B.sc. Software Engineering
B.sc. Software Engineering
B.sc. Software Engineering
,
SOFTWARE ENGINEERING
SYLLABUS
2023-2024
Programme Code:
Semester-II
Semester-IV
Semester-VI
*Part I. II, and Part III components will be separately taken into account for CGPA calculation and classification for
the under graduate programme and the other components. IV, V have to be completed during the duration of the
programme as per the norms, to be eligible for obtaining the UG degree.
Methods of Evaluation
Continuous Internal Assessment Test
Internal Assignments 25 Marks
Evaluation Seminars
Attendance and Class Participation
External End Semester Examination 75 Marks
Evaluation
Total 100 Marks
Methods of Assessment
Recall (K1) Simple definitions, MCQ, Recall steps, Concept definitions
Understand/ MCQ, True/False, Short essays, Concept explanations, Short summary or
Comprehend (K2) overview
Application (K3) Suggest idea/concept with examples, Suggest formulae, Solve problems,
Observe, Explain
Analyze (K4) Problem-solving questions, Finish a procedure in many steps, Differentiate
between various ideas, Map knowledge
Evaluate (K5) Longer essay/ Evaluation essay, Critique or justify with pros and cons
Check knowledge in specific or offbeat situations, Discussion, Debating or
Create (K6)
Presentations
Template for Curriculum Design for UG Programme in B.Sc Software Engineering
Credit Distribution for UG Programme in Software Engineering
B.Sc Software Engineering
First Year
Semester-I
Hours per
Part List of Courses Credit week
(L/T/P)
Part-I Language -Tamil 3 6
Part-II English 3 6
Hours per
Part List of Courses Credit week
(L/T/P)
Part-I Language -Tamil 3 6
Part-II English 3 6
9
Second Year
Semester-III
Hours per
Part List of Courses Credit week
(L/T/P)
Part-I Language -Tamil 3 6
Part-II English 3 6
Environmental Studies(EVS) - 1
Semester-IV
Hours per
Part List of Courses Credit week
(L/T/P)
Part-I Language- Tamil 3 6
Part-II English 3 6
5 5
CC7: Core Industry Module -1 - Industrial Statistics
CC8 : Any Core paper
Elective Course 1 (Generic / Discipline Specific)EC4 3 3
25 30
16
Hours per
Part List of Courses Credit week
(L/T/P)
Semester-VI
Hours per
Part List of Courses Credit week
(L/T/P)
Part-III Core Courses 3 (CC13, CC14, CC15) 4 6
Elective Courses 2 (Generic / Discipline Specific) EC7, EC8 3 5
Part IV Professional Competency Skill Enhancement Course SE8 2 2
Part-V Extension Activity (Outside college hours) 1
21 30
17
Suggested topics in Core component
Annexure II
Suggested topics in Skill Enhancement(SEC1-SEC8) Course
1. Fundamentals of Information Technology
2. Understanding Internet
3. Multimedia Lab
4. Web Designing
5. Software Testing
6. PHP Programming
7. Office Automation
8. Quantitative Aptitude
9. Multimedia Systems
10. Biometrics
11. Enterprise Resource Planning
12. Organization Behaviour
13. Simulation and Modeling
14. Virtual Reality
15. Computer Graphics and more..
Decision Statements: If, if else, switch, break, continue - the? Operator - The GOTO
statement. – Loop Control Statements: Introduction – for, nested for loops – while, do-
while statements – Arrays: One-dimensional - Two dimensional - Multidimensional
II 15
arrays
Character string handling - Declaring and initializing string variables - Reading strings
from terminal - Writing strings to screen - String handling functions - User-defined
functions: Need for user defined functions – Types of functions - calling a function
III category of functions - no arguments and no return values - Arguments but no return 15
values - Arguments with return values – Recursion - functions with arrays - The scope
and lifetime of variables in functions
File Management in C: defining and opening a file - closing file - I/O operations on
files - error handling during I/O operations - Random access to files - command line
V arguments. Preprocessors 15
TOTAL 75
CO Course Outcomes
Outline the fundamental concepts of C programming languages, and its features
CO1
CO2 Demonstrate the programming methodology
20
Textbooks
“Problem solving and program design in C”, Jeri R. Hanly, Elliot B. Koffman. —7th ed.,PEARSON
Reference Books
1. V. Rajaraman,“Computer Programming in C” ,Prentice Hall of India Pvt Ltd, 1st Edition,2004
2. http://crasseux.com/books/ctutorial/
MAPPING TABLE
CO1 3 3 2 2 2 3
CO2 3 3 2 2 2 3
CO3 3 3 2 2 2 3
CO4 3 3 2 2 2 3
CO5 3 3 2 2 2 3
Weightage of course
contributed to each
PSO
15 15 10 10 10 15
21
FIRST YEAR – SEMESTER – I
CORE – II: C PROGRAMMING-PRACTICAL
Inst. Marks
Subject Code L T P S Credits
Hours CIA External Total
0 0 4 I 4 4 25 75 100
Learning Objectives
LO1 Develop problem-solving skills through applying programming concepts and techniques.
LO2 Gain mastery over C programming constructs to develop efficient programs.
LO3 Acquire skills to debug and troubleshoot C programs using various techniques.
LO4 Foster good programming practices for reliable and maintainable code.
LO5 Improve collaborative programming abilities for effective teamwork.
List of Exercises
1. Develop a C program to print prime numbers within the range of integers given. .
2. Develop a C Program to find the sum and average of given N numbers.
3. Develop a C Program using all decision making and looping statements.
4. Develop a C Program to arrange the given numbers in ascending /descending order.
5. Develop a C Program to perform matrix multiplication.
6. Develop a C Program to manipulate string functions.
7. Develop a C Program to find the Fibonacci series for a give number using recursive function.
8. Develop a C Program to show Call by Value and Call by Reference.
9. Develop a C program to swap two numbers using pointers.
10. Develop a C Program to update the student’s details using various file modes.
11. Develop a C Program to copy the content of one file to another file.
TOTAL 75
CO Course Outcomes
Demonstrate the understanding of syntax and semantics of C programs.
CO1
CO2 Identify the problem and solve using C programming techniques.
CO4 Analyze various concepts of C language to solve the problem in an efficient way.
CO5 Develop a C program for a given problem and test for its correctness.
MAPPING TABLE
CO1 3 3 2 2 2 2
CO2 3 2 2 2 2 2
CO3 3 2 2 2 3 3
CO4 3 2 2 2 2 3
CO5 3 2 2 3 2 2
22
Weightage of
course 15 11 10 11 11 12
contributed to each
PSO
Describe the different memory representation for datastorage and apply various
CO2
operations
CO3 Construct an algorithm for different data structure operations.
CO4 Analyze the data structures applications.
CO5 Discover suitable techniques to provide solution for solving the problems.
Textbooks
E.Balagurusamy, “Programming with Java: A Primer”, Tata McGraw Hill 2014, 5th
Edition.
Mark Allen Weiss, “Data Structures and Algorithms Analysis in C++”,Person
Education 2014, 4th Edition.
Reference Books
1. Herbert Schildt, “JAVA 2: The Complete Reference”, McGraw Hill, 2018, 11th
Edition.
2. Aho, Hopcroft and Ullman, “Data Structures and Algorithms”, Pearson Education
2003.
3. S. Sahni, “Data Structures, Algorithms and Applications in JAVA”, Universities Press
2005, 2nd Edition.
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1. NPTEL & MOOC courses titled Java and Data Structures
2. https://nptel.ac.in/courses/106106127/
3. https://nptel.ac.in/courses/106105191/
MAPPING TABLE
CO1 3 2 1 2 1 2
CO2 3 3 2 2 3 3
CO3 3 3 2 3 3 2
CO4 3 2 3 2 2 3
CO5 3 2 2 2 3 3
Weightage of course
contributed to
each PSO 15 12 10 11 12 13
24
25
FIRST YEAR – SEMESTER – II
CORE IV: JAVA PROGRAMMING PRACTICAL
TOTAL 75
CO Course Outcomes
CO1 Demonstrate the understanding of syntax and semantics of Java programs.
CO2 Identify the problem and solve using Java programming techniques.
CO3 Ability to write functions to implement linear and non-linear data structure operations.
CO4 Suggest appropriate linear and non-linear data structure operations for solving a
given problem.
CO5 Develop a Java program for a given problem and test for its correctness.
MAPPING TABLE
26
CO/ PSO PSO 1 PSO 2 PSO 3 PSO 4 PSO 5 PSO 6
CO1 3 3 2 2 2 2
CO2 3 2 2 2 2 2
CO3 3 2 2 2 3 3
CO4 3 2 2 2 2 3
CO5 3 2 2 3 2 2
Weightage of course
contributed toeach PSO 15 11 10 11 11 12
Reference Books
1. Alexix Leon & Mathews Leon, "Essential of DBMS", 2nd reprint, Vijay Nicole Publications, 2009.
2. https://www.tutorialspoint.com/sql
3. https://livesql.oracle.com
MAPPING TABLE
CO1 3 2 2 3 3 3
CO2 3 3 3 3 3 3
CO3 3 3 3 3 3 3
28
CO4 3 3 3 3 3 3
CO5 3 3 3 3 3 3
Weightage of
course contributed
15 14 14 15 15 15
to each PSO
TOTAL 60
CO Course Outcomes
CO1 Choose appropriate SQL queries and PL/SQL blocks for the database.
CO2 Implement SQL and PL/SQL blocks for the given problem effectively.
29
CO3 Analyze the problem and Exceptions using queries and PL/SQL blocks.
CO4 Validate the database for normalization using SQL and PL/SQL blocks.
CO5 Design Database tables, create Procedures, user-defined functions and Triggers.
MAPPING TABLE
CO1 3 3 3 3 3 3
CO2 3 3 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
CO5 3 3 3 3 3 3
Weightage of course
contributed to 15 15 15 15 15 15
each PSO
Subject Marks
L T P S Credits Inst. Hours
Code CIA External Total
5 0 0 IV 4 5 25 75 100
Learning Objectives
LO1 To introduce the software development life cycles
LO2 To introduce concepts related to structured and objected oriented analysis & design
LO3 To provide an insight into cost estimation
LO4 Learn to write test cases using different testing techniques.
LO5 The students should be able to specify software requirements and design the software using tools
Unit Contents No. of Hours
Introduction to Software Engineering: Definition - The changing nature of software -
Software Myths - Terminologies - Role of Management in Software Development -
I Software Life Cycle Models: The Waterfall Model - Increment Process Model - 15
Evolutionary Process Model - The Unified Process.
TOTAL 75
CO Course Outcomes
CO1 Define the basic terminologies involved in the entire software developmental life cycle
CO2 Identify suitable models, techniques and tools for the development of a software product
Apply software engineering perspective through requirements analysis, software design and construction,
CO3
verification, and validation to develop solutions to modern problems
CO4 Compare and contrast different process, cost, quality models and testing techniques
Estimate the project cost using suitable cost estimation models, rate the software risks and evaluate
CO5
management strategies for effective software development
Textbooks
K.K Agarwal, Yogesh Singh (2009), “Software Engineering”, 3 rd Edition, New Age International
Publishers.
Reference Books
Roger S. Pressman, “Software Engineering – A Practioners Approach”, 5 th Edition, Tata Mc Graw Hill
1. Publication.
Thomas T. Baker, “Writing Software Documentation – A task oriented approach”, Second Edition, Pearson
2. Education, 2004.
3. Pankaj Jalote (2005), “An Integrated Approach to Software Engineering”, 3 rd Edition, Narosa Publication
31
MAPPING TABLE
CO1 3 2 1 1 1 2
CO2 3 1 3 1 1 2
CO3 3 3 2 3 3 2
CO4 3 3 2 3 3 2
CO5 3 2 2 3 3 2
Weightage of course
contributed
to each PSO
15 11 10 11 11 10
CO3 Generate a high-level design of the system from the software requirements
CO4 Asses the testing problems and able to develop a simple testing report
Mapping Table
CO1 3 1 2 1 1 2
CO2 2 2 2 2 2 2
CO3 2 2 2 2 2 2
CO4 3 2 2 3 2 2
CO5 3 3 2 3 3 2
Weightage of
course contributed
to each PSO 13 10 10 11 10 10
Mapping type: Dictionaries – Mapping type operators – Mapping type Built-in and 15
Factory Functions - Mapping type built in methods – Conditionals and loops – if
statement – else Statement – elif statement – conditional expression – while statement –
III for statement – break statement – continue statement – pass statement – Iterators and the
iter( ) function - Files and Input/Output – File objects – File built-in functions – File
built- in methods – File built-in attributes – Standard files – command line arguments.
TOTAL 75
CO Course Outcomes
CO1 Explain the basic concepts in python language.
