B.sc. Information Technology
B.sc. Information Technology
,
INFORMATION TECHNOLOGY
MODEL SYLLABUS
Computer Science is the study of quantity, structure, space and change, focusing on problem
solving, application development with wider scope of application in science, engineering,
technology, social sciences etc. throughout the world in last couple of decades and it has carved out
a space for itself like any other disciplines of basic science and engineering. Computer science is a
discipline that spans theory and practice and it requires thinking both in abstract terms and in
concrete terms. Nowadays, practically everyone is a computer user, and many people are even
computer programmers. Computer Science can be seen on a higher level, as a science of problem
solving and problem solving requires precision, creativity, and careful reasoning. The ever-evolving
discipline of computer science also has strong connections to other disciplines. Many problems in
science, engineering, health care, business, and other areas can be solved effectively with computers,
but finding a solution requires both computer science expertise and knowledge of the particular
application domain. Computer science has a wide range of specialties. These include Computer
Architecture, Software Systems, Graphics, Artificial Intelligence, Computational Science, and
Software Engineering. Drawing from a common core of computer science knowledge, each specialty
area focuses on specific challenges. Computer Science is practiced by mathematicians, scientists and
engineers. Mathematics, the origins of Computer Science, provides reason and logic. Science
provides the methodology for learning and refinement. Engineering provides the techniques for
building hardware and software.
The Students completing this programme will be able to present Software application clearly
and precisely, make abstract ideas precise by formulating them in the Computer languages.
Completion of this programme will also enable the learners to join teaching profession, enhance
their employability for government jobs, jobs in software industry, banking, insurance and
investment sectors, data analyst jobs and jobs in various other public and private enterprises.
Programme Code:
Semester-II
Semester-IV
Semester-VI
*Part I. II, and Part III components will be separately taken into account for CGPA calculation
and classification for the under graduate programme and the other components. IV, V have
to be completed during the duration of the programme as per the norms, to be eligible for
obtaining the UG degree.
Methods of Evaluation
Continuous Internal Assessment Test
Internal Assignments 25 Marks
Evaluation Seminars
Attendance and Class Participation
External End Semester Examination 75 Marks
Evaluation
Total 100 Marks
Methods of Assessment
Recall (K1) Simple definitions, MCQ, Recall steps, Concept definitions
Understand/ MCQ, True/False, Short essays, Concept explanations, Short summary or
Comprehend (K2) overview
Application (K3) Suggest idea/concept with examples, Suggest formulae, Solve problems,
Observe, Explain
Analyze (K4) Problem-solving questions, Finish a procedure in many steps, Differentiate
between various ideas, Map knowledge
Evaluate (K5) Longer essay/ Evaluation essay, Critique or justify with pros and cons
Check knowledge in specific or offbeat situations, Discussion, Debating or
Create (K6)
Presentations
Template for Curriculum Design for UG Programme in B.Sc Information
Technology
Credit Distribution for UG Programme in Information Technology
Hours per
Part List of Courses Credit week
(L/T/P)
Part-I Language – Tamil 3 6
Part-II English 3 6
Hours per
Part List of Courses Credit week
(L/T/P)
Part-I Language – Tamil 3 6
Part-II English 3 6
Part-II English 3 6
Environmental Studies(EVS) - 1
Semester-IV
Hours per
Part List of Courses Credit week
(L/T/P)
Part-I Language – Tamil 3 6
Part-II English 3 6
5 5
CC7: Core Industry Module -1 - Industrial Statistics
25 30
Third Year
Semester-V
Hours per
Part List of Courses Credit week
(L/T/P)
Part-III Core Courses 3(CC9, CC10, CC11) 4 5
Elective Courses 2 (Generic / Discipline Specific) EC5, EC6 3 4
Core /Project with Viva voce CC12 4 5
Part-IV Value Education 2 2
Internship / Industrial Training (Carried out in II Year Summer 2
vacation) (30 hours)
26 30
Semester-VI
Hours per
Part List of Courses Credit week
(L/T/P)
Part-III Core Courses 3 (CC13, CC14, CC15) 4 6
Elective Courses 2 (Generic / Discipline Specific) EC7, EC8 3 5
Part IV Professional Competency Skill Enhancement Course SE8 2 2
Part-V Extension Activity (Outside college hours) 1
21 30
Generic Specific
1. Discrete Mathematics – I
2. Discrete Mathematics-II
3. Statistical Methods and its Application-I
4. Statistical Methods and its Application-II
5. Optimization Techniques
6. Nano Technology
7. Introduction to Linear Algebra
8. Graph Theory and its Application
9. Financial Accounting
10. Cost and Management Accounting
11. Digital Logic Fundamentals
12. Numerical Methods
Annexure II
Skill Enhancement Course
1. Office Automation
2. Basics of Internet
3. Problem Solving Techniques
4. Multimedia Lab
5. Fundamentals of Information Technology
6. Introduction to HTML
7. Web Designing
8. Software Testing
9. Quantitative Aptitude
10. Mutimedia Systems
11. Advanced Excel
12. Biometrics
13. Cyber Forensics
14. Pattern Recognition
15. Enterprise Resource Planning
16. Robotics and Its Applications
17. Simulation and Modelling
18. Organization Behaviour and more..
FIRST YEAR – SEMESTER – I
CORE – I: PROGRAMMING IN C
Subject Inst. Marks
L T P S Credits
Code Hours CIA External Total
5 0 0 I 4 5 25 75 100
Learning Objectives
LO1 To familiarize the students with the understanding of code organization
LO2 To improve the programming skills
LO3 Learning the basic programming constructs.
Prerequisites:
Unit Contents No. of
Hours
Studying Concepts of Programming Languages- Language
Evaluation Criteria - Language design - Language Categories -
Implementation Methods – Programming Environments - Overview
I 15
of C: History of C- Importance of C- Basic Structure of C Programs-
Executing a C Program- Constants, Variables and Data types -
Operators and Expressions - Managing Input and Output Operations
Decision Making and Branching: Decision Making and Looping -
II 15
Arrays - Character Arrays and Strings
User Defined Functions: Elements of User Defined Functions-
Definition of Functions- Return Values and their Types- Function
III 15
Call- Function Declaration- Categories of Functions- Nesting of
Functions-Recursion
Structures and Unions: Introduction- Defining a Structure-
Declaring Structure Variables Accessing Structure Members-
IV 15
Structure Initialization- Arrays of Structures- Arrays within
Structures- Unions- Size of Structures.
Pointers: Understanding Pointers- Accessing the Address of a
Variable- Declaring Pointer Variables- Initializing of Pointer
Variables- Accessing a Variable through its Pointer- Chain
V of Pointers- Pointer Expressions- Pointer and Scale Factor- Pointer 15
and Arrays- Pointers and Character Strings- Array of Pointers- Pointer
as Function Arguments- Functions Returning Pointers- Pointers to
Functions- File Management in C
TOTAL 75
CO Course Outcomes
CO1 Outline the fundamental concepts of C programming languages, and its features
Textbooks
Robert W. Sebesta, (2012), ―Concepts of Programming Languages‖, Fourth
Edition, Addison Wesley (Unit I : Chapter – 1)
E. Balaguruswamy, (2010), ―Programming in ANSI C‖, Fifth Edition, Tata
McGraw Hill Publications
Reference Books
Ashok Kamthane, (2009), ―Programming with ANSI & Turbo C‖, Pearson
1.
Education
Byron Gottfried, (2010), ―Programming with C‖, Schaums Outline Series, Tata
2.
McGraw Hill Publications
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1. http://www.tutorialspoint.com/cprogramming/
2. http://www.cprogramming.com/
3. http://www.programmingsimplified.com/c-program-examples
4. http://www.programiz.com/c-programming
5. http://www.cs.cf.ac.uk/Dave/C/CE.html
6. http://fresh2refresh.com/c-programming/c-function/
2. http://www.comptechdoc.org/basic/basictut/
3. http://www.homeandlearn.co.uk/
4. http://www.top-windows-tutorials.com/computer-basics/
https://www.programiz.com/article/flowchart-programming (Algorithm and flow
5.
chart)
5. Jim Keogh (2002), “J2EE: The Complete Reference”, Tata McGraw Hill Edition.
7. http://www.tutorialspoint.com/java/
8. http://beginnersbook.com/java-tutorial-for-beginners-with-examples/
9. http://www.homeandlearn.co.uk/java/java.html
Marks
Subje
Inst.
ct L T P S Credits
Hours Externa
Code CIA Total
l
5 0 0 III 4 5 25 75 100
Learning Objectives
LO
To understand the basic DBMS models and architecture
1
LO
To learn how to query and normalize the database.
2
LO To study the data base design, transaction Processing and Management and
3 Security Issues.
TOTAL 75
THEORY 100%
CO Course Outcomes
CO Design and construct normalized tables and manipulate it effectively using SQL
5 and PL/SQL database objects
Textbooks
Reference Books
Web Resources
1. http://srikanthtechnologies.com/books/orabook/ch1.pdf
2. Http://www.tmv.edu.in/pdf/Distance_education/BCA%20Books/BCA%20IV
%20SEM/BC A-428%20Oracle.pdf
3. http://www.tutorialspoint.com/sql/sql-rdbms-concepts.htm
4. http://ecomputernotes.com/database-system/rdbms
5. http://www.mithunashok.com/2011/04/basics-of-rdbms.html
CO Course Outcomes
CO1 Choose appropriate SQL queries and PL/SQL blocks for the database.
CO2 Implement SQL and PL/SQL blocks for the given problem effectively.
CO3 Analyse the problem and Exceptions using queries and PL/SQL blocks.
CO4 Validate the database for normalization using SQL and PL/SQL blocks.
CO5 Design Database tables, create Procedures, user-defined functions and Triggers.
CO/ PSO PSO 1 PSO 2 PSO 3 PSO 4 PSO 5 PSO 6
CO1 2 2 2 3 3 2
CO2 3 3 2 3 2 3
CO3 2 3 3 3 2 3
CO4 2 3 2 3 3 3
CO5 2 2 2 3 3 2
Weightage of course
contributed to each PSO 11 13 11 15 13 13
SECOND YEAR –SEMESTER- IV
CORE – VIII: .NET PROGRAMMING
Subject Inst. Marks
L T P S Credits
Code Hours CIA External Total
5 0 0 IV 4 5 25 75 100
Learning Objectives
To provide sufficient knowledge in developing web applications using C# and
LO1
ASP.NET
LO2 To manipulate data from SQL Server using Microsoft ADO.NET.
