PE - II Subject Options With Syllabus

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 9

Introduction To Internet Of Things

By Prof. Sudip Misra   |   IIT Kharagpur

Summary
Course Status : Upcoming
Course Type : Elective
Duration : 12 weeks
Start Date : 24 Jan 2022
End Date : 15 Apr 2022
Exam Date : 23 Apr 2022 IST
Enrollment Ends : 31 Jan 2022

Course layout
Week 1: Introduction to IoT: Part I, Part II, Sensing, Actuation, Basics of Networking: Part-I
Week 2: Basics of Networking: Part-II, Part III, Part IV, Communication Protocols: Part I, Part II
Week 3: Communication Protocols: Part III, Part IV, Part V, Sensor Networks: Part I, Part II
Week 4: Sensor Networks: Part III, Part IV, Part V, Part VI, Machine-to-Machine Communications
Week 5: Interoperability in IoT, Introduction to Arduino Programming: Part I, Part II, Integration of
Sensors and Actuators with Arduino: Part I, Part II
Week 6: Introduction to Python programming, Introduction to Raspberry Pi, Implementation of IoT
with Raspberry Pi
Week 7: Implementation of IoT with Raspberry Pi (contd), Introduction to SDN, SDN for IoT
Week 8: SDN for IoT (contd), Data Handling and Analytics, Cloud Computing
Week 9: Cloud Computing(contd), Sensor-Cloud
Week 10: Fog Computing, Smart Cities and Smart Homes
Week 11: Connected Vehicles, Smart Grid, Industrial IoT
Week 12: Industrial IoT (contd), Case Study: Agriculture, Healthcare, Activity Monitoring

Books and references


1)  S. Misra, A. Mukherjee, and A. Roy, 2020. Introduction to IoT. Cambridge University Press.
Availability: https://www.amazon.in/Introduction-IoT-Sudip-Misra/dp/1108959741/ref=sr_1_1?
dchild=1&keywords=sudip+misra&qid=1627359928&sr=8-1
2) S. Misra, C. Roy, and A. Mukherjee, 2020. Introduction to Industrial Internet of Things and Industry
4.0. CRC Press.
Availability: https://www.amazon.in/dp/1032146753/ref=sr_1_3?
dchild=1&keywords=sudip+misra&qid=1627359971&sr=8-3
3) Research Papers

Link:

https://onlinecourses.nptel.ac.in/noc22_cs53/preview
Blockchain and its Applications
By Prof. Sandip Chakraborty, Prof. Shamik Sural   |   IIT Kharagpur

Summary
Course Status : Upcoming
Course Type : Elective
Duration : 12 weeks
Start Date : 24 Jan 2022
End Date : 15 Apr 2022
Exam Date : 23 Apr 2022 IST
Enrollment Ends : 31 Jan 2022

 Computer Science and Engineering


Category :
Credit Points : 3
Level : Undergraduate/Postgraduate

Course layout
Week 1: Introduction to Blockchain Technology and its Importance
Week 2: Basic Crypto Primitives I – Cryptographic Hash
Week 3: Basic Crypto Primitives II – Digital Signature
Week 4: Evolution of the Blockchain Technology
Week 5: Elements of a Blockchain
Week 6: Blockchain Consensus I – Permissionless Models
Week 7: Blockchain Consensus II – Permissioned Models
Week 8: Smart Contract Hands On I – Ethereum Smart Contracts (Permissionless Model)
Week 9: Smart Contract Hand On II – Hyperledger Fabric (Permissioned Model)
Week 10: Decentralized Identity Management
Week 11: Blockchain Interoperability
Week 12: Blockchain Applications

Books and references


1. Mastering Blockchain: A deep dive into distributed ledgers, consensus protocols, smart contracts,
DApps, cryptocurrencies, Ethereum, and more, 3rd Edition, Imran Bashir, Packt Publishing, 2020,
ISBN: 9781839213199, book website: https://www.packtpub.com/product/mastering-blockchain-
third-edition/9781839213199 
2. Hyperledger Tutorials - https://www.hyperledger.org/use/tutorials
3. Ethereum Development Resources - https://ethereum.org/en/developers

Link:

https://onlinecourses.nptel.ac.in/noc22_cs44/preview
Embedded Systems Design
By Prof. Anupam Basu   |   IIT Kharagpur

