Draft Syllabus Booklet - BTech CSE 2024-28
Draft Syllabus Booklet - BTech CSE 2024-28
Duration: 04 Years
Batch: 2024-2028
PEO Statements
M1 M2 M3
PEO1 1 2 1
PEO2 2 3 3
PEO3 3 1 2
PO2: Problem analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of mathematics,
natural sciences, and engineering sciences.
PO5: Modern tool usage: Create, select, and apply appropriate techniques, resources, and
modern engineering and IT tools including prediction and modeling to complex engineering
activities with an understanding of the limitations.
PO6: The engineer and society: Apply reasoning informed by the contextual knowledge to
assess societal, health, safety, legal and cultural issues and the consequent responsibilities
relevant to the professional engineering practice.
PO7: Environment and sustainability: Understand the impact of the professional engineering
solutions in societal and environmental contexts, and demonstrate the knowledge of, and need
for sustainable development.
PO8: Ethics: Apply ethical principles and commit to professional ethics and responsibilities
and norms of the engineering practice.
PO11: Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as a member and
leader in a team, to manage projects and in multidisciplinary environments.
PO12: Life-long learning: Recognize the need for, and have the preparation and ability to
engage in independent and life-long learning in the broadest context of technological change.
PSO1: Analyse a complex problem and propose its solution using various computer system
concepts.
PSO3: Foster the field of computing by taking a deep dive into its latest trends and going
through new research & development activities.
Mapping of POs/PSOs to PEOs:
PEO Statements
PO1 3 2
PO2 3 1
PO3 2 3
PO4 3 1
PO5 1 3 2
PO6 2
PO7 2 2
PO8 2
PO9 3 2
PO10 2 1
PO11 2
PO12 2 3
PSO1 3 2 1
PSO2 2 3 1
PSO3 1 2 3
Semester: II
S. No. Course Name Course Credit L T P
Code
1 Object Oriented
CSET109 6 3 1 4
Programming using Java
2 Digital Design CSET105 4 3 0 2
3 Discrete Mathematical
CSET106 4 3 1 0
Structures
4 Linear Algebra and
Ordinary Differential EMAT102L 4 3 1 0
Equations
5 New Age Life Skills CSET103 2 2 0 0
6 Introduction to Electrical
and Electronics CSET102 4 2 1 2
Engineering
Total Credits 22 14 4 8
Semester: III
S. No. Course Name Course Credit L T P
Code
1 Information Management
CSET201 4 3 0 2
Systems
2 Data Structures using C++ CSET243 7 3 1 6
4 Probability and Statistics CSET240 5 3 1 2
5 Software Engineering CSET205 4 3 0 2
6 Specialization Core - I 4 3 0 2
Total Credits 24 15 2 14
Semester: IV
S. No. Course Name Course Credit L T P
Code
1 Microprocessors and
CSET203 4 3 0 2
Computer Architecture
2 Design and Analysis of
CSET244 7 3 1 6
Algorithms
3 Computer Networks CSET207 4 3 0 2
4 Ethics for Engineers,
Patents, Copyrights and CSET208 1 1 0 0
IPR
5 Operating Systems CSET209 4 3 0 2
6 Design Thinking &
CSET210 2 0 0 4
Innovation
7 Specialization Core - II 4 3 0 2
Total Credits 26 16 1 18
*For AI Specialization students CSET301 will run in sem IV and (Specialization
Core-II+CSET208) will run in Semester V
1 Refresher Course for CSET398
Industry Career
Semester: V
S. No. Course Name Course Credit L T P
Code
1 Artificial Intelligence and
CSET301 5 3 0 4
Machine Learning
2 Automata Theory and
CSET302 4 3 1 0
Computability
3 High Performance
CSET305 4 3 0 2
Computing
4 Seminar on Special Topics
CSET303 1 0 1 0
in Emerging Areas
5 Competitive Programming CSET304 2 0 0 4
6 Specialization Elective - I 3 2 0 2
7 Elective - II 3 2 0 2
8 Open Elective - I 3 3 0 0
Total Credits 25 16 2 14
Semester: VI
S. No. Course Name Course Credit L T P
Code
1 Undergraduate Research in CSET306
Computer Science 1 0 1 0
Engineering
2 HSS - Elective 3 3 0 0
3 Specialization Elective –
3 2 0 2
III
4 Elective - IV 3 2 0 2
5 Open Elective - II 3 3 0 0
6 Elective - V 3 2 0 2
7 Open Elective-III 3 3 0 0
Total Credits 19 15 1 6
1 Summer Internship CSET399
Semester: VII
S. No. Course Name Course Credit L T P
Code
1 Capstone Project CSET402 6 0 0 12
2 Specialization Elective –
3 2 0 2
VI
3 Open Elective - IV 3 3 0 0
Total Credits 12 5 0 14
OR
1 Professional Practical 12 0 0 24
CSET497
Internship
Semester: VIII
S. No. Course Name Course Credit L T P
Code
1 Industrial Project/R&D CSET499 12 0 0 24
Project/Start-up Project
Total Credits 12 0 0 24
Specialization Core I and II
S. No. Course Name Specialization Course Code Credit L T P
1 Statistical Machine 4 3 0 2
AI-1 CSET211
Learning
2 Blockchain Foundations Blockchain-1 CSET212 4 3 0 2
3 Linux and Shell 4 3 0 2
Cyber Security-1 CSET213
Programming
4 Data Analysis using 4 3 0 2
Data Science-1 CSET214
Python
5 Graphics and Visual 4 3 0 2
Gaming-1 CSET215
Computing
6 UI/UX Design for Human 4 3 0 2
CSE-1 CSET216
Computer Interface
7 Software Development 4 3 0 2
DevOps-1 CSET217
with DevOps
8 Full Stack Development Full Stack-1 CSET218 4 3 0 2
9 Quantum Computing Quantum 4 3 0 2
CSET219
Foundations Computing-1
10 Unmanned Aerial 4 3 0 2
Drones-1 CSET220
Vehicles
11 Robotic Process 4 3 0 2
RPA-1 CSET221
Automation Essentials
12 Microcontrollers, 4 3 0 2
Robotics & Embedded IOT-1 CSET222
Systems
13 Augmented Reality 4 3 0 2
AR & VR -1 CSET223
Foundations
14 Product Design Principles 4 3 0 2
PDT-1 CSET238
and Practices
15 Cloud 4 3 0 2
Cloud Computing CSET224
Computing-1
16 Fundamentals in Swift 4 2 0 4
Mobile
Programming CSET241
Technology - 1
17 UX Design Foundations UI/UX -1 CSET245 4 3 0 2
18 Cloud Computing CSE-2 CSET224 4 3 0 2
19 Intelligent Model Design 4 3 0 2
AI-2 CSET225
using AI
20 Blockchain Engineering Blockchain-2 CSET226 4 3 0 2
21 System and Network 4 3 0 2
Cyber Security-2 CSET227
Security
22 Data Mining and 4 3 0 2
Data Science-2 CSET228
Predictive Modelling
23 Game Engine and 4 3 0 2
Gaming-2 CSET229
Architecture
24 DevOps Practices and 4 3 0 2
DevOps-2 CSET230
Principles
25 Programming 4 3 0 2
Methodologies for Full Stack-2 CSET231
Backend Development
26 Design of Cloud Cloud 4 3 0 2
CSET232
Architectural Solutions Computing-2
27 Machine Learning with Quantum 4 3 0 2
CSET233
Quantum Computing Computing-2
28 Drone Remote Sensing Drones-2 CSET234 4 3 0 2
29 Digital Bots Development RPA-2 CSET235 4 3 0 2
30 IoT Networks and 4 3 0 2
IOT-2 CSET236
Protocols
31 VR and 360 Video 4 3 0 2
AR & VR -2 CSET237
Production
32 Product Design 4 3 0 2
PDT-2 CSET239
Architecture and Delivery
33 Advance Swift Mobile 4 2 0 4
CSET242
Programming Technology - 2
34 UI/UX Design for Human 4 3 0 2
UI/UX -2 CSET246
Computer Interface
Elective-I, III, VI
Specialization Electives: Artificial Intelligence
Course
S. No. Course Name Credit L T P
Code
Advanced Computer
1 Vision and Video CSET340 3 2 0 2
Analytics
2 Cognitive Modelling CSET341 3 2 0 2
Probability and Random
3 CSET342 3 2 0 2
Processes
4 AI in Healthcare CSET343 3 2 0 2
Image and Video
5 CSET344 3 2 0 2
Processing
Information Retrieval and
6 CSET345 3 2 0 2
Search Engine
Natural Language
7 CSET346 3 2 0 2
Processing
8 Social Network Analysis CSET347 3 2 0 2
9 Reinforcement Learning CSET348 3 2 0 2
Special Topics in Artificial
10 CSET349 3 2 0 2
Intelligence
Emerging Topics in
11 CSET417 3 2 0 2
Artificial Intelligence
Introduction to Generative
12 CSET419 3 2 0 2
Artificial Intelligence
Advanced Topics in
13 Generative Artificial CSET424 3 2 0 2
Intelligence
Generative AI and Large
14 SCSE3042 3 2 0 2
Language Models on AWS
Prompt Engineering for
15 SCSE3043 3 2 0 2
Generative AI
Specialization Electives: Blockchain
Course
S. No. Course Name Credit L T P
Code
1 VR Gaming CSET375 3 2 0 2
2 Augmented Reality CSET337 3 2 0 2
Game Mechanics and
3 CSET377 3 2 0 2
Game Physics
Game Programming with
4 CSET378 3 2 0 2
HTML5
5 AI for Games CSET379 3 2 0 2
Animation and Rendering
6
Techniques
CSET380 3 2 0 2
Pixel and Poly Arts for
7 CSET440 3 2 0 2
Games
Game Design,
8 Development and CSET441 3 2 0 2
Programming
9 Special Topics in Gaming CSET442 3 2 0 2
Emerging Topics in
10 CSET413 3 2 0 2
Gaming
Specialization Electives: Robotic Process Automation
S. No. Course Name Course Credit L T P
Code
1 Digital Process
CSET443 3 1 0 4
Automation Architecture
2 Enterprise Process
CSET444 3 2 0 2
Automation Frameworks
3 Cloud Infrastructure and
CSET358 3 2 0 2
Services
4 Continuous Integration
and Deployment in CSET445 3 2 0 2
DevOps
5 Server-Side Development
Frameworks: Express and CSET446 3 2 0 2
Spring
Course
S. No. Course Name Credit L T P
Code
1 Drone Communication CSET467 3 2 0 2
Drone Applications,
2 CSET468 3 2 0 2
Components and Assembly
3 UAV Simulation CSET469 3 2 0 2
4 Drone Swarming CSET470 3 2 0 2
UAV Mission Planning and
5 CSET471 3 2 0 2
Deployments
6 Auto Pilot and Flight Control CSET472 3 2 0 2
Special Topics in Drone
7 CSET473 3 2 0 2
Technology
Emerging Topics in Drone
8 CSET408 3 2 0 2
Technology
Course
S. No. Course Name Credit L T P
Code
Quantum Computing for Data
1 CSET474 3 2 0 2
Analysis
2 Quantum Information Theory CSET475 3 2 0 2
Quantum Computer
3 CSET476 3 2 0 2
Architecture
4 Quantum Cryptography CSET477 3 2 0 2
Special Topics in Quantum
5 CSET478 3 2 0 2
Computing
Cloud Infrastructure and
6 CSET358 3 2 0 2
Services
Security and Privacy for Big
7 CSET356 3 2 0 2
Data Analytics
Emerging Topics in Quantum
8 CSET407 3 2 0 2
Computing
Course
S. No. Course Name Credit L T P
Code
Robotics: Dynamics and
1 CSET479 3 2 0 2
Controls
2 IoT Analytics CSET480 3 2 0 2
3 IoT: Security and Attacks CSET420 3 2 0 2
4 Device Level IoT Security CSET361 3 2 0 2
5 Humanoids CSET421 3 2 0 2
6 Mobile IoT Networks CSET422 3 2 0 2
7 Special Topics in IoT CSET423 3 2 0 2
Emerging Topics in IoT and
8 CSET406 3 2 0 2
Robotics
Specialization Electives: Augmented & Virtual Reality
Course
S. No. Course Name Credit L T P
Code
Augmented Reality and
1 CSET425 3 2 0 2
ARCore
Animation and Rendering
2 CSET380 3 2 0 2
Techniques
3D Models for Augmented and
3 CSET376 3 2 0 2
Virtual Reality
Building Social VR with 3D
4 CSET426 3 2 0 2
Characters
Virtual Reality: Interface,
5 CSET427 3 2 0 2
Application and Design
6 Special Topics in AR and VR CSET428 3 2 0 2
Emerging Topics in
7 CSET405 3 2 0 2
Augmented & Virtual Reality
HSS Electives
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 3 2 2 3
CO2 2 2 3 2 3 2 1 2
CO3 3 3 3 2 3 2 2
Course Contents:
Why Python, Applications of Python, Versions of Python, Number system, Binary, Octal, Literals,
Variables, Data types, Operators, Control Structures if/else/elif, Nested if/else, Lists/Nested Lists,
Tuple.
Iterative Control, while loop, For loop, Range, Break, Continue, Pass, Nested Loops, Loop inside if,
List Operations, List comprehension, Membership operator, Functions, Default argument, required
arguments, keyword argument, variable arguments, Function invoking, Nested functions, Lambda
functions, Map Reduce, Recursive Functions, Factorial, GCD using Euclid Algorithm, Dictionary
Operations, Sets, Enumerators.
String Operations, Slicing, File Handling, Exception Handling, Modules, Namespaces, Local, Global,
and Built-in Namespaces, Object Oriented Programming, Classes and Objects, Encapsulation, Data
abstraction, Inheritance, Polymorphism, Interactive Graphics, Displaying Images, Generating Colors,
Graphics Objects, Entry Objects, Turtle, Tkinter, Working with Widgets, Controlling Layout with
Geometry Managers, Events and Event Handlers, Developing Interactive applications.
The lab component of this course is designed to introduce online-coding tools such as
Microsoft Azure, Colab to the students and provide hands-on experience with the concepts
taught in the lectures.
Text Books :
1. Dierbach, Charles. Introduction to computer science using python: A computational problem-
solving focus. Wiley Publishing, 2012. ISBN 9789332584686.
Reference Books :
1. Martinez, D. and Jesús, S. D, Applied Computational Thinking with Python: Design Algorithmic
Solutions for Complex and Challenging Real-world Problems. Packt Publishing, 2021. ISBN
89351507314.
Name of Program Bachelor of Technology (Computer Science Engineering)
EMAT101L Engineering Calculus L T P C
Owning School/Department School of Computer Science Engineering and 3 1 0 4
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 3 2 2 3
CO2 2 3 3 3 2
CO3 3 3 3 2 3 2 2
Course Contents:
The Real Number System, Archimedean Property, Convergence of a Sequence, Monotone Sequences,
Cauchy Criterion, Bolzano-Weierstrass Theorem, Limit inferior and Limit Superior. Infinite Series,
Convergence Tests and Alternating series. Limit, Continuity, Existence of Maxima,Intermediate Value
Property.
Differentiability, Rolle’s Theorem, Mean Value Theorem. Convexity, Concavity, L’Hospital Rule,Fixed
Point Iteration Method, Taylor’s Theorem, Taylor Series, Power Series. Riemann Integration,
Fundamental Theorems of Calculus, Riemann Sum. Improper Integrals, Beta-Gamma Functions,
Differentiation under integration.
Area between two curves; Polar Coordinates, Volumes by slicing, Washer and Shell Methods, Length
of a plane curve, Areas of Surfaces of Revolution. Review of vectors, Calculus of Vector Valued
Functions, Functions of Several Variables: limit, Continuity and Differentiability, Chain Rule,
Directional Derivative, Gradient.
Mixed Derivative Theorem, MVT, Extended MVT, Taylor’s Theorem in Multiple Variables, Hessian,
Maxima, Minima, Second Derivative Test, Lagrange Multiplier Method. Double Integrals, Change of
Variable in a Double and Triple Integrals, Area of a Parametric Surface and surface integral. Surface
Area, Surface Integrals, Line Integrals Green’s Theorem and Applications.
Text Books :
1. Weir, Maurice D., Joel Hass, and Frank R. Giordano. Thomas' calculus. 14th ed. Pearson Education
India, 2018. ISBN 9789353060411.
2. Ross, Kenneth A. Elementary Analysis the Theory of calculus. 2nd ed. Springer publication, 2013.
ISBN 978-1461462705.
Reference Books :
1. Stewart, James. Calculus. 7th ed. Cengage Learning, 2012. ISBN 0538497815.
2. Ghorpade, Sudhir R., and Balmohan Vishnu Limaye. A course in calculus and real analysis. 1st ed.
New York: Springer, 2006. ISBN 978-0387305300.
3. Bartle, Robert G., and Donald R. Sherbert. Introduction to real analysis. 4th ed. New York: Wiley,
2014. ISBN 812655181X.
4. Kreyszig, Herbert, and Erwin Kreyszig. Advanced Engineering Mathematics, Student Solutions
Manual and Study Guide. 10th ed. John Wiley & Sons, 2010. ISBN 978-8126554232.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET108 Environment and Sustainability L T P C
Owning School/Department School of Computer Science Engineering and 3 0 0 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 3 2 2 3 2
CO2 2 2 2 3 2 2 1
CO3 3 3 3 2 3 2 2 2
Course Contents:
Natural resources: Natural Resources and Their Challenges, Renewable and Non-renewable Energy
Sources, Water's Role in Agriculture, Agriculture's Connection to Food Production, Addressing Issues
and Solutions in Agriculture and Food Production.
Module IV: 08 lectures hours
Environmental pollution: Causes, effects and control measures of various types of pollutions - Air
pollution - Water pollution - Wastewater treatment - Soil pollution - Noise pollution - Thermal pollution
- - Solid waste management - E-waste - Case studies on pollution.
Module V: 07 lectures hours
Life cycle analysis and sustainability thinking: Introduction of LCA – Methodology of LCA – ISO
14044 Significance of LCA – Case studies of LCA .
Text Books :
1. Bharucha, Erach. Textbook of environmental studies for undergraduate courses. 2nd ed. Universities
Press, 2013. ISBN 978-8173718625.
Reference Books :
1. Lodish, Harvey, Arnold Berk, S. Lawrence Zipursky, Paul Matsudaira, David Baltimore, and James
Darnell. Molecular Cell Biology. 8th ed. WH Freeman, 2016. ISBN 978-1319067748.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET107 Foundations ofInnovation and L T P C
Entrepreneurship
Owning School/Department School of Computer Science Engineering and 2 0 0 2
Technology
Pre-requisites/Exposure -
CO1: To discuss the basic understanding of the relevant concepts and practices of entrepreneurship.
CO2: To recognize the essential criteria in the decision to become an entrepreneur or opt for
entrepreneurship.
CO3: To practice with the basic tools and tactics required to manage and grow an entrepreneurial firm.
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 3 2 2 3
CO2 2 2 3 1 3 2 3
CO3 3 3 3 2 3 2 2
Course Contents:
WHERE DO GOOD IDEAS COME FROM? Creativity in entrepreneurship, the creative process–
stages/steps, creative thinking – techniques, sources for generation of Ideas, and role of Imagination,
effectuation, Improvisation, analogous thinking, etc, problem finding & solving – divergent
/convergent, associative approaches and do: generate viable Ideas, do: prototype asolution.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET103 New Age Life Skills L T P C
Owning School/Department School of Computer Science Engineering and 3 0 0 3
Technology
Pre-requisites/Exposure -
CO1: By the end of this course, students should be able to express their role in improving their quality
of life.
CO2: By the end of this course, students should be able to understand human psychology and its
applications to improve human achievements and happiness to substantial extent.
CO3: By the end of this course, students should be able to reflect on the aspects of leadership,
motivation, and stress management.
CO4 : By the end of this course, students should be able to appreciate the nature of positive and
proactive thinking and assertiveness.
CO5: By the end of this course, students should be able to apply concepts, tools and frameworks of
emotional intelligence and stress management
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 3 3 3 3 3 1
CO2 3 2 3 3 3 3 3 1
CO3 3 2 3 3 3 3 3 1
CO4 3 2 3 3 3 3 3 1
CO5 3 2 3 3 3 3 3 1
Course Contents:
Introduction to Life Skills, the critical role of management skills, Developing Self-awareness: Key
dimensions, enigma of self-awareness, Understanding and Appreciating Individual differences, Self-
esteem, Case studies and Practice Sessions.
Setting goals, Goal Setting: Setting SMART Goals, what are the main components, Managing time and
prioritizing, Time Management matrix, Balancing Time and Goal, case studies, Practice Sessions.
Module IV: 4 lectures hours
Diagnostic Surveys for Creative Problem Solving, Problem Solving, Creativity and Innovation, Steps
in Analytical Problem Solving, Multiple Approaches to creativity, Conceptual Blocks, Case studies and
Practice Sessions.
Attitudes, what are the main components? Behavior and attitude, Major job attitude, Job satisfaction,
Satisfied and dissatisfied employees on the workplace, Personality, The Myers-Briggs Type Indicator,
The Big Five Personality Model, other personality traits relevant to Life skills, Case studies and Practice
Sessions.
Diagnostic Surveys for Building Effective Teams, Team Development Behaviour, Developing
Credibility, Leading Teams, Exercises in Building Effective Teams, Team Development Behaviour,
Developing Teams and Work, Leading Teams, Team Membership, Developing Credibility, Exercises
in Building Effective Teams, Case studies and Practice Sessions.
Diagnostic Survey for Gaining Power and Influence, Building a Strong Power Base and Using Influence
wisely, Strategies for gaining organizational power, Transforming power into influence, activities for
gaining power and influence, Diagnostic Survey for Motivating Others, Increasing Motivation and
Performance, Diagnosing Work Performance Problems, Enhancing Individual abilities, Fostering a
Motivating Work Environment, Elements of an Effective Motivation Program, Activities for
Motivating Others, Case Studies and Practice Sessions.
Diagnostic Survey for Managing Conflict, Interpersonal Conflict Management, Diagnosing the Type
of Interpersonal Conflict, Selecting the Appropriate Conflict Management Approach, Resolving
Interpersonal Confrontations Using the Collaborative Approach, Conflict Management Strategies,
activities for Improving Managing Conflict Skills, Case Studies and Practice Sessions.
Diagnostic Survey for Empowering and Delegating, Management Dilemma Involving Empowerment,
The Meaning of Empowerment, Dimensions of Empowerment, Self-Efficacy, Self-Determination,
Personal Consequence, How to Develop Empowerment, providing Support, providing Information,
Providing Resources, Inhibitors to Empowerment, Delegating Work, Advantages of Empowered
Delegation, Review of Delegation Principles, Case Studies and Practice Sessions.
Studio Work/Laboratory Experiments:
1. Group Presentations
2. Group Activities
3. Role Plays
4. Group Decision Making activity
5. Group Treasure Hunt
6. Creating Team profiles
7. Creating Self Profiles
Text Books :
1. Whetten David A. and Kim S. Cameron, Developing Management Skills (8th ed.), Pearson, 2017.
ISBN 9789332584686, ISBN 9332584680.
2. Wadkar Alka, Life Skills for Success (1st ed.), Sage Publications, 2016. ISBN 9789351507314,
ISBN 9351507319.
Name of Program Bachelor of Technology (Computer Science Engineering)
Course EPHY111L: Mechanics and Electromagnetism L T P C
Owning
Physics 3 1 2 5
School/Department
Pre-requisites/Exposure NIL
CO1: Calculate electrostatic fields and potentials, produced by regularly shaped charged bodies.
CO2: To understand magnetic fields produced by variously shaped current-carrying bodies.
CO3: To appreciate the interconnectedness of electric and magnetic phenomena and to realize the
significance of Maxwell’s equations,
CO4: Learn how to apply Newton’s Laws and understand the concept of energy
CO5: Solve problems involving rotational motion
CO6: Get introduced to central forces and conversion of two body problems into one body problem
CO7: Perform basic physics experiments, tabulate observations, analyze data and draw conclusion
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 2 2 1 3 2
CO2 3 3 2 2 3 2
CO3 3 3 2 2 2 3 2
CO4 3 3 2 2 1 3 2
CO5 3 3 2 2 3 2
CO6 3 3 2 2 3 2
CO7 3 3 2 3
1=weakly related 2= moderately related 3=strongly related
Course Contents:
Module 1 10
lecture hours
Vector operators and coordinate systems, Gauss’ law and its applications; Electrostatic potential; Electric fields
in matter; Electric polarization, Bound charges, Displacement vector; Electric Permittivity and dielectric
constant
Module 2 11
lecture hours
Biot-Savart law; Ampere’s law and applications; Magnetic fields in matter, Magnetization, Bound currents;
Faraday’s law of electromagnetic induction; Displacement current and the generalized Ampere’s law; Maxwell’s
equations; Electromagnetic waves
Module 3 13
lecture hours
Harmonic Oscillator: Free, Damped, and Forced Oscillations, Resonance, Special Theory of Relativity: Lorentz
Transformation, Length contraction, Time Dilation, Energy-Mass-Momentum Relations.
List of Experiments
Text Books :
1. D. J. Griffiths, Introduction to Electrodynamics (4 th Edition), Pearson Education India Learning Private
Limited, 2015, ISBN 978-9332550445.
2. D. Kleppner & R. Kolenkow, An Introduction to Mechanics (1 st Edition), McGraw-Hill Education, 2017,
ISBN 978-0070647787.
Reference Books :
1. D. Halliday, R. Resnick, J. Walker, Fundamentals of Physics, John Wiley & Sons, 2021, ISBN 978-
1119773512,
2. H. D. Young, R. A. Freedman, University Physics with Modern Physics (14 th Edition) , Pearson, 201, ISBN
978-0194577199.
SEMESTER
II
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET109 Object Oriented Programming using Java L T P C
Owning School/Department School of Computer Science Engineering and 3 1 4 6
Technology
Pre-requisites/Exposure -
CO1: To examine different programming structures in a platform independent language such as wrapper
classes, collections, exceptions, and multithreading.
CO2: To explain the concepts of object-oriented programming like encapsulation, abstraction,
inheritance and polymorphism.
CO3: Make use of GUI and database-based programming to develop Applications for real life problems.
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 3
CO2 3 3 3 3 3 3 3
CO3 3 3 3 3 3
Course Contents:
Handling user input/output using Scanner class, Platform independence of Java (JVM), Operators
(unary, arithmetic, logical, shift left, shift right, ternary, assignment) Exploring bitwise operators,
compound assignment, if/else, Using switch for menu-driven applications while, For, do-while,
Introduction to Abstraction and Polymorphism Objects Lifecyle: creation, dereference, garbage
collection, Wrapper classes (Boolean, Integer, Double, Character), Autoboxing, unboxing, String
(concat, indexOf, split, length, toLowerCase, toUpperCase, replace, trim), Array declaration,
instantiation, multidimensional arrays, Designing methods for modularity and reusability Static
variables, Static methods, Static blocks, Constructors and destructors, Instance Initialization Blocks,
Security aspects in class design Encapsulation, Inheritance, single, multilevel, Hierarchical.
Polymorphism, Function Overloading method overriding, Concrete Class Abstraction abstract methods,
non- availability of multiple inheritance, interfaces, Interfaces vs abstract class, Embedded Interface
Anonymous class, Inbuilt Packages, User defined packages, Array List collection, LinkedList
Collection Vector collection, Exception handling, Checked and unchecked exception, try, catch, finally,
Propel, Propagate, Data Stream Handling.
Thread and process, Parallel Computing Concurrent Programming synchronization, Swing features,
JavaFX Features MySQL database, NoSQL Databases getConnection, createStatement, executeQuery,
JEE (client-server architecture for web based applications), Microservices Architecture Running
Servlet, Generic Servlet, HTTP Servlet, Servlet Config, Web Filters Servlet to handle Get and Post
Methods, Startups on programming, Session Management.
Module IV: 10 lectures hours
JSPs, Struts framework, Spring MVC framework Regular expressions (Lambda expressions),
Collection framework Concurrency in Java, HashMap, Linked Hash Map, Tree Map, Kotlin for Android
WebSockets JPA (Java Persistence API), Microservices with Spring Boot.
Students will gain hands-on experience on core JAVA. Students will be able to solve simple to medium
level computation problems in Java. Emphasis will be that the student code themselves as much as they
can. They learn to debug the programs resulting in error free code. Instructor will be giving assignments
based on the content covered in the lecture classes in the corresponding week.
Text Books :
1. Schildt, Herbert. Java: the complete reference. 10th ed. McGraw-Hill Education Group, 2014.
ISBN 978-93392120.
2. Bloch, Joshua. Effective java (the java series). 1st ed. O'Reilly Media, Inc., 2017. ISBN 978-
0134686097.
Reference Books :
1. Anuradha A. Puntambekar, ObjectOriented Programming. 1st ed. UNICORN Publishing Group,
2020. ISBN 9789333223819.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET105 Digital Design L T P C
Owning School/Department School of Computer Science Engineering and 3 0 2 4
Technology
Pre-requisites/Exposure -
CO1: Identify appropriate truth table and examine gate level implementation from combinational logic
function.
CO2: Build sequential circuits.
CO3: Experiment with the circuit diagram for combinational and sequential logic using Verilog.
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 1 2 1 3
CO2 1 2 1 1 3
CO3 3 2 2
Course Contents:
Digital Logic, Analog v/s Digital Systems, Data Representation, Binary Number System, Decimal
Number System, Octal Number System, Hexa-Decimal Number System, Binary Arithmetic, Unsigned
and Signed Numbers, Signed Magnitude, 1’s Complement, 2’s Complement, Fixed- and Floating-Point
Numbers, Weighted Codes, BCD Code, Basic Logic Gates, Universal Logic Gates, Truth Table
Laws of Boolean Algebra, Reduction of Boolean Expression using Boolean Laws, Conversion of
Boolean Expression to Logic Diagram, Conversion of Logic Diagram to Boolean Expression, Boolean
Function Representation using SoP and PoS form, Standard Sum of Products, Standard Product of Sum,
Two Variable K-Map, Implicants, Prime Implicants and Essential Prime Implicants, Three Variable K-
Map, Four Variable K-Map, Don’t Care Condition, Design and Analysis of Combinational Circuits,
Half Adder, Full Adder and Carry Propagation, Subtractor, Four Bit Binary Adder-Subtractor, Excess-
3, Gray Code, Parity, Hamming Code, Binary Multiplier, Magnitude Comparator, Multiplexer,
Implement Boolean Function using Mux, DeMultiplexer, Implement Full Subtractor using De-Mux.
4 * 2 Encoder, Octal to Binary Encoder, Priority Encoder, 2*4 Decoder, Implement Full Adder using
Decoder, BCD to 7-segment Display Decoder, Sequential Circuits, Sequential v/s Combinational
Circuits, Clock, SR Latch, D Latch, Edge Trigger and Level Triggered, SR Flip Flop Circuit Diagram,
SR Flip Flop Truth Table, SR Flip Flop Characteristic Table, SR Flip Flop Excitation Table, JK Flip
Flop Circuit Diagram, JK Flip Flop Truth Table, JK Flip Flop Characteristic Table, JK Flip Flop
Excitation Table, Race Around Condition, Master Slave JK Flip Flop, D Flip Flop, T Flip Plop, State
Diagram, State Equation and State Table, Mealy State Machine, Moore State Machine, State Reduction,
State Assignment, ASM Chart, Analysis using JK Flip Flop.
Module IV: 12 lecture hours
Register, Parallel Register, Shift Registers, Bi-Directional Shift Register, Universal Shift Register,
Counter, Asynchronous v/s Synchronous Counter, Ripple Counter (UP, DOWN, UP/DOWN),
Synchronous Counter (UP, DOWN, UP/DOWN), Ring Counter, Johnson’s Counter, Programmable
Logic, Types of PLDs, Architecture of PROM, PLA Architecture, PAL Architecture, System on Chip
Design, Logic Synthesis in Quantum Computing.
In this course students will start with basic digital components such as Arithmetic and logical operation,
Memory etc. Then finally design soft IP. The Lab will use Altera Quartus prime Lite tool for design and
FPGA Altera DEII utilize for physical implementation.
Text Books :
1. Mano, M. Morris. Digital Design: with an Introduction to the Verilog HDL, VHDL and System
Verilog. 6th ed. Pearson, 2018. ISBN 978- 0134549897.
Reference Books :
1. Wakerly, John F. Digital Design: Principles and Practices. 5th ed. Prentice Hall, 2008. ISBN
9780134460093.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET106 Discrete Mathematical Structures L T P C
Owning School/Department School of Computer Science Engineering and 3 1 0 4
Technology
Pre-requisites/Exposure -
CO1 : To explain logical notation to illustrate sets, relations, functions, and integers.
CO2 : To examine induction hypotheses and prove elementary properties of modular arithmetic.
CO3 : Experiment and solve critical examples of algebraic structures and graph theory.
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 1 2 3
CO2 3 1 2 3 1
CO3 1 1 2 2 3
Course Contents:
Representation of Sets, Types of Sets, Power Set, Venn Diagrams, Operations on Sets, Partition of Sets,
Fuzzy Sets. Functions, Types of Functions, Sum and Product of Functions, Relation, Relation vs
Function, Different Types of Relations, Graphical Representation of Relations, Matrix Representation
of Relations, Closure of relations.
Representation of integers, Binary operations, Divisibility, Euclidean Theorem for GCD, Residue
classes, Linear congruence, Chinese remainder theorem, inclusion-exclusion principle, Binomial
coefficients, Permutation, and combination, Pigeonhole principle, Recurrence relations and generating
functions, semi-group, Monoid, and group, Abelian group, Cyclic group, Addition modulo m,
Multiplication modulo m, Ring, Field, and integral domain.
Module IV: 09 lectures hours
Partially ordered set, Elements of Posets, properties of lattices, Bounded, distributive, Complemented
Lattice, Graphs, Homomorphism and Isomorphism, Euler graph, Hamiltonian circuit, Handshaking
lemma (Havel Hakimi theorem), Graph Score Theorem, Bipartite graphs, Kionig’s Theorem, Graph
coloring, Chromatic number, Clique, Matching, Trees, forest, rooted trees, Binary trees, height of trees.
Text Books :
1. Bisht, Raj Kishor, and H. S. Dhami. Discrete mathmatics. 1st ed. Oxford University Press. 2015.
ISBN 97- 80199452798.
2. Rosen, Kenneth H. Discrete mathematics and its applications. 8th ed. The McGraw Hill
Companies,, 2007. ISBN 978- 9390727353.
Reference Books :
1. Fortney, Jon Pierre. Discrete Mathematics for Computer Science: An Example-based Introduction.
1st ed. CRC Press, 2020. ISBN 978-1000296806.
Name of Program Bachelor of Technology (Computer Science Engineering)
EMAT102L Linear Algebra and Ordinary Differential L T P C
Equations
Owning School/Department School of Computer Science Engineering and 3 1 0 4
Technology
Pre-requisites/Exposure -
CO1: Solving system of linear equations by using Gaussian elimination to reduce the augmented matrix
to row echelon form or to reduced row echelon form.
CO2: To be familiar with the concepts of dimension of a subspace and the rank and nullity of a matrix.
CO3: To calculate the eigenvalues and eigenvectors of a square matrix using the characteristic
polynomial.
CO4: Fundamental concepts of ordinary differential equations
CO5: Solving linear differential equations of both first and higher order
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2
CO2 2 2
CO3 2 2 3
CO4 1 2 1
CO5 2 2 1
Course Contents:
Review of Matrices, System of linear equations, Gauss elimination method, Elementary matrices,
Invertible matrices, Gauss-Jordon method for finding inverse of a matrix, Review of Basic properties
of determinant, Cofactor expansion, Determinant method for finding inverse of amatrix, Cramer's Rule,
Vector space, Subspace and Examples, Linear span, Linear independence and dependence and
Examples, Basis, Dimension, Extension of a basis of a subspace, Intersectionand sum of two subspace,
Examples. Linear transformation, Kernel and Range of a linear map, Rank-Nullity Theorem, Rank of a
matrix, Row and column spaces, Solvability of system of linear equations, some applications, Inner
product, Cauchy-Schwartz inequality.
Introduction to DE, Order of DE, First Order ODE F (x, y, y') = 0. Concept of solution (general solution,
singular solution, implicit solution etc.) Geometrical interpretations (direction fields), Separable form,
Reduction to separable form, Exact equations, Integrating factors, Linear equations, Bernoulli equation,
orthogonal trajectories, Picard's existence and uniqueness theorem (without proof), Picard's iteration
method, Second order linear ODE: fundamental system and general solutions of homogeneous
equations, Wronskian, Reduction of order, Characteristic equations: real distinct roots, complex roots,
repeated roots, Non-homogeneous equations: Undetermined coefficients and Variation of parameters.
Extension to higher order differential equations, Euler-Cauchy equation, Real analytic solutions of
Linear second order equations, Linear system of Differential equations, Fundamental Set, Linearly
independent solutions, Laplace transform: Laplace and inverse Laplace transforms, First shifting
theorem, Transforms of derivative and integral, Differentiation and Integration of transforms, unit step
function, Second shifting theorem, Convolution and applications, Initial value problems.
Text Books :
1. Strang, Gilbert. Introduction to linear algebra. 4th ed. Wellesley-Cambridge Press, 2006. ISBN
978- 0030105678.
2. Kreyszig, Erwin. Advanced Engineering Mathematics 10th Edition with Wiley Plus Set. John Wiley
& Sons, 2010. ISBN 978-0470458365.
Reference Books :
1. Hoffmann, Kenneth, and Ray Alden Kunze. Linear algebra. 2nd ed. Prentice-Hall, 2004. ISBN
9789332550070.
2. Simmons, George F. Differential equations with applications and historical notes. 2nd ed.
McGraw-Hill Education (India) Pvt Limited, 2002. ISBN 978-0070530713.
3. Coddington, Earl A. An introduction to ordinary differential equations. 1st ed. DoverPublication,
1989. ISBN 9780486659428.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET102 Introduction of Electrical and Electronics L T P C
Engineering
Owning School/Department School of Computer Science Engineering and 2 1 2 4
Technology
Pre-requisites/Exposure -
CO1 : To articulate the fundamental parameters governing an electrical circuit such as current,
voltage.
CO2 : To explain basic electronic components such as resistors, capacitors, and inductors.
CO3 : To make use of concepts, working, and application of various circuits using the components
on a breadboard.
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 2 1 2 3
CO2 2 1 1 2
CO3 1 1 1 1 2
Course Contents:
Basic Circuit Theory: Charge, current, voltage, electric field, conductance, resistance, Ohm's law;
current source, voltage source, dc, ac, periodic signal concept, examples of different periodic signals,
their average, RMS value, resistors in series and parallel, voltage and current division. Kirchoff’s
current law (KCL) and Kirchhoff’s voltage law (KVL), Nodal analysis and Mesh analysis.
Network theorems: Maximum power transfer theorem, Source Transformation, Superposition theorem,
Thevenin’s theorem, Norton’s theorem. Introduction to capacitor (C), introduction to phasor diagram,
series and parallel combination of capacitors, Impedance and frequency dependency, Introduction to
inductor (L), introduction to phasor diagram, series and parallel combination of inductors, Impedance
and frequency dependency, units of L, C measurements, lowpass, highpass and bandpass filter, transfer
function, Single phase motors, dc motors, stepper motors, their applications.
Diodes and its applications, Semiconductor Materials: Electrons and Holes, Intrinsic and Extrinsic
Semiconductors, doping of n and p-type semiconductors, Diode circuits: PN Junction diode and its
applications: Half wave, center tapped full wave rectifier circuit, bridge rectifier circuit, the efficiency
of rectifier circuits, ripple factor, rectifiers with filter circuits.
Module IV: 06 lectures hours
Text Books :
1. Charles, K. Alexander, and N. O. Matthew. Fundamentals of electric circuits. 1st ed. McGraw-hill
Education, 2017. ISBN 9789353165505.
2. Boylestad, Robert L., and Louis Nashelsky. Electronic devices and circuit theory. 1st ed. Pearson
Education India, 2009. ISBN 9788131703144.
3. Tsividis, Yannis. A First Lab in Circuits and Electronics. 1st ed. Wiley, 2002. ISBN
9780471386957.
Reference Books :
1. Neamen, Donald A. Microelectronics: circuit analysis and design. 1st ed. New York: McGraw-Hill,
2009. ISBN 978-0073380643.
2. Bell, David A. Electronic instrumentation and measurements. 3rd ed. Oxford University Press
India, 2013. ISBN 978-0195696141.
Semester III
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET201 Information Management Systems L T P C
CO1: Articulate the competent understanding of database systems design and ER Modelling.
CO2: Build database systems and understand new developments and trends in databases.
CO3: Construct databases and make use of efficient SQL queries to retrieve and manipulate data as
required.
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 3 3 3 3 2 2 1 2
CO2 3 2 3 3 3 1 2 2 2 3
CO3 3 2 3 3 3 3 2 2 1 3
Course Contents:
Purpose of IMS, Real-life applications of Data-Intensive systems, Typical system challenges, Data
independence, Database system architecture levels, Role of several databases, ER diagram: Entity-set,
Attributes, Relationships, Cardinality ratio, EER diagram: Specialization, Generalization, Constraints
of EER, Aggregation, ER to Relational model, Relational model, Structure of relational databases,
Constraints of relational model, Relational algebra: Basic and derived operator, Tuple relational
calculus.
Functional dependency – definition, trivial and non-trivial FD, Armstrong's axioms, closure of FD set,
Closure of attributes, Irreducible set of FDS, Normalization, 1NF, 2NF, 3NF, BCNF, Decomposition
using FD, Dependency preservation, Multivalued dependency, 4NF, join dependency, 5NF, Query
optimization, Measures of query cost: selection operation, sorting, join, Evaluation of expressions,
Transformation of relational expressions, Estimating statistics of expression results.
Pipelining, Streaming algorithms framework, Turnstile model, Cash register models, Sliding window
model, Data warehouse, Operational data store, Star schema, Snowflake schema, Data cube concept,
OLAP, Cube and Roll-up, NoSQL database systems framework, Column stores, RDF stores, HBase,
Big Data, Hadoop MapReduce architecture, Distributed Database Systems framework (DDS), Need for
Data Privacy, Privacy law, Anonymity models, Privacy in Cloud and Big Data.
Entity-Relationship model: Design process, constraints, Keys, Design issues, E-R diagrams, weak
entity sets, extended E-R features – generalization, specialization, aggregation, reduction to E-R
database schema. Basics of SQL, DDL, DML, DCL, structure – creation, alteration, defining constraints
– Primary key, foreign key, unique, not null, check, IN operator Functions - aggregate functions, Built-
in functions –numeric, date, string functions, set operations, subqueries, correlated sub-queries, use of
group by, having, order by, join and its types, Exist, Any, All, view and its types. Transaction control
commands – Commit, Rollback, save point.PL/SQL Concepts: - Cursors, Stored Procedures, Stored
Function, Database Triggers, No SQL queries using Mongo DB and Firebase.
Text Books :
1. Silberschatz, Abraham, Henry F. Korth, and Shashank Sudarshan. Database system concepts. 7th
ed. McGraw-Hill, 2011. ISBN 9780078022159.
2. Ramez Elmasri and Sham Navathe, Fundamentals of Database Systems. 1 ed. Pearson/Addison
Wesley, 2016. ISBN 9780133970779.
Reference Books :
1. Negi, Mukesh. Fundamental of Database Management System: Learn essential concepts of
database systems. 1st ed. BPB Publications, 2019. ISBN 9789388176626.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET243 Data Structures using C++ L T P C
CO1: Articulate the design, use and associated algorithms of fundamental and abstract data structures.
CO2: Examine various searching and sorting techniques based on complexity analysis for applicative
solutions.
CO3: Demonstrate hands-on experience on implementing different data structures.
CO4: Build optimized solutions for real-word programming problems using efficient data structures.
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 2 3 2 2 2
CO2 3 3 3 3 1 3
CO3 2 3 3 3 2 3
CO4 3 2 2 3
Course Contents:
Essentials of Data Structures, Initiating C++: The First Program, Lifecycle of C++ Program Execution,
Fundamentals of Object-Oriented Programming (OOP), C++ Inheritance Principles, Multiple
inheritance, Friend Function, Run-time Polymorphism, Time Complexity: Asymptotic Analysis, Big-
Omega, Big-Theta, Big-Oh Notation, Handling Arrays, Insertion, Deletion, Traversal, Linear Search,
Recursion, Binary Search, Tower of Hanoi, Sorting, Bubble Sort, Selection Sort, Insertion Sort, Merge
Sort, Shell Sort, Counting Sort.
Module II: 10 lecture hours
Navigating C++: Pointers Essentials, Structures and Unions in C++, Exploring Linked Lists in C++,
Implementing Singly Linked Lists, Traversal Techniques for Singly Linked Lists in C++, Searching,
Insertion, Deletion, Polynomial Handling, Circular Linked List, Traversal, Insertion, Deletion, Stacks,
Traversal, Insertion, Deletion, Infix to Postfix Conversion, Post-fix Expression Evaluation, Deques,
Queues, Simple Queue Insertion, Deletion, Traversal, Circular Queue Insertion, Deletion, Traversal.
Module III: 11 lectures hours
Tree Data Structures, Height, Complete, Full, Perfect Trees, Binary Search Trees, Pre-Order, InOrder,
Post-Order, BST Searching, BST Insertion, BST Deletion, Heaps, Min-Max Heaps, HeapSort, Hashing,
Hash Functions, Hash Tables, Hashing Collision Resolution Strategies: Separate Chaining, Open
Addressing, Double Hashing, Graphs, Different Types of Graphs, Graphs Representations, Incidence
Matrix, Adjacency Matrix, Graphs Traversals: BFS, DFS, Topological Sort.
Module IV: 11 lectures hours
Maintaining Height Equilibrium: AVL Trees, Balanced Factor and Rotations in AVL Trees, Operations
in AVL Trees: Insertion and Deletion, Exploring Red-Black Trees: Insertion and Deletion, B-Trees:
Efficient Insertion and Deletion Operations, Enhanced Structure: B+ Trees and their Insertion and
Deletion Operations, Deletion, Disjoint Sets, Path Compression, Union Finding Algorithm, van Emde
Boas Tree.
The laboratory of Data structures is designed to provide a practical exposure to the students about the
concepts and topics taught in the classroom sessions. Implementing the learnt concepts using C++ will
help the students to have a better understanding of the subject.
Text Books :
1. Carey, John, Shreyans Doshi, and Payas Rajan. C++ Data Structures and Algorithm Design
Principles: Leverage the power of modern C++ to build robust and scalable applications. 1st ed.
Packt Publishing Ltd, 2019. ISBN 9781838827919.
2. Kanetkar, Yashavant. Data Structures Through C: Learn the fundamentals of Data Structures
through C. 1st ed. Cengage Learning, 2019. ISBN 9789388511360.
Reference Books :
1. Hu, Yang. Algorithms C++. 1st ed. Cengage Learning, 2020. ISBN 9798676695750.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET240 Probability and Statistics L T P C
Owning School/Department School of Computer Science Engineering and 3 1 2 5
Technology
Pre-requisites/Exposure -
CO1: To explain different standard distributions, and how these can be used to model different real life
situations.
CO2: To make students examine different statistical tests to datasets, and make the correct data
driven decision.
CO3: To implement real life problems of Probability and Statistics using programming languages.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3 3
CO2 3 3 3 3 3 3 3
CO3 3 3 3 3 3
Course Contents:
Probability, Conditional Probability, Independence, Law of total probability, Bayes’ theorem, Monty
hall problem, Random Variables: discrete and continuous, Expected value, Variance, Properties of
Variance, PMF, CDF, Joint Probability, Joint Conditional Probability, Convolution, Numerical samples,
Correlation, Covariance.
Descriptive statistics, Visualization of central tendency and variability, Hypothesis Testing, Z Test, T
Test, F test, ANOVA, AB Testing, Importance of parameter estimation, Least square, Linear regression
and multiple regression, Parameter estimation using LSE, Maximum likelihood, Parameterestimation
using MLE, Markov chains, Statistical Inference.
Studio Work / Laboratory Experiments:
The students learn to perform numerical analysis, compute odds of any event, check distribution and
both linear and non-linear regression. In addition to this, students build search engines (like google),
implement ideas of dynamical system (via Markov models), play with the concepts of central limit
theorem and law of large numbers. Lastly, everyone is encouraged to try and test scientific hypothesis
via the paradigm of statistical hypothesis testing and confidence interval estimation. The students are
also given hands on training in the language R.
Text Books :
1. Ross, Sheldon M. Introduction to probability and statistics for engineers and scientists. 6th ed.
Academic press, 2020. ISBN 9780128177471.
2. Baron, Michael. Probability and statistics for computer scientists. 3rd ed. Chapman and Hall book.
2019. ISBN 978-1584886419.
Reference Books :
1. Paul L. Meyer, Introductory Probability and Statistical Applications. 2nd ed. Addison-Wesley,
2017. ISBN 978-0201047141.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET205 Software Engineering L T P C
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 3 2 2 3 2
CO2 1 2 3 2 2 3
CO3 3 2 3 2 2
Course Contents:
Importance of Software Engineering, Phases of software development lifecycle, SDLC case study,
Software process model, Waterfall model, V Model, Prototyping model, Incremental model, RAD
Model, Spiral model, Choosing a model, Lifecycle documents, Agile model, Need of agile, Version
Control System, Distributed VC, Git repository, Git online and Desktop, Check-in, and check-out code
in repository, Create branch and merging branch, Git + Eclipse/IDE.
Agile manifesto, Agile principles, Agile development methods, Extreme programming (XP), XP
principles, Test first development, Refactoring, Pair programming, Scrum, Product backlog, Sprint
cycle, Continuous integration, Requirements engineering, Issues in capturing requirements,
Requirement elicitation, Requirement analysis, Functional and Non-functional requirements,
Requirement specification, Requirement prioritization, User stories, Acceptance criteria, Requirement
validation and verification, UML, Use case, Use case Diagram, Include and extend relationship,
Generalization in use Case, Top down and bottom-up approach in use case diagram, Guidelines for
creating use case diagrams.
UML behavioural diagrams, Activity diagram, Activity diagram with swimlane, UML structural
diagrams, Class diagram, Relationships in class diagram, Sequence diagram, Rules of creating sequence
diagram, Description of relationship between use-case, activity, and sequence diagram, Architectural
design, Cohesion, Coupling, Early locking of architecture, Architectural pattern, MVC pattern, Layered
architecture, Repository architecture, Client server architecture, Software architect, roles, and
responsibilities, Pipe and filter architecture.
Reverse engineering, Horseshoe model, Software cost estimation, Cost estimation factors, COCOMO
model, Software quality assurance and testing, Software testing for competitive advantage, Testing
strategies, Designing test cases, Black box testing, Equivalence partitioning, Boundary value analysis,
White box testing, Black box vs. white box testing, Control flow testing technique, Control flow graph,
Cyclometric complexity, Levels of coverage, Integration testing, Top down and bottom-up integration,
Continuous Integration testing, Regression testing, Acceptance testing, System testing, Performance
testing, Software engineering standards, ISO standards, CMM.
The course will cover labs in the following areas: Getting used to eclipse and GitHub, hands-on session
on software design via Visual Paradigm, Designing and inspecting SRS, software testing using Junit
approach.
Text Books :
1. Pressman, Roger S. Software engineering: a practitioner's approach. 8th ed. McGraw Hill
International, 2019. ISBN 978-1259253157.
2. Sommerville, Ian. Software Engineering, 10th ed. Pearson Education India, 2017. ISBN 978-
9332582699.
Reference Books :
1. Summers, Boyd. Effective Methods for Software Engineering. 1 ed. CRC Press, 2020. ISBN
9781000052710.
Semester IV
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET203 Microprocessors and Computer Architecture L T P C
CO1: Explain about modern architecture and microprocessors and the design techniques.
CO2: Examine various design alternative of computer architecture based on CPU performance,
memory, I/O.
CO3: Understand instruction sets and implement with assembly program and design application
specific processor using HDL.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 3 3 1 2 2
CO2 2 3 3 3 1 2 3
CO3 2 2 2 3 3 3 3 3
Course Contents:
Addressing Modes, Immediate, Direct, Indirect, PC-relative, Indexed, Subroutine Call, Small-scale
operations and their RTL description, Arithmetic and logic unit, Signed Magnitude Addition-
Subtraction Algorithm's register setup, Register configuration of 2’s complement Addition Subtraction
Algorithm, Signed Magnitude Multiplication Algorithm, Booth’s multiplication algorithm, CPU –
Memory interconnections, Organization of memory modules, Associative memory, Cache Memory,
Cache Memory Mapping Techniques, Associative, Direct, Set Associative.
Interfacing of memory chips, Methods for allocating addresses and decoding, Interfacing of I/O devices,
LEDs toggle-switches as examples, Memory mapped and isolated I/O structure, Input/Output
techniques, Logic-driven, managed input/output, Interrupt controlled I/O transfer, Different types of
Interrupts, DMA controller, Buses and connecting I/O devices to CPU and memory, Secondary Storage
– solid-state drive (SSD), Comparison of SSD with HDD.
Module IV: 11 lectures hours
Pipelining, pipeline hazards, Problems with pipeline architectural design, Instruction level parallelism
and advanced issues, RISC and CISC paradigm, Design issues of a RISC processor, Multiprocessor
system and its characteristics, Topics of Advancement in Microprocessor Research, Parallel processing
concepts, Parallelism algorithm for multiprocessor systems, Overview of GPU Architecture,
Comparison between GPU and CPU Architecture, Interconnection network, Cache in multiprocessor
systems and related problems, Cache coherence protocols.
In this course students will start with basic components of CPU such as ALU, Memory etc. Then finally
combine all components and develop a processor. The Lab will use Altera Quartus prime Lite for design.
MIPS for assembly programming.
Text Books :
1. Hennessy, John L., and David A. Patterson. Computer architecture: a quantitative approach. 5th
ed. Morgan Kaufmann, 2012. ISBN 978-9381269220.
2. Hall, Douglas V. MICROPROCESSORS AND INTERFACTNG. 3 ed. McGraw Hill Education,
2017. ISBN 978-1259006159.
Reference Books :
1. Stallings, William. Computer organization and architecture: designing for performance. 10th ed.
Pearson Education India, 2016. ISBN 978- 0132936330.
.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET244 Design and Analysis of Algorithms L T P C
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 1 2 2 2 2 2
CO2 3 3 3 2 1 2 2 2 2 3
CO3 1 2 3 1 2 2 2 2 3
Course Contents:
Introduction to algorithm, What is Time Complexity and Space Complexity, Order of Growth;
Approximation; Asymptotic Notations : Big Oh, Theta, Omega, Amortized analysis, Analysing control
statement, Loop Invariant, Recurrence Relations Introduction, Back Substitution Method, Recursion
Tree Method, Master’s Theorem, Divide and Conquer Algorithm, Multiplying large Integers Problem,
Median of two sorted arrays, Binary search, Quick Sort, Merge Sort, Max-Min problem, Strassen's
Matrix Multiplication, Radix Sort, Bucket Sort.
Greedy Algorithm: General Characteristics, Knapsack Problem, Huffman code, Activity selection
problem, Minimum Spanning trees, Prim’s algorithm, Kruskal’s algorithm with Disjoint sets, Shortest
paths: Dijkstra's Algorithm, Graphs Algorithms:- Applications of DFS- bi-connectivity, Topology Sort,
Articulation point, Connected components, Max-Flow, Min-Cut, Ford-fuelkerson, Dynamic
Programming:- Introduction, Principle of Optimality, Calculating Binomial Coefficient, 0-1 Knapsack,
Matrix chain multiplication, Longest Common Subsequence, All Points Shortest path Floyd Warshall,
Largest Divisible Subset.
Backtracking and Branch and Bound: - State-Space Search Tree, eight queen’s problem, Graph
Colouring, Hamiltonian Cycle, Travelling Salesman Problem using Branch and Bound Approach,
String Matching Algorithms, Naive string-matching algorithm, Knuth Morris-Pratt algorithm.
Module IV: 08 lectures hours
The students will be implementing the fundamental design paradigms like dynamic paradigm,
greedy algorithms, graphs traversing and several others.
Text Books :
1. Cormen, Thomas H., Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. Introduction to
algorithms. 4th ed. MIT press, 2022. ISBN 9780262367505.
2. Horowitz, Ellis, Sartaj Sahni, and Sanguthevar Rajasekaran. Computer algorithms C++: C++ and
pseudocode versions. 2nd ed. The Orient Blackswan, 2019. ISBN 9386235145.
Reference Books :
1. Karumanchi, Narasimha. Algorithm Design Techniques: Recursion, Backtracking, Greedy, Divide
and Conquer, and Dynamic Programming. 1st ed. CareerMonk Publications, 2018. ISBN 978-
8193245255.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET207 Computer Networks L T P C
CO1: Examine the functionality of the different layers within network architecture.