Prerequisites:
Unit Contents No. of
Hours
The Creation of C#: C# Relates to the .Net Framework - Common
Language Runtime - Managed vs unmanaged code - An Overview of
C#: Object-Oriented Programming - First Simple Program-Handling
I 15
Syntax errors - Using code blocks-semicolon, positioning and
Indentation-The C# Keywords-Identifiers-The .Net Framework Class
Library-Data Types, Literals and Variables- Operators.
Program Control Statements: If Statement- switch Statement-For
Loop- While loop do-while loop- foreach loop-using break to exit a
II loop-using continue- goto- Introducing Classes and objects: Class 15
Fundamentals- objects creation-Methods-constructors-Garbage
Collection and Destructors-Exception Handling.
Arrays and Strings: Arrays-Multidimensional Arrays-Jagged Arrays-
for each loop Strings- Methods and classes: Method overloading- Main
III 15
Method-Recursion-static Classes Delegates,Events and Lambda
Expressions: Delegates -Lambda Expressions-LINQ
IV Developing ASP.NET Applications: Visual Studio: Creating Websites- 15
The Anatomy of a Web Form – Web Form Fundamentals: Converting
HTML Page to an ASP.Net Page – Page Class – Web Controls. State
Management: View State - Transferring Information between Pages –
Cookies – Session State – Application State.
Validation Controls – AdRotator Control. Working with Data:
ADO.NET Fundamentals:– Direct Data Access – Disconnected Data
Access - Data Binding: Data Binding with ADO.NET –Data Source
V 15
Controls - The Data Controls: The GridView – Formatting the
GridView – Selecting GridView Row – Editing, Sorting and Paging the
GridView-Generating Crystal Reports.
TOTAL 75
THEORY 80% & PROGRAM 20%
CO Course Outcomes
CO1 Outline the features of C# programming language and ASP.NET applications
Textbooks
Herbert Schildt (2010), C# 4.0 The Complete Reference, Tata McGraw-Hill Pvt Ltd
Mathew MacDonald, (2010), Beginning ASP.NET 4 in C# 2010, Second Edition,
Apress.
Reference Books
Greg Buczek (2002), ―ASP.NET – Developer‘s guide‖, Tata MaGraw Hill
1.
Publication
2. Jesse Liberty, (2002), ―Programming C#, 3.0‖, O‘Reilly Press
J.Sharp (2009), ―Microsoft Visual C# 2008 Step by Step‖, PHI Learning Private
3.
Ltd.
4. Christian Nagel et al. , ―Professional C# 2005 with .NET 3.0‖, Wiley India, 2007
2. http://www.csharpkey.com/csharp/
3. http://www.w3schools.com/aspnet/default.asp
CO Course Outcomes
CO1 Demonstrate MS Visual Studio.NET IDE to Create applications.
TOTAL 75
CO Course Outcomes
CO1 Outline the basic concepts in python language.
CO2 Interpret different looping and conditional statements in python language
Apply the various data types and identify the usage of control statements, loops,
CO3
functions and Modules in python for processing the data
CO4 Analyze and solve problems using basic constructs and techniques of python.
CO5 Assess the approaches used in the development of interactive application.
Textbooks
Reema Thareja, “Python Programming using problem solving approach”, First
Edition, 2017, Oxford University Press.
Dr. R. Nageswara Rao, “Core Python Programming”, First Edition, 2017, Dream tech
Publishers
Reference Books
1. VamsiKurama, “Python Programming: A Modern Approach”, Pearson Education.
2. Mark Lutz, ”Learning Python”, Orielly.
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1. https://www.programiz.com/python-programming
2. https://www.guru99.com/python-tutorials.html
MAPPING TABLE
CO/ PSO PSO 1 PSO 2 PSO 3 PSO 4 PSO 5 PSO 6
CO1 3 2 2 3 2 2
CO2 2 3 2 3 2 2
CO3 2 3 2 2 3 1
CO4 1 2 2 1 3 2
CO5 2 2 2 1 3 3
Weightage of
course contributed
to each
PSO 10 12 10 10 13 10
MAPPING TABLE
CO1 3 2 3 2 3 3
CO2 3 3 2 2 3 3
CO3 3 2 2 3 3 2
CO4 3 2 3 3 2 2
CO5 3 3 3 3 3 2
Weightage of
course
contributed to
each 15 12 13 13 14 12
PSO
Prerequisites:
Unit Contents No. of
Hours
I Introduction: Definition of Operating System - OS Structures: 15
OS Services - System Calls - Virtual Machines - Process
Management: Process Concept - Process Scheduling - Operation
on Processes - Co-operating Processes - Inter-process
Communication
CPU Scheduling: Basic Concepts - Scheduling Criteria -
Scheduling Algorithms - Process Synchronization: The Critical
II 15
Section Problem - Semaphores - Classical Problems of
Synchronization - Critical Regions
Deadlocks: System Model - Deadlock characterization –
Methods for Handling Deadlocks Deadlock Prevention -
III 15
Deadlock avoidance- Deadlock Detection - Recovery from
Deadlock.
Storage management: Memory management - Swapping –
Contiguous Memory allocation. Paging – Segmentation –
IV Segmentation with Paging –Virtual memory: Demand paging - 15
Page replacement – Thrashing. Mass-Storage Structure: Disk
Structure- Disk scheduling.
File-System Interface: File Concept-File Attributes-File
Operations – Access Methods: Sequential Access – Direct
Access –Directory Structure: Single-Level Directory- Two –
V 15
Level Directory-Tree-Structured Directories- Introducing Shell
Programming – Linux General Purpose Commands-Process
Oriented Commands – Communication Oriented Commands
TOTAL 75
CO Course Outcomes
CO1 Outline the fundamental concepts of an OS and their respective functionality
Reference Books
Milan Milenkovic (2003), ―Operating System Concepts and Design‖,
1.
McGraw Hill.
Andrew S. Tanenbaum, (2001), ―Modern Operating Systems‖, 2nd Edition,
2.
Prentice Hall of India.
Deital and Deital (1990), ―Introduction to Operating System‖, Pearson
3.
Education.
4. William Stallings (1997), ―Operating Systems‖, Prentice Hall of India.
2. http://www.reallylinux.com/docs/files.shtml
3. http://www.tutorialspoint.com/operating_system/os_linux.htm
TOTAL 75
CO Course Outcomes
CO1 Outline the fundamentals and the principles of Data Mining
Textbooks
Jiawei Han, Micheline Kamber, Jian Pei, “Data Mining concepts and techniques”, 3 rd
Edition, Elsevier publication, 2012.
Reference Books
Ian H. Witten and Eibe Frank, (2005), “Data Mining: Practical Machine Learning
1.
Tools and Techniques (Second Edition)”, Morgan Kaufmann.
2. Arun K Pujari, “Data Mining Techniques”, 10 impression, University Press, 2008.
Daniel T. Larose , Chantal D. Larose, "Data mining and Predictive analytics," Second
3.
Ed., Wiley Publication, 2015.
nd
4. G.K. Gupta, “Introduction to Data mining with case studies”, 2 Edition, PHI Private
limited, New Delhi, 2011.
Textbooks
Behrouz and Forouzan,(2006), Data Communication and Networking‖, 4th Edition,
TMH.
Ajit Pal,(2014), Data Communication and Computer Networks, PHI.
Reference Books
1. Jean Walrand (1998), ―Communication Networks,Second Edition‖, TataMcGraw
Hill.
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1. http://www.tutorialspoint.com/data_communication_computer_network/
2. http://www.slideshare.net/zafar_ayub/data-communication-and-network-11903853
3. http://www.freetechbooks.com/data-communication-and-networks-f31.html
Marks
Subject Inst.
L T P S Credits Externa
Code Hours CIA Total
l
5 0 0 - 4 5 25 75 100
Learning Objectives
LO1 To inculcate knowledge on Object-oriented concepts and programming using C++.
LO2 Demonstrate the use of various OOPs concepts with the help of programs
Unit Contents No. of
Hours
OOP Paradigm – Concepts of OOP – Benefits of OOP - Object 15
Oriented Languages – Applications of OOP – OOP Design: Using
I
UML as a Design Tool Beginning with C++
TOTAL 75
CO Course Outcomes
Outline the C++ programming fundamentals and the concepts of object-oriented
CO1
programming like object and class, Encapsulation, inheritance and polymorphism.
Classify the control structures, types of constructors, inheritance and different type
CO2
conversion mechanisms.
CO3 Analyze the importance of object oriented programming features like
polymorphism, reusability, generic programming, data abstraction and the usage of
exception handling.
Determine the use of object oriented features such as classes, inheritance and
CO4
templates to develop C++ programs for complex problems.
Create a program in C++ by implementing the concepts of object-oriented
CO5
programming.
Textbooks
E. Balaguruswamy, (2013), “Object Oriented Programming using C++”, 6th
Edition, Tata McGraw Hill.
Reference Books
Bjarne Stroustrup, “The C++ Programming Language”, Fourth Edition, Pearson
1
Education.
Hilbert Schildt, (2009), “C++ - The Complete Reference”, 4th Edition, Tata
2
McGrawHill
NOTE: Latest Edition of Textbooks May be Used
Web Resources
http:/fahad.cprogramming.blogspot.com/p/c-simple-examples.html
1.
2 http://www.sitesbay.com/cpp/cpp-polymorphism
.
DATA STRUCTURES
Subject Inst. Marks
L T P S Credits
Code Hours CIA External Total
4 0 0 II 4 4 25 75 100
Learning Objectives
LO1 To become familiar with the various data structures and their applications
LO2 to increase the understanding of basic concepts of the design and use of algorithms
Prerequisites:
Unit Contents No. of
Hours
Introduction and overview: Basic Terminology – Data Structures –
Operations - Algorithms: Complexity – Time Space – Algorithmic
I Notation – Control Structures – Complexity of Algorithms – 12
Notations Arrays: Representation – Operations - Linear Search –
Binary Search
Stack: Representation – Arithmetic expressions: Polish Notation –
Recursion: Towers of Hanoi - Queue –Priority Queue - Linked Lists:
II 12
Introduction – Representation of Linked Lists – Traversing a Linked
Lists – Searching a Linked List
Insertion into a Linked List – Deletion into Linked List – Header
Linked Lists – Two-way Lists –Doubly Linked List - Trees : Binary
III 12
Trees – Representation – Traversal using Recursion – Binary Search
Trees
Sorting : Bubble Sort Insertion Sort, Selection Sort, Merge Sort, Quick
IV 12
Sort, Heap Sort
Graph – Graph Theory Terminology –Sequential Representation –
Warshalls Algorithm – Shortest Path – Linked Representation -
V 12
Traversals – Dynamic Programming – All Pairs Shortest Path -
Greedy – Knapsack – Back Tracking – 8 Queens
TOTAL 60
THEORY 100%
CO Course Outcomes
CO1 Outline the different fundamental concepts of data structures
Make use of different memory representation for data storage and apply various
CO2
operations
CO3 Construct an algorithm for different data structure operations.
