T.Y B.Tech - Open Elective - 2021
T.Y B.Tech - Open Elective - 2021
T.Y B.Tech - Open Elective - 2021
Notes:
1. Course contents, Course Outcome and prerequisite for each Elective Course is attached with
this application form. Before selecting the course, students are advised to see the Course contents,
Course Outcome and Prerequisite of each elective course.
2. Once selected course will not be changed under any circumstances. Therefore students shall
be very careful while selecting the course
4. List of students along with offered elective course will be displayed on www.vjti.ac.in on or
before 7th January 2022
Course Code R4CO3601S Course Title: Network Security
Prerequisite: Computer Network, Operating System
COURSE OUTCOMES:
Students will be able to
1. Demonstrate the concept of cryptography
2. Apply the fundamentals of security in programs, operating systems and databases.
3. Evaluate network security threats and counter measures.
4. Implement and analyze the web security and ESAPI security mechanism.
COURSE CONTENTS:
Module I Mathematical Foundations: Basic Number Theory, Congruences , Chinese Remainder theorem, Modular
exponentiation, Fermat and Euler's theorem , Finite fields, Discrete Logarithms
Module II Symmetric key Ciphers: Modern Block Ciphers - DES, AES, Modes of Operation of Block Ciphers,
Differential Cryptanalysis ,Triple DES , Stream Ciphers ,Pseudorandom Functions
Module III Asymmetric key Cryptography: RSA Cryptosystem, El Gamal Cryptosystem, Elliptic Curve based
Cryptography, Diffie Hellman Key Exchange. Cryptographic Hash Functions: Merkle Damgard Construction,
Applications of Cryptographic Hash Functions, Secure Hash Algorithm, Message Authentication Code-
Message Authentication Requirements and Functions, HMAC, Digital Signature Schemes.
Module IV Program Security: Security, Attacks, the meaning of computer security, Computer Criminals, Methods of
Defense, Network security fundamentals: vulnerability and attacks, defense mechanism, Vulnerability based
intrusion analysis. Secure Software Architecture and Design: Secure Software Lifecycle, Architectural Risk
Analysis, Threat Analysis, Security Principles, Security Guidelines, Attack Patterns. Secure Coding and
Testing: Secure Programs, non-malicious Program errors, virus and other malicious code, Targeted malicious
code, Control against threats
Module V System Security: Protection in General-purpose Operating System: Security and Controls – Protected objects
and Methods of Protection –Memory and address Protection – Control of Access to General Objects – Local
access Control – Case study-Hardening Linux Operating Systems: Workstation Security, Server Security and
Network Security
Module VI Database Security: Databases Security requirements – Reliability and Integrity – Sensitive data – Inference –
Multilevel database – Proposal for multilevel security, RBAC, MAC and DAC using ORACLE database
Module VII Network Security: TCP/IP Stack: TCP/IP Protocol and its Vulnerabilities, Attacks and Defense Mechanism,
Open source tools for defense mechanism. Network Design: Routing attacks and defense mechanism, Network
Security controls – Firewalls – Intrusion prevention Systems, IPS architecture-Intrusion detection engine,
analysis engine, recommendation engine, packet capture and preprocessing engine, How to use network
analysis tool: Wireshark and NMAP.
Module IX OWASP: Web Application Security and the OWASP top 10: Injection, Vulnerability, Cross Site Scripting
(XSS) Vulnerability, Broken Authentication and Session Management, Insecure Direct Object References,
Cross Site Request Forgery (CSRF) Vulnerability, Failure to Restrict URL Access, Invalidated Redirects and
Forwards ESAPI structure: security mechanism to mitigate the top 10 threats of OWASP.
Module X Advances in network security
1. Charles P. Pfleeger, Security in Computing, Prentice Hall India, 5th edition, 2015.
Text Books: 2. Dr. B.B. Meshram, Ms K.A. Shirsath, TCP/IP and Network Security: Attacks and Defence Mechanisms
With Open Source Tools, Shroff Publishers & Distributors PVT. LTD, 1st edition, 2017.
1. Julia H. Allen, Sean Barnum, Robert J. Ellison, Gary McGraw, Nancy Mead. Software Security
Reference Engineering – A guide for project Managers, Pearson Education, 1st edition, 2008.
Books: 2. ISECOM, Hacking Exposed Linux: Linux Security Secret and Solutions, McGraw Hill Education, 3rd
edition, 2008.
Course Code R4IT3601S Course Title: System Administration
Prerequisites: NIL
COURSE OUTCOMES:
Students will be able to
1. Apply GNU/Linux based systems commands
2. Apply the fundamentals of security in programs, operating systems and databases Demonstrate various
Linux distributions File system administration.
