B.SC Information Technology
B.SC Information Technology
Sc- Information Technology Syllabus under CBCS Pattern with effect from 2023-2024 onwards
PERIYAR UNIVERSITY
PERIYAR PALKALAI NAGAR
SALEM-636011
Syllabus for
Computer Science is the study of quantity, structure, space and change, focusing on problem
solving, application development with wider scope of application in science, engineering,
technology, social sciences etc. throughout the world in last couple of decades and it has carved out
a space for itself like any other disciplines of basic science and engineering. Computer science is a
discipline that spans theory and practice and it requires thinking both in abstract terms and in
concrete terms. Nowadays, practically everyone is a computer user, and many people are even
computer programmers. Computer Science can be seen on a higher level, as a science of problem
solving and problem solving requires precision, creativity, and careful reasoning. The ever-evolving
discipline of computer science also has strong connections to other disciplines. Many problems in
science, engineering, health care, business, and other areas can be solved effectively with computers,
but finding a solution requires both computer science expertise and knowledge of the particular
application domain. Computer science has a wide range of specialties. These include Computer
Architecture, Software Systems, Graphics, Artificial Intelligence, Computational Science, and
Software Engineering. Drawing from a common core of computer science knowledge, each specialty
area focuses on specific challenges. Computer Science is practiced by mathematicians, scientists and
engineers. Mathematics, the origins of Computer Science, provides reason and logic. Science
provides the methodology for learning and refinement. Engineering provides the techniques for
building hardware and software.
The Students completing this programme will be able to present Software application clearly
and precisely, make abstract ideas precise by formulating them in the Computer languages.
Completion of this programme will also enable the learners to join teaching profession, enhance
their employability for government jobs, jobs in software industry, banking, insurance and
investment sectors, data analyst jobs and jobs in various other public and private enterprises.
Programme Code:
Strengthening thedomain
knowledge
Introducing thestakeholders
to theState-of Art
techniquesfrom the streams ofmulti-
disciplinary, cross disciplinary and
inter disciplinary nature
III, IV, V Emerging topics inhigher
Elective papers
& VI education/industry/ communication
network / health sectoretc. are
introduced with
hands-on-training.
Exposure to industry moulds students
into solution providers
IV Elective Papers Generates Industryready graduates
Employment opportunities enhanced
Self-learning isenhanced
V Application of the concept to real
Elective papers situationis conceived resulting
Semester
in tangible outcome
Credit
Credit
Credit
Credit
Credit
Credit
Hours
Hours
Hours
Hours
Hours
Hours
Sem I Sem II Sem III Sem IV Sem V Sem VI
4.3 Core
Course –
1.3 Core 2..3 Core 3.3 Core 5. 3.Core 6.3 Core
CC VII
Course – 5 5 Course – CC 5 5 Course – CC 5 5 5 5 Course 4 5 Course – 4 6
Core
CC I III V CC -XI CC XV
Industry
Module
5. 4.Core
Course –/ 6.4 Elective -
1.4 Core 2.4 Core 3.4 Core 4.4 Core
Project VII Generic/
Course – 5 5 Course – CC 5 5 Course – CC 5 5 Course – 5 5 4 5 3 5
with viva- Discipline
CC II IV VI CC VIII
voce Specific
CC -XII
1.5 5.5
2.5 Elective 3.5 Elective 4.5 Elective 6.5 Elective VIII
Elective I Elective V
II Generic/ III Generic/ IV Generic/ Generic/
Generic/ 3 4 3 4 3 4 3 3 Generic/ 3 4 3 5
Discipline Discipline Discipline Discipline
Discipline Discipline
Specific Specific Specific Specific
Specific Specific
1.7 Skill
2.7 Skill 3.7 Skill 4.7 Skill 6.7
Enhancem
Enhancemen Enhancemen Enhanceme 5.7 Value Professional
ent - 2 2 2 2 2 2 2 2 2 2 2 2
t Course – t Course nt Course Education Competency
(Foundatio
SEC-3 SEC-5 SEC-7 Skill
n Course)
5.8
Summer
3.8 E.V.S. - 1 4.8 E.V.S 2 1 Internship 2
/Industrial
Training
2 3 2 3 2 3 2 3 2 3 2 3
3 0 3 0 2 0 5 0 6 0 1 0
Semester-II
Third Year-Semester-V
Part List of Courses Credit No. of
Hours
Part-3 Core Courses including Project / Elective Based 22 26
Part-4 Value Education 2 2
Internship / Industrial Visit / Field Visit 2 2
Total 26 30
Semester-VI
Part List of Courses Credit No. of
Hours
Part-3 Core Courses including Project / Elective Based & LAB 18 28
Part-4 Extension Activity 1 -
Professional Competency Skill 2 2
Total 21 30
*Part I. II, and Part III components will be separately taken into account for CGPA
calculation and classification for the under graduate programme and the other
components. IV, V have to be completed during the duration of the programme as per the
norms, to be eligible for obtaining the UG degree.
Methods of Evaluation
Continuous Internal Assessment Test
Internal 25 Marks
Assignments
Evaluation
Seminars
Attendance and Class Participation
External End Semester Examination 75 Marks
Evaluation
Total 100 Marks
Methods of Assessment
Recall (K1) Simple definitions, MCQ, Recall steps, Concept definitions
Evaluate (K5) Longer essay/ Evaluation essay, Critique or justify with pros and cons
Hours
Part List of Courses Credit per week
Paper Code
(L/T/P)
Part-I Language – Tamil 3 6
Part-II English 3 6
Part-III 23UITCC01, CC1-Programming in C 4 5
23UITCCP01 CC2-Practical: C Programming lab 3 3
Elective Course -EC1 (Generic / Discipline
6 6
Specific) –Choose from Annexure I
Skill Enhancement Course- SEC1
2 2
Part-IV (Non Major Elective)
Foundation Course FC-
2 2
Fundamentals of Computers
Total 23 30
Hours
Part List of Courses Credit per week
Paper Code
(L/T/P)
Part-I Language – Tamil 3 6
Part-II English 3 6
Part-III 23UITCC02, CC3-Java Programming 4 5
23UITCCP02 CC4-Practical: Java Programming & Data
3 3
Structures lab
Elective Course - EC2 (Generic / Discipline
6 6
Specific) –Choose from Annexure I
Skill Enhancement Course -SEC2 (Non Major
2 2
Elective)
Part-IV
Skill Enhancement Course - SEC3 Choose
2 2
from Annexure II
Total 23 30
Second Year Semester-III
Hours
Part List of Courses Credit per week
Paper Code
(L/T/P)
Part-I Language – Tamil 3 6
Part-II English 3 6
Part-III 23UITCC03 CC5-Relational Data Base Management 4 5
23UITCCP03 CC6-Practical:RDBMS Lab 3 3
Elective Course- EC3 (Generic / Discipline
6 6
Specific) -Choose from Annexure I
Skill Enhancement Course -SEC4 Choose
1 1
from Annexure II
Part-IV
Skill Enhancement Course -SEC5 Choose
2 2
from Annexure II
Environmental Studies - 1
Total 22 30
Semester-IV
Hours
Part List of Courses Credit per week
Paper Code
(L/T/P)
Part-I Language – Tamil 3 6
Part-II English 3 6
Part-III 23UITCC04 CC7 - .NET Programming 4 4
23UITCCP04 CC8- Practical: .NET Programming Lab 3 3
Elective Course - EC4 (Generic / Discipline
6 6
Specific) Choose from Annexure I
Part-IV Skill Enhancement Course - SEC6 Choose
2 2
from Annexure II
Skill Enhancement Course - SEC7 Choose
2 2
from Annexure II
Environmental Studies 2 1
Total 25 30
Third Year Semester-V
Hours
Part List of Courses Credit per week
Paper Code
(L/T/P)
23UITCC05 CC9- Python Programming 4 5
Part-III 23UITCCP05 CC10- Practical: Python Programming Lab 4 5
23UITCC06 CC11- Operating Systems 4 5
Elective Course - EC5 ( Discipline Specific)
3 4
Choose from Annexure I
Elective Course – EC6 ( Discipline Specific)
3 4
Choose from Annexure I
23UITCCPR1 CC12-Project with Viva voce 4 5
Part-IV Value Education 2 2
Internship / Industrial Training (Summer
2
vacation at the end of IV semester activity)
Total 26 30
Semester-VI
Hours
Part List of Courses Credit per week
Paper Code
(L/T/P)
Part-III 23UITCC07 CC13-Data Communications and Networking 4 6
23UITCC08 CC14-Data Mining 4 6
23UITCCP06 CC15-Practical: Data Mining Lab 4 6
Elective Course – EC7 ( Discipline Specific) 3 5
Choose from Annexure I
Elective Course – EC8 ( Discipline Specific) 3 5
Choose from Annexure I
Part IV Skill Enhancement Course - SEC8 Choose
2 2
from Annexure II
Part-V Extension Activity 1
Total 21 30
Annexure – I
Generic Specific
S.No Paper Title
1 Mathematics-I
2 Mathematics-II
3 Mathematics Practical
4 Discrete Mathematics-I
5 Discrete Mathematics-II
6 Numerical Methods
7 Optimization Techniques
10 Numerical Methods-I
11 Numerical Methods-II
12 Statistical Methods and its Application-I
14 Statistical Practical
15 Physics-I
16 Physics Practical-I
17 Physics-II
18 Physics Practical-II
20 Nano Technology
21 Accounting
22 Cost and Management Accounting
Discipline Specific
12 23UITSE12 Biometrics
Note: For Semester I & II [if other department select our paper as Non Major Elective
choose from the above Skill Enhancement Course]
FIRST YEAR – SEMESTER – I
CORE – I: PROGRAMMING IN C
Subject Inst. Marks
L T P S Credits
Code Hours CIA External Total
5 0 0 I 4 5 25 75 100
Learning Objectives
LO1 To familiarize the students with the understanding of code organization
LO2 To improve the programming skills
LO3 Learning the basic programming constructs.
Prerequisites:
Unit Contents No. of
Hours
Studying Concepts of Programming Languages- Language
Evaluation Criteria - Language design - Language Categories -
Implementation Methods – Programming Environments - Overview of
I 15
C: History of C- Importance of C- Basic Structure of C Programs-
Executing a C Program- Constants, Variables and Data types -
Operators and Expressions - Managing Input and Output Operations
Decision Making and Branching: Decision Making and Looping -
II 15
Arrays - Character Arrays and Strings
User Defined Functions: Elements of User Defined Functions-
Definition of Functions- Return Values and their Types- Function Call-
III 15
Function Declaration- Categories of Functions- Nesting of Functions-
Recursion
Structures and Unions: Introduction- Defining a Structure- Declaring
Structure Variables Accessing Structure Members- Structure
IV 15
Initialization- Arrays of Structures- Arrays within Structures- Unions-
Size of Structures.
Pointers: Understanding Pointers- Accessing the Address of a
Variable- Declaring Pointer Variables- Initializing of Pointer Variables-
Accessing a Variable through its Pointer- Chain of Pointers- Pointer
V Expressions- Pointer and Scale Factor- Pointer and Arrays- Pointers 15
and Character Strings- Array of Pointers- Pointer as Function
Arguments- Functions Returning Pointers- Pointers to Functions- File
Management in C
TOTAL 75
CO Course Outcomes
CO1 Outline the fundamental concepts of C programming languages, and its features
CO2 Demonstrate the programming methodology.
Textbooks
Robert W. Sebesta, (2012), ―Concepts of Programming Languages‖, Fourth Edition,
Addison Wesley (Unit I : Chapter – 1)
E. Balaguruswamy, (2010), ―Programming in ANSI C‖, Fifth Edition, Tata McGraw
Hill Publications
Reference Books
Ashok Kamthane, (2009), ―Programming with ANSI & Turbo C‖, Pearson
1.
