BECOE2024
BECOE2024
FOR
B.E. (COE)
2024
Page 1 of 226
SEMESTER-I
S.
Course Course Name CODE** L T P Cr
No.
Code
1. UCB009 Chemistry BSC 3 0 2 4
2. UES103 Programming for Problem ESC 3 0 2 4
Solving
3. UES013 Electrical & Electronics ESC 3 1 2 4.5
Engineering
4. UEN008 Energy and Environment OTH 2 0 0 2
5. UMA022 Calculus for Engineers BSC 3 1 0 3.5
TOTAL 18
SEMESTER-II
S.
Course Course Name CODE** L T P Cr
No.
Code
1. UPH013 Physics BSC 3 1 2 4.5
2. UES101 Engineering Drawing ESC 2 4 0 4
3. UHU003 Professional Communication HSS 2 0 2 3
4. UES102 Manufacturing Processes ESC 2 0 2 3
5. UMA023 Differential Equations and BSC 3 1 0 3.5
Linear Algebra
TOTAL 18
SEMESTER-III
S.
Course Course Name CODE** L T P Cr
No.
Code
1. UCS303 Operating System PCC 3 0 2 4
2. UTA018 Object Oriented Programming PCC 3 0 2 4
3. UCS301 Data Structures PCC 3 0 2 4
4. UCS405 Discrete Mathematical PCC 3 1 0 3.5
Structures
5. UTA016 Engineering Design Project I ESC 1 0 2 3
(2 self-effort hours)
6. UMA021 Numerical Linear Algebra BSC 3 0 2 4
7. UHU050 Evolutionary Psychology HSS 1* 0 0 1
(1 Self Effort Hour)
8. UCS320 Introduction to Sustainable PCC 1* 0 0 1
Green Computing
TOTAL 24.5
Note: *Alternate week
Page 2 of 226
SEMESTER-IV
SEMESTER-V
Page 3 of 226
SEMESTER-VI
COURSE
S. N. TITLE CODE L T P CR
NO.
1 UCS701 THEORY OF COMPUTATION CP 3 1 0 3.5
3 MICROPROCESSOR-BASED 4.0
UCS617 CP 3 0 2
SYSTEMS DESIGN
4 INNOVATION AND
UTA025 ENTREPRENEURSHI PR 1 0 2* 3.0
P
(2 self-effort hours)
5 ELECTIVE-II PE 2 0 2 3.0
6 ELECTIVE-III PE 2 0 2 3.0
TOTAL 16 1 10 22.5
*Alternate week
SEMESTER-VII
S. COURSE COD
TITLE L T P CR
N. NO. E
1 UCS802 COMPILER CONSTRUCTION CP 3 0 2 4.0
3 ELECTIVE-IV PE 2 0 2 3.0
TOTAL 7 0 8 18.
0
Page 4 of 226
SEMESTER-VIII
S. COURSE COD
TITLE L T P CR
N. NO. E
1 UCS898 PROJECT SEMESTER* PR - - - 15.
0
TOTAL - - - 15.
0
*TO BE CARRIED OUT IN INDUSTRY/RESEARCH INSTITUTION
OR
S. COURSE COD
TITLE L T P CR
N. NO. E
1 UCS813 SOCIAL NETWORK ANALYSIS CP 2 0 2 3.0
15.
TOTAL 5 0 4
0
OR
S. COURSE COD
TITLE L T P CR
N. NO. E
15.
1 UCS900 START- UP SEMESTER - - -
0
15.
TOTAL - - -
0
Elective Focus
B.E. Computer Engineering Program is designed to offer elective focus as soon as student
clears semester IV of the program. Student has to choose EF (Elective Focus) out of the
following ten choices and shall continue with this group till his study at Thapar Institute of
Engineering & Technology. Choices are:
Page 5 of 226
2.2. 3D Modelling and Animation (UCS636)
2.3. Game Design & Development (UCS646)
2.4. Augmented and Virtual Reality (UCS752)
Page 6 of 226
10. Robotics and Edge AI (NVIDIA Collaboration)
10.1. Edge AI and Robotics: Data Centre Vision (UCS668)
10.2. Edge AI and Robotics: Accelerated Data Science (UCS547)
10.3. Edge AI and Robotics: Embedded Vision (UCS671)
10.4. Edge AI and Robotics: Reinforcement Learning & Conversational AI (UCS760)
11. Cyber Forensics and Ethical Hacking (EC-Council, USA)
11.1. Network Defence (UCS550)
11.2. Ethical Hacking-1 (UCS673)
11.3. Ethical Hacking-2 (UCS674)
11.4. Computer Hacking and Forensic Investigation (UCS750)
12. Intelligent Transport Systems
12.1. Network and Communication for Connected Vehicles (UCSXXX)
12.2. Intelligent Transportation Systems(UCSXXX)
12.3. Data Analytics in Automobile Engineering(UCSXXX)
12.4. Cyber security for Mobility Systems(UCSXXX)
Page 7 of 226
LIST OF PROFESSIONAL ELECTIVES
Elective I
S. COURSE
TITLE CODE L T P CR
No. NO.
Page 8 of 226
Elective II
S. COURSE
TITLE CODE L T P CR
No. NO.
Elective III
S. COURSE
TITLE CODE L T P CR
No. NO.
Page 9 of 226
11. UCS674 ETHICAL HACKING-2 PE 2 0 2 3.0
Elective IV
S. COURSE
TITLE CODE L T P CR
No. NO.
Generic Elective
Page 10 of 226
9. UMA070 Advanced Numerical Methods 2 0 0 2.0
Nature of the course CODE Total Credits Semester and Course Name
Basic Science Courses BSC 27.5 1, Chemistry (4)
1, Mathematics – I (3.5)
2, Physics (4.5)
2, Mathematics–II (3.5)
3, Numerical Linear Algebra (4)
4, Probability and Statistics (4)
6, Optimization Techniques (4)
Engineering Science Courses ESC 18.5 1, Programming for Problem Solving (4)
1, Electrical & Electronics Engineering (4.5)
2, Engineering Drawing (4)
2, Manufacturing Processes (3)
5, ENGINEERING MATERIALS (3)
Humanities and Social Science HSS 9 2, Professional Communication (3)
Courses 7, Humanities for engineers (3)
3, Evolutionary Psychology (1)
4, Aptitude Skills Building (2)
Professional Core Courses PCC 59 3, Operating System (4)
3, Object Oriented Programming (4)
3, Data Structures (4)
3, Discrete Mathematical Structures(3.5)
4, Design and Analysis of Algorithms (4)
4, Database Management Systems (4)
5, Software Engineering (4)
5, Computer Architecture and Organization
(3)
5, Image Processing (4)
5, Computer Networks (4)
5, Machine Learning (4)
4, Artificial Intelligence (4)
6, Theory of Computation (3.5)
6, Microprocessor Based System Design (4)
7, Compiler Construction (4)
Introduction to Energy-Aware Computing(1*)
Professional Elective Courses PEC 12 5, EFB-1(3)
6, EFB-II (3)
6, EFB-III (3)
7,EFB-IV (3)
Open Elective Courses OEC 5 6, Innovation and Entrepreneurship (3)
5, Generic Elective (2)
Project PRJ 29 3, Engineering Design Project-1 (3)
4, Engineering Design Project-II (3)
7, Capstone Project (8)
8, Project Semester (15)
Others OTH 2 1, Energy and Environment (2)
Total 162
Page 11 of 226
SEMESTER
I
Page 12 of 226
UCB009: Chemistry
L T P Cr
3 0 2 4.0
Fuels: Classification of fuels, Calorific value, Cetane and Octane number, alternative
fuels: biodiesel, Power alcohol, synthetic petrol, Fuel cells: H2 production and storage,
Water splitting, Rocket propellant.
Laboratory Work
Page 13 of 226
3. Apply and execute water quality parameter and treatment methods.
4. Discuss the concept of alternative fuels, application of polymers and SMILES.
5. Execute laboratory techniques like pH metry, potentiometry, spectrophotometry,
conductometry, and volumetry.
Text Books
1. Engineering Chemistry, S. Vairam and S. Ramesh, Wiley India 1st ed, 2014.
2. Engineering Chemistry, K. S. Maheswaramma, and M. Chugh. Pearson, 2016.
Reference Books
1. Engineering Chemistry, B. Sivasankar, Tata McGraw-Hill Pub. Co. Ltd, New Delhi,
2008.
2. Engineering Chemistry, M.J. Shulz, Cengage Learnings, 2007.
3. J. Chem. Inf. Comput. Sci., D. Weininger, Vol. 28, 1988, 31-36.
Evaluation Scheme
Page 14 of 226
UES103: Programming for Problem Solving
L T P Cr
3 0 2 4.0
Course Objectives: This course is designed to solve and explore the problems using the
art of computer programming with the help of C Language. Students will be able to apply
these problem solving concepts in real life applications.
Syllabus
Decision Making and Iterative Statements-Decision making- if, if-else, Nested if-else,
Multiple if, else if, switch, Ternary Operator, Loops- (while, do-while, for), Nesting of
Loops, break, continue and goto. Implement the switch () to solve the basic functions of
scientific calculator.
Arrays and Strings- One-dimensional array its operations (Traversal, Linear Search,
Insertion, Deletion, Bubble Sort), Two-dimensional and its operations (Addition,
Transpose and Multiplication), Passing of array into a function (row and entire array),
Input and output of a string, string inbuilt functions, 2-D Character array.
Page 15 of 226
File Handling: Introduction of Files (streams in C), using File (Declaring, Opening and
Closing), Operations on File (Reading, Writing and appending), and Random Access of a
file, command line argument.
Laboratory Work
To implement programs for various kinds of real life applications in C Language.
Text Books
1. CProgrammingLanguage, BrianW.KernighanDennisM. Ritchie,2nded,2012.
2. ProgramminginANSIC, BalagurusamyG., 8thed., 2019
Reference Books
1. LetUs C, KanetkarY.,16th ed.,2017
2. Programming with C, Byron S Gottfried,McGraw Hill Education, Forth edition, 2018
Page 16 of 226
L T P Cr
3 1 2 4.5
Course Objective: To introduce the basic concepts of electrical and electronics
engineering.
Syllabus
DC Circuits: Introduction to circuit elements; rms and average values for different wave
shapes, independent and dependent current and voltage sources; Kirchhoff‘s laws; mesh
and node analysis; source transformations; network theorems: Superposition theorem,
Thevenin‘s and Norton‘s theorem, Maximum power transfer theorem; star-delta
transformation; steady state and transient response of R-L and R-C and R-L-C circuits.
AC Circuits: Concept of phasor, phasor representation of circuit elements; analysis of
series and parallel AC circuits; concept of real, reactive and apparent powers; resonance in
RLC series and parallel circuits; balanced three phase circuits: voltage, current and power
relations for star and delta arrangement; analysis of balanced and unbalanced circuits; three
phase power measurement using two-wattmeter and one-wattmeter methods.
Magnetic circuits: analogy between electric and magnetic circuits; series and parallel
magnetic circuits; operating principles of electrical appliances: single-phase transformer
and rotating machines; tests and performance of single-phase transformer.
Digital Logic Design: Digital signals, Number systems, Positive and negative
representation of numbers, Signed-number representation, Binary arithmetic, Postulates
and theorems of Boolean Algebra, Algebraic simplification, Sum of products and product
of sums formulations (SOP and POS), Gate primitives, Logic Gates and Universal Gates,
Minimization of logic functions, Karnaugh Maps, Logic implementation using Gates,
Decoder, MUX, Flip-Flops, Asynchronous up/down counters.
Operational Amplifier Circuits: The ideal operational amplifier, the inverting, non-
inverting amplifiers, Op-Amp Characteristics, Applications of Op-amp: summing
amplifier, differentiator and integrator.
Laboratory Work: Kirchhoff‘s laws, network theorems, ac series and parallel circuit,
three phase power measurement, magnetic circuit, tests on transformer, resonance in AC
circuit, combinational circuits, flip flops, shift register and binary counters, asynchronous
and synchronous up/down counters, BJT characteristics.
Page 17 of 226
6. Discuss and explain the working of diode, transistor and operational amplifier, their
configurations and applications.
Text Books
1. Hughes, E., Smith, I.M., Hiley, J. and Brown, K., Electrical and Electronic
Technology, Prentice Hall (2008) 10th ed.
2. Nagrath, I.J. and Kothari, D.P., Basic Electrical Engineering, Tata McGraw Hill
(2002).
3. Boylestad, R.L. and Nashelsky, L., Electronic Devices & Circuit Theory, Perason
(2009).
4. Mano M. M. and Ciletti, M.D., Digital Design, Pearson, Prentice Hall, (2013).
Reference Books
Evaluation Scheme
Page 18 of 226
2 0 0 2.0
Course Objective: The exposure to this course would facilitate the students in
understanding the terms, definitions and scope of environmental and energy issues
pertaining to current global scenario; understanding the need of sustainability in addressing
the current environmental & energy challenges.
Syllabus
Air Pollution: Origin, Sources and effects of air pollution; Primary and secondary
meteorological parameters; wind roses; Atmospheric stability; Source reduction and Air
Pollution Control Devices for particulates and gaseous pollutants in stationary sources.
Text Books
Page 19 of 226
Reference Books
Evaluation Scheme
Page 20 of 226
UMA022: Calculus for Engineers
L T P Cr
3 1 0 3.5
Course Objective: To provide students with skills and knowledge in sequence and series,
advanced calculus, calculus of several variables and complex analysis which would enable
them to devise solutions for given situations they may encounter in their engineering
profession.
Syllabus
Sequences and Series: Introduction to sequences and infinite series, Tests for
convergence/divergence, Limit comparison test, Ratio test, Root test, Cauchy integral test,
Alternating series, Absolute convergence, and conditional convergence.
Series Expansions: Power series, Taylor series, Convergence of Taylor series, Error
estimates, Term by term differentiation and integration.
Partial Differentiation: Functions of several variables, Limits and continuity, Chain rule,
Change of variables, Partial differentiation of implicit functions, Directional derivatives
and its properties, Maxima and minima by using second order derivatives.
Page 21 of 226
Text Books
1. Thomas, G.B. and Finney, R.L., Calculus and Analytic Geometry, Pearson Education
(2007), 9th ed.
2. Stewart James, Essential Calculus; Thomson Publishers (2007), 6th ed.
3. Kasana, H.S., Complex Variables: Theory and Applications, Prentice Hall India, 2005
(2nd edition).
Reference Books
Evaluation Scheme
Page 22 of 226
SEMESTER
II
Page 23 of 226
UPH013: Physics
L T P Cr
3 1 2 4.5
Course Objective: To introduce the student to the basic physical laws of oscillators,
acoustics of buildings, ultrasonics, electromagnetic waves, wave optics, lasers, and
quantum mechanics and demonstrate their applications in technology. To introduce the
student to measurement principles and their application to investigate physical
phenomena
Syllabus
Electromagnetic Waves: Scalar and vector fields; Gradient, divergence, and curl;
Stokes‘ and Green‘s theorems; Concept of Displacement current; Maxwell‘s equations;
Electromagnetic wave equations in free space and conducting media, Application - skin
depth.
Laboratory Work
Page 24 of 226
7. Determination of beam divergence and beam intensity of a given laser.
Micro Project:
Students will be given physics-based projects/assignments using computer simulations,
etc.
Text Books
1. Beiser, A., Concept of Modern Physics, Tata McGraw Hill (2007) 6th ed.
2. Griffiths, D.J., Introduction to Electrodynamics, Prentice Hall of India (1999) 3rd ed.
3. Jenkins, F.A. and White, H.E., Fundamentals of Optics, McGraw Hill (2001) 4th ed.
Reference Books
1. Wehr, M.R, Richards, J.A., Adair, T.W., Physics of The Atom, Narosa Publishing
House (1990) 4th ed.
2. Verma, N.K., Physics for Engineers, Prentice Hall of India (2014)1st ed.
3. Pedrotti, Frank L., Pedrotti, Leno S., and Pedrotti, Leno M., Introduction to Optics,
Pearson Prentice HallTM (2008) 3rd ed.
Evaluation Scheme
Page 25 of 226
UES101: Engineering Drawing
L T P Cr
2 4 0 4.0
Course Objective: This module is dedicated to graphics and includes two sections: 2D
drafting and 3D modelling of solid objects. This course is aimed at making the student
understand the concepts of projection systems, learn how to create projections of solid
objects using first and third angle orthographic projection as well as isometric and auxiliary
projection, concept of sectioning, to interpret the meaning and intent of toleranced
dimensions and to create/edit drawings using drafting software. In addition, this course
shall give an insight on the basic 3D modelling concepts like extrude, revolve, sweep,
construction of complex solids.
Syllabus
2D Drafting
1. Management of screen menus commands
2. Creating basic drawing entities
3. Co-ordinate systems: Cartesian, polar and relative coordinates
4. Drawing limits, units of measurement and scale
5. Layering: organizing and maintaining the integrity of drawings
6. Design of prototype drawings as templates.
7. Editing/modifying drawing entities: selection of objects, object snap modes, editing
commands,
8. Dimensioning: use of annotations, dimension types, properties and placement, adding
text to
drawing
3D Modelling
1. Management of screen menus commands
2. Introduction to basic 3D modelling commands such as extrude, revolve, sweep etc.
3. Creation of 2D drawings from a 3D model
Page 26 of 226
Micro Projects /Assignments:
1. Completing the views - Identification and drawing of missing lines and views in the
projection of objects
Text Books
1. Jolhe, D.A., Engineering Drawing, Tata McGraw Hill, 2008
2. Davies, B. L., Yarwood, A., Engineering Drawing and Computer Graphics, Van
Nostrand Reinhold (UK), 1986
Reference Books
1. Gill, P.S., Geometrical Drawings, S.K. Kataria & Sons, Delhi (2008).
2. Gill, P.S., Machine Drawings, S.K. Kataria & Sons, Delhi (2013).
3. Mohan, K.R., Engineering Graphics, Dhanpat Rai Publishing Company (P) Ltd, Delhi
(2002).
4. French, T. E., Vierck, C. J. and Foster, R. J., Fundamental of Engineering Drawing &
Graphics Technology, McGraw Hill Book Company, New Delhi (1986).
5. Rowan, J. and Sidwell , E. H., Graphics for Engineers, Edward Arnold, London
(1968).
6. Mastering AutoCAD 2021 and AutoCAD LT 2021, Brian C. Benton, George Omura,
Sybex - John Wiley and Sons, Indiana (2021).
Page 27 of 226
Evaluation Scheme
*Students are required to bring their personal computers for the tutorial work.
*Availability of institute server resources for sharing the software licences with the student
community.
**Institute computational resources in collaboration with other academic units /
departments for conducting the mid semester and end semester test.
Page 28 of 226
UHU003: Professional Communication
L T P Cr
2023
Course Objective: The course is designed to develop the interpersonal,
written, and oral as well as the non- verbal communication skills of the
students. The course begins by building up on the theoretical concepts and
then practicing on the applicability of the various elements. Since the course
has very high applicability content, the students are advised to practice in
class as well as off class. A very high level of interaction is expected of the
students in the class.
Syllabus
Reading: The following texts (one from each of the two categories listed
below) are required to be read by the students in the semester:
Category 1: Animal Farm by George Orwell, Lord of the Flies by William
Golding, Life of Pi by Yann Martel
Category 2: The Namesake by Jhumpa Lahiri, The God of Small Things by
Arundhati Roy, Q&A by Vikas Swarup
Page 29 of 226
Laboratory Work
1. Needs-assessment of spoken and written communication with feedback.
2. Training for Group Discussions through simulations and role plays.
3. Technical report writing on survey-based projects.
4. Project-based team presentations.
Text Books
1. Mukherjee H.S..Business Communication: Connecting at Work.
Oxford University Press.(2013)
2. Lesikar R.V, and Flately M.E., Basic Business Communication Skills
for empowering the internet generation.(2006)
3. Raman, M.,and Singh ,P, Business Communication . Oxford .
University Press (2008).
Reference Books
Evaluation Scheme
Page 30 of 226
1 MST 25-30
2 EST 40-45
3 Sessional: (May include the following) 30
Assignment, Sessional (Includes Regular
Lab assessment and Quizzes Project
(Including report, presentation etc.)
Page 31 of 226
UES102: Manufacturing Processes
L T P Cr
2 0 2 3.0
Course Objective: This course introduces the basic concepts of
manufacturing via machining, forming, casting and joining, enabling the
students to develop a basic knowledge of the mechanics, operation and
limitations of basic machining tools along with metrology and measurement
of parts. The course also introduces the concept of smart manufacturing.
Syllabus
Machining Processes: Principles of metal cutting, Cutting tools, Cutting
tool materials and applications, Geometry of single point cutting tool,
Introduction to computerized numerical control (CNC) machines, G and M
code programming for simple turning and milling operations, introduction of
canned cycles.
Metal Forming: Hot & cold metal working, Forging, Rolling, Sheet Metal
operations.
Laboratory Work
Relevant shop floor exercises involving practices in Sand casting,
Machining, Welding, Sheet metal fabrication techniques, CNC turning and
milling exercises, Experiments on basic engineering metrology and
measurements to include measurements for circularity, ovality, linear
dimensions, profiles, radius, angular measurements, measurement of threads,
surface roughness.
Page 32 of 226
Course Learning Objectives (CLO)
The students will be able to:
Text Books
Reference Books
Evaluation Scheme
Page 33 of 226
UMA023: Differential Equations and Linear Algebra
L T P Cr
3 1 0 3.5
Course Objective: To introduce students the theory and concepts of differential equations,
linear algebra, Laplace transformations and Fourier series which will equip them with
adequate knowledge of mathematics to formulate and solve problems analytically.
Syllabus
Laplace Transform: Definition and existence of Laplace transforms and its inverse,
Properties of the Laplace transforms, Unit step function, Impulse function, Applications to
solve initial and boundary value problems.
Fourier Series: Introduction, Fourier series on arbitrary intervals, Half range expansions,
Applications of Fourier series to solve wave equation and heat equation.
Linear Algebra: Row reduced echelon form, Solution of system of linear equations,
Matrix inversion, Linear spaces, Subspaces, Basis and dimension, Linear transformation
and its matrix representation, Eigen-values, Eigen-vectors and Diagonalisation, Inner
product spaces and Gram-Schmidt orthogonalisation process.
1. Solve the differential equations of first and 2nd order and basic application problems
described by these equations.
2. Find the Laplace transformations and inverse Laplace transformations for various
functions. Using the concept of Laplace transform students will be able to solve the
initia value and boundary value problems.
3. Find the Fourier series expansions of periodic functions and subsequently will be able to
solve heat and wave equations.
4. Solve systems of linear equations by using elementary row operations.
5. Identify the vector spaces/subspaces and to compute their bases/orthonormal bases.
Further, students will be able to express linear transformation in terms of matrix and
find the eigenvalues and eigenvectors.
Text Books
1. Simmons, G.F., Differential Equations (With Applications and Historical Notes), Tata
McGraw Hill (2009).
2. Krishnamurthy, V.K., Mainra, V.P. and Arora, J.L., An introduction to Linear
Algebra, Affiliated East West Press (1976).
Page 34 of 226
Reference Books
1. Kreyszig Erwin, Advanced Engineering Mathematics, John Wiley (2006), 8th edition.
2. Jain, R.K. and Iyenger, S.R.K., Advanced Engineering Mathematics, Narosa Publishing
House (2011), 4th edition.
Evaluation Scheme
Page 35 of 226
SEMESTER
III
Page 36 of 226
UCS303: OPERATING SYSTEMS
L T P Cr
3 0 2 4.0
Course Objectives: To understand the role, responsibilities, and the algorithms involved for
achieving various functionalities of an Operating System.
Page 37 of 226
Protection and Security: Goals of Protection, Principles of Protection, Domain of
Protection, Access Matrix, Implementation of the Access Matrix, Access Control, Revocation
of Access Rights, Capability-Based Systems, The Security Problem, Program Threats,
System and Network Threats, User Authentication, Implementing Security Defenses,
Firewalling to Protect Systems and Networks.
Concurrency: The Critical- Hardware, Mutex Locks, Semaphores, Classic Problems of
Synchronization, Monitors.
Laboratory work:
To explore detailed architecture and shell commands in Linux / Unix environment,
Understanding of OS virtualization simulate CPU scheduling, Paging, Disk-scheduling and
process synchronization algorithms and simulate multithreading processing scenarios with a
focus on energy-efficient scheduling. Students has to submit a mini project.
Sample Mini Projects:
● Develop a basic task manager that monitors CPU and memory usage and suggests
actions to save energy.
● Simulate efficient virtual memory management techniques for optimized performance
in industrial systems.
● Modify a disk scheduling algorithm to reduce energy consumption.
● Create a user-friendly interface for visually impaired users to interact with an OS.
● Simulate an OS that distributes processes efficiently across multiple cores.
Course Outcomes (COs):
After the completion of the course, the student will be able to:
1. Explain the basic of an operating system viz. system programs, system calls, user
mode and kernel mode.
2. Select a particular CPU scheduling algorithms for specific situation, and analyze the
environment leading to deadlock and its rectification.
3. Explicate memory management techniques viz. caching, paging, segmentation, virtual
memory, and thrashing.
4. Understand the concepts related to file systems, disk-scheduling, and security,
protection.
5. Comprehend the concepts related to concurrency.
Text Books:
1. Silberschatz A., Galvin B. P. and Gagne G., Operating System Concepts, John Wiley
& Sons Inc (2013) 9th ed.
2. Stallings W., Operating Systems Internals and Design Principles, Prentice Hall (2018)
9th ed.
Reference Books:
Page 38 of 226
1. Bovet P. D., Cesati M., Understanding the Linux Kernel, O'Reilly Media (2006), 3rd
ed.
2. Kifer M., Smolka A. S., Introduction to Operating System Design and
Implementation: The OSP 2 Approach, Springer (2007).
Page 39 of 226
UTA018: Object Oriented Programming
L T P Cr
3 0 2 4.0
Course Objective:To become familiar with object oriented programming concepts and
be able to apply these concepts in solving diverse range of applications.
Laboratory Work
To implement object oriented constructs using C++programming language.
2. To apply and analyze the inheritance on real life case studies via coding
competences.
Page 40 of 226
3. To design and develop code snippets for polymorphism to proclaim coding
potential; and management of run-time exceptions.
Text Books
1. C++:The Complete Reference , Schildt H., Tata McGraw Hill, 4thed, 2003
2. C++Primer, Lippman B.S., Lajoie J., and MooE.B., , Addison-Wesley
Professional, 5th ed, 2013
Reference Books
1. Object-Oriented Programming in C++, Lafore R., Pearson Education, 4thed, 2002
2. Object Oriented Programming with C++, E Balagurusamy, 8thed,2017
3. The C++programming language, Stroustrup B., Pearson Education India, 4thed, 2013
Page 41 of 226
UCS301: Data Structures
L T P Cr
3 0 2 4.0
Course Objective:To become familiar with different types of data structures and their
applications.
Syllabus
Analysing algorithms: Basics of algorithm and its analysis, Complexity classes, order
arithmetic, Time and space trade-off in algorithms. Practical implications of inefficient
algorithms on energy consumption, need of minimizing computational overhead for
sustainability.
Linear Data Structures: Arrays, Strings and string processing, Linked lists (Singly,
Doubly, Circular), Abstract data types, their implementation and applications: Stacks
(using Arrays and Linked-list), Queues (using Arrays and Linked-list), Hash tables: Hash
functions, collision resolution techniques, Strategies for choosing the appropriate data
structure.
Searching and Sorting: Linear Search, Binary Search. Introduction to internal and
external sort, Bubble Sort, Selection Sort, Insertion Sort, Shell Sort, Quick Sort, Merge
Sort, Counting Sort, Radix Sort.
Trees and their applications: Introduction to binary tree, tree traversal algorithms, Binary
search tree, AVL Tree, B Tree etc. and common operations on these trees. Spatial data
structures (e.g., Quadtrees, R-trees etc.) for sustainable urban planning and waste
management. Heap, Heap Sort, Priority Queue using Heap.
Graphs and their applications: Graph Terminology and its representation, Depth and
breadth first traversals, Shortest-path algorithms (Dijkstra and Floyd), Data Structures for
Disjoint Sets, Minimum spanning tree (Prim and Kruskal). Applications of graphs in smart
grid management, waste collection routes, recycling networks etc.
Laboratory Work
Implementation of various data structures such as Arrays, Stacks, Queues, Lists, Binary
tree traversals, BST, AVL trees, Graphs traversals, Sorting and Searching techniques.
1. Understand the fundamental data structures, their implementation and some of their
standard applications.
2. Select and implement appropriate searching and sorting techniques for solving a
problem based on their characteristics.
3. Apply tree and graph data structures for specific applications.
4. Design and analyse algorithms using appropriate data structures for real-world problems.
Page 42 of 226
Text Books
1. Introduction to Algorithms,Cormen H. T., Leiserson E. C., Rivest L. R., and Stein
C, MIT Press,3rd ed., 2009
2. Data Structures, Algorithms and Applications in C++,Sahni S., Universities Press
2nd ed. 2005
Reference Books
1. Data Structures and Algorithms Made Easy,Karumanchi N., Career Monk
Publications, 5th ed., 2017
2. Data structures and algorithms in C++, Adam Drozdek, 4th edition.
Page 43 of 226
UCS405:Discrete Mathematical Structures
L T P Cr
3 1 0 3.5
Course Objective:The course objective is to provide students with an overview of Discrete
Mathematical Structures. Students will learn about topics such as logic and proofs, sets and
functions, graph theory, boolean algebra, number theory and other important discrete math
concepts.
Syllabus
Relations: Different types of relation and their representation, Equivalence and partial-
ordered relations, Partition and Covering of a set, N-ary relations and database, Closure of
relations, Warshall‘s algorithm, Lexicographic ordering, Hasse diagram, Lattices, Boolean
algebra.
Graphs Theory: Representation, Type of Graphs, Paths and Circuits: Euler Graphs,
Hamiltonian Paths & Circuits; Cut-sets, Connectivity and Separability, Planar Graphs,
Isomorphism, Graph Coloring, Covering and Partitioning, Application of Graph theory in
real-life applications.
Basic Logic: Propositional logic, Logical connectives, Truth tables, Normal forms
(conjunctive and disjunctive), Validity of well-formed formula, Propositional inference
rules (concepts of modus ponens and modus tollens), Predicate logic, Universal and
existential quantification, Proof Techniques.
Recurrence Relation: Solving linear recurrence relations, divide and conquer algorithms
and recurrence relations.
Page 44 of 226
1. Perform operations on various discrete structures such as set, function, and relation.
2. Apply basic concepts of asymptotic notation in the analysis of the algorithm.
3. Illustrate the basic properties and algorithms of graphs and apply them in modelling
and solving real-world problems.
4. Comprehend formal logical arguments and translate statements from a natural
language into their symbolic structures in logic.
5. Identify and prove various properties of rings, fields, and groups.
6. Illustrate and apply the division algorithm, mod function, and Congruence.
Text Books
1. Discrete Mathematics and its Applications,Rosen H. K., McGraw Hill, 7thed., 2011
2. Discrete Mathematical Structures with Applications to Computer Science,
Tremblay P. J. and Manohar, R., Tata McGraw Hill, 2008.
Reference Books
1. Contemporary Abstract Algebra, Gallian A. J., Cengage Learning, 9th ed., 2017
2. Discrete Mathematics, Lipschutz S., Lipson M., McGraw-Hill, 3rded.,2007
Page 45 of 226
UTA016: ENGINEERING DESIGN PROJECT – I
(including 2 self-effort hours)
L T P Cr
3.
1 0 2
0
To provide a basis for the technical aspects of the project a small number of lectures are
incorporated into the module. As the students would have received little in the way of formal
engineering instruction at this early stage in the degree course, the level of the lectures is to
be introductory with an emphasis on the physical aspects of the subject matter as applied to
the ‗Mangonel‘ project. The lecture series include subject areas such as Materials, Structures,
Dynamics and Digital Electronics delivered by experts in the field.
Page 46 of 226
Lec Topic Contents
No.
Lec1-5 Digital Prototype, Architecture, Using the Integrated Development
Electronics Environment (IDE) to Prepare an Arduino Sketch, structuring an
Arduino Program, Using Simple Primitive Types (Variables), Simple
programming examples. Definition of a sensor and actuator.
Project:
The Project will facilitate the design, construction and analysis of a ―Mangonel‖. In addition
to some introductory lectures, the content of the students‘ work during the semester will
consist of:
1. The assembly of a Mangonel from a Bill Of Materials (BOM), detailed engineering
drawings of parts, assembly instructions, and few prefabricated parts;
2. The development of a software tool to allow the trajectory of a ―missile‖ to be studied
as a function of various operating parameters in conditions of no-drag and drag due to
air;
3. A structural analysis of certain key components of the Mangonel for static and dynamic
stresses using values of material properties which will be experimentally determined;
4. The development of a micro-electronic system to allow the angular velocity of the
throwing arm to be determined;
5. Testing the Mangonel;
6. Redesigning the throwing arm of the Mangonel to optimise for distance without
compromising its structural integrity;
Page 47 of 226
7. An inter-group competition at the end of the semester with evaluation of the group
redesign strategies.
Text Books:
1. Michael Mc Roberts, Beginning Arduino, Technology in action publications.
2. Alan G. Smith, Introduction to Arduino: A piece of cake, Create Space Independent
Publishing Platform (2011).
Reference Book:
1. John Box all, Arduino Workshop – A Hands-On Introduction with 65 Projects, No
Starch Press (2013).
Page 48 of 226
UMA021: Numerical Linear Algebra
L T P Cr
3 0 2 4.0
Course Objectives: The goal of this course is to give students an introduction to numeric
and algorithmic techniques used for the solution of a broad range of mathematical
problems, with an emphasis on computational issues and linear algebra. In addition,
students will become familiar with numeric programming environments Matlab.
Contents:
Reference Books
1. Steven C. Chapra and Raymond P. Canale, Numerical Methods for Engineers,
Page 49 of 226
McGraw-Hill Higher Education, 6th edition, 2010.
2. E. Ward Cheney and David R. Kincaid, Numerical Mathematics and Computing,
Cengage Learning, 7th edition, 2012.
3. Endre Suli and David F. Mayers, An Introduction to Numerical Analysis, Cambridge
University Press, 2003
Evaluation Scheme:
Sr. No. Evaluation elements Weightage
(%)
1 MST 25
2 EST 45
3 Sessionals (Assignments/Quizzes/Lab Evaluation) 30
Page 50 of 226
UCS320: Introduction to Sustainable Green Computing
L T P Cr
1 0 0 1
Course Objective: This course aims to provide the fundamental concepts and motivations
behind sustainable computing, including the environmental impact of IT systems.
Sustainable Data Centers and Cloud Computing: Overview of data centre infrastructure and
energy consumption; Green data centres design, cooling, and energy management;
Virtualization and server consolidation; Renewable energy in powering data centres; Carbon
footprint measurement and reduction in cloud computing.
4. Analyze the energy usage and carbon footprint of hardware, software, and network
infrastructure.
TEXT BOOKS:
1.Neha Sharma, ”Green Computing for Sustainable Smart Cities: A Data Analytics
Applications Perspective”,CRC Press, March 2024
Page 51 of 226
REFERENCES:
2. Alin Gales, Michael Schaefer, Mike Ebbers, “Green Data Center: steps for the Journey”,
Shroff/IBM rebook, 2011.
Page 52 of 226
SEMESTER
IV
Page 53 of 226
UCS415:DESIGN AND ANALYSIS OF ALGORITHMS
L T P Cr
3 0 2 4.0
Course ObjectiveTo provide students with the knowledge and skills necessary to design
and analyse algorithms for solving computational problems.
Syllabus:
Divide and Conquer: Fundamentals of divide and conquer strategy, Applications such as
The maximum subarray problem, Strassen‘s algorithm for matrix multiplication, merge
sort, quick sort etc.
Branch and Bound Algorithm: General method, Applications such as0/1 knapsack
problem, Traveling salesperson problem etc.
Graphs & Algorithms: Introduction to graphs, Paths and Circuits, Euler Graphs,
Hamiltonian graphs, Applications of Eulerian/Hamiltonian Graph in urban planning, Cut-
sets, Strongly connected component, Topological sort, Max flow: Ford Fulkerson
algorithm, max flow- min cut, Application of Ford Fulkerson in smart grid energy
distribution.
Page 54 of 226
2. Apply common algorithmic techniques such as greedy, dynamic programming etc.
to standard computational problems.
3. Design solutions using appropriate data structures and algorithms, such as string
matching, randomized, approximation and graph algorithms.
4. Develop efficient algorithms to solve various computationally complex problems in
computing.
Text Books
1. Cormen H. T., Leiserson E. C., Rivest L. R., and Stein C., Introduction to
Algorithms, MIT Press (2009) 3rd ed.
2. Horwitz E., Sahni S., Rajasekaran S., Fundamentals of Computers Algorithms,
Universities Press (2008) 2nd ed.
Reference Books
1. Levitin A., Introduction to the design and analysis of algorithms, Pearson Education
(2008) 2nd ed.
2. Aho A.V., Hopcraft J. E., Dulman J. D., The Design and Analysis of Computer
Algorithms, Addsion Wesley (1974) 1st ed.
3. Sedgewick R. and Wayne K., Algorithms, Addison-Wesley Professional (2011),
4th ed.
Page 55 of 226
UCS310:Database Management Systems
L T P Cr
3 0 2 4.0
Course Objective:Emphasis is on the need of database systems. Main focus is on E-R
diagrams, relational database, concepts of normalization and de-normalization and SQL
commands.
Syllabus
Database Analysis: Conceptual data modeling using E-R data model -entities, attributes,
relationships, generalization, specialization, specifying constraints, Conversion of ER
Models to Tables, Practical problems based on E-R data model.
Laboratory Work
Students will perform SQL commands to demonstrate the usage of DDL and DML, joining
of tables, grouping of data and will implement PL/SQL constructs. They will also
implement one project.
Project: It will contain database designing & implementation, should be given to group of
2-4 students. While doing projects emphasis should be more on back-end programming
like use of SQL, concept of stored procedure, function, triggers, cursors, package etc.
Project should have continuous evaluation and should be spread over different components.
Page 56 of 226
outcomes.[3]
Data management systems can support urban planning, resource allocation, and
sustainability efforts, helping to build smarter, more resilient cities.[11]
Course Learning Objectives (CLO)
The students will be able to:
1. Analyze the Information Systems as socio-technical systems, its need and advantages as
compared to traditional file-based systems.
2. Analyze and design database using E-R data model by identifying entities, attributes and
relationships.
3. Apply and create Relational Database Design process with Normalization and
Denormalization of data.
4. Comprehend the concepts of transaction management, concurrence control and recovery
management.
5. Demonstrate use of SQL and PL/SQL to implementation database applications.
Text Books
1. Database System Concepts, Silverschatz A., Korth F. H. and Sudarshan S., Tata
McGraw Hill, 6th ed, 2010
2. Fundamentals of Database Systems,Elmasri R. and Navathe B. S., Pearson, 7th ed,
2016
Reference Books
1. SQL, PL/SQL the Programming Language of Oracle, Bayross I., BPB Publications,
4th ed, 2009
2. Modern Database Management,Hoffer J., Venkataraman, R. and Topi, H., Pearson,
12th ed2016
3. Simplified Approach to DBMS, Parteek Bhatia and Gurvinder Singh,
4. Database management systems. Vol. 3. Raghu Ramakrishnan and Johannes Gehrke
5. FOR SQL/RA, New York: McGraw-Hill,
Page 57 of 226
UES021: ENGINEERING MATERIALS
L T P Cr
2 0 2 3
Equilibrium diagram: Solids solutions and alloys, Gibbs phase rule, Unary and binary
eutectic phase diagram, Examples and applications of phase diagrams like Iron - Iron carbide
phase diagram.
Electrical and magnetic materials: Conducting and resister materials, and their engineering
application; Semiconducting materials, their properties and applications; Magnetic materials,
Soft and hard magnetic materials and applications; Superconductors; Dielectric materials,
their properties and applications. Smart materials: Sensors and actuators, piezoelectric,
magnetostrictive and electrostrictive materials.
Page 58 of 226
8. To estimate the Hall coefficient, carrier concentration and mobility in a semiconductor
crystal.
9. To estimate the band-gap energy of a semiconductor using four probe technique.
10. To measure grain size and study the effect of grain size on hardness of the given
metallic specimens.
Text Books:
1. W.D. Callister, Materials Science and Engineering; John Wiley & Sons, Singapore,
2002.
2. W.F. Smith, Principles of Materials Science and Engineering: An Introduction; Tata
Mc-Graw Hill, 2008.
3. V. Raghavan, Introduction to Materials Science and Engineering; PHI, Delhi, 2005.
Reference Books:
1. S. O. Kasap, Principles of Electronic Engineering Materials; Tata Mc-Graw Hill, 2007.
2. L. H. Van Vlack, Elements of Material Science and Engineering; Thomas Press, India,
1998.
3. K. G. Budinski, Engineering Materials – Properties and selection, Prentice Hall India,
1996.
Page 59 of 226
UCS411: Artificial Intelligence
L T P Cr
3 0 2 4.0
Course Objectives: This course introduces students to the fundamental concepts,
techniques, and applications of Artificial Intelligence (AI). Students will gain theoretical
knowledge and practical skills in areas such as problem-solving using search techniques,
machine learning and designing intelligent agents for solving particular engineering
problems.
Syllabus:
Introduction to Artificial Intelligence: Foundations, scope, types of AI, problems, and
approaches of AI
Intelligent agents: Structure of agents, Types of agent programs: reflux, model-based,
goal-driven, utility-driven, and learning agents
Problem spaces: State Space Representation, Representation of problems as state space,
problem characteristics, sample applications
Uninformed Search Algorithms: Brute Force search, Depth-First Search, Breadth-First
search, Depth-Limited Search, Uniform Cost Search, Bidirectional Search
Informed search algorithms: Heuristic Functions, Best-First search, Beam Search, Hill
Climbing, A* algorithm, AO graph, stochastic search algorithms: Simulated Annealing and
Genetic Algorithm
Game playing: Minimax algorithm, alpha-beta pruning, iterative deepening
Introduction to Machine Learning: Well-Posed learning problems, Basic concepts,
Designing a learning system, Types of machine learning: Supervised learning,
Unsupervised learning, Semi-supervised Learning and Reinforcement learning, Types of
data: structured and unstructured data.
Supervised Learning: Introduction to supervised learning tasks, Tree induction
algorithms: split algorithm based on Information Gain (ID3), split algorithm based on Gain
Ratio (C4.5), split algorithm based on Gini Index (CART), Instance based algorithms: K-
Nearest Neighbours (K-NN), Probabilistic algorithms: Naïve Bayes algorithm, Evaluation
metrics.
Page 60 of 226
Implementing Machine Learning algorithms: Tree-based methods, K-NN, Naïve-Bayes
algorithms, K-Means (from scratch and using sklearn library)
Text Books
1. Russel S., Norvig P., Artificial Intelligence: A Modern Approach, Prentice Hall (2014)
3rd ed.
2. Murphy, Kevin P. Machine learning: a probabilistic perspective. MIT press, (2012) 3rd
ed.
Reference Books
1. Rich E., Knight K. and Nair B. S., Artificial Intelligence, Tata McGraw Hills (2009) 3rd
ed.
2. Luger F. G., Artificial Intelligence: Structures and Strategies for Complex Problem
Solving, Pearson Education Asia (2009) 6th ed.
Page 61 of 226
UMA401: PROBABILITY AND STATISTICS
L T P Cr
4.
3 0 2
0
Course Objectives: This course shall make the students familiar with the concepts of
Probability and Statistics useful in implementing various computer science models. One will
also be able to associate distributions with real-life variables and make decisions based on
statistical methods.
Probability: Sample space, Events, Classical, relative frequency and axiomatic definitions of
probability, addition rule and conditional probability, multiplication rule, total probability,
Baye‘s Theorem.
Random Variables: Discrete, continuous and mixed random variables, probability mass,
probability density and cumulative distribution functions, mathematical expectation,
moments, probability and moment generating function, median and quantiles, Markov
inequality, Chebyshev‘s inequality, Function of a random variable.
Sampling Distributions: The Central Limit Theorem, distributions of the sample mean and
the sample variance for a normal population, Chi-Square, t and F distributions.
Testing of Hypotheses: Null and alternative hypotheses, the critical and acceptance regions,
two types of error, power of the test, the most powerful test and Neyman-Pearson
Fundamental Lemma, tests for one sample and two sample problems for normal populations,
tests for proportions, Chi-square goodness of fit test and its applications.
Page 62 of 226
Laboratory Work:
Implementation of statistical techniques using statistical packages viz. SPSS/R including
evaluation of statistical parameters and data interpretation, regression analysis, covariance,
hypothesis testing and analysis of variance.
Text Books:
1. Probability & Statistics for Engineers & Scientists by R.E. Walpole, R.H. Myers, S.L.
Myers & Keying Ye, Prentice Hall, (2016), 9th edition.
2. An Introduction to Probability and Statistics by V.K. Rohatgi & A.K. Md. E. Saleh,
Wiley, (2008), 2nd edition
Reference Books:
1. Miller and Freund's – Probability and Statistics for Engineers by R. A. Johnson, Person
Education, (2017), 9th edition.
2. Introduction to Probability and Statistics for Engineers and Scientists by S.M. Ross,
Elsevier, (2014), 4th edition.
Page 63 of 226
UTA024: ENGINEERING DESIGN PROJECT – II
L T P Cr
3.
1 0 4
0
Course Objectives: The project will introduce students to the challenge of electronic systems
design & integration. The project is an example of ‗hardware and software co-design‘ and the
scale of the task is such that it will require teamwork as a co-ordinated effort.
Programming of Arduino:
● Introduction to Arduino: Setting up the programming environment and basic
introduction to the Arduino micro-controller
● Programming Concepts: Understanding and Using Variables, If-Else Statement,
Comparison Operators and Conditions, For Loop Iteration, Arrays, Switch Case
Statement and Using a Keyboard for Data Collection, While Statement, Using Buttons,
Reading Analog and Digital Pins, Serial Port Communication, Introduction
programming of different type of sensors and communication modules, DC Motors
controlling.
Basics of C#:
● Introduction: MS.NET Framework Introduction, Visual Studio Overview and
Installation
● Programming Basics: Console programming, Variables and Expressions, Arithmetic
Operators, Relational Operators, Logical Operators, Bitwise Operators, Assignment
Operators, Expressions, Control Structures, Characters, Strings, String Input, serial port
communication: Read and write data using serial port.
● Software code optimization, software version control
Page 64 of 226
Laboratory Work:
Schematic circuit drawing and PCB layout design on CAD tools, implementing hardware
module of IR sensor, Transmitter and Receiver circuit on PCB.
Bronze Challenge: Single buggy around track twice in clockwise direction, under full
supervisory control. Able to detect an obstacle.Parks safely. Able to communicate state of the
track and buggy at each gantry stop to the console.
Silver Challenge: Two buggies, both one loop around, track in opposite directions under full
supervisory, control. Able to detect an obstacle. Both park safely. Able to communicate state
of the track and buggy at each gantry stop with console.
Gold Challenge: Same as silver but user must be able to enter the number of loops around
the track beforehand to make the code generalized.
Text Books:
1. Michael McRoberts, Beginning Arduino, Technology in action publications, 2nd
Edition.
2. Alan G. Smith, Introduction to Arduino: A piece of cake, CreateSpace Independent
Publishing Platform (2011).
Reference Book:
1. John Boxall, Arduino Workshop - a Hands-On Introduction with 65 Projects, No Starch
Press; 1st edition (2013).
Page 65 of 226
UTD003: Aptitude Skills Building
L T P Cr
2 0 0 2.0
Course Objectives:
This course aims to sensitize students with the gamut of skills which facilitate them to enhance their
employability quotient and do well in the professional space. These skills are imperative for students
to establish a stronger connect with the environment in which they operate. An understanding of
these skills will enable students to manage the placement challenges more effectively.
Emotional Intelligence: Understanding Emotional Intelligence (EI); Daniel Goleman’s EI Model: Self
Awareness, Self-Regulation, Internal Motivation, Empathy, Social Skills; Application of EI during
Group Discussions & Personal Interview; Application of EI in personal life, student life and at the
workplace
Team Dynamics & Leadership: Understanding the challenges of working within a team format in
today’s complex organizational environments; Stages of team formation; Appreciating forces that
influence the direction of a team's behaviour and performance; Cross-functional teams; Conflict in
Teams- leveraging differences to create opportunity Leadership in the team setting & energizing
team efforts; Situational leadership; Application of team dynamics & collaboration in Group
Discussions; Application of team dynamics at the workplace
Complex Problem Solving: Identifying complex problems and reviewing related information to
develop and evaluate options and implement solutions; Understanding a working model for complex
problem solving - framing the problem, diagnosing the problem, identifying solutions & executing
the solutions; Appreciation of complex problem solving at the workplace through case studies
Lateral Thinking: Understanding lateral thinking & appreciating the difference between vertical &
lateral thinking, and between convergent & divergent thinking; Understanding brain storming &
mind-maps; Solving of problems by an indirect and creative approach, typically through viewing the
problem in a new and unusual light; Application of lateral thinking during Group Discussions &
Personal Interviews; Application of lateral thinking at the workplace
Quantitative Reasoning: Thinking critically and applying basic mathematics skills to interpret data,
draw conclusions, and solve problems; developing proficiency in numerical reasoning; Application of
quantitative reasoning in aptitude tests
Verbal Reasoning: Understanding and reasoning using concepts framed in words; Critical verbal
reasoning; Reading Comprehension; Application of verbal reasoning in aptitude tests
Group Discussion (GD): Illustrating the do’s and don’ts in Group Discussions; Specific thrust on types
of GD topics; GD evaluation parameters; Understanding the challenge in a case discussion; SPACER
model
Personal Interview (PI): Interview do’s and don’ts; PI evaluation parameters; The art of introduction;
Managing bouncer questions; Leading the panel in a PI
Page 66 of 226
Course Learning Outcomes (CLOs):
1. appreciate the various skills required for professional & personal success.
2. bridge the gap between current and expected performance benchmarks.
3. competently manage the challenges related to campus placements and perform to their
utmost potential.
Recommended Books:
1. Harvard Business Essentials; Creating Teams with an Edge; Harvard Business School Press
(2004)
2. Edward de B., Six Thinking Hats; Penguin Life (2016)
3. Daniel, G., Working with Emotional Intelligence; Bantam Books (2000)
4. Aggarwal, R.S., Quantitative Aptitude for Competitive Examinations; S Chand (2017)
5. Agarwal, A., An expert guide to problem solving: with practical examples; CreateSpace
Independent Publishing Platform (2016)
6. William, D., The Logical Thinking process; American Society for Quality (2007)
Page 67 of 226
SEMESTER
V
Page 68 of 226
UML501: MACHINE LEARNING
L T P Cr
3 0 2 4.0
Course Objectives: This course provides a broad introduction to machine learning and
statistical pattern recognition. It offers some of the most cost-effective approaches to
automated knowledge acquisition in emerging data-rich disciplines and focuses on the
theoretical understanding of these methods, as well as their computational implications.
Association Rules Learning: Need and Application of Association Rules Learning, Basic
concepts of Association Rule Mining, Naïve algorithm, Apriori algorithm.
Artificial Neural Network: Need and Application of Artificial Neural Network, Neural
network representation and working, Activation Functions.
Laboratory Work:
Implement data preprocessing, Simple Linear Regression, Multiple Linear Regression,
Decision Tree, Random forest classification, Naïve Bayes algorithm; K-Nearest Neighbors
(K-NN), Support Vector Machine , k-Means, Apriori algorithm and ANN in
Python/R/MATLAB/Mathematica/Weka.
Page 69 of 226
Course Learning Outcomes (CLOs) / Course Objectives (COs):
After the completion of the course, the student will be able to:
1. Analyze methods and theories in the field of machine learning and provide an introduction to the
basic principles, techniques, and applications of machine learning, supervised, unsupervised and
reinforcement learning.
2. Comprehend and apply regression techniques.
3. Comprehend and implement various classification and clustering methods.
4. Understand the concept of association rule mining and neural networks and their implementation
in context of Machine Learning.
Text Books:
1. Mitchell M., T., Machine Learning, McGraw Hill (1997) 1st Edition.
2. Alpaydin E., Introduction to Machine Learning, MIT Press (2014) 3rd Edition.
3. Vijayvargia Abhishek, Machine Learning with Python, BPB Publication (2018)
Reference Books:
1. Bishop M., C., Pattern Recognition and Machine Learning, Springer-Verlag (2011) 2nd
Edition.
2. Michie D., Spiegelhalter J. D., Taylor C. C., Campbell, J., Machine Learning, Neural
and Statistical Classification. Overseas Press (1994).
Page 70 of 226
UCS414: COMPUTER NETWORKS
L T P Cr
3 0 2 4.0
Course Objectives: The subject will introduce the basics of computer networks to students through a study
of layered models of computer networks and applications.
Introduction: Computer Network, Criteria and Energy Efficient Networking, Green IT Practices,
Classification of networks, Network performance and Transmission Impairments. Networking Devices, OSI
and TCP/IP Protocol Suite, Layering principles, Energy efficient Line Encoding, Switching and
Multiplexing techniques.
Local Area Networks: Networking topologies: Bus, Star, Ring, Token passing rings, Ethernet,
Environmental Considerations in Network Design, Energy Optimization in LAN, IEEE standards 802.3,
802.4, 802.5.802.11.Multiple access: ALOHA, Slotted ALOHA, Hidden and Exposed Terminal problems,
Carrier sense multiple access protocols, CSMA/CD, CSMA/CA, Power Optimized Wireless LANs.
Reliable Data Delivery: Error Detection, Parity Check, Checksum and CRC, Error control (Sustainable
retransmission techniques, timers), Energy Optimized Flow control (Acknowledgements, sliding window),
Multiple Access, Performance issues (pipelining).
Routing and Forwarding: Routing versus forwarding, Static and dynamic routing, Unicast and Multicast
Routing. Distance-Vector, Link-State, Shortest path computation, Dijkstra's algorithm, Network Layer
Protocols (IP, ICMP), IP addressing, Sub-netting, IPV6, Address binding with ARP, Carbon/Energy-aware
Routing Strategies, and optimization techniques for reducing the carbon footprint of network traffic (Green
Data Centres and Servers).
Process-to-Process Delivery: UDP, TCP and SCTP, Multiplexing with TCP and UDP, Principles of
congestion control, Sustainable Approaches to Congestion control, Balancing Quality of Service and Energy,
Flow characteristics, Techniques to improve QoS.
Sustainable Network Applications: Naming and DNS, Uniform Resource Identifiers, Energy Efficient
Distributed Applications (client/server, peer-to-peer, Smart and Sustainable Cities, etc.), File transfer,
Telnet, e-mail, Bluetooth.
Laboratory work:
To design conceptual networks using tools like E-Draw, Microsoft Visio, and NS-3, implement topologies
(BUS, RING, STAR, and Mesh) in GNS3, and develop skills in configuring IP Addresses, Routers, DHCP,
and Sub-netting.
Page 71 of 226
2. Understand the concept of data communication, error detection and correction, access and flow
control.
3. Demonstrate the operation of various routing protocols, sub-netting and their performance analysis.
4. Illustrate design and implementation of datalink, transport and network layer protocols within a
simulated/real networking environment.
Text Books:
1. Forouzan A. B., Data communication and Networking, McGraw Hill (2012) 5th ed.
2. Tanenbaum S. A. and Wetherall J. D., Computer Networks, Prentice Hall (2013) 5th ed.
Reference Books:
1. Kurose J. and Ross K., Computer Networking: A Top Down Approach, Pearson (2017) 7th ed.
2. Stallings W., Computer Networking with Internet Protocols and Technology, Pearson (2004).
Page 72 of 226
UCS615: Image Processing
L T P Cr
3 0 2 4.0
Laboratory work: Demonstrate the use of Image Processing Toolbox on MATLAB/PYTHON to create
interactive image processing applications like image enhancement, image compression, image segmentation,
feature extraction etc.
Page 73 of 226
Text Books:
1. Gonzalez C. R., Woods E. R., Digital Image Processing, Pearson Education, 4th ed.
2. Anil K. Jain, Fundamentals of Digital Image Processing, Prentice Hall, 1989.
Reference Books:
1. McAndrew A., Introduction to Digital Image Processing with Matlab, Thomson Course Technology
(2004)
2. Low A., Introductory Computer Vision and Image Processing, McGraw-Hill (1991), 1sted.
Page 74 of 226
UCS503: SOFTWARE ENGINEERING
L T P Cr
3 0 2 4.0
Course Objectives: To plan and manage large-scale software and learn emerging trends in software
engineering.
Software Engineering and Processes: Introduction to Software Engineering, Software Evolution, Software
Characteristics, , Software Crisis: Problems and Causes, Software process models -Waterfall, Iterative,
Incremental and Evolutionary process models, Role of Software in Sustainable Development,Green Coding
Guidelines (Optimizing Memory & CPU Utilization), Regulatory Aspects & Global Policies on Green IT.
ISO Standards for Green IT
Software Design and construction: System design principles like levels of abstraction, separation of
concerns, information hiding, coupling and cohesion, Structured design (top-down or functional
decomposition), object-oriented design, event driven design, component-level design, test driven design,
data design at various levels, architecture design like Model View Controller, Client – Server architecture.
Coding Practices: Techniques, Refactoring, Integration Strategies, Internal Documentation, Green Software
Architecture (Microservices vs. Monolith, Edge Computing)
Software Verification and Validation: Levels of Testing, Functional Testing, Structural Testing, Test Plan,
Test Case Specification, Software Testing Strategies, Verification & Validation, Unit and Integration
Testing, Alpha & Beta Testing, White box and black box testing techniques, System Testing and Overview
of Debugging.
Agile Software Development: Agile Manifesto, Twelve Practices of eXtreme Programming (XP), XP
values, XP practices, velocity, spikes, working of Scrum, product backlog, sprint backlog, Adaptive
Software Development(ASD), Feature Driven Development (FDD), Test Driven Development, Dynamic
System Development Method(DSDM), and Crystal Methodology,Agile Requirement and Design: User
Stories, Story Boards, UI Sketching and Story Cards. Energy-Aware UI/UX Design (Dark Mode, Reduced
Animations, Low Power UX Patterns)
Software Project Management: Overview of Project Management: Scope, Time and Cost estimations.
Case Studies: Energy-Efficient Software Practices in Google, Microsoft, Meta
Laboratory work:
Implementation of Software Engineering concepts and exposure to CASE tools like Rational Software Suit
through projects.
Page 75 of 226
Course Learning Outcomes (CLOs) / Course Objectives (COs):
On completion of this course, the students will be able to
1. Analyze software development process models for software development life cycle.
2. Elicit, describe, and evaluate a system's requirements and analyze them using various UML models.
3. Demonstrate the use of design principles in designing data, architecture, user and component level
design.
4. Test the system by planning appropriate test cases and applying relevant test strategies.
5. Comprehend the use of agile development methodologies including UI sketching, user stories, story
cards and backlog management.
Text Books:
1. Pressman R., Software Engineering, A Practitioner‘s Approach, McGraw Hill International, 7 th ed.
(2010).
2. Sommerville I., Software Engineering, Addison-Wesley Publishing Company, 9th ed. (2011).
Reference Books:
1. Jalote P.,An integrated Approach to Software Engineering, Narosa, 3rd ed. (2005).
2. Booch G.,Rambaugh J.,Jacobson I.,The Unified Modeling Language User Guide, 2nd ed. (2005).
Page 76 of 226
UCS510: COMPUTER ARCHITECTURE AND ORGANIZATION
L T P Cr
3 0 0 3.0
Course Objectives: Focus is on the architecture and organization of the basic computer modules viz.
controls unit, central processing unit, input-output organization and memory unit.
Basics of Computer Architecture: Number System and code conversion , Logic gates, Flip flops,
Registers, Multiplexer, De-multiplexer, Decoder, Encoder etc. IEEE 754 Floating point representation.
32bit/64bit
Register Transfer and Micro operations: Register transfer Language, Register transfer, Bus & memory
transfer, Arithmetic micro operations, Logic micro operations, Shift micro operations, Design of ALU
(Decent work and economic growth). Three state buffer, Binary Adder, Binary Incrementor.
Basic Computer Organization: Instruction codes, Computer instructions, Timing &control, Instruction
Cycles, Memory, register, and input-output reference instructions, Interrupts, Complete computer description
& design of basic computer. Direct and Indirect Address.
Central Processing Unit: General register organization, Stack organization, Instruction format, Addressing
modes, Data transfer & manipulation, Program control, RISC, CISC. Register and memory stack, software
and hardware interrupt, Green Computing (Affordable and clean energy).
Pipelining and Computer Arithmetic: Addition & Subtraction, Multiplication Algorithms, Division
algorithms. Instruction Pipeline, Data Pipeline, Risk Pipline (Industry, innovation and infrastructure).
Dependencies in a pipeline processor, pipeline hazard.
Memory Unit: Memory hierarchy, Processor vs. memory speed, High-speed memories, Main Memory,
Cache memory, Associative memory, Interleaving, Virtual memory, Memory management techniques.
Direct Mapping, Set Associative Mapping.
Page 77 of 226
2. Hayes, J.P., Computer Architecture and Organization, McGraw Hill (1998) 3 ed.
rd
Reference Books:
1. Hennessy, J.L., Patterson, D.A, and Goldberg, D., Computer Architecture A Quantitative Approach,
Pearson Education Asia (2006) 4 ed.
th
2. Leigh, W.E. and Ali, D.L., System Architecture: software and hardware concepts, South Wester
Publishing Co. (2000) 2 ed.
nd
Page 78 of 226
SEME
STER
VI
Page 79 of 226
UCS701: THEORY OF COMPUTATION
L T P Cr
3 1 0 3.5
Course Objectives: This course introduces basic theory of computer science and formal
methods of computation. The course exposes students to the computability theory, as well as
to the complexity theory.
Context Free Grammar and Push Down Automata: Context Free Grammar, Derivation
tree and Ambiguity, Application of Context free Grammars, Chomsky and Greibach Normal
form, Properties of context free grammar, CKY Algorithm, Decidable properties of Context
free Grammar, Pumping Lemma for Context free grammar, Push down Stack Machine,
Design of Deterministic and Non-deterministic Push-down stack.
Turing Machine: Turing machine definition and design of Turing Machine, Variations of
Turing Machines, combining Turing machine, Universal Turing Machine, Post Machine,
Chomsky Hierarchy, Post correspondence problem, Halting problem, Turing decidability.
Page 80 of 226
Text Books:
1. Hopcroft E. J., Ullman D. J. and Motwani R., Introduction to Automata Theory,
Languages and Computation, Pearson Education (2007) 3rd ed.
2. Martin C. J., Introduction to Languages and the Theory of Computation, McGraw-Hill
Higher Education (2011) 4th ed.
3. Lewis R. H., Papadimitriou H. C., Elements of the Theory of Computation, Prentice
Hall (1998) 2nd ed.
Reference Books:
1. Cohen A. I. D., Introduction to Computer Theory, Wiley (1997) 2nd ed.
2. Sipser M., Introduction to the Theory of Computation, Cengage Learning (2013) 3rd ed.
Page 81 of 226
UMA035: OPTIMIZATION TECHNIQUES
L T P Cr
3 0 2 4.0
Course Objectives: The main objective of the course is to formulate mathematical models
and to understand solution methods for real life optimal decision problems. The emphasis
will be on basic study of linear and non-linear programming problems, Integer programming
problem, Transportation problem, Two person zero sum games with economic applications
and project management techniques using CPM.
Integer Programming: Branch and bound technique, Gomory‗s Cutting plane method.
Nonlinear Programming:
Laboratory Work:
Lab experiments will be set in consonance with materials covered in the theory using Matlab.
Page 82 of 226
Course Learning Outcomes (CLOs) / Course Objectives (COs):
Upon Completion of this course, the students would be able to:
1. Formulate the linear and nonlinear programming problems.
2. Solve linear programming problems using Simplex method and its variants.
3. Construct and optimize various network models.
4. Construct and classify multi-objective linear programming problems.
5. Solve nonlinear programming problems.
Text Books:
1. Chandra, S., Jayadeva, Mehra, A., Numerical Optimization and Applications, Narosa
Publishing House, (2013).
2. Taha H.A., Operations Research-An Introduction, PHI (2007).
Recommended Books:
1. Pant J. C., Introduction to optimization: Operations Research, Jain Brothers (2004).
2. Bazaarra Mokhtar S., Jarvis John J. and Shirali Hanif D., Linear Programming and
Network flows, John Wiley and Sons (1990).
3. Swarup, K., Gupta, P. K., Mammohan, Operations Research, Sultan Chand & Sons,
(2010).
4. H.S. Kasana and K.D. Kumar, Introductory Operations research, Springer publication,
(2004).
5. Ravindran, D. T. Phillips and James J. Solberg: Operations Research- Principles and
Practice, John Wiley & Sons, Second edn. (2005).
Page 83 of 226
UCS617: MICROPROCESSOR-BASED SYSTEMS DESIGN
L T P Cr
3 0 2 4.0
Instruction Set: Current program status register, CPU Component and Data Paths, ARM User Registers,
Instruction Components, Load/Store Instructions, Branch Instructions, Pseudo-Instructions, Data Processing
Instructions, Special Instructions, Structured Programming: Sequencing, Selection, Iteration, Subroutines,
Aggregate Data Types, Abstract Data Types, Word Frequency Counts.
Performance Mathematics: Binary Multiplication, Binary Division, Big Integer ADT, Fixed Point
Numbers, Fixed-point operations, Floating point numbers, Floating point operations, Optimized Primitives:
Double Precision Integer Multiplication, Integer Normalization and count Leading zeros, Division, Square
root, Transcendental Functions: log, exp, sin and cos. Random Number Generation
Laboratory Work:
Programming examples of 8086.Interfacing of 8086 with 8255 and 8259. Introduction to Kiel Software,
Introduction to ARM processor kit, Programming examples of ARM processor. ARM based Projects
Text Books:
1. Barry B. Brey, Intel Microprocessors, 8th edition, Prentice Hall, PEARSON (2012).
2. Larry D. Pyeatt, ―Modern Assembly Language Programming with the ARM processor‖, Newnes, 1 st
Edition, 2016.
Reference Books:
Page 84 of 226
1. ARM System on Chip Architecture–Steve Furber–2nd Ed., 2000, Addison Wesley Professional.
2. Steve Furber, ARM System On Chip Architecture, Pearson Education India, 2014.
3. Gibson, Glenn A., Liu, Yu-Cheng., Microcomputer Systems: The 8086/8088 Family
Architecture Programming And Design, 2nd edition, Pearson (2001)
Page 85 of 226
UTA025: INNOVATION AND ENTREPRENEURSHIP
(2 SELF-EFFORTS HOURS)
L T P Cr
1 0 2 3.0
Course Objectives: This course aims to provide the students with a basic understanding in
the field of entrepreneurship, entrepreneurial perspectives, concepts and frameworks useful
for analyzing entrepreneurial opportunities, understanding eco-system stakeholders and
comprehending entrepreneurial decision making. It also intends to build competence with
respect business model canvas and build understanding with respect to the domain of start-up
venture finance.
Crafting business models and Lean Start-ups: Introduction to business models; Creating
value propositions - conventional industry logic, value innovation logic; customer focused
innovation; building and analyzing business models; Business model canvas, Introduction to
lean startups, Business Pitching.
Text Books:
Page 86 of 226
Ries, Eric (2011), The lean Start-up: How constant innovation creates radically successful businesses,
Penguin Books Limited.
Blank, Steve (2013), The Startup Owner‗s Manual: The Step by Step Guide for Building a
Great Company, K&S Ranch.
S. Carter and D. Jones-Evans, Enterprise and small business- Principal Practice and Policy,
Pearson Education (2006)
Reference Books:
1. T. H. Byers, R. C. Dorf, A. Nelson, Technology Ventures: From Idea to Enterprise,
McGraw Hill (2013)
2. Osterwalder, Alex and Pigneur, Yves (2010) Business Model Generation.
3. Kachru, Upendra, India Land of a Billion Entrepreneurs, Pearson
4. Bagchi, Subroto, (2008), Go Kiss the World: Life Lessons For the Young Professional,
Portfolio Penguin
5. Bagchi, Subroto, (2012). MBA At 16: A Teenager‗s Guide to Business, Penguin Books
6. Bansal, Rashmi, Stay Hungry Stay Foolish, CIIE, IIM Ahmedabad
7. Bansal, Rashmi, (2013). Follow Every Rainbow, Westland.
8. Mitra, Sramana (2008), Entrepreneur Journeys (Volume 1), Booksurge Publishing
9. Abrams, R. (2006). Six-week Start-up, Prentice-Hall of India.
10. Verstraete, T. and Laffitte, E.J. (2011). A Business Model of Entrepreneurship, Edward
Elgar Publishing.
11. Johnson, Steven (2011). Where Good Ideas comes from, Penguin Books Limited.
12. Gabor, Michael E. (2013), Awakening the Entrepreneur Within, Primento.
13. Guillebeau, Chris (2012), The $100 startup: Fire your Boss, Do what you love and
work better to live more, Pan Macmillan
14. Kelley, Tom (2011), The ten faces of innovation, Currency Doubleday
15. Prasad, Rohit (2013), Start-up sutra: what the angels won‗t tell you about business and
life, Hachette India.
Page 87 of 226
UCS797: CAPSTONE PROJECT
L T P Cr
1 0 2 8.0
Course Objectives: To facilitate the students learn and apply an engineering design process
in electrical engineering, including project resource management. As a part of a team, the
students will make a project, that emphasizes, hands-on experience, and integrates analytical
and design skills. The idea is to provide an opportunity to the students to apply what they
have learned throughout the course of graduate program by undertaking a specific problem.
Page 88 of 226
SEMES
TER
VII
Page 89 of 226
UCS802: COMPILER CONSTRUCTION
L T P Cr
3 0 2 4.0
Course Objectives: To Gain the working knowledge of the major phases of compilation and
develop the ability to use formal attributed grammars for specifying the syntax and semantics
of programming languages. Learn about function and complexities of modern compilers and
design a significant portion of a compiler.
Lexical Analysis: Need of Lexical analyzer, Tokens and regular expressions, Generation of
lexical analyzer from DFA, Introduction to LEX and program writing in LEX.
Syntax Analysis: Need for syntax analysis and its scope, Context free grammar, Top down
parsing, bottom up parsing, backtracking and their automatic generation, LL(1) Parser, LR
Parser, LR(0) items, SLR(1), LALR(1), Canonical Parsing, Introduction to YACC and
Integration with LEX.
Error Analysis: Introduction to error analysis, detection, reporting and recovery from
compilation errors, Classification of error-lexical, syntactic and semantic.
Static semantics and Intermediate Code generation: Need for various static semantic
analyses in declaration processing, name and scope analysis, S-attribute def. and their
evaluation in different parsing, Semantic analysis through S-attribute grammar, L-attribute
def. and their evaluation.
Run time Environment: Need for runtime memory management, Address resolution of
runtime objects at compile time, Type checking, Language features influencing run time
memory management, Parameter passing mechanism, Division of memory into code, stack,
heap and static, Activation record, Dynamic memory management, garbage collection.
Code Generation: Code generation for expressions, Issues in efficient code generation, Sethi
Ullman algorithm.
Code Optimization: Need for code optimizations, Local and global optimization, Control
flow analysis, Data flow analysis, performing global optimizations, Graph coloring in
optimization, Live ranges of run time values.
Laboratory work:
Page 90 of 226
Construct a lexical analyzer using Flex. Construct a parser using Bison/ any programming
language. Build simple compilers from parsing to intermediate representation to code
generation and simple optimization.
Course Learning Outcomes (CLOs) / Course Objectives (COs):
After the completion of the course, the student will be able to:
1. Comprehend the working of major phases of compiler.
2. Apply top-down and bottom-up parsing techniques for the Parser construction.
3. Understand the basic data structures used in compiler construction such
as abstract syntax trees, symbol tables and three-address code
4. Understand target machine‗s run time environment and techniques used for
code generation.
Text Books:
1. Aho V. A., Ullman D. J., Sethi R. and Lam S. M., Compilers Principles, Techniques
and Tools, Pearson Education (2007), 2nd ed.
2. Levine J., Mason T., Brown D., Lex and Yacc, O‗Reilly (2012), 2nd ed.
Page 91 of 226
UHU005: HUMANITIES FOR ENGINEERS
L T P Cr
2 0 2 3.0
Course Objectives: The objective of this course is to introduce values and ethical principles,
that will serve as a guide to behavior on a personal level and in professional life. The course
is designed to help the students to theorize about how leaders and managers should behave to
motivate and manage employees; to help conceptualize conflict management strategies that
managers can use to resolve organizational conflict effectively. It also provides background
of demand and elasticity of demand to help in devising pricing strategy; to make strategic
decisions using game theory and to apply techniques of project evaluation.
Unit 3: Economics
Demand, Supply & Elasticity – Introduction to Economics, Demand & its Determinants,
Elasticity and its types
Production & Cost Analysis – Short run & Long Run Production Functions, Short run & Long
run cost functions, Economies & Diseconomies of Scale
Competitive Analysis & Profit Maximization – Perfect competition, Monopoly, Monopolistic
& Oligopoly Markets
Strategy & Game Theory – Pure Strategy & Mixed Strategy Games, Dominance, Nash Equilibrium, &
Prisoner‗s Dilemma
Capital Budgeting – Capital Projects, Net Present Value (NPV) & IRR techniques.
Practical:
1. Practical application of these concepts by means of Discussions, Role-plays and
Presentations,
2. Analysis of Case Studies on ethics in business and whistle-blowing, leadership,
managerial decision-making.
3. Survey Analysis
4. Capital Budgeting assignment
Page 92 of 226
Course Learning Outcomes (CLOs) / Course Objectives (COs):
The student after completing the course will be able to:
1. Comprehend ethical principles and values and apply them as a guide to behavior in
personal and professional life.
2. Apply tools and techniques to manage and motivate employees.
3. Analyse and apply conflict management strategies that managers can use to resolve
organizational conflict effectively.
4. Devise pricing strategy for decision-making.
5. Apply techniques for project evaluation.
Text Books:
1. N. Tripathi, Human Values, New Age International (P) Ltd. (2009).
2. Robbins, S. P/ Judge, T. A/ Sanghi, S Organizational Behavior Pearson, New Delhi,
(2009).
3. Petersen, H.C., Lewis, W.C. and Jain, S.K., Managerial Economics, Pearson (2006).
Reference Books:
1. McKenna E. F. Business psychology and organisational behaviour. Psychology Press,
New York (2006).
2. Furnham A. The Psychology of Behaviour at Work: The Individual in the organization.
Psychology Press, UK (2003).
3. Salvatore, D and Srivastava, R., Managerial Economics, Oxford University Press
(2010).
4. Pindyck, R and Rubinfiled, D., Microeconomics, Pearson (2017).
Page 93 of 226
SEMES
TER
VIII
Page 94 of 226
UCS813: SOCIAL NETWORK ANALYSIS
L T P Cr
2 0 2 3.0
Course Objectives: To enable students to put Social Network Analysis projects into action in a planned,
informed and efficient manner.
Preliminaries: Graphs, Types of graphs, Representation, Bipartite graphs, Planar networks, The graph
Laplacian, Random Walks, Maximum Flow and Minimum Cut Problem, Introduction to Approximation
Algorithms, Definitions. Approximation algorithms for vertex cover and TSP.
Introduction to Social Networks: Types of Networks: General Random Networks, Small World Networks,
Scale-Free Networks; Examples of Information Networks; Static Unweighted and weighted Graphs,
Dynamic Unweighted and weighted Graphs, Network Centrality Measures; Strong and Weak ties.
Walks: Random walk-based proximity measures, Other graph-based proximity measures. Clustering with
random-walk based measures, Algorithms for Hitting and Commute, Algorithms for Computing
Personalized Pagerank and Sim- rank.
Community Detection: Basic concepts, Algorithms for Community Detection: Quality Functions, The
Kernighan-Lin algorithm, Agglomerative/Divisive algorithms, Spectral Algorithms, Multi-level Graph
partitioning, Markov Clustering; Community Discovery in Directed Networks , Community Discovery in
Dynamic Networks, Community Discovery in Heterogeneous Networks, Evolution of Community;
Education Networks, Knowledge Flow, Resources and Innovations.
Link Prediction: Feature based Link Prediction, Bayesian Probabilistic Models, Probabilistic Relational
Models, Linear
Algebraic Methods: Network Evolution based Probabilistic Model, Hierarchical Probabilistic Model,
Relational Bayesian Network, Relational Markov Network.
Event Detection: Classification of Text Streams, Event Detection and Tracking: Bag of Words, Temporal,
location, ontology based algorithms. Evolution Analysis in Text Streams, Sentiment analysis.
Social Influence Analysis: Influence measures, Social Similarity - Measuring Influence, Influencing actions
and interactions. Homophily, Influence maximization.
Laboratory work:
Page 95 of 226
Text Books / Reference Books:
1. Formalize different types of entities and relationships as nodes and edges and represent this
information as relational data.
2. Plan and execute network analytical computations.
3. Use advanced network analysis software to generate visualizations and perform empirical
investigations of network data.
4. Interpret and synthesize the meaning of the results with respect to a question, goal, or task.
5. Collect network data in different ways and from different sources while adhering to legal standards
and ethics standards.
Page 96 of 226
UCS806: ETHICAL HACKING
L T P Cr
3 0 2 4.0
Course Objectives: Understanding the importance of security, Concept of ethical hacking and
essential Terminologies-Threat, Attack, Vulnerabilities, Target of Evaluation, Exploit. Phases involved
in hacking.
Introduction: Understanding the importance of security, Concept of ethical hacking and essential
Terminologies-Threat, Attack, Vulnerabilities, Target of Evaluation, Exploit. Phases involved in
hacking, Penetration Testing for Cyber-Resilient System
Footprinting: Introduction to footprinting, Understanding the information gathering methodology of
the hackers, Tools used for the reconnaissance phase.
Scanning: Detecting live systems-on the target network, - Discovering services running listening on
target systems, Understanding port scanning techniques, Identifying TCP and LIDP services running
on the target network, Understanding active and passive fingerprinting..
System-Hacking-Aspect of remote password-guessing Role of-eavesdropping, Various methods of
password cracking, Keystroke Loggers, Understanding Sniffers, Comprehending Active and Passive
Sniffing, ARP Spoofing and Redirection, DNS and IP Sniffing, HTTPS Sniffing, Sustainable E-
Learning Platforms.
Session Hijacking: Understanding Session Hijacking, Phases involved in Session Hijacking, Types
of Session Hijacking, and Session Hijacking Tools.
Hacking Wireless Networks: Introduction to 802.1I, Role of WEP, Cracking WEP Keys, Sniffing
Traffic, Wireless DOS attacks, WLAN Scanners, WLAN Sniffers, Hacking Tools, Securing Wireless
Networks.
Cryptography: Understand the use of Cryptography over the Internet through PKI, RSA, MD5,
Secure Hash Algorithm and Secure Socket Layer.
Laboratory Work: Lab Exercises including using scanning tools like IPEYE, IPsecScan, SuperScan
etc. and Hacking Tools likes Trinoo, TFN2K, Zombic, Zapper etc.
Page 97 of 226
Course Learning Outcomes (CLOs) / Course Objectives (COs):
After the completion of the course, the student will be able to:
1. Understand the different phases involved in hacking.
2. Utilize the scanning tools used for the information gathering.
3. Recognize the phases in session hijacking and use the tools for counter-measuring the
various sniffing attacks.
4. Analyse different types of attacks on the wireless networks.
5. Describe and apply different types of algorithms for securing the data.
Text Books:
1. Simpson T. M., Backman K., Corley J., Hands-On Ethical Hacking and Network
Defense, Delmar Cengage Learning (2011) 2nd edition.
2. Fadia A. and Zacharia M., Network intrusion alert: an ethical hacking guide to
intrusion detection, Boston, MA: Thomas Course Technology 3rd edition (2008).
Reference Books:
1. Mathew T., Ethical Hacking, OSB Publication (2003). 2nd edition
2. McClure S., Scambray J. and Kurtz G., Hacking Exposed 7: Network Security Secrets
and Solutions, McGrawHill (2012) 7th Edition.
Page 98 of 226
UCS893: CAPSTONE PROJECT II
L T P Cr
0 0 4 8.0
Course Objectives: To facilitate the students learn and apply their earned skill set for the
system development life cycle in Computer Engineering. As a part of a team, the students
will make a project, which emphasizes hands-on experience, and integrates analytical, design,
and development skills. The idea is to provide an opportunity to the students to apply what
they have learned throughout the course of graduate program by undertaking a specific
problem.
Course Description: This course is of six months and is taken by the students who are doing
their alternate semester here at CSED Thapar, instead of opting project semester at some
software company or research institute. Capstone Project is increasingly interdisciplinary, and
requires students to function on multidisciplinary teams. It is the process of devising a
system, component or process to meet desired needs. It is a decision-making process, in
which the basic sciences, mathematics, and engineering are applied to convert resources
optimally to meet the stated needs. It typically includes both analysis and synthesis performed
in an iterative cycle. As part of their design experience, students have an opportunity to
define and determine the problem and its scope. The project demonstrates that students have
adequate exposure to design, as defined, in engineering contexts. The program must clearly
demonstrate where standards and constraints are taught and how they are integrated into the
design component of the project. Each group will have 1-3 students, and one of them is
working as team leader. Team lead is having an additional responsibility for maintaining the
daily diary. Each Group will work under mentorship of a faculty supervisor as assigned by
the department.
Each group must meet the assigned supervisor till the end of the semester (record of
attendance will be maintained), as per the time slot which will be provided to them by the
respective supervisor. This is mandatory requirement for the fulfilment of the attendance as
well as the successful completion of the project. The faculty supervisor of the project will
continuously judge the development of the workings of the assigned groups.
Course Learning Outcomes (CLOs) / Course Objectives (COs):
After the completion of the course, the student will be able to:
1. Develop skills necessary for time management, reporting and carrying out projects
within an organization/industry.
2. Design, develop, debug, document, and deliver automated solutions for real world
problems and learn to work in a team environment.
3. Develop technical report writing and verbal communication skills.
4. Experience contemporary computing systems, tools and methodologies and apply
experimental and data analysis techniques to the software projects.
5. Apply interdisciplinary fundamentals to the software projects taking into account
professional and ethical issues.
Page 99 of 226
Elective
Focus Basket
(EFB)
Cloud based Data Storage: Introduction to Hadoop, Hadoop Ecosystem (Pig, Hive, Cassandra and Spark),
Introduction No-SQL databases, Map- Reduce framework for Simplified data processing on Large clusters
using Hadoop, Data Replication, Shared access to data stores.
Related Technologies: Introduction to Fog Computing and Edge Computing, Usage of Cloud for IoT and
Big data analytics, Overview of Google AppEngine - PaaS, Windows Azure, Role of Cloud, edge and fog
computing in smart healthcare.
Sustainability: cloud sustainability and its importance, Global regulations and standards related to cloud
sustainability, Carbon footprint measurement and reduction in cloud computing, green software principles to
develop energy-efficient applications
Self-learning Content:
Cloud Issues and Challenges: Cloud models, Cloud computing issues and challenges like Security,
Elasticity, Resource management and Scheduling, QoS (Quality of Service) and Resource Allocation, Cost
Management and Cloud bursting.
Laboratory work:
To implement Cloud, Apache and basics of Hadoop framework, an open source
implementation of MapReduce, and its Java API, Hadoop Distributed File System (HDFS).
Implementation of RESTFul Web Services. To understand various concepts about
Text Books:
1. Buyya K, R., Broberg J. and Goscinski M. A., Cloud Computing: Principles and
paradigms, MIT Press (2011) 4th ed.
2. Kai Hwang, Geoffrey Fox and Jack Dongarra, Distributed and Cloud Computing: From
Parallel Processing to the Internet of Things, Morgan Kaufmann (2012) 2nd ed.
3. Miller M., Cloud Computing, Que Publishing (2008) 1st ed.
4. Puttini R. and Mahmood Z., Cloud Computing: Concepts, Technology & Architecture,
Service Tech press (2013) 1st ed.
Reference Books:
1. Velte A., Velte T., and Elsenpeter R., Cloud Computing: A practical Approach, Tata
McGrawHill (2009) 1st ed.
2. Hurwitz J., Bllor R., Kaufman M. and Halper F., Cloud Computing for dummies
(2009) 1st ed.
History of GPU Computing: Evolution of Graphics Pipelines, The Era of Fixed-Function Graphics
Pipelines, Evolution of Programmable Real-Time Graphics, Unified Graphics and Computing Processors,
GPGPU, Scalable GPUs, Recent Developments, Future Trends.
Introduction to Data Parallelism and CUDA C: Data Parallelism, CUDA Program Structure, A Vector
Addition Kernel, Device Global Memory and Data Transfer, Kernel Functions and Threading,
Parallelization techniques for optimal GPU utilization.
Data-Parallel Execution Model: CUDA Thread Organization, Mapping Threads to Multidimensional Data,
Matrix-Matrix Multiplication—A More Complex Kernel, Synchronization and Transparent Scalability,
Assigning Resources to Blocks, Thread Scheduling and Latency Tolerance.
CUDA Memories: Importance of Memory Access Efficiency, CUDA Device Memory Types, A Tiled
Matrix – À Matrix Multiplication Kernel, Memory as a Limiting Factor to Parallelism.
An Introduction to OpenCL: Data Parallelism Model, Device Architecture, Kernel Functions, Device
Management and Kernel Launch, Electrostatic Potential Map in OpenCL.
Parallel Programming with OpenACC: OpenACC Versus CUDA C, Execution Model, Memory Model,
Basic OpenACC Programs, Parallel Construct, Loop Construct, Kernels Construct, Data Management,
Asynchronous Computation and Data Transfer.
Self-Learning Content:
Basics of Parallel and distributed Computing, CUDA programming model
Laboratory work:
Practice programs using CUDA, OpenCL and OpenACC.
Text Books:
1. Sanders, J. and Kandrot, E., CUDA by Example: An Introduction to General‐
PurposeGPU Programming, Addison-Wesley Professional (2012) 4th Edition.
2. Kirk, D. and Hwu, M., W., Programming Massively Parallel Processors: A Hands-on
Approach. Morgan Kaufmann (2016) 3rd Edition.
3. Grama, A., Gupta, Karypis, G., Kumar, V., Introduction to Parallel Computing,
Addison Wesley, (2003) 2nd Edition.
Reference Book:
1. Hwu, M., W., A GPU Computing Gems Emerald Edition (Applications of GPU
Computing Series), Morgan Kaufmann (2011) 1st Edition.
Parallel Architecture: Implicit Parallelism, Array Processor, Vector Processor, Dichotomy of Parallel
Computing Platforms (Flynn‘s Taxonomy, UMA, NUMA, Cache Coherence), Fengs Classification, Handler
Classification, Limitations of Memory System Performance, Interconnection Networks, Communication
Costs in Parallel Machines , Routing Mechanisms for Interconnection Networks , Impact of Process-
Processor Mapping and Mapping Techniques, GPU, energy-efficient hardware and cooling techniques for
parallel systems.
Programming Message Passing and Shared Address Space Platforms: Send and Receive Operations,
MPI: the Message Passing Interface, Topologies and Embedding, Overlapping Communication with
Computation, Groups and Communicators.
CUDA programming model: Overview of CUDA, Isolating data to be used by parallelized code, API
function to allocate memory on the parallel computing device. Launching the execution of kernel function
by parallel threads, transferring data back to host processor with API function call.
Parallel Algorithms design, Analysis, and Programming: Parallel Algorithms, Parallel Graph Algorithms,
Green scheduling algorithms, Parallel Matrix Computations, Critical paths, work and span and relation to
Amdahl‘s law, Speed-up and scalability, Naturally parallel algorithms, Parallel algorithmic patterns like
divide and conquer, map and reduce, Specific algorithms like parallel Merge Sort, Study sustainability
practices in large-scale distributed systems like Google Cloud or AWS.
Self-Learning Content:
CUDA programming model: API function to transfer data to parallel computing device, Concepts of
Threads, Blocks, Grids, developing kernel function that will be executed by threads in the parallelized part.
Parallel Algorithms design, Analysis, and Programming: Parallel graph algorithms, parallel shortest path,
parallel spanning tree, Producer-consumer and pipelined algorithms.
Laboratory work:
To implement parallel programming using CUDA with emphasis on developing applications for
processors with many computation cores, mapping computations to parallel hardware, efficient data
structures, paradigms for efficient parallel algorithms.
Text Books:
1. C Lin, L Snyder. Principles of Parallel Programming. USA: Addison-Wesley (2008).
2. A Grama, A Gupta, G Karypis, V Kumar. Introduction to Parallel Computing, Addison
Wesley (2003).
Reference Books:
1. B Gaster, L Howes, D Kaeli, P Mistry, and D Schaa. Heterogeneous Computing With
Opencl. Morgan Kaufmann and Elsevier (2011).
2. T Mattson, B Sanders, B Massingill. Patterns for Parallel Programming. Addison-
Wesley (2004).
3. Quinn, M. J.,Parallel Programming in C with MPI and OpenMP, McGraw-Hill(2004).
Parallel process modeling: Using Petri nets and finite automata in simulation, Cellular automata and
simulation.
Simulation Experiments: Run length of Static and Dynamic Stochastic Simulation Experiments,
Minimizing variability in simulators without increasing Number of simulation Runs.
Design of Simulators: Design of Application Simulators for Multi-server Queuing System, PERT,
Optimizing Inventory Policy and Cost in Business environment.
Input Modeling: Data collection, Identification and distribution with data, parameter estimation, Goodness
of fit tests, Selection of input models without data, Multivariate and time series analysis. Verification and
Validation of Model: Model Building, Verification, Calibration and Validation of Models.
Output Analysis: Types of Simulations with Respect to Output Analysis, Stochastic Nature of output data,
Measures of Performance and their estimation, Output analysis of terminating simulation, Output analysis of
steady state simulations.
Laboratory Work:
To carry out work on any simulation tools, Implementation of various techniques to generate
random numbers. Apply any simulation model in real life applications.
Self-Learning Content:
Different Simulation Softwares and their applications for different analysis, Trends in Simulation
Software.
Text Books:
1. Payne A. J., Introduction to Simulation: Programming Techniques and Methods of
Analysis, McGraw Hill (1982).
2. Gorden G., System Simulation, Prentice Hall publication (1978), 2nd ed.
Reference Books:
1. Narsingh D., Systems Simulation with Digital Computer, PHI Publication (EEE)
(2004), 3rd ed.
2. Banks J., Carson J. S., Nelson L. B., Nicol M. D, Discrete Event system Simulation,
Pearson Education, Asia (2010), 5th ed.
Course Objectives: To understand the basic concepts of Computer Vision. The student must be able to
apply the various concepts of Computer Vision in other application areas.
Digital Image Formation and Sustainable Image Preprocessing Techniques: Overview and State-of-the-
art, Fundamentals of Image Formation, Transformation: Orthogonal, Euclidean, Affine, Projective, etc;
Fourier Transform, Convolution and Filtering, Image Enhancement, Restoration, Histogram Processing.
Image Representation & Description: Optimizing algorithms for low-energy consumption in edge devices
- Canny, LOG, DOG; Lightweight Line detectors (Hough Transform), Corners - Harris and Hessian Affine,
Orientation Histogram, SIFT, SURF, HOG, GLOH, LBP and its variants, Gabor Filters and DWT.
Image Segmentation: Region Growing, Edge Based approaches to segmentation, Graph-Cut, Mean-Shift,
MRFs, Texture Segmentation; Lightweight and energy-efficient object detection models (e.g., YOLO Nano,
MobileNet SSD) .
Pattern Analysis: Clustering: K-Means, Fuzzy C-means; Classification: Discriminant Function, Supervised,
Un-supervised, Semi-supervised; Reducing data dimensionality to lower computational costs and storage
requirements : PCA, LDA, ICA.
Motion Analysis: Background Subtraction and Modeling, Optical Flow, KLT, Spatio-Temporal Analysis,
Dynamic Stereo; Motion parameter estimation.
Self-Learning Content:
Miscellaneous: Applications: CBIR, CBVR, Activity Recognition, computational photography, Biometrics,
stitching and document processing; Modern trends - super-resolution; GPU, Augmented Reality; cognitive
models, fusion and SR&CS.
Laboratory Work:
To implement various techniques and algorithms studied during course.
Reference Books:
1. Hartley, R. and Zisserman, A., Multiple View Geometry in Computer Vision
Cambridge University Press (2003) 2nd Edition.
2. Fukunaga, K., Introduction to Statistical Pattern Recognition, Academic Press, Morgan
Kaufmann (1990) 2nd Edition.
3. Gonzalez, C., R. and Woods, E., R. Digital Image Processing, Addison- Wesley (2018)
4th Edition.
3D Object Modelling: Basic modelling concepts, vertices, edges, and faces, basic transformations, pivot
points, duplication and merging, extrusion, insetting, modifiers, loop cuts and face loops, subdivision
methods, coordinate system and exporting, Energy-Efficient rendering model .
Low Poly Models: Triangular meshes, objects and mesh data, cursor and origins hidden geometry, Boolean
modifiers, geometry from curve, curve resolution, non-planner geometry.
3D Character Modelling: Introduction, character modelling, unwrapping UVs & mapping texture, Low-
Impact texturing painting, armatures, Eco-Themed Characters rigging , constrained movements, forward and
inverse kinematics, time-line, keyframes, character animation, Optimized Rendering Pipelines .
Self-Learning Content: Real Time Animation: Splines and curves, Key-frame techniques, Quaternions for
rotations / orientations, Blending and interpolation, Kinematics, Motion capture systems, Motion graphs and
character control, Animation data representations, Behavioural Animation, Facial Animation, Perception in
animation.
Laboratory Work
This course covers beginner to intermediate 3D Modeling and Animation. In this Lab the students will be
able to model the 3D character and objects, its UV Mapping, Texture Painting, Rigging, and Animation.
Evaluation will be mainly via projects and assignments taking a creative approach to expressive 3D
modelling and Animation.
Text Books:
1. House, H., D. and Keyser, C., J., Foundations of Physically Based Modeling and Animation, CRC
Press (2017) 1st Edition.
2. Chopine, A., 3D Art Essentials: The Fundamentals of 3D Modeling, Texturing, and Animation, Focal
Press (2011) 1st Edition.
3. Zeman, B., N., Essential Skills for 3D Modeling, Rendering, and Animation, A K Peters / CRC Press
(2017) 1st Edition.
Reference Books:
1. Villar, O., Learning Blender: A Hands-On Guide to Creating 3D Animated Characters, Addison
Wesley (2017) 2nd Edition.
2. Kerlow, I., The Art of 3D Computer Animation and Effects, Wiley, (2009) 4th Edition.
3. Flavell, L., Beginning Blender: Open Source 3D Modelling, Animation, and Game Design, Apress,
(2010) 1st Edition.
4. Boardman, T., 3dsmax 7 Fundamentals, New Riders, (2005) 1st Edition.
Course Objectives: To become familiar with various fundamental and advanced gaming concepts including
basic maths and physics used behind the game engine.
Introduction: Types of games, History, Impact of Games on Society , Game life cycle, Game loop, Components of
game, Model and scene rendering, State Management, Scene management, Texture compression, Level of details,
Frustum culling, Occlusion culling, Game as a software, Steps for Game Design, Data Structure for Game, CPU
vs.GPU, Game Engine, Components of game engine, Linear Transformation. Composite transformation.
Fundamental Gaming concepts: Static and Dynamic Game objects, Vectors, Concept of Time, Lighting , Particle
System, Collider, Collision handles, Materials, Texture mapping, Input Process, Object replication, Instantiation,
Special Effects, Terrain, Audio design and production, Ray Casting.
Maths behind Game Engines: Introduction to Vectors- Addition & Subtraction, Vector length, Scaling, Unit length
vectors, Dot & Cross product, Linear Interpolation, Euler Angles, Intersection, Matrices, Coordinate systems,
Projections, Triangle Meshes, Optimizations, Quaternion.
Advanced Games: Augmented Reality, Virtual Reality, Mixed Reality, AR & VR based Games, Artificial
Intelligence based Game, Networking based game, Android based games, Debugging mode, Understanding of Screen
and World Coordinate system, Raycasting, Touch & Swipe Input: Touch in Orthographic view, Touch in Perspective
view, Accelerometer input, Scaling of Game screen, AR/VR/Android/iOS/Windows Game Deployment methods,
Integrating game mechanics into e-learning tools and fitness-focused games that encourage physical activity
Self-Learning Content: Game Physics: Mathematical concepts, Basic transformations, Collision Detection and
response, Newton‘s law of motion, Modeling gravity, Air resistance, Unstable rotation, Inertia tensor, Moment of
Inertia, Applying torque to rigid body, The Magnus effect, Overview of friction, Critical angle, Dynamic Friction.
Laboratory work: 2D and 3D game development for windows and android platform using Unity 3D Game
Engine and C# language.
Text Books:
1. Eberly H. D., Game Physics ,Morgan Kaufmann Publisher (2010), 2nded.
2. Bond G. J., Introduction to Game Design, Prototyping, and Development: From Concept to Playable
Game with Unity and C# , Addison-Wesley (2015), 2nd ed.
Reference Books:
Course Objectives: To become familiar with the concept and applications of augmented & virtual reality
and learn different types of algorithmic techniques and strategies.
Introduction of Augmented Reality (AR): Definition and Applications, History, Types of AR, Suitable
devices, Holograms, Mixed reality, Ubiquitous computing, AR Displays: Method of Augmentation, Spatial
Display Model.
Tracking in AR: Basic steps of AR, Tracking, Occlusion, Calibration, Registration, Co-ordinate Systems:
Model-View-Projective Transformation, Frame of reference, Characteristics of Tracking Technology:
Physical Phenomenon, Triangulation, Trilateration, Measurement Principles, Degree of Freedom,
Stationary Tracking System, Mobile Tracking, Optical Tracking, Sensor Fusion.
Computer Vision for AR: Marker Tracking, Thresholding, Contour detection, Hough Transformation,
Quadrilateral fitting, SIFT, Pose Estimation, Homography, Incremental Tracking, SLAM: Bundle
Adjustment, Parallel Tracking and Mapping, Outdoor Tracking, STML.
Virtual Reality: Definition, History, Application, Types of VR, Components of VR,VR- HMDs and their
working, Geometric modeling, Modeling Transformation, Viewing transformation Chain and Rendering
Pipeline, Light and Optical System, Rendering Problems in VR, Shading Models, Rasterization, Depth,
Motion and Auditory Perception, Rendering, Post Rendering Image Warping, AR/VR for interactive and
immersive applications in STEM
Text Books:
1. Dieter Schmalstieg, Tobias Höllerer, Augmented-Reality-Principles-and-Practice-Usability- ,
Addison-Wesley (2016) 1st ed.
Page 115 of 226
2. Parisi T., Learning Virtual Reality, O’Reilly (2016)1sted.
3. Gerard Jounghyun Kim, Designing Virtual Reality Systems :The Structured Approach, Springer
(2005) 1st ed.
Reference Books:
1. Whyte J., Virtual Reality and the Built Environment, Architectural Press (2002).
2. Aukstakalnis S., Practical Augmented Reality: A Guide to the Technologies, Applications, and
Human Factors for AR and VR, Addison-Wesley (2016).
Introduction: Security Attacks, Security Services, Security Mechanisms and Principles, Security goals,
Malicious software, Worms, Viruses, Trojans, Spyware, Botnets, Life cycle of a vulnerability: CAN and
CVE, Environmental impact of network security infrastructure, e-waste, and lifecycle analysis.
Computer Security: Set-UID programs, privileged programs, environment variables: hidden inputs,
capability leaking, invoking other programs, principle of least privileges. Environment variables and attacks,
attacks via dynamic linker, external program and library. Shellshock attack, exploiting shellshock
vulnerability. Buffer overflow attacks: program memory layout, stack and function invocation. Writing a
shell code, injecting code into buffer, address space layout randomization, Stack Guard.
Network Security: Packet sniffing and spoofing, Attacks on TCP protocol, SYN flood, TCP reset attack,
session hijacking attack, Firewalls: Packet filter, Stateful firewall, Application firewall. IP tables, DNS
poisoning, Authoritative replies, ARP poisoning, Heartbleed Bug and Attack, Public key infrastructure and
Transport Layer Security, Optimizing network security for energy-efficient data transmission.
Laboratory work:
Demonstrate use of Environment variables and privileged programs, Implementing secure network protocols
with resource optimization, Demonstrate Buffer Overflow and showcase EIP and other register status, insert
malicious shell code into a program file and check its malicious or benign status, perform ARP poisoning,
implement stateful firewall using IPTables.
Text Books:
1. Stallings, W., Network Security Essentials, Prentice Hall (2017) 6th Edition.
2. Cheswick, R., W., Bellovin, M., S., and Rubin, D., A., Firewalls and Internet Security, Addison-
Wesley Professional (2003) 2nd Edition.
3. Wenliang Du, Computer Security: A hands-on approach, CreateSpace (2017).
Reference Books:
1. Graves, K., Certified Ethical Hacking Study Guide,Sybex (2010) 1st Edition.
2. Stallings, W., Cryptography and Network Security, Prentice Hall (2013), 6th Edition.
Page 118 of 226
UCS638: SECURE CODING
L T P Cr
2 0 2 3.0
Course Objectives: This course aims to provide an understanding of the various security attacks and
knowledge to recognize and remove common coding errors that lead to vulnerabilities. It gives an outline of
the techniques for developing a secure application.
Introduction: Security, CIA Triad, Viruses, Trojans, and Worms, Security Concepts- exploit, threat,
vulnerability, risk, attack, Rootkits, Trapdoors, Botnets, Key loggers, Honeypots. Active and Passive
Security Attacks.
Need for secure systems: Proactive Security development process, Secure Software Development Cycle
(SSDLC), Security issues while writing SRS, Design phase security, Development Phase, Test Phase,
Maintenance Phase, Writing Secure Code – Best Practices SD3 (Secure by design, default and deployment),
Security principles and Secure Product Development Timeline, Case studies on secure coding practices for
environmental monitoring systems.
Threat modelling process and its benefits: Identifying the Threats by Using Attack Trees and rating
threats using DREAD, Risk Mitigation Techniques and Security Best Practices. Security techniques,
authentication, authorization. Defense in Depth and Principle of Least Privilege, Threat modeling in smart
healthcare and education systems.
Software & Web Security: Return-to-libc attack, format string vulnerability. Race condition vulnerability,
Dirty COW, PE Code injection. Cross site request forgery: CSRF attacks on HTTP GET and POST services
& countermeasures. XSS attack: self-propagating XSS worm, preventing XSS attacks, SQL injection attack
& countermeasures. Client-side attacks, web practices to ensure safe e-commerce platforms
Laboratory Work:
In this Lab, student shall learn to recognize and remove common coding errors that lead to vulnerabilities.
This lab also gives an outline of the techniques for developing a secure application code, implementing
different types of attacks and protection schemes for both software and web security. Evaluation will be
mainly based on projects and assignments.
Text Books:
1. Howard, M. and LeBlanc, D., Writing Secure Code, Howard, Microsoft Press (2002) 2nd Edition.
2. Deckard, J., Buffer Overflow Attacks: Detect, Exploit, Syngress (2005) 1st Edition.
Reference Books:
1. Swiderski, F. and Snyder, W., Threat Modeling, Microsoft Professional, (2004) 1st Edition.
2. Salt, C., J., SQL Injection Attacks and Defence, Elsevier (2012), 2nd Edition.
Acquiring, Duplicating and Recovering Deleted Files: Recovering Deleted Files and Deleted Partitions,
recovering "Deleted" and "Erased" Data, Data Recovery in Linux, Recovering Deleted Files, Recovering
Deleted Partitions, Data Acquisition and Duplication, Data Acquisition Tools, Recovering Data from
Backups, Finding Hidden Data, Locating Forgotten Evidence, Defeating Data Recovery Techniques,
Responsible Consumption of Digital Resources during Forensic Investigations.
Collecting and Preserving Evidence: Understanding the Role of Evidence in a Criminal Case, Defining
Evidence, Admissibility of Evidence, Forensic Examination Standards, Collecting Digital Evidence,
Evidence Collection, Preserving Digital Evidence, Preserving Volatile Data, Special Considerations,
Recovering Digital Evidence, Deleted Files, Computer Forensic Information, Understanding Legal Issues,
Searching and Seizing Digital Evidence
Building the Cybercrime Case: Major Factors Complicating Prosecution, Difficulty of Defining the Crime,
Jurisdictional Issues, The Nature of the Evidence, Human Factors, Overcoming Obstacles to Effective
Prosecution, The Investigative Process, Investigative Tools, Steps in an Investigation, Defining Areas of
Responsibility.
Self-Learning Contents:
Collecting and Preserving Evidence: Data Recovery Software and Documentation, Computer Forensic
Resources, Computer Forensic Training and Certification, Computer Forensic Equipment and Software,
Computer Forensic Services.
Laboratory Work:
Hands with open source tools for forensic investigation process models (from Item confiscated to submitting
evidence for lawful action), such as FTK, Sleuth Toolkit (TSK), Autopsy, etc.
Text Books:
1. Shinder L. D., Cross M., Scene of the Cybercrime, Syngress (2008) 2nd ed.
2. Marcella J. A. and Guillossou F., Cyber Forensics: From Data to Digital Evidence, Wiley (2012).
3. Nina Godbole, Sunit Belapure, Cyber Security, Wiley (2011).
Reference Books:
1. Marcella J. A. and Menendez D., Cyber Forensics: A Field Manual for Collection, Examining and
preserving Evidence of computer crimes. Auerbach Publication (2010), 2nd ed.
Dejey, Murugan, Cyber Forensics, Oxford (2018).
Bitcoin Cryptocurrencies: What is Bitcoin, Brief history of Bitcoin, Bitcoin mining and supply, Bitcoin
cryptocurrency (BTC), Traditional centralized vs. decentralized, Bitcoin‘s blockchain: evolution of
blockchain, block header, genesis block, hash generation, Bitcoin address: formats, hash generation, address
structure, transactions: multi-signatures, generating transactions, storing data, block verification and
validation, block mining.
Smart Contracts: Introduction to smart contracts, smart contracts used in a centralized and decentralized
systems, Blockchain platforms using smart contracts: Ethereum, architecture of Ethereum virtual machine,
token- ETH, Mining process, ERC- standards, transactions in Ethereum, Hyperledger fabric, Sidechains,
NXT, Stellar, R3Conda, Litecoin, Quorum, IBM, Openchain, Eris:db, Case studies related to smart contracts
for transparent aid distribution .
Consensus Mechanisms: Double spending problem, BFT, PBFT, PoW, PoS, DPoS, PoA, PoB, PoR, PoET,
PoI, PoO, PoSp, PoC, Ripple, Tendermint, energy consumption of traditional consensus mechanisms and
alternative eco-friendly mechanisms.
.
Applications of Blockchain: Financial system, smart grid, healthcare , smart transportation system, e-
Governance, education, exchange and trading, online market place, commercial supply chain, food
production, drug manufacturing, safety and security.
Laboratory Work:
Experiments on creating of blockchain, implementation of smart contract on Python, Conda and Ethereum,
Solidity, Implementing carbon credit systems using blockchain.
Reference books:
1. Bellaj Badr, Rcihcard Horrocks and Xun Brian Wu, ―Blokchain by example‖, Packt Publications.
2. Fatima Castiglione Maldonado, ―Introduction to Blockchain and Ethereum‖, Packt Publications.
Basic Simulation Approaches: Methods for simulation and data analysis using MATLAB,
statistics for simulations and analysis, random variates generation, sensitivity analysis.
Model and its Different Types: Linear and nonlinear population models, traffic flow
models, transport phenomena, statistical models, Poisson process, stochastic models, stock
market, option pricing, Black-Scholes model, modeling engineering systems.
Software Support:
MATLAB.
Lab Experiment:
Implementation of numerical techniques using MATLAB based on course contents.
Projects: The projects will be assigned according the syllabus covered.
Course Objectives: This course aims to provide a platform for the students to use linear
algebra in real life. Most of the real life problems are based on computation of eigenvalues
and singular values. In this course we stress on the computational methods to compute the
same. The Matlab implementation of the methods will be insightful for better understanding.
The students are expected to have taken basic and a continuation course in numerical analysis
or acquired equivalent knowledge in a different way.
Matrix Analysis:
Review of matrices and vector spaces: rank of a matrix, linear dependence and
independence, bases and dimensions, linear transformations, range and null space of a matrix,
rank-nullity theorem.
Inner product space: Gram Schmidt orthogonalization, dual space and invariant space.
Matrix transformations: similarity transformation, diagonalization of matrices, Householder
transformation, QR factorization.
Conditioning of matrices: vector and matrix norms, convergent matrices, condition number
of a matrix.
Techniques for finding eigen values: Eigen value problems, spectral stability of matrices,
reduction to Hessenberg or tridiagonal form, iterative techniques using Krylov subspace
concepts for eigen value problems.
Real life applications of eigen values and singular values: Discussion of real life problems
based on eigen values and SVDs and their application in image processing and big data
analysis.
Laboratory assignments:
Matlab experiments will be designed to implement algorithms from the syllabus.
Course Objectives: This is an introductory course in finance to equip with a framework and
basic techniques necessary for financial engineering. The main focus is on valuation of
financial assets and more specifically derivative products. The course will introduce the
concept of risk and relation between risk and return. The knowledge of risk and valuation will
be integrated in optimal decision-making. The models will be studied in discrete-time
scenario.
Theory of Option Pricing: Options-calls and puts, pay-off, profit diagrams, hedging and
speculation properties of options, valuation of options using pricing and replication strategies,
mathematical properties of their value functions, put-call parity, Risk neutral probability
measure (RNPM) (discrete case), existence of RNPM, Binomial lattice model, Binomial
formula for pricing European style and American style options, dividend and non-divided
cases, CRR model, Black-Scholes formula derivation, Examples. Greeks and their role in
hedging, delta-neutral portfolio, delta-gamma neutral portfolio
Laboratory activities:
Extraction of data from various online resources like NSE, moneyconrol.com etc.
Implementation and validation of various models studied in the course for option and
portfolio valuation using Matlab/R/Excel.
Divisibility and Primes: Twin primes, Goldbach conjecture, Fermat and Mersenne primes,
Primality testing and factorization.
Public key Cryptosystems: RSA, Diffie Hellmann key exchange, different attacks and
Remedies, Digital Signature, Elliptic curve cryptography and its application in cryptography.
Laboratory work:
Implementation of various traditional ciphers, symmetric ciphers and asymmetric ciphers
using C-programming language.
Reference Books:
1. Behrouz A. Forouzan, D. Mukhopadhyay, Cryptography and Network Security,
McGraw Hill, 2015.
2. J. Pipher, J. Hoffstein and J.H. Silverman, An introduction to Mathematical
Cryptography, Springer-verlag 2014.
Data Science Introduction: Data and types, Big Data and Distributed Databases, Application and purpose
of data, Data Science, The data science process.
Introduction to R and RStudio: Installing and configuring RStudio, R Packages, Basic syntax, variables,
Operators, Data types, Control Flow, Sequence Generation (range function), String Operations, Functions,
Loop Functions and Debugging (lapply, apply, mapply, tapply, split, Diagnosing), Simulation & Profiling
(Random Number, Linear Model, Random Sampling), File Handling in R (Reading different files in R),
Introduction to Swirl, Regular Expression.
Data Cleaning and Summarization: Matrices, Factors, Data Frames, Vectors, Lists, Data Cleaning and
reading data from different data source, Reading Large Tables, Subsetting and Sorting, Summarizing Data,
Creating New Variables, Reshaping Data, Managing Data Frames with dplyr – Introduction, Managing Data
Frames with dplyr - Basic Tools, Merging Data, Version control and Github.
Data Visualization in R: Setting Your Working Directory (Windows), Principles of Analytic Graphics,
Lattice Plotting, Base Plotting System, Plotting using ggplot2/Matplotlib library (Histogram: Display the
distribution of school enrollments to highlight gaps in access to quality education, BoxPlot: Compare urban
sustainability metrics across cities to identify disparities and Useful for global comparisons of education
outcomes, Scatter Plot, Bar Graphs: Illustrate regional crime rates to inform peace and justice strategies,
Line Graph, etc),
4,9,11,16
Data Science Advance Topics in R: Basics of Correlation, Regression, Hierarchical Clustering, K-Means
Clustering, Working with Color in R Plots, Storage and Retrieval of Unstructured Data, HDFS File System,
Map-Reduce Concept, Dimension Reduction: (Principle Component Analysis, Singular Value
Decomposition), Feature Selection, Model Evaluation Parameters.
Reference Books:
Trevor Hastie Robert, Tibshirani Jerome Friedman, The Elements of Statistical Learning,
Springer
Course Objectives: Advanced analytics requires the use of unstructured data. Uncertainty is a primary characteristic
of unstructured data. Statistical methods that relate to correlating information, finding patterns, predictive modeling
are essential in dealing comprehensively with data so that it can used as information to make decisions. This course
will provide an overview of statistical methods relevant in the world of business analytics. This will be demonstrated
through the use of case studies and statistical software.
Unit-1: Probability, conditional probability, random variable, PDF, PMF, joint distribution, statistical independence,
variance, co-variance, correlation, different distribution functions, Bayes theorem, central limit theorem.
Unit-3: Mathematical modeling of regression (linear, non-linear, multiple), understanding error in model training
(loss, bias, variance, overfitting, underfitting), maximum likelihood estimation to solve regression, transformation of
classification to regression.
Unit-4: Basics of Neural Networks, different loss functions, validation and regularization, multilayered, parameter
optimization methods. Analyzing past academic records and behavior patterns to identify students at risk of
underperforming. 4
Unit-5: Deep networks, Auto encoders-decoders, generative networks, transformers. Measuring noise in climate
data using visual information.13
Text Books:
1. Peter Dalgaard, Introductory Statistics with R, Springer, Second Edition, ISBN: 978-0-387-79053-4 2. Brett Lantz,
Machine Learning with R (2nd Edition), www.PacktPub.com.
Reference Books:
L T P Cr
2 0 2 3
Course Objectives: There have been many applications of data science to solve real world problems. The
objective of the course is to provide exposure to basic workflow and applications of data science techniques
in targeted topics.
Fundamentals of Natural Language Processing: What is NLP, Difficulties in NLP, Basics of text
processing and spelling correction, Introduction to language modeling, Limitations of traditional language
models.
NLP Techniques and Applications: Sentiment analysis3 using logistic regression, naïve Bayes and neural
networks, text prediction using GRUs, Long Short-Term Memory units (LSTM), Large Language Model
(LLM), Named Entity Recognition systems to extract important information from text.4,10,9
Computer Vision and its applications: Introduction and goal of computer vision, Basics of image
processing and computer vision, CNN, Visual Transformers, Application of computer vision in
recognition.9,3
Laboratory Work: To implement models and use cases using python and google open source library
Tensorflow etc. Innovative diagnostic tools and mental health chatbots leverage data-driven technologies to
provide accessible, personalized, and scalable mental health support.3,.
Course Learning Outcomes (CLOs)
After the completion of the course, the student will be able to:
1. Apply the basic principles, models, and algorithms of NLP and CV for problem solving.
2. Apply NLP and CV techniques in the real time problems
3. Comprehend the advancements in machine learning techniques in NLP , CV.
4. Acquire knowledge to apply open source libraries of NLP and CV for solving real life problems.
Text books:
1. Speech and Language Processing, by M. Jurafsky, & J. Martin, New York: Prentice-Hall (2000).
2. Deep Learning, by Ian Goodfellow, YoshuaBengio and Aaron Courville, MIT Press, 2016.
3. The Internet of Things by Samuel Greengard, MIT Press Essential Knowledge series, (2015)
Reference Books
1. Data Science Using Python and R, by Chantal D. Larose, Daniel T. Larose, Wiley (2019).
2. Computer Vision: Algorithms and Applications, by Richard Szeliski, Springer.
Course objective: The main objective of this course is to enabling the student with basic deep learning architectures
to build an intellectual machine for making decisions behalf of humans.
Artificial Neural Networks: Basic Concepts of Artificial Neurons, Single and Multi-Layer Perceptron,
Learning Algorithm, Gradient Decent & Momentum Based Optimization, Activation Functions,
Backpropagation.
Convolutional Neural Networks: Basic Concepts of Convolutional Neural Networks. Convolution and
Pooling Operation, Convnet Architectures, Regularization, Dropout, Batch-Norm etc. Convnet Architectures
- Alexnet, Zfnet, VGG, Googlenet, Resnet, Mobilenet etc..
Applications of CNN Healthcare Analytic, Precision Agriculture & Computer vision2,3,10.
Recurrent Neural Networks: Recurrent Architecture, BPTT, Vanishing and Exploding Gradients, GRU,
LSTM, Attention Mechanism and Transformers. Applications of recurrent neural networks in single and
multivariable time series forecasting such as weather forecasting13,
Autoencoders: Autoencoder and its Relation to PCA, Stack Autoencoders, Denoising Autoencoders
Variational Autoencoders, Sparse Autoencoders and GANs. Applications of GANs in synthetic data
generation for precise disease diagnosis3.
Laboratory Work: To implement deep learning models using python and google open source library such
as Tensorflow, Keras etc10..
Course Outcomes:
Text Books:
1. Ian Goodfellow and Yoshua Bengio and Aaron Courville,”Deep Learning”, MIT Press, 2016
2. Michael Nielsen, “Neural Network and Deep Learning”, Online Book 2016
Course learning outcomes (CLOs): After the completion of the course, the student
will be able to:
1. Explain the basic accounting concepts and apply the fundamental equation in basic
business transactions
2. Explicate and apply the techniques learnt for doing financial statement analysis
3. Explain various financial decisions and evaluate some of them
4. Explicate the principle of time value of money (TVP) and importance of interest rates
in TVP
5. Apply the methods learnt for valuation of securities
Risk and Return: Meaning of risk, meaning of return, estimation of risk and return
Capital and Money Markets: Meaning, types, capital and money market instruments
Practical sessions:
After the completion of the course, the student will be able to:
1. Explain the role of the financial system and the process of creation of money
2. Explicate various monetary policy tools
3. Explain relationship between risk and return
4. Explicate the types of capital markets and money markets including the market
instruments
5. Apply the portfolio theory to choose an optimal portfolio
1. Financial Markets and Institutions – Anthony Saunders & Marcia Millon Cornett
2. Ross, Westerfield, Jaffe & Jordan. Corporate Finance: Core Principles and
Applications.
Law of One Price: Meaning, implication of the law of one price, no arbitrage model, usage
in pricing of securities and derivative instruments
Pricing and Valuation: Basic principles, building blocks, assumptions, difference between
price and value, pricing and valuation of basic derivative instruments
Basics of Option Pricing: Meaning of options, types of options, difference between options
and basic derivative instruments
Reference Books:
1. Fundamentals of Futures and Options Markets - John C. Hull
2. Ross, Westerfield, Jaffe & Jordan. Corporate Finance: Core Principles and
Applications.
Page 145 of 226
UMC743: Quantitative and Statistical Methods for Finance
L T P Cr
2 0 2 3.0
Course Objectives: Understanding quantitative and statistical methods used for finance and
derivatives:
Option Pricing Introduction to option pricing models, formulae and derivation, option
Greeks, risk management using options
Financial Time Series: Introduction to time series, types, univariate and multivariate time
series models, autocorrelation, AR models, MA models, ARMA models, ARIMA models,
stationary series, unit-root
Course learning outcomes (CLOs): After the completion of the course, the student will be
able to:
1. Explain and apply the time series models learnt for financial data
2. Explicate and apply PCA for financial data
3. Explain and apply option pricing models to calculate prices of options
4. Explicate types of volatility and volatility models
5. Apply the basic methods learnt to estimate volatility
Page 146 of 226
Reference Books:
Traditional Software Development: The Advent of Software Engineering, Waterfall method, Developers
vs IT Operations conflict.
Rise of Agile methodologies: Agile Vs Waterfall Method, Iterative Agile Software Development,
Individual and team interactions over processes and tools, working software over comprehensive
documentation, Customer collaboration over contract negotiation, responding to change over following a
plan
Definition and Purpose of DevOps: Introduction to DevOps, DevOps and Agile, Minimum Viable
Product, Application Deployment, Continuous Integration, Continuous Delivery
CAMS (Culture, Automation, Measurement and Sharing): CAMS – Culture, Automation, Measurement,
Sharing, Test-Driven Development, Configuration Management, Infrastructure Automation, Root Cause
Analysis, Blamelessness, Organizational Learning.
Cloud Sustainability: Choosing eco-friendly cloud services (e.g., AWS, Azure, or GCP with carbon-neutral
data centers) aligns with DevOps goals and sustainability.
Typical Toolkit for DevOps: Introduction to continuous integration and deployment, Version control
system
Source Code Management History and Overview: Examples - SVN, Mercury and Git, History - Linux
and Git by Linus Torvalds,
Version Control System: Version control system vs Distributed version control system: Local repository,
Advantages of distributed version control system, The Multiple Repositories Models, completely resetting
local environment, Revert - cancelling out changes.
Laboratory work:
Basic structure and Implementation of various distributed version control systems for source code
management.
Reference Books:
4. What is DevOps? - by Mike Loukides.
Course Objectives: This course includes theory and lab. The course comprises four modules. The main
objective of this course to help participants understand the process of build and release management.
Introduction to Build and Release Management: Introduction to build, understanding different phases of
build and release management, Measuring and minimizing carbon footprints of software builds, introduction
to release management, best practices for build and release management, Intelligent scheduling for release
deployments to reduce energy consumption, concept of build abstraction and dependency abstraction.
Document and Reporting: Introduction to build document and reporting, incorporating sustainability
principles in project documentation, different types of documentation, understanding site life cycle, advance
site configurations and reports, generation of unit test reports, generation of code coverage reports, code
coverage tools, code coverage pros and cons.
Release Cycle: To understand project release life cycle, different stages of release lifecycle, source code
repositories, using renewable-energy-based data centers for redundancy, how to install and configure source
code repositories and deploying build to production goals- prepare, perform, clean and rollback.
Laboratory work: Setting up Maven environment and understanding POM hierarchy, creation of a project
using Maven and its configurations.
Laboratory work:
Setting up Jenkins, Jenkins job, parameters, build, post-build actions and pipeline; Jenkins plugins, using
Jenkins as a continuous integration server; Configuring Jenkins with git plugin; Jenkins pipeline to poll the
feature branch.
.
Course Learning Outcomes (CLOs) / Course Objectives (COs):
After completion of this course, the students will be able to:
1. Understand the phases of software development-delivery pipeline and automation benefits.
2. Identify and apply continuous integration and deployment prerequisites, process and benefits.
3. Understand and implement the continuous delivery engineering practices and release process.
4. Identify & use the test-driven deployment and various tools/frameworks used for continuous
integration and delivery in DevOps
Text Books:
1. Gene Kim, Jez Humble, Patrick Debois, John Willis, ―The DevOps Handbook: How to Create
World-Class Agility, Reliability, and Security in Technology Organizations‖, IT revolution Press
(2016) 1st ed.
Orchestration Tools: Orchestration: its definition and need, Docker swarm and Kubernetes, AWS (ECS
and EKS), Kubernetes on cloud, monitoring containers and its process.
Introduction to Provisioning: Basic and software definition, provisioning concepts, reason for exclusive
provisioning, configuration management definition and tools, difference between provisioning and
configuration management, provisioning tools, test machines for provisioning, deployment and its
relationship with provisioning.
Provisioning on Cloud: defining cloud provisioning, types of cloud provisioning, life-cycle of provisioning
on cloud, On Premise cloud mitigation strategies, network security enablement from On Premises to cloud,
micro-services management in cloud, Environmental impact of cloud technologies, Benefits of Sustainable
System Provisioning.
Provisioning and Configuration Management: State of tools in provisioning and configuration, definition
and need for configuration management, its benefits and drawbacks in DevOps, need for monitoring in
DevOps, reasons for using provisioning and configuration tools, automation, preventing errors and tracking
changes, examples of tools and their capabilities.
Laboratory Work:
System Provisioning: Automation of infrastructure, AWS configuration for Terraform, create IAM User,
security group, spinning up with EC2 instance, variables, resources, modules, state management, VPC, IAM
policy, S3 bucket and its variables.
Containers Lab: Playing with Vagrant and understanding its file, Docker machine, Dockerfile, Docker
extras, DTR, Docker compose and swarm, Kubernetes -Minikube, deploying Pods and services on
Minikube.
Text Book:
Gerardus Blokdyk, Server Provisioning and Configuration Management Complete Self-Assessment Guide,
5STARCooks, 2018.
Reference Book:
Course Objectives: The main objective of this course is to impart concepts related with web
technology which are essential for the development of web applications. The key technology
components include web markup languages, client and server side programming.
HTML& CSS: Introduction to HTML, Introduction, HTML Page Structure, Create HTML
document, Understand the various elements available in HTML, HTML Use, Attributes in
HTML, Need of Attributes, Common Attributes, HTML forms, Apply validations to the form
elements, Creating web pages with HTML5, HTML5 introduced features, HTML5 form
validate/no validate, HTML5 canvas, embedding audio, and video in a webpage, drag and drop,
HTML5 Local Storage, HTML5 web workers and server sent events. What is CSS, how to insert
CSS in HTML, How CSS adds value to HTML, Difference between Semantic and HTML mark-
up, CSS3, CSS Selectors, Buttons, CSS float and clear, CSS align - horizontal and center, CSS
Padding, CSS Links, CSS Lists, CSS Tables.
JavaScript: What is JavaScript, Importance of JavaScript, What can JavaScript Do?, JavaScript
with HTML Attributes, JavaScript with CSS, Operators, JavaScript Syntax, JavaScript Data
Types, JavaScript Functions, Setting up Environment, Variables, Control flow, if. Else, switch,
loops, JavaScript HTML DOM Elements, JavaScript Syntax, Operators, Data Types, JavaScript
String Methods, JavaScript Functions, Arrays, Sorting, Joins, Reduce map.
REST API, JSX: Why JSX, Modular and Scalable Design, Embedding JavaScript Expression in
JSX, JSX Attributes, JSX Comments, Styling and Representation as Object, The State of the
Component, Changing the State, Props of Component, Using Props, Props Validation in React,
Similarities Between State & Props RESTAPI : Intro to API, History of API Development,
Development of AJAX, CRUD; GraphQL; HTTP ,HTTP 1.1,HTTP/2, Stream prioritization,
Introduction to React Native, Setting up React Native, The Expo Client, Working up on the First
Project, Style, Fexbox Layout.
Text Books:
1. M. Srinivasan, Web Technology: Theory and Practice, Pearson (2012).
2. A.Kumar, Web Technology: Theory and Practice, CRC Press (2018).
Reference Books:
1. Web programming with HTML, XHTML and CSS, 2e, Jon Duckett, Wiley India.
2. Web technologies: A Computer Science Perspective, Jeffrey C. Jackson ,1st ed., Pearson
(2007).
L T P Cr
2 0 2 3.0
Course Objectives: Basic concepts of database, Mongo DB, SQL, and Java script.
Getting started with MongoDB: No SQL Databases, Features of MongoDB, Installation overview,
Documents, Collections, Databases, What isthe NoSQL approach? Why Use the NoSQL Approach,
Benefits of No SQL, Types of Databases, Key-Value Stores, Wide-column Stores/ Columnar Databases,
Document/Document-store/Document-oriented Databases, Graph- based Databases, Starting and
stopping MongoDB
Collections: List all collections in the database, List all databases, Find(), FindOne( ), limit, skip, sort
and count the results of the find() method, Query Document – Using AND, OR and IN Conditions, find()
method with Projection, Find() method with Projection, $set operator to update specified field(s) in
document(s), Insert a document, Create a Collection, Drop Collection, Aggregation
Indexes: Indexes, Index Creation Basics, Dropping/Deleting an Index, Sparse indexes and Partial
indexes, Get Indices of a Collection, Compound, Unique Index, Single field, Delete, List, Mongoas
Shards
Sharding Environment Setup: Managing Database for Availability and Performance, Database
Scaling, Database Distribution Models, Database Replication, Types of Database Replication, Master-
Slave Replication, Peer-to-Peer Replication, Advantages and Disadvantages of Peer-to- Peer Replication,
Introduction to Sharding, Why Sharding, The Lookup Strategy, Basic configuration with three nodes,
Mongo as a Replica Set, Mongoose.
Text Books:
Page 160 of 226
1. Andreas Kretz, The Data Engineering Cook Book, 6 ed. (2019)
th
2. Alex Petrov, Database Internals: A deep dive into how distributed data systems work,
O‗REILLY Publication (2021).
Reference Books:
1. S. Bradshaw, Eoin Brazil, and Kristina Chodorow, MongoDB: The definite guide: Powerful
and Scalable Data Storage, O‗REILLY Publication (2021).
2. Dan Sullivan, NoSQL for Mere Mortals, O‗REILLY Publication (2021).
Course Objectives: The course provides understanding of software testing and how to use various tools
(like Selenium and TestNG etc.) used for automation of software testing.
Introduction to Software Testing: Seven principles of Software Testing, SDLC vs STLC, Testing Life
Cycle, Usability Testing, why do we need Usability Testing, how to do Usability testing, Advantages &
Disadvantages, Functional Testing, End to End Testing, Methods, Advantages & Disadvantages,
Compatibility Testing, Types GUI testing, Techniques API testing, Advantages
Test Automation: Selenium: Selenium components, Selenium Architecture, TestNG: Installing TestNG in
Eclipse, TestN Gannotations – Understanding usage, setting priority of execution for test cases, Hard
Assertion, Soft Assertion, TestNG Reports, ANT- Downloading & Configuring, XSLT report generation using
TestNG and Ant.
Introduction to Selenium 3.x: Describe Selenium 3.x advantages and implementation, Define drivers for
Firefox, IE, chrome, IPhone, Android etc. Analyze first Selenium Code, differentiate between Close and Quit,
Describe Firepath and firebug Add-ons installation in Mozilla, inspect elements in Mozilla, Chrome and IE,
Identifying Web Elements using id, name, class, Generate own CSS Selectors. Differentiate between
performance of CSS Selectors as compared to Xpaths, define class attribute, Handle Dynamic objects/ids
on the page, Analyze whether object is present on page or not
Manual Testing: Manual Testing, Manual Testing – How to Approach? Manual Testing – Myth and fallacy,
Defect Life Cycle, Qualities of a good Manual Tester, Manual Testing Vs Automation Testing, Types,
System Testing, Acceptance Testing, Unit Testing, Techniques, Integration Testing, Smoke- Sanity Testing
Introduction to Test Design and Sustainable Software Testing Practices: Test Scenario, Test Case
Design, Test Basis Traceability Matrix, Energy-efficient coding and testing strategies, Integrating
sustainable practices in STLC, Balancing scalability and energy consumption during automated testing,
Case studies of sustainable software projects.
Reference Books:
1. Diego Molina, Selenium Fundamentals, Packt (2018).
2. Aditya P. Mathur, Foundations of Software Testing, Pearson Education(2008).
Course Objectives: The objective of the course is to teach techniques to automate the process of
integration and deployment software product.
Green Cloud Computing : Concept of Green Cloud, Virtualization in Green Cloud, Strategies for
Sustainability in Green Cloud .
Text Books:
1. Arundel, J., & Domingus, J., Cloud Native DevOps with Kubernetes:
building, deploying, and scaling modern applications in the cloud. O'Reilly
Media, (2019).
2. Kim, G., Humble, J., Debois, P., & Willis, J., The DevOps Handbook: How to
Create World-Class Agility, Reliability, and Security in Technology
Organizations. IT revolution Press 1st ed(2016).
3. Bass, L., Weber, I., & Zhu, L., DevOps: A software architect's perspective.
Addison-Wesley Professional (2015).
Reference Books:
1. Fox, A., Patterson, D. and Joseph, S., Engineering Software as a Service: An
Agile Approach Using Cloud Computing, 1st Edition (2013).
2. Rossel, S., Continuous Integration, Delivery, and Deployment: Reliable and
Faster Software Releases with Automating Builds, Tests, and Deployment.
Packt Publishing, 1st ed (2017).
Data Collection: Collecting Data, Scraping Data, Popular Scraping libraries, Data
Annotation
Graph Analytics: How to Represent & Store Graphs, Graph Power Laws, Centralities:
Degree, Betweenness, Clustering Coefficient, PageRank & Personalized PageRank,
Interactive Graph Exploration, RAPIDS Acceleration: Graphistry & cuXFilter.
Laboratory Work
Text Books:
1. Mitchell M., T., Machine Learning, McGraw Hill (1997) 1st Edition.
2. Alpaydin E., Introduction to Machine Learning, MIT Press (2014) 3rd Edition.
3. Vijayvargia Abhishek, Machine Learning with Python, BPB Publication (2018).
Reference Books:
1. Bishop M., C., Pattern Recognition and Machine Learning, Springer-Verlag (2011) 2nd
Edition.
2. Michie D., Spiegelhalter J. D., Taylor C. C., Campbell, J., Machine Learning, Neural
and Statistical Classification. Overseas Press (1994).
Course Objectives: This course provides a broad introduction to deep learning and natural
language processing. It offers some of the most cost-effective approaches to automated
knowledge acquisition in the emerging field of natural language understanding using deep
learning and GPU Computing.
Laboratory Work:
● Introduction to DL Frameworks: TLT, PyTorch, and Tensorflow (Keras).
● Binary Classification with Perceptron and Logistic Regression.
● Neural Modules (NeMo) for Training Conv AI Models, Exploring NeMo
Fundamentals, Exploring NeMo Model Construction, Nemo Swap App Demo.
● Sentiment Analysis & Text Classification with NeMo.
● Intent Slot Filling for ChatBot using Joint Bert Model with NeMo.
● Machine Translation with NeMo.
● Question & Answering Machine with NeMo.
● Information Retrieval, Punctuation & Capitalization, Relation Extraction, Sentiment
Analysis, Token Classification with NeMo.
● Hands-on practical on TensorRT Optimization, Triton Inference Server.
Course Learning Outcomes (CLOs) / Course Objectives (COs):
After the completion of the course the student will be able to:
1. Understand the concept of Neural Networks and its implementation in the context of
Machine Learning.
Page 170 of 226
2. Comprehend and apply recurrent neural networks on various NLP applications.
3. Understand the concept of basic transformer networks and its variants.
4. Apply transformer-based networks and its variants for NLP applications like text
classification, question-answering and machine translation systems.
Text Books:
1. Schmidhuber, J. (2015). ―Deep Learning in Neural Networks: An Overview". Neural
Networks 61: 85-117.
2. Bengio, Y., LeCun, Y., and Hinton, G. (2015). ―Deep Learning". Nature 521: 436-44.
3. Allen, James, Natural Language Understanding, Second Edition, Benjamin/Cumming,
1995.
4. Bengio, Y., Courville, A., and Vincent, P. (2013). ―Representation learning: A
review and new perspectives", IEEE Transactions on Pattern Analysis and Machine
Intelligence 35 (8): 1798-1828.
5. Deep Natural Language Processing course offered at the University of Oxford:
https://github.com/oxford-cs-deepnlp-2017/lectures
6. "The Unreasonable Effectiveness of Recurrent Neural Networks" by Andrej
Karpathy: https://karpathy.github.io/2015/05/21/rnn-effectiveness/ Manning,
Christopher and Heinrich, Schutze, Foundations of Statistical Natural Language
Processing, MIT Press, 1999.
Course Objectives: This course will provide students with the overall structure of the
Conversational AI pipeline including Speech Processing, Recognition, and Synthesis and
building end to end workflows using NeMo and Jarvis SDK.
Automatics Speech Recognition (ASR): ASR - DNN models (Jasper, QuartzNet, Citrinet,
Conformer-CTC), Open-source Datasets, Language Modelling: N-Gram, Neural Rescoring.
{Survey , Jasper, QuartzNet, CitriNet , Nemo}
Speech Synthesis: Text Normalization: Preparing Dataset and Text Normalization for input
to Speech Synthesis model. Introduction to Text-to-Speech (TTS) Models:- Mel Spectrogram
Generator: - Tacotron-2, Glow-TTS, Audio Generators:- WaveGlow, SqueezeWave.
{Papers, Nemo}
Jarvis Deployment: Introduction to Jarvis, Overview of Jarvis ASR, NLU and TTS APIs,
Introduction to Jarvis Dialog Manager. Jarvis Deployment:- Nemo model deployment for
ASR, NLP and TTS.
Laboratory Work:
● Practical Exercise on Statistical Speech Processing. {Traditional Signal Processing}
● Automatic Speech recognition with NeMo on English Dataset.
● Automatic Speech recognition with NeMo on Indic Language(Hindi) Dataset.
● NeMo Speech Commands Recognition using MatchboxNet, Noise Augmentation,
and Speaker Recognition.
● Text to Speech using Tacotron-2 and WaveGlow with NeMo on English Dataset.
● Text to Speech using Tacotron-2 and WaveGlow with NeMo on Indic Language
(Hindi) Dataset.
● End-to-End Conversational AI Model (Any Language): ASR/NLP/TTS with NeMo
and Jarvis.
Text Books:
1. Jurafsky, Dan and Martin, James, Speech and Language Processing, Second Edition,
Prentice Hall, 2008.
2. Daniel Jurafsky and James H. Martin, "Speech and Language Processing", 3rd edition
draft, 2019 [JM-2019].
3. Mark Gales and Steve Young, The application of hidden Markov models in speech
recognition, Foundations and Trends in Signal Processing, 1(3):195-304, 2008.
Reference Books:
1. Daniel Jurafsky and James H. Martin. 2009. Speech and Language Processing: An
Introduction to Natural Language Processing, Speech Recognition, and
Computational Linguistics. 2nd edition. Prentice-Hall.
2. Geoffrey Hinton, Li Deng, Dong Yu, George E. Dahl, Abdel-rahman Mohamed,
Navdeep Jaitly, Andrew Senior, Vincent Vanhoucke, Patrick Nguyen, Tara N.
Sainath, and Brian Kingsbury, Deep Neural Networks for Acoustic Modeling in
Speech Recognition, IEEE Signal Processing Magazine, 29(6):82-97, 2012.
8. Implement a multi-modal generation model that generates coherent captions for given
images or generates images from textual descriptions.
9. Explore real-world applications of multi-modal generation such as image captioning,
visual question answering (VQA), and generating visual explanations from textual input.
Text Books:
1. "Deep Learning" by Ian Goodfellow, Yoshua Bengio, and Aaron Courville
Reference Books:
2. "Natural Language Processing with PyTorch" by Delip Rao and Brian McMahan
3. "GPT-3: Language Models are Few-Shot Learners" by Brown et al.
Course Objectives: This course will provide students with fundamental knowledge of GPU Computing
and Machine Learning and Deep Learning Primer.
Introduction: GPU Computing, Parallel Programming, Machine Learning with RAPIDS, Model
Compression
Image Processing and Parallel Programming: GPU Programming, CUDA C/C++/Python, Accelerated
Image Processing, nvJPEG, Numba.
Deep Learning Model Compression: Introduction to model pruning, quantization and distillation
Optimization Framework: Using TensorRT optimization, Deploying model on Triton Inference server
Laboratory Work:
● Practical on Traditional Data Science packages (Numpy, Pandas, Scipy, Scikit-Learn).
● CUDA C/C++ for Accelerated Computing.
{DLI Online Course Section: Fundamentals of Accelerated Computing with CUDA C/C++}
● Numba to compile CUDA kernels for Numpy Acceleration in Python.
{DLI Online Course Section: Fundamentals of Accelerated Computing with CUDA Python}
● Getting started with Accelerated Data Science with RAPIDS AI (cuPy, cuDF, cuSignal, cuML).
● Decision Tree Classification Clustering in RAPIDS.
Text Books:
1. Mitchell M., T., Machine Learning, McGraw Hill (1997) 1st Edition.
2. Alpaydin E., Introduction to Machine Learning, MIT Press (2014) 3rd Edition.
3. Vijayvargia Abhishek, Machine Learning with Python, BPB Publication (2018).
Reference Books:
1. Bishop M., C., Pattern Recognition and Machine Learning, Springer-Verlag (2011) 2nd Edition.
2. Michie D., Spiegelhalter J. D., Taylor C. C., Campbell, J., Machine Learning, Neural and Statistical
Classification. Overseas Press (1994).
2 0 2 3.0
Course Objectives: This course will provide students with basic fundamental understanding and practical
hands-on training of computer vision and deep learning models on data centre GPU servers.
Introduction: Introduction to Deep Learning, Formulating Computer Vision Problem Statements, Image
Classification using CNN Architectures like VGG, Inception, ResNet(18/34/50/152). Working towards
building Object detection and Segmentation pipelines
Introduction to Deep Learning: Introduction Advanced Deep Neural Networks (DNNs), Batch
Normalization, Hyperparameter tuning, Activation Functions, Metrics, Optimization, Regularization.
Applications of Computer Vision (Object Detection & Segmentation): Introduction to Object Detection,
Data Preprocessing, CNN Architecture like {SSD, YOLOv3,EfficientDet, Spinenet}, Metrics, Loss
Functions, re-training on custom dataset, Segmentation: FCN-ResNet, Unet, MaskRCNN, Metrics and Loss
functions.
Graph Neural Network and Synthetic Data Generation: : Introduction to Graph Neural Networks,
Omniverse Replicator based synthetic data generation using 3D assets.
.
Laboratory Work:
● Introduction to DL Frameworks: TLT, PyTorch, and Tensorflow (Keras).
{DLI Online Course: Getting Started with Deep Learning}
{DLI Online Course: Deep Learning at Scale with Horovod}
● Training Classification Models with and without Mixed Precision and Multi-GPU on Open &
Custom Datasets.
● Training Detection Models with and without Mixed Precision and Multi-GPU on Open & Custom
Datasets.
● Training Segmentation Models with and without Mixed Precision and Multi-GPU on Open &
Custom Datasets.
{DLI Online Course: Getting Started with Image Segmentation}
{DLI Online Course: Synthetic Data Generation for Training Computer Vision Models}
{DLI Online Course: Introduction to Graph Neural Networks}
3. Analyze and evaluate performance of models for classification, detection and segmentation tasks.
Text Books:
1. Mitchell M., T., Machine Learning, McGraw Hill (1997) 1st Edition.
2. Alpaydin E., Introduction to Machine Learning, MIT Press (2014) 3rd Edition.
3. Vijayvargia Abhishek, Machine Learning with Python, BPB Publication (2018).
4. Computer Vision: Algorithms and Applications, R. Szeliski, Springer, 2011.
5. Computer Vision: A Modern Approach, D. Forsyth and J. Ponce, Prentice Hall, 2nd ed., 2011.
Reference Books:
1. Bishop M. C., Pattern Recognition and Machine Learning, Springer-Verlag (2011) 2nd Edition.
2. Introductory techniques for 3D computer vision, E. Trucco and A. Verri, Prentice Hall, 1998.
3. "Visualizing and Understanding Convolutional Networks" by Matthew D. Zeiler and Rob Fergus
(2014)
4. "Convolutional Neural Networks for Visual Recognition" (Stanford course given by Fei-Fei Li,
Andrej Karpathy, and Justin Johnson, 2016): http://cs231n.github.io/
2 0 2 3.0
Course Objectives: This course will provide students with advanced conceptual knowledge and practicals
on various computer vision and deep learning applications and provide the overall environment for end-to-
end pipeline development from data collection to deployment.
Introduction: Utilizing Jetpack SDK and other NVIDIA Toolkits to deploy CNN models on Jetson,
Creating Jetbot kits and deploying various applications, Working with NVIDIA Robotics toolkit: Isaac SIM
SDK and Gazebo for collision avoidance, path following.
Introduction to Edge AI: AI at the Edge & IoT, Jetson Architecture, Getting Started with Jetpack, NGC
Containers in Jetson, Getting started with NGC & Containers on Jetson.
Introduction to NVIDIA Toolkits and SDKs: Transfer Learning Toolkit, Kubernetes Deployment,
Deepstream SDK, Deploying Classification, Detection and Segmentation CNN Models on Jetson Devices.
Perception & Autonomous Navigation: Building JetBot Kits, Introduction to basic motion on JetBot,
Collision Avoidance: Stop/Go classifier (JetBot), freespace detection, Path Following: Recording user
input/video + DNN training (DriveNet), Simulation: Gazebo & Isaac SIM.
Advanced Vision & SLAM: Pose Recognition (Deploying Human pose model), Depth Estimation:
Mono/Stereo depth and point extraction, Visual Odometry: Camera pose estimation from DNNs, SLAM on
JetBot.
Laboratory Work:
● Setting up the Jetson Project kit.
{DLI Online Course: Getting Started with AI on Jetson Nano.}
● Deployment of Various Classification, Object Detection and Segmentation models in Jetson Nano.
● Getting started building various Jetbot Kits.
● Basic Motion with Jetbot
● Collision Avoidance with Jetbot kit
● Object following and Road following (DriveNet) with Jetbot.
● Teleoperation with Jetbot.
● Human Pose Estimation in Jetson Nano/JetBot.
● Implementing SLAM on Jetbot.
Reference Books:
1. Richard Hartley and Andrew Zisserman, Multiple View Geometry in Computer Vision, Second
Edition, Cambridge University Press, March 2004.
2. K. Fukunaga; Introduction to Statistical Pattern Recognition, Second Edition, Academic Press,
Morgan Kaufmann, 1990.
3. R.C. Gonzalez and R.E. Woods, Digital Image Processing, Addison- Wesley, 1992.
4. Christopher M. Bishop; Pattern Recognition and Machine Learning, Springer, 2006.
2 0 2 3.0
Course Objectives: This course will provide students with introduction to the basic mathematical
foundations of Reinforcement Learning for building real world computer vision applications, and
Conversational AI for developing Chatbots.
Introduction: GPU Computing, Implementing Behaviours of Robots such as Manipulation, and Task
Learning, Fundamentals of Reinforcement Learning for Vision and Deploying Conversational AI pipelines
in Jetson.
Manipulation: Overview of Manipulation in Robotics, Inverse Kinematics and Control, Gripping & Task
Learning.
Reinforcement Learning: Introduction to RL: RL agents, Dynamic Programming, Monte Carlo‘s and
Temporal-Difference Methods, OpenAI Gym, RL in Continuous Spaces.
{Added Lectures, Summaries}
Laboratory Work:
● Manipulation Lab: Building Pick-n-place.
● Manipulation Lab: Object Assembly.
● Game Agent: Open AI Gym (Jetbot in simulation).
● Conversational AI VoiceBot: Verbal JetBot commands/feedback, ect (optional mic/speaker).
Text Books:
1. Wiering, Marco, and Martijn Van Otterlo. "Reinforcement learning." Adaptation, learning, and
optimization 12 (2012): 3.
2. Russell, Stuart J., and Peter Norvig. "Artificial intelligence: a modern approach."Pearson Education
Limited, 2016.
3. Jurafsky, Dan and Martin, James, Speech and Language Processing, Second Edition, Prentice Hall,
2008.
4. Daniel Jurafsky and James H. Martin, "Speech and Language Processing", 3rd edition draft, 2019
[JM-2019].
Reference Books:
1. Goodfellow, Ian, Yoshua Bengio, and Aaron Courville. "Deep learning." MIT press, 2016.
2. Mark Gales and Steve Young, The application of hidden Markov models in speech recognition,
Foundations and Trends in Signal Processing, 1(3):195-304, 2008.
3. Daniel Jurafsky and James H. Martin. 2009. Speech and Language Processing: An Introduction to
Natural Language Processing, Speech Recognition, and Computational Linguistics. 2nd edition.
Prentice-Hall.
4. "Reinforcement Learning: An Introduction" by Richard S. Sutton and Andrew G. Barto:
https://webdocs.cs.ualberta.ca/~sutton/book/the-book-2nd.html
5. David Silver's course: http://www0.cs.ucl.ac.uk/staff/d.silver/web/Teaching.html
6. "Deep Reinforcement Learning: Pong from Pixels" by Andrej Karpathy:
https://karpathy.github.io/2016/05/31/rl/
7. Talks on Deep Reinforcement Learning by John Schulman:
https://www.youtube.com/watch?v=aUrX-rP_ss4 , and his Deep Reinforcement Learning course
http://rll.berkeley.edu/deeprlcourse/
Course Objectives: This course is designed to provide the fundamental skills needed to analyse the
internal and external security threats against a network, and to implement security mechanisms to
protect an organization‘s information. The course helps to evaluate network and Internet security
issues and provides security solutions such as designing a security policy, troubleshooting networks,
and digital signatures.
Network Attacks and Defence Strategies: Essential terminologies related to network security attacks ▪
Various examples of network-level attack techniques ▪ Various examples of application-level attack
techniques ▪ Various examples of social engineering attack techniques ▪ Various examples of email
attack techniques ▪ Study attack vectors targeting IoT devices in smart cities and their impact on urban
sustainability
Administrative Network Security: Obtain Regulatory Frameworks Compliance ▪ Discuss Various
Regulatory Frameworks, Laws, and Acts ▪ Learn to Design and Develop Security Policies ▪ Conduct
Security Awareness Training ▪ Explore regulatory frameworks for securing renewable energy systems
and smart grids.
Technical Network Security: The principles of access control, the terminologies used, and the different
models, The different aspects of IAM such as identity management, authentication, authorization, and
accounting ▪ The various cryptographic security techniques ▪ The various cryptographic algorithms ▪ The
security benefits of network segmentation techniques ▪ The various essential network security
solutions
Network Perimeter Security: Understand firewall security concerns, capabilities, and limitations ▪
Understand different types of firewall technologies and their usage ▪ Understand firewall topologies
and their usage ▪ Distinguish between hardware, software, host, network, internal, and external
firewalls
Endpoint Security-Windows Systems: Windows OS and security concerns ▪ Windows security
components ▪ Windows security features ▪ Windows security baseline configurations ▪ Windows user
account and password management
Endpoint Security-Linux Systems: Understand Linux OS and security concerns ▪ Discuss Linux
installation and patching ▪ Discuss Linux OS hardening techniques ▪ Discuss Linux user access and
password management
Endpoint Security-Mobile Devices: Common mobile usage policies in enterprises ▪ Security risks and
challenges associated with enterprise mobile usage policies ▪ Security guidelines to mitigate the risks
associated with enterprise mobile usage policies
Endpoint Security IoT-Devices: Understand IoT devices, their need, and application areas ▪ Understand
the IoT ecosystem and communication models ▪ Understand security challenges and risks associated
with IoT-enabled environments ▪ Discuss security in IoT-enabled environments ▪ Implement energy-
efficient communication protocols for IoT security.
Text Books:
8. 1. Certified Network Defender (CNDv2) Academia Series – EC- council
9. 2. Ethical Hacking and Countermeasures (CEHv12) Academia Series – EC-Council
Page 188 of 226
UCS673: Ethical Hacking-I
Cr
L T P
3.0
2 0 2
Course Objectives: This course is designed to provide the fundamental skills needed to analyse the internal and
external security threats against a network, and to implement security mechanisms to protect an organization‘s
information. The course helps to evaluate network and Internet security issues and provides security solutions such
as designing a security policy, troubleshooting networks, and digital signatures. The course helps to understand and
apply the basic hacking techniques.
Enterprise Virtual Network Security: Evolution of network and security management concepts in modern
virtualized IT environments, Essential concepts in virtualization, Network virtualization (NV) security, Software-
defined network (SDN) security, OS virtualization security, Explore energy-efficient virtual network configurations
.
Enterprise Cloud Network Security: Cloud computing fundamentals, Cloud security, Evaluate the Cloud Service
Providers (CSPs) for security before consuming a cloud service, Security in Amazon cloud (AWS)
Enterprise Wireless Network Security: Understand the fundamentals of wireless networks, Understand the
encryption mechanisms used in wireless networks, Understand the authentication methods used in wireless
networks, Study wireless network designs optimized for sustainability in urban areas.
Network Traffic Monitoring and Analysis: Understand the need for and advantages of network traffic monitoring,
Setting up the environment for network monitoring, Determine baseline traffic signatures for normal and suspicious
network traffic, Perform network monitoring and analysis for suspicious traffic using Wireshark, Study tools that
optimize traffic flow to reduce energy consumption.
Network Logs Monitoring and Analysis: Logging concepts, Log monitoring and analysis on Windows systems,
Log monitoring and analysis on Linux systems
Incident Response and Forensic Investigation: Understand the Concept of Incident Response, Understand the
Role of the First Responder in Incident Response, Discuss Do‘s and Don‘ts in First Response, Describe the Incident
Handling and Response Process
Business Continuity and Disaster Recovery: Business Continuity (BC) and Disaster Recovery (DR), BC/DR
activities, Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
Risk Anticipation with Risk Management: Understand risk management concepts, Learn to manage risk through a
risk management program, Learn different risk management frameworks (RMFs)
Threat Assessment with Attack Surface Analysis: Attack surface analysis, Attack surface, Identify Indicators of
Exposures (IoEs), Evaluate attack surfaces in energy-efficient IT systems
System Hacking: Explain the different techniques to gain access to a system, Apply privilege
escalation techniques, Explain different techniques to gain and maintain remote access to a system,
Describe different types of rootkits
Malware Threats: Describe the concepts of malware and malware propagation techniques, Explain
Potentially unwanted applications (PUAs) and adware, Describe the concepts of advanced persistent
threats (APTs) and their lifecycle
Sniffing: Describe sniffing concepts, Explain different MAC attacks, Explain different DHCP
attacks, Describe ARP poisoning, Explain different spoofing attacks, Study sniffing attacks on
energy-efficient wireless networks and IoT devices.
Social Engineering: Describe social engineering concepts, Perform social engineering using
various techniques, Describe insider threats, Perform impersonation on social networking sites
Laboratory Work:
Learn how to Audit Docker Host Security Using Docker-Bench-Security Tool, Learn how to
Implement Amazon Web Services Identity and Access Management, Learn how to Configure
Security on a Wireless Router, Learn how to Monitor and Detect Network Reconnaissance, Access
and Denial-of-Service/Distributed Denial-of-Service Attempts, Learn how to Identify Suspicious
Activities Using Log Monitoring and Analysis, Learn how to Work with Incident Tickets in
OSSIM, Learn how to Perform Vulnerability Management using OSSIM, Learn how to Perform
Vulnerability Analysis Using the Nessus, Learn how to identify an Attack Surface in Windows
using the Microsoft Attack Surface Analyzer, System Hacking, Gain Access to the target system
using Trojans, Perform Active Sniffing, Perform Social Engineering using various techniques.
Course Learning Outcomes (CLOs) / Course Objectives (COs):
On completion of this course, the students will be able to:
1. Examine the evolution of network security management in virtualized IT and cloud
environments.
2. Understand wireless networking concepts, logging concepts and advantages of network traffic
monitoring.
3. Examine various network security incidents and develop policies, processes, and guidelines for
incident handling, disaster recovery and business continuity.
4. Implement Network security management, network security policies and procedures, data
security techniques.
5. Compare and contrast different hacking techniques and analyze the legal implications of
hacking.
6. Examine different vulnerabilities, threats, and attacks to information systems and
recommend the countermeasures.
Text Books:
1. Certified Network Defender (CNDv2) Academia Series – EC-Council
2. Ethical Hacking and Countermeasures (CEHv12) Academia Series – EC-Council
Course Objective: This undergraduate-level course provides students with an in-depth understanding of the
principles, techniques, and tools used in ethical hacking. Ethical hacking, also known as penetration testing or white-
hat hacking, involves the authorized and legal exploration of computer systems, networks, and applications to
identify vulnerabilities and weaknesses before malicious hackers can exploit them. This course will provide the
knowledge and skills necessary to conduct ethical hacking assessments, identify security vulnerabilities, and
recommend appropriate remediation measures to enhance the security posture of organizations and protect against
cyber threats. Further, this course will help to understand the ethical and legal considerations involved in ethical
hacking activities, and will help students to develop careers in cybersecurity and information technology.
Ethical Hacking: Ethical hacking, Attack Vectors, Cyberspace and Criminal Behaviour, Clarification of Terms,
Traditional Problems associated with Computer Crimes, Realms of Cyber world, brief history of the internet,
contaminants and destruction of data, unauthorized access, Explore attack vectors targeting green IT infrastructures
and smart city networks.
Intrusion in cyber world: computer intrusions, white-collar crimes, viruses and malicious code, virus attacks,
pornography, software piracy, mail bombs, exploitation, stalking and obscenity in internet, Cyber psychology,
Social Engineering.
Laws related to cybercrime: Basics of Law and Technology, Introduction to Indian Laws, Scope and
Jurisprudence, Digital Signatures, possible crime scenarios, law coverage, data interchange, mobile communication
development, smart card and expert systems, Study international regulations concerning cybercrimes in energy and
sustainability domains.
Digital Forensics: Introduction to Digital forensics, Forensic software and handling, forensic hardware and
handling, analysis and advanced tools, forensic technology and practices, fingerprint recognition, Audio-video
evidence collection, Preservation and Forensic Analysis. Definition and types of cybercrimes, electronic evidence
and handling, electronic media, collection, searching and storage of electronic media, introduction to internet crimes,
hacking and cracking, credit card and ATM frauds, web technology, cryptography, emerging digital crimes and
modules, Investigate digital forensic techniques for renewable energy systems and eco-friendly technologies.
Computer Forensics in Today’s World: Computer Forensics in Today‘s World, Fundamentals of Computer
Forensics, Cybercrimes and their Investigation Procedures, Digital Evidence, Forensic Readiness, Incident
Response, and the Role of SOC (Security Operations Centre) in Computer Forensics, Identify the Roles and
Responsibilities of a Forensic Investigator, Challenges Faced in Investigating Cybercrimes, Understanding Legal
Compliance in Computer Forensics
Computer Forensics Investigation Process: Forensic Investigation Process and its Importance, Pre-investigation
Phase, Understanding First Response, Understanding the Post- Investigation Phase
Forensic Tools and their applications: Forensic Tools and Processing of Electronic Evidence,
Introduction to Forensic Tools, Usage of Slack space, tools for Disk Imaging, Data Recovery,
Vulnerability Assessment Tools, Encase and FTK tools, Anti Forensics and probable counters,
retrieving information, process of computer forensics and digital investigations, processing of
digital evidence, digital images, damaged SIM and data recovery, multimedia evidence, retrieving
deleted data: desktops, laptops and mobiles, retrieving data from slack space, renamed file,
compressed files, Explore advanced techniques for recovering data from energy-efficient and eco-
friendly devices.
Laboratory Work:
The course will incorporate hands-on lab exercises, practical demonstrations, and real-world
scenarios to reinforce theoretical concepts and develop practical skills. Students will also engage in
ethical hacking projects, allowing them to apply their knowledge in simulated environments and
gain valuable experience in conducting ethical hacking assessments.
Course Learning Outcomes (CLOs) / Course Objectives (COs):
On completion of this course, the students will be able to:
1. Understanding the basics of Ethical Hacking and its role in industry, society and information
system.
2. Describe various types of securities and vulnerabilities.
3. Understanding of cyber forensic that can be useful in the process of extracting and analysis of
digital evidences.
4. Identify, Interpret and Evaluate Laws, Government Regulations and International Legal Systems
Pertinent to cyber forensic.
5. Demonstration of cyber forensic tools and their uses in preventing various types of system
attacks.
Text Books:
1. Simpson T. M., Backman K., Corley J., Hands-On Ethical Hacking and Network Defense,
Delmar Cengage Learning (2011) 2nd edition.
2. Fadia A. and Zacharia M., Network intrusion alert: an ethical hacking guide to intrusion
detection, Boston, MA: Thomas Course Technology 3rd edition (2008
L T P Cr
2 0 2 3.0
Course Objectives: This course focuses on ethical hacking and security practices that cover the latest security threats, advanced
attack techniques, and real-time demonstrations of hacking methods, tools, and protective measures. The students will examine
digital evidence from computers, networks, and mobile devices. The course helps to realize the importance of integrating
forensic practices into different operations to investigate attacks and system anomalies.
Hacking Wireless & Mobile Networks: Understanding Wireless Hacking Methodology, Wireless Hacking Tools,
Understanding mobile network Threats and Attacks, Overview of Mobile Device Management (MDM), Mobile Security
Guidelines and Tools, Explore vulnerabilities in mobile networks used for managing sustainable city infrastructures.
IoT Hacking: Overview of IoT Concepts, Understanding IoT Attacks, Understanding IoT Hacking Methodology, IoT Hacking
Tools, IoT Countermeasures, Analyze IoT security challenges in renewable energy systems and smart grids.
Forensics: Understand Volatile and Non-volatile Data in Linux, Analyze Filesystem Images Using the Sleuth Kit, Demonstrate
Memory Forensics Using Volatility & PhotoRec, Network Forensic Readiness, Perform Incident Detection and Examination
with SIEM Tools, Monitor and Detect Wireless Network Attacks
Investigating Web Attacks: Understand Web Application Forensics, Understand Web Server Logs, Understand the
Functionality of Intrusion Detection System (IDS) and Web Application Firewall (WAF), Investigate Web Attacks on
Windows-based Servers, Detect and Investigate Various Attacks on Web Applications, Study intrusion prevention for eco-
friendly e-commerce platforms and web services.
Dark Web Forensics: Understand the Dark Web, Determine How to Identify the Traces of Tor Browser during Investigation,
Perform Tor Browser Forensics
Database Forensics: Understand & Perform MSSQL Forensics, Understand Internal Architecture of MySQL and Structure of
Data Directory, Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis, Perform MySQL
Forensics on WordPress Web Application Database Directory, Explore forensic techniques for smart city database anomalies.
Investigating Email Crimes: Understand Email Basics, Understand Email Crime Investigation and its Steps, U.S. Laws
Against Email Crime, Study spam filters optimized for energy-efficient cloud systems.
Malware Forensics: Define Malware and Identify the Common Techniques Attackers Use to Spread Malware, Understand
Malware Forensics Fundamentals and Recognize Types of Malware Analysis, Understand and Perform Static Analysis of
Malware, Analyze Suspicious Word and PDF Documents, Understand Dynamic Malware Analysis Fundamentals and
Approaches, Analyze Malware Behavior on System Properties in Real-time
Laboratory Work: Learn about SQL Injection, Hacking Wireless Networks, Hacking Mobile Platforms, IoT and OT Hacking,
Cloud Computing, Cryptography, Linux and Mac Forensics, Network Forensics, Investigating Web Attacks, Dark Web
Forensics, Database forensics, Cloud Forensics, Investigating Email Crimes, Malware Forensics, Mobile Forensics, IoT
Forensics
Text Books:
1. Certified Ethical Hacker (CEHv12), 12th Edition, EC-Council.
2. Computer Hacking Forensic Investigator (CHFIv11), 11th Edition, EC-Council.
Intra and Inter vehicle network: Topology of LIN- CAN- Flex ray- WIFI and GPS-
Automotive Ethernet- GPRS and 5G application for automotive systems
communications- SOME-IP and DO-IP
V2V application: Emergency vehicle approach, Blind spot lane change warning,
Rear end collision warning, Emergency brake light and Intersection movement assist.
V2I application: Traffic information system- Curve speed warning system- work
zone warning system- weather impact warning system and Platoon detection.
Text Books:
1. Christoph Sommer, Falko Dressler, Vehicular Networking,
Cambridge
University Press, 2015.
2. Markus Meuck, Ingolf Karls, Networking Vehicles to Everything, DE Gruyter
press, 2018
3. Dominique Paret, Hassina Rebaine ―Autonomous and Connected Vehicles
Network Architectures from Legacy Networks to Automotive Ethernet‖ 2022
Wiley
Reference books:
1. Peter Han Joo Chong ―Vehicular Networks Applications, Performance
Analysis and Challenges‖, 2019, Nova Science Publishers.
2. Guojun Wang, Md Tabrez Nafis, Muhammad Arif, Mazin Abed Mohammed
―Vehicular Ad Hoc Networks Futuristic Technologies for Interactive
Modelling, Dimensioning, and Optimization‖ 2022, CRC Press
3. Jiajia Liu, Abderrahim Benslimane ·‖Intelligent and Connected Vehicle
Security‖, 2022 River Publishers.
Cyber security Risk management and Standards: Applied standards and cyber risk
management, ISO standards towards risk - Seven Principles of Network Security
Analysis Strategy, Network Traffic Monitoring and Analysis standards - cyber
security of SAE level 2, 3, and 4 autonomous driving systems-Cyber-attacks in future
autonomous vehicle.
Understanding the basic Data Analytics Software’s and Tools: Introduction to the
software basis – version control (GIT) – software building testing – automation,
Introduction of the basic data analysis tools used – Microsoft Excel – Python –
Jupyter Notebook Apache Spark – Microsoft Power BI – SQL -Azure Databricks.
How to choose a data analytics tool Basic idea about the installation and usage of the
tools
Data Analytics Pipeline for Vehicle data Analytics: Cleaning and formatting
vehicle data – Dealing with missing and inconsistent data – Feature Engineering –
Creating new features to enhance model performance – Exploratory Data Analysis for
Data - Visualizing and understanding patterns in data – Creating Dashboards – Design
principles for effective dashboards - Extracting insights to inform analytics strategies
– Good Practices - Build
an end-to-end scalable Data Analytics Pipeline
Systems engineering in ITS and ITS architecture: ITS Standards and Architecture -
ITS Communication Systems - ITS System Integration - ITS and Security - ITS
Policy Issues - ITS project development life cycle - Architectural frameworks (e.g. -
C2C-CC - C-ITS) - Case studies on ITS architecture design.
Reference books:
1. Garg - Sahil - Gagangeet Singh Aujla - Kuljeet Kaur - and Syed Hassan
Ahmed Shah - eds. Intelligent cyber-physical systems for autonomous
transportation. Springer - 2022.
2. Bazzan - Ana LC - and Franziska Klügl. Introduction to intelligent systems in
traffic and transportation. Springer Nature - 2022.
3. Mouftah - Hussein T. - Melike Erol-Kantarci - and Sameh Sorour - eds.
Connected and Autonomous Vehicles in Smart Cities. CRC Press - 2020.
4. Robert Gordon - ―Intelligent Transportation Systems‖ - Springer International
Publishing - 2016.
L T P Cr
2 0 0 2.0
Course Objectives:
The objectives of the course are to introduce to the students:
1. The basics of French language to the students. It assumes that the students have minimal or no
prior knowledge of the language.
2. To help them acquire skills in writing and speaking in French, comprehending written and
spoken French.
3. The students are trained in order to introduce themselves and others, to carry out short
conversation, to ask for simple information, to understand and write short and simple messages,
to interact in a basic way.
4. The main focus of the students will be on real life language use, integration of French and
francophone culture, & basic phrases aimed at the satisfaction of needs of concrete type.
5. During class time the students are expected to engage in group & pair work.
Communicative skills: Greetings and Its Usage, Asking for and giving personal information, How to
ask and answer questions, How to talk over the phone, Exchange simple information on preference,
feelings etc. Invite, accept, or refuse invitation, Fix an appointment, Describe the weather, Ask
for/give explanations, Describe a person, an object, an event, a place.
Grammar : Pronouns: Pronom sujets (Je/ Tu/Il/Elle/Nous/Vous/Ils/Elles), Nouns: Genders, Articles:
Definite article and Indefinite articles, Verbs: Regular verbs (-er, -ir ending) Irregular verbs (-re
ending), Auxiliary verbs (avoir, être, aller). Adjective: Description, Adjective possessive, Simple
Negation, Tense: Present, Future, Questions, Singular & plural.
Vocabulary: Countries and Nationalities, Professions, Numbers (ordinal, cardinal), Colours, Food
anddrinks, Days of the week, Months, Family, Places.
Phonetics: The course develops the ability, to pronounce words, say sentences, questions and give
orders using the right accent and intonation. To express surprise, doubt, fear, and all positive or
negative feelings using the right intonation. To distinguish voiced and unvoiced consonants. To
distinguish between vowel sounds.
Recommended Books :
1. Alter ego-1 : Méthode de français by Annie Berthet, Catherine Hugot, Véronique M.
Kizirion,Beatrix Sampsonis, Monique Waendendries, Editions Hachette français
langue étrangère.
2. Connexions-1 : Méthode de français by Régine Mérieux, Yves Loiseau, Editions Didier
3. Version Originale-1: Méthode de français by Monique Denyer, Agustin Garmendia.
4. Marie-Laure Lions-Olivieri, Editions Maison des Langues, Paris 2009
5. Latitudes-1 : Méthode de français by Régine Mérieux, Yves Loiseau, Editions Didier
6. Campus-1 : Méthode de français by Jacky Girardet, Jacques Pécheur, Editions CLE International.
7. Echo-1 : Méthode de français by J. Girardet, J. Pécheur, Editions CLE International.
Evaluation Scheme:
Sr. Weightage
Evaluation
No. (%)
Elements
1 MST 45
2 EST 55
L T P Cr
2 0 0 2.0
Course Objectives: In this course, the student will learn about the essential building blocks and basic
concepts around cyber security such as Confidentiality, Integrity, Availability, Authentication,
Authorization, Vulnerability, Threat and Risk and so on.
1. Understand the broad set of technical, social & political aspects of Cyber Security and security
Recommended Books:
1. Pfleeger, C.P., Security in Computing, Prentice Hall, 5th edition (2010)
2. Schneier, B., Applied Cryptography, Second Edition, John Wiley & Sons (1996)
3. Rhodes-Ousley, M., Information Security: The Complete Reference, Second Edition,
InformationSecurity Management: Concepts and Practice. New York, McGraw-Hill,
(2013).
4. Whitman, M.E. and Herbert J. M., Roadmap to Information Security for IT and Infosec
Managers, Course Technology, Boston, MA (2011).
Evaluation Scheme:
Sr. Weightage
Evaluation
No. Elements (%)
1 MST 45
2 EST 55
L T P Cr
2 0 0 2.0
Course Objectives: To provide acquaintance with modern cleaner production processes and
emerging energy technologies; and to facilitate understanding the need and application of green and
renewable technologies for sustainable development of the Industry/society
Green Design: Green buildings - benefits and challenges; public policies and market-driven
initiatives; Effective green specifications; Energy efficient design; Passive solar design; Green power;
Green materials and Leadership in Energy and Environmental Design (LEED)
Recommended Books
1. Kirkwood, R,C, and Longley, A,J, (Eds,), Clean Technology and the Environment, Chapman
& Hall,London (1995),
2. World Bank Group; Pollution Prevention and Abatement Handbook – Towards Cleaner
Production, World Bank and UNEP; Washington DC (1998),
3. Modak, P,, Visvanathan, C, and Parasnis, M,, Cleaner Production Audit, Course Material on
Cleaner Production and Waste Minimization; United Nations Industrial Development
Evaluation Scheme:
Sr. Weightage
Evaluation
No. (%)
Elements
1 MST 45
2 EST 55
L T P Cr
2 0 0 2.0
Course Objective: This course aims to provide the students with the fundamental concepts,
principles and approaches of corporate finance, enable the students to apply relevant principles and
approaches in solving problems of corporate finance and help the students improve their overall
capacities.
Introduction to corporate finance: Finance and corporate finance. Forms of business organizations,
basic types of financial management decisions, the goal of financial management, the agency
problem; the role of the financial manager; basic types of financial management decisions.
Financial statements analysis: Balance sheet, income statement, cash flow, fund flow financial
statement analysis Computing and interpreting financial ratios; conducting trend analysis and Du Pont
analysis.
The time value of money: Time value of money, future value and compounding, present value and
discounting, uneven cash flow and annuity, discounted cash flow valuation.
Risk and return: Introduction to systematic and unsystematic risks, computation of risk and return,
security market line, capital asset pricing model.
Long-term financial planning & Financial Decisions: Various sources of long term financing, the
elements and role of financial planning, financial planning model, percentage of sales approach,
external financing needed. Cost of capital, financial leverage, operating leverage. Capital structure,
theories of capital structure net income, net operating income & M&M proposition I and II.
Short-term financial planning and management: Working capital, operating cycle, cash cycle, cash
budget, short-term financial policy, cash management, inventory management, credit management.
Capital budgeting : Concepts and procedures of capital budgeting, investment criteria (net present
value, payback, discounted payback, average accounting return, internal rate of return, profitability
index ), incremental cash flows, scenario analysis, sensitivity analysis, break-even analysis,
Dividend policy: Dividend, dividend policy, Various models of dividend policy (Residual approach,
Walter model, Gordon Model, M&M, Determinants of dividend policy.
Security valuation: Bond features, bond valuation, bond yields, bond risks, stock features, common
stock valuation, and dividend discount & dividend growth models. Common stock yields, preferred
stock valuation.
Evaluation Scheme:
Sr. Weightage
Evaluation
No. (%)
Elements
1 MST 45
2 EST 55
L T P Cr
2 0 0 2.0
Course Objectives: This course provides an introduction to the study of intelligence, mind and brain
from an interdisciplinary perspective, It encompasses the contemporary views of how the mind works,
the nature of reason, and how thought processes are reflected in the language we use, Central to the
course is the modern computational theory of mind and it specifies the underlying mechanisms
through which the brain processes language, thinks thoughts, and develops consciousness,
Recommended Books
1. Bermúdez, J.L., Cognitive Science: An Introduction to the Science of the Mind
(2nd Ed,),Cambridge, UK: Cambridge (2014).
2. Friedenberg ,J,D, and Silverman,G, Cognitive Science: An Introduction To The Study
Of Mind,Sage Publications:, London (2014)
3. Thagard, P., Mind: An introduction to Cognitive Science, MIT Press, (2005)
4. Thagard, P., (1998) Mind Readings: Introductory Selections on Cognitive Science,
MIT Press,Cambridge, Mass,
Evaluation Scheme:
Sr. Weightage
Evaluation
No. (%)
Elements
1 MST 45
2 EST 55
L T P Cr
2 0 0 2.0
Course Objective:
To introduce the basic concept of Nanoscience and advanced applications of nanotechnology,
Course outcomes:
Upon completion of the course, Students will be able to
1. discriminate between bulk and nano materials,
3. correlate ‗quantum confinement‘ and ‗quantum size effect‘ with physical and chemical properties
of nanomaterials,
4. uses top-down and bottom-up methods to synthesize nanoparticles and control their size and
shape
5. characterize nanomaterials with various physico-chemical characterization tools and use them in
development of modern technologies
Evaluation Scheme:
Sr. Weightage
Evaluation
No. (%)
Elements
1 MST 45
2 EST 55
L T P Cr
2 0 0 2.0
Course Objective:
The objective of the course is to introduce students with the fundamental concepts in graph
Theory, with a sense of some its modern applications. They will be able to use these methods in
subsequent courses in the computer, electrical and other engineering,
Introduction: Graph, Finite and infinite graph, incidence and degree, Isolated vertex, Pendent
vertex and null graph, Isomorphism, Sub graph, Walks, Paths and circuits, Euler circuit and path,
Hamilton path and circuit, Euler formula, Homeomorphic graph, Bipartite graph, Edge
connectivity, Computer representation of graph, Digraph.
Tree and Fundamental Circuits: Tree, Distance and center in a tree, Binary tree, Spanning tree,
Finding all spanning tree of a graph, Minimum spanning tree.
Graph and Tree Algorithms: Shortest path algorithms, Shortest path between all pairs of
vertices, Depth first search and breadth first of a graph, Huffman coding, Cuts set and cut
vertices, Warshall‘s algorithm, topological sorting.
Planar and Dual Graph: Planner graph, Kuratowski‘s theorem, Representation of planar graph,
five-color theorem, Geometric dual.
Coloring of Graphs: Chromatic number, Vertex coloring, Edge coloring, Chromatic
partitioning, Chromatic polynomial, covering.
Application of Graphs and Trees: Konigsberg bridge problem, Utilities problem, Electrical
network problem, Seating problem, Chinese postman problem, Shortest path problem, Job
sequence problem, Travelling salesman problem, Ranking the participant in a tournament,Graph
in switching and coding theory, Time table and exam scheduling, Applications of tree and graph
in computer science.
Evaluation Scheme:
Sr. Weightage
Evaluation Elements
No. (%)
1 MST 45
2 EST 55
L T P Cr
2 0 0 2.0
Course Objectives:
The main objective of this course is to motivate the students to understand and learn various
advanced numerical techniques to solve mathematical problems governing various
engineering and physical problems.
Non-Linear Equations: Methods for multiple roots, Muller‗s, Iteration and Newton-
Raphson method for non-linear system of equations and Newton-Raphson method for
complex roots.
Polynomial Equations: Descartes‗ rule of sign, Birge-vieta, Giraffe‗s methods.
System of Linear Equations:Cholesky and Partition methods, SOR method with optimal
relaxation parameters.
Eigen-Values and Eigen-Vectors: Similarity transformations, Gerschgorin‗s bound(s) on
eigenvalues, Given‗s and Rutishauser methods.
Interpolation and Approximation: Cubic and B – Spline and bivariate interpolation, Least
squares approximations, Gram-Schmidt orthogonalisation process and approximation by
orthogonal polynomial, Legendre and Chebyshev polynomials and approximation.
Differentiation and Integration:Differentiation and integration using cubic splines,
Romberg integration and multiple integrals.
Ordinary differential Equations: Milne‗s, Adams-Moulton and Adam‗s Bashforth methods
with their convergence and stability, Shooting and finite difference methods for second order
boundary value problems.
Recommended Books
1) Gerald, C.F. and Wheatley, P.O., Applied Numerical Analysis, Pearson Education
(2008) 7th ed.
2) Gupta, S.R., Elements of Numerical Analysis, MacMillan India (2009).
Evaluation Scheme:
Sr. Weightage
Evaluation Elements
No. (%)
1 MST 45
2 EST 55
Course Objective: To learn about living world and basic functioning of biological systems.
The course encompasses understanding of origin of life, its evolution and some of its central
characteristics. It also aims to familiarize engineering students to some of the intricate
biological phenomena and mechanisms.
Recommended Books:
1. Nelson, D.L., Cox, M.M., Lehninger: Principles of Biochemistry,
WH Freeman(2008) 5th ed.
2. Dhami, P.S., Srivastava, H.N. Chopra, G., A Textbook of Biology, Pradeep
Publications (2008).
3. Das, H.K., Textbook of Biotechnology, John Wiley & Sons (2004) 3rd Edition.
4. Gardner, E.J., Simmons, M., Peter, S.D., Principles of Genetics, John Wiley & Sons
(2008)
Page 220 of 226
5. Albert, B., Essential Cell Biology, Taylor & Francis, London (2009)
Sr. Weightage
Evaluation Elements
No. (%)
1 MST 45
2 EST 55
3 0 0 3
Pre-requisite NIL
Course Objectives
1. To attain a comprehensive overview of connected vehicles.
2. To understand the intra- and inter-vehicle communication.
3. Acquiring knowledge on VANET.
4. Able to tackle current problems in connected vehicle technology
Course Outcomes
1. Understand the fundamentals of connected vehicles.
2. Comprehend network architectures, including intra-vehicle and inter-vehicle networks.
3. Familiarize with the VANET networking and V2X applications
4. Understand the Security and privacy-related issues of vehicular networks.
1. Christoph Sommer, Falko Dressler, Vehicular Networking, Cambridge University Press, 2015.
2. Markus Meuck, Ingolf Karls, Networking Vehicles to Everything, DE Gruyter Press, 2018
3. Dominique Paret, Hassina Rebaine “Autonomous and Connected Vehicles Network Architectures from Legacy
Networks to Automotive Ethernet” 2022 Wiley
Reference Books
1. Peter Han Joo Chong “Vehicular Networks Applications, Performance Analysis and Challenges”, 2019, Nova
Science Publishers.
2. Guojun Wang, Md Tabrez Nafis, Muhammad Arif, Mazin Abed Mohammed “Vehicular Ad Hoc Networks Futuristic
Technologies for Interactive Modelling, Dimensioning, and Optimization” 2022, CRC Press
3. Jiajia Liu, Abderrahim Benslimane ·” Intelligent and Connected Vehicle Security”, 2022 River Publishers.
Mode of Evaluation: CAT, written assignment, Quiz, FAT, Project, Seminar, group discussion, field work
Evaluation Scheme
MST-25
Sessional-30
EST-45