CO2 Apply the various data types and identify the usage of control statements, loops, functions and
Textbooks
Wesley J. Chun Core Python Programming Pearson Education Publication 2012
Reference Books
34
1. Eric Matthes Python crash course William pollock 2016
2. Zed Shaw Learn Python the hard way Addition Wesley 2017
2. www.spoken-tutorial.org
MAPPING TABLE
CO/ PSO PSO 1 PSO 2 PSO 3 PSO 4 PSO 5 PSO 6
CO1 3 2 2 3 2 2
CO2 2 3 2 3 2 2
CO3 2 3 2 2 3 1
CO4 1 2 2 1 3 2
CO5 2 2 2 1 3 3
Weightage of
course contributed
to each
PSO 10 12 10 10 13 10
35
List of Exercises
1. Create a simple calculator to do all the arithmetic operations.
2. Write a program to use control flow tools like if.
3. Write a program to use for loop.
4. Data structures
a. use list as stack.
b. use list as queue.
c. tuple, sequence.
5. Create new module for mathematical operations and use in your program.
6. Write a program to read and write files, create and delete directories.
7. Write a program with exception handling.
8. Write a program using classes.
9. Connect with MySQL and create address book
10. Write a program using string handling and regular expression
TOTAL 75
CO Course Outcomes
Understand the significance of control statements, loops and functions in creating
CO1
Simple programs.
CO2 Apply the core data structures available in python to store, process and sort the data.
CO3 Analyze the real time problem using suitable python concepts.
CO4 Assess the complex problems using appropriate concepts in python.
CO5 Develop the real time applications using python programming language.
MAPPING TABLE
CO1 3 2 3 2 3 3
CO2 3 3 2 2 3 3
CO3 3 2 2 3 3 2
CO4 3 2 3 3 2 2
CO5 3 3 3 3 3 2
36
THIRD YEAR – SEMESTER – V
CORE – XI: OPERATING SYSTEMS
Inst. Marks
Subject Code L T P S Credits
Hours CIA External Total
5 0 0 V 4 5 25 75 100
Learning Objectives
Learn how operating systems work and how they manage computer resources like memory, CPU, and
LO1
input/output devices.
LO2 Understand different types of operating systems and their advantages and disadvantages.
Learn how to manage processes and threads in an operating system and how to schedule them for
LO3
execution.
Learn how to manage memory in an operating system and how to ensure efficient use of available
LO4
memory.
LO5 Understand how file systems work in an operating system and how to manage files and directories.
Unit Contents No. of Hours
Introduction – History of operating system- Different kinds of operating system – 15
I Operation system concepts - System calls- Operating system structure.
Processes and Threads: Processes – threads – thread model and usage – inter process 15
II communication.
TOTAL 75
CO Course Outcomes
CO1 Outline the fundamental concepts of an OS and their respective functionality
Textbooks
Andrew S. Tanenbaum, ―Modern Operating Systems‖, 2ndEdition, PHI private Limited, New Delhi,
37
2008.
Reference Books
William Stallings, “Operating Systems – Internals & Design Principles”, 5th Edition, Prentice – Hall of
1.
India private Ltd, New Delhi, 2004.
2. Sridhar Vaidyanathan, “Operating System”, 1st Edition, Vijay Nicole Publications, 2014
2. http://www.freetechbooks.com/introduction-to-operating-systems-t340.html
MAPPING TABLE
CO1 3 2 2 2 2 2
CO2 3 2 1 1 1 2
CO3 2 3 2 2 2 2
CO4 2 1 2 2 2 2
CO5 2 2 2 3 2 2
Weightage of
course contributed
to each PSO 12 10 9 10 9 10
Inst. Marks
Subject Code L T P S Credits
Hours CIA External Total
6 0 0 VI 4 6 25 75 100
Learning Objectives
LO1 To learn different data mining techniques
LO2 To develop skills of using recent data mining software for solving practical problems.
LO3 Gain knowledge of independent study and research
Unit Contents No. of Hours
Introduction: Data mining tasks – Data Mining versus Knowledge Discovery in Data 18
bases - Mining Issues – Metrics – Social implications of Data mining. Data Mining
I Techniques – Introduction – A statistical perspective on Data Mining – similarity
measures – Decision Trees – Neural Networks – Genetic Algorithms
38
Data Preprocessing: Why Preprocess the data – Data cleaning – Data Integration – 18
II Data Transformation – Data Reduction – Data Discretization
Data Mining Techniques: Association Rule Mining – The Apriori Algorithm – 18
III Multilevel Association Rules – Multidimensional Association Rules – Constraint
Based Association Mining
Classification and Prediction: Issues regarding Classification and Prediction – 18
IV Decision Tree induction – Bayesian Classification – Back Propagation – Classification
Methods – Prediction – Classifiers accuracy
Clustering Techniques: cluster Analysis – Clustering Methods – Similarity and
V 18
Distance Measures – Hierarchical Methods - Partitional Methods – Outlier Analysis
TOTAL 90
CO Course Outcomes
CO1 Outline the fundamentals of Data Mining concepts
CO2 To develop skills of using recent data mining software for solving practical problems
2. https://nptel.ac.in/courses/106105174/
Inst. Marks
Subject Code L T P S Credits
Hours CIA External Total
5 0 0 VI 4 5 25 75 100
39
Learning Objectives
LO1 Learn the basic concepts of Software Quality Assurance
LO2 Understand quality management processes
Understand the importance of standards in the quality management process and their impact on the final
LO3
product
LO4 Understand to apply software testing techniques in commercial environment
1. Gain knowledge of the various software development methodologies and their impact on quality
LO5 assurance processes
Handling, storage, packing and delivery –quality records- internal quality audits – 15
III training –servicing –statistical techniques.
QA and new technologies –QA and Human –computer interface- process modeling – 15
IV standards and procedures.
CO5 Evaluate information quality, software quality and business value of information system.
Textbooks
Darrel Ince “An introduction to software quality assurance and its implementation”, MGH 1994.
40
Reference Books
Alan C. Gillies, “Software Quality: Theory and Management”, International Thomson Computer Press,
1. 1997.
CO3 Examine the bugs and analyze how to prevent and remove the bugs
MAPPING TABLE
CO1 2 2 3 3 3 2
CO2 2 3 2 3 2 1
CO3 3 2 3 3 3 2
CO4 3 2 2 3 2 2
CO5 2 3 1 3 3 3
Weightage of
course
contributed to 12 12 11 15 13 10
each
PSO
TOTAL 75
CO Course Outcomes
Outline the C++ programming fundamentals and the concepts of object-oriented
CO1
programming like object and class, Encapsulation, inheritance and polymorphism.
CO2 Classify the control structures, types of constructors, inheritance and different type
conversion mechanisms.
Textbooks
E. Balaguruswamy, (2013), “Object Oriented Programming using C++”, 6th Edition, Tata
McGraw Hill.
Reference Books
Bjarne Stroustrup, “The C++ Programming Language”, Fourth Edition, Pearson Education.
1
2 Hilbert Schildt, (2009), “C++ - The Complete Reference”, 4th Edition, Tata McGrawHill
CO Course Outcomes
Understand the fundamentals of C++ programming structure
CO1
44
CO2 Identify the basic features of OOPS such as classes, objects, polymorphism, inheritance
Analyze the concept of inheritance with the understanding of early and late binding, usage of
CO3
exception handling, constructors, destructors, generic programming and type conversions
CO4 Determine the use of various data structures such as stacks, queues and lists to solve
va
computing problems in C++ by incorporating OOPS concepts.
CO5 Develop a program in C++ with the concepts of object oriented programming to solve
problems.
Data and Signals: Analog and Digital Data - Analog and Digital Signals
II – Performance - Digital Transmission: Transmission Modes – 15
Multiplexing: FDM – WDM - Synchronous TDM -Statistical TDM -
Transmission Media: Guided media - Unguided Media.
Switching: Circuit Switched Networks - Datagram Networks-Virtual
Circuit Network - Error Detection and Correction: Introduction - Block
III 15
Coding - Linear Block Codes - Cyclic Codes: Cyclic Redundancy
Check - Checksum. Data Link Control: Framing - Flow Control
and Error Control - Noiseless Channel: Stop-and-wait Protocol.
Wired LANs: Standard Ethernet-GIGABIT Ethernet-Wireless LAN:
Bluetooth Connecting LANs: Connecting Devices: Passive Hubs-
IV 15
Repeaters-Active Hubs-Bridges-Two Layer Switches-Routers-Three
layer Switches-Gateway-Network Layer: Internet Protocol: IPv4 –
Ipv6-Transition from IPv4 to IPv6.
45
Network Layer: Delivery, Forwarding and Routing- Unicast Routing
Protocols: Distance Vector Routing-Link state routing- Future &
V Current Trends in Computer Networks: 5G Network: Salient Features- 15
Technology-Applications-Advanced Features-Advantages
& Disadvantages-Internet of Things: key Features -Advantages &
Disadvantages-IOT Hardware- IOT Technology and Protocols-IOT
Common Uses-Applications-WiFi-WiMax Lifi- Lifi vs Wifi.
TOTAL 75
CO Course Outcomes
CO1 Understand the fundamental concepts of computer networks and its application areas
Reference Books
Jean Walrand (1998), ―Communication Networks,Second Edition‖, TataMcGraw
1.
Hill.
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1. http://www.tutorialspoint.com/data_communication_computer_network/
2. http://www.slideshare.net/zafar_ayub/data-communication-and-network-11903853
3. http://www.freetechbooks.com/data-communication-and-networks-f31.html
.NET PROGRAMMING
Inst. Marks
Subject Code L T P S Credits
Hours CIA External Total
CORE 5 - - IV 4 5 25 75 100
Learning Objectives
LO1 To develop ASP.NET Web application using standard controls.
LO2 To create rich database applications using ADO.NET.
LO3 To implement file handling operations.
LO4 To utilize ASP.NET security features for authenticating the web site.
LO5 To handles SQL Server Database using ADO.NET.
Unit Contents No. of Hours
Overview of .NET framework: Common Language Runtime (CLR), Framework Class
Library- C# Fundamentals: Primitive types and Variables – Operators - Conditional
I 15
statements -Looping statements – Creating and using Objects – Arrays – String
operations.
Introduction to ASP.NET - IDE-Languages supported Components -Working with Web
II Forms – Web form standard controls: Properties and its events – HTML controls - List 15
Controls: Properties and its events.
Rich Controls: Properties and its events – validation controls: Properties and its events
III – File Stream classes - File Modes – File Share – Reading and Writing to files – 15
Creating, Moving, Copying and Deleting files – File uploading.
IV ADO.NET Overview – Database Connections – Commands – Data Reader - Data 15
Adapter - Data Sets - Data Controls and its Properties - Data Binding
Grid View control: Deleting, editing, Sorting and Paging. XML classes – Web form to
V manipulate XML files - Website Security - Authentication - Authorization – Creating a 15
Web application.
TOTAL 75
CO Course Outcomes
To identify and understand the goals and objectives of the .NET framework and ASP.NET with C#
CO1
language.
47
CO2 To develop web application using various controls.
CO3 To analyze C# programming techniques in developing web applications.
CO4 To assess a Web application using Microsoft ADO.NET.
CO5 To develop a software to solve real-world problems using ASP.NET
Textbooks
SvetlinNakov,VeselinKolev& Co, Fundamentals of Computer Programming with C#,Faber publication,
1.
2019.
2. Mathew, Mac Donald, The Complete Reference ASP.NET, Tata McGraw-Hill ,2015.
Reference Books
1. Herbert Schildt, The Complete Reference C#.NET, Tata McGraw-Hill,2017.
2. Kogent Learning Solutions, C# 2012 Programming Covers .NET 4.5 Black Book, Dreamtech pres,2013.
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1. http://www.w3schools.com/aspnet/default.asp
2. http://www.maconstateit.net/tutorials/ASPNET20/default.htm
MAPPING TABLE
CO/ PSO PSO 1 PSO 2 PSO 3 PSO 4 PSO 5 PSO 6
CO1 3 2 1 2 2 2
CO2 2 3 1 3 2 2
CO3 1 3 1 1 3 1
CO4 - 2 1 1 3 1
CO5 - 2 1 1 3 3
Weightage of course
contributed to each
PSO
5 12 5 8 13 9
48
Inst. Marks
Subject Code L T P S Credits
Hours CIA External Total
CC - - 5 IV 5 5 25 75 100
Learning Objectives
LO1 To develop ASP.NET Web application using standard controls.
LO2 To create rich database applications using ADO.NET.
LO3 To implement file handling operations.
LO4 To utilize ASP.NET security features for authenticating the web site.
LO5 To handles SQL Server Database using ADO.NET.
List of Exercises
1. C# Basics
2. Looping Constructs
3. Arrays & Jagged Array
4. Strings
5. Classes and Objects
6. Method overloading
7. Delegates
8. LINQ
9. Lambda Expressions
10. Web Sever Controls
11. AdRotator Control
12. Calendar Control
13. Validation Controls
14. Developing Database Applications using Data Grid
15. Crystal Reports
49
TOTAL 75
CO Course Outcomes
To identify and understand the goals and objectives of the .NET framework and ASP.NET with C#
CO1
language.
