B.E. CCE-Curriculum & Syllabus
B.E. CCE-Curriculum & Syllabus
2
PROGRAMME EDUCATIONAL OBJECTIVES (PEO)
3
PROGRAM OUTCOMES (PO)
4
PSO 1: To analyze, design and develop solutions by applying foundational
concepts of computer and communication engineering.
5
PANIMALAR ENGINEERING COLLEGE
(An Autonomous Institution, Affiliated to Anna University, Chennai)
B.E. Computer and Communication Engineering
CHOICE BASED CREDIT SYSTEM CURRICULA AND SYLLABI R-2021
SEMESTER I
Sl.No Course Contact
Course Title Category L T P C
Code Periods
THEORY
1. Communicative English and
21HS1101 HS 5 3 0 2 4
Language Skills Lab I Integrated
2. Engineering Mathematics –I BS 4 3 1 0 4
21MA1101
3. Engineering Physics BS 3 3 0 0 3
21PH1101
4. Engineering Chemistry BS 3 3 0 0 3
21CY1101
5. Problem Solving and Python 3 3 0 0 3
21ES1101 ES
Programming
6. Engineering Graphics ES 5 3 0 2 4
21ES1102
PRACTICALS
7. Problem Solving and ES
21ES1111 4 0 0 4 2
Python Programming
Laboratory
8. Physics and Chemistry BS 4 0 0 4 2
21BS1111 Laboratory
TOTAL 31 18 1 12 25
SEMESTER II
Sl. No Course Course Title Category Contact L T P C
Code Periods
THEORY
Communicative English
1. 21HS1201 &Language Skills Lab II HS 5 3 0 2 4
Integrated
2. Engineering Mathematics – II BS 4 3 1 0 4
21MA1201
Physics for Electronics
3. 21PH1201 BS 3 3 0 0 3
Engineering
Basic Electrical, Electronics ES
4. 21ES1201 and Measurements 3 3 0 0 3
Engineering
5. Programming in C PC 3 3 0 0 3
21IT1201
6 Mandatory Course – I MC 2 2 0 0 0
PRACTICALS
7. C Programming Laboratory PC 4 0 0 4 2
21IT1211
8. Engineering Practices ES 4 0 0 4 2
21ES1211 Laboratory
TOTAL 28 17 1 10 21
6
SEMESTER III
SEMESTER IV
Sl.N Course Course Title Category Contact L T P C
o Code Periods
THEORY
1. 21MA1403 Probability and Random BS 4 3 1 0 4
Processes
2. 21CS1402 Design and Analysis of PC 3 3 0 0 3
Algorithms
3. 21CS1401 Database Management PC 3 3 0 0 3
Systems
4. 21CS1303 Software Engineering PC 3 3 0 0 3
5. 21CB1202 Digital Principles & PC 3 3 0 0 3
Computer Organization
6. Open Elective- I OE 3 3 0 0 3
PRACTICALS
7. 21CS1411 Database Management PC 4 0 0 4 2
Systems Laboratory
8. 21CC1411 Digital System Design PC 4 0 0 4 2
Laboratory
TOTAL 27 18 1 8 23
7
SEMESTER V
3. Microcontrollers and PC 3 3 0 0 3
21EC1503 Computer Architecture
21CS1501 Object Oriented Analysis and
4. PC 5 3 0 2 4
Design (Lab Integrated)
5. 21EC1501 Analog and Digital PC 3 3 0 0 3
Communication
6. 21CS1602 Artificial Intelligence and Machine PC 3 3 0 0 3
Learning
PRACTICALS
7. 21CS1412 Networks Laboratory PC 4 0 0 4 2
SEMESTER VI
8
SEMESTER VII
THEORY
TOTAL 23 15 0 8 19
SEMESTER VIII
PRACTICALS
1. Professional Elective V PE 3 3 0 0 3
2. Professional Elective VI PE 3 3 0 0 3
9
CREDIT DISTRIBUTION
10
PROFESSIONAL ELECTIVE COURSES:
VERTICALS
Vertical I Vertica l Vertical III Vertical IV Vertical V Vertical VI Vertical VII Vertical VIII
II
Data Cloud Cyber Creative Emerging Wireless Radio
Science Full Computing Security Media Technolo Networks Communicatio
Stack and Data and Data Technol gies and IoT n and
Develo Privacy ogies Broadband
Center
Networks
pment Technolo
gies
Exploratory Open Source Cloud Tools and Ethical Augmented Augmented Wireless Broad Band
Data Analysis Technologi Techniques Hacking Reality/Virtual Reality/Virtual Networks Access
Reality Reality Technologies
Recommender App Digitaland Robotic Adhoc and
Multimedia
Systems Development Virtualization Mobile Process Wireless Sensor Software
and Animation
Forensics Automation Networks Defined
Networks
Neural Cloud Cloud Services Social Video Creation Neural Cooperative
Networks Services Management Network and Editing Networks and Communication Cognitive Radio
and Deep Manageme Security Deep s and Networks
Networking
Text and IoT and its Wireless
UI and UX Storage Modern UI and UX Cyber
Speech Design Technologies Cryptography Design Security Applications Broadband
Analysis Networks
Software Engineering IoT Based
Business Site Reliability Digital Quantum
Testing and Secure System Design Massive MIMO
Analytics Engineering Marketing Computing
Automation Software Networks
Image and Web Cryptocurrency Cryptocurrency Industrial IoT 5G and beyond
Stream
Video Application Processing and Visual Effects and 4.0 communication
Analytics Security Blockchain Blockchain Networks
Computer Cyber Wireless Sensor
Game Game
Vision DevOps DevOps Physical Network Design Photonic
Development Development
Techniques Systems Networks
Data Principles of Security and Security and Multimedia 3D Printing
Programming Privacy in Cloud Privacy in Cloud Data
Visualization and Design
Languages Compression
Professional Elective Courses will be registered in Semesters V and VI. These courses are listed in
groups called verticals that represent a particular area of specialization / diversified group. Students
are permitted to choose all the Professional Electives from a particular vertical or from different
verticals. Further, only one Professional Elective course shall be chosen in a semester horizontally (row-
wise). However, two courses are permitted from the same row, provided one course is enrolled in
Semester V and another in semester VI.
The registration of courses for B.E./B.Tech (Honours) or Minor degree shall be done from Semester V
to VIII. The procedure for registration of courses explained above shall be followed for the courses of
B.E/B.Tech (Honours) or Minor degree also. For more details on B.E./B.Tech (Honours) or Minor
degree refer to the Regulations 2021, Clause 4.10.
11
PROFESSIONAL ELECTIVE COURSES: VERTICALS
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. 21AD1901 Exploratory Data
PE 3 0 0 3 3
Analysis
2. 21AD1902 Recommender PE
3 0 0 3 3
Systems
3. 21AD1918 Neural Networks and PE
3 0 0 3 3
Deep Learning
4. 21AD1919 Text and Speech PE
3 0 0 3 3
Analysis
5. 21AD1920 Business Analytics PE
3 0 0 3 3
6. 21AD1906 Image and Video PE
3 0 0 3 3
Analytics
7. 21AD1921 Computer Vision PE
3 0 0 3 3
Techniques
8. 21AD1922 Data Visualization PE
3 0 0 3 3
7. 21IT1906 DevOps PE 3 0 0 3 3
Principles of Programming
8. 21IT1907 PE 3 0 0 3 3
Languages
12
VERTICAL 3: CLOUD COMPUTING AND DATA CENTER
TECHNOLOGIES
PERIODS TOTAL
S. COURSE COURSE TITLE CATE
PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
Cloud Tools and
1. 21CS1901 PE 3 0 0 3 3
Techniques
2. 21CS1902 Virtualization PE 3 0 0 3 3
Cloud Services
3. 21CS1903 PE 3 0 0 3 3
Management
21CS1904 Storage Technologies
4. PE 3 0 0 3 3
21CS1905 Site Reliability
5. PE 3 0 0 3 3
Engineering
6. 21CS1906 Stream Processing PE 3 0 0 3 3
7. 21IT1906 DevOps PE 3 0 0 3 3
Security and Privacy in
8. 21CS1907 PE 3 0 0 3 3
Cloud
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. 21IT1908 Ethical Hacking PE 3 0 0 3 3
Digital and Mobile
2. 21IT1909 PE 3 0 0 3 3
Forensics
3. 21IT1910 Social Network Security PE 3 0 0 3 3
13
VERTICAL 5: CREATIVE MEDIA TECHNOLOGIES
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. Augmented
21CS1908 PE 3 0 0 3 3
Reality/Virtual Reality
2. 21CS1909 Multimedia and
PE 3 0 0 3 3
Animation
3. 21CS1910 Video Creation and
PE 3 0 0 3 3
Editing
4. 21IT1903 UI and UX Design PE 3 0 0 3 3
5. 21CS1911 Digital Marketing PE 3 0 0 3 3
6. 21CS1912
Visual Effects PE 3 0 0 3 3
7. 21CS1913 Game Development PE 3 0 0 3 3
8. Multimedia Data
21CS1914 3 0 0 3 3
Compression and PE
Storage
PERIODS TOTAL
S. COURSE COURSE TITLE CATE CREDITS
PER WEEK CONTACT
NO. CODE GORY
L T P PERIODS
1. Augmented PE
21CS1908 3 0 0 3 3
Reality/Virtual Reality
2. Robotic Process PE
21CS1915 3 0 0 3 3
Automation
3. Neural Networks and PE
21AD1918 3 0 0 3 3
Deep Learning
4. 21IT1915 Cyber Security PE
3 0 0 3 3
5. 21CS1916 Quantum Computing PE
3 0 0 3 3
6. Cryptocurrency and PE
3 0 0 3 3
21IT1913 Block chain
Technologies
7. 21CS1913 Game Development PE
3 0 0 3 3
8. PE
21CS1917 3D Printing and Design 3 0 0 3 3
14
VERTICAL 7: WIRELESS NETWORKS AND IoT
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. 21EC1929 Wireless Networks PE 3 0 0 3 3
2. Adhoc and Wireless Sensor PE
21EC1930 3 0 0 3 3
Networks
3. Cooperative PE
3 0 0 3 3
21EC1931 Communications and
Networking
4. 21EC1932 IoT and its Application s PE
3 0 0 3 3
5. 21EC1933 IoT Based System Design PE
3 0 0 3 3
6. Industrial IoT 4.0 PE
21EC1934 3 0 0 3 3
7. PE
21EC1935 Wireless Sensor Network 3 0 0 3 3
Design
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. Broad Band Access
21EC1943 PE
Technologies 3 0 0 3 3
2.
21EC1944 Software Defined Networks PE
3 0 0 3 3
3.
21EC1945 Cognitive Radio Networks PE
3 0 0 3 3
4. Wireless Broadband
21EC1946 PE 3 0 0 3 3
Networks
5. Massive MIMO
21EC1947 PE
Networks 3 0 0 3 3
6. 5G and beyond
21EC1948 PE
communication Networks 3 0 0 3 3
7. 21EC1949 Photonic Networks PE 3 0 0 3 3
15
HUMANITIES AND SOCIAL SCIENCES (HS)
16
PROFESSIONAL CORE (PC)
17
30. Advanced
21EC1712 Communication PC 4 0 0 4 2
Laboratory
31. Security Laboratory
21CS1712 PC 4 0 0 4 2
SEMESTER-IV
OPEN ELECTIVE–I
Contact
Sl. Course Code Course Title Category L T P C
Periods
No
Air Pollution and Control
1. 21CE1001 Engineering OE 3 3 0 0 3
18
SEMESTER-VI
OPEN ELECTIVE II
MANDATORY COURSES
Sl. Course Code Course Title Category Contact L T P C
No Periods
1. 21MC1001 Environmental Science MC 2 2 0 0 0
2. 21MC1002 Constitution of India MC 2 2 0 0 0
3. 21MC1003 Human Values MC 2 2 0 0 0
19
SEMESTER I
OBJECTIVES:
To induce the basic reading and writing skills among the first year
engineering and technologystudents.
To assist the learners to develop their listening skills, which will enable
them listening to lectures and comprehend them by asking questions and
seeking clarifications
To succor the learners to develop their speaking skills and speak fluently in
real contexts
To motivate the learners to develop vocabulary of a general kind by
developing their reading skills for meeting the competitive exams like GATE,
TOFEL, GRE, IELTS, and other exams conducted by Central and State
governments.
20
Vocabulary Development: Connectives, Reference Words, Technical Vocabulary.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
The students will be able to comprehend conversations and short talks
delivered in English
Participate effectively in informal conversations; introduce themselves and
their friends and express opinions English
Read articles of a general kind in magazines and newspapers
Write short essays of a general kind and personal letters and emails in
English
Recognize the use of grammar in speech and writing
TEXT BOOKS:
N P Sudharshana& C Savitha. English for Technical Communication Delhi:
CUP, 2019. Board of Editors. English for Engineers and Technologists
Volume 1 Orient Black Swan Limited, 2020.
REFERENCES:
Board of Editors. Using English-A course book for Undergraduate engineers
andTechnologists Orient Black SwanLimited, 2017
Comfort, Jeremy, et al. Speaking Effectively: Developing Speaking Skills for
BusinessEnglish. CambridgeUniversity Press, Cambridge: Reprint 2011
Means,L. Thomas and Elaine Langlois. English & Communication For
Colleges. CengageLearning ,USA:2007
21
Redston, Chris & Gillies Cunningham Face2Face (Pre-intermediate
Student’s Book& Workbook)Cambridge University Press, New Delhi:
2005.
WEB REFERENCES:
https://learnenglishteens.britishcouncil.org/exams/grammar-and-vocabulary-
exams/word-formation
https://cdn.s3waas.gov.in/s347d1e990583c9c67424d369f3414728e/uploads/
2018/02/20180316 21.pdf
http://xn--englishclub-ql3f.com/grammar/parts-of-speech.htm
https://www.edudose.com/english/grammar-degree-of-comparison-rules/
22
21HS1101 LANGUAGE SKILLS LAB
List of exercises
MINIMUM OF EXERCISES TO BE CONDUCTED
TOTAL: 30 PERIODS
SOFTWARE REQUIRED: Globaren
REFERENCES:
23
L T P C
21MA1101 ENGINEERING MATHEMATICS- I
3 1 0 4
OBJECTIVES:
Matrix transforms are very useful within the world of computer graphics. A
matrix algebra can be readily applied to the structural properties of graphs
from an algebraic point of view
The aim of this course to get depth knowledge about calculus
Familiarize the functions of two variables and finding its extreme points.
To make the students understand various techniques of integration
Apply multiple integral ideas in solving areas, volumes and other practical
problems
OUTCOMES:
On successful completion of the course student will be able to:
24
1 Able to find eigen values and eigen vectors, diagonalization of a matrix,
symmetric matrices,positive definite matrices and similar matrices
2 Apply limit definition and rules of differentiation to differentiate functions.
3 Understand familiarity in the knowledge of Maxima and Minima, Jacobian,
Taylor series and apply the problems involving Science and Engineering.
4 Understand the knowledge of Integration by parts, Trigonometric integrals,
Trigonometricsubstitutions, Integration of rational functions by partial fraction.
5 Understand the knowledge of Area enclosed by plane curves, Change of
variables in doubleintegrals, Triple integrals, Volume of Solids.
TEXT BOOKS:
1 Grewal B.S., ―Higher Engineering Mathematics‖, Khanna Publishers,
NewDelhi,43 rdEdition,2014
2 James Stewart, ―Calculus: Early Transcendentals‖, Cengage
Learning,7 Edition, NewDelhi, 2015
th
REFERENCES:
1 Anton, H, Bivens, I and Davis, S, ―Calculus‖, Wiley, 10th Edition, 2016
2 Jain R.K. and Iyengar S.R.K., ―Advanced Engineering Mathematics‖,
NarosaPublications,NewDelhi, 3rd Edition, 2007
3 Narayanan, S. and Manicavachagom Pillai, T. K., ―Calculus‖ Volume I and II,
S. Viswanathan Publishers Pvt. Ltd., Chennai, 2007
4 Srimantha Pal and Bhunia, S.C, ―Engineering Mathematics‖ Oxford
University Press, 2015
5 Weir, M.D and Joel Hass, ―Thomas Calculus‖, 12th Edition, Pearson India,
2016.
6 B.V. Ramana, ― Higher Engineering Mathematics‖, McGraw Hill Education,
India.
7 Erwin Kreyzig, Advanced Engineering Mathematics, John Wiley
sons,10thedition,2015
25
L T P C
21PH1101 ENGINEERING PHYSICS
3 0 0 3
OBJECTIVES:
To enhance the fundamental knowledge in Physics and its applications
relevant to various streams of Engineering and Technology
MECHANICS 9
UNIT - I
System of particles: centre of mass in one and two dimensions – rotational motion
of continues system – torque – moment of inertia – conservation of angular
momentum – Newton’s laws for rotation – equations of rotational motion – work
energy theorem for rotational motion. Stress, strain, Hooke’s law and elastic moduli
– twisting couple per unit twist for solid and hollow cylinders – torsional pendulum
theory – bending moment of beam – cantilever and non-uniform bending theory –
uniform bending theory – I shape girder.
26
dimensional box – tunnelling (qualitative) – scanning tunnelling microscope.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Upon completion of this course, the students will understand the basics of
mechanics and especially elastic properties of materials.
2 Upon completion of this course, the students will gain knowledge on the
basic concepts of electromagnetic waves and its properties.
3 Upon completion of this course, the students will have adequate knowledge
on the concepts of thermal properties of materials and their applications in
heat exchangers
4 Upon completion of this course, the students will acquire knowledge on the
concepts of oscillations, lasers and fiber optics and their technological
applications
5 Upon completion of this course, the students will get knowledge on
advanced physics concepts of quantum theory and its applications in
modelling microscopes
TEXT BOOKS:
1 Gaur, R.K. & Gupta, S.L. ―Engineering Physics‖. Dhanpat Rai Publishers,
2012.
2 Santhosam, K. Russel Raj, K. & Maheswaran, A. ―Engineering Physics,
KRAM Publications, 2021
3 Pandey, B.K. & Chaturvedi, S. ―Engineering Physics‖. Cengage Learning
India, 2012.
REFERENCES:
1 Halliday, D., Resnick, R. & Walker, J. ―Principles of Physics‖. Wiley, 2015
2 Tipler, P.A. & Mosca, G. ―Physics for Scientists and Engineers with Modern
Physics’.W.H.Freeman, 2007
3 Arthur Beiser, ―Concepts of Modern Physics‖, Mc Graw Hill, Sixth edition,
1994.
4 Douglas. C., Giancoli. ―Physics: Principles with applications‖, Pearson,
2014.
WEB REFERENCES:
1 https://kluniversity.in/physics/pdfs/crypdf.pdf
2 https://mrcet.com/downloads/digital_notes/ECE/III%20Year/FIBER%20OPTI
CAL%20COM MUNICATIONS.pdf
3 https://nptel.ac.in/content/storage2/courses/117101002/downloads/Lec01.pdf
4 https://nptel.ac.in/content/storage2/courses/117101002/downloads/Lec19.pdf
5 https://ocw.mit.edu/courses/physics/8-04-quantum-physics-i-spring-
2016/lecture- notes/MIT8_04S16_LecNotes3.pdf
27
6 https://ocw.mit.edu/courses/physics/8-04-quantum-physics-i-spring-
2016/lecture- notes/MIT8_04S16_LecNotes5.pdf
28
L T P C
21CY1101 ENGINEERING CHEMISTRY
3 0 0 3
OBJECTIVES:
To know about the importance of Chemistry in Engineering domain
To understand the Chemistry background of industrial process
To apply Chemistry knowledge for Engineering disciplines.
29
Electrochemical Corrosion (Galvanic, Differential aeration) – Corrosion Control,
Electrochemical protection – Sacrificial Anodic method – Impressed Current
Cathodic Protection – Corrosion Inhibitors – Biocorrosion.Protective Coatings –
Paints, Constituents, Functions- Surface preparation for metallic coatings,
Electroplating and Electroless Plating.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Analyze the water quality parameters in purification and significance in
industries, daily life.
2 Explain the types, fabrication and engineering applications of polymers.
Develop economically new methods of synthesizing nano materials and their
applications.
3 Demonstrate the knowledge of analytical techniques using spectroscopy..
4 Relate the electrode potential for its feasibility in electrochemical reaction.
Illustrate the causes, cocorrosion and to achieve its protection.
5 Compare the economic and efficient usage of non-conventional and
conventional energy sourceand various storage devices.
TEXT BOOKS:
1 P.C.Jain and Monika Jain, ―Engineering Chemistry‖, Dhanpat Rai Publishing
Company(P)LTD., New Delhi.
2 S. S. Dara and S.S. Umare, ―A Textbook of Engineering Chemistry‖ S.
Chand and Company Ltd, New Delhi.
3 V.R.Gowariker, N.V.Viswanathan and JayadevSreedhar, ―Polymer
Science‖, New Age International P (Ltd.,), Chennai, 2006
4 P. Kannan and A. Ravikrishnan, ―Engineering Chemistry‖, Sri Krishna
Hitech Publishing Company Pvt. Ltd. Chennai, 2009.
5 S. Vairam, P. Kalyani and Suba Ramesh, ―Engineering Chemistry‖, Wiley
India, 2011
REFERENCES:
1 Friedrich Emich, ―Engineering Chemistry‖, Scientific International Pvt. Ltd.,
NewDelhi
30
2 PrasanthaRath, ―Engineering Chemistry‖, Cengage Learning India Pvt.,
Ltd., Delhi.
3 P.W. Atkins and de Paula Julio, ―Physical Chemistry‖, Oxford University
Press, 8th Ed.,(Indian Student Edition) (2009).
4 K. K. Rohatgi-Mukherjee, ―Fundamental of Photochemistry‖ New Age
International (P) Ltd., New Delhi, 1986
5 G.A. Ozin and A.C. Arsenault, ―Nanochemistry: A Chemical Approach
toNanomaterials‖, RSC Publishing, 2005 Nanomaterials, B.Viswanathan,
Alpha Science , ISBN: 9781842654941.
WEB REFERENCES:
1 http://www.mhhe.com/engcs/compsci/forouzan/dcn/student/olc.
31
PROBLEM SOLVING AND PYTHON L T P C
21ES1101
PROGRAMMING 3 0 0 3
OBJECTIVES:
To know the basic programming constructs –data types, decision structures,
and control structures in python
To know how to use libraries for string manipulation
To Use python data structures – Lists, Tuples and Dictionary
To know the basic concepts of Object-Oriented Programming
To learn about input/output with files in Python
SUGGESTED ACTIVITIES:
Developing Pseudo codes and flowcharts for real life activities such as railway
ticket Booking using IRCTC, admission process to undergraduate course,
academic schedules during a semester etc.
Developing algorithms for basic mathematical expressions using arithmetic
Operations
Installing Python
Simple programs on print statements, arithmetic operations.
SUGGESTED ACTIVITIES:
Simple Python program implementation using Operators, Conditionals,
Iterative Constructs and Functions.
32
Developing simple applications like calculator, calendar, phone directory, to-
do lists etc.
Flow charts for GCD, Exponent Functions, Fibonacci Series using conditionals
and
Recursion vs. Iteration.
SUGGESTED ACTIVITIES:
Implementing python program using lists, tuples, sets for the following
scenario:
Simple sorting techniques
Student Examination Report
Billing Scheme during shopping.
Implementing any application using List and Tuple data structures.
SUGGESTED ACTIVITIES:
Features of OOP.
Persistent storage of objects
Operators and its usage.
Simple programs using OOP concepts
SUGGESTED EVALUATION METHODS:
Quizzes on basic OOP concepts.
Assignments on illustrative problems.
33
Quizzes on inheritance and exception handling
SUGGESTED ACTIVITIES:
Developing modules using Python to handle files and apply various operations
onfiles.
Usage of exceptions, multiple except blocks – for applications that use
delimiters likeage,range of numerals etc.
Implementing Python program to open a non-existent file using exceptions.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Develop algorithmic solutions to simple computational problems
2 Write and execute simple Python programs
3 Familiarize with python string handling techniques and user defined functions
4 Represent compound data using Python lists, tuples and dictionaries.
5 Understand the concept of object oriented programming techniques.
6 Read and write data from/to files in Python Programs.
TEXT BOOKS:
1 Reema Thareja, ``Problem Solving and Programming with Python’’, 2nd
edition, OXFORDUniversity Press, New Delhi, 2019.(UNIT 1,2,3,4(Exception
Handling) and 5).Bill Lubanovic, ―Introducing Python-Modern Computing
in Simple Package‖, 2nd edition, O’REILLY, 2019.(UNIT 4(Object Oriented
Programming)).
2 Bill Lubanovic, ―Introducing Python-Modern Computing in Simple
Package‖, 2nd edition, O’REILLY, 2019.(UNIT 4(Object Oriented
Programming)).
REFERENCES:
1 Steven F. Lott, ―Modern Python Cookbook’’, 2nd Edition, O’REILLY, 2020.
2 Ryan Marvin, Mark Ng’ang’a, Amos Omondi, ―Python Fundamentals, Packt
Publishing.,2018.
34
3 Paul J. Deitel, Python for Programmers, Pearson India Education Services
Pvt. Ltd,2020. Martin C. Brown, Python: The Complete Reference, McGraw
Hill Education; Forth edition, 2018.
REFERENCES:
1 https://greenteapress.com/thinkpython2/thinkpython2.pdf
2 https://freecomputerbooks.com/An-Introduction-to-Python-Guido-van-
Rossum.html#downloadLinks
3 http://marvin.cs.uidaho.edu/Teaching/CS515/pythonTutorial.pdf.
35
L T P C
21ES1102 ENGINEERING GRAPHICS
3 0 2 4
OBJECTIVES:
Drawing free hand sketches of basic geometrical shapes and multiple views
of objects.
Drawing orthographic projections of lines and planes.
Drawing orthographic projections of solids.
Drawing development of the surfaces of objects.
Drawing isometric and perspective views of simple solids
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
36
Draw free hand sketching of basic geometrical shapes and multiple views of
objects.
Draw orthographic projections of lines and planes
Draw orthographic projections of solids
Draw development of the surfaces of objects
Draw isometric and perspective views of simple solids
TEXT BOOKS:
1 Natarajan, K. V., ―A text book of Engineering Graphics‖, 28 th Ed.,
DhanalakshmiPublishers, Chennai, 2015.
2 Venugopal, K. and Prabhu Raja, V., ―Engineering Graphics‖, New Age,
2008.
REFERENCES:
1 Bhatt, N.D.,Panchal V M and Pramod R. Ingle, ―Engineering Drawing‖,
CharotarPublishing House, 53rd Edition, 2014
2 Parthasarathy, N. S. and Vela Murali, ―Engineering Drawing‖, Oxford
University Press,2015.
