Bachelor of Technology Computer Science and Engineering 2020 2024
Bachelor of Technology Computer Science and Engineering 2020 2024
UNIVERSITY
THE TIMES GROTIP
(
Pro m Stru cture & Sv
-,r
Duration: 04 Years
Batch:2020-200.4
r.-)
Lvtz' Fl
afftr.,
Benneti University, Greater Noida I l4-J
(Establishod Uid6r Act 21 of Gott of Uflar Pradesh)
PIot No's 8,9, 10, 11, Tach Zone-ll
Greater Noida-201 310
Vision of the University:
To be a global leader in education, research, and innovation, empowering higher leaming
ecosystem
Empower all the members of the Bennett ecosystem and provide thought leadership,
focus on nation building and prepare our graduates to mov; with the Times.
Cultivate international partnerships and co aborations with academic institutions-
industry, and govemment organizations and provide a rigorous and innovative
education that equips students with the knowredge, skills, and ethical varues required
to excel in their careers.
Foster a culture of lifelong leaming, adaptability, and criticat thinking, ensuring
graduates are prepared to tackle emerging challenges in all academic
fields.
Drive interdisciplinary research and innovation, pushing trre boundaries of human
knowledge, addressing pressing global issues and solvingieal world problems.
Enhance a collaborative environment that encourages faculty and students to engage
) in
-
research, innovation, and entrepreneurship, creating a lasting impact on society.
Promote diversity, equity, and inclusion, ensuring that all individuals, regardless of
background, feel welcomed, respected, and empowered.
Prepare students to become globar citizens, capabre ofaddressing grobar cha[enges
and
contributing to the well-being of communities worldwide.
Provide a globally connected career services networking with graduate employers and
alumni-
Foster a strong sense of ethical responsibility in our graduates, emphasizing the
importance ofethical conduct, sustainability, and social impact in professional praitice.
Commit to ongoing assessment and improvement of our programs and invest in modem
infrastructure and advanced technology to support teaching, research, and innovation
adapting to the evolving needs of students, industries, and society.
Mission
Stetements
-
PEO Stfltemen
t MI M2 M3
PEOI I 2 I
PE02 ) 3 J
.,
PE03 3 I
PO2: Problem analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of mathematics,
natural sciences. and engineering sciences.
t:$, )
POS: Modem tool usage: Create. select, and apply appropriate techniques, resources, and
modem engineering and IT tools including prediction and modeling to complex engineering
activities with an understanding ofthe limitations.
PO6: The engineer and society: Apply reasoning informed by the contextual knowledge to
assess societal, health, safety, legal and cultural issues and the consequent responsibilities
relevant to the professional engineering practice.
PO7: Environment and sustainability: Understand the impact ofthe professional engineering
solutions in societal and environmental contexts, and demonstrate the knowledge of, and need
for sustainable development.
PO8: Ethics: Apply ethical principles and commit to professional ethics and responsibilities
and norms ofthe engineering practice.
POll: Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one's own work, as a member and
leader in a team, to manage projects and in multidisciplinary environments.
POl2: Life-long leaming: Recognize the need for, and have the preparation and ability to
) engage in independent and life-long leaming in the broadest context oftechnological change.
PSOI: Analyse a complex problem and propose its solution using various computer system
concepts.
PSO3: Foster the field of computing by taking a deep dive into its latest trends and going
through new research & development activities.
Mapping of POs/PSOs to PEOs:
ir !1,,
(J:;.i. r"
i,;r i'lciCa
I l., irr.l.sh)
Fiol l:':-.r r: .', r
, .l i Z-r-.rire-ll
C;reai.r I'i(r i, , i '
PEO Stetements
-
Program
Outcomeg t PEOT PE02 PE03
POI t 2
Po2 J
PO3 2 t
P(N J 1
B(X 3 2
) PrO6 ,,
PO7 2 2
PrOS ,
PO9 3 2
PO10 2
FOlr 2
POl2 2 3
PSIOl 3 2 I
PSO2 2 3 I
PSO3 ) J
)
*"{M
Benyfett University, Greater Noida
(Esta8ishsd Urder Act 24 of Gov! o1l Uttar Prads.h)
Plot No's 8, 9, 10, 11 , Tech Zone-ll
GEater Noida-201310
List of Courses:
Semester: I
S, No. Course Name Course Credit L T P
Code
1 Computational Thinking
ECSE I05L 5 2 I 4
and Programming
z Fundamentals of Electrical
and Electronics EECEIO5L 5 J I )
Engineering
) 5 Electromagnetics EPHYI05I- 3 2 0 2
6 Introduction to
ESEAl03P 2 2 0 0
Engineering
Total Credits 22 t5 3 8
Semester: II
S. No, Course Name Course Credit L T P
Code
I Object Orienled
ECSEI 06I, 5 3 0 4
Programming using Java
3 Discrete Mathematical
ECSE2O9L 4 3 I 0
Structures
5 Intro to Biological
EBTYI06L 3 2 0 2
Systems
6 Foundations of
CIEIOIL 3 3 0 0
Enlrepreneurship
7 Mechanics EPHYIOSL 3 2 0 2
Total Credits 26 l9 l0
{lr.k^,
geifi.,tt t I'iier:ily. Gr,.::ter Noica
(E !lillirl , .i 1., r,, ,r, : 1 1 rl li.!1-icch
(r: fJiirr Praiissh)
1 Information Management
ECSE2I I L 4 3 0 2
Systems
3 Microprocessors and
ECSE2ITL 4 3 0 2
Computer Architecture
.>
4 Probability and Statistics ECSE23I L 4 0
5 Specialization Core - I 4 -5 0 2
)
Totrl Credits l5 0 l6
Semester: IV
S. No. Course Name Course Credit L T P
Code
6 Specialization Core - II 4 3 0 z
7 Open Elective - I J J 0 0
Total Credits 26 l9 I t2
*For AI Specialization students CSET30I will run ln semester IV and
(Specializatlon Core-II+CSET208) will run in Semester V
R
Be University, Grearter Noida
(Establ ed UiT,l€rAcl 24 cfGi\'l, L:l Uila r Pradesh)
Plot No's B, 0, 10, 'i1, r'eclr Zone-ll
Greater Noida-20'1 :11 0
Semester: V
S. No. Course Name Course Credit L T P
Code
3 High Performance
Computing
CSET305 4 ) 0 2
7 ElectiYe - ll 3 2 0 7
Total Credits aa l3 t4
Semester: VI
S. No. Course Name Course Credit L T P
Code
? HSS - Elective 3 3 0 0
4 Specialization Elective - 3 2 0 2
III
5 Elective - IV 3 2 0 2
6 Open Elective - II 3 3 0 0
7 Opon Elective-lll 3 3 0 0
Total Credits t9 l6 I 4
rat
ne tt Universit y, Grea ter Noida
tablished UoderAct2,i oiGov,l, ot
Ultar Pradesh)
lot No' s 8, 9, 10, 11. Te ch Zone-il
G reater lloid:1,;, I 1 31 0
Semester: VII
S. No. Course Name Course Credit L T P
Code
2 Specialization Elective - J 2 0 2
VI
3 Open Elective - IV 3 3 0 0
4 Elective - V 3 2 0 2
Total Credits l4 7 0 l4
) OR
1 Professional Practical l4 U U 28
CSET498
Intemship
Semester: VIII
S. No. Course Nrme Course Crcdit L T P
Code
Total Credits t2 0 0 24
)
Specialization Core I and II
I Statistical Machine
ECSE219L
4 ) 0 2
Leaming
R
B enn UniversitY, Greater Noida
(Establis ed Under Act 24 of oovt. ofUtlar Pradesh)
Plot N o's 8, 9, 1 0, 11 , T. ech Zorre-ll
Greater Noida-?013'i0
4 Data Analysis using 4 3 0 2
ECSE225L
Python
4 3 0 7
8 cloud computing ECSE304L
Human Computer 4 3 0 2
9
ECsE233L
lnterfuce
4 3 0 2
t2 Blockchain Engineering csET226
4 0 4
t4 Data Mining and
CSET228
Predictive Modelling
4 3 0 2
t6 Devops Practices and
csET230
Principles
17 ProgramminB 4 , 0 2
) Methodologies for CSET231
Backend DeveloPment
t8 Design of Cloud 4 3 0 z
c5ET232
Architectural Solutions
Elective-I, III' V
Specialization Electives: Artificial Intelllgence
R
Ben University, Greater Noida
(Established Undsr Acl 24 of Govt of Uttar Prd6h)
Plot No's 8, 9, 10, 11, Te ch Zone-ll
Greater Noida-2O1310
Cou rse
S. No. Course Name Credit L T P
Code
Advanced Computer
1 Vision and Video CSET340 3 2 0 z
Analytics
4 AI in Healthcare CSET343 t 2 0 2
1 Blockchain Technologies:
CSET350
, 2 0 2
Platforms & Applications
R Tar
ter Noida
Utla r Frradesh)
oh Zone-it
5 Cyber Secudty with 3 2 0 2
CSET354
Blockchain
t0 Sp€cial Topics in J 2 0 2
CSET359
Blockchain
()
Specialization Electives: Cyber Security
Course
S. No. Course Name Crcdtt L T P
Code
Vulnerability Analysis in 2
) 6
Network Protoools
CSET362 J 2 0
Penetration Testing,
7 Auditing and Ethical CSET363 3 2 0 2
Hacking
Special Topics in 2 0 2
l0 lnformation Security
csET366 3
l1
Cloud Security and
CSET462 3 2 0 )
Compliances
.A
Regist
, Greater Noids
f Go!,t, of Uflar pradeshl
11 , Tech Zone-it
310
Specialization Electives: Data Science
S. No. Course Name Course Credit L T P
Code
2 Structural Equation 0 2
csET368
Modelling
8 Advanced Datsba$e 3 ) 0 2
CSET372
Management Syst€m
.,
9 Satellil€ Data Analysis csET373 3 2 0
)
Specialization Electives: Gaming and Virtual Reatity
Course
S. No. Course Name Credit L T P
Code
2 VR Gaming csET375 3 2 0 2
ist
n University, Grea ter Noida
hed Under Ac,t 24 of Govl of Utlar Pradesh)
ot No's 8, 9, 10, 11 , Te ch Zone-ll
Greater Noida-201 310
VR and 360 Mdeo 2
3 c5ET424 3 2 0
Production
specialTopics in AR and 2
6 csET428 3 2 0
VR
5 Software CraftsmanshiP in 2 0 2
CSET45I 3
DevOps
5 Software Containerization in 2 0
CSET452 3
DeYOps
*M*,
Ber/rlfit University, Greater Noida
(5s-tabli6hed UnderAct24 ot covt, of Uflar pradesh)
PIot No's 8, 9, 10, 1t, Tech Zone-il
Greater Noida-2013'10
? System Provisioning and
Configuration Management in CSET453 z 0 2
DevOps
CSET454 3 2 0 2
8 Test Automation in DevOPs
CSET456 3 0 2
10 Special Topics in DevOPs
2 Front-End Wcb UI
Frameworks and Tools: R€act CSET458 0 4
Native
3 Server-Side Development
CSET446 3 2 0 2
Frameworks: ExPress and
Spring
CSET46O 3 2 0 z
8 Special Topics in Full Stack
*".[yJl..
g.find{ University, Greater Noida
ml'*#u:'#a:.'i5g:ri#:']'
Greater Noida-201310
S. No. Course Name Course Credit L T P
Code
ful*.,
ge{y'ett ttn ivcrsity, creatnr f,icida
(E3ir:l,sh.Ij Und.rAct 2.1 c,.^x!i cl L,: rrr n,;.,. ,h)
Plot No's Ii, c, 10, 11 , lu;lr Zr:ne-il
Greater t'JoiJa-20 i 3.i 0
9 Embedded Systems csET327 3 2 0 2
16 Combinatorics csET331 2 0 2
19 Drone Applications,
csET468 3 2 0 2
Components and Assembly
22 Bioinformatics and
csET336 3 2 0 2
Computational Genomics
Re
Benn Unlversity, Greater Noi da
(Esta UnC eiA.ri 2,1t,i r:)uvt, oi l-lilirr pra.i. sh)
Plot o's B, 9, 1'1, 1J , 'icch zon e-ll
Greater Noi cia-20 i 31 0
,2 loT: Security and Attacks CSET42O 3 2 0 2
Semester V
L Hons-I J 2 0 2
)
HonsJI 2 0 2
2 Semester VI
3 Hons-IIl 3 2 0 2
Hons-IV J 2 0 2
4 Hons-IV 3 2 0 2
5 Hons-V 3 2 0 z
Hons-Yl 3 2 0 2
Totrl Credits l8 t2 0 l2
Semester III
Semester lV
2 lntroduction to Algorithm 4 4 0 0
c5ET292
Design and Development
R er
Be ett Universlty, Greater Noida
blished UnderAct 24 of Govt, ol Utlar Pradesh)
Plot No's 8, 9, 10, 11 , Te ch Zone-ll
Greater Noida-201310
Semester V
Semester VI
4 Applied Al CSET392 4 4 0 0
Total Credits t6 l6 0 0
R r
Be ett Universi ty, Greater Noida
(Esl ished
l.l nder/",.i 24 ofGovi. olt tlar pra desh)
Plot lrlo's B, :t, 10,11 :,-'lr Zon:-ll
Greater Noida-2o1.i 10
t7 Search Engine Optimiz:tion CSET489 3 ., 0 0
2t Advanced Industry
CSET49I 3 3 0 0
Certification
+The course CSET49I will be considered oquivalent to two open eloctive courses
HSS Electives
_)
S. No. Course Name Course Credlt L T P
Code
tln Special Circumstances Opon Electives can be run as General Electives and Vioe
Versa. Also, Specialization Electivss can be run as Goneral Elestives and Vice Ve$a
)
aw,",
Bepfiett University, Greater Noida
(Bl4[6h€d UrderAd 24 of Govl, ol t ttar PradsEh]
Plot No's 8, 9, 10, 't1. Tech Zone-ll
Greater Noida-2o13'10
)
Semester I
Reg rar
Be University, Greater Noida
(Establlshed Und.tAcl24 ol GovL oi U[ar Prad6sh)
Plot No's 8, 9, 10, 11 , Tech Zone-ll
Greater Noida-201310
Name of Program Bachelor of Technology (Computer ScieDce and En gineering)
ECSEIOSL Computalional Thinkinq & Programming L T P C
Owning School/Department Department of Computer Science E ngineering 2 4 5
Pre-req uisites/Exposure
COI: lmplement a given algorithm in python by using standard programming constructs such as,
repetitions, functions, modules, aggregated data (anays, Iists, etc.), etc.
co2: Explain the output of a given Python program and identif and correct errors in a given python
program.
co3: write simple programs using the features of object-oriented programming language such as,
encapsulation, polymorphism, inheritance, etc.fv
CO-PO/PSO Mappins
PO PO2 PO3 PO4 PO5 PO PO PO PO POI POr POI PSO PSO2 PS03
6 7 8 9 0 I 2 I
col 3 2 3 2 , 3
c02 2 3 3 3 2
c03 3 3 3 2 3 , 2
Course Contents:
,gdl,",
Eit[i,'.;f f;if$,#;*]i
The lab component of this courso is designed to introduce online-coding tools such as
Microsoft Azure, Colab to the students and provide hands-on experience with the concepts
taught in the lectures.
rt-@r
1. Dieftach C., lntrodaction to Computer Science lJsing PYTHON: A Cohtputational
Problem-solving Foclt: (1st ed.), Wiley,2015. ISBN 978-0470555156.
2. Kanetkar Yashwant, Let us Python (lst ed.), BPB Publishen,20l9, ISBN 978-9388511568.
Reference Books :
l. Downey Allen B, Think Python: How to Think Like a Computer Scientist (2nd ed.), O'Reilly' 2016'
tsBN 978-9352134755.
2. Brown Martin C., Python: TheCo plete Reference (4th ed.), McGraw-Hill, 2018. ISBN 978'
0072 1271 88.
Ass$sment Scheme:
)
Componcnts Intcrnol AssessmGnt Mid Term Exam End Exam Tot l
s r
eil University, Greater Noida
ished Under Acl 24 of Govt of Ullar Prad€sh)
lot No's 8, 9, 10, 11 , Te ch Zonc.ll
Greater Noida-201310
Name of Program Bachelor of Technology (Computer Science and Engineering)
EECEIOSL Fundamental of Electrical & Electronics L T P C
Engineering
Owning School./Department Department of Computer Science Engineering 3 2 5
Pre-req uisites/Exposure
COI : Analyse basic electrical circuits using f'undamental laws of circuit theory.
CO2: Apply network theorems to simplily and analyse basic electrical circuits.
CO3: Investigate the gain and cut-offfrequency ofthe passive filter circuit.
CO4: Deyelop an insight into the physics of a diode and its application in electronics circuits.
CO5: Construcl the knowledge of solid-state devices such as BJTs and MOSFET.
CO6: Convert numbers into different number systems, verify digital gates and simpliry Boolean
expressions.
CO-PO/PSO Mapoins
)
PO P02 PO3 PO4 PO5 PO PO PO PO POI POI POt PSO PS02 PS03
I 6 7 8 9 0 I 2 I
col 2 3 2 I 3
cc)2 t 2 3 3
c03 2 I 3 3
c04 3 2 I 2 2
,,
co5 3 2 I 3
c06 I a 3 , 3
Course Contents:
Basic Circuit Theory: Charge, current, voltage, electric field, conductance, resistance, Ohm's law;
current source, voltage source, dc, ac, periodic signal concept, examples of different periodic signals,
their average. RMS value. resistors in series and parallel, voltage and currentdivision. Kirchoff s current
law (KCL) and Kirchhoff s voltage law (KVL), Nodal analysis and Mesh analysis. Network theorems:
Thevenin's theorem, Norton's theorem, Maximum power transfer theorem, and Super?osition thgorem,
Wheatstone bridge. Introduction to the capacitor (C), introduction to phasor diagram, series and parallel
combination of capacitors, Impedance and ftequency dependency, lntroduction to the inductor (L),
intoduction to phasor diagram, series and parallel combination of inductors, Impedance and frequency
dependency, units of L, C measurements, series and parallel RLC circuits, resonance phenomenon. RL
and RC filter circuits (low pass, high pass), lransfer function.
The need ofthe transformer, Mutual inductance, self-inductance, coefficient of coupling, Basics of
voltage and current transformers, the equivalent circuit of the transformer, single- phase motors, dc
motors, stepper motors, induction motors and their applications.
R a(
Ben tt UniversitY, Greater Noida
Uttar Ptadesh)
(Es treri U nd€rAct 24 cl Go!'t, of
11, Te ch Zone-ll
PI ot No's B, 9, 1'J,
Greater l'J oida-201310
Module III: 16 lectures hours
Diodes and its applications, Semiconductor Materials: Classification ofmaterials based on energy-band
theory, crystal itiucture, elemental and compound semiconductors, electrons and holes, intrinsic and
extrinsic iemiconductors, doping for n and p-type semiconductors; Diode circuits: PN Junction diode
and its applications: Half wave, centre tapped full-wave rectifiel circuit, bridge rectifier circuit, the
efficiency of rectifier circuits, ripple factor, rectifiers with filter circuits. Zener diode, voltage
regulation. working of LED, working principle of a photovoltaic cell. Thlee-terminal device
ch-aracteristics (BJT and MOSFET): Introduction to bipolar junction transistor (BJT), working of BJT
as a switch, Structure of a MOSFET, working of a MOSFET, curent-voltage characteristics of a
MOSFET, MOSFET as a switch.
9. Clamper circuits
10. Design of voltage regulator using Zener diode (load regulation and line regulation)
Note: lt can be beneficial for a student to perform the simulation before commencing
thehardware.
Text Books :
1 . Boylestad Robert L., lntro(luctory Circuit Anolysis, Peqrson Education'
Reference Books :
l. Bobrow Leonard S, Foundations of Electricql Engineering Oxford Higher Education'
2. Neamen Donald, Microelectronics Circuit Andlysis ond Design, Tata McGraw Hill'
3. Bell David A., Electronic lnstrumenlation qnd Measurements, Oxford Higher Education
e ar
Be et i University, Greetcr Noida
(i-qlabiiiJrl"j lir.l-.r Ai.i 24 ( i GJVI .,1 Uiiar Pra.jesh)
-l-cch
Plot No l'- ti, 3, 10, 11, Zone-ll
Greater i.ioid.r-20 i 3i 0
AssessBent Schcme:
r
UniversitY, Greater Noida
ol covt d Utt8r Prdssh)
Tech Zone-l
1 1 , I
G€ater Noida-2o1310
Name of Program Bachelor of Technology (Computer Science and Engineering)
EHSSI03L New Age Life Skills L T P C
Owning SchooUDepartment Departm€nt of Computer Science Engineering 3 0 0 3
Pre-req u isites/Exposure
CO-PO/PSO Maopinq
PO PO2 PO3 Po'4 PO5 PO PO PO PO POI POr POI PSO PS02 PSO3
6 7 8 I 0 I 2 I
col 2 3 3 3 I I I
coz 3 2 3 3 3 3 3 I
cC)3 3 2 3 3 3 3 I
cC)4 3 2 3 3 3 3 3 I
cos 3 2 3 3 3 3 3 I
Course Contents:
/l ,
'lX4
.////
Rr:oisifl r
Pein(-tt Universilv. Gre?ter Noida
{Est.r-: 5.red Ull, " Acl 24;f Cc'n, oi Urtir PIsdesh)
irtot No's B, s, 1 0, 11 , Tech Zone-ll
Greater Noida-20'l 310
Module lV: 4lectures hours
Diagnostic Suryeys for Creative Problem Solving, Problem Solving, Creativity and lnnovation, Steps
in Analy,tical Problem Solving, Multiple Approaches to creativity, Conceptual Blocks, Case studies and
Practice Sessions.
:ir
Be etl Lliri';ct ;iiir, Grs:lter Noida
(F :i rll :lin.l rJi/ I.:i Aii :'1 .l ilc,ri, l:ri U(,rr pr.J:sh
Plr:t I'lo's 8, 9, '1..1, -il , Tech Zon3-ll
Gieaiei- Ll,:. le: llii.l 31 0
Text Bookr :
l. Whetten DafidA. and Kim S. Cameron, Developing Manageuent Skills (8th ed)' Pearsoa 2017
rsBN 9789i32584686, ISBN 9332584664.
2. l{adkm Alka, Life Skilk for Suecess (lst ed.), Sage Publicdtion$, 2016. ISBN 9789351507314,
tsBN 9351507319.
A$essment Scheme
Reg I
Ben Univers ity, Greater Noida
UnderAct 24 of Govt of Uttar Pradesh)
Plot No's 8, 9, 10, 11, Te ch Zone-ll
Greater Noida-2013'10
Name of Program Bachelor ofTechnology (Computer Science and En gineering)
EMATI Ol L Engineering Calculas I, T P C
Owning SchooUDepartment Department of Com puter Science Engineering 3 0 4
Pre-req uisites/Exposure
co- MaDDins
PO Po2 P03 Pc,4 PO5 PO PO PO PO POt POI POI PSO PS02 PSO3
) I 6 7 8 9 0 I 2 I
col 2 3 2 I 3
.,
co2 t 2 3 3
co3 , 2 3 3
cC)4 3 2 I ) 2
Course ontents:
T€xt ks:
*.wz
L'iflffi i{,:i":*hj,f$rf#}i
l. lleir Mqurice D. and Joel Hass, Thomas' Catcllus (l4th ed..1, pearson Education Indiq, 20l g
tsBN 978-935306041 t, |SBN 978935306041 I .
2. Ross K. A., Elenentory Analysis: The Theory ofCalcutus (2nd ed-), Springer, 2013. ISBN 97g-
1493901289, ISBN 978- t 161462705.
Referenc€ Books :
l. Ghorpade S.R and B. Y. Limrye, A Course in Calculus and Real Analysis, Springer-Verlag New
York, 2 006. ISBN 97 8-0387 305 30 l, IS BN 0 3 87 3 0 i 300.
2. Stey'drt James, Calculas (7th ed.), Brool.s Cole Cengage Learning 2012. ISBN 9\g013g497glZ,
ISBN 0538497815.
3 Bartle Robert C. and Donald R. Sherbert, Introduction to Real Analysis (4th ed), lfiley, 2014
lsBN 978-81265s 181 t, ISBN 812655 t 8 tX.
4. Kreyszig Erwin, Advanced Engineering Mathematics (t 1th ed.), Utilq,, 20t 0. ISBN g7g-
81265s4232, ISBN 81265542i 1.
Assessme t Scheme
)
Components Internal Assessment Mid Term Oxam End Exam Total
r
Be n ett Uni
(Establis hed versi ty, Grea
U nderAct ter Noida
PI ot No, SB,9 24 of Go!,1, of UIIaTP radesh)
G reater Ncid 10, 11, Te chzone-ll
a-201 310
Name of Program Bachelor of Technology (Computer Science and Engineerin e)
EPHYIO5L Electromagretics L T P c
Owning SchooUDepartment Department of Computer Science Engineering 2 0 2 3
Pre-req lrisites/Exposu re
COI: Calculate electroslatic fields and potentials, produced by regular shaped charged bodies.
CO2: To understand magnetic fields produced by variously shaped current carrying bodies.
co3: To appreciate the interconnectedness ofelectric and magnetic phenomena and to realize lhe
signifi cance of Maxwell's equations.
CO4: To understand how these equations lead to electromagnetic waves
co-Po/Ps O Maooins
PO Po2 PO3 Pc)4 PO5 PO PO PO PO POr POI POI PSO PSO2 PSO3
) 6 7 8 9 0 I 2 I
cor 2 ) I , 3
cc)2 2 2 2 2 3
co3 3 1 2 3 3
co4 3 3 3 3 3 3
Course Contents:
The course covers basic college level experiments on a wide range oftopics in physics.
I Determination of the radius of a current carrying coil using Biot savart law and a deflection
magnetometer.
,,.,w
E. t-,.fr.,. 11t.,, :r':..iiy, Gr. J l.ir Ncida
s' i-l -Jirii.r. (ti).,it ..i c,i iltl.rr lradesh)
lL
Picl l,.io'-" 8, !, 1 0, i 1 , rc .ir Zone-ll
Greate r l,jr:ida-2C 1310
2 To draw equipotential lines for a given set of electrodes in an electrolytic tank using a digital
multimeter.
3 Measurement of dielectric constants of given materials by using them as the dielectdc layers inside
capacitors.
4 To study ofthe hysteresis loop for a given ferromagnetic material on a cRo using a solenoid and to
calculate the coercivity, retentivity and saturation magnetization ofthe given material.
6 study Hall effect in an extrinsic semiconductor sample and determine the Hall coefficient and
density of majority charge caniers.
7 Determination ofthe refractive index ofglass and the Cauchy's constants \vith the help ofa prism
and spectrometer.
8 lnvestigation ofdifllaction phenomena using single slit, double slit, circular aperture and a He-Ne
laser source.
9 Determination ofthe specific rotation of linearly polarised light by sugar molecules using
polarim eter.
)
l0 Determination ofwavelength ofmonochromatic light using Newton's rings formed in an air-
film.
Text Books :
Grffiths David J., Introdaction to Electrodyn,mics (4th Edition), canbridge llniversity press,
2017, ISBN 978-t t08420419, ISBN t t08420419.
Reference Books :
l. Halliday D., R. Resnick & J. Walker, Fundament,ls of physics (6th Edition), Wiley lndia,2006,
ISBN 978-9754586329, ISBN I I2650823X.
2 Resnick, Hallidoy and Krane, Physics, Vol. I & 2, (5th Edition), Wiley Student Edition,2^07, ISBN
978-8 1 265 I 0887, tSBN 9788 I 265 I 0887.
Assessm t Scheme:
*M,^,
g,*",i"if .;,"'ffi 'r:['t:,],]]i
)
)
Semester II
..Milr
Benff6lt University, Greaier Noida
(Established LlnderAct 21r 0f co\,t, ol UtLar pradesh)
Plot No's B, 9, '10, 11 , -l-ech Zone-il
Greater Ncida-201 310
Name of Program Bachelor of Technology (Computer Science and Engineering)
ECSEI06L Object Oriented Programming using JAVA L T P C
Owning School/Department Department of Computer Science Engineering 3 0 4 5
Pre-req uisites/Exposure
co-Po/Ps O Maooins
) PO PO2 PO3 PO4 PO5 PO PO PO PO POI POI POI PSO PSC)2 PS03
6 7 8 9 0 I 2 I
col , 2 3 2 I I 2 2
c02 2 3 I I 3 3
co3 3 7 3 2 3 2 I I 3 3
Course Cont€nts:
Overview ofcourse, Create executable Jaya applications with a main method, run a Java program fiom
the command line, including console output, Platform independence, create if and if/else and ternary
constructs, Use a switch stalement; Create and use while loops, for loop, Create and use do/while loops,
Nested loops, Define the scope ofvariables, Object Orientation, encapsulation, Abstraction, etc.; Know
how to read or write to object fields, Explain an Object's Lifecycle (creation. .,dereference by
reassignment" and garbage collection), Wrapper classes such as Boolean, Double, and Integer, Use Java
) operators; including parentheses, String operations; Declare, instantiate, initialize and use a one-
dimensional anay, multi-dimensional array, Declare and use an ArrayList, Vectors collection Class.
Create methods with arguments and return values, Apply the static keyword to methods and
fields,Create and overload constructors; including impact on default, construclors; Apply access
modifiers, Apply encapsulation principles to a class; Constructor, destructor, Describe inheritance and
its benefits; Develop code that demonstrates the use of polymorphism, use super and this to access
objects and constructors, use abstract classes and interfaces.
tl,run,
IJ-r
]tf-.lr lJrrit ,i..i:: ,. c:,, r^r Noicia
-..i
ir .,':,'- "l')
G,c:'cri...; ] .i;,0 " i--ll
Module lV: 9 leclures hours
writing and running Simple Servlet, servlet Life cycle; Generic Servlet, HTTP servlet, servlet config,
servlet contest, writing servlet to handle cet and post methods. JDBC: objects (statement, prepare-<l
Statement and Callable Statement), Types ofresult set Inserting and updating, records.
Students.will gain hands-on experience on core JAVA. students will be able to solve simple to
medium level computation problems in Java. Emphasis will be that the student code themselves as
much as they can. They leam to debug the programs resulting in error free code. lnstructor will be
giving assignments based on the content covered in the lecture classes in the corresponding week.
Text Books :
l. Schildt Herbert, Java: The Complete Reference (9th ed.), McGraw Hill Education,20l4. ISBN
978- 9339212094.
2. Balagurusamy E, Progromming with Jova (5th ed.), McGrow Hill Education, 20t 4. ISBN g7B-
9351 343202.
)
Reference Books :
l. Kanetkar Yashwant, Let Us Java (2nd ed.), BPB Publications, 20t6. ISBN 9Z>gj334679.
2. Schildt Herbert, Jova: A Beginner's Guide (6th ed.), McGrtw Hill Education,2012. 1SBN 9Zg_
93392 t 3039.
Assessment Scheme
rMa
53+ffi
rf +Tii,l.{ff :,},3r*?,
Nam€ of Program Bachelor of Technology (Computer Science and Engineering)
ECSE209L Discrete Mathematical Structu res L T P C
Owning SchooUDepartment Department of Computer Science Engineering 3 0 4
Pre-req uisites/Exposure
Course Outcomes (COs)
On completion ofthis course, the students will be able to
COI: Learn logical notation to illustrate sets. relations, functions, and integers.
CO2: Identiry induction hypotheses and prove elementary properties of modular arithmetic.
CO3: Apply graph theory models ofdata structures and construct state machines to solve problems of
connecliviU and constraint salisfaction.
CO-PO/PSO MapDins
PO Po2 PO3 PO4 PO5 PO PO PO PO POr POI POI PSO PSO2 PSO3
'7 9 0 I 2 I
I 6 8
col 3 3 2 3
co2 2 3 3 2 2 2 J
co3 2 3 3 3 2 l , ) l 3
Course Contenls:
Text Books :
t. Bishl, R.K. qnd Dhdmi, H.5., Discrete Malhematics (1" ed.), OxJbrd University Press, 2015. ISBN
97- 80 t 99452798..
,,,w,,
:-. '')
rl'
t/l
vt
l''i,;t i'l.r ,.
(1. r. ':i.'.:- ;
2. O'Donnell, J., Hall, C. and Page, R , Discrete Mathematics Using a Computer (2d ed), Springer -
lntemational, 2006. ISBN 97 8- I84 62 824 16..
Roference Books i
l. Biggs, N.L., Discrete mathernatics (2il ed,), @ford tJntversity Press, 2002. ISBN 978-
a|9850V 178..
Assessment Scheme: t
lt,
tr// / ,
R&&,,
Bonhett University, Greater Noida
(Established LJndLrAct 24 of Covt. c, UHar pradesh)
Flot No's B, 0, 1 0, 11 , Tech Zone-il
Greater Noida-2o1310
Name of Program Bac h el o r of Tec h n ol o 9J (C o m p u t er Sc en ce a n d E n gi n ee rl n
c)
EMATI 02L Linear Algebra & Ordinary Differential L T P C
E uations
Owning School/Departmenl Departm€nt of Com puter Science En grneenng 3 0 4
Pre-req u isites/Exposll r€
Course Olrl mes (COs)
On completion ofthis course, the students will be able to:
col: solving system oflinear equations by using caussian elimination to reduce the augmented
matrix to row echelon form or to reduced row echelon form.
co2: To be familiar with the concepts of dimension of a subspace and the rank and nullity ofa matrix.
co3: To calculate the eigenvalues and eigenvectors of a square matrix using the characteristic
polynomial.
CO4: F'undamental concepts of ordinary differential equations
CO5: Solving linear differential equations of both first and higher order.
CO-PO/PSO Manoing
Course Contents:
,a,ful
l).. ,':-.{, t1;.,, ,,, 1j.,. r,-r.-,;:..:r
Nci.Ja
I lcl 11.. ' .)' ... .. I rr,. ,.il,
..: I
G,eatc; I,J, ;, ;_ .'., :'.',:''-t) ,i( it-1-ll
equations, wronskian, Reduction of order, characteristic equations: real distinct roots, complex roots,
repeated roots, Non-homogeneous equations: Undetermined coefficients and variation ofparameters.
Text Books :
Strqng G., lnlrodaction to linear algebra (4th ed.), Brooks/Cole tndia, 2006. ISBN gZg-00J010567g,
0030105676.
2 KreyszigE., Advanced Engineering Mathematics (l}th ed.), John Wiley & Sons, 2010. ISBN 97g_
041 04s83 65. 047 04s83 64.
Reference Books :
) l. Hoffman K. and R. Kurue, Linear Algebra (2d ed.), prentice Hall India, 2004. ISBN g7a9332550070,
9332550077.
2.9immons c F., Dffirential equations with applicdtions and hisroricql notes (2"d ed.), McGraw- Hill
Education (lndia) Pvt Limited, 2002. ISBN 978-00205 307 1 3, 00205302 t 8.
3.coddington E.A, An Introduction to ordinary Dffirential Equations (l't ed.), Dover publication,
I 989. tSBN 9780486659428.
4.s. L. Ross, Differential Equations (j'd ed.), wiley India, lgB9. tsBN 9788t26515370.8126515376.
Assessmen t Scheme
*M,
Pgll(,t Urriv:rsily. Grearrr Noida
F,; il;;l u,'ii ,'t:ilj ,:' ,;t-i;1{:1li
Greater lJcidr-:lit1 3i,
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CIEIOIt, Foundations of Entre preneu rship I, T P C
Ownin g School/Department School of f,ngineering and Applied 0 0 3
Sciences
Pre-requisites/Exposure
col: To discuss the basic understanding of the relevant concepts and practice of
entrepreneurship.
co2: To recognize the essential criteria in the decision to become an entrepreneur or opt for
entrepreneurship.
co3: To demonstrate how the entrepreneurial process is ofmoving from just an idea to a viable
) and sustainable launch of an entrepreneurial firm/venture.
CO4: To practice with the basic tools and tactics required to manage and grow an
entrepreneurial firm.
CO-PO/PSO Mapoine
CO I 2 3 2 3
2
.,
CO 2 I 3 3
3
CO 3 2 I 2 2
4
Course ontents:
l
frWrq
Dttt t ,ll
i,,, -6: if.!'jr.iv''..'7;,!:' |,".ig:,
Fl,ti r.,r,,." .,.
Gi.-3t...r
,,, ,,, t ,. .
;:t:ti.....,: ",._if
Convergent, Associative approaches and, Improvisation, The Innovation Dimension, Barriers
to Innovation, Typology of Innovation, Innovation and New Product Development - An
overview.
Text Books :
l. Hatten, T. S-. Small business managemenl: Entrepreneurship and beyond,
Entrepreneurship and small business managemenl. Pearson Education, 201 2.
2. Robert D Hisrich, Michael P Peters, & Dean A. Shepherd. South-Western, Cengage
) Learning. Entrepreneurship. McGraw-Hill Education, 201 7.
Reference Books :
1. Drucker, Peter, and Joseph Maciariello. Innovation and entrepreneursftlp. Routledge,
2014.
2. McGrath, Rita Gunther, and lan C. MacMillan - The entrepreneurial mindset: Strategies for
continuously creating opportunity in an age of uncertainly- Vol. 284. Harvard Business
Press, 2000.. Harvard Business Press.2000.
3. Murray, E. L., H. M. Neck, and D. C. P. Neck. Entrepreneurship: The Practice and
Mindset, ed. (201 7). SAGE Publications.
Assessment Scheme:
II
el ; ,,-:i'lloiCa
(r r rirJish)
Pl:l I 1:,': 7l it:-ll
Name of Program Bachelor of Technology (Computer Science and En gineering)
EPHYTOSL Mechanics L T P C
Owning School/Department Department of Computer Science Engineering 2 0 2 3
Pre-requisites/Exposure
Collrse ()xl omes (COs)
On completion ofthis course, the students will be able to:
COI: Leam how to apply Ne\ryton's Laws and understand the concept of energy
CO2: Solve problems involving rotational motion
CO3: Get inhoduced to central forces and conversion of two body problem into one body problem
CO;l: Leam about harmonic oscillators.
COs: Introduction to special theory ofrelativity
CO6: Perform basic physics experiments, tabulate observations, analyse data and draw conclusions
CO-PO/PSO Maoping
PO PO2 PO3 PO4 PO5 PO PO PO PO POI POI POr PSO PSO2 PSC)3
6 7 8 9 0 I 2 I
) col 3 3 2
c02 3 3 1 I t 3
c03 3 3 t 3
c04 2 2 ) I 3
co5 3 2 ) a 2 3
co6 3 3 , 3 ,|
3 3
Cours€ Contents:
2. Determination ofmoment of inertia of a flywheel about its principal axis passing through the axle
3. D€termination ofco-eificient ofviscosity ofglycerin by measuring the terminal velocity ofa falling
sphere
A
/lx/,4/
N(,11rar
/]4' 't'.1'.'
ti' f,:,. , ' , r ':':r:, l'l:rija
r.r.,,i.rlt
i.rctr..,..;;, r. r tire"-
Grt:i.rIi .:
4. Determination of Young's Modulus of a malerial by analysing the bending of a beam
5. Determination of the coefficient of static friction between the surfaces of a slider and a wooden
plane
6. Measurement of Planck's constant, work function and threshold frequency using photoelectric
effect
7. Measurement of band gap of a semiconductor by studying the variation of its resistivity with
temperature using the four-probe method
8. Measurement ofspecific charge (e/m) ofelectron by Thomson Method using cathode ray tube and
defl ection magnetomeler
9. Study of uniform motion and collisions in near-frictionless conditions using a linear air track
10. Study ofdifferent modes ofvibration and coupling factors ofa coupled pendulum
Text Books :
) l. Kleppner D & R. J. Kolenkow, .42 Introduction to Mechanics (2nd Edition), Cambridge University
Press, 2014, ISBN 978-0521 l98 l 10.
Reference Books :
l. Young Hugh D. and Roger A. Freedman, University Plysics (l3th Edition), Peqrson (Addison-
lYesley), 2012, ISBN 978-0321696861, ISBN 0321696867.
2. Kittel Charles, Walter D. Knight, Malvin A. Ruderman, Berkeley Physics Course, Mechanics Vol.l
(2nd Edition), McGrqw-Hill, 1973, ISBN 978-0070048805, ISBN 0070048800.
3. Halliday Dnid, Fundamentals ofplysics (l1th Edition), lYilqt,20l3, ISBN 978-l 118230718
Assessment Scheme:
R
Benn niversity, Greater Noida
(& la UnderAct 24 of co!,l, of Uttar Pradesh)
PI ot No's 8, 9, 1 0, 11 , Te ch Zone-ll
Greater Noida-2o1310
)
Semester III
lar
Be nett Universit y, Greater
lished Undert,c[4 cl Go\,'l
Noida
of Ultir pra d$h)
t No's 8, g, 10 11 , Tech Zo ne-ll
G reater Nr:ida-20 1310
Name of Program Ba c h e I o r o f T ec h n ology
(c o m p u ter S ct e T ce AT d E n n ee rt ng)
ECSE2t I l, lnformation Man agemeDt Systems L T P C
Owning SchooUDepartment De pa rt m e n t o f c om p u te r Sci e n ce E ng I n ee r n 0 2 4
Pre-req uisites/Exposure
CO-PO/PSO Maopins
PO Po2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 POt POI POt PSO PS02 PS03
I 0 I 2 I
COI 3 I 3 3 3
) co2 1 'l 3 3 3 I 2 a 2 3
cc)3 3 2 3 3 3 2 3
tar
r. r -i. i;, ; . ,,t .l
(, itr'i. i jj-':uj-1'10
Module lV: 9lectures hours
lntroduction to Distributed Database Systems (DDS), pro and cons of DDS, transactions, commit, and
transpaxency in DDS. Data warehousing, Big data technologies, including big data storage, big data
processing and big data analytics; Introduction to NoSQL database systems, including column stores,
RDF slores, HBase; Hadoop MapReduce Algorithms for expensive queries over big data.
Text Books :
l. Ramakrishnan,Raghu and Johannes Gehrke, Dqtqbase mqnagement systems (3 ed.), McGraw
) Hill,2014. ISBN 978-93392I3I I4.
