VI sem_2025_ODD
VI sem_2025_ODD
Preamble
This course explains the basic principles of managerial economics, accounting and current
business environment underlying business decision making. In the process of managing
organizations, the managers at different levels should take appropriate economic decisions
which will help in minimizing investment, operating and maintenance expenditures besides
increasing the revenue, savings and such other gains of the organization. This course deals
with how an engineer should deal with organisation’s operational and non- operational data
to take decisions of these kinds and also emphasize the quantitative and qualitative
applications of economic principle to business analysis. The course explores the role of AI in
financial sectors using few case studies.
Prerequisite
• NIL
Course Outcomes
On the successful completion of the course, students will be able to
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology 2022_HSS
Assessment Pattern
CO CAT Assignment CAT Assignment Terminal
1 1 2 2
TPS 1 2 3 1 2 3 1 2 3 1 2 3 4 5 6
Scale 1 2 3
CO1 8 10 5 5
CO2 8 10 30 50 3 5 15
CO3 4 10 20 50 2 5 15
CO4 4 10 20 30 2 5 15
CO5 8 10 20 20 3 5 5
CO6 8 10 10 50 5 5
CO6 COVERED THROUGH MINI PROJECT
*Terminal examination should cover all Course Outcomes in the appropriate TPS Scale
level.
Syllabus
Demand & Supply Analysis Firms: Types, objectives and goals - Managerial economics -
Decision analysis. Demand - Types of demand - Determinants of demand - Demand function
- Demand elasticity- Demand forecasting - Supply - Determinants of supply - Supply function
-Supply elasticity.
Financial Accounting: Functions of accounting, accounting principles. Preparation of
financial statements -Balance sheet and related concepts - Profit & Loss Statement and
related concepts - Comparative financial statements - Analysis & Interpretation of financial
statements
Cost analysis and Marginal costing-. Elements of cost- classification of cost-, Preparation
of cost sheet and its applications-Depreciation-Break-Even Analysis - Profit/Volume Ratio
(P/V Ratio)- Applications in make or buy decision.
Capital budgeting- Investments –Time value of money -Comparison of Project Alternatives:
Risks and return evaluation of investment decision - Average rate of return - Payback Period
- Net Present Value - Internal rate of return.
Financial Markets: Sources of finance and financial institutions, Venture capital, various
Business models.
Case studies in Machine Learning for Finance: Case Studies on prediction of real estate
prices, market basket analysis and economic growth using Python and spreadsheet.
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology 2022_HSS
Module No. of
Topic
No. Periods
1 DEMAND & SUPPLY ANALYSIS
3.3 Depreciation-Methods 2
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology 2022_HSS
Module No. of
Topic
No. Periods
4.1 Investments –Time value of money 2
5 Financial Markets
Course Designer(s):
1. A.M.Abirami, Associate Professor, [email protected], Information Technology
2. Pudumalar.S, Assistant Professor, [email protected], Information Technology
3. Parkavi.R, Assistant Professor, [email protected], Information Technology
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech. Information Technology 2022-23
Category L T P Credit
22IT620 ARTIFICIAL INTELLIGENCE
PCC 3 0 0 3
Preamble
This course deals with the development of intelligent information systems that can be used
to solve well-defined problems with the knowledge of Search techniques, Deep Learning,
Natural language processing and Computer Vision systems.
Prerequisite
• NIL
Course Outcomes
On the successful completion of the course, students will be able to
CO Course Outcome Statement TCE Expected Expected
Numb Proficien Proficiency Attainment
er cy Scale in % Level %
CO1 Explain the key characteristics of intelligent TPS2 80 90
agents
CO2 Find the optimal move for a given game using TPS3 80 80
adversarial search
CO3 Solve Constraint Satisfaction Problems such as TPS3 80 80
Map Coloring , Job-Shop Scheduling etc
Using backtracking search.
CO4 Develop a conversational agent that uses natural TPS3 80 70
language understanding and generation.
CO5 Perform Image classification and Detection of TPS3 70 70
objects with the knowledge of Computer Vision
CO6 Examine various Search techniques , Deep TPS4 70 70
learning, Computer Vision techniques for
solving engineering problems in the fields of
science, medicine, finance etc.
Passed in Board of Studies Meeting on 27.04.2023 Approved in 65th Academic council meeting on 27.5.2023
B.Tech. Information Technology 2022-23
Assessment Pattern
CO Theory Theory Terminal
CAT1 Assignment 1 CAT2 Assignment 2
TPS Scale 1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4 5 6
CO1 2 10 2 5
CO2 2 12 30 50 2 5 10
CO3 2 12 30 50 2 5 10
CO4 2 12 20 25 2 5 10
CO5 2 12 20 25 2 5 10
CO6 2 10 20 20 30 5 20
*Terminal examination should cover all Course Outcomes in the appropriate TPS Scale
level.
Syllabus
Adversarial Search and Games: Game Theory- Optimal Decisions in Games –Heuristic
Alpha–Beta Tree Search –Monte Carlo Tree Search- Stochastic Games –Limitations of
Game Search Algorithms
Deep Learning: Simple Feedforward Networks- Computation Graphs for Deep Learning-
Convolutional Neural Networks – Generalization- Recurrent Neural Networks- GANs-
Transfer Learning
Text Book
1. “Artificial Intelligence: A Modern Approach” by S. Russell and P. Norvig , Pearson,
Fourth Edition, 2020
Reference Books& web resources
1. Michael Negnevitsky , “ARTIFICIAL INTELLIGENCE: A Guide to Intelligent
Systems”, Addison-Wesley, Third Edition, 2011.
2. Freeman and Skapura, “Neural Networks: Algorithms, Applications and Programming
Techniques”, Pearson Education Asia, 2001.
3. Deepak Khemani, “Artificial Intelligence”, Tata McGraw Hill Education, 2013.
Passed in Board of Studies Meeting on 27.04.2023 Approved in 65th Academic council meeting on 27.5.2023
B.Tech. Information Technology 2022-23
Passed in Board of Studies Meeting on 27.04.2023 Approved in 65th Academic council meeting on 27.5.2023
B.Tech. Information Technology 2022-23
Course Designers:
1. Dr.C.Deisy, Professor, IT Department [email protected]
2. Dr.S.Padmavathi Professor, IT Department [email protected]
Passed in Board of Studies Meeting on 27.04.2023 Approved in 65th Academic council meeting on 27.5.2023
B.Tech Information Technology
Category L T P Credit
MOBILE APPLICATION
22IT650
DEVELOPMENT PCC 1 0 4 3
Passed in Board of Studies Meeting on 27.04.2023 Approved in 65th Academic Council Meeting on 27.05.2023
B.Tech Information Technology
Assessment Pattern
CO CAT 1 CAT 2 Model Lab & Terminal
Theory Theory Record Practical
TPS
Scale 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6 1 2 3 4 5 6
CO1 10 10 10 10 10
CO2 10 10 20 20 20
CO3 30 20 20
CO4 10 10 20 20 20
CO5 20 20 20 20
CO6 20 10 10
*Terminal examination should cover all Course Outcomes in the appropriate TPS Scale
level.
Syllabus
Introduction - History of Mobile Applications – Fundamentals of Multiplatform Mobile
Application Development - Architecture - API’s - ADE - Gradle
UI Design and Development – User Responsive Layouts - Views – Activity – Widgets &
Notifications, Menus & Dialogues
Services - Types of services - Location based Services - Sending SMS – Broad cast
receivers – Geo Coding & Maps - Telephony
Multimedia - Video – Audio– Graphics - Animation - Google Admob : Banner & Interstitial
Ads
Linkify &Integrating with social Media– MatchFilter & TransformFilter - Integrating Google
Sign in - Twitter - LinkedIn
Advanced Features – Google Play console - Performance Optimizations for Mobile apps -
Xml Parsing, JSON Parsing,RSSFeedReader,Kotlin, React Native, Material Design, Game
Development (Case Study)
Text Book
1. Barry Burd, “Android Application Development All-in-One For Dummies”, August 4,
2020.
2. RetoMeier, “Professional Android Application Development 4”, Wrox, 2012.
3. Dawn Griffiths, David Griffiths, “Head First Android Development”, Shroff/O'Reilly 2nd
Edition, 2017.
Passed in Board of Studies Meeting on 27.04.2023 Approved in 65th Academic Council Meeting on 27.05.2023
B.Tech Information Technology
Course Contents and Lecture Schedule
Module No. of
Topic
No. Periods
1 Introduction
1.1 History of Mobile Applications
1.2 Multiplatform Mobile Application Development
1
1.3 Architecture
1.4 API’s, ADE & Gradle
2 UI Design and Development
2.1 Layout & Views 1
2.2 Activity, Widgets
2.3 Notifications, Menus & Dialogues 1
3 Services
3.1 Types of services, Location based Services
1
3.2 Sending SMS, Broad cast receivers
3.3 Geo Coding & Maps, Telephony 1
4 Android Storage
4.1 Shared Pref
4.2 SQLite 1
4.3 Content provider
1
4.4 Firebase
5 Multimedia
5.1 Video & Audio
5.2 Graphics, Animation 1
5.3 Google Admob : Banner & Interstitial Ads
6 Linkify & Integrating with social Media
6.1 MatchFilter & TransformFilter 1
6.2 Integrating Google Sign in - Twitter - LinkedIn
7 Hardware Support
7.1 Camera & Microphone
1
7.2 Bluetooth – Wi-Fi – Sensor
8 Advanced Features
8.1 Performance Optimizations for Mobile apps
8.2 Xml Parsing, JSON Parsing 1
8.3 RSS Feed Reader
8.4 Kotlin, React Native
1
8.5 Material Design, Game Development
Total Hours 12
List of Experiments:
No. of
Ex.No Experiment Name COs
Hours
Android Studio Installation and setting up of an
1. 2 CO1
Environment
Practice with different layouts, views and explore
2. the available Widgets in android 4 CO1
3. Demonstrate and customize different types of
4 CO1
menus.
4. Practice with Intents in an Android application 4 CO1
Passed in Board of Studies Meeting on 27.04.2023 Approved in 65th Academic Council Meeting on 27.05.2023
B.Tech Information Technology
5. Demonstrate how to create dialogue boxes using
the Dialog Fragment class and practice with
4 CO1
different types notifications using the Notification
Compat Builder class
6. Experiment with Different Services in Android 5 CO2
7. Practice with different Storage options in Android 6 CO3
8. Practice with Android Multimedia and Google
5 CO3
Admob
Linkify and Integrating with Social Media
9. 5 CO4
Applications
Explore the different Hardware support options for
Android Applications -
10. 5 CO5
Camera/Bluetooth/WiFi/Sensor
Course Designer(s):
Passed in Board of Studies Meeting on 27.04.2023 Approved in 65th Academic Council Meeting on 27.05.2023
B.Tech Information Technology 2022-23
Category L T P Credit
22IT680 DATA SCIENCE LAB PCC 3 0 0 3
Preamble
This course will give insights of various tools and techniques from the disciplines of applied
statistics, mathematics and computer science and to make better and informed decisions for
various purposes by analysing a large amount of data.
Prerequisite
● Nil
Course Outcomes
On the successful completion of the course, students will be able to
Cos Course Outcomes TCE Expected Expected
Proficienc Proficienc Attainmen
y Scale y in % t Level %
CO1 Perform descriptive analytics, Data TPS3 70 80
Visualization on the benchmark data sets
CO2 Perform data analysis and Visualization TPS4 70 70
using suitable libraries.
CO3 Build a Classifier, Regression and TPS4 70 70
Clustering model for the application
chosen and do performance analysis.
CO4 Perform Time Series Analysis and Image TPS3 70 70
Classification on real time dataset.
CO5 Develop any of the IR model for NLP TPS3 70 70
applications.
CO6 Develop mini project by integrating TPS4 70 70
Web/Mobile platform for Data Science
Application.
Assessment Pattern
Passed in Board of Studies Meeting on 27.04.2023 Approved in 65th Academic Council Meeting on 27.5.2023
B.Tech Information Technology 2022-23
Course Contents
No. of
Exp No. Topic COs
Sessions
1. Identification of Application and perform 1 CO1
Descriptive Statistics
Total Sessions 12
Passed in Board of Studies Meeting on 27.04.2023 Approved in 65th Academic Council Meeting on 27.5.2023
B. TECH IT -SCHEDULING OF COURSES FOR STUDENTS JOINING FROM ACADEMIC YEAR 2022-23 ONWARDS
22ITPX0 22ITPX0
Programme Programme 22IT890 9
VIII Elective Elective PROJECT -IV
(PE-3) (PE-3) (PW-3)
HSMC BSC ESC PCC PEC IE/BSE PW Total
11 24 22 55 30 6 12 160
Passed in Board of Studies Meeting on 16.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology _2022
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology 2022-23
Category L T P Credit
22ITPC0 BLOCKCHAIN TECHNOLOGIES
PSE 3 0 0 3
Preamble
The course on Blockchain Technologies covers the technical aspects of public distributed
ledgers, blockchain systems, crypto currencies, and smart contracts. Students will learn how
these systems are built, how to interact with them, how to design and to build secure
decentralized applications using Ethereum and Hyperledger Fabric.
Prerequisite
Nil
Course Outcomes
On the successful completion of the course, students will be able to
COs Course Outcomes TCE Expected Expected
Proficiency Proficiency Attainment
Scale in % Level %
CO1 Demonstrate the need and usage of TPS3 70 70
cryptographic algorithms in blockchain
CO2 Explain the significance of blocks, proof-of- TPS2 80 80
work, and consensus building in blockchain.
CO3 Explain the functional/operational aspects of TPS2 80 80
trading and mining using crypto currencies.
CO4 Develop smart contracts to code business TPS3 70 70
logic in Solidity.
CO5 Develop decentralized applications for web TPS3 70 70
3.0 using Ethereum blockchain with node
services like metamask, alchemy and
frontend technologies like node.js
CO6 Analyze the impact and challenges in TPS4 70 70
Blockchain implementation in various
domains like finance, Health care etc.
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology 2022-23
Assessment Pattern
CO Assignment CAT2 Assignment 2 Terminal
CAT1
1
100 100 100 100 100
TPS 1 2 3 1 2 3 1 2 3 4 1 2 3 4 1 2 3 4
Scale
CO1 24 20 5 10
CO2 4 16 20 5 10
CO3 4 16 20 10
CO4 4 8 24 40 10 10 20 5 20
CO5 20 20 50 5 20
CO6 20 50 10
* Terminal examination should cover all Course Outcomes in the appropriate TPS Scale
level.
Syllabus
Introduction to Blockchain and Cryptographic primitives
Blockchain Technology- Architecture, Transactions and Blocks, P2P Systems, Types of
Blockchain, , Applications of Collison-resistant hash functions – SHA 256, Digital signature -
ECDSA, Public key cryptosystems for Authentication, zero-knowledge proof systems
Bitcoin Operation
Transactions in Bitcoin, Distributed Consensus atomic broadcast, Byzantine fault-tolerant
consensus methods, Merkle Patricia Tree, Anonymity, Mining Mechanism – Proof of Work,
Energy efficiency, Reward, Chain Policy, 51% Attack, Life of Blockchain application,
Cryptocurrency as application of blockchain technology
Ethereum
Introduction to Ethereum, Consensus Mechanisms, Metamask Setup, Ethereum Accounts,
Transactions, Receiving Ethers.
Develop Smart Contracts using Solidity – Datatypes, looping and branching constructs,
Function modifiers, Access Specifiers, Inheritance and Polymorphism in smart contracts.
Develop DAPPS for web 3.0 –Node Services – Alchemy, Infura, Frontend – HTML, Node.js,
Ganache – Truffle suite – Creating Cryptocurrencies and Non Fungible Tokens
Hyperledger
Permissioned and Private Blockchains, Hyperledger and its components Hyperledger Fabric
–Transactions life cycle, Deploying a chain code in test network
Blockchain – Use cases
Financial Services- KYC and Anti money Laundering,, Trade finance, Cross-border
Payments, Healthcare, Digital Rights Management, Identity Management, Tax Payment and
Land Registry Records, Supply Chain
Text Book
1. Lorne Lantz, Daniel Cawrey Mastering Blockchain: Unlocking the Power of
Cryptocurrencies, Smart Contracts, and Decentralized Applications, O’Reilly, 2020
2. Elad Elrom, The Blockchain Developer: A Practical Guide for Designing, Implementing,
Publishing, Testing, and Securing Distributed Blockchain-based Projects, Apress, 2019
Reference Books & web resources
1. Andreas Antonopoulos , “Mastering Bitcoin: Programming the open blockchain”, O‟Reilly,
Second Edition, 2021.
2. Melanie Swa, “Blockchain – Blueprint for New Economy”, O‟Reilly, Second Edition 2017
3. Andreas Antonopoulos , “Mastering Bitcoin: Unlocking Digital Cryptocurrencies”, O‟Reilly,
Second Edition, 2018.
4. S. Shukla, M. Dhawan, S. Sharma, S. Venkatesan, „Blockchain Technology:
Cryptocurrency and Applications‟, Oxford University Press, 2019.
5. Josh Thompson, „Blockchain: The Blockchain for Beginnings, Guide to Blockchain
Technology and Blockchain Programming‟, Create Space Independent Publishing
Platform, 2017.
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology 2022-23
6. Zero to Blockchain - An IBM Redbooks course, by Bob Dill, David Smits
https://www.redbooks.ibm.com/Redbooks.nsf/RedbookAbstracts/crse0401.html
7. Hyperledger Fabric - https://www.hyperledger.org/use/fabric
8. Bitcoin Notes - https://www.ee.iitb.ac.in/~sarva/courses/EE465/Autumn2019.html
Mod
No. of
ule Topic
Periods
No.
1 Introduction to Blockchain and Cryptographic primitives
1.1 Blockchain Technology- Architecture, Transactions and Blocks, P2P 2
Systems, Types of Blockchain, ,
1.2 Applications of Collison-resistant hash functions – SHA 256 1
1.3 Digital signature -ECDSA, Public key cryptosystems for Authentication 1
1.4 Zero-knowledge proof systems 1
2 Bitcoin Operation
2.1 Transactions in Bitcoin, Performing a transaction in Bitcoin testnets. 2
2.2 Distributed Consensus atomic broadcast, Byzantine fault-tolerant 2
consensus method
2.3 Merkle Patricia Tree 1
2.4 Mining Mechanism – Proof of Work, Energy efficiency, Reward, Chain 1
Policy
2.5 Life of Blockchain application, Cryptocurrency as application of 1
blockchain technology
3 Ethereum
3 Introduction to Ethereum, Consensus Mechanisms, Metamask Setup, 2
Ethereum Accounts, Transactions, Receiving Ethers.
3.1 Develop Smart Contracts using Solidity – Datatypes, looping and 1
branching constructs
3.2 Function modifiers, Access Specifiers 1
3.3 Inheritance and Polymorphism in smart contracts 1
3.4 Libraries in Solidity 1
3.5 Application Development in Solidity – Banking, Voting etc., 3
3.6 Develop DAPPS for web 3.0 –Node Services – Alchemy, Infura, Frontend 5
– HTML, Node.js, Ganache – Truffle suite – Creating Cryptocurrencies
and Non Fungible Tokens
4 Hyperledger
4.1 Permissioned and Private Blockchains, Hyperledger Project and its 1
components
4.2 Transaction Lifecycle In Hyperledger Fabric 1
4.3 Deploying chaincodes in Testnetwork 2
Blockchain – Usecases
5.1 Financial Services- KYC and Anti money Laundering 1
5.2 Trade finance, Cross-border Payments 1
5.3 Healthcare 1
5.4 Digital Rights Management, Identity Management 1
5.5 Tax Payment and Land Registry Records 1
5.6 Supply Chain 1
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology 2022-23
Mod
No. of
ule Topic
Periods
No.
Total 36
Course Designer(s):
1. Jeyamala.C, Associate Professor, [email protected], Information Technology
2. Parkavi.R, Assistant Professor, [email protected], Information Technology
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology_PSE
Preamble
The surge in Internet usage has led to a significant rise in online social media platforms such
as Facebook, YouTube, and Twitter. Despite their widespread use, there is a notable lack of
understanding regarding privacy and security issues associated with these platforms. This
course aims to explore and analyze the multifaceted aspects of privacy and security
concerns on online social media, encompassing computational, cultural, and psychological
perspectives.
Prerequisite
Nil
Course Outcomes
On the successful completion of the course, students will be able to
COs Course Outcomes TCE Expected Expected
Proficiency Proficiency Attainment
Scale in % Level %
CO1 Understand the working of online social TPS2 70 70
networks
CO2 Articulate the nuances of collecting data from TPS3 70 70
Online Social Media and assess their trust
and credibility
CO3 Analyse information on privacy disclosures, TPS3 70 70
and implement fraud detection counter
measures
CO4 Examine the counter measures to control TPS3 70 70
information sharing in Online social networks
CO5 Apply knowledge of identity management in TPS3 70 60
Online social networks
CO6 Evaluate the effectiveness of various security TPS4 70 60
measures and strategies to critically assess
open security issues in Online Social
Networks
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology_PSE
Assessment Pattern
CO Assignment CAT2 Assignment 2 Terminal
CAT1
1
100 100 100 100 100
TPS 1 2 3 1 2 3 1 2 3 4 1 2 3 4 1 2 3 4
Scale
CO1 4 16 2 5
CO2 4 16 20 50 2 5 10
CO3 4 16 20 50 2 10 10
CO4 5 15 20 10 2 10 10
CO5 5 15 20 50 2 10 10
CO6 10 50 10
*Terminal examination should cover all Course Outcomes in the appropriate TPS Scale
level.
Syllabus
Introduction: Online Social Networks, Data collection from social networks, Challenges,
Opportunities, and pitfalls in online social networks, APIs, IPC Acts for Social Media.
Social Media Trust Analysis: Collecting data from Online Social Media, Trust, credibility,
and reputations in social systems.
OSM Policing, Privacy, and Fraud Detection: Online social Media and Policing,
Information privacy disclosure, revelation and its effects in OSM and online social networks,
Phishing in OSM & Identifying fraudulent entities in online social networks.
Access Control Models: Access Control in Online Social Networks, Relationship-Based
Access Control, Privacy Settings in Commercial Online Social Networks, Existing Access
Control Approaches
Identity Management: Identity Management, Digital Identity, Identity Management Models:
From Identity 1.0 to Identity 2.0, Identity Management in Online Social Networks, Identity as
Self-Presentation, Identity thefts, Open Security Issues in Online Social Networks
Applications: Privacy and security issues associated with various social media.
Learning Resources
1. Security and Privacy-Preserving in Social Networks, Chbeir Richard, Al Bouna,
Bechara (Eds.), Spinger, 2013.
2. The Routledge Handbook of Privacy and Social Media (1st ed.), Trepte, S., & Masur, P.
(Eds.), Routledge, 2023.
3. Security and Trust in Online Social Networks, Barbara Carminati, Elena Ferrari, Marco
VivianiMorgan & Claypool publications.
4. Security and Privacy in Social Networks, Editors: Altshuler, Y., Elovici, Y., Cremers, A.B.,
Aharony, N., Pentland, A. (Eds.), Springer, 2013
5. Security and privacy preserving in social networks, Elie Raad & Richard Chbeir, Richard
Chbeir& Bechara Al Bouna, 2013
6. Social Media Security: Leveraging Social Networking While Mitigating Risk, Michael
Cross, 2013
7. SWAYAM - NPTEL Course, “Privacy and Security in Online Social Media”,
https://onlinecourses.nptel.ac.in/noc23_cs13/preview
Course Contents and Lecture Schedule
Module No. of
Topic
No. Hours
1 Introduction
1.1 Online Social Networks 1
1.2 Data collection from social networks 1
Challenges, Opportunities, and pitfalls in online social
1.3 2
networks
1.4 Online social networks- APIs 1
1.5 IPC Acts for Social Media 1
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology_PSE
2 Social Media Trust Analysis
2.1 Collecting data from Online Social Media, 2
2.2 Online social network - Trust, 1
2.3 Credibility, and reputations in social systems 2
3 OSM Policing, Privacy, and Fraud Detection
3.1 Online social Media and Policing 2
Information privacy disclosure revelation and its
3.2 2
effects in OSM and online social networks
3.3 Phishing in OSM 2
3.4 Identifying fraudulent entities in online social networks 2
4 Access Control Models
4.1 Access Control in Online Social Networks 1
4.2 Relationship-Based Access Control 1
Privacy Settings in Commercial Online Social
4.3 2
Networks
4.4 Existing Access Control Approaches 1
5 Identity Management
5.1 Identity Management, Digital Identity 2
Identity Management Models: From Identity 1.0 to
5.2 2
Identity 2.0
5.3 Identity Management in Online Social Networks 2
5.4 Identity as Self-Presentation, Identity thefts 2
5.5 Open Security Issues in Online Social Networks 2
6 Applications
Privacy and security issues associated with various
6.1 2
social media – Case Study
Total Lecture Hours 36
Course Designer(s):
1. Sujitha.S, Assistant Professor, [email protected], Information Technology
2. Parkavi.R, Assistant Professor, [email protected], Information Technology
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology_PSE
Preamble
This course helps the students to understand various aspects that must be considered while
designing and developing a distributed application. This course also provides necessary
insights into various design patterns, frameworks, tools and technologies that could be
leveraged for the development of Distributed applications.
Prerequisite
• Basic knowledge in Application development
Course Outcomes
On the successful completion of the course, students will be able to
CO Course Outcome Statement TCE Expected Expected
Number Proficiency Proficiency Attainment
Scale in % Level %
CO1 Explain the concepts, components and TPS2 70 80
key features of microservice application
architectures
CO2 Containerize an application by creating TPS3 70 70
Docker config files and build processes to
produce all the necessary Docker images
CO3 Use appropriate patterns for the design of TPS3 70 70
distributed systems subject to specific
design and performance constraints
CO4 Deploy and manage containerized TPS3 70 60
application with kubernetes
CO5 Examine the challenges in co-ordinating TPS4 70 60
distributed transactions using appropriate
techniques and algorithms.
CO6 Perform Serverless application TPS3 70 70
development with distributed databases
such as Cassandra, DynamoDB at the
backend
Passed in Board of Studies meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology_PSE
*Terminal examination should cover all Course Outcomes in the appropriate TPS Scale
level.
Syllabus
Microservices Architecture - Characteristics – Monolith vs Microservice – Principles for
modelling microservices from monolith applications- APIs – RESTful Standards – Case
studies with Spring Boot and Nodejs
Passed in Board of Studies meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology_PSE
Module No. of
Topic
No. Periods
1 Microservices Architecture
1.1 Characteristics, Monolith vs Microservice 1
1.2 Principles for modelling microservices from monolith 1
applications
1.3 APIs – RESTful Standards 2
2 Containers
2.1 Containerization- Container Orchestration 1
2.2 Docker - Installation – Pulling and Running image 1
using Containers
2.3 Docker files - Building custom docker images 1
2.4 Docker Networking-Docker Compose 2
3 Distributed Design Patterns
5 Distributed Computation
Passed in Board of Studies meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology_PSE
Module No. of
Topic
No. Periods
5.1 Master Election 2
5.2 Fault Tolerance - Fault Models 2
5.3 Distributed database concepts: Distributed 1
Transactions
5.4 Handling Concurrent Data Manipulation 1
Total 36
Course Designer(s):
Passed in Board of Studies meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B. Tech Information Technology_PSE
Category L T P Credit
22ITPG0 ASSISTIVE TECHNOLOGY DESIGN
PSE 3 0 0 3
Preamble
This course gives the design and evaluation of Assistive Technologies with ethics,
policies. It’s a course to design, prototype and evaluate the assistance with new/existing
devices. Bridging the gap between people and assistive devices develop the client
centred projects for various disability in the society.
Prerequisite
NIL
Course Outcomes
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B. Tech Information Technology_PSE
Assessment Pattern
CO Assessment 1 Assessment 2 Terminal
CAT 1 Assignment1 CAT 2 Assignment2 (Theory)
TPS 4 1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4 5 6
Scale 1 2 3
CO1 4 20 - - - - - - - - - - - - - - 2 5 - - - -
CO2 4 20 - - - - - - - - - - - - - - 2 5 - - - -
CO3 2 10 40 - - - 100 - - - - - - - - - 2 5 10 - - -
CO4 - - - - - - - - 4 5 15 - - - 30 - 2 5 10 - - -
CO5 - - - - - - - - 4 5 15 15 - - 30 - 2 5 10 10 - -
CO6 - - - - - - - - 2 5 15 15 - - - 40 - 5 10 10 - -
* Terminal examination should cover all Course Outcomes in the appropriate TPS Scale
level.
Syllabus
Exploring the needs– Observing low, mid, high, and newer technologies applications
through reflection, observation, and application.Bridging the gap between people and
rehabilitation products – Designing beyond the norm to meet the needs of people- improving
home environments for aged people
Case Studies - Modify, customize, fabricate a range of low to medium tech assistive
technology devices – Assistive devices for physical Mobility - wheelchairs for multiple
disability -Visually Challenging People - Brailey and other gadgets to support for navigation
and workplace - Hearing and Speech Impaired people - supporting gadgets - Mental health
issues - cognitive and memory issues - Old Age People - Assistive Devices indoor and
outdoor environments.
Text Book
1. Cook, Albert M., and Jan Miller Polgar. Cook & Hussey's Assistive Technologies:
Principles and Practice. 3rd ed. Mosby Elsevier, 2007. ISBN: 9780323039079.
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B. Tech Information Technology_PSE
Module No. of
Topic
No. Periods
1 Introduction about Physical and Mental abilities
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B. Tech Information Technology_PSE
Module No. of
Topic
No. Periods
5.3 wheelchairs for multiple disability -Visually 2
Challenging People
5.4 Brailey and other gadgets to support for navigation 1
and workplace
5.5 Hearing and Speech Impaired people - supporting 1
gadgets
5.6 Mental health issues - cognitive and memory issues 1
Course Designer(s):
1. Dr.D.Tamilselvi,Professor, [email protected], Information Technology
2. Ms.P.Vijaya Praba, Assistant Professor, [email protected], Information Technology
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology 2022-23_PEES
Category L T P Credit
22ITRA0 ADVANCED CRYPTOGRAPHY
PEES 3 0 0 3
Preamble
The course on Advanced Cryptography aims to equip students with a profound
understanding of complex cryptographic algorithms and protocols. The course enables the
students to develop practical implementation skills, fostering the ability to apply
cryptographic solutions to real-world scenarios that involveszero knowledge proof systems,
secure two-party and multi-party computation. The course prepares individuals with the
knowledge and skills on modern cryptography necessary for addressing contemporary
challenges in secure communication and data protection.
Prerequisite
22IT520 Information Security
Course Outcomes
On the successful completion of the course, students will be able to
COs Course Outcomes TCE Expected Expected
Proficiency Proficiency Attainment
Scale in % Level %
CO1 Appreciate the usage of number theory, TPS3 70 70
probability and statistics in the development of
modern crypto algorithms
CO2 Construct privacy preserving security systems TPS3 70 70
using Zero Knowledge and Oblivious transfer
protocols
CO3 Experiment fine grained access control TPS3 70 70
systems using Identity Based Encryption and
Attribute Based Encryption
CO4 Illustrate cryptographic techniques for secure TPS3 70 70
group communication and computation
CO5 Explain the working principle of quantum TPS2 80 75
computing and quantum cryptography
CO6 Breakdown the recent research problems in TPS4 70 65
real world applications like Digital cash, E-
Voting and identify suitable cryptographic
techniques to solve it
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology 2022-23_PEES
Assessment Pattern
CO Assignment CAT2 Assignment 2 Terminal
CAT1
1
100 100 100 100 100
TPS 1 2 3 1 2 3 1 2 3 4 1 2 3 4 1 2 3 4
Scale
CO1 5 10 20 30 20
CO2 5 10 20 30 5 10
CO3 10 20 40 20
CO4 10 10 20 40 5 10
CO5 20 10
CO6 20 20 60 20
*Terminal examination should cover all Course Outcomes in the appropriate TPS Scale
level.
Syllabus
Primitives of Advanced Cryptography
One way Functions (OWF)–Types, Trapdoor Functions, Hard core predicates of OWF.
Pseudo Random Number Generators (PRNG), Pseudo-random Permutations (PRP),
Pseudo-Random Functions (PRF).
Zero Knowledge Protocols
Chosen Ciphertext Security, Interactive proofs and zero-knowledge interactive proofs, Non-
interactive zero-knowledge (NIZK) proofs, Applications in privacy and authentication.
Oblivious transfer
Oblivious transfer protocols and variations, Privacy-preserving data exchange using
oblivious transfer, Differential Privacy.
Access control schemes
Identity Based Encryption (IBE), Key management in IBE systems, Benefits and challenges.
Attribute-Based Encryption (ABE) – Access control and fine-grained encryption, Attribute-
based access control policies, Hierarchical and lattice-based ABE.
Secret Sharing and Threshold Cryptography
Secret sharing schemes and applications - Shamir's Secret Sharing, Distributed key
management and access control, Threshold encryption and decryption.
Multi Party Computation
Fundamentals of secure multiparty computation (MPC) – Homomorphic encryption, Two-
party and multi-party secure computation, Yao's Millionaires' Problem and the Garbled
Circuit protocol.
Quantum cryptography
Quantum computers, CRYSTALS-Kyber algorithm, Shor‘s quantum factoring algorithm,
quantum key distribution and reconciliation.
Case study
Vulnerability analysis of authentication and data security in real world security based
applications like e-voting and digital cash.
Reference Books& web resources
1. Jonathan Katz and Yehuda Lindell, “Introduction to Modern Cryptography: Principles and
Protocols”, 3rd Edition, Chapman and Hall/CRC Press, 2020.
2. Douglas R. Stinson, “Cryptography: Theory and Practice”, 4th Edition, CRC Press, 2019.
3. Dijiang Huang, Qiuxiang Dong and Yan Zhu, “Attribute-Based Encryption and Access
Control”, CRC Press, 2020
4. Ronald Cramer , Ivan Bjerre Damgård and Jesper Buus Nielsen, “Secure Multiparty
Computation and Secret Sharing”, 1st Edition, Cambridge University Press, 2015
5. Simon Singh, “The Code Book, the evolution of secrecy from Mary, Queen of Scots, to
quantum cryptography”, Doubleday 1999
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology 2022-23_PEES
6. Dan Boneh Presentation, NIST Computer Security Resource Center - An Overview of
Identity Based Encryption
Mod
No. of
ule Topic
Periods
No.
Introduction to the course and course outcomes 1
1 Primitives of Advanced Cryptography (5)
1.1 One way Functions(OWF) - types 1
1.2 Trapdoor Functions 1
1.3 Hard core predicates of OWF 1
1.4 Pseudo Random Number Generators (PRNG) 1
1.5 Pseudo-random Permutations (PRP), Pseudo-Random Functions (PRF) 1
2 Zero Knowledge Protocols (5)
2.1 Chosen Ciphertext Security 1
2.2 Interactive proofs and zero-knowledge interactive proofs 1
2.3 Non-interactive zero-knowledge (NIZK) proofs 2
2.4 Applications in privacy and authentication 1
3 Oblivious transfer (3)
3.1 Oblivious transfer protocols and variations 1
3.2 Privacy-preserving data exchange 1
3.3 Differential Privacy 1
4 Access control schemes (6)
4.1 Identity Based Encryption (IBE) 1
4.2 Key management in IBE systems 1
4.3 Benefits and challenges 1
4.4 Attribute-Based Encryption (ABE) 1
4.5 Attribute-based access control policies 1
4.6 Hierarchical and lattice-based ABE 1
5 Secret Sharing and Threshold Cryptography (5)
5.1 Secret sharing schemes and applications 1
5.2 Shamir's Secret Sharing 1
5.3 Distributed key management and access control 1
5.4 Threshold encryption and decryption 2
6 Multi Party Computation(5)
6.1 Fundamentals of secure multiparty computation 1
6.2 Homomorphic encryption 1
6.3 Two-party and multi-party secure computation 1
6.4 Yao's Millionaires' Problem 1
6.5 Garbled Circuit protocol 1
7 Quantum cryptography (4)
7.1 Quantum computers 1
7.2 CRYSTALS-Kyber algorithm 1
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology 2022-23_PEES
Mod
No. of
ule Topic
Periods
No.
7.3 Shor‘s quantum factoring algorithm 1
7.4 Quantum key distribution and reconciliation 1
8 Research article discussion (2) 2
Vulnerability analysis - authentication and data security systems
Total 36
Course Designer(s):
1. Jeyamala C, Associate Professor, Dept. of IT, [email protected]
2. Suguna M, Associate Professor, Dept. of IT, [email protected]
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology_PEES
Category L T P Credit
22ITRB0 INFORMATION RETRIEVAL
PEES 3 0 0 3
Preamble
The course focuses on the representation, storage, organization, and access to information
items using various IR algorithms and techniques. The course emphasizes the building of
information retrieval systems for documents so as to retrieve relevant or useful information
from them.
Prerequisite
● Nil
Course Outcomes
On the successful completion of the course, students will be able to
COs Course Outcomes (CO) TCE Expected Expected
Proficiency Proficiency Attainment
Scale in % Level %
Differentiate different retrieval algorithms and
CO1 TPS2 70 70
evaluation techniques
Illustrate various Information Retrieval
models such as boolean, vector space and
CO2 TPS3 70 65
probabilistic models with its variants for the
given textual data
Examine the performance of the various IR
CO3 TPS4 70 60
models
Simulate different classification and
CO4 clustering algorithms for textual data using TPS3 70 65
text operations
Investigate the usage of various text search
CO5 engines with web crawling and link analysis TPS4 70 60
using suitable tools and techniques
Develop simple information retrieval systems
such as recommender systems,
CO6 TPS3 70 65
personalization, musical notes extraction
using text and multimedia data
CO4 S M L S S S M M L
CO5 S S M L S S S S M L
CO6 S M L S S S S S S S M S S
S- Strong; M-Medium; L-Low
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology_PEES
Assessment Pattern
Assignment 1 Assignment
CO CAT1 CAT2 2 Terminal
TPS
Scale 1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 1 2 3 4 5 6
CO1 5 10 2 8
CO2 5 10 20 50 2 6 10
CO3 10 10 20 10 30 20 2 6 10 5
CO4 5 10 20 2 6 10
CO5 5 10 20 10 2 6 10 5
CO6 20 100 2 6
Syllabus
Retrieval Models Basic Concepts – Nature of unstructured and semi-structured text -
Retrieval Process – Classic Information Retrieval Models – Boolean Model, Vector Model,
Probabilistic Model, Vector Space Model, Latent Semantic Indexing model, Bayesian
Networks - Retrieval Evaluation
Query Languages Key Word based Querying – Query Operations – User Relevance
Feedback – Local and Global Analysis
Indexing and Searching Inverted files – Suffix trees - Boolean Queries – Sequential
Searching – Pattern Matching - Structural queries – Compression
Text Operations Data Standards and Data Quality - Legal, Policy and Ethics -
Preprocessing – Document Categorization – Naïve Bayes Models, Document Clustering – k-
means clustering, Word embedding – Encoding, Feature Extraction, Sequential Models -
RNN
Web Information Retrieval Search Engines – Web Crawling – Link analysis – Page
Ranking – Semantic Search
Multimedia Information Retrieval Data types and formats – Feature Extraction - Indexing
and Retrieval
Learning Resources
1. Ricardo Baeza-Yates, Berthier Ribeiro-Neto, Modern Information Retrieval, Pearson
Education, 2nd edition, 2011.
2. C. Manning, P. Raghavan, and H. Schutze, Introduction to Information Retrieval,
Cambridge University Press, 2008.
3. Stefano Ceri, Alessandro Bozzon, Web Information Retrieval, Springer, 2013.
4. Henk Blanken, Henk Ernst Blok, Ling Feng, Arjen Vries, Multimedia Retrieval, Springer,
2007.
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology_PEES
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023
B.Tech Information Technology_PEES
Passed in Board of Studies Meeting on 17.11.2023 Approved in 66th Academic Council Meeting on 16.12.2023