Be Cse 2023
Be Cse 2023
FOR
B.E. (CSE)
2023
Page 1 of 210
SEMESTER-I
S.
Course Course Name CODE** L T P Cr
No.
Code
1. UCB009 Chemistry BSC 3 0 2 4
2. UES103 Programming for Problem ESC 3 0 2 4
Solving
3. UES013 Electrical & Electronics ESC 3 1 2 4.5
Engineering
4. UEN008 Energy and Environment OTH 2 0 0 2
5. UMA010 Mathematics – I BSC 3 1 0 3.5
TOTAL 18
SEMESTER-II
S.
Course Course Name CODE** L T P Cr
No.
Code
1. UPH013 Physics BSC 3 1 2 4.5
2. UES101 Engineering Drawing ESC 2 4 0 4
3. UHU003 Professional Communication HSS 2 0 2 3
4. UES102 Manufacturing Processes ESC 2 0 2 3
5. UMA004 Mathematics–II BSC 3 1 0 3.5
TOTAL 18
SEMESTER-III
S. Course
Code Course Name CODE** L T P Cr
No.
1. UCS303 Operating System PCC 3 0 2 4
2. UTA018 Object Oriented Programming PCC 3 0 2 4
3. UCS301 Data Structures PCC 3 0 2 4
4. UCS405 Discrete Mathematical PCC 3 1 0 3.5
Structures
5. UTA016 Engineering Design Project I ESC 1 0 2 3
(2 self-effort hours)
6. UMA021 Numerical Linear Algebra BSC 3 0 2 4
7. UHU050 Evolutionary Psychology HSS 1* 0 0 1
(1 Self Effort Hour)
TOTAL 23.5
Page 2 of 210
SEMESTER-IV
SEMESTER-V
COURSE
S. N. TITLE CODE L T P CR
NO.
1. UML501 MACHINE LEARNING CP 3 0 2 4.0
TOTAL 18 0 10 22.0
Page 3 of 210
SEMESTER-VI
COURSE
S. N. TITLE CODE L T P CR
NO.
1 UCS701 THEORY OF COMPUTATION CP 3 1 0 3.5
6 ELECTIVE-III PE 2 0 2 3.0
*Alternate week
SEMESTER-VII
COURSE
S. N. TITLE CODE L T P CR
NO.
1 UCS802 COMPILER CONSTRUCTION CP 3 0 2 4.0
3 ELECTIVE-IV PE 2 0 2 3.0
TOTAL 7 0 8 18.0
Page 4 of 210
SEMESTER-VIII
COURSE
S. N. TITLE CODE L T P CR
NO.
1 UCS898 PROJECT SEMESTER* PR - - - 15.0
TOTAL - - - 15.0
OR
COURSE
S. N. TITLE CODE L T P CR
NO.
1 UCS813 SOCIAL NETWORK ANALYSIS CP 2 0 2 3.0
TOTAL 5 0 4 15.0
OR
COURSE
S. N. TITLE CODE L T P CR
NO.
TOTAL - - - 15.0
Elective Focus
B.E. Computer Engineering Program is designed to offer elective focus as soon as student
clears semester IV of the program. Student has to choose EF (Elective Focus) out of the
following ten choices and shall continue with this group till his study at Thapar Institute of
Engineering & Technology. Choices are:
Page 5 of 210
3. Information and Cyber Security
3.1. Computer & Network Security (UCS534)
3.2. Secure Coding (UCS638)
3.3. Cyber Forensics (UCS648)
3.4. Blockchain Technology and Applications (UCS754)
Page 6 of 210
11.2 Ethical Hacking-1 (UCS673)
11.3 Ethical Hacking-2 (UCS674)
11.4 Computer Hacking and Forensic Investigation (UCS750)
Elective I
S. COURSE
TITLE CODE L T P CR
No. NO.
Page 7 of 210
Elective II
S. COURSE
TITLE CODE L T P CR
No. NO.
Elective III
S. COURSE
TITLE CODE L T P CR
No. NO.
Page 8 of 210
Elective IV
S. COURSE
TITLE CODE L T P CR
No. NO.
Generic Elective
Page 9 of 210
Total Credit Score for specific Nature of course/s
Nature of the course CODE Total Credits Semester and Course Name
Basic Science Courses BSC 27.5 1, Chemistry (4)
1, Mathematics – I (3.5)
2, Physics (4.5)
2, Mathematics–II (3.5)
3, Numerical Linear Algebra (4)
4, Probability and Statistics (4)
6, Optimization Techniques (4)
Engineering Science Courses ESC 18.5 1, Programming for Problem Solving (4)
1, Electrical & Electronics Engineering (4.5)
2, Engineering Drawing (4)
2, Manufacturing Processes (3)
5, Engineering Materials (3)
Humanities and Social Science HSS 9 2, Professional Communication (3)
Courses 7, Humanities for engineers (3)
3, Evolutionary Psychology (1)
4, Aptitude Skills Building (2)
Professional Core Courses PCC 56 3, Operating System (4)
3, Object Oriented Programming (4)
3, Data Structures (4)
3, Discrete Mathematical Structures (3.5)
4, Design and Analysis of Algorithms (4)
4, Database Management Systems (4)
5, Software Engineering (4)
5, Computer Architecture and Organization
(3)
5, Cognitive Computing (3)
5, Computer Networks (3)
5, Machine Learning (4)
4, Artificial Intelligence (3)
6, Theory of Computation (3.5)
6, Quantum Computing (4)
7, Compiler Construction (4)
Professional Elective Courses PEC 12 5, EFB-1(3)
6, EFB-II (3)
6, EFB-III (3)
7,EFB-IV (3)
Open Elective Courses OEC 5 6, Innovation and Entrepreneurship (3)
6, Generic Elective (2)
Project PRJ 29 5, Engineering Design Project-1 (3)
6, Engineering Design Project-II (3)
7, Capstone Project (8)
8, Project Semester (15)
Others OTH 2 1, Energy and Environment (2)
Total 159
Page 10 of 210
SEMESTER
I
Page 11 of 210
UCB009: Chemistry
L T P Cr
3 0 2 4.0
Course Objective: The course aims at elucidating principles of applied chemistry in
industrial systems, water treatment, engineering materials, computational and analytical
techniques.
Syllabus
Fuels: Classification of fuels, Calorific value, Cetane and Octane number, alternative
fuels: biodiesel, Power alcohol, synthetic petrol, Fuel cells: H2 production and storage,
Water splitting, Rocket propellant.
Laboratory Work
Page 12 of 210
5. execute laboratory techniques like pH metry, potentiometry, spectrophotometry,
conductometry and volumetry.
Text Books
1. Engineering Chemistry, S. Vairam and S. Ramesh, Wiley India 1st ed, 2014.
2. Engineering Chemistry, K. S. Maheswaramma, and M. Chugh. Pearson, 2016.
Reference Books
1. Engineering Chemistry, B. Sivasankar, Tata McGraw-Hill Pub. Co. Ltd, New Delhi,
2008.
2. Engineering Chemistry, M.J. Shulz, Cengage Learnings, 2007.
3. J. Chem. Inf. Comput. Sci., D. Weininger, Vol. 28, 1988, 31-36.
Evaluation Scheme
Page 13 of 210
UES103: Programming for Problem Solving
L T P Cr
3 0 2 4.0
Course Objectives: This course is designed to solve and explore the problems using the
art of computer programming with the help of C Language. Students will be able to apply
these problem solving concepts in real life applications.
Syllabus
Decision Making and Iterative Statements-Decision making- if, if-else, Nested if-else,
Multiple if, else if, switch, Ternary Operator, Loops- (while, do-while, for), Nesting of
Loops, break, continue and goto. Implement the switch () to solve the basic functions of
scientific calculator.
Arrays and Strings- One-dimensional array its operations (Traversal, Linear Search,
Insertion, Deletion, Bubble Sort), Two-dimensional and its operations (Addition,
Transpose and Multiplication), Passing of array into a function (row and entire array),
Input and output of a string, string inbuilt functions, 2-D Character array.
Page 14 of 210
File Handling: Introduction of Files (streams in C), using File (Declaring, Opening and
Closing), Operations on File (Reading, Writing and appending), and Random Access of a
file, command line argument.
Laboratory Work
To implement programs for various kinds of real life applications in C Language.
Text Books
1. CProgrammingLanguage, BrianW.KernighanDennisM. Ritchie,2nded,2012.
2. ProgramminginANSIC, BalagurusamyG., 8thed., 2019
Reference Books
1. LetUs C, KanetkarY.,16th ed.,2017
2. Programming with C, Byron S Gottfried,McGraw Hill Education, Forth edition, 2018
Page 15 of 210
UES013: Electrical and Electronics Engineering
L T P Cr
3 1 2 4.5
Course Objective: To introduce the basic concepts of electrical and electronics
engineering.
Syllabus
DC Circuits: Introduction to circuit elements; rms and average values for different wave
shapes, independent and dependent current and voltage sources; Kirchhoff‘s laws; mesh
and node analysis; source transformations; network theorems: Superposition theorem,
Thevenin‘s and Norton‘s theorem, Maximum power transfer theorem; star-delta
transformation; steady state and transient response of R-L and R-C and R-L-C circuits.
AC Circuits: Concept of phasor, phasor representation of circuit elements; analysis of
series and parallel AC circuits; concept of real, reactive and apparent powers; resonance in
RLC series and parallel circuits; balanced three phase circuits: voltage, current and power
relations for star and delta arrangement; analysis of balanced and unbalanced circuits; three
phase power measurement using two-wattmeter and one-wattmeter methods.
Magnetic circuits: analogy between electric and magnetic circuits; series and parallel
magnetic circuits; operating principles of electrical appliances: single-phase transformer
and rotating machines; tests and performance of single-phase transformer.
Digital Logic Design: Digital signals, Number systems, Positive and negative
representation of numbers, Signed-number representation, Binary arithmetic, Postulates
and theorems of Boolean Algebra, Algebraic simplification, Sum of products and product
of sums formulations (SOP and POS), Gate primitives, Logic Gates and Universal Gates,
Minimization of logic functions, Karnaugh Maps, Logic implementation using Gates,
Decoder, MUX, Flip-Flops, Asynchronous up/down counters.
Operational Amplifier Circuits: The ideal operational amplifier, the inverting, non-
inverting amplifiers, Op-Amp Characteristics, Applications of Op-amp: summing
amplifier, differentiator and integrator.
Laboratory Work: Kirchhoff‘s laws, network theorems, ac series and parallel circuit,
three phase power measurement, magnetic circuit, tests on transformer, resonance in AC
circuit, combinational circuits, flip flops, shift register and binary counters, asynchronous
and synchronous up/down counters, BJT characteristics.
Page 16 of 210
3. comprehend the operation in magnetic circuits, single phase transformer and
rotating machines
4. recognize and apply the number systems and Boolean algebra.
5. reduce and simplify Boolean expressions and implement them with logic gates.
6. discuss and explain the working of diode, transistor and operational amplifier, their
configurations and applications.
Text Books
1. Hughes, E., Smith, I.M., Hiley, J. and Brown, K., Electrical and Electronic
Technology, Prentice Hall (2008) 10th ed.
2. Nagrath, I.J. and Kothari, D.P., Basic Electrical Engineering, Tata McGraw Hill
(2002).
3. Boylestad, R.L. and Nashelsky, L., Electronic Devices & Circuit Theory, Perason
(2009).
4. Mano M. M. and Ciletti, M.D., Digital Design, Pearson, Prentice Hall, (2013).
Reference Books
Evaluation Scheme
Page 17 of 210
UEN008: Energy and Environment
L T P Cr
2 0 0 2.0
Course Objective: The exposure to this course would facilitate the students in
understanding the terms, definitions and scope of environmental and energy issues
pertaining to current global scenario; understanding the need of sustainability in addressing
the current environmental & energy challenges.
Syllabus
Air Pollution: Origin, Sources and effects of air pollution; Primary and secondary
meteorological parameters; wind roses; Atmospheric stability; Source reduction and Air
Pollution Control Devices for particulates and gaseous pollutants in stationary sources.
Text Books
Page 18 of 210
3. O‘Callagan, P.W., Energy Management, McGraw Hill Book Co. Ltd. (1993).
Reference Books
Evaluation Scheme
Page 19 of 210
UMA010: Mathematics-I
L T P Cr
3 1 0 3.5
Course Objective: To provide students with skills and knowledge in sequence and series,
advanced calculus, calculus of several variables and complex analysis which would enable
them to devise solutions for given situations they may encounter in their engineering
profession.
Syllabus
Sequences and Series: Introduction to sequences and infinite series, Tests for
convergence/divergence, Limit comparison test, Ratio test, Root test, Cauchy integral test,
Alternating series, Absolute convergence, and conditional convergence.
Series Expansions: Power series, Taylor series, Convergence of Taylor series, Error
estimates, Term by term differentiation and integration.
Partial Differentiation: Functions of several variables, Limits and continuity, Chain rule,
Change of variables, Partial differentiation of implicit functions, Directional derivatives
and its properties, Maxima and minima by using second order derivatives.
Page 20 of 210
Text Books
1. Thomas, G.B. and Finney, R.L., Calculus and Analytic Geometry, Pearson Education
(2007), 9th ed.
2. Stewart James, Essential Calculus; Thomson Publishers (2007), 6th ed.
3. Kasana, H.S., Complex Variables: Theory and Applications, Prentice Hall India, 2005
(2nd edition).
Reference Books
Evaluation Scheme
Page 21 of 210
SEMESTER
II
Page 22 of 210
UPH013: Physics
L T P Cr
3 1 2 4.5
Course Objective: To introduce the student to the basic physical laws of oscillators,
acoustics of buildings, ultrasonics, electromagnetic waves, wave optics, lasers, and
quantum mechanics and demonstrate their applications in technology. To introduce the
student to measurement principles and their application to investigate physical
phenomena
Syllabus
Electromagnetic Waves: Scalar and vector fields; Gradient, divergence, and curl;
Stokes‘ and Green‘s theorems; Concept of Displacement current; Maxwell‘s equations;
Electromagnetic wave equations in free space and conducting media, Application - skin
depth.
Laboratory Work
Page 23 of 210
8. Determination of displacement and conducting currents through a dielectric.
9. Determination of Planck‘s constant.
Micro Project:
Students will be given physics-based projects/assignments using computer simulations,
etc.
Text Books
1. Beiser, A., Concept of Modern Physics, Tata McGraw Hill (2007) 6th ed.
2. Griffiths, D.J., Introduction to Electrodynamics, Prentice Hall of India (1999) 3rd ed.
3. Jenkins, F.A. and White, H.E., Fundamentals of Optics, McGraw Hill (2001) 4th ed.
Reference Books
1. Wehr, M.R, Richards, J.A., Adair, T.W., Physics of The Atom, Narosa Publishing
House (1990) 4th ed.
2. Verma, N.K., Physics for Engineers, Prentice Hall of India (2014)1st ed.
3. Pedrotti, Frank L., Pedrotti, Leno S., and Pedrotti, Leno M., Introduction to Optics,
Pearson Prentice HallTM (2008) 3rd ed.
Evaluation Scheme
Page 24 of 210
UES101: Engineering Drawing
L T P Cr
2 4 0 4.0
Course Objective: This module is dedicated to graphics and includes two sections: 2D
drafting and 3D modelling of solid objects. This course is aimed at making the student
understand the concepts of projection systems, learn how to create projections of solid
objects using first and third angle orthographic projection as well as isometric and auxiliary
projection, concept of sectioning, to interpret the meaning and intent of toleranced
dimensions and to create/edit drawings using drafting software. In addition, this course
shall
give an insight on the basic 3D modelling concepts like extrude, revolve, sweep,
construction
of complex solids.
Syllabus
2D Drafting
1. Management of screen menus commands
2. Creating basic drawing entities
3. Co-ordinate systems: Cartesian, polar and relative coordinates
4. Drawing limits, units of measurement and scale
5. Layering: organizing and maintaining the integrity of drawings
6. Design of prototype drawings as templates.
7. Editing/modifying drawing entities: selection of objects, object snap modes, editing
commands,
8. Dimensioning: use of annotations, dimension types, properties and placement, adding
text to
drawing
3D Modelling
1. Management of screen menus commands
2. Introduction to basic 3D modelling commands such as extrude, revolve, sweep etc.
3. Creation of 2D drawings from a 3D model
1. Completing the views - Identification and drawing of missing lines and views in the
projection of objects
Page 25 of 210
2. Projects related to orthographic and isometric projections Using wax blocks/soap
bars/any soft material to develop three dimensional object from given orthographic
projections
Text Books
1. Jolhe, D.A., Engineering Drawing, Tata McGraw Hill, 2008
2. Davies, B. L., Yarwood, A., Engineering Drawing and Computer Graphics, Van
Nostrand Reinhold (UK), 1986
Reference Books
1. Gill, P.S., Geometrical Drawings, S.K. Kataria & Sons, Delhi (2008).
2. Gill, P.S., Machine Drawings, S.K. Kataria & Sons, Delhi (2013).
3. Mohan, K.R., Engineering Graphics, Dhanpat Rai Publishing Company (P) Ltd, Delhi
(2002).
4. French, T. E., Vierck, C. J. and Foster, R. J., Fundamental of Engineering Drawing &
Graphics Technology, McGraw Hill Book Company, New Delhi (1986).
5. Rowan, J. and Sidwell , E. H., Graphics for Engineers, Edward Arnold, London
(1968).
6. Mastering AutoCAD 2021 and AutoCAD LT 2021, Brian C. Benton, George Omura,
Sybex - John Wiley and Sons, Indiana (2021).
Evaluation Scheme
*Students are required to bring their personal computers for the tutorial work.
*Availability of institute server resources for sharing the software licences with the student
community.
**Institute computational resources in collaboration with other academic units /
Page 26 of 210
departments for conducting the mid semester and end semester test.
Syllabus
Reading: The following texts (one from each of the two categories listed below) are
required to be read by the students in the semester:
Category 1: Animal Farm by George Orwell, Lord of the Flies by William Golding, Life
of Pi by Yann Martel
Category 2: The Namesake by Jhumpa Lahiri, The God of Small Things by Arundhati
Roy, Q&A by Vikas Swarup
Page 27 of 210
Laboratory Work
1. Needs-assessment of spoken and written communication with feedback.
2. Training for Group Discussions through simulations and role plays.
3. Technical report writing on survey-based projects.
4. Project-based team presentations.
Course Learning Objectives (CLO)
Text Books
1. Mukherjee H.S..Business Communication: Connecting at Work. Oxford University
Press.(2013)
2. Lesikar R.V, and Flately M.E., Basic Business Communication Skills for
empowering the internet generation.(2006)
3. Raman, M.,and Singh ,P, Business Communication . Oxford . University Press
(2008).
