DJS22-Third Year Final Syllabus Changed After BOS
DJS22-Third Year Final Syllabus Changed After BOS
Semester V
Teaching Scheme Semester End Examination (A) Continuous Assessment (B) Aggregate Credits earned
(A+B)
End
Sr Course Code Course CA
Theory Practical Tutorial Duration Sem
Credits Theory Oral Pract Oral & Pract Theory Termwork Total
(hrs.) (hrs.) (hrs.) (Hrs) Exam
Total
# 2 hrs. of theory (class wise) and 2 hrs of activity based laboratory (batch wise)
Semester VI
The final certification and acceptance of term work will be subject to satisfactory performance upon fulfilling
minimum passing criteria in the term work / completion of audit course.
Course Objectives:
This course introduces data warehouse and data mining concepts.
1. To identify the need of and perform data modelling to provide strategic information for making business
decisions.
2. To analyze data and identify and develop relevant mining models to discover knowledge from data in
various applications.
1|Page
Description of Data, Data Visualization, Measuring data similarity and
dissimilarity.
Data Preprocessing: Major tasks in preprocessing, Data Cleaning: Missing values,
Noisy data; Data Integration: Entity Identification Problem, Redundancy and
Correlation Analysis, Tuple Duplication, Data Value Conflict Detection and
Resolution; Data Reduction: Attribute subset selection, Histograms, Clustering and
Sampling; Data Transformation & Data Discretization: Data Transformation by
Normalization, Discretization by Binning, Discretization by Histogram Analysis
4 Classification and Clustering: 8
Classification
Basic Concepts of classification, Decision Tree Induction, Attribute Selection
Measures using Information Gain, Tree pruning
Bayes Classification Methods: Bayes’ Theorem, Naïve Bayesian Classification
Model Evaluation: Metrics for Evaluating Classifier Performance, Holdout Method
and Random Subsampling, Cross Validation, Bootstrap
Improving Classification Accuracy: Ensemble classification, Bagging, Boosting
and AdaBoost, Random Forests
Clustering:
Cluster Analysis and Requirements of Cluster Analysis
Partitioning Methods: k-Means, k-Medoids
Hierarchical Methods: Agglomerative, Divisive
Evaluation of Clustering: Assessing Clustering Tendency, Determining Number of
Clusters and Measuring cluster quality: Intrinsic and Extrinsic methods
5 Mining Frequent Patterns and Association Rules: 5
Market Basket Analysis, Frequent Item sets, Closed Item sets, and Association
Rule
Frequent Item set Mining Methods: Apriori Algorithm, Association Rule
Generation,
FP growth
6 Spatial and Web Mining: Spatial Data, Spatial Vs. Classical Data Mining, Spatial 6
2|Page
Data Structures, Mining Spatial Association and Co-location Patterns, Spatial
Clustering Techniques: CLARANS Extension
Web Mining: Web Content Mining, Web Structure Mining, Web Usage mining,
Applications of Web Mining
Books Recommended:
1. Paulraj Ponniah, “Data Warehousing: Fundamentals for IT Professionals”, 2nd Edition, Wiley
India, 2013.
2. Theraja Reema, “Data Warehousing”, 1st Edition, Oxford University Press, 2009.
3. Han, Kamber, “Data Mining Concepts and Techniques”, 3rd Edition, Morgan Kaufmann, 2012.
4. P. N. Tan, M. Steinbach, Vipin Kumar, “Introduction to Data Mining”, 2nd Edition, Pearson
Education, 2018.
5. H. Dunham, “Data Mining: Introductory and Advanced Topics”, 1st Edition, Pearson
Education, 2006.
1 To visualize the data for a data warehouse using the Business Intelligence tool.
4 To perform various OLAP operations such as slice, dice, drilldown, rollup, pivot
3|Page
5 Implementation of Classification algorithm
i. K-means
ii. Hierarchical clustering (single/complete/average)
7 Implementation of Association Rule Mining algorithm
i. Apriori algorithm
ii. FP Tree algorithm
4|Page
Program: Computer Engineering T.Y B. Tech. Semester: V
Course: Computer Network (DJS22CEC502)
Course: Computer Network Laboratory (DJS22CEL502)
Pre-requisite: None
Course Objectives:
1. To get familiar with contemporary issues and challenges of various protocol designs in layered
architecture.
2. To assess the strengths and weaknesses of various routing algorithms.
3. To explore the issues and challenges of protocols design while delving into TCP/IP protocol suite.
5|Page
Medium Access Control Sublayer: Channel Allocation problem, Multiple Access
Protocol (Aloha, Carrier Sense Multiple Access (CSMA/CA, CSMA/CD)
4 Network layer 12
Network Layer design issues, Communication Primitives: Unicast, Multicast,
Broadcast. IPv4 Addressing (classful and classless), Subnetting, Supernetting
design problems, IPv4 Protocol, Network Address Translation (NAT), IPv6
Routing algorithms: Shortest Path (Dijkstra’s), Link state routing, Distance Vector
Routing
Routing Protocols: ARP, RARP, ICMP, IGMP, RIP, OSPF
Congestion control algorithms: Open loop congestion control, Closed loop
congestion control, QoS parameters, Token & Leaky bucket algorithms.
5 Transport Layer 06
The Transport Service: Transport service primitives, Berkeley Sockets, Connection
management (Handshake), UDP, TCP, TCP state transition, TCP timers
TCP Flow control (sliding Window), TCP Congestion Control: Slow Start
6 Application Layer 04
DNS: Name Space, Resource Record and Types of Name Server. HTTP, SMTP,
Telnet, FTP, DHCP
Total 39
6|Page
13 Perform File Transfer and Access using FTP.
14 Perform Remote login using Telnet server.
15 Perform network discovery using discovery tools (e.g. Nmap, mrtg)
Textbooks:
1. A.S. Tanenbaum, Computer Networks, 6th edition Pearson Education, 2020
2. B.A. Forouzan, Data Communications and Networking with TCP/IP Protocol Suite, 6th edition,
TMH, 2022
3. James F. Kurose, Keith W. Ross, Computer Networking, A Top-Down Approach Featuring the
Internet, 6th edition, Pearson, 2017
References:
1. Behrouz A. Forouzan, Firouz Mosharraf, Computer Networks: A Top-Down Approach, Mc Graw
Hill, 2023
2. Dhanashree K. Toradmalle, Computer Networks and Network Design, Wiley, 2020
Online Resources:
1. https://www.netacad.com/courses/networking/networking-essentials
2. https://www.coursera.org/learn/computer-networking
3. https://nptel.ac.in/courses/106/105/106105081
4. https://www.edx.org/course/introduction-to-networking
7|Page
Program: Computer Engineering T.Y B. Tech. Semester: V
Course: Artificial Intelligence (DJS22CEC503)
Course: Artificial Intelligence Laboratory (DJS22CEL503)
Objectives:
1. Provide the basic ideas and techniques underlying the design of intelligent systems.
2. Impart the knowledge of various search techniques for problem solving.
3. Learn knowledge representation, planning and provide the knowledge to deal with uncertain and
incomplete information.