3 Agrawal, B. and Agrawal C.M., ―Engineering Drawing‖, Tata McGraw,
N.Delhi, 2008.
WEB REFERENCES:
1 https://nptel.ac.in/courses/105/104/105104148/
2 https://www.youtube.com/channel/UCkCk0nvNyWhEOLge9JtDLDg
37
PROBLEM SOLVING AND PYTHONPROGRAMMING L T P C
21ES1111
LABORATORY 0 0 4 2
OBJECTIVES:
To write, test, and debug simple Python programs.
To implement Python programs with conditions and loops.
To use functions for structuring Python programs.
To represent compound data using Python lists, tuples, dictionaries.
To use OOPS concepts in Python.
To read and write data from/to files in Python
LIST OF EXPERIMENTS
1 Write programs to demonstrate different number data types in python.
2 Basic Python Programs.
3 Develop python programs to demonstrate various conditional statements.
4 Implement user defined functions using python.
5 Develop python scripts to demonstrate functions.
6 Develop python programs to perform operations on List & Tuple.
7 Demonstrate the concept of Dictionary with python programs.
8 Develop python codes to demonstrate concept of class and objects.
9 Demonstrate OOPS concepts like inheritance and polymorphism with python
programs.
10 Demonstrate python codes to print try, except and finally block statements.
11 Implement python programs to perform file operations.
12 Implement python programs using modules and packages.
13 Simulate bouncing ball using Pygame.
TOTAL: 60 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 To write, test, and debug simple Python programs.
2 To implement Python programs with conditions and loops.
3 To use functions for structuring Python programs.
4 To represent compound data using Python lists, tuples, dictionaries.
38
5 To use OOPS concepts in Python.
6 To read and write data from/to files in Python
WEB REFERENCES:
1 https://www.programiz.com/python-programming/examples
2 https://www.geeksforgeeks.org/python-programming-examples/
3 https://beginnersbook.com/2018/02/python-programs/
4 https://www.javatpoint.com/python-programs
5 https://www.w3schools.com/python/python_examples.asp
6 https://www.sanfoundry.com/python-problems-solutions/
39
L T P C
21ES1111 PHYSICS AND CHEMISTRY LABORATORY
0 0 4 2
OBJECTIVES:
To introduce different experiments to test basic understanding of physics
concepts applied in optics, thermal physics, properties of matter and liquids.
LIST OF EXPERIMENTS (Minimum of experiments to be conducted: 5
Experiments)
TOTAL: 30 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Upon completion of the course, the students will be able to apply principles
of elasticity,optics and thermal properties for engineering applications.
TEXT BOOKS
1 Ruby Das, C.S. Robinson, Rajesh Kumar, Prashant Kumar Sahu, A
Textbook of Engineering Physics Practical, University Science Press, Delhi,
II Edition (2016), ISBN978-93-80386-86-7
2 Harnam Singh, Dr.P.S. Hemne, B.Sc., Practical Physics, S.Chand &
Company Ltd, NewDelhi, Edition 2011, ISBN 81-219-0469-2
WEB REFERENCES:
1 https://www.vlab.co.in/broad-area-physical-sciences
2 https://vlab.amrita.edu/?sub=1
CHEMISTRY LABORATORY
OBJECTIVES:
To inculcate experimental skills to test basic understanding of water quality
parameters such as, alkalinity, hardness, DO and chloride.
To induce the students to familiarize with electroanalytical techniques such
as, pH metry,potentiometry and conductometry in the determination of
aqueoussolutions.
40
LIST OF EXPERIMENTS(Minimum of experiments to be conducted: 5
Experiments)
1. Estimation of HCl using Na 2CO3 as primary standard and Determination of
alkalinity in water sample
2. Determination of total, temporary & permanent hardness of water by EDTA
method
3. Determination of DO content of water sample by Winkler‟s method.
4. Determination of chloride content of water sample by argentometric method
5. Estimation of copper content of the given solution by Iodometry.
6. Determination of strength of given hydrochloric acid using pH meter.
7. Determination of strength of acids in a mixture of acids using conductivity
meter.
8. Estimation of iron content of the given solution using potentiometer.
9. Determination of total, temporary & permanent hardness of water by EDTA
method
10. Estimation of iron content of the water sample using spectrophotometer (1,
10-26, Phenanthroline / thiocyanate method).
11. Estimation of sodium and potassium present in water using flame
photometer.
12. Determination of molecular weight of polyvinyl alcohol using Ostwald
viscometer.
13. Pseudo first order kinetics-ester hydrolysis.
14. Corrosion experiment-weight loss method.
15. Phase change in a solid.
TOTAL: 30 PERIODS
OUTCOME:
To analyse the quality of water samples with respect to their acidity,
alkalinity, hardness and DO.
To quantitatively analyse the aqueous solution by electroanalytical
techniques.
TEXT BOOKS
1 Laboratory Manual- Department of Chemistry, CEGC, Anna University
(2014).
2 Vogel’s Textbook of Quantitative Chemical Analysis (8th edition, 2014).
41
SEMESTER II
OBJECTIVES:
To develop linguistic and strategic competence in workplace context and to
enhance language proficiency and thereby the employability of budding
engineers and technologists.
To help learners to develop their listening skills, which will, enable them to
listen to lectures and comprehend them by asking questions; seeking
clarification and developing their speaking skills and to speak fluently in real
contexts.
To improve the relevant language skills necessary for professional
communication.
To Introduce them to life skills, their importance in leading Personal &
professional life, key concepts of business communication and
Communicative skills.
42
Writing a Report Grammar: Direct into IndirectSpeech, Use of Phrases Vocabulary
Development: Reporting Words, Technical Jargon.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
Read and comprehend technical texts effortlessly.
Write thoughts and insights of their own.
Recognize the need for life skills, apply them to different situations, the basic
communicationpractices in different types of communication.
Gain confidence to communicate effectively in various situations to acquire
employabilityskills.
Become an active listener of professional contexts.
TEXT BOOKS:
1 Richards, C. Jack. Interchange, New Delhi: CUP, 2017.
2 Board of Editors. English for Engineers and Technologists Volume 2
Orient Black SwanLimited, 2020.
REFERENCES:
1 Kumar, Suresh. E. Engineering English. Orient Blackswan: Hyderabad,2015
2 Raman, Meenakshi and Sharma, Sangeetha- Technical Communication
Principles andPractice.Oxford University Press: New Delhi, 2014.
3 Grussendorf, Marion, English for Presentations, Oxford University Press,
Oxford 2007.
4 Means, L. Thomas and Elaine Langlois, English & Communication For
Colleges.CengageLearning, USA 2007.
5 Students can be asked to read Tagore, Chetan Bhagat and for
supplementary reading.
WEB REFERENCES:
1 https://learnenglishteens.britishcouncil.org/exams/grammar-and-vocabulary-
exams/word-formation
2 https://cdn.s3waas.gov.in/s347d1e990583c9c67424d369f3414728e/uploads/2
018/02/201803 1621.pdf
3 http://xn--englishclub-ql3f.com/grammar/parts-of-speech.html
4 https://www.edudose.com/english/grammar-degree-of-comparison-rules/
43
ONLINE COURSES / RESOURCES:
1 https://basicenglishspeaking.com/wh-questions/
2 https://agendaweb.org/verbs/modals-exercises.html
3 https://cdn.s3waas.gov.in/s347d1e990583c9c67424d369f3414728e/uploads/2
018/02/201803 1621.pdf
4 https://www.ego4u.com/en/cram-up/grammar/prepositions
List of exercises
Minimum of exercises to be conducted:
TOTAL: 30 PERIODS
SOFTWARE REQUIRED:
Globarena.
TEXT BOOKS:
Brooks, Margret. Skills for Success. Listening and Speaking. Level 4
1 Oxford UniversityPress, Oxford:2011.
Richards, C. Jack. & David Bholke. Speak Now Level 3. Oxford University
2 Press, Oxford:2010
REFERENCES:
Bhatnagar, Nitin and Mamta Bhatnagar. Communicative English for
1 Engineers andProfessionals. Pearson: New Delhi, 2010.
2 Ladousse, Gillian Porter. Role Play. Oxford University Press: Oxford, 2014.
Richards C. Jack. Person to Person (Starter). Oxford University Press:
3 Oxford, 2006.
44
4 Vargo, Mari. Speak Now Level 4. Oxford University Press: Oxford, 2013.
E. Suresh Kumar et al. Communication for Professional Success, Orient
5 Blackswan:Hyderabad, 2015.
Raman, Meenakshi and Sangeeta Sharma. Professional Communication.
6 Oxford UniversityPress: Oxford, 2014.
45
L T P C
21MA1201 ENGINEERING MATHEMATICS II
3 1 0 4
OBJECTIVES:
Vectors are very helpful for the engineering students as it will give the insight
into howto trace along the different types of curves.
To develop an understanding of the standard technique of a complex variable
theory inparticular of analytics functions and its mapping property.
Complex integration is an intuitive extension of real integration. Complex
variable techniques
have been used in a wide variety of areas of engineering. This has been
particularly true in areas such as electromagnetic field theory, fluid dynamics,
aerodynamics and elasticity.
To solve the linear differential equations with constant coefficients.
46
TOTAL: 60 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
Can identify the Gradient, divergence and curl of a vector point function and
1 related identities. Evaluation of line, surface and volume integrals using
Gauss, Stokes and Green‟s theorems andtheir verification.
2 Understanding analytic functions, harmonic functions, conformal mapping.
3 Determine the types of singularities, residues, contour integration.
4 Apply various techniques in solving differential equations.
5 Able to solve differential equations using Laplace transforms.
Can identify the Gradient, divergence and curl of a vector point function and
6 related identities. Evaluation of line, surface and volume integrals using
Gauss, Stokes and Green‟s theorems and their verification.
7 Understanding analytic functions, harmonic functions, conformal mapping.
TEXT BOOKS:
Grewel. B.S, “Higher Engineering Mathematics”, 43rd Edition, Khanna
1 Publications, Delhi, 2014.
B.V. Ramana, “ Higher Engineering Mathematics”, McGraw Hill Education,
2 India.
Bali N., Goyal M. and Walkins C., “Advanced Engineering Mathematics”,
Firewall Media (An imprint of Lakshmi Publications Pvt. Ltd.,), New Delhi, 7th
3 Edition, 2009.
REFERENCES:
Kreyszig Erwin, Advanced Engineering Mathematics”, John wiley and Sons,
1 10th Edition,New Delhi.
Jain R.K. and Iyengar S.R.K., “Advanced Engineering Mathematics”, Narosa
2 Publications, . New Delhi, 3rd Edition, 2007.
O‟Neil, P.V. “Advanced Engineering Mathematics”, Cengage Learning India
3 Pvt. Ltd, NewDelhi, 2007.
Sastry, S.S, “Engineering Mathematics”, Vol.I & II, PHI Learnig Pvt. Ltd, 4th
4 Edition, NewDelhi, 2014.
.Wyile, R.C. and Barrett, L.C., “Advanced Engineering Mathematics “Tata
5 McGraw HillEducation Pvt Ltd,. 6th Edition, New Delhi, 2012.
47
L T P C
21PH1201 PHYSICS FOR ELECTRONICS ENGINEERING
3 1 0 4
OBJECTIVES:
To understand the essential principles of Physics of semiconductor device and
Electron transport properties. Become proficient in magnetic, dielectric and
optical properties of materials and Nano devices.
UNIT - V NANODEVICES 9
Introduction – electron density in bulk material – size dependence of Fermi energy –
quantum confinement – quantum structures – density of states in quantum well,
quantum wire and quantum dot structures – excitons – quantum confined Stark effect
48
resonant tunneling – quantum interference effects – ballistic transport quantum
resistance and conductance Coulomb blockade effects – single electron phenomena
and single electron transistor – carbon nanotubes: properties and applications.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
Upon completion of this course, the students will able to gain knowledge on
classical and quantum electron theories, and energy band structures.
Upon completion of this course, the students will able to acquire knowledge on
basics of semiconductor crystalline materials and its applications in various
devices.
Upon completion of this course, the students will able to get knowledge on
magnetic and dielectric properties of materials.
Upon completion of this course, the students will able to have the necessary
understanding on the functioning of optical materials for optoelectronics.
Upon completion of this course, the students will able to understand the basics
of quantum structures and their applications in spintronics and carbon
electronics.
TEXT BOOKS:
1 Kasap, S.O., Principles of Electronic Materials and Devices, 4th Edition,
McGraw-Hill Education, 2018.
2 Donald A. Neamen, Semiconductor Physics and Devices: Basic Principles, 4th
edition, McGrawHill, 2012.
K. Santhosam, K. Russel Raj and A, Maheswaran, “Electrical Engineering
Materials”, Chess Educational Publishers, 2021.
REFERENCES:
1 Hanson, G.W.―Fundamentalsof Nanoelectronics.Pearson Education, 2009.
2 Rolf E. Hummel, “Electronic Properties of Materials”, Springer, 2011.
3 Charles Kittel, “Introduction to Solid State Physics”, Wiley, 2012.
4 A.J.Dekker, “Solid State Physics”, Prentice – Hall, Inc., 1969.
5 Rogers, B., Adams, J. & Pennathur, S. “Nanotechnology: Understanding Small
Systems”, CRC Press, 2014.
WEB REFERENCES:
1 http://tiiciiitm.com/profanurag/Semiconductors-Properties.pdf
2 https://nptel.ac.in/content/storage2/courses/112108150/pdf/Web_Pages/WEBP
_ M16.pdf
3 https://nptel.ac.in/content/storage2/courses/113106062/Lec16.pdf
ONLINE COURSES / RESOURCES:
1 https://onlinecourses.nptel.ac.in/noc20_ph10/preview
2 https://nptel.ac.in/content/storage2/courses/115103038/module1/lec1/2.html
49
BASIC ELECTRICAL, ELECTRONICS AND L T P C
21ES1201
MEASUREMENT ENGINEERING 3 0 0 3
OBJECTIVES:
To learn the concepts related with electrical circuits.
To study the concept of electrical machines.
To understand the utilization of electrical power.
To understand the basics of electronic devices.
To learn the applications of Op-Amp.
UNIT - I BASIC ELECTRIC CIRCUITS 9
Current- Voltage- Power- Voltage Source – Current Source- Ohm‟s Law – KCL – KVL
( Analysis with only independent source) – Resistors in series and parallel – Current
Division – Voltage Division- Mesh analysis, nodal analysis, Phasors- RMS value of
current and voltage – Active power- Apparent Power- Complex Power – Power Factor
- Simple problems.
TOTAL: 45 PERIODS
COURSE OUTCOMES
At the end of the course, the students will be able to:
1 Summarize the basic laws and concepts related to electrical circuits.
2 Explain the construction and working of electrical machines.
3 Discuss the utilization of electrical power.
4 Discuss the basic concepts of electronics
5 Learn the applications of Op-Amp.
50
6 Explain the concepts of measurement and transducers.
TEXT BOOKS
Kothari DP and I.J Nagrath, “Basic Electrical and Electronics Engineering”,
1 McGraw Hill Education, 2014.
Thomas L. Floyd, „Electronic Devices‟, 10th Edition, Pearson Education, 2018.
2 John Bird, “Electrical Circuit theory and technology”, Routledge, Fifth edition,
3 2013.
REFERENCES:
William Hayt, Jack Kemmerly, Steven Durbin and Jamie Phillips, :" Engineering
1 Circuit Analysis", McGraw Hill, 2019.
2 Kothari DP and I.J Nagrath, “Basic Electrical Engineering”, McGraw Hill, 2010.
A.K. Sawhney, Puneet Sawhney „A Course in Electrical & Electronic
3 Measurements & Instrumentation‟, Dhanpat Rai and Co, New Delhi, Edition 2011.
B.L.Theraja, A.K. Theraja, "A Text book on Electrical Technology Vol. III & IV", S.
4 Chand publications, Edition 2014.
Paul Deitel and Harvey Deitel, ―C How to Program‖, Seventh edition, Pearso
5 Publication
COURSES / RESOURCES:
1 https://nptel.ac.in/courses/108/106/108106172/
2 https://nptel.ac.in/courses/108/102/108102146/
3 https://nptel.ac.in/courses/108/101/108101091/
4 https://nptel.ac.in/courses/108/105/108105153/
51
L T P C
21IT1201 PROGRAMMING IN C
3 0 0 3
OBJECTIVES:
To learn the syntax for C programming
To develop C Programs using basic programming constructs
To develop C programs using arrays and strings
To develop applications in C using functions, pointers
To develop applications using structures and union
UNIT - I BASICS OF C PROGRAMMING 9
Introduction to programming paradigms - Structure of C program C programming:
Data Types – Storage classes - Constants – Enumeration Constants-- Keywords –
Operators: Precedence and Associativity-Expressions– Input /Output statements,
Assignment statements – Decision making statements Switch statement – Looping
statements Pre-processor directives Compilation process.
SUGGESTED ACTIVITIES:
Programs and Demonstration using integer type, arithmetic operators and
basic input/output
Programs and Demonstration using other data types and operators
SUGGESTED ACTIVITIES:
Programs and Demonstration using arrays and string operations
Develop an application to perform matrix operations using multi-dimensional
arrays.
Create an application that performs operations like concatenation, finding a
substring from a given string, etc. using character arrays.
Develop an application to perform Selection sort, linear and binary search
SUGGESTED ACTIVITIES:
Programs and Demonstration using functions and concepts of recursion.
Programs and Demonstration using pointers and arrays, address arithmetic
Programs and Demonstration using Pointers and strings
SUGGESTED ACTIVITIES:
Programs and Demonstration using array of structure, Pointers to structures,
Self- referential structures
Programs to demonstrate Dynamic Memory Allocation
SUGGESTED ACTIVITIES:
Programs and Demonstration using file operations in real-world applications.
TOTAL: 45 PERIODS
COURSE OUTCOMES
At the end of the course, the students will be able to:
1 Learn thesisyntax
mple afor
ppliC
caprogramming
2 Devsieglop
n a n d imp lem e n
tions in C using basic c onstr ucts
t applications using ar rays and strings
3
Develop and implement applications in C using functions and pointers.
45 Develop applications in C using structures and union.
6 Design applications using sequential and random access file processing.
TEXT BOOKS
ReemaThareja, ―Programming in C‖, Oxford University Press, Second Edition,
1 2016.
Kernighan, B.W and Ritchie,D.M, ―The C Programming language‖, Second
2 Edition Pearson Education, 2006
REFERENCES:
Paul Deitel and Harvey Deitel, ―C How to Program‖, Seventh edition, Pearso
1 Publication
Juneja, B. L and Anita Seth, ―Programming in C‖, CENGAGE Learning India pvt.
2 Ltd. 2011
Anita Goel and Ajay Mittal, ―Computer Fundamentals and Programming in C‖,
3 Dorlin Kindersley (India) Pvt. Ltd., Pearson Education in South Asia, 2011.
Byron S. Gottfried, "Schism’s Outline of Theory and Problems of Programming
4 with C" McGraw-Hill Education, 1996.
Paul Deitel and Harvey Deitel, ―C How to Program‖, Seventh edition, Pearso
5 Publication
WEB REFERENCES
1 https://github.com/tscheffl/ThinkC/blob/master/PDF/Think-C.pdf
2 https://freecomputerbooks.com/langCBooks.html
COURSES / RESOURCES:
1 https://www.programiz.com/c-programming
2 https://www.tutorialspoint.com/cprogramming/index.htm
3 https://www.javatpoint.com/c-programming-language-tutorial
4 https://www.geeksforgeeks.org/c-programming-language/
5 https://en.wikibooks.org/wiki/C_Programming
L T P C
21MC1001 ENVIRONMENTAL SCIENCE
2 0 0 0
OBJECTIVES:
To introduce the basic concepts of environment, ecosystems and biodiversity
and emphasizeon the biodiversity of India and its conservation
To facilitate the understanding of global and Indian scenario of
renewable and non- renewable resources, causes of their degradation and
measures to preserve them.
To familiarize the influence of societal use of resources on the environment
and introduce the legal provisions, National and International laws and
conventions for environmental protection.
To inculcate the effect of population dynamics on human and environmental
health and inform about human right, value education and role of
technology.
TOTAL: 30 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
To recognize and understand the functions of environment, ecosystems and
biodiversityand their conservation.
To identify the causes, effects and environmental pollution and natural
disasters and contribute to the preventive measures in the immediate
society.
To identify and apply the understanding of renewable and non-renewable
resources and contribute to the sustainable measures to preserve them for
future generations.
To recognize different forms of energy and apply them for suitable
applications in for technological advancement and societal development.
To demonstrate the knowledge of societal activity on the long and short term
environmental issues and abides by the legal provisions, National and
International laws and conventions in professional and personal activities
and to identify and analyse effect of population dynamics on human value
education, consumerism and role of technology in environmental issues.
TEXT BOOKS:
1 Anubha Kaushik and C. P. Kaushik‟s “Perspectives in Environmental
Studies”, 6th Edition, New Age International Publishers (2018).
2 Benny Joseph, „Environmental Science and Engineering‟, Tata McGraw-Hill,
New Delhi, (2016).
3 Gilbert M.Masters, „Introduction to Environmental Engineering and Science‟,
2ndedition, Pearson Education (2004).
REFERENCES:
1 R.K. Trivedi, „Handbook of Environmental Laws, Rules, Guidelines,
Compliances and Standards‟, Vol. I and II, Enviro Media.
2 Cunningham, W.P. Cooper, T.H. Gorhani, „Environmental Encyclopedia‟,
Jaico Publ., House, Mumbai, 2001.
3 Dharmendra S. Sengar, „Environmental law‟, Prentice hall of India PVT.
LTD, New Delhi, 2007.
4 Rajagopalan, R, „Environmental Studies-From Crisis to Cure‟, Oxford
University Press (2005).
5 Erach Bharucha “Textbook of Environmental Studies for Undergraduate
Courses” Orient Blackswan Pvt. Ltd. (2013).
WEB REFERENCES:
1. https://ocw.mit.edu/courses/civil-and-environmental-engineering/1-85-water-
and- wastewater-treatment-engineering-spring-2006/lecture-notes/
2. https://www.slideshare.net/reavan/ce6605-environmental-engineering-ii-
course- presentation
COURSE OBJECTIVES:
To write, test, and debug simple C programs.
To implement C programs with conditional and looping statement
To develop applications in C using strings, pointers, functions.
To implement C programs with structures and union.
To develop applications in C using file processing
To develop an application in real time situation
LIST OF EXPERIMENTS
1 Programs using I/O statements and expressions.
2 Programs using decision-making constructs.
3 Write a program to find whether the given year is leap year or Not? (Hint: not
every centurion year is a leap. For example 1700, 1800 and 1900 is not a
leap year)
4 Design a calculator to perform the operations, namely, addition, subtraction,
multiplication, division and square of a number.
5 Check whether a given number is Armstrong number or not?
6 Given a set of numbers like <10, 36, 54, 89, 12, 27>, find sum of weights
based on the following conditions
i. if it is a perfect cube
ii. if it is a multiple of 4 and divisible by 6
iii. if it is a prime number
iv. Sort the numbers based on the weight in the increasing order as
shown below <10,its weight>,<36,its weight><89,its weight>
7 Populate an array with height of persons and find how many persons are
above the average height.
8 Populate a two dimensional array with height and weight of persons and
compute the Body Mass Index of the individuals.
9 Given a string ―a$bcd./fg‖ find its reverse without changing the position of
special characters. (Example input:a@gh%;j and output:j@hg%;a)
10 Convert the given decimal number into binary, octal and hexadecimal
numbers using user defined functions.
11 From a given paragraph perform the following using built-in functions:
i. Find the total number of words.
ii. Capitalize the first word of each sentence.
iii. Replace a given word with another word.
12 Solve towers of Hanoi using recursion.
13 Sort the list of numbers using pass by reference.
14 Generate salary slip of employees using structures and pointers.
i. Programs using Pointers
ii. Pointer demonstration the use of & and *
iii. Access Elements of an Array Using Pointer
iv. Perform the string operations like Length of the String , Concatenation
of string and compare the string using Pointer
v. Count number of words, digits, vowels using pointers
vi. Add two matrices using Multidimensional Arrays with pointers
vii. Multiply two matrices using pointers
viii. Multiply two numbers using Function Pointers
15 Compute internal marks of students for five different subjects using
structures and functions.
16 Program to demonstrate the difference between unions and structures
17 Insert, update, delete and append telephone details of an individual or a
company into a telephone directory using random access file.
18 Count the number of account holders whose balance is less than the
minimum balance using sequential access file.
MINI PROJECT
Create a ―Railway reservation system‖ with the following modules
i. Booking
ii. Availability checking
iii. Cancellation
iv. Prepare chart
TOTAL: 60 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Write, test, and debug simple C programs.
2 Implement C programs with conditionals and loops.
3 Develop C programs for simple applications making use arrays and strings.
4 Develop C programs involving functions, recursion, pointers, and
structures andunion.
5 Design applications using sequential and random access file processing.
6 Perform task as an individual and / or team member to manage the task in
time
WEB REFERENCES:
1 https://www.programiz.com/c-programming/examples
2 https://beginnersbook.com/2015/02/simple-c-programs/
3 https://www.programmingsimplified.com/c-program-examples
4 https://www.tutorialgateway.org/c-programming-examples/
5 https://www.javatpoint.com/c-programs
6 https://www.tutorialspoint.com/learn_c_by_examples/simple_programs_in_c.
html
L T P C
21ES1211 ENGINEERING PRACTICES LABORATORY
0 0 4 2
COURSE OBJECTIVES:
To provide exposure to the students with hands on experience on various
basic engineering practices in Civil, Mechanical, Electrical and Electronics
Engineering.
TOTAL: 60 PERIODS
OUTCOMES:
1 Jeyapoovan T., Saravanapandian M. & Pranitha S., “Engineering Practices
Lab Manual”, Vikas Publishing House Pvt.Ltd, (2006)
2 Kannaiah P. & Narayana K.L., “Manual on Workshop Practice”, Scitech
Publications, (1999).
3 Jeyachandran K., Natarajan S. &Balasubramanian S., “A Primer on
Engineering Practices Laboratory”, Anuradha Publications, (2007).
4 S. Gowri& T. Jeyapoovan, “Enginering Practices Lab Manual 5/E”, S. Chand
Publishing, 2019
TEXT BOOKS:
1 Jeyapoovan T., Saravanapandian M. & Pranitha S., “Engineering Practices
Lab Manual”, Vikas Publishing House Pvt.Ltd, (2006)
2 Kannaiah P. & Narayana K.L., “Manual on Workshop Practice”, Scitech
Publications, (1999).
3 Jeyachandran K., Natarajan S. &Balasubramanian S., “A Primer on
Engineering Practices Laboratory”, Anuradha Publications, (2007).
