadata Exchange - Security - Notification and Eventing.
MODULE IV PRINCIPLES OF SERVICE ORIENTATION
WS-Addressing Language Basics - WS-Reliable Messaging Language - WSPolicy Language - WS-Metadata Language - WS-Security Language - SOA
Platform - Case Study.
Total Hours : 45
REFERENCES:
1. Thomas Erl, "Service-Oriented Architecture: Concepts, Technology & Design",
Pearson Education, 2008.
2. Nicolai M. Josuttis,"SOA in Practice: The Art of Distributed System Design",
O'Reilly Publications, 2009.
3. Thomas Erl, "SOA Principles of Service Design", Prentice Hall, 2008.
4. Thomas Erl, "SOA Design Patterns", 2nd Edition, Prentice Hall, 2009.
5. Eric Newcomer, Greg Lomow, "Understanding Soa with Web Services", 2nd
Edition, Pearson Education, 2009.
6. Paul. C. Brown, "Implementing SOA Total Architecture in Practice", Pearson
Education, 2009.
7. Shankar Kambhampaty, "Service Oriented Architecture for Enterprise
Applications", 1st Edition, Wiley India Private Limited, 2008.
OUTCOMES:
Students who complete this course will be able to:
Make use of web service principles and techniques, design web services and give
a solution for design issues.
CSBX19
WEB ENGINEERING
OBJECTIVES:
To expose the students with various modeling activities for web apps.
To gain knowledge on the development of web applications tools and its deployment.
To address the testing strategies for web applications and security measures
involved.
PREQUISITE:
OBJECT ORIENTED SOFTWARE ENGINEERNG
MODULE I INTRODUCTION TO WEB ENGINEERING
Development in Web E-Process - Development Principles - Development Concepts Deployment of Web Apps - Design Patterns - Web App Patterns - Pattern Repositories Case Study.
Testing Concepts and Process - Content Testing - UI and Usability Testing Compatibility Testing - Component Level Testing -Navigation Testing -Configuration
Testing - Security and Performance Testing - ChangeManagement.
MODULE VI TECHNOLOGIES AND TOOLS
CSBX20
INTERNET TECHNOLOGIES
OBJECTIVES:
To expose the working of internet technology from the end users and developers
point of view
Highlight the theories and principles underlying effective web page design.
Outline the processes that process the web content from the developers end
Throw light on proprietary and open source frameworks used in the operation of
the web
PREQUISITE:
COMPUTER NETWORKS
MODULE I
INTRODUCTION TO INTERNET
HTML5 Basic - Headings - Linking - Images - Lists - Table - Forms- Meta Elements Semantic tags - Page Structure Elements - CSS3 Rules - Types of Style Sheets Positioning Elements - Box Models - Text Flow.
MODULE III SCRIPTING LANGUAGES
Basics - Dialogs - Memory Concepts - Arithmetic - Control Structures Functions - Arrays - Objects - Simple Web Applications - Event Handling
MODULE IV SERVER SIDE PROGRAMMING
Servlets - Deployment of Simple Servlets - Web Server ( Java Web Server / Tomcat /
WebLogic) - HTTP GET - HTTP POST - Session Tracking - Cookies-JDBC - N-Tier
Applications.
XML Basics - Structuring Data - XML Namespaces - Document Type Definitions (DTDs)
- W3C XML Schema Documents - XML Vocabularies - Extensible Style sheet Language
and XSLT -Document Object Model (DOM).
MODULE VI DEVELOPMENT TOOLS AND TECHNOLOGIES
Ajax - JSON - LAMP - SQL - LINQ - MySQL Basics - Perl Basics Python Basics - PHP
Basics.
Total Hours: 45
TEXT BOOKS:
1. Paul Deitel, Harvey Deitel and Abbey Deite, "Internet & World Wide Web: How to
Program", 5th Edition, Prentice Hal, 2011.
2. Jennifer Niederst Robbins, "Learning Web Design: A Beginner's Guide to HTML,
CSS, JavaScript, and Web Graphics", 4th Edition, O'Reilly Media, 2012.
REFERENCE:
1. Robin Nixon, "Learning PHP, MySQL, JavaScript, and CSS: A Step-by-Step
Guide to Creating Dynamic Websites", 2nd Edition, O'Reilly Media, 2012.
OUTCOMES:
Students who complete this course will be able to:
Trace the key developments in the web from the initial era to the current era
Design web pages according to the end user requirements making use of HTML,
style sheets and scripts and also incorporate multimedia support in it.
Implement a simple web site using the client/server model for various applications
and have the capability to test and document the solutions developed.
Using high-level tools, write a web service client that accesses a commercial web
service
CSBX21
GAME THEORY
OBJECTIVES:
Translate the basic of a game into a wide range of conflicts .
Analyze conflict dynamics from the standpoint of rationality
Evaluate conflict dynamics from the standpoint of the self interests of the
Players
Integrate increasing analytical skills into increasingly complex conflicts
Theorize possible and probable strategies where information is incomplete
Appraise theoretical predictions obtained from Game Theory analyses against
real world conflicts
PREQUISITE:
Theory of Computation
Artificial Intelligence
MODULE I INTRODUCTION TO GAMING
History of Video games - Games and Society - Game Goals - Game Genres - Gaming
Platforms - Time Intervals - Player Modes - Motivations -Rewards - Resolution.
MODULE II GAME DESIGN
Game Design - Game Writing - Narrative Theory - Story and Character Development Game play - Creating the Game World - Level Design - Human-Computer Interface
design.
MODULE III GAME PROGRAMMING :LANGUAGES AND
ARCHITECTURE
Visual Design - 3D Modeling - 3D Environments -2D Textures and Texture Mapping Special Effects -Animation - Lighting - Cinematography- Audio Design and Production Audio Programming.
Game production- Project management -Game industry roles -Economcis - PublisherDeveloper relationship- Marketing - Intellectual Property rights - Content regulation.
Total Hours: 45
TEXT BOOKS:
1. Jeannie Novak, "Game Development Essentials - An Introduction", 3rd Edition,
Delmar Cengage Learning, 2011.
2. Steve Rabin, "Introduction to Game Development", 2 nd Edition, Charles River
Media, 2010.
REFERENCES:
1. Mat Buckland, "Programming Game AI by Example", 1st Edition, Wordware
Publishing, Inc., 2005.
2. Tracy Fullerton, Morgan-Kaufmann, "Game Design Workshop: A Playcentric
Approach to Creating Innovative Games", 2 nd Edition, Elsevier Morgan Kaufmann,
2008.
OUTCOMES:
Students who complete this course will be able to:
Model competitive real world phenomena using concepts from game theory.
Review and critically assess literature which deals with game theory and related
materials.
Elucidate the potential or proven relevance of game theory and its impact in many
fields of human endeavour which involve conflict of interest between two or more
participants.
CSBX22
OBJECTIVES:
To give the basic foundation for Big Data Analytics and introducing the
various terms and terminologies
To drive the basics of analytics and its relationship to real time business
scenarios
PREQUISITE:
DATABASE MANAGEMENT SYSTEM
MODULE I BIG DATA FUNDAMENTALS
Big Data and its Importance - Four V's of Big Data - Drivers for Big Data - Introduction to
Big Data Analytics - Big Data Analytics applications.
MODULE II BIG DATA TECHNOLOGIES
Hadoop's Parallel World - Data Discovery - Open source technology for Big Data
Analytics - Cloud and Big Data - Predictive Analytics - Crowd Sourcing Analytics - Interand Trans-Firewall Analytics.
MODULE III BIG DATA PROCESSING
Data Store Integration - Mapping data to the programming framework - Connecting and
extracting data from storage - Transforming data for processing- Subdividing Data.
MODULE IV MAPREDUCE FUNDAMENTALS
Real-Time Architecture - Orchestration and Synthesis Using Analytics EnginesDiscovery using Data at Rest - Implementation of Big Data Analytics - Big Data
Convergence - Analytics Business Maturity Model.
CSBX23
L T
OBJECTIVES:
PREQUISITE:
Overview of SOAP - HTTP - XML-RPC - SOAP: Protocol - Message StructureIntermediaries - Actors - Design Patterns And Faults - SOAP With Attachments.
MODULE IV UDDI
UDDI at a glance- The UDDI Business registry- UDDI under the covers - Accessing
UDDI- How UDDI is playing out.
9
MODULE V CONVERSATIONS
Conversations: Overview - Web Services - Web services Conversation Language WSCL Interface components - The Bar scenario conversations - Relationship between
WSCL and WSDL.
MODULE VI CURRENT STATE
Current Issues: Semantic Web, Role of Meta Data in web content- Architecture of
Semantic web- Content Management- Workflow-XLANG- BPEL4WS.
Total Hours: 45
TEXT BOOKS:
1. Glenn Hostetler, Sandor Hasznos and Christine Heron, Web Service and SOA
Technologies, Practicing Safe Techs", 1st Edition, 2009.