8|Page
Uncertain Knowledge and Reasoning: Representing knowledge in an uncertain
domain, The semantics of Bayesian Belief Network, Inference in Belief Network
Planning: The planning problem, Planning with state space search, Planning 04
4 graphs, Partial order planning, Hierarchical planning,
Learning: Types of Learning, Inductive Learning
07
Artificial Neural Networks: McCulloh Pitts Model, Perceptron, Feed Forward
5
Network, Backpropagation Algorithm, Self-Organizing Map
Expert System: Introduction, Phases in building Expert Systems, ES
6 Architecture, Case Study on MYCIN Rule based system 04
Advanced topic: Responsible AI, Introduction to Generative AI
Total 39
Any other experiment based on syllabus may be included, which would help the learner to understand
topic/concept.
9|Page
Books Recommended:
Text Books
1. Stuart J. Russell and Peter Norvig, "Artificial Intelligence A Modern Approach” 3rd Edition,
Pearson Education 2010
2. George F Luger “Artificial Intelligence” 6th Edition, Pearson Education 2021
3. Deepak Khemani.” A First Course in Artificial Intelligence”, 6th reprint, McGraw Hill
Education 2018.
4. Saroj Kaushik “Artificial Intelligence”, 1st Edition, Cengage Learning 2010
Reference Books
1. AP Engelbrecht, “Computational Intelligence”, 3rd Edition, Wiley–Blackwell 2021
2. Elaine Rich and Kevin Knight “Artificial Intelligence” 3rd Edition, McGraw Hill Education
2017
3. Ivan Bratko “PROLOG Programming for Artificial Intelligence”, 4th edition, Addison-Wesley
2011
4. Hagan, Demuth, Beale, “Neural Network Design”, 2nd edition, Martin Hagan 2014
5. Ronald J. Martin, “The age of Artificial intelligence”, Independently published 2023
10 | P a g e
Program: Computer Engineering T.Y B. Tech. Semester: V
Course: Formal languages and Automata Theory (DJS22CEC504)
Objectives:
To provide a theoretical foundation for the process of computation and to impart an understanding
of the notions of automata, formal languages and computability.
11 | P a g e
Modifications of the Basic Turing Machine Model - Multiple Tape TM, Multiple Tracks
TM, Non-deterministic TM, Universal Turing Machine.
5 Decidability and Undecidability: 4
NP complete and NP hard problem, Church’s hypothesis, Halting Problem, Post
correspondence problem, Rice's theorem
Total 39
Books Recommended:
Text books:
Reference Books:
12 | P a g e
Program: Computer Engineering T.Y B. Tech. Semester: V
Course: Advanced Algorithms (DJS22CEC5011)
Course: Advanced Algorithms Laboratory (DJS22CEL5011)
Prerequisite:
1. Concepts of Data structures, Discrete mathematics and Analysis of Algorithm
13 | P a g e
Flow Network Introduction: Residual Network, Augmenting Path, Ford-
Fulkerson Method, Edmonds-Karp Method, Push-Relable Algorithm, Relable to
Front algorithm.
Bipartite Matching: Maximum Bipartite Matching, Weighted Bipartite Matching.
5 Computational Geometry: Line Segment Properties, Convex Hull Graham’s scan 6
algorithm, Conic Programming
Geometric Searching: Point Location in polygon using Ray Crossing (Flipped
Classroom: 2d Linear Programming with Prune and Search)
Online Algorithms: Competitive Ratio, K-Server
6 Algorithm Classes: P, NP, NP Hardness and NP Completeness 6
Np Completeness Proofs: Satisfiability (3 sat), Reducibility, TSP.
Approximation Algorithms: Vertex Cover Problem, Travelling Sales Person
problem
Network Approximation: Randomized Rounding, Primal Dual algorithms
Randomized Classes: RP, BPP, ZPP (Adleman’s theorem)
14 | P a g e
9 To implement Graph Based Algorithms (Ford Fulkerson Method)
Any other practical covering the syllabus topics and subtopics can be conducted.
Books Recommended:
Text books:
1. Introduction to Algorithms by Thomas H Cormen, Charles E. Leiserson, Ronald L Rivest,
Clifford Stein, Third Edition.
2. Design and analysis of algorithms by S. Sridhar
3. Horowitz, Sahani and Rajsekaran, ―Fundamentals of Computer Algorithms‖, Galgotia.
4. Harsh Bhasin, Algorithms Design and Analysis, Oxford, 2015.
Reference Books:
1. Rajeev Motwani, Prabhakar Raghavan, Randomized Algorithm, Cambridge University
2. S. K. Basu, Design Methods and Analysis of Algorithm, PHI
3. Vijay V. Vajirani, Approximation Algorithms, Springer.
4. Computational Complexity, Stanford University.
15 | P a g e
Program: Computer Engineering T.Y B. Tech. Semester: V
Course: Advanced Operating System (DJS22CEC5012)
Course: Advanced Operating System Lab (DJS22CEL5012)
16 | P a g e
4 Multiprocessor Operating Systems:
Introduction, Basic multiprocessor system architectures, design issues, Threads
Process synchronization: the test and set instruction, the swap instruction, 06
implementation of the process waits. Processor scheduling: Issues, Co-
scheduling, Smart scheduling, Affinity Based scheduling
5 Virtualization:
Introduction to Virtualization, Types of Virtualizations, Bare Metal (XEN), Hosted 06
(KVM) Virtualization, Para virtualization, Full virtualization, Emulation, Server
Virtualization, Network Virtualization and Storage Virtualization.
6 Mobile Operating System:
Mobile OS: Architecture, Android OS, iOS, Virtual OS, Cloud OS and their design 05
issues, Application development using Android
Total 39
Books Recommended:
Textbooks:
17 | P a g e
1. K. C. Wang, “embedded and Real Time Operating System”, Springer, January 2022.
2. Abraham Silberschatz, Peter B. Galvin, Greg Gagne, “Operating System Concepts”, 8th Edition
by, 2017
3. Rajib Mall, “Real-Time Systems: Theory and Practice”, Pearson Education India, 2016
4. Cris Wolf and Eric M Halter,” Virtualization from Desktop to Enterprise”, Apress.
5. K.C. Wang, “Embedded and Real-Time Operating Systems Hardcover” 6 April 2017
18 | P a g e
Program: Computer Engineering T.Y B. Tech. Semester: V
Course: Advanced Database Management System (DJS22CEC5013)
Course: Advanced Database Management System Laboratory (DJS22CEL5013)
Objectives:
1. To provide an overview of advancement in SQL and Database technology, distributed database systems
and document-oriented database.
2. To impart knowledge of query processing and optimization.
3. To understand the usage of advanced data models for real life applications and secure them.
Distributed Databases
Introduction: Types of Distributed Database Systems, Distributed Database
Architectures Distributed Database Design: Data Fragmentation, Replication and 08
Allocation Techniques Distributed Query Processing (Semi join) Transaction
3
Management, Concurrency Control (locking) and Recovery in Distributed
Databases
Document oriented database
Object Oriented Database: Need of object-oriented database, Impedance matching
problem between OO languages and Relational database, Case study db4O,
19 | P a g e
4 Document Oriented Database: Need of Document Oriented database, difference 06
between Document Oriented Database and Traditional database, Types of
encoding XML, JSON, BSON, Representation XML, Json Objects. Case study on
doc oriented based such a MongoDB.
Advanced data models
Temporal data models: Aspects of valid time, Bitemporal time and bi-temporal 06
time with examples of each. Spatial model: Types of spatial data models - Raster,
5
Vector and Image. Graph Database: Introduction, Features, Data modeling with
graph. MYSQL Postgres, Mobile databases
Data Security
Introduction to Database Security Issues; Authentication and authorization,
6 Database auditing, Discretionary Access Control Based on Granting and 06
Revoking Privileges, Mandatory Access Control and Role-Based Access Control
for Multilevel Security Introduction to Statistical Database Security
39
Total
Books Recommended:
Textbooks:
1. Abraham Silberschatz, Henry F. Korth, Sudarshan, “Database System Concepts” 7th Edition,
Mc Graw Hill, 2021.
20 | P a g e
2. Sveta Smirnova and Alkin Tezuysal, “My SQL Cookbook” 4th Edition, O’Reilly Publication,
2022.
3. Shannon Bradshaw, Eoin Brazil, “MongoDB: The Definitive Guide - Powerful and Scalable
Data Storage”, Third Edition, O’Reilly Publication, 2020
4. Christos Tjortjis, “Graph Databases Applications on Social Media Analytics and Smart Cities”
1st Edition, CRC Press, 2023
Reference Books:
1. Vinicius M. Grippa and Sergey Kuzmichev, “Learning MySQL” 2nd Edition, O’Reilly
Publication, 2021.
2. Tamer OEzsu, Patrick V, “Principles of Distributed Database System”, Springer Publication,
2020.
21 | P a g e
Program: Computer Engineering T.Y B. Tech. Semester: V
Course: Computer Graphics (DJS22CEC5014)
Course: Computer Graphics (DJS22CEL5014)
Pre-requisite: None
Objectives:
The objective of the course is to equip students with the fundamental knowledge of computer
graphics and provide an understanding of how to scan convert the basic geometrical primitives, how
to transform the shapes to fit them as per the picture definition.
Provide an understanding of mapping from a world coordinate to device coordinates, clipping,
solid modeling, rendering, and projections.
Explain the applications of computer Graphics. Apply and compare the algorithms for drawing 2D
images also explain aliasing, anti-aliasing and half toning techniques.
Analyze and apply clipping algorithms and transformation on 2D images.
Explain basic shading, shadows, curves and surfaces and solve curve problems.
22 | P a g e
an Arbitrary Line, A Geometric Interpretation of Homogeneous
Coordinates.
Three-Dimensional Transformations:
Scaling,Shearing,Rotation,Reflection,Translation,Multiple
Transformation, Rotation about an Arbitrary Axis in Space, Reflection
through an Arbitrary Plane, Matrix Representation of 3D
Transformations, Composition of 3D Transformations, Affine and
Perspective Geometry, Perspective Transformations, Techniques for
Generating Perspective Views, Vanishing Points, the Perspective
Geometry and camera models, Orthographic Projections, Axonometric
Projections, Oblique Projections
4 Two-Dimensional Viewing: 07
Introduction, Viewing Pipeline View Coordinate reference frame,
Window to viewport transformation point clipping, Text Clipping, Line
Clipping: Cohen Sutherland Algorithm, Liang Barsky algorithms,
Polygon clipping: Sutherland Hodgeman polygon clipping and Weiler
Atherton.
Fractal Geometry: Fractal Dimension, Koch Curve. Piano Curve, Hilbert
Curve.
5 Visible-Surface Determination 07
Techniques for efficient Visible-Surface Algorithms, Categories of
algorithms, Back face removal, The Z-buffer Algorithm, Scan-line
method, Painter’s algorithms (depth sorting), Area sub-division method,
BSP trees, Visible-Surface Ray Tracing, comparison of the methods.
Illumination and Shading
Illumination and Shading Models for Polygons, Reflectance properties
of surfaces, Ambient, Specular and Diffuse reflections, Atmospheric
attenutation, Phong’s model, Gouraud shading, some examples
6 Graphics Programming using OPENGL 04
Why OpenGL, Features in OpenGL, OpenGL operations, Abstractions in
OpenGL – GL, GLU & GLUT, 3D viewing pipeline, viewing matrix
specifications, a few examples and demos of OpenGL programs
Total 39
23 | P a g e
4 Curve Generation: Bezier for n control points, B Spline (Uniform), Fractal Generation
(Koch Curve)
5 Program for performing Two Dimensional Transformations: Translation, Scaling, Rotation,
Reflection, Shear by using a homogeneous Matrix representation, use of a function for
matrix multiplication is desirable, to perform composite transformation
6 Implementation of Line Clipping Algorithm: Cohen Sutherland, Liang Barsky.
7 Implementation of Polygon Clipping Algorithm: Sutherland Hodgman.
8 Program to represent a 3D object using polygon surfaces and then perform 3D
transformation.
9 Program to perform projection of a 3D object on Projection Plane: Parallel and
Perspective.
10 Implement Illumination and shading apply on sphere using two light sources in OpenGL
A minimum of six experiments from the above suggested list or any other experiment based on syllabus
will be included along with the mini project, which would help the learner to apply the concept learnt.
Books Recommended:
Textbooks:
1. Computer Graphics and Multimedia: Concepts, Algorithms and Implementation using C, Technical
publications,2020.
2. William M. Newman, “Principles of Interactive Computer Graphics”, 2001.
3. B.M. Havaldar ,“C Graphics and Projects”, 2006.
Reference Books:
1.A. P. Godse, Dr. D. A. Godse, Computer Graphics and Multimedia, Concepts, Algorithms and
Implementation using C, KDP Print US ,2020.
2. Donald Hearn and M. Pauline Baker, “Computer Graphics”, Pearson Education,2011.
Online Resources:
1. https://onlinecourses.nptel.ac.in/noc20_cs90/preview
2. https://www.edx.org/learn/computer-graphics/the-university-of-california-san-diego-computer-
graphics
24 | P a g e
Program: Computer Engineering T.Y B. Tech. Semester: V
Course: Professional and Business Communication Laboratory (DJS22IHL)
Pre-requisite:
Basic course in Effective Communication Skills
Objectives:
1. To inculcate a professional and ethical attitude at the workplace
2. To enhance communication and interpersonal skills
3. To develop effective employability skills
4. To hone written skills for technical documentation
25 | P a g e
Interview Skills: Types and modes of interview, Preparation for interview, Dos
and Don’ts of interview, frequently asked questions during interview
Presentation Skills: Presentation strategies, overcoming stage fear, techniques to
prepare effective PowerPoint presentation
Unit 3: Corporate Story Telling 03
Basics of storytelling: Setting, characters, plot, crisis, climax, resolution,
Benefits of storytelling
Types of stories: Elevator pitch, product stories, event stories, stories in
presentations, storytelling in SOP’s and interviews, storytelling to manage
conflict or to motivate
Storytelling techniques: Narration using verbal and non-verbal communication,
Analysis of storytelling strategies of corporate master storytellers
Unit 4: Meetings and Documentation
Planning and preparation for meetings: Planning layout of meetings, 02
arranging logistics, defining roles and responsibilities
Strategies for conducting effective meetings: Follow the agenda, record
discussion, observe meeting decorum
Documentation: Draft notice, agenda and minutes of meeting
Business meeting etiquettes: Verbal and non-verbal aspects of etiquettes
Unit 5: Introduction to Interpersonal Skills
Emotional Intelligence: Definition, difference between IQ and EQ, how to 05
develop EQ
Leadership: Types of leadership, leadership styles, case studies
Team Building: Difference between group and team, importance of teamwork,
strategies to be a good team player
Time Management: Importance of time management, cultural views of time,
80/20 rule, time wasters, setting priorities and goals,
Conflict Management: Types of conflicts, strategies to manage conflict, case
studies
Unit 6: Cross-cultural communication and Professional ethics
Communication across cultures: Understanding cultures and developing 02
sensitivity towards cultural differences
Corporate etiquettes: Telephone, dining, cubicle etiquette, etc.
Professional ethics: Effective work habits, accountability, integrity and
excellence
26 | P a g e
Books Recommended:
1. Fred Luthans, “Organizational Behavior”, McGraw Hill, edition
2. Lesiker and Petit, “Report Writing for Business”, McGraw Hill, edition
3. Huckin and Olsen, “Technical Writing and Professional Communication”, McGraw Hill
4. Wallace and Masters, “Personal Development for Life and Work”, Thomson Learning, 12th edition
5. Heta Murphy, “Effective Business Communication”, Mc Graw Hill, edition
6. Sharma R.C. and Krishna Mohan, “Business Correspondence and Report Writing”, Tata McGraw-Hill
Education
7. Ghosh, B. N., “Managing Soft Skills for Personality Development”, Tata McGraw Hill. Lehman,
8. Bell, Smith, “Management Communication” Wiley India Edition, 3rd edition.
9. Dr. Alex, K.,” Soft Skills”, S Chand and Company
10. Subramaniam, R., “Professional Ethics” Oxford University Press.
11. Sandeep Das, “How Business Story Telling Works: Increase Your Influence and Impact” Penguin
Random House India Pvt. Ltd.
Evaluation Scheme:
Laboratory: (Term work)
Term work shall consist of 6 assignments, Group Discussion and Power Point Presentation based on the
business proposal.
The distribution of marks for term work shall be as follows:
Tutorials …………………………………………………. (25) Marks
Business Proposal………………………………………… (15) Marks
Group Discussion…………………………………………. (10) Marks
TOTAL: …………………………………………………... (50) Marks
The final certification and acceptance of term work will be subject to satisfactory performance of
laboratory work and upon fulfilling minimum passing criteria in the term work.
27 | P a g e
Program: Computer Engineering T.Y B. Tech. Semester: V
Course: Innovative Product Development III (DJS22ILLL1)
Objectives:
1. To acquaint the students with the process of identifying the need (considering a societal
requirement) and ensuring that a solution is found out to address the same by designing and
developing an innovative product.
2. To familiarize the students with the process of designing and developing a product, while they
work as part of a team.
3. To acquaint the students with the process of applying basic engineering fundamentals, so as to
attempt at the design and development of a successful value added product.
4. To inculcate the basic concepts of entrepreneurship and the process of self-learning and research
required to conceptualise and create a successful product.
Outcome:
Learner will be able to:
1. Identify the requirement for a product based on societal/research needs.
2. Apply knowledge and skills required to solve a societal need by conceptualising a product,
especially while working in a team.
3. Use standard norms of engineering concepts/practices in the design and development of an
innovative product.
4. Draw proper inferences through theoretical/ experimental/simulations and analyse the impact of
the proposed method of design and development of the product.
5. Develop interpersonal skills, while working as a member of the team or as the leader.
6. Demonstrate capabilities of self-learning as part of the team, leading to life-long learning, which
could eventually prepare themselves to be successful entrepreneurs.
7. Demonstrate product/project management principles during the design and development work and
also excel in written (Technical paper preparation) as well as oral communication.
Guidelines for the proposed product design and development:
Students shall convert the solution designed in semester 3 and 4 into a working model, using
various components drawn from their domain as well as related interdisciplinary areas.
The working model is to be validated with proper justification and the report is to be compiled in
a standard format and submitted to the department. Efforts are to be made by the students to try
and publish the extended technical paper, either in the institute journal, “Techno Focus: Journal
for Budding Engineers” or at a suitable publication, approved by the department research
committee/ Head of the department.
28 | P a g e
Faculty supervisor may provide inputs to students during the entire span of the activity, spread
over 2 semesters, wherein the main focus shall be on self-learning.
A record in the form of an activity log-book is to be prepared by each team, wherein the team can
record weekly progress of work. The guide/supervisor should verify the recorded notes/comments
and approve the same on a weekly basis.
The focus should be on self-learning, capability to design and innovate new products as well as on
developing the ability to address societal problems. Advancement of entrepreneurial capabilities
and quality development of the students through the year long course should ensure that the design
and development of a product of appropriate level and quality is carried out, spread over two
semesters, i.e. during the semesters V and VI.
Guidelines for Assessment of the work:
The review/ progress monitoring committee shall be constituted by the Head of the Department.
The progress of design and development of the product is to be evaluated on a continuous basis,
holding a minimum of two reviews in each semester.
In the continuous assessment, focus shall also be on each individual student’s contribution to the
team activity, their understanding and involvement as well as responses to the questions being
raised at all points in time.
Oral examination should be conducted by Internal and External examiners. Students have to give
presentation and demonstration on their working model
The distribution of marks for term work shall be as follows:
1. Marks awarded by the supervisor based on log-book : 10
2. Marks awarded by review committee : 10
3. Quality of the write-up : 05
The overall work done by the team shall be assessed based on the following criteria;
1. Quality of survey/ need identification of the product.
2. Clarity of Problem definition (design and development) based on need.
3. Innovativeness in the proposed design.
4. Feasibility of the proposed design and selection of the best solution.
5. Cost effectiveness of the product.
6. Societal impact of the product.
7. Functioning of the working model as per stated requirements.
8. Effective use of standard engineering norms.
9. Contribution of each individual as a member or the team leader.
10. Clarity on the write-up and the technical paper prepared.
The semester reviews (V and VI) may be based on relevant points listed above, as applicable.
Guidelines for Assessment of Semester Reviews:
The write-up should be prepared as per the guidelines given by the department.
29 | P a g e
The design and the development of the product shall be assessed through a presentation and
demonstration of the working model by the student team to a panel of Internal and External
Examiners, preferably from industry or any research organisations having an experience of more
than five years, approved by the Head of the Institution. The presence of the external examiner is
desirable only for the 2nd presentation in semester VI. Students are compulsorily required to present
the outline of the extended technical paper prepared by them during the final review in semester
VI.
30 | P a g e
Program: Computer Engineering T.Y B.Tech. Semester: VI
Course: Software Engineering and Project Management (DJS22CEC601)
Course: Software Engineering and Project Management Laboratory (DJS22CEL601)
Prerequisite:
Objectives:
To provide an idea of using various process models in the software industry according to given scenario.
To gain the knowledge of how Analysis, Design, Implementation, Testing and Management processes are
conducted in a software project.
31 | P a g e
2 Requirement Analysis: Requirement Elicitation, Software Requirement Specification 07
(SRS).
Requirement Models: Scenario Based Models, Class Based Models, Behavioural
Models and Flow Models.
3 Design Engineering and Analysis: 06
Design Principles, Design Concepts, Effective Modular Design-Cohesion and
Coupling.
Translating the requirement models into the design model.
Designs
Architectural Design, Component Level Design, User Interface Design.
4 Software Project Management: 08
Project Management Concepts:
Management Spectrum, 3Ps
Process and Project Metrics:
Metrics in the Process and Project Domains, software measurement, metrics for
software quality.
Software Project Estimation: LOC, FP, Empirical Estimation Models COCOMO I
COCOMO II, Specialized Estimation Techniques.
Software Project Scheduling:
Work Breakdown Structure, Network Diagram, Gantt Chart, PERT, CPM,
Stakeholders and Communication plan, Introduction to Project Management
Information System (PMIS).
5 Software Risk Management: 05
Risk Identification, Risk Assessment, Risk Projection, Risk Refinement, RMMM Plan.
32 | P a g e
Text books:
Reference Books:
1. Ali Behfrooz and Fredeick J. Hudson, “Software Engineering Fundamentals”, Oxford University
Press.
2. Pankaj Jalote, “An integrated approach to Software Engineering”, Narosa, 2005
3. Jibitesh Mishra and Ashok Mohanty, “Software Engineering”, Pearson, 2011
4. Rajib Mall, “Fundamentals of Software Engineering”, Prentice Hall India, 2018
1 Prepare detailed statement of problem for the selected / allotted mini project and identify
suitable process model for the same with justification.
2 Develop Software Requirement Specification (SRS) document in IEEE format for the
project.
3 Identify scenarios & develop UML Use case and Class Diagram for the project.
4 Draw DFD (upto 2 levels) and prepare Data Dictionary for the project.
7 Use project management tool to prepare schedule and estimation for the project.
9 Change specification and make different versions using any SCM Tool.
33 | P a g e
10 Develop test cases for the project using testing techniques.
Any other practical covering the syllabus topics and subtopics can be conducted.
34 | P a g e
Program: Computer Engineering T.Y B.Tech. Semester: VI
Course: Machine Learning (DJS22CEC602)
Course: Machine Learning Laboratory (DJS22CEL602)
Pre-requisite: Data Structures, Basic Probability and Statistics, Algorithms, Data Mining
Course Objectives:
1. To introduce students to the basic concepts and techniques of Machine Learning.
2. To become familiar with regression, classification and clustering tasks.
3. To become familiar with Dimensionality reduction Techniques.
3 Dimensionality Reduction: 07
Dimensionality Reduction Techniques: Principal components analysis (Eigen
values, Eigen vectors, Orthogonality), Independent Component Analysis, Single
value decomposition,
35 | P a g e
4 Classification: 08
Classification using Bayesian Belief networks,
Hidden Markov Models
Support Vector Machine: Maximum Margin Linear Separators, Quadratic
Programming solution to finding maximum margin separators, Kernels for learning
non-linear functions.
Classification using k Nearest Neighbour Algorithm
5 Clustering: 07
Basics of clustering, Hard vs Soft Clustering, Density Based Clustering: DBSCAN,
Expectation maximization (EM) for soft clustering, Semi-supervised learning with
EM using labelled and unlabeled data, Radial Basis functions.
Total 39
A minimum of six experiments from the above suggested list or any other experiment based on syllabus
will be included along with the mini project, which would help the learner to apply the concept learnt.
Books Recommended:
Text books:
1. Ethem Alpaydın, Introduction to Machine Learning, 4th Edition, The MIT Press 2020
36 | P a g e
2. Peter Harrington, “Machine Learning In Action”, 1st Edition, Dreamtech Press 2012
3. Tom Mitchell , “Machine Learning”, 1st Edition, McGraw Hill 2017
4. Andreas C, Müller and Sarah Guido, “Introduction to Machine Learning with Python: A Guide for
Data Scientists”, 1st Edition, O'reilly 2016
5. Kevin P. Murphy, “Machine Learning: A Probabilistic Perspective” MIT Press 2012
Reference Books:
1. Aurélien Géron, Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow, 2nd
Edition, 2019
2. Witten Ian H., Eibe Frank, Mark A. Hall, and Christopher J. Pal. “Data Mining: Practical machine
learning tools and techniques”, 1st Edition, Morgan Kaufmann, 2016.
3. Han, Kamber, “Data Mining Concepts and Techniques”, 3rd Edition, Morgan Kaufmann, 2012.
4. Mehryar Mohri, Afshin Rostamizadeh, and Ameet Talwalkar. Foundations of Machine Learning,
The MIT Press, 2012
5. H. Dunham, “Data Mining: Introductory and Advanced Topics”, 1st Edition, Pearson Education,
2006.
37 | P a g e
Program: Computer Engineering T.Y B.Tech. Semester: VI
Course: Information Security (DJS22CEC603)
Course: Information Security Laboratory (DJS22CEL603)
Course Objectives:
1. To acquire fundamental knowledge of modular arithmetic and number theory to establish a
foundational understanding of cybersecurity principles.
2. Grasp the concepts of symmetric and asymmetric cryptography, applying various techniques to
address confidentiality and authentication requirements in information systems.
3. Apply digital signature and hashing algorithms effectively to achieve authentication and integrity
in the design of secure applications, demonstrating practical competence in securing digital
information.
1. Understand system security goals and concepts, classical encryption techniques and acquire
fundamental knowledge on the concepts of modular arithmetic and number theory.
2. Understand the concept of symmetric and asymmetric cryptography and apply the different
techniques to solve confidentiality and authentication.
3. Apply different digital signature and hashing algorithms to achieve authentication and integrity to
design secure applications.
4. Understand network security basics, analyze different attacks on networks and systems, understand
vulnerability and apply preventive measures.
2 Symmetric Cryptography: 06
38 | P a g e
Block cipher principles block cipher modes of operation, Simplified Data
Encryption Standard (DES), DES, Double DES, Triple DES, Simplified Advanced
Encryption Standard (S-AES).
3 Asymmetric Cryptography: 06
Symmetric vs. Asymmetric Cryptography, Principles of public key cryptosystems,
and Essential Number Theory for Public-Key Algorithm: Euler’s Phi Function. The
RSA algorithm, Key management, Diffie Hellman Key exchange, Case Study:
Elliptic curve arithmetic, Elliptic curve cryptography.
5 Network Security: 07
Network security basics: Packet Sniffing, ARP spoofing, port scanning, IP
spoofing, TCP syn flood, DNS Spoofing. Denial of Service: Classic DOS attacks,
Source Address spoofing, ICMP flood, SYN flood, UDP flood, Distributed Denial
of Service, Defenses against Denial-of-Service Attacks. Internet Security
Protocols: SSL, IPSEC, Secure Email: PGP, Firewalls, IDS and types, Honey pots.
Total 39
39 | P a g e
4 Implement RSA Cryptosystem using RSA Algorithm / Implement Elliptical Curve Digital
Signature Algorithm (ECDSA).
5 Demonstrate the data integrity using various cryptographic algorithms viz. MD-5, SHA-1
using VLAB, IIT Bombay.
6 Implement registration webpage asking for information along with the password (Strong
enough). Store the password in database in encrypted form after adding few salt characters
in the password. Verify the strength of password and perform analyses using various attack.
7 Study the use of network reconnaissance tools like WHOIS, dig, traceroute, nslookup to
gather information about networks and domain registrars.
8 Study of packet sniffer tools wireshark, : Download and install wireshark and capture icmp,
tcp, and http packets in promiscuous mode. Explore how the packets can be traced based on
different filters.
9 Implementation of Network Intrusion Detection System using SNORT and IPTABLE
10 Implement DOS Attack using HPing, Hping3 and other tools.
11 Implement Buffer Overflow Attack using Ollydbg, Splint, Cppcheck.
Any other experiment based on syllabus may be included, which would help the learner to understand
topic/concept.
Books Recommended:
Textbooks:
1. William Stallings, “Cryptography and Network Security: Principles and Practice”, 7thEdition,
Pearson Education, 2017.
2. Behrouz A. Forouzan, “Cryptography & Network Security”, Tata Mc Graw Hill, 2007
Reference Books:
1. Bruce Schneier, “Applied Cryptography: Protocols, Algorithms and Source Code in C”, Wiley,
2007.
2. Charles Pfleeger, Shari Lawrence Pfleeger & Jonathan Margulies, “Security in Computing”, 5th
Edition, Prentice Hall, 2018.
3. Michael Howard, Steve Lipner, “The Secured Development Life Cycle”, Microsoft Press, 2006.
40 | P a g e
Program: Computer Engineering T.Y B.Tech. Semester: VI
Course: Advanced Network Design (DJS22CEC6011)
Course: Advanced Network Design Laboratory (DJS22CEL6011)
Course Objectives:
1. To develop a comprehensive understanding of advanced network design principles and their
strategic implications.
2. To acquire proficiency in the practical implementation of network designs, including physical
infrastructure, configurations, and lifecycle management.
3. To apply analytical skills to assess network data traffic, security threats, and performance metrics
for informed decision-making.
41 | P a g e
3 Configuring and Managing the Network Infrastructure: 06
3.1 Network Configuration Best Practices: Implementation of network designs,
Configuration management and version control
3.2 Network Lifecycle Management: Maintenance and troubleshooting strategies,
Network monitoring and performance optimization
4 Analyzing Network Data Traffic: 06
4.1 Traffic Analysis Fundamentals: Packet capture and analysis tools,
Understanding network protocols
4.2 Quality of Service (QoS) Implementation, QoS requirements and strategies,
Traffic classification and shaping
5 Network Security and IPv6: 06
5.1 Threats and Vulnerabilities in Networks: Common network security threats,
Vulnerability assessment and risk analysis
5.2 Firewall and Intrusion Detection/Prevention Systems, Designing and placing
firewalls strategically, Intrusion detection and prevention strategies
5.3 Virtual Private Networks (VPNs) and IPv6: Implementing VPNs for security,
Integration of IPv6 in network design
6 Internet Routing and VOIP: 07
6.1 Internet Routing with BGP: BGP essentials and best practices, Internet routing
considerations
6.2 Voice over IP (VoIP) Basics: Introduction to VoIP technologies, Design
considerations for VoIP in networks
6.3 Case Studies and Best Practices: Examining real-world examples of advanced
network design, best practices for implementing advanced network solutions
Total 39
42 | P a g e
10 Configure and deploy Virtual Private Networks (VPNs) for secure communication
A minimum of six to eight experiments from the above suggested list or any other experiment based on
syllabus will be included along with the mini project, which would help the learner to apply the concept
learnt.
Books Recommended:
Text Books:
Reference books:
43 | P a g e
Program: Computer Engineering T.Y B.Tech. Semester: VI
Course: High Performance Computing (DJS22CEC6012)
Course: High Performance Computing Laboratory (DJS22CEL6012)
Course Objectives:
1. To design, develop and analyze parallel programs on high performance computing resources using
parallel programming.
2. Learn to design parallel programs on high performance computing
1. Describe parallel processing approaches and different parallel processing platforms involved in
achieving High Performance Computing.
2. Discuss different design issues in parallel programming
3. Develop efficient and high-performance parallel programming
4. Understand parallel programming using message passing paradigm using open-source APIs.
44 | P a g e
4 Parallel Algorithm Design Principles of Parallel Algorithm Design: 07
Preliminaries, Decomposition Techniques, Characteristics of Tasks and
Interactions, Mapping Techniques for Load Balancing, Methods for Containing
Interaction Overheads. Parallel Algorithm Models, Basic Communication
operations: Broadcast and Reduction Communication types.
45 | P a g e
A minimum of six experiments from the above suggested list or any other experiment based on syllabus
will be included along with the mini project, which would help the learner to apply the concept learnt.
Text Books:
1. AnanthGrama, Anshul Gupta, George Karypis, Vipin Kumar , ―Introduction to Parallel
Computing‖, Pearson Education, Second Edition, 2007.
2. M. R. Bhujade, ―Parallel Computing‖, 2nd edition, New Age International Publishers, 2009.
3. Kai Hwang, Naresh Jotwani, ―Advanced Computer Architecture: Parallelism, Scalability,
Programmability‖, McGraw Hill, Third Edition, 2017.
4. Georg Hager, Gerhard Wellein, ―Introduction to High Performance Computing for Scientists and
Engineers", Chapman & Hall / CRC Computational Science series, 2011.
Reference Books:
1. Michael J. Quinn, ―Parallel Programming in C with MPI and OpenMP‖, McGraw-Hill
International Editions, Computer Science Series, 2008.
2. Kai Hwang, Zhiwei Xu, ―Scalable Parallel Computing: Technology, Architecture,
Programming‖, McGraw Hill, 1998.
3. Laurence T. Yang, MinyiGuo, ―High- Performance Computing: Paradigm and Infrastructure‖
Wiley, 2006.
46 | P a g e
Program: Computer Engineering T.Y B.Tech. Semester: VI
Course: Business Analytics (DJS22CEC6013)
Course: Business Analytics Laboratory (DJS22CEL6013)
47 | P a g e
3 Reading SAS Dataset, Generating Statistical Reports: 07
Accessing Data: Examining SAS Data sets, Accessing SAS Libraries
Producing Detail Reports: Subsetting Report data, Sorting and Grouping
Report data, Enhancing Reports
Formatting Data Values: Using SAS Formats, User defined Formats
Reading SAS Dataset. Importing data into SAS from various sources.
Generating Statistical Reports for the imported data into SAS. Interpretation of
the Statistical Reports.
4 Using the Explorer in Visual Analytics: 06
Selecting Data and defining Data Item properties. Creating Visualisations,
Enhancing Visualisations with Analytics Interacting with Visualizations and
Explorations
5 06
Designing Reports
Creating a Simple Report. Creating Data Items and Working with Graphs
Working with Filters and Report sections. Working with other objects.
Applying Graph level display rules in Reports.
6 Viewing SAS VA Reports and Case Study 06
Creating Analysis and Reports. Text Analytics. Case Study – Applying to
different Business Scenarios.
TOTAL 39
48 | P a g e
8. Analyzing a Text data source.
A minimum of six experiments from the above suggested list or any other experiment based on syllabus
will be included along with the mini project, which would help the learner to apply the concept learnt.
Books Recommended:
1. Efraim Turban, Ramesh Sharda, Dursun Delen, “Business Intelligence and Analytics “,
Pearson,2019.
2. SAS programming 1 – Essentials.
3. SAS Visual Analytics – Fast Track.
4. SAS Support
Reference Books:
1. R.N Prasad, Seema Acharya: Fundamentals of Business Analytics, Wiley 2nd Edition,2019.
2. U. Dinesh Kumar: Business Analytics: The Science of Data-Driven Decision Making,
Wiley, 2nd Edition,2021.
3. Regi Mathew: Business Analytics for Decision Making, Pearson 1st Edition,2020.
49 | P a g e
Program: Computer Engineering T.Y B.Tech. Semester: VI
Course: Compiler Design (DJS22CEC6014)
Course: Compiler Design Laboratory (DJS22CEL6014)
Course Objectives:
1. To initiate an understanding of compilers in general and in brief about phases of compiler.
2. To provide a theoretical framework for optimizing the code.
3. To familiarize and encourage the students to use various compiler construction tools.
Intermediate-Code Generation:
Variants of Syntax Trees, Three-Address Code, Types and Declarations, Type
Checking, Control Flow, Switch-Statements, Intermediate Code for Procedures.
4 Code Optimization 6
50 | P a g e
Introduction– Principal Sources of Optimization – Optimization of basic Blocks –
DAG representation of Basic Blocks - Introduction to Global Data Flow Analysis
5 Runtime Environments: Source Language issues – Storage Organization – 5
Storage Allocation strategies – Access to non-local names – Parameter Passing,
Error detection and recovery.
6 Code generation: 5
Issues in the design of Code Generator, Basic Blocks and Flow graphs, Code
generation algorithm, DAG representation of Basic Block.
Total 39
Books Recommended:
Textbook:
1. A. V. Aho, R. Shethi, Monica Lam, J.D. Ulman: Compilers Principles, Techniques and Tools, Pearson
Education, Second Edition.
Reference books:
1. Lex & yacc, 2nd Edition by John R. Levine, Tony Mason & Doug Brown O ‘Reilly
2. Compiler construction: principles and practices, Kenneth C.Louden , CENGAGE Learning
51 | P a g e
Program: Computer Engineering T.Y B. Tech. Semester: VI
Course: Virtual Reality (DJS22CEC6015)
Course: Virtual Reality Laboratory (DJS22CEL6015)
Objectives:
The objective of the course is to equip students with the fundamental knowledge of Virtual Reality
Acquire practical knowledge of 3D user interface input hardware, including tracking devices, 3D
mice, and specialized input devices, and learn how to choose the most suitable input devices for
various 3D interface applications.
Gain proficiency in VR programming using VRML and Java 3D, enabling the creation of
interactive and engaging virtual environments.
To make students know the basic concept and understand the framework of virtual reality
To understand principles and multidisciplinary features of virtual reality and apply it in developing
applications.
To know the technology for multimodal user interaction and perception VR, particularly the visual,
audial and haptic interface and behaviour.
To understand an introduction to the AR system framework and apply AR tools in software
development.
52 | P a g e
3 Software Technologies: Database - World Space, World Coordinate, 07
World Environment, Objects - Geometry, Position / Orientation, Hierarchy,
Bounding Volume, Scripts and other attributes, VR Environment - VR
Database, Tessellated Data, LODs, Cullers and Occluders, Lights and
Cameras, Scripts, Interaction - Simple, Feedback, Graphical User Interface,
Control Panel, 2D Controls, Hardware Controls, Room / Stage / Area
Descriptions, World Authoring and Playback, VR toolkits, Available
software in the market
4 3d Interaction Techniques: 3D Manipulation tasks, Manipulation 08
Techniques and Input Devices, Interaction Techniques for 3D
Manipulation, Design Guidelines - 3D Travel Tasks, Travel Techniques,
Design Guidelines - Theoretical Foundations of Wayfinding, User Centred
Wayfinding Support, Environment Centred Wayfinding Support,
Evaluating Wayfinding Aids, Design Guidelines - System Control,
Classification, Graphical Menus, Voice Commands, Gestural Commands,
Tools, Multimodal System Control Techniques, Design Guidelines, Case
Study: Mixing System Control Methods, Symbolic Input Tasks, symbolic
Input Techniques, Design Guidelines, Beyond Text and Number entry
5 Designing And Developing 3d User Interfaces: Strategies for Designing and 08
Developing Guidelines and Evaluation.
Virtual reality programming using VRML and Java 3D
VIRTUAL REALITY APPLICATIONS: Engineering, Architecture,
Education, Medicine, Entertainment, Science, Training.
6 Augmented and Mixed Reality 04
Taxonomy, technology and features of augmented reality, difference between
AR and VR, Challenges with AR, AR systems and functionality, Augmented
reality methods, visualization techniques for augmented reality, wireless
displays in educational augmented reality applications, mobile projection
interfaces, marker-less tracking for augmented reality, enhancing
interactivity in AR environments, evaluating AR systems.
Total 39
Students are supposed to complete any one mini project related to Virtual Reality (max group of 3
students).
Books Recommended:
Textbooks:
53 | P a g e
2. Doug A Bowman, Ernest Kuijff, Joseph J LaViola, Jr and Ivan Poupyrev, “3D User Interfaces,
Theory and Practice”, Addison Wesley, USA, 2005.
3. Christopher D. Watkins, Stephen R. Marenka ,“Virtual Reality Excursions with Programs in C”
Elsevier Science, 2014.
Reference Books:
1. Alan B Craig, William R Sherman and Jeffrey D Will, “Developing Virtual Reality Applications:
Foundations of Effective Design”, Morgan Kaufmann, 2009.
2. Gerard Jounghyun Kim, “Designing Virtual Systems: The Structured Approach”, 2005.
3. Oliver Bimber and Ramesh Raskar, “Spatial Augmented Reality: Meging Real and Virtual Worlds”,
2005.
4. William R Sherman and Alan B Craig, “Understanding Virtual Reality: Interface, Application and
Design (The Morgan Kaufmann Series in Computer Graphics)”. Morgan Kaufmann Publishers, San
Francisco, CA, 2002
5. Alan B. Craig, Understanding Augmented Reality, Concepts and Applications, Morgan Kaufmann,
2013.
Online Resources:
1. https://archive.nptel.ac.in/courses/106/106/106106138
2. https://www.coursera.org/specializations/virtual-reality
3. https://www.edx.org/certificates/professional-certificate/ucsandiegox-virtual-reality-app-
development
54 | P a g e
Program: Computer Engineering T.Y B.Tech. Semester: VI
Course: DevOps Laboratory (DJS22CEL604)
Pre-requisite:
1. Knowledge of Linux Operating system, installation and configuration of services and command line
basics.
2. Software Development Life cycle.
Course Objectives:
1. To understand the fundamentals of DevOps engineering.
2. To be proficient with DevOps terminologies, concepts, benefits, and deployment options to meet
real world software development requirements.
55 | P a g e
Continuous Testing:
Introducing WebDriver and WebElements, Selenium Testing Tools, Differences
between Selenium 2 and Selenium 3, Setting up a project in Eclipse with Maven
5 and TestNG using Java, WebElements, Locating WebElements using WebDriver, 08
Interacting with WebElements, Different Available WebDrivers, Using Java 8
Features with Selenium.
Introducing Java 8 Stream API, Using Stream API with Selenium WebDriver.
Continuous Management:
The Parts of an Infrastructure System, Infrastructure Platforms, Infrastructure
Resources, Compute Resources, Storage Resources, Network Resources.
Puppet: Puppet Architecture, The Puppet Server, setting up the Puppet Agent,
6 Performance Optimizations, 06
Ansible: Ansible Architecture, Ansible and Infrastructure Management, Local
Infrastructure Development: Ansible and Vagrant.
Introduction to open-source tools for data gathering and management, AWS
Total 39
56 | P a g e
Books Recommended:
Textbook:
1. Karl Matthias & Sean P. Kane, “Docker: Up and Running”, 3 rd Edition, O'Reilly Publication,
2022.
2. Craig Berg, “DevOps For Beginners: A Complete Guide To DevOps Best Practices” 2020.
3. Mikael Krief, “Learning DevOps: A comprehensive guide to accelerating DevOps culture
adoption with Terraform, Azure DevOps, Kubernetes, and Jenkins”, Packt Publication, 2nd Edition,
2022.
4. Gene Kim, Jez Humble, et.el, “The DevOps Handbook: How to Create World-Class Agility,
Reliability, & Security in Technology Organizations”, IT Revolution Press; 2nd edition 2021.
5. Mark Reed, “DevOps: The Ultimate Beginners Guide to Learn DevOps Step-By-Step", LLC
Publication, 2020.
6. Deepak Gaikwad, Viral Thakkar, “DevOps Tools from Practitioner's Viewpoint”, Wiley,2019.
Reference books:
1. Mark S. Merkow, “Practical Security for Agile and DevOps”, CRC Press Taylor & Francis, 2022.
2. Emily Freeman, “DevOps for Dummies”, 3rd Edition, Wiley Publication,2019.
3. Martin Alfke , Felix Frank, “Puppet 5 Essentials", 3rd Edition, O'Reilly Publication,2017.
57 | P a g e
Program: Computer Engineering T.Y B. Tech. Semester: VI
Course: Innovative Product Development IV (DJS22ILLL2)
Objectives:
1. To acquaint the students with the process of identifying the need (considering a societal
requirement) and ensuring that a solution is found out to address the same by designing and
developing an innovative product.
2. To familiarize the students with the process of designing and developing a product, while they
work as part of a team.
3. To acquaint the students with the process of applying basic engineering fundamentals, so as to
attempt at the design and development of a successful value added product.
4. To inculcate the basic concepts of entrepreneurship and the process of self-learning and research
required to conceptualise and create a successful product.
Outcome:
Learner will be able to:
1. Identify the requirement for a product based on societal/research needs.
2. Apply knowledge and skills required to solve a societal need by conceptualising a product,
especially while working in a team.
3. Use standard norms of engineering concepts/practices in the design and development of an
innovative product.
4. Draw proper inferences through theoretical/ experimental/simulations and analyse the impact of
the proposed method of design and development of the product.
5. Develop interpersonal skills, while working as a member of the team or as the leader.
6. Demonstrate capabilities of self-learning as part of the team, leading to life-long learning, which
could eventually prepare themselves to be successful entrepreneurs.
7. Demonstrate product/project management principles during the design and development work and
also excel in written (Technical paper preparation) as well as oral communication.
Guidelines for the proposed product design and development:
Students shall convert the solution designed in semester 3 and 4 into a working model, using
various components drawn from their domain as well as related interdisciplinary areas.
The working model is to be validated with proper justification and the report is to be compiled in
a standard format and submitted to the department. Efforts are to be made by the students to try
and publish the extended technical paper, either in the institute journal, “Techno Focus: Journal
for Budding Engineers” or at a suitable publication, approved by the department research
committee/ Head of the department.
58 | P a g e
Faculty supervisor may provide inputs to students during the entire span of the activity, spread
over 2 semesters, wherein the main focus shall be on self-learning.
A record in the form of an activity log-book is to be prepared by each team, wherein the team can
record weekly progress of work. The guide/supervisor should verify the recorded notes/comments
and approve the same on a weekly basis.
The focus should be on self-learning, capability to design and innovate new products as well as on
developing the ability to address societal problems. Advancement of entrepreneurial capabilities
and quality development of the students through the year long course should ensure that the design
and development of a product of appropriate level and quality is carried out, spread over two
semesters, i.e. during the semesters V and VI.
Guidelines for Assessment of the work:
The review/ progress monitoring committee shall be constituted by the Head of the Department.
The progress of design and development of the product is to be evaluated on a continuous basis,
holding a minimum of two reviews in each semester.
In the continuous assessment, focus shall also be on each individual student’s contribution to the
team activity, their understanding and involvement as well as responses to the questions being
raised at all points in time.
Oral examination should be conducted by Internal and External examiners. Students have to give
presentation and demonstration on their working model
The distribution of marks for term work shall be as follows:
1. Marks awarded by the supervisor based on log-book : 10
2. Marks awarded by review committee : 10
3. Quality of the write-up : 05
The overall work done by the team shall be assessed based on the following criteria;
1. Quality of survey/ need identification of the product.
2. Clarity of Problem definition (design and development) based on need.
3. Innovativeness in the proposed design.
4. Feasibility of the proposed design and selection of the best solution.
5. Cost effectiveness of the product.
6. Societal impact of the product.
7. Functioning of the working model as per stated requirements.
8. Effective use of standard engineering norms.
9. Contribution of each individual as a member or the team leader.
10. Clarity on the write-up and the technical paper prepared.
The semester reviews (V and VI) may be based on relevant points listed above, as applicable.
Guidelines for Assessment of Semester Reviews:
The write-up should be prepared as per the guidelines given by the department.
59 | P a g e
The design and the development of the product shall be assessed through a presentation and
demonstration of the working model by the student team to a panel of Internal and External
Examiners, preferably from industry or any research organisations having an experience of more
than five years, approved by the Head of the Institution. The presence of the external examiner is
desirable only for the 2nd presentation in semester VI. Students are compulsorily required to present
the outline of the extended technical paper prepared by them during the final review in semester
VI.
60 | P a g e