4 S. Gowri& T. Jeyapoovan, “Enginering Practices Lab Manual 5/E”, S. Chand
Publishing, 2019.
REFERENCES:
1 K.C. John, "Mechanical workshop practice", Second edition, PHI learning
Pvt Ltd, New Delhi
2 Bawa H.S., “Workshop Practice”, Tata McGraw – Hill Publishing Company
Limited, (2007).
WEB REFERENCES:
1 https://nptel.ac.in/courses/112/107/112107090/
2 https://nptel.ac.in/courses/112/107/112107084/
SEMESTER III
L T P C
21HS1201 LINEAR ALGEBRA AND NUMERICAL ANALYSIS
3 1 0 4
OBJECTIVES:
TOTAL: 60 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Understand the concepts of vector space.
TEXT BOOKS:
Friedberg, A.H., Insel, A.J. and Spence, L., ―Linear Algebra‖, Prentice Hall
1 of India,New Delhi, 2004.
Grewal, B.S., and Grewal, J.S., & quot; Numerical Methods in Engineering
2 andScience", Khanna Publishers,10th Edition, New Delhi, 2015.
3 Kumaresan, S., ―Linear Algebra – A Geometric Approach, Prentice – Hall
of India,New Delhi, Reprint, 2010.
Kandasamy, P., Thilagavathy, K.,andGunavathy,S., ‘Numerical Methods’,
4 Chand and Co.,2013.
REFERENCES:
Kolman, B. Hill, D.R., ―Introductory Linear Algebra‖, Pearson Education, New
1 Delhi, First Reprint, 2009.
Lay, D.C., ―Linear Algebra and its Applications‖, 5th Edition, Pearson
2 Education, 2015.
Burden, R.L. and Faires, J.D, " Numerical Analysis", 9th Edition,
3 CengageLearning, 2016.
Sundarapandian, V. ―Numerical Linear Algebra‖, Prentice Hall of India, New
4 Delhi, 2008.
L T P C
21IT1301 DATA STRUCTURES 3
3 0 0
OBJECTIVES:
SUGGESTED ACTIVITIES:
REFERENCES:
1 Thomas H. Cormen, Charles E. Leiserson, Ronald L.Rivest, Clifford Stein,
2 Aho, Hopcroft and Ullman, “Data Structures and Algorithms”, Pearson
3 Stephen G. Kochan,” Programming in C”, 3rd edition, Pearson Education.
4 Ellis Horowitz, Sartaj Sahni, Susan Anderson-Freed, “Fundamentals of Data
L T P C
21CC1301 ELECTRON DEVICES AND CIRCUITS
3 0 0 3
OBJECTIVES:
Understand the structure of basic electronic devices.
Be exposed to active and passive circuit elements.
Familiarize the operation and applications of transistor like BJT and FET.
Explore the characteristics of amplifier gain and frequency response.
Learn the required functionality of positive and negative feedback systems.
SUGGESTED ACTIVITIES:
Study of fundamental operation the diodes.
Demonstration on identify the various diode and operation of Zener diode
characteristics in the class.
Study of V-I characteristics of Various PN junction diodes.
SUGGESTED ACTIVITIES:
Study of fundamental concepts of transistors such as biasing.
Demonstration on identify the various transistor and operation of various
transistor characteristics in the class.
Study of stabilization for various transistors.
SUGGESTED ACTIVITIES:
Applications of various amplifier circuits - activity in class. For example:
Identifying the role of the amplifier circuits.
Study of gain and frequency response of the amplifier for the various
configuration.
Assignments on analysis of different sequential circuits.
SUGGESTED ACTIVITIES:
Applications differential amplifier circuits - activity in class. For example:
Differentiate the role of the amplifier circuits.
Study of gain and frequency response of the amplifier and neutralization
methods.
Assignments on Single tuned amplifier.
SUGGESTED ACTIVITIES:
Study of various feedback amplifiers and oscillators.
Assignments on designing various oscillators with different frequency.
Identify the operation of various types of amplifier and oscillator.
OUTCOMES:
On successful completion of the course student will be able to:
1 Explain the structure and working operation of basic electronic devices.
2 Able to identify and differentiate both active and passive elements.
3 Analyze the characteristics of different electronic devices such as diodes and
transistors.
4 Choose and adapt the required components to construct an amplifier circuit.
5 Employ the acquired knowledge in design and analysis of oscillators.
TEXT BOOKS:
David A. Bell ,‖Electronic devices and circuits‖, Oxford University higher
1 education, 5thedition 2008.
REFERENCES:
Balbir Kumar, Shail.B.Jain, ―Electronic devices and circuits‖ PHI learning
1
private limited, 2ndedition 2014.
Thomas L.Floyd, ―Electronic devices‖ Conventional current version, Pearson
2
prentice hall, 10thEdition, 2017.
3
Donald A Neamen, ―Electronic Circuit Analysis and Design‖ TataMcGraw Hill,
3rd Edition,2003.
4
Robert L.Boylestad, ―Electronic devices and circuit theory‖, 2002.
5
Robert B. Northrop, ―Analysis and Application of Analog Electronic Circuits to
BiomedicalInstrumentation‖, CRC Press, 2004.
L T P C
21IT1304 OBJECT ORIENTED PROGRAMMING
3 0 0 3
OBJECTIVES:
To understand Object Oriented Programming concepts and basic
characteristics of Java.
To know the principles of packages, inheritance and interfaces.
To define exceptions and use I/O streams.
To develop a java application with threads and generics classes.
To design and build simple Graphical User Interfaces.
UNIT - I INTRODUCTION TO OOP AND JAVA FUNDAMENTALS 9
Object Oriented Programming Abstraction – Objects And Classes
Encapsulation- Inheritance Polymorphism- OOP In Java –Fundamental
Programming Structures In Java – Defining Classes In Java Constructors,
Methods -Access Specifiers Static Members Arrays , Packages – Defining
Packages Finding Packages And CLASSPATH -Importing Packages Packages
Types , Javadoc Comments
SUGGESTED ACTIVITIES:
Programs and Demonstration using simple Java programs Using Java Basic
Constructs and Arrays
Understanding JVM
SUGGESTED ACTIVITIES:
Programs and Demonstration of Java programs – use abstract classes, final
methods and classes and interfaces
Programs and Demonstration of Java programs – using String class, Array List
, Creating class and objects
Programs using Inheritance and Interfaces
SUGGESTED ACTIVITIES:
Programs and Demonstration using exception handling and Streams using any
standard IDE like NETBEANS / ECLIPSE
Develop an application threading
SUGGESTED ACTIVITIES:
Programs and Demonstration using graphics programming and components
Programs and Demonstration of Mouse, key events, creating interactive forms
using AWT/Swing and adding functionality
Understand AWT and SWING
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Develop Java programs using OOP principles
2 Develop Java programs with the concepts inheritance and interfaces
3 Build Java applications using exceptions and I/O streams
4 Develop Java applications with threads and generics classes
5 Design and build simple Graphical User Interface.
6 Develop interactive Java programs using swings.
TEXT BOOKS:
Herbert Schildt, “Java The complete reference”, 8th Edition, McGraw Hill
1 Education, 2011.
Cay S. Horstmann, Gary cornell, “Core Java Volume –I Fundamentals”, 9th
2 Edition, Prentice Hall, 2013.
REFERENCES:
Paul Deitel, Harvey Deitel, “Java SE 8 for programmers”, 3rd Edition, Pearson,
1 2015.
2 Steven Holzner, “Java 2 Black book”, Dreamtech press, 2011.
Timothy Budd, “Understanding Object-oriented programming with Java”,
3 Updated Edition, Pearson Education, 2000
Felipe Gutierrez , Introducing Spring Framework: A Primer 1st ed. Edition,
4 Kindle Edition , 2014
Paul Deitel, Harvey Deitel, “Java SE 8 for programmers”, 3rd Edition, Pearson,
5 2015.
L T P C
21EC1304 SIGNALS AND SYSTEMS
3 1 0 4
OBJECTIVES:
To understand the basic properties of signals.
To analyze the basic systems using properties.
To analyze the characteristics of continuous time signals in the Fourier and
Laplace domain
To analyze LTI – Continuous time systems in Time domain and Frequency
domain
To analyze the characteristics of Discrete time signals in the Fourier and Z
transform domain
To analyze LTI - Discrete time systems in Time domain and Frequency
domain.
UNIT - I CLASSIFICATION OF SIGNALS AND SYSTEMS 12
Standard signals- Step, Ramp, Pulse, Impulse, Real and complex exponentials
and Sinusoids Classification of signals – Continuous time (CT) and Discrete Time
(DT) signals, Periodic & Aperiodic signals, Deterministic & Random signals,
Energy & Power signals Classification of systems- CT systems and DT systems-
– Linear & Nonlinear, Time-variant & Time- invariant, Causal & Non-causal,
Stable & Unstable.
OUTCOMES:
On successful completion of the course student will be able to:
1 Understand the basics of signals and its classifications
2 Analyze the basic systems and its classifications
3 Determine the frequency Response for Deterministic signal and also analyze
in S- domain.
4 Apply the Fourier and Laplace Transform for the analysis of LTI -Continuous
Time systems
5 Analyze the Characteristics of DT signals by using DTFT and Z-transform
6 Apply the Fourier and Z- Transform for the analysis of LTI –Discrete Time
systems
TEXT BOOKS:
Allan V.Oppenheim, S.Wilsky and S.H.Nawab, “Signals and
1 Systems”,Pearson,2015.
2 S. Haykin and B. Van Veen, "Signals and Systems", 2nd Edition, Wiley, 2007.
REFERENCES:
B.P.Lathi,“Principles of Linear Systems and Signals”,Second
1 Edition,Oxford,2009.
1 http://www.nptelvideos.in/2012/12/signals-and-system.html
2 https://freevideolectures.com/course/3177/signals-and-systems
ONLINE COURSES / RESOURCES:
1 https://www.edx.org/course/signals-and-systems-part-1
2 https://www.edx.org/course/signals-and-systems-part-2
L T P C
21IT1311 DATA STRUCTURES LABORATORY
0 0 4 2
COURSE OBJECTIVES:
To Understanding the importance of data structures, abstract data type,
and their basic usability in different application.
To implement linear and non-linear data structures.
To understand the different operations of search trees.
To implement graph traversal algorithms.
To get familiarized to sorting and searching algorithms.
LIST OF EXPERIMENTS
1 Array implementation of Stack and Queue ADTs
2 Array implementation of List ADT
3 Linked list implementation of List, Stack and Queue ADTs
i. Singly Linked list
ii. Circular Linked list
iii. Doubly Linked list
4 Applications of List, Stack and Queue ADTs
i. Polynomial operations
ii. Infix to post fix
iii. Josephus problem
5 Implementation of Binary Trees and operations of Binary Trees
6 Implementation of Binary Search Trees
7 Implementation of AVL Trees
8 Implementation of Expression tree
9 Implementation of Tree
10 Implementation of Heaps using Priority Queues.
11 Graph representation and Traversal algorithms
i. Depth first search
ii. Breadth first search
12 Applications of Graphs
i. Dijkstra algorithm
13 Implementation of searching and sorting algorithms
14 Hashing–any two collision techniques
TOTAL: 60 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 CO1:Write functions to implement linear and non-linear data structure
operations
2 CO2: Suggest appropriate linear / non-linear data structure operations for
solving a given problem
3 CO3: Appropriately use the linear / non-linear data structure operations for
a given problem
4 CO4: Apply appropriate hash functions that result in a collision free
scenario for data storage and retrieval
5 CO5: Compare various kinds of searching and sorting techniques and
hash tables and collisionresolution Techniques
6 CO6:Compare various kinds of hash tables and collision resolution
Techniques.
WEB REFERENCES:
1 https://www.programiz.com/python-programming/examples
2 https://www.geeksforgeeks.org/python-programming-examples/
3 https://beginnersbook.com/2018/02/python-programs/
4 https://www.javatpoint.com/python-programs
5 https://www.w3schools.com/python/python_examples.asp
6 https://www.sanfoundry.com/python-problems-solutions/
OBJECT ORIENTED PROGRAMMING L T P C
21IT1312
LABORATORY 0 0 4 2
COURSE OBJECTIVES:
To build software development skills using java programming for real-world
applications.
To understand and apply the concepts of classes, packages, interfaces,
array list
To understand and apply the concepts of inheritance and polymorphism
To understand exception handling and file processing.
To develop applications using generic programming and event handling.
LIST OF EXPERIMENTS
1 Write a java program that prints all real solutions to the quadratic equation
ax2 +bx+c=0. Read in a, b, c and use the quadratic formula.
2 The Fibonacci sequence is defined by the following rule. The first two
values in the sequence are 1 and 1. Every subsequent value is the sum of
the two values preceding it. Write a java program that uses both recursive
and non recursive functions.
3 Write a java program for sorting a given list of names in ascending order
4 Write a program that prompts the user for an integer and then prints out all
prime numbers up to that integer.
5 Write a Java program to Multiply two given matrices
6 Write a Java program that checks whether a given string is a palindrome or
not.
7 Develop a Java application to generate Electricity bill. Create a class with
the following members: Consumer no., consumer name, previous month
reading, current month reading, type of EB connection(i.e domestic or
commercial).
8 Develop a java application to implement currency converter (Dollar to INR,
EURO to INR, Yen to INR and vice versa), distance converter (meter to
KM, miles to KM and vice versa) , time converter (hours to minutes,
seconds and vice versa) using packages.
9 Develop a java application with Employee class with Emp_name, Emp_id,
Address, Mail_id, Mobile_no as members. Inherit the classes,
Programmer, Assistant Professor, Associate Professor and Professor from
employee class. Add Basic Pay (BP) as the member of all the inherited
classes with 97% of BP as DA, 10 % of BP as HRA, 12% of BP as PF,
0.1% of BP for staff club fund. Generate pay slips for the employees with
their gross and net salary.
10 Design a Java interface for ADT Stack. Implement this interface using
array. Provide necessary exception handling in both the implementations.
11 Write a program to perform string operations using Array List. Write
functions for the following
i. Append - add at end
ii. Insert – add at particular index
iii. Search
iv. List all string starts with given letter
12 Write a Java Program to create an abstract class named Shape that
contains two integers and an empty method named print Area(). Provide
three classes named Rectangle, Triangle and Circle such that each one of
the classes extends the class Shape. Each one of the classes contains
only the method print Area () that prints the area of the given shape.
13 Write a Java program to implement exception handling.
14 Write a Java program that reads a file name from the user, displays
information about whether the file exists, whether the file is readable, or
writable, the type of file and the length of the file in bytes.
15 Write a java program that implements a multi-threaded application that has
three threads. First thread generates a random integer every 1 second and
if the value is even, second thread computes the square of the number and
prints. If the value is odd, the third thread will print the value of cube of the
number.
16 Write a java program that correct implements of producer consumer
program using the concept of inter thread communication
17 Write a java program to find the maximum value from the given type of
elements using a generic function.
18 Write a java program that simulates a traffic light. The program lets the
user select one of three lights: Red, Yellow or Green with radio buttons. On
selecting a button an appropriate message with “STOP “or “READY” or
“GO” should appear above the buttons in selected color. Initially, there is
no message shown.
19 Design a calculator using event-driven programming paradigm of Java
using Scientific manipulations
20 Develop a mini project for any application using Java concepts
TOTAL: 60 PERIODS
ADDITIONAL PROGRAMS
21 Design a class to represent a Student details include the Student ID, Name
of the Student, Branch, year, location and college. Assign initial values
using constructor. Calculate average of marks of 6 subjects and calculate
attendance percentage.
22 Develop with suitable hierarchy, classes for Point, Shape, Rectangle,
Square, Circle, Ellipse, Triangle, Polygon, etc. Design a simple test
application to demonstrate dynamic polymorphism
23 Write a program that creates three threads. First thread displays “Good
Morning” every one second, the second thread displays “Hello” every two
seconds and the third thread displays “Welcome” every three seconds.
24 Write a java programs to find factorial of a number. User is allowed to enter
a number into the text field whose factorial is to be determined. On
pressing the button the value of the text field is firstly converted into integer
and then processed to find its factorial. The result will get displayed in
another text field.(Hint: use swings).
OUTCOMES:
On successful completion of the course student will be able to:
1 CO1: Develop and implement Java programs for simple applications that
make use of classes,packages and interfaces.
2 CO2: Develop and implement Java programs with array list, Strings.
3 CO3: Design applications using inheritance and polymorphism
4 CO4: Develop and implement Java programs with exception handling and
multithreading.
5 CO5: Design applications using file processing, generic programming.
6 CO6: Develop and implement Java programs using Event Handling.
SEMESTER IV
L T P C
21MA1403 PROBABILITY AND RANDOM PROCESSES
3 1 0 4
OBJECTIVES:
To provide necessary basic concepts in probability and random processes
for applications such as random signals, linear systems in communication
engineering.
To understand the basic concepts of probability, one and two dimensional
random variables and to introduce some standard distributions applicable
to engineering which can describe real life phenomenon.
To understand the basic concepts of random processes which are widely
used in IT fields.
To understand the concept of correlation and spectral densities.
To understand the significance of linear systems with random inputs.
TOTAL: 60 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
Understand the fundamental knowledge of the concepts of probability and
1 have knowledge of standard distributions which can describe real life
phenomenon.
2 Understand the basic concepts of one dimensional random variables and
apply in engineeringapplications.
Understand the basic concepts of two dimensional random variables and
3 apply inengineering applications
4 Apply the concept random processes in engineering disciplines.
5 Understand and apply the concept of correlation and spectral densities
6 Analyze the response of random inputs to linear time invariant systems
TEXT BOOKS:
Ibe, O.C.," Fundamentals of Applied Probability and Random Processes ", 2 nd
1 Indian Reprint,Elsevier, 2014.
Peebles, P.Z., "Probability, Random Variables and Random Signal Principles
2
", Tata McGrawHill, 4th Edition, 37th reprint 2016.
Veerarajan T, “Probability, Statistics and Random Processes with Queueing
3
Theory”, Mc GrawHill, 4th Edition,7th reprint 2018.
REFERENCES:
Cooper. G.R., McGillem. C.D., "Probabilistic Methods of Signal and System
1 Analysis", OxfordUniversity Press, New Delhi, 3rd Indian Edition, 2012.
Hwei Hsu, "Schaum‘s Outline of Theory and Problems of Probability, Random
Variables and Random Processes ", Tata McGraw Hill Edition, New Delhi,
2 2004.
Yates. R.D. and Goodman. D.J., ―Probability and Stochastic Processes",
3 Wiley India Pvt. Ltd.,Bangalore, 2nd Edition, 2012.
L T P C
21CS1402 DESIGN AND ANALYSIS OF ALGORITHMS
3 0 0 3
OBJECTIVES:
To understand and apply the algorithm analysis techniques.
To critically analyze the efficiency of alternative algorithmic solutions for the
sameproblem
To get accustomed with various programming constructs such as divide-
and-conquer,dynamic Programming, Backtracking and Branch and Bound.
To understand the limitations of Algorithmic power.
To learn techniques for solving specific problems more efficiently and for
analyzing spaceand time requirements
UNIT - I INTRODUCTION 9
Notion of an Algorithm - Fundamentals of Algorithmic Problem Solving Important
Problem Types –Algorithm Design Technique- Fundamentals of the Analysis of
Algorithmic Efficiency - Asymptotic Notations and their properties-Analysis
Framework Mathematical analysis for Recursive and Non-recursive algorithms-
Randomized algorithms-Las Vegas and Monte Carlo types.
SUGGESTED ACTIVITIES:
Discussion on role of algorithms in computer science.
Design of simple problems
Basic method of calculating time and space complexity
Design of Induction proof for recursive and non-recursive algorithms.
SUGGESTED ACTIVITIES:
External Learning- Divide and Conquer based algorithms, Hacker rank
divide and Conquer algorithms
Practical : Implementation of Binary Search and Merge Sort
To calculate time complexity using Master’s theorem
Design of Induction proofs for algorithm verification for Divide and Conquer
Algorithms
SUGGESTED EVALUATION METHODS:
Quizzes on brute force methods
Assignments on Merge Sort and Multiplication of Large Integers.
SUGGESTED ACTIVITIES:
External Learning- Dynamic Programming based algorithms like Longest
common subsequence
Practical : Implementation of Optimal Binary Search Tree
External Learning- Greedy Techniques like Prim’s and Kruskal’s Algorithm
Practical: Implementation of Huffman Trees.
SUGGESTED ACTIVITIES:
External Learning- Maximum-Flow Problem
External Learning- Backtracking Algorithms like N Queens Problem and
Hamiltonian Circuit Problem
Practical : Implementation of subset sum problem
Practical : Implementation of Hamiltonian Circuit Problems
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Understand different algorithmic design strategies
2 Articulate the process of problem solving and writing algorithms.
Design and implementing the problems using algorithmic design paradigms
(divide- and-conquer, greedy method, dynamic-programming and
3 Backtracking, Branch and Bound) and apply when an algorithmic design
situation calls for it.
4 Analyze the correctness of algorithms using inductive proofs and invariants
5 Describe the classes P, NP,NP-Hard, NP Complete and appraise to prove that
a certain problem is P,NP,BP-Hard, NP-Complete.
6 Designing their theoretical knowledge in practice
TEXT BOOKS:
Thomas H.Cormen, Charles E.Leiserson, Ronald L. Rivest and Clifford Stein,
1 ―Introduction to Algorithms, Third Edition, PHI Learning Private Limited, 2012.
S.Sridhar, DESIGN AND ANALYSIS OF ALGORITHMS, First Edition, Oxford
2 Edition, 2014.
AnanyLevitin, ―Introduction to the Design and Analysis of Algorithms‖, Third
3 Edition, Pearson Education, 2012.
REFERENCES:
Ellis Horowitz, SartajSahni and SanguthevarRajasekaran, Computer
1 Algorithms/ C++,Second Edition, Universities Press, 2007.
Alfred V. Aho, John E. Hopcroft and Jeffrey D. Ullman, ―Data Structures and
2 Algorithms‖, Pearson Education, Reprint 2006.
Harsh Bhasin, ―Algorithms Design and Analysis‖, Oxford university press,
3 2015.
L T P C
21CS1401 DATABASE MANAGEMENT SYSTEMS
3 0 0 3
OBJECTIVES:
To understand the basic concepts and the applications of database
systems.
To know the basics of SQL and construct queries using SQL.
To learn the relational database design principles.
To understand the basic issues of transaction processing and concurrency
control.
To Familiar with database storage structures and access techniques
9
UNIT - I DATABASE FUNDAMENTALS
Introduction: Database System Applications, Purpose of Database Systems, View
of Data, components and structure, Database Users and Administrator, History of
Database Systems. Data models: ER model, Entities, Attributes and Entity sets,
Relationships and Relationship sets, Additional features of ER Model, Conceptual
Design with the ER Model, Enhanced E-RModel.
SUGGESTED ACTIVITIES:
Developing ER diagrams for Banking application
Translating requirements into models
Comparing various data models and views
SUGGESTED ACTIVITIES:
Simple SQL queries
Writing PL-SQL programs
SUGGESTED ACTIVITIES:
Writing Armstrong’s Axioms
Developing Normal Forms for a requirement
Applying Decomposition and Functional Dependency
SUGGESTED ACTIVITIES:
Writing Transaction rules for a database
Comparing the efficiency of protocols
Understanding the importance of Recovery
SUGGESTED ACTIVITIES:
Applying RAID models
Writing queries for index
Comparing efficiency of Tree methods
Writing No-SQL Queries
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Remember the Structure of a Database
2 Understand an Entity Relational Model for a database.
3 Apply Relational and Non-Relational database concepts to design a database.
4 Analyze the importance of normalization and functional dependencies in
database design
5 Evaluate the working principles of indexing and hashing.
Create a database design using both Relational and Non- Relational models
TEXT BOOKS:
Database System Concepts, A. Silberschatz, Henry. F. Korth, S.
1 Sudarshan, McGraw Hill India Private Limited, 7th edition.
Mongo DB Complete Guide by Manu Sharma, BPB Publications,
ISBN:9789389898866, July 2021.
REFERENCES:
1 Data base Management Systems, Raghu Ramakrishnan, Johannes Gehrke,
McGrawHillEducation (India) Private Limited, 3rd Edition
L T P C
21CS1303 SOFTWARE ENGINEERING
3 0 0 3
OBJECTIVES:
To understand the phases in a software project
To understand fundamental concepts of requirements engineering and
AnalysisModelling.
To understand the various software design methodologies, software testing,
softwareprocess models
To learn various testing and maintenance measures
To understand the working knowledge of the techniques for estimation,
design, testing and quality management of large software development
projects
SUGGESTED ACTIVITIES:
Analyze which process model is suitable for a particular project
Analyze Agile compare with traditional process models
Estimate activity durations and resources required for a particular project
SUGGESTED ACTIVITIES:
Gathering the requirements of the client – functional and non functional
requirements
Prepare the Software Requirements Specification (SRS) of a particular
project (e.g Railway reservation system, Airlines etc)
Identify customer’s needs of a particular project
Evaluate the system for feasibility (both technically and financially feasible)
SUGGESTED EVALUATION METHODS:
Establish schedule and constraints for a particular project
Create system definitions
Perform economic and technical analysis
SUGGESTED ACTIVITIES:
Implementing architectural design of a particular software project
Implementing Interface design of a particular software project
Implementing Component design of a particular software project
Implementing Database design of a particular software project.
SUGGESTED ACTIVITIES:
Develop test cases for any software project
Enumerate the tools available for software testing
Enumerate the principles of software testing
List out the principles of BPR
SUGGESTED ACTIVITIES:
How to estimate the size of the software product using LOC or other
traditional methods
Enumerate Earned Value Analysis for a particular project
Draft the time frame of a particular project using Gantt chart
Compare traditional process models with agile methods
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Identify the key activities in managing a software project.
2 Compare different process models.
3 Concepts of requirements engineering and Analysis Modelling.
4 Apply systematic procedure for software design and deployment.
5 Compare and contrast the various testing and maintenance.
6 Manage project schedule, estimate project cost and effort required.
TEXT BOOKS:
Roger S. Pressman, Bruce R.Maxim―Software Engineering – A Practitioner’s
1 Approach,Eight Edition, McGraw-Hill International Edition, 2015.
IanSommerville, ―Software Engineering, 9th Edition, Pearson Education
2 Asia, 2011.
Gene Kim, Jez Humble, Patrick Debois, and John Willis, The DevOps
Handbook- How to Create World-Class Agility, Reliability, & Security in
Technology Organizations, IT Revolution Press,2nd Edition,2016.
REFERENCES:
Rajib Mall, ―Fundamentals of Software Engineering, Third Edition, PHI
1 LearningPrivateLimited,2009.
PankajJalote, ―Software Engineering, A Precise Approach‖, Wiley India,
2 2010.
