B.Tech CSE 2022-2023
B.Tech CSE 2022-2023
B.Tech CSE 2022-2023
To offer computing education programs with the goal that the students become
technically competent and develop lifelong learning skill.
1. Graduates will be engineering practitioners and leaders, who would help solve
responsibility.
4. Graduates will interact with their peers in other disciplines in industry and
management.
3. Invent and use appropriate models of data analysis, assess the quality of input,
derive insight from results, and investigate potential issues. Also to organize big data
sets into meaningful structures, incorporating data profiling and quality standards.
3 Discipline Core 47
4 Discipline Elective 15
6 Open Elective 15
7 Bridge Course 0
162
Total Credits
Foundation Core
sl.no Course Code Course Title Course Type Ver L T P J Credit
sio
n
1 BCHY101L Engineering Chemistry Theory Only 1.0 3 0 0 0 3.0
5 BCSE102P Structured and Object-Oriented Programming Lab Lab Only 1.0 0 0 4 0 2.0
7 BEEE102L Basic Electrical and Electronics Engineering Theory Only 1.0 3 0 0 0 3.0
8 BEEE102P Basic Electrical and Electronics Engineering Lab Lab Only 1.0 0 0 2 0 1.0
17 BMAT201L Complex Variables and Linear Algebra Theory Only 1.0 3 1 0 0 4.0
5 BMAT205L Discrete Mathematics and Graph Theory Theory Only 1.0 3 1 0 0 4.0
Discipline Core
sl.no Course Code Course Title Course Type Ver L T P J Credit
sio
n
1 BCSE202L Data Structures and Algorithms Theory Only 1.0 3 0 0 0 3.0
2 BCSE202P Data Structures and Algorithms Lab Lab Only 1.0 0 0 2 0 1.0
5 BCSE204P Design and Analysis of Algorithms Lab Lab Only 1.0 0 0 2 0 1.0
21 BCSE309P Cryptography and Network Security Lab Lab Only 1.0 0 0 2 0 1.0
Discipline Elective
sl.no Course Code Course Title Course Type Ver L T P J Credit
sio
n
1 BCSE206L Foundations of Data Science Theory Only 1.0 3 0 0 0 3.0
3 BCSE207P Programming for Data Science Lab Lab Only 1.0 0 0 2 0 1.0
Report On : 20-04-2023 02:08:15 PM Page 2 of 7
Discipline Elective
4 BCSE208L Data Mining Theory Only 1.0 2 0 0 0 2.0
10 BCSE311P Sensors and Actuator Devices Lab Lab Only 1.0 0 0 2 0 1.0
12 BCSE312P Programming for IoT Boards Lab Lab Only 1.0 0 0 2 0 1.0
13 BCSE313L Fundamentals of Fog and Edge Computing Theory Only 1.0 3 0 0 0 3.0
19 BCSE319L Penetration Testing and Vulnerability Analysis Theory Only 1.0 2 0 0 0 2.0
20 BCSE319P Penetration Testing and Vulnerability Analysis Lab Lab Only 1.0 0 0 2 0 1.0
33 BCSE329L Blockchain and Distributed Ledger Technology Theory Only 1.0 2 0 0 0 2.0
34 BCSE329P Blockchain and Distributed Ledger Technology Lab Lab Only 1.0 0 0 2 0 1.0
35 BCSE330L Public Key Infrastructure and Trust Management Theory Only 1.0 3 0 0 0 3.0
Open Elective
sl.no Course Code Course Title Course Type Ver L T P J Credit
sio
n
1 CFOC102M Introduction to Cognitive Psychology Online Course 1.0 0 0 0 0 3.0
6 CFOC118M Practical Machine Learning with Tensorflow Online Course 1.0 0 0 0 0 2.0
14 CFOC193M Bioengineering: An Interface with Biology and Online Course 1.0 0 0 0 0 2.0
Medicine
17 CFOC207M Electronic Waste Management - Issues And Online Course 1.0 0 0 0 0 1.0
Challenges
30 CFOC388M Energy Resources, Economics and Environment Online Course 1.0 0 0 0 0 3.0
35 CFOC401M The Nineteenth - Century English Novel Online Course 1.0 0 0 0 0 3.0
38 CFOC407M Introduction to Modern Indian Political Thought Online Course 1.0 0 0 0 0 3.0
39 CFOC408M English Literature of the Romantic Period, 1798 - Online Course 1.0 0 0 0 0 2.0
1832
42 CFOC442M Robotics and Control : Theory and Practice Online Course 1.0 0 0 0 0 2.0
44 CFOC488M Business Analytics For Management Decision Online Course 1.0 0 0 0 0 3.0
50 CFOC497M Financial Statement Analysis and Reporting Online Course 1.0 0 0 0 0 3.0
Course Outcome
At the end of the course, students should be able to:
1. Understand different programming language constructs and decision-making
statements; manipulate data as a group.
2. Recognize the application of modular programming approach; create user defined
data types and idealize the role of pointers.
3. Comprehend various elements of object-oriented programing paradigm; propose
solutions through inheritance and polymorphism; identify the appropriate data
structure for the given problem and devise solution using generic programming
techniques.
Indicative Experiments
1. Programs using basic control structures, branching and looping
2. Experiment the use of 1-D, 2-D arrays and strings and Functions
3. Demonstrate the application of pointers
4. Experiment structures and unions
5. Programs on basic Object-Oriented Programming constructs.
6. Demonstrate various categories of inheritance
7. Program to apply kinds of polymorphism.
8. Develop generic templates and Standard Template Libraries.
Total Laboratory Hours 60 hours
Text Book(s)
1. Robert C. Seacord, Effective C: An Introduction to Professional C Programming,
1st Edition, No Starch Press, 2020.
Reference Book(s)
1. Vardan Grigoryan and Shunguang Wu, Expert C++: Become a proficient programmer by
learning coding best practices with C++17 and C++20's latest features, 1st Edition,
Packt Publishing Limited, 2020.
Mode of assessment: Continuous assessments and FAT.
Recommended by Board of Studies 03.07.2021
Approved by Academic Council No. 63 Date 23.09.2021
Course Outcome
At the end of the course the student will be able to
1. Optimize the logic functions using and Boolean principles and K-map.
2. Model the Combinational and Sequential logic circuits using Verilog HDL.
3. Design the various combinational logic circuits and data path circuits.
4. Analyze and apply the design aspects of sequential logic circuits.
5. Analyze and apply the design aspects of Finite state machines.
6. Examine the basic architectures of programmable logic devices.
Course Outcome
At the end of the course the student will be able to
1. Design, simulate and synthesize combinational logic circuits, data path circuits and
sequential logic circuits using Verilog HDL.
2. Design and implement FSM on FPGA.
3. Design and implement small digital systems on FPGA.
Indicative Experiments
1. Characteristics of Digital ICs, Realization of Boolean expressions 2 hours
2. Design and Verilog modeling of Combinational Logic circuits 4 hours
3. Design and Verilog modeling of various data path elements - Adders 2 hours
4. Design and Verilog modeling of various data path elements - Multipliers 2 hours
5. Implementation of combinational circuits – (FPGA / Trainer Kit) 2 hours
6. Implementation of data path circuit - (FPGA / Trainer Kit) 2 hours
7. Design and Verilog modeling of simple sequential circuits like Counters 2 hours
and Shift registers
8. Design and Verilog modeling of complex sequential circuits 2 hours
9. Implementation of Sequential circuits - (FPGA / Trainer Kit) 2 hours
10. Design and Verilog modeling of FSM based design – Serial Adder 2 hours
11. Design and Verilog modeling of FSM based design – Traffic Light 4 hours
Controller / Vending Machine
12. Design of ALU 4 hours
Course Outcome:
At the end of the course, the student should be able to
1. Comprehend the various microprocessors including Intel Pentium Processors
2. Infer the architecture and Programming of Intel 8086 Microprocessor.
3. Comprehend the architectures and programming of 8051 microcontroller.
4. Deploy the implementation of various peripherals such as general purpose input/
output, timers, serial communication, LCD, keypad and ADC with 8051
microcontroller
5. Infer the architecture of ARM Processor
6. Develop the simple application using ARM processor.
Course Outcome
Student will be able to
1. Showcase the skill, knowledge and ability of programming microcontroller and
microprocessor using its instruction set.
2. Expertise with microcontroller and interfaces including general purpose input/ output,
timers, serial communication, LCD, keypad and ADC.
Discipline Elective
Course code Course Title L T P C
BCSE206L Foundations of Data Science 3 0 0 3
Pre-requisite NIL Syllabus version
1.0
Course Objectives
1. To provide fundamental knowledge on data science with querying and analytics
required for the field of data science.
2. To understand the process of handling heterogeneous data, pre-process and
visualize them for better understanding.
3. To gain the fundamental knowledge on data science tools and gain basic skill set to
solve real-time data science problems.
Course Outcome
Upon completion of the course the student will be able to
1. Ability to obtain fundamental knowledge on data science.
2. Demonstrate proficiency in data analytics.
3. Apply advanced tools to work on dimensionality reduction and mathematical
operations.
4. Handle various types of data and visualize them using through programming for
knowledge representation.
5. Demonstrate numerous open source data science tools to solve real-world
problems through industrial case studies.
Text Book(s)
Sanjeev Wagh, Manisha Bhende, Anuradha Thakare, ‘Fundamentals of Data Science,
1.
CRC Press, 1st Edition, 2022.
Reference Books
Avrim Blum, John Hopcroft, Ravindran Kannan, “Foundations of Data Science”,
1.
Cambridge University Press, First Edition, 2020.
Joel Grus, “Data Science from Scratch: First Principles with Python”, O’Reilly Media, 1st
2.
Edition, 2015.
Ani Adhikari and John DeNero, ‘Computational and Inferential Thinking: The
3.
Foundations of Data Science’, GitBook, 2019.
Mode of Evaluation : Continuous Assessment Tests, Quizzes, Assignment, Final
Assessment Test
Recommended by Board of Studies 12-05-2022
Approved by Academic Council No. 66 Date 16-06-2022
Course Outcome
Upon completion of the course, the student will be able to
1. Engrave and use R language to solve problems.
2. Design a suitable form for analysis from real-time data.
3. Formulate insights from the data through statistical inferences.
4. Evaluate and visualize the results, analyze the performance of the models.
Text Book(s)
1. Michael Freeman and Joel Ross, Programming Skills for Data Science: Start Writing
Course Outcome
Upon completion of the course, the student will be able to
1. Program and use R language to solve problems.
2. Design a suitable form for analysis from real-time data.
3. Formulate insights from the data through statistical inferences.
4. Evaluate and visualize the results, analyze the performance of the models.
Indicative Experiments
1. Functions in R 4 hours
2. Vectors and Lists 2 hours
3. Data Frames 4 hours
4. Handling Missing Data 4 hours
5. Manipulating Data with dplyr and tidyr 2 hours
6. Processing JSON Data 2 hours
7. APIs 3 hours
8 Data Visualization 3 hours
9. Interactive Visualization in R 3 hours
10. Case Study 3 hours
Total Laboratory Hours 30 hours
Mode of assessment: Continuous assessment / FAT / Oral examination and others
Recommended by Board of Studies 12-05-2022
Approved by Academic Council No. 66 Date 16-06-2022
Course Outcome
Upon completion of the course the student will be able to
1. Interpret the contribution of data warehousing and data mining to the decision-
support systems.
2. Construct the data needed for data mining using preprocessing techniques.
3. Discover interesting patterns from large amounts of data using Association Rule
Mining.
4. Extract useful information from the labeled data using various classifiers and Compile
unlabeled data into clusters applying various clustering algorithms.
5. Demonstrate capacity to perform a self-directed piece of practical work that requires
the application of data mining techniques.
Text Book(s)
Jiawei Han and Micheline Kamber, Data Mining: Concepts and Techniques, Morgan
1.
Kaufmann Publishers, third edition, 2013.
Reference Books
Parteek Bhatia, Data Mining and Data Warehousing: Principles and Practical
1.
Techniques, Cambridge University Press, 2019.
Pang-Ning Tan, Michael Steinbach, Anuj Karpatne, Vipin Kumar, Introduction to Data
2.
Mining, Pearson, 2nd Edition, 2019.
Mode of Evaluation : Continuous Assessment Tests, Quizzes, Assignment, Final
Assessment Test
Recommended by Board of Studies 12-05-2022
Approved by Academic Council No. 66 Date 16-06-2022
Course Outcome
1. Interpret the contribution of data warehousing and data mining to the decision-
support systems.
2. Construct the data needed for data mining using preprocessing techniques.
3. Discover interesting patterns from large amounts of data using Association Rule
Mining.
4. Extract useful information from the labeled data using various classifiers and
Compile unlabeled data into clusters applying various clustering algorithms.
5. Demonstrate capacity to perform a self-directed piece of practical work that
requires the application of data mining techniques.
Indicative Experiments
1. Introduction to exploratory data analysis using R.
2. Demonstrate the Descriptive Statistics for a sample data like mean, median,
variance and correlation etc.,
3. Demonstrate Missing value analysis using sample data.
4. Demo of Apriori algorithm on various data sets with varying confidence and
support.
5. Demo of FP Growth algorithm on various data sets with varying confidence and
support.
6 Demo on Classification Techniques such as Decision Tree (ID3 / CART),
Bayesian etc., and using sample data.
7. Demonstration of Clustering Techniques K-Medoid and Hierarchical.
8. Demonstration on Document Similarity Techniques and measurements.
9. Simulation of Page Rank Algorithm.
10. Demonstration on Hubs and Authorities.
Total Laboratory Hours 30 hours
Text Book(s)
Jiawei Han and Micheline Kamber, Data Mining: Concepts and Techniques, Morgan
Kaufmann Publishers, third edition, 2013.
Reference Books
Parteek Bhatia, Data Mining and Data Warehousing: Principles and Practical
Techniques, Cambridge University Press, 2019.
Pang-Ning Tan, Michael Steinbach, Anuj Karpatne, Vipin Kumar, Introduction to Data
Mining, Pearson, 2nd Edition, 2019.
Course Outcome
At the end of this course, student will be able to:
1. Understand, visualize, analyze and preprocess the data from a real-time source.
2. Apply appropriate algorithm to the data.
3. Analyze the results of algorithm and convert to appropriate information required for the
real – time application.
4. Evaluate the performance of various algorithms that could be applied to the data and to
suggest most relevant algorithm according to the environment.
Text Book(s)
Ethem Alpaydin, Introduction to Machine Learning, MIT Press, Prentice Hall of India,
1.
Third Edition 2014.
Course Outcomes
At the end of the course, the student will be able to
1. Handle missing data in the real world data sets by choosing appropriate
methods.
2. Summarize the data using basic statistics. Visualize the data using basic
graphs and plots.
3. Identify the outliers if any in the data set.
4. Choose appropriate feature selection and dimensionality reduction.
5. Apply Techniques for handling multi-dimensional data.
Text Book(s)
1. Suresh Kumar Mukhiya, Usman Ahmed, “Hands-On Exploratory Data Analysis with
Python” 1st Edition, 2020, Packt Publishing.
2. Martinez, W , Martinez A & J.L. Solka : Exploratory Data Analysis with MATLAB, CRC
Press, A Chapman & Hall Book, 3rd Edition, 2017
Reference Books
1. Michael Jambu, “Exploratory and multivariate data analysis”, 1991, 1st Edition,
Academic Press Inc.
2. Charu C. Aggarwal, “Data Mining The Text book”, 2015, Springer.
3. Craig K. Enders, “Applied Missing Data Analysis”, 2010, 1st Edition, The Guilford Press.
Mode of Evaluation: CAT / written assignment / Quiz / FAT / Project
Indicative Experiments
1. Data transformation and pre-processing. Write R programs to read data 4 hours
from keyboard and transform it to various ranges like [-3,+3], [-1,+1],
[0,1] etc.
2. Write R programs to read data from keyboard or text files and compute 6 hours
summary measures like arithmetic mean, median, mode, variance and
standard deviation. Also read a set of X,Y values and find covariance
and correlation, use statistical techniques to identify outlier data
3. Estimation of missing data, global methods, class based methods, 6 hours
multiple imputation methods etc
4 Exploratory Data Analysis for Structured Data 4 hours
4. Write R programs to implement the k-means clustering algorithm by 6 hours
reading the data and user-specified value of k. Display the
characteristics of the clusters found by the algorithm.
5. Write R programs for nearest neighbour algorithms for classification 4 hours
Total Laboratory Hours 30 hours
Mode of assessment: Continuous assessment / FAT / Oral examination and others
Recommended by Board of Studies 12-05-2022
Approved by Academic Council No. 66 Date 16-06-2022
Course Outcomes
At the end of this course, student will be able to:
1. Understand the methods and terminologies involved in deep neural network,
differentiate the learning methods used in Deep-nets.
2. Identify and apply suitable deep learning approaches for given application.
3. Design and develop custom Deep-nets for human intuitive applications.
4. Design of test procedures to assess the efficiency of the developed model.
5. To understand the need for Reinforcement learning in real – time problems.
Text Book(s)
1. Ian Goodfellow Yoshua Bengio Aaron Courville, Deep Learning, MIT Press, 2017.
2 Michael Nielsen, Neural Networks and Deep Learning, Determination Press, first
Edition, 2013.
Reference Books
1. N D Lewis, Deep Learning Step by Step with Python, 2016.
2. Josh Patterson, Adam Gibson, Deep Learning: A Practitioner's Approach, O'Reilly
Media, 2017.
3 Umberto Michelucci, Applied Deep Learning. A Case-based Approach to Understanding
Deep Neural Networks, Apress, 2018.
4 Giancarlo Zaccone, Md. RezaulKarim, Ahmed Menshawy, Deep Learning with
TensorFlow: Explore neural networks with Python, Packt Publisher, 2017.
Mode of Evaluation: CAT / Written Assignment / Quiz / FAT
Recommended by Board of Studies 09-05-2022
Approved by Academic Council No. 66 Date 16-06-2022
Course Outcomes
At the end of this course, student will be able to:
1. Understand the methods and terminologies involved in deep neural network,
differentiate the learning methods used in Deep-nets.
2. Identify and apply suitable deep learning approaches for given application.
3. Design and develop custom Deep-nets for human intuitive applications.
4. Design of test procedures to assess the efficiency of the developed model.
5. Understand the need for Reinforcement learning in real – time problems.
Indicative Experiments
1. Demonstration and implementation of Shallow architecture, using 10 hours
Python, Tensorflow and Keras.
Course Outcomes
At the end of the course, the student will be able to
1. Understand the notion of a parametric model, point estimation of the parameters
and properties of a good estimator.
2. Learn the concept of interval estimation and confidence intervals.
3. Understand and perform large-sample tests of hypotheses.
4. Discuss nonparametric tests of hypotheses.
5. Translate and correlate the statistical analysis into Statistical inference
Text Book(s)
1. Robert V Hogg, Elliot A Tannis and Dale L.Zimmerman, Probability and Statistical
Inference, 9th Edition, Pearson publishers, 2015.
2. Manoj Kumar Srivastava and Namita Srivastava, Statistical Inference Testing of
Hypotheses, Prentice Hall of India, Kindle Edition, 2014.
Reference Books
1. Marc S. Paolella, Fundamental statistical inference: A computational approach, Wiley,
2018.
2. B. K. Kale and K. Muralidharan, Parametric Inference, Narosa Publishing House, 2016.
3. Miller, I and Miller, M, John E. Freund's Mathematical statistics with Applications,
Pearson Education, 2002.
4. George Casella and Roger L.Berger, Statistical Inference, 2nd edition, Casebound
Engelska, 2002.
Mode of Evaluation: CAT / written assignment / Quiz / FAT / Project / Seminar
Recommended by Board of Studies 12-05-2022
Approved by Academic Council No. 66 Date 16-06-2022
Indicative Experiments
1 Methods of Estimation – MLE and Method of Moments 2 hours
2 Estimation of Confidence intervals 4 hours
3 P- value and Power of the test 2 hours
4 Large Sample Tests- Test for Population mean & Population 4 hours
proportions
5 Small Sample Tests – t – test for population mean, Paired t-test 4 hours
6 F- test for population variances 2 hour
7 Chi-square test for goodness of fit and test for attributes 4 hours
8 Test for correlation and test for regression 6 hours
9 Non-parametric tests 4 hours
Total Laboratory Hours 30 hours
Mode of assessment: Continuous assessment / FAT / Oral examination and others
Recommended by Board of Studies 12-05-2022
Approved by Academic Council No. 66 Date 16-06-2022
Text Book(s)
1. Kuhn, Max, and Kjell Johnson. Applied Predictive Modeling, 3rd Edition, Springer, 2019.
2. Jeffrey Strickland, Predictive analytics using R, Simulation educators, Colorado
Springs, 2015.
Reference Books
1. Anasse Bari, Mohamed Chaouchi, Tommy Jung, Predictive Analytics for dummies, 2nd
edition Wiley, 2016.
2. Daniel T.Larose and Chantal D.Larose, Data Mining and Predictive Analytics, 2nd
edition Wiley, 2015.
Course Outcomes
At the end of the course, the student will be able to
1. Explain the concepts of Healthcare Data Analytics and healthcare foundations.
2. Apply machine learning techniques on healthcare data analytics.
3. Measure and analyse the quality of health-care systems.
4. Develop models for effective predictions in healthcare applications.
5. Use modern day emerging technologies in healthcare data analytics process.
analytics and social media - Healthcare and deep learning - Obstacles, ethical issues, and
limitations.
Module:8 Contemporary Issues 2 hours
Text Book(s)
1. Kumar, Vikas Vik. Healthcare Analytics Made Simple: Techniques in healthcare
computing using machine learning and Python. Packt Publishing Ltd, 2018.
2. El Morr, Christo, and Hossam Ali-Hassan. Analytics in healthcare: a practical
introduction. Springer, 2019.
Reference Books
1. Dinov, Ivo D. "Data Science and Predictive Analytics." Springer, Ann Arbor, MI, USA
https://doi. org/10 1007 (2018): 978-3.
2. Yang, Hui, and Eva K. Lee, eds. Healthcare analytics: from data to knowledge to
healthcare improvement. John Wiley & Sons, 2016.
Mode of Evaluation: CAT / written assignment / Quiz / FAT / Project / Seminar / group
discussion
Course Outcome
At the end of the course, the student will be able to
1. Approach and analyze any financial data.
2. Differentiate between various time series models.
3. Perform cross-validation of various financial models developed.
4. Forecast future observations on financial data.
Indicative Experiments
1. Given a simple daily return of a concern as data, implement and 8 hours
execute a R program to compute the sample mean, standard deviation,
skewness, excess kurtosis, minimum and maximum of each simple
return series.
2. Consider the daily range (daily high–daily low) of Apple stock from 8 hours
January 2, 2007 to December 23, 2011. One can obtain the data by the
package quantmod from Yahoo. Compute the first 100 lags of ACF of
the series. Is there evidence of long-range dependence? Why? If the
range series has long memory, build an ARMA model for the data.
3. Consider the 30-year conventional mortgage rates from April 8 hours
1971 to November 2011. Build a pure time series model for the monthly
mortgage rate. Perform model checking and find the fitted model.
4. Use the quantmod package to obtain the daily prices of Apple stock 6 hours
from
January 2, 2007, to November 30, 2011.
Use an ARMA–GARCH model to obtain the daily volatility of the stock.
Compare the three volatility series.
Total Laboratory Hours 30 hours
Mode of assessment: Continuous assessment / FAT / Oral examination and others
Recommended by Board of Studies 12-05-2022
Approved by Academic Council No. 66 Date 16-06-2022
Text Book(s)
1. Simone Cirani, Gianluigi Ferrari, Marco Picone, Luca Veltri. Internet of Things:
Architectures, Protocols and Standards, 2019, 1st Edition, Wiley Publications, USA.
Reference Books
1. Bahga, Arshdeep, and Vijay Madisetti. Internet of Things: A Hands-on Approach,
2014,1st Edition, Universities press, India.
Vlasios Tsiatsis, Jan Holler, Catherine Mulligan, Stamatis Karnourskos and David
2. Boyle. Internet of Things: Technologies and Applications for a New Age of Intelligence,
2018, 2nd Edition, Academic Press, USA.
Mode of Evaluation: CAT, Written Assignment, Quiz, FAT, Project
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No. 65 Date 17-03-2022
Course Outcomes
At the end of this course, student will be able to:
1. Classify different Sensors & Actuators based on various physical phenomena and
differentiate their performance characteristics
2. Analyze the working principles of thermal, optical & electric sensors and actuators to
interpret their mathematical model
3. Interpret the functional principles of magnetic, thermal & Chemical sensors and
actuators to interpret their mathematical model
4. Select the relevant sensors and actuators to design real-time data acquisition from
ambience via case studies
Definitions and units – Elastic waves and their properties – Microphones: Carbon, Magnetic,
Ribbon and Capacitive Microphones – Piezoelectric effect – Piezoelectric Sensors –
Acoustic Actuators: Loudspeakers, Headphones and Buzzers - Magnetic and Piezoelectric –
Ultrasonic sensors and actuators – Case Study: Ultrasonic parking system
Course Outcome
At the end of this course, student will be able to:
1. Investigate various challenges and explore open source hardware prototyping platforms
for designing IoT devices
2. Understand basic circuits, sensors and interfacing, data conversion process and shield
libraries to interface with the real world
3. Program SBC by exploring protocols, data conversion process, API and expansion boards
for practical IoT devices using Python
4. Learn embedded programming constructs and constraints in real time systems for real
world socio-economic problems
Text Book(s)
1. Yamanoor, Sai, and Srihari Yamanoor. Python Programming with Raspberry Pi,
2017, 1st edition, Packt Publishing Ltd,. UK
Reference Books
1. Donald Norris, The Internet of Things: Do-It-Yourself Projects with Arduino, Raspberry
Pi, and BeagleBone Black, 2015, 1st edition, McGraw Hill Education, India
2. Marco Schwartz, Home Automation with Arduino, 3rd edition, Open Home Automation
2014. Schwartz, Marco. Internet of things with arduino cookbook, 2016, 1st edition,
Packt Publishing Ltd., UK
3. Kooijman, Matthijs. Building Wireless Sensor Networks Using Arduino, 2015, 1st edition,
Packt Publishing Ltd., UK
Mode of Evaluation: CAT / Written Assignment / Quiz / FAT
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No. 65 Date 17-03-2022
Course Outcome
At the end of this course, student will be able to:
1. Use open-source hardware prototyping platform and peripherals for building digital
devices and interactive objects that can sense and control the physical world.
2. Program SBC for practical IoT devices using Python and explore protocols, data
conversion process, API’s and expansion boards for real world interaction.
Indicative Experiments
1. Introduction to IoT Development Kit and Development Environment
2. Internet Controlled LEDs
3. Temperature Logger
4. Home Automation
5. Soil Moisture Sensor
6. Light Color Control
7. Home Security System
8. Parking Sensor
9. Motor Control
10. Water Level Control
11. Street Light Control
Total Laboratory Hours 30 hours
Text Book(s)
1. Yamanoor, Sai, and Srihari Yamanoor. Python Programming with Raspberry Pi,
2017,1st edition, Packt Publishing Ltd,UK.
2. Donald Norris, The Internet of Things: Do-It-Yourself Projects with Arduino, Raspberry
Pi, and BeagleBone Black, 2015,1st edition,McGraw Hill Education, USA.
Reference Books
1. Schwartz, Marco. Home Automation with Arduino: Automate your Home using Open-
Source Hardware. 2013, 1st Edition, CreateSpace Independent Publishing, USA.
2. Kooijman, Matthijs. Building Wireless Sensor Networks Using Arduino, 2015, 1st
edition, Packt Publishing Ltd, UK.
Mode of Evaluation: CAT / Mid-Term Lab/ FAT
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No. 65 Date 17-03-2022
Course Outcome
At the end of this course, student will be able to:
1. Explore technologies behind the communication and management of fogs and edge
resources.
2. Learn the techniques for storage and computation in fogs, edges, 5G and clouds.
3. Implement Internet of Everything (IoE) applications through fog computing architecture
and use optimization techniques for the same.
4. Analyze the performance and issues of the applications developed using fog and edge
architecture.
Course Outcome
At the end of this course, student will be able to:
1. Identify different Internet of Things technologies and their applications.
2. Assess the need for Privacy and security model for the Internet of Things.
3. Explore various Trust Model for IoT and customize real time data for IoT applications.
4. Design security framework and solve IoT security issues.
Reference Books
1 Russell, Brian and Drew Van Duren. Practical Internet of Things Security, 2016,1st
edition, PACKT Publishing Ltd, UK
2 Kim, S., Deka, G. C., & Zhang, P. (2019). Role of blockchain technology in IoT
applications. Academic Press.
3 Whitehouse O Security of things: An Implementers’ guide to cyber-security for internet
of things devices and beyond, 2014, 1st edition, NCC Group, UK.
Mode of Evaluation: CAT, Digital Assignment, Quiz and FAT
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No. 65 Date 17-03-2022
Course Outcomes
At the end of this course, student will be able to:
6. Learn about software, hardware tools, protocols and components required for
Wearable Computing.
7. Understand basics of Body Sensor Networks (BSN) and its Programming
Framework.
8. Gain Knowledge about Cloud assisted BSN.
9. Learn About the necessary tools required for BSN applications.
Text Book(s)
1. Fortino, Giancarlo, Raffaele Gravina, and Stefano Galzarano, Wearable computing:
from modelling to implementation of wearable systems based on body sensor networks,
2018, 1st edition, John Wiley & Sons, USA
Reference Books
1. Sanjay M. Mishra, Wearable Android™: Android wear & Google Fit app development,
2015, 1st edition, John Wiley & Sons, USA
2. Barfield, Woodrow, ed. Fundamentals of wearable computers and augmented reality,
2015, 1st edition, CRC press, USA
Mode of Evaluation: CAT / Written Assignment / Quiz / FAT
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No. 65 Date 17-03-2022
Text Book(s)
1. Carol L. Stimmel, Building Smart Cities Analytics, ICT, Design Thinking, 2016, 1st
edition, CRC Press, Taylor and Francis, UK
Reference Books
1. Andrea Vesco and Francesco Ferrero, Handbook of research on social, economic, and
environmental sustainability in the development of smart cities, 2015, 1st edition,
Information Science Reference, IGI Global, USA
2. La Scala, Massimo, et al., eds. From smart grids to smart cities: new challenges in
optimizing energy grids. 2021, Vol. 2. John Wiley & Sons, USA
3. Angelakis, Vangelis, et al., eds. Designing, developing, and facilitating smart cities:
urban design to IoT solutions. 2016, Springer, USA
Text Book
1. Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies, Security in
Computing, 2018, Fifth Edition, Pearson, New York.
Reference Books
1. Mark Stamp, Information Security: Principles and Practice, 2021, 3rd Edition, Wiley.
2. Joanna Lyn Grama, Legal and Privacy Issues in Information Security, 2020, 3rd
Edition, Jones and Bartlett Publishers, Inc.
Mode of Evaluation: CAT / written assignment / Quiz / FAT
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No.65 Date 17-03-2022
1. Characterize basic rules, principles for protecting privacy and personally identifiable
information.
2. Formulate data that supports useful statistical inference while minimizing the disclosure of
sensitive information.
3. Identify the list of threats on the various types of anonymized data.
4. Classify and analyze the methods of test data generation with Privacy and utility.
Reference Books
1. AncoHundepool, Josep Domingo-Ferrer, Luisa Franconi, Sarah Giessing, Eric Schulte
Nordholt, Keith Spicer, Peter-Paul de Wolf, Statistical Disclosure Control, 2012, 1st
Edition Wiley. (ISBN No.: 978-1-11-997815-2), United States.
2. George T. Duncan. Mark Elliot, Juan-Jose Salazar-GonZalez, Statistical Confidentiality:
Principle and Practice. 2011, 1st Edition, Springer. (ISBN No.: 978-1-44-197801-1).
Mode of Evaluation: CAT / written assignment / Quiz / FAT
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No.65 Date 17-03-2022
Course Outcome
After completion of this course, the student shall be able to:
1. Familiarized with the basic principles for Information Gathering and Detecting
Vulnerabilities in the system.
2. Gain knowledge about the various attacks caused in an application.
3. Acquire knowledge about the tools used for penetration testing.
4. Learn the knowledge into practice for testing the vulnerabilities and identifying threats.
5. Determine the security threats and vulnerabilities in computer networks using penetration
testing techniques.
Text Book(s)
1. Najera-Gutierrez G, Ansari JA. Web Penetration Testing with Kali Linux: Explore the
methods and tools of ethical hacking with Kali Linux., 2018, 3rd Edition, Packt Publishing
Ltd, United Kingdom.
2. Hadnagy C. Social engineering: The science of human hacking, 2018, 2nd Edition, John
Wiley & Sons, United States.
Reference Books
1. Weidman G. Penetration testing: a hands-on introduction to hacking,2014, 1st Edition,
No Starch Press, United States
2. Engebretson P. The basics of hacking and penetration testing: ethical hacking and
penetration testing made easy, 2013, 2nd Edition, Elsevier.
Mode of Evaluation: CAT / written assignment / Quiz / FAT
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No.65 Date 17-03-2022
Course Outcome
After completion of this course, the student shall be able to:
1. Learn the knowledge into practice for testing the vulnerabilities and identifying threats.
2. Determine the security threats and vulnerabilities in computer networks using penetration
testing techniques.
Indicative Experiments
1. Perform a track of information about Domain Registrars and DNS by lookup
technologies
2. Perform various Port Scanning methodologies to identify the misconfiguration issues
about the infrastructure.
3. Analyze the traffic routing and information carried among the network through Wireshark
4. Exploit threats and mitigation strategies for, ARP Spoofing, IP Spoofing,
5. Demonstrate various approaches followed on password breaking methodology.
6. Perform and analyze the wireless network to identify their weakness around access
points with defensive mechanisms around it.
7. Apply various payloads to gain various categories of backdoor access of a machine
using Metasploit and Meterpreter.
Total Laboratory Hours 30 hours
Text Books
1. Najera-Gutierrez G, Ansari JA. Web Penetration Testing with Kali Linux: Explore the
methods and tools of ethical hacking with Kali Linux., 2018, 3rd Edition, Packt Publishing
Ltd, United Kingdom.
2. Hadnagy C. Social engineering: The science of human hacking, 2018, 2nd Edition, John
Wiley & Sons, United States.
Reference Books
1. Weidman G. Penetration testing: a hands-on introduction to hacking,2014, 1st Edition,
No Starch Press, United States
Mode of assessment: Continuous assessment / FAT
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No.65 Date 17-03-2022
Course Outcome
After completion of this course, the student shall be able to:
1. Understand security challenges and the need for Authentication and Authorization in web-
based systems and applications.
2. Familiarize the Application Programming Interface analysis and vulnerability management
of securing a web-based system.
3. Learn the web application hacking techniques and prevention solutions.
4. Apply the best practices of Secure Credentials, session management, and Security
Automation in web applications.
5. Develop the best strategies to prevent XSS, CSRF, XXE, Injection, DOS attacks and
Securing Third-Party Dependencies.
Course Outcome
After completion of this course, the student shall be able to:
1. Possess the skills to carry out static and dynamic malware analysis on various
malware samples.
2. Understand the executable formats, Windows internals, and APIs.
3. Apply techniques and concepts to unpack, extract, and decrypt malware.
4. Comprehend reverse-engineering of malware and anti-malware analysis
techniques.
5. Achieve proficiency with industry-standard malware analysis tools.
Debugging - Machine learning techniques for malware analysis: Support Vector Machine
(SVM), K-Nearest Neighbor (KNN), Random Forest (RF), Decision Trees (DT), Naïve
Bayes (NB), and Neural Networks (NN).
Module:8 Contemporary Issues 2 hours
Total Lecture hours: 30 hours
Text Book
1. Abhijit Mohanta, Anoop Saldanha, Malware Analysis and Detection Engineering a
Comprehensive Approach to Detect and Analyze Modern Malware, 2020, 1st edition,
Apress (ISBN 978-1-4842-6192-7), United States.
2. M. Sikorski and A. Honig, Practical Malware Analysis: The Hands-on Guide to
Dissecting Malicious Software. 2012, 1st edition, No Starch Press San Francisco, CA.
(ISBN No.: 9781593272906), United States.
Reference Books
1. Monnappa K A, Learning Malware Analysis- Explore the concepts, tools, and
techniques to analyze and investigate Windows malware, 2018, 1st edition, Packt
Publishing, (ISBN 978-1-78839-250-1), United Kingdom.
Mode of Evaluation: CAT / Assignment / Quiz / FAT / Seminar
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No.65 Date 17-03-2022
Course Outcome
After completion of this course, the student shall be able to:
Indicative Experiments
1 Examining PE Files using PEview, PE explorer and Resource Hacker
Disassembling Portable Executable (PE32)
imports, exports, functions, main address, malicious string locations
2 Sandboxing malware using SANDBOX tool, Virus Total Analysis, Anyrun Analysis
3 Basic malware analysis:
file compilation date
imports/ exports, suspicious strings
run-time effect
procmon filter
hist -based signatures revealing files
registry keys, processes, services
network-based signatures
4 Advanced static malware analysis
find address of main, code constructs, suspicious strings,
imported functions, their tasks,
intention of the malware
impact of the malware via hex code
5 Analyze the malware using IDA Pro for reverse-engineering the malware: strings
analysis, local variables, graph mode to cross-references, Analyzing Functions
6 Analyze the malware using OllyDbg: Debug the malware, Viewing Threads and
Stacks, OllyDbg Code-Execution Options, Breakpoints, Loading DLLs, Exception
Handling
7 Advanced analysis of Windows programs for processes, interactive remote
shell, uploaded file, address of the subroutine, return value, Windows APIs
8 Malware behavior analysis
finding the source of malware
persistence mechanism, multiple instances replication mechanisms,
hiding strategies
API calls for keylogging, constants involved
post-infection actions of the malware, mutex, SendMessage API structure
9 Malware self-defense, packing and unpacking, obfuscation and de-obfuscation
using Packers and obfuscation tools
10 Anti-disassembly and anti-debugging techniques used in the binary by
patching the PE, set a breakpoint in the malicious subroutine
11 Analyzing malicious Microsoft Office and Adobe PDF documents to locate malicious
Course Outcomes
After completion of this course, the student shall be able to:
1. Understand the responsibilities and liabilities of a computer forensic investigator
2. Seize a computer from a crime scene without damage and follow the legal procedures
and standards.
3. Demonstrate the ability to perform forensic data acquisition and analysis.
4. Analyze and retrieve hidden and damaged files from different operating systems.
5. Apply forensics to recent technologies such as smart phones, email, cloud and social
media.
Working with the cloud vendor, obtaining evidence, reviewing logs and APIs.
Module:8 Contemporary Issues 2 hours
Total Lecture hours: 30 hours
Text Book(s)
1. B. Nelson, A. Phillips, F. Enfinger, and C. Steuart, Guide to Computer Forensics and
Investigations, 2019, 6th ed. CENGAGE, INDIA (ISBN: 9789353506261)
Reference Books
1. André Årnes, Digital Forensics, 2018, 1st ed., Wiley, USA(ISBN No.:
9781119262411)
2. Nihad A Hassan, Digital Forensics Basics: A Practical Guide to Using Windows OS,
2019, 1st ed, APress, USA (ISBN: 9781484238387)
Mode of Evaluation: CAT, assignment, Quiz and FAT
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No.65 Date 17-03-2022
Course Outcomes
After completion of this course, the student shall be able to:
1. Demonstrate the ability to perform forensic data acquisition and analysis.
2. Apply forensics to recent technologies such as smart phones, email, cloud and social
media.
Indicative Experiments
1. Extract the features based on various color models and apply on image and video
retrieval
2. File Recovery (Deleted, fragmented, hidden)
3. Network Forensics (Determining the type attacks, extracting files from network logs,
encrypted _les)
4. OS Forensics (Windows and Linux artifacts, memory, registry)
5. Mobile Forensics(Tools for Android and iOS)
6. Mobile Forensics(Tools for Android and iOS)
7. Social Media Forensics
Total Laboratory Hours 30 hours
Text Book
1. B. Nelson, A. Phillips, F. Enfinger, and C. Steuart, Guide to Computer Forensics and
Investigations, 2019, 6th ed. CENGAGE, INDIA (ISBN: 9789353506261)
Reference Books
1. Nihad A Hassan, Digital Forensics Basics: A Practical Guide to Using Windows OS,
2019, 1st ed, APress, USA (ISBN: 9781484238387)
Mode of assessment: Continuous assessment / FAT
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No.65 Date 17-03-2022
Course Outcome
After completion of this course, the student shall be able to:
Text Book(s)
1. Frank Y. Shih, Digital Watermarking and Steganography Fundamentals and
Techniques, 2020, 2nd Ed. CRC Press, United States. (ISBN No. : 9780367656430)
2. J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications,
2010, 1st Ed. Cambridge: Cambridge University Press, United Kingdom. (ISBN No.: 978-
0-52-119019-0 )
Reference Books
1. I. J. Cox, M. L. Miller, J. A. Bloom, T. Kalker, and J. Fridrich, Digital Watermarking and
Steganography, 2008, 2nd Ed. Amsterdam: Morgan Kaufmann Publishers In, United
States. (ISBN No. : 978-0-12-372585-1 )
2. P. Wayner, Disappearing Cryptography: Information hiding: Steganography and
Watermarking, 2008, 3rd ed. Amsterdam: Morgan Kaufmann Publishers In, United
States. (ISBN No. : 978-0-08-092270-6 )
Mode of Evaluation: CAT / Assignment / Quiz / FAT
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No.65 Date 17-03-2022
Course Outcomes
After completion of this course, the student shall be able to:
Reference Books
Diedrich, H., Ethereum: Blockchains, digital assets, smart contracts, decentralized
1.
autonomous organizations, 2016, 1st Edition, Wildfire publishing, Sydney.
Wattenhofer, R. P, Distributed Ledger Technology: The Science of the Blockchain
2. (Inverted Forest Publishing), 2017, 2nd Edition, Createspace Independent Pub,
Scotts Valley, California, US.
Mode of Evaluation: CAT, written assignment, Quiz, FAT
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No. 65 Date 17-03-2022
BCSE325L BITCOIN L T P C
3 0 0 3
Pre-requisite NIL Syllabus version
1.0
Course Objectives
1. To Identify the process of Cryptocurrency.
2. To understand the functionality of Bitcoin.
3. To explore the recent developments on Bitcoin.
Course Outcomes
After completion of this course, the student shall be able to:
law and technology solutions, 2018, 1st edition, McGraw-Hill publication, New York.
Reference Books
1. Swan Melanie, Blockchain: Blueprint for a new economy, 2015, 1st edition, O'Reilly
Media, United States.
Mode of Evaluation: CAT / written assignment / Quiz / FAT
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No. 65 Date 17-03-2022
Course Outcomes
After completion of this course, the student shall be able to:
1. Understand the basics and objectives of Smart Contracts in a Blockchain.
2. Evaluate the various functionalities and features in an Ethereum to generate Smart
Contracts.
3. Introduce the Solidity language in creation of a Smart Contracts.
4. Incorporate Smart Contracts in decentralized applications.
5. Assess the security issues and effectiveness of a Smart Contracts in real world scenarios.
Reference Books
1. Dannen, C., Introducing Ethereum and solidity, 2017, (Vol. 318). Berkeley: Springer.
2. Modi, Ritesh, Solidity Programming Essentials: A beginner's guide to build smart
contracts for Ethereum and Blockchain, 2018, Packt Publishing Ltd, United Kingdom.
3. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder,
Course Outcomes
After completion of this course, the student shall be able to:
Indicative Experiments
1. Setting up Ethereum network by using Geth command line interface.
2. Identifying and setting up a testnet, like Ropsten or Kovan, so that free ethers can be used
as transaction.
3. Transfer ethers from one account to another on an Ethereum testnet.
4. Constructing Solidity code for a decentralized application where the owner can create a
contracts (with a tenant) which can be replicated to all nodes.
5. In a rented house setup with the owner and the tenants, the tenant can submit a deposit
and the contracts’s state changes on all the decentralized nodes.
6. The owner should be able to check the balance of the contracts from any one of the
nodes.
7. Using Remix on the Solidity code to develop, compile and deploy the contracts.
8. Using setter and getter functions to interact with the contracts
9. Withdrawing funds from a contracts to a restricted account, preferably the owner’s, with
different levels of security restrictions.
10. Deploying a contracts on an external blockchain by using Ganache and/or
MyEtherwalllet, Metamask.
Total Laboratory Hours 30 hours
Text Book
1. Gavin Zheng, Longxiang Gao, Liqun Huang, Jian Guan, Ethereum Smart Contracts
Development in Solidity, 2021, 1st Edition, Springer Singapore.
Reference Books
1. Modi, Ritesh. Solidity Programming Essentials: A beginner's guide to build smart
contracts for Ethereum and blockchain. 2018, Packt Publishing Ltd, United Kingdom.
2. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder,
Bitcoin and cryptocurrency technologies: a comprehensive introduction, 2016, Princeton
University Press.
Mode of assessment: Continuous assessment / FAT
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No. 65 Date 17-03-2022
Course Outcome
After completion of this course, the student shall be able to:
Text Book
1. Daskalakis, Nikos, and Panagiotis Georgitseas. An Introduction to Cryptocurrencies:
The Crypto Market Ecosystem, 2020, 1st Edition, Routledge, New York.
Reference Books
1. Grabowski, Mark. Cryptocurrencies: A Primer on Digital Money, 2019, 1st Edition,
Routledge, New York.
2. Narayanan, Arvind, et al. Bitcoin and cryptocurrency technologies: a comprehensive
introduction, 2016, 1st Edition, Princeton University Press, New Jersey.
Mode of Evaluation: CAT / written assignment / Quiz / FAT
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No. 65 Date 17-03-2022
Course Outcomes
After completion of this course, the student shall be able to:
Course Outcomes
After completion of this course, the student shall be able to:
2. Implement the mining module of Bitcoin client using Rust. The mining module, or miner,
should produce blocks that solve proof-of-work puzzle.
3. Compile and test smart contracts on a testing framework using the Ethereum Virtual
Machine (EVM).
1. To provide the knowledge on Public Key Cryptography techniques and Public Key
infrastructure.
2. To study about the Digital Certificates and the security challenges.
3. To understand the various trust models and the trust management systems.
Course Outcome:
After completion of this course, the student shall be able to:
1. Analyze and design Public Key cryptographic algorithms.
2. Evaluate the components of PKI and design & integrate PKI services
3. Design the Digital Certificates with PKI considerations
4. Identify the access control mechanism and provide solution for the security challenges
5. Analyze and select suitable trust model and manage with operational considerations
Text Book(s)
1. John R. Vacca, Public Key Infrastructure: Building Trusted Applications and Web
Services, 2019, 1st edition. Auerbach Publications, US.
2. Carlisle Adams, Steve Lloyd, Understanding PKI: Concepts, Standards, and
Deployment Considerations, 2011, 2nd Edition, Addison-Wesley, US.
Reference Books
1. Buchmann J, Karatsiolis E, Wiesmaier A, Karatsiolis E., Introduction to public key
infrastructures, 2013, Berlin: Springer.
Mode of Evaluation: CAT / written assignment / Quiz / FAT
Recommended by Board of Studies 04-03-2022
Approved by Academic Council No. 65 Date 17-03-2022
L T P C
BCSE391J Technical Answers to Real Problems Project
0 0 0 3
Pre-requisite NIL Syllabus version
1.0
Course Objectives:
1. To gain an understanding of real-life issues faced by society.
2. To study appropriate technologies in order to find a solution to real life issues.
3. Students will design system components intended to solve a real-life issue.
Course Outcome:
1. Identify real life issue(s) faced by society.
2. Apply appropriate technologies to suggest a solution to the identified issue(s).
3. Design the related system components/processes intended to provide a solution to
the identified issue(s).
Module Content
Students are expected to perform a survey and interact with society to find out the real life
issues.
Logical steps with the application of appropriate technologies should be suggested to solve
the identified issues.
Subsequently the student should design the related system components or processes which
is intended to provide the solution to the identified real-life issues.
General Guidelines:
1. Identification of real-life problems
2. Field visits can be arranged by the faculty concerned
3. Maximum of 3 students can form a team (within the same/different discipline)
4. Minimum of eight hours on self-managed team activity
5. Appropriate scientific methodologies to be utilized to solve the identified issue
6. Solution should be in the form of fabrication/coding/modelling/product design/process
design/relevant scientific methodology(ies)
7. Consolidated report to be submitted for assessment
8. Participation, involvement and contribution in group discussions during the contact
hours will be used as the modalities for the continuous assessment of the theory
component
9. Project outcome to be evaluated in terms of technical, economical, social,
environmental, political and demographic feasibility
10. Contribution of each group member to be assessed
Mode of Evaluation: Evaluation involves periodic reviews by the faculty with whom the
student has registered. Assessment on the project – Mark weightage of 20:30:50 – Report to
be submitted, presentation and project reviews
L T P C
BCSE392J Design Project
0 0 0 3
Pre-requisite NIL Syllabus version
1.0
Course Objectives:
1. Students will be able to upgrade a prototype to a design prototype.
2. Describe and demonstrate the techniques and skills necessary for the project.
3. Acquire knowledge and better understanding of design systems.
Course Outcome:
1. Develop new skills and demonstrate the ability to upgrade a prototype to a design
prototype or working model.
2. Utilize the techniques, skills, and modern tools necessary for the project.
3. Synthesize knowledge and use insight and creativity to better understand and
improve design systems.
Module Content
Students are expected to develop new skills and demonstrate the ability to develop
prototypes to design prototype or working models related to an engineering product or a
process.
Mode of Evaluation: Evaluation involves periodic reviews by the faculty with whom the
student has registered. Assessment on the project – Mark weightage of 20:30:50 – Report to
be submitted, presentation and project reviews.
L T P C
BCSE393J Laboratory Project
0 0 0 3
Pre-requisite NIL Syllabus version
1.0
Course Objectives:
1. The student will be able to conduct experiments on the concepts already learnt.
2. Analyse experimental data.
3. Present the results with appropriate interpretation.
Course Outcome:
1. Design and conduct experiments in order to gain hands-on experience on the
concepts already studied.
2. Analyse and interpret experimental data.
3. Write clear and concise technical reports and research articles
Module Content
Students are expected to perform experiments and gain hands-on experience on the theory
courses they have already studied or registered in the ongoing semester. The theory course
registered is not expected to have laboratory component and the student is expected to
register with the same faculty who handled the theory course. This is mostly applicable to
the elective courses. The nature of the laboratory experiments is depended on the course.
Mode of Evaluation: Evaluation involves periodic reviews by the faculty with whom the
student has registered. Assessment on the project – Mark weightage of 20:30:50 – Report to
be submitted, presentation and project reviews.
L T P C
BCSE394J Product Development Project
0 0 0 3
Pre-requisite NIL Syllabus version
1.0
Course Objectives:
1. Students will be able to translate a prototype to a useful product.
2. Apply relevant codes and standards during product development.
3. The student will be able to present his results by means of clear technical reports.
Course Outcome:
1. Demonstrate the ability to translate the developed prototype/working model to a
viable product useful to society/industry.
2. Apply the appropriate codes/regulations/standards during product development.
3. Write clear and concise technical reports and research articles
Module Content
Students are expected to translate the developed prototypes / working models into a product
which has application to society or industry.
Mode of Evaluation: Evaluation involves periodic reviews by the faculty with whom the
student has registered. Assessment on the project – Mark weightage of 20:30:50 – Report to
be submitted, presentation and project reviews
L T P C
BCSE396J Reading Course
0 0 0 3
Pre-requisite NIL Syllabus version
1.0
Course Objectives:
1. The student will be able to analyse and interpret published literature for information
pertaining to niche areas.
2. Scrutinize technical literature and arrive at conclusions.
3. Use insight and creativity for a better understanding of the domain of interest.
Course Outcome:
1. Retrieve, analyse, and interpret published literature/books providing information
related to niche areas/focused domains.
2. Examine technical literature, resolve ambiguity, and develop conclusions.
3. Synthesize knowledge and use insight and creativity to better understand the domain
of interest.
Module Content
This is oriented towards reading published literature or books related to niche areas or
focussed domains under the guidance of a faculty.
Mode of Evaluation: Evaluation involves periodic reviews by the faculty with whom the
student has registered. Assessment on the project – Mark weightage of 20:30:50 – Report to
be submitted, presentation and project reviews.
L T P C
BCSE397J Special Project
0 0 0 3
Pre-requisite NIL Syllabus version
1.0
Course Objectives:
1. Students will be able to identify and solve problems in a time-bound manner.
2. Describe major approaches and findings in the area of interest.
3. Present the results in a clear and concise manner.
Course Outcome:
1. To identify, formulate, and solve problems using appropriate information and
approaches in a time-bound manner.
2. To demonstrate an understanding of major approaches, concepts, and current
research findings in the area of interest.
3. Write clear and concise research articles for publication in conference
proceedings/peer-reviewed journals.
Module Content
This is an open-ended course in which the student is expected to work on a time bound
research project under the supervision of a faculty. The result may be a tangible output in
terms of publication of research articles in a conference proceeding or in a peer-reviewed
Scopus indexed journal.
Mode of Evaluation: Evaluation involves periodic reviews by the faculty with whom the
student has registered. Assessment on the project – Mark weightage of 20:30:50 – project
report to be submitted, presentation and project reviews.
L T P C
BCSE398J Simulation Project
0 0 0 3
Pre-requisite NIL Syllabus version
1.0
Course Objectives:
1. Students will be able to simulate a real system.
2. Identify the variables which affect the system.
3. Describe the performance of a real system.
Course Outcome:
1. Demonstrate the ability to simulate and critically analyse the working of a real
system.
2. Identify and study the different variables which affect the system elaborately.
3. Evaluate the impact and performance of the real system.
Module Content
The student is expected to simulate and critically analyse the working of a real system. Role
of different variables which affect the system has to be studied extensively such that the
impact of each step in the process is understood, thereby the performance of each step of
the engineering process is evaluated.
Mode of Evaluation: Evaluation involves periodic reviews by the faculty with whom the
student has registered. Assessment on the project – Mark weightage of 20:30:50 – project
report to be submitted, presentation and project reviews.
Course Outcome
On the completion of this course, the student will be able to:
1. Formulate mathematical models of the physical systems.
2. Analyze the system performance in time and frequency domains.
3. Determine the stability of linear time invariant system in time and frequency domains.
4. Design compensators and controllers to meet the performance specifications.
5. Perform state space analysis and design state feedback control.
Education
3. M. Gopal, Control Systems- Principles and Design, 2016, 4th Edition, Tata McGraw Hill
4. J. Nagrath and M. Gopal, Control System Engineering, 2018, 6th Edition, New Age
International Publishers
Mode of Evaluation: CAT, Assignment, Quiz, FAT
Course Outcomes
On the completion of this course, the student will be able to:
1. Design feedback control for meeting system specifications.
2. Analyze the stability and response of linear time invariant systems.
3. Perform the time and frequency domain analyses of first and second order systems.
Indicative Experiments
1. Simulation study of block diagram reduction technique
2. Determination of time domain specifications
3. Study of first and second order electrical networks
4. Stability analysis of linear systems
5. PID controller design using Bode plot
6. PID controller design using root locus
7. Compensator design in frequency and time domains
8. Analysis of controllability and observability properties of a system
9. Lag compensator design for linear servo motor for speed control application
10. Pole placement controller design for inverted pendulum
11. PD controller design for position control of servo plant
12. Cascade control design for ball and beam system
13. PID controller design for magnetic levitation system
14. Determination of transfer function of separately excited DC generator
15. Identification of transfer function of field-controlled separately excited DC Motor
16. Controller realization from MATLAB / SIMULINK using Embedded Coder
Total Laboratory Hours 30 hours
Mode of assessment: Continuous assessment, FAT
Text Book
1. Norman S. Nise, Control System Engineering, 2019, 8th Edition, John Wiley &
Sons
Recommended by Board of Studies 19-02-2022
Approved by Academic Council No. 65 Date 17-03-2022
L T P C
BCSE399J Summer Industrial Internship
0 0 0 1
Pre-requisite NIL Syllabus version
1.0
Course Objectives:
1. The course is designed so as to expose the students to industry environment and to
take up on-site assignment as trainees or interns.
Course Outcome:
1. Demonstrate professional and ethical responsibility.
2. Understand the impact of engineering solutions in a global, economic, environmental
and societal context.
3. Develop the ability to engage in research and to involve in life-long learning.
4. Comprehend contemporary issues.
Module Content
Four weeks of work at industry site.
Supervised by an expert at the industry.
L T P C
BCSE497J Project - I
0 0 0 3
Pre-requisite NIL Syllabus version
1.0
Course Objectives:
To provide sufficient hands-on learning experience related to the design, development and
analysis of suitable product / process so as to enhance the technical skill sets in the chosen
field.
Course Outcome:
1. Demonstrate professional and ethical responsibility.
2. Evaluate evidence to determine and implement best practice.
3. Mentor and support peers to achieve excellence in practice of the discipline.
4. Work in multi-disciplinary teams and provide solutions to problems that arise in multi-
disciplinary work.
Module Content
Project may be a theoretical analysis, modeling & simulation, experimentation & analysis,
prototype design, fabrication of new equipment, correlation and analysis of data, software
development, applied research and any other related activities.
Can be individual work or a group project, with a maximum of 3 students.
In case of group projects, the individual project report of each student should specify the
individual’s contribution to the group project.
Carried out inside or outside the university, in any relevant industry or research institution.
Publications in the peer reviewed journals / International Conferences will be an added
advantage.
L T P C
BCSE498J Project – II / Internship
0 0 0 5
Pre-requisite NIL Syllabus version
1.0
Course Objectives:
To provide sufficient hands-on learning experience related to the design, development and
analysis of suitable product / process so as to enhance the technical skill sets in the chosen
field.
Course Outcome:
Formulate specific problem statements for ll-defined real life problems
with reasonable assumptions and constraints.
Perform literature search and / or patent search in the area of interest.
Conduct experiments / Design and Analysis / solution iterations and document the
results.
Perform error analysis / benchmarking / costing.
Synthesize the results and arrive at scientific conclusions / products / solution.
Document the results in the form of technical report / presentation.
Module Content
1. Project may be a theoretical analysis, modeling & simulation, experimentation &
analysis, prototype design, fabrication of new equipment, correlation and analysis of
data, software development, applied research and any other related activities.
2. Project can be for one or two semesters based on the completion of required number of
credits as per the academic regulations.
3. Can be individual work or a group project, with a maximum of 3 students.
4. In case of group projects, the individual project report of each student should specify the
individual’s contribution to the group project.
5. Carried out inside or outside the university, in any relevant industry or research
institution.
6. Publications in the peer reviewed journals / International Conferences will be an added
advantage.