3. Identify various issues in Network Administration, Server administration
4. Implement and configure configure a server with security administration policy
COURSE CONTENTS:
Module I Basic System Administration: Partitioning, Installation of multiple operating systems on Desktops,
Various Unix Shells, Bash Shell, Shell Programing; Various operating system services: cron, cpu
usage, system load management, user management, backup, log management, boot loader, process
management, file system namespace; Initialization scripts; Kernel upgrade.
Module II File system Administration: Formatting, Partitioning, Defragmentation, Quotas, Journal, Logical
Volume Management, Disk layouts, File System Check, SAN, NAS; Case Studies: ext2, ext4, NTFS,
Samba, CIFS, NFS, B-tree-fs, LVM, fat32. Parallel file system: configuration and management
Module III Network Administration: LAN setup, DHCP Server, Configuration of network switch, Cluster Setup,
DNS Server, NFS, NIS, Router Setup, Serial Line IP, Point to Point Protocol configuration, Email
Setup, Sendmail, IDA, Network News.
Module IV Devices/server Administration, Backup and Restore: Installing and configuring printers, scanners,
PCI devices, LAN cards, Troubleshooting, Plug and Play devices, Network printer setup, MySQL
server, POSTGRES server, database servers. Backup Elements: User Perspective , Density and Form
Factor, Network Bandwidth, Remote Sites , Backup Methods , Explore Backup Tools : dump, dd,
restore
Module V Security Administration: GNU/Linux security architecture, Access control, PAM, Security Tools –
nmap, SE Linux, Authentication Mechanisms, LDAP, Firewall, Firewall policies, Proxy Servers,
SOCKS Proxy server.
Module VI Advance Technologies: Cluster Administration: setup & configuration, parallel process management
Module VII Advances in the domain
1. Evi Nemeth, Garth Snyder, Ben Whaley, and Trent R. Hein, UNIX and Linux System
Administration Handbook, Publisher: Pearson Education; 4th edition, 2010
Text Books:
2. Wale Soyinka, Linux Administration: A Beginner’s Guide, McGraw-Hill Osborne Media
Publication, 6thEdition, 2012.
1. Richard Petersen, Linux: The Complete Reference, Shroff/o/’Reilly, McGraw-Hill Education; 6th
edition, 2007.
Reference
2. Arnold Robbins, Nelson H. F. Beebe, Classic Shell Scripting, 1st edition, 1999. 3. Richard Blum
Books:
and Christine Bresnahan, Linux Command Line and Shell Scripting Bible, Wiley India Pvt. Ltd.;
2nd edition, 2011.
Course Code R4EE3612S Course Title: ELECTRIC VEHICLES
Prerequisites: Nil
COURSE OUTCOMES:
Students should be able to
1. Distinguish different types of Drive trains used in Electric Vehicle
2. Analyze different types of energy storage devices used in Electric Vehicles
3. Provide the correct sizing of various components in a Drive system
4. Demonstrate energy management strategies required for an electric vehicle
COURSE CONTENTS:
Module I Introduction
Specifications and ratings of any vehicle. Vehicle power source characterization, transmission
characteristics, and mathematical models to describe vehicle performance.
Conventional Hybrid and Electric vehicles
Prerequisites: Nil
Course Outcome:
After learning the course students should be able to:
1. Classify and characterize different types of transducers and sensors.
2. Identify transducers and sensors for measurement of various quantities.
3. Analyze the use of transducers and sensors for various applications in electronics
engineering.
4. Design schematic diagrams and circuits using transducers and sensors for various
applications.
COURSE CONTENTS
Module 1 Introduction
Measurement systems, Basic electronic measuring system, Classification of
transducers, General transducer characteristics, Criteria for transducer and
sensor selection.
Module 2 Resistive, Capacitive and Inductive Transducers
Resistance Potentiometers-Principles of operation, construction, theory,
advantages and disadvantages, applications of Potentiometers
Strain gauges, (metallic and semi-conductor type)
Resistance Thermometer and Thermistors.
Types of Inductive transducer, Principles of operation, construction, Advantages
& disadvantages and applications. Various variable Inductive Transducers,
LVDT (Linear variable differential transformer).
Types of capacitive transducer, Principles of operation, construction,
advantages,disadvantages and applications of capacitive transducers .
Module 3 Elastic and Active Transducer
Principle of operation, construction, theory, advantages and disadvantages and
applications of following transducers:
Thermocouple, Piezo-electric transducer.
Spring bellows, diaphragm, bourdon tube – their special features and application.
Prerequisites: Nil
COURSE OUTCOME
After completion of course, the students should be able to:
1. Summarize the concepts of supervised and unsupervised learning, and different
application areas of ANNs.
2. Design suitable network architecture and use appropriate learning algorithm (supervised
and unsupervised) for a given application.
