0% found this document useful (0 votes)
62 views19 pages

Third Year Syllabus

The document discusses an embedded systems and IoT course. The course objectives are to learn about embedded processors and interfacing I/O devices, understand the evolution of IoT, and build small embedded and IoT systems using platforms like Arduino and Raspberry Pi. The course covers topics like 8-bit processors, interfacing devices, IoT concepts, and a project.

Uploaded by

Pradeebha R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views19 pages

Third Year Syllabus

The document discusses an embedded systems and IoT course. The course objectives are to learn about embedded processors and interfacing I/O devices, understand the evolution of IoT, and build small embedded and IoT systems using platforms like Arduino and Raspberry Pi. The course covers topics like 8-bit processors, interfacing devices, IoT concepts, and a project.

Uploaded by

Pradeebha R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

REFERENCES

1. George Coulouris, Jean Dollimore, Time Kindberg, “Distributed Systems Concepts and
Design”, Fifth Edition, Pearson Education, 2012.
2. Pradeep L Sinha, “Distributed Operating Systems: Concepts and Design”, Prentice Hall of
India, 2007.
3. Tanenbaum A S, Van Steen M, “Distributed Systems: Principles and Paradigms”, Pearson
Education, 2007.
4. Liu M L, “Distributed Computing: Principles and Applications”, Pearson Education, 2004.
5. Nancy A Lynch, “Distributed Algorithms”, Morgan Kaufman Publishers, 2003.
6. Arshdeep Bagga, Vijay Madisetti, “ Cloud Computing: A Hands-On Approach”, Universities
Press, 2014.

CO’s-PO’s & PSO’s MAPPING


CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 3 3 1 - - - 2 1 3 3 2 1 1
2 1 3 2 1 2 - - - 2 2 2 2 1 3 2
3 2 2 1 3 3 - - - 3 2 1 1 1 2 1
4 1 2 2 3 1 - - - 3 3 2 1 3 1 1
5 3 3 1 2 3 - - - 3 3 3 1 3 2 3
AVg. 1.8 2.4 1.8 2.4 2 - - - 2.6 2.2 2.2 1.6 2 1.8 1.6
1 - low, 2 - medium, 3 - high, ‘-“- no correlation

CCS356 OBJECT ORIENTED SOFTWARE ENGINEERING LTPC


3 024
COURSE OBJECTIVES:
 To understand Software Engineering Lifecycle Models
 To Perform software requirements analysis
 To gain knowledge of the System Analysis and Design concepts using UML.
 To understand software testing and maintenance approaches
 To work on project management scheduling using DevOps

UNIT I SOFTWARE PROCESS AND AGILE DEVELOPMENT 9


Introduction to Software Engineering, Software Process, Perspective and Specialized Process
Models –Introduction to Agility-Agile process-Extreme programming-XP Process-Case Study.

UNIT II REQUIREMENTS ANALYSIS AND SPECIFICATION 9


Requirement analysis and specification – Requirements gathering and analysis – Software
Requirement Specification – Formal system specification – Finite State Machines – Petrinets –
Object modelling using UML – Use case Model – Class diagrams – Interaction diagrams – Activity
diagrams – State chart diagrams – Functional modelling – Data Flow Diagram- CASE TOOLS.

UNIT III SOFTWARE DESIGN 9


Software design – Design process – Design concepts – Coupling – Cohesion – Functional
independence – Design patterns – Model-view-controller – Publish-subscribe – Adapter – Command
– Strategy – Observer – Proxy – Facade – Architectural styles – Layered - Client Server - Tiered -
Pipe and filter- User interface design-Case Study.
100
UNIT IV SOFTWARE TESTING AND MAINTENANCE 9
Testing – Unit testing – Black box testing– White box testing – Integration and System testing–
Regression testing – Debugging - Program analysis – Symbolic execution – Model Checking-Case
Study

UNIT V PROJECT MANAGEMENT 9


Software Project Management- Software Configuration Management - Project Scheduling- DevOps:
Motivation-Cloud as a platform-Operations- Deployment Pipeline:Overall Architecture Building and
Testing-Deployment- Tools- Case Study

COURSE OUTCOMES:
CO1: Compare various Software Development Lifecycle Models
CO2: Evaluate project management approaches as well as cost and schedule estimation
strategies.
CO3: Perform formal analysis on specifications.
CO4: Use UML diagrams for analysis and design.
CO5: Architect and design using architectural styles and design patterns, and test the system
45 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
LIST OF EXPERIMENTS:
1. Identify a software system that needs to be developed.
2. Document the Software Requirements Specification (SRS) for the identified system.
3. Identify use cases and develop the Use Case model.
4. Identify the conceptual classes and develop a Domain Model and also derive a Class
Diagram from that.
5. Using the identified scenarios, find the interaction between objects and represent them using
UML Sequence and Collaboration Diagrams
6. Draw relevant State Chart and Activity Diagrams for the same system.
7. Implement the system as per the detailed design
8. Test the software system for all the scenarios identified as per the usecase diagram
9. Improve the reusability and maintainability of the software system by applying appropriate
design patterns.
10. Implement the modified system and test it for various scenarios.

SUGGESTED DOMAINS FOR MINI-PROJECT:


1. Passport automation system.
2. Book bank
3. Exam registration
4. Stock maintenance system.
5. Online course reservation system
6. Airline/Railway reservation system
7. Software personnel management system
8. Credit card processing
9. e-book management system
10. Recruitment system
11. Foreign trading system
12. Conference management system

101
13. BPO management system
14. Library management system
15. Student information system
TOTAL:75 PERIODS
TEXT BOOKS
1. Bernd Bruegge and Allen H. Dutoit, “Object-Oriented Software Engineering: Using UML,
Patterns and Java”, Third Edition, Pearson Education, 2009.
2. Roger S. Pressman, Object-Oriented Software Engineering: An Agile Unified Methodology,
First Edition, Mc Graw-Hill International Edition, 2014.

