TY BTech 2025 26 Syllabus
TY BTech 2025 26 Syllabus
Institute Vision
Tobeoneofthetop100EngineeringInstitutesofIndiaincomingfiveyearsbyofferingexemplarily
Ethical, Sustainable andValueAddedQualityEducationthroughamatchingecosystemforbuilding
successful careers.
Institute Mission
1. Serving the needs of the society at large through establishment of a state-of-art Engineering
Institute.
2. Imparting right Attitude, Skills, Knowledge for self-sustenance through Quality Education.
3.CreatinggloballycompetentandSensibleengineers,researchersandentrepreneurswithanability
to think and act independently in demanding situations.
EOMS Policy
“We at PCCOE are committed to offer exemplarily Ethical, Sustainable and Value Added Quality
Education to satisfy the applicable requirements, needs and expectations of the Students and
Stakeholders.
We shall strive for technical development of students by creating globally competent and sensible
engineers, researchers and entrepreneurs through Quality Education.
We are committed for Institute’s social responsibilities and managing Intellectual property.
Sr.
Content Page No.
o.
N
LIST OF ABBREVIATIONS:
Sr.
Abbreviation Type of Course
o.
N
o. of
N Total Credits
Sr. No. Type of Course
Courses
NO. %
ntrepreneurship/ Economics
E
9. 2 4 2.5
/ Management Course
xperiential Learning
E
12.
Courses 4 22 13.75
1. Basic Science Course 4 4 - - - - - - 8
2. Engineering Science Course 3 2 - - - - - - 5
3. Programme Core Course - 1 4 4 4 4 4 - 21
4. Programme Elective Course - - - - 3 5 2 2 12
5. Multidisciplinary Minor - - 1 1 2 1 1 - 6
6. Open Elective - - 2 1 1 - - - 4
8. Ability Enhancement Course 1 - - 1 - - - - 2
ntrepreneurship / Economics /
E
9. - - 1 1 - - - - 2
Management Course
10. Indian Knowledge System 1 - - - - - - - 1
11. Value Education Course - - 1 1 - - - - 2
12. Experiential Learning Courses - - 1 - - - 1 2 4
13. Liberal Learning Courses 1 1 - - - - - - 2
Total 10 10 10 10 10 11 8 4 73
1. Basic Science Course 7 7 - - - - - - 14
2. Engineering Science Course 7 5 - - - - - - 12
3. Programme Core Course - 2 8 8 10 8 8 - 44
4. Programme Elective Course - - - - 4 8 4 4 20
5. Multidisciplinary Minor - - 2 2 4 2 4 - 14
6. Open Elective Course - - 4 2 2 - - - 8
8. Ability Enhancement Course 2 - 2 - - - - 4
ntrepreneurship/Economics
E
9. - - 2 2 - - - - 4
/ Management Course
10. Indian Knowledge Systems 2 - - - - - - - 2
11. Value Education Course - - 2 2 - - - - 4
xperiential Learning
E
12. - - 2 - - - 4 16 22
Courses
13. Liberal Learning Courses 2 2 - - - - - - 4
Total 20 20 20 20 20 20 20 20 160
Course Course Name Credit Scheme Teaching Scheme Evaluation Scheme and Marks
Code (Hours / Week)
L P T T o L P T O Tot FA SA TW PR OR Total
tal al
FA1 FA2
BCS25PC10 A
rtificial
3 - - 3 3 - - 1 4 20 20 60 - - - 100
Intelligence
BCS25PC11 C
omputer
3 - - 3 3 - - 1 4 20 20 60 - - - 100
Network
BCS25PC12 A
rtificial
- 2 - 2 - 4 - - 4 - - - 50 50 - 100
Intelligence Lab
BCS25PC13 E
mbedded AI
- 2 - 2 - 4 - - 4 - - - 50 - 50 100
Lab
BCS25PE01 P
rofessional
2 - - 2 2 - - 1 3 10 10 30 - - - 50
-03 Elective -I
BCS25PE04 P
rofessional
1 - 1 - 2 - - 2 - - - - - 50 50
-06 Elective Lab-I
BCS25PE07 P
rofessional
Elective - 1 - 1 - 2 - - 2 - - - 50 - - 50
Seminar-I
- MDM : Course 3* 3 - - 3 3 - - - 3 20 20 60 - - - 100
- DM Course 3
M
- 1 - 1 - 2 - - 2 - - - 50 - - 50
Lab*
Total 13 07 - 20 13 14 - 03 30 80 80 240 200 50 100 750
ote : Students must ensure that the same course is not selected under multiple categories such as core courses, professional
N
electives , open electives or Minor degree in Multidisciplinary Studies(MDMS) Each course should be credited only once towards
the degree requirements.
Third Year B.Tech. (Computer Science & Engineering - AI&ML) Semester – VI
Course Course Name Credit Scheme Teaching Scheme Evaluation Scheme and Marks
Code (Hours / Week)
L P T T o L P T O Tot FA SA TW PR OR Total
tal al
FA1 FA2
BCS26PC14 D
esign &
Analysis of 2 - - 2 2 - - 1 3 10 10 30 - - - 50
Algorithms
BCS26PC15 Computer Vision 2 - - 2 2 - - 1 3 10 10 30 - - - 50
BCS26PC16 Deep Learning 2 - - 2 2 - - 1 3 10 10 30 - - - 50
BCS26PC17 C
omputer Vision
& Deep - 2 - 2 - 4 - - 4 - - - 50 50 - 100
Learning Lab
BCS26PE08 P
rofessional
2 - - 2 2 - - 1 3 10 10 30 - - - 50
-10 Elective -II
BCS26PE11 P
rofessional
- 1 - 1 - 2 - - 2 - - - 25 - 25 50
-13 Elective Lab-II
BCS26PE14 P
rofessional
2 - - 2 2 - - 1 3 10 10 30 - - - 50
-16 Elective -III
BCS26PE17 P
rofessional
- 1 - 1 - 2 - - 2 - - - 25 - 25 50
-19 Elective Lab-III
BCS26PE20 P
rofessional
- 2 - 2 - 4 - - 4 - - - 50 - 50 100
Elective Project
BCS26VS04 F
ull Stack
- 2 - 2 - 4 - - 4 - - - 100 - - 100
Development-II
- MDM: Course 4* 2 - - 2 2 - - - 2 10 10 30 - - - 50
Total 12 08 00 20 12 16 - 05 33 60 60 180 250 50 100 700
BCS25PE04 Natural Language Processing Lab elect any one as per the
S
respective selected theory
BCS25PE05 Information Security Lab Elective course
BCS25PE06 Intelligent Systems & Robotics Lab
ourse Outcomes:
C
After learning the course, the students will be able to
1. Analyzethe role of intelligent agents in AI-drivensystems.
2. Applyuninformed and heuristic search strategies tosolve real time problem
3. Applyadversarial search strategies and solve constraintsatisfaction problems using inference and backtracking
4. Applyknowledge representation and reasoning usinglogic and propositions
5. Designrule-based systems and planning strategiesfor solving complex AI problems.
6. Analyzeuncertain knowledge using probabilistic reasoning
Detailed Syllabus:
Unit Duration
Description
[Hrs]
I ntroduction:Introduction to Artificial Intelligence,Applications of AI , Risks and Benefits of AI, 07
Intelligent Agents, Agents and Environments, Concept of Rationality, Nature of Environments,
Structure of Agents.
I
elf LearningContents :Monte Carlo Tree Search ,Stochastic GamesCase Study:AI in Game
S 03
Development
Total 45
Text Books:
1. Stuart Russell and Peter Norvig, “Artificial Intelligence: A Modern Approach”, Pearson, 4th edition, 2020, ISBN-13
:978-0134610993
2. Deepak Khemani, “A First Course in Artificial Intelligence”, McGraw Hill Education(India), 2013, ISBN
:978-1-25-902998-1
3. Elaine Rich, Kevin Knight and Nair, “Artificial Intelligence”, TMH, ISBN-978-0-07- 008770-5
Reference Books:
1. Nilsson Nils J , “Artificial Intelligence: A new Synthesis”, Morgan Kaufmann Publishers Inc. San Francisco, CA,
ISBN:978-1-55-860467-4
2. Patrick Henry Winston, “Artificial Intelligence”, Addison-Wesley Publishing Company, ISBN: 0-201-53377-4
3. Andries P. Engelbrecht-Computational Intelligence: An Introduction, 2nd Edition-Wiley India- ISBN: 978-0-470-51250-0
4. Dr. Lavika Goel, “Artificial Intelligence: Concepts and Applications”, Wiley publication, ISBN: 9788126519934
5. Dr. Nilakshi Jain, “Artificial Intelligence, As per AICTE: Making a System Intelligent”,Wiley publication, ISBN:
6. 9788126579945.