2. Sandeep Chatterjee, James Webber, "Developing Enterprise Web Services", 1 st
Edition, Pearson Education, 2004.
REFERENCES:
1. Frank. P. Coyle, "XML, Web Services And The Data Revolution", 1 st Edition,
Pearson Education, 2002.
2. Ramesh Nagappan, Robert Skoczylas and Rima Patel Sriganesh, "Developing
Java Web Services", Wiley Publishing Inc., 2004.
OUTCOMES:
Students who complete this course will be able to:
Validate XML documents with the use of Document Type Definitions and
schemas according to industry standards.
CSBX24
INFORMATION RETRIEVAL
L T
OBJECTIVES:
PREQUISITE:
DATA MINING
MODULE I KNOWLEDGE REPRESENTATION
MODULE V CLASSIFICATION
Support vector machines and machine learning on documents-Flat clusteringHierarchical clustering-Case study on cluster analysis.
Total Hours: 45
REFERENCES:
1. Stuart Russell-Peter Norvig, "Artificial Intelligence - A Modern Approach", 3rd
Edition, Pearson Education,2009.
2. Michael C.Daconta,leo J. Obart and Kevin J Smith, "Semantic Web - A Guide to
the Future of XML,Web Services and Knowledge Management", Wiley Publishers
,2003.
3. Elain Rich, Kevin Knight, B. Nair "Artificial Intelligence", 3 rd Edition, Tata McGraw
Hill, 2008.
4. Christopher D. Manning,Prabhakar Raghavan and Hinrich Schutze, "Introduction
to Information Retrieval", Cambridge University press, 2008.
OUTCOMES:
Students who complete this course will be able to:
Apply the basic concepts and techniques of Information Retrieval in various
related fields.
Form the ontology for different domains and generate the equivalent
representations.
SEMESTER (Elective)
CSBX25
OBJECTIVES:
To demonstrate issues and challenges in natural language and the various modules of a
typical natural language processing system.
PREQUISITE:
THEORY OF COMPUTATION
WEB MINING
MODULE I
INTRODUCTION
MODULE II
ANALYSIS
GENERATION
12
EMPRIRICAL APPROACHES
SPEECH RECOGNITION
L 45;
Total Hours : 45
TEXT BOOKS:
1
.
2
Nitin Indurkhya and Fred J. Damerau, "Handbook of Natural Language Processing", 2nd
Edition, Chapman & Hall/CRC Machine Learning & Pattern Recognition, 2010.
Tomek Strzalkowski, "Natural Language Information Retrieval ", Kluwer academic
Publishers, 1999.
Christopher D.Manning and Hinrich Schutze, "Foundations of Statistical Natural
Language Processing ", MIT Press, 1999.
Michael W. Berry, "Survey of Text Mining: Clustering, Classification and Retrieval",
Springer Verlag, 2003.
OUTCOMES :
Students to complete this course will be able to
Tokenize and segment natural language using semantic rules and represent them
Explain how speech recognition works and throw light on the research issues in it
CSBX
26
CLUSTERING TECHNIQUES
OBJECTIVES:
Show how time series data must be handled for effective usage.
MODULE I
INTRODUCTION TO CLUSTERING
CLUSTERING
Probabilistic Models for Clustering- Mixture Models- EM Algorithm and Its VariationsProbabilistic Topic Models- Partitional Clustering Algorithms and Hierarchical Clustering
Algorithms- Density-Based Clustering. Evaluation of Clustering - Case studies
MODULE III
GRID-BASED CLUSTERING
Grid-Based Clustering- The Classical Algorithms- Adaptive Grid-Based Algorithms- AxisShifting Grid Based Algorithms-High Dimensional Algorithms-
Spectral
Clustering-
CLUSTERING ALGORITHMS
Stream Clustering Algorithms- Big Data Clustering- One-Pass Clustering AlgorithmsRandomized Techniques for Clustering Algorithms- Parallel and Distributed Clustering
Algorithms- Similarity Measures for Categorical Data- Descriptions of Algorithms. Case
study
MODULE V
Document Clustering- Modelling a Document- General Purpose Document ClusteringClustering Long Documents- Clustering Short Documents- Clustering Multimedia DataClustering with Image Data- Clustering with Video and Audio Data- Clustering with
Multimodal Data Case study.
MODULE VI
APPLICATIONS
Evaluation methods for clustering - Time Series Data Clustering- Online Correlation
Based Clustering - Similarity and Distance Measures- Shape Based Time Series
Clustering Techniques-Application-Case study.
L 45;
Total Hours : 45
TEXT BOOKS:
1
.
REFERENCES:
1
Mark Nixon, Alberto S Aguado, Feature Extraction and Image Processing, 2nd Edition,
Academic Press,2008.
OUTCOMES :
Students to complete this course will be able to
Define clustering in the context of other similar sub-domains like pattern matching and
classification
Apply statistical and probabilistic methods for clustering data.
Relate the clustering systems with data mining and show how its usage.
List and explain the methods of clustering used in current and emerging fields of
computer science.
Work with audio, video and text data to derive outcomes that point to trends in the
domain.
Apply time series algorithms for clustering in the context of a real life problem.
CSBX27
KNOWLEDGE ENGINEERING
C
3
OBJECTIVES:
PREREQUISITE:
DATA MINING
MODULE I INTRODUCTION
Proportional Case - Handling Variables and Qualifies - Dealing with IntractabilityReasoning with Horn Clauses - Procedural Control of Reasoning-Rules in ProductionDescription Logic - Issues in Engineering -Vivid Knowledge- Beyond Vivid.
MODULE III REPRESENTATION
Fuzzy Logic - Nonmontonic Logic - Theories and World - Semiotics -Auto epistemic
Logic - Vagueness - Uncertainty and Degrees of Belief - Non-categorical Reasoning Objective and Subjective Probability.
MODULE VI ACTIONS AND PLANNING
Brachman,
Hector
Levesque,
"Knowledge
Representation
and
OUTCOMES:
Students who complete this course will be able to:
Identify the various techniques to convert knowledge into formal logic statements.
List the limitations of formal logic and apply fuzzy logic to represent uncertainty.
CSBX28
VISUALIZATION TECHNIQUES
OBJECTIVES:
PREQUISITE:
MULTIMEDIA AND GRAPHICS
MODULE I VISUAL THINKING
Visual thinking - Visual detail - Top down Vs bottom up process - Implications for design
- Steps in visual thinking - Distributed cognition.
MODULE II REPRESENTING KNOWLEDGE
Language and representation of knowledge - Mental models and representations Operations of representation and interpretation - Examples of graphic representations Semantic trees - Concept maps - Semantic networks - ER diagrams - Algorithms Flowcharts - Inference trees - Diagnosing and assessing knowledge - Structuring
information transfer - Knowledge representation and learning.
MODULE III MODELING USING A SEMI FORMAL VISUAL LANGUAGE
Basis of the MOT (Modeling using Object types): Schema representation in MOT,
Objectives of the representation, Construction Principles - Basic Knowledge Types and
Relations - Syntax Rules of the MOT Language: The MOT meta-model, Rules regarding
the origin and destination of links - Rules regarding cycles and multiplicity of links Representing other types of models in MOT.
Industry specific data mining - Data analysis case study - Credit scoring case study Data mining non tabular data.
Total Hours: 45
REFERENCES:
1. Colin Ware," Visual Thinking for Design",1st Edition, Morgan Kaufmann, 2008.
2. Gilbert Paquette, "Visual Knowledge Modeling for Semantic Web Technologies:
Models and Ontologies", IGI Global, 2010.
3. Glenn J Myatt, Wayne P. Johnson, "Making sense of Data - A Practical Guide to
Data Visualization, Advanced Mining Methods and Applications", Wiley, 2009.
4. Tom Soukup and Ian Davidson, "Visual Data Mining: Techniques and Tools for
Data Visualization and Mining", John Wiley & Sons, 2002.
OUTCOMES:
Students who complete this course will be able to:
CSBX29
L T P
3 0 0
OBJECTIVES:
To provide the students with a data based view of marketing decisions.
To acquire the knowledge for basic business data processing.
To differentiate relational database and data warehouse modeling concepts.
To cover concepts and fundamentals of Data Mining for better marketing
campaigns and customer management.
Describe the typical data warehouse lifecycle.
Relate current trends in data warehousing.
PREQUISITE:
DATA BASE MANAGEMENT SYSTEM
MODULE I DATA MINING
Data Mining: - Data Mining Functionalities - Data Preprocessing - Data Cleaning- Data
Integration and Transformation - Data Reduction - Data Discretization and Concept
Hierarchy Generation. Association Rule Mining: - Efficient and Scalable Frequent Item
set Mining Methods - Mining Various Kinds of Association Rules - Association Mining to
Correlation Analysis - Constraint-Based Association Mining.