Summary
Course Status : Upcoming
Course Type : Core
Duration : 12 weeks
Start Date : 24 Jan 2022
End Date : 15 Apr 2022
Exam Date : 24 Apr 2022 IST
Enrollment Ends : 31 Jan 2022
 Computer Science and Engineering
Category :
Credit Points : 3
Level : Undergraduate

Course layout

Week 1: Introduction to Embedded System, ASICs and ASIPs


Week 2: Designing Single Purpose Processors and Optimization
Week 3: Introduction to FPGAs and Synthesis
Week 4: Verilog Hardware Description Language (Verilog HDL)
Week 5: Microcontrollers and Power Aware Embedded System Design
Week 6: Real Time Operating System
Week 7: Real Time Scheduling Algorithms
Week 8: Modelling and Specification
Week 9: Design Synthesis
Week 10: Digital Camera Design and Hardware Software Partitioning
Week 11: Design Optimization
Week 12: Simulation and Verification

Link:

https://onlinecourses.nptel.ac.in/noc22_cs46/preview
An Introduction to Programming Through C++
By Prof. Abhiram G. Ranade   |   IIT Bombay

Summary

Course Status : Upcoming


Course Type : Core
Duration : 12 weeks
Start Date : 24 Jan 2022
End Date : 15 Apr 2022
Exam Date : 24 Apr 2022 IST
Enrollment Ends : 31 Jan 2022
 Computer Science and Engineering
Category :  Programming

Credit Points : 3
Level : Undergraduate

Course layout
Week 1:Introduction to computers using graphics. Notions of program organization, control flow.
Introduction to a repeat  macro statement and its use for drawing interesting pictures.Basics of
computer hardware and how numbers and  other information are represented and processed on
computers.
Week 2:Basic data types. Variables. Assignment statement. Introduction to program design using
examples such as summing  infinite series. Introduction to coordinate based graphics and
elementary animation. The repeat macro is used for looping.
Week 3-4: Statements of C++ for conditional execution and looping. Applications such as
computing mathematical functions, root finding.
Week 5:Functions. Parameter passing. Pointers and references. Recursion basics.
Week 6:Recursive algorithms and recursive drawings. Breaking larger programs into functions.
Passing functions as arguments to  other functions.
Week 7:Arrays. Basic array processing strategies including passing arrays to functions. Pointers.
Applications illustrating use of  arrays to store sets and sequences. Iterating over pairs of objects
from an array. Selection sort.
Week 8:Use of arrays to represent textual data. Multidimensional arrays. Command line arguments.
Binary search. Mergesort.
Week 9:Structures. Pointers with structures. Structure examples. Basics of classes: member
functions, constructors, operator  overloading and access control.
Week 10:Dynamic memory allocation. Basic mechanisms and pitfalls. Design of a "String" class
that has automated memory management.  Copy constructors and destructors. Introduction to the
standard library.
Week 11-12: Use of the standard library in designing programs. Design of medium size programs.
A miniature program for marks and  ranks display. A program for gravitational simulation. A
program for designing and solving resistive circuits with a graphical user interface.

Books and references


Text Book: Abhiram G. Ranade. 2018. An Introduction to Programming through C++ (1st ed.).
McGraw Hill Education (India) Private Limited.
Online Privacy
By Prof. Ponnurangam Kumaraguru | IIIT Hyderabad

Summary

Course Status : Upcoming


Course Type : Elective
Duration : 12 weeks
Start Date : 24 Jan 2022
End Date : 15 Apr 2022
Exam Date : 23 Apr 2022 IST
Enrollment Ends : 31 Jan 2022
Computer Science and Engineering
Category :
Credit Points : 3
Level : Undergraduate/Postgraduate

With increase in the usage of the Internet, there has been an exponential increase in the use of
online platforms, including social media (Facebook, Twitter, Koo, Tinder), e-commerce (Amazon,
Flipkart), gaming (Roblox), video streaming (Netflix, Amazon Prime, Twitch), and messaging
(WhatsApp, Signal, Telegram) services. These platforms have changed our way of living, and
information that we share with or consume from these platforms. However, widely used, there is a
lack of understanding of privacy on these online platforms. Popularity of study of Online privacy as
a topic of study is very recent. Online Privacy needs to be investigated, studied and characterized
from various perspectives (computational, cultural, psychological, theoretical, etc.). It is critical to
understand the threats and defend privacy through real-time and scalable systems. Since there are
no logical boundaries for the online space, it is important to study the problem from an international
perspective too.