Kelkar S.A., ―Software Engineering‖, Prentice Hall of India Pvt Ltd, 2007.
3 Stephen R.Schach, ―Software Engineering, Tata McGraw-Hill Publishing
4 CompanyLimited,2007.
L T P C
21CB1202 DIGITAL PRINCIPLES AND COMPUTER
ORGANIZATION 3 0 0 3
OBJECTIVES:
To design digital circuits using simplified Boolean functions
To analyze and design combinational circuits
To learn the basic structure and operations of a computer.
To learn various addressing modes, instruction formats and program
control statements
To understand parallelism and multi-core processors.
To learn about different memory and various ways of communication with
I/O devices.
UNIT - I DIGITAL FUNDAMENTALS 9
Digital Systems – Binary Numbers – Octal and Hexadecimal Conversions –
Signed Binary Numbers Complements of numbers–Boolean Algebra and Logic
Gates – K-Maps – Standard Forms – NANDand NOR Implementation.
SUGGESTED ACTIVITIES:
In-class activity Number systems, problems in number conversion and
complements.
Proofs and simplification of basic theorems and properties of Boolean
algebra in Class
Assignments on simplification of Boolean functions using 3 and 4 variable
K-Map
Study of various Logic gates with truth table.
SUGGESTED ACTIVITIES:
Applications of combinational circuits - activity in class. For example:
Identifying the role of the combinational circuits in designing circuits like
digital boards
Study of Binary adder, subtractor, Decoders, Encoders and Multiplexers
Assignments on analysis of different sequential circuits.
SUGGESTED ACTIVITIES:
In-class activity on performance evaluation
Flipped classroom – Evolution and types of computer systems,
identification of benchmarks.
Analyze the ISA supported by the architectural simulator by running simple
programs on the simulator
Mapping and correlating a C code with its machine code.
UNIT - IV PROCESSOR 9
Instruction Execution – Building a Data Path – Designing a Control Unit –
Hardwired Control,Microprogrammed Control – Pipelining – Data Hazard – Control
Hazards.
SUGGESTED ACTIVITIES:
Flipped Classroom for analyzing data path in atleast two processors.
Practical – Analyzing the data path on the standard simulator.
Practical – Study of the pipelined implementation and analysis of various
hazards.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Evaluate and simplify logic functions using Boolean Algebra and K-map
2 Design and Analyze Combinational and Sequential Circuits
3 Recognize and explain the functional units of computers
4 Categorize various addressing modes , instruction formats and program
control statements
5 Discuss the implementation of processors and hazards
6 Analyze memory, I/O devices and cache structure for processors.
TEXT BOOKS:
M. Morris Mano, Michael D. Ciletti, “Digital Design”, Fifth Edition, Pearson
1 Education, 2013. (Unit 1,2)
David A. Patterson, John L. Hennessy, “Computer Organization and Design,
2 The Hardware/Software Interface”, Fifth Ed (Unit 3,4,5).
REFERENCES:
John P. Hayes, Computer Architecture and Organization, Third Edition, Tata
1 McGraw Hill, 2012
Carl
3 William
2
M. Morris Mano, “Digital Logic and Computer Design”, Pearson Education,
4 2008.
WEB REFERENCES:
1 https://www.brainkart.com/subject/Digital-Principles-and-System-Design_100
2 http://scitechpublications.com/shop/computer-information/digital-principles-
and-systemdesign-2/
3 http://www.sasurieengg.com/e-course-material/I-year-E-course-material-
IIsem/7.CS6201%20- DPSD.pdf
ONLINE COURSES / RESOURCES:
1 https://onlinecourses.nptel.ac.in/noc21_ee39/preview
2 http://www.cs.iit.edu/~virgil/cs470/Book/
3 http://www.svecw.edu.in/Docs%5CITIIBTechIISemLecCOA.pdf
4 https://onlinecourses.nptel.ac.in/noc21_ee39/preview
DATABASE MANAGEMENT SYSTEMS L T P C
21CS1411
LABORATORY 0 0 4 2
COURSE OBJECTIVES:
Learn to create and use a database.
Be familiarized with a query language.
Have hands on experience on DDL Commands.
Have a good understanding of DML Commands and DCL Commands.
Familiarize advanced SQL queries.
LIST OF EXPERIMENTS
1 Creation of tables for Salesman and Customer Relation with following
structure: Salesman Relation:
salesman_id name city commission
Customer Relation:
customer_id cust_name city grade salesman_id
2 Performing Insertion, Deletion, Modifying, Altering, Updating and Viewing
recordsbased on conditions.
3 Creation of Views, Synonyms, Sequence, Indexes, Save point.
4 Set various constraints like Not Null, Primary Key, Foreign Key and Check
constraints.
5 Creating relationship between the databases and retrieve records using
joins for thebelow relations:
Salesman Relation:
salesman_id name city commission
5001 James Hoog New York 0.15
5002 Nail Knite Paris 0.13
5005 Pit Alex London 0.11
5006 Mc Lyon Paris 0.14
5007 Paul Adam Rome 0.13
5003 Lauson Hen San Jose 0.12
Customer Relation:
customer_id cust_name city grade salesman_id
3002 Nick Rimando New York 100 5001
3007 Brad Davis New York 200 5001
3005 Graham Zusi London 300 5002
3004 Fabian Paris 300 5006
3009 Geoff Cameron Rome 100 5007
3003 Jozy San Jose 300 5003
6 Execute the different types of Joins to find the output for the below:
7 From the following tables write a SQL query to find the salesperson and
customer who reside in the same city. Return Salesman, cust_name and
city
8 From the following tables write a SQL query to find those orders where the
order amount exists between 500 and 2000. Return ord_no, purch_amt,
cust_name, city.
9 From the following tables write a SQL query to find the salesperson(s) and
the customer(s) he represents. Return Customer Name, city, Salesman,
commission
10 From the following tables write a SQL query to find salespeople who
received commissions of more than 12 percent from the company. Return
Customer Name, customer city, Salesman, commission
11 Write a SQL statement to join the tables salesman, customer and orders
so that the same column of each table appears once and only the
relational rows are returned
12 Write a PL/SQL block to satisfy some conditions by accepting input from
the user.
13 Write a PL/SQL block that handles all types of exceptions.
14 Creation of Procedures.
15 Creation of database triggers and functions
16 Database Connectivity with Front End Tools ( Java/Python)
17 a. Mini project
b. Inventory Control System.
c. Material Requirement Processing.
d. Hospital Management System.R
e. ailway Reservation System.
f. Personal Information System.
g. Timetable Management System.
h. Hotel Management System
TOTAL: 60 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Understand the Syntax of SQL commands
Remember queries to retrieve records
2 Apply referential integrity constraints
Analyze the database design using constraints
3 Evaluate PL/SQL programs to implement triggers, functions, procedures
andexceptions
4 Create front end tools to manipulate information from backend
L T P C
21CC1411 DIGITAL SYSTEM DESIGNLABORATORY 0 0 4 2
TOTAL: 60 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Upon Completion of the course, the students will be able to:
2 Learn the basics of gates.
3 Construct basic combinational circuits and verify their functionalities
4 Apply the design procedures to design basic sequential circuits
5 Design of counters and shift registers
6 To understand the basic digital circuits and to verify their operation
Web References
1 http://ece.sliet.ac.in/digital-system-design-laboratory/://www.skit.ac.in/ece-
2 https://www.lbrce.ac.in/Digital%20System%20Design%20LAB.pdf
3 https://www.azdocuments.in/2020/01/digital-system-design-
4 https://www.iare.ac.in/sites/default/files/lab1/DSDLABMANUAL%20R-
5 https://www.skit.ac.in/ece-academics/ec-course-outcomes-and-
6 https://jecassam.ac.in/wp-content/uploads/2018/10/5Digital-Signal-Logic-
SEMESTER V
L T P C
21MA1501 ALGEBRA AND NUMBER THEORY
3 1 0 4
OBJECTIVES:
To introduce the basic notions of rings, fields which will then be used to solve
relatedproblems.
To introduce and apply the concepts of rings, finite fields and polynomials.
To understand the basic concepts in number theory .
To examine the key questions in the Theory of Numbers.
To give an integrated approach to number theory and abstract algebra, and
provide a firmbasis for further reading and study in the subject.
TOTAL: 60 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Apply the basic concepts of rings to solve problems.
2 Understand the basic notions of fields.
3 Explain the fundamental concepts of advanced algebra and their role in modern
mathematics and applied contexts.
4 Demonstrate accurate and efficient use of advanced algebraic techniques.
Demonstrate their mastery by solving non - trivial problems related to the
5 concepts and by proving simple theorems about the statements proven by the
text.
Apply integrated approach to number theory and abstract algebra and provide a
6 firm basis for further reading and study in the subject.
TEXT BOOKS:
Grimaldi, R.P and Ramana, B.V., "Discrete and Combinatorial Mathematics",
1 PearsonEducation, 5th Edition, New Delhi, 2007.
Koshy, T., ―Elementary Number Theory with Applications‖, Elsevier
2 Publications, NewDelhi, 2002.
REFERENCES:
Lidl, R. and Pitz, G, "Applied Abstract Algebra", Springer Verlag, New Delhi, 2nd
1 Edition,2006.
Niven, I., Zuckerman.H.S., and Montgomery, H.L., ―An Introduction to Theory
2 ofNumbers‖, John Wiley and Sons , Singapore, 2004.
San Ling and Chaoping Xing, ―Coding Theory – A first Course, Cambridge
3 Publications, Cambridge, 2004.
L T P C
21CS1403 COMPUTER NETWORKS
3 0 0 3
OBJECTIVES:
To understand the protocol layering and physical level communication.
To analyze the performance of a network.
To understand the various components required to build different networks.
To learn the functions of network layer and the various routing protocols.
To familiarize the functions and protocols of the Transport layer.
SUGGESTED ACTIVITIES:
Designing Network Topology
Problems on Performance metrics
SUGGESTED ACTIVITIES:
Problems on Error correction and detection
SUGGESTED EVALUATION METHODS:
Assignment HDLC
Quizzes
SUGGESTED ACTIVITIES:
:Problems on IP Addressing- In class
In Class – Problems in Distance Vector Routing , Link State Routing using
simulator
SUGGESTED ACTIVITIES:
Socket Programming on UDP
Implementation of DNS using UDP
SUGGESTED ACTIVITIES:
Seminar topic WWW and HTTP
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Understand the basic layers and its functions in computer networks.
2 Evaluate the performance of a network.
3 Understand the basics of how data flows from one node to another.
4 Analyze and design routing algorithms.
5 Design protocols for various functions in the network.
6 Understand the working of various application layer protocols.
TEXT BOOKS:
Behrouz A. Forouzan, Data Communications and Networking, Fifth Edition
1 TMH, 2013. Edition, Morgan Kaufmann Publishers Inc., 2012.
REFERENCES:
NPTEL COURSES
1 https://nptel.ac.in › noc › noc22 › SEM1 › noc22-cs1
OBJECTIVES:
To study the Architecture of 8051 microcontroller.
To design a 8051 microcontroller based system.
To understand about PIC microcontroller architecture
To design a PIC microcontroller based system.
To understand the concept of various memories and interfacing.
To study the parallel processing technique of advanced processor.
UNIT - I 8051 MICROCONTROLLER 9
Architecture of 8051 – Special Function Registers(SFRs) --I/O Pins Ports and
Circuits - Instruction set Addressing modes Assembly language programming.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 CO1: Design and implement 8051 microcontroller based systems.
2 CO2: Interface various devices with 8051
3 CO3: Design and implement PIC microcontroller based systems.
4 CO4: Interface various devices with PIC microcontroller.
5 CO5: Explain the concept of various memories, interfacing and organization of
multiprocessors.
CO6: Gain knowledge in parallel processing technique and unconventional
6 architectures.
TEXT BOOKS:
Mohamed Ali Mazidi, Janice Gillispie Mazidi, Rolin McKinlay, ―The 8051
1 Microcontroller and Embedded Systems: Using Assembly and C, Second
Edition, Pearson education, 2011. (UNIT I &2).
Muhammod Ali Mazidi, Rolin D. Mckinlay & Danny Sansey, “PIC Microcontroller
2 and Embeded System SPI, UART using Assembly & C for PICI8,” Pearson
International Edition, 2008. (UNIT3)
Miles J. Murdocca and Vincent P. Heuring, ―Computer Architecture and
Organization: AnIntegrated approach, Second edition, Wiley India Pvt Ltd, 2015
3
(UNIT 4 & 5).
REFERENCES:
Doughlas V.Hall, ―Microprocessors and Interfacing, Programming and
1 Hardware‖,TMH,2012
OBJECTIVES:
To understand the fundamentals of object modelling
To understand and differentiate Unified Process from other approaches.
To design with static UML diagrams.
To design with the UML dynamic and implementation diagrams.
To improve the software design with design patterns.
To test the software against its requirements specification.
UNIT - I UNIFIED PROCESS AND USE CASE DIAGRAMS 9
Introduction to OOAD with OO Basics Unified Process – UML diagrams – Use
Case –Case study – The Next Gen POS System - Inception-- Use case
Modelling – Relating Use cases – Include, Extend And Generalization – When
to use Use cases - Requirements Capture and Modelling --Object Analysis
classification Use case Realization.
SUGGESTED ACTIVITIES:
Analyse the OO basic concepts
Use case modeling for any problem Statement.
Identify the use case relationship in any problem Statement
SUGGESTED ACTIVITIES:
Identify the Conceptual Classes in any Problem Statement.
Create domain Model for any Problem Statement
Create Class Diagram for any Problem Statement
Create CRC cards for any requirement( user story, business rule, or
system use case )
SUGGESTED ACTIVITIES:
Design Dynamic UML diagrams for the Problem Statement
Design Implementation UML diagrams for the Problem Statement
SUGGESTED ACTIVITIES:
Apply Grasp Patterns to Library Information System , Hospital
Management System etc.
Apply GoF patterns to Library Information System , Hospital Management
System etc.
Apply Forward Engineering ( Mapping Design to code.) in Library
Information System, Hospital Management System etc.
SUGGESTED ACTIVITIES:
Develop the test cases for testing with State Machine Models, Interclass
Testing , Intraclass Testing
Apply OO testing techniques to OO Projects.
TOTAL: 45 PERIODS
LIST OF EXPERIMENTS
Draw standard UML diagrams using an UML modeling tool for a given case
study and map designto code and implement a 3 layered architecture. Test the
developed code and validate whether the SRS is satisfied.
COURSE OUTCOMES
At the end of the course, the students will be able to:
Express software design with UML diagrams
Design software applications using OO concepts.
Identify various scenarios based on software requirements
Transform UML based software design into pattern based design using
design patterns
TEXT BOOKS
Craig Larman, ―Applying UML and Patterns: An Introduction to Object-
1 Oriented Analysis and Design and Iterative Development‖, Third Edition,
Pearson Education, 2005.
Ali Bahrami - Object Oriented Systems Development - McGraw Hill
2 International Edition – 1999.
REFERENCES:
Erich Gamma, a n d Richard Helm, Ralph Johnson, John Vlissides, ―Design
1 patterns: Elements of Reusable Object-Oriented Software‖, Addison-Wesley,
1995.
2 Martin Fowler, ―UML Distilled: A Brief Guide to the Standard Object
Modeling Language,Third edition, Addison Wesley, 2003.
3 Software Testing and Analysis: Process, Principles, and Techniques , Mauro
Pezze
L T P C
21EC1501 ANALOG AND DIGITAL COMMUNICATION
3 0 0 3
OBJECTIVES:
To familiarize with various Amplitude Modulation Schemes
To understandAngle Modulation Techniques
To acquaint the fundamentals of Source coding Techniques
To understand the importance of Channel coding
To impart knowledge invarious waveform coding
To introduce the various band pass signaling schemes
UNIT - I AMPLITUDE MODULATION 9
Amplitude Modulation- DSBSC, DSBFC, SSB, VSB Modulation index,
Spectra, Power relations and Bandwidth – AM Generation – Square law and
Switching modulator, DSBSC Generation – Balanced and Ring Modulator,
SSB Generation – Filter and Phase Shift Methods, VSB Generation – Filter
Method, comparison of different AM techniques, Super heterodyne
Receiver, Noise performance analysis in AM
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Compare and contrast various amplitude modulation techniques
2 Analyze and understand Angle Modulation schemes and its noise
performance
3 Apply the concepts of Source Coding to improve coding efficiency
4 Construct feasible solutions for error control using Channel Coding
Methods
5 Understand the concepts of sampling and quantization, Waveform
Encoding schemes
6 Discuss the importance of Digital modulation techniques
TEXT BOOKS:
1 Simon Haykins,” Communication Systems”, Wiley, 5th Edition, 2009.
2 B.P.Lathi, “Modern Digital and Analog Communication Systems”, 4th
Edition, Oxford UniversityPress, 2011.
REFERENCES:
WaynerTomasi, Electronic Communication System, 5th Edition, Pearson
1 Education,2008.
2 D.Roody, J.Coolen, Electronic Communications, 4th edition PHI 2006
A.Papoulis, “Probability, Random variables and Stochastic Processes”,
3 McGraw Hill, 3rd edition, 1991.
B.Sklar, “Digital Communications Fundamentals and Applications”, 2nd
4 Edition Pearson Education 2007
H P Hsu, Schaum Outline Series - “Analog and Digital Communications”
TMH 2006
ARTIFICIAL INTELLIGENCE AND MACHINE L T P C
21CS1602 LEARNING
(COMMON TO CSE & CCE) 3 0 0 3
OBJECTIVES:
To understand the various characteristics of intelligent agents
To learn the different search strategies in AI
To learn to represent knowledge in solving AI problems
To know about the various applications of AI
To understand the need for machine learning and various algorithms in
machine learning.
9
UNIT - I INTRODUCTION
Introduction–Definition – Future of Artificial Intelligence – Characteristics of
Intelligent Agents–Typical Intelligent Agents – Problem Solving Approach to
Typical AI problems- Search Strategies- Uninformed – Informed-BFS-Greedy
best first search-A* search
SUGGESTED ACTIVITIES:
Developing PEAS description for agents
Comparing Future of AI
Different Approach in AI to Real Time Problems
Quiz on History of AI
Learners to write a letter to self-keeping the future in context
Assignment on Problem Solving Approach
9
UNIT - II PROBLEM SOLVING METHODS
Problem solving Methods – Heuristics Iterative Deepening A*- RBFS –
Memory Bounded A* – Local Search Algorithms and Optimization Problems
Searching with Partial Observations – Constraint Satisfaction Problems –
Constraint Propagation – Backtracking Search – Game Playing –Min Max-
Optimal Decisions in Games – Alpha Beta Pruning – Stochastic Games
SUGGESTED ACTIVITIES:
Participating in Game based activity
Basic Structure of Decision Tree to students
Searching Techniques for Problem Solving
SUGGESTED ACTIVITIES:
Installing Prolog.
Game based activity for AI applications.
Flowchart for Knowledge Representation.
SUGGESTED ACTIVITIES:
Developing a framework for real life activities such as decision tree.
Developing algorithms for basic mathematical expressions using
regression tree.
Simple program on SVM classification
SUGGESTED ACTIVITIES:
Developing a framework for real life activities such as clustering
techniques.
Application of clustering algorithms to datasets (UCI/Kaggle/Corel 10k).
TOTAL: 45 PERIODS
COURSE OUTCOMES
At the end of the course, the students will be able to:
Understand concepts of Artificial Intelligence and different types of
1 intelligentagents and their architecture.
2 Formulate problems as state space search problem and efficiently solve
them.
Understand the working of various informed and uninformed searching
3 algorithmsandthedifferent
conc ptheuristics.
of knowledge r pr s e tation.
4
5 Understand s upervis ed and unsupervised learning algorithms.
6 Apply Machine learning algorithms for real world problems.
TEXT BOOKS
S. Russell and P. Norvig, “Artificial Intelligence: A Modern Approach,
1 Prentice Hall,Fourth Edition, 2020 (Unit 1, 2, 3)
2 Tom M. Mitchell, “Machine Learning”, Indian Edition, McGraw-Hill, 2017.
REFERENCES:
Munesh Chandra Trivedi, “A Classical Approach to Artificial Intelligence”,
1 KhannaBook Publishing, 2019.
Vinod Chandra S.S, AnandHareendran S, “Artificial Intelligence and
2 MachineLearning”, PHI Learning, 2014.
David L. Poole and Alan K. Mackworth, ―Artificial Intelligence:
3 Foundations ofComputational Agents, Cambridge University Press, 2010.
Charu C. Aggarwal, “Data Classification Algorithms and Applications”,
4 CRC Press,2014.
Stephen Marsland, “Machine Learning – An Algorithmic Perspective”, 2
5 nd Edition,CRC Press, 2015.
L T P C
CS1412 NETWORKS LABORATORY
0 0 4 2
COURSE OBJECTIVES:
To learn and use network commands.
To learn socket programming.
To implement and analyze various network protocols.
To learn and use simulation tools.
To use simulation tools to analyze the performance of various network
protocols.
LIST OF EXPERIMENTS
1 Learn to use commands like tcpdump, netstat, ifconfig, nslookup and
traceroute. Capture ping and traceroute PDUs using a network protocol
analyzer and examine.
2 Write a HTTP web client program to download a web page using TCP
sockets.
3 Applications using TCP sockets like:
4 Echo client and echo server
5 Chat
6 File Transfer
7 Simulation of DNS using UDP sockets.
8 Write a code simulating ARP /RARP protocols.
9 Study of Network simulator (NS) and Simulation of Congestion Control
Algorithms using NS.
10 Study of TCP/UDP performance using Simulation tool.
11 Simulation of Distance Vector/ Link State Routing algorithm.
12 Performance evaluation of Routing protocols using Simulation tool.
13 Simulation of error correction code (like CRC).
TOTAL: 60 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Implement various protocols using TCP and UDP.
2 Compare the performance of different transport layer protocols.
3 Use simulation tools to analyze the performance of various network
protocols.
4 Analyze various routing algorithms.Implement error correction codes.
MICROCONTROLLERS AND INTERFACING L T P C
21EC1511
LABORATORY 0 0 4 2
COURSE OBJECTIVES:
Understand architecture and advanced features of microcontrollers.
Understand PIC/ARM processor registers, instruction pipeline, interrupts
and architecture.
Learn about instructions, addressing modes, conditional instructions
Programming of advanced microcontrollers.
Able to write a assembly language program for microcontroller.
Able to write a program for interfacing of external devices with
microcontroller.
LIST OF EXPERIMENTS
Assembly language programming experiments using 8051 and PIC:
1 Addition/Subtraction/multiplication/division of 8/16 bit data.
2 Data transfer/exchange between specified memory locations.
3 Largest/smallest from a series.
4 Sorting (Ascending/Descending) of data.
5 Square/cube/square root of 8-bit data
6 Code conversion-(Hex to Decimal / ASCII to Decimal and vice versa.
TOTAL: 60 PERIODS
OUTCOME:
On successful completion of the course student will be able to:
1 CO1:Write assembly language Program for 8051 microcontrollers
2 CO2: Write assembly language Program for PIC microcontrollers
3 CO3: Interface various peripheral devices 8051 microcontroller
4 CO4: Interface various peripheral devices PIC microcontroller
5 CO5: Function effectively as an individual and in a team to accomplish
the given task.
SEMESTER VI
INTERNET PROGRAMMING L T P C
21CS1502
(COMMON TO CSE &CCE) 3 0 0 3
OBJECTIVES:
To understand client-side programming.
To understand server-side programming.
To be familiarize on PHP programming.
To understand XML Essentials.
To learn web service architecture.
UNIT - I CLIENT-SIDE PROGRAMMING 9
Introduction to Web: Server - Client - Communication Protocol (HTTP) ---
Introduction to Typescript-IDEs- IntelliJ IDEA- Class Decorator --Classes.
Configuration and Compilation of all files in Typescript Bootstrap: Introduction to
Bootstrap - Structure of the Page – Typography Forms and Buttons.
SUGGESTED ACTIVITIES:
Designing a web page using IDEs-IntelliJ IDEA.
Design a letter form using Typography.
SUGGESTED ACTIVITIES:
Create Database Connectivity.
Develop a JSP Standard Tag Library.
UNIT - IV XML 9
XML: Basic XML- Document Type Definition- XML Schema DOM and
Presenting XML, XML Parsers and Validation, XSL and XSLT Transformation, News
Feed (RSS andATOM)
SUGGESTED ACTIVITIES:
Analyse XML Data using XML Parsers and Validation
Present a web page using Schema DOM and Presenting XML
SUGGESTED ACTIVITIES:
Update a Webpage using AJAX.
Creating, Publishing, Testing and Describing a Web services (WSDL).
TOTAL: 45 PERIODS
COURSE OUTCOMES
At the end of the course, the students will be able to:
Build dynamic web pages with validation using Typescript Objects and by
applying different classes and methods.
Develop server-side programs using Servlets and JSP.
Develop an application using JDBC.
Construct simple web pages in PHP.
Represent data in XML format.
Use AJAX and web services to develop interactive web applications.
TEXT BOOKS
Deitel and Deitel and Nieto, “Internet and World Wide Web - How to
12 Program”, Prentice Hall, 5th Edition, 2011.
Boris Cherny, “Programming Typescript” 2021.
3REFERENCES:
1 Stephen Wynkoop and John Burke “Running a Perfect Website”, QUE, 2nd
2 ECdhirtiisonB,a1t9e9s9
, .W eb Programming – Building Intranet Applications, 3rd Edition,
3 Wiley Publications, 2009.
4 Jeffrey C and Jackson, “Web Technologies A Computer Science
5 Perspective”, Pearson Education, 2011.
67 Gopalan N.P. and Akilandeswari J., “Web Technology”, Prentice Hall of India,
8 2011.
9 Josh Goldberg , “Learning Typescript”,2021.
L T P C
21EC1502 DIGITAL SIGNAL PROCESSING
3 0 0 3
OBJECTIVES:
To learn Discrete Fourier Transform(DFT), properties of DFT and its
application to linear filtering.
To understand the characteristics of digital filters, design digital IIR filters
and apply these filters to filter undesirable signals in various frequency
bands
To understand the characteristics of digital filters, design digital FIR filters
and apply these filters to filter undesirable signals in various frequency
bands.
To understand the effects of finite precision representation on digital filters.
To understand the fundamental concepts of multi rate signal processing and
its applications.
