0% found this document useful (0 votes)
180 views17 pages

ISE - 7th Sem Syllabus

The document provides information on the 7th semester courses for B.E. in Information Science and Engineering at SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU. It includes details of 8 courses along with their course codes, teaching department, credits, and evaluation scheme. The courses cover topics like Cryptography and Network Security, Software Testing, Professional Electives, laboratories, seminar and project work. Syllabus and course objectives for two courses - Cryptography and Network Security and Software Testing are also outlined.

Uploaded by

Praveen TP
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
180 views17 pages

ISE - 7th Sem Syllabus

The document provides information on the 7th semester courses for B.E. in Information Science and Engineering at SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU. It includes details of 8 courses along with their course codes, teaching department, credits, and evaluation scheme. The courses cover topics like Cryptography and Network Security, Software Testing, Professional Electives, laboratories, seminar and project work. Syllabus and course objectives for two courses - Cryptography and Network Security and Software Testing are also outlined.

Uploaded by

Praveen TP
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

B.E. DEGREE COURSE


Academic Year 2021-22
CHOICE BASED CREDIT SYSTEM (CBCS)
SCHEME OF TEACHING AND EXAMINATION FOR B.E. DEGREE COURSE

VII Semester B.E. Information Science and Engineering Examination


(Subjects and Syllabus as per AICTE-Model Curriculum for UG Course in Engg. & Tech.- Jan.
2018)
SI Course and Course Course Title Teaching Board L P C Duration CIE SEE Total
No. Code Dept. of in Hrs. Marks
Exam.
01 PC 18IS701 Cryptography and Network ISE ISE 3 - 3 3 50 50 100
Security
02 PC 18IS702 Software Testing ISE ISE 3 - 3 3 50 50 100
03 PE 18IS7PE3x Professional Elective-III ISE ISE 3 - 3 3 50 50 100
04 PE 18IS7PE4x Professional Elective-IV ISE ISE 3 - 3 3 50 50 100
05 PC 18IS705 Cryptography and Network ISE ISE - 2 1 3 50 50 100
Security Laboratory
06 PC 18IS706 Software Engineering and ISE ISE - 2 1 3 50 50 100
Testing Laboratory
07 PC 18IS7TS01 Technical Seminar ISE ISE - - 1 - 50 - 50
08 PC 18IS7PW01 Project Work Phase – I ISE ISE - 4 2 - 50 - 50
Total 12 08 17 18 400 300 700

Professional Elective-III: Professional Elective-IV:


18IS7PE31: File Structures 18IS7PE41: Information Storage and Management
18IS7PE32: Mobile Application Development 18IS7PE42: Soft and Evolutionary Computing
18IS7PE33: Digital Image Processing 18IS7PE43: Block Chain Technologies
18IS7PE34: Software Architecture and Design 18IS7PE44: Artificial Neural Networks
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

Syllabus for the Academic Year – 2021 - 2022

Department: Information Science and Engineering Semester: 7

Subject Name: Cryptography and Network Security

Subject Code: 18IS701 L-P-C: 3-0-3

Course Objectives:

Sl. No. Description


1 Understand security mechanism with encryption and decryption ciphers.
2 Illustrate various security algorithms.
3 To understand key management and internet security techniques.
4 Able to learn internet law and cyber-crimes.

