Regulation 23 Syllabus
Regulation 23 Syllabus
REGULATIONS
2023
DEPARTMENT OF
COMPUTER SCIENCE
AND ENGINEERING
Academic Batch 2023-2027
N
ENGI EERIN
HA
PEC
G
S
PRATHYU
CO
LLEGE
IQAC
ü
A
NAAC
NATIONAL ASSESSMENT AND
ACCREDITATION COUNCIL
PRATHYUSHA
ESTO. 2001 ENGINEERING COLLEGE
An Autonomous Institution
NAAC 11A" Grade I NBA accredited
Poonamallee-Tiruvallur Road, Tiruvallur - 602 025.
www.prathyusha.edu.in
DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING
Academic Batch 2023-2027
REGULATIONS 2023
Curriculum & Syllabus
PRATHYUSHA ENGINEERING COLLEGE
SEMESTER I
S. COURSE CATE PERIODS PER TOTAL
CODE GORY WEEK CONTACT
NO. COURSE TITLE CREDITS
L T P PERIODS
1. IP23101 INDUCTION PROGRAMME - - - - - 0
THEORY
SEMESTER II
S. COURSE CATEGORY PERIODSPER TOTAL
NO. CODE COURSE TITLE WEEK CONTACT CREDITS
L T P PERIODS
THEORY
1. HS23202 PROFESSIONAL ENGLISH HSMC 3 0 0 3 3
2. HS23203 TAMILS AND TECHNOLOGY HSMC 1 0 0 1 1
3. MA23202 DIFFERENTIAL EQUATIONS AND BSC 4 0 0 4 4
TRANSFORM TECHNIQUES
4. BE23201 BASIC ELECTRICAL AND ESC 3 0 0 3 3
ELECTRONICS ENGINEERING
5. CS23201 PROBLEM SOLVING USING C
ESC 3 0 0 3 3
PRACTICALS
6. LES23201 ENGINEERING PRACTICES ESC 0 0 3 3 1.5
LABORATORY
7. LCS23201 PROBLEM SOLVING USING C ESC 0 0 3 3 1.5
LABORATORY
8. MC23201 DESIGN THINKING MC 0 0 2 2 0
9. MC23202 DIGITAL MARKETING AND SOCIAL MC 0 0 2 2 0
MEDIA SKILLS
TOTAL 14 0 10 24 17
PRACTICALS
6. DATA STRUCTURE LABORATORY
LCS23301 LPCC 0 0 3 3 1.5
7. OBJECT ORIENTED PROGRAMMING
LCS23302 LPCC 0 0 3 3 1.5
LABORATORY
8. DATA SCIENCE USING PYTHON LAB
LAD23301 LPCC 0 0 3 3 1.5
9. EEC23301 APTITUDE SKILLS EEC 0 1 0 1 1
TOTAL 18 1 11 30 22.5
SEMESTER IV
PERIODS TOTAL
S. COURSE COURSETITLE CATE PER CREDITS
CONTACT
NO. CODE GORY WEEK PERIODS
L T P
THEORY
1. CS23401 DATABASE MANAGEMENT SYSTEM PCC 3 0 0 3 3
2. CS23402 COMPUTER NETWORKS PCC 3 0 2 5 4
3. PCC 3 0 2 5 4
CS23403 OPERATING SYSTEM
4.
CS23404 ALGORITHM PCC 3 0 2 5 4
9. MINI PROJECT-I
EEC23402 EEC 0 0 2 2 1
TOTAL 17 1 13 31 23.5
SEMESTER V
PERIODS TOTAL
S. COURSE COURSETITLE CATE PERWEEK CREDITS
CONTACT
NO. CODE GORY
L T P PERIODS
THEORY
1. CS23501 CRYPTOGRAPHY AND CYBER PCC 3 0 0 3 3
SECURITY
2. CS23502 CLOUD COMPUTING AND EDGE PCC 3 0 0 3 3
COMPUTING
3. CS23503 INTERNET PROGRAMMING PCC 2 0 2 4 4
4. CS23504 ARTIFICIAL INTELLIGENCE PCC 3 0 0 3 3
AND MACHINE LEARNING
5. - PROFESSIONAL ELECTIVE I PEC - - - - 3
6. - PROFESSIONAL ELECTIVEII PEC - - - - 3
PRACTICALS
7.
LCS23501 CLOUD COMPUTING LAB LPCC 0 0 3 3 1.5
8. EEC23501 CODING SKILLS EEC 0 0 2 2 1
9. MC23501 MOOC/SWAYAM/NPTEL MC 2 0 0 2 0
10. INTERNSHIP/INDUSTRIAL
ECS53501 TRAINING EEC - - - - 2
TOTAL 13 0 7 18 23.5
SEMESTER VI
PERIODS TOTAL
S. COURSE COURSETITLE CATE PERWEEK CREDITS
CONTACT
NO. CODE GORY PERIODS
L T P
THEORY
1. AUGMENTED REALITY/ VIRTUAL
CS23601 PCC 3 0 0 3 3
REALITY
2. CS23602 EMBEDDED SYSTEMS AND IOT PCC 3 0 0 3 3
3. OPEN ELECTIVE-1 OEC 3 0 0 3 3
4. PROFESSIONAL ELECTIVEIII PEC - - - - 3
5. PROFESSIONAL ELECTIVEIV PEC - - - - 3
6. PROFESSIONAL ELECTIVEV PEC - - - - 3
PRACTICALS
7. AR/VRLAB
LCS23601 LPCC 0 0 3 3 1.5
TOTAL 9 0 8 17 22
SEMESTER VII/VIII*
PERIODS TOTAL
S. COURSE COURSE TITLE CATE PERWEEK CREDITS
CONTACT
NO. CODE GORY
L T P PERIODS
THEORY
1. CRYPTOCURRENCY AND PCC 3 0 2 5 4
CS23701
BLOCKCHAIN
TECHNOLOGIES
2. HS23701 PRINCIPLES OF HSMC 3 0 0 3 3
MANAGEMENT
3. - OPEN ELECTIVEII OEC - - - - 3
4. - OPEN ELECTIVEIII OEC - - - - 3
5. - PROFESSIONAL ELECTIVEVI PEC - - - - 3
PRACTICALS
6. LCS23701 CRYPTOCURRENCY AND LPCC 0 0 3 3 1.5
BLOCKCHAIN
TECHNOLOGIESLAB
7. EEC23701 SKILL ENHANCEMENT EEC 0 0 2 0 1
8. MC23701 MOOC/SWAYAM/NPTEL MC 0 0 0 0 0
SEMESTER VIII/VII*
PERIODS TOTAL
S. COURSE COURSE TITLE CATE PERWEEK CREDITS
CONTACT
NO. CODE GORY
L T P PERIODS
THEORY
1. HS23801 HUMAN VALUES AND HSMC 3 0 0 3 3
PROFESSIONAL ETHICS
2. - PROFESSIONAL ELECTIVEVII PEC - - - - 3
PRACTICALS
3. LCS23801 PROJECT WORK–PHASEII EEC 0 0 16 20 10
TOTAL 3 0 16 23 16
TOTALCREDITS: 163
VERTICALVII
VERTICAL III
VERTICAL II VERTICAL IV
CLOUD VERTICAL VI
VERTICALI VERTICAL V ARTIFICIAL
FULL STACK COMPUTING AND CYBER
DATA CREATIVE EMERGING INTELLIGENCE
DEVELOPMENT DATA CENTER SECURITY AND
SCIENCE MEDIA TECHNOLOGIES AND MACHINE
FOR IT TECHNOLOGIES DATAPRIVACY
LEARNING
Exploratory Data Digital and Mobile Multimedia and Robotic Process Knowledge
Web Technologies Virtualization
Analysis Forensics Animation Automation Engineering
Web and Mobile App Cloud Services Social Network Video Creation and Neural Networks and
Recommender Systems Soft Computing
Development Management Security Editing Deep Learning
Computer Vision Web Application Security Stream Processing Network Security Game Development Game Development Game Theory
Multimedia Data
Big Data Analytics Security and Privacy Security and
DevOps Compression 3D Printing and Design Cognitive Science
in Cloud Privacy in
and Storage
Cloud
PERIODS TOTAL
S. COURSE COURSE TITLE CATE PERWEEK CREDITS
CONTACT
NO. CODE GORY
L T P PERIODS
PERIODS TOTAL
S. COURSE COURSETITLE CATE PERWEEK CREDITS
CONTACT
NO. CODE GORY
L T P PERIODS
1. PCS2308 Web Technologies PEC 2 0 2 4 3
2. PCS2309 Web and Mobile App PEC 2 0 2 4 3
Development
3. PCS2310 Cloud Services PEC 2 0 2 4 3
Management
4. PCS2311 UI and UX Design PEC 2 0 2 4 3
PERIODS TOTAL
S. COURSE COURSE TITLE CATE PERWEEK CREDITS
CONTACT
NO. CODE GORY
L T P PERIODS
1. PCS2315 Virtualization PEC 2 0 2 4 3
2. PCS2316 Cloud Services PEC 2 0 2 4 3
Management
3. PCS2317 Data Warehousing PEC 2 0 2 4 3
PERIODS TOTAL
S. COURSE COURSETITLE CATE PERWEEK CREDITS
CONTACT
NO. CODE GORY
L T P PERIODS
1. PCS2322 Digital and Mobile PEC 2 0 2 4 3
Forensics
2. PCS2323 Social Network PEC 2 0 2 4 3
Security
3. PCS2324 Ethical Hacking PEC 2 0 2 4 3
PERIODS TOTAL
S. COURSE COURSETITLE CATE PERWEEK CREDITS
CONTACT
NO. CODE GORY
L T P PERIODS
PERIODS TOTAL
S. COURSE COURSE TITLE CATE PERWEEK CREDITS
CONTACT
NO. CODE GORY
L T P PERIODS
PERIODS TOTAL
S. COURSE COURSETITLE CATE PERWEEK CREDITS
CONTACT
NO. CODE GORY PERIODS
L T P
1. PCS2340 Knowledge Engineering PEC 2 0 2 4 3
OPEN ELECTIVES
(STUDENTS SHALL CHOOSE THE OPEN ELECTIVE COURSES, SUCH THAT THE COURSE
CONTENTSARENOTSIMILARTO ANYOTHERCOURSECONTENTS/TITLEUNDEROTHER
COURSE CATEGORIES).
OPEN ELECTIVES–I
PERIODS TOTAL
S. COURSE COURSETITLE CATE PERWEEK CREDITS
CONTACT
NO. CODE GORY PERIODS
L T P
1. OIE351 Introduction to Industrial
Engineering OEC 3 0 0 3 3
2. OBT351
Food, Nutrition and Health
OEC 3 0 0 3 3
3. OCE351 Environment and Social
OEC 3 0 0 3 3
Impact Assessment
4. OEE351 Renewable Energy System
OEC 3 0 0 3 3
5.
Introduction to
Bioinformatics OEC 3 0 0 3 3
OPEN ELECTIVES–II
PERIODS TOTAL
SL. COURSE COURSETITLE CATE PERWEEK CREDITS
CONTACT
NO. CODE GORY
L T P PERIODS
1. OIE352
Resource Management
Techniques OEC 3 0 0 3 3
2. AU3791 Electric and Hybrid Vehicles OEC 3 0 0 3 3
3. OAS351 Space Science OEC 3 0 0 3 3
4. AI301 I Tin Agricultural System OEC 3 0 0 3 3
5. OEI352
Introduction to Control
Engineering OEC 3 0 0 3 3
OPEN ELECTIVES– IV
SUMMARY
This is a mandatory 2 week programme to be conducted as soon as the students enter the institution.
Normal classes start only after the induction program is over.
The induction programme has been introduced by AICTE with the following objective:
“One will have to work closely with the newly joined students in making them feel comfortable, allow
them to explore their academic interests and activities, reduce competition and make them work for
excellence, promote bonding within them, build relations between teachers and students, give a
broader view of life, and build character.”
Hence, the purpose of this programme is to make the students feel comfortable in their new
environment, open them up, set a healthy daily routine, create bonding in the batch as well as
between faculty and students, develop awareness, sensitivity and understanding of the self, people
around them, society at large, and nature.
The following are the activities under the induction program in which the student would be fully
engaged throughout the day for the entire duration of the program.
This would involve a daily routine of physical activity with games and sports, yoga, gardening, etc.
Every student would choose one skill related to the arts whether visual arts or performing arts.
Examples are painting, sculpture, pottery, music, dance etc. The student would pursue it everyday
for the duration of the program. These would allow for creative expression. It would develop a sense
of aesthetics and
also enhance creativity which would, hopefully, grow into engineering design later.
This is the anchoring activity of the Induction Programme. It gets the student to explore oneself and
allows one to experience the joy of learning, stand up to peer pressure, make decisions with
courage, be aware of relationships with colleagues and supporting stay in the hostel and
department, be sensitive to others, etc. A module in Universal Human Values provides the base.
Methodology of teaching this content is extremely important. It must not be through do's and don'ts,
but get students to explore and think by engaging them in a dialogue. It is best taught through group
discussions and real life activities rather than lecturing.
Literary activity would encompass reading, writing and possibly, debating, enacting a play etc.
This would address some lacunas that students might have, for example, English, computer
familiarity etc.
Motivational lectures by eminent people from all walks of life should be arranged to give the students
exposure to people who are socially active or in public life.
A couple of visits to the landmarks of the city, or a hospital or orphanage could be organized. This
would familiarize them with the area as well as expose them to the underprivileged.
They should be told about what getting into a branch or department means what role it plays in
society, through its technology. They should also be shown the laboratories, workshops & other
facilities.
About a week can be spent in introducing activities (games, quizzes, social interactions, small
experiments, design thinking etc.) that are relevant to the particular branch of Engineering /
Technology / Architecture that can serve as a motivation and kindle interest in building things
(become a maker) in that particular field. This can be conducted in the form of a workshop. For
example, CSE and IT students may be introduced to activities that kindle computational thinking,
and get them to build simple games. ECE students may be introduced to building simple circuits as
an extension of their knowledge in Science, and so on. Students may be asked to build stuff using
their knowledge of science.
Induction Programme is totally an activity based programme and therefore there shall be no
tests / assessments during this programme.
References:
Guide to Induction program from AICTE
HERITAGE OF TAMILS
HS23101 L T P C
1 0 0 1
Hero stone to modern sculpture – Bronze icons – Tribes and their handicrafts – Art of temple car
making – – Massive Terracotta sculptures, Village deities, Thiruvalluvar Statue at Kanyakumari,
Making of musical instruments – Mridhangam, Parai, Veenai, Yazh and Nadhaswaram – Role of
Temples in Social and Economic Life of Tamils.
Contribution of Tamils to Indian Freedom Struggle – The Cultural Influence of Tamils over the other parts of
India – Self-Respect Movement – Role of Siddha Medicine in Indigenous Systems of Medicine – Inscriptions &
Manuscripts – Print History of Tamil Books.
TEXT-CUM-REFEREN CE BOOKS
1. Social Life of Tamils (Dr.K.K.Pillay) A joint publication of TNTB & ESC and RMRL – (in print)
2. Social Life of the Tamils – The Classical Period (Dr.S.Singaravelu) (Published
by:International Institute of Tamil Studies.
3. Historical Heritage of the Tamils (Dr.S.V.Subatamanian, Dr.K.hirunavukkarasu)
(Published by: International Institute of Tamil Studies).
4. The Contributions of the Tamils to Indian Culture (Dr.M.Valarmathi) (Published
by:International Institute of Tamil Studies)
5. Keeladi – ‘Sangam City Civilization on the banks of river Vaigai’ (Jointly Published by:Department of
Archaeology & Tamil Nadu Text Book anEducationaServices Corporation,Tamil Nadu)
தநிமர்நபபு
L T P C
HS23101
1 0 0 1
UNIT-1மநொமி நற்றும் இக்கினம் 3
தநிமர்கின் ொபம்ரினம் / தநிமர்நபபு மநொமி குடும்ங்கள் இந்தினொயில் –
திபொயிட மநொமிகள் – தநிழ் ஒரு மெம்மநொமி தநிழ் மெம்மநொமி –மெம்மநொமி
இக்கினம் – மெம்மநொமி இக்கினம் – தநிழ் – ெங்க இக்கினத்தின் நதச்ெொர்ற்
தன்ரந – ெங்க இக்கினங்கில் யிியனொக ீதி– திருக்குினல் தநிழ்
யநொண்ரந – E. தநிழ் ித்தில் மௌத்தம் நற்றும் ெநணத்தின் தொக்கம் - க்தி
இக்கினம் ஆழ்யொர்கள் நற்றும் ொனன்நொர்கள் - ெிறு கயிரத யடியங்கள் -
தநிமில்ய ீ இக்கினத்தின் யர்ச்ெி - ொபதினொர் நற்றும் ொபதிதொென் ங்கிப்பு.
ENGINEERING PHYSICS
PH23101 L T PC
3 0 0 3
COURSE OBJECTIVES
.To make the students effectively to achieve an understanding of mechanics
To enable the students to gain knowledge of electromagnetic waves and its applications.
To introduce the basics of oscillations, optics and lasers.
Equipping the students to be successfully the importance of quantum physics.
To motivate the students towards the applications of quantum mechanics.
UNIT I MECHANICS 9
Multi-particle dynamics: Center of mass (CM) – CM of continuous bodies – motion of the
CM – kinetic energy of system of particles. Rotation of rigid bodies: Rotational kinematics –
rotational kinetic energy and moment of inertia - theorems of M. I –moment of inertia of
continuous bodies – M.I of a diatomic molecule - torque – rotational dynamics of rigid bodies –
conservation of angular momentum
– rotational energy state of a rigid diatomic molecule - gyroscope - torsional pendulum – double
pendulum –Introduction to nonlinear oscillations.
REFERENCES:
1. Wolfson. Essential University Physics. Volume 1 & 2. Pearson Education (Indian Edition),
2009.