MODULE II BUSINESS INTELLIGENCE
Effective and timely decisions - Data, information and knowledge - Role of mathematical
models - Business intelligence architectures: Cycle of a business intelligence analysis Enabling factors in business intelligence projects - Development of a business
intelligence system - Ethics and business intelligence
MODULE III DATA ANALYSIS
Business focussed data analysis - Top down logical data modelling - Bottom up source
data analysis - Data cleansing - Deliverables of data analysis - Importance of data
analysis.
MODULE IV KNOWLEDGE DELIVERY
MODULE V EFFICIENCY
Efficiency measures - The CCR model: Definition of target objectives - Peer groups Identification of good operating practices: cross efficiency analysis - Virtual inputs and
outputs - Other models.
MODULE VI FUTURE OF BUSINESS INTELLIGENCE
Show how ERP business intelligence can be derived from data warehouses
Analyze data to generate information and knowledge that lead to informed decisions for
businesses
CSBX30
WEB MINING
OBJECTIVES:
To give the basic foundation for mining procedures and related techniques.
PREQUISITE:
DATA BASE MANAGEMENT SYSTEM
MODULE I MINING FOUNDATION
Basic Concepts - Information Retrieval Models - Evaluation measure - Link Analysis HITS Algorithm - Community Discovery - Web Crawling: Crawler Algorithm - Community
Discovery - Web Crawler Algorithm - Implementation Issues - Types of Crawlers.
Distinguish the web mining process and apply rule based algorithms
Choose appropriate clustering algorithms and implement them for the given real
time scenario
Examine the working of web mining crawlers and summarize their features
Summarize the recent web mining trends and recommend techniques to a given
scenario.
CSBX31
LTPC
3003
OBJECTIVES:
Showcase how web publishing can meet the needs of content management
Analyze the information models, content units and apply the content
management plans and strategies to meet various application needs.
PREQUISITE:
WEB TECHNOLOGY.
MODULE I INTRODUCTION TO WEB PUBLSIHING
Building a simple FileMaker file - Viewing FileMaker Data - Altering FileMaker Data Working with portals - Working with images - FileMaker Layout - Performance Tuning Security Concerns- Error Handling and Prevention - FileMaker PHP API.
MODULE III CONTENT MANAGEMENT BASICS
Data, Information and Content - Content Format - Content Structure - Content Context CMS overview - Collection System - Management System - Publishing System Principles of CMS - Limits of CMS - Technology Aspects-Branches of CMS.
MODULE IV CONTENT MANAGEMENT SOLUTION
Content Plans for Static Web Sites -Content Plans for Dynamic Web Sites Developing Single Source strategies - Plan and author for reuse - Staffing - Establish
business case for CMS.
Total Hours: 45
TEXT BOOKS:
1. Bob Boiko, "Content Management Bible", 2nd Edition, Wiley, 2004.
2. Jonathan Stark ," Web Publishing with PHP and FileMaker 9", 1 st Edition, Sams
Publishing, 2007.
3. JoAnn T. Hackos, "Content Management for Dynamic Web Delivery", 1 st Edition,
Wiley, 2002.
REFERENCES:
1. Russell Nakano, "Web Content Management: A Collaborative Approach",
Addison-Wesley Professional, 2002.
2. Todd Kitta, Brett Grego, Chris Caplinger, Russ Houberg, "SharePoint Server 2010
Enterprise Content Management", Wrox, 2011.
3. Gaurav Kathuria, "Web Content Management with Documentum: Setup, Design,
Develop, and Deploy Documentum Applications", Packt Publishing, 2006.
4. Bruce Page, Diana Holm "Web Publishing with Adobe Acrobat and PDF", Wiley
Publications, 1996.
OUTCOMES:
Students who complete this course will be able to:
Explain the basics principles of web publishing and list the tools used in it with
their application use cases
Given a scenario in web publishing, select an appropriate tool and apply it for
effective outcomes
Analyze the properties of a content management system and trace its operation
Develop a design plan for content management system with emphasis on all the
aspects using staffing.
CSBX32
L T
OBJECTIVES:
PREQUISITE:
SOFTWARE ENGINEERING
MODULE I INTRODUCTION
The five steps in problem analysis- business modeling - Systems engineering of software
intensive systems - Understanding user and stakeholders needs-Features of a product
or system -Interviewing - Requirements workshops-Brain storming and Idea reductionStoryboarding.
Size Estimation Two views of sizing- Function Point Analysis- Mark II FPA-Full Function
Points- LOC Estimation- Conversion between size measures-Effort, Schedule and Cost
Estimation - Estimation Factors- Approaches to Effort and Schedule EstimationCOCOMO II- Putnam Estimation Model-Algorithmic models- Cost Estimation.
MODULE VI ANALYSIS TOOLS FOR REQUIREMENT MANAGEMENT 8
Tools for Requirements Management and Estimation Requirements Management Tools:
Benefits of using requirements management tool-Commercial requirements
management tool- Rational Requisite pro- Caliber RM- Implementing requirements
management automation- Software Estimation Tools: Desirable features in software
estimation tools- IFPUG-COCOMO II- SLIM (Software Life Cycle Management) Tools.
Total Hours: 45
TEXT BOOKS:
1. Stephen Withal, "Software Requirement Patterns", 3 rd Edition, Microsoft Press,
2011.
2. Karl & Joy Beatty," Software Requirements", 3rd Edition, Microsoft Press, 2012.
3. Swapna Kishore & Rajesh Naik, "Software Requirements and Estimation", Tata
McGrawHill, 2008.
REFERENCES:
1. Ian Sommerville and P Sawyer, "Requirements Engineering a Good Practice
Guide", 1st Edition, Wiley India, 1997.
2. Leffingwell, D.Widrig, D,"Managing Software Requirements A Use Case
Approach", 2nd Edition, Pearson Education,2000.
OUTCOMES:
Students who complete this course will be able to:
o
Analyze the various requirements elicitation methods and select the appropriate
one.
o
o
Apply methods and tools for requirements management from the development of
project
Examine the different cost estimation techniques and analyze the estimation
factors.
CSBX33
OBJECTIVES:
To have a thorough overview about the test design strategy and review plans.
PREQUISITE:
OBJECT ORIENTED SOFTWARE ENGINEERING
MODULE I SOFTWARE TESTING - QUALITY STANDARDS
Software Processes and Methodologies - Quality Standards, Practices & Conventions Improving Quality with Methodologies - Structured and Information Engineering Measuring Customer Satisfaction- Software Quality Engineering-Defining Quality
Requirements - Management Issues for Software Quality - Data Quality Control Benchmarking and Certification - software testing - Overview of Testing Maturity Model
(TMM) - TMM levels - The Tester's Role in a Software Development Organization.
Origins of Defects - Defect Examples-Developer and Tester Support for Developing a
Defect Repository.
MODULE II TEST CASE DESIGN
Test Case Design Strategies - Using Black Box Approach to Test Case Design-Random
Testing - Requirements based testing - Boundary Value Analysis - Decision tables Equivalence Class Partitioning - State-based testing - Cause-effect graphing -Error
guessing - Compatibility testing - User documentation testing - Domain testing Using
White Box Approach to Test design - Test Adequacy Criteria - Static testing vs. structural
testing - code functional testing-Coverage and Control Flow Graphs - Covering Code
Logic - Paths - Their Role in White-box Based Test Design - Code complexity testing Evaluating Test Adequacy Criteria.
The Need for Levels of Testing - Unit Test - Unit Test Planning -Designing the Unit Tests
- The Test Harness - Running the Unit tests and Recording results-Integration tests Designing Integration Tests - Integration Test Planning - Scenario testing -Defect bash
elimination - System Testing - Acceptance testing-Performance testing - Regression
Testing - Internationalization testing - Ad-hoc testing - Alpha , Beta Tests - testing OO
systems - Usability and Accessibility - Testing - Configuration testing - Compatibility
testing - Testing the documentation- Website testing.
MODULE IV TEST MANAGEMENT
Testing and Debugging Goals and Policies - Test Planning - Test Plan Components Test Plan Attachments - Locating Test Items - Reporting Test Results - The role of three
groups in Test Planning and Policy Development - Process and the Engineering
Disciplines - Introducing the test specialist - Skills needed by a test specialist - Building a
Testing Group.
MODULE V CONTROLLING AND MONITORING
OUTCOMES:
Students who complete this course will be able to:
CSBX34
SOFTWARE AGENTS
OBJECTIVES:
To highlight concepts and techniques of the agent technology and its standards
and to evaluate current software agent systems.
To introduce the methodology and applications of software agents and multi agent
systems.
PREQUISITE:
OBJECT ORIENTED SOFTWARE ENGINEERING ARTIFICIAL INTELIGENCE
MODULE I INTRODUCTION
The Vision Thing- Some Views of the Field- Agents as a paradigm for software
engineering Agents as a tool for understanding human societies- Research-EthicalProfessional and Legal Issues.