Education
Byron Gottfried, (2010), ―Programming with C‖, Schaums Outline Series, Tata
2.
McGraw Hill Publications
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1. http://www.tutorialspoint.com/cprogramming/
2. http://www.cprogramming.com/
3. http://www.programmingsimplified.com/c-program-examples
4. http://www.programiz.com/c-programming
5. http://www.cs.cf.ac.uk/Dave/C/CE.html
6. http://fresh2refresh.com/c-programming/c-function/
2. http://www.comptechdoc.org/basic/basictut/
3. http://www.homeandlearn.co.uk/
4. http://www.top-windows-tutorials.com/computer-basics/
https://www.programiz.com/article/flowchart-programming (Algorithm and flow
5.
chart)
5. Jim Keogh (2002), ―J2EE: The Complete Reference‖, Tata McGraw Hill Edition.
7. http://www.tutorialspoint.com/java/
8. http://beginnersbook.com/java-tutorial-for-beginners-with-examples/
9. http://www.homeandlearn.co.uk/java/java.html
Marks
Subject Inst.
L T P S Credits
Code Hours
CIA External Total
5 0 0 III 4 5 25 75 100
Learning Objectives
To study the data base design, transaction Processing and Management and Security
LO3
Issues.
TOTAL 75
THEORY 100%
CO Course Outcomes
Design and construct normalized tables and manipulate it effectively using SQL and
CO5
PL/SQL database objects
Textbooks
Reference Books
Web Resources
1. http://srikanthtechnologies.com/books/orabook/ch1.pdf
2. Http://www.tmv.edu.in/pdf/Distance_education/BCA%20Books/BCA%20IV%20SEM/B
C A-428%20Oracle.pdf
3. http://www.tutorialspoint.com/sql/sql-rdbms-concepts.htm
4. http://ecomputernotes.com/database-system/rdbms
5. http://www.mithunashok.com/2011/04/basics-of-rdbms.html
CO Course Outcomes
CO1 Choose appropriate SQL queries and PL/SQL blocks for the database.
CO2 Implement SQL and PL/SQL blocks for the given problem effectively.
CO3 Analyse the problem and Exceptions using queries and PL/SQL blocks.
CO4 Validate the database for normalization using SQL and PL/SQL blocks.
CO5 Design Database tables, create Procedures, user-defined functions and Triggers.
Textbooks
Herbert Schildt (2010), C# 4.0 The Complete Reference, Tata McGraw-Hill Pvt Ltd
Reference Books
1. Greg Buczek (2002), ―ASP.NET – Developer‗s guide‖, Tata MaGraw Hill Publication
3. J.Sharp (2009), ―Microsoft Visual C# 2008 Step by Step‖, PHI Learning Private Ltd.
4. Christian Nagel et al. , ―Professional C# 2005 with .NET 3.0‖, Wiley India, 2007
2. http://www.csharpkey.com/csharp/
3. http://www.w3schools.com/aspnet/default.asp
CO Course Outcomes
CO1 Demonstrate MS Visual Studio.NET IDE to Create applications.
TOTAL 75
CO Course Outcomes
CO1 Outline the basic concepts in python language.
CO2 Interpret the core data structures available in python to store, process and sort the data.
CO3 Develop the real time applications using python programming language.
CO4 Analyze the real time problem using suitable python concepts.
MAPPING TABLE
CO1 3 2 3 2 3 3
CO2 3 3 2 2 3 3
CO3 3 2 2 3 3 2
CO4 3 2 3 3 2 2
CO5 3 3 3 3 3 2
Weightage of
course
contributedto
each 15 12 13 13 14 12
PSO
To focus on the core concepts such as processes and threads, mutual exclusion,
LO2 CPU scheduling, deadlock, memory management, and file systems.
Prerequisites:
Unit Contents No. of
Hours
Introduction: Definition of Operating System - OS Structures: OS
Services - System Calls - Virtual Machines - Process
I Management: Process Concept - Process Scheduling - Operation 15
on Processes - Co-operating Processes - Inter-process
Communication
CPU Scheduling: Basic Concepts - Scheduling Criteria -
Scheduling Algorithms - Process Synchronization: The Critical
II 15
Section Problem - Semaphores - Classical Problems of
Synchronization - Critical Regions
Deadlocks: System Model - Deadlock characterization – Methods
III for Handling Deadlocks Deadlock Prevention - Deadlock 15
avoidance- Deadlock Detection - Recovery from Deadlock.
Storage management: Memory management - Swapping –
Contiguous Memory allocation. Paging – Segmentation –
IV Segmentation with Paging –Virtual memory: Demand paging - 15
Page replacement – Thrashing. Mass-Storage Structure: Disk
Structure- Disk scheduling.
File-System Interface: File Concept-File Attributes-File
Operations – Access Methods: Sequential Access – Direct Access
–Directory Structure: Single-Level Directory- Two –Level
V 15
Directory-Tree-Structured Directories- Introducing Shell
Programming – Linux General Purpose Commands-Process
Oriented Commands – Communication Oriented Commands
TOTAL 75
CO Course Outcomes
CO1 Outline the fundamental concepts of an OS and their respective functionality
Reference Books
Milan Milenkovic (2003), ―Operating System Concepts and Design‖, McGraw
1.
Hill.
Andrew S. Tanenbaum, (2001), ―Modern Operating Systems‖, 2nd Edition,
2.
Prentice Hall of India.
Deital and Deital (1990), ―Introduction to Operating System‖, Pearson
3.
Education.
4. William Stallings (1997), ―Operating Systems‖, Prentice Hall of India.
2. http://www.reallylinux.com/docs/files.shtml
3. http://www.tutorialspoint.com/operating_system/os_linux.htm
TOTAL 75
CO Course Outcomes
CO1 Outline the fundamentals and the principles of Data Mining
Textbooks
Jiawei Han, Micheline Kamber, Jian Pei, ―Data Mining concepts and techniques‖, 3rd
Edition, Elsevier publication, 2012.
Reference Books
Ian H. Witten and Eibe Frank, (2005), ―Data Mining: Practical Machine Learning Tools
1.
and Techniques (Second Edition)‖, Morgan Kaufmann.
2. Arun K Pujari, ―Data Mining Techniques‖, 10 impression, University Press, 2008.
Daniel T. Larose , Chantal D. Larose, "Data mining and Predictive analytics," Second
3.
Ed., Wiley Publication, 2015.
G.K. Gupta, ―Introduction to Data mining with case studies‖, 2nd Edition, PHI Private
4.
limited, New Delhi, 2011.
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1. http://csed.sggs.ac.in/csed/sites/default/files/WEKA%20Explorer%20Tutorial.pdf
2. https://www.cs.auckland.ac.nz/courses/compsci367s1c/tutorials/IntroductionToWeka.pdf
CO Course Outcomes
CO1 Understand the real time datasets for analysis
CO2 Apply suitable preprocessing for data mining task
CO3 Demonstrate data-mining techniques based on the different applications
CO4 Analyze the performance evaluation of various data mining algorithms
Prescribe appropriate data models for data mining techniques to solve real world
CO5 problems
Textbooks
Behrouz and Forouzan,(2006), Data Communication and Networking‖, 4th Edition,
TMH.
Ajit Pal,(2014), Data Communication and Computer Networks, PHI.
Reference Books
Jean Walrand (1998), ―Communication Networks,Second Edition‖, TataMcGraw
1.
Hill.
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1. http://www.tutorialspoint.com/data_communication_computer_network/
2. http://www.slideshare.net/zafar_ayub/data-communication-and-network-11903853
3. http://www.freetechbooks.com/data-communication-and-networks-f31.html
TOTAL 75
CO Course Outcomes
Outline the C++ programming fundamentals and the concepts of object-oriented
CO1
programming like object and class, Encapsulation, inheritance and polymorphism.
Classify the control structures, types of constructors, inheritance and different type
CO2
conversion mechanisms.
Analyze the importance of object oriented programming features like polymorphism,
CO3 reusability, generic programming, data abstraction and the usage of exception
handling.
Determine the use of object oriented features such as classes, inheritance and
CO4
templates to develop C++ programs for complex problems.
Create a program in C++ by implementing the concepts of object-oriented
CO5
programming.
Textbooks
E. Balaguruswamy, (2013), ―Object Oriented Programming using C++‖, 6th Edition,
Tata McGraw Hill.
Reference Books
Bjarne Stroustrup, ―The C++ Programming Language‖, Fourth Edition, Pearson
1
Education.
Hilbert Schildt, (2009), ―C++ - The Complete Reference‖, 4th Edition, Tata
2
McGrawHill
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1. http:/fahad.cprogramming.blogspot.com/p/c-simple-examples.html
2. http://www.sitesbay.com/cpp/cpp-polymorphism
DATA STRUCTURES
Subject Inst. Marks
L T P S Credits
Code Hours CIA External Total
4 0 0 II 4 4 25 75 100
Learning Objectives
LO1 To become familiar with the various data structures and their applications
LO2 to increase the understanding of basic concepts of the design and use of algorithms
Prerequisites:
Unit Contents No. of
Hours
Introduction and overview: Basic Terminology – Data Structures –
Operations - Algorithms: Complexity – Time Space – Algorithmic
I 12
Notation – Control Structures – Complexity of Algorithms – Notations
Arrays: Representation – Operations - Linear Search – Binary Search
Stack: Representation – Arithmetic expressions: Polish Notation –
Recursion: Towers of Hanoi - Queue –Priority Queue - Linked Lists:
II 12
Introduction – Representation of Linked Lists – Traversing a Linked
Lists – Searching a Linked List
Insertion into a Linked List – Deletion into Linked List – Header Linked
III Lists – Two-way Lists –Doubly Linked List - Trees : Binary Trees – 12
Representation – Traversal using Recursion – Binary Search Trees
Sorting : Bubble Sort Insertion Sort, Selection Sort, Merge Sort, Quick
IV 12
Sort, Heap Sort
Graph – Graph Theory Terminology –Sequential Representation –
Warshalls Algorithm – Shortest Path – Linked Representation -
V 12
Traversals – Dynamic Programming – All Pairs Shortest Path - Greedy
– Knapsack – Back Tracking – 8 Queens
TOTAL 60
THEORY 100%
CO Course Outcomes
CO1 Outline the different fundamental concepts of data structures
Make use of different memory representation for data storage and apply various
CO2
operations
CO3 Construct an algorithm for different data structure operations.
CO4 Analyse the data structures applications.
CO5 Discover suitable techniques to provide solution for solving the problems.
Textbooks
Seymour Lipschutz (1986), ―Theory and Problems of Data Structures‖, Tata McGraw-
Hill Edition
Reference Books
E.Horowitz, S.Sahni, S.Rajasekaran (1998), ―Computer Algorithms‖, Galgotia
1.
Publications.
Robert Kruse, C.L.Tondo, Bruce Leung, ―Data Structures and Program Design in C‖,
2.
Second Edition, Prientice Hall Publications
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1. http://www.cs.sunysb.edu/~skiena/214/lectures/
2. http://datastructures.itgo.com/graphs/dfsbfs.htm
3. http://oopweb.com/Algorithms/Documents/PLDS210/VolumeFrames.html
4. http://discuss.codechef.com/questions/48877/data-structures-and-algorithms
5. http://code.tutsplus.com/tutorials/algorithms-and-data-structures--cms-20437
ttps://www.tutorialspoint.com/data_structures_algorithms/insertion_sort_algorithm.htm
6.
(Unit IV : Insertion Sorting)
CO2 Apply the interface setup, styles & themes for the given application
Analyze the problem and add necessary user interface components, multimedia
CO3
components and web data source into the application
CO4 Evaluate the results by implementing the correct techniques on the web form
CO5 Construct web applications with the facilitated components in PHP and jQuery
Textbooks
Kevin Tatroe, Peter MacIntyre, Rasmus Lerdorf, ― Programming PHP‖,
O‗Reilly Publications, Third Edition
Joel Murach, Ray Harris (2010), ―PHP and MySQL‖, Shroff Publishers & Distributors
Cesar Otero, Rob Lorsen (2012), ―Professional jQuery‖, John Wiley Sons & Inc
Reference Books
1. W. Jason Gilmore (2010), ―Beginning PHP & MySql‖, Apress
Robin Nixon (2013), ―Learning PHP, MySQL, JavaScript & CSS‖, O‗Reilly, 2nd
5.
Edition
2. http://www.ccc.commnet.edu/faculty/sfreeman/cst%20250/jQueryNotes.pdf
3. http://www.w3schools.com/php/
4. http://www.tutorialspoint.com/php/
5. http://www.tutorialspoint.com/mysql/
4 0 0 - 4 4 25 75 100
Learning Objectives
CO5 Evaluate and mitigate risks associated with software development process
Textbooks
Robert T. Futrell, Donald F. Shafer, Linda I. Safer, ―Quality Software Project
Management‖, Pearson Education Asia 2002.
Reference Books
1. Pankaj Jalote, ―Software Project Management in Practice‖, Addison Wesley 2002.
2. Hughes, ―Software Project Management‖, Tata McGraw Hill 2004, 3rd Edition.
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1. NPTEL & MOOC courses titled Software Project Management
2. www.smartworld.com/notes/software-project-management
MAPPING TABLE
CO1 3 2 1 2 2 2
CO2 3 1 3 2 2 2
CO3 2 3 2 3 3 3
CO4 3 3 2 3 3 2
CO5 2 2 2 3 3 3
Weightage of course
contributed
to eachPSO
13 11 10 13 13 12
SOFTWARE ENGINEERING
2. http://www.nada.kth.se/lectures/
3. http://www2.latech.edu/
MAPPING TABLE
CO1 3 2 3 2 2 2
CO2 2 3 3 3 3 2
CO3 2 2 3 3 3 3
CO4 3 2 2 3 3 3
CO5 3 3 3 3 3 3
Weightage ofcourse
contributed to each
PSO 13 12 14 14 14 13
TOTAL 75
CO Course Outcomes
CO1 An ability to use the methodology and tools necessary for engineering practice.
MAPPING TABLE
CO1 3 2 3 2 2 2
CO2 2 3 3 3 3 2
CO3 2 2 3 3 3 3
CO4 3 2 2 3 3 3
CO5 3 3 3 3 3 3
Weightage ofcourse
contributed to each
PSO 13 12 14 14 14 13
SOFTWARE METRICS
5 0 0 - 4 5 25 75 100
Learning Objectives
LO1 Gain a solid understanding of what software metrics are and their significance
LO2 Learn how to identify and select appropriate software metrics based on project goals
LO3 Acquire knowledge and skills in collecting and measuring software metrics
LO4 Learn how to analyze and interpret software metrics data to extract valuable insights
LO5 Gain the ability to evaluate software quality using appropriate metrics
Unit Contents No. of
Hours
Fundamentals of Measurement: Need for Measurement: Measurement 15
in Software Engineering, Scope of Software Metrics,
I The Basics of measurement: The representational theory of
measurement, Measurement and models, Measurement scales and
scale types, meaningfulness in measurement
A Goal-Based Framework For Software Measurement: Classifying 15
software measures, Determining what to Measure, Applying the
framework, Software measurement validation, Performing
II SoftwareMeasurementValidation
Empirical investigation: Principles of Empirical Studies, Planning
Experiments, Planning case studies as quasi-experiments, Relevant
and Meaningful Studies
Software Metrics Data Collection: Defining good data, Data collection 15
for incident reports, How to collect data, Reliability of data collection
Procedures
III
Analyzing software measurement data: Statistical distributions and
hypothesis testing, Classical data analysis techniques, Examples of
simple analysis techniques
Measuring internal product attributes: Size Properties of Software Size, 15
Code size, Design size, Requirements analysis and Specification size,
Functional size measures and estimators, Applications of size
IV measures
Measuring internal product attributes: Structure: Aspects of Structural
Measures, Control flow structure of program units, Design-
levelAttributes, Object-oriented Structural attributes and measures
Measuring External Product Attributes: Modelling software quality,
V Measuring aspects of quality, Usability Measures, Maintainability 15
measures,SecurityMeasures
Software Reliability: Measurement and Prediction: Basics of reliability
theory, The software reliability problem, Parametric reliability growth
models, Predictive accuracy
TOTAL 75
CO Course Outcomes
CO2 Identify frame work and analysis techniques for software measurement
CO3 Apply internal and external attributes of software product for effort estimation
CO4 Use appropriate analytical techniques to interpret software metrics data and derive
meaningful insights
CO5 Recommend reliability models for predicting software quality
Textbooks
Software Metrics A Rigorous and Practical Approach, Norman Fenton, James
Bieman , Third Edition, 2014
Reference Books
Software metrics, Norman E, Fenton and Shari Lawrence Pfleeger, International
1
Thomson Computer Press, 1997
Metric and models in software quality engineering, Stephen H.Kan, Second edition,
2
2002, Addison Wesley Professional
Practical Software Metrics for Project Management and Process Improvement,
3
Robert B.Grady, 1992, Prentice Hall.
NOTE: Latest Edition of Textbooks May be Used
Web Resources
https://lansa.com/blog/general/what-are-software-metrics-how-can-i-measure-these-
1.
metrics/
2. https://stackify.com/track-software-metrics/
MAPPING TABLE
CO1 3 2 2 2 2 2
CO2 2 3 3 3 3 2
CO3 2 2 3 3 3 3
CO4 3 2 2 3 2 3
CO5 3 3 3 2 3 3
Weightage ofcourse
contributed to each
PSO 13 12 13 13 13 13
MACHINE LEARNING
5 0 0 - 4 5 25 75 100
Learning Objectives
To comprehend the raw data and to design the same with the appropriate machine
LO1
learning algorithms for a meaningful representation of data..
Unit Contents No. of
Hours
Introduction: Machine Learning – Examples of Machine Learning 15
Applications. Supervised Learning: Learning a Class from Examples –
Vapnik-Chervonenkis (VC) Dimension – Probably Approximately
I Correct (PAC) Learning – Noise – Learning Multiple Classes –
Regression – Model Selection and Generalization – Dimensions of a
Supervised Machine Learning Algorithm. Bayesian Decision Theory:
Introduction – Classification – Losses and Risks – Discriminant
Functions – Association Rules.
Parametric Methods: Maximum Likelihood Estimation – Evaluating 15
an Estimator: Bias and Variance – The Bayes‘ Estimator – Parametric
Classification – Regression – Tuning Model Complexity: Bias/Variance
II Dilemma – Model Selection Procedures. Nonparametric Methods:
Nonparametric Density Estimation – Generalization to Multivariate
Data – Nonparametric Classification – Condensed Nearest Neighbor –
Distance-Based Classification – Outlier Detection – Nonparametric
Regression: Smoothing Models
Linear Discrimination – Generalizing the Linear Model – Geometry of 15
the Linear Discriminant – Pairwise Separation – Gradient Descent –
III Logistic Discrimination – Discrimination by Regression – Learning to
Rank. Multilayer Perceptrons: The Perceptron – Training a Perceptron
– Learning Boolean Functions – Multilayer Perceptrons – MLP as a
Universal Approximator – Backpropagation Algorithm
Combining Multiple Learners: Generating Diverse Learners – Model 15
IV Combination Schemes – Voting – Bagging – Boosting – Stacked
Generalization – Fine-Tuning an Ensemble – Cascading Reinforcement
Learning: Elements of Reinforcement Learning – Model-Based
Learning – Temporal Difference Learning – Generalization – Partially
Observable States
Machine Learning with Python: Data Pre-processing, Analysis &
Visualization - Training Data and Test Data – Techniques – Algorithms:
List of Common Machine Learning Algorithms- Decision Tree
V Algorithm- Naïve Bayes Algorithm - K-Means-Random Forest- 15
Dimensionality Reduction Algorithm- Boosting Algorithms –
Applications: Social Media-Refinement of Search Engine Results-
Product Recommendations-Detection of Online frauds.
TOTAL 75
CO Course Outcomes
CO1 Outline the importance of machine learning in terms of designing intelligent machines
CO2 Identify suitable machine learning techniques for the real time applications
CO3 Analyze the theoretical concepts and how they relate to the practical aspects of machine
learning.
CO4 Assess the significance of principles, algorithms and applications of machine learning
through a hands-on approach
CO5 Compare the machine learning techniques with respective functionality
Textbooks
Ethem Alpaydın, ―Introduction to Machine Learning‖ Third Edition, MIT, 2014. (Unit
I – Unit IV)
https://www.tutorialspoint.com/machine_learning_with_python/machine_learning_wit
h_python_tutorial.pdf (Unit V: Machine learning with python tutorial)
Reference Books
1 1. Bertt Lantz, "Machine Learning with R," Packt Publishing, 2013
MAPPING TABLE
CO/ PSO PSO1 PSO2 PSO3 PSO4 PSO5 PSO6
CO1 3 2 2 2 2 2
CO2 2 3 3 3 3 2
CO3 2 2 3 3 3 3
CO4 3 2 2 3 2 3
CO5 3 3 3 2 3 3
Weightage ofcourse
contributed to each
PSO 13 12 13 13 13 13
NETWORK SECURITY
Marks
Inst. C Ex
Subject Code L T P S Credits Tot
Hours I ter
al
A nal
- 5 - - 4 5 25 75 100
Learning Objectives
LO1 To familiarize on the model of network security, Encryption techniques
LO2 To understand the design concept of cryptography and authentication
LO3 To develop experiments on algorithm used for security
LO4 To understand about virus and threats, firewalls, and implementation of Cryptography
UNIT Details No. of Hours
Model of network security – Security attacks, services and attacks –
OSI security architecture – Classical encryption techniques – SDES –
Block cipher PrinciplesDES – Strength of DES – Block cipher design
I 15
principles – Block cipher mode of operation – Evaluation criteria for
AES – RC4 - Differential and linear cryptanalysis – Placement of
encryption function – traffic confidentiality.
Number Theory – Prime number – Modular arithmetic – Euclid‘s
algorithm - Fermet‘s and Euler‘s theorem – Primality – Chinese
II remainder theorem – Discrete logarithm – Public key cryptography 15
and RSA – Key distribution – Key management – Diffie Hellman key
exchange – Elliptic curve cryptography
Authentication requirement – Authentication function – MAC – Hash
III function – Security of hash function and MAC – SHA - HMAC – 15
CMAC - Digital signature and authentication protocols – DSS.
Authentication applications – Kerberos – X.509 Authentication services
IV 15
- E- mail security – IP security - Web security
Intruder – Intrusion detection system – Virus and related threats –
V Countermeasures – Firewalls design principles – Trusted systems – 15
Practical implementation of cryptography and security
Total 75
Course Outcomes
Cours
e
On completion of this course, students will;
Outco
mes
Understand public-key cryptography, RSA and other public-key cryptosystems such as
CO1
Diffie-Hellman Key Exchange, ElGamal Cryptosystem.
CO2 Understand the security issues.
CO3 Apply key management and distribution schemes design. User Authentication
Analyze and design hash and MAC algorithms, and digital signatures. Analyze and
CO4
design classical encryption techniques and block ciphers.
CO5 Assess Intruders and Intruder Detection mechanisms, Types of Malicious software,
Reference Text :
William Stallings, ―Cryptography & Network Security‖, Pearson Education, Fourth
1.
Edition 2010.
References :
CharlieKaufman,RadiaPerlman,MikeSpeciner,―NetworkSecurity,Privatec
1.
ommunicationinpublicworld‖,PHISecondEdition,2002
Bruce Schneier, Neils Ferguson, ―Practical Cryptography‖, Wiley Dreamtech India
2.
Pvt Ltd, First Edition, 2003.
DouglasRSimson―Cryptography–
3.
Theoryandpractice‖,CRCPress,FirstEdition,1995
Web Resources
1. https://www.javatpoint.com/computer-network-security
2. https://www.tutorialspoint.com/information_security_cyber_law/network_security.htm
3. https://www.geeksforgeeks.org/network-security/
MAPPING TABLE
CO1 3 2 2 2 2 2
CO2 2 3 3 3 3 2
CO3 2 2 3 3 3 3
CO4 3 2 2 3 2 3
CO5 3 3 3 2 3 3
Weightage ofcourse
contributed to each
PSO 13 12 13 13 13 13
MOBILE APPLICATION DEVELOPMENT
5 0 0 - 4 5 25 75 100
Learning Objectives
To provide the students with the basics of Android Software Development tools and
LO1
development of software on mobile platform.
Unit Contents No. of
Hours
Introduction to Android Operating System – Configuration 15
of Android Environment- Create the First Android
Application. Layout: Vertical, Vertical Scroll, horizontal,
I horizontal Scroll, Table Layout arrangement. Designing
User Interface: Label Text - TextView – Password Text
Box - Button –ImageButton – CheckBox – Image -
RadioButton – Slider – Autocomplete text View.
TOTAL 75
CO Course Outcomes
CO2 Identify the results by executing the application in emulator or in android device
CO3 Apply proper interface setup, styles & themes, storing and management
CO4 Analyze the problem and add necessary user interface components, graphics and
multimedia components into the application.
CO5 Evaluate the results by implementing the concept behind the problem with proper
code.
Textbooks
Karen Lang and Selim Tezel, (2022), Become an App Inventor The official
guide from MIT App Inventor, Miteen Press, Walker Books Limited.
Reference Books
. http://appinventor.mit.edu/explore/paint-pot-extended-camera
Subje Subject Name L T P S Marks
Category
Credits
ct
Extern
Total
Code
CIA
al
NATURAL Elect 4 - - 3 25 75 10
LANGUAGE 0
PROCESSING
Learning Objectives
LO1 To understand approaches to syntax and semantics in NLP.
LO2 To learn natural language processing and to learn how to apply basic algorithms in this
field.
To understand approaches to discourse, generation, dialogue and summarization within
LO3
NLP.
Toget acquainted with the algorithmic description of the main language levels:
LO4
morphology, syntax, semantics, pragmatics etc.
LO5 To understand current methods for statistical approaches to machine translation.
UNIT Contents No.
Of.
Hours
I Introduction : Natural Language Processing tasks in syntax, semantics, and
pragmatics – Issue- Applications – The role of machine learning – Probability
Basics –Information theory – Collocations -N-gram Language Models – 12
Estimating parameters and smoothing – Evaluating language models.
II Word level and Syntactic Analysis:Word Level Analysis: Regular
Expressions-Finite-State Automata-Morphological Parsing-Spelling Error
Detection and correction-Words and Word classes-Part-of Speech 12
Tagging.Syntactic Analysis: Context-free Grammar-Constituency- Parsing-
Probabilistic Parsing.
III Semantic analysis and Discourse Processing: Semantic Analysis: Meaning
Representation-Lexical Semantics- Ambiguity-Word Sense Disambiguation.
Discourse Processing: cohesion-Reference Resolution- Discourse Coherence 12
and Structure.
IV Natural Language Generation: Architecture of NLG Systems- Generation
Tasks and Representations- Application of NLG. Machine Translation:
Problems in Machine Translation. Characteristics of Indian Languages- 12
Machine Translation Approaches-Translation involving Indian Languages.
V Information retrieval and lexical resources: Information Retrieval: Design
features of Information Retrieval Systems-Classical, Non-classical, Alternative
Models of Information Retrieval – valuation Lexical Resources: WorldNet- 12
Frame NetStemmers- POS Tagger- Research Corpora SSAS.
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Describe the fundamental concepts and techniques of natural language processing.
CO1 Explain the advantages and disadvantages of different NLP technologies and their
applicability in different business situations.
Distinguish among the various techniques, taking into account the assumptions,
strengths, and weaknesses of each
CO2
Use NLP technologies to explore and gain a broad understanding
of text data.
Use appropriate descriptions, visualizations, and statistics to communicate the
CO3 problems and their solutions.
Use NLP methods to analyse sentiment of a text document.
Analyze large volume text data generated from a range of real-world applications.
CO4
Use NLP methods to perform topic modelling.
Develop robotic process automation to manage business processes and to increase and
monitor their efficiency and effectiveness.
CO5
Determine the framework in which artificial intelligence and the Internet of things may
function, including interactions with people, enterprise functions, and environments.
Textbooks
1 Daniel Jurafsky, James H. Martin, ―Speech & language processing‖, Pearson
publications.
2 Allen, James. Natural language understanding. Pearson, 1995.
Reference Books
1. Pierre M. Nugues, ―An Introduction to Language Processing with Perl and
Prolog‖,Springer
Web Resources
1. https://en.wikipedia.org/wiki/Natural_language_processing
2. https://www.techtarget.com/searchenterpriseai/definition/natural-language-processing-
NLP
Mapping with Programme Outcomes:
CO 1 3 3 3 3 3 3
CO 2 2 3 3 3 2 3
3 3 3 3 3 3
CO 3
CO 4 3 2 3 3 2 3
CO 5 3 3 3 3 3 3
Weightageof 14 14 15 15 13 15
coursecontributedtoeachPSO
LO2 Identify and apply appropriate algorithms for analyzing the healthcare, Human
resource, hospitality and tourism data.
LO3 Make choices for a model for new machine learning tasks.
LO4 To identify employees with high attrition risk.
LO5 To Prioritizing various talent management initiatives for your organization.
UNIT No. Of. Hours
Contents
I Healthcare Analytics : Introduction to Healthcare Data
Analytics- Electronic Health Records– Components of EHR-
Coding Systems- Benefits of EHR- Barrier to Adopting HER
Challenges-Phenotyping Algorithms. Biomedical Image Analysis 12
and Signal Analysis- Genomic Data Analysis for Personalized
Medicine. Review of Clinical Prediction Models.
II Healthcare Analytics Applications : Applications and Practical
Systems for Healthcare– Data Analytics for Pervasive Health-
Fraud Detection in Healthcare- Data Analytics for Pharmaceutical
Discoveries- Clinical Decision Support Systems- Computer- 12
Assisted Medical Image Analysis Systems- Mobile Imaging and
Analytics for Biomedical Data.
III HR Analytics: Evolution of HR Analytics, HR information
systems and data sources, HR Metric and HR Analytics,
Evolution of HR Analytics; HR Metrics and HR Analytics; 12
Intuition versus analytical thinking; HRMS/HRIS and data
sources; Analytics frameworks like LAMP, HCM:21(r) Model.
IV Performance Analysis: Predicting employee performance,
Training requirements, evaluating training and development, 12
Optimizing selection and promotion decisions.
V Tourism and Hospitality Analytics: Guest Analytics – Loyalty
Analytics – Customer Satisfaction – Dynamic Pricing – optimized
disruption management – Fraud detection in payments. 12
TOTAL HOURS 60
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Understand and critically apply the concepts and methods PO1, PO2, PO3, PO4,
CO1 of business analytics PO5, PO6
Identify, model and solve decision problems in different PO1, PO2, PO3, PO4,
CO2 settings. PO5, PO6
CO4 Create viable solutions to decision making problems. PO1, PO2, PO3, PO4,
PO5, PO6
Instill a sense of ethical decision-making and a
PO1, PO2, PO3, PO4,
CO5 commitment to the long-run welfare of both organizations
PO5, PO6
and the communities they serve.
Textbooks
1 Chandan K. Reddy and Charu C Aggarwal, ―Healthcare data analytics‖, Taylor &
Francis, 2015.
2 Edwards Martin R, Edwards Kirsten (2016),―Predictive HR Analytics: Mastering
the HR Metric‖, Kogan Page Publishers, ISBN-0749473924
3 Fitz-enzJac (2010), ―The new HR analytics: predicting the economic value of your
company‘s human capital investments‖, AMACOM, ISBN-13: 978-0-8144-1643-3
4 RajendraSahu, Manoj Dash and Anil Kumar. Applying Predictive Analytics Within
the Service Sector.
Reference Books
1. Hui Yang and Eva K. Lee, ―Healthcare Analytics: From Data to Knowledge to
Healthcare Improvement, Wiley, 2016
2. Fitz-enzJac, Mattox II John (2014), ―Predictive Analytics for Human Resources‖,
Wiley, ISBN- 1118940709.
Web Resources
1. https://www.ukessays.com/essays/marketing/contemporary-issues-in-marketing-
marketing-essay.php
2. https://yourbusiness.azcentral.com/examples-contemporary-issues-marketing-field-
26524.html
CO 1 3 3 3 3 3 3
CO 2 2 3 3 3 3 3
CO 3 3 3 2 3 3 2
CO 4 3 3 3 3 3 3
CO 5 3 3 3 3 3 3
Weightageof 14 15 14 15 15 14
coursecontributedtoeachPSO
CRYPTOGRAPHY
Subject Category L T P S Credits Marks
Code CIA External Total
Elect 4 - - - 3 25 75 100
Learning Objectives
LO1 To understand the fundamentals of Cryptography
LO2 To acquire knowledge on standard algorithms used to provide confidentiality, integrity
and authenticity.
LO3 To understand the various key distribution and management schemes.
LO4 To understand how to deploy encryption techniques to secure data in transit across data
networks
LO5 To design security applications in the field of Information technology
UNIT Contents No. Of.
Hours
I Introduction: The OSI security Architecture – Security Attacks –
Security Mechanisms – Security Services – A model for network 12
Security.
II Classical Encryption Techniques: Symmetric cipher model –
Substitution Techniques: Caesar Cipher – Monoalphabetic cipher –
12
Play fair cipher – Poly Alphabetic Cipher – Transposition techniques –
Stenography
III Block Cipher and DES: Block Cipher Principles – DES – The
12
Strength of DES –RSA: The RSA algorithm.
IV Network Security Practices: IP Security overview - IP Security
architecture – Authentication Header. Web Security: SecureSocket 12
Layer and Transport Layer Security – Secure Electronic Transaction.
V Intruders – Malicious software – Firewalls. 12
TOTAL HOURS 60
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Analyze the vulnerabilities in any computing system and hence PO1, PO2, PO3,
CO1 be able to design a security solution. PO4, PO5, PO6
Apply the different cryptographic operations of public key PO1, PO2, PO3,
CO3 cryptography PO4, PO5, PO6
Apply the various Authentication schemes to simulate different PO1, PO2, PO3,
CO4 applications. PO4, PO5, PO6
Understand various Security practices and System security PO1, PO2, PO3,
CO5 standards PO4, PO5, PO6
Textbooks
1 William Stallings, ―Cryptography and Network Security Principles andPractices‖.
Reference Books
1. Behrouz A. Foruzan, ―Cryptography and Network Security‖, Tata McGraw-Hill,
2007.