2. Paul A. Tipler, Physic – Volume 1 & 2, CBS, (Indian Edition), 2004.
3. K. Thyagarajan and A. Ghatam. Lasers: Fundamentals and Applications, Laxmi
Publications, (IndianEdition), 2019.
4. Halliday, R. Resnick and Walker. Principles of Physics, Wiley (Indian Edition), 2015.
5. N. Garcia, A. Damask and Schwarz. Physics for Computer Science Students. SpringerVerlag,
2012.
UNIT II NANOCHEMISTRY 9
Basics: Distinction between molecules, nanomaterials and bulk materials; Size-dependent properties
(optical, electrical, mechanical and magnetic); Types of nanomaterials: Definition, properties and
uses of – nanoparticle, nanocluster, nanorod, nanowire and nanotube. Preparation of nanomaterials:
sol-gel, solvothermal, laser ablation, chemical vapour deposition, electrochemical deposition and
electro spinning. Applications of nanomaterials in medicine, agriculture, energy, electronics and
catalysis.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
At the end of the course, the students will be able:
To infer the quality of water from quality parameter data and propose suitable treatment
methodologies to treat water.
To identify and apply basic concepts of nanoscience and nanotechnology in designing thesynthesis
of nanomaterials for engineering and technology applications.
To apply the knowledge of phase rule and composites for material selection requirements.
To recommend suitable fuels for engineering processes and applications.
To recognize different forms of energy resources and apply them for suitable applicationsin
energy sectors.
TEXT BOOKS:
REFERENCES:
1. B. S. Murty, P. Shankar, Baldev Raj, B. B. Rath and James Murday, “Text book of nanoscience and
nanotechnology”, Universities Press-IIM Series in Metallurgy and MaterialsScience, 2018.
2. O.G. Palanna, “Engineering Chemistry” McGraw Hill Education (India) Private Limited, 2 nd Edition,
2017.
3. Friedrich Emich, “Engineering Chemistry”, Scientific International PVT, LTD, New Delhi, 2014.
4. ShikhaAgarwal, “Engineering Chemistry-Fundamentals and Applications”, Cambridge University
Press, Delhi, Second Edition, 2019.
5. O.V. Roussak and H.D. Gesser, Applied Chemistry-A Text Book for Engineers and Technologists,
Springer Science Business Media, New York, 2nd Edition, 2013.
COURSE OBJECTIVES:
To develop the use of matrix algebra techniques that are needed by engineers for
practical
applications.
To familiarize the students with differential calculus.
To familiarize the student with functions of several variables. This is needed in many branches of
engineering.
To make the students understand various techniques of integration.
To acquaint the student with mathematical tools needed in evaluating multiple integrals and their
applications
Definite and Indefinite integrals – Substitution rule – Techniques of Integration: Integration by parts,
Trigonometric integrals, Trigonometric substitutions, Integration of rational functions by partial fraction,
Integration of irrational functions – Improper integrals – Applications : Hydrostatic force and pressure,
moments and centre of mass.
COURSE OUTCOMES:
At the end of the course the students will be able to
1. Use the matrix algebra methods for solving practical problems.
2. Apply differential calculus tools in solving various application problems.
3. Able to use differential calculus ideas on several variable functions.
4. Apply different methods of integration in solving practical problems.
5. Apply multiple integral ideas in solving areas, volumes and other practical problems.
TEXT BOOKS :
1. Kreyszig.E, "Advanced Engineering Mathematics", John Wiley and Sons, 10th Edition, New Delhi,
2016
2.Grewal.B.S., ―Higher Engineering Mathematics‖, Khanna Publishers, New Delhi, 44th Edition
2018
3.James Stewart, " Calculus: Early Transcendentals", Cengage Learning, 8th Edition, New Delhi, 2015.
[For Units II & IV - Sections 1.1, 2.2, 2.3, 2.5, 2.7 (Tangents problems only), 2.8, 3.1 to 3.6, 3.11,
4.1, 4.3, 5.1 (Area problems only), 5.2, 5.3, 5.4 (excluding net change theorem), 5.5, 7.1 - 7.4 and 7.8].
REFERENCES:
1. Anton.H, Bivens. I and Davis. S, "Calculus", Wiley, 10th Edition,
2016
2.Bali. N., Goyal.M. and Watkins.C., ―Advanced Engineering Mathematics‖, Firewall Media (An
imprint of
Lakshmi Publications Pvt., Ltd.,), New Delhi, 7th Edition,
2009.
3.Jain .R.K. and Iyengar. S.R.K., ―Advanced Engineering Mathematics‖, Narosa Publications, New
Delhi,
5th Edition,
2016.
4.Narayanan. S. and ManicavachagomPillai. T. K., ―Calculus" Volume I and II, S. Viswanathan
Publishers
Pvt. Ltd., Chennai,
2009.
5.Ramana. B.V., "Higher Engineering Mathematics", McGraw Hill Education Pvt. Ltd, New Delhi,
2016.
6.Srimantha Pal and Bhunia. S.C, ―Engineering Mathematics" Oxford University Press,
2015
UNITVISOMETRICANDPERSPECTIVEPROJECTIONS 6+12
Principles of isometric projection — isometric scale — isometric projections of simple solids and
truncated solids - Prisms, pyramids, cylinders, cones- combination of two solid objects in simple
vertical positions - Perspective projection of simple solids - Prisms, pyramids and cylinders by visual
ray method.
Practicing three dimensional modeling of isometric projection of simple objects by CAD Software
(Not for examination)
TOTAL: 45 PERIODS
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
CO1:Use BIS conventions and specifications for engineering drawing.
CO2:Construct the conic curves, involutes and cycloid.
CO3:Solve practical problems involving projection of lines.
CO4:Draw the orthographic, isometric and perspective projections of simple solids.
CO5:Draw the development of simple solids.
TEXT BOOK:
1. Bhatt N.D. and Panchal V.M., “Engineering Drawing”, Charotar Publishing House, 53rd Edition,
2019.
2. Natarajan K.V., “A Text Book of Engineering Graphics”, Dhanalakshmi Publishers, Chennai, 2018.
3. Parthasarathy, N. S. and Vela Murali, “Engineering Drawing”, Oxford University Press, 2015
REFERENCES:
1. Basant Agarwal and Agarwal C.M., “Engineering Drawing”, McGraw Hill, 2nd Edition, 2019.
2. Gopalakrishna K.R., “Engineering Drawing” (Vol. I&II combined), Subhas Publications, Bangalore,
27th Edition, 2017.
3. Luzzader, Warren.J. and Duff,John M., “Fundamentals of Engineering Drawing with an introduction
to Interactive Computer Graphics for Design and Production, Eastern Economy Edition, Prentice Hall
of India Pvt. Ltd, New Delhi, 2005.
4. Parthasarathy N. S. and Vela Murali, “Engineering Graphics”, Oxford University, Press, New Delhi,
2015.
5. Shah M.B., and Rana B.C., “Engineering Drawing”, Pearson Education India, 2nd Edition, 2009.
6. Venugopal K. and Prabhu Raja V., “Engineering Graphics", New Age International (P) Limited, 2008.
PHYSICS LABORATORY
OBJECTIVE:
The student should be able to:
• Outlines numerous investigations to check the understanding of fundamental physics
principles used in optics, thermal physics, and liquid and matter properties.
TOTAL: 30 PERIODS
OUTCOMES:
At the end of the course, the students will be able to:
CO1: Apply the principle of elasticity vs Young‘s modulus & rigidity modulus of
Engineering materials.
CO2: Apply the principle elasticity in determining compressibility of liquids using
ultrasonic waves.
CO3: Apply the principle of optics in fiber optical communication.
CO4: Apply thermal properties of various insulating materials in engineering applications.
CO5: Use the basic instruments like vernier caliper, micrometer and microscope for
various basic measurements.
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
1 3 2 3 1 1 - - - - - - - - - -
2 3 3 2 1 1 - - - - - - - - - -
3 3 2 3 1 1 - - - - - - - - - -
4 3 3 2 1 1 - - - - - - - - - -
5 3 2 3 1 1 - - - - - - - - - -
AVG 3 2.4 2.6 1 1 - - - - - - - - - -
1 - low, 2 - medium, 3 - high, ‘-' - no correlation
CHEMISTRY LABORATORY
COURSE OBJECTIVES:
To inculcate experimental skills to test basic understanding of water quality parameters,
such as, acidity, alkalinity, hardness, DO, chloride and copper.
To induce the students to familiarize with electroanalytical techniques such as, pH
metry, potentiometry and conductometry in the determination of impurities in aqueous
solutions.
To demonstrate the analysis of metals and alloys.
To demonstrate the synthesis of nanoparticles.
List of Experiments (Any 7 experiments to be conducted)
CO1 : To analyse the quality of water samples with respect to their acidity, alkalinity,
hardness and DO.
CO2: To determine the amount of metal ions through volumetric and spectroscopic
techniques.
CO3:To analyse and determine the composition of alloys.
CO4:To learn simple method of synthesis of nanoparticles.
CO5: To quantitatively analyse the impurities in solution by electro analytical techniques.
TEXT BOOKS :
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
1 3 - 1 - - 2 2 - - - - 2 - - -
2 3 1 2 - - 1 2 - - - - 1 - - -
3 3 2 1 1 - - 1 - - - - - - - -
4 2 1 2 - - 2 2 - - - - - - - -
5 2 1 2 - 1 2 2 - - - - 1 - - -
Avg. 2.6 1.3 1.6 1 1 1.4 1.8 - - - - 1.3 - - -
1 - low, 2 - medium, 3 - high, ‘-' - no correlation
Learning Outcomes:
At the end of the course, learners will be able
To listen and comprehend complex academic texts
To speak fluently and accurately in formal and informal communicative contexts
To express their opinions effectively in both oral and written medium of communication
Assessment Pattern
End Semester ONLY listening and Reading will be conducted online, and Speaking and Writing offlin
COURSE OBJECTIVES:
To improve the communicative competence of learners
To learn to use basic grammatic structures in suitable contexts
To acquire lexical competence and use them appropriately in a sentence
and understandtheir meaning in a text
To help learners use language effectively in professional contexts
To develop learners’ ability to read and write complex texts, summaries,
articles, blogs,definitions, essays and user manuals.
UNIT I INTRODUCTION TO EFFECTIVE COMMUNICATION 1
What is effective communication? (Explain using activities) Why is communication critical for excellence
during study, research and work? What are the seven C’s of effective communication? What are key
language skills?
What is effective listening? What does it involve? What is effective speaking? What does it mean to be an
excellent reader? What should you be able to do? What is effective writing? How does one develop
language and communication skills? What does the course focus on? How are communication and
language skills going to be enhanced during this course? What do you as a learner need to do to enhance
your English language and communication skills to get the best out of this course?
UNIT V EXPRESSION 9
Reading – Reading editorials; and Opinion Blogs; Writing – Essay Writing (Descriptive or narrative).
Grammar – Future Tenses, Punctuation; Negation (Statements & Questions); and Simple,
Compound & Complex Sentences. Vocabulary - Cause & Effect Expressions – Content vs Function words.
TOTAL : 45 PERIODS
COURSE OUTCOMES :
At the end of the course, learners will be able
CO1:To use appropriate words in a professional context
CO2:To gain understanding of basic grammatic structures and use them in right context.
CO3:To read and infer the denotative and connotative meanings of technical texts
CO4:To write definitions, descriptions, narrations and essays on various topics
TEXT BOOKS :
1. English for Engineers & Technologists Orient Blackswan Private Ltd. Department of English, Anna
University, (2020 edition)
2. English for Science & Technology Cambridge University Press, 2021.
Authored by Dr. Veena Selvam, Dr. Sujatha Priyadarshini, Dr. Deepa Mary Francis, Dr. KN. Shoba,
and Dr. Lourdes Joevani, Department of English, Anna University.
REFERENCES:
1.Technical Communication – Principles And Practices By Meenakshi Raman & Sangeeta Sharma, Oxford
Univ. Press, 2016, New Delhi.
2.A Course Book On Technical English By Lakshminarayanan, Scitech Publications (India) Pvt. Ltd.
3.English For Technical Communication (With CD) By Aysha Viswamohan, Mcgraw Hill Education,
ISBN : 0070264244.
4. Effective Communication Skill, Kulbhusan Kumar, RS Salaria, Khanna
Publishing House. 5.Learning to Communicate – Dr. V. Chellammal, Allied Publishing
House, New Delhi,2003.
ASSESSMENT PATTERN
Two internal assessments and an end semester examination to test students’ reading and writing skills
along with their grammatical and lexical competence.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 1 1 1 1 1 3 3 3 1 3 - 3 - - -
2 1 1 1 1 1 3 3 3 1 3 - 3 - - -
3 2 3 2 3 2 3 3 3 2 3 3 3 - - -
4 2 3 2 3 2 3 3 3 2 3 3 3 - - -
5 2 3 3 3 - 3 3 3 2 3 - 3 - - -
AV 1.6 2.2 1.8 2. 1.5 3 3 3 1.6 3 3 3 - - -
g. 2
CO-PO & PSO MAPPING
திழரும் ததொழில்நுட்பமும்
HS23203 L T P C
1 0 0 1
தெக்ஸ்ட்-கம்-குமிப்பு
1. தநழமக யபநளறு – நக்களும் ண் யளடும் – கக.கக. ிள்
2. கணிித்தநழழ் – மூயர்இ. சுந்தபம். (யிகடன் ிபசுபம்).
3. கவ மடி – யக தழக்கபனில் சங்கநகள கப கரிகம்
TEXT-CUM-REFERENCE BOOKS
1. Social Life of Tamils (Dr.K.K.Pillay) A joint publication of TNTB & ESC and RMRL – (in print)
2. Social Life of the Tamils – The Classical Period (Dr.S.Singaravelu) (Published by:
International Institute of Tamil Studies
3. Historical Heritage of the Tamils (Dr.S.V.Subatamanian, Dr.K.D. Thirunavukkarasu) (Published by:
International Institute of Tamil Studies).
4. The Contributions of the Tamils to Indian Culture (Dr.M.Valarmathi) (Published by: International
Institute of Tamil Studies.)
5. Keeladi – ‘Sangam City C ivilization on the banks of river Vaigai’ (Jointly Published by:
Department ofArchaeology & Tamil Nadu Text Book and Educational Services Corporation,
Tamil Nadu)
L T P C
4 0 0 4
L T PC
3003
COURSE OBJECTIVES:
To impart knowledge in the basics of working principles and application of electrical machines
Construction and Working principle- DC Separately and Self excited Generators, EMF equation, Types
and Applications. Working Principle of DC motors, Torque Equation, Types and
Applications. Construction, Working principle and Applications of Transformer
Review of number systems, binary codes, error detection and correction codes, Combinational logic –
representation of logic functions-SOP and POS forms, K-map representations – minimization using K
maps (Simple Problems only)
Functional elements of an instrument, Standards and calibration, Operating Principle, types -Moving
Coil and Moving Iron meters, Measurement of three phase power, Energy Meter, Instrument
Transformers-CT and PT, DSO- Block diagram- Data acquisition.
COURSE OUTCOMES:
CO1: Students can able to compute the electric circuit parameters for simple problems
CO2: Students can able to understand the working principle and applications of electrical machines
CO3: Students can able to analyze the characteristics of analog electronic devices
CO4: Students can able to understand the basic concepts of digital electronics
CO5: Students can able to understand the operating principles of measuring instruments
CO2 2 2 2 2 2
CO3 2 2 2 2 2
CO4 2 2 2 2 2
CO5 2 2 2 2 2
REFERENCES:
1.N.P. Bali and Manish Goyal, A text book of Engineering Mathematics, Laxmi
Publications, Reprint, 2008.
2. Greenberg M.D., “Advanced Engineering Mathematics”, Pearson Education 2nd
Edition, 5th Reprint, Delhi.
3. Jain R. K. and Iyengar S.R.K., “Advance Engineering Mathematics”, Narosa Publications, 5th
Edition, New Delhi, 2017.
4. Peter V.O’Neil, “Advance Engineering Mathematics”, Cengage Learning India Pvt
Ltd, 7th Edition, New Delhi, 2012.
5. Ramana B. V., “Higher Engineering Mathematics”, Tata Mcgraw Hill Co. Ltd., 11th
Reprint, New Delhi, 2010.
COURSE OBJECTIVES:
• To understand the constructs of C Language.
• To develop C Programs using basic programming constructs
• To develop C programs using arrays and strings
• To develop modular applications in C using functions
• To develop applications in C using pointers and structures
• To do input/output and file handling in C
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1: Demonstrate knowledge on C Programming constructs
CO2: Develop simple applications in C using basic constructs
CO3: Design and implement applications using arrays and strings
CO4: Develop and implement modular applications in C using functions.
CO5: Develop applications in C using structures and pointers.
CO6: Design applications using sequential and random access file processing.
TOTAL : 45 PERIODS
TEXT BOOKS:
1. ReemaThareja, “Programming in C”, Oxford University Press, Second Edition, 2016.
2. Kernighan, B.W and Ritchie,D.M, “The C Programming language”,
Second Edition, Pearson Education, 2015.
REFERENCES:
1. Paul Deitel and Harvey Deitel, “C How to Program with an Introduction to C++”,
Eighth edition, Pearson Education, 2018.
2. Yashwant Kanetkar, Let us C, 17th Edition, BPB Publications, 2020.
3. Byron S. Gottfried, “Schaum’s Outline of Theory and Problems of
Programming with C”,McGraw-Hill Education, 1996.
4. Pradip Dey, Manas Ghosh, “Computer Fundamentals and Programming in C”, Second
5. Edition, Oxford University Press, 2013.
6. Anita Goel and Ajay Mittal, “Computer Fundamentals and Programming in
C”, 1stEdition, Pearson Education, 2013.
COURSE OBJECTIVES:
The main learning objective of this course is to provide hands on training to the students in:
1. Drawing pipe line plan; laying and connecting various pipe fittings used in common household
plumbing work; Sawing; planing; making joints in wood materials used in common household wood
work.
2. Wiring various electrical joints in common household electrical wire work.
3. Welding various joints in steel plates using arc welding work; Machining various simple processes like
turning, drilling, tapping in parts; Assembling simple mechanical assembly of common household
equipments; Making a tray out of metal sheet using sheet metal work.
4. Soldering and testing simple electronic circuits; Assembling and testing simple electronic components
on PCB.
PLUMBING WORK:
a) Connecting various basic pipe fittings like valves, taps, coupling, unions, reducers,
elbows and other components which are commonly used in household.
b) Preparing plumbing line sketches.
c) Laying pipe connection to the suction side of a pump
d) Laying pipe connection to the delivery side of a pump.
e) Connecting pipes of different materials: Metal, plastic and flexible pipes used in
household appliances.
WOOD WORK:
a) Sawing,
b) Planing and
c) Making joints like T-Joint, Mortise joint and Tenon joint and Dovetail joint.
WOOD WORK STUDY:
a) Studying joints in door panels and wooden furniture
b) Studying common industrial trusses using models.
COURSE OUTCOMES:
Upon completion of this course, the students will be able to:
1. Draw pipe line plan; lay and connect various pipe fittings used in common household plumbing work;
Saw; plan; make joints in wood materials used in common household wood work.
2. Weld various joints in steel plates using arc welding work; Machine various simple processes like
turning, drilling, tapping in parts; Assemble simple mechanical assembly ofcommon household
equipments; Make a tray out of metal sheet using sheet metal work.
3. Wire various electrical joints in common household electrical wire work.
4. Solder and test simple electronic circuits.
COURSE OBJECTIVES:
• To familiarise with C programming constructs.
• To develop programs in C using basic constructs.
• To develop programs in C using arrays.
• To develop applications in C using strings, pointers, functions.
• To develop applications in C using structures.
• To develop applications in C using file processing.
LIST OF EXPERIMENTS:
Note: The lab instructor is expected to design problems based on the topics listed. The
Examination shall not be restricted to the sample experiments designed.
1. I/O statements, operators, expressions
2. decision-making constructs: if-else, goto, switch-case, break-continue
3. Loops: for, while, do-while
4. Arrays: 1D and 2D, Multi-dimensional arrays, traversal
5. Strings: operations
6. Functions: call, return, passing parameters by (value, reference), passing arrays to
function. 7. Recursion
8. Pointers: Pointers to functions, Arrays,Strings, Pointers to Pointers, Array of Pointers
9. Structures: Nested Structures, Pointers to Structures, Arrays of Structures and Unions.
10. Files: reading and writing, File pointers, file operations, random access, processor
directives.
TOTAL: 60 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1: Demonstrate knowledge on C programming constructs.
CO2: Develop programs in C using basic constructs.
CO3: Develop programs in C using arrays.
CO4: Develop applications in C using strings, pointers, functions.
CO5: Develop applications in C using structures.
CO6: Develop applications in C using file processing.
TEXT BOOKS:
1. ReemaThareja, “Programming in C”, Oxford University Press, Second Edition, 2016.
2. Kernighan, B.W and Ritchie,D.M, “The C Programming language”, Second Edition,
Pearson Education, 2015.
Curriculum and Syllabus | B.E - CSE | R2023 45
Department of CSE, PEC
REFERENCES:
1. Paul Deitel and Harvey Deitel, “C How to Program with an Introduction to
C++”, Eighth edition, Pearson Education, 2018.
2. Yashwant Kanetkar, Let us C, 17th Edition, BPB Publications, 2020.
3. Byron S. Gottfried, "Schaum's Outline of Theory and Problems of
Programming with C", McGraw-Hill Education, 1996.
4. Pradip Dey, Manas Ghosh, “Computer Fundamentals and Programming in C”, Second
5. Edition, Oxford University Press, 2013.
6. Anita Goel and Ajay Mittal, “Computer Fundamentals and Programming
in C”, 1stEdition, Pearson Education, 2013.
L T P C
4 0 0 4
COURSE OBJECTIVES:
To extend student’s logical and mathematical maturity and ability to deal with abstraction
To introduce most of the basic terminologies used in computer science courses and
application of ideas to solve practical problems
To understand the basic concepts of combinatorics and graph theory
To familiarize the applications of algebraic structures
To understand the concepts and significance of lattices and boolean algebra which are
widely used in computer science and engineering.
Mathematical induction – Strong induction and well ordering – The basics of counting – The
pigeonhole principle – Permutations and combinations – Recurrence relations – Solving linear
recurrence relations – Generating functions – Inclusion and exclusion principle and its
applications.
Graphs and graph models – Graph terminology and special types of graphs – Matrix
representation of graphs and graph isomorphism – Connectivity – Euler and Hamilton paths.
TOTAL: 60 PERIODS
COURSE OUTCOMES:
TEXT BOOKS:
1. Rosen. K.H., "Discrete Mathematics and its Applications", 7th Edition, Tata McGrawHill
Pub. Co. Ltd., New Delhi, Special Indian Edition, 2017
2. Tremblay. J.P. and Manohar. R, "Discrete Mathematical Structures with Applications to
Computer Science", Tata McGraw Hill Pub. Co. Ltd, New Delhi, 30th Reprint, 2011.
REFERENCES:
1. Grimaldi. R.P. "Discrete and Combinatorial Mathematics: An Applied Introduction"5 th
Edition, Pearson Education Asia, Delhi, 2013.
2. Koshy. T. "Discrete Mathematics with Applications", Elsevier Publications, 2006
3. Lipschutz. S. and Mark Lipson., "Discrete Mathematics", Schaum’s Outlines, Tata
McGrawHill Pub. Co. Ltd., New Delhi, 3rd Edition, 2010.
COURSE OBJECTIVES:
To analyze and design combinational circuits.
To analyze and design sequential circuits
To understand the basic structure and operation of a digital computer.
To study the design of data path unit, control unit for processor and to familiarize with
the hazards.
To understand the concept of various memories and I/O interfacing.
UNIT I: Combinational Logic 9
Combinational Circuits – Karnaugh Map - Analysis and Design Procedures – Binary Adder
–Subtractor – Decimal Adder - Magnitude Comparator – Decoder – Encoder – Multiplexers -
Demultiplexers
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1 : Design various combinational digital circuits using logic gates
CO2 : Design sequential circuits and analyze the design procedures
CO3 : State the fundamentals of computer systems and analyze the execution of an
instruction
CO4 : Analyze different types of control design and identify hazards
CO5 : Identify the characteristics of various memory systems and I/O communication
TEXT BOOKS:
1. M. Morris Mano, Michael D. Ciletti, “Digital Design : With an Introduction to the Verilog
HDL,VHDL, and System Verilog”, Sixth Edition, Pearson Education, 2018.
2. David A. Patterson, John L. Hennessy, “Computer Organization and Design, The
Hardware/Software Interface”, Sixth Edition, Morgan Kaufmann/Elsevier, 2020.
REFERENCES:
1. Carl Hamacher, Zvonko Vranesic, Safwat Zaky, Naraig Manjikian, “Computer
Organization and Embedded Systems”, Sixth Edition, Tata McGraw-Hill, 2012.
2. William Stallings, “Computer Organization and Architecture – Designing for
Performance”,
Tenth Edition, Pearson Education, 2016.
3. M. Morris Mano, “Digital Logic and Computer Design”, Pearson Education, 2016.
COURSE OBJECTIVES:
UNIT 1 List 9
Abstract Data Types (ADTs) – List ADT – Array-based implementation – Linked list
implementation – Singly linked lists – Circularly linked lists – Doubly-linked lists – Applications
of lists – Polynomial ADT – Radix Sort – Multilists.
Tree ADT – Tree Traversals - Binary Tree ADT – Expression trees – Binary Search Tree ADT –
AVL Trees – Priority Queue (Heaps) – Binary Heap.
Searching – Linear Search – Binary Search. Sorting – Bubble sort – Selection sort – Insertion
sort – Shell sort –. Merge Sort – Hashing – Hash Functions – Separate Chaining – Open
Addressing –Rehashing – Extendible Hashing.
COURSE OUTCOMES:
TEXT BOOKS
1. Mark Allen Weiss, Data Structures and Algorithm Analysis in C, 2nd Edition, Pearson
Education, 2005.
1. Kamthane, Introduction to Data Structures in C, 1st Edition, Pearson Education, 2007
REFERENCES
1. Langsam, Augenstein and Tanenbaum, Data Structures Using C and C++, 2nd Edition,
Pearson Education, 2015.
2. Thomas H. Cormen, Charles E. Leiserson, Ronald L.Rivest, Clifford Stein, Introduction
to Algorithms", Fourth Edition, Mcgraw Hill/ MIT Press, 2022.
3. Alfred V. Aho, Jeffrey D. Ullman,John E. Hopcroft ,Data Structures and Algorithms, 1st
edition, Pearson, 2002.
4. Kruse, Data Structures and Program Design in C, 2nd Edition, Pearson Education, 2006.
Delhi, 2015
REFERENCE:
1. Cay S. Horstmann, “Core Java Fundamentals”, Volume 1, 11 th Edition, Prentice Hall,
2018.
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Understand the fundamentalsof pythonprogramming
CO2: Use the Python Libraries for Data Manipulation.
CO3: Define the data science process.
CO4: understand different types of data description for data science process
CO5: Gain knowledge on relationships between data
TOTAL:45 PERIODS
TEXT BOOKS
1.Allen B. Downey, “Think Python: How to Think like a Computer Scientist”,2nd Edition,
O’Reilly Publishers, 2016.
2.Jake VanderPlas, “Python Data Science Handbook”, O’Reilly, 2016. (Units II)
3.David Cielen, Arno D. B. Meysman, and Mohamed Ali, “Introducing Data Science”, Manning
Publications, 2016. (Unit III)
4. Robert S. Witte and John S. Witte, “Statistics”, Eleventh Edition, Wiley Publications, 2017.
(Units IV and V)
REFERENCES:
1. Allen B. Downey, “Think Stats: Exploratory Data Analysis in Python”, Green Tea Press,2014
2. Paul Deitel and Harvey Deitel, “Python for Programmers”, Pearson Education, 1st
Edition, 2021.
COURSE OBJECTIVES:
LIST OF EXERCISES:
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Implement Abstract datatypes for list.
CO2: Implement applications using Stacks and Linked lists
CO3: Implement Binary Search tree and AVL tree operations.
CO4: Implement graph representation and solve real world applications.
CO5: Implementing the various searching and sorting algorithms.
COURSE OBJECTIVES:
LIST OF EXPERIMENTS:
1. Download, install and explore the features of NumPy, SciPy, Jupyter, Statsmodels and Pandas
packages.
2. Working with simple programs on python
3.Working with Numpy arrays
4. Working with Pandas data frames
5. Reading data from text files, Excel and the web and exploring various commands for doing
descriptive analytics on the Iris data set.
6. Use the diabetes data set from UCI and Pima Indians Diabetes data set for performing the
following:
a. Univariate analysis: Frequency, Mean, Median, Mode, Variance, Standard Deviation,
Skewness and Kurtosis.
b. Bivariate analysis: Linear and logistic regression modeling
c. Multiple Regression analysis
d. Also compare the results of the above analysis for the two data sets.
7. Apply and explore various plotting functions on UCI data sets.
a. Normal curves
b. Density and contour plots
c. Correlation and scatter plots
d. Histograms
e. Three dimensional plotting
8. Visualizing Geographic Data with Basemap
TOTAL: 60 PERIODS
COURSE OUTCOMES:
59
Curriculum and Syllabus | B.E. - CSE | R023
Department of CSE, PEC
Transaction Concepts – ACID Properties – Schedules – Serializability – Transaction support in SQL - Need for
Concurrency – Concurrency control –Two Phase Locking- Timestamp – Multiversion – Validation and Snapshot
isolation– Multiple Granularity locking – Deadlock Handling – Recovery Concepts – Recovery based on
deferred and immediate update – Shadow paging – ARIES Algorithm
UNIT IV IMPLEMENTATION TECHNIQUES 9
RAID – File Organization – Organization of Records in Files – Data dictionary Storage – Column Oriented
Storage– Indexing and Hashing –Ordered Indices – B+ tree Index Files – B tree Index Files – Static Hashing –
Dynamic Hashing – Query Processing Overview – Algorithms for Selection, Sorting and join operations – Query
optimization using Heuristics - Cost Estimation.
UNIT V ADVANCED TOPICS 9
Distributed Databases: Architecture, Data Storage, Transaction Processing, Query processing and optimization
– NOSQL Databases: Introduction – CAP Theorem – Document Based systems – Key value Stores – Column
Based Systems – Graph Databases- Database Security: Security issues – Access control based on privileges –
Role Based access control – SQL Injection – Statistical Database security – Flow control – Encryption and
Public Key infrastructures – Challenges
TOTAL PERIODS:45
COURSE OUTCOMES:
Upon completion of this course, the students will be able to
CO1: Construct SQL Queries using relational algebra
CO2: Design database using ER model and normalize the database
CO3: Construct queries to handle transaction processing and maintain consistency of the database
CO4: Compare and contrast various indexing strategies and apply the knowledge to tune theperformance of the
database
CO5: Appraise how advanced databases differ from Relational Databases and find a suitable database for the
given requirement.
TEXT BOOKS:
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, “Database System Concepts”, Seventh
REFERENCES:
1. C.J.Date, A.Kannan, S.Swamynathan, “An Introduction to Database Systems”, Eighth Edition,Pearson
Education, 2006.
COURSE OBJECTIVES:
To understand the concept of layering in networks.
To know the functions of protocols of each layer of TCP/IP protocol suite.
To visualize the end-to-end flow of information.
To learn the functions of network layer and the various routing protocols
To familiarize the functions and protocols of the Transport layer
UNIT IV ROUTING
7
Routing and protocols: Unicast routing - Distance Vector Routing - RIP - Link State Routing – OSPF-Path-vector
routing - BGP - Multicast Routing: DVMRP – PIM.
REFERENCES:
1. Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems Approach, Fifth Edition,
Morgan Kaufmann Publishers Inc., 2012.
2. William Stallings, Data and Computer Communications, Tenth Edition, Pearson Education,2013.
3. Nader F. Mir, Computer and Communication Networks, Second Edition, Prentice Hall, 2014.
4. Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open SourceApproach”, McGraw
Hill, 2012.
COURSE OBJECTIVES:
Introduction: Concept of Operating Systems (OS), Generations of OS, Types of OS, OS Structures,
OS Services, User Operating System Interface, Interrupt handling and System Calls, Design and
Implementation - Structuring methods.
Memory Management: Basic concept, Logical and Physical address maps, Memory allocation:
Contiguous Memory allocation – Fixed and variable partition– Internal and External fragmentation
and Compaction. Virtual Memory: Basics of Virtual Memory – Hardware and control structures
– Locality of reference, Page allocation, Partitioning, Paging, Page fault, Working Set,
Segmentation, Demand paging, Page Replacement algorithms: Optimal, First in First Out (FIFO),
Second Chance (SC), Not recently used (NRU) and Least Recently used (LRU).
Mass Storage system – Disk Structure - Disk Scheduling and Management; File-System Interface
- File concept - Access methods - Directory Structure - Directory organization - File system
mounting - File Sharing and Protection; File System Implementation - File System Structure –
Directory implementation - Allocation Methods - Free Space Management; I/O Systems – I/O
Hardware, Application I/O interface, Kernel I/O subsystem.
Virtual Machines – History, Benefits and Features, Building Blocks, Types of Virtual Machines
and their Implementations, Virtualization and Operating-System Components; Mobile OS - iOS
and Android.
TOTAL:45 PERIODS
30 PERIODS
PRACTICAL EXERCISES:
1. Illustrate UNIX commands and Shell Programming
2. Process Management using System Calls : Fork, Exit, Getpid, Wait, Close
3. Write C programs to implement the various CPU Scheduling Algorithms
4. Implement mutual exclusion by Semaphore
5. Write C programs to avoid Deadlock using Banker's Algorithm
6. Write C program to implement Threading
7. Implement the paging Technique using C program
8. Write C programs to implement the various Page Replacement Algorithms
9. Write C programs to Implement the various File Organization Techniques
10. Write C programs for the implementation of various disk scheduling algorithms
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1 : Analyze various scheduling algorithms and process synchronization.
CO2 : Explain deadlock prevention and avoidance algorithms.
CO3 : Compare and contrast various memory management schemes.
CO4 : Explain the functionality of file systems, I/O systems, and Virtualization
CO5 : Compare iOS and Android Operating Systems.
TOTAL:75 PERIODS
TEXT BOOKS:
1. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating System Concepts”, 10 th
Edition, John Wiley and Sons Inc., 2018.
2. Andrew S Tanenbaum, "Modern Operating Systems", Pearson, 5 th Edition, 2022 New Delhi.
REFERENCES:
1. Ramaz Elmasri, A. Gil Carrick, David Levine, “Operating Systems – A Spiral Approach”,
Tata McGraw Hill Edition, 2010.
2. William Stallings, "Operating Systems: Internals and Design Principles”, 7 th Edition, Prentice
Hall, 2018.
3. Achyut S.Godbole, Atul Kahate, “Operating Systems”, McGraw Hill Education, 2016.
CS23404 ALGORITHMS L T P C
3 0 2 4
COURSE OBJECTIVES:
To understand and apply the algorithm analysis techniques on searching and sorting
algorithms
To critically analyze the efficiency of graph algorithms
To understand different algorithm design techniques
To solve programming problems using state space tree
To understand the concepts behind NP Completeness, Approximation algorithms and
randomized algorithms.
UNIT I INTRODUCTION 9
Algorithm analysis: Time and space complexity - Asymptotic Notations and its properties Best
case, Worst case and average case analysis – Recurrence relation: substitution method - Lower
bounds – searching: linear search, binary search and Interpolation Search, Pattern search: The
naïve string-matching algorithm - Rabin-Karp algorithm - Knuth-Morris-Pratt algorithm. Sorting:
Insertion sort – heap sort
4. Sort a given set of elements using the Insertion sort and Heap sort methods and determine
the time required to sort the elements. Repeat the experiment for different values of n, the
number of elements in the list to be sorted and plot a graph of the time taken versus n.
