0% found this document useful (0 votes)
30 views130 pages

Couse Book CSE

The document outlines the curriculum for a B. Tech. in Computer Science and Engineering, detailing courses such as Data Structures and Algorithms, Computer Architecture and Organization, Formal Languages and Automata, and Object-Oriented Programming. Each course includes objectives, outcomes, teaching schemes, evaluation schemes, and course contents with specific topics and hours allocated. The curriculum emphasizes practical skills and theoretical knowledge essential for careers in computer science.

Uploaded by

Yog
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views130 pages

Couse Book CSE

The document outlines the curriculum for a B. Tech. in Computer Science and Engineering, detailing courses such as Data Structures and Algorithms, Computer Architecture and Organization, Formal Languages and Automata, and Object-Oriented Programming. Each course includes objectives, outcomes, teaching schemes, evaluation schemes, and course contents with specific topics and hours allocated. The curriculum emphasizes practical skills and theoretical knowledge essential for careers in computer science.

Uploaded by

Yog
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 130

Curriculum for B. Tech.

in Computer Science and Engineering

Page|1
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Data Structure and Algorithms


Teaching Scheme Evaluation Scheme
Semester III
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course
C
Category
3 2 4 10 15 50 25 25
UCSL201
Course Code
UCSP201
Teaching Mode Online 75 50
Duration of 5 Total
125
ESE

This course introduces basic idea of data structure while making aware of
methods and structure used to organize large amount of data.
Course
Objectives It‟s also aimed at developing skill to implement methods to solve specific
problems using basic data structures.

The course also provides career opportunities in design of data, implementation


of data, technique to sort and searching the data.

CO1: Illustrate various technique to for searching, Sorting and hashing

CO2: Explain the significance of dynamic memory management Techniques


Course
Outcomes CO3: Design and analyze different linear data structure techniques to solve real
world problem.

CO4: Implement non-linear data structure to find solution for given


Engineering applications.

CO5: Summarize different categories of data Structures

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outcome PO PO PO PO PO PO PO PO PO PO1 PO1 PO1 PSO PSO
s 1 2 3 4 5 6 7 8 9 0 1 2 1 2
CO1 3 2 3 1
CO2 2 3 3 2
CO3 3 3 3 2 1
CO4 3 3 3 3 2
CO5 3 3 2 3 1

Page|2
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:

Unit Contents Hours


Introduction –Algorithms, Common operations on data structures, Types of
data structures, Data structures & Programming, Program Design,
Complexities, Time Complexity, Step count Method, order of Growth,
I Asymptotic Notation. 9
Sorting and Searching
Introduction, Sorting, Insertion Sort, Selection Sort, Merging, Merge-Sort,
Shell Sort, Radix Sort, Searching and Data Modification, Hashing
Arrays: Introduction, Linear Arrays, Arrays as ADT, Representation of
Linear array in Memory, Traversing Linear Arrays, Inserting and deleting,
Sorting; Bubble Sort, Searching; Linear Search, Binary Search, : Linked List
Introduction: Linked Lists, Representation of Linked Lists in Memory,
II 9
Traversing a Linked List, Searching a Linked List, Memory Allocation;
Garbage Collection, Insertion into a Linked List, Deletion from a Linked
List, Header Linked List, Circularly Linked Lists, Two-Way Lists (or
Doubly Linked Lists).
Stacks, Queue and Recursion- Introduction, Stacks ,Array Representation of
Stacks ,Linked Representation of Stacks, Stack as ADT, Arithmetic
Expression; Polish Notation, Application of Stacks, Recursion, Towers of
III 9
Hanoi, Implementation of Recursive Procedures by Stacks, Queue, Linked
Representation of Queues, Queues as ADT, Circular Queues, Deques,
Priority Queues, Applications of Queues
.Trees and Binary Trees -Binary Trees • Representation, Operations: Insert,
Delete, Traversal: Preorder, In-order, Post-order, Traversal Algorithms
Using Stacks, Header Nodes; Threads, Threaded Binary Trees, Binary
Search Trees ,Searching and Inserting in Binary Search Trees, Deleting in a
IV 10
Binary Search Tree, Balanced Binary Trees, AVL Search Trees, Insertion in
an AVL Search Tree, Deletion in an AVL Search Tree, m-way Search Trees
,Searching, Insertion and Deletion in an m-way Search tree, B-Trees
,Searching, Insertion and Deletion in a B-tree,B+-Trees Graph Algorithms
Graphs and their Applications -) Introduction, Graph Theory Terminology,
Sequential Representation of Graphs, Adjacency Matrix; Path Matrix,
V 8
Linked Representation of a Graph, Operations on Graphs, Traversing a
Graph, Posets; Topological Sorting, Spanning Trees

AVAho, J Hopcroft, JD Ullman, Data Structures and Algorithms, Addison-


1.
Wesley, 1983.
Text THCormen, CF Leiserson, RL Rivest, C Stein, Introduction to Algorithms,
2.
Books 3rd Ed., MIT Press, 2009.
Sahni, S., “Data Structures, Algorithms, and Applications in C++”,
3.
WCB/McGraw-Hill.
E Books 1. https://apps2.mdp.ac.id/perpustakaan/ebook/Karya%20Umum/Dsa.pdf
Reference Data Structures & Algorithms, 1e, Alfred V.Aho, Jeffery D. Ullman ,
1.
Books Person.
Page|3
Curriculum for B. Tech. in Computer Science and Engineering

MT Goodrich, R Tamassia, DM Mount, Data Structures and Algorithms in


2.
Java, 5th Ed., Wiley, 2010. (Equivalent book in C also exists.)
3. Wirth, N., “Algorithms and Data Structures”, Prentice-Hall of India.
On-line 1. https://nptel.ac.in/courses/106/102/106102064/
TL 2. http://cse01-iiith.vlabs.ac.in/
Material 3. https://ds2-iiith.vlabs.ac.in/data-structures-2/

Course Title: Computer Architecture and Organization


Semester III Course Title: Computer Architecture and Organization
Teaching Scheme Evaluation Scheme
Term Odd
Theory Practical
Course
C7 Th Tu Pr Credits TAE CAE ESE Int Ext
Category
Course
UCSL202
Code
Hrs. Hrs. Hrs. 3 10 15 50
Teaching
Offline
Mode

To understand the design principles of digital computing systems


To provide essential understanding of different subsystems of modern
Course
computer system and design aspects these subsystems3
Objectives
To provide overview on performance enhancement methods in instruction
Execution
CO1: To describe the basic components and design of a computer system
CO2: To examine the issues involved in the instruction execution and various
Course stages of instruction life stage
Outcomes CO3: To apply the concept of various memories and interfacing technologies
CO4: To analyze the different parallel processing technique
CO5: To design different high performance computing architecture

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outcomes
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO1 3 3

CO2 3 2

CO3 3 2

CO4 3 3

CO5 3 3

Course Contents:

Unit Contents Hours


Basic functional blocks of a computer: CPU, memory, input-output
I subsystems, control unit. Instruction set architecture of a CPU –registers, 8
instruction execution cycle, RTL interpretation of instructions, addressing
Page|4
Curriculum for B. Tech. in Computer Science and Engineering

modes, instruction set, Instruction set architecture CISC, RISC, Case study
–instruction sets of common CPUs
Fixed point Addition, Subtraction, Multiplication and Division. Floating
Point arithmetic, High performance arithmetic, Booth‟s algorithm, integer
division
II  Data representation method 8
 Booths multiplication, division algorithm and example
 IEEE standard single and double precision format and examples

Memory hierarchy, Memory Chip Organization, Cache memory, Virtual


memory. Parallel Bus Architectures, Internal Communication
III Methodologies, Serial Bus Architectures, Mass storage, Input and Output 8
Devices, Segmentation, TLB, Page replacement algorithms

Pipelining: Basic concepts of pipelining, Arithmetic and Instruction


Pipeline, throughput and speedup, pipeline hazards, Introduction, Logic
Design Conventions, Building a Datapath – A Simple Implementation
IV 8
scheme – An Overview of Pipelining – Pipelined Datapath and Control.
Data Hazards: Forwarding versus Stalling, Control Hazards, Exceptions,
Parallelism via Instructions.
CPU control unit design: hardwired and micro-programmed design
V approaches, Case study - design of a simple hypothetical CPU. 8
Multicore processors architecture, Advanced topics & its Application.

1. Computer Organization and Architecture by Carl Hamacher 4th Edition


Advance computer Architecture by Kai Hwang under Tata McGraw Hill
Text 2.
Publications
Books
Introduction to Parallel Processing: Algorithms & Architectures, Behrooz
3.
Parhami in Springer Shop
Computer Architecture and Organization by William Stalling
EBook http://home.ustc.edu.cn/~leedsong/reference_books_tools/Computer%20Org
1.
s anization%20and%20Architecture%2010th%20-
%20William%20Stallings.pdf
Introduction to Parallel Processing by P. Ravi Prakash, M. Sasikumar,
1.
Dinesh Shikhare By PHI Publications
Refere Fundamentals of Parallel Processing by Jordan Harry, Alaghband Gita, PHI
2.
nce Publication
Books Parallel Computers – Architecture and Programming by V. Rajaraman And
3
C. Siva Ram Murthy.
4. Introduction to Parallel Programming by Steven Brawer
On-
line
TL 1. NPTL https://nptel.ac.in/courses/106/105/106105163/
Materi
al

Page|5
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Formal Languages and Automata


Semester III
Teaching Scheme Evaluation Scheme
Term Odd
Theory Practical
Course
C13 Th Tu Pr Credits TAE CAE ESE Int Ext
Category
Course UCSL20
Code 3
3Hrs. . - 3 10 15 50
Teaching
Offline
Mode

To provide introduction to some of the central ideas of theoretical computer science


from the perspective of formal languages.
To introduce the fundamental concepts of formal languages, grammars and
Course automata theory.
Objectives Classify machines by their power to recognize languages and use finite state
machines to solve problems in computing.
To understand deterministic and non-deterministic machines.
Use of Turing Machine and Pushdown Automata in Formal Language.
Understand the abstract machines and their power to recognize the valid
CO1
Languages.
Course CO2 Modeling of finite state machines for solving computing problems.
Outcomes CO3 Design context free grammars for formal languages.
CO4 Apply Formal language to solve problems based on push down automata.
CO5 Solve problems based on linear bounded automata and Turing
Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outcomes PO PO PO PO PO PO PO PO PO9 PO10 PO11 PO12 PSO PSO PSO3
1 2 3 4 5 6 7 8 1 2
CO1 3 3
CO2 3 2
CO3 3 2
CO4 3 3
CO5 3 3

Course Contents:

Unit Contents Hou


rs
Introduction- Basic Mathematical Notation and techniques- Finite State
systems – Basic Definitions – Finite Automaton – DFA & NDFA – Finite
I Automaton with €- moves – Regular Languages- Regular Expression – 08
Equivalence of NFA and DFA – Equivalence of NDFA‟s with
and without €-moves – Equivalence of finite Automaton.

Page|6
Curriculum for B. Tech. in Computer Science and Engineering

Regular Expressions- Finite Automata and Regular Expressions, Applications


of Regular Expressions, Algebraic Laws for Regular Expressions, Properties
II of Regular Languages Pumping Lemma for Regular Languages, Applications 08
of the Pumping Lemma, Closure Properties of Regular Languages, Decision
Properties of Regular
Languages.
Context-Free Grammars: Chomsky hierarchy of languages. Definition of
Context-Free Grammars, Derivations Using a Grammar, Leftmost and
III Rightmost Derivations, the Language of a Grammar, Sentential Forms, Parse 08
Tress, Applications of Context-Free Grammars,
Ambiguity in Grammars and Languages.
Push Down Automata- Definition of the Pushdown Automaton, the
IV Languages of a PDA, Equivalence of PDA„s and CFG„s, Deterministic 08
Pushdown Automata.
Definitions of Turing machines – Models – Computable languages and
V functions – 08
Techniques for Turing machine construction – Multi
head and Multi tape Turing Machines – The Halting problem.
Recursively enumerable (r.e.) set, recursive sets, Decidability and solvability,
Post correspondence Problem (PCP), Introduction to recursive function
theory, primitive recursive functions, Ackerman function

Introduction to Automata Theory, Languages, and Computation,


1 3nd Edition, John E. Hopcroft, Rajeev Motwani, Jeffrey D. Ullman, Pearson
Text
Education.
Books
2 Introduction to Languages and The Theory of Computation, John C Martin,
TMH.

.
1 Introduction to Computer Theory, Daniel I.A. Cohen, John Wiley.
Reference 2 A Text book on Automata Theory, P. K. Srimani, Nasir S. F. B, Cambridge
Books University Press.
3 Introduction to Formal languages Automata Theory and
Computation Kamala Krithivasan, Rama R, Pearson.

Course Title: Object Oriented programming


Teaching Scheme Evaluation Scheme
Semester III
Theory Practical
Term ODD T Tu Pr Credits TAE CAE ESE INT EXT
h
Course
PC
Category
3 - 2 4 10 15 50 25 25
Course UCSL207
Code UCSP207
Teaching Offline
75 50
Mode
5 TOTAL
Duration
125
of ESE
Page|7
Curriculum for B. Tech. in Computer Science and Engineering

1. This course introduces student‟s general idea and concepts of object oriented
programming.
Course
2. It is also aimed at developing skills to implement these concepts.
Objectives
3. The course provide carrier opportunities in design of some applications as
object oriented concepts plays dominant role in software development
Up on successful completion of this course, student will be able to:
CO1: Articulate the principles of object oriented programming using C++
CO2: Apply function overloading, constructor overloading, operator
Course overloading & its uses in programming
Outcomes CO3: Implement inheritance and polymorphis concepts and its use for
application development
CO4: Implement static and dynamic memory allocation for software
Development
CO5: Develop generic programming applications using templates

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outcomes
PO PO PO PO PO PO PO PO PO9 PO10 PO11 PO12 PSO PSO PSO3
1 2 3 4 5 6 7 8 1 2
CO1 3 2
CO2 3 3
CO3 2 2 3
CO4 2 2
CO5 2 2

Course Contents:

Unit Contents Hours


Principles Of Object Oriented Programming:
Differences between C and C++.A look at procedure Oriented
programming, object oriented programming paradigm, basic concepts of
OOP, Benefits of OOP, OO languages, A sample program, structure of C++
I program. Introduction to OOPS :The origins of C++, What is Object 8
Oriented Programming?, Some C++ fundamentals, Headers & Name
Spaces, Introducing C++ Classes, Function overloading, Operator
overloading, Inheritance, Constructors & Destructors, Function & Operator
Overloading:
Overloading
constructor functions, Localizing variables, Function overloading &
II Ambiguity, Finding the address of an overloaded function, this Pointer, 8
Operator overloading, References, Using reference to overload a unary
operator, Overloading [], overloading ( ), Applying operator overloading.

Page|8
Curriculum for B. Tech. in Computer Science and Engineering

Inheritance, Virtual Functions and polymorphism


Inheritance and the access specifies, Constructors and Destructors in
derived classes, Multiple Inheritance, Passing parameters to a basic class,
III 8
Pointers and references to derived types, Virtual Functions, Why virtual
functions?, Pure virtual functions and abstract types, Early Vs Late binding.

Static & Dynamic allocation


Static & Dynamic allocation using new and delete, static class members,
Virtual base classes, const member functions and mutable, volatile member
IV functions, Using the asm keyword, linkage specification, The .* and ->* 8
operators, Creating conversion functions, Copy constructors, Granting
access, namespaces, Explicit constructors, typename and export.

Templates & Exception Handling


Class templates, class templates with multiple parameters, function
templates, function templates with multiple parameters,
Exception Handling, fundamentals, options the uncaught exception ( ),
V 8
Applying exception Handling, and RTTI, casting operators, Recent trends
in Object Oriented Programming in C++ , Advanced topics & its
Application

Object Oriented Programming in C++ -Robert Lafore, edition, Galgotia


Text 1.
Publications
Books
2. The Complete Reference C++, Herbert Schildt, 4th Edition, TMH
C++ And Object-Oriented Programming Paradigm, Jana, Debasish
E Books 1.

1. Let‟s C++ by Y. Kanetkar, BPB publications


Reference
Object oriented programming with C++, E Balagurusamy, 4th edition,
Books 2
TMH

Sr. No. Name of Experiments / Mini Projects/ Case Studies


1 Write a program to compute the area of triangle and circle by overloading the area()
function.
2 Define a class to represent a bank account. Include the following members :
Data members:- Name of depositor, Account number, Type of account, Balance
amount in the account
Member functions:- To assign initial values, To deposit an amount, To withdraw
an amount after checking the balance, To display name & balance
Write a main program to test program using class and object.
3 Create two classes DM and DB which stores values of distances. DM stores
distances in meters and centimeters and DB in feet and inches. Write a program
that can read values for the class objects and add one object of DM with another
object of DB. Use a friend function to carry out addition operation
4 Create a class MAT of size m * n. Define all possible matrix operations for MAT
type objects
5 Create Stud class to display student information using constructor and destructor.
(Default constructor, Multiple constructor, Copy constructor, Overloaded
constructor)
Page|9
Curriculum for B. Tech. in Computer Science and Engineering

6 Consider class network of given figure. The class master derives information from
both account and admin classes which in turn derive information from the class
person. Define all the four classes and write a program to create, update and display
the information contained in master objects.
7 A book shop sells both books and video tapes. Create a class media that stores the
title and price of the publication. Create two derived classes, one for storing
number of pages in the book and another for storing playing time of tape. A
function display() must be defined in all classes to display class contents. Write a
program using polymorphism and virtual function.
8 Write a program to show use of this pointer, new and delete.

9 Write a function template for finding the minimum value contained in an array

10 Write a program containing a possible exception. Use a try block to throw it and
catch block to handle it properly.
Open Ended Experiments / New Experiments
1 Write a class template to represent a generic vector. Include member functions to
perform following tasks
-To create a vector
-To modify the value of given element
-To multiply by scalar value.
-To display vector.
2 Write a C++ program to design a simple calculator

Course Title: Python for Data Science


Semester III Teaching Scheme Evaluation Scheme
Term III Theory Practical
Course A6-A7-
Th Tu Pr Credits TAE CAE ESE Int Ext
Category A8
Course
UCSP204
Code
6 3 50 -
Teaching
Online
Mode

To get comfortable with the main elements of Python programming with basic
statistics analysis
Course
Objectives Aim to import, clean, enrich, transform, visualize and output the analysis of a large
dataset
Reshape and merge data to prepare for advanced analytics
CO1: Describe the concepts to write, test and debug Python 3 code with
Confidence
CO2: Discuss on including working with Containers, Conditionals & Loops,
Course Functions & Modules and Error Handling.
Outcomes CO3: Identify the fundamentals of some of the most widely used Python
Packages; including NumPy, Pandas and Matplotlib
CO4: Apply these concepts to Data Analysis and Data Visualization projects.
CO5: Build and code a Graphical User Interface (GUI) to run a program.

P a g e | 10
Curriculum for B. Tech. in Computer Science and Engineering

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:
Course PO PO PO PO PO PO PO PO PO9 PO10 PO11 PO12 PSO PSO 2
Outcomes 1 2 3 4 5 6 7 8 1
CO1 2 3 2 2 2
CO2 3 2 3 2 3
CO3 3 3 3 3 3
CO4 2 2 2 3 2
CO5 2 2 2 2 2

Course Contents:

Unit Contents Hours


Introduction: Data Science and Business Buzzwords, Difference between
I Analysis and Analytics, Data Science Info graphic, Tools in Data Science, 3
Applications
Basics Of Python Spyder (Tool): Introduction Spyder, Setting working
Directory, Creating and saving a script file, File execution, clearing console,
II removing variables from environment, clearing environment, Commenting 3
script files, Variable creation, Arithmetic and logical operators, Data types
and associated operations
Data Structures: Lists, Tuples, Dictionary, Sets, Numpy, Array, Matrix and
associated operations, Linear algebra and related operations
III 3
Control Structures: Control structures using Toyota Corolla dataset, if-else,
for loop, for loop with if break, while loop
Pandas Dataframe: Pandas dataframe and dataframe related operations,
Reading files, exploratory data analysis, Data preparation and preprocessing
IV Data Visualization: Data visualization on Toyoto Corolla dataset using 3
matplotlib and seaborn libraries Scatter plot, Line plot, Bar plot, Histogram,
Box plot, Pair plot
Regression: Predictive Modeling, Linear Regression, Model Assessment,
Diagnostic to implement linear fit model
Classification: Cross validation, Classification, Logistic regression,
V Performance measure 3
Clustering: KNN, K-means clustering
Multiple Regression: Multiple Regression, Decision Tree
Case Studies

Practical Data Science with Python 3, Varga, Ervin, ISBN 978-1-4842-


1.
Text 4859-1, Publisher- Apress
Books Python for Data Science For Dummies 2nd Edition by John Paul Mueller,
2.
Luca Massaron, Wiley, ISBN 9781119547624
Python Data Science Handbook, ISBN-13: 978-1491912058 , Publisher-
1.
Reference O‟Reilly Media
Books Python Data Science Essentials, By Boschetti Alberto, ISBN:
2.
9781785280429, 9781785280429, Publisher: Packt Publishing Limited
On-line The Data Science Course 2020: Complete Data Science Bootcamp
TL 1. https://www.udemy.com/course/the-data-science-course-complete-data-
Material science-bootcamp/

P a g e | 11
Curriculum for B. Tech. in Computer Science and Engineering

Sr. No. Name of Experiments


1 Apply for Input Output functions and operators in Python
2 Perform and implement various control structures in Python
3 Create and Perform various operations data types in Python
4 Apply the dataframes in python for data reading, preparation and preprocessing
5 Perform various visualization using matplotlib and seaborn
6 Perform the analysis of various dataset and plot histogram on it
7 Study and Implement regression for predictive modelling and linear regression
8 Study and Implement various classification models on data sets
9 Study and Implement various clustering models on data sets
10 Study and Implement multiple regression models on data sets
11 Given a case study: Perform Interactive Data analysis with SciPy

P a g e | 12
Curriculum for B. Tech. in Computer Science and Engineering

P a g e | 13
Curriculum for B. Tech. in Computer Science and Engineering

Semester IV

Course Title: Computer Networks


Evaluation Scheme
Semester 4 Teaching Scheme
Theory Practical
Term 4 Th Tu Pr Credits TAE CAE ESE INT EXT
Course
C
Category
3 2 4 10 15 50 25
Course UCSL208
Code UCSP208
Teaching
Offline 75 25
Mode
Duration 5 Hrs Total
of 3 Hrs 100
ESE

To understand the computer network architectures.


Course To make aware of design and performance perspective of network
Objectives architectures.
To discuss current trends in communication
Up on successful completion of this course, student will be able to:
CO1: Analyze the need for OSI reference model in computer networking
CO2: Studying the various transmission medium used in physical layer
Course CO3: Analyzing different Elementary protocols for communication and
Outcomes Identify IEEE standards employed in computer networking
CO4: Solve and apply various Routing Algorithm and Protocols
CO5: Use techniques involved in developing transport and application layer of
computer networking.

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Program Outcomes and Program Specific Outcomes


Course
Outcomes PO PO PO PO PO PO PO PO PO9 PO10 PO11 PO12 PSO PSO PSO3
1 2 3 4 5 6 7 8 1 2
CO1 3 3 1 2 2 1 2 2 1 1 3 2 2
CO2 2 2 3 2 1 3 1
CO3 2 1 1 3 2 2 3 3
CO4 3 3 3 3 3 3 2 2 2 3 2 3
CO5 3 2 3 3 3 1 2 2 3 2 3 2

P a g e | 14
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:

Unit Contents Hours


Unit-I: Introduction
The use of computer networks. Network hardware. LAN‟s, Man‟s, WAN‟s,
internet works, Network software, protocol hierarchies, design issues for
I layers, interfaces and services, Connectionless oriented and connectionless 8
services, service primitives, relationship of Services to protocols,
the OSI reference model, TCP/IP reference model, comparison of OSI And
TCP/IP reference model.
Unit-lI: Physical Layer
The theoretical basis for data communication-Fourier analysis, bandwidth-
limited signals, Maximum data rate of a channel, transmission media-
magnetic media, and twisted pair coaxial Cable, fiber optics. Wireless
II 8
transmission, microwave transmission. Multiplexing, switching, Narrow
and ISDN - services, architecture, interface, perspective on N-ISDN,
broadband ISDN & ATM-virtual circuits versus circuit switching,
transmission in ATM networks, ATM Switches.
Unit-Ill: Data Link Layer
Design issues - services provided to the network Layer, framing, error
control, flow control, Error correcting & detecting codes, elementary data
III link protocols, simplex stop and wait Simplex protocols for noisy channel, 8
sliding window protocols-one bit protocol, go back Protocol, selective
repeat protocol. The medium access sub layer - static and dynamic channel
Allocation in LANs and MANs, Multiple access protocols - ALOHA.
CSMA, collision free Protocols, limited contention protocols, IEEE 802.11
wireless LAN protocols, IEEE Standards 802 for LAN and MANs-802.3 &
Ethernet, token bus. Token ring,
Unit-IV: The Network Layer
Design issues, services provided to the transport layer, internal
organization, comparison of Virtual circuit and datagram subnets, routing
algorithms. Optimality principle, shortest path Routing, flooding, flow-
based routing, distance vector routing, link state routing, hierarchical
IV 8
Routing, broadcast & multicast routing, congestion control algorithms,
general principles Prevention policies, traffic shaping. flow specifications,
congestion control in virtual circuit Subnets. choke packets, load shedding,
jitter control. IP protocol, IP address. Subnets, internet Control protocols,
OSPF. BGP.
Unit V: Transport and Application Layer
Transport and Application Layer - services provided to the upper layer,
V Quality of Service, Transport service primitives, elements of transport 8
protocols, addressing, establishing a Connection, releasing a connection,
flow control & buffering, multiplexing, crash recovery,

1. Computer Networks, Andrew S. Tanenbaum, David J. Wetherall, Fifth


Edition, Pearson

P a g e | 15
Curriculum for B. Tech. in Computer Science and Engineering

2. Data Communication And Networking, Behrouz A. Forouzam, Fourth


Text Edition, McGraw Hill
Books An Engineering Approach to Computer Networks-S.Keshav, 2nd Edition,
3.
Pearson Education
1. Fayez Gebali, Analysis of Computer and Communication Networks, First
Edition, Springer
An Introduction to Computer Networks, Peter L Dordal, Department of
E Books
2. Computer Science, Loyola University Chicago(
http://intronetworks.cs.luc.edu/current/ComputerNetworks.pdf)
3. TCP/IP Network Administration, Craig Hunt
1. Jean Walrand , Pravin Varaiya, High-Performance Communication
Networks (The Morgan Kaufmann Series in Networking), Second Edition,
Morgan Kaufmann Publishers
Reference
2. V. S. Bagad, I. A. Dhotre, Computer Communication Networks, Third
Books
Edition, Technical Publications, Illustrated
3. Norman Abramson, Franklin F. Kuo, Computer-communication networks,
Fourth Edition, Prentice-Hall, 1973, Illustrated
On-line 1. Coursera – “Data communication Network Services” by Cisco
TL 2. NPTEL – “Data Communication” by IIT Kharagpur
Material 3. Swayam – “Computer Networks” by Anand More,

Course Title: Design & Analysis of Algorithm


Semester IV Teaching Scheme Evaluation Scheme
Term IV Theory Practical
Course
C 14 Th Tu Pr Credits TAE CAE ESE Int Ext
Category
Course UCSL205/
Code UCSP205 3 2
- 4 10 15 50 25 25
Teaching Online
Mode /Offline