CO2: Illustrate TCP/IP model suite protocols.
CO3: Design the networks for organization and select the appropriate networking architecture and
technologies, subnetting and routing mechanism.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 1 2 2 1 2 1 2 2
CO2 3 3 3 3 3 2 2 2 2 2 3
CO3 2 2 2 1 2 1 2 3
Course Contents:
Why Computer Networks: Applications of Networks, Transmission Media, Connecting Devices, Local
Area Networks: LAN topologies: Bus topology, Ring topology, Star topologies, Mesh topology, Hybrid
topology, OSI reference model, TCP/IP Protocol suite, Physical Layer: Services, Line coding scheme,
Modulation, Multiplexing, Switching methods, Ethernet, Bluetooth, Wi-Fi, Wi-Fi Direct,
WPA/WPA2/WPA3, Data Link layer: Services, Framing, Switches.
Reliable Data Delivery: Error detection, Error Correction, Flow control: Stop and wait, Go Back-N,
Flow control: S-R Protocol, Error control (Retransmission techniques, timers), Medium Access
sub layer - Channel Allocations, LAN protocols /ALOHA protocols, CSMA, CSMA/CD, Network
Layer Protocols: Services (IP, ICMP), IP addressing, sub netting, Super netting (CIDR), IPV4, IPV6.
Routing and Forwarding, Static and dynamic routing, Unicast and Multicast Routing, Distance-Vector
Routing, Link-State Routing, Shortest path computation-Dijkstra's algorithm, Address mapping-ARP,
RARP, BOOTP, DHCP, Transport Layer: Services, UDP and TCP segment formats, connection
establishment and termination, Expert Lecture from Industry, Congestion control, Congestion control:
Open Loop and closed loop, Quality of service, Flow characteristics, Techniques to improve QoS.
Module IV: 07 lectures hours
Session Layer: Services, Protocols, Presentation layer: Services, Protocols, Application layer: Services,
DNS, SIP, RTP, Telnet/SSH, HTTP, HTTPS, Remote login, Electronic mail, SMTP, FTP Commands and
Replies, WWW, SNMP, Addressing Schemes, Uniform Resource Identifiers.
Principles of Cryptography, Symmetric key, Public key, Authentication protocols, Digital signatures,
Firewalls, Security in different layers: Secure E-mail SSL, IP security, Advanced Topics in CN: Dark
Net, CASS: Content-Aware Search System, Service-centric networking, Software-defined networking,
Cloud Systems: Services, Data centre, 4G and 5G Networks, Body area sensor Networks, Satellite
networks, SWARM networks.
Study of different types of networks cables and practically implement the cross-wired cable
and straight through cable using clamping tool. Configure a network topology, connect
different networks, static routing and dynamic routing, virtual LAN, RIP and OSPF using
packet tracer. Also, Wireshark will be used for network troubleshooting, analysis, software, and
communications protocol development.
Text Books :
1. Forouzan, Behrouz A. Data communications and networking. 5th ed. McGraw Hill, 2021. ISBN
1260597822.
2. Wetherall, David J., and Andrew S. Tanenbaum. Computer networks. 6th ed. Pearson Education,
2021. ISBN 9780137523214.
Reference Books :
1. Kurose, James F. Computer networking: A top-down approach featuring the internet. 6th ed.
Pearson Education India, 2017. ISBN 9781485832535.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET208 Ethics for Engineers, Patents, Copyrights and IPR L T P C
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 1 3 1 3 2 2
CO2 1 1 3 1 3 2 2 2
CO3 1 1 3 1 3 2 3
Text Books :
1. Rockman, Howard B. Intellectual property law for engineers and scientists. 2nd ed. Wiley-IEEE
Press, 2020. ISBN 978-1119381976.
Reference Books :
1. Racherla, Uday S. Intellectual Assets for Engineers and Scientists: Creation and Management. 1st
ed. CRC Press, 2018. ISBN 978-1498788472.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET209 Operating Systems L T P C
CO1: To explain the structure and the services provided by the Operating System.
CO2: To define, restate, discuss, and explain the policies for scheduling, deadlocks, memory
management, synchronization, system calls, and file systems.
CO3: To examine distributed Operating System, cloud computing, and Virtualization.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 2 2 3 2
CO2 3 3 3 3 3
CO3 2 3 3 2 3
Course Contents:
Operating system: Organization, abstraction provided by OS, features and roles, OS evolution,
Operating system architecture, OS examples; Process management: Process control block, system calls
and interrupts, context switching, schedular and dispatcher, process states and life cycle, multithreading,
kernel vs. user level threads, process vs. thread; CPU scheduling algorithms: FCFS, SJF, STRF, priority,
round robin, multilevel queue and feedback scheduling, highest response ration next, lottery scheduling.
Memory management, techniques, Contiguous: Fixed and variable length partitioning, Non-contiguous:
Paging, translation lookaside buffer (TLB), multilevel paging, segmentation, segmented paging; Virtual
memory, dynamic loading, demand paging, page fault, thrashing, Page replacement algorithms: First in
First Out (FIFO), Least Recently Used (LRU), Optimal Page Replacement; File organization, access
mechanism, file allocation methods - Contiguous allocation, linked allocation, indexed allocation,
Indexing techniques: Single indirect block, double indirect blocks; Storage management, storage
devices – HDD, SSD; disk architecture, disk performance metrics; Disk scheduling algorithms: FCFS,
SSTF, SCAN, C-SCAN, LOOK, C-Look, NOOP and deadline schedular.
Distributed systems, network vs. distributed OS, robustness analysis, design issues; Remote procedure
call (RPC), structure, parameter passing, handling partial failures, SunRPC and XDR; Distributed file
systems, Servers: stateless and stateful, REST; Distributed shared memory, architecture, design
principles, consistency model; Security systems calls, authentication & authorization, reliability,
availability & privacy, common attacks, crypto systems, Kerberos, access control lists; OS design:
MAC, and iOS; Virtualization: Types, models; Cloud computing, architecture, service and deployment
models, cloud challenges.
Inter process communication, shared memory method, message passing method and its types; Process
synchronization, critical section problem (CSP), synchronization constructs, hardware solutions to
CSP- Lock variables, software solutions to CSP-Peterson solutions, strict alteration; Classical
synchronization problem: Producer consumer problem, dining philosopher problem, reader writer
problem, monitor; Deadlock, necessary condition for deadlock, deadlock handling mechanism:
prevention, avoidance, detection; resource allocation graph, deadlock recovery.
Students will gain practical experience with the implementation and use of operating system
functions such as process management, inter-process communication, process synchronization,
memory management and file systems etc. Moreover, students will have exposure to the tools
for measuring and monitoring of operating systems related parameters and services.
Text Books :
1. Silberschatz, Abraham, Peter B. Galvin, and Greg Gagne. Operating System Concepts. 10th ed.
John Wiley & Sons, 2018. ISBN 978-1-119-32091-3.
2. Stallings, William. Operating systems: internals and design principles. 9th ed. Prentice Hall Press,
2021. ISBN 978-0134670959.
Reference Books :
1. Andrew, S. Tanenbaum, and Bos Herbert. Modern operating systems. 1st ed. Pearson Education,
2021. ISBN 9789332575776.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET210 Design Thinking & Innovation L T P C
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 2 2 3 1 3 2
CO2 3 2 3
CO3 2 3 2 3
Course Contents:
Students are set to embark on a group project designed to foster a holistic understanding of the design
thinking approach applied in project development. Continuous assessments will gauge their
performance against various project-related criteria. The project entails the creation of a poster, video,
blog, report, and presentation, enabling students to explore different deliverables and associated
documentation. The focus is on tackling real-world problems and actionable issues, utilizing technology
and improved design for effective solutions.
The course will be taught using a combination of the best practices of teaching-learning. Multiple
environments will be used to enhance the outcomes such as seminar, self-learning, MOOCs, group
discussions and ICT based tools for class participation along with the classroom sessions. The teaching
pedagogy being followed includes more exposure to hands-on experiment and practical
implementations done in the lab sessions. To make the students aware of the industry trends, one session
of expert lecture will be organized to provide a platform to the students for understanding the relevant
industry needs.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET398 Refresher Course forIndustry Career L T P C
CO1 : Understand the workplace practices and competencies necessary for professional and
academicsuccess.
CO2 : Explore career preferences, professional goals and develop necessary skills.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3 3 3 3 3 3 3 2 3
CO2 3 3 3 3 2 2 3 3 3
Course Contents:
This course will familiarize the students with the process of placements through training and
assessments. Fundamentals of courses, communication & behavioural skills, workshops on relevant
topics and seminars would be conducted. This will help the students to gain practical experience
about the workplace before receiving their undergraduate degrees. They would be able to establish
proficiency in a range of business or industry skills appropriate for internships, placements, including
professional and inter-cultural communication through written, verbal, and non-verbal means.
Semester V
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET301 Artificial Intelligence and Machine Learning L T P C
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 2 3 3 3
CO2 2 3 3 3 3 2 3
CO3 3 3 3 3 3 3 3 3
Course Contents:
Designing a learning system, Types of machine learning: Problem based learning, Supervised learning,
Unsupervised learning, Reinforcement learning, Linear Regression: Weights and Features,
Applications, Cost Functions, Finding best fit line, Gradient Descent Algorithm: Learning Algorithm,
First order derivatives, Linear regression using gradient descent, Learning rate, Logistic Regression,
Sigmoid Function, Cost Function for Logistic Regression, Multi-class classification, Probability
Distribution, SoftMax Function, Polynomial Regression, Performance Metrics: Classification
(Confusion Matrix, Accuracy, Precision, Recall, F1-score, ROC-AUC), Regression (MSE, MAE,
RMSE, R2 Score).
Decision Tree, Selecting Best Splitting Attribute, CART (Gini Index). ID3 (Entropy, Information Gain),
Hyperparameters in Decision tree, Issues in Decision tree learning. Overfitting and Underfitting, Bias
and Variance, Cross Validation. Ensemble Learning (Concord’s Theorem), Bagging, Bootstrap and
Aggregation, Random Forest. Boosting, AdaBoost, Gradient Boost. Feature Engineering, Feature
Selection, Feature Extraction.
Artificial Neural Network, Neural network representation, Perceptron model, Stepwise v/s Sigmoid
function, Multilayer perceptron model, Matrix Calculus (Jacobian, Hessian Matrix), Computation
Graph, Backpropagation Algorithm, Activation Functions, Stochastic Gradient Descent, Batch Gradient
Descent, Mini-Batch Gradient Descent, Vanishing and Exploding Gradients, Overfitting Problem,
Regularization (Ridge, Lasso, Elastic), Dropout and Early Stopping, Bayesian Learning: Bayes theorem
and concept learning, Naïve Bayes classifier, Gibbs Algorithm, Bayesian belief networks, The EM
algorithm, Support Vector Machines, Hyperplane, Support Vectors, Kernels, Non-Parametric
Regression, Locally weighted regression, K-nearest neighbour.
Population Based Algorithms: Genetic Algorithm, Fitness Function, Selection, Crossover, Mutation,
Swarm Optimization, Particle Swarm Optimization, Ant-Colony Optimization, Reinforcement
Learning, Actors, State, Reward Policy, Actions, Computer Vision, Convolutional Neural Networks,
Deep Learning for Sequential Data, Recurrent Neural Network, LSTM, GRU, Natural Language
Processing, Word Embeddings, Transformers (BERT and GPT), Building and Deploying ML models
(MLFlow), MLOps, Need of MLOps, ML Production Infrastructure.
It is concerned with the design, analysis, implementation, and applications of programs that
learn from experience. Learning algorithms can also be used to model aspects of human and
animal learning.
Text Books :
1. Mitchell, Tom M. Machine Learning. 1st ed. McGraw Hill, 2017. ISBN 978-1259096952.
2. Alpaydin, Ethem. Introduction to machine learning. 4th ed. Phi, 2020. ISBN 978-8120350786.
Reference Books :
1. Campesato, Oswald. Artificial intelligence, machine learning, and deep learning. 1st ed. Mercury
Learning and Information, 2020. ISBN 9781683924665.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET302 Automata Theory and Computability L T P C
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 3
CO2 3 3 3 2 3 3 3
CO3 2 3 3 2 3 3
Course Contents:
Introduction, Sets, Relation, and Functions, Mathematical Logics, Formal Languages, Language
Classification, Finite Automata: Finite State Machine, DFA, NFA, epsilon-NFA, Equivalence between
NFA to DFA, Equivalence between epsilon-NFA to DFA, Minimization of DFA, Regular Language,
Regular Expression, Regular Expression to Finite Automata, Finite Automata to Regular Expression,
Arden’s Theorem, State Elimination Method, Pumping Lemma, Closure Properties of Regular
Languages, Decision Properties of Regular Languages, Finite Automata with Output, Mealy Machine,
Moore Machine, Equivalence between Mealy and Moore Machine, Properties and Limitation of FSM.
Context Free Grammar, Context Free Language, Regular Grammar, Left and Right Associative
Grammar, Left Derivation and Right Derivation, Removal of Ambiguity in Grammar, Normalization of
Grammar, CNF, GNF, Deterministic Push Down Automata, Non-Deterministic Push Down Automata,
Comparison between DPDA and NPDA, Pumping Lemma for CFG, Closure Properties of CFG,
Context Sensitive Grammar.
Turing Machine: Definition and Design, Church-Turing Thesis, State Transition Diagram for Turing
Machine, Un-restricted Grammar, Universal Turing Machine, Combining Turing Machines, Variations
of Turing Machine, Multi stack PDA, Multi-tape TMs, Single sided infinite tape TMs, Non-
deterministic TMs, Multi-head TMs, Post Correspondence Problem, Halting Problem, Enumerability
of TMs, Acceptability of TMs, Decidability of TMs, Rice Theorem, Chomsky Hierarchy,
Diagonalization.
Module IV: 10 lecture hours
Text Books :
1. Peter, Linz. An Introduction to Formal Languages and Automata. 6th ed. Jones & Bartlett
Learning, 2016. ISBN 9781284077247.
2. Sarkar, Bikash Kanti and Ambuj Kumar. INTRODUCTION TO THEORY OF COMPUTATION.
1st ed. The Orient Blackswan, 2019. ISBN 9789386235757.
Reference Books :
1. Wigderson, Avi. Mathematics and computation: A theory revolutionizing technology and science.
1st ed. Princeton University Press, 2019. ISBN 978-0691189130.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET303 Seminar on Special Topics in Emerging Areas L T P C
CO1: To articulate speech preparation and presentation techniques, audience awareness and self-
awareness along with the cultivation of self-confidence.
CO2: To examine the ability to present scientific material in visual, written and oral form including the
formulation of an effective presentation on a topic in the Computer Science domain.
CO3: To explain an ability to listen to a scientific presentation with the discussion of the strengths and
weaknesses of a speaker's presentation.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 2
CO2 3 3 3 2 2 3 2
CO3 2 2 2 3 2 2
Course Contents:
This course focuses on developing students' proficiency in researching, selecting, and presenting topics
within computer science through seminars. The curriculum encompasses an exploration of emerging
engineering research areas and industry requirements. Students will undergo training in effective
presentation skills, including verbal communication, visual aid design, and written content structuring.
Practical application is emphasized through individual and group exercises, peer reviews, and feedback
sessions. Guest lectures from industry professionals provide insights into current and future trends. The
course culminates in students delivering final seminars, incorporating learned skills. Assessment
methods include topic proposal and research, mid-term presentation skills assessment, seminar
preparation, peer-reviewed practice presentations, and a final seminar presentation. Through this
holistic approach, students enhance both their presentation capabilities and their understanding of the
dynamic landscape of computer science.
Text Books :
1. Geraci, Angelo. Special Topics in Information Technology. 1st ed. Springer International
Publishing, 2021. ISBN 9783030624765.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET304 Competitive Programming L T P C
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3 2 2 3 3 2
CO2 3 3 3 3 1 3 3 2
This course having multiple problems statements from the following topics in each lab. Coding Exercise
and Mathematics; Basic Data Structures (Array); LinkedList, Searching and Sorting, Stack and Queue;
Bit manipulation, Divide and Conquer, Greedy and Dynamic Programming (DP); Backtracking, Branch
and bound, Tree algorithms; Combinatorial Games; Basic Graph Algorithms; Shortest Path Algorithms
and Network, Flow Problems; String Algorithms, Randomized Algorithms, Approximation Algorithms,
Geometric Algorithms, Optimization Algorithms, Game Theory, Online algorithms.
Text Books :
1. Laaksonen, Antti. Competitive programmer’s handbook. 1st ed. Springer, 2018. ISBN 978-
3319725468.
2. Laaksonen, Antti. Guide to competitive programming. 1st ed. Springer International Publishing,
2020. ISBN 9783030393577.
Reference Books :
1. Dürr, Christoph, and Jill-Jênn Vie. Competitive programming in Python: 128 algorithms to
develop your coding skills. 1st ed. Cambridge University Press, 2020. ISBN 9781108716826.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET305 High Performance Computing L T P C
CO1 : Compare and Analyze data parallel and task parallel algorithms and their serial versions for
searching and sorting tasks on matrix, tree, and graph data structures.
CO2 : Explain distributed memory, message passing modelling and mapping of parallel programs to
physical processors.
CO3 : Implement serial and parallel algorithms for different applications using HPC libraries.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 2 2 1 1
CO2 2 3 2 3 1 2
CO3 3 3 3 2 3 2 3
Course Contents:
Distributed BFS, Graphs and adjacency matrix, Matrix based BFS, CUDA programming, Parallel
matrix operations, Sparse vs Dense matrices, BLAS, LAPAC, Cluster Computing, Job Scheduling,
Load Balancing, Resource Allocation, Code optimization, Memory management for Parallel
computing, Distributed memory sorting, Graph Partitioning, Parallel graph operations, Advanced
research topics and tools in HPC, SLURM, LSF, InfiniBand, libraries for Cloud HPC, OpenACC,
Docker, containers and Kubernetes, Shell, Power Shell.
Text Books :
1. Robey, Robert, and Yuliana Zamora. Parallel and high performance computing. 1 ed. Manning,
2021. ISBN 9781638350385.
2. Sterling, Thomas, Maciej Brodowicz, and Matthew Anderson. High performance computing:
modern systems and practices. 1 ed. Elsevier Science, 2017. ISBN 9780124202153.
Reference Books :
1. Dimov, Ivan, and Stefka Fidanova, eds. Advances in High Performance Computing: Results of the
International Conference on “High Performance Computing” Borovets, Bulgaria, 2019. Vol.
902. Springer Nature, 2020. ISBN 9783030553477.
Semester VI
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET306 Undergraduate Research in Computer Science L T P C
Engineering
CO1: Build sufficient background and contextual knowledge by conducting a thorough literature
search.
CO2: Make use of knowledge gained from literature to identify the gaps in the present study to construct
the research goal(s)/question(s) and execute the study.
CO3: Write a coherent scientific report/research paper including context, methods, discussion.
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 1 2 3 3
CO2 1 2 3 3
CO3 1 2 3 3
1=weakly related 2= moderately related 3=strongly related
Course Contents:
Text Books :
1. Robson, Colin. How to Do a Research Project: a guide to undergraduate students. 1 ed. Wiley,
2016. ISBN 9781118691326.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET399 Summer Internship L T P C
CO1: To gain a better understanding of the workplace and developed and demonstrated workplace
competencies necessary for professional and academic success.
CO2: To clarify career preferences and professional goals.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 2 1 1 3 2 3 1 2
CO2 2 3 1 2 3 3
Course Contents:
Summer internship program allows students to gain practical experience in the workplace before
receiving their undergraduate degrees. The student identifies companies willing to hire him/her on a
full-time basis for an 4-8 week period. A basic premise for this course is that career-related work
experiences during graduation benefit students by allowing them to gain comfort and confidence in job
performance and job search skills, explore compatibility with specific careers and companies, and
become more mature professionally. Students will gain an understanding of workplace dynamics,
professional expectations, and the influence of culture on both. Build proficiency in a range of business
or industry skills appropriate to the field of the internship placement, including professional and inter-
cultural communication through written, verbal, and non-verbal means. Refine and clarify professional
and career goals through critical analysis of the internship experience or research project.
Semester VII
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET402 Capstone Project L T P C
CO1: Finalize the Capstone Project problem which is of the level of representative of the Undergraduate
work.
CO2: Evaluate the proposal keeping in view the different stakeholders including potential customers
and market analysis.
CO3: Assess the idea from feasibility, scope, timeline and delivery point of view.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3 3
CO2 3 3 3 3 3 3 3
CO3 3 3 3 3 3
Initial Milestones of the Capstone Project should be completed in this course. In this semester
students should have a full understanding of the problem he is working upon and should be able to do
all the preliminary analysis and documentation required for Capstone. Student should be able to discuss
with potential stakeholders about the viability, risks and opportunities associated with the project. He
should also assess it from the point of view of scope and limitations, so that it can be completed in time
with desired functionalities. Students will be discussing the proposed project with the instructors and
iterate to make it more optimistic and workable for the issuing facing the society.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET497 Professional PracticalInternship L T P C
CO1: Identification of the existing problem in the workflow for performing a specific task.
CO2: Implementation of the solutions developed for the assigned/identified real world problems.
CO3: Develop technical writing skills for presenting the solution designed for the problem statement
following ethical and legal standards.
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 3
CO2 3 3 3 3 3 3 3
CO3 3 3 3 3 3
The purpose of the semester long project is to enable the students to further explore and learn about the
application of the theoretical concepts studied in the previous semesters and develop the understanding
related to the implementation, design and theoretical aspects of the computer science and its application
to the practical problems. Student will extend and deepen the knowledge of the computer science while
working. Student will be learning what it's like to be part of a workforce: howto deal with the fellow
workers, including your bosses; how to take suggestions, (including criticism);how to contribute in the
team, and so on. Immersed in this absorbing and exciting world, it's easy to lose sight of the academic
world, but remember that the project semester is really part of your university education. The developed
projects would be assessed based on the following points: The relevance and novelty of the problem
statement. The design of the proposed solution. Use of latest tools/technology for implementing the
designed solution. Ability to collaborate, coordinate and work in a team. Presentation and technical
reporting of the solution designed for the real-world problem. Ethical and legal standards followed for
developing the solution.
Semester VIII
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET499 Industrial Project/R&D Project/Start-up L T P C
Project
CO1: Identification, formulation and analysis of the existing problem in the (non-automated) workflow
for performing a specific task. Design and implementation of the automated solutions for the
assigned/identified real world problems.
CO2: Technical report writing. Practice and further development of skills in time management and
reporting within an industrial or research laboratory setting.
CO3: Contribute to an ethical and professional work culture and to learn to work in diverse teams.:
Integration and application of knowledge and skills acquired in earlier course work.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 2 1 1 3 3 2 2 3
CO2 2 2 1 2 2 3
CO3 3 3 2 3
Course Contents:
The purpose of the project semester is to further develop the understanding related to the
implementation, design and theoretical aspects of the computer science and its application to the
practical problems. Many of the subjects that a student had studied in the university have a direct impact
on what the student will be doing in the software house / industry. Student will extend and deepen the
knowledge of the computer science while working. Student will be learning what it's like to be part of
a workforce: how to deal with the fellow workers, including your bosses; how to take suggestions,
(including criticism); how to contribute in the team, and so on. Immersed in this absorbing and exciting
world, it's easy to lose sight of the academic world, but remember that the project semester is really part
of your university education. Computer Science Engineering department has developed several learning
outcomes for it, and department will evaluate a student based on these tasks and goals to see how well
a student has achieved the learning outcomes. There are few points to worth about the of the semester
project, which are as following: It is the largest single piece of work you will do during your degree
course. It is the part of the curriculum that allows you to specialize in a topic you are good at or enjoy.
It allows you to show off a wide range of the skills and knowledge learned during your course. It
encourages integration of material learned in a number of course units. It gives you an opportunity to
learn higher level of project related skills as given in the learning outcomes for project semester. A
company involved in developing Websites, Mobile Apps, Business applications, Societal applications
in different domains of Computer Science Engineering. Company / Academic Institution/ research
institute must deal in the software related projects. Work assigned having a profile of system analyst,
Tester, Quality Analyst, Data Scientist, Data Analytics, Programmer, Software Engineer or similar is
acceptable. Student must not opt for the profile related to sales or marketing. Student may opt for
startups. Project must be related to the phases of software development life cycle. Projects having some
research insights will be appreciated. No Self-Certification or online training courses will be considered
as a substitute of project semester. However, these can be good value additions to the real industry
projects and may add value to your assessment.
Specialization
Core I and II
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET211 Statistical Machine Learning L T P C
CO1: To articulate key features and methods of Statistical Machine Learning (SML).
CO2: To formulate and design the given application as a statistical machine learning problem.
CO3: To implement and evaluate common statistical machine learning techniques.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 3 2 2 2 2 2 2
CO2 2 3 2 2 2 2 2 2
CO3 2 2 3 3 2 2 3
Course Contents:
Statistical Theory, Supervised Learning, Unsupervised Learning, Data and Types, Feature variable,
Machine Learning, Statistics terms, Supervised learning, Concentration inequalities, Generalization
bounds, Plugin classifiers, Least-squares methods, Bias vs Variance, Theory of generalization,
Understand Underfitting, Overfitting, Parametric methods, Maximum likelihood, Bayes algorithm,
Minimax algorithm, Expectation-Maximization, Advantages and Disadvantages, Applications of EM
Algorithm, Use case of EM Algorithm.
Basis pursuit, Polynomial Expansion, Feature maps, The “kernel trick”, Vapnik-Chervonenkis
(VC) dimension, VC generalization bounds, Sparsity: High dimensional data, The role of sparsity,
Sparsistency, Consistency, Persistency, Sparsity in nonparametric regression, Sparsity in graphical
models, Greedy algorithms, Sparse linear regression, Compressed sensing, Nonparametric Methods:
Nonparametric regression, Density estimation, Factor Analysis, Matrix Factorization, The bootstrap,
Subsampling, Nonparametric Bayes.
Module IV 12 lecture hours
Probability Distributions for modelling, Markov Networks, Hidden Markov Model, Advanced
Theory: Concentration of measure, Covering numbers, Learning theory, Exact learning (Dana Angluin),
Probably approximately correct learning (PAC learning), VC theory (Vladimir Vapnik and Alexey
Chervonenkis), Risk minimization and its approaches, Bundle Methods, Graph Analytics, Graph-based
machine learning algorithms, Simulation methods, Variational methods, Tsybakov noise conditions,
Surrogate loss functions, Minimax rates for classification, Minimax rates for regression, Manifold
methods, Spectral methods.
Students will gain practical experience with the implementation of different statistical methods by using
different statistical machine learning tools. Eventually, the lab works formulate the problem as a
statistical machine learning problem followed by its implementation.
Text Books:
1. Masashi Sugiyama, Introduction to Statistical Machine Learning on (1st ed.), Morgan Kaufmann,
2017. ISBN 978-0128021217.
2. T. M. Mitchell, Machine Learning (1st ed.), McGraw Hill, 2017. ISBN 978-1259096952.
Reference Books
1. Richard Golden, Statistical Machine Learning A Unified Framework (1st ed.), CRC Press 2020.
ISBN 9781351051490.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET212 Blockchain Foundations L T P C
CO1: To articulate the fundamentals of blockchain and able to explain cryptographic concepts
underlying blockchain technology.
CO2: To examine various types of Blockchain networks and consensus algorithms.
CO3: To make use of wallet transactions, crypto tokens, analyse the block details and Blockchain
CO – PO /PSO Mapping:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 2 3 2 2 2 2 2 2 2 2 2 2 3 2
CO2 2 3 2 2 2 2 2 2 2 2 2 2 2 3 -
CO3 2 2 2 2 2 2 2 2 2 3
Course Contents:
Proof of Stake, Difference between PoW vs PoS, Byzantine General Problem, BFT (Byzantine fault
tolerance), PBFT (Practical Byzantine fault tolerance), Delegated Proof of Stack, Paxos Consensus
algorithm, Raft Algorithm, Solo Miner, Pool Miners, Smart contracts in Blockchain, Solidity, Data
types in solidity, Operators, State variables, Global Variables, Local variables.
In studio work, students will learn to implement various cryptographic primitives such as
symmetric/asymmetric cryptosystems, digital signatures and hash functions. Further, students will setup
a MetaMask Ethereum wallet in the web browser to create wallets (User Accounts) and use it to send
and receive Ethers. Use EtherScan to view the transaction details, explore Blockchain test networks to
perform transactions, execute smart contracts, and launch Dapps. This lab provides a platform to create
a genesis block to set up the private blockchain network using Go Ethereum (Geth) and Mist, start
mining with miner.start() command. In addition, students will learn creating and deploying the simple
smart contracts like “Hello World”, incrementing/decrementing the counter variable on the Blockchain
network.
Text Books:
1. Bettina Warburg, Bill Wanger and Tom Serres, Basics of Blockchain on (1st ed.), Independently
published, 2019. ISBN 978-1089919445.
2. Holbrook and Joseph, Architecting enterprise blockchain solutions (1st ed.), John Wiley & Sons,
2020. ISBN 978-1119557692.
Reference Books:
1. Bashir and Imran, Mastering blockchain: “Distributed ledger on technology, decentralization, and
smart contracts explained (1st ed.), Packt Publishing Ltd, 2018. ISBN 978-1788839044.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET213 Linux and Shell Programming L T P C
CO1: To articulate Linux commands that are used to manipulate system operations at an admin level.
CO2: To write Shell Programming using Linux commands.
CO3: To design and write applications to manipulate internal kernel-level Linux File systems.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO PSO
2 3
CO1 2 3 2 2 2 2 2 2 2 2 2 2 3
CO2 2 3 2 2 2 2 2 2 2 2 2 2 2
CO3 2 2 3 3 2 2 2 2 2 2 2 2 3
Course Contents:
Linux and Linux utilities, Architecture of Linux, features of Linux, Introduction to vi editor, Linux
commands, File handling utilities, security by file permissions, process utilities, disk utilities,
Networking commands, Text processing utilities, backup utilities, User management.
Shells need and types, Derived Operators, Linux session, Standard streams, Redirection, Pipes, Tee
command, command execution, command-line editing, Quotes, command substitution, job control,
aliases, variables, shell/environment customization, Filters, and pipes, File operations.
Grep Operation, Grep Commands, Grep Address, Grep Application, Seed Scripts, operation, Unix file
structure, File descriptors, System calls and device drivers, File management, File structures, System
calls for file management, Directory API, Process and Process Structure, Process table, Viewing
processes, System processes, Process scheduling, zombie processes, orphan process,Fork and its
operation, Signals functions, unreliable signals, interrupted system calls, Signal sets,
File locking, Threats and Vulnerabilities analysis of Linux- direct, indirect, veiled, conditional, Security
Measures in Linux-SSH key pair, Scan Log files , Close Hidden ports, Linux Malwares-
Botnets, Ransomware, Rootkits, Socket, Socket communications, UDP, TCP, AWK, Shell Scripting
and Security- Password Tester, Permissions and Access Control Lists, Shell Scripting for DevOps-
Using environment variables, Bash Script.
Studio Work / Laboratory Experiments:
Students will use LINUX / UBUNTU to gain hands-on experience on LINUX and Shell programming,
Linux commands, their uses and practice, editors: vi, nano etc, Introduction to Shell, Shell basic
commands, variables Shell programming environments- filters and pipe, Shell programming File
handling, Grep its use and commands. Using of Grep with pipe and filters, Unix file structuring, inodes
and related system calls. File handling commands and API, Network Penetration testing tools,
Wireshark, Nmap, Hash cat, Process management, creation, termination and other useful commands,
Process scheduling. Parent, zombie and orphan process, Process system calls. Fork, exec, wait and
signal, various commands. Basics of Socket Programming via UDP socket.
Text Books:
1. Mallett, Andrew. Mastering Linux Shell Scripting. Packt Publishing Ltd, 2018. ISBN 978-
17889905542.
2. Blum, Richard. Linux command line and shell scripting bible. Vol. 481. John Wiley & Sons, 2008
ISBN 9781119700930.
Reference Books:
1. Stevens, W. Richard. UNIX network programming. Volume 2: lnterprocess communications.
Prentice hall, 1999. ISBN 9788120307490.
2. IMRAN, BASHIR. "MASTERING BLOCKCHAIN: distributed ledger technology,
decentralization, and smart contracts explained, ; distributed ledger.". ISBN 978-1788839044.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET214 Data Analysis using Python L T P C
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 2 2 2 2 2 2 2 2 3
CO2 2 2 2 2 2 2 2 2 2 3
CO3 2 2 2 2 2 2 2 2 2 3
Course Contents:
String Manipulations, Demonstrating string functions, A regular expression for data, manipulation,
Data Visualization, Using Histograms, Using Boxplots, Plotting data, Venn Diagram, Bar Chart, Pie
Chart, Line Chart, Scatter Plots and R2, Grouped charts, Area Charts, Descriptive Statistics, Central
tendencies, Analyzing variability, Data Distributions, Random Variables, Bernoulli Distribution,
Binomial Distribution, Normal Distribution, Z score, Statistical Properties, Standard Normal
Distribution, Correlation: Pearson correlation method.
Text Books:
1. Motwani, Bharti. "Data Analytics using Python." (2020). ISBN 8126502959.
2. Klosterman, Stephen. Data Science Projects with Python: A case study approach to successful data
science projects using Python, pandas, and scikit-learn. Packt Publishing Ltd, 2019. ISBN 978-
1838551025.
Reference Books:
1. Mukhiya, Suresh Kumar, and Usman Ahmed. Hands-On Exploratory Data Analysis with Python:
Perform EDA techniques to understand, summarize, and investigate your data. Packt Publishing
Ltd, 2020. ISBN 9781789537253.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET215 Graphics and Visual Computing L T P C
CO1: To demonstrate various graphics primitives and 2-D, 3-D geometric transformations and clipping
techniques.
CO2: To comprehend the concepts related three-dimensional object representations.
CO3: To demonstrate the use of OpenGL to create interactive computer graphics applications.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 2 3 2 2 2 2 2 3 2
CO2 2 3 2 2 2 2 2 2 3
CO3 2 2 3 2 2 2 2 3 2
Cohen Sutherland clipping, Liang Barky clipping algorithm, Sutherland Hodgeman polygon clipping,
Weiler Atherton Polygon clipping algorithm, Three-Dimensional Object Representations, 3D
Modelling transformations, Parallel and Perspective projection, Sutherland Hodgeman 3D clipping,
Curved lines & Surfaces, Spline representations, Spline specifications, Bezier Curves & surfaces, B-
spline curves & surfaces, Rational splines, Displaying Spline curves & surfaces, Rendering, Polygonal
representation.
Affine and coordinate system transformations, Visibility and occlusion, Depth buffering, Painter’s
algorithm, Ray Tracing, Forward rendering, Backward rendering, Phong Shading, Per pixel per vertex
Shading, Visualization of 2D/3D scalar fields, Color mapping, ISO surfaces, Direct volume data
rendering, Raycasting, Transfer functions, segmentation, Visualization of: Vector fields, flow data.
Module IV 7 lecture hours
Lab work would be conducted in OpenGL. All the basic drawing, filling, transformation and clipping
algorithms will be covered.
Text Books:
1. Gunawardhana, Pulasthi. Computer Graphics: Theory and Practical. Scientific Research
Publishing, Inc. USA, 2020. ISBN 9781618969021.
2. Majumder, Aditi, and Meenakshisundaram Gopi. Introduction to Visual Computing: Core Concepts
in Computer Vision, Graphics, and Image Processing. CRC press, 2018. ISBN 9781482244915.
Reference Books:
1. Thompson, William, Roland Fleming, Sarah Creem-Regehr, and Jeanine Kelly Stefanucci. Visual
perception from a computer graphics perspective. CRC press, 2011. ISBN 9780367659288.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET216 UI/UX Design for Human Computer L T P C
Interface
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO PSO
2 3
CO1 2 2 2 2 2 2 3
CO2 2 2 2 2 2 2 3
Course Contents:
Historical evolution GUI, Interactive system design: Concept of usability, HCI and software
engineering, GUI design and aesthetics, Prototyping techniques, Heuristic Evaluation, Experimental
Design, Importance and benefits of good design, Screen design. Scenarios, Design Process.
Characteristics of user interface, Web user – Interface popularity, Psychology and Human factors,
Conceptual Models, Mistakes and Error, Cognitive models, Socio-Organizational and stakeholder
requirements, Social Computing, Experiments designing concepts and methods, Communication and
collaboration models, Mobile Ecosystem: Platforms.
Application frameworks, Widgets, Applications, Mobile Design: Elements, Tools, Mobile design case
studies, Human interaction with computers, design rules, Universal Design Models and Theories,
Interface implementation & evaluation, Communication and collaboration models, Power of the Crowd,
crowdsourcing, Internet of things in HCI, Experimental Design. Experiments designing concepts,
Exploring design for HCI, GOMS for HCI, Identify Color Guidelines, Stages of action in interaction,
Menu types and design, Construction of Prototype, Design Principles for HCI.
HCI for navigation design, Forms and behavior, Design and data for HCI, One factor test with human
subjects, Ubiquitous computing with design analysis, Interface implementation, A/B testing, T-tests,
Data assumptions and distributions, Interpretation of non-numeric response, Generalized linear models
Case studies.
Students will learn to understand the trouble of interacting with machines and design a system based
on user-centered approach.
Text Books:
1. Bhattacharya, Samit. Human-Computer Interaction: User-Centric Computing for Design.
McGraw-Hill Education, 2019. ISBN 9789353168056.
2. Thakur, Nirmalya, and B. D. Parameshachari, eds. Human-Computer Interaction and Beyond:
Advances Towards Smart and Interconnected Environments (Part II). Bentham Science Publishers,
2022. ISBN 9789814998826.
Reference Books:
1. Preece, Jenny, Yvonne Rogers, Helen Sharp, David Benyon, Simon Holland, and Tom
Carey. Human-1. computer interaction. Addison-Wesley Longman Ltd., 1994.ISBN
9781119547358
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET217 Software Development with DevOps L T P C
CO1: To articulate DevOps engineering and DevOps terminologies to meet the business requirements.
CO2: To construct different applications of DevOps that can be used on different platforms.
CO3: To design and execute projects using different tools, modules, and templates.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 2 2 2 2 3 2 2 3
CO2 2 2 2 2 2 2 3
CO3 2 2 2 2 1 1 2 2 3
Course Contents
Why DevOps? , Terminologies, DevOps Stakeholders and roles, DevOps Perspective: People, Process
and Product, Building Teams, Boston Consultancy Group (BCG) Matrix, Three Horizons Model,
Autonomous Team and its Pros and Cons, Autonomy Criteria, Decoupling Point for Autonomous Team,
Case Study on Autonomous Team, DevOps and ISTM (IT Service andManagement), Traditional Vs
Agile DevOps, DevOps Phases with diagram representation, Introduction of Source and Version
Control (SVC), Algorithms for SVC: Lock-Modify-Unlock and Copy-Modify -Merge, Continuous
Integration, and Deployment (CICD), Software Craftsmanship, Software Containerization, System
Provisioning, and Configuration Management, Testing and Test Automation.
Service-Oriented Architecture and Microservices, Build and Release Management, Virtual Systems,
Hypervisor Cloud Computing, Need of Cloud Computing with Application, Delivery Models of Cloud
Computing, Deployment Model of Cloud Computing, Git Desktop Usage, and Benefits, Connecting
Git Desktop and Git Online, Git Version Control, and Types, Distributed Version Control Systems with
Example, Centralized Version Control Systems with Example, Configuration Management, Chef
Configuration, Workstation Setup, Configuration of the knife, Test Connection between Knife and
Workstation, Organization Setup, Creation and Connection of Node to Organization, Operations on
Node, Object and Search, Creation of Environments and Connecting them with Servers.
Puppet, Puppet Working and Architecture, Master and Agents in Puppets, Installing Puppet,
Configuring Puppet Master and Agent, Connecting Agents, Puppet Language, Declarative Language,
Resources, Files, Exec, Packages, Service in Puppets, Virtual Resources and Exported Resources.
Module IV 13 lecture hours
DevOps Security, Issues in DevOps Security, DevOps Security Needs and Challenges, DevOps Risks
Management, Strategies, Policies, Practices for DevOps Security, DevOps Security Tools, DevOps
security over Clouds, Security Models, and their Use, Modules and Templates forDevOps, DevOps
Manifests, Class Templates Static and Dynamic Content, ERB Module, NTP Module, SSH Module,
Sudo Module, Install LAMP with pre-existing Modules.
The studio work of this course introduces to setup a home lab for DevOps project for DevOps tools
Jenkins, Docker, Ansible, Kubernetes with hands-on experience of concepts taught in the lecture. The
lab component also includes installation of Git Bash, Git Hub, Jenkins, Docker, Ansible, Kubernetes.
Text Books:
1. Mark Reed, DevOps: The Ultimate Beginners Guide to Learn DevOps Step-by-Step (1st ed.),
Publishing Factory, 2020. ISBN 9781647710941.
2. Gene Kim, Kevin Behr, and George Spafford, The Phoenix Project (5th ed.), IT RevolutionPress,
2019. ISBN 978- 1942788294.
Reference Books:
1. Gene Kim and John Willis, Beyondthe Phoenix Project: The Origins and Evolution of DevOps
(1st ed.), IT RevolutionPress, 2018. ISBN 9781942788256.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET218 Full Stack Development L T P C
CO1: To understand the Client-Server architecture and the basics of client-side programming
languages and frameworks.
CO2: To examine of client-side languages: HTML, CSS, and JavaScript.
CO3: To implement client-side application development.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 2 2 2 2 1 1 2 1 1 2 1 2 3
CO2 2 2 2 2 1 1 1 1 1 2 2 2 3
CO3 2 2 2 2 1 1 1 2 1 2 2 2 3
Course Contents
Why CSS? W3C CSS Validator, Syntax, Types, CSS Selectors, Cascading, Inheritance, Specificity,
Units of Measure, Width and Height of element, Box Model Layout, Border Box Versus Content Box,
Responsive website Design Bootstrap Grid System, CSS pre-processor:Less, Sass and features.
JavaScript, JavaScript Events, JavaScript APIs, Expert Lecture from Industry, Ajax Web App Flow,
Ajax Process Refreshing ES6 Specifications and Features ECMA Script, ES6 let and const, The arrow
functions, ES6 Classes Inheritance, Spread Operator, Iterators and Generators, React, React in HTML,
React in CSS, Built in libraries Leveraging Virtual DOM, Setting up React, Configure git/client,
Creating Repositories, push local repositories to GitHub, Git Branching and Merging , Web Publishing
ethics, Hosting a website.
In studio work, developers develop both the front-end and the server-side of the application, deploy,
debug and maintain their databases and servers. Being a Full Stack Web Developer, you will be at an
edge as you make better technical decisions and see the big picture.
Text Books:
1. Flanagan, D., JavaScript: The Definitive Guide (7th ed.), Shroffand O'Reilly Media, 2020. ISBN
978935213996.
2. Robbins, J., Learning Web Design: A Beginner's Guide to HTML, CSS, JavaScript, and Web
Graphics (5th ed.), O'Reilly Media, 2020. ISBN 978-1491960158.
Reference Books:
1. Meloni, J.C. and Kyrnin J, HTML,CSS, and JavaScript All in One, SamsTeach Yourself (5th ed.),
Pearson, 2018. ISBN 9789389552416.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET219 Quantum ComputingFoundations L T P C
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 1 1 2 2 2 2 2
CO2 2 2 2 2 2 2 2 3
CO3 1 1 2 2 2 2 2 3
Course Contents
Defining Quantum Circuits, Quantum Teleportation, Variational Quantum eigen solvers, Quantum
Algorithms, Deutsch-Jozsa Algorithm: Classical and quantum solution, Constant and Balanced
Oracle, Bernstein-Vazirani Algorithm: Classical and quantum solution, Simon's Algorithm:
Classical and quantum solution, Upper bound and Lower bound, Quantum Fourier Transform,
Quantum Phase Estimation, Shor's Algorithm: Factoring, Reduction from factoring to period-
finding, Shor's period- finding algorithm, Continued fractions, Grover's Algorithm: Unstructured
search problems, 2-Qubits and 3-Qubits using oracle, Amplitude amplification, Optimality of
Grover’s Algorithm, Reduction to ThreeInequalities, Proofs of the Three Inequalities, Quantum
Counting, Controlled-Grover Iteration, Inverse QFT, Classical random walks, Classical Markov
chains, Quantum walks, Quantum Walk searchAlgorithm, On hypercube, QWSA Collision problem,
Finding a triangle in a graph.
The HHL Algorithm, solving linear systems of equations using HHL, Improving the efficiency of
the HHL algorithm, Combinatorial Optimization problems, Quantum Approximate Optimization
Algorithm, Satisfiability Problems, Solving Satisfiability problems using Grover’s Algorithm,
Variational Quantum linear solver, Solving the Travelling salesman problem using, phase
estimation, Quantum Query Algorithm, The polynomial method, The quantum adversary method,
Quantum Complexity Theory, Classical and quantum complexity classes, classically simulating
quantum computers in polynomial space.
Quantum Merlin-Arthur Problem, The local Hamiltonian problem, Local Hamiltonian is QMA-
complete, Quantum Encodings, Mixed states and general measurements, Quantum encodings and
theirlimits, Classical error-correction, Quantum error-correction, Quantum error-correcting codes,
Fault- tolerant quantum computation, Concatenated codes and the threshold theorem, Quantum
error- correction using repetition codes, Measurement error mitigation, Density Matrix and Mixed
States, Quantum Image Processing: FRQI and NEQR image representation, Quantum Edge
Detection.
In-studio work, students will be setting up the environment for programming using Qiskit, they
will bedesigning and analyzing quantum algorithms.
Text Books:
1. Jack D. Hidary, Quantum Computing: AnApplied Approach (1st ed.), Springer, 2019. ISBN 978-
3-030-23921-3.
2. Ronald de Wolf, Quantum Computing: Lecture Notes (1st ed.), arXiv, 2021. ISBN
arXiv:1907.09415v2.
Reference Books:
1. Venkateswaran Kasirajan, Fundamentals of Quantum Computing (1st ed.), Springer, 2021. ISBN
9783030636895.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET220 Unmanned Aerial Vehicles L T P C
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 2 1 2 2 2 2 3
CO2 2 2 1 2 2 2 3
CO3 2 1 2 2 2 2 3 3
Course Contents
Why Unmanned Aerial Vehicle (UAV)? Introduction to UAVs/Drones; Unmanned Aerial Systems
(UAS); History and Modern Trends; Technological Advancements; UAV Concept of Operations;
UAV Chemical, Biological, Radiological and Nuclear (CBRN); UAV Classification: Wing
Geometry Based, Payload Based, Size Based, Mission Based; UAV Anatomy; Mission Planning.
Basic UAV Aerodynamics: Wing Configuration and Thrust; Airframe Configuration; Lift and
Drag; Aerodynamic Configuration; Vibration and Noise; Endurance; Gliding Flight; UAV
Stability; UAV Propulsion; Propeller Modelling; Motor Modelling.
UAV Controllability; Flight Control; Position Control: Euler Angles as Outputs, Rotation Matrix
as Outputs; Autonomous Control; Semi-Autonomous Control; UAS Safety; Failsafe.
In this course students will start with basic Multicopter design principles, components, and
assembly precautions. Then finally design and develop a fully functional Multicopter UAV/Drone
using off the shelf Flight Controllers.
Text Books:
1. Quan Quan, Introduction to Multicopter Design and Control (1st ed.), Springer, 2017. ISBN
9789811033810.
Reference Books:
1. Mohammad Sadraey, Unmanned Aircraft Design: A Review of Fundamentals (1st ed.), Morgan
& Claypool, 2017. ISBN 1681731681.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET221 Robotic Process Automation Essentials L T P C
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 2 1 1 1 1 2 2 1 1 2
CO2 2 2 3 1 2 1 3 2 1
CO3 2 2 2 1 1 2 3 1 1 2
Course Content:
Process Automation, Application and Evaluation of RPA, Flowchart, Sequence, State Machine,
Activities in RPA, Activities to print the log, How to get the input from user, How to send the data to
output device i.e. Monitor, Variables & Data type in RPA tool, Managing packages, Publishing of Bot,
If Statement, For loop, For each row, Switch, Parallel, Do-while, While, Conversion of Pseudocode in
RPA tool, Factorial, Fibonacci code in RPA tool, Selectors, UI Element.
Debugging, Use of Try-Catch for exception handling, .Net Framework editor, .Net Variable, Loops and
conditional statement, Extensible Markup Language, Tools for writing XML, Rules forwriting XML,
Elements attributes and values, Creating the root and child elements, Attended bot, Unattended bot,
Floating bot.
Orchestrator, Orchestrator Entities, Tenants, and folder, Robot Provisioning and License Distribution,
Expert Lecture from Industry, Unattended Automation with Folders, Orchestrator Resources, Libraries
and Templates in Orchestrator, Setting up an Orchestration Process Activities, Queues for Long-
running Activities, Tasks Long-running Activities, Jobs Long-runningActivities, Formation of RPA
Team, Process Design Document/Solution, Design Document. Storage Buckets, Queues, Intermission-
Transaction Processing Models, Robots Hosting, Processing Hosting, Triggers and SLAs, Monitoring
and Alerts, Advanced Topics in RPA, RPA Frameworks; Transaction, Queue, Machine, Variable
declaration.
Studio Work / Laboratory Experiments:
The studio work covers working with the RPA tool Community edition, developing the automation
applications as the projects with its detailed demonstration.
Text Books:
1. Murdoch, Richard. Robotic Process Automation: Guide to Building Software Robots, Automate
Repetitive Tasks & Become an RPA Consultant. Richard Murdoch & RPA Ultra, 2018. ISBN 978-
1983036835.
2. Taulli, Tom. "The robotic process automation handbook." The Robotic Process Automation
Handbook. https://doi. org/10.1007/978-1-4842-5729-6 (2020). ISBN 9781484257289.
Reference Books:
1. Mullakara, Nandan, and Arun Kumar Asokan. Robotic process automation projects: build real-
world RPA solutions using UiPath and automation anywhere. Packt Publishing Ltd, 2020. ISBN
9781839210958.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET222 Microcontrollers, Robotics & Embedded L T P C
Systems
Owning School/Department School of Computer Science Engineering and 2 0 4 4
Technology
Pre-requisites/Exposure -
CO1: To explain the micro-controllers, robotics, embedded system, and their applicability.
CO2: To build the various robots using Robot Operating System.
CO3: To implement the various Embedded system using microcontrollers and ROS.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 3 2 2 2 2 3 2 2 3
CO2 3 3 3 2 2 3 3 2 2 1 2
CO3 3 3 2 2 2 3 3 2 3
Course Content:
Fundamentals of Robotics, Robot Operating System (ROS), ROS Essentials: ROS Topics, ROS:
Services, Actions, Nodes, Build Robot Environment, Unified Robot Description Format (URDF), ROS
parameter server, ROS Services, and parameters, Recording and playing back, readingmessages
from a bag file, using rosed to edit files in ROS, ROS msg and srv.
Module IV 7 lecture hours
Simple Publisher and Subscriber, Examining the Simple Publisher and Subscribe, Simple Service and
Client, Examining the Simple Service and Client, Motion in ROS (ROS Noetic), Working with
Pluginlib, Nodelets, and Gazebo Plugins, Robot Navigation (moveit), Grasping, Grasping using
MoveIt, creating a pick and place task, Grasping in the Real Robot, ROS Controllers and Visualization
Plugins.
Fundamentals of Robotics, Robot Operating System (ROS), ROS Essentials: ROS Topics, ROS:
Services, Actions, Nodes, Build Robot Environment, Unified Robot Description Format (URDF), ROS
parameter server, ROS Services, and parameters, Recording and playing back, readingmessages
from a bag file, using rosed to edit files in ROS, ROS msg and srv.
Studio work focuses to develop different kind of robots starting from object detection robot, line
follower robot. It also consists of introduction to well exist robots such NAO, SOFIA, Pepper.
Text Books:
1. Newman, Wyatt. A systematic approach to learning robot programming with ROS. CRC Press,
2017. ISBN 9781498777827.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET223 Augmented RealityFoundations L T P C
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 3 2 3 3 2 2 3 2 2 3
CO2 3 3 2 2 3 3 2 3 2 2
CO3 3 3 2 2 2 3 3 2 3 3 2
Course Content:
Industrial applicability of AR, AR Systems Overview, Input and Output Devices for AR, Optical vs.
Video, See-Through AR, AR system architecture, Senses, Simple sensing/perception model, Human
visual system, 3D Vision, Tracking system, Tracking for Augmented Reality, Importance of Accurate
Head Tracking, Tracking Problem, Tracking Technologies.
Head motion prediction, Registration, Calibration – static and dynamic, Real Time Performance,
Characteristics – spatial, temporal, system robustness, Scheduling and Fusing Sensor Information,
mixed reality UI design, Design of immersive user experience, Alternative Interface Paradigms,
Usability guidelines, immersive environments, Space, Scale, Ergonomics.
Physical locomotion techniques, Target based techniques, Steering, Comfort and distress, Gaze
direction, comfort range test, Motion Sickness, Simulator Sickness, Cybersickness, AR Interface
Design, Properties of AR Environments, Collaborative AR Interfaces, Heterogeneous AR User
Interfaces, Tangible and Graspable Interaction.
Module IV 12 lecture hours
Tracking for Augmented Reality, Augmented Reality Interaction, Augmented Reality, Information
Browsers, AR Widgets, Graphical Interface Elements, Evaluating AR Interfaces, video mixing, optical
blending, projection devices, spatially augmented reality, Immersive virtual reality, Desktop metaphor,
mobile/wearable computing, Ubiquitous computing, Tangible user interfaces, Distributed graphics.
The laboratory of Augmented reality foundation is designed to provide a practical exposure to the
students about the concepts and topics taught in the classroom sessions. Case Studies: - Face-to- Face
Collaboration – Shared Space - Remote Collaboration – AR Conferencing, Wearable AR Conferencing
- Seamless Collaboration – The Magic Book.
Text Books:
1. Glover, Jesse, and Jonathan Linowes. Complete Virtual Reality and Augmented Reality
Development with Unity: Leverage the power of Unity and become a pro at creating mixed reality
applications. Packt Publishing Ltd, 2019. ISBN 9781838644865.
2. Bowman, Doug, Ernst Kruijff, Joseph J. LaViola Jr, and Ivan P. Poupyrev. 3D User interfaces:
theory and practice, CourseSmart eTextbook. Addison-Wesley, 2004. ISBN 978-0134034324.
Reference Books:
1. Pangilinan, Erin, Steve Lukas, and Vasanth Mohan. Creating augmented and virtual realities:
theory and practice for next-generation spatial computing. " O'Reilly Media, Inc.", 2019. ISBN
978- 1492044192.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET238 Product Design Principles and Practices L T P C
CO – PO /PSO Mapping:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 1 2 3 3
CO2 1 2 3 3
CO3 1 2 3 3
Course Contents:
Characteristics of Successful Product, Product Design and Development, Duration and Cost of Product
Development, Challenges of Product Development, Structured Methods, Industrial Examples,
Organizational Realities, Product Development Process and Organization, Product Development
Process, Concept Development: The Front-End Process, Adapting the Generic Product Development
Process, Technology-Push Products, Platform Products, Process-Intensive Products, Customized
Products, High-Risk Products, Quick-Build Products Digital Products, Product-Service Systems,
Complex Systems, Product Development Process Flows, Tyco Product Development Process.
Identifying Customer Needs, Importance of Latent Needs, Process of Identifying Customer Needs,
Gather Raw Data from Customers, Choosing Customers, The Art of Eliciting Customer Needs Data,
Documenting Interactions with Customers, Interpret Raw Data in Terms of Customer Needs, Organize
the Needs into a Hierarchy, Establish the Relative Importance of the Needs, Reflect on the Results and
the Process, Product Specifications, What Are Specifications? When Are Specifications Established?,
Establishing Target Specifications, Prepare the List of Metrics, Collect Competitive Benchmarking, Set
Ideal and Marginally Acceptable, Target Values, Reflect on the, Results and the Process, Setting the
Final Specifications, Developing Technical Models of the Product, Developing a Cost Model of the
Product, Refine the Specifications, Making Trade- Offs Where Necessary, Flow Down the
Specifications as Appropriate, Reflect on the Results and the Process, Target Costing, Concept
Generation, The Activity of Concept Generation, Structured Approaches Reduce the Likelihood of
Costly Problems.
In the studio, students will learn the application of structured methods to product development and get
a detailed insight into the study and improvement of the development process. The students will be
guided to create their development methods, uniquely suited to their personalities, talents, and company
environments.