Graph Algorithms
1. Develop a program to implement graph traversal using Breadth First Search
2. Develop a program to implement graph traversal using Depth First Search
3. From a given vertex in a weighted connected graph, develop a program to find the shortest
paths to other vertices using Dijkstra’s algorithm.
4. Find the minimum cost spanning tree of a given undirected graph using Prim’s algorithm.
5. Implement Floyd’s algorithm for the All-Pairs- Shortest-Paths problem.
6. Compute the transitive closure of a given directed graph using Warshall's algorithm.
Algorithm Design Techniques
1. Develop a program to find out the maximum and minimum numbers in a given list of n
numbers using the divide and conquer technique.
2. Implement Merge sort and Quick sort methods to sort an array of elements and determine
the time required to sort. Repeat the experiment for different values of n, the number of
elements in the list to be sorted and plot a graph of the time taken versus n.
COURSE OBJECTIVES:
To understand foundations of computation including automata theory
To construct models of regular expressions and languages.
To design context free grammar and push down automata
To understand Turing machines and their capability
To understand Undecidability and NP class problems
Need for automata theory - Introduction to formal proof – Finite Automata (FA) – Deterministic Finite
Automata (DFA) – Non-deterministic Finite Automata (NFA) – Equivalence between NFA and DFA-
Finite Automata with Epsilon transitions – Equivalence of NFA and DFA- Equivalence of NFAs with
and without ε-moves- Conversion of NFA into DFA – Minimization of DFAs.
Regular expression – Regular Languages- Equivalence of Finite Automata and regular expressions
Proving languages to be not regular (Pumping Lemma) – Closure properties of regular languages.
Types of Grammar - Chomsky‘s hierarchy of languages -Context-Free Grammar (CFG) and Languages
– Derivations and Parse trees – Ambiguity in grammars and languages – Push Down Automata (PDA):
Definition – Moves - Instantaneous descriptions -Languages of pushdown automata – Equivalence of
pushdown automata and CFG-CFG to PDA-PDA to CFG – Deterministic Pushdown Automata.
Normal forms for CFG – Simplification of CFG- Chomsky Normal Form (CNF) and Greibach Normal
Form (GNF) – Pumping lemma for CFL – Closure properties of Context Free Languages –Turing
Machine : Basic model – definition and representation – Instantaneous Description – Language
acceptance by TM – TM as Computer of Integer functions – Programming techniques for Turing
machines (subroutines).
UNIT V UNDECIDABILITY 9
Unsolvable Problems and Computable Functions –PCP-MPCP- Recursive and recursively enumerable
languages – Properties - Universal Turing machine -Tractable and Intractable problems-P and NP
completeness – Kruskal’s algorithm – Travelling Salesman Problem- 3-CNF SAT problems.
TOTAL PERIODS:45
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Construct automata theory using Finite Automata
TEXT BOOKS:
1. Hopcroft J.E., Motwani R. & Ullman J.D., "Introduction to Automata Theory, Languages
andComputations", 3rd Edition, Pearson Education, 2008.
2. John C Martin , "Introduction to Languages and the Theory of Computation", 4th
Edition,Tata McGraw Hill, 2011.
REFERENCES:
1. Harry R Lewis and Christos H Papadimitriou , "Elements of the Theory of
Computation", 2ndEdition, Prentice Hall of India, 2015.
2. Peter Linz, "An Introduction to Formal Language and Automata", 6th Edition, Jones &
Bartlett,2016.
3. K.L.P.Mishra and N.Chandrasekaran, “Theory of Computer Science: Automata
Languages andComputation”, 3rd Edition, Prentice Hall of India, 2006.
Definition, scope and importance of environment – need for public awareness. Eco-system and Energy flow–
ecological succession. Types of biodiversity: genetic, species and ecosystem diversity– values of biodiversity,
India as a mega-diversity nation – hot-spots of biodiversity – threats to biodiversity: habitat loss, poaching of
wildlife, man-wildlife conflicts – endangered and endemic species of India – conservation of biodiversity: In-
situ and ex-situ.
Development, GDP, Sustainability- concept, needs and challenges-economic, social and aspects of
sustainability-from unsustainability to sustainability-millennium development goals, and protocols - Sustainable
Development Goals-targets, indicators and intervention areas Climate change- Global, Regional and local
environmental issues and possible solutions-case studies. Concept of Carbon Credit, Carbon Footprint.
Environmental management in industry-A case study.
TOTAL: 30 PERIODS
TEXT BOOKS:
1. Anubha Kaushik and C. P. Kaushik’s “Perspectives in Environmental Studies”, 6th Edition, New Age
International Publishers ,2018.
2. Benny Joseph, ‘Environmental Science and Engineering’, Tata McGraw-Hill, New Delhi, 2016.
3. Gilbert M.Masters, ‘Introduction to Environmental Engineering and Science’, 2nd edition, Pearson
Education, 2004.
4. Allen, D. T. and Shonnard, D. R., Sustainability Engineering: Concepts, Design and Case Studies, Prentice
Hall.
5. Bradley. A.S; Adebayo, A.O., Maria, P. Engineering applications in sustainable design and development,
Cengage learning.
7. Mackenthun, K.M., Basic Concepts in Environmental Management, Lewis Publication, London, 1998.
REFERENCES:
1. R.K. Trivedi, ‘Handbook of Environmental Laws, Rules, Guidelines, Compliances and Standards’, Vol. I and
II, Enviro Media. 38.
2. Cunningham, W.P. Cooper, T.H. Gorhani, ‘Environmental Encyclopedia’, Jaico Publ., House, Mumbai,
2001.
3. Dharmendra S. Sengar, ‘Environmental law’, Prentice hall of India PVT. LTD, New Delhi, 2007.
5. Erach Bharucha “Textbook of Environmental Studies for Undergraduate Courses” Orient Blackswan Pvt.
Ltd. 2013.
CO’s-PO’s&PSO’sMAPPING
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 1 - - - 2 3 - - - - 2 - - -
2 3 2 - - - 3 3 - - - - 2 - - -
3 3 - 1 - - 2 2 - - - - 2 - - -
4 3 2 1 1 - 2 2 - - - - 2 - - -
5 3 2 1 - - 2 2 - - - - 1 - - -
Avg. 2.8 1.8 1 1 - 2.2 2.4 - - - - 1.8 - - -
LCS23401
DATABASE MANAGEMENT SYSTEMS LABORATORY L T P C
0 0 3 1.5
COURSE OBJECTIVES:
To learn and implement important commands in SQL.
To learn the usage of nested and joint queries.
To understand functions, procedures and procedural extensions of databases.
To understand design and implementation of typical database applications.
To be familiar with the use of a front end tool for GUI based application development.
LIST OF EXPERIMENTS:
1. Create a database table, add constraints (primary key, unique, check, Not null), insert rows,
update and delete rows using SQL DDL and DML commands.
2. Create a set of tables, add foreign key constraints and incorporate referential integrity.
3. Query the database tables using different ‘where’ clause conditions and also implement
aggregate functions.
4. Query the database tables and explore sub queries and simple join operations.
5. Query the database tables and explore natural, equi and outer joins.
6. Write user defined functions and stored procedures in SQL.
7. Execute complex transactions and realize DCL and TCL commands.
8. Write SQL Triggers for insert, delete, and update operations in a database table.
9. Create View and index for database tables with a large number of records.
10. Create an XML database and validate it using XML schema.
11. Create Document, column and graph based data using NOSQL database tools.
12. Implementation of DATA models in NO SQL comments
13. Develop a simple GUI based database application and incorporate all the above-
mentioned features
TOTAL: 45 PERIODS
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Create databases with different types of key constraints.
CO2: Construct simple and complex SQL queries using DML and DCL commands.
CO3: Use advanced features such as stored procedures and triggers and incorporate in GUI based application
development.
CO4: Create an XML database and validate with meta-data (XML schema).
CO5: Create and manipulate data using NOSQL database.
TOTAL:45 PERIODS
COURSE OUTCOMES:
CO1: Understand the fundamentals of networks security, security
architecture, threats and vulnerabilities
CO2: Apply the different cryptographic operations of symmetric cryptographic algorithms
CO3: Apply the different cryptographic operations of public key
cryptography
CO4: Apply the various Authentication schemes to simulate
different applications.
CO5: Understand various cyber crimes and cyber security.
TEXT BOOKS
1. William Stallings, "Cryptography and Network Security - Principles and
Practice", SeventhEdition, Pearson Education, 2017.
2.Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber crimes,
ComputerForensics and Legal Perspectives”, First Edition, Wiley India, 2011.
REFERENCES
1. Behrouz A. Ferouzan, Debdeep Mukhopadhyay, "Cryptography and Network
Security", 3rdEdition, Tata Mc Graw Hill, 2015.
2.Charles Pfleeger, Shari Pfleeger, Jonathan Margulies, "Security in Computing",
Fifth Edition, Prentice Hall, New Delhi, 2015.
45 PERIODS
COURSE OUTCOMES:
CO1: Understand the design challenges in the cloud.
CO2: Apply the concept of virtualization and its types.
CO3: Experiment with virtualization of hardware resources and Docker.
CO4: Develop and deploy services on the cloud and set up a cloud environment .Explain security
challenges in the cloud environment
CO5: Practice the concept of edge computing protocols
TEXT BOOKS
1. Kai Hwang, Geoffrey C Fox, Jack G Dongarra, “Distributed and Cloud Computing, From
Parallel Processing to the Internet of Things”, Morgan Kaufmann Publishers, 2012.
2. James Turnbull, “The Docker Book”, O’Reilly Publishers, 2014.
3. Krutz, R. L., Vines, R. D, “Cloud security. A Comprehensive Guide to Secure Cloud Computing”,
Wiley Publishing, 2010.
4. K. Anitha Kumari, G. Sudha Sadasivam, D. Dharani, M. Niranjanamurthy, Edge Computing
Fundamentals, Advances and Applications,CRC Press, 2021.
REFERENCES
1. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and Processes”,
Elsevier/Morgan Kaufmann, 2005.
2. Tim Mather, Subra Kumaraswamy, and Shahed Latif, “Cloud Security and Privacy: an
enterprise perspective on risks and compliance”, O’Reilly Media, Inc., 2009.
3. Perry Lea, IoT and Edge Computing for Architects Implementing edge and IoT systems from
sensors to clouds with communication systems, analytics, and security, 2nd Edition ,Packt Publishing,
2020.
• Show all the related information when the hot spots are clicked.
2. Create a web page with all types of Cascading style sheets.
3. Client Side Scripts for Validating Web Form Controls using DHTML.
4. Installation of Apache Tomcat web server.
5. Write programs in Java using Servlets:
● To invoke servlets from HTML forms.
● Session Tracking.
6. Write programs in Java to create three-tier applications using JSP and Databases
● For conducting on-line examination.
● For displaying student mark list. Assume that student information is available in a database
which has been stored in a database server.
7. Programs using XML – Schema – XSLT/XSL.
TOTAL:60 PERIODS
TEXTBOOKS
1. Deitel and Deitel and Nieto, Internet and World Wide Web - How to Program, Prentice Hall, 5th
Edition, 2011.
2. Jeffrey C and Jackson, Web Technologies A Computer Science Perspective, Pearson
Education, 2011.
3. Angular 6 for Enterprise-Ready Web Applications, Doguhan Uluca, 1st edition, Packt
Publishing
REFERENCES:
1. Stephen Wynkoop and John Burke “Running a Perfect Website”, QUE, 2nd Edition,1999.
2. Chris Bates, Web Programming – Building Intranet Applications, 3rd Edition, Wiley
Publications, 2009.
COURSE OBJECTIVES:
The main objectives of this course are to:
Study about uninformed and Heuristic search techniques.
Learn techniques for reasoning under uncertainty
Introduce Machine Learning and supervised learning algorithms
Study about assembling and unsupervised learning algorithms
Learn the basics of deep learning using neural networks
Backtracking Search-Game Playing-Optimal Decision in Games-Min and Max algorithm-Alpha and Beta
pruning Definition of uncertainty – Bayesian inference – naïve bayes models. Probabilistic reasoning –
Bayesian networks – exact inference in BN – approximate inference in BN – causal networks.
Introduction to machine learning – Learning Paradigms-Linear Regression Models: Least squares, single
& multiple variables, Bayesian linear regression, gradient descent, Linear Classification Models:
Discriminant function – Probabilistic discriminative model - Logistic regression, Probabilistic generative
model – Naive Bayes, Maximum margin classifier – Support vector machine, Decision Tree, Random
forests
Combining multiple learners: Model combination schemes, Voting, Ensemble Learning - bagging,
boosting, stacking, Unsupervised learning: K-means, Instance Based Learning: KNN, Gaussian mixture
models and Expectation maximization
Perceptron - Multilayer perceptron, activation functions, network training – gradient descent optimization
– stochastic gradient descent, error backpropagation, from shallow networks to deep networks –Unit
saturation (aka the vanishing gradient problem) – ReLU, hyperparameter tuning, batch normalization,
regularization, dropout.
TOTAL:45 PERIODS
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Use appropriate search algorithms for problem solving
CO2: Apply reasoning under uncertainty
CO3: Build supervised learning models
CO4: Build ensembling and unsupervised models
CO5: Build deep learning neural network models
TEXT BOOKS:
1. Stuart Russell and Peter Norvig, “Artificial Intelligence – A Modern Approach”,
FourthEdition, Pearson Education, 2021.
2. Ethem Alpaydin, “Introduction to Machine Learning”, MIT Press, Fourth Edition, 2020.
REFERENCES:
1. Dan W. Patterson, “Introduction to Artificial Intelligence and Expert Systems”, Pearson
Education,2007
2. Kevin Night, Elaine Rich, and Nair B., “Artificial Intelligence”, McGraw Hill, 2008
3. Patrick H. Winston, "Artificial Intelligence", Third Edition, Pearson Education, 2006
4. Deepak Khemani,“Artificial Intelligence”,Tata McGraw Hill Education, 2013(http://nptel.ac.in/)
5. Christopher M. Bishop, “Pattern Recognition and Machine Learning”, Springer, 2006.
6. Tom Mitchell, “Machine Learning”, McGraw Hill, 3rd Edition,1997.
7. Charu C. Aggarwal, “Data Classification Algorithms and Applications”, CRC Press, 2014
8. Mehryar Mohri, Afshin Rostamizadeh, Ameet Talwalkar, “Foundations of MachineLearning”, MIT
Press, 2012.
9. Ian Goodfellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2016
PRACTICAL EXERCISES:
1. Install Virtualbox/VMware/ Equivalent open source cloud
Workstation with different flavoursof Linux or Windows OS on
top of windows 8 and above.
2. Install a C compiler in the virtual machine created using a
virtual box and execute SimplePrograms
3. Install Google App Engine. Create a hello world app and other
simple web applications using python/java.
4. Use the GAE launcher to launch the web applications.
5. Simulate a cloud scenario using CloudSim and run a scheduling
algorithm that is not present in CloudSim.
6. Find a procedure to transfer the files from one virtual machine to another
virtual machine.
7. Install Hadoop single node cluster and run simple applications like
wordcount.
8. Creating and Executing Your First Container Using Docker.
9. Run a Container from Docker Hub
OUTCOMES:
On completion of this course, the students will be able to:
Configure various virtualization tools such as Virtual Box, VMware workstation.
Design and deploy a web application in a PaaS environment.
Learn how to simulate a cloud environment to implement new schedulers.
Install and use a generic cloud environment that can be used as a private cloud.
Manipulate large data sets in a parallel environment.
CO’s-PO’s & PSO’s MAPPING
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
1 1 3 3 1 1 1 - - 2 1 2 2 2 2
2 2 3 3 2 1 1 - - 2 1 2 2 2 3
3 2 2 2 1 1 2 - - 2 - 2 2 2 2
4 2 2 2 2 1 2 - - 3 - 3 3 3 2
5 2 2 3 2 3 2 - - 3 - 3 3 3 3
6 2 2 3 2 1 2 - - 2 1 2 2 2 2
Avg 2 2 3 2 1 2 - - 2 1 2 2 2 2
1 - low, 2 - medium, 3 - high, ‘-' - no correlation
TOTAL:60 PERIODS
UNIT I INTRODUCTION 9
Introduction to Virtual Reality and Augmented Reality – Definition – Introduction to
Trajectories and Hybrid Space-Three I’s of Virtual Reality – Virtual Reality Vs 3D Computer
Graphics – Benefits of Virtual Reality – Components of VR System – Introduction to AR-AR
Technologies-Input Devices – 3D Position Trackers – Types of Trackers – Navigation and
Manipulation Interfaces – Gesture Interfaces – Types of Gesture Input Devices – Output
Devices – Graphics Display – Human Visual System – Personal Graphics Displays – Large
Volume Displays – Sound Displays – Human Auditory System.
UNIT II VR MODELING 9
Modeling – Geometric Modeling – Virtual Object Shape – Object Visual Appearance –
Kinematics Modeling – Transformation Matrices – Object Position – Transformation
Invariants –Object Hierarchies – Viewing the 3D World – Physical Modeling – Collision
Detection – Surface Deformation – Force Computation – Force Smoothing and Mapping –
BehaviorModeling – Model Management.
UNIT IV APPLICATIONS 9
Human Factors in VR – Methodology and Terminology – VR Health and Safety Issues – VR
and Society-Medical Applications of VR – Education, Arts and Entertainment – Military VR
Applications – Emerging Applications of VR – VR Applications in Manufacturing –
Applications of VR in Robotics – Information Visualization – VR in Business – VR in
Entertainment – VR in Education.
Course objectives:
LIST OF EXPERIMENTS:
1. Study of tools like Unity, Maya, 3DS MAX, AR toolkit, Vuforia and Blender.
2. Use the primitive objects and apply various projection types by handling camera.
3. Download objects from asset store and apply various lighting and shading effects.
4. Model three dimensional objects using various modelling techniques and apply
textures over them.