This course introduces students the general idea of analysis and design of
algorithms while making them aware of basic methods of algorithm analysis
and design.
Course
It is also aimed at developing skills to solve real life applications which involve
Objectives
algorithm development
The course also provides career opportunities in analysis, design and
optimization technique in algorithms
CO1: Recall basic concepts of algorithm in analysis and Design of algorithms.
CO2: Examine Recurrence relations, solutions of recurrence of searching
sorting methods
Course
CO3: Apply Greedy methods used for analysis and Design of Algorithm
Outcomes
CO4: Analyse Dynamic Programming concepts in designing algorithm
CO5: Evaluate advanced techniques and tools available for algorithm analysis
and development

P a g e | 16
Curriculum for B. Tech. in Computer Science and Engineering

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course PO PO PO PO PO PO PO PO PO9 PO10 PO11 PO12 PSO PSO 2


Outcomes 1 2 3 4 5 6 7 8 1
CO1 3 2
CO2 3 1
CO3 3 2
CO4 3 2
CO5 3 2

Course Contents:

Unit Contents Hours


Unit – I: Mathematical foundations & Asymptotic notations
summation of arithmetic and geometric series, n, n2, , Complexity
calculation of various standard functions, Principles of designing
I 9
algorithms, ,Asymptotic notations of analysis of algorithms, analyzing
control structures, worst case and average case analysis, Iterative
Algorithm analysis. Amortized analysis, application of amortized
analysis.
Unit – II :Advanced data structures
Recurrence relations, solutions of recurrence relations using technique of
II characteristic equation and generating functions Divide and conquer basic 9
strategy, matrix operation, Strassens matrix multiplication , binary search,
quick sort, merge sort.
Unit – III :Greedy Method
Greedy method – basic strategy, application to job sequencing with
III 9
deadlines problem, minimum cost spanning trees, single source shortest
path etc.
Unit IV : Dynamic Programming
Dynamic Programming basic strategy, multistage graphs, all pairs shortest
IV 9
path, single source shortest paths, optimal binary search trees, traveling
salesman problems.
Unit V:Traversal And Search Techniques
Basic Traversal and Search Techniques, breadth first search and depth
V first search, Backtracking basic strategy, 8-Queen‟s problem, graph 9
coloring, Hamiltonian cycles etc
NP-hard and NP-complete problems, basic concepts, non-deterministic
algorithms, NP-hard and NP-complete, decision and optimization problems,
graph based problems on NP Principle & Advance Topic: (As per the
instructor)

Thomas H. Cormenet. al. “Introduction to Algorithms”, Prentice Hall of


1.
Text India.
Books Design & Analysis of Computer Algorithms by Aho,. Horowitz, Sahani,
2.
Rajsekharam, Pearson education
“Computer Algorithms”, Galgotia Publications Pvt. Ltd. Brassard, Bratley,
1.
Reference “Fundamentals of Algorithms”, Prentice Hall

P a g e | 17
Curriculum for B. Tech. in Computer Science and Engineering

Books Computer Algorithms: Introduction to Design and analysis, 3rd Edition, By


2.
Sara Baase& A. V. Gelder Pearson Education.
On-line NPTEL course on Design and Analysis of Algorithms:
TL 1. https://www.class-central.com/course/nptel-design-and-analysis-of-
Material algorithms-3984

Sr.
Title of Practical
No.
1. To Implement and analyze time complexity of Searching Algorithm.
2. To Implement and analyze time complexity of Sorting Algorithm.
To Implement and analyze time complexity of algorithm using Divide and Conquer
3.
Technique.
4. To Implement and analyze time complexity of Greedy Algorithm.
To Implement and analyze time complexity of Algorithm of Dynamic Programming
5.
Technique.
To implement and analyze time complexity of Minimum Cost spanning Tree
6.
Algorithm.
7. To implement and analyze time complexity of Single source shortest path Algorithm.
8. To implement and analyze time complexity of All pair shortest path Algorithm.
9. To implement and analyze time complexity of Graph Traversing Algorithm.
10. Open Source Practical

P a g e | 18
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Microcontroller and its applications


Teaching Scheme Evaluation Scheme
Semester IV
Theory Practical
Term IV Th Tu Pr Credits TAE CAE ESE INT EXT
Course
C
Category
UECL 3 - 2 4 10 15 50 25 -
Course
208
Code
UECP208
Teaching 5
Offline 75 25
Mode
Total
Duration of
3 100
ESE

1. To study and understand various microcontrollers and embedded systems


Course 2. To understand the design parameters of embedded systems applications.
Objectives 3. To study and impart different tools for embedded system and IoT application
design.
CO1 Demonstrate the principle of embedded systems and Microcontroller
CO2 Design the interfacing of devices and peripherals
Course CO3 Develop programming for applications develop real time applications
Outcomes CO4 Make Use of Arduino Controller for Designing of Embedded
Applications.
CO5 Design and Develop different embedded system and IoT applications.

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outcomes
PO PO PO PO PO PO PO PO PO9 PO10 PO11 PO12 PSO PSO PSO3
1 2 3 4 5 6 7 8 1 2
CO1 2 2 3 2 3 2 1 3 2 3
CO2 2 2 3 2 3 2 1 3 2 3
CO3 3 2 3 2 3 2 1 3 2 3
CO4 3 2 3 2 3 2 1 3 2 3
CO5 3 2 3 3 3 2 1 3 2 3

Course Contents:

Unit Contents Hours


Embedded Systems: Introduction to embedded Systems, Requirements
/Components of Embedded Systems, Design Process in Embedded System 9
I
Microcontrollers: Introduction to microcontrollers, 8051 architecture, data
types and directives, flag bits and PSW register, register bank and stack.
Assembly Language Programming: Jump, Loop and Call Instructions,
9
II I/O Port Programming, Addressing modes, Arithmetic, Logic instructions
and programs, data types and time delay. Interfacing to External Memory.
Programming: Timer/counter, Interrupts and serial communications, 9
III Serial I/O, Programming Tools
P a g e | 19
Curriculum for B. Tech. in Computer Science and Engineering

Interfacing with 8051: ADC and DAC interfaces for microcontrollers,


Real time interfacing with LED, Keypad, LCD display, Sensors interfacing
(LDR, IR, PIR, GSM, GPS, GPRS, Bluetooth.etc.)
Arduino Application:
IV Introduction to Arduino, serial communication and timer, control design 9
using arduino. Real time interfacing with LED, LCD & Sensors.
Embedded IoT Applications: Introduction to IoT, Design and perform
9
V different embedded system and IoT Applications: Robotic, Industrial
Automations& Health care.

Muhammad Ali Mazidi, the 8051 Micro-controller & Embedded System


1.
using assembly & C, Pearson Education,2008, Second
Text Muhammad Ali Mazidi, ARM Assembly language programming and
2
Books Architecture, Second
Raj Kamal, Microcontrollers: Architecture, Programming, Interfacing and
3
System Design, Pearson Education India, 2009, Second
Shibu K. V. Introduction to Embedded System, The McGraw Hill, 2011
1.
Ajay V. Deshmukh, Micro-controllers - Theory and Applications, Tata
Reference 2.
McGraw Hill,
Books
Kenneth J. Ayala, The 8051 Micro-controller – Architecture,
3. Programming & Applications, Penram International & Thomson Asia,
1996, Second

List of Experiments
Sr. Name of Experiments Mapped Course
No. Outcomes
1 Writ a program to perform Arithmatic operations using 8051 CO1
microcontroller
2 Writ a program to perform datatransfer between two memory CO2
blocks using 8051 microcontroller
3 Writ a program to find smallest number from memory blocks CO2
using 8051 microcontroller
4 Interface LED / 7Segment display with 8051 Microcontroller CO3
(Proteous based)
5 Interface different sensor like LDR, IR with 8051 CO4
Microcontroller (Proteous based)
6 Interface LCD display with Arduino (Hands on) CO6
7 Design and perform different embedded system and IoT CO5
Applications
8 Project Module-1 CO3, CO5, CO6
9 Project Module-2 CO3, CO5, CO6
10 Project Module-3 CO3, CO5, CO6

P a g e | 20
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: OPERATING SYSTEMS


Teaching Scheme Evaluation Scheme
Semester IV
Theory Practical
Term Even Th Tu Pr Credits TAE CAE ESE INT EXT
Course
C
Category
3 2 4 10 15 50 25
Course UCSL206
Code UCSP206
Teaching
Offline 75 25
Mode
5 Total
Duration
2Hrs 100
of ESE

Introduces general idea, structure and functions of operating system


Course Making students aware of basic mechanisms used to handle processes,
Objectives memory, storage devices and files.
Recent trends in the operating system
1. Identify basic structure and purpose of operating system.
2. Interpret the concepts of process and illustrate various CPU scheduling
algorithms.
Course
3. Interpret the concepts of inter process communication.
Outcomes
4. Schematize Deadlock & security mechanisms in operating systems.
5. Analyze different memory management techniques with advantages and
disadvantages.

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:
Course Program Outcomes and Program Specific Outcomes
Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO PSO PSO3
1 2
CO1
2 3 1
CO2
2 3 2
CO3 3 3 2
CO4 3 2 2
CO5
3 2 3

Course Contents:

Unit Contents Hours


Evolution of OS, Types of OS, Basic h/w support necessary for modern
I operating systems, services provided by OS, system programs and system 6
calls, system design and implementation, I/O systems.
Process & Its Scheduling Process concept, process control block, Types of
scheduler, context switch, threads, multithreading model, goals of
II 4
scheduling and different scheduling algorithms,

Process management and synchronization: Concurrency conditions, Critical


III 4
section problem, software and hardware solution, semaphores, conditional
P a g e | 21
Curriculum for B. Tech. in Computer Science and Engineering

critical regions and monitors, classical inter process communication


problems
Deadlock definitions, Prevention, Avoidance, detection and Recovery,
IV 8
Goals of Protection, access matrix, Deadlock implementation
Memory Management & File systems: Contiguous allocation, Relocation,
Paging, Segmentation, Segmentation with paging, demand paging, Virtual
Memory Concepts, page faults and instruction restart, page replacement
8
V algorithms, working sets, Locality of reference, Thrashing, Garbage
Collection. File concept, Access methods space allocation strategies, disk
arm scheduling strategies..

Operating System concepts – Silberchatz; Galvin, Addison Wesley, 6th


1.
Text Edn.
Books 2. Modern Operating Systems – Tanenbaum, Pearson Edn. 2 ndedn
3. Operating Systems: Internals and Design Principles William Stallings
1. Operating Systems – S R Sathe, Macmillan Publishers, India, 2008
Reference
2. Operating System –Milan Milenkovik, McGraw-Hill, 1987
Books
3. Operating Systems - 3 rd Edition by Gary Nutt, Pearson Education.
On-line
TL 1. https://nptel.ac.in/courses/106/108/106108101/
Material

P a g e | 22
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Introduction to Blockchain Technology


Evaluation Scheme
Semester IV Teaching Scheme
Theory Practical
Term EVEN Th Tu Pr Credits TAE CAE ESE INT EXT
Course
C
Category 2 - 2 10 15 50 -
Course
UCSL210
Code

The student should be made to:


1. Understand the technical aspects of crypto currencies and block chain technologies.
Course
2. Understand fundamental concepts of the cryptographic concepts
Objectives
3. Understand fundamental concepts of the cryptocurrencies.
4. Understand the concepts of cryptocurrency regulations.
At the end of the course, the student should be able to
Course CO1: Analyse the concept of bit coin and mathematical background behind it
Outcomes CO2: Apply the tools for understanding the background of crypto currencies
CO3: Evaluate security, privacy, and efficiency of a cryptocurrency.

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course P P P P P P P P P P P P PSO1 PSO2 PSO3


Outcome O O O O O O O O O9 O1 O1 O1
1 2 3 4 5 6 7 8 0 1 2

CO1 3 2 - 3 - - - - - - - 2 1 3 1
CO2 2 3 - 3 1 - - - - - - 3 1 3 2
CO3 3 - - 2 1 - - - - - - 2 1 3 1
CO4 2 3 - 2 1 - - - - - - 3 1 1 2
CO5 3 - - 2 - - - - - - - 2 1 1 3

Course Contents:
Hour
Unit Contents
S
Introduction: Bit coin - Wallet - Blocks - Merkley Tree - hardness of mining -
transaction verifiability - anonymity - forks - double spending - mathematical analysis
of properties of Bit coin. Bitcoin blockchain, the challenges, and solutions, proof of
I work, Proof of stake, alternatives to Bitcoin consensus, Bitcoin scripting language and 7
their uses.

CRYPTOGRAPHIC FUNDAMENTALS: Cryptographic basics for crypto currency


II - a short overview of Hashing, cryptographic algorithm – SHA 256,signature schemes,
8
encryption schemes and elliptic curve cryptography- Introduction to Hyperledger-
Hyperledger framework - Public and Private Ledgers.

P a g e | 23
Curriculum for B. Tech. in Computer Science and Engineering

Cryptocurrency:
History, Distributed Ledger, Bitcoin protocols - Mining strategy and rewards, Ethereum
III 7
- Construction, DAO, Smart Contract, GHOST, Vulnerability, Attacks, Sidechain,
Namecoin

Cryptocurrency Regulation:
Stakeholders, Roots of Bit coin, Legal Aspects-Crypto currency Exchange, Black
IV 8
Market and Global Economy.

Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller and Steven Goldfeder,
1. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction, Princeton
Text University Press (July 19, 2016).
Books
2. Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi
1. Antonopoulos, Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Reference
2. Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System
Books
3. DR. Gavin Wood, “ETHEREUM: A Secure Decentralized Transaction Ledger,”Yellow
On-line TL Paper 2014
Material 4 Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli, A survey of attacks on Ethereum
,smart contracts
Prof. Sandeep Shukla, IIT Kanpur
1. https://nptel.ac.in/courses/106/104/106104220/
On-line TL
Material Prof. Praveen Jayachandran, IIT Kharagpur
2. https://nptel.ac.in/courses/106/105/106105184/

P a g e | 24
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Data Analysis for Business Intelligence


Teaching Scheme Evaluation Scheme
Semester IV
Theory Practical
Term Even Th Tu Pr Credits TAE CAE ESE INT EXT
Course
OE
Category
2 - - 2 10 15 50 - -
Course Code UAIL211

To learn Data Collection & Pre-Processing.


Course
To learn the basic rudiments of business intelligence system
Objectives
Be exposed with different data analysis tools and techniques
Upon successful completion of this course, student will be able to:
C01: Understand Data Collection & Pre-Processing
C02: List & Define the fundamentals of business intelligence & interpret the data
Course
of business intelligence.
Outcomes
C03: Acquire the knowledge of exploratory Data Analysis.
C04: Understand Machine Learning for Business
C05: Analyze and design a real world problem using Data Visualization

Mapping of Course Outcomes with Program Outcomes:


Program Outcomes
Course
Outcomes PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 3 2 2
CO2 3 3 3 3
CO3 3 2 2
CO4 3 3 3 3
CO5 2 1 1

Course Contents:
Unit Contents Hours
Data Collection & Pre-Processing:
Understanding the Dataset, Python package for data science, Importing and
I Exporting Data in Python, Basic Insights from Datasets, Identify and Handle 5
Missing Values Data Formatting, Data Normalization Sets, Binning,
Indicator variables.

P a g e | 25
Curriculum for B. Tech. in Computer Science and Engineering

Introduction to Business Intelligence: evolution of BI, BI value


chain, introduction to business analytics, BI Definitions & Concepts,
II Business Applications of BI, BI Framework, Role of Data Warehousing 5
in BI, BI Infrastructure Components – BI Process, BI Technology, BI
Roles & Responsibilities.
Exploratory Data Analysis: Descriptive Statistics, Basic of Grouping,
III 5
Correlation.
Machine Learning for Business: Machine learning and data use cases,
IV 5
Machine learning types, Business requirements and model design.
Data Visualization: Loading Data in pandas, Plotting Data with matplotlib
Different Types of Plots.
Introduction to Tableau: Building and Customizing Visualizations
V 5
Analyzing Data in Tableau: Preparing for Analysis, Exploring
Visualizations
Mapping Analysis, Groups, Sets, and Parameters.

Text Efraim Turban, Ramesh Sharda, Dursun Delen, “Decision Support and
1.
Books Business Intelligence Systems”, 9th Edition, Pearson 2013.
Fundamentals of Business Analytics, R N Prasad and S Acharya, Wiley India,
1.
Reference 2011.
Books David Loshin Morgan, Kaufman, “Business Intelligence: The Savvy
2.
Manager‟s Guide”, Second Edition, 2012
1 https://courses.cognitiveclass.ai/courses/course-v1:CognitiveClass
https://nptel.ac.in/noc/courses/noc17/SEM2/noc17-
Online
mg24/#:~:text=Course%20abstract&text=This%20course%20seeks%20to%20
Material 2
present,%2C%20predictive%2C%20and%20prescriptive%20analytics.
https://nptel.ac.in/courses/110/106/110106072/

P a g e | 26
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Salesforce CRM


Teaching Scheme
Semester IV Evaluation Scheme

Term EVEN Theory Practical


Course
Open Elective-1 Th Tu Pr Credits TAE CAE ESE Int Ext
Category
Course UCYL207
2 - - 2 10 15 25 - -
Code

To study basics of cloud computing using force.com platform.


To learn various aspects of sales force, like development, administration, Apex coding and reporting
Course etc.
Objectives To give students opportunities to build their carrier in cloud computing using salesforce cloud
development platform.
Up on successful completion of this course, student will be able to:
CO1:Understand fundamental concepts and technologies of cloud computing using Salesforce

Course CO2:Apply Salesforce development skills to develop custom application on salesforce cloud
Outcomes CO3:To handle responsibility of Salesforce Administrator
CO4:To develop cloud application using visual force
CO5:To implement custom business logic in Salesforce application using Apex.

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course PO PO PO PO PO PO PO PO PO PO PO PO PSO 1 PSO 2


Outcome 1 2 3 4 5 6 7 8 9 10 11 12
CO1 3
CO2 3
CO3 3
CO4 3
CO5 2

Course Contents:
Unit Contents Hours
Introduction : Basics of Cloud computing using Salesforce, Salesforce - Home, Overview,
I Environment - Sales Cloud, Architecture, Service Cloud, Navigating Setup, Standard and Custom 5
Objects, Master Detail , Schema Builder, Lookup Relationship
Organization and User Setup, Security and Access: Control Access Org, Control Access Objects,
II 5
Control Access Fields, Control Access Records, Create a Role Hierarchy, Define Sharing Rules.
Business logic & Process Automation: Describe the function and use case of: Record type, Formula
III 5
fields, Of roll-up summary fields, Validation rules, Approval process, Workflow, visual workflow and

P a g e | 27
Curriculum for B. Tech. in Computer Science and Engineering

Lightning process builder: Working with Chatter, Chatter features, Chatter use cases Analyze data using
reports and dashboards, Report type and dashboard, Identify the features available when creating a
report
Visualforce: Visualforce Pages, Variables & Formulas, Standard Controllers, Records, Fields &
IV Tables, Using Forms, List Controllers, Static Resources. Action Function, Action Status, Action 5
Support, Custom Controller and Extension
Apex: Introduction , Environment, data types, array , string , decision making , loops , collection,
V 5
classes, objects, methods, DML, SOSL,SOQL

Salesforce.com For Dummies, 7th Edition by Liz Kho and Jon Paz
Text 1.
Salesforce Advanced Administrator Certification by Enrico Moru
Books 2.

https://trailhead.salesforce.com
EBooks 1.
https://success.salesforce.com
2.
1. Salesforce Handbook by Wes Nolte and Jeff Douglas
Reference Books
2. Learning Salesforce Lightning Application Development: buy Mohit Shrivastava

P a g e | 28
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: SENSORS AND TRANDUCERS


Semester IV Evaluation Scheme
Teaching Scheme
Term ODD Theory Practical
Course
OE Th Tu Pr Credits TAE CAE ESE Int Ext
Category
Course
UECL211 - 10 15 50 -
Code 2 2 -

 To understand the concepts of measurement technology.


Course
• To learn the various sensors used to measure various physical parameters.
Objectives
• To learn the fundamentals of signal conditioning, data acquisition and communication syste
Upon successful completion of this course, student will be able to:
CO1. Expertise in various calibration techniques and signal types for sensors.
CO2. Apply the various sensors in the Automotive and Mechatronics applications
Course
CO3. Study the basic principles of various Force, Magnetic and Heading Sensors.
Outcomes
CO4. Differentiate Between Optical, Pressure And Temperature Sensors
CO5.Understand Industrial Timer Circuits

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Program Outcomes
Course
Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 1 2 1 1 1 - - - - - - 3
CO2 2 2 3 2 2 - - - - - - 3
CO3 2 2 2 2 2 - - - - - - 3
CO4 1 2 2 2 2 - - - - - - 3
CO5 1 2 2 2 2 - - - - - - 3

P a g e | 29
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents

Unit Contents Hours


INTRODUCTION
Basics of Measurement – Classification of errors – Error analysis – static and dynamic
I 06
characteristics of transducers – Performance measures of sensors – Classification of sensors –
Sensor calibration techniques – Sensor Output Signal Types.
MOTION, PROXIMITY AND RANGING SENSORS
Motion Sensors – Potentiometers, Resolver, Encoders – Optical, Magnetic, Inductive, Capacitive, 06
II LVDT – RVDT – Synchro – Microsyn, Accelerometer. – GPS, Bluetooth, Range Sensors – RF
beacons, Ultrasonic Ranging, Reflective beacons, Laser Range Sensor (LIDAR).
FORCE, MAGNETIC AND HEADING SENSORS
III Strain Gauge, Load Cell, Magnetic Sensors –types, principle, requirement and advantages: Magneto 06
resistive – Hall Effect – Current sensor, Heading Sensors – Compass, Gyroscope, Inclinometers.
OPTICAL, PRESSURE AND TEMPERATURE SENSORS
Photo conductive cell, photo voltaic, Photo resistive, LDR – Fiber optic sensors – Pressure –
IV 06
Diaphragm, Bellows, Piezoelectric – Tactile sensors, Temperature – IC, Thermistor, RTD,
Thermocouple.
INDUSTRIAL TIMERS
V Classification, Types, Electronic Timers, RC and Digital Timers, Time Based Generators 06

Text Book/Reference Books/Online Material

Text 1. Ernest O Doebelin, “Measurement Systems – Applications and Design”, Tata


Books McGraw-Hill,2009.
2. Sawney A K and Puneet Sawney, “A Course in Mechanical Measurements and
Instrumentati
and Control”, 12th edition, Dhanpat Rai & Co, New Delhi, 2013.
EBooks 1. Sensor and Transducer by I.R.Sinclair
1. Patranabis D, “Sensors and Transducers”, 2nd Edition, PHI, New Delhi, 2010.
Reference
Books 2. John Turner and Martyn Hill, “Instrumentation for Engineers and Scientists”, Oxford
Science
Publications, 1999.
3. Richard Zurawski, “Industrial Communication Technology Handbook” 2nd edition,
CRC Pre
online TL 1. NPTEL Lecture
Material

P a g e | 30
Curriculum for B. Tech. in Computer Science and Engineering

UEEL210: Non-Conventional Energy Sources


Exam
Continuous Evaluation Scheme
Teaching Scheme Duratio
Credit Theo Practica Total n
s ry l
Total
Th Tu Pr. TAE CAE ESE Int Ext
Hour
s 2 Hrs

2 - - 2 2 10 15 50 - - 75

The subject aims at basic solar power generation


1.
Students should able to develop in-depth knowledge for Various renewable energy resources available at
Course a location
Objectives 2. Students should able to develop and read hydrographs, estimate flow, head, and power. Geothermal, wave,
tidal and OTEC resources, site selection.
3. Students should able to develop the concept of hybrid technology.
Upon successful completion of this course, student will be able to:
CO1:To understand the basic principles of solar photovoltaic Technology.
Course
CO2:To understand the basic principles of wind energy conversion system.
Outcomes
CO3:To understand the basic knowledge of other Nonconventional Energy Sources.
CO4:To understand the basic concept of Hybrid Technology.
Course Program Outcomes and Program Specific Outcomes
Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO 10 PO 11 PO 12 PSO1 PSO2 PSO3
CO1 3 2 2 1 1 3 1 3 2 1
CO2 3 2 2 1 1 3 1 3 2 1
CO3 3 2 2 1 1 3 1 3 2 1
CO4 3 2 2 1 1 3 1 3 2 1

Course Contents:
Uni Contents Hour
t s
I Basic concept of Solar Energy:
Basics of Sun, Solar Constant, Solar radiation at earth's surface, solar radiation
geometry, solar radiation measurement, estimation of average solar radiation, 04
solar radiation on tilted surfaces, why south facing?, comparison of true south
& Magnetic south.
II Solar Energy Collectors:
Physical Principles of the conversion of solar radiation into heat, flat plate
collectors, transitivity of cover systems, energy balance equation and collector
efficiency, concentrating collectors, comparison of concentrating and flat plate 08
collectors, selective absorber coatings.
Solar Energy Storage: Solar Energy Storage system (Thermal, Electrical,
Chemical, Mechanical), Solar ponds.

P a g e | 31
Curriculum for B. Tech. in Computer Science and Engineering

Application of Solar Energy: Solar water heating, space heating, space cooling,
solar thermal heat conversion, solar photovoltaic energy conversion, solar
pumping, solar cooking, online grid connected, solar photovoltaic generation
system.
III Wind Energy:
Basic principles of wind energy conversion, wind energy conversion system,
wind data & energy estimation, site selection consideration, basic components 6
of wind energy conversion system (WECS), classification of WEC system,
generating system, energy storage, application of wind energy.
IV Nonconventional Energy Source:
ENERGY from OCEANS: Ocean thermal electric conversation (OTEC),
Claude & Anderson cycles, evaporators, Bio-fouling, Hybrid cycle,
components of OTEC for power generation.
Energy from Tides: Introduction, basic principles of Tidal power, components
of Tidal Power Plants, operation methods of utilization of Tidal Energy; 08
Estimation of Energy & Power in simple single basin. Tidal system:
Advantages & limitations of Tidal Power Generations, energy & power from
wares, waveenergy conversions devices. Brief Introduction to operating
principlesonly): small scale hydro electric power generation, Energy from Bio
–Mass, Geothermal Energy, MHDpower generation, fuel cell etc.
V Basic concept of Hybrid Technology:
Types of Hybrid Technology systems, solar-wind hybrid technology concept, 04
Basic Optimizing techniques to improve the efficiency of Hybrid system.

D Non Conventional Energy Sources, G.D. Rai, Khanna publishers


1 C Non Conventional Energy Resources, B. H. Khan, 2nd , The McGraw Hill
Text Books Companies
Energy Technology : Nonconventional, Renewable and Conventional, S. Rao & B. B.
2
Parulekar, 1st, Khanna Publisher
Solar Energy: Principles of thermal collection and storage, S. P. Sukhatme, 2nd
1
Reference edition, Tata McGraw Hill Publishing Company Ltd.
Books Solar Photovoltaics : Fundamental, Technologies and Applications, Chetan Singh
2
Solanki, PHI Learning Pvt. Ltd.
On-line https://www.youtube.com/watch?v=BTyJrRy8DUE&list=PLwdnzlV3ogoUtaGiq-
1
TL lVJc4CC6x_czs9D
Material

P a g e | 32
Curriculum for B. Tech. in Computer Science and Engineering

Subject Code: TOTAL QUALITY MANAGEMENT (UMEL213)


Continuous Evaluation Scheme
Teaching Scheme
Credits Theory Practica
l Total
Th Tu Pr. Total Int
TA CA Ext Th
Hours
E E ESE

2 - - 2 2 10 15 - - 75
50

1. To facilitate the understanding of Quality Management principles and process.

2. To train them with various tools and techniques of Quality Management.


Course
3. To inculcate the importance of Quality in an organization.
Objectives
4. To make understood about the ISO Quality systems.

CO1:Apply knowledge to demonstrate the tools utilization for quality improvement.

Course CO2:Analyze total quality management principles and process.


Outcomes
CO3:Apply the various quality systems in implementation of Total quality management.

CO4:Analyze the various types of techniques are used to measure quality

Course Contents:
Unit Contents Hou
rs
INTRODUCTION 5
Introduction - Need for quality - Evolution of quality - Definition of quality -
I Dimensions of manufacturing and service quality - Basic concepts of TQM -
Definition of TQM – TQM Framework - Contributions of Deming, Juran and Crosby
– Barriers to TQM.
II TQM PRINCIPLES 5
Leadership – Strategic quality planning, Quality statements - Customer focus –
Customer orientation, Customer satisfaction, Customer complaints, Customer
experience and advocacy, Customer retention - Employee involvement –
Motivation, Empowerment, Team and Teamwork, Recognition and Reward,
Performance appraisal - Continuous process improvement – PDSA cycle, 5S,
Principles of kaizen, Kaizen - Supplier partnership – Partnering, Supplier selection,
Supplier Rating.
TQM TOOLS & TECHNIQUES I 5
III The seven traditional tools of quality – New management tools – Six-sigma:
Concepts, methodology, applications to manufacturing, service sector including IT –
Bench marking –Reason to bench mark, Bench marking process – FMEA – Stages,
Types.

P a g e | 33
Curriculum for B. Tech. in Computer Science and Engineering

TQM TOOLS & TECHNIQUES II 5


IV Quality circles – Quality Function Deployment (QFD) – Taguchi quality loss function
– TPM – Concepts, improvement needs – Cost of Quality – Performance measures.
V QUALITY SYSTEMS 4
Need for ISO 9000-2000 Quality System – Elements, Documentation, Quality
auditing- QS 9000 – ISO 14000 – Concepts, Requirements and Benefits – Case studies
of TQM implementation in manufacturing and service sectors including IT.

1. Dale H. Besterfiled, et at., “Total Quality Management”, Pearson Education Asia,


Text Third Edition, Indian Reprint (2006).
Books
2. Total Quality Management, V. Jayakumar, Lakshmi Publications.(reprint 2005)
1. James R. Evans and William M. Lindsay, “The Management and Control of
Reference Books Quality”, 6 th Edition, South-Western (Thomson Learning), 2005
2. Oakland, J.S. “TQM – Text with Cases”, Butterworth – Heinemann Ltd., Oxford,
3rd Edition, 2003.
On-line TL https://nptel.ac.in/courses/110/104/110104080/
Material The NPTEL course the “Total Quality Management-I” by PROF. RAGHU
NANDAN SENGUPTA, IIT Kanpur

P a g e | 34
Curriculum for B. Tech. in Computer Science and Engineering

Basics of Civil Engineering (Open Elective-I)


Evaluation Scheme Ese
Sub. Name of the Course Teaching Scheme
Theory Practical Total Duration
Code Course Category Credits
Th Tu Pr Total TAE CAE ESE Int. Ext. (Hrs)
BASICS OF
UCEL212 CIVIL OE 2 - - 2 2 10 15 50 - - 75 02
ENGINEERING

To study the scope of Civil Engineering and understand the role of a Civil Engineer
Course To understand basic construction materials
Objectives To study the basic techniques used during planning, construction and management of civil
structures.
Students will be able to:
CO1: Understand the basics of Civil Engineering and components of Civil structures.
Course CO2: Identify the building materials used in construction.
Outcomes CO3: Apply the principles of surveying in various Civil construction works.
CO4: Assess the environmental waste and natural water resource management.
CO5: Identify the various instruments used in construction
Course Contents:
Unit Contents Hours
Introduction to Civil Engineering Introduction and scope of Civil Engineering. Role of Engineers in
infrastructure development. General concepts related to building. Selection of site, basic functions of
buildings, types of buildings – Residential, Public, Commercial, and Industrial. Principles of planning,
orientation of buildings, introduction to bye-laws regarding building line, Height of building, open
I 8
space requirement, F.S.I., Carpet area, built up area, setbacks, ventilation. Components of Buildings
Introduction to Types of loads on buildings. Substructure – Types of soils; rocks and foundation strata,
concept of bearing capacity, Types of foundation and their suitability. Superstructure –Types of
construction: Load Bearing, Framed, and Composite.
Building Materials Introduction to basic construction materials; cement, bricks, stone, aggregates,
reinforcing steel, structural glazing, structural steel; Concrete types: PCC, RCC, Prestressed, Precast
II 6
and Ready-Mix Concrete. Use of various eco- friendly materials in construction. Introduction to
advance construction equipment‟s and techniques
Surveying: Various types of maps and their uses; Introduction to digital mapping; Principles of survey.
Introduction to various survey instruments such as EDM, Lasers, Total Station, and digital planimeter.
Modern survey methods. Introduction to GIS, GPS and their applications. Transportation Engineering
III 6
Role of transportation in national development; various modes of Transportation. Classification of
Highways: Expressways, NH, SH, MDR, ODR, VR; Types of Pavements, Traffic Signs, signals,
Parking system, and Causes of Accidents.
Environment and Natural Resource Management Water supply - Sources, drinking water requirements,
impurities in water and their effects; Purification of water, modern purification processes; Standards of
purified water. Waste Management: Collection and Disposal methods of Liquid, solid and gaseous
IV 6
wastes. Water Resources Engineering Introduction to Hydraulic structures of storage; water
conveyance systems; Watershed management: Definition, Necessity and methods; Roof top rain water
harvesting and Ground water recharge: relevance and methods.
Instrumentation in Civil Engineering Structures: Various instruments used in construction, water
resources, Environmental Engineering, Foundation Engineering, Thermocouples, condition monitoring
V equipment‟s, Half Cell Potentiometers, Strain Gauges. Management of Utilities using telemetry & 6
SCADA System. Sustainable Development: Role of Engineers in Sustainable Development. Concept
of green buildings and LEED Certification

P a g e | 35
Curriculum for B. Tech. in Computer Science and Engineering

Bhavikatti, S. S. Elements of Civil Engineering, New Age International, 2019


1
Punmia, B. C, Jain Ashok K,and Jain Arun K..Basic Civil Engineering, Laxmi Publication,
2
Text 2003
Books Shetty, M.S. Concrete Technology, S. Chand, 2014
3
Kanetkar and Kulkarni, Surveying and Levelling, Pune Vidyarthi Graha Prakashan, 2006
4
Birdie G. S., and Birdie, J. S., Water Supply and Sanitary Engineering, Dhanpatrai
1
Reference Publication, 2018
Books
2 Kumar Sushil, Building Construction, Standard Publications, 2020
3 Khanna & Justo, Transportation Engineering, Nem Chand and Brothers, 2001
4 Shah and Kale, Building Drawing Design, Tata McGraw Hill Education, 2001

P a g e | 36
Curriculum for B. Tech. in Computer Science and Engineering

Course Code - MBAL 214, Course - Business Ethics


Continuous Evaluation Scheme
Teaching Scheme
Credits Theory Practical Total
Total
Th Tu Pr. TAE CAE ESE Int Ext
Hours 2 Hrs
2 - - 2 2 10 15 50 - - 75

1.This course aims to: Promote understanding of the importance, for business and
Course the community, of ethical conduct.
Objectives 2.To Enhance awareness and critical self-examination of one's own values, and to
appreciate the relevance of personal values in the business
CO1.Under the given scenario the learner will be in a position to identify the
various management theories and its implementation in real time business.
CO2.The learner will identify the concept of business and organisational ethic
along with the organizations implementing the concept.
CO3.The learner will recognize the various ethical practices adopted including
Course
Marketing, Human resource & Economy.
Outcomes
CO4.In the given scenario the learner will be able to learn about the various aspects
of CSR. The learner will be able to analyse the need & mandate of CSR Practices in the
organisations.
CO5.Learner will be made aware the global ethics in international business for the
organisation

Unit Contents Hours


Business Ethics: Introduction, Concepts and theories - Introduction, definitions, need
I for Business ethics, Values and morals, Management and ethics, Normative Theories, 6
– Gandhian Approach, Friedman‟s Economic theory,

II Business & Organizational Ethics: 6


The Indian Business scene, Ethical Concerns, Global trends in business ethics,
Business ethics rating in India, Organisational culture, Types of Organizations,
Advantages of Corporate code of ethics, Formulating & implementing professional
ethics code;
III Environment Ethics, Marketing Ethics & Ethics in HRM: 6
India‟s Environment Policy, Environment Risk Management, Environment Audit,
Areas in Marketing Ethics, Ethics in HRM, Role of HRM in creating an ethical
organisation.

P a g e | 37
Curriculum for B. Tech. in Computer Science and Engineering

CSR- Introduction, Advantages, Scope for CSR in India, steps to attain CSR, 6
IV Prestigious awards for CSR, steps to attain CSR , Prestigious awards for CSR , CSR &
Indian Corporations-A Score Card.
V Ethics in international business - Normative and relative ethics, concept and choice. 6
Legal compliances, Home and host country‟s regulations and compulsions of
international agencies

1.Ethics in Business & Management - R. P. Banerjee (Himalaya Publication)


Text
Books 2. Business Ethics – Concept & Practice - B. H. Agalgatti& R.
P.Banerjee – (Nirali Publication)
Reference Business Ethics, C S V Murthy, Himalaya Publishing House 6. Business Ethics &
Books Corporate Governance, by A.C.Fernando

P a g e | 38
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Data Analysis Using R


Semester IV Teaching Scheme Evaluation Scheme
Theory Practical
Term EVEN Th Tu Pr Credits TAE CAE ESE INT EXT

Course C
Category - -- 4 2 - - - 25
Course UCSP211
Code
Teaching Online 25
Mode 4 Total

 Learn important techniques for preparing (or wrangling) your data for analysis
Course  Learn how to gain a better understanding of your data through exploratory data analysis
Objectives  Learn to summarize data and identify relevant relationships between variables that can
lead to insights.
CO1 Access online resources for R and import new function packages into the R
Course workspace
Outcomes CO2 Import, review, manipulate and summarize data-sets in R
CO3 Explore data-sets to create testable hypotheses and identify appropriate statistical
tests
CO4 Perform appropriate statistical tests using R
CO5 Create and edit visualizations with R

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outcomes PO PO PO PO PO PO PO PO PO PO PO PO PSO 1 PSO PSO3
1 2 3 4 5 6 7 8 9 10 11 12 2
CO1 - 3 3 - 3 - - - - - - - - -
CO2 - 3 3 - 3 - - - - - - - - -
CO3 - 3 3 2 3 - - - - - - - 3 2
CO4 - 3 3 - 3 - - - - - - - 3 3
CO5 - 3 3 1 3 - - - - - - - - 3

P a g e | 39
Curriculum for B. Tech. in Computer Science and Engineering

List of Practical
Sr. Mapping Mapping With PO &
No. Practical List With CO PSO

PO1,PO2,PO 3,PO5,
1 Write R Program to Create and display Data. CO1 PO11, PSO1,PSO2

Write R Program PO1,PO2,PO 3,PO5,


2 a. Creating and manipulating a List CO2,CO3 PO11, PSO1,PSO2
b. Creating and manipulating a Array
c. Matrix manipulations
Write R Program PO1,PO2,PO 3,PO5,
3 a. Creating Data Frame CO2,CO3 PO11, PSO1,PSO2
b. Matrix-like Operations on a Data Frame
c. Merging two Data Frames
Write R program PO1,PO2,PO 3,PO5,
4 a. To apply functions on Data Frames CO1,CO2,C PO11, PSO1,PSO2
b. Use Functions with factors O3
PO1,PO2,PO 3,PO5,
5. Write R program for String Manipulation CO3 PO11, PSO1,PSO2

Implement Simple linear Regression using R: PO1,PO2,PO 3,PO5,


5 a. Fitting, CO4,CO5 PO11, PSO1,PSO2
b. Evaluation
c. Visualization
CO4,CO5 PO1,PO2,PO 3,PO5,
6 Implement Multiple Linear Regression using PO11, PSO1,PSO2
R_Lasso and Ridge Regression

Implement Logistic regression using R CO4,CO5 PO1,PO2,PO 3,PO5,


7 a. logistic Regression PO11, PSO1,PSO2
b. Likelihood Function
c. Multinomial Logistic Regression Model
Write R script for clustering CO4,CO5 PO1,PO2,PO 3,PO5,
8 a. K-means algorithm PO11, PSO1,PSO2
b. Association Rule
Content Beyond Syllabus

PO1,PO2,PO 3,PO5,
1 Construct a Graph that Summarizes US murders CO5 PO11,
dataset(any dataset) PSO1,PSO2

P a g e | 40
Curriculum for B. Tech. in Computer Science and Engineering

Scheme of B. Tech. in Computer Science and Engineering

Elective – I : User Interface Design and User Experience(UCSL311)`, Requirements


Engineering(UCSL313), System Analysis, Modeling & Design(UCSL314), Artificial Neural
Networks(UAIL317)
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: DATABASE MANAGEMENT SYSTEM


Course Title: DATABASE MANAGEMENT SYSTEM
Evaluation Scheme
Semester V Teaching Scheme
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course
C14
Category 2 1
3 10 15 50
Course Hrs. Hr.
UCSL301
Code
Teaching
Offline 75
Mode
3 Hrs Total
Duration
2 Hrs 75
of ESE

This course introduces general idea of database management system,


also gives idea to design databases using data modeling and design
techniques.
It is also aimed to developing skills to implement real life applications
Course Objectives
which involve database handling.
This course also provide carrier opportunities in subject areas of
designing, storage techniques and data handling and managing
techniques
CO1: Analyze an information storage problem and derived an
information model expression in the form of Entity relation diagram
and design appropriate data model for it.
CO2: Demonstrate SQL queries to perform CRUD (Create, Retrieve,
Update, Delete) operations on database and perform inferential analysis
of data model
Course Outcomes CO3: Identify features of database management systems and Relational
database and Understand functional dependencies and various
normalization forms
CO4: Perform basic transaction processing and management and
ensure database security, integrity and concurrency control
CO5: Analyze the management of structured and unstructured data
management with recent tools and technologies
Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:
Course
Program Outcomes and Program Specific Outcomes
Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 1 3 -- 3 -- -- -- -- -- -- 1 2 --
CO2 3 1 3 3 -- -- -- -- -- -- -- 1 3 --
CO3 3 2 3 -- -- -- -- -- -- -- -- 1 -- 3
CO4 3 -- 3 2 -- -- -- -- -- -- -- 2 2 --
CO5 3 -- 2 -- 3 -- -- -- 2 -- 2 2 2 --
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:
Unit Contents Hours
Introduction to DBMS - DBMS Architecture, Data Models, E-R Diagram,
I 6
Relational Database design:
SQL Concepts - Basics of SQL, DDL, DML, DCL, structure – creation,
alteration, defining constraints, Functions - aggregate functions, Built-in
II functions –numeric, date, string functions, set operations, sub-queries, 8
correlated sub-queries, Use of group by, having, order by, join and its
types, Exist, Any, All , view and its types.
Functional Dependency (FD) – Basic concepts, closure of set of FD,
III closure of attribute set, Decomposition, Normalization – 1NF, 2NF, 3NF, 5
BCNF, 4NF
Transaction control commands – Commit, Rollback, Save point.
Transaction Management: Transaction concepts, properties of
IV transactions, serializability of transactions, Two- Phase Commit protocol, 7
Deadlock, two-phase locking protocol. Cursors, Stored Procedures,
Stored Function, Database Trigger, Database recovery.
Indexing and hashing, Query processing, Query Optimization, Data
V 4
Mining, Advances in databases

Abraham Silberschatz, Henry F. Korth and S. Sudarshan, Database System


Text 1.
Concepts 4th Ed, McGraw Hill, 2002.
Books
2. Jeff Ullman, and Jennifer Widom, A First Course in Database systems, 2nd Ed.
https://ebooks.lpude.in/computer_application/mca/term_1/DCAP204_MANAG
E-Books 1. ING_DATABASE_DCAP402_DATABASE_MANAGEMENT_SYSTEMS.pd
f
1. G. K. Gupta :‖Database Management Systems‖, McGraw – Hill.
Regina Obe, Leo Hsu, PostgreSQL: Up and Running, 3rd Ed, O'Reilly Media
2.
2017.
Referenc
Kristina Chodorow, Shannon Bradshaw, MongoDB: The Definitive Guide, 3rd
e Books 3.
Ed, O'Reilly Media 2018.
RamezElmasri and ShamkantNavathe, Fundamentals of Database Systems 2nd
4.
Ed, Benjamin Cummings, 1994.
online
TL 1. https://nptel.ac.in/courses/106/105/106105175/
Material
Curriculum for B. Tech. in Computer Science and Engineering

Sr. No. Name of Practical UCSP301

1 Write a SQL statement to implement Data Definition Language commands.

2 Write a SQL statement to implement Data Manipulation Language commands.

3 Write a SQL statement to implement various types of integrity constraints.

4 Write a SQL statement to implement inbuild functions & SET operations in SQL.

5 Write a SQL statement to implement group by, order by & having clause.

6 Write a SQL statement to implement join queries.

7 Write a SQL statement to implement sub queries.

8 Write a SQL statement to implement views for the application created.

9 To make use of transaction control statements viz rollback, commit and savepoint.

10 To implement trigger in PL/SQL


Practical Beyond Syllabus
11 To study Hadoop Technology to manage big data
12 To implement simple and control statement in PL/SQL
Open Ended Practical
13 Practicals based on virtual lab
Details of on line Laboratory Resource Material Instruction / Operating Manuals
1 http://vlabs.iitkgp.ernet.in/se/
2 https://sites.google.com/a/rku.ac.in/software-engineering/coursepack
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Software Engineering and Project Management


Course Title: Software Engineering And Project Management
Teaching Scheme Evaluation Scheme
Semester V
Theory Practical
Term Odd Th Tu Pr Credits TAE CAE ESE INT EXT
Course
C15
Category 2
NA 2 10 15 50
Course UCSL30 Hrs.
Code 6
Teaching
Offline 75
Mode
2 Hrs Total
Duration
2Hrs 75
of ESE

The student should be made to:


Understand the phases in a software project
Course  Understand fundamental concepts of requirements engineering and Analysis
Objectives Modeling.
 Understand the major considerations for enterprise integration and deployment.
 4.Learn various testing and maintenance measures
Up on successful completion of this course, student will be able to:
CO1: Identify the key activities in managing a software project
Course CO2: Compare different process models.
Outcomes  CO3: Concepts of requirements engineering and Analysis Modeling.
 CO4: Apply systematic procedure for software design and deployment.
 CO5: Compare and contrast the various testing and maintenance

Mapping of Course Outcomes with Program Outcomes and Program-Specific Outcomes:


Course Program Outcomes Program
Outcomes Specific
Outcomes
P PO PO PO PO PO PO PO PO PO PO PO PSO 1 PSO
O 2 3 4 5 6 7 8 9 10 11 12 2
1
CO1 3 2 3 -- -- -- -- -- -- -- 3 2 -- --
CO2 3 2 3 -- -- -- -- -- -- -- 3 1 -- --
CO3 2 3 3 2 1 -- -- -- -- -- 3 1 3 2
CO4 2 3 3 -- -- -- -- -- -- 2 3 -- 3 3
CO5 3 -- 3 1 -- -- -- -- 2 -- 3 2 -- 3
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:
Unit Contents Hours
SOFTWARE PROCESS
Introduction to Software Engineering, Software Process, Perspective and
I Specialized Process Models – Software Project Management: Estimation – 7
LOC and FP Based Estimation, COCOMO Model – Project Scheduling –
Scheduling, Earned Value Analysis – Risk Management.
REQUIREMENTS ANALYSIS AND SPECIFICATION
Software Requirements: Functional and Non-Functional, User requirements,
System requirements, Software Requirements Document – Requirement
II 7
Engineering Process: Feasibility Studies, Requirements elicitation and
analysis, requirements validation, requirements management-Classical
analysis: Structured system Analysis, Petri Nets- Data Dictionary
SOFTWARE DESIGN
Design process – Design Concepts-Design Model– Design Heuristic –
Architectural Design – Architectural styles, Architectural Design,
III 7
Architectural Mapping using Data Flow- User Interface Design: Interface
analysis, Interface Design –Component level Design: Designing Class based
components, traditional Components.
PROJECT MANAGEMENT
Estimation – FP Based, LOC Based, Make/Buy Decision, COCOMO II –
IV 7
Planning – Project Plan, Planning Process, RFP Risk Management –
Identification, Projection, RMMM – Scheduling and Tracking
TESTING
Software testing fundamentals-Internal and external views of Testing-white
V 7
box testing – basis path testing-control structure testing-black box testing
Debugging

Roger S. Pressman, ―Software Engineering – A Practitioner‟s Approach‖,


1. Seventh Edition, McGraw-Hill International Edition, 2010.
Text
Books
Ian Sommerville, ―Software Engineering‖, 9th Edition, Pearson Education
2.
Asia, 2011.
1. Foundations of Software Engineering by Kevin Amaratunga
E--Books
2. The New Software Engineering by Sue Conger
Rajib Mall, ―Fundamentals of Software Engineering‖, Third Edition, PHI
1.
Reference Learning Private Limited, 2009.
Books PankajJalote, ―Software Engineering, A Precise Approach‖, Wiley India,
2.
2010.
1. Certification Courses available: https://nptel.ac.in/downloads/106105087/
On line TL
Material Free Courses available: https://swayam.gov.in/course/236-software-
2.
enginnering
Curriculum for B. Tech. in Computer Science and Engineering

Sr. No. Name of Experiments UCSP306


1 To understand the importance of SDLC approach & various processes models.
2 To identify the problem related to software crisis for a given scenario.
3 To identify the suitable software development model for the given scenario.
4 To identify the various requirement development activities viz. elicitation, analysis,
specification and verification for the given scenarios.
5 To identify the various elicitation techniques and their usage for a given scenario.
6 To identify the elements in Software Requirements Specification document for a given
scenario.
7 To design of DFD, data dictionary, E-R diagram, structured chart for a given scenario.
8 To study and illustrate various UML diagrams and the use of class diagrams.
9 To draw an activity diagram and use case diagram for a given scenario.
10 To draw a UML Class Diagrams, Sequence diagrams and State Transition Diagram for a
given scenario with Case Studies.
Open Ended Experiments
1 To designing Test Suites for a given scenario.
2 To understand the working of open source software for UML drawing.
3 To draw UML diagrams using open source software.
Details of on line Laboratory Resource Material Instruction / Operating Manuals
1 http://vlabs.iitkgp.ernet.in/se/
2 https://sites.google.com/a/rku.ac.in/software-engineering/coursepack
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Web Development

Course Title: Web Development

Teaching Scheme Evaluation Scheme


Semester V
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course
C16 2
Category NA 2 10 15 50
Hrs.
Course Code UCSL307
Teaching
Offline 75
Mode
2 Hrs Total
Duration of
2 Hrs 75
ESE

The student should be made to:


Understanding basic principles of web designing

Course To learn web page creation using HTML
Objectives To learn dynamic website design using CSS & JAVA Script
To learn content management system
To learn web hosting
Up on successful completion of this course, student will be able to:
CO1: Explain the basic principles of web designing
Course CO2: Implement all basic tags in HTML
Outcomes CO3: Design web page using HTML, CSS & JAVA Script
 CO4: Design & Understand content management system
 CO5: Publish & host website

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Programme Outcomes & Programme Specific Outcomes


CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 -- -- -- -- -- -- -- -- 2 2 --
CO2 3 1 3 -- -- -- -- -- -- -- -- 2 3 --
CO3 3 1 2 2 3 -- -- -- -- -- -- 2 3 --
CO4 3 1 2 2 3 -- -- -- -- -- -- 2 2 --
CO5 3 1 1 2 3 -- -- -- 3 -- -- 2 2 --
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:

Unit Contents Hours


Web Design Principles: Basic principles involved in developing a web site,
Planning process, Designing navigation bar, Page design, Home Page
I Layout 8
Design Concept., Brief History of Internet, What is World Wide Web, Why
create a web site, Web Standards
Introduction to HTML: What is HTML, HTML Documents, Basic structure
of an HTML document, Creating an HTML document, Mark up Tags,
Heading-Paragraphs, Line Breaks, HTML Tags.
II 8
Elements of HTML: Introduction to elements of HTML, Working with
Text, Working with Lists, Tables and Frames, Working with Hyperlinks,
Images and Multimedia, Working with Forms and controls
Introduction to Cascading Style Sheets & JAVA Script: Concept of CSS,
Creating Style Sheet, CSS Properties, CSS Styling(Background, Text
Format, Controlling Fonts), Working with block elements and objects,
III 8
Working with Lists and Tables, CSS Id and Class, Box Model, Advanced
CSS, JAVA Script Introduction, Application, Advantages, Popup Boxes,
Programming details, Class & object
Content Management System:
The differences between content, content management, and a content
IV 8
management system. Types of content management systems. Why we use
CMS, what a CMS does, and what CMS doesn‘t do
Introduction to Web Publishing or Hosting: Creating the Web Site, Saving
V the site, Working on the web site, Creating web site structure, Creating 8
Titles for web pages, Themes-Publishing web sites.

HTML 5 in simple steps by Kogent Learning Solutions Inc. Dreamtech


Text 1.
Press
Books
2. HTML, XHTML, and CSS Bible, 5ed Steven M. Schafer , Wiley India
HTML 5 in simple steps by Kogent Learning Solutions Inc. Dreamtech
1.
E--Books Press
2. HTML, XHTML, and CSS Bible, 5ed Steven M. Schafer , Wiley India
Reference
1.
Books Web Technologies: HTML, Javascript, Kogent Learning, Wiley India
1. NPTEL course: https://nptel.ac.in/courses/106/106/106106156/
online TL
Udemy course: Web Design for Beginners: Real World Coding in HTML
Material 2.
& CSS
Curriculum for B. Tech. in Computer Science and Engineering

Sr. No. Name of Experiments UCSP307


1 Implementing Basic tags in HTML
2 Design a web page using table tag exploring all attributes
3 Design a form in html considering all input types
4 Design a web page using inline & embedded CSS
5 Design webpage using external CSS
6 Design & implement all types of popup boxes using JAVA Script
7 Design a calculator in html using JAVA Script taking inputs from user
8 Design & host a dynamic website using combinations of HTML, CSS &
JAVA Script
Practical Beyond Syllabus
9 Embedding through iframe Tag, Virtual Lab
Open Ended Experiments
1 Explore the different open source webdesigning tool
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Compiler Design


Course Title: Compiler Design
Teaching Scheme Evaluation Scheme
Semester V
Theory Practical
T
Term Odd Tu Pr Credits TAE CAE ESE INT EXT
h
Course
C17 3
Category
H NA NA 3 10 15 50 NA NA
UCSL
Course Code rs.
302
Teaching
Offline 75 NA
Mode
3 Hrs Total
Duration of
2 Hrs 75
ESE

This course introduces student general ideas of compiler.


Course This course introduces to use regular languages to describe the lexical elements
Objectives of a programming language and understand syntax analysis.
Aimed to develop skills to understand optimization technique
Upon successful completion of this course, student will be able to:
CO1: Understand basic concepts of compiler and different phases of compiler.
CO2: Explain the role of a semantic analyzer and describe the purpose of a
syntax tree.
Course CO3: Apply context free grammars, compiler parsing techniques, construction
Outcomes of abstract syntax trees, symbol tables.
CO4: Demonstrate lexical analysis using a finite automata along with error
recovery.
CO5: Apply optimization techniques to intermediate code and generate machine
code for high level language program.

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:
Course Program Outcomes and Program Specific Outcomes:
Outcomes P PO PO PO PO PO PO PO PO PO PO PO PSO PS
O 2 3 4 5 6 7 8 9 10 11 12 1 O2
1
CO1 -- 3 -- -- 3 -- 0 -- -- -- -- 0 3 1
CO2 2 3 3 -- 3 1 0 -- -- -- -- 2 3 1
CO3 -- 3 2 -- 2 -- -- -- -- -- -- 1 3 --
CO4 2 2 -- 3 2 -- -- -- -- -- -- -- 2 3
CO5 -- 3 3 1 2 -- -- -- -- -- -- 1 2 3

Course Contents:
Curriculum for B. Tech. in Computer Science and Engineering

Unit Contents Hours


INTRODUCTION TO COMPILERS
Overview of compiler and translator, types of Compiler, Analysis of the
I Source Program, The Phases of a compiler, grouping of phases, Cousins of 6
the Compiler, design of lexical Analysis, compiler writing tools, Cross
compiler- bootstrapping
SYNTAX ANALYSIS
Review of Context-Free Grammars – Derivation trees and Parse Trees,
Ambiguity. Top-Down Parsing: Recursive Descent parsing, Predictive
II parsing, LL(1) Grammars. Bottom-Up Parsing: Shift Reduce parsing – 8
Operator precedence parsing (Concepts only)LR parsing – Constructing SLR
parsing tables, Constructing, Canonical LR parsing tables and Constructing
LALR parsing tables.
SEMANTIC ANALYSIS
Need of semantic analysis, Abstract Parse trees for Expressions, variables,
statements, functions and class declarations, Syntax directed definitions,
III 7
Syntax directed translation schemes for declaration processing, type analysis,
scope analysis, Symbol Tables (ST),Organization of ST for block structure
and non-block structured languages, Symbol Table management.
INTERMEDIATE CODE GENERATION AND ERROR RECOVERY
Intermediate code generation: Intermediate languages, Design issues,
IV Translation of different language features, different types of intermediate 7
forms. Error Handling and Recovery in Syntax Analyzer-YACC-Design of a
syntax Analyzer for a Sample Language.
CODE OPTIMIZATION
Principal Sources of Optimization-DAG- Optimization of Basic Blocks-
Global Data Flow Analysis-Efficient Data Flow Algorithms-Issues in Design
V 7
of a Code Generator - A Simple Code Generator Algorithm. Recent trends and
Compiler tools, advanced topics & its Application. Virtual Machines and
Interpretation Techniques, Just-In-Time (JIT) and Adaptive Compilation.

Alfred V. Aho, Monica S.Lam, R. Sethi and J.D. Ullman ―Compilers:


1.
Text principles, techniques and tools‖ Pearson Education.
Books "Modern Compiler Implementaton in ML" by Andrew W. Appel, Cambridge
2.
University Press, 1998.
Introduction to Compilers and Language Design - by Prof. Douglas Thain
E--Books 1. University of Notre Dame
https://www3.nd.edu/~dthain/compilerbook/compilerbook.pdf
Kenneth C Louden, ―Compiler Construction Principle and Practice‖, PWS
1.
Reference publishing Company, 1997
Books Dhamdhere D.M., ―Compiler Construction Principle and Practice‖, Mac.
2.
Millan India, New Delhi, 1983
on line TL NPTEL Course Compiler Design, IIT Kharagpur
1.
Material https://nptel.ac.in/courses/106/105/106105190/
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: CLOUD COMPUTING


Course Title: CLOUD COMPUTING
Teaching Scheme Evaluation Scheme
Semester V
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course
C21
Category 4
NA NA 2 NA NA NA 25 NA
Hrs
Course Code UCSP303
Teaching
Offline -- 25
Mode
4 Hrs Total
Duration of
NA 25
ESE

To understand Cloud Computing concepts, technologies, architecture and


applications
Course To understand the underlying principle of cloud virtualization, cloud storage, data
Objectives management and data visualization
To understand different cloud programming platforms and tools to develop and
deploy applications on cloud
Upon successful completion of this course, student will be able to:
CO1: Develop and deploy cloud applications using popular cloud platforms
CO2: Design and develop highly scalable cloud-based applications by creating
Course
and configuring virtual machines on the cloud and building a private cloud
Outcomes
CO3: Design and deploy a cloud application in a PaaS environment
CO4: Develop cloud computing solutions for an enterprise
CO5: Analyse various cloud programming models and apply them to solve
problems on the cloud

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:
Course PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
Outcomes 1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 2 3 -- -- -- -- 2 -- -- -- -- 2 3 --
CO2 1 -- -- -- 3 -- -- -- -- -- -- 2 3 --
CO3 3 -- 3 -- -- -- -- -- -- -- -- 2 3 --
CO4 2 -- -- 3 -- -- -- -- -- -- -- 2 -- 2
CO5 3 -- -- -- 3 -- -- -- -- 2 -- 2 -- 2
Course Contents:
Unit Contents Hours
Introduction to Cloud Computing and Virtualization: Virtualization Concepts,
I 6
Cloud Computing Fundamental: Overview of Computing Paradigm, Evolution
Curriculum for B. Tech. in Computer Science and Engineering

of cloud computing, Defining cloud computing, Components of a computing


cloud, Essential Characteristics of Cloud Computing, Cloud Taxonomy.
Infrastructure as a Service(IaaS), Platform as a Service(PaaS), Software as a
Service (SaaS), Hardware-as-a-service: (HaaS), Oriented Architecture (SOA)
Cloud Computing Architecture and Service Management in Cloud:
ComputingCloud architectural principles, Role of Web services, Benefits and
II challenges to Cloud architecture, Cloud Service Models, cloud computing 6
vendors. Cloud Services, Management, Performance and scalability of
services, tools and technologies used to manage cloud services deployment
III Data Management in Cloud Computing and Resource Management in Cloud) 5
Cloud Security and Risk Management:Cloud Security: Understanding cloud
based security issues and threats, Data security and Storage, Identity& Access
IV Management, Risk Management in cloud, Governance and Enterprise Risk 7
Management.
Open Source and Commercial Clouds: Openstack, AWS, Google Cloud,
V Microsoft Azure, Cloud Simulator and IoT Cloud Framework, Research trend 7
in Cloud Computing, Fog Computing,

Cloud Computing: Principles and Paradigms, Editors: Rajkumar Buyya,


1.
Text James Broberg, Andrzej M. Goscinski, Wiley,2011
Books
Enterprise Cloud Computing - Technology, Architecture, Applications,
2.
Gautam Shroff, Cambridge University Press, 2010
CLOUD COMPUTING Principles and Paradigms Link:
E--Books 1. http://dhoto.lecturer.pens.ac.id/lecture_notes/internet_of_things/CLOUD%20
COMPUTING%20Principles%20and%20Paradigms.pdf
1. Cloud Computing Bible, Barrie Sosinsky, Wiley-India, 2010
Reference
Cloud Security: A Comprehensive Guide to Secure Cloud Computing,
Books 2.
Ronald L. Krutz, Russell Dean Vines, Wiley- India,2010
Online TL
1. https://nptel.ac.in/courses/106/105/106105167/
Material
Curriculum for B. Tech. in Computer Science and Engineering

Sr. No. Name of Experiments / Mini Projects/ Case Studies/ Activity based
1 Explore AWS Cloud Based IaaS Service
2 Implement Virtualization using Virtualbox/VMware Workstation
3 Creating a Warehouse Application in SalesForce.com PaaS
4 Explore Cloud Services using CloudSim Simulator
5 Explore Cloud Service using Google Cloud
6 Explore Cloud Service and table formation using Microsoft Azure Cloud
7 Creating a Warehouse Application in SalesForce.com PaaS
8 Explore open source cloud platform Openstack
9 Implement container management with Kubernetes
10 Implement DevOps and MLOPS using Cloud
Open Ended Experiments / New Experiments
1 Explore different IoT Cloud Framework
2 Explore Fog Computing Framework
Details of on line Laboratory Resource Material Instruction / Operating Manuals
1 https://cloud.google.com/training
2 https://trailhead.salesforce.com/en
3 https://aws.amazon.com/
4 https://azure.microsoft.com/en-in/
Curriculum for B. Tech. in Computer Science and Engineering

Elective -I
Course Title: User Interface Design and User Experience
Teaching Scheme Evaluation Scheme
Semester V
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course
EL1
Category
3 Hrs. NA NA 3 10 15 50 NA NA
UCSL
Course Code
311
Teaching
Online 75 --
Mode
3 Hrs Total
Duration of
2 Hrs. 75
ESE

To analyze and prepare design ideas in a constructive manner.


To analyze an interaction design problem and propose a user-centered process,
Course
justifying the process and identifying the trade-offs.
Objectives
To create a high quality, professional documentation and artifacts relating to the
design process for preparation for a professional portfolio.
Up on successful completion of this course, student will be able to:
CO1: Describe the Characteristics of User Interface design and its Principles
CO2: Discuss the issues and challenges for achieving a user-centered design
process, especially with regard to prototyping and evaluation techniques.
CO3: Use, adapt and extend design standards, design components, guidelines, and
patterns focusing on user experience.
CO4: Identify best practices of web color management, principles of designing
APP, and web usability in designing responsive web pages.
CO5: Create storyboards, video scenarios, and experience prototypes for a small
system and plan and perform a real world deployment study of a user
experience.
Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:
Course Program Outcomes and Program Specific Outcomes
Outcomes
PO PO PO PO PO PO PO PO PO PO PO PO PSO PS
1 2 3 4 5 6 7 8 9 10 11 12 1 O2

CO1 3 -- -- -- -- -- -- -- 1 -- -- 1 2 1

CO2 -- 3 -- -- -- -- -- -- 1 -- -- 2 2 1

CO3 -- -- 3 -- -- -- -- -- 2 -- -- 2 3 2

CO4 -- -- 3 -- -- -- -- -- 2 -- -- 2 3 3

CO5 -- -- -- -- 3 -- -- -- 3 -- -- 3 2 3
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:
Unit Contents Hours
Introduction: - Introduction to User Interface Design (UI), Brief History of UI
Design. Human Computer Interface, Characteristics of Graphics Interface,
I 6
Direct Manipulation Graphical System, Web User Interface: Popularity,
Characteristic & Principles.
User Design Process: - Introduction to design process, User centered design
process, Usability Engineering and Task centered Approaches. Introduction to
II Design centered Approaches, Design Centered Methods. Prototyping in 6
practice- Design rationale and Evaluation techniques, Model View Controller
Framework (MVC).
User Experience design component in Interface Design, Visual
Communication design component in Interface Design. System menus and
navigation schemes, Structures of menus, Functions and contents of menus,
Formatting, Phrasing, Navigating, Selecting menu choices, and kinds of
III 8
graphical menus. Windows: Characteristics components presentation styles
Type‘s Management‘s organizations operations. Web systems device based
controls, characteristics Screen -based controls, operate control - text boxes-
selection control combination control-custom and control-presentation control.
Web Design, Design techniques such as scenarios, personas, storyboards, wire
framing, and information architecture. App Design and its principles.
Prototyping tools, both low-fidelity and high-fidelity. Design for small screens,
IV responsive design. Non-GUI design (e.g., auditory interfaces, gesture 7
interfaces). Understanding the Designing language of Desktop, Web and
Mobile. Flow & Layout & Organizational structures. Swing Programming
Intro & Widgets. UI Widgets & Input Devices.
Case Studies and Best Practices based on advance and recent technology for
V 3
designing UI/UX.

Wilbent. O. Galitz ,―The Essential Guide to User Interface Design‖, John


Text 1.
Wiley& Sons, 2001.
Books
2. Ben Sheiderman, ―Design The User Interface‖, Pearson Education, 1998.
https://www.uxpin.com/studio/ebooks/ux-design-definitive-beginner-guide-
1.
E--Books signup/
2. https://www.userfocus.co.uk/fable/index.html
Greenberg, S., Carpendale, S., Marquart, N., and Buxton, B. (2011) Sketching
1.
User Experiences: The Workbook. San Francisco: Morgan
Reference Alan Cooper, ―The Essential Of User Interface Design‖, Wiley – Dream Tech
2.
Books Ltd.,2002.
Buxton, B. (2007) Sketching User Experiences. Sketching User Experiences.
3.
San Francisco: Morgan Kaufmann. (Amazon)
Introduction to UI Design
1.
on line TL https://www.coursera.org/learn/ui-design?
Material 2. Introduction to User Experience Design
https://www.coursera.org/learn/user-experience-design
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Business Intelligence Analyst


Evaluation Scheme
Semester V Teaching Scheme
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course
EL1
Category 3
NA NA 3 10 15 50 NA NA
Course Hrs.
UCSL323
Code
Teaching
Offline 75 --
Mode
3 Hrs Total
Duration
2 Hrs. 75
of ESE

To introduce concepts of Business Intelligence analyst in the field of


Engineering.
To develop skills in student to solve engineering problems based on
Course Objectives
Analytics.
To Introduce concepts of Differential and Inferential in the field of
Engineering.
Upon successful completion of this course, student will be able to:
CO1: Understand and use the analytics to solve the business problem and
engineering problems in respective disciplines.
CO2: Determine the statistics on the basis of Differential and inferential
and apply to various engineering problems in respective disciplines.
Course Outcomes
CO3: Apply the concepts of regression in solving engineering problems.
CO4: Use Clustering and Classification to solve various problems in
Engineering.
CO5: Apply the Knowledge of Analytics to solve various problems in
Engineering.

Mapping of Course Outcomes with Program Outcomes:


Program Outcomes
Course
Outcomes PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2

CO1 2 3 -- -- -- -- -- -- -- -- -- -- -- --
CO2 2 3 3 -- -- -- -- -- -- -- -- -- -- 2
CO3 1 3 3 2 -- -- -- -- -- -- -- -- -- 2
CO4 1 2 3 2 3 -- -- -- -- -- -- 2 -- 3
CO5 1 -- 2 3 3 -- -- -- -- -- -- 2 -- 3

Course Contents:
Unit Contents Hours
Introduction to Business Intelligence
I 4
BI concept, BI architecture, BI in today‘s perspective, BI Process, Applications
Curriculum for B. Tech. in Computer Science and Engineering

of BI like Financial analysis, statistical analysis, sales analysis, CRM, result


pattern and ranking analysis, Balanced Scorecard, BI in Decision Modelling:
Optimization, Decision making under uncertainty. Ethics and business
intelligence, Data analyst lifecycle.
Descriptive and Inferential Statistics
The concept, process and typical tools in data science. Example of different
algorithms i.e. segmentation, classification, validation, regressions,
II 6
recommendations. Exercises using Excel and R to work on histograms,
regression, clustering and text analysis. Co-relation between Algorithm and
Code in data science.
Linear and Multiple Linear Regression
Introduction to Regression Simple and Multiple Linear Regression, Correlation
III 6
vs. Regression , SST (Sum of Squares Total) , SSR (Sum of Squares
Regression) , SSE (Sum of Squares Error) , R-Square Adjusted R-Squared
Clustering
Introduction to clustering and classification, K-means clustering, Clustering
Categorical , Data How to choose Number of Clusters , Pros and Cons of K-
Means Clustering, Relationship between Clustering and Regression , Market
IV 6
Segmentation with Cluster Analysis
Classification
Introduction to Classification , Classification Applications , Logistic
Regression , Classification using SVM, K-nearest neighbor, Decision Trees.
DBMS and BIRT
Introduction to databases , Schema creation , Keys , Relation Creations , Data
V Insertion, different types of BI applications with using Excel, SQL Server 6
Reporting Services, Power BI, and Tableau, Business Performance
Management Systems, Reporting.

Business Analytics: Data Analysis & Decision Making, By S. Christian


1.
Text Albright, Wayne L. Winston · 2016
Books Business Intelligence and Analytics: Systems for Decision Support 10th
2.
Edition ISBN-13: 978-0133050905 by Ramesh Sharda, Dursun Delen
Business Intelligence Guidebook: From Data Integration to Analytics 1st
Reference 1. Edition by Rick Sher
Books
2. Introduction to Database Management Systems Book by Atul Kahate
E-Books 1. https://link.springer.com/book/10.1007%2F978-3-030-05719-0
on line 1. https://www.packtpub.com/free-ebooks/practical-data-analysis-second-edition
TL
2. https://www.academia.edu/40866126/BUSINESS_ANALYTICS
Material
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Requirement Engineering


Teaching Scheme Evaluation Scheme
Semester V
Theory Practical
Term Odd Th Tu Pr Credits TAE CAE ESE INT EXT
Course
EL1
Category 3
NA NA 3 10 15 50 NA NA
Course Hrs.
UCSL313
Code
Teaching
Offline 75 --
Mode
3 Hrs Total
Duration
2 Hrs 75
of ESE

To capture software requirements and handle difficult situations in gathering data


to build systems.
Course
To address elicitation, specification, and management of software system
Objectives
requirements.
Examines iterative prototyping user interactions for a system.
Upon successful completion of this course, student will be able to:
CO1 To design, implement and evaluate a computer-based system, process,
component, or program to meet desired needs
CO2 To understand professional, ethical, legal, security, and social issues and
Course
responsibilities
Outcomes
CO3 To use current techniques, skills, and tools necessary for computing
practices
CO4 To develop and present a talk on the status of a project
CO5 To develop a written report on a project based on Requirements

Mapping of Course Outcomes with Program Outcomes and Programme Specific Outcome
P P
PO PO PO PO PO PO PO PO PO PO
O O PSO1 PSO2
1 2 3 4 5 6 8 10 11 12
7 9
CO1 3 -- -- -- -- -- -- -- -- 1 -- -- 3 --
CO2 3 -- -- -- -- -- -- -- -- 1 -- -- 3 --
CO3 -- -- 3 -- -- -- -- 2 -- -- -- -- -- 2
CO4 -- -- 2 -- -- -- -- 3 -- -- -- -- -- 3
CO5 -- -- - -- -- -- -- 3 -- -- -- -- -- 3
Course Contents:
Unit Contents Hours
An Introduction to Requirement Engineering
I 7
Framework for Requirements Engineering ,Rationale for Requirements
Curriculum for B. Tech. in Computer Science and Engineering

Engineering and the problems with requirements , The definition and


characteristics of a requirement ,The characteristics of a requirements
engineering process, The problems of defining requirements ,A framework
for Requirements Engineering, Requirement Engineering activities –
elicitation, analysis, validation, documentation and management , The
importance of requirements planning and estimating
Hierarchy of Requirements
Building the hierarchy through decomposition of requirements, Categories of
II requirements , Functional requirements, Non-functional requirements, 7
including performance, usability, access, security, archiving, backup and
recovery, availability, robustness
Stakeholders Needs and Analysis
The definition of the term ‗stakeholder‘, Project Stakeholders, Business
III 7
Stakeholders, External stakeholders , Requirements Elicitation, Elicitation
techniques
Use of models in Requirements Engineering
The purpose of modelling requirements , Generating questions, Cross-
IV 7
checking for consistency and completeness, Defining business rules, Use
case diagram, Class diagram, Requirements Documentation
Requirements Analysis and Management
Requirements Validation, Types of reviews, Stakeholders and their areas of
V concern, Dealing with changing requirements, The importance of 7
traceability, Requirements Engineering support tools, CARE, CASE,Case
study of Scrum and agile Model

Software & Systems Requirements Engineering in Practice, by Brian


1.
Berenbach, et al (ISBN 978-0-07-160547-2)
Text
Requirements Engineering: Processes and Techniques, Gerald Kotonya and
Books
2. Ian Sommerville, published by John Wiley & Sons April 1998 ISBN:
0471972088
Requirements Engineering Fundamentals
E Book 1.
https://www.bbau.ac.in/dept/dit/TM/requirementsengi.pdf
Managing Software Requirements: A Use Case Approach, Second Edition,
1. by Dean Leffingwell and Don Widrig (ISBN 0-321-12247-X) - for handy
Reference reference
Books Interaction Design: beyond human-computer interaction, Third Edition, by
2. Jennifer Preece, Yvonne Rogers and Helen Sharp (0-978-0-470-66576-3) -
for reference on this subject
UDEMY COURSE
1. https://www.mooc-list.com/tags/requirements-engineering-secure-software-
Online TL specifications-specialization
Material
MOOC COURSE
2.
https://www.udemy.com/course/software-requirement-engineering-sre/?utm
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: System Analysis, Modeling & Design


Semester V Teaching Scheme Evaluation Scheme
Term EVEN Theory Practical
Course
EL2 Th Tu Pr Credits TAE CAE ESE Int Ext
Category
Course
UCSL314 3
Code
Hrs NA NA 3 10 15 50 NA NA
Teaching
Offline
Mode
Duration 75 --
2 Hrs 3 Hrs Total
of ESE 75

To introduce concepts of System Design.


Course
To develop skills in student to design problems based on System analysis
Objectives
To introduce concepts of System Modeling
Upon successful completion of this course, student will be able to:
CO1: Understand and use the system concepts in problem solving.
Course CO2: Determine the system analysis techniques in respective problem areas.
Outcomes CO3: Apply concepts of System modeling in solving problems.
CO4: Use Modeling concepts for designing projects
CO5: Use system design concepts for developing projects

Mapping of Course Outcomes with Program Outcomes & Program Specific Outcome:
Course Program Outcomes and Program Specific Outcomes
Outcomes
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 2 -- -- -- -- -- -- -- -- -- -- -- 2 --
CO2 -- 3 -- -- -- -- -- -- -- -- -- -- 1 --
CO3 -- -- 3 -- -- -- -- -- -- -- -- -- 2 --
CO4 -- -- -- 2 -- -- -- -- -- -- -- -- 3 --
CO5 -- -- -- -- 2 -- -- -- -- -- -- -- -- 2

Course Contents:
Unit Contents Hours
System Concepts and SDLC: Components and Characteristics of a System;
Types of Information Systems; Modern Approach to System Analysis and
I Development, Role and Need of System Analyst in System Development. 8
System Development Life Cycle, SDLC Models, Requirement Analysis,
Feasibility Study and types.
System Development Methodology:, System Analysis and system Design,
II 10
Link Program Testing, Conversion And Installation, System Review And
Curriculum for B. Tech. in Computer Science and Engineering

Evaluation, Maintenance; Prototyping System Analysis: System Planning and


Initial Investigation, Fact Analysis, Information Gathering Tools; Tools of
Structured Analysis: Data flow Diagram(DFD), Data Dictionaries, Decision
Trees And Tables; Cost/Benefit Analysis, Types of costs
System Requirement Specifications, Documentation Techniques for System
Analysis; Object Oriented Analysis UML(Unified Modelling language),
III 8
Object Oriented Development Life Cycle and Modelling, Modelling using
UML (Use cases, Activity Diagram, Class Diagram, Sequence Diagram)
System Design: Modular and Structured Design, Module Specifications,
Coupling and Cohesion; Forms-Driven Methodology IPO Charts, Structured
Walkthrough; Input/output and Forms Design: Requirements of Forms
IV 10
Design, Types of Forms; Dialog (User Interface) Design; File and Data Base
Design: File Structure and File Organization, Data Structure, Normalization
and its Types, Role of Data Base Administrator. System Implementation
System Testing and Quality Assurance, Test Plan, Testing Techniques
Available, Quality Assurance Goals in Systems Life cycle, Trends in Testing;
Implementation and Software Maintenance; System Control And Audit Trails;
V 9
System Administration And Training; Hardware/Software Selection-
Suppliers, Software Industry, Procedure and Phases in Selection of Software,
Evaluation Process; Project Scheduling and Management.

Jeffery. Hoffer, ―Modern System Analysis And Design‖, Person Edu., New
Text 1. Delhi.
Books
2. Gary B. Shelly ―System Analysis And Design‖ Cengage Learning .
Dennis Alan, ―System Analysis and Design‖, Wiley Publications, John Wiley
1 & Sons, Inc Publication .
E Books
Charles S Wasson ―System Analysis and Design and Development ―John
2 Wiley & Sons, Inc Publication.
Hawryszkiewyez, I.T. Introduction to System Analysis and Design. Prentice
Referen 1. Hall of India
ce
Books Awadh. Elias M. ―Systems Analysis and Design‖, Prentice Hall of India, New
2. Delhi
On-line NPTEL Course :‖ Systems Analysis and Design‖
TL 1. https://nptel.ac.in/courses/106/108/106108102/
Material
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Artificial Neural Networks


Teaching Scheme Evaluation Scheme
Semester V
Theory Practical
Term EVEN Th Tu Pr Credits TAE CAE ESE INT EXT
Course
EL1
Category 3
NA NA 3 10 15 50 NA NA
Hrs
Course Code UAIL317
Teaching Offline/
75 --
Mode Online
3 Hrs Total
Duration of
2 Hrs. 75
ESE

Provide a sound and comprehensive understanding of artificial neural networks


Course Solve practical problems via implementation of these techniques via simulation;
Objectives
Promote further independent learning on the topics of artificial neural networks
and machine learning;
Upon successful completion of this course, student will be able to:
CO1: Understand the basics of Artificial Neural Networks
CO2: Identify different neural network architectures, algorithms, applications
and their limitations
Course CO3: Understand appropriate learning paradigms and its applications rules for
Outcomes each of the architectures and learn several neural network
CO4: Develop different single layer/multiple layer Perception learning
algorithms
CO5: Reveal different applications of these models to solve engineering and
other problems.
Mapping of Course Outcomes with Program Outcomes:
Program Outcomes
Course
Outcomes PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 3 -- -- -- -- -- -- -- -- -- -- 3 -- --
CO2 -- 3 2 -- -- -- -- -- -- -- -- -- -- --
CO3 -- -- 3 2 -- -- -- -- -- -- -- -- -- --
CO4 -- -- 2 3 3 -- -- -- -- -- -- -- 3 3
CO5 -- -- 3 3 3 2 -- -- -- -- -- 3 3 3
Course Contents:
Unit Contents Hours
Introduction to Artificial Neural Networks, Artificial Neuron Model and
Linear Regression, Gradient Descent Algorithm, Nonlinear Activation Units
I 6
and Learning Mechanisms, Learning Mechanisms-
Hebbian,Competitive,Boltzmann
Curriculum for B. Tech. in Computer Science and Engineering

Associative Memory Model, Condition for Perfect Recall in Associative


II Memory, Statistical Aspects of Learning, V.C. Dimensions: Typical 6
Examples Importance of V.C. Dimensions Structural Risk Minimization
Single-Layer Perceptions, Unconstrained Optimization: Gauss-Newton's
Method, Linear Least Squares Filters, Least Mean Squares Algorithm,
III Perceptron Convergence Theorem, Bayes Classifier & Perceptron: An 8
Analogy, Bayes Classifier for Gaussian Distribution, Back Propagation
Algorithm
Solution of Non-Linearly Separable Problems Using MLP, Heuristics For
Back-Propagation, Multi-Class Classification Using Multi-layered
IV Perceptrons, Radial Basis Function Networks: Cover's Theorem, 8
Regularization Networks and Generalized RBFComparison Between MLP
and RBF, Learning Mechanisms in RBF
Introduction to Principal Components and Analysis, Dimensionality reduction
V Using PCA, Hebbian-Based Principal Component Analysis, Introduction to 8
Self Organizing Maps, Cooperative and Adaptive Processes in SOM
*Note - TAE should include practical based assignment on Artificial Neural Networks

Neural Networks, Fuzzy Logic And Genetic Algorithm: Synthesis And


1.
Applications By S. Rajasekaran, G. A. Vijayalakshmi Pai. EEE
Text Book Simon O. Haykin, Neural Networks and Learning Machines, Pearson
2. Education
https://cours.etsmtl.ca/sys843/REFS/Books/ebook_Haykin09.pdf
Kevin Gurney, An Introduction to Artificial Neural Networks, UCL Press
Ltd.
1.
https://www.inf.ed.ac.uk/teaching/courses/nlu/assets/reading/Gurney_et_al.pd
E-Books f
Michael Nielsen, Neural Networks and Deep Learning
2. https://static.latexstudio.net/article/2018/0912/neuralnetworksanddeeplearning
.pdf
Deep Learning, by Ian Goodfellow and Yoshua Bengio, The MIT Press,
Reference 1.
2016.
Books
2. C. Bishop, Neural Networks and Machine Learning, Springer, 1998.
Online
1. https://nptel.ac.in/courses/117/105/117105084/
Material:
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: DIGITAL SIGNAL PROCESSING


Teaching Scheme Evaluation Scheme
Semester V
Theory Practical
Credi EX
Term Even Th Tu Pr TAE CAE ESE INT
ts T
Course
EL1 3
Category
Hrs NA NA 3 10 15 50 NA NA
Course
UECL307
Code
Teaching
Offline 75 --
Mode
3 Hrs Total
Duration of
2 Hrs 75
ESE

To study different types of signals and systems


Course To understand transformation tools for analysis of signals & systems
Objectives To learn design of various digital filters and use of DSP processor for real time
applications
Upon successful completion of this course, student will be able to:
CO1: Understand fundamentals and applications of discrete-time signals and
systems
CO2: Apply Z transform to discrete-time signals and systems
Course
CO3: Apply Fourier transform to discrete-time signals and systems
Outcomes
CO4: Design digital filters for discrete time signals for applications

CO5: Understand architecture and functioning of DSP processor for real time
applications

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outcomes
P P PO PO PO PO PO PO PO PO PO PO PS PS PS
O O 3 4 5 6 7 8 9 10 11 12 O1 O O3
1 2 2
CO1 3 3 3 2 2 -- -- -- -- -- 1 1 3 1 1
CO2 3 3 3 2 2 -- -- -- -- -- 1 1 3 1 1
CO3 3 3 3 2 2 -- -- -- -- -- 1 1 3 1 1
CO4 3 3 3 2 2 -- -- -- -- -- 1 1 3 1 1
CO5 3 3 3 2 2 -- -- -- -- -- 1 1 3 1 1
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:

Unit Contents Hours


Introduction: Introduction to discrete signals & Systems, Operations on
Discrete signals, Z- Transform representation, ROC, Z-transform properties,
I 8
Inverse Z-Transforms Methods, applications of Z- Transform & Inverse Z-
Transforms.
Transform Analysis of LTI Systems: Frequency analysis of discrete time
signals, Discrete Time Fourier Transform and Discrete Fourier Transform,
II Properties, Inverse Discrete Fourier Transform, Efficient Computation of DFT 8
using FFT algorithms, Linear Filtering approach to computation of DFT, FFT
of long sequences using overlap add and overlap save method.
Digital Systems Structures: Structures for FIR Systems and IIR Systems,
III 8
representation of Structures using Block diagram & Signal Flow Graph
Digital Filters: Design of IIR filters from analog filters using Impulse
Invariant Method, Bilinear Transformation, Matched Z-Transformation,
IV 8
Butterworth Approximation, Chebyshev, FIR filters design Methods-
Windowing, Hamming & Kaiser.
DSP Processor & Applications: Desirable Features of DSP Processors, Types
V of Architectures of DSP processor, Introduction to Multirate signal processing, 8
Adaptive filtering, Case study, Advanced topics based on course.

Digital Signal Processing, Principles, Algorithms, and Applications, J. G.


1.
Text Proakis and D. G. Manolakis, Prentice Hall, 2006,4th
Books Theory and Applications of Digital Signal Processing. R. Rabiner, and B.,
2.
Gold, Prentice Hall,2000,3rd
http://electronicsforu.com/resources/cool‐stuff‐misc/8‐free‐ebooks‐digital‐
1.
E--Books signal‐processing
2. http://www.freebookcentre.net/Electronics/DSP‐Books‐Download.html
Digital Signal Processing, A. V. Oppenheim and R. W. Schafer, Prentice
1.
Hall,1998
Understanding of Digital Signal Processing, Richards Lyons , Pearson, 2011,
2.
Reference 3rd Edition
Books Digital Filters: Analysis Design and Application, A. Antonion, Prentice
3.
Hall,1999,
Digital Signal Processing, A Computer based approach, S. K. Mitra, Mc Graw
4.
Hill, 4th edition
1. https://nptel.ac.in/courses/117102060/
https://freevideolectures.com/course/2499/elec3104-digital-signal-processing
on line TL http://eemedia.ee.unsw.edu.au/ELEC3104/index.htm
2
Material https://ocw.mit.edu/resources/res-6-008-digital-signal-processing-spring-
2011/study-materials/
https://nptel.ac.in/courses/108/105/108105055/ in reference books /web
3
resources
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Engineering Economics and Industrial Management


Teaching Scheme Evaluation Scheme
Semester V
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course
H
Category
2 NA NA 2 10 15 50 NA NA
Course
UHUL303
Code
Teaching
Offline 75 --
Mode
2 Hrs. Total
Duration of
2 Hrs. 75
ESE

Understanding of basic knowledge of Economics and its application.


Course Understanding of Management as discipline and its practices.
Objectives Strengthening knowledge of management in the functional area of Marketing and
Finance.
CO 1. Understand the basic concepts of Micro & Macro-Economics and its
applications
Course CO 2. Implement the fiscal policies for government organizations and NGO‘s
Outcomes CO 3. Analyzing the functions of Management and its importance
CO 4. Evaluate the marketing strategies.
CO 5. Formulate the scope of financial management.

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:
Course Program Outcomes and Program Specific Outcomes
Outcomes PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO1 PSO 1 PSO 2
0 1 2
CO1 -- -- 1 -- -- -- -- -- -- 2 2 -- -- 2
CO2 -- -- 2 -- -- -- -- -- 2 2 2 -- -- 2
CO3 -- -- 2 -- -- -- -- -- 2 2 3 -- -- 2
CO4 -- -- 3 -- -- -- -- -- 2 2 3 -- -- 2
CO5 -- -- 3 -- -- -- -- -- -- 2 3 -- -- 2

Course Contents:
Unit Contents Hours
Demand, Utility and Indifference curves, approach to Analysis of demand,
Elasticity of demand, Measure of demand elasticity, Factors of Production,
I Advertising elasticity. Market and Market Structures: Price and output 7
determination under perfect competition, monopolistic competition, oligopoly
& monopoly, Depreciation and methods for its determination.
Functions of central and commercial banks, Inflation, Deflation, Stagflation,
Direct and Indirect Taxes, New economic policy, Liberalization,
II 6
Globalization, Privatization, Monetary & Fiscal policies of the government,
Meaning and phases of business cycles.
Curriculum for B. Tech. in Computer Science and Engineering

Definition, nature and scope of Management, Functions of management -


III Planning, Organizing, Directing, Controlling, Principles of management, 5
Communication.
Meaning of Marketing management, concepts of marketing, Marketing Mix,
IV Service Marketing, Product Life Cycle, New Product Development, Pricing 7
strategies, Channels of distribution, Promotion Mix
Meaning, nature and scope of Financial Management, Sources of Financing,
V 5
Ratio Analysis. Time value of money.

Modern Economics Theory, by K.K. Dewett, S. Chand &


1.
company ltd., 3rd Edition, 2006
Essentials of Management by Harold Koontz & Hein & Weihrich
2.
Text Tata McGraw Hill Publishing, 7th Edition, 2008.
Books Marketing Management by Philip Kotler, Kevin Keller, 14th
3.
Edition, 2016.
Financial Management by M.Y. Khan & P.K. Jain, Tata McGraw
4.
Hill Publishing, 5th Edition, 2008.

http://164.100.133.129:81/econtent/Uploads/Managerial_Economics%20(1).p
1.
df [Economics]
http://164.100.133.129:81/econtent/Uploads/Financial_Management.pdf
2.
[Financial Management]
E--Books
1 Management by Stephen P. Robbins Mary A. Coulter, 14th Edition
Marketing Management by Ramaswamy V S and Namakumari,
2.
Macmillan India Ltd.
Financial Management by I M Pandey, Vikas Publishing House,
3.
New Delhi.
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Aptitude


Teaching Scheme Evaluation Scheme
Semester V
Theory Practical
Term EVEN Th Tu Pr Credits TAE CAE ESE INT EXT
Course A
Category
Course
UHUP 305 - - 2 1
Code -- -- -- 25 --
- -
Teaching
Offline -- 25
Mode
2 Total
Duration of
-- Hrs. 25
ESE

The Curriculum aims to equip students in order to apply quantitative reasoning and
Mathematical analysis methodologies to understand and solve problems.
The students shall attain conceptual clarity to comprehend reasoning questions in a
Course
simple way and arrive at decisions at a logical manner.
Objectives
The program intends to enhance student‘s Critical Thinking, Analytical,
Evaluative and Creative skills that make them best fit and sustain in the
corporate/competitive world.
CO 1. Students shall draw conclusions or make decisions based on analysis and
critique of quantitative information. This leads them to effectively justify the
conclusion and execute their plans.
CO 2. Students shall solve real life problems requiring interpretation and
Course comparison of various probabilities to ascertain the best outcomes expected.
Outcomes CO 3. Students shall identify logical relation to analyze, comprehend and apply
mathematical techniques instead of assumptions to different real time
situations.
CO 4. Shall solve the campus placements aptitude papers that qualifies them to
get employed.
Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:
Course Program Outcomes and Program Specific
Outcom Outcomes
es
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO1
CO2
CO3
CO4
CO5
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:

Unit Content Hours


No

I Orientation on syllabus, Emerging aptitude requirement, Pre-assessment on


4
existing knowledge

II Number System, Problem on Numbers, Ratio and Proportion, Averages,


6
Percentage, Profit/ Loss and Discount, Simple Interest and Compound Interest,

III Partnership, Mixtures and Allegations, Speed, Time & Distance, Time & Work,
Boats and Stream, Pipes and Cistern, Permutation & Combination, Probability, 6
Progression, Mensuration.

Text
1. Book on Aptitude and Verbal Ability- Global Education Ltd( Under Review)
Books
Reference 1. Quantitative Aptitude- R S Aggarwal - 2017 Edition- S. Chand
Books 2. Campus Recruitment- Paxis Group
E-Learning 1. Wifistudy,indiabix.com,freshers world, sawal.com,unacademy
Curriculum for B. Tech. in Computer Science and Engineering

Elective – II : Backend Programming(UCSL321), Data Mining(UCSL322)

Open Elective – II : Java Programming(UCSL325), Principles of Electronic Communication(UECL310),


Electric and Hybrid Electric Vehicles(UEEL310), Materials for Products Development(UMEL316),
Environmental Science(UCEL321), Business Communication(MBAL306)

Humanities Elective : Applied Life Skills for Progressive Excellence(UHUL306), Content Designing and
Media Fundamentals(UHUL307), Cyber Ethics and Moral Responsibility(UHUL308)
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Software Testing


Semester VI
Teaching Scheme Evaluation Scheme
Term EVEN
Theory Practical
Course Credit
C18 Th Tu Pr TAE CAE ESE Int Ext
Category s
UCSL3
Course 04/ 2 2
NA 3 10 15 50 25 NA
Code UCSP3 Hrs. Hrs.
04
Teaching
Offline 75 25
Mode
4 Hrs Total
Duration
2 Hrs 100
of ESE

This course introduces students the criteria for test cases while making them aware of
basic methods to design the test cases.
Course
It is also aimed at making students familiar with test management and test automation
Objective
techniques
s
The course also provides students an opportunity to get exposed to test metrics and
measurements
Upon successful completion of this course, student will be able to:
CO1: Identify bugs to create defect report of a given application.
Course CO2: Summarize test cases for different types and levels of testing.
Outcomes CO3: Illustrate test plan for an application.
CO4: Develop and validate a test plan.
CO5: Analyze software using automated testing tools.

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:
Course
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 -- 3 -- -- -- -- -- -- -- -- -- -- 2 --
CO2 -- -- 3 -- -- -- -- -- -- -- -- -- 1 --
CO3 -- -- -- 3 -- -- -- -- -- -- -- -- 2 --
CO4 -- -- 3 -- -- -- -- -- -- -- -- -- 2 2
CO5
-- -- -- -- 3 -- -- -- -- -- -- -- 2 2
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:
Unit Contents Hours
Unit – I: INTRODUCTION
Testing as an Engineering Activity – Testing as a Process – Testing axioms –
Basic definitions – Software Testing Principles – The Tester‟s Role in a 7
I Software Development Organization – Origins of Defects – Cost of defects –
Defect Classes – The Defect Repository and Test Design – Defect Examples –
Developer/Tester Support of Developing a Defect Repository – Defect
Prevention strategies.
Unit – II :TEST CASE DESIGN
Test case Design Strategies – Using Black Bod Approach to Test Case Design
– Random Testing – Requirements based testing – Boundary Value Analysis –
Equivalence Class Partitioning – Statebased testing – Cause-effect graphing –
II Compatibility testing – user documentation testing – domain testing – Using 7
White Box Approach to Test design – Test Adequacy Criteria – static testing
vs. structural testing – code functional testing – Coverage and Control Flow
Graphs – Covering Code Logic – Paths – code complexity testing –
Evaluating Test Adequacy Criteria.
UNIT III: LEVELS OF TESTING
The need for Levers of Testing – Unit Test – Unit Test Planning – Designing
the Unit Tests – The Test Harness – Running the Unit tests and Recording
results – Integration tests – Designing Integration Tests – Integration Test
III Planning – Scenario testing – Defect bash elimination System Testing – 7
Acceptance testing – Performance testing – Regression Testing –
Internationalization testing – Ad-hoc testing – Alpha, Beta Tests – Testing OO
systems – Usability and Accessibility testing – Configuration testing –
Compatibility testing – Testing the documentation – Website testing.
UNIT IV – TEST MANAGEMENT
People and organizational issues in testing – Organization structures for
testing teams – testing services – Test Planning – Test Plan Components – Test
IV Plan Attachments – Locating Test Items – test management – test process – 7
Reporting Test Results – The role of three groups in Test Planning and Policy
Development – Introducing the test specialist – Skills needed by a test
specialist – Building a Testing Group.
Unit V: TEST AUTOMATION
Software test automation – skill needed for automation – scope of automation
– Selenium Integrated Development Environment (IDE) design and
architecture for automation – requirements for a test tool – challenges in
V automation – Test metrics and measurements, Software Testing Matrix 7
Parameters- Requirement ID, Risks involved, Requirement type and
description, Unit test cases, Integration test cases, User Acceptance Test Cases
and Trace.
Advance Topic: (As per the instructor)

Srinivasan Desikan and Gopalaswamy Ramesh, ―Software Testing – Principles and


Text 1.
Practices‖, Pearson Education, 2006.
Books
2. Singh,Y.,Software Testing, Cambridge University Press, 2013
3. Ron Patton, ―Software Testing‖, Second Edition, Sams Publishing, Pearson
Curriculum for B. Tech. in Computer Science and Engineering

Education, 2007
Kshirasagar Naik ,Priyadarshi Tripathy, ― Software Testing And Quality
1
Assurance‖ A John Wiley & Sons, Inc., Publication
E--Books
Paul Ammann, Jeff Offutt, ―Introduction To Software Testing ― Cambridge
2
University Press
Glenford J. Myers, Corey Sandler, Tom Badgett. The Art of Software Testing, 3rd
Reference 1.
Edition
Books
2. Ron Patton, Software Testing, 2nd Edition, 2005
https://www.udemy.com/courses/development/software-testing/
On-line TL
1. https://process.spoken-tutorial.org/index.php/Software-Training
Material

Sr.
Name of Experiments / Mini Projects/ Case Studies
No.

1 Identify system specification and design test cases for simple calculator application.
2 Design Test cases for Purchase Order Management.
3 Design test cases for Inventory Management.
4 Design test cases for Railway Reservation Form
Identify system specification and design test cases for e-commerce(Flipcart, Amazon) login
5
form
Write a program and design test cases for the following control and decision making
statements
1) For…..Loop
6
2) Switch….Case
3) Do………While
4) If………Else
7 Prepare test plan for an identified mobile/notepad application.
Prepare defect report after executing testcases for library management system/amount
8
withdrawal from ATM machine/any login form.
9 Study and implementation of any Automated test management tool.
10 Design and run test cases for Wordpad/MS Word application using automated tool.
Open Ended Experiments / New Experiments
Take a mini project and execute it during SDLC create the various UML diagrams
1
required designing and all testing documents like test plan, TCD etc
2 Test Facebook Manually
Details of on line Laboratory Resource Material Instruction / Operating Manuals
1 http://vlabs.iitkgp.ernet.in/se/
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: UNSTRUCTURED DATABASE MANAGEMENT


Teaching Scheme Evaluation Scheme
Semester VI
Theory Practical
Term Even Th Tu Pr Credits TAE CAE ESE INT EXT
Course
C19
Category
UCSL3 2
NA 2 Hrs 3 10 15 50 25 NA
05 / Hrs
Course Code
UCSP3
05
Teaching Mode Online 75 25
4 Hrs Total
Duration of ESE 2 Hrs 100

To explore the emergence, requirements and benefits of a NoSQL database


To site principles behind the NoSQL databases, such as modern distributed database
Course
theory, P2P indexing or the Map Reduce programming model;
Objectives
To understand the basic architecture and data models of a NoSQL database (key-
value stores, document databases, column-family stores, graph databases);
Up on successful completion of this course, student will be able to:
CO1: To Differentiate between a relational database and a non-relational (NoSQL)
database
CO2: To Perform CRUD operations (create, read, update and delete) on data in
Course NoSQL environment
Outcomes CO3: To Define, compare and use the four types of NoSQL Databases (Document-
oriented, Key Value Pairs, Column-oriented and Graph).
CO4: To Demonstrate an understanding of the detailed architecture, define objects,
load data, query data and performance tune Column-oriented NoSQL databases.
CO5: To implement the advanced unstructured database management techniques

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:
Course Program Outcomes and Program Specific Outcomes
Outcome P PO PO PO PO P PO PO PO PO PO11 PO1 PS PS
s O 2 3 4 5 O6 7 8 9 10 2 O O2
1 1
CO1 2 3 -- -- 3 1 -- -- -- -- 3 2 -- 2
CO2 2 -- 3 -- 3 1 -- -- -- -- 3 2 -- 1
CO3 2 -- -- 3 3 1 -- -- -- -- 3 2 -- 2
CO4 2 -- 3 -- 3 1 -- -- -- -- 3 2 -- 2
CO5 2 -- 3 -- 3 1 -- -- -- -- 3 2 -- 2
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:
Unit Contents Hours
Introduction:
Overview, and History of NoSQL Databases Definition of the Four Types of
NoSQL Database, The Value of Relational Databases, Getting at Persistent
I 6
Data, Concurrency, Integration, Impedance Mismatch, Application and
Integration Databases, Attack of the Clusters, The Emergence of NoSQL, Key
Points
Comparison of relational databases to new NoSQL stores, MongoDB,
Cassandra, HBASE, Neo4j use and deployment, Application, RDBMS
approach, Challenges NoSQL approach, Key-Value and Document Data
II Models, Column-Family Stores, Aggregate-Oriented Databases, Replication 8
and sharding, MapReduce on databases. Distribution Models, Single Server,
Sharding, Master-Slave Replication, Peer-to-Peer Replication, Combining
Sharding and Replication
NoSQL Key/Value databases using MongoDB, Document Databases, What Is
a Document Database? Features, Consistency, Transactions, Availability,
Query Features, Scaling, Suitable Use Cases, Event Logging, Content
III Management Systems, Blogging Platforms, Web Analytics or Real-Time 8
Analytics, E-Commerce Applications, When Not to Use, Complex
Transactions Spanning Different Operations, Queries against Varying
Aggregate Structure.
Column- oriented NoSQL databases using Apache HBASE, Column-oriented
NoSQL databases using Apache Cassandra, Architecture of HBASE, What Is a
Column-Family Data Store? Features, Consistency, Transactions, Availability,
IV 6
Query Features, Scaling, Suitable Use Cases, Event Logging, Content
Management Systems, Blogging Platforms, Counters, Expiring Usage, When
Not to Use, Introduction to Bigdata and hadoop
NoSQL Key/Value databases using Riak, Key-Value Databases, What Is a
Key-Value Store, Key-Value Store Features, Consistency, Transactions, Query
Features, Structure of Data, Scaling, Suitable Use Cases, Storing Session
V 8
Information, User Profiles, Preferences, Shopping Cart Data, When Not to
Use, Relationships among Data, Multioperation Transactions, Query by Data,
Operations by Sets, Any case study.

NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot


1.
Persistence , Author: Sadalage, P. & Fowler, Publication: Pearson Education
Shashank Tiwari. Professional NoSQL. John Wiley and Sons. ISBN: 978-0-
2.
470-94224-6.
Text
3 Peter Membrey, David How, Eelco Plugge, MongoDB Basics, Apress, 2014
Books
4 Shakuntala Gupta, Edward Sabharwal, Practical Mongo DB, Apress, 2015
5 Jean Isson, Unstructured Data Analytics, Wiley, 2018
6 Ben Smith, Beginning JSON, Apress,2015
Managing Multimedia and Unstructured Data in the Oracle Database: A
revolutionary approach by Marcelle Kratochvil
E-Books 1.
https://www.pdfdrive.com/managing-multimedia-and-unstructured-data-in-
the-oracle-database-a-revolutionary-approach-to-understanding-managing-
Curriculum for B. Tech. in Computer Science and Engineering

and-delivering-digital-objects-assets-and-all-types-of-data-e185839907.html
Reference Name: Redmond, E. &Wilson, Author: Seven Databases in Seven Weeks: A
1.
Books Guide to Modern Databases and the NoSQL Movement Edition: 1st Edition.
On line TL
1. https://nptel.ac.in/courses/106/104/106104189/
Material

Name of Practical
Sr.
(The practical’s are divided into tools: MongoDB and Cassandra.)
No.
1 Installation and setup of MongoDB client and server
Create a database and collection using MongoDB environment. For example a
document collection meant for analyzing Restaurant records can have fields like
restaurant_id, restaurant_name, customer_name, locality, date, cuisine, grade,
2 comments. etc.
Create database using INSERT, UPDATE, UPSERTS, DELETE and INDEX.
Practice writing simple MongoDB queries such as displaying all the records, display
selected records with conditions
Experiment with MongoDB comparison and logical query operators - $gt, $gte, $lt,
3
$lte, $in, #nin, $ne, $and, $or, $not
Practice exercise on element, array based and evaluation query operators -$exists,
4
$type, $mod, $regex
5 Exercise on MongoDB shell commands and user management
Installation and configuration of Cassandra. Find out two use cases where Cassandra is
6
preferred over MongoDB
Create database in Casandra using – Create, Alter and Drop. Add records using Inset,
7
Update, Delete and Truncate.
Exercise based on Cassandra Query Language i.e. selecting records, select records with
8
specific conditions
9 Mini-project
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Machine Learning Algorithms


Teaching Scheme Evaluation Scheme
Semester III
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course
C
Category 3 - 2 4 10 15 50 25 -
UAIL202A
Course Code
UAIP202A
Teaching
75 25
Mode 5 Total
Duration of
2 hrs 100
ESE

The objectives of the course is to introduce students about the basic of machine
Course learning algorithms.
Objectives
To understand nature of the problem and apply suitable machine learning algorithm
CO1 : Understand modern notions in machine learning and computing
CO2 : Understand a wide variety of learning algorithms
CO3 : Be capable of confidently applying common Machine Learning algorithms in
Course
practice and implementing their own
Outcomes
CO4 : Evaluate Machine Learning Models generated from data
CO5 : Apply the algorithms to a real problem, optimize the models learned and report
on the expected accuracy that can be achieved by applying the models

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course
Outcomes PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO 2
CO1 2 2 2 2
CO2 3 2
CO3 3 2 2
CO4 3 3 2
CO5 3 3 3 3 3
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:

Unit Contents Hours


Introduction: Basic definitions, types of learning, hypothesis space and
I 6
inductive bias, evaluation, cross-validation
Linear regression, Decision trees, over fitting Instance based learning, Feature
II 8
reduction, Collaborative filtering based recommendation
Probability and Bayes learning ,Logistic Regression, Support Vector Machine,
III 8
Kernel function and Kernel SVM
Computational learning theory, PAC learning model, Sample complexity, VC
IV 6
Dimension, Ensemble learning
V Clustering: k-means, adaptive hierarchical clustering, Gaussian mixture model 6

1. Mitchell Tom, Machine Learning. McGraw Hill, 1997.


Text Introduction to machine learning, Ethem Alpaydin. —2nd ed., The MIT Press,
2.
Books Cambridge, Massachusetts, London, England.
3. Chris Bishop, Pattern Recognition and Machine Learning
Trevor Hastie, Robert Tibshirani, Jerome Friedman, The Elements of
1.
Statistical Learning Data Mining, Inference, and Prediction
Reference Richard O. Duda, Peter E. Hart, David G. Stork. Pattern classification, Wiley,
2.
Books New York, 2001.
Machine Learning: The Art and Science of Algorithms that Make Sense of
3.
Data (1st Edition) – Peter Falch
1 https://www.coursera.org/learn/machine-learning
On line TL
2 https://www.udemy.com/course/machinelearning/
Material
3 https://nptel.ac.in/courses/106/105/106105152/

LIST OF PRACTICAL

Name of Subject: MACHINE LEARNING ALGORITHMS Sem:


VI
COURSE OUTCOME
CO1 Understand complexity of Machine Learning algorithms and their limitations
CO2 Understand modern notions in machine learning and computing
CO3 Be capable of confidently applying common Machine Learning algorithms in practice and
implementing their own
CO4 Be capable of performing experiments in Machine Learning using real-world data
Curriculum for B. Tech. in Computer Science and Engineering

Sr. Mapping
Practical List Mapping with PO & PSO
no. with CO
1 Implement a program for Linear CO1,CO2
PO1,PO2,PO3 and PSO1,PSO2
Regression
2 Implement a program for Decision Tree CO3,CO4 PO1,PO2,PO3,PO4,PO5,PO11,PO12
and PSO1,PSO2
3 Implement the concept of K-Nearest CO1,CO2 PO1,PO2,PO3,PO4,PO5,PO11,PO12
neighborhood Algorithm and PSO1,PSO2
4 Implement a program for Principle CO3,CO4 PO1,PO2,PO3,PO4,PO5,PO11,PO12
Component Analysis and PSO1,PSO2
5 Implement the concept of Logistic CO1,CO2 PO1,PO2,PO3,PO4,PO5,PO11,PO12
Regression and PSO1,PSO2
6 Implement the concept of Naïve Bayes CO3,CO4 PO1,PO2,PO3,PO4,PO5,PO11,PO12
Algorithm and PSO1,PSO2
7 Demonstrate use of Clustering: using k- CO3,CO4 PO1,PO2,PO3,PO4,PO5,PO11,PO12
means algorithm through python program and PSO1,PSO2
Practical Beyond Syllabus
8 Exploring Virtual Lab CO3,CO4 PO1,PO2,PO3,PO4,PO5,PO6,PO7 ,
PO11,PO12 and PSO2
Curriculum for B. Tech. in Computer Science and Engineering

ELECTIVE-II
Course Title: BACKEND PROGRAMMING
Teaching Scheme Evaluation Scheme
Semester VI
Theory Practical
Term Even Th Tu Pr Credits TAE CAE ESE INT EXT
Course
EL2
Category 3
NA NA 3 10 15 50 NA NA
Course Hrs
UCSL321
Code
Teaching
Offline 75 --
Mode
3 Hrs Total
Duration
2 Hrs 75
of ESE

To understand various languages for backend programing


To develop a scalable and reliable backend web applications that can handle
Course high volume concurrent connections, which is the need of modern day web
Objectives application
To make industry-ready engineer who can be readily deployed in a projects
related to backend programming
Up on successful completion of this course, student will be able to:
CO1: Create small programs using basic PHP and NodeJS concepts
CO2: Apply In-Built and Create User defined functions in PHP and Java Script
programming.
Course
CO3: Design and develop a Web site using form controls for presenting web
Outcomes
based content.
CO4: Debug the program by applying concepts and error handling techniques.
CO5: Create dynamic Website/ Web based Applications, using PHP, MySQL,
NodeJS.