2 AtulKahate, ―Cryptography and Network Security‖, Second Edition, 2003,TMH.
3 M.V. Arun Kumar, ―NetworkSecurity‖, 2011, First Edition,USP.
Web Resources
1 https://www.tutorialspoint.com/cryptography/
2 https://gpgtools.tenderapp.com/kb/how-to/introduction-to-cryptography
Mapping with Programme Outcomes:
CO 1 3 3 3 2 3 2
CO 2 3 2 3 2 3 3
CO 3 3 3 3 2 3 3
CO 4 2 3 3 3 2 3
CO 5 3 2 3 3 3 3
Weightage of course 14 13 15 12 14 14
contributed to each
PSO
Core 4 - - - 3 5 25 75 100
Course Objective
C1 Understand the Big Data Platform and its Use cases, Map Reduce Jobs
C2 To identify and understand the basics of cluster and decision tree
C3 To study about the Association Rules, Recommendation System
C4 To learn about the concept of stream
C5 Understand the concepts of NoSQL Databases
UNIT Details No. of
Hours
I Evolution of Big data — Best Practices for Big data Analytics — Big data
characteristics — Validating — The Promotion of the Value of Big Data
— Big Data Use Cases- Characteristics of Big Data Applications — 12
Perception and Quantification of Value -Understanding Big Data Storage
— A General Overview of High-Performance Architecture — HDFS —
MapReduce and YARN — Map Reduce Programming Model
II Advanced Analytical Theory and Methods: Overview of Clustering — K-
means — Use Cases — Overview of the Method — Determining the
Number of Clusters — Diagnostics — Reasons to Choose and Cautions .-
Classification: Decision Trees — Overview of a Decision Tree — The 12
General Algorithm — Decision Tree Algorithms — Evaluating a
Decision Tree — Decision Trees in R — Naïve Bayes — Bayes?
Theorem — Naïve Bayes Classifier.
III Advanced Analytical Theory and Methods: Association Rules —
Overview — Apriori Algorithm — Evaluation of Candidate Rules —
Applications of Association Rules — Finding Association& finding 12
similarity — Recommendation System: Collaborative Recommendation-
Content Based Recommendation — Knowledge Based Recommendation-
Hybrid Recommendation Approaches.
IV Introduction to Streams Concepts — Stream Data Model and Architecture
— Stream Computing,
Sampling Data in a Stream — Filtering Streams — Counting Distinct
Elements in a Stream — Estimating moments — Counting oneness in a 12
Window — Decaying Window — Real time Analytics Platform(RTAP)
applications — Case Studies — Real Time Sentiment Analysis, Stock
Market Predictions. Using Graph Analytics for Big Data: Graph Analytics
V NoSQL Databases : Schema-less Models?: Increasing Flexibility for Data
Manipulation-Key Value Stores- Document Stores — Tabular Stores —
Object Data Stores — Graph Databases Hive — Sharding —Hbase — 12
Analyzing big data with twitter — Big data for E-Commerce Big data for
blogs — Review of Basic Data Analytic Methods using R.
Total 60
Course Outcomes Programme Outcomes
CO On completion of this course, students will
1 Work with big data tools and its analysis techniques. PO1
2. EMC Education Services, ―Data Science and Big Data Analytics: Discovering,
Analyzing, Visualizing and Presenting Data‖, Wiley publishers, 2015.
Web Resources
1. https://www.simplilearn.com
2. https://www.sas.com/en_us/insights/analytics/big-data-analytics.html
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Inst. Hours
Category
Code
Credits
External
Total
CIA
Core Y - - - 3 4 2 75 100
5
Course Objective
C1 Use of Devices, Gateways and Data Management in IoT.
C2 Design IoT applications in different domain and be able to analyze their performance
C3 Implement basic IoT applications on embedded platform
C4 To gain knowledge on Industry Internet of Things
C5 To Learn about the privacy and Security issues in IoT
UNIT Details No. of Hours Course
Objectiv
e
I IoT & Web Technology, The Internet of Things Today,
Time for Convergence, Towards the IoT Universe,
Internet of Things Vision, IoT Strategic Research and
Innovation Directions, IoT Applications, Future
Internet Technologies, Infrastructure, Networks and 12 C1
Communication, Processes, Data Management,
Security, Privacy & Trust, Device Level Energy Issues,
IoT Related Standardization, Recommendations on
Research Topics.
Reference Books
1. Michael Miller, ―The Internet of Things: How Smart TVs, Smart Cars, Smart Homes,
and Smart Cities Are Changing the World‖, kindle version.
Web Resources
1. https://www.simplilearn.com
2. https://www.javatpoint.com
3. https://www.w3schools.com
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
u
a
g
o
o
e
r
e
r
I
s
t
t
t
i
.
Code
External
Total
CIA
Human Computer Elective
- Y - V 3 4 25 75 100
Interaction
Course Objective
C1 To learn about the foundations of Human Computer Interaction.
C2 To learn the design and software process technologies.
C3 To learn HCI models and theories.
C4 To learn Mobile Ecosystem.
C5 To learn the various types of Web Interface Design.
No. of
UNIT Details
Hours
FOUNDATIONS OF HCI :
The Human: I/O channels – Memory
Reasoning and problem solving; The Computer: Devices –
I 12
Memory – processing and networks;
Interaction: Models – frameworks – Ergonomics – styles –
elements – interactivity- Paradigms. - Case Studies
II DESIGN & SOFTWARE PROCESS:
Interactive Design:
Basics – process – scenarios
Navigation: screen design Iteration and prototyping. 12
HCI in software process:
Software life cycle – usability engineering – Prototyping in
practice – design rationale. Design rules: principles, standards,
guidelines, rules. Evaluation Techniques – Universal Design
III MODELS AND THEORIES:
HCI Models : Cognitive models:- Socio-Organizational issues
12
and stakeholder requirements Communication and collaboration
models-Hypertext, Multimedia and WWW.
IV Mobile HCI:
Mobile Ecosystem: Platforms, Application frameworks
Types of Mobile Applications: Widgets, Applications, Games 12
Mobile Information Architecture, Mobile 2.0,
Mobile Design: Elements of Mobile Design, Tools. - Case Studies
V WEB INTERFACE DESIGN: Designing Web Interfaces – Drag &
Drop, Direct Selection, Contextual Tools, Overlays, Inlays and Virtual 12
Pages, Process Flow - Case Studies
Total 60
Course Outcomes Programme Outcome
CO On completion of this course, students will
1 Understand the fundementals of HCI. PO1
Understand the design and software process
2 PO1, PO2
technologies.
3 Understand HCI models and theories. PO4, PO6
Understand Mobile Ecosystem, types of Mobile
4 PO4, PO5, PO6
Applications, mobile Architecture and design.
Understand the various types of Web Interface
5 PO3, PO8
Design.
Text Book
Alan Dix, Janet Finlay, Gregory Abowd, Russell Beale, ‖Human -Computer
1
Interaction‖‖, III Edition, Pearson Education, 2004 (UNIT I, II & III)
Brian Fling, ―‖Mobile Design and Development‖, I Edition, O‗Reilly Media Inc.,
2 2009(UNIT–IV)
Bill Scott and Theresa Neil, ―Designing Web Interfaces‖, First Edition, O‗Reilly, 2009.
3
(UNIT-V)
Reference Books
Shneiderman, ―Designing the User Interface: Strategies for Effective Human-Computer
1.
Interaction‖, V Edition, Pearson Education.
Web Resources
1. https://www.interaction-design.org/literature/topics/human-computer-interaction
2. https://link.springer.com/10.1007/978-0-387-39940-9_192
3. https://en.wikipedia.org/wiki/Human%E2%80%93computer_interaction
Mapping with Programme Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 S S
CO 3 S S
CO 4 S S S
CO 5 S S
Code
Credits
External
Total
CIA
Total
Course Outcomes Programme Outcomes
CO On completion of this course, students will
1 Understand the basics of Fuzzy sets, operation and PO1
properties.
2 Apply Cartesian product and composition on Fuzzy
relations and usethe tolerance and Equivalence PO1, PO2
relations.
Reference Books
1. Guanrong Chen and Trung Tat Pham- Introduction to Fuzzy Sets, Fuzzy Logic and
Fuzzy Control Systems
2. https://www.guru99.com/what-is-fuzzy-logic.html
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Inst. Hours
Category
Code
Credits
External
Total
CIA
Artificial Intelligence Elective
- Y - - 3 4 25 75 100
Course Objective
C1 To learn various concepts of AI Techniques.
C2 To learn various Search Algorithm in AI.
C3 To learn probabilistic reasoning and models in AI.
C4 To learn about Markov Decision Process.
C5 To learn various type of Reinforcement learning.
No. of
UNIT Details
Hours
Introduction: Concept of AI, history, current status, scope, agents,
CO 1 S
CO 2 S S
CO 3 S S
CO 4 S S S
CO 5 S S
Inst. Hours
Category
Code
Credits
External
Total
CIA
Robotics and Its Elective Y - - - 3 4 25 75 100
Applications
Course Objective
C1 To understand the robotics fundamentals
C2 Understand the sensors and matrix methods
C3 Understand the Localization: Self-localizations and mapping
C4 To study about the concept of Path Planning, Vision system
C5 To learn about the concept of robot artificial intelligence
UNIT Details No. of Course
Hours Objective
I Introduction: Introduction, brief history, components of
robotics, classification, workspace, work-envelop,
motion of robotic arm, end-effectors and its types,
12 CO1
service robot and its application, Artificial Intelligence
in Robotics.
Total 60
Course Outcomes Programme Outcomes
CO On completion of this course, students will
1 Describe the different physical forms of robot
PO1
architectures.
2 Kinematically model simple manipulator and mobile
PO1, PO2
robots.
3 Mathematically describe a kinematic robot system PO4, PO6
4 Analyze manipulation and navigation problems using
knowledge of coordinate frames, kinematics, PO4, PO5, PO6
optimization, control, and uncertainty.
5 Program robotics algorithms related to kinematics,
PO3, PO8
control, optimization, and uncertainty.
Text Book
1 RicharedD.Klafter. Thomas Achmielewski and MickaelNegin, Robotic Engineering
and Integrated Approach, Prentice Hall India-Newdelhi-2001
2. https://www.geeksforgeeks.org/robotics-introduction/
Mapping with Programme Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Code
Category
Credits
External
Total
CIA
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
S-Strong M-Medium L-Low
H
C
u
a
g
o
o
e
r
e
r
I
s
t
t
t
i
.
t Code
External
Total
CIA
Grid Computing Elective
- Y - - 3 4 25 75 100
Course Objective
C1 To learn the basic construction and application of Grid computing.
C2 To learn grid computing organization and their Role.
C3 To learn Grid Computing Anotomy.
C4 To learn Grid Computing road map.
C5 To learn various type of Grid Architecture.
No. of
UNIT Details
Hours
Introduction: Early Grid Activity, Current Grid Activity, Overview of Grid
I Business areas, Grid Applications, Grid Infrastructures. 12
CO 1 S
CO 2 S S
CO 3 S S
CO 4 S S S
CO 5 S S
Code
Credits
External
Total
CIA
C5 To learn the various Case Studies in Cloud, Edge & fog Computing.