CO2 To develop web application using various controls.
CO3 To analyze C# programming techniques in developing web applications.
CO4 To assess a Web application using Microsoft ADO.NET.
CO5 To develop a software to solve real-world problems using ASP.NET
MAPPING TABLE
CO1 2 2 1 3 3 -
CO2 1 3 2 3 2 1
CO3 1 2 1 3 3 2
CO4 - 2 1 2 1 2
CO5 1 3 - 3 3 3
Weightage of course
contributed to each 5 12 5 14 12 8
PSO
SOFTWARE METRICS
50
LO3 Acquire knowledge and skills in collecting and measuring software metrics
LO4 Learn how to analyze and interpret software metrics data to extract valuable insights
LO5 Gain the ability to evaluate software quality using appropriate metrics
Unit Contents No. of
Hours
Fundamentals of Measurement: Need for Measurement: Measurement 15
in Software Engineering, Scope of Software Metrics,
I The Basics of measurement: The representational theory of
measurement, Measurement and models, Measurement scales and
scale types, meaningfulness in measurement
A Goal-Based Framework For Software Measurement: Classifying 15
software measures, Determining what to Measure, Applying the
framework, Software measurement validation, Performing
II
SoftwareMeasurementValidation
Empirical investigation: Principles of Empirical Studies, Planning
Experiments, Planning case studies as quasi-experiments, Relevant
and Meaningful Studies
Software Metrics Data Collection: Defining good data, Data collection 15
for incident reports, How to collect data, Reliability of data collection
Procedures
III
Analyzing software measurement data: Statistical distributions and
hypothesis testing, Classical data analysis techniques, Examples of
simple analysis techniques
51
TOTAL 75
CO Course Outcomes
Understand various fundamentals of measurement and software metrics
CO1
CO2 Identify frame work and analysis techniques for software measurement
Apply internal and external attributes of software product for effort estimation
CO3
CO4 Use appropriate analytical techniques to interpret software metrics data and derive
meaningful insights
CO5 Recommend reliability models for predicting software quality
Textbooks
Software Metrics A Rigorous and Practical Approach, Norman Fenton, James
Bieman , Third Edition, 2014
Reference Books
2 Metric and models in software quality engineering, Stephen H.Kan, Second edition,
2002, Addison Wesley Professional
MAPPING TABLE
52
Weightage ofcourse
contributed to each
PSO 13 12 13 13 13 13
MACHINE LEARNING
53
Combining Multiple Learners: Generating Diverse Learners – Model 15
Combination Schemes – Voting – Bagging – Boosting – Stacked
IV Generalization – Fine-Tuning an Ensemble – Cascading Reinforcement
Learning: Elements of Reinforcement Learning – Model-Based Learning
– Temporal Difference Learning – Generalization – Partially Observable
States
Machine Learning with Python: Data Pre-processing, Analysis &
Visualization - Training Data and Test Data – Techniques – Algorithms:
V List of Common Machine Learning Algorithms- Decision Tree 15
Algorithm- Naïve Bayes Algorithm - K-Means-Random Forest-
Dimensionality Reduction Algorithm- Boosting Algorithms –
Applications: Social Media-Refinement of Search Engine Results-
Product Recommendations-Detection of Online frauds.
TOTAL 75
CO Course Outcomes
CO1 Outline the importance of machine learning in terms of designing intelligent machines
CO2 Identify suitable machine learning techniques for the real time applications
CO3 Analyze the theoretical concepts and how they relate to the practical aspects of machine
learning.
CO4 Assess the significance of principles, algorithms and applications of machine learning through a
hands-on approach
CO5 Compare the machine learning techniques with respective functionality
Textbooks
Ethem Alpaydın, “Introduction to Machine Learning” Third Edition, MIT, 2014. (Unit
I – Unit IV)
https://www.tutorialspoint.com/machine_learning_with_python/machine_learning_with
_python_tutorial.pdf (Unit V: Machine learning with python tutorial)
Reference Books
1. Bertt Lantz, "Machine Learning with R," Packt Publishing, 2013
54
. 2. https://searchenterpriseai.techtarget.com/definition/machine-learning-ML
Marks
Inst. Hours
Category
Credits
Subject Code Subject Name L T P S
External
Total
CIA
CC Network Security Core - 5 - - 4 5 25 75 100
Course Objectives
CO1 To familiarize on the model of network security, Encryption techniques
CO2 To understand the design concept of cryptography and authentication
CO3 To develop experiments on algorithm used for security
CO4 To understand about virus and threats, firewalls, and implementation of
Cryptography
No. of
UNIT Details
Hours
Model of network security – Security attacks, services
and attacks – OSI security architecture – Classical
encryption techniques – SDES – Block cipher
I 15
PrinciplesDES – Strength of DES – Block cipher
design principles – Block cipher mode of operation –
Evaluation criteria for AES – RC4 - Differential and
linear cryptanalysis – Placement of encryption function
– traffic confidentiality.
Number Theory – Prime number – Modular
arithmetic – Euclid’s algorithm - Fermet’s and
Euler’s theorem – Primality – Chinese remainder
II 15
theorem – Discrete logarithm – Public key
cryptography and RSA – Key distribution – Key
management – Diffie Hellman key exchange –
Elliptic curve cryptography
55
Authentication requirement – Authentication function –
III MAC – Hash function – Security of hash function and 15
MAC – SHA - HMAC – CMAC - Digital signature
and authentication protocols – DSS.
Authentication applications – Kerberos – X.509
IV Authentication services - E- mail security – IP security 15
- Web security
Intruder – Intrusion detection system – Virus and
V related threats – Countermeasures – Firewalls 15
design principles – Trusted systems – Practical
implementation of cryptography and security
Total 75
Course Outcomes
Course
On completion of this course, students will;
Outcomes
Understand public-key cryptography, RSA and other
CO1 public-key cryptosystems such as Diffie-Hellman Key
Exchange, ElGamal Cryptosystem.
CO2 Understand the security issues.
Apply key management and distribution schemes
CO3
design. User Authentication
Analyze and design hash and MAC algorithms, and
CO4 digital signatures. Analyze and design classical
encryption techniques and block ciphers.
1. CharlieKaufman,RadiaPerlman,MikeSpeciner,“NetworkSecurity,P
rivatecommunicationinpublicworld”,PHISecondEdition,2002
2. Bruce Schneier, Neils Ferguson, “Practical Cryptography”, Wiley Dreamtech
India Pvt Ltd, First Edition, 2003.
3. DouglasRSimson“Cryptography–
Theoryandpractice”,CRCPress,FirstEdition,1995
56
Web Resources
1. https://www.javatpoint.com/computer-network-security
https://www.tutorialspoint.com/information_security_cyber_law/network_security.ht m
2.
3. https://www.geeksforgeeks.org/network-security/
5 0 0 - 4 5 25 75 100
Learning Objectives
To provide the students with the basics of Android Software Development tools and
LO1
development of software on mobile platform.
Unit Contents No. of
Hours
Introduction to Android Operating System – Configuration of 15
Android Environment- Create the First Android Application.
Layout: Vertical, Vertical Scroll, horizontal, horizontal Scroll,
I Table Layout arrangement. Designing User Interface: Label
Text - TextView – Password Text Box - Button –ImageButton
– CheckBox – Image - RadioButton – Slider – Autocomplete
text View.
57
TOTAL 75
CO Course Outcomes
CO1 Chart the requirements needed for developing android application
CO2 Identify the results by executing the application in emulator or in android device
CO3 Apply proper interface setup, styles & themes, storing and management
CO4 Analyze the problem and add necessary user interface components, graphics and
multimedia components into the application.
CO5 Evaluate the results by implementing the concept behind the problem with proper code.
Textbooks
Karen Lang and Selim Tezel, (2022), Become an App Inventor The official
guide from MIT App Inventor, Miteen Press, Walker Books Limited.
Reference Books
Wei – Meng Lee, (2012), Beginning Android 4 Application Development,
Wiley India Edition.
. http://appinventor.mit.edu/explore/paint-pot-extended-camera
Inst. Marks
Subject Code L T P S Credits
Hours CIA External Total
5 0 0 VI 4 5 25 75 100
Learning Objectives
LO1 Learn how to analyze requirements and identify objects, classes, attributes, methods, and relationships
Gain proficiency in using Unified Modeling Language (UML) notations to represent and communicate
LO2
object-oriented analysis and design concepts
LO3 Develop a solid understanding of fundamental concepts of object-oriented programming and design,
58
including encapsulation, inheritance, polymorphism, abstraction, and object relationships
Unit Contents No. of Hours
SOFTWARE DEVELOPMENT AND PROCESS MODELS 15
Introduction to Software Development – Challenges – An Engineering Perspective –
Object Orientation –
Software Development Process – Iterative Development Process – Process Models –
Life Cycle Models –
Unified Process – Iterative and Incremental – Agile Processes
SOFTWARE DEVELOPMENT AND PROCESS MODELS
Introduction to Software Development – Challenges – An Engineering Perspective –
I
Object Orientation –
Software Development Process – Iterative Development Process – Process Models –
Life Cycle Models –
Unified Process – Iterative and Incremental – Agile Processes
Software Development and Process Models: Introduction to Software Development
– Challenges – An Engineering Perspective – Object Orientation – Software
Development Process – Iterative Development Process – Process Models – Life Cycle
Models- Unified Process – iterative and Incremental – Agile Processes.
Modeling OO Systems: Object Oriented Analysis : Coad-Yourdon, Object Oriented 15
Design: Booch, Hierarchical – Object Modeling Technique: Requirement Elicitation-
II Use Cases – SRS Document – Identification of Classes and Relationships, Identifying
State and Behaviour- Interaction Diagrams- Sequence Diagrams – Collaboration
Diagrams – Unified Modeling Language and Tools
Design Patterns: Design Principles – Design Patterns – GRASP-GoF- Dynamic 15
III
Object Modelling – Static Object Modeling
System Testing: Software Testing: Software Verification Techniques – Object 15
Oriented Checklist: Functional Testing- Structural Testing – Class Testing – Mutation
IV Testing – Level of Testing – Static and Dynamic Testing Tools – Software
Maintenance – Categories- Challenges of Software Maintenance- Maintenance of
Object Oriented Software – Regression Testing
Software Quality and Metrics: Need of Object Oriented Software Estimation – Lorenz
and Kidd Estimation – Use Case Points Method- Class Point Method- Object
V Oriented Function Point – Risk Management – Software Quality Models – Analyzing 15
the Metric Data – Metrics for Measuring Size and Structure – Measuring Software
Quality – Object Oriented Metrics
TOTAL 75
CO Course Outcomes
Recognize the concepts and principles of object-oriented analysis, design and
CO1 testing
Demonstrate the importance of system development process using various
CO2
approaches and choose the relevant technique for a system in each phases of SDLC
Differentiate various object-oriented analysis, design and testing methods and
CO3 models
Assess various analysis, design and testing strategies appropriate to build high- performance object-
CO4
oriented system
59
Design Object oriented systems using object modeling techniques and analyze
CO5 them for correctness and quality
Textbooks
Yogesh Singh, RuchikaMalhotra, : Object – Oriented Software Engineering:, PHI Learning Private
Limited, First Edition, 2012
Ivar Jacobson.Magnus Chriserson, PatrikLonsson, Gunnar Overgaard,” Object- oriented Software
Engineering, A Use Case Driven Approach”, Pearson Education, Seventh Impression, 2009
Reference Books
Craig Larman, “Applying UML and Patterns, an Introduction to Odject-Oriented Analysis and Design
1
and Iterative Development, Pearson Education, Third Edition, 2008
"Object-Oriented Analysis and Design with Applications" by Grady Booch, Robert A. Maksimchuk,
Michael W. Engle, Bobbi J. Young, Jim Conallen, and Kelli A. Houston. (3rd Edition) - Published by
2
Addison-Wesley Professional.
“Object-Oriented Analysis and Design" by Ali Bahrami. (3rd Edition) - Published by McGraw-Hill
3
Education.
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1. http://www.slideshare.net/helghareeb/object-oriented-analysis-and-design-12164752
2. http://www.uml-diagrams.org/uml-object-oriented-concepts.html
3. http://www.tutorialspoint.com/object_oriented_analysis_design/index.htm
4. https://www.mppmu.mpg.de/english/kluth_oo_intro.pdf
MAPPING TABLE
CO1 3 2 1 1 1 2
CO2 3 1 3 1 1 2
CO3 3 3 2 3 3 2
CO4 3 3 2 3 3 2
CO5 3 2 2 3 3 2
Weightage of course
contributed
to each PSO
15 11 10 11 11 10
60
ANNEXURE - I
Elective course – (EC1-EC8)-Discipline Specific Syllabus
Category
Code
Credits
Extern
Total
CIA
al
NATURAL LANGUAGE Elect 4 - - 3 25 75 100
PROCESSING
Learning Objectives
LO1 To understand approaches to syntax and semantics in NLP.