Text Books:
1. Karl T. Ulrich, Steven D. Eppinger and Maria C. Yang., Product Design and Development (7th ed.),
McGraw Hill, 2020. ISBN 9390113237
Reference Books:
1. Ali Jamnia, Introduction to Product Design and Development for Engineers (1st ed.), Taylor and
Francis, 2018. ISBN 9781138554214
Name of Program Bachelor of Technology (Computer Science
Engineering)
CSET224 Cloud Computing L T P C
Owning School/Department School of Computer Science Engineering and 3 0 2 4
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 1 1 1 2 2 2 2 2 2 2 2 2 1
CO2 2 2 1 1 1 2 2 2 2 2 2 2 2 2 1
CO3 2 2 3 2 2 2 2 2 2 2 2 2 2 2 3
Course Contents:
Case Study: Cloud Market analysis, Security and Compliances, Shared security model in
IAAS/PAAS/SAAS, Shared technology issues, Data loss or leakage, Account or service hijacking,
Implementation of cloud security, Security Groups, Network Access Control Lists, Cloud databases,
Parallel Query Execution with NoSQL Database, Big Data, Handling Big Data on Cloud Platform,
Map- Reduce framework for large clusters using Hadoop, Design of data applications based on Map
Reduce in Apache Hadoop.
Comparative study/analysis of public clouds, Edge Computing, Fog Computing, Data Offloading,
Cloud-Based DevOps Tools, Task Partitioning, Data Partitioning, Data Synchronization, Distributed
File System, Data center, Ongoing Research Topics.
Text Books :
1. Wang L., Rajiv Ranjan, Jinjun Chen and Boualem Benatallah, Cloud Computing (1st ed.), CRC
Press, 2017. ISBN 978-1351833097.
2. Hurwitz J. S. and Daniel Kirsch, Cloud Computing For Dummies (2nd ed.), Hoboken: John Wiley
& Sons, 2020. ISBN 978-1119546658.
Reference Books :
1. Sharma Prerna, Moolchan Sharma and Mohamed Elhoseny, Applications of Cloud Computing (1st
ed.), CRC Press, 2020. ISBN 9780367904128.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET241 Fundamentals in Swift Programming L T P C
Course-Outcomes (COs)
On completion of this course, the students will be able to:
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 1 1 2
CO2 1 2 2 3 1 3 2 1
CO3 3 2 2 1 2 1 2 3
Course Contents:
Installation and Overview of Swift: Installation of Swift on macOS and Linux, REPL, Package
manager, creating a package, Building an Executable, Working with multiple Source File. Introduction
to Xcode and Swift Playgrounds: Installation of Xcode, Working with Xcode, create a simple program
and execute it using Xcode, working with swift playgrounds, create a simple program and execute it
using swift playgrounds.
Introduction of Swift, features of Swift, Data types, constant and variables, operators. Type
Annotations, Naming Constants and Variables, Printing Constants and Variables, Semicolons, Integers:
Integer Bounds, Int, Ulnt. Floating-Point Numbers: Double, Float. Type Safety and Type Inference.
Numeric Literals, Numeric Type Conversion, Integer Conversion, Integer and Floating-Point
Conversion, Boolean.
Strings and Characters: String Literals, Multiline String Literals, Special Characters in String Literals,
Initializing an Empty String, String Mutability, Working with Characters, Concatenating Strings and
Characters, String Interpolation, Counting Characters, Substrings, Comparing Strings, Prefix and Suffix
Equality.
Module IV 6 lecture hours
Control Flow: For-In Loops, While Loops: While, Repeat-While. Conditional Statements: If-else,
Switch, Control Transfer Statements: continue, break, fall through, return , throw statements. Functions:
Defining and Calling Functions, Function Parameters. Return Values: Functions Without Return
Values, Functions with Multiple Return Values, Optional Tuple Return Types Function Argument
Labels and Parameter Names: Specifying Argument Labels, Omitting Argument Labels, Default
Parameter Values, Variadic Parameters, Function Types, Function Types as Parameter Types.
Students will gain practical experience with the implementation of different swift concepts. The lab
work consists of swift programming using Playground and Xcode.
Text Books:
1. Swift Matthew Mathias, John Gallagher, Swift Programming: The Big Nerd Ranch 2nd edition,
2015.
2. Matt Neuberg, iOS 12 Programming Fundamentals with Swift, OReilly; 5th edition.
3. IBook Apple Introduction to Swift.
Reference Books:
1. Paris Buttfield-Addison, Jonathon Manning, Tim Nugent Learning Swift: Building App macOS,
iOS, and Beyond, O'Reilly Media, Inc., 3rd ed, 2018.
2. Jon Hoffman, Mastering Swift 4, Packt Publishing Limited, 4th edition, 2017.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET245 UX Design Foundations L T P C
Course-Outcomes (COs)
On completion of this course, the students will be able to:
CO1: To learn User Experience Design Methods: Conceptual Models, User Models.
CO2: To learn Systems Thinking and Innovation Frameworks.
CO3: To make use of Wireframing, Prototyping and Information Architecture
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1
CO2
CO3
Course Contents:
Module 1 (11 hours)
Gestalt's Principles of Design, User Interface Design & Design Systems, Branding through UI Design,
Design Mockups & Developer handoff, UI Design Workshop using Figma, Introduction to Figma,
Figma training - Color, typography, proximity, contrast issues, layout design, imagery and graphics in
UI.Case Studies.
Students will gain hands-on experience on Visual Prototyping and Wireframing, Adobe XD, Figma,
InVision, Google Slides, Building simple websites and stylesheets; interactive elements using
JavaScript . UX design process, prototyping basics, user flows. Wireframing and prototyping using
tools like Axure RP, Sketch, Marvel and Balsamiq. Designing visual elements using Photoshop and
Illustrator.
EXTBOOKS/LEARNING RESOURCES:
CO1: To articulate key features of various Machine learning and Deep Learning tools for Intelligent
Modelling.
CO2: To examine and implement intelligent applications using Machine Learning and Deep Learning
tools.
CO3: To implement Machine Learning and Deep Learning models for design thinking and evaluate
them using relevant metrics.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3 2 1 3 1 2 2 2 3
CO2 3 2 3 3 3 2 2 3
CO3 3 3 2 3 2 3 2 2 3 3 2
Course Contents:
Why Intelligent Model? Intelligent Citizens of the World, Thinking More Clearly, Empathize, Define,
Ideate, Prototype, Test, Using and Understanding Data, Using Models to Decide, Strategize, and
Design, Automation/Augmentation Opportunities, AI in Sensitive Applications, AI in Healthcare and
Security, Pervasive, AI Systems, AI in IOT Devices, Business Value of Data: Case Study on Data
Dependent Company, Data Valuation, Data Quality, Data Driven Marketing and Commerce, Biases in
AI Models, Handling Gender, Race, Religion, Cultural Biases, Unintended Biases.
User privacy, Data Privacy aware AI, Data Sharing Regulations, AI Model Security, Attacks on AI
models, Adversarial Attack, Relevance Feedback, Adaptive Learning, Online learning, Model fine-
tuning, Transfer Learning, Domain Adaption, Explainable AI, ML Accountability and Fairness, Model
Interpretation, Class imbalance in Modelling, Handling Data Drift, Human- Machine Co-learning.
Aligning Mental and Machine Learning Models, Coding Automation, Rapid Prototyping in AI, Market
Demand Analysis, Automated Requirement Analysis, Customer opinion analysis, Attribute based
opinion mining, Geospatial Analytics, Spatial analysis, Spatial-temporal analysis, Geo-clustering,
Market Segmentation, Demographic, Cultural, Behavioural and Psychographic Segmentation,
Dynamic Pricing, Price Optimization, Personalization, Recommender Systems, Feature Attribution,
SHAP (SHapley Additive exPlanations), Lime, Shapash, Dalex.
Students will gain practical experience with the implementation of different intelligent methods. The
lab work consists of exploratory data analysis using tools, libraries and python programming language
by using Machine Learning and Deep Learning models.
Text Books :
1. Aggarwal C. C., Neural Networks and Deep Learning on (1st ed.), Springer International, 2018.
ISBN 978-3030068561.
Reference Books :
1. Kasparov Garry, Mig Greengard, Deep Thinking: Where on Machine Intelligence Ends and Human
Creativity Begins (1st ed.), John Murray, 2018. ISBN 978-1473653511.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET226 Blockchain Engineering L T P C
Owning School/Department School of Computer Science Engineering and 3 0 2 4
Technology
Pre-requisites/Exposure -
CO1: To articulate blockchain concepts and software applications that are used to develop the
blockchain use cases.
CO2: To perform compilation, migrating, testing, and deploying the blockchain applications on the
decentralized network.
CO3: To make use of building distributed ledger technologies for Blockchain applications and able to
solve double spending problems in the digital payments using cryptocurrencies.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 2 3 2 1 2 2 2 2 2 2 2 2
CO2 2 2 2 3 2 2 2 2 2 2 2 2 2 2
CO3 2 2 3 2 2 2 1 2 2 2 2 2 2 2 3
Course Contents:
IPFS, Decentralized web, Privacy and encryption on IPFS, nodes, IPFS commands, IPFS vs HTTP,
Location-based addressing, Content-based addressing, Distributed Hash Table (DHT), Merkle DAGs,
IPNS, IPFS Gateway, IPFS Daemon, DNS Link, On-chin Transactions, Off-chain Transactions,
Forking, Hard forks, Softworks, Double spending issues, Improving throughputs, Algorand, DAG-
Chains, Hyper ledger Indy, Hyperledger Sawtooth.
Text Books :
1. Gaur, Nitin and et al, Hands-On Blockchain with Hyperledger: Building decentralized applications
with Hyperledger Fabric and Composer (1st ed.), Packt Publishing Ltd, 2018. ISBN
9781788994521.
2. Pathak, Nishith and Anurag Bhandari, IoT, AI, and Blockchain for. NET: Building a Next
Generation Application from the Ground Up (1st ed.), Apress, 2018. ISBN 9781484237083.
Reference Books :
1. Bashir and Imran, Mastering blockchain: “Distributed ledger technology, decentralization, and
smart contracts explained” (1st ed.), Packt Publishing Ltd, 2018. ISBN 9781787125445.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET227 System and Network Security L T P C
Owning School/Department School of Computer Science Engineering and 3 0 2 4
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 2 2 3 3 1 2 3 2
CO2 3 3 2 3 2 3 3 3 2 2
CO3 3 3 3 2 2 2 3 3
Course Contents:
The lab component is meant to analyse various network security-related concepts and deals with
launching different types of attacks and creating a network blueprint of an organization
Text Books :
1. R. Bragg et al, Network Security: The Complete Reference (1st ed.), TMH Publications, 2017.
ISBN 978- 0070586710.
2. W. Stallings, Network Security Essentials: Applications and Standards (3rd ed.), Pearson, 2018.
ISBN 978-0132380331.
Reference Books :
1. Joseph Migga Kizza, Guide to Computer Network Security, (5th ed.), Springer.
2020. ISBN 978303038140.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET228 Data Mining and Predictive Modelling L T P C
Owning School/Department School of Computer Science Engineering and 3 0 2 4
Technology
Pre-requisites/Exposure -
CO1: To articulate data preparation for data mining and analyzing based on pre-processing techniques.
CO2: To examine predictive analysis in various use cases.
CO3: To make use of exploratory data analysis to gain insights and prepare data for predictive
modelling.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 2 2 2 2 2 2 2 2 2 2 2
CO2 2 3 2 2 2 2 2 2 2 2 2 2 2
CO3 2 2 2 2 2
Course Contents:
Purpose of Data mining, Procedures of Data Mining, Functionality of Data Mining, Knowledge data
discovery process, Data and attribute type, Properties of data, Discrete and continuous attribute, Dataset
types, Data quality measurement, Noise Analysis and its importance, Techniques of Data pre-
processing, Aggregation, Sampling, Curse of dimensionality, Dimensionality reduction, Feature
selection and generation, Discretization and vectorization, Binarization, Attribute transformation
correlation, Association rule mining, Apriori algorithm, Rule generation, Pattern Mining in: Multilevel,
Multidimensional Space Pattern Mining .
Outlier analysis in classification and clustering, Probabilistic models for clustering, Clustering high
dimensional data: Subspace clustering, Projection Based clustering, Exploratory data analysis, Data
summarization and visualization, Dataset exploration, Data Exploration Tools, Interactive Data
Exploration, Predictive models, Design Principles, Parametric Models, Non-Parametric Models,
ANOVA, Regression Analysis, Frequent Pattern Mining, Mining Closed and Max Patterns.
Module IV: 14 lecture hours
Linear discriminant analysis, Fisher discriminant analysis, Time series Model: ARMA, ARIMA,
ARFIMA, Factor Analysis, Uncertainty quantification, Forward uncertainty propagation, Inverse
uncertainty quantification, Non-Negative Matrix Factorization, Sequential Matrix Factorization. Exact
Matrix Factorization, Expert Lecture from Industry, Recommendation System and Collaborative
Filtering, Multidimensional Scaling, Mining Textual Data, Temporal mining, Spatial mining, Visual
and audio data mining, Ubiquitous and invisible data mining- Privacy, Security, Social Impacts of data
mining.
Data pre-processing and vectorization. Quality analysis of data. Feature selection and Ranking.
Association rule mining and implementation of the Apriori algorithm. Data Similarity and set similarity.
Error analysis and model selection. Frequent pattern mining and regression. Discriminant Analysis.
Factor Analysis. Matrix Factorization. Recommendation System.
Text Books :
1. Bruce Ratner, Statistical and Machine-Learning Data Mining: Techniques for Better Predictive
Modeling and Analysis (3rd ed.), Chapman and Hall/CRC, 2017. ISBN 978-1498797603.
2. Dursun Delen, Predictive Analytics (1st ed.), Knime, 2020. ISBN 9780136738516 .
Reference Books :
1. Mohammed J. Zaki and Wagner Meira, Jr, Data Minimg and Machine Learning (1st ed.),
Cambridge University Press, 2020. ISBN 9781108473989 .
Name of Program Bachelor of Technology (Computer Science
Engineering)
CSET229 Game Engine and Architecture L T P C
Owning School/Department School of Computer Science Engineering and 3 0 2 4
Technology
Pre-requisites/Exposure -
CO1: To explain concepts of underlying game engines. Solve practical 3D game problems.
CO2: To Implement Game control systems for multiplayer games using Human Interface Devices and
analyse the basic features of Physics for Games; Illustrate the collision detection systems used in games.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 3 2 2 2 2 2 2 2 2 3 2 3
CO2 2 3 2 2 2 2 2 2 2 2 2 2 3 2
Course Contents:
Game Engine, Engine Differences Across Genres, Runtime engine architecture: Base layer, Memory,
layer, Utility, Module, Management, Gameplay, Build layers, Asset Pipeline, Pre-rendering pipeline,
Full 3D pipeline, Game profiler, Tools for optimization of games, Types of profilers, Version control
in game development, Best Practices in version control, Issues and solutions, Unity engine and features,
Unreal engine and features, Amazon Lumberyard and features, cryEngine for VR and features
Engine Levels, Game Engine VR Modes actors, Landscape, Water rendering, Lightening and
Environment, Capsule shadow, light mobility, and types of lights, Volumetric clouds, Fog effects, Level
streaming, Hierarchal level of details, Blueprints, Variables, functions, and flow control, Timelines and
blueprint classes, Render To Texture Blueprint Toolset, Occlusion Culling, Render targets, Real time
raytracing, Frame Rendering tool, Programming and scripting, Actor Communication, Blueprint visual
scripting, Gameplay Architecture, Gameplay classes and functions, Interfaces, Graphics Programming,
Shader development, Threaded rendering, Mesh drawing pipeline, Slate UI Framework.
Human Interface Devices, Types of HID for games, Interfacing with HID, Devices in practice, features
of popular devices, Gameplay Framework, Pawn, Controller, Camera, AI Entities in gaming, Behavior
trees, navigation system, Environment query system, Physics in gaming, UMG UI Designer,
Networking and multiplayer, Animation Characters and Objects, Animation rigging toolset, Skeletal
Mesh Animation System, Sound in gaming, Ambient Zones, Sound classes, Audio Engine and mixer,
Sound Attenuation, Sound cue.
The lab covers the practice of game engine software development methodologies for Iterative and agile
development of a vertical slice of a game from end-to-end e.g. SCRUM. XP, Kanban, TDD etc. and to
the design and implementation of subsystems for rendering, collision, physics animation.
Text Books :
1. Jason Gregory, Jeff Lander and Matt Whiting, Game Engine Architecture (3rd ed.), A K
Peters/CRC Press, 2018. ISBN 978-1138035454.
Reference Books :
1. Heather Maxwell Chandler, Game Production Handbook (3rd ed.), Jones & Bartlett, 2013. ISBN
978- 1449688097.
Name of Program Bachelor of Technology (Computer Science
Engineering)
CSET230 DevOps Practices and Principles L T P C
Owning School/Department School of Computer Science Engineering and 3 0 2 4
Technology
Pre-requisites/Exposure -
CO1: To articulate DevOps engineering and DevOps terminologies to meet the business requirements.
CO2: To construct different applications of DevOps that can be used on different platforms.
CO3: To design and execute projects using different tools, modules, and templates.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 2 2 2 2 2 2 2 2 2 3 2 2
CO2 2 2 2 2 3 2 2 2 2 2 2 2 2 2
CO3 2 3 2 3 2 2 2 3 2 3 3 2 2 3
Course Contents:
Why DevOps? , Terminologies, DevOps Stakeholders and roles, DevOps Perspective: People, Process
and Product, Building Teams, Boston Consultancy Group (BCG) Matrix, Three Horizons Model,
Autonomous Team and its Pros and Cons, Autonomy Criteria, Decoupling Point for Autonomous Team,
Case Study on Autonomous Team, DevOps and ISTM (IT Service and Management), Traditional Vs
Agile DevOps, DevOps Phases with diagram representation, Introduction of Source and Version
Control(SVC), Algorithms for SVC: Lock-Modify-Unlock and Copy-Modify -Merge, Continuous
Integration, and Deployment (CICD), Software Craftsmanship, Software Containerization, System
Provisioning, and Configuration Management, Testing and Test Automation.
Service-Oriented Architecture and Microservices, Build and Release Management, Virtual Systems,
Hypervisor Cloud Computing, Need of Cloud Computing with Application, Delivery Models of Cloud
Computing, Deployment Model of Cloud Computing, Git Desktop Usage, and Benefits, Connecting Git
Desktop and Git Online, Git Version Control, and Types, Distributed Version Control Systems with
Example, Centralized Version Control Systems with Example, Configuration Management, Chef
Configuration, Workstation Setup, Configuration of the knife, Test Connection between Knife and
Workstation, Organization Setup, Creation and Connection of Node to Organization, Operations on
Node, Object and Search, Creation of Environments and Connecting them with Servers.
DevOps Security, Issues in DevOps Security, DevOps Security Needs and Challenges, DevOps Risks
Management, Strategies, Policies, Practices for DevOps Security, DevOps Security Tools, DevOps
security over Clouds, Security Models, and their Use, Modules and Templates for DevOps, DevOps
Manifests, Class Templates Static and Dynamic Content, ERB Module, NTP Module, SSH Module,
Sudo Module, Install LAMP with pre-existing Modules.
The Studio work includes the practical understanding of multiple tools and languages that are used in
DevOps Industry. DevOps practices aims at merging development, quality assurance, and operations
(deployment and integration) into a single, continuous set of processes.
Text Books :
1. Reed Mark, DevOps: The Ultimate Beginners Guide to Learn DevOps Step-by-Step (1st ed.),
Publishing Factory, 2020. ISBN 978-1647710941.
2. Gene Kim, Kevin Behr, and George Spafford, The Phoenix Project (5th ed.), IT Revolution Press,
2019. ISBN 978- 1942788294.
Reference Books :
1. Gene Kim and John Willis, Beyond the Phoenix Project: The Origins and Evolution of DevOps (1st
ed.), IT Revolution Press, 2018. ISBN 978-1942788256.
Name of Program Bachelor of Technology (Computer Science
Engineering)
CSET231 Programming Methodologies for Backend L T P C
Development
Owning School/Department School of Computer Science Engineering and 2 0 4 4
Technology
Pre-requisites/Exposure -
CO1: To articulate the client-Server architecture and the basics of back-end technologies and
tools.
CO2: To examine server-side programming languages like PHP and Node.js.
CO3: To connect with database with the help of server-side scripting-PHP and MySQL, Node.js
and MongoDB.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 1 3
CO2 2 3 1 3
CO3 2 3 1 3
Course Contents:
Text Books :
1. Herron David, Node.js Web Development: Server-side web development made easy with Node using
practical examples (5th ed.), Packt Publishing Limited, 2020. ISBN 978-1838987572.
Reference Books :
1. Zammetti Frank, Modern Full-Stack Development: Using TypeScript, React, Node.js, Webpack,
and Docker (1st ed.), Apress, 2020. ISBN 978- 1484257371
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET232 Design of Cloud Architectural Solutions L T P C
Owning School/Department School of Computer Science Engineering and 3 0 2 4
Technology
Pre-requisites/Exposure -
CO1: To learn stack of cloud architecture and design guidelines of the final product.
CO2: To build the cloud architectural blueprint for deployment.
CO3: To deploy and implement cloud architectural designed solution.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 2 2 2 2 2 2 2 2 2 2 3 2 2
CO2 2 3 3 2 2 2 2 2 2 2 2 2 2 3 3
CO3 2 2 3 3 2 2 2 2 2 2 2 2 2 2 3
Course Contents:
Studio works include Hands-on experience on public industry cloud platform and will provide
the cloud-based solution for the business problems. The activities that are mandatory to be
completed includes troubleshooting the errors, accessing various AWS/Azure/GCP Support
Options, using compute, storage, database, and networking concepts to improve the
architecture’s performance, identify design principles that can help cloud user to achieve
performance efficiency, Evaluate the most important performance metrics for any applications.
Research Topics.
Text Books :
1. Goessling Scott and Kevin Jackson, Architecting Cloud Computing Solutions: Build cloud
strategies that align technology and economics while effectively managing risk (1st ed.), Packt
Publishing, 2018. ISBN 978-1788472425.
Reference Books :
1. Bahga Arshdeep and Vijay Madisetti, Cloud Computing Solutions Architect: A Hands-On
Approach (1st ed.), Vpt, 2019. ISBN 978194997801X .
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET233 Machine Learning withQuantum Computing L T P C
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 2 3 3 3
CO2 2 3 3 3
CO3 2 3 3 3
Course Contents:
Course structure/handout assessment mechanism, why quantum machine learning? Tensor and Tensor
Network, Hadamard Transformation, Quantum lambda calculus, Quantum Encode and Decode,
Arbitrary StateGenerator, Quantum Density Operator or Density Matrix, Quantum Probability Theory,
Quantum Stochastic Process, Quantum Mean, Variance and Envariance, Quantum Way of Linear
Regression, Quadratic Unconstrained Binary Optimization, Quantum Topological Data Analysis,
Quantum Bayesian Hypothesis, Haar Transform, Quantum Ridgelet Transform, Variational Quantum
Eigen-solver.
Quantum Perceptron’s, Quorn’s, Quantum Auto Encoder, Quantum kernel estimation, Quantum Feature
Map, Comparisons between QKE and classical kernels, Quantum Classifier, Variational Models,
Quantum Approximate Optimization Algorithm, Quadratic Unconstrained Binary Optimization
(QUBO), MaxCut problem.
Quantum Annealing, Photonic Implementation of Quantum Neural Network, Quantum Feed Forward
Neural Network, Quantum Boltzman Neural Network, Quantum Neural Net Weight Storage, Quantum
Upside Down Neural Net, Quantum Hamiltonian Neural Net, Quantum artificial neural network,
Quantum Perceptron Network,
Quantum approaches to CNNs, Quantum convolutional networks, Dissipative quantum neural
networks, Barren plateaus in QNNs, Barren plateaus in deep QNNs, Noise-induced Barren plateaus,
Superposition based Architectural Learning Algorithm, Quantum Hamiltonian Learning, Compressed
Quantum Hamiltonian Learning, Quantum Classification using Principle Component Analysis,
Quantum state classification with Bayesian methods, Quantum K-Nearest Neighbour, Quantum K-
Means, Quantum Fuzzy C-Means.
Quantum Support Vector Machine, Quantum Ant Colony Optimization, Quantum-behaved Particle
Swarm Optimization, Quantum Inspired Evolutionary Algorithm, Quantum Genetic Algorithm,
Quantum Hidden Markov Models, Quantum Annealing Expectation-Maximization, Quantum
Estimation Theory, Quantum Statistical Decision Theory, Quantum Hypothesis Testing, Quantum Chi-
squared and Goodness of Fit Testing.
In-studio work, students will work on various machine learning models and classical and Quantum
algorithms using quantum computers.
Text Books:
1. Siddhartha Bhattacharyya, Sourav De,Indrajit Pan, Ashish Mani, Elizabeth Behrman and Susanta
Chakraborti, Quantum Machine Learning (1st ed.), De Gruyter, 2020. ISBN 9783110670704.
2. Eric R. Johnston, Nic Harrigan and Mercedes Gimeno-Segovia, Programming Quantum Computers
(1st ed.), O′Reilly, 2019. ISBN 9781492039659 .
Reference Books:
1. Klaus-Robert Müller, Kristof T. Schütt, Stefan Chmiela, Alexandre Tkatchenko, Koji Tsuda
Learning Meets Quantum Physics (1st ed.), Springer, 2020. ISBN 9783030402452
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET234 Drone Remote Sensing L T P C
CO – PO /PSO Mapping:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 1 2 3 3
CO2 1 2 3 3
CO3 1 2 3 3
Course Contents:
Sensing and Control; Application Scenarios and Challenges; Radio Controlled Vehicles to UAVs;
Sensors: Sensor Types and Applications; Regulations and Guidelines; Attitude Estimation: Sensors,
Complimentary Filters, Kalman Filters; UAV Imagery: Accuracy Requirements, Operational
Restrictions.
Image Sensors; Image Sensor Selection; Computing Image; Imagery Collection; UAV Remote Sensing;
Coverage Control; Georeferencing; Feature-Based Stitching; Position and Attitude Based Stitching;
Consensus-Based Formation Control; Consensus Algorithms; Profile Measurement and Estimation;
Wind Profile Measurement.
Mission Planning: Surveyed Geography, Alien Terrain; GPS Data Collection; Measurement; Mapping;
UAV Path Planning; Path Refinement; Multi-UAV Path; Obstacle Avoidance; Focus ofExpansion; Time
to Collision; Semi-Autonomous Control; Radio Control; Automatic Control; Control Switching: Radio
and Automatic.
Module IV 6 lecture hours
Drone Sensing and Imagery: Riverine, Aquatic, Agriculture, Vegetation and Forest Ecosystem, Oiland
Gas, Surveillance, Search and Rescue; UAS Ground Control; Human Machine Interface; Computer
Telemetry; UAV Launch System; UAV Recovery System.
In this course, students will start with basic remote sensing deployments, develop an understanding of
various sensors and cameras, and understand the principles of data acquisition and aggregation.
components, and assembly precautions. Then finally design and develop a fully functional agricultural
precision remote sensing Multicopter UAV/Drone.
Text Books:
1. Serge A. Wich and Lian Pin Koh, Conservation Drones: Mappingand Monitoring Biodiversity (1st
ed.), OUP Oxford, 2018. ISBN 0198787618.
Reference Books:
1. Amy Frazier and Kunwar Singh, Fundamentals of Capturing and Processing Drone Imagery and
Data (1st ed.), CRC.
2. David R. Green, Billy J. Gregory and Alexander Karachok, Unmanned Aerial Remote Sensing (1st
ed.), CRC Press, 2020. ISBN 1482246074..
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET235 Digital Bots Development L T P C
CO – PO /PSO Mapping:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 3 1 2 3
CO2 3 1 2 3
CO3 3 1 2 3
Course Contents:
Course structure/handout Assessment mechanism, Automation 360, Using Discovery Bot for Process
Documentation, Creating Discovery Bot Users, Use Case: Discovering the Customer ID Validation,
Create Process, Record Process, Review Recordings and Create Opportunities, Convert Opportunity
to Bot Prototype, Resilient Bots, Run time challenges, HandlingUnpredictable Exceptions, Handling
Predictable Exceptions, Modularity and reusability are the key to scalability, Creating scalable Bots,
Universal recorder Excel automation.
Integration of Java Scripts with Automation Anywhere, Invoking of Java Script using automation 360,
Integration of VB Script in Automation Anywhere, Code execution of VB Script using Automation
Anywhere, Integration of Python script with Automation Anywhere, Running Python Script in
Automation Anywhere. Automation anywhere Robotic Interface with back office business process use
case, Creating form Creation of the Bots, Creation of Process, Automation anywhere Robotic Interface
with front office business process use case, Creating form, Creationof the Bots, Creation of Process,
Automation anywhere Robotic Interface process creation, Automation anywhere Robotic Interface task
creation.
AAE Client in RPA Development, Smart recorder, Screen recorder, Web recorder, Editing a recorded
Bot Workbench components, Leveraging workbench commands, Integrating RPA with Cognitive
Solutions Understanding IQ Bot as a Cognitive solution, Utilizing the IQ Bot Portal, Following the IQ
Bot Workflow Creating an Instance and Triggering Document analysis, Reading Instance Details,
Editing an Instance.
In this course, students will learn task organization for automation using RPA Tools.
Text Books:
1. Mullakara, Nandan, and Arun Kumar Asokan, Robotic process automation projects: Build real-
world RPA solutions using UiPath and AutomationAnywhere (1st ed.), Packt Publishing Ltd, 2020.
ISBN 9781839217357.
2. Husan Mahey, Robotic Process Automation with Automation Anywhere: Techniques to fuel business
productivity and intelligent automation using RPA (1st ed.), Packt Publishing Ltd, 2021. ISBN
missing.
Reference Books:
1. Husan Mahey, Robotic Process Automation with Automation Anywhere (1st ed.), Packt Publishing
Ltd, 2021. ISBN 9781839215650.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET236 IoT Networks andProtocols L T P C
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 L M H L H
CO2 L M H L H
CO3 L M H L H
Course Contents:
Internet of Things, Sensors, Hysteresis Error, Quantization error, aliasing error, Actuator, Actuations,
IoT Networking, Functional components of IoT, IoT dependencies, IoT service-oriented architecture,
IoT categories, IoT gateways, Associated technologies, technical derivation from the regular web, IoT
protocols, MQTT, SMQTT, CoAP, XMPP, IEEE802.15.4, AMQP.
6LoWPAN, LoRAWAN and Reference model, Integration of devices using LoRAWAN, Securityin
LoRAWAN, Zigbee, 3GPP, NB-IoT, Wireless HART, RFID, ISA100, Z-Wave, WSN, Cluster formation
of sensors in WSN, Routing algorithms in WSN, UAV Network, UAV Navigation, 5G based
communication among UAVs.
Machine to Machine communication, Architecture, and components for M2M, Standardization Effort
for M2M, Interoperability in IoT, IoT Architecture for Interoperability, Industry Standards, SDN
Origins and Evolution, Centralized and Distributed Control, Data Planes, Genesis of SDN, API in SDN,
Control mechanism, Switch Deployment, Controller configuration software, SDNfor WSNs, SDN-
WISE Sensor Nodes, SDN-WISE Protocol Structure, Topology in SDN-WISE.
Module IV 05 lecture hours
Studio works aim to provide hands-on experience of IoT devices to understand the communication
part between the devices. Here, we are sending the data using different communication devices such as
WiFi, Zigbee and Bluetooth. There are a set of experiments over web layer protocols such as MQTT,
HTTP and CoAP. This course is also having projects to solve a real-life problem by using IoT networks
and protocols.
Text Books:
1. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton and Jerome Henry, IoT
Fundamentals: Networking Technologies, Protocols,and Use Cases for the Internet of Things (1st
ed.), Cisco Press, 2017. ISBN 1587144565.
Reference Books:
1. S. Misra, A. Mukherjee and A. Roy, Introduction to IoT (1st ed.), Cambridge UniversityPress, 2021.
ISBN 1108959741.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET237 VR and 360 VideoProduction L T P C
CO – PO /PSO Mapping:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 2 3 1 3
CO2 2 3 1 3
CO3 2 3 1 3
Course Contents:
Intro to design: Understand basic VR design principles such as iteration, user testing, and
documentation, Design foundations, ergonomics: Create a VR User Persona, design an ergonomicVR
experience, VRText, VR Testing Scene.
Introduction to Immersive Media: principles of immersive 360 media such as spherical projection by
critically reviewing professional 360 content, workflow of creating 360 Video, Metadata to 360video
and publishing, Analyze a variety of existing 360 video content, Analyze footage for the various
techniques, tips, and tricks, Scripting and Planning: Create a script for 360 content, Plan a 360 shoot,
Edit scripts to match equipment and budget, 360 cameras: Exploration of existing 360 cameras,
Differentiate between monoscopic and stereoscopic capture, different equipment and techniques used
for audio capture, lighting techniques for 360 video.
Stitching: Stitch 360 video, Blend, weight, synchronize, and stabilize footage, Editing Basics: Edit
footage, Create transitions in 360 video, Advanced Editing: Color correct 360 footage, Add pointsof
interest, Advanced Stitching: edit and refine stitching using control points and masks, Blending.
Module IV 08 lecture hours
Spatial Audio: Cut spatialized audio, Place sound in 3D space, Interactivity with Gaming platform:
Create an interactive 360 experience using Gaming platform's video player, player controls and
branching storylines using a custom 360 video player.
The experiments to create 360 video with metadata, capture and use 3D audio to 360 videos. Adding
interaction control, adding transition in 360 videos, 360 video testing and performance Evaluation.
Text Books:
1. Jesse Glover and Jonathan Linowes, Complete Virtual Reality and Augmented Reality Development
with Unity (1st ed.), Packt Publishing Limited, 2019. ISBN 9781838644865
Reference Books:
1. Erin Pangilinan, Steve Lukas and Vasanth Mohan, Creating Augmented on and Virtual Realities
(1st ed.), O’Reilly Publishers, 2019. ISBN 978- 1492044192.
2. Dong Hwa Choi, Judi Estes and Amber Dailey-Hebert, Current and Prospective Applications of
Virtual Reality in Higher Education (1st ed.), IGI Global, 2020. ISBN 9781799849619
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET239 Product Design Architecture andDelivery L T P C
CO – PO /PSO Mapping:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 2 2 3 1 3
CO2 2 2 3 1 3
CO3 2 2 3 1 3
Course Contents:
What Is Product Architecture? Types of Modularity, Implications of the Architecture, Product Change,
Product Variety, Component Standardization, Product Performance, Manufacturability, Product
Development Management, Establishing the Architecture, Create a Schematic of the Product, Cluster
the Elements of the Schematic, Create a Rough Geometric Layout, Identify the Fundamental and
Incidental, Platform Planning, Differentiation Plan, Commonality Plan, Defining Secondary Systems,
Creating Detailed Interface Specifications, Industrial Design, Assessing the Need for Industrial Design
,Expenditures for Industrial Design, Industrial Design to a Product, User Experience Needs ,Aesthetic
Needs, The Impact of Industrial Design, Is Industrial Design Worth the Investment? How Does
Industrial Design Establish a Corporate Identity? The Industrial Design Process, Investigation of
Customer Needs, Conceptualization, Preliminary Refinement, Further Refinement and Final Concept
Selection, Control Drawings or Models,Coordination with Engineering, Manufacturing and External
Vendors, Management of the Industrial Design Process, Timing of Industrial Design Involvement,
Assessing the Quality of Industrial Design Usability, Emotional Appeal, Ability to Maintain and Repair
the Product, Appropriate Use of Resources, Product Differentiation.
Design for Environment, Environmental Impacts, Herman Miller’s Journey toward Design for
Environment, The Design for Environment Process, Design for Environment Guidelines, Design for
Manufacturing and Supply Chain, Requires a Cross-Functional, Overview of the DFM Method,
Strategic Sourcing Decisions, Estimate the Manufacturing Costs, Cost of Goods, Fixed Costs versus
Variable Costs, The Bill of Materials, Estimating the Costs of Standard Components,Estimating the
Costs of Custom Components, Estimating the Costs of Assembly, Estimating the Overhead Costs,
Reduce the Costs of Components, Understand the Process Constraints and Cost Drivers, Redesign
Components to Eliminate Processing Steps, Choose the Appropriate Economic Scale for the Part
Process, Standardize Components, Adhere to the “Black Box” Component, Procurement, Reduce the
Costs of Assembly and Integrate Parts, Maximize Ease of Assembly, Consider Customer Assembly,
Reduce the Costs of Supporting, Production, Minimize Systemic Complexity, Error Proofing, Reduce
the Costs of Logistics, guidelines for minimizing the volume, Materials Costs, Component
Manufacturing Costs, Assembly Costs, Cost Structures, Impact of DFM Decisions: The Impact of DFM
on Development Time, The Impact of DFM on Development Cost, The Impact of DFM on Product
Quality, The Impact of DFM on the Larger Enterprise.
Prototyping, Understanding Prototypes, Types of Prototypes, What Are Prototypes Used For? Principles
of Prototyping, Analytical Prototypes, Physical Prototypes, Prototyping Technologies, 3D Printing,
Planning for Prototypes, Define the Purpose of the Prototype, Establish the Level of, Approximation of
the Prototype, Outline an Experimental Plan, Create a Schedule for Procurement, Construction, and
Testing, Planning Milestone Prototypes, Robust Design, Design of Experiments , Robust Design
Process, Identify Control Factors, Noise Factors, and Performance Metrics, Formulate an Objective
Function, Develop the Experimental Plan, Experimental Designs, Testing Noise Factors, Run the
Experiment, Conduct the Analysis, Computing the Objective Function, Computing Factor Effects by
Analysis of Means, Select and Confirm Factor Setpoints, Reflect and Repeat Caveats, Patents and
Intellectual Property, What Is Intellectual Property? Overview of Patents, Utility Patents, Preparing a
Disclosure, formulate a Strategy and Plan, Timing of Patent Applications, Type of Application, Scope
of Application, Study Prior Inventions, Outline Claims, Write the Description of the Invention Figures,
Writing the Detailed Description, Defensive Disclosure, Refine Claims, Writing the Claims,
Guidelinesfor Crafting Claims, Pursue Application, Reflect on the Results and the Process, Advice to
Individual Inventors, Service Design Product-Service Systems, In What Ways Are Services and
Products Different? Service Design Process, The Service, Development at Zipcar, Service ProcessFlow
Diagram, Subsequent Refinement, Downstream Development Activities in Services, prototyping a
Service, Growing Services, Continuous Improvement.
In the studio work, students perform the architectural design of the product and deliver the
product design prototype.
Text Books:
1. Karl T. Ulrich, Steven D. Eppinger and Maria C. Yang, Product Design and Development (7th ed.),
McGraw Hill, 2020. ISBN 9390113237.
Reference Books:
1. Desai, Anoop, and Anil Mital, Sustainable Product Design and Development (1st ed.), CRCPress,
2020. ISBN 978-0367343217.
2. Ali Jamnia, Introduction to Product Design and Development for Engineers (1st ed.), Taylor and
Francis, 2018. ISBN 978-1138554214.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET242 Advance Swift Programming L T P C
Course-Outcomes (COs):
On completion of this course, the students will be able to:
Course Contents:
Closure Expressions, Inferring Type From Context, Implicit Returns from Single- Expression Closures,
Shorthand Argument Names, Operator Methods, Trailing Closures, Capturing Values, Escaping
Closures. Enumeration: Enumeration, Enumeration with Switch Statement, Iterating Enumeration
Cases, Associated Values, Raw Values, Recursive Enumerations.
Definition Syntax, Structure and Class Instances, Accessing Properties, Memberwise JInitializers for
Structure Types, Value types or Reference Types. Properties, Stored Properties, Lazy Stored Properties,
Computed Properties, Property Observers. Global and Local Variables, Type Properties, Type Property
Syntax, Querying and Setting Type Properties.
Methods, Instance Methods, self-Property, Mutating Method, Type Methods Inheritance: Base class,
types of Inheritance, Subclassing, Overriding: Accessing Superclass Methods, Properties, and
Subscripts, Overriding Methods, Overriding Properties, Overriding Property Getters and Setters,
Preventing Overrides.
Students will gain practical experience with the implementation of different swift concepts. The lab
work consists of swift programming using Playground and Xcode.
Text Books:
1. Matthew Mathias, John Gallagher, Swift Programming: The Big Nerd Ranch Guide edition, 2015.
2. Matt Neuberg, iOS 12 Programming Fundamentals with Swift, OReilly; 5th edition. App
Development with Swift (as available on iBookStore).
Reference Books:
1. Paris Buttfield-Addison, Jonathon Manning, Tim Nugent Learning Swift: Building App macOS,
iOS, and Beyond, O'Reilly Media, Inc., 3rd ed, 2018.
2. Yamacli, Beginner's Guide to iOS 11 App Development Using Swift 4: Xcode, Swift
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET246 UI/UX Design for Human Computer L T P C
Interface
Course-Outcomes (COs):
On completion of this course, the students will be able to:
Course Contents:
Application frameworks, Widgets, Applications, Mobile Design: Elements, Tools, Mobile design case
studies, Human interaction with computers, design rules, Universal Design Models and Theories,
Interface implementation & evaluation, Communication and collaboration models, Power of the
Crowd, crowd sourcing, Internet of things in HCI, Experimental Design.
Experiments designing concepts, Exploring design for HCI, GOMS for HCI, Identify Color
Guidelines, Stages of action in interaction, Menu types and design, Construction of Prototype, Design
Principles for HCI.
HCI for navigation design, Forms and behavior, Design and data for HCI, One factor test with human
subjects, Ubiquitous computing with design analysis, Interface implementation, A/B testing, T-tests,
Data assumptions and distributions, Interpretation of non-numeric response, Generalized linear models
Case studies.
Concept to production and publishing of a working game. Preparation for the industry-recognized
Unity Certification, Core concepts and techniques of augmented reality (AR) and virtual reality (VR),
voice and gesture-based interaction, mobile, animations, haptic, and wearables, as well as voice, and
kiosk executions.
STUDIO WORK / LABORATORY EXPERIMENTS:
Students will learn to understand the trouble of interacting with machines and design a system based
on user-centered approach. A range of VR/AR/MR experience development tools and skills. Story
development, user experience, interface design and implementation are introduced within the
context of creating immersive experiences.
TEXTBOOKS/LEARNING RESOURCES:
1. Helen Sharp, Jennifer Preece, Yvonne Rogers, Interaction Design Beyond Human-Computer
Interaction, (1 ed.), Wiley, 2021. ISBN 9781119547358
2. "The Elements of User Experience" by Jesse James Garrett
Elective-I, III,
V
Specialization
Electives-
Artificial
Intelligence
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET340 Advanced Computer Vision and Video L T P C
Analytics
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To articulate the key features of Computer Vision to analyze and interpret the visible world
around us.
CO2: To build the applications of Deep Learning in Computer vision and video processing.
CO3: Implement the state-of-the-art computer vision and video analytics concepts to different
applications.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 2 2 2 2 2 2 2 2 2 3 3 2
CO2 3 3 2 2 3 2 2 2 2 2 2 3 3 2
CO3 3 2 3 3 3 2 2 2 2 2 2 3 2 3
Course Contents:
In the lab work, the students will Implement the state-of-the-art computer vision and video analytics
concepts to different applications.
Text Books :
1. Rajalingappaa Shanmugamani, Deep Learning for Computer Vision (1st ed.), Packt Publishing,
2018. ISBN 9781788295628 .
2. Nedumaan J., Prof Thomas Binford, J. Lepika, J. Tisa, J. Ruby and P. S. Jagadeesh Kumar, Modern
Deep Learning and advanced Computer Vision (1st ed.), Intel, 2019. ISBN 9781708798641 .
Reference Books :
1. Kar Krishnendu, Mastering Computer Vision with Tensor Flow (1st ed.), Packt, 2020. ISBN
9781838826939.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET341 Cognitive Modelling L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 2 2 3
CO2 3 3 2 2 3 3 2 2 2 2 3
CO3 3 2 3 3 3 2 2 2 2 3 3
Course Contents:
Implement Long Term Memory encoding approach. Implement Models of semantic memory.
Implement Brain Signals and Feature extraction. Implement Neuroscientific Model. Psychological
Model. Implement Representational Model. Multiple realizable Model. Implement Isomorphic Model.
Multiple Draft Model. Implement Decision Making models. Implement Machine Learning algorithms
for cognitive computing. Implement Data Mining algorithms for cognitive computing. Implement
Neural Networks algorithms for cognitive computing.
Text Books :
1. Bermúdez José Luis, Cognitive Science: An Introduction to the Science of the Mind (3 ed.),
Cambridge University Press, 2020. ISBN 978-1108440349.
Reference Books :
1. High Rob and Tanmay Bakshi, Cognitive Computing with IBM Watson: Build Smart Applications
Using Artificial Intelligence as a Service (1 ed.), Packt Publishing, 2019. ISBN 1788478290.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET342 Probability and Random Processes L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 2 2
CO2 2 2 2 2 2 2 2
CO3 2 2 2 3 2 2 3 3
Course Contents:
Events, sample spaces, and probability, Limitation of classical and relative-frequency-based definitions,
Independent events, Conditional probability, Sets and fields, Sample space and events, Axiomatic
definition of probability, Joint probability, Conditional probability, Independence probability, Total
probability, Stationarity: strict-sense stationary (SSS), wide-sense stationary (WSS) processes,
Ergodicity and its importance, Bayes theorem, Combinatorics: Probability on finite sample spaces.
Students will learn a practical exposure to implement different probability concepts. The students will
design and develop applications of probability for insurance, stock market prediction, gambling etc.
During the lab works, students will be able to utilize programming and scientific tools for relevant
probabilistic app design.
Text Books :
1. Peebles. P. Z, Probability, Random Variables and Random Signal Principles (4 ed.), Tata Mc Graw
Hill, 2017. ISBN 978-0070474284.
Reference Books :
1. Peebles. P. Z, Probability, Random Variables and Random Signal Principles (4 ed.), Tata Mc Graw
Hill, 2017. ISBN 978-0070474284.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET343 AI in Healthcare L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To articulate the factors involved in decision support that can improve business performance
across the provider/payer ecosystem.
CO2: To build methods and techniques in order to appropriately apply to pain points using case studies.
CO3: To build methods and techniques in order to appropriately apply to pain points using case studies.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 2 2 2
CO2 3 3 3 3 3 2 2 2 2 3
CO3 3 3 3 3 3 2 2 2 2 3 3
Course Contents:
Implementation of program to read tabular, textual, image, signal medical data in different formats.
Implement sugar level and blood pressure prediction using regression modelling. Implement an early
diabetic prediction system using classification modelling. Implement a insurance risk prediction
Implementation of program to read tabular, textual, image, signal medical data in different formats.
Implement sugar level and blood pressure prediction using regression modelling. Implement an early
diabetic prediction system using classification modelling. Implement a insurance risk prediction.
Text Books :
1. Bohr A. and Kaveh Memarzadeh, Artificial Intelligence in Healthcare (1 ed.), Elsevier Science,
2020. ISBN 978-0128184387.
Reference Books :
1. Bohr A. and Kaveh Memarzadeh, Artificial Intelligence in Healthcare (1 ed.), Elsevier Science,
2020. ISBN 978-0128184387.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET344 Image and Video Processing L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To explain and Analyse images using Histograms and spatial filters. Apply Hough transforms
and be familiar with image representation using textures.
CO2: To compute motion using optical flow and understand methods for image description and
morphological operations.
CO3: To implement different low-level and high-level image and video processing techniques to wide
variety of applications.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3 3
CO2 3 3 2 3 2 2 3
CO3 3 3 3 3 3 2 2 2 2 3 3
Course Contents:
The lab work will be based on image enhancement, image zooming, image cropping, image restoration,
image compression and image segmentation etc. The Lab will use MATLAB and Open CV with python.
Text Books :
1. Szeliski Richard, Computer Vision: Algorithms and Applications (2 ed.), Springer, 2022. ISBN
978-3030343712.
2. Jain K., Fundamentals of Digital Image Processing (1st ed.), Pearson Education India, 2015.
ISBN 978-9332551916.
Reference Books :
1. Bovik, A. C., Handbook of image and video processing (1 ed.), Academic press, 2010. ISBN
9780121197902.
2. Kim, B. G., Digital Signal, Image and Video Processing for Emerging Multimedia Technology.
Electronics (1 ed.), Mdpi AG, 2021. ISBN 978-3039438570.
3. Vyas, A., Yu, S. and Paik, J., Fundamentals of digital image processing. In Multiscale Transforms
with Application to Image Processing (1 ed.), Springer, 2018. ISBN 978-9811356131.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET345 Information Retrieval and Search Engine L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To explain the comprehend types of text analysis, Information retrieval, IR system architecture,
query processing models and probabilistic models.
CO2: To build information retrieval systems by performing indexing, compression, information
categorization sentiment analysis, network management, search engine optimization, records
compliance and risk management.
CO3: Implement different information retrieval approaches for applications in text domain.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 2 2 3
CO2 3 3 3 3 3 1 2 2 2 2 3
CO3 2 3 3 3 2 2 1 3 3
Course Contents:
In this lab work, the students will implement problems based on search engines and common
opensource software to perform common methods of exploratory and predictive analysis. The students
also build application of text analysis techniques for data analysis.
Text Books :
1. Christopher D. Manning, Prabhakar Raghavan and Hinrich Schütze, Introduction to Information
Retrieval (1 ed.), Cambridge University Press, 2019. ISBN 9781107666392.
2. Mitra Bhaskar and Nick Craswell, An Introduction to Neural Information Retrieval (1 ed.), Boston
— Delft, 2019. ISBN 9781680835327.
Reference Books :
1. Sarfraz Muhammad, Critical Approaches to Information Retrieval Research (1ed.), IGI Global,
2019. ISBN 9781799810232.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET346 Natural Language Processing L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 2 2 2 2 3
CO2 3 3 3 2 2 2 3
CO3 3 3 3 3 3 3 2 2 2 3 3 3
Course Contents:
natural Language Processing: Need, applications, industry demand, Challenges in NLP: Ambiguity in
language, Contextual words and phrases and homonyms, Coreference, Domain-specific language,
Low-resource languages, Segmentation, Stemming, Lemmatization, Spelling correction, Synsets,
Hypernyms, Tokenization, N-grams, Stops Words, WordNet, WordNet Similarity, Language Corpus,
N-gram Language Models, Hidden Markov Models.
Implementation of text document reading, parsing and applying text pre-processing approaches.
Implement wordnet based document representation and word searching. Implement word level and
sentence level text representation for searching. Implement one hot vector of the given dataset
(Indian language). Design first neural network for text processing.. Implement topic modelling
using clustering and LSA. Implement text classification model for sentiment analysis. Implement
Part of Speech (POS) tagging and Named Entity Recognition (NER). Implement Machine
Translation model. Implement chatbot using sequence to sequence modelling. Implement Text
Generation models for social media, news context.
Text Books :
1. Rao Delip and Brian McMahan, natural Language Processing with PyTorch: Build Intelligent
Language Applications Using Deep Learning (1 ed.), O’Reilly Media, 2019. ISBN
9781491978238.
Reference Books :
1. Eisenstein Jacob, Introduction to natural Language Processing (1 ed.), The MIT Press; Illustrated
edition, 2019. ISBN 9780262042843.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET347 Social Network Analysis L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 1 3 1 2 1 2 2 2 1
CO2 3 2 3 1 3 3 2 2 1 2 3
CO3 3 2 3 2 3 3 2 2 2 2 3 3
Course Contents:
Implementing Random graph Models, finding cliques and Motifs, Exploring and analysing various
tools like Tweet Reach, How Sociable, and Addic-to-matic to understand the latest concepts and
advancements in social media analysis.
Text Books :
1. Blokdyk Gerardus, Social Network Analysis A Complete Guide (3 ed.), 5starcooks, 2020. ISBN
978-1867330097.
2. Beineke L.W., Martin Charles Golumbic and Robin J. Wilson, Topics in Algorithmic Graph Theory
(1 ed.), Cambridge University Press, 2021. ISBN 9781108492607
Reference Books :
1. Dey Nilanjan, Social Network Analytics: Computational Research Methods and Techniques (1 ed.),
Academic Press, 2018. ISBN 978-0128154588.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET348 Reinforcement Learning L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 1 1 2 3 1 3 3
CO2 2 3 3 1 3 3 3 3 3
CO3 2 2 3 3 3 3 3 3 3
Course Contents:
Implement a RL simulator environment in Python to familiarize with basics. Implement Markov Chain
model with random state, action, rewards and perform inference with random input sequence.
Implement a simple 2D Atari game playing using CNN based Q learning model. Implement self-driving
car system using DQN with input from simulators. Implement a news recommendation system using
reinforcement learning techniques. Implement dynamic programming based RL system for board
games. Implement a stock prediction and trading system using RL concepts. Implement a multi-
document text summarization using Monte Carlo RL. Implement RL based Chatbot for improved
customer engagement. Implement a multi-agent RL system for drone navigation using simulator
libraries.
Text Books :
1. Sutton R.S. and Andrew G. Barto, Reinforcement Learning: An Introduction (2 ed.), MIT Press,
2017. ISBN 978-0262039246..
2. Murphy K.P., Machine Learning: A Probabilistic Perspective (1 ed.), MIT Press, 2012. ISBN 978-
0262018029.
Reference Books :
1. Bertsikas Dimitri and John G. Tsitsiklis, Neuro Dynamic Programming, Athena Scientific (1 ed.),
Athena Scientific, 1996. ISBN 978-1886529106. .
2. Sewak Mohit, Deep Reinforcement learning: Frontiers of Artificial Intelligence (1 ed.), Springer,
2019. ISBN 978-9811382840..
3. Masashi Sugiyama, Statistical reinforcement learning: modern machine learning approaches (1
ed.), Chapman and Hall/CRC, 2015. ISBN 978-1439856895.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET349 Special Topics in Artificial Intelligence L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies or algorithms in Artificial Intelligence.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 2 2 3
CO2 3 3 2 3 3 2 3 3
Course Contents:
This course covers the cutting-edge topics in Artificial Intelligence, and these modules will be chosen
by the instructor based on the requirements and relevance at that point of time. These modules need to
be relevant to the industry and start-ups will also include related case studies, use cases and
implementations scenarios. Students will be working on lab work and projects to get real hands-on
experience of these topics and modules.
Students will gain practical experience by using tools and technologies related to Artificial Intelligence.
Specialization
Electives:
Blockchain
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET350 Blockchain Technologies: Platforms & L T P C
Applications
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To articulate blockchain platforms that show promise in solving complex business problems.
CO2: To examine the life cycle of a chain code and its components.
CO3: To make use of various blockchain-based enterprise applications.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 3 2 2 3 2
CO2 3 3 2 2 3
CO3 3 3 2 2 2 3 2 2 2 2 3 3
Course Contents:
This laboratory course enables students to get practical knowledge on Blockchain platforms like
Ethereum, Hyperledger, IBM Blockchain, Multichain, Hydrachain, Ripple, R3 Corda, BigChainDB,
Open-chain and IOTA. Further, Students will use these Blockchain platforms to solve real-world
problems in various sectors like Financial, Digital identity, Education sector, Logistics, Health sector,
Insurance, Retail, Agriculture, and Land registrations.
Text Books :
1. Serres Tom, Bill Wagner and Bettina Warburg, Basics of Blockchain (1 ed.), Animal Ventures LLC,
2019. ISBN 9781089919441.
2. DiMatteo Larry A., Michel Cannarsa and Cristina Poncib, The Cambridge Handbook of Smart
Contracts, Blockchain Technology and Digital Platforms (1 ed.), Cambridge University Press,
2019. ISBN 978-1108492560.
Reference Books :
1. Gaur and Nitin, Hands-On Blockchain with Hyperledger: Building decentralized applications with
Hyperledger Fabric an (1 ed.), Packt Publishing Ltd, 2018. ISBN 978-1788994521.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET351 Smart Contracts and Solidity Programming L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 1 1 3 2 2
CO2 3 2 3 3 2 2 2 2 2 3
CO3 3 2 3 2 3 3 2 2 2 2 3 2
Course Contents:
This lab enables students to get recognize the architecture and components of Ethereum, Decentralized
Applications (DApps). Further, students will learn syntaxes for doing Solidity programming to create
and deploy DApps using Ethereum. This laboratory includes tools like Remix, Ganache, MetaMask,
Node JS to build and deploy the smart contracts on Blockchain network. Besides, students will get
practical knowledge on Web3.js or Ethereum JS API works, Truffle.JS framework to compile Smart
Contracts, automate contract testing and Blockchain based web development.