MODULE II MULTI AGENTS SYSTEM
Agent Negotiation - Intelligent Agents- Agents and Objects- Agents and Expert SystemsAgents as Intentional Systems- Abstract Architectures for Intelligent Agents- How to Tell
an Agent What to Do.
MODULE III DEDUCTIVE REASONING AGENTS
Agents Framework - Agent Reasoning - Agents as Theorem Provers- Agentoriented programming Concurrent MetateM
MODULE IV PRACTICAL REASONING AGENTS
Practical Reasoning = Deliberation + Means-Ends Reasoning- Means-Ends Reasoning Implementing a Practical Reasoning Agent- The Procedural Reasoning System- Agent
communication languages.
MODULE V REACTIVE AND HYBRID AGENTS
Identify the reactive agents that cause vital changes in the process
CSBX35
L T
OBJECTIVES:
To
highlight
the
user
interfaces
in
terms
of
work
context
To describe the nature of the design process and its relation to other phases of
the software development process.
PREQUISITE:
OBJECT ORIENTED PROGRAMMING
MODULE I INTRODUCTION
The importance of the user interface design, importance of user interface, human
computer interface-Characteristics of Graphical and web user interface, Graphical User
interface, Web user interface, Principles of user interface design.
MODULE II KNOWING THE USER
The user interface design process -Know your user or client, important human
characteristic in design, Human consideration in design -Understand the Business
function, Human consideration in screen design, Technical consideration in interface
design.
MODULE III SYSTEM MENUS AND NAVIGATION SCHEMES
Develop System Menus and Navigation menus-Select the proper kinds of windowsSelect the proper device based controls.
8
MODULE IV CONTROLS AND WEB PAGES
Select the proper screen based controls-Text for web pages-Provide effective feedback
and Guidance and Assistance.
MODULE V PROVIDE EFFECTIVE INTERNATIONALIZATION
Organize and layout Windows and Pages - Test, Test and Retest, The purpose and
importance of usability testing, kinds of test -Analyze, Modify and Retest.
Total Hours: 45
TEXT BOOK:
1. Wilbert O.Galitz, "The essential guide to User Interface Design", 3rd Edition,
Wiley Publishers, 2009.
REFERENCE:
1. Alan Cooper, "The Essential of User Interface Design", Wiley, Dream tech Ltd,
Reprint, 2008.
OUTCOMES:
Students who complete this course will be able to:
Select and execute an appropriate interaction design pattern for a particular user
interface situation.
Use several of the important concepts for interface design (i.e. color and
typography) in their designs.
Analyze users needs, usability goals and user experience goals of a small-tomedium-sized software application.
CSBX36
PATTERN RECOGNIZATION
L T P
0 0
OBJECTIVES:
o An introduction to fundamentals of Pattern recognition.
o The ability to choose an appropriate Pattern classification algorithm for a
given pattern recognition problem .
o Attain necessary foundation for efficient implementation of classification
and clustering algorithms
o Exposing the student to the theorem, classifiers used in Navie Bayesian.
o Explain the fundamental principles of Support vector machine.
o Be familiar with the different types and algorithm used for Clustering.
PREQUISITE:
DATABASE MANAGEMENT SYSTEM
MODULE I PATTERN RECOGNIZATION OVERVIEW
Pattern Recognization - Data Sets - Different Paradigms - Representation Data Structures - Representation Of Clusters - Proximity Measures - Size Of
Patterns -Feature Extraction - Feature Selection - Evaluation Of Clustering Evaluation Of Classifiers.
MODULE II
Nearest Neighbor Algorithm - Variants of NN Algorithm - Use of Algorithms Data Reduction - Prototype Selection.
MODULE III
BAYERS CLASSIFIER
Bayes Theorem - Minimum Error Rate Classifier - Estimation of ProbabilitiesComparison With The NNC - Nave Bayes Classifier - Bayesian Belief Network.
MODULE IV DECISION TREES
Introduction - Learning the Linear Discriminant Function - Neural Networks - SVM for
Classification.
MODULE VI CLUSTERING
Importance of Clustering - Hierarchical Algorithms - Partitional Clustering Clustering Large Data Sets.
Total Hours: 45
TEXT BOOK:
1. M. Narasimha Murty, V. Susheela Devi, "Pattern Recognition: An Algorithmic
Approach", Springer, 2011.
REFERENCE:
1. R.O.Duda, P.E.Hart & D.G Stork, "Pattern Classification", 2nd Edition, J.Wiley
Inc, 2001.
OUTCOMES:
Students who complete this course will be able to:
o have good knowledge of the issues and challenges faced while doing the Pattern
Reorganization.
o Introduce the nature and inherent difficulties of the pattern recognizing problem
o Comparatively analyze various pattern recognition algorithms.
o Select and Develop suitable classification process, features to solve given patter
recognition problem.
o Summarize, analyze, and relate research in the pattern recognition area verbally
and in writing
o Implement simple pattern classifiers, classifier combinations, and structural
pattern recognizers.
CSBX37
LT P
3 0 0 3
OBJECTIVES:
To review the possibilities for integrating blended learning best practices to support
student success.
To provide an overview of our methodology for the public interest, for those who
exercise the profession as accountants or auditors and for others who have a
general interest in quality assurance methodologyTo illustraste why quality is key
in all of the testing stages in the Software Development Lifecycle
Be able to select suitable testing types and techniques based on the project's
focus and the desired outcome
Identify, prioritise, plan, create and execute test cases in test management
PREQUISITE:
SOFTWARE ENGINEERING.
MODULE I INTRODUCTION
Introduction -Acceptance sampling -Rectifying inspection -Variables sampling plans Inspection in a continuous process -Economic inspection sampling.
CSBX38
SOFTWARE DEVELOPMENT
L T
P C
METHODOLOGIES
3 0
0 3
OBJECTIVES:
To illustrate the various software process models and the importance of planning
and scheduling.
To incorporate the need for analyzing the requirement and learn different stages
of analysis.
To design the software and the user interface based on the analysis.
PREQUISITE:
SOFTWARE ENGINEERING
MODULE I PROCESS MODELS
A generic view of processes - Process maturity - Process models - Agile process Extreme programming - Software cost estimation - Risk analysis - Software project
planning & scheduling.
MODULE II REQUIREMENT ANALYSIS
Design concepts - Design models - Pattern based design - Architectural designComponent level design - Class based and conventional components design-Real-time
system design - User interface: Analysis and design.
MODULE IV SOFTWARE TESTING
Software testing - Strategies - Issues - Test strategies for conventional and object
oriented software - Validation and system testing - Testing tactics: White box testing,
Basis path testing - Control structure testing - Black box testing - Object oriented testing Testing GUI - Testing Client/Server -Documentation testing.
MODULE V SOFTWARE QUALITY ASSURANCE
OUTCOMES:
Students who complete this course will be able to:
CSBX39
COMPUTER GRAPHICS
OBJECTIVES:
To use specific tools and software to produce a graphic product based on the
principle of creative art.
To create graphic material using tools and software in line with the industrial
norm.
PREQUISITES:
BASIC KNOWLEDGE ON COMPUTER FUNDAMENTALS.
MODULE I 2D PRIMITIVES
Output primitives - Line, Circle and Ellipse drawing algorithms - Attributes of output
primitives - Two dimensional Geometric transformation - Two dimensional viewing -Line,
Polygon, Curve and Text clipping algorithms.
MODULE II 3D CONCEPTS
Color Models - RGB, YIQ, CMY, HSV - Animations - Conversation between HSV and
RGB Models-HLS Color Model-Color Selection and Applications.
MODULE IV COMPUTER ANIMATION
MODULE V RENDERING
Introduction to Shading models - Flat and Smooth shading - Adding texture to faces Adding shadows of objects - Building a camera in a program - Creating shaded objects Rendering texture - Drawing Shadows.
MODULE VI FRACTALS
Fractals and Self similarity - Peano curves - Creating image by iterated functionsMandelbrot sets - Julia Sets - Random Fractals - Overview of Ray Tracing - Intersecting
rays with other primitives - Adding Surface texture - Reflections and Transparency Boolean operations on Objects.
Total Hours: 45
TEXT BOOKS:
1. Donald Hearn, Pauline Baker, "Computer Graphics with OPENGL - C Version", 4th
Edition, Pearson Education, 2010.
2. F.S. Hill, "Computer Graphics using OPENGL", 3rd Edition, Pearson Education,
2009.
REFERENCE:
1. James D. Foley, Andries Van Dam, Steven K. Feiner, John F. Hughes,
"Computer Graphics- Principles and practice", 2nd Edition, Pearson Education,
2007.