To introduce the concepts of adaptive filters and its application to
Communication engineering
WEB REFERENCES:
1 https://www.digimat.in/nptel/courses/video/108105055/L01.html
2 http://www.nitttrc.edu.in/nptel/courses/video/117102060/L01.html
ONLINE COURSES / RESOURCES:
https://www.arm.com/resources/education/online-courses/digital-signal-
1 processing
2 https://in.coursera.org/learn/dsp1
L T P C
21EC1601 WIRELESS COMMUNICATION
3 0 0 3
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Analyze problems &arrive at feasible solutions for error control using
Channel Coding Methods
2. Design a cellular system based on resource availability and traffic demands
3. Identify suitable signaling techniques for the wireless channel and system
under consideration.
4. Identify suitable multipath mitigation techniques for the wireless channel and
system under consideration.
5. Understand The concepts of multiple antenna techniques
TEXT BOOKS:
1.Rappaport,T.S., “Wireless communications”, Pearson Education, Second
Edition, 2010
2. Andreas.F. Molisch, “Wireless Communications”, John Wiley – India, 2006
REFERENCES:
1. Andrea Goldsmith ,“Wireless Communication”, Cambridge University Press,
2011
2. Van Nee, R. and Ramji Prasad,“OFDM for wireless multimedia
communications”, Artech House, 2000
3. David Tse and PramodViswanath,,”Fundamentals of Wireless
Communication”, Cambridge University Press, 2005.
4. Upena Dalal, “Wireless Communication”, Oxford University Press, 2009.
INTERNET PROGRAMMING LABORATORY L T P C
21CS1511
(COMMON TO CSE &CCE) 0 0 4 2
COURSE OBJECTIVES:
To be exposed to creation of user interfaces using Typescript and
Bootstrap.
To learn to create dynamic web pages using server-side scripting.
To learn to write Client Server applications.
To be familiar with PHP programming.
To be familiar with XML programming
To be exposed to creating applications with AJAX
LIST OF EXPERIMENTS
1 To create a simple web page using bootstrap.
2 Implementation of Typescript classes and functions.
3 Implementation of Bootstrap Typography.
4 Validate the Registration, user login, user profile and payment by credit
card pages using Typescript.
5 Write programs in Java using Servlets:
6 To invoke servlets from HTML forms
7 Session tracking using hidden form fields and Session tracking for a hit
count
8 Write programs in Java to create three-tier applications using servlets for
conducting online examinations for displaying student mark lists. Assume
that student information is available in a database which has been stored
in a database server.
9 Install TOMCAT web server. Convert the static web pages of programs
into dynamic web pages using servlets (or JSP) and cookies. Hint: Users
information (user id, password, credit card number) would be stored in
web.xml. Each user should have a separate Shopping Cart.
10 Redo the previous task using JSP by converting the static web pages into
dynamic web pages. Create a database with user information and books
information. The books catalogue should be dynamically loaded from the
database.
11 PHP-Validate the form using PHP regular expressions.
12 Create and save an XML document at the server, which contains 10
users Information. Write a Program, which takes user Id as an input and
returns the User details by taking the user information from the XML
document
13 Write a web service for finding what people think by asking 500 people’s
opinions for any consumer product.
TOTAL: 60 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Build dynamic web pages with validation using Typescript objects and by
applying different bootstrap mechanisms.
2 Develop dynamic web pages using server side scripting.
3 To create client server applications.
4 Use PHP programming to develop web applications.
5 Use XML programming to develop Web Applications
6 Construct web applications using AJAX and web services.
DIGITAL SIGNAL PROCESSING L T P C
21EC1512
LABORATORY 0 0 4 2
COURSE OBJECTIVES:
To implement generation of sequences.
To realize Linear Convolution, Circular Convolution and Correlation.
To analyze Frequency spectrum analysis (DFT).
To design and realize IIR filters.
To design and realize FIR filters.
To implement signal processing algorithms using digital signal processor.
LIST OF EXPERIMENTS
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Generation of basic signal sequences.
2 Design and implement the basic signal processing operations like
convolution and correlation helps to resolve real time applications.
3 Frequency domain analysis using DFT.
4 Design of IIR Filters for performing filtering operations over real-time
signals.
5 Design of FIR Filters for performing filtering operations over real-time
signals.
Implentation of signal processing algorithms using digital signal processor.
TEXT BOOKS
1 John G. Proakis, Dimitris G. Manolaxis, ―Discrete-Time Signal
Processing‖, 4thEdition, Pearson, 2007.
REFERENCE BOOKS
1 P. Ramesh Babu, ―Digital Signal Processing‖, Scitech Publications in
2011.
2 Sanjit K. Mitra, ―Digital Signal Processing – A Computer Based Approach,
Tata Mc Graw Hill, 2007.
SEMESTER VII
OBJECTIVES:
To understand Cryptography Theories, Algorithms and Systems
To understand necessary Approaches and Techniques.
To learn to build protection mechanisms in order to secure computer
networks.
To learn the various Authentication schemes.
To understand various Security practices and System security standards
UNIT - I INTRODUCTION 9
Security trends Legal, Ethical and Professional Aspects of Security, Need for
Securityat Multiple levels, Security Policies Model Of Network Security – Security
attacks -- Services And Mechanisms – OSI Security Architecture – Classical
Encryption Techniques : Substitution techniques, Transposition techniques ---
Steganography --Foundations of Modern Cryptography: Perfect Security –
Information Theory – Product Cryptosystem – Cryptanalysis.
SUGGESTED ACTIVITIES:
Implementation of steganography concept.
Comparing substitution techniques and transposition techniques
Different Approaches in cryptanalysis in Real Time Problems
SUGGESTED ACTIVITIES:
Problem Solving on Algebraic structures.
Implementation of Symmetric key ciphers and RC4 Algorithm.
SUGGESTED EVALUATION METHODS:
Quiz on SDES and mode of operation.
Assignments on AES and DES algorithms.
SUGGESTED ACTIVITIES:
Problem solving on Prime numbers and Factorization.
Solving Puzzles on Chinese Remainder Theorem.
SUGGESTED ACTIVITIES:
Comparing different authentication Algorithms
Implementing MD5 algorithm
/
SUGGESTED EVALUATION METHODS:
Assignment on Authentication applications
Assignment on Digital signature
Quiz on different Kerberos versions.
SUGGESTED ACTIVITIES:
Set up a Honeypot and monitor the honeypot on network (KF Sensor).
Demonstrate intrusion detection system (IDS) using any tool (snort or any
other s/w)
Installation of rootkits and study about the variety of options.
TOTAL: 45 PERIODS
COURSE OUTCOMES
At the end of the course, the students will be able to:
1 Understand the fundamentals of network security, security architecture,
2 Apply the different cryptographic operations of symmetric cryptographic
algorithms.
3 Apply the different cryptographic operations of public key cryptography.
4 Apply the various Authentication schemes to simulate different applications.
Understand various Security practices and System security standards. Analyze
5 various threats and vulnerabilities in systems.
TEXT BOOKS
William Stallings, Cryptography and Network Security: Principles and Practice,
PHI 8th Edition, 2020. BehrouzA. Ferouzan, “Cryptography & Network
1
Security”,Tata McGraw Hill,2nd edition 2015.
REFERENCES:
Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security”,
1
PrenticeHall of India,3rd Edition-2020.
2
C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and
NetworkSecurity, Wiley India Pvt.Ltd.
3
Charles Pfleeger, “Security in Computing”, 5th Edition, Prentice Hall of India,
2015
Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security:
4
PRIVATECommunication in a PUBLIC World, Prentice Hall, ISBN 0-13-046019-
2
5
Douglas R Simson “Cryptography–Theory and practice”, Third Edition, CRC
Press,2006.
L T P C
21EC1703 OPTICAL COMMUNICATION AND NETWORKS
3 0 0 3
OBJECTIVES:
To study about the various optical fiber modes, configuration and
fabricationtechniques
To understand the transmission characteristics of optical fibers
To learn about the various optical sources, detectors and transmission
techniques
To explore various idea about optical fiber measurements and various
coupling techniques
To enrich the knowledge about optical communication systems and networks.
UNIT - I INTRODUCTION TO OPTICAL FIBERS 9
Introduction-general optical fiber communication system- basic optical laws and
definitions- optical modes and configurations mode analysis for optical propagation
through fibers- modes in planar wave guide-modes in cylindrical optical fiber-
transverse electric and transverse magnetic modes- fiber materials-fiber fabrication
techniques-fiber optic cables- classification of optical fiber-single mode fiber-graded
index fiber.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1 Realize basic elements in optical fibers, different modes and configurations.
2 Analyse the transmission characteristics associated with dispersion and
polarization techniques.
3 Explain optical sources and detectors with their use in optical communication
system.
4 Discuss fiber optic receiver systems and measurement techniques.
5 Understand fiber joints and coupling.
6 Analyze optical communication systems and its networks.
TEXT BOOKS:
P Chakrabarti, "Optical Fiber Communication‖, McGraw Hill Education
1 (India)Private Limited, 2016 (UNIT I, II, III).
GredKeiser,"Optical Fiber Communication‖, McGraw Hill Education (India)
2 Private Limited. Fifth Edition, Reprint 2013.(UNIT I, IV, V).
REFERENCES:
John M. Senior , “Optical Fiber Communication”, Second Edition, Pearson
1 Education, 2007.
2 Rajiv Ramaswami, ―Optical Networks ― , Second Edition, Elsevier , 2004.
3 J.Gower, ―Optical Communication System‖, Prentice Hall of India, 2001.
Govind P. Agrawal, ―Fiber-optic communication systems‖, third edition, John
Wiley & sons, 2004.
4
WEB REFERENCES:
1 online at http://www.mhhe.com/engcs/electrical/keiser/
OBJECTIVES:
To understand the basics of Embedded and Robotics system.
To study the Architecture of ARM Processor.
To understand interfacing concepts of ARM.
To select appropriate hardware and microcontrollers based on need of
application.
To illustrate about robotic vision
To apply robot based concepts in AI
UNIT - I INTRODUCTION TO EMBEDDED AND ROBOTICS 9
Introduction Embedded systems, Definition, Examples and components of
embedded Systems, Embedded System Design Process, Various Embedded core
controllers. Robotics -Definition and origin of robotics – degrees of freedom – Robot
classifications and specifications – Asimov’s laws of robotics.
UNIT - V AI ROBOTICS 9
Intelligent systems- elements of artificial intelligence- system architecture-
applicationsof advanced robot-fuzzy logic control-advanced concept and
procedures-future development-impact on employment.
TOTAL: 45 PERIODS
OUTCOMES:
COURSE OBJECTIVES:
Understand the working principle of optical sources, detector,
fibers
Develop understanding of simple optical communication
link
Understand the measurement of BER, Pulse broadening
Understand the characteristics of Microwave Devices
Measure Various Microwave parameters
Understand the characteristics of Microwave IC Filter
TOTAL: 60 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Analyze the performance of simple optical link by measurement of losses
and analyzing the mode characteristics of fiber.
2. Develop simple Optical communication Link.
3. Analyze the Eye Pattern, Pulse broadening of optical fiber and the impact on
BER.
4. Understand the intricacies in Microwave System design.
5. Measure the various Microwave parameters.
6. Analyze the characteristics of Microwave IC Filter.
CRYPTOGRAPHY AND NETWORK SECURITY L T P C
21CS1712 LABORATORY 0 0 4 2
(Common to CSE,IT,CCE)
COURSE OBJECTIVES:
To learn different cipher techniques
To implement the algorithms DES, RSA,SHA-1
To understand the usage of security tools
LIST OF EXPERIMENTS
MINI PROJECTS:
1 Keylogger projects.
2 Antivirus.
3 Analysis and Assessment of different Cyber-Attacks
4 Network Monitoring and Anomalies Discovery.
5 Bug Bounties.
TOTAL: 60 PERIODS
COURSE OUTCOMES
At the end of the course, the student will able to
1 Develop code for classical Encryption Techniques to solve the problems.
2 Build cryptosystems by applying symmetric key encryption algorithms
3 Develop public key encryption algorithms.
4 Construct code for authentication algorithms.
5 Develop a signature scheme using Digital signature standard.
6 Demonstrate the system security using open-source tools.
PROFESSIONAL ELECTIVES
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand the fundamentals of exploratory data analysis.
2. Implement the data visualization using Matplotlib.
3. Perform univariate data exploration and analysis.
4. Apply bivariate data exploration and analysis.
5. Use Data exploration techniques for multivariate and time series data.
6. Use Data visualization techniques for multivariate and time series data.
TEXT BOOKS:
1. Suresh Kumar Mukhiya, Usman Ahmed, ―Hands-On Exploratory Data
Analysis with Python‖, Packt Publishing, 2020.
2. Jake Vander Plas, "Python Data Science Handbook: Essential Tools for
Working with Data", First Edition, O Reilly, 2017.
3. Catherine Marsh, Jane Elliott, ―Exploring Data: An Introduction to Data
Analysis for Social Scientists‖, Wiley Publications, 2nd Edition, 2008.
REFERENCES:
1. Eric Pimpler, Data Visualization and Exploration with R, GeoSpatial Training
service, 2017.
2. Claus O. Wilke, ―Fundamentals of Data Visualization‖, O‘reilly publications,
2019.
3. Matthew O. Ward, Georges Grinstein, Daniel Keim, ―Interactive Data
Visualization: Foundations, Techniques, and Applications‖, 2nd Edition, CRC
press, 2015.
RECOMMENDER SYSTEMS L T P C
21AD1902
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To understand the foundations of the recommender system.
To learn the significance of machine learning and data mining algorithms for
Recommender systems
To learn about collaborative filtering
To make students design and implement a recommender system.
To learn collaborative filtering.
UNIT - I INTRODUCTION 9
Introduction and basic taxonomy of recommender systems Traditional and non-
personalized Recommender Systems -- Overview of data mining methods for
recommender systems- similarity measures- Dimensionality reduction – Singular
Value Decomposition (SVD)
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand the basic concepts of recommender systems.
2. Implement machine-learning and data-mining algorithms in recommender
systems data sets.
3. Implementation of Collaborative Filtering in carrying out performance
evaluation of recommender systems based on various metrics.
4. Design and implement a simple recommender system.
5. Learn about advanced topics of recommender systems.
6. Learn about advanced topics of recommender systems applications
TEXT BOOKS:
1. Charu C. Aggarwal, Recommender Systems: The Textbook, Springer, 2016.
2. Dietmar Jannach , Markus Zanker , Alexander Felfernig and Gerhard
Friedrich , Recommender Systems: An Introduction, Cambridge
University Press (2011), 1st ed.
3. Francesco Ricci , Lior Rokach , Bracha Shapira , Recommender Sytems
Handbook, 1st ed, Springer (2011),
4. Jure Leskovec, Anand Rajaraman, Jeffrey David Ullman, Mining of massive
datasets, 3rd edition, Cambridge University Press, 2020.
21AD1918 NEURAL NETWORKS AND DEEP LEARNING L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To understand the basics in deep neural networks
To understand the basics of associative memory and unsupervised learning
networks
To apply CNN architectures of deep neural networks
To analyze the key computations underlying deep learning, then use them
to build and train deep neural networks for various tasks.
To apply autoencoders and generative models for suitable applications.
UNIT - I INTRODUCTION 9
Neural Networks-Application Scope of Neural Networks-Artificial Neural Network: An
Introduction- Evolution of Neural Networks-Basic Models of Artificial Neural Network-
Important Terminologies of ANNs-Supervised Learning Network.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Apply Convolution Neural Network for image processing.
2. Understand the basics of associative memory and unsupervised learning
networks.
3. Apply CNN and its variants for suitable applications.
4. Analyze the key computations underlying deep learning
5. Use the key computations to build and train deepneural networks for various
tasks.
6. Apply autoencoders and generative models for suitable applications.
TEXT BOOKS:
1. Ian Goodfellow, Yoshua Bengio, Aaron Courville, ―Deep Learning‖, MIT
Press, 2016.
2. Francois Chollet, ―Deep Learning with Python‖, Second Edition, Manning
Publications, 2021.
REFERENCES:
1. Aurélien Géron, ―Hands-On Machine Learning with Scikit-Learn and
TensorFlow‖, Oreilly, 2018.
2. Josh Patterson, Adam Gibson, ―Deep Learning: A Practitioner‘s Approach‖,
O‘Reilly Media, 2017.
3. Charu C. Aggarwal, ―Neural Networks and Deep Learning: A Textbook‖,
Springer International Publishing, 1st Edition, 2018.
4. Learn Keras for Deep Neural Networks, Jojo Moolayil, Apress,2018
5. Deep Learning Projects Using TensorFlow 2, Vinita Silaparasetty, Apress,
2020
6. Deep Learning with Python, François Chollet, Manning Shelter Island,2017.
7. S Rajasekaran, G A Vijayalakshmi Pai, ―Neural Networks, FuzzyLogic and
Genetic Algorithm, Synthesis and Applications‖, PHI Learning, 2017.
8. Pro Deep Learning with TensorFlow, Santanu Pattanayak, Apress,2017
9. James A Freeman, David M S Kapura, ―Neural Networks Algorithms,
Applications, and Programming Techniques‖, Addison Wesley, 2003.
21AD1919 TEXT AND SPEECH ANALYSIS L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
Understand natural language processing basics
Apply classification algorithms to text documents
Build question-answering and dialogue systems
Develop a speech recognition system
Develop a speech synthesizer
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Explain existing and emerging deep learning architectures for text and
speech processing
2. Apply deep learning techniques for NLP tasks, language modelling and
machine translation
3. Explain coreference and coherence for text processing
4. Build question-answering systems, chatbots and dialogue systems
5. Apply deep learning models for building speech recognition
6. Apply deep learning models for building text-to-speech systems
TEXT BOOKS:
1. Daniel Jurafsky and James H. Martin, ―Speech and Language Processing:
An Introduction to Natural Language Processing, Computational Linguistics,
and Speech Recognition‖, Third Edition, 2022.
REFERENCES:
1. Dipanjan Sarkar, ―Text Analytics with Python: A Practical Real-World
approach to Gaining Actionable insights from your data‖, APress,2018.
2. Tanveer Siddiqui, Tiwary U S, ―Natural Language Processing and
Information Retrieval‖, Oxford University Press, 2008.
3. Lawrence Rabiner, Biing-Hwang Juang, B. Yegnanarayana, ―Fundamentals
of Speech Recognition‖ 1st Edition, Pearson, 2009.
4. Steven Bird, Ewan Klein, and Edward Loper, ―Natural language processing
with Python‖, O‘REILLY.
21AD1920 BUSINESS ANALYTICS L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To understand the Analytics Life Cycle.
To comprehend the process of acquiring Business Intelligence
To understand various types of analytics for Business Forecasting
To model the supply chain management for Analytics.
To apply analytics for different functions of a business
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Explain the real world business problems and model with analytical
solutions.
2. Explain the real world business problems and model with analytical
solutions.
3. Identify the business processes for extracting Business Intelligence
4. Apply predictive analytics for business fore-casting
5. Apply predictive analytics for business fore-casting
6. Use analytics for marketing and sales.
TEXT BOOKS:
1. R. Evans James, Business Analytics, 2nd Edition, Pearson, 2017.
2. R N Prasad, Seema Acharya, Fundamentals of Business Analytics, 2nd
Edition, Wiley, 2016.
REFERENCES:
1. Philip Kotler and Kevin Keller, Marketing Management, 15th edition, PHI,
2016
2. VSP RAO, Human Resource Management, 3rd Edition, Excel Books, 2010.
3. Mahadevan B, ―Operations Management -Theory and Practice‖,3rd Edition,
Pearson Education,2018.
IMAGE AND VIDEO ANALYTICS L T P C
21AD1906 3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To understand the basics of image processing techniques for computer
vision.
To learn the techniques used for image pre-processing.
To discuss the various object detection techniques.
To understand the various Object recognition mechanisms.
To elaborate on the video analytics techniques.
UNIT - I INTRODUCTION 9
Computer Vision – Image representation and image analysis tasks Image
representations – digitization – properties – color images – Data structures for Image
Analysis - Levels of image data representation Traditional and Hierarchical image
data structures- T-pyramid of an image- the quad tree representation of an image
using the homogeneity criterion of equal intensity
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand the basics of image processing techniques for computer vision.
2. Understand the basics of image processing techniques for video analysis.
3. Explain the techniques used for image pre-processing.
4. Develop various object detection techniques.
5. Understand the various face recognition mechanisms.
6. Elaborate on deep learning-based video analytics.
TEXT BOOKS:
1. Milan Sonka, Vaclav Hlavac, Roger Boyle, ―Image Processing, Analysis, and
Machine Vision‖, 4nd edition, Thomson Learning, 2013.
2. Vaibhav Verdhan,(2021, Computer Vision Using Deep Learning Neural
Network Architectures with Python and Keras, Apress 2021
REFERENCES:
1. Richard Szeliski, ―Computer Vision: Algorithms and Applications‖, Springer
Verlag London Limited,2011.
2. Caifeng Shan, FatihPorikli, Tao Xiang, Shaogang Gong, ―Video Analytics for
Business Intelligence‖, Springer, 2012.
3. D. A. Forsyth, J. Ponce, ―Computer Vision: A Modern Approach‖, Pearson
Education, 2003.
4. E. R. Davies, (2012), ―Computer & Machine Vision‖, Fourth Edition,
Academic Press.
21AD1921 COMPUTER VISION TECHNIQUES L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To understand the fundamental concepts related to Image formation and
processing.
To learn feature detection, matching and detection
To become familiar with feature based alignment and motion estimation
To develop skills on 3D reconstruction
To understand image based rendering and recognition
UNIT - I INTRODUCTION TO IMAGE FORMATION AND PROCESSING 9
Computer Vision - Geometric primitives and transformations - Photometric image
formation - The digital camera - Point operators - Linear filtering - More
neighborhood operators - Fourier transforms - Pyramids and wavelets - Geometric
transformations - Global optimization.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. To understand basic knowledge, theories and methods in image processing
and computer vision.
2. To implement basic image processing techniques in OpenCV.
3. To implement some advanced image processing techniques in OpenCV.
4. To apply 2D feature-based image alignment, segmentation and motion
estimations.
5. To apply 3D image reconstruction techniques
6. To design and develop innovative image processing and computer vision
applications.
TEXT BOOKS:
1. Rafael C. Gonzalez, Richard Eugene Woods,‖ Digital Image Processing‖,
Pearson,2018.
2. Richard Szeliski, ―Computer Vision: Algorithms and Applications‖, Springer-
Texts in Computer Science, Second Edition, 2022.
3. Computer Vision: A Modern Approach, D. A. Forsyth, J. Ponce, Pearson
Education, Second Edition, 2015.
REFERENCES:
1. Richard Hartley and Andrew Zisserman, Multiple View Geometry in
Computer Vision, Second Edition, Cambridge University Press, March 2004.
2. Christopher M. Bishop; Pattern Recognition and Machine Learning, Springer,
2006
3. E. R. Davies, Computer and Machine Vision, Fourth Edition, Academic
Press, 2012.
21AD1922 DATA VISUALIZATION L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To understand the fundamental concepts related to visualization data
To learn foundations for visualization
To learn foundations for visualization
To learn interaction concepts and techniques
To use visualization techniques for research
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand the fundamental concepts related to visualization data
2. Learn foundations for visualization and become familiar with visualization
techniques
3. Visualize the objects in different dimensions
4. Design and process the data for Visualization.
5. Apply the visualization techniques in physical sciences, computer science,
applied mathematics and medical sciences
6. Apply the virtualization techniques for research projects.
REFERENCES:
1. Matthew Ward, Georges Grinstein and Daniel Keim, ―Interactive Data
Visualization Foundations, Techniques, Applications‖, 2010
2. Colin Ware, ―Information Visualization Perception for Design‖, 2nd edition,
Margon Kaufmann Publishers, 2004.
3. Robert Spence ―Information visualization – Design for interaction‖, Pearson
Education, 2 nd Edition, 2007.
4. Alexandru C. Telea, ―Data Visualization: Principles and Practice,‖ A. K.
Peters Ltd, 2008.
VERTICAL II: FULL STACK DEVELOPMENT
UNIT - I INTRODUCTION 9
Introduction to Open-Source: Open Source, Need and Principles of OSS, Open-
Source Standards, Requirements for Software, OSS success, Free Software,
Examples, Licensing, Free Vs. Proprietary Software, Free Software Vs. Open-
Source Software, Public Domain. History of free software, Proprietary Vs Open-
Source Licensing Model, use of Open- Source Software, FOSS does not mean no
cost. History: BSD, The Free Software Foundation and the GNU Project.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Differentiate between Open Source and Proprietary software and Licensing.
2. Understand the policies, licensing procedures and ethics of FOSS
3. Build and modify one or more Free and Open Source Software packages.
4. Recognize the applications, benefits and features of Open-Source
Technologies
5. Contribute software to and interact with Free and Open Source Software
development projects.
6. Gain knowledge to start, manage open-source projects.
TEXT BOOKS:
1. Kailash Vadera, Bhavyesh Gandhi, ―Open Source Technology‖, Laxmi
Publications Pvt Ltd 2012, 1st Edition.
2. Open Source Software, P.Rizwan Ahmed, Margham Publication, Chennai,
2015
REFERENCES:
1. Fadi P. Deek and James A. M. McHugh, ―Open Source: Technology and
Policy‖, Cambridge Universities Press 2009.
2. ―Open-Source Technology‖, Kailash Vadera&Bhavyesh Gandhi, University
Science Press, Laxmi Publications, 2009
3. Unix Concepts and Applications by Sumitabha Das, Tata McGraw Hill
Education, 2006
4. The official Ubuntu Book, 8th Edition
5. ―Perspectives on Free and Open-Source Software‖, Clay Shirky and Michael
Cusumano, MIT press.
6. ―Understanding Open Source and Free Software Licensing‖, Andrew M. St.
Laurent, O‘Reilly Media.
7. ―Open Source for the Enterprise‖, Dan Woods, GautamGuliani, O‘Reilly
Media
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Develop Native applications with GUI Components.
2. Develop hybrid applications with basic event handling.
3. Implement cross-platform applications with location and data storage
capabilities.
4. Implement cross platform applications with basic GUI and event handling.
5. Develop web applications with cloud database access.
6. To gain in-depth Knowledge of Popular Frameworks, Server, APIs
TEXT BOOKS:
1. Head First Android Development, Dawn Griffiths, O‘Reilly, 1st edition,
November 2021
2. Apache Cordova in Action, Raymond K. Camden, Manning. 2015
3. Full Stack React Native: Create beautiful mobile apps with JavaScript and
React Native, Anthony Accomazzo, Houssein Djirdeh, Sophia Shoemaker,
Devin Abbott, FullStack publishing, 2019.
REFERENCES:
1. Android Programming for Beginners, John Horton, Packt Publishing, 2nd
Edition, 2018.