Text Books :
1. Reed and Jeff, Smart contracts: The essential guide to using blockchain smart contracts for
cryptocurrency exchange (1 ed.), CreateSpace Independent Publishing Platform, 2016. ISBN 978-
1539457442
Reference Books :
1. Antonopoulos Andreas M., Gavin Wood Ph.D, Mastering Ethereum (1 ed.), O′Reilly, 2018. ISBN
9781491971916 .
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET352 Digital Currencies and Blockchain L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To articulate blockchain-based digital currencies and data structure of the bitcoin digital currency.
CO2: To examine different approaches of digital currencies.
CO3: To implement the different digital currency wallet types and transactions using different types of
wallets.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 2 3 3 2
CO2 2 3 3 3 3
CO3 2 2 2 2 3 2 2 3
Course Contents:
Digital currency, cryptocurrency vs fiat currency, web 3.0, transactions in digital currencies, bitcoin
model, Bitcoin Structure, Bitcoin implementation, public and private addresses, alternative
cryptocurrencies-ETH, Ripple, Litecoin, Matic, Bitcoin network architecture, Data structure of the
bitcoin blockchain, Stack for bitcoin blockchain, Linked list representation of bitcoin blockchain,
Operations on the bitcoin blockchain, special variables in Bitcoin.
This laboratory course enables students to get practical knowledge on cryptocurrencies and associated
wallet creation to transfer of crypto currencies like Bitcoin, Ethers etc. In this course students will learn
to use cryptocurrencies to purchase various goods and services using Decentralized Blockchain
network. Further, the goal of this laboratory is implementation of “payment,” the initiating process of
funds transfer using blockchain technology. The funds transfer will be realized with participation of
sending and receiving banks’ in blockchain environment and by their exchange of transfer messages
through the environment. Though “clearing” and “settlement” operations follow payment in actual
operations.
Text Books :
1. Lewis Antony, The Basics of Bitcoins and Blockchains: An Introduction to Cryptocurrencies and
the Technology that Powers Them (Cryptography, Crypto Trading, Digital Assets, NFT) (1 ed.),
Mango media, 2018. ISBN 978-1633538009.
Reference Books :
1. Tapscott Don and Alex Tapscott, Blockchain Revolution (1 ed.), Portfolio, 2018. ISBN 978-
1101980149.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET354 Cyber Security with Blockchain L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 3 3
CO2 3 2 3 2 3 2 2 2 2 2 3 3
CO3 3 3 3 2 3 3 3 3 3 3 3
Course Contents:
Cyber-Security with Blockchain is to make companies, products, systems, and services as resilient as
possible to cyber-attacks, by looking at security from the outset and throughout their entire life cycle.
This lab enables students to get practical knowledge on cryptographic primitives, design, and analysis
of authentication protocols. Further, this lab mainly focusses on Transaction and communication
security, preventing DDOS attacks, preventing data manipulation, and protection from compromised
nodes.
Text Books :
1. Gupta R., Hands-on cybersecurity with blockchain (1 ed.), Packt Publishing, 2018. ISBN 978-
788990189.
Reference Books :
1. Yuan Michael Juntao, Building Blockchain Apps (1 ed.), Pearson Education, 2020. ISBN 978-
9390168385.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET355 Web Development for Blockchain Applications L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To explain planning strategy for developing websites to produce functional, flexible, &
versatile websites.
CO2: To examine critically assess current & emerging technologies for developing websites.
CO3: To implement the front-end for decentralized applications.
CO-PO/PSO Mapping
PO PO2 PO3 P3O PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 34 6 7 8 9 0 1 2 1
CO1 3 3 3 3
CO2 3 3 3 3 3 3 3
CO3 3 3 3 3
Course Contents:
This studio work enables students to get practical knowledge on core technical components of
blockchains and their overlap with the Web, such as: Blockchain APIs, such as JavaScript,
Web3, React or REST APIs, Blockchain primitives such as transaction initiation, key signing,
and wallet management. In addition, which focus on creating user-friendly decentralized
applications. This can be done with the help of truffle IDE which provides means to compile
and unit test smart contracts locally. It also facilitates users to deploy smart contracts over
Blockchain network which has several accounts to interact with the smart contract.
Text Books :
1. Eric Traub, earn Blockchain Programming with JavaScript: Build your very own Blockchain and
decentralized netwo (1 ed.), Packt Publishing Ltd, 2018. ISBN 978-1789618822.
Reference Books :
1. Gabarró Steven A, Web Application Design and Implementation: Apache 2, PHP5, MySQL,
JavaScript, and Linux/UNIX (1 ed.), Wiley-IEEE Computer Society, 2006. ISBN 978-0471773917.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET356 Security and Privacy for Big Data Analytics L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 2 2 2 3 2 2 2
CO2 2 3 3 2 2 2 2 2 2
CO3 2 2 3 2 3 2 2 3 3
Course Contents:
Introduction and Basic Concepts, privacy by design, security roadmap, Map Reduce Architecture,
Detailed Design of Architecture, Hadoop, Spark, Hive etc. Generic Data Security, Data Theft, Data
Manipulations, Privilege Escalations, Big Data Storage based Security Issues, Hardware Failure
Impacts, Known Trivial Countermeasures, Failure of Trivial Methods on Big Data.
Case Study of Stolen Data in Big Data Environment, Types of Threats, Distinguished Security Goals
for Big Data, Implementing Security on Big Data: Methods and Aim of each Method, Administrative
Measures of Big Data, Preventive Measures of Big Data Security using Encryption, Preventive
Measures of Big Data Security using Access Control, Detective Measures of Security in Big Data,
Auditing, Log Analysis, Data and Network Monitoring Methods and Tools, Best Practice for Securing
Big Data, Security Cost of Big Data, Data Anonymization, Data Pseudo Anonymization.
Differential Privacy in Big Data, Methods for Differential Privacy and Impact of each Method,
Homomorphic Encryption, Heteromorphic Encryption, Complexity Analysis of Encryption
Techniques, Complexity Analysis of Privacy-based Methods. Malware and their Impact on Big Data,
Secure Multiparty Communication in Distributed Environment, Data Protection Laws for Big Data,
General Data Protection Regulation, Important changes resulting from the GDPR, Personal Data,
Personal data and Big Data applications.
Text Books :
1. Joshi R., Security, Privacy, and Forensics Issues in Big Data Network Security Essentials (1st ed.),
IGI Global, 2019. ISBN 978-1522597421.
Reference Books :
1. Gupta Brij B. and Ramesh C. Joshi, Security, Privacy and Forensics Issues in Big Data (1st ed.),
GI Global, 2019. ISBN 9781522597441.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET357 Modern Cryptography L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To comprehend and implement various cryptographic algorithms to protect confidential data.
CO2: To identify network vulnerabilities and apply various security mechanisms to protect networks
from security attacks.
CO3: To make use of security tools to locate and fix security leaks in a computer network/software.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 2 3 2
CO2 3 3 3 2 3
CO3 2 3 3 3 2
Course Contents:
Insert malicious shell code into a program file and check its malicious or benign status, create
Client Server program to send data across systems as two variants clear text data and encrypted
data with different set of encryption algorithms, demonstrate Buffer Overflow and showcase
EIP and other register status, perform ARP poisoning, SQL Injection and demonstrate its
countermeasure methods, implement stateful firewall using IP Tables, showcase different set
of security protocol implementation of Wireless LAN.
Text Books :
1. Stallings William, Network Security Essentials (4th ed.), Prentice Hall, 2018. ISBN 978-
9352866601
Reference Books :
1. Stallings W., Cryptography and Network Security (7th ed.), Prentice Hall, 2017. ISBN 978-
9332585225
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET358 Cloud Infrastructure and Services L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To explain where the wireless technologies can be applicable and evolving wireless technologies
and standards.
CO2: To articulate the architecture of various wireless technologies.
CO3: To experiment with various wireless technologies through hands-on projects.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 2 1 2 2 1 3 3 1 2 1 1 1
CO2 2 2 2 1 1 2 1 3 1 3 1 2 1 2 1
CO3 2 1 2 1 3 1 1 2 1 1 2 2 3
Course Contents:
Text Books :
1. C Beard and Stallings W., Wireless Communication Networks and Systems (1 ed.), Pearson, 2015.
ISBN 978-1292108728.
2. Colbach Gordon, Wireless Networking: Introduction to Bluetooth and WiFi (1 ed.), Independently
Published, 2017. ISBN 978-1973252115.
Reference Books :
1. Velrajan Saro, An Introduction to 5G Wireless Networks (1 ed.), Amazon Digital Services LLC -
KDP Print US, 2020. ISBN 979-8643303107.
2. Vannithamby R. and S. Talwar, Towards 5G: Applications, Requirements and Candidate
Technologies (1 ed.), John Willey & Sons, 2017. ISBN 978-1118979839.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET359 Special Topics in Blockchain L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies or algorithms in Blockchain.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 2 2 2 3 3 3 3
CO2 2 2 2 2 3 2 2 2 3
Course Contents:
Students will gain practical experience by using tools and technologies related to Blockchain.
Specialization
Electives:
Cyber
Security
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET360 Malware Analysis for Mobile Devices L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To possess the skills to carry out independent analysis of modern malware samples.
CO2: To understand and analyse the Mobile application threat landscape.
CO3: To Apply techniques to unpack, extract, decrypt, or bypass in future malware samples.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 2 2 2 3 3 3 2
CO2 2 3 2 2 2 3 2 2 2
CO3 2 2 3 2 3 3 2 2 3
Course Contents:
In-studio works, the student will be able to practically understand how all the security attacks does have
happened on mobile devices, as well as learn to recognize and remove common coding errors that lead
to vulnerabilities. This lab also gives an outline of the techniques for developing a secure application
code by analyzing malware for mobile devices. Setup your kali lab, Install Android Emulator, ADB
and Database Isolation, Build your own malware app and steal other app files, Recovering protected
secrets and Application patching, Acquire malicious apps, Perform static malware analysis, Perform
malware injection, Invoking Internal Activities Using Malicious Intents and – attacking broadcast
receivers, Parameter Manipulation Using a Proxy, Bypassing SSL Pinning, Memory dumps and objects
analysis, Bypass Application Restrictions without Modifying Any Code, Identifying code level
vulnerabilities: security code review.
Text Books :
1. Sikorski M. and A. Honig, Practical Malware Analysis (1st ed.), Practical Malware Analysis, 2017.
ISBN 978-1593272901 .
2. Mohanta Bhijit an Anoop Saldanha, Malware Analysis and Detection Engineering a
Comprehensive Approach to Detect and Analyze Modern Malware (1st ed.), Packt Publishing, 2022.
ISBN 9781484261927.
Reference Books :
1. Kleymenov Alexey, and Amr Thabet, Mastering Malware Analysis (1st ed.), Packt Publishing,
2019. ISBN 9781789614872.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET361 Device Level IoT Security L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 2 2 2 3 3 3 2
CO2 2 3 2 2 2 3 2 2 2
CO3 2 2 3 2 3 3 2 3 3
Course Contents:
Text Books :
1. Saravanan Vijayalakshmi, Securing IoT and Big Data: Next Generation Intelligence (Internet of
Everything (IoE) (1st ed.), CRC Press, 2020. ISBN 0367432889.
Reference Books :
1. Bhattacharjee S., Practical Industrial Internet of Things Security (1st ed.), Packt Publications, 2018.
ISBN 978-17888 2687.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET362 Vulnerability Analysis in Network Protocols L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 2 2 2 2 3 2 2
CO2 2 3 2 2 2 2 2 3 2
CO3 2 2 2 2 3 2 2 3 3
Course Contents:
In-studio works, the student will be able to practically understand Signal Disruption Attacks , Medium
Access Layer Vulnerabilities, Network Layer Protocol Vulnerabilities, Countermeasures for Each
Attack in Network Layer Protocol: RIP, OSPF, Network Layer Protocol Vulnerabilities,
Countermeasures for Each Attack in Network Layer Protocol: BGP, Transport Layer Protocol
Vulnerabilities: UDP, Transport Layer Protocol Vulnerabilities : TCP, Session Layer Protocol
Vulnerabilities, Presentation Layer Protocol Vulnerabilities, Application Layer Protocol
Vulnerabilities : DHCP, Application Layer Protocol Vulnerabilities :HTTP AND HTTPS DOM- based
vulnerabilities, Wireless Access Point Firmware Vulnerabilities.
Text Books :
1. Sanders C. , Practical Packet Analysis (3rd ed.), No Starch Press, 2017. ISBN
9781593278020.
Reference Books :
1. Gebali F., Network Vulnerability Assessment: Identify security loopholes in your network’s
infrastructure (1st ed.), Springer, 2018. ISBN 978-1788627252.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET363 Penetration Testing, Auditing and Ethical L T P C
Hacking
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To identify and analyze the stages an ethical hacker requires to compromise a target system.
CO2: To utilize tools and techniques to carry out a penetration testing.
CO3: To critically evaluate security techniques used to protect system and user data.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 2 2 2 2 3 2 2
CO2 2 3 3 2 2 2 2 3 2
CO3 2 2 3 2 3 2 2 3 3
Course Contents:
Penetration testing using various tools. Crafting malicious packets for network devices like servers,
routers, or switches. Crafting malicious software for system vulnerabilities. Ethical hacking on Wired
and Wireless Networks.
Text Books :
1. Harper Allen, Gray Hat Hacking: The Ethical Hacker's Handbook (6th ed.), McGraw-Hill Osborne
Media, 2022. ISBN 1264268947.
Reference Books :
1. Wallace Connor, Penetration Testing: Penetration Testing: A Hands-On Guide For Beginners (1st
ed.), Independently Published, 2020. ISBN 979-8614981143.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET364 Forensics and Cyber Law L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 2 3 2 2 2 3 2 2
CO2 2 2 1 3 2 2 3 2 2 2
CO3 2 2 1 3 2 2 2 2 2 2
Course Contents:
Explore the various tools for cyber forensic investigations. Experiments to show web vulnerabilities
using DAMN Vulnerable Web App (DVWA). EnCase Forensics to make and restore image of the hard
drive.
Text Books :
1. Britz Marjie T, Computer Forensics and Cyber Crime: An Introduction (4th ed.), Pearson Education
India, 2022. ISBN 978-0134847528.
2. Johansen Gerard, Digital Forensics and Incident Response: Incident response techniques and
procedures to respond to modern cyber threats (2nd ed.), Packt Publishing Limited, 2020. ISBN
978- 1838649005.
Reference Books :
1. Reddy Niranjan, Practical Cyber Forensics (1st ed.), Apress, 2019. ISBN 978-1484244605.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET365 Web Security L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To possess the skills to carry out independent analysis of modern malware samples.
CO2: To understand and analyse the Mobile application threat landscape.
CO3: To apply techniques to unpack, extract, decrypt, or bypass in future malware samples.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 1 1 2 2 2 3 2 2
CO2 2 3 1 2 2 2 3 2 2
CO3 2 1 1 2 2 2 2 2 2
Course Contents:
In this Lab, the student will be able to practically understand HTTP Host header attacks, and its
countermeasure: Basic password reset poisoning, Password reset poisoning via dangling markup,
Constructing a web cache poisoning attack and its countermeasure Cross-site scripting attacks and its
prevention, XML external entity (XXE) injection, Cross-site request forgery (CSRF), Server-side
template injection, Insecure deserialization, Clickjacking, OS command injection, Business logic
vulnerabilities: Excessive trust in client-side controls, High-level logic vulnerability, and Low-level
logic flaw, Weak isolation on dual-use endpoint and Authentication bypass via flawed state machine.
Text Books :
1. Hoffman Andrew, Web Application Security: Exploitation and Countermeasures for Modern Web
Applications (1st ed.), O'Reilly Media, 2020. ISBN 978-1492053118.
Reference Books :
1. McDonald Malcolm, Web Security for Developers (1st ed.), No Starch Press, 2020. ISBN
9781593279957.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET366 Special Topics in Information Security L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies or algorithms in Information Security (IS).
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 3 2 3 3
CO2 2 1 3 1 3 1 3
Course Contents:
Students will gain practical experience by using tools and technologies related to IS.
Text Books :
1. Pfleeger Charles P., Security in Computing, Fourth Edition, Pearson Education
2. Stallings William, Network Security Essentials: Applications and Standard. Prentice Hall.
Reference Books :
1. Stallings William, Cryptography And Network Security Principles And Practice, Fourth or Fifth
Edition, Pearson
2. Mao Wenbo, Modern Cryptography: Theory and Practice, Prentice Hall.
Specialization
Electives:
Data Science
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET367 Digital Marketing and Trend Analysis L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 3 1 3 1 3 1 1 1
CO2 1 2 1 3 1 3 2 1 1
CO3 2 1 3 2 2 2 2 1 2
Course Contents:
Text Books :
1. Gary P Schneider, Electronic commerce (13th ed.), Cengage Learning, Inc, 2019. ISBN
9781285425436.
2. Kingsnorth Simon , Digital Marketing Strategy: An Integrated Approach to Online Marketing
(4th ed.), Pearson, 2019. ISBN 0749484225.
Reference Books :
1. Clarke Adam, SEO 2020 (2nd ed.), Amazon Digital Services LLC - KDP Print, 2019. ISBN
9781712354889.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET368 Structural Equation Modelling L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To explain the statistical and numerical models used in SEM Framework.
CO2: To build factor analysis to find multiple hidden variables.
CO3: To implement of parameter estimation and regression analysis of practical frameworks.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 2 1 2 1 2 3 1 1
CO2 3 1 3 1 1 2 2 3 3
CO3 3 1 3 1 2 1 1 3 2
Course Contents:
Students will be doing Lab experiments using R/Python to implement various Techniques, algorithms
and problems related to the respective modules.
Text Books :
1. Thakkar Jitesh J., Structural Equation Modelling: Application for Research and Practice (1st ed.),
Springer, 2020. ISBN 978-9811537929.
Reference Books :
1. Civelek Mustafa Emre, Essentials of Structural equation modelling (1st ed.), Zea Books, 2019.
ISBN 978-1-60962-129-2.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET369 Time Series Analysis L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 2 1 2 1 2 3 1 1
CO2 3 1 3 1 1 2 1 3 3
CO3 3 1 3 2 2 1 1 3 3
Course Contents:
The lab component is meant to perform time series analysis, time series forecasting with R, time series
prediction with LSTM Recurrent Neural Networks by using Python with Keras etc.
Text Books :
1. Nielsen Aileen, Practical Time Series Analysis: Prediction with Statistics and Machine Learning
(1st ed.), O′Reilly, 2019. ISBN 1492041653.
2. Mills Terence C., Applied Time Series Analysis: A Practical Guide to Modelling and Forecasting
(1st ed.), Academic Press, 2019. ISBN 978-0-12-813117-6.
Reference Books :
1. Nielsen Aileen, Practical Time Series Analysis (1st ed.), O′Reilly, 2019. ISBN
9781492041629.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET370 Data Visualization and Dashboards L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To explain best practices in data visualization to develop charts, maps, tables, and other visual
representations of data.
CO2: To build an interactive dashboard for a cohesive and seamless visualization.
CO3: To implement different visualization approaches on real-world datasets.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 2 1 2 1 2 3 1 1
CO2 3 1 3 1 1 2 1 3 3
CO3 3 1 3 2 2 1 1 3 3
Course Contents:
Students will work on DataSets to use the various features of tools to practice and understand the
functionality. Students will be preparing a dashboard for Data Science Case study and will customize.
Students will be required to understand the challenges to work on large datasets and will experiment
with such challenges.
Text Books :
1. Wexler Steve, Jeffrey Shaffer and Andy Cotgreave, The Big Book of Dashboards: Visualizing Your
Data Using Real-World Business Scenarios (1st ed.), John Wiley & Sons, 2017. ISBN 978-
1119282716.
Reference Books :
1. Kusleika Dick, Data Visualization with Excel Dashboards and Reports (1st ed.), ohn Wiley & Sons,
2021. ISBN 1119698723.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET371 Big Data Analytics and Business Intelligence L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 3 2 3 2 3 2 3 2 2 2 3 2
CO2 2 2 3 2 2 2 2 2 1 3 3 2
CO3 3 1 1 1 2 2 2 1
Course Contents:
Students will gain practical experience by using tools and technologies like R, HDFS, MapReduce,
Hive, pig, NoSQL, tableau.
Text Books :
1. Ghavami Peter , Big Data Analytics Methods (2nd ed.), De Gruyter, 2020. ISBN
9781547417951.
2. Acharya and Seema, Data Analytics using R (1st ed.), New York: McGraw-Hill Education, 2018.
ISBN 9352605241.
Reference Books :
1. Azevedo Ana and Manuel Filipe Santos, Integration Challenges for Analytics, Business
Intelligence, and Data Mining (1st ed.), Engineering Science Reference, 2020. ISBN
9781799857832.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET372 Advanced Database Management System L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To articulate the concepts of transaction processing, concurrency control techniques, database
recovery techniques.
CO2: To build distributed and object-oriented databases and learn to apply concurrency control and
recovery algorithms.
CO3: To implement distributed and Object-Oriented DBMS to speed up information processing and
storage.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3
CO2 3 3 3 3 2 3 2 3 3 3
CO3 3 3 3 3 3 2 3 3 3 3 3
Course Contents:
Text Books :
1. Connolly Thomas and Carolyn Begg, Database Systems (6th ed.), Pearson, 2019. ISBN
9789353438913.
2. Sadalage Pramod J and Martin Fowler, NoSQL Distilled (1st ed.), Pearson, 2012. ISBN
9780321826626.
Reference Books :
1. Hoffer prescott and Mcfadden, Modern Database Management (8th ed.), Prentice Hall, 2008. ISBN
978-8131709481.
2. Bayross Ivan, SQL and PL/SQL (4th ed.), BPB Publications, 2010. ISBN 978-8176569644.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET373 Satellite Data Analysis L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: Analyse the Fundamental mechanism of GIS and Process spatial and attribute data towards
preparation of thematic maps.
CO2: Understand and Interpret the various land features over satellite images.
CO3: Generate and publish the spatial maps derived from satellite data to be used for societal
applications.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 1 3 2 3 2
CO2 3 2 2 1 1 2 3
CO3 3 3 3 2 1 2 2 3
Course Contents:
Reading and writing the individual Bands in satellite images, Pre-processing of Satellite Images,
Generation of Natural color composite and False color composite images, Measurement from the
orthorectified Satellite Images, Digitization, adding attribute information in spatial data, Computation
of Various indices for vegetation and water estimation, Publishing spatial layers in Geoserver,
Development of Web-GIS applications.
Text Books :
1. Chang, K. T., Introduction to geographic information systems (9 ed.), McGraw-Hill Higher
Education, 2019. ISBN 978-1260136371.
2. Lillesand, T., Kiefer, R. W., and Chipman, J., Remote sensing and image interpretation (7 ed.),
John Wiley & Sons, 2014. ISBN 978-1118343289.
Reference Books :
1. Bernhardsen, T., Geographic information systems: an introduction (3 ed.), Wiley, 2010. ISBN 978-
8126511389.
2. Chris Brunsdon and Lex Comber, An Introduction to R for Spatial Analysis and Mapping (Spatial
Analytics and GIS) (2 ed.), SAGE Publications Ltd, 2019. ISBN 978-1526428509.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET374 Special Topics in Data Science L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies or algorithms in Data Science.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 2 1 2 1 2 2 1
CO2 2 2 2 2 3 3 2 3
Course Contents:
Students will gain practical experience by using tools and technologies related to MLDA.
Specialization
Electives:
Gaming
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET375 VR Gaming L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 1 2 1 1 2 3 1 3
CO2 2 1 3 2 2 2 2 3 3
Course Contents:
This lab enables students and staff to visualize designs, develop immersive VR environments, and to
test new VR technologies. The lab features three-dimensional (3D) projections on the walls and floor,
as well as sensory feedback, so participants can manipulate objects like medical tools.
Text Books :
1. Glover Jesse and Jonathan Linowes, Complete Virtual Reality and Augmented Reality Development
with Unity: Leverage the power of Unity and become a pro at creating mixed reality applications
(1st ed.), Packt Publishing Limited, 2019. ISBN 1838648186.
Reference Books :
1. Jerald Jason, The VR Book: Human-Centered Design for Virtual Reality Jason Jerald (1st ed.),
NextGen Interactions 2016, ACM Books. 2016. ISBN 978-1970001129.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET337 Augmented Reality L T P C
Course-Outcomes (COs):
On completion of this course, the students will be able to:
CO1: To articulate alternative 3D compositing techniques using computer vision with applications in
interactive interfaces – most notably augmented reality interfaces on mobile devices.
CO2: To implement interactive augmented reality games and understand the practical issues regarding
multi-platform reconstruction.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 3 1 1 1 1 2 1 1 3
CO2 2 1 2 1 1 1 3
Course Contents:
Industrial applicability of AR, AR Systems Overview, Input and Output Devices for AR, Optical vs.
Video, See-Through AR, AR system architecture, Senses, Simple sensing/perception model, Human
visual system, 3D Vision, Tracking system, Tracking for Augmented Reality, Importance of Accurate
Head Tracking, Tracking Problem, Tracking Technologies, Importance of Accurate Head Tracking,
Tracking Problem, Tracking Technologies, Head motion prediction, Registration, Calibration – static
and dynamic, Real Time Performance, Characteristics – spatial, temporal, system robustness,
Scheduling and Fusing Sensor Information, mixed reality UI design, Design of immersive user
experience.
Video mixing, optical blending, projection devices, spatially augmented reality, Immersive virtual
reality, Desktop metaphor, mobile/wearable computing, Ubiquitous computing, Tangible user
interfaces, Distributed graphics.
The laboratory of Augmented reality is designed to provide a practical exposure to the students about
the concepts and topics taught in the classroom sessions.
Text Books:
1. Alan B Craig, William R Sherman and Jeffrey D Will, Developing Virtual Reality Applications:
Foundations of Effective Design (1 ed.), Elsevier Publisher, 2009. ISBN 978-0123749437.
2. Doug A Bowman, Ernest Kuijff, Joseph J LaViola, Jr and Ivan Poupyrev, 3D User Interfaces:
Theory and Practice (Usability) (2 ed.), Pearson Education, USA, 2017. ISBN 978-0134034324.
Reference Books:
1. Erin Pangilinan, Steve Lukas, Vasanth Mohan, Creating Augmented and Virtual Realities(1 ed.),
Creating Augmented and Virtual Realities (1 ed.), O’Reilly Publishers, 2019. ISBN 978-
1492044192.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET377 Game Mechanics and Game L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To articulate different types of bodies and their dynamics, used in-game programming.
CO2: To implement the collision detection and their resolution techniques.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 1 3 3 3 3 2 2 1 3 2 2 2
CO2 2 3 1 2 2 1 2 2 1 1 3
Course Contents:
Text Books :
1. Bourg David M and Bryan Bywalec, Physics for Game Developers (2nd ed.), O'Reilly Media, 2013.
ISBN 978-1449361037.
Reference Books :
1. Schell Jesse, The Art of Game Design: A Book of Lenses, (3rd ed.), A K Peters/CRC Press, 2019.
ISBN 1138632058.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET378 Game Programming with HTML5 L T P C
Owning School/Department School of Computer Science Engineering and 3 0 0 3
Technology
Pre-requisites/Exposure -
CO1: To explain the fundamentals of Game Programming in HTML5 and understand the elements of
programming in the two-dimensional environment for the creation of Games).
CO2: To create the games for the desktop machine and Internet using the different tools available in a
major programming language like HTML5.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 2 2 3
CO2 3 3 2 2 2 3 3 3
CO3 3 2 2 3 2 3 1 3 3
Course Contents:
Text Books :
1. Wright Timothy M., Fundamental Game Programming with Java (1 ed.), Cengage Learning PTR,
2014. ISBN 978-1305076532.
Reference Books :
1. Millington IAN and John Funge, Artificial Intelligence for games (2 ed.), CRC Press, 2009. ISBN
978-0123747310.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET379 AI for Games L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To comprehending an interconnection between the techniques of AI and their usage in Games.
CO2: To Implement the idea of AI in Games for developing games programmatically.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3
CO2 3 3 3 3 3 3 3 3
Course Contents:
Text Books :
1. Bourg David and Glenn Seemann, AI for Game Developers: Creating Intelligent Behaviour in
Games (1 ed.), O’Reilly Media, 2020. ISBN 978-0596005559.
Reference Books :
1. Yannakakis Georgios N. and Julian Togelius, Artificial Intelligence and Games (1 ed.), Springer,
2018. ISBN 978-3319635194.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET394 Modern and Contemporary Application in L T P C
Computer Science
Course-Outcomes (COs):
On completion of this course, the students will be able to:
CO1. Develop the skills to identify and apply modern and contemporary technologies to solve real-
world computer science problems.
CO2. Become familiar with programming languages and software tools related to Neche technologies,
Analyse the advantages and disadvantages of various technologies and how they impact the world
.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 2 2 3 2
CO2 3 2 1 1 1 3 1
Course Contents:
This course will provide an overview of modern and contemporary applications of computer science.
We will cover topics such as artificial intelligence, machine learning, robotics, data science, cloud
computing, and more. We will explore the various technologies and techniques used in each area, as
well as their real-world applications. We will also look at the ethical implications of certain applications
and the importance of responsible use of computer science technology. The course will also feature
programming projects and assignments to give students a practical understanding of the concepts
discussed. Learning outcomes include an understanding of the fundamentals of computer science,
knowledge of the various applications of computer science, and an ability to apply these concepts to
real-world problems.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET395 Latest advances in Engineering and L T P C
Technology
Owning School/Department School of Computer Science Engineering and 3 0 0 3
Technology
Pre-requisites/Exposure -
Course-Outcomes (COs):
On completion of this course, the students will be able to:
CO1. Gain an understanding of the latest engineering and technology advances, their implications, and
applications.
CO2. Develop the skills necessary to analyze and apply the latest engineering and technology advances
to solve engineering and technology-related problems.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 2 2 2 1 2 3 2 2
CO2 2 3 3 2 2 2 1 2 1 1 2 2 3 3
Course Contents:
This course will cover the latest advances in engineering and technology, including topics such as
artificial intelligence, machine learning, robotics, control systems, Internet of Things, big data, cloud
computing, and more. Students will learn about the newest technologies, their applications, and their
implications for engineering and technology. They will also explore case studies and gain a better
understanding of how current technologies are being used in the industry today. Students will develop
their knowledge of the fundamentals of engineering and technology and learn how to apply them to
solve real-world problems. Additionally, students will develop their ability to think critically and
strategically about the current state of engineering and technology.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET393 Android Application Using Kotlin L T P C
Course-Outcomes (COs):
On completion of this course, the students will be able to:
CO1: To explain best practices in data visualization to develop charts, maps, tables, and other visual
representations of data.
CO2: To build an interactive dashboard for a cohesive and seamless visualization.
CO3: To implement different visualization approaches on real-world datasets.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 1 3 1 1
CO2 2 2 2 2 1 1
CO3 2 2 1 2 3 1 1 1
Course Contents:
Build your android application, basic app anatomy, layout: linear layout, add user interactivity,
constraint layout, data binding basics, application navigation
Android app architecture, activity and fragment lifecycle, view model, live data, live data
transformation, persistence, connect to the internet, repository pattern and work manager
App designing, styles and themes, material design, dimension and colors
Students will develop the android application using latest tools of kotlin.
Text Books:
1. The Android Development with Kotlin course is already published online for self-paced learning.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET380 Animation and Rendering Techniques L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3 3 3 3 3
Course Contents:
The experiments to create an image of an object with the different lighting condition. Light the scene
with direct and indirect light, Rendering out Animation. Creation of a short-animated movie.
Text Books :
1. Watt Alan H. and Mark Watt, Advanced Animation and Rendering Techniques Theory and
Practice (1 ed.), ACM Press, 1992. ISBN 9780201544121, 0201544121.
Reference Books :
1. Möller Tomas Akenine, Eric Haines and naty Hoffman, Real-Time Rendering (3 ed.), CRC Press,
2019. ISBN 9781315362007, 1315362007.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET440 Pixel and Poly Arts for Games L T P C
CO1: To explain the tools and knowledge required for creating simple art for video games made in a
game engine.
CO2: To implement whole pipeline from creation to setting up in a game engine.
CO – PO /PSO Mapping
PSO PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1
2 3
CO1 2 1 2 3 2 2
3
CO2 3 2 3 1 3 2 2 2 2 2 2
Course Contents:
Introduction to pixel art, Pixel art environment, Environment Design, Pixel art characters, Pixel art
character design, Pixel Art Animation, Animation in Photoshop, Animating an Idle Animation,
Animating a Run Cycle, Low Poly Game Art, Objects and Tools, Modeling Tools, Sub-Division
Modeling, Rigging and Animation, One point vs twopoint perspective, Modeling, Understanding UVs
and Mapping, Texturing.
Low Poly Environment Art, Rock designing, Island, wall, and gate designing. Low Poly Character Art,
Body modeling (head, torso, legs, arms, and hands), Model costume, Model cleanup, Unwrapping, UV
layout, Animating Low Poly Art, Skeleton, Skinning, Walk Cycle, Idle Animation, 3D Game Prop
Production, Essentials Normals and Baking, Essential Modeling Tips and tools, Essentials Substance
Painter and ZBrush, Initial Block-In.
Mid-Poly Block-In Model, Mid-Poly Objective Lens, Mid-Poly Eye Piece Swivel, Mid-Poly Eye-Piece
Viewer, Mid-Poly Body, Mid-Poly Swivel and Strap Mount, High-Poly Objective Lens, High-Poly Eye
Piece Swivel, HighPoly Eye-Piece Viewer, High-Poly Body, High-Poly Floaters, PBR Texturing,
Baking Texture Maps, Creating Initial Textures in Substance Painter, Adding Height-Map Details,
Creating and using Texture Stencil, Texturing Surface Noise, Dirt, & Wear, Rendering in Marmoset,
Compositional Studies for Concept Art, Introduction to 3D for Concept Art (The Drawing, Modifying,
and Offset Tools), Setting Up the Layers, Lighting the Foreground, Managing the background and
object, Finishing.
Studio Work / Laboratory Experiments:
In this course lab students will create pixel art assets for games, create low-poly 3D assets for games,
understand how to study composition, create environment concept painting, create a current gen photo-
realistic game prop.
Text Books:
1. Schell, Jesse. The Art of Game Design: A book of lenses. CRC press, 2008. ISBN 9781466598645,
1466598646
Reference Books:
1. Dawe, Jennifer, and Matthew Humphries. Make Your Own Pixel Art: Create Graphics for Games,
Animations, and More!. No Starch Press, 2019. ISBN 9781593278878, 159327887X.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET441 Game Design, Development and Programming L T P C
CO1: To articulate the workflow for creating video games and usage of subcomponents of game
engines such as graphics, physics and audio engines.
CO2: To develop realistic scenes and environments. Design, write and deploy 2D and 3D games.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 3 2 2 3 3 2 2 2 3
3 3 3 2 3 3 3 3 3 2 3 3
CO2
Course Content:
Game design, Aspects of game design, Components in a game, Game engines, Geometric primitives,
2D and 3D linear transformation, Game state, Interactive Storytelling, Game mechanics, Rules and
Discovery, Game engine essentials, Interface and Assets, Game engine Interfaces, Prototyping and
Scripting Basics.
Terrain, Terrain Assets, Camera, Layer, Game Physics, Collider, Gravity simulation, Rigid body
interaction, Collisions, Collision Detection, resolution, Optimization Application and Techniques,
Deployment methods, Character scripting, Object modelling, Texture to game objects, Sprites,
Animation.
Association of audio, Audio assets, Different audio formats, Audio mixing, visual continuity in tiles,
Adding objects to scene, Prefabs, Lighting, RGB space, Transparency, Level design, Scenes, Tiles,
Combinatorial games, Twoperson zero-sum games, Zero-sum games on graphs, General-sum games,
Adaptive decision making, Artificial Intelligence Agents, Navigation and pathfinding.
Text Books:
1. Schell, Jesse. The Art of Game Design: A book of lenses. CRC press, 2008. ISBN 978- 1138632059.
Reference Books:
1. Buttfield-Addison, Paris, Jon Manning, and Tim Nugent. Unity game development cookbook:
essentials for every game. O'Reilly Media, 2019. ISBN 978-1491999158.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET442 Special Topics in Animation and Gaming L T P C
CO1: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies or algorithms in animation and gaming.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 2 3 3 2 3 3
3 2 3 2 3 2 2 3 3
CO2
Course Content:
This course covers the cutting-edge topics in animation and gaming, and these modules will be chosen
by the instructor based on the requirements and relevance at that point of time. These modules need to
be relevant to the industry and start-ups will also include related case studies, use cases and
implementations scenarios. Students will be working on lab work and projects to get real hands-on
experience of these topics and modules.
Students will gain practical experience by using tools and technologies related to animation and gaming.
Specialization
Electives:
Robotics
Process
Automation
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET443 Digital Process Automation Architecture L T P C
CO1: To understand the architecture and modelling behind design and development of digital bots.
CO2: To examine the sustainability of digital workforce.
CO3: To enable for understanding the process to automate the extensive business processes.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 2 3 3
CO2 1 1 2 3
CO3 1 1 2 3
Course Content:
Bot editor for creating bots, Action palette content for bot creation, Build advanced bots and packages,
Package software development kit, Build a bot using REST web services and JavaScript actions, Post
to Salesforce through custom app with OAuth 2.0, Parsing of JSON response, Use of JavaScript to build
a bot to take user input, Bot store submission checklist, Building reusable bots, Troubleshooting and
debugging of bot, Bot agent log files, Managementof the activities, Workload management, Create
workload queues, Bot with queue, Manage work items and development of workload guidelines,
Robotic Interface with back-office business process use case, Creating form, Creation of the Bots,
Creation of Proces, SAML user access to private bot store, Bot lifecycle management, Guidelines for
exporting and importing bots, Export bots, import bots, Audit API, Authentication API, Bot scheduler
API, Bot insight API, Create credential & locker, Credential vault email notifications, External key
vault integration cyberark, Bot store, Configure the control Room, Bot lifecycle management API,
Credential vault APIs.
Bot editor for creating bots, Action palette content for bot creation, Build advanced bots and packages,
Package software development kit, Build a bot using REST web services and JavaScript actions, Post
to Salesforce through custom app with OAuth 2.0, Parsing of JSON response, Use of JavaScript to build
a bot to take user input, Bot store submission checklist, Building reusable bots, Troubleshooting and
debugging of bot, Bot agent log files, Managementof the activities, Workload management, Create
workload queues, Bot with queue, Manage work items and development of workload guidelines,
Robotic Interface with back-office business process use case, Creating form, Creation of the Bots,
Creation of Proces, SAML user access to private bot store, Bot lifecycle management, Guidelines for
exporting and importing bots, Export bots, import bots, Audit API, Authentication API, Bot scheduler
API, Bot insight API, Create credential & locker, Credential vault email notifications, External key
vault integration cyberark, Bot store, Configure the control Room, Bot lifecycle management API,
Credential vault APIs.
Text Books:
1. Mullakara, Nandan, and Arun Kumar Asokan. Robotic process automation projects: build real-
world RPA solutions using UiPath and automation anywhere. Packt Publishing Ltd, 2020. ISBN
9781839217357.
2. Mahey, Husan. Robotic Process Automation with Automation Anywhere: Techniques to fuel
business productivity and intelligent automation using RPA. Packt Publishing Ltd, 2020. ISBN
9781839215650.
Reference Books:
1. Husan Mahey, Robotic Process Automation with Automation Anywhere (1st ed.), Packt
Publishing, 2021, ISBN 9781839215650.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET444 Enterprise ProcessAutomation Frameworks L T P C
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO PSO
2 3
CO1 2 3 3
CO2 2 1 2 3
CO3 1 2 1 3
Course Content:
Robotic Process Automation; Transactions and Types of Processes; Dispatcher and Performer
(Producer and Consumer) Model; RPA Framework Template; Robot stops on the first unexpected error;
Application crash stops the automation; Invalid transaction data stops processing all other transactions;
Hardcoded and/or sparse values for File Paths, emails; Difficult to troubleshoot an error in production;
Large automation projects are difficult to maintain; Automation Project and the Main Workflow;
Initialization State and Configuration File; Get Transaction Data State; Process Transaction and End
Process States; Execution and Logging; System and Business Exception Handling.
Concurrent Queue Consumption; RPA Framework Elements; RPA Framework with Queue Items
Development Checklist; Whiteboarding: Automation Project Workflows; Project Configuration;
Applications Used: Open/Close/Kill; Get Transaction Data and Process; Transaction States; Running
the Project; Testing RPA Framework Project with Queues; Changing the TransactionItemData Type;
Building An Execution Report; RPA Framework with Different Data; Workflow analyser.
Various state machines; Invoke Method; Invoke Code; Use of Activity Project Settings; Advanced
Topics in RPA; RPA Framework; Transaction, Queue, Machine, Variable declaration.
Text Books:
1. Murdoch, Richard. Robotic Process Automation: Guide to Building Software Robots, Automate
Repetitive Tasks & Become an RPA Consultant. Richard Murdoch & RPA Ultra, 2018. ISBN 978-
1983036835.
2. Taulli, Tom. "The robotic process automation handbook." The Robotic Process Automation
Handbook. https://doi. org/10.1007/978-1-4842-5729-6 (2020). ISBN 9781484257289.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET446 Server-Side Development Frameworks: L T P C
Express and Spring
CO1: To articulate the Express which is a minimal and flexible Node.js web application framework that
provides a robust set of features for web and mobile applications.
CO2: To examine server-side development of web applications using Spring framework using Java
language.
CO3: To make use of the interaction with backend databases such as mongo dB, MySQL,
PostgreSQL with Express and Spring applications.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO POS
2 3
CO1 3 3 3 3 2
CO2 3 3 3 3 3 3 3
CO3 3 3 3 3 3 3 3
Course Contents:
Introduction to Full Stack Development, Server-side Development: Node, Node modules and the Node
HTTP server, Third party modules: mongoose, angular, react, express, npx, npm, brew, http server
usage and options, Express framework, REST (REpresentation State Transfer (REST)) API server with
Express, Get, post, put, delete, Node server with Express, Postman for API Testing Automation, Mongo
dB database.
Interacting with MongoDB from a Node application, Install mongo dB using npm, Import mongo client,
Connect to client, Query execution from script file (node sample.js), Mongo and Mongoose,
authentication and session-based authentication, Npm express-session, Token-based authentication
with the support of JSON web tokens and the Passport module, Modules: express, passport,
jsonwebtoken, Fundamental concepts of Spring Core: Dependency Injection (DI) and Inversion of
Control (IoC), Automated Java-Based Configuration: @Component, @Autowired, @ComponentScan,
Constructor Injection, Field Injection, Setter Injection.
CRUD paradigm in java application, RESTful web service: Create (POST), Read (GET), Update (Put),
Delete (DELETE), Basic PostgreSQL data storage and management capabilities [create a database,
drop a database, select database, select table, update a record, create a table, delete record, drop table,
triggers, functions, insert the record, procedures, cursors], Spring SecurityBasics, Spring Security
Features, Spring Security Authentication, Spring JDBCTemplate Introduction, RowMapper, Builder,
Spring Boot, JDBCTemplate using Postman API Hands on Session.
Text Books:
1. Brown, Ethan. Web development with node and express: leveraging the JavaScript stack. O'Reilly
Media, 2019. ISBN 978-1492053507.
Reference Books:
1. Kumar, Akshi. Web technology: theory and practice. CRC Press, 2018. ISBN 9781138550438.
2. Moseley, Ralph. Developing web applications. John Wiley & Sons, 2007. ISBN 9788126538676.
3. Lowe, Doug, and Joel Murach. Murach's Beginning Java 2 JDK 5. Murach, 2005. ISBN
9781890774295.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET447 Special Topics in RPA L T P C
CO1: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies or algorithms in RPA.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO PSO
2 3
CO1 2 3 1
CO2 1 2 1 2 3 3 2
This course covers the cutting-edge topics in RPA, and these modules will be chosen by the instructor
based on the requirements and relevance at that point of time. These modules need to berelevant to the
industry and start-ups will also include related case studies, use cases and implementations scenarios.
Students will be working on lab work and projects to get real hands-on experience of these topics and
modules.
Students will gain practical experience by using tools and technologies related to RPA.
Specialization
Electives:
DevOps
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET448 Build and Release Management in DevOps L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3
CO2 3 3 3 2 3 1 3
CO3 3 3 3 3 3 3 3 3
Course Contents:
Build and Release Management Overview: Overview of Build Management, Build Abstraction,
Overview of Packaging Management, Packaging repositories, Package Registries using the Package,
Package Manager Vs Package Management, Package Management Tools.
Build and Release Concept and Process, release management, Overview of Release and Deployment
Management, Objective and Benefits, Key terminologies used in Release Management, working of
Release Management, Release Management Process Components, Release Lifecycle Management,
Change management, Need of change management, Change Management Vs Release Management.
Organizations that have adopted agile software development are seeing much higher quantities of
releases. With the increasing popularity of agile development, a new approach to software releases
known as Continuous delivery is starting to influence how software transitions from development to
a release. One goal of Continuous Delivery and DevOps is to release more reliable applications faster
and more frequently. The movement of the application from a build through different environments
to production as a release is part of the Continuous Delivery pipeline. The lab work for this subject
deal with the concept that how the students can build and release their software.
Text Books :
1. Blokdyk Gerardus, Change and Release, Management A Complete Guide (1 ed.), 5STARCooks,
2021. ISBN 978-1867310242.
Reference Books :
1. Arora Tarun,and Utkarsh Shigihalli, Azure DevOps Server (1 ed.), Packt Publishing, 2019. ISBN
9781788830148.
2. Zaal Sjoukje, Stefano Demiliani and Amit Malik, Azure DevOps Explained (1 ed.), Packt
Publishing, 2020. ISBN 9781800568657.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET449 Cloud Services Development & Operations L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 3 3 3 2
CO2 2 3 3 2 3 3 3
CO3 2 2 3 2 2 3
Course Contents:
Systems Development Lifecycle, Workflow for developing cloud application on public clouds, Cloud
Software Development Kit (SDKs), SDK Terminology, Cloud Testing Service, Errors and Exceptions,
Cloud Service developing tools, Storage Solutions with public cloud, Developing NoSQL Solutions
with public cloud platform, Caching Information for Scalability.
Cloud notification services, Message Queueing Service, Events Processing with Serverless computing
service, Implementation and Authentication using Serverless computing, Serverless best Practices,
Serverless Step Functions, Secure network Connections, manage applications secrets, Authenticate
with security token, Cognito for user sign-up and sign-in to the web and mobile app, Container,
Container Management.
Configure auto-scaling, launch auto-scaling, Self-healing Kubernetes cluster, Deploy the microservices
using Kubernetes cluster, Cloud service registration, Cloud service discovery, Configure scaling and
self-healing for each service, best practices for debugging, Microservices, Monitoring and Logging for
microservices, Case Study of resilience cloud service.
Text Books :
1. Stephen Orban, Ahead in the Cloud: Best Practices for navigating the Future of Enterprise IT (1st
ed.), CreateSpace Independent Publishing Platform, 2018. ISBN 9781981924318. .
2. Wadia and Yohan, AWS Administration–The Definitive Guide (1st ed.), Packt Publishing Ltd,
2016. ISBN 9781782173755..
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET450 Source and Version Control in DevOps L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To articulate the technical aspects of Source and Version Control systems in DevOps
CO2: To examine the version control systems for tracking, branching, merging, and managing code
revisions.
CO3: To make use of the workflows of various version control systems like Git, Sun and Mercurial.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 3 3 3
CO2 3 3 2 2 3 3 3
CO3 2 2 3 3
Course Contents:
Source Version Control (SVC), SVN (Sub Version Systems), Mercury and Git, Single Source
repository, Creation, Commit, Builds, Cloud Computing, Version Control Over Cloud, Implementation
of Version control over cloud, copy-merge and merge -update algorithms, Practices and rules of version
control systems, Industries using version control system (Case study).
Distributed Version Control System (DVCS), DVCS Vs CVS, Local Repository, Advantages of
Distributed version Control System, Local repository operations (Resetting Local Environment, Revert
- Cancelling Out Changes, Private Workspace), Multiple Repositories Models, Repositories for
Different Services, Merging Repositories, Branching Repositories, Automation of SVC, BitBucket
SVC on cloud, BitBucket SVC on local system.
Continuous Integration and Continuous Deployment (CICD), CI Models, CI Practices over SVC,
Operations of CI over SVC, Automated CI over SVC, CD over SVC, CD Models, CD Practices over
SVC, Operations of CD over SVC, Automated CD over SVC, CICD Tool.
The lab components of this course demonstrate how to implement GitHub on desktop to manage local
and remote repository and explores the functionality of Software Version Control Systems with hands-
on experience of concepts taught in the lecture.
Text Books :
1. Gerardus Blokdyk, Distributed Version Control System A Complete Guide (1st ed.), 5STARCooks,
2021. ISBN 978-1867331193.
2. Leornardo Christian, Git: A fast and easy guide to version control (1st ed.), Independently
published, 2020. ISBN 979-8642660034.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET451 Software Craftmanship in DevOps L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 2
CO2 3 2 3 3 3 2
CO3 3 3 3 3
Course Contents:
Software Craftsmanship, Four Dimensions of Quality, Software Ethics, Clean code, Craftsmanship Vs
Engineering, Frameworks and Tools, Design, Structure, Formatting, and Documentation of Code,
Types of Designs/Models, Design Structure Matrix (DSM), Product-Service System using DSM.
Testing and Validation, Different Types of Testing, Properties of Testing, Customizable, Extendable,
Link Validity, Component Checking, Semantic, and Syntax Parsing.
Frameworks, Tools, and the Programming Process, DevOps Frame Definition, Agile Framework,
Scaled Agile Framework, Adoption Framework, Industry Practices.
Text Books :
1. Fowler Martin, Refactoring: Improving the Design of Existing Code (2nd ed.), Addison- Wesley,
2019. ISBN 978-0134757599.
2. Martin Series Robert C., Software Craftsman, The: Professionalism, Pragmatism, Pride 1st Edition
(1st ed.), Addison Wesley, 2020. ISBN 978-0134052502.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET452 Software Containerization in DevOps L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 2 1 1 1 2
CO2 2 3 1 3 2 2 3 2
CO3 3 2 2 3 3 1 3 1
Course Contents:
The lab work demonstrates orchestration tools like Docker, Swarm, and Kubernetes with hands-on
experience of concepts taught in the lecture. Students will gain hands-on experience using real accounts
on AWS, Azure, Google Cloud Platform.
Text Books :
1. Panthofer Mark, Mastering Docker Enterprise: A companion guide for agile container adoption
(1 ed.), Packt Publishing,, 2019. ISBN 978-1789612073.
Reference Books :
1. Rice Liz, Container Security: Fundamental Technology Concepts that Protect Containerized
Applications (1 ed.), O'Reilly Media, 2020. ISBN 978-1492056706.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET453 System Provisioning and Configuration L T P C
Management in DevOps
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 1 3
CO2 2 3 3 3 2
CO3 2 2 3 2 3
Course Contents:
Text Books :
1. Freeman James and Jesse Keating, Mastering Ansible: Effectively automate configuration
management and deployment challenges with Ansible 2.7 (1st ed.), Packt Publishing, 2019.
ISBN 978-1789951547.
Reference Books :
1. Verona Joakim, Practical DevOps (2nd ed.), Packt Publishing, 2018. ISBN 978-1788392570
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET454 Test Automation in DevOps L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3 3 1
CO2 3 3 3 3 3 3 2
CO3 1 3 3 3 3 3 3 1
Course Contents:
The lab component of this course demonstrates test cases design and illustrates automation
testing and continuous integration with tools like Agile and Jenkins. The practical work will help
to identify all the stages of your release along with the gates and requirements necessary in a
build’s journey to production. Also, all the operational procedures, services, and actions involved
with a release cycle will be elaborated.
Text Books :
1. Wolfgang Platz and Cynthia Dunlop, Enterprise Continuous Testing: Transforming Testing for
Agile and DevOps (1st ed.) (1 ed.), CreateSpace Independent Publishing Platform, 2019. ISBN
978- 1699022948.
Reference Books :
1. Arnon Axelrod, Complete Guide to Test Automation (1 ed.), Apress, 2019. ISBN 978-
1484238318.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET456 Special Topics in DevOps L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies or algorithms in DevOps.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3 1
CO2 3 3 3 3 3 3 3 3 3 3
Course Contents:
This course covers the cutting-edge topics in DevOps, and these modules will be chosen by the
instructor based on the requirements and relevance at that point of time. These modules need to be
relevant to the industry and start-ups will also include related case studies, use cases and
implementations scenarios. Students will be working on lab work and projects to get real hands-on
experience of these topics and modules.
Students will gain practical experience by using tools and technologies related to DevOps.
Specialization
Electives: Full
Stack
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET457 Front-End Web UI Frameworks and L T P C
Tools:Bootstrap
CO1: To articulate grids and responsive design, Bootstrap CSS, and JavaScript components.
CO2: To examine Bootstrap Grid and display of responsive web page design.
CO3: To implement Bootstrap components and Plug-Ins.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO PSO
2 3
CO1 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3 3 3 3
Course Content:
Bootstrap Plug-Ins, Use Bootstrap Plug-Ins, Transition Plug-in, Modal Dialog Box, Properties,
Methods and Events of Model Dialog Box, Scrollspy Plug-In, Tab Plug-in, use Tab Plug-in, Drop Down
Plug-in, Tooltip Plug-in, Use Button Plug-in, Methods and events of Tooltip Plug-in, Popover Plug-in,
alert and Button Plug-ins, Collapse Plug-in: Properties, Collapse Plug-in: Methods, Events of Collapse
Plug-in, Carousel Plug-in, Affix Plug-in.
Studio Work / Laboratory Experiments:
Studio work consists of UI Design and Prototyping using Front-End Web UI Frameworks and Tools of
Bootstrap 4 and advanced CSS and JavaScript. Here, building responsive design and Bootstrap Grid
System, Learning Git, and utilizing Bootstrap CSS Components for displaying content is also targeted.
Text Books:
1. Chiaretta, Simone. Front-end Development with ASP. NET Core, Angular, and Bootstrap. John
Wiley & Sons, 2018. ISBN 9781119243963.
2. Moreto, Silvio, Matt Lambert, Benjamin Jakobus, and Jason Marah. Bootstrap 4–Responsive Web
Design. Packt Publishing Ltd, 2017. ISBN 9781785288876.
Reference Books:
1. Duckett, Jon. Javascript and jquery: Interactive front-end web development. Wiley Publishing,
2014.. ISBN 9781118531648.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET458 Front-End Web UI Frameworks and Tools: L T P C
React Native
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 3
CO2 3 3 2 2 3 3 3 3
CO3 3 3 2 2 3 3 3 3
Course Content:
Course handout assessment mechanism, Front end web development, JavaScript: Arrow Functions,
React, spread operator, Default params, Let and const variables, React Components: State and Props,
composing components, adding states, React Components: Lifecycle, Event handling, Intermediate
React: Rendering lists, Form elements, Forms: Controlled, Uncontrolled, Functional Components.
React Virtual DOM, The Flux Architecture, Redux, Redux form validation, Brief Representational
State Transfer (REST).
React native, Animation API, Components: Basic, Stateful, Stateless, Custom fonts, Component API,
Higher-Order Components: Keys, Fragments, Constructor, Animations, HTTP Requests:
Syntax, XMLHttpRequest, Web Socket with Socket.io, Images module: Image source, image path,
Network image, Firebase integration, ReactNative ListView, Authentication in ReactNative Using
Firebase, Layouts, ListView Navigators, Botton Navigation, Push Notifications: Simple and Navigation
based.
Studio work consists of React library for JavaScript based front-end application development. It uses
of JavaScript ES6, JSX and React framework for building user interfaces in front-end application
development. Developing web Applications using React is to be focused.
Text Books:
1. Banks, Alex, and Eve Porcello. Learning React: functional web development with React and Redux.
" O'Reilly Media, Inc.", 2017. ISBN 9352135636.
2. Stefanov, Stoyan. React: Up & Running. " O'Reilly Media, Inc.", 2021. ISBN 1491931825.
Reference Books:
1. Vipul, A. M., and Prathamesh Sonpatki. ReactJS by Example-Building Modern Web Applications
with React. Packt Publishing Ltd, 2016. ISBN 1785289640.
2. Gackenheimer, Cory. Introduction to React. Apress, 2015. ISBN 1484212460.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET459 Front-End UI Frameworks and Tools: Flutter L T P C
and Django
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3
CO2 3 3 3 3 3 3 3 3
CO3 3 3 3 3 3 3 3 3
Course Content:
Basics of Flutter and Dart Programming, Dart Programming – Syntax: Variables, Data type, Dart
conditional operators: If-else, For, while do-while Dart Functions: structure, return type, expression,
OOP: classes, object, Methods, constructor, Inheritance, Abstract class, Flutter widgets: Scaffold,
image, container, Icon, Flutter Layouts: card. Stateful and stateless widget, Navigation: button widget-
floating raised, flat, dropdown, outline, Flutter Webview widget, Visual, Behavioral, and Motion-Rich
Widgets, List View, Data View, Date Picker, Time Picker, Dialogs, alerts.