OUTCOMES:
Students who complete this course will be able to:
Use OpenGL or any other graphical tools to create and render any object
CSBX40
L T
OBJECTIVES:
PREQUISITE:
SOFTWARE ENGINEERING
MODULE I INTRODUCTION
Project Management: The key to thrive in the Project Management World, Foundation
Principles of Project Management, Knowing your key stack holders and winning their
cooperation.
MODULE II DEFINING THE PROJECT
Five key document to manage expectation and define success- Risk Management and
work Breakdown Structure.
MODULE III THE PLANNING PROCESS
Realistic scheduling- The art and science of accurate estimating- Balancing the trade off
among cost, schedule and quality.
MODULE IV CONTROLLING THE PROJECT
Building a high performance project team - Clear communication among project stake
holders-Measuring Progress-Solving common project problems.
MODULE V
Project initiation, Information Technology project success factors- Align project resources
with business strategy.
Total Hours: 45
TEXT BOOK:
1. Eric Verzuh," The Fast Forward MBA in Project Management", 4th Edition, John
Wiley and Sons, 2012.
REFERENCES:
1. "A Guide to the Project Management Body Of Language PMBOK(R) Guide",
Project Management Institute, 5th Edition, 2013.
2. Eric.S.Norman Shelly. A. Botherton,Robert.T.Fried ,"Work Breakdown
Structures:The Foundation for Project Management Excellience ", John Wiley &
Sons ,2008.
OUTCOMES:
Students who complete this course will be able to:
Improve their personal job skill of becoming a valuable project manager in the
years ahead.
Explain the role of the project manager in initiating and completing a project.
Explain the role of the project manager in initiating and completing a project.
CSBX41
P
0
C
3
OBJECTIVES:
To discuss about the various strengths and weaknesses involved in people ware
activities in a software process models
PREREQUISITE :
SOFTWARE ENGINEERING
MODULE I INTRODUCTION
Software processes-Software process models - Process activities -Coping with changeThe rational unified process.
MODULE II SOFTWARE PROCESS AND PEOPLEWARE
BASICS
Descriptive criteria - Activity oriented models - People oriented models - Activity oriented
models.
MODULE IV CAPABILITIES ORIENTED SOFTWARE PROCESS MODEL
Adding capabilities to the software process model - People dimension - Roles dimension
- Product dimension - Capabilities based assignation method in action - Benefits of
incorporating peoples capabilities into the software process.
MODULE V SOFTWARE PROCESS DYNAMICS AND
SIMULATION
Modeling, Simulation and improvement - Software process simulation with system
dynamics - High level software project modeling with system dynamics.
MODULE VI SOFTWARE PROCESS MODELING
Socio-Technical interaction network in free/open source development processDiscovering, modeling and re-enacting open source software development
processes - Case study.
Total Hours : 45
TEXT BOOKS:
1. Silvia T.Acuna, Natalia Juristo, Ana Maria Moreno, Alicia Mon, "Software Process
Model Handbook for Incorporating People's Capabilities", Springer, 2005.
2. Maria I. Sanchez-segura (Editor) Silvia T. Acuna,"New Trends in Software
Process Modeling", World Scientific Publishing, 2006.
3. Ian Sommerville,"Software Engineering", 9th Edition, Pearson, 2010.
REFERENCES:
1. Rizwan Qureshi,"Software Process Models: To Improve the Efficiency of Software
Development",VDM Publishing, 2010.
2. Stefen Koch," Free/Open Source Software Development", IGI, 2005.
OUTCOMES:
Analyze the issues and problems of scaling agile development methods to the
development of large software systems.
Develop a model based considering various attributes involved and their impact of
changes that affect the entire process.
CSBX42
SOFTWARE MAINTENANCE
OBJECTIVES:
To study in detail software maintenance and how it affects all levels of the
software evolution process.
To impart key issues involved in software maintenance and the best solutions to
overcome.
To interpret the importance of reusing and reversing impact the software model.
To analyze the product from the customer perspective and customize according to
their requirements by reusing than redeveloping.
PREQUISITE:
SOFTWARE ENGINEERING
MODULE I THE CONTEXT OF MAINTENANCE
8
and
reusability-Testing-
Problem Reporting - Problem Resolution- Fix Distribution-Other Forms of MaintenanceMetrics and Measurements - Software Quality Assurance Activities for Maintenance
Global Maintenance Teams- Maintenance and Other Life Cycle Activities-Building and
sustaining maintainability- Common Technical Problems.
MODULE VI LOOKING TO THE FUTURE
Practical
Software
Maintenance",
Wiley
Computer
OUTCOMES:
Students who complete this course will be able to:
Solve the problem involved in a process and ensure the software quality in
maintenance.
State the effects of globalization on the various roles and organization structure
and the issues that arise in the teams distributed geographically.
Identify the mission critical systems built for specific verticals that usually find high
priority in the subsequent release and version in a product.
List out the various ways to measure the ease of the maintenance process, not
only to reduce the cost of maintainability but to ascertain whether the
maintenance of a specific software product is worthwhile or not.
CSBX43
OBJECTIVES:
Trace the relationship between design patterns and object orientation principles
Be able to mix patterns with each other and describe the consequences of mixing
patterns on the overall quality of a system.
PREQUISITE:
SOFTWARE ENGINEERING
MODULE I THE OBJECT ORIENTED PARADIGM, THE UML
Introducing to the facade pattern - Learning the faade pattern - Relating the facade
problem to the CAD / CAM problem - An Approach to Handling New Requirements Case Study - International E-Commerce System - Handling New Requirements - The
Strategy Pattern - Using the Strategy Pattern.
Introducing the Bridge Pattern - Learning The Bridge Pattern - An Example - Deriving It Abstract Factory Pattern - Introducing The Abstract Factory Pattern-Learning The
Abstract Factory Pattern - An Example - Implementing It.
MODULE V THE PRINCIPLES AND STRATEGIES OF DESIGN
PATTERN
The open-closed principle - The principle of designing from context - The principle of
encapsulating variation - Abstract classes Vs Interfaces - The principle of healthy
skepticism.
MODULE VI LESSONS FROM DESIGN PATTERNS:
FACTORIES
Factories - The universal context revisited - Factories follow guidelines - Limiting the
vectors of change - Different roles of factories - Design patterns reviewed-How design
patterns encapsulate implementations - Commonality and variability analysis and design
patterns - Decomposing a problem domain into responsibilities - Patterns and contextual
design - Design patterns and agile coding practices.
Total Hours: 45
TEXT BOOK:
1.
REFERENCES:
1. Joshua Kerievsky, "Refactoring to Patterns", 1st Edition, Addison Wesley
Professional, 2004.
2. Erich Gamma, Richard Helm Ralph Johnson, "Design Patterns: Elements of
Resusable Object Oriented Software", Addison-Wesley, 1995.
OUTCOMES:
Students who complete this course will be able to:
CSBX44
OBJECTIVES:
To identify the pros and cons of different data mining techniques for modeling a given
social phenomen.
To Use mathematical techniques to model and analyze structural and dynamical properties of
social networks.
To expose and train on using various tools and techniques for analyzing and visualizing
social media networks.
.
PREQUISITE
COMPUTER NETWORKS
MODULE I INTRODUCTION TO SOCIAL NETWORKS
Brief history of Social Network Analysis - Connected World - Networks: Actors, Relations
and Attributes - Networks as Information Maps - Networks as Conduits- Leaders and
Followers - Psychological foundations of social networks - Basic building Blocks.
MODULE II NETWORK CONCEPTS
Actor Level in Complete Networks - Actor Level in Ego Networks - Dyad Level-Triad
Level - Subgroups Level - Network Levels - Positions and Roles Analysis.
Compare and contrast of the methodologies supported for visualization and measures.
Solve concrete managerial and consulting problems using social network Analysis.
networks
by
applying
various
methods
of
analysis,
CSBX46
NoSQL DATABASE
L T
P C
OBJECTIVES:
PREQUISITE:
DATA BASE MANAGEMENT SYSTEM
MODULE I INTRODUCTION TO NoSQL
Storing Data In and Accessing Data from MongoDB - Querying MongoDB - Storing Data
In and Accessing Data from Redis - Querying Redis - Storing Data In and Accessing
Data from HBase - Querying HBase - Storing Data In and Accessing Data from- Apache
Cassandra - Querying Apache Cassandra-Language Bindings for NoSQL Stores.
Google App Engine Data Store - Amazon SimpleDB - MapReduce - Hive Benchmarking and Performance Tuning.
Total Hours: 45
TEXT BOOKS:
1. Pramod J. Sadalage, Martin Fowler, "NoSQL Distilled: A Brief Guide to the
Emerging World of Polyglot Persistence", 1st Edition, Addison-Wesley
Professional, 2012.
2. Shashank Tiwari, "Professional NoSQL", 1st Edition, Wrox, 2011.
3. Eric Redmond , Jim R. Wilson, "Seven Databases in Seven Weeks: A Guide to
Modern Databases and the NoSQL Movement", Pragmatic Bookshelf, 2012.