CO4 Analyse the data structures applications.
CO5 Discover suitable techniques to provide solution for solving the problems.
Textbooks
Seymour Lipschutz (1986), ―Theory and Problems of Data Structures‖, Tata
McGraw- Hill Edition
Reference Books
1. E.Horowitz, S.Sahni, S.Rajasekaran (1998), ―Computer Algorithms‖, Galgotia
Publications.
Robert Kruse, C.L.Tondo, Bruce Leung, ―Data Structures and Program Design in
2.
C‖, Second Edition, Prientice Hall Publications
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1. http://www.cs.sunysb.edu/~skiena/214/lectures/
2. http://datastructures.itgo.com/graphs/dfsbfs.htm
3. http://oopweb.com/Algorithms/Documents/PLDS210/VolumeFrames.html
4. http://discuss.codechef.com/questions/48877/data-structures-and-algorithms
5. http://code.tutsplus.com/tutorials/algorithms-and-data-structures--cms-20437
ttps://www.tutorialspoint.com/data_structures_algorithms/
6.
insertion_sort_algorithm.htm (Unit IV : Insertion Sorting)
CO2 Apply the interface setup, styles & themes for the given application
Analyze the problem and add necessary user interface components, multimedia
CO3
components and web data source into the application
CO4 Evaluate the results by implementing the correct techniques on the web form
CO5 Construct web applications with the facilitated components in PHP and jQuery
Textbooks
Kevin Tatroe, Peter MacIntyre, Rasmus Lerdorf, “ Programming PHP”,
O‘Reilly Publications, Third Edition
Joel Murach, Ray Harris (2010), “PHP and MySQL”, Shroff Publishers &
Distributors
Cesar Otero, Rob Lorsen (2012), “Professional jQuery”, John Wiley Sons & Inc
Reference Books
1. W. Jason Gilmore (2010), “Beginning PHP & MySql”, Apress
Robin Nixon (2013), “Learning PHP, MySQL, JavaScript & CSS”, O‘Reilly, 2nd
5.
Edition
2. http://www.ccc.commnet.edu/faculty/sfreeman/cst%20250/jQueryNotes.pdf
3. http://www.w3schools.com/php/
4. http://www.tutorialspoint.com/php/
5. http://www.tutorialspoint.com/mysql/
4 0 0 - 4 4 25 75 100
Learning Objectives
CO5 Evaluate and mitigate risks associated with software development process
Textbooks
Robert T. Futrell, Donald F. Shafer, Linda I. Safer, “Quality Software Project
Management”, Pearson Education Asia 2002.
Reference Books
1 Pankaj Jalote, “Software Project Management in Practice”, Addison Wesley 2002.
.
Hughes, “Software Project Management”, Tata McGraw Hill 2004, 3rd Edition.
2.
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1 NPTEL & MOOC courses titled Software Project Management
.
2. www.smartworld.com/notes/software-project-management
MAPPING TABLE
CO1 3 2 1 2 2 2
CO2 3 1 3 2 2 2
CO3 2 3 2 3 3 3
CO4 3 3 2 3 3 2
CO5 2 2 2 3 3 3
Weightage of course
contributed
to each PSO
13 11 10 13 13 12
SOFTWARE ENGINEERING
2. http://www.nada.kth.se/lectures/
3. http://www2.latech.edu/
MAPPING TABLE
CO1 3 2 3 2 2 2
CO2 2 3 3 3 3 2
CO3 2 2 3 3 3 3
CO4 3 2 2 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
to each PSO 13 12 14 14 14 13
CO1 An ability to use the methodology and tools necessary for engineering practice.
CO2 Ability to elicit, analyze and specify software requirements.
CO3 Analyze and translate specifications into a design.
CO4 Ability to derive test cases for different testing.
Apply software engineering perspective through requirements analysis, software design
CO5
and construction, verification, and validation to develop solutions to modern problems
MAPPING TABLE
CO1 3 2 3 2 2 2
CO2 2 3 3 3 3 2
CO3 2 2 3 3 3 3
CO4 3 2 2 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
to each PSO 13 12 14 14 14 13
SOFTWARE METRICS
Marks
Subject Inst.
L T P S Credits Externa
Code Hours CIA Total
l
5 0 0 - 4 5 25 75 100
Learning Objectives
LO1 Gain a solid understanding of what software metrics are and their significance
Learn how to identify and select appropriate software metrics based on project
LO2
goals
LO3 Acquire knowledge and skills in collecting and measuring software metrics
Learn how to analyze and interpret software metrics data to extract valuable
LO4
insights
LO5 Gain the ability to evaluate software quality using appropriate metrics
Unit Contents No. of
Hours
I Fundamentals of Measurement: Need for Measurement: 15
Measurement in Software Engineering, Scope of Software Metrics,
The Basics of measurement: The representational theory of
measurement, Measurement and models, Measurement scales and
scale types, meaningfulness in measurement
A Goal-Based Framework For Software Measurement: Classifying 15
software measures, Determining what to Measure, Applying the
framework, Software measurement validation, Performing
II SoftwareMeasurementValidation
Empirical investigation: Principles of Empirical Studies, Planning
Experiments, Planning case studies as quasi-experiments, Relevant
and Meaningful Studies
Software Metrics Data Collection: Defining good data, Data 15
collection for incident reports, How to collect data, Reliability of
data collection Procedures
III
Analyzing software measurement data: Statistical distributions and
hypothesis testing, Classical data analysis techniques, Examples of
simple analysis techniques
Measuring internal product attributes: Size Properties of Software 15
Size, Code size, Design size, Requirements analysis and Specification
size, Functional size measures and estimators, Applications of size
measures
IV
Measuring internal product attributes: Structure: Aspects of
Structural Measures, Control flow structure of program units,
Design-levelAttributes, Object-oriented Structural attributes and
measures
Measuring External Product Attributes: Modelling software quality,
Measuring aspects of quality, Usability Measures, Maintainability
measures,SecurityMeasures
V 15
Software Reliability: Measurement and Prediction: Basics of
reliability theory, The software reliability problem, Parametric
reliability growth models, Predictive accuracy
TOTAL 75
CO Course Outcomes
CO2 Identify frame work and analysis techniques for software measurement
CO3 Apply internal and external attributes of software product for effort estimation
CO4 Use appropriate analytical techniques to interpret software metrics data and derive
meaningful insights
CO5 Recommend reliability models for predicting software quality
Textbooks
Software Metrics A Rigorous and Practical Approach, Norman Fenton, James
Bieman , Third Edition, 2014
Reference Books
Software metrics, Norman E, Fenton and Shari Lawrence Pfleeger, International
1
Thomson Computer Press, 1997
Metric and models in software quality engineering, Stephen H.Kan, Second edition,
2
2002, Addison Wesley Professional
Practical Software Metrics for Project Management and Process Improvement,
3
Robert B.Grady, 1992, Prentice Hall.
NOTE: Latest Edition of Textbooks May be Used
Web Resources
https://lansa.com/blog/general/what-are-software-metrics-how-can-i-measure-
1.
these-metrics/
2 https://stackify.com/track-software-metrics/
.
MAPPING TABLE
CO1 3 2 2 2 2 2
CO2 2 3 3 3 3 2
CO3 2 2 3 3 3 3
CO4 3 2 2 3 2 3
CO5 3 3 3 2 3 3
Weightage of
course contributed
to each PSO 13 12 13 13 13 13
MACHINE LEARNING
CO3 Analyze the theoretical concepts and how they relate to the practical aspects of
machine learning.
CO4 Assess the significance of principles, algorithms and applications of machine learning
through a hands-on approach
CO5 Compare the machine learning techniques with respective functionality
Textbooks
Ethem Alpaydın, “Introduction to Machine Learning” Third Edition, MIT, 2014.
(Unit I – Unit IV)
https://www.tutorialspoint.com/machine_learning_with_python/
machine_learning_with_python_tutorial.pdf (Unit V: Machine learning with python
tutorial)
Reference Books
1 1. Bertt Lantz, "Machine Learning with R," Packt Publishing, 2013
MAPPING TABLE
CO1 3 2 2 2 2 2
CO2 2 3 3 3 3 2
CO3 2 2 3 3 3 3
CO4 3 2 2 3 2 3
CO5 3 3 3 2 3 3
Weightage of
course contributed
to each PSO 13 12 13 13 13 13
NETWORK SECURITY
Marks
Inst. C Ex
Subject Code L T P S Credits Tot
Hours I ter
al
A nal
- 5 - - 4 5 25 75 100
Learning Objectives
LO1 To familiarize on the model of network security, Encryption techniques
LO2 To understand the design concept of cryptography and authentication
LO3 To develop experiments on algorithm used for security
LO4 To understand about virus and threats, firewalls, and implementation of Cryptography
UNIT Details No. of Hours
Model of network security – Security attacks, services and attacks –
OSI security architecture – Classical encryption techniques – SDES –
Block cipher PrinciplesDES – Strength of DES – Block cipher design
I 15
principles – Block cipher mode of operation – Evaluation criteria for
AES – RC4 - Differential and linear cryptanalysis – Placement of
encryption function – traffic confidentiality.
Number Theory – Prime number – Modular arithmetic – Euclid’s
algorithm - Fermet’s and Euler’s theorem – Primality – Chinese
II remainder theorem – Discrete logarithm – Public key cryptography 15
and RSA – Key distribution – Key management – Diffie Hellman key
exchange – Elliptic curve cryptography
Authentication requirement – Authentication function – MAC – Hash
III function – Security of hash function and MAC – SHA - HMAC – 15
CMAC - Digital signature and authentication protocols – DSS.