UNIT Description Hours


Introduction, Symmetric Ciphers:
Introduction: The OSI Security Architecture, Security Attacks, Security
Services, Security Mechanisms, A Model for Network Security . Classical
Encryption Techniques: Symmetric Cipher Model, Substitution Techniques, 08
I
Transposition Techniques, Steganography. Block Cipher and the Data
Encryption Standard: Block Cipher principles, The Data Encryption Standard,
The Strength of DES, Electronic Code Book, Cipher Block Chaining Mode,
Cipher Feedback Mode, Output Feedback Mode, Counter Mode.
Number Theory and Public Key Cryptosystem:
Number Theory: Prime Numbers, Format's and Euler's Theorems, Testing for
Primality. Public-Key Cryptography and RSA: Principles of Public- Key
Cryptosystems, The RSA Algorithm. Diffie-Hellman Key Exchange. 08
II
Cryptographic Data Integrity Algorithms: Cryptographic Hash Functions,
Applications of Cryptographic hash functions, Two simple hash Functions,
Secure Hash Algorithm.
Digital Signatures: Digital Signatures, Digital Signature Standard.
Key Management, Transport-Level Security:
Key Management and Distribution: Symmetric Key distribution using
symmetric encryption, Symmetric Key distribution using Asymmetric 08
III encryption, Distribution of public keys, X.509 Certificates, Kerberos. Transport
level security: Web Security considerations, Secure Sockets Layer and
Transport Layer Security.
Internet Security, System Security:
Electronic Mail Security: Pretty Good Privacy. IP Security: Overview, IP
IV Security Policy. Intruders: Intruders, Intrusion detection. Malicious Software:
Types of Malicious Software Viruses. Firewalls: The need for Firewalls, Firewall 08
Characteristics, Types of Firewalls, Electronic Money.
Internet Law and Cyber Crimes:
Internet and Need for Cyber Law, Modes of Regulation of internet, Types of
Cyber Terror Capability, Net Neutrality, Types of Cyber Crimes, India and the
V Cyber Law, Cyber Crimes and „The Information Technology Act‟, 2000, Internet 08
Censorship, Cyber Crimes and Enforcement Agencies. Cryptographic
algorithms: AES algorithm, Elliptic curve cryptography.
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

Text Books:

Sl. No. Title Author(s) Edition, Publisher, Year, ISBN


Seventh Edition, Prentice Hall
Cryptography and Network
1 William Stallings of India, 2016.
Security
Cryptography, Network Bernard Menezes
2 Cengage Learning, 2018
Security and Cyber Laws
Tata McGrawHill, 4th Edition
Cryptography and Network AtulKahate
3 2019
Security

Reference Books:

Sl. No. Title Author(s) Edition, Publisher, Year, ISBN


Network Security: Private Charlie Kaufman,
Second Edition,
1 Communication in a Public Radia Perlman, Mike
Pearson, Education Asia.
World Speciner
Cyber Security and Cyber Alfred Basta, Nadine
Cengage Learning
2 Laws Basta, Mary Brown,
Ravindrakumar

Course Outcomes:

Sl. No. Description


1 Able to understand various encryption and decryption ciphers.
2 Able to illustrate public key cryptography algorithms.
3 Able to handle key management and internet security techniques.
4 Understand and adopt Indian cyber act to mitigate cyber-crimes.
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

Syllabus for the Academic Year – 2021 - 2022

Department: Information Science and Engineering Semester: 7

Subject Name: Software Testing

Subject Code: 18IS702 L-P-C: 3-0-3

Course Objectives:

Sl. No.
Description

1 Describe strategies for generating system test cases.


Investigate the reason for bugs and analyze the principles in software testing to
2 prevent and remove bugs.
3 Learn to apply software testing techniques in commercial environment.

UNIT Description Hours

A Perspective on Testing and Examples:


A Perspective on Testing: Basic definitions, Test cases, Insights from a
Venn diagram, Identifying test cases, Error and fault taxonomies, Levels of
I testing.(1.1 to 1.6) Examples: Generalized pseudocode, The triangle problem,
08
The NextDate function, The commission problem, The SATM (Simple
Automatic Teller Machine) problem, The currency converter, Saturn
windshield wiper (2.1 to 2.7). (Book 1)
Boundary Value Testing: Boundary value analysis, Robustness testing,
Worst-case testing, Special value testing, Examples, Random testing (5.1 to
5.6) Equivalence Class Testing: Equivalence test cases for the triangle 08
II problem, NextDate function, and the commission problem, Guidelines and
observations (6.4 to 6.8). Decision Table-Based Testing : Decision tables,
Test cases for the triangle problem, Next Date function, and the commission
problem, Guidelines and observations. (Book 1)

Data Flow Testing: Definition-Use testing, Slice-based testing, Agile


III Testing. Integration Testing: Decomposition-Based Integration, Call 08
Graph–Based Integration, Path-Based Integration, Example:
integrationNextDate (13.1 to 13.4) (Book 1)
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