Django structure, URL dispatcher Requests and Responses, GET and POST methods, MVC model and
Generic Views, Images, Forms Alert Handling, Django REST, Generic Views in Django Rest, Building
RESTful APIs, Database- Add tables, Dynamic progress bar Deploying Web APIs, Advanced Django
for Web and Automation.
Text Books:
1. Zaccagnino, Carmine. "Programming Flutter: Native, Cross-Platform Apps the Easy
Way." Programming Flutter (2020): 1-275.. ISBN 1680506951.
Reference Books:
1. Payne, Rap. Beginning app development with flutter: Create cross-platform mobile apps. Apress,
2019.. ISBN 1484251806.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET460 Special Topics in Full Stack L T P C
CO1: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies, or algorithms in Full Stack.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 3
CO2 3 3 3 3 3 3 3 3
This course covers the cutting-edge topics in Full Stack, and these modules will be chosen by the
instructor based on the requirements and relevance at that point of time. These modules need to be
relevant to the industry and start-ups will also include related case studies, use cases and
implementations scenarios. Students will be working on lab work and projects to get real hands-on
experience of these topics and modules.
Specialization
Electives:
Cloud
Computing
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET461 Cloud System Administration & Operations L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To get fundamentals of support and maintain cloud workloads as per the cloud architecture.
CO2: To perform operations by using the cloud management console, CLI and SDK.
CO3: To implement architectural requirements with monitoring, logging, and troubleshooting.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 2 3
CO2 3 3 2 3 3 3 2 3
CO3 3 3 3 3 3 3 3 3
Course Contents:
Need of cloud administration and operations, Roles and responsibilities of cloud Admin, Inter-cloud
Resource Management, Resource Deployment and Provisioning, Identifying the steps to provision
cloud resources, Identify, and remediate deployment issues, Storage and Data Management
Connectivity services of public/private cloud Automation and Optimization, Manage and assess
resource utilization, Employ cost optimization strategies, Automate manual or repeatable process,
Minimize management overhead, Monitoring and Reporting, Maintain metrics and alarms utilizing,
Recognize and differentiate performance metrics, Availability metrics, Manage security policies on
cloud, Access controls when using cloud, Shared responsibility model.
Data Centre Management Tools Integration, Service and Resource Management, implement scalability
and elasticity, highly available and resilient environments on cloud, automate snapshots, Data Lifecycle
Manager, Data Retention policy, Restore databases versioning, Lifecycle rules, Disaster recovery
procedures, Cost optimization strategies, Networking and Content Delivery, Performance optimization
strategies.
OS boot process (Win/Linux) and Troubleshooting: Memory management, Memory pages, Buffer and
Caches, System date/time management, Network time protocol, Network Logs Auditing, Managing
Users and groups, File permissions, Assessment/Buffer Lecture, managing software, Managing system
services, Background processes, Windows start-up tasks Integrated Internet-aware network
troubleshooting, Network tools to report the problem, Network address translation, troubleshooting in
common VPC, Troubleshooting in On-premises to VPC, System performance – DISK, System
performance – Memory, System performance – Network System Login issues, System booting issues
System logs, Network connectivity issues
Studio work focuses on seven cloud sub domains that are as; 1. Monitoring and Reporting, 2. High
3. Availability, 4. Deployment and Provisioning, 5. Storage and Data Management 6. Security and
Compliance, 7. Networking and Automation and Optimization.
Text Books :
1. S., Digby, G., Fitch, C., Friedberg, S., Qualheim, S., Rhoads, J and Sundrud, B, AWS Certified
SysOps Administrator Official Study Guide: Associate Exam (1 ed.), John Wiley & Sons, 2017.
ISBN 9781119377429.
2. Chandra Rajasekharaiah, Cloud-Based Microservices: Techniques, Challenges, and Solutions (1
ed.), Apress, 2020. ISBN 9781484265642.
Reference Books :
1. Jackson, K. L., & Goessling, Architecting Cloud Computing Solutions: Build cloud strategies that
align technology and economics while effectively managing risk (1 ed.), Packt Publishing Ltd,
2017. ISBN 9781788472425.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET462 Cloud Security & Compliances L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To learn and examine the security breaches of IaaS, PaaS, and SaaS.
CO2: To apply various data encryption methods and security mechanisms to get the administrative
control using IAM service.
CO3: To create a secure production environment using cloud security features and services.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3
CO2 3 3 2 3 3 3 2 3
CO3 3 3 3 3 3 3 3 3
Course Contents:
Security Patterns for Cloud Computing – Network Security, Identity & Access Management & Trust,
Secure On-Premises Internet Access, Secure External Cloud Connection, Cloud Denial-of- Service
Protection, Cloud Traffic Hijacking Protection, Automatically Defined Perimeter, Cloud
Authentication Gateway, Federated Cloud Authentication, Cloud Key Management, Trust Attestation
Service, Collaborative Monitoring and Logging, Independent Cloud Auditing
End-to-end security, Shared responsibility in the cloud, Backup and restore, Detect and mitigate
threats, Plan for ransomware, recovering from systemic identity compromise, Threat protection,
Securing Workloads, Security technical capabilities, Physical security, Components and
boundaries, Operations and Monitoring, Platform integrity and security, Secure Data Protection
Law: national and International, Firmware security, Code integrity, Secure Boot, Secure Isolation
of Physical & Logical Infrastructure, Compute, Network, Storage, Common attack vectors and
threats, Secure Isolation Strategies, Multitenancy, Virtualization strategies.
Text Books :
1. Chen, Lei, Hassan Takabi, and Nhien-An Le-Khac, Security, privacy, and digital forensics in the
cloud (1 ed.), John Wiley & Sons, 2019. ISBN 13: 9781119053286.
2. Russell, Brian, and Drew Van Duren, Practical Internet of Things Security: Design a security
framework for an Internet connected ecosystem (2 ed.), Packt Publishing Ltd, 2018. ISBN 13:
9781788625821.
Reference Books :
1. Anthony, Mastering AWS Security: Create and maintain a secure cloud ecosystem (1 ed.), Packt
Publishing Ltd, 2017. ISBN 13: 9781788293723.
2. Tevault, Donald A, Mastering Linux Security and Hardening: Secure your Linux server and
protect it from intruders, malware attacks, and other external threats (1 ed.), Packt Publishing
Ltd, 2018. ISBN 1788620305.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET463 AWS Cloud Support Associate L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To identify the possible scope of bug, error, and glitch in system.
CO2: To analyse and solve problems for AWS client/user.
CO3: To get expertise in AWS cloud solutions to solve technology challenges.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3 2
CO2 3 3 3 3 2 3
CO3 3 3 3 3 3 3 3 3
Course Contents:
Setting up AWS accounts, Accessing Methods of AWS Services, AWS Organizations, AWS Cost
Explorer, AWS Technical Support, Cloud Billing and Support, AWS Well-Architected Framework
Well-Architected Design Principles, Choosing a Region, Selecting Availability Zones, Virtual
Private Cloud, Dividing VPCs and Subnets, Default VPCs and Default Subnets, Controlling VPC
Traffic, Connecting Multiple VPCs, Integrating On-premises Components, Load Balancing and
Fault Tolerance, High Availability Across Regions, Connections Outside of Amazon VPC,
Designing for High Availability CLOUD Solution, Scaling Data Stores, AWS Lambda and Event-
Driven Scaling, Manual AWS Environment Configuration, Infrastructure as code on AWS,
Grouping resources in a template, Automating AWS Infrastructure.
Loose Coupling, Loose Coupling Strategies, Communicating Easily and Reliably Among
Components, Communicating with Loose Coupling and Amazon DynamoDB, Amazon API
Gateway, Serverless Architectures, Decoupling Infrastructure, Storing Web-Accessible Content
with Amazon, Caching with Amazon CloudFront, Managing NoSQL Databases, Storing Relational
Data in Amazon RDS, Designing Web-Scale Media, Scalable Web Application, Operational
Excellence Pillar, Security Pillar,
Reliability Pillar, Performance Efficiency Pillar, Cost Optimization, High- Availability Design
Patterns, Stream Processing Example, Sensor Network Data Ingestion and Processing, Application
Backend, Transcoding and Serving Video Files Example, Dedicated Instances and Dedicated Hosts,
Trusted Advisor, Optimizing Costs with Caching, AWS Cost Calculation Tools, Amazon CloudWatch,
Amazon CloudWatch Monitoring, Amazon CloudWatch Events, Amazon CloudWatch Logs, AWS
CloudTrail, AWS Service Integration with Amazon Athena, AWS Config, Elastic Load Balancing,
Amazon EC2 Auto Scaling.
Amazon Route 53, Amazon Route 53 Routing, Configure EC2 Auto Scaling, Configure Failover Routing
with Amazon Route 53, Continuous Integration and Continuous Deployment on AWS, AWS Developer
Tools and Services, Database Cluster on Amazon Aurora, Amazon DynamoDB, AWS Database Migration
Service (AWS DMS), Migrate to Amazon RDS, Tagging, AWS Trusted Advisor, Managing Resources,
Optimize AWS Resource Utilization, Features of AWS Support plans, creating support cases and case
management, Monitoring, resolving, and reopening the ticket/case, Access permissions for AWS Support,
changing your AWS Support plan, Using AWS Support with an AWS SDK.
By performing lab work on AWS cloud platform, students will have the knowledge of the Design
principles and best practices of the Reliability pillar, select compute, storage, database, and networking
resources to improve performance, evaluate the most important performance metrics for your
applications, follow best practices to eliminate unneeded costs or suboptimal resources, troubleshoot
common errors.
Text Books :
1. Piper, Ben, and David Clinton, AWS Certified Solutions Architect Study Guide: Associate
SAA-C02 Exam (1 ed.), John Wiley & Sons, 2020. ISBN 978-1119138556.
Reference Books :
1. S Wadia and Yohan, AWS Administration–The Definitive Guide (2 ed.), Packt Publishing Ltd, 2016.
ISBN 9781782173755
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET464 Developing Solutions for Microsoft Azure L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3
CO2 3 3 3 3 3 3 2 3
CO3 3 3 3 3 3 3 3 3
Course Contents:
Setting up Azure accounts, Azure Console Walkthrough, Microsoft Azure Services, Azure CLI, Azure
PowerShell, Configuring Azure CLI, Azure Resources & Subscriptions, Azure Resource Manager,
Azure Tags, Azure Storage Account & its types, Azure Blob Storage Azure Content Delivery Network
(CDN), Azure Files Storage, Azure File Sync, Azure Table Storage, Azure Queue Storage, Azure
Storage Explorer, Azure Shared Access Signature (SAS), Azure Databox, Azure Storage Replication
Data replication options, Azure Import/Export Service, Azure virtual machines, Data disks in Azure
Azure VMs and interfaces, ARM templates, VHD templates, Custom images of Azure VM, Virtual
machine scale sets, Virtual machine availability sets, App Service Web App for containers, App Service
plan, Networking for an App Service, Deployment slots, Container image.
Azure Kubernetes Service, Azure Container Registry, Azure virtual networks, Azure
VNetComponents, Azure VNet subnets, Azure Network Interface Cards (NIC), Network Security
Groups (NSGs), Route tables, Service tags, Azure DNS, Private DNS, Application Gateway, Azure
Front door Service, Azure Traffic Manager, Application Security Groups, Azure Load Balancer, Azure,
ExpressRoute, ExpressRoute Circuits, ExpressRoute Peering, Azure Firewall, Azure Bastion, Network
Watcher, Identity and Access Management in Azure, Role-based Access Control (RBAC), Role
definitions, Role assignment in Azure resources, Azure users and groups, RBAC policies.
Microsoft azure active directory, Azure Monitoring and Autoscaling, Azure Data Platform, Azure
Migration, Server-side programming model, Triggers, User-defined functions (UDFs), Table API,
Cosmos DB graph database, populating a graph, Writing Gremlin queries, Azure Table Storage,
integrate caching and content delivery, Configure cache and expiration policies for Azure Redis Cache
Connections, App Configuration Azure Key Vault, Key Encryption, expiration.
Studio work covers accessing Azure cloud services with handling data migration based on provided
architectural requirements using Azure migrate service. Learners would be able to create and migrate
Azure virtual machines and create storage accounts and application gateways for aiding Azure Migrate.
They will also develop the applications using Azure services by using cloud architecture.
Text Books :
1. Orban and Stephen, Ahead in the Cloud: Best Practices for navigating the Future of Enterprise IT (1
ed.), CreateSpace Independent Publishing Platform, 2018. ISBN 9781981924318.
2. Modi, Ritesh, Azure for Architects: Implementing cloud design, DevOps, containers, IoT, and
serverless solutions on your public cloud (2 ed.), Packt Publishing Ltd,, 2019. ISBN 9781788398732.
Reference Books :
1 Benjamin Perkins and William Panek, Microsoft Azure Architect Technologies, and Design Complete
Study Guide: Exams AZ-303 and AZ-304 (1 ed.), Wiley Publication, 2020. ISBN 9781119559573.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET465 Google Associate Cloud Engineer L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 2 2 2 1 3
CO2 3 3 1 2 1 3
CO3 2 2 3 2 3 3 1 1
Course Contents:
Setting up cloud projects and accounts, creating projects in GCP, Viewing Google Cloud Platform Status
Cloud Console, Cloud Shell, Cloud SDK, Configuring access and security, Assigning users to predefined
IAM roles within a project, Managing users, groups, and roles in Cloud Identity, Enabling APIs within
projects, Provisioning one or more Stackdriver workspaces, Managing billing configuration, Creating one
or more billing accounts, Linking projects to a billing account, Establishing billing budgets and alerts,
Setting up billing exports to estimate daily/monthly charges, Billing Services, Configuring the command
line interface (CLI), Accessing services using CLI, Working with GCP SDK, Integration of GCP Platform
with other Cloud Services.
Planning and estimating GCP product use, Pricing Calculator, Planning and configuring compute resources,
Selecting appropriate compute choices for workload, Compute Engine (20) Google Kubernetes Engine,
App Engine, Power Shell, Cloud Functions, Deploying and implementing Compute Engine resources,
deploying a Google Kubernetes Engine cluster, Planning and configuring network resource, Load balancing
options, Identifying resource locations in a network for availability, Configuring Cloud DNS, Deploying a
container application to Google Kubernetes Engine, Auto Scaling in Google Kubernetes, Handling Fault
Tolerance in Google Kubernetes.
Deploying and implementing data solutions, Cloud SQL, Cloud Datastore, BigQuery, Cloud Spanner,
Cloud Pub/Sub, Cloud Bigtable, Cloud Dataproc, Cloud Dataflow, Cloud Storage, Loading data, Deploying
and implementing networking resource, Monitoring and logging, Creating Stackdriver alerts based on
resource metrics, Creating Stackdriver custom metrics, configuring log sinks to export logs to external
systems, Viewing and filtering logs in Stackdriver, Viewing specific log message details in Stackdriver,
Cloud diagnostics, Cloud Trace data, Cloud Debug to view an application point, Case Study.
Studio work focuses on the Google Cloud platform of deploying, monitoring, and maintaining
projects on Google Cloud.
Text Books :
1. Legorie Rajan, Steven Porter, and Ted Hunter, Building Google Cloud Platform Solutions (1 ed.),
Packt Publishing, 2019. ISBN 97818386474382.
Reference Books :
1. Legorie Rajan, Steven Porter, and Ted Hunter, Building Google Cloud Platform Solutions (1 ed.),
Packt Publishing, 2019. ISBN 97818386474382.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET466 Special Topics in Cloud Computing L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies or algorithms in Cloud Computing.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 2 3 1 2 2
CO2 3 3 3 3 3 3
Course Contents:
Students will gain practical experience by using tools and technologies related to Cloud Computing.
Text Books :
1. Judith S. Hurwitz and Daniel Kirsch., Cloud Computing for Dummies. Hoboken (1 ed.), John Wiley &
Son, 2020. ISBN 978-1119546658.
2. Chandra Rajasekharaiah, Cloud-Based Microservices: Techniques, Challenges, and Solutions (1 ed.),
Apress, 2020. ISBN 978-1484265642
.
Specialization
Electives:
Drones
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET467 Drone Communication L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To understand components, attributes, and challenges associated with the developing field of aerial
communications.
CO2: To configure aerial vehicles using MAVLink and UAVCAN.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 1 1 2 1
CO2 2 2 3 2 1 2 2 3 3
UAV Miniaturization: Challenges and Opportunities; Unique Network Characteristics; Aerial Mobility
Models; Aerial Communication: Radar Identification, Beyond Radar Measurements, Aerial Voice
Communication; Single Antenna Systems; Multi-Antenna Systems; Communication Design Requirements:
Vehicular Environment, 3D Tracking, Spontaneous Mobility, Timing Constraints, Device Autonomy,
Mission Autonomy.
Data Link Functions; Data Link Attributes; Data Link Margin; AJ Margin; Propagation; Data Rate; Data
Link Trade Off; Aerial Channel Modelling: Free Space Path Loss, Ray Tracing, Long Distance Path Loss,
Shadowing, Line of Sight Probability, Atmospheric Interventions; MAVLink Protocol; MAVLink Message
Types; MAVLink; Message Format; MAVLink Heartbeat; MAVLink Commands; MAVLink Security
Requirements; MAVLink Security Threats.
UAV for Coverage; UAV for Data Collection; UAV Assisted Wireless/Cellular Networks; Cooperative
Communication; UAV Assisted Ground Networks; Disruption-Tolerant Airborne Networks; UAV
Security; UAV Safety; Drone Communication: Smart Cities; Under Water; UAS Safety Deployments;
Security in Smart Cities; Internet of Drones.
Module IV 4 lecture hours
Mobile Technology Enabled Drones; LTE; Integrating UAS into the NAS: Civil Aviation, Legislation;
3GPP Standardization on UAV.
In lab works, students will configure and deploy UAVs using MAVLink and UAVCAN protocols.
Text Books:
1. Saad, Walid, Mehdi Bennis, Mohammad Mozaffari, and Xingqin Lin. Wireless communications and
networking for unmanned aerial vehicles. Cambridge University Press, 2020.
2. Fahlstrom, Paul G., Thomas J. Gleason, and Mohammad H. Sadraey. Introduction to UAV systems.
John Wiley & Sons, 2022.
Reference Books:
1. Namuduri, Kamesh, Serge Chaumette, Jae H. Kim, and James PG Sterbenz, eds. UAV networks and
communications. Cambridge University Press, 2017.
Name of Program Bachelor of Technology
CSET468 Drone Application, Components andAssembly L T P C
Owning School/Department Computer Science Engineering 2 0 2 3
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 1 2 3 2 2 2 2 3 2 2 2 2 2
CO2 3 3 2 1 2 3 3 3 2 2 2
Course Contents:
Technological Advancements; Unmanned Aerial Vehicles; Unmanned Aerial Systems; UAV Concept of
Operations (CONOPs); UAV Chemical, Biological, Radiological and Nuclear (CBRN); UAV
Classification: Wing Geometry Based, Payload Based, Size Based, Mission-Based, UAV Anatomy, Mission
Planning.
Wing Configuration and Thrust; Airframe Configuration; Aerodynamic Configuration; Vibration and
Noise; UAV Propulsion; Propeller Modelling; Motor Modelling; UAV Communication; Radio Wave
Communication; Microwave Communication; Line of Sight Communication; Beyond Line-of-Sight
Communication; Waypoint Tracking Navigation.
Sensor Calibration; Tracking using GPS; UAV Stability; UAV Controllability; Flight Control; Autonomous
Control; Semi-Autonomous Control.
Drone Sensing and Imagery: Riverine, Aquatic, Agriculture, Vegetation and Forest Ecosystem, Oil and Gas,
Surveillance, Search and Rescue; UAS Ground Control; Human Machine Interface; Computer Telemetry;
UAV Launch System; UAV Recovery System.
Text Books :
1. Quan, Quan. Introduction to multicopter design and control. 1st ed. Singapore: Springer, 2017.
Reference Books :
1. Barnhart, R. Kurt, Douglas M. Marshall, and Eric Shappee, eds. Introduction to unmanned aircraft
systems. 2nd ed. Crc Press, 2021.
2. Quan, Quan, Xunhua Dai, and Shuai Wang. Multicopter design and control practice: a series
experiments based on MATLAB and Pixhawk. 1st ed. Springer Nature, 2020.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET469 UAV Simulation L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To understand modeling platforms and 3D simulations of real-time UAS mission objectives.
CO2: To model UAV missions using emulators and gaming engines
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 1 1 2 1
CO2 2 2 3 2 1 2 2 3 3
Course Contents:
Experimental Process; Software Platform Configuration; Hardware Configuration; Simulink Based Control
Design; UAV Scenarios; UAV Bindings; UAV Platform; Fixed Wing; Quadcopter; Attitude;
Representation; Coordinate Frame; UAV Waypoints; External Attitude Control in Copter; External
Attitude Control in Fixed Wing UAVs.
Sensor Calibration; Sensor Data Aggregation; State Estimation and Filter Design; Complementary Filter;
Kalman Filter; Extended Kalman Filter; Trajectory Generation; Axis Angels; Euler Angels; Quaternions;
Rotation Matrices; Point Clouds.
Waypoint Following; Waypoint Trajectories; Tuning Waypoints; UAV Path Management; UAV Obstacle
Avoidance; Moving Obstacle Avoidance; High Fidelity UAV Guidance Model; Transition from Low to
High Fidelity Models.
Motion Planning using RTT; Motion Planning using Light Detection and Ranging; MAVLink; MAVLink
Parameter Protocol; MAVLink Data Exchange; Flight Log Analysis.
Studio Work / Laboratory Experiments:
In the studio work, students will learn to model Pixhawk and ArduPilot systems using MATLAB and
Unreal engines
Text Books:
1. Quan, Quan, Xunhua Dai, and Shuai Wang. Multicopter design and control practice: a series
experiments based on MATLAB and Pixhawk. Springer Nature, 2020.
Reference Books:
1. Yasmina Bestaoui Sebbane, Multi-UAV Planning and Task Allocation (1 ed.), CRC Press, 2020. ISBN
9781000049981
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET470 Drone Swarming L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To understand, model, implement and configure naturally occurring swarming behaviors to the
hardwired aerial robots.
CO2: To Construct a fleet of autonomous aerial vehicles that work together to achieve a common goal.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 1 1 1 2 1
CO2 2 2 3 2 1 2 2 3 3
Course Contents:
Modelling Swarm Systems; Decision Making; Collective Decision Making; Collective Motion as Decision
Making; Collective Decision-Making Models; UAV Networking Architecture; UAV Communication
Topology; UAV Networking Scenarios; Object Detection and Tracking using Deep Learning; Obstacle
Avoidance using Deep Learning; Autonomous Landing using Deep Reinforcement Learning; Autonomous
Landing using Fast Reinforcement Learning; UAV Formation Architecture; UAV Formation Control
Models; Consensus-Based Formation Control Models.
UAV Routing Topologies; Computation Applications; Directional Airborne Networks; Low Probability
Detection; Security Threats; Security Requirements; Jamming Characteristics; Security Protocols; Resilient
UAV Networks.
In project work, students are required to develop a UAV mission that replicates biologically occurring
swarms to achieve predefined objectives using custom programmed flight controllers.
Text Books:
1. Bouffanais, Roland. Design and control of swarm dynamics. Vol. 1. Singapore: Springer, 2016.
Reference Books:
1. Hu, Fei, DongXiu Ou, and Xin-lin Huang, eds. UAV swarm networks: models, protocols, and systems.
CRC Press, 2020.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET471 UAV Mission Planning and Deployments L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To understand various parameters and environmental considerations for efficient deployment of
Unmanned Aerial Systems.
CO2: To perform site survey and operational characteristic analysis and develop mission deployment
accordingly.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 3 2
CO2 3 3 3 3 2 3 3
Course Contents:
Mission Planning and Control Station; Physical Configuration; Planning; Navigation; Target Location; Air
Vehicle; Payload Control; Remote Pilot; Assisted Auto Pilot; Complete Autopilot; Payload;
Reconnaissance/Surveillance Payloads; Target Detection; Recognition; Identification; Searching Stable
Line of Sight.
Weapon Payloads; Capacity; Structure; Interference; Radar; Chemical, Nuclear and Meteorological
Sensors; Fixed Wing UAV Launch Systems; Vertical Take-off and Landing; Conventional Landing;
Vertical Net Systems; Parachute Recovery; VTOL UAVs; Mid Air Retrieval; UAV Launch Method Trade-
offs; UAV Recovery Trade-offs.
Aerial Photography; Photogrammetry; Radiometric Errors and Effects; Radiometric Correction; Geometric
Errors and Effects; Georeferencing and Geometric Correction; Georeferenced Point Clouds; Digital
Elevation Models; Image Enhancement; Image Classification; UAS Imagery Mission Planning; Product
Specification; Accuracy Requirements; Operational Site Restrictions.’
Module IV 5 lecture hours
Digital Sensors; Geometry of Vertical Imagery; Aerial Imagery Collection; Flight Plan and Layout Design;
Aerial Cinematography; Camera Angle; Navigation; Narration; Platform Accessories; Cinematography
Technique.
In project work, students will be developing independent surveillance missions based on underlying
geography and geometry.
Text Books:
1. Barnhart, R. Kurt, Douglas M. Marshall, and Eric Shappee, eds. Introduction to unmanned aircraft
systems. Crc Press, 2021.
Reference Books:
1. Fahlstrom, Paul G., and Thomas J. Gleason. Introduction to UAV systems. UAV Systems, Incorporated,
1993.
2. Sebbane, Yasmina Bestaoui. Multi-UAV Planning and Task Allocation. CRC Press, 2020.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET472 Auto Pilot and Flight L T P C
Control
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Prerequisites/Exposure -
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 3 2
CO2 3 3 3 3 3 2 3 3 3
Course Contents:
Auto Pilot; Flight Control: Linear Flight Control, Non-Linear Flight Control, Adaptive Flight Control;
Open-Pilot; Pixhawk; Paparazzi; ArduPilot; DroneKit-Python.
MAVLink: Message Format, High-Level Message Flow; Auto-Pilot Data Channelling; MAVLink Routing;
CAN Bus; UAVCAN Protocol; ROS: Robot Operating System; MAVROS; MAVProxy.
Mission Planner Firmware; Waypoints and Events; Camera Control; Mission Planning Setup; Mission
Planning Calibration; Flight Setup; Autonomous Missions; Vehicle Calibration; Vehicle Attitude; Vehicle
Positioning.
Terrain Recognition; Mapping; Surveillance; Video and Image Tracking; Failsafe; Vehicle Health.
Studio Work / Laboratory Experiments:
In-studio work, students will start with ArduPilot and Pixhawk flight controllers, components, and learn
to create autonomous UAV missions using programming MAVLink and UAVCAN protocols.
Text Books:
1. Mendoza-Mendoza, Julio Alberto, Victor Javier Gonzalez-Villela, Gabriel Sepulveda-Cervantes,
Mauricio Mendez-Martinez, and Humberto Sossa-Azuela. Advanced Robotic Vehicles Programming:
An Ardupilot and Pixhawk Approach. Apress, 2020.
Reference Books:
1. Ty Audronis, , Designing Purpose-Built Drones for Ardupilot Pixhawk 2.1: Build drones with Ardupilot
(1 ed.), Packt, 2017. ISBN 1786469162.
2. Audronis, Ty. Designing Purpose-built Drones for Ardupilot Pixhawk 2.1: Build Drones with
Ardupilot. Packt Publishing Ltd, 2017.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET473 Special Topics in Drone Technology L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies or algorithms in Drone Technology.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 2 3
CO2 3 3 2 3 3 2 3 3 3
Course Contents:
This course covers the cutting-edge topics in Drone Technology, and these modules will be chosen by the
instructor based on the requirements and relevance at that point of time. These modules need to be relevant
to the industry and start-ups will also include related case studies, use cases and implementations scenarios.
Students will be working on lab work and projects to get real hands-on experience of these topics and
modules.
Students will gain practical experience by using tools and technologies related to Drone Technology.
Specialization
Electives:
Quantum
Computing
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET474 Quantum Computing for Data Analysis L T P C
CO1: To articulate Quantum Statistical knowledge helps an individual use the proper methods to collect
the data and analyze it.
CO2: To employ the correct analyses, and effectively present the results.
CO3: To develop analytical ability and critical thinking in the selection of statistics and their use in making
interpretation meaningful and productive.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 2 3
CO2 3 3 2 3 3 3 3 3
CO3 3 3 3 3 3 2 2 3 3 3 3
Course Content:
Statistics, Density Operators, Pure and Mixed States, Quantum Probability Theory, Kolmogorovian Theory,
Quantum Measurement Problem, Intuitionistic Logic, Heyting Algebra, Quantum Filtering, Paradoxes
Quantum Stochastic Process, Double Negation, Quantum Stochastic Calculus, Hamiltonian Calculus,
Quantum Ito's Fo Quantum rmula, Quantum Stochastic Differential Equations (QSDE), Quantum
Stochastic Integration, Itō Integral Quasiprobability Distributions, Quantum Wiener Processes, Quantum
Statistical Ensemble, Quantum Density Operator or Density Matrix, Gibbs Canonical Ensemble, Quantum
Mean, Quantum Variance, Envariance Polynomial Optimization, Quadratic Unconstrained Binary
Optimization.
Quantum Gradient Descent, Quantum Based Newton's Method for Constrained Optimization, Quantum
Based Newton's Method for Unconstrained Optimization, Quantum Ensemble, Quantum Topology,
Quantum Topological Data Analysis, Quantum Bayesian Hypothesis, Quantum Statistical Decision
Theory, Quantum Minimax Theorem, Quantum Hunt-Stein Theorem, Quantum Locally Asymptotic
Normality, Quantum Ising Model, Quantum Metropolis Sampling, Quantum Monte Carlo Approximation,
Quantum Bootstrapping, Quantum Bootstrap Aggregation.
Module III 7 lecture hours
Quantum Decision Tree Classifier, Quantum Outlier Detection, Cholesky-Decomposition for Quantum
Chemistry Quantum Statistical Inference, Asymptotic Quantum Statistical Inference, Quantum Gaussian
Mixture Modal Quantum t-design, Quantum Central Limit Theorem, Quantum Hypothesis Testing,
Quantum Chi-squared and Goodness of Fit Testing, Quantum Estimation Theory, Quantum Way of Linear
Regression, Asymptotic Properties of Quantum, Outlier Detection in Quantum Concepts.
.
Reference Books:
1. Luger, G. F., and W. A. Stubblefield. "Introduction to AI and Expert systems." (1989). ISBN 978-
9332551947.
2. Bishop, Christopher. "Pattern recognition and machine learning." Springer google schola 2 (2006): 5-
43. ISBN 978-0387310732.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET475 Quantum Information Theory L T P C
CO1: To articulate the concepts of bit and entropy and Shannon’s theory to the quantum.
CO2: To articulate the concepts of bit and entropy and Shannon’s theory to the quantum.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 2 2 3 2
CO2 3 3 3 2 2 2 3 2
Course Content:
Classical information theory. Classical Shannon Theory: Data Compression, Channel Capacity. Classical
Information and Entropy: Entropy of a Random Variable, Conditional Entropy, Joint Entropy, Mutual
Information, Relative Entropy, Conditional Mutual Information, Entropy Inequalities, Near Saturation of
Entropy Inequalities, Classical Information from Quantum Systems. Concepts in Quantum Shannon
Theory: Overview of the Quantum Theory, The Emergence of Quantum Shannon Theory.
Quantum Information and Entropy: Quantum Entropy, Joint Quantum Entropy, Potential yet Unsatisfactory
Definitions of Conditional Quantum Entropy, Conditional Quantum Entropy, Coherent Information,
Quantum Mutual Information, Conditional Quantum Mutual Information, Quantum Relative Entropy,
Quantum Entropy Inequalities, Continuity of Quantum Entropy.
Reference Books:
1. Vedral, Vlatko. Introduction to quantum information science. Oxford University Press, USA, 2006.
ISBN 9780191526985, 0191526983.
2. Bruss, Dagmar, and Gerd Leuchs, eds. Quantum Information, 2 Volume Set: From Foundations to
Quantum Technology Applications. John Wiley & Sons, 2019. ISBN 9783527805792, 3527805796.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET476 Quantum Computer Architecture L T P C
CO1: To get how to construct and operate the physical systems behind quantum computers.
CO2: To examine problems of different computational complexity and explain why certain problems are
rendered tractable by quantum computation concerning the relevant concepts in quantum theory.
CO3: To develop new applications of quantum technologies to potential real-world problems.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 3
CO2 3 3 2 3 3 2 2 2 3 2 3
CO3 3 3 3 3 3 2 2 2 3 3 3
Course Content:
Basic quantum mechanics, Qubits: superconducting Transmon qubits, Silicon spin qubits, diamond NV
center qubits, and topological qubits. The Quantum Circuit Model, Quantum Gates, Qubit Gates,
Controlled-U Gates, Universal Sets of Quantum Gates
Quantum Factoring and Finding Hidden Structures, Hamiltonian Simulation Algorithms, Quantum
Algorithms for Linear Algebra, Quantum Error Mitigation Strategies, Variational Quantum Algorithms,
Analog Quantum Algorithms.
Quantum Computing as a Service (QCaaS), QCaaS, speed, and trust, Quantum Error Correction: Shor code,
Theory of Quantum Error –Correction, Constructing Quantum Codes, Stabilizer codes, Basic properties of
Entropy, Von Neumann
Studio Work / Laboratory Experiments:
Lab work consists of designing the quantum circuit, Quantum Circuit Model, Qubit Gates, Quantum Error
Mitigation, QCaaS, speed, and trust, Quantum Error Correction, Constructing Quantum Codes and
Stabilizer codes.
Text Books:
1. Metodi, Tzvetan, and Arvin I. Faruque. Quantum computing for computer architects. Springer Nature,
2022. ISBN 9781608456215, 1608456218.
Reference Books:
1. National Academies of Sciences, Engineering, and Medicine. "Quantum computing: progress and
prospects." (2019). ISBN 9780309479721, 030947972X.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET477 Quantum Cryptography L T P C
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 2 2 3 3 3
CO2 3 3 2 3 3 2 3 2 3 3 3
Course Contents:
About Quantum Computing, Quantum money and attacks on it, Density matrices and CPTP maps, Quantum
encryption, Notions of security, No-Cloning Theorem, Wiesner’s scheme for quantum money, SWAP
Operator, Quantum Cryptography Protocols, The quantum one-time pad, Measuring randomness, Nonlocal
games and Guessing games, Distributing keys, Distribution over a noisy channel, Quantum key distribution
protocols, BB84 protocol: Assumptions, the protocol, BB84: relaxing assumptions, BB84: summary and
length of the final key, Warmup: Security against a classical eavesdropper, Security of BB’84 using
guessing games, The issue with the distance: error correction and privacy amplification.
Eavesdropping strategy, E91 Protocol: purifying protocols using entanglement, Quantum cryptography
beyond keydistribution, Quantum cryptography using the untrusted device, Security of device-independent
quantum key distribution against collective attacks, Two-party cryptography: bit commitment and oblivious
transfer, Impossibility of bit commitment, The BBM92 protocol, The Ekert91 protocol, Quantum relays
and repeaters, Device-Independent Quantum Key Distribution, Classical fingerprinting, Application of
such fingerprints, Cryptographic hash function, Quantum fingerprinting, Error correction codes,
Fingerprinting protocols.
Studio work includes Wiesner’s quantum money implementation of attacks on it, Implementation of the
quantum one-time pad and its use in cryptography, Implementation of BB84 Quantum Key Distribution,
Implementation and analyzing the security of BB’84 using guessing games, Quantum Error Correction:
Phase flip code, Quantum Error Correction: Bit flip code, BB92 protocol implementation, Ekert91
protocol implementation, Implementation of Quantum-Safe Signatures, Quantum fingerprinting
implementation.
Text Books:
1. Grasselli, Federico, and Federico Grasselli. "Quantum Conference Key Agreement." In Quantum
Cryptography: From Key Distribution to Conference Key Agreement, pp. 55-70. Springer International
Publishing, 2021. ISBN 978-3-030-64360-7.
2. Van Assche, Gilles. Quantum cryptography and secret-key distillation. Cambridge University Press,
2006. ISBN 9780511617744.
3. Chaubey, Nirbhay Kumar, and Bhavesh B. Prajapati, eds. Quantum Cryptography and the Future of
Cyber Security. IGI Global, 2020. ISBN 9781799822559.
Reference Books:
1. Kollmitzer, Christian, and Mario Pivk, eds. Applied quantum cryptography. Vol. 797. Springer, 2010.
ISBN 978-3-642-04831-9.
2. Kumar, Neeraj, Alka Agrawal, Brijesh K. Chaurasia, and Raees Ahmad Khan, eds. Limitations and
future applications of quantum cryptography. IGI Global, 2020. ISBN9781799866793.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET478 Special Topics in Quantum Computing L T P C
CO1: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies or algorithms in Quantum Computing.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 3 1
CO2 3 3 3 3 2 2 3 2 3
Course Content:
This course covers the cutting-edge topics in Quantum Computing, and these modules will be chosen by
the instructor based on the requirements and relevance at that point of time. These modules need to be
relevant to the industry and start-ups will also include related case studies, use cases and implementations
scenarios. Students will be working on lab work and projects to get real hands-on experience of these topics
and modules.
Students will gain practical experience by using tools and technologies related to Quantum Computing.
Specialization
Electives:
IoT and
Robotics
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET479 Robotics: Dynamics and Controls L T P C
CO1: To explain algorithmic approaches, mathematical models, and motion control methods applicable to
robotic manipulators.
CO2: To examine computational systems concerning manipulators.
CO3: To implement motion control techniques to the robotic manipulators.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 2 3
CO2 3 3 3 3 2 3 3 3
CO3 3 3 3 3 3 2 2 3 3 3
Jacobian matrix for manipulator, Euler’s angles, Manipulator Statics, Workspace singularities, Manipulator
dynamics, Lagrange-Euler method for manipulator Dynamics, Newton-Euler method for Manipulator
Dynamics, Manipulator motion in state-space.
Trajectory generation using smooth functions, Trajectory generation schemes for serial manipulators,
Robot motion control, Kinematic control.
This course will cover robot dynamics, trajectory generation, motion planning, and nonlinear control, and
develop real-time planning and control software modules for robotic systems. This course will give you the
basic theoretical tools and enable you to design control algorithms. Using MATLAB, you will apply what
you have learned through a series of projects involving real-world robotic systems.
Text Books:
1. Craig, John J. Introduction to robotics. Pearson Educacion, 2006. ISBN 0133489795.
2. Corke, Peter. Robotics and control: fundamental algorithms in MATLAB®. Vol. 141. springer Nature,
2021. ISBN 3030791785.
Reference Books:
1. Mittal, R. K., and I. J. Nagrath. Robotics and control. Tata McGraw-Hill, 2003. ISBN 9780070482937.
2. Kurdila, Andrew J., and Pinhas Ben-Tzvi. "Dynamics and control of robotic systems." (2019). ISBN
9781119524830.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET480 IOT Analytics L T P C
CO1: To articulate visualization, processing, and storage of device data in a time-series data store.
CO2: To examine collect, process, and analyze data from IoT Cloud.
CO3: To make use of IoT devices that are integrated with IoT Analytics services.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3 3
CO2 3 3 3 3 2 2 2 3 3 3
CO3 3 3 3 3 3 2 2 2 3 3 3
Course Content:
Need of IoT analytics, IoT analytics challenges, Business value concerns, IoT Analytics for the Cloud,
Building elastic analytics, PUBLIC CLOUD overview, PUBLIC CLOUD key concepts, PUBLIC CLOUD
key core services, PUBLIC CLOUD key services for IoT analytics, Creating an PUBLIC CLOUD Cloud,
Analytics Environment, Collecting Data from PUBLIC CLOUD Cloud, Data processing for analytics,
Applying big data technology to storage: Hadoop, HBase, Amazon DynamoDB, Amazon S3, Apache Spark
for data processing.
Adding External and Internal datasets, IoT Dashboards, Sensor data visualizing, Feature engineering with
IoT data, Dealing with missing values, centering, and scaling, Machine learning (ML) Model
Representation, Evaluation, Optimization, Time series data handling, Validation methods, Cross-
validation, Test set, Precision, Recall, Specificity.
Bias–Variance trade off, Random Forest models, Gradient Boosting Machines (GBM), Anomaly detection,
Forecasting using ARIMA, Deep Learning Analysis with PUBLIC CLOUD, Strategies to Organize Data
for Analytics, Linked Analytical Datasets, linking together datasets, Managing data lakes, Data retention
strategy, The Economics of IoT Analytics, Cost considerations for IoT analytics, Geospatial Analytics to
IoT data.
.
Text Books:
1. Minteer, Andrew. Analytics for the internet of things (iot). Packt Publishing Ltd, 2017. ISBN 978-
1787120730.
Reference Books:
1. Geng, Hwaiyu, ed. Internet of things and data analytics handbook. John Wiley & Sons, 2017. ISBN
78-1119173649.
This course will cover robot dynamics, trajectory generation, motion planning, and nonlinear control, and
develop real-time planning and control software modules for robotic systems. This course will give you
the basic theoretical tools and enable you to design control algorithms. Using MATLAB, you will apply
what you have learned through a series of projects involving real-world robotic systems.
Name of Program Bachelor of Technology
CSET420 IoT: Security and Attacks L T P C
Owning School/Department Computer Science Engineering 2 0 2 3
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 1 2 3 2 2 2 2 3 2 2 2 2 2
CO2 3 2 1 2 3 3 1 1 3 3 3 3
CO3 3 1 2 1 2 3 2 2 3 2 2 2 2
Course Contents:
Architecture of IoTs, IoT Security Requirements Privacy preservation, Device security, Authentication,
Confidentiality, Integrity of IoT devices, Benefits of IoT,IoT Attack Surface, Industrial Standards of IoT
device security, Gateway security, IoT Privacy Concerns, Privacy by Design, Conducting a Privacy Impact
Assessment, Case Study: The Connected Barbie.
Securing internet of things environments, Networking Function Security, IoT Networking Protocols,
Layering Architecture, Secure IoT Lower Layers, SecureIoT Higher Layers, Secure Communication Links
in IoTs, Back-end Security, Secure Resource Management, Secure IoT Databases, IoT Hardware Test, Test
Device Range, Latency and Capacity.
This course lab will articulate possible attacks on IoT devices and networks. In this course lab students will
experiment to prevent attacks on IoT devices. Multiple tools such as Contiki, Wireshark will be be used for
doing all the experiments.
Text Books :
1. Liyanage, Madhusanka, An Braeken, Pardeep Kumar, and Mika Ylianttila, eds. IoT security:
st
Advances in authentication. 1 ed. Wiley Telecom, 2020.
Reference Books :
1. Chantzis, Fotios, Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, and Beau Woods.
Practical IoT hacking: the definitive guide to attacking the internet of things. 1st ed. No Starch Press,
2021.
Name of Program Bachelor of Technology
CSET361 Device Level IoT Security L T P C
Owning School/Department Computer Science Engineering 2 0 2 3
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 2 2 2 3 3 3 2
CO2 2 3 2 2 2 3 2 2 2
CO3 2 2 3 2 3 3 2 3 3
Course Contents:
Brief review of the Internet of Things IoT, IoT in business world, Benefits Applications of IoT,
Security Issues with IoT, Basic Architecture of IoT, IoT Attack Surface, OWASP Top 10 for IoT. Concept
of Vulnerability management, Quarantine and Prevention.
Security Requirements in IoT Architecture - Security in Enabling Technologies - Security Concerns in IoT
Applications. Security Architecture in the Internet of Things- Security Requirements in IoT - Insufficient
Authentication/Authorization - Insecure Access Control - Threats to Access Control, Privacy, and
Availability - Attacks Specific to IoT. Vulnerabilities - Secrecy and Secret-Key Capacity-
Authentication/Authorization for Smart Devices - Transport Encryption - Attack Fault trees.
Cryptographic primitives and its role in IoT, Encryption and Decryption, Hashes, Digital Signatures,
Random number generation, Cipher suites, key management fundamentals cryptographic controls built into
IoT messaging and communication protocols, IoT Node Authentication, Identity lifecycle, authentication
credentials, IoT IAM infrastructure, Authorization with Publish / Subscribe schemes, access control.
Concerns in data dissemination , Lightweight and robust schemes for Privacy protection, Trust and Trust
models for IoT, self-organizing Things, Preventing unauthorized access, Cloud security for IoT, Cloud
services and IoT, offerings related to IoT from cloud service providers, Cloud IoT security controls.
Studio Work / Laboratory Experiments:
Consists of using network monitoring tools, implementing different types of attacks and some protection
schemes of various IoT devices.
Text Books :
1. Saravanan, Vijayalakshmi, Alagan Anpalagan, T. Poongodi, and Firoz Khan, eds. Securing IoT and
big data: next generation intelligence. 1st ed. CRC Press, 2020. ISBN 0367432889.
Reference Books :
1. Bhattacharjee, Sravani. Practical Industrial Internet of Things security: A practitioner's guide to
securing connected industries. 1st ed. Packt Publications, 2018. ISBN 978-17888 2687.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET421 Humanoids L T P C
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3
CO2 3 3 3 3 2 2 3 3
CO3 3 3 3 3 3 2 2 3 3 3
Course Content:
Humanoid, Bipedal Humanoid, Kinematics, Dynamics, Stability criteria of Bipedal robot, Zero moment
point, Limit Cycle, Poincare Map, 3D Gait generation, Inverted pendulum model of Humanoid, Arm
Movement with stability, Dynamics of Arm movement, Walking robot pattern generation, Central pattern
generation, Torque control mechanism, Impact recovery, Push Recovery.
Touch sensor, sound sensor, Vision sensor, Tactile Sensing, Robot Localization, Monte Carlo localization,
Landmark based localization, Detect Landmark, Update landmark, Kalman filter Localization, Tracking:
Known initial position, Global Localization: Unknown initial position, Re-Localization: Incorrect known
position, Obstacle avoidance, Potential Field, Simultaneous Localization and Mapping (SLAM), Path
Planning, Graph Construction.
Studio works is to make use of Choreograph Simulator for Nao Robot. In this course students will
implement Stability Criteria during the waking using choreograph data of Nao walking, Joint Angle (hip,
Knee, Ankle) generation for walking pattern. It will help students to experiment for Navigation of
Humanoid robot using vision, Object recognition and grasping, Gesture based interaction with Nao.
Text Books:
1. Goswami, Ambarish, and Prahlad Vadakkepat. Humanoid robotics: a reference. Springer Publishing
Company, Incorporated, 2018. ISBN 9400760450.
2. Nenchev, Dragomir N., Atsushi Konno, and Teppei Tsujita. Humanoid robots: Modeling and control.
Butterworth-Heinemann, 2018. ISBN 978-0128045602.
Reference Books:
1. González Aguirre, David Israel. "Visual perception for humanoid robots: environmental recognition
and localization, from sensor signals to reliable 6D poses." (No Title). ISBN 331997839.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET422 Mobile IoT Networks L T P C
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 3
CO2 3 3 3 3 2 3 3
CO3 3 3 3 3 3 2 2 2 3 3 3
Course Content:
Internet Working, Hosts Communication, Protocol Stacks, IoT Protocols, Intra-domain vs. Inter-domain,
X0 Communications Backbone, Network Virtualization, Delivery Methods, Wired Networking, Reference
Architectures for IoT, Layer Networking for IoT,Networked Embedded Systems, Components of
networked embedded systems, Real-time embedded systems, Centralized and distributed embedded
systems, Physical sensor, Passive sensor, Semi-passive, Active sensors, Soft sensors, Sensor nodes.
Mobile sensor network, Sensor networks with mobile nodes, Power management, Mobile node discovery,
Data transfer to mobile nodes, Mobile nodes routing, Distributed Algorithms for IoT, Hierarchical
Addressing and Routing, Geographic Addressing and Routing, Delay-Tolerant Networking, Optimized
Link State Routing (OLSR), Dynamic Source Routing (DSR).
Sockets API Programming, Packet Forwarding, Network Design, IoT forwarding, IoT processing, IoT
Isolation for devices, Participatory sensing of Networked Embedded Systems.
Module IV 6 lecture hours
Vehicular Networked Embedded Systems, Intra -vehicular Network Embedded Systems, Event Triggered
Networked Embedded Systems System, Time Triggered Networked Embedded Systems System, Intelligent
transportation systems.
In this course lab students will Configure Networked Embedded Systems and Sensor Networks. Implement
the network to acquire sensor data from the wireless sensor board and from external sensors. Students will
be building various applications for smart cities using networked embedded sensor and actuators.
Text Books:
1. Hernández-Callejo, Luis, and Sergio Nesmachnow, eds. Mobility and IoT for the Smart Cities. MDPI-
Multidisciplinary Digital Publishing Institute, 2020. ISBN 3039430505.
2. Mahmood, Zaigham. "Connected vehicles in the internet of things." Springer Nature
SwitzerlandAG (2020). ISBN 3319888870.
Reference Books:
1. Lea, Perry. IoT and Edge Computing for Architects: Implementing edge and IoT systems from sensors
to clouds with communication systems, analytics, and security. Packt Publishing Ltd, 2020. ISBN
1839214805.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET423 Special Topics in IoT L T P C
CO1: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies or algorithms in IoT.
CO – PO /PSO Mapping:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 3 2 3
CO2 3 3 3 3 3 2 2 3 3 3
This course covers the cutting-edge topics in IoT, and these modules will be chosen by the instructor based
on the requirements and relevance at that point of time. These modules need to be relevant to the industry
and start-ups will also include related case studies, use cases and implementations scenarios. Students will
be working on lab work and projects to get real hands-on experience of these topics and modules.
Students will gain practical experience by using tools and technologies related to IoT.
Specialization
Electives:
Augmented &
Virtual Reality
Name of Program Bachelor of Technology
CSET425 Augmented Reality and ARCore L T P C
CO1: To identify different types of AR experiences, tools and platforms used in the AR landscape.
CO2: To break down complex AR concepts to make them easy to understand.
CO3: To start building an AR experience using ARCore and other tools.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3 3
CO2 3 3 3 3 3 3
CO3 2 2 3 2 3 2 3 3 3
Course Contents:
AR today: smartphone vs. standalone, Google AR, AR for shopping and retail, AR for business, AR for
social media, AR for gaming, AR for education, AR for healthcare, AR for non-profits, AR reality design
guidelines, Physical environment, virtual environment, environmental limitations, movements, types of
movements, accessibility, Tracking in AR, outside-in tracking, inside-out tracking, motion tracking.
Light estimation, Anchors, Interface issues and lack of UI metaphors, Constraints of occlusion and shading,
AR required vs AR optional, Runtime considerations, Performance considerations, Run AR Apps in
Android Emulator, Camera configuration, Buffering Camera frames, Sharing camera access to ARCore,
Working with Anchors, Creating play instant app, ARCore as input for Machine Learning models.
Enable call logging for Android, Disable call logging for Android, Display call logs, Recording and
playback in AR, Add custom data while recording, Depth in ARCore, Distance and depth of field, Depth
images, Use of Raw depth, Lightening estimation, Environmental HDR mode, Ambient intensity mode.
Experiments using Scene Viewer to display interactive 3D models in AR from an Android app or browser,
AR Dragon using ARCore, AR Drone using ARCore, AR Core drawing, Creation of augmented faces,
Drawing a virtual dancing character with space sound.
Text Books :
1. Lanham, Micheal. Learn ARCore-Fundamentals of Google ARCore: Learn to build augmented
reality apps for Android, Unity, and the web with Google ARCore 1.0. 1st ed. Packt Publishing, 2018.
ISBN 9781788833639.
Reference Books :
1. Linowes, Jonathan, and Krystian Babilinski. Augmented reality for developers: Build practical
augmented reality applications with unity, ARCore, ARKit, and Vuforia. 1st ed. Packt Publishing,
2017. ISBN 9781787288041.
Name of Program Bachelor of Technology
CSET380 Animation and Rendering Techniques L T P C
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3 3 3 3 3
Course Contents:
3D View, Viewports, Standard primitives, Transformations, File formats and operations, Selection, Cloning,
Group, Ungroup, Alignment, Splines: common, Rollouts-editing splines, Architectural tools, Max scene
files, Modifiers, World space modifiers, Object space modifiers, Modifier stack, Instanced modifier.
Compound objects and types, Modelling, mesh modelling, converting objects to editable mesh, sub objects:
vertex, edge, face, polygon, element, Edit mesh modifier, Editable poly modelling, Material Editor,
Assigning materials to objects, Material editor options, Material properties, Material types, Concepts of
Light, omni lights, Spotlight, target lights, free lights, directional light, area lights, Mental ray, Skylight,
Creating max basic lights, lights parameters, Positioning lights, Creating max light in exterior environment,
Creating max light in interior environment.
Rendering, rendering techniques, Photorealistic rendering, Shading, VRaySun, VRay Light, Ray Tracing,
Creating Animations: particles and dynamics, rendering the animation, automating the output of multiple
still images, rendering a shadow study, creating a walkthrough, output options, particle systems: creating
hierarchies.
The experiments to create an image of an object with the different lighting condition. Light the scene with
direct and indirect light, Rendering out Animation. Creation of a short-animated movie.
Text Books :
1. Watt, Alan H. and Mark Watt. Advanced Animation and Rendering Techniques Theory and Practice.
1st ed. ACM Press, 1992. ISBN 9780201544121.
Reference Books :
1. Akenine-Moller, Tomas, Eric Haines, and Naty Hoffman. Real-time rendering. 3rd ed. CRC Press,
2019. ISBN 9781315362007.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET376 3D Models for Augmented and Virtual Reality L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To establish and cultivate a broad and comprehensive understanding of this rapidly evolving and
commercially viable field of Computer Science.
CO2: To prepare for participating in the production of highly integrative immersive applications,
immersive social platforms, cross-disciplinary academic research projects, and leading developments in 3D
user interfaces.
CO3: To create avatars: the virtual representation of other players, and agents: computer-controlled NPC
characters.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3
CO2 3 3 3 2 3 2 3
CO3 3 3 1 3 2 3 2 3
Course Contents:
Virtual reality and environment, The historical development of VR and AR, Scientific landmarks in
Computer Graphics, Real-time computer graphics, Flight simulation, Virtual environments, Requirements
for VR and AR, benefits of Virtual reality.
ADVANCES IN 3D USER INTERFACES: 3D User Interfaces for the Real World, AR Interfaces as 3D
Data Browsers, 3D Augmented Reality Interfaces, Augmented Surfaces and Tangible Interfaces, Agents in
AR, Transitional AR-VR Interfaces - The future of 3D User Interfaces, Questions of 3D UI Technology,
3D Interaction Techniques, 3D UI Design and Development, 3D UI Evaluation and Other Issues. VR and
AR APPLICATIONS: Engineering, Architecture, Education, Medicine, Entertainment, Science, Training.
Explore and setup the various AR/VR devices. Creating Google cardboard and designing VR database and
objects. Learn how to create characters for VR.
Text Books :
1. Bowman Doug A, Ernest Kuijff, Joseph J LaViola, Jr and Ivan Poupyrev, 3D User Interfaces, Theory
and Practice (2 ed.), Pearson Education, 2019. ISBN 978-0134034324.
2. Glover Jesse and Jonathan Linowes, Complete Virtual Reality and Augmented Reality Development
with Unity: Leverage the power of Unity and become a pro at creating mixed reality applications (1
ed.), Packt Publishing, 2019. ISBN 9781838644865.
Reference Books :
1. Pangilinan Erin, Steve Lukas and Vasanth Mohan, Creating Augmented and Virtual Realities (1 ed.),
O’Reilly Publishers, 2019. ISBN 978-1492044192.
Name of Program Bachelor of Technology
CSET426 Building Social VR with 3D Characters L T P C
CO1: To understand the psychology of social interaction and the practical skills to implement it.
CO2: To make characters that can respond to players’ speech and body language.
CO3: To create avatars: the virtual representation of other players, and agents: computer-controlled NPC
character.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3 3
CO2 3 3 3 2 3 2
CO3 3 3 3 3 3 3 3
Course Contents:
Social VR and Virtual Characters, Virtual Characters Realism, Agents and Avatars, Applications of Virtual
Characters, Character Animation, Cristina, Designing Virtual Characters, Importing a Virtual Character to
Unity, Embodiment in Unity using Mobile VR, Skeletal Animation, Motion Capture, Capturing posture,
gesture, and body language, Applying Motion Capture Data onto a Virtual Character, Applying Speech
interaction in character.