Authentication applications – Kerberos – X.509 Authentication services
IV 15
- E- mail security – IP security - Web security
Intruder – Intrusion detection system – Virus and related threats –
V Countermeasures – Firewalls design principles – Trusted systems – 15
Practical implementation of cryptography and security
Total 75
Course Outcomes
Cours
e
On completion of this course, students will;
Outco
mes
Understand public-key cryptography, RSA and other public-key cryptosystems such as
CO1
Diffie-Hellman Key Exchange, ElGamal Cryptosystem.
CO2 Understand the security issues.
CO3 Apply key management and distribution schemes design. User Authentication
Analyze and design hash and MAC algorithms, and digital signatures. Analyze and
CO4
design classical encryption techniques and block ciphers.
CO5 Assess Intruders and Intruder Detection mechanisms, Types of Malicious software,
Reference Text :
William Stallings, “Cryptography & Network Security”, Pearson Education, Fourth
1.
Edition 2010.
References :
CharlieKaufman,RadiaPerlman,MikeSpeciner,“NetworkSecurity,Privatec
1.
ommunicationinpublicworld”,PHISecondEdition,2002
Bruce Schneier, Neils Ferguson, “Practical Cryptography”, Wiley Dreamtech India
2.
Pvt Ltd, First Edition, 2003.
DouglasRSimson“Cryptography–
3.
Theoryandpractice”,CRCPress,FirstEdition,1995
Web Resources
1. https://www.javatpoint.com/computer-network-security
2. https://www.tutorialspoint.com/information_security_cyber_law/network_security.htm
3. https://www.geeksforgeeks.org/network-security/
MAPPING TABLE
CO1 3 2 2 2 2 2
CO2 2 3 3 3 3 2
CO3 2 2 3 3 3 3
CO4 3 2 2 3 2 3
CO5 3 3 3 2 3 3
Weightage of
course contributed
to each PSO 13 12 13 13 13 13
MOBILE APPLICATION DEVELOPMENT
5 0 0 - 4 5 25 75 100
Learning Objectives
To provide the students with the basics of Android Software Development tools
LO1
and development of software on mobile platform.
Unit Contents No. of
Hours
Introduction to Android Operating System – Configuration 15
of Android Environment- Create the First Android
Application. Layout: Vertical, Vertical Scroll, horizontal,
I horizontal Scroll, Table Layout arrangement. Designing
User Interface: Label Text - TextView – Password Text
Box - Button –ImageButton – CheckBox – Image -
RadioButton – Slider – Autocomplete text View.
TOTAL 75
CO Course Outcomes
CO2 Identify the results by executing the application in emulator or in android device
CO3 Apply proper interface setup, styles & themes, storing and management
CO4 Analyze the problem and add necessary user interface components, graphics and
multimedia components into the application.
CO5 Evaluate the results by implementing the concept behind the problem with proper
code.
Textbooks
Karen Lang and Selim Tezel, (2022), Become an App Inventor The
official guide from MIT App Inventor, Miteen Press, Walker Books
Limited.
Reference Books
. http://appinventor.mit.edu/explore/paint-pot-extended-camera
Credits
ct
Extern
Total
Code
CIA
al
NATURAL Elect 4 - - 3 25 75 10
LANGUAGE 0
PROCESSING
Learning Objectives
LO1 To understand approaches to syntax and semantics in NLP.
LO2 To learn natural language processing and to learn how to apply basic algorithms in
this field.
To understand approaches to discourse, generation, dialogue and summarization
LO3
within NLP.
Toget acquainted with the algorithmic description of the main language levels:
LO4
morphology, syntax, semantics, pragmatics etc.
LO5 To understand current methods for statistical approaches to machine translation.
UNI Contents No.
T Of.
Hours
I Introduction : Natural Language Processing tasks in syntax, semantics, and
pragmatics – Issue- Applications – The role of machine learning –
Probability Basics –Information theory – Collocations -N-gram Language 12
Models – Estimating parameters and smoothing – Evaluating language
models.
II Word level and Syntactic Analysis:Word Level Analysis: Regular
Expressions-Finite-State Automata-Morphological Parsing-Spelling Error
Detection and correction-Words and Word classes-Part-of Speech 12
Tagging.Syntactic Analysis: Context-free Grammar-Constituency- Parsing-
Probabilistic Parsing.
III Semantic analysis and Discourse Processing: Semantic Analysis: Meaning
Representation-Lexical Semantics- Ambiguity-Word Sense Disambiguation.
Discourse Processing: cohesion-Reference Resolution- Discourse Coherence 12
and Structure.
IV Natural Language Generation: Architecture of NLG Systems- Generation
Tasks and Representations- Application of NLG. Machine Translation:
Problems in Machine Translation. Characteristics of Indian Languages- 12
Machine Translation Approaches-Translation involving Indian Languages.
V Information retrieval and lexical resources: Information Retrieval:
Design features of Information Retrieval Systems-Classical, Non-classical,
Alternative Models of Information Retrieval – valuation Lexical Resources: 12
WorldNet-Frame NetStemmers- POS Tagger- Research Corpora SSAS.
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Describe the fundamental concepts and techniques of natural language processing.
CO1 Explain the advantages and disadvantages of different NLP technologies and their
applicability in different business situations.
Distinguish among the various techniques, taking into account the assumptions,
strengths, and weaknesses of each
CO2
Use NLP technologies to explore and gain a broad understanding
of text data.
Use appropriate descriptions, visualizations, and statistics to communicate the
CO3 problems and their solutions.
Use NLP methods to analyse sentiment of a text document.
Analyze large volume text data generated from a range of real-world applications.
CO4
Use NLP methods to perform topic modelling.
Develop robotic process automation to manage business processes and to increase
and monitor their efficiency and effectiveness.
CO5
Determine the framework in which artificial intelligence and the Internet of things
may function, including interactions with people, enterprise functions, and
environments.
Textbooks
1 Daniel Jurafsky, James H. Martin, “Speech & language processing”, Pearson
publications.
2 Allen, James. Natural language understanding. Pearson, 1995.
Reference Books
1. Pierre M. Nugues, “An Introduction to Language Processing with Perl and
Prolog”,Springer
Web Resources
1. https://en.wikipedia.org/wiki/Natural_language_processing
2. https://www.techtarget.com/searchenterpriseai/definition/natural-language-processing-
NLP
Mapping with Programme Outcomes:
CO 1 3 3 3 3 3 3
CO 2 2 3 3 3 2 3
3 3 3 3 3 3
CO 3
CO 4 3 2 3 3 2 3
CO 5 3 3 3 3 3 3
Weightageof 14 14 15 15 13 15
coursecontributedtoeachPS
O
CO4 Create viable solutions to decision making problems. PO1, PO2, PO3,
PO4, PO5, PO6
Instill a sense of ethical decision-making and a
PO1, PO2, PO3,
CO5 commitment to the long-run welfare of both organizations
PO4, PO5, PO6
and the communities they serve.
Textbooks
1 Chandan K. Reddy and Charu C Aggarwal, “Healthcare data analytics”, Taylor &
Francis, 2015.
2 Edwards Martin R, Edwards Kirsten (2016),“Predictive HR Analytics: Mastering
the HR Metric”, Kogan Page Publishers, ISBN-0749473924
3 Fitz-enzJac (2010), “The new HR analytics: predicting the economic value of your
company’s human capital investments”, AMACOM, ISBN-13: 978-0-8144-1643-
3
4 RajendraSahu, Manoj Dash and Anil Kumar. Applying Predictive Analytics
Within the Service Sector.
Reference Books
1. Hui Yang and Eva K. Lee, “Healthcare Analytics: From Data to Knowledge to
Healthcare Improvement, Wiley, 2016
2. Fitz-enzJac, Mattox II John (2014), “Predictive Analytics for Human Resources”,
Wiley, ISBN- 1118940709.
Web Resources
1. https://www.ukessays.com/essays/marketing/contemporary-issues-in-marketing-
marketing-essay.php
2. https://yourbusiness.azcentral.com/examples-contemporary-issues-marketing-
field-26524.html
CO 1 3 3 3 3 3 3
CO 2 2 3 3 3 3 3
CO 3 3 3 2 3 3 2
CO 4 3 3 3 3 3 3
CO 5 3 3 3 3 3 3
Weightageof 14 15 14 15 15 14
coursecontributedtoeachPSO
S-Strong-3 M-Medium-2 L-Low-1
CRYPTOGRAPHY
Subjec Category L T P S Credit Marks
t Code s CI Externa Tota
A l l
Elect 4 - - - 3 25 75 100
Learning Objectives
LO1 To understand the fundamentals of Cryptography
LO2 To acquire knowledge on standard algorithms used to provide confidentiality,
integrity and authenticity.
LO3 To understand the various key distribution and management schemes.
LO4 To understand how to deploy encryption techniques to secure data in transit across
data networks
LO5 To design security applications in the field of Information technology
UNIT Contents No. Of.
Hours
I Introduction: The OSI security Architecture – Security Attacks –
Security Mechanisms – Security Services – A model for network 12
Security.
II Classical Encryption Techniques: Symmetric cipher model –
Substitution Techniques: Caesar Cipher – Monoalphabetic cipher –
Play fair cipher – Poly Alphabetic Cipher – Transposition techniques 12
– Stenography
III Block Cipher and DES: Block Cipher Principles – DES – The
Strength of DES –RSA: The RSA algorithm. 12
IV Network Security Practices: IP Security overview - IP Security
architecture – Authentication Header. Web Security: SecureSocket 12
Layer and Transport Layer Security – Secure Electronic Transaction.
V Intruders – Malicious software – Firewalls. 12
TOTAL HOURS 60
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Analyze the vulnerabilities in any computing system and PO1, PO2, PO3,
CO1 hence be able to design a security solution. PO4, PO5, PO6
Apply the different cryptographic operations of public key PO1, PO2, PO3,
CO3 cryptography PO4, PO5, PO6
Apply the various Authentication schemes to simulate PO1, PO2, PO3,
CO4 different applications. PO4, PO5, PO6
Understand various Security practices and System security PO1, PO2, PO3,
CO5 standards PO4, PO5, PO6
Textbooks
1 William Stallings, “Cryptography and Network Security Principles andPractices”.
Reference Books
1. Behrouz A. Foruzan, “Cryptography and Network Security”, Tata McGraw-Hill,
2007.
