MSC CS Part I
MSC CS Part I
SYLLABUS
SR. Graduate
After completion of M.Sc. program students will acquire
NO. Attribute
Skills required for cutting edge research, investigations, field Research skills
PO6 study, documentation, networking, and ability to build logical
arguments using scholarly evidence.
The ability to understand ethical responsibilities and impact of Moral and ethical
scientific solutions in global, societal and environmental context awareness/
PO8
and contribute to the sustainable development multicultural
competence
An ability to translate the knowledge and demonstrate the skills Life-long learning
PO11 required to be employed and successful professional
development.
Masters in Science (Computer)
Syllabus for Semester I and II
Preamble:
In accordance with the principles outlined in the National Education Policy (NEP), the
educators and stakeholders of higher education in Computer Science, envision a dynamic
and research-oriented learning experience for students pursuing their Master of Science
degree in Computer Science. This program is designed to cultivate advanced knowledge,
critical thinking, and practical skills in various domains of computer science, including
research-based subjects such as analysis of algorithms, robotics, machine learning, compiler
design, research methodology, wireless sensor networks, and advanced database
management systems (ADBMS). Recognizing the rapidly evolving nature of the field and
the increasing demand for skilled professionals, our goal is to equip students with a
comprehensive understanding of theoretical concepts and practical applications in these
specialized areas. The M.Sc. Computer Science program emphasizes the development of
advanced analytical and problem-solving abilities, fostering a spirit of innovation and
research within the discipline.
Machine learning, a rapidly growing field, equips students with the tools and techniques to
develop algorithms that enable computers to learn and make predictions or decisions without
explicit programming. Compiler design focuses on the theory and practice of translating
high-level programming languages into machine code, essential for efficient program
execution. Research methodology prepares students to undertake independent research,
equipping them with skills in literature review, experimental design, data analysis, and
scientific writing.
Wireless sensor networks encompass the study of distributed systems composed of
interconnected sensors capable of gathering and transmitting data wirelessly, opening
avenues for applications in environmental monitoring, healthcare, and smart cities.
Advanced database management systems delve into the intricacies of data organization,
storage, retrieval, and query optimization in large-scale databases, crucial for efficient and
secure data management. Through this research-focused curriculum, we aim to foster a
culture of intellectual curiosity, innovation, and critical inquiry among our students. The
program encourages students to actively engage in research projects, collaborate with
faculty members, and contribute to the body of knowledge in computer science through their
own research endeavors.
Furthermore, the M.Sc. Computer Science program recognizes the importance of ethical
considerations in research and the responsible use of technology. Students are encouraged
to conduct their research with integrity, adhere to ethical guidelines, and consider the social
implications of their work. This ensures that our graduates not only possess technical
expertise but also act as ethical leaders and responsible contributors to the field.
We are committed to providing an inclusive and diverse learning environment that fosters
equal opportunities for all students, regardless of their background. The M.Sc. Computer
Science program promotes diversity, equity, and inclusion, encouraging students from
diverse communities to participate actively and contribute to the advancement of computer
science.
With the implementation of the National Education Policy as our guiding framework, we
envision that the M.Sc. Computer Science program will produce highly skilled professionals
and researchers who can address the evolving challenges and opportunities in the field. Our
graduates will be equipped with the necessary knowledge, research acumen, and ethical
mindset to make significant contributions to academia, industry, and society as a whole.
Additionally, we extend our gratitude to the members of the Board of Studies (BoS) for their
valuable contributions in shaping the curriculum of the M.Sc. Computer Science program.
Their expertise and insights have played a crucial role in ensuring that the syllabi align with
the principles of the National Education Policy and meet the evolving needs of the industry
and academia. We appreciate their dedication and commitment to maintaining academic
excellence and fostering innovation in computer science education.
PROGRAMME SPECIFIC OUTCOME (PSO)
Description
PSO After completing Master’s Degree in Computer Science learners will be
able to:
Understand the core and advanced subjects of Computer Science and its logical
PSO 1
application to solve real-life case studies using Emerging technologies
Get exposure to modern software tools and lifelong learning for professional
PSO 3
development
Scheme of Examination
Sr.
Particular Marks
No.
One periodical class test / online examination to be
01 20 Marks
conducted in the given semester
Test on Practical Skills/ Case studies /Group/ Individual Survey
02 Project/Presentation and write up on the selected topics of the subjects/ 15 Marks
Test based on tutorials /Book Review / Open Book Test
Active participation in routine class instructional deliveries and overall
03 conduct as a responsible learner, mannerism and articulation and exhibit 05 Marks
of leadership qualities in organizing related academic activities
Question Paper Pattern
(Periodical Class Test)
Maximum Marks: 20 Duration: 40 Minutes
Questions to be set: 02
All Questions are Compulsory
Question Particular Marks
No.
Q-1 Match the Column / Fill in the Blanks / Multiple Choice Questions/ 10
Answer in One or Two Lines (Concept based Questions) ( 1 Marks / 2 Marks
Marks each)
Q-2 Answer in Brief (Attempt any Two of the Three) (5 Marks each) 10
Marks
❖ Passing Standard
The learners shall have to obtain a minimum of 40% marks in aggregate for each course where the course
consists of Internal Assessment and Semester End Examination. The learners shall obtain minimum of 40%
marks (i.e. 16 out of 40) in the Internal Assessment and 40% marks in Semester End Examination (i.e. 24
Out of 60) separately, to pass the course and minimum of grade D in each project wherever applicable to pass
a particular semester.
40
1 Laboratory Work
05
2 Journal
05
3 Viva
50
TOTAL
Minimum 75 % practical from each core subject are required to be completed and written in the journal.
(Certified Journal is compulsory for appearing at the time of Practical Exam) --------
Semester – I
Minor
Total Credits 22
Semester – II
OJT/FP/CEP/RP
On Job Training 4 -
Total Credits 22
Course Description
Semester I
Credit 4
Hours 60
Course Objectives:
● To recognize designing and backtracking techniques of an algorithm
● To cognize analysis techniques, number theoretic and Np completeness aspects of an
algorithm
● To analyze various research problems and ways to solve specific problems
● To develop an approach towards research and implementation in the form of a research paper
Course Outcomes:
Learners will be able to:
● Describe advanced strategies of an algorithm
● Discuss the analysis techniques, number theoretic and NP completeness perspectives of
an algorithm
● Discover a research problem and find a way to solve a specific research problem
● Create a research paper with professional skills
Syllabus Total
60 L
Text book:
● Introduction to Algorithms, Third Edition, Thomas H. Cormen, Charles E.
Leiserson, Ronald L. Rivest, Clifford Stein, PHI Learning Pvt. Ltd-New Delhi
(2009)
● Researching Information Systems and Computing, Brinoy J Oates, Sage
Publications India Pvt. Ltd (2006)
References:
● Algorithms, Sanjoy Dasgupta, Christos H. Papadimitriou, Umesh Vazirani,
McGraw- Hill Higher Education (2006).
● Grokking Algorithms: An illustrated guide for programmers and other curious
people, MEAP, Aditya Bhargava, http://www.manning.com/bhargava
● Research Methodology, Methods and Techniques, Kothari, C.R.,1985, third edition,
New Age International (2014)
● Basic of Qualitative Research (3rd Edition), Juliet Corbin & Anselm Strauss, Sage
Publications (2008).
● Research Methodology, third edition by C. R. Kothari, Gaurav Garg
2 Write a program to implement a merge sort algorithm. Compare the time and memory
complexity.
9 Write a program to implement a greedy set cover algorithm to solve the set covering
problem.
10 Implement the following algorithm using an array as a data structure and analyze
its time complexity. a. Bubble sort b. Radix sort c. Selection sort d. Heap sort
e. Bucket sort f. Insertion sort
11 Implement N Queen's problem using Backtracking.
14 Write a program to find a solution for the knapsack problem using greedy methods.
Semester I
Credit 4
Hours 60
Course Objectives:
● To understand the working principles of physical components of robotic system
● To learn the internal and external perceptions of the robot based on different types of sensors
● To impart the knowledge about planning, mapping, and navigation of robot
● To provide hands-on practice to build actual robot
Course Outcomes:
Learners will be able to:
1. Describe the concepts of robotics and its components
2. Analyze the internal and external perceptions of the robot based on different types of
sensors
3. Evaluate the planning, mapping, and navigation of robots
4. Construct a robot using Raspberry Pi
Syllabus Total
45L
● The Robotics Primer by Maja J Matarić, MIT press Cambridge, Massachusetts, London,
England (2007).
1 Write a program to create a robot with gear and move it forward, left, right.
2 Write a program to create a robot without gear and move it forward, left, right.
3 Write a program to create a robot with two motors and move it forward, left, right.
13 Add the sensor to the robot objects and develop line following behavior code.
Semester I
Credit 4
Hours 60
Course Objectives:
● To understand connection between different wireless devices and their compatibility
● To learn sensor node hardware & network architecture
● To conceptualize the framework of wireless network
Course Outcomes:
Learners will be able to:
1. Understand various applications of wireless sensor networks
2. Describe the concepts, protocols, design and implementation of wireless sensor networks.
3. Evaluate new ideas for solving wireless sensor network design issues
Syllabus Total
60 L
Perform following practical’s using INET Framework for OMNeT++, NetSim , TOSSIM,
Cisco packet tracer 6.0 and higher version.
1 Understanding the Sensor Node Hardware. (For Eg. Sensors, Nodes(Sensor mote),
Base Station, Graphical User Interface.)
Networks
Semester I
Credit 4
Hours 60
Course Objectives:
● To impart knowlede and skills requrired for research metodology.
● To gain the knowledge of research paper writing without violating professional ethics.
Course Outcomes:
Learners will be able to:
1. Formulate research problem and carry out research analysis
2. Follow research ethics.
3. Understand about IPR and filing patents in R & D.
Syllabus Total
60 L
Research Methodology
Objectives and motivation of research, Types of research , Research
Unit I 15 L
approaches , Significance of research , Research methods verses
methodology , Research and scientific method ,Importance of
research methodology , Research process ,Approaches of
investigation of solutions for research problem, data collection,
analysis, interpretation, necessary instrumentations, Criteria of
good research.
Defining the research problem: Definition of research problem,
Problem Formulation, Necessity of defining the problem,
Technique involved in defining a problem.
Unit II 15 L
Literature survey and data collection:
Importance of literature survey - Sources of information, Assessment
of quality of journals and articles, Information through internet.
Effective literature studies approaches, analysis, plagiarism, and
research ethics, Data - Preparing, Exploring, examining and
displaying.
Unit-III 15 L
Research design and analysis Meaning of research design, Need of
research design , Different research designs , Basic principles of
experimental design,Developing a research plan , Design of experimental
set-up , Use of standards and codes, Overview of Multivariate analysis,
Hypotheses testing and Measures of Association, Presenting Insights and
findings using written reports and oral presentation.
Semester I
Credit 2
Hours 30
Course Objectives:
● To understand distributed database systems.
● To explore the concepts of object-oriented, temporal, spatial databases and deductive database.
Course Outcomes:
Learners will be able to:
1. Describe the concept of distributed database systems.
2. Illustrate data modeling and database development processes for object-oriented,
temporal, spatial databases and deductive databases.
Syllabus Total
30 L
5 Create different types that include attributes and methods. Define tables for these types
by adding a sufficient number of tuples. Demonstrate insert, update and delete
operations on these tables. Execute queries on them
6 Create a temporal database and issue queries on it.
7 Create a table that stores spatial data and issue queries on it.
Module/ Course Description Hrs. CO PSO PO No.
Unit No. No.
1 Distributed Database Concepts 15h 1 1 1
Semester I
Credit 2
Hours 30
Course Objectives:
To be able to formulate machine learning problems corresponding to different applications.
To be able to apply machine learning algorithms to solve problems of moderate
complexity.
Course Outcomes:
Learners will be able to:
1. Analyze the models using different Machine Learning techniques.
2. Create probabilistic and unsupervised learning models for handling unknown patterns.
Syllabus Total
30 L
Text books:
References:
● Introduction to Machine Learning (Second Edition): Ethem Alpaydın, The MIT Press (2010).
● Pattern Recognition and Machine Learning: Christopher M. Bishop, Springer (2006)
● Bayesian Reasoning and Machine Learning: David Barber, Cambridge University Press (2012)
● Machine Learning: The Art and Science of Algorithms that Make Sense of Data: Peter Flach,
Cambridge University Press (2012) Machine Learning for Hackers: Drew Conway and John
Myles White, O'Reilly (2012)
● Machine Learning in Action: Peter Harrington, Manning Publications (2012).
● Machine Learning with R: Brett Lantz, Packt Publishing (2013)
1 Implement a simple linear regression model on a standard data set and plot the least
square regression fit. Comment on the result. [One may use inbuilt data sets like Boston,
Auto etc]
2 Implement multiple regression model on a standard data set and plot the least square
regression fit. Comment on the result. [One may use inbuilt data sets like Carseats,
Boston etc].
3 Fit a classification model using logistic regression on a standard data set and compare
the results. [Inbuilt datasets like Smarket, Weekly, Auto, Boston etc may be used for
the purpose].
6 Use bootstrap to give an estimate of a given statistic. [Datasets like Auto, Portfolio and
Boston etc may be used for the purpose].
7 For a given data set, split the data into two training and testing and fit the Linear model
using least squares training set.
8 For a given data set, split the data into two training and testing and fit the following on
training set:
(i) Ridge regression model
(ii) Lasso model
Report test errors obtained in each case and compare the results. [Data sets like
College, Boston etc may be used for the purpose].
9 For a given data set, split the data into two training and testing and fit the following on
the training set:
(i) PCR model
(ii) PLS model
Report test errors obtained in each case and compare the results. [Data sets like
College, Boston etc may be used for the purpose].
10 For a given data set, Perform the polynomial regression and make a plot of the
resulting polynomial fit to the data.
Make a plot of the fit to the data. [Use a data set like Wage for the purpose].
11 For a given data set, Fit a step function and perform cross validation to choose the
optimal number of cuts. Make a plot of the fit to the data. [Use a data set like Wage for
the purpose].
Course Description
Semester II
Credit 4
Hours 60
Course Objectives:
Course Outcomes:
Text book:
● Rajkumar Buyya, “Cloud computing principles and paradigms”, Wiley
● Gautam Shroff, Enterprise Cloud Computing, Cambridge
● Rajkumar Buyya, “Mastering Cloud computing”, McGraw Hill
● Tim Mather, Subra K, Shahid L.,Cloud Security and Privacy, Oreilly, ISBN-13 978-
81-8404-815-5
● Distributed and cloud computing from parallel processing to the internet of things
by Kai Hwang, Geoffry C. Fox, and Jack J. Dongarra
References:
● Kai Hwang, Jack Dongarra, Geoffrey Fox: Distributed and Cloud Computing, From
Parallel Processing to the Internet of Things, MK Publishers, 2012. 2.
● Michael Miller, Cloud Computing: Web-Based Applications that change the Way you
work and collaborate Online, Pearson Publication, 2012.
● Dr. Kumar Saurabh,”Cloud Computing”, Wiley Publication
Sr. No. List of Practical Experiments
Semester II
Credit 4
Hours 60
Course objectives:
● To understand the core concepts of Natural language processing and levels of language
analysis
● To understand the basic algorithms and techniques used in NLP, such as word, syntactic,
semantic and sentiment analysis.
● To examine the concept of Word Sense Disambiguation, Part of Speech (PoS) tagging
Course outcomes:
Learners will be able to
1. Design and implement NLP applications that solve real-world problems such as
sentiment analysis, named entity recognition, and machine translation.
2. Develop practical skills in implementing NLP techniques for word level, syntactic, and
semantic analysis to solve real-world problems.
3. Demonstrate a solid understanding of the fundamental concepts and techniques of NLP,
including linguistic theories, parsing, tokenization, and part-of-speech tagging
Syllabus Total
60L
Unit III Semantic & Sentiment Analysis: Elements of Semantic Analysis, 15L
Homonymy, Polysemy, Synonymy, Hyponymy, Meaning Representation,
Approaches to Meaning Representations, Need of Meaning
Representations, Lexical Semantics, Importance of sentiment analysis,
Types and challenges of sentiment analysis
Unit IV Word Sense Disambiguation: Evaluation of WSD, Approaches,
Methods , Applications and Difficulties in WSD, Word Sense
Disambiguation (WSD) Applications: Named Entity Recognition,
Information retrieval, Question answers system, Machine
translation
Discourse Processing: Concept of coherence, Discourse structure,
Algorithms for Discourse Segmentation, Text coherence, Reference
Resolution.
Text Books:
1. Daniel Jurafsky, James H. Martin ―Speech and Language Processing‖ Second
Edition, Prentice Hall, 2008.
2. Christopher D.Manning and Hinrich Schutze, ― Foundations of Statistical Natural
Language Processing ―, MIT Press, 1999.
3. D. Jurafsky, J. H. Martin, “Speech and Language Processing”, Pearson Education,
2002.
References:
1. Siddiqui and Tiwary U.S., Natural Language Processing and Information Retrieval,
Oxford University Press (2008).
2. https://monkeylearn.com/sentiment-analysis
3. Daniel M Bikel and Imed Zitouni ― Multilingual natural language processing
applications‖ Pearson, 2013
4. Alexander Clark (Editor), Chris Fox (Editor), Shalom Lappin (Editor) ― The
Handbook of Computational Linguistics and Natural Language Processing ― ISBN:
978-1-118
5. Steven Bird, Ewan Klein, Natural Language Processing with Python, O‘Reilly
5. Brian Neil Levine, An Introduction to R Programming
6. Niel J le Roux, Sugnet Lubbe, A step by step tutorial: An introduction into R application and
programming
7. Christopher D. Manning, Hinrich Schutze, Foundations of Statistical Natural Language Processing,
The MIT Press, Cambridge, Massachusetts, 1999.
Note: - The following set of practicals can be performed using any Python
Libraries for NLP such as NLTK, spaCy, genism:
Link:-https://www.python.org/downloads/
4 Write a program to implement PoS tagging using HMM & Neural Model
8 Write a program to implement Text Summarization for the given sample text
12 Write a program to build a system that translates text from one language to another.
Semester II
Credit 4
Hours 60
Course Objectives:
● To understand cryptography and its applications.
● To develop a basic understanding of cryptographic mechanisms.
● To understand the working of symmetric cipher
● To understand the working of hash function and digital signature
Course Outcomes:
Text Books
● W. Stallings, Cryptography and Network Security: Principles and Practice
● Cryptography and Network Security – by Atul Kahate – TMH. Cryptography: Theory
and Practice, Douglas Stinson, CRC Press, CRC Press LLC
References
● Cyber Security Operations Handbook – by J.W. Rittinghouse and William M.Hancok –
Elseviers
● Information Security and cyber laws, Saurabh Sharma, student series, Vikas publication.
● Encryption, Ankit Fadia and J. Bhattacharjee, Vikas publication
● Cryptography and Network Security by Behrouz A. Forouzan, TATA McGraw hill.
Sr. No List of Practical Experiments
6 Implement RC5
7 Implement DES
8 Implement blowfish
9 Implement IDEA
Semester II
Credit 2
Hours 30
Course Objectives:
To apply the basic concepts and methods of business analytics and data warehouse.
To improve strategic decision-making by designing a Data Warehouse model and to explore data
mining concepts.
Course Outcomes:
Learners will be able to
Text books:
● Business Intelligence (2nd Edition), Efraim Turban, Ramesh Sharda, Dursun Delen, David
King, Pearson (2013)
● Business Intelligence for Dummies, Swain Scheps, Wiley Publications (2008).
● Building the Data Warehouse, Inmon: Wiley (1993).
● Data Mining: Introductory and Advanced Topics, Dunham, Margaret H, Prentice Hall (2006)
● Data Mining: Practical Machine Learning Tools and Techniques,Second Edition, Witten, Ian
and Eibe Frank, Morgan Kaufmann (2011)
References:
2 Import the legacy data from different sources such as ( Excel , SqlServer,
Oracle etc.) and load in the target system. ( You can download sample database
such as Adventureworks, Northwind, foodmart etc.)
6 Create the cube with suitable dimension and fact tables based on ROLAP,
MOLAP and HOLAP model.
7 Create the ETL map and setup the schedule for execution.
8 Execute the MDX queries to extract the data from the datawarehouse.
9 Import the datawarehouse data in Microsoft Excel and create the Pivot table
and Pivot Chart.
10 Import the cube in Microsoft Excel and create the Pivot table and Pivot Chart
to perform data analysis.
11 Apply the what – if Analysis for data visualization. Design and generate
necessary reports based on the datawarehouse data
The BI tools such as Tableau / Power BI / BIRT / R / Excel or any other can be used.
Module Course Description Hrs. CO No. PSO No. PO No.
/ Unit
Semester II
Credit 2
Hours 30
Course Objectives:
● To introduce key concepts of machine learning
● To conceptualize undirected graphical model for real problems
Course Outcomes:
1. Acquire point estimation techniques for estimating parameters of machine
learning models
2. Analyze advanced machine learning techniques for classification
Syllabus Total
30 L
Probability:
Unit I A brief review of probability theory, Some common discrete distributions,
Some common continuous distributions, Joint probability
distributions,Transformations of random variables, Monte Carlo
approximation, Information theory.
Directed graphical models (Bayes nets): Introduction, Examples,
Inference, Learning, Conditional independence properties of DGMs.
Mixture models and EM algorithm: Latent variable models, Mixture
models, Parameter estimation for mixture models, The EM algorithm.
Unit II Kernels:
Introduction, kernel function, Using Kernel inside GLMs, kernel trick,
Support vector machines, Comparison of discriminative kernel methods.
Markov and hidden Markov models: Markov models, Hidden Markov
Models (HMM), Inference in HMMs, Learning for HMMs.
Undirected graphical models (Markov random fields): Conditional
independence properties of UGMs, Parameterization of MRFs, Examples of
MRFs, Learning, Conditional random fields (CRFs), applications of CRFs.
Text books: Machine Learning: A Probabilistic Perspective: Kevin P Murphy, The MIT
Press Cambridge (2012).
3 Create a Directed Acyclic Graph (DAG) using set of formulae. Find parents
and children of nodes. Read conditional independence from DAG. Add and
remove edges from graph.
4 Create a Directed Acyclic Graph (DAG) using set of vectors. Find parents and
children of nodes. Read conditional independence from DAG. Add and remove
edges from graph.
5 Create a Directed Acyclic Graph (DAG) using set of matrices. Find parents
and children of nodes. Read conditional independence from DAG. Add and
remove edges from graph.
6 Create a Bayesian network for a given narrative. Set findings and ask queries
[One may use narratives like ‘chest clinic narrative’ and package gRain for
the purpose].
7 Implement EM algorithm.
8 Use string kernel to find the similarity of two amino acid sequences where
similarity is defined as the number of a substring in common.
Kernels
2 15h 2 2 3
Scheme of Examination (Amended)
Faculty of Science
(Post-graduate Programmes)
Choice Based Credit System (CBCS)
❖ Revised Scheme of Examination
1. For 4 Credit Courses (Discipline Specific Courses (DSC)) (100 Marks)
The performance of the learners shall be evaluated into two components, as the first component by ‘Continuous Internal
Assessment (CIA)’ with 40% marks and as the second component by conducting the ‘Semester End Examinations
(SEE)’ with 60% marks. The allocation of marks for the Continuous Internal Assessment (CIA) and Semester End
Examinations are as shown below:
A) Continuous Internal Assessment (CIA): 40 % 40 Marks
Sr.
Particular Marks
No.
One periodical class test / online examination to be conducted in the
01 20 Marks
given semester
Test on Practical Skills/ Case studies /Group/ Individual Survey
02 Project/Presentation and write up on the selected units of the courses/ 15 Marks
Book Review / Open Book Test
Active participation in routine class instructional deliveries and overall
03 conduct as a responsible learner, mannerism and articulation and
05 Marks
exhibition of leadership qualities in organizing related academic
activities
● The Practical Examination (PE) shall be of 100 marks for 2 credit course.
● For Research Methodology (RM): The writing of research proposal shall be considered for internal
assessment 40 Marks.
● For 6 credits Research Project (RP) Semester IV (150 Marks)
The performance of the learners shall be evaluated into two components. The allocation of marks are as shown
below:
A) The Project guide should evaluate the learner based on overall performance as a part of internal assessment for
50 Marks.
B) External assessment for 100 Marks
❖ Passing Standard
The learners shall obtain minimum of 40% marks (i.e. 16 out of 40 or 8 out of 20) in the Continuous Internal Assessment
(CIA) and 40% marks in Semester End Examination (SEE) (i.e. 24 out of 60 or 12 out of 30) separately, to pass the
course and minimum of Grade D, wherever applicable, to pass a particular semester. A learner will be said to have
passed the course if the learner passes the Continuous Internal Assessment (CIA) and Semester End Examination (SEE).
1. Guidelines for Internship based project work
● Minimum 20 days/ 100 hours of Internship with an Organisation/ NGO/ Charitable Organisation/ Private firm.
● The theme of the internship should be based on any study area of the elective courses
● Project Report should be of minimum 50 pages
● Experience Certificate is Mandatory
● A project report has to be brief in content and must include the following aspects:
▪ Executive Summary:
A bird’s eye view of your entire presentation has to be precisely offered under this category.
▪ Introduction on the Company:
A Concise representation of company/ organization defining its scope, products/ services and its SWOT
analysis.
▪ Statement and Objectives:
The mission and vision of the organization need to be stated enshrining its broad strategies.
▪ Your Role in the Organisation during the internship:
The key aspects handled, the department under which you were deployed and brief summary report duly
acknowledged by the reporting head.
▪ Challenges:
The challenges confronted while churning out theoretical knowledge into practical world.
▪ Conclusion:
A brief overview of your experience and suggestions to bridge the gap between theory and practice.
● The project report based on internship shall be prepared as per the broad guidelines given below:
▪ Font type: Times New Roman
▪ Font size: 12-For content, 14-for Title
▪ Line Space : 1.5-for content and 1-for in table work
▪ Paper Size: A4
▪ Margin : in Left-1.5, Up-Down-Right-1
▪ The Project Report shall be bounded.
Evaluation pattern of the project work
The Project Report shall be evaluated in two stages viz.
● Evaluation of Project Report (Bound Copy) 60 Marks
▪ Introduction and other areas covered 20 Marks
▪ Research Methodology, Presentation, Analysis and interpretation of
30 Marks
data
▪ Conclusion & Recommendations 10 Marks
● Conduct of Viva-voce 40 Marks
▪ In the course of Viva-voce, the questions may be asked such as
importance / relevance of the study, objective of the study, 10 Marks
methodology of the study/ mode of Enquiry (question responses)
▪ Ability to explain the analysis, findings, concluding observations,
20 Marks
recommendation, limitations of the Study
▪ Overall Impression (including Communication Skill) 10 Marks
Note:
● The guiding teacher along with the external evaluator appointed by the University/ College for the evaluation
of project shall conduct the viva-voce examination as per the evaluation pattern.
● The plagiarism should be maintained as per the UGC guidelines.
Passing Standard
● Minimum of Grade D in the project component
● In case of failing in the project work, the same project can be revised for ATKT examination.
● Absence of student for viva voce: If any student fails to appear for the viva voce on the date and time fixed by the
department such student shall appear for the viva voce on the date and time fixed by the Department, such student
shall appear for the viva voce only along with students of the next batch.
Note: It is noted that the concerned regulation of the College is amended and
implemented to all Semesters i.e. Semester I to Semester IV to all post-
graduate programmes, under faculty of Arts, Commerce and Science with
effect from the academic year 2024 - 2025.