2. Native Mobile Development by Shaun Lewis, Mike Dunn, November 2019
3. Building Cross-Platform Mobile and Web Apps for Engineers and Scientists:
An Active Learning Approach, Pawan Lingras, Matt Triff, Rucha Lingras,
2015
4. Apache Cordova 4 Programming, John M Wargo, 2015
5. React Native Cookbook, Daniel Ward, Packt Publishing, 2nd Edition, 2019
21CS1903 CLOUD SERVICES MANAGEMENT L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
Introduce Cloud Service Management terminology, definition & concepts
Compare and contrast cloud service management with traditional IT service
management
Identify strategies to reduce risk and eliminate issues associated with
adoption of cloud services
Select appropriate structures for designing, deploying and running cloud-
based services in a business environment
Illustrate the benefits and drive the adoption of cloud-based services to
solve real world problems
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand Cloud Service Management terminology, definition & concepts
2. Compare and contrast cloud service management with traditional IT service
management
3. Build and automate business solutions using cloud technologies.
4. Identify strategies to reduce risk and eliminate issues associated with
adoption of Cloud services
5. Select appropriate structures for designing, deploying and running cloud-
based services In business environment
6. Illustrate the benefits and drive the adoption of cloud-based services to solve
real world problems
TEXT BOOKS:
1. Cloud Service Management and Governance: Smart Service Management in
Cloud Era by Enamul Haque, Enel Publications,2020.
2. Cloud Computing: Concepts, Technology & Architecture by Thomas Erl,
Ricardo Puttini, Zaigham Mohammad ,2013.
3. Cloud Computing Design Patterns by Thomas Erl, Robert Cope, Amin
Naserpour,2017.
REFERENCES:
1. Economics of Cloud Computing by Praveen Ayyappa, LAP Lambert
Academic Publishing
2. Mastering Cloud Computing Foundations and Applications Programming
Rajkumar Buyya, Christian Vechhiola, S. Thamarai Selvi
21IT1903 UI AND UX DESIGN L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To provide a sound knowledge in UI & UX
To understand the need for UI and UX
To understand the various Research Methods used in Design
To explore the various Tools used in UI & UX
Creating a wireframe and prototype
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand the various Research Methods used in Design
2. Build UI for user Applications
3. Evaluate UX design of any product or application
4. Demonstrate UX Skills in product development
5. Implement Sketching principles
6. Create Wireframe and Prototype
TEXT BOOKS:
1. Joel Marsh, ―UX for Beginners‖, O‘Reilly , 2022
2. Jon Yablonski, ―Laws of UX using Psychology to Design Better Product &
Services‖ O‘Reilly 2021
REFERENCES:
1. Jenifer Tidwell, Charles Brewer, Aynne Valencia, ―Designing Interface‖ 3 rd
Edition , O‘Reilly 2020
2. Steve Schoger, Adam Wathan ―Refactoring UI‖, 2018
3. Steve Krug, ―Don't Make Me Think, Revisited: A Commonsense Approach to
Web & Mobile‖, Third Edition, 2015
4. https://www.nngroup.com/articles/
5. https://www.interaction-design.org/literature.
21IT1904 SOFTWARE TESTING AND AUTOMATION L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To understand the basics of software testing
To learn how to do the testing and planning effectively
To build test cases and execute them
To focus on wide aspects of testing and understanding multiple facets of
testing
To get an insight about test automation and the tools used for test
automation
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand the basic concepts of software testing and the need for software
testing
2. Design Test planning and different activities involved in test planning
3. Design effective test cases that can uncover critical defects in the application
4. Focus on wide aspects of testing
5. Understand multiple facets of testing
6. Automate the software testing using Selenium and TestNG
TEXT BOOKS:
1. Yogesh Singh, ―Software Testing‖, Cambridge University Press, 2012
2. Unmesh Gundecha, Satya Avasarala, "Selenium WebDriver 3 Practical
Guide" - Second Edition 2018
REFERENCES:
1. Glenford J. Myers, Corey Sandler, Tom Badgett, The Art of Software Testing,
3rd Edition, 2012, John Wiley & Sons, Inc.
2. Ron Patton, Software testing, 2nd Edition, 2006, Sams Publishing
3. Paul C. Jorgensen, Software Testing: A Craftsman‘s Approach, Fourth
Edition, 2014, Taylor & Francis Group.
4. Carl Cocchiaro, Selenium Framework Design in Data-Driven Testing, 2018,
Packt Publishing.
5. Elfriede Dustin, Thom Garrett, Bernie Gaurf, Implementing Automated
Software Testing, 2009, Pearson Education, Inc.
6. Satya Avasarala, Selenium WebDriver Practical Guide, 2014, Packt
Publishing.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Understanding the basic concepts of web application security and the need
for it
2. Be acquainted with the process for secure development and deployment of
web applications
3. Acquire the skill to design and develop Secure Web Applications that use
Secure APIs
4. Be able to get the importance of carrying out vulnerability assessment and
penetration testing
5. Using the acquired knowledge into practice for testing the vulnerabilities and
identifying threats.
6. Using the acquired knowledge into practice for testing the vulnerabilities and
identifying threats.
TEXT BOOKS:
1. Andrew Hoffman, Web Application Security: Exploitation and
Countermeasures for Modern Web Applications, First Edition, 2020, O‘Reilly
Media, Inc.
2. Bryan Sullivan, Vincent Liu, Web Application Security: A Beginners Guide,
2012, The McGraw- Hill Companies.
3. Neil Madden, API Security in Action, 2020, Manning Publications Co., NY,
USA.
REFERENCES:
1. Michael Cross, Developer‘s Guide to Web Application Security, 2007,
Syngress Publishing, Inc.
2. Ravi Das and Greg Johnson, Testing and Securing Web Applications, 2021,
Taylor & Francis Group, LLC.
3. Prabath Siriwardena, Advanced API Security, 2020, Apress Media LLC,
USA.
4. Malcom McDonald, Web Security for Developers, 2020, No Starch Press,
Inc.
5. Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, and
Terron Williams Grey Hat Hacking: The Ethical Hacker‘s Handbook, Third
Edition, 2011, The McGraw-Hill Companies.
DEVOPS L T P C
21IT1906
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To introduce DevOps terminology, definition & concepts
To understand the different Version control tools like Git, Mercurial
To understand the concepts of Continuous Integration/ Continuous Testing/
Continuous Deployment)
To understand Configuration management using Ansible
Illustrate the benefits and drive the adoption of cloud-based Devops tools to
solve real world problems
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand different actions performed through Version control tools like Git.
2. Understand the various installation procedure of SDK
3. Ability to Perform Automated Continuous Deployment
4. Perform Continuous Integration and Continuous Testing and Continuous
Deployment using Jenkins by building and automating test cases using
Maven & Gradle.
5. Ability to do configuration management using Ansible
6. Understand to leverage Cloud-based DevOps tools using Azure DevOps
TEXT BOOKS:
1. Roberto Vormittag, ―A Practical Guide to Git and GitHub for Windows Users:
From Beginner to Expert in Easy Step-By-Step Exercises‖, Second Edition,
Kindle Edition, 2016.
2. Jason Cannon, ―Linux for Beginners: An Introduction to the Linux Operating
System and Command Line‖, Kindle Edition, 2014
REFERENCES:
1. Hands-On Azure Devops: Cicd Implementation For Mobile, Hybrid, And Web
Applications Using Azure Devops And Microsoft Azure: CICD
Implementation for ... DevOps and Microsoft Azure (English Edition)
Paperback – 1 January 2020 by Mitesh Soni
2. Jeff Geerling, ―Ansible for DevOps: Server and configuration management
for humans‖, First Edition, 2015
3. David Johnson, ―Ansible for DevOps: Everything You Need to Know to Use
Ansible for DevOps‖, Second Edition, 2016.
4. Mariot Tsitoara, ―Ansible 6. Beginning Git and GitHub: A Comprehensive
Guide to Version Control, Project Management, and Teamwork for the New
Developer‖, Second Edition, 2019.
5. https://www.jenkins.io/user-handbook.pdf
6. https://maven.apache.org/guides/getting-started/
21IT1907 PRINCIPLES OF PROGRAMMING LANGUAGES L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To understand and describe syntax and semantics of programming
languages
To understand data, data types, and basic statements
To understand call-return architecture and ways of implementing them
To understand object-orientation, concurrency, and event handling in
programming languages
To develop programs in non-procedural programming paradigms
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Describe syntax and semantics of programming languages
2. Explain data, data types, and basic statements of programming languages
3. Design and implement subprogram constructs
4. Apply object-oriented, concurrency, and event handling programming
constructs and Develop programs in Scheme, ML, and Prolog
5. Understand and adopt new programming languages
6. Applying the programming Languages in creating various applications
TEXT BOOKS:
1. Robert W. Sebesta, ―Concepts of Programming Languages‖, Twelfth Edition
(Global Edition), Pearson, 2022.
2. Michael L. Scott, ―Programming Language Pragmatics‖, Fourth Edition,
Elsevier, 2018.
3. R. Kent Dybvig, ―The Scheme programming language‖, Fourth Edition,
Prentice Hall, 2011.
4. Jeffrey D. Ullman, ―Elements of ML programming‖, Second Edition, Pearson,
1997.
5. W. F. Clocksin and C. S. Mellish, ―Programming in Prolog: Using the ISO
Standard‖, Fifth Edition, Springer, 2003.
VERTICAL III: CLOUD COMPUTING AND DATA CENTER TECHNOLOGIES
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Employ the concepts of virtualization in the cloud computing
2. Identify the architecture, infrastructure and delivery models of cloud
computing
3. Deploy practical virtualization solution
4. Develop the Cloud Application in AWS platform
5. Apply concepts to design Cloud Applications
6. Develop services using various Cloud computing programming models.
TEXT BOOKS:
1. Kai Hwang, Geoffrey C Fox, Jack G Dongarra, ―Distributed and Cloud
Computing, From Parallel Processing to the Internet of Things‖, Morgan
Kaufmann Publishers, 2012.
2. James Turnbull, ―The Docker Book‖, O‘Reilly Publishers, 2014.
3. Krutz, R. L., Vines, R. D, ―Cloud security. A Comprehensive Guide to Secure
Cloud Computing‖, Wiley Publishing, 2010.
REFERENCES:
1. Bernard Golden, Amazon Web Service for Dummies, John Wiley & Sons,
2013.
2. Raoul Alongi, AWS: The Most Complete Guide to Amazon Web Service from
Beginner to Advanced Level, Amazon Asia- Pacific Holdings Private Limited,
2019 3. Sriram Krishnan, Programming: Windows Azure, O‘Reilly,2010
3. Sriram Krishnan, Programming: Windows Azure, O‘Reilly,2010
4. Rajkumar Buyya, Christian Vacchiola, S.Thamarai Selvi, Mastering Cloud
Computing , MCGraw Hill Education (India) Pvt. Ltd., 2013.
5. Danielle Ruest, Nelson Ruest, ―Virtualization: A Beginner‟s Guide‖, McGraw-
Hill Osborne Media, 2009. Jim Smith, Ravi Nair , "Virtual Machines: Versatile
Platforms for Systems and Processes", Elsevier/Morgan Kaufmann, 2005.
6. John W.Rittinghouse and James F.Ransome, "Cloud Computing:
Implementation, Management, and Security", CRC Press, 2010
7. Toby Velte, Anthony Velte, Robert Elsenpeter, "Cloud Computing, A
Practical Approach", McGraw-Hill Osborne Media, 2009.
8. Tom White, "Hadoop: The Definitive Guide", Yahoo Press, 2012.
21CS1902 VIRTUALIZATION L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To learn the basics and types of Virtualization
To understand the Hypervisors and its types
To Explore the Virtualization Solutions
To Experiment the virtualization platforms
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand the basics and types of Virtualization
2. Understand the Hypervisors and its types
3. Analyze the virtualization concepts for server and Desktop
4. Apply the Virtualization for real-world applications
5. Install & Configure the different VM platforms
6. Experiment with the VM with various software
TEXT BOOKS:
1. Cloud computing a practical approach - Anthony T.Velte , Toby J. Velte
Robert Elsenpeter, TATA McGraw- Hill , New Delhi – 2010
2. Cloud Computing (Principles and Paradigms), Edited by Rajkumar Buyya,
James Broberg, Andrzej Goscinski, John Wiley & Sons, Inc. 2011
3. David Marshall, Wade A. Reynolds, Dave McCrory , Advanced Server
Virtualization: VMware and MicrosoftPlatform in the Virtual Data Center,
Auerbach,2006
4. Chris Wolf, Erick M. Halter, ―Virtualization: From the Desktop to the
Enterprise‖, APress, 2005.
REFERENCES:
1. James E. Smith, Ravi Nair, ―Virtual Machines: Versatile Platforms for
Systems and Processes‖, Elsevier/Morgan Kaufmann, 2005.
2. David Marshall, Wade A. Reynolds, ―Advanced Server Virtualization:
VMware and Microsoft Platform in the Virtual Data Center‖, Auerbach
Publications, 2006.
21CS1903 CLOUD SERVICES MANAGEMENT L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
Introduce Cloud Service Management terminology, definition & concepts
Compare and contrast cloud service management with traditional IT service
management
Identify strategies to reduce risk and eliminate issues associated with
adoption of cloud services
Select appropriate structures for designing, deploying and running cloud-
based services in a business environment
Illustrate the benefits and drive the adoption of cloud-based services to
solve real world problems
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand Cloud Service Management terminology, definition & concepts
2. Compare and contrast cloud service management with traditional IT service
management
3. Build and automate business solutions using cloud technologies.
4. Identify strategies to reduce risk and eliminate issues associated with
adoption of Cloud services
5. Select appropriate structures for designing, deploying and running cloud-
based services In business environment
6. Illustrate the benefits and drive the adoption of cloud-based services to solve
real world problems
TEXT BOOKS:
1. Cloud Service Management and Governance: Smart Service Management in
Cloud Era by Enamul Haque, Enel Publications,2020.
2. Cloud Computing: Concepts, Technology & Architecture by Thomas Erl,
Ricardo Puttini, Zaigham Mohammad ,2013.
3. Cloud Computing Design Patterns by Thomas Erl, Robert Cope, Amin
Naserpour,2017.
REFERENCES:
1. Economics of Cloud Computing by Praveen Ayyappa, LAP Lambert
Academic Publishing
2. Mastering Cloud Computing Foundations and Applications Programming
Rajkumar Buyya, Christian Vechhiola, S. Thamarai Selvi
21CS1904 STORAGE TECHNOLOGIES L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
Characterize the functionalities of logical and physical components of
storage
Describe various storage networking technologies
Identify different storage virtualization technologies
Discuss the different backup and recovery strategies
Understand common storage management activities and solutions
UNIT - I STORAGE SYSTEMS 9
Introduction to Information Storage: Digital data and its types, Information storage,
Key characteristics of data center and Evolution of computing platforms. Information
Lifecycle Management. Third Platform Technologies: Cloud computing and its
essential characteristics, Cloud services and cloud deployment models, Big data
analytics, Social networking and mobile computing, Characteristics of third platform
infrastructure and Imperatives for third platform transformation. Data Center
Environment: Building blocks of a data center, Compute systems and compute
virtualization and Software-defined data center.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Demonstrate the fundamentals of information storage management and
various models of Cloud infrastructure services and deployment
2. Illustrate the usage of advanced intelligent storage systems and RAID
3. Interpret various storage networking architectures - SAN, including storage
subsystems and virtualization
4. Examine the different role in providing disaster recovery and remote
replication technologies
5. Discuss the different backup and recovery strategies
6. Infer the security needs and security measures to be employed in
information storage management
TEXT BOOKS:
1. EMC Corporation, Information Storage and Management, Wiley, India,2012.
2. Jon Tate, Pall Beck, Hector Hugo Ibarra, Shanmuganathan Kumaravel and
Libor Miklas, Introduction to Storage Area Networks, Ninth Edition, IBM -
Redbooks, December 2017.
3. Ulf Troppens,Rainer Erkens, Wolfgang Mueller-Friedt, Rainer Wolafka, Nils
Haustein, Storage Networks Explained, Second Edition, Wiley, 2009
21CS1905 SITE RELIABILITY ENGINEERING L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To understand the organizational impact of introducing SRE
To gain knowledge of how to develop service-level objectives from business
objectives.
To gain familiarity with incident and problem analysis.
To explore the knowledge in the production system towards the monitoring
of services.
To gain insights into building incident management and scaling processes
for better reliability and performance
UNIT - I INTRODUCTION 9
Introduction to Site Reliability Engineering (SRE) - Tenets of SRE -- Production
Environment – Hardware - Software Infrastructure- Development Environment -
Sample Service - SRE and DevOps - Technology to support SRE -- Google SRE
model
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand the organizational impact of introducing SRE
2. Gain knowledge of how to develop service-level objectives from business
objectives
3. Differentiate between service level agreement of user with organizational
service level agreement
4. Become familiar with incident and problem analysis.
5. Become familiar with incident and problem analysis.
6. Confirm the scaling processes for better reliability and performance.
TEXT BOOKS:
1. Betsy Beyer, Chris Jones, Niall Richard Murphy, Jennifer Petoff, ―Site
Reliability Engineering‖, O'Reilly Media, Inc., 2016
2. Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Piotr
Lewandowski, Adam Stubblefield, ―Building Secure & Reliable Systems‖,
2020
3. Betsy Beyer, Niall Richard Murphy, David K. Rensin, Kent Kawahara and
Stephen Thorne, ―The Site Reliability Workbook‖, 2018
REFERENCES:
1. Enterprise Roadmap to SRE - Google - Site
Reliability Engineering - https://static.
Googleusercontent.com /media/sre.google/en//static/pdf/enterprise-
roadmap-to-sre.pdf
2. Anatomy of an Incident - Google - Site Reliability Engineering -
https://static.googleusercontent.
com/media/sre.google/en//static/pdf/TrainingSiteReliabilityEngineers.pdf
3. Incident Metrics in SRE - Google - Site
Reliability Engineering - https://static.
googleusercontent.com/media/sre.google/en//static/pdf/IncidentMeticsInSre.
pdf
21CS1906 STREAM PROCESSING L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
Introduce Data Processing terminology, definition & concepts
Define different types of Data Processing
Explain the concepts of Real-time Data processing
Select appropriate structures for designing and running real-time data
services in a business environment
Illustrate the benefits and drive the adoption of real-time data services to
solve real world problems
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand data Processing terminology, definition & concepts
2. Understand the applicability and utility of different streaming algorithms.
3. Describe and apply current research trends in data-stream processing.
4. Analyze the suitability of stream mining algorithms for data stream systems.
5. Program and build stream processing systems, services and applications.
6. Solve problems in real-world applications that process data streams.
TEXT BOOKS:
1. Streaming Systems: The What, Where, When and How of Large-Scale Data
Processing by Tyler Akidau, Slava Chemyak, Reuven Lax, O‘Reilly
publication,2018
2. Designing Data-Intensive Applications by Martin Kleppmann, O‘Reilly
Media,2017
3. Practical Real-time Data Processing and Analytics : Distributed Computing
and Event Processing using Apache Spark, Flink, Storm and Kafka, Packt
Publishing,2017
REFERENCES:
1. https://spark.apache.org/docs/latest/streaming-programming-guide.html
2. Kafka.apache.org
DEVOPS L T P C
21IT1906
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To introduce DevOps terminology, definition & concepts
To understand the different Version control tools like Git, Mercurial
To understand the concepts of Continuous Integration/ Continuous Testing/
Continuous Deployment)
To understand Configuration management using Ansible
Illustrate the benefits and drive the adoption of cloud-based Devops tools to
solve real world problems
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand different actions performed through Version control tools like Git.
2. Understand the various installation procedure of SDK
3. Ability to Perform Automated Continuous Deployment
4. Perform Continuous Integration and Continuous Testing and Continuous
Deployment using Jenkins by building and automating test cases using
Maven & Gradle.
5. Ability to do configuration management using Ansible
6. Understand to leverage Cloud-based DevOps tools using Azure DevOps
TEXT BOOKS:
1. Roberto Vormittag, ―A Practical Guide to Git and GitHub for Windows Users:
From Beginner to Expert in Easy Step-By-Step Exercises‖, Second Edition,
Kindle Edition, 2016.
2. Jason Cannon, ―Linux for Beginners: An Introduction to the Linux Operating
System and Command Line‖, Kindle Edition, 2014
REFERENCES:
1. Hands-On Azure Devops: Cicd Implementation For Mobile, Hybrid, And Web
Applications Using Azure Devops And Microsoft Azure: CICD
Implementation for ... DevOps and Microsoft Azure (English Edition)
Paperback – 1 January 2020 by Mitesh Soni
2. Jeff Geerling, ―Ansible for DevOps: Server and configuration management
for humans‖, First Edition, 2015
3. David Johnson, ―Ansible for DevOps: Everything You Need to Know to Use
Ansible for DevOps‖, Second Edition, 2016.
4. Mariot Tsitoara, ―Ansible 6. Beginning Git and GitHub: A Comprehensive
Guide to Version Control, Project Management, and Teamwork for the New
Developer‖, Second Edition, 2019.
5. https://www.jenkins.io/user-handbook.pdf
6. https://maven.apache.org/guides/getting-started/
21CS1907 SECURITY AND PRIVACY IN CLOUD L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To introduce Cloud Computing terminology, definition & concepts
To understand the security design and architectural considerations for
Cloud
To understand the Identity, Access control in Cloud
To follow best practices for Cloud security using various design patterns
To be able to monitor and audit cloud applications for security
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand the cloud concepts and fundamentals.
2. Explain the security challenges in the cloud.
3. Define cloud policy and Identity and Access Management.
4. Design cloud security patterns
5. Understand various risks and audit and monitoring mechanisms in the
cloud.
6. Define the various architectural and design considerations for security in the
cloud.
TEXT BOOKS:
1. Raj Kumar Buyya , James Broberg, andrzejGoscinski, ―Cloud Computing:‖,
Wiley 2013
2. Dave shackleford, ―Virtualization Security‖, SYBEX a wiley Brand 2013.
3. Mather, Kumaraswamy and Latif, ―Cloud Security and Privacy‖, OREILLY
2011
REFERENCES:
1. Mark C. Chu-Carroll ―Code in the Cloud‖,CRC Press, 2011
2. Mastering Cloud Computing Foundations and Applications Programming
RajkumarBuyya, Christian Vechhiola, S. ThamaraiSelvi,2013
VERTICAL IV: CYBER SECURITY AND DATA PRIVACY
L T P C
21IT1908 ETHICAL HACKING 3 0 0 3
Access Control Lists -- Cisco Adaptive Security Appliance Firewall Configuration and
Risk Analysis Tools for Firewalls and Routers Intrusion Detection and Prevention
Systems - Network- Based and Host-Based IDSs and IPSs - Web Filtering Security
Incident Response Teams – Honeypots.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. To express knowledge on basics of computer based vulnerabilities
2. To gain understanding on different foot printing, reconnaissance and scanning
methods.
3. To demonstrate the enumeration and vulnerability analysis methods
4. To gain knowledge on hacking options available in Web and wireless
applications
5. To acquire knowledge on the options for network protection.
6. To use tools to perform ethical hacking to expose the vulnerabilities
TEXT BOOKS:
1. Michael T. Simpson, Kent Backman, and James E. Corley, Hands-On
Ethical Hacking and Network Defense, Course Technology, Delmar
Cengage Learning, 2010.
2. The Basics of Hacking and Penetration Testing - Patrick
Engebretson, SYNGRESS, Elsevier, 2013.
3. The Web Application Hacker‘s Handbook: Finding and Exploiting
Security Flaws, DafyddStuttard and Marcus Pinto, 2011.
REFERENCES:
1. 1.Black Hat Python: Python Programming for Hackers and Pentesters, Justin
Seitz , 2014.
L T P C
21IT1909 DIGITAL AND MOBILE FORENSICS 3 0 0 3
TEXT BOOKS:
1. Peter Mika, Social Networks and the Semantic Web, First Edition, Springer
2007.
2. BorkoFurht, Handbook of Social Network Technologies and
Application, First Edition, Springer, 2010.
3. Learning Neo4j 3.x Second Edition By Jérôme Baton, Rik Van
Bruggen, Packt publishing, 2017
4. David Easley, Jon Kleinberg, Networks, Crowds, and Markets:
Reasoning about a Highly Connected World‖, First Edition,
Cambridge University Press, 2010.
REFERENCES:
1. Easley D. Kleinberg J., Networks, Crowds, and Markets – Reasoning about a
Highly Connected World‖, Cambridge University Press, 2010.
2. Jackson, Matthew O., Social and Economic Networks‖, Princeton University
Press, 2008.
3. GuandongXu ,Yanchun Zhang and Lin Li, ―Web Mining and Social
Networking – Techniques and applications‖, First Edition, Springer, 2011.
4. Dion Goh and Schubert Foo, Social information Retrieval Systems: Emerging
Technologies and Applications for Searching the Web Effectively‖, IGI Global
Snippet, 2008.
5. Max Chevalier, Christine Julien and Chantal Soulé-Dupuy, Collaborative and
Social Information Retrieval and Access: Techniques for Improved user
Modeling‖, IGI Global Snippet, 2009.
6. John G. Breslin, Alexander Passant and Stefan Decker, The Social Semantic
Web‖, Springer, 2009.
L T P C
21IT1911 MODERN CRYPTOGRAPHY 3 0 0 3
Left or Right Security (LOR). Formal Definition of Weak and Strong MACs, Using a
PRF as a MAC, Variable length MAC. Public Key Signature Schemes: Formal
Definitions, Signing and Verification, Formal Proofs of Security of Full Domain
Hashing. Assumptions for Public Key Signature Schemes:One-way functions Imply
Secure One-time Signatures. Shamir's Secret Sharing Scheme. FormallyAnalyzing
Cryptographic Protocols. Zero Knowledge Proofs and Protocols.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Interpret the basic principles of cryptography and general cryptanalysis.
2. Determine the concepts of symmetric encryption and authenticatio
3. Identify the use of public key encryption, digital signatures, and key
establishment.
4. Articulate the cryptographic algorithms to compose, build and analyze simple
cryptographic solutions.
5. Express the use of Message Authentication Codes.
6. Identify the modern cryptographic methods in implementing a closed network
with authentication
TEXT BOOKS:
1. Hans Delfs and Helmut Knebl, Introduction to Cryptography: Principles and
Applications,Springer Verlag, 2002.
2. Wenbo Mao, Modern Cryptography, Theory and Practice, Pearson Education
(Low PricedEdition), 2016.
3. Introduction to Modern Cryptography: Principles and Protocols (Chapman &
Hall/CRCCryptography and Network Security Series), 2007
REFERENCES:
1. ShaffiGoldwasser and MihirBellare, Lecture Notes on Cryptography, Available
athttp://citeseerx.ist.psu.edu/.
2. OdedGoldreich, Foundations of Cryptography, CRC Press (Low Priced
EditionAvailable),Part 1 and Part 23, 2009.