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:
Course Program Outcomes and Program Specific Outcomes
Outcome PO PO PO PO PO PO PO P P PO PO PO PSO PSO
s 1 2 3 4 5 6 7 O8 O9 10 11 12 1 2
CO1 -- 3 -- -- 2 -- -- -- -- -- 3 2 2 2
CO2 -- -- 3 -- 3 -- -- -- -- -- 3 2 1 1
CO3 -- -- 3 3 -- -- -- -- -- 3 2 2 3
CO4 -- -- 3 -- 3 -- -- -- -- -- 3 2 2 1
CO5 -- -- 3 -- 3 -- -- -- -- -- 3 2 2 3
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:
Unit Contents Hours
Introduction to backend programming and various backend programming
languages such as PHP, Python, Ruby, Java, Rust, C# etc, brief introduction of
I 6
all with integrated frameworks. Foundation Paradigms: OOPs, Design
Patterns, Object Oriented Design, JSON, DOM, AJAX
Introduction to PHP, Configuration of PHP, Apache Web Server, MySQL and
Open Source, Relationship between Apache, MySQL and PHP (AMP Module),
Installing PHP for (Windows, Wamp server , XAMP server) Apache Web
II 6
Server, MySQL and Open Source Relationship between Apache, MySQL and
PHP(AMP Module), Installing PHP for (Windows, Wamp server , XAMP
server)
Concepts and Installation of MySQL, MySQL structure and syntax, Types of
MySQL tables and Storage engines, MySQL commands, Integration of PHP
III with MySQL, Connection to the MySQL Database, Creating and Deleting 6
MySQL database using PHP, Updating, Inserting, Deleting records in the
MySQL database, Hosting Website (Using ‗C‘ panel, Using Filezilla Software)
Express Framework: Introduction to Express Framework, Introduction to
Nodejs, What is Nodejs, Getting Started with Express, Express Routing,
IV Implementing MVC in Express, Middleware, Using Template Engines, Error 6
Handling, API Handling, Debugging, Developing Template Engines, Using
Process Managers, Security & Deployment
Node.js: Node Core, Node Modules, File System, Debugger, Automation and
V 6
Deployment

1. Beginning PHP and MySQL, 4th Edition, W. Jason Gilmore, Apress, 2010
Text 2. PHP: The Complete Reference, Steven Holzner, McGraw-Hill, 2008
Books Practical Node.js: Building Real-World Scalable Web Apps 1st Edition by
3.
Azat Mardan, Apress
Web programming for business : PHP object-oriented programming with
oracle by Paper & David
E-Books 1.
https://www.pdfdrive.com/web-programming-for-business-php-object-
oriented-programming-with-oracle-e199764860.html
Learning PHP, MySQL, JavaScript, CSS & HTML5, Third Edition, Robin
1.
Nixon, O'reilly Media , 2014
Reference
Teach yourself PHP, MySQL and Apache All in One , 5th Edition, Julie C.
Books 2.
Meloni, Pearson Education, 2012
3. Mastering Node.js by Sandro Pasquali, Packt Publishing
On line TL
1. https://nptel.ac.in/courses/106/106/106106156/
Material
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: DATA MINING


Teaching Scheme Evaluation Scheme
Semester VI
Theory Practical
Term Even Th Tu Pr Credits TAE CAE ESE INT EXT
Course
EL1
Category 3
NA NA 3 10 15 50 NA NA
Course Hrs
UCSL322
Code
Teaching
Offline 75 --
Mode
3 Hrs Total
Duration
2 Hrs 75
of ESE

To identify the scope and essentiality of Data Mining.


Course To analyze data, choose relevant models and algorithms for respective
Objectives applications.
To develop research interest towards advances in data mining
Up on successful completion of this course, student will be able to:
CO1: Understand Data and Data Mining Principles
CO2: Illustrate frequent pattern mining methods, such as Apriori, ECLAT, and
Course FPgrowth.
Outcomes CO3: Apply different data mining techniques for classification and prediction.
CO4: Learn popular algorithms for cluster analysis.
CO5: Identify appropriate data mining algorithms to solve real world
problems

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:
Course Program Outcomes and Program Specific Outcomes
Outcome PO PO PO PO PO PO PO PO PO PO PO PO PSO PS
s 1 2 3 4 5 6 7 8 9 10 11 12 1 O2
CO1 -- 3 2 -- -- -- -- -- -- -- -- 2 -- --
CO2 2 3 3 2 2 -- -- -- -- -- -- 2 -- --
CO3 2 3 3 3 3 -- -- -- -- -- -- 2 3 2
CO4 2 3 3 3 3 -- -- -- -- -- -- 2 3 2
CO5 3 3 3 3 3 2 -- -- -- -- -- 2 3 3

Course Contents:
Unit Contents Hours
Introduction to data mining: What is Data Mining? What is the Data Mining
I Process? Basic Data Mining Tasks, Problem Identification, Data Mining 6
Metrics, Data Cleaning (pre-processing, feature selection, data reduction,
Curriculum for B. Tech. in Computer Science and Engineering

feature encoding, noise and missing values, etc.), Key Issues, Opportunities for
Data Mining.
Mining frequent patterns, associations and correlations: Basic concepts,
efficient and scalable frequent item set mining algorithms, mining various
II 6
kinds of association rules – multilevel and multidimensional, association rule
mining versus correlation analysis, constraint based association mining.
Classification and prediction: Definition, decision tree induction, Bayesian
classification, rule based classification, classification by backpropagation and
III 8
support vector machines, associative classification, lazy learners, prediction,
accuracy and error measures.
Cluster analysis: Definition, clustering algorithms - partitioning, hierarchical,
density based, grid based and model based; Clustering high dimensional data,
IV 8
constraint based cluster analysis, outlier analysis – density based and distance
based
Data mining on complex data and applications: Algorithms for mining of
V spatial data, multimedia data, text data; Data mining applications, social 8
impacts of data mining, trends in data mining.

Han, J. and Kamber, M., ―Data Mining - Concepts and Techniques‖, 3rd Ed.,
1.
Text Morgan Kaufmann Series.
Books Ali, A. B. M. S. and Wasimi, S. A., ―Data Mining - Methods and
2.
Techniques‖, Cengage Publishers
Mining the Social Web Data Mining Facebook Twitter LinkedIn Instagram
by Matthew A. Russell & Mikhail Klassen
E-Book 1.
https://www.pdfdrive.com/mining-the-social-web-data-mining-facebook-
twitter-linkedin-instagram-e185781408.html
Tan, P.N., Steinbach, M. and Kumar, V., ―Introduction to Data Mining‖,
Reference 1.
Addison Wesley – Pearson.
Books
2. Pujari, A. K., ―Data Mining Techniques‖, 4th Ed., Sangam Books.
On line TL
1. https://nptel.ac.in/courses/106/105/106105174/
Material
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Natural Language Processing


Teaching Scheme Evaluation Scheme
Semester VI
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course
C
Category 3
-- -- 3 10 15 50 -- --
Course UAIL302/ Hrs
Code UAIP302
Teaching
Offline 75 --
Mode
3 Hrs Total
Duration of
2 Hrs 75
ESE

1. Introduces students to leading trends and systems in natural language


processing
Course 2. To grasp the significance of natural language processing in solving real-world
Objectives problems.
3. To learn and employ historical NLP-based analytic techniques to a specific
problem.
Upon successful completion of this course, student will be able to:
CO1: Understand key concepts from NLP those are used to describe and analyze
language.
CO2: Capable to describe the application based on natural language processing
Course and to show the points of syntactic, semantic and pragmatic processing.
Outcomes CO3: Demonstrate the state-of-the-art algorithms and techniques for text-based
processing of natural language with respect to morphology.
CO4: Perform POS tagging for a given natural language and select a suitable
language modelling technique based on the structure of the language.
CO5: Adapt the current method for statistical approaches to machine translation.

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:
Course Program Outcomes and Program Specific Outcomes
Outcomes PO PO PO PO PO PO PO PO PO PO PO PO PSO PS
1 2 3 4 5 6 7 8 9 10 11 12 1 O2
CO1 -- -- 3 -- -- -- -- -- -- -- -- -- -- --
CO2 2 -- -- -- -- -- -- -- -- -- -- -- 3 --
CO3 -- -- 3 3 3 -- -- -- -- -- -- -- 3 --
CO4 -- -- 3 3 3 -- -- -- -- -- -- -- 3 3
CO5 -- -- 3 3 3 -- -- -- -- -- -- -- 3 3
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:

Unit Contents Hours


Introduction To NLP: Basic Concepts and Terminologies in NLP,
Knowledge in Speech and Language Processing, Ambiguity, Models and
I Algorithms, Language, Thought and Understanding, History, Open Problems, 8
Practical NLP Applications: Sentiment Analysis, Aspect Based Sentiment
Analysis and Opinion Mining, Audio and Speech Processing.
Linguistic Essentials: Parts of Speech and Morphology, Phrase Structure,
Semantics and Pragmatics, Corpora, Text Pre-Processing and Exploratory
II 7
Analysis, Tokenization, Stemming, Removing Stop Words, Grammatical
Tagging, N-Gram Models, Evaluating Language Models, Smoothing.
Word Sense Disambiguation: Supervised, Dictionary-Based, Unsupervised,
Evaluation Measures, Semantic Similarity, The Role of Lexical Acquisition in
III 7
Statistical NLP, Named Entity Recognition, Word Vectors, Skip-Gram
Model, Sentence2vec, Doc2vec, One-Hot Encoding.
Part-Of-Speech Tagging: The Information Sources in Tagging, Markov
Model, Hidden Markov Model, Transformation-Based Learning of Tags,
IV 7
Other Methods, Tagging Accuracy and Uses of Taggers, Pragmatics, Machine
Translation.
Finding Meaning in Word Counts (Semantic Analysis): Bag of Words,
Vectorizing, From Word Counts to Topic Scores, Latent Semantic Analysis,
V Singular Value Decomposition, Principal Component Analysis, Latent 7
Dirichlet Allocation, Distance and Similarity. Evaluating Precision, Recall, F-
measure, Test Sets and Cross-validation.
Curriculum for B. Tech. in Computer Science and Engineering
Hobson Lane, Cole Howard, Hannes Hapke, Natural Language Processing in
1. Action Understanding, Analyzing, and Generating text with Python, Manning,
1st edition, March 2019, ISBN 9781617294631.
Daniel Jurafsky and James H. Martin, Speech and Language Processing: An
Books
2. Introduction to Natural Language Processing, Computational Linguistics and
Speech Recognition, Prentice-Hall, Inc. 2009, ISBN 9780131873216.
Chris Manning and Hinrich Schütze, Foundations of Statistical Natural
3.
Language Processing, MIT Press. May 1999. ISBN 026213360l.
1. Applied Natural Language Processing, by Dr. Ramasesan R, CMI Publication.
E--Books Natural Language Processing with Python – Analyzing Text with the Natural
2.
Language Toolkit
Daniel Jurafsky and James H. Martin, Speech and Language Processing: An
1. Introduction to Natural Language Processing, Computational Linguistics and
Speech Recognition, Third Edition, Prentice-Hall, Inc. 2020.
Rajesh Arumugam, Rajalingappaa Shanmugamani, Hands-On Natural
2. Language Processing with Python, July 2018, Packt Publishing, ISBN:
Reference 9781789139495.
Books Natural Language Processing with Python: Analysing Text with the Natural
3. Language Toolkit by Steven Bird, Ewan Klein, Edward Loper, O'Reilly
Publication
Allen James, Lebanon, Natural Language Understanding, Second Edition,
4
Indian Publication
5 Charniack, Eugene, Statistical Language Learning, MIT Press
NPTE: Natural Language Processing
1.
URL: https://nptel.ac.in/courses/106/105/106105158/
NPTEL: Applied Natural Language Processing
2.
URL: https://nptel.ac.in/courses/106/106/106106211/
DataCamp : Natural Language Processing in Python
3. URL: https://www.datacamp.com/tracks/natural-language-processing-in-
python
https://algorithmia.com/blog/introduction-to-natural-language-processing
4
On line TL
Material https://www.udacity.com/course/natural-language-processing-nanodegree--
5
nd892
https://www.coursera.org/specializations/natural-language-processing?
6
https://towardsdatascience.com/a-practitioners-guide-to-naturallanguage-
7
processing-part-i-processing-understanding-text-9f4abfd13e72
https://www.edx.org/professional-certificate/ucx-text-analytics-with-
8 python?index=product&queryID=bb493076be10a28439efc6c81257b083&pos
ition=4
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Fuzzy Logic


Semester VI
Teaching Scheme Evaluation Scheme
Term EVEN
Theory Practical
Course
EL2 Th Tu Pr Credits TAE CAE ESE Int Ext
Category
Course 3
UCSL333
Code Hrs NA NA 3 10 15 50 NA NA
Teaching
Offline
Mode
75 --
Duration 3 Hrs Total
2 Hrs 75
of ESE

To understand basic theory of neural network and fuzzy logic


Course To describe artificial neural networks and fuzzy theory
Objectives To apply and analyze Associate Memories, and Fuzzy sets and Fuzzy Logic
system components
CO1: To understand and describe classical sets and fuzzy sets
CO2: To understand and describe classical relation and fuzzy relations
Course
CO3: To analyze and apply fuzzy rule based system
Outcomes
CO4: To analyze and apply fuzzy decision making
CO5: To understand fuzzy logic system components

Course Program Outcomes and Program Specific Outcomes


Outcomes
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 3 1 1 -- -- 1 1 -- -- -- 3 3 2 --
CO2 2 3 2 1 1 -- -- 2 2 -- 3 3 2 1
CO3 1 2 3 1 3 -- -- 2 -- -- 2 2 2 3
CO4 2 2 3 1 3 1 -- 3 -- 1 2 2 3 2
CO5 1 2 2 1 2 2 2 -- -- 1 2 2 3 --
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:
Unit Contents Hours
Introduction of Classical Sets and Fuzzy Sets Statistics and Random
Processes, Uncertainty in Information, Fuzzy Sets and Membership, Chance
I versus Ambiguity. Classical Sets - Operations on Classical Sets, Properties of 6
Classical (Crisp) Sets, Mapping of Classical Sets to Functions Fuzzy Sets -
Fuzzy Set operations, Properties of Fuzzy Sets.
Classical Relations and Fuzzy Relations: Cartesian Product, Crisp Relations-
Cardinality of Crisp Relations, Operations on Crisp Relations, Properties of
Crisp Relations, Composition. Fuzzy Relations - Cardinality of Fuzzy
Relations, Operations on Fuzzy Relations, Properties of Fuzzy Relations,
II 6
Fuzzy Cartesian Product and Composition, Non-interactive Fuzzy Sets. Crisp
Equivalence Relation, Crisp Tolerance Relation, Fuzzy Tolerance and
Equivalence Relations. Value Assignments - Cosine Amplitude, Max-min
Method, Other Similarity methods
Fuzzy Rule- Based Systems: Natural Language, Linguistic Hedges, Rule-
Based Systems - Canonical Rule Forms, Decomposition of Compound Rules,
III 6
Aggregation of Fuzzy Rules, Graphical Techniques of Inference

Fuzzy Decision Making: Fuzzy Synthetic Evaluation, Fuzzy Ordering, Multi


objective Decision Making, Fuzzy Bayesian Decision Method, Decision
IV 6
Making under Fuzzy States and Fuzzy Actions.

Fuzzy Logic System Components: Fuzzification, Membership Value


assignment, development of rule base and decision making system,
Defuzzification to crisp sets, Defuzzification methods. Neural Network
V Applications: Process identification, Fraction Approximation, Control and 6
Process Monitoring, Fault diagnosis and Load forecasting. Fuzzy logic
applications: Fuzzy logic control and Fuzzy classification.

Fuzzy Sets and Fuzzy Logic: Theory And Applications, 1st Edition by George J
1.
Klir and Bo Yuan, Pearson India
Text Fuzzy systems Design Principles By: Riza C. Berkan and Sheldon L. Trubateh.
Books 2. Pub: Standard Publishers and Distributors. Delhi.
3 Kosoko, Neural Networks and Fuzzy Systems, PHI Publications
Fuzzy Set Theory and Its Applications Fourth Edition H.-J. Zimmermann
Springer Science+Business Media, LLC,
1
https://cours.etsmtl.ca/sys843/REFS/Books/ZimmermannFuzzySetTheory2001.p
E df
Books Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering
Nikola K. Kasabov A Bradford Book The MIT Press Cambridge, Massachusetts
2
London, England Second printing, Massachusetts Institute of Technology,
http://boente.eti.br/fuzzy/ebook-fuzzy-kazabov.pdf
Referen Neural Network, Fuzzy Logic and Genetic Algorithm Synthesis and Application,
1.
ce By S. Rajasekaran, G. A. Vijayalakshmi Pai, PHI 2011
Curriculum for B. Tech. in Computer Science and Engineering

Books Neural Networks and Artificial Intelligence for Biomedical Engineering.


2. By: Donna L. Hudson and Maurice E. Cohen. , Pub: Prentice Hall of India. Pvt.
Ltd. New Delhi.
Fuzzy Logic With Engineering Applications Third Edition Timothy J. Ross
3
University of New Mexico, USA
1. https://nptel.ac.in/courses/127/105/127105006/
On-line
TL
2 https://onlinecourses.nptel.ac.in/noc21_ge07/preview
Materia
l
3 http://aisii.azc.uam.mx/mcbc/Cursos/IntCompt/Lectura15.pdf
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Open Elective – II


Evaluation Scheme
Semester IV Teaching Scheme
Theory Practical
Term EVEN Th Tu Pr Credits TAE CAE ESE INT EXT
Course
Category OE2
2
NA NA 2 10 15 50 NA NA
Course Hrs
UCSLX
Code XX
NPTEL/
Teaching
SWAYA 75 --
Mode
M 2 Hrs Total
Duration of
2 Hrs 75
ESE
To be offered based on courses available on NPTEL/SWAYAM

Course Title: Java Programming (Open Elective-II)


Evaluation Scheme
Semester VI Teaching Scheme
Theory Practical
Term EVEN Th Tu Pr Credits TAE CAE ESE INT EXT
Course
C
Category
2 -- - 2 10 15 50 --- --
Course
UISL301
Code
Teaching
Offline 75
Mode
3 Hrs Total
Duration of
3 Hrs 75
ESE

Course 1. To teach principles of object oriented programming paradigm including abstraction,


Objectives encapsulation, inheritance and polymorphism.

2. To impart fundamentals of object-oriented programming in Java, including defining classes,


invoking methods, using class libraries, etc.

3. To inculcate concepts of inheritance to create new classes from existing one & Design the
classes needed given a problem specification;

1. Analyze the necessity for Object Oriented Programming paradigm over structured
Course programming and become familiar with the fundamental concepts in OOP like encapsulation,
Outcome Inheritance and Polymorphism.
Curriculum for B. Tech. in Computer Science and Engineering

s 2. Design and develop java programs, analyze, and interpret object oriented data and report
results

3. Design an object oriented system, AWT components and multithreaded processes as per
needs and specifications.

4. Participate and succeed in competitive examinations like GATE, Engineering services,


recruitment interviews etc.

Course Contents:

Unit Contents Hours


JAVA BASICS: 6

I Review of Object oriented concepts, History of Java, Java buzzwords, JVM architecture, Data
types, Variables, Scope and life time of variables, arrays, operators, control statements, type
conversion and casting, simple java program, Constructors, methods.

II Constructors and I/O streams: 6


Constructors, methods, Static block, Static Data, Static Method String and String Buffer Classes,
Using Java API Document.
I / O STREAMS: Concepts of streams, Stream classes- Byte and Character stream, Reading
console Input and Writing Console output, File Handling.
Inheritance and Polymorphism: 7
III
Basic concepts, Types of inheritance, Member access rules, Usage of this and Super key word,
Method Overloading, Method overriding, Abstract classes, Dynamic method dispatch, Usage of
final keyword. PACKAGES AND INTERFACES: Defining package, Access protection, importing
packages, Defining and Implementing interfaces, and Extending interfaces.
Exception Handling 7
IV
Exception types, Usage of Try, Catch, Throw, Throws and Finally keywords, Built-in Exceptions,
Creating own Exception classes .MULTI THREADING: Concepts of Thread, Thread life cycle,
creating threads using Thread class and Runnable interface, Synchronization, Thread priorities,
Inter Thread communication.

1. Herbert schildt (2010), The complete reference, 7th edition, Tata Mc graw Hill,
Text Books New Delhi

2. Core Java Volume 1- Fundamentals(11th Edition)

1. Head First Java, O‘rielly publications


Reference Books
2. T. Budd (2009), An Introduction to Object Oriented Programming, 3rd edition,
PearsonEducation, India.

On-line TL https://nptel.ac.in/courses
Material
Curriculum for B. Tech. in Computer Science and Engineering

Sr. No. Name of Experiments


Implement a Java program to find the average, sum, minimum and max of the N numbers using
1 user input.

Implement a Java program to create a simple class to find the area and perimeter of rectangle.
2
Implement a Java program to to design a class account using the inheritance and static that
3 show all function of bank (withdrawal, deposit) and generate account number dynamically.

Implement a Java program to design a class Shape(implement Runtime polymorphism) using


4 abstract Methods and classes.

Implement a Java program to design a string class that perform string methods (equal, reverse,
5 change case etc.).

Implement a Java program to handle the exception using try and catch block.
6
Implement a Java program for Throw and Throws.
7
Implement a Java program to that shows the partial implementation of interface(calculation of
8 salary of employee).
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Understanding Human Values


Teaching Scheme Evaluation Scheme
Semester VI
Theory Practical
Term EVEN Th Tu Pr Credits TAE CAE ESE INT EXT
Course Category H
3 -- -- 3 10 15 50 -- --
Course Code UHUL304

Teaching Mode 75 --
3 Total
Duration of ESE 2 Hrs. 75

Development of a holistic perspective based on self- exploration about


themselves (human being), family, society and nature/existence
Understanding (or developing clarity) of the harmony in the human being,
Course Objectives
family, society and nature/existence
Strengthening of self-reflection and development of commitment and courage
to act.
CO1: Students are expected to become more aware of themselves.
CO2: Students are expected to become more aware of their surroundings
(family, society, nature).
CO3: Students should become more responsible in life, and in handling
problems with sustainable solutions, while keeping human relationships and
Course Outcomes human nature in mind.
CO4: Students would have better critical ability, they would also become
sensitive to their commitment towards what they have understood (human
values, human relationship and human society).
CO5: Students would be able to apply what they have learnt to their own self
in different day-to-day settings in real life.
Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Outcomes Program Outcomes and Program Specific Outcomes


PO PO PO PO PO PO PO PO PO PO PO PO12 PS PSO PSO3
O1 2
1 2 3 4 5 6 7 8 9 10 11
CO1 2 3 1 2
CO2 3 2 2 2 2
CO3 3 3 3 2
CO4 2 2 2 2
CO5 1 1 1 2 3
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:

Unit Contents Hours


Course Introduction - Need, Basic Guidelines, Content and Process for
Value Education:
Purpose and motivation for the course, Self-Exploration, Continuous
I 8
Happiness and Prosperity, Right understanding relationship and
physical facility, Understanding happiness and prosperity correctly,
Method to fulfill the above human aspirations.
Understanding Harmony in the Human Being - Harmony in Myself!
Understanding human being as a co-existence of the sentient ‗I‘ and the
material ‗Body‘, Understanding the needs of Self (‗I‘) and ‗Body‘,
II 8
Understanding the Body as an instrument of ‗I‘, Understanding the
characteristics and activities of ‗I‘ and harmony in ‗I‘, Understanding
the harmony of I with the Body.
Understanding Harmony in the Family and Society- Harmony in Human-
Human Relationship
Understanding values in human-human relationship, Understanding the
III 8
meaning of Trust, Understanding the meaning of Respect,
Understanding the harmony in the society, Visualizing a universal
harmonious order in society
Understanding Harmony in the Nature and Existence - Whole existence as
Coexistence
IV Understanding the harmony in the Nature, Interconnectedness and 8
mutual fulfilment among the four orders of nature, Understanding
Existence as Co-existence, Holistic perception of harmony
Implications of the above Holistic Understanding of Harmony on
Professional Ethics
Natural acceptance of human values, Definitiveness of Ethical Human
V Conduct, Basis for Humanistic Education, Humanistic Constitution and 8
Humanistic Universal Order, Competence in professional ethics,
Strategy for transition from the present state to Universal Human
Order: a) At the level of individual, b) At the level of society.

Text Human Values and Professional Ethics by R R Gaur, R Sangal, G P


1.
Books Bagaria, Excel Books,New Delhi, 2010
JeevanVidya: EkParichaya, A Nagaraj, JeevanVidyaPrakashan,
1.
Amarkantak, 1999.
A Foundation Course in Human Values & Professional Teachings , Rajiv
2.
Sangal
Human Values, A.N. Tripathi, New Age Intl. Publishers, New Delhi,
Reference 3.
2004.
Books 4. The Story of Stuff (Book)
The Story of My Experiments with Truth - by Mohandas Karamchand
5.
Gandhi.
6. Small is Beautiful - E. F Schumacher.
7. Slow is Beautiful - Cecile Andrews
Curriculum for B. Tech. in Computer Science and Engineering

8. Economy of Permanence - J C Kumarappa


9. Bharat Mein Angreji Raj – Pandit Sunderlal
10. Rediscovering India - by Dharampal
11. Hind Swaraj or Indian Home Rule - by Mohandas K. Gandhi
12. India Wins Freedom - Maulana Abdul Kalam Azad
13. Vivekananda - Romain Rolland (English)
Gandhi - Romain Rolland (English)

Course Title: Employability Skills


Teaching Scheme Evaluation Scheme
Semester VI
Theory Practical
Credit TA
Term EVEN Th Tu Pr CAE ESE INT EXT
s E
Course
A
Category
-- -- 2 1 25 --
Course
UHUP302
Code
Teaching
-- 25
Mode
2 Total
Duration
3 Hrs. 25
of ESE

To introduce them with the current market scenarios


Course To equip the students with the essential skills for employability
Objectives To demonstrate self-sufficiency to be highly employable or venture their
start-ups
CO1:Students shall exhibit their ability to set clear and realistic professional
objective
CO2:Enabling them to make well informed choices and commercially
equipped
Course CO3:Master Verbal (LSRW) and non-verbalcommunication skills required
Outcomes in the process of recruitment
CO4:Students shall exhibit improved Interpersonal skills for better
professional conduct
CO5:Students shall exercise higher order thinking skills, creativity skills,
convincing and Negotiation skills
Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outcomes PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO PSO
1 2 3
1 2 3 4 5 6 7 8 9 10 11 12
CO1 3
CO2 3 3 3
CO3 3
C04 3 3 3 3
C05 3 3 3
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:

Unit Contents Hours


Orientation - Researching Job and Company- Emerging Market
Trends:Experience sharing of Major Campus interviews, Skill
I 4
Requirements, Current Market trends, Researching the Job and
company
Personal and company commercial:Guidelines for preparing a 30-
90 second self Introduction .Questions to think about in developing
a commercial Understand " What to avoid" in a commercial -
Self Selling Proficiency: What to say and do, How to demonstrate
commercial awareness in an interview ,Post Interview activity,
II 6
Telephone etiquette in a phone Interview Resume Building
:Guidelines on framing resume and cover letter Checklist to ensure
completeness , Sample resumes and cover letter references
Basic Guidelines on Video Resume an its difference with
conventional
Verbal and Non-Verbal Communication:Format of Business
Correspondence, Email and Letter writing etiquette, Hands on
training on email and letter writing with case study, Body Language
in an Interview- Dos' and Donts', Tips and techniques on Essay
III 6
Writing How to knot the crux
on Essay writingPractise on some common essay writing topics in
an interview - Voice Versant Neutralization : Voice Modulation,
Pitch and tone training and Accent Neutralization
Personal Interview- Group Discussion: Preparation tips on GD
and Extempore: Dos' and Donts', Presentation on PI Preparation and
IV 4
FAQs -Role Plays/ Mock Interview with Technical Faculty and
Mock Interview by Faculty Assessment and feedback series:

Text
1. Employability Book – Global Education Ltd( Under Review)
Books
Reference 1. Employability Skills by NIMI Chennai, First Edition Aug 2019
Books 2. What employers wants by Karen Holmes, March 2017 Edition
Udemy , Coursera, Alison, Edx, WPA Apprentice, Hubspot,
E-Learning 1.
Codecademy
Curriculum for B. Tech. in Computer Science and Engineering

Course Title: Campus Recruitment Training


Evaluation Scheme
Semester VI Teaching Scheme
Theory Practical
TA
Term EVEN Th Tu Pr Credits CAE ESE INT EXT
E
Course
A
Category
-- - 2 1 -- -- -- 25 --
Course UHUP301
-
Code
Teaching
Offline -- 25
Mode
2Hrs. Total
Duration of
-- 25
ESE

The Curriculum aims to equip students in order to apply quantitative reasoningand


Mathematical analysis methodologies to understand and solve problems.
The students shall attain conceptual clarity to comprehend reasoning questionsin a
Course
simple way and arrive at decisions at a logical manner.
Objectives
The program intends to enhance student‘s Critical Thinking, Analytical, Evaluative and
Creative skills that make them best fit and sustain in the corporate/competitive world.

CO 1. Students shall draw conclusions or make decisions based on analysis


and critique of quantitative information. This leads them to effectivelyjustify the
conclusion and execute their plans.
CO 2. Students shall solve real life problems requiring interpretation andcomparison of
Course various probabilities to ascertain the best outcomes expected.
Outcomes CO 3. Students shall identify logical relation to analyze, comprehend and apply
mathematical techniques instead of assumptions to different real time situations.

CO 4. Shall solve the campus placements aptitude papers that qualifies them toget
employed.

Mapping of Course Outcomes with Program Outcomes and Program


Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outco
mes PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO1
CO2
CO3
Curriculum for B. Tech. in Computer Science and Engineering

Course Contents:
Unit Contents Hours
Blood Relation, Direction, Analogy, Puzzles, Seating Arrangement,
I 6
Syllogism,
Clocks, Calendar, Cubes & Dices, Coding and Decoding, Spatial and 2-D
II 6
Ability, Data Sufficiency, Number Series
Table chart, pie chart, bar graph and line graph, problems based on the
various data , such as combination of gender, city, profession, salary, sports,
III 6
vehicle, problems based on Pie chart, degree of fraction occupied by the
commodity, line chart and bar chart

Text Book on Aptitude and Verbal Ability- Global Education Ltd


1.
Books (Under Review)
Reference 1. Quantitative Aptitude- R S Aggarwal - 2017 Edition- S. Chand
Books 2. Campus Recruitment- Paxis Group
E-Learning 1. Wifistudy,indiabix.com,freshers world, sawal.com,unacademy

. No. Name of Experiments / Mini Projects/ Case Studies


1 Program should be based on Natural Language Understanding
(Lexical Ambiguity, Syntactical Ambiguity, Referential Ambiguity)
2 Program should be based on Natural Language Generation
3 Program should be based on Errors Detection and Corrections
4 Program should be based on Sentence Framing
5 Program should be based on Part-of-Speech (POS) tagging
6 Program should be based on Lexical Semantics
7 Program should be based on Dependency Parsing
8 Program should be based on Text Classification
9 Program should be based on NLP Applications
Open Ended Experiments / New Experiments
1 Develop NLP Model to find stemming in other than English Language
2 Study and understand the BERT Model
3 Study and understand Google‘s LaMDA Model
Details of on line Laboratory Resource Material Instruction / Operating Manuals
1. N-Grams Smoothing Virtual Lab
URL: https://nlp-iiith.vlabs.ac.in/
2. Summarize a chunk of text to a summary of a user's preference
URL: http://vlabs.iitb.ac.in/vlabs-
dev/vlab_bootcamp/bootcamp/The_Big_Bang_Nerds/labs/exp1/index.html
3. Online Lab at GitHub
URL: https://github.com/virtual-labs/natural-language-processing-iiith
4 Sowmya Vajjala, Bodhisattwa Majumder, Anuj Gupta, Harshit Surana, Practical
Natural Language Processing: A Comprehensive Guide to Building Real-World
NLP Systems, O'Reilly Media, 2020: First Edition, ISBN: 9781492054054.
Curriculum for B. Tech. in Computer Science and Engineering

5 Rajesh Arumugam, Rajalingappaa Shanmugamani, Hands-On Natural Language


Processing with Python, Packt Publishing, July 2018, ISBN: 9781789139495.
6 Steven Bird, Ewan Klein, and Edward Loper, Natural Language Processing with
Python, O‘Reilly Media, Inc. June 2009: First Edition. ISBN: 9780596516499.
Curriculum for B.Tech in Computer Science and Engineering

Elective – III : Mobile Application Development(UCSL331), Virtual and Augmented


Reality(UAIL414), Blockchain Technology(UAIL313), Information Systems(UCSL411), Soft
Computing(UAIL301)

Elective – IV : Virtualized Container Platforms(UCSL416), Big Data Computing(UAIL305), Data


Engineering(UCSL417), Network Security Fundamentals (UCSL418)

Elective – V : Code Repository and Version Control System(UCSL421), Digital


Marketing(UCSL413), Deep Learning (UAIL411), Digital Forensics(UAIL443), Artificial
Intelligence & Expert Systems(UAIL421)

Elective – VI : AWS: Cloud Computing Services(UAIL324A), Project Management Methodologies


(UCSL426), Computer Graphics& Visualization(UCSL422), Secure Programming(UCSL427)
Curriculum for B.Tech in Computer Science and Engineering

Course Title: UCSL401 Computer System Security


Evaluation Scheme
Semester VII Teaching Scheme
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course
C
Category
3 NA 2 4 10 15 50 25 25
UCSL401/
Course Code
UCSP401
Teaching
Offline 75 50
Mode
3 Hrs Total
Duration of
2.5 Hrs 125
ESE
1. This course covers the fundamentals of computer systems security.
2. It introduces many different areas of security such as encryption, malicious code,
Authentication and access control, trusted computer systems, operating system and
Course
network security.
Objectives
3. The objective of this course is to provide students with a comprehensive overview
of the threats to computer security, technologies for security assurance, and
engineering approaches to security solutions.
Up on successful completion of this course, student will be able to:
CO 1: Understand the basic concepts and goals of Information security such as
Confidentiality, Integrity, Authentication, Non - Repudiation, Authorization, and
Availability and their relevance in various Contexts.
CO 2: Identify and design the various cryptographic algorithms for the appropriate
Course protection measures against malicious code.
Outcomes CO 3: Apply the modern principles of network security threats and determine efforts
to counter them.
CO 4: Analyze, implement and maintain security requirements and mechanisms in
various computer systems and networks.
CO 5: Design and apply the principles of trusted system to achieve the degree of
assurance.
Curriculum for B.Tech in Computer Science and Engineering

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outcomes PO PO PO PO PO PO1 PO PSO
PO1 PO2 PO3 PO9 PO11 PSO 2
4 5 6 7 8 0 12 1
CO1 2 - - - - - - - - - - - - -
CO2 2 3 3 - 2 - - - - - - - 2 -
CO3 2 2 2 - 3 - - - - - - - - 3
CO4 2 2 2 - - - - - - - - - 2 3
CO5 2 3 - - - - - - 3

Course Contents:

Unit Contents Hours


Introduction: attacks, services, mechanisms, security attacks, security services,
I a model for internet work security, encryption model, steganography, classical
8Hrs
encryption techniques, modern techniques - simplified DES, block cipher
principles, data encryption standard, strength of DES.
Confidentiality using conventional encryption: placement of encryption
II function, traffic confidentiality, key distribution. Public key cryptography:
7Hrs
principles, RSA algorithm, key management, Diffie-Hellman key exchange,
elliptic curve cryptography, Chinese remainder theorem.
Message Authentication & hash functions: Authentication requirements,
functions, codes, hash functions, security of hash function & MACs. Hash &
III 8Hrs
Mac algorithms: MD5 message digest algorithm, authentication protocols,
digital signature standard.
Networks security practice: E-mail security: pretty Good privacy, S/MIME. IP
security: overview, architecture, authentication header, encapsulating security
IV 8Hrs
payload, combining security associations, key management. Computer Security
testing: Penetration Testing, Security Penetration Tools like Netsparker, Wireshark,
etc.
Web security: Requirements, secure electronic transaction, networks
management security. System Security: Intruders, viruses and worms,
V Firewalls: design principles, trusted systems. Privacy rules: Access, data 9Hrs
backup, test security systems and processes. Mobile/Cloud security issues and
challenges in futuristic web security applications.

1. Cryptography and networks security principles & practice 2/c by William


Text
Book Stalings (Pearson Education prentice Hall).
s 2. Networks security Essentials Applications & standards by William Stalings
Curriculum for B.Tech in Computer Science and Engineering

(Pearson Education, LPF).


3. Cryptography in C and C++ by Michael Welschenbach (A press IDG Books
India).
1. https://freecomputerbooks.com/compscspecialSecurityBooks.html
2. http://www.cs.unibo.it/~babaoglu/courses/security/resources/documents/Co
E- mputer_Security_Principles_and_Practice_(3rd_Edition).pdf
Book
3. http://www.uoitc.edu.iq/images/documents/informatics-
s
institute/exam_materials/Introduction%20to%20Computer%20Security%20p
df%20DONE.pdf
1. Introduction to Data Compression by Khalid Sayood (Morgan
Refer kaufmann/Harcourt India).
ence 2. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook
Book of Applied Cryptography, CRC Press.
s 3. Michael T. Goodrich and Roberto Tamassia, Introduction to Computer
Security, Addison Wesley, 2011.
1. https://ocw.mit.edu/courses/electrical-engineering-and-computer-
On science/6-858-computer-systems-security-fall-2014/download-course-
line materials/
TL 2. http://nptel.ac.in/courses/106105031/
Mate
rial 3. http://freevideolectures.com/Course/3027/Cryptography-and-Network-
Security

List of Practical:

Sr.
Name of Experiments (Programming Language: C++, Python)
No.
1 Perform encryption and decryption using Caesar cipher Algorithm.
2 Perform encryption and decryption using Play Fair Cipher.
3 Perform encryption and decryption using Rail Fence Technique. (Row Transposition Techniques)
4 Perform encryption and decryption using (Colunmar Transposition Techniques
5 Perform encryption and decryption using One Time Pad Algorithm.
6 Write a program to implement extended Euclidean Algorithm.
7 Write a program to Develop a Secure System by Applying RSA Cryptography Algorithms.
8 Write a C program to implement Digital signature algorithm
9 Write a Program to Implement Elliptic curve based Arithmetic.
10 Write a program to implement Diffie–Hellman Key Exchange.
11 Open source Tools
Curriculum for B.Tech in Computer Science and Engineering

COURSE TITLE: UCSL331 ELECTIVE-III: MOBILE APPLICATION DEVELOPMENT


Evaluation Scheme
Teaching Scheme
Theory Practical
Th Tu Pr Credits TAE CAE ESE Int Ext
3 - - 3 10 15 50 25 -

Student will be able to


Course Understand system requirements for mobile applications.
Objectives Generate suitable design using specific mobile development frameworks
Implement the design using specific mobile development frameworks
On Successful completion of the course, students shall be able to:
CO1: Describe the requirements for mobile application.
Course
CO2: Develop design for mobile applications for specific requirements
Outcomes
CO3: Implement the design using Android SDK
CO4: Deploy mobile applications in Android and iPone marketplace for distribution

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:
Course PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO PSO
Outcome 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO1 3 2 2 2 1 2 2

CO2 2 3 2 2 2 2 2

CO3 2 1 3 2 2 2 2

CO4 2 2 2 3 2 2 2

CO5 2 2 3 1 3 2 2

Course Contents:
Unit Contents Hours
INTRODUCTION: Introduction to mobile applications – Embedded systems -
I Market and business drivers for mobile applications – Publishing and delivery of 7
mobile applications – Requirements gathering and validation for mobile applications
BASIC DESIGN: Introduction – Basics of embedded systems design – Embedded
OS - Design constraints for mobile applications, both hardware and software related
II – Architecting mobile applications – user interfaces for mobile applications – touch 7
events and gestures – Achieving quality constraints – performance, usability,
security, availability and modifiability.
ADVANCED DESIGN: Designing applications with multimedia and web access
capabilities – Integration with GPS and social media networking applications –
III 8
Accessing applications hosted in a cloud computing environment – Design patterns
for mobile applications
Curriculum for B.Tech in Computer Science and Engineering

TECHNOLOGY I – ANDROID: Introduction – Establishing the development


environment – Android architecture – Activities and views – Interacting with UI –
IV Persisting data using SQLite – Packaging and deployment – Interaction with server 10
side applications – Using Google Maps, GPS and Wifi – Integration with social
media applications.
TECHNOLOGY II – IOS: Introduction to Objective C – iOS features – UI
implementation – Touch frameworks – Data persistence using Core Data and SQLite
V – Location aware applications using Core Location and Map Kit – Integrating 10
calendar and address book with social media application – Using Wifi - iPhone
marketplace.

Text 1. Jeff McWherter and Scott Gowell, Professional Mobile Application


Books Development, Wrox, 2012
Charlie Collins, Michael Galpin and Matthias Kappler, Android in Practice,
2.
DreamTech, 2012
Matthew Mehrtenson, iOS Programming: The Big Nerd Ranch Guide (6th
1.
Reference Edition), Big Nerd Ranch Guides, 2017
Books David Mark, Jack Nutting, Jeff LaMarche and Frederic Olsson, Beginning iOS 6
2.
Development: Exploring the iOS SDK, Apress, 2013.
On-line TL
1. http://developer.android.com/develop/index.html
Material
Curriculum for B.Tech in Computer Science and Engineering

BAIL442: Virtual and Augmented Reality


Teaching Scheme Evaluation Scheme
Total Theory Practical Total
Th Tu Pr Credits
Hours TAE CAE ESE Int Ext
3 - - 3 3 10 15 50 - - 75

To establish and cultivate a broad and comprehensive understanding of this


Course rapidly evolving and commercially viable field of Computer Science
Objectives To describes the fundamentals of sensation, perception, technical and
engineering aspects of virtual reality systems.
On completion of this course, the student will be able to:
CO1: Understand fundamental computer vision, computer graphics andhuman-
computer interaction techniques related to VR/AR
Course CO2: Understand geometric modeling and Virtual environment.
Outcomes
CO3: Relate and differentiate VR/AR technology.
CO4: Understand fundamentals of Augmented reality
CO5: Implement Virtual/Augmented Reality applications.

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes
Course PO PO PO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PSO1 P
Outcome 10 11 12
S
O
2
CO1 3 3 3

CO2 2 3

CO3 2 3

CO4 2 3 3
Course Contents:

UNIT CONTENTS HOURS


Introduction to Virtual Reality:
Defining Virtual Reality, History of VR, Human Physiology and
I Perception, Key Elements of Virtual Reality Experience, Virtual Reality
System, Interface to the Virtual World-Input & output- Visual, Aural &
7
Haptic Displays, Applications of Virtual Reality, Virtual environment
representation requirement.
Computer Graphics And Geometric Modeling:
Introduction, The Virtual world space, positioning the virtual observer, the
II perspective projection, human vision, stereo perspective projection, Color
theory, Conversion From 2D to 3D, 3D space curves, 3D boundary
representation, Simple 3D modeling, 3D clipping, Illumination models,
Reflection models, Shading algorithms. Geometric Models, Changing 7
Position and Orientation, Axis-Angle Representations of Rotation, Viewing
Transformations, Chaining the Transformations, Human Eye, eye
movements & implications for VR.
Virtual Environment:
Generic VR system: Introduction, Virtual environment, Computer
III environment, VR technology, Model of interaction, VR Systems. Animating
the Virtual Environment: Introduction, The dynamics of numbers, Linear and
Nonlinear interpolation, the animation of objects, linear and non-linear 7
translation, shape & object in between, free from deformation, particle
system. Physical Simulation: Introduction, Objects falling in a gravitational
field, Rotating wheels, Elastic collisions, projectiles, simple pendulum,
springs, Flight dynamics of an aircraft.
IV Augmented Reality:
Taxonomy, technology and features of augmented reality, difference
between AR and VR, Challenges with AR, AR systems and functionality, 7
Augmented reality methods, visualization techniques for augmented reality,
enhancing interactivity in AR environments, evaluating AR systems.
V Visual Perception : Rendering, Motion & Tracking
Visual Perception - Perception of Depth, Perception of Motion, Perception
of Color, Combining Sources of Information.
Visual Rendering -Ray Tracing and Shading Models, Rasterization, 8
Correcting Optical Distortions, Improving Latency and Frame Rates
Motion in Real and Virtual Worlds- Velocities and Accelerations, The
Vestibular System, Physics in the Virtual World, Mismatched Motion and
UAIL313- Blockchain Technology

Teaching Scheme Evaluation Scheme

Theory Practical Total

ES
Th Tu Pr Credits TAE CAE Int Ext
E

3 -- -- 3 3 10 15 50 -- 75

Course To understand the use and importance of Blockchain Technology


Objectives To understand use for Blockchain Technology in our domain

CO1: Familiarize the functional/operational aspects of cryptocurrency


ECOSYSTEM

Course CO2: Understand emerging abstract models for Blockchain Technology


Outcomes CO3: Identify major research challenges and technical gaps existing between
theory and practice in cryptocurrency domain

CO4: Identify more research challenges in this domain

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course
Outcomes
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
9 10 11 12 1 2
1 2 3 4 5 6 7 8

CO1 H H M M

CO2 H L

CO3 H H M M

CO4 H H M M

CO5 H M
Course Contents:

Unit Contents Hours

The consensus problem - Asynchronous Byzantine Agreement - AAP protocol


and its analysis - Nakamoto Consensus on permission-less, nameless, peer-to-
peer network - Abstract Models for BLOCKCHAIN - GARAY model - RLA
I 08
Model - Proof of Work ( PoW) as random oracle - formal treatment of
consistency, liveness and fairness - Proof of Stake ( PoS) based Chains - Hybrid
models ( PoW + PoS)

cryptographic basics for cryptocurrency - a short overview of Hashing,


II 12
signature schemes, encryption schemes and elliptic curve cryptography

Bitcoin - Wallet - Blocks - Merkley Tree - hardness of mining - transaction


III verifiability - anonymity - forks - double spending - mathematical analysis of 08
properties of Bitcoin.

Ethereum - Ethereum Virtual Machine ( EVM) - Wallets for Ethereum -


IV 08
Solidity - Smart Contracts - some attacks on smart contracts

(Trends and Topics) - Zero Knowledge proofs and protocols in Blockchain -


V Succinct non interactive argument for Knowledge ( SNARK) - pairing on 12
Elliptic curves - Zcash.

Text Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and
1 Steven Goldfeder. Bitcoin and cryptocurrency technologies: a
Books comprehensive introduction. Princeton University Press, 2016.

Joseph Bonneau et al, SoK: Research perspectives and challenges for


1 Bitcoin and cryptocurrency, IEEE Symposium on security and Privacy,
2015

J.A.Garay et al, The bitcoin backbone protocol - analysis and


Reference Books
2 applications EUROCRYPT 2015 LNCS VOl 9057, ( VOLII ), pp 281-
310

R.Pass et al, Analysis of Blockchain protocol in Asynchronous


3
networks , EUROCRYPT 2017, ( eprint.iacr.org/2016/454) .

On-line TL
https://nptel.ac.in/courses/106/104/106104220/
Material
Curriculum for B.Tech in Computer Science and Engineering

Course Title: UCSL411 Information System


Evaluation Scheme
Semester VII Teaching Scheme
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course Elective
Category -III
3 NA NA 3 10 15 50 NA NA
Course UCSL4
Code 11
Teaching
Offline 75
Mode
3 Hrs Total
Duration of
2.5 Hrs 75
ESE
1. Identify the fundamental concepts and key issues of the information systems
and role on information in enterprise.
Course 2. Describe various information systems within an enterprise view including the
Objectives enterprise strategy, business, application, information.
3. Analyze case studies that focus on issues of strategic value of the IS in order to
evaluate costs, benefits and risks of the project
Up on successful completion of this course, student will be able to:
CO 1: Describe the fundamental techniques of information system.
CO 2: Identify and explain risk and potential security issues.
Course CO 3: Evaluate information security tools and technologies to analyze different
Outcomes systems
CO 4: Understand the supply chain management and information sharing in an
organization
CO 5: Use of information system in designing business/IT solutions

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outcomes PO PO PO PO PO PO PO PO PO1 PO1 PO1
PO9 PSO 1 PSO 2
1 2 3 4 5 6 7 8 0 1 2

CO1 1 1 2 - - - - - - - - - 1 2

CO2 1 2 2 - - - - - - 3 - - 2 2

CO3 2 - - - 2 - 2 - - - - - 2 2

P a g e | 11
Curriculum for B.Tech in Computer Science and Engineering

CO4 2 - - 1 - 2 - - - - - - 2 2

CO5 2 - - - 2 - - - 2 - - 2 2 2

Course Contents:
Unit Contents Hours
Introduction to Information System: Resources and components of Information
System, integration and automation of business functions and developing
I business models. Role and advantages of Transaction Processing System, 9Hrs
Management Information System, Expert Systems and Artificial Intelligence,
Executive Support Systems and Strategic Information Systems
Malicious code and Attacks: malignant code, malware, logic bomb, trap door
II and Trojan horse, viruses, worms, rootkit, Modern malware, crypto worms
8Hrs
,Database security and access control, SQL injections, Inference attacks on
databases, Defenses.
Firewalls: Firewalls: design goals, access policy, limitations, filtering types,
III 7Hrs
configuration, & types, IDS: Different approaches, HIDS, NIDS
Information Security within Organizations: Categories, Survey of Functional
Systems, Competitive Strategy and Value Chains, Business Process Design E-
IV Commerce and Supply Chain Systems: WWW business, Web Technologies, 8Hrs
Supply Chain Management, Inter-Organizational Information Systems, Ethics
of Supply Chain Information Sharing.
Business Intelligence and Knowledge Management: Emerging Business/IT
Solutions, Data Warehouses and Data Marts, Data Mining, Knowledge
V Management. Information Systems Management: Design the Use of IT, 8Hrs
Controlling Computing Infrastructure, Enterprise Applications, Outsourcing,
User Rights and duties.

1. Fundamentals of Information Systems, Ralph Stair and George Reynolds;


ISBN-13 978-0840062185 or 978-1133629627
Text 2. Database Systems: A Practical Approach to Design,
Books
Implementation and Management. Connolly and C. Begg
3. Modern Systems Analysis and Design. Valacich and J. F. George
1. Discovering Information Systems An Exploratory Approach, Jean-Paul Van
E--Books Belle
2. Information Systems,Richard Thomas Watson
Reference 1. Introduction to Information Systems,P. Wallace
Books 2. Global Business Information Technology,G. Elliot and S. Starkings

P a g e | 12
Curriculum for B.Tech in Computer Science and Engineering

Course Title: UCSL413 Digital Marketing


Evaluation Scheme
Semester VII Teaching Scheme
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course Elective
Category -III
3 NA NA 3 10 15 50 NA NA
Course UCSL4
Code 13
Teaching
Offline 75 NA
Mode
3 Hrs Total
Duration of
2.5 Hrs 75
ESE
1. Understand digital marketing technologies.
Course
2. Get knowledge in the areas of digital marketing communications
Objectives
3. Learn methodologies, tools and technologies involved in digital marketing.
Up on successful completion of this course, student will be able to:
CO1: Understand the importance of the digital marketing for marketing success
CO2: Manage customer relationships across all digital channels and build better
Course customer relationships.
Outcomes CO3: Create a digital marketing plan, starting from the SWOT analysis and
defining a target group.
CO4: Identify digital channels, their advantages and limitations.
CO 5: Identify perceive ways of integration of various digital channels taking into
consideration the available budget.

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outcomes PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 2 - - - - - - - - - - - - -

CO2 2 3 3 - 2 - - - - - - - 2 -

CO3 1 2 2 - 3 - - - - - - - - 3

CO4 1 2 2 3 3 - - - - - - - 2 2

CO5 2 3 - 3 - - - - 2

P a g e | 13
Curriculum for B.Tech in Computer Science and Engineering

Course Contents:

Unit Contents Hours


Introduction: Introduction to Digital Marketing - Digital marketing:
Introduction to digital marketing, Difference between traditional marketing&
digital, Discussion on Ecommerce Discussion on new trends and current
scenario of the world, Digital marketing a boon or a Bane, Digital marketing a
tool of success for companies, Analysis of recent info graphics released by
I companies about digital marketing, Digital marketing channels, How did digital
9Hrs
marketing help the small companies and for marketing for the business,
Diagnosis of the present website and business, Swot analysis of business, present
website and media or promotion plan, Setting up vision, mission and goals of
digital marketing. Understanding a website: What is a website, Levels of
websites, Diff b/w Blog, Portal and Website, Difference between static and
dynamic websites.
Search Engine Optimization (SEO) –SEO: SEO audit and features of SEO, on-
II page optimization techniques, off-page Optimization techniques, Reports, 7Hrs
writing SEO content, Jobs in SEO
Social Media Optimization (SMO)– SMO: Introduction to Social Media
Marketing, Advanced Facebook Marketing, visual identity of the Facebook page,
Optimization of Instagram profile, Word Press blog creation, Twitter marketing,
III 9Hrs
LinkedIn Marketing, Creating a campaign on LinkedIn, Google plus marketing,
Social Media Analytical Tools, Web Analytics level, Creating business accounts
on YouTube.
Search Engine Marketing & Digital Marketing Budgeting – Search Engine
IV Marketing: Introduction to Search Engine Marketing, Tools used for Search
8Hrs
engine Marketing, Display advertising techniques, Report generation, Email
marketing, Email marketing plan, Email marketing campaign analysis.
V Digital Marketing Budgeting: Resource planning, cost estimating, cost
7Hrs
budgeting, cost control. Recent trends in Digital Marketing.

1. Ryan, D. (2014 ). Understanding Digital Marketing: Marketing Strategies for


Text Engaging the
Books 2. Digital Generation, Kogan Page Limited.
1. https://www.7boats.com/academy/wp-content/uploads/2016/10/50-shades-of-digital-
E-Books marketing.pdf
2. https://www.reliablesoft.net/free-marketing-ebooks/
Reference 1. Fundamentals of Digital Marketing, Second Edition, Pearson by Puneet Bhatia
Books 2. Digital Marketing Essentials You Always Wanted to Know by Vibrant Publishers.
1. https://www.digitalmarketer.com/digital-marketing/assets/pdf/ultimate-guide-to-
On line
digital-marketing.pdf
TL
2. https://www.7boats.com/academy/wp-content/uploads/2016/10/50-shades-of-digital-
Material
marketing.pdf

P a g e | 14
Curriculum for B.Tech in Computer Science and Engineering

Course Title: UCSL416 Virtualized Container Platforms


Evaluation Scheme
Semester VII Teaching Scheme
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course Elective-
Category IV 3 NA NA 3 10 15 50 NA NA
Course Code UCSL416
Teaching
Offline 75 NA
Mode
3 Hrs Total
Duration of
2.5 Hrs 75
ESE
1. To Understand the Features and Components of Docker and Kubernets
Course
2. Learn the architecture of containers and its configuration
Objectives
3. Learn the Docker networking with public and private registries
Up on successful completion of this course, student will be able to:
CO1: Understand different container types and virtual machines.
Course CO2: Build and maintain a container for a custom application.
Outcomes CO3: Design a secure container environment.
CO4: Configure networking between containers.
CO5: Use of micro services that adhere to DevOps best practices

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Program Outcomes and Program Specific Outcomes


Course
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO

P a g e | 15
Curriculum for B.Tech in Computer Science and Engineering

Outcomes 1 2 3 4 5 6 7 8 9 10 11 12 1 2

- - - - -
CO1 - 2 2 1 3 2 2 -
-
CO2 - - - - - -
1 2 3 1 3 3 2 3
- - - - - -
CO3 2 3 2 2 3 3 2 3
CO4 - - - - - - -
2 3 3 3 2 3 2
- - 3 2 1 - - 2 2 - 2 - 2 2
CO5

Course Contents:

Unit Contents Hours


Docker Overview: Definition, Features of Docker, Components of Docker,
I Docker for Windows, Docker ToolBox, Working with Docker Toolbox, 8Hrs
Docker-Hub, Docker-Images, Docker-Containers, Working with Containers
Docker Architecture: Architecture, Containers and Hosts, Docker Images,
II Running a Container, Listing All Containers, Stopping a Container, Docker- 8Hrs
Configuring: service Docker stop, service Docker start
Docker Containers: Docker Containers and Shells, Docker-File, Docker-Hub,
III Building Files, Public Repositories, Managing Ports, Private Registries, 8Hrs
Building a Web Server Docker File, Instructions, Container Linking, Storage
Docker Networking: Listing All Docker Networks, Inspecting a Docker
network, Creating Your Own New Network, Setting Node.js, MongoDB,
IV NGINX, Docker-Toolbox, Setting ASP.net, Docker-Cloud, Logging, Line 8Hrs
Charts, Compose, Continuous Integration, Kubernetes Architectures, Working
on Kubernetes
Micro Services and Operations: Micro services to DevOps best practices.
V Operationalize Micro services using Continuous Delivery and AWS Lambda,
8Hrs
understanding of Monitoring and Alerts. Components of DevOps best
practices.

1. Kubernetes and Docker - An Enterprise Guide: Effectively containerize


applications, integrate enterprise systems, and scale applications in your enterprise,
Text Packt Publishing; 1st edition (6 November 2020) by Scott Surovich and Marc
Books Boorshtein, ISBN: 183921340X
2. The Kubernetes Book, Packt Publishing Limited (28 June 2019), by Nigel Poulton
and Pushkar Joglekar, ISBN-13: 978-1838984380
E-- 1. https://www.qcmtech.com/wp-content/uploads/2017/09/HPE-pub-10010-

P a g e | 16
Curriculum for B.Tech in Computer Science and Engineering

Books Containers-for-Dummies.pdf
2. https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/ebook/vm
ware-press-ebook-on-containers-and-kubernetes.pdf
1. Kubernetes: The Complete Guide to Master Kubernetes (March 2019 Edition),
Referenc Independently Published (28 April 2019), By Josef D. Moore, ISBN-13: 978-1096165774
e Books 2. Cloud computing for dummies- Judith Hurwitz , Robin Bloor , Marcia Kaufman
,Fern Halper, Wiley Publishing, Inc, 2010
1. https://www.csu.edu.au/handbook/handbook19/subjects/ITE532.html
On line 2. https://www.classcentral.com/course/cloud-virtualization-containers-api-duke-
TL
40279
Material
3. https://www.coursera.org/learn/cloud-virtualization-containers-api-duke/home/info
Course Title: UCSL417 Data Engineering
Evaluation Scheme
Semester VII Teaching Scheme
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course Elective
Category -IV
3 NA NA 3 10 15 50 NA NA
Course Code UCSL4
17
Teaching
Offline 75 NA
Mode
3 Hrs Total
Duration of
2.5 Hrs 75
ESE
1. Present techniques for designing, building, and managing information with
relational databases, NoSQL databases, and big data infrastructure.
Course 2. Data Engineers are responsible for the creation and maintenance of the data
Objectives infrastructure that facilitates the analysis of data by Data Scientists.
3. Provides a hands-on experience running MongoDB, ProstgreSQL, Hadoop
ecosystem and Spark.
Up on successful completion of this course, student will be able to:
CO 1: Understand Learn the concepts of Data Engineering and differentiate it
from Data Science
CO 2: Identify Describe Hadoop’s and Spark’s role in big data and memory
Course processing of big data
Outcomes CO 3: Apply Describe NoSQL databases, explain the four types, and operate a
MongoDB database
CO 4: Analyze Summarize pros and cons of relational databases and SQL and
implement a Postgre SQL database.
CO 5: Design Collect data from the web and store it in SQL and NoSQL
databases.

P a g e | 17
Curriculum for B.Tech in Computer Science and Engineering

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outcomes PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 1 2 - - - - - - - - - - 1 2
CO2 2 2 2 - - - - - - 3 - - 2 2
CO3 2 - - - 2 - 2 - - - - - 2 2
CO4 2 - - 1 - 2 - - - - - - 2 2
CO5 2 - - - 2 - - - 2 - - 2 2 2

Course Contents:

Unit Contents Hours


Data Storage & Manipulation: Basics of Data & Information, Data
storage in fields, records & files. SQL Databases: Database Design, SQL
I Queries, Stored Procedures, ODBC/JDBC Server Connections, NoSQL Stores, 9Hrs
Key-Value Stores (H-Base), Document Store, HDFS, Document Store
MongoDB, Impala, Kudu, Time Series Databases.
Big Data : Introduction to big data, the difference between data science and
II data analytics, The 4Vs of Big Data, Big data usage, Planning to frame Big
8Hrs
data, The Problem With ETL, Scaling Upscaling Out, various applications of
Big data.
Data Warehouse & Hadoop: Data Warehouse basics, Data Lake, Hadoop
Platforms, fundamentals of Hadoop, Hadoop at work, Hadoop Ecosystem
III 8Hrs
Components, significance & applications of hadoop, Hadoop System
architecture, Hadoop Cluster, Hadoop Cluster Hardware.
Docker: Docker fundamentals and its applications, Kubernets Container
IV Deployment, How to create, start, stop a Container, Docker micro services, 7Hrs
Kubernets, Docker container orchestration.
Data Security: Requirements: ISO/OSI Model of data security, Firewalls,
V Security and Privacy, SSL Public & Private Key Certificates, certifying
8Hrs
authority, Privacy by design, Security in multi layered environment, Cluster
security with Kerberos, Kerberos Tickets.

1. Agile Data Warehouse Design: Collaborative Dimensional Modeling, from


Text Whiteboard to Star Schema by Lawrence Corr.
Books 2. Big Data: Principles and best practices of scalable realtime data systems by Nathan
Marz
1. Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable,
E--Books
and Maintainable Systems by Martin Kleppmann

P a g e | 18
Curriculum for B.Tech in Computer Science and Engineering

2. The Data Engineering Cookbook by Andreas Kretz


Reference 1. Computer Storage and Manipulation of Data,
Books DOI ttps://doi.org/10.1007/978-1-4612-0623-1_1

Course Title: UCSL418 Network Security Fundamentals


Evaluation Scheme
Semester VII Teaching Scheme
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course
Elective
Category -IV
3 NA NA 3 10 15 50 NA NA
Course Code UCSL4
18
Teaching
Offline 75 NA
Mode
3 Hrs Total
Duration of
2.5 Hrs 75
ESE
1. To understand the network security, services, attacks, mechanisms, types of
attacks on TCP/IP protocol suite.
Course
2. To comprehend and apply authentication services, authentication algorithms
Objectives
3. To understand the wireless network security threats, network layer security
protocols, Transport layer security protocols, Web security protocols.
Up on successful completion of this course, student will be able to:
CO1: Understand the fundamentals of network security, services, attacks,
mechanisms.
CO2: Apply appropriate mechanisms for protecting the network
Course
Outcomes CO3: Understand the wireless network security threats
CO 4: Understand and apply network layer, Transport layer and Web security
protocols
CO 5: Design a security solution for a given application, system with respect to
security of the system

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outcomes PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 2 - - - - - - - - - - - - -

CO2 2 3 3 - 2 - - - - - - - 2 -

P a g e | 19
Curriculum for B.Tech in Computer Science and Engineering

CO3 2 2 2 - 3 - - - - - - - - 3

CO4 2 2 2 - - - - - - - - - 2 3

CO5 2 3 - - - - - - 3

Course Contents:

Unit Contents Hours


Introduction: Overview of Network Security, Security services, attacks,
I Security Issues in TCP/IP suite- Sniffing, spoofing, buffer overflow, ARP
8Hrs
poisoning, ICMP Exploits, IP address spoofing, IP fragment attack, routing
exploits, UDP exploits, TCP exploits.
Authentication Services: Authentication requirements, Authentication
functions - Message Authentication Codes - Hash Functions - Security of Hash
II Functions and MACs - MD5 message Digest algorithm - Secure Hash 8Hrs
Algorithm - RIPEMD - HMAC Digital Signatures, Authentication protocols-
Kerberos, X.509.
IP Security-AH and ESP, SSL/TLS, SSH, Web Security-HTTPS, DNS
III 7Hrs
Security, Electronic Mail Security (PGP, S/MIME).
IV Security Mechanisms: Intruders, Viruses, Worms, Trojan horses, Distributed
7Hrs
Denial-Of-Service (DDoS), Firewalls, IDS, Honey nets, Honey pots
V Wireless Networks Security: Introduction to wireless network security, Risks
7Hrs
and Threats of Wireless networks, Wireless LAN Security (WEP, WPA).

1. Yang Xiao and Yi Pan, ―Security in Distributed and Networking Systems‖, World
Scientific, 2007, Chapter 1.
Text 2. Networks security Essentials Applications & standards by William Stalings
Books (Pearson Education, LPF).
3. W. Stallings, ―Cryptography and Network Security: Principles and Practice‖, 5/E,
Prentice Hall, 2013.
1. https://freecomputerbooks.com/compscspecialSecurityBooks.html
2. http://www.cs.unibo.it/~babaoglu/courses/security/resources/documents/Computer
E- _Security_Principles_and_Practice_(3rd_Edition).pdf
Books 3. http://www.uoitc.edu.iq/images/documents/informatics-
institute/exam_materials/Introduction%20to%20Computer%20Security%20pdf%2
0DONE.pdf
Refere 1. Aaron E. Earle, ―Wireless Security Handbook‖, Auerbach publications, Taylor &
nce Francis Group, 2006.
Books 2. Atul Kahate, ―Cryptography and Network Security‖, Tata McGraw-Hill, 2003.
On 1. https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-

P a g e | 20
Curriculum for B.Tech in Computer Science and Engineering

line computer-systems-security-fall-2014/download-course-materials/
TL 2. http://nptel.ac.in/courses/106105031/
Materi 3. http://freevideolectures.com/Course/3027/Cryptography-and-Network-Security
al
Course Title:
UCSL421 Code Repository and Version Control System
Evaluation Scheme
Semester VII Teaching Scheme
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course Elective
Category -V
3 NA NA 3 10 15 50 NA NA
UCSL4
Course Code
21
Teaching
Offline 75 NA
Mode
3 Hrs Total
Duration of
2.5 Hrs 75
ESE
1. This illustrate the Code Repository
Course 2. It introduces the concepts of Code Repository and Version Control System.
Objectives 3. The various controlling structures for organizing commits with tags and
branches
Up on successful completion of this course, student will be able to:
CO 1: Understand the concepts of Code Repository and Version Control System.
CO 2: Choose the appropriate Code Repository and Version Control System
Course
Outcomes CO 3: Apply the Version Control System for the given application system
CO 4: Illustrate the Code Repository
CO 5: Apply the various controlling structures for organizing commits with tags
and branches

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Cours Program Outcomes and Program Specific Outcomes


e
Outco PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
mes 1 2 3 4 5 6 7 8 9 10 11 12 1 2

CO1 - - - - - 2 - - - - - - - -
CO2 - - 3 - - - - - - - - - - -
CO3 - - - - 3 - - - - - - - - 3
CO4 - - - - 3 - - - - - - - 2 -
CO5 - - 3 - - - - - - - - - - 3

P a g e | 21
Curriculum for B.Tech in Computer Science and Engineering

Course Contents:

Unit Contents Hours


Purpose & Terminology: Introduction to Version Control, Version Control Types,
I Version Control Workflow, an Introduction of Basics Git terminology, Configure
8Hrs
Git from the command line, understand why developers use version control and
discover how you utilise Version Control in your daily life.
Create a Git Repo: Using Git clone copy an existing Git Repository, Analysis of
II
the current state of a repository with the powerful Git status, Create your first Git 7Hrs
repository with Git init
Review a Repo's History: Examine the commit history of a repo's Git log,
Customize the output of Git log's using command line flags in order to expose
III 7Hrs
more (or less) information about each commit, Use the Git show command to
display just one commit.
Add Commits to a Repo: Learn how to Use Git diff to discover what parts of a file
IV have been modified in a commit, learn how to Use gitignore to mark files as 7Hrs
"untracked", Learn the Git procedure and commits to a sample project
Tagging, Branching, and Merging: Jump to particular tags and branches using Git
V checkout, learn how to combine changes from different branches and smash those 7Hrs
pesky merge conflicts, Organize your commits with tags and branches

1. Pro Git, 2nd Edition (Scott Chacon)


Text
Learn Version Control with Git: A Step-by-Step Course for the Complete Beginner
Books 2.
by Tobias Gunther

E--Books 1. Version Control with Git, 2nd Edition by Jon Loeliger, Matthew McCullough

Reference
1. Version Control with Git, 2nd Edition by Jon Loeliger, Matthew McCullough.
Books

1. https://www.coursera.org/learn/version-control-with-git

On line TL https://www.careers360.com/courses-certifications/udacity-version-control-git-
2.
Material course

https://www.tutorialspoint.com/continuous_integration/continuous_integration_ver
3.
sion_control.htm

P a g e | 22
Course Title: UCSL422 Computer Graphics and Visualization
Evaluation Scheme
Semester VII Teaching Scheme
Theory Practical
Term ODD Th Tu Pr Credits
Curriculum TAEin Computer
for B.Tech CAE ESE and
Science INTEngineering
EXT
Course Elective
Category -VI
3 NA 3 10 15 50 NA NA
UCSL4
Course Code
22
Teaching
Offline 75 NA
Mode
3 Hrs Total
Duration of
2.5 Hrs 75
ESE
1. To acquaint the learner with the basic concepts of Computer Graphics
Course 2. To learn the various algorithms for generating and rendering graphical figures
Objectives 3. To get familiar with mathematics behind the graphical transformations and
apply various methods and techniques regarding projections, animation,
shading, illumination and lighting.
Up on successful completion of this course, student will be able to:
CO1: Apply mathematics and logic to develop Computer programs for elementary
graphic operations
CO2: Develop scientific and strategic approach to solve complex problems in the
Course domain of Computer Graphics
Outcomes
CO3: Develop the competency to understand the concepts related to Computer
Vision and Virtual reality
CO4: Apply the logic to develop animation and gaming programs
CO5: Understand the concept of polygon filling and clipping algorithms

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outcomes PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 2 - - - - - - - - - - - - -
CO2 2 3 3 - 2 - - - - - - - 2 -
CO3 2 2 2 - 3 - - - - - - - - 3
CO4 2 2 2 - - - - - - - - - 2 3
CO5 2 3 - - - - - - 3

P a g e | 23
Curriculum for B.Tech in Computer Science and Engineering

Course Contents:

Unit Contents Hours


Graphics Primitives and Scan Conversion:
Concepts, applications of computer graphics, pixel, frame buffer, resolution,
aspect ratio. Plotting Primitives: Scan conversions, lines, line segments,
vectors, pixels and frame buffers, vector generation Scan Conversion: Line and
I line segments, qualities of good line drawing algorithms, line drawing
9Hrs
algorithms: Digital Differential Analyzer (DDA), Bresenham and parallel line
algorithms, Line styles: thick, dotted and dashed. Circle drawing algorithm:
DDA, Bresenham. Character generating methods: stroke and bitmap method.
Display Files: display file structure, algorithms and display file interpreter.
Primitive operations on display file..
Polygons:
II Introduction to polygon, types: convex, concave and complex. Representation
7 Hrs
of polygon, Inside test, polygon filling algorithms–flood fill, seed fill, scan line
fill and filling with patterns..
Polygons Clipping Algorithms:
Windowing and clipping: viewing transformations, 2-D clipping: Cohen –
III 8 Hrs
Sutherland algorithm, Polygon clipping: Sutherland Hodgeman algorithm,
generalized clipping.
2-D Transformations, Animation:
2-D transformations: introduction, matrices, Translation, scaling, rotation,
IV homogeneous coordinates and matrix representation, translation, coordinate 8 Hrs
transformation, rotation about an arbitrary point, inverse and shear
transformation.
3-D Transformations, Animation:
3-D transformations: introduction, matrices, Translation, scaling, rotation,
homogeneous coordinates and matrix representation, translation, coordinate
transformation, rotation about an arbitrary point, inverse and shear
V 8 Hrs
transformation.
Animation: Introduction, Design of animation sequences, Animation
languages, Key-frame, Morphing, Motion specification. Colour models and
applications :Properties of Light, CIE chromaticity Diagram, RGB, HSV,
CMY, YIQ, colour Selection and applications.

1. 1. S. Harrington, ―Computer Graphics‖, 2nd Edition, McGraw-Hill


Publications, 1987, ISBN 0 –07 –100472 –6.
Text 2. 2. D. Rogers, ―Procedural Elements for Computer Graphics‖, 2nd Edition, Tata
Books
McGraw-Hill Publication, 2001, ISBN 0 –07 –047371 –4.
3. 3. Donald D. Hearn, ―Computer Graphics with Open GL‖, 4th Edition
1. https://open.umn.edu/opentextbooks/textbooks/420
2. http://www.cs.ucy.ac.cy/courses/EPL426/courses/eBooks/ComputerGraphicsPrin
E--Books
ciplesPractice.pdf
3. https://ia902203.us.archive.org/22/items/DonaldHearnM.PaulineBakerComputer

P a g e | 24
Curriculum for B.Tech in Computer Science and Engineering

GraphicsBookFi.org/%5BDonald_Hearn%2C_M._Pauline_Baker%5D_Compute
r_Graphics%28BookFi.org%29.pdf
1. 1. J. Foley, V. Dam, S. Feiner, J. Hughes, ―Computer Graphics Principles and
Practice‖, 2nd Edition, Pearson Education, 2003, ISBN 81 –7808 –038 –9.
Referenc 2. 2. D. Rogers, J. Adams, ―Mathematical Elements for Computer Graphics‖, 2nd
e Books Edition, Tata McGrawHill Publication, 2002, ISBN 0 –07 –048677 –8.
3. 3. Mario Zechner, Robert Green, ―Beginning Android 4 Games Development‖,
Apress, ISBN: 978-81-322-057
On line 1. https://nptel.ac.in/courses/106103224
TL 2. https://nptel.ac.in/courses/106102065
Material 3. https://www.udemy.com/course/computer_graphics_subject/

Course Title: UCSL426 Project Management Methodologies


Evaluation Scheme
Semester VII Teaching Scheme
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course
Elective-
Category VI
3 NA NA 3 10 15 50 NA NA
Course Code UCSL426

Teaching
Offline 75
Mode
3 Hrs Total
Duration of
2.5 Hrs 75
ESE
Course 1. Understand project management design, development, and deployment
Objectives 2. Use project management tools, techniques, and skills
3. Employ strategies to address the ubiquitous issue of resistance to change
After completion of the course student will be able to
CO 1: Identify and explain the components and process of resource management.
Course CO 2: Identify and explain the components and process of project evaluation and
Outcomes control
CO 3: Demonstrate ability to perform project management calculations
CO 4: Use Microsoft Project to manage projects
CO 5: Understand and analyze statistics and probabilities in business analysis

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


Outcomes PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO

P a g e | 25
Curriculum for B.Tech in Computer Science and Engineering

1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 2 - - - - - - - - - - - - -
CO2 2 3 3 - 2 - - - - - - - 2 -
CO3 2 2 2 - 3 - - - - - - - - 3
CO4 2 2 2 - - - - - - - 2 - 2 -
CO5 2 3 - - - - - - - - 2 - 3

Course Contents:

Unit Contents Hours


Introduce advanced methods and tools of project management : CPM/PERT,
Design Structure Matrix, System Dynamics, Critical Chain, Discrete Event
I Simulation, Earned Value Management,Project Learning,Resource allocation, 9Hrs
Risk and uncertainty, Budget constraints, Project feasibility, and Change
management..
Project Strategies: Understand realistic application of methods (strengths,
II limitations) and strategic issues Industry Examples (interspersed),Case Studies, 7Hrs
Risk Management, Real Options in Projects
Project Organizations: Program Management—managing multiple projects in
III parallel , International Project Management (geographically dispersed teams), 7Hrs
Project Manager soft skills and typical profiles
Project Management: Project Life Cycles, The Process Management Framework,
IV Project Integration Management, Scope Management, Time Management, Cost
7Hrs
Management, Quality Management, HR & Communications Management, Risk
Management, Agile software development through Scrum and Kanban.
Business Analysis and Decision Making: Sales & Marketing , Project
Management, Finance Fundamentals , MS Office Applications, Quality
Management, People Management, Time Management, Problem solving
V techniques, Understand concepts of mean & standard deviations, Use of statistics 10Hrs
and probabilities in business analysis , Qualitative and Quantitative forecasting ,
Business Modelling, Cost benefit and break even analysis, PERT (Program
Evaluation and Review Technique) and CPM (Critical Path Method)

1. Shore, David A., Launching and Leading Change Initiatives in Health Care
Organizations: Managing Successful Projects. San Francisco: Jossey-Bass,
Text 2014. ISBN 978-1-118-09914-8
Books 2. Gregory Horine, PMP, Project Management Absolute Beginner’s Guide, third
edition, published in October 2012.

P a g e | 26
Curriculum for B.Tech in Computer Science and Engineering

3. James P. Lewis , Fundamentals of Project Management, Published in 1995.


E--Books 1. https://cb.hbsp.harvard.edu/cbmp/access/42896665
On line 1. https://www.coursera.org/articles/project-management-books
TL 2. https://open.umn.edu/opentextbooks/textbooks/456
Material
Course Title: UCSL427 Secure Programming
Evaluation Scheme
Semester VII Teaching Scheme
Theory Practical
Term ODD Th Tu Pr Credits TAE CAE ESE INT EXT
Course Elective-
Category VI
3 NA NA 3 10 15 50 NA NA
UCSL41
Course Code
6
Teaching
Offline 75 NA
Mode
3 Hrs Total
Duration of
2.5 Hrs 75
ESE
4. To introduce the concepts of secure programming
Course 5. To develop skills to apply the security measures in real time applications
Objectives 6. To provide essential understanding of security APIs and use in various
Applications
Up on successful completion of this course, student will be able to:
CO1: Understand basic concepts of security and secure coding.
CO2: Use static and dynamic tools to identify programming faults.
Course
CO3: Implement web programming for real time application
Outcomes
CO4: Demonstrate security measures applicable for the Web Programming
Platforms
CO5: Design of security APIs using various tools for controlling resource usage

Mapping of Course Outcomes with Program Outcomes and Program Specific Outcomes:

Course Program Outcomes and Program Specific Outcomes


PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 - - - 2 2 - - 1 3 - 2 - 2 -
CO2 - - 1 2 3 - - 1 3 - 3 - 2 2
CO3 - - 2 3 2 - - 2 3 - 3 - 2 3
CO4 - - - 1 3 - - 3 2 - 1 - 3 2
CO5 - - 3 2 1 - - 2 2 - 2 - 3 2

P a g e | 27
Curriculum for B.Tech in Computer Science and Engineering

Course Contents:

Unit Contents Hours


Introduction: Introduction to Secure Programming, Philosophy of Secure Programming,
I Defining Secure Programming, Robust vs. Secure Programming, Security Policies and 6Hrs
Procedures, Checking Design and Implementation, Vulnerabilities
Secure Programming Techniques: Secure coding in C/C++: Classification of security
flaws: Landwehr’s taxonomy, The Fortify taxonomy, The Seven Pernicious Kingdoms,
OWASP Top Ten 2017. Protection methods at different layers: The PreDeCo matrix of
software security. Input validation, Improper error and exception handling, Improper error
II and exception handling. Secure programming techniques and common pitfalls, covering 10Hrs
in put validation, output filtering, use of cryptography and authentication. Standards such
as the OWASP guidelines and the CERT Secure Coding Standards.
Malware (including adware, spyware) and its use, software susceptibility, Programming
resilience against malware.
Low level/High level programming: Secure coding in JAVA: Injection, broken
authentication, XML external entity (XXE), Cross-Site Scripting (XSS), Insecure
deserialization, client site security: JavaScript security, Clickjacking, AJAX security,
HTML5 security, JAVA security services: SSL/TLS handshake, Java Secure Socket
III 8Hrs
Extension (JSSE), Common coding errors and susceptibility
Low-level programming platforms, VMs and their security measures, for example
including process isolation, capabilities and permissions. Mobile operating system
platforms as examples
Web Programming: SECURITY IN PROGRAMMING: Defensive coding; Immutability;
Design by contract; Validation (origin, size, bounds, lexical, syntactic, and semantic
checking); Integrity maintenance (defensive copying, failing fast, managing exceptions);
IV Secure error handling; Mitigating data leaks; Reducing complexity. 8Hrs
Web programming platforms and security specifications, HTTP protocol, forms, client
side and server-side issues and their avoidance. High-level and Enterprise security
programming, including cryptography via cryptographic libraries, authentication via
GSSAPI.
Security APIs: Security APIs and their differentiation from cryptography APIs. Use and
design of security APIs for key management, hashing and encryption. Implementation in
hardware and software.
V Language-based techniques in Secure programming with dynamic enforcement through
8Hrs
runtime monitoring and static enforcement along with program analysis. Example tools.
Process and tools for taint checking and information flow tracking in sensitive data
management, Privacy threats in encapsulation. Measures and tools for controlling
resource usage : permissions and capabilities, static analysis

Text 1. J. Viega and G. McGraw. Building Secure Software: How to Avoid Security
Books Problems the Right Way. Addison-Wesley, 2001.

P a g e | 28
Curriculum for B.Tech in Computer Science and Engineering

2. M. Howard and D. LeBlanc. Writing Secure Code. Microsoft Press, second


edition, 2003.
3. David Basin, Patrick Schaller, Michael Schlapfer. Applied Information Security:
A Hands-on Approach. Springer, 2011.
1. Fred Long et al. The Oracle/CERT Secure Coding Standard for Java, Addison-
E--Books Wesley, 2011. Available online at http://www.cert.org/secure-coding/
2. The OWASP web application security project: https://www.owasp.org/
1. Fred Long et al. The Oracle/CERT Secure Coding Standard for Java, Addison-
Wesley, 2011. Available online at http://www.cert.org/secure-coding/.
Reference 2. B. Chess and J. West. Secure Programming with Static Analysis. Addison-
Books Wesley, 2007.
3. Dan Bergh Johnsson, Daniel Deogun, Daniel Sawano, Secure By Design,
Manning, 2019
1.
https://www.coursera.org/learn/secure-coding-principles
On line TL
Material 2. https://www.udemy.com/course/secure-coding-secure-application-development/

P a g e | 29

You might also like