System Testing: Threads, Basis Concepts for Requirements Specification,


Model-Based Threads, Use Case–Based Threads, Long versus Short Use
Cases (14.1 to 14.5). (Book 1) Test and Analysis Activities within a
IV
Software Process: The quality process, Planning and monitoring, Quality 08
goals, Dependability properties, Analysis, Testing, Improving the process,
Organizational factors (4.1 to 4.8). (Book 2)

Test Execution: Overview, From test case specifications to test cases,


Scaffolding, Generic versus specific scaffolding, Test oracles, Self-checks as
oracles, Capture and replay (17.1 to 17.7). (Book 2)
V System, Acceptance and Regression Testing: Overview, System Testing, 08
Acceptance Testing, Usability, Regression Testing, , Regression Test
selection techniques, Test Case Prioritization and Selective Execution
(22.1to 22.7) (Book 2)

Text Books:

Sl.
Title Author(s) Edition, Publisher, Year, ISBN
No.

Software Testing, A 4th Edition, Auerbach


1 Paul C. Jorgensen Publications, 2014.
Craftsman‟s Approach
ISBN: 978-1- 4665-6068-0
Software Testing and Wiley India, 2008.
Mauro Pezze, Michal
2 Analysis – Process,
Young ISBN:978-81-265-1773-2
Principles and Techniques

Reference Books:

Edition, Publisher, Year,


Sl. No. Title Author(s)
ISBN

Foundations of Software
1 Aditya P Mathur Pearson Education, 2013.
Testing

Srinivasan Desikan,
Software testing Principles 2nd Edition, Pearson
2 Gopalaswamy
and Practices Education, 2007
Ramesh
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

Course Outcomes:

Sl. No. Description

1 Clear understanding and knowledge of the foundations, techniques in the area


of software testing and its practice in the industry.
2 Compare and pick out the right type of software testing process for any given
real world problem.
3 Able to plan a test project, design test cases, conduct testing operations,
manage software problems and defects.
4 Implement various test processes for quality improvement.
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

Syllabus for the Academic Year – 2021 - 2022

Department: Information Science and Engineering Semester: 7

Subject Name: Mobile Application Development

Subject Code: 18IS7PE32 L-P-C: 3-0-3

Course Objectives:

Sl. No. Description

Learn the basic environment of an Android app.


1

Illustrate the user interface and app functionality.


2

Interpret the techniques of app data access and persistence.


3

Appraise the testing and publishing of an app.


4

UNIT Description Hours


Mobility and Android:
Introduction, Mobility Panorama, Mobile Platforms, App Development
Approaches, Android Overview.
Getting Started with Android:
I Introduction, Setting up Development Environment, Saying Hello to Android, 08
Traversing an Android App Project Structure, Logical Components of an
Android App, Android Tool Repository, Installing and Running App Devices.
Learning with an Application – 3CheersCable:Introduction, 3CheersCable
App, Mobile App Development Challenges, Tenets of a Winning App.
App User Interface:
Introduction, Activity, UI Resources, UI Elements and Events, Interaction
among Activities, Fragments, Action Bar.
II App Functionality - Beyond UI: 08
Introduction, Threads, AsyncTask, Service, Notifications, Intents and Intent
Resolution, Broadcast Receivers, Telephony and SMS.
App Data - Persistence and Access:
Introduction, Flat Files, Shared Preferences, Relational Data, Data Sharing
III
Across Apps, Enterprise Data.
08
Graphics and Animation:
Introduction, Android Graphics, Android Animation.
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

Multimedia:
Introduction, Audio, Video and Images, Playback 185, Capture and Storage.
IV 08
Location Services and Maps:
Introduction, Google Play Services, Location Services, Maps.

Sensors:
Introduction, Sensors in Android, Android Sensor Framework, Motion
Sensors, Position Sensors, Environment Sensors.
Testing Android Apps:
08
V Introduction, Testing Android App Components, App Testing Landscape
Overview.
Publishing Apps:
Introduction, Groundwork, Configuring, Packaging, Distributing.