3. William Stallings, ―Cryptography and Network Security: Principles and
Practice‖, PHI 3rdEdition, 2006
L T P C
21IT1912 ENGINEERING SECURE SOFTWARE SYSTEMS 3 0 0 3
TOTAL:45PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Identify various vulnerabilities related to memory attacks.
2. Apply security principles in software development.
3. Evaluate the extent of risks.
4. Involve selection of testing techniques related to software security in the
testingphase of software development.
5. Use tools for securing software.
6. Justify the adopted security testing in the created application
TEXTBOOKS:
1. Julia H. Allen, ―Software Security Engineering‖, Pearson Education, 2008
2. Evan Wheeler, ―Security Risk Management: Building an Information Security
Risk Management Program from the Ground Up‖, First edition, Syngress
Publishing, 2011
3. Chris Wysopal, Lucas Nelson, Dino Dai Zovi, and Elfriede Dustin, ―The Art of
Software Security Testing: Identifying Software Security Flaws (Symantec
Press)‖, Addison-Wesley Professional,2006
REFERENCES:
1. Robert C. Seacord, ―Secure Coding in C and C++ (SEI Series in
Software Engineering)‖, Addison-Wesley Professional, 2005.
2. Jon Erickson, ―Hacking: The Art of Exploitation‖, 2nd Edition, No Starch Press,
2008.
3. Mike Shema, ―Hacking Web Apps: Detecting and Preventing Web
Application Security Problems‖, First edition, Syngress Publishing, 2012
A basic crypto currency, Creation of coins, Payments and double spending, FORTH
– the precursor for Bitcoin scripting, Bitcoin Scripts , Bitcoin P2P Network,
Transaction in Bitcoin Network, Block Mining, Block propagation and block relay
Bitcoin Consensus, Proof of Work (PoW)- Hashcash PoW , Bitcoin PoW, Attacks on
PoW ,monopolyproblem- Proof of Stake- Proof of Burn - Proof of Elapsed Time --
Bitcoin Miner, Mining Difficulty, Mining Pool-Permissioned model and use cases.
Smart contracts, Truffle Design and issue- DApps- NFT. Blockchain Applications in
Supply Chain Management, Logistics, Smart Cities, Finance and Banking,
Insurance,etc- Case Study.
TOTAL:45PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand emerging abstract models for Blockchain Technology
2. Identify major research challenges and technical gaps existing between theory
and practicein the crypto currency domain.
3. Understand the function of Blockchain as a method of securingdistributed
ledgers, howconsensus on their contents is achieved, and the new applications
that they enable.
4. Apply hyperledger Fabric and Ethereum platform to implement the Block chain
Application.
5. Apply security features in blockchain technologies.
6. Be familiar with existing and potential applications of blockchain technology
TEXTBOOKS:
1. Bashir and Imran, Mastering Blockchain: Deeper insights into
decentralization, cryptography,Bitcoin, and popular Blockchain
frameworks, 2017.
2. Andreas Antonopoulos, ―Mastering Bitcoin: Unlocking Digital
Cryptocurrencies‖,O‘Reilly, 2014.
REFERENCES:
1. Daniel Drescher, ―Blockchain Basics‖, First Edition, Apress, 2017.
CPS vulnerabilities, threats, attacks & failures, CPS security threats, CPS
vulnerabilities, Cyberphysical system attacks, CPS failures, Evaluating risks, Securing
CPS, CPS security challenges, CPS security solutions, CPS forensics, Limitations,
CPS protection recommendations
TOTAL:45PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand the core principles behind CPS.
2. Identify safety specifications and critical properties.
3. Understand abstraction in system designs.
4. Express pre and post conditions and invariants for CPS models.
5. Identify CPS security threats and do the software analysis.
6. Justify the basic security measures in Cyber-Physical Systems ensuring
security technologies
TEXTBOOKS:
1. Raj Rajkumar, Dionisio De Niz , and Mark Klein, Cyber-Physical Systems,
Addison-Wesley Professional, 2017.
2. Rajeev Alur, Principles of Cyber-Physical Systems, MIT Press, 2015.
REFERENCES:
1. André Platzer, Logical Analysis of Hybrid Systems: Proving Theorems for
Complex Dynamics., Springer, 2010. 426 pages,ISBN 978-3-642-14508-7.
4. Sajal Das, Krishna Kant, and Nan Zhang, ―Handbook on Securing Cyber-
Physical CriticalInfrastructure – Foundations & Challenges‖, Morgan
Kaufmann, 2012.
5. Awad, A.I., Furnell, S., Paprzycki, M., Sharma, S.K., Security in Cyber-
Physical Systems Foundations and Applications, Springer International
Publishing, 2021
L T P C
21CS1907 SECURITY AND PRIVACY IN CLOUD 3 0 0 3
TEXTBOOKS:
1. Raj Kumar Buyya , James Broberg, andrzejGoscinski, ―Cloud Computing:‖,
Wiley 2013
2. Dave shackleford, ―Virtualization Security, SYBEX a wiley Brand 2013.
3. Mather, Kumaraswamy and Latif, ―Cloud Security and Privacy‖, OREILLY 2011
REFERENCES:
1. Mark C. Chu-Carroll ―Code in the Cloud‖,CRC Press, 2011
UNIT - I INTRODUCTION 9
Introduction to Virtual Reality and Augmented Reality – Definition – Introduction to
Trajectories and Hybrid Space-Three I‘s of Virtual Reality – Virtual Reality Vs 3D
Computer Graphics – Benefits of Virtual Reality – Components of VR System –
Introduction to AR-AR Technologies-Input Devices – 3D Position Trackers – Types
of Trackers – Navigation and Manipulation Interfaces – Gesture Interfaces – Types
of Gesture Input Devices – Output Devices – Graphics Display – Human Visual
System – Personal Graphics Displays – Large Volume Displays – Sound Displays –
Human Auditory System.
UNIT - II VR MODELING 9
Modeling – Geometric Modeling – Virtual Object Shape – Object Visual Appearance
– Kinematics Modeling – Transformation Matrices – Object Position –
Transformation Invariants –Object Hierarchies – Viewing the 3D World – Physical
Modeling – Collision Detection – Surface Deformation – Force Computation – Force
Smoothing and Mapping – Behavior Modeling – Model Management.
OUTCOMES:
Upon completion of the course, the students will be able to:
1. Understand the basic concepts of AR and VR
2. Understand the tools and technologies related to AR/VR
3. Understand the graphical processing units and their architectures.
4. Know the working principle of AR/VR related Sensor devices
5. Design of various models using modeling techniques
6. Develop AR/VR applications in different domains
TEXT BOOKS:
1. Charles Palmer, John Williamson, ―Virtual Reality Blueprints: Create
compelling VR experiences for mobile‖, Packt Publisher, 2018
2. Dieter Schmalstieg, Tobias Hollerer, ―Augmented Reality: Principles &
Practice‖, Addison Wesley, 2016
REFERENCES:
1. John Vince, ―Introduction to Virtual Reality‖, Springer-Verlag, 2004.
2. William R. Sherman, Alan B. Craig: Understanding Virtual Reality – Interface,
Application, Design‖, Morgan Kaufmann, 2003.
21CS1909 MULTIMEDIA AND ANIMATION L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To grasp the fundamental knowledge of Multimedia elements and systems
To get familiar with Multimedia file formats and standards
To learn the process of Authoring multimedia presentations
To learn the techniques of animation in 2D and 3D and for the mobile UI
To explore different popular applications of multimedia
TOTAL: 45 PERIODS
OUTCOMES: Upon completion of the course, the students will be able to:
1. Get the bigger picture of the context of Multimedia and its applications
2. Use the different types of media elements of different formats on content
pages
3. Author 2D and 3D creative and interactive presentations for different target
multimedia applications.
4. Use different standard animation techniques for 2D, 21/2 D, 3D applications
for the mobile UI
5. Explore different popular applications of multimedia
6. Understand the complexity of multimedia applications in the context of cloud,
security, bigdata streaming, social networking, CBIR etc.,
TEXT BOOKS:
1. Ze-Nian Li, Mark S. Drew, Jiangchuan Liu, Fundamentals of Multimedia‖,
Third Edition, Springer Texts in Computer Science, 2021.
REFERENCES:
1. John M Blain, The Complete Guide to Blender Graphics: Computer Modeling
& Animation, CRC press, 3rd Edition, 2016.
2. Gerald Friedland, Ramesh Jain, ―Multimedia Computing‖, Cambridge
University Press, 2018.
3. Prabhat K.Andleigh, Kiran Thakrar, ―Multimedia System
Design‖, Pearson Education, 1st Edition, 2015.
4. Mohsen Amini Salehi, Xiangbo Li, ―Multimedia Cloud Computing Systems‖,
Springer Nature, 1st Edition, 2021.
5. Mark Gaimbruno, ―3D Graphics and Animation‖, Second Edition, New
Riders, 2002.
6. Rogers David, ―Animation: Master – A Complete Guide (Graphics Series)‖,
Charles River Media, 2006.
7. Rick parent, ―Computer Animation: Algorithms and Techniques‖, Morgan
Kauffman, 3rd
Edition, 2012.
8. Emilio Rodriguez Martinez, Mireia Alegre Ruiz, ―UI Animations with Lottie
and After Effects: Create, render, and ship stunning After Effects animations
natively on mobile with React Native‖, Packt Publishing, 2022.
21CS1910 VIDEO CREATION AND EDITING L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To introduce the broad perspective of linear and nonlinear editing concepts.
To understand the concept of Storytelling styles.
To be familiar with audio and video recording.
To apply different media tools.
To learn and understand the concepts of AVID XPRESS DV 4.
UNIT - I FUNDAMENTALS 9
Evolution of filmmaking - linear editing - non-linear digital video--- Economy of
Expression risks associated with altering reality through editing.
UNIT - II STORYTELLING 9
Storytelling styles in a digital world through jump cuts, L-cuts, match cuts, cutaways,
dissolves, split edits - Consumer and pro NLE systems - digitizing images -
managing resolutions - mechanics of digital editing - pointer files media
management.
TOTAL: 45 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1. Compare the strengths and limitations of Nonlinear editing.
2. Identify the infrastructure and significance of storytelling.
3. Apply suitable methods for recording to CDs and VCDs.
4. Apply different media tools.
5. Address the core issues of advanced editing and training techniques.
6. Design and develop projects using AVID XPRESS DV 4
TEXT BOOKS:
1. Avid Xpress DV 4 User Guide, 2007.
2. Final Cut Pro 6 User Manual, 2004.
3. Keith Underdahl, ―Digital Video for Dummies‖, Third Edition, Dummy
Series, 2001.
4. Robert M. Goodman and Partick McGarth, ―Editing Digital Video: The
Complete Creative and Technical Guide‖, Digital Video and Audio,
McGraw – Hill 2003.
21IT1903 UI AND UX DESIGN L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To provide a sound knowledge in UI & UX
To understand the need for UI and UX
To understand the various Research Methods used in Design
To explore the various Tools used in UI & UX
Creating a wireframe and prototype
UNIT - I FOUNDATIONS OF DESIGN 9
UI vs. UX Design - Core Stages of Design Thinking - Divergent and Convergent
Thinking Brainstorming and Game storming Observational Empathy
TOTAL: 45 PERIODS
TEXT BOOKS:
1. Joel Marsh, ―UX for Beginners‖, O‘Reilly , 2022
2. Jon Yablonski, ―Laws of UX using Psychology to Design Better Product &
Services‖ O‘Reilly 2021
REFERENCES:
1. Jenifer Tidwell, Charles Brewer, Aynne Valencia, ―Designing Interface‖ 3 rd
Edition , O‘Reilly 2020
2. Steve Schoger, Adam Wathan ―Refactoring UI‖, 2018
3. Steve Krug, ―Don't Make Me Think, Revisited: A Commonsense Approach to
Web & Mobile‖, Third Edition, 2015
4. https://www.nngroup.com/articles/
5. https://www.interaction-design.org/literature.
21CS1911 DIGITAL MARKETING L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To examine and explore the role and importance ofdigital marketing in
today‘s rapidly changing business environment.
Focuses on how digital marketing can be utilized by organizations and how
its effectiveness can be measured.
TOTAL: 45 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1. Examine and explore the role and importance of digital marketing in today‘s
rapidly changing business environment.
2. To know the key elements of a digital marketing strategy.
3. Focuses on how digital marketing can be utilized by organizations
4. Study how the effectiveness of a digital marketing campaign can be
measured
5. Undertand social media marketing
6. Demonstrate advanced practical skills in common digital marketing tools
such as SEO, SEM, Social media and Blogs.
TEXT BOOKS:
1. Fundamentals of Digital Marketing by Puneet Singh Bhatia;Publisher:
Pearson Education; First edition , 2017;ISBN-10: 933258737X;ISBN-13: 978-
9332587373.
2. Digital Marketing by Vandana Ahuja ;Publisher: Oxford University Press,
2015, ISBN-10: 0199455449
3. Marketing 4.0: Moving from Traditional to Digital by Philip Kotler;Publisher:
Wiley; 1st edition, 2017; ISBN10: 9788126566938;ISBN 13:
9788126566938;ASIN: 8126566930.
4. Ryan, D.,2014, Understanding Digital Marketing: Marketing Strategies for
Engaging the Digital Generation, Kogan Page Limited,2014.
5. Barker, Barker, Bormann and Neher, Social Media Marketing: A Strategic
Approach,2E South-Western ,Cengage Learning,2017.
6. Pulizzi,J Beginner's Guide to Digital Marketing , Mcgraw Hill Education,2015.
21CS1912 VISUAL EFFECTS L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To get a basic idea on animation principles and techniques
To get exposure to CGI, color and light elements of VFX
To have a better understanding of basic special effects techniques
To have a knowledge of state of the art vfx techniques
To become familiar with popular compositing techniques
UNIT -V COMPOSITING 9
Compositing – chroma key, blue screen/green screen, background projection, alpha
compositing, deep image compositing, multiple exposure, matting, VFX tools -
Blender, Natron, GIMP.
TOTAL: 45 PERIODS
OUTCOMES
At the end of the course, the student will be able to:
1. Implement animation in 2D / 3D following the principles and techniques
2. Use CGI, color and light elements in VFX applications
3. Create special effects using any of the state of the art tools
4. Apply popular visual effects techniques using advanced tools
5. Use compositing tools for creating VFX for a variety of applications
6. Understand the state of the art vfx techniques
TEXT BOOKS:
1. Chris Roda, Real Time Visual Effects for the Technical Artist, CRC Press, 1st
Edition, 2022.
2. Steve Wright, Digital Compositing for film and video, Routledge, 4th Edition,
2017.
3. John Gress, Digital Visual Effects and Compositing, New Riders Press, 1st
Edition, 2014.
REFERENCES:
1. Jon Gress, ―Digital Visual Effects and Compositing‖, New Riders Press, 1st
Edition, 2014.
2. Robin Brinkman, The Art and Science of Digital Compositing: Techniques for
Visual Effects, Animation and Motion Graphics‖, Morgan Kauffman, 2008.
3. Luiz Velho, Bruno Madeira, ―Introduction to Visual Effects A Computational
Approach‖, Routledge, 2023.
4. Jasmine Katatikarn, Michael Tanzillo, ―Lighting for Animation: The art of
visual storytelling
, Routledge, 1st Edition, 2016.
5. Eran Dinur, ―The Complete guide to Photorealism, for Visual Effects,
Visualization
6. Jeffrey A. Okun, Susan Zwerman, Christopher McKittrick, ― The VES
Handbook of Visual Effects: Industry Standard VFX Practices and
Procedures‖, Third Edition, 2020.and Games‖, Routledge, 1st Edition, 2022.
7. https://www.blender.org/features/vfx/
8. https://natrongithub.github.io/
21CS1913 GAME DEVELOPMENT L T P C
3 0 0 3
OBJECTIVES : To impart Knowledge on the following topics:
To know the basics of 2D and 3D graphics for game development.
To know the stages of game development.
To understand the basics of a game engine.
To survey the gaming development environment and tool kits.
To learn and develop simple games using Pygame environment
REFERENCES:
1. Paul Craven, ―Python Arcade games‖, Apress Publishers,2016.
2. Jung Hyun Han, ―3D Graphics for Game Programming‖, Chapman and
Hall/CRC, 2011.
MULTIMEDIA DATA COMPRESSION AND L T P C
21CS1914
STORAGE 3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To understand the basics of compression techniques
To understand the categories of compression for text, image and video
To explore the modalities of text, image and video compression algorithms
To know about basics of consistency of data availability in storage devices
To understand the concepts of data streaming services
TOTAL: 45 PERIODS
OUTCOMES:
At the end of this course, the students will be able to:
1. Understand the basics of text, Image and Video compression
2. Understand the categories of compression for text, image and video
3. Understand the various compression algorithms for multimedia content
4. Explore the applications of various compression techniques
5. Explore knowledge on multimedia storage on disks
6. Understand scheduling methods for request streams
TEXT BOOKS:
1. Khalid Sayood, Introduction to Data Compression, Morgan Kaufmann Series
in Multimedia Information and Systems, 2018, 5th Edition.
2. Philip K.C.Tse, Multimedia Information Storage and Retrieval: Techniques and
Technologies, 2008
REFERENCES:
1. David Salomon, A concise introduction to data compression, 2008.
2. Lenald Best, Best‘s Guide to Live Stream Video Broadcasting, BCB Live
Teaching series, 2017.
3. Yun-Qing Shi, Image And Video Compression For Multimedia Engineering
Fundamentals Algorithms And Standards, Taylor& Francis,2019
4. Irina Bocharova, Compression for Multimedia, Cambridge University Press;
1st edition, 2009
VERTICAL VI: EMERGING TECHNOLOGIES
UNIT - I INTRODUCTION 9
Introduction to Virtual Reality and Augmented Reality – Definition – Introduction to
Trajectories and Hybrid Space-Three I‘s of Virtual Reality – Virtual Reality Vs 3D
Computer Graphics – Benefits of Virtual Reality – Components of VR System –
Introduction to AR-AR Technologies-Input Devices – 3D Position Trackers – Types
of Trackers – Navigation and Manipulation Interfaces – Gesture Interfaces – Types
of Gesture Input Devices – Output Devices – Graphics Display – Human Visual
System – Personal Graphics Displays – Large Volume Displays – Sound Displays –
Human Auditory System.
UNIT - II VR MODELING 9
Modeling – Geometric Modeling – Virtual Object Shape – Object Visual Appearance
– Kinematics Modeling – Transformation Matrices – Object Position –
Transformation Invariants –Object Hierarchies – Viewing the 3D World – Physical
Modeling – Collision Detection – Surface Deformation – Force Computation – Force
Smoothing and Mapping – Behavior Modeling – Model Management.
TOTAL: 45 PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to:
1. Understand the basic concepts of AR and VR
2. Understand the tools and technologies related to AR/VR
3. Understand the graphical processing units and their architectures.
4. Know the working principle of AR/VR related Sensor devices
5. Design of various models using modeling techniques
6. Develop AR/VR applications in different domains
TEXT BOOKS:
1. Charles Palmer, John Williamson, ―Virtual Reality Blueprints: Create
compelling VR experiences for mobile‖, Packt Publisher, 2018
2. Dieter Schmalstieg, Tobias Hollerer, ―Augmented Reality: Principles &
Practice‖, Addison Wesley, 2016
REFERENCES:
1. John Vince, ―Introduction to Virtual Reality‖, Springer-Verlag, 2004.
TOTAL: 45 PERIODS
OUTCOMES: At the end of this course, the students will be able to
1. Understand the basic concepts of Robotic Process Automation.
2. Enunciate the key distinctions between RPA and existing automation
techniques and platforms.
3. Use UiPath to design control flows and work flows for the target process
4. Implement recording, web scraping andprocess mining by automation
5. Use UIPath Studio to detect, and handle exceptions in automation processes
6. Implement and use Orchestrator for creation, monitoring, scheduling, and
controlling of automated bots and processes.
TEXT BOOKS:
1. Learning Robotic Process Automation: Create Software robots and automate
business processes with the leading RPA tool - UiPath by Alok Mani Tripathi,
Packt Publishing, 2018.
2. Tom Taulli , ―The Robotic Process Automation Handbook: A Guide to
Implementing RPA Systems‖, Apress publications, 2020.
REFERENCES:
1. Frank Casale (Author), Rebecca Dilla (Author), Heidi Jaynes (Author),
Lauren Livingston (Author), Introduction to Robotic Process Automation: a
Primer, Institute of Robotic Process Automation, Amazon Asia-Pacific
Holdings Private Limited, 2018
2. Richard Murdoch, Robotic Process Automation: Guide To Building Software
Robots, Automate Repetitive Tasks & Become An RPA Consultant, Amazon
Asia-Pacific Holdings Private Limited, 2018
3. A Gerardus Blokdyk, ―Robotic Process Automation Rpa A Complete Guide ―,
2020
21AD1918 NEURAL NETWORKS AND DEEP LEARNING L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To understand the basics in deep neural networks
To understand the basics of associative memory and unsupervised learning
networks
To apply CNN architectures of deep neural networks
To analyze the key computations underlying deep learning, then use them
to build and train deep neural networks for various tasks.
To apply autoencoders and generative models for suitable applications.
UNIT - I INTRODUCTION 9
Neural Networks-Application Scope of Neural Networks-Artificial Neural Network: An
Introduction- Evolution of Neural Networks-Basic Models of Artificial Neural Network-
Important Terminologies of ANNs-Supervised Learning Network.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Apply Convolution Neural Network for image processing.
2. Understand the basics of associative memory and unsupervised learning
networks.
3. Apply CNN and its variants for suitable applications.
4. Analyze the key computations underlying deep learning
5. Use the key computations to build and train deepneural networks for various
tasks.
6. Apply autoencoders and generative models for suitable applications.
TEXT BOOKS:
1. Ian Goodfellow, Yoshua Bengio, Aaron Courville, ―Deep Learning‖, MIT
Press, 2016.
2. Francois Chollet, ―Deep Learning with Python‖, Second Edition, Manning
Publications, 2021.
REFERENCES:
1. Aurélien Géron, ―Hands-On Machine Learning with Scikit-Learn and
TensorFlow‖, Oreilly, 2018.
2. Josh Patterson, Adam Gibson, ―Deep Learning: A Practitioner‘s Approach‖,
O‘Reilly Media, 2017.
3. Charu C. Aggarwal, ―Neural Networks and Deep Learning: A Textbook‖,
Springer International Publishing, 1st Edition, 2018.
4. Learn Keras for Deep Neural Networks, Jojo Moolayil, Apress,2018
5. Deep Learning Projects Using TensorFlow 2, Vinita Silaparasetty, Apress,
2020
6. Deep Learning with Python, François Chollet, Manning Shelter Island,2017.
7. S Rajasekaran, G A Vijayalakshmi Pai, ―Neural Networks, FuzzyLogic and
Genetic Algorithm, Synthesis and Applications‖, PHI Learning, 2017.
8. Pro Deep Learning with TensorFlow, Santanu Pattanayak, Apress,2017
9. James A Freeman, David M S Kapura, ―Neural Networks Algorithms,
Applications, and Programming Techniques‖, Addison Wesley, 2003.
CYBER SECURITY L T P C
21IT1915
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To learn cybercrime and cyber law.
To understand the cyber attacks and tools for mitigating them.
To understand information gathering.
To learn how to detect a cyber attack.
To learn how to prevent a cyber attack.
UNIT - I INTRODUCTION 9
Cyber Security – History of Internet – Impact of Internet – CIA Triad; Reason for
Cyber Crime – Need for Cyber Security – History of Cyber Crime; Cybercriminals –
Classification of Cybercrimes – A Global Perspective on Cyber Crimes; Cyber Laws
– The Indian IT Act – Cybercrime and Punishment.
TOTAL: 45 PERIODS
OUTCOMES: On successful completion of this course, the student will be able to
1. Explain the basics of cyber security, cyber crime and cyber law
2. Classify various types of attacks and learn the tools to launch the attacks
3. Apply various tools to perform information gathering
4. Apply intrusion techniques to detect intrusion
5. Apply intrusion prevention techniques to prevent intrusion
6. Design and explore the firewalls to defined networks
TEXT BOOKS:
1. Anand Shinde, ―Introduction to Cyber Security Guide to the World of Cyber
Security‖, Notion Press, 2021 (Unit 1)
2. Nina Godbole, Sunit Belapure, ―Cyber Security: Understanding Cyber
Crimes, Computer Forensics and Legal Perspectives‖, Wiley Publishers,
2011
3. https://owasp.org/www-project-top-ten/
REFERENCES:
1. David Kim, Michael G. Solomon, ―Fundamentals of Information Systems
Security‖, Jones & Bartlett Learning Publishers, 2013
2. Kimberly Graves, ―CEH Official Certified Ethical hacker Review Guide‖, Wiley
Publishers, 2007
3. Kimberly Graves, ―CEH Official Certified Ethical hacker Review Guide‖, Wiley
Publishers, 2007
4. William Stallings, Lawrie Brown, ―Computer Security Principles and Practice‖,
Third Edition, Pearson Education, 2015
5. Georgia Weidman, ―Penetration Testing: A Hands-On Introduction to
Hacking‖, No Starch Press, 2014 (Lab)
21CS1916 QUANTUM COMPUTING L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To know the background of classical computing and quantum computing.
To learn the fundamental concepts behind quantum computation.
To study the details of quantum mechanics and its relation to Computer
Science.
To gain knowledge about the basic hardware and mathematical models of
quantum computation.
To learn the basics of quantum information and the theory behind it.
TOTAL: 45 PERIODS
TEXT BOOKS:
1. Parag K Lala, Mc Graw Hill Education, ―Quantum Computing, A Beginners
Introduction‖, First edition, 2020.
2. Michael A. Nielsen, Issac L. Chuang, ―Quantum Computation and Quantum
Information‖, Tenth Edition, Cambridge University Press, 2010.
3. Chris Bernhardt, The MIT Press; Reprint edition, 2020, ―Quantum
Computingfor Everyone‖.
REFERENCES:
1. Scott Aaronson, ―Quantum Computing Since Democritus‖, Cambridge
University Press, 2013.
2. N. David Mermin, ―Quantum Computer Science: An Introduction‖, Cambridge
University Press, 2007.
21IT1913 CRYPTOCURRENCY AND BLOCKCHAIN L T P C
TECHNOLOGIES 3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To understand the basics of Blockchain
To learn Different protocols and consensus algorithms in Blockchain
To learn the Blockchain implementation frameworks
To understand the Blockchain Applications
To experiment the Hyperledger Fabric, Ethereum networks
TOTAL: 45 PERIODS
TEXT BOOKS:
1. Bashir and Imran, Mastering Blockchain: Deeper insights into
decentralization, cryptography, Bitcoin, and popular Blockchain frameworks,
2017.