Markerless motion capture, Bodily Communication, Psychology for facial expression, Facial Expression in
Unity, Blinking and Lip Sync Animation, Gaze in Social Interaction, Gaze Interaction, Other Facial
Features and Their Psychological Effect, Psychology Behind Social Interaction, Challenges in Human-
Avatar Interaction, Challenges in Human-Agent Interaction, Evaluation of Social Interaction in VR,
Human-avatar: Social VR apps, Embodiment - implementation and psychological effect, Natural
Interaction, Magic Interaction, Active and Passive Interaction, Affordances.
VR Interaction Theory, Standard HMDs, Navigation in VR, Real Walking, Redirected Walking, Walk-in-
Place, Virtual Navigation, Objects Interaction, Object Interaction Within Reach, Hyper-Natural Interaction,
Magic Interaction, Evaluation Metrics, Physics Interaction, Physics Objects, Physics Objects in Unity,
Physics in VR, Physics Interaction in Unity with NewtonVR, State Machines, State Machine Interactions
in Unity.
Case Study: Popular interaction-based products, Graphical User Interfaces in VR, Abstract Interfaces,
Diegetic and Non-Diegetic UI, Gestural Interaction, Issues in VR Interaction, UX of VR, ImmersedVR,
Spatial.io, EngageVR, Mozilla Hubs, Unity User Interfaces, Unity gesture plugin, Bespoke VR, VFairs,
INXPO, AltspaceVR, High Fidelity, Sansar, Rec room, and Webaverse.
The experiment in Unity: loading designed character, Skelton animation, movements, and interaction.
Text Books :
1. Pangilinan, Erin, Steve Lukas, and Vasanth Mohan. Creating augmented and virtual realities: theory
and practice for next-generation spatial computing. 1st ed. O’Reilly Publishers, 2019. ISBN 978-
1492044192.
Reference Books :
1. LaViola Jr, Joseph J., Ernst Kruijff, Ryan P. McMahan, Doug Bowman, and Ivan P. Poupyrev. 3D
user interfaces: theory and practice. 2nd ed. Pearson Education, USA, 2017. ISBN 978-0134034324.
Name of Program Bachelor of Technology
CSET427 Virtual Reality: Interface, Application and L T P C
Design
Owning School/Department Computer Science Engineering 2 0 2 3
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 1 2 3 2 2 2 2 3 2 2 2 2 2
CO2 2 2 1 2 3 2 3 3 2 2
CO3 1 2 2 3 2 3 2 2 3 2 2 2 2
Course Contents:
VR Goals and definitions, Historical perspective, Birds-eye view, Geometry of Virtual Worlds, Geometric
modelling, transforming models, Matrix algebra and 2D rotations, 3D rotations and yaw, pitch, and roll,
Axis-angle representations, Quaternions, Converting and multiplying rotations, Homogeneous transforms,
thechain of viewing transforms, Eye transforms, Canonical view transform, Viewport transform. Hardware
Technologies for 3D user Interfaces: Visual Displays Auditory Displays, Haptic Displays, Choosing Output
Devices for 3D User Interfaces.3D user Interface Input hardware: Input device characteristics, Desktop
input devices, Tracking Devices, 3D Mice, Special Purpose Input Devices, Direct Human Input, Home -
Brewed Input Devices, Choosing Input Devices for 3D Interfaces.
Light and Optics: Three interpretations of light, Refraction, Simple lenses, Dioptres, Imaging properties of
lenses, Imaging properties of lenses, Lens aberrations, Optical system of eyes. Visual Physiology:
Photoreceptors, Enough resolution for VR, Light intensity, Eye movements, Eye movement issues for VR,
Neuroscience of vision. Visual Perception: Depth perception, Motion perception, Frame rates and displays.
Physics and physiology, Auditory perception, Auditory localization, Rendering, Spatialization and display,
Combining other senses. Interfaces: Interfaces - overview, Locomotion, Manipulation, System control,
Social interaction, Evaluation of VR Systems.
The laboratory of virtual reality is designed to provide a practical exposure to the students about the
concepts and topics taught in the classroom sessions. Implementing the learnt concepts using Python will
help the students to have a better understanding of the subject. 3D Modelling and surfacing, Bill Fleming,
Elsevier (Morgan Ka VR Programming-I: Introducing Java 3D, loading and manipulating external models,
using a lathe to make shapes, Programming-II: 3D Sprites, animated 3D sprites, particle systems.
Text Books :
1. Sherman, William R., and Alan B. Craig. Understanding virtual reality: Interface, application, and
design. 2nd ed. Morgan Kaufmann, 2018.
2. Gregory, Josh. Virtual reality. 1st ed. Cherry Lake Publishing, 2018.
Reference Books :
1. Tacgin, Zeynep. Virtual and Augmented Reality.1st ed. Routledge, 2022.
2. Greengard, Samuel. Virtual reality. 1st ed. Mit Press, 2019.
Name of Program Bachelor of Technology
CSET428 Special Topics in AR and VR L T P C
Owning School/Department Computer Science Engineering 2 0 2 3
Pre-requisites/Exposure -
CO1: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies or algorithms in AR and VR.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3
CO2 3 3 3 3 3 3 3 3
Course Contents:
Students will gain practical experience by using tools and technologies related to AR and VR.
Specialization
Electives:
Product
Design
Technology
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET434 Art, Craft and Design L T P C
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 2 2 1 2 2 3
CO2 1 1 3 2 3
CO3 2 2 3 2 3 3 1
Express oneself orally in Art, craft, and design, Professional terminology of the subject, Subject
conversation, Drawing, understanding of pictorial Space, Form & Planes and Drawing based worksTwo-
Dimensional Art Design, Develop Sense of Structure, Subject presentation and discussions , Writing Art,
craft, and design, Visual competence of facts, ideas and attitudes, Investigating, interpreting and using
information from texts and aesthetic expressions from images, Architecture, design, and the use of
formatting, Latest mediums, archives, collections, libraries, and experience from work, Monochrome,
Charcoal, Black, White distribution, Pen & Ink (Chinese Ink), Dry Brush, Pastel, Water Colour, Poster
Colour.
Drawing, images, and symbols in visual expression, Image-making, Painting, using software ‘Word Art’,
Corel Draw, Photoshop, (Design part), Catalogue / Card – design, Printmaking Elements and development,
Photography, Three-Dimensional Design, Lettering Graphic Design, Image Making and Photography,
Photo-Image transferring simple, Working with Digital Art, Skills in numeracy in Art, Calculating standard
measurements, Product Forms, Proportions Rules and Guidelines, Volumes and dimensions for product
development, Calculation in connection with geometry, Drawing and axonometry, Digital tools in Art,
craft, and design, Visual communication, Layouts, Presentations , Documentation.
Studio Work / Laboratory Experiments:
Studio Work aims to design principles and practice the creative, technically proficient, and financially
savvy also Designing Profits focuses on the product running is the business aspects.
Text Books:
1. Fiell, Charlotte, and Peter Fiell. Robert Welch: Design: Craft and Industry. Laurence King Publishing,
2015. ISBN 978-1780676050.
Reference Books:
1. Klingelhoefer, Robert. The craft and art of scenic design: Strategies, concepts, and resources. Taylor
& Francis, 2016. ISBN 978-1138937642.
2. Nunes, Morris, and Andrew Pressman. Designing Profits: Creative Business Strategies for Design
Practices. Routledge, 2015. ISBN 9781317560562, 1317560566.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET437 Product Design Technologies and Tools L T P C
CO1: To articulate modern tools and technologies in the design process that are recognized globally.
CO2: To get the design sense of the object pattern during product design.
CO3: To implement the various methods and design patterns in Product design using technology.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 POS3
CO1 1 3 3 2 3
CO2 1 3 1 2
CO3 2 2 3 1 3 3 2 3 3
Course Content:
Course Introduction and Assessment Plan, Modern Product Design Tools and Techniques, User tracking
and analysis tools, Roadmapping software (such as ProductPlan), Customer survey tools (such as
SurveyMonkey or Typeform), Presentation software, Project management tools, Flowcharting tools, Epilog
Laser Cutting, 3D Printer, Color LaserJet Printer, Vertical Plastic Injection Molding, Universal Wood
Working.
Vacuum Forming, Chroma Studio, VR Kit, Eye Tracking System, Heart Rate Monitor.
Bicycle ergometer, Knowledge of wood Material, Metal, Polymer, Fabrics and composite fabrication,
Advance Mac and Windows workstations equipped with various professional 3D and 2D software etc., Set
up an industry-level environment for design process execution, User tracking and analysis tools, Road
mapping software (such as Product Plan).
Text Books:
1. Knapp, Jake, John Zeratsky, and Braden Kowitz. Sprint: How to solve big problems and test new ideas
in just five days. Simon and Schuster, 2016. ISBN 978150114080.
Reference Books:
1. Penty, Jane. Product Design and Sustainability: Strategies, Tools and Practice. Routledge, 2019. ISBN
9780203732076.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET438 Special Topics in Product Design Technology L T P C
CO1: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience of a few latest methods, tools,
technologies, or algorithms in Product Design Technology.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 3 3 2 2
CO2 1 2 2 1 3 3 3
This course covers the cutting-edge topics in Product Design Technology, and these modules will be chosen
by the instructor based on the requirements and relevance at that point of time. These modules need to be
relevant to the industry and start-ups will also include related case studies, use cases and implementations
scenarios. Students will be working on lab work and projects to get real hands-on experience of these topics
and modules.
Students will gain practical experience by using tools and technologies related to Product Design
Technology.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET433 Design and Manufacturing for Digital Products L T P C
CO1: To shift from paper-based processes to digital processes in the manufacturing industry.
CO2: To identify opportunities for increased quality and efficiency of the product.
CO3: To make ready the digital product after the design.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 2 3 2 1 1
CO2 2 2 3 2 3
CO3 3 1 2 3
Course Content:
Designing Products, Not Pixels, The UX design community, Design the information architecture,
Difference between design and craft—and that process, Designing suits for individual organizations,
Product Design Team and its Skills, Design and Craft, Design decisions during execution, Fine arts, applied
arts, and design, Design and Production, Manufacturing Digital Products, Digital product development
uses, Modern industrial setup for Product Design, Hardware, Firmware, and some embedded software,
Product Manufacturability, Maintainability, and sustainability, Product sustainable methods, Digital
product-design process, Ecosystem Design, Outputs of Ecosystem Development, Product Audience,
Existing solutions or competing products, Objectives of the organization, Users’ needs, Success measures,
Product platforms, Product data needs, Product data architectures, Product good ideas and bad ideas,
Concept Design, The design looks, Prototype, The output of Concept Design, High-level task flow, High-
level data architecture for service design, Conceptual UI and interaction design, Operational Planning,
Target Scope of Work, Data model, Proposed software design, Plan or design for APIs, services, and data
storage, Identity management, access control, and security.
Domains, Platforms, Frameworks, Technical methods, Plan and operations Technically and Operationally,
output of Operational Planning, Sustainable Design, Standards and Reusable Components, Success
Measures, Sustainability Planning, Planning for efficient design, Design standards, Style guide,
Communication Standards, Brand Standards, The output of Planning for component development, Final
goals, Objectives, Success measures, Test planning, Scheduling and logistics, Choosing and installing
analytics tools, Scheduling customer input and communications, Planning for the product’s end of life,
Production Design, Ongoing Concept Design, Analyze and Specify the Designing screen, The output of
Production Design, Technical specifications, UX specifications, Test plans and test criteria for each feature,
Production Engineering Understanding, Proof of Concept Production Code, Iteration’s scale, The output of
Production Engineering, Test, Validate, and Fix, Check the Work, Fix the Problems, The output of Testing
and Iterating, Recurring Features, Designing a Process for Organization.
In the studio work, students work on innovative, mobile, and professional digital manufacturing for
education or prototyping in engineering, manufacturing, and other fields. It also focuses on a digital-
manufacturing-lab-for education Professional 3D Scanner for capturing complex objects.
Text Books:
1. Cross, Nigel. Engineering design methods: strategies for product design. John Wiley & Sons, 2021.
ISBN 9780470519264.
Reference Books:
1. Tao, Fei, Meng Zhang, and Andrew Yeh Chris Nee. Digital twin driven smart manufacturing.
Academic press, 2019. ISBN 9780128176313.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET435 Fashion Design Technology L T P C
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO1 2 2 2 2
CO2 2 1 2 2 3
CO3 2 3 2 3 3 3 3
Course Content:
Course Handouts, Fashion product ethics, Fashion and Technology ERGONOMICS, Designing Tools &
equipment, Dress & Culture, Dress Codes, Body Rituals, Cultural Identity, Dress as a Non-verbal
Communication, Fashion as a Dynamic Process, Fashion System and its impact, Change in fashion
scenario, Ethnicity & its influence, Body Image, Appearance of Gender, Dress in Workplace, Study of
Global Fashion Markets, Global Sourcing & Merchandising, Global Retailing, Policies & Strategies,
Fashion Auxiliary Services, IPR & Fashion Definition, Concept, IPR & law, Trademark & Copyright,
Process of filing for Copyright, Drawing tools and Techniques, Design Materials, Elements of design,
Principles and concept of design, Understanding of colors, Color Theories and color scheme, Textures
shapes and forms, Selection of Dresses according to (age, occasion, climate, personality), Drawing Texture
Fabric rendering, Motifs (enlargement and reduction), Sources of design inspiration& conceptualization,
Designs Using Elements and principles, Design through sketching, Design through Editor and Computer
Tools.
Garment Patterns, Add Quality Details using Particle Distance, Export your Garment PNG images, Animate
your Clothing, CAD systems, Determining main functions of CAD, Creating an avatar, Animate the
Clothing, Create a Dress Models, Create Design of Garment (image, animation, 3D, video), Virtual Fashion
Show.
The lab part focuses on the techniques, skills, resources, and modern engineering and IT tools that are
required in practical application.
Text Books:
1. Faerm, Steven. "Fashion design course: principles, practice and techniques: the ultimate guide for
aspiring fashion designers." (No Title) (2010). ISBN 978-1438011073.
2. Hopkins, John. Fashion Design: The Complete Guide. Bloomsbury Publishing, 2021. ISBN 978-
2940411528.
Reference Books:
1. Alvarado, Jane. Computer aided fashion design using gerber technology. Fairchild Books, 2007. ISBN
1563674327.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET436 Furniture Design L T P C
CO1: To understand how the choice of process and the qualities of materials affect design.
CO2: To get the designing sense the design pattern of modern furniture and draw sketches as well as
working drawings.
CO3: To build the various sustainable design using craftsmanship in different materials and communication
through exhibition and presentation.
CO – PO /PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 POS3
CO1 1 2 1 1 2
CO2 2 1 3 2 1 2 3
CO3 3 3 2 3 3 3
Course Content:
Wood Joinery & Furniture in Interior Design, Wood and metals used in Furniture, Types of wood based
products, Methods of care and maintenance, Economics of furniture, durability and usability, Revival of
roman style, Types of furniture product, Gothic furniture and décor, Timber Expression, Study of shapes,
Environmental conditions influencing furniture designs: Climatic, Social, Economic, Availability of
materials Construction techniques, Forms finishes on furniture, Cabinets used in furniture making,
Techniques of finishing the Surfaces, Wood and Metal Paints, Wood Cutting Tools, Saws used for
woodworking, Filing, Planing, Sanding Supplies Used In Woodworking, Assembly Tools For
Woodworking, Woodworking Tools For Measurement and Angles, Polishes and varnishes, Hand painting,
Brush painting, Roller, Spray, Study of Anthropometric and ergonomic data in relation to various furniture,
Diagrammatic representation through charts, Furniture presentations, Analysis of existing furniture:
Drawings, elevation, sections and details, Joinery as applied to furniture, Redesigning of existing furniture.
Upholstery Materials: Types of foams, springs and other materials, Techniques of upholstering and various
hardware used for the same, Use of Interior and Exterior Spaces awareness of Different types of plants –
Indoor & Outdoor Plants, Designing of different Interior spaces, Furniture Layout, Drawing – Plan,
Elevation 3D view/Perspective View, Furniture detailing using, Colour schemes, Accessories, Electronics
Equipment based layout, Electrical layout, Furniture Design Catalogue 2D, Furniture Design Catalogue 3D
and VR.
In the studio, students will learn the design journey, concept development of wooden and other different
products choice for the multipurpose modern interior of the workspace.
Text Books:
1. Lawson, Stuart. Furniture Design: An Introduction to Development, Materials, Manufacturing.
Laurence King Publishing, 2013. ISBN 1780671202.
2. Rohrbacher, Gary, Anne Filson, Anna Kaziunas France, and Bill Young. Design for CNC: Furniture
Projects and Fabrication Technique. Maker Media, Inc., 2017. ISBN 978-1457187421.
Reference Books:
1. Kries, Mateo, and Jochen Eisenbrand, eds. The Atlas of Furniture Design. Weil am Rhein:: Vitra
Design Museum, 2019. ISBN 3931936996.
Specialization
Electives:
Mobile
Technologies
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET396 iOS Application Development L T P C
Course-Outcomes (Cos)
On completion of this course, the students will be able to:
CO1: To Define key programming terms relevant to Swift and iOS programming.
CO2: To gain an understanding of iOS application development.
CO3: To gain knowledge for best programming practices in Swift for designing an iOS app.
Course Contents:
Introduction to iOS, Mobile application development, Overview of iOS platform, setting up Xcode & tools,
MVC design pattern. Interface Builder Basics: Common system views, Interface Builder Storyboards,
project options, default project, create a new project with a label and a greet function.
Common system views configuration, Label(UILabel), Image view, Textview, Scroll view, Table view,
Toolbars(UIToolbar), Navigation bars, tab bars, Controls, Button, Segmented controls, Sliders, Switches,
Date pickers, UIKit User Interface Catalog, Displaying data: Content mode, Unexpected Clipping.
Layout for multiple sizes, Why Auto Layout?, Create alignment constraints, create size constraints, Resolve
constraint issues, Safe area layout guide, resolve constraint warnings, Constraints between siblings, Stack
views,stack view attributes, Size classes.
App life Cycle, break down the delegate, Protocols methods: Did Finish Launching, Will Resign Active,
Did Enter Background, Will Enter Foreground, Did Become Active, Will Terminate. View Controller life
Cycle: viewDidLoad, viewWillappear , viewDidappear, viewWillDisappear.
Reference Books:
1. Paris Buttfield-Addison, Jonathon Manning, Tim Nugent Learning Swift: Building App macOS, iOS,
and Beyond, O'Reilly Media, Inc., 3rd ed, 2018.
2. Yamacli, Beginner's Guide to iOS 11 App Development Using Swift 4: Xcode, Swift
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET397 Mobile Application Development L T P C
Course-Outcomes (COs)
On completion of this course, the students will be able to:
CO1: To describe the advanced tools and techniques to develop an iOS application.
CO2: To illustrate the advanced concepts of application development for iOS with programming
language.
CO3: To design complex applications and user’s interaction for iOS applications.
Course Contents:
Protocols: Custom String Convertible, Equatable, Comparable, Codable, Creating a protocol, Delegation
Model-View-Controller: Pattern, Model objects, Model object Communication, Views, Views
Communication, Controllers: View controllers, Model controllers, Helper controllers; Controller
Communication , Project organization.
Scroll Views: UlScrollView, Scroll viewsScroll views in Interface Builder : Define scroll view frame, Add
constraints, Define content view using stack view, Programmatic constraints, Keyboard issues, Content
insets, Scroll indicator ,Scroll View family. Table Views: UlTableView, Types, Table view controllers,
Table view styles, Table view cells, UlTableViewCell properties, Index paths, Arrays and table views, Cell
dequeuing, Table view protocols, Table view data source, Table view delegate, Reload data, Intermediate
Table Views.
Apple system view controllers, Activity view controller, SFSafariViewController, Alert controllers. Access
the camera: UllmagePickerController, Permission, Send email: Verify whether mail can be sent,
MFMailComposeViewController, mailComposeController.
Closures: Passing closures as arguments, Syntactic sugar, Collection functions using closures: Map, Filter,
Reduce, Adding computed properties, Adding instance or type methods, Organizing code. Generic Data:
Array, Dictionary, Type constraints, Functions, and methods, Associated types. Dynamic Data: Search
Controllers, Handling Data Changes, Diffable Data Sources.
Students will gain practical experience with the implementation of different swift concepts. The lab work
consists of swift programming using Playground and Xcode.
Text Books:
1. “Pro Design pattern in Swift” Adam Freeman. 2019
2. Design Patterns in Swift 5: Learn How to Implement the Gang of Four Design Pattern Using Swifts.
Karoly Nyisztor. 2018
Reference Books:
1. Design Patterns in Swift: A Different Approach to Coding with Swift - iOS. Vamshi Kris
2. Test iOS Apps with UI Automation, O'Reilly 2019
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET439 Design Patterns and UI Testing L T P C
Course-Outcomes (COs)
On completion of this course, the students will be able to:
CO1: To impart knowledge of Swift and Apple iOS application design, development and testing.
CO2: To provide students with the skills necessary to develop an iOS App from scratch to develop on
the Apple Store.
CO3: To provide UI test tests a specific user interaction with the application’s UI.
Course Contents:
Understanding design patterns, getting used to Xcode, creating the sports Store app, creating design pattern:
object template pattern, prototype pattern, singleton pattern, object pool pattern, builder pattern
Structural Patterns: Adapter pattern, Bridge pattern, Decorator pattern, Composition pattern, Facade
pattern, Flyweight pattern, Proxy pattern.
Testing basics, Performance testing, Ul testing, app and Library tests, XCTest—the Xcode Testing
Framework. Writing Test Classes and Methods, Running Tests and Viewing Results. Test Debugging
Workflow, Test Specific Debugging Tools, Code Coverage, Enable Code Coverage, Automating the Test
Process.
Students will gain practical experience with the implementation of different swift concepts. The lab work
consists of swift programming using Xcode Testing Framework .
Text Books:
1. “Pro Design pattern in Swift” Adam Freeman. 2019
2. Design Patterns in Swift 5: Learn How to Implement the Gang of Four Design Pattern Using Swifts.
Karoly Nyisztor. 2018
3. iOS Unit Testing by Example Book by Jon Reid. 2018
4. Test-Driven iOS Development with Swift Book by Dominik Hauser.
Reference Books:
1. Design Patterns in Swift: A Different Approach to Coding with Swift - iOS. Vamshi Kris
2. Test iOS Apps with UI Automation, O'Reilly 2019
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET494 iOS Machine Learning L T P C
Course-Outcomes (COs):
On completion of this course, the students will be able to:
CO1: Become familiar with the basic concepts of machine learning and various ML models.
CO2: Implement ML models using iOS apps.
CO3: Learn latest iOS frameworks for ML.
Course Contents:
Introduction to Machine Learning, Types of learning, Regression versus Classification. Different types of
classification algorithms.
Introduction to Neural Networks, perceptron model, activation functions, multi-layer perceptron model,
backpropagation, deep learning, deep learning models: CNN, RNN.
How to add ML model in Xcode project, Properties and picker delegate methods, Pickerview data source
methods, iOS ready machine learning models, ML models with images, Vision framework: Programming
the VN request callback method, Testing different ML models.
Students will gain practical experience with the implementation of ML models with iOS ML frameworks.
The lab work consists of CoreML and Apple NLP Framework.
Text Books:
1. Machine Learning with Swift, Alexander Sosnovshchenko, February 2018, Publisher(s): Packt
Publishing ISBN: 9781787121515.
2. Machine Learning with Core ML 2 and Swift, Karoly Nyisztor, 2019.
Reference Books:
1. Practical Artificial Intelligence with Swift, From Fundamental Theory to Development of AI-Driven
Apps, Mars Geldard, O’reilly, 2019.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET495 Backend in iOS L T P C
Course-Outcomes (COs):
On completion of this course, the students will be able to:
Course Contents:
Introduction to Firebase, Creating a Firebase account, Integrating the account with the project, setting up
auth of Firebase, Polishing the Auth UI, Connecting Auth UI with Firebase
Creating a snapchat clone app-snapfun, Allow the user to add images, Handling the images on Firebase,
Use real time database, creating a snap, setting up the view of snap, deletion of snap.
Students will gain practical experience with the implementation of the Firebase project with Cocoapods.
The lab work consists of authorization, accessibility, and functionality of UI with backend.
Text Books:
1. Learn Swift by Building Applications: Explore Swift programming through iOS app development, Emil
Atanasov, May 2018, Publisher(s): Packt Publishing ISBN: 9781787121515.
2. iOS 15 Programming Fundamentals with Swift: Swift, Xcode, and Cocoa Basics, Matt Neuburg, 2021.
Reference Books:
1. iOS and macOS Performance Tuning: Cocoa, Cocoa Touch, Objective-C, and Swift (Developer's
Library) s, Marcel Weiher, O’reilly, 2016.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET496 Special Topics in Mobile Technologies L T P C
Course-Outcomes (COs)
On completion of this course, the students will be able to:
CO1: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies or algorithms in Mobile Technologies.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 1 2 1 3
CO2 2 2 2 3 2
Course Contents:
This course covers the cutting-edge topics in Mobile Technologies, and these modules will be chosen by
the instructor based on the requirements and relevance at that point of time. These modules need to be
relevant to the industry and start-ups will also include related case studies, use cases and implementations
scenarios. Students will be working on lab work and projects to get real hands-on experience of these topics
and modules.
Students will gain practical experience by using tools and technologies related to Artificial Intelligence
Specialization
Electives:
UI/UX
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET313 User Centered Design L T P C
Course-Outcomes (COs)
On completion of this course, the students will be able to:
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1
CO2
Course Contents:
Module 1 (8 hours)
User Centred Analysis (UCA), Mental models, knowing how the user works, Learnability, User model vs System
Model, Which UCA steps to perform, Obstacles of user-centred analysis, Return on Investment (ROI), Justifying
the right process, Creating a Design Strategy: Components of a design strategy, Site strategy drives design
strategy, Where to get strategy information, Mining existing documentation, Working with brand objectives,
Design techniques: Sketching, Scenarios, Storyboards, Design patterns.
Module 2 (9 hours)
Profiles and Personas, Value of profiles and Personas, User profiles, Task profiles, Environment profiles, Data
gathering methods, Choosing the right method, Elements of field interview, Developing interview questions,
Good and bad interview technique, Conducting a user observation. Complementary Data Gathering Methods:
Value of complementary methods, Focus groups, User group meetings, Usability roundtables, Complementary
Data Gathering Methods, Facilitated workshops, JAD sessions, Using surveys and other indirect methods,
Online surveys, Using multiple methods.
TEXTBOOKS/LEARNING RESOURCES:
1. Travis Lowdermilk, User centred design: A Developers Guide (1st ed.), O'Reilly Media,
2013. ISBN 978-1449359805.
2. "The User Experience Team of One" by Leah Buley
3. "Interviewing Users: How to Uncover Compelling Insights" by Steve Portigal
Course-Outcomes (COs)
On completion of this course, the students will be able to:
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1
CO2
Course Contents:
Module 1 (9 hours)
Understanding business goals, Aligning design with organizational strategy, Design sprints and strategic design
frameworks, Techniques for increasing user conversions, A/B testing and data-driven design decisions,
Optimizing user flows for conversions, Advanced prototyping tools and techniques, Incorporating interactivity
for engaging experiences, Prototyping for user testing and feedback.
Module 2 (9 hours)
Designing for brand consistency, Building emotional connections through design, Adaptive Design for
Emerging Technologies, Creating a cohesive brand experience, Designing for brand consistency, Building
emotional connections through design, Designing for AR, VR, and mixed reality, UI/UX considerations for
AI-driven interfaces, Navigating challenges in adaptive design, Advanced prototyping tools and techniques,
Incorporating interactivity for engaging experiences, Prototyping for user testing and feedback
Utilizing analytics for informed design decisions, User behavior analysis and heatmaps, Iterative design based
on user data, Mobile UX best practices, Designing for various mobile platforms, Mobile app usability testing,
Applying game design principles to user interfaces
Gamification for user engagement, Balancing challenge and usability, Ethical considerations in UI/UX
design, Responsible use of data and technology, Designing for inclusivity and diversity.
TEXTBOOKS/LEARNING RESOURCES:
1. "Lean UX: Designing Great Products with Agile Teams" by Jeff Gothelf and Josh Seiden
2. "Strategic Writing for UX: Drive Engagement, Conversion, and Retention with Every Word" by Torrey
Podmajersky
3. "UX Strategy: How to Devise Innovative Digital Products that People Want" by Jaime Levy
Course-Outcomes (COs)
On completion of this course, the students will be able to:
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1
CO2
Course Contents:
Module 1 (6 hours)
Defining analysis objectives, Organizing data, Investigation, Clusterization, Results and insights identification.
Check the methodology: Respondents, Tasks, Logistics, Data analysis.
Module 2 (6 hours)
Creating research plan: Define the problem statement, Get stakeholders’ buy-in, Identify your objectives, Choose
the right research method, Recruit participants, Prepare the brief Establish the timeline, Decide how you’ll
present your findings.
Module 3 (8 hours)
Quantitative research data analysis, the success rate of a specific task, how long a user takes to complete a task,
the bounce rate of a webpage, user’s demographic profile. Thematic Analysis, gather all the data, Read all the
data, Code the text, Create new codes that encapsulate potential themes, Take a break, Evaluate the themes.
Module 4 (8 hours)
Qualitative research data analysis, what do the users like the most about the product, What do they like the
least, Which features are more valuable, Why do some users react differently from others, Did they have an
emotional response? When, Are they satisfied with the product? Why.
1. "Measuring the User Experience: Collecting, Analyzing, and Presenting Usability Metrics" by
Thomas Tullis and William Albert
2. "Quantifying the User Experience: Practical Statistics for User Research" by Jeff Sauro and James R.
Lewis
3. "Storytelling with Data: A Data Visualization Guide for Business Professionals" by Cole Nussbaumer
Knaflic
1. "Quantifying User Experience: Practical Statistics for User Research" by Jeff Sauro
2. "UX Research: Practical Techniques for Designing Better Products" by Brad Nunnally and David
Farkas
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET316 UI/UX Design Testing and Evaluation L T P C
Course-Outcomes (COs)
On completion of this course, the students will be able to:
CO1: This course introduces software designing process and modeling (Software Development Life Cycle,
Design Handoff to Software Teams).
CO2: Design Analysis & Outcomes
CO3: Designing for Mobile Applications (ios/Android) and Progressive Web Applications
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1
CO2
Course Contents:
Module 1 (8 hours)
User Experience Metrics, Conversion Rate Optimization and A/B testing. Methods of usability testing,
conducting UX research, analyzing user feedback. Performing usability tests; using tools for analytics and
feedback collection.
TEXTBOOKS/LEARNING RESOURCES:
1. "The Handbook of Usability Testing: How to Plan, Design, and Conduct Effective Tests" by Jeffrey
Rubin and Dana Chisnell
2. "Usability Testing Essentials: Ready, Set...Test!" by Carol M. Barnum
3. "Usability Testing for Survey Research" by Emily Geisen and Jennifer Romano Bergstrom
1. "Effective UI: The Art of Building Great User Experience in Software" by Jonathan Anderson and John
McRee
2. "Validating Product Ideas: Through Lean User Research" by Tomer Sharon
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET317 Product Management for UX Designers L T P C
Course-Outcomes (COs)
On completion of this course, the students will be able to:
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1
CO2
Course Contents:
Module 1 (6 hours)
Creation and management of a digital product. Working on real projects operational skills in various domains
such as marketing, tech/IT, design, business. Successful product managers possess a diverse skill set that
combines business acumen, technical understanding, and design sensibility. Excel in strategic thinking, market
analysis, and project management. Deep understanding of UX and UI design principles, enabling effective
collaboration with designers and engineers to translate user requirements into compelling product experiences.
Module 2 (6 hours)
Product managers and UX/UI designers work hand in hand to shape the digital product’s UX/UI design.
Collaboration involves frequent communication, knowledge sharing, and joint decision-making. Product
managers bring their market and business insights, while UX/UI designers contribute their expertise in user
research, information architecture, interaction design, and visual aesthetics. This collaborative approach
ensures a harmonious blend of user needs, business goals, and design excellence.
Module 3 (8 hours)
A well-defined product development process is vital for successful digital product UX/UI design. This module
provides an overview of the product development lifecycle, including the integration of UX and UI design
activities. Agile and Waterfall Methodologies
Two commonly used methodologies in product development are Agile and Waterfall. Agile emphasises
iterative and flexible development, allowing for continuous feedback and adjustments throughout the process.
Waterfall, on the other hand, follows a linear approach with distinct phases, where each phase is completed
before moving to the next. Both methodologies have their merits, and product managers need to choose the
most suitable approach based on project requirements.
Module 4 (8 hours)
TEXTBOOKS/LEARNING RESOURCES:
1. "Product Leadership: How Top Product Managers Launch Awesome Products and Build Successful
Teams" by Richard Banfield, Martin Eriksson, and Nate Walkingshaw
2. "Lean UX: Designing Great Products with Agile Teams" by Jeff Gothelf and Josh Seiden
3. "Lean Product and Lean Analytics" by Ben Yoskovitz and Alistair Croll
CO1: To explain and Analyse images using Histograms and spatial filters. Apply Hough transforms and be
familiar with image representation using textures.
CO2: To compute motion using optical flow and understand methods for image description and
morphological operations.
CO3: To implement different low-level and high-level image and video processing techniques to wide
variety of applications.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 3 3
CO2 3 3 2 3 2 2 3
CO3 3 3 3 3 3 2 2 2 2 3 3
Course Contents:
Applications of Digital Image Processing, Elements of Digital image processing systems, Sampling and
quantization, Neighbours of a pixel, adjacency, connectivity, Regions and Boundaries, Distance measures,
Gray scale to Binary image using thresholding, Image Enhancement in the Spatial domain, Gray level
transforms, Histogram Processing, Histogram Equalization, Enhancement using Spatial filters, Concept of
convolution, Smoothing, Mean, median and Gaussian filters, Edge detection using Prewitt, Sobel, Laplace
Filters, Laplace of Gaussian Filter.
Canny Edge Detector, Harris Corner Detector, Color models, RGB, HSV, YCbCr models, Pseudocolor
Image Processing, Color Transforms, Color to grayscale conversion, Handling Binary Images, Line
detection using Hough transform, Polar form, Circle Detection, Morphological Operations, Dilation,
Erosion, Opening, Closing, Boundary detection, Hole filling, connected components, Hit and Miss
transform, Shape representation using moments, Texture analysis, Texture from histogram, Texture from
GLCM matrices.
Motion Detection, Concept of Optical Flow, Optical flow equation, Lucas Kanade method, Image
Enhancement in the Frequency domain, 1-D and 2-D Fourier Transform and their Inverse, Low pass and
Hi pass Filtering, Ideal and Butterworth and Gaussian Filters, Homomorphic Filtering, Image
Compression Fundamentals, Lossless Compression Models, Run length Encoding, Huffman Coding,
Lossy Compression, Discrete Cosine Transform, Quantization, Zigzag coding, Color image compression,
Text recognition, Feature detection, Integral Image Formation.
Face Detection – Viola Jones method, Face Recognition, Principal Component Analysis (PCA),Concept
of Eigenface, Feature detection for Machine learning applications, SIFT and HOG parameters, Video
Processing, Video formation, Video sampling, Motion estimation, Motioncompensated (MC) filtering,
Frame-rate conversion, Video Coding, Video Compression, Framebased compression (MPEG), Salient
object detection, Human action recognition from videos, Depth cameras– Kinect camera data capture,
RGBD data.
The lab work will be based on image enhancement, image zooming, image cropping, image restoration,
image compression and image segmentation etc. The Lab will use MATLAB and Open CV with python.
Text Books :
1. Szeliski Richard, Computer Vision: Algorithms and Applications (2 ed.), Springer, 2022. ISBN 978-
3030343712.
2. Jain K., Fundamentals of Digital Image Processing (1st ed.), Pearson Education India, 2015. ISBN
978-9332551916.
Reference Books :
1. Bovik, A. C., Handbook of image and video processing (1 ed.), Academic press, 2010. ISBN
9780121197902.
2. Kim, B. G., Digital Signal, Image and Video Processing for Emerging Multimedia Technology.
Electronics (1 ed.), Mdpi AG, 2021. ISBN 978-3039438570.
3. Vyas, A., Yu, S. and Paik, J., Fundamentals of digital image processing. In Multiscale Transforms with
Application to Image Processing (1 ed.), Springer, 2018. ISBN 978-9811356131.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET320 Information Retrieval L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
Course Outcomes (COs)
CO1: Comprehend types of text analysis, Information retrieval, IR system architecture, query processing
models and probabilistic models.
CO2: Manage information retrieval systems by performing indexing, compression, information
categorization sentiment analysis, network management, search engine optimization, records compliance
and risk management.
CO3: Implement different information retrieval approaches for applications in text domain.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 2 2 3
CO2 3 2 2 3 1 2 2 2
CO3 2 1 2 2 2 2 1 2
Course Contents:
Text analysis and types, Information retrieval, Text processing, Indexes and query matching,
Semistructured text data, Tokenization, Stemming, Lemmatization, Language modelling, Examples of
open source IR Systems, Query processing models, Probabilistic models, Binary independence model,
Robertson/Spark Jones weighting formula, Two-Poisson model, Relevance feedback, Term selection,
Pseudo relevance feedback, Language models, Unigram, Bigram language models, Generating queries
from documents, Language models and smoothing, Ranking with language models, Retrieval
evaluation measures.
Indexing, Inverted indices, Index components and Index life cycle, Interleaving Dictionary and
Postings lists, Index construction, Query processing for ranked retrieval, Compression, General-
purpose data compression, Symbol-wise data compression, Compressing posting lists, Compressing
the dictionary, Information categorization and filtering, Classification, Probabilistic classifiers, Linear
classifiers, Similarity-based classifiers, Multi category ranking and classification, Learning to rank.
Problems based on search engines and common open-source software to perform common methods of
exploratory and predictive analysis. Application of text analysis techniques for data analysis. Performing
sentiment analysis.
Text Books:
1. Buttcher Stefan, Charles L. A. Clarke and Gordon V. Cormack, Information Retrieval:
Implementing and Evaluating Search Engines (1 ed.), The MIT Press, 2016. ISBN 978-
0262528870.
2. Croft W. Bruce, Donald Metzler and Trevor Strohman, Search Engines - Information Retrieval in
Practice (1 ed.), Pearson, 2009. ISBN 978-0136072249.
Reference Books :
1. Bates, M. J., Understanding information retrieval systems: management, types, and standards (1
ed.), Auerbach Publications, 2011. ISBN 978-1439891964.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET321 User Centered Design L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: Articulate appropriateness of potential design methods such as contextual design, prototyping,
ideation given a problem setting.
CO2: Examine the issues and challenges to achieving a user-cantered design process.
CO3: Implement design methods at a basic level of competence: interviews, personas, storyboarding,
sketching, and evaluation.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 2 3 3 1 1
CO2 2 2 2 2 2 3
CO3 2 3 2 3 3 3 3 2 1 2
Course Contents:
User Centred Analysis (UCA), Mental models, knowing how the user works, Learnability, User model vs
System Model, Which UCA steps to perform, Obstacles of user-centred analysis, Return on Investment
(ROI), Justifying the right process, Creating a Design Strategy: Components of a design strategy, Site
strategy drives design strategy, Where to get strategy information, Mining existing documentation, Working
with brand objectives, Design techniques: Sketching, Scenarios, Storyboards, Design patterns.
Profiles and Personas, Value of profiles and Personas, User profiles, Task profiles, Environment profiles,
Data gathering methods, Choosing the right method, Elements of field interview, Developing interview
questions, Good and bad interview technique, Conducting a user observation. Complementary Data
Gathering Methods: Value of complementary methods, Focus groups, User group meetings, Usability
roundtables, Complementary Data Gathering Methods, Facilitated workshops, JAD sessions, Using
surveys and other indirect methods, Online surveys, Using multiple methods.
Students will gain practical experience with the implementation and use of various user interface design
methods and functionalities User interface prototyping and Agile Model Driven Development (AMDD).
Moreover, students will have exposure to the tools for designing the User Interface to improve the User
experience. The lab work will give and exposure to Android mobile development platform and other open-
source software tools.
Text Books :
1. Lowdermilk Travis, User centred design: A Developers Guide (1 ed.), O'Reilly Media, 2013. ISBN
978-1449359805.
Reference Books :
1. Steve Krug, Don’t make me think Revisited: A common sense approach to web usability (3 ed.),
Berkeley CA: New Riders Publishing, 2020. ISBN 978-0321965516.
2. Travis, D., and Hodgson, P., Think Like a UX Researcher: How to Observe Users, Influence Design,
and Shape Business Strategy (1 ed.), CRC Press, 2019. ISBN 978-1138365292.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET322 Secure Coding L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To explain secure programming philosophy, design principles, and its methods.
CO2: To examine typical mistakes done during programming and the methods of their handling.
CO3: To implement the typical threats in programming and understand concepts of implementing the
secure codes.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 2 2 2 2 2
CO2 3 3 2 3 2 2
CO3 1 3 3 3 3 3
Course Contents:
Secure Programming, Robust vs. Secure Programming, Security Policies and Procedures, Checking Design
and Implementation, Where to Look for Vulnerabilities, Classification of Security Flaws, Landwehr’s
Taxonomy, Fortify Taxonomy, Protection methods at different layers, PreDeCo matrix of software security.
Input Validation in Programming, Improper Error and Exception Handling, Code Injection and Mitigation,
Broken Authentication..
Secure Programming Design Principles, Principle of Least Privilege, Fail-Safe Defaults, Principle of
Economy of Mechanism, Principle of Complete Mediation, Separation of Privilege Principle, Principle of
Open Design, Principle of Least Common Mechanism, Principle of Least Astonishment, Control Hijacking
Attacks and Defences, Attacks Using Virtual Machines, Static and Dynamic Analysis, Language-based
Security Models, Isolation Techniques.
XML External Entity (XXE), Cross-Site Scripting (XSS), Insecure Deserialization, LFI (Local File
Inclusion) and RFI (Remote File Inclusion) vulnerabilities, Unvalidated File Upload vulnerability, Buffer
Overflow vulnerabilities, Client Side Security, JavaScript Security, Click Jacking, Ajax Security, HTML5
Security, Java Secure Socket Extension (JSSE), Common Coding Errors and Vulnerability, Automation
and Testing for secure coding, Research Issues in Secure Coding.
Lab experiments on JAVA and C/C++ to understand the threats and implement secure coding.
Implementation of input validation, improper error and exception handling, code injection and the
techniques of its mitigation, demonstration of Broken authentication, and different types of threats, e.g.,
XXE Attack, XSS software attack, insecure deserialization, and user-interface redress attack.
Text Books :
1. Richardson T. and Thies C. N., Secure Software Design, Jones & Bartlett Learning (1 ed.), Jones &
Bartlett, 2012. ISBN 978-1449626327.
Reference Books :
1. Codings Zach, Computer Programming and Cyber Security for Beginners (1 ed.), Independently
published, 2020. ISBN 978-1801091442.
2. Seacord Robert C., Secure Coding in C and C++ (2 ed.), Pearson Education, 2013. ISBN 978-
0321822130.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET323 Compiler Construction L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 1 3
CO2 2 1 1 3 2 2 3
CO3 3 3 2 2 3 2
Course Contents:
Compiler, Code Analysis, Interpreter, Single Pass, Two pass, Multi Pass compiler, Preprocessor, Macros,
Phases of compiler, Symbol table manager, Operations on symbol table, Error handling, Bootstrapping and
cross compiler, Lexical Analysis, Tokens, Regular expression, Generation of lexical analysis from DFA,
Syntax Analysis, Parser, Context Free Grammar, Conversion Rule for Ambigous To Unambigous
Grammar, Non-Deterministic & Deterministic Grammar, Left Recursive And Right Recursive Grammar,
Parsing: Top down and Bottom up, Backtracking and their automatic generation, LL (1) Parser, LR Parser,
LR (0) items, SLR (1), LALR (1), Canonical Parsing..
Error Analysis, Error Classification, Error detection, Error Detection in LL and LR parsers, Error recovery,
Panic mode error recovery, Static semantic, Intermediate code generation, static semantic analyses in
declaration processing, name, and scope analysis, S-attribute, Semantic analysis through S-attribute
grammar, L-attribute, Type checking, Language features influencing run time memory management.
Parameter passing mechanism, Division of memory into code, stack, heap and static, Activation record,
Garbage collection, Code generation for expressions, issues in efficient code generation.
Module III: 9 lecture hours
Sethi Ullman algorithm, optimal code generation, Retargetable code generation, Code generation for
control structures, Code Optimization, Local and global optimization, Control flow analysis, Data flow
analysis, Global optimizations, Graph colouring in optimization, Live ranges of run time values.
Construct a lexical analyzer using Flex. Construct a parser using Prison Bison. Build simple compilers from
parsing to intermediate representation to code generation and simple optimization.
Text Books :
1. Sunitha, K. V. N., Compiler construction (1 ed.), Pearson Education India, 2013. ISBN 978-
9332500297.
2. Thain Douglas, Introduction to Compilers and Language Design (2 ed.), Lulu.com, 2019. ISBN 978-
0359142835.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET324 Software Project Management L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To articulate and determine the purpose and importance of basic processes involved in project
management from the perspectives of planning, tracking and completion of project.
CO2: To examine different organization structures and project structures.
CO3: To implement programs to manage project management, project schedule, expenses and resources
with the applications of project management tools.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 1 3 3 1 2
CO2 1 1 2 1 3 3 3 3 2 3
CO3 1 3 3 3 2 3 2 2 2 3 3
Course Contents:
Using Function Point calculation tools for estimation, comparing with COCOMO estimates,
Implementation of various exercises using PERT, CPM methods, preparing schedule, resource allocation
etc. using MS Project or Fissure. sim or VENSIM or Visual Paradigm can also be used, Preparing an
RMMM Plan for a case study, Preparing Project Plan for a Software Project for Lab Project or case study.
Exploring about PMBOK (Project Management Body of Knowledge) and SWEBOK (Software
Engineering Body of Knowledge) from related website, Implementation of software project management
concepts using related tools and technologies.
Text Books :
1. Pressman Roger and Bruce Maxim, Software Engineering: A practitioner’s approach (9 ed.), Tata
McGraw Hill, 2020. ISBN 978-1259872976.
Reference Books :
1. Aggarwal Manuj and TetraTutorials Team, The Art of Project Management for Software and IT
Engineers (1 ed.), Packt Publishing, 2018. ISBN 978-1789804768.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET325 Digital Communication L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To explain digital communication systems with emphasis on digital modulation techniques.
CO2: To implement information theory and channel coding/decoding.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 1 1 1 1 2
CO2 1 3 1 1 1 2 3
CO3 3 1 2 3 3
Course Contents:
Pulse Code Modulation (PCM), Sampling in PCM, Quantization in PCM, Encoding, Logarithmic PCM,
Differential PCM, Delta Modulation, Delta Sampling, Delta Quantization, Baseband Processing,
Orthogonality in digital signal, Signal Noise, Signal-Space Analysis, Likelihood Functions, Correlation
Receiver Structure, Bandpass Modulation, Amplitude Shift keying (ASK), Frequency Shift Keying (FSK),
Binary Phase Shift Keying (BPSK), Quaternary Phase Shift Keying (QPSK).
Differential Encoding, Performance of BPSK and QPSK, Multiplexing, Frequency division multiplexing,
Time division multiplexing, Channel Coding, Types of Error Control, Structured Sequences, Block Codes,
Linear Block Codes, Error Correction, Convolutional Encoding, Coding Modulation Trade-off, Spread
Spectrum, Direct Sequence Spread Spectrum Systems, Frequency Hopping Spread-Spectrum, Spread-
Spectrum as Multiple Access, Code-Division Multiple Access, Time-Division Multiple Access.
Hands-on performed using kit to understand the concepts of modulation, synchronization, etc.
Text Books :
1. Proakis J.G. and Masoud Salehi, Digital Communication (1 ed.), McGraw Hill, 2018. ISBN 978-
9353163020.
Reference Books :
1. Lathi B. P., Zhi Ding, Modern Digital and Analog Communication (5 ed.), Oxford University Press,
2018. ISBN 978-0190686840.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET326 Soft Computing L T P C
Owning School/Department Computer Science Engineering 2 0 2 3
Pre-requisites/Exposure -
CO1: To comprehend the fuzzy logic and the concept of fuzzy set theory in soft computing.
CO2: To examine Neuro-Fuzzy and Genetic Algorithm expert system.
CO3: To implement applications on different soft computing techniques like Fuzzy, Multi Objective
optimization and Genetic Algorithm (GA).
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 2
CO2 3 2 1 2 3 2
CO3 3 1 3 2 3 3 2 3
Course Contents:
1. Fuzzy Logic, Multi Objective Optimization, GA, and hybrid fuzzy controller, implementation on
MATLAB/PYTHON.
Text Books :
1. Kaushik Saroj and Sunita Tiwari, Soft Computing, Fundamentals, Techniques and Applications (1 ed.),
McGraw-Hill Education, 2018. ISBN 978-9353160678.
2. Sivanandam, S. N., and Deepa, S. N, Principles of soft computing (1 ed.), John Wiley & Sons, 2011.
ISBN 978-8126527410.
Reference Books :
1. Buontemp F., Genetic Algorithms and Machine Learning for Programmers (1 ed.), Pragmatic
Bookshelf, 2019. ISBN 978-1680506204.
2. Gridin I., Learning Genetic Algorithms with Python (1 ed.), BPB Publications, 2021. ISBN 978-
8194837756.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET327 Embedded Systems L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To explain the functional difference between general computing systems and Embedded systems.
CO2: To articulate the architecture of the ATOM and ARM processor and its programming aspects
(assembly level).
CO3: To examine partition among HW and SW a high-level functionality with emphasis on the interaction
with the network and operating system. Model, design and verify a complex digital device.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2
CO2 3 2 2 3
CO3 2 1 2 3 1
Course Contents:
Case Study: Multimedia handsets and DVB-MHP Set top Boxes, Middleware for Chip Integration, System
Middleware for Runtime Environment Abstraction, Firmware for Embedded Systems, Embedded
Computing Software Environment, Interrupts, VT. FSB Architecture, Chipset overview and function,
Steps before Boot sequence, BOOT up sequence, Embedded Computing Hardware Architecture,
Platform-based Design Concept, FPGA-based System Design.
Module III: 11 lecture hours
Embedded Processor Cores, Hardware and Software Interfaces, HW-SW Interface Design, Bus Protocols
(I2C, AMBA, Core Connect, and Wishbone), Hardware-Software Co-Design, System Models and
Formalisms, System Co-design Flow, Verification and Debugging of a Co-Designed System, Embedded
systems using Atom processors, Complex Embedded Systems and Embedded Multimedia System Co-
Design.
In lab students will implement program in various embedded system then compare and Identify the best
architecture of an embedded system. Moreover, student will perform partitioning among S/W and H/W a
high-level functionality
Text Books :
1. Shibu K. V., Introduction to Embedded Systems (2 ed.), Tata McGraw, 2009. ISBN 978-9339219680.
2. Kamal Raj, Embedded Systems Architecture, Programming, and Design (2 ed.), Tata McGraw Hill,
2008. ISBN 978-9332901490.
Reference Books :
1. Barry Peter and Patric Crowley, Intel architecture for Embedded system (1 ed.), Morgan Kaufmann,
2012. ISBN 978-0123914903.
2. Wolf Wayne, Computers as Components: Principles of Embedded Computer System Design (4 ed.),
Elsevier, 2020. ISBN 978-0128053874.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET328 Distributed Computing L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To articulate the models, architectures, and the concept of virtual clock and clock synchronization.
CO2: To examine the algorithms for mutual exclusion, deadlock detections, and termination detection.
CO3: To implementing the concepts of distributed computing on Google File System , Hadoop Distributed
File System ( HDFS ), and sensor networks.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 1 1 1
CO2 3 2 1 2 3
CO3 2 3 3 2 1 3 2 3
Course Contents:
Introduction, process communication, Message Passing, Leader Election, Leader election algorithm,
Distributed Models, Causality and Logical Time, Size of Vector Clock, Matrix Clocks, Virtual Time and
Physical Clock Synchronization, Global State and Snapshot Recording Algorithms, Distributed Mutual
Exclusion and Non-Token based Approaches, Quorum Based Distributed Mutual Exclusion Approaches:
Maekawa's Algorithm.
Distributed Mutual Exclusion-Token based approaches, Consensus & Agreement, Checkpointing &
Rollback Recovery, Deadlock Detection in Distributed Systems, Approaches, Algorithms for deadlock
detection: Path-Pushing, Edge Chasing, Diffusion Compution, and Global state detection Distributed
Shared Memory, Features and advantage, Distributed Minimum Spanning Tree.
Text Books :
1. Maarten Van Steen and Tanenbaum Andrew S., Distributed Systems (3 ed.), Amazon Digital Services,
2017. ISBN 978-1543057386.
Reference Books :
1. Aspnes James, Notes on Theory of Distributed Systems, Yale University,
2021.http://www.cs.yale.edu/homes/aspnes/classes/465/notes.pdf.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET329 Engineering Optimization L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To articulate, Identify and develop operational research models from the verbal description of the
real system.
CO2: To examine the mathematical tools & software that are needed to solve optimization problems.
CO3: To analyze the results to resolve resource optimization.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 1 1 1 1 2 1 3 2 3
CO2 3 2 3 2 2 3 1 1 2
CO3 1 1 1 3 2 2 3
Course Contents:
Genetic Algorithms, Differential Evolution, Particle Swarm Optimization, Ant Colony Optimization, Crow
Search Algorithm, Firefly Optimization Algorithm, Harmony Search Algorithm, TeachingLearning-Based
Optimization, Honey Bee Swarm Optimization Algorithm, Reduced Basis Technique, Design Variable
Linking Technique, Incremental Response Approach, Basis Vector , Derivatives of Static Displacements
and Stresses, Multi-objective Optimization, Parallel Processing, Utility Function Method, Inverted Utility
Function Method, Global Criterion Method, Bounded Objective Function Method, Lexicographic Method,
Goal Programming Method, Goal Attainment Method, Game Theory Approach, Inventory Problem: A
Supply Chain Perspective, Static Economic-Order-Quantity Models, Dynamic EOQ Models, Sticky Issues
in Inventory Modeling.
Text Books :
1. Singiresu S. Rao, Engineering Optimization Theory and Practice (5 ed.), John Wiley & Sons, 2019.
ISBN 978-1119454717.1
Reference Books :
1. Taha H.A., Operations Research: An Introduction (10 ed.), Pearson Global Edition, 2017. ISBN 978-
0134444017.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET330 Wireless Networks L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To explain where the wireless technologies can be applicable and evolving wireless technologies and
standards.
CO2: To articulate the architecture of various wireless technologies.
CO3: To experiment with various wireless technologies through hands-on projects.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 1 1 2 3 1 2 2 1 2 2
CO2 1 2 2 1 3 1 1 2 2 1 2 1 1 3
CO3 2 1 2 2 1 2 1 1 1 2 3
Course Contents:
Wireless technologies: Cellular systems, satellite systems, broadcast systems, wireless LANs. Propagation
modes, Fading in the Mobile Environment, Characteristics of wireless transmission (signals, antennas,
multiplexing, modulation, interference). Signal Encoding Criteria, Digital Data, Analog Signals, Analog
Data, Analog Signals, Analog Data, Digital Signals. Frequency Hopping Spread Spectrum, Direct Sequence
Spread Spectrum, Code Division Multiple Access, Generation of Spreading Sequences.
Recent trends in Wireless Networking Technology, Layered architecture for Wireless communication,
Wireless TCP, Physical and Logical Architecture. Radio and Infrared Communication. Satellite
Communications, 802.11 WLAN Standards, 802.11 MAC Layer, 802.11 PHY Layer, 802.11
Enhancements, Other WLAN Standards like 802.11g, 802.11n and 802.11p. Wireless sensor network
platforms, Communication architecture and protocols, Energy Management, Area Optimization, Time
Synchronization, Duty Cycle Optimization, Sensor Data Acquisition, Processing and Handling.
Simulation a wireless sensor network, creating an Ad-hoc Network, illustration of security threats in
wireless networks and handling them. Cisco Aironet AP antenna configuration,Configuration of a site-to-
site wireless link.Configuring LEAP/EAP using Local RADIUS Authentication for secure client
authentication.
Text Books :
1. Beard C and Stallings W., Wireless Communication Networks and Systems (1 ed.), Pearson, 2015. ISBN
978-1292108728.
2. Gordon Colbach, Wireless Networking: Introduction to Bluetooth and WiFi (1 ed.), Independently
Published, 2017. ISBN 978-1973252115.