Eresources:
1. https://futureoflife.org/2018/03/15/how-ai-handles-uncertainty-brian-ziebart/#:~:text=Cautious%20and%20
uncertain%2C%20AI%20 systems,to%20ask%20 humans%20for%20 help.
2. https://www.appliedaicourse.com/blog/uncertainty-in-ai/
3. https://digitaldefynd.com/IQ/ai-in-game-development-case-studies/
ourse Outcomes:
C
After learning the course, the students will be able to:
1. Comprehend the fundamentalsof Computer Networks.
2. Analyzethe functions and performance of various techniquesused in data transmission at the physical layer.
3. Applythe principles of data link layer services toaddress variousdesign issuesin networking.
4. Analyzethe working of different routing protocolsand mechanisms.
5. Apply thetransport layer protocols in real time networkapplications.
6. Apply theapplication layer protocols in network communicationuse cases.
Detailed Syllabus:
Unit Duration
Description
[Hrs]
I ntroduction to Computer Networks:
Definition, uses of computer network,NetworkDevices:Bridge,Switch,Router,Gateway,Access
Point, Network Topologies: Bus, Star, Ring, Tree, Mesh,Hybrid,TypesofNetwork:LAN,MAN,
07
WAN, PAN, Ad-Hoc Network, NetworksSoftware,Protocol,NetworkArchitecture:ClientServer,
I Peer To Peer, Hybrid. Network Models: OSI and TCP/IP Model, Types of Addressing: Physical
addressing, Logical addressing, Port addressing.
elf Learning Contents :
S 02
Design issues for the Networks, Types of Transmission Media: Guided Media, Unguided Media.
Physical Layer :
unctions of Physical Layer, Data And Signals, Digital Transmission, Analog Transmission,
F
Multiplexing :Frequency-Division Multiplexing , time-division multiplexing. Spread Spectrum: 08
Frequency Hopping (FHSS) and DirectSequenceSpreadSpectrum(DSSS),LineCodingSchemes:
II Manchester and Differential Manchester Encodings.
Self Learning Contents :
ransmission Impairment: Attenuation, Distortion, Noise, Bandwidth,Types of cable connection:
T 02
Straight through connection, Cross over Connection
Network layer:
witchingTechniques:Circuitswitching,MessageSwitching,PacketSwitching.IPProtocol:Classes
S
of IP (Network addressing), IPv4, IPv6,Network AddressTranslation,Subnetting,CIDR.Network
layer Protocols: TCP, UDP,ARP, RARP, ICMP 09
IV NetworkRoutingandAlgorithms:StaticRouting,DynamicRouting,DistanceVectorRouting,Link
State Routing. Routing Protocols: RIP, OSPF, BGP.
Transport Layer:
rocesstoProcessDelivery,Services,Sockets,ElementsofTransportLayerProtocols:Addressing,
P
Connection establishment, Connection release, Flow control and buffering, Multiplexing, 06
V Congestion Control. Transport Layer Protocols: TCP and UDP, SCTP, RTP.
Application Layer:
omain Name System (DNS), HyperText Transfer Protocol (HTTP), Email: SMTP, FTP, SSH,
D
06
Dynamic Host Control Protocol (DHCP), Simple Network Management Protocol (SNMP), WAF.)
VI
Self Learning Contents :
se case: Application level data transfer using REST API , IntroductiontoOWASPZAPtoolto
U 03
identify basic vulnerabilities in web application.
Total 45
Text Books:
1. Andrew S. Tanenbaum, “Computer Networks”, Pearson Education India,6th Edition,2021 ISBN:9780136764052,
0136764053
2. Fourauzan B., "Data Communications and Networking", 5th Edition, Tata McGraw-Hill Publications, 2013
3. Larry Peterson and Bruce Davie, "Computer Networks, A Systems Approach".
Reference Books:
1. Kurose, Ross “Computer Networking a Top Down Approach Featuring the Internet”,Pearson,ISBN-10: 013285620
2. Behrouz A. Forouzan (2006), Data communication and Networking, 4th Edition, Mc Graw-Hill, India.
3. L. Peterson and B. Davie, “Computer Networks: A Systems Approach”, 5th Edition, Morgan Kaufmann, 2012.
E-resources:
1. https://onlinecourses.swayam2.ac.in/cec19_cs07/preview
2. https://onlinecourses.nptel.ac.in/noc20_cs23/preview
3. https://onlinecourses.nptel.ac.in/noc25_cs02/preview
4. https://www.coursera.org/courses?query=computer%20network
5. https://www.coursera.org/courses?query=network
Course Objectives:
1. To identify the type of search strategy that is more appropriate to address a particular problem and implement the
selected strategy.
2. To develop intelligent systems by assembling solutions to concrete computational problems.
3. To analyze the type of problem and apply the appropriate strategy to solve it.
4. To perform uncertain knowledge and reasoning for any real-time problem.
ourse Outcomes:
C
After learning the course, the students will be able to:
1. Implement and analyze uninformed ,informed and heuristic ,backtracking search strategies to solve real-world problems.
2. Develop local search techniques for solving optimization problems.
3. Implement adversarial search strategies for game-playing scenarios to improve decision-making efficiency.
4. Develop inference mechanism and Bayesian Networks to represent and analyze uncertain knowledge in AI.
1. C ontinuousassessmentoflaboratoryworkisdonebasedontheoverallperformanceandlaboratoryperformanceofthe
students.
2. Each laboratory assignment assessment should assign grade/marks based on parameters with appropriate weightage.
3. Suggested parameters for overall assessment as well as each laboratory assignment assessment include- timely
completion, performance, innovation, efficiency, punctuality and neatness.
Detailed Syllabus:
Assignment
No. Suggested List of Assignments
rite a program to implement depth Limited search algorithm and Breadth First Search algorithm, Use an
W
1. undirected graph and develop a recursive algorithm for searching all the vertices of a graph or tree data structure.
se Heuristic Search Techniques to Implement Best first search (Best-Solution but not always optimal) and A*
U
2. algorithm (Always gives optimal solution).
3. Solve 8-puzzle problem using A* algorithm. Assume any initial configuration and define goal configuration clearly
onstraint Satisfaction Problem: Write a program to implement a crypt-arithmetic problem or n-queens or graph
C
4. coloring problem Backtracking)
5. Write a program to implement Local search Hill climbing algorithm for blocks world problem
6. Write a program to implement alpha-beta pruning graphically with proper examples and justify the pruning.
Write a program to implement 3 missionaries and 3 cannibal problems depicting appropriate graphs. Use A*
7. algorithm.
Write a program to implement goal stack planning for the following configurations from the blocks world
8.