REFERENCES:
1. MC Brown,"Getting Started with CouchDB", O'Reilly Media, 2012.
2. Eben Hewitt, "Cassandra: The Definitive Guide", O'Reilly Media, 2010.
3. Kevin Roebuck, "Storing and Managing Big Data - NoSql, Hadoop and More:
High-Impact Strategies - What You Need to Know", Tebbo, 2011.
4. Eelco Plugge, Tim Hawkins, Peter Membrey, "The Definitive Guide to MongoDB:
The NoSQL Database for Cloud and Desktop Computing", Apress, 2010.
OUTCOMES:
Students who complete this course will be able to:
Compare the architectural methods and storage techniques used under NoSql.
Interface NoSQL with tools and retrieve data from NoSql databases.
CSBX47
MULTICORE ARCHITECTURE
L T PC
3003
COURSE OBJECTIVE
PREQUISITE:
MICROPROCESSOR
COMPUTER ARCHITECTURE
MODULE I
INTRODUCTION
Definitions Technological Aspects - Design Principles of Connected Devices Fundamentals of IPv6 Addressing and Protocols relevant to IoT - Smart Cities and
Environments Smart Metering Applications in Security Healthcare Retail
Industrial Control Smart Farming and Agriculture.
MODULE II FOUNDATIONS OF SHARED MEMORY
9
Register construction Atomic snapshots - Power of Primitive Synchronization
Operations Universality of Concensus Spin Lock and Contention.
MODULE III SYNCHRONIZATION
9
Monitors and Blocking Synchronization Role of Locking Concurrent Queues ABA
Problem Concurrent Stacks and Elimination.
MODULE IV CONCURRENT DATA STRUCTURES
9
Counting, Sorting and distributed coordination Concurrent hashing and Natural
Parallelism Multiprocessor Scheduling and Parallelism - Barriers Transactional
Memory.
MODULE V PARALLEL PROGRAM DEVELOPMENT
9
Two n-Body Solvers Tree Search Pthreads OpenMP MPI
TEXT BOOKS
1. Peter Pacheco, An Introduction to Parallel Programming, Morgan Kaufmann,1st
Edition, 2011.
2. Maurice
Herlihy,
Nir
Shavit,
The
Art
of
Multiprocessor
Programming,
COURSE OUTCOMES:
Upon the completion of the course students will be able to
Apply barriers, all of which are useful for structure concurrent applications
CSBX48
VIRTUALIZATION TECHNIQUES
L T
P C
3 0
0 3
OBJECTIVES:
PREQUISITES:
BASICS OF CLOUD COMPUTING.
MODULE I INTRODUCTION
Working with system stack - Desktop Management Issues - Available ProductsLicensing - Potential scenarios and audiences - Centralized Desktop Virtualization
Infrastructures.
Castle Defense System - Securing Resource Pools - Securing Virtual Service Offering System Protection Strategies - Complete Recovery Strategies - Business Continuity
Essentials - Business Continuity Strategies.
Total Hours: 45
TEXT BOOKS:
1. Nelson Ruest, Danielle Ruest, "Virtualization, A Beginner's Guide", McGrawHill Osborne Media, 2009.
2. Matthew Portnoy, "Virtualization Essentials", 1st Edition, Sybex Publishers,
2012.
REFERENCES:
1. Ivanka Menken, "Virtualization - The Complete Cornerstone Guide to
Virtualization Best Practices", Emereo Pty Ltd, 2010.
2. Daniel Kusnetzky, "Virtualization: A Manager's Guide", O'Reilly Media, 2011.
OUTCOMES:
Students who complete this course will be able to:
ECB3101
L
3
P C
0
OBJECTIVES
To study various Fourier transforms and their application in Digital Filter design.
To expose the concept of quantization noise and its effects in multi-rate signal
processing
Design of Low Pass Butterworth filters, analog to analog transformation -Analog to digital
transformation, Bilinear transformation - Prewarping, Impulse invariant transformation.
MODULE III DESIGN AND IMPLEMENTATION OF FIR FILTERS
Amplitude and phase responses of FIR filters - symmetric and anti-symmetric impulse
response, group delay and phase delay, Frequency response of FIR filters, Linear phase
filters - Windowing techniques for design of Linear phase FIR filters - Rectangular,
Hamming, Hanning and Blackmann windows, Frequency sampling techniques.
MODULE IV FINITE WORD LENGTH EFFECTS
Representation of numbers, - Fixed point and binary floating point number representation
- Comparison, errors due to truncation and rounding- off, Quantization noise - Derivation
for quantization noise power at the input and output of a digital filter , Co-efficient
quantization error -Product quantization error, Round-off effects in digital filters, Limit
cycle oscillation - Over flow error-Signal scaling.
Introduction to DSP architecture - Harvard and Von Neumann architecture - Pipelining Dedicated MAC unit - Advanced addressing modes, Architecture of TMS320C5X and
C54X, Overview of instruction set of TMS320C5X and C54X.
Total Hours: 45
TEXT BOOKS:
1. John G Proakis, Dimtris G Manolakis, "Digital Signal Processing Principles,
Algorithms and Application", 4th Edition, PHI, 2009.
2. B.Venkataramani & M. Bhaskar, "Digital Signal Processor Architecture,
Programming and Application", TMH 2002.
REFERENCES:
1. Alan V Oppenheim, Ronald W Schafer, John R Back, "Discrete Time Signal
Processing", 2nd Edition, PHI , 2000.
2. Avtar Singh, S.Srinivasan, "DSP Implementation using DSP microprocessor
with Examples from TMS32C54XX", Thomson / Brooks cole Publishers, 2003.
3. Johny R.Johnson, "Introduction to Digital Signal Processing", Prentice Hall,
2002.
4. S.K.Mitra, "Digital Signal Processing- A Computer based approach", Tata
McGraw-Hill, 2006.
OUTCOMES:
On completion of this course the student will be familiar with the
CSBX49
VIDEO ANALYTICS
LTPC
3 003
OBJECTIVES:
Showcase how the need in multimedia has driven the innovation in video
analytics
Illustrate the basic processes involved from the acquisition to the analytics phases
Expose how the modeling of the content is a key step in all the phases of video
analytics
Depict the relationship between components of the video affects the final output in
analytics
PREREQUISITE
ALGORITHM ANALYSIS.
KNOWLEDGE IN MATHEMATICS
MODULE I INTRODUCTION
Trace the key transitions involved in the transformation from analysis to analytics
in video domain
CSBX50
T P
OBJECTIVES:
To introduce the various components of Multimedia.
To expose the principles of animation and design for developing multimedia
applications.
To adapt professional workflows into the design process of animation industry.
To effectively create and develop animated content for multimedia projects.
To develop multimedia content for Hand held devices.
To develop interactive and animated multimedia content.
PREREQUISITE:
BASIC KNOWLEDGE ON GRAPHICS AND SOUND
MODULE I INTRODUCTION TO MULTIMEDIA
Definitions - Usage -Delivery - Virtual Reality - Text -Fonts and Faces -Text
in Multimedia - Hypermedia -Hypertext.
MODULE II IMAGE AND AUDIO FUNDAMENTALS
Images - Bitmaps -Vector Drawings - 3D Drawing and Rendering - Color Fundamentals Digital Audio - MIDI - Audio File Formats - Adding Sound to Multimedia.
MODULE III VIDEO BASICS FUNDAMENTALS
Stages of Making Multimedia -Intangibles - Multimedia Hardware RequirementsMultimedia Software Requirements - Authoring Systems - Acquiring ContentInternet and Multimedia.
Multimedia Skills - Planning - Costing - Designing - Producing - Talent Acquisition Delivery Mechanism - Designing for World Wide Web- Designing for Handheld Devices.
Macromedia Flash Introduction -Understanding the Interface - Drawing and Color Tools Animation Basics- Shape Tweening - Filters and Blends Motion Tweening - Timeline
Effects - Action Scripts- Working with Text, Images, Videos - Integration.
Total Hours: 45
TEXT BOOKS:
1. Tay Vaughan , "Multimedia:Making It Work,8th Edition", McGraw Hill, 2010.
2. James Gonzalez , "Macromedia Flash Professional 8 Hands-On Training",
Peachpit Press , 2006.
OUTCOMES:
Students who complete this course will be able to:
Identify the basic components, basic hardware and software requirements for
multimedia development and playback.
Identify and describe the function of the general skill sets in the multimedia
industry.
GEBX01
GENERAL ELECTIVES
DISASTER MANAGEMENT
LTPC
3 0 0 3
OBJECTIVES:
Man induced hazards & Disasters - Soil Erosion, Chemical hazards, Population
Explosion.