2. Elnasri, Ramez and Shamkant B. nayathe. Fundamentals o/ dotabane systems (7h ed.), Pearson,
20 I 7. ISBN 978-0 I 3 3970777.
Reference Books :
l. C J Dqte, An lnlrodaction to Databqse Systems (8'h ed.), Pearson Education, 2006. ISBN 978-
8177s85568.
2. Silberchatz, Database System Concepts (6h ed.), McGrawHill, 2013. ISBN 978-9332901384
Assessment Scheme:
.^M-,
iJl{ffKun'., r;tv. Gr€rtnr Noi(r3
rt. [/'".tr.: ,i \r ,.i .
,.", t::- .
2
) 3
t '2
J 3 I
I =weakly related
2= moderate.ly
related
Caurr. (.oitents: 3=shongly
re,lated
DlodIt h
htroduct lon
ao oops Concepts,
Complox lO, handl lng
Ary6ploli. Analysrs. Arays, Tower
Irhplem entations: Big -oh of Han oU 12 tecture
h ol!rs
- Linked
,isrs, Recursiye
n oradon,
Solvrng Binary s earch
func6 ons Rec Tnn e
Module II: on Iists, relations.
Deleuon, lrrence I_ists and
Stacks, rnsenion,
Queues using linlk reyersln& jolnlng.
biru.y and ed lisrs, handlin
complete bin Polynorn
arI fees; flsg ials; Tree
del etion traversals data structure 12 lecture
algori thrns, and Implern Irou rs
B lnary search enhtions,
Modulo lrr, hees, in senion
) Soning Algorithms: and
- Merge and
heap sort. euick soq AVL
tuees, B-Trees, 9 lettures
Heap Trees Dours
Modulc lVr - &ioriry
Hashing: -Chai eue ues,
ned Hash Tables
Algorirhms, pa , Linear probin
th compression; g, Double
Huftnan codi Craph: .BFS, Hash lng; 9 lectures
ng. Shonesr DFS Topo
Di siolna set h outs
path, Tree logical s class -Smart
data sfructure ort, Minimum Un lon
s Panning
hees,
The Iaboratory
of Data struoures
tte concepb is designed
and toprcs to provi de
c ++ will help raught in f, e classroom a pracfcal
the s tudenh exposure
sessi ons. to the studeflIs
to have a befter Irnplern enting
un derstan the about
Text Books dre of r.li. learnt
: bjec. ., concepb
using
Srfu,
Ei!lW!: jy p,'iry, c.. -, -
5r:[?i,:;;#,i?",,#"r,d#J:fl
l. Horowitz Ellis and Sartaj Sahni, Fundamentals of Data Structures inC++ (2 ed),
Universities Press, 2008. ISBN 978-0929306377.
2- Langsem, Augenstein and Tenenbaunl, Data Structures using C and C++ (?d ed.), Pearson,
20t 5. tsBN 978-8t20it t770
Reference Books :
l. Aho V., J. E. Hopcroft, and J. D. Ullman, Dqts Structures and Algorithms (1" ed), Pearson,
2002. tsBN q7&8 I 7808 I 02 1..
2. Tenenbaum Aaron M., Y. Langsam and Moshe J. Augenstein, Data Structures Using C (2d ed.),
Pearson 20 I 9. ISBN 978-8 I 3 I 70328 1..
Assessmen t Scheme:
_)
*hil,.,
Eiffijigij#pffilri;?$i
Name of Program Bachelor of Technology (Computer Science and Engineerirg)
ECSE2I7T, Microprocessors and Com puter Architecture l. T P C
Owning SchooUDepartment Department of Computer Science Engineering 3 0 2 4
Pre-requisites/Exposure
COI : Understand about modern architecture and microprocessors and the design techniques used
lo increase their performance.
CO2 : Evaluate yarious design altemalive ofcomputer architecture based on CpU performance,
memory, 1/O.
CO3 : Create new designs at the register-transfer-leyel.
CO-PO/PSO MaDDins
PO PO? PO3 PO4 PO5 PO PO PO PO POt POt POI PSO PSO2 PS03
1 6 7 8 9 0 I 2 I
cot 1 2 3 3 I 2 2
) co2 2 3 3 3 I 1 3
cC)3 2 2 2 3 3 3 3 3
Course Contents:
M
U, r- i"'. rlrctir-li f\Joial;.1
,./c
r, 1 , r,.., , i,l Lli .r, i ,,i: ijl
3, 1il, i i, i:oh.:1rr:r:,ii
, r "rt.i t-::.)lil il-,
cache in multiprocessor systems and rerated problems, cache coher€nce protocols, parauer
processing concepts, Parallelism algorithm for multiprocessor systems;
General definitions of mini
computers, microprocessors, micro controllers and digital signal processors, overview of
microprocessor, signals and pins ofmicroprocessor; overview ofmicroprocessor, signars and pins
ofmicroprocessor.
In this course students will start with basic components of cpU such as ALU, Memory
etc. Then
finally combine all components and develop a processor. The Lab will use Altera
euanus prime
Lite for design. MIPS for assembly programming.
Text Books :
l. Hennessy J. L. and D. A. Patterson, Computer Archirecture: A euanlitatiye Approach (5,h ed.),
Morgan Kaufnann, 2012. tSBN 978-938 t 269220_
2 sjallings ll/illiam, computer organization and Architecture (10'h ed.), pearson, 20r6. ISBN g7B-
0 t 32936330..
) R€ference Books :
l. Harris D.M and S. L. Harris, Design and Computer Architecture (2 ed.), Morgan
-Digital
Kaufmann,20l2. ISBN 978-0 t 2394424j..
2. Morrk Mqno M., Digital Design: with an Introduction to the yerilog Hdl (5th ed.), pearson
Education, 20 I 4. ISBN 978-9 3 32 53 5763..
3. Palnitkar 5., Verilog HDL: A Guide to Digital Design and Synrhesis (2 ed-), prentice Hall, 2003.
ISBN 978-01 32 599702..
men t Scheme:
Re
Benir UniversitY, Greater Noida
(E511'ol
acl 24.ri(lJ!'l oiuilirr Pradesh)
Picl t':o's 0, 9, 10, 11 , ]-e ch Zone-ll
G re:; lri, i{cida -201310
Name of Program Ba c h e o r of Tec h n ol ogy (c o m p ute r Sc te n c e a n d E ng T e e r I ns)
ECSE23I L Probabil & Statistics L T P C
Owning SchooVDepartment D ep a rtm en o f C om p u te r Sc le nc e E n gr n ee rt n 3 0 2 4
Pre-req uisites/Exposure
CO-PO/PSO Ma DDINS
PO P02 PO3 PO4 PO5 PO PO PO PO POI POI POI PSO PS02 PS03
) 6 7 8 I 0 I 2 I
COI 3 3 t 2 3
c02 3 3 3
co3 3 3 3 3 2
Course CoIltents:
Analyzing Data Visually: Leam to visuarize dala through the creation and interpretation
ofhistograms,
bar charts' and fiequency prots. Exprore nreasures of centrar tendency
and variabirity. Derve into
sampling distributions, incruding chi-square, t, and F disrributions, Hyporhesis
Testing with Chi-
square, t, and F distributions, parameter estimation, Least square
estimation melhod, Maximum
Likelihood estimation, confidence intervars, Hypothesis testing- z test, t test,
F test; chi-squared test,
ANOVA: test ofdifference between groups, Linear regression, multiple regression
,-i.gi fir j
i r':.t.t OI: ,. ;i , C, C: t,,r ilCida
l: j:t ., .'l " il' i_ r. icsh)
I ,, Lttr
l.l,rr
. l:]
Cr.tat.:t , . ,..r"t-_Li.tc Zone_tl
iiJ
ideas of data analysis. The students leam to perform numErical analysis, compute odds of any even!
check distribution (both basic and advanced). The students furtha try their hands on both linear and
In addition to tlis, students build search engines (like google), implement
non linear regression.
ideas ofdynamical system (via Markov models), play with the concepts of central limit theorem and
law of large numbers. Lastly, everyone is encouraged to try and test scientific hypothesis via the
paradigm ofstatistical hypothesis testing and confidence interval estimation. The students are also given
hands on training in the language R.
Text Books :
1. Rox Sheldon M., Intro&tdion to Ptobabilv and Stqtistics for Engineers and Scientists (4th ed"),
Academic Press, 2009. ISBN 978-123704832
2. Michael Baro4 Probabilily and Stqrisrics for Computer Scientist$ (l'1 ed.), Chapnan and Hall
booh 2006. ISBN 978-1584886419
Referenco Books :
l.Paul L. Meyeri lntroductory Prcbability and Statistical Applications (2 ed.), Addison- Wesley,
1970. ISBN 978-0201047I4 t
2.Irwin Miller and John E. Freund, Probability and Statistics for Engineers (il ed.), Pea?son 2010.
) tsBN 978-0321640772
dEssEsEcESslEElg:
-)
JM*,
Egffikrl:t,ffili#;ir$,r
Name of Program Bac h el o r o f Te c h n ol ogy (c o m p u ter Sc I e n ce an d E rg n ee rt n
s)
ECSE235P Des n Thinkin & lnnovation L T P C
Owning SchooUDepartment De pa rt m € n o f c om p u te r s cre n c€ E n I n ee r n 0 0 4 2
Pre-r€q uisites/Exposure
CO-PO/PSO Mapoine
PO PO2 PO3 P04 PO5 PO PO PO PO POI POI POI PSO PS02 PSO3
6 7 8 9 0 I 2 I
col 2 3 ) 2 3
) c02 3 2
I 3 2
3
co3 2 , , 3
Course Contents:
Module l:
56 lecture hours
students will
be doing a group project that gives them the 360-degree understanding
ofthe design
thinling approach that goes into making a project. The students wi[ be continuousry assessed
and
evaluated on different criteria rerated to project development. students wir
be creating poster,
Video, Blog, Report and presentation to understand the different deliverables and
documentation
associated with the project. Students wilr be supposed to work on rear rife problems
and workabre
issues that can be solved with the intervention oftechnology and befter
design.
Assessment Scheme:
F
,u&
:i, i,/, () itr ii
.r-:al l\ l,-. : rtl,_1
I 1!r, 1 I, r
' , ,,
.:crre_ll
,r :li)t :
Components Internal .A.ss$sment Mld Term Exam End Eram Totsl
*"M,,,
FHffid.j{t{if"*;1f'}#g'i
)
Semester IV
Re r
Be It LIn h,rersity, Gi"eater Noida
(Frlr irlrci Llr,lir '\ct,ll cfGovl, if Uttar PraCesh)
Plr:t l.lc's , g, '10, 11, Tcch Zone-ll
e
G ril.rtei^ I\Jcida-201 31 0
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET205 Software Engineering I, T P C
Owning School/Department Department of Computer Science :l 0 2 4
Engineering
Pre-req uisites/Exposu re
CO-PO/PSO Maonins
POI PO2 PO3 P()4 PO5 PC)6 PO7 PO8 PO9 PO l0 POI I POl2 PSOI PSO2 PSo3
.,
col I 3 2 3 2
co2 I I 3 2 2 I
col 3 I 3 2 2
Course Contents:
Reference Books :
L Summers B. L., Efibctive Methods for Sofrwure Engineering (l ed.), CRC Press, 2020.
lsBN 9781 00005271 0.
Assessment Scheme
CO 3 3 3 2 I 2
,, 1 ) 3
2
CO I .,
3 t ) , 2 2 3
3
Course Contents:
Text Books :
3. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein,
Introduction to Algorithms (4th ed.), The MIT press,2022. ISBN 9780262367505.
4. Horowitz Ellis, Sahni Sartaj, Rajasekaran Sanguthevar, Computer AtgorithmslC++
(2nd ed.), The Orient Blackswan, 2019. ISBN 9386235145.
rence B ks:
l. Karumanchi narsimha, Algorithm Design Techniques: Recursion, Backtracking, Greedy,
Divide and Conquer and Dynamic Program (lst ed.), Career Monk publications. 201g.
rsBN 978-8193245255.
Assessment Scheme
Re r
B tUn :\,/3r-r;iy, Gre:tci \!o iCa
(l ci :,1 i i C r,4, .i Liiiirr
P Iot i\ir's J, 0, '10, 'il, -Iech iri:r desh)
Zo ne-li
G rt'later Ncida_ 201310
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET2OT Computer Networks L T P C
Owning SchooUDepartment Department of Computer Science 3 0 2 4
Engineering
Pre- req uisites/Exposu re na
COl: Examine the functionality ofthe different layers within network architecture.
CO2: Illustrate TCP/IP model suite protocols.
CO3: Design the networks for organization and select the appropriate networking architecture
and technologies, subnetting and routing mechanism.
CO-PO/PSO Mappine
POt PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO l0 POtl POl2 PSOI PSO2 PSO3
cor 3 2 1 I 2 I 1 2
co2 3 3 3 3 3 2 2 2 2 2 3
co3 2 'l 1 I 2 I 1 1
Course Contents:
'. i.t.-
J. :.)
segment forrnats, connection estabrishment and termination, Expert Lecture
from Industry,
Congestion control, Congestion control: Open Loop and closed loop,
euality ofservice, Flow
characteristics, Techniques to improve eoS.
e r
($.
,i PiJ:Ieah)
i0, 11, Teclr Zue-ll
Grcatei" l! r; id:r-201310
Name ofProgram Bachelor of Technology (Computer Science and
f,ngineering)
CSET209 Operating Systems L T P C
Owning SchooVDepartment Department of ComPuter Science 3 0 2 4
Engineering
Pre-requisites/Exposure
COl: To explain the structure and the services provided by the Operating System.
CO2: To define, restate, discuss, and explain the policies for scheduling, deadlocks, memory
management, synchronization, system calls, and file systems.
) CO3: To examine distributed Operating System, cloud computing, and Virtualization'
CO.PO/PS O ManDina
POl PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 POt0 POI I PO l2 PSOI PSO2 PSO3
cot 3 3 2 1 3 2
co2 3 3 3 3 3
co3 2 3 3 2 3
Course ontents:
glecture hours
Module l:
Operating system: Organization, abstraction provided by OS, features and roles' OS
evolution,Operating sy.iem architecture, OS examples; Process management: Process control
block, system calls and interrupts, context switching, schedular and dispatcher, process states
) and life cycle. multithreading. kernel vs. user level threads, process vs. thread; CPU scheduling
algorithms: FCFS, SJF, STRF. priority, round robin, multilevel queue and feedback
scheduling, highest response ration next, lottery scheduling.
Text Books :
l. Silberschatz, A., Galvin, P.B. and Gagne, G' Operating System Concepts (lOth ed.), John
Wiley,20l8. ISBN 978-l-l l9-32091-3 .
2. Stallings w., operattng systems Internals and Design principles (9th ed.), prentice Hall,
202 l. ISBN 97 8-013467 0959
Reference Books :
I Tanenbaum A. S. and Herbert Bos, Modern Operating Systems (lst ed.), pearson,202l
ISBN 9789332575776.
. Clnr:.i,r:'I\!oida
:1. I,-. -,;i t'l tr .,r i, rrj :h)
t::, i'-li_ Ir.. ,',
Semester V
R
B ett [.Jniver. i
([rslirb]rs reaicr ll
,l: liJ.l-il.
PIot I,Jo':r i.l ): t1, ci
-le Ltit,:r
Giea ler fjo ,!)
''lo, 11 ,
I
cir 1.
e-:.013.1 0
Name ofProgram Bachelor of Technology (Computer Science and
Engineering)
CSET3OI Artificial Intelligence and Machine L T P C
Learni
Owning School/Department Department of Computer Science 3 0 4 5
Engineering
Pre-requisites/Exposu re
co- M aDDlns
POt PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 t0 POI
PO I POl2 PSOI PSO2 PSO3
cot 2 3 2 3 3 3
co2 2 3 3 1 3 2 3
co3 3 3 3 3 3 3 3 3
fro
/" l.r',ia
. :.,::h)
a;1.:t-il
Artificial Neural Network, Neural network representation, Perceptron model, Stepwise v/s
Sigmoid function, Multilayer perceptron model, Matrix Calculus (Jacobian, Hessian Matrix),
computation Graph, Backpropagation Algorithrn, Activation Functions. Stochastic Gradient
Descent. Batch Gradient Descent, Mini-Batch Gradient Descent, Vanishing and Exploding
Gradients, Overfitting Problem, Regularization (Ridge, Lasso, Elastic), Dropout and Early
Stopping, Bayesian Learning: Bayes theorem and concept learning, naive Bayes classifier'
Gibbs Algorithrr, Bayesian belief networks, The EM algorithm, Support vector Machines,
Hyperplane, Support Vectors, Kernels, Non-Parametric Regression, Locally weighted
regression, K-nearest nei ghbour.
Text ks:
I MitchellT.M..MachineLearr?i/ls(lsted.),McGrawHill,20l7'lSBN978-125909695 2.
2 Alpaydin E., lntroductksn to Machine Learning (4th ed.), Phi, 2020' ISBN
978-
81203s0786
Referenc e Books :
) I Oswald Campesato, ArtiJiciat Intelligence, Machine Learning, and Deep Learning (l st
ed.), Mercury Learning & lnformation, 2020. ISBN 97 81683924665 '
Assessment Sc eme:
9u
/
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET3O2 Automata Theory and Computability L T P C
Owning School/Department Department of Computer Science ) 0 2 4
Engineering
Pre-requisites/Exposu re
Course Ou mes (COs)
CO-PO/PSO Mannins
POt P()2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO t0 PO POl2 PSOI t)so2 PSO3
.,
col 2 3
c02 3 3 3 2 3 3 3
co3 2 3 3 , 3 3
Cource Contents:
W.
I
" ri.lrr:l-t:r
.ri:l 'l
Halting Problem, Enumerability of TMs, Acceptability of TMs, Decidability of TMs, Rice
Theorem, Chomsky Hierarchy, Diagonalization,
Text Books :
1. LinzPeter, An Introduction to Formal Languages and Automata (6th ed.), Jones & Bartlett
Leaming, 2016. ISBN 978 1284077247.
Refercnce Books :
) l. Wigderson Avi, Mathematics and Computation A Theory Revolutionizing Technologt and
Science (lst ed.), Princeton University Press,20l9. ISBN 97E-0691 189130.
Assessment Scheme
e r
B ctt Un rversity, Greaier Noida
(Eslabjl.Ir.J t h,, '.1/'..12.,
oi Go vt, ol Uitir pradesh
P lot No's u, 9, 10, 11,
Tech Zone- il
G reate I lici da-701310
Name of Program Bachelor of TechnologY (Computer Science and
Engineering)
CSET3O5 H h Performance Computi I, T P C
COI: Compare and Anatyze data parallel and task parallel algorithms and their serial versions
for searching and sorting tasks on matrix, tree, and graph data structures.
CO2: Explain distribuGd memory, message passing modelling and mapping of parallel
programs to physical processors.
bO-3: Implement seriil and parallel algorithms for different applications using HPC libraries.
CO.PO/PS O Manninp
POI P()2 P03 PO4 PO5 PO6 PO7 PO8 PO9 POt0 PO POl2 PSO I PSO2 PSO3
col 3 2 2 2
cC)2 2 3 2 3 2
co3 3 3 3 ) 3 2 3
Course Co ntents:
q/,,
Parallel Prefix Sum, Scafter, Cather, Network topologies for parallel computing,
Network
optimization.
Text Books :
l. Robey Robert and Zamora Yuliana, paralter and High performance Computing (r ed.),
Manning, 2021. ISBN 9781638350385, 1638350388.
2. Sterling Thomas, Maciej Brodowicz and Maflhew Anderson, High performance
Computing: Modern Systems and practices (l ed.), Elsevier Science, 2017. ISBN
97 801242021 53, 0t 24202t 52.
)
Referen ce Books :
I Fidanova Stefka and lvan Dimov, Advances in High performance Computing (l ed.),
Springer, 2020. ISBN 9783030553477.
Ass ment Sc e:
Reg r
Ben Grester Noida
([!lnir i- t 0i
r,\ 1J ri rr iir.tic!h)
.'-!1\,, .'' r/.,,r
.,, lU, l l fi,' r .-l' r. : ,. - li
'li h;r:iC:-10 l3 i
Name ofProgram Bachelor of Technology (Computer Science and
Engineering)
CSET303 Seminar on Special Topics in Emerging I, T P C
Areas
Owning SchooUDepartment Department of Computer Science 0 I 0
Engineering
Pre- req u is ites/E x pos u re
COI: To articulate speech preparation and presentation techniques, audience awareness and
self- awareness along with the cultivation of self-confidence.
CO2: To examine the ability to present scientific material in visual, written and oral form
including the formulation of an effective presentation on a topic in the Computer Science
domain.
) CO3: To explain an ability to listen to a scientific presentation with the discussion of the
strengths and weaknesses ofa speaker's presentation.
CO.PO MaDDine
POI PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 POl0 PO| | POl2 PSOI PSO2 PSO3
col 2 2 2
.,
co2 3 3 3 2 3
,,
c03 2 2 3 2
Cource ontents:
Text Books :
^.rM
P,c .,11,l'.1..::.i-. ( i,L.:i.rr I'toiciJ
I ( -,. . : , ., (.:.::prJ,:csh)
i, ,:...,r,, i,.). Ii, Tcclr Zonc-li
C, .;:ll:ri i.l,r jia,30'l310
l. Geraci Angelo, Special Topics in ldormdtian Technologt (lst ed), Spring€r Internalional
Publishing 2021. ISBN 9783030624765
Assessment Scheme
45 20 35 100
Weightogo (7o)
,t
t
ter Noida
Ufiar Pradesh)
ch Zone-ll
Greater Noida-201310
Name of Program Bachelor of Technology (Computer Science
and Engineering)
CSET304 Competitive Programming L T P C
Owning SchooUDepartment Departmenl of Computer Science 0 0 4 2
Engineering
Pre-req uisites/Exposu re na
CO-PO/PSO Mapoing
POI PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO IO PO I'Ol2 PSOt PSO2 PSO3
,,
cor 3 3 3 3 2 3 3 1
) c02 3 1 3 3 3 3 3 2
Course Contents:
Text Books :
l. Laaksonen Antli, Competitiye Programner's Handbook (lst ed.), Springer, 2018. ISBN
) 918- 3319725468.
2. Laaksonen Antti, Guide lo Competitive Programming (lst ed.), Springer International
Publishing, 2020. ISBN 9783030393577.
Reference Books :
l. Diirr Christoph and Jill-J6nn, Competitive Programming in Python (lst ed.), Cambridge
University Press, 2020. ISBN 9781 1081 1 6826.
R eg I
Be Univers ity, Greater Noida
(Blablished U ndcrAct 24 oi Govt, of U ttar Pradesh)
Plot No's 8, 9, 10, 11, Tec h Zone-ll
G reater Noida-201310
VI
)
Semester
R trar
Eennett University, Greater Noida
{Esl6bl;:.hed UnderAct24 otGovt. ol Ltltar pradesh)
Plot No's 8, 9, 10, t1, Tech Zone-il
Greater Noida-20131 0
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET306 Undergraduate Research in Computer L T P C
Science f,ngineerins
Owning School/Department Department of Computer Science 0 0 I
Engineering
Pre-req uisites/Exposure
co- Mannins
POI PO2 POI PO4 PO5 PO6 PO7 PO8 PO9 PO t0 PO PO t2 PSOI PSO2 PSO3
col I ", 3 3
c02 I 2 3 3
c03 I 2 3 3
Course Contents:
Professionalism: All students enrolled in this course are graduate students (apprentices) irr a
chosen field of study. As such, you are considered to be professionals. you are expected to
conduct yourselves in a professional manner by meeting all course expectations (deadlines)
as required and without the need for constant reminder.
T ext Books :
il
l)
C;
1. Robson Colin, How to Do a Research Project: a guide to undergraduate students (l ed.),
Wiley, 201 6. ISBN 9781 I 1 8691326.
Reference Books :
L Developing Your Research Project httns;//www.futureleam.com,/courseVresearch-oroiect
2. Understanding Research Methods https:/www.coursera.org/learn/researoh-methods
Assessment Scheme
Plot No
Greater
Name of Program Ba c h eI or o f Tech rl ol ogy ( om p u te r Sc te nc e a nd E ng I D e er n
c c)
CSETIOS Environment & Sustainibili ty L T P C
Owning SchooUDepartment Department of Com puter Science Engineerin 3 0 0 3
Pre-req uisites/Exposure
co2: Demonstrate an ability ro combine the many disciplines and fields that intersect wilh
enyironmental concerns.
co3: Illustrate an integrative approach to environmental issues with a focus on sustainabilitv
co- P S0 Maonins
PO PO2 PO3 PO4 PO5 PO PO PO PO POI POr POI PSO PSO2 PSO3
) 6 7 8 I 0 I 2 I
cot 3 2 3 2 ., 1 2
co2 2 1 2 3 2 2 I
co3 3 3 3 2 3 2 )
Course ontents:
natural resources: natural resources - Associated problems with natural resources .renewable and non-
renewable energy - water and Agriculture - Agriculture and Food problems and solutions.
-
Module lY: g lectures hours
Environmental pollution: causes, effects and control measures ofvarious types ofpollutions - Air
pollution - water pollution - wastewater treatment - Soil pollution - Noise pollution - Thermal
pollution - - Solid waste management - E-waste - Case studies on pollution.
Reg ar
!lr i i l:r'., t',.
iri .,',, i-,.), . r,'i i, i,--
.i
4.. i il. i-i:: i- i, ::t '1 0
Environmental ethics and policies: Environment ethics Global policies Environmental laws
-
in India Environmental impact assessment lssues involved in- the enforcement of
- -
environmental legislation.
Text Books :
) Assessment Scheme:
col: To gain a better understanding ofthe workprace and deveroped and demonstrated
workplace
competencies necessary for professional and academic success.
CO2: To clari$r career preferences and professional goals.
PO Po2 PO3 PO4 PO5 PO PO PO PO POI POI POt PSO PS02 PSO3
I 6 '7
8 9 0 I 2 I
col 2 3 ) I I 3 3 I 2
) co2 2 1
I .,
3 3
Course ontents:
1-,
(/,,;, 1, r:t . I ii
P jor t. i,'
o'.-
Gi'eater-ii ,. ,_ _,
, :;ir:l':' l,;t1:.1f,
, teCh ZOlte-l,l
r r
Semester VII
J
r,si$:s"'a':'a:l'a',ttrt*t*r;iPlr
Greater Noida-201310
Name of Program B a c h e lo r of T ech n ol ogy ( o m p u te r Sc te n c e
c a d E n gt n ee rt n s)
CSET4OI Ca ne Pro ect L T P C
Owning SchooUDe partment c
D e pa rtm ED o f om p u te r Sc tence E n gr n ee rt n
0 0 l0 5
Pre-requisites/Ex posure
CO-PO/PSO Mappins
) PO Po2 PO3 PO4 PO5 PO PO PO PO POI POI POr PSO PS02 PS03
I 6 7 8 9 0 I 2 I
col 3 2 3
co2 3 2 I 3
co3 3 2 I 3
As t Scheme:
t;]r
Be () ii I.lr::,,r::r:il,r. (ilii. a ier Ncida
lErllli,.rlj::J Li .li:, !, ;ll. .rl . ,i.'i. 1rl l-lLiirl 3i!'ieth)
-l-ech
i,lot tlo's tJ, 'J, 1il, 1 l, Zone-ll
Greater li,:iCa-20'l 31 0
VIII
)
Semester
_)
e rar
Be ett Uni,/ersity, Greater Noida
(Btablished U:rdJrAct:4 oIGovl. cf ULldr Pradesh)
Plot No's 8. 9. 10, '11. Tech Zone-ll
Greater Noida-201 310
Nam€ of Program Bac h e o r of Tec h n ol ogy (c o m p u t er Sc I en ce a Il d E n gln eer ln g)
CSET499 lnd ust rt a Proj ecV R& D P ro e cl/ s ta rt p L T P C
Pro ect
Owning SchooUDepartment De partment of Computer Science Engineering 0 0 2 t2
4
Pre-req uisites/Exposu re
COI: ldentification, formulation and analysis ofthe existing problem in the (non-automaled)
workflow for performing a specific task. Design and implementation ofthe automated
solutions for
the assigned,/identified real world problems.
co2: Technical repon writing. practice and further deveropment of skilrs in time
management and
reporting within an industrial or research laboratory setting.
co3: contribute to an ethicar and professionar work cutture and to ream to work
in diverseteams.:
Integration and application ofknowredge and skirs acquired in
earlier course work
CO-PO/PSO Mappins
PO Po2 PO3 PO4 PO5 PO PO PO PO POI POt POI PSO PSC)2 PSO3
I ,7
6 8 9 0 I 2 I
col 2 ) , 3 3 2 , 3
co2 2 , I a 1
c03 3 3 3
Module I:
336 lecture hours
The purpose of the project semester is to further develop the
understanding rerated to the
implementation, design and theorelicar aspects ofthe computer
science and its apprication to the
practical problems. Many ofthe subjecls that a studenr had
studied in the university have a direct
) impact on what the student wir be doing in the software house / industry.
Student extend wi
and deepen the knowledge ofthe computer science whire working.
Student wiI be reaming whar
it's like to be part of a workforce: how to deal with the ferow workers,
including your bosses;
how to take suggestions, (including criticism): how to contribute in
the team. and so on. lmmersed
in this absorbing and exciting worrd, it's easy to lose sight
ofthe academic worrd. but remember
that the project semester is realy part of your university education.
computer science
Engineering department has developed several leaming outcomes
for it, and deparlment will
evaluate a student based on these tasks and goars to see how we
a student has achieved the
leaming outcomes. There are few points to worth about the ofthe
semester project, which are as
following:lt is the largest single piece ofwork you will do during your
degree course.lt is the part
ofthe curriculum that allows you to specialize in a topic you are good at or
enjoy.lt allows you
to show off a wide range of the ski,s and knowredge rearned during your
course.rt encourages
integration of material leamed in a number of course units.lt gives you
an opportunity to leam
R egr
Pi
Grcate
higher level of project related skills as given in the leaming outcomes for project semester. A
company involved in developing Websites, Mobile Apps, Business applications, Societal
applications in different domains of Computer Science Engineering.Company / Academic
Institution/ research institute must dear in the software related projects.work assigned having
a
profile of system analyst, Tester, euality Analyst, Data Scientist, Data Analyics, programmer,
Software Engineer or similar is acceptabre.student must not opt for the profire related to sales
or
marketing.student may opt for startups.project must be related to the phases of software
development life cycle.hojects having some research insights will be appreciated.No Self-
certification or online training courses will be considered as a substitute of project
semester.However, these can be good value additions to the real industry projects
and may add
value to your assessment.
Assessment Scheme:
1_
j
(EJ t; Gre: lrl r Noida
Plot lJ o ir6,9 CJvi of U rl ?t Piedea
10, I I. i6 ch
Greater i'j oida -201
h)
Zon e-ll
310
)
Specialization
Core I and II
R
Ben ti Lliriversity, Gie.rtcr Nlcida
(EsiabIilh ed U,rdliAcl 2,i ol
{trrl t) I lU -.r F.,i.:h)
Plot No's B, C, 10 11 , 'fech Zone-ll
G reater fioida-20131o
Name of Program Bachelor of Technology (Computer Science and Engineering)
ECSE2I9L Statistical Machine Learning L T P c
Owning SchooUDepartment Department of Computer Science Engineering 3 0 2 4
Pre-requisites/E xposure
C0-PO/PSO Maooinp
PO Po2 PC)3 PO4 PO5 PO PO PO PO POt POt POI PSO PS02 PSO3
I 6 7 8 9 0 2 I
cot 2 3 3
co2 2 3 3
,,
co3 J 3
Course ontents:
Text Books :
1. sugiyqmq Masashi, Introducrion to stcttislicql Machine Learning (r ed..), r[orgon Kaufruann, 20r7.
tsBN978-0t2802t2t7.
2. Hastie, T, Tibshirani, R. qncl Friedman J., The elenents ofsratisricctl learning:
data nining, inference
and prediction (2 ed.), Springer Science & Business Mediq, 2017. tSBN 9Zg_038781g570.
Reference Books :
1. Adler, J., R in q Nutshell: A Desktop euick Reference (l ed.), O'Reill\, Media, 2012. ISBN 9ZB_
9350239209..
2. Murplry, K., Machine Leorning: A probabilistic perspectiye (l ed.), MIT press, 2012. ISBN 97A_
02620t8029.
3, Gqreth James, Daniela wiflen, Trevor Hqstie and Robert Tibshirani, An introduction to srdtisticdr
learning: with applications in R ( I ed.), Springer, 2013. 1SBN 97g- 146 t 17l 370.
Assessme t Scheme
e lrat
Bl] il ett Llni,/c r5;ty, Greatcr
([sta].rli!i )a:J l): :::.)l t,.: : i , r'r Noi da
),,i -.J r-t iif p radesh)
Pht irj o's 3, 9, 1 0, 1i, tnch
L:, f ial er Ai0id -201h;.i
Z one-li
a a)
Name of Program Ba c h el o r o f T ech n ol ory (C o m p u te r Sc re n ce a n d E n gr n ee rt n
c)
ECSE22I L Introduction to Blockchain L T P C
Owning SchooUDepartment D ep a rtm ent of Co m p u ter Sc ren ce E n gr nee r I n g 3 0 2 4
Pre-requisites/E xposure
CO-PO/PSO Mappins
PO PO2 PO3 PO4 PO5 PO PO PO PO POI POt POt PSO PS02 PS03
I 6 7 8 9 0 2 I
col 3 2 3
co2 3 2 3
co3 3 2 3
R
Be t Univerc;tY, G reaior Noida
oiU I F:odesh
lli.i!r r\il il cl (::o !l-i'eoh
(Esiiibli hed
Plot o's 8, 9, 10, 11, Zotre-
Greater Noida-201310
Module V:
8 lectures hours
Decentralized Contracts, Achieving Turing Completeness in Smart Contract Languages, and
Addressing Verification Hurdles, Leveraging Smart Contracts
for Legal Agreement
Enforcement, comparing Bitcoin scripting vs. Ethereum Smaft Contracts.
) Text Books :
1 . Wqrburg Bettina, B illlltanger ancl Torn Serres, Bos ics of Blockchain ( 1't ed.), lndependentl,
publis hed 20 I 9. ISBN 978- I 0B9s I 9145.
Reference Books :
Assessm€nt Sc heme
coI To articulate Linux commands that are used lo manipulate system operations at
an admin
level
c02 To write Shell Programming using Linux commands.
co3 To design and write applications to manipulate internal kernel-level Linux
File svstems
CO-PO/PSO Ma DDINS
PO Po2 PO3 PO4 PO5 PO PO PO PO POI POr POt PSO PSc,2 PSC)3
6 7 8 9 0 I 2 I
col 3 3 3 2
,,
c02 2 3 3 3 3 2
co3 3 3 2 3 3 3 3
_ul ry
Iifgiq(rar
L.'qyqr, :,;,r,, L:r. -,1,_ Ncio,a
.
t( r:.) - l, .; ., r. : ,.]...Je.h)
i)i...rt l,l l.
c, ,r r;'; .i': '',i]',1 .r' :lr Zr' r'r-t;
Devops- Using environment variables. Bash Script
2 Blun Richqrd qnd chrisrine Bresnqhan, Linax conmqnd Line qnd shel scripting
Bibre (r st ed.),
lltiley, 2020. ISBN 978 t t 19200930.
Reference Books :
l. Steyens 14.R., uNlX Network programning (3rd ed.), pHl publicqtiorc, 2017. ISBN 978_
8t 20307490.
2. Bqshir qnd lmran Mastering blockchain: "Disrribtnecr redger technorog/, decenrrarization,
and
smdrt contracts explained (lst ed.), packt publishing Ltd, 20t8. ISBN 978-lZgBBj9044.
Assessment Scheme:
#fl
aeat4trar
Bffelt University, Greater Noida
(Eslabi:hid UldcrA'-r 24 ot (jor,l. of Utlar Pradesh)
Plct Nos 8, 9, 10, 11, Tech Zone-ll
Greatei- Noida-201310
Name of Program Bachelor of Technology (Computer Science and Engineering)
ECSE225L Data Analysis using Python L T P C
Owning SchooUDepartment Department of Computer Science Engineering 3 0 2 4
Pre-req uisites/Exposu re
CO-PO/PSO Maopins
PO PO2 PO3 PO4 PO5 PO PO PO PO POt POt POt PSO PS02 PSO3
'7
6 8 9 0 I 2 I
.,
cor 3 t 3
) cC)2 3 I 2 3
co3 3 I 2 3
Course Contents:
t^
t' : I /, a. i1,," l\lrt;Ca
l, .:rl ' LIL ijr li'lalli
,,1.,t ;. . . ii, l:uir Zorr:-li
Grr.'l:it,' N,.'l l:l :10 i 3'10
Python, Two Sample t Test (Unequal Variance) Using python, paired t Test, paired t Test, Two Sample
Vaxiance Test Using F Test, Two Sample Variance Test (F Distribution, Visualizing Two Sample
variance Test Results using Visualize Package, understanding the concept behind ANovA without
doing any calculation, Formulas and calculations in ANOVA, ANOVA Example Using Manual
Calculations, Analysis of Variance (ANOVA), Contingency Table.
students will be working on Different Data Analysis Methods, Techniques, Algorithms using pyhon.
Text Books :
l. McKinney lles, Pythonfor Data Analysis: Data Wranglingwith pandas, Numpy, and lpyhon
2. Klosterman, stephen, Data science Projects with Pyrhon: A case study Approach ro successful Data
Science Projects Using P (l't ed.), packt publishing Limited,20l9. ISBN g7B-tg38S5l02S.
Assessment Scheme:
Reg
Benn U niversity, Greater Noida
of ultar Pradesh)
Esiablishad Unde r Act 24 of Govt,
I' 10, 11, Te ch Zone-ll
P lot No's 8,
Greater Noida -201310
Name of Program Bachelor ofTechnology (Computer Science and E ngineering)
ECSE227L G raphics& Visual Computing L T P C
Owning School/Department Department of Com puter Science Engineerin 3 0 2 4
Pre-req uisites/Exposu re
col: Demonstrate various graphics primitives and 2-D, 3-D geometric transformations and clipping
techniques.
CO2: Comprehend the concepts related three-dimensional object representations.
CO3: Demonstrate the use ofOpenCL to create interactive computer graphics applications.
CO-PO/PSO Maooins
PO PO2 PO3 PO4 PO5 PO PO PO PO POI POI POI PSO PS02 PSO3
6 7 8 9 0 I 2 I
col 2 3 .,
I 3
) c02 3 , I 3
c03 2 3 ) I 3
Course Contents:
Introduction to Gaming and VR: Wlat is a Game, Conventional Games veruus Video Games, Games
for Entertainment. serious Games. Evolutions of virtual reality and video games. Modern vR
experiences, Hardware and software requirements, Human physiology and perception. Designing and
Developing Games: An approach to the task, Key components and slructure of video game, Stages ol
the design process. Game design team roles and documents. The Geometry of Virtual Worlds:
Geometric Models, changing Position and orientation, Axis-Angle Representations of Rotation,
Viewing Transfonnations. Chaining the Transformations.
Graphical User lnterfaces : Rapidly prototype VR interfaces, practice the Design loop, Understand
simulator Sickness, Experiment with various vR locomotion schemes, Implement a teleportation
locomotion, Audio goodness and game mechanics: Understand the importance of audio in VR,
Implement 3D audio, Use Google VR Spatial Audio, Explore pros and cons ofthe major VR headsets
on the market including Cardboard. Rift, Vive. Gear VR. PSVR. and more, platforms and focus path:
Discover future teclrnology that will impact VR development such SLAM and eye tracking by
examining VR prototypes and studies.
Curved Iines & Surfaces, Spline representations, Spline specifications, Bezier Curv€s & surfaces, B-
spline curves & surfaces, Rationai splines, Displaying Spline curves & surfaces. Basic Rendering:
Rendering in nature. Polygonal representation, AIIne and coordinate system transfomrations, Visibility
and occlusion, depth buffering, Painter's algorithm, ray tracing, forward and backward rendering
equations.
Advanced Rendering Techniques: Introduce advanced shading models like Cook-Torrance or Orenna-
yar shading models, exploring their applications and advantages ,Augmented Reality Visualization:
Discuss the integration ofvisualization techniques into augmented reality environmenls and its impact
on data perception. Data Visualization Ethics: Address ethical considerations in data visualization.
including privacy, bias, and responsible data representation ,Interactive narrative Visualization: Explore
the concept of interactive storytelling through data visualization, emphasizing narrative-driven visual
representations .Visual Analytics for Decision Making: Introduce visual analytics techniques focusing
on decision-making processes and strategies. combining data visualization with decision science.
Lab work would be conducted in OpenCL (verslsn l+). All the basic drawing. filling. transformation
and clipping algorithms will be covered.
Text Books :
)
l.Hearn Donqld D and M. Pauline Bake4 Cttmputer Graphics C yernion (2*t ed.), Pearson Education,
2002. ISBN 978-8 I 77 5 87 65 4.
Reference Books :
l. Foley James D., Andries von Dam, Steyen K. Feiner and John F. Hughes, Computer Graphics
Principles & Practice in C (2't ed.), Addison Ilesley Longman, 1995. ISBN 978-020t345193.
2.Zhigang Xiang and Roy a Plastock, Computer Graphics (2''d ed.), Mccraw Hill Educqtion, 2006.
ISBN 978-0s070601659.
3.Shreiner Dwe, Mason lltoo, Jackie Neider and Tom Dqvis, OpencL ProgrammingCuide: The Ofrcial
Guide to Learning OpenGL (Sth ed.), Addison-ll/esley Longman Publishing, 2005. ISBN 978-
0321335739.
M
Replsgar
9dfi-eit Unrter'-:;ty. Gre:rtcr Noida
(ESI6b.r<h-J Ir l,j.-r,r:, '_.: n, L( or Utidr pr3desh)
Plot No s S, 9, 10, 11,"tTech Zone_il
Greatei Noida-201310
Assessment Schsme
*.kfr--
Benn6fl University, creater Noida
(Btablish& Under Act 24 ot covt, ol UttEr Pra(Br)
Plot Nols 8, 9, 10, 11, Tech Zone-ll
Greater Noida-2013'l 0
Name of Program Bachelor of Technology (Computer Science and Engineering)
ECSE237L Software Developers & Operations: A DevOps T P C L
Perspective
Owning School/Department Department of Computer Science Engineering ,J 0 2 4
Pre-requ isites/Exposu re
COl: To articulate the fundamentals of Linux, Containerization, Build and Release Management
CO2: To examine Devops tools for Devops automation.