Text Book:

Volume and Year of


Sl. No. Title Author
Edition
Composing Mobile Apps: Anubhav Pradhan, Wiley, First Edition-
1 Learn | Anil V. Deshpande 2014
Explore | Apply using Android

Reference Books:

Sl. No. Title Author Volume and Year of


Edition
Android Application 2 Edition: 1, 2015
nd

Development All Barry Burd


1
in one for Dummies
Teach Yourself Android 1st Edition,
Application Lauren Darcey Publication SAMS
2
Development in 24Hours

Course Outcomes:

Sl. No. Description

Able to understand various approaches and technologies for app


1
development.
Capable of understanding, designing app user interface and implementing
2
app functionality.
Able to develop location services using device sensors while building android
3
apps.

4 Capable of validating, packaging and moving apps to market.


SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

Syllabus for the Academic Year – 2021-2022

Department: Information Science and Engineering Semester: 7

Subject Name: Information Storage and Management

Subject Code: 18IS7PE41 L-P-C: 3-0-3

Course Objectives:

Sl. No. Description


Learn about the various storage infrastructure components in data center
1
environments
Familiarize in making decisions on storage-related
2
Technologies in an increasingly complex IT environment.
Understand the storage technologies, architectures, features, and
3
benefits of intelligent storage systems
Exposed to block-based, file-based, object-based, unified storage and
4
software-defined storage.

UNIT Description Hours


Introduction to Information Storage, Data center Environment:
Information Storage, Evolution of Storage Architecture Data
I Center Infrastructure, Virtualization and Cloud computing (1.1 to 08
1.4), Application, Database Management systems, Host, Connectivity (2.1
to 2.4).
Data Protection: RAID, Intelligent Storage System:\RAID
implementation methods, RAID array components, RAID Techniques,
II RAID, Levels, RAID impact on Disk Performance, RAID comparison, Hot 08
spares(3.1 to 3.7), Components of an Intelligent Storage System, Storage
Provisioning, Types of Intelligent Storage Systems(4.1 to 4.3).

Fibre Channel Storage Area Networks: Fibre Channel overview, The


SAN and its evolution, Components of SAN, FC connectivity, Switched
III Fabric Ports, Fibre Channel Architecture, Fabric Services, Switched 08
Fabric Login Types, Zoning, FC SAN Topologies, Virtualization and
SAN(5.1 to 5.11).

IP SAN, FCoE and NAS: Network Attached StorageiSCSI(internet Small


Computer System Interface), FCIP(Fibre Channel over Internet Protocol),
FCoE(Fibre Channel over Ethernet)(6.1 to 6.3), General purpose servers
IV versus NAS devices, Benefits of NAS, File Systems and Network File 08
Sharing, Components of NAS, NAS I/O Operation, NAS Implementations,
NAS File Sharing Protocols, Factors Affecting NAS Performance, File Level
Virtualization(7.1 to 7.9).
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

Introduction to Business Continuity and Backup and archive:


Information Availability, BC Terminology, BC Planning Life Cycle, failure
Analysis, Business Impact Analysis, BC Technology Solutions (9.1 to
V 9.6), backup Purpose, backup Considerations, backup Granularity, 08
recovery Considerations, Backup Methods, Backup Architecture, Backup
and Restore Operations, Backup Topologies, Backup in NAS
Environments.(10.1 to 10.9)

Text Book:

Volume and Year of


Sl. No. Title Author
Edition
EMC Education
1 Information Storage and G.Somasundaram, Services, Wiley-
Management Alok Shrivastava India, Second
Edition.2012

Reference Books:

Sl. No. Volume and Year of


Title Author
Edition
Storage Networks Explained Ulf Troppens, Rainer Wiley India, 2009.
1 Erkes and Wolfgang
Muller
Storage Networks, The Rebert Spalding Tata McGraw Hill,
2 Complete Reference. 2008.
Storage Area Networks Richard Barker and Wiley India, 2002
3 Essentials A Paul Massiglia
Complete Guide to
Understanding and
Implementing SANs

Course Outcomes:

Sl. No. Description

Understand Storage Area Networks characteristics and Architectures.