2. 2.Andreas Antonopoulos, ―Mastering Bitcoin: Unlocking Digital
Cryptocurrencies‖, O‘Reilly, 2014.
REFERENCES:
1. Daniel Drescher, ―Blockchain Basics‖, First Edition, Apress, 2017.
2. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and
Steven Goldfeder. Bitcoin and cryptocurrency technologies: a
comprehensive introduction. Princeton University Press, 2016.
3. Melanie Swan, ―Blockchain: Blueprint for a New Economy‖, O‘Reilly, 2015
4. Ritesh Modi, ―Solidity Programming Essentials: A Beginner‘s Guide to Build
Smart Contracts for Ethereum and Blockchain‖, Packt Publishing, 2018.
5. Handbook of Research on Blockchain Technology, published by Elsevier Inc.
ISBN: 9780128198162, 2020.
21CS1913 GAME DEVELOPMENT L T P C
3 0 0 3
OBJECTIVES : To impart Knowledge on the following topics:
To know the basics of 2D and 3D graphics for game development.
To know the stages of game development.
To understand the basics of a game engine.
To survey the gaming development environment and tool kits.
To learn and develop simple games using Pygame environment
TOTAL: 45 PERIODS
TEXT BOOKS:
1. Sanjay Madhav, ―Game Programming Algorithms and Techniques: A
Platform Agnostic Approach‖, Addison Wesley,2013.
2. David H. Eberly, ―3D Game Engine Design: A Practical Approach to Real-
Time Computer Graphics‖, Second Edition, CRC Press,2006.
3. Will McGugan, ―Beginning Game Development with Python and Pygame:
From Novice to Professional‖, Apress,2007.
REFERENCES:
1. Paul Craven, ―Python Arcade games‖, Apress Publishers,2016.
2. Jung Hyun Han, ―3D Graphics for Game Programming‖, Chapman
and Hall/CRC, 2011.
21CS1917 3D PRINTING AND DESIGN L T P C
3 0 0 3
OBJECTIVES: To impart Knowledge on the following topics:
To discuss on basics of 3D printing
To explain the principles of 3D printing technique
To explain and illustrate inkjet technology
To explain and illustrate laser technology
To discuss the applications of 3D printing
UNIT - I INTRODUCTION 9
Introduction; Design considerations – Material, Size, Resolution, Process; Modelling
and viewing 3D; Scanning; Model preparation – Digital; Slicing; Software; File
formats
TOTAL: 45 PERIODS
OUTCOMES: At the end of this course, the students will be able to:
1. Outline and examine the basic concepts of 3D printing technology
2. Explain the principles of 3D printing technique
3. Outline 3D printing workflow
4. Explain and categorize the concepts and working principles of 3D printing
using inkjet technique
5. Explain and categorize the working principles of 3D printing using laser
technique
6. Explain various method for designing and modeling for industrial applications
TEXT BOOKS:
1. Christopher Barnatt, 3D Printing: The Next Industrial Revolution,
CreateSpace Independent Publishing Platform, 2013.
2. Ian M. Hutchings, Graham D. Martin, Inkjet Technology for Digital
Fabrication, John Wiley & Sons, 2013.
REFERENCES:
1. Chua, C.K., Leong K.F. and Lim C.S., Rapid prototyping: Principles and
applications, second edition, World Scientific Publishers, 2010
2. Ibrahim Zeid, Mastering CAD CAM Tata McGraw-Hill Publishing Co., 2007
3. Joan Horvath, Mastering 3D Printing, APress, 2014
VERTICAL V WIRELESS NETWORKS AND IOT
L T P C
21EC1929 WIRELESS NETWORKS 3 0 0 3
OBJECTIVES:
● To understand the concept about Wireless networks, protocol stack and
standards.
● To understand and analyze the network layer solutions for Wireless
networks.
● To study about fundamentals of 3G Services, its protocols and applications.
● To have in depth knowledge on internetworking of WLAN and WWAN.
● To learn about evolution of 4G Networks, its architecture and applications.
158
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand the key concepts of wireless networks, standards, technologies
and their basic operations.
2. Analyze the network layer solutions for wireless networks.
3. Familiarize with the fundamentals of 3G Services, its protocols and
applications.
4. Acquainted with in depth knowledge on internetworking of WLAN and
WWAN.
5. Learn about evolution of 4G Networks, its architecture and applications.
6. Implement different type of applications for smart phones and mobile devices
with latest network strategies.
TEXT BOOKS:
1. Jochen Schiller, “Mobile Communication”, Second Edition, Pearson
Education 2012.
2. Vijay Garg, “Wireless Communications and networking”, First Edition,
Elsevier 2007.
REFERENCES:
1. Erik Dahlman, Stefan Parkvall, Johan Skold and Per Beming, "3G Evolution
HSPA and LTE for Mobile Broadband‖, Second Edition, Academic Press,
2008.
2. Anurag Kumar, D.Manjunath, Joy kuri, “Wireless Networking”, First Edition,
Elsevier 2011.
3. Simon Haykin, Michael Moher, David Koilpillai, ―Modern Wireless
Communications‖, First Edition, Pearson Education 2013.
159
L T P C
21EC1930 AD-HOC AND WIRELESS SENSOR NETWORKS 3 0 0 3
OBJECTIVES:
● To learn Ad hoc network and Sensor Network fundamentals.
● To understand the different routing protocols.
● To have an in-depth knowledge on sensor network architecture and design
issues.
● To understand the transport layer and security issues possible in Ad hoc
networks.
● To understand the transport layer and security issues possible in Sensor
networks.
● To have an exposure to mote programming platforms and tools.
160
UNIT - V SENSOR NETWORK PLATFORMS AND TOOLS 9
Sensor Node Hardware – Berkeley Motes, Programming Challenges, Node-level
software platforms – TinyOS, nesC, CONTIKIOS, Node-level Simulators – NS2 and
its extension to sensor networks, COOJA, TOSSIM, Programming beyond individual
nodes – State centric programming.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Know the basics of Ad hoc networks and Wireless Sensor Networks.
2. Apply this knowledge to identify the suitable routing algorithm based on the
network and user requirement.
3. Apply the knowledge to identify appropriate physical and MAC layer
protocols
4. Understand the transport layer and security issues possible in Ad hoc and
sensor networks.
5. Be familiar with the OS used in Wireless Sensor Networks.
6. Gain knowledge to build basic modules.
TEXT BOOKS:
1. C. Siva Ram Murthy and B. S. Manoj, “Ad Hoc Wireless Networks
Architectures and Protocols”, Prentice Hall, PTR, 2004.
2. HolgerKarl , Andreas willig, “Protocol and Architecture for Wireless Sensor
Networks”, John wiley publication, Jan 2006.
REFERENCES:
1. Feng Zhao, Leonidas Guibas, “Wireless Sensor Networks: an information
processing approach”, Elsevier publication, 2004.
2. Charles E. Perkins, “Ad Hoc Networking”, Addison Wesley, 2000.
3. I.F. Akyildiz, W. Su, Sankarasubramaniam, E. Cayirci, “Wireless sensor
networks: a survey”, computer networks, Elsevier, 2002, 394 - 422.
161
COOPERATIVE COMMUNICATIONS AND L T P C
21EC1931
NETWORKING 3 0 0 3
OBJECTIVES:
● To introduce the key concepts of Cooperative communications protocols.
● To learn about the concepts of multi node Cooperative communications.
● To understand the concepts of differential modulations for various
cooperative communications.
● To bring out the concepts of cooperative networks.
● To present the application of cooperative networks in broadband
communication.
162
TEXT BOOKS:
1. K.j.Ray liu, Ahmed k.Sadek, weifeng Su and Andres kwasinski “Cooperative
Communications and Networking” Cambridge University Press, 2009.
REFERENCES:
1. Y.-W. Peter Hong , Wan-Jen Huang , C.-C. Jay Kuo., “Cooperative
Communications and Networking: Technologies and System Design”,Kindle
Edition, 2010.
2. Gerhard kramer, Ivana maric and Roy D, “Cooperative Communications
(Foundations and Trends in Networking)” , Ebook PDF, Kindle Edition, in
2006.
163
L T P C
21EC1932 IOT AND ITS APPLICATIONS 3 0 0 3
OBJECTIVES:
● To know the fundamentals of IoT.
● To bring the IoT perspective in thinking and building solutions using Arduino
and Raspberry pi.
● To provide overview of applications of IoT and relevant technologies.
● To explore various components of the Internet of things such as Sensors,
internetworking and cyber space.
● To be able to design and implement IoT circuits and solutions.
164
OUTCOMES:
On successful completion of the course student will be able to:
1. Articulate IoT sensing and actuation methods and physical design of IoT
systems.
2. Interpret the M2M architecture for IoT.
3. Relate architecture overview of IoT systems.
4. Infer knowledge on IoT reference architecture.
5. Memorize various application of domain specific IoT system.
6. Able to develop various projects related to IoT.
TEXT BOOKS:
1. Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis
Karnouskos, David Boyle, “From Machine-to-Machine to the Internet of
Things:Introduction to a New Age of Intelligence”, 1st Edition, Academic
Press, 2014.
2. Vijay Madisetti and Arshdeep Bahga, “Internet of Things (A Hands-
onApproach)”, 1st Edition, VPT, 2014.
REFERENCES:
1. Francis daCosta, “Rethinking the Internet of Things: A Scalable Approach to
Connecting Everything”, 1st Edition, Apress Publications, 2013
2. Cuno Pfister, “Getting Started with the Internet of Things”, O‟Reilly Media,
2011, ISBN: 978-1-4493- 9357-1
165
L T P C
21EC1933 IoT BASED SYSTEM DESIGN
3 0 0 3
OBJECTIVES:
● To understand Smart Objects and IoT Architectures.
● To learn about various IOT-related protocols.
● To build simple IoT Systems using Arduino and Raspberry Pi.
● To understand data analytics and cloud in the context of IoT.
● To develop IoT infrastructure for popular applications.
166
OUTCOMES:
On successful completion of the course student will be able to:
1. Gain the Knowledge of IoT devices.
2. Analyze various protocols for IoT.
3. Design a PoC of an IoT system using Rasperry Pi/Arduino.
4. Apply data analytics and use cloud offerings related to IoT.
5. Analyze applications of IoT in real time scenario.
6. Gain knowledge to build basic smart devices.
TEXT BOOKS:
1. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Rob Barton and
Jerome Henry, “IoT Fundamentals: Networking Technologies, Protocols and
Use Cases for Internet of Things”, Cisco Press, 2017.
2. Arshdeep Bahga, Vijay Madisetti, “Internet of Things – A hands-on
approach”, Universities Press, 2015.
3. Rajkamal, “Internet of Things: Architecture, Design Principles And
Applications”, McGraw Hill Higher Education, 2016
REFERENCES:
1. Olivier Hersent, David Boswarthick, Omar Elloumi , “The Internet of Things
– Key applications and Protocols”, Wiley, 2012.
2. Jan Ho¨ ller, Vlasios Tsiatsis , Catherine Mulligan, Stamatis , Karnouskos,
Stefan Avesand. David Boyle, "From Machine-to-Machine to the Internet of
Things - Introduction to a New Age of Intelligence", Elsevier, 2014.
3. Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds), “Architecting
the Internet of Things”, Springer, 2011.
4. Michael Margolis,” Arduino Cookbook, Recipes to Begin, Expand, and
Enhance Your Projects”, 2nd Edition, O'Reilly Media, 2011.
167
L T P C
21EC1934 INDUSTRIAL IOT 4.0 3 0 0 3
OBJECTIVES:
● To learn and understand the Importance of IIoT in industrial applications.
● To uunderstand the architecture and protocols of IIOT.
● To apply the IIoT concepts in building solutions to Industrial problems.
● To uunderstand the need of Industry 4.0.
● To learn and understand the Industry 4.0 real-world applications.
● To design and develop various industrial projects.
168
OUTCOMES:
On successful completion of the course student will be able to:
1. Apply M2M protocols for development of IIoT Applications.
2. Understand the elements of IIoT to build a total control plane in an Industrial
application.
3. Learn and understand the concept of IIOT architecture and protocols.
4. Build smart factory based on the concepts.
5. Build Industrial Applications.
6. Able to develop various industrial projects.
TEXT BOOKS:
1. Sudip Misra, Chandana Roy, Anandarup Mukherjee, " Introduction to
Industrial Internet of Things and Industry 4.0", 1st edition, CRC Publisher,
December 2020.
2. Industry 4.0: The Industrial Internet of Things Alasdair Gilchrist Publications:
Apress, 2016.
REFERENCES:
1. HakimaChaouchi, “ The Internet of Things Connecting Objects to the
Web”,Willy Publications, 2010.
2. Olivier Hersent, David Boswarthick, Omar Elloumi, “The Internet of Things:
Key Applications and Protocols”, ,2ndEdition, Willy Publications, 2010
3. Inside the Internet of Things (IoT), Deloitte University Press, 2016.
4. Ovidiu, Peter, “ Internet of Things-From Research and Innovation to Market
Deployment” River Publishers Series, 2014.
169
L T P C
21EC1935 WIRELESS SENSOR NETWORK DESIGN 3 0 0 3
OBJECTIVES:
● To understand the fundamentals of wireless sensor network
● To gain knowledge on the MAC and Routing Protocols of WSN
● To get exposed to 6LOWPAN technology
● To acquire knowledge on the protocols required for developing real time
applications using WSN and 6LOWPAN
● To gain knowledge about operating system related to WSN and 6LOWPAN
UNIT - I INTRODUCTION 9
Principle of Wireless Sensor Network Introduction to wireless sensor networks-
Challenges, Comparison with ad hoc network, Node architecture and Network
architecture, design principles, Service interfaces, Gateway, Short range radio
communication standards-IEEE 802.15.4, Zigbee and Bluetooth. Physical layer and
transceiver design considerations.
UNIT - IV APPLICATIONS 9
Design Issues, Protocol Paradigms end-to-end, Real time streaming and sessions,
Publish/subscribe, Web service paradigms, Common Protocols -Web service
protocols, MQ telemetry transport for sensor networks (MQTT-S), ZigBee compact
application protocol (CAP),Service discovery, Simple network management protocol
(SNMP), Real-time transport and sessions, Industry- Specific protocols.
UNIT - V TOOLS 9
TinyOS Introduction, NesC, Interfaces, modules, configuration, Programming in
TinyOS using NesC, TOSSIM, Contiki Structure, Communication Stack, Simulation
environment Cooja simulator, Programming.
TOTAL: 45 PERIODS
170
OUTCOMES:
On successful completion of the course student will be able to:
1. Design solutions for WSNs applications.
2. Develop efficient MAC and Routing Protocols.
3. Design solutions for 6LOWPAN applications.
4. Develop efficient layered protocols in 6LOWPAN.
5. Use Tiny OS and Contiki OS in WSNs applications.
6. Use 6LOWPAN applications.
REFERENCES:
1. Holger Karl , Andreas willig, “Protocol and Architecture for Wireless Sensor
Networks”, John Wiley Publication, 2006.
2. Anna Forster, “Introduction to Wireless Sensor Networks”, Wiley, 2017.
3. Zach Shelby Sensinode and Carsten Bormann, “6LoWPAN: The Wireless
Embedded Internet” John Wiley and Sons, Ltd, Publication, 2009.
4. Philip Levis, “TinyOS Programming”, 2006 –www.tinyos.net.
5. The Contiki Operating System.http://www.sics.se/contiki.
171
VERTICAL VII RADIO COMMUNICATION AND BROADBAND NETWORKS
L T P C
21EC1943 BROADBAND ACCESS TECHNOLOGIES
3 0 0 3
OBJECTIVES:
● To understand the various Access Technologies.
● To understand the functions of Digital Subscriber Lines.
● To comprehend operation of Cable Modem.
● To explore various Fiber Access Technologies.
● To comprehend the concepts of Broad Band Access.
186
OUTCOMES:
On successful completion of the course student will be able to:
1. Describe the various Access Technologies.
2. Identify the functions of Digital Subscriber Lines.
3. Apply operation of Cable Modem.
4. Analyze various Fiber Access Technologies.
5. Explain the concepts of Broad Band Access.
TEXT BOOKS:
1. Niel Ransom and Albert A. Azzam, “Broadband Access Technologies: ADSL,
VDSL Cable Modem, Fiber and LMDS”, McGraw Hill 1999.
2. Gilbert Held, “Next Generation Modems: A Professional Guide to DSL and
cable modems”, John Wiley & sons.
REFERENCES:
1. Walter J Woralski, “ADSL and DSL Technologies”, McGraw Hill computer
Communication series, 1998.
2. William Webb, “Introduction to Wireless Local Loop broadband and narrow
band system”, Artech House, 2000.
3. Martin P. Clarke, “Wireless Access Network: Fixed Wireless Access and
WLL network Design and operation”, John Wiley & Sons 2000.
187
L T P C
21EC1944 SOFTWARE DEFINED NETWORKS
3 0 0 3
OBJECTIVES:
● To understand the need for SDN and its data plane operations.
● To understand the functions of control plane.
● To comprehend the migration of networking functions to SDN environment.
● To explore various techniques of network function virtualization.
● To comprehend the concepts behind network virtualization.
188
OUTCOMES:
On successful completion of the course student will be able to:
1. Describe the motivation behind SDN and its data plane (K2).
2. Identify the functions of control plane (K3).
3. Apply SDN to networking applications (K3).
4. Apply various operations of network function virtualization.
5. Explain various use cases of SDN.
TEXT BOOKS:
1. William Stallings, “Foundations of Modern Networking: SDN, NFV, QoE, IoT
and Cloud”, Pearson Education, 1st Edition, 2015.
2. Thomas D Nadeau, Ken Gray, “SDN: Software Defined Networks”, O’Reilly
Media, 2013.
REFERENCES:
1. Fei Hu, “Network Innovation through OpenFlow and SDN: Principles and
Design”, 1st Edition, CRC Press, 2014.
2. Paul Goransson, Chuck Black Timothy Culver, “Software Defined Networks:
A Comprehensive Approach”, 2nd Edition, Morgan Kaufmann Press, 2016.
3. Oswald Coker, SiamakAzodolmolky, “Software-Defined Networking with
OpenFlow”, 2nd Edition, O’Reilly Media, 2017.
189
L T P C
21EC1945 COGNITIVE RADIO NETWORKS
3 0 0 3
OBJECTIVES:
● To understand the concepts of cognitive radio.
● To familiarize with Architecture of Cognitive Radio.
● To learn spectrum sensing and dynamic spectrum access.
● To acquaint the fundamentals of MAC & Network Layer Design in Cognitive
Radio.
● To introduce the Advancement in Cognitive Radio.
INTRODUCTION TO SOFTWARE-DEFINED RADIO AND
UNIT - I 9
COGNITIVE RADIO
Evolution of Software Defined Radio and Cognitive radio: goals, benefits, definitions,
architectures, relations with other radios, issues, enabling technologies, radio
frequency spectrum and regulations.
190
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand the concepts of cognitive radio.
2. Familiarize with Architecture of Cognitive Radio.
3. Learn spectrum sensing and dynamic spectrum access.
4. Compare MAC and network layer design for cognitive radio.
5. Discuss cognitive radio for Internet of Things and M2M technologies.
TEXT BOOKS:
1. Alexander M. Wyglinski, MaziarNekovee, Thomas Hou, “Cognitive
Radio Communications and Networks”, Academic Press, Elsevier, 2010.
2. Bruce Fette, “Cognitive Radio Technology”, Newnes, 2006.
REFERENCES:
1. Kwang-Cheng Chen, Ramjee Prasad, “Cognitive Radio Networks”, John
Wiley and Sons, 2009.
2. HuseyinArslan (Ed.), “Cognitive Radio, Software Defined Radio, and
Adaptive Wireless Systems, Springer, 2007.
3. S.Shanmugavel, M.A.Bhagyaveni, R.Kalidoss, “Cognitive Radio-An Enabler
for Internet of things”, River Publishers, 2017.
191
L T P C
21EC1946 WIRELESS BROAD BAND NETWORKS
3 0 0 3
OBJECTIVES:
To study the various network layer and transport layer protocols for wireless
● networks.
To study the architecture and interference mitigation techniques in 3G
● standards.
● To learn about 4G technologies and LTE-A in mobile cellular networks.
● To learn about the layer level functionalities in interconnecting networks.
● To study the emerging techniques in 5G network
UNIT - II 3G EVOLUTION 9
IMT-2000 - W-CDMA, CDMA 2000 radio & network components, network structure,
packet-data transport process flow, Channel Allocation, core network, interference-
mitigation techniques, UMTS-services, air interface, network architecture of 3GPP,
UTRAN – architecture, High Speed Packet Data-HSDPA, HSUPA.
192
UNIT - V 5G EVOLUTION 9
5G Roadmap - Pillars of 5G - 5G Architecture, The 5G internet - IoT and context
awareness - Networking reconfiguration and virtualization support - Mobility QoS
control - emerging approach for resource over provisioning, Small cells for 5G
mobile networks- capacity limits and achievable gains with densification - Mobile
data demand, Demand Vs Capacity, Small cell challenges, conclusion and future
directions.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Design and implement the various protocols in wireless networks.
2. Analyze the architecture of 3G network standards.
3. Analyze the difference of LTE-A network design from 4G standard.
4. Design the interconnecting network functionalities by layer level functions.
5. Explore the current generation (5G) network architecture.
TEXT BOOKS:
Kaveh Pahlavan, “Principles of wireless networks”, Prentice-Hall of India,
1.
2008.
Jonathan Rodriguez, "Fundamentals of 5G Mobile networks", John Wiley,
2.
2015.
REFERENCES:
1. Vijay K.Garg, “Wireless Network Evolution - 2G & 3G”. Prentice Hall, 2008.
Clint Smith,P.E, Dannel Collins, “3G Wireless Networks” Tata McGraw- Hill,
2.
2nd Edition, 2011.
SassanAhmadi, “LTE-Advanced – A practical systems approach to
3. understanding the 3GPP LTE Releases 10 and 11 radio access
technologies”, Elsevier, 2014.
193
L T P C
21EC1947 MASSIVE MIMO NETWORKS
3 0 0 3
OBJECTIVES:
● To gain knowledge about massive MIMO networks.
● To understand the massive MIMO propagation channels.
● To learn about channel estimation in single cell massive MIMO systems.
● To comprehend the channel estimation in and multicell massive MIMO
systems.
● To comprehend the concepts of massive MIMO deployment in the context of
single cell and multicell deployment.
194
UNIT - V CELL DEPLOYMENT IN MIMO 9
Single-Cell Deployment Example: Fixed Broadband Access in Rural Area, Multi-Cell
Deployment: Preliminaries and Algorithms, Multi-Cell Deployment Examples: Mobile
Access - Dense Urban.
TOTAL: 45 PERIODS
OUTCOMES:
On successful completion of the course student will be able to:
1. Understand and explain massive MIMO networks.
2. Analyze massive MIMO propagation channels and their capacity bounds.
3. Examine channel estimation techniques for single cell system.
4. Analyze channel estimation techniques for multi cell system.
5. Explain the concepts underlying the deployment of single and multicell
massive MIMO systems.
TEXT BOOKS:
1. Thomas L. Marzetta, Erik G. Larsson, Hong Yang, Hien Quoc Ngo,
“Fundamentals of Massive MIMO”, Cambridge University Press 2016.
2. Emil Björnson, Jakob Hoydis and Luca Sanguinetti (2017), “Massive MIMO
Networks: Spectral, Energy, and Hardware Efficiency”, Foundations and
Trends, Now, 2017.
REFERENCES:
1. Long Zhao, Hui Zhao, Kan Zheng, “Wei Xiang Massive MIMO in 5G
Networks: Selected Applications”, Springer 2018.
2. Leibo Liu, Guiqiang Peng, Shaojun Wei, “Massive MIMO Detection Algorithm
and VLSI Architecture”, Springer 2019.
3. Shahid Mumtaz, Jonathan Rodriguez, Linglong Dai, “mmWave Massive
MIMO A Paradigm for 5G”, Elsevier, 2017.
195
L T P C
21EC1948 5G AND BEYOND COMMUNICATION NETWORKS
3 0 0 3
OBJECTIVES:
● To get acquainted with the fundamentals of 5G networks.
● To study the processes associated with 5G architecture.
● To study spectrum sharing and spectrum trading.
● To learn the security features in 5G networks.
● To study the introduction of 6G system.
196
TEXT BOOKS:
1. Stephen Rommer, “5G Core networks: Powering Digitalization”, Academic
Press, 2019.
2. SaroVelrajan, “An Introduction to 5G Wireless Networks : Technology,
Concepts and Use cases”, First Edition, 2020.
REFERENCES:
1. Jyrki.Penttinen,“5G Simplified: ABCs of Advanced Mobile Communications”,
Copyrighted Material.
2. Wan Lee Anthony,” 5G system Design: An end to end Perspective”, Springer
Publications, 2019.
3. Z. Zhang, Y. Xiao, Z. Ma, M. Xiao, Z. Ding, X. Lei, G. K. Karagiannidis, and
P. Fan, “6G wireless networks: Vision, requirements, architecture, and key
technologies,” IEEE Vehicular Technology Magazine, vol. 14, pp. 28–41,
March 2019.
197
L T P C
21EC1949 PHOTONIC NETWORKS
3 0 0 3
OBJECTIVES:
● To introduce the relevance of Photonic Networks to the existing technology.
To enable the student to understand the importance of the infrastructure
● in photonic networks.
● To familiarize with the architectures and the protocol stack.
● To expose the student to the advances in networking and switching domains.
To enable the student to understand the network design and
● management.
198
OUTCOMES:
On successful completion of the course student will be able to:
1. To comprehend and appreciate the significance and role of Photonic
Networks in the present contemporary world.
2. To use the backbone infrastructure of photonic networks for our present
and future communication needs.
3. Discuss the architectures and the protocol stack in use.
4. Describe the advances and recent trends in the networking and switching
approaches.
5. Compare the differences in the design of data plane, control plane,
routing, switching, resource allocation methods, Network management
and protection methods in vogue.
TEXT BOOKS:
1. Rajiv Ramaswami and Kumar N. Sivarajan,"Optical Networks: A
Practical Perspective”, Harcourt Asia Pvt Ltd., 3rd Edition, 2004.
2. C. Siva Ram Moorthy and Mohan Gurusamy, "WDM Optical Networks:
Concept, Design and Algorithms", Prentice Hall of India, Ist Edition, 2002.
REFERENCES:
1. P.E. Green, Jr., "Fiber Optic Networks", Prentice Hall, NJ, 1993.
Biswanath Mukherjee, "Optical WDM Networks", Springer Series, 2006.
Martin P. Clarke, “Wireless Access Network: Fixed Wireless Access and
2.
WLL network Design and operation”, John Wiley & Sons 2000.
199