Reference Books
Evaluation Scheme
Page 28 of 210
UES102: Manufacturing Processes
L T P Cr
2 0 2 3.0
Course Objective: This course introduces the basic concepts of manufacturing via
machining, forming, casting and joining, enabling the students to develop a basic knowledge
of the mechanics, operation and limitations of basic machining tools along with metrology
and measurement of parts. The course also introduces the concept of smart manufacturing.
Syllabus
Machining Processes: Principles of metal cutting, Cutting tools, Cutting tool materials and
applications, Geometry of single point cutting tool, Introduction to computerized numerical
control (CNC) machines, G and M code programming for simple turning and milling
operations, introduction of canned cycles.
Metal Casting: Introduction & Principles of sand casting, Requisites of a sound casting,
Permanent mold casting processes, casting defects
Metal Forming: Hot & cold metal working, Forging, Rolling, Sheet Metal operations.
Joining Processes: Method of joining, type of electric arc welding processes, Methods of
shielding, Power source characteristics, Resistance welding, Soldering, Brazing.
Laboratory Work
Relevant shop floor exercises involving practices in Sand casting, Machining, Welding,
Sheet metal fabrication techniques, CNC turning and milling exercises, Experiments on basic
engineering metrology and measurements to include measurements for circularity, ovality,
linear dimensions, profiles, radius, angular measurements, measurement of threads, surface
roughness.
Assignments: Assignments for this course will include the topics: Manufacturing of micro-
chips used in IT and electronics industry and use of touch screens. Another assignment will
be given to practice numerical exercises on topics listed in the syllabus. Case study related to
smart manufacturing.
Page 29 of 210
Micro Project: Fabrication of multi-operational jobs using the above processes as per
requirement by teams consisting of 4 -6 members. Quality check should be using the
equipment available in metrology lab.
Text Books
1. Degarmo, E. P., Kohser, Ronald A. and Black, J. T., Materials and Processes in
Manufacturing, Prentice Hall of India (2008) 8th ed.
2. Kalpakjian, S. and Schmid, S. R., Manufacturing Processes for Engineering
Materials, Dorling Kingsley (2006) 4th ed.
Reference Books
1. Martin, S.I., Chapman, W.A.J., Workshop Technology, Vol.1 & II, Viva Books
(2006) 4th ed.
2. Zimmer, E.W. and Groover, M.P., CAD/CAM - Computer Aided Designing and
Manufacturing, Dorling Kingsley (2008).
3. Pandey, P.C. and Shan, H. S., Modern Machining Processes, Tata McGraw Hill
(2008).
4. Mishra, P. K., Non-Conventional Machining, Narosa Publications (2006).
5. Campbell, J.S., Principles of Manufacturing, Materials and Processes, Tata McGraw
Hill Company (1999).
6. Lindberg, Roy A., Processes and Materials of Manufacture, Prentice Hall of India
(2008) 4th ed.
Evaluation Scheme
Page 30 of 210
UMA004: Mathematics - II
L T P Cr
3 1 0 3.5
Course Objective: To introduce students the theory and concepts of differential equations,
linear algebra, Laplace transformations and Fourier series which will equip them with
adequate knowledge of mathematics to formulate and solve problems analytically.
Syllabus
Laplace Transform: Definition and existence of Laplace transforms and its inverse,
Properties of the Laplace transforms, Unit step function, Impulse function, Applications to
solve initial and boundary value problems.
Fourier Series: Introduction, Fourier series on arbitrary intervals, Half range expansions,
Applications of Fourier series to solve wave equation and heat equation.
Linear Algebra: Row reduced echelon form, Solution of system of linear equations,
Matrix inversion, Linear spaces, Subspaces, Basis and dimension, Linear transformation
and its matrix representation, Eigen-values, Eigen-vectors and Diagonalisation, Inner
product spaces and Gram-Schmidt orthogonalisation process.
1. solve the differential equations of first and 2nd order and basic application problems
described by these equations.
2. find the Laplace transformations and inverse Laplace transformations for various
functions. Using the concept of Laplace transform students will be able to solve the
initial
value and boundary value problems.
3. find the Fourier series expansions of periodic functions and subsequently will be able
to
solve heat and wave equations.
4. solve systems of linear equations by using elementary row operations.
Page 31 of 210
5. identify the vector spaces/subspaces and to compute their bases/orthonormal bases.
Further, students will be able to express linear transformation in terms of matrix and
find the eigenvalues and eigenvectors.
Text Books
1. Simmons, G.F., Differential Equations (With Applications and Historical Notes), Tata
McGraw Hill (2009).
2. Krishnamurthy, V.K., Mainra, V.P. and Arora, J.L., An introduction to Linear
Algebra, Affiliated East West Press (1976).
Reference Books
1. Kreyszig Erwin, Advanced Engineering Mathematics, John Wiley (2006), 8th edition.
2. Jain, R.K. and Iyenger, S.R.K., Advanced Engineering Mathematics, Narosa Publishing
House (2011), 4th edition.
Evaluation Scheme
Page 32 of 210
SEMESTER
III
Page 33 of 210
UCS303: Operating System
L T P Cr
3 0 2 4.0
Course Objective: To understand the role, responsibilities, and algorithms involved for
achieving various functionalities of an Operating System.
Syllabus
Memory Management: Basic Hardware, Address Binding, Logical and Physical Address,
Dynamic linking and loading, Shared Libraries, Swapping, Contiguous Memory
Allocation, Segmentation, Paging, Structure of the Page Table, Virtual Memory
Management: Demand Paging, Page Replacement, Allocation of Frames, Thrashing.
Page 34 of 210
Laboratory Work
Learn and practice basic Linux/Unix commands to Create and manipulate files and
directories; Explore about Vi Editor environment; Build .C program related to fork (), exec
(), wait (), sleep () functions at Linux/Unix platform; Write .C program for message
passing and shared memory; Simulate CPU scheduling algorithms using either C or C++
1. Describe the basics of an operating system, including the kernel, system calls, and
computing environments.
2. Evaluate the effectiveness and trade-offs of different models of multithreading,
scheduling algorithms, and methods for handling deadlocks, such as prevention, avoidance,
detection, and recovery.
3. Understand components of a memory system, virtual memory and analyze different
memory management techniques.
4. Evaluate the effectiveness of different Disk Management strategies, and Critique
thedesign and implementation of File System
5. Explain the basic concepts of Concurrency, Protection and Security issues in an
operating system.
Text Books
1. Operating System Concepts, Silberschatz A., Galvin B. P. and Gagne G., John
Wiley & Sons Inc., 9th ed, 2013.
2. Operating Systems Internals and Design Principles, Stallings W., Prentice Hall 9th
ed, 2018
Reference Books
1. Understanding the Linux Kernel, Bovet P. D., Cesati M., O'Reilly Media, 3rd ed,
2006.
2. Introduction to Operating System Design and Implementation: The OSP 2
Approach, Kifer M., Smolka A. S., Springer, 2007
Page 35 of 210
UTA018: Object Oriented Programming
L T P Cr
3 0 2 4.0
Course Objective:To become familiar with object oriented programming concepts and
be able to apply these concepts in solving diverse range of applications.
Objects and Classes: Structure in C and C++, Class specification, Objects, Namespaces,
Overview of pillars of OOPS (Data Encapsulation, Data Abstraction, Inheritance,
Polymorphism), Inline functions, Passing objects as arguments, Returning object from a
function, Array of objects, Static keyword with data member, member function and
object, Friend function, and Friend classes, Pointer to objects, this pointer, Dynamic
Initialization, Dynamic memory allocation.
Laboratory Work
To implement object oriented constructs using C++programming language.
2. To apply and analyze the inheritance on real life case studies via coding
competences.
3. To design and develop code snippets for polymorphism to proclaim coding
Page 36 of 210
potential; and management of run-time exceptions.
Text Books
1. C++:The Complete Reference , Schildt H., Tata McGraw Hill, 4thed, 2003
2. C++Primer, Lippman B.S., Lajoie J., and MooE.B., , Addison-Wesley
Professional, 5th ed, 2013
Reference Books
1. Object-Oriented Programming in C++, Lafore R., Pearson Education, 4thed, 2002
2. Object Oriented Programming with C++, E Balagurusamy, 8thed,2017
3. The C++programming language, Stroustrup B., Pearson Education India, 4thed, 2013
Page 37 of 210
UCS301: Data Structures
L T P Cr
3 0 2 4.0
Course Objective:To become familiar with different types of data structures and their
applications.
Syllabus
Analysing algorithms: Basics of algorithm and its analysis, Complexity classes, order
arithmetic, Time and space trade-off in algorithms.
Linear Data Structures: Arrays, Strings and string processing, Linked lists (Singly,
Doubly, Circular), Abstract data types, their implementation and applications: Stacks
(using Arrays and Linked-list), Queues (using Arrays and Linked-list), Hash tables: Hash
functions, collision resolution techniques, Strategies for choosing the appropriate data
structure.
Searching and Sorting: Linear Search, Binary Search. Introduction to internal and
external sort, Bubble Sort, Selection Sort, Insertion Sort, Shell Sort, Quick Sort, Merge
Sort, Counting Sort, Radix Sort.
Trees and their applications: Introduction to binary tree, tree traversal algorithms, Binary
search tree, AVL Tree, B Tree etc. and common operations on these trees. Heap, Heap
Sort, Priority Queue using Heap.
Graphs and their applications: Graph Terminology and its representation, Depth and
breadth first traversals, Shortest-path algorithms (Dijkstra and Floyd), Data Structures for
Disjoint Sets, Minimum spanning tree (Prim and Kruskal).
Laboratory Work
Implementation of various data structures such as Arrays, Stacks, Queues, Lists, Binary
tree traversals, BST, AVL trees, Graphs traversals, Sorting and Searching techniques.
1. Understand the fundamental data structures, their implementation and some of their
standard applications.
2. Select and implement appropriate searching and sorting techniques for solving a
problem based on their characteristics.
3. Apply tree and graph data structures for specific applications.
4. Design and analyse algorithms using appropriate data structures for real-world problems.
Text Books
1. Introduction to Algorithms,Cormen H. T., Leiserson E. C., Rivest L. R., and Stein
C, MIT Press,3rd ed., 2009
2. Data Structures, Algorithms and Applications in C++,Sahni S., Universities Press
2nd ed. 2005
Page 38 of 210
Reference Books
1. Data Structures and Algorithms Made Easy,Karumanchi N., Career Monk
Publications, 5th ed., 2017
2. Data structures and algorithms in C++, Adam Drozdek, 4th edition.
Page 39 of 210
UCS405:Discrete Mathematical Structures
L T P Cr
3 1 0 3.5
Course Objective:The course objective is to provide students with an overview of Discrete
Mathematical Structures. Students will learn about topics such as logic and proofs, sets and
functions, graph theory, boolean algebra, number theory and other important discrete math
concepts.
Syllabus
Relations: Different types of relation and their representation, Equivalence and partial-
ordered relations, Partition and Covering of a set, N-ary relations and database, Closure of
relations, Warshall‘s algorithm, Lexicographic ordering, Hasse diagram, Lattices, Boolean
algebra.
Graphs Theory: Representation, Type of Graphs, Paths and Circuits: Euler Graphs,
Hamiltonian Paths & Circuits; Cut-sets, Connectivity and Separability, Planar Graphs,
Isomorphism, Graph Coloring, Covering and Partitioning, Application of Graph theory in
real-life applications.
Basic Logic: Propositional logic, Logical connectives, Truth tables, Normal forms
(conjunctive and disjunctive), Validity of well-formed formula, Propositional inference
rules (concepts of modus ponens and modus tollens), Predicate logic, Universal and
existential quantification, Proof Techniques.
Recurrence Relation: Solving linear recurrence relations, divide and conquer algorithms
and recurrence relations.
1. Perform operations on various discrete structures such as set, function, and relation.
2. Apply basic concepts of asymptotic notation in the analysis of the algorithm.
3. Illustrate the basic properties and algorithms of graphs and apply them in modelling
and solving real-world problems.
4. Comprehend formal logical arguments and translate statements from a natural
language into their symbolic structures in logic.
5. Identify and prove various properties of rings, fields, and groups.
Page 40 of 210
6. Illustrate and apply the division algorithm, mod function, and Congruence.
Text Books
1. Discrete Mathematics and its Applications,Rosen H. K., McGraw Hill, 7thed., 2011
2. Discrete Mathematical Structures with Applications to Computer Science,
Tremblay P. J. and Manohar, R., Tata McGraw Hill, 2008.
Reference Books
1. Contemporary Abstract Algebra, Gallian A. J., Cengage Learning, 9th ed., 2017
2. Discrete Mathematics, Lipschutz S., Lipson M., McGraw-Hill, 3rded.,2007
Page 41 of 210
UTA016: ENGINEERING DESIGN PROJECT – I
(including 2 self-effort hours)
L T P Cr
1 0 2 3.0
To provide a basis for the technical aspects of the project a small number of lectures are
incorporated into the module. As the students would have received little in the way of formal
engineering instruction at this early stage in the degree course, the level of the lectures is to
be introductory with an emphasis on the physical aspects of the subject matter as applied to
the ‗Mangonel‘ project. The lecture series include subject areas such as Materials, Structures,
Dynamics and Digital Electronics delivered by experts in the field.
Page 42 of 210
Simple Primitive Types (Variables), Simple programming examples.
Definition of a sensor and actuator.
Project:
The Project will facilitate the design, construction and analysis of a ―Mangonel‖. In addition
to some introductory lectures, the content of the students‘ work during the semester will
consist of:
1. The assembly of a Mangonel from a Bill Of Materials (BOM), detailed engineering
drawings of parts, assembly instructions, and few prefabricated parts;
2. The development of a software tool to allow the trajectory of a ―missile‖ to be studied
as a function of various operating parameters in conditions of no-drag and drag due to
air;
3. A structural analysis of certain key components of the Mangonel for static and dynamic
stresses using values of material properties which will be experimentally determined;
4. The development of a micro-electronic system to allow the angular velocity of the
throwing arm to be determined;
5. Testing the Mangonel;
6. Redesigning the throwing arm of the Mangonel to optimise for distance without
compromising its structural integrity;
7. An inter-group competition at the end of the semester with evaluation of the group
redesign strategies.
Page 43 of 210
1. Simulate trajectories of a mass with and without aerodynamic drag using a spreadsheet
based software tool to allow trajectories be optimized;
2. Perform a test to acquire an engineering material property of strength in bending and
analyze the throwing arm of the ―Mangonel‖ under conditions of static and dynamic
loading;
3. Develop and test software code to process sensor data;
4. Designn, construct and test an electronic hardware solution to process sensor data;
5. Construct and operate a Roman catapult ―Mangonel‖ using tools, materials and
assembly instructions, in a group, for a competition;
6. Operate and evaluate the innovative redesign of elements of the ―Mangonel‖ for
functional and structural performance;
Text Books:
1. Michael Mc Roberts, Beginning Arduino, Technology in action publications.
2. Alan G. Smith, Introduction to Arduino: A piece of cake, Create Space Independent
Publishing Platform (2011).
Reference Book:
1. John Box all, Arduino Workshop – A Hands-On Introduction with 65 Projects, No
Starch Press (2013).
Page 44 of 210
UMA021: Numerical Linear Algebra
L T P Cr
3 0 2 4.0
Course Objectives: The goal of this course is to give students an introduction to
numeric and algorithmic techniques used for the solution of a broad range of
mathematical problems, with an emphasis on computational issues and linear algebra. In
addition, students will become familiar with numeric programming environments
Matlab.
Contents:
Page 45 of 210
Reference Books
1. Steven C. Chapra and Raymond P. Canale, Numerical Methods for Engineers,
McGraw-Hill Higher Education, 6th edition, 2010.
2. E. Ward Cheney and David R. Kincaid, Numerical Mathematics and Computing,
Cengage Learning, 7th edition, 2012.
3. Endre Suli and David F. Mayers, An Introduction to Numerical Analysis,
Cambridge University Press, 2003
Evaluation Scheme:
Sr. No. Evaluation elements Weightage
(%)
1 MST 25
2 EST 45
3 Sessionals (Assignments/Quizzes/Lab Evaluation) 30
Page 46 of 210
SEMESTER
IV
Page 47 of 210
UCS415:DESIGN AND ANALYSIS OF ALGORITHMS
L T P Cr
3 0 2 4.0
Course ObjectiveTo provide students with the knowledge and skills necessary to design
and analyse algorithms for solving computational problems.
Syllabus:
Divide and Conquer: Fundamentals of divide and conquer strategy, Applications such as
The maximum subarray problem, Strassen‘s algorithm for matrix multiplication, merge
sort, quick sort etc.
Branch and Bound Algorithm: General method, Applications such as0/1 knapsack
problem, Traveling salesperson problem etc.
Graphs & Algorithms: Introduction to graphs, Paths and Circuits, Euler Graphs,
Hamiltonian graphs,Cut-sets, Connectivity and Separability, Covering and Partitioning,
Strongly connected component, Topological sort, Max flow: Ford Fulkerson algorithm,
max flow- min cut.
Page 48 of 210
2. Apply common algorithmic techniques such as greedy, dynamic programming etc.
to standard computational problems
3. Design solutions by using appropriate data structures or applying algorithms such
as string matching, randomized, approximation and graph.
4. Develop efficient algorithms for various computational challenging problems
solving in computing.
Text Books
1. Cormen H. T., Leiserson E. C., Rivest L. R., and Stein C., Introduction to
Algorithms, MIT Press (2009) 3rd ed.
2. Horwitz E., Sahni S., Rajasekaran S., Fundamentals of Computers Algorithms,
Universities Press (2008) 2nd ed.
Reference Books
1. Levitin A., Introduction to the design and analysis of algorithms, Pearson Education
(2008) 2nd ed.
2. Aho A.V., Hopcraft J. E., Dulman J. D., The Design and Analysis of Computer
Algorithms, Addsion Wesley (1974) 1st ed.
3. Sedgewick R. and Wayne K., Algorithms, Addison-Wesley Professional (2011),
4th ed.