9. To Implement Forward Chaining Algorithm in knowledge representation and reasoning
10. Write a program to build a Bayesian Network that will model the performance of a student in an exam
11. Implement Mini Project
Reference Books:
1. StuartRussellandPeterNorvig,“ArtificialIntelligence:AModernApproach”,Thirdedition,Pearson,2003,ISBN:10:
0136042597
2. Deepak Khemani, “A First Course in Artificial Intelligence”, McGraw Hill Education(India), 2013, ISBN :
978-1-25-902998-1
3. Elaine Rich, Kevin Knight and Nair, “Artificial Intelligence”, TMH, ISBN-978-0-07- 008770-5
4. Nilsson Nils J , “Artificial Intelligence: A new Synthesis”, Morgan Kaufmann Publishers Inc. San Francisco, CA, ISBN:
978-1-55-860467-4
5. Patrick Henry Winston, “Artificial Intelligence”, Addison-Wesley Publishing Company, ISBN: 0-201-53377-4
Andries P. Engelbrecht-Computational Intelligence: An Introduction, 2nd Edition-Wiley India- ISBN: 978-0-470-51250-0
6. Dr. Nilakshi Jain, “Artificial Intelligence, As per AICTE: Making a System Intelligent”,Wiley publication, ISBN:
9788126579945
E-resources:
1. https://apoorvdixit619.medium.com/goal-stack-planning-for-blocks-world-problem-41779d090f29
2. https://www.geeksforgeeks.org/missionaries-and-cannibals/
Course Objectives:
1. To explore Embedded AI and its importance.
2. Work with microcontrollers, sensors, and edge computing frameworks.
3. Implement AI/ML models on embedded systems
4. Develop real-time AI applications in embedded environments
ourse Outcomes:
C
After learning the course, the students will be able to:
1. Comprehend the integration of AI and ML into embedded systems.
2. Develop real-time applications utilizing Edge computing.
3. Develop AI and ML models using TinyML.
4. Develop and deploy real-time applications in an Embedded AI environment
Detailed Syllabus:
Assignment
No. Suggested List of Assignments
11. rite a Program to interface LED/Buzzer with Raspberry-Pi/ESPNode MCUand write a program to
W
turn on LED for 1s after every 2 sec
12. nderstandingandconnectivityofRaspberry-Pi/ESPNodeMCUwithcamera.Writeanapplicationto
U
capture and store the image.
13.
rite a server application to be deployed on the Raspberry-Pi/ESPNode MCU. Write client
W
applications to get services from the server application.
14. reate a simple web interface for the Raspberry-pi/ESPNode MCUboard to control the connected
C
LEDs remotely through the interface
15.
rite a program on the Raspberry-pi /ESP Node MCUboard to upload temperature data to /from
W
Thingspeak cloud
Text Books:
1. Xiaofei Wang, Yiwen Han, Victor C. M. Leung,DusitNiyato, Xueqiang Yan, Xu Chen - Edge AI_ Convergence of
Edge Computing and Artificial Intelligence-Springer Singapore_Springer (2020)
2. Pete Warden, Daniel Situnayake - TinyML_ Machine Learning with TensorFlowLite on Arduino and
Ultra-Low-Power Microcontrollers-O'Reilly Media, 2019.
3. Daniel Situnayake and Jenny Plunkett, “AI at the Edge: Solving Real-World Problems with Embedded Machine
Learning
Reference Books:
1. DavidHanes,GonzaloSalgueiro,PatrickGrossetete,RobertBarton,JeromeHenry;“IoTFundamentals:Networking
Technologies, Protocols, and Use Cases for the Internet of Things”, 1st Edition, 2018, Pearson India Pvt. Ltd.
2. Arshdeep Bahga and Vijay Madisetti, “Internet of Things: AHands-onApproach”,1stEdition,2015,Universities
Press (India) Pvt. Ltd
3. Y
ashavant Kanetkar and Shrirang Korde, “21 Internet of Things (IOT) Experiments: Learn IoT, the Programmer's
way”, 1st Edition, 2018, BPB Publications.
-resources:
E
1. https://www.cse.wustl.edu/~jain/cse570-15/ftp/iot_prot/index.html
Prior knowledge ofData Structures, Python programming,Probability theory, Theory of Computation is essential.
Course Objectives:
This course aims at enabling students,
. To devise basic knowledge on various morphological, syntactic and semantic NLP tasks.
1
2. To select the algorithm for processing linguistic information and computational properties of natural languages.
3. To familiarize various NLP software libraries and datasets publicly available.
4. To solve various NLP problems with suitable NLP pipeline tasks.
Course Outcomes:
After learning the course, the students should be able to:
.
1 pply various text preprocessing techniques to prepare the text data for analysis.
A
2. Apply rule-based and statistical models to perform syntax analysis
3. Analyse and apply the Language Modelling using statistical methods
4. Apply semantic techniques and evaluate the performance using similarity measures
Detailed Syllabus:
Unit Duration
Description
[Hrs]
LP Basics:NLP introduction and applications, NLPphases with Spacy tool. Tokenization,
N
stemming, lemmatization, stop word removal, Phrase matching and vocabulary.
Text Preprocessing and Morphology: Character Encoding,Word Segmentation, Sentence 07
I Segmentation, Inflectional and Derivation Morphology, Morphological analysis
elf Learning Contents: Case study: Language Corpora - Text mining & text analysis, Web
S 03
Scraping as a source of text data
Text Processing:Part of Speech (POS) tagging - Basicconcepts, Approaches: Rule based and
Transformation Based Learning (TBL), Hidden Markov Model (HMM) for POS Tagging,
Information Extraction - Named Entity Recognition (NER), Text feature extraction, Bag of Words
08
technique, TF-IDF classification
II Syntactic parsing:Constituency Parsing, DependencyParsing, CKY parsing.
elfLearningContents:ProbabilisticContextFreeGrammar(PCFG),Casestudy:TextAnalysis:
S
Sentiment analysis in Tableau, Hidden Markov Model for Sentiment Analysis 04
anguage Modelling: Modelling with N-gram, SimpleN-gram models, Modelling with maximum
L
entropy models, smoothing basic techniques, Evaluating language models; Modelling with Neural
models: Neural Network basics, Training;
08
III Neural Language Model - Recurrent Neural Networks (RNNs), Introduction to Transformer-based
model. POS tagging using Neural Models
elf LearningContents: Neural Language Model - LSTM, Case study: Application of neural
S
language model in NLP system development in speech recognition or machine translation 04
Text Books:
1. Sowmya Vajjala, Bodhisattwa Majumder, Anuj Gupta, Harshit Surana, “Practical Natural Language Processing”,
O'Reilly Media, Inc.,First edition, June 2020, ISBN: 9781492054054
2. Dan Jurafsky, James H. Martin. “Speech and Language Processing. An Introduction to Natural Language Processing,
Computational Linguistics, and Speech Recognition”, Prentice-Hall, 3rd edition, January 12, 2022.
[h ttps://web.stanford.edu/~jurafsky/slp3/ed3book_jan122022.pdf
Reference Books:
1. Delip Rao, Brian McMahan, “Natural Language Processing with PyTorch”, O'Reilly Media, 1st edition, February 2019,
ISBN: 9781491978238
2. Aman Kedia, Mayank Rasu, “Hands-On Python Natural Language Processing”,Packt Publishing Limited, 1st edition,
June 2020, ISBN-10 -1838989595
E-resources:
1. https://web.stanford.edu/~jurafsky/slp3/ed3book_jan122022.pdf
2. https://jair.org/index.php/jair/article/view/11030
3. https://engineering.fb.com/2018/01/24/ml-applications/under-the-hood-multilingual-embeddings/
4. Swayam Course on NLP : https://onlinecourses.nptel.ac.in/noc19_cs56/preview
ourse Outcomes:
C
After learning the course, the students will be able to :
1. Analyze various risks and apply appropriate security solutions.
2. Apply encryption techniques and key management in information security.
3. Apply cryptographic techniques to encrypt and decrypt the messages.
4. Use hashing techniques for data authentication.
Detailed Syllabus:
Unit Description
In
troduction to Information Security:
Introduction, Elements of Information Security, Introduction to NIST Cybersecurity Framework,
08
Security Policy, Techniques, Steps, Categories, Threats and Vulnerability, man-in-the-middle
I attack, DDoS, Viruses, Honeypots, Firewalls – Design and Types of Firewalls.
Self-Learning Contents :
Case Study : Study major cybersecurity incidents like SolarWinds attack (supply chain attack), 03
Pegasus spyware (zero-click exploit), Ransomware attacks (WannaCry, Colonial Pipeline)
Text Books:
1. William Stallings, Cryptography and Network Security: Principles and Practice, 7th Edition, Global Edition, Pearson
Education, 201, ISBN: 129215859X, 9781292158594.
2. Behrouz A. Forouzan & Debdeep Mukhopadhyay, “Cryptography and Network Security” Mc Graw Hill Education
(India) Private Limited, 2015, ISBN: 9339220943, 9789339220945.
Reference Books:
1. Roberta Bragg,Mark Rhodes-Ousley, and Keith Strassberg,“Network Security: The Complete Reference,”
McGraw-Hill Education, 2004, ISBN: 0072226978, 9780072226973.