2 AtulKahate, “Cryptography and Network Security”, Second Edition, 2003,TMH.
3 M.V. Arun Kumar, “NetworkSecurity”, 2011, First Edition,USP.
Web Resources
1 https://www.tutorialspoint.com/cryptography/
2 https://gpgtools.tenderapp.com/kb/how-to/introduction-to-cryptography
Mapping with Programme Outcomes:
CO 1 3 3 3 2 3 2
CO 2 3 2 3 2 3 3
CO 3 3 3 3 2 3 3
CO 4 2 3 3 3 2 3
CO 5 3 2 3 3 3 3
Weightage of course 14 13 15 12 14 14
contributed to each
PSO
Core 4 - - - 3 5 25 75 100
Course Objective
C1 Understand the Big Data Platform and its Use cases, Map Reduce Jobs
C2 To identify and understand the basics of cluster and decision tree
C3 To study about the Association Rules, Recommendation System
C4 To learn about the concept of stream
C5 Understand the concepts of NoSQL Databases
UNIT Details No. of
Hours
I Evolution of Big data — Best Practices for Big data Analytics — Big data
characteristics — Validating — The Promotion of the Value of Big Data
— Big Data Use Cases- Characteristics of Big Data Applications — 12
Perception and Quantification of Value -Understanding Big Data Storage
— A General Overview of High-Performance Architecture — HDFS —
MapReduce and YARN — Map Reduce Programming Model
II Advanced Analytical Theory and Methods: Overview of Clustering — K-
means — Use Cases — Overview of the Method — Determining the
Number of Clusters — Diagnostics — Reasons to Choose and Cautions .-
Classification: Decision Trees — Overview of a Decision Tree — The 12
General Algorithm — Decision Tree Algorithms — Evaluating a
Decision Tree — Decision Trees in R — Naïve Bayes — Bayes?
Theorem — Naïve Bayes Classifier.
III Advanced Analytical Theory and Methods: Association Rules —
Overview — Apriori Algorithm — Evaluation of Candidate Rules —
Applications of Association Rules — Finding Association& finding 12
similarity — Recommendation System: Collaborative Recommendation-
Content Based Recommendation — Knowledge Based Recommendation-
Hybrid Recommendation Approaches.
IV Introduction to Streams Concepts — Stream Data Model and Architecture
— Stream Computing,
Sampling Data in a Stream — Filtering Streams — Counting Distinct
Elements in a Stream — Estimating moments — Counting oneness in a 12
Window — Decaying Window — Real time Analytics Platform(RTAP)
applications — Case Studies — Real Time Sentiment Analysis, Stock
Market Predictions. Using Graph Analytics for Big Data: Graph Analytics
V NoSQL Databases : Schema-less Models?: Increasing Flexibility for Data
Manipulation-Key Value Stores- Document Stores — Tabular Stores —
Object Data Stores — Graph Databases Hive — Sharding —Hbase — 12
Analyzing big data with twitter — Big data for E-Commerce Big data for
blogs — Review of Basic Data Analytic Methods using R.
Total 60
Course Outcomes Programme Outcomes
CO On completion of this course, students will
1 Work with big data tools and its analysis techniques. PO1
2 Analyze data by utilizing clustering and classification
algorithms. PO1, PO2
2. EMC Education Services, “Data Science and Big Data Analytics: Discovering,
Analyzing, Visualizing and Presenting Data”, Wiley publishers, 2015.
Web Resources
1. https://www.simplilearn.com
2. https://www.sas.com/en_us/insights/analytics/big-data-analytics.html
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Inst. Hours
Code
Category
Credits
External
Total
CIA
Core Y - - - 3 4 2 75 100
5
Course Objective
C1 Use of Devices, Gateways and Data Management in IoT.
C2 Design IoT applications in different domain and be able to analyze their performance
C3 Implement basic IoT applications on embedded platform
C4 To gain knowledge on Industry Internet of Things
C5 To Learn about the privacy and Security issues in IoT
UNIT Details No. of Hours Course
Objectiv
e
I IoT & Web Technology, The Internet of Things Today,
Time for Convergence, Towards the IoT Universe,
Internet of Things Vision, IoT Strategic Research and
Innovation Directions, IoT Applications, Future
Internet Technologies, Infrastructure, Networks and 12 C1
Communication, Processes, Data Management,
Security, Privacy & Trust, Device Level Energy Issues,
IoT Related Standardization, Recommendations on
Research Topics.
Reference Books
1. Michael Miller, “The Internet of Things: How Smart TVs, Smart Cars, Smart Homes,
and Smart Cities Are Changing the World”, kindle version.
Web Resources
1. https://www.simplilearn.com
2. https://www.javatpoint.com
3. https://www.w3schools.com
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
S-Strong M-Medium L-Low
Inst. Hours
Code
Category
Credits
External
Total
CIA
Human Computer Elective
- Y - V 3 4 25 75 100
Interaction
Course Objective
C1 To learn about the foundations of Human Computer Interaction.
C2 To learn the design and software process technologies.
C3 To learn HCI models and theories.
C4 To learn Mobile Ecosystem.
C5 To learn the various types of Web Interface Design.
No. of
UNIT Details
Hours
FOUNDATIONS OF HCI :
The Human: I/O channels – Memory
Reasoning and problem solving; The Computer: Devices –
I 12
Memory – processing and networks;
Interaction: Models – frameworks – Ergonomics – styles –
elements – interactivity- Paradigms. - Case Studies
II DESIGN & SOFTWARE PROCESS:
Interactive Design:
Basics – process – scenarios
Navigation: screen design Iteration and prototyping. 12
HCI in software process:
Software life cycle – usability engineering – Prototyping in
practice – design rationale. Design rules: principles, standards,
guidelines, rules. Evaluation Techniques – Universal Design
III MODELS AND THEORIES:
HCI Models : Cognitive models:- Socio-Organizational issues
12
and stakeholder requirements Communication and collaboration
models-Hypertext, Multimedia and WWW.
IV Mobile HCI:
Mobile Ecosystem: Platforms, Application frameworks
Types of Mobile Applications: Widgets, Applications, Games 12
Mobile Information Architecture, Mobile 2.0,
Mobile Design: Elements of Mobile Design, Tools. - Case Studies
V WEB INTERFACE DESIGN: Designing Web Interfaces – Drag &
Drop, Direct Selection, Contextual Tools, Overlays, Inlays and Virtual 12
Pages, Process Flow - Case Studies
Total 60
Course Outcomes Programme Outcome
CO On completion of this course, students will
1 Understand the fundementals of HCI. PO1
Understand the design and software process
2 PO1, PO2
technologies.
3 Understand HCI models and theories. PO4, PO6
Understand Mobile Ecosystem, types of Mobile
4 PO4, PO5, PO6
Applications, mobile Architecture and design.
Understand the various types of Web Interface
5 PO3, PO8
Design.
Text Book
Alan Dix, Janet Finlay, Gregory Abowd, Russell Beale, ”Human -Computer
1
Interaction‖”, III Edition, Pearson Education, 2004 (UNIT I, II & III)
Brian Fling, ―”Mobile Design and Development”, I Edition, O‘Reilly Media Inc.,
2 2009(UNIT–IV)
Bill Scott and Theresa Neil, ―Designing Web Interfaces‖, First Edition, O‘Reilly, 2009.
3
(UNIT-V)
Reference Books
Shneiderman, “Designing the User Interface: Strategies for Effective Human-Computer
1.
Interaction”, V Edition, Pearson Education.
Web Resources
1. https://www.interaction-design.org/literature/topics/human-computer-interaction
2. https://link.springer.com/10.1007/978-0-387-39940-9_192
3. https://en.wikipedia.org/wiki/Human%E2%80%93computer_interaction
Mapping with Programme Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 S S
CO 3 S S
CO 4 S S S
CO 5 S S
Inst. Hours
Code
Category
Credits
External
Total
CIA
Fuzzy Logic Elective Y - - V 3 4 25 75 100
Course Objective
CO1 To understand the basic concept of Fuzzy logic
CO2 To learn the various operations on relation properties
CO3 To study about the membership functions
CO4 To learn about the Defuzzification and Fuzzy Rule-Based System
CO5 To learn the concepts of Applications of Fuzzy Logic
UNIT Details No. of Course Objective
Hours
I Introduction to Fuzzy Logic- Fuzzy Sets- Fuzzy Set
12
Operations, Properties of Fuzzy Sets, Classical and C1
Fuzzy Relations: Introduction-Cartesian Product of
Relation-Classical Relations-Cardinality of Crisp
Relation.
Total
Course Outcomes Programme Outcomes
CO On completion of this course, students will
1 Understand the basics of Fuzzy sets, operation and PO1
properties.
2 Apply Cartesian product and composition on Fuzzy
relations and usethe tolerance and Equivalence PO1, PO2
relations.
Reference Books
1. Guanrong Chen and Trung Tat Pham- Introduction to Fuzzy Sets, Fuzzy Logic and
Fuzzy Control Systems
2. https://www.guru99.com/what-is-fuzzy-logic.html
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Code
Category
Credits
External
Total
CIA
CO 1 S
CO 2 S S
CO 3 S S
CO 4 S S S
CO 5 S S
Code
Category
Credits
External
Total
CIA
Total 60
Course Outcomes Programme Outcomes
CO On completion of this course, students will
1 Describe the different physical forms of robot
PO1
architectures.
2 Kinematically model simple manipulator and mobile
PO1, PO2
robots.
3 Mathematically describe a kinematic robot system PO4, PO6
4 Analyze manipulation and navigation problems using
knowledge of coordinate frames, kinematics, PO4, PO5, PO6
optimization, control, and uncertainty.
5 Program robotics algorithms related to kinematics,
PO3, PO8
control, optimization, and uncertainty.
Text Book
1 RicharedD.Klafter. Thomas Achmielewski and MickaelNegin, Robotic Engineering
and Integrated Approach, Prentice Hall India-Newdelhi-2001
2. https://www.geeksforgeeks.org/robotics-introduction/
Mapping with Programme Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Code
Category
Credits
External
Total
CIA
Computational Elective Y - - - 3 4 25
75 100
Intelligence
Course Objective
C1 To identify and understand the basics of AI and its search.
C2 To study about the Fuzzy logic systems.
C3 Understand and apply the concepts of Neural Network and its functions.
C4 Understand the concepts of Artifical Neural Network
C5 To study about the Genetic Algorithm.
UNIT Details No. of Course Objective
Hours
I Introduction to AI: Problem formulation – AI
Applications – Problems – State Space and Search –
Production Systems – Breadth First and Depth First –
12 C1
Travelling Salesman Problem – Heuristic search
techniques: Generate and Test – Types of Hill
Climbing.
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
S-Strong M-Medium L-Low
External
Credits
Hours
egory
Total
Inst.