LO2 To learn natural language processing and to learn how to apply basic algorithms in
this field.
To understand approaches to discourse, generation, dialogue and summarization
LO3
within NLP.
Toget acquainted with the algorithmic description of the main language levels:
LO4
morphology, syntax, semantics, pragmatics etc.
LO5 To understand current methods for statistical approaches to machine translation.
UNIT Contents No. Of.
Hours
I Introduction : Natural Language Processing tasks in syntax, semantics,
and pragmatics – Issue- Applications – The role of machine learning – 12
Probability Basics –Information theory – Collocations -N-gram Language
Models – Estimating parameters and smoothing – Evaluating language
models.
II Word level and Syntactic Analysis:Word Level Analysis: Regular
Expressions-Finite-State Automata-Morphological Parsing-Spelling Error
Detection and correction-Words and Word classes-Part-of Speech 12
Tagging.Syntactic Analysis: Context-free Grammar-Constituency-
Parsing-Probabilistic Parsing.
III Semantic analysis and Discourse Processing: Semantic Analysis:
Meaning Representation-Lexical Semantics- Ambiguity-Word Sense
Disambiguation. Discourse Processing: cohesion-Reference Resolution- 12
Discourse Coherence and Structure.
IV Natural Language Generation: Architecture of NLG Systems-
Generation Tasks and Representations- Application of NLG. Machine
Translation: Problems in Machine Translation. Characteristics of Indian 12
Languages- Machine Translation Approaches-Translation involving
Indian Languages.
61
V Information retrieval and lexical resources: Information Retrieval:
Design features of Information Retrieval Systems-Classical, Non-
classical, Alternative Models of Information Retrieval – valuation Lexical 12
Resources: WorldNet-Frame NetStemmers- POS Tagger- Research
Corpora SSAS.
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Describe the fundamental concepts and techniques of PO1, PO2,
natural language processing. PO3, PO4,
CO1 PO5, PO6
Explain the advantages and disadvantages of different NLP
technologies and their applicability in different business situations.
Distinguish among the various techniques, taking into account PO1, PO2,
the assumptions, strengths, and weaknesses of each PO3, PO4,
CO2 PO5, PO6
Use NLP technologies to explore and gain a broad understanding
of text data.
Textbooks
1 Daniel Jurafsky, James H. Martin, “Speech & language processing”, Pearson
publications.
62
2 Allen, James. Natural language understanding. Pearson, 1995.
Reference Books
1. Pierre M. Nugues, “An Introduction to Language Processing with Perl and
Prolog”,Springer
Web Resources
1. https://en.wikipedia.org/wiki/Natural_language_processing
2. https://www.techtarget.com/searchenterpriseai/definition/natural-language-
processing-NLP
CO 1 3 3 3 3 3 3
CO 2 2 3 3 3 2 3
3 3 3 3 3 3
CO 3
CO 4 3 2 3 3 2 3
Credits
Code Exter
Total
CIA
nal
Learning Objectives
LO1 To understand the fundamentals of Cryptography
LO2 To acquire knowledge on standard algorithms used to provide confidentiality,
integrity and authenticity.
LO3 To understand the various key distribution and management schemes.
LO4 To understand how to deploy encryption techniques to secure data in transit across
data networks
LO5 To design security applications in the field of Information technology
UNIT Contents No. Of.
Hours
63
I Introduction: The OSI security Architecture – Security Attacks –
Security Mechanisms – Security Services – A model for network Security. 15
II Classical Encryption Techniques: Symmetric cipher model –
Substitution Techniques: Caesar Cipher – Monoalphabetic cipher – Play 15
fair cipher – Poly Alphabetic Cipher – Transposition techniques –
Stenography
III Block Cipher and DES: Block Cipher Principles – DES – The Strength 15
of DES –RSA: The RSA algorithm.
IV Network Security Practices: IP Security overview - IP Security
architecture – Authentication Header. Web Security: SecureSocket Layer 15
and Transport Layer Security – Secure Electronic Transaction.
V Intruders – Malicious software – Firewalls.
15
TOTAL HOURS 75
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Analyze the vulnerabilities in any computing system and hence be PO1, PO2,
CO1 able to design a security solution. PO3, PO4,
PO5, PO6
Apply the different cryptographic operations of symmetric PO1, PO2,
CO2 cryptographic algorithms PO3, PO4,
PO5, PO6
Apply the different cryptographic operations of public PO1, PO2,
CO3 cryptography key PO3, PO4,
PO5, PO6
Apply the various Authentication schemes to simulate different PO1, PO2,
CO4 applications. PO3, PO4,
PO5, PO6
Understand various Security practices and System security PO1, PO2,
CO5 standards PO3, PO4,
PO5, PO6
Textbooks
1 William Stallings, “Cryptography and Network Security Principles andPractices”.
Reference Books
1. Behrouz A. Foruzan, “Cryptography and Network Security”, Tata McGraw-Hill,
2007.
Web Resources
64
1 https://www.tutorialspoint.com/cryptography/
2 https://gpgtools.tenderapp.com/kb/how-to/introduction-to-cryptography
CO 1 3 3 3 2 3 2
CO 2 3 2 3 2 3 3
CO 3 3 3 3 2 3 3
CO 4 2 3 3 3 2 3
CO 5 3 2 3 3 3 3
Weightage of course 14 13 15 12 14 14
contributed to each
PSO
Code
Category
Credits
External
Total
CIA
Course Objective
C1 Understand the Big Data Platform and its Use cases, Map Reduce Jobs
C2 To identify and understand the basics of cluster and decision tree
C3 To study about the Association Rules, Recommendation System
C4 To learn about the concept of stream
C5 Understand the concepts of NoSQL Databases
UNIT Details No. of Course Objective
Hours
65
I Evolution of Big data — Best Practices for Big data 12 C1
Analytics — Big data characteristics — Validating —
The Promotion of the Value of Big Data — Big Data
Use Cases- Characteristics of Big Data Applications —
Perception and Quantification of Value -Understanding
Big Data Storage — A General Overview of High-
Performance Architecture — HDFS — MapReduce
and YARN — Map Reduce Programming Model
II Advanced Analytical Theory and Methods: Overview
of Clustering — K-means — Use Cases — Overview
of the Method — Determining the Number of Clusters
— Diagnostics — Reasons to Choose and Cautions .- 12 C2
Classification: Decision Trees — Overview of a
Decision Tree — The General Algorithm — Decision
Tree Algorithms — Evaluating a Decision Tree —
Decision Trees in R — Naïve Bayes — Bayes?
Theorem — Naïve Bayes Classifier.
III Advanced Analytical Theory and Methods: Association
Rules — Overview — Apriori Algorithm —
Evaluation of Candidate Rules — Applications of
Association Rules — Finding Association& finding 12 C3
similarity — Recommendation System: Collaborative
Recommendation- Content Based Recommendation —
Knowledge Based Recommendation- Hybrid
Recommendation Approaches.
66
IV Introduction to Streams Concepts — Stream Data
Model and Architecture — Stream Computing,
Sampling Data in a Stream — Filtering Streams —
Counting Distinct Elements in a Stream — Estimating
12 C4
moments — Counting oneness in a Window —
Decaying Window — Real time Analytics
Platform(RTAP) applications — Case Studies — Real
Time Sentiment Analysis, Stock Market Predictions.
Using Graph Analytics for Big Data: Graph Analytics
Total 60
Course Outcomes Programme Outcomes
CO On completion of this course, students will
1 Work with big data tools and its analysis techniques. PO1
67
1. David Loshin, “Big Data Analytics: From Strategic Planning to Enterprise
Integration with Tools, Techniques, NoSQL, and Graph”, Morgan Kaufmann/El
sevier Publishers, 2013
2. EMC Education Services, “Data Science and Big Data Analytics: Discovering,
Analyzing, Visualizing and Presenting Data”, Wiley publishers, 2015.
Web Resources
1. https://www.simplilearn.com
2. https://www.sas.com/en_us/insights/analytics/big-data-analytics.html
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Code
Category
Credits
External
Total
CIA
Course Objective
C1 Use of Devices, Gateways and Data Management in IoT.
C2 Design IoT applications in different domain and be able to analyze their performance
C3 Implement basic IoT applications on embedded platform
C4 To gain knowledge on Industry Internet of Things
C5 To Learn about the privacy and Security issues in IoT
UNIT Details No. of Course Objective
Hours
68
I IoT & Web Technology, The Internet of Things Today,
Time for Convergence, Towards the IoT Universe,
Internet of Things Vision, IoT Strategic Research and
Innovation Directions, IoT Applications, Future
12 C1
Internet Technologies, Infrastructure, Networks and
Communication, Processes, Data Management,
Security, Privacy & Trust, Device Level Energy Issues,
IoT Related Standardization, Recommendations on
Research Topics.
69
V Internet of Things Privacy, Security and Governance
Introduction, Overview of Governance, Privacy and
Security Issues, Contribution from FP7 Projects,
12 C5
Security, Privacy and Trust in IoT-Data-Platforms for
Smart Cities, First Steps Towards a Secure Platform,
Smartie Approach. Data Aggregation for the IoT in
Smart Cities, Security
Total 60
Course Outcomes Programme Outcomes
CO On completion of this course, students will
1 Work with big data tools and its analysis techniques. PO1
Reference Books
1. Michael Miller, “The Internet of Things: How Smart TVs, Smart Cars, Smart Homes,
and Smart Cities Are Changing the World”, kindle version.
Web Resources
1. https://www.simplilearn.com
2. https://www.javatpoint.com
70
3. https://www.w3schools.com
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Inst. Hours
Code
Category
Credits
External
Total
CIA
Human Computer Elective - Y - V 3 4 25 75 100
Interaction
Course Objective
C1 To learn about the foundations of Human Computer Interaction.
71
FOUNDATIONS OF HCI :
The Human: I/O channels – Memory
Interactive Design:
Basics – process – scenarios
12
Navigation: screen design Iteration and prototyping.
HCI in software process:
Software life cycle – usability engineering – Prototyping in
practice – design rationale. Design rules: principles, standards,
guidelines, rules. Evaluation Techniques – Universal Design
III
MODELS AND THEORIES:
HCI Models : Cognitive models:- Socio-Organizational issues
12
and stakeholder requirements Communication and collaboration
models-Hypertext, Multimedia and WWW.
IV Mobile HCI:
Mobile Ecosystem: Platforms, Application frameworks
Types of Mobile Applications: Widgets, Applications, Games
12
Mobile Information Architecture, Mobile 2.0,
Mobile Design: Elements of Mobile Design, Tools. - Case
Studies
V WEB INTERFACE DESIGN: Designing Web Interfaces – Drag &
Drop, Direct Selection, Contextual Tools, Overlays, Inlays and Virtual 12
Pages, Process Flow - Case Studies
Total 60
Course Outcomes Programme Outcome
CO On completion of this course, students will
72
1 Understand the fundementals of HCI. PO1
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 S S
CO 3 S S
CO 4 S S S
CO 5 S S
Inst. Hours
Code
Category
Credits
External
Total
CIA
Fuzzy Logic Elective Y - - V 3 4 25 75 100
Course Objective
CO1 To understand the basic concept of Fuzzy logic
CO2 To learn the various operations on relation properties
CO3 To study about the membership functions
CO4 To learn about the Defuzzification and Fuzzy Rule-Based System
CO5 To learn the concepts of Applications of Fuzzy Logic
UNIT Details No. of Course Objective
Hours
I Introduction to Fuzzy Logic- Fuzzy Sets- Fuzzy Set
12
Operations, Properties of Fuzzy Sets, Classical and C1
Fuzzy Relations: Introduction-Cartesian Product of
Relation-Classical Relations-Cardinality of Crisp
Relation.
74
IV Defuzzification: Introduction, Lambda Cuts for Fuzzy
12
Sets, Lambda Cuts for Fuzzy Relations, Defuzzification C4
Methods, Fuzzy Rule-Based System: Introduction,
Formation of Rules, Decomposition of Rules,
Aggregation of Fuzzy Rules, Properties of Set of Rules.
Total
Course Outcomes Programme Outcomes
CO On completion of this course, students will
1 Understand the basics of Fuzzy sets, operation and PO1
properties.
2 Apply Cartesian product and composition on Fuzzy
relations and usethe tolerance and Equivalence PO1, PO2
relations.
Reference Books
1. Guanrong Chen and Trung Tat Pham- Introduction to Fuzzy Sets, Fuzzy Logic
and Fuzzy Control Systems
2. https://www.guru99.com/what-is-fuzzy-logic.html
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Learning Objectives
LO1 To define and highlight importance of software project management.