CO3: To make use Web Applications and platforms using Devops tools.
CO-PO/PSO Mappins
PO P02 PO3 PC)4 PO5 PO PO PO PO POI POI POI PSO PSO2 PSO3
6 7 8 9 0 2 I
col 3 2 2 2 3
,, , 3
.,
2
) co2 3 2 2 3 2 ", ) I 2
co3 2 2 2 2 3 2
., ) 1 2
Course Contents:
l., r. l'J':.ici:
i. ( llril.ii iriadtsh)
1.1
, Icch Zorre-li
:-l 0
DevOps Automation, The Sofiware Delivery Pipeline, Fully Automated Software Delivery
Process, Automated build, Automated Test, Automated Deployment, Automation Scenarios,
Archiving Logs and its auto discard, Auto Backups, Web Server Automation, Automated Usage
Alarm/message, Scenarios Where Automation Prevents Errors, Writing Automation Scripls,
Automated Task Scheduling, Best Practices for Automated Scripting, Configuration
Management (CM), Use ofCM in tndustries, CM Tools, Configuralion oftools (Ansible, Puppet"
Chef, Saltstack, Managing CM Infrastructure, Comparison of Ansible, Puppet, CheC and
SaltStack.
Text Books :
l. Leszko Rafql, Conlinuous Delivery with Docker and Jenkins: Creqle secure applications b)
building complete Cl/CD pipelines (2'd ed.), Pqckt Publishing, 2019. ISBN 978- t 838552 183.
2. Brqnson Steven, DevOps: Building Software with Lean Process for Modern Business (2od ed.),
I ndependent ly publ is h ed, 20 I 9. ISBN 97 8- I 67 57 4 I 2 I 4.
Reference Books :
1. Chou Eric, Michael Kennedy and Man$t llhaley, Mastering Python Networking: your one-stop
solution to using Pythonfor network automdtion, progrqmmability, and DevOps (3 ed.), Packt
Publishins, 2020. ISBN 978-1 8392 I 4677.
Assessment Schem€:
COI: To understand the Client-Server architecture and the basics of clienrside programming
languagesand frameworks.
CO2: To examine client-side languages: HTML, CSS, and Javascript.
CO-PO MaDDins
PO PO2 PO3 PO4 P05 PO PO PO PO POt POI POt PSO PS02 PSO3
I 6 7 8 9 0 I 2 I
) col
co2
2
2
3
2
2
2
2 3
2
2
2
II
II
2
a
3
2
2
2
., )
co3 2 2 2 2 2 2
Course Coptents:
R
i.l.ida
(E!ii
Pkrt I'ir.r it, i L'r, i1 , Tcclr Zone-l
Greale i NoiCa-2-01310
Studlo WorldLaboratorv Exoerimetrts:
In studio work, developers develop both the front-end and the server-side of the application, deploy,
debug and maintain th€ir databases and servers. Being a Full Stack Web Developer, you will be at an
edge as you make better technical decisions and see the big picture.
Text Books :
l. Flanagan, D., Javastipt: The Delinitive Guide (76 ed.), Shroff and O'Reilly Media, 2020. ISBN
978-935213996.
2. Robbins, J., Leamng lleb De gn: A Beginner's Guideto HTML, CSS, JnaSuipt, and lleb Graphics
(sh ed.), O'Pleilly Medi4 ?020.ISBN 978-1491960158.
Belesrce-Plef
l.Meloni, J.C. and Kymin J, HTML, CSS, and Jovasuipt All in One, Sams Teach Yoursef(5d ed.),
Assessment Scheme:
M,
R e&Kar
Bennett University, Greater Noida
(Established UnderAct 24 of Govl, ol tlltal Pradosh)
Plot No's 8, 9, 10, 11 , Tech Zone-ll
Greater Noida-201 310
Name of Program Bachelor of Technology (Computer Science and Engineering)
ECSE3O4L Cloud Computing L T P C
Owning School/Department Department of Computer Sci€nce Engineering 3 0 2 4
Pre-req uisites/Exposure
CO-PO/PSO MaDDins
PO PO2 PO3 PO4 PO5 PO PO PO PO POI POt POI PSO PSO2 PSO3
6 7 8 9 0 I 2 I
col I 2 a 3 2 I 2
.,
c02 3 2 2 3 2 3
1 ,,
co3 2 2 2 2 3 2 2
Course Contents:
Reference Books :
l. Velte Anthony, Toby Velte and Robert Elsenpeter, Cloud Computing: A practical Approach (l"r
ed.), Tata MccrawHill, 2009. ISBN 978-0070683518.
)
2. Hurwitz Judith, Robin Bllor, Marcia Kaulinan and F Halper, Cloud Computingfor dummies (l"l
ed.), Wiley, 2009. ISBN 978-8126524877.
Assessm t Scheme:
-,)
Engineering
Pre-requisites/Exposure
Course C ontents:
1r
II : :.r.i,.,' r,
).:'.:t
L:r-:t,tt l'!oida
.i ll,i.ii i:t,:h)
i r. i ;irZoIr.:-li
Module V. 7 lecture hours
Environmental ethics and policies: Environment ethics, Global policies, Environmental laws
in India, Environmental impact assessmenq Issues involved in the enforcement of
environmental legislation.
Text Books :
1. Bharuoh4 Eraah. Textbook of environmental studies for undergraduate courses,
Universities Press, 20 I 3.
Reference Books :
1. Lodish, Hrvey F. Molecular cell biolog. (86 ed.), W.H.Freeman, 2016. ISBN 978-
1319067748
Assessmeut Scheme:
a). -
CO-PO/PS O Manoins
POt Po2 PO3 PO4 PO5 PC)6 PO7 PO8 PO9 PO t0 POt I PO l2 PSOI PSO2 PSO3
1 2 2 2 I
col 2 I t ", 2 2
,,
2
) I
co2 2 2 1 2 2 2 2 2 2
,, ", ., 3
co3 2 3 2 2 2 2 2 2 2 2 z
Course C ontents:
Text Books :
1. Wang L., Rajiv Ranjan, Jinjun Chen and Boualem Benatallah, Cloud Computing (ltt ed.),
CRC Press, 201 7. ISBN 978-1351 833097.
2. Hurwitz J. S. and Daniel Kirsch, Cloud Computing For Dummies (Znd ed.), Hoboken: John
Wiley & Sons, 2020. ISBN 978-1119546658.
) Reference Books :
1. Sharma Prema, Moolchan Sharma and Mohamed Elhoseny, Applications of Cloud
Computing (lst ed.), CRC Press,2020. ISBN 9780367904128.
Assessment Scheme
R ar
e tt Untversity, Grea ter Noida
Establish.d U nderAut 24
P.adesh)
oi Govt, ot uttar
ch Zone-ll
P lot No's B, 9, 10, 11, Te
Greater No ida-201310
Name ofProgram Bachelor of Technology (Computer Science and
Engineering)
CSET225 lntelligent Model Design using AI L T P C
Owning SchooUDepartment Department of Computer Science 0 2 4
Engineering
Pre-requisites/Exposu re
COl: To articulate key features of various Machine leaming and Deep Learning tools for
Intelligent Modell ing.
CO2: To examine and implernent intelligent applications using Machire Leaming and Deep
Learning tools.
CO3: To irrplement Machine Learning and Deep Learning rnodels for design thinking and
evaluate them using relevant metrics.
CO-PO/PSO Manoins
POt PO2 POI PO4 PO5 PO6 PO7 PO8 PO9 POr0 POt I PO t2 PSOI PSO2 PSO3
cor 3 3 3 3 2 t 3 2 2 2 3
co2 3 2 3 3 3 , 2 3
c03 3 3 3 2 3 2 , 3 3
,|
Course Contents:
Text Books :
L Aggarwal C. C ., Nettral Networks and Deep Learning ollltst ed;. springer Intemational, 2018.
tsBN 978-3030068561.
Reference Books :
)
L Kasparov Carry, Mig Greengard, Deep Thinking: llhere on Machine Intelligence Ends and
st
Human Creativity Begins (l ed.), John Murray, 2018. ISBN 978-147365351 l.
Assessment Scheme:
/)x4
I
,u.0
-H-egtsfrat'
Ben6iBIt Universrty, Grc rtcr Noida
(Establijh.C Lnd.r l cl2L1 Lrf rin,'1. 01 llii,li FraC{ish)
Plot No's 8, I, i 0. 'i 1, lcch Zone-ll
Greate i Noida-zo1.:l i'
Name of Program Bachelor of TechnologY (Computer Science and
Engineering)
CSET226 Blockchain f,ngineerin L T P C
COI: To articulate blockchain concepts and software applications that are used to develop the
blockchain use cases.
co2: To perform compilation, migrating, testing, and deploying the blockchain applications
on the decentralized network.
CO3: To make use of building distributed ledger technologies for Blockchain applications and
able to solve double spending problems in the digital payments using cryptocurrencies.
)
CO.PO/PSO Manoins
POI P02 PO3 PO4 PO5 PO6 PO7 PO8 PO9 POt0 POII POl2 PSOI PSO2 PSO3
col 2 2 a 3 2 2 t ) 2 ) 2 2
1 .| .,
2 2 2 2
c02 2 1 3 2 2 2 2
c03 2 2 3 2 1 2 I 2 2 2 1 , 2 2 3
Course Contents:
development using Whisper, Swarm, and Raiden Network, State Channe lsTCase studV,
{'i ar
i-l al t,
(ii
ir l::t il ri), ir. l
(:., i
':-;"ll:'t
Costless Verification: Blockchain Technologr, last mile problem, Verification cost reduction
in blockohain, Bootstrapping network effocts.
Tert Books :
1. Gaur, Nitin and et al, Hands-On Blockchain with llyperledger: Building decenfialized
$
applications with Hyperledger Fabric and Composer (l ed.), Packt Publishing Ltd, 201 8.
ISBN 9781788994521.
2. Pathak, Nishith and Anurag Bhan dxi, IoT, AI, and Blockchain for. NET: Building a Nert
Generarion Applicationfrom the Ground Up (1* ed.), Apress, 2Ol 8. ISBN 9781484237083.
Refersnce Books :
l. Bashir and Im raa, Mastering blockchaik: " Disttibuted ledger technologt, deeentralization,
and smart contracts explained" (lst ed.), Packt Publishing Ltq 2018. ISBN
9781787125445.
Assessment Schsme
.)
Components Intornrl Ass$sment Mid Tc?m Ex.m End Exsm fohl
R r
G reater Noida
Bennett UniversitY' 24 of Go!t, ot Uttar Pradesh)
{Established U nder Act
ch Zone-l
irlot No's 8, 9, 10, 1 1, Te
Greater N oid a-201310
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET227 System and Network Security t. T P C
Owning SchooUDepartment Department of Computer Science J 0 2 4
Engineering
Pre-req uisites/Exposure
CO-PO/PSO Mapoine
) POI PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 POl0 POI I POt2 PSOI PSO2 PSO3
COI 3 3
,, ) 3 3 2 3 ,
co2 3 3 a 3 1 3 3 3 1 2
co3 3 3 3 1 2 a 3 3
Course Contents:
,\
l/il
R6tIr$far
Bffiett UniversIY, Creater Noida
{Eslablished Uir.l.,il Act 24 oi Govi, ol L.lllar FraCesh
irlot No's 8, s. 10, 11, lbcn Zorre-
Greate. Noida-201310
Generic Security Software's, Windows Firewalls, Linut Firewalls, Access Control Lists of Firewalls,
Types and Examples of Firewalls, Networt-based Honeypots and Trapdoors, virtual Private Network
and its Implementation, Network Intrusion Detection System, Network Intrusion Prevention System,
Router S€curity, Switch Security, Proxy Server and its Configurations, Load Balanc€rs, IPv6 and IPv6
Security, Secure Forwarding in Overlay Networks,
Text Books :
l. R. Bragg et al, Nefieork Security: The Complete Reference (l st ed.), TMH Publications,
2017. rsBN 978- 0070586710.
rd
2. W. Stallings, Nework Security Essentials: Applications and Standards (3 ed.), Pearson,
2018. lsBN 978-0132380331.
Reference Books :
l. Joseph Migga Kizza. Guide to Computet Nefirork Secun ry, (56 ed.), Springer.
2020. ISBN 978303038 t 40.
AegesgsqeglSsbse:
)
Componerts Internal Assessment Mid Tsrm Exam End Exam otsl
t'
Welghtage (o/o) 3sYo 30olo 35o/o OOo/o
I
,)
ffigig1s*'*i*m,
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET228 Data Mining and Predictive Modelling I, T P C
Owning School/Department Department of Computer Science 3 0 2 4
Engineering
Pre-req uisites/Exposure
COl: To articulate data preparation for data mining and analyzing based on pre-processing
techniques.
CO2: To examine predictive analysis in various use cases.
CO3: To make use ofexploratory data analysis to gain insights and prepare data for predictive
nrodelling.
CO-PO/PSO MaDDins
POI P()2 POI PO4 PO5 PO6 PO7 PO8 PO9 PO t0 POtl POI2 PSOI PSO2 PSO3
., .,
cor 3 2 2 2 2 2 2 2 2 2
c()2 2 3 2 1 2 , 2 2 2 'l 1 2 2
co3 2 2 2 2
Course Contents:
Text Books :
1. Bruce Rlatner, Stalistical and Machine-Learning Data Mining Techniques fot Belrer
Predictive Modeling and Analysis (3rd ed.), Chapman and Hall/CRC, 2017. ISBN 978-
1498797603
2 Dursun Defen, Pr edictive Analytics (lsted.), Knime,2020. ISBN 9780136738516.
Refe Books :
l. Mohammed J. Zaki and Wagner Meira, h, Data Minimg and Machine Learnr'ng (lst ed'),
Cambridge University Press, 2020. ISBN 9781 108473989.
Assessment Scheme
*fur,n,,
E6loet(U niv er sitv. G re ater N oida
(EsT6!; I'e,l Lrc.: ..c! , i ;' (.o\,1. or Urtar Pradesh)
Plot No'sB, S, 10, 11, Tech Zone-li
Greater Noida-201 31 0
Name of Program Bachelor of Technology (Computer Science
and Engineering)
CSET229 Game Engi ne and Architecture I, T P C
Engineering
Pre-requisites/ExPosu re
COl: To explain concepts ofunderlying game engines' Solve practical 3D game problems
CO2: To lmplement Game control systems for multiplayer games using Human
Interface
DevicesandanalysethebasicfeaturesofPhysicsforGames;Illustratethecollisiondetection
systems used in games.
CO.PO/P SO Ma nDlnp
)
P()6 PO7 PO8 PO9 PO l0 POI I PO l2 PSOI PSO2 PSO3
POt PO2 PO3 P04
,|
PO5
, 2 1 2 a 3 , 3
cot 3 2 3 2 2
co2 2 3 a , 2 2 2 2 1 1 2 3 ^,
Co urse Contents:
10 lecture hours
Module l: Base layer'
Curn" g.gir", Engine Differences Across Genres, Runtime engine architecture:-
rtl"rno.y,luv"i, uility, tvtooute, Management, Gameplay, Build layers' Asset Pipeline' Pre-
."rJ.rirg plir"fi*, ruii:o pip.iin", Gime profiler, Tools for optimization of games' Types of
p.ont"riV"oion control in game ;evelopment, Best Practices in version control' Issues and
;;i;ii;r;, engine and ieatures, Unieat engine and features, Amazon Lumberyard and
Unity
features, cryEngine for VR and features
l: l0lecture hours
) Modulo I
Water rendering' Lightening
Engine Levels, Game Engine VR Modes actors, Landscape'
and Environment, Capsule shadJw, Iighr mobility. and types of lights' Volumetric clouds'fog
functions' and flow
effects. Level streaming, Hierarchal tivel of detiils, Blueprints, Variables'
Toolset, occlusion Culling,
controi, rimetines and b-lueprint classes, Render To Texture Blueprint
and scripting' Actor
Render targets, Real time iaytracing, Frame Rendering tool, Programming
Architecture' Gameplay classes and
Co*.un;""ution, Blueprinl visual lcripting, Gameplay
Threaded rendering' Mesh
functions. Interfaces. Craphics Programmin'g, Shader development'
drawing pipeline, Slate UI Framework.
Gre:lter Noida
rtu niversitY, G0,4
Be 2,1oi Li Urtar Pradesh)
lEst3blrshed UrrderAct
11, Te clr /-one-l
Plot No' S8,9, 10,
Greater Noida -201310
rigging toolse! Skeletal Mesh Animation System, Sound in gaming, Ambient Zones, Sound
classes, Audio Engine and mixer, Sound Attenuation, Sound cue.
lmporting and integration media objects, Asset manag€ment, Asset Build tool, Automation
tool, tesing and Gtimization, performance and profiling, Animation System Architeeture,
Animation [lending, Animation pipeline, Skinning and Matrix Palette Generation, Skeletons
-controller
496x, Animation Coiision and Rigid Body Dynamics, Collision/Physics
uiddleware, The Collision Detection System' Rigid Body Dynamics, and Advanoe physics
features.
Text Books :
l. Jason Cregory, Jeff Lander and Matt Whiting, Game Enginefrchiteawe (3rd ed'), A
K Peters/CRC Press, 20l8. ISBN 978-l 138035454.
Refertnce Boo}s :
1 Heather Maxwell Chutdler, Game Prod.uction Hardbook (3rd ed.), Jones & Bartlett,2013.
) ISBN 97E- 1449688097.
Assessment Scheme
col: To articulate Devops engineering and Devops terminologies to meet the business
requirements.
co2: To construct different applications of Devops that can be used on different platforms.
CO3: To design and execute projects using different tools, modules, and templates'
CO-PO/PSO Maooins
)
POI Pro2 PO3 P()4 PO5 PO6 PO',7 PO8 PO9 POl0 POI I PO l2 PSOI PSO2 PSO3
col 3 2 2 a , 2 2
,, .|
2
.|
3 , 2
co2 ) , 1 3 , 2 2 2
.,
2 1 2
co3 1 3 2 3 2 2 2 3 2 3 3 2 2 J
Course Contents:
Process and Product, Building Teams, Boston Consultancy Group (BCG) Matrix, Three
Horizons Model, Autonomous Team and its Pros and cons, Autonomy criteria, Decoupling
Point for Autonomous Team, Case Study on Autonomous Team, DevOps and ISTM (lT
service and Management), Traditional vs Agile Devops, DevOps Phases with diagram
) representation, lntroduction ofSource and Version control(svc), Algorithms for SVC: Lock-
Modi!-Unlock and Copy-Modifi -Merge, Continuous Integration, and Deployment (CICD)'
Software Craftsmanship, Software Containerization, System Provisioning, and Configuration
Management, Testing and Test Automation.
Re
{:r\ tt University, Cr i'erl r::r Noida
blished Uiriier Aci 24 oi Govi, of U rt.r P,adesh)
P lot No's B, 9, 10, 11 Tec h Zone-ll
'
Greater Noida-20131 0
and connection ofNode to organization, operations on Node, object and Search, Creation
of
Environments and Connecting them with Servers.
) Gene Kim, Kevin Behr, and George Spafford, The Phoenix Proiect (5th ed'), IT Revolution
Press,20l9. ISBN 978- 1942788294
Assessme nt Scheme:
35 100
Weishtage (%) 50 15
t-::
..: l
l. :.lt -,:i..,lle-il
ri., l0
Name ofProgram Bachelor of Technology (Computer Science
and Engineering)
CSET231 Programming Methodologies for Backend L T P C
Develo m€nt
Owning School/Department Department of Computer Science 2 0 4 4
Engineering
Pre-req uisites/Exposure
COl: To articulate the client-Server architecture and the basics ofback-end technologies
and tools.
CO2: To examine sewer-side programming languages like PHP and Nodejs.
CO3: To connect with database with the help of server-side scripting-PHP and MySQL'
Nodejs and MongoDB.
co-Po/Ps O Mennins
POI PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 POt 0 POt I PO l2 PSO I PSO2 PSO3
col 2 3 I 3
co2 3 I 3
co3 2 3 I 3
Course ontents:
i tll
n nett Universilv,
-ol
G reater Noida
(Eslall 1..i,'.d U1d.r Act 14
(iovl o'Lltlar Pradesh)
Plot f*ot S, g, 10, 1'1, Tech Zone-ll
Greater Noida-2O1 31 0
Text kr:
1. Henon David, Node.js Web Development: Server'side web development made easy with
Node tuing practical examples (5th ed.), Packt Publishing Limited, 2020. ISBN 978-
1838987572.
Reference Books :
1. Zammetti Fratk, Modern Fqtl'Stack Development: tlsing TypeSuipt, React, Nodeis,
'tfiebpack, and Docker(lst ed.), Apress, 2020. ISBN 978' 1484257371
Assessment Scheme
)
Name of Program Bachelor of TechnologY (Computer Science and
trngineering)
CSET232 Design of Cloud Architectural Solutions L T P C
COl: To learn stack of cloud architecture and design guidelines ofthe final product
C02: To build the cloud architectural blueprint for deployment'
CO3: To deploy and implement cloud architectural designed solution'
CO-PO/PSO Maooine
Course Contents:
FI
Be cr::ily, Grcatc: l'lotda
.. r.,(,i1.t.. U:.il '',.:1.)
PIoi I'i c' -), i3, 1 1 , lbch .rr:ne-ll
Greatei r-2-01 -110
Case Study of a federated cloud, Mobile "backend" as a seruice (MBaaS), Serverless
computing, Business Processing as a service (BPaaS), Virtualization Demo vs
Containerization Demo, Virtualization and Containerization, Virtualized Operating Systems,
Resource to OS-Hypervisor communication, Design of virtualized Database CIusters, Cloud
Regional Backbone Nelworks, Network Troubleshooting, Transcoding and Serving Video
Files Example, Stream Processing Example, Sensor Network Data lngestion and Processing
Example, Application Backend Example.
Text Books :
1. Goessling Scott and Kevin Jackson, lrchitecting Cloud Computing Solutions: Build cloud
strategies that atign technolog,t and economics while elfectively managing rrtt (lst ed.),
Packt Publishing, 2018. ISBN 978-1788472425.
Reference Books :
1. Bahga Arshdeep and Vijay Madisetti, Cloud Computing Sohttions Architect: A Hands-On
Approach (lst ed.), Vpt, 2019. ISBN 978194997801X .
Assessmen t Schem€:
R r
Be ett Universi ty, Greater Noida
(Eslablished U nderAcl24 of Govt,
of Ultar Pradesh)
Plot No's 0, 9, 10, 11, Tech Zone-ll
Greater N oida-20131o
Name of Program Bachelor of Technology (Computer Science and
Engineering)
ECSE2STM Data Structure Fundamentals L T P C
Owning School/Department Department of Computer Science 4 0 0 4
Engineering
Pre-requisites/Exposure
COI: To articulate data preparation for data mining and analyzing based on pre-processing
techniques.
CO2: To examine predictive analysis in various use cases.
CO3: To make use ofexploratory data analysis to gain insights and prepare data for predictive
) modellhrg.
CO-PO/PSO Maooins
POr P()2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 POl0 POt I POt 2 PSOI PSO2 PSO3
col t 3 I 2 ", 2
coz 3 3 a 2 2 t a 3 2
co3 3 3 2 2 2 2 a 2 3
Course Contents:
Re r
B e il Unlversity, Greater Noida
(Es '-'i 5 rj U.,Jcr /.cl 2.1 of (;f,v4 clU.:.rPrrdcsh)
Plo t No's B, 9, 10, 11, Tech Zone-ll
Greater NoiCa-201 310
Addressing, Double Hashing, Graphs, Adjacency matrix, Adjacency list, Incidence matrix'
Graph traversal, BFS, DFS.'
Text
l. Balagurusamy E., Data Structures (l ed.), McGraw Hill Education,2019' ISBN 97E.
93s3161835.
Reference Books :
[email protected],DataStrusturesUsingC(led'),CRCPress,202l'ISBN
ISBN 978-1000470741..
Assesspent Scheme
l.ie
0?/
giti/;;v
liln'f " li ' rrilv, crea Jr Noida
r
CO-PO/PSO Mappins
)
POI PO2 PO3 PO4 PO5 t()6 PO7 PO8 PO9 POt0 POt I POl2 PSoI PSO2 PSO3
col I 2 3 I 3 I
co2 I 2 1 I 3 I
co3 I 2 3 I 3 I
Course Contents:
vp
' . i': 'i, i:r
,: . ---[[ r)
:lr 7 l'r,:
Dynamic Programming The Principle of Optimality, 0-'l knapsack problem, Matrix chain
multiplication, All Points Shortest path (Floyd Warshall algorithm), Exploring Graphs: BFS,
Applications ofDFS- bi-connectivity, Backtracking and Branch and Bound, The Eight queen's
problem, Graph Coloring
Text Books :
1. Cormen Thomas H., Charles E. Leiserson, Ronald L. Rivest and Clifford Stein,
Introduction to Algotithms (4h ed.),The MIT hess, 2022. ISBN 978-02 62367505.
2. Rocca Marcello La, Advanced Algorithms and Data Structures (lst ed.), Manting,2021.
ISBN 978-1617295485.
Reference Boola :
l, Karumanchi nasimha, Algorithm Design Techniques: Recursion, Baclaracdng, Greedy,
Divide and Conquer and Dywmic Program (lst ed.), Career Monk Publications, 2018.
ISBN 978-8193245255.
)
Assessment Scheme
,-M*,,
Rf;f: !,u.liY:f iiir', Grs; i-p r!r;ir,
gB
* l,: r',igl,ri1','il i"f#Yi,
Name ofProgram Bachelor of Technology (Compuler Science and
Engineering)
CSET32O Informalion Retrieval L T P C
Owning SchooUDepartment Departm€nt of Computer Science 2 0 2 3
Engineering
Pre-requisites/Exposure
COl: Comprehend types oftext analysis, Information retrieval, IR syslem architecture, query
processing models and probabilistic models.
CO2: Manage information retrieval systems by perfonning indexing, compression,
information categorization sentiment analysis, network managenrent, search engine
optimization, records compliance and risk management.
C03: Implement different information relrieval approaches for applications in texl domain.
)
CO-PO/PSO Mannins
POt t)o2 PO3 P()4 PO5 P()6 PO7 PO8 PO9 POt0 POt I POt2 PSOI PSO2 PSO3
cor 3 2 2 3
c02 3 2 2 3 I 2 2 2
c03 2 I 2 2 ) 2 I 2
Coulse Contents:
., ')
;l: , r.;-r:-ti
Module |ll: g lecture hours
Indexing, Inverted indices, Index components and Index life cycle, Interleaving Dictionary
and Postings Iists, Index construction, Query processing for ranked retrieval, Compression,
General-purpose data compression, Symbol-wise data compression, Compressing posting
lists, Cornpressing the dictionary, Information categorization and filtering, Classification,
Probabilistic classifiers, Linear classifiers, Similarity-based classifiers, Multi category
ranking and classification, Leaming to rank.
Text Books :
) l. Buttcher Stefan, Charles L. A. Clarke and Gordon V. Cormack, Information Retrieyal;
lmplemenling and Evaluating Search Engines (l ed.), The MIT Press. 2016. ISBN 978-
0262528870.
2. Croft W. Bruce, Donald Metzler and Trevor Strohman, Search Engines - lnformation
Retrieval in Practice (l ed.), Pearson,2009. ISBN 978-0136072249.
Refe Books :
l. Bates, M. J., Understanding information retrieval systems: managemen| types, and
standards (l ed.), Auerbach Publications, 201 l. ISBN 978-1439891964.
Assessment Scheme
RWv,,
f -'4{ li I li.:J Tq,. ., C'renter- I\loicja
(l:tl,ll i : I li :r' *l I c,i ajo.l, ol Iltt.r Prailesh)
1'
[:l.rt iic,' ; U, !), -lir, 1 i, Iech Zorre-ll
Gr,]at:ri- [ :ci{-ia-11[)i 31 0
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET321 User Centered Design I, T P C
Owning School/Department Department of Computer Science 2 0 2
Engineering
Pre-requisites/Exposu re na
)
CO-PO/PSO MaDDins
POt Po2 PO3 PO4 PO5 PO6 PcJ1 PO8 PO9 POl0 POI I PO t2 PSOI PSO2 PSO3
col I 2 3 3 I I
co2 2 2 2 2 , 3
c03 2 3 2 3 J 3 3 2 I 2
Course Contents:
Etil
"#.. .. ,, .. : :.j i(lx
.| .: ' :,,;i r, Ii.,i'ih)
, . '.t i: I i ,,, 'i , , ,i-:e;ir .l".li:e-ll
ri,-i..:.:1:,.,;.ri0
Basic organization schemes, Hybrid schemes, Shallow vs. deep structures, Labelling systerns,
Information Architecture, Affinity diagrams, card sorting techniques, card sorting tools,
Getting sign-offon the contract for design, using concept sketches to drive out requirements,
Setting usability criteria, Scenario and rask Analysis: The power of a scenario, Scenarios vs.
use cases, Determining the level of detail, Scenarios driven priorities. Scenario and Task
Analysis: Identifoing functions and tasks, common errors and challenges in task analysis,
Characterizing the new task design, Primary Noun Architecture: Value of primary nouns,
Identifoing primary nouns, Domain Analysis, Requirement analysis.
Text Books :
1. Lowdermilk Travis, User centred design: A Developers Cuide (l ed.), O,Reilly Media,
20 r3. ISBN 978-1449359805.
Referen Books :
I . Steve Krug, Don't make me think Revisited: A common sense approach to web usabitity (3
ed.), Berkeley CA: New Riders Publishing, 2020. ISBN 978-032t965516.
) 2. Travis, D., and Hodgson, P.,Think Like a UXResearcher: How to Observe Llsers,Influence
Design, and Shape Business Strategl (l ed.), CRC Press,20l9. ISBN 978-l 138365292.
Assessmen t Scheme
Mt
F' '
- ,r (-li ' r i I r:-ll:
;il r; ;'ll)
.,\, -.rirZ:,;r':-li
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET322 Secure Codi L T P C
CO1: To explain secure programming philosophy. design principles, and its methods.
CO2: To examine typical mistakes done during programming and the methods of their
handling.
CO3: To implement the typical threats in prograrnming and understand concepts of
implementing the secure codes.
CO.PO/PS O Mannins
POI PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO t0 POI I PO l2 PSOI PSO2 PSO3
1
col 1 2 2 2 2
c02 3 3 , 3 2 1
3 1
co3 I 3 3
Course ontents:
,fu:
ct.1
ll a
(JSSE), Common Coding Enors and Vulnerability, Automation and Testing for secure coding,
Research Issues in Secure Coding.
Text Books :
l. Richardson T. and Thies C. N., Secure Software Design, Jones & Bartleft Leaming (l ed,),
Jones & Bartlett, 2012. ISBN 978-1449626327.
Reference Books :
l. Codings Zach, Computer Progranming and Cyber Security for Beginners (l ed.),
Independently published, 2020. ISBN 978-l 801091442.
2. Seacord Robe( C., Secure Coding in C and C++ (2 ed.), Pearson Education, 2013. ISBN
978- 0321822130.
Assessment Scheme
,h/,.
a{Krar
Bennett U tive:.s;t),, Greater Noida
b%1',il',";, r:' i'; :!','I# ;;'!;X:'l,l
Lireater N;oida-201 31 o
Name ofProgram Bachelor of Technology (Computer Science and
Engineering)
CSET323 Compiler Construction L T P C
Owning School/Department Department of Computer Science 2 0 2 3
Engineering
Pre-requisites/Exposure
) CO-PO/PSO Maooinp
POt P02 PO3 PO4 PO5 PO6 PO7 PO8 P(]9 PO t0 POI I PO t2 PSOI PSO2 PSOS
col 2 2 I 3
co2 2 I I 3 2 , 3
co3 3 3 ) ) 3 2
Course Contents:
Text Books :
1. Sunitha, K. V. N., Compiler construction (l ed.), pearson Education India 2013. ISBN
978-9332500297.
2. Thain Douglas, Introduction to Compilers and Language Design (2 ed.), Lulu.com, 2019.
rsBN 978-035914283s.
Assessment Scheme
U/
Reoj/fiar
Be&'d-it U n,versity, Greater Noida
(Bl rlill:.-'J Il'd:r /:::rtr (" (':nvl of Ultar Pradesh)
Plot Nc'r 3. C. 10. 11, Tech Zone-ll
Gr€atei Noida-2013'10
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET324 Software Project Management L T P C
Owning School/Department Department of Computer Science 2 0 2 3
Engineering
Pre-requisites/Exposure
COl: To articulate and determine the purpose and importance of basic processes involved in
project management from the perspectives of planning, tracking and completion of project.
CO2: To examine different organization structures and project structures.
CO3: To implement programs to manage project management. project schedule, expenses and
resources with the applications of project management 1ools.
CO-PO/PSO Mannins
POI PO2 PO3 PO4 PO5 I'O6 PO7 PO8 PO9 PO t0 POll POt2 PSO I PSO2 PSO:l
cor 2 I 3 3 t 2
c02 I 2 l 3 3 3 3 3
c03 I 3 3 3 2 J 2 2 2 3 3
CouI.lSe Contents:
4fr.
Project Communication
assignment, resource loading, Resource levelling, Team structures'
tlarining, Performance reporting, Managing stakeholders'
ProjectRiskManagementplanning,Commonsources.ofrisk,Riskidentificationtechniques,
qr"titutir" risk aialysis, Experi judgement, Decision Expected monetary value'
-trees' & control' Projecl
S-irofutior, sensitivity analysii, nist response planning, Risk monitoring
pr'o*r...r, .unug.n,.nt ilun., Contrac; statement of work' Planning contracts' Requesting
seller responses, seiecting sellers, Administrating the contract,
closing the contract, software
elements (SCI's)'
Configuration Managemint, Retaining versions, Software Configuration
Change Control and Management.
Text Books :
A practitioner's approach (9
1. Pressman Roger and Bruce Maxim, Software Engineering:
ed.), Tata McGraw Hill, 2020. ISBN 978-1259872976'
Referetrce Books :
for Sofrware
1. Aggu*ul M*uj and TetraTutorials Team, The Art of Project Management
) oii IT Engin""r, (l ed.), Packt Publishing, 2018' ISBN 97E-1789804768'
Assessment Scheme
20 35 100
Weightage (%) 45
()
W,
EEHI#(r",**ity, Grvl, Greater Noida
;;,il ;.','l ,i .r...i ii
. 2.1 ui uiLv Pridesh)
FiJi ftu'Jl, s, io, 11, Tech zone-ll
Greatei ficica-201310
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET325 Digital Communication L T P C
Owning School/Departmenl Department of Computer Science 2 0 2 .,
Engineering
Pre-req uisites/Exposure
CO-PO/P Maoninc
POI P02 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO t0 POI I PO t2 PSO r PSO2 PSO3
col 3 I I I 2
co2 t 3 I I I 1 3
c03 3 2 3 3
Course Contents:
Text Books :
I Proakis J.G. and Masoud Salehi, Drgfta I Communication (l ed.), McGraw Hill, 201g. ISBN
978-9353163020.
Refe nence
I Lathi B. P., Zhi Ding, Modern Digital and Analog Communication (5 ed.),
Oxford
University Press, 2018. ISBN 978-0190686840.
Assessment Scheme
")
.w_
pendSft t rnivcr.;ly, Greetcr Noida
Fi", a'C' i ;:!q;',.r:i[ *,i:1,1
G "Li;Nr.i,:la-20 1 :r 1 0
reater
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET326 Soft Computing L T P C
Owning SchooUDepartment Computer Science Engineering and 2 0 2 J
Technology
Pre-requisites/Exposu re
COI: To comprehend the fuzzy logic and the concept of fuzzy set theory in soff computing.
CO2: To examine Neuro-Fuzzy and Genetic Algorithm expert system.
CO3: To implement applications on different soft computing techniques like Fuzzy, Multi
Objective optimization and Genetic Algorithm (GA).
) CO-PO/PSO MaDDins
POI PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO t0 POI I PO t2 PSOI PSO2 PSO3
col 3 2 2
c02 3 ", 2 3 2
co3 3 I 3 , 3 3 2 3
Course Contents:
1.,{.:
)I:.ii,,-.Crlili-r, l\r,1,:C;i
.l,,:li 1.. r,l ,t)
I .):ti,-ii
Evolutionary Algorithm, Ant system, Ant corony optimization, Max-Min Ant
system, Ant
Miner, Snake-Ant Algorithm, particre Swarm optimization, Artificiar Bee corony, cuckoo
Search Algorithm, working architecture, co-evorution, plasticity and life-tim; Iearning,
Lamarckian learning, 'No free lunch.' theorem, Hybrid fuzzy controller, Ftzzy Logic
Controlled Genetic Algorithms.
Text Books :
l. Kaushik Saroj and Sunita Tiwari, soft Computing, Fururamentars, Techniques and
Applications (l ed.), McGraw-Hill Education, 201 8. ISBN 978-9353160678.
2. Sivanandam, S. N., and Deep4 S N, principles of soft compuring (l ed.), John Wiley &
Sons, 201 l. ISBN 978-8126527410.
) Reference Books :
I . Buontemp F., Genetic Algorithms and Machine Learning
for programmers (l ed.\,
Pragmatic Bookshelf, 2019. ISBN 978-1680506204.
2. Gridinl., Learning Genetic Algorithms with python ( I ed.), BpB publications, 2021 . ISBN
978- 8t94837756.
Assessment Sc heme:
")
R I
l-lni ic:"si1v, Greater I'loida
(Eiii.Ll.l i,i: I li I r /,,r' :.;'ri (:l,r!-i, i l U,t r i,r,'iacsh)
Plot i\io'j Ij, I, 1U, Ii, Tech Zone-ll
Grcetlrr Nir;,irla-201 31 0
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET327 Embedded Systems L T P C
Owning SchooUDepartment Department of Computer Science 2 0 2 J
Engineering
Pre-requisites/Exposu re
CO-PO/PSO Maonins
Text Books :
L Shibu K. Y., lnrroduction to Embedded Systems (2 ed.), Tata Mccraw, 2009. ISBN 978-
93392t9680.
2. Kamal Raj, Embedded Systems Architecture, Programming, and Design (2 ed.), Tata
McGraw Hill, 2008. ISBN 978-9332901490.
Reference Books :
) l. Barry Peter and Patric Crowley, Intel architecture for Embedded sysrez (l ed.), Morgan
Kaufmann, 201 2. ISBN 978-01 239 I 4903.
2. Woff Wayne, Computers as Components: Principles of Embedded Computer System
Design (4 ed.), Elsevier, 2020. ISBN 978-0128053874.
Assessment Scheme:
i'('r'i :: i\1.,i{i.l
, lr, ,,-iit i,r.,r;c-ii
1l::': i)
Name ofProgram Bachelor of Technology (Computer Science and
Engineering)
CSET328 Distributed com putin L T P C
Owning SchooUDepartment Department of Computer Science 2 0 2
Engineering
Pre-requisites/Exposu re
col: To articulate the moders, architectures, and the concept of virtuar clock and crock
synchronization. (BTL-2).
co2: To examine the algorithms for mutual exclusion, deadlock detections. and termination
detection. (BTL-2).
Co3: To irnplementing the concepts ofdistributed computing on Googre Fire System
, Hadoop
Distributed File System ( HDFS ), and sensor networks. (BTL-3).
CO-PO/PSO Mannins
POI PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO t0 POr I POl2 PSO I PSO2 PSO3
col 3
co2 l
3 2 2 3
co3 2 3 3 2 3 2 3
Module 1:
E lecture hours
Introduction, process communication, Message passing, Leader Election, Leader
election
algorithm, Distributed Moders, causarity and Logicar rirne, Size of vector
clock, Matrix
clocks, virtual Time and physicar crock Synchronization. Grobar state and
Snapshot
Recording Algorithms, Distributed Mutuar Excrusion and Non-Token
based Approaches,
Quorum Based Distributed Mutual Exclusion Approaches: Maekawa,s Algorithm.
Modulo Il: T lecture hours
Distributed Mutual Exclusion-Token based approaches, Consensus & Agreement,
checkpointing & Rollback Recovery, Deadlock Detection in Distributed svstems.
Approaches' Algorithms for deadrock detection: path-pushing. Edge Chasing,
Diffusiorr
compution. and GIobal state detection Distributed Shared Memory, Features and
advantage,
Distributed Minimum Spanning Tree.
Module lll:
7 lecture hours
Termination Detection, Huang's argorithm, Message ordering & Group
Communication,
Fault Tolerance and self-stabirization, Distributed Randorniied Argoiithms,
Distributed
Hash Tables and Peer to Peer Computing.
t,'r.,ir
,. ', ; .,-,r,:a,-il
.;iriil
Module IV: 13 lecture hours
Case Studies: Google File System and HDFS, Distributed Execution using Map Reduce,
Introduction to spark, Introduction to Sensor Networks, Distributed Algorithms for Sensor
Networks: Coverage and Connectivity, Topolory Discovery, LEACH Cluster based Low
-
Power Algorithm, Authentication in Distributed systems, security in Distributed systems and
Block Chain.
Text Books :
1. Maarten Van Steen and Tanenbaum Andrew S., Distributed Systems (3 ed.), Amazon
Digital Services, 2017. ISBN 978-1543057386.
Reference Books :
l. Aspnes James, Nores on Theory of Distributed Sys/ens, yale University,
202 Lhttp://www.cs.yale.edu/homes/aspnes/classes/465/notes.pdf.
Assessment Scheme:
Dll,.
Reg${ar
B:nr{clt Lrnivcrsity, Greater Noida
(Eii?biiih.d U-i,rAci 2,'1of Gc\,t, of U[ar predesh)
Plot i,lo's 8, 9, 10, 11, Tech Zone-ll
Greater Noida-20'1310
Name ofProgram Bachelor of Technology (Computer Science rnd
Engineering)
CSET329 Engineering Optimization L T P C
Owning SchooUDepartment Department of Computer Science 2 0 2 J
Engineering
Pre-requisites/Exposu re
COl: To articulate, Identi! and develop operational research models from the verbal
description ofthe real system.
CO2: To examine the mathematical tools & software that are needed to solve optimization
problems.
CO3: To analyze the results to resolve resource optimization.