CIA
Grid Computing Elective
- Y - - 3 4 25 75 100
Course Objective
C1 To learn the basic construction and application of Grid computing.
C2 To learn grid computing organization and their Role.
C3 To learn Grid Computing Anotomy.
C4 To learn Grid Computing road map.
C5 To learn various type of Grid Architecture.
No. of
UNIT Details
Hours
Introduction: Early Grid Activity, Current Grid Activity, Overview of Grid
I Business areas, Grid Applications, Grid Infrastructures. 12
2. https://link.springer.com/chapter/10.1007/978-1-84882-409-6_4
3. https://www.redbooks.ibm.com/redbooks/pdfs/sg246778.pdf
CO 1 S
CO 2 S S
CO 3 S S
CO 4 S S S
CO 5 S S
Code
Category
Credits
External
Total
CIA
C5 To learn the various Case Studies in Cloud, Edge & fog Computing.
No. of
UNIT Details
Hours
Era of Cloud Computing: Introduction – Components of Cloud
Computing – Cloud Types: Private, Public and Hybrid clouds –
I Limitations of the Cloud - Virtualization: Structure and Mechanisms. 12
III
Edge Computing: Edge Computing and Its Essentials: Introduction-
Edge Computing Architecture- Advantages and Limitations of Edge
Computing Systems- Edge Computing Interfaces and Devices - Edge 12
Analytics: Edge Data Analytics – Potential of Edge Analytics –
Architecture of Edge Analytics – Case study
2 Classify the computing technologies based on its architecture and PO1, PO2
infrastructure and identify its strategies.
3 Examine various cloud services, Security threat exposure within a PO4, PO6
cloud computing infrastructure.
Asses the problems and solutions involved in various stages of different PO4,
4
computing environments. PO5, PO6
5 Discuss the importance of cloud, edge and Fog technology and implement PO3, PO8
innovative ideas and practices for regulating green IT.
Text Book
Kailas Jayaswal,Jagannath Kallakurchi,Donald J.Houde,Dr.Devan Shah “ Cloud
1
Computing –Black Book” Edition :2020 (UNIT I & II : CHAPTER 1,2,3,9,11)
K. Anitha Kumari G. Sudha Sadasivam D. Dharani M. Niranjanamurthy, “EDGE
4 Evangelos pallis “Cloud and Fog computing in 5G mobile Networks” ,First edition
2017. ( UNIT V: CHAPTER 2 )
Reference Books
RajKumar Buyya, ChristianVecchiola, S.ThamaraiSelvi, (2013), Mastering Cloud
1.
Computing, McGraw Hill Education.
4. Role in the Internet of Thingsǁ, MCC’12, August 17, 2012, Helsinki, Finland.
Copyright 2012.
Amir M. Rahmani · Pasi Liljeberg Jürgo-Sören Preden “Fog Computing in the Internet
5
of Things”Springer,2018. ( UNIT V: PART/CHAPTER (1.4,2.5)
Web Resources
1. https://static.googleusercontent.com/media/www.google.com/en//green/pdfs/google-
green- computing.pdf ( Case Study)
2. http://whatiscloud.com/basic_concepts_and_terminology/cloud
3. http://www.computerweekly.com/guides/Using-green-computing-for-improving-
energy- efficiency
CO 1 S
CO 2 S S
CO 3 S S
CO 4 S S S
CO 5 S S
Credits
External
Total
CIA
2. https://en.wikipedia.org/wiki/Artificial_neural_network
3. https://link.springer.com/chapter/10.1007/978-3-642-21004-4_12
CO 1 S
CO 2 S S
CO 3 S S
CO 4 S S S
CO 5 S S
Inst. Hours
Code
Category
Credits
External
Total
CIA
Agile Project Elective
- Y - - 3 4 25 75 100
Management
Course Objective
C1 Learning of software design, software technologies and APIs.
C2 Detailed demonstration about Agile development and testing techniques.
C3 Learning about Agile Planning and Execution.
C4 Learning of Agile Management Design and Quality Check.
C5 Detailed examination of Agile development and testing techniques.
No. of
UNIT Details
Hours
Introduction:Modernizing Project Management: Project
Management Needed a Makeover – Introducing Agile Project
Management.
CO 1 S
CO 2 S S
CO 3 S S
CO 4 S S S
CO 5 S S
Annexure II
Inst. Hours
Code
Category
Credits
External
Total
CIA
SEC1 OFFICE Specific - Y - - 2 2 25 75 100
AUTOMATION Elective
Course Objective
C1 Understand the basics of computer systems and its components.
C2 Understand and apply the basic concepts of a word processing package.
C3 Understand and apply the basic concepts of electronic spreadsheet software.
C4 Understand and apply the basic concepts of database management system.
C5 Understand and create a presentation using PowerPoint tool.
UNIT Details No. of
Hours
I Introductory concepts: Memory unit– CPU-Input Devices: Key board,
Mouse and Scanner. Output devices: Monitor, Printer. Introduction to
6
Operating systems & its features: DOS– UNIX–Windows. Introduction
to Programming Languages.
II Word Processing: Open, Save and close word document; Editing
text – tools, formatting, bullets; Spell Checker - Document
formatting – Paragraph alignment, indentation, headers and footers, 6
numbering; printing–Preview, options, merge.
III Spreadsheets : Excel–opening, entering text and data, formatting,
navigating; Formulas–entering, handling and copying; Charts–
creating, formatting and printing, analysis tables, preparation of 6
financial statements, introduction to data analytics.
Total 30
Categor
Credits
Code
Tota
Exte
y
CIA
rnal
l
BASICS OF INTERNET Specific 2 - - 2 25 75 100
SEC2 Elective
Learning Objectives
LO1 Knowledge of Internet medium
LO2 Internet as a mass medium
LO3 Features of Internet Technology,
LO4 Internet as source of infotainment
LO5 Study of internet audiences and about cyber crime
UNIT Contents No. Of.
Hours
I The emergence of internet as a mass medium – the world of ‘world wide
6
web’.
II Features of internet as a technology. 6
III Internet as a source of infotainment – classification based on content and
6
style.
IV Demographic and psychographic descriptions of internet ‘audiences’
6
– effect of internet on the values and life-styles.
V Present issues such as cyber crime and future possibilities. 6
TOTAL HOURS 30
CO Course Outcomes
Knows the basic concept in HTML
CO1 Concept of resources in HTML
Textbooks
1 “Mastering HTML5 and CSS3 Made Easy”, TeachUComp Inc., 2014.
2
Thomas Michaud, “Foundations of Web Design: Introduction to HTML & CSS”
Web Resources
1. https://www.teachucomp.com/samples/html/5/manuals/Mastering-HTML5-CSS3.pdf
2. https://www.w3schools.com/html/default.asp
Inst. Hours
Code
Category
Credits
External
Total
CIA
PROBLEM SOLVING Specific
Y - - - 2 2 25 75 100
TECHNIQUES Elective
Course Objective
C1 Understand the systematic approach to problem solving.
IV 6
Array Techniques: Array order reversal – Array counting or
histograming – Finding the maximum number in a set - Removal of
duplicates from an ordered array - Partitioning an array – Finding the kth
smallest element – Longest monotone subsequence.
V 6
Text Processing and Pattern Searching: Text line length adjustment –
Left and right justification of text – Keyword searching in text – Text line
editing – Linear pattern search.
Recursive algorithms: Towers of Hanoi – Permutation generation.
Total 30
Course Outcomes Programme Outcome
CO On completion of this course, students will
1 Understand the logic of problem and analyses
implementation of algorithm and TopDown PO1,PO6
approach and concept of Recursion
2 Able to understand the Sequence of Numbers and
PO2
Series Fibonacci, Reversing ,Base Conversion.
3 Able to do Algebraic operations PO2,PO4
4 Coverage of Arrays and its Logics PO6,PO8
5 Text Processing and Pattern Searching Approach PO7
Text Book
1 R. G. Dromey, How to Solve it by Computer, Pearson India, 2007
Reference Books
1. George Polya, Jeremy Kilpatrick, The Stanford Mathematics Problem Book: With
Hints and Solutions, Dover Publications, 2009 (Kindle Edition 2013).
2. Greg W. Scragg, Problem Solving with Computers, Jones & Bartlett 1st edition, 1996.
Web Resources
1. https://www.studytonight.com/
2. https://www.w3schools.com/
CO 1 M S
CO 2 M
CO 3 S L
CO 4 S M
CO 5 M
Multimedia Lab
Marks
Subject Inst.
L T P S Credits Externa
Code Hours CIA Total
l
SEC4 0 0 2 III 1 2 25 75 100
Learning Objectives
LO1 Understands the basics of multimedia
LO2 Acquire knowledge of image editing and animation techniques.
LO3 Apply multimedia concepts to real world projects
Unit Contents No. of
Hours
GIMP’s Tools- Taking Advantage of Paths - Working with Layers 6
and masks - Using Channels
Exercises:
I 1. Enlarge a Logo using path
2. Create an ink drawing using path
3. Replace Background of image using Channels
TOTAL 30
CO Course Outcomes
CO3 Solve various design and implementation issues materialize on the development
of multimedia systems
CO4 Assess different Photo Editing, Video Editing and animation tools and select the
appropriate tool based on the requirements
CO5 Design and develop Multimedia Projects
Textbooks
1. Jason Van Gumster& Robert Shimonski (2010), “GIMP Bible”, Wiley, 2nd
edition.
2. Chris Gover, 2010, “Flash CS5: The missing Manual”, 1st Edition, O‟
Reilly India.
Reference Books
1 Juan Manuel Ferreyra (2011), “GIMP 2.6 Cookbook”, PACK publishing Ltd.
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 M S M M L
CO 2 S M S M
CO 3 S S M L
CO 4 S L M M
CO 5 M S M S
Subject Subject Name L T P S Marks
Category
Credits
Code
Exter
Total
CIA
nal
FUNDAMENTALS OF Specifi 2 - - I 2 25 75 10
INFORMATION c 0
TECHNOLOGY Electiv
e
Learning Objectives
LO1 Understand basic concepts and terminology of information technology.
LO2 Have a basic understanding of personal computers and their operation
LO3 Be able to identify data storage and its usage
LO4 Get great knowledge of software and its functionalities
LO5 Understand about operating system and their uses
UNI Contents No. Of.