2. A
tul Kahate, “Cryptography and Network Security,” Tata McGraw-Hill Publishing Company Limited, 2003, ISBN:
0070494835, 9780070494831.
3. J ason Garbis, Jerry W. Chapman, "Zero Trust Security: An Enterprise Guide," McGraw-Hill Education, 2021, ISBN:
1264257276, 9781264257270.
. Jon Erickson, "Hacking: The Art of Exploitation," No Starch Press, 2008, ISBN: 1593271441, 9781593271442.
4
E-resources:
1. https://nptel.ac.in/courses/106106129,Introductionto Information Security I, IIT Madras, Prof. V. Kamakoti.
ourse Outcomes:
C
After learning the course, the students will be able to:
1. Demonstrate the use of agents in intelligent systems.
2. Apply fuzzy logic principles to intelligent control systems.
3. Apply the concepts of Robot system Control and Localization mechanisms.
4. Analyze mapping techniques and real-world robotic applications.
Detailed Syllabus:
Unit Description Duration (Hrs)
Introduction to Intelligent Systems and Agents
Definition and characteristics of intelligent systems, A spectrum of intelligent behaviour, the
knowledge base, knowledge acquisition, computational intelligence, an overview of applications,
and the impact on various industries and societies. 07
I Introduction to Intelligent Agents, Agent Architectures, Agent programming, Perception,
Reasoning,andLearning,Multi-AgentSystems:CooperativeandCompetitiveAgents,Negotiation,
and Coordination
elfLearning:overviewofapplications:Healthcare:Diagnosis,imaging,roboticsurgery,Finance:
S
Fraud detection, algorithmic trading, Smart cities: Traffic management, utilities optimization, 04
Industry: Predictive maintenance, automation and impact on various industries and societies.
elf Learning: Applications of Fuzzy Logic: Consumer electronics: air conditioners, washing
S
machines, Industrial control: motor speed regulation, chemical process control, Decision support
04
systems and AI applications, Hybrid approaches: Neuro-Fuzzy systems.
Text Books:
1. Adrian Hopgood, “ Intelligent Systems for Engineers and Scientists”, 3rd Edition, ISBN: 9781498783798.
2. Stuart Russell and Peter Norvig, Artificial Intelligence: A Modern Approach,” Fourth edition, Pearson, 2020.
3. Sebastian Thrun, Wolfram Burgard, and Dieter Fox , "Probabilistic Robotics" 2005, ISBN: 9780262201629.
4. Michael Jenkin, Gregory, “ Computational Principles of Mobile Robotics," Cambridge University Press, 2010, ISBN :
978-0-52-187157-0
Reference Books:
1. Artificial Intelligence by Elaine Rich, Kevin Knight and Nair, TMH
2. Shai shalev-shwartz, Shai Ben-David: Understanding Machine Learning from Theory to Algorithms, Cambridge
University Press, ISBN-978-1-107-51282-5, 2014
E-resources:
1. https://nptel.ac.in/courses/108104049
2. https://onlinecourses.nptel.ac.in/noc21_me32
Course Objectives:
1 To grasp the significance of natural language processing in solving real-world problems.
2 To map the appropriate processing technique to a problem and implement the technique.
3 To develop programs to perform suitable tasks of NLP pipeline.
4 To practice existing libraries for natural language processing and machine learning to solve text processing problems
ourse Outcomes:
C
After learning the course, students will be able to:
1. Design and implement a text pre-processing technique used in natural language processing
2. Develop Part-of-speech Tagger to assign syntactic tags.
3. Implement text classification-based systems by selecting suitable algorithm
4. Develop NLP pipeline for solving real time problems
Guidelines for Students:
. T
1 he laboratory assignments are to be submitted by students in the form of a journal.
2. Each assignment write-up should have a title, objectives, outcomes, Theory- Concept in brief, dataset used, data
description, conclusion, and assessor's signature.
3. Program codes with sample output of all performed assignments should be submitted.
1. C ontinuous assessment of laboratory work is done based on the overall performance and laboratory performance of the
students.
2. Each laboratory assignment assessment should assign grade/marks based on parameters with appropriate weightage.
3. Suggested parameters for overall assessment as well as each laboratory assignment assessment include timely
completion and submission, performance, innovation, efficiency, punctuality, neatness and soundness of the contents.
Assignment
Suggested List of Assignments
No.
1. Write a program for scraping the Web to Gather Data
2. se the “News category dataset” which provides news headlines from the year 2012 to 2018
U
obtained from HuffPost. Implement a program to perform language detection, Word Count,
Sentence Count, and tokenization.
3. Import the English language Stemmer and write a program to perform stemming words. Also, Write a program for
lemmatizing words using WordNet.
4.
Write a program to perform POS Tagging and word embeddings. Perform text classification based on it.
5.
Write a program to implement Named Entity Recognition
T.Y. BTech CSE (AI & ML),PCCoE, Pune Page33
Department of Computer Science & Engineering (AI & ML)
6.
Write a program to implement TD-IDF method
7.
rite a program to implement N-gram models
W
8. Write a program to determine the probability of a sequence of words using N-gram Language Model.
9.
Write a program to implement Latent Semantic Indexing, or LDA algorithm
10. rite a program for identifying sentiment (positive or negative) and emotions expressed in text and develop a
W
system for opinion mining with suitable topic modelling technique
11. evelop a mini project by implementing suitable NLP tasks in NLP pipeline for different topics like question
D
answering system, sentiment analysis, speech recognition, machine translation, etc.
Reference Books:
1. S owmya Vajjala, Bodhisattwa Majumder, Anuj Gupta, Harshit Surana, “Practical Natural Language Processing”,
O'Reilly Media, Inc.,First edition, June 2020, ISBN: 9781492054054
2. Dan Jurafsky, James H. Martin. “Speech and Language Processing. An Introduction to Natural Language Processing,
Computational Linguistics, and Speech Recognition”, Prentice-Hall, 3rd edition, January 12, 2022.
[https://web.stanford.edu/~jurafsky/slp3/ed3book_jan122022.pdf]
3. Delip Rao, Brian McMahan, “Natural Language Processing with PyTorch”, O'Reilly Media, 1st edition, February 2019,
ISBN: 9781491978238
4. Aman Kedia, Mayank Rasu, “Hands-On Python Natural Language Processing”,Packt Publishing Limited, 1st edition,
June 2020, ISBN-10 -1838989595
Eresources:
1. https://web.stanford.edu/~jurafsky/slp3/ed3book_jan122022.pdf
2. https://jair.org/index.php/jair/article/view/11030
3. https://engineering.fb.com/2018/01/24/ml-applications/under-the-hood-multilingual-embeddings/
4. Swayam Course on NLP : https://onlinecourses.nptel.ac.in/noc19_cs56/preview
Course Objectives:
1. To understand the concepts of cryptography mechanisms.
2. To be able to secure a message over an insecure channel by various means.
3. To learn about how to maintain the confidentiality, integrity, and availability of data.
ourse Outcomes:
C
After learning the course, the students will be able to :
1. Apply encryption and decryption techniques to secure sensitive data
2. Apply hash algorithms to ensure data integrity and authentication in digital systems.
3. Use tools and techniques in the area of information security.
Detailed Syllabus:
Assignment
No. Suggested List of Assignments (Any 8)
rite a program that encrypts a sensitive file (e.g., medical records, legal contracts) using AES and decrypts it
W
3. back to its original form.
I mplement a secure login system where passwords are encrypted using DES before storage and decrypted during
4. authentication, preventing plaintext password leaks.
5. evelop a system that signs and verifies text-based contracts (e.g., legal agreements, financial transactions) using
D
RSA-based digital signatures.
I mplement DSS (Digital Signature Standard) to verify the authenticity of critical digital documents like
6. government notices or financial contracts.
rite a program where a sender and receiver use Diffie-Hellman key exchange before encrypting an email
W
7. message, ensuring secure communication over SMTP.