CO-PO/PSO Mannins
POt PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO l0 POtl POt2 PSO I PSO2 PSO3
cot 2 I I I 2 I 3 2 3
c02 3 , 3 2 3 t I )
co3 I I 3 2 ) 3
Course ontents:
t/'
ry
Module III: l0 lecture hours
cenetic Algorithms, Differentiar Evolution, particle swarm optimization, Ant corony
optimization, crow
Search Algorithm, Firefly Optimization Algorithm, Harmony Search
Algorithm, TeachingLeaming-Based
optimization, Honey Bee Swarm optimization Algorithm, Reduced Basis Technique,
Design variabre
Linking Technique' Incremental Response Approach, Basis vector Derivalives
, of Statio Displacements
and stresses, Multi-objective optimization, paraller processing, utility
Function Merhod, Inverted utility
Funclion Method. Global criterion Method, Bounded objective Function Method,
Lexicographic uethoi,
Goal Programming Method, Coal Attainment Method, Game Theory Approach,
Inventory problem: A
Supply chain Perspective, static Economic-order-euanrity Models,
Dyriamic Eoe Moders, sticky rssues
in lnventory Modeling.
Text ks:
1. Singiresu S. Rao , Engineering Optimization Theory and practice (5
ed.), John Wiley & Sons, 2019
rsBN 978- l I19454?17_ I
,.,'
Reference Books :
l. Taha H.A, Operotions Research: An rntrodaction (10 ed.), pearson clobar Edition,2ol7. ISBN
) 978-0t34444017.
Assessment Scheme
ln,
&Wstrar
,fcr rnctt Univcr.;it5r, Greater Noida
(Establisircd lJi:rji,rrA0t 24 olOod, of Utlar Pradesh)
Plot No's B, 9, 10, 11, Tech Zone-ll
Greater Ncida-201310
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET33O Wireless Networks L T P C
Owning School./Department Department of Computer Science 2 0 2
Engineering
Pre-requisites/Exposure
COI: To explain where the wireless technologies can be applicable and evolving wireless
technologies and standards.
CO2: To articulate the architecture of various wireless technologies.
CO3: To experiment with various wireless technologies through hands-on projects.
CO-PO/PSO MaDDins
Counse Contents:
i ':r i-
'-,- ,. (.':" i-i: r ir|--::1,r
r.. ., t r ,. ; , . ) , .. l r i l r
.
r
Text Books l
C ommuntcation Networlcs and Systems (l ed')' Pearson'
1. Beard C and Stallings W. , Wireless
201 5. ISBN 978-l 292108728.
2.GordonColbach,lfiiretessNetworking:IntroductiontoBluetoothandWiFi(1ed.)'
Independently Published, 201 7' ISBN 978-19732521 l5'
Reference Books :
'1. velrajan saro, An Infioduction to 5G lnireless Networks ('l ed'), Amazon Digital services
LLC - KDP Print US,2020. ISBN 979-E643303107'
) and Candidate
2, Vannithamby R. and S, Talwar, Towards 5G: Applications' Requirements
Technologiis (1ed.), John Willev & Sons,20l7' ISBN
978-l I18979839'
Assessment Scheme
20 35 100
Weightage (%) 45
R r
t University, Greater Noida
(Eslabriai:. a l.liid.-.r Acl2,l of Govl, of Ultar Pradosh)
Plot hJc:; 8, 9, 10, 11, Te ch Zone-ll
Greater I'loirJa-201 31 0
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET33I Combinatorics L T P C
Ownin g School/Department Department of Computer Science 2 0 2 J
Engineering
Pre-req uisites/Exposu re
) CO-PO/PSO MaDDins
I POr PO2 PO3 PO4 PO5 P06 PO7 PO8 PO9 PO t0 PO PO t2 PSOI PSO2 PSO3
col ) 2 2 a I I I I 2
,|
coz 3 2 2 I 3 2 2 2 2 2 3 3
cc)3 2 I 2 I I 2 3 2 ) 2
Course Contents:
WL
(
/ .r i:)
[-
r-:tt):.oriu'-li
(
Mobius function of poset, Famous Number Families, Multinomial Coefficients, Fibonacci
Numbers, Lucas Numbers, Stirling Numbers, lnteger Partition Numbers, Bell numbers,
Recurrence Relation and Generating Functions, First order recurrence relation, Second order
recurrence relation, Non- homogeneous recurrence relation.
Text Books :
l. Bona M Mikfos, A llalk-Through Combinatorics: An Introduction to Enumeration and
Graph Theory@$ ed.), WSPC, 2016. ISBN 978-9813148840.
Reference Books :
) I Mladenovii Pavle. Combinatorics: A Problem-Basecl Approach (lst ed.), Springer, 2019
ISBN 978- 3030008307
.ut,
nqllyfur
B(. r,: tt t ri:ir.,:rsily. Greatcr N!oida
(9Lr... :1 ,.:.{,.l::c;L:.r.c'Ur: .r l-i- i. rh)
Pict f .j,..r': Lr, 3, 1(), 1 1 , Tcclr Zorr:-ll
Grcatei- I'Jcicla-20 1 310
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET332 Mobile and Networked f,mbedded Systems L T P C
Engineering
Pre-requisites/Exposure
co- MaDDinE
)
POI P()2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO l0 POll PO t2 PSOI PSO2 PSO3
col 3 1 3 I 2 2 I I 2 3
co2 2 I 2 I 1 1 I 3 2 2 I 3 2 3
,,
co3 , 2 2 ", I ) I 2 1
Course Contents:
Text Books i
1. Chattopadhyay 5., Embedded System and Design (2nd ed'), Prentice Hall India Learning
Private Limited, 2013' ISBN 978'8120347304.
Reference Books :
1. Lyla B. Das, Enbedded systems: an Integrated Approach (lst ed,), Pearson Education India,
20 12. ISBN 978-933251 167 5.
2. Peckol, Enbedded Sl,srerirs (2nd ed'), Wiley, 2019' ISBN 978-11 19457497'
Assessmont Schcme
Res
Ben rsity, Greater Noida
Ad 24 of Goq ofuttar Pcdesh)
lot o's 8,9, 10, 11, Tech Zone-l
Grnat":r Noida-2O1310
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET333 Problem Solving using C L T P C
Owning School/Department Department of Computer Science 2 0 2 3
Engineering
Pre-req uisites/Exposu re
COI: To explain various concepts in C programming language and understand the problem-
solving aspect.
CO2: To Implement concept ofpointer and perform I/O operations in files and make use of
concepts in finding solutions to real-life problems.
CO-PO/PSO MaDDins
)
POI PO2 P(X PO4 PO5 P()6 PO7 PO8 PO9 PO t0 POI I PO l2 PSOI PSO2 PSOI
,,
col 3 3 I 2 2 I t 2 I I I 2 I
., ,,
c02 2 2 I I I 2 J I
Course Contents:
Program structure, Communications with the Operating System, Library Functions, Pre-
processor Directives, Debugging and Efficiency, Memory Models. Data Types-Simple C data
types, Integer Data types, Floating Point types, Derived Data types, The ASCII Character Set,
Compilation and Linking, 'lypes of compilers, Decision making, Loops, Switch statement,
Goto statement, Null statement, Comma operator, setjmp functions, longjmp functions,
Storage classes: automatic variable, extemal, static. register, Arrays, Array Indexing, Using
) Array names as Pointers, Character Arrays.
W' ,,'1';.1"r,ii,-r;
Variable Enno, penor0 and strerror0, Exit status, Divide by zero errors, Interfacing C with
Python code: Calling C functions from Python, Calling python functions from C, Threads:
Creating a thread, Passing arguments and retuming values, Common thread functions, Thread
synchronization concepts, Mutexes, condition variables.
Text Books :
Gottfried Byton, Outline of Programming with C (4th ed.), McGraw Hilt Education. 201 8.
ISBN 978- 0070145900_
Reference Books :
) l. Balaguruswamy E., Programming in ANSI (8rh ed.), McGraw Hill Education, 2018. ISBN
978- 9351343202.
Assessment Scheme:
)
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET334 Programming using C+ t- T P C
Owning School/Department Department of Computer Science 2 0 2 3
Engineering
Pre-requisites/Exposure
COl: To explain the fundamental programming concepts and methodologies to building Cr-r
programs.
CO2: To implement various OOPs concepts including memory allocation/deallocation
procedures and Member functions.
CO-PO/PSO Manoinc
)
POI PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 POl0 POII PO t2 PSOI PSO2 PSO3
., a
col 3 3 3 2 I t 3 2 2 t 2 3 3
co2 2 3
.,
2 3 ) 3 2 2 3
Course Contents:
Text Books :
l. Stroustrup Bjame, The C++ Programming Language. (4th ed.), Addison-Wesley
Professional, 201 3. ISBN 978-0321563842.
2. Balagurusamy 8., Object Oriented Programming with C++ (lst ed.), Tata Mccraw
Education Hill, 2013. ISBN 978-1259029936.
Refe Bookq :
I Ravichandran D, Pr ogamming with C++ (3rd ed.), McGraw Hill Education, 2017. ISBN
978- 0070681897.
Assessment Scheme
Registr
Bennet rriversity, Greater Noida
r i,.i : i r i a!vi, .i Uiiar P :id:,sh)
(Esli.lriir:r:d t.lr,:::
Plct Nc's C, i, 'i0, 11 , 'fcch Zcne-ll
Greater I loi',la-2tl'l 310
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET335 Deep Learning L T P C
Owning School/Department Department of Computer Science 2 0 2 3
Engineering
Pre- requisites/Exposure
CO-PO/PSO Maooins
POI Pro2 POI PO4 PO5 PO6 PO7 PO8 PO9 POt0 POt I POl2 PSOI PSO2 PSO3
col 2 2 I 2 I 2 2 I 2
co2 2 3
,,
I 2 2
.,
3 )
c03 2 2 , 2 2 I t I 3
Course Contents:
.:r.'r. l'l: iC a
i .:' )
Text Books :
l. Coodfellow lan, Yoshua Bengio, Aaron Courville and Yoshua Bengio, Deep learning. Vol. I
C(lst ed.), ambridge: MIT press, 2016. ISBN 978-0262035613
) Reference Books :
1. Zhwtg Aston, Zack C. Lipton, Mu Li and AlexJ.Smola. Dive into Deep Learning (lst ed.),
Corwin, 201 9. ISBN 978-l 544361 376.
Assessment Scheme
Rcll
Lln:,/.rs;i j/, Greatef l{cida
(!:'r:.1 : ':i,
r:': ;,',i : i Lrf (:.,,'1, oiUt{in Pi!.ie:h)
L'
Fiu't il,:'r'; aj, !1, 'i0, 'i1, Tech Zorre-ii
Gr i:;:i:i l.ir-r: :l::. 1l I1 3'l O
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET336 Bioinformatics and Computational L T P C
Genomics
Owning SchooUDepartment Department of Computer Science 2 0 2 3
Engineering
Pre-req uisites/Exposure
CO-PO/PSO Mappine
)
POI P()2 PO3 PO4 PO5 PO6 P.o1 PO8 PO9 PO t0 P0l I PO t2 PSoI PSO2 PSO3
COI 3 1 I I 2 ) 3 I I 2 2
co2 2 2 3 3 3 3 2 1 2
Course ontents:
L)
.Text Books :
1. Akalin Altuna, vedran Franke,Bora Uyar and Jonathan P.onen, computational Genomics
st
wiri R(l ed.), CRC press, 2020. ISBN 97g- 1498781 862.
2. Baxevanis A. D., Wishart D. S., Bader G. D., Bioinformatics (4th ed.), Wiley, 2020. ISBN
978- I I 19335580.
Reference Books :
1. Singh Dev Bukhsh and Rajesh Kumar pathak, Bioinformatics,Methods and Applications
st
(l ed.), eBook, 2021. ISBN 978-0323900053.
Assessment Scheme:
R
att Unii/crsi ty, Grcatr:i.Noida
'i'lirA.i lci Cofi, ril Ull Pr;(].sh)
r-'
CO-PO/PSO Manpins
POI PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO l0 PO PO t2 PSO I t)so2 PSOS
col 3 I 3 3 J
cC)2 3 3 3 3 3 3 3 3
Course Contents:
Reference Books :
1 Pangilinan Erin, Steve Lukas, Vasanth Mohan, Creating Augmented and Virtual
Realities( I ed.), Creating Augmented and Virtual Realities (l ed.), O,Reilly publishers,
201 9. ISBN 978- I 492044192.
Assessment Scheme
^""Wr,,
rffiiijtiir*'flili
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET338 Computational Geometry L T P C
Owning SchooUDepartment Department of Computer Science 2 0 2 3
Engineering
Pre-requisites/Exposu re
PO/PSO Ma tn
POI PO2 PO3 PO4 PO5 PO6 P()7 PO8 PO9 PO t0 PO I'O I2 PSoI PSO2 PSO3
cor 3 2 I 2 2 I 2 2 I 2 2 3
co2 3 3 I I 3 2 2 I I 3 3
Course Contents:
.)
Text Books :
f . n".g ln a", Kreveld, M. Overmars and O. Schwarukopf, Computational Geometry
ft4. van
Atgorithms and Applications (CGAA) (3rd ed.), Springer, 2008. ISBN 97 8-3642096815.
Reference Books :
1. Boissonnat, Jean-Daniel, Chazal, Fr6ddric, Yvinec and Mariette, Geometric and
Topological lnference (lst ed.), Cambridge UniversitY Press, 20'18. ISBN 978-
1 l 08410892.
Assessme nt Scheme:
20 35 100
Weightoge (%) 45
Reg
Bcn UniversilY, G reater Noida
I, of Ultar Pladesh
Eslsuiill.d t.lrrd:rAcl21ol(iov
l{o's I, 9, 10, 11, Tech Zone-
P lot
GreateI No ida-20'1 310
Name ofProgram Bachelor of Technology (Computer Science and
Engineering)
CSET339 AI
Advances in I, T P C
Owning School/Department Department of Computer Science 2 0 2 3
Engineering
Pre-requisites/Exposure
col: To explain new research trends of Artificial lntelligence and interpret advanced topics
in natural Language Processing and chal bots.
CO2: To implement the model and use the current trends in Artificial lntelligence.
CO.PO/P Ma IN
) POI P()2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO t0 POtl PO l2 PSO I PSO2 PSOS
col 2 2 2 a , I
., 1 l 3 I 3 I I I
cr)2 2 I I I ., 1 2 2 2 2 3
W, ,
" '
.i, , i,
,:1..
:: i ir l':i'l
li..::
i.:,i:ii Zorre-li
)
T ext Books :
Reference Books :
I Elaine Rich, Artifcial Inrelligence (3rd ed.), McGraw Hill Education. 2017. ISBN 978-
0070087705
Assessment Scheme:
i i la,:::'.1
R I
nett Unlvers ity, Greater Noida
(Btablished UnderAcl 24 of Govt,
o, Ultar PradBsh)
Plot No' s 8, 9, 10, 11 ,TC ch ZoneJl
Greater Noida-20131 0
) Specialization
Electives:
Artificial
)
Intelligence
Engineering
Pre-req uisites/Exposu re
CO1: To articulate the key features of Computer Vision to analyze and interpret the visible
world around us.
CO2: To build the applications of Deep Learning in Computer vision and video processing.
CO3: lmplement the state-of-the-ar1 computer vision and video analytics concepts to different
applications.
CO-PO/PSO Mannins
POI POz PO3 PO4 PO5 P()6 PO7 PO8 PO9 PO t0 POI I POl2 PSOI PSO2 PSOI
1
col 3 1 2 2 2 1 2 2 2 3 3 2
,
co2 3 3 ) .,
3 2 2 2 2 2 2 3 3
c03 3 2 3 3 3 2 2
.,
2
., , 3 2 3
Course Contents:
Text Books :
l. Rajalingappaa Shanmugamani, Deep Learning for Computer Vision ed.), packt(t"
Publishing, 2018. ISBN 9781788295628 .
) 2. Nedumaan J., ProfThomas Binford, J. Lepika, J. Tisa, J. Ruby and p. S. Jagadeesh Kumar,
Modern Deep Learning and advanced Computer Vision (l^ ed.), Intel, 2019. ISBN
978170879864t .
Reference Books :
1. Kar Krishnend u, Mastering Computer Vision with Tensor Flow ( L ed.), packt, 2020. ISBN
9781838826939.
Assessment Scheme
{jI,.:r-1;
[:'; ri {:i::l-v, Gre ater i,Joi(1a
{i:il. :.' 'r: :L :ir!l .r: t.l.l,ri ii:l-j'.:h)
Pirt'L i'
G r.)at,ri f i,;:'r-2ri1li10
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET34I Cognitive Modelling L T P C
Owning School/Department Department of Computer Science 2 0 2 3
Engineering
Pre-req uisites/Exposu re
Cource Ou es (COs)
CO-PO/PSO Maonins
POt P(]2 PO3 PO4 PO5 PO6 PO7 P()8 PO9 PO l0 POI I PO t2 PSO I PSO2 PSO3
cot 2 3 2 2 3
cC)2 3 3 2 , 3 3 2 2 2 2 3
c03 3 2 3 3 3 2 2 a 2 3 I
Course Contents:
UY
Ft{{stYx r' ' ' "-' t,.',''
-r^r i'r'1idzi
Dtb/.'t ';.." ,t-rl ', "l .. .i
Text Boola :
l. Bermfdez Jos6 Luis, Cognitive Science: An Inffoduction to the Science ofthe Mind (3 ad.\,
Cambridge Univenity Press, 2020. ISBN 978-1 108440349.
Reference Books :
1. High Rob and Tanmay Bakshi, Cogzr'liv e Computing wtth IBM Watson: Build Smart
Applications Using Artifuial Intelligence as a Service (1 ed.), Paokt Publishing, 2019.
ISBN 1788478290.
)
Assessment Schemo
A//
Effi i'*vfJ:rt f t:"?i,fl ,!:l:,i
i,toi o's B, 9, 10,
tf Tech zone-
11 ,
Greater Noida-201310
Name ofProgram Bachelor of Technology (Computer Science and
Engineering)
CSET342 Probability and Random Processes L T P C
Owning School/Department Department of Computer Science 2 0 2 3
f,ngineering
Pre-requisites/Exposu re
CO-PO/PSO Manoine
POt PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 POl0 PO P()t2 PSOI PSO2 PSO3
., .,
col 2 2
.,
co2 2 2 a 1 2 2
co3 2 , ", 3 , 2 3 3
ourse Contents:
Text Books r
1. Peebles. P. Z, Probabitity, Random Variables and Random Signal Principles (4 ed.), Tata
Mc Graw Hill,20l7. ISBN 978-0070474284.
Reference Books :
1. Peebles. P. Z, Probability, Rondom Variables and Random Signal Principles (4 ed.), Tata
Mc Graw Hill,20l7. ISBN 97E-007O4742U.
Asse$pent Scheme:
w,
Effiiffi ,ffi ,q{ir!"f #i+81,
Name ofProgram Bachelor of Technology (Computer Science and
Engineering)
CSET343 AI in Healthcare L T P C
Owning School/Department Department of Computer Science 2 0 2 J
Engineering
Pre-requisites/Exposu re
cllry-Qlse!rcil98!)
On cornplelion of tlris course. the students rr ill be able to:
COl: To artioulate the factors involved in decision support that can improve business
performance across the provider/payer ecosystem.
CO2: To build rnethods and techniques in order to appropriately apply to pain poirrts using
case studies-
CO3: To build methods and techniques in order to appropriately apply to pain points using
case studies.
)
CO-PO/PSO ManDine
POt tc)2 PO3 P()4 PO5 PO6 ?o7 PO8 PO9 PO t0 POII PO l2 PSO r PSO2 PSO3
cot 1 3 2 2
c02 3 3 3 3 3 2 2 2 2 3
co3 3 3 3 3 3 1 2 2 2 3 3
Course Contents:
Text Books :
1. Bohr A. and Kaveh Memarzadeh, Arti/icial Intelligence in Heallhcare (l ed.). Elsevier
Science, 2020. ISBN 978-01 281 84387.
Reference Books :
l. Bohr A. and Kaveh Memarzadeh, Artificial Intelligence in Healthcare (l ed.), Elsevier
Science, 2020. ISBN 978-01 281 84387.
Assessment Scheme:
R
w
'f/,
ti
1i
i.l
;a'
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET34.l Image and Video Processing t. T P C
Owning SchooUDepartment Department of Computer Science 2 0 2 3
Engineering
Pre-requisites/Exposu re
COl: To explain and Analyse images using Histograms and spatial filters. Apply Hough
transforms and be familiar with image representation using textures.
CO2: To compute motion using optical flow and understand methods for image description
and morphological operations.
CO3: To implement different low-level and high-level image and video processing techniques
to wide variety of applications.
CO-PO/PSO MaDDinc
POt P02 PO3 PO4 PO5 PO6 PrJ1 PO8 PO9 PO t0 POI I PO t2 PSOl PSO2 PSO3
cor 3 3 3 3 3
co2 3 3 2 3 2 2 3
c03 3 3 3 3 3 , a 2 2 3 3
Course Contents:
Ulz
r.i.;:{rtl1. , ....r (: ,.r t*.,"-'i, r.ro:.:-r
i,. i,,
Fict
, ,,., . .-
I . '' ':. -' '..'," - 't O
.,
Text Books :
I Szeliski Richard, Computer Vision: Algorithms and Applicqtiow (2 ed.), Springer, 2022. ISBN
97 8-30303437 t2.
2. Jain K., Fundamenlals of Digilal lnage processing (lst ed-), pearson Education tndia.20l5
lsBN 978-933255 19 t6.
) Assessmen t Scheme:
Col: To explain the comprehend types of text analysis, Information retrieval. IR system
architecture, query processing models and probabilistic models.
CO2: To build information retrieval systerns by performing indexing, compression,
information categorization sentiment analysis, network management, search engine
optimization, records compliance and risk management.
co3: Implement different information retrieval approaches for applications in text domain.
)
CO-PO/PSO MaDDins
POt PO2 PO3 PO4 PO5 PO6 l,()7 P()8 PO9 POt0 POII PO t2 PSOt PSO2 PSO3
col 3 2 2 3
co2 3 3 3 3 3 I 2 2 2 2 3
c03 2 3 3 3 2 2 I 3 3
course Contents:
Module I: lglecture hours
Text analysis and types, Infonnation retrieval, Text processing, Indexes and query matching,
semistructured text data, Tokenization, Sternming, Lemmatization, Language modelling,
Examples ofopen source IR systems, Query processing models. probabilistic models. Binary
independence rnodel, Robertson/Spark Jones weighting formula, Two-poisson model,
)
Relevance feedback, Term selection, Pseudo relevance feedback, Language models, Unigram,
Bigram language models, Generating queries from documents, Language models and
smoothing, Ranking with language models, Retrieval evaluation measures Normalized
Discounted Cumulative Gain (NDCG), Kullback-Leibler divergence, Divergence from
randomness, Passage retrieval and ranking, Management of Information Retrieval systems,
Knowledge management, lnformation management. Digital asset management, Network
managemenl
l\4.//
7/
.,, ,/. /.,
U/, .l1.,,,., .i',..r.,i
'; ' . -l' ':i-'tr' ii
1
indices, lndex components and Index life cycle, lnterleaving Dictionary and Postings lists,
Index construction, Query processing for ranked retrieval, Compression, General-purpose data
compression, Symbolwise data compression, Compressing posting lists, Compressing the
dictionary.
Text Books :
l. christopher D. Manning, Prabhakar Raghavan and Hinrich sch;jtze, Inttoduction lo
Information Reffieval (l ed.), cambridge university Press, 2019. ISBN 9781 107666392.
2. Mitra Bhaskar and Nick craswell, An Introduction to Neural Information Retrieval (l ed.),
Boston Delft, 2019. ISBN 9781680835327.
-
Reference Books :
l. Sarfraz Muhammad, Critical Approaches to Information Retrieval Research (led'), lcl
Global, 2019. ISBN 9781 79981 0232.
Assessme nt Scheme
*"MUri,',
Dcn'Zrrcii l-i,:)'. CnJat' I i Joiclr
;- I:. . ::.;.:'..,(:L::'I -i:'h)
i,i. t ;l rt. L, 'J, 10, il, iccir Zons-ll
Greatci Noicia-201310
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET346 natural Language Processing L T P C
) CO.PO/PSO MaDDinp
POI ?02 PO3 PO4 PO5 PO6 PO7 PO8 PO9 POl0 PO POt 2 PSOI PSO2 PSO3
col 1 2 2 2 2 2 3
,, 3
cCJ2 3 3 3 2 2
c03 3 3 3 3 3 3 2 2 2 3 3 3
Course ontents:
Neural Networks for text, Recurrent Neural Networks, Vanishing Gradients, Exploding
gradient, LSTM (Long sort term memory), CRU (Gated recurrent Unit), Seq2Seq
Modelling, Bidirectional Model, Contextual Representations, Transformers, BERT,
Multilingual Embedding, Transfer Leaming in Word Embeddings, MUSE, POS tagging,
named Entity Recognition, Sentiment Analysis, Text Clustering.
Text Books :
l. Rao Delip and Brian McMahan, ra tural Language Processingwilh PyTorch: Build Intelligent
Language Applications Using Deep Learning (l ed.), O'Reilly Media, 2019 ISBN
9781491978238.
Reference Books :
1. Eisenstein lacob, Introduction to mtural Language Processing (l ed')' The MIT Press;
) Iltustrated edition, 20 I 9. ISBN 97 80262042843.
Assessment Scheme
rat
Be nett Uni'/ersity, Greater Noida
(Es l?bli:h.d Uldir Acl 2.1 of Govt, of Utlar P radesh)
PI ot No's B, 9, 10, 11, Tech Zone-ll
Greater Noida-2013'10
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET347 Social Network A ts L T P C
Owning School/Department Department of ComPuter Science 2 0 2 J
Engineering
Pre-requisites/Exposure
CO-PO/PS O Mannins
) POI PO2 PO3 PO4 PO5 PO6 PO7 PO{t PO9 PO t0 POI I POt 2 PSOI PSO2 PSO3
col 1 I 3 I 1 2 2 2
c02 3 , 3 I 3 3 2 2 2 3
1 2 a 2 3 3
co3 3 1 3 2 3 3
Reference Boots :
1. Dey Nilanjan, Social Network Arralyties: Computational Reseot"ch Methods and
Techniques (1ed.), Aoademic Press, 2018. ISBN 978-0128154588.
Assessment Scheme:
W.'*
#6.:it U.riversitv, Greater Noida
IFrr:: : r (l J :l:r Act 24 Ll Giu, cl U:lrr Pradash)
irlct 1u,,,. B, 9, 10, 11, Tech zone-ll
Greerter t{0ida-20131 0
Name of Program Bachelor of TechnologY (Computer Science and
Engineering)
CSET348 Reinforcement Learning l- T P C
Course Outcomes Os
CO-PO/PSO Ma ln
PO3 PO4 PO5 PC)6 PO7 PO8 PO9 PO l0 PO POl2 PSOI PSo2 PSO3
POI PO2
3 1 3
col 3 3 2
3
1 3 3 3
c02 3 3 3
1 3 3 3 3
co3 2 2 3 3
Dynamic Prograrnming & Temporal Difference Methods, DQN, Fitted Q & Policy Gradient
Approaches, Introduction to f)ynamic Programming, Policy Evaluation (Prediction), Policy
lmprovement, Policy lteration, Hierarchical Reinforcement Leaming, Value Iteration,
Generalized Policy lteration, Hierarchical RL: MAXQ, Asynchronous Dynamic
programming, Efficiency of Dynamic Programming, Temporal Difference Prediction, why
w,.
L/
TD Prediction Methods, On-Policy and Off-Policy Learning, Q-learning, Reinforcement
Leaming in Continuous Spaces, SARSA.
Text Books :
l. Sufton R.S. and Andrew G. Barto, Reinforcement Learning: An Introduction (2 ed.)' MIT
) Press, 201 7. ISBN 978-0262039246..
2. Murphy K.P., Machine Learning: A Probabilistic Perspective (l ed.), MIT Press, 2012.
ISBN 978-026201 8029.
Reference Books ;
l. Bertsikas Dimitri and John G. Tsitsiklis, Neuro Dynamic Programming, Athena Scientific
(l ed.), Athena Scientific, I996. ISBN 978-1886529106. .
2. Sewak Mohit, Deep Reinforcement leaming: Frontiers of Artificial Intelligence (l
ed.),
Springer, 2019. ISBN 978-981 1382840..
3. Masashi Sugiyama, Statistical rcinforcement learning: modern machine learning
approaches (l ed.), Chapman and Hall/CRC,2015. ISBN 978-1439856895.
Assessment Scheme
COI: To familiarize and leam about the latest trends and research in the field.
C02: To equip themselves with the conceptual and practical experience offew latest methods,
tools, technologies or algorithms in Artificial Intelligence.
CO-PO/P MaDninp
) POI PO2 P03 PO4 PO5 PO6 PO7 PO8 P()9 PO t0 POI I PO l2 PSOI PSO2 PSO3
col 3 3 3 2 2 3
co2 3 3 3 3 a 3 3
Course onlents:
This course covers the cutting-edge topics in Artificial Intelligence, and these modules will be
chosen by the instructor based on the requirements and relevance at that point of time. These
modules need to be relevant to the industry and start-ups will also include related case studies,
use cases and implernentations scenarios. Students will be working on lab work and projects
to get real hands-on experience ofthese topics and modules.
Assessment Scheme:
W ' t
..:1.
'r;'
.l:l
r- rl
:-ti
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET35O Blockchain Technologies: Platforms & L T P C
Applications
Owning SchooVDepartment Department of Computer Science 2 0 2 3
Engineering
Pre-requisites/f, xposure
COI: To articulate blockchain platfonns that show promise in solving complex business
problems.
CO2: To examine the life cycle ofa chain code and its components.
CO3: To make use ofvarious blockchain-based enterprise applications.
)
CO-PO/PSO MaDDins
POt PO2 PO3 PO4 PO5 PO5 PO7 PO8 PO9 PO t0 POI I PO t2 PSOI PSO2 PSO3
.,
col 3 1 3
,|
2
.,
2 3
cC)2 3 3 3
co3 I 3 2 2 , 3 2 2 ) 3 3
Course Contents:
Reference Books :
1. Gaur and Nitin, Hands-On Btockchain with Hyperledger: Building decentralized
applications with Hyperledger Fabric an (l ed'), Packt Publishing Ltd' 2018. ISBN 978-
1788994521.
Scheme:
Wa
B#nett University, Greater Ncida
(Eliab:ith.d Und.rAct 2J ofGlvt, o, ULtar pradesh)
Plot No's B, 9, 10, 11, Tech Zone-il
Greater Noida-201310
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET35I Smart Contracts and Solidity L T P C
mmt
Owning SchooUDepartment Department of Computer Science 2 0 2 J
Engineering
Pre-requisites/f, xposu re
CO-PO/PS O Manninp
)
POt PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 POt0 POI I PO l2 PSOt PSO2 PSO3
col 2 2 I I 3 2 2
c02 3 , 3 1 2 1 2
,,
3
c03 3 , 3 2 3 3 2 2 2 2 3 a
Course ontents:
1. Reed snd Jeff, Srfiart contracts: The essential guide to using blockchain smart contracts
for cryptocffrency exchange (1ed'), CreateSpace Independent Publishing Platform, 2016'
ISBN 978- 1539457442
Reference Books :
1. Antonopoulos Andreas M., Gavin Wood Ph.D, Mastering Ethereum (l ed'), O'Reilly,
2018. ISBN 9781491971916 .
Assessment Scheme
frh
ae{*4rar
Bennett Uni\/ersitv, Greater No.d-
(E5iri:-:, , r, ,-, : l:r,,-l; i; i G1vl. cf I rtrirr pradc-sh)
Hrol I Ic .- ii, !, 'l
0, 11 , teih Zone-il
Greater N,-.iCa-101 31 0
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET352 Digita I Currencies and Blockchain L T P C
COl: To articulate blockchain-based digital currencies and data structure ofthe bitcoin digital
currency.
CO2: To examine different approaches of digital currencies.
co3: To implement the different digital currency wallet types and transactions using different
types of wallets.
CO-PO/PSO Maooins
Digital currency, cryptocurrency vs fiat currency, web 3.0, transactions in digital currencies'
bitcoin model, Bitcoin Structure, Bitcoin implementation, public and private addresses'
Data
alternative cryptocurrencies-ETH, Ripple, Litecoin, Matic, Bitcoin network architecture'
structure ofth; bitcoin blockchain, Stack for bitcoin blockchain, Linked list representation
of
bitcoin blockchain, operations on the bitcoin blockchain, special variables in Bitcoin.
)
Modulo ll: S lectur€ hours
in the
Bitcoin storage, Bitcoin mining, Bitcoin Services and functionality, Bitcoin forks, Users
Bitcoin system, Applications of Bitcoin' tmpact of Bitcoin mining, Bitcoin anonymity'
Blockchain verification. Bitcoin consensus, Full nodes vs. SPV (Simplified Payment
Verification.l nodes. Light nodes.
W,,. ''-ch;{!tlc
l-
r..l )ill'1t)
Socio-potitical impast, and regulation on crypto curencies, Law enforcement on Bitcoin,
sudden gro*th of Bitcoin, Bitcoin impact on society, issues with bitcoin, Bitcoin impact on
environment, Bitcoin application other than cryptocurrency, Bitcoin vs file coin, startups in
Digital Currencies.
Text Books :
1. Lewis Anlr:ny, The Basics of Bitcoins and Blockthains: An Introduction to
Cqptocurrencies and the Technologt that Powers Them (Cryptography, Crypto Trading,
Digital Assets, NFT) (l ed.), Mango medi4 201 8. ISBN 978-1633538009'
Reference Books :
1. Tapscott Don and Alex Tapscott, Blockchain Revolution (l ed.), Portfolio, 2018. ISBN
978-1101980149.
Assessmen t Scheme:
t//
Re,<i{dr
b-ui,6i, ut,, ,"rs:iy. Greater Noida
E.,"it.i,,' r'. r', r,.r : ; ;f G.-(. ol uitar Fredesh)
FiJ-i r::o i c, e, 10, 1 1 , Tech zone-ll
Gre.iter Noida-201310
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET354 ber Security with Blockchain L T P C
CO-PO/P Mannins
)
POI Pt)2 PO3 PC,4 PO5 PO6 PO7 PO8 PO9 POl0 POI I POl2 PSOI PSO2 PSO3
col 2
.,
2 3 3
co2 3 3 2 3 2 2 2 2 3 3
., 3 3 3 3
co3 3 3 3 3 3 3
Course ontents:
Tert Books :
1. Gupta R., flazals -on cybersecurity with bloctwhain (1 ed.), Packt Publishing, 2018' ISBN
978- 788990189.
Referencc Books :
1. Yuan Michael Juntao, Buitding Blockchain Apps (l ed'), Pearson Eduoation,2020' ISBN
978- 9390168385.
Assessment Scheme
'., ; ';l:"
Ei,W,,' : i1 i I li r'..l,lJl l-9,i,
H--i ^;.' "i
n ii . ici.ir Zone-ll
E[l'.'"," ir'.;ii'] :-or gr'o
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET355 Web DeveloPment for Blockchain L T P C
A lications
Owning School/DePartment Department of Computer Science 2 0 2 J
Engineering
Pre-requisites/ExPosure
CO-PO/PSO MaoPins
)
PO8 PO9 PO t0 POI I PO l2 PSOI PSO2 PSO3
POI PO2 PO3 P3()3 PO5 PO6 PO7
4
3
cot 3 3 3
I 3 3
co2 3 3 3 3
3 3 3
c03 3
Cour"se Co n ts:
8 lecture hours
Module I:
Why ntoctcnain *ith Web Development. Technology stacks, HTML5
& CSS for blockchain-
dev tools, Functional programming parad igm JavaScript
basid web development. Chrome
basics, communication with peers' bui lding client and
inside a browser, Python data types and
."-"., ,nin"t una *allet, building a socket communication utility' tJse ofLow Code, No Code
Tools in the develoPment.
6lecture hours
) Modulo Il: to the old one-with
l"""S.ifpi enabled blockchain applications, compiling .new JavaScript
in project' Asynchronous JavaScript
*.Up""f, Better CSS *ith *ebpaci, Code organization a
code for developing smart contracts, APIs for blockchain solutions'
S lecture hours
Module lll:
its ecosystem'
Overview of server-side options, Node JS environment for blockchain and
application state'
JSON, REST API Using Fostman to debug API' Managing server-side
(SQLite,
*J:li f", blockchain ieb applications. Ditabases and users to interact.
SQL PostgresQl), data
no.r'utirution. User authorization and authentication, allowing
6 lecture hours
Module IV:
other software
Web security basics, not trusting your clients, why use H'ITPS, integrating
*iitr ifr" .e'rver, developing fr:ontend with React, concept of single-page applications,
."""gi"g applic,ition state (Redux). overview of other client JS frameworks'
"fi*,-side
Rrul,
1,..\{.1'.
(il :' : l.
Text Books :
1. Eric Traub, earn Bloclrrhain Programming wtth Javasctipt: Build your very own
Bloclrchain and decentralized netwo (l ed.), Packt Publishing Ltd, 2018' ISBN 97E-
1789618822.
Refercnce Boo}s :
1. Gabarr6 Steven A, lYeb Application Design and Implementation: Apache 2, PHPS'
MySQL, JavaS,cript, and Linut/WN (1 ed'), WileyJEEE Computer Society, 2006' ISBN
978-0471773917.
Assessment Scheme:
*W,i/^,
Bei#ett Universitv. Greater Noida
irl 24 oi G Ju..l'ech
(Estibr..l : i r.i-it. Lf urlar Pradesh)
Plot Nos d,9, 10, 11, Zone-ll
Greatei Noida-201310
Name of Program Bachelor of TechnologY (Computer Science and
Engineering)
CSET356 Security and PrivacY for Big Data L T P C
An cs
Owning SchooUDepartment Department of Computer Science 2 0 2
Engineering
Pre-requisites/Exposure
CO-PO/P SO MaoDins
2 .,
., 2 3 3
CO 2 3 2 3
J
Course ontenls:
Text Books :
1. Joshi R,, Secari$, Privacy, and Forensics Issues in Big Data Network Security Essentials
( l st ed.), ICI Global, 201 9. ISBN 978- 1 52259742 1.
Reference Books :
1. Gupta Brij B. and Ramesh C. loshi, Security, Privaqt and Forensics Issues in Big Data (1*
ed.), CI Global, 2019. ISBN 9781522597441.
Assessment Scheme
)
Components Internal Mid Term Exam End Exam Total
Assessment
r
/y/
Redlstrsr
Blha6tt Universit,/. Greatcr Noida
(6t661;shcd uldEr.r(.i 2; of C -.!,1 o'ur:sr Pr.rlcsh)
plot No,s g, 9, 10, 1j . T _rr .lone-ll
G rr,.1.- r i\i. i-i^ -r ^ 'r ^
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET357 Modern Cryptography L T P C
Owning School/Department Department of Computer Science 2 0 2 J
Engineering
Pre- req uis ites/E xpos u re
CO-PO/PSO Maooinp
POI P.)2 PO3 PC)4 POs PO6 PO7 PO8 PO9 POt0 POn PO t2 PSO I PSO2 PSO3
cot I 3 2 3 2
co2 3 3 3 , 3
c03 2 3 3 .,
3
Course Contents:
Tert Boo*s :
1. Stallings William, Network Security Essentials (4th ed.), Prentiee Hall, 2018. ISBN 978-
9352866601
Reference Books l
l. Stallings W., Cryp,tography and Network Secunry (7th ed.), Prentice Hall,20l7. ISBNgTE-
9332585225
Assessment Schome
Weightage (o ) 45 20 35 100
col: To explain where the wireress technorogies can be appricabre and evorving wireress
technologies and standards.
CO2: To articulate the architecture of various wireless technologies.
CO3: To experiment with various wireless technologies through hands_on projects.
CO-PO/PSO Ma DI'INg
POI PC)2 POI PO4 PO5 PO6 PO7 PO8 PO9 PO r0 POI I POr 2 PSO I PSO2 PSO3
col 2 2 I 2 2 I 3 3 I 2 I
co2 2 2 ^, I I 1 t 3 3 I ) I 2
co3 2 I I 3 I 2 I I ) 2 J
W ,. ( i
r .
ri.: i::r-i.tri,jf
. ,N,
,ii ,...r)r:-lj
,.,
Text Books :
l. c Beard and Stallir.gs w ., wireless comhunicarion Networfu and systens (l ed.), pearson, 2015. lsBN
978-t292108728.
2. colbach Gordon, wireless Net*orking: Intrcduction to Bluetoorh qnd lt/iFi (l ed.), Independently
Published, 2017. ISBN 978-19732521 15.
Refererce Boolc :
1. velrajan sefo, An lntoduction to 5G ll/ireless Networl<s (l ed.), Amazon Digital Services LLC -
KDP Print US, 2020. ISBN 979-8643303107.
2, Vannithamby R. and S. Talwaq Towards SG: Applications, Requirements and Cand.idate
Technologies (l ed.), John Willey & Sons, 20t 7. ISBN 978-l I 18979839.
Assessment Scheme
Reri4lri
W,
Beiifftt Uni'.,:r:ity. C.enter l'loida
(t: f,.. ( : vr oi ijll.r. f radesh)
t-.5:.51:cd U 1 lcr 2r ;r
COI: To familiarize and learn about the latest trends and research
in the field.
Co2: To equip themserves with the conceptuar and practicar experience
offew ratest methods,
tools, technologies or algorithms in Blockchain.
Module l:
This course covers the cutting-edge topics in Blockchain,
and these ,n"0r,", *1i'otjtJ,ii.llTi
the inslructor based on the requiiements and rerevance ui
tr,,ui foint of rime. These modures
need to be relevant to lhe indusrrv and stan-ups
wi[ arso incrude'rerared case studies, ura aur",
and implementations scenarios. 3tudents wiri ue wo.t ing
on tau work and projects to get rear
hands-on experience ofthese topics and modules.
Assessm en t Scheme:
i'
.,. r ';, iJCh;,,()itu-l!
.; ll.r i...i0
Specialization
) Electives:
cvb er
Security
l:i.;
F
(
f.
(jr'.rat. r- l.l .t' .;.i.:i)ill'lC
Name of Program Bachelor of Technology (Computer Science and
Engineering)
Name of Program Bachelor of Technology (Computer Science
and Engineering)
CSET360 Malware Analysis for Mobile Devices L T P C
Owning SchooVDepartment Department of Computer Science 2 0 2 3
f,ngineering
Pre-requisites/Exposure
CO-PO/PSO Mappins
POI PO2 PO3 P04 PO5 PO6 PO7 PO8 PO9 POl0 P{)l I PO l2 PSOI PSO2 PSO3
cot 3 3 2 a 2 3 3 3 ,
co2 .,
3 2 2 2 3 ) 2 2
., ,, 3
co3 3 2 3 2 2 3
Course Contents:
R ar
Ec-l 'r,-:,-,ri'r.
'.,'l'.1 Orc lt;r ['lo'da
'al, i;',r { | L-llllrP"rJ':nJ"
ii,, i'l , Icch Zone-ll
f-i
, l"
i "i13'10
Name ofProgram Bachelor of Technology (Computer Science and
Engineering)
CSET36I Device Level IoT Securi ty L T P C
Owning School/Department Department of Computer Science 2 0 2 J
Engineering
Pre-requisites/Exposu re
/PSO Ma
)
POI PCl2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO t0 POt I PO t2 PSO I PSO2 PSO3
cor 3 3
,, , 2 3 3 3 2
,,
c02 2 3 2 3
.,
2 2
c03 2 2 3 1 3 3 2 3 3
Course ontents:
FI i-' a
ll crstl!', Ci'e ater Ncida
[-lrt ii
(r r/,:t;: ll" .i r, tjii..r:riarjp5h)
i', !, 'i0, 'l i , lccir Zorle-ll
Gr.-.i: l :r,' t:ci -l: lrl l :i'i 0
organizing Things, Preventing unauthorized access, Cloud security for loT, Cloud services and
IoT, offerings related to IoT from cloud service providers, Cloud IoT security controls.
Text Boola :
1. Saravanan Vijayalakshmi, Securing IoT and Big Data: Next Generation Intelligence
(Internet of Everything (IoE) (lst ed.), CRC Press,2020. ISBN 0367432889.
Reference Books :
1. Bhattacharjee 5,, Practical Industrial Internet of Things Security (lst ed.), packt
Publications, 2018. ISBN 978-17888 2687.
Assessment Scheme
CO-PO/PSO Manpins
)
POI P.J2 POI PO4 P()5 PO6 PO7 PO8 PO9 POl0 POll POt2 PSOI PSO2 PSO3
cot 3 3 2 2 3 2 2
c02 2 3 2 2 2 2 2 3 2
,,
cC)3 2 2 2 2 3 3 3
Course Contents:
11,_1I .l
i,r:..: -r
, 'l',,,,i i li,i: \)
['ii: I i'. r -;ii Zori...-li
Cii;.,.ir , i
Module IV: 7 lecture hours
Application Layer Protocol Attacks, DHCP Packet Structure and working, classic DHCP
Starvation Attack, Induced DHCP Starvation Attack, DHCP Spoofing Attacks, DHCP
Flooding Attacks, countermeasures for each attack on DHCP, DNS Packet Structure and
working, DNS Cache Poisoning for Phishing, Domain Hijacking DNS Flooding, Reflection
and Amplification Attack, Random Subdomain Attack, NXDomain and Phantom Domain
Attack, Countermeasures for each attack on DNS, HTTP Packet Structure and its Working,
Method based Flooding Attacks, HTTP Half connection Attack, HTTP fuzzers and
misbehaved fields, Cache bypassing attacks, countermeasures for each attack on HTTP.
wireless Access Point Firmware vulnerabilities, SSID Beaconing and checking for Hidden
and Fake Wireless Networks, Brute Force Attack, Evil twin Attack, WiMax vulnerability,
Vulnerability of zigbee protocols.
Text Books :
l. Sanders C. , Practical Packet Analysis (3 'd ed.), No Starch Press, 2017. ISBN
97 8t s93278020.
Reference Books :
l. Gebali F., Nem,ork Vtlnerability Assessment: Identify security loopholes in your network's
i nfr as tr uc t ure (lsr ed.), Springer, 20 1 8. ISBN 97 8- 1 7 88627 252'
r0
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET363 Penetration Testing, Auditing and Ethical L T P C
Hackin
Owning School/DePartment Department of Computer Science 2 0 2 J
f,ngineering
Pre-req uisites/Exposu re
COl: To identi! and analyze the stages an ethical hacker requires to compromise a target
system.
CO2: To utilize tools and techniques to carry out a penetration testing'
co3: To critically evaluate security techniques used to protect system and user data.
CO-PO/PSO Manoins
PO5 PO6 PO7 PO8 PO9 POr0 POI I PO t2 PSO I PSO2 PSO3
POI PCJ2 PO3 PO4 .,
col 3 1 1 a 2 2 3 2
., a
co2 a 3 3 2 ) 2 3
co3 2 , 3 , 3 2 2 3 3
R
ll t-.1 l-lnir':rcil'r, Greatef Ncida
L i,. ', i ., l ( f r:iirvl. of Utter prlri::i)
Plct i{u l, {-', I '10, 11 , -Icclr Zc_rne-
Grcatei t,lciCa-201310
Module IIt: T lecture hours
Analyze Pen Test Data, Repofting Pen Test Results, Write and Handle Repofts, Normalization
of data, Written report of findings and remediation, Risk appetite, Storage time for report,
Secure handling and disposition of reports, Conduct Post-Report-Delivery Activity, Post-
engagement cleanup, Removing shells, Removing tester-created oredentials' Removing tools,
Client acceptance, Lessons leamed, Follow-up actions/retest, Attestation offindings, Develop
Recommendations for Mitigation Strategies, Solutions, Findings, Remediations'
Text ks:
I Harper Allen, Gray Hat Hacking: The Ethical Hacket's Handbook (6th ed'), Mo6raw'Hill
Osbome Media, 2022. ISBN 1264268947
Reference Books :
1. Wallace Conno\ Penetration Testing: Penelration Testing: A Hands-On Guide For Beginners
(lst ed.), Independently Published, 2020- ISBN 979-8614981143.
) Assesment Scheme
i"iegi
Bert LL i'r,-:r-,ity, Q rcnier l{DldB
$ !i 0f Ulic r P{n,jcsll)
,.i-'.1.'rl,.lr-r. oi
10, 11,
'le clr Zonel-ll
P
Grcai,) j- i\jui'-l:'
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET364 Forensics and C ber Law L T P C
Engineering
Pre-requisites/Exposure
CO-PO/PSO MaDDins
POt PO2 P()3 PO4 PO5 P()6 PO7 PO8 PO9 PO t0 POI I PO l2 PSOt PSO2 PSO3
) col ., .,
2 3 , .,
3 2 2
t ., 3 2 ,
c02 2 3 2
,, , 1
c03 1 ) 3 2 2 2
Course Contents:
child Pomography starutes, Unlawful Intemet Gambling Enforcement Act of 2006. Electronic
communications Privacy Act of 1986, Privacy Protection Act. Electronic Surveillance and
criminal lnvestigations, communications Assistance for Law Enforcement Act. other
Questions Regarding Privacy: Peer-to-Peer or File sharing,
Intemet Service Provider
Subscriber Records, Web sites, Cell phones.
lectur€ hours
Module ll l:
W,
Duplicates as
Traditional Problems in Computer Investigations, Forensic Duplication, Forensic
Admissible Evidence, Forensic Duplication Tool Requirements, Creating a Forensic
DupIicate/QualifiedForensicDuplicateofaHardDrive,Phaseafterdetectionofanincident,Disk
Data Integrity'
Structure and Data Storage, File Systems, Firmware Operating Instructions'
Associated with
Developing computer Forensic Science capabilities, Traditional Problems
Finding Digital Evidence, Pre-search Activities, on-scene Activities: Knock, Notice,
and
Scene
Document, Securing the crime Scene, Determining the Need for Additional Assistance'
Processing, Locating Evidence, Seizure and Documentation of Evidence' Bagging
and
and
Tagging,lnterviewing Witnesses, Collecting Network Based Evidence, Scene Departure
Transportation of Evidence to Lab, Forensic Anatysis of File Systems, Hard Drives
Evidence
(windows&UNlx),IssuesrelatedtoDataPrivacy,CriminalLiability,ElectronicContracts&Digital
Signatures, Misappropriation of information, Civil Rights, Evidence' Legal
Developments' Security in
cyber laws case, Trademarks, Reverse Hijacking, Jurisdiction in Trademark Disputes'
Copyright in the
(30)' Cryptography Laws'
Oigi,ut M.dir*, Copyright and WIPO Treaties, Concept of Patent Right
Ethical Issues - Cybercrime6.
Text ks:
th
I Britz Marjie T, Computer Forensics and Cyber Crime: An Introduction (4 ed.), Pearson
Education lndia, 2022. ISBN 978-01 34847528'
techniques
2. Johansen Gerard, Digital Forensics arul Incident Response: Incident response
and procedures to respond to motlern cyber threats (2nd ed'), Packt Publishing
Limited'
2020. lsBN 978- 1838649005.
Reference Books :
1. Reddy Niranjan, Practical Cyber Forensics (lst ed.), Apress, 2019' ISBN 978-
1484244605.
) Assessme nt Scheme:
45 20 35 100
Weightsge (9/o)
it
i ,.r: .-f.ti1l,, (l,in:.tr:i l'loirja
-i -: l r l. r .i \.. l.lrrj Pr.'llifr)
r; ir, -, ,'--r, l'l ,l-ech Zcl)e-ll
i'ii.i!:ar'::i.1310
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET365 Web Security L T P C
Engineering
Pre-requisites/Exposure
CO-PO/PSO MaDDinc
Couns€ Co nt nts:
Text ks:
1. Hoffinan Lndrew, t4leb Application Security: Exploitation and Countermeasures for
Modern Web Applications (lst ed.),O'Reilly Media, 2020' ISBN 978-14920531
l8'
Reference Books :
2020' ISBN
1. McDonald Malcolm, Web Security for Developers (lst ed'), No Starch Press'
9781s93279957.
)
ent Sc me:
20 35 100
Weighttge (%) 45
r
B ett Unlversity, Greater Noida
bii :h.ri UnC.rAct 24 of UoU, of U ttar Pradesh)
lot No's B, 9, 10, 11 , Tec h Zone-il
G reater N0ida-201310
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET366 S lTo in Infomation SecuritY L T P C
COl: To familiarize and leam about the latest trends and research in the field'
CO2: To equip themselves with the conceptual and practical experience offew latest methods.
tools,technologies or algorithms in lnformation Security (lS).
co-Po/Ps O MaDDins
) POI PO2 PO3 PO4 PO5 PO6 PC)7 PO8 PC)9 POl0 POI I POl2 PSOI PSO2 PSO3
col 3 2 3 2 3 3
co2 2 I 3 I 3 3
Course Contents:
Text Books :
l. Pfleeger CharlesP., Security in Computing, Fourth Edition, Pearson Education
) 2. Stallings William, Network Security Essentials: Applications and Standard. Prentice Hall
Referen Books :
1 Stallings william , Cryptography And Network security Principles And Prqctice,Fourth or
Fifth Edition, Pearson
2. Mao Wenbo, Modern Cryptography: Theory and Praclice, Prentice Hall
Assessment Scheme:
R s tlar
E-' en nett Llniversity, Greater Noida
(E 3lal-ll-,ll:'l LlrJnrAci 2rt of r,;ovt,
(,f utl"r Pradesh)
P l:rt ir!o's 0, 9, 10, fi,T'echZone-ll
Greeter i-loicia-201 31 0
Special rza tron
O a
Electives:
Data Science
)
ry/,
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET367 Digital Marketing and Trend Analysis L T P C
Owning School/Department Department of Computer Science 2 0 2 )
Engineering
Pre-requisites/Exposure
CO-PO/PSO Mapninq
POI PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 POl0 POl t PO r2 PSO I PSO2 PSO3
col 3 I 3 I 3
c02 , t 3 I 3 2 I
co3 2 I 3 1 2 2 2 I ,
l=weakly related 2: moderately related 3=strongly related
Course Contents:
Text Books :
1. Gary P Schneider, Electronic commerce (l3th ed.), Cengage Leaming, Inc,2019. ISBN
9781285425436.
2, Kingsnorth Simon , Digital Marketing Strategt: An Integrated Approach to Onltne
Marketing 74fi ed.), Pearson,2019. ISBN 0749484225.
Reference Books :
1. Clarke Adam, SEO 2020 (2ad ed.), Amazon Digital Services LLC - KDP Print,2Ol9. ISBN
9781712354889.
Ass$sment Scheme:
il/
# l.'--',i l, n,uu n,,,',, Grcater
lE:ri.l,i.:11 . :'.r/,. . _.!t
No!da.
. . I ,'t llrli:i [-iair5h)
i,lot tl"'.- ij' tr, lJ.'. i'i, reitr zorre-tl
Gic:r'cr l':.'i''1'r-'1'/ 310 I
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET368 Structu ral Equation Modelling t. T P C
Owning SchooUDepartment Department of Computer Science 2 0 2 3
Engineering
Pre-requisites/Exposu re
COl: To explain the statistical and numerical models used in SEM Framework.
CO2: To build factor analysis to find multiple hidden variables.
CO3: To implement of parameter estimation and regression analysis ofpractical frameworks.
CO-PO/PSO Maooine
POI PO2 POI PO4 PO5 PO6 PO7 PO8 PO9 POt 0 POI I POl2 PSOI PSO2 PSO]
cor I , 2 2 3 I I
c02 3 I 3 I , ,,
3 3
co3 3 I 3 I 2 I I 3 )
Course Contents:
Text Books :
1. Thakkar Jitesh J., S*uctural Equation Modelling: Application for Research and Practice
(lst ed.), Springer, 2020. ISBN 978-981 1537929.
Reference Books :
I Civelek Mustafa Emre, Essentials of Structural equatton modelling ('lst ed.), Zea Books,
2019. tsBN 978-l -60962-129-2.
Assessment Scheme:
st
B n llniversity, Greater Noida
(E aJ Uid.ry'.r1 :.1 of Govl, ai Uli;ir lrrades h)
P No's 8, 9, 10, i1, Tech Zon e-li
G reater Noida-20131 O
Name ofProgram Bachetor of Technology (Computer Science and
Engineering)
CSET369 Time Series Analysis L T P C
Owning School/Department Department of Computer Science 2 0 2 t
Engineering
Pre-requisites/f, xposu re
CO-PO/PSO Ma
) POI Po2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO l0 POt I PO l2 PSOI PSO2 PSOS
col 2 I a I 2 3 I I
.,
c02 I I 3 I I I 3 3
co3 3 I 3 2
., I I 3 I
Course Contents:
'.'
Gaussian Process, Gaussian Regression, Vector autoregression models VAR, Structural Form,
Reduced Form, Parameter Estimation, Kemel Methods for forecasting, Adaptive filtering
mechanism for forecasting, Statistical Testing for stationarity, Augmented Dickey-Fuller,
Kwiatkowski-Philtips-Schmi&-Shin Test, Goodness of estimation.
Text Books :
l. Nielsen Aileen, Practical Time Series Analysis: Prediction with Statistics and Machtne
Learning (l* ed.)^ O'Reilly,20l9. ISBN t49204t653.
2. Mills Terence C., Applied Time Series Analysis: A Practical Guide to Modelling and
Forecasting (l* ed.), Academic Press,20l9. ISBN 978-0-12-8l3ll7-6.
Reference Books :
1. Nielsen Aileen, Practical Time Series Analysis (l* ed.), O'Reilly, 2019. ISBN
9781492041629.
)
Components Internil Assessment Mid Term Exam End Exam Total
COl: To explain best practices in data visualization to develop charts, maps, tables, and other
visual representations of data.
CO2: To build an interactive dashboard for a cohesive and seamless visualization.
CO3: To implement different visualization approaches on real-world datasets.
CO-PO/PSO Mappins
)
POr PO2 PO3 PO4 PO5 PO6 Pc)l PO8 PO9 PO l0 l,o l l POl2 PSO I PSO2 PSO3
cot I 2 I 1 1 2 3 I I
c02 3 3 I I , I 3 3
., .,
co3 3 3 I I 3 3
Course Contents:
t.
l! l:_ l
rollup dashboard, personalized Dashboards'
Actual versus potential utilization, utilization
Demographics Dashboard, vi"unii'i'g
f'"'ds Across Dmensions' Comparing growth rates'
Assessingthe quarity ordasrruoatii
M"t**ing tut"tts' Dashboard Administration' Designing
Colour-Blind-Friendly Visualizations'
Reference Books :
st
Excel Dashboards and Reporr's ( 1 ed')' ohn Wiley
1. Kusleika Dick Data Visualization with
'
& Sons, 2021' ISBN 1 I 19698723'
Assessment Scheme
R
Be elt
Pilt l"1o'
)!ni1
I'i'i'
i,1 t?, i*ii#fiiil
Grc3tei i:1::i-.''tutt10
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET371 Big Data Analytics and Business L T P C
Intelligence
Owning School/Department Department of Computer Science 2 0 2 J
Engineering
Pre-requisites/Exposure
) CO-PO/PSO MapDins
POt PrJ2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 POl0 PO PO t2 PSOI PSO2 PSO3
,,
col 3 2 3 2 1 2 3 I 1 2 2 3
co2 2 ) 3 2 2 2 2 I 3 3 a
cC)3 3 t I ) 2 I
Course Contents:
Reference Books :
1. Azevedo Ana and Manuel Filipe Santos, Integrdtion Challenges for Analytics, Business
Intelligence, and Data Mining (l* ed.), Engineering Science Reference, 2020. ISBN
9781799857832.
Assessment Scheme:
R tra r
B nett University, Greater Noida
rjlishEi l.!:ir:irA.l 24 ofGovl, oi tl llar Pradesh)
Plot Nlo'$ 3, 9, 10, 1'l , Tec h ZoneJl
Greater' Noida-201310
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET372 Ad va nced D a ta b ase Ma age m e n t Sys te m t. T P C
Owni ng SchooUDepartment Department of Computer Science ')
2 0
Engineering
Pre-req uisites/Exposure
urse utco es C
POI PO2 PO3 P04 PO5 PO6 P07 PO8 PO9 PO t0 PO POt 2
col 3 PSOt PSO2 PSO3
co2 3 3
3 3 3 3 2 3 2 3 3 3
c03 3 3 3 3 3 2 3 3 3 1 3
l=weakly related 2: moderately related 3=strongly related
Module l:
ER Model, Indexing Dependencies, Transaction processing,
Transaction n,'"""*".";,t!""tn'J;1,;ET.
Databases. Seriar schedurer, Non-seriar Schedurers,
concunency Contror, Time stamp ordering
Protocol' Multi version concurrency contror. varidation
concurrency contror, Recovery Techniques in
Databases, Undoing, Deferred Update, Immediate
Update, euffering and Caching in Databases,
Design Elements' cache SeL Resurtset, cache
serected fierds and varues, Caching seriarized
applications, Shadow paging, Data Backup Architecture,
Transaction logging, paging Architecture in
Databases, Full Backup, Differential Backup.
ill,
migra.tion ve6us homogeneous migration, Migration consistency, Database Transformation,
Differential Querying, Migration Consistency Verification, Order violation, Consistency violation,
Local Transactions.
Text Books :
l. Connolly Thomas and Carolyn Begg, Database Systens (6fi ed.), pearson, 2019. ISBN
9789353438913.
2. Sadalage Pramod J and Martin Fowler, NoSQI Distilled (l* ed.), pearson, 2012. ISBN
978032t826626.
Reference Books :
) 1. Hoffer prescott and Mcfadden, Mo dern Database Management (8h ed.),prentice HaI|,2008. ISBN
978-8131709481.
2. Bayoss lvan, Sp[ and Pt |SQL (46 ed.), BPB Publications,20l0. ISBN 928-8176569644.
Ascessmetrt Scheme
ar
B l-lniversity, Grealer Noida
-.1.t
l:iliii I Li;rJli1,.124 a,J GJvt, of Uri.x lriiidesl l)
PIot N,r's tl, $, 1 0, 11 , lbch .Zone- I
G; r;,.r1.r I iri'rr:r-:. ;1 3 r :)
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSETJTJ Satellite Data A nalysis L T P C
Owni ng SchooYDepartment Department of Computer Science 2 0 2 3
f,ngineering
Pre req uts I tes/E x pos u re
)
CO-PO/PSO Maonins
Module 1:
G^lS Definition, GIS applications, Geospatial dara for
GIS apptications, o,*,"1
of geospatial data. Concepts of mapping, paper based fi.[:""ni[,
projection, lirnitations. Cartography _
rup.'i. Aig,ul maps, map scale, map
History and o"r"foin,"rtr, advantages of digital maps.
Electromagnetic spectrum, pre-processing
of sut"rit" rrug"r- c"o."r.rencing and Image
enhancement' Ground Contror points- coriction
) rtect.omffit spectrum, pre-processing of
Satellite Images-Georeferencing and Image enrrancernert,
c-r-no cort.or points co[ection.
Modulo ll:
Key Elements of Satellite Image Interpretation-
Colour, Texture, size, *"r" ]H:['H;:O
GlS-raster representation of data grid size
and ."r;i;;i.n, raster ",tdata structures,
advantages/disadvantages of raster data moders,
data aup*r", ,u*". to vector conversion
vECTOR BASED GIS' Vector representation ofdata,
aaurntrg"rzarruauantages ofvector data
models, data bases Spatial and Non-spatial
data, Data Ciit""tion, Data Formats. Dara
Conversion.
Module lIl:
hours 6 lecture
Spatial Database Management Database Structures, Files; Standard Data Fo
Information Systems, Modelling Rea I World Features rmats.
Data Spatial Analysis and Modelling _
Proximity Analysis. Overlay Anal ysis, Buffer
A nalysis Network Analysis-findi ng shortest path
and Overview ol methods of multicriteria
analysis for educatiorr health a lcatrons.
Module IV:
Inregration of Elevation data- DTM/DEM
wirh satellite images Generating,
features from satelite images or* ,;;;T;"js
alit#filt;
S:*:J::: for publishing spatial maps-
Text Books :
l' Chang'K'T" Introduction to geographic information sysrezs (g
ed.), McGraw-Hilr Higher
Education, 201 9. ISBN 978-12601 36371.
2. Lillesand, T., Kiefer, *. *.,.T0-91]ry an; J., Remote
sensing and image interpletation (l
ed.), John Wiley & Sons,20t4. ISBN
978-l I18343289.
Refercnce Books :
1. Bemhardsen, T,, Geographic information
systens: an inrroduction(3 ed.), Wiley,
rsBN 978_ 8126511389. 2010.
2. Chris Brunsdon and Lex Comber, An Introduction
to Rfor Sryial Anatysis and Mapping
(spatial Anarvrics and GIS)
Q ed.), SAGE pubrication. i,a, Io r s. I'BN 978-1526428509.
)
Assessment Scheme:
r
E nett Univers ity, Greater Nloida
: olG,)!'1, flI Utiar prrdes h)
iirll!r-l.-.il L'Idor /l,rt 1
Pl( t r,11,': '1, g, i tl, I1,-Ti,:clrZone -[
I
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET374 s To cs in Data Science L T P C
Owning SchooVDepartment Department of Computer Science 2 0 2 J
Engineering
Pre-requisites/Exposu re
col: To familiarize and rearn about the latest trends and research in
the fierd.
Co2: To equip themserves with the conceptual and practicar experience
offew ratest methods,
tools, technologies or algorithms in Data Science.
CO-PO/PSO Maoninq
) POt PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 POl0 POt l2
cot I , I a I
I PO PSOt PSO2 PSO3
2 2 I
c02 a 2 1 2 3 3 2 3
Co Con ts:
As ment Sc heme
ar
Be ty, Greatci. Noicla
.i1.
o; a': ai Uli;ti fi.:lesh
t r, r,-(jlt,._,lllc_
r'i r.,1li1a)
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET375 VR Gami ng L T P C
Owning School/Department Department of Computer Science 2 0 2
Engineering
Pre-req uisites/Exposure
CO-PO/PSO Mappins
POt PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO t0 PO PO t2 PSOI
cot 3 3 I 2 I I
PSO2 PSO3
2 I 3
c02 2 I 3 2 2
2 2 3 3
l=weakly related 2= moderately related 3:strongly related
Module l:
Industrial applicability of VR, Five Classic Components
of a VR
Controllers, Position and Motion Trackers, Inside Out/Outside,
ar""r,':i[:[lT;;
Tracker performance
Parameters, Optical - Active and passive Trackers, Inertial
and Hybrid Trackers - HMD
Trackers, Magnetic Trackers' Mechanicar rrackers, Urtrasonic
Trackers, navigation and
Manipulation Interfaces, Tracker-Based navigation, Manipulation
Interfaces. Three_
Dimensional Probes and contro[ers, Data Groves and
Gesture Interfaces, Human behind the
lenses, Human Perception and Cognition, Human Visual
System, Human Auditory System,
) Human vestibular system, camera tracking and 3D Renderi,g
for Immersive Enrironm"nts,
Inside-Out Camera tracking, Depth Sensing, Full_Body lracking,
Inverse & Forward
Kinematics, Full body inertial tracking , Holographic Video.
Modulo Il:
Rendering Architecture, Graphics Accelerators, 3D Rendering,
Distributed
Multi- piperine Synchronization. Co-rocated Rendering pipetines, Distributed
#il:ilil;r:l.".,
virtuar
Environments, Modering thephysicar world, Geometric Modeling, virtual Architecture,
Virtual object shape. virtuar object Appearance, procedurar .r.extures,
Advanced Materiar
Properties, Procedural Objects, photogrammetry, Kinematics
Modeling, Homogeneous
Transformation Matrices, object position, Transformation
Invariants, object Hieirchies,
Scale, Perspective and perception, physical Modeling,
Collision Deiection, Surface
Deformation, Force computation, Force Smoothing and
Mapping, Haptic Texturing.
, Greater f.loida
,r:\i, of ilLiir Jrli Lj(
Piol i I 1, Tc!-tr :{o ne-Il
sh.i
.- :
t',', ,
,i1310
Module III: 9lecture hours
Presence, Agency and Interactivity, Augmenting the sense of Presence, Space and
Architecture, Dissolving the Medium, ldentity in Immersive Environments, Change of
Id€ntiry, Transforming the senses, Extending the senses, Agency and Interactivity,
Cybemetics, Interactivity within Physical Dimensions, Interactivity beyond Physical
restrictions: the Super Hero effect, Sound in Immersive Environments, Evolution of Sound
Systems, From mono to stereo to surround, Object Based Sound, Ambisonics, Sound Design
Basics, Sound as Information, Earcons, Impact of Sound in Objects and Actions, natural vs
Real Sound, Physical Computing, loT and sensor networks, Rapid Prototyping.
Text Books :
1. Glover Jesse and Jonathan Linowes, Complete Virtual Reality and Augmented Reality
Development with Unity: Leverage the power of Unity and become a pro at creating mbrcd
reality applicatioras (lst ed.), Packt Publishing Limited,20l9. ISBN 1838648186.
Reference Books :
l. Jerald Jason, The VR Book: Human-Centered Design for Virtual Reality Jason Jerald (lst
ed.), NextGen Interactions 2016, ACM Books. 2016. ISBN 978-1970001129.
Assessment Scheme:
? r
Clr,:::rter Noida
, ..i .:Lllrl lrr.r,l:th)
"i': , iiclr Zorle -ll
C ''."1()
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET376 3D Models fo r Augmented and Vi rtual l. T P C
Reali
Owning SchooUDepartment Department of Computer Science 2 0 2 3
Engineering
P re- req u s ites/E x p os u re
CO-PO/PSO Manning
Module l:
Virtual reality and environment, The historical
development o, ,*
computer ;;p;i.r, Ftight "no'i"il"!""i:H;.
landmarks in Computer Graphics, Real{ime
) simulation. Virrual
' rrirrqrq'lrvrrr v Irruilr
environments, Requirements for VR and AR,
benefits of ilnr"r *"iryI
Modulo ll:
S,FTWARE TECHNOLOGIES: Database ni,i;,o
Environment, Objects - Geometry, position
- wortd Space, wortd a"Ji"i,l"rr."l
/ Orientation, Hierarchy, Bounding Volume,
Scripts and other attributes, vR and AR Environment
Data, LODs, Cullers and Occluders, Lights - vR and AR Database, Tesserated
and Cu*"ru., Scripts, Interaction _ Simple,
Feedback' Graphical User Interface, contror paner,2D
contrors, Hardware Contrors, Room /
Stage / Area Descriptions, worrd Authoring
and prayback, v*,."rriu, Avairabre software
the market. in
Module Ill:
T lectu re hours
3D INTERAC TION TECHNIeUES: 3D Manipulation
tasks, Man lation Techniques and
Input Devices. lnteraction Techniques for 3D
Manipulation, Desi lines - 3D Travel
L',-r, I
Tasks, Travel Techniques, Design Guidelines - Theoretical Foundations of Wayfinding, User
Centered Wayfinding Support, Environment Centered Wayfinding Support, Evaluating
Wayfinding Aids, Design Guidelines - System Control, Classification, Graphical Menus, Voice
Commands, Gestrual Commands, Tools, Mutimodal System Control Techniques, Design
Guidelines, Case Study: Mixing System Control Methods, Symbolic Input Tasks, symbolic
lnput Techniques, Design Guidelines, Beyond Text and Number entry.
Text Books :
l. Bowman Doug A, Emest Kuijff, Joseph J LaViola, Jr and lvan Poupyrev, 3D User Interfaces,
Theory and Practice (2 ed.), Pearson Education, 2019. ISBN 978-0134034324.
2. Glover Jesse and Jonathan Linowes, Complete Virtual Reality and Augmented Reality
Development with Unity: Lewrage the power of Unity and become a pro at creating mixed
reality applicatiors (l ed.), Packt Publishing,20l9. ISBN 9781838644865.
Reference Books :
l. Pangilinan Erin, Steve Lukas and Vasanth Mohan, Creating Augmented and Virtual
Realities (l ed.). O'Reilly Publishers, 2019. ISBN 978-1492044192.
Assessment Scheme
POt P.]2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO l0 POI POr2
col 2 2 I 3 3 3 3 2 2 I
I
3
PSO I
.,
PSO2 PSO3
c02 2 2
2 3 2 a I 2 2 I I 3
Cours EC ontents:
Module l:
Game theory and mechanism, Normal fom games, Super modular games, JJ,liil,iJ"gr#j,
Repeated games, Games with. incompreti/imperfeci informatioi,
Cooperative game theory, Network games, Linear'Algeuru,
rrr."rruni., i".ign,
Rion. Algebra, calculus, phvsics
Concepts. Newlon's Law. Forces. Momenta. fr""rgy.
Rigid b";; ;ilr"r.-*i;;"ffi;
classifrcation, Rigid body kinematics. Newtonian dynu"ri"r,
iugrungian dynamics, Equations
of motion for a particle, system of particl-es, continium of
equations, of rnotion. Eurer's equations of motions, Sofl
r^i, Co*t.ulni.. fnt".pr.tution oi
Bodies physics, gnstrcityi stress ana
Strain..Mass- Spring Systems, l.D. 2D and 3D array
of rurr"r, Arbitrary configurations,
control point deformation, B-spline curves, B-spline surfrcer.
surrace. built fronr curves.
Modulo ll:
Free- form deformation, Impricit surface deformation,
Lever Set a"ri"1,iT:'i:*'il"
extraction in 2D images, Isosurface extraction in 3D images,
Numericar integration methods,
Euler's Method. High order Taylor methods, Runge-iutta methods,
Murtistep methods,
Predictor-corrector methods. Extraporation methods,
verret Integration, Numericar stabirity,
StiffEquations, Quaternion: Rotation matrices, crassicar
and Linear algebraic approach, From
rotation matrices to quaternion, Interporation of quaternion,
Co[isio, Detection: piperine,
Broad phase collision detection, Bounding vorume hierarchies,
spatial panirioning, Generation
contacts: Collision geometry, Contact generation Algorithms,
Separating Axis tests,
Coherence.
Module ll l:
6 lecture hours
Collision Re solution: Impulse, Torque, Collision Impulses, Resolvin g
lnte rpenetration, The
coll ision resolution process, Resti ng Contacts and Friction:
Resting force Micro collisions.
r, r.Ji i,,r
Types of friction, Stability, Optimizations, Digital physics: Physical modelling,
Acoelerometer, Location based gaming, pressure sensors, load cells.
Text Books :
1. Bourg David M and Bryan Bywalec, physics for Game Developers (2nd ed.), O,Reilly
Media, 201 3. ISBN 978- 144936t 037
Reference Books :
1. Schell Jesse, The Art ofGame Design: A Book of Lenses, (3rd ed.), A K peters/CRC press,
20r9. ISBN I13E632058.
Assessment Scheme
Weightage (%) 45
) 20 35 r00
Reg
Ben University, Grea ter Noida
Ul:i;rl.l ?4 of Gor'l, of U(dr Fradesh)
ed
tN o's B, 9, 10, 11 , Te ch Zone-it
G reater Noida-201S.10
Name ofProgram Bachelor of Technology (Computer Science and
Engineering)
CSET378 Game Programmi ng with HTML5 I, T P C
Owning School/Department Department of Computer Science 3 0 0 3
Engineering
Pre-req uisites/Exposure
CO-PO/PSO Ma DDTNS
POI PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO l0 PO PO l2 PSOI PSO2 PSO3
cot J 3 2 2 3
c02 3 3 2 , 2 3 1 3
c03 3 2 2 3 ", 3 I 3 3
Course Contents:
Modulo ll:
12 lecture hours
lntersection testing, Point in polygon testing, Testing using AAtsB,
Testin g using circles for
rntersections, Testing using the separati ng axis method. Testing
using the line-line overl ap
method. Testing using the rectangle-rec tangle overlap method,
Optimizing the tests, G ame
development setup, Exploring the G ame Library, XML. Deploying
an Applet, Executable JAR,
Deployment of game on rnultipl e applications, Swing animation.
Component animator,
RepaintCollector. LoopGovem er. Animated component. Animation library,
ComponentPainter, ComponentU pd ater, ComponentAnimator. Advanced
Graphics, Hardware_
Accelerated Images, Multi-Bufferi ng and Multi-Threading, Full-screen
Exclusive Mode.
Persistent Data, Persistent data formats, Persistence mechanisms,
Data Integrity, Game
architecture, Interfaces and inheritance, Model-View-controlleq
Component View MVC, A+
Algorithm, GridCartographer and GradientCartographer
Module III: 6 bcture hours
HTTP Tunneling, Reusable client and server-side code, Game specific client and server
side code, HTTP Polling, HTTP pulling, HTML5 file upload and download, File ApI and
Ajax / XHR2, Drag and drop files, Indexed DB, HTML5 Multimedia, Web Components,
Web Workers, The Orientation and Device Motion Apls.
Text Books :
1, Wright Timothy M., Fundamental Gatne programming with Java (l ed.), Cengage Leaming
PTR, 20t4. ISBN 978-1305076532.
Reference Books :
l. Millington IAN and John Funge, Artt/icial Intertigence for games (2 ed.), cRC press, 2009.
lsBN 978-0123747310.
Assessment Scheme:
*",w{
Ecnrlctt Un!e rs;ty, Greeter
Noida
CO-PO/PSO Mappinq
) POt Po2 POI PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO PO t2 PSOI
cot 3 1 3
PSO2 PSO3
c02 3
3 3 3 3 J 3 3 3
Module l:
Artificial Intelligence in Games, ways of AI in Games, Deterministic
u..rr. ol:i:"#[,l,lff"
AI, Established Game AI, Chasing and Evading, Agent Movement, Two_Dimensional
Movement, Statics, Kinematics, Steering Behaviors, Combining
Steering Behaviors,
Randomness in game, FSM with probability, Dynamic Al,
Coordinated Movement, Motor
Control' Movement in the Third Dirnension, pathfinding, Breadcrumb pathfinding, path
Following, Wall Tracing, Waypoint navigation, A* palhfinding,
World Represen-tations,
Defining Search Area' starting search, Scoring, Fi,ding Dead
End, Hierarchicai pathfinding,
Continuous Time Pathfi nding.
Text Books :
l' Bourg David and Glenn Seeman n, Alfor Game Deveropers:
Creating Inteligenr Behaviour
in Games (l ed.), O,Reilly Me dia,2020. ISBN 978_0596005559.
Reference Books :
l. Yannakakis Georgios N. and Julian Togelius, Artificial
Intelligence and Games (l ed.),
Springer, 201 8. ISBN 978-3319635194.
A.ssessment Scheme:
R
Be ett UniversitY, Greater Noida
Establi$l\{S UrlirAct 2'1 ol Govl of Uttrr Piadesh)
P lot t"lo'ri 8, 9, 10, 1 1, Tech Zone-ll
Greater I'loi 3-201310
Name ofProgram Bachelor of Technology (Computer Science and
Engineering)
CSET3SO Animation and Rendering Techniques I, T P C
Owning SchooUDepartment Department of Computer Science 2 0 2 3
Engineering
Pre-requisites/Exposure
CO-PO/PSO Mapnine
POr PO2 PO3 PO4 PO5 PC)6 PO7 P08 PO9 POt0 POt I POl2 PSOI PSO2 PSO3
col 3 3 3 3
co2 3 3 3 3
co3 3 3 3 3 3 3 3 3
Course ontents:
ii.ir
it::: l' . l^,,.. r' i r -.i-r-,
,
.rr.r itr .,.a,1
l
..,..i, lt llltl,.1-ll
,.
)
Animating modifiers, animating elements, animation helpers, using dummy
objects, dynamics
and reaction, Dynamic Objects: damper, Spring, simulation
mass FX.
T Boo ks:
l. Watt Alan H. and Mark Watl, Advaneed Animation and Rendering
Techniques Theory
and Practice (l ed.), ACM press, 1992. ISBN 978020154 4121, O20lS44lZt
.
Refercnce Books :
l. Mdller Tomas Akenine, Eric llaines and naty Hoffman, Real-Time Rendering (3
ed.), CRC
Press, 2019. ISBN 9781315362007, t3t3362007.
Assessment Scheme:
Re
B enn ett 'llr
(E!lnlil!hed rxi'illi f i", "1',fl ,!:.:l'?)
Lorle-rr
iriot No' ., C. L tO, 11, Tech
Grt:atir Noida-201310
) CS Op en
Electives: f,
rr, III, IV
)
Name of Program Bachelor of Technology (Computer Science and
Engineering)
CSET3STL A lications of AI L T P C
Owning SchooUDepartment Department of Computer Scie[ce 3 0 0
Engineering
Pre-requisites/Ex posure
CO-PO/PSO Manoins
POt Po2 PO3 PO4 POs PO6 PO7 PO8 PO9 PO t0 POr I PO I2 PSO PSO2
cor 3 3 2 2
r PSO3
3
coz 3 3 2 2 2 2
c03 ., 3
3 2 3 2 1 I 3 3
Course Contents:
Module l:
Introduction: Introduction to Artificial Inteiligence, Foundations
Intelligence, Introduction to Search: Searching for sorutions,
,ro ,i.rJN,'1"1'i"nli,ilir
Uniformed search strategies,
) search strategies, Locar search algorithms and optimistic probrems,
lnformed Adversarial
Search, Search for games, Arpha - Beta pruning, Apprications
of Artificiar Intelrigence. Markov
decision processes, lntro to neural nets.
Modulo ll:
Reasoning wirh uncertaintv, probabiristic reasoning over
Decision Making, Strategy, Infrastructure, AgentBased
time Leaming o"ftfflil""IH;,,
Al.
Module llI:
9 lecture hours
Hacks and^Heuristics. Vision Systems: fundamentals of image
formation, camera imaging
geometry, feature detection and matching, Multiview geometr!.
Module IV:
9 lecture hours
Motion estim ation and tracking, and classification, Action recognition
Color spaces and
Segmentation,
!ljs i.ij r
erter iVoi da
r:,- -., 'il cl
'i-e
l-.,.i.ri
ch
,i lcsh)
. oi-l a -201 :r :Z one-li
l0
Text Books :
1. Russell Stuard and Peter Norvig, ArtiJicial Intelligence: A Modern Approach (3 ed.\,
Prentice Hall, 2010, ISBN 978-0136042594.
Reference Books :
l. Forsynth and Ponce, Computer Vision: A Modern Approach (2 ed.), prentice Hall, 201 l.
rsBN 978- 9332550117.
2. Millington tAN and John Funge, Arti/icial Intelligence for games (2 ed.), CRC press, 2009.
ISBN 978-01237473 10.
Assessment Scheme
E)
I
Be ntvo rsit),, Greater
(Eiil rhcJ UrCtiA. I :4 0lLj ,vt, oi No ide
ultir P radesh)
Plot llo'3 B, O, 10, 11, Tech
Gre drcr t\tJiC.l -201310 Z one-ll
Name of Program Bac h e o r o f T ec h n o logy (Co m p u ter Sc I en ce z n d E D gl n ee rl n g)
CSET3SI Ap ications of Al I, T P C
0wning SchooUDepartment Department of Computer Science En gineering 3 0 0 3
Pre-req u isites/Exposure
COI: Know various Al Agents and AI search algorithms (uninformed, informed, heuristic^ constraint
satisfaclion. genetic algorithms).
CO2: Demonstrale working knowledge of reasoning in the presence of incomplete and./or uncertain
information.
co3: Apply knowledge representation, reasoning, and machine leaming techniques to real-worrd
problems.
CO-PO/PSO Mappins
PO Po2 PO3 PO4 POs PO PO PO PO POt POt POI PSO PSc)2 PSO3
6 7 8 9 0 2 I
col 3 3 , 2 3
co2 3 3 2 2 2 , , 3
co3 3 , 2 3 2 2 t 3 3
Course Contepts:
Hacks and Heuristics. Vision Systems: fundamentals of image formation, camera imaging
geometry, feature detection and matching, Multiview geometry.
Motion estimation and tracking, and classification, Action recognition Color spaces and
Segmentation.
tu,,'
fr,-,
,'l r- r
.tit:a
'
i lj;.1l: tl
_1_- )
Ii, Zone-il
ii:11[J
studenls will be able to imprement the various AI algorithms and develop a project based on
gaming/image processing using python/MATLAB/CUDA.
Text Books :
l. ftts-sell lluard and Nonig Peter, Artificial Inteligenee: A ModernApproach, (3 ed.), prentice Halr,
20 I 0. tsBN 978-0 I 36042594.
Reference Books :
I l?yyfi-l lnd Ponce, Comryter Vision: A Modern Approach (2 ed.), prentice Hall, 201l. ISBN
978- 93i2550117..
2. IAN Mi ington and John Funge, ArtiJicial lntelligencefor games (2 ed.), CRC press, 2009. ISBN
978-0t237473t0.
Assessment Scheme:
R S r
B * tt Univi,rr.ity, Grealel N0ldts
blisi r.J j.j/\!l
!" ,1 otCc( ol l-r:l:1| [,rr,]?rh
Plot t\],;'s il, 9. '10, 11, Teclr Zone"
Gre"rlcr f.;cicia-;10 1 31 0
Name of Program Bachel or of Te c h n ol o gv (c o m p u ter s c I e n ce a n d E n gr n ee rt n
s)
CSET382 Web T€chnol es L T P C
0wning SchooUDepartment Department of Computer Science En grneerlng 3 0 0 3
Pre-requisites/Exposure
r
,r, (l r,:l::tir Nci.ia
.l
_- :j ' : l1i:,:;.,4h)
, r i, l:.,:t,,'.Crt,"..li
, ii, rr)
deleting data and tables, pHp myadmin and database bugs, Exploring
cookies, Sessions, and pfrp
Security.
Text Books :
l. 5_ogglr_!:Tnlrg Solutions Inc, Web technology btack book (l ed.), Dreamtech press, 2009. ISBN
978-8177229974.
Refercnce Books :
Assessment Scheme:
R trar
Bennetl Unlvcrsity, Greater Noida
(Esiablishc, UndirAct !1 of Gcvt, ol UllBr Pradesh)
-lech
Plot hlo's 8, S, 10, 11, Zone-ll
Groater Ncidii-20'1 310
Name of Program Bachelor of Technology (Comp ut€r Science and Engineering)
CSET383 Semantic Technology L T P C
Owning SchooYDepartment Department of Computer Science Engineering 3 0 0 3
Pre-requisites/Exposure
COI : Demonslrate the understanding ofthe approach to modelling information and knowledge.
CO2 : Produce the data that encodes semantics using well-known technologies such as RDP and
owL.
CO3 : Use sophisticated querying approaches Io facilitate distributed information retrieval and
aggregation.
CO-PO/PSO Mappinq
PO Po2 PO3 PO4 PO5 PO PO PO PO POt POI POI PSO PS02 PS03
I 6 7 8 I 0 I 2 I
1
col 2 I 2 I 2
,'
co2 2 t 1 I 2 3
c03 2 2 3 2 3 2 3 3
Course Contents:
Text Books :
l. Hitzler Pascal, Krotzsch Markus qnd Rudolph Sebaslian, Foundations of Semantic Web
Technologies (l'' ed.), CRC Press,2009. ISBN 978-1120090505
Assescment Scheme;
R r
Be University, Greater Noida
hed UnderAcl 24 of Govl, ol U ttar Pradesh)
lot No's B, g, 10, 1'1, Tec h Zone-ll
Greater Noida-201310
Name of Program Ba c hel o r o f T ec h n ol ogy (c o m p u e r Sc I e n ce AN d E ng n eer I ng)
CSET3E4 lT Su rt Technologies L T P C
Owning SchooUDe partment De pa rt m e n t o f om p u te r Sc I e T ce E ng I Il ee rt n
c 3 00 3
Pre-requisites/Ex posure
COI : Understand the need for lT Support Technologies in the current era.
CO2 : Gain an in-depth knowledge offirewall security and other network
security components
CO-PO/PSO Maopinq
PO Po2 PO3 Pc)4 PO5 PO PO PO PO POI POt POI PSO PSO PSO
6 7 8 9 0 I 2 I 2 3
col 2 3 I I 2
.,
I 3
c02 3 3 3 2 3 2 , ', ", I 3 3
Text ks:
r )l
-ii .r'tfl 'ii
,
:, iJ
2' stallings ltilliam, Data and conputer communicctions (gh ed.), pearson Education,
20r0. tsBN
978-0t3t392052.
Refcronce Boolis :
3. Tanenbaum A.5., Compater Ne*orks (5th ed.), prentice Hall,20t0. ISBN g7g-0t334BSgj6.
Assessment Scheme:
R r
ett L,niversi ty, Greater Noida
air;i!;)cd U:t:lJfArl 2 .1 cl t";c\,1,
ol U ,tdr Prcdersh)
ot l',lo' sc, g, 10, 1 1, l-ec h Zone-it
Greater N oiCa-201310
Nam€ of Program Bachelor ofTechnology (Computer Science and En gineering)
csET385 Software En grneenng L T P c
Owning SchooUDeparlment Department of Computer Science Engineering 3 0 0 3
Pre-requisites/Exposure
CO-PO/PSO Mapning
PO Po2 PO3 PO4 PO5 PO PO PO PO POt POI POI PSO PS02 PSO3
6 7 8 9 0 I 2 I
cot I 3 I I I I 2 3 I 3
c02 3 3 3 2 3 ) I
.,
2 2 ) 3
)
l=weakly related 2: moderately related 3:strongly related
Course Contents:
Software Architecture: What is Software Architecture? Advantages and use ofarchitectural models.
Architectural pattems. Different architectural pattems (Layered, MVC, Repository, Pipe and
Filter). Design Patterns: Pattems Catalogue, Pattern Format, Factory Method Pattem, Strategy
Pattern, Choosing a Pattem, Negative Design Pattems. Software Testing: Black Box Testing
Failure, Fault and Error, Verification Approaches, Pros and Cons of Approaches, Testing
lnroduction, Alpha and Beta Testing, Black-Box T€stirg, Systematic Functional Testing
Approach, Test Data Selection, Equivalence Partitioning and Boundary Value Analysis, Create and
Evaluate Test Case Specifications, Generate Test Cases from Test Case Specifications, White-Box
Testing: Coverage Criteria lntro, Statement Coverage, Control Flow Graphs, Test Criteria.
Text
2. Sonnemille, Softwme Engineering (l1th ed.), Person Publications Publishing Company, 2015. ISBN
978-0133943030.
Assessment Scheme:
.)
*"k/
Bennett University, Grcnter Noida
(EtrL i:llcJ U ljrl:t.:rlCo,l.( U.t.,r oradtsh)
Plot IJc s 8, 9, 10, 11, Iech Zone-il
Greater t'loiCr-201 :ii 0
Nam€ of Program Bachelor of Technolos/ (Computer Science and Engineering)
CSET386 Programming Languages L T P C
Owring SchooUDepartment Department of Computer Science Enginesring 3 0 0 3
Pre-requisites/Exposu re
COt : To explain the requirement for the interdisciplinary application of programming languages
CO-PO/PSO Maopinq
PO PO2 PO3 PO4 PO5 PO PO PO PO POI POI POr PSO PS02 PS03
I 6 7 8 9 0 I 2 I
col I I a ., , I I !
) co2 .,
I I
.,
I I 3
co3 I I I 3 3
Course ontelrts:
Programming, programming language. Types of programming languages, high level Ys low level,
compilers, interpreters, assemblers, binary code. Datatypes, variables, keywords, identifiers,
Importance ofcomments in programming. Implementation of scope rules. Static scoping and dynamic
scoping.
hogramming constructs: conditional stalements if statements, else statement, if-else statement. For
loop, while loop, nesting loop. Do-while loop, infinite loops, break, continue statements. Arrays, one
dimensional array, multidimensional array.
Functions, in-built functions vs user-defined functions, importing libraries for using in-built functions.
Pointe$ and its types, arrays of pointers, pointers, and functions. Passing parameters to functions,
returning values fiom funclions, recursion. Dynamic arrays, string, string variables, string handling
functions.
Module lV: I I lectures hours
TextBooks:
bl
'P1frf;hisr
(C::,,'.- .t.I :ni'.'.-1r l;r),. (l1elt..r l.!Oida
(frl.r- ,.,lrJ I l,' . .-rirl :l.lf-:Jvl,0i l.liii'rr Pl:dcsl,
FInt Nc':,4, g, 1C, 11, Tech Zone-li
Gr()a]lei- [.:oi.:e-2r,11 31 0
l. Bansol Anind Kunar, Infioduction to ptogramming Languages (r"t ed,), chapman
and Hal/cRC,
20I7. ISBN 978I I384608 t8.
2. Kanetbar Aditya and Kanetkar yashwant, Let us python (1" ed.), BpB, 20lg_ ISBN g7ag3agg4500g.
Reference Bookt :
1. Klobnik steve and Nichols Caror, The Rust programming Language (t't ed), No starch press,
2019-
ISBN 978t718500159.
Agsessment Srheme:
I
{4,
R#strar
Bdnnett University, Greaiei [!oidq
(Eslae:;lhEJ Una:.A tl.1al Oort, ct U rar Prq.leEhl
Plot No's 0, 9, 10, 1 I , -teeh EoilCdl
Greator I'loida-201 310
Name of Program Bachelor of Technology (Computer Science and Engineering)
CSET387 Artificial lrtelligence for Creative Expression L T P C
Owning SchooUDepartment Department of Computer Science Ergineering 3 0 0 l
Pre-req uisites/Exposure
CO.PO/P Maooins
PO PO2 PO3 PO4 PO5 PO PO PO PO POt POI POI PSO PSO2 PSO3
I 6 7 8 9 0 I 2 I
col t I 2 3 I I
co2 I 3 2 2 1 3 3 3
co3 3 I I , 3 2 2
Course Contents:
Wlat is machine leaming? Playing around with Wekinator and Tensorflowjs to start making some
interactive work and get familiar with concepts of training the machine with some data, running a
trained model and seeing interactive output. What are neural networks? Looking inside neural networks
and how neural networks are ffained, understanding what terms like weights ofa network. activation
function etc. mean, Convolutional neural networks and how that leads to Deep dream. Experiments
with deep dream to visualize layers.
Recurrent neural networks- Text Modeling, Sketch (vector drawing) Modeling, Music Modeling.
Introduction to sequential datasets in the contexl of art, like quickdraw, text corpuses and musical
datasets and what can be done wilh such sequential data. Ethical considerations around widespread use
of Al. Conceptual art pieces that commenl on this issue.
#4,"'" :
if i", cri:r1. i-i.,loirla
L.i ...i1:: : i'l.l.rrlt)
.1, -l
. .,, , 1 i. ::;ir Zoirc-li
'' r lltir)
Dimensionality reduction algorithms like TSNE, and how they can be used to form intersctive
ways of
exploring data. Example art pieces using this. Cenerative models- Generative Adversarial Networks
(cANs). understanding the basic formulation ofa GAN. pipeline ofhow to
train a GAN for art. GAN
latent space aritbmetic.
Text Books :
1. Sautoy Marcus Du, The Creativity Code, Art ond lnnoyarion in the Age
ofAl (ts, ed.), Hanard
University Ptess, 2020. ISBN 978067424421g.
Reference Books :
l;/s+q fevin,,y* An with Artifcial lntettigence, Make and Selt your Art with At,
Btockchain and NFT (1" ed), Independently piblished, 202 t. ISBN 97g8S7Z t 8g3 t0.
Assessment Scheme:
Reg ar
Be iverslty, Greater Noida
ed Uxd er Act 24 of Govl, ol U ar p radesh)
No'e 8, 0, 10, '11. Tech Z one-ll
G reater Noida-201310
Name of Program Ba c h el o r
of Tec h n ol ogy (Co m p u te r s cl en ce a n d E n ll e e r ng)
CSET388 Al and Public Policv L T P C
Owning SchooVDepartment Deparlment of Com puter Science En gineering 0 0 3
Pre-req uisites/Exposure
CO-PO/PSO Ma DDTNS
PO P02 PO3 P04 PO5 PO PO PO PO POI POI POI PSO PS02 PS03
I 6 7 8 9 0 I 2 I
col 2 z 2 2 , 3 2 2 2 1
cC)2 1 3 ) ) a , 2
.|
T 2
) co3 , .|
2 2 2 2 2 2 !
l=weakly related 2: moderately related 3=strongly related
Course Contents:
AI Policies in India: NITI Aayog, Al initiatives by Ministry of Electronics and IT, Al Initiative by
Ministry of commerce and lndustry, national AI based portil, AI Academia,/ lnstitutes and centers in
India, AI standardization in India: Bureau of Indian standards (BIS), Department of relecom (Dor),
) Key considerations for AI policymaking in India: Resources, Infrastru;ture, Markets, and Funding,
Policy environment for Al innovalion, Democratize AI technologies and data, national infrastructure t-o
support domestic development: AI Data storage, AI Networking Infrastructure, Awareness, Education,
and Reskilling: skill sets ro successfully adopr AI, Early Childhood Awareness and Education, Focus
on marginalised groups, Improved access to and awareness of Internet of rhings, public Discourse,
Impact of AI on different stakehorders: Emproyees, customers, Business, etc.. How has CovrD-19
affected the Al trends?, Business Transformations with Al-
AI in warfare and diplomacy, AI shortfalls for milirary applications, Transparency in AI, Audits, Tiered
Levels of rransparency, AI and economic growth: Economic characteiistics of AI, private equity
investments in Al start-ups, Broader ffends in development and diffusion of Al, How increases
automation in the production of goods and services is impacting economic growth?, How can we
reconcile the advent of AI with the observed constancy in giowth mtes and cap'ital share over
mosl of
Documentary on Impact ofAI in economy, case study: How do you organize the skills to best facilitate
innovation for your firm?, Pitch deck for ideas or new application of AI, pitch deck for ideas or new
application of A[, Coordinatior and collaboration across stakeholders, Development of Contextually
Nuanced and Appropriate AI solutions continuing, deepening, and expanding partnerships for
innovation, Develop contextual standard benchmarks to assess quality of algorithms, Frameworks for
Regulation: national legislation, Data protection Law, Discrimination Law, Frameworks for
Regulation: competition Law, consumer protection Law, secloral Regulaion, AI policy challenges:
Intellectual Property Regime and Al issues, catastrophic and Existential Ris( AI policy challenges:
Security and Cyber security, Re-thinking Intellectual hoperty Regimes.
) Text Books :
3. West Darrell M and Allen John R, Tarnihg point: policymaking in the Era of Arrificial
lntelligence (l't ed), Brookings lnstitution press, Washington, D.C, 2b20. ISBN \dl57iSSgS.
Refercnce Books :
l. Shmma Pankaj and Sarangi Saswa, Artificial lntelligence: Evolution, Ethics and public
Policy (l"t ed.), Trylor & Francis, 20t9. ISBN 978-t t38625389.
Assessment Scheme:
"{ks"{Unuersity, Greater
B$fr}il Noida
(Est;Lrij-h:J Lr;rl.rAct24 of Go!,l, of Uttar Pradesh)
Plot No's 0,0, 10, 11, Tech Zone-ll
Greaiei i\ioi.la-201 31 0
Name of Program Bac h el or o f Tech nol o gv (c om p u ter Sci ence a n d En gl n ee fl n c)
csET389 Linux Apache MySql PHP (LAM P) L T P C
Owning SchooUDepartment Department ofComputer Science En gineering 3 0 0 3
Pre-req uisites/Exposure
CO3: To design and develop webpages and web sites for the needs ofan organization.
CO-PO/PSO Maooinq
PO PO2 PO3 PO4 PO5 PO PO PO PO POI POI POI PSO PSc)2 PSO3
I 6 7 8 9 0 I 2 I
) col 3 , a 2 1 t ., a
co2 2 2 3 2 1 , 2 3 2
.,
co3 a 2 2 3 2 1 2 3
Course Contents:
ooPs concepts, Defining class in PHP, object in pHp, constructor, constructor with parameters,
lntroduction to Exception, Exception Handling mechanisms, crealing custom Exceplions, Multiple
Catch Blocks, Exception Propagation, Enor Handling in pHp, Web designing principles.
r
B t ill r,,,ersity, Gre cter N oida
,l-lith.:l ll : l il ::1ci G!vl, r,l U( p r'aJ6sh)
lDt I'; t'l; |, C, 10, 11, Tech
Z one-ll
G rea t.i l,l.ia.r ::01310
HTML, CSS, Java script, Supporting tools and CMS, lntroduction to MySeL, Learning the MySeL
Data Types, Frequently used string functions in MySeL, Regular expressions and their uses in pHp,
Cookies, Session variable, its session ID management, File handling in pHp.
Text Books :
1. McPeak Jeremy, Beginning Jqvascript (Sth ed.), wox publication,20l5. NBN g78-D rgg03J39.
Reference Books :
Luke and Lqura Thomson, pHp and MySeL l(eb Development (Sth ed.), pearson,
-a^. _1. lfeJli1g
20t 7. tsBN 978-0672329I66.
Assessment Scheme:
IS r
e tt Unhrers ity, c reater Noida
.,;i../ l-rndri q.l 2,lof(,i./ q,
lot l{o's 8, 9 10, 11, oi U{ia r Pradesh)
Tech Zone-il
G rc"'atc r Airrid a-201310
Name of Program Bac hel or o f Tec h n ol ogy (c o m pu ter Sci en ce a lt d E n gi n ee rt n g)
csET390 Data Structures and Al ithms L T P C
Owning SchooUDepartment Department of Computer Sciencc E ngineering 3 0 0 3
Pre-req u isites/Exposure
col: To explain basic data structures for storage and retrieval of ordered or unordered
data. Data
structures include arrays, linked lists, binary, trees, heaps, and hash tables.
co2: To implement algorithms for the creation, insenion, deretion, searching, and sorting ofeach
data structure.
CO3: To examine and compare algorithms for efTiciency using Big-O notation.
CO-PO/PSO Mappins
PO PO2 PO3 P04 PO5 PO PO PO PO POI POI POI PSO PS02 PSO3
I
) cot
6 7 8 9 0 I 2 I
I a 3 , 3
co2 I 2 3 a 3
co3 ) 3 't 3
Course Contents:
Asymptotic notation, Recursion, Masters theorem, Array storage, Memory allocation in 2D array,
static
vs dynamic memory allocation, Binary search, Array search, traverse, insertion, and
deletions, Linked
list, Linked list modifications (circular, doubly), Traverse, insertion, and deletions in linked list.
Text
n (
I :ri.': :r; l,,, Grc:tti:r Nr.rida
.r , L'iiy Fr. l.tl)
,l', Ir, il, t.tchZorre_ti
C : .:-' r -il I i'l il l (i
l.Karumanchi narasimha, Data structwes and Argorithmic Thinkingwith Go (t"t ed.), careerMonk
Publications, 2020. ISBN 978 I 949870909.
l. Cormm Thqnas H, Charles E. Leiserson, Ronald L. Rivest and Clifotd Stein, lntroduction to
Algorithns (4h ed),
The MIT Press, 2022. ISBN 9280262362]105.
Reference Books :
l. D_edov Florian, A Complex Subject Sinply Explained (Rurtime Compl*ity, Big O Notation,
Programhing) (t"t ed.), Amazon Digital Senices LLC - KDp'prini USI 2020. ISBN
9798678017192.
2. Wengrow Jay, A Common-Sense Guide to Dqta Structures and Algorithms (2 ed,), O,Reilly, 2020.
tsBN 9781680508059.
Asses3ment Scheme:
o.w
Benfi'ett Univcrs;t/, Grcater Noida
col: Leam the basics and applications ofartificial intelligence, machine leaming and categorize
various problem domains, basic knowledge representation and reasoning methods.
CO2: Design Supervised and Unsupervised Learning approaches for real-life problems.
co3: Develop AI and Machine Learning systems using supervised and Unsupewised Leaming
approaches.
CO-PO/PSO MaDDins
PO PO2 PO3 PO4 PO5 PO PO PO PO POI POI POI PSO PS02 PS03
) 6 7 8 9 0 I 2 I
cor ,,
3 3 3 1
3 3
c02 3 3 3 2 3 , 3
co3 3 3 ,,
3 2 3 3
Course IrteIrts:
Evolurionary Algorithms like Genetic programming, Genetic Algorithm, optimizarion of ANN using
Evolutionary Algorithms, Fuzzy Logic, Member ship function, how to improve the model, diversityl
training time, partitions of datasets.
i ';
t/ (-' ;Ilii1la
_'.
, ,;r. i I i. :jh)
' i.' ': i, I'cf' 'ro're-ll
j:-.'l l' ,t-li'
Design, analysis, and implementation of programs that leam from experience and project that
includes machine leaming for solving real life applications.
Text Books :
l- Knight Kevi4 Elaine Rich and B. nair, Arti/icial Intelligence (3rd ed), McGraw Hil! Education,
20 I7. rSBN 978-0070087705.
2. Alprydin 8., Introdaction ro Machine Leatning (ird ed_), pHl, 2015. ISBN gZ8-B t 20350286.
Referenc€ Books :
l. Panerson D.W, lntloduction to Al and Expert Systems (tst ed.), pearson Education lndia,20lS.
lsBN 978-9332 551947..
2. Bishop C- Patern Recognition and Machine Learning (tst ed.), Springer, 201 l. ISBNg7g-
0387i 107i2_
Assessment Scheme:
)
Components Internal Assessment Mid Term Exam End Exam Total
R ar
B niversity, Greater Noida
j llrrCrr,'.t24 !lCo\4, oiUttar pradesh)
P t'Jo 's 3, 9, 10, 11 , Tech Zone-il
G reater Noida-201310
Name of Program Bac heor o f Te c h n ol ogli (C o m p u te r Sc t€ n c e a nd E n gi n ee rt n s)
CSET392 Applied Al L T P C
Owning SchooUDepartment Department of Computer Science En gineering 4 0 0 4
Pre-requisites/Exposure
col: understand the need for Artificial lntelligence and the limitations ofconventional methods.
co2: Design, Develop, and Implementation of various AI methods in prolog, and in python for
prediction, regression. classification, clustering, Searching, and decision-making problems.
CO3: Demonslrate the ideas behind seleclion ofvarious Al methods and their use.
co- Maonins
PO Po2 PO3 PO4 PO5 PO PO PO PO POt POI POt PSO PSC)2 PSO3
6 7 8 9 0 I 2
cor 2 3 .,
3 3 2
) co2 2 3 3 2 1
3 I
c03 2 3 3 2 ,,
3
Course ntenLs:
Introduction of AI : The AI basics, Al problems, The core assumptions of A I, The need of AI over the
traditional methods, the AI Techniques, The level ofthe Model, briteria for success and failure ofthe
models, Artificial intelligence fundamentals, Machine leaming, Human languages technologies.
Distributed systems: paradigms and models for AI, Inteligenr syitems for patteir ricognition, sirart
applications using AI, Computational mathematics for leaming and data anaiysis.
Application ofAI in natural language processing, Introduction, syntactic processing, semantic analysis,
discourse and pragmatic processing, spell checking, Measures of wordNet similarity. Sentiment
analysis and opinions on the web.
k.
/"
Module V:
12 lectures hours
Probabitity
and_Bays' Theorem, Cenainty Factors and Rute-Base Sysrems,
::::.],,::1.*T_"jl:g:Dempster-Shafer fieory,
::I^.jlT-^1yr"r, Fuzzy Logic. AI for knowtedge represenrario;, rule:
oased Knowredge representation, procedural and declarative knowledge, Logic-progiamming,
Rorward
and backward reasoning.
Module VI:
8 lectures hours
l. \tlylf !il: !.4rti/icial Inte igence: A New Synthesis ( tst ed.), Morgan_Kaufmann, 1998. ISBN
978-1558605is0.
) 7.!yt:!_S!y:1,-y! Peter Norvis, ArtiJiciat Ine igence: A Modern Approach (3rd ed.), pearson,
0. tsBN
20 I 978-0 I 36042594.
Reference Books :
I !!t!:n Christopher M, Pattern Recognition and Machine Learning (tst ed.), Springer,
2006.
tsBN 978-t 493938438..
2. Jurafslcy Daniel and James H. Martin gteech & language processing (2nd
ed,), pearson
Education [ndia, 2000. ISBN 978-013t573216.
Asgessment Scheme:
^",W
Benneli L':i. ,. r;:ly. Grr.:rtcr Noida
(Eji.,-li"h!d lli,- .: ,1..i r^l cl(;!,,/1, oi Uil$ Pradesh)
PIot l.lc r: ll, i;, 1C, 1i, Tech Zone-ll
Grc;:: ior' l(oi,,i::-201 3 1 0
Name of Program Ba c h e o r of Tec h n ol ogy (c o m p u ter Sc T en ce an d E ]lg I n ee rl n
c)
CSET42O loT: Securi and Attacks L T P C
Owning School/Department D ep a rtm en t o f c o m p u Ier Sc I en ce E n n ee rI n 2 0 2 3
Pre-req uisites/Exposure
C rse Ou es(COs)
On completion ofthis course, the students wili be able to:
CO-PO/PSO Mappirq
PO PO2 PO3 PO4 PO5 PO PO PO PO POI POI POt PSO PS02 PSO3
6 7 8 9 0 I 2
col ,
I
t .,
2 I 2 I
c02 2 , 3 2 2 2 2 I ^, 2
) c03 2 a 3 , 2
.,
3 3 2 3
Course Contents:
overview ofwsN. roT, roT conceptuar Framework, IoT Architectural View, Technorogy
Behind IoT,
Sources of IoT. M2M communication. roTA42M systems Layers and
Design s-tandardization,
communication Technologies, Data Enrichment, oati Consolidation and Devi-ce
Management at
cateway. Examples of IoT, Ease of Designing and Affordability. use case studies: Smart
Hoire, Smart
City, Precision Agriculture.
lels]ng tle Real-world using Anarog and Digitar sensors, Industriat IoT, Automotive IoT, Actuator,
RFID. Technology - Principles, Architecture, Apprications & components, web of rhings of RFIDsI
cloud computing Paradigm for Dara Coflection, storage and Comjuting, Everything
as a-service and
) Cloud Service Models for loT.
Security and Privacy Requirements, Threat Anarysis, toT Layered Attacker Moder,
Access contror and
Secure Message communicalion, Security Modirs.roT Hardware (deveropment
Boards): Raspbe.ry;i
Arduino, NodeMCU, etc.SDN, NFV, Humanoid, Drones, 5G.
Studlo Work/Laboratorv Exneriments:
Network programming hands on guide. Hands-on exercises on IoT hardware and software. Develop
loT Capstone hoject.
Text Books :
Reference Books :
l. Ovidiu Vermeson & Petet Friess, lntemet of Things: Cowerging Technologies for Smart
Etnitonments and Integrated Ecosystems (lst ed,), River Publishers Series in Communications,
20 I 7. ISBN 978-87929827 3 S.
) @s@c:
Components lnternal Assessment Mld Term Eram End Exam Totel
0
ett Univers ity, Greater
l;L,l;i
, l.l;:d,nt,cl: ,i N oida
iot No' s8,3, 10 ol1Govi, oi Uliaf P r;desh)
Grearer l{oi da-20"1 1, Tech zone-ll
310
Name of Program Ba c h e lo r o f Tec h n ol ogy (Co m p u ter s ct e n c€ a n d E n gr n eert n e)
csET424 VR & 360 Video Production I, T P C
Owning SchooUDepartment De pa r tm e n t o t C om p u te r s c I e n ce E n gr n ee r n g 2 0 2 3
Pr€-requisites/Erposure
CO-PO/PSO Maooins
PO Po2 PO3 PO4 PO5 PO PO PO PO POt POI POt PSO PS02 PS03
6 7 8 9 0 2 I
col 3 3 3 3 3
co2 3 3 3 3 3 3 3 3
c03 3 3 3 3 3 3 3 3
Intro to design: understand basic vR design principres such as iteration, user testing,and
documentation, Design foundations, ergonomics: Create a VR User persona,
d"rign an ergoromil'Vi
experience, create comfortable vR Text, set the scene and first
user test: create-a vR te"sting scene,
Create your first User Test, Document your first VR experience.
The laboratory of 360 Video hoduction is designed to provide a practical exposure to the students about
the concepts and topics taught in the classroom sessions. Implementing ths learnt concepts using
An&oid and Unity will help the students to have a better understanding ofthe subject.
Text Books :
1. Wohl Michael, The 360" Yideo Handbook: A step-by-slep guide to creating video for virtual
reality (YR) (1 ed), MichaelWohl, 20 I 7. ISBN 978-0692904282.
2.Tustain Jonathon, The complete guide to Vr and 360" Photogaplry (1 ed.), llex Press,2018. ISBN
978- 1781575390.
Reference Books :
l. Tricart Celine, yirtual teality Filnmaking (l ed.), Taylor and Francis, 2018. ISBN 978-
11382ji9s9.
) 2. Bucher John, Storytellingfor Virtaal Reality (l ed.), Routledge, 2018. ISBN 978 I138629660
Acc@slelqq:
Compotrents Interml Aise$ment Mld Term Exam End E:am Total
R stroi'
B n!it t.lni\i er'r', i1,,. Grert,:r' ll'-'lda
' ,f Gr .1. (i r.'. i' P, rile:lr)
'i'l -teclr Z':r rc-l
(E
P I, 0, ,
Gr -at,:r i',i.',i.i:. :lJ1 3i0
a
Sp ecta lization
) Electives:
Gaming and
Virtual
.l
Reality
At
,/
Name of Program Bachelor of Technology (Computer Science and Engineering)
CSET425 Augmented Reality & AR Core L T P C
Owning SchooYDepartment Department of Computer Science Engineering 2 0 2 3
Pre-req uisites/Exposu re
COI: To identify different types of AR experiences, tools and platforms used in the AR landscape
CO2: To break down complex AR concepts to make them easy to understand.
CO3: To start building an AR experience using ARCore and other tools.
CO-PO/PSO Manoinq
PO P02 PO3 P04 PO5 PO PO PO PO POI POI POI PSO PSO2 PSO3
6 7 8 9 0 I 2 I
col 3 3 3 3 3
) co2 3 3 3 3 3 3 3
c03 a 2 3 2 3 2 3 3 3 3
Course Contents:
AR today: smartphone vs. standalone, Google AR, AR for shopping and retail, AR for business, AR
for social media, AR for gaming, AR for education, AR for healthcare, AR for non-profits, AR reality
design guidelines, Physical environment, virtual environment, environmental limitations, movements,
types of moyements, accessibility, Tracking in AR, outside-in tracking, inside-out tracking, motion
tracking.
Light estimation. Anchors, lnterface issues and lack of UI metaphors, Constraints of occlusion and
shading, AR required vs AR optional, Runtime considerations, Performance considerations, Run AR
) Apps in Android Emulator, Camera configuration, Buffering Camera frames, Sharing camera access to
ARCore, Working with Anchors, Creating play instant app, ARCore as input for Machine Leaming
models
Enable call logging for Android, Disable call logging for Android, Display call logs, Recording and
playback in AR, Add custom data while recording, Depth in ARcore, Distance and depth offield, Depth
images, Use ofRaw depth, Lightening estimation, Environmental HDR mode, Ambient intensity mode.
Augmented lmages APIs. Augmented Images APIs' Capabilities" Requirements of Augmented Images
APIS, Creation of image database, lmage tracking, Cloud Anchors on Android, Augmenled Faces on
L'
i il:; ,.':
. . . , Grenicli
rt'rr', i\iniCa
(
. ,/,. .i t_,Li ..lr tii)
F' . ,'1, 1 i, lccir 2lorre-ll
C . :_l i:r t0
Android' custom textures and 3D models for Augmented Faces, ARCore SDK for unity, ARCore
sDK
for Unreal.
Text Books :
Refercnce Books :
l' Linowes Jgnathan, Krystian Babirinski, Augmented Rearity
for Deveropers: Buird practicdr
1iea.1, packt pubrishii[,
Realttv Applications with unitv, ARCore, ARKit, ina vu1oria
7t:ryellgd
20t 7. rsBN 978178728804t, t787288048.
)
Assessment Scheme:
-l
R
Be t Universi ty , Greater Noida
(EsiiLj; ,it.i
LJriiJ. /^,ai 2 of Go!,t, of Utiar p
Plot I ii.:'l; ii, 9, 10 11 Tech Iadesh)
r- ^11'r tn , Zone-ll
Name of Program Bachelor ofTechnology (Computer Science and En gineering)
CSET426 Building Social VR with 3D Characters L T P C
Owning SchooUDepartmert Department of Computer Science En gineering 2 0 2 3
Pre-req uisites/Exposure
cot : To understand the psychology ofsocial interaction and the practical skills to implement it.
CO2 : To make characters that can respond to players, speech and body language.
co3 : To create ayatars: the virtual representation ofother players, and agents: computer-controlled
NPC characters.
co-Po/ MaDDins
PO Po2 PO3 PO4 PC)5 PO PO PO PO POI POt POI PSO PS02 PSO3
6 7 8 9 0 I 2 I
cot 3 3 3 3 3
) co2 3 3 J 2 3 , 3
co3 3 3 3 3 3 3 3 3
Course ontents:
) Markerless motion capture, Bodily communication, psychology for facial expression, Facial
Expression in unity, Blinking and Lip sync Animation, caze in Social lnteraction, Gaze Interaction.
other Facial Features and rheir Psychological Effect, psychology Behind Social Interaction,
Challenges in Human-Avatar Interaction, Challenges in Human-Agent lnteraction, Evaluation ofsocial
lnteraction in vR, Human-avatar: social VR apps. Embodiment - implementation and psychological
effect, natural lnteraction, Magic lnteraction, Active and passive Interaction, Affordances.
VR Interaction Theory, standard HMDs, navigarion in VR, Real walking, Redirected walking, walk-
in-Place, virtual navigation, objects Interaction, object lnteraclion within Reach, Hyperna-tural
Interaction, Magic Interaction, Evaluation Metrics, physics lnteraction, physics objects, physics
objects in unity, Physics in VR, Physics Inremction in unity with NewtonvR, state Machines. state
Machine Interactions in Unity.
case study: Popular interaction-based products, Graphical User lnterfaces in vR, Abstract Interfaces,
Diegetic and Non-Diegetic UI, Gestural Interaction, Issues in vR lnteraction, uX ofvR, tmmersedvR,
Spatial.io, EngagevR, Mozilla Hubs, Unity User Interfases, Unity gesture plugin, Bespoke VR,
VFairs,
INXPO, AltspacevR, High Fidelify, Sansar, Rec room, and Webaverse.
The experiment in Unity: loading designed character, Skelton animation, movements, and
interaclion.
Text Books :
l. Pangilinan Erin, steve Lukas and vasanth Mohan, cleqring Augmented ahd yirrual Realities (t
ed.), O' Re illy Publis hers, 20 I 9. ISBN 97 A- t 492 044 t 92.
Reference Books :
)
l. Bowman Doug A, Ernest Kuiiff, Joseph J Laltiola, Jr and lvan poupyrev, 3D lJser lnterfaces,
Theory and Practice (2 ed), Pearson Education, t)9A,2017. ISBN 978-01340J4324.
Ass€ssment Scheme:
aK,^,
6enr'.r:lt u, ri,,rcrsity, Greater Noida
(t-:. l.-' j | ,:.:r. .:12,1 ofr;oy..,, ,1.:ipradesl,)
l-1.). i-J:'r- 1, !,
i 0, 1 .1, Tuch Zone_il
()I..,1..,- l. Ot:, r.2il1310
Name of Program Bac hel or o f Tec h n o lo ry ( o m p ut€ r Sc te n c e a n d E n gi n ee r I n
c c)
csET427 Virtual Reality: lnt€rface. Application and I- T P C
Des n
Owning SchooUDepartment Depa rtm € n t o f C om p u t€ r Sc tence E n gr n ee rl n 2 0 2 3
Pre-requisites/Exposu re
CO3: To show a basic awareness and understanding of historical and theoretical contexts relevant
to
immersive virtual reality and demonstrate an understanding of the importance of critical and
self-
reflective practice.
CO-PO/PSO Mappins
) PO P02 PO3 PO4 PO5 PO PO PO PO POI POI POI PSO PSC)2 PSO3
6 7 8 9 0 I 2 I
col t I
c02 I t I 2 2
c03 2 3 2 , !
l:weakly related 2= moderately related 3=strongly related
vR Goals and definitions, Historical perspective, Birds-eye view, ceometry of virtuar worlds,
Geometric modelling, transforming models, Matrix algebra ind 2D rotations, iD rotations and yaw,
pitch. and roll, Axis-angle representations, eualemions, converting and murtiprying rotations,
Homogeneous transforms, the chain of viewing transforms, Eye transforms, canonical
viei transform,
viewporl transform. Hardware Technologies for 3D usei lnterfaces: visual Displays Auditory
Displays, Haptic Displays, choosing output Devices for 3D User rnterfaces.3D user'rnierface Inprir
) hardware: Input device characteristics, Desktop input devices, Tracking Devices,3D Mice, Sp;;;i
Purpose Input Devices, Direcr Human rnput, Home - Brewed rnput Devices, choosing
Input'Devices
for 3D Interfaces.
Light and optics: Three interpretations oflight, Reriaction, simpre renses, Dioptres, Imaging properties
of lenses, Imaging properties of len^ses, Lens aberrations, optiiai system ofeyes..Visuir Ftry.iotogy,
Photoreceptors, Enough resolution for vR, Light intensity, Eye movements, Eye
movement i..re. io,
vR, Neuroscience of vision. Visual Perception: Depth percepiion, Motion perception, Frame rates and
displays.
t::
i'rrl.':..t ;;rv, Grt. ::t:r l,,ioid:i
,:jtle,;#;;,'2#!li
Tracking Systems: orientation tracking, Tirt drift correction, yaw drift
correction, Tmcking with a
camera, Perspective n-point problem,_ Filtering, Lighthouse approach.
viruuf n"na".inti Vi.uui
Rendering-overview, shading models, Rasterizaiion, Fixer shading,
VR-specific probrems, bistortion
shading. Posr-rendering image warp.
Module IV:
4 lectures hours
Reference Books :
l.Greengard samuer, virtuar Rearity (r ed.), The Mtr press, 20r9. rsBN 978-0262351684.
2. Tasgin 2., Yirtual and Augmented Reatity (l ed.), Rourledge, 2022. ISBN g7g_1527548225
Assessment Scheme:
R eg raiI
,?':: l'.. I '. r.'' .'-'..: r.cr- ,r r t,:.i.1 ,
i
Fict ,r, .,: , ', r. ;t, t,lt,:lo,,u
tl
Ur,la:,- I i.,.j- l--r'il l0
Name of Program Bac h e lo r of Tec h n ol ogy ( C o m pu ter s ct en ce an d E n gi n ee rl n
c)
csET428 s ial To ics in AR and VR t. T P C
Owning SchooUD epartm€nt De pa rtm e n t o f C om p u te r Sci en ce E ng neerI ng 2 0 2
Pre-requisites/Ex posure
COI : To familiarize and leam about the latest trends and research in the field.
co2 :To equip themselves with the conceptuar and practicar experience offew ratest
methods, toors,
technologies or algorithms in AR and VR.
CO-PO/PSO Maooinq
PO P02 PO3 PO4 PO5 PO PO PO PO POI POI POI PSO PS02 PS03
6 7 E 9 0 I 2 I
)
col J I 3 1
c02 3 t 3 3 3
I 3 3
Course ntents:
This course covers the cutting-edge topics in AR and vR, and these modures wir be
chosen bv the
instructor based on the requirements and relevance at that point of time. These modules
need to be
relevant to the industry and start-ups will also incrude rerated case studies.
use cases and
implementalions scenarios. students wifl be working on rab work and projects
to get rear hands-on
experience ofthese topics and modules.
students will gain practical experience by using toors and technorogies rerated
to AR and vR.
) Assessment Scheme:
(.i
Name of Program Ba c h e lo r of Tec h n ol ogy (C o m p u te r s ct en ce a n d E n gr n ee rt n s)
CSET429 N€twork Drivers and Protocols L T P C
Owning School/Departmena De pa rt m e T t o f C om p u te r s ct e n c e E n n ee r I n 2 0 2 3
Pr€-requisites/Exposure
col: To explain purpose, types and configuration ofvarious network drivers and
deriver in-depth
ofthe netuork protocols.
knor.l ledge
CO2: To develop a network device driver from scratch.
CO-PO/PSO Mannino
PO PO2 PO3 PO4 PO5 PO PO PO PO POI POt POI PSO PS02 PSO3
6 7 8 9 0 I 2 I
cot ! J ) 2 I I I 3 2 2 I I I 3 3
) co2 I 2 ) ) 2 2 3 ) 2
.,
I
', t: .-,,)
['i .,
' I::i iO
TcP socket programming. Development of a network
fos-1,r.inq,
Network.device
device driver fiom scratch.
Driver examples contd. Mapping the vo registe$, Hardware reset and initialization.
use of NS-3 for simulating network protocois. lts-l: simui-ating a various
wireress and wired LAN
topology.
Text Books :
l. Y:F filltf_1., _Handbook of Server Management and Administation (t't ed.), CRC press,
20 I 9. ISBN 978_1 35 I 08 I 207.
Reference Books :
l. lfig:l:! Rai, Handbook of Heterogeneous Networking (t't ed.), CRC press, 2018. 1SBN gZ8_
135108t078.
Assessment Scheme:
*.k{*/
Ben1ffi Urriver:ity, Greator Noida
ij i6t 24 olGgvi, ol Lriiar p€oesh)
(EslJblish.J Ui!
Piot l{o's 0, 0, 10, 11,]-ech Zone-il
Greater tJoiCa-201 3'1 0
Name of Program B a ch e lo r of T ech n ol ogy (C o m p u er Sc en ce a n d E ng
n €er ng)
CSET43O D tal Si al Processi ng L T P C
o n IN Sch oo YDe pa rtm en t D ep a rtm en o f Co m p u ler Sc I EI ce En grn ee rt n 2 0 2
Pre-req uisites/Ex posure
CO-PO/PSO Mappins
PO P02 PO3 PO4 PO5 PO PO PO PO POI POr POI PSO PS02 PSO3
6 7 8 9 0 I 2 I
COI 3 3 )
) coz 3 I 3 2
3 2
,, 3
c03 I .,
3
Course Contents:
Module I:
9 lecture hours
Course Structure/Handout Assessment Mechanism, Signals
and Systems, Discrete time complex
exponentials signals, Elements of digital signal pro"rrrilng,
feclnotgy for DSp, Building bl;;il i;
represent a digital system. Types of DSp pio""iso.s,
Reirsive and non-recursive systems, Canonic
and.Non-canonic structures, IIR Firter Rialization, Direct
rorm,-Cascaa" rearization, paralrer form
realizalion, Ladder structures, continr-ed fraction
Filter Realization, Direct, Cascade, FIR Linear pfr^"
"xparsion,-
n""ri*i",
of a ladder structure, FIR
n"ufirutior,'iifnit" f rprf." n..p"r.. Egfi"i
(llR) Filter Design, Low pass Fitters, High pass Fih.r., Bu;t;;;; 'Fiit;r..
Z-Transform:.
.
Definition, Region of coNergence (RoC) , Ztransform properties, Inversion
methods: partial fraction expansion, power series,bonto*
int"grui ,*inoa_ **"f ity, i""i"rii"i"g;i
method: stability, lmplications on pole locations.
Studio Work/Laboratorv Exoeriments:
Laboraiory work involves developing signal processing systems on a personal computer and using them
with both real and simulated drta. Generally, MATLAB and DSp processor are thi working plaiform.
Text Books :
Reference Books :
l. Hohon Thomas, Digital Signal Processing principles and Applications (1"' ed.), Canbridge
University Prus, 2021. ISBN 978-1108290050.
) Assessment Scheme
fuk,,",
,Bennett University, Cr. :tter l\rcirl?
Lq'ablshrd Und., ,;cr:.lai
( ..i,r,;uru,.r e1-.h)
Plot No's 3, 0, 1 0, 11, Tech Zotie-ll
Greater NoiCa-20i -? i O
Name of Program Bachelor of Technology (Computer Science and Engineering)
CSET43I Special Topics in Computer Science L T P C
Owning SchooUDepartment Department of Computer Science Engineering 2 0 2
Pre-requisites/Exposure
COI : To familiarize and leam about the latest trends and research in the field.
CO2 : To equip themselves with the conceptual and practical experience of few latest methods,
tools, technologies, or algorithms in Computer Science.
CO-PO/PSO Maooins
PO P02 PO3 PO4 P()5 PO PO PO PO POt POr POI PSO PS02 PSO3
'7
6 8 9 0 I 2 I
col 2 3 3 I I 2 I 2 I 2 2 t
)
cC)2 2 I 1 t I 2 1 2 I ) I t
l=weakly related 2: moderately related 3:strongly related
Course ontents:
This course covers the cutting-edge topics in Computer Science, and these modules will be chosen by
the instructor based on the requirements and relevance at that point of time. These modules need to be
relevant to the industry and slart-ups will also include related case studies, use cases and
implementations scenarios. Students will be working on lab work and projects to get real hands-on
experience ofthese topics and modules.
Students will gain practical experience by using tools and technologies related to Computer Science.
Assessment Scheme:
)
Components lnternal Assessm€nt Mid Term Exam End Exam Total
r- l\j: l:
,,_t;t,a.a., -it
Name of Program Bachelor of Technology (Computer Science and Engineering)
CSET432 Advance Microprocessors L T P C
Owning SchooUDepartment Departmert of Computer Science Engineering 2 0 2 3
Pre-req uisites/Exposu re
CO-PO/PSO Mappins
PO PO2 PO3 PO4 PO5 PO PO PO PO POt POI POI PSO PSO2 PSc,3
I 6 7 8 9 0 I 2 I
) col 3 2 2 I 2
co2 3 2 2 I 2
co3 , 3 3 3 ", 3 3
Course Contents:
Introduction Basics of Von Neumann Architecture and the early Microprocessors, CISC and RISC
concepts.
ln Iab students will perform experiments in assembly language. Students will implement code for RISC
and CISC architecture, they also write code to perForm parallelism in processor architecture pipelining,
super-scalar, super-pipeline. They can create application specific processor from scratch as project.
Text Books :
l. Hall D. l/., Microprocessor and Interfacing Progrsmming and Hd,'dware (2 ed.), McGraw Eill,
1 99 I . ISBN 978-00702574:29.
Refercnce Bcolts :
l. Bh:urchandi K M, A K Roy, Advanced Microprocessor and Peripherals (3 ed.), Mcgratt Hill, 2O12.
iSBN 978.12590061i5.
Alrsscaxls$srge:
a"si"tfr/'
ff,+ftfif:j{rd'f iffif#}i
Name of Program Bachelor of Technology (Computer Science and Engineering)
CSET445 Continuous lntegration & Deployment in l. T P c
DevOps
Owning School/Department Department of Com puter Science Engineering 2 0 2 3
Pre-requisites/Exposure
COI: To afticulate continuous integration and continuous deployment pipeline. and an automated
deployment pipeline.
CO2: To examine the continuous integration tools. jobs, and performance of integration testing.
CO3: To implement the continuous integration and continuous deployment.
CO-PO/PSO Maooinq
PO P02 PO3 PO4 PO5 PO PO PO PO POI POI POt PSO PSO2 PSO3
I 6 7 8 I 0 I 2 I
col 2 3 2 3 3 3
co2 3 3 a 3 3 3 3
cC)3 2 3 3 2 3 3 3
Course Contents:
W
Text Books :
l. Rossel Sande1 Continuous Integration, Delivery, and Deployment (lst ed), Packt Publhhing Ltd
2020. ISBN 978-t 787284I80.
2. Hornbeek Mmc, Engineering Devops: From Chdos to Conlinuous Improvement and Bryond (lst
ed.), BookBaby, 2019. ISBN 978-154i989618.
8e@-:
l. Swmtow Paul, Contiruous Delivery and DevOps - A Quickstart Guide (ird ed.), Packt
Publishing Linired, 2020. ISBN 978-l 788995474.
4$9!c!EgEtsslel[s:
Regi r
Ben t Universi ty, Greater Noida
(Eetrblislred Un der/\ct 14 of f-iJvt, ol U (tar Pradeeh)
Plot No's 8, 9, 10, 11, Tec h Zone-ll
G reater Noid3-201310
Name of P rogram Bac h el or o f Tec h n o logy (c om p u te r s ct en ce an d E n gi n ee rt ng)
csET446 Server-Side I) evelopment Frameworks:
L T P C
Ex ress & S n
o wn ng s c h o o U Depa rt m e n t De pa rtm en t of C o m p u te f Sc I en ce E n gi n €e rt
ng 2 0 2 3
Pre- req u isites/E x p os u re
Co urse u es( s)
CO-PO/PSO Maooinq
PO P02 PO3 PO4 PO5 PO PO PO PO POI POI POr PSO PS02 PSO3
6 7 8 9 0 I 2
col 3 3 3
I
c02 3 3 3
1 ,
3 3
co3 3 3 3
3 3 3 3
3 3
l:weakly related 2= moderately related 3:strongly related
Course Contents:
Module I:
T lecture hours
lntroduction to Fu, stack Deveronment, Server-side
Deveropment: Node, Node modures and the Node
HTTP server.. Third pany modules: mongoose. angular.
reacl. express, npx. npm. brew, http server
usage and_options. Express fiamework. nfSt
t ntpiesenrution iutJ irunrf.r. (REST))
Apt server with
o*t out, detete, Node serv., *ttr,r e.pr"*, p".trliii.ier
r"rtirg automation, Monso
S;Tiij;lil,
)
Module lI:
T lecture hours
lnteracting with MongoDB from a Nodeapprication, Insta, mongo dB
Connecr to clienr. euery execution fiom script ni" ir.al"r"rir.using
js).
npm, rmport mongo crient,
authentication and session-based authentication.'Nf; Mongo and Mongoose.
.;;;;-;;;;irr.
with rhe support ot'JSoN web tokens^and ,h" 'prr;;;;";;;1". Token-based authentication
jsonwebtoken' Fundamentar concepts ,odut.r, express. passpon,
of Spring core: o"p.na.i.f'rn;"aion (DI) and Inversion of
Control (loC), Auromated Java-Based Conr,gu*iio"
Constructor Injecrion, Field - -"'r""'"! s
@C;poi.rilOauro*ir"d, @ComponentScan,
Injection, Sener-lnlectioni
Gt..i-:, i
Module lI l: 6lectures hours
Spring core application with Maven, using Eclipse, contents of pom-xmr, Spring Framework support
for Mod€I, controller and view pattern Directory structure ofspring MVC using-Mur"n, nequirei tar
files or Maven Dependency, Entry of controller in the web.xml fili, oefine thi bean in the xml
file,
Displaying the message in the JSP page, Java, Spring MVC, Spring Security, Algorithm, Hibernate,
Maven, Mysql Integration Application, Java persistence Apl (managiment ofrelational data in the
Java
application9 and Hibemate (object-Rerationar Mapping (oRM)),1pA
0avax.persistence), Hibernate
(org.hibemate), JPA (EntityManagerFaclory), Hibemate (SessionFactory), ipA (Java persistence
Query Language (JPQL)), Hibernate (Hibemate euery Language (HeL)).
Studio work consists of server-side development using Express framework based on nodejs, use REST
API with Express to interact with backend server. To develop Java Spring web applications"using MVC.
Also leam to integrate borh frameworks with databases sucir ar Ie, vybql ana nostgr;sqL.
-ongo
Text Books :
1. B!.o-wl.Ethaa lleb Development wirh Node and Express: Leveraging the Javascript stack (2 ed.),
O'Reilly, 20t9. ISBN 978- 1492053502.
Refer€nce Books :
l. Kumqr Akshi, web rechnologt (1 ed.), Chapman and Halt/cRC,20r8. rsBN g78t r38ss0.t3i.
2. Moseley Ralph and M. T. Savaliya, Developing Web Applications (2 ed.), lllLEy lNDlA, 2005
rsBN 9788126s38676.
3. Murach, l.luroch's beginningJA|A JDK i (l ed.), Mike Murach & Associqtes,2022. ISBN
978189077429s.
)
Assessm t Scheme:
I]
(
Jl
G ;_r ,: I i.: ')
Specialization
Electives:
DevOp s
Name of Program Ba ch elo r of Tec h n ol ogy (c o m p u ter Sc te nc e a n d E gln
eert n c)
CSET448 Build and Release Mana ent in DevO L T P C
Own I n Sch OOI/D ep a rtm CD t Dep a rtm en t of Co m p u ter Sc lence E n gr neeri ng 2
0 2 3
Pre-requisites/Ex posu re
PO Po2 PO3 PO4 PO5 PO PO PO PO POI POI POI PSO PS02 PSO3
I 6 7 8 9 0 I 2 I
) col 3 3 3
3
c02 3 3 3
.|
3 3
c03 3 3 3 3 3
3 3 3
I:weakly related 2: moderately related 3=strongly related
Course Contents:
Module I:
6 lecture hours
Build and Release Management overview: overview
of Build Management, Buird Abstraction,
Overview of Packaging Management, packaging
Package Manager vs package Management,
*p"rit"ils. p;;;e Registries using the package.
Fac-kagi Manag"r"ri i8or..
Module ll: T lecture hours
Build and Release concept and process, rerease management,
overview of Release and Deproyment
Managemenr, objective and Benefits, rey terminolog;es'r."alr-i"r"^"
Release Management' Rerease Management eroc.* -n"t"ur"M"r"g";"r;,;;;ki;; ;
) tompor"nir, Lifecycre Management,
change management, Need ofchange management,
change Management vs Rerease Management.
Module IV:
5lectures hours
Documentation and Reporting: Documentation Vs Technicar
Documentation, Different Types of
Documentation, Ceneral practice in Documentarion,
Do^cumentation, system vs user Documentation,
Agil";;; Wrt;.f"ll Approaches, Tools used for
DiscG s"r" t"ipr"vr"rprates used in General for
Soft ware Documenlation.
{k:
Ecn: c'i Un..r;:':.ty, Greater Noida
(L:i..r .r .
L:r_ , ., ;j.Co\4,otLlllorprade:h)
Ploi i .,-,'s 3, f , 'l {1, t 1, Tech Zorre-il
Grealci I',lcici.:-201 31 0
Studio Worldlaboratorv Experiments:
Refercnce Books :
Assessment Scheme:
R trar
B enne lt university, Greater Noida
(E.iaLl,:h e, Und:rAct 2.lot Govi. ol ULlrr
Pradesh)
P ot l,Jo':; 3, 9, 10, 11, Tech Zone-ll
G reater NloiCa-2013i 0
Name of Program or o f T ec h n ologv (C o m p u te r s cle n ce a n d E D gln eer I n
Bac h e
c)
CSET449 Cloud Services Develo pment & o rations L T P C
Owning School/I) epartment De pa rt m e n t o f C om p ute f Scie n c e E ng n ee rI ng 2 0 2 3
Pre-requisites/Ex posure
CO-PO/PSO MappirE
PO P02 PO3 PO4 PO5 PO PO PO PO POI POI POt PSO PS02 PS03
6 7 8 9 0 I 2 I
col 3 2 3 )
., 3 3
cC)2 2 3 3 3 3 3
co3 2 3
2 3
Course Contenls:
Module lr
l0lecture hours
systems Development Lifecycre, workflow for deveroping croud
apprication on pubric clouds, croud
Software Development Kit (sDKs), sDK Terminorogy, croud
resting service, Errors and Exceptions,
Cloud Service developing rools, Storage Solutions with public clouJ,
Developing NoSeL Solutions
with public cloud platform, Caching Information for Scalability.
q/ ( .a ca
'i,:rl
, ..ir )-urrc li
Text Books :
Assessment Scheme:
R tr
B Universit Y, Greater Noida
i !.d Urn€rrct 2,i of Goyt, ol Ultar Praoesh)
t I{o's B, 9, 10 11, Te ch Zone-il
Gre ater Noic,a-20 '1310
Name of Program Ba ch e lo r o f Tec h n ol ogy C o m p ter Sc en ce
a n d E ng n ee rl ng)
CSET4SO s o u rc€ a d ve rs to C o ro tn DevO I- T P C
Owning SchooUDe partment D ep a rtm e n of c o m p u te r Sc e n ce E n tn ee rt Il g
2 0 2 3
Pre-requisites/Ex posure
CO-PO/PSO Mappins
PO Po2 PO3 PO4 PO5 PO PO PO PO POt POt POI PSO PS02 PSO3
6 7 8 I 0 I 2 I
) cor 2 3 3
3 3
co2 3 3 2 2 3
c03 3 3
2 2 3
3
l=weakly related 2: moderately related 3:strongly related
l.l
Ct:'i :
Studio Work/Laboratorv Experiments:
Text Books :
l cerarfus BrokdyN Distfibuted r/ercion contuor
system A comprete Gutde (rst ed.),
202t. rsBN 978_ts6733I t93. SsrARCooks,
Ass€ssmeni Scheme:
) )
istrar
nnett U jiver ty, Greater
(Esiablir'll. d U: ta.t t,.l :: i Noi da
olCr!,l. of Uttar pradesh)
Piot l{o ':i 8, g, 1 0 1 1, Tech
Zone-ll
Greate r hjoid a-2013'10
Name of Program Ba ch e lo r of Tec h n ol ogy (c o m p u er Sc t€
n ce a n d E n grn e e r ng)
CSET45I Software Craftmanshi in DevO I, T P C
Ow n n Sc h oo I/De pa rtm en t Dep a rtm ent o f Com p u ter Sc ren ce E n gr n e€ rt
n 2 0 2 3
Pre-requisites/Ex posure
PO Po2 PO3 PO4 PO5 PO PO PO PO POt POI POI PSO PSO2 PSO3
6 7 8 9 0 I 2
cot 2 2
I
co2
,
3 2 3
) co3 3
3 3 )
3
3 3
I =weakly related 2= moderately related 3:strongly related
Course Contents:
Module l:
8 lecture hours
software craftsmanship, Four Dimensions of
euarity, Software Ethics, ciean code, craftsmanship Vs
Engineering, Frameworks and Tools, Design,
Structure, Fo_;in;, and Documentation of Code,
Types of Designs/Models, Design Sructure
Matrix (DSV;, Rroduct_jervice System using DSM.
Module ll:
8 lecture hours
Process Documentation. product Documentation.
Different phases of Design, Requirement of
Documentation, Advantagesof Documentation, Technicar and Non-Technicar charenges
Documentation, Content Authoring, Formatting, in code
Styling, Issue Tracking. Testing, publishing,
Documentation: Testing, Debugging, Refactoring
) ) Improuin! Structur.
Module lIl:
7 lectures hours
J)
rlt
Recsi/,6ar
Bci,fi ett Unlversi'v, Greater Norla
l. l:J': --.i clllti.nF: --5h)
tE:r:LI:,h:d U:rlcr
iSiJi ilotss, 9, 1tr, i1, Tech zorlo-li
Greater I'Jcicln-2i)'1 31 0
Name of Program Bac h e o r o f T ec h n o logv(c om p u te r S ct e n ce a n d E n t n ee rt n s)
CSET452 Software Containerization in DevO s L T P C
Owning SchooUDepartment De po rt m e n t o f c om p ute r Sc te n c e E n gl n € e r I n 2 0 2 3
Pre-requisites/Exposure
PO P02 PO3 PO4 POs PO PO PO PO POt POI POI PSO PS02 PSO3
6 7 8 9 0 I 2 I
cot I I I I )
) co2 ) 3 I 3 2 2 1 2
co3 3 ) 2 3 l 3 I
Module I:
5 lecture hours
Containerization and Virtualization, Virtual Machine (VM), Hypervisor
and ifs typ es, Architecture of
VM, Architecture ofContainer, Docker Engine, Difference between Containers
and Virtual Machines.
Module ll: T lecture hours
container Manipulation, container's providers Exampres, croud platforms usirg
contain"rs, tvturtipl",
scalability, Portability of containers, orchestration, Architecture of orchestration, Container
orchestration' cloud Platforms using container orchestration, container operations,
Image operations
Running Multiple Containers, Custom lmage in Containers.
Modute IV:
7 lectures hours
OpenShift Enterprise, OpenShiff Features, OpenShift in Devops, pro viders
ofOpenShift, OpenShift in
Devops, Providers of OpenShift, Container and Microservices. K ubernetes,
Kubemetes on cloud,
Docker Swam and Kubemetes, Deployment ofContainers, Monitorin g ofcontainers,
Elastic Container
Service providers (AWS, Azure).
Studio Worli/Laborrton Experiments:
The lab work demonstrates orchestration tools like
Docker, Swarm, and Kubeme@s with hands-on
experience
ofconcepts taught in the lecture. students wi gain hands-; experience using rear accounts
on AWS, Azure, Ooogle Cloud plarform
Text Books :
I P_anhokr Mo* Mastertns Ooc\1-ey1y1y3, A conpanion guidefor agile container
(l adoption
ed.), Packt Publishing,,20tg. ISBN g78-17596120fu.
Reference Books :
l. *,ce_Liz, Co*ainer Sectrig: Fundamental Technologt
Concepts that protecf Containerized
Applications(l ed.), O'Reilly Medi4 2OZO. ISSN SZd:HqZOS;206.
Assessment Sch€me:
) )
i
lv ,,'
l-idJ.,-{t ttt
Qf,r'fi ,r't U. :i'rcrsity. Greater Noida
(EL:: l" liiri I lj, ra r.r.rl ;l,l oi Govl, oiUttarP.adBsh)
,, 1 0, '11 , Tech Zone-ll
Plclt Ne',i 0,
Greater Ncido-20131 0
Name of Program Ba ch e lo r of Tec h n OI ogy (C om p u te r Sc te lt
ce an d f, ng n ee r c)
CSET453 sv s tem P rov sl o n ng 2 I d C o fi gu ra to
L T P C
Ma I a m en DevO
Own ng s c h OOUD ep a rtm ET t De pa rtm e n t o f com p u te r Sc I e n ce E n ln
ee rt ng 2 0 2 3
Pre-req uisites/Ex posure
) c02 2 3
3
3
c03 ) 2 3
3 2
2 3
l=weakly related 2= moderately related 3=strongly related
Module l:
of provisioning: Introduction and Significance of provisioning. nJrrt.
9r"11"*.
Provisioning under Devops Moder, prouisioring *."d :,*"[J;
i. conngu*i*,"tnriru.",u."
'
provisioning and
its Tools, Environment provisioning., Artoruti proririoi;;.'-
Module ll:
overview of configuration Management: Inlrodudion
of configuration ,rr"*r1,'ir",','!""1,"""'
Terminologies of Configuration Management,
s".r".,'oiNJ"f
- woir.sration, workstation setup,
Organization Setup, Test Node* Seiup, n"r"nt,
ionngJrurio, Uurug"*enr Severs.
Configuration Management Tools, Features and
Comp"ri.",
)) Selection Criteria of Tools. "f;;;i;r;;r#ffi;;#r;;;;
Module I lI:
Configuration Management & Tools (puppet, Chef,
Ansible, and Saltstack): ,roO'"J"Jl*,1i,'"'
Working, Architecture, Master ana egenis, ir.,uffurion
uni coii,g"rurion of puppet, Ansible
Definition, Ansibie Requirement S.pecificarion,
a"siUfe Cornpo#irl an.iUf" Sfategy, Sahstack
Inaoduction, Important Features of Sartstack, sattstacr<
Versions, Salt vs. Ansible, puppet.
enteriris" uri tur, op"n-source Software
Module lV:
Application configurarion: tnrroduction to^corfigfyt6p5
and secrets, Application :""""#;:,[T^
with ConfisMaps and Secrets. Creating Config'Md,
secrets, setting Environmenr for secrets. pods
E;il;;;;; Specific Config, Creating
overvLw: Inlroduction to pod, pod Specification,
Pod Lifecycle, Launching pods, pods operation, poa.
uno Corium"rl, poa.
Template, Resource Sharing and Communication: -o controllers, pods
Storage and Networking in pods, Static pod.
L)
Studio Work/Laboratorv Experiments:
The lab work ofthis subject deals with Design, development, and solving real-world automation
and orchestration problems by unlocking the automation capabitities of configuration tools
(Puppet, chef, Ansible, and saltstack) used for Devops. A small web application-based softwarr
is to be developed using any ofthe tools ofDevops.
Text Books :
l. Freeman James and Jesse Kearing, Mastering Ansible: Efectively automate conligulation
management and deployment challenges with Ansible 2.7 (lst ed.), packt publishing 20tg.
lsBN 978-1789951547.
Referenc€ Books :
l. Verana Joakim, Practical DevOps (2 ed.), packt publbhing,20lB. ISBN g7A-17g83g2570
Assessment Seheme
) J
ri r
B ett [Jnivf,rsity, Gre:rter Noida
i iriiH,.l l.liiij.f,',:t:i; ji'-lJvt,-l-cch
of tJ:tdr Pradesh)
Plo t No's il, 9, 'i0, 11 , Zone-ll
Greater hicida-201310
Name of Program Bac he or of Tech n ol ogy Co p T te r Sc le n ce a n d E
ng neer ng)
CSET454 Test Automation in L T P C
Owning SchooUDepartment De pa rt m ent o f Co m p u ter Sc ence E n gr nee rt ng
2 0 2
Pre-req u isites/E xposure
CO-PO/PSO Mappins
PO P02 PO3 PO4 PO5 PO PO PO PO POI POI POI PSO PS02 PSO3
6 7 8 9 0 I 2 I
cot 3 3 3
3 3 I
c02 3 3 3 3
) c03 t
3 3 2
3 3 3 3 3 3 I
l=weakly related 2: moderately related 3:strongly related
Module I:
Test Automation Manifesto and Testing: Test Automation Use 8 lecture hours
cases, principles, SDLC vs STLC,
Testing cycle, usabirity Testing, Functionar retting, non-frnct;nar
_Life
Compatibiliry Tesring, CUI Testing, Apt resting, UsaUlf l"ry f"sting.
-'-' testing, En d to End Testing,
Module Il:
Testing Approaches and rest cases Design: Manuar resting,
Automation ,".,,"r, ,ir',","f::;X;,"t
Integration Testing, System Testing, Acceptance Testing,-
Smoke-sanity Testing, R.g."*;;;
Testing, Test Scenario, Test Case Design, Test Basis, Trace-ability
Matrix.
Module lll:
)1 DevOps Testing Best practices, Business Test Automation,
Functionar Test Automation, Functional Test Automaiion,
hours
Technical Test Automation, Non_
oiff"."nr t".t
7lectures
Aulomation
Tools(Kobiton, Ranorex, Zeuz, etc.).
"-. I - irtoid:r
.. ::: i,,;.:.rt,.i
', 'r r, i..i;ii.r.oti::-li
. l.;irr ii)
joum€y to production. Also, all the operational
procedures, services, and actions involved
release
with a
cycle will be elaborated.
T Boo
l. llolfgang Platz and Cvnthia Dunlop, Enterryise
Continuous Testing: Trawforming Testingfor
(tsi ed.) (t ed.), C,"*isiiiiiii"'ii#,'iiliuoi,g
lgtle !:!-??oes
978- t 699022948. rhforn, 201e. tsBN
Reference Books :
t lryl!11ty-oa, Complete Cuide to Test Automation (t ed.), Apress, Z0tg. ISBN g78-
14842383t8.
Assesment Scheme:
J)
"M,ra
Bolfgft Universily, Greater Noida
(Eslaullshcd L^d,ri r.cl: I slGoil, oi Ultar Predosh)
PIot No's B, ?, 10, 11 , Tech Zone-ll
Grecter i\.loiti.r-201 31 0
Name of Program Bac h e o r o f TGC h n ol ogy ( o m p u er Sc CT
c ce an d E ng neer n c)
csET455 ile Software Devel ent L T P C
Ow n I Il s c h o o UDepa rtm en t Depa rtm en o f C o m p u e r Sc en ce E n gln ee rt ng 2
0 2 3
Pre-req uisites/Ex posure
CO-PO/PSO Mappinq
PO Po2 PO3 PO4 POs PO PO PO PO POt POt POI PSO PSO2 PSO3
6 7 I I 0 I 2 I
cot 2 2 ) 3
co2 2 2 I
co3 3 3
) 2
1
Module t:
Agile mindset, Agire manifesro, predictive moder,
adaptive moder, Agire prin.,o,"r, 3l!ltilirl"',i1'
impact ofadopting agire, Agile case study, agire requirements,
ur"r rlori", uno u"ceptance criteria
3 C's in user stories.
Module ll:
Epics and tasks, product backrog and refinement,
Scrum llamework,
scrum, Sprinrs. Sprint backlog. Daily scrum. Scrum
*",". ,,
.",.?,rll"llll.1t,1tt
rules. agiie .stimarion and planning.
Effectivell using srory points. Need. oi velocity and arr"ri"r.'fi"i,
irg poker rechnique for pBI
sizing, Fixed estimation based on velocity, Velocity range, n"i"u." ff""rirg, Fixed scope release,
Fixed date release, Agile and DevOps.
Module lll:
)) sprint planning, capacity determination' Sprint Execution,
lZ lectures hours
Frow management, Swarming in flow
management' Task boafd and task tabre, sprint charts, sprint
review, pre-work, process, and activities,
Sprint retrospectiye, participants,
nre-w91f, process, ani activities, Sfrint retrospective steps, Extreme
Programming (XP) in agire, Xp varues, Xp practices,
Xp process moder, Scrum vs Xp.
Asscasment Scheme:
r
nOtt L.lnir,,ers ity, Greater
shcd Underil.t
lrlo ida
Li cl
I
PI ot No's ,9, 1 0, 11
C,o.ri,
Uiid r PreJesh
, l-ech Zone- ti
ol
Greater No id a-20.1310
Name of Program Bac h e o r o f T ec h n o logy (C o m p te r s ct en
ce an d E ng n ee rt n c)
CSET456 s ial Topics in DevO L T P C
o n I ng Sc ho o vDe pa ram e n t De pa rtm e n t o f com p u te r Sci e n ce E n n ee rt n g 2 0 2 3
Pre-req uisites/Exposure
CO-PO/PSO Maonins
PO Po2 PO3 PO4 PO5 PO PO PO PO POI POI POt PSO PS02 PSO3
I 6 '7
8 9 0 I 2 I
COI l 3 3 1
I
co2 3 3 3 I 3 3 3 1 3 3
l=weakly related 2= moderately related 3:strongly related
)
Cou rse Contents:
Unit/Module l:
28 lecture hours
This course covers the cutting-edge topics in Devops,
instructor based on rhe requiremenrs and relevance
and these modures wi, be chosen by the
relevant to the industry
ai that p"i;t;i;i;;. These modules need to be
and start-ups wi, arso incrude .;i";;-;;r" studies,
implemenhrions scenarios. studenrs.wi, be wort<ing use cases and
on tat *"rt lo get rear hands-on
experience of these topics and modules. "].ipr"-i*"
Studio Wor WLa boratorv Exoerime nts:
CO-PO/PSO Me DDINO
PO P02 PO3 PO4 PO5 PO PO PO PO POt POI POt PSO PS02 PSO3
) 6 7 8 9 0 I 2 I
cot 3 3 3
3
c02 3 3 I 3
3
c03 3 3 3 3
3 3 I
l:y/eakly related 2: moderately related 3=strongly related
Course Contents:
l)t
t,/
studio work consists oful Design and Prototyping using Front-End web ul Frameworks and Tools of
S""trt np t ura CSS-and JavaScrili. tiere, building r_esponsive design and Bootstrap Grid
Sy#,1";;g "avanced
cit, and utilizing BootstrapCSS Components for displaying content is also taf,geted.
Text
-1. Books r
Chw* Si^o*, Fronlend Development with ASP.NET Core, Angular, and Bootslrap (1 ed')'
Wrox, 2018. ISBN 9781 I 19243963.
Reference Books :
l. 4 lo build
Jakobus and Benjamin, Maslering Bootsiap 4: Master lhe latesl vercion of Bootstrap
(t ed), packt publishing Ltd, 2018. ISBN 97817888349024.
highly customized.responsive weblpps
)
Components Internal Assessment Mid Term Exam End Exam Total
1000h
Weightage (%) 35o/o 3oo/o 35o/o
) .),
R
Eo CL t ll n ive i-sity, Greater Noida
Lr ( !,r1, .: Lrtiar PrrCesh
F,'l.; : L.io'. l), 9, 'jr), i1,'i;ch Zone-ll
(
Name of Program Bachelor of Technology (Computer Science and Engineering)
csET458 Front-End W€b UI Frameworks and Tools: L T P C
React native
Owning SchooUDepartment Department of Com puter Scienc€ Engineering 0 4 3
Pre-req uisites/Exposu re
CO-PO/PSO MaDDins
PO PO2 PO3 PO4 PO5 PO PO PO PO POI POI POI PSO PSO2 PSC)3
I 6 7 8 9 0 I 2 I
cor 3 3 3 3
c02 3 3 2 2 3 3 3 3
c03 3 3 2 2 3 I 3 3
Course Contents:
Course handout assessment mechanism, Front end web development, Javascfipt: Arrow Functions,
React, spread operator, Default params, Let and const variables, React Components: State and
Props, composing components, adding states, React Components: Lifecycle, Event handling,
lntermediate React: Rendering lists. Form elements, Forms: Controlled, Uncontrolled. Functional
Components. React Virtual DOM, The Flux Architecture, Redux, Redux form validation, Brief
Representational State Transfer (REST).
)) React native, Animation API, Components: Basic, Stateful, Stateless, Custom fonts, Component
APl,Higher-Order Components: Keys, Fragments, Constructor, Animations, HTTP Requests:
Syntax, XML HttpRequest, Web Socket with Socket.io, lmages module: Image source. image path,
Network image, Firebase integration, Reactnative ListView, Authentication in Reactnative Using
Firebase, Layouts, Listview navigators. Bofton navigation. Push Notifications: Simple and navigation
based.
{-l
Text Books :
t. Banks Alex, and Eve Porcello, earning React: functional web d*elopment with React and Re&x
(1 ed.), O'Reilly Media,2017. ISBN 9352135636.
2. Stefanor S, Reoct: up & running: building web applications (l ed.), O'Reilly Medta,2016. ISBN
1491931825.
Referenc€ Books :
t. A M Vipul and Prathamesh Sonpatki, ReactJS by Example-Building Modern Web Applications with
React (1 ed.), Packt Publishing Limited, 2016. ISBN 1785289640.
2- Gackenheimer Cory, lfhat is react?. In Introduction to Reacl (1 ed.), Apress, 2015. ISBN
1484212460.
4ss$!r9!!ss@9:
Components Internal Assessment Mid Term Exam End Exrm Total
) )
al
n nett UniVC!"sitY, Greeter Noida
(Estab i rl,r.al l tf:l!r Acl ? i .[ Covt, of Ulti r Pr:i \rlth)
-l'€ch Zon e-ll
Plot tJo': 8, 0, 1ir, 11,
Grciiel i l'r:r':-lJ I 310
Name of Program Bachelor of Technology (Computer Science and Engineering)
CSET,l59 Front-End Ul Frameworks and Tools: Flutter L T P C
and Dianqo
Owning SchooVDepartment Department of Computer Science Engineering I 0 4 3
Pre-req u isites/Exposu re
Course Ou es (COs)
-PO/PSO Ma
PO Po2 PO3 PO4 PO5 PO PO PO PO POt POI POI PSO PSO2 PSO]
6 7 8 9 0 I 2 I
\ col 3 3 3 3
-, c02 3 3 I 3 3 3 3 3
co3 3 3 3 3 3 I 3 3
Course ntents:
Basics of Fluner and Dart Programming, Dart Programming - Syntax: Variables, Data type, Dart
conditional operators: If-else, For, while do-while Dart Functions: structure. retum type. expression.
OOP: classes, object, Methods, constructor, lnheritance, Abstract class, Flutter widgets: Scaffold,
image, container, Icon, Flutter Layouts: card. Stateful and stateless widget. navigation: button widget-
floaiing raised, flat, dropdown, outline, Flutter Webview widget. Visual, Behavioral, and Motion-Rich
Widgets, List View, Data View, Date Picker, Time Picker, Dialogs' alerts.
ln-studio work, students will leam that how to deploy Django REST Framework on different
platforms and deploy Django Apps for various use cases.
Text Books :
l. Zqccdgnino Cqrmine, Progromming Flutter: ndtive, Cross-Platforn Apps the Easy lVay (The
Pragnatic Prograntmers) (l ecl.), O'Reilly,2022. ISBN 1680506951.
.r)
'. .''ii
Reference Books :
| . Peyne F.ap, Be+inning App Developnent with Fluttet : Create Cross-Plotform Mobile Apps ( I
ed.), Apress, 2019. ISBN 148425 I 806.
Aclg$sgnlsgLigs:
Com ponents Internal Assessmetrt Mid Term Exam End Eram Total
J)
*"M/
Benffi University, Greater Noida
(E.lafished UiderArt 24 of Govt, of Uttar pradesh)
Plot No's 8, 9, 10, 11, Tech Zone-il
Greater Noida-201310
Name of Program Bachelor of Technology (Computer Science and Engineering)
CSET460 Special Topics in Full Stack L T P c
Owning SchooUDepartment Department of Computer Science Engineering 2 0 2 3
Pre-req uisit€s/Exposure
COI: To familiarize and leam about the latest trends and research in the field.
C02: To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies or algorithms in Full Stack.
CO-PO/PSO Mappins
PO Po2 PO3 PO4 PO5 PO PO PO PO POI POI POI PSO PS02 PSO3
I 6 7 8 9 0 I 2 I
col I 3 3 I 3
\ CQ2 3 3 I 3 3 3 3 3
)
l=weakly related 2: moderately related 3:strongly related
Course Contents:
This course covers the cutting-edge topics in Full Stack, and these modules will be chosen by the
instructor based on the requirements and relevance at that point of time. These modules need to be
relevant to the industry and start-ups will also include related case studies, use cases and
implementalions scenarios. Students will be working on lab work and projects to get real hands-on
experience ofthese topics and modules.
Students will gain practical experience by using tools and technologies related to Full Stack.
Assessment Scheme:
) )
Components Internal Assessment Mid Term Exam End Exam Total
egistrer
enncit [.rit rl/: r.-,1 / Gr,. rra" h{o i.la
Plct I'j,--.'rr i I :;)
Gre;ltcr l i ;:.li-2ll: Zons-li
l t)
\
, Specialization
Electives:
Cloud
Computing
Name of Program Bachelor of Technology (Computer Science and Engineering)
CSET46I Cloud Sv stem Adm in istration & Operations I, T P C
Owning School/Department Dep artment of Computer Science Engineering 2 0 2 3
Pre-requisites/Exposur€
cot : To get fundamentals of suppon and maintain cloud workloads as per the cloud archilecture
coz : To perform operations by using the cloud management console, CLI and SDK.
co3 :To implement architectural requirements with monitoring' logging,
and troubleshooting.
co-Po/P Mannins
cot I 3 2 3
c02 3 3 2 3 3 3 2 3
3 1 3
co3 3 3 3 3
Course ontents:
Need ofcloud administration and operations, Roles and responsibililies ofcloud Admin, lnter-cloud
Resource Management, Resource Deployment and Provisioning, ldentifying the steps to provision
cloud resources, ldentify, and remediate deployment issues, Storage and Data Management
connectivity services of public/private cloud Automation and optimization, Manage and assess
resource utilization, Employ cost optimization Strategies, Automate manual or Iepeatable process,
Minimize management overhead, Monitoring and Reporting, Maintain metrics and alarms utilizing,
Recognize and differentiate performance metrics, Availability metrics, Manage security policies on
) ) cloud, Access controls when using cloud, Shared responsibility model.
Data Centre Management Tools Integration, Service and Resource Management, implement
scalability and elasiicity, highly available and resilient environments on cloud, automate snapshots,
Data Lifecycle Manager, Data Retention policy, Restore databases versioning, Lifecycle rules,
Disaster recovery procedures. Cost optimization strategies. Networking and Content Delivery,
Perlormance optim izalion stralegies.
OS boot process (Win/Li nux) and Troubleshooting: Memory management, Memory pages, Bufter
and Caches, System date/ti me management, Network time protocol, Network Logs Auditing,
Managing Users and groups, File permissions, AssessmenVBuffer Lecture. managing software,
Managing system services, Background processes. Windows start-up tasks lnte Internet-
aware network troubleshooting, Network tools to report the problem, Network address translation,
troubleshooting in common VPC, Troubleshooting in On-premises to VPC, System performance -
DISK, System performance Memory, System performance Network System Login issues'
- -
System booting issues System logs, Network connectivity issues
Studio work focuses on seven cloud sub domains that are as; l. Monitoring and Reporting, 2 High
3. Availability,4. Deployment and Provisioning, 5. Storage and Data Management 6. Security and
Compliance, 7. Networking and Automation and Optimization.
Text Books :
1 . 5., Digby, G., Fitch, C., Friedberg, 5., Qualheim, 5., Rhoads' J qnd Sundrud, B, AlltS Certified
SysOps Adninistrator Official Study Guide: Associate Exan (l ed-), John ll/iley & Sons, 2017'
rsBN 9781 1 19377429.
Jackson, K. L., & Goessling, Archilecting Cloud Computing Solulions: Build cloud stalegies thal
align technologt and economics while efectively managing risk (l ed.), Pdckt Publishing Ltd,
20 I 7. |SBN 978 I 78847 212 5.
Assessme t Scheme
.) )
, (l;r::1cr hil;:ia
; ,.r : r t:ri ll
-'l 7 ;' i:- lt
(
Name of Program of T ec h n o ogy C o m p u ter S c ence an d E n gi nee r n c)
Ba c h elo r
CSET462 Cloud Security & Com tances L T P C
Department of Com p uter Science Engineering 2 0 2 3
Owning SchooUDePartment
Pre-req uisites/Exposure
COI: To leam and examine the security breaches of IaaS, PaaS, and SaaS'
co2: To apply various data encryption methods and security mechanisms to gel the administrative
control using IAM service.
C03: To create a secure production environment using cloud security features and services'
CO-PO/PSO Mappins
PO Po2 PO3 PO4 PO5 PO PO PO PO POI POI POI PSO PS()2 PSO3
I 6 7 8 9 0 2 I
\ 3
,, col 3 3 3
3 1 3
c02 3 3 2 3 3
cCJ3 3 3 3 3 3 3 3 3
Course Contents:
security Pattems for Cloud computing - Network security, Identity & Access Management & Trust,
secure on-Premises lntemet Access, Secure External cloud connection, cloud Denial-of- service
protection, cloud Traffic Hijacking Protection, Automatically Defined Perimeter, cloud
Authentication Gateway, Federated cloud Authentication, cloud Key Management, Trust Attestation
Service. Collaborative Monitoring and Logging' Independent CIoud Auditing
)) End-to-end secufity, shared responsibility in the cloud, Backup and restore, Detect and mitigate
threats, Plan for ransomware, recovering fiom systemic identity compromise, Threat protection,
Securing workloads, Security technical capabilities, Physical seculity, components and
boundaries, operations and Monitoring, Platform integrity and security, secure Data Protection
Law: national and Intemational, Firmware security, Code integrity, Secure Boot, Secure Isolation
of Physical & Logical lnfrastructure, Compute, Network, Storage, Common attack vectors and
threats, Secure Isolation Strategies, Multitenancy, Virtualization strategies'
Data Protection for Cloud lnfrastructure and Services. Undentand the Cloud based Information
Life, Cycle, Data protection for Confidentiality and lntegrity, Encryption, Data Redaction'
Tokenization, obfuscation, PKI and Key, Management, Assuring data deletion, Data retention,
deletion and archiving procedures for tenant data, Data Protection Strategies'
W,
/
Studio Work/Laboratorv ExD€riments:
Learner will be able to examine Public clouds Shared Responsibility Model, IdentiS
the security
and compliance benefits ofusing the AWS/Azure/GCP cloud, Describe the basic features for access
control and management, Describe AWS/Azure/GCP data encryption methods' Describe
AWSiAzure/GCP services used to protect network security, Describe the basic steps to ensure
StronggovemanceofyourAWsresources,examinelegalandregulatoryissueslelatedto
cybersecurity.
Text
1. Chen, Lei, Hqssan Tokabi, qnd Nhien'An Le-Kfutc, Security, privacy, an d digital forensics
in the
cloud (l ecl.), John lliley & Sons, 2019. ISBN l3: 9781119053286'
q seclrity
2 Russell, Brisn, qntl Drew Van Duren, Practical lnternet ofThings Security: Design
(2 )' Packt Publishing Ltd' 2018' ISBNl3:
frameworkfor an Internet connected ecosysten ed
978 t 788625821.
Referenc e Books :
Anthony, Mqsrering AWS Security: Credte and maintain a secure cloud ecosystem
(l ed.), Packt
Publishing Ltd, 2017. ISBN I i: 978178829i723.
2. Tevqult, Donald A, Mastering Linw Security and Hardening: Secure your Linux sener-y1
protect it from intruders, malware qttacks, and othef external threats ( I ed.), Packt Publishing
Ltd, 2018. tsBN 178862030s.
Ac!ssw!-!s@e:
Components Internal Assessment Mid Term Exam End Exam Total
'100o/o
Weightage (%) 35o/o 3ovo 35o/o
)
)
R r
E lt UnlversitY, creater Noida
(E51 iLi;.hsd UnCerAct 21r ol Go\4, oi uttar Pradesh
Piot No's B, g, 10, 11, Tech Zone-
Greater Noida-201310
Name of Program Bachelor of Technology (Computer Science and Engineering)
CSET463 AryVS Cloud Support Associate L T P C
Owning SchooUDepartmen t Department of Computer Science Engineering 2 0 2 3
Pre-requisites/Erposure
COI: To identily the possible scope ofbug, enor, and glitch in system.
CO2: To analyse and solve problems for AWS client/user.
CO3: To get expertise in AWS cloud solutions to solve technology challenges
CO-PO/PSO Mappinq
PO Po2 PO3 PC)4 PO5 PO PO PO PO POI POI POt PSO PSc)2 PSO3
6 7 8 9 0 I 2 I
\ col 3 3 3 3 2
.) c()2 3 3 3 2 3
c03 3 3 3 3 3 3 3 3
Course Contents:
Setting up AWS accounts, Accessing Methods of AWS Services, AWS Organizations, AWS Cost
Explorer, AWS Technical Support, Cloud Billing and Support. AWS Well-Architected Framework
Well-Architected Design Principles, Choosing a Region, Selecting Availability Zones, Virtual
Private Cloud. Dividing VPCs and Subnets, Default VPCs and Default Subnets, Controlling VPC
TrafIc, Connecling Multiple VPCS, Integrating On-premises Components, Load Balancing and
Fault Tolerance, High Availability Across Regions, Connections Outside of Amazon VPC,
Designing for High Availability CLOUD Solution, Scaling Data Stores, AWS Lambda and Event-
Loose Coupling, Loose Coupling Strategies, Communicating Easily and Reliably Among
Components, Communicaling with Loose Coupling and Amazon DynamoDB, Amazon API
Gateway. Serverless Architectures. Decoupling lnffastructure, Storing Web-Accessible Content
with Amazon, Caching with Amazon CloudFront, Managing NoSQL Databases, Storing Relational
Data in Amazon RDS, Designing Web-Scale Media, Scalable Web Application, Operational
Excellence Pillar, Security Pillar,
,lr;
Reliability Pillar, Perfomance Efficiency Pillar, cost optimiztion, High- Availability Design
Pattems, Stream Processing Example. Sensor Network Data Ingestion and Processing, Application
Hosts,
Backend, Transcoding and Serving video Files Example, Dedicated Instances and Dedicated
Trusted Advisor, Optimizing Costs with Caching, AWS Cost Calculation Tools' Amazon
CloudWatch. Amazon CloudWatch Monitoring, Amazon CloudWatch Events, Amazon
CloudWatch Logs, AWS CloudTrail, AWS Service lntegration with Amazon Athena' AWS
Config, Elastic Load Balancing, Amazon EC2 Auto Scaling.
Amazon Route 53, Amazon Route 53 Routing, Configure ECz Auto Scaling, Configure Failover
Routing with Amazon Route 53, Continuous Integration and Continuous Deployment on AWS'
AWS
Developer Tools and Services, Database Cluster on Amazon Aurora, Amazon DynamoDB' AWS
DatabaseMigrationservice(AWSDMS),MigratetoAmazonRDS,Tagging,AWSTrustedAdvisor'
Managing Resources, Optimize AWS Resource Utilization, Features of AWS Support plans' creating
Support cases and case management, Monitoring, reso|ving, and reopening the tickeVcase, Access
p"r.i..ions for AWS Support, changing your AWS Support plan, Using AWS Support with an AWS
SDK.
)
Strdio Wor k/l,etroratorv ExD erimenis:
By performing lab work on AWS cloud platform, students will have the knowledge ofthe Design
piin'.ipf.r an; best practices of the R;liability pillar, select comPute, storage' database' and
i',"t*o'rking a"rour"aa to improve performance, evaluate the most important performance metrics
for your aiplications, follow best practices to eliminate unneeded costs or suboptimal resources'
$oubleshoot common erTors.
Text Books :
l. iper, Ben, qnd David Clinton, AWS Certified Solutions Architect Study Gui de: Associqte
P
SAA-CL, tuan ( I ed.), John LViley & Sons, 2020. ISBN 978- l I l9l 38556
Reference Books :
L S Wadia and V ohan, AWS Aclninistation-The Delinitive Guide (2 ed\, Packt Publishing Ltd'
2016. ISBN 9781782173755
;l.a
v
Name of Program Ba c h e lo r of Tec h n o logy C o m p u te r s ct en ce an d E n neer n c)
CSET464 Develo lng Solutions for Microsoft Azure L T P C
co-Po/PSO MaDDins
PO Po2 PO3 PO4 PO5 PO PO PO PO POI POI POI PSO PS02 PSO3
6 '7 8 9 0 I 2
col 1 3 3 3
\ c02 3 3 3 3 3 3 2 3
) 3 3 3
co3 3 3 3 3 3
Course Contents:
Setting up Azure accounts, Azure Console Walkthrough, Microsoft Azure Services, Azure CLI,
Azure Powershell, configuring Azure cLI, Azure Resources & Subscriptions, Azure Resource
Manager, Azure Tags, Azure Storage Account & its types, Azure Blob Storage Azure Content
Delivery Network (CDN), Azure Files Storage. Azure File Sync, Azure Table Storage, Azure
(SAS), Azure Databox,
Queue Storage, Azure Storage Explorer, Azure Shared Access Signature
Azure Storage Replication Data replication options, Azure lmpon/Export Service, Azure virtual
machines. Data disks in Azure Azure VMs and interfaces, ARM templates, VHD templates,
custom images of Azure vM, Virtual machine scale sets. vifiual machine availability sets, App
Service Web App for containers, App Service plan, Networking for an App Service, Deployment
.) slots, Container image.
Azure Kubemetes Service, Azure Container Registry, Azure Yiftual networks' Azure
vNetcomponents. Azure M!et subnets, Azure Network Interface cards (Nlc), Network Security
Groups (NSGs). Route tables, Service tags, Azure DNS, Private DNS, Application Gateway, Azure
Froni door Service, Azure Traffic Manager, Application Security Croups, Azure Load Balancer,
Azure, ExpressRoute, ExpressRoute Circuits' ExpressRoute Peering, Azure Firewall, Azure
Bastion, Network watcher, tdentity and Access Management in Azure, Role-based Access control
(RBAC), Role definitions, Role assignment in Azure resources, Azure users and groups, RBAC
policies.
Module Il I: 8lectures hours
Microsoft azure active directory, Azure Monitoring and Autoscaling, Azure Data Platform, Azure
Migration, Server-side programming model, Triggers, User-defined functions (UDFs), Table Apl,
Cosmos DB graph database, populating a graph, Writing Cremlin queries, Azure Table Storage,
integrate caching and content delivery, Configure cache and expiration policies for Azure Redis
Cache Connections, App Configuration Azure Key Vault, Key Encryption, expiration.
Studio work covers accessing Azure cloud services with handling data migration based on provided
architectural requirements using Azure migrate service. Learners would be able to create and
migrate Azure virtual machines and create slorage accounts and application gateways for aiding
Azure Migrate. They will also develop the applications using Azure services by using cloud
architecture.
Text Books :
) 1. Orban ond Slephen, Aheod in the Cloud: Best Practices for nqvigqting lhe Future of Enterprise
lT (1 ed.), CreateSpace lndependent Publishing PlatJbrn, 2018. ISBN 978198t9243t8.
2. Modi, Rilesh, Azurefor Architects: Implementing cloud design, DevOps, containers, IoT, and
serverless solutions on your public cloud (2 ed.), Packt Publishing Ltd,, 2019. ISBN
978 t 7883987 32.
Reference Books :
l. Benjqmin Perkins and William Panek, Microsoft Azure Architect Technologies, and Design
Complete Study Guide: Exans AZ-303 and AZ-304 (led.), Wiley Publication, 2020. ISBN
9781 I 19559573.
Assessment Scheme
.)
PO PO2 PO3 PC)4 PO5 PO PO PO PO POI POt POI PSO PS02 PSO3
I 6 7 8 9 0 I 2 I
col I 2 ) I l
) co2 3 3 I 2 I 3
.t
co3 2 2 3 2 3 3 I I
Course Contents:
Setting up cloud projects and accounts, creating projects in GCP, Viewing Google Cloud Platform
Status Cloud Console, Cloud Shell, Cloud SDK, Configuring access and security, Assigning users
to predefined IAM roles within a project, Managing users, groups, and roles in Cloud ldentity,
Enabling APIs within projects, Provisioning one or more Stackdriver workspaces, Managing billing
configuration, Creating one or more billing accounts, Linking projects to a billing account,
Establishing billing budgets and alerts, Sening up billing exports to estimate daily/monthly charges,
Billing Services, Configuring the command line interface (CLI), Accessing services using CLI,
Working with GCP SDK, lntegration of CCP Platform with other Cloud Services.
Planning and estimating GCP product use, Pficing Calculator, Planning and configuring compute
resources, Selecting appropriate compute choices for workload, Compute Engine (20) Google
Kubernetes Engine, App Engine, Power Shell, Cloud Functions, Deploying and implementing
Compute Engine resources, deploying a Google Kubemetes Engine cluster, Planning and
configuring network resource, Load balancing options, Identirying resource locations in a network
for availability, Configuring Cloud DNS, Deploying a container application to Google Kubemetes
Engine. Auto Scaling in Google Kubemetes, Handling Fault Tolerance in Google Kubemetes.
Deploying and implementing data solutions, Cloud SQL, Cloud Datastore, BigQuery, Cloud
Spanneq Cloud Pub/Sub, Cloud Bigable, Cloud Dataproc, Cloud Dataflow, Cloud Storage,
Loading data, Deploying and implementing networking resource, Monitoring and logging, Creating
Stackdriver alerts based on resouce metrics, Creating Stackdriver custom metrics, configuring log
sinks to export logs to extemal systems, viewing and filtering logs in Stackdriver, viewing specific
log message details in stackdriver, cloud diagnostics, cloud Trace dat4 cloud Debug to view an
application point, Case Study.
studio work focuses on the Google cloud platform ofdeploying, monitorin& and maintaining
projects on Google Cloud.
Text Books :
L Legorie Raja4 Steven Porter, and Ted H*ttet, Building Google Cloud Platform Solutions (l
ed.), Pack Publishing 2019. ISBN 97818386474382.
Reference Books :
l.Legorie Raja4 Sreven Porter, and Ted Hwter, Building Coogle Cloud Platform Solutiorc (l
ed.), Packt Publishing 2019. ISBN 97818386474382.
)
AssfslcullSs@r:
Pre-req uisites/Exposure
COI: To familiarize and leam about the latest trends and research in the field'
tools'
CO2: To equip themselves wilh the conceptual and practical experience of few latest methods'
technologies or algorithms in Cloud Computing.
co-Po/P MaDDins
1 2
cor 2 3 3 I
co2 3 3 3 3 I 3
)
t=weakly related 2: moderately related 3=strongly related
Course Contents:
l: 28 lectur€ hours
Modute
Thi, the cutting-edge topics in Cloud Computing, and these modules will be chosen
"our." "ot"r,
by the instructor bas"d on thJrequirements and relevance at that point of time' These
modules need
toberelevanttotheindustryandstafl-upswillalsoincluderelatedcasestudies,usecasesand
get real hands-on
implementations scenarios. Students will be working on lab work and projects to
experience ofthese topics and modules.
students will gain practical experience by using tools and technologies related to cloud
computing.
-._'
Text Books :
qnd Daniel Kirsch., cloud Computingfor Dummies Hoboken (I ed )'
l. Judirh s. Hurwitz
) John ll/itey & Son, 2020 ISBN 978-l I19546658'
J
Assessme t Scheme
A./
._ tv.1_
i,, .,.",ry, Gre ,cr Noida
; 1' r" :: .. r ,,i';li,!,.J,; j;1;"lii,
i-l'il6li
CO-PO/PSO Manoins
PO Po2 PO3 PO4 PO5 PO PO PO PO POI POt POI PSO PSO2 PSO3
I 6 7 8 I 0 I 2 I
cot 3 I 2 3 2 t 1 2 I ) 2 3 3
) co2 2 2 2 I 2 I I 7 1 1 2 )
Course Contents:
ii:, ll )
,rl r.:-ll
In Lab work, students will start with basic Multicopter design principles, components, and assembly
precautions. Then finally design and develop a fully functional Multicopter UAV/Drone using off- the-
shelf Flight Controllers.
Text Books :
l. Quan Quan, /r?r/ oduction to MubicoPter Design and Control (l'r ed.), Springer,20l7. ISBN 978-
981t033810.
Reference Books :
l. R Kurt Bqrnhart,Douglas M. Marshall Eric Shappee and Michael Thomas Most, Introduction to
unmanned aircraft systems (2 ed.), CRC Press,2016. ISBN 978-1482263930-
2. Quan, Q., Dai, X., and Wang, S-, Multicopter Design and Control Practice: A Series Experimefis
Based on MATLAB and Pixhowk (l!ed.), Springer,2020. ISBN 978'9811531392.
Assessment Scheme:
)
Components lnternal Assessment Mid Term Exam End Exrm Total
r)
R tal
nne 1i Univer-sity, Greater Noida
(Er1iL,l,:ll i J U i.l.: r\jl 2.'i rJ C,rU oi Urt.]l Pradesh)
Plot No's 3, 0, 10, '11 , I-ech Zone-ll
Greate i NoiC:-2013'10
Name of Program Bachelor of Technology (Computer Science and Engineering)
CSET48! Software Testing L T P C
Owning SchooUDepartment Depa rtment of Com puter Science Engineering 3 0 0 3
Pre-requ isites/Exposure
CO-PO/PSO Mappinq
PO PO2 PO3 P04 PO5 PO PO PO PO POI POI POI PSO PS02 PSO3
I 6 7 8 9 0 I 2 I
CO
.,
3 I 3
I
CO 3 I 3
)
2
Course Contents:
Text Books :
1. S. Linye, Software Testing - Principles, Techniques ancl Tools (1'' ed.), McGruw Hill Education,
2 0 I 7. |SBN 97 80070 I 39909.
Referen Books:
l. Pressman R 5., SoJiware Engineering: A Prqctilioners Approach (7h ed.), McOrav, Hill, 2019
rsBN 978-0073375977.
4!!9E!Eg!S9@9:
WK
pfinett University, Greater Noida
5[i[iAi{,.#fiitxiriu#*l
Name of Program Bachelor of Technology (Comptrter Science and Engineering)
CSET482 Computing Start-Ups L T P C
Owning SchooVDepartment Department of Computer Science Engineering 3 0 0 3
Pre-req uisites/Exposure
Co-PO/PSO Maopins
PO Po2 PO3 PO4 PO5 PO PO PO PO POI POI POI PSO PSO2 PSO3
I 6 7 8 9 0 I 2 I
col 3 3 1 2
cCl2 3 2 3 2 3
., ", 3 3
co3 2 2 2 3 3 2 2
Course ontentt:
what Does 11 Mean to Be a Startup Entrepreneur?, Engaging others with Actionable Next steps,
Benefits vs. Features, Simple strategies to Get unstuck, The Financial Model, The Legal Setup ofYour
Startup, Meetings and Communication Skills.
Startup Crants: Can Govemment Programs Stimulate Entrepreneulship?, Venture Capital and Angel
lnvestors Incubators and Accelerators Incubators and Accelerators, Moving Past the Startup Stage, How
Univetsities Can Suppon Their Startups Today.
Text Books :
l. B.tchir Brahin, The Colony of tnnov(tive stqrtups ( I ed.), 2020.lsBN 97891519587 40
Reference Books :
t. Wrighl Mike qnr) Philippe Mustar, Student Slqrl-ups: The New Landscape OfAcademic
Entrepreneurship (l ed.), IYSPC, 2019. ISBN 9789811208123.
Assessment Scheme:
R
Universit y, Grea ter Noida
(Eri ed Und.3r Act 2,: ol Govt, cl Ullar
Pradesh)
Pi.,l i'Jo's e, I 10, 'i1, Te ch Zone-it
G -l.r - :l:, -
'laJll
Name of Program Bachelor ofTechnology (Computer Science and Er gineering)
csET483 Career Skills for IT Com panres L T P C
Owning SchooUDepartment Department of Com puter Science Engineering 2 0 2
Pre-requ isites/Exposure
COl: To impart aptitude, reasoning, technical and soft skills rhat would aid in the employability of
the students.
CO2: To develop both personal and professional skills effectiveness.
CO3: To help students to gain a confidence for the upcoming placements.
CO-PO/P MaDDins
PO Po2 PO3 PO4 PO5 PO PO PO PO POI POt POt PSO PSC)2 PSO3
6 7 8 9 0 2 I
col 3 3 2 2 1
co2 2 ", 2 3 2 3 3 3 2 2
co3 3 3 2
Corrrse ontents:
Text Books :
l. Shorma Arun How to Prepuefor LOGICAL REASONING (6 ed), Mcoraw Hilt Educarion,202t.
rsBN 9354600557.
2- Shorma Arun, Quantitatlve Aptitude (8 ed), Mfiraw Hill Education 20t8. ISBN gZAg3S3l60tB0.
) Rcfercnce Books :
1. Agarwal R $ Quafititative Aptitude for Competitive bamlnations (l ed), S Chand publishing
2017. ISBN 9i52534026.
Ass€ssment Scheme:
-)
COI : To aniculate the ethical issues related to the development and adoption ofAI
co2 : To examine the ways in which AI is impacting culture and communities.
c03 : To understand the impact of Al to make il more useful.
CO-PO/PSO MaDninq
PO P02 PO3 PO4 PO5 PO PO PO PO POt POt POI PSO PSO2 PSO3
6 7 8 9 0 I 2
col 2
,,
l I 3
) co2 3 I 3
c03 2 3 t 3
Course Contents:
)
Text Books :
I . Kumqr Puneel, Vinod Kumar Jain and Dharminder Kumar, Artificial lntelligence and Global
Society: lmpqct qnd Prqctices (lst ed.), CRC Press,2021. ISBN 0367439133.
Reference Books :
1. OECD, ArtiJiciol lntelligence in Society, 2019, Publisher (lst ed.), 2019. ISBN
9789264515199.
Assessmenl Scheme
)
Name of Program Bachelor of Technology (Computer Science and Engineering)
CSET486 Special Topics in Computer Engineering L T P C
Ownirg SchooUDepartment Depa rtment of Computer Science Engineering 0 0 I
Pre-requisites/Exposure
COI: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience offew latest methods, tools,
technologies or algorithms in Computer Engineering.
co-PO/PSO Mappins
PO P02 PO3 PO4 PO5 PO PO PO PO POI POt POI PSO PS02 PS03
6 7 8 9 0 I 2 I
col 2 J t J 2 ) 2 J
,,
3
co2 I 3 3 3 3 2 I 3
) 2 2
Course Contents:
This course covers the cutting-edge topics in Computer Engineering, and these modules will be
chosen by the instructor based on the requirements and relevance at that point of time. These
modules need to be relevant to the industry and start-ups will also include related case studies, use
cases and implementations scenarios. students will be working on lab work and projects to get real
hands-on experience ofthese topics and modules.
/. i: .t ",.1r j'lci.-ia
.. r' :.rr i r- i-:l)
.i
:, ; -.4il Zoi):l-ll
i.. : 1t)
Name of Program Bachelor of Technology (Computer Science and Engineering)
ECSE233L Human Computer Interface T P C L
COI : Analyze models on user centric design process and test the appropriateness of individual
methods for a given problem.
CO2: Leam information gathering and usage oftools for analysis and user requirements.
CO3: Implement interaction design basics and associated design rules.
CO-PO/PSO MaDDins
PO Po2 PO3 PO4 PO5 PO PO PO PO POI POI POI PSO PS02 PSO3
6 7 8 I 0 I 2 I
cor 2 3 3 2 2 3 2 3 3
c02 3 1 2 2 2 3 2
co3 a 2 2 2 2 a ", 2 2
Cours€ Contents:
(
Focus on designing and implementing visually appealing graphical user interfaces,
conducting experimental validation of developed methods and models. To implement and
test all the related programs and prototypes on relevant tools and technologies.
Text Books :
l. Galitz Wilbert O., The Essential Guide to User lnterface Design: An lntroduction to GUI
DesignPrinciples and Technique (2N ed.), John Wiley & Sons, 2007. ISBN 978-8126502806.
@
1. Dix, J- Fincay, G. D- Abowd, and R Beale, Human Computer lnteraaion (3d ed.),
Pearson Education, 2003. ISBN 978-01 30461 094.
2. Lauesen 5., User lnterface Design: A Software Engineering Perspective (1"' ed.), Addison-
Wesley, 2004. ISBN 978-032118143.
Assessment Scheme:
CO-PO/PSO Mappine
PO Pc)2 PO3 PO4 PO5 PO PO PO PO POt POt POt PSO PS02 PS03
6 7 8 I 0 I 2 I
) cot 3 3 1 2 2 3
c02 3 3 ) 2 3
c03 2 3 2 3
Coursc Contents:
web Evol[tion Overview: Explore the evolntion of the web from its inception to lhe present day.
Understand key milestones that have shaped the development of rveb technologies. Foundations of
Web Systems: lntroduction to the OSI Reference Model and its relevance in web architecture.
Overview ofthe TCP/IP Model and its role in facilitating communication on the web. Understanding
W€b System Architecture: Web Architecture Essentials: Explore the fundamentals ofweb system
architecture.Delve into the components that make up a robust and scalable web infrastructure. Tier
Web Architecture:Undsrstand the principles behind 3-Tier Web Architecture. Explore the benefits
and challenges associated with this architectural approach. Layers in the TCP/IP Model: 5. TCP/IP
) Model Layers: Breakdown ofthe layers in the TCP/lP nrodel and their functionalities. Understand how
each layer contributes to the seamless functioning of web communication .Web Browsers: 6.
navigating Web Browsers:Overview of popular web browsers and their unique features.Explore the
role ofweb browsers in rendering and interpreting web content. Overvi€w ofHTTP: 7. Understanding
HTTP:Explore the Hypertext Transfer Protocol (HTTP) and its role in web comnrunication.Understand
the request-response model and the importance of status codes. Exploring Web Technologies: 8.
Diverse Web Technologies: Introduction to a variety of web technologies shaping the modem web
landscape. Explore emerying trends and their impact on web development. lntroduction to Web
Services: 9. Web Services Fundamentals: Understanding the concept of web services and their
significance in distributed systems. Explore tlre different types ofweb services and their use cases.
About ltS: I0. Insights into llS: - Overview of lntemet lnformation Services (IIS) and its role as a
web server. - Explore the features and capabilities that make IIS a popular choice for hosting web
applications.
Creating Web Sites: 14. Web Site Development Ess€ntials: - Step-by-step guide to creatirg web
sites using different development tools. - Explore best practices for designing and implementing
eflective web interfaces
Dynamic HTML (DHTML) Techniques: Interactive Page Elements with DHTML Dynamic CSS
Styling Smooth Page Transitions using DHTML JavaScript Beyond Basics; Modem Javascript
Features (E56+) Asynchronous Programming rvith Promises Error Handling and Debugging Strategies
Client-Side Scripting Choices: Evaluating the Pros and Cons of JavaScript and Other Scripting
Languages InteBrating External Libraries for Enhanced Functionality Perforntance Considerations in
Client-Side Scripting Embedding Scripting Magic: ExtemalizinB Javascript for Code Modularity
Best Practices for Script Tag Placement Security Considerations in Script Embedding Event-driven
Programming: Handling Events with Event Listeners Event Delegation Techniques Custom Events
for Cross-component Communication JavaScript Variables and Data Types: Understanding Variable
) Scope Exploring Data Types and Conversions Memory Management in JavaScripl Arrays Unleashed:
Advanced Alray Methods and lteration Multidimensional Anays and Nested Structures Perfonnance
Considerations wilh Large Arrays Obj€cts in Depth: Creating and Manipulating Objects Object
Prototypes and Inheritance Practical Design Patterns with Objects Masterirg Javascript Op€rators:
Unraveling Unary, Binary. and Ternary Operators Logical operators and Sho(-circuit Evaluation
Operator Precedence and Associativity Control Flow Mastery: Switch Statements and Advanced
Conditional Logic Iterative Statements beyond the Basics Error Handling with Try...Catch Funclion
Powerhouse: Function Expressions vs. Declarations Arrow Functions and Lexical Scoping Functional
Programming Paradigms in JavaScript
l.lntroduction to PHP: Overview of PHP and its role in web developmert. Underctar'rding the seryer-
side scripting concept. Imponance of PHP in building dynamic web applications. Variables and
application in
constants in PHP: Declaration and usage of variables in PHP. Constants and their
Program Flow Control:
maintaining fixed values. Best pmctices for variable naming and data types'
(for, while, foreach)
conditional statements for decision-making (if. else. elseif). Looping structures
and their implernentation. Switch statements for efficient code organization'
Functions in PHP: Defining and calling functions. Parameters and retum values in functions
Scope
of variables inside and outside functions. Arrays in PHP: Creation and manipulation of arrays'
Associative arral's and their significance Array ftrnctions for efficient data handling
File and
with file paths.
Directory Handiing: Reading and writing to files. navigating directories and working
Filepermissionsandsecurityconsiderations.FormsandDatabaselnteraction:HandlingHTML
Data validation and
fomrs using PHP. Basic database operations: connecting' querying' and updating
with PHP Examples: Establishing a corrnection to
sanitizatiori in tbrms. Basic Database Commands
and table names. creating.
a server. creating and selecting databases. Listing available databases
altering, and deleting tables. Inserting and Querying Data: Inserting data into tables Executing
queries and retrieving results. Best practices for secure database interactions
8 lecture hours
Module V:
Basics of JavaScripi programm ing. iote of JavaScript in enhancing user experience JavaScript
. Introduction
frameworks for web d"vetopment a'synchronous Data Transfer with xML Http Request:
for asynchronous data transier
io aryn.hronou, .luvaScripi and XML IAJAx) xMLHttpRequest object
Uandiing AJeX requests and responses lmplementing AJAX Overview of popular
-Frameworks: implementation of
AJAX fiameworks ihoosing the right framework for web development Hands-on
AJAX frameworks lntegrating pHiand AJAX: pHp as a server-side scripting language lntegrating
pffp *ltf, AJAX for dyiamiciveb content Practical examples of PHP and AJAX integration
Name of P ram Bachelor ofTechno (Comp uter Science and En neering)
CSET484 Cyber security: Impact on Govts, Policies L T P C
and Economics
artment Com ut€r Science En neertng -t 0 0 3
Ownin Schoo
Pre- uisites/Ex ure
col:To explain the broader picture of cybersecurity at the world stage. To articulate the
arguments for Cybetsecurity related policy frameworks.
CO2: To examine the cybersecurity related challenges facing the world'
CO-PO/PSO Maooinq
PO2 PO3 PO4 PO5 PO PO PO PO POI POt POI PSO PSO2 PSO3
PO
I 6 '7
8 9 0 I 2 I
col 2 3 3
coz 2 3 J
)
l=weakly related 2= moderately related 3=strongly related
Course Contents:
il
Name of Program Bachelor of Technology (ComPuter Science and
En neerln
CSET487 ital Marketin L T P C
CO - PO /PSO MaDoins:
PO PO PO PO POI PSO PS PO
PO PO PO PO PO
I 2 3 4 5 6 7 8 I 0 I o2 S3
) CO
2 2 2 a 2 I
2 I 2
CO 1 ,,
I
a 1 3 2 a 3 2 2
2
CO ,, 3
,, 1 1 3 2 2 2 2
3 2 3
l=weakly related 2: moderately related 3:strongly related
I I lecture hours
Module llI
Strategy, designing a.Web Presence' Social Media
Web Analytics, Robust Digital Marketing
Marketing, Land scaoe.Chan.nels.Content.Content'N4arketing.lmplement&MonitorCampaigns.
Measure lmpact, ill:l; a;;t;i fula Marketing, Social Media
Advertising, Platforms for Social Ads'
Module III ll l€cture hours
on your website, Black hat sEo, Mistake by website
r.relriine seo, avoid duplicate content
Defense against negative
ffi;;,ilJpil;
-i;"fdeo, on tlie website, common Negative sEo practices,
(GMB)' optimize GMB Listing'
ieo, Local SEo factors, Google lriy .Business
Element's optimizationon GMB listing, Citations, citations in Local SEO'
8 lecture hours
Module IV
Optim ization, Title Optimization, Desuiption Optimization,
YouTube SEO Ranking Factors, Video
YouTube Subscribers Organically, SEO Strates/ from Google
Thumbnail Optimization, Increase
the position of existing ranking key*ords, keep Eyes
Search Console & Google Analytics, maintain
On Competitor Ranking KeYwords.
Text ks:
l. Das, S., Search Engine Optimization and Marketing: A Recipe for Success inDigital Markering
(lst ed.), CRC Press,202!. ISBN 978'0367278786
Reference Books :
l=f..n-o
- Z02Z: Leam Search Engineoptimization with Smart Intemet Marketing
d;gi;;' iistea), simpte EnectiveneJs LLi,2022. ISBN 9780s78333380'0578333384
)
Assessment Scheme:
35o/o t 00%
Weightage (%) 30o/o 35o/o
-l
,,,,W*.'..r\' 9l:,1iir:,t::!$)
:jcr zone-tt
r'
E*lilit *i L
Reference Books :
i:. curn . lseo 2022: Larn Search Engineoptimization with Smart lnternet Marketing on
tine 416 LLC 2022. ISBN 97805?8333380,0578333384
Assassment Schemes
100%
Wetghtage (%) 3Oo/o 35o/o 35o/o
R r
Be (j.L [.i n iye rsitv, Greater Noida
(E5i!Lji.hi.J 1-1
, ol Ullar Pradesh
PIot Lc',r Jrt 11, Tech Zone-
I
'riii-l
Name of Program Ba c h elo r of Tec h Il o logy (C om p u te r Scien c e a n d E n gi n €e rl t! c)
CSET49I Advanced Industry Certification L T P C
Pre-requisites/Exposure
Col:Familiarizeandleamaboutthelatesttrends,tools,technologies,andresearchinthefieldof
computer science.
CO2: Develop the conceptual and practical understanding of the industry relevance of latest
CO-PO/PSO Mappins
Course ont€nts:
lecture hours:84
Module I
209
Asse ment Sc e
a)
) Mid Term End Exam fotal
Components Internal Assessm€nt
uisites/Ex ure
COI: To afiiculate foundations of finance with an emphasis on applications vital for corporate
managefs.
Co2:.Toexplainfinancialdecisionsmadebycorporatemanagersbothwithinthefirmandintheir
interactions with investors.
CO-PO/PSO Mappinq
Course ontents:
Module l: l2 lecture
hours
Finance overview, Present Value Concepts, NPV Rule, Separation Theorem, Simple
vs Compound
Interest, Annuities and Perpetuities, Growing Delayed Annuities and Perpetuities,
compounding within
the Year and the Effective Annual Interest Rate, Fixed Income valuation. valuation
of Pure Discount
Bonds, Yield to Maturity vs. Holding Period Retum, Prices and Retums on Coupon Bonds' Semi-
Retum and Yield to Maturity for Zero-Coupon Bonds,
Annual Bonds, The Yield curve, Holding Period
CalculatingtheHoldingPeriodRetumonaCouponBond.Equityvaluationlnterest.Applyinglnfinite
Horizon Firmulas, Determining Dividend Growth, lnternal Rate of Retum
(IRR), Comparing NPV and
IRR: Accept or Reject Decision, Comparing NPv and lRR. Capital Budgeting in Practice' Expected
Retum, ani Risk, Portfolio Analysis. iapitai Asset Pricing Model (CAPM). Market Efficiency' Capital
Strategies, Option
Structure. Valuation and Capital Budgeting with Leverage, Option Definitions and
Valuation.
) l0 lecture
Module ll:
hours
cash
Intuition and Discounting. compounding. lnflation, APR and EAR. Term Structure. Discounted
Flow: Decision Making, Free Cash Flow, Forecast Drivers, Forecastilrg Free Cash Flow' Retum on
lnvestment, Financial Reporting, Balance
lnvestment. Decision Ciiteria, Sensitivity Analysis, Return on
Sheet Equation. Assets, Liabilities' and Stockholders' Equity' Debit and Credit
Bookkeeping' Relic
SpotterCase,RevenuesandExpenses,AdjustingEntries,Financia|statementsandClosingEntries,
Plainview
Operating. Investing. and Financing Cash Flows. Statement ofCash Flows' Ratio Analysis'
Techno logy. ).
co-Po/PSO Ma nntns
co2 3 3 2 3 2
) 2
Course ontents:
Module I: ll lecture
hours
VocabularyBuildirrg,ConceptofWordFormatiol,l,Rootwordsfromfoteignlanguagesandtheirusein
derivatives"
English. Acquaintance with prefixes and suffixes from foreign languages in English to form
Syionynrr, Antonyms, Staniard abbreviations, Eft'ective Communication, Purpose of Communication'
Technical
Procesi of Communication, lmportance of Communication in Business, Differences between
and General Communicatioll. Barriers to Communication' Measures to Overcome the Barriers to
Communication, Types of Comnlunication, Verbal Conrmunication' lmportance of verbal
communication. Significance of Non-verbal communication. Communication Netrvork, scope
and
of good
written communication, Principles of effective writing. hnproYing writing skills. Essentials
style,Expressionsandwordstobeavoided,CrammarandUsage,stepsofwriting'Differencebetween
creative academic and professional rvriting, ldentifying Common Errors in Writing'
Rhetoric'
Employment Communication, Job Interview ImPortance and Factors Involving Job Intervieu
Characteristics of Job Interview, Job Interview Process. Job Interview Techniques' Manners
and
etiquettes to be maintained during an interview, Sample Questions commonly asked During Interview,
Mock Interviews, Expert Talk. Resume: Contents of Good Resume. Guidelines for Writing Resume.
Different Types of Risumes, Reason for a cover Letter to Apply for a Job-Format of cover Letter,
Different Types ofCover Letters, Written and verbal feedback giving and receiving'
Text Books :
ll tuti.t.u3i.hu urd Ratna Rao,,4 Textbook of English qnd Communication Sti/h lsted'
Macmillan Publishers India Private Lld,2020.
)
Reference Books :
lFo*,Ni*.c,mmunicationskillsforpro|essionols.2"ded.PHILeamingPvt.Ltd.,202l
Assessment Scheme:
lOOo/o
Weightage (%) 65o/o 00o/o 35o/o
R:
Ec . 'ilrt itL:i N::ida
(4,i.'- ...,t -l.itr t'. -,;'"tD
.l
Fiot i 1l., .. '-, .- , 1 J, i,,r,,:ir Zorle-ll
Greatcr t,:ciil; ?:01 :r1C
ram Bachelor of Techno Co u te r Sc te n c e 2 n d E n tn e e rt n g)
Name of P
o nizational Behaviour L T P c
CSET309 1 0 0 3
Ownin School/D rtment Com u t€r Science Engineerin
Pr€-r€ uisites/E re
Course Contents:
l:
ll lecture
Module
hours
Conflict Dynamics' Varied Perspectrves on
Addressing Misconduct Management, Conflict Resolution'
C"riff"i,
"f-pr"y.e
DissatiJfactio s Influence' Emotional and Mood
Considerations' Stress
Organizational Behavior' Exploring
Management, Counseting teclnlques, Disciplines Contributinglo
lntuition' Hierarchy of Needs Theory'
Rational ftaoati-bounO"A Rationality and
Attribution Theory.
Theory'
McClelland's Theory Of Needs, Self Determination
19 lecture
Module lI:
holIrs
Defining and Classi[ing Groups' The Five-
Groups and teams, Group Behavior, Group Dynamics' process' Conformity and
Of Group o"u"top-t"t'-dt*p o""i'ion Making'- Team
) Stage Model 'Cuttu'ut
competence' Leadership' Leading across cultures'
."i?.fr"""* oigunirutiorut cult"", Bases ofPower' Power Tactics'
;;;;;i;ri;;,'r;.;ion mat ing ana gt'oial stamns'Power and Influence'
Management' HR policies and practices'
How People Respond To Organizaional Politici Impression
Change management, organizational Stress,
Theories of work motivation, Organizational Structure,
Nature of management.
12 lecture
Module Illr
hours
Traits' Values' and Attitudes in the Workplace'
Understanding organizational Behavior, Personality
Perception Mechanisms' fn"
pi'" p"t'o"ufity ft4oatf' Attitudes' Influence on Learning and Job
PercePtion's Role in Decision-Making
Satisfaction, Relationship Between BehaYior and Attitudes'
Biases and g"o"'ln ot"ltion Making' Diversity'
The challenge of divenity'
Processes. cognitive
your people?' Job design and
Diversity management, What motivates your people?, How to motivate
employee reaction, Communication, Evaluation, Feedback,
Rewards'
Text Books :
1* ed' Pearson' 2019'
1. Buchanan, David A., and Andrzej Huczynski. Organbational behaviow'
R€ference Books :
l=tth,Trrl
" -iinisirs E" Wendy yellowley. and Christopher J. McLachla* Orgonizational behrviour:
p"iptu in dynamic organiza'ions' I st ed Taylor & Francis' 2020'
@.e!!ss@e:
Mid Term Exam End Exam Total
Componenti Intcrnal Assossment
.)
Re
Be Universi ty, Greater
(f [,rderAct 2 tr Noida
I' r(rt lJ o's B. g, .i c)l Govl,
c, 'l
of Ullar Pradesh
1 , Tech Zone- il
Name of Pro m Bachelor ofTechno (Com uter Science and En lneerrn
CSET3I O Mark€tin Str ies and PlaDning L T P C
Com uter Science En neenn 3 0 0 3
Ownin School/D artment
Pre- uisites/Ex ure
CO-PO/PSO MapDinq
) co2 ) I 2 2 2 2
3 3 2
co3 3 2 3
Course ontents:
Module I:
13 lecture
hours
Value' lmportance
Marketing Strategy Process, Scanning the Environment, Creating Value' Sustaining
Targeting
of Markel neseaich, Conducting lriarket Research, Strategic Marketing, Segmentation
Segmentation and
Positioning. Levels of Market Segmentation. Profitable Segmentation' Targeting'
Targeting in Practice, Branding, Marketing Strategy and Brand Posilioning'
Building Strong Brands'
Product-
Brid pisitioning- Experiential Branding. product-centric to customercentric Management.Centricity'
Centric ApproaIh. Data-Driven Business Models' Direct Marketing' Customer
Communications campaign designing, Media Planning'
Text Books :
marketing: *eating
ii.':w"rt,
' oougtu. c., John Battice Ford, and Essam lbrahim' s-trategic
tsted. LtD publishing Limited,2020. rsBN 978-1912ss5765.
":..iitiiziniiase.
Reference Books :
l.Fenell,odiesc.,MichaelHartline,andBryanw.Hochstein'Marketingstrateg)'lsted'cengage
Learning, 2021. ISBN 978-03575 16362
4s!@!Ss!e.!qe:
Mid Term Exam End Exam Total
Components Internal Assessment
35o/o 100%
Weightage (%) 65o/o O0o/o
R ts I
E c i.t Un versity, Greater Noida Pradesh)
rh: -l UirJ:t.r'ci 11':lG:vl, of Uilar
1l,Te cl.r Zone-ll
P lct l.lo"-; 0, 9, 1C,
Creater N,l i.ia-201310
B A c h e I o r of Tec h n o logy (C o m pu t e I Sc te n c e A n d E n n eer tn s)
gr
Name of Program
Micro arld Macro Economics L T P C
csET3l I
Owning School/Department De p a rt m e n t o f Co m p u te r S c e n ce E n gr n ee rl n 3 0 0 3
Pre-requisites/ExPosu re
professionals'
COI: To examine the understanding importance ofthe economy for engineering
CO2: To articulate the tactors ,"q,ii,"i in taking appropriate economic decisions rvhich will help in
minimizing investment. operating ard maintenance expenditures
ll l3lecture hours
Modul€
Preferences and ulility'
Microeconomics, Demand Curve. Elasticity of demand, Consumer surplus'
theoty'
Brdg"t lncome elasticity of demand, Deriving demand curve, Applying consumer
of denand. Elasticity of supply' Elasticity interpreted' Surpluses &
"onrtruintr, Min/Max
Croi elasticity -price'
Maximum tent. Minimum *ug", i*"hung" rates, Demand for impotVexporl' Producer Theory'
Market' lnt€rnational trade'
Productivity and cost. Welfare economics Monopoly. Oligopoly' Factor
economics'
Uncertainty. Capital supply and nrarket. Equity and efficiency' Healthcare
l2lecture hours
Module lll
GDB Expenditure approach'
Mafioeconomics, 'ry'hat is GDP'/, GDP Calculation' Nominal and Real
and trade balance, Aggregated demand' Aggregated supply'
Shifts in
Income approach, Fiscal balance
Aggregate Demand. Shifts in Aggregate Supply' Maroeconomic
Equilibrium' Sources' Measurement'
and Sustainability of Economic ci*th'
gusin"ts cycle' Resource Use' Housillg Market' External
Inflation' lndexes Used to Measure
Trade, Types of Unemployment, Measures of Unemployment'
Cost-push and Demand-pull lnflation'
Inflation, iJses and Limitations of Inflation Measures,
9 lecture hours
Module lV
ofMoney' Definitiorrs ofMoney'
Types of Econ omic indicators, Monetary and Fiscal Policy, Functions
and Supply' The
Money Creati on Process, Quantity Theory of Money, Theories of Money
Demand
@ei]Ei
l. ZahidA. Khan , tushad N. Siddiquee , Brajesh Kumar and Mustafa H' Abidi' Principles of
rigineering Economics with Applications ( l st ed'), Cambridge University Prcss'
20l8 ISBN 978-
l108458856..
Reference Books:
l]F.iluu"t -d Niall Kishtainy, The Economics Book (lst ed.). DK Publishing, 2014. ISBN
978-1465438409
A!sc!E!4!Ssh@g:
Lrb End Exam Total
Components Quiz
R
o^ n 'It U,-r:.r:r.- 'y, Greater [.loida
(E:itif ::,lred L ri-:., " ; {r; G:rvt, .F t-lit.i[ Pradesh)
Plot l'lo's D, '.1, 'l n, 1i , 'lurh Zone-ll
Greate r I i -.: ,, .'r -2.11 :r 'i 0