Reference Books :
1. Velrajan Saro, An Introduction to 5G Wireless Networks (1 ed.), Amazon Digital Services LLC - KDP
Print US, 2020. ISBN 979-8643303107.
2. Vannithamby R. and S. Talwar, Towards 5G: Applications, Requirements and Candidate Technologies
(1 ed.), John Willey & Sons, 2017. ISBN 978-1118979839.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET331 Combinatorics L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 2 2 1 1 1 1 1 1 1 2
CO2 3 2 2 1 3 2 2 2 2 2 2 3 3
CO3 2 1 2 1 1 2 3 2 2 2
Course Contents:
Combinatorics, Counting and product principle, Counting over counting and sum principle, Function and
bijection principle, Relations and equivalence principle, Pigeonhole principle, Subsets, Partitions, Subsets
of fixed size, Subset of multiset, Subset of combination, Binomial theorem and Pascal’s triangle, Binomial
Coefficients, Congruences, Congruence of binomial coefficients, Permutations, One-line notation, Two-
line notation, Canonical cycle notation, Estimates for factorials, Stirling's Approximation, Ramanujan’s
factorial approximation, Selections, Equivalence and order, Finite topologies, 0 or 1 points, 2 points.
Compactness and countability, Connectivity, Separation axioms, Cayley’s Theorem on trees, Algebraic
topology, Generating Combinatorial Objects, Generating Subsets, Variable Size Decrease Algorithms,
PageRank (PgRk) algorithm for searching engine, Kernel Networks for pattern analysis, Partially ordered
sets or Posets, Graded poset, Lattices, Metroid, Linear extensions of posets, Distributive lattices,
Propositional logic, Chains and antichains, Products and dimensions.
Combinatorics on graphs, Infinite Combinatorics and Graphs, Counting trees, Minimal spanning Trees,
Chromatic polynomial, Manifold method for non-linear dimensionality reduction, Spectral methods to
solve differential equations, Turan Problem, Littlewood-Offord Problem, Catalans Numbers,
Isoperimetric Problems.
To implement discrete mathematics models- tree, graph, optimization problems, with several
Combinatorics models such as The Analytic Hierarchy Process
(AHP), PageRank (PgRk), Kernel Networks.
Text Books :
1. Bona M Miklos, A Walk-Through Combinatorics: An Introduction to Enumeration and Graph
Theory(4th ed.), WSPC, 2016. ISBN 978-9813148840.
Reference Books :
1. Mladenović Pavle, Combinatorics: A Problem-Based Approach (1st ed.), Springer, 2019. ISBN 978-
3030008307
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET332 Mobile and Networked Embedded Systems L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 3 1 2 2 1 1 2 3
CO2 2 1 2 1 2 2 1 3 2 2 1 3 2 3
CO3 2 2 2 2 1 1 2 1 2 2 1 2
Course Contents:
Smart Environments, Paradigms for pervasive networking, Networked Embedded Systems, Wireless
Embedded Networking, Applications, Network Topology, Real-time embedded systems, Components of
networked embedded systems, Centralized and distributed embedded systems, Physical sensor, Passive
sensor, Semi-passive, Active sensors, Soft sensors, Sensor nodes, Hardware architecture. Operating
systems for sensor nodes, Mobile sensor network, Sensor networks with mobile nodes.
Power management and mobile node discovery, Data transfer to mobile nodes, Routing to mobile nodes,
Sensor networks with all mobile nodes, Participatory sensing, Vehicular Networked Embedded Systems,
Embedded Networks for Car Domains, Intra -vehicular Network Embedded Systems, Event Triggered
Systems, Time Triggered Systems, Inter-Vehicular Network Embedded Systems.
In lab students will develop applications - based on smart networked embedded system - in several
application domains, including smart cities, smart mobility, smart buildings, smart grid, etc.
Text Books :
1. Chattopadhyay S., Embedded System and Design (2nd ed.), Prentice Hall India Learning Private
Limited, 2013. ISBN 978-8120347304.
Reference Books :
1. Lyla B. Das, Embedded Systems: An Integrated Approach (1st ed.), Pearson Education India, 2012.
ISBN 978-9332511675.
2. Peckol, Embedded Systems (2nd ed.), Wiley, 2019. ISBN 978-1119457497.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET333 Problem Solving using C L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To explain various concepts in C programming language and understand the problem-solving aspect.
CO2: To Implement concept of pointer and perform I/O operations in files and make use of concepts in
finding solutions to real-life problems.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 2 2 1 2 2 1 1 2 1 2 1
CO2 2 2 2 1 2 1 1 2 2 3 1
Course Contents:
Program structure, Communications with the Operating System, Library Functions, Pre-processor
Directives, Debugging and Efficiency, Memory Models, Data Types-Simple C data types, Integer Data
types, Floating Point types, Derived Data types, The ASCII Character Set, Compilation and Linking, Types
of compilers, Decision making, Loops, Switch statement, Goto statement, Null statement, Comma operator,
setjmp functions, longjmp functions, Storage classes: automatic variable, external, static, register, Arrays,
Array Indexing, Using Array names as Pointers, Character Arrays.
Advanced data types: #define statement, Variable length array, Flexible array members, Complex number
type, Type Qualifiers: Const, Volatile, Restrict, Functions, Pass by value, Pass by reference, Command
Line Arguments, Structures, Arrays of Structures, Structures of Arrays, Structures of Structures, Bit Fields
in Structures, offsetof(), Macro, unions, Typedef, Typecasting, Implicit type casting, Explicit typecasting,
Pointers- Declaration, NULL pointers, Indirection, Pointer to array, Pointer to function, Pointer to structure,
Arrays of Pointers, Passing pointers to functions.
File handling, Recursive functions, Memory allocation in a recursive method, Dynamic memory allocation,
Global Memory versus Local Memory, Error handling in C, Global Variable Errno, perror() and strerror(),
Exit status, Divide by zero errors, Interfacing C with Python code: Calling C functions from Python, Calling
python functions from C, Threads: Creating a thread, Passing arguments and returning values, Common
thread functions, Thread synchronization concepts, Mutexes, condition variables.
Generic Security Software's, Windows Firewalls, Linux Firewalls, Access Control Lists of Firewalls, Types
and Examples of Firewalls, Network-based Honeypots and Trapdoors, Virtual Private Network and its
Implementation, Network Intrusion Detection System, Network Intrusion Prevention System, Router
Security, Switch Security, Proxy Server and its Configurations, Load Balancers, IPv6 and IPv6 Security,
Secure Forwarding in Overlay Networks.
Students will implement the following programs in C language on a Linux based platform using GCC
compiler.
Text Books :
1. Gottfried Byron, Outline of Programming with C (4th ed.), McGraw Hill Education, 2018. ISBN 978-
0070145900.
Reference Books :
1. Balaguruswamy E., Programming in ANSI (8th ed.), McGraw Hill Education, 2018. ISBN 978-
9351343202.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET334 Programming using C++ L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To explain the fundamental programming concepts and methodologies to building C++ programs.
CO2: To implement various OOPs concepts including memory allocation/deallocation procedures and
Member functions.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 2 2 1 1 3 2 2 2 1 2 3 3
CO2 2 3 2 2 3 2 3 2 2 3
Course Contents:
Virtual base classes, Abstract classes, File Handling, Throwing Mechanism, Caching Mechanism,
Rethrowing an Exception, Constructors in derived classes, Nesting of classes, Exception Handling,
Opening and closing a file, Detecting End-of-file, Sequential input and output operations, Generic
Programming using template, Class template, Function template, Class member function template,
Function overloading, Standard Template Library: Containers, Stack, List, Queue, Algorithms, Iterators.
Arrays within a class, Arrays of objects, Memory allocation, Static data members, Static member functions,
Friendly functions, Objects as function arguments, Returning Objects, Constructors, Default constructor,
Parameterized constructor, Copy constructor, Multiple constructors, Constructors with default arguments,
Dynamic constructor, Destructors, Rules for overloading, Operator overloading, Unary and binary operator
overloading, Overloading using friends, Type conversion, Inheritance, Defining derived classes, Visibility
modes, Single inheritance, Multilevel inheritance, Multiple inheritance, Hierarchical inheritance, Hybrid
inheritance, Runtime Polymorphism
This lab to implement various OOPs concepts including memory allocation/deallocation procedures and
Member functions. This course lab is to strengthen problem solving ability by using object-oriented
approach and to design applications using object-oriented concepts
Text Books :
1. Stroustrup Bjarne, The C++ Programming Language. (4th ed.), Addison-Wesley Professional, 2013.
ISBN 978-0321563842.
2. Balagurusamy E., Object Oriented Programming with C++ (1st ed.), Tata McGraw Education Hill,
2013. ISBN 978-1259029936.
Reference Books :
1. Ravichandran D, Programming with C++ (3rd ed.), McGraw Hill Education, 2017. ISBN 978-
0070681897.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET335 Deep Learning L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 1 2 1 2 1 2 1 1 2
CO2 2 3 2 1 2 1 2 1 1 2 3 2
CO3 2 2 2 2 2 1 2 1 2 1 1 1 2 3
Course Contents:
Why Deep Learning?, Machine Learning: features, weights, Artificial Neural Network, loss function, cost
function, ANN: forward propagation; Backpropagation, Stochastic Gradient Descent, Batch gradient
descent, mini batch gradient descent, Optimizers: Momentum, RMSProp, Adam, Deep Learning
Experiments: Datasets, training-validation testing set, evaluation measures: accuracy, precision, recall, f-
measure, Model Improvement: Overfitting vs underfitting, Bias vs Variance, Regularization: L1, L2
regularization, Dropout, Early stopping, Data normalization, Batch normalization, Hyper parameter
Tuning: random, coarse to fine, Network architecture search.
Imbalance data problem (25) Data Augmentation in image: Cropping, Flipping, Rotation, Brightness,
Contrast, Color Augmentation, Saturation, Convolutional Neural Networks: convolution, striding,
padding, pooling, Alexnet Architecture, Image classification (ImageNet Challenge), Well known CNN
architectures VGG16&19, Residual Block, Resnet50, 1x1 convolution, XceptionNet, EfficientNet,
Transfer learning, Object Detection: setup problem and cost function, well known datasets, Evaluation
measure: Average precision, Mean average precession, Two stage detector, single stage detector, RCNN,
Fast RCNN, Faster RCNN, SSD, YOLO1-4, RetinaNet, EfficientDet, Image Segmentation: setup problem
and cost function, various dataset, Semantic segmentation, Instance segmentation, Evaluation measure:
IoU/Jacard Index, Dice score, Mean pixel accuracy, Segnet, Unet, Mask R-CNN.
Aim of this lab is to focus on gathering, pre-processing tabular, visual, textual and audio data for building
deep learning models using standard Python libraries. To train, improve, and deploy deep learning models
in different devices. To analyse performance of different deep learning models using speed, accuracy, size
trade-offs.
Text Books :
1. Goodfellow Ian, Yoshua Bengio, Aaron Courville and Yoshua Bengio, Deep learning. Vol. 1 C(1st ed.),
ambridge: MIT press, 2016. ISBN 978-0262035613
Reference Books :
1. Zhang Aston, Zack C. Lipton, Mu Li and Alex J. Smola, Dive into Deep Learning (1st ed.), Corwin,
2019. ISBN 978-1544361376.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET336 Bioinformatics and Computational Genomics L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 1 1 2 2 3 1 1 2 2 1
CO2 2 2 3 3 3 3 2 2 2 1 1
Course Contents:
Text Books :
1. Akalin Altuna, Vedran Franke,Bora Uyar and Jonathan Ronen, Computational Genomics with R(1st
ed.), CRC Press, 2020. ISBN 978-1498781862.
2. Baxevanis A. D., Wishart D. S., Bader G. D., Bioinformatics (4th ed.), Wiley, 2020. ISBN 978-
1119335580.
Reference Books :
1. Singh Dev Bukhsh and Rajesh Kumar Pathak, Bioinformatics,Methods and Applications (1st ed.),
eBook, 2021. ISBN 978-0323900058.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET338 Computational Geometry L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To articulate the representation of geometric primitives and evaluation of geometric predicates.
CO2: To implement Motion Planning and approximation methods, related problems, and algorithms.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 2 1 2 2 1 1 2 2 1 2 2 3
CO2 3 3 1 1 3 2 2 1 1 3 3
Course Contents:
Convex Hulls: naïve Algorithm, Graham’s scan, Quick Hull, Chan's algorithm, Polygon Triangulation and
partitioning, Triangulations of point sets, Triangulating a monotone polygon, Ear- cutting algorithm, Art
gallery problems, Gift Wrapping algorithm, Polyhedra, Fractional cascading, Priority search trees, Plane-
sweep intersection, Line segment intersection, Representation and intersection of planar subdivisions,
Trapezoidalization, Voronoi Diagrams, Post Office problem, Divide and conquer algorithm, History
graphs, Fortune's algorithm, Connection to Convex Hulls.
To introduce geometric algorithms and to give exposure to algorithms and data structures for geometric
problems.
Text Books :
1. Berg M. de, M. van Kreveld, M. Overmars and O. Schwarzkopf, Computational Geometry: Algorithms
and Applications (CGAA) (3rd ed.), Springer, 2008. ISBN 978-3642096815.
Reference Books :
1. Boissonnat, Jean-Daniel, Chazal, Frédéric, Yvinec and Mariette, Geometric and Topological Inference
(1st ed.), Cambridge University Press, 2018. ISBN 978-1108410892.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET339 Advances in AI L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: To explain new research trends of Artificial Intelligence and interpret advanced topics in natural
Language Processing and chat bots.
CO2: To implement the model and use the current trends in Artificial Intelligence.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 2 2 2 1 2 2 1 3 1 3 1 1 1
CO2 2 1 1 1 1 2 3 2 2 2 2 3
Course Contents:
Bootstrapping, semantic draft, zipf distribution, Never Ending Learning (NELL), co-training, multi- task
learning, coupled semi-supervised learning, macro reading vs micro reading, Open IE, lexicalized vs
unlexicalized, types of semantics, distributional semantics, frame semantics, full semantic parsing,
Davidsonian semantics, relation kernels, dependency parsing, combinatory categorial grammar,
supervised vs. semi-supervised vs. unsupervised IE, tree kernels, distant supervision, macro vs micro
reading, voted perceptron, stochastic gradient descent, multi-instance learning, self-learning, Deep
learning for IE, CNNs: subgradient, CNNs: non-linearity (sigmoid, tanh, relu, leaky relu, maxout), CNNs:
initialization, CNNs: residual networks, CNNs: regularization, Deep learning for IE: LDA, Bayesian non-
parametrics (Chinese restaurant process), Dirichlet distribution, conjugate distribution, Reinforcement
Learning: Q-learning.
Knowledge Base Inference, Challenges to Inference in KBs, Horn Clause Inference: Assumptions, Horn
Clause Inference: Issues, Horn Clause Inference: Examples, Random Walks Inference, Random Walks
Inference: PRA, Path Ranking Algorithm, Link Prediction Task, Data-driven Path finding, Neural models
for KB Inference, Matrix factorization (MF) for KB, Tensor factorization (TF) for KB, Evaluation of KB
Inference, Joint MF-TF models, Graph-based semi-supervised learning, Text as interlingua, Text for
inference, Temporal scoping, Open Question-Answering, Paraphrasing, Parsing, Rewriting, Executing,
Latent Variable Perceptron, Semantic Parsing for Question Answering, Semantic Representation of
Questions, Answer Generation.
Module III: 10 lecture hours
Recurrent Neural Network (RNN), Bidirectional RNN, RNN problems, Vanishing/Exploding Gradient
Problem, Long Short-Term Memory (LSTM), Attention – Motivation, Highway networks, Maxout
networks, additive vs. multiplicative models, attention over attention, Dependency tree RNNs, weighted
rank loss, deep feature fusion networks, Squaring probabilities, Synthetic oversampling, Bi-LSTMs,
Siamese networks vs. LSTM., Conversation Agents, Open Domain vs. Closed Domain, Challenges in
building Chatbots, Taxonomy of Models, Retrieval Based Models, Generative Models, Dialogue Systems,
Applications of Dialogue Systems, Traditional Pipeline models, End-To-End models with DL, Generative
Dialogue Modelling, Evaluation Metric, Memory Networks, End-to-End Memory Network with Single
Hop, End-to-End Memory Network with Stacked Hops, Gated End-to-End Memory Network, End-to-End
Memory Networks with Unified Weight Tying, Generative Adversarial Networks, Adversarial Nets
Framework, GANs - The Good and the Bad, GANs for NLP: Dialogue systems, GANs for NLP: Dialogue
systems Architecture, Teacher Forcing learning, Adversarial Evaluation, Automatic Evaluation vs Human
Evaluation.
Text Books :
1. Russel, Artificial Intelligence: A Modern Approach (1sted.), Pearson Education India, 2016. ISBN
9781292153964.
2. Rothman Denis, Artificial Intelligence by Example: Develop machine intelligence from scratch
using real artificial (1st ed.), Packt Publishing, 2018. ISBN 978-1788990547.
Reference Books :
1. Elaine Rich, Artificial Intelligence (3rd ed.), McGraw Hill Education, 2017. ISBN 978-0070087705.
Name of Program Bachelor of Technology
CSET429 Network Drivers and Protocols L T P C
Owning School/Department Computer Science Engineering 2 0 2 3
Pre-requisites/Exposure -
CO1: To explain purpose, types and configuration of various network drivers and deliver in-depth
knowledge of the network protocols.
CO2: To develop a network device driver from scratch.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 1 2 3 2 2 2 2 3 2 2 2 2 2
CO2 2 2 1 3 3 3 3 2 2 2
Course Contents:
OSI model, Application Layer Protocols: BOOTP: Bootstrap Protocol, DCAP: Data Link Switching Client
Access Protocol, DHCP: Dynamic Host Configuration Protocol, DNS, FTP, HTTP, S-HTTP: Secure
Hypertext Transfer Protocol, IMAP & IMAP4, IRCP, LDAP, MIME, Secure MIME, NAT: Network
Address Translation, NNTP: Network News Transfer Protocol, NTP: Network Time Protocol, POP and
POP3, Rlogin: Remote Login in UNIX Systems, RMON: Remote Monitoring MIBs (RMON1 and
RMON2), SLP, SMTP, SNMP (SNMPv1, SNMPv2 SNMPv3, SNTP, TELNET, TFTP, Who is (and
RWhois). Presentation LayerProtocols: LPP: Lightweight Presentation Protocol. Session Layer Protocols:
RPC: Remote Procedure Call Protocol.
Transport Layer Protocols, ITOT:ISO Transport Service on top of TCP, RDP: Reliable Data Protocol,
RUDP: Reliable User Datagram Protocol, Introduction to transport layer, TCP, UDP, Network Layer
Routing Protocols, BGP (BGP-4): Border Gateway Protocol, EGP: Exterior Gateway Protocol, OSPF and
RIP, IPv4, IPv6, Mobile IP, NARP and NHRP, RIPng: Routing Information Protocol next generation for
IPv6, RSVP, VRRP, Multicasting protocols: MARS, MBGP, MOSPF, MSDP, MZAP, Multicast-Scope Zone
Announcement Protocol.
Network Security Technologies and Protocols: Kerberos, Network Drivers: Bus Infrastructure, Network
hardware driver, block drivers and network drivers,Designing the kernel interface for network drivers.
Network Simulator NS3, introduction and programming.
Studio Work / Laboratory Experiments:
Explore the various network protocols (HTTP, FTP, TCP, etc.) using Wireshark. Tracing using Wireshark.
In-depth ‘Socket programming’ in Java for communication in a network. UDP socket Programming, TCP
socket Programming. Development of a network device driver from scratch. Network device Driver
examples contd. Mapping the I/O registers, Hardware reset and initialization. Use of NS-3 for simulating
network protocols. NS-3: simulating a various wireless and wired LAN topology.
Text Books :
1. Marks, Kristin B. Handbook of Server Management and Administration. 1st ed. CRC Press, 2019.
Reference Books :
st
1. Raj Rajgopal, Handbook of Heterogeneous Networking. 1 ed. CRCPress, 2018
Name of Program Bachelor of Technology
CSET430 Digital Signal Processing L T P C
Owning School/Department Computer Science Engineering 2 0 2 3
Pre-requisites/Exposure -
CO1: To design FIR and IIR filters by hand to meet specific magnitude and phase requirements.
CO2: To perform Z and inverse Z transforms using the definitions, Tables of Standard Transforms and
Properties, and Partial Fraction Expansion.
CO3: To design and implement digital filters by hand and by using MATLAB.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 1 2 3 2 2 2 2 3 2 2 2 2 2
CO2 3 2 2 1 3 3 3 2 3 2
CO3 3 2 2 2 3 2 3 2 3 2 2 2
Course Contents:
Signals and Systems, Discrete time complex exponentials signals, Elements of digital signal processing,
Technology for DSP, Building blocks to represent a digital system, Types of DSP processors, Recursive and
non-recursive systems, Canonic and Non-Canonic Structures, IIR Filter Realization, Direct form, Cascade
realization, Parallel form realization, Ladder structures, Continued fraction expansion, Realization of a
ladder structure, FIR Filter Realization, Direct, Cascade, FIR Linear Phase Realization, Infinite Impulse
Response Digital (IIR) Filter Design, Low pass Filters, High pass Filters, Band pass Filters.
Laboratory work involves developing signal processing systems on a personal computer and using them
with both real and simulated data. Generally, MATLAB and DSP processor are the working platform.
Text Books :
1. Lathi, Bhagwandas Pannalal, and Roger A. Green. Essentials of digital signal processing. 1st ed.
Cambridge University Press, 2014. ISBN 978-1107444454.
2. Salivahanan, S. Digital signal processing. 4th ed. McGraw-Hill Education, 2020. ISBN 978-
9353167431.
Reference Books :
1. Holton, Thomas. Digital signal processing: Principles and applications. 1st ed, Cambridge
University Press, 2021. ISBN 978-1108290050.
Name of Program Bachelor of Technology
CSET431 Special Topics in Computer Science L T P C
Owning School/Department Computer Science Engineering 2 0 2 3
Pre-requisites/Exposure -
CO1 : To familiarize and learn about the latest trends and research in the field.
CO2 : To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies or algorithms in Computer Science.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 1 2 3 2 2 3 2 1 2 2 2
CO2 3 2 1 2 3 3 3 2 2 2
Course Contents:
This course covers the cutting-edge topics in Computer Science, and these modules will be chosen by the
instructor based on the requirements and relevance at that point of time. These modules need to be relevant
to the industry and start-ups will also include related case studies, use cases and implementations scenarios.
Students will be working on lab work and projects to get real hands-on experience of these topics and
modules.
Students will gain practical experience by using tools and technologies related to Computer Science.
Name of Program Bachelor of Technology
CSET432 Advanced Microprocessor L T P C
Owning School/Department Computer Science Engineering 2 0 2 3
Pre-requisites/Exposure -
CO1 : To articulate the functionality of RISC architecture to design advanced microprocessors systems.
CO2 : To make of use of new interface techniques principle to access the peripherals.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 1 2 3 2 2 2 2 3 2 2 2 2 2
CO2 3 2 1 2 3 3 3 2 2 2
CO3 1 2 2 3 2 2 1 2 2 2 2
Course Contents:
Von Neuman versus Harvard architecture, RISC and CISC concepts, Advanced Microprocessors, Advanced
Microprocessors core Architecture, ARM bus technology, Advanced Microcontroller Bus Architecture,
Data flow model, Programmer's model, 64-bit general purpose register set and input/output, Current
program and save program status register, 64 bit Addressing modes, Exceptions, Interrupts, Vector Table,
Thumb Instruction set.
Cache memory and Virtual Memory, Coprocessor 15 and caches, Flushing, Cleaning, Lockdown, Memory
mapping and management support, MemoryProtection Unit, Tightly Coupled Memory (TCM), Multi-User
concept in 64-bit microprocessors, Multitasking, Multi-threading in 64-bit microprocessors.
Text Books :
1. Tahir, Muhammad, and Kashif Javed. ARM microprocessor systems: cortex-M architecture,
programming, and interfacing. 1st ed. CRC Press/Taylor and Francis, 2017.
2. Kusswurm, Daniel. Modern Arm Assembly Language Programming: Covers Armv8-A 32-bit, 64-bit,
and SIMD. 1st ed. Apress, 2020.
Reference Books :
1. Hall, Douglas V. MICROPROCESSORS AND INTERFACTNG. 3rd ed. McGraw Hill Education,
2017.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET403 Emerging Topics in Mobile Technology L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1. At the end of the course, students will be able to identify, understand and apply emerging concepts
and technologies related to mobile technology and app development using Swift.
CO2. Students will be able to develop and prototype mobile apps using Swift, evaluate the potential of
new mobile technologies, and synthesize new solutions for mobile applications.
The Emerging Topics in Mobile Technology using Swift module will introduce learners to the ever-
evolving world of mobile technology. The module will cover the basics of developing applications for
mobile devices using the Swift programming language. Learners will be exposed to key concepts such as
creating user interfaces, dealing with the device hardware, connecting to the cloud, understanding mobile
security, and creating mobile apps for different platforms. The module will include both lectures and hands-
on labs to give learners the opportunity to practice their skills. By the end of this module, learners will have
a solid understanding of the basics of mobile development and be able to apply their knowledge to their
own projects
Students will gain practical experience by using tools and technologies related to Mobile Technology.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET404 Emerging Topics in Product Design L T P C
Technology
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1. Develop an understanding of the current trends and issues in product design technology, including
digital fabrication, rapid prototyping, design for sustainability, and additive manufacturing.
CO2. Analyze how product design technology can be used to create innovative products that meet
consumer needs and create a design that incorporates these concepts.
This course will explore emerging topics in product design technology. Topics covered include the use of
digital prototyping, 3D printing, computer-aided design (CAD), rapid prototyping, and other advanced
technologies used in product design. The class will also examine the application of these technologies to
various industries, such as consumer goods, medical devices, automotive, and aerospace. In addition,
students will be introduced to topics such as sustainability, product lifecycle management, and market
analysis. Finally, the course will cover the tools and techniques used to create innovative products, as well
as the process for commercializing them.
Students will gain practical experience by using tools and technologies related to Product Design
Technology.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET405 Emerging Topics in Augmented & Virtual L T P C
Reality
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: Understand the fundamentals of augmented and virtual reality and its applications in various
industries.
CO2: Explore the current trends and developments in augmented and virtual reality technology and its
implications for businesses.
CO-PO/PSO Mapping
Emerging Topics in Augmented and Virtual Reality provides a comprehensive overview of the cutting-
edge technologies, innovations, and applications of augmented and virtual reality. The course will cover
the technical aspects of virtual reality, its history and development, and the contemporary applications and
challenges associated with the technology. The course will also explore emerging trends and topics such as
haptics, volumetric capture, gesture interfaces, and spatial computing. This course will equip students with
an understanding of the potential of augmented and virtual reality, and the challenges associated with the
technology.
Students will gain practical experience by using tools and technologies related to Augmented Reality and
Virtual Reality.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET406 Emerging Topics in IoT and Robotics L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1. Gain a comprehensive understanding of the fundamentals of IoT and Robotics, including the
potential applications and implications of these technologies in the world today.
CO2. Develop the ability to analyze and evaluate current and emerging trends in IoT and Robotics, and to
develop strategies to deploy these technologies in a business context.
This course will provide an in-depth look at current and emerging topics in IoT and Robotics. We will
explore the technological advancements in this field, such as artificial intelligence, machine learning, and
deep learning. We will also discuss the ethical implications of these technologies, as well as the challenges
and opportunities they present. Additionally, students will gain practical skills in programming, interfacing,
and integrating IoT/Robotics components and systems. By the end of the course, students will be well-
versed in the fundamentals of IoT and Robotics and have the skills needed to create and implement projects
and applications in this field.
Students will gain practical experience by using tools and technologies related to IoT and Robotics.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET407 Emerging Topics in Quantum Computing L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
This course will provide an overview of emerging topics in quantum computing, such as quantum
algorithms, quantum error correction, quantum simulation, and quantum networks. We will discuss the
potential applications of quantum computing and explore the latest research findings in this field. The
course will also provide an overview of the theoretical framework underpinning quantum computing and
discuss the practical considerations associated with quantum computing hardware and software.
.
Studio Work / Laboratory Experiments:
Students will gain practical experience by using tools and technologies related to Quantum Computing.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET408 Emerging Topics in Drone Technology L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1. Develop an understanding of the various emerging applications of drone technology in different
sectors, such as military, energy, surveillance, delivery, and more.
CO2. Analyses the advantages and disadvantages of using drones in different contexts and evaluate the
legal, ethical, and safety implications of using drone technology.
Emerging topics in drone technology will include the use of drones in agricultural production and the
development of autonomous drones. We will explore topics such as the use of drones in precision
agriculture and the development of new drone technologies, such as autonomous drones. Additionally, we
will look at the impact of drone technology on economic and social development, as well as the regulatory
framework in which drones operate. We will also discuss how drones can be used in various other
industries, such as delivery services and media production. Finally, we will explore the ethical implications
of drone technology and the implications of its use on global security.
Students will gain practical experience by using tools and technologies related to Drone Technology.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET409 Emerging Topics in Cloud Computing L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1. Students will be able to analyses emerging trends in cloud computing, such as serverless
computing, containers, and edge computing.
CO2. Students will be able to evaluate the benefits and challenges of the various cloud computing models
and be able to recommend the most appropriate cloud model for a specific application.
.
CO-PO/PSO Mapping
Students will gain practical experience by using tools and technologies related to Cloud Computing
.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET410 Emerging Topics in Full Stack L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1. Understand the fundamentals of emerging technologies in Full Stack development, such as serverless
computing, microservices, and containerization.
CO2. Develop the skills to deploy applications and services using the most up-to-date tools and techniques
for developing robust Full Stack solutions.
Full stack web development is a broad and rapidly evolving field. As technology advances, new topics are
emerging that are becoming increasingly important to full stack developers. These topics include machine
learning, artificial intelligence, blockchain, cloud computing, data science, and mobile app development.
Machine learning and artificial intelligence are becoming increasingly important for creating applications
that can respond to user input and learn from user interactions. Blockchain is a secure and distributed ledger
technology that has the potential to revolutionize the way data is stored and used. Cloud computing offers
developers a way to store and access data in the cloud, as well as create applications that can be used across
multiple devices and platforms. Data science is a method for extracting insights from large datasets and is
becoming increasingly important for creating predictive applications. Finally, mobile app development is a
key aspect of full stack development, and developers need to be able to create applications that are
optimized for different devices.
Students will gain practical experience by using tools and technologies related to Full Stack
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET411 Emerging Topics in DevOps L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1. Develop an understanding of the core principles, practices, and technologies of modern DevOps,
including containerization, automation, and cloud-native solutions.
CO2. Identify and implement best practices for aligning DevOps processes and tools with organizational
objectives and desired outcomes.
DevOps is a rapidly growing practice that is changing the way organizations develop, deploy, and monitor
software applications. It is a combination of tools, processes, and people that enables organizations to
rapidly develop, test, deploy, and monitor applications in a more efficient and cost-effective manner.
Emerging topics in DevOps include containerization and microservices, infrastructure automation,
distributed computing, cloud computing, and DevOps Security. Containerization and microservices allow
for increased scalability, flexibility, and portability, while infrastructure automation reduces the need for
manual configuration and accelerates the deployment of applications. Distributed computing enables
organizations to make use of multiple nodes for increased scalability and performance, and cloud computing
enables organizations to take advantage of the scalability and cost benefits of cloud computing. DevOps
Security is a critical element of DevOps that ensures applications are secure and compliant with regulatory
requirements. With the increasing adoption of DevOps, organizations are quickly realizing the benefits of
improved agility, scalability, cost savings, and security.
Students will gain practical experience by using tools and technologies related to DevOps
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET412 Emerging Topics in RPA L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1. Demonstrate a comprehensive understanding of the principles and potential applications of Robotic
Process Automation (RPA).
CO2. Evaluate the most cutting-edge developments and trends in RPA and identify opportunities to apply
this technology to improve business processes.
Robotic Process Automation (RPA) is an emerging field of technology that uses software robots to automate
business processes. RPA can be used to automate mundane tasks and complex processes, allowing
businesses to reduce costs, increase efficiency, and improve customer service. RPA is being used in a
variety of industries, such as finance, healthcare, retail, and manufacturing, to streamline operations and
reduce manual labor. Emerging topics in RPA include natural language processing, cognitive computing,
and machine learning. Natural language processing allows robots to understand and respond to commands
given in natural language, while cognitive computing enables robots to think like humans and make
decisions based on data. Machine learning allows robots to learn from their experiences and apply that
knowledge to new situations. With these advances, RPA is quickly becoming an essential tool for
businesses to gain a competitive edge.
.
Studio Work / Laboratory Experiments:
Students will gain practical experience by using tools and technologies related to Robotic Process
Automation
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET414 Emerging Topics in Data Science L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1. Develop an understanding of the current trends, tools, and techniques applicable to data science in
order to apply them to solve real-world business problems.
CO2. Explore and analyze large datasets using advanced analytics and machine learning techniques to
gain insights and develop effective data-driven solutions.
CO-PO/PSO Mapping:
Data Science is a rapidly growing field with new and exciting topics emerging all the time. Some of the
most interesting and emerging topics in Data Science include data visualization, machine learning, natural
language processing, data mining, deep learning, big data analytics, and predictive analytics. Data
visualization is the process of creating visual representations of data, such as graphs, charts, and maps, to
make it easier to understand and interpret. Machine learning is the process of using algorithms to identify
patterns and trends in data. Natural language processing makes it possible for machines to understand and
interpret human language. Data mining is the process of extracting information from large datasets. Deep
learning is a subset of machine learning that is used to create models for more accurate predictions and
analysis. Big data analytics is the process of extracting, transforming, and loading large datasets for analysis
and decision making. Predictive analytics is the process of using data to make predictions about future
events. These topics and more are all part of the ever-growing field of Data Science.
Students will gain practical experience by using tools and technologies related to Data Science
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET415 Emerging Topics in Cyber Security L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1. Develop an understanding of the emerging threats, technologies, and strategies for defending and
protecting an organization’s cyber security.
CO2. Analyse and evaluate the effectiveness of current cyber security protocols and systems and develop
best practices for mitigating and preventing new threats.
.
CO-PO/PSO Mapping
Cyber security is an ever-evolving field as new technologies and threats continue to emerge. In the past few
years, there have been several emerging topics in cyber security that have become increasingly important,
including cloud security, artificial intelligence, the Internet of Things (IoT), mobile security, blockchain
technology, and quantum computing. Cloud security is the practice of protecting cloud-based systems,
services, and data from malicious actors. Artificial intelligence is being used to detect and prevent cyber-
attacks in real-time, as well as to automate manual security tasks. The Internet of Things (IoT) is a rapidly
growing network of connected devices, all of which need to be secured. Mobile security is the practice of
protecting mobile devices, including phones, tablets, and laptops, from threats. Blockchain technology is a
distributed, secure ledger that is being used to store and share data and transactions, increasing security.
Lastly, quantum computing is a new technology that has the potential to revolutionize computing power,
with both positive and negative implications for cyber security. All of these technologies and topics must
be addressed in order to ensure the security of systems, data, and users.
Students will gain practical experience by using tools and technologies related to Cyber Security
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET416 Emerging Topics in Blockchain L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1. Develop an understanding of emerging trends and technologies in Blockchain and how they are
being used to solve business problems.
CO2. Identify potential use cases and applications of Blockchain-based solutions and evaluate the
associated risks and benefits of implementation.
CO-PO/PSO Mapping
The syllabus on emerging topics in Blockchain will cover the most recent developments in the technology,
including topics like distributed ledger technology, decentralized applications, cryptocurrency and smart
contracts. We will discuss the different applications of blockchain technology, the benefits and challenges
of using this technology, and the various ways it can be implemented. We will also look at various case
studies of companies that have successfully implemented blockchain technology, as well as the potential
implications for businesses and other organizations. Finally, we will also explore the potential for
blockchain to be used to create new forms of digital money, and the impact this could have on the global
economy.
Students will gain practical experience by using tools and technologies related to Blockchain.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET417 Emerging Topics in Artificial Intelligence L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: Develop an understanding of the current trends and challenges of emerging Artificial Intelligence
(AI) technologies.
CO2: Identify and analyse potential applications of AI in the context of real-world problems.
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PSO1 PSO2 PSO3
CO1 3 2 3 2 3
CO2 2 3 3 3 2
CO3 3 3 3 2 3 2 2
The Emerging Topics in Artificial Intelligence course will provide an overview of the current state of
Artificial Intelligence (AI) research. Students will learn about the major topics in AI such as machine
learning, natural language processing, computer vision, robotics, and reinforcement learning. Additionally,
students will be exposed to the latest applications of AI in various domains such as healthcare, finance, and
autonomous vehicles. They will learn how to apply AI algorithms and explore the ethical implications of
AI. Finally, students will get an introduction to the potential future of AI and the implications of these
technologies on society.
Students will gain practical experience by using tools and technologies related to Artificial Intelligence.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET419 Introduction to Generative Artificial L T P C
Intelligence
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: Understand the foundational principles and concepts of generative artificial intelligence, including
the underlying algorithms and techniques used in creative AI systems.
CO2: Apply the basic generative algorithms for creative tasks, such as image generation, text generation,
and artistic expression.
CO3: Implement generative AI techniques in real-world scenarios through practical implementation to
produce effective solutions.
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PSO1 PSO2 PSO3
CO1
CO2
CO3
Course Contents:
Module I 8 lecture hours
Overview of Artificial Intelligence and its subfields, Introduction to Generative AI and its applications,
Understanding creative algorithms in the context of generative systems, Introduction to machine learning
and its role in generative models, Types of generative models: GANs, VAEs, and more, Exploring the
principles of creative algorithms, Introduction to Large Language Models, Case studies of successful
applications in various domains, designing simple creative algorithms
List of Experiments:
Text Books :
1. Smith, J. K. Introduction to Generative Artificial Intelligence: Fundamentals
and Applications. Academic Press, 2021.
2. Wang, H., & Chen, Q. Generative AI Explained: A Beginner's Guide to Creative
Algorithms. Springer, 2020.
3. Martin Musiol. Generative AI Navigating the Course to the Artificial General
Intelligence Future. Wiley, 2023.
Reference Books :
1. A Johnson, M. L. Generative AI Unveiled: A Primer on Creative Algorithms.
Academic Press, 2022.
2. Rodriguez, A. R. Exploring Generative Artificial Intelligence: Foundations and
Applications. Springer, 2021.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET424 Advanced Topics in Generative Artificial L T P C
Intelligence
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
Course Outcomes (COs)
On completion of this course, the students will be able to:
CO1: Understand the intricate workings and structures of advanced generative models.
CO2: Evaluate and analyze the effectiveness of fine-tuning techniques for various generative models.
CO3: Implement advanced generative models in solving complex problems across various domains
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PSO1 PSO2 PSO3
CO1
CO2
CO3
Course Contents:
Module I 8 lecture hours
Introduction to advanced generative models, Large language models, Exploration of current
challenges and opportunities in the field, Survey of state-of-the-art generative models,
Understanding Flow-based models, Autoencoders, and Transformer-based architectures, Case
studies showcasing the strengths and limitations of different models, Transfer learning principles
in generative models, Fine-tuning and adapting pre-trained models for specific tasks
List of Experiments:
1) Implement transfer learning techniques on pre-trained generative models for specific tasks.
2) Fine-tune a pre-trained generative model and evaluate its performance on a novel dataset.
3) Design and train a generative model with attention mechanisms for a given application.
4) Explore the principles of image-to-image translation using generative models.
5) Develop and test a generative model for converting images from one domain to another.
6) implement style transfer techniques.
7) Create unique neural art using generative models and style transfer algorithms.
8) applications of generative AI in video synthesis.
9) Develop a generative model capable of generating or manipulating video content.
10) implement integration of reinforcement learning with generative models.
11) Implement a generative model that incorporates reinforcement learning principles.
12) Develop a sophisticated NLP-based generative model for creative text synthesis.
13) Collaborate on a project applying generative models to solve scientific problems.
14) Develop strategies to enhance the robustness and interpretability of a generative model.
Text Books :
1. Husain, Amir. Generative AI for Leaders: Atlantic Press, 2023.
2. Smith, J. K., & Johnson, L. M. Advances in Generative Artificial Intelligence: Cutting-
Edge Techniques and Applications. New York, NY: Springer, 2023.
3. Anand Nayyar, Arun Solanki, Mohd Naved. Generative Adversarial Networks for Image-to-
Image Translation. Elsevier Science, 2021.
Reference Books :
1. Foster David, Friston Karl. Generative Deep Learning: Teaching Machines To Paint, Write,
Compose, and Play. Second Edition. O’Reilly, 2023.
2. Chen, Q., & Wang, H. Deep Generative Models: Theory, Algorithms, and Applications.
Cambridge, MA: MIT Press, 2022.
Name of Program Bachelor of Technology (Computer Science Engineering)
SCSE3042 Generative AI and Large Language Models on L T P C
AWS
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
Course Outcomes (COs)
On completion of this course, the students will be able to:
CO1: Understand the principles of Deploy and Manage Generative AI Models on AWS.
CO2: Apply skills to Mastery of AWS Tools for Model Fine-Tuning and Optimization.
CO3: Implement GenAI and LLM skills to address real-world challenges, with expertise in securing and
automating LLM workflows
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PSO1 PSO2 PSO3
CO1
CO2
CO3
Course Contents:
Module I 8 lecture hours
Overview of LLMOps: Concepts, significance, and challenges of deploying and maintaining large language
models (LLMs). Key differences between MLOps and LLMOps. Computational challenges: Cost, scaling,
and memory issues. Introduction to AWS ecosystem: Amazon SageMaker, EC2, Lambda, and Elastic
Kubernetes Service (EKS). AWS managed services for LLM deployment and scaling. Introduction to Cloud
Service Model for AI, Cloud Deployment Model for AI, Benefits of Cloud Computing,
List of Experiments:
1) Setting Up an AWS Environment for LLM Development
2) Fine-Tuning a Pre-Trained Generative Model (BERT/GPT)
3) Deploying an LLM for Real-Time Inference
4) Optimizing LLM Inference with AWS Elastic Inference
5) Building a CI/CD Pipeline for LLM Deployment
6) Monitoring and Logging Model Performance
7) Implementing Data Security for LLMs on AWS
8) Optimizing Model Size with Model Compression Techniques
9) Handling Large-Scale Data with Amazon S3 and Athena
10) Building a Serverless Application for LLM Inference Using AWS Lambda
11) Leveraging Transfer Learning for Domain Adaptation in LLMs
12) Implementing A/B Testing for Model Performance Evaluation
13) Creating Custom LLMs with AWS SageMaker JumpStart
14) Analyzing Model Interpretability and Bias in Generative AI
Text Books :
1) Webber, Emily. Pretrain Vision and Large Language Models in Python: End-to-end Techniques for
Building and Deploying Foundation Models on AWS. Apress, 2024.
2) Auffarth, Ben. Generative AI with LangChain: Build Large Language Model (LLM) Apps with Python,
ChatGPT, and Other LLMs. O'Reilly Media, 2023.
Reference Books :
1) Fregly, Chris, Antje Barth, and Shelbee Eigenbrode. Generative AI on AWS: Building Context-Aware
Multimodal Reasoning Applications. O'Reilly Media, 2024.
2) Marr, Bernard. Generative AI in Practice: How to Use AI Tools to Improve Your Business. Wiley,
2023.
Name of Program Bachelor of Technology (Computer Science Engineering)
SCSE3043 Prompt Engineering for Generative AI L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
Course Outcomes (COs)
On completion of this course, the students will be able to:
CO1: Understand the principles of prompt engineering and how it applies to various AI models.
CO2: Apply skills to optimize prompts for text and image generation.
CO3: Implement prompt engineering skills to solve real-world problems in multiple domains.
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PSO1 PSO2 PSO3
CO1
CO2
CO3
Course Contents:
Unit/Module I: Foundations of Prompt Engineering 8 lecture hours
What is Generative AI?, Overview of models: GPT, DALL·E, and other generative models, The role of
prompt engineering in AI interactions, Applications of prompt engineering in various domains;
Understanding the structure of prompts: clarity, specificity, context, How models interpret and generate
responses based on prompts, Exploring common mistakes and pitfalls in prompt creation; The architecture
of language models (e.g., GPT-3, GPT-4), How models generate text based on input, Experimenting with
different styles of prompts for various outputs; Overview of image-generative models (DALL·E, Stable
Diffusion), Designing prompts for images, Exploring multimodal models (text + image).
Unit III: Advanced Prompt Engineering Techniques and Applications 6 lectures hours
How to create prompts for specific domains (legal, healthcare, finance), Real-world applications in these
domains (e.g., AI chatbots, content generation); Using External Data and APIs in Prompts, Integrating
external data into prompts for retrieval-augmented generation, How to use APIs and datasets to enhance AI
outputs; Advanced Techniques: Controlling AI Behavior, Prompt templates for complex AI behaviors,
Multi-layered prompts for handling ambiguity and variability in outputs.
Unit IV: Ethics, Limitations, and Future of Prompt Engineering 6 lectures hours
Discussing AI-generated content: bias, misinformation, and hallucinations, Ensuring responsible use of
generative AI through prompt design, Case studies: Unintended consequences of poorly designed prompts;
Limitations of AI models in understanding complex prompts, Strategies for overcoming challenges in
specific use cases; Future Trends in Prompt Engineering, The evolving role of prompt engineering in AI
development, Emerging techniques and tools for refining and optimizing prompts.
List of Experiments:
1) Exploring and Modifying Prompts with GPT Models to Change Text Generation
2) Generating Images with DALL·E Using Descriptive Prompts.
3) Create prompts that combine text and image generation to explore multimodal models and their
capabilities.
4) Generate text in multiple languages by crafting multilingual prompts, analyzing the model’s
language understanding and output.
5) Create effective prompts for text summarization of articles, books, or reports.
6) Create prompts for generating creative stories or narratives, experimenting with tone, style, and
genre.
7) Refine image generation prompts to see how slight changes can produce different image variations.
8) Create domain-specific prompts (e.g., legal, medical) and evaluate how well the model generates
accurate and relevant content.
9) Design a chain of prompts to generate a sequence of outputs for complex tasks (e.g., first generating
an outline, then expanding each point).
10) Design prompts that allow the creation of a simple chatbot capable of answering specific questions
with conditions. - chatbot platforms (e.g., Rasa, Dialogflow).
11) Integrate external data into prompts to generate context-specific responses (e.g., using APIs to fetch
live data). - APIs (e.g., OpenWeather, news APIs).
12) Develop prompt templates to automate the creation of specific types of content, such as social
media posts, product descriptions, or blog articles.
13) Create prompts that explore potential biases in the model’s responses, analyzing outputs for racial,
gender, or cultural bias.
14) Create prompts that intentionally produce harmful or unethical content, then refine them to prevent
such outputs and ensure responsible AI use.
Text Books :
1. David Scott Bernstein. Prompt Engineering for Everyone: A Comprehensive Guide to Unlock the
Potential of ChatGPT and AI-Language Models. The Passionate Programmer, 2023.
2. James Phoenix, Mike Taylor. Prompt Engineering for Generative AI. O'Reilly Media, Inc., 2024.
Reference Books :
1. James Phoenix, Mike Taylor. Prompt Engineering for Generative AI: Future-Proof Inputs for
Reliable AI Outputs. O'Reilly Media, 2023.
2. Ian Khan. The Quick Guide to Prompt Engineering: Generative AI Tips and Tricks for
ChatGPT, Bard, Dall-E, and Midjourney. Packt Publishing, 2023.
Key Tools and Platforms:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PSO1 PSO2 PSO3
CO1
CO2
CO3
Course Contents:
Module I: Algebraic topology and integral geometry: theory . 11 lecture hours
Basics of set theory, group theory. Abelian groups, algebraic topology, homology, chains, cycles
boundaries, boundary operator, fundamental lemma of homology, Betti numbers, short and long exact
sequences, Betti numbers, hierarchical topology, persistent homology, differential topology, Morse theory,
Morse-Smale complex segmentation, Integral geometry, Weyl’s Tube formula, Minkowski functionals,
Lifshitz-Killing curvature
Unit II: Computational framework and algorithms. 11 lecture hours
Simplices, simplicial complex, cech complex, alpha complex, simplicial topology, triangulation data
structure, Delaunay triangulation, Voronoi diagrams, incremental algorithm of Betti numbers, boundary
matrix, boundary matrix reduction, filtration, excursion sets, level sets, superlevel sets, persistent homology
algorithm, MS complex algorithm, Voronoi diagram data structure, alphashapes
Unit III: Applications 06 lectures hours
Cosmology, cosmological principle, standard cosmological model, cosmic microwave background (CMB)
CMB data analysis, Healpix library, Computational geometric and algorithmic library (CGAL), Topology
toolkit library, visualization toolkit (VTK), paraview,
List of Experiments (Laboratory/projects)
Coding with CGAL, HEALPix Libraries, Writing own codes to manipulate triangulation datasets, create
filtrations, boundary matrix, homology and persistent homology computation. Implement and visualize MS
complex of datasets, coding with TTK and VTK. All of the lectures and practical will be geared towards
the analysis of real datasets from various scientific and commercial disciplines.
Text Books :
1. Edelsbrunner, Herbert and Harer, John, Computational topology: An introduction, Americal
Mathematical Society, reprint, 2022
2. Munkres James, Topology, Pearson Education Limited, 2014
Reference Books :
1. Dey, Tamal K. and Wang, Husu, Computational topology for Data Analysis, Cambridge
university press, 2016
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET498 Computational topo-geometrical data analysis L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1: Relate and explain the ethical considerations in the development and deployment of AI.
CO2: Analyze and evaluate the social and ethical impacts of AI on various stakeholders and society as a
whole.
CO3: Extend propose ethical decision-making models relevant to AI applications.
CO4: Make use of the implications of AI on privacy, data protection, bias, fairness, transparency, and
accountability.
CO5: Explain and address ethical challenges in AI research, development, and governance.
CO6: Develop and discuss the ethical responsibilities of AI practitioners, policymakers, and
organizations.
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PSO1 PSO2 PSO3
CO1
CO2
CO3
Course Contents:
Recent Case Study of Ethical Initiatives in Healthcare, autonomous vehicles and defense.
Text Books :
1.Paula Boddington, ―Towards a Code of Ethics for Artificial Intelligence‖, Springer, 2017
2.Markus D. Dubber, Frank Pasquale, Sunit Das, ―The Oxford Handbook of Ethics of AI‖, Oxford
University Press Edited book, 2020.
Reference Books :
1. Wallach, W., & Allen, C, ―Moral machines: caching robots right from wrong, Oxford University Press,
2008.
2. Bostrom and E. Yudkowsky. ―The ethics of artificial intelligence‖. In W. M. Ramsey and K. Frankish,
editors, The Cambridge Handbook of Artificial Intelligence, Cambridge University Press, Cambridge,
2014.
Name of Program Bachelor of Technology (Computer Science Engineering)
SCSE4041 Prompt Engineering L T P C
Owning School/Department School of Computer Science Engineering and 3 0 0 3
Technology
Pre-requisites/Exposure -
Course Outcomes (COs)
On completion of this course, the students will be able to:
CO-PO/PSO Mapping
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PSO1 PSO2 PSO3
CO1
CO2
CO3
Course Contents:
Module II:
8 lecture hours
Advanced Prompting Techniques
Contextual prompts: incorporating conversation history, topic adaptation, and refining user intent.
Dynamic, adaptive, and conditional prompts: using prompts that adapt based on responses, conditional
branching, and multi-turn prompts. Multimodal prompts: integrating text with images, audio, or video to
enhance user interaction. Prompt chaining and task decomposition: breaking down complex tasks into a
sequence of prompts to improve model responses. Evaluation and iteration: methodologies for systematic
prompt testing, evaluation metrics, and automated prompt refinement.
Module III: 6 lectures hours
Text Books :
• "AI and Machine Learning for Coders" by Laurence Moroney - O'Reilly Media, 2020.
• "Prompt Engineering for Large Language Models: A Practical Guide" by Lewis Tunstall,
Leandro von Werra - Packt Publishing, 2024 (anticipated).
Reference Books :
• "Generative Deep Learning: Teaching Machines to Paint, Write, Compose, and Play" by
David Foster - O'Reilly Media, 2019.
• "Artificial Intelligence: A Guide for Thinking Humans" by Melanie Mitchell - Farrar,
Straus and Giroux, 2019.
• Prompt Engineering Guide by Prompt Engineering Hub (online resource).
• OpenAI API Documentation, Anthropic AI Documentation, and Hugging Face Platform
Tutorials.
Minor in AI (I,
II, III, IV)
Name of Program Bachelor of Technology
CSET291 Data Structure Fundamentals L T P C
Owning School/Department Computer Science Engineering 4 0 0 4
Pre-requisites/Exposure -
CO1 : To explain the operations of arrays, linked list, stacks and queues.
CO2 : To examine the binary trees, binary search trees, heaps and AVL trees.
CO3 : To implement preliminary concepts array, linked list, stacks and queues, tree, graph.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 3 1 2 1 2
CO2 3 3 2 2 2 1 2 1 3
CO3 3 3 2 2 2 1 2 2 2 1 3
Course Contents:
Data Structures (What, Why, Where), Arrays, (Search, insert, delete, merge), Linked list, (Search, insert,
delete, merge), bubble sort, selection sort, counting sort, radix sort.
Circularly and Doubly linked list (Traversal, Insertion, Deletion), Stacks (Traversal, Insertion, Deletion),
Simple Queue (Insertion, Deletion), Circular Queue (Insertion, Deletion, Traversal), Tree Data Structures,
Height, Complete, Full, Perfect Trees.
Tree Preorder traversal, Postorder traversal, Inorder traversal, Binary search trees, BST searching, BST
insertion, BST deletion, Heap, Max heap, min heap, Heapify, Heap sort, Priority queues, Priority queues
using max heap and min heap.
AVL trees, AVL trees traversal, AVL trees insertion, AVL trees deletion, Hashing, Hash Functions, Hash
Tables, Hashing Collision Resolution Strategies, Separate Chaining, Open Addressing, Double Hashing,
Graphs, Adjacency matrix, Adjacency list, Incidence matrix, Graph traversal, BFS, DFS.
Text Books :
1. Balagurusamy, E. Data Structures Using C. 1 ed. McGraw Hill Education, 2019. ISBN 978-
9353161835.
Reference Books :
1. Jagtap, Amol M., and Ajit S. Mali. Data Structures Using C: A Practical Approach for Beginners. 1
ed. CRC Press, 2021. ISBN ISBN 978-1000470741.
Name of Program Bachelor of Technology
CSET292 Introduction to Algorithm Design and L T P C
Development
Owning School/Department Computer Science Engineering 4 0 0 0
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 2 3 1 3 1
CO2 1 2 3 1 3 1
CO3 1 2 3 1 3 1
Course Contents:
Algorithms need (Why, what where), Analysing control statement, Loop invariant and the correctness
of the algorithm, Analysis of Algorithm: Amortized analysis, Asymptotic Notations: Big Oh, Theta,
Omega, Average, Best and worst-case analysis of Time Complexity and Space Complexity, Iterative
method complexity, Recurrence relations, Master’s Theorem.
Divide and Conquer Algorithm, Multiplying large Integers Problem, Binary Search, Merge Sort, Quick
Sort, Complexity analysis of quick sort, Matrix Multiplication (Strassen’s matrix multiplication),
Complexity analysis of Matrix Multiplication.
Greedy Algorithms, Disjoint sets union, find, Spanning Tree, Minimum Spanning Tree, Kruskal’s
algorithm, Prim’s algorithm, Analysis of Minimum spanning trees algorithms, Single source shortest
path in graphs, Dijkstra’s algorithm, The Knapsack Problem, Analysis of Knapsack problem.
Dynamic Programming, The Principle of Optimality, 0-1 knapsack problem, Matrix chain
multiplication, All Points Shortest path (Floyd Warshall algorithm), Exploring Graphs: BFS,
Applications of DFS- bi-connectivity, Backtracking and Branch and Bound, The Eight queen’s
problem, Graph Coloring.
Text Books :
1. Cormen, Thomas H., Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. Introduction to
algorithms. 4th ed. The MIT Press, 2022. ISBN 978-0262367505.
2. La Rocca, Marcello. Advanced Algorithms and Data Structures. 1st ed.), Manning, 2021. ISBN 978-
1617295485..
Reference Books :
1. Karumanchi, Narasimha. Algorithm Design Techniques: Recursion, Backtracking, Greedy, Divide
and Conquer, and Dynamic Programming. 1st ed. Career Monk Publications, 2018. ISBN 978-
8193245255.