8. Write a program to compute MD5 and SHA-512 hashes for files or passwords, ensuring data integrity verification.
1. Stallings, W., “Cryptography and Network Security,” 7th edition. Pearson Education, 2018.
2. Atul Kahate, “Cryptography and Network Security,” 3e, McGraw Hill Education
3. Prakash C. Gupta, “Cryptography and Network Security,” PHI
4. V.K. Pachghare, “Cryptography and Information Security,” PHI Learning.
E-resources :
1. https://nptel.ac.in/courses/106106129, Introduction to Information Security I, IIT Madras, Prof. V. Kamakoti.
Course Objectives:
1. To provide students with an in-depth understanding of the theory, design, and implementation of intelligent
systems and robotics.
2. To learn about the principles and algorithms behind intelligent systems.
Course Outcomes:
Assignment
Assignment Title
No.
Create a chatbot: with Natural Language Processing libraries, you can create a chatbot that can respond to user
1.
queries.
Develop an autonomous drone that cannavigate throughan obstacle course using machine learning algorithms.
2.
Build a virtual assistant chatbot that can answer customer inquiries and provide personalized recommendations
3.
based on their purchase history.
Create an intelligent system that can predict and prevent equipment failures in industrial settings using anomaly
4.
detection algorithms.
Design a robotic arm with computer vision capabilities that can pick and sort items on a conveyor belt.
5.
Implement a reinforcement learning algorithm to teach a robotic dog to fetch objects in a simulated environment.
6
eference Books:
R
1. Adrian Hopgood, “ Intelligent Systems for Engineers and Scientists”, 3rd Edition, ISBN: 9781498783798.
2. Stuart Russell and Peter Norvig , Artificial Intelligence: A Modern Approach,” Fourth edition, Pearson, 2020.
3. Sebastian Thrun, Wolfram Burgard, and Dieter Fox , "Probabilistic Robotics" 2005, ISBN: 9780262201629.
4. Michael Jenkin, Gregory, “ Computational Principles of Mobile Robotics," Cambridge University Press, 2010, ISBN
: 978-0-52-187157-0
Eresources:
1. https://nptel.ac.in/courses/108104049
2. https://onlinecourses.nptel.ac.in/noc21_me32
Course Objectives:
This course aims at enabling students,
1. To apply the knowledge and skills for understanding realistic problems.
2. Toreviewliteratureforprojectworkfromappropriatesourcessuchasbooks,manuals,researchjournalsandfromother
sources, and in turn increase analytical skills.
3. To emphasize learning activities that are long-term, Collaborative learning and interdisciplinary.
4. Toprovideeverystudenttheopportunitytogetinvolvedeitherindividuallyorasagroupsoastodevelopteamskills
and learn professionalism.
Course Outcomes:
After learning the course, the students will be able to:
1. Identify and define the real life engineering problem from a societal need point of view.
2. Demonstrate critical thinking and problem solving ability.
3. Analyze the identified problem from a technological perspective.
4. Explore and design a proposed solution for realistic/societal problems.
Guidelines:
1. Seminar is one of the significant contributory work that has to be completed based on the required number of credits.
2. It is necessary to explore the domain of interest / research/ thrust area/ society needs.
3. Selection of Seminar Topic: Students shall identify the area or topics in recent trends and developments in
consultation with seminar guide or industry or any research organization.
4. Guide Allotment:
a. Considering registered students area of interest/domain and expertise of guide, the Seminar coordinator in
consultation with a panel of experts allots Seminar guides.
b. In case of interdisciplinary Seminar, along with the guide from the same program, co-guide should be
allotted from the other program.
5. Students in consultation with a guide will prepareSeminar Synopsis.
6. Seminar - I Review:
a. The SeminarcoordinatorwiththeHeadofthedepartmentshallconstituteareviewcommitteecomprisingof
domain experts and senior faculty members.
b. The review committee will approve the Seminar topic or title.
c. The seminar review committee will evaluate the timely progress of the seminar.
d. Students are expected to appear for minimum three reviews as per the seminar calendar.
e. Students will be evaluated thrice in the semester based on seminar evaluation guidelines/Rubrics as follows:
2. Review-2 (20 Marks) 1 . iterature review and problem analysis (5 Marks)
L
2. Algorithmic study and design of solution (5 Marks)
3. Draft of literature review paper(5 Marks)
4. Communication & presentation skills, attendance (5 Marks)
Prior Knowledge:
1. Fundamental related to Surveying
2. Types and Importance of various surveys
3. Global Positioning System (GPS)
Course Objectives: This course aims at enabling students,
1. To understand the fundamental principles and techniques of remote sensing and GIS.
2. To develop skills in processing, analyzing, and interpreting remote sensing data.
3. To gain proficiency in GIS concepts, spatial data models, and geospatial analysis.
4. To integrate remote sensing and GIS for applications in urban planning, environmental monitoring, and disaster
management.
Course Outcomes: After learning the course, the students should be able to:
1. Demonstrate a clear understanding of remote sensing principles, systems, and sensor characteristics.
2. Apply remote sensing and GIS techniques to analyze data for various civil engineering and interdisciplinary
applications.
3. Use GIS tools for spatial data processing, analysis, and visualization.
4. Integrate remote sensing data with GIS to solve real-world problems in urban planning, environmental
monitoring, and disaster management.
Detailed Syllabus:
Unit Description
undamentals of Remote Sensing:
F
Introduction to Remote Sensing: Definition, History, and Applications
Electromagnetic Radiation (EMR): Spectrum, Energy Interactions with Atmosphere and Earth
I 8
Surface, Remote Sensing Sensors and Platforms: Optical, Microwave, and Hyperspectral
Sensors, Resolution in Remote Sensing: Spatial, Spectral, Temporal, and Radiometric
Resolution, Recent Advances: UAV (Drone) Remote Sensing, AI-based Remote Sensing
Satellite Image Processing and Interpretation:
Types of Remote Sensing Data, Satellite Image Acquisition and Preprocessing Techniques:
II Radiometric and Geometric Corrections, Image Enhancement and Filtering Techniques, Image 8
Classification Methods: Supervised and Unsupervised Approaches, Cloud-based Remote
Sensing: Google Earth Engine and Big Data GIS
Geographic Information System (GIS) Fundamentals:
Introduction to GIS: Definitions, Components, and Functions, Spatial Data Models: Raster vs.
III Vector Data, Topology, GIS Data Sources: Digitization, GPS Data Collection, Open-Source 7
Data, GIS Software and Tools: ArcGIS, QGIS, Python for GIS, Georeferencing, Map
Projections, and Coordinate Systems, Thematic Mapping and Visualization Techniques
Total 30
Text Books:
1. Bhatta, B. – Remote Sensing and GIS (Oxford University Press, 2011)
2. Lillesand, T., Kiefer, R., & Chipman, J. – Remote Sensing and Image Interpretation (Wiley, 7th Ed., 2015)
3. Remote Sensing & Geographical Information System, M. Anji Reddy, BS Publications, Hyderabad, 4 th
Edition, 2022
Reference Books:
1. Textbook on Remote Sensing, C. S. Agarwal and P. K. Garg, Wheeler Publishing House, 2000.
2. Campbell, J. B., & Wynne, R. H. – Introduction to Remote Sensing (Guilford Press, 5th Ed., 2011)
3. Chang, K. – Introduction to Geographic Information Systems (McGraw Hill, 9th Ed., 2019)
e-Resources
1. https://onlinecourses.nptel.ac.in/noc22 ce84/preview
2. https://onlinecourses.nptel.ac.in/noc23_ce52/preview
3. https://onlinecourses.nptel.ac.in/noc22_ce26/preview
4. https://elearn.nptel.ac.in/shop/nptel/remote-sensing-and-gis/
Course Outcomes:
After learning the course, the students will be able to:
1. Understand the concepts types of Digital Marketing.
2. To learn social media advertising platforms for digital marketing campaigns.
3. Apply the fundamental principles and concepts of Search Engine Optimization (SEO)
4. Comprehend the basics of E-commerce and its Business Models. Apply E-marketing
Detailed Syllabus:
Unit escription
D
Types of Digital Marketing Digital Marketing – The concept, Digital Marketing Types : Mobile
I 6
Marketing, Online Marketing, Email Marketing,
Digital marketing using social media. Consumer Generated Contents (CGC), Impact of Social
II Media, Advantages and Disadvantages of Social Media, Types of Social Media, Social Media 8
Marketing using Instagram, Snap Chat, Twitter and LinkedIn
Search Engine Optimization(SEO) Search Engine Optimization Basics, Keyword Research,
III SEO ToolSEMrush: Overview and Features, Top Search Engine Ranking Factors. Case 8
Study: Dominos India :Building Traffic through content propagation.