MODULE IV DISASTER MANAGEMENT
GEBX02
NANO TECHNOLOGY
OBJECTIVES:
Definition - Origin of nanotechnology - Difference between bulk and nanomaterials- Topdown and bottom-up processes - Size dependent properties (magnetic,
electronic,transport and optical), Classification based on dimensional property - 0D, 1D,
2D and 3D nanostructures Kubo gap.
MODULE II TYPES OF NANOMATERIALS
Metal oxides and metal nano particles - Ceramic nano particles - Semi conducting
quantum dots - Core-shell quantum dots - Nanocomposites - Micellar nanoparticles.
MODULE III PRODUCTION OF NANOPARTICLES
Carbon nanotubes: Single wall nanotubes (SWNT), Multiwall nanotubes (MWNT) structures-carbon nanofibre, Fullerenes-Application of carbon nanotubes and Fullerenes.
MODULE V NANOPHOTONICS
Nanostructured
Materials
and
and
GEBX03
CONTROL SYSTEMS
OBJECTIVES:
To accord basic knowledge in obtaining the open loop and closedloop frequency
responses of Control systems.
Control System - Basic elements in control systems Open and closed loop systems
Electrical analogy of mechanical and thermal systems Transfer function Block
diagram reduction techniques Signal flow graphs.
MODULE II TIME RESPONSE ANALYSIS AND DESIGN
Time response Time domain specifications Types of test input First and Second
order system - Type I and Type II System Response - Error coefficients Generalized
error series Steady state error P, PI, PID modes of feedback control.
MODULE III FREQUENCY RESPONSE ANALYSIS AND DESIGN
Performance criteria Lag, lead and lag-lead networks Compensator design using
bode plots and root locus technique.
Synchros AC servomotors - DC Servo motors - Stepper motors - AC Tacho generator DC Tacho generator - Typical applications of control system in industry.
Total Hours : 45
REFERENCES:
1. K. Ogata, Modern Control Engineering, 4th Edition, Pearson Education, New
Delhi, 2003.
2. I.J. Nagrath & M. Gopal, Control Systems Engineering, New Age
International Publishers, 2003.
3. C.J.Chesmond, Basic Control System Technology, Viva student edition,
1998.
4. I.J.Nagarath and M.Gopal, Control System Engineering, Wiley Eastern Ltd.,
Reprint, 1995.
5. R.C.Dorf and R.H.Bishop, Modern Control Systems, Addison-Wesley
(MATLAB Reference), 1995.
OUTCOMES:
At the end of the course, the student is expected to possess knowledge and
achieve skills on the following:
Ability and skill to carry-out time domain and frequency domain analysis.
Capable of determining stability of the system using Routh Hurwitz criterion, Root
locus and Nyquist criterion.
GEBX04
L T
OBJECTIVE:
Objectives of Sustainable Development - Need for sustainable developmentEnvironment and development linkages - Globalisation and environment-Population,
poverty and pollution- global, regional and local environment issues-Green house gases
and climate change.
MODULE II SUSTAINABLE DEVELOPMENT OF SOCIO EONOMIC
SYSTEMS
8
Demographic dynamics of sustainability- Policies for socio economic developmentSustainable Development through trade- Economic growth-Action Plan for implementing
sustainable development- Sustainable Energy and Agriculture.
MODULE III FRAME WORK FOR ACHIEVING SUSTAINBAILITY
8
MODULE VI GREEN BUILDINGS DESIGN
Elements of Green Buildings Design- Foundation, Electrical, Plumbing, flooring, Decking,
roofing, insulation, wall coverings, windows, siding, doors and finishing, LEED
certification for Green Buildings, Green Buildings for sustainability.
Total Hours: 45
TEXT BOOK:
1. Kirby, J., Okeefe, P., and Timber lake, Sustainable Development, Earthscan
Publication, London, 1995.
REFERENCE:
1. Charles Kibert, J., Sustainable Construction: Green Building Design and
Delivery, 2nd Edition, John Wiley and sons, 2007.
OUTCOMES:
At the end of the course, the students will be able to
GEBX05
KNOWLEDGE MANAGEMENT
L T
OBJECTIVES:
The course
Brings out the paradigm in terms of information technology and intellectual capital.
Tacit knowledge capture - Explicit knowledge codification - Knowledge taxonomies Knowledge sharing - Communities - Obstacles to knowledge capture and sharing.
MODULE IV KNOWLEDGE MANAGEMENT TOOLS
Describe the fundamental concepts in the study of knowledge and its creation,
acquisition, representation, dissemination, use and re-use, and management.
Explains the core concepts, methods, techniques, and tools for computer support
of knowledge management.
Critically evaluate current trends in knowledge management and apply it for elearning
GEBX06
APPROPRIATE TECHNOLOGY
OBJECTIVE:
Back ground, Tools, Choices and Implications, Appropriate Technology Movement (an
overview) - Basic design process, basic financial analysis-discounted cash flow, and
energy fundamentals.
MODULE II
Water Storage: Designing Dams and Pipelines, Appropriate Selection for Sanitation
Technique, Sewerage, Communal Health and Waste Water Recycling.
MODULE IV WASTE MANAGEMENT
Green building concepts-renewable energy sources- Solar Steam and wind-Biofuels Biogas Electricity.
MODULE VI TECHNOLOGY POLICY
At the end of the course, the students will be able to use suitable technologies for
various conditions for sustainable development.
GEBX07
OBJECTIVES:
Need Analysis Concept Exploration Performance requirement and validation Concept selection and validation systems architecture Decision making.
MODULE IV ESTABLISHING ENGINEERING SYSTEMS
Case studies in Software Systems Engineering Systems for Product Design Manufacturing Systems.
Total Hours: 45
REFERENCES:
1. Charles S. Wasson, System Analysis, Design, and Development: Concepts,
Principles, and Practices, Wiley Series in Systems Engineering and
Management, 2006.
2. Kossiakoff Alexander and William N. Sweet A, Systems Engineering: Principles
And Practice, Wiley Student Edition, 2009.
OUTCOMES:
At the end of the course the student will have the
Ability to design, build and evaluate simple systems for industrial requirement.
GEBX08
L T
3
C
3
OBJECTIVES:
To get acquainted with value analysis and engineering tool for productivity
improvement.
Seven phases of job plan, FAST Diagram as Value Engineering Tool, Behavioural and
organizational aspects of Value Engineering, Ten principles of Value analysis, Benefits
of Value Engineering.
MODULE III ORIENTATION AND INFORMATION PHASES
Launching Value Engineering project work - Objectives and Targets - VE Project work: a
time-bound programme - Projects and Teams - Time Schedule - Co-ordination Consultant. Technical data - Marketing related information - Competition profile - Cost
data - Materials Management related information - Quality related information Manufacturing data.
MODULE IV FUNCTION ANALYSIS AND CREATIVE PHASES
Creativity - Mental road blocks - Creativity killer phrases. Positive thinking - Ideas
stimulators - Creativity techniques - Brainstorming.
MODULE V EVALUATION, INVESTIGATION AND RECOMMENDATION 6
Paired comparison and Evaluation Matrix techniques - Criteria for selection of VE
solutions. Design Materials Quality Marketing Manufacturing - Preview session.
The report - presentation.
MODULE VI IMPLEMENTATION PHASE AND CASE STUDIES
The student will be able to realize the value of products, processes and implement
value analysis to achieve productivity improvement.
GEBX09
OPTIMIZATION TECHNIQUES
OBJECTIVES:
MODULE I INTRODUCTION
GEBX10
L T P
3 0 0
OBJECTIVES:
To learn the concepts, techniques, tools for modeling and simulation systems and
environments through the use of computers.
MODULE I INTRODUCTION
Systems Modelling types systems components Steps in model buildingSimulation Algorithms and Heuristics; Simulation Languages.
MODULE II RANDOM NUMBERS / VARIATES
10
Total Hours: 45
REFERENCES:
1. Law, A.M., & W.D. Kelton, Simulation Modelling and Analysis, McGraw Hill,
Singapore, 2000.
2. Harrel, C.R., et. al., System Improvement Using Simulation, 3rd Edition, JMI
Consulting Group and ProModel Corporation, 1995.
3. Harrel, C.R. & T. Kerim, Simulation Made Easy, A Managers Guide, IIE Press,
1995.
4. Geoffrey Gordon, Systems Simulation, Prentice Hall, 2002.
5. David Kelton, Rondall P Sadowski, David T Sturrock, Simulation with Arena, Mc
Graw Hill, 2004.
OUTCOMES:
The student should be able to,
Model and simulate systems and environments through the use of computers.
GEBX11
P
0
C
3
OBJECTIVES:
Understanding Supply Chain - Decision phases - Supply chain performance Competitive and supply chain strategies - Achieving strategic fit - Expanding strategic
scope
MODULE II SUPPLY CHAIN DRIVERS AND DESIGN
Sourcing decision in supply chain - Third and Fourth Party Logistics providers Supplier scoring and assessment - Transportation in a Supply Chain Risk and Tradeoffs in transportation design.