UNIT Details No. of
Hours
Era of Cloud Computing: Introduction – Components of Cloud
Computing – Cloud Types: Private, Public and Hybrid clouds –
I Limitations of the Cloud - Virtualization: Structure and Mechanisms. 12
III
Edge Computing: Edge Computing and Its Essentials: Introduction-
Edge Computing Architecture- Advantages and Limitations of Edge
Computing Systems- Edge Computing Interfaces and Devices - Edge 12
Analytics: Edge Data Analytics – Potential of Edge Analytics –
Architecture of Edge Analytics – Case study
2 Classify the computing technologies based on its architecture and PO1, PO2
infrastructure and identify its strategies.
3 Examine various cloud services, Security threat exposure within a PO4, PO6
cloudcomputing infrastructure.
4 Asses the problems and solutions involved in various stages of different PO4,
computing environments. PO5, PO6
5 Discuss the importance of cloud, edge and Fog technology and implement PO3, PO8
innovative ideas and practices for regulating green IT.
Text Book
Kailas Jayaswal,Jagannath Kallakurchi,Donald J.Houde,Dr.Devan Shah ― Cloud
1
Computing –Black Book‖ Edition :2020 (UNIT I & II : CHAPTER 1,2,3,9,11)
K. Anitha Kumari G. Sudha Sadasivam D. Dharani M. Niranjanamurthy, ―EDGE
4. Role in the Internet of Things‖, MCC‘12, August 17, 2012, Helsinki, Finland.
Copyright 2012.
Amir M. Rahmani · Pasi Liljeberg Jürgo-Sören Preden ―Fog Computing in the Internet
5
of Things‖Springer,2018. ( UNIT V: PART/CHAPTER (1.4,2.5)
Web Resources
1. https://static.googleusercontent.com/media/www.google.com/en//green/pdfs/google-
green- computing.pdf ( Case Study)
2. http://whatiscloud.com/basic_concepts_and_terminology/cloud
3. http://www.computerweekly.com/guides/Using-green-computing-for-improving-
energy- efficiency
CO 1 S
CO 2 S S
CO 3 S S
CO 4 S S S
CO 5 S S
Inst. Hours
Category
Code
Credits
External
Total
CIA
Artificial Neural Core
- Y - - 3 4 25 75 100
Networks
Course Objective
C1 Understand the basics of artificial neural networks, learning process, single layer
and multi-layer perceptron networks.
C2 Understand the Error Correction and various learning algorithms and tasks.
C3 Identify the various Single Layer Perception Learning Algorithm.
C4 Identify the various Multi-Layer Perception Network.
C5 Analyze the Deep Learning of various Neural network and its Applications.
No. of
UNIT Details
Hours
Artificial Neural Model- Activation functions- Feed forward and
Feedback, Convex Sets, Convex Hull and Linear Separability, Non-
CO 1 S
CO 2 S S
CO 3 S S
CO 4 S S S
CO 5 S S
Code
Credits
External
Total
CIA
CO 1 S
CO 2 S S
CO 3 S S
CO 4 S S S
CO 5 S S
Inst. Hours
Category
Code
Credits
External
Total
CIA
SEC1 OFFICE Specific -Y - - 2 2 25 75 100
AUTOMATION Elective
Course Objective
C1 Understand the basics of computer systems and its components.
C2 Understand and apply the basic concepts of a word processing package.
C3 Understand and apply the basic concepts of electronic spreadsheet software.
C4 Understand and apply the basic concepts of database management system.
C5 Understand and create a presentation using PowerPoint tool.
UNIT Details No. of
Hours
I Introductory concepts: Memory unit– CPU-Input Devices: Key board,
Mouse and Scanner. Output devices: Monitor, Printer. Introduction to
6
Operating systems & its features: DOS– UNIX–Windows. Introduction
to Programming Languages.
II Word Processing: Open, Save and close word document; Editing
text – tools, formatting, bullets; Spell Checker - Document
formatting – Paragraph alignment, indentation, headers and footers, 6
numbering; printing–Preview, options, merge.
Total 30
CO 1 M S M M L
CO 2 S M S M
CO 3 S S M L
CO 4 S L M M
CO 5 M S M S
Credits
Code
Tota
y
Exte
CIA
rnal
CO Course Outcomes
Knows the basic concept in HTML
CO1 Concept of resources in HTML
Textbooks
1 ―Mastering HTML5 and CSS3 Made Easy‖, TeachUComp Inc., 2014.
2
Thomas Michaud, “Foundations of Web Design: Introduction to HTML & CSS”
Web Resources
1. https://www.teachucomp.com/samples/html/5/manuals/Mastering-HTML5-CSS3.pdf
2. https://www.w3schools.com/html/default.asp
Code
Credits
External
Total
CIA
PROBLEM SOLVING Specific
Y - - - 2 2 25 75 100
TECHNIQUES Elective
Course Objective
C1 Understand the systematic approach to problem solving.
IV 6
Array Techniques: Array order reversal – Array counting or
histograming – Finding the maximum number in a set - Removal of
duplicates from an ordered array - Partitioning an array – Finding the kth
smallest element – Longest monotone subsequence.
V 6
Text Processing and Pattern Searching: Text line length adjustment –
Left and right justification of text – Keyword searching in text – Text line
editing – Linear pattern search.
Recursive algorithms: Towers of Hanoi – Permutation generation.
Total 30
Course Outcomes Programme Outcome
CO On completion of this course, students will
1 Understand the logic of problem and analyses
implementation of algorithm and TopDown PO1,PO6
approach and concept of Recursion
2 Able to understand the Sequence of Numbers and
PO2
Series Fibonacci, Reversing ,Base Conversion.
3 Able to do Algebraic operations PO2,PO4
4 Coverage of Arrays and its Logics PO6,PO8
5 Text Processing and Pattern Searching Approach PO7
Text Book
1 R. G. Dromey, How to Solve it by Computer, Pearson India, 2007
Reference Books
1.
George Polya, Jeremy Kilpatrick, The Stanford Mathematics Problem Book: With
Hints and Solutions, Dover Publications, 2009 (Kindle Edition 2013).
2.
Greg W. Scragg, Problem Solving with Computers, Jones & Bartlett 1st edition, 1996.
Web Resources
1. https://www.studytonight.com/
2. https://www.w3schools.com/
CO 1 M S
CO 2 M
CO 3 S L
CO 4 S M
CO 5 M
Multimedia Lab
CO3 Solve various design and implementation issues materialize on the development
of multimedia systems
CO4 Assess different Photo Editing, Video Editing and animation tools and select the
appropriate tool based on the requirements
CO5 Design and develop Multimedia Projects
Textbooks
1. Jason Van Gumster& Robert Shimonski (2010), ―GIMP Bible‖, Wiley, 2nd
edition.
2. Chris Gover, 2010, ―Flash CS5: The missing Manual‖, 1st Edition, O‟ Reilly
India.
Reference Books
1 Juan Manuel Ferreyra (2011), ―GIMP 2.6 Cookbook‖, PACK publishing Ltd.
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 M S M M L
CO 2 S M S M
CO 3 S S M L
CO 4 S L M M
CO 5 M S M S
Subject Subject Name L T P S Marks
Category
Credits
Code
Exter
Total
CIA
nal
FUNDAMENTALS OF Specific 2 - - I 2 25 75 100
INFORMATION Elective
TECHNOLOGY
Learning Objectives
LO1 Understand basic concepts and terminology of information technology.
LO2 Have a basic understanding of personal computers and their operation
LO3 Be able to identify data storage and its usage
LO4 Get great knowledge of software and its functionalities
LO5 Understand about operating system and their uses
UNIT Contents No. Of.
Hours
I Introduction to Computers:
Introduction, Definition, .Characteristics of computer, Evolution
of Computer, Block Diagram Of a computer, Generations of 6
Computer, Classification Of Computers, Applications of
Computer, Capabilities and limitations of computer
II Basic Computer Organization:
Role of I/O devices in a computer system. Input Units: Keyboard,
Terminals and its types. Pointing Devices, Scanners and its types,
Voice Recognition Systems, Vision Input System, Touch Screen, 6
Output Units: Monitors and its types. Printers: Impact Printers
and its types. Non Impact Printers and its types, Plotters, types of
plotters, Sound cards, Speakers.
III Storage Fundamentals:
Primary Vs Secondary Storage, Data storage & retrieval methods.
Primary Storage: RAM ROM, PROM, EPROM, EEPROM.
Secondary Storage: Magnetic Tapes, Magnetic Disks. Cartridge 6
tape, hard disks, Floppy disks Optical Disks, Compact Disks, Zip
Drive, Flash Drives
IV Software:
Software and its needs, Types of S/W. System Software:
Operating System, Utility Programs Programming Language:
Machine Language, Assembly Language, High Level Language 6
their advantages & disadvantages. Application S/W and its types:
Word Processing, Spread Sheets Presentation, Graphics, DBMS
s/w
V Operating System:
Functions, Measuring System Performance, Assemblers,
Compilers and Interpreters.Batch Processing, Multiprogramming, 6
Multi Tasking, Multiprocessing, Time Sharing, DOS, Windows,
Unix/Linux.
TOTAL HOURS 30
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Learn the basics of computer, Construct the structure of the required PO1, PO2,
CO1 things in computer, learn how to use it. PO3, PO4,
PO5, PO6
Develop organizational structure using for the devices present PO1, PO2,
CO2 currently under input or output unit. PO3, PO4,
PO5, PO6
Concept of storing data in computer using two header namely RAM PO1, PO2,
CO3 and ROM with different types of ROM with advancement in PO3, PO4,
storage basis. PO5, PO6
CO4
Work with different software, Write program in the software and PO1, PO2,
applications of software. PO3, PO4,
PO5, PO6
Usage of Operating system in information technology which really PO1, PO2,
CO5 acts as a interpreter between software and hardware. PO3, PO4,
PO5, PO6
Textbooks
1 Anoop Mathew, S. Kavitha Murugeshan (2009), ― Fundamental of Information
Technology‖, Majestic Books.
2 Alexis Leon, Mathews Leon,‖ Fundamental of Information Technology‖, 2nd Edition.
3 S. K Bansal, ―Fundamental of Information Technology‖.
Reference Books
1. Bhardwaj Sushil Puneet Kumar, ―Fundamental of Information Technology‖
2. GG WILKINSON, ―Fundamentals of Information Technology‖, Wiley-Blackwell
3. A Ravichandran , ―Fundamentals of Information Technology‖, Khanna Book
Publishing
Web Resources
1. https://testbook.com/learn/computer-fundamentals
2. https://www.tutorialsmate.com/2020/04/computer-fundamentals-tutorial.html
3. https://www.javatpoint.com/computer-fundamentals-tutorial
4. https://www.tutorialspoint.com/computer_fundamentals/index.htm
5. https://www.nios.ac.in/media/documents/sec229new/Lesson1.pdf
CO 1 3 3 3 3 3 3
CO 2 3 3 3 3 3 3
CO 3 3 3 3 3 3 3
CO 4 3 3 3 3 2 3
CO 5 3 3 2 3 3 2
Weightage of course 15 15 14 15 14 14
contributed to each
PSO
Category
Credits
Code
Exter
Total
CIA
nal
INTRODUCTION TO Specific 2 - - 2 25 75 100
HTML Elective
Learning Objectives
LO1 Insert a graphic within a web page.
LO2 Create a link within a web page.
LO3 Create a table within a web page.
LO4 Insert heading levels within a web page.
LO5 Insert ordered and unordered lists within a web page. Create a web page.
UNIT Contents No. Of.
Hours
I Introduction :Web Basics: What is Internet – Web browsers – What is
6
Web page – HTML Basics: Understanding tags.
II Tags for Document structure( HTML, Head, Body Tag). Block level
text elements: Headings paragraph(<p> tag) – Font style elements: (bold, 6
italic, font, small, strong, strike, big tags)
III Lists: Types of lists: Ordered, Unordered – Nesting Lists – Other tags:
6
Marquee, HR, BR- Using Images – Creating Hyperlinks.
IV Tables: Creating basic Table, Table elements, Caption – Table and cell
6
alignment – Rowspan, Colspan – Cell padding.
V Frames: Frameset – Targeted Links – No frame – Forms : Input, Textarea,
Select, Option. 6
TOTAL HOURS 30
Textbooks
1 ―Mastering HTML5 and CSS3 Made Easy‖, TeachUComp Inc., 2014.
2
Thomas Michaud, “Foundations of Web Design: Introduction to HTML & CSS”
Web Resources
1. https://www.teachucomp.com/samples/html/5/manuals/Mastering-HTML5-CSS3.pdf
2. https://www.w3schools.com/html/default.asp
Weightage of course 14 15 14 14 15 15
contributed to each
PSO
S-Strong-3 M-Medium-2 L-Low-1
Credits
Hours
Code
Inst.
Exter
Total
y
CIA
nal
CO 1 S M L M
CO 2 S M L M
CO 3 S M
CO 4 S M M L
CO 5 M L M
t Code
Credits
External
Total
CIA
2. https://www.guru99.com/software-testing.html
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Code
Credits
External
Total
CIA
Total 60
Course Outcomes Programme Outcome
CO On completion of this course, students will
1 understand the concepts, application and the problems of
PO1
numbers
2 To have basic knowledge and understanding about
PO1, PO2
percentage, profit & loss related processings
3 To understand the concepts of time and work PO4, PO6
4 Speaks about the concepts of probability, discount PO4, PO5, PO6
5 Understanding the concept of problem solving involved in
PO3, PO8
stocks & shares, graphs
Text Book
1 ―QuantitativeAptitude‖,R.S.AGGARWAL.,S.Chand&CompanyLtd.,
Reference Books
1.
Web Resources
1. https://www.javatpoint.com/aptitude/quantitative
2. https://www.toppr.com/guides/quantitative-aptitude/
Mapping with Programme Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Inst. Hours
Code Category
Credits
External
Total
CIA
Multimedia Systems Specific Y - - - 2 2 25 75 100
Elective
Course Objective
C1 Understand the basics of Multimedia
C2 To study about the Image File Formats,Sounds Audio File Formats
C3 Understand the concepts of Animation and DigitalVideoContainers
C4 To study about the Stage of Multimedia Project
C5 Understand the concept of
OwnershipofContentCreatedforProjectAcquiringTalent
UNIT Details No. of Course
Hours Objective
I Multimedia Definition-Use Of Multimedia-
Delivering Multimedia- Text:About Fonts and 12
C1
Faces - Using Text in Multimedia -Computers
and Text Font Editing and DesignTools-
HypermediaandHypertext.
II Images: Plan Approach - Organize Tools -
Configure Computer Workspace -Making Still
Images - Color - Image File Formats. Sound:
12
The Power of Sound -DigitalAudio-MidiAudio- C2
Midivs.DigitalAudio-MultimediaSystemSounds
Audio File Formats -Vaughan's Law of
Multimedia Minimums - Adding
SoundtoMultimediaProject
III Animation:The Power of Motion-Principles of
Animation-Animation by Computer - Making
Animations that Work. Video: Using Video -
12 C3
Working with Video and Displays-
DigitalVideoContainers-ObtainingVideo Clips
-ShootingandEditingVideo
IV Making Multimedia: The Stage of Multimedia Project
- The Intangible Needs -The Hardware Needs - The 12
C4
Software Needs - An Authoring Systems Needs-
MultimediaProductionTeam.
V PlanningandCosting:TheProcessofMakingMulti
media-Scheduling-Estimating - RFPs and Bid
Proposals. Designing and Producing - Content
12
andTalent:AcquiringContent- C5
OwnershipofContentCreatedforProject-
AcquiringTalent
Total 60
Course Outcomes Programme Outcomes
CO On completion of this course, students will
1 understand the concepts, importance, application and
PO1
the process of developing multimedia
2 to have basic knowledge and understanding about
PO1, PO2
image related processings
3 To understand the framework of frames and bit
PO4, PO6
images to animations
4 Speaks about the multimedia projects and stages of
PO4, PO5, PO6
requirement in phases of project.
5 Understanding the concept of cost involved in
PO3, PO8
multimedia planning, designing, and producing
Text Book
1 TayVaughan,"Multimedia:MakingItWork",8thEdition,Osborne/McGraw-
Hill,2001.
Reference Books
1. RalfSteinmetz&KlaraNahrstedt"MultimediaComputing,Communication&
Applications",PearsonEducation,2012.
Web Resources
1. https://www.geeksforgeeks.org/multimedia-systems-with-features-or-characteristics/
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Inst. Hours
Category
Code
Credits
External
Total
CIA
Specific Y - - - 2 2 25 75 100
Advanced Excel Elective
Course Objective
C1 Handle large amounts of data
C2 Aggregate numeric data and summarize into categories and subcategories
C3 Filtering, sorting, and grouping data or subsets of data
C4 Create pivot tables to consolidate data from multiple files
C5 Presenting data in the form of charts and graphs
UNIT Details No. of Course Objective
Hours
I
Basics of Excel- Customizing common options-
Absolute and relative cells- Protecting and un-
protecting worksheets and cells- Working with
Functions - Writing conditional expressions - logical
functions - lookup and reference functions- VlookUP
6 C1
with Exact Match, Approximate Match- Nested
VlookUP with Exact Match- VlookUP with Tables,
Dynamic Ranges- Nested VlookUP with Exact Match-
Using VLookUP to consolidate Data from Multiple
Sheets
3 https://www.w3schools.com
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Credits
Externa
Subject Code Subject Name L T P S
Total
CIA
l
Biometrics Specific Y - - - 2 2 25
75 100
Elective
Course Objectives
Course
On completion of this course, students will;
Outcomes
To understand the basic concepts and the functionality
CO1 of the Biometrics, Face Biometrics, Types, PO1, PO3, PO6, PO8
Architecture and Applications.
CO2 To know the concepts Retina and Iris Biometrics and PO1,PO2,PO3,PO6
Vein and Fingerprint Biometrics.
To analyse the Privacy Enhancement and Multimodal
CO3 PO3, PO5
Biometrics.
CO4 To get analyticalidea on Watrmarking Techniques PO1, PO2, PO3, PO7
To Gain knowledge on Future scope of
CO5 Biometrics,and Study of various Biometric PO2, PO6, PO7
Techniques.
Recommended Text
Biometrics: Concepts and Applications by G.R Sinha and SandeepB.Patil ,
1.
Wiley, 2013
References Books
Guide to Biometrics by Ruud M. Bolle , SharathPankanti, Nalinik.Ratha,
1.
Andrew W.Senior, Jonathan H. Connell , Springer 2009
2. Introduction to Biometrics by Anil k. Jain, Arun A. Ross, KarthikNandakumar
3. Hand book of Biometrics by Anil K. Jain, Patrick Flynn, ArunA.Ross.
Web Resources
1. https://www.tutorialspoint.com/biometrics/index.htm
2. https://www.javatpoint.com/biometrics-tutorial
https://www.thalesgroup.com/en/markets/digital-identity-and-
3.
security/government/inspired/biometrics
CO 1 S M L M
CO 2 S M L M
CO 3 S M
CO 4 S M M L
CO 5 M L M
Inst. Hours
Code
Category
Credits
External
Total
CIA
Cyber Forensics Specific Y - - - 2 2 25 75 100
Elective
Course Objective
C1 Understand the definition of computer forensics fundamentals.
C2 To study about the Types of Computer Forensics Evidence
C3 Understand and apply the concepts of Duplication and Preservation of Digital Evidence
C4 Understand the concepts of Electronic Evidence and Identification of Data
C5 To study about the Digital Detective, Network Forensics Scenario, Damaging
Computer Evidence.
UNIT Details No. of Hours Course
Objective
I Overview of Computer Forensics Technology:
Computer Forensics Fundamentals: What is
C1
Computer Forensics? Use of Computer Forensics in
Law Enforcement, Computer Forensics Assistance to
Human Resources/Employment Proceedings,
Computer Forensics Services, Benefits of 6
professional Forensics Methodology, Steps taken by
Computer Forensics Specialists. Types of Computer.
Forensics Technology: Types of Business Computer
Forensic, Technology–Types of Military Computer
Forensic Technology–Types of Law Enforcement–
Computer Forensic. Technology–Types of Business
Computer Forensic Technology.
II Computer Forensics Evidence and capture: Data 6
Recovery: Data Recovery Defined, Data Back–up
and Recovery, The Role of Back –up in Data
Recovery, The Data –Recovery Solution. Evidence
Collection and Data Seizure: Collection Options,
C2
Obstacles, Types of Evidence, The Rules of
Evidence, Volatile Evidence, General Procedure,
Collection and Archiving, Methods of Collections,
Artefacts, Collection Steps, Controlling
Contamination: The chain of custody.
III Duplication and Preservation of Digital Evidence:
Processing steps, Legal Aspects of collecting and
Preserving Computer forensic Evidence. Computer
C3
image Verification and Authentication: Special needs 6
of Evidential Authentication, Practical Consideration,
Practical Implementation.
Text Book
1 John R. Vacca, ―Computer Forensics: Computer Crime Investigation‖, 3/E ,Firewall
Media, New Delhi, 2002.
Reference Books
1. Nelson, Phillips Enfinger, Steuart,―Computer Forensics and Investigations‖ Enfinger,
Steuart, CENGAGE Learning, 2004.
2. Anthony Sammes and Brian Jenkinson,‖Forensic Computing: A Practitioner's
Guide‖, Second Edition, Springer–Verlag London Limited, 2007.
3. .Robert M.Slade,‖ Software Forensics Collecting Evidence from the Scene of a Digital
Crime‖, TMH 2005.
Web Resources
1. https://www.vskills.in
2. https://www.hackingarticles.in/best-of-computer-forensics-tutorials/
Mapping with Programme Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Inst. Hours
Code Category
Credits
External
Total
CIA
Pattern Recognition Specific Y - - - 2 2 75 25 100
Elective
Course Objective
CO1 To learn the fundamentals of Pattern Recognition techniques
CO2 To learn the various Statistical Pattern recognition techniques
CO3 To learn the linear discriminant functions and unsupervised learning and clustering
CO4 To learn the various Syntactical Pattern recognition techniques
CO5 To learn the Neural Pattern recognition techniques
UNIT Details No. of Course Objective
Hours
I PATTERN RECOGNITION OVERVIEW: Pattern
recognition, Classification and Description-Patterns and
6 CO1
feature Extraction with Examples-Training and
Learning in PR systems-Pattern recognition Approaches
II STATISTICAL PATTERN RECOGNITION:
Introduction to statistical Pattern Recognition-
6 CO2
supervised Learning using Parametric and Non-
Parametric Approaches.
III LINEAR DISCRIMINANT FUNCTIONS AND
UNSUPERVISED LEARNING AND CLUSTERING:
Introduction-Discrete and binary Classification 6 CO3
Problems-Techniques to directly Obtain linear
Classifiers - Formulation of Unsupervised Learning
Problems-Clustering for unsupervised learning and
classification
IV SYNTACTIC PATTERN RECOGNITION: Overview
of Syntactic Pattern Recognition-Syntactic recognition
via parsing and other grammars–Graphical Approaches 6 CO4
to syntactic pattern recognition-Learning via
grammatical inference.
V NEURAL PATTERN RECOGNITION: Introduction to
Neural Networks-Feedforward Networks and training
6 CO5
by Back Propagation-Content Addressable Memory
Approaches and Unsupervised Learning in Neural PR
Total
Course Outcomes Programme Outcomes
CO On completion of this course, students will
1 understand the concepts, importance, application and the
PO1
process of developing Pattern recognition over view
2 to have basic knowledge and understanding about parametric
PO1, PO2
and non-parametric related concepts.
3 To understand the framework of frames and bit images to
PO4, PO6
animations
4 Speaks about the multimedia projects and stages of
PO4, PO5, PO6
requirement in phases of project.
5 Understanding the concept of cost involved in multimedia
PO3, PO8
planning, designing, and producing
Text Book
1 Robert Schalkoff, ―Pattern Recognition: Statistical Structural and Neural Approaches‖,
John wiley & sons.
2 Duda R.O., P.E.Hart & D.G Stork, ― Pattern Classification‖, 2nd Edition, J.Wiley.
3 Duda R.O.& Hart P.E., ―Pattern Classification and Scene Analysis‖, J.wiley.
4 Bishop C.M., ―Neural Networks for Pattern Recognition‖, Oxford University Press.
Reference Books
1. 1. Earl Gose, Richard johnsonbaugh, Steve Jost, ―Pattern Recognition and Image
Analysis‖, Prentice Hall of India, Pvt Ltd, New Delhi.
Web Resources
1. https://www.geeksforgeeks.org/pattern-recognition-introduction/
2. https://www.mygreatlearning.com/blog/pattern-recognition-machine-learning/
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Inst. Hours
Category
Credits
External
Subject Code Subject Name L T P S
Total
CIA
Enterprise Resource Specific Y - - - 4 4 25
Planning Elective 75 100
Course Objectives
CO1 To understand the basic concepts, Evolution and Benefits of ERP.
CO2 To know the need and Role of ERP in logical and Physical Integration.
Identify the important business functions provided by typical business
CO3 software such as enterprise resource planning and customer relationship
managemen
To train the students to develop the basic understanding of how ERP enriches
CO4
the business organizations in achieving a multidimensional growth
To aim at preparing the students technological competitive and make them
CO5
ready to self-upgrade with the higher technical skills
No. of
UNIT Details
Hours
ERP Introduction, Benefits, Origin, Evolution and Structure:
Conceptual Model of ERP, the Evolution of ERP, the Structure of
I 6
ERP, Components and needs of ERP, ERP Vendors; Benefits &
Limitations of ERP Packages.
Need to focus on Enterprise Integration/ERP; Information mapping;
Role of common shared Enterprise database; System Integration,
II Logical vs. Physical System Integration, Benefits & limitations of 6
System Integration, ERP‘s Role in Logical and Physical Integration.
Business Process Reengineering, Data ware Housing, Data Mining,
Online Analytic Processing (OLAP), Product Life Cycle Man-
agement (PLM), LAP, Supply chain Management.
ERP Marketplace and Marketplace Dynamics: Market Overview,
Marketplace Dynamics, the Changing ERP Market. ERP- Functional
Modules: Introduction, Functional Modules of ERP Software,
III 6
Integration of ERP, Supply chain and Customer Relationship
Applications. Cloud and Open Source, Management, Material
Management, Financial Module, CRM and Case Study.
ERP Implementation Basics, , ERP implementation Strategy, ERP
Implementation Life Cycle ,Pre- Implementation task,Role of
IV 6
SDLC/SSAD, Object Oriented Architecture, Consultants, Vendors
and Employees.
ERP & E-Commerce, Future Directives- in ERP, ERP and Internet,
Critical success and failure factors, Integrating ERP into or-
V 6
ganizational culture. Using ERP tool: either SAP or ORACLE
format to case study.
Total 30
Course Outcomes
Course
On completion of this course, students will;
Outcomes
CO1 Understand the basic concepts of ERP.
CO2 Identify different technologies used in ERP
Understand and apply the concepts of ERP Manufacturing Perspective and ERP
CO3
Modules
CO4 Discuss the benefits of ERP
CO5 Apply different tools used in ERP
Reference Text :
1. Enterprise Resource Planning – Alexis Leon, Tata McGraw Hill.
References :
1. Enterprise Resource Planning – Diversified by Alexis Leon, TMH.
2. Enterprise Resource Planning – Ravi Shankar & S. Jaiswal , Galgotia
Web Resources
1. https://www.tutorialspoint.com/management_concepts/enterprise_resour
1.
ce_planning.htm
1. https://www.saponlinetutorials.com/what-is-erp-systems-enterprise-
2.
resource-planning/
3. 1. https://www.guru99.com/erp-full-form.html
4. 2. https://www.oracle.com/in/erp/what-is-erp/
Inst. Hours
Category
t Code
Credits
External
Total
CIA
Robotics and Its Applications Specific Y - - - 2 2 25 75 100
Elective
Course Objective
C1 To understand the robotics fundamentals
C2 Understand the sensors and matrix methods
C3 Understand the Localization: Self-localizations and mapping
C4 To study about the concept of Path Planning, Vision system
C5 To learn about the concept of robot artificial intelligence
UNIT Details No. of Course
Hours Objective
I Introduction: Introduction, brief history, components of robotics,
classification, workspace, work-envelop, motion of robotic arm, end-
6 CO1
effectors and its types, service robot and its application, Artificial
Intelligence in Robotics.
Total
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
1 Describe the different physical forms of robot architectures. PO1
2 Kinematically model simple manipulator and mobile robots. PO1, PO2
3 Mathematically describe a kinematic robot system PO4, PO6
4 Analyze manipulation and navigation problems using knowledge of
PO4, PO5, PO6
coordinate frames, kinematics, optimization, control, and uncertainty.
5 Program robotics algorithms related to kinematics, control, optimization,
PO3, PO8
and uncertainty.
Text Book
1 RicharedD.Klafter. Thomas Achmielewski and MickaelNegin, Robotic Engineering and
Integrated Approach, Prentice Hall India-Newdelhi-2001
2 SaeedB.Nikku, Introduction to robotics, analysis, control and applications, Wiley-India, 2 nd
edition 2011
Reference Books
1. Industrial robotic technology-programming and application by M.P.Groover et.al,
McGrawhill2008
2. Robotics technology and flexible automation by S.R.Deb, THH-2009
Web Resources
1. https://www.tutorialspoint.com/artificial_intelligence/artificial_intelligence_robotics.htm
2. https://www.geeksforgeeks.org/robotics-introduction/
Inst. Hours
Category
Credits
External
Subject Code Subject Name L T P S
Total
CIA
Simulation and Modeling Specific Y - - - 4 4 25
75 100
Elective
Course Objectives
Generates computer simulation technologies and techniques, lays the groundwork
for students to comprehend computer simulation requirements, and implements
CO1 and tests a variety of simulation and data analysis libraries and programmes. This
course focuses on what is required to create simulation software environments
rather than just simulations using pre-existing packages
Discuss the concepts of modelling layers of critical infrastructure networks in
CO2
society.
CO3 Create tools for viewing and controlling simulations and their results.
CO4 Understand the concept of Entity modelling, Path planning
CO5 To learn about the Algorithms and Modelling.
Course
UNIT Details No. of Hours
Objectives
Introduction To Modeling & Simulation – What is
Modeling and Simulation? – Complexity Types –
Model Types – Simulation Types – M&S Terms and
Definitions Input Data Analysis – Simulation Input
I 6 CO1
Modeling – Input Data Collection - Data Collection
Problems - – Input Modeling Strategy - Histograms
-Probability Distributions - Selecting a Probability
Distribution.
Total 30
Course Outcomes
Course
On completion of this course, students will; Programme Outcomes
Outcomes
Credits
External
Subject Code Subject Name L T P O
Total
CIA
Specific
Organizational Behaviour Y - - - 2 2 25 75 100
Elective
Learning Objectives
LO1 To have extensive knowledge onOB and the scope of OB.
LO2 To create awareness of Individual Benaviour.
LO3 To enhance the understanding of Group Behaviour
LO4 To know the basics of Organisaitonal Culture and Organisational Structure
LO5 To understand Organisational Change, Conflict and Power
UNIT Details No. of Hours
INTRODUCTION : Concept of Organizational Behavior (OB):
I 6
Nature, Scope and Role of OB: Disciplines that contribute to OB;
Opportunities for OB (Globalization, Indian workforce diversity,
customer service, innovation and change, networked
organizations, work-life balance, people skills, positive work
environment, ethics)
INDIVIDUAL BEHAVIOUR:
1. Learning, attitude and Job satisfaction: Concept of learning,
conditioning, shaping and reinforcement. Concept of attitude,
components, behavior and attitude. Job satisfaction: causation;
impact of satisfied employees on workplace.
2. Motivation : Concept; Theories (Hierarchy of needs, X and Y,
Two factor, McClelland, Goal setting, Self-efficacy, Equity
II 6
theory); Job characteristics model; Redesigning jobs,
3. Personality and Values : Concept of personality; Myers-Briggs
Type Indicator (MBTI); Big Five model. Relevance of values;
Linking personality and values to the workplace (person-job fit,
person-organization fit)
4. Perception, Decision Making : Perception and Judgements;
Factors; Linking perception to individual decision making:
GROUP BEHAVIOUR : 1. Groups and Work Teams : Concept :
Five Stage model of group development; Group norms,
cohesiveness ; Group think and shift ; Teams; types of teams;
III Creating team players from individuals and team based 6
work(TBW) 2. Leadership : Concept; Trait theories; Behavioral
theories (Ohio and Michigan studies); Contingency theories
(Fiedler, Hersey and Blanchard, Path-Goal);
ORGANISATIONAL CULTURE AND STRUCTURE :
Concept of culture; Impact (functions and liability); Creating and
IV 6
sustaining culture: Concept of structure, Prevalent organizational
designs: New design options
ORGANISATIONAL CHANGE, CONFLICT AND POWER:
Forces of change; Planned change; Resistance; Approaches
V (Lewin's model, Organisational development);. Concept of 6
conflict, Conflict process; Types, Functional/ Dysfunctional.
Introduction to power and politics.
30
Course
On Completion of the course the students will
Outcomes
CO1 To define OrganisationalBehaviour, Understand the opportunity through OB.
To apply self-awareness, motivation, leadership and learning theories at
CO2
workplace.
CO3 To analyze the complexities and solutions of group behaviour.
CO4 To impact and bring positive change in the culture of the organisaiton.
CO5 To create a congenial climate in the organization.
Reading List
NeharikaVohra Stephen P. Robbins, Timothy A. Judge , Organizational
1.
Behaviour, Pearson Education, 18th Edition, 2022.
2. Fred Luthans, Organizational Behaviour, Tata McGraw Hill, 2017.
Ray French, Charlotte Rayner, Gary Rees & Sally Rumbles, Organizational
3.
Behaviour, John Wiley & Sons, 2011
Louis Bevoc, Allison Shearsett, Rachael Collinson, Organizational Behaviour
4.
Reference, Nutri Niche System LLC (28 April 2017)
Dr. Christopher P. Neck, Jeffery D. Houghton and Emma L. Murray,
5. Organizational Behaviour: A Skill-Building Approach, SAGE Publications, Inc;
2nd edition (29 November 2018).
References Books
Uma Sekaran, Organizational Behaviour Text & cases, 2nd edition, Tata McGraw
1.
Hill Publishing CO. Ltd
GangadharRao, Narayana, V.S.P Rao, Organizational Behaviour 1987, Reprint
2.
2000, Konark Publishers Pvt. Ltd, 1st edition
3. S.S. Khanka, Organizational Behaviour, S. Chand & Co, New Delhi.
4. J. Jayasankar, Organizational Behaviour, Margham Publications, Chennai, 2017.
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S