1
Explain Storage Network Technologies and Virtualization.
2
Analyze the Securing and Managing of Storage Infrastructure.
3
Configure and Simulate Storage Area Network Technologies.
4
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

Syllabus for the Academic Year – 2021 - 2022

Department: Information Science and Engineering Semester: 7

Subject Name: Cryptography and Network Security Laboratory

Subject Code: 18IS705 L-P-C: 0-2-1

Course Objectives:

Sl. No. Description


1 Learn to implement substitution and transposition techniques.
Exposed to practical aspects of symmetric and asymmetric cryptographic
2
algorithms to encrypt and decrypt data.
3 Learn to implement hash function concepts.
4 Gain knowledge on intrusion prevention and packet sniffer analysis tools.

UNIT Description Hours


PART A
1. Program to illustrate Caesar Cipher
2. Program to illustrate Playfair Cipher
3. Program to illustrate Hill Cipher
4. Program to illustrate Vigenere Cipher
5. Implement the following TRANSPOSITION TECHNIQUES concepts:
I Rail fence – row & Column Transformation
6. Implement the DES algorithm.
7. Implement the SHA-1 algorithm.
8. Implement MD5 algorithm.
9. Implement the Signature Scheme - Digital Signature Standard.
10. Implement Fermat‟s Theorem, Eulerstotient function to check
primality of a given number
PART B
1. Write program to implement AES algorithm.
2. Write program to implement Elliptic Curve Cryptography.
3. Creation of digital signature secures data storage, secure data
II
transmission using GNUPG.
4. Configure and demonstrate use of Traffic monitoring tool such as
Wireshark.

Pattern for practical exam conduction:

a. Experiment Distribution:
 For laboratories having only one part: Students are allowed to pick one experiment from
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

the lot with equal opportunity.


 For laboratories having PART A and PART B: Students are allowed to pick one
experiment from PART A and one experiment from PART B, with equal opportunity.
b. Change of experiment is allowed only once and 20% of the maximum marks to be
deducted.

Course Outcomes:

Sl. No. Description


1 Able to implement cryptographic cipher techniques.
2 Develop various security algorithms.
3 Able to apply hash algorithms to generate hash code for better security.
4 Use different open source tools for network security and analysis.
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

Syllabus for the Academic Year – 2021 - 2022

Department: Information Science and Engineering Semester: 7

Subject Name: Software Engineering and Testing Laboratory

Subject Code: 18IS706 L-P-C: 0-2-1

Course Objectives:

Sl. No. Description


Understand the software engineering methodologies involved in the phases for
1
project development.
Provide an understanding of the knowledge of the techniques for modeling end-
2
user requirements using UML modeling techniques.
Plan a test project, design test cases, conduct testing operations, manage
3
software problems and defects, and generate a testing report.
Follow the process related activity and testing techniques to work as a team
4
member.
UNIT Description Hours
PART - A
1. Write the software requirement specification document for a given
problem.
A. Library management system
B. Bank loan system
C. Automatic teller machine
2. Design a context diagram and a level-1 diagram for a transaction that
we are likely to encounter for Hotel room Reservation and list relevant
data flows, data stores, processes.
3. Design a UML activity diagram describing behaviour of the Purchase
Ticket use case for a Ticket vending machine.
4. Using the example of a retail clothing store in a mall, list relevant data
flows, data stores, processes, and sources/sinks. Observe several sales
transactions. Draw a context diagram and a level-1 diagram that
represent the selling system at the store.
5. Design a Use Case Diagram for Vehicle Sales Systems by identifying
various actors and use cases and show the associations that connect
between actors and use cases.
PART - B
1. Triangle problem defined as follows: Accept three integers which
are supposed to be the three sides of a triangle and determine if the
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