T Hours
I Introduction to Computers:
Introduction, Definition, .Characteristics of computer, Evolution
of Computer, Block Diagram Of a computer, Generations of 6
Computer, Classification Of Computers, Applications of
Computer, Capabilities and limitations of computer
II Basic Computer Organization:
Role of I/O devices in a computer system. Input Units:
Keyboard, Terminals and its types. Pointing Devices, Scanners
and its types, Voice Recognition Systems, Vision Input System, 6
Touch Screen, Output Units: Monitors and its types. Printers:
Impact Printers and its types. Non Impact Printers and its types,
Plotters, types of plotters, Sound cards, Speakers.
III Storage Fundamentals:
Primary Vs Secondary Storage, Data storage & retrieval
methods. Primary Storage: RAM ROM, PROM, EPROM,
EEPROM. Secondary Storage: Magnetic Tapes, Magnetic 6
Disks. Cartridge tape, hard disks, Floppy disks Optical Disks,
Compact Disks, Zip Drive, Flash Drives
IV Software:
Software and its needs, Types of S/W. System Software:
Operating System, Utility Programs Programming Language:
Machine Language, Assembly Language, High Level Language 6
their advantages & disadvantages. Application S/W and its
types: Word Processing, Spread Sheets Presentation, Graphics,
DBMS s/w
V Operating System:
Functions, Measuring System Performance, Assemblers,
Compilers and Interpreters.Batch Processing,
6
Multiprogramming, Multi Tasking, Multiprocessing, Time
Sharing, DOS, Windows, Unix/Linux.
TOTAL HOURS 30
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Learn the basics of computer, Construct the structure of the PO1, PO2,
CO1 required things in computer, learn how to use it. PO3, PO4,
PO5, PO6
Develop organizational structure using for the devices present PO1, PO2,
CO2 currently under input or output unit. PO3, PO4,
PO5, PO6
Concept of storing data in computer using two header namely PO1, PO2,
CO3 RAM and ROM with different types of ROM with advancement PO3, PO4,
in storage basis. PO5, PO6
Work with different software, Write program in the software and PO1, PO2,
CO4 PO3, PO4,
applications of software.
PO5, PO6
Usage of Operating system in information technology which PO1, PO2,
CO5 really acts as a interpreter between software and hardware. PO3, PO4,
PO5, PO6
Textbooks
1 Anoop Mathew, S. Kavitha Murugeshan (2009), “ Fundamental of Information
Technology”, Majestic Books.
2 Alexis Leon, Mathews Leon,” Fundamental of Information Technology”, 2nd
Edition.
3 S. K Bansal, “Fundamental of Information Technology”.
Reference Books
1. Bhardwaj Sushil Puneet Kumar, “Fundamental of Information Technology”
2. GG WILKINSON, “Fundamentals of Information Technology”, Wiley-Blackwell
3. A Ravichandran , “Fundamentals of Information Technology”, Khanna Book
Publishing
Web Resources
1. https://testbook.com/learn/computer-fundamentals
2. https://www.tutorialsmate.com/2020/04/computer-fundamentals-tutorial.html
3. https://www.javatpoint.com/computer-fundamentals-tutorial
4. https://www.tutorialspoint.com/computer_fundamentals/index.htm
5. https://www.nios.ac.in/media/documents/sec229new/Lesson1.pdf
CO 1 3 3 3 3 3 3
CO 2 3 3 3 3 3 3
CO 3 3 3 3 3 3 3
CO 4 3 3 3 3 2 3
CO 5 3 3 2 3 3 2
Weightage of course 15 15 14 15 14 14
contributed to each
PSO
Category
Credits
Code
Exter
Total
CIA
nal
INTRODUCTION TO Specific 2 - - 2 25 75 10
HTML Elective 0
Learning Objectives
LO1 Insert a graphic within a web page.
LO2 Create a link within a web page.
LO3 Create a table within a web page.
LO4 Insert heading levels within a web page.
LO5 Insert ordered and unordered lists within a web page. Create a web page.
UNIT Contents No. Of.
Hours
I Introduction :Web Basics: What is Internet – Web browsers – What is
6
Web page – HTML Basics: Understanding tags.
II Tags for Document structure( HTML, Head, Body Tag). Block level
text elements: Headings paragraph(<p> tag) – Font style elements: 6
(bold, italic, font, small, strong, strike, big tags)
III Lists: Types of lists: Ordered, Unordered – Nesting Lists – Other tags:
6
Marquee, HR, BR- Using Images – Creating Hyperlinks.
IV Tables: Creating basic Table, Table elements, Caption – Table and cell
6
alignment – Rowspan, Colspan – Cell padding.
V Frames: Frameset – Targeted Links – No frame – Forms : Input,
Textarea, Select, Option. 6
TOTAL HOURS 30
Textbooks
1 “Mastering HTML5 and CSS3 Made Easy”, TeachUComp Inc., 2014.
2
Thomas Michaud, “Foundations of Web Design: Introduction to HTML & CSS”
Web Resources
1. https://www.teachucomp.com/samples/html/5/manuals/Mastering-HTML5-CSS3.pdf
2. https://www.w3schools.com/html/default.asp
Weightage of course 14 15 14 14 15 15
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Credits
Code
Inst.
Exter
Total
y
CIA
nal
CO 1 S M L M
CO 2 S M L M
CO 3 S M
CO 4 S M M L
CO 5 M L M
t Code
Category
Credits
External
Total
CIA
2. https://www.guru99.com/software-testing.html
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Code
Category
Credits
External
Total
CIA
Quantitative Aptitude Specific Y - - - 2 2 25
75 100
Elective
Course Objective
C1 To understand the basic concepts of numbers
C2 Understand and apply the concept of percentage, profit & loss
C3 To study the basic concepts of time and work, interests
C4 To learn the concepts of permutation, probability, discounts
C5 To study about the concepts of data representation, graphs
UNIT Details No. of Course
Hours Objective
I Numbers-HCF and LCM of numbers-Decimal
fractions-Simplification-Squareroot and cuberoots - 6 CO1
Average-problems on Numbers.
II Problems on Ages - Surds and Indices - percentage -
profits and loss - ratio and proportion-partnership- 6 CO2
Chainrule.
III Time and work - pipes and cisterns - Time and
Distance - problems on trains -Boats and streams -
simple interest - compound interest - Logarithms - 6 CO3
Area-Volume and surfacearea -races and
Gamesofskill.
IV Permutation and combination-probability-True
Discount-Bankers Discount – Height and Distances- 6 CO4
Oddmanout & Series.
V Calendar - Clocks - stocks and shares - Data
representation - Tabulation - BarGraphs-Piecharts- 6 CO5
Linegraphs.
Total 60
Course Outcomes Programme Outcome
CO On completion of this course, students will
1 understand the concepts, application and the problems of
PO1
numbers
2 To have basic knowledge and understanding about
PO1, PO2
percentage, profit & loss related processings
3 To understand the concepts of time and work PO4, PO6
4 Speaks about the concepts of probability, discount PO4, PO5, PO6
5 Understanding the concept of problem solving involved in
PO3, PO8
stocks & shares, graphs
Text Book
1 “QuantitativeAptitude”,R.S.AGGARWAL.,S.Chand&CompanyLtd.,
Reference Books
1.
Web Resources
1. https://www.javatpoint.com/aptitude/quantitative
2. https://www.toppr.com/guides/quantitative-aptitude/
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Code
Category
Credits
External
Total
CIA
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Code
Category
Credits
External
Total
CIA
Specific Y - - - 2 2 25 75 100
Advanced Excel Elective
Course Objective
C1 Handle large amounts of data
3 https://www.w3schools.com
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Marks
Inst. Hours
Category
Credits
Subject Code Subject Name L T P S
Externa
Total
CIA
Biometrics Specific Y - - - 2 2 25
75 100
Elective
Course Objectives
CO 1 S M L M
CO 2 S M L M
CO 3 S M
CO 4 S M M L
CO 5 M L M
Inst. Hours
Code
Category
Credits
External
Total
CIA
Cyber Forensics Specific Y - - - 2 2 25 75 100
Elective
Course Objective
C1 Understand the definition of computer forensics fundamentals.
C2 To study about the Types of Computer Forensics Evidence
C3 Understand and apply the concepts of Duplication and Preservation of Digital Evidence
C4 Understand the concepts of Electronic Evidence and Identification of Data
C5 To study about the Digital Detective, Network Forensics Scenario, Damaging
Computer Evidence.
UNIT Details No. of Hours Course
Objective
I Overview of Computer Forensics Technology: C1
Computer Forensics Fundamentals: What is
Computer Forensics? Use of Computer Forensics in
Law Enforcement, Computer Forensics Assistance to
Human Resources/Employment Proceedings,
Computer Forensics Services, Benefits of 6
professional Forensics Methodology, Steps taken by
Computer Forensics Specialists. Types of Computer.
Forensics Technology: Types of Business Computer
Forensic, Technology–Types of Military Computer
Forensic Technology–Types of Law Enforcement–
Computer Forensic. Technology–Types of Business
Computer Forensic Technology.
II Computer Forensics Evidence and capture: Data 6
Recovery: Data Recovery Defined, Data Back–up
and Recovery, The Role of Back –up in Data
Recovery, The Data –Recovery Solution. Evidence
Collection and Data Seizure: Collection Options,
C2
Obstacles, Types of Evidence, The Rules of
Evidence, Volatile Evidence, General Procedure,
Collection and Archiving, Methods of Collections,
Artefacts, Collection Steps, Controlling
Contamination: The chain of custody.
III Duplication and Preservation of Digital Evidence:
Processing steps, Legal Aspects of collecting and
Preserving Computer forensic Evidence. Computer
C3
image Verification and Authentication: Special needs 6
of Evidential Authentication, Practical Consideration,
Practical Implementation.
Text Book
1 John R. Vacca, “Computer Forensics: Computer Crime Investigation”, 3/E ,Firewall
Media, New Delhi, 2002.
Reference Books
1. Nelson, Phillips Enfinger, Steuart,“Computer Forensics and Investigations” Enfinger,
Steuart, CENGAGE Learning, 2004.
2. Anthony Sammes and Brian Jenkinson,”Forensic Computing: A Practitioner's
Guide”, Second Edition, Springer–Verlag London Limited, 2007.
3. .Robert M.Slade,” Software Forensics Collecting Evidence from the Scene of a Digital
Crime”, TMH 2005.