E-commerce Business Models & E-marketing
E-commerce: Meaning, Benefits and limitations, Business Models for E-commerce:
Business-to-Consumer (B2C), Business-to-Business(B2B), Consumer-to-Consumer (C2C),
IV 8
Consumer To-Business (C2B). Case Study: Revenue sources at YouTube Traditional Marketing
Vs. E-Marketing, Impact of E-commerce on markets, Issues in E-Marketing Case Study:
Create an own business EC model example -Shopify
Total 30
Text Books:
1 . Damian Ryan & Calvin Jones . Understanding DIGITAL Marketing
2. Vandana Ahuja(2015), Digital Marketing. Oxford University Press, New Delhi
3. Neetu Kapoor, Concept Building Approach to Digital Marketing, Cengage, 2nd Edition.
4. The digital marketing Handbook, A step by step guide, Mohit Pawar,2015 Edition.
5. Joseph P. T., E - Commerce – An Indian Perspective, PHI publication, 6th Edition
Reference Books:
1. George Pain(2019). Marketing Automation and Online Marketing: Automate Your Business through
Marketing Best Practices such as Email Marketing and Search Engine Optimization
2. Barker, M., Barker, D., & Bormann, N. (2016), Social Media Marketing: A Strategic Approach, Boston,
MA : Cengage Learning.
3. Tuten, T., Solomon M., Social Media Marketing, SAGE, 2nd Edition.
4. Ian Dodson, The art of Digital Marketing, 2016, Wiley, 978-1-119-26570-2.
E-resources:
1. https://www.coursera.org/learn/foundations-of-digital-marketing-and-e-commerce
2. https://open.umn.edu/opentextbooks/textbooks/1602
3. https://www.coursera.org/learn/social-media-marketing-introduction
4. https://www.coursera.org/specializations/social-media-marketing
5. https://www.coursera.org/projects/create-your-ecommerce-store-with-shopify
Course Objectives:
This course aims at enabling students:
1. To get acquainted with the high-level phases of data life cycle management.
2. To acquire knowledge about the various aspects of data storage, data availability, data protection.
3. To gain exposure to various solutions/reference architectures for various use-cases.
4. To understand the technical capabilities and business benefits of data protection.
Course Outcomes:
After learning the course, the students will be able to:
1. Understand the data management world, challenges and best practices.
2. Compare various concepts and technologies for enabling data storage and high availability.
3. Explain the various concepts related to data protection.
4. Illustrate various types of data threats and approaches to ensure data center security.
5. Outline different standards for compliance and governance of data.
6. Understand various approaches for designing data intensive enterprise applications and industry standard solutions in
data management.
Detailed Syllabus:
Unit Description
I ntroduction to data life cycle management (DLM) and Data Resiliency: Goals of data life cycle
management, Challenges involved, - Volume of data source, Ubiquity of data locations, User
demand for access, Stages of data life cycle - creation, storage, usage, archival, destruction, Risks
involved without DLM, benefits, best practices Data Resiliency: Storage technology, Data center
End to End View overview of complete stack including storage, network, host, cluster,
applications, virtual machines, cloud storage, - Storage virtualization technologies - RAID level,
I 8
storage pooling, storage provisioning - Advance topics in storage virtualization – storage
provisioning, thin provisioning Cloud & Kubernetes storage stack – S3, glacier, storage tiering
High Availability, Introduction to high availability, Clustering, failover, parallel access, New
edge technology stack (cloud, containers,AI applications), Disaster Recovery Need of disaster
recovery (DR) Building blocks - global cluster, wide-area-connector (WAC), heartbeat
Split-brain – problem and solutions Preparing for DR – firedrill
I ntroduction to data protection: Introduction Need for data protection basic of back-up/restore,
Snapshots for data protection, copy-data management (cloning, DevOps) , De-duplication,
II Replication, Tiering & Long-Term Retention - LTR, Design considerations, System recovery & 7
Solution architecture, -Backup v/s Archival media considerations and management (tapes, disks,
cloud) Protection for new edge technology (cloud, containers, workloads)
Data Threats and Data center security: - Design and architecture considerations for data &
platform security- Identity Management, Transport Layer Security (TLS), Encryption & Key
Management,Compliance,CloudSecurity–APISecurity,Challenges,TypeofThreats,Denial
III 7
ofService(DoS),maninthemiddleattacks-Unintentionaldatalossm,Repudiation,Malicious
attackstostealdata-Ransomware/Malware,ThreatDetection,UnderstandingThreatmodelling
tools
Data Security Posture & Recovery: Introduction Data Security Posture Management, Data
classification and tagging, Information Governance Auditing, Legal Hold, AI dimensions, Site
Continuity, Cyber Recovery, Bulk Recovery & Response Applications uninterrupted - Understand
data management asp -Understand data management aspects of traditional and new edge
IV 8
applications - Reference architecture/best practices (pick 2-3 case studies from below topics) - AI
Applications NoSQL Databases (MongoDB, Cassandra) -Distributed applications (micro service
architectures) -Cloud applications – Platform as Service (PaaS), Software as Service (SaaS),
Kubernetes - Multi-Tiered applications - ETL workloads Data analytics (AI/ML)
Total
Text Books:
1. Storage Networks: The complete Reference. Robert Spalding
2. Vic (J.R.) Winkler, “Securing The Cloud: Cloud Computing Security Techniques and Tactics” (Syngress/Elsevier) -
978-1-59749-592-9
3. TBD – online reference for each topic.
Reference Books:
1. Designing Data-Intensive Applications (O’Reilly, Martin Kleppmann)
2. TBD: provide more online material details and books (This can include some publicly available white-paper, solution
guides etc.
Hands On/Demos
1. Demonstrate the use of Veritas InfoScale Logical Volume Manager for cover storage management aspects.
2. Demonstrate Veritas InfoScale CFT on AWS can help create 2-node cluster for some hand-on
3. Demonstrate the use of Veritas Backup Exec for data protection related hands-on. Concepts like backup storage targets,
deduplication, retention periods, backup selections, data protection SLAs, students can relate to.
4. Demonstrate using AWS/Azure console, we can demonstrate some aspects on data security aspects in Cloud
Computes.
5. Demonstrate data governance and archiving basic use cases using Veritas Archiving Solution
6. Application Unit, we can provide some details from our data our data centre
E-resources:
1. https://www.enterprisestorageforum.com/storage-hardware/storage-virtualization.html
2. https://searchstorage.techtarget.com/definition/data-life-cycle-management
3. https://www.hitechnectar.com/blogs/three-goals-data-lifecycle-management/
4. https://www.bmc.com/blogs/data-lifecycle-management/
5. https://medium.com/jagoanhosting/what-is-data-lifecycle-management-and-what-phases-would-it-pass-through-94dbd2
07ff54https://www.spirion.com/data-lifecycle-management/
6. https://www.bloomberg.com/professional/blog/7-phases-of-a-data-life-cycle/
7. https://www.datacore.com/storage-virtualization/
8. https://www.veritas.com/content/dam/Veritas/docs/solution-overviews/V0907_SB_InfoScale-Software-Defined-Infrastr
ucture.pdf https://www.veritas.com/solution/digital-compliancehttps://www.veritas.com/solution/data-protection
9. https://www.veritas.com/gdpr
Total 30
Text Books:
1. Hussein T. Mouftah, Melike Erol-Kantarci, and Mubashir Husain Rehmani, "Connected and Autonomous Vehicles in
Smart Cities", CRC Press, 1st Edition, 2020.
2. Claire Vishik, Simon Winberg, and Axel Sikora, "Cybersecurity for Connected and Automated Vehicles", Artech
House, 1st Edition, 2021.
3. Andreas Herrmann, Walter Brenner, and Rupert Stadler, "Autonomous Driving: How the Driverless Revolution Will
Change the World", Emerald Publishing, 1st Edition, 2018
Reference Books:
1. Burkhard Huhnke, Markus Maurer, and Christoph Stiller, "Handbook of Driver Assistance Systems: Basic
Information, Components and Systems for Active Safety and Comfort", Springer, 1st Edition, 2016.