Name of Program Bachelor of Technology
CSET391 Artificial Intelligence L T P C
Owning School/Department Computer Science Engineering 4 0 0 4
Pre-requisites/Exposure -
CO1: To explain the applications of artificial intelligence, categorize various problem domains and basic
knowledge representation.
CO2: To examine Machine Learning, Deep Learning, and Neural Networks algorithms.
CO3: To Implement Supervised and Unsupervised Learning approaches for real-life problems.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 3 2 2 3 3
CO2 3 3 3 2 3 2 3
CO3 3 3 3 2 2 3 3
Course Contents:
Artificial Intelligence, Intelligent Agents, Agent structure, Agent Types, Environments and its properties,
Environment programs, Types of Environments (25), Search Strategies for problem solving, Search
Strategies Evaluation Criteria, Uninformed Search, Uniform cost search, Depth-First Search (DFS),
Breadth First Search (BFS), Depth Limited search, Iterative deepening depth first search, Bidirectional
search, Informed Search, Heuristic Functions, Best-FirstSearch method, A* search.
Machine learning, Regression- Linear, Linear regression with gradient descent, Batch gradient descent,
Polynomial regression, Decision tree regression, Formalizing the Learning Problem, Classification, Types
of Classification techniques and its applications, Logistic regression hypothesis representation, Decision
boundary, Regularization, Overfitting and underfitting, Gradient descent with regularization, Support
Vector Machine, Random Forest, Unsupervised Learning, K-means, C-means.
Artificial Neural Networks (ANN), Network structures, Optimal network structure, Activation Functions
and types, Perceptron, Multi-layer Perceptron, Irrelevant and Redundant Features, linearly separable
functions, Multilayer Feed-Forward Networks, Back propagation concept, Back-propagation as gradient
descent search, Bayesian Methods for Learning.
Module IV: 10 lecture hours
Convolution Neural Network (CNN), Layers in a CNN, Recurrent Neural network (RNN), Working of
RNN, FeedForward NNs vs RNNs, Measures of Classification Performance, Confusion Matrices and its
applicability, ROC Curves, Area Under ROC Curves.
Text Books :
1. Rich, Elaine, Kevin Knight, and S. B. Nair. Artificial Intelligence. 3 ed. McGraw Hill Education, 2017.
ISBN 978- 0070087705.
2. Alpaydin, Ethem. Introduction to machine learning. 4 ed. MIT Press, 2020. ISBN 978-0262043793.
Reference Books :
1. Sabouret, Nicolas. Understanding artificial intelligence. 1 ed.), Chapman and Hall/CRC, 2020. ISBN
978-1000284158.
Name of Program Bachelor of Technology
CSET392 Applied AI L T P C
Owning School/Department Computer Science Engineering 4 0 0 4
Pre-requisites/Exposure -
CO1: To explain Supervised and Unsupervised AI models for solving real-life problems.
CO2: To examine the need for Artificial Intelligence and the limitations of conventional methods.
CO3: To implement the ideas behind selection of various AI methods.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 3 2 3 2
CO2 2 3 3 2 3 3 3
CO3 2 2 3 2 3 2 3
Course Contents:
The AI basics, Problems, The core assumptions of AI, Need of AI over the traditional methods, AI
Techniques, The level of the Model, Criteria for success and failure of the models, AI in Natural language
processing, Syntactic Processing, Semantic analysis, Discourse and pragmatic processing, Spell checking,
Measures of WordNet similarity, Sentiment analysis and opinions on the web, Sentiment analysis Use case,
Exploring sub-discipline of AI: Machine Learning, Supervised learning, Unsupervised learning,
Reinforcement learning, Statistical Reasoning: Probability and Bayes’ Theorem, Bayesian Network.
Detecting anomalies in online social networks use case, Recommender Systems, Content Filtering,
Collaborative Filtering, Matrix Factorization method, Recommender systems Case study, Overview of ML
and DL Applications in Agriculture, Principal Component Analysis and Regression Applications in
Agriculture, Predicting crop yield use case, Classification and Clustering Methods in Agriculture, ML And
DL for Soil and Crop Image Processing.
Time series analysis, Random Processes; Stationarity & Ergodicity, Auto- and cross-correlation functions;
Partial correlation functions, Linear random processes; Auto-regressive, moving average and ARMA
models, Models for non-stationary processes; Trends, heteroskedasticity and ARIMA models, Machine
learning for Time series forecasting, Use case for time series forecasting.
Text Books :
1. Yao, Mariya, Adelyn Zhou, and Marlene Jia. Applied artificial intelligence: A handbook for business
leaders. 1 ed. TOPBOTS, 2018. ISBN 978- 0998289027.
2. Géron, Aurélien. Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow. " 2nd ed.
O'Reilly Media, 2019. ISBN 978-1491962299.
Reference Books :
1. Goodfellow, Ian, Yoshua Bengio, and Aaron Courville. Deep learning. Adaptive computation and
machine learning. 1 ed. MIT Press, 2017. ISBN 978-0262035613.
2. Liu, Yuxi Hayden. Python machine learning by example: implement machine learning algorithms
and techniques to build intelligent systems. 1 ed. Ingram short title, 2017. ISBN 978-1783553112.
CS Open
Electives-I, II,
III, IV
Name of Program Bachelor of Technology
CSET381 Applications of AI L T P C
CO1: Know various AI Agents and AI search algorithms (uninformed, informed, heuristic, constraint
satisfaction, genetic algorithms).
CO2: Demonstrate working knowledge of reasoning in the presence of incomplete and/or uncertain
information.
CO3: Apply knowledge representation, reasoning, and machine learning techniques to real-world problems.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 2 2 3
CO2 3 3 2 2 2 2 2 3
CO3 3 2 2 3 2 2 1 3 3
Course Contents:
Reasoning with uncertainty, Probabilistic reasoning over time Learning Gaming: Movement, Decision
Making, Strategy, Infrastructure, Agent-Based AI.
Hacks and Heuristics. Vision Systems: fundamentals of image formation, camera imaging geometry, feature
detection and matching, Multiview geometry.
Motion estimation and tracking, and classification, Action recognition Color spaces and Segmentation.
Text Books :
1. Russell, Stuart J., and Peter Norvig. Artificial intelligence a modern approach. 3 ed. Prentice Hall,
2010.
Reference Books :
1. Forsyth, David A., and Jean Ponce. Computer vision: a modern approach. 2 ed. Prentice Hall, 2011.
2. Millington, Ian, and John Funge. Artificial intelligence for games. 2 ed. CRC Press, 2009.
Name of Program Bachelor of Technology
CSET382 Web Technologies L T P C
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 2 2 2 3
CO2 3 3 2 2 3
CO3 2 3 2 3
Course Contents:
Introducing HTML Document Structure, Creating Headings on a Web Page, Working with Links, Creating
a Paragraph, Working with Images, Working with Tables, Working with Frames, Introduction to Forms and
HTML Controls, Introducing Cascading Style Sheets, Introducing DHTML, Introducing JavaScript, Client-
Side Benefits of using JavaScript over VB Script, Embedding JavaScript in an HTML Page, Handling
Events, Using Variables in JavaScript, Using Array in JavaScript, Creating Objects in JavaScript, Using
Operators, Working with Control Flow Statements, Working with Functions.
Introducing PHP , Working with Variables and Constants, Controlling Program flow, Working with
Functions, Arrays, Files, and Directories, Working with Forms and Database, Databases : Basic command
with PHP examples, Connection to server, creating database, selecting a database, listing database, listing
table names creating a table, inserting data, altering tables, queries, deleting database, deleting data and
tables, PHP myadmin and database bugs, Exploring Cookies, Sessions, and PHP Security.
Module IV: 08 lecture hours
Getting Started with Web Applications in Java, Working with JavaBeans, Working with Servlet
Programming, Working with JSP, Java Database Programming, ASP.NET 3.5 Essentials, Developing a Web
Application , Application Structure and State, Web Forms: Standard Controls, Navigation Controls: Tree
View, Menu, and Site Map Path, Validation Controls, Introducing Web Parts Controls, Working with
Database Controls, Introducing Login Controls, Inside Master Pages and Themes, Managing Web
Applications, Application Globalization.
Introduction to XML, Basic and advance XML, Java API for XML Processing, Document Object Model
(DOM), XML Linking Mechanism, Evolution of Web Application, Understanding JavaScript for AJAX,
Asynchronous data transfer with XML Http Request, Implementing AJAX Frameworks, Integrating PHP
and AJAX, Consuming Web Services in AJAX .application in IT sector
Text Books :
1. Kumar, Akshi. Web technology: theory and practice. 1st ed. CRC Press, 2018.
2. Meloni, Julie C. Sams teach yourself HTML, CSS, and JavaScript all in one. 3rd ed. Sams Publishing,
2019.
Reference Books :
1. Robbins, Jennifer Niederst. Learning web design: A beginner's guide to HTML, CSS, JavaScript, and
web graphics. 1st ed. Springer InternationalPublishing, 2018.
Name of Program Bachelor of Technology
CSET383 Semantic Technology L T P C
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 1 2 1 1 2 2
CO2 2 1 2 1 1 2 2 3
CO3 2 2 3 2 3 2 3 3
Course Contents:
Evolution of web technologies; Shortcomings of the traditional web; General scheme of knowledge
representation models; Brief historical information on thedevelopment of models; Knowledge-based
systems and examples; Types of logic models; General terms and definitions; Formal (Aristotleva) logic:
Names,Statements, Proof, and rebuttal procedures; Mathematical implementation of formal logic; Methods
of automatic theorem proof (calculation of predicates). Fuzzysets; Definition of concepts: ontology,
concept, attitude, axioms. Examples of ontologies.
The concept of Semantic Web; Multilevel representation; Semantic Web applications; Main tendencies of
development of Internet technologies; Electroniccommerce; Auctions; Information collection and
management; Personal assistants; Scientific and educational information environments; Electronic tourism;
E-government; Bioinformatics; Semantic Grid; Business process management; Semantic Web SPARQL
query language; Simple queries; Thermas; Literals;Variables; List of predicates-objects.
Anonymous nodes; RDF collection; Samples of triplets; Sample solutions; Multiple comparisons; Working
with RDF literals; Comparison of RDF literals;Limitations of values; Samples of graphs; Combination of
samples; RDF data sets; RDF data set queries; Description of RDF datasets; Solutions and resultforms;
Selection of variables; Building the resulting graph; Resource descriptions; Explicit IRI. Resource
identification; Functions and operators of SPARQL;Description of resources in RDF language; OWL
ontology description language; Standard metadata views; FOAF technology; Intelligent agents; Multi-
agenttechnologies.
Data processing algorithms in Semantic Web; Semantic Web services; Ontologies of web services
modelling; Service description: profile, process model,interaction (grounding); Stages of work with web
services: annotation, detection, handling, composition; Monitoring of service performance; Specifications
forsemantic web services: WSMO, WSML; WSMX, OWL-S, SWSF; IRS-III, WSDL-S; Methods,
Algorithms, and tools to detect and compose web services;Examples of service descriptions; Options for
using discovery and service compositions in an enterprise B2B system.
Text Books :
1. Yu, Liyang. Introduction to the semantic web and semantic web services.1st ed. Chapman and
Hall/CRC, 2019.
Reference Books :
1. Alor-Hernández, Giner, José Luis Sánchez-Cervantes, Alejandro Rodríguez-González, and Rafael
Valencia-García, eds. Current trends in Semantic Web technologies: Theory and practice. 1st ed.
Springer, 2019.
Name of Program Bachelor of Technology
CSET384 IT Support Technologies L T P C
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 2 3 1 1 2 2 1 3
CO2 3 3 3 2 3 2 2 2 2 1 3 3
Course Contents:
Introduction to IT Support; Need for IT Support; Software Support; Hardware Support; Network Support;
The Human Factor; Assumptions; Language Barrier;Understanding End User; Staff Training; Structuring
Training and Education; Support Methodology; Flow Logic and Troubleshooting; Querying
Users;Understanding IT System Issues; IT System Structure; Peripheral Issues; Understanding
Environmental Factors; Documentation and Reporting; CreatingTroubleshooting Guides; First-Line
Support; Paperwork; Second- and Third-Line Support Paperwork; Engineer Paperwork; Administrative
Tools; PerformanceMonitoring Tools; Custom Views; Task Manager; Error and Status Information; Event
Details; Event Logs; Error Logs; Remote Support Tools; Remote Desktop;Remote Assistant.
Evolution of Computers; Aging Technology; Interface Standards; USB; Firewire; Serial; Parallel; Unix
Event Catalogue; Linux Systems; Windows NT; WindowsvNext; LANs; WAN; SD-WAN; Types of WAN;
Packet Switching Networks; Circuit Switching Networks; Overlay Networks; Packet over
SONET/SDH;Asynchronous Transfer Mode; Frame Relay; Metropolitan Area Network; TCP/IP Protocol
Stack; Cabling; Hubs; Switches; Routers; Repeaters; Topologies;Cloud Services; Cloud Software; Cloud
Platforms; Software as a Service (SaaS); Platform as a Service (PaaS); Infrastructure as a Service (IaaS);
ServerVirtualization; Types of Server virtualization; Advantage of Server Virtualization.
Security Concerns in IT; Network Security; Security Threats; Network Attack; Types of Network Attack;
Cryptography; Confidentiality; Data Integrity;Authentication; Non-Repudiation; Symmetric Key;
Symmetric Key Algorithms; Applications and Drawbacks; Asymmetric Key; Asymmetric Key
Algorithms;Applications and Drawbacks of Asymmetric; Key Algorithms; Digital Signatures; Digital
Signature Algorithms; Notions of Security; Firewalls; DevelopingSecurity Policy; Firewall Configuration
Strategies; E-mail; E-mail Protocols; Secure E-mail; Importance of Email Security; Best Practices for Email
Security; IPsecurity; Uses of IPSec; Component of IPSec; SSL; TLS; SSL certificate; Trends and
Challenges in IT Support.
Text Books :
1. Richard, Deal. Cisco ASA configuration. 1st ed. Tata McGraw-Hill Education, 2009.
2. Stallings, William. Data and computer communications. 9th ed. Pearson Education India, 2010.
Reference Books :
1. Buyya, Rajkumar, James Broberg, and Andrzej M. Goscinski, eds. Cloud computing: Principles and
paradigms. 1st ed. MIT Press, 2011.
2. Forouzan, Behrouz A. Data communications and networking. 5th ed. McGraw Hill, 2007.
3. Tanenbaum, Andrew S. Computer networks. 5th ed. Prentice Hall, 2010.
Name of Program Bachelor of Technology
CSET385 Software Engineering L T P C
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 3 1 1 1 1 2 3 1 3
CO2 3 3 3 2 3 2 1 2 2 2 2 3
Course Contents:
Importance of Software Engineering, Phases of software development lifecycle, SDLC case study, Software
Process Model, Waterfall model, Prototyping model,Incremental model, RAD model, Spiral model, Version
Control System.
Check-in and check-out code in repository, Create branch and merging branch, Need of agile, Agile
manifesto, Agile principles, Agile development methods,Extreme programming (XP), XP principles, Test
first development, Refactoring.
Requirement engineering, User stories, Acceptance criteria, Requirement validation and verification, UML,
Behavioral UML diagrams, Structural UML diagrams.
Software quality assurance and testing, Designing test cases, Black Box testing, White box testing, Black
box vs. white box testing, Control flow testing technique.
Text Books :
1. Pressman, Roger S. Software engineering: a practitioner's approach. 7th ed. McGraw Hill
International, 2014.
2.
Reference Books :
1. Sommerville, Ian. Software Engineering. 10th ed. Person Publications Publishing Company, 2015.
Name of Program Bachelor of Technology
CSET386 Programming Languages L T P C
CO1: To explain the requirement for the interdisciplinary application of programming languages.
CO2: To build the logic for the given problem.
CO3: To develop programs and debug.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 2 2 2 2 3 1 1
CO2 2 3 1 2 1 3 3
CO3 3 1 1 3 3
Course Contents:
Programming, programming language. Types of programming languages, high level vs low level,
compilers, interpreters, assemblers, binary code. Datatypes, variables, keywords, identifiers, Importance of
comments in programming. Implementation of scope rules. Static scoping and dynamic scoping.
Programming constructs: conditional statements if statements, else statement, if-else statement. For loop,
while loop, nesting loop. Do-while loop, infinite loops, break, continue statements. Arrays, one dimensional
array, multidimensional array.
Functions, in-built functions vs user-defined functions, importing libraries for using in-built functions.
Pointers and its types, arrays of pointers, pointers, and functions. Passing parameters to functions, returning
values from functions, recursion. Dynamic arrays, string, string variables, string handling functions.
Object-oriented paradigm. Fundamental concepts, objects, classes, encapsulation, and inheritance. Errors
and warnings, rectifying errors and debugging. File handling, opening and closing file, input / output
operations on file.
Text Books :
1. Bansal, Arvind Kumar. Introduction to programming languages. 1st ed.), Chapman and Hall/CRC,
2017.
2. Kanetkar, Yashavant, and Aditya Kanetkar. Let Us Python Solutions: Learn by Doing-the Python
Learning Mantra. 1st ed. BPB Publications, 2020.
Reference Books :
1. Klabnik, Steve, and Carol Nichols. The Rust programming language. 1st ed. No Starch Press, 2023.
Name of Program Bachelor of Technology
CSET387 Artificial Intelligence for Creative Expression L T P C
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 1 1 1 2 3 1 1 1
CO2 1 1 3 2 1 2 2 3 3 2
CO3 3 1 3 1 1 2 3 2 3
Course Contents:
What is machine learning? Playing around with Wekinator and Tensorflow.js to start making some
interactive work and get familiar with concepts of training the machine with some data, running a trained
model and seeing interactive output. What are neural networks? Looking inside neural networks and how
neural networks are trained, understanding what terms like weights of a network, activation function etc.
mean. Convolutional neural networks and how that leads to Deep dream. Experiments with deep dream to
visualize layers.
Discussions around how AI is like a photography moment for art to give some art historical context to AI.
Style transfer- real-time style transfer from pre-trained models. Run style transfer experiments through
webcam input. Discussions around how artists are using style transfer.
Recurrent neural networks- Text Modeling, Sketch (vector drawing) Modeling, Music Modeling.
Introduction to sequential datasets in the context of art, like quickdraw, text corpuses and musical datasets
and what can be done with such sequential data. Ethical considerations around widespread use of AI.
Conceptual art pieces that comment on this issue.
Text Books :
1. Marcus Du Sautoy, The Creativity Code, Art and Innovation in the Age of AI. 1st ed. Harvard
University Press, 2020
Reference Books :
1. Kevin Ashley, Make Art with Artificial Intelligence, Make and Sell Your Art with AI, Blockchain and
NFT. 1st ed. Independently published, 2021
Name of Program Bachelor of Technology
CSET388 AI and Public Policy L T P C
CO1: To explain the policy frameworks and strategy reports by different countries and
organizations.
CO2: To articulate the arguments for AI laws related to Autonomous and Robotics systems.
CO3: To make use of legal framework and challenges concerning AI and Data science.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 1 2 2 3 1 3 2 2 2
CO2 2 3 2 2 2 3 2 2
CO3 2 2 2 2 2 2 2 2 3
Course Contents:
AI: An opportunity and a risk, Comparing and interpreting the strategy and reports of different countries on
Artificial Intelligence: Singapore, USA, UK, Germany, India, China, Blockchain: Japan, China, USA,
Switzerland, Singapore, India, Robotics: Singapore, Japan, USA, India, International AI Strategies:
European Union, United Nations, AI Agreement between UAE and India, International Study Group of AI.
AI Policies in India: NITI Aayog, AI initiatives by Ministry of Electronics and IT, AI Initiative by Ministry
of Commerce and Industry, National AI based portal, AI Academia/ Institutes and Centers in India, AI
standardization in India: Bureau of Indian Standards (BIS), Department of Telecom (DOT), Key
considerations for AI policymaking in India: Resources, Infrastructure, Markets, and Funding, Policy
environment for AI innovation, Democratize AI technologies and data, National infrastructure to support
domestic development: AI Data Storage, AI Networking Infrastructure, Awareness, Education, and
Reskilling: Skill sets to successfully adopt AI, Early Childhood Awareness and Education, Focus on
marginalised groups, Improved access to and awareness of Internet of Things, Public Discourse, Impact of
AI on different stakeholders: Employees, Customers, Business, etc., How has COVID-19 affected the AI
trends?, Business Transformations with AI.
Module III: 08 lecture hours
AI in warfare and diplomacy, AI shortfalls for military applications, Transparency in AI, Audits, Tiered
Levels of Transparency, AI and economic growth: Economic characteristics of AI, Private equity
investments in AI start-ups, Broader trends in development and diffusion of AI, How increases automation
in the production of goods and services is impacting economic growth?, How can we reconcile the advent
of AI with the observed constancy in growth rates and capital share over most of the twentieth century?,
Should we expect such constancy to persist in the twenty- first century?, Can AI drive massive increases in
growth rates? Under what conditions, and are these conditions plausible?, How are the links between AI
and economic growth modulated by firm- level considerations, including market structure and innovation
incentives?, How does AI affect the internal organization of firms, and with what implications?
Documentary on Impact of AI in economy, Case study: How do you organize the skills to best facilitate
innovation for your firm?, Pitch deck for ideas or new application of AI, Pitch deck for ideas or new
application of AI, Coordination and collaboration across stakeholders, Development of Contextually
Nuanced and Appropriate AI Solutions Continuing, deepening, and expanding partnerships for innovation,
Develop contextual standard benchmarks to assess quality of algorithms, Frameworks for Regulation:
National legislation, Data Protection Law, Discrimination Law, Frameworks for Regulation: Competition
Law, Consumer Protection Law, Sectoral Regulation, AI Policy Challenges: Intellectual Property Regime
and AI issues, Catastrophic and Existential Risk, AI Policy Challenges: Security and Cyber security, Re-
thinking Intellectual Property Regimes.
Text Books :
1. West, Darrell M., and John R. Allen. Turning point: Policymaking in the era of artificial intelligence.
1st ed. Brookings Institution Press, 2020.
Reference Books :
1. Sarangi, Saswat, and Pankaj Sharma. Artificial intelligence: evolution, ethics and public policy. 1st ed.
Taylor & Francis, 2019.
Name of Program Bachelor of Technology
CSET389 Linux Apache MySQL PHP (LAMP) L T P C
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 2 2 2 2 2 2 2
CO2 2 2 3 2 2 2 2 3 2
CO3 2 2 2 2 3 2 2 2 3
Course Contents:
LAMP technology, Linux Operating System, Knowledge of various editors, PHP introduction, Operators
in PHP, Logical and conditional operators use cases, Function Definition and Function Call, Function with
arguments, Function with return value, call by value and call by references.
Understanding variable scope, Global Variables and Static Variables, Include and Require, Built-in
functions in PHP, Introduction to Array, Array in PHP, Creating an Array, Accessing Elements of an Array,
Modifying Elements of an Array, Array and string related operations.
OOPs Concepts, Defining Class in PHP, Object in PHP, Constructor, Constructor with Parameters,
Introduction to Exception, Exception Handling mechanisms, Creating Custom Exceptions, Multiple Catch
Blocks, Exception Propagation, Error Handling in PHP, Web designing principles.
HTML, CSS, Java script, Supporting tools and CMS, Introduction to MySQL, Learning the MySQL Data
Types, Frequently used String functions in MySQL, Regular expressions and their uses in PHP, Cookies,
Session variable, its session ID management, File handling in PHP.
Text Books :
1. McPeak, Jeremy. Beginning JavaScript. 5th ed. Wrox Publication, 2015.
Reference Books :
1. Welling, Luke, and Laura Thomson. PHP and MySQL Web development. 5th ed. Pearson, 2017.
Name of Program Bachelor of Technology
CSET390 Data Structures and Algorithms L T P C
CO1: To explain basic data structures for storage and retrieval of ordered or unordered data. Data structures
include arrays, linked lists, binary, trees, heaps, and hash tables.
CO2: To implement algorithms for the creation, insertion, deletion, searching, and sorting of each data
structure.
CO3: To examine and compare algorithms for efficiency using Big-O notation.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 2 3 2 3
CO2 1 2 3 2 3
CO3 1 2 3 2 3
Course Contents:
Asymptotic notation, Recursion, Masters theorem, Array storage, Memory allocation in 2D array, Static vs
dynamic memory allocation, Binary search, Array search, traverse, insertion, and deletions, Linked list,
Linked list modifications (circular, doubly), Traverse, insertion, and deletions in linked list.
Stack representation, Application of stacks, Traverse, insertion, deletions in stack, Queue representation,
Application of queue, Modifications in queue (circular, priority), Traverse, insertion, deletions in queue,
Tree representation, Binary tree, Heap representation, Extract min, search, insertion operations in heap.
Graph representation, BFS, DFS algorithms, Divide and conquer algorithm, Sorting techniques, Greedy
algorithm, Coin exchange problem, Frog jump problem (proof of correctness), Dynamic algorithm, MCM,
0-1 and fractional knapsack.
Text Books :
1. Karumanchi, Narasimha. Data Structures and Algorithmic Thinking with Python. 1st ed. CareerMonk
Publications, 2016.
2. Cormen, Thomas H., Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. Introduction to
algorithms. 4th ed. MIT press, 2022.
Reference Books :
1. Dedov, Florian. A Complex Subject Simply Explained (Runtime Complexity, Big O Notation,
Programming). 1st ed. Amazon Digital Services LLC - KDP Print US, 2020.
2. Wengrow, Jay. A Common-Sense Guide to Data Structures and Algorithms 2nd ed. O′Reilly, 2020.
Name of Program Bachelor of Technology
CSET481 Software Testing L T P C
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 2 3 1 1 1 2 1 3
CO2 2 3 1 1 2 1 3
Course Contents:
Software testing, testing objectives. Principles of Software Testing, Testing and debugging, Test metrics
and measurements.
Verification, Validation and Testing, Software Quality and Reliability, Software defect, Manual and
Automation Testing, Software Testing Life Cycle, Phases of STLC, Test Case Preparation.
Testing Techniques: White Box Testing, Black Box Testing, Unit Testing, Integration Testing, User
Acceptance Testing, Alpha and Beta Testing, Smoke Testing, Sanity Testing, Regression Testing.
Formal Testing, Informal Testing, Monkey Testing, Re-Testing, Load/Stress Testing, Ad hoc Testing: Pair
testing, Exploratory testing, Iterative testing, Defect seeding.
Text Books :
1. Limaye, Vaishali S. Software Testing - Principles, Techniques and Tools. 1st ed. McGraw Hill
Education, 2017
Reference Books :
1. Pressman, Roger S. Software engineering: a practitioner's approach. 7th ed. McGraw Hill, 2019.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET482 Computing Start-ups L T P C
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 1 3
CO2 2 3 1 3 3
C03 2 1 2 3 1 1 2 1 3 3
Course Contents:
What Does It Mean to Be a Startup Entrepreneur? Engaging Others with Actionable Next Steps, Benefits
vs. Features, Simple Strategies to Get Unstuck, The Financial Model, The Legal Setup of Your Startup,
Meetings and Communication Skills.
Startup Grants: Can Government Programs Stimulate Entrepreneurship? Venture Capital and Angel
Investors Incubators and Accelerators Incubators and Accelerators, Moving Past the Startup Stage, How
Universities Can Support Their Startups Today.
Text Books :
1. Brahim, Bachir . The Colony Of Innovative Startups. 1st ed. Bachir BRAHIM, 2020
Reference Books :
1. Wright, Mike, and Philippe Mustar. Student start-ups: The new landscape of academic
entrepreneurship. 1st ed. World Scientific, 2019.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET483 Career Skills for IT Companies L T P C
CO1: To impart aptitude, reasoning, technical and soft skills that would aid in the employability of the
students.
CO2: To develop both personal and professional skills effectiveness.
CO3: To help students to gain a confidence for the upcoming placements.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 3 2 2 2
CO2 2 2 2 3 2 3 3 3 2 2
CO3 3 3 2
Course Contents:
Introduction to Problem Solving; Prime Numbers; GCD; LCH; HCF; Theorems of Divisibility; Divisibility
Rules; Remainder Theorem; Counting; Arithmetic Progression; Geometric Progression; Harmonic;
Progression; Averages; Allegations; Ratio; Proportion; Variation; Interest; Time and Work; Negative Work;
Product Constancy; Equivalence Method; Efficiency; Pipes and Cisterns; Boats; Relative Motion; Opposite
Motion; Straight Lines; Polygons; Triangles; Quadrilaterals; Circles; Tangent; Eclipse; Star; Functions:
Tabular, Graphical, Even Odd, Inverse; Inequalities; Logarithmic; Graphical View of Logarithmic;
Properties of Inequalities: Notion of Ranges, Linear Inequality, Quadratic Inequality; Permutation; Circular
Permutation; Combination; Probability; Real Life Estimation of Probability: Conjunction AND,
Conjunction OR; Concept for Odds for and Odd Against; Set Theory; Operations; Algebra; Coordinate
Theory; Cartesian Coordinate System; Rectangular Coordinate Axes.
Data Interpretation: Representation of Data, Nature of Data, Capturing of Data, Organization of Data,
Tables, Bar Charts, X-Y Charts, Pie Charts, Cases; Logical Reasoning; Reasoning Analogies; Artificial
Language; Calendar; Cause and Effect; Clocks; Critical Path; Directions; Data Interpretation; Deduction
Reasoning; Statement Analysis; Data Sufficiency; Puzzles; Pattern Series; Embedded Images; Figure
Matrix; Picture Series; Pattern Series; Shape Construction; Statement and Assumptions; Statement and
Conclusions; Syllogism; Verbal Reasoning.
Text Books :
1. Sharma, Arun. How to prepare for Logical Reasoning for CAT. 6th ed. McGraw Hill Education,
2021.
2. Sharma, Arun. Quantitative Aptitude. 8th ed. McGraw Hill Education, 2021.
3. Gutbrod, Hans. Handbook for Professional Communication: How to get your ideas across, every
single time. 1 ed. Verlag GD Publishing Limited and Co KG, 2020.
Reference Books :
1. Agarwal, R.S. Quantitative Aptitude for Competitive Examinations. 1st ed. S Chand Publishing, 2017.
2. Agarwal, R.S. A Modern Approach To Verbal & Non-Verbal Reasoning, 2nd ed. S Chand Publishing,
2017
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET484 Cyber security: Impact on Govts, Policies L T P C
and Economics
CO1: To explain the broader picture of cybersecurity at the world stage. To articulate the arguments
for Cybersecurity related policy frameworks.
CO2: To examine the cybersecurity related challenges facing the world.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 2 3 1 3
CO2 1 2 3 1 3
Course Contents:
The Role of Intelligence and Information Sharing; Design and Operation of the Internet; Internet Naming
and Routing Protocols; Cyber Exploits; Major Cyber Attacks; Secure Communications and Authorization;
Cyber Conflict; Cyber Economics; Contingency Planning; Contingency Planning Methodology; Business
Impact Analysis; CP Strategies - Data Backup and Recovery; Incident Response; Incident Response
Planning; Incident Response: Detection, Containment and Recovery, Disaster Recovery; Disaster Recovery
Planning; Disaster Classifications; Planning for Disasters; Disaster Preparation.
History and Role of United nations in setting the norms and guidelines for cybersecurity challenges across
the borders; Application in International laws to Cyberspace; Case studies of few countries exploiting the
internet space to their advantage; Cybersecurity issues with the increase in Global data centres; Cloud
Computing and exponential increase in data storage systems; Cyber control systems; Cyber command
systems; Cyber warfare; Cyber Soldiers. and battalions; Cyber resilience; Use of Cyberspace as part of
defence strategy; State surveillance; Cyber freedom; trade-off between privacy and security; Case studies
to new dimensions of cybersecurity for public, Govts and Economies.
Text Books :
1. Burkart, Patrick, and Tom McCourt. Why Hackers Win: Power and Disruption in the Network
Society. 1st ed. University of California Press, 2019.
2. Caravelli, Jack, and Nigel Jones. Cyber security: Threats and responses for government and business.
1st ed. Praeger Publishers Inc, 2019.
Reference Books :
1. Fields, Ziska. Handbook of research on information and cyber security in the fourth industrial
revolution. 1st ed. IGI Global, 2018.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET485 AI and Society L T P C
CO1: To articulate the ethical issues related to the development and adoption of AI.
CO2: To examine the ways in which AI is impacting culture and communities.
CO3: To understand the impact of AI to make it more useful.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 3 1 3
CO2 2 3 1 3 3
CO3 2 1 2 3 1 1 2 1 3 3
Course Contents:
Terminology of AI, realistic view of AI, AI Timeline, AI system illustrations, AI Failures / Challenges, Case
study /Critical discussions on current applications of AI across a range of domains and sectors: Finance:
Conventional risk models, Environmental, Social, and Governance (ESG) Criteria, Chatbots and Virtual
Assistants, Relationship Manager Augmentation , Health care: Health data management, Treatment
pathway design, Surgical robots, Supporting pharma: drug creation and clinical trials, Agriculture:
Intelligent spraying of chemicals, AI-based robots for farm harvesting , National security: Emerging Threats
in the AI Era, Autonomous weapons systems, Risks associated with AI-Enabled Warfare, Art and culture:
Virtual visits, Language Preservation, Interpreting expressions, Painting by numbers.
AI Ethics: Human-centred values and fairness, Ethical governance, Ethical auditing, Ethical Issues, Data
access problems Healthcare Sector - Ethical Considerations, Explainable AI, Model interpretability: Global
Interpretation and Local Interpretation, The Trade-off Between Accuracy and Interpretability, Interpretation
Techniques: Feature Importance, Partial Dependence Plots, Local Interpretable Model-agnostic
Explanations, Transparency in AI: Model Cards, Datasheets for Datasets, Fact Sheet, Fairness: AI Fairness
360, AI Explainability 360 Decision Tree, Bias in AI, Types of Bias: Observer bias, Prejudice bias, cognitive
bias, Exclusion bias, Racial bias in healthcare risk algorithm, AI learning unhealthy stereotypes, Combating
Bias in AI: Use less bias or more inclusive data, Diverse workforce, Legal liability: Manufacturer (Product)
Liability, Product Liability Defenses Applied to AVs, Insurance Liability, Insurer’s Key Challenges,
Autonomous Vehicle Levels. Product Liability Defenses Applied to autonomous vehicle, Liability Due to
Hacker Attacks, Role of the Regulatory Bodies.
Module III: 09 lecture hours
Attacks on AI: Adversarial attacks, Physical attacks, Membership inference attack, The Need for
Responsible AI Understanding the AI system’s functioning for safe and reliable deployment, Post-
deployment–can the relevant stakeholders of the AI system understand why a specific decision was made,
Consistency across stakeholders, Incorrect decisions leading to exclusion from access to services or
benefits, accountability of AI decisions, Dimensions of AI Accountability: Assess governance structures,
Understand the data, Define performance goals and metrics, Review monitoring plans, AI and Data Privacy:
AI policy options for privacy protection, Policy documents and working drafts on Artificial Intelligence,
Societal Considerations in AI: Technology Based Approach for Managing AI Systems, Principles for
Responsible Management of AI Systems, Societal Considerations in AI: Impact of AI on job displacement.
Case study: Future in the balance? How countries are pursuing an AI advantage, Review of Global
Regulatory Landscape, Guidelines for Trustworthy AI, Preparing for job transformation and building skills,
Role of AI in the ecosystem for persons with Disability: Personalisation and Customisation, Neurosymbolic
AI, Recommendations for Integrating Gender Equality into AI Principles, The Effects of AI On Child
Psychology, Principles for AI in society, Guidelines for AI developed by stakeholders, How do countries
seek to develop competitive advantage in AI?, Faster conditions, Demand conditions, Related and
supporting industries .
Text Books :
1. Kumar, Puneet, Vinod Kumar Jain, and Dharminder Kumar, eds. Artificial Intelligence and Global
Society: Impact and Practices. 1st ed. CRC Press, 2021.
Reference Books :
1. OECD. Artificial Intelligence in Society. 1st ed. OECD-Paris, 2019.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET486 Special Topics in Computer Engineering L T P C
CO1: To familiarize and learn about the latest trends and research in the field.
CO2: To equip themselves with the conceptual and practical experience of few latest methods, tools,
technologies or algorithms in Computer Engineering.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 2 3 1 2
CO2 1 2 3 1 2
Course Contents:
This course covers the cutting-edge topics in Computer Engineering, and these modules will be chosen by
the instructor based on the requirements and relevance at that point of time. These modules need to be
relevant to the industry and start-ups will also include related case studies, use cases and implementations
scenarios. Students will be working on lab work and projects to get real hands-on experience of these topics
and modules.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET487 Digital Marketing L T P C
Owning School/Department School of Computer Science Engineering and 3 0 0 3
Technology
Pre-requisites/Exposure -
CO1: Understand, visualize, and analyse online applications based on recent digital marketing trends.
CO2: Develop an in depth understanding of digital marketing and its applications.
CO3: To create a digital marketing plan, identifying digital channels, their advantages, and limitations, to
perceiving ways of their integration taking into consideration the available budget.
CO – PO /PSO Mapping:
PO PO PO PO PO PO PO PO PO PO1 PSO PS PO
1 2 3 4 5 6 7 8 9 0 1 O2 S3
CO
1 2 2 1 2 2 2 2 2 2 2 2 1
CO
2 2 2 3 2 2 3 2 2 2 2 2 1
CO
3 2 2 2 2 3 3 2 2 2 2 2 2 3
1=weakly related 2= moderately related 3=strongly related
Course Contents:
Text Books :
1. McGruer, D, Dynamic Digital Marketing: Master the World of Onlineand Social Media Marketing
to Grow Your Business (1st ed.), Wiley, 2020. ISBN 978 1119635888.
Reference Books :
1. Kingsnorth, S, Digital Marketing Strategy: An Integrated Approach toOnline Marketing (2nd ed.),
Kogan Page, 2019. ISBN 978-0749484224.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET488 Growth Hacking L T P C
Owning School/Department School of Computer Science Engineering and 3 0 0 3
Technology
Pre-requisites/Exposure -
Course Outcomes (COs)
On completion of this course, the students will be able to:
CO1: Integrate the data-driven and adaptive culture of Growth Hacking to improve digital marketing
results.
CO2: Tell better stories and write marketing content to improve conversion rates.
CO3: Understand the economics of customer interactions and may build business tools that automate
repetitive tasks in order to gain access to new data.
CO – PO /PSO Mapping:
PO PO PO PO PO PO PO PO PO PO1 PSO PS PO
1 2 3 4 5 6 7 8 9 0 1 O2 S3
CO
1 2 2 1 2 2 2 2 2 2 2 2 1
CO
2 2 2 3 2 2 3 2 2 2 2 2 1
CO
3 2 2 3 2 3 3 2 2 2 2 2 2 3
Course Contents:
Search engine, Search engine optimization (SEO), need of SEO, Googlebot (Google Crawler), Types Of
SEO technique, Google’s SEO Algorithm updates, planning and strategies for SEO, SEO tools,
Technical SEO, Technical SEO Ranking factors, Type of meta tags, effect on SEO, Website architecture
Optimization, Breadcrumbs, Permalinks optimization, Canonicalization, Setup of CDN, SSL, Improve
Website Performance, Speed using Plugin, perform the Page Speed Test, XML and HTML sitemap
creation and optimization, Add and verify a website in Google Console, Google Analytics setup and
monitoring.
Keyword, importance of Keyword Research, types of keywords, Analysis of keywords using Tools,
easy to rank keywords, Analysis of Keyword, find Ranking Keyword of competitor, selecting right
keywords, Top ranking Keywords of your sites, Find hidden ranking keywords of your website, LSI
Keywords: Easy Strategies To find LSI Keywords, Content Research, Content Structure, Content
Planning with Keywords, Internal links, Outbound link, Schema Markup.
Module III 11 lecture hours
Negative SEO, avoid duplicate content on your website, Black hat SEO, Mistake by website owners,
Bad practice on the website, Common Negative SEO practices, Defense against negative SEO, local
SEO, Local SEO factors, Google My Business (GMB), optimize GMB Listing, Element’s optimization
on GMB listing, Citations, citations in Local SEO.
Text Books :
1. Das, S., Search Engine Optimization and Marketing: A Recipe for Success inDigital Marketing (1st
ed.), CRC Press, 2021. ISBN 978-0367278786
Reference Books :
1. Clarke, A., SEO 2022: Learn Search EngineOptimization with Smart Internet Marketing Strategies
(1st ed.), Simple Effectiveness LLC, 2022. ISBN 9780578333380,0578333384
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET493 International Acquaintance and Externship L T P C
Owning School/Department School of Computer Science Engineering and 2 0 2 3
Technology
Pre-requisites/Exposure -
CO1. Acquire an appreciation and familiarity of the international computer science engineering
professional network, as well as the current trends and developments in the industry.
CO2. Develop an understanding of the international technology landscape and how it impacts the field of
computer science engineering.
.
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1
CO1 3 2 3 2 3
CO2 2 3 3 3 2
CO3 3 3 3 2 3 2 2
This course is designed to provide students with an introduction to the international aspects of computer
science. Students will be exposed to a variety of topics related to computer science, including computer
networking, software engineering, artificial intelligence, data mining, and web development. The course
will also cover the fundamentals of international relations, including international law, economic and social
policy, and global trade. Additionally, students will have the opportunity to participate in an international
externship, where they will gain hands-on experience in a computer science-related field. The course will
also provide guidance and mentoring to help students develop the skills necessary to handle international
assignments.
Students will gain practical experience by using tools and technologies related International Acquaintance
and Externship
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET489 Search EngineOptimization L T P C
Owning School/Department School of Computer Science Engineering and 3 0 0 3
Technology
Pre-requisites/Exposure -
CO1: Understand main search engine optimization techniques for business websites.
CO2: Analyze keyword research, writing optimized content, getting web pages indexed by search
engines and tracking the outcomes.
CO3: Implement gain access to new online tools and resources to help implement successful SEO
campaigns.
CO – PO /PSO Mapping:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PSO1 PSO POS
2 3
CO1 2 2 2 2 2 2 2 2 1
CO2 1 2 2 3 2 2 3
CO3 2 2 2 2 2 2 2 2 3
1=weakly related 2= moderately related 3=strongly related
Course Contents:
Reference Books :
1. Clarke, A., SEO 2022: Learn Search EngineOptimization with Smart Internet Marketing on line
416 LLC 2022. ISBN 9780578333380,0578333384
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET491 Advanced Industry Certification L T P C
Course-Outcomes (COs):
On completion of this course, the students will be able to:
CO1: Familiarize and learn about the latest trends, tools, technologies, and research in the field of computer
science.
CO2: Develop the conceptual and practical understanding of the industry relevance of latest technologies
and research trends.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 3 2 1 1 3 1 3
CO2 3 2 1 3 1 2
Course Contents:
This course covers the cutting-edge topics from different domains of computer science through relevant
industry certifications which will prepare the students for different job roles trending in the market and help
them gather the required skills that will provide the students an edge over other candidates for the available
job roles. Students will be working on lab work and projects to get real hands-on experience of the latest
tools and technologies. This course would be equivalent to two open elective courses.
209
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET492 Advanced Skill Enhancement L T P C
Course-Outcomes (COs):
On completion of this course, the students will be able to:
CO1: Understand the latest trends, tools, technologies, and research in the field of computer science.
CO2: Implement the conceptual and practical understanding of the latest technologies and research trends
related to the industry.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 3 2 2 2 2 1 3 1 3
CO2 3 1 1 2 1 1 3
Course Contents:
This course will help the students to explore their area of interest in depth and develop as well as nourish
the skills required for the desirable job roles in the industry. The cutting-edge topics from different domains
of computer science would be covered which will prepare the students for different job roles trending in
the market and provide the students an edge over other candidates for the available job roles. Students will
be performing lab work and projects to get real hands-on experience of the latest tools and technologies.
Name of Program Bachelor of Applications
Pre-requisites/Exposure -
CO1. To provide students with the opportunity to gain an understanding of the global engineering
landscape and develop practical skills through hands-on projects and industry-focused seminars.
CO2. To develop students’ global competencies, including cross-cultural communication, problem-
solving, and collaboration skills, to prepare them for success in a global engineering career.
CO – PO /PSO Mapping
PSO PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PSO1
2 3
CO1 1 1 1 1 1 1 1 1 1 1 1 1 3
CO2 1 1 1 2 2 3 3 3 1 1 3
Course Contents:
This course will provide students with the opportunity to gain a global experience in the field of
engineering. It will include an introduction to engineering principles, the design process, and the
engineering process through a series of lectures, hands-on activities, and field trips. Students will apply
their knowledge of engineering principles to work together to develop and design a project that will solve
a global engineering challenge. The course will focus on using the scientific method to solve problems,
discussing engineering ethics and safety regulations, and presenting their projects to their peers and
instructors. They will also explore the impact of engineering on society and the environment and develop
the skills necessary to successfully collaborate and innovate with their peers from different cultures. Upon
completion of the course, students will have a well-rounded understanding of global engineering and the
ability to apply their engineering knowledge in a global context.
HSS Electives
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET307 Financial Accounting and Management L T P C
Owning School/Department Computer Science Engineering 3 0 0 3
Pre-requisites/Exposure -
CO1: To articulate foundations of finance with an emphasis on applications vital for corporate managers.
CO2: To explain financial decisions made by corporate managers both within the firm and in their
interactions with investors.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 2 1 2 1 1 3 1 1
CO2 1 2 1 2 3 3 3 2 2
Course Contents:
Finance overview, Present Value Concepts, NPV Rule, Separation Theorem, Simple vs. Compound Interest,
Annuities and Perpetuities, Growing Delayed Annuities and Perpetuities, Compounding Within the Year
and the Effective Annual Interest Rate, Fixed Income Valuation, Valuation of Pure Discount Bonds, Yield
to Maturity vs. Holding Period Return, Prices and Returns on Coupon Bonds, Semi-Annual Bonds, The
Yield Curve, Holding Period Return and Yield to Maturity for Zero-Coupon Bonds, Calculating the Holding
Period Return on a Coupon Bond, Equity Valuation Interest, Applying Infinite Horizon Formulas,
Determining Dividend Growth, Internal Rate of Return (IRR), Comparing NPV and IRR: Accept or Reject
Decision, Comparing NPV and IRR, Capital Budgeting in Practice, Expected Returns and Risk, Portfolio
Analysis, Capital Asset Pricing Model (CAPM), Market Efficiency, Capital Structure, Valuation and Capital
Budgeting with Leverage, Option Definitions and Strategies, Option Valuation.
Intuition and Discounting, Compounding, Inflation, APR and EAR, Term Structure, Discounted Cash Flow:
Decision Making, Free Cash Flow, Forecast Drivers, Forecasting Free Cash Flow, Return on Investment,
Decision Criteria, Sensitivity Analysis, Return on Investment, Financial Reporting, Balance Sheet
Equation, Assets, Liabilities, and Stockholders' Equity, Debit and Credit Bookkeeping, Relic Spotter Case,
Revenues and Expenses, Adjusting Entries, Financial Statements and Closing Entries, Operating, Investing,
and Financing Cash Flows, Statement of Cash Flows, Ratio Analysis, Plainview Technology.).
Deferred Taxes, Income Taxes, Deferred Tax Liabilities, Deferred Tax Assets and Tax Rate Changes,
Valuation Allowances and NOLs, Income Tax Disclosure, Taxes, SCF, and Marketable Securities.
Shareholders' Equity, Share Issuances and Repurchases, Dividends, Splits, and AOCI, Stock-based
Compensation, Earnings Per Share, Contributed Capital Disclosure, Stock-based Compensation Disclosure,
Financial Statement Analysis, Business, Strategy, and Competitive Environment, Growth and Earnings
Performance, Cash Flow and Ratios, Investing and Financing Activities, Off-Balance Sheet Activities.
Text Books :
1. Irons, Robert. The fundamental principles of finance. 1st ed. Taylor & Francis, 2019.
Reference Books :
1. Gupta, R. K., and HIMANSHU GUPTA. Credit appraisal & analysis of financial statements: a hand
book for bankers and finance managers. 1st ed. Notion Press, 2019.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET308 Communication Skills for Global Professionals L T P C
Owning School/Department Computer Science Engineering 3 0 0 3
Pre-requisites/Exposure -
CO1: To apply the dynamics of communication skills in business communication strategies and principles
to prepare effective communication for business situation.
CO2: Manage information retrieval systems by performing indexing, compression, information
categorization sentiment analysis, network management, search engine optimization, records compliance
and risk management.
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 2 2 1 2 2
CO2 2 3 3 2 3 2
Course Contents:
Vocabulary Building, Concept of Word Formation, Root words from foreign languages and their use in
English, Acquaintance with prefixes and suffixes from foreign languages in English to form derivatives,
Synonyms, Antonyms, Standard abbreviations, Effective Communication, Purpose of Communication,
Process of Communication, Importance of Communication in Business, Differences between Technical and
General Communication, Barriers to Communication, Measures to Overcome the Barriers to
Communication, Types of Communication, Verbal Communication, Importance of verbal communication,
Significance of Non-verbal Communication, Communication Network, Scope and Types of
Communication Network, Formal and Informal Communication Network, Upward Communication,
Downward Communication, Horizontal Communication, Diagonal Communication.
Listening Skills, Listening Process, Classification of Listening, Purpose of Listening, Common Barriers to
the Listening Process, Measures to Improve Listening, Listening Comprehension, Pronunciation,
Intonation, Stress and Rhythm, Listening as an Important Skill in Workplace, Note taking tips, Group
Discussions.
Written Communication, Principles of effective writing, Improving Writing Skills, Essentials of good style,
Expressions and words to be avoided, Grammar and Usage, Steps of writing, Difference between creative
academic and professional writing, Identifying Common Errors in Writing, Rhetoric, Institutional
communication, Intercultural communication, Subject-verb agreement, Noun-pronoun agreement,
Misplaced modifiers, Articles, Prepositions, Redundancies, Cliches, Writing introduction and conclusion,
Comprehension, Precis Writing, Essay Writing, Idea Expansion, Letter writing, E-mail, writing, Writing
using latest collaborative tools like Slack, Microsoft team, issues of plagiarism, Memos and Circular
Writing, LinkedIn Profile and Digital Presence.
Employment Communication, Job Interview, Importance and Factors Involving Job Interview,
Characteristics of Job Interview, Job Interview Process, Job Interview Techniques, Manners and etiquettes
to be maintained during an interview, Sample Questions Commonly asked During Interview, Mock
Interviews, Expert Talk, Resume: Contents of Good Resume, Guidelines for Writing Resume, Different
Types of Resumes, Reason for a Cover Letter to Apply for a Job-Format of Cover Letter, Different Types
of Cover Letters, Written and verbal feedback giving and receiving.
Text Books :
1. Mishra, Richa and Ratna Rao, A Textbook of English and Communication Skills. 1st ed. Macmillan
Publishers India Private Ltd, 2020.
Reference Books :
1. Konar, Nira. Communication skills for professionals. 2nd ed. PHI Learning Pvt. Ltd., 2021.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET309 Organizational Behaviour L T P C
Owning School/Department Computer Science Engineering 3 0 0 3
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 1 1 1 1 2 2 1 2 1
CO2 1 1 3 1 1 2 2 1 2 3
CO3 1 3 2 2 1 3 3 1 3 2
Course Contents:
Groups and teams, Group Behavior, Group Dynamics, Defining and Classifying Groups, The Five-Stage
Model Of Group Development, Group Decision Making, Team process, Conformity and cohesiveness,
Organizational Culture, Cultural competence, Leadership, Leading across cultures, Expatriation, Decision
making and global staffing, Power and Influence, Bases of Power, Power Tactics, How People Respond To
Organizational Politics, Impression Management, HR policies and practices, Theories of work motivation,
Organizational Structure, Change management, Organizational stress, Nature of management.
Understanding Organizational Behavior, Personality Traits, Values, and Attitudes in the Workplace,
Perception Mechanisms, The Five Personality Model, Attitudes' Influence on Learning and Job Satisfaction,
Relationship Between Behavior and Attitudes, Perception's Role in Decision-Making Processes, Cognitive
Biases and Errors In Decision Making, Diversity, The challenge of diversity, Diversity management, What
motivates your people?, How to motivate your people?, Job design and employee reaction, Communication,
Evaluation, Feedback, Rewards.
Text Books :
1. Buchanan, David A., and Andrzej Huczynski. Organizational behaviour. 1st ed. Pearson, 2019.
Reference Books :
1. Smith, Paul E., Wendy Yellowley, and Christopher J. McLachlan. Organizational behaviour:
Managing people in dynamic organizations. 1st ed. Taylor & Francis, 2020.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET310 Marketing Strategies and Planning L T P C
Owning School/Department Computer Science Engineering 3 0 0 3
Pre-requisites/Exposure -
CO-PO/PSO Mapping
PO PO2 PO3 PO4 PO5 PO PO PO PO PO1 PO1 PO1 PSO PSO2 PSO3
1 6 7 8 9 0 1 2 1
CO1 2 1 1 1 2 1 2
CO2 2 1 1 2 2 2 2 1
CO3 3 2 3 3 3 2 3 1
Course Contents:
Marketing Strategy Process, Scanning the Environment, Creating Value, Sustaining Value, Importance of
Market Research, Conducting Market Research, Strategic Marketing, Segmentation Targeting Positioning,
Levels of Market Segmentation, Profitable Segmentation, Targeting, Segmentation and Targeting in
Practice, Branding, Marketing Strategy and Brand Positioning, Building Strong Brands, Brand Positioning,
Experiential Branding, Product-Centric to CustomerCentric Management, Product-Centric Approach,
Data-Driven Business Models, Direct Marketing, Customer Centricity, Communications campaign
designing, Media Planning.
Pricing, Price Sensitivity, Measuring Price Elasticity, Psychological Aspects of Pricing, Analytic
Foundations for Pricing, Economic Value to the Customer, Creating Customer Access, Disruption in
Information Delivery, Influencing Consumer Behavior, New Product Adoption, Managing Channel
Conflict, Online Retailing and E-Commerce, Branding, Brand Elements: Choosing a Brand Name, Color
& Taglines, Packaging, Persuasion, Repositioning a Brand, Building Your Professional Brand, Content
Marketing, Structure for Effective Content.
Applied Marketing, Strategic Context, 7A Framework, Agility & Authenticity, Stealing Headlines for
Attention, Capturing Audience Attention, Call-to-Action & Risk Reversal, Expanding Your Network,
Crafting a Content Marketing Strategy, Empathy Maps, Experience Map, Creating Irresistible Content,
Strategic Types of Content, Attraction Content, Affinity Content, Action Content, Making Action Content
Actionable, Authority Content, Managing Your Content, Ethics and Professionalism, Plagiarism and
Copyright Law, Multimedia Content, Visuals, Audio and Video, Digital Marketing, Digital Marketing
Framework, Marketing Channels, Social Media Marketing, Email Marketing.
Text Books :
1. West, Douglas C., John Battice Ford, and Essam Ibrahim. Strategic marketing: creating competitive
advantage. 1st ed. LID Publishing Limited, 2020. ISBN 978-1912555765.
Reference Books :
1. Ferrell, Odies C., Michael Hartline, and Bryan W. Hochstein. Marketing strategy. 1st ed. Cengage
Learning, 2021. ISBN 978-0357516362.
Name of Program Bachelor of Technology (Computer Science Engineering)
CSET311 Micro and Macro Economics L T P C
CO1: To examine the understanding importance of the economy for engineering professionals.
CO2: To articulate the factors required in taking appropriate economic decisions which will help in
minimizing investment, operating and maintenance expenditures.
Course Contents:
Economics as a Science, Finance, Growth, and Volatility, Micro-Founded Macro Models, Markets &
Competition, Supply and Demand, Consumer Theory, Production and Costs, Welfare Economics,
Monopoly, Other Market Structures, International Trade, Uncertainty, Capital Supply and Capital Markets,
Equity and Efficiency, Taxation and Redistribution, Social Insurance.
Microeconomics, Demand Curve, Elasticity of demand, Consumer surplus, Preferences and utility, Budget
constraints, Income elasticity of demand, Deriving demand curve, Applying consumer theory, Cross
elasticity of demand, Elasticity of supply, Elasticity interpreted, Surpluses & Min/Max price, Maximum
rent, Minimum wage, Exchange rates, Demand for import/export, Producer Theory, Productivity and cost,
Welfare economics Monopoly, Oligopoly, Factor Market, International trade, Uncertainty, Capital supply
and market, Equity and efficiency, Healthcare economics.
Text Books:
1. Zahid A. Khan , Arshad N. Siddiquee , Brajesh Kumar and Mustafa H. Abidi, Principles of Engineering
Economics with Applications (1st ed.), Cambridge University Press, 2018. ISBN 978-1108458856..
Reference Books:
1. George Abbot and Niall Kishtainy, The Economics Book (1st ed.), DK Publishing, 2014. ISBN 978-
1465438409.