Page 49 of 210
UCS310:Database Management Systems
L T P Cr
3 0 2 4.0
Course Objective:Emphasis is on the need of database systems. Main focus is on E-R
diagrams, relational database, concepts of normalization and de-normalization and SQL
commands.
Syllabus
Database Analysis: Conceptual data modeling using E-R data model -entities, attributes,
relationships, generalization, specialization, specifying constraints, Conversion of ER
Models to Tables, Practical problems based on E-R data model.
Laboratory Work
Students will perform SQL commands to demonstrate the usage of DDL and DML, joining
of tables, grouping of data and will implement PL/SQL constructs. They will also
implement one project.
Project: It will contain database designing & implementation, should be given to group of
2-4 students. While doing projects emphasis should be more on back-end programming
like use of SQL, concept of stored procedure, function, triggers, cursors, package etc.
Project should have continuous evaluation and should be spread over different components.
Course Learning Objectives (CLO)
The students will be able to:
Page 50 of 210
1. Analyze the Information Systems as socio-technical systems, its need and advantages as
compared to traditional file-based systems.
2. Analyze and design database using E-R data model by identifying entities, attributes and
relationships.
3. Apply and create Relational Database Design process with Normalization and
Denormalization of data.
4. Comprehend the concepts of transaction management, concurrence control and recovery
management.
5. Demonstrate use of SQL and PL/SQL to implementation database applications.
Text Books
1. Database System Concepts, Silverschatz A., Korth F. H. and Sudarshan S., Tata
McGraw Hill, 6th ed, 2010
2. Fundamentals of Database Systems,Elmasri R. and Navathe B. S., Pearson, 7th ed,
2016
Reference Books
1. SQL, PL/SQL the Programming Language of Oracle, Bayross I., BPB Publications,
4th ed, 2009
2. Modern Database Management,Hoffer J., Venkataraman, R. and Topi, H., Pearson,
12th ed2016
3. Simplified Approach to DBMS, Parteek Bhatia and Gurvinder Singh,
4. Database management systems. Vol. 3. Raghu Ramakrishnan and Johannes Gehrke
5. FOR SQL/RA, New York: McGraw-Hill,
Page 51 of 210
UCS712: COGNITIVE COMPUTING
L T P Cr
2 0 2 3.0
Course Objectives: This course will provide advanced students in cognitive science and
computer science with the skills to develop computational models of human cognition, giving
insight into how people solve challenging computational problems, as well as how to bring
computers closer to human performance.
Advance analytics: Big data and Cognitive computing, Predictive Analytics, Text Analytics,
Image Analytics, Speech Analytics.
Laboratory Work:
Optimizing a spiking neural network in NengoDL
Legendre Memory Units in NengoDL
Optimizing a cognitive model in NengoDL
Optimizing a cognitive model with temporal dynamics in NengoDL
Build a Text summarizer using Python toolbox
Text Books:
1. Judith S., Kaufman M., and Bowles A., Cognitive Computing and Big Data Analytics,
Wiley,(2005), 1st ed.
2. Fingar P., Cognitive Computing: A Brief guide for Game Changers, , Meghan-Kiffer
Press,(2014),1st ed.
Reference Books:
1. Miller J., Learning IBM Watson Analytics, Packt Publishers,(2016),1st ed.
Page 52 of 210
2. Hashmi A. and Masood A., Cognitive Computing Recipes: Artificial Intelligence
solutions using Microsoft Cognitive Services and Tensorflow, Apress, (2019), 1st ed.
3. Kashyap P., Machine Learning for Decision Makers: Cognitive Computing
Fundamentals for better decision making,,Apress,(2018), 1st ed.
Page 53 of 210
UCS419: Artificial Intelligence
L T P Cr
2 0 2 3.0
Course Objectives: This course introduces students to the fundamental concepts,
techniques, and applications of Artificial Intelligence (AI). Students will gain theoretical
knowledge and practical skills in areas such as problem-solving using search techniques,
machine learning and designing intelligent agents for solving particular engineering
problems.
Syllabus:
Introduction to Artificial Intelligence: Foundations, scope, types of AI, problems, and
approaches of AI
Intelligent agents: Structure of agents, Types of agent programs: reflux, model-based,
goal-driven, utility-driven, and learning agents
Problem spaces: State Space Representation, Representation of problems as state space,
problem characteristics, sample applications
Uninformed Search Algorithms: Brute Force search, Depth-First Search, Breadth-First
search, Depth-Limited Search, Uniform Cost Search, Bidirectional Search
Informed search algorithms: Heuristic Functions, Best-First search, Beam Search, Hill
Climbing, A* algorithm, AO graph, stochastic search algorithms: Simulated Annealing and
Genetic Algorithm
Game playing: Minimax algorithm, alpha-beta pruning, iterative deepening
Introduction to Machine Learning: Well-Posed learning problems, Basic concepts,
Designing a learning system, Types of machine learning: Supervised learning,
Unsupervised learning, Semi-supervised Learning and Reinforcement learning, Types of
data: structured and unstructured data.
Supervised Learning: Introduction to supervised learning tasks, Tree induction
algorithms: split algorithm based on Information Gain (ID3), split algorithm based on Gain
Ratio (C4.5), split algorithm based on Gini Index (CART), Instance based algorithms: K-
Nearest Neighbours (K-NN), Probabilistic algorithms: Naïve Bayes algorithm, Evaluation
metrics.
Page 54 of 210
Text Books
1. Russel S., Norvig P., Artificial Intelligence: A Modern Approach, Prentice Hall (2014)
3rd ed.
2. Murphy, Kevin P. Machine learning: a probabilistic perspective. MIT press, (2012) 3rd
ed.
Reference Books
1. Rich E., Knight K. and Nair B. S., Artificial Intelligence, Tata McGraw Hills (2009) 3rd
ed.
2. Luger F. G., Artificial Intelligence: Structures and Strategies for Complex Problem
Solving, Pearson Education Asia (2009) 6th ed.
Page 55 of 210
UMA401: PROBABILITY AND STATISTICS
L T P Cr
3 0 2 4.0
Course Objectives: This course shall make the students familiar with the concepts of
Probability and Statistics useful in implementing various computer science models. One will
also be able to associate distributions with real-life variables and make decisions based on
statistical methods.
Probability: Sample space, Events, Classical, relative frequency and axiomatic definitions of
probability, addition rule and conditional probability, multiplication rule, total probability,
Baye‘s Theorem.
Random Variables: Discrete, continuous and mixed random variables, probability mass,
probability density and cumulative distribution functions, mathematical expectation,
moments, probability and moment generating function, median and quantiles, Markov
inequality, Chebyshev‘s inequality, Function of a random variable.
Sampling Distributions: The Central Limit Theorem, distributions of the sample mean and
the sample variance for a normal population, Chi-Square, t and F distributions.
Testing of Hypotheses: Null and alternative hypotheses, the critical and acceptance regions,
two types of error, power of the test, the most powerful test and Neyman-Pearson
Fundamental Lemma, tests for one sample and two sample problems for normal populations,
tests for proportions, Chi-square goodness of fit test and its applications.
Page 56 of 210
Laboratory Work:
Implementation of statistical techniques using statistical packages viz. SPSS/R including
evaluation of statistical parameters and data interpretation, regression analysis, covariance,
hypothesis testing and analysis of variance.
Text Books:
1. Probability & Statistics for Engineers & Scientists by R.E. Walpole, R.H. Myers, S.L.
Myers & Keying Ye, Prentice Hall, (2016), 9th edition.
2. An Introduction to Probability and Statistics by V.K. Rohatgi & A.K. Md. E. Saleh,
Wiley, (2008), 2nd edition
Reference Books:
1. Miller and Freund's – Probability and Statistics for Engineers by R. A. Johnson, Person
Education, (2017), 9th edition.
2. Introduction to Probability and Statistics for Engineers and Scientists by S.M. Ross,
Elsevier, (2014), 4th edition.
Page 57 of 210
UTA024: ENGINEERING DESIGN PROJECT – II (Buggy Lab)
L T P Cr
1 0 4 3.0
Course Objectives: The project will introduce students to the challenge of electronic systems
design & integration. The project is an example of ‗hardware and software co-design‘ and the
scale of the task is such that it will require teamwork as a co-ordinated effort.
Programming of Arduino:
Introduction to Arduino: Setting up the programming environment and basic
introduction to the Arduino micro-controller
Programming Concepts: Understanding and Using Variables, If-Else Statement,
Comparison Operators and Conditions, For Loop Iteration, Arrays, Switch Case
Statement and Using a Keyboard for Data Collection, While Statement, Using Buttons,
Reading Analog and Digital Pins, Serial Port Communication, Introduction
programming of different type of sensors and communication modules, DC Motors
controlling.
Basics of C#:
Introduction: MS.NET Framework Introduction, Visual Studio Overview and
Installation
Programming Basics: Console programming, Variables and Expressions, Arithmetic
Operators, Relational Operators, Logical Operators, Bitwise Operators, Assignment
Operators, Expressions, Control Structures, Characters, Strings, String Input, serial port
communication: Read and write data using serial port.
Page 58 of 210
Software code optimization, software version control
Laboratory Work:
Schematic circuit drawing and PCB layout design on CAD tools, implementing hardware
module of IR sensor, Transmitter and Receiver circuit on PCB.
Bronze Challenge: Single buggy around track twice in clockwise direction, under full
supervisory control. Able to detect an obstacle.Parks safely. Able to communicate state of the
track and buggy at each gantry stop to the console.
Silver Challenge: Two buggies, both one loop around, track in opposite directions under full
supervisory, control. Able to detect an obstacle. Both park safely. Able to communicate state
of the track and buggy at each gantry stop with console.
Gold Challenge: Same as silver but user must be able to enter the number of loops around
the track beforehand to make the code generalized.
Text Books:
1. Michael McRoberts, Beginning Arduino, Technology in action publications, 2nd
Edition.
2. Alan G. Smith, Introduction to Arduino: A piece of cake, CreateSpace Independent
Publishing Platform (2011).
Reference Book:
1. John Boxall, Arduino Workshop - a Hands-On Introduction with 65 Projects, No Starch
Press; 1st edition (2013).
Page 59 of 210
UTD003: Aptitude Skills Building
L T P Cr
2 0 0 2.0
Course Objectives:
This course aims to sensitize students with the gamut of skills which facilitate them to enhance their
employability quotient and do well in the professional space. These skills are imperative for students
to establish a stronger connect with the environment in which they operate. An understanding of
these skills will enable students to manage the placement challenges more effectively.
Emotional Intelligence: Understanding Emotional Intelligence (EI); Daniel Goleman’s EI Model: Self
Awareness, Self-Regulation, Internal Motivation, Empathy, Social Skills; Application of EI during
Group Discussions & Personal Interview; Application of EI in personal life, student life and at the
workplace
Team Dynamics & Leadership: Understanding the challenges of working within a team format in
today’s complex organizational environments; Stages of team formation; Appreciating forces that
influence the direction of a team's behaviour and performance; Cross-functional teams; Conflict in
Teams- leveraging differences to create opportunity Leadership in the team setting & energizing
team efforts; Situational leadership; Application of team dynamics & collaboration in Group
Discussions; Application of team dynamics at the workplace
Complex Problem Solving: Identifying complex problems and reviewing related information to
develop and evaluate options and implement solutions; Understanding a working model for complex
problem solving - framing the problem, diagnosing the problem, identifying solutions & executing
the solutions; Appreciation of complex problem solving at the workplace through case studies
Lateral Thinking: Understanding lateral thinking & appreciating the difference between vertical &
lateral thinking, and between convergent & divergent thinking; Understanding brain storming &
mind-maps; Solving of problems by an indirect and creative approach, typically through viewing the
problem in a new and unusual light; Application of lateral thinking during Group Discussions &
Personal Interviews; Application of lateral thinking at the workplace
Quantitative Reasoning: Thinking critically and applying basic mathematics skills to interpret data,
draw conclusions, and solve problems; developing proficiency in numerical reasoning; Application of
quantitative reasoning in aptitude tests
Verbal Reasoning: Understanding and reasoning using concepts framed in words; Critical verbal
reasoning; Reading Comprehension; Application of verbal reasoning in aptitude tests
Page 60 of 210
Group Discussion (GD): Illustrating the do’s and don’ts in Group Discussions; Specific thrust on types
of GD topics; GD evaluation parameters; Understanding the challenge in a case discussion; SPACER
model
Personal Interview (PI): Interview do’s and don’ts; PI evaluation parameters; The art of introduction;
Managing bouncer questions; Leading the panel in a PI
1. appreciate the various skills required for professional & personal success.
2. bridge the gap between current and expected performance benchmarks.
3. competently manage the challenges related to campus placements and perform to their
utmost potential.
Recommended Books:
1. Harvard Business Essentials; Creating Teams with an Edge; Harvard Business School Press
(2004)
2. Edward de B., Six Thinking Hats; Penguin Life (2016)
3. Daniel, G., Working with Emotional Intelligence; Bantam Books (2000)
4. Aggarwal, R.S., Quantitative Aptitude for Competitive Examinations; S Chand (2017)
5. Agarwal, A., An expert guide to problem solving: with practical examples; CreateSpace
Independent Publishing Platform (2016)
6. William, D., The Logical Thinking process; American Society for Quality (2007)
Evaluation Scheme:
Sr. Weightage
Evaluation Elements
No. (%)
1 MST 45
2 EST 55
Page 61 of 210
SEMESTER
V
Page 62 of 210
UML501: MACHINE LEARNING
L T P Cr
3 0 2 4.0
Course Objectives: This course provides a broad introduction to machine learning and
statistical pattern recognition. It offers some of the most cost-effective approaches to
automated knowledge acquisition in emerging data-rich disciplines and focuses on the
theoretical understanding of these methods, as well as their computational implications.
Data Collection: Structured and Unstructured Data, Data Collection using web scraping, data
collection using APIs
Association Rules Learning: Need and Application of Association Rules Learning, Basic
concepts of Association Rule Mining, Naïve algorithm, Apriori algorithm.
Page 63 of 210
Introduction to Deep Learning: Introduction to Artificial Neural Networks (ANNs), Artificial
Neurons, Layers, Perceptron, Multilayer Perceptron, Advanced Deep Neural Networks
(DNNs), Batch Normalization, Hyperparameter tuning, Activation Functions, Metrics,
Optimization, Regularization.
Laboratory Work:
Implement data preprocessing, Simple Linear Regression, Multiple Linear Regression, ,
Random forest classification, AdaBoost, Naïve Bayes algorithm; K-Nearest Neighbors (K-
NN), Support Vector Machine , Apriori algorithm and Shallow and Deep Neural
Networks in Python (using inbuilt libraries like
Pandas/NumPy/Sklearn/PyTorch/Tensorflow and from scratch).
Text Books:
1. Mitchell M., T., Machine Learning, McGraw Hill (1997) 1st Edition.
2. Alpaydin E., Introduction to Machine Learning, MIT Press (2014) 3rd Edition.
3. Vijayvargia Abhishek, Machine Learning with Python, BPB Publication (2018)
Reference Books:
1. Bishop M., C., Pattern Recognition and Machine Learning, Springer-Verlag (2011) 2nd
Edition.
2. Michie D., Spiegelhalter J. D., Taylor C. C., Campbell, J., Machine Learning, Neural
and Statistical Classification. Overseas Press (1994).
Page 64 of 210
UCS414: COMPUTER NETWORKS
L T P Cr
2 0 2 3.0
Course Objectives: The subject will introduce the basics of computer networks to students
through a study of layered models of computer networks and applications.
Local Area Networks: Networking topologies: Bus, Star, Ring, Token passing rings,
Ethernet, IEEE standards 802.3, 802.5.
Reliable Data Delivery: Error control (retransmission techniques, timers), Flow control
(Acknowledgements, sliding window), Multiple Access, Performance issues (pipelining).
Routing and Forwarding: Routing versus forwarding, Static and dynamic routing, Unicast
and Multicast Routing. Distance-Vector, Link-State, Shortest path computation, Dijkstra's
algorithm, Network Layer Protocols (IP, ICMP), IP addressing, IPV6, Address binding with
ARP
Process-to-Process Delivery: UDP, TCP and SCTP, Multiplexing with TCP and UDP,
Principles of congestion control, Approaches to Congestion control, Quality of service, Flow
characteristics, Techniques to improve QoS.
Laboratory work:
To design conceptual networks using E-Draw, Visual Studio etc. and to implement topologies
BUS, RING, STAR, Mesh and configuring Router using Packet tracer or GNS3 platform.
Page 65 of 210
Course Learning Outcomes (CLOs) / Course Objectives (COs):
After the completion of the course, the student will be able to:
1. Conceptualize and explain the functionality of the different layers within a network
architecture
2. Understand the concept of data communication, error detection and correction, access
and flow control.
3. Demonstrate the operation of various routing protocols, subnetting and their
performance analysis.
4. Illustrate design and implementation of datalink, transport and network layer protocols
within a simulated/real networking environment.
Text Books:
1. Forouzan A. B., Data communication and Networking, McGraw Hill (2012) 5th ed.
2. Tanenbaum S. A. and Wetherall J. D., Computer Networks, Prentice Hall (2013) 5th ed.
Reference Books:
1. Kurose J. and Ross K., Computer Networking: A Top Down Approach, Pearson (2017)
7th ed.
2. Stallings W., Computer Networking with Internet Protocols and Technology, Pearson
(2004).
Page 66 of 210
UES021: ENGINEERING MATERIALS
L T P Cr
3 1 2 4.5
Equilibrium diagram: Solids solutions and alloys, Gibbs phase rule, Unary and binary
eutectic phase diagram, Examples and applications of phase diagrams like Iron - Iron carbide
phase diagram.
Electrical and magnetic materials: Conducting and resister materials, and their engineering
application; Semiconducting materials, their properties and applications; Magnetic materials,
Soft and hard magnetic materials and applications; Superconductors; Dielectric materials,
their properties and applications. Smart materials: Sensors and actuators, piezoelectric,
magnetostrictive and electrostrictive materials.
Page 67 of 210
8. To estimate the Hall coefficient, carrier concentration and mobility in a semiconductor
crystal.
9. To estimate the band-gap energy of a semiconductor using four probe technique.
10. To measure grain size and study the effect of grain size on hardness of the given
metallic specimens.
Text Books:
1. W.D. Callister, Materials Science and Engineering; John Wiley & Sons, Singapore,
2002.
2. W.F. Smith, Principles of Materials Science and Engineering: An Introduction; Tata
Mc-Graw Hill, 2008.
3. V. Raghavan, Introduction to Materials Science and Engineering; PHI, Delhi, 2005.
Reference Books:
1. S. O. Kasap, Principles of Electronic Engineering Materials; Tata Mc-Graw Hill, 2007.
2. L. H. Van Vlack, Elements of Material Science and Engineering; Thomas Press, India,
1998.
3. K. G. Budinski, Engineering Materials – Properties and selection, Prentice Hall India,
1996.
Page 68 of 210
UCS637: Image Processing
L T P Cr
2 0 2 3.0
Digital Image Fundamentals:
Image perception - light, luminance, brightness, and contrast; Examples of fields that use
digital image processing; Digital Image Fundamentals: A simple image formation model,
image sampling and quantization, basic relationships between pixels, Types of Images:
Binary, Grayscale, color; Color representation: Color models; Pseudo-color and Full-color
image processing.
Image Enhancement and Restoration in Spatial and Frequency (Transform) domain:
Introduction to spatial and frequency (transform) domain, DFT (Discrete Fourier Transform),
Properties of 2-D DFT; Image enhancement: Point processing, Neighbourhood processing,
Histogram processing; Image Smoothing and Sharpening: Lowpass and High pass filtering;
Image restoration: degradation model; inverse filtering.
Feature Extraction:
Introduction to type of features; Boundary Feature Descriptors; Region Feature Descriptors;
Principal Components as Feature Descriptors; Whole Edges: Canny, LOG, DOG, Hough
Transform, Corners: Harris-Stephens corner detector; Whole Image Features: SIFT (Scale-
Invariant Feature Transform), LBP (Local Binary Pattern) and its variants.
Image Segmentation:
Morphological operation, Point-Line-Edge Detection; Thresholding; Segmentation by Region
Growing; Segmentation by Region Splitting and Merging; Region Segmentation by
Clustering; Region Segmentation by Graph-Cut; Texture Segmentation; Introduction to use
of Motion in Segmentation.
Application Areas of Image Processing:
Image compression: JPEG compression; Huffman coding.
Image security: Watermarking, Steganography, Visual Cryptography.
Object Detection and Classification: Introduction to Neural Network, Convolutional Neural
Networks (CNNs), Overview on use cases of CNNs in Image Processing, Study of prominent
CNN architectures: AlexNet, ResNet, EfficientNet, etc.
Page 69 of 210
Text Books:
1. Gonzalez C. R., Woods E. R., Digital Image Processing, Pearson Education, 4th ed.
2. Anil K. Jain, Fundamentals of Digital Image Processing, Prentice Hall, 1989.
Reference Books:
1. McAndrew A., Introduction to Digital Image Processing with Matlab, Thomson Course
Technology (2004)
2. Low A., Introductory Computer Vision and Image Processing, McGraw-Hill (1991),
1sted.
Page 70 of 210
UCS503: SOFTWARE ENGINEERING
L T P Cr
3 0 2 4.0
Course Objectives: To plan and manage large scale software and learn emerging trends in
software engineering.
Software Design and construction: System design principles like levels of abstraction,
separation of concerns, information hiding, coupling and cohesion, Structured design (top-
down or functional decomposition), object-oriented design, event driven design, component-
level design, test driven design, data design at various levels, architecture design like Model
View Controller, Client – Server architecture. Coding Practices: Techniques, Refactoring,
Integration Strategies, Internal Documentation.
Software Project Management: Overview of Project Management: Scope, Time and Cost
estimations.
Laboratory work:
Implementation of Software Engineering concepts and exposure to CASE tools like Rational
Software Suit through projects.
Page 71 of 210
On completion of this course, the students will be able to
1. Analyze software development process models for software development life cycle.
2. Elicit, describe, and evaluate a system's requirements and analyze them using various
UML models.
3. Demonstrate the use of design principles in designing data, architecture, user and
component level design.
4. Test the system by planning appropriate test cases and applying relevant test strategies.
5. Comprehend the use of agile development methodologies including UI sketching, user
stories, story cards and backlog management.
Text Books:
1. Pressman R., Software Engineering, A Practitioner‘s Approach, McGraw Hill
International, 7th ed. (2010).
2. Sommerville I., Software Engineering, Addison-Wesley Publishing Company, 9th ed.
(2011).
Reference Books:
1. Jalote P.,An integrated Approach to Software Engineering, Narosa, 3rd ed. (2005).
2. Booch G.,Rambaugh J.,Jacobson I.,The Unified Modeling Language User Guide, 2nd
ed. (2005).
Page 72 of 210
UCS510: COMPUTER ARCHITECTURE AND ORGANIZATION
L T P Cr
3 0 0 3.0
Course Objectives: Focus is on the architecture and organization of the basic computer
modules viz. controls unit, central processing unit, input-output organization and memory
unit.
Basics of Computer Architecture: Number System and code conversion , Logic gates, Flip
flops, Registers, Multiplexer, De-multiplexer, Decoder, Encoder etc. IEEE 754 Floating point
representation. 32bit/64bit
Register Transfer and Micro operations: Register transfer Language, Register transfer,
Bus & memory transfer, Arithmetic micro operations, Logic micro operations, Shift micro
operations, Design of ALU. Three state buffer, Binary Adder, Binary Incrementor.
Memory Unit: Memory hierarchy, Processor vs. memory speed, High-speed memories,
Main Memory, Cache memory, Associative memory, Interleaving, Virtual memory, Memory
management techniques. Direct Mapping, Set Associative Mapping.
Page 73 of 210
3. Explore various memory management techniques and algorithms for performing
addition, subtraction and division etc
4. Interpret Concepts of pipelining, hazards, memory hierarchy, cache management and
virtual memory.
Text Books:
1. Mano, Morris M., Computer System Architecture, Prentice Hall (1991) 3rd ed.
2. Hayes, J.P., Computer Architecture and Organization, McGraw Hill (1998) 3rd ed.
3. William Stallings, Computer Organization and Architecture, Pearson (2018), 11th ed.
Reference Books:
1. Hennessy, J.L., Patterson, D.A, and Goldberg, D., Computer Architecture A
Quantitative Approach, Pearson Education Asia (2006) 4th ed.
2. Leigh, W.E. and Ali, D.L., System Architecture: software and hardware concepts,
South Wester Publishing Co. (2000) 2nd ed.
Page 74 of 210
SEMESTER
VI
Page 75 of 210
UCS701: THEORY OF COMPUTATION
L T P Cr
3 1 0 3.5
Course Objectives: This course introduces basic theory of computer science and formal
methods of computation. The course exposes students to the computability theory, as well as
to the complexity theory.
Context Free Grammar and Push Down Automata: Context Free Grammar, Derivation
tree and Ambiguity, Application of Context free Grammars, Chomsky and Greibach Normal
form, Properties of context free grammar, CKY Algorithm, Decidable properties of Context
free Grammar, Pumping Lemma for Context free grammar, Push down Stack Machine,
Design of Deterministic and Non-deterministic Push-down stack.
Turing Machine: Turing machine definition and design of Turing Machine, Variations of
Turing Machines, combining Turing machine, Universal Turing Machine, Post Machine,
Chomsky Hierarchy, Post correspondence problem, Halting problem, Turing decidability.
Page 76 of 210
Text Books:
1. Hopcroft E. J., Ullman D. J. and Motwani R., Introduction to Automata Theory,
Languages and Computation, Pearson Education (2007) 3rd ed.
2. Martin C. J., Introduction to Languages and the Theory of Computation, McGraw-Hill
Higher Education (2011) 4th ed.
3. Lewis R. H., Papadimitriou H. C., Elements of the Theory of Computation, Prentice
Hall (1998) 2nd ed.
Reference Books:
1. Cohen A. I. D., Introduction to Computer Theory, Wiley (1997) 2nd ed.
2. Sipser M., Introduction to the Theory of Computation, Cengage Learning (2013) 3rd ed.
Page 77 of 210
UMA031: OPTIMIZATION TECHNIQUES
L T P Cr
3 0 2 4.0
Course Objectives: The main objective of the course is to formulate mathematical models
and to understand solution methods for real life optimal decision problems. The emphasis
will be on basic study of linear and non-linear programming problems, Integer programming
problem, Transportation problem, Two person zero sum games with economic applications
and project management techniques using CPM.
Integer Programming: Branch and bound technique, Gomory‘s Cutting plane method.
Nonlinear Programming:
Laboratory Work:
Lab experiments will be set in consonance with materials covered in the theory using Matlab.
Page 78 of 210
Course Learning Outcomes (CLOs) / Course Objectives (COs):
Upon Completion of this course, the students would be able to:
1. Formulate the linear and nonlinear programming problems.
2. Solve linear programming problems using Simplex method and its variants.
3. Construct and optimize various network models.
4. Construct and classify multi-objective linear programming problems.
5. Solve nonlinear programming problems.
Text Books:
1. Chandra, S., Jayadeva, Mehra, A., Numerical Optimization and Applications, Narosa
Publishing House, (2013).
2. Taha H.A., Operations Research-An Introduction, PHI (2007).
Recommended Books:
1. Pant J. C., Introduction to optimization: Operations Research, Jain Brothers (2004).
2. Bazaarra Mokhtar S., Jarvis John J. and Shirali Hanif D., Linear Programming and
Network flows, John Wiley and Sons (1990).
3. Swarup, K., Gupta, P. K., Mammohan, Operations Research, Sultan Chand & Sons,
(2010).
4. H.S. Kasana and K.D. Kumar, Introductory Operations research, Springer publication,
(2004).
5. Ravindran, D. T. Phillips and James J. Solberg: Operations Research- Principles and
Practice, John Wiley & Sons, Second edn. (2005).
Page 79 of 210
UCS617: MICROPROCESSOR-BASED SYSTEMS DESIGN
L T P Cr
3 0 2 4.0
Introduction to Assembly as Language: RISC and ARM Design Philosophy, The ARM
processor, Memory Layout of an Executing Program, Structure of an Assembly Program,
Functionality of Assembler, GNU Assembly Directives.
Instruction Set: Current program status register, CPU Component and Data Paths, ARM
User Registers, Instruction Components, Load/Store Instructions, Branch Instructions,
Pseudo-Instructions, Data Processing Instructions, Special Instructions, Structured
Programming: Sequencing, Selection, Iteration, Subroutines, Aggregate Data Types, Abstract
Data Types, Word Frequency Counts.
Laboratory Work:
Programming examples of 8086.Interfacing of 8086 with 8255 and 8259. Introduction to
Kiel Software, Introduction to ARM processor kit, Programming examples of ARM
processor. ARM based Projects
Page 80 of 210
Text Books:
1. Barry B. Brey, Intel Microprocessors, 8th edition, Prentice Hall, PEARSON (2012).
2. Larry D. Pyeatt, ―Modern Assembly Language Programming with the ARM
processor‖, Newnes, 1st Edition, 2016.
Reference Books:
1. ARM System on Chip Architecture–Steve Furber–2nd Ed., 2000, Addison Wesley
Professional.
2. Steve Furber, ARM System On Chip Architecture, Pearson Education India, 2014.
3. Gibson, Glenn A., Liu, Yu-Cheng., Microcomputer Systems: The 8086/8088 Family
Architecture Programming And Design, 2nd edition, Pearson (2001)
Page 81 of 210
UTA025: INNOVATION AND ENTREPRENEURSHIP
(2 SELF-EFFORTS HOURS)
L T P Cr
1 0 2 3.0
Course Objectives: This course aims to provide the students with a basic understanding in
the field of entrepreneurship, entrepreneurial perspectives, concepts and frameworks useful
for analyzing entrepreneurial opportunities, understanding eco-system stakeholders and
comprehending entrepreneurial decision making. It also intends to build competence with
respect business model canvas and build understanding with respect to the domain of start-up
venture finance.
Crafting business models and Lean Start-ups: Introduction to business models; Creating
value propositions - conventional industry logic, value innovation logic; customer focused
innovation; building and analyzing business models; Business model canvas, Introduction to
lean startups, Business Pitching.
Text Books:
Ries, Eric (2011), The lean Start-up: How constant innovation creates radically successful
businesses, Penguin Books Limited.
Page 82 of 210
Blank, Steve (2013), The Startup Owner‘s Manual: The Step by Step Guide for Building a
Great Company, K&S Ranch.
S. Carter and D. Jones-Evans, Enterprise and small business- Principal Practice and Policy,
Pearson Education (2006)
Reference Books:
1. T. H. Byers, R. C. Dorf, A. Nelson, Technology Ventures: From Idea to Enterprise,
McGraw Hill (2013)
2. Osterwalder, Alex and Pigneur, Yves (2010) Business Model Generation.
3. Kachru, Upendra, India Land of a Billion Entrepreneurs, Pearson
4. Bagchi, Subroto, (2008), Go Kiss the World: Life Lessons For the Young Professional,
Portfolio Penguin
5. Bagchi, Subroto, (2012). MBA At 16: A Teenager‘s Guide to Business, Penguin Books
6. Bansal, Rashmi, Stay Hungry Stay Foolish, CIIE, IIM Ahmedabad
7. Bansal, Rashmi, (2013). Follow Every Rainbow, Westland.
8. Mitra, Sramana (2008), Entrepreneur Journeys (Volume 1), Booksurge Publishing
9. Abrams, R. (2006). Six-week Start-up, Prentice-Hall of India.
10. Verstraete, T. and Laffitte, E.J. (2011). A Business Model of Entrepreneurship, Edward
Elgar Publishing.
11. Johnson, Steven (2011). Where Good Ideas comes from, Penguin Books Limited.
12. Gabor, Michael E. (2013), Awakening the Entrepreneur Within, Primento.
13. Guillebeau, Chris (2012), The $100 startup: Fire your Boss, Do what you love and
work better to live more, Pan Macmillan
14. Kelley, Tom (2011), The ten faces of innovation, Currency Doubleday
15. Prasad, Rohit (2013), Start-up sutra: what the angels won‘t tell you about business and
life, Hachette India.
Page 83 of 210
UCS797: CAPSTONE PROJECT
L T P Cr
1 0 2 8.0
Course Objectives: To facilitate the students learn and apply an engineering design process
in electrical engineering, including project resource management. As a part of a team, the
students will make a project, that emphasizes, hands-on experience, and integrates analytical
and design skills. The idea is to provide an opportunity to the students to apply what they
have learned throughout the course of graduate program by undertaking a specific problem.
Page 84 of 210
SEMESTER
VII
Page 85 of 210
UCS802: COMPILER CONSTRUCTION
L T P Cr
3 0 2 4.0
Course Objectives: To Gain the working knowledge of the major phases of compilation and
develop the ability to use formal attributed grammars for specifying the syntax and semantics
of programming languages. Learn about function and complexities of modern compilers and
design a significant portion of a compiler.
Lexical Analysis: Need of Lexical analyzer, Tokens and regular expressions, Generation of
lexical analyzer from DFA, Introduction to LEX and program writing in LEX.
Syntax Analysis: Need for syntax analysis and its scope, Context free grammar, Top down
parsing, bottom up parsing, backtracking and their automatic generation, LL(1) Parser, LR
Parser, LR(0) items, SLR(1), LALR(1), Canonical Parsing, Introduction to YACC and
Integration with LEX.
Error Analysis: Introduction to error analysis, detection, reporting and recovery from
compilation errors, Classification of error-lexical, syntactic and semantic.
Static semantics and Intermediate Code generation: Need for various static semantic
analyses in declaration processing, name and scope analysis, S-attribute def. and their
evaluation in different parsing, Semantic analysis through S-attribute grammar, L-attribute
def. and their evaluation.
Run time Environment: Need for runtime memory management, Address resolution of
runtime objects at compile time, Type checking, Language features influencing run time
memory management, Parameter passing mechanism, Division of memory into code, stack,
heap and static, Activation record, Dynamic memory management, garbage collection.
Code Generation: Code generation for expressions, Issues in efficient code generation, Sethi
Ullman algorithm.
Code Optimization: Need for code optimizations, Local and global optimization, Control
flow analysis, Data flow analysis, performing global optimizations, Graph coloring in
optimization, Live ranges of run time values.
Laboratory work:
Construct a lexical analyzer using Flex. Construct a parser using Bison/ any programming
language. Build simple compilers from parsing to intermediate representation to code
generation and simple optimization.
Page 86 of 210
Course Learning Outcomes (CLOs) / Course Objectives (COs):
After the completion of the course, the student will be able to:
1. Comprehend the working of major phases of compiler.
2. Apply top-down and bottom-up parsing techniques for the Parser construction.
3. Understand the basic data structures used in compiler construction such as
abstract syntax trees, symbol tables and three-address code
4. Understand target machine‘s run time environment and techniques used for
code generation.
Text Books:
1. Aho V. A., Ullman D. J., Sethi R. and Lam S. M., Compilers Principles, Techniques
and Tools, Pearson Education (2007), 2nd ed.
2. Levine J., Mason T., Brown D., Lex and Yacc, O‘Reilly (2012), 2nd ed.
Page 87 of 210
UHU005: HUMANITIES FOR ENGINEERS
L T P Cr
2 0 2 3.0
Course Objectives: The objective of this course is to introduce values and ethical principles,
that will serve as a guide to behavior on a personal level and in professional life. The course
is designed to help the students to theorize about how leaders and managers should behave to
motivate and manage employees; to help conceptualize conflict management strategies that
managers can use to resolve organizational conflict effectively. It also provides background
of demand and elasticity of demand to help in devising pricing strategy; to make strategic
decisions using game theory and to apply techniques of project evaluation.
Unit 3: Economics
Demand, Supply & Elasticity – Introduction to Economics, Demand & its Determinants,
Elasticity and its types
Production & Cost Analysis – Short run & Long Run Production Functions, Short run &
Long run cost functions, Economies & Diseconomies of Scale
Competitive Analysis & Profit Maximization – Perfect competition, Monopoly, Monopolistic
& Oligopoly Markets
Strategy & Game Theory – Pure Strategy & Mixed Strategy Games, Dominance, Nash
Equilibrium, & Prisoner‘s Dilemma
Capital Budgeting – Capital Projects, Net Present Value (NPV) & IRR techniques.
Practical:
1. Practical application of these concepts by means of Discussions, Role-plays and
Presentations,
2. Analysis of Case Studies on ethics in business and whistle-blowing, leadership,
managerial decision-making.
3. Survey Analysis
4. Capital Budgeting assignment
Page 88 of 210
Course Learning Outcomes (CLOs) / Course Objectives (COs):
The student after completing the course will be able to:
1. Comprehend ethical principles and values and apply them as a guide to behavior in
personal and professional life.
2. Apply tools and techniques to manage and motivate employees.
3. Analyse and apply conflict management strategies that managers can use to resolve
organizational conflict effectively.
4. Devise pricing strategy for decision-making.
5. Apply techniques for project evaluation.
Text Books:
1. N. Tripathi, Human Values, New Age International (P) Ltd. (2009).
2. Robbins, S. P/ Judge, T. A/ Sanghi, S Organizational Behavior Pearson, New Delhi,
(2009).
3. Petersen, H.C., Lewis, W.C. and Jain, S.K., Managerial Economics, Pearson (2006).
Reference Books:
1. McKenna E. F. Business psychology and organisational behaviour. Psychology Press,
New York (2006).
2. Furnham A. The Psychology of Behaviour at Work: The Individual in the organization.
Psychology Press, UK (2003).
3. Salvatore, D and Srivastava, R., Managerial Economics, Oxford University Press
(2010).
4. Pindyck, R and Rubinfiled, D., Microeconomics, Pearson (2017).
Page 89 of 210
SEMESTER
VIII
Page 90 of 210
UCS813: SOCIAL NETWORK ANALYSIS
L T P Cr
2 0 2 3.0
Course Objectives: To enable students to put Social Network Analysis projects into action
in a planned, informed and efficient manner.
Event Detection: Classification of Text Streams, Event Detection and Tracking: Bag of
Words, Temporal, location, ontology based algorithms. Evolution Analysis in Text Streams,
Sentiment analysis.
Laboratory work:
Implementation of various concepts taught in the course using Python/R Programming
Page 91 of 210
Text Books / Reference Books:
1. Charu C. Aggarwal, Social Network Data Analytics, Springer; 2011.
2. S.Wasserman, K.Faust: Social Network Analysis: Methods and Applications,
Cambridge Univ Press, 1994
3. Scott, J. (2007). Social network analysis: A handbook (2nd Ed.). Newbury Park, CA:
Sage.
4. Knoke (2008). Social Network Analysis, (2nd Ed). Sage.
Page 92 of 210
UCS806: ETHICAL HACKING
L T P Cr
3 0 2 4.0
Course Objectives: This course is designed to impart a critical and theoretical and detailed
practical knowledge of a range of computer network security technologies as well as network
security tools and the services related to Ethical Hacking.
Scanning: Detecting live systems-on the target network, - Discovering services running
listening on target systems, Understanding port scanning techniques, Identifying TCP and
LIDP services running on the target network, Understanding active and passive
fingerprinting.
Hacking Wireless Networks: Introduction to 802.11, Role of WEP, Cracking WEP Keys,
Sniffing Traffic, Wireless DOS attacks, WLAN Scanners, WLAN Sniffers, Hacking Tools,
Securing Wireless Networks.
Laboratory Work:
Lab Exercises including using scanning tools like IPEYE, IPsecScan, SuperScan etc. and
Hacking Tools likes Trinoo, TFN2K, Zombic, Zapper etc.
Page 93 of 210
Course Learning Outcomes (CLOs) / Course Objectives (COs):
After the completion of the course, the student will be able to:
1. Understand the different phases involved in hacking.
2. Utilize the scanning tools used for the information gathering.
3. Recognize the phases in session hijacking and use the tools for counter-measuring the
various sniffing attacks.
4. Analyse different types of attacks on the wireless networks.
5. Describe and apply different types of algorithms for securing the data.
Text Books:
1. Simpson T. M., Backman K., Corley J., Hands-On Ethical Hacking and Network
Defense, Delmar Cengage Learning (2011) 2nd edition.
2. Fadia A. and Zacharia M., Network intrusion alert: an ethical hacking guide to intrusion
detection, Boston, MA: Thomas Course Technology 3rd edition (2008).
Reference Books:
1. Mathew T., Ethical Hacking, OSB Publication (2003). 2nd edition
2. McClure S., Scambray J. and Kurtz G., Hacking Exposed 7: Network Security Secrets
and Solutions, McGrawHill (2012) 7th Edition.
Page 94 of 210
UCS893: CAPSTONE PROJECT II
L T P Cr
0 0 4 8.0
Course Objectives: To facilitate the students learn and apply their earned skill set for the
system development life cycle in Computer Engineering. As a part of a team, the students
will make a project, which emphasizes hands-on experience, and integrates analytical, design,
and development skills. The idea is to provide an opportunity to the students to apply what
they have learned throughout the course of graduate program by undertaking a specific
problem.
Course Description: This course is of six months and is taken by the students who are doing
their alternate semester here at CSED Thapar, instead of opting project semester at some
software company or research institute. Capstone Project is increasingly interdisciplinary, and
requires students to function on multidisciplinary teams. It is the process of devising a
system, component or process to meet desired needs. It is a decision-making process, in
which the basic sciences, mathematics, and engineering are applied to convert resources
optimally to meet the stated needs. It typically includes both analysis and synthesis performed
in an iterative cycle. As part of their design experience, students have an opportunity to
define and determine the problem and its scope. The project demonstrates that students have
adequate exposure to design, as defined, in engineering contexts. The program must clearly
demonstrate where standards and constraints are taught and how they are integrated into the
design component of the project. Each group will have 1-3 students, and one of them is
working as team leader. Team lead is having an additional responsibility for maintaining the
daily diary. Each Group will work under mentorship of a faculty supervisor as assigned by
the department.
Each group must meet the assigned supervisor till the end of the semester (record of
attendance will be maintained), as per the time slot which will be provided to them by the
respective supervisor. This is mandatory requirement for the fulfilment of the attendance as
well as the successful completion of the project. The faculty supervisor of the project will
continuously judge the development of the workings of the assigned groups.
Course Learning Outcomes (CLOs) / Course Objectives (COs):
After the completion of the course, the student will be able to:
1. Develop skills necessary for time management, reporting and carrying out projects
within an organization/industry.
2. Design, develop, debug, document, and deliver automated solutions for real world
problems and learn to work in a team environment.
3. Develop technical report writing and verbal communication skills.
4. Experience contemporary computing systems, tools and methodologies and apply
experimental and data analysis techniques to the software projects.
5. Apply interdisciplinary fundamentals to the software projects taking into account
professional and ethical issues.
Page 95 of 210
Elective
Focus Basket
(EFB)
Page 96 of 210
EFB
High
Performance
Computing
Page 97 of 210
UCS531: CLOUD COMPUTING
L T P Cr
2 0 2 3.0
Course Objectives: To learn the concepts of cloud infrastructure and services in addition
with its implementation for assessment of understanding the course by the students.
Cloud based Data Storage: Introduction to Hadoop, Hadoop Ecosystem (Pig, Hive,
Cassandra and Spark), Introduction No-SQL databases, Map- Reduce framework for
Simplified data processing on Large clusters using Hadoop, Data Replication, Shared access
to data stores.
Self-learning Content:
Cloud Issues and Challenges: Cloud models, Cloud computing issues and challenges like
Security, Elasticity, Resource management and Scheduling, QoS (Quality of Service) and
Resource Allocation, Cost Management and Cloud bursting.
Laboratory work:
To implement Cloud, Apache and basics of Hadoop framework, an open source
implementation of MapReduce, and its Java API, Hadoop Distributed File System (HDFS).
Implementation of RESTFul Web Services. To understand various concepts about
virtualization and data storage. To implement few algorithms with the help of MapReduce
and some high-level language.
Page 98 of 210
Course Learning Outcomes (CLOs) / Course Objectives (COs):
After the completion of the course, the student will be able to:
1. Comprehend the basic concepts and architecture of Cloud computing.
2. Implement Cloud Services through AWS offerings and Restful web services.
3. Apply the knowledge of virtualization through different virtualization technologies.
4. Perform operations on data sets using Map Reduce framework, SQL and NO SQL
databases.
Text Books:
1. Buyya K, R., Broberg J. and Goscinski M. A., Cloud Computing: Principles and
paradigms, MIT Press (2011) 4th ed.
2. Kai Hwang, Geoffrey Fox and Jack Dongarra, Distributed and Cloud Computing: From
Parallel Processing to the Internet of Things, Morgan Kaufmann (2012) 2nd ed.
3. Miller M., Cloud Computing, Que Publishing (2008) 1st ed.
4. Puttini R. and Mahmood Z., Cloud Computing: Concepts, Technology & Architecture,
Service Tech press (2013) 1st ed.
Reference Books:
1. Velte A., Velte T., and Elsenpeter R., Cloud Computing: A practical Approach, Tata
McGrawHill (2009) 1st ed.
2. Hurwitz J., Bllor R., Kaufman M. and Halper F., Cloud Computing for dummies (2009)
1st ed.
Page 99 of 210
UCS635: GPU COMPUTING
L T P Cr
2 0 2 3.0
Course Objectives: To study architecture and capabilities of modern GPUs and learn
programming techniques for the GPU such as CUDA programming model.
Self-Learning Content:
Basics of Parallel and distributed Computing, CUDA programming model
Laboratory work:
Practice programs using CUDA, OpenCL and OpenACC.
Text Books:
1. Sanders, J. and Kandrot, E., CUDA by Example: An Introduction to General‐Purpose
GPU Programming, Addison-Wesley Professional (2012) 4th Edition.
2. Kirk, D. and Hwu, M., W., Programming Massively Parallel Processors: A Hands-on
Approach. Morgan Kaufmann (2016) 3rd Edition.
3. Grama, A., Gupta, Karypis, G., Kumar, V., Introduction to Parallel Computing,
Addison Wesley, (2003) 2nd Edition.
Reference Book:
1. Hwu, M., W., A GPU Computing Gems Emerald Edition (Applications of GPU
Computing Series), Morgan Kaufmann (2011) 1st Edition.
Programming Message Passing and Shared Address Space Platforms: Send and Receive
Operations, MPI: the Message Passing Interface, Topologies and Embedding, Overlapping
Communication with Computation, Groups and Communicators.
CUDA programming model: API function to transfer data to parallel computing device,
Concepts of Threads, Blocks, Grids, developing kernel function that will be executed by
threads in the parallelized part.
Laboratory work:
To implement parallel programming using CUDA with emphasis on developing applications
for processors with many computation cores, mapping computations to parallel hardware,
efficient data structures, paradigms for efficient parallel algorithms.
Text Books:
1. C Lin, L Snyder. Principles of Parallel Programming. USA: Addison-Wesley (2008).
2. A Grama, A Gupta, G Karypis, V Kumar. Introduction to Parallel Computing, Addison
Wesley (2003).
Reference Books:
1. B Gaster, L Howes, D Kaeli, P Mistry, and D Schaa. Heterogeneous Computing With
Opencl. Morgan Kaufmann and Elsevier (2011).
2. T Mattson, B Sanders, B Massingill. Patterns for Parallel Programming. Addison-
Wesley (2004).
3. Quinn, M. J.,Parallel Programming in C with MPI and OpenMP, McGraw-Hill(2004).
Parallel process modeling: Using Petri nets and finite automata in simulation, Cellular
automata and simulation.
Input Modeling: Data collection, Identification and distribution with data, parameter
estimation, Goodness of fit tests, Selection of input models without data, Multivariate and
time series analysis. Verification and Validation of Model: Model Building, Verification,
Calibration and Validation of Models.
Output Analysis: Types of Simulations with Respect to Output Analysis, Stochastic Nature
of output data, Measures of Performance and their estimation, Output analysis of terminating
simulation, Output analysis of steady state simulations.
Laboratory Work:
To carry out work on any simulation tools, Implementation of various techniques to generate
random numbers. Apply any simulation model in real life applications.
Self-Learning Content:
Different Simulation Softwares and their applications for different analysis, Trends in
Simulation Software.
Text Books:
1. Payne A. J., Introduction to Simulation: Programming Techniques and Methods of
Analysis, McGraw Hill (1982).
2. Gorden G., System Simulation, Prentice Hall publication (1978), 2nd ed.
Reference Books:
1. Narsingh D., Systems Simulation with Digital Computer, PHI Publication (EEE)
(2004), 3rd ed.
2. Banks J., Carson J. S., Nelson L. B., Nicol M. D, Discrete Event system Simulation,
Pearson Education, Asia (2010), 5th ed.
Course Objectives: To understand the basic concepts of Computer Vision. The student must
be able to apply the various concepts of Computer Vision in other application areas.
Image Representation & Description: Edges - Canny, LOG, DOG; Line detectors (Hough
Transform), Corners - Harris and Hessian Affine, Orientation Histogram, SIFT, SURF, HOG,
GLOH, LBP and its variants, Gabor Filters and DWT.
Motion Analysis: Background Subtraction and Modeling, Optical Flow, KLT, Spatio-
Temporal Analysis, Dynamic Stereo; Motion parameter estimation.
Self-Learning Content:
Miscellaneous: Applications: CBIR, CBVR, Activity Recognition, computational
photography, Biometrics, stitching and document processing; Modern trends - super-
resolution; GPU, Augmented Reality; cognitive models, fusion and SR&CS.
Laboratory Work:
To implement various techniques and algorithms studied during course.
Reference Books:
1. Hartley, R. and Zisserman, A., Multiple View Geometry in Computer Vision
Cambridge University Press (2003) 2nd Edition.
2. Fukunaga, K., Introduction to Statistical Pattern Recognition, Academic Press, Morgan
Kaufmann (1990) 2nd Edition.
3. Gonzalez, C., R. and Woods, E., R. Digital Image Processing, Addison- Wesley (2018)
4th Edition.
Course Objectives: To develop the skill & knowledge in 3D Modeling & Animation.
Students will understand the know-how and can function either as an entrepreneur or can take
up jobs in the multimedia and animation industry, video studios, edit set-up and other special
effects sectors.
3D Object Modelling: Basic modelling concepts, vertices, edges, and faces, basic
transformations, pivot points, duplication and merging, extrusion, insetting, modifiers, loop
cuts and face loops, subdivision methods, coordinate system and exporting, model rendering.
Low Poly Models: Triangular meshes, objects and mesh data, cursor and origins hidden
geometry, Boolean modifiers, geometry from curve, curve resolution, non-planner geometry.
Self-Learning Content: Real Time Animation: Splines and curves, Key-frame techniques,
Quaternions for rotations / orientations, Blending and interpolation, Kinematics, Motion
capture systems, Motion graphs and character control, Animation data representations,
Behavioural Animation, Facial Animation, Perception in animation.
Laboratory Work
This course covers beginner to intermediate 3D Modeling and Animation. In this Lab the
students will be able to model the 3D character and objects, its UV Mapping, Texture
Painting, Rigging, and Animation. Evaluation will be mainly via projects and assignments
taking a creative approach to expressive 3D modelling and Animation.
Text Books:
1. House, H., D. and Keyser, C., J., Foundations of Physically Based Modeling and
Animation, CRC Press (2017) 1st Edition.
2. Chopine, A., 3D Art Essentials: The Fundamentals of 3D Modeling, Texturing, and
Animation, Focal Press (2011) 1st Edition.
3. Zeman, B., N., Essential Skills for 3D Modeling, Rendering, and Animation, A K
Peters / CRC Press (2017) 1st Edition.
Reference Books:
1. Villar, O., Learning Blender: A Hands-On Guide to Creating 3D Animated Characters,
Addison Wesley (2017) 2nd Edition.
2. Kerlow, I., The Art of 3D Computer Animation and Effects, Wiley, (2009) 4th Edition.
3. Flavell, L., Beginning Blender: Open Source 3D Modelling, Animation, and Game
Design, Apress, (2010) 1st Edition.
4. Boardman, T., 3dsmax 7 Fundamentals, New Riders, (2005) 1st Edition.
Course Objectives: To become familiar with various fundamental and advanced gaming
concepts including basic maths and physics used behind the game engine.
Introduction: Types of games, History, Impact of Games on Society , Game life cycle,
Game loop, Components of game, Model and scene rendering, State Management, Scene
management, Texture compression, Level of details, Frustum culling, Occlusion culling,
Backface Culling, Game as a software, Steps for Game Design, Data Structure for Game,
CPU vs.GPU, Game Engine, Components of game engine, Linear Transformation.
Composite transformation.
Fundamental Gaming concepts: Static and Dynamic Game objects, Vectors, Concept of
Time, Lighting, Particle System, Collider, Collision handles, Materials, Texture mapping,
Input Process, Object replication, Instantiation, Special Effects, Terrain, Audio design and
production, Ray Casting.
Maths behind Game Engines: Introduction to Vectors- Addition & Subtraction, Vector
length, Scaling, Velocity in the presence of External Forces, Unit length vectors, Dot & Cross
product, Linear Interpolation, Euler Angles, Intersection, Matrices, Coordinate systems, 3D
to 2D Projections, Triangle Meshes, Optimizations, Quaternion,Understanding of Screen and
World Coordinate system
Advanced Games: Augmented Reality, Virtual Reality, Mixed Reality, AR & VR based
Games, Artificial Intelligence based Game, Networking based game, Android based games,
Raycasting, Cloud Gaming, Gaming in Metaverse, Dynamic Balancing, Non-Euclidean
Game Design , Advancement in Game Engines, Supersampling and Enhancement of
Frame Rate.
Laboratory work:
2D and 3D game development for windows and android platform using Unity 3D Game
Engine and C# language.
Text Books:
1. Eberly H. D., Game Physics, Morgan Kaufmann Publisher (2010), 2nd ed.
2. Bond G. J., Introduction to Game Design, Prototyping, and Development: From
Concept to Playable Game with Unity and C#, Addison-Wesley (2015), 2nd ed.
Reference Books:
1. House H. D., Keyser C. J, Foundations of Physically Based Modeling and Animation,
CRC Press (2017), 1st ed.
2. Okita. A., Learning C# Programming with Unity 3D, CRC Press (2014), 1st ed.
Course Objectives: To become familiar with the concept and applications of augmented &
virtual reality and learn different types of algorithmic techniques and strategies.
Computer Vision for AR: Marker Tracking, Thresholding, Contour detection, Hough
Transformation, Quadrilateral fitting, SIFT, Pose Estimation, Homography, Incremental
Tracking, SLAM: Bundle Adjustment, Parallel Tracking and Mapping, Outdoor Tracking,
STML.
Laboratory work:
To implement various techniques studied during course.
Text Books:
1. Dieter Schmalstieg, Tobias Höllerer, Augmented-Reality-Principles-and-Practice-
Usability-, Addison-Wesley (2016) 1st ed.
2. Parisi T., Learning Virtual Reality, O‘Reilly (2016) 1st ed.
3. Gerard Jounghyun Kim, Designing Virtual Reality Systems: The Structured Approach,
Springer (2005) 1st ed.
Reference Books:
1. Whyte J., Virtual Reality and the Built Environment, Architectural Press (2002).
2. Aukstakalnis S., Practical Augmented Reality: A Guide to the Technologies,
Applications, and Human Factors for AR and VR, Addison-Wesley (2016).
Course Objectives: This course is designed to impart a critical theoretical and detailed
practical knowledge of a range of computer network security technologies as well as network
security tools.
Network Security: Packet sniffing and spoofing, Attacks on TCP protocol, SYN flood, TCP
reset attack, session hijacking attack, Firewalls: Packet filter, Stateful firewall, Application
firewall. IP tables, DNS poisoning, Authoritative replies, ARP poisoning, Heartbleed Bug
and Attack, Public key infrastructure and Transport Layer Security.
Laboratory work:
Demonstrate use of Environment variables and privileged programs, Demonstrate Buffer
Overflow and showcase EIP and other register status, insert malicious shell code into a
program file and check its malicious or benign status, perform ARP poisoning, implement
stateful firewall using IPTables.
Reference Books:
1. Graves, K., Certified Ethical Hacking Study Guide,Sybex (2010) 1st Edition.
2. Stallings, W., Cryptography and Network Security, Prentice Hall (2013), 6 th Edition.
Course Objectives: This course aims to provide an understanding of the various security
attacks and knowledge to recognize and remove common coding errors that lead to
vulnerabilities. It gives an outline of the techniques for developing a secure application.
Introduction: Security, CIA Triad, Viruses, Trojans, and Worms, Security Concepts-
exploit, threat, vulnerability, risk, attack, Rootkits, Trapdoors, Botnets, Key loggers,
Honeypots. Active and Passive Security Attacks.
Need for secure systems: Proactive Security development process, Secure Software
Development Cycle (SSDLC), Security issues while writing SRS, Design phase security,
Development Phase, Test Phase, Maintenance Phase, Writing Secure Code – Best Practices
SD3 (Secure by design, default and deployment), Security principles and Secure Product
Development Timeline.
Threat modelling process and its benefits: Identifying the Threats by Using Attack Trees
and rating threats using DREAD, Risk Mitigation Techniques and Security Best Practices.
Security techniques, authentication, authorization. Defense in Depth and Principle of Least
Privilege.
Software & Web Security: Return-to-libc attack, format string vulnerability. Race condition
vulnerability, Dirty COW, PE Code injection. Cross site request forgery: CSRF attacks on
HTTP GET and POST services & countermeasures. XSS attack: self-propagating XSS worm,
preventing XSS attacks, SQL injection attack & countermeasures. Client-side attacks
Laboratory Work:
In this Lab, student shall learn to recognize and remove common coding errors that lead to
vulnerabilities. This lab also gives an outline of the techniques for developing a secure
application code, implementing different types of attacks and protection schemes for both
software and web security. Evaluation will be mainly based on projects and assignments.
Reference Books:
1. Swiderski, F. and Snyder, W., Threat Modeling, Microsoft Professional, (2004) 1st
Edition.
2. Salt, C., J., SQL Injection Attacks and Defence, Elsevier (2012), 2nd Edition.
Acquiring, Duplicating and Recovering Deleted Files: Recovering Deleted Files and
Deleted Partitions, recovering "Deleted" and "Erased" Data, Data Recovery in Linux,
Recovering Deleted Files, Recovering Deleted Partitions, Data Acquisition and Duplication,
Data Acquisition Tools, Recovering Data from Backups, Finding Hidden Data, Locating
Forgotten Evidence, Defeating Data Recovery Techniques.
Laboratory Work:
Hands with open source tools for forensic investigation process models (from Item
confiscated to submitting evidence for lawful action), such as FTK, Sleuth Toolkit (TSK),
Autopsy, etc.
Text Books:
1. Shinder L. D., Cross M., Scene of the Cybercrime, Syngress (2008) 2nd ed.
2. Marcella J. A. and Guillossou F., Cyber Forensics: From Data to Digital Evidence,
Wiley (2012).
3. Nina Godbole, Sunit Belapure, Cyber Security, Wiley (2011).
Reference Books:
1. Marcella J. A. and Menendez D., Cyber Forensics: A Field Manual for Collection,
Examining and preserving Evidence of computer crimes. Auerbach Publication (2010),
2nd ed.
2. Dejey, Murugan, Cyber Forensics, Oxford (2018).
Bitcoin Cryptocurrencies: What is Bitcoin, Brief history of Bitcoin, Bitcoin mining and
supply, Bitcoin cryptocurrency (BTC), Traditional centralized vs. decentralized, Bitcoin‘s
blockchain: evolution of blockchain, block header, genesis block, hash generation, Bitcoin
address: formats, hash generation, address structure, transactions: multi-signatures,
generating transactions, storing data, block verification and validation, block mining.
Smart Contracts: Introduction to smart contracts, smart contracts used in a centralized and
decentralized systems, Blockchain platforms using smart contracts: Ethereum, architecture of
Ethereum virtual machine, token- ETH, Mining process, ERC- standards, transactions in
Ethereum, Hyperledger fabric, Sidechains, NXT, Stellar, R3Conda, Litecoin, Quorum, IBM,
Openchain, Eris:db.
Consensus Mechanisms: Double spending problem, BFT, PBFT, PoW, PoS, DPoS, PoA,
PoB, PoR, PoET, PoI, PoO, PoSp, PoC, Ripple, Tendermint.
Laboratory Work:
Experiments on creating of blockchain, implementation of smart contract on Python, Conda
and Ethereum, Solidity.
Reference books:
1. Bellaj Badr, Rcihcard Horrocks and Xun Brian Wu, ―Blokchain by example‖, Packt
Publications.
2. Fatima Castiglione Maldonado, ―Introduction to Blockchain and Ethereum‖, Packt
Publications.
Basic Simulation Approaches: Methods for simulation and data analysis using MATLAB,
statistics for simulations and analysis, random variates generation, sensitivity analysis.
Model and its Different Types: Linear and nonlinear population models, traffic flow
models, transport phenomena, statistical models, Poisson process, stochastic models, stock
market, option pricing, Black-Scholes model, modeling engineering systems.
Software Support:
MATLAB.
Lab Experiment:
Implementation of numerical techniques using MATLAB based on course contents.
Projects: The projects will be assigned according the syllabus covered.
Course Objectives: This course aims to provide a platform for the students to use linear
algebra in real life. Most of the real life problems are based on computation of eigenvalues
and singular values. In this course we stress on the computational methods to compute the
same. The Matlab implementation of the methods will be insightful for better understanding.
The students are expected to have taken basic and a continuation course in numerical analysis
or acquired equivalent knowledge in a different way.
Matrix Analysis:
Review of matrices and vector spaces: rank of a matrix, linear dependence and
independence, bases and dimensions, linear transformations, range and null space of a matrix,
rank-nullity theorem.
Inner product space: Gram Schmidt orthogonalization, dual space and invariant space.
Matrix transformations: similarity transformation, diagonalization of matrices, Householder
transformation, QR factorization.
Conditioning of matrices: vector and matrix norms, convergent matrices, condition number
of a matrix.
Techniques for finding eigen values: Eigen value problems, spectral stability of matrices,
reduction to Hessenberg or tridiagonal form, iterative techniques using Krylov subspace
concepts for eigen value problems.
Real life applications of eigen values and singular values: Discussion of real life problems
based on eigen values and SVDs and their application in image processing and big data
analysis.
Laboratory assignments:
Matlab experiments will be designed to implement algorithms from the syllabus.
Course Objectives: This is an introductory course in finance to equip with a framework and
basic techniques necessary for financial engineering. The main focus is on valuation of
financial assets and more specifically derivative products. The course will introduce the
concept of risk and relation between risk and return. The knowledge of risk and valuation will
be integrated in optimal decision-making. The models will be studied in discrete-time
scenario.
Theory of Option Pricing: Options-calls and puts, pay-off, profit diagrams, hedging and
speculation properties of options, valuation of options using pricing and replication strategies,
mathematical properties of their value functions, put-call parity, Risk neutral probability
measure (RNPM) (discrete case), existence of RNPM, Binomial lattice model, Binomial
formula for pricing European style and American style options, dividend and non-divided
cases, CRR model, Black-Scholes formula derivation, Examples. Greeks and their role in
hedging, delta-neutral portfolio, delta-gamma neutral portfolio
Laboratory activities:
Extraction of data from various online resources like NSE, moneyconrol.com etc.
Implementation and validation of various models studied in the course for option and
portfolio valuation using Matlab/R/Excel.
Divisibility and Primes: Twin primes, Goldbach conjecture, Fermat and Mersenne primes,
Primality testing and factorization.
Public key Cryptosystems: RSA, Diffie Hellmann key exchange, different attacks and
Remedies, Digital Signature, Elliptic curve cryptography and its application in cryptography.
Laboratory work:
Implementation of various traditional ciphers, symmetric ciphers and asymmetric ciphers
using C-programming language.
Reference Books:
1. Behrouz A. Forouzan, D. Mukhopadhyay, Cryptography and Network Security,
McGraw Hill, 2015.
2. J. Pipher, J. Hoffstein and J.H. Silverman, An introduction to Mathematical
Cryptography, Springer-verlag 2014.
Course Objective: To elaborate the basics of data science and provide a foundation for
understanding the challenges and applications.
Data Science Introduction: Data and types, Big Data and Distributed Databases,
Application and purpose of data, Data Science, The data science process.
Data Cleaning and Summarization: Matrices, Factors, Data Frames, Vectors, Lists, Data
Cleaning and reading data from different data source, Reading Large Tables, Subsetting and
Sorting, Summarizing Data, Creating New Variables, Reshaping Data, Managing Data
Frames with dplyr – Introduction, Managing Data Frames with dplyr - Basic Tools, Merging
Data, Version control and Github.
Reference Books:
Trevor Hastie Robert, Tibshirani Jerome Friedman, The Elements of Statistical Learning,
Springer
Probability, conditional probability, random variable, PDF, PMF, joint distribution, statistical
independence, variance, co-variance, correlation, differenrent distribution functions, Bayes
theorem, central limit theorem.
Data generation using modeling and simulation, Association mining, ECLAT, Measuring
data similarity and dissimilarity, and TOPSIS.
Text Books:
1. Peter Dalgaard, Introductory Statistics with R, Springer, Second Edition, ISBN:
978-0-387-79053-4
2. Brett Lantz, Machine Learning with R (2nd Edition), www.PacktPub.com.
Reference Books:
1. Online Resources: (e.g., http://r-statistics.co/)
2. Introduction to Machine Learning in R
https://www.kaggle.com/camnugent/introduction-to-machine-learning-in-r-tutorial
L T P Cr
2 0 2 3
Course Objectives: There have been many applications of data science to solve real world
problems. The objective of the course is to provide exposure to basic workflow and
applications of data science techniques in targeted topics.
After the completion of the course, the student will be able to:
1. Apply the basic principles, models, and algorithms of NLP and CV for problem
solving.
2. Apply NLP and CV techniques in the real time problems
3. Comprehend the advancements in machine learning techniques in NLP and CV.
4. Acquire knowledge to apply open source libraries of NLP and CV for solving real life
problems.
Text books:
1. Speech and Language Processing, by M. Jurafsky, & J. Martin, New York: Prentice-
Hall (2000).
2. Deep Learning, by Ian Goodfellow, YoshuaBengio and Aaron Courville, MIT Press,
2016.
3. The Internet of Things by Samuel Greengard, MIT Press Essential Knowledge series,
(2015)
Reference Books
Artificial Neural Networks: Basic Concepts of Artificial Neurons, Single and Multi-Layer
Perceptron, Learning Algorithm, Gradient Decent & Momentum Based Optimization,
Activation Functions, Backpropagation.
Laboratory Work: To implement deep learning models using python and google open
source library such as Tensorflow, Keras etc.
Course Outcomes:
Text Books:
1. Ian Goodfellow and Yoshua Bengio and Aaron Courville,‖Deep Learning‖, MIT
Press, 2016
2. Michael Nielsen, ―Neural Network and Deep Learning‖, Online Book 2016
Course learning outcomes (CLOs): After the completion of the course, the student
will be able to:
1. Explain the basic accounting concepts and apply the fundamental equation in basic
business transactions
2. Explicate and apply the techniques learnt for doing financial statement analysis
3. Explain various financial decisions and evaluate some of them
4. Explicate the principle of time value of money (TVP) and importance of interest rates
in TVP
5. Apply the methods learnt for valuation of securities
Reference Books:
Risk and Return: Meaning of risk, meaning of return, estimation of risk and return
Capital and Money Markets: Meaning, types, capital and money market instruments
Practical sessions:
After the completion of the course, the student will be able to:
1. Explain the role of the financial system and the process of creation of money
2. Explicate various monetary policy tools
3. Explain relationship between risk and return
4. Explicate the types of capital markets and money markets including the market
instruments
5. Apply the portfolio theory to choose an optimal portfolio
1. Financial Markets and Institutions – Anthony Saunders & Marcia Millon Cornett
2. Ross, Westerfield, Jaffe & Jordan. Corporate Finance: Core Principles and
Applications.
Law of One Price: Meaning, implication of the law of one price, no arbitrage model, usage
in pricing of securities and derivative instruments
Pricing and Valuation: Basic principles, building blocks, assumptions, difference between
price and value, pricing and valuation of basic derivative instruments
Basics of Option Pricing: Meaning of options, types of options, difference between options
and basic derivative instruments
Reference Books:
1. Fundamentals of Futures and Options Markets - John C. Hull
2. Ross, Westerfield, Jaffe & Jordan. Corporate Finance: Core Principles and
Applications.
L T P Cr
2 0 2 3.0
Course Objectives: Understanding quantitative and statistical methods used for finance and
derivatives:
Option Pricing Introduction to option pricing models, formulae and derivation, option
Greeks, risk management using options
Financial Time Series: Introduction to time series, types, univariate and multivariate time
series models, autocorrelation, AR models, MA models, ARMA models, ARIMA models,
stationary series, unit-root
Course learning outcomes (CLOs): After the completion of the course, the student will be
able to:
1. Explain and apply the time series models learnt for financial data
2. Explicate and apply PCA for financial data
3. Explain and apply option pricing models to calculate prices of options
4. Explicate types of volatility and volatility models
5. Apply the basic methods learnt to estimate volatility
Course Objectives: The objective of the course is to teach techniques to combine software
development and IT operations using DevOps. It helps to understand faster software
development practices with higher quality.
Laboratory work:
Basic structure and Implementation of various distributed version control systems for source
code management.
Reference Books:
1. What is DevOps? - by Mike Loukides.
Course Objectives: This course includes theory and lab. The course comprises four modules.
The main objective of this course to help participants understand the process of build and
release management.
Document and Reporting: Introduction to build document and reporting, different types of
documentation, understanding site life cycle, advance site configurations and reports,
generation of unit test reports, generation of code coverage reports, code coverage tools, code
coverage pros and cons.
Release Cycle: To understand project release life cycle, different stages of release lifecycle,
source code repositories, how to install and configure source code repositories and deploying
build to production goals- prepare, perform, clean and rollback.
Course Objectives: The objective of the course is to teach techniques to automate the
process of integration and deployment software product. It covers prerequisites, anatomy and
framework/tools used for the automated process of continuous integration and continuous
deployment.
Laboratory work:
Setting up Jenkins, Jenkins job, parameters, build, post-build actions and pipeline; Jenkins
plugins, using Jenkins as a continuous integration server; Configuring Jenkins with git
plugin; Jenkins pipeline to poll the feature branch.
.
Course Learning Outcomes (CLOs) / Course Objectives (COs):
After completion of this course, the students will be able to:
1. Understand the phases of software development-delivery pipeline and automation
benefits.
2. Identify and apply continuous integration and deployment prerequisites, process and
benefits.
3. Understand and implement the continuous delivery engineering practices and release
process.
4. Identify & use the test-driven deployment and various tools/frameworks used for
continuous integration and delivery in DevOps
Reference Books:
1. Sander Rossel, ―Continuous Integration, Delivery, and Deployment: Reliable and
Faster Software Releases with Automating Builds, Tests, and Deployment‖, Packt
Publishing (2017) 1st ed.
2. Online material available at:https://digitallearn.xebiaacademyglobal.com/
Orchestration Tools: Orchestration: its definition and need, Docker swarm and Kubernetes,
AWS (ECS and EKS), Kubernetes on cloud, monitoring containers and its process.
Laboratory Work:
System Provisioning: Automation of infrastructure, AWS configuration for Terraform,
create IAM User, security group, spinning up with EC2 instance, variables,, resources,
modules, state management, VPC, IAM policy, S3 bucket and its variables.
Containers Lab: Playing with Vagrant and understanding its file, Docker machine,
Dockerfile, Docker extras, DTR, Docker compose and swarm, Kubernetes -Minikube,
deploying Pods and services on Minikube.
L T P Cr
2 0 2 3.0
Course Objectives: Basic concepts of database, Mongo DB, SQL, and Java script.
Collections: List all collections in the database, List all databases, Find(), FindOne( ), limit,
skip, sort and count the results of the find() method, Query Document – Using AND, OR and
IN Conditions, find() method with Projection, Find() method with Projection, $set operator to
update specified field(s) in document(s), Insert a document, Create a Collection, Drop
Collection, Aggregation
Indexes: Indexes, Index Creation Basics, Dropping/Deleting an Index, Sparse indexes and
Partial indexes, Get Indices of a Collection, Compound, Unique Index, Single field, Delete,
List, Mongoas Shards
Text Books:
1. Andreas Kretz, The Data Engineering Cook Book, 6 ed. (2019)
th
2. Alex Petrov, Database Internals: A deep dive into how distributed data systems
work, O‘REILLY Publication (2021).
Reference Books:
Course Objectives: The course provides understanding of software testing and how to use
various tools (like Selenium and TestNG etc.) used for automation of software testing.
Manual Testing: Manual Testing, Manual Testing – How to Approach? Manual Testing –
Myth and fallacy, Defect Life Cycle, Qualities of a good Manual Tester, Manual Testing Vs
Automation Testing, Types, System Testing, Acceptance Testing, Unit Testing, Techniques,
Integration Testing, Smoke- Sanity Testing
Introduction to Test Design: Test Scenario, Test Case Design, Test Basis Traceability
Matrix
Reference Books:
1. Diego Molina, Selenium Fundamentals, Packt (2018).
2. Aditya P. Mathur, Foundations of Software Testing, Pearson Education(2008).
Course Objectives: The objective of the course is to teach techniques to automate the
process of integration and deployment software product.
Source Code Management: History of Version Control Systems (VCS), Basic operations in
a VCS, Examples of version control systems, Subversion (SVN), Features and Limitations,
Mercurial, Git, Overview, History - Linux and Git by Linus Torvalds, Advantages of Git,
Explain how local version control works, Centralized Version Control Systems (CVCS),
Distributed Version Control Systems (DVCS), advantages of DVCS, Private Workspace,
Easier merging, Easy to scale horizontally, List the disadvantages of DVCS, Explain how
CVCS and DVCS compare with each other, Describe the working of the multiple repositories
model Unit IV Application Containerization Understanding Containers: Transporting Goods
Analogy, Problems in Shipping Industry before Containers, Shipping Industry Challenges,
Container: Virtualization Introduction, Hypervisor, Scope of Virtualizations, Containers vs
Virtual Machines, Understanding Containers, Containerizations Platform, Runtime and
Images, Container Platform, Container Runtime, The Chroot System, FreeBSD Jails, LinuX
Containers (LXC), Docker
Text Books:
1. Arundel, J., & Domingus, J., Cloud Native DevOps with Kubernetes:
building, deploying, and scaling modern applications in the cloud. O'Reilly
Media, (2019).
2. Kim, G., Humble, J., Debois, P., & Willis, J., The DevOps Handbook: How to
Create World-Class Agility, Reliability, and Security in Technology
Organizations. IT revolution Press 1st ed(2016).
3. Bass, L., Weber, I., & Zhu, L., DevOps: A software architect's perspective.
Addison-Wesley Professional (2015).
Reference Books:
1. Fox, A., Patterson, D. and Joseph, S., Engineering Software as a Service: An
Agile Approach Using Cloud Computing, 1st Edition (2013).
2. Rossel, S., Continuous Integration, Delivery, and Deployment: Reliable and
Faster Software Releases with Automating Builds, Tests, and Deployment.
Packt Publishing, 1st ed (2017).
Conversational
AI
Data Collection: Collecting Data, Scraping Data, Popular Scraping libraries, Data
Annotation
Graph Analytics: How to Represent & Store Graphs, Graph Power Laws, Centralities:
Degree, Betweenness, Clustering Coefficient, PageRank & Personalized PageRank,
Interactive Graph Exploration, RAPIDS Acceleration: Graphistry & cuXFilter.
Laboratory Work
Text Books:
1. Mitchell M., T., Machine Learning, McGraw Hill (1997) 1st Edition.
2. Alpaydin E., Introduction to Machine Learning, MIT Press (2014) 3rd Edition.
3. Vijayvargia Abhishek, Machine Learning with Python, BPB Publication (2018).
Reference Books:
1. Bishop M., C., Pattern Recognition and Machine Learning, Springer-Verlag (2011) 2nd
Edition.
2. Michie D., Spiegelhalter J. D., Taylor C. C., Campbell, J., Machine Learning, Neural
and Statistical Classification. Overseas Press (1994).
Course Objectives: This course provides a broad introduction to deep learning and natural
language processing. It offers some of the most cost-effective approaches to automated
knowledge acquisition in the emerging field of natural language understanding using deep
learning and GPU Computing.
Laboratory Work:
Introduction to DL Frameworks: TLT, PyTorch, and Tensorflow (Keras).
Binary Classification with Perceptron and Logistic Regression.
Neural Modules (NeMo) for Training Conv AI Models, Exploring NeMo
Fundamentals, Exploring NeMo Model Construction, Nemo Swap App Demo.
Sentiment Analysis & Text Classification with NeMo.
Intent Slot Filling for ChatBot using Joint Bert Model with NeMo.
Machine Translation with NeMo.
Question & Answering Machine with NeMo.
Information Retrieval, Punctuation & Capitalization, Relation Extraction, Sentiment
Analysis, Token Classification with NeMo.
Hands-on practical on TensorRT Optimization, Triton Inference Server.
Text Books:
1. Schmidhuber, J. (2015). ―Deep Learning in Neural Networks: An Overview". Neural
Networks 61: 85-117.
2. Bengio, Y., LeCun, Y., and Hinton, G. (2015). ―Deep Learning". Nature 521: 436-44.
3. Allen, James, Natural Language Understanding, Second Edition, Benjamin/Cumming,
1995.
4. Bengio, Y., Courville, A., and Vincent, P. (2013). ―Representation learning: A review
and new perspectives", IEEE Transactions on Pattern Analysis and Machine
Intelligence 35 (8): 1798-1828.
5. Deep Natural Language Processing course offered at the University of Oxford:
https://github.com/oxford-cs-deepnlp-2017/lectures
6. "The Unreasonable Effectiveness of Recurrent Neural Networks" by Andrej
Karpathy: https://karpathy.github.io/2015/05/21/rnn-effectiveness/ Manning,
Christopher and Heinrich, Schutze, Foundations of Statistical Natural Language
Processing, MIT Press, 1999.
Course Objectives: This course will provide students with the overall structure of the
Conversational AI pipeline including Speech Processing, Recognition, and Synthesis and
building end to end workflows using NeMo and Jarvis SDK.
Automatics Speech Recognition (ASR): ASR - DNN models (Jasper, QuartzNet, Citrinet,
Conformer-CTC), Open-source Datasets, Language Modelling: N-Gram, Neural Rescoring.
{Survey , Jasper, QuartzNet, CitriNet , Nemo}
Speech Synthesis: Text Normalization: Preparing Dataset and Text Normalization for input
to Speech Synthesis model. Introduction to Text-to-Speech (TTS) Models:- Mel Spectrogram
Generator: - Tacotron-2, Glow-TTS, Audio Generators:- WaveGlow, SqueezeWave.
{Papers, Nemo}
Jarvis Deployment: Introduction to Jarvis, Overview of Jarvis ASR, NLU and TTS APIs,
Introduction to Jarvis Dialog Manager. Jarvis Deployment:- Nemo model deployment for
ASR, NLP and TTS.
Laboratory Work:
Practical Exercise on Statistical Speech Processing. {Traditional Signal Processing}
Automatic Speech recognition with NeMo on English Dataset.
Automatic Speech recognition with NeMo on Indic Language(Hindi) Dataset.
NeMo Speech Commands Recognition using MatchboxNet, Noise Augmentation, and
Speaker Recognition.
Text to Speech using Tacotron-2 and WaveGlow with NeMo on English Dataset.
Text to Speech using Tacotron-2 and WaveGlow with NeMo on Indic Language
(Hindi) Dataset.
End-to-End Conversational AI Model (Any Language): ASR/NLP/TTS with NeMo
and Jarvis.
Text Books:
1. Jurafsky, Dan and Martin, James, Speech and Language Processing, Second Edition,
Prentice Hall, 2008.
2. Daniel Jurafsky and James H. Martin, "Speech and Language Processing", 3rd edition
draft, 2019 [JM-2019].
3. Mark Gales and Steve Young, The application of hidden Markov models in speech
recognition, Foundations and Trends in Signal Processing, 1(3):195-304, 2008.
Reference Books:
1. Daniel Jurafsky and James H. Martin. 2009. Speech and Language Processing: An
Introduction to Natural Language Processing, Speech Recognition, and
Computational Linguistics. 2nd edition. Prentice-Hall.
2. Geoffrey Hinton, Li Deng, Dong Yu, George E. Dahl, Abdel-rahman Mohamed,
Navdeep Jaitly, Andrew Senior, Vincent Vanhoucke, Patrick Nguyen, Tara N.
Sainath, and Brian Kingsbury, Deep Neural Networks for Acoustic Modeling in
Speech Recognition, IEEE Signal Processing Magazine, 29(6):82-97, 2012.
8. Implement a multi-modal generation model that generates coherent captions for given
images or generates images from textual descriptions.
9. Explore real-world applications of multi-modal generation such as image captioning,
visual question answering (VQA), and generating visual explanations from textual input.
Text Books:
1. "Deep Learning" by Ian Goodfellow, Yoshua Bengio, and Aaron Courville
Reference Books:
2. "Natural Language Processing with PyTorch" by Delip Rao and Brian McMahan
3. "GPT-3: Language Models are Few-Shot Learners" by Brown et al.
Robotics and
Edge AI
Course Objectives: This course will provide students with basic fundamental understanding
and practical hands-on training of computer vision and deep learning models on data centre
GPU servers.
Graph Neural Network and Synthetic Data Generation: Introduction to Graph Neural
Networks, Omniverse Replicator based synthetic data generation (SDG) using 3D assets.
Laboratory Work:
Introduction to DL Frameworks: TLT, PyTorch, and Tensorflow (Keras).
{DLI Online Course: Getting Started with Deep Learning}
{DLI Online Course: Deep Learning at Scale with Horovod}
Training Classification Models with and without Mixed Precision and Multi-GPU on
Open & Custom Datasets.
Training Detection Models with and without Mixed Precision and Multi-GPU on
Open & Custom Datasets.
Training Segmentation Models with and without Mixed Precision and Multi-GPU on
Open & Custom Datasets.
{DLI Online Course: Getting Started with Image Segmentation}
{DLI Online Course: Synthetic Data Generation for Training Computer Vision Models}
{DLI Online Course: Introduction to Graph Neural Networks}
Text Books:
1. Mitchell M., T., Machine Learning, McGraw Hill (1997) 1st Edition.
2. Alpaydin E., Introduction to Machine Learning, MIT Press (2014) 3rd Edition.
3. Vijayvargia Abhishek, Machine Learning with Python, BPB Publication (2018).
4. Computer Vision: Algorithms and Applications, R. Szeliski, Springer, 2011.
5. Computer Vision: A Modern Approach, D. Forsyth and J. Ponce, Prentice Hall, 2nd
ed., 2011.
Reference Books:
1. Bishop M. C., Pattern Recognition and Machine Learning, Springer-Verlag (2011)
2nd Edition.
2. Introductory techniques for 3D computer vision, E. Trucco and A. Verri, Prentice
Hall, 1998.
3. "Visualizing and Understanding Convolutional Networks" by Matthew D. Zeiler and
Rob Fergus (2014)
4. "Convolutional Neural Networks for Visual Recognition" (Stanford course given by
Fei-Fei Li, Andrej Karpathy, and Justin Johnson, 2016): http://cs231n.github.io/
Course Objectives: This course will provide students with advanced conceptual knowledge
and practicals on various computer vision and deep learning applications and provide the
overall environment for end-to-end pipeline development from data collection to deployment.
Introduction: Utilizing Jetpack SDK and other NVIDIA Toolkits to deploy CNN models on
Jetson, Creating Jetbot kits and deploying various applications, Working with NVIDIA
Robotics toolkit: Isaac SIM SDK and Gazebo for collision avoidance, path following.
Introduction to Edge AI: AI at the Edge & IoT, Jetson Architecture, Getting Started with
Jetpack, NGC Containers in Jetson, Getting started with NGC & Containers on Jetson.
Perception & Autonomous Navigation: Building JetBot Kits, Introduction to basic motion
on JetBot, Collision Avoidance: Stop/Go classifier (JetBot), freespace detection, Path
Following: Recording user input/video + DNN training (DriveNet), Simulation: Gazebo &
Isaac SIM.
Advanced Vision & SLAM: Pose Recognition (Deploying Human pose model), Depth
Estimation: Mono/Stereo depth and point extraction, Visual Odometry: Camera pose
estimation from DNNs, SLAM on JetBot.
Laboratory Work:
Setting up the Jetson Project kit.
{DLI Online Course: Getting Started with AI on Jetson Nano.}
Deployment of Various Classification, Object Detection and Segmentation models in
Jetson Nano.
Getting started building various Jetbot Kits.
Basic Motion with Jetbot
Collision Avoidance with Jetbot kit
Object following and Road following (DriveNet) with Jetbot.
Teleoperation with Jetbot.
Human Pose Estimation in Jetson Nano/JetBot.
Implementing SLAM on Jetbot.
Reference Books:
1. Richard Hartley and Andrew Zisserman, Multiple View Geometry in Computer
Vision, Second Edition, Cambridge University Press, March 2004.
2. K. Fukunaga; Introduction to Statistical Pattern Recognition, Second Edition,
Academic Press, Morgan Kaufmann, 1990.
3. R.C. Gonzalez and R.E. Woods, Digital Image Processing, Addison- Wesley, 1992.
4. Christopher M. Bishop; Pattern Recognition and Machine Learning, Springer, 2006.
Course Objectives: This course will provide students with fundamental knowledge of GPU
Computing and Machine Learning and Deep Learning Primer.
Laboratory Work:
Practical on Traditional Data Science packages (Numpy, Pandas, Scipy, Scikit-
Learn).
CUDA C/C++ for Accelerated Computing.
{DLI Online Course Section: Fundamentals of Accelerated Computing with CUDA C/C++}
Numba to compile CUDA kernels for Numpy Acceleration in Python.
{DLI Online Course Section: Fundamentals of Accelerated Computing with CUDA Python}
Getting started with Accelerated Data Science with RAPIDS AI (cuPy, cuDF,
cuSignal, cuML).
Decision Tree Classification Clustering in RAPIDS.
Text Books:
1. Mitchell M., T., Machine Learning, McGraw Hill (1997) 1st Edition.
2. Alpaydin E., Introduction to Machine Learning, MIT Press (2014) 3rd Edition.
3. Vijayvargia Abhishek, Machine Learning with Python, BPB Publication (2018).
Reference Books:
1. Bishop M., C., Pattern Recognition and Machine Learning, Springer-Verlag (2011)
2nd Edition.
2. Michie D., Spiegelhalter J. D., Taylor C. C., Campbell, J., Machine Learning, Neural
and Statistical Classification. Overseas Press (1994).
Course Objectives: This course will provide students with introduction to the basic
mathematical foundations of Reinforcement Learning for building real world computer vision
applications, and Conversational AI for developing Chatbots.
Laboratory Work:
Manipulation Lab: Building Pick-n-place.
Manipulation Lab: Object Assembly.
Game Agent: Open AI Gym (Jetbot in simulation).
Conversational AI VoiceBot: Verbal JetBot commands/feedback, ect (optional
mic/speaker).
Reference Books:
1. Goodfellow, Ian, Yoshua Bengio, and Aaron Courville. "Deep learning." MIT press,
2016.
2. Mark Gales and Steve Young, The application of hidden Markov models in speech
recognition, Foundations and Trends in Signal Processing, 1(3):195-304, 2008.
3. Daniel Jurafsky and James H. Martin. 2009. Speech and Language Processing: An
Introduction to Natural Language Processing, Speech Recognition, and
Computational Linguistics. 2nd edition. Prentice-Hall.
4. "Reinforcement Learning: An Introduction" by Richard S. Sutton and Andrew G.
Barto: https://webdocs.cs.ualberta.ca/~sutton/book/the-book-2nd.html
5. David Silver's course: http://www0.cs.ucl.ac.uk/staff/d.silver/web/Teaching.html
6. "Deep Reinforcement Learning: Pong from Pixels" by Andrej Karpathy:
https://karpathy.github.io/2016/05/31/rl/
7. Talks on Deep Reinforcement Learning by John Schulman:
https://www.youtube.com/watch?v=aUrX-rP_ss4 , and his Deep Reinforcement
Learning course http://rll.berkeley.edu/deeprlcourse/
Course Objectives: This course is designed to provide the fundamental skills needed to
Technical Network Security : The principles of access control, the terminologies used, and
the different models, The different aspects of IAM such as identity management,
authentication, authorization, and accounting
▪ The various cryptographic security techniques ▪ The various cryptographic algorithms ▪ The
security benefits of network segmentation techniques ▪ The various essential network security
solutions
Endpoint Security IoT-Devices : Understand IoT devices, their need, and application areas ▪
Understand the IoT ecosystem and communication models ▪ Understand security challenges
and risks associated with IoT-enabled environments ▪ Discuss security in IoT-enabled
environments
Data Security : Understand data security and its importance, Discuss the implementation of
data access controls ▪ Discuss the implementation of ―data at rest‖ encryption ▪ Discuss the
implementation of ―data in transit‖ encryption
Scanning Networks: Describe the network scanning concepts ▪ Use various scanning tools ▪
Perform host discovery to check for live systems ▪ Perform port and service discovery using
various scanning techniques
Laboratory Work:
Learn the Workings of SQL Injection Attacks, Implement Password Policies Using Windows
Group Policy, Just Enough Administration to Secure Privileged Access, External Network-
Based Firewall Functionality, Remote Patch Management using BatchPatch, Linux Security
Auditing and System Hardening Using Lynis, Enterprise Mobile Security Using Miradore
MDM Solution, Secure IoT Device Communication Using TLS/SSL, Application
Whitelisting Using AppLocker, Encrypt Data at Rest Using VeraCrypt, Footprinting and
Reconnaissance, Scanning Networks, Enumeration, Vulnerability Analysis.
Text Books:
L T P Cr
2 0 2 3.0
Course Objectives: This course is designed to provide the fundamental skills needed to
analyse the internal and external security threats against a network, and to implement security
mechanisms to protect an organization‘s information. The course helps to evaluate network
and Internet security issues and provides security solutions such as designing a security
policy, troubleshooting networks, and digital signatures. The course helps to understand and
apply the basic hacking techniques.
Network Traffic Monitoring and Analysis : Understand the need for and advantages of
network traffic monitoring, Setting up the environment for network monitoring, Determine
baseline traffic signatures for normal and suspicious network traffic, Perform network
monitoring and analysis for suspicious traffic using Wireshark
Network Logs Monitoring and Analysis : Logging concepts, Log monitoring and analysis
on Windows systems, Log monitoring and analysis on Linux systems
Business Continuity and Disaster Recovery : Business Continuity (BC) and Disaster
Recovery (DR), BC/DR activities, Business Continuity Plan (BCP) and Disaster Recovery
Plan (DRP)
Risk Anticipation with Risk Management : Understand risk management concepts, Learn
to manage risk through a risk management program, Learn different risk management
frameworks (RMFs)
Threat Assessment with Attack Surface Analysis : Attack surface analysis, Attack surface,
Identify Indicators of Exposures (IoEs)
System Hacking : Explain the different techniques to gain access to a system, Apply
privilege escalation techniques, Explain different techniques to gain and maintain remote
access to a system, Describe different types of rootkits
Malware Threats : Describe the concepts of malware and malware propagation techniques,
Explain Potentially unwanted applications (PUAs) and adware, Describe the concepts of
advanced persistent threats (APTs) and their lifecycle
Sniffing: Describe sniffing concepts, Explain different MAC attacks, Explain different
DHCP attacks, Describe ARP poisoning, Explain different spoofing attacks
Social Engineering : Describe social engineering concepts, Perform social engineering using
various techniques, Describe insider threats, Perform impersonation on social networking
sites
Laboratory Work:
Learn how to Audit Docker Host Security Using Docker-Bench-Security Tool, Learn how to
Implement Amazon Web Services Identity and Access Management, Learn how to Configure
Security on a Wireless Router, Learn how to Monitor and Detect Network Reconnaissance,
Access and Denial-of-Service/Distributed Denial-of-Service Attempts, Learn how to Identify
Suspicious Activities Using Log Monitoring and Analysis, Learn how to Work with Incident
Tickets in OSSIM, Learn how to Perform Vulnerability Management using OSSIM, Learn
how to Perform Vulnerability Analysis Using the Nessus, Learn how to identify an Attack
Surface in Windows using the Microsoft Attack Surface Analyzer, System Hacking, Gain
Access to the target system using Trojans, Perform Active Sniffing, Perform Social
Engineeing using various techniques.
Course Learning Outcomes (CLOs) / Course Objectives (COs):
On completion of this course, the students will be able to:
1. Examine the evolution of network security management in virtualized IT and cloud
environments.
2. Understand wireless networking concepts, logging concepts and advantages of network
traffic monitoring.
3. Examine various network security incidents and develop policies, processes, and
guidelines for incident handling, disaster recovery and business continuity.
4. Implement Network security management, network security policies and procedures, data
security techniques.
5. Compare and contrast different hacking techniques and analyze the legal implications of
hacking.
6. Examine different vulnerabilities, threats, and attacks to information systems and
recommend the countermeasures.
Text Books:
Page 186 of 210
1. Certified Network Defender (CNDv2) Academia Series – EC-Council
2. Ethical Hacking and Countermeasures (CEHv12) Academia Series – EC-Council
Ethical Hacking: Ethical hacking, Attack Vectors, Cyberspace and Criminal Behaviour,
Clarification of Terms, Traditional Problems associated with Computer Crimes, Realms of
Cyber world, brief history of the internet, contaminants and destruction of data, unauthorized
access.
Intrusion in cyber world: computer intrusions, white-collar crimes, viruses and malicious
code, virus attacks, pornography, software piracy, mail bombs, exploitation, stalking and
obscenity in internet, Cyber psychology, Social Engineering.
Laws related to cybercrime: Basics of Law and Technology, Introduction to Indian Laws,
Scope and Jurisprudence, Digital Signatures, possible crime scenarios, law coverage, data
interchange, mobile communication development, smart card and expert systems
Digital Forensics: Introduction to Digital forensics, Forensic software and handling, forensic
hardware and handling, analysis and advanced tools, forensic technology and practices,
fingerprint recognition, Audio-video evidence collection, Preservation and Forensic Analysis.
Definition and types of cybercrimes, electronic evidence and handling, electronic media,
collection, searching and storage of electronic media, introduction to internet crimes, hacking
and cracking, credit card and ATM frauds, web technology, cryptography, emerging digital
crimes and modules.
Forensic Tools and their applications: Forensic Tools and Processing of Electronic
Evidence, Introduction to Forensic Tools, Usage of Slack space, tools for Disk Imaging, Data
Recovery, Vulnerability Assessment Tools, Encase and FTK tools, Anti Forensics and
probable counters, retrieving information, process of computer forensics and digital
investigations, processing of digital evidence, digital images, damaged SIM and data
recovery, multimedia evidence, retrieving deleted data: desktops, laptops and mobiles,
retrieving data from slack space, renamed file, compressed files.
Laboratory Work:
The course will incorporate hands-on lab exercises, practical demonstrations, and real-world
scenarios to reinforce theoretical concepts and develop practical skills. Students will also
engage in ethical hacking projects, allowing them to apply their knowledge in simulated
environments and gain valuable experience in conducting ethical hacking assessments.
Course Learning Outcomes (CLOs) / Course Objectives (COs):
On completion of this course, the students will be able to:
1. Understanding the basics of Ethical Hacking and its role in industry, society and
information system.
2. Describe various types of securities and vulnerabilities.
3. Understanding of cyber forensic that can be useful in the process of extracting and analysis
of digital evidences.
4. Identify, Interpret and Evaluate Laws, Government Regulations and International Legal
Systems Pertinent to cyber forensic.
5. Demonstration of cyber forensic tools and their uses in preventing various types of system
attacks.
Text Books:
1. Simpson T. M., Backman K., Corley J., Hands-On Ethical Hacking and Network Defense,
Delmar Cengage Learning (2011) 2nd edition.
2. Fadia A. and Zacharia M., Network intrusion alert: an ethical hacking guide to intrusion
detection, Boston, MA: Thomas Course Technology 3rd edition (2008
Course Objectives: This course focuses on ethical hacking and security practices that cover the latest
security threats, advanced attack techniques, and real-time demonstrations of hacking methods, tools,
and protective measures. The students will examine digital evidence from computers, networks, and
mobile devices. The course helps to realize the importance of integrating forensic practices into
different operations to investigate attacks and system anomalies.
Hacking Wireless & Mobile Networks: Understanding Wireless Hacking Methodology, Wireless
Hacking Tools, Understanding mobile network Threats and Attacks, Overview of Mobile Device
Management (MDM), Mobile Security Guidelines and Tools
IoT Hacking: Overview of IoT Concepts, Understanding IoT Attacks, Understanding IoT Hacking
Methodology, IoT Hacking Tools, IoT Countermeasures.
Forensics: Understand Volatile and Non-volatile Data in Linux, Analyze Filesystem Images Using
the Sleuth Kit, Demonstrate Memory Forensics Using Volatility & PhotoRec, Network Forensic
Readiness, Perform Incident Detection and Examination with SIEM Tools, Monitor and Detect
Wireless Network Attacks
Investigating Web Attacks: Understand Web Application Forensics, Understand Web Server Logs,
Understand the Functionality of Intrusion Detection System (IDS) and Web Application Firewall
(WAF), Investigate Web Attacks on Windows-based Servers, Detect and Investigate Various Attacks
on Web Applications
Dark Web Forensics: Understand the Dark Web, Determine How to Identify the Traces of Tor
Browser during Investigation, Perform Tor Browser Forensics
Database Forensics: Understand & Perform MSSQL Forensics, Understand Internal Architecture of
MySQL and Structure of Data Directory, Understand Information Schema and List MySQL Utilities
for Performing Forensic Analysis, Perform MySQL Forensics on WordPress Web Application
Database Directory
Investigating Email Crimes: Understand Email Basics, Understand Email Crime Investigation and
its Steps, U.S. Laws Against Email Crime
Malware Forensics: Define Malware and Identify the Common Techniques Attackers Use to Spread
Malware, Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis,
Understand and Perform Static Analysis of Malware, Analyze Suspicious Word and PDF Documents,
Understand Dynamic Malware Analysis Fundamentals and Approaches, Analyze Malware Behavior
on System Properties in Real-time
Laboratory Work: Learn about SQL Injection, Hacking Wireless Networks, Hacking Mobile
Platforms, IoT and OT Hacking, Cloud Computing, Cryptography, Linux and Mac Forensics,
Network Forensics, Investigating Web Attacks, Dark Web Forensics, Database forensics, Cloud
Forensics, Investigating Email Crimes, Malware Forensics, Mobile Forensics, IoT Forensics
Communicative skills: Greetings and Its Usage, Asking for and giving personal information,
How to ask and answer questions, How to talk over the phone, Exchange simple information
on preference, feelings etc. Invite, accept, or refuse invitation, Fix an appointment, Describe
the weather, Ask for/give explanations, Describe a person, an object, an event, a place.
Grammar : Pronouns: Pronom sujets (Je/ Tu/Il/Elle/Nous/Vous/Ils/Elles), Nouns: Genders,
Articles: Definite article and Indefinite articles, Verbs: Regular verbs (-er, -ir ending)
Irregular verbs (-re ending), Auxiliary verbs (avoir, être, aller). Adjective: Description,
Adjective possessive, Simple Negation, Tense: Present, Future, Questions, Singular & plural.
Vocabulary: Countries and Nationalities, Professions, Numbers (ordinal, cardinal), Colours,
Food and drinks, Days of the week, Months, Family, Places.
Phonetics: The course develops the ability, to pronounce words, say sentences, questions
and give orders using the right accent and intonation. To express surprise, doubt, fear, and all
positive or negative feelings using the right intonation. To distinguish voiced and unvoiced
consonants. To distinguish between vowel sounds.
Recommended Books :
1. Alter ego-1 : Méthode de français by Annie Berthet, Catherine Hugot, Véronique M.
Kizirion, Beatrix Sampsonis, Monique Waendendries, Editions Hachette français langue
étrangère.
2. Connexions-1 : Méthode de français by Régine Mérieux, Yves Loiseau, Editions Didier
3. Version Originale-1: Méthode de français by Monique Denyer, Agustin Garmendia.
4. Marie-Laure Lions-Olivieri, Editions Maison des Langues, Paris 2009
5. Latitudes-1 : Méthode de français by Régine Mérieux, Yves Loiseau, Editions Didier
6. Campus-1 : Méthode de français by Jacky Girardet, Jacques Pécheur, Editions CLE
International.
7. Echo-1 : Méthode de français by J. Girardet, J. Pécheur, Editions CLE International.
Evaluation Scheme:
Sr. Weightage
Evaluation Elements
No. (%)
1 MST 45
2 EST 55
Course Objectives: In this course, the student will learn about the essential building blocks
and basic concepts around cyber security such as Confidentiality, Integrity, Availability,
Authentication, Authorization, Vulnerability, Threat and Risk and so on.
Recommended Books:
1. Pfleeger, C.P., Security in Computing, Prentice Hall, 5th edition (2010)
2. Schneier, B., Applied Cryptography, Second Edition, John Wiley & Sons (1996)
3. Rhodes-Ousley, M., Information Security: The Complete Reference, Second Edition,
Information Security Management: Concepts and Practice. New York, McGraw-Hill,
(2013).
4. Whitman, M.E. and Herbert J. M., Roadmap to Information Security for IT and Infosec
Managers, Course Technology, Boston, MA (2011).
Evaluation Scheme:
Sr. Weightage
Evaluation Elements
No. (%)
1 MST 45
2 EST 55
Course Objectives: To provide acquaintance with modern cleaner production processes and
emerging energy technologies; and to facilitate understanding the need and application of
green and renewable technologies for sustainable development of the Industry/society
Green Design: Green buildings - benefits and challenges; public policies and market-driven
initiatives; Effective green specifications; Energy efficient design; Passive solar design;
Green power; Green materials and Leadership in Energy and Environmental Design (LEED)
Renewable and Emerging Energy Technologies: Introduction to renewable energy
technologies- Solar; wind; tidal; biomass; hydropower; geothermal energy technologies;
Emerging concepts; Biomolecules and energy; Fuel cells; Fourth generation energy systems,
Recommended Books
1. Kirkwood, R,C, and Longley, A,J, (Eds,), Clean Technology and the Environment,
Chapman & Hall, London (1995),
2. World Bank Group; Pollution Prevention and Abatement Handbook – Towards Cleaner
Production, World Bank and UNEP; Washington DC (1998),
3. Modak, P,, Visvanathan, C, and Parasnis, M,, Cleaner Production Audit, Course
Material on Cleaner Production and Waste Minimization; United Nations Industrial
Development Organization (UNIDP) (1995),
4. Rao, S, and Parulekar, B,B,, Energy Technology: Non-conventional; Renewable and
Evaluation Scheme:
Sr. Weightage
Evaluation Elements
No. (%)
1 MST 45
2 EST 55
L T P Cr
2 0 0 2.0
Recommended Books:
1. Brealey, R. A., Myers. S.C., Allen, F., Principles of Corporate Finance (9th edition), The
McGraw-Hill, London, (2006).
2. Ehrhardt, M.C., Brigham, E.F., Financial Management: Theory and Practice (10th
Evaluation Scheme:
Sr. Weightage
Evaluation Elements
No. (%)
1 MST 45
2 EST 55
L T P Cr
2 0 0 2.0
Recommended Books
1. Bermúdez, J.L., Cognitive Science: An Introduction to the Science of the Mind (2nd Ed,),
Cambridge, UK: Cambridge (2014).
2. Friedenberg ,J,D, and Silverman,G, Cognitive Science: An Introduction To The Study Of
Mind, Sage Publications:, London (2014)
3. Thagard, P., Mind: An introduction to Cognitive Science, MIT Press, (2005)
4. Thagard, P., (1998) Mind Readings: Introductory Selections on Cognitive Science, MIT
Press, Cambridge, Mass,
Evaluation Scheme:
Sr. Weightage
Evaluation Elements
No. (%)
1 MST 45
2 EST 55
L T P Cr
2 0 0 2.0
Course Objective:
To introduce the basic concept of Nanoscience and advanced applications of nanotechnology,
Course outcomes:
Upon completion of the course, Students will be able to
1. discriminate between bulk and nano materials,
3. correlate ‗quantum confinement‘ and ‗quantum size effect‘ with physical and chemical
properties of nanomaterials,
4. uses top-down and bottom-up methods to synthesize nanoparticles and control their size
and shape
5. characterize nanomaterials with various physico-chemical characterization tools and use
them in development of modern technologies
Recommended Books:
1. Booker, R., Boysen, E., Nanotechnology, Wiley India Pvt, Ltd, (2008)
2. Rogers, B., Pennathur, S., Adams, J., Nanotechnology, CRS Press (2007)
3. Bandyopadhyay, A,K., Nano Materials, New Age Int,, (2007)
4. Niemeyer, C. N., and Mirkin, C, A., Nanobiotechnology: Concepts, Applications and
Perspectives, Wiley VCH, Weinhein, Germany (2007)
Evaluation Scheme:
Sr. Weightage
Evaluation Elements
No. (%)
1 MST 45
L T P Cr
2 0 0 2.0
Introduction: Graph, Finite and infinite graph, incidence and degree, Isolated vertex,
Pendent vertex and null graph, Isomorphism, Sub graph, Walks, Paths and circuits, Euler
circuit and path, Hamilton path and circuit, Euler formula, Homeomorphic graph,
Bipartite graph, Edge connectivity, Computer representation of graph, Digraph.
Tree and Fundamental Circuits: Tree, Distance and center in a tree, Binary tree,
Spanning tree, Finding all spanning tree of a graph, Minimum spanning tree.
Graph and Tree Algorithms: Shortest path algorithms, Shortest path between all pairs
of vertices, Depth first search and breadth first of a graph, Huffman coding, Cuts set and
cut vertices, Warshall‘s algorithm, topological sorting.
Planar and Dual Graph: Planner graph, Kuratowski‘s theorem, Representation of
planar graph, five-color theorem, Geometric dual.
Coloring of Graphs: Chromatic number, Vertex coloring, Edge coloring, Chromatic
partitioning, Chromatic polynomial, covering.
Application of Graphs and Trees: Konigsberg bridge problem, Utilities problem,
Electrical network problem, Seating problem, Chinese postman problem, Shortest path
problem, Job sequence problem, Travelling salesman problem, Ranking the participant in
a tournament, Graph in switching and coding theory, Time table and exam scheduling,
Applications of tree and graph in computer science.
Recommended Books
1. Deo, N., Graph Theory with Application to Engineering with Computer Science,
PHI, New Delhi (2007)
Evaluation Scheme:
Sr. Weightage
Evaluation Elements
No. (%)
1 MST 45
2 EST 55
L T P Cr
2 0 0 2.0
Course Objectives:
The main objective of this course is to motivate the students to understand and learn various
advanced numerical techniques to solve mathematical problems governing various
engineering and physical problems.
Non-Linear Equations: Methods for multiple roots, Muller‘s, Iteration and Newton-
Raphson method for non-linear system of equations and Newton-Raphson method for
complex roots.
Polynomial Equations: Descartes‘ rule of sign, Birge-vieta, Giraffe‘s methods.
System of Linear Equations:Cholesky and Partition methods, SOR method with optimal
relaxation parameters.
Eigen-Values and Eigen-Vectors: Similarity transformations, Gerschgorin‘s bound(s) on
eigenvalues, Given‘s and Rutishauser methods.
Interpolation and Approximation: Cubic and B – Spline and bivariate interpolation, Least
squares approximations, Gram-Schmidt orthogonalisation process and approximation by
orthogonal polynomial, Legendre and Chebyshev polynomials and approximation.
Differentiation and Integration:Differentiation and integration using cubic splines,
Romberg integration and multiple integrals.
Ordinary differential Equations: Milne‘s, Adams-Moulton and Adam‘s Bashforth methods
with their convergence and stability, Shooting and finite difference methods for second order
boundary value problems.
Recommended Books
1) Gerald, C.F. and Wheatley, P.O., Applied Numerical Analysis, Pearson Education
(2008) 7th ed.
2) Gupta, S.R., Elements of Numerical Analysis, MacMillan India (2009).
1) Atkinson, K.E., An introduction to Numerical Analysis, John Wiley (2004) 2nd ed.
Evaluation Scheme:
Sr. Weightage
Evaluation Elements
No. (%)
1 MST 45
2 EST 55
Course Objective: To learn about living world and basic functioning of biological systems.
The course encompasses understanding of origin of life, its evolution and some of its central
characteristics. It also aims to familiarize engineering students to some of the intricate
biological phenomena and mechanisms.
Recommended Books:
1. Nelson, D.L., Cox, M.M., Lehninger: Principles of Biochemistry, WH Freeman
(2008) 5th ed.
2. Dhami, P.S., Srivastava, H.N. Chopra, G., A Textbook of Biology, Pradeep
Publications (2008).
3. Das, H.K., Textbook of Biotechnology, John Wiley & Sons (2004) 3rd Edition.
4. Gardner, E.J., Simmons, M., Peter, S.D., Principles of Genetics, John Wiley & Sons
(2008)
5. Albert, B., Essential Cell Biology, Taylor & Francis, London (2009)
Sr. Weightage
Evaluation Elements
No. (%)
1 MST 45
2 EST 55