Third Year Syllabus
Third Year Syllabus
1. George Coulouris, Jean Dollimore, Time Kindberg, “Distributed Systems Concepts and
Design”, Fifth Edition, Pearson Education, 2012.
2. Pradeep L Sinha, “Distributed Operating Systems: Concepts and Design”, Prentice Hall of
India, 2007.
3. Tanenbaum A S, Van Steen M, “Distributed Systems: Principles and Paradigms”, Pearson
Education, 2007.
4. Liu M L, “Distributed Computing: Principles and Applications”, Pearson Education, 2004.
5. Nancy A Lynch, “Distributed Algorithms”, Morgan Kaufman Publishers, 2003.
6. Arshdeep Bagga, Vijay Madisetti, “ Cloud Computing: A Hands-On Approach”, Universities
Press, 2014.
COURSE OUTCOMES:
CO1: Compare various Software Development Lifecycle Models
CO2: Evaluate project management approaches as well as cost and schedule estimation
strategies.
CO3: Perform formal analysis on specifications.
CO4: Use UML diagrams for analysis and design.
CO5: Architect and design using architectural styles and design patterns, and test the system
45 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
LIST OF EXPERIMENTS:
1. Identify a software system that needs to be developed.
2. Document the Software Requirements Specification (SRS) for the identified system.
3. Identify use cases and develop the Use Case model.
4. Identify the conceptual classes and develop a Domain Model and also derive a Class
Diagram from that.
5. Using the identified scenarios, find the interaction between objects and represent them using
UML Sequence and Collaboration Diagrams
6. Draw relevant State Chart and Activity Diagrams for the same system.
7. Implement the system as per the detailed design
8. Test the software system for all the scenarios identified as per the usecase diagram
9. Improve the reusability and maintainability of the software system by applying appropriate
design patterns.
10. Implement the modified system and test it for various scenarios.
101
13. BPO management system
14. Library management system
15. Student information system
TOTAL:75 PERIODS
TEXT BOOKS
1. Bernd Bruegge and Allen H. Dutoit, “Object-Oriented Software Engineering: Using UML,
Patterns and Java”, Third Edition, Pearson Education, 2009.
2. Roger S. Pressman, Object-Oriented Software Engineering: An Agile Unified Methodology,
First Edition, Mc Graw-Hill International Edition, 2014.
REFERENCES
1. Carlo Ghezzi, Mehdi Jazayeri, Dino Mandrioli, Fundamentals of Software Engineering, 2nd
edition, PHI Learning Pvt. Ltd., 2010.
2. Craig Larman, Applying UML and Patterns, 3rd ed, Pearson Education, 2005.
3. Len Bass, Ingo Weber and Liming Zhu, “DevOps: A Software Architect‘s Perspective”,
Pearson Education, 2016
4. Rajib Mall, Fundamentals of Software Engineering, 3rd edition, PHI Learning Pvt. Ltd., 2009.
5. Stephen Schach, Object-Oriented and Classical Software Engineering, 8th ed, McGraw-Hill,
2010.
102
13. BPO management system
14. Library management system
15. Student information system
TOTAL:75 PERIODS
TEXT BOOKS
1. Bernd Bruegge and Allen H. Dutoit, “Object-Oriented Software Engineering: Using UML,
Patterns and Java”, Third Edition, Pearson Education, 2009.
2. Roger S. Pressman, Object-Oriented Software Engineering: An Agile Unified Methodology,
First Edition, Mc Graw-Hill International Edition, 2014.
REFERENCES
1. Carlo Ghezzi, Mehdi Jazayeri, Dino Mandrioli, Fundamentals of Software Engineering, 2nd
edition, PHI Learning Pvt. Ltd., 2010.
2. Craig Larman, Applying UML and Patterns, 3rd ed, Pearson Education, 2005.
3. Len Bass, Ingo Weber and Liming Zhu, “DevOps: A Software Architect‘s Perspective”,
Pearson Education, 2016
4. Rajib Mall, Fundamentals of Software Engineering, 3rd edition, PHI Learning Pvt. Ltd., 2009.
5. Stephen Schach, Object-Oriented and Classical Software Engineering, 8th ed, McGraw-Hill,
2010.
102
UNIT II EMBEDDED C PROGRAMMING 9
Memory And I/O Devices Interfacing – Programming Embedded Systems in C – Need For RTOS –
Multiple Tasks and Processes – Context Switching – Priority Based Scheduling Policies.
45 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
1. Write 8051 Assembly Language experiments using simulator.
2. Test data transfer between registers and memory.
3. Perform ALU operations.
4. Write Basic and arithmetic Programs Using Embedded C.
5. Introduction to Arduino platform and programming
6. Explore different communication methods with IoT devices (Zigbee, GSM, Bluetooth)
7. Introduction to Raspberry PI platform and python programming
8. Interfacing sensors with Raspberry PI
9. Communicate between Arduino and Raspberry PI using any wireless medium
10. Setup a cloud platform to log the data
11. Log Data using Raspberry PI and upload to the cloud platform
12. Design an IOT based system
COURSE OUTCOMES:
CO1: Explain the architecture of embedded processors.
CO2: Write embedded C programs.
CO3: Design simple embedded applications.
CO4: Compare the communication models in IOT
CO5: Design IoT applications using Arduino/Raspberry Pi /open platform.
TOTAL :75 PERIODS
TEXTBOOKS
1. Muhammed Ali Mazidi, Janice Gillispie Mazidi, Rolin D. McKinlay, “The 8051 Microcontroller
and Embedded Systems”, Pearson Education, Second Edition, 2014
103
2. Robert Barton, Patrick Grossetete, David Hanes, Jerome Henry, Gonzalo Salgueiro, “IoT
Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of
Things”, CISCO Press, 2017.
REFERENCES
1. Michael J. Pont, “Embedded C”, Pearson Education, 2007.
2. Wayne Wolf, “Computers as Components: Principles of Embedded Computer System
Design”, Elsevier, 2006.
3. Andrew N Sloss, D. Symes, C. Wright, “Arm System Developer's Guide”, Morgan Kauffman/
Elsevier, 2006.
4. Arshdeep Bahga, Vijay Madisetti, “Internet of Things – A hands-on approach”, Universities
Press, 2015
PERSONALITY DEVELOPMENT 9
PD 3 Group Discussion: Team Work 2
PD 4 Career Counselling, SSB Procedure & Interview Skills 3
PD 5 Public Speaking 4
ARMED FORCES 3
AF 2 Modes of Entry to Army, CAPF, Police 3
COMMUNICATION 3
C1 Introduction to Communication & Latest Trends 3
INFANTRY 3
INF 1 Organisation of Infantry Battalion & its weapons 3
104
9. Develop AR enabled simple applications like human anatomy visualization, DNA/RNA
structure visualization and surgery simulation.
10. Develop simple MR enabled gaming applications.
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1: Understand the basic concepts of AR and VR
CO2:Understand the tools and technologies related to AR/VR
CO3:Know the working principle of AR/VR related Sensor devices
CO4:Design of various models using modeling techniques
CO5:Develop AR/VR applications in different domains
TOTAL:60 PERIODS
TEXTBOOKS:
1. Charles Palmer, John Williamson, “Virtual Reality Blueprints: Create compelling VR
experiences for mobile”, Packt Publisher, 2018
2. Dieter Schmalstieg, Tobias Hollerer, “Augmented Reality: Principles & Practice”, Addison
Wesley, 2016
3. John Vince, “Introduction to Virtual Reality”, Springer-Verlag, 2004.
4. William R. Sherman, Alan B. Craig: Understanding Virtual Reality – Interface, Application,
Design”, Morgan Kaufmann, 2003
165
UNIT II MULTIMEDIA FILE FORMATS AND STANDARDS 6
File formats – Text, Image file formats, Graphic and animation file formats, Digital audio and Video
file formats, Color in image and video, Color Models. Multimedia data and file formats for the web.
UNIT IV ANIMATION 6
Principles of animation: staging, squash and stretch, timing, onion skinning, secondary action, 2D,
2 ½ D, and 3D animation, Animation techniques: Keyframe, Morphing, Inverse Kinematics, Hand
Drawn, Character rigging, vector animation, stop motion, motion graphics, , Fluid Simulation,
skeletal animation, skinning Virtual Reality, Augmented Reality.
166
Working with Animation tools:
Install tools like, Krita, Wick Editor, Blender:
Ø Perform a simple 2D animation with sprites
Ø Perform simple 3D animation with keyframes, kinematics
Working with Mobile UI animation tools: Origami studio / Lottie / Framer etc.,
Working with E-Learning authoring tools:
Install tools like EdApp / Moovly / CourseLab/ IsEazy and CamStudio/Ampache, VideoLAN:
Ø Demonstrate screen recording and further editing for e-learning content.
Ø Create a simple E-Learning module for a topic of your choice.
Creating VR and AR applications:
Ø Any affordable VR viewer like Google Cardboard and any development platform like Openspace
3D / ARCore etc.
Note: all tools listed are open source. Usage of any proprietary tools in place of open source tools
is not restricted.
30 PERIODS
TOTAL: 60 PERIODS
WEB REFERENCES:
1. https://itsfoss.com/
2. https://www.ucl.ac.uk/slade/know/3396
3. https://handbrake.fr/
4. https://opensource.com/article/18/2/open-source-audio-visual-production-tools
https://camstudio.org/
5. https://developer.android.com/training/animation/overview
6. https://developer.android.com/training/animation/overview (UNIT-IV)
COURSE OUTCOMES:
Get the bigger picture of the context of Multimedia and its applications
Use the different types of media elements of different formats on content pages
Author 2D and 3D creative and interactive presentations for different target multimedia
applications.
Use different standard animation techniques for 2D, 21/2 D, 3D applications
Understand the complexity of multimedia applications in the context of cloud, security,
bigdata streaming, social networking, CBIR etc.,
TEXT BOOKS:
1. Ze-Nian Li, Mark S. Drew, Jiangchuan Liu, Fundamentals of Multimedia”, Third Edition,
Springer Texts in Computer Science, 2021. (UNIT-I, II, III)
REFERENCES:
1. John M Blain, The Complete Guide to Blender Graphics: Computer Modeling & Animation,
CRC press, 3rd Edition, 2016.
167
2. Gerald Friedland, Ramesh Jain, “Multimedia Computing”, Cambridge University Press,
2018.
3. Prabhat K.Andleigh, Kiran Thakrar, “Multimedia System Design”, Pearson
Education, 1st Edition, 2015.
4. Mohsen Amini Salehi, Xiangbo Li, “Multimedia Cloud Computing Systems”, Springer Nature,
1st Edition, 2021.
5. Mark Gaimbruno, “3D Graphics and Animation”, Second Edition, New Riders, 2002.
6. Rogers David, “Animation: Master – A Complete Guide (Graphics Series)”, Charles River
Media, 2006.
7. Rick parent, “Computer Animation: Algorithms and Techniques”, Morgan Kauffman, 3rd
Edition, 2012.
8. Emilio Rodriguez Martinez, Mireia Alegre Ruiz, “UI Animations with Lottie and After Effects:
Create, render, and ship stunning After Effects animations natively on mobile with React
Native”, Packt Publishing, 2022.
UNIT I FUNDAMENTALS 6
Evolution of filmmaking - linear editing - non-linear digital video - Economy of Expression - risks
associated with altering reality through editing.
UNIT II STORYTELLING 6
Storytelling styles in a digital world through jump cuts, L-cuts, match cuts, cutaways, dissolves, split
edits - Consumer and pro NLE systems - digitizing images - managing resolutions - mechanics of
digital editing - pointer files - media management.
168
12. Email Query Processing
TOTAL:60 PERIODS
COURSE OUTCOMES:
By the end of this course, the students will be able to:
Enunciate the key distinctions between RPA and existing automation techniques and
platforms.
Use UiPath to design control flows and work flows for the target process
Implement recording, web scraping andprocess mining by automation
Use UIPath Studio to detect, and handle exceptions in automation processes
Implement and use Orchestrator for creation, monitoring, scheduling, and controlling of
automated bots and processes.
TEXT BOOKS:
1. Learning Robotic Process Automation: Create Software robots and automate business
processes with the leading RPA tool - UiPath by Alok Mani Tripathi, Packt Publishing, 2018.
2. Tom Taulli , “The Robotic Process Automation Handbook: A Guide to Implementing RPA
Systems”, Apress publications, 2020.
REFERENCES:
1. Frank Casale (Author), Rebecca Dilla (Author), Heidi Jaynes (Author), Lauren Livingston
(Author), Introduction to Robotic Process Automation: a Primer, Institute of Robotic Process
Automation, Amazon Asia-Pacific Holdings Private Limited, 2018
2. Richard Murdoch, Robotic Process Automation: Guide To Building Software Robots,
Automate Repetitive Tasks & Become An RPA Consultant, Amazon Asia-Pacific Holdings
Private Limited, 2018
3. A Gerardus Blokdyk, “Robotic Process Automation Rpa A Complete Guide “, 2020
178
UNIT I INTRODUCTION 6
Cyber Security – History of Internet – Impact of Internet – CIA Triad; Reason for Cyber Crime –
Need for Cyber Security – History of Cyber Crime; Cybercriminals – Classification of Cybercrimes –
A Global Perspective on Cyber Crimes; Cyber Laws – The Indian IT Act – Cybercrime and
Punishment.
179
TOTAL:60 PERIODS
TEXTBOOKS
1. Anand Shinde, “Introduction to Cyber Security Guide to the World of Cyber Security”, Notion
Press, 2021 (Unit 1)
2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, Wiley Publishers, 2011 (Unit 1)
3. https://owasp.org/www-project-top-ten/
REFERENCES
1. David Kim, Michael G. Solomon, “Fundamentals of Information Systems Security”, Jones &
Bartlett Learning Publishers, 2013 (Unit 2)
2. Patrick Engebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and
Penetration Testing Made easy”, Elsevier, 2011 (Unit 3)
3. Kimberly Graves, “CEH Official Certified Ethical hacker Review Guide”, Wiley Publishers,
2007 (Unit 3)
4. William Stallings, Lawrie Brown, “Computer Security Principles and Practice”, Third Edition,
Pearson Education, 2015 (Units 4 and 5)
5. Georgia Weidman, “Penetration Testing: A Hands-On Introduction to Hacking”, No Starch
Press, 2014 (Lab)
180
3 3 3 3 3 2 - - - 3 - - 2 2 3 3
4 3 2 3 2 3 - - - 3 - - 2 2 2 3
AVg. 3 2.75 2.75 2.5 1.75 2.25 2 3 2.75 2
1 - low, 2 - medium, 3 - high, ‘-' - no correlation
UNIT I INTRODUCTION 8
Basics of cryptography, conventional and public-key cryptography, hash functions, authentication,
and digital signatures.
COURSE OUTCOMES:
At the end of this course, the students will be able:
CO1: Classify the encryption techniques
CO2: Illustrate the key management technique and authentication.
CO3 Evaluate the security techniques applied to network and transport layer
CO4: Discuss the application layer security standards.
CO5: Apply security practices for real time applications.
TOTAL:60 PERIODS
TEXT BOOKS:
1. Cryptography and Network Security: Principles and Practice, 6th Edition, William Stallings,
2014, Pearson, ISBN 13:9780133354690.
REFERENCES:
1. Network Security: Private Communications in a Public World, M. Speciner, R. Perlman, C.
Kaufman, Prentice Hall, 2002.
2. Linux iptables Pocket Reference, Gregor N. Purdy, O'Reilly, 2004, ISBN-13: 978-
0596005696.
3. Linux Firewalls, by Michael Rash, No Starch Press, October 2007, ISBN: 978-1-59327-141-
1.
4. Network Security, Firewalls And VPNs, J. Michael Stewart, Jones & Bartlett Learning, 2013,
ISBN-10: 1284031675, ISBN-13: 978-1284031676.
5. The Network Security Test Lab: A Step-By-Step Guide, Michael Gregg, Dreamtech Press,
2015, ISBN-10:8126558148, ISBN-13: 978-8126558148.
REFERENCES:
1. Becker H. A., Frank Vanclay,“The International handbook of social impact assessment”
conceptual and methodological advances, Edward Elgar Publishing, 2003.
2. Barry Sadler and Mary McCabe, “Environmental Impact Assessment Training Resource
Manual”, United Nations Environment Programme, 2002.
3. Judith Petts, “Handbook of Environmental Impact Assessment Vol. I and II”, Blackwell
Science New York, 1998.
4. Ministry of Environment and Forests EIA Notification and Sectoral Guides, Government of
India, New Delhi, 2010.
UNIT I INTRODUCTION 9
Primary energy sources, renewable vs. non-renewable primary energy sources, renewable energy
resources in India, Current usage of renewable energy sources in India, future potential of renewable
energy in power production and development of renewable energy technologies.
223
UNIT IV BIO-ENERGY 9
Energy from biomass, Principle of biomass conversion technologies/process and their
classification, Bio gas generation, types of biogas plants, selection of site for biogas plant,
classification of biogas plants, Advantage and disadvantages of biogas generation, thermal
gasification of biomass, biomass gasifies, Application of biomass and biogas plants and their
economics.
224
OUTCOME OF THE COURSE:
It is expected that this course will make students aware of the theoretical aspect of the state, its
organs, its operationalization aspect, the background and philosophy behind the founding of the
present political system, broad streams and challenges of national integration and nation-building in
India. It will equip the students with the real understanding of our political system/ process in correct
perspective and make them sit up and think for devising ways for better participation in the system
with a view to making the governance and delivery system better for the common man who is often
left unheard and unattended in our democratic setup besides generating a lot of dissatisfaction and
difficulties for the system.
SUGGESTED READING:
i. Sunil Khilnani, The Idea of India. Penguin India Ltd., New Delhi.
ii. Madhav Khosla, The Indian Constitution, Oxford University Press. New Delhi, 2012.
iii. Brij Kishore Sharma, Introduction to the Indian Constitution, PHI, New Delhi, latest edition.
iv. Sumantra Bose, Transforming India: Challenges to the World’s Largest Democracy,
Picador India, 2013.
v. Atul Kohli, Democracy and Discontent: India’s Growing Crisis of Governability, Cambridge
University Press, Cambridge, U. K., 1991.
vi. M. P. Singh and Rekha Saxena, Indian Politics: Contemporary Issues and Concerns, PHI,
New Delhi, 2008, latest edition.
vii. Rajni Kothari, Rethinking Democracy, Orient Longman, New Delhi, 2005.
TOTAL : 45 PERIODS
215
UNIT III SAFETY ACTIVITIES
Toolbox Talk- Role of safety Committee- Responsibilities of Safety Officers and Safety
Representatives- Safety Training and Safety Incentives- Mock Drills- On-site Emergency Action
Plan- Off-site Emergency Action Plan- Safety poster and Display- Human Error Assessment
TEXTBOOKS
1. R.K. Jain and Prof. Sunil S. Rao Industrial Safety, Health and Environment Management
Systems KHANNA PUBLISHER
2. L. M. Deshmukh Industrial Safety Management: Hazard Identification and Risk Control
McGraw-Hill Education
REFERENCES
1. Frank Lees (2012) ‘Lees’ Loss Prevention in Process Industries.Butterworth-Heinemann
publications, UK, 4th Edition.
2. John Ridley & John Channing (2008)Safety at Work: Routledge, 7th Edition.
3. Dan Petersen (2003) Techniques of Safety Management: A System Approach.
4. Alan Waring.(1996).Safety management system: Chapman &Hall,England
5. Society of Safety Engineers, USA
ONLINE RESOURCES
ISO 45001:2018 occupational health and safety (OH&S) International Organization for
Standardization https://www.iso.org/standard/63787.html
Indian Standard code of practice on occupational safety and health audit
https://law.resource.org/pub/in/bis/S02/is.14489.1998.pdf
Indian Standard code of practice on Hazard Identification and Risk Analysis IS 15656:2006
https://law.resource.org/pub/in/bis/S02/is.15656.2006.pdf
216