3. Summarize different learning methods and their application areas, including graphical
and MEM models.
COURSE CONTENTS
Course Outcomes
After completion of this course, students will be able to
1. Identify and use of the attributes to model any phenomenon or situation in the field of Civil
engineering into a set of mathematical equations.
2. Identify the suitable methods and obtain the solution of various types of mathematical equations.
3. Perform curve fitting into a data set and perform extrapolation and interpolation of data from a
given data set.
4. Apply the principles of optimization to get optimal solutions to problems in civil engineering.
COURSE CONTENTS
Module I
Mathematical model
Model, Purpose of modelling, Types of model, Steps in modelling process -
Problem definition, Purpose definition. Errors in engineering calculations
(sources of errors, significant digits, rounding off, propagation of maximum
error, propagation of variance, bias & precision).
Module II
Root finding
Bisection Methods, False position Methods, Newton – Raphson Methods, Secant
Methods
Module III
Interpolation and extrapolation
Langrange’s Interpolation, Newton’s Interpolation - Forward, Backward;
Applications to Civil Engineering like elevation contour map, iso-hyetal map.
Module IV
Numerical differentiation and numerical integration
Newton Raphson method, Modified Newton - Raphson method, Trapezoidal rule,
Simpson’s rules (⅓ rd, ⅜ th), Gauss Quadrative Techniques
Module V
Curve fitting and errors
Least square curve fitting (linear regression) procedures for linear and non-
linear curves.Quantifying errors in curve fitting.
Module VI
Numerical solution of ordinary differential equations
Solution of Initial value problems by Euler’s method, Taylor’s series, Runge –
Kutta Methodof order 2 and 4.
Module VII
Finite difference and finite element method
Basics of Finite Difference Method (numerical solution to partial differential
equations) and Finite Element Method (limited to 1D elements). Basic
understanding of finite element method including elements types and their
formulation.
Module VIII
Optimization
Concept of Optimization, Linear Programming, Application of numerical
method in the different area of Civil Engineering such as Environmental
Engineering, Water Resources Engineering, Structural Engineering.
1. M. K. Jain, SRK Iyengar, R K Jain, Numerical Methods for scientific and
engineering computation, New Age International(P) Ltd., Fourth Edition, 2012.
(ISBN: 9788122433234/ 8122433235).
Text Books:
2. S. S. Rao, Engineering Optimization Theory and practice, New Age
international(P) Ltd. Third edition 2004. (ISBN-9788126540440/8126540443).
Prerequisites: Nil
COURSE CONTENTS
Module I Basics of Optimization Introduction to optimization, Engineering Applications of
Optimization, Statement of Optimization Problem, Design Vector, Design Constraints,
Constraint Surface, Objective Function, objective function surfaces.
Module II Classical Optimization Techniques
Single variable optimization, Multivariable optimization without constraints, Multivariable
Optimization with equality constraints, Multivariable Optimization with
inequality constraints.
Module III Linear Programming: Simplex Method
Introduction, Standard form of a linear programming problem, geometry of
linear programming problems, definitions and theorems, solution of a system of
linear simultaneous equations, pivotal reduction of a general system of equations,
motivation
to the simplex method, simplex algorithm
Module IV Multi-attribute Decision-Making
Introduction, Simple Additive Weighing Method, Weighted Product Method, Analytic
Hierarchy Process, Problems on engineering applications.
Module V Utility Theory Methods of optimization
Introduction, Utility Additive Method, Multi-objective optimization on the basis of Ratio
Analysis, Engineering problems.
Module VI Outranking Methods for optimization
Introduction of outranking comparison, Preference Ranking Organization Method for
Enrichment Evaluations (PROMETHEE), Compromise Ranking Method: Vlse
Kriterijumska
Optimizacija I Kompromisno Resenje(VIKOR) as applications to solve engineering
problems.
1. Singiresu S. Rao, Engineering Optimization: Theory and Practice by John Wiley and
Sons,
4th Edition, 2009.
Text Books:
2. R. Venkata Rao, Decision Making in the Engineering Environment, Using Graph
Theory
and Fuzzy Multiple Attribute Decision Making, Springer, 2010.
Course Code : R4PE3601S Course Title : Project Management
Prerequisites: Nil
Course Outcomes: On the completion of this course, the learner will able to
1. Demonstrate the fundamental principles of project management.
2. Analyse the feasibility of project.
3. Apply the software tools for project implementation.
4. Evaluate the performance of the project.
COURSE CONTENTS
Module I Background of Project Management
Elements of project, project tasks, evolution of project management, the need of project
management, characteristics of projects, characteristics of project management, Projects in
contemporary organizations, phases of projects. Project success criteria, skills of project
managers
Module II Project Selection and Appraisal
Brainstorming and concept evolution, Project selection and evaluation, Selection criteria
and models, Types of appraisals, SWOT analysis, Cash flow analysis, Payback period, and
Net present value. Project risk analysis.
