Course Outcomes:: 19-202-0708 Mobile Application Development
Course Outcomes:: 19-202-0708 Mobile Application Development
Course Outcomes:
On completion of this course the student will be able to:
1. Outline the architectures and infrastructure used in Mobile application development.
2. Identify user interface and client applications.
3. Evaluate the security issues involved in Mobile application development.
4. Design and develop android and iOS applications.
Module I
Introduction-Mobility, Developing Mobile Applications. Mobile application architectures-
Client-Server, Client, Server, Connection-types, synchronization. Mobile Infrastructure-Mobile
Device Types, Mobile Device Components, Connection Methods.
Module II
Mobile client user interface-User interface, Application content, User experience. Mobile Client
Applications- Thin client, Fat Client, Web page hosting. Client-Server data transfer-HTTP and
HTML, WAP and WML.
Module III
Mobilizing Existing Application Architectures-Evolution of Enterprise Architectures, Anatomy
of Enterprise Web Architecture. Security- Mobilized Enterprise Web Architecture, User to
Mobile client security issues, Mobile client security issues, client-server communication security
issues, existing web architectures and back-end systems security issues.
Module IV
Developing android app-Using eclipse for android development, android navigation and
interface design, persistent data in android, lists in android, maps and locations in android,
access to hardware and sensors in android. Developing iOS app- Using Xcode for iOS
development, iOS navigation and interface design, persistent data, tables, maps and locations,
access to hardware and sensors in iOS
References:
1. Valentino Lee, Heather Schneider and Robbie Schell, Mobile Applications: Architecture,
Design and Development, Prentice Hall, 2004.
2. Jakob Iversen and Michael Eierman, Learning Mobile App Development, A hands-on
Guide to building apps with iOS and android, Addison-wesley,2014.
3. Dawn Griffiths, Head First Android Development, O'Reilly Media, Inc, 2015.
4. Jeff McWherter, Scott Gowell, “Professional Mobile Application Development” , Wiley
India Private Limited
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)
Course Outcomes:
On completion of this course, students will be able to:
1. Understand the basic principles underlying in the management of organizations.
2. Familiarize with all Industrial management functions.
3. Analyse the financial statements and ratios.
4. Understand the basic concept of economics and Intellectual property rights.
Module I
Basic concept of Management: Introduction, definitions of managements, characteristics of
management, levels of management, management skills, Scientific management, Contributions
of Gilbreth and Gantt.
Functions of Management: Planning, forecasting, organizing, staffing, directing, motivating,
controlling, co-coordinating, communicating, decision making.
Organization: Introduction, definition of organization, elements of organization, process of
organization, principles of organization, formal and informal organization, organization structure,
types of organization structure.
Forms of Business Organization: Concept of ownership organization, types of ownership,
Individual ownership, partnership, joint stock company, private and limited company, co-
operative organizations, state ownership, public corporation.
Module II
Production planning and control: Objectives and functions.
Production management: Structure, objectives, productivity index, modern productivity
improvement techniques.
Inventory Management: Functions, classifications of inventory, basic inventory models,
inventory costs, Economic order quantity (EOQ).
Materials Requirement Planning: Objectives, Functions and methods.
Project Management: Functions, Characteristics, Feasibility studies, Project network analysis-
PERT / CPM.
Module III
Human Resource Management: Introduction, definition, objectives, characteristics, functions,
principles and organization of HR management, Recruitment, selection process and training
methods, Wages and incentives, Job evaluation and merit rating, Industrial accidents causes and
related issues.
Marketing Management: Introduction, Functions and objectives, Marketing environment and
Information, Market segmentation, Distribution channels, Consumer and Industrial markets,
Consumer behaviour, Pricing methods, Sales promotion and Advertisement. Market research:
Objectives and methods.
Module IV
Financial Management: Basic functions, Capital classifications, Sources of funds, Financial
accounts types, basic concepts and importance, Financial ratios and its significance, Types of
budgets and budgetary controls, Overheads, Standard costing, Marginal costing.
83
Division of Information Technology
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)
Economics: Principles of economics, problem of scarcity, demand, supply, utility, time value of
money, inflation and deflation, Consumer Demand Curve.
IPR Aspects: General introduction to IPR, eligibility for patent, patent information and prior art
search, procedure for filing patent application, rights of patent owner and duration, ownership of
patent and commercialization.
References:
1. Fraidoon Mazda. (1997). Engineering Management. Addison Wesley,
2. Koontz and O’Donnell. (1978). Essentials of Management. McGraw Hill
3. Kotler P.(2011). Marketing Management. Prentice Hall.
4. Prasanna Chandra. (2008). Finance Management. Tata McGraw Hill.
5. Monks, J. G.(1982). Operations Management. McGraw Hill.
6. Production and Operations Management. PHI(2010)
84
Division of Information Technology
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)
Module I
Introduction: Security basics, Aspects of network security, Attacks Different types, Security
attacks.
Cryptography: Basic Encryption and Decryption, Classical encryption techniques, symmetric
encryption, substitution ciphers, Caesar cipher, Monoalphabetic Cipher, Playfair Cipher,
Polyalphabetic cipher, Vigenère Cipher, Transposition ciphers
Module II
Modern Block Ciphers, Feistel Networks, DES Algorithm, Avalanche Effect.
Introduction to Number Theory, Prime Factorisation, Fermat's Theorem, Euler's Theorem,
Primitive Roots, Discrete Logarithms.
Public key Cryptography, Principles of Public key Cryptography Systems, RSA algorithms
Module III
Key Management: General aspects of key management, key distribution for asymmetrical
systems, Diffie Hellman Key Exchange. Message Authentication Requirements, Authentication
functions, Message authentication codes, Hash functions, Secure Hash Algorithm
Module IV
Digital signatures protocols: Digital signature standards, Digital Certificates
System Security: Intruders, Intrusion Detection, Password Management, Viruses and Related
Threats, Virus Counter measure.
References:
1. William Stallings. (2006). Cryptography and Network Security Principles and
Practices. Pearson Education.
2. Charles P. Pflieger. (2005). Security in Computing. Pearson Education.
3. Behrouz A. Forouzan, Dedeep Mukhopadhyay. (2010.) Cryptography & Network
Security, Second Edition, Tata McGraw Hill, New Delhi,
4. Jan C A, “Basic Methods of Cryptography”,Cambridge University Press.
5. Thomas Calabrese, “Information Security Intelligence: Cryptographic Principles &
Applications”. Thomson Learning,
85
Division of Information Technology
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)
Course Outcomes:
On completion of this course the student will be able to :
1. Understand the fundamental principles that underline the computer graphics algorithms.
2. Develop and implement two and three dimensional graphical structures.
3. Design two and three dimensional graphical structures.
4. Implement graphics programming using OpenGL.
5. Understand computer animation.
Module I
Overview of graphic systems: Computer-Aided Design, Virtual Reality Environments, Data
Visualization, Computer art, Entertainment, Education and Training, Visualization, Image
Processing, Graphical User Interfaces.
Points and Lines, Line drawing algorithms, Circle Generation algorithms, Ellipse generating
algorithms, Parallel curve algorithms, Attributes of output primitives.
Module II
Basic transformations, Matrix representations and homogeneous co-ordinates, Composite
transformations, Raster methods for transformations.
The viewing Pipe Line, Viewing Co-ordinate reference frame, Window to viewport co-ordinate
transformation, 2D viewing functions, Clipping operations.
Module III
Transformation, Rotation scaling, Other transformations, composite Transformations, 3D
Transformation functions, Modeling and co-ordinate transformations, 3D Viewing concepts. 3D
Display methods, 3D Graphics packages.
Polygon surfaces, Curved lines and surfaces, spline representations, Bezier curves and surfaces,
B spline curves and surfaces, Beta splines, Relational splines, Conversion between spline
representations, Displaying spline curves, Sweep representations.
Module IV
Constructive Solid Geometry Methods, Octrees, BSP trees, Fractal Geometry methods.
OpenGL primitives Functions, pipeline, event handling and view manipulations
Classification of visible surface detection algorithms, Back face detection, Depth Buffer method,
A-Buffer method, Scan Line method, Depth Sorting method, BSP Tree method, Area subdivision
method, Octree methods, Ray Casting methods, Curved surfaces, Wireframe methods, Visibility
Detection functions, Illumination models and surface rendering methods, colour applications,
Computer Animation.
Graphics Card: Processing on the Graphics Card, Graphics Pipeline, NVDIA CUDA Libraries
References:
1. Hearn, D., & Baker, M. (2011). "Computer graphics with OpenGL (4th ed., International
ed.). Upper Saddle River, N.J.: Pearson Education.
2. Hughes, J. (2013). Computer graphics: Principles and practice (3rd ed.). Addison Wesley.
3. Foley, van Dam, Feiner & Hughes, Computer Graphics Principles & Practice.
4. Hill, F., & Kelley, S. (2007). Computer graphics: Using OpenGL (3rd ed.). Upper Saddle
River, NJ: Pearson Prentice Hall.
86
Division of Information Technology
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)
References
1. Kimberly Graves, "Certified Ethical Hacker", Wiley India Pvt Ltd, 2010
2. Michael T. Simpson, "Hands on Ethical Hacking & Network Defense", Course
Technology, 2010
3. Rajat Khare, "Network Security and Ethical Hacking", Luniver Press, 2006
4. Ramachandran V, "BackTrack 5 Wireless Penetration Testing Beginner’s Guide" (3rd
ed.). Packt Publishing, 2011
5. Thomas Mathew, "Ethical Hacking", OSB publishers, 2003
90
Division of Information Technology
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)
19-204-0714 Entrepreneurship Development
Course Outcomes:
On completion of this course, students will be able to :
1. Develop awareness about the importance of entrepreneurship opportunities available in
the society
2. Get acquainted with the challenges faced by the entrepreneur
Exercises:
1. To study the types of entrepreneurs and the factors affecting entrepreneurial growth.
2. To make an assessment of the major motives influencing an entrepreneur
3. To make an overview of the various stress management techniques
4. How to identify and select a good business opportunity?
5. Preparation of a techno economic feasibility report for a given project
6. Preparation of a preliminary project report for a given project
7. To identify the various sources of finance and management of working capital
8. Carry out the costing and break even analysis of a proposed project
9. Preparation of a PERT / CPM chart for the various activities involved in a project
10. To make a study of the various causes and consequences of sickness in small business
and identify corrective measures.
References:
1. Roy, R. (2011). Entrepreneurship (2nd ed.) Oxford University Press. Oxford.
2. Gordon, E., & Natarajan, K. (2009). Entrepreneurship development. Himalaya Pub.
House. India.
3. Coulter, M. (2001). Entrepreneurship in action. Prentice Hall. Upper Saddle River, N.J.
4. Jain, P. (1998). Handbook for new entrepreneurs. Oxford University Press. Delhi.
5. Khanka, S. (2010). Entrepreneurial development S.S. Khanka. S.Chand&.Co, New Delhi,
India.
97
Division of Information Technology
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)
Course Outcomes:
On completion of this course the student will be able to :
1. Implement image manipulation and enhancement.
2. Create animations.
3. Develop applications using GPU.
4. Create 3D graphical scenes using open graphics library suites.
References :
1. Hearn, D., & Baker, M. (2011). Computer graphics with OpenGL (4th ed., International
ed.). Upper Saddle River, N.J.: Pearson Education.
2. Hughes, J. (2013). Computer graphics: Principles and practice (3rd ed.). Addison Wesley.
3. Hill, F., & Kelley, S. (2007). Computer graphics: Using OpenGL (3rd ed.). Upper Saddle
River, NJ: Pearson Prentice Hall
95
Division of Information Technology
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)
19-204-0713 Mini Project - Multimedia Project
Course Outcomes:
On completion of this course the student will be able to :
1. Use current techniques, skill and tools necessary for animation, Frame and Video
Capturing and special Effects Authoring and Presentation and will be able to work in a
team in the atmosphere of a professional industry.
2. Implement Multimedia project involving Interactive Computer Graphics technology,
working with audio and video capturing.
Projects can be done using software’s like Blender with Python scripting, OpenCV, Kinect,
OpenGL, DirectX etc.
96
Division of Information Technology
CUSAT B.TECH Degree Course _ Information Technology _Scheme & Syllabus (2019 admission onwards)
19-204-0715 Project Phase I
Course Outcomes:
On completion of this course a student will be able to:
1. Conduct literature survey in a relevant area of one’s course of study and finally identify
and concentrate on a particular problem.
2. Formulate a project proposal through extensive study of literature and / or discussion
with learned resource persons in industry and around.
3. Generate a proper execution plan of the project work to be carried out in Phase II through
thorough deliberations and improve presentation skills
4. The major project work shall commence in the seventh semester and completed by the
end of eighth semester. Students are expected to identify a suitable project and complete
the analysis and design phases by the end of seventh semester.
Each batch comprising of 3 to 5 students shall identify a project related to the curriculum of
study. At the end of the semester, each student shall submit a project synopsis comprising of the
following.
Note:
Points (1)-(2) to be evaluated by the respective project guides and project coordinator based
on continuous evaluation.
Points (3)-(5) to be evaluated by the final evaluation team comprising of 3 internal examiners
including the project guide.
98
Division of Information Technology