2. Ramiro Liscano, Juan Carlos Garcia, and Miguel Angel Sotelo, "Advanced Driver Assistance Systems:
Fundamentals, Applications, and Advances", CRC Press, 1st Edition, 2021.
3. Wolfgang Runge, "Autonomous Driving: Technical, Legal and Social Aspects", Springer, 1st Edition, 2016
Course Objectives:
This course aims at enabling students,
1. Introduce engineers to key psychological principles relevant to personal and professional development.
2. Understand human behavior, cognition, and emotion to improve interpersonal effectiveness and teamwork.
3. Develop skills to integrate psychological insights into problem-solving and innovation.
4. Foster ethical decision-making and leadership through Emotional Intelligence.
Course Outcomes::
After learning the course, the students should be able to:
1. Understand fundamental psychological concepts and their engineering applications.
2. Understand the theories of cognitive works
3. Apply psychological principles to improve teamwork and leadership.
4. Integrate human-centered approaches in engineering design and problem-solving
Detailed Syllabus:
Unit escription
D
Introduction to Engineering Psychology
History of Engineering Psychology, Methods of Engineering Psychology
I Perspective onEngineeringPsychology-Human-CentricDesign,BalanceinCognitiveLoad, 8
Ethical & Sustainable Technology, Holistic Decision-Making:
Total 30
ext Books:
T
Text Books: :
1. Elliott, L. J. (2021). Engineering psychology. Penn State University Libraries.https://doi.org/10.26209/engin-psych
2. D. Goleman, Emotional Intelligence: Why It Can Matter More Than IQ. New York, NY, USA: Bantam Books, 1995..
Reference Books:
1. Baron, R. A., & Branscombe, N. R. Psychology (13th Edition). Pearson.
2. A. Nagraj, Vyavhar Darshan (The Conduct Perspective)
3. Schultz, D. P., & Schultz, S. E. Psychology and Work Today
4. A. Nagraj, Jeevan Vidya: Ek Parichay
5. R.R. Gaur, R. Sangal, G.P. Bagaria, A Foundation Course in Human Values and Professional Ethics
Prior knowledge of: Basic knowledge of Engineering Physics, Mechanics and Materials Engineering
ourse Objectives:
C
This course aims at enabling the students to
1. To introduce students to the fundamental principles of UAV systems, including types, components, flight dynamics,
materials and manufacturing.
2. To equip students with the fundamental knowledge for designing lightweight and smart UAV.
ourse Outcomes:
C
After learning the course, the students will be able to:
1. Describe the classification, anatomy, and flight principles of various UAV systems used in different applications.
2. Select appropriate materials and explain relevant manufacturing techniques for UAV structural components.
3. Investigate UAV airframe designprinciplestodevelopstructuralconfigurationsbyanalyzingaerodynamicloads
and stress distribution
4. Explain the roleofAI,ML,IoT,andcybersecurityinenhancingUAVintelligence,connectivity,andreal-world
applications.
Detailed Syllabus:
Unit Description
undamentals of UAV Systems, Anatomy, and Flight Principles
F
OverviewofUAVs:Types,ApplicationsandDGCARules,ApplicationsofUAVs:Military,
commercial,agriculture,environmentalmonitoring,surveillance,logistics;AnatomyofUAV:
I 7
Key Components, Airframe, Propulsion, Avionics, Payload; Basic Flight Principles: Lift,
Thrust, Drag, Weight; Aerodynamics: Bernoulli's Principle, Airfoil Characteristics; Flight
Dynamics: Stability, Control Surfaces (Ailerons, Elevators, Rudder)
Materials & Manufacturing for UAV Design
Material Selection: Lightweight materials –composites,polymers,carbonfiber,aluminum
alloys; Structural Materials for UAV Airframes; Manufacturing Techniques: Traditional:
II 8
Machining, forming; Modern: 3D printing, additive manufacturing, CNC techniques,
Assembly and Integration: Joining methods (gluing, bolting), modular UAV design,
Maintenance & Repair: Field repair techniques, material durability, lifecycle assessment
Design Approach of UAVs
UAV Airframe Design Principles, Wing, Fuselage, and Tail Design Concepts, Structural
III 8
Design Aspects: Load paths, stress points, vibration and fatigue considerations, Load
Analysis and Stress Calculations, Introduction to Structural Simulation Tools
Total 30
Text Books:
1. Garg, P. K. (2021). Unmanned aerial vehicles: An introduction.
2. Sebbane, Y. B. (2022). A first course in aerial robots and drones. CRC Press.
3. Gundlach, J. (2014). Designing unmanned aircraft systems. Reston: American Institute of Aeronautics &
Astronautics.
Reference Books
1. Yang, L. J., & Esakki, B. (2021). Flapping Wing Vehicles: Numerical and Experimental Approach. CRC Press.
2. Barnhart, R. K., Marshall, D. M., & Shappee, E. (Eds.). (2021). Introduction to unmanned aircraft systems. Crc
Press.
3. Austin, R. (2011). Unmanned aircraft systems: UAVS design, development and deployment. John Wiley & Sons.
e-Resources:
1. https://archive.nptel.ac.in/courses/101/104/101104073/
2. https://onlinecourses.swayam2.ac.in/ntr24_ed12/preview
Objectives:
1. To introduce the concepts, principles and framework of contents of Industrial Engineering.
2. To acquaint the students with various productivity enhancement techniques.
3. To acquaint the students with different aspects of Production Planning and Control and Facility Design.
4. To introduce the concepts of various cost accounting and financial management practices as applied in industries.
ourse Outcomes:
C
After learning the course, the students will be able to:
1. Apply principles of management and evaluate productivity of an organization/Scenario.
2. Determine work content and standard time using different methods of work measurement.
3. Apply/use different techniques / concepts of production planning and control.
4. Analyze the strategic and operational aspects of plant location and layout, apply assembly line balancing
techniques, and inventory control models
Detailed Syllabus:
Unit Description
I ntroduction to Industrial Engineering and Productivity
DefinitionandRoleofIndustrialEngineering,Functionsofmanagement,Typesofproduction
I 7
systems and organization structure. Measurement of productivity: Factors affecting the
productivity, Productivity improvement techniques, Productivity Models and Index.
Work Study
Definition, objective and scope of work-study, Human factors in work-study. Work
Measurements: Definition, objectives and uses, Work measurement techniques. Method
II 8
Study:Definition,objectiveandscopeofmethodstudy,workcontent,activityrecordingand
examaids,micromotionstudy.TimeStudy:Definition,timestudyequipment,selectionof
job, steps in time study.
Production Planning and Control
Introduction:Typesofproductionsystems,NeedandfunctionsofPPC,Aggregateproduction
III planning.CapacityPlanning,ERP:Modules,MasterProductionSchedule,MRPandMRP-II. 8
Forecasting Techniques: Causal and time series models, moving average, exponential
smoothing, trend and seasonality (Numerical).
Text Books:
. Industrial Engineering and Production Management, M Mahajan, Dhanpat Rai and Co., 2015
1
2. Industrial Engineering and Production Management, M. Telsang, S. Chand Publication, 2018
Reference Books::
1. Introduction to Work Study by ILO, ISBN 978-81-204-1718-2, Oxford & IBH Publishing Company, New Delhi,
Second Indian Adaptation, 2008.
2. Maynard‘s Industrial Engineering Hand Book, H. B. Maynard, K Jell, McGraw Hill Education, 2001
3. Design and Analysis of Lean Production System, R. Askin, Wiley, 2001
4. Most Work Measurement Systems, Zandin K.B., ISBN 0824709535, CRCPress, 2002
5. SAP ERP: Functionality and Technical Configuration, Martin Murry, SAP Press, 2010
6. Motion and time Study design and Measurement of Work, R. Barnes, Wiley, 2009
7. ‘Process Simulation using WITNESS’, R. Al-Aomar, A. Williams, O. M. Uigen, Wiley, 2015
8. Applied Ergonomics, Hand Book, Brien Shakel, Butterworth Scientific, 1988
9. Introduction to Human factor and Ergonomics, R. C. Bridger, McGraw Hill, 2017
10. Human Factor Engineering and Design, M. Sanders and E. McCormick, McGraw Hill, 1992
11. Ergonomics: How to Design for Ease and Efficiency, K. Elbert and H. Kroemer, Prentice Hall, 2018
E-resources:
1. https://onlinecourses.nptel.ac.in/noc21_me15/preview
Pre-requisite:Statistics
Course Objectives:
1. T oequipstudentswithfoundationalknowledgeofLeanandSixSigmamethodologies,includingkeytools
such as DMAIC, 7QC tools.