REFERENCES
1. Carlo Ghezzi, Mehdi Jazayeri, Dino Mandrioli, Fundamentals of Software Engineering, 2nd
edition, PHI Learning Pvt. Ltd., 2010.
2. Craig Larman, Applying UML and Patterns, 3rd ed, Pearson Education, 2005.
3. Len Bass, Ingo Weber and Liming Zhu, “DevOps: A Software Architect‘s Perspective”,
Pearson Education, 2016
4. Rajib Mall, Fundamentals of Software Engineering, 3rd edition, PHI Learning Pvt. Ltd., 2009.
5. Stephen Schach, Object-Oriented and Classical Software Engineering, 8th ed, McGraw-Hill,
2010.

CO’s-PO’s & PSO’s MAPPING


PO’s PSO’s
CO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 1 2 2 - - - - 1 1 2 2 2 1
2 2 3 2 3 2 - - - 2 2 3 2 3 2 1
3 2 3 2 1 1 - - - 2 2 3 2 2 3 1
4 2 3 2 2 3 - - - 2 2 3 2 2 3 1
5 2 3 1 2 2 - - - - - - 1 3 2 2
AVg. 2 2 1 2 2 - - - - 1 1 2 2 2 1
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

CS3691 EMBEDDED SYSTEMS AND IOT L T P C


3 0 2 4
COURSE OBJECTIVES:
 To learn the internal architecture and programming of an embedded processor.
 To introduce interfacing I/O devices to the processor.
 To introduce the evolution of the Internet of Things (IoT).
 To build a small low-cost embedded and IoT system using Arduino/Raspberry Pi/ open
platform.
 To apply the concept of Internet of Things in real world scenario.

UNIT I 8-BIT EMBEDDED PROCESSOR 9


8-Bit Microcontroller – Architecture – Instruction Set and Programming – Programming Parallel Ports
– Timers and Serial Port – Interrupt Handling.

102
13. BPO management system
14. Library management system
15. Student information system
TOTAL:75 PERIODS
TEXT BOOKS
1. Bernd Bruegge and Allen H. Dutoit, “Object-Oriented Software Engineering: Using UML,
Patterns and Java”, Third Edition, Pearson Education, 2009.
2. Roger S. Pressman, Object-Oriented Software Engineering: An Agile Unified Methodology,
First Edition, Mc Graw-Hill International Edition, 2014.

REFERENCES
1. Carlo Ghezzi, Mehdi Jazayeri, Dino Mandrioli, Fundamentals of Software Engineering, 2nd
edition, PHI Learning Pvt. Ltd., 2010.
2. Craig Larman, Applying UML and Patterns, 3rd ed, Pearson Education, 2005.
3. Len Bass, Ingo Weber and Liming Zhu, “DevOps: A Software Architect‘s Perspective”,
Pearson Education, 2016
4. Rajib Mall, Fundamentals of Software Engineering, 3rd edition, PHI Learning Pvt. Ltd., 2009.
5. Stephen Schach, Object-Oriented and Classical Software Engineering, 8th ed, McGraw-Hill,
2010.

CO’s-PO’s & PSO’s MAPPING


PO’s PSO’s
CO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 1 2 2 - - - - 1 1 2 2 2 1
2 2 3 2 3 2 - - - 2 2 3 2 3 2 1
3 2 3 2 1 1 - - - 2 2 3 2 2 3 1
4 2 3 2 2 3 - - - 2 2 3 2 2 3 1
5 2 3 1 2 2 - - - - - - 1 3 2 2
AVg. 2 2 1 2 2 - - - - 1 1 2 2 2 1
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

CS3691 EMBEDDED SYSTEMS AND IOT L T P C


3 0 2 4
COURSE OBJECTIVES:
 To learn the internal architecture and programming of an embedded processor.
 To introduce interfacing I/O devices to the processor.
 To introduce the evolution of the Internet of Things (IoT).
 To build a small low-cost embedded and IoT system using Arduino/Raspberry Pi/ open
platform.
 To apply the concept of Internet of Things in real world scenario.

UNIT I 8-BIT EMBEDDED PROCESSOR 9


8-Bit Microcontroller – Architecture – Instruction Set and Programming – Programming Parallel Ports
– Timers and Serial Port – Interrupt Handling.

102
UNIT II EMBEDDED C PROGRAMMING 9
Memory And I/O Devices Interfacing – Programming Embedded Systems in C – Need For RTOS –
Multiple Tasks and Processes – Context Switching – Priority Based Scheduling Policies.

UNIT III IOT AND ARDUINO PROGRAMMING 9


Introduction to the Concept of IoT Devices – IoT Devices Versus
Computers – IoT Configurations – Basic Components – Introduction to Arduino – Types of Arduino
– Arduino Toolchain – Arduino Programming Structure – Sketches – Pins – Input/Output From Pins
Using Sketches – Introduction to Arduino Shields – Integration of Sensors and Actuators with
Arduino.

UNIT IV IOT COMMUNICATION AND OPEN PLATFORMS 9


IoT Communication Models and APIs – IoT Communication Protocols – Bluetooth – WiFi – ZigBee
– GPS – GSM modules – Open Platform (like Raspberry Pi) – Architecture – Programming –
Interfacing – Accessing GPIO Pins – Sending and Receiving Signals Using GPIO Pins – Connecting
to the Cloud.

UNIT V APPLICATIONS DEVELOPMENT 9


Complete Design of Embedded Systems – Development of IoT Applications – Home Automation –
Smart Agriculture – Smart Cities – Smart Healthcare.