5. Create three dimensional realistic scenes and develop simple virtual reality
enabled mobile applications which have limited interactivity.
6. Add audio and text special effects to the developed application.
7. Develop VR enabled applications using motion trackers and sensors incorporating
full haptic interactivity.
8. Develop AR enabled applications with interactivity like E learning environment,
Virtual walkthroughs and visualization of historic places.
9. Develop AR enabled simple applications like human anatomy visualization,
DNA/RNA structure visualization and surgery simulation.
10. Develop simple MR enabled gaming applications.
TOTAL:30 PERIODS
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1:Use the primitive objects and apply various projection types.
CO2: Create three dimensional realistic scenes and develop simple virtual reality enabled
mobile applications
CO3: Develop VR enabled applications using motion trackers and sensors.
CO4: Develop AR enabled applications
CO5:Develop simple MR enabled gaming applications
COURSE OBJECTIVES: 3 0 0 3
To learn the internal architecture and programming of an embedded processor.
To introduce interfacing I/O devices to the processor.
To introduce the evolution of the Internet of Things (IoT).
To build a small low-cost embedded and IoT system using Arduino/Raspberry Pi/ open
platform.
To apply the concept of Internet of Things in real world scenario.
45 PERIODS
REFERENCES
1. Michael J. Pont, “Embedded C”, Pearson Education, 2007.
2. Wayne Wolf, “Computers as Components: Principles of Embedded Computer System
Design”, Elsevier, 2006.
3. Andrew N Sloss, D. Symes, C. Wright, “Arm System Developer's Guide”, Morgan Kauffman/
Elsevier, 2006.
4. Arshdeep Bahga, Vijay Madisetti, “Internet of Things – A hands-on approach”, Universities
Press, 2015
COURSE OUTCOMES:
CO1: Understand emerging abstract models for Blockchain Technology
CO2: Identify major research challenges and technical gaps existing between theory
and practice in the crypto currency domain.
CO3: It provides conceptual understanding of the function of Blockchain as a method of
securing distributed ledgers, how consensus on their contents is achieved, and the
new applications that they enable.
CO4: Apply hyperledger Fabric and Ethereum platform to implement the Block
chain Application.
Total: 45 PERIODS
TEXT BOOKS :
REFERENCES:
1. Daniel Drescher, “Blockchain Basics”, First Edition, Apress, 2017.
2. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven
Goldfeder. Bitcoin and cryptocurrency technologies: a comprehensive introduction.
Princeton University Press, 2016.
3. Melanie Swan, “Blockchain: Blueprint for a New Economy”, O’Reilly, 2015
4. Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build Smart
Contracts for Ethereum and Blockchain”, Packt Publishing
5. Handbook of Research on Blockchain Technology, published by Elsevier Inc.
ISBN: 9780128198162, 2020.
UNIT V CONTROLLING 9
System and process of controlling – Budgetary and non - Budgetary control techniques –
Use of computers and IT in Management control – Productivity problems and
management – Control and performance – Direct and preventive control – Reporting.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
CO1: Upon completion of the course, students will be able to have clear
TEXT BOOKS:
REFERENCES:
1. Robert Kreitner and MamataMohapatra, “ Management”, Biztantra, 2008.
2. Stephen A. Robbins and David A. Decenzo and Mary Coulter, “Fundamentals
of Management” Pearson Education, 7th Edition, 2011.
3. Tripathy PC and Reddy PN, “Principles of Management”, Tata Mcgraw Hill,
1999.
PO’s PSO’s
CO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 - - - 1 - - - - - - 2 1 1
2 - 1 1 - - - - - - - - - 2 1 -
3 1 - 2 - - 1 - 2 - 1 1 - - 2
4 - 1 1 1 2 - - 1 2 - - - 1 1 1
5 1 - - 1 1 - - - 3 - 1 1 - 1
AVg. 1.66 1 1 1.5 1.5 1 1 1 2 3 1 1 1.5 1 1.25
1 - low, 2 - medium, 3 - high, ‘-“- no correlation
1. Install and understand Docker container, Node.js, Java and Hyperledger Fabric,
Ethereum and perform necessary software installation on local machine/create
instance on cloud to run.
2. Create and deploy a blockchain network using Hyperledger Fabric SDK for Java
Set up and initialize the channel, install and instantiate chain code, and perform
invoke and query on your blockchain network.
3. Interact with a blockchain network. Execute transactions and requests against a
blockchain network by creating an app to test the network and its rules.
4. Deploy an asset-transfer app using blockchain. Learn app development within a
Hyperledger Fabric network.
5. Use blockchain to track fitness club rewards. Build a web app that uses Hyperledger
Fabric to track and trace member rewards.
6. Car auction network: A Hello World example with Hyperledger Fabric Node SDK
and IBM Blockchain Starter Plan. Use Hyperledger Fabric to invoke chain code
while storing results and data in the starter plan
7. Creating a Crypto-currency Wallet
8. Implement Mining using block chain
9. Implement peer-to-peer using block chain
TOTAL: 30 PERIODS
COURSE OUTCOMES
At the end of this course, the students will be able to:
CO1: Understand the basics of Blockchain
CO1: Learn Different protocols and consensus algorithms in Blockchain
CO1: Learn the Blockchain implementation frameworks
CO1: Understand the Blockchain Applications
CO1: Experiment the Hyperledger Fabric, Ethereum networks
COURSE OBJECTIVES:
Gandhian values such as truth and non-violence – Comparative analysis on leaders of past and
present – Society’s interests versus self-interests - Personal Social Responsibility: Helping the
needy, charity and serving the society.
Peer pressure - Alcoholism: Ethical values, causes, impact, laws, prevention – Ill effects of
smoking - Prevention of Suicides; Sexual Health: Prevention and impact of pre-marital pregnancy
and Sexually Transmitted Diseases. Drug abuse: Abuse of different types of legal and illegal drugs:
Ethical values, causes, impact, laws and prevention.
Hacking and other cyber-crimes, Addiction to mobile phone usage, Video games and Social
networking websites.
TOTAL:45 PERIODS
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Follow sound morals and ethical values scrupulously to prove as good citizens.
TEXT BOOKS:
1. R R Gaur, R Asthana, G P Bagaria, “A Foundation Course in Human Values and
Professional Ethics”, 2019, 2nd Revised Edition, Excel Books, New Delhi.
2. Hartmann, N., “Moral Values” , 2017, United Kingdom: Taylor & Francis.
REFERENCES:
1. Rachels, James & Stuart Rachels, “The Elements of Moral Philosophy”, 9th edition, 2019,
New York: McGraw-Hill Education.
2. Blackburn, S. “Ethics: A Very Short Introduction”, 2001, Oxford University Press.
3. Dhaliwal, K.K , “Gandhian Philosophy of Ethics: A Study of Relationship between his
Presupposition and Precepts”, 2016, Writers Choice, New Delhi, India.
4. Ministry of Social Justice and Empowerment, “Magnitude of Substance Use in India”,
2019, Government of India.
5. Ministry of Home Affairs, “Accidental Deaths and Suicides in India”, 2019, Government
of India.
6. Ministry of Home Affairs, “A Handbook for Adolescents/ Students on Cyber Safety”,
2018, Government of India.
7. Build cartographic visualization for multiple datasets involving various countries of the world;
states and districts in India etc.
8. Perform EDA on Wine Quality Data Set.
9. Use a case study on a data set and apply the various EDA and visualization techniques and
present an analysis report.
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Understand the fundamentals of exploratory data analysis.
CO2: Implement the data visualization using Matplotlib.
CO3: Perform univariate data exploration and analysis.
CO4: Apply bivariate data exploration and analysis.
CO5: Use Data exploration and visualization techniques for multivariate and time series data.
TOTAL: 60 PERIODS
TEXT BOOKS:
1. Suresh Kumar Mukhiya, Usman Ahmed, “Hands-On Exploratory Data Analysis with Python”,
Packt Publishing, 2020. (Unit 1)
2. Jake Vander Plas, "Python Data Science Handbook: Essential Tools for Working with Data",
First Edition, O Reilly, 2017. (Unit 2)
3. Catherine Marsh, Jane Elliott, “Exploring Data: An Introduction to Data Analysis for Social
Scientists”, Wiley Publications, 2nd Edition, 2008. (Unit 3,4,5)
REFERENCES:
1. Eric Pimpler, Data Visualization and Exploration with R, GeoSpatial Training service, 2017.
2. Claus O. Wilke, “Fundamentals of Data Visualization”, O’reilly publications, 2019.
3. Matthew O. Ward, Georges Grinstein, Daniel Keim, “Interactive Data Visualization:
Foundations, Techniques, and Applications”, 2nd Edition, CRC press, 2015.
UNIT I INTRODUCTION 6
Introduction and basic taxonomy of recommender systems - Traditional and non-personalized
Recommender Systems - Overview of data mining methods for recommender systems- similarity
measures- Dimensionality reduction – Singular Value Decomposition (SVD)
Suggested Activities:
Suggested Activities:
• Assignment on content-based recommendation systems
• Assignment of learning user profiles
Suggested Activities:
● Practical learning – Implement collaborative filtering concepts
● Assignment of security aspects of recommender systems
Suggested Evaluation Methods:
● Quiz on collaborative filtering
● Seminar on security measures of recommender systems
Suggested Activities:
● Group Discussion on attacks and their mitigation
● Study of the impact of group attacks
● External Learning – Use of CAPTCHAs
Suggested Activities:
● Group Discussion on goals of evaluation design
● Study of accuracy metrics
TEXTBOOKS:
1. Charu C. Aggarwal, Recommender Systems: The Textbook, Springer, 2016.
2. Dietmar Jannach , Markus Zanker , Alexander Felfernig and Gerhard Friedrich ,
Recommender Systems: An Introduction, Cambridge University Press (2011), 1st ed.
3. Francesco Ricci , Lior Rokach , Bracha Shapira , Recommender Sytems Handbook, 1st ed,
Springer (2011),
4. Jure Leskovec, Anand Rajaraman, Jeffrey David Ullman, Mining of massive datasets,
3 rdedition, Cambridge University Press, 2020.
UNIT I INTRODUCTION 6
Neural Networks-Application Scope of Neural Networks-Artificial Neural Network: An Introduction-
Evolution of Neural Networks-Basic Models of Artificial Neural Network- Important Terminologies of
ANNs-Supervised Learning Network.
30 PERIODS
LAB EXPERIMENTS: 30 PERIODS
1. Implement simple vector addition in TensorFlow.
2. Implement a regression model in Keras.
3. Implement a perceptron in TensorFlow/Keras Environment.
4. Implement a Feed-Forward Network in TensorFlow/Keras.
5. Implement an Image Classifier using CNN in TensorFlow/Keras.
6. Improve the Deep learning model by fine tuning hyper parameters.
7. Implement a Transfer Learning concept in Image Classification.
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Apply Convolution Neural Network for image processing
CO2: Understand the basics of associative memory and unsupervised learning networks
CO3: Apply CNN and its variants for suitable applications
CO4: Analyze the key computations underlying deep learning and use them to build and train
deep neural networks for various tasks
CO5: Apply autoencoders and generative models for suitable applications.
TEXT BOOKS:
1. Ian Goodfellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2016.
2. Francois Chollet, “Deep Learning with Python”, Second Edition, Manning Publications,
2021.
REFERENCES:
1. Aurélien Géron, “Hands-On Machine Learning with Scikit-Learn and TensorFlow”, Oreilly,
2018.
2. Josh Patterson, Adam Gibson, “Deep Learning: A Practitioner’s Approach”, O’Reilly Media,
2017.
3. Charu C. Aggarwal, “Neural Networks and Deep Learning: A Textbook”, Springer
International Publishing, 1st Edition, 2018.
4. Learn Keras for Deep Neural Networks, Jojo Moolayil, Apress,2018
5. Deep Learning Projects Using TensorFlow 2, Vinita Silaparasetty, Apress, 2020
6. Deep Learning with Python, FRANÇOIS CHOLLET, MANNING SHELTER ISLAND,2017.
7. S Rajasekaran, G A Vijayalakshmi Pai, “Neural Networks, FuzzyLogic and Genetic
Algorithm, Synthesis and Applications”, PHI Learning, 2017.
8. Pro Deep Learning with TensorFlow, Santanu Pattanayak, Apress,2017
9. James A Freeman, David M S Kapura, “Neural Networks Algorithms, Applications, and
Programming Techniques”, Addison Wesley, 2003.
Suggested Activities
● Flipped classroom on NLP
● Implementation of Text Preprocessing using NLTK
● Implementation of TF-IDF models
Suggested
Activities
• Flipped classroom on Feature extraction of documents
• Implementation of SVM models for text classification
• External learning: Text summarization and Topic models
Suggested Activities:
• Flipped classroom on language models for QA
• Developing a knowledge-based question-answering system
• Classic QA model development
Suggested Activities:
• Flipped classroom on Speech signalprocessing
• Exploring Text normalization
• Data collection
• Implementation of TTS systems
Suggested Evaluation Methods
• Assignment on the above topics
• Quiz on wavenet, deep learning-based TTS systems
• Finding accuracy with different TTS systems
Suggested Activities:
• Flipped classroom on Speech recognition.
• Exploring Feature extraction
COURSE OUTCOMES:
On completion of the course, the students will be able to
CO1: Explain existing and emerging deep learning architectures for text and speech processing
CO2: Apply deep learning techniques for NLP tasks, language modelling and machine translation
CO3: Explain coreference and coherence for text processing
CO4: Build question-answering systems, chatbots and dialogue systems
CO5: Apply deep learning models for building speech recognition and text-to-speech systems
TEXTBOOK
1. Daniel Jurafsky and James H. Martin, “Speech and Language Processing: An Introduction
to Natural Language Processing, Computational Linguistics, and Speech Recognition”,
Third Edition, 2022.
REFERENCES:
1. Dipanjan Sarkar, “Text Analytics with Python: A Practical Real-World approach to Gaining
Actionable insights from your data”, APress,2018.
2. Tanveer Siddiqui, Tiwary U S, “Natural Language Processing and Information Retrieval”,
Oxford University Press, 2008.
3. Lawrence Rabiner, Biing-Hwang Juang, B. Yegnanarayana, “Fundamentals of Speech
Recognition” 1st Edition, Pearson, 2009.
4. Steven Bird, Ewan Klein, and Edward Loper, “Natural language processing with Python”,
O’REILLY.
30 PERIODS
LIST OF EXPERIMENTS:
Use MS-Excel and Power-BI to perform the following experiments using a Business data set, and
make presentations.
Students may be encouraged to bring their own real-time socially relevant data set.
I Cycle – MS Excel
1. Explore the features of Ms-Excel.
2. (i) Get the input from user and perform numerical operations (MAX, MIN, AVG, SUM,
SQRT, ROUND)
ii) Perform data import/export operations for different file formats.
3. Perform statistical operations - Mean, Median, Mode and Standard deviation, Variance,
Skewness, Kurtosis
4. Perform Z-test, T-test & ANOVA
5. Perform data pre-processing operations i) Handling Missing data ii) Normalization
6. Perform dimensionality reduction operation using PCA, KPCA & SVD
7. Perform bivariate and multivariate analysis on the dataset.
8. Apply and explore various plotting functions on the data set.
UNIT IV 3D RECONSTRUCTION 6
Shape from X - Active range finding - Surface representations - Point-based representations-
Volumetric representations - Model-based reconstruction - Recovering texture maps and albedosos.
Image features, Feature matching, cloning, Feature matching based image alignment
• Image segmentation using Graphcut / Grabcut
• Camera Calibration with circular grid
• Pose Estimation
• 3D Reconstruction – Creating Depth map from stereo images
• Object Detection and Tracking using Kalman Filter, Camshift
1. docs.opencv.org
2. https://opencv.org/opencv-free-course/
TOTAL : 60 PERIODS
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1:To understand basic knowledge, theories and methods in image processing and computer
vision.
CO2:To implement basic and some advanced image processing techniques in OpenCV.
CO3:To apply 2D a feature-based based image alignment, segmentation and motion estimations.
CO4:To apply 3D image reconstruction techniques
CO5:To design and develop innovative image processing and computer vision applications.
TEXT BOOKS:
1. Richard Szeliski, “Computer Vision: Algorithms and Applications”, Springer- Texts in
Computer Science, Second Edition, 2022.
2. Computer Vision: A Modern Approach, D. A. Forsyth, J. Ponce, Pearson Education, Second
Edition, 2015.
REFERENCES:
1. Richard Hartley and Andrew Zisserman, Multiple View Geometry in Computer Vision,
Second Edition, Cambridge University Press, March 2004.
2. Christopher M. Bishop; Pattern Recognition and Machine Learning, Springer, 2006
3. E. R. Davies, Computer and Machine Vision, Fourth Edition, Academic Press, 2012.
Software Requirements:
Cassandra, Hadoop, Java, Pig, Hive and HBase.
TOTAL:60 PERIODS
TEXT BOOKS:
1. Michael Minelli, Michelle Chambers, and AmbigaDhiraj, "Big Data, Big
Analytics: Emerging Business Intelligence and Analytic Trends for Today's
Businesses", Wiley,
2013.
2. Eric Sammer, "Hadoop Operations", O'Reilley, 2012.
3. Sadalage, Pramod J. “NoSQL distilled”, 2013
REFERENCES:
1. E. Capriolo, D. Wampler, and J. Rutherglen, "Programming Hive", O'Reilley, 2012.
2. Lars George, "HBase: The Definitive Guide", O'Reilley, 2011.
3. Eben Hewitt, "Cassandra: The Definitive Guide", O'Reilley, 2010.
4. Alan Gates, "Programming Pig", O'Reilley, 2011.
6. Write programs in Java to create three-tier applications using JSP and Databases
● For conducting on-line examination.
● For displaying student mark list. Assume that student information is available in a database
which has been stored in a database server.