2. To develop students’ ability to apply continuous improvement techniquesforeffectivedecision-making
and sustainable operational excellence.
ourse Outcomes:
C
After learning the course, the students will be able to:
1. Analyze quality-related issues using Cost of Quality and 7QC tools to improve product and process
performance.
2. A nalyze data using statistical tools like Pareto charts, histograms, and process capability indices to
evaluate process performance.
3. Apply risk assessment and control tools such as FMEA, control charts to sustain process improvements.
4. Apply the continuous improvement techniques in the industry to improve the process performance.
Detailed Syllabus:
Unit Description
Introduction to lean and quality
I eanandSixSigmahistory,Eightwastesinlean,Leantools,Qualityvalues,Costof
L 7
Quality, Introduction to 7QC tools. Introduction to DMAIC.
Six Sigma: Define and Measure
II
Define stage: Project Charters, VOC, CTQ, SIPOC, Gantt Charts, PERT-CPM. 8
Measure stage: Process flowchart, Histogram, Pareto chart, Gage R&Rstudy,Basic
statistics, Probability theory, Process capability analysis, OEE
Six Sigma: Analyze, Improve and Control
III Hypothesis testing, 5-Whys, Fishbone diagram, Regression analysis, Design of 8
Experiments (DOE), Risk assessment (FMEA), Control chart (X and R chart).
Continuous Improvement Methods
IV Case studies on implementation of continuous improvement methods like Kaizen, 7
Poka-Yoke, Kanban, 5’S, Just in Time, 3M and 4M method.
Total 30
Text Books:
1. S
ix Sigma: A Complete Step-by-Step Guide,Craig JosephSetter and the Council for Six Sigma
Certification, Harmony Living, LLC, ISBN: 1732592624, 2018.
2. T
he Six Sigma Handbook: A Complete Guide for Green Belts, Black Belts, and Managers at All
Levels,Thomas Pyzdek, Paul A. Keller, Third Edition,McGraw-Hill, ISBN: 978-0-07-162337-7, 2010.
Reference Books:
1. T
he Six Sigma Way: How to Maximize the Impact of Your Change and Improvement Efforts,Peter S.
Pande, Robert P. Neuman, and Roland Cavanagh, McGraw Hill Professional, ISBN:0071823018, 2014.
E-resources:
1 . h ttps://www.sixsigmacouncil.org/six-sigma-training-material/
2. https://onlinecourses.nptel.ac.in/noc20_mg19/preview
Pre-requisite: None
Course Objectives:
1. To provide exposure to the students about safety and health provisions, including the need for and methods of safety
training.
2. To create awareness on safety standards in residential, commercial and agricultural applications.
3. To help students to learn about Factory act 1948, Environment act 1986 and rules framed under the act.
4. To describe the chemistry of fire & explosion and select & use appropriate fire-fighting and explosion proof
equipment.
Course Outcomes:
After learning the course, the students will be able to:
1. Demonstrate the safety, ethical issues, and importance of safety training that may arise from industrial processes.
2. Identify the safety standards in residential, commercial and agricultural applications
3. List out important legislations related to Health, Safety and Environment
4. Select a suitable method for prevention of fire and explosion
Detailed Syllabus:
Unit Description
Concepts and Techniques:
istory of safety movement – Evolution of modern safety concept, safety survey, safety
H
I inspection, safety sampling. Safety Audits- Non-Conformity Reporting (NCR), audit 7
checklist- identification of unsafe acts of workers and unsafe conditions in the industry,
Safety training- needs and methods.
Safety in residential, commercial, agricultural, installation & Protective equipment:
Electricity, its Usefulness and Hazards, statutory Provisions, Indian Standards, Effects of
II 8
Electricalparametersonhumanbody,Safetymeasuresforelectricshock,portableelectrical
apparatus, Electric work in hazardous atmosphere.
Factories Act – 1948 & Environment Act – 1986:
Factories Act – 1948: Statutory authorities – inspecting staff, health, safety, provisions
relating to hazardous processes, welfare, working hours, employment of young persons–
special provisions – penalties and procedures-Maharashtra Factories Rules 1963.
III 8
EnvironmentAct–1986:GeneralPowersofthecentralgovernment,prevention,controland
abatement of environmental pollution-The noise pollution (Regulation andcontrol)Rules,
2000-The Batteries (Management and HandlingRules)2001.AirAct1981andWaterAct
1974 -audit, penalties and procedures.
Total
Reference Books:
1. P hilip E. Hagan, John F. Montgomery, James T. O‘reilly ―Accident Prevention Manual for Business
and Industry: Administration and Programs‖, 14th Edition, National Safety Council, Illinois, Chicago,2015.
2. Heinrich H.W. ―Industrial Accident Prevention‖ McGraw-Hill Company, New York, 1980.
3. Krishnan N.V. ―Safety Management in Industry‖ Jaico Publishing House, Bombay, 1997.
E-resources:
1. https://nptel.ac.in/courses/114106039
Course Objectives:
This course aims at enabling the students to
1. To make the learners conversant with various battery chemistries used for Electric Vehicles and impart a
thorough understanding of Lithium-Ion Battery
2. To understand the various battery performance parameters and testing procedures
3. To understand the requirements and functioning of the battery management system
4. To make the learners conversant with battery pack design procedure and Equivalent Circuit Cell Modeling
of Battery
ourse Outcomes:
C
After learning the course, the students will be able to:
1. Compare various battery chemistries and select a suitable battery for EV application
2 . A nalyze Li-ion Battery's performance based on various parameters
3. Select BMS for a given battery pack
4. Design a battery pack for a given EV application
Detailed Syllabus:
Unit Description
verview of Battery Technology of Electric Vehicle (EV): Electric vehicle (EV)
O
requirements,PrimaryBattery,SecondaryBattery,Past,current,andfutureEVbattery
I
technologies (Pb-acid, NiCd, NiMH, Li-ion, Na-air, Al-air, Li-S, Li-air, Na-ion etc) 7
Lithium-Ion Battery Technology: Introduction, Components, Cathode, Anode,
separators & Electrolytes Material comparison, Battery Working, Cylindrical,
prismatic and Pouch cells, Battey cell Manufacturing
Battery Performance and Testing:
Battery operating and performance parameters (Voltage, Capacity, Energy, Power,
II
C-rate, SOC, DOD, Coloumbic & energy Efficiency, Calendar and Cycle life etc.), 7
CC-CV charging, CC discharging tests. Effect of parameters on the charge-discharge
characteristics of Li-ion battery, SOC Estimation: Coulomb Counting method,
OCV-SOC method, Estimation of SoH, Capacity, efficiency.
Battery Thermal Management: Heat generation inside battery, Thermal issues of
Li-Ion Battery, impact of temperature on capacity, cycle life, thermal Runaway,
different Cooling strategies
III BatteryElectricManagement:PrimaryfunctionsofBMS,BMSArchitecture,voltage, 8
current and temperature sensing, SOC estimation, BMS safetyfeatures,selectionof
BMS , battery pack balancing: Passive and active balancing. BMS topologies, A.I.
based BMS
Reference Books:
1. Gregory L. Plett, Battery Management Systems, Volume I: Battery Modeling, Artech House, London
2. Gregory L. Plett, Battery Management Systems Volume II, Equivalent-Circuit Methods, Artech House,
London
3. G ianfranco Pistoia, Boryann Liaw (eds.), Behaviour of Lithium-Ion Batteries in Electric Vehicles_ Battery
Health, Performance, Safety, and Cost, Springer International Publication
4. Jiuchun Jiang, Caiping Zhang - Fundamentals and