three values represent an equilateral triangle, isosceles triangle,


scalene triangle, or they do not form a triangle at all. Assume that
the upper limit for the size of any side is 20.
2. Grading System (grades : Distinction, First Class, Second Class,
Third Class, Fail, Absent) based on marks
3. NextDate program –Input date + 1 ie given the date as input, add 1
to the input to get output date.
4. Commission problem : To compute commission for the given sales
amount.Test data : price Rs for lock - 45.0 , stock - 30.0 and barrel
- 25.0. sales = total lock * lock price + total stock * stock price +
total barrel * barrel price commission : 10% for the sales of up to
Rs. 1000 , 15 % from Rs. 1001 to Rs. 1800 and 20 % for any sale
excess of Rs. 1800 Pre-condition : lock = -1 to exit and 1< =lock < =
70 , 1<=stock <=80 and 1<=barrel<=90.
5. Yesterdate function which performs Input date - 1 ie given the date
as input, subtract 1 from the input to get output date.
a. Write a C/C++/Java Program.
b. Write a set of test cases to test the program applying Boundary-Value
Analysis , Equivalence Class Partitioning methods and Decision-Table
method.
c. Generate test report

Course Outcomes:

Sl. No. Description


Ability to translate end-user requirementsinto system and software
1
requirements.
Ability to generate a high-level design of the system from the software
2
requirements by using UML modeling techniques.
Design, Develop and implement a program for a given problem and generation of
3
test cases.
Apply software testing methods to design and implement test cases and analyze
4
the behavior of test cases under real time environment.
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

Syllabus for the Academic Year – 2021-2022

Department: Information Science and Engineering Semester: 7

Subject Name: Technical Seminar

Subject Code: 18IS7TS01 L-P-C: 0-0-1

Description
Guidelines for preparing Technical Seminar

1. Selection of topic/area:

Select a paper according to the specialization of students. Papers from any


other approved journals can also be selected.

2. Approval to the selected topic:

After selecting the paper, get approval from the concerned faculty in charge.

3. Study of topic:

Students are requested to acquire a thorough knowledge on the subject by


referring back papers and reference books (These may be included as
references at the end of the paper) on the corresponding area.

4. Seminar:

Final seminar is presented by the students through slides.

Course Outcomes:

Sl. No.
Description
1 Survey the changes in the technologies relevant to the topic selected.
Discuss the technology and interpret the impact on the society, environment
2 and domain.
3 Compile report of the study and present to the audience.
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

Syllabus for the Academic Year – 2021 - 2022

Department: Information Science and Engineering Semester: 7

Subject Name: Project Work Phase – 1

Subject Code: 18IS7PW01 L-P-C: 0-4-2

Description
Scheme of Evaluation
1. Students shall carry out a detailed survey on the Area and the Topic
on which they are interested to do the Project work. Students are
expected to prepare documentation and submit three different
Synopses to the Evaluation Committee.
2. Evaluation Committee will review the synopsis and suggest suitable
area for project. If project proposals are not to the expected standards
or outdates then recommend the students resubmit the refined
synopsis.
3. Students are expected to give a detailed presentation on the Topic
approved and justify the panel members to start their project work.
4. Presentation consists of Basic Overview of the Project which includes
Introduction, Literature Survey, Problem Statement, Motivation,
Objectives, Requirement Analysis and Specification, Features of
Existing and Proposed System and Algorithms Selected.
Evaluation Scheme - I (50% percent of CIE):
Continuous evaluation will be done by respective Project Guides based on
the Regularity, Technical Knowledge and Competence, Programming
Skills, Communication Skills, Demonstration skills, Collaborative
Learning and Documentation Skills of the students.
Evaluation Scheme - II (50% percent of CIE):
Students are evaluated by the team of faculty members based on the
Presentation, Technical Competence, Slides Preparation, Team Working
Abilities, Questionnaires and overall Performance in the Seminar-1 and
Seminar-2 of Project Phase-I.
SRI SIDDHARTHA INSTITUTE OF TECHNOLOGY- TUMAKURU

(A constituent College of Siddhartha Academy of Higher Education, Tumakuru)

Course Outcomes:

Sl. No. Description

1 Identify the problem in the specified area by a literature survey.


Analyze the problem and identify the different modules/algorithms to solve
2
the problems.
3 Choose the platform to solve the selected problem.
4 Document and present the proposed plan of the project development.

You might also like