7. Programs using XML – Schema – XSLT/XSL.
TOTAL: 60 PERIODS
TEXTBOOKS:
1. Deitel and Deitel and Nieto, Internet and World Wide Web - How to Program, Prentice Hall, 5th
Edition, 2011.
2. Jeffrey C and Jackson, Web Technologies A Computer Science Perspective, Pearson
Education, 2011.
3. Angular 6 for Enterprise-Ready Web Applications, Doguhan Uluca, 1st edition, Packt
Publishing
REFERENCES:
1. Stephen Wynkoop and John Burke “Running a Perfect Website”, QUE, 2nd Edition,1999.
2. Chris Bates, Web Programming – Building Intranet Applications, 3rd Edition, Wiley
Publications, 2009.
3. Gopalan N.P. and Akilandeswari J., “Web Technology”, Prentice Hall of India, 2011.
4. UttamK.Roy, “Web Technologies”, Oxford University Press, 2011.
5. Angular: Up and Running: Learning Angular, Step by Step, Shyam Seshadri, 1st edition,
O′Reilly
116
COURSE OUTCOMES:
CO1: Develop Native applications with GUI Components.
CO2: Develop hybrid applications with basic event handling.
CO3: Implement cross-platform applications with location and data storage capabilities.
CO4: Implement cross platform applications with basic GUI and event handling.
CO5: Develop web applications with cloud database access
30 PERIODS
6. Design and develop an android application using Apache Cordova to find and display the
current location of the user.
7. Write programs using Java to create Android application having Databases
● For a simple library application.
● For displaying books available, books lend, book reservation. Assume that student
information is available in a database which has been stored in a database server.
TOTAL:60 PERIODS
TEXT BOOKS
1. Head First Android Development, Dawn Griffiths, O’Reilly, 1st edition
2. Apache Cordova in Action, Raymond K. Camden, Manning. 2015
3. Full Stack React Native: Create beautiful mobile apps with JavaScript and React Native,
Anthony Accomazzo, Houssein Djirdeh, Sophia Shoemaker, Devin Abbott, FullStack
publishing
REFERENCES
1. Android Programming for Beginners, John Horton, Packt Publishing, 2nd Edition
2. Native Mobile Development by Shaun Lewis, Mike Dunn
3. Building Cross-Platform Mobile and Web Apps for Engineers and Scientists: An
ActiveLearning Approach, Pawan Lingras, Matt Triff, Rucha Lingras
4. Apache Cordova 4 Programming, John M Wargo, 2015
5. React Native Cookbook, Daniel Ward, Packt Publishing, 2nd Edition
118
COURSE OUTCOMES:
CO1: Exhibit cloud-design skills to build and automate business solutions using cloud technologies.
CO2: Possess Strong theoretical foundation leading to excellence and excitement towards adoption of
cloud- based services
CO3: Solve the real-world problems using Cloud services and technologies.
30 PERIODS
PRACTICAL EXCERCISES: 30 PERIODS
REFERENCES:
1. Economics of Cloud Computing by Praveen Ayyappa, LAP Lambert Academic Publishing
2. Mastering Cloud Computing Foundations and Applications Programming Rajkumar Buyya,
Christian Vechhiola, S. Thamarai Selvi
120
121
TOTAL: 60 PERIODS
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1:Build UI for user Applications
CO2:Evaluate UX design of any product or application
CO3:Demonstrate UX Skills in product development
CO4:Implement Sketching principles
CO5:Create Wireframe and Prototype
TEXT BOOKS
REFERENCES
1. Jenifer Tidwell, Charles Brewer, Aynne Valencia, “Designing Interface” 3 rd Edition , O’Reilly
2020
2. Steve Schoger, Adam Wathan “Refactoring UI”, 2018
3. Steve Krug, “Don't Make Me Think, Revisited: A Commonsense Approach to Web &
Mobile”, Third Edition, 2015
4. https://www.nngroup.com/articles/
5. https://www.interaction-design.org/literature.
CO’s-PO’s & PSO’s MAPPING
CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 1 1 3 1 - - - 3 3 2 1 3 3 1
2 2 3 1 3 2 - - - 1 2 2 2 1 2 2
3 1 3 3 2 2 - - - 2 3 1 2 1 3 3
4 1 2 3 3 1 - - - 3 2 1 3 3 3 3
5 1 2 3 2 1 - - - 2 1 1 1 3 2 2
AVg. 1.6 2.2 2.2 2.6 1.4 - - - 2.2 2.2 1.4 1.8 2.2 2.6 2.2
1 - low, 2 - medium, 3 - high, ‘-' - no correlation
122
123
COURSE OUTCOMES:
CO1: Understand the basic concepts of software testing and the need for software testing
CO2: Design Test planning and different activities involved in test planning
CO3: Design effective test cases that can uncover critical defects in the application
CO4: Carry out advanced types of testing
CO5: Automate the software testing using Selenium and TestNG
TOTAL:60 PERIODS
TEXTBOOKS
1. Yogesh Singh, “Software Testing”, Cambridge University Press, 2012
124
125
Storage, Failure to Restrict URL Access, Tools: Comodo, OpenVAS, Nexpose, Nikto, Burp Suite,
etc.
30 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
1. Install wireshark and explore the various protocols
a. Analyze the difference between HTTP vs HTTPS
b. Analyze the various security mechanisms embedded with different protocols.
2. Identify the vulnerabilities using OWASP ZAP tool
3. Create simple REST API using python for following operation
GET
a. PUSH
b. POST
c. DELETE
4. Install Burp Suite to do following vulnerabilities:
SQL injection
a. cross-site scripting (XSS)
5. Attack the website using Social Engineering method
COURSE OUTCOMES:
CO1: Understanding the basic concepts of web application security and the need for it
CO2: Be acquainted with the process for secure development and deployment of web applications
CO3: Acquire the skill to design and develop Secure Web Applications that use Secure APIs
CO4: Be able to get the importance of carrying out vulnerability assessment and penetration testing
CO5: Acquire the skill to think like a hacker and to use hackers tool sets
TOTAL :60 PERIODS
TEXT BOOKS
1. Andrew Hoffman, Web Application Security: Exploitation and Countermeasures for Modern
Web Applications, First Edition, 2020, O’Reilly Media, Inc.
2. Bryan Sullivan, Vincent Liu, Web Application Security: A Beginners Guide, 2012, The McGraw-
Hill Companies.
3. Neil Madden, API Security in Action, 2020, Manning Publications Co., NY, USA.
REFERENCES
1. Michael Cross, Developer’s Guide to Web Application Security, 2007, Syngress Publishing,
Inc.
2. Ravi Das and Greg Johnson, Testing and Securing Web Applications, 2021, Taylor & Francis
Group, LLC.
3. Prabath Siriwardena, Advanced API Security, 2020, Apress Media LLC, USA.
4. Malcom McDonald, Web Security for Developers, 2020, No Starch Press, Inc.
5. Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, and Terron Williams
Grey Hat Hacking: The Ethical Hacker’s Handbook, Third Edition, 2011, The McGraw-Hill
Companies.
126
127
PCS2314 DEVOPS L T PC
2 0 2 3
COURSE OBJECTIVES:
• To introduce DevOps terminology, definition & concepts
• To understand the different Version control tools like Git, Mercurial
• To understand the concepts of Continuous Integration/ Continuous Testing/ Continuous
Deployment)
• To understand Configuration management using Ansible
• Illustrate the benefits and drive the adoption of cloud-based Devops tools to solve real
world problems
COURSE OUTCOMES:
CO1: Understand different actions performed through Version control tools like Git
CO2: Perform Continuous Integration and Continuous Testing and Continuous Deployment
using Jenkins by building and automating test cases using Maven & Gradle.
CO3: Ability to Perform Automated Continuous Deployment
CO4: Ability to do configuration management using Ansible
CO5: Understand to leverage Cloud-based DevOps tools using Azure DevOps
128
1. Roberto Vormittag, “A Practical Guide to Git and GitHub for Windows Users: From
Beginner to Expert in Easy Step-By-Step Exercises”, Second Edition, Kindle Edition,
2016.
2 . Jason Cannon, “Linux for Beginners: An Introduction to the Linux Operating
System and Command Line”, Kindle Edition, 2014
REFERENCES
1. Hands-On Azure Devops: Cicd Implementation For Mobile, Hybrid, And Web
Applications Using Azure Devops And Microsoft Azure: CICD Implementation for ...
DevOps and Microsoft Azure (English Edition) Paperback – 1 January 2020 by
Mitesh Soni
2. Jeff Geerling, “Ansible for DevOps: Server and configuration management for
humans”, First Edition, 2015.
3 . David Johnson, “Ansible for DevOps: Everything You Need to Know to Use
Ansible for DevOps”, Second Edition, 2016.
4. Mariot Tsitoara, “Ansible 6. Beginning Git and GitHub: A Comprehensive Guide
Version Control, Project Management, and Teamwork for the New Developer”,
Second Edition, 2019.
5. https://www.jenkins.io/user-handbook.pdf
6. https://maven.apache.org/guides/getting-started/
129
PCS2315 VIRTUALIZATION L T PC
2 0 2 3
COURSE OBJECTIVES:
To Learn the basics and types of Virtualization
To understand the Hypervisors and its types
To Explore the Virtualization Solutions
To Experiment the virtualization platforms
COURSE OUTCOMES:
CO1: Analyse the virtualization concepts and Hypervisor
CO2: Apply the Virtualization for real-world applications
CO3: Install & Configure the different VM platforms
CO4: Experiment with the VM with various software
TOTAL:60 PERIODS
TEXT BOOKS
1. Cloud computing a practical approach - Anthony T.Velte , Toby J. Velte Robert Elsenpeter,
TATA McGraw- Hill , New Delhi – 2010
2. Cloud Computing (Principles and Paradigms), Edited by Rajkumar Buyya, James Broberg,
Andrzej Goscinski, John Wiley & Sons, Inc. 2011
3. David Marshall, Wade A. Reynolds, Advanced Server Virtualization: VMware and Microsoft
Platform in the Virtual Data Center, Auerbach
4. Chris Wolf, Erick M. Halter, “Virtualization: From the Desktop to the Enterprise”, APress,
2005.
5. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and
Processes”, Elsevier/Morgan Kaufmann, 2005.
6. David Marshall, Wade A. Reynolds, “Advanced Server Virtualization: VMware and Microsoft
Platform in the Virtual Data Center”, Auerbach Publications, 2006.
COURSE OUTCOMES:
CO1:Exhibit cloud-design skills to build and automate business solutions using cloud technologies.
CO2: Possess Strong theoretical foundation leading to excellence and excitement towards adoption
of cloud-based services
CO3: Solve the real world problems using Cloud services and technologies
30 PERIODS
TEXT BOOKS
1. Cloud Service Management and Governance: Smart Service Management in Cloud Era by
Enamul Haque, Enel Publications
2. Cloud Computing: Concepts, Technology & Architecture by Thomas Erl, Ricardo Puttini,
Zaigham Mohammad 2013
3. Cloud Computing Design Patterns by Thomas Erl, Robert Cope, Amin Naserpour
REFERENCES
1. Economics of Cloud Computing by Praveen Ayyappa, LAP Lambert Academic Publishing
2. Mastering Cloud Computing Foundations and Applications Programming Rajkumar Buyya,
Christian Vechhiola, S. Thamarai Selvi
2 0 2 3
COURSE OBJECTIVES:
To know the details of data warehouse Architecture
To understand the OLAP Technology
To understand the partitioning strategy
To differentiate various schema
To understand the roles of process manager & system manager
COURSE OUTCOMES:
At the end of the course the students should be able to
CO1: Design data warehouse architecture for various Problems
CO2: Apply the OLAP Technology
CO3: Analyse the partitioning strategy
CO4: Critically analyze the differentiation of various schema for given problem
CO5: Frame roles of process manager & system manager
TOTAL: 60 PERIODS
TEXT BOOKS
1. Alex Berson and Stephen J. Smith “Data Warehousing, Data Mining & OLAP”, Tata
McGraw – Hill Edition, Thirteenth Reprint 2008.
2. Ralph Kimball, “The Data Warehouse Toolkit: The Complete Guide to Dimensional
Modeling”, Third edition, 2013.
REFERENCES
1. Paul Raj Ponniah, “Data warehousing fundamentals for IT Professionals”, 2012.
2. K.P. Soman, ShyamDiwakar and V. Ajay “Insight into Data mining Theory and Practice”,
Easter Economy Edition, Prentice Hall of India, 2006.
COURSE OBJECTIVES:
COURSE OUTCOMES:
CO1: Demonstrate the fundamentals of information storage management and various models of
Cloud infrastructure services and deployment
CO2: Illustrate the usage of advanced intelligent storage systems and RAID
CO3: Interpret various storage networking architectures - SAN, including storage subsystems and
virtualization
CO4: Examine the different role in providing disaster recovery and remote replication technologies
COURSE OUTCOMES:
After the successful completion of this course, the student will be able to
CO1: Describe the motivation behind SDN
CO2: Identify the functions of the data plane and control plane
TEXTBOOKS:
1. William Stallings, “Foundations of Modern Networking: SDN, NFV, QoE, IoT and Cloud”,
Pearson Education, 1st Edition, 2015.
REFERENCES:
1. Ken Gray, Thomas D. Nadeau, “Network Function Virtualization”, Morgan Kauffman, 2016.
2. Thomas D Nadeau, Ken Gray, “SDN: Software Defined Networks”, O’Reilly Media, 2013.
3. Fei Hu, “Network Innovation through OpenFlow and SDN: Principles and Design”, 1 st
Edition, CRC Press, 2014.
4. Paul Goransson, Chuck Black Timothy Culver, “Software Defined Networks: A
Comprehensive Approach”, 2nd Edition, Morgan Kaufmann Press, 2016.
5. Oswald Coker, Siamak Azodolmolky, “Software-Defined Networking with OpenFlow”, 2nd
Edition, O’Reilly Media, 2017.
CO’s-PO’s & PSO’s MAPPING
CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 1 2 3 1 3 - - - 2 3 1 3 1 2 1
2 2 1 2 2 3 - - - 2 2 2 2 1 3 2
3 2 2 2 3 3 - - - 3 1 1 2 1 3 3
4 2 2 2 3 1 - - - 1 3 1 2 2 2 2
5 3 3 1 1 3 - - - 1 2 1 2 2 1 3
AVg. 2 2 2 2 2.6 - - - 1.8 2.2 1.2 2.2 1.4 2.2 2.2
1 - low, 2 - medium, 3 - high, ‘-' - no correlation
COURSE OUTCOMES:
30 PERIODS
COURSE OUTCOMES:
CO1: Understand the cloud concepts and fundamentals.
CO2: Explain the security challenges in the cloud.
CO3: Define cloud policy and Identity and Access Management.
CO4: Understand various risks and audit and monitoring mechanisms in the cloud.
CO5: Define the various architectural and design considerations for security in the cloud.
TOTAL:60 PERIODS
TEXTBOOKS
1. Raj Kumar Buyya , James Broberg, andrzejGoscinski, “Cloud Computing:‖, Wiley 2013
2. Dave shackleford, “Virtualization Security‖, SYBEX a wiley Brand 2013.
3. Mather, Kumaraswamy and Latif, “Cloud Security and Privacy‖, OREILLY 2011
REFERENCES
1. Mark C. Chu-Carroll “Code in the Cloud‖,CRC Press, 2011
2. Mastering Cloud Computing Foundations and Applications Programming RajkumarBuyya,
Christian Vechhiola, S. ThamaraiSelvi
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1: Have knowledge on digital forensics.
CO2: Know about digital crime and investigations.
CO3: Be forensic ready.
CO4: Investigate, identify and extract digital evidence from iOS devices.
CO5: Investigate, identify and extract digital evidence from Android devices.
30 PERIODS
LAB EXPERIMENTS:
1. Installation of Sleuth Kit on Linux. List all data blocks. Analyze allocated as well as unallocated
blocks of a disk image.
2. Data extraction from call logs using Sleuth Kit.
3. Data extraction from SMS and contacts using Sleuth Kit.
4. Install Mobile Verification Toolkit or MVT and decrypt encrypted iOS backups.
5. Process and parse records from the iOS system.
6. Extract installed applications from Android devices.
7. Extract diagnostic information from Android devices through the adb protocol. 144
8. Generate a unified chronological timeline of extracted records.
Curriculum and Syllabus|B.E Computer Science and Engineering |R2023
Department of CSE,PEC
30 PERIODS
TEXT BOOK:
1. Andre Arnes, “Digital Forensics”, Wiley, 2018.
2. Chuck Easttom, “An In-depth Guide to Mobile Device Forensics”, First Edition, CRC
Press, 2022.
REFERENCES
1. Vacca, J, Computer Forensics, Computer Crime Scene Investigation, 2nd Ed, Charles
River Media, 2005, ISBN: 1-58450-389.
145
COURSE OUTCOMES:
CO1: Develop semantic web related simple applications
CO2 : Address Privacy and Security issues in Social Networking
CO3: Explain the data extraction and mining of social networks
CO4: Discuss the prediction of human behavior in social communities
CO5: Describe the applications of social networks
30 PERIODS
146
TEXT BOOKS
1. Peter Mika, Social Networks and the Semantic Web, First Edition, Springer 2007.
2. BorkoFurht, Handbook of Social Network Technologies and Application, First Edition,
Springer, 2010.
3. Learning Neo4j 3.x Second Edition By Jérôme Baton, Rik Van Bruggen, Packt publishing
4. David Easley, Jon Kleinberg, Networks, Crowds, and Markets: Reasoning about a Highly
Connected World‖, First Edition, Cambridge University Press, 2010.
REFERENCES
1. Easley D. Kleinberg J., Networks, Crowds, and Markets – Reasoning about a Highly
Connected World‖, Cambridge University Press, 2010.
2. Jackson, Matthew O., Social and Economic Networks‖, Princeton University Press, 2008.
3. GuandongXu ,Yanchun Zhang and Lin Li, ―Web Mining and Social Networking –
Techniques and applications‖, First Edition, Springer, 2011.