LO2 To formulate and define the software management metrics & strategy in managing projects
LO3
LO4 Understand to apply software testing techniques in commercial environment
Unit Contents No. of
Hours
Introduction to Competencies - Product Development Techniques - 12
I Management Skills - Product Development Life Cycle - Software
Development Process and models - The SEI CMM - International
Organization for Standardization.
76
Managing Domain Processes - Project Selection Models - Project 12
Portfolio Management - Financial Processes - Selecting a Project
II Team - Goal and Scope of the Software Project -Project Planning -
Creating the Work Breakdown Structure - Approaches to Building
a
WBS - Project Milestones - Work Packages - Building a WBS for
Software.
Tasks and Activities - Software Size and Reuse Estimating - The 12
SEI CMM - Problems and Risks - Cost Estimation - Effort
III Measures - COCOMO: A Regression Model - COCOMO II -
SLIM: A Mathematical Model - Organizational Planning - Project
Roles and Skills Needed.
Project Management Resource Activities - Organizational Form and 12
Structure - Software Development Dependencies - Brainstorming -
IV Scheduling Fundamentals - PERT and CPM - Leveling Resource
Assignments - Map the Schedule to a Real Calendar - Critical
Chain
Scheduling.
Quality: Requirements – The SEI CMM - Guidelines - Challenges -
V Quality Function Deployment - Building the Software Quality
Assurance - Plan - Software Configuration Management: Principles - 12
Requirements - Planning and Organizing - Tools - Benefits - Legal
Issues in Software - Case Study
TOTAL 60
CO Course Outcomes
CO1 Understand the principles and concepts of project management
CO2 Knowledge gained to train software project managers
CO5 Evaluate and mitigate risks associated with software development process
Textbooks
Robert T. Futrell, Donald F. Shafer, Linda I. Safer, “Quality Software Project
Management”, Pearson Education Asia 2002.
Reference Books
1. Pankaj Jalote, “Software Project Management in Practice”, Addison Wesley 2002.
2. Hughes, “Software Project Management”, Tata McGraw Hill 2004, 3rd Edition.
NOTE: Latest Edition of Textbooks May be Used
Web Resources
77
1. NPTEL & MOOC courses titled Software Project Management
2. www.smartworld.com/notes/software-project-management
MAPPING TABLE
CO1 3 2 1 2 2 2
CO2 3 1 3 2 2 2
CO3 2 3 2 3 3 3
CO4 3 3 2 3 3 2
CO5 2 2 2 3 3 3
Weightage of
course contributed
to eachPSO 13 11 10 13 13 12
Inst. Hours
Code
Category
Credits
External
Total
CIA
Image Processing Elective - Y - - 3 4 25 75 100
Course Objective
C1 To learn fundamentals of digital image processing.
C2 To learn about various 2D Image transformations
C3 To learn about various image enhancement processing methods and filters
C4 To learn about various classification of Image segmentation techniques
C5 To learn about various image compression techniques
UNIT Details No. of
Hours
Digital Image Fundamentals: Image representation - Basic relationship
between pixels, Elements of DIP system -Applications of Digital Image
78
II 2D Image transforms: Properties of 2D-DFT - Walsh transform -
Hadamard transform- Haar transform- Discrete Cosine Transform- 12
Karhunen-Loeve Transform -Singular Value Decomposition
III
Image Enhancement: Spatial domain methods- Point processing-
Intensity transformations - Histogram processing- Spatial filtering- 12
smoothing filter- Sharpening filters - Frequency domain methods: low
pass filtering, high pass Filtering- Homomorphic filter.
Web Resources
79
1. https://kanchiuniv.ac.in/coursematerials/Digital%20image%20processing%20-
Vijaya%20Raghavan.pdf
2. http://sdeuoc.ac.in/sites/default/files/sde_videos/Digital%20Image%20Processing%203
rd%20ed.%20-%20R.%20Gonzalez%2C%20R.%20Woods-ilovepdf-compressed.pdf
3. https://dl.acm.org/doi/10.5555/559707
4. https://www.ijert.org/image-processing-using-web-2-0-2
Mapping with Programme Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 S S
CO 3 S S
CO 4 S S S
CO 5 S S
Marks
Inst. Hours
Category
Credits
Total
CIA
80
Information Security Elective Y - - - 3 4 25 75 100
Course Objectives
CO1 To know the objectives of information security
81
Security in Networks : Threats in networks,
Network Security Controls – Architecture,
Encryption, Content Integrity, Strong
V 12 CO5
Authentication, Access Controls, Wireless
Security, Honeypots, Traffic flow security. Web
Security: Web security considerations, Secure
Socket Layer and Transport Layer Security,
Secure electronic transaction
Total 60
Course Outcomes
References Books
(Latest editions, and the style as given below must be strictly adhered to)
82
2. Cryptography and Network Security : Forouzan Mukhopadhyay, Mc Graw
Hill, 2"d Edition
3. Information Security, Principles and Practice: Mark Stamp, Wiley India
4. Principles of Computer Sceurity: WM.Arthur Conklin, Greg White, TMH
Web Resources
https://www.geeksforgeeks.org/what-is-information-security/
1.
https://www.tutorialspoint.com/what-is-information- security#:~:text=Information
%20security%20is%20designed%20and,destruction%2C%20 alteration%2C%20and
2. %20disruption.
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
S-Strong(3) M-Medium (2) L-Low (1)
ct
Credits
Extern
Code
Total
CIA
al
Learning Objectives
LO2 Identify and apply appropriate algorithms for analyzing the healthcare, Human
resource, hospitality and tourism data.
LO3 Make choices for a model for new machine learning tasks.
83
LO4 To identify employees with high attrition risk.
LO5 To Prioritizing various talent management initiatives for your organization.
UNI No. Of.
T Contents Hours
I Healthcare Analytics : Introduction to Healthcare Data Analytics-
Electronic Health Records– Components of EHR- Coding Systems-
Benefits of EHR- Barrier to Adopting HER Challenges-Phenotyping
12
Algorithms. Biomedical Image Analysis and Signal Analysis- Genomic
Data Analysis for Personalized Medicine. Review of Clinical Prediction
Models.
II Healthcare Analytics Applications : Applications and Practical Systems
for Healthcare– Data Analytics for Pervasive Health- Fraud Detection in
Healthcare- Data Analytics for Pharmaceutical Discoveries- Clinical 12
Decision Support Systems- Computer- Assisted Medical Image Analysis
Systems- Mobile Imaging and Analytics for Biomedical Data.
III HR Analytics: Evolution of HR Analytics, HR information systems and
data sources, HR Metric and HR Analytics, Evolution of HR Analytics;
HR Metrics and HR Analytics; Intuition versus analytical thinking; 12
HRMS/HRIS and data sources; Analytics frameworks like LAMP,
HCM:21(r) Model.
TOTAL HOURS 60
Course Outcomes Programme
Outcomes
CO On completion of this course, students will
Understand and critically apply the concepts and methods of PO1, PO2,
CO1 business analytics PO3, PO4,
PO5, PO6
Identify, model and solve decision problems in different settings. PO1, PO2,
CO2 PO3, PO4,
PO5, PO6
Interpret results/solutions and identify appropriate courses of PO1, PO2,
CO3 action for a given managerial situation whether a problem or an PO3, PO4,
opportunity. PO5, PO6
84
Create viable solutions to decision making problems. PO1, PO2,
CO4 PO3, PO4,
PO5, PO6
Instill a sense of ethical decision-making and a commitment to the PO1, PO2,
CO5 long-run welfare of both organizations and the communities they PO3, PO4,
serve. PO5, PO6
Textbooks
1 Chandan K. Reddy and Charu C Aggarwal, “Healthcare data analytics”, Taylor &
Francis, 2015.
2 Edwards Martin R, Edwards Kirsten (2016),“Predictive HR Analytics: Mastering the
HR Metric”, Kogan Page Publishers, ISBN-0749473924
3 Fitz-enzJac (2010), “The new HR analytics: predicting the economic value of your
company’s human capital investments”, AMACOM, ISBN-13: 978-0-8144-1643-3
4 RajendraSahu, Manoj Dash and Anil Kumar. Applying Predictive Analytics Within
the Service Sector.
Reference Books
1. Hui Yang and Eva K. Lee, “Healthcare Analytics: From Data to Knowledge to
Healthcare Improvement, Wiley, 2016
2. Fitz-enzJac, Mattox II John (2014), “Predictive Analytics for Human Resources”,
Wiley, ISBN- 1118940709.
Web Resources
1. https://www.ukessays.com/essays/marketing/contemporary-issues-in-marketing-
marketing-essay.php
2. https://yourbusiness.azcentral.com/examples-contemporary-issues-marketing-field-
26524.html
Inst. Hours
Code
Category
Credits
External
Total
CIA
Grid Computing Elective - Y - - 3 4 25 75 100
Course Objective
C1 To learn the basic construction and application of Grid computing.
C2 To learn grid computing organization and their Role.
C3 To learn Grid Computing Anotomy.
C4 To learn Grid Computing road map.
C5 To learn various type of Grid Architecture.
UNIT Details No. of
Hours
Introduction: Early Grid Activity, Current Grid Activity, Overview of
I Grid Business areas, Grid Applications, Grid Infrastructures. 12
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 S S
CO 3 S S
CO 4 S S S
CO 5 S S
87
S-Strong M-Medium L-Low
Inst. Hours
Category
Credits
External
Total
CIA
Cyber Forensics Y - - - 3 4 25 75 100
Elective
Course Objective
C1 Understand the definition of computer forensics fundamentals.
C2 To study about the Types of Computer Forensics Evidence
C3 Understand and apply the concepts of Duplication and Preservation of Digital Evidence
C4 Understand the concepts of Electronic Evidence and Identification of Data
C5 To study about the Digital Detective, Network Forensics Scenario, Damaging Computer
Evidence.
UNIT Details No. of Course Objective
Hours
I Overview of Computer Forensics Technology:
Computer Forensics Fundamentals: What is Computer
Forensics? Use of Computer Forensics in Law
Enforcement, Computer Forensics Assistance to Human
Resources/Employment Proceedings, Computer Forensics
Services, Benefits of professional Forensics Methodology, 12 C1
88
Recovery: Data Recovery Defined, Data Back–up and
Recovery, The Role of Back –up in Data Recovery, The
Data –Recovery Solution. Evidence Collection and Data
Seizure: Collection Options, Obstacles, Types of
Evidence, The Rules of Evidence, Volatile Evidence,
General Procedure, Collection and Archiving, Methods of
Collections, Artefacts, Collection Steps, Controlling
Contamination: The chain of custody.
III Duplication and Preservation of Digital Evidence:
Processing steps, Legal Aspects of collecting and
Preserving Computer forensic Evidence. Computer image
12 C3
Verification and Authentication: Special needs of
Evidential Authentication, Practical Consideration,
Practical Implementation.
89
5 Gain your knowledge of duplication and preservation of
PO3, PO8
digital evidence.
Text Book
1 John R. Vacca, “Computer Forensics: Computer Crime Investigation”, 3/E ,Firewall Media,
New Delhi, 2002.
Reference Books
1. Nelson, Phillips Enfinger, Steuart,“Computer Forensics and Investigations” Enfinger, Steuart,
CENGAGE Learning, 2004.
2. Anthony Sammes and Brian Jenkinson,”Forensic Computing: A Practitioner's Guide”,
Second Edition, Springer–Verlag London Limited, 2007.
3. .Robert M.Slade,” Software Forensics Collecting Evidence from the Scene of a Digital Crime”,
TMH 2005.
Web Resources
1. https://www.vskills.in
2. https://www.hackingarticles.in/best-of-computer-forensics-tutorials/
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Credits
External
Total
CIA
90
CO1 To learn the fundamentals of Pattern Recognition techniques
CO2 To learn the various Statistical Pattern recognition techniques
CO3 To learn the linear discriminant functions and unsupervised learning and clustering
CO4 To learn the various Syntactical Pattern recognition techniques
CO5 To learn the Neural Pattern recognition techniques
UNIT Details No. of Course Objective
Hours
I PATTERN RECOGNITION OVERVIEW: Pattern
recognition, Classification and Description-Patterns and 12 CO1
feature Extraction with Examples-Training and Learning in
PR systems-Pattern recognition Approaches
II STATISTICAL PATTERN RECOGNITION: Introduction
to statistical Pattern Recognition-supervised Learning using 12 CO2
Parametric and Non-Parametric Approaches.
III LINEAR DISCRIMINANT FUNCTIONS AND
UNSUPERVISED LEARNING AND CLUSTERING:
Introduction-Discrete and binary Classification Problems- 12 CO3
Techniques to directly Obtain linear Classifiers -
Formulation of Unsupervised Learning Problems-Clustering
for unsupervised learning and classification
IV SYNTACTIC PATTERN RECOGNITION: Overview of
Syntactic Pattern Recognition-Syntactic recognition via
parsing and other grammars–Graphical Approaches to 12 CO4
syntactic pattern recognition-Learning via grammatical
inference.