PRE-REQUISITE :Any student from 5th semester UG B.Tech. should be able to understand the
content of the course.

INDUSTRY SUPPORT :TCS, Wipro, Microsoft to name a few, any company involved in online
business will be interested

INTENDED AUDIENCE :Anybody interested in the area of Privacy, including industry


professionals and students

Course layout
Week 1:Introduction; Various Privacy breaches, and its effects; Why Online privacy has become an
important topic?; Privacy cases / litigations, and outcomes
Week 2:Definition & forms of Privacy; Difference between data security & data privacy; Trade-off
between privacy and freedom of speech; Trade-off between privacy and utility; Contextual integrity
theory and applications
Week 3:Privacy Attitudes & Awareness
Week 4:Social Media Privacy
Week 5:Social Media Privacy
Week 6:Data anonymity:K-anonymity, L-diversity, T-closeness, Differential privacy
Week 7:Image & Location privacy; Ethics about studying online privacy:Institutional Review
Board / Ethics Committee; Conducting {User, Lab, and Online} Studies; Privacy from 3rd party
trackers & advertisers
Week 8:Image & Location privacy; Ethics about studying online privacy:Institutional Review
Board / Ethics Committee; Conducting {User, Lab, and Online} Studies; Privacy from 3rd party
trackers & advertisers
Week 9:User behaviour & Usable privacy; Privacy in National projects like Aadhaar, NATGRID;
Differential privacy in US census, Apple; PDP Bill / Srikrishna commission report /
GDPR:Implications
Week 10:User behaviour & Usable privacy; Privacy in National projects like Aadhaar, NATGRID;
Differential privacy in US census, Apple; PDP Bill / Srikrishna commission report /
GDPR:Implications
Week 11:Privacy policies:Length, readability, legality, cost of reading privacy polcies; Nutrition
labels of Privacy policies:How to make the policies simple and user friendly
Week 12:Privacy policies:Length, readability, legality, cost of reading privacy polcies; Nutrition
labels of Privacy policies:How to make the policies simple and user friendly

Books and references


All necessary materials will be shared with students on slides, online materials

Link:

https://onlinecourses.nptel.ac.in/noc22_cs37/preview

Ethical Hacking
By Prof. Indranil Sen Gupta   |   IIT Kharagpur
Summary
Course Status : Upcoming
Course Type : Elective
Duration : 12 weeks
Start Date : 24 Jan 2022
End Date : 15 Apr 2022
Exam Date : 23 Apr 2022 IST
Enrollment Ends : 31 Jan 2022
Computer Science and Engineering
Category :
Credit Points : 3
Level : Undergraduate/Postgraduate

Course layout
Week 1:   Introduction to ethical hacking. Fundamentals of computer networking. TCP/IP protocol
stack.
Week 2:   IP addressing and routing. TCP and UDP. IP subnets.
Week 3:   Routing protocols. IP version 6.
Week 4:   Demonstration Session:: Vulnerability assessment: OpenVAS, Nessus, etc.
                System hacking: password cracking, penetration testing, etc.
Week 5:   Demonstration Session: Social engineering attacks.
                Malware threats, penetration testing by creating backdoors.
Week 6:   Introduction to cryptography, private-key encryption, public-key encryption.
Week 7:   Cryptographic hash functions, digital signature and certificate, applications.
Week 8:   Steganography, biometric authentication, network-based attacks, DNS and Email
security.
Week 9:   Demonstration Session:: Sniffing: Wireshark, ARP poisoning, DNS poisoning.
                Hacking wireless networks, Denial of service attacks.
Week 10: Elements of hardware security: side-channel attacks, physical inclinable functions,
hardware trojans.
Week 11: Demonstration Session:: Hacking web applications: vulnerability assessment, SQL
injection, cross-site scripting.
Week 12: Case studies: various attacks scenarios and their remedies.

Books and references


1. Data and Computer Communications -- W. Stallings.
2. Data Communication and Networking -- B. A. Forouzan
3. TCP/IP Protocol Suite -- B. A. Forouzan
4. UNIX Network Programming -- W. R. Stallings
5. Introduction to Computer Networks and Cybersecurity -- C-H. Wu and J. D. Irwin
6. Cryptography and Network Security: Principles and Practice -- W. Stallings
7. ** Various web resources **

Link:
https://onlinecourses.nptel.ac.in/noc22_cs13/preview

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy