AY21 22 Computer Syllabus Final
AY21 22 Computer Syllabus Final
AY21 22 Computer Syllabus Final
01/07/18 FF654
3 2 1 10 20 10 15 10 15 20 100 5
s1 CS3216 Theory of Computation
Software Design and 3 2 1 10 20 10 15 10 15 20 100 5
s2 CS3218 Modeling
s3 CS3202 Artificial Intelligence 3 2 1 10 20 10 15 10 15 20 100 5
Structure and syllabus of S.Y. B.Tech Computer Engineering. Pattern B-18, A.Y. 2018-19 Page 5 of 220
Vishwakarma Institute of Technology Issue 01 : Rev No. 1 : Dt. 01/07/18
Total 15 10 4 28
Structure and syllabus of S.Y. B.Tech Computer Engineering. Pattern B-18, A.Y. 2018-19 Page 6 of 220
Vishwakarma Institute of Technology Issue 01 : Rev No. 1 : Dt. 01/07/18
Structure and syllabus of B.Tech Computer Engineering. A.Y. 2021-22 Page 7 of 220
Vishwakarma Institute of Technology Issue 01 : Rev No. 1 : Dt. 01/07/18
2 0 0 10 30 30 30 100 2
CS4201 Cloud Computing
2 0 0 10 30 30 30 100 2
CS4221 Information Retrieval
Deep Learning 2 0 0 10 30 30 30 100 2
ET4232
0 0 0 30 70 100 10
s4 CS 4225 Major Project
Total 6 0 0 16
Structure and syllabus of B.Tech Computer Engineering. A.Y. 2021-22 Page 8 of 220
Vishwakarma Institute of Technology Issue 01 : Rev No. 1 : Dt. 01/07/18
Structure and syllabus of B.Tech Computer Engineering. A.Y. 2021-22 Page 9 of 220
Vishwakarma Institute of Technology, Issue 01 : Rev No. 1 : Dt. 01/07/18 FF-654
Pattern “B21”
S. Y. B. Tech. Computer Engineering AY 2021-22
FF No. : 654
CS2202::Data Structures
Course Prerequisites: Basic programming Skills (C/C++).
Course Objectives:
1. To introduce the basic concepts of data structures and algorithms.
2. To emphasize concepts about searching and sorting techniques.
3. To construct and implement various data structures and abstract data types including lists, stacks,
queues, trees, and graphs.
4. To make understand about writing algorithms and step by step approach in solving problems with the
help of fundamental data structures.
5. To associate data structures in developing and implementing efficient algorithms.
SECTION-I
Linked Lists: Dynamic memory allocation, Singly Linked Lists, Doubly linked Lists,
Circular linked lists and Generalized linked lists, Applications of Linked list, introduction to
Stack: Stack representation and Implementation using arrays and Linked lists. Applications of
stack in Recursion, Expression conversions and evaluations.
Queues: Representation and implementation using array and Linked lists, Types of queue.
Applications of Queues: Job Scheduling, Josephus problem etc.
SECTION-II
Trees:- Basic terminology, representation using array and linked lists. Tree Traversals:
Recursive and Non recursive, Operations on binary tree. Binary Search trees (BST), Threaded
Binary Tree.
Graphs: Terminology and representation using Adjacency Matrix and Adjacency Lists,
Graph Traversals and Application: BFS and DFS, Connected graph, Bipartite Graph,
Detecting Cycle in graph. Minimum Spanning tree: Prims and Kruskal’s Algorithm, Shortest
Path Algorithms, Union Find.
Hashing: Hashing techniques, Hash table, Hash functions. Collision handling and Collision
resolution techniques.
1) Sorting Techniques: Insertion, Merge sort, Bubble, Shell Sort, Radix Sort.
3) Expression conversion like infix to prefix and postfix and vice versa.
6) Assignment based on various operations on Binary Tree (Mirror image, Height, Leaf
node display, Level wise display etc.)
List of Projects:
5. Bloom Filters.
3. Analysis of Merge Sort, Quick Sort and Bubble Sort for Best, Average and Worst Case.
4. Solving N-queen and Josephus Problem using Backtracking , Stack and Queue respectively.
2. Graphs vs Tree Data Structures: Application based comparison? Which is best? Why?
How?
9. Graphs vs Tree Data Structures: Application based comparison? Which is best? Why?
How?
Design:
1. Design Single Source multiple destination Shortest Path Algorithm For Driving
Application.
Case Study:
1. Consider a Suitable Example for Hashing Application. Study its Merits, Demerits and
Design.
2. Consider different real life examples where different sorting, Searching techniques have
been used. Why used? How? Comparative study.
3. Why there is a need of different tree traversal algorithms? Consider different real life
examples where they are used. Why? How?
5. Compare different graph traversal algorithm by considering different real life examples
where they have used.
Blog
4. How Hashing is useful in recent technologies? Consider any application related to it.
Surveys
1. How application of Graph Search Algorithms ( DFS and BFS) is there in recent
technologies? Consider some real life technologies.
2. How Advanced Trees Data structure plays important role in Database management?
MSE, ESE, GD, Seminar, HA, CVV, Lab Assignment, Course Project.
Text Books:
3. Narasimha karumanchi, “Data Structures and Algorithm Made Easy”, Fifth Edition, CareerMonk
publication.
Reference Books:
www.nptelvideos.in, www.geeksforgeeks.org
Course Outcomes:
1)To interpret and diagnose the properties of data structures with their memory representations
and time complexity analysis.(1)
2)To use linear data structures like stacks, queues with their applications.(2)
3)To implement operations like searching, insertion, deletion, traversing mechanism etc. on
various data structures with the help of dynamic storage representation.(3)
4)To demonstrate the use of binary tree traversals and to perform various operations on Non-
linear data structures.(5)
5) To analyze the Graph data structure and to solve the applications of Graph data
structures.(4)
6)To design the appropriate data structure by applying various hashing Techniques.(3)
CO PO Map
2 3 3 2 1 3
CO attainment levels
Following courses can be learned after successful completion of this course: Advanced Data
Structures, Design and Analysis of Algorithms, Operating Systems, Compiler Design,
Systems Programming, Data Science and similar courses.
Job Mapping: Data Structures and Algorithm is must necessary part of any programming
job. Without Data structures it is not possible to be good in Competitive coding. All Industries always looks
for a strong knowledge in Data structures. Without learning this course one can’t imagine a job in
computer/IT related industries and research.
FF No. : 654
Syllabus Template
CS2225::Theory of Computation
Course Prerequisites: Discrete Mathematics, Computer Programming.
Course Objectives:
1. To introduce basic concepts such as alphabet, strings, Languages, Decision problems, etc to work with
the abstract formal setup
2. To construct deterministic/nondeterministic automata for regular languages to prove non regularity of
languages through application of Pumping Lemma and Myhill-Nerode theorem.
3. To understand the role of non-determinism in Automata theory
4. To design Context free grammars, Push down automata for Context Free Languages
5. To comprehend meaning of undecidability in the context of Turing Machine Model
SECTION-1
Finite Automata:
Introduction to Automata, Computability and Complexity theory, Automaton as a model of
computation, Central Concepts of Automata Theory: Alphabets, Strings, Languages. Decision
Problems Vs Languages. Finite Automata, Structural Representations, Deterministic Finite
Automata (DFA)-Formal Definition, Simplified notation: State transition graph, transition
table, Language of DFA, construction of DFAs for Languages and proving correctness,
Product construction, Nondeterministic finite Automata (NFA), NFA with epsilon transition,
Language of NFA, Conversion of NFA with epsilon transitions to DFA, Automata with
output. Applications and Limitation of Finite Automata.
SECTION-1I
Turing Machines:
Basic model, definition, and representation, Instantaneous Description, Language acceptance
by TM. Robustness of Turing Machine model and equivalence with various variants: Two-
way/One-way infinite tape TM, multi-tape TM, non-deterministic TM, Universal Turing
Machines. TM as enumerator. Recursive and Recursively Enumerable languages and their
closure properties.
Introduction to Undecidability:
Church-Turing Thesis and intuitive notion of Algorithm. Introduction to countable and
uncountable sets (countability of set of natural numbers, integers, rational numbers.
Uncountability of set of real numbers, points in plane, set of all binary strings), Encoding for
Turing machines and countability of set of all Turing machines. Existence of Turing
unrecognizable languages via Cantor's diagonalization. Undecidability of Halting problem.
Examples of undecidable problems: Post Correspondence Problem, Hilbert's 10th Problem,
Tiling problem (without proof). Example of Turing unrecognizable language. Decision
properties of R, RE languages and Rice’s theorem.
Recurrence relations, modeling using recurrence relations (some examples Fibonacci numbers,
Catlan numbers, Derangements, Tower of Hanoi, partitions), generating functions and their
application in counting.
Simple combinatorial problem solving based on graphs, bipartite graphs (graph with only odd
cycles, 2-colorable graphs), Planar graphs, Euler’s theorem for planar graph, Graph colorings,
matching in bipartite graphs
3. Buchi Automata
4. Non-regular languages
5. Contability
Surveys
1. Pattern Matching algorithms
2. Parsers
3. Evolution of models of computations
4. Role of nondeterminism in theory of computation
5. Closure and decision properties of Context free languages
MSE: 10% + ESE: 10% + Seminar: 15% Group Discussion: 15% + Home Assignments: 10%
+ Discrete-Maths evaluation 20% + CVV: 20%
Course Outcomes:
The student will be able to –
1. Infer the applicability of various automata theoretic models for recognizing
formal languages.
2. Discriminate the expressive powers of various automata theoretic and formal
language theoretic computational models.
3. Illustrate significance of non determinism pertaining to expressive powers of
various automata theoretic models.
4. Comprehend general purpose powers and computability issues related to state
machines and grammars.
5. Explain the relevance of Church-Turing thesis, and the computational equivalence
of Turing machine model with the general purpose computers.
6. Grasp the theoretical limit of computation (independent of software or hardware
used) via the concept of undecidability.
CO PO Map
CO attainment levels
CO number 1 2 3 4 5 6
Attainment level 2 3 3 4 5 5
Job Mapping:
Wherever one wants to formally talk about underlying model, the restrictions imposed by the
model, what is the power and limitations of the model, the principles learnt in this course are
useful. Due to abstract nature of the course, the principles learnt have wide applicability, let it
FF No. :654
Syllabus Template
CS2226:: Software Engineering
Course Prerequisites: Data Structures
Course Objectives:
1. To summarize capabilities and impact of Software Development Process Models and justify process
maturity through application of Software Engineering principles and practices
2. To discriminate competing and feasible system requirements indicating correct real world problem
scope and prepare stepwise system conceptual model using stakeholder analysis and requirement
validation.
3. To formulate system specifications by analyzing User-level tasks and compose software artifacts using
agile principles, practices and Scrum framework
4.To compose system analysis and design specifications indicating logical, physical, deployment, and
concurrency viewpoints using object-oriented analysis and design principles and Model Driven
Engineering practices using UML-supported modeling tools.
5. To comprehend the nature of design patterns by understanding a small number of examples from
different pattern categories and apply these patterns in creating a correct design using design heuristics
6.To propose multi-faceted defendable solutions demonstrating team-skills accommodating design
patterns reducing the potential cost and performance impedance in order to realize system artifacts with
the help of Model Driven Development practices using, scheduling, estimation and risk management
activities.
Credits:.5....... Teaching Scheme Theory:…3 Hours/Week
Tut: 1 Hours/Week
Lab:...2.Hours/Week
Course Relevance: Given that software engineering is built upon the foundations of both
computer science and engineering, a software engineering curriculum can be approached from
either a computer science-first or software engineering-first perspective; there clearly is merit in
both approaches. Software engineering spans the entire software lifecycle - it involves creating
high-quality, reliable programs in a systematic, controlled, and efficient manner using formal
methods for specification, evaluation, analysis and design, implementation, testing and
maintenance. any software products are among the most complex of man-made systems,
requiring software development techniques and processes that successfully scale to large
applications which satisfy timing, size, and security requirements all within acceptable
timeframes and budgets. For these reasons, software engineering requires both the analytical and
descriptive tools developed in computer science and the rigor that the engineering disciplines
bring to the reliability and trustworthiness of the systems that software developers design and
implement while working cohesively in a team environment.
SECTION-1
The Scrum: Scrum Origins: What Is Scrum? Scrum Origins, Why Scrum? Scrum Framework,
Agile Principles, Overview, Variability and Uncertainty, Sprints., Requirements and User
Stories, Product Backlog, Estimation and Velocity, Technical Debt, Roles: Product Owner,
Scrum Master, Development Team, Scrum Team Structures, Managers, Planning: Scrum
Planning Principles, Portfolio Planning, Envisioning (Product Planning), Release Planning
(Longer-Term Planning), Sprinting: Sprint Planning, Sprint Execution, Sprint Review, Sprint
Retrospective, Scrum and Service Industry
SECTION-1I
System Behavior Specification: Static Behavior: Use Cases, Use Case Diagram Components,
Use Case Diagram, Actor Generalization, Include and Extend, Template for Use Case
Narrative, Building Domain Model, and capturing system behavior in use cases, Use cases and
User Stories, Dynamic Behavior: Sequence diagrams, object lifelines and message types,
Modeling collections multiobjects, Refining sequence diagrams, Collaboration diagrams, States,
events and actions, Nested machines and concurrency, Modifying the object model to facilitate
states, Modeling methods with activity diagrams, Activity Diagrams: Decisions and Merges,
Synchronization, Iteration, Partitions, Parameters and Pins, Expansion Regions, Swimlanes,
concurrency and synchronization, Communication Diagram, Interaction Overview Diagrams,
Timing Diagrams
Architecture styles: data-flow, object oriented, layered, data-centered, call and return,
Repository, Pipe-Filter, Peer-Peer, Publish-Subscribe, Client-Server, Two-Tier, Three-Tier, N-
Tier, Heterogeneity in Architecture, Categorizing classes: entity, boundary and control ,
Modeling associations and collections, Preserving referential integrity, Achieving reusability,
Reuse through delegation, Identifying and using service packages, Improving reuse with design
Packages and interfaces: Distinguishing between classes/interfaces, Exposing class and package
interfaces.
7. To depict the state transition with the life history of objects of a given class model. The
model should depict:
a. Possible ways the object can respond to events from other objects.
b. Determine of start, end, and transition states.
8. To depict the dynamic behavior using detailed Activity diagram. Activity is a
parameterized behavior represented as coordinated flow of actions. The flow of
execution is modeled as activity nodes connected by activity edges.
a. A node can be the execution of a subordinate behavior, such as an arithmetic
computation, a call to an operation, or manipulation of object contents.
b. Activities may form invocation hierarchies invoking other activities, ultimately
resolving to individual actions.
9. To develop logical static structure of target system with Software Class diagram. To
prepare Class Collaboration-Responsibility (CRC) cards for the Conceptual classes
traced from System analysis phase. The design model should depict
a. Relationship between classes: inheritance, Assertion, Aggregation, Instantiation
b. Identification of objects and their purpose.
c. Roles / responsibilities entities that determine system behavior.
10. To enhance Software Class diagram to Architecture diagram with appropriate design
patterns. The patterns selected shall be justifiable and applied to individual and distinct
hierarchies. Suitable Architectural Styles shall be selected and the structural elements
shall be well-documented.
To represent physical module that provides occurrence of classes or other logical elements
identified during analysis and design of system using Component diagram. The model should
depict allocation of classes to modules. To narrate precise Program Design Language constructs
separating computation from interface. To represent deployment view of the system through
Architecture Diagram.
List of Projects:
1. Automated Parking lot identifier
2. Health Care Software's
3. Financial Domain
4. Appraisal Systems
Design:
1. Software visualization
2. Specification and modeling languages
3. Tools and environments
4. Traceability
5. Ubiquitous and pervasive software systems
6. Validation and verification
Case Study:
1. Software economics and metrics
2. Software engineering for machine learning
3. Software evolution and maintenance
4. Software modeling and design
5. Software process
6. Software product lines
Blog
1. Mining software engineering repositories
2. Mobile applications
3. Model-driven engineering
4. Parallel, distributed, and concurrent systems
5. Performance
6. Program analysis
7. Program comprehension
8. Program repair
9. Program synthesis
10. Programming languages
11. Recommendation systems
12. Refactoring
Surveys
1. Requirements engineering
2. Reverse engineering
3. Safety-critical systems
4. Scientific computing
5. Search-based software engineering
6. Security, privacy and trust
7. Software architecture
8. Software reuse
9. Software services
10. Software testing
Suggest an Assessment scheme that is best suited for the course. Ensure 360 degree
assessment and check if it covers all aspects of Blooms Taxonomy.
MSE+ESE+HA+LAB+CP+CVV+SEMINAR+GD
1. Ian Sommerville, ‘Software Engineering’, Addison-Wesley, 9th Edition, 2010, ISBN-13: 978-0137035151.
2. Kenneth S. Rubin, Essential SCRUM: A Practical Guide To The Most Popular Agile Process, Addison-Wesley,
ISBN-13: 978-0-13-704329-3, 2012
3. Tom Pender, “UML Bible”, John Wiley & sons, ISBN – 0764526049
1. SorenLauesen, Software requirements: Styles and techniques, Addison Wesley, ISBN 0201745704, 2002
2. Dean Leffingwell, Agile Software Requirements, Addison-Wesley, ISBN-13: 978-0-321-63584-6, 2011
3. Charles G. Cobb, The Project Manager’s Guide To Mastering Agile: Principles and Practices for an Adaptive
Approach, Wiley Publications, ISBN: 978-1-118-99104-6 (paperback), ISBN 978-1-118-99177-0 (epdf), 2015
4. Grady Booch, James Rambaugh, Ivar Jacobson, “Unified Modeling Language Users Guide”, 2nd Edition,
Addison- Wesley, ISBN – 0321267974
5. Erich Gamma, Richard Helm, Ralph Johnson, “Design Patterns: Elements of Reusable Object-Oriented
Software”, Addison-Wesley Professional, ISBN-10: 0201633612 ISBN-13: 978-0201633610
6. Paul Clements, Felix Bachmann, Len Bass, David Garlan, Documenting Software Architectures: Views and
Beyond Addison-Wesley Professional 2003, ISBN-10:0201703726, ISBN-13: 9780201703726
www.nptelvideos.in
www.coursera.com
www.udemy.com
Course Outcomes:
CO PO Map
CO attainment levels
Job Mapping:
FF No. : 654
CS2227 ::Database Management Systems
Course Prerequisites: Data structures, Discrete Mathematics
Course Objectives:
1. To introduce the fundamentals of different data modeling techniques.
2. To design and development of relational database management systems.
3. To Study the theory behind database systems, the issues that affect their functionality and
performance
4. To design of query languages and the use of semantics for query optimization.
5. To understand the latest trends of data management systems.
SECTION-I
SECTION-II
Storage and Querying: Storage and File structures, Indexed Files, Single Level and Multi
Level Indexes; Query Processing, Query Optimization
Transaction Management: Basic concept of a Transaction, ACID Properties, State diagram,
Concept of Schedule, Serializability – Conflict and View, Concurrency Control Protocols,
Recovery techniques
Parallel and Distributed Databases: Architecture, I/O Parallelism, Interquery, Intraquery,
Intraoperation and Interoperation Parallelism, Types of Distributed Database Systems,
Distributed Data Storage, Distributed Query Processing
NOSQL Databases and Big Data Storage Systems: Introduction to NOSQL Databases,
Types of NOSQL Databases, BASE properties, CAP theorem, Big Data, HADOOP: HDFS,
MapReduce.
Data Warehousing: Architecture and Components of Data Warehouse, Warehouse Schemas,
OLAP
10) Implement Map Reduce operation with suitable example using MongoDB.
List of Projects:
Designing and Implementing a Small-scale Relational DBMS
Phase 1: SQL interpreter
Phase 2: Persistent data management
Phase 3: Relational Operations
Case Study:
1. PostgreSQL
2. Oracle
3. IBM DB2 Universal Database
4. Microsoft SQL Server
5. SQLite database
Blog
1.OLAP tools from Microsoft Corp. and SAP
2.Views in database
3. Dynamic SQL and Embedded SQL
4. Active databases and Triggers
Surveys
1. Keyword queries used in Web search are quite different from database queries. List key
differences between the two, in terms of the way the queries are specified, and in terms of
what is the result of a query.
2. List responsibilities of a database-management system. For each responsibility,explain the
problems that would arise if the responsibility were not discharged
3. List reasons why database systems support data manipulation using a declarative query
language such as SQL, instead of just providing a a library of C or C++ functions to carry out
data manipulation
4. Consider a bank that has a collection of sites, each running a database system. Suppose the
only way the databases interact is by electronic transfer of money between themselves, using
persistent messaging.Would such a system qualify as a distributed database? Why?
5. Data warehousing products coupled with database systems
Suggest an assessment Scheme:
MSE:10 ESE:10 HA:10 CP:10 Lab:10 Seminar:15 GD: 15 CVV:20
Text Books:
Reference Books:
FF No. : 654
Syllabus Template
CS2207::Software Development Project -I
Course Prerequisites:
Course Objectives:
1. To develop problem solving ability using programming skills by exploring and proposing solutions to
realistic/social problems.
2. To Evaluate alternative approaches, and justify the use of selected tools and methods,
3. To emphasize learning activities those are long-term, inter-disciplinary and student-centric.
4. To engage students in rich and authentic learning experiences.
5. To provide every student the opportunity to get involved either individually or as a group so as to
develop team skills and learn professionalism.
6. To develop an ecosystem to promote entrepreneurship and research culture among the students
SECTION-1
· Teacher is not the source of solutions; rather he will act as the facilitator and mentor.
· To utilize the principles of problems solving, critical thinking and metacognitive skills of
the students.
· Commitment to devote the time to solve student’s technical problems and interested in
helping students to empower them better.
Selection of Project/Problem:
· The problem-based project oriented model for learning is recommended. The model
begins with the identifying of a problem, often growing out of a question or “wondering”.
This formulated problem then stands as the starting point for learning. Students design and
analyze the problem/project within an articulated disciplinary subject frame/domain.
· There are no commonly shared criteria for what constitutes an acceptable project.
Projects vary greatly in the depth of the questions explored, the clarity of the learning
goals, the content, and structure of the activity.
· Activities may include- Solving real life problems, investigation, /study and Writing
reports of in depth study, field work.
· Students must have the ability to initiate the task/idea .They should not be mere imitators.
· Students must quickly learn how to manage their own learning, Instead of passively
receiving instruction.
· Students in PBL are actively constructing their knowledge and understanding of the
situation
· Students in PBL are expected to develop critical thinking abilities by constantly relating:
What they read to do? What they want to do with that information?
· They need to analyze information presented within the context of finding answers.
· Modeling is required so that the students can observe and build a conceptual model of the
required processes.
· Use the following mechanism to maintain the track of moving towards the solution.
· How effective is …….? How strong is the evidence for ………? How clear is ……?
· What are the justifications for thinking? Why is the method chosen?
· Collaborative learning
· Interpersonal Skills
· Resources Evaluation
· Metacognitive Skills
. Reflection Skills
Sample Software Project Statement based on Java and Mobile Application Development
1) Design and deploy an android app for real time criminal detection on the basis of database
provided by the police department.
2) Design and deploy an android app for real time health alarm generation like Aarogya Setu.
3) Design and deploy a system for real time home kitchen accidents and appliances control.
...not limited to.....Faculty and students are free to include other area which meets the
society requirements at large.
Suggest an Assessment scheme that is best suited for the course. Ensure 360 degree
assessment and check if it covers all aspects of Bloom's Taxonomy.
Higher levels of the Booms Taxonomy - analyze, apply, evaluate and create.
Course Outcomes:
CO PO Map
3 3 2 2 1 3
CO attainment levels
Mention other courses that can be taken after completion of this course
Job Mapping:
What are the Job opportunities that one can get after learning this course
FF No. : 654
Syllabus Template
CS2209::Engineering Design and Innovations-III
Computer Engineering Syllabus- AY 2021-22
Page 45
Vishwakarma Institute of Technology, Issue 01 : Rev No. 1 : Dt. 01/07/18 FF-654
Course Objectives:
1. To develop critical thinking and problem solving ability by exploring and proposing solutions to
realistic/social problems.
2. To Evaluate alternative approaches, and justify the use of selected tools and methods,
3. To emphasize learning activities those are long-term, inter-disciplinary and student-centric.
4. To engage students in rich and authentic learning experiences.
5. To provide every student the opportunity to get involved either individually or as a group so as to
develop team skills and learn professionalism.
6. To develop an ecosystem to promote entrepreneurship and research culture among the students
SECTION-1
Preamble - The content and process mentioned below is the guideline document for the
faculties and students to start with. It is not to limit the flexibility of faculty and students;
rather they are free to explore their creativity beyond the guideline mentioned herewith. For all
courses of ED, laboratory course contents of “Engineering Design” are designed as a ladder to
extend connectivity of software technologies to solve real word problem using
interdisciplinary approach. The ladder in the form of gradual steps can be seen as below:
Industry Communication Standards, Single Board Computers and IoT, Computational Biology
(Biomedical and Bioinformatics), Robotics and Drone, Industry 4.0 (Artificial Intelligence,
Human Computer Interfacing, 5G and IoT, Cloud Computing, Big Data and Cyber Security
etc).
Group Structure:
· There should be team/group of 4-5 students.
· A supervisor/mentor teacher assigned to individual groups.
Selection of Project/Problem:
· Students must focus to initiate the task/idea .The idea inception and consideration shall
be from following areas as a real world problem:
Health Care, Agriculture, Defense, Education, Smart City, Smart Energy, Swaccha Bharat
Abhiyan, Environment, Women Safety.
This is the sample list to start with. Faculty and students are free to include other area
which meets the society requirements at large.
The model begins with the identifying of a problem, often growing out of a question or
“wondering”. This formulated problem then stands as the starting point for learning.
Students design and analyze the problem/project within an articulated disciplinary subject
frame/domain.
social and/or technical domain. The problem should stand as one specific example or
manifestation of more general learning outcomes related to knowledge and/or modes of
inquiry.
· Teacher is not the source of solutions rather he will they act as the facilitator and mentor.
· To utilize the principles of problems solving, critical thinking and metacognitive skills of
the students.
· Commitment to devote the time to solve student’s technical problems and interested in
helping students to empower them better.
· Students must have ability to initiate the task/idea .they should not be mere imitators.
· Students must quickly learn how to manage their own learning, Instead of passively
receiving instruction.
· Students in PCL are actively constructing their knowledge and understanding of the
situation in groups.
· They have to develop interpersonal and group process skills, such as effective listening or
coping creatively with conflicts.
· Students in PCL are expected to develop critical thinking abilities by constantly relating:
What they read to do? What they want to do with that information?
· They need to analyze information presented within the context of finding answers.
· Modeling is required so that the students can observe and build a conceptual model of the
required processes.
· Use following mechanism to maintain the track of moving towards the solution.
· How effective is …….? How strong is the evidence for ………? How clear is ……?
· What are the justifications for thinking? Why is the method chosen?
· Collaborative learning
· Interpersonal Skills
· Resources Evaluation
· Metacognitive Skills
. Reflection Skills
...not limited to.....Faculty and students are free to include other areas which meet the
society requirements at large.
Suggest an Assessment scheme that is best suited for the course. Ensure 360 degree
assessment and check if it covers all aspects of Bloom's Taxonomy.
To focus on the higher levels of the Booms Taxonomy analyze, apply, evaluate and create.
1. A new model of problem based learning. By Terry Barrett. All Ireland Society for higher education
(AISHE). ISBN:978-0-9935254-6-9; 2017
2. Problem Based Learning. By Mahnazmoallem, woei hung and Nada Dabbagh, Wiley Publishers. 2019.
1. Stem Project based learning and integrated science, Technology, Engineering and mathematics
approach. By Robert Robart Capraro, Mary Margaret Capraro
1. De Graaff E, Kolmos A., red.: Management of change: Implementation of problem-based and project-
based learning in engineering. Rotterdam: Sense Publishers. 2007.
https://worldwide.espacenet.com/
Course Outcomes:
CO1: Identify the real life problem from societal need point of view
CO2: Choose and compare alternative approaches to select most feasible one
CO3: Analyze and synthesize the identified problem from technological perspective
CO6: Inculcate long life learning attitude towards the societal problems
CO PO Map
2 3 3 2 1 3
CO attainment levels
Mention other courses that can be taken after completion of this course
Job Mapping:
What are the Job opportunities that one can get after learning this course
Pattern “C21”
T. Y. B. Tech. Computer
Engineering AY 2021-22
Module V courses
FF No. : 654
Syllabus Template
CS3205::Design and Analysis of Algorithms
Course Prerequisites: Basic courses on programming, data structures, discrete structures,
theory of computing.
Course Objectives:
1. Students will gain understanding of asymptotic notations and will be able to apply
suitable mathematical techniques to find asymptotic time and space complexities of
algorithms.
2. Students will develop the ability to formulate computational problems in the abstract
and mathematically precise manner.
3. Student will gain understanding of different algorithm design paradigms such as
divide and conquer, dynamic programming, greedy, backtracking and will apply
suitable paradigm for designing algorithms for computational problems
4. Students will develop understanding of notions of NP-hardness and NP-completeness
and their relationship with the intractability of decision problems.
1. Students will design randomized, approximation algorithms for some computational
problems.
This course is also relevant for students who want to pursue research career in theory of
computing, computational complexity theory, advanced algorithmic research.
SECTION-1
Asymptotic notations (Big Oh, small oh, Big Omega, Theta notations). Best case, average
case, and worst-case time and space complexity of algorithms. Overview of searching, sorting
algorithms. Adversary lower bounds (for the comparison-based sorting algorithms, for finding
second minima). Using Recurrence relations and Mathematical Induction to get asymptotic
bounds on time complexity. Master’s theorem and applications. Proving correctness of
algorithms.
Divide and Conquer: General strategy, Binary search and applications, Analyzing Quick sort,
Merge sort, Counting Inversions, Finding a majority element, Order statistics (randomized and
deterministic algorithms), Josephus problem using recurrence, Efficient algorithms for Integer
arithmetic (Euclid's algorithm, Karatsuba's algorithm for integer multiplication, fast
exponentiation).
SECTION-1I
Greedy: General strategy, Analysis and correctness proof of minimum spanning tree and
shortest path algorithms, fractional knapsack problem, Huffman coding, conflict free
scheduling.
Backtracking: General strategy, n-queen problem, backtracking strategy for some NP-
complete problems (e.g. graph coloring, subset sum problem, SUDOKU)
Complexity classes P, NP, coNP, and their interrelation, Notion of polynomial time many one
reductions reduction, Notion of NP-hardness and NP-completeness, Cook-Levin theorem and
implication to P versus NP question, NP-hardness of halting problem. NP-Complete problems
(some selected examples from - Satisfiability problem, Circuit-SAT, 3-CNF SAT, vertex
cover problem, independent set problem, clique problem, Hamiltonian-circuit problem, subset
sum problem, Integer Linear Programming.), reducing NP problems to Integer Linear
Programming.
3) Assignment based on Divide and Conquer strategy (e.g. majority element search,
finding kth rank element in an array)
4) Assignment based on Divide and Conquer strategy (e.g. efficient algorithm for
Josephus problem using recurrence relations, fast modular exponentiation)
6) Assignment based on Dynamic Programming strategy (e,g, All pair shortest path,
Traveling Sales Person problem)
List of Projects:
2. Pac-Man game
4. Solution of Maze (comparing the backtracking based solution and Dijkstra’s algorithm)
9. AI for different games such as minesweeper, shooting games, Hex, connect-4, sokoban,
etc
2. Greedy strategy
3. NP-hardness
4. Backtracking strategy
6. Computational Complexity
8. Complexity classes
9. Space complexity
1. Greedy Algorithms
4. NP-completeness
5. P Vs NP question
8. Backtracking strategy
Design:
7. Problems on NP completeness
Case Study:
7. Sorting techniques
Blog
1. Approximation Algorithms
2. Randomized Algorithms
6. P Vs NP Problem
7. Complexity classes
8. Greedy Algorithms
Surveys
3. NP-complete problems
4. Compression Techniques
3. SAT solvers
Suggest an Assessment scheme that is best suited for the course. Ensure 360 degree
assessment and check if it covers all aspects of Blooms Taxonomy.
1. Cormen, Leiserson, Rivest and Stein “Introduction to Algorithms” ,PHI 3nd edition, 2009. ISBN 81-203-2141-
2. Jon Kleinberg, Eva Tardos “Algorithm Design”, Pearson, 1st edition, 2005. ISBN 978-81-317-0310-6
1. Motwani, Raghavan “Randomized Algorithms”, Cambridge University Press; 1 edition (August 25,
1995), ISBN-10: 0521474655, ISBN-13: 978-0521474658
Course Outcomes:
CO PO Map:
CO attainment levels:
CO No. 1 2 3 4 5 6
Attainment 1 3 2 3 4 5
level
Job Mapping:
Algorithm design lie at heart of any Computer Science/Engineering application. Once the
student gains expertise in Algorithm design and in general gains ability of Algorithmic
thinking, it facilitates in systematic studying any other domain (in computer science or
otherwise) which demands logical thinking. Algorithm design is an essential component of
any job based on programming. All Industries in computer Engineering always look for a
strong knowledge in Algorithm design and Data structures. If student wants to pursue higher
education/ research in Computer Science, this course is must.
Syllabus Template
CS3203::System Software
Course Prerequisites: Computer Organization, Data Structure
Course Objectives:
1. To describe importance of variuos language processors
2. To understand working of different disk scheduling algorithms
3. To exemplify different file management systems
4. To interrelate DOS and BIOS functionality with current OS
5. To design device drivers for Linux.
SECTION-I
SECTION-II
Systems Programming for Linux as Open Source OS: Essential concepts of linux system
programming, APIs and ABIs, standards, program segments/sections, the elf format, linking
and loading, linux dynamic libraries (shared objects), dynamic linking, API compatibility,
dynamically linked libraries.
Advanced system programming concepts: Operating system interfaces, stack smashing.
Multitasking and paging, address translation, memory protection, comparison with windows.
Encoding, Decoding: Encoding and decoding schemes for the X-86 processor.
DOS: Internals of DOS, DOS loading, DOS memory map, Internal commands, External
commands, command interpreter, POST details, POST sequence, PSP (structure details),
‘.exe’ and ‘.com’ file structures, conversion of .exe to .com file.
BIOS: what and why, BIOS calls: int 10h calls, dos calls: int 21h calls, difference between
DOS and BIOS.
List of Projects:
1.Design and implementation of a Multiprogramming Operating System: Stage II
i. Paging
ii. Error Handling
iii. Interrupt Generation and Servicing
iv. Process Data Struc
2.Design and implementation of a Multiprogramming Operating System: Stage III
i. I/O Channels
ii. Multiprogramming
iii. I/O Spooling
3. Design multi programming operating system phase 1 with arithmetic & logical instruction
4.Design multi programming operating system phase 3 without swapping
5. Design multi programming operating system phase 3 with swapping
3. Silberschatz A., Galvin P., Gagne G ;“Operating System Principles” 7th Edition John
Wiley and Sons.
4. YashavantKanetkar; “Unix Shell Programming”, 2 nd Edition, BPB Publications.
5. Forouzan B. A., Gilberg R. F.; “Unix And Shell Programming”, 1 st Edition, Australia
Thomson Brooks Cole.
6. Achyut S. Godbole ,AtulKahate; “Operating Systems”, 3 rd Edition, McGraw Hill.
7. Robert Love, " Linux System Programming " ;O’Reilly, ISBN 978-0-596-00958-8
8. Mahesh Jadhav; " Easy Linux Device Driver "; HighTechEasy publishing, Second edition.
1. Stalling William; “Operating Systems”, 6thEdition, Pearson Education.
2. Silberschatz A., Galvin P., GagneG.; “Operating System Concepts”, 9th Edition, JohnWiley
and Sons.
3. D M Dhamdhere; "Systems Programming & Operating Systems"; Tata McGraw
HillPublications, ISBN – 0074635794
9. John J Donovan; " Systems Programming " ; Tata Mc-Graw Hill edition , ISBN-13978-0-
07-460482-3
10. Ray Duncan; “Advanced MSDOS programming”; Microsoft press
Course Outcomes:
1) Discriminate among different System software and their functionalities.
2) Understand the language processor.
3) Implement the disk scheduling algorithms
4) Interpret the methods and techniques about instructions Encoding-Decoding
5) Write device drivers for hardware components
6) Design TSR programs for real world applications
CO PO Map
CO1- PO2(2)
CO2-PO3(3)
CO3-PO4(3)
CO4- PO10(2)
CO5-PO12(1)
CO6-PSO3(3)
CO attainment levels
CO1-2
CO2-2
CO3-3
CO4-2
CO5-1
CO6-3
Future Courses Mapping:
Distributed Operating Systems
High Performance Computing
Distributed Computing
Compiler Design
Job Mapping:
System Administrator (Linux)
Quality Engineer
Operating System Analyst
Data Developer
FF No. : 654
Syllabus Template
CS3215::Web Technology
Course Prerequisites: Computer Networks
Course Objectives:
1. To describe most commonly used HTML5 and CSS3 tags and attributes for website development.
2. To associate event handling with HTML5 forms and CSS3 using javascript as a front end technology
for website development.
3. To extend HTML5 and CSS3 and javascript front end technologies with PHP and Mysql as a
serverside and backend technologies for website development.
4. To simplify website development using REST API and Spring boot as server side technologies.
5. To build single page applications using REACT as a reusable UI component technology as client side
technology.
6. To assemble REACT as a front end technology and Node js as a server side technology to develop
enterprise applications
SECTION-1
Front End Tools: Introduction to web technology, internet and www, Web site planning and
design issues. HTML5: structure of html document, HTML elements: headings, paragraphs,
line break, styles, colors, fonts, links, frames, lists, tables, images and forms, CSS, Bootstrap,
XML, JSON. Client Side Technologies: JavaScript: Overview of JavaScript, Data types,
Control Structures, Arrays, Functions and Scopes, HTML5 forms Validation, Objects in JS,
DOM: DOM levels, DOM Objects and their properties and methods, Manipulating DOM.
JQuery: Introduction to JQuery, Loading JQuery, Selecting elements, changing styles,
creating elements, appending elements, removing elements, handling events. Server Side
Technologies: PHP: Introduction to PHP, Features, sample code, PHP script working, PHP
syntax, conditions & Loops, Functions, String manipulation, Arrays & Functions, Form
handling, Cookies & Sessions, File Handling, Exception Handling, E-mail validations,
MySQL with PHP, AJAX
SECTION-1I
Spring Boot: Overview of Spring Boot, Spring Framework, Installing Spring Boot, Build
Tool Maven/Gradle/Ant, Core Features, Spring Security, Web Applications, JPA for database
connectivity, Working with SQL and NoSQL, Messaging, Testing, Deploying Spring Boot
Applications, Monitoring
React: Introduction to React, React component, JSX, Render function, Component API,
Component lifecycle, State, Props, Mixins, Component composition, Pass data from parent to
child, Pass data from child to parent, Component styling, Forms, Events, Refs, Keys, Router,
Flux
Node JS: Introduction to Node JS, Installation of Node JS, Node JS Modules, Node Package
Manager (npm), Creating Web server, File System, Express JS, Serving Static Resources,
Database connectivity
(a)Email Validation
(b)Mob No Validation
5) Examples of PHP
6) Examples of PHP
7) Examples of MySQL
8) Examples of React
9) Examples of Node js
1) Installation and configuration and testing working of XAMPP server for local host.
2) Develop a basic web page using the HTML tags you learned in class.
(Develop a responsive web page for your CV using multiple column layout.)
3) Create an admission Template form for VIT admission Process? Perform the validation for
email and phone no fields
(Develop a responsive web site for your CV having video background for first page and
perform the validation using email or mobile number as username and a password of min
length 11 consisting at least one uppercase letter one digit and one special character.)
4)Create an one IT company Template with video in Background (The Web Page must be
Responsive and the page contains video in Background)
6) Develop a website using toggleable or dynamic tabs or pills with bootstrap and JQuery
7) Assume we have a file named "webtech.txt", write the correct syntax to open and read the
file content.
8) Create three MySQL database tables and write php scripts to read, insert & delete data
through web interface.
(a) You need to write a PHP program to calculate electricity bill using if-else conditions.
(b) Conditions
10) Design and implement a website using REST API and Spring Boot.
11) Design and implement a website using REST API, Spring Boot and MySQL/Oracle
12) Design and implement a website using REACT, Spring Boot and MySQL/Oracle
13) Design and implement a website using REACT, Node Js and MySQL/Oracle
5. Develop an web application that help to farmers to solve their farming problems
7. Angular JS
8. Java Servlets
11. JavaBeans
14. Strut
15. SOAP
5. Sql Vs MangoDB
6. Internet Privacy
7. Ruby
8. Rails
9. Groovy
10. Grails
11. EJB
Design:
Case Study:
4. SOAP
5. Angular versions
Blog
4. Web Services
5. EJB Aplcations
Surveys
Suggest an Assessment scheme that is best suited for the course. Ensure 360 degree
assessment and check if it covers all aspects of Bloom's Taxonomy.
MSE: 10% + ESE: 10% + Seminar: 15% Group Discussion: 15% + Home Assignments: 10%
+ Course Project: 10% + Lab evaluation: 10% + CVV: 20%
4.Learning PHP, MySQL & JavaScript: With jQuery, CSS & HTML5, O’Reilly Media; 5th edition,
2018
6. Adam Bretz& Colin J Ihrig, “Full Stack Javascript Development with MEAN”, SPD, First Edition 2015,
Indian Reprint September 2015
7.GiulioZambon, “ Beginning JSP, JSF and Tomcat”, Apress Publication, Second Edition, 2013
8. Jeremy McPeak& Paul Wilton,” Beginning JavaScript”, Wrox Publication, Fifth Edition, 2015
9. Jeffrey C.Jackson, "Web Technologies: A Computer Science Perspective", Second Edition, Pearson
Education, 2007, ISBN 978-0131856035.
10. Robert W. Sebesta: Programming the World Wide Web, 4th Edition, Pearson education, 2008
1. Marty Hall, Larry Brown,"Core Web Programming", Second Edition, Pearson Education, 2001,
ISBN 978-0130897930.
2. H.M. Deitel, P.J. Deitel and A.B. Goldberg, "Internet & World Wide Web How To Program", Third
Edition, Pearson Education, 2006, ISBN 978-0131752429.
3. Chris Bates: Web Programming Building Internet Applications, 3rd Edition, Wiley India, 2006.
4. Xue Bai et al: The web Warrior Guide to Web Programming, Thomson, 2003.
https://www.w3.org/html/
http://w3schools.org/
http://php.net/
https://jquery.com/
https://developer.mozilla.org/en-US/docs/AJAX
http://www.tutorialspoint.com/css/
Course Outcomes:
1. Create front end web pages using HTML5 and CSS3 tags and attributes
2. Provide validation mechanism and event handling in a website using javascript as a front
end technology
3. Integrate front end with serverside and backend technologies for commercial websites
using PHP and Mysql
4. Write Web API/RESTful API application programming interface to communicate with
Spring boot as a serverside technology.
5. Build single page applications using REACT as a reusable UI component technology as
client side technology and Spring boot and Node Js as server side technologies
6. Design and develop three tier enterprise application using client side, server side and back
end technologies
CO PO Map
CO attainment levels
Attainment Levels: 1, 2, 3, 4, 4, 5
Mention other courses that can be taken after completion of this course
Job Mapping:
What are the Job opportunities that one can get after learning this course
FF No. : 654
CS3217::Database Management Systems
Course Prerequisites: Data structures, Discrete Mathematics
Course Objectives:
1. Learn the fundamentals of different data modeling techniques.
2. Design and development of relational database management systems.
3. Study the theory behind database systems, the issues that affect their functionality and performance
4. Design of query languages and the use of semantics for query optimization.
5. Understand the latest trends of data management systems.
SECTION-I
SECTION-II
Storage and Querying: Storage and File structures, Indexed Files, Single Level and Multi
Level Indexes; Query Processing, Query Optimization
Transaction Management: Basic concept of a Transaction, ACID Properties, State diagram,
Concept of Schedule, Serializability – Conflict and View, Concurrency Control Protocols,
Recovery techniques
Parallel and Distributed Databases: Architecture, I/O Parallelism, Interquery, Intraquery,
Intraoperation and Interoperation Parallelism, Types of Distributed Database Systems,
Distributed Data Storage, Distributed Query Processing
NOSQL Databases and Big Data Storage Systems: Introduction to NOSQL Databases,
Types of NOSQL Databases, BASE properties, CAP theorem, Big Data, HADOOP: HDFS,
MapReduce.
Data Warehousing: Architecture and Components of Data Warehouse, Warehouse Schemas,
OLAP
List of Projects:
Case Study:
1. PostgreSQL
2. Oracle
3. IBM DB2 Universal Database
4. Microsoft SQL Server
5. SQLite database
Blog
1.OLAP tools from Microsoft Corp. and SAP
2.Views in database
3. Dynamic SQL and Embedded SQL
4. Active databases and Triggers
5. SQL injection attack
Surveys
1. Keyword queries used in Web search are quite different from database queries. List key
differences between the two, in terms of the way the queries are specified, and in terms of
what is the result of a query.
2. List responsibilities of a database-management system. For each responsibility,explain the
problems that would arise if the responsibility were not discharged
3. List reasons why database systems support data manipulation using a declarative query
language such as SQL, instead of just providing a a library of C or C++ functions to carry out
data manipulation
4. Consider a bank that has a collection of sites, each running a database system. Suppose the
only way the databases interact is by electronic transfer of money between themselves, using
persistent messaging.Would such a system qualify as a distributed database? Why?
5. Data warehousing products coupled with database systems
Text Books:
Reference Books:
CO PO Map
CO1: PO2 CO2:PO3 CO3:PO5 CO4:PO9 CO5:PO10 CO6:PSO15
CO attainment levels
CO1:1 CO2:4 CO3:2 CO4:4 CO5:3 Co6:5
Future Courses Mapping:
Advanced databases
Big Data Management
Cloud Databases
Database Administrator
Job Mapping:
Database Engineer
SQL developer
PL/SQL developer
FF No. : 654
Syllabus Template
CS3223::Engineering Design and Innovation-V
Course Prerequisites: Problem Based Learning
Course Objectives:
1. To develop critical thinking and problem solving ability by exploring and proposing solutions
to realistic/social problems.
2. To Evaluate alternative approaches, and justify the use of selected tools and methods,
3. To emphasize learning activities those are long-term, inter-disciplinary and student-centric.
4. To engage students in rich and authentic learning experiences.
5. To provide every student the opportunity to get involved either individually or as a group so as
to develop team skills and learn professionalism.
6. To develop an ecosystem to promote entrepreneurship and research culture among the students.
Lab:...Hours/Week
Course Relevance: Project Centric Learning (PCL) is a powerful tool for students to work in
areas of their choice and strengths. Along with course based projects, curriculum can be enriched
with semester long Engineering Design and Development courses, in which students can solve
socially relevant problems using various technologies from relevant disciplines. The various
socially relevant domains can be like Health care, Agriculture, Defense, Education, Smart City,
Smart Energy and Swaccha Bharat Abhiyan. To gain the necessary skills to tackle such projects,
students can select relevant online courses and acquire skills from numerous sources under
guidance of faculty and enrich their knowledge in the project domain, thereby achieving project
centric learning. Modern world sustained and advanced through the successful completion of
projects. In short, if students are prepared for success in life, we need to prepare them for a
project-based world. It is a style of active learning and inquiry-based learning. Project based
learning will also redefine the role of teacher as mentor in the learning process. The PCL model
focuses the student on a big open-ended question, challenge, or problem to research and respond
to and/or solve. It brings students not only to know, understand and remember rather it takes
them to analyze, design and apply categories of Bloom’s Taxonomy.
SECTION-1
Preamble - The content and process mentioned below is the guideline document for the
faculties and students to start with. It is not to limit the flexibility of faculty and students;
rather they are free to explore their creativity beyond the guideline mentioned herewith. For all
courses of ED, laboratory course contents of “Engineering Design” are designed as a ladder to
extend connectivity of software technologies to solve real world problems using an
interdisciplinary approach. The ladder in the form of gradual steps can be seen as below:
Selection of Project/Problem:
· Students must focus to initiate the task/idea .The idea inception and consideration shall
be from following areas as a real world problem:
Health Care, Agriculture, Defense, Education, Smart City, Smart Energy, Swaccha Bharat
Abhiyan, Environment, Women Safety.
This is the sample list to start with. Faculty and students are free to include other area
which meets the society requirements at large.
The model begins with the identifying of a problem, often growing out of a question or
“wondering”. This formulated problem then stands as the starting point for learning.
Students design and analyze the problem/project within an articulated disciplinary subject
frame/domain.
· Teacher is not the source of solutions rather he will act as the facilitator and mentor.
· To utilize the principles of problems solving, critical thinking and metacognitive skills of
the students.
· Commitment to devote the time to solve student’s technical problems and interested in
helping students to empower them better.
· Students must have the ability to initiate the task/idea .They should not be mere imitators.
· Students must quickly learn how to manage their own learning, Instead of passively
receiving instruction.
· Students in PCL are actively constructing their knowledge and understanding of the
situation in groups.
· They have to develop interpersonal and group process skills, such as effective listening or
coping creatively with conflicts.
· Students in PCL are expected to develop critical thinking abilities by constantly relating:
What they read to do? What they want to do with that information?
· They need to analyze information presented within the context of finding answers.
· Modeling is required so that the students can observe and build a conceptual model of the
required processes.
· Use following mechanism to maintain the track of moving towards the solution.
· How effective is …….? How strong is the evidence for ………? How clear is ……?
· What are the justifications for thinking? Why is the method chosen?
· Collaborative learning
· Interpersonal Skills
· Resources Evaluation
· Metacognitive Skills
. Reflection Skills
Lab can be conducted in real and simulation mode. Programming a simulated robot is
analogous to programming a real robot.
1) Design and deployment of autonomous mobile robot in either real mode or simulation
mode.
2) Design and deployment of unmanned aerial vehicles-UAV in either real mode or simulation
using point to point protocol.
3) Design and deployment of unmanned aerial vehicles-UAV in either real mode or simulation
using point to multipoint protocol.
...not limited to.....Faculty and students are free to include other area which meets the
society requirements at large.
Suggest an Assessment scheme that is best suited for the course. Ensure 360 degree
assessment and check if it covers all aspects of Blooms Taxonomy.
Higher levels of the Booms Taxonomy - analyze, apply, evaluate and create.
1. A new model of problem based learning. By Terry Barrett. All Ireland Society for higher education (AISHE).
ISBN:978-0-9935254-6-9; 2017
2. Problem Based Learning. By Mahnazmoallem, woei hung and Nada Dabbagh, Wiley Publishers. 2019.
Stem Project based learning and integrated science, Technology, Engineering and mathematics approach. By
Robert Robart Capraro, Mary Margaret Capraro
1. De Graaff E, Kolmos A., red.: Management of change: Implementation of problem-based and project-based
learning in engineering. Rotterdam: Sense Publishers. 2007.
Course Outcomes:
CO1: Identify the real life problem from societal need point of view
CO2: Choose and compare alternative approaches to select most feasible one
CO3: Analyze and synthesize the identified problem from technological perspective
CO6: Inculcate long life learning attitude towards the societal problems
CO PO Map
CO attainment levels
Mention other courses that can be taken after completion of this course
Job Mapping:
What are the Job opportunities that one can get after learning this course
Module VI Courses
FF No. : 654
Syllabus Template
CS3216::Theory of Computation
Course Prerequisites: Discrete mathematics and Computer Programming
Course Objectives:
1. To introduce basic concepts such as alphabet, strings, Languages, Decision problems, etc to work with
the abstract formal setup
2. To construct deterministic/nondeterministic automata for regular languages to prove non regularity of
languages through application of Pumping Lemma and Myhill-Nerode theorem.
3. To understand the role of non-determinism in Automata theory
4. To design Context free grammars, Push down automata for Context Free Languages
5. To comprehend meaning of undecidability in the context of Turing Machine Model
important for Compiler design. The models discussed during the course have direct applications
to several machine learning models, Natural Language processing, Artificial Intelligence,
Functional Programming.
Once the student gains expertise in thinking abstractly about underlying models of computation
it facilitates in systematic study of any other domain (in computer science or otherwise) which
demands logical thinking and abstraction.
This course is also relevant for students who want to pursue research career in theory of
computing, computational complexity theory, Natural Language Processing, advanced
algorithmic research.
SECTION-1
Finite Automata:
Introduction to Automata, Computability and Complexity theory, Automaton as a model of
computation, Central Concepts of Automata Theory: Alphabets, Strings, Languages. Decision
Problems Vs Languages. Finite Automata, Structural Representations, Deterministic Finite
Automata (DFA)-Formal Definition, Simplified notation: State transition graph, transition
table, Language of DFA, construction of DFAs for Languages and proving correctness,
Product construction, Nondeterministic finite Automata (NFA), NFA with epsilon transition,
Language of NFA, Conversion of NFA with epsilon transitions to DFA, Automata with
output. Applications and Limitation of Finite Automata.
SECTION-1I
Turing Machines:
Basic model, definition, and representation, Instantaneous Description, Language acceptance
by TM. Robustness of Turing Machine model and equivalence with various variants: Two-
way/One-way infinite tape TM, multi-tape TM, non-deterministic TM, Universal Turing
Machines. TM as enumerator. Recursive and Recursively Enumerable languages and their
closure properties.
Introduction to Undecidability:
Church-Turing Thesis and intuitive notion of Algorithm. Introduction to countable and
uncountable sets (countability of set of natural numbers, integers, rational numbers.
Uncountability of set of real numbers, points in plane, set of all binary strings), Encoding for
Turing machines and countability of set of all Turing machines. Existence of Turing
unrecognizable languages via Cantor's diagonalization. Undecidability of Halting problem.
Examples of undecidable problems: Post Correspondence Problem, Hilbert's 10th Problem,
Tiling problem (without proof). Example of Turing unrecognizable language. Decision
properties of R, RE languages and Rice’s theorem.
Recurrence relations, modeling using recurrence relations (some examples Fibonacci numbers,
Catlan numbers, Derangements, Tower of Hanoi, partitions), generating functions and their
application in counting.
Simple combinatorial problem solving based on graphs, bipartite graphs (graph with only odd
cycles, 2-colorable graphs), Planar graphs, Euler’s theorem for planar graph, Graph colorings,
matching in bipartite graphs
MSE: 10% + ESE: 10% + Seminar: 15% Group Discussion: 15% + Home Assignments: 10%
+ Discrete-Maths evaluation 20% + CVV: 20%
Course Outcomes:
The student will be able to –
1. Infer the applicability of various automata theoretic models for recognizing
formal languages.
2. Discriminate the expressive powers of various automata theoretic and formal
language theoretic computational models.
3. Illustrate significance of non determinism pertaining to expressive powers of
various automata theoretic models.
4. Comprehend general purpose powers and computability issues related to state
machines and grammars.
5. Explain the relevance of Church-Turing thesis, and the computational equivalence
of Turing machine model with the general purpose computers.
6. Grasp the theoretical limit of computation (independent of software or hardware
used) via the concept of undecidability.
CO PO Map
CO attainment levels
CO number 1 2 3 4 5 6
Attainment level 2 3 3 4 5 5
Job Mapping:
Wherever one wants to formally talk about underlying model, the restrictions imposed by the
model, what is the power and limitations of the model, the principles learnt in this course are
useful. Due to abstract nature of the course, the principles learnt have wide applicability, let it
be domain of Machine learning, Natural Language processing, Compiler design, Parallel
computation, for each of them having background of Theory of Computation is very useful. If
student wants to pursue higher education/ research in Computer Science, this course is must.
FF No. :654
Syllabus Template
CS3218:: Software Modeling and Design
Course Prerequisites: Data Structures
Course Objectives:
1. To summarize capabilities and impact of Software Development Process Models and justify process
maturity through application of Software Engineering principles and practices
2. To discriminate competing and feasible system requirements indicating correct real world problem
scope and prepare stepwise system conceptual model using stakeholder analysis and requirement
validation.
3. To formulate system specifications by analyzing User-level tasks and compose software artifacts using
agile principles, practices and Scrum framework
4.To compose system analysis and design specifications indicating logical, physical, deployment, and
concurrency viewpoints using object-oriented analysis and design principles and Model Driven
Engineering practices using UML-supported modeling tools.
5. To comprehend the nature of design patterns by understanding a small number of examples from
different pattern categories and apply these patterns in creating a correct design using design heuristics
SECTION-1
The Scrum: Scrum Origins: What Is Scrum? Scrum Origins, Why Scrum? Scrum Framework,
Agile Principles, Overview, Variability and Uncertainty, Sprints., Requirements and User
Stories, Product Backlog, Estimation and Velocity, Technical Debt, Roles: Product Owner,
Scrum Master, Development Team, Scrum Team Structures, Managers, Planning: Scrum
Planning Principles, Portfolio Planning, Envisioning (Product Planning), Release Planning
(Longer-Term Planning), Sprinting: Sprint Planning, Sprint Execution, Sprint Review, Sprint
Retrospective, Scrum and Service Industry
SECTION-1I
System Behavior Specification: Static Behavior: Use Cases, Use Case Diagram Components,
Use Case Diagram, Actor Generalization, Include and Extend, Template for Use Case
Narrative, Building Domain Model, and capturing system behavior in use cases, Use cases and
User Stories, Dynamic Behavior: Sequence diagrams, object lifelines and message types,
Modeling collections multiobjects, Refining sequence diagrams, Collaboration diagrams, States,
events and actions, Nested machines and concurrency, Modifying the object model to facilitate
states, Modeling methods with activity diagrams, Activity Diagrams: Decisions and Merges,
Synchronization, Iteration, Partitions, Parameters and Pins, Expansion Regions, Swimlanes,
concurrency and synchronization, Communication Diagram, Interaction Overview Diagrams,
Timing Diagrams
Software Reuse, Design Heuristics, User Interface Design: Rules, User Interface Analysis and
Steps in Interface Design, Design Evaluation, Source Code Management,
Architecture styles: data-flow, object oriented, layered, data-centered, call and return,
Repository, Pipe-Filter, Peer-Peer, Publish-Subscribe, Client-Server, Two-Tier, Three-Tier, N-
Tier, Heterogeneity in Architecture, Categorizing classes: entity, boundary and control ,
Modeling associations and collections, Preserving referential integrity, Achieving reusability,
Reuse through delegation, Identifying and using service packages, Improving reuse with design
Packages and interfaces: Distinguishing between classes/interfaces, Exposing class and package
interfaces.
17. To depict the state transition with the life history of objects of a given class model. The
model should depict:
a. Possible ways the object can respond to events from other objects.
b. Determine of start, end, and transition states.
18. To depict the dynamic behavior using detailed Activity diagram. Activity is a
parameterized behavior represented as coordinated flow of actions. The flow of
execution is modeled as activity nodes connected by activity edges.
a. A node can be the execution of a subordinate behavior, such as an arithmetic
computation, a call to an operation, or manipulation of object contents.
b. Activities may form invocation hierarchies invoking other activities, ultimately
resolving to individual actions.
19. To develop logical static structure of target system with Software Class diagram. To
prepare Class Collaboration-Responsibility (CRC) cards for the Conceptual classes
traced from System analysis phase. The design model should depict
a. Relationship between classes: inheritance, Assertion, Aggregation, Instantiation
b. Identification of objects and their purpose.
c. Roles / responsibilities entities that determine system behavior.
20. To enhance Software Class diagram to Architecture diagram with appropriate design
patterns. The patterns selected shall be justifiable and applied to individual and distinct
hierarchies. Suitable Architectural Styles shall be selected and the structural elements
shall be well-documented.
To represent physical module that provides occurrence of classes or other logical elements
identified during analysis and design of system using Component diagram. The model should
depict allocation of classes to modules. To narrate precise Program Design Language constructs
separating computation from interface. To represent deployment view of the system through
Architecture Diagram.
List of Projects:
9. Automated Parking lot identifier
10. Health Care Software's
11. Financial Domain
12. Appraisal Systems
Design:
7. Software visualization
8. Specification and modeling languages
9. Tools and environments
10. Traceability
11. Ubiquitous and pervasive software systems
12. Validation and verification
Case Study:
7. Software economics and metrics
8. Software engineering for machine learning
9. Software evolution and maintenance
10. Software modeling and design
11. Software process
12. Software product lines
Blog
13. Mining software engineering repositories
14. Mobile applications
15. Model-driven engineering
16. Parallel, distributed, and concurrent systems
17. Performance
18. Program analysis
19. Program comprehension
20. Program repair
21. Program synthesis
22. Programming languages
23. Recommendation systems
24. Refactoring
Surveys
11. Requirements engineering
12. Reverse engineering
13. Safety-critical systems
14. Scientific computing
15. Search-based software engineering
16. Security, privacy and trust
17. Software architecture
18. Software reuse
19. Software services
20. Software testing
Suggest an Assessment scheme that is best suited for the course. Ensure 360 degree
assessment and check if it covers all aspects of Blooms Taxonomy.
MSE+ESE+HA+LAB+CP+CVV+SEMINAR+GD
4. Ian Sommerville, ‘Software Engineering’, Addison-Wesley, 9th Edition, 2010, ISBN-13: 978-0137035151.
5. Kenneth S. Rubin, Essential SCRUM: A Practical Guide To The Most Popular Agile Process, Addison-Wesley,
ISBN-13: 978-0-13-704329-3, 2012
6. Tom Pender, “UML Bible”, John Wiley & sons, ISBN – 0764526049
7. SorenLauesen, Software requirements: Styles and techniques, Addison Wesley, ISBN 0201745704, 2002
8. Dean Leffingwell, Agile Software Requirements, Addison-Wesley, ISBN-13: 978-0-321-63584-6, 2011
9. Charles G. Cobb, The Project Manager’s Guide To Mastering Agile: Principles and Practices for an Adaptive
Approach, Wiley Publications, ISBN: 978-1-118-99104-6 (paperback), ISBN 978-1-118-99177-0 (epdf), 2015
10. Grady Booch, James Rambaugh, Ivar Jacobson, “Unified Modeling Language Users Guide”, 2nd Edition,
Addison- Wesley, ISBN – 0321267974
11. Erich Gamma, Richard Helm, Ralph Johnson, “Design Patterns: Elements of Reusable Object-Oriented
Software”, Addison-Wesley Professional, ISBN-10: 0201633612 ISBN-13: 978-0201633610
12. Paul Clements, Felix Bachmann, Len Bass, David Garlan, Documenting Software Architectures: Views and
Beyond Addison-Wesley Professional 2003, ISBN-10:0201703726, ISBN-13: 9780201703726
www.nptelvideos.in
www.coursera.com
www.udemy.com
Course Outcomes:
CO PO Map
CO attainment levels
Job Mapping:
FF No. : 654
CS3202 :: ARTIFICIAL INTELLIGENCE
Course Prerequisites: Mathematics, Data Structures
Course Objectives:
1 To introduce the concepts, techniques and building blocks of Artificial Intelligence.
2 To evaluate the searching Techniques and its implementation
3 To analyze planning techniques and its applications in developing solutions to real-
world problems.
4 To apply information gained through knowledge representation and uncertainty to a
given situation
5 To generate an ability to design, analyze and perform experiments on real life
problems using various AI Techniques.
6 To build artificial intelligence models and implement in real life scenario.
SECTION-1
Searching: Depth First Search, Breadth First Search, Generate and test, Hill Climbing, Best First
Search, A* and AO* Algorithm, Constraint satisfaction, Means-Ends Analysis. Game playing:
Minimax Search, Alpha-Beta Cutoffs.
Planning: Blocks world, STRIPS, Implementation using goal stack, Partial Order Planning,
Hierarchical planning, and least commitment strategy. Conditional Planning, Continuous
Planning.
SECTION-1I
Uncertainty: Non Monotonic Reasoning, Logics for Non Monotonic Reasoning, Forward rules
and Backward rules, Justification based Truth Maintenance Systems, Semantic Nets Statistical
Reasoning, Markov Networks.
4) Gaming
5) Planning
6) Blocks world
7) STRIPS
7) Wumpus world
8) Propositional Logic
9) Expert System
6. Wumpus world
7. Propositional Logic
8. Expert System
List of Projects:
3 Identification / detection
6 Arrangement of blocks
2) Intelligent Agents
4) Gaming Techniques
5) Planning Techniques
6) Applications of AI
7) Wumpus world
8) Propositional Logic
9) Expert System
11) AI Robots
Design:
1 AI Accessibility Design
2 Best Artificial Intelligence Design for any one application
3 AI Customer Experience Design
4 AI Data-Informed Design
5 AI Decision Architecture
6 AI application Designing for Children
7 AI Designing for Senior Citizens
8 AI in eCommerce Design
9 AI Enterprise UX Design
10 AI Experience Design
Case Study:
2. How Indian Retail Giant Is Using AI And Robots To Prepare For The 4th Industrial
Revolution
4. The Amazing Ways Tesla Is Using Artificial Intelligence And Big Data
5. The Incredible Ways John Deere Is Using Artificial Intelligence To Transform Farming
Blog
1. AI Trends
2. AI Research
3. AI Chatbot
4. Chatbot Magazine
5. AI Medical / Agriculture
Surveys
1. Adaption of AI in 2020
2. AI in Industry
3. AI in Digital Marketing
4. AI in Gaming
5. AI after Covid-19
HA, PPT,GD,MSE,ESE,LAB,CVV
Suggest an Assessment scheme that is best suited for the course. Ensure 360 degree
assessment and check if it covers all aspects of Blooms Taxonomy.
1.Elaine Rich and Kevin Knight: "Artificial Intelligence." Tata McGraw Hill
2. Stuart Russell & Peter Norvig : "Artificial Intelligence : A Modern Approach", Pearson Education, 2nd Edition.
1. Ivan Bratko : "Prolog Programming For Artificial Intelligence" , 2nd Edition Addison Wesley,1990.
www.eduplus.in
Course Outcomes:
1. Identify problems that are amenable to solution by AI methods, and which AI methods may be
suited to solving a given problem.
5. Use various symbolic knowledge representations to specify domains and reasoning tasks of a
situated software agent.
CO PO Map
CO attainment levels
Job Mapping:
FF No. : 654
CS3207::Compiler Design
Course Prerequisites: Automata Theory (grammar)
Course Objectives:
1. Understand the process of program execution cycle.
2. Understand the translation process from High Level Languages to Machine Level Language.
3. Know the syntax and semantic analysis approaches for efficient code/program verification.
4. Learn the methods of code generation which helps for the optimization.
5. Learn code optimization and runtime code synthesis.
6. Know the process of compiler design for emerging programming languages.
SECTION-1
SECTION-II
2) Add line numbers to lines of text, printing the new text to the standard output using
LEX/FLEX.
3) Implement LEX/FLEX code to select only lines that begin or end with the letter ‘a’ and
delete everything else.
4) Implement LEX/FLEX code to count the number of characters, words and lines in an input
file.
10) Implement an Intermediate code generator (three address code and Quadruples)
List of Projects:
4. Code Optimizer
3. Semantic Analyser
9. Decompilation
1. Compiler Vs Interpreter
5. Universal Compiler
6. Cross compiler
7. Alternate to parsers
9. Online Compilers
Design:
3. Universal Compiler
Case Study:
1. Algol Compiler
4. LLVM compiler
5. Cross compiler
Blog
Surveys
4. Online compilers
Suggest an Assessment scheme that is best suited for the course. Ensure 360-degree
assessment and check if it covers all aspects of Bloom’s Taxonomy.
MSE(15)+ESE(15)+HA(10)+LAB(10)+CP(10)+CVV(20)+SEMINAR(10)+GD(10)
1. Aho, A.V., Lam, M.S., Sethi, R., & Ullman, J.D. (2006). Compilers: Principles, Techniques, and Tools,
Addison Wesley, ISBN 978-81317-2101-8 (2nd Edition).
2. Cooper, K., & Torczon, L. (2011). Engineering a compiler. Morgan Kaufmann, ISBN 155860-698-X.
4. Appel, A. W., & Jens, P. (2002). Modern compiler implementation in Java. In ISBN 0–521–58388–8.
Cambridge University Press.
5. Appel, A. W. (1998). Modern Compiler Implementation in ML, In ISBN 0-521-60764-7. Cambridge University
Press.
1. Muchnick, S. (1997). Advanced compiler design implementation. Morgan Kaufmann, ISBN 8178672413
2. Levine, J. R., Mason, J., Levine, J. R., Mason, T., Brown, D., Levine, J. R., & Levine, P. (1992). Lex & yacc.
"O'Reilly Media, Inc".
https://swayam.gov.in/nd1_noc20_cs13/preview
https://www.udacity.com/course/compilers-theory-and-practice--ud168
https://online.stanford.edu/courses/soe-ycscs1-compilers
Course Outcomes:
1) Design basic components of a compiler including scanner, parser, and code generator.
CO PO Map
CO1-PO2 - 2
CO2-PO3 - 3
CO3-PO4 - 3
CO5-PO11 - 2
CO6-PO12 - 1
CO4-PSO3 – 3
CO attainment levels
Mention other courses that can be taken after completion of this course
Job Mapping:
FF No. : 654
Syllabus Template
CS3223::Engineering Design and Innovation-V
Course Prerequisites: Problem Based Learning
Course Objectives:
1. To develop critical thinking and problem solving ability by exploring and proposing solutions
to realistic/social problems.
2. To Evaluate alternative approaches, and justify the use of selected tools and methods,
3. To emphasize learning activities those are long-term, inter-disciplinary and student-centric.
4. To engage students in rich and authentic learning experiences.
5. To provide every student the opportunity to get involved either individually or as a group so as
to develop team skills and learn professionalism.
6. To develop an ecosystem to promote entrepreneurship and research culture among the students.
focuses the student on a big open-ended question, challenge, or problem to research and respond
to and/or solve. It brings students not only to know, understand and remember rather it takes
them to analyze, design and apply categories of Bloom’s Taxonomy.
SECTION-1
Preamble - The content and process mentioned below is the guideline document for the
faculties and students to start with. It is not to limit the flexibility of faculty and students;
rather they are free to explore their creativity beyond the guideline mentioned herewith. For all
courses of ED, laboratory course contents of “Trends in Engineering Technology” are
designed as a ladder to extend connectivity of software technologies to solve real word
problem using interdisciplinary approach. The ladder in the form of gradual steps can be seen
as below:
Industry Communication Standards, Single Board Computers and IoT, Computational Biology
(Biomedical and Bioinformatics), Robotics and Drone, Industry 4.0 (Artificial Intelligence,
Human Computer Interfacing, 5G and IoT, Cloud Computing, Big Data and Cyber Security
etc).
Group Structure:
· There should be team/group of 4-5 students.
· A supervisor/mentor teacher assigned to individual groups.
Selection of Project/Problem:
· Students must focus to initiate the task/idea .The idea inception and consideration shall
be from following areas as a real world problem:
Health Care, Agriculture, Defense, Education, Smart City, Smart Energy, Swaccha Bharat
Abhiyan, Environment, Women Safety.
This is the sample list to start with. Faculty and students are free to include other area
which meets the society requirements at large.
The model begins with the identifying of a problem, often growing out of a question or
“wondering”. This formulated problem then stands as the starting point for learning.
Students design and analyze the problem/project within an articulated disciplinary subject
frame/domain.
· Teacher is not the source of solutions rather he will they act as the facilitator and mentor.
· To utilize the principles of problems solving, critical thinking and metacognitive skills of
the students.
· Commitment to devote the time to solve student’s technical problems and interested in
helping students to empower them better.
· Students must have ability to initiate the task/idea .they should not be mere imitators.
· Students must quickly learn how to manage their own learning, Instead of passively
receiving instruction.
· Students in PCL are actively constructing their knowledge and understanding of the
situation in groups.
· They have to develop interpersonal and group process skills, such as effective listening or
coping creatively with conflicts.
· Students in PCL are expected to develop critical thinking abilities by constantly relating:
What they read to do? What they want to do with that information?
· They need to analyze information presented within the context of finding answers.
· Modeling is required so that the students can observe and build a conceptual model of the
required processes.
· Use following mechanism to maintain the track of moving towards the solution.
· How effective is …….? How strong is the evidence for ………? How clear is ……?
· What are the justifications for thinking? Why is the method chosen?
· Collaborative learning
· Interpersonal Skills
· Resources Evaluation
· Metacognitive Skills
Reflection Skills
...not limited to.....Faculty and students are free to include other area which meets the
society requirements at large.
Suggest an Assessment scheme that is best suited for the course. Ensure 360 degree
assessment and check if it covers all aspects of Bloom's Taxonomy.
Higher levels of the Booms Taxonomy - analyze, apply, evaluate and create.
1. A new model of problem based learning. By Terry Barrett. All Ireland Society for higher education (AISHE).
ISBN:978-0-9935254-6-9; 2017
2. Problem Based Learning. By Mahnazmoallem, woei hung and Nada Dabbagh, Wiley Publishers. 2019.
Stem Project based learning and integrated science, Technology, Engineering and mathematics approach. By
Robert Robart Capraro, Mary Margaret Capraro
1. De Graaff E, Kolmos A., red.: Management of change: Implementation of problem-based and project-based
learning in engineering. Rotterdam: Sense Publishers. 2007.
Course Outcomes:
CO1: Identify the real life problem from societal need point of view
CO2: Choose and compare alternative approaches to select most feasible one
CO3: Analyze and synthesize the identified problem from technological perspective
CO6: Inculcate long life learning attitude towards the societal problems
CO PO Map
CO attainment levels
Mention other courses that can be taken after completion of this course
Job Mapping:
What are the Job opportunities that one can get after learning this course
CS3219::Machine Learning
Course Prerequisites: Mathematics and Statistics
Course Objectives:
1. To imbibe the concepts, techniques and building blocks of machine learning.
2. To understand mathematics for implementing machine learning algorithms.
3. To learn the supervised and unsupervised learning techniques.
4. To introduce use of computational learning theory
5. To apply feature reduction on real life problems.
6. To build Machine Learning models and implement in real life scenario for different applications.
SECTION-1
Decision Tree Learning: Representation, Basic decision tree learning algorithm, Issues in
decision tree learning
Logistic Regression: Problem of Overfitting, Logistic Regression, Classification, Hypothesis
Representation, Decision Boundary, Cost Function, Simplified Cost Function and Gradient
Descent, Advanced Optimization, Multiclass Classification, Problem of Overfitting,
Regularized Linear Regression, Regularized Logistic Regression.
Instance based learning: Instance based learning, KNN: k-nearest neighbor learning.
Feature Selection, Feature Extraction, Feature reduction, Dimensionality Reduction,
Principal Component Analysis (PCA), Collaborative filtering based recommendation,
SECTION-2
Neural network for supervised and unsupervised learning: Perceptron, Single layer and
multilayer perceptrons, Multilayer network, Cost Function, Backpropagation algorithm,
Backpropagation Intuition, Unrolling Parameters, Gradient Checking, Artificial Neural
Network: Activation Functions, Learning Rules, Mc-Culloch-pitts Neuron model, Heb net,
Introduction to deep neural network
Computational Learning theory: PAC learning model, Sample complexity for finite
hypothesis spaces, Sample complexity for infinite hypothesis spaces, Mistake bound model of
learning, VC Dimension, Ensemble learning, Adaboost algorithm, Analytical learning,
11 Examples on VC Algorithm
Minkowski Distance
Manhattan Distance
Euclidean Distance
Chebychev Distance
Cosine Distance
Mahalanobis Distance
2. Assignment on Linear Regression:
The following table shows the results of a recently conducted study on the correlation of the
number of hours spent driving with the risk of developing acute backache. Find the equation
of the best fit line for this data
Using Naïve Bayes classifier what will be the class when a new species holds following
feature values:
Calculate the optimal hyper plane and margin for small dataset shown in following
diagram. Positively labeled data points are
Use a neural network with two inputs, two hidden neurons, two output neurons. Additionally,
the hidden and output neurons will include a bias
In order to have some numbers to work with, here are the initial weights, the biases, and
training inputs/outputs:
The goal of backpropagation is to optimize the weights so that the neural network can learn
how to correctly map arbitrary inputs to outputs.
List of Course Projects: USE the UCI ML or KDD Repository or any other dataset
Design:
Case Study:
1. How Auto industry Is Preparing For The 4th Industrial Revolution using ML
2. How Indian Retail Giant Is Using ML to Prepare For The 4th Industrial Revolution
3. Rolls-Royce And Google Partner To Create Smarter, Autonomous Ships Based On ML
4. The Amazing Ways Tesla Is Using Machine Learning And Big Data
5. The Incredible Ways John Deere Is Using Machine Learning To Transform Farming
Blog
Surveys
Suggest an Assessment scheme that is best suited for the course. Ensure 360 degree
HA, PPT,GD,MSE,ESE,LAB,CVV
www.nptelvideos.in
www.coursera.com
Course Outcomes:
1. Formulate a given problem for the given application using machine learning basic building
blocks(1)
2. Carryout mathematical analysis of given problem based on learning approach(2)
3. Select appropriate of learning algorithms for sustainable solutions of applications (3)
4. Build a machine learning model for the application (4)
5. Evaluate machine learning modes algorithms(5)
6. Provide scalable machine learning solution(5)
CO PO Map
CO attainment levels
Mention other courses that can be taken after completion of this course
Job Mapping:
What are the Job opportunities that one can get after learning this course
FF No. : 654
Syllabus Template
CS3220::CYBER SECURITY
Course Prerequisites: Computer Networks
Course Objectives:
1. To discover the programming bugs that will be malicious code, they also must be able to explain
various attacks and resolve the bugs to mitigate the treats.
2. To interpret various cryptographic techniques to secure the systems developed.
3. To build and explain various authentication and authorization methods with the access control
4. To articulate the use of various standard security protocols for the layered architecture.
5. To state the urgent need for cyber security in critical computer systems, networks, and World Wide
Web, and explain various threat scenarios
6. To identify cyber threats and appropriate solutions to critical infrastructures
SECTION-1
Cryptography:
Private key cryptography: Mathematical background for cryptography: modulo arithmetic,
GCD (Euclids algorithm), algebraic structures (Groups, Rings, Fields, Polynomial Field). Role
of random numbers & nonce in security, Importance of prime numbers
Data Encryption Standard: Block cipher, Stream cipher, Feistel structure, round function,
block cipher modes of operation, S-DES, Attacks on DES, S-AES, AES.
Public key cryptography: RSA: RSA algorithm, Key generation in RSA, attacks on RSA.
Diffie-Hellman key exchange: Algorithm, Key exchange protocol, Attack. Elliptic Curve
Cryptography (ECC): Elliptic Curve over real numbers, Elliptic Curve over Zp, Elliptic Curve
arithmetic. Diffie-Hellman key exchange using ECC. Chinese remainder theorem.
SECTION-1I
Introduction to Digital Forensics, Data Recovery and OS Forensics, Email Crimes and
Violations,
Cyber Forensics: Cyber Attack, Cyber Reconnaissance, Crimes in Cyber Space-Global Trends
& classification, e-commerce security, Computer forensics, facebook forensic, mobile forensic,
cyber forensic, digital forensic,
IoT Security: Definitions of OT, IoT, IIoT, & ICS), Convergence of OT/IoT and IT domains.
Functional difference between security measures for IT and OT/IoT, Introduction to most widely
used protocols in IoT environment - MQTT and CoAP, KNX, BACnet, BLE, LoRa, ZigBee,
SNMP , Embedded/ Hardware device security, Attack vectors and attack surfaces for IoT
devices, Layered and Dynamic security measures for IoT Industrial Ecosystem, Introduction to
List of Tutorials:
1. Study of Snort
2. Nessus: a Security Vulnerability scanning tool
3. OWASP Zed Attack Proxy (ZAP).
4. Source Code Analysis Tools
5. Metasploit/Ollydbg
6. Testing SSL
7. Testing for Brute Force Password
8. Testing for SQL Injection
List of Projects:
1. Design a System to develop a analyzer which will differentiate between different vulnerability
and packets entered using it. This system will detect the intrusions coming through the
vulnerabilities.
2. Securing Video Conferencing App for online meetings
3. Steganography for Image/Video/Files
4. Secure Image display on online social media.
5. Secure transfer of government subsidies to farmers/BPL people/ students etc
6. Authentication of users for various applications for integrity, availability, confidentiality.
7. Implementing a system for detecting the modification of videos/images on social media
8. Secure App for online exams detecting Keystroke and camera movements.
9. A system to detect the difference between the voice edited in the audio/video
10. A System to check the vulnerabilities in the websites.
solutions to these problem. Perform a detailed case study of the various issues.
3. Write a detail case study about the banking security flows and solutions to these flows.
4. Give a detail case study of the antivirus system giving the flows and solutions to it.
5. Perform the detail case study of various operating systems used for mobile devices and give a
secure solution to one for widely used OS.
Blog
1. Dark Web
2. Crypto currency and Economy
3. Cyber crime and solutions
4. Authentication and Access control for social media
5. Cyber forensic and Cyber laws
Surveys
1. Survey on various blockchain related issues/ cryptocurrency/ application systems developed
using blockchain
2. Survey on various authentication and access control methods for different applications
3. Steganography and Biometric Systems for authentication
4. Survey of various attacks and its effect on Indian economy and its analysis
5. Problems over Integer Lattices: A Study
Suggest an assessment Scheme:
Suggest an Assessment scheme that is best suited for the course. Ensure 360 degree
assessment and check if it covers all aspects of Blooms Taxonomy.
MSE: 10% + ESE: 10% + Seminar: 15% Group Discussion: 15% + Home Assignments: 10%
+ Course Project: 10% + Lab evaluation: 10% + CVV: 20%
4. Charlie Kaufman, Radia Perlman and Mike Spencer, “Network security, private communication in a public
world”, 2nd Edition, Prentice Hall, 2002, ISBN 9780130460196.
5. V.K. Pachghare, “Cryptography and Information Security”, 2nd Edition, PHI, 2015, ISBN-978-81-203-
5082-3.
Course Outcomes:
1) Analyze cryptographic techniques using a mathematical approach by examining
nature of attack.
2)Identify and establish different attacks on the system
3) Justify various methods of authentication and access control for application of
technologies to various sections of industry and society.
4) Design a secure system for protection from the various attacks for 7 layer model
by determining the need of security from various departments of an organization
5) Estimate future needs of security for a system by researching current environment
on a continuous basis for the benefit of society.
6) Analyze various types of cyber crime by detecting the crime
CO PO Map
CO attainment levels
Blockchain Technologies
Ethical Hacking and Network Defense
Cloud and Data Security
Job Mapping:
Security Engineer/Network Security Engineer
Pattern “D21”
FF No. : 654
Syllabus Template
CS4217:: Human-Computer Interaction
Course Prerequisites: NA
Course Objectives:
1. To categorize IT applications based on measurable human factors,
2. To study the user community through user survey and/or field visit,
3. To design user-friendly user interfaces with due consideration of interface theory and principles,
4. To apply usability evaluation methods to identify the usability issues with IT applications,
5. To understand the kind of documentation required for IT applications,
6. To integrate web and mobile app design approaches as per user requirements
SECTION-1
Interaction Concepts and Models: User Persona, User Categorization, Golden Rules of
Interface Design, Miller’s Principle, Task Analysis - GOMS, Contextual Inquiry, Work
Models, Interaction Styles, Empathy Maps.
Design Process: Design Concept, Three Pillars of Design, Process of Design, Ethnographic
Observations, Participatory Design, Internationalization, Interaction Design Patterns.
SECTION-1I
Website and Mobile App Design: Content Design, Interaction and Navigation Design,
Presentation Design, Differences in design approaches, Design and Evaluation Tools.
Designs:
1. Social Network for Spiritual Users
2. App for Alzheimer’s disease
3. Health Tracking App
4. Ration Card Management App
5. Innovative e-Commerce Platform
Case Studies:
1. Chatbot in healthcare domain
2. Best food ordering app in India
3. Online teaching-learning process
4. Use of Twitter with Indian Users
5. User experience with car booking in India
Blogs:
1. Noise of Notifications
2. Challenges in Food Delivery Service
3. Need for Accessibility Guidelines
4. Usability of Autonomous Vehicles
5. Failure of Usability Testing
Surveys:
1. User experience with video-conferencing apps
2. User errors on Social Networking Sites (SNS)
3. Challenges for hearing impaired users with IT applications
4. Most popular Indian mobile apps (Made in/by India)
1. Ben Shneiderman, “Designing the User Interface”, Third Edition, Pearson Education, ISBN 81-7808-262-4.
2. Alan Dix, Janet Finlay, Gregory D. Abowd, Russell Beale, “Human-Computer Interaction”, Third Edition,
Pearson Education, ISBN 81- 297-0409-9.
1. Donald Norman, “The Design of Everyday Things”, 2002 Edition, Basic Books, ISBN 100-465-06710-7.
2. Wilbert Galitz, “The Essential Guide to User Interface Design”, Second Edition, Wiley-Dreamtech India (P)
Ltd., ISBN 81-265-0280-0.
3. John Carroll, “Human-Computer Interaction in the New Millennium”, Pearson Education, ISBN 81-7808-
549-6.
https://nptel.ac.in/courses/106/103/106103115/
https://www.coursera.org/learn/human-computer-interaction
https://classroom.udacity.com/courses/ud400
Course Outcomes:
1. Students will be able to appreciate the differences among IT applications and their categories based
on measurable human factors.
2. Students will be able to study the user community through user survey and/or field visit.
3. Students will be able to design user-friendly user interfaces as per user requirements and UI design
principles.
4. Students will be able to apply a suitable usability evaluation method to identify the usability issues.
5. Students will be able to understand the kind of documentation required for IT applications.
6. Students will be able to enhance UI designs as per desired web or mobile app design approach.
CO PO Map:
CO Attainment Levels:
CO1 ----------3
CO2 -----------3
CO3 -----------2
CO4 -----------2
CO5 ------------1
CO6 -------------3
Usable Security,
Job Mapping:
UI Designer, Product Designer, Software Engineer, Mobile App Developer and other jobs
FF No. : 654
Syllabus Template
CS4219::Internet of Things
Course Prerequisites: Microprocessor Hardware, Microcontroller
Course Objectives:
1. To learn the terminology, technology and its applications of IoT
2. To analyze Embedded suite widely used in IoT.
3 .To describe the concept of M2M with necessary protocols
4. To understand the cloud storage for IoT applications.
5. To optimize resources for different IoT applications
6. To understand Real world IoT Design constraint.
Course Relevance:
IoT is regarded as the significant frontier that can improve almost all activities in our lives. Most
of the devices, which have not previously been connected to the internet, can be networked and
respond the same way as smart devices. Internet of Things and related technologies improve the
convenience, comforts and security of our homes and be more efficient and cost effective in the
way we consume services such as energy. IOT will help track and monitor a huge range of our
own physiological functions.
SECTION-1
Introduction and Application to Internet of Things: Need of IoT, Towards the IoT, Strategic
Research and Innovation Directions, Future Internet Technologies, IoT Smart X Application:
Smart Cities, Smart Energy & Smart Grid, Smart Mobility & transport, Smart Home,
Smart Building & Infrastructure, Smart Factory & Manufacturing, Smart Health,
Smart Logistics & Retails.
Embedded Suite for IoT: Introduction to Arduino and Raspberry Pi, Understanding the Arduino
and Raspberry Pi board and its Components, recognizing the Input/output, GPIO connectivity.
Protocol Standardization for IoT, Machine to machine (M2M) and WSN Protocols, Basics of
RFID, RFID Protocols , Issues with IoT Standardization, Protocols- IEEE 802.15.4, ZigBee,
IPv6 technologies for IOT
SECTION-1I
IoT Networking: Star, Mesh, Tree, and Overview of networking Protocols: TCP/IP, 6LowPan,
IoT Devices Application Level Protocol Service parameter in MQTT,
Introduction to cloud computing, Difference between Cloud Computing and Fog Computing:
The Next Evolution of Cloud Computing, Role of Cloud Computing in IoT, Connecting IoT to
cloud, Cloud Storage for IoT Challenge in integration of IoT with Cloud
4)IoT Applications
10)Limitations of MAS concepts and techniques and directions for further research
1) LED Blinky
2) Switch
3) ADC
4) PIR, Ultrasonic sensor,IR Sensor, Flame Sensor interface with Microcontroller
5) MQ6 Sensor, Humidity sensor, Raindrop Sensor interface
6) Communication over Wifi through Node MCU
7) Voice Controlled Iot application
8) Serial Communication
9) PWM
10) Bluetooth Controlled application(Interfacing Bluetooth Module (HC-05)
11) Control through Android APP
12) RFID Interface
13)Use IOT Comm Protocol ( MQTT)
List of Projects:
2.How to Build a Complete IoT Solution with AWS- An Use Case Approach.
7.Sensor Characteristics.
8.Manufacturing Intelligence
4. Should IoT pay more attention to security rather than just expanding its horizon to the
extremes?
7. IoT is the next big thing for hackers trying to have access to your intimate data.
10. IoT will make way for robots to rule over humans one day.
12. IoT needs to be regulated before it goes out of limits and poses serious threat.
Design:
Case Study:
Blog
2.Today's hard hats and safety goggles could be tomorrow's sensored vests and work sites. Can
an IoT enabled ecosystem prevent accidents from happening in the frst place
3.How can machines tell us when they are about to break down?Using connected technologies to
predict maintenance saves clients . time and money
5.Farmers used to rely on clouds for rain. Today’s digital cloud helps maximize crop yield,
optimize seeding, automate harvesting, and more.
Surveys
4.IOT Platform
Mid Sem Exam, End Sem Exam, Home Assignment, Course Project,Group Discussion
Seminar
1. Jan Holler, VlasiosTsiatsis, Catherine Mulligan, Stefan Avesand, Sta matis Karnouskos,David Boyle, “From
Machine to the Internet of Things: Introduction to a New Age of Intelligence”, 1st Edition, Academic Press, 2014.
to the Internet of Things:
2. Francis daCosta, “Rethinking the Internet of Things: A Scalable Approach to Connecting Everything”, 1st
Edition, Apress Publications, 2013
3. Jan Holler, VlasiosTsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis Karnouskos, David Boyle, “From
Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence”, 1 st Edition, Academic
Press, 2014. (ISBN-13: 978-0124076846)
1. Marco Schwartz, “Internet of Things with the Arduino Yun”, Packt Publishing, 2014
2. Daniel Minoli John Wiley & Sons ,,Building the internet of things with ipv6 and mipv6,
3. Cassimally, Hakim, “Designing the Internet of Things”, Wiley Publications, ISBN 10:
111843062X
3. Francis daCosta, “Rethinking the Internet of Things: A Scalable Approach to Connecting Everything”, 1 st
Edition, Apress Publications, 2013. (ISBN-13: 978- 1430257400)
Course Outcomes:
1. Realize the revolution of Internet in Mobile Devices, Cloud & Sensor Networks
4. Demonstrate the application of IoT in Industrial Automation and identify Real World Design
Constraints.
5. Compare and Contrast the use of Devices, Gateways and Data Management in IoT
CO PO Map
CO attainment levels
PO3 --3, PO5 ---3, PO7 –2, PO9 ---2, PO10---1, PSO3---3
Mention other courses that can be taken after completion of this course
Job Mapping:
FF No. : 654
Syllabus Template
CS4222 :: Image Processing
Course Objectives:
1. To describe different color models and image processing techniques
2. To analyze image condition and deduce enhancement algorithms
3. To understand Segment the image to identify the region of interest.
4. To develop an algorithm to recognize the specified objects in the given image.
5. To learn different compression techniques
Course Relevance: Vision sense is the most powerful human sense organ. In the world
where intelligent automation is taking place, image processing is a vital domain for
research and development. In Industry 4.0, image processing systems built around
industrial cameras are an essential component in automated production. Throughout all
steps of production, from the inspection of raw materials and production monitoring (i.e.
flaw detection) to final inspections and quality assurance, they are an indispensable part of
achieving high efficiency and quality standards. In the Entertainment Industry, latest trends
such as 4K video streaming requires high quality compression that can provide limited/no
loss image quality with high fps. In social networking, sharing images has been a vital
part. Creating innovative effects and overall manipulating the images will be explored.
SECTION-1
SECTION-1I
Feature Extraction and Object Recognition: Feature points and feature detection (Line,
circle and corner). Line detection: RANSAC, Hough Transform. Corner detection: Harris
Corner Detector. Feature descriptors, Descriptor matching. SIFT, Boundary representation
(Chain code), Boundary detection based techniques.
7. Compression techniques
8. Color models
9. SIFT Vs SURF
Design:
2. Design an algorithm to perform segmentation of the image below to extract the mango from its
background
5. Design an algorithm to compress a 300x300 pixel image with horizontal black to white
gradient as shown below
Case Study:
Blog
Surveys
1.Pratt, “Digital Image Processing,” Wiley Publication, 3rdEdition , ISBN 0-471- 37407-5.
2.K.R. Castleman, “Digital Image Processing,” 3rd Edition, Prentice Hall: Upper Saddle River, NJ, 3,
ISBN 0-13-211467 -4.
Course Outcomes:
The student will be able to
1. Apply various corrective geometric transforms on a distorted image. (PO2)
2. Determine and implement required image enhancement techniques using open source
technologies such as OpenCV (PO5)
3. Deploy optimized algorithms for lossless and lossy compression techniques which
ensures expected performance on a variety of hardware architectures. (PO8)
4. Contribute to an algorithmic solution for social and personal security (PO10)
5. Differentiate between various mathematical transforms and its use for a given use case
(PO12)
6. Deduce a solution for a given industrial problem (PSO4)
CO PO Map
3 3 2 2 1 3
CO attainment levels
1. Augmented Reality
2. Multimedia Processing
Job Mapping:
1. Augmented Reality Experience Designer
2. Automation Engineer
3. Embedded Software Developer
4. Image Processing Expert
FF No. : 654
Syllabus Template
CS4201::Cloud Computing
Course Prerequisites: Operating Systems, Fundamentals of Computer Networks
Course Objectives:
1. To become familiar with Cloud Computing and its ecosystem
2. To learn basics of virtualization and its importance
3. To evaluate in-depth analysis of Cloud Computing capabilities
4. To give a technical overview of Cloud Programming and Services.
5. To understand security issues in cloud computing
SECTION-I
SECTION-II
Software as a Service (SaaS): Introduction to SaaS, Web services, Web 2.0, Web OS,
Cloud Security: Introduction to security in the cloud, the shared security model, Encryption
options, Authentication and authorization with Cloud IAM, Identify Best Practices for
Authorization using Cloud IAM.
Cloud Network : Introduction to networking in the cloud, Defining a Virtual Private Cloud,
Public and private IP address basics, Google’s network architecture, Routes and firewall rules
in the cloud, Multiple VPC networks, Building hybrid clouds using VPNs, interconnecting,
and direct peering, Different options for load balancing.
5. Serverless Architecture
6. Hybrid Cloud
Design:
Case Study:
Blog
3. App Engine
4. Cloud Endpoints
5. Cloud Pub/Sub
Surveys
2. Cloud Economics
4. Salesforce
5. Dropbox
1. Judith Hurwitz, R.Bloor, M.Kanfman, F.Halper, “Cloud Computing for Dummies”, Wiley,India.
https://nptel.ac.in/courses/106/105/106105167/
https://swayam.gov.in/nd1_noc20_cs55/preview
https://www.coursera.org/specializations/cloud-computing
https://azure.microsoft.com/en-in/overview/what-is-cloud-computing/
https://aws.amazon.com/what-is-cloud-computing/
https://www.ibm.com/in-en/cloud/learn/cloud-computing
Course Outcomes:
1) Describe the main concepts, key technologies, strengths, and limitations of cloud
computing and the possible applications for state-of-the-art cloud computing
2) Explain the architecture and infrastructure of cloud computing, including SaaS, PaaS, IaaS,
public cloud, private cloud, hybrid cloud, etc.
3) Identify problems, and explain, analyze, and evaluate various cloud computing solutions.
4) Choose the appropriate technologies, algorithms, and approaches for the related issues.
5) Display new ideas and innovations in cloud computing.
6) Collaboratively research and write a paper on the state of the art (and open problems) in
cloud computing.
CO PO Map
3 3 2 2 1 3
CO attainment levels
After completing this course different certifications courses in cloud be taken such as AWS,
Azure, Google cloud certifications. One can go for higher studies in specialization of cloud
computing and allied subjects.
Job Mapping:
FF No. : 654
Syllabus Template
CS4221::Information Retrieval
Course Prerequisites: Data Structures, Basic probability and statistics
Course Objectives:
1. To study basic principles and practical algorithms used for information retrieval
2. To introduce students about insights retrieval models, retrieval feedback and applications in
web information management
3. To provide comprehensive details about various Evaluation methods.
4. To provide implementation insight about the topics covered in the course
5. To apply information retrieval in the domain of natural language processing (NLP)
6. Learn tools and techniques to do cutting-edge research in the area of information retrieval
Course Relevance: This course provides an overview of the important issues in information
retrieval, and how those issues affect the design and implementation of search engine software.
The course emphasizes the technology used in Web search engines and the information retrieval
theories and concepts that underlie all search applications. Mathematical experience including
basic probability is strongly desirable.
SECTION-1
Information Retrieval Models; Boolean Retrieval, Extended Boolean Models, Vector Space
Model, Probabilistic Model, Naïve Bayes, Text Classification, Document and Term
Clustering, Flat and Hierarchical Clustering, Matrix Decomposition, Latent Semantic
Indexing, Bayesian Model, Models for Browsing.
SECTION-II
Indexing and Searching: Automatic Indexing, Inverted Files, Fast Inversion (FAST-INV)
Algorithm, Signature Files, Partitioning, Tries, Suffix Trees and Suffix Arrays, PAT Tree,
Distributed Indexing, Index Compression.
1. Parallel IR
2. Distributed IR
8. Text summarization
2. Relevance ranking
8. Personalized search
Design:
1. Build and evaluate a "person search engine". The search engine should automatically crawl
and build textual representations of people that can be queried against. Example queries
might include specific names (e.g., "george bush"), job descriptions (e.g., "car company
ceos"), facts about the person (e.g., "highest paid female musician"), etc.
2.Build and evaluate a search engine that adapts to implicit user feedback. This requires
developing a user interface that tracks various user behavioural signals (e.g., clicks, dwell
times, mouse movement, etc.) and uses that information to improve the quality of the ranking
function over time as more and more information becomes available.
3.Develop and evaluate an algorithm that will automatically summarize, each hour, the most
widely discussed topics on Twitter. The summary should be short (e.g., tweet-length) and
provide an adequate summary of the topic.
4.Develop and evaluate a tool that will automatically associate images with news articles.
More specifically, given the text of a news article, the task is to automatically identify a
single relevant that could be placed alongside the article. For example, for a news article
about the positive effects of green tea, relevant images would include tea leaves, cups of tea,
health related symbols/logos, etc.
5. Build and evaluate a cross-lingual search engine. For example, use Wikipedia as a source
of parallel corpora.
Case Study:
Blog
4.Development of semantic search engine to deal with polysemy, synonymy issues of text
documents
Surveys
3. Unified filtering
1. Ricardo Baeza-Yates, Berthier Ribeiro-Neto, “Modern Information Retrieval The Concepts and
Technology behind Search”, , Pearson Education: New Delhi, 2007
2. Christopher D. Manning, Prabhakar Raghavan and Hinrich Schütze “Introduction to Information Retrieval”,
Cambridge University Press, 2012
1. Gerald Kowalski, Mark Maybury, “Information Storage and Retrieval Systems Theory and Implementation”,
Springer Pvt. Ltd., 2006
2. William Frakes, Ricardo Baeza-Yates, “Information Retrieval Data Structures & Algorithms” ,Pearson
Education, 2008
https://nptel.ac.in/courses/106/101/106101007/
http://www.dcs.gla.ac.uk/Keith/Preface.html
https://nlp.stanford.edu/IR-book/pdf/01bool.pdf
https://www.coursera.org/learn/google-cbrs-cpi-training
https://www.coursera.org/learn/text-retrieval
Course Outcomes:
CO PO Map
3 3 2 2 1 3
CO attainment levels
Job Mapping:
Applied Scientist
Data Engineering
Course Relevance: Parallel computing, on the other hand, uses multiple processing elements
simultaneously to solve a problem. This is accomplished by breaking the problem into
independent parts so that each processing element can execute its part of the algorithm
simultaneously with the others. This course is required in the industry & used to set up data
centres.
SECTION-1
SECTION-1I
GPU Architecture: GPU architecture, Overview of the graphics pipeline, Components of GPU:
Parallel streaming processors, Multiprocessors, Shared instruction caches ,Memory hierarchy – Global,
Constant, Shared, and Texture memory; Case studies: NVIDIA Kepler K20/K40/K80/GP100/GV100/
Ampere.
Memory Organization and Optimization: Global, Shared, constant and texture memory. Memory
coalescing, memory banks and bank conflicts, Page locked host memory. Reduction operation, CUDA
code optimization. Need of profilers and analyzers, Introduction to CUDA Tools: MemCheck,
Command line & Visual Profilers.
Problem solving using GPUs: Single vs. double precision, light weight scientific computing
exercises, Image processing applications, Matrices etc .
MSE(30)+ESE(30)+HA(10)+CVV(20)
1. Ananth Grama, Anshul Gupta, George Karypis, and Vipin Kumar; Introduction to
parallel computing; second edition., Addison‐Wesley, 2003, ISBN: 0201648652
2David Kirk, Wen-mei HwuCUDA: Programming Massively Parallel Processors: A Hands-On Approach. ©
ELSEVIER Inc.
3Jason Sanders and Edward KandrotCUDA by Example: An Introduction to General-Purpose GPU
Programming”
1. Hwang and Briggs,“Computer Architecture and Parallel Processing”, Tata McGraw Hill
Publication ISBN 13: 9780070315563.
2.John Cheng, Max Grossman, Ty McKercherProfessional CUDA C Programming,
3. CUDA C PROGRAMMING GUIDE by NVIDIA
Course Outcomes:
The student will be able to –
1)Recognize various parallel computing architectures and their fundamentals
2)Investigate parallel solutions to complex real world problems
3)Code the parallel programs on GPU using CUDA
4)Evaluate the performance on various GPU architectures
5)Optimize the parallel programs on GPU using CUDA
6)Design and develop new solutions to research problems
CO PO Map
CO1 –PO3(3)
CO2 –PO5(3)
CO3 –PO7(2)
CO4 –PO11(1)
CO5-PO12(1)
CO6-PSO3(3)
CO attainment levels
CO1 –3
CO2 -3
CO3 –2
CO4 –1
CO5-1
CO6-3
Job Mapping:
What are the Job opportunities that one can get after learning this course
Full Stack Architect-GPU
Developer Technology Engineer
Software Engineer Cloud
Data Analytics Engineer
Cloud Developer
Senior Software Engineer
HPC GPU Application Developer & Consultant
GPU Programming Professional
GPU Performance Analysis Lead / Architect
GPU Advocate Associate
No. : 654
Syllabus Template
CS4225::Major Project
Course Prerequisites: Project Based Learning
Course Objectives:
1. To develop critical thinking and problem solving ability by exploring and proposing solutions
to realistic/social problems.
2. To Evaluate alternative approaches, and justify the use of selected tools and methods,
3. To emphasize learning activities those are long-term, inter-disciplinary and student-centric.
4. To engage students in rich and authentic learning experiences.
5. To provide every student the opportunity to get involved either individually or as a group so as
to develop team skills and learn professionalism.
6. To develop an ecosystem to promote entrepreneurship and research culture among the
students.
Course Relevance: Project Centric Learning (PCL) is a powerful tool for students to work in
areas of their choice and strengths. Along with course based projects, curriculum can be enriched
with semester long Engineering Design and Development courses, in which students can solve
socially relevant problems using various technologies from relevant disciplines. The various
socially relevant domains can be like Health care, Agriculture, Defense, Education, Smart City,
Smart Energy and Swaccha Bharat Abhiyan. To gain the necessary skills to tackle such projects,
students can select relevant online courses and acquire skills from numerous sources under
guidance of faculty and enrich their knowledge in the project domain, thereby achieving project
centric learning. Modern world sustained and advanced through the successful completion of
projects. In short, if students are prepared for success in life, we need to prepare them for a
project-based world. It is a style of active learning and inquiry-based learning. Project based
learning will also redefine the role of teacher as mentor in the learning process. The PCL model
focuses the student on a big open-ended question, challenge, or problem to research and respond
to and/or solve. It brings students not only to know, understand and remember rather it takes
them to analyze, design and apply categories of Bloom’s Taxonomy.
SECTION-1
Preamble - The content and process mentioned below is the guideline document for the
faculties and students to start with. It is not to limit the flexibility of faculty and students;
rather they are free to explore their creativity beyond the guideline mentioned herewith. For all
courses of ED, laboratory course contents of “Engineering Design” are designed as a ladder to
extend connectivity of software technologies to solve real world problems using an
interdisciplinary approach. The ladder in the form of gradual steps can be seen as below:
Industry Communication Standards, Single Board Computers and IoT, Computational Biology
(Biomedical and Bioinformatics), Robotics and Drone, Industry 4.0 (Artificial Intelligence,
Human Computer Interfacing, 5G and IoT, Cloud Computing, Big Data and Cyber Security
etc).
Group Structure:
· There should be a team/group of 4-5 students.
· A supervisor/mentor teacher assigned to individual groups.
Selection of Project/Problem:
· Students must focus to initiate the task/idea .The idea inception and consideration shall
be from following areas as a real world problem:
Health Care, Agriculture, Defense, Education, Smart City, Smart Energy, Swaccha Bharat
Abhiyan, Environment, Women Safety.
This is the sample list to start with. Faculty and students are free to include other area
which meets the society requirements at large.
The model begins with the identifying of a problem, often growing out of a question or
“wondering”. This formulated problem then stands as the starting point for learning.
Students design and analyze the problem/project within an articulated disciplinary subject
frame/domain.
· Teacher is not the source of solutions; rather he will act as the facilitator and mentor.
· To utilize the principles of problems solving, critical thinking and metacognitive skills of
the students.
· Commitment to devote the time to solve student’s technical problems and interested in
helping students to empower them better.
· Students must have the ability to initiate the task/idea .They should not be mere imitators.
· Students must quickly learn how to manage their own learning, Instead of passively
receiving instruction.
· Students in PCL are actively constructing their knowledge and understanding of the
situation in groups.
· They have to develop interpersonal and group process skills, such as effective listening or
coping creatively with conflicts.
· Students in PCL are expected to develop critical thinking abilities by constantly relating:
What they read to do? What they want to do with that information?
· They need to analyze information presented within the context of finding answers.
· Modeling is required so that the students can observe and build a conceptual model of the
required processes.
· Use the following mechanism to maintain the track of moving towards the solution.
· How effective is …….? How strong is the evidence for ………? How clear is ……?
· What are the justifications for thinking? Why is the method chosen?
· Collaborative learning
· Interpersonal Skills
· Resources Evaluation
· Metacognitive Skills
Reflection Skills
Following projects can be taken up mainly focusing on usability (HCI), security (NS),
sensors (IoT), and CUDA (PC) and/or cloud storage (Cl Computing) technologies.
1. Design and deploy a secured mobile application supporting big data and cloud technologies
for food ordering system with delivery tracking features supporting old and differently abled
people
2. Design and deploy a secured identification of traffic symbols for moving autonomous car
in all-weather conditions, providing suggestions for effective symbol design with the support
of GPS, Big Data and Cloud technologies
3. Design and deploy a secured multilingual chatbot for pregnant women and mothers, as well
as supporting child-care using (HCI), security (NS), sensors (IoT), and CUDA (PC) and/or
cloud storage (Cl Computing) technologies.
4. Design and deploy a secured app for effective management of noise / disturbance by other
apps, with their categorization based on criticality & importance (HCI), security (NS), sensors
(IoT), and CUDA (PC) and/or cloud storage (Cl Computing) technologies.
5. Design and deploy a secured in-time disease diagnosis for breast-cancer, using effective AI
techniques such as ANN, with higher accuracy using usability (HCI), security (NS), sensors
(IoT), and CUDA (PC) and/or cloud storage (Cl Computing) technologies.
...not limited to.....Faculty and students are free to include other area which meets the society
requirements at large.
Suggest an Assessment scheme that is best suited for the course. Ensure 360 degree
assessment and check if it covers all aspects of Bloom's Taxonomy.
To focus on the higher levels of the Bloom's Taxonomy analyze, apply, evaluate and create.
Course Outcomes:
CO1: Identify the real life problem from societal need point of view
CO2: Choose and compare alternative approaches to select most feasible one
CO3: Analyze and synthesize the identified problem from technological perspective
CO6: Inculcate long life learning attitude towards the societal problems
CO PO Map
CO attainment levels
Mention other courses that can be taken after completion of this course
Job Mapping:
What are the Job opportunities that one can get after learning this course