V NEURAL PATTERN RECOGNITION: Introduction to
Neural Networks-Feedforward Networks and training by 12 CO5
Back Propagation-Content Addressable Memory Approaches
and Unsupervised Learning in Neural PR
Total 60
Course Outcomes Programme Outcomes
CO On completion of this course, students will
1 understand the concepts, importance, application and the
PO1
process of developing Pattern recognition over view
2 to have basic knowledge and understanding about
PO1, PO2
parametric and non-parametric related concepts.
3 To understand the framework of frames and bit images to
PO4, PO6
animations
4 Speaks about the multimedia projects and stages of
PO4, PO5, PO6
requirement in phases of project.
5 Understanding the concept of cost involved in multimedia
PO3, PO8
planning, designing, and producing
91
92
Text Book
1 Robert Schalkoff, “Pattern Recognition: Statistical Structural and Neural Approaches”, John
wiley & sons.
2 Duda R.O., P.E.Hart & D.G Stork, “ Pattern Classification”, 2nd Edition, J.Wiley.
3 Duda R.O.& Hart P.E., “Pattern Classification and Scene Analysis”, J.wiley.
4 Bishop C.M., “Neural Networks for Pattern Recognition”, Oxford University Press.
Reference Books
1. 1. Earl Gose, Richard johnsonbaugh, Steve Jost, “Pattern Recognition and Image Analysis”,
Prentice Hall of India, Pvt Ltd, New Delhi.
Web Resources
1. https://www.geeksforgeeks.org/pattern-recognition-introduction/
2. https://www.mygreatlearning.com/blog/pattern-recognition-machine-learning/
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Code
Category
Credits
External
Total
CIA
93
Course Objective
C1 To learn various concepts of AI Techniques.
C2 To learn various Search Algorithm in AI.
C3 To learn probabilistic reasoning and models in AI.
C4 To learn about Markov Decision Process.
C5 To learn various type of Reinforcement learning.
UNIT Details No. of
Hours
Introduction: Concept of AI, history, current status, scope, agents,
I environments, Problem Formulations, Review of tree and graph 15
structures, State space representation, Search graph and Search tree
II Search Algorithms : Random search, Search with closed and open list,
Depth first and Breadth first search, Heuristic search, Best first search, 15
A* algorithm, Game Search
III
Probabilistic Reasoning : Probability, conditional probability, Bayes
Rule, Bayesian Networks- representation, construction and inference, 15
temporal model, hidden Markov model.
94
Techniques.
Text Book
Stuart Russell and Peter Norvig, “Artificial Intelligence: A Modern Approach” , 3rd
1 Edition, Prentice Hall.
Elaine Rich and Kevin Knight, “Artificial Intelligence”, Tata McGraw Hill
Reference Books
Trivedi, M.C., “A Classical Approach to Artifical Intelligence”, Khanna Publishing
1.
House, Delhi.
2. Saroj Kaushik, “Artificial Intelligence”, Cengage Learning India, 2011
David Poole and Alan Mackworth, “Artificial Intelligence: Foundations for
3. Computational Agents”, Cambridge University Press 2010
Web Resources
1. NPTEL&MOOCcoursestitledArtificialIntelligenceandExpertSystems
2. https://nptel.ac.in/courses/106106140/
3.
https://nptel.ac.in/courses/106106126/
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 S S
CO 3 S S
CO 4 S S S
CO 5 S S
Code
Category
Credits
External
Total
CIA
96
IV Path Planning: Introduction, path planning-overview-
road map path planning-cell decomposition path
planning potential field path planning-obstacle
avoidance-case studies
15 CO4
Vision system: Robotic vision systems-image
representation-object recognition-and categorization-
depth measurement- image data compression-visual
inspection-software considerations
97
2 SaeedB.Nikku, Introduction to robotics, analysis, control and applications, Wiley-
India, 2 nd edition 2011
Reference Books
1. Industrial robotic technology-programming and application by M.P.Groover et.al,
McGrawhill2008
2. Robotics technology and flexible automation by S.R.Deb, THH-2009
Web Resources
1. https://www.tutorialspoint.com/artificial_intelligence/artificial_intelligence_r
obotics.htm
2. https://www.geeksforgeeks.org/robotics-introduction/
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Annexure II
Suggested topics in Skill Enhancement(SEC1-SEC8) Course
Credits
Code
Exter
Total
CIA
nal
Learning Objectives
98
LO1 Understand basic concepts and terminology of information technology.
LO2 Have a basic understanding of personal computers and their operation
LO3 Be able to identify data storage and its usage
LO4 Get great knowledge of software and its functionalities
LO5 Understand about operating system and their uses
UNIT Contents No. Of.
Hours
I Introduction to Computers:
Introduction, Definition, .Characteristics of computer, Evolution of
Computer, Block Diagram Of a computer, Generations of Computer, 6
Classification Of Computers, Applications of Computer, Capabilities
and limitations of computer
II Basic Computer Organization:
Role of I/O devices in a computer system. Input Units: Keyboard,
Terminals and its types. Pointing Devices, Scanners and its types,
Voice Recognition Systems, Vision Input System, Touch Screen, 6
Output Units: Monitors and its types. Printers: Impact Printers and its
types. Non Impact Printers and its types, Plotters, types of plotters,
Sound cards, Speakers.
III Storage Fundamentals:
Primary Vs Secondary Storage, Data storage & retrieval methods.
Primary Storage: RAM ROM, PROM, EPROM, EEPROM. Secondary 6
Storage: Magnetic Tapes, Magnetic Disks. Cartridge tape, hard disks,
Floppy disks Optical Disks, Compact Disks, Zip Drive, Flash Drives
IV Software:
Software and its needs, Types of S/W. System Software: Operating
System, Utility Programs Programming Language: Machine Language, 6
Assembly Language, High Level Language their advantages &
disadvantages. Application S/W and its types: Word Processing, Spread
Sheets Presentation, Graphics, DBMS s/w
V Operating System:
Functions, Measuring System Performance, Assemblers, Compilers
and Interpreters.Batch Processing, Multiprogramming, Multi 6
Tasking, Multiprocessing, Time Sharing, DOS, Windows, Unix/Linux.
TOTAL HOURS 30
Develop organizational structure using for the devices present currently PO1, PO2, PO3,
CO2
PO4, PO5, PO6
under input or output unit.
CO3 Concept of storing data in computer using two header namely RAM and PO1, PO2, PO3,
ROM with different types of ROM with advancement in storage basis. PO4, PO5, PO6
99
CO4 Work with different software, Write program in the software and PO1, PO2, PO3,
applications of software. PO4, PO5, PO6
CO5 Usage of Operating system in information technology which really acts PO1, PO2, PO3,
as a interpreter between software and hardware. PO4, PO5, PO6
Textbooks
1 Anoop Mathew, S. Kavitha Murugeshan (2009), “ Fundamental of Information Technology”,
Majestic Books.
2 Alexis Leon, Mathews Leon,” Fundamental of Information Technology”, 2nd Edition.
3 S. K Bansal, “Fundamental of Information Technology”.
Reference Books
1. Bhardwaj Sushil Puneet Kumar, “Fundamental of Information Technology”
2. GG WILKINSON, “Fundamentals of Information Technology”, Wiley-Blackwell
3. A Ravichandran , “Fundamentals of Information Technology”, Khanna Book Publishing
Web Resources
1. https://testbook.com/learn/computer-fundamentals
2. https://www.tutorialsmate.com/2020/04/computer-fundamentals-tutorial.html
3. https://www.javatpoint.com/computer-fundamentals-tutorial
4. https://www.tutorialspoint.com/computer_fundamentals/index.htm
5. https://www.nios.ac.in/media/documents/sec229new/Lesson1.pdf
CO 1 3 3 3 3 3 3
CO 2 3 3 3 3 3 3
CO 3 3 3 3 3 3 3
CO 4 3 3 3 3 2 3
CO 5 3 3 2 3 3 2
Weightage of course 15 15 14 15 14 14
contributed to each
PSO
100
redits
Subject
Exter
Total
CIA
gory
nal
Code
UNDERSTANDING 2 - - 2 25 75 100
SEC INTERNET
Learning Objectives
LO1 Knowledge of Internet medium
LO2 Internet as a mass medium
LO3 Features of Internet Technology,
LO4 Internet as source of infotainment
LO5 Study of internet audiences and about cyber crime
UNIT Contents No. Of.
Hours
I The emergence of internet as a mass medium – the world of ‘world wide web’. 6
II Features of internet as a technology. 6
III Internet as a source of infotainment – classification based on content and style. 6
IV Demographic and psychographic descriptions of internet ‘audiences’ – effect
6
of internet onthe values and life-styles.
V Present issues such as cyber crime and future possibilities. 6
TOTAL HOURS 30
CO Course Outcomes
Knows the basic concept in HTML
CO1 Concept of resources in HTML
Knows Design concept.
CO2 Concept of Meta Data
Understand the concept of save the files.
Textbooks
1 “Mastering HTML5 and CSS3 Made Easy”, TeachUComp Inc., 2014.
2
Thomas Michaud, “Foundations of Web Design: Introduction to HTML & CSS”
Web Resources
1. https://www.teachucomp.com/samples/html/5/manuals/Mastering-HTML5-CSS3.pdf
2. https://www.w3schools.com/html/default.asp
101
Mapping with Programme Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 M S M M L
CO 2 S M S M
CO 3 S S S L
CO 4 S L M M
CO 5 M S M S
Multimedia Lab
102
Manipulating Images: Transforming Images - Using The Image Tools - 6
Adjusting Colors - Working with Text - Painting in Gimp: Creating
new brushes - Enhancing Photos - Exploring Filters and Effects.
II Exercises:
1. Design Front Cover for a Book.
2. Create a customized logo
3. Use clone tool to remove text from an image
4. Remove Red eye using Filter.
TOTAL 30
CO Course Outcomes
CO1 Demonstrate understanding and use of multimedia fundamentals
CO3 Solve various design and implementation issues materialize on the development
of multimedia systems
CO4 Assess different Photo Editing, Video Editing and animation tools and select the
appropriate tool based on the requirements
CO5 Design and develop Multimedia Projects
Textbooks
1. Jason Van Gumster& Robert Shimonski (2010), “GIMP Bible”, Wiley,
2nd edition.
2. Chris Gover, 2010, “Flash CS5: The missing Manual”, 1st Edition, O‟ Reilly
India.
103
Reference Books
1 Juan Manuel Ferreyra (2011), “GIMP 2.6 Cookbook”, PACK publishing Ltd.
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 M S M M L
CO 2 S M S M
CO 3 S S M L
CO 4 S L M M
CO 5 M S M S
Credits
Inst.
Exter
Total
CIA
nal
Course Objective
C1 Understand the basics of HTML and its components
Total 60
105
3 Ability to optimize page styles and layout with Cascading
PO3, PO5
Style Sheets (CSS).
4 Ability to develop a java script PO1, PO2, PO3, PO7
Text Book
2 Mike Mcgrath, “Java Script”, Dream Tech Press 2006, 1st Edition.
Reference Books
1. Laura Lemay, RafeColburn , Jennifer Kyrnin, “Mastering HTML, CSS &Javascript Web
Publishing”, 2016.
2. DT Editorial Services (Author), “HTML 5 Black Book (Covers CSS3, JavaScript, XML,
XHTML, AJAX, PHP, jQuery)”, Paperback 2016, 2nd Edition.
Web Resources
2. https://www.geeksforgeeks.org
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S M L M
CO 2 S M L M
CO 3 S M
CO 4 S M M L
CO 5 M L M
106
Code
External
Total
CIA
SEC SoftwareTesting - Y - - - 2 2 25 75 100
Course Objective
C1 To study fundamental concepts in software testing
C2 To discuss various software testing issues and solutions in software unit test, integration and
system testing.
C3 To study the basic concept of Data flow testing and Domain testing.
C4 To Acquire knowledge on path products and path expressions.
C5 To learn about Logic based testing and decision tables
UNIT Details No. of Hours Course
Objective
I Introduction: Purpose–Productivity and Quality in Software–
TestingVsDebugging–Model for Testing–Bugs–Types of 6
Bugs – Testing and Design Style. C1
Total 30
107
3 Have an ability understand and identify various software
testing problems, and solve these problems by designing PO4, PO6
and selecting software test models, criteria, strategies, and
methods.
4 Have basic understanding and knowledge
of contemporary issues in software testing, such as PO4, PO5, PO6
component-based software testing problems
5 Have an ability to use software testing methods and
PO3, PO8
modern software testing tools for their testing projects.