4. Dion Goh and Schubert Foo, Social information Retrieval Systems: Emerging Technologies
and Applications for Searching the Web Effectively‖, IGI Global Snippet, 2008.
5. Max Chevalier, Christine Julien and Chantal Soulé-Dupuy, Collaborative and Social
Information Retrieval and Access: Techniques for Improved user Modeling‖, IGI Global
Snippet, 2009.
6. John G. Breslin, Alexander Passant and Stefan Decker, The Social Semantic Web‖,
Springer, 2009.
147
UNIT I INTRODUCTION 6
Ethical Hacking Overview - Role of Security and Penetration Testers .- Penetration-Testing
Methodologies- Laws of the Land - Overview of TCP/IP- The Application Layer - The Transport
Layer - The Internet Layer - IP Addressing .- Network and Computer Attacks - Malware - Protecting
Against Malware Attacks.- Intruder Attacks - Addressing Physical Security
148
COURSE OUTCOMES:
At the end of this course, the students will be able:
CO1: To express knowledge on basics of computer based vulnerabilities
CO2: To gain understanding on different foot printing, reconnaissance and scanning methods.
CO3: To demonstrate the enumeration and vulnerability analysis methods
CO4: To gain knowledge on hacking options available in Web and wireless applications.
CO5: To acquire knowledge on the options for network protection.
CO6: To use tools to perform ethical hacking to expose the vulnerabilities.
TOTAL:60 PERIODS
TEXTBOOKS
1. Michael T. Simpson, Kent Backman, and James E. Corley, Hands-On Ethical Hacking and
Network Defense, Course Technology, Delmar Cengage Learning, 2010.
2. The Basics of Hacking and Penetration Testing - Patrick Engebretson, SYNGRESS,
Elsevier, 2013.
3. The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws, Dafydd
Stuttard and Marcus Pinto, 2011.
REFERENCES
1. BlackHatPython:PythonProgrammingforHackersandPentesters, Justin Seitz , 2014.
149
150
TEXT BOOKS:
1. Julia H. Allen, “Software Security Engineering”, Pearson Education, 2008
2. Evan Wheeler, “Security Risk Management: Building an Information Security Risk Management
Program from the Ground Up”, First edition, Syngress Publishing, 2011
3. Chris Wysopal, Lucas Nelson, Dino Dai Zovi, and Elfriede Dustin, “The Art of Software Security
Testing: Identifying Software Security Flaws (Symantec Press)”, Addison-Wesley Professional,
2006
REFERENCES:
1. Robert C. Seacord, “Secure Coding in C and C++ (SEI Series in Software Engineering)”,
Addison-Wesley Professional, 2005.
2. Jon Erickson, “Hacking: The Art of Exploitation”, 2nd Edition, No Starch Press, 2008.
3. Mike Shema, “Hacking Web Apps: Detecting and Preventing Web Application Security
Problems”, First edition, Syngress Publishing, 2012
4. Bryan Sullivan and Vincent Liu, “Web Application Security, A Beginner's Guide”, Kindle
Edition, McGraw Hill, 2012
5. Lee Allen, “Advanced Penetration Testing for Highly-Secured Environments: The Ultimate
Security Guide (Open Source: Community Experience Distilled)”, Kindle Edition, Packt
Publishing,2012
6. Jason Grembi, “Developing Secure Software”
151
UNIT I INTRODUCTION 6
Cyber Security – History of Internet – Impact of Internet – CIA Triad; Reason for Cyber Crime – Need
for Cyber Security – History of Cyber Crime; Cybercriminals – Classification of Cybercrimes – A Global
Perspective on Cyber Crimes; Cyber Laws – The Indian IT Act – Cybercrime and Punishment.
152
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
CO1: Explain the basics of cyber security, cyber crime and cyber law (K2)
CO2: Classify various types of attacks and learn the tools to launch the attacks (K2)
CO3 Apply various tools to perform information gathering (K3)
CO4: Apply intrusion techniques to detect intrusion (K3)
CO5: Apply intrusion prevention techniques to prevent intrusion (K3)
TOTAL:60 PERIODS
TEXTBOOKS
1. Anand Shinde, “Introduction to Cyber Security Guide to the World of Cyber Security”, Notion
Press, 2021 (Unit 1)
2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, Wiley Publishers, 2011 (Unit 1)
3. https://owasp.org/www-project-top-ten/
REFERENCES
1. David Kim, Michael G. Solomon, “Fundamentals of Information Systems Security”, Jones &
Bartlett Learning Publishers, 2013 (Unit 2)
2. Patrick Engebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and
Penetration Testing Made easy”, Elsevier, 2011 (Unit 3)
3. Kimberly Graves, “CEH Official Certified Ethical hacker Review Guide”, Wiley Publishers,
2007 (Unit 3)
4. William Stallings, Lawrie Brown, “Computer Security Principles and Practice”, Third Edition,
Pearson Education, 2015 (Units 4 and 5)
5. Georgia Weidman, “Penetration Testing: A Hands-On Introduction to Hacking”, No Starch
Press, 2014 (Lab)
153
UNIT I INTRODUCTION 8
Basics of cryptography, conventional and public-key cryptography, hash functions, authentication,
and digital signatures.
154
COURSE OUTCOMES:
At the end of this course, the students will be able:
CO1: Classify the encryption techniques
CO2: Illustrate the key management technique and authentication.
CO3 Evaluate the security techniques applied to network and transport layer
CO4: Discuss the application layer security standards.
CO5: Apply security practices for real time applications.
TOTAL:60 PERIODS
TEXT BOOKS:
1. Cryptography and Network Security: Principles and Practice, 6th Edition, William Stallings,
2014, Pearson, ISBN 13:9780133354690.
REFERENCES:
1. Network Security: Private Communications in a Public World, M. Speciner, R. Perlman, C.
Kaufman, Prentice Hall, 2002.
2. Linux iptables Pocket Reference, Gregor N. Purdy, O'Reilly, 2004, ISBN-13: 978-
0596005696.
3. Linux Firewalls, by Michael Rash, No Starch Press, October 2007, ISBN: 978-1-59327-141-
1.
4. Network Security, Firewalls And VPNs, J. Michael Stewart, Jones & Bartlett Learning, 2013,
ISBN-10: 1284031675, ISBN-13: 978-1284031676.
5. The Network Security Test Lab: A Step-By-Step Guide, Michael Gregg, Dreamtech Press,
2015, ISBN-10:8126558148, ISBN-13: 978-8126558148.
155
COURSE OBJECTIVES:
• To Introduce Cloud Computing terminology, definition & concepts
• To understand the security design and architectural considerations for Cloud
• To understand the Identity, Access control in Cloud
• To follow best practices for Cloud security using various design patterns
• To be able to monitor and audit cloud applications for security
156
COURSE OUTCOMES:
CO1: Understand the cloud concepts and fundamentals.
CO2: Explain the security challenges in the cloud.
CO3: Define cloud policy and Identity and Access Management.
CO4: Understand various risks and audit and monitoring mechanisms in the cloud.
CO5: Define the various architectural and design considerations for security in the cloud.
TOTAL:60 PERIODS
TEXTBOOKS
1. Raj Kumar Buyya , James Broberg, andrzejGoscinski, “Cloud Computing:‖, Wiley
2013
2. Dave shackleford, “Virtualization Security‖, SYBEX a wiley Brand 2013.
3. Mather, Kumaraswamy and Latif, “Cloud Security and Privacy‖, OREILLY 2011
REFERENCES
1. Mark C. Chu-Carroll “Code in the Cloud‖,CRC Press, 2011
2. Mastering Cloud Computing Foundations and Applications Programming
RajkumarBuyya, Christian Vechhiola, S. ThamaraiSelvi
157
UNITIV ANIMATION 6
Principles of animation: staging, squash and stretch, timing, onion skinning, secondary action, 2D,
2 ½ D, and 3D animation, Animation techniques: Keyframe, Morphing, Inverse Kinematics, Hand
Drawn, Character rigging, vector animation, stop motion, motion graphics, , Fluid Simulation,
skeletal animation, skinning Virtual Reality, Augmented Reality.
LIST OF EXPERIMENTS:
Working with Image Editing tools:
• Install tools like GIMP/ InkScape / Krita / Pencil and perform editing operations:
Use different selection and transform tools to modify or improve an image
• Create logos and banners for home pages of websites.
Working with Audio Editing tools:
• Install tools like, Audacity / Ardour for audio editing, sound mixing and special effects like
fade-in or fade-out etc.,
• Perform audio compression by choosing a proper codec.
Working with Video Editing and conversion tools:
Install tools like OpenShot / Cinelerra / HandBrake for editing video content.
• Edit and mix video content, remove noise, create special effects, add 158
captions.
• Compress and convert video file format to other popular formats.
Working with web/mobile authoring tools:
Adapt / KompoZer/ BlueGriffon / BlueFish / Aptana Studio/ NetBeans / WordPress /Expression Web:
• Design simple Home page with banners, logos, tables quick links etc
• Provide a search interface and simple navigation from the home page to the inside pages of
the website.
• Design Responsive web pages for use on both web and mobile interfaces.
Working with Animation tools:
Install tools like, Krita, Wick Editor, Blender:
• Perform a simple 2D animation with sprites
• Perform simple 3D animation with keyframes, kinematics
• Working with Mobile UI animation tools: Origami studio / Lottie / Framer etc.,
Working with E-Learning authoring tools:
Install tools like EdApp / Moovly / CourseLab/ IsEazy and CamStudio/Ampache, VideoLAN:
30 PERIODS
WEB REFERENCES:
1. https://itsfoss.com/
2. https://www.ucl.ac.uk/slade/know/3396
3. https://handbrake.fr/
4. https://opensource.com/rticle/18/2/open-source-audio-visual-production-tools https://camstudio.org/
5. https://developer.android.com/training/animation/overview
6. https://developer.android.com/training/animation/overview (UNIT-IV)
159
COURSE OUTCOMES:
• Get the bigger picture of the context of Multimedia and its applications
• Use the different types of media elements of different formats on content pages
• Author 2D and 3D creative and interactive presentations for different target multimedia
applications.
• Use different standard animation techniques for 2D, 21/2 D, 3D applications
• Understand the complexity of multimedia applications in the context of cloud, security,
bigdata streaming, social networking, CBIR etc.,
TEXT BOOKS:
1. Ze-Nian Li, Mark S. Drew, Jiangchuan Liu, Fundamentals of Multimedia”, Third Edition,
Springer Texts in Computer Science, 2021. (UNIT-I, II, III)
REFERENCES:
1. John M Blain, The Complete Guide to Blender Graphics: Computer Modeling & Animation,
CRC press, 3rd Edition, 2016.
2. Gerald Friedland, Ramesh Jain, “Multimedia Computing”, Cambridge University Press,
2018.
3. Prabhat K.Andleigh, Kiran Thakrar, “Multimedia System Design”, Pearson
Education, 1st Edition, 2015.
4. Mohsen Amini Salehi, Xiangbo Li, “Multimedia Cloud Computing Systems”, Springer Nature,
1st Edition, 2021.
5. Mark Gaimbruno, “3D Graphics and Animation”, Second Edition, New Riders, 2002.
6. Rogers David, “Animation: Master – A Complete Guide (Graphics Series)”, Charles River
Media, 2006.
7. Rick parent, “Computer Animation: Algorithms and Techniques”, Morgan Kauffman, 3rd
Edition, 2012.
8. Emilio Rodriguez Martinez, Mireia Alegre Ruiz, “UI Animations with Lottie and After Effects:
Create, render, and ship stunning After Effects animations natively on mobile with React
Native”, Packt Publishing, 2022.
160
COURSE OUTCOMES:
On completion of the course, the students will be able to:
161
REFERENCES
1. Jenifer Tidwell, Charles Brewer, Aynne Valencia, “Designing Interface” 3 rd Edition , O’Reilly
2020
2. Steve Schoger, Adam Wathan “Refactoring UI”, 2018
3. Steve Krug, “Don't Make Me Think, Revisited: A Commonsense Approach to Web &
Mobile”, Third Edition, 2015
4. https://www.nngroup.com/articles/
5. https://www.interaction-design.org/literature.
CO’s-PO’s & PSO’s MAPPING
CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 1 1 3 1 - - - 3 3 2 1 3 3 1
2 2 3 1 3 2 - - - 1 2 2 2 1 2 2
3 1 3 3 2 2 - - - 2 3 1 2 1 3 3
4 1 2 3 3 1 - - - 3 2 1 3 3 3 3
5 1 2 3 2 1 - - - 2 1 1 1 3 2 2
AVg. 1.6 2.2 2.2 2.6 1.4 - - - 2.2 2.2 1.4 1.8 2.2 2.6 2.2
1 - low, 2 - medium, 3 - high, ‘-' - no correlation
162
COURSE OUTCOMES:
CO1: To examine and explore the role and importance of digital marketing in today’s
rapidly changing business environment..
CO2: To focuses on how digital marketing can be utilized by organizations and how its
effectiveness can be measured.
CO3: To know the key elements of a digital marketing strategy.
CO4: To study how the effectiveness of a digital marketing campaign can be measured
CO5: To demonstrate advanced practical skills in common digital marketing tools such as SEO,
SEM, Social media and Blogs.
163
164
UNIT V COMPOSITING 6
Compositing – chroma key, blue screen/green screen, background projection, alpha compositing,
deep image compositing, multiple exposure, matting, VFX tools - Blender, Natron, GIMP.
30 PERIODS
165
TEXT BOOKS:
1. Chris Roda, Real Time Visual Effects for the Technical Artist, CRC Press, 1st Edition, 2022.
2. Steve Wright, Digital Compositing for film and video, Routledge, 4th Edition, 2017.
3. John Gress, Digital Visual Effects and Compositing, New Riders Press, 1st Edition, 2014.
REFERENCES:
1. Jon Gress, “Digital Visual Effects and Compositing”, New Riders Press, 1 st Edition, 2014.
2. Robin Brinkman, The Art and Science of Digital Compositing: Techniques for Visual Effects,
Animation and Motion Graphics”, Morgan Kauffman, 2008.
3. Luiz Velho, Bruno Madeira, “Introduction to Visual Effects A Computational Approach”,
Routledge, 2023.
4. Jasmine Katatikarn, Michael Tanzillo, “Lighting for Animation: The art of visual storytelling
, Routledge, 1st Edition, 2016.
5. Eran Dinur, “The Complete guide to Photorealism, for Visual Effects, Visualization
6. Jeffrey A. Okun, Susan Zwerman, Christopher McKittrick, “ The VES Handbook of Visual
Effects: Industry Standard VFX Practices and Procedures”, Third Edition, 2020.and
Games”, Routledge, 1st Edition, 2022.
7. https://www.blender.org/features/vfx/
8. https://natrongithub.github.io/
166
COURSE OUTCOMES:
CO1:Explain the concepts of 2D and 3d Graphics
CO2:Design game design documents.
CO3:Implementation of gaming engines.
CO4:Survey gaming environments and frameworks.
CO5:Implement a simple game in Pygame.
EXPERIMENTS: 30 PERIODS
1. Installation of a game engine, e.g., Unity, Unreal Engine, familiarization of the GUI.
Conceptualize the theme for a 2D game.
2. Character design, sprites, movement and character control
3. Level design: design of the world in the form of tiles along with interactive and collectible
objects.
4. Design of interaction between the player and the world, optionally using the physics engine.
5. Developing a 2D interactive using Pygame
6. Developing a Puzzle game
7. Design of menus and user interaction in mobile platforms.
8. Developing a 3D Game using Unreal 167
168
30 PERIODS
TOTAL : 60 PERIODS
COURSE OUTCOMES:
CO1: Understand the basics of text, Image and Video compression
CO2: Understand the various compression algorithms for multimedia content
CO3: Explore the applications of various compression techniques
CO4: Explore knowledge on multimedia storage on disks
CO5: Understand scheduling methods for request streams 169
TEXT BOOKS
1. Khalid Sayood, Introduction to Data Compression, Morgan Kaufmann Series in Multimedia
Information and Systems, 2018, 5th Edition.
2. Philip K.C.Tse, Multimedia Information Storage and Retrieval: Techniques and
Technologies, 2008
REFERENCES
1. David Salomon, A concise introduction to data compression, 2008.
2. Lenald Best, Best’s Guide to Live Stream Video Broadcasting, BCB Live Teaching series,
2017.
3. Yun-Qing Shi, Image And Video Compression For Multimedia Engineering Fundamentals
Algorithms And Standards, Taylor& Francis,2019
4. Irina Bocharova, Compression for Multimedia, Cambridge University Press; 1st edition,
2009
170
UNIT I FUNDAMENTALS 6
Evolution of filmmaking - linear editing - non-linear digital video - Economy of Expression - risks
associated with altering reality through editing.
UNIT II STORYTELLING 6
Storytelling styles in a digital world through jump cuts, L-cuts, match cuts, cutaways, dissolves, split
edits - Consumer and pro NLE systems - digitizing images - managing resolutions - mechanics of
digital editing - pointer files - media management.
COURSE OUTCOMES:
On completion of the course, the students will be able to: TOTAL: 60 PERIODS
CO1:Compare the strengths and limitations of Nonlinear editing.
CO2:Identify the infrastructure and significance of storytelling.
CO3:Apply suitable methods for recording to CDs and VCDs.
CO4:Address the core issues of advanced editing and training techniques.
171
TEXT BOOKS
1. Avid Xpress DV 4 User Guide, 2007.
2. Final Cut Pro 6 User Manual, 2004.
3. Keith Underdahl, “Digital Video for Dummies”, Third Edition, Dummy Series, 2001.
4. Robert M. Goodman and Partick McGarth, “Editing Digital Video: The Complete
Creative and Technical Guide”, Digital Video and Audio, McGraw – Hill 2003.
172
173
TEXT BOOKS:
1. Learning Robotic Process Automation: Create Software robots and automate business
processes with the leading RPA tool - UiPath by Alok Mani Tripathi, Packt Publishing, 2018.
2. Tom Taulli , “The Robotic Process Automation Handbook: A Guide to Implementing RPA
Systems”, Apress publications, 2020.
REFERENCES:
1. Frank Casale (Author), Rebecca Dilla (Author), Heidi Jaynes (Author), Lauren Livingston
(Author), Introduction to Robotic Process Automation: a Primer, Institute of Robotic Process
Automation, Amazon Asia-Pacific Holdings Private Limited, 2018
2. Richard Murdoch, Robotic Process Automation: Guide To Building Software Robots,
Automate Repetitive Tasks & Become An RPA Consultant, Amazon Asia-Pacific Holdings
Private Limited, 2018
3. A Gerardus Blokdyk, “Robotic Process Automation Rpa A Complete Guide “, 2020
174
UNIT I INTRODUCTION 6
Neural Networks-Application Scope of Neural Networks-Artificial Neural Network: An Introduction-
Evolution of Neural Networks-Basic Models of Artificial Neural Network- Important Terminologies of
ANNs-Supervised Learning Network.
30 PERIODS
LAB EXPERIMENTS: 30 PERIODS
1. Implement simple vector addition in TensorFlow.
2. Implement a regression model in Keras.
3. Implement a perceptron in TensorFlow/Keras Environment.
4. Implement a Feed-Forward Network in TensorFlow/Keras.
5. Implement an Image Classifier using CNN in TensorFlow/Keras.
6. Improve the Deep learning model by fine tuning hyper parameters.
7. Implement a Transfer Learning concept in Image Classification.
8. Using a pre trained model on Keras for Transfer Learning
9. Perform Sentiment Analysis using RNN
10. Implement an LSTM based Autoencoder in TensorFlow/Keras.
175
11. Image generation using GAN
Curriculum and Syllabus|B.E Computer Science and Engineering |R2023
Department of CSE,PEC
Additional Experiments:
12. Train a Deep learning model to classify a given image using pre trained model
13. Recommendation system from sales data using Deep Learning
14. Implement Object Detection using CNN
15. Implement any simple Reinforcement Algorithm for an NLP problem
TOTAL: 60 PERIODS
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Apply Convolution Neural Network for image processing.
CO2: Understand the basics of associative memory and unsupervised learning networks.
CO3: Apply CNN and its variants for suitable applications.
CO4: Analyze the key computations underlying deep learning and use them to build and train deep
neural networks for various tasks.
CO5: Apply autoencoders and generative models for suitable applications.
TEXT BOOKS:
1. Ian Goodfellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2016.
2. Francois Chollet, “Deep Learning with Python”, Second Edition, Manning Publications,
2021.
REFERENCES:
1. Aurélien Géron, “Hands-On Machine Learning with Scikit-Learn and TensorFlow”, Oreilly,
2018.
2. Josh Patterson, Adam Gibson, “Deep Learning: A Practitioner’s Approach”, O’Reilly Media,
2017
3. Charu C. Aggarwal, “Neural Networks and Deep Learning: A Textbook”, Springer
International Publishing, 1st Edition, 2018.
4. Learn Keras for Deep Neural Networks, Jojo Moolayil, Apress,2018
5. Deep Learning Projects Using TensorFlow 2, Vinita Silaparasetty, Apress, 2020
6. Deep Learning with Python, FRANÇOIS CHOLLET, MANNING SHELTER ISLAND,2017.
7. S Rajasekaran, G A Vijayalakshmi Pai, “Neural Networks, FuzzyLogic and Genetic
Algorithm, Synthesis and Applications”, PHI Learning, 2017.
8. Pro Deep Learning with TensorFlow, Santanu Pattanayak, Apress,2017
9. James A Freeman, David M S Kapura, “Neural Networks Algorithms, Applications, and
Programming Techniques”, Addison Wesley, 2003.
CO’s-PO’s & PSO’s MAPPING
CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 3 2 3 1 - - 2 1 - - 2 2 1
2 3 1 2 1 - - - - - 1 2 2 - 1 -
3 3 3 3 3 3 1 - - 2 1 - - 2 2 1
4 3 3 3 3 3 - - - 2 - 2 3 2 2 2
5 1 1 3 2 3 - - - 2 - - - 1 1 -
AVg. 2.6 2 2.8 2.2 2.4 0.4 0 0 1.6 0.6 0.8 1 1.4 1.6 0.8
1 - low, 2 - medium, 3 - high, ‘-' - no correlation
176
UNIT I INTRODUCTION 6
Cyber Security – History of Internet – Impact of Internet – CIA Triad; Reason for Cyber Crime –
Need for Cyber Security – History of Cyber Crime; Cybercriminals – Classification of Cybercrimes –
A Global Perspective on Cyber Crimes; Cyber Laws – The Indian IT Act – Cybercrime and
Punishment.
177
COURSE OUTCOMES:
On successful completion of this course, the student will be able to
CO1: Explain the basics of cyber security, cyber crime and cyber law (K2)
CO2: Classify various types of attacks and learn the tools to launch the attacks (K2)
CO3 Apply various tools to perform information gathering (K3)
CO4: Apply intrusion techniques to detect intrusion (K3)
CO5: Apply intrusion prevention techniques to prevent intrusion (K3)
TOTAL:60 PERIODS
TEXTBOOKS
1. Anand Shinde, “Introduction to Cyber Security Guide to the World of Cyber Security”, Notion
Press, 2021 (Unit 1)
2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, Wiley Publishers, 2011 (Unit 1)
3. https://owasp.org/www-project-top-ten/
REFERENCES
1. David Kim, Michael G. Solomon, “Fundamentals of Information Systems Security”, Jones &
Bartlett Learning Publishers, 2013 (Unit 2)
2. Patrick Engebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and
Penetration Testing Made easy”, Elsevier, 2011 (Unit 3)
3. Kimberly Graves, “CEH Official Certified Ethical hacker Review Guide”, Wiley Publishers,
2007 (Unit 3)
4. William Stallings, Lawrie Brown, “Computer Security Principles and Practice”, Third Edition,
Pearson Education, 2015 (Units 4 and 5)
5. Georgia Weidman, “Penetration Testing: A Hands-On Introduction to Hacking”, No Starch
Press, 2014 (Lab)
178
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1: Understand the basics of quantum computing.
CO2: Understand the background of Quantum Mechanics.
CO3: Analyze the computation models.
CO4: Model the circuits using quantum computation.
environments and frameworks.
CO5: Understand the quantum operations such as noise and error–correction.
TOTAL:60 PERIODS
179
TEXTBOOKS:
1. Parag K Lala, Mc Graw Hill Education, “Quantum Computing, A Beginners Introduction”,
First edition (1 November 2020).
2. Michael A. Nielsen, Issac L. Chuang, “Quantum Computation and Quantum Information”,
Tenth Edition, Cambridge University Press, 2010.
3. Chris Bernhardt, The MIT Press; Reprint edition (8 September 2020), “Quantum Computing
for Everyone”.
REFERENCES
1. Scott Aaronson, “Quantum Computing Since Democritus”, Cambridge University Press,
2013.
2. N. David Mermin, “Quantum Computer Science: An Introduction”, Cambridge University
Press, 2007.
180
UNIT I INTRODUCTION 6
Definition of morality and ethics in AI-Impact on society-Impact on human psychology-Impact on the
legal system-Impact on the environment and the planet-Impact on trust
181
182
UNIT I INTRODUCTION 6
Introduction; Design considerations – Material, Size, Resolution, Process; Modelling and viewing -
3D; Scanning; Model preparation – Digital; Slicing; Software; File formats
UNIT II PRINCIPLE 6
Processes – Extrusion, Wire, Granular, Lamination, Photopolymerisation; Materials - Paper,
Plastics, Metals, Ceramics, Glass, Wood, Fiber, Sand, Biological Tissues, Hydrogels, Graphene;
Material Selection - Processes, applications, limitations;
183
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1:Outline and examine the basic concepts of 3D printing technology
CO2:Outline 3D printing workflow`
CO3: Explain and categorise the concepts and working principles of 3D printing using inkjet
technique
CO4: Explain and categorise the working principles of 3D printing using laser technique
CO5: Explain various method for designing and modeling for industrial applications
TOTAL:60 PERIODS
TEXT BOOKS
1. Christopher Barnatt, 3D Printing: The Next Industrial Revolution, CreateSpace Independent
Publishing Platform, 2013.
2. Ian M. Hutchings, Graham D. Martin, Inkjet Technology for Digital Fabrication, John Wiley &
Sons, 2013.
REFERENCES:
1. Chua, C.K., Leong K.F. and Lim C.S., Rapid prototyping: Principles and applications, second
edition, World Scientific Publishers, 2010
2. Ibrahim Zeid, Mastering CAD CAM Tata McGraw-Hill Publishing Co., 2007
3. Joan Horvath, Mastering 3D Printing, APress, 2014
184
185
REFERENCES TOTAL:60PERIODS
1. Sanjay Madhav, “Game Programming Algorithms and Techniques: A Platform Agnostic
Approach”, Addison Wesley,2013.
2. Will McGugan, “Beginning Game Development with Python and Pygame: From Novice to
Professional”, Apress,2007.
3. Paul Craven, “Python Arcade games”, Apress Publishers,2016.
4. David H. Eberly, “3D Game Engine Design: A Practical Approach to Real-Time Computer
Graphics”, Second Edition, CRC Press,2006.
5. Jung Hyun Han, “3D Graphics for Game Programming”, Chapman and Hall/CRC, 2011
186
187
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1: Understand the basics of Knowledge Engineering.
CO2: Apply methodologies and modelling for Agent Design and Development.
CO3: Design and develop ontologies.
CO4: Apply reasoning with ontologies and rules.
CO5: Understand learning and rule learning.
TOTAL: 60 PERIODS
TEXT BOOKS:
1. Gheorghe Tecuci, Dorin Marcu, Mihai Boicu, David A. Schum, Knowledge Engineering Building
Cognitive Assistants for Evidence-based Reasoning, Cambridge University Press, First Edition, 2016.
(Unit 1 – Chapter 1 / Unit 2 – Chapter 3,4 / Unit 3 – Chapter 5, 6 / Unit 4- 7 , Unit 5 – Chapter 8, 9 )
REFERENCES:
1. Ronald J. Brachman, Hector J. Levesque: Knowledge Representation and Reasoning, Morgan
Kaufmann, 2004.
2. Ela Kumar, Knowledge Engineering, I K International Publisher House, 2018.
3. John F. Sowa: Knowledge Representation: Logical, Philosophical, and Computational
Foundations, Brooks/Cole, Thomson Learning, 2000.
4. King , Knowledge Management and Organizational Learning , Springer, 2009.
5. Jay Liebowitz, Knowledge Management Learning from Knowledge Engineering, 1st
Edition,2001.
188
COURSE OBJECTIVES:
• To introduce the ideas of fuzzy sets, fuzzy logic and use of heuristics based on human
experience.
• To provide the mathematical background for carrying out the optimization associated with
neural network learning
• To learn various evolutionary Algorithms.
• To become familiar with neural networks that can learn from available examples and
generalize to form appropriate rules for inference systems.
• To introduce case studies utilizing the above and illustrate the Intelligent behavior of
programs based on soft computing
UNIT V APPLICATIONS 6
Modeling a two input sine function - Printed Character Recognition – Fuzzy filtered neural networks
– Plasma Spectrum Analysis – Hand written neural recognition - Soft Computing for Color Recipe
Prediction.
30 PERIODS
COURSE OUTCOMES:
CO1: Understand the fundamentals of fuzzy logic operators and inference mechanisms
CO2: Understand neural network architecture for AI applications such as classification and
clustering
CO3: Learn the functionality of Genetic Algorithms in Optimization problems
CO4: Use hybrid techniques involving Neural networks and Fuzzy logic
CO5: Apply soft computing techniques in real world applications
PRACTICAL EXERCISES 30 PERIODS
1. Implementation of fuzzy control/ inference system
2. Programming exercise on classification with a discrete perceptron
3. Implementation of XOR with backpropagation algorithm
4. Implementation of self organizing maps for a specific application
5. Programming exercises on maximizing a function using Genetic algorithm
6. Implementation of two input sine function
7. Implementation of three input non linear function
TOTAL:60 PERIODS
189
1. SaJANG, J.-S. R., SUN, C.-T., & MIZUTANI, E. (1997). Neuro-fuzzy and soft computing: A
computational approach to learning and machine intelligence. Upper Saddle River, NJ,
Prentice Hall,1997
2. HimanshuSingh, YunisAhmadLone, Deep Neuro-Fuzzy Systems with Python
3. With Case Studies and Applications from the Industry, Apress, 2020
REFERENCES
1. roj Kaushik and Sunita Tiwari, Soft Computing-Fundamentals Techniques and Applications,
1st Edition, McGraw Hill, 2018.
2. S. Rajasekaran and G.A.V.Pai, “Neural Networks, Fuzzy Logic and Genetic Algorithms”, PHI,
2003.
3. Samir Roy, Udit Chakraborthy, Introduction to Soft Computing, Neuro Fuzzy and Genetic
Algorithms, Pearson Education, 2013.
4. S.N. Sivanandam, S.N. Deepa, Principles of Soft Computing, Third Edition, Wiley India Pvt
Ltd, 2019.
5. R.Eberhart, P.Simpson and R.Dobbins, “Computational Intelligence - PC Tools”, AP
Professional, Boston, 1996
190
30 PERIODS
PRACTICALS
1.Solving simplex maximization problems using R programming.
2. Solving simplex minimization problems using R programming.
3. Solving mixed constraints problems – Big M & Two phase method using TORA.
4. Solving transportation problems using R.
5. Solving assignment problems using R.
6. Solving optimization problems using LINGO.
7. Studying Primal-Dual relationships in LP using TORA.
8. Solving LP problems using dual simplex method using TORA.
9. Sensitivity & post optimality analysis using LINGO.
10. Solving shortest route problems using optimization software
11. Solving Project Management problems using optimization software
12. Testing random numbers and random variates for their uniformity.
13. Testing random numbers and random variates for their independence
14. Solve single server queuing model using simulation software package.
15. Solve multi server queuing model using simulation software package.
30 PERIODS
TOTAL: 60 PERIODS
191
COURSE OUTCOMES:
On successful completion of this course, the student will able to
CO1:Formulate and solve linear programming problems (LPP)
CO2:Evaluate Integer Programming Problems, Transportation and Assignment Problems.
CO3:Obtain a solution to network problems using CPM and PERT techniques.
CO4:Able to optimize the function subject to the constraints.
CO5:Identify and solve problems under Markovian queuing models
TEXT BOOK:
1. Hamdy A Taha, Operations Research: An Introduction, Pearson, 10th Edition, 2017.
REFERENCES:
1. ND Vohra, Quantitative Techniques in Management, Tata McGraw Hill, 4th Edition, 2011.
2. J. K. Sharma, Operations Research Theory and Applications, Macmillan, 5th Edition, 2012.
3. Hiller F.S, Liberman G.J, Introduction to Operations Research, 10th Edition McGraw Hill,
2017.
4. Jit. S. Chandran, Mahendran P. Kawatra, KiHoKim, Essentials of Linear Programming,
Vikas Publishing House Pvt.Ltd. New Delhi, 1994.
5. Ravindran A., Philip D.T., and Solberg J.J., Operations Research, John Wiley, 2nd Edition,
2007.
CO’s-PO’s & PSO’s MAPPING
CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 2 1 1 - - - 2 1 1 2 3 3 3
2 3 1 2 2 3 - - - 3 2 3 1 2 1 1
3 2 3 3 2 2 - - - 3 3 1 3 1 3 1
4 2 2 1 1 3 - - - 2 1 3 1 2 1 2
5 2 1 1 3 2 - - - 3 3 1 3 3 2 1
AVg. 2.4 2 1.8 1.8 2.2 - - - 2.6 2 1.8 2 2.2 2 1.6
1 - low, 2 - medium, 3 - high, ‘-' - no correlation
192
UNIT I INTRODUCTION 6
Introduction — Making rational choices: basics of Games — strategy — preferences — payoffs —
Mathematical basics — Game theory — Rational Choice — Basic solution concepts-non- cooperative
versus cooperative games — Basic computational issues — finding equilibria and learning in games-
Typical application areas for game theory (e.g. Google's sponsored search, eBay auctions, electricity
trading markets).
193
COURSE OUTCOMES:
Upon Completion of the course, the students will be able to
CO1:Discuss the notion of a strategic game and equilibria and identify the characteristics of main
applications of these concepts.
CO2:Discuss the use of Nash Equilibrium for other problems.
CO3:Identify key strategic aspects and based on these be able to connect them to appropriate
game theoretic concepts given a real world situation.
CO4:Identify some applications that need aspects of Bayesian Games.
CO5:Implement a typical Virtual Business scenario using Game theory.
LABORATORY EXERCISES:
1. Prisoner’s dilemma
2. Pure Strategy Nash Equilibrium
3. Extensive Form – Graphs and Trees, Game Trees
4. Strategic Form – Elimination of dominant strategy
5. Minimax theorem, minimax strategies
6. Perfect information games: trees, players assigned to nodes, payoffs, backward Induction,
subgame perfect equilibrium,
7. imperfect-information games - Mixed Strategy Nash Equilibrium - Finding mixed-strategy
Nash equilibria for zero sum games, mixed versus behavioral strategies.
8. Repeated Games
9. Bayesian Nash equilibrium 30 PERIODS
TOTAL: 60 PERIODS
TEXT BOOKS:
194
195
TOTAL: 60 PERIODS
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1:Understand the underlying theory behind cognition.
CO2:Connect to the cognition elements computationally.
CO3:Implement mathematical functions through WebPPL.
CO4:Develop applications using cognitive inference model.
CO5:Develop applications using cognitive learning model.
TEXT BOOK:
3. Robert A. Wilson, Frank C. Keil, “The MIT Encyclopedia of the Cognitive Sciences”,The
MIT Press, 1999.
4. Jose Luis Bermúdez, Cognitive Science -An Introduction to the Science of the
Mind, Cambridge University Press 2020
REFERENCES:
196