Web Resources
1. https://www.vskills.in
2. https://www.hackingarticles.in/best-of-computer-forensics-tutorials/
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Inst. Hours
Code
Category
Credits
External
Total
CIA
Pattern Recognition Specific Y - - - 2 2 75 25 100
Elective
Course Objective
CO1 To learn the fundamentals of Pattern Recognition techniques
CO2 To learn the various Statistical Pattern recognition techniques
CO3 To learn the linear discriminant functions and unsupervised learning and clustering
CO4 To learn the various Syntactical Pattern recognition techniques
CO5 To learn the Neural Pattern recognition techniques
UNIT Details No. of Course Objective
Hours
I PATTERN RECOGNITION OVERVIEW: Pattern
recognition, Classification and Description-Patterns and
6 CO1
feature Extraction with Examples-Training and
Learning in PR systems-Pattern recognition Approaches
II STATISTICAL PATTERN RECOGNITION: 6 CO2
Introduction to statistical Pattern Recognition-
supervised Learning using Parametric and Non-
Parametric Approaches.
III LINEAR DISCRIMINANT FUNCTIONS AND
UNSUPERVISED LEARNING AND CLUSTERING:
Introduction-Discrete and binary Classification
Problems-Techniques to directly Obtain linear 6 CO3
Classifiers - Formulation of Unsupervised Learning
Problems-Clustering for unsupervised learning and
classification
IV SYNTACTIC PATTERN RECOGNITION: Overview
of Syntactic Pattern Recognition-Syntactic recognition
via parsing and other grammars–Graphical Approaches 6 CO4
to syntactic pattern recognition-Learning via
grammatical inference.
V NEURAL PATTERN RECOGNITION: Introduction to
Neural Networks-Feedforward Networks and training
6 CO5
by Back Propagation-Content Addressable Memory
Approaches and Unsupervised Learning in Neural PR
Total
Course Outcomes Programme Outcomes
CO On completion of this course, students will
1 understand the concepts, importance, application and the
PO1
process of developing Pattern recognition over view
2 to have basic knowledge and understanding about parametric
PO1, PO2
and non-parametric related concepts.
3 To understand the framework of frames and bit images to
PO4, PO6
animations
4 Speaks about the multimedia projects and stages of
PO4, PO5, PO6
requirement in phases of project.
5 Understanding the concept of cost involved in multimedia
PO3, PO8
planning, designing, and producing
Text Book
1 Robert Schalkoff, “Pattern Recognition: Statistical Structural and Neural Approaches”,
John wiley & sons.
2 Duda R.O., P.E.Hart & D.G Stork, “ Pattern Classification”, 2nd Edition, J.Wiley.
3 Duda R.O.& Hart P.E., “Pattern Classification and Scene Analysis”, J.wiley.
4 Bishop C.M., “Neural Networks for Pattern Recognition”, Oxford University Press.
Reference Books
1. 1. Earl Gose, Richard johnsonbaugh, Steve Jost, “Pattern Recognition and Image
Analysis”, Prentice Hall of India, Pvt Ltd, New Delhi.
Web Resources
1. https://www.geeksforgeeks.org/pattern-recognition-introduction/
2. https://www.mygreatlearning.com/blog/pattern-recognition-machine-learning/
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Inst. Hours
Category
Credits
Subject Code Subject Name L T P S
External
Total
CIA
Enterprise Resource Specific Y - - - 4 4 25
Planning Elective 75 100
Course Objectives
CO1 To understand the basic concepts, Evolution and Benefits of ERP.
CO2 To know the need and Role of ERP in logical and Physical Integration.
Identify the important business functions provided by typical business
CO3 software such as enterprise resource planning and customer relationship
managemen
CO4 To train the students to develop the basic understanding of how ERP enriches
the business organizations in achieving a multidimensional growth
CO5 To aim at preparing the students technological competitive and make them
ready to self-upgrade with the higher technical skills
No. of
UNIT Details
Hours
ERP Introduction, Benefits, Origin, Evolution and Structure:
Conceptual Model of ERP, the Evolution of ERP, the Structure of
I 6
ERP, Components and needs of ERP, ERP Vendors; Benefits &
Limitations of ERP Packages.
Need to focus on Enterprise Integration/ERP; Information mapping;
Role of common shared Enterprise database; System Integration,
Logical vs. Physical System Integration, Benefits & limitations of
II System Integration, ERP’s Role in Logical and Physical Integration. 6
Business Process Reengineering, Data ware Housing, Data Mining,
Online Analytic Processing (OLAP), Product Life Cycle Man-
agement (PLM), LAP, Supply chain Management.
ERP Marketplace and Marketplace Dynamics: Market Overview,
Marketplace Dynamics, the Changing ERP Market. ERP- Functional
Modules: Introduction, Functional Modules of ERP Software,
III 6
Integration of ERP, Supply chain and Customer Relationship
Applications. Cloud and Open Source, Management, Material
Management, Financial Module, CRM and Case Study.
ERP Implementation Basics, , ERP implementation Strategy, ERP
Implementation Life Cycle ,Pre- Implementation task,Role of
IV 6
SDLC/SSAD, Object Oriented Architecture, Consultants, Vendors
and Employees.
ERP & E-Commerce, Future Directives- in ERP, ERP and Internet,
Critical success and failure factors, Integrating ERP into or-
V 6
ganizational culture. Using ERP tool: either SAP or ORACLE
format to case study.
Total 30
Course Outcomes
Course
Outcomes On completion of this course, students will;
Credits
External
Total
CIA
Total
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
1 Describe the different physical forms of robot architectures. PO1
2 Kinematically model simple manipulator and mobile robots. PO1, PO2
3 Mathematically describe a kinematic robot system PO4, PO6
4 Analyze manipulation and navigation problems using knowledge of
coordinate frames, kinematics, optimization, control, and uncertainty. PO4, PO5, PO6
Text Book
1 RicharedD.Klafter. Thomas Achmielewski and MickaelNegin, Robotic Engineering and
Integrated Approach, Prentice Hall India-Newdelhi-2001
2 SaeedB.Nikku, Introduction to robotics, analysis, control and applications, Wiley-India, 2 nd
edition 2011
Reference Books
1. Industrial robotic technology-programming and application by M.P.Groover et.al,
McGrawhill2008
2. Robotics technology and flexible automation by S.R.Deb, THH-2009
Web Resources
1. https://www.tutorialspoint.com/artificial_intelligence/artificial_intelligence_robotics.htm
2. https://www.geeksforgeeks.org/robotics-introduction/
Credits
Total
CIA
Total 30
Course Outcomes
Course
On completion of this course, students will; Programme Outcomes
Outcomes
Inst. Hours
Category
External
Total
CIA
Specific
Organizational Behaviour Y - - - 2 2 25 75 100
Elective
Learning Objectives
LO1 To have extensive knowledge onOB and the scope of OB.
LO2 To create awareness of Individual Benaviour.
LO3 To enhance the understanding of Group Behaviour
LO4 To know the basics of Organisaitonal Culture and Organisational Structure
LO5 To understand Organisational Change, Conflict and Power
UNIT Details No. of Hours
INTRODUCTION : Concept of Organizational Behavior (OB):
Nature, Scope and Role of OB: Disciplines that contribute to OB;
Opportunities for OB (Globalization, Indian workforce diversity,
I 6
customer service, innovation and change, networked
organizations, work-life balance, people skills, positive work
environment, ethics)
INDIVIDUAL BEHAVIOUR:
1. Learning, attitude and Job satisfaction: Concept of learning,
conditioning, shaping and reinforcement. Concept of attitude,
components, behavior and attitude. Job satisfaction: causation;
impact of satisfied employees on workplace.
2. Motivation : Concept; Theories (Hierarchy of needs, X and Y,
Two factor, McClelland, Goal setting, Self-efficacy, Equity
II 6
theory); Job characteristics model; Redesigning jobs,
3. Personality and Values : Concept of personality; Myers-Briggs
Type Indicator (MBTI); Big Five model. Relevance of values;
Linking personality and values to the workplace (person-job fit,
person-organization fit)
4. Perception, Decision Making : Perception and Judgements;
Factors; Linking perception to individual decision making:
GROUP BEHAVIOUR : 1. Groups and Work Teams : Concept :
Five Stage model of group development; Group norms,
cohesiveness ; Group think and shift ; Teams; types of teams;
III Creating team players from individuals and team based 6
work(TBW) 2. Leadership : Concept; Trait theories; Behavioral
theories (Ohio and Michigan studies); Contingency theories
(Fiedler, Hersey and Blanchard, Path-Goal);
ORGANISATIONAL CULTURE AND STRUCTURE :
Concept of culture; Impact (functions and liability); Creating and
IV 6
sustaining culture: Concept of structure, Prevalent organizational
designs: New design options
ORGANISATIONAL CHANGE, CONFLICT AND POWER:
Forces of change; Planned change; Resistance; Approaches
V (Lewin's model, Organisational development);. Concept of 6
conflict, Conflict process; Types, Functional/ Dysfunctional.
Introduction to power and politics.
30
Course
On Completion of the course the students will
Outcomes
CO1 To define OrganisationalBehaviour, Understand the opportunity through OB.
To apply self-awareness, motivation, leadership and learning theories at
CO2
workplace.
CO3 To analyze the complexities and solutions of group behaviour.
CO4 To impact and bring positive change in the culture of the organisaiton.
CO5 To create a congenial climate in the organization.
Reading List
NeharikaVohra Stephen P. Robbins, Timothy A. Judge , Organizational
1.
Behaviour, Pearson Education, 18th Edition, 2022.
2. Fred Luthans, Organizational Behaviour, Tata McGraw Hill, 2017.
Ray French, Charlotte Rayner, Gary Rees & Sally Rumbles, Organizational
3.
Behaviour, John Wiley & Sons, 2011
Louis Bevoc, Allison Shearsett, Rachael Collinson, Organizational Behaviour
4.
Reference, Nutri Niche System LLC (28 April 2017)
Dr. Christopher P. Neck, Jeffery D. Houghton and Emma L. Murray,
5. Organizational Behaviour: A Skill-Building Approach, SAGE Publications, Inc;
2nd edition (29 November 2018).
References Books
Uma Sekaran, Organizational Behaviour Text & cases, 2nd edition, Tata McGraw
1.
Hill Publishing CO. Ltd
GangadharRao, Narayana, V.S.P Rao, Organizational Behaviour 1987, Reprint
2.
2000, Konark Publishers Pvt. Ltd, 1st edition
3. S.S. Khanka, Organizational Behaviour, S. Chand & Co, New Delhi.
4. J. Jayasankar, Organizational Behaviour, Margham Publications, Chennai, 2017.
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S