MODULE V INFORMATION TECHNOLOGY IN A SUPPLY
CHAIN
Information technology in a supply chain CRM, ISCM, SRM in supply chain - Over view
of recent trends in Supply Chain: e-SRM, e-LRM, e-SCM.
Total Hours: 45
REFERENCES:
1. Sunil Chopra and Peter Meindl, Supply Chain Management-Strategy Planning
and Operation, Pearson Education, 4th Indian Reprint, 2010.
2. Jananth Shah Supply Chain Management Text and Cases Pearson
Education, 2008.
3. Altekar Rahul V, Supply Chain Management-Concept and Cases, Prentice
Hall India, 2005.
4. Monczka et al., Purchasing and Supply Chain Management, Thomson
Learning, 2nd Edition, 2nd Reprint, 2002.
OUTCOMES:
After taking up the course the student will be able to brighten his prospects of
taking up a career on supply chain management.
The student can plan a well defined execution of supply chain strategy in
companies.
The student will be able to design a optimal distribution network as per the
demands of the industry.
The student can also determine the most favorable transportation plan for a
company.
The student will also be able to bring in company from paper environment to
paperless environment.
GEBX12
OBJECTIVES:
To get acquainted with the various statistical tools and approaches for quality
control and continuous improvement.
MODULE I INTRODUCTION
Continuous Process Improvement Juran Trilogy, PDSA Cycle, 5S, Kaizen, Supplier
Partnership Partnering, sourcing, Supplier Selection, Supplier Rating, Relationship
Development, Performance Measures Basic Concepts, Strategy, Performance
Measure.
MODULE IV STATISTICAL PROCESS CONTROL (SPC)
The seven tools of quality, Statistical Fundamentals Measures of central Tendency and
Dispersion, Population and Sample, Normal Curve, Control Charts for variables and
attributes, Process capability, Concept of six sigma, New seven Management tools.
Need for ISO 9000 and Other Quality Systems, ISO 9000:2000 Quality System
Elements, Implementation of Quality System, Documentation, Quality Auditing, TS
16949, ISO 14000 Concept, Requirements and Benefits.
Total Hours: 45
TEXT BOOK:
1. Dale H.Besterfiled, et al., Total Quality Management, Pearson Education,
Inc. 2003.
REFERENCES:
1. James R.Evans & William M.Lidsay, The Management and Control of
Quality, 5th Edition, South-Western (Thomson Learning), 2002.
2. Feigenbaum.A.V., Total Quality Management, McGraw-Hill, 1991.
3. Oakland.J.S., Total Quality Management, Butterworth Hcinemann Ltd.,
Oxford, 1989.
4. Narayana V. and Sreenivasan. N.S., Quality Management Concepts and
Tasks, New Age International, 1996.
5. Zeiri, Total Quality Management for Engineers, Wood Head Publishers,
1991.
OUTCOMES:
The student should be able to
Apply the various statistical tools and approaches for Quality control.
GEBX13
ENERGY STUDIES
LTPC
3003
OBJECTIVES:
To learn the growing demand, supply of energy on global and national levels and
the need for renewable energy promotion.
To understand the basic need for energy conservation and waste heat recovery.
To get acquainted with the global environmental issues and carbon credits.
Power from wind wind turbine working and types, solar thermal power plants
low medium and high power generation, power from wave , tidal, geothermal sources,
OTEC system. MHD power plants working, types, merits and demerits. Energy from
biomass.
MODULE IV COGENERATION, WASTE HEAT RECOVERY AND COMBINED
CYCLE PLANTS
Need for energy conservation use of energy efficient equipments. Energy conservation
opportunities - in educational institutions, residential, transport, municipal, industrial and
commercial sectors concept of green building. Energy audit in industries need,
principle and advantages. Case studies.
MODULE VI GLOBAL ENRGY ISSUES AND CARBON CREDITS
Energy crisis, fossil consumption and its impact on environmental climate change.
Energy treaties Montreal and Kyoto protocols - Transition from carbon rich and nuclear
to carbon free technologies, carbon foot print credits clean development mechanism.
Total Hours: 45
TEXT BOOKS:
1. S.S. Rao and B.B. Parulekar, Energy Technology, 3 rd Edition, Khanna
Publishers, New Delhi, 2011.
2. O. Callaghn. P.W., Design and Management for Energy Conservation,
Pergamon Press, Oxford, 1981.
REFERENCES:
1. G.D. Rai, Non Conventional Energy Sources, Khanna Publishers, New Delhi,
2011.
2. Archie, W Culp. Principles of Energy Conservation, McGraw Hill, 1991.
3. D Patrick and S W Fardo, Energy Management and Conservation, PHI,1990.
4. P. OCallaghan: Energy Management, McGraw - Hill Book Company, 1993.
5. Kenney, W. F., Energy Conservation in Process Industries, Academic Press,
1983.
OUTCOMES:
The student should be able to
Realize the global and national energy status and need to switch over to
renewable energy technology.
Concern about the global environmental issues & promote carbon credits.
GEBX14
ROBOTICS
OBJECTIVE:
MODULE I INTRODUCTION
Controlling the Robot motion Position and velocity sensing devices Design of drive
systems Hydraulic and Pneumatic drives Linear and rotary actuators and control
valves Electro hydraulic servo valves, electric drives Motors Designing of end
effectors Vacuum, magnetic and air operated grippers.
MODULE III ROBOT SENSORS
Transducers and Sensors Tactile sensor Proximity and range sensors Sensing
joint forces Robotic vision system Image Representation - Image Grabbing Image
processing and analysis Edge Enhancement Contrast Stretching Band Rationing Image segmentation Pattern recognition Training of vision system.
MODULE IV ROBOT PROGRAMMING & AI TECHNIQUES
Robotic cell layouts Inter locks Humanoid robots Micro robots Application of
robots in surgery, Manufacturing industries, space and underwater.
MODULE VI ROBOT KINEMATICS AND DYNAMICS
GEBX15
CYBER SECURITY
OBJECTIVES:
Security Programs Non-malicious program Errors Virus and other Malicious Code
Targeted Malicious Code Control against program threats Web Attacks DOS
Online Security Resources.
MODULE III APPLICATION SECURITY
Introduction Internet Frauds Auction Frauds Identity theft Phishing PharmingCyber Stalking Laws about Internet Fraud Protecting against Cyber Crime Secure
Browser settings Industry Espionage.
Introduction ISO 27001 ISO 27002 - PCI DSS Compliance - IT ACT Copyright
ACT, Patents. Definition of Policy Types- User Policies-Administrative Policies
Access control Developmental Policies.
Total Hours: 45
TEXT BOOK:
1. Chuck Easttom, Computer Security Fundamentals, 2nd Edition, Pearson
Education, 2012.
REFERENCES:
1. Charles B. Pfleeger, Shari Lawrence Pfleeger, Security in Computing, 3 rd
Edition, Pearson Education, 2003.
2. William Stallings, Cryptography and Network Security Principles and
Practices, 3rd Edition, Pearson Education, 2003.
3. Atul Kahate, Cryptography and Network Security, Tata McGraw Hill, 2000.
OUTCOMES:
Upon completion of this course, attendees should be able to satisfy the critical need
for ensuring Cyber Security in Organizations.
The students attending this course will be able to analyse the attacks and threats.
They can also provide solutions with Intrusion Detection systems and Softwares.
They will have knowledge about Cyber Frauds and Cyber Laws.
GEBX16
USABILITY ENGINEERING
OBJECTIVES:
The objective of this course is
To learn about human computer interaction with the help of interfaces that has
high usability.
MODULE I INTRODUCTION
Generation of User Interfaces Batch Systems, Line Oriented Interfaces, Full Screen
Interfaces, Graphical User Interfaces, Next Generation Interfaces, Long Term Trends
Usability Engineering Life Cycle Interfaces Data Gathering Data Analysis
Interpretation and Presentation.
MODULE III INTERACTION DESIGN
GEBX17
INDUSTRIAL SAFETY
L T
OBJECTIVE:
Evolution of modern safety concept- Safety policy - Safety Organization - line and staff
functions for safety- Safety Committee- budgeting for safety. safety education and
training.
MODULE II SAFETY IN MANUFACTURING
Safety in metal working-Machine guarding -Safety in welding and gas cutting - Safety in
cold forming and hot working of metals -Safety in finishing, inspection and testing Regulation.
MODULE III SAFETY IN CONSTRUCTION
General safety consideration in material handling devices - Ropes, Chains, Sling, Hoops,
Clamps, Arresting gears Prime movers. Ergonomic consideration in material handling,
design, installation, operation and maintenance of Conveying equipments, hoisting,
traveling and slewing mechanisms. Storage and Retrieval of common goods of shapes
and sizes in a general store of a big industry.