Module III Project Organization and Planning
Project manager, Cross-functional team, Dedicated project organization, Influence project
organization, Matrix organization, Advantages and disadvantages of project organizations,
Selection of project organization, Work Breakdown Structure (WBS), Integration of project
organization and WBS, WBS and responsibility matrix. Project scheduling, project
monitoring.
Module IV Project Scheduling and Resource Management
Gantt chart, Milestone chart, Network techniques: PERT and CPM, AON and AOA
representation, Three time estimates, Using probability distributions for time computation,
Probability of project completion, Time scale version of network, Early start and late start
schedules, Resource allocation, Resource loading and levelling, Constrained resource
scheduling, Multi-project scheduling and resource allocation, Crashing a project.
Procurement in projects.
Module V Project Risk Analysis
Different methods of project risk evaluation and analysis.
Module VI Project Cost and Financing
Controlling of project cost, project financing, financial control of projects, project
termination, conflict resolution and application of ICT in project management.
Module VII Computerized Project Management
Computerized PMIS, Choosing software for project management, using software for project
management. Case studies in project management in specific industries such as Electrical
industry, Electronics industry, IT/ITeS industry, Manufacturing industries, fashion
industries, infrastructure sector, etc.
1John Nicholas, Project Management for Business and technology: Principles and Practice. Pearson
Prentice Hall, New Delhi.
Text Books:
2.Shtub, Bard and Globerson : Project Management: Engineering, Technology, and Implementation,
PHI.
1. A Guide to the Project Management Body of Knowledge (PMBOK Guide) Latest Edition. PMI.
2. Horald Kerzner : Project Management - A Systemic Approach to Planning, Scheduling and
Reference Controlling, CBS Publishers.
Books: 3 .L.S. Srinath: PERT and CPM: Principles and Applications, Affiliated East West Press Ltd.
4. Choudhury: Project Scheduling and Monitoring in Practice.
5. K. Joy: Total Project Management: The Indian Context, Macmillan India Ltd.
Course Code : R4TT3601S Course Title : Polymer & Fibres for Engineering Applications
Course Outcomes: On the completion of this course, the learner will able to
1. Describe the basic concept of polymer and its products.
2. Explain the major fibres, plastics and rubbers used for engineering applications.
3. Outline the methods for the production of fibres, rubbers and plastics.
4. Discuss the various testing and evaluation methods for fibres and polymers.
5. Demonstrate the various applications of fibres and polymers.
COURSE CONTENTS
Module I Introduction to polymers and textile fibres:
Definition and classification. Molecular size and interaction, Molecular orientation and
crystallinity in fibres, Polymers as fibres, plastics and rubbers. Properties and Structure of
fibres, plastics and rubbers. Melting and Glass Transition Temperatures of Polymers. Fibre
forming processes. Importance of polymer in the field of Medical, Military, Agriculture,
Composites, etc.
Module II Manufacturing techniques overview:
Spinning of Manmade fibres via melt spinning and solution spinning. Manufacturing of
plastics by injection molding and other techniques. Rubberprocessing via calendering.
Module III Fibre properties and applications:
Natural fibres like Cotton,Wool, Jute, Etc. Regenerated fibres like Viscose. Man-made
fibres like PET, PP, PA, PAN, Glass, Carbon, etc..
Module IV Polymers properties and applications:
Polyethylene, LDPE, HDPE, LLDPE, UHMWPE,
Poly(Vinyl Chloride), Poly(Vinylidene Chloride), Polytetrafluoroethylene, Polyisobutylene,
Polystyrene, Acrylonitrile, butadiene styrene, etc.
Module V Elastomer properties and applications:
Natural rubber, Styrene–Butadiene Rubber, Nitrile Rubber, Ethylene–Propylene–Elastomer,
Butyl Rubber, Thermoplastic Elastomers, Polybutadiene (Butadiene Rubber),etc.
Module VI Testing of fibres, plastics and rubbers: Identification of material, Tensile testing, Impact
testing, Flexural testing, water absorption, Flame resistance, etc.
1. Industrial Polymers, Specialty Polymers, and Their Applications, Manas Chanda Salil K.
Roy, CRC press 2009.
Text Books: 2. Manufactured Fibre Technology, V.B. Gupta and V.K. Kothari, Springer Science +
Business Media, 2003.
3. Plastics End Use Applications, Donald V. Rosato, springer, 2011.
Reference 1 High-performance Fibres, Edited by J W S Hearle, 2001, WPI.
Books: