3rd Semester SyYyllabus
3rd Semester SyYyllabus
SEMESTER I I
sY4suspuguopee
L P CT TA CT+TA TE/PE
BOE3**/
Science Based Open
1
BAS303 Elective/BSC (Maths T ES/BS 3 20 10 30 70 100 4
II/Math IV/ Math V)
Universal Human Value
BVE301, and Professional Ethics/ T VA/HS 2 20 10 30 70 100
BAS301 Technical
Communication
Data Structure
3 BCS301 T PC 3 1 20 10 30 70 100 4
Computer Organization
and
4 BCS302 T PC 3 0 20 10 30 70 100 4
Architecture
Computer Organization
and
7 BCS352 PO 0 2 50 50 50 100 1
Architecture Lab
Web Designing
BCS353 Workshop PO o2 50 50 100 1
10
BCC301 Cyber Security/Python VA 2 00 20 10 30 70 100 2
BCC302 programming
11 BCC351
Internship Assesment 100 100 2
/Mini Project
Total 15 S 25
SEMESTER -IV
Sessional
Periods
Component
SN
Subject adA! Total Credit
Code
Subject SW+ESE Cr
BAS403/
BSC(Maths-ll/Math IV/
1 Math V)/Science Based BS/ES 3 20 10 30 70 100 4
BOE4** 8
B.Tech 2d Year Common Courses
(Effective from session 2023-24)
" BCC301 / BCC401/ BCC301H/BCC401H: yber Security
" BCC302/ BCC402/ BCC302H/ BCC402H: Python programming
BCC301 / BCC401/ BCC301H/ BCC401H:
CYBER SECURITY
Course Outcome ( Co) Bloom's Knowledge Level (KL)
At the end of course, the student will be able to
CYBER CRIME : Mobile and Wireless Devices-Introduction, Proliferation of Mobile and Wireless
Devices, Trends in Mobility, Credit Card Frauds in Mobile and Wireless Computing Era, Security
Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication Service
Security, Attacks on Mobile/Cel Phones, Mobile Devices: Security Implications for organizations, 04
Organizational Measures for Handling Mobile, Organizational Security Policies and Measures in
Mobile Computing Era.
TOOLS AND METHODS USED IN CYBERCRIME : Introduction, Proxy Servers and Anonymizers,
Phishing, Password Cracking, Keyloggers and Spywares, Virus and Worms, Trojan-horses and
Backdoors, Steganography, DoS and DDoS At-tacks, SQL Injection, Buffer Overflow, Attacks on 04
Wireless Networks. Phishing and ldentity Theft: Introduction to Phishing, ldentity Theft (ID Theft).
UNDERSTANDING COMPUTER FORENSICS: Introduction, Digital Forensics Science, The Need for
Computer Forensics, Cyber forensics and Digital Evidence, Forensics Analysis of E-Mail, Digital
Forensics Life Cycle, Chain of Custody Concept, Network Forensics, Approaching a Computer
IV Forensics Investigation. 04
Forensics and Social Networking Sites: The Security/Privacy Threats, Challenges in Computer
Forensics.
Course Outcomes
The objective of this course is to familiarize the students with partial differential equation,
their application and statistical techniques. It aims to present the students with standard
concepts and tools at an intermediate to superior level that will provide them well towards
undertaking a variety of problems in the discipline.
The students will learm:
" The idea of partial differential equation and its different types of solution.
" The concept ofmethod of separation of variables and Fourier transform to solve
partial differential equations.
" The basic ideas of statistics including measures of central tendency, correlation,
regression and their properties.
" The idea of probability, random variables, discrete and continuous probability
distributions and their properties.
The statistical methods of studying data samples, hypothesis testing and statistical
quality control.
CO 3 Implementation of Trees and Graphs and perform various operations on these data structure. Ka
Understanding the concept of recursion, application of recursion and its implementation and removal
CO 4 K
of recursion.
CO 5
Identify the alternative implementations of data structures with respect to its performance to solve a
real world problem. Ks, Ks
Unit
Proposed
Topic Lecture
Introduction: Basic Terminology, Elementary Data Organization, Built in Data Types in C.
Algorithm, Efficiency of an Algorithm, Time and Space Complexity, Asymptotic notations:
Big Oh, Big Theta and Big Omega, Time-Space trade-off. Abstract Data Types (ADT)
Arrays: Definition, Single and Multidimensional Arrays, Representation of Arrays: Row
Major Order, and Column Major Order, Derivation of Index Formulae for 1-D,2-D,3-D and 08
n-D Array Application of arrays, Sparse Matrices and their representations.
Linked lists: Array Implementation and Pointer Implementation of Singly Linked Lists,
Doubly Linked List, Circularly Linked List, Operations on a Linked List. Insertion, Deletion,
Traversal, Polynomial Representation and Addition Subtraction & Multiplications of Single
variable & Two variables Polynomial.
Stacks: Abstract Data Type, Primitive Stack operations: Push & Pop, Array and Linked
Implementation of Stack in C, Application of stack: Prefix and Postfix Expressions,
Evaluation of postfix expression, Iteration and Recursion- Principles of recursion, Tail
recursion, Removal of recursion Problem solving using iteration and recursion with 08
examples such as binary search, Fibonacci numbers, and Hanoi towers. Tradeoffs
between iteration and recursion.
Queues: Operations on Queue: Create, Add, Delete, Full and Empty, ircular queues,
Array and linked implementation of queues in C, Dequeue and Priority Queue.
Searching: Concept of Searching, Sequential search, Index Sequential Search, Binary
Search. Concept of Hashing & Collision resolution Techniques used in Hashing. Sorting:
Insertion Sort, Selection, Bubble Sort, Quick Sort, Merge Sort, Heap Sort and Radix Sort.
Trees: Basic terminology used with Tree, Binary Trees, Binary Tree Representation: Array
IV Representation and Pointer(Linked List) Representation, Binary Search Tree, Strictly
08
Binary Tree ,Complete Binary Tree. A Extended Binary Trees, Tree Traversal algorithms:
Inorder, Preorder and Postorder, Constructing Binary Tree from given Tree Traversal,
Operation of Insertation, Deletion, Searching & Modification of data in Binary Search
Threaded Binary trees, Traversing Threaded Binary trees. Huffman coding using Binary
Tree. Concept & Basic Operations for AVL Tree, BTree &Binary Heaps
Graphs: Terminology used with Graph, Data Structure for Graph Representations:
Adjacency Matrices, Adjacency List, Adjacency. Graph Traversal: Depth First Search and
V Breadth First Search, Connected Component, Spanning Trees, Minimum Cost Spanning 08
Trees: Prims and Kruskal algorithm. Transitive Closure and Shortest Path algorithm:
Warshal Algorithm and Dijikstra Algorithm.
Text books:
1 Aaron M. Tenenbaum, Yedidyah Langsam and Moshe J. Augenstein, "Data Structures Using C and C++", PHI Learning
BCS302 COMPUTER ORGANIZATION AND ARCHITECTURE
Course utcome ( cO) Bloom's Knowledge Level (KL)
At the end of course,the student will be able to understand
CO 1 Study of the basic structure and operation of a digital computer system. KË K,
CO 2
Analysis of the design of arithmetic & logic unit and understanding of the fixed point and floating-point
arithmetic operations. Kz, K¡
CO 3 Implementation of control unit techniques and the concept of Pipelining K;
CO 4 Understanding the hierarchical memory system, cache memories and virtual memory K
CO5 Understanding the different ways of communicating with I/0 devices and standard i/0 interfaces K, K4
Understanding the need, basic guidelines, content, and process for Value Education, Self
Exploration-what is it? - its content and process; 'Natural Acceptance' and Experiential
Validation -as the mechanism for self-exploration, Continuous Happiness, and Prosperity-A look
at basic Human Aspirations, Right understanding, Relationship, and Physical Facilities-the basic
requirements for fulfillment of aspirations of every human being with their correct priority,
Understanding Happiness and Prosperity correctly - A critical appraisal of the current scenario,
Method to fulfill the above human aspirations: understanding and living in harmony at various
levels.
Whole existence as Co-existence Understanding the harmony in Nature, Inter connectedness, and
mutual fulfillment among the four orders of nature- recyclability and self-regulation in nature,
Understanding Existence as Co-existence (Sah-astitva) of mutually interacting units in all
pervasive space, Holistic perception of harmony at all levels of existence.
UNIT-5 Implications of the above Holistic Understanding of Harmony on
Professional Ethics
Natural acceptance of human values, Definitiveness of Ethical Human Conduct, Basis for
Humanistic Education, Humanistic Constitution and Humanistic Universal Order, Competence
in Professional Ethics: a) Ability to utilize the professional competence for augmenting universal
human order, b) Ability to identify the scope and characteristics of people-friendly and eco
friendly production systems, technologies, and management models, Case studies of typical
holistic technologies, management models and production systems, Strategy for the transition
from the present state to Universal Human Order: a) At the level of individual: as socially and
ecologically responsible engineers, technologists and managers, b)At the level of society: as
mutually enriching institutions and organizations.
Text Book
BCS303 DISCRETE STRUCTURES & THEORY OF LOGIC
CO 1 Acquire Knowledge of sets and relations for solving the problems of POSET and lattices. K3, Ka
CO 2
Apply fundamental concepts of functions and Boolean algebra for solving the problems of logical
abilities. KË, Kz
CO 3 Employ the rules of propositions and predicate logic to solve the complex and logical problems. Ka
CO 4
Explore the concepts of group theory and their applications for solving the advance technological
problems.
K, K¡
CO5 Illustrate the principles and concepts of graph theory for solving problems related to computer science. Kz, Ks
DETAILED SYLLABUS 3-1-0
Unit Topic Proposed
Lecture
Set Theory& Relations: Introduction, Combination of sets. Relations: Definition, Operations on
relations, Properties of relations, Composite Relations, Equality of relations, Recursive definition
of relation, Order of relations. 08
POSET 8& Lattices: Hasse Diagram, POSET, Definition & Properties of lattices - Bounded,
Complemented, Distributed, Modular and Complete lattice.
Propositional Logic: Proposition, well formed formula, Truth tables, Tautology, Satisfiability,
IV Contradiction, Algebra of proposition, Theory of Inference. 08
Predicate Logic: First order predicate, well formed formula of predicate, quantifiers, Inference
theory of predicate logic.
V Graphs: Definition and terminology, Representation of graphs, Multigraphs, Bipartite graphs,
Planar graphs, Isomorphism and Homeomorphism of graphs, Euler and Hamiltonian paths, Graph 08
coloring
Combinatorics: Introduction, Counting Techniques, Pigeonhole Principle
Text books:
1. Koshy, Discrete Structures, Elsevier Pub. 2008 Kenneth H. Rosen, Discrete Mathematics and Its Applications, 6/e, McGraw-Hill,
2006.
2. B. Kolman, R.C. Busby, and S.C. Ross, Discrete Mathematical Structures, 5/e, Prentice Hall, 2004.
3. E.R. Scheinerman, Mathematics: ADiscrete Introduction, Brooks/Cole, 2000.
4. R.P. Grimaldi, Discrete and Combinatorial Mathematics, 5/e, Addison Wesley, 2004
5. Liptschutz, Seymour, " Discrete Mathematics", McGraw Hill.
6. Trembley, J.P & R. Manohar, "Discrete Mathematical Structure with Application to Computer Science", McGraw Hill. 4. Deo,
7. Narsingh, "Graph Theory With application to Engineering and Computer.Science.", PHI.
8. Krishnamurthy, V., "Combinatorics Theory & Application", East-West Press Pvt. Ltd., New Delhi