45 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
1. Write 8051 Assembly Language experiments using simulator.
2. Test data transfer between registers and memory.
3. Perform ALU operations.
4. Write Basic and arithmetic Programs Using Embedded C.
5. Introduction to Arduino platform and programming
6. Explore different communication methods with IoT devices (Zigbee, GSM, Bluetooth)
7. Introduction to Raspberry PI platform and python programming
8. Interfacing sensors with Raspberry PI
9. Communicate between Arduino and Raspberry PI using any wireless medium
10. Setup a cloud platform to log the data
11. Log Data using Raspberry PI and upload to the cloud platform
12. Design an IOT based system

COURSE OUTCOMES:
CO1: Explain the architecture of embedded processors.
CO2: Write embedded C programs.
CO3: Design simple embedded applications.
CO4: Compare the communication models in IOT
CO5: Design IoT applications using Arduino/Raspberry Pi /open platform.
TOTAL :75 PERIODS
TEXTBOOKS
1. Muhammed Ali Mazidi, Janice Gillispie Mazidi, Rolin D. McKinlay, “The 8051 Microcontroller
and Embedded Systems”, Pearson Education, Second Edition, 2014

103
2. Robert Barton, Patrick Grossetete, David Hanes, Jerome Henry, Gonzalo Salgueiro, “IoT
Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of
Things”, CISCO Press, 2017.

REFERENCES
1. Michael J. Pont, “Embedded C”, Pearson Education, 2007.
2. Wayne Wolf, “Computers as Components: Principles of Embedded Computer System
Design”, Elsevier, 2006.
3. Andrew N Sloss, D. Symes, C. Wright, “Arm System Developer's Guide”, Morgan Kauffman/
Elsevier, 2006.
4. Arshdeep Bahga, Vijay Madisetti, “Internet of Things – A hands-on approach”, Universities
Press, 2015

CO’s-PO’s & PSO’s MAPPING


CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 3 - - - - 1 2 3 3 2 1 3
2 2 1 3 2 2 - - - 1 2 2 3 3 1 3
3 3 1 3 3 1 - - - 1 2 1 1 1 3 3
4 3 2 3 2 1 - - - 1 2 2 3 2 2 1
5 2 3 3 2 2 - - - 1 3 3 2 3 1 3
AVg. 2.6 2 3 2.4 1.5 - - - 1 2.2 2.2 2.4 2.2 1.6 2.6
1 - low, 2 - medium, 3 - high, ‘-“- no correlation

NCC Credit Course Level 3*


NX3651 (ARMY WING) NCC Credit Course - III L T P C
3 0 0 3

PERSONALITY DEVELOPMENT 9
PD 3 Group Discussion: Team Work 2
PD 4 Career Counselling, SSB Procedure & Interview Skills 3
PD 5 Public Speaking 4

BORDER & COASTAL AREAS 4


BCA 2 Security Setup and Border/Coastal management in the area 2
BCA 3 Security Challenges & Role of cadets in Border management 2

ARMED FORCES 3
AF 2 Modes of Entry to Army, CAPF, Police 3

COMMUNICATION 3
C1 Introduction to Communication & Latest Trends 3

INFANTRY 3
INF 1 Organisation of Infantry Battalion & its weapons 3

104
9. Develop AR enabled simple applications like human anatomy visualization, DNA/RNA
structure visualization and surgery simulation.
10. Develop simple MR enabled gaming applications.

COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1: Understand the basic concepts of AR and VR
CO2:Understand the tools and technologies related to AR/VR
CO3:Know the working principle of AR/VR related Sensor devices
CO4:Design of various models using modeling techniques
CO5:Develop AR/VR applications in different domains
TOTAL:60 PERIODS
TEXTBOOKS:
1. Charles Palmer, John Williamson, “Virtual Reality Blueprints: Create compelling VR
experiences for mobile”, Packt Publisher, 2018
2. Dieter Schmalstieg, Tobias Hollerer, “Augmented Reality: Principles & Practice”, Addison
Wesley, 2016
3. John Vince, “Introduction to Virtual Reality”, Springer-Verlag, 2004.
4. William R. Sherman, Alan B. Craig: Understanding Virtual Reality – Interface, Application,
Design”, Morgan Kaufmann, 2003

CO’s-PO’s & PSO’s MAPPING


CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 2 - 3 - - - 2 2 1 2 2 1 2
2 3 2 2 1 3 - - - 3 2 2 3 3 1 2
3 3 3 2 2 3 - - - 3 2 1 2 3 2 2
4 3 3 3 2 3 - - - 3 2 2 3 3 2 2
5 3 3 3 3 3 - - - 3 3 3 3 3 3 3
AVg. 3.00 2.60 2.40 2.00 3.00 - - - 2.80 2.20 1.80 2.60 2.80 1.80 2.20
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

CCS352 MULTIMEDIA AND ANIMATION LTPC


2 023
COURSE OBJECTIVES:
 To grasp the fundamental knowledge of Multimedia elements and systems
 To get familiar with Multimedia file formats and standards
 To learn the process of Authoring multimedia presentations
 To learn the techniques of animation in 2D and 3D and for the mobile UI
 To explore different popular applications of multimedia

UNIT I INTRODUCTION TO MULTIMEDIA 6


Definitions, Elements, Multimedia Hardware and Software, Distributed multimedia systems,
challenges: security, sharing / distribution, storage, retrieval, processing, computing. Multimedia
metadata, Multimedia databases, Hypermedia, Multimedia Learning.

165
UNIT II MULTIMEDIA FILE FORMATS AND STANDARDS 6
File formats – Text, Image file formats, Graphic and animation file formats, Digital audio and Video
file formats, Color in image and video, Color Models. Multimedia data and file formats for the web.

UNIT III MULTIMEDIA AUTHORING 6


Authoring metaphors, Tools Features and Types: Card and Page Based Tools, Icon and Object
Based Tools, Time Based Tools, Cross Platform Authoring Tools, Editing Tools,
Painting and Drawing Tools, 3D Modeling and Animation Tools, Image Editing Tools,
audio Editing Tools, Digital Movie Tools, Creating interactive presentations, virtual learning,
simulations.

UNIT IV ANIMATION 6
Principles of animation: staging, squash and stretch, timing, onion skinning, secondary action, 2D,
2 ½ D, and 3D animation, Animation techniques: Keyframe, Morphing, Inverse Kinematics, Hand
Drawn, Character rigging, vector animation, stop motion, motion graphics, , Fluid Simulation,
skeletal animation, skinning Virtual Reality, Augmented Reality.

UNIT V MULTIMEDIA APPLICATIONS 6


Multimedia Big data computing, social networks, smart phones, surveillance, Analytics, Multimedia
Cloud Computing, Multimedia streaming cloud, media on demand, security and forensics, Online
social networking, multimedia ontology, Content based retrieval from digital libraries.
TOTAL : 30 PERIODS
LIST OF EXPERIMENTS:
Working with Image Editing tools:
Install tools like GIMP/ InkScape / Krita / Pencil and perform editing operations:
Ø Use different selection and transform tools to modify or improve an image
Ø Create logos and banners for home pages of websites.
Working with Audio Editing tools:
Ø Install tools like, Audacity / Ardour for audio editing, sound mixing and special effects like fade-in
or fade-out etc.,
Ø Perform audio compression by choosing a proper codec.
Working with Video Editing and conversion tools:
Install tools like OpenShot / Cinelerra / HandBrake for editing video content.
Ø Edit and mix video content, remove noise, create special effects, add captions.
Ø Compress and convert video file format to other popular formats.
Working with web/mobile authoring tools:
Adapt / KompoZer/ BlueGriffon / BlueFish / Aptana Studio/ NetBeans / WordPress /Expression Web:
Ø Design simple Home page with banners, logos, tables quick links etc
Ø Provide a search interface and simple navigation from the home page to the inside pages of the
website.
Ø Design Responsive web pages for use on both web and mobile interfaces.

166
Working with Animation tools:
Install tools like, Krita, Wick Editor, Blender:
Ø Perform a simple 2D animation with sprites
Ø Perform simple 3D animation with keyframes, kinematics
 Working with Mobile UI animation tools: Origami studio / Lottie / Framer etc.,
Working with E-Learning authoring tools:
Install tools like EdApp / Moovly / CourseLab/ IsEazy and CamStudio/Ampache, VideoLAN:
Ø Demonstrate screen recording and further editing for e-learning content.
Ø Create a simple E-Learning module for a topic of your choice.
Creating VR and AR applications:
Ø Any affordable VR viewer like Google Cardboard and any development platform like Openspace
3D / ARCore etc.

Note: all tools listed are open source. Usage of any proprietary tools in place of open source tools
is not restricted.

30 PERIODS
TOTAL: 60 PERIODS
WEB REFERENCES:
1. https://itsfoss.com/
2. https://www.ucl.ac.uk/slade/know/3396
3. https://handbrake.fr/
4. https://opensource.com/article/18/2/open-source-audio-visual-production-tools
https://camstudio.org/
5. https://developer.android.com/training/animation/overview
6. https://developer.android.com/training/animation/overview (UNIT-IV)

COURSE OUTCOMES:
 Get the bigger picture of the context of Multimedia and its applications
 Use the different types of media elements of different formats on content pages
 Author 2D and 3D creative and interactive presentations for different target multimedia
applications.
 Use different standard animation techniques for 2D, 21/2 D, 3D applications
 Understand the complexity of multimedia applications in the context of cloud, security,
bigdata streaming, social networking, CBIR etc.,

TEXT BOOKS:
1. Ze-Nian Li, Mark S. Drew, Jiangchuan Liu, Fundamentals of Multimedia”, Third Edition,
Springer Texts in Computer Science, 2021. (UNIT-I, II, III)

REFERENCES:
1. John M Blain, The Complete Guide to Blender Graphics: Computer Modeling & Animation,
CRC press, 3rd Edition, 2016.

167
2. Gerald Friedland, Ramesh Jain, “Multimedia Computing”, Cambridge University Press,
2018.
3. Prabhat K.Andleigh, Kiran Thakrar, “Multimedia System Design”, Pearson
Education, 1st Edition, 2015.
4. Mohsen Amini Salehi, Xiangbo Li, “Multimedia Cloud Computing Systems”, Springer Nature,
1st Edition, 2021.
5. Mark Gaimbruno, “3D Graphics and Animation”, Second Edition, New Riders, 2002.
6. Rogers David, “Animation: Master – A Complete Guide (Graphics Series)”, Charles River
Media, 2006.
7. Rick parent, “Computer Animation: Algorithms and Techniques”, Morgan Kauffman, 3rd
Edition, 2012.
8. Emilio Rodriguez Martinez, Mireia Alegre Ruiz, “UI Animations with Lottie and After Effects:
Create, render, and ship stunning After Effects animations natively on mobile with React
Native”, Packt Publishing, 2022.

CO’s-PO’s & PSO’s MAPPING

CO’s PO’s PSO’s


1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 3 2 3 - - - 3 2 1 2 3 2 3
2 3 3 3 3 3 - - - 3 3 2 2 3 2 3
3 3 3 3 3 3 - - - 3 3 2 3 3 2 3
4 3 3 3 3 3 2 - - 3 3 3 3 3 3 3
5 3 3 3 3 3 2 - - 3 3 3 3 3 3 3
AVg. 3.00 2.80 3.00 2.80 3.00 2.00 - - 3.00 2.80 2.20 2.60 3.00 2.40 3.00
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

CCS371 VIDEO CREATION AND EDITING L T P C


2 0 2 3
COURSE OBJECTIVES:
● To introduce the broad perspective of linear and nonlinear editing concepts.
● To understand the concept of Storytelling styles.
● To be familiar with audio and video recording. To apply different media tools.
● To learn and understand the concepts of AVID XPRESS DV 4.

UNIT I FUNDAMENTALS 6
Evolution of filmmaking - linear editing - non-linear digital video - Economy of Expression - risks
associated with altering reality through editing.

UNIT II STORYTELLING 6
Storytelling styles in a digital world through jump cuts, L-cuts, match cuts, cutaways, dissolves, split
edits - Consumer and pro NLE systems - digitizing images - managing resolutions - mechanics of
digital editing - pointer files - media management.

168
12. Email Query Processing
TOTAL:60 PERIODS
COURSE OUTCOMES:
By the end of this course, the students will be able to:
 Enunciate the key distinctions between RPA and existing automation techniques and
platforms.
 Use UiPath to design control flows and work flows for the target process
 Implement recording, web scraping andprocess mining by automation
 Use UIPath Studio to detect, and handle exceptions in automation processes
 Implement and use Orchestrator for creation, monitoring, scheduling, and controlling of
automated bots and processes.

TEXT BOOKS:
1. Learning Robotic Process Automation: Create Software robots and automate business
processes with the leading RPA tool - UiPath by Alok Mani Tripathi, Packt Publishing, 2018.
2. Tom Taulli , “The Robotic Process Automation Handbook: A Guide to Implementing RPA
Systems”, Apress publications, 2020.

REFERENCES:
1. Frank Casale (Author), Rebecca Dilla (Author), Heidi Jaynes (Author), Lauren Livingston
(Author), Introduction to Robotic Process Automation: a Primer, Institute of Robotic Process
Automation, Amazon Asia-Pacific Holdings Private Limited, 2018
2. Richard Murdoch, Robotic Process Automation: Guide To Building Software Robots,
Automate Repetitive Tasks & Become An RPA Consultant, Amazon Asia-Pacific Holdings
Private Limited, 2018
3. A Gerardus Blokdyk, “Robotic Process Automation Rpa A Complete Guide “, 2020

CO’s-PO’s & PSO’s MAPPING


CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 2 1 3 - - - 1 3 3 2 2 2 1
2 1 1 2 3 3 - - - 1 2 3 1 3 2 1
3 2 3 2 3 3 - - - 2 3 1 1 3 3 3
4 1 2 1 2 2 - - - 1 2 1 3 3 3 2
5 3 3 3 3 3 - - - 3 1 1 1 3 2 1
AVg. 2 2.2 2 2.4 2.8 - - - 1.6 2.2 1.8 1.6 2.8 2.4 1.6
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

CCS340 CYBER SECURITY L T P C


2 0 2 3
COURSE OBJECTIVES:
 To learn cybercrime and cyberlaw.
 To understand the cyber attacks and tools for mitigating them.
 To understand information gathering.
 To learn how to detect a cyber attack.
 To learn how to prevent a cyber attack.

178
UNIT I INTRODUCTION 6
Cyber Security – History of Internet – Impact of Internet – CIA Triad; Reason for Cyber Crime –
Need for Cyber Security – History of Cyber Crime; Cybercriminals – Classification of Cybercrimes –
A Global Perspective on Cyber Crimes; Cyber Laws – The Indian IT Act – Cybercrime and
Punishment.

UNIT II ATTACKS AND COUNTERMEASURES 6


OSWAP; Malicious Attack Threats and Vulnerabilities: Scope of Cyber-Attacks – Security Breach –
Types of Malicious Attacks – Malicious Software – Common Attack Vectors – Social engineering
Attack – Wireless Network Attack – Web Application Attack – Attack Tools – Countermeasures.

UNIT III RECONNAISSANCE 5


Harvester – Whois – Netcraft – Host – Extracting Information from DNS – Extracting Information
from E-mail Servers – Social Engineering Reconnaissance; Scanning – Port Scanning – Network
Scanning and Vulnerability Scanning – Scanning Methodology – Ping Sweer Techniques – Nmap
Command Switches – SYN – Stealth – XMAS – NULL – IDLE – FIN Scans – Banner Grabbing and
OS Finger printing Techniques.

UNIT IV INTRUSION DETECTION 5


Host -Based Intrusion Detection – Network -Based Intrusion Detection – Distributed or Hybrid
Intrusion Detection – Intrusion Detection Exchange Format – Honeypots – Example System Snort.

UNIT V INTRUSION PREVENTION 5


Firewalls and Intrusion Prevention Systems: Need for Firewalls – Firewall Characteristics and
Access Policy – Types of Firewalls – Firewall Basing – Firewall Location and Configurations –
Intrusion Prevention Systems – Example Unified Threat Management Products.
30 PERIODS

PRACTICAL EXERCISES: 30 PERIODS


1. Install Kali Linux on Virtual box
2. Explore Kali Linux and bash scripting
3. Perform open source intelligence gathering using Netcraft, Whois Lookups, DNS
Reconnaissance, Harvester and Maltego
4. Understand the nmap command d and scan a target using nmap
5. Install metasploitable2 on the virtual box and search for unpatched vulnerabilities
6. Use Metasploit to exploit an unpatched vulnerability
7. Install Linus server on the virtual box and install ssh
8. Use Fail2banto scan log files and ban Ips that show the malicious signs
9. Launch brute-force attacks on the Linux server using Hydra.
10. Perform real-time network traffic analysis and data pocket logging using Snort
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
CO1: Explain the basics of cyber security, cyber crime and cyber law (K2)
CO2: Classify various types of attacks and learn the tools to launch the attacks (K2)
CO3 Apply various tools to perform information gathering (K3)
CO4: Apply intrusion techniques to detect intrusion (K3)
CO5: Apply intrusion prevention techniques to prevent intrusion (K3)