Text Book
1 B.Beizer,“SoftwareTestingTechniques”,IIEdn.,DreamTechIndia,NewDelhi,2003.
2 K.V.K.Prasad,“SoftwareTestingTools”,DreamTech.India,NewDelhi,2005
Reference Books
1. I.Burnstein,2003,“PracticalSoftwareTesting”,SpringerInternationalEdn.
2. E. Kit, 1995, “Software Testing in the Real World: Improving the Process”,
PearsonEducation,Delhi.
3. R. Rajani,andP.P.Oak,2004,“SoftwareTesting”,TataMcgrawHill,New
Delhi.
Web Resources
1. https://www.javatpoint.com/software-testing-tutorial
2. https://www.guru99.com/software-testing.html
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
108
Code
External
Total
CIA
SEC PHP - Y 2 2 25 75 100
PROGRAMMING
Course Objective
C1 To provide the necessary knowledge on basics of PHP.
C2 To design and develop dynamic, database-driven web applications using PHP version.
C3 To get an experience on various web application development techniques.
C4 To learn the necessary concepts for working with the files using PHP.
C5 To get a knowledge on OOPS with PHP.
UNIT Details No. of Course
Hours Objectives
Introduction to PHP -Basic Knowledge of websites -Introduction of
I Dynamic Website -Introduction to PHP -Scope of PHP -XAMPP 6 CO1
and WAMP Installation
PHP Programming Basics -Syntax of PHP -Embedding PHP in
HTML -Embedding HTML in PHP.
II Introduction to PHP Variable -Understanding Data Types -Using 6 CO2
Operators -Using Conditional Statements -If(), else if() and else if
condition Statement.
Switch() Statements -Using the while() Loop -Using the for() Loop
PHP Functions.
III PHP Functions -Creating an Array -Modifying Array Elements - 6 CO3
Processing Arrays with Loops - Grouping Form Selections with
Arrays -Using Array Functions.
PHP Advanced Concepts -Reading and Writing Files -Reading Data
IV 6 CO4
from a File.
Managing Sessions and Using Session Variables -Destroying a
V Session -Storing Data in Cookies -Setting Cookies. 6 CO5
Total 30
2. DT Editorial Services (Author), “HTML 5 Black Book (Covers CSS3, JavaScript, XML,
XHTML, AJAX, PHP, jQuery)”, Paperback 2016, 2ndEdition.
Web Resources
1. Refer MOOC Courses like NPTEL and SWAYAM
2. https://www.w3schools.com/php/default.asp
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S S M L
CO 2 M S L
CO 3 M L S
CO 4 M S L S
CO 5 S L M
Credits
External
Total
CIA
Course Objective
C1 Understand the basics of computer systems and its components.
C2 Understand and apply the basic concepts of a word processing package.
C3 Understand and apply the basic concepts of electronic spreadsheet software.
C4 Understand and apply the basic concepts of database management system.
C5 Understand and create a presentation using PowerPoint tool.
UNIT Details No. of
110
Hours
I Introductory concepts: Memory unit– CPU-Input Devices: Key board, Mouse
and 6
Scanner.Outputdevices:Monitor,Printer.IntroductiontoOperatingsystems&itsfea
tures:DOS– UNIX–Windows. IntroductiontoProgrammingLanguages.
II Word Processing: Open, Save and close word document; Editing text –
tools, formatting, bullets;SpellChecker - Document formatting – Paragraph
alignment, indentation, headers and footers,numbering;printing– 6
Preview,options,merge.
III Spreadsheets:Excel–
opening,enteringtextanddata,formatting,navigating;Formulas– 6
entering,handlingand copying;Charts–creating,formatting and
printing,analysistables,preparationoffinancialstatements,introductiontodataa
nalytics
IV Database Concepts: The concept of data base management system; Data
field, records, and files,Sorting and indexing data; Searching records.
Designing queries, and reports; Linking of datafiles; Understanding 6
Programming environment in DBMS; Developing menu drive
applicationsinquerylanguage(MS–Access).
Total 30
111
Mapping with Programme Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 M S M M L
CO 2 S M S M
CO 3 S S M L
CO 4 S L M M
CO 5 M S M S
Inst. Hours
Category
Credits
External
Total
CIA
SEC Quantitative Aptitude - Y - - - 2 2 25
75 100
Course Objective
C1 To understand the basic concepts of numbers
C2 Understand and apply the concept of percentage, profit & loss
C3 To study the basic concepts of time and work, interests
C4 To learn the concepts of permutation, probability, discounts
C5 To study about the concepts of data representation, graphs
UNIT Details No. of Course
Hours Objective
I Numbers-HCF and LCM of numbers-Decimal fractions-
Simplification-Squareroot and cuberoots - Average- 6 CO1
problems on Numbers.
II Problems on Ages - Surds and Indices - percentage -
profits and loss - ratio and proportion-partnership- 6 CO2
Chainrule.
III Time and work - pipes and cisterns - Time and Distance
- problems on trains -Boats and streams - simple interest 6 CO3
- compound interest - Logarithms - Area-Volume and
surfacearea -races and Gamesofskill.
112
IV Permutation and combination-probability-True
Discount-Bankers Discount – Height and Distances- 6 CO4
Oddmanout & Series.
V Calendar - Clocks - stocks and shares - Data
representation - Tabulation - BarGraphs-Piecharts- 6 CO5
Linegraphs.
Total 60
Course Outcomes Programme Outcome
2. https://www.toppr.com/guides/quantitative-aptitude/
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Inst. Hours
Category
Credits
External
Total
CIA
SEC Multimedia Systems - Y - - - 2 2 25 75 100
Course Objective
C1 Understand the basics of Multimedia
C2 To study about the Image File Formats,Sounds Audio File Formats
C3 Understand the concepts of Animation and DigitalVideoContainers
C4 To study about the Stage of Multimedia Project
C5 Understand the concept of OwnershipofContentCreatedforProjectAcquiringTalent
UNIT Details No. of Course
Hours Objective
I Multimedia Definition-Use Of Multimedia-
Delivering Multimedia- Text:About Fonts and Faces 12
C1
- Using Text in Multimedia -Computers and Text
Font Editing and DesignTools-
HypermediaandHypertext.
II Images: Plan Approach - Organize Tools - Configure
Computer Workspace -Making Still Images - Color -
Image File Formats. Sound: The Power of Sound - 12
DigitalAudio-MidiAudio-Midivs.DigitalAudio- C2
MultimediaSystemSounds Audio File Formats -
Vaughan's Law of Multimedia Minimums - Adding
SoundtoMultimediaProject
III Animation:The Power of Motion-Principles of
Animation-Animation by Computer - Making
Animations that Work. Video: Using Video - C3
12
Working with Video and Displays-
DigitalVideoContainers-ObtainingVideo Clips –
ShootingandEditingVideo
IV Making Multimedia: The Stage of Multimedia Project -
The Intangible Needs -The Hardware Needs - The Software 12
Needs - An Authoring Systems Needs- C4
MultimediaProductionTeam.
V PlanningandCosting:TheProcessofMakingMultimedi
a-Scheduling-Estimating - RFPs and Bid Proposals.
Designing and Producing - Content 12
andTalent:AcquiringContent- C5
OwnershipofContentCreatedforProject-
AcquiringTalent
114
Total 60
Course Outcomes Programme Outcomes
CO On completion of this course, students will
1 understand the concepts, importance, application and
PO1
the process of developing multimedia
2 to have basic knowledge and understanding about image
PO1, PO2
related processings
3 To understand the framework of frames and bit images to
PO4, PO6
animations
4 Speaks about the multimedia projects and stages of
PO4, PO5, PO6
requirement in phases of project.
5 Understanding the concept of cost involved in multimedia
PO3, PO8
planning, designing, and producing
Text Book
1 TayVaughan,"Multimedia:MakingItWork",8thEdition,Osborne/McGraw-
Hill,2001.
Reference Books
1. RalfSteinmetz&KlaraNahrstedt"MultimediaComputing,Communication&Applica
tions",PearsonEducation,2012.
Web Resources
1. https://www.geeksforgeeks.org/multimedia-systems-with-features-or-characteristics/
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
115
Marks
Inst. Hours
Category
Credits
Subject Code Subject Name L T P S
External
Total
CIA
SEC Biometrics - Y - - - 2 2 25
75 100
Course Objectives
No. of Course
UNIT Details
Hours Objectives
Introduction: What is Biometrics, History,Types of
biometric Traits, General architecture of biometric
systems, Basic working of biometric matching, Biometric
system error and performance measures, Design of
biometric system, Applications of biometrics, Biometrics
I 6 CO1
versus traditional authentication methods.
Face Biometrics: Introduction, Background of Face
Recognition, Design of Face Recognition System,
Neural Network for Face Recognition, Face Detection in
Video Sequences, Challenges in Face Biometrics, .7 Face
Recognition Methods, Advantages and Disadvantages.
116
Privacy Enhancement Using Biometrics: Introduction,
Privacy Concerns Associated with Biometric Deployments,
Identity and Privacy, Privacy Concerns, Biometrics with
Privacy Enhancement, Comparison of Various Biometrics
in Terms of Privacy, Soft Biometrics.
III 6 CO3
Multimodal Biometrics: Introduction to Multimodal
Biometrics , Basic Architecture of Multimodal Biometrics,
Multimodal Biometrics Using Face and Ear, Characteristics
and Advantages of Multimodal Biometrics, Characteristics
and Advantages of Multimodal Biometrics.
WatermarkingTechniques: Introduction, Data Hiding
Methods, Basic Framework of Watermarking,
Classification of Watermarking, Applications of
Watermarking, Attacks on Watermarks, Performance
IV Evaluation, Characteristics of Watermarks, General 6 CO4
Watermarking Process, Image Watermarking Techniques,
Watermarking Algorithm, Experimental Results, Effect of
Attacks on Watermarking Techniques, Attacks on Spatial
Domain Watermarking.
Scope and Future: Scope and Future Market of
Biometrics, Biometric Technologies, Applications of
Biometrics, Biometrics and Information Technology
Infrastructure, Role of Biometrics in Enterprise Security,
Role of Biometrics in Border Security, Smart Card
V Technology and Biometrics, Radio Frequency 6 CO5
Identification (RFID) Biometrics, DNA Biometrics,
Comparative Study of Various Biometric Techniques.
Biometric Standards: Introduction, Standard
Development Organizations, Application Programming
Interface (API), Information Security and Biometric
Standards, Biometric Template Interoperability.
Total 30
Course Outcomes
Course
On completion of this course, students will;
Outcomes
117
CO4 To get analyticalidea on Watrmarking Techniques PO1, PO2, PO3, PO7
References Books
Guide to Biometrics by Ruud M. Bolle , SharathPankanti, Nalinik.Ratha, Andrew
1.
W.Senior, Jonathan H. Connell , Springer 2009
2. Introduction to Biometrics by Anil k. Jain, Arun A. Ross, KarthikNandakumar
Web Resources
1. https://www.tutorialspoint.com/biometrics/index.htm
2. https://www.javatpoint.com/biometrics-tutorial
https://www.thalesgroup.com/en/markets/digital-identity-and-
3.
security/government/inspired/biometrics
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S M L M
CO 2 S M L M
CO 3 S M
CO 4 S M M L
CO 5 M L M
Course Objectives
CO1 To understand the basic concepts, Evolution and Benefits of ERP.
118
CO2 To know the need and Role of ERP in logical and Physical Integration.
Identify the important business functions provided by typical business software such
CO3
as enterprise resource planning and customer relationship managemen
To train the students to develop the basic understanding of how ERP enriches the
CO4
business organizations in achieving a multidimensional growth
To aim at preparing the students technological competitive and make them ready to
CO5
self-upgrade with the higher technical skills
No. of Course
UNIT Details
Hours Objectives
ERP Introduction, Benefits, Origin, Evolution and Structure:
I Conceptual Model of ERP, the Evolution of ERP, the 6 CO1
Structure of ERP, Components and needs of ERP, ERP
Vendors; Benefits & Limitations of ERP Packages.
Need to focus on Enterprise Integration/ERP; Information
mapping; Role of common shared Enterprise database;
System Integration, Logical vs. Physical System Integration,
II Benefits & limitations of System Integration, ERP’s Role in 6 CO2
Logical and Physical Integration. Business Process
Reengineering, Data ware Housing, Data Mining, Online
Analytic Processing (OLAP), Product Life Cycle Man-
agement (PLM), LAP, Supply chain Management.
ERP Marketplace and Marketplace Dynamics: Market
Overview, Marketplace Dynamics, the Changing ERP
Market. ERP- Functional Modules: Introduction, Functional
III Modules of ERP Software, Integration of ERP, Supply chain 6 CO3
and Customer Relationship Applications. Cloud and Open
Source, Quality Management, Material Management,
Financial Module, CRM and Case Study.
ERP Implementation Basics, , ERP implementation
IV Strategy, ERP Implementation Life Cycle ,Pre- 6 CO4
Implementation task,Role of SDLC/SSAD, Object Oriented
Architecture, Consultants, Vendors and Employees.
ERP & E-Commerce, Future Directives- in ERP, ERP and
V Internet, Critical success and failure factors, Integrating ERP 6 CO5
into or-ganizational culture. Using ERP tool: either SAP or
ORACLE format to case study.
Total 30
C
Marks
I
119
External
Total
CIA
Subject Code Subject Name L T P S
Course
Outcomes
Course
On completion of this course, students will;
Outcomes
CO1 Understand the basic concepts of ERP. PO1, PO2, PO6
CO2 Identify different technologies used in ERP PO2, PO3, PO8
Understand and apply the concepts of ERP Manufacturing
CO3 PO1, PO3, PO7
Perspective and ERP Modules
CO4 Discuss the benefits of ERP PO2, PO6
CO5 Apply different tools used in ERP PO1, PO3, PO8
Reference Text :
1. Enterprise Resource Planning – Alexis Leon, Tata McGraw Hill.
References :
1. Enterprise Resource Planning – Diversified by Alexis Leon, TMH.
2. Enterprise Resource Planning – Ravi Shankar & S. Jaiswal , Galgotia
Web Resources
https://www.tutorialspoint.com/management_concepts/enterprise_resource_planning.htm
1.
https://www.saponlinetutorials.com/what-is-erp-systems-enterprise-resource-planning/
2.
3. https://www.guru99.com/erp-full-form.html
4. https://www.oracle.com/in/erp/what-is-erp/
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 M L M
CO 2 M S L M
CO 3 L M M
120
CO 4 M L M
CO 5 M L M S
Marks
Inst. Hours
Category
Credits
Subject Code Subject Name L T P O
External
Total
CIA
SEC -
Organizational Behaviour Y - - - 2 2 25 75 100
Learning Objectives
CLO1 To have extensive knowledge onOB and the scope of OB.
CLO2 To create awareness of Individual Benaviour.
CLO3 To enhance the understanding of Group Behaviour
CLO4 To know the basics of Organisaitonal Culture and Organisational Structure
CLO5 To understand Organisational Change, Conflict and Power
Details No. of Learning
UNIT
Hours Objectives
INTRODUCTION : Concept of Organizational Behavior
(OB): Nature, Scope and Role of OB: Disciplines that
I contribute to OB; Opportunities for OB (Globalization, Indian 6 CLO1
workforce diversity, customer service, innovation and change,
networked organizations, work-life balance, people skills,
positive work environment, ethics)
INDIVIDUAL BEHAVIOUR:
1. Learning, attitude and Job satisfaction: Concept of learning,
conditioning, shaping and reinforcement. Concept of attitude,
components, behavior and attitude. Job satisfaction:
II causation; impact of satisfied employees on workplace. 6 CLO2
121
Briggs Type Indicator (MBTI); Big Five model. Relevance of
values; Linking personality and values to the workplace
(person-job fit, person-organization fit)
4. Perception, Decision Making : Perception and Judgements;
Factors; Linking perception to individual decision making:
Course
On Completion of the course the students will Program Outcomes
Outcomes
To define OrganisationalBehaviour, Understand the
CO1 PO1, PO2, PO6, PO7
opportunity through OB.
To apply self-awareness, motivation, leadership and learning
CO2 PO2,PO4. PO5, PO6
theories at workplace.
To analyze the complexities and solutions of group PO1, PO2, PO4, PO5,
CO3
behaviour. PO6
To impact and bring positive change in the culture of the PO2, PO3, PO4 PO5,
CO4
organisaiton. PO8
PO1, PO2, PO5 PO6,
CO5 To create a congenial climate in the organization.
PO8
Reading List
NeharikaVohra Stephen P. Robbins, Timothy A. Judge , Organizational Behaviour,
1.
Pearson Education, 18th Edition, 2022.
2. Fred Luthans, Organizational Behaviour, Tata McGraw Hill, 2017.
122
Ray French, Charlotte Rayner, Gary Rees & Sally Rumbles, Organizational Behaviour,
3.
John Wiley & Sons, 2011
Louis Bevoc, Allison Shearsett, Rachael Collinson, Organizational Behaviour Reference,
4.
Nutri Niche System LLC (28 April 2017)
Dr. Christopher P. Neck, Jeffery D. Houghton and Emma L. Murray, Organizational
5. Behaviour: A Skill-Building Approach, SAGE Publications, Inc; 2nd edition (29 November
2018).
References Books
Uma Sekaran, Organizational Behaviour Text & cases, 2nd edition, Tata McGraw Hill
1.
Publishing CO. Ltd
GangadharRao, Narayana, V.S.P Rao, Organizational Behaviour 1987, Reprint 2000,
2.
Konark Publishers Pvt. Ltd, 1st edition
3. S.S. Khanka, Organizational Behaviour, S. Chand & Co, New Delhi.
4. J. Jayasankar, Organizational Behaviour, Margham Publications, Chennai, 2017.
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
Marks
Inst. Hours
Category
Credits
Total
CIA
123
Generates computer simulation technologies and techniques, lays the groundwork for
students to comprehend computer simulation requirements, and implements and tests a
CO1 variety of simulation and data analysis libraries and programmes. This course focuses on
what is required to create simulation software environments rather than just simulations
using pre-existing packages
CO2 Discuss the concepts of modelling layers of critical infrastructure networks in society.
CO3 Create tools for viewing and controlling simulations and their results.
CO4 Understand the concept of Entity modelling, Path planning
CO5 To learn about the Algorithms and Modelling.
Course
UNIT Details No. of Hours
Objectives
Introduction To Modeling & Simulation – What is
I 6 CO1
Modeling and Simulation? – Complexity Types – Model
Types – Simulation Types – M&S Terms and Definitions
Input Data Analysis – Simulation Input Modeling – Input
Data Collection - Data Collection Problems - – Input
Modeling Strategy - Histograms -Probability
Distributions - Selecting a Probability Distribution.
124
Comparing Systems via Simulation – Introduction –
Comparison Problems - Comparing Two Systems -
Screening Problems - Selecting the Best - Comparison
with a Standard - Comparison with a Fixed Performance
III 6 CO3
Discrete Event Simulations – Introduction - Next-Event
Time Advance - Arithmetic and Logical Relationships -
Discrete-Event Modeling Approaches – Event-
Scheduling Approach – Process Interaction Approach.
Total 30
Course Outcomes
Course
On completion of this course, students will; Programme Outcomes
Outcomes
Introduction To Modeling & Simulation, Input Data
CO1 PO1
Analysis and Modeling.
Random Variate and Number Generation. Analysis of
CO2 PO1, PO2
Simulations and methods.
125
CO3 Comparing Systems via Simulation PO4, PO6
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8
CO 1 S
CO 2 M S
CO 3 S S
CO 4 S S M
CO 5 S S
S-Strong(3) M-Medium (2) L-Low (1)
VIRTUAL REALITY
Marks
Subject Inst.
L T P S Credits Tota
Code Hours CIA External
l
SEC 2 - - - 2 2 25 75 100
Learning Objectives
LO1 To provide knowledge on basic principles of virtual & augmented reality
126
LO2 To have the ability to use its technology as a platform for real-world applications.
Unit Contents No. of Hours
Virtual Reality: The Three I’s of VR – History – Early commercial
I VR Technology – Components of a VR System –Input Devices: 6
Trackers – Navigation and Manipulation Interfaces – Gesture
Interfaces
Output Devices: Graphics Displays – Sound Displays – Haptic 6
II Feedback - Computer Architecture for VR: The Rendering Pipeline-
PC Graphics Architecture - VR Programming: Toolkits and Scene
Graphs – Traditional and Emerging Applications of VR
Augmented Reality: Introduction – Augmented Reality Concepts: 6
III Working Principle of AR –Concepts related to AR- Ingredients of
an Augmented Reality Experience
Augmented Reality Hardware– Augmented Reality Software– 6
IV Software to create content for AR Application – Tools and
Technologies
Augmented Reality Content: Introduction- Creating Content for 6
V Visual, Audio, and other senses – Interaction in AR - Mobile
Augmented Reality: Introduction – Augmented Reality
Applications Areas- Collaborative Augmented Reality
TOTAL 30
CO Course Outcomes
CO3 Use suitable hardware and software technologies for different varieties of virtual and
augmented reality applications
CO4 Analyze and explain the behavior of VR and AR technology relates to human perception and
cognition
CO5 Assess the importance of VR/AR content and interactions to implement for the real-world
problem
Textbooks
1. Grigore C. Burdea and Philippe Coiffet, “Virtual Reality Technology”, Wiley Student
Edition , Second Edition (Unit I: Chapter 1,2 & Unit II: Chapter 3,4,6,8 & 9)
2. Alan B. Craig(2013), “Understanding Augmented Reality: Concepts and Applications”(Unit
III: Chapter 1, 2, Unit IV : Chapter 3, 4 & Unit V: Chapter 5,6,8)
3. Jon Peddie (2017), “Augmented Reality: Where We Will All Live”, Springer, Ist Edition
(Unit IV: Chapter 7 (Tools & Technologies)
Reference Books
Alan Craig & William R. Sherman & Jeffrey D. Will, Morgan Kaufmann(2009),
1. “Developing Virtual Reality Applications: Foundations of Effective Design”,
Elsevier( Morgan Kaufmann Publishers)
127
2. Paul Mealy (2018), “Virtual and Augmented Reality”, Wiley
3. Bruno Arnaldi & Pascal Guitton & Guillaume Moreau(2018), “Virtual Reality and
Augmented Reality: Myths and Realities”, Wiley
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1. http://msl.cs.uiuc.edu/vr/
2. http://www.britannica.com/technology/virtual-reality/Living-in -virtual-worlds
3. https://mobidev.biz/blog/augmented-reality-development-guide
MAPPING TABLE
CO1 3 2 2 3 3 2
CO2 3 3 2 3 3 2
CO3 3 3 3 3 3 2
CO4 3 3 2 3 3 2
CO5 3 3 2 3 3 2
Weightage of course
15 14 11 15 15 10
contributed to each PSO
COMPUTER GRAPHICS
Marks
Subject Inst.
L T P S Credits Tota
Code Hours CIA External
l
SEC 2 - - VI 2 2 25 75 100
Learning Objectives
To analyze the various components of a graphics system and to familiarize the building
LO
approach of graphics system components and algorithms related to them
Unit Contents No. of Hours
A survey of computer graphics – Overview of Graphics Systems: Video
I display devices: Refresh Cathode Ray tubes, Raster-scan display, 6
Random-scan display, Color CRT Monitors, Direct-view Storage tubes,
128
Flat Panel Display – Raster scan systems- Random scan systems - Input
Devices.
Output Primitives: Points and lines - Line Drawing Algorithm:
II DDAAttributes of Output Primitives: Line Attributes-Curve Attributes- 6
Color and Grayscale levels – Area Fill Attributes-Character Attributes.
Two-dimensional Geometric Transformations: Basic Transformations –
III Matrix Representations – Homogeneous coordinates-Two-Dimensional 6
Viewing: Viewing Pipeline Clipping Operations
Graphical User Interfaces and Interactive Input Methods: The User
dialogue - Input of graphical data. Three-dimensional concepts: Three-
IV 6
Dimensional Display methods – Three-Dimensional Geometric and
Modeling Transformations: Translation, Rotation, Scaling, and Other
Visible- Surface Detection Methods– Color Models and Color
Applications: Properties of light – Intuitive Color Concepts – RGB
V 6
color model – YIQ color model – Computer Animation: Design of
Animation Sequences – Motion Specifications
TOTAL 30
CO Course Outcomes
Explain different graphics systems with its applications and computer animation
CO1
basics with design
Outline the computer graphics core concepts including viewing, clipping,
CO2
modeling and transformation in two and three dimensions
CO3 Select various algorithms for drawing and filling objects
Apply geometric transformations on graphics objects, clipping methods and its
CO4
transformation to graphics display device
Assess the projections and visible surface detection techniques for display of 3D
CO5
scene on 2D screen
Textbooks
Donold Hearn, M.Pauline Baker (2004), ―Computer Graphics - C Version‖ - Second
1.
Edition, Pearson Education.
Reference Books
W.M.Newmann and R.F.Sproull (1979), ―Principles of Interactive Computer Graphics‖,
1.
McGrow Hill.
129
2. Foley, Van Dan, Feiner, Hughes (2000), ―Computer Graphics‖ - Addison Wesley.
NOTE: Latest Edition of Textbooks May be Used
Web Resources
1 https://www.dgp.toronto.edu/~hertzman/418notes.pdf
2 http://www.tutorialspoint.com/computer_graphics/computer_graphics_tutorial.pdf
MAPPING TABLE
CO1 3 2 1 2 1 1
CO2 3 2 1 2 1 1
CO3 3 3 1 2 1 1
CO4 3 3 1 2 1 1
CO5 3 3 1 2 1 1
Weightage of
course contribute d
to each PO/PSO
15 13 5 10 5 5
130