179
TOTAL:60 PERIODS
TEXTBOOKS
1. Anand Shinde, “Introduction to Cyber Security Guide to the World of Cyber Security”, Notion
Press, 2021 (Unit 1)
2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, Wiley Publishers, 2011 (Unit 1)
3. https://owasp.org/www-project-top-ten/

REFERENCES
1. David Kim, Michael G. Solomon, “Fundamentals of Information Systems Security”, Jones &
Bartlett Learning Publishers, 2013 (Unit 2)
2. Patrick Engebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and
Penetration Testing Made easy”, Elsevier, 2011 (Unit 3)
3. Kimberly Graves, “CEH Official Certified Ethical hacker Review Guide”, Wiley Publishers,
2007 (Unit 3)
4. William Stallings, Lawrie Brown, “Computer Security Principles and Practice”, Third Edition,
Pearson Education, 2015 (Units 4 and 5)
5. Georgia Weidman, “Penetration Testing: A Hands-On Introduction to Hacking”, No Starch
Press, 2014 (Lab)

CO’s-PO’s & PSO’s MAPPING


CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 1 1 1 1 - 1 - - - - 1 - 2 2 2
2 1 3 1 3 2 1 - - - - - - 2 2 1
3 2 1 1 1 - 1 - - - - 1 - 2 2 2
4 3 3 2 2 2 1 - - - - - - 2 2 3
5 3 2 1 1 1 1 - 1 - - 1 - 2 2 2
AVg. 2 2 1.2 1.6 1 1 0 0.2 0 0 0.6 0 2 2 2
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

CCS359 QUANTUM COMPUTING L T P C


2 0 2 3
COURSE OBJECTIVES:
 To know the background of classical computing and quantum computing.
 To learn the fundamental concepts behind quantum computation.
 To study the details of quantum mechanics and its relation to Computer Science.
 To gain knowledge about the basic hardware and mathematical models of quantum
computation.
 To learn the basics of quantum information and the theory behind it.

UNIT I QUANTUM COMPUTING BASIC CONCEPTS 6


Complex Numbers - Linear Algebra - Matrices and Operators - Global Perspectives Postulates of
Quantum Mechanics – Quantum Bits - Representations of Qubits - Superpositions

180
3 3 3 3 3 2 - - - 3 - - 2 2 3 3
4 3 2 3 2 3 - - - 3 - - 2 2 2 3
AVg. 3 2.75 2.75 2.5 1.75 2.25 2 3 2.75 2
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

CCS354 NETWORK SECURITY L T P C


2 0 2 3
COURSE OBJECTIVES:
 To learn the fundamentals of cryptography.
 To learn the key management techniques and authentication approaches.
 To explore the network and transport layer security techniques.
 To understand the application layer security standards.
 To learn the real time security practices.

UNIT I INTRODUCTION 8
Basics of cryptography, conventional and public-key cryptography, hash functions, authentication,
and digital signatures.

UNIT II KEY MANAGEMENT AND AUTHENTICATION 7


Key Management and Distribution: Symmetric Key Distribution, Distribution of Public Keys, X.509
Certificates, Public-Key Infrastructure. User Authentication: Remote User-Authentication Principles,
Remote User-Authentication Using Symmetric Encryption, Kerberos Systems, Remote User
Authentication Using Asymmetric Encryption.

UNIT III ACCESS CONTROL AND SECURITY 4


Network Access Control: Network Access Control, Extensible Authentication Protocol, IEEE 802.1X
Port-Based Network Access Control - IP Security - Internet Key Exchange (IKE). Transport-Level
Security: Web Security Considerations, Secure Sockets Layer, Transport Layer Security, HTTPS
standard, Secure Shell (SSH) application.

UNIT IV APPLICATION LAYER SECURITY 5


Electronic Mail Security: Pretty Good Privacy, S/MIME, DomainKeys Identified Mail. Wireless
Network Security: Mobile Device Security

UNIT V SECURITY PRACTICES 6


Firewalls and Intrusion Detection Systems: Intrusion Detection Password Management, Firewall
Characteristics Types of Firewalls, Firewall Basing, Firewall Location and Configurations.
Blockchains, Cloud Security and IoT security
30 PERIODS
PRACTICALEXERCISES: 30 PERIODS
1. Implement symmetric key algorithms
2. Implement asymmetric key algorithms and key exchange algorithms
3. Implement digital signature schemes
4. Installation of Wire shark, tcpdump and observe data transferred in client-server
communication using UDP/TCP and identify the UDP/TCP datagram.
5. Check message integrity and confidentiality using SSL
6. Experiment Eavesdropping, Dictionary attacks, MITM attacks
162
7. Experiment with Sniff Traffic using ARP Poisoning
8. Demonstrate intrusion detection system using any tool.
9. Explore network monitoring tools
10. Study to configure Firewall, VPN

COURSE OUTCOMES:
At the end of this course, the students will be able:
CO1: Classify the encryption techniques
CO2: Illustrate the key management technique and authentication.
CO3 Evaluate the security techniques applied to network and transport layer
CO4: Discuss the application layer security standards.
CO5: Apply security practices for real time applications.
TOTAL:60 PERIODS
TEXT BOOKS:
1. Cryptography and Network Security: Principles and Practice, 6th Edition, William Stallings,
2014, Pearson, ISBN 13:9780133354690.

REFERENCES:
1. Network Security: Private Communications in a Public World, M. Speciner, R. Perlman, C.
Kaufman, Prentice Hall, 2002.
2. Linux iptables Pocket Reference, Gregor N. Purdy, O'Reilly, 2004, ISBN-13: 978-
0596005696.
3. Linux Firewalls, by Michael Rash, No Starch Press, October 2007, ISBN: 978-1-59327-141-
1.
4. Network Security, Firewalls And VPNs, J. Michael Stewart, Jones & Bartlett Learning, 2013,
ISBN-10: 1284031675, ISBN-13: 978-1284031676.
5. The Network Security Test Lab: A Step-By-Step Guide, Michael Gregg, Dreamtech Press,
2015, ISBN-10:8126558148, ISBN-13: 978-8126558148.

CO’s-PO’s & PSO’s MAPPING


CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 2 2 2 - - - 2 1 2 1 2 3 1
2 1 1 3 2 2 - - - 2 2 1 1 3 1 2
3 1 2 1 1 2 - - - 3 3 1 3 2 1 3
4 2 2 3 2 3 - - - 3 3 2 1 2 1 3
5 2 1 3 2 2 - - - 2 1 1 3 2 1 1
AVg. 1.8 1.8 2.4 1.8 2.2 - - - 2.4 2 1.4 1.8 2.2 1.4 2
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

CCS333 AUGMENTED REALITY/VIRTUAL REALITY L T P C


2 0 2 3
COURSE OBJECTIVES:
 To impart the fundamental aspects and principles of AR/VR technologies.
 To know the internals of the hardware and software components involved in the
development of AR/VR enabled applications.
 To learn about the graphical processing units and their architectures.
163
TEXTBOOKS:
1. Canter, R.L, “Environmental impact Assessment “, 2nd Edition, McGraw Hill Inc, New
Delhi,1995.
2. Lohani, B., J.W. Evans, H. Ludwig, R.R. Everitt, Richard A. Carpenter, and S.L. Tu,
“Environmental Impact Assessment for Developing Countries in Asia”, Volume 1 – Overview,
Asian Development Bank,1997.
3. Peter Morris, Riki Therivel “Methods of Environmental Impact Assessment”, Routledge
Publishers,2009.

REFERENCES:
1. Becker H. A., Frank Vanclay,“The International handbook of social impact assessment”
conceptual and methodological advances, Edward Elgar Publishing, 2003.
2. Barry Sadler and Mary McCabe, “Environmental Impact Assessment Training Resource
Manual”, United Nations Environment Programme, 2002.
3. Judith Petts, “Handbook of Environmental Impact Assessment Vol. I and II”, Blackwell
Science New York, 1998.
4. Ministry of Environment and Forests EIA Notification and Sectoral Guides, Government of
India, New Delhi, 2010.

OEE351 RENEWABLE ENERGY SYSTEM LTPC


3 003
COURSE OBJECTIVES:
 To Provide knowledge about various renewable energy technologies
 To enable students to understand and design a PV system.
 To provide knowledge about wind energy system.
 To Provide knowledge about various possible hybrid energy systems
 To gain knowledge about application of various renewable energy technologies

UNIT I INTRODUCTION 9
Primary energy sources, renewable vs. non-renewable primary energy sources, renewable energy
resources in India, Current usage of renewable energy sources in India, future potential of renewable
energy in power production and development of renewable energy technologies.

UNIT II SOLAR ENERGY 9


Solar Radiation and its measurements, Solar Thermal Energy Conversion from plate Solar
Collectors, Concentrating Collectors and its Types, Efficiency and performance of collectors,. Direct
Solar Electricity Conversion from Photovoltaic, types of solar cells and its application of battery
charger, domestic lighting, street lighting, and water pumping, power generation schemes. Recent
Advances in PV Applications: Building Integrated PV, Grid Connected PV Systems,

UNIT III WIND ENERGY 9


Wind energy principles, wind site and its resource assessment, wind assessment, Factors
influencing wind, wind turbine components, wind energy conversion systems (WECS), Classification
of WECS devices, wind electric generating and control systems, characteristics and applications.

223
UNIT IV BIO-ENERGY 9
Energy from biomass, Principle of biomass conversion technologies/process and their
classification, Bio gas generation, types of biogas plants, selection of site for biogas plant,
classification of biogas plants, Advantage and disadvantages of biogas generation, thermal
gasification of biomass, biomass gasifies, Application of biomass and biogas plants and their
economics.

UNIT V OTHER TYPES OF ENERGY 9


Energy conversion from Hydrogen and Fuel cells, Geo thermal energy Resources, types of wells,
methods of harnessing the energy, potential in India. OTEC, Principles utilization, setting of OTEC
plants, thermodynamic cycles. Tidal and wave energy: Potential and conversion techniques, mini-
hydel power plants and their economics.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
At the end of the course students will be able to:
CO1: Attained knowledge about various renewable energy technologies
CO2: Ability to understand and design a PV system.
CO3: Understand the concept of various wind energy system.
CO4: Gained knowledge about various possible hybrid energy systems
CO5: Attained knowledge about various application of renewable energy technologies
REFERENCES
1. Twidell & Wier,‘Renewable Energy Resources’ CRC Press( Taylor & Francis).
2. Tiwari and Ghosal/ Narosa,‘Renewable energy resources’.
3. D.P.Kothari, K.C.Singhal,‘Renewable energy sources and emerging technologies’, P.H.I.
4. D.S.Chauhan, S.K. Srivastava, ‘Non – Conventional Energy Resources’, New Age
Publishers, 2006.
5. B.H.Khan, ‘Non – Conventional Energy Resources’, Tata Mc Graw Hill, 2006.

CO’s-PO’s & PSO’s MAPPING


PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 - - - - - - - - - - 2 3 3 3
CO2 3 2 - - - - - - - - - 2 3 3 3
CO3 3 2 - - - - - - - - - 2 3 3 3
CO4 3 2 - - - - - - - - - 2 3 3 3
CO5 3 2 - - - - - - - - - 2 3 3 3
AVg. 3 2 - - - - - - - - - 2 3 3 3
1 - low, 2 - medium, 3 - high, ‘-“- no correlation

OEI351 INTRODUCTION TO INDUSTRIAL INSTRUMENTATION AND CONTROL


LTPC
3 003
COURSE OBJECTIVES:
 To introduce common unit operations carried out in process industries.
 To impact knowledge about the important unit operations taking place in process industries.

224
OUTCOME OF THE COURSE:
It is expected that this course will make students aware of the theoretical aspect of the state, its
organs, its operationalization aspect, the background and philosophy behind the founding of the
present political system, broad streams and challenges of national integration and nation-building in
India. It will equip the students with the real understanding of our political system/ process in correct
perspective and make them sit up and think for devising ways for better participation in the system
with a view to making the governance and delivery system better for the common man who is often
left unheard and unattended in our democratic setup besides generating a lot of dissatisfaction and
difficulties for the system.

SUGGESTED READING:
i. Sunil Khilnani, The Idea of India. Penguin India Ltd., New Delhi.
ii. Madhav Khosla, The Indian Constitution, Oxford University Press. New Delhi, 2012.
iii. Brij Kishore Sharma, Introduction to the Indian Constitution, PHI, New Delhi, latest edition.
iv. Sumantra Bose, Transforming India: Challenges to the World’s Largest Democracy,
Picador India, 2013.
v. Atul Kohli, Democracy and Discontent: India’s Growing Crisis of Governability, Cambridge
University Press, Cambridge, U. K., 1991.
vi. M. P. Singh and Rekha Saxena, Indian Politics: Contemporary Issues and Concerns, PHI,
New Delhi, 2008, latest edition.
vii. Rajni Kothari, Rethinking Democracy, Orient Longman, New Delhi, 2005.
TOTAL : 45 PERIODS

MX3089 INDUSTRIAL SAFETY L T PC


3 0 0 0
COURSE OBJECTIVES
 To Understand the Introduction and basic Terminologies safety.
 To enable the students to learn about the Important Statutory Regulations and standards.
 To enable students to Conduct and participate the various Safety activities in the Industry.
 To have knowledge about Workplace Exposures and Hazards.
 To assess the various Hazards and consequences through various Risk Assessment
Techniques.

UNIT I SAFETY TERMINOLOGIES


Hazard-Types of Hazard- Risk-Hierarchy of Hazards Control Measures-Lead indicators- lag
Indicators-Flammability- Toxicity Time-weighted Average (TWA) - Threshold LimitValue (TLV) -
Short Term Exposure Limit (STEL)- Immediately dangerous to life or health (IDLH)- acute and
chronic Effects- Routes of Chemical Entry-Personnel Protective Equipment- Health and Safety
Policy-Material Safety Data Sheet MSDS

UNIT II STANDARDS AND REGULATIONS


Indian Factories Act-1948- Health- Safety- Hazardous materials and Welfare- ISO 45001:2018
occupational health and safety (OH&S) - Occupational Safety and Health Audit IS14489:1998-
Hazard Identification and Risk Analysis- code of practice IS 15656:2006

215
UNIT III SAFETY ACTIVITIES
Toolbox Talk- Role of safety Committee- Responsibilities of Safety Officers and Safety
Representatives- Safety Training and Safety Incentives- Mock Drills- On-site Emergency Action
Plan- Off-site Emergency Action Plan- Safety poster and Display- Human Error Assessment

UNIT IV WORKPLACE HEALTH AND SAFETY


Noise hazard- Particulate matter- musculoskeletal disorder improper sitting poster and lifting
Ergonomics RULE & REBA- Unsafe act & Unsafe Condition- Electrical Hazards- Crane Safety-
Toxic gas Release

UNIT V HAZARD IDENTIFICATION TECHNIQUES


Job Safety Analysis-Preliminary Hazard Analysis-Failure mode and Effects Analysis- Hazard and
Operability- Fault Tree Analysis- Event Tree Analysis Qualitative and Quantitative Risk Assessment-
Checklist Analysis- Root cause analysis- What-If Analysis- and Hazard Identification and Risk
Assessment
TOTAL : 45 PERIODS
COURSE OUTCOMES:
Course outcomes on completion of this course the student will be able:
CO1:Understand the basic concept of safety.
CO2:Obtain knowledge of Statutory Regulations and standards.
CO3:Know about the safety Activities of the Working Place.
CO4:Analyze on the impact of Occupational Exposures and their Remedies
CO5:Obtain knowledge of Risk Assessment Techniques.

TEXTBOOKS
1. R.K. Jain and Prof. Sunil S. Rao Industrial Safety, Health and Environment Management
Systems KHANNA PUBLISHER
2. L. M. Deshmukh Industrial Safety Management: Hazard Identification and Risk Control
McGraw-Hill Education
REFERENCES
1. Frank Lees (2012) ‘Lees’ Loss Prevention in Process Industries.Butterworth-Heinemann
publications, UK, 4th Edition.
2. John Ridley & John Channing (2008)Safety at Work: Routledge, 7th Edition.
3. Dan Petersen (2003) Techniques of Safety Management: A System Approach.
4. Alan Waring.(1996).Safety management system: Chapman &Hall,England
5. Society of Safety Engineers, USA
ONLINE RESOURCES
ISO 45001:2018 occupational health and safety (OH&S) International Organization for
Standardization https://www.iso.org/standard/63787.html
Indian Standard code of practice on occupational safety and health audit
https://law.resource.org/pub/in/bis/S02/is.14489.1998.pdf
Indian Standard code of practice on Hazard Identification and Risk Analysis IS 15656:2006
https://law.resource.org/pub/in/bis/S02/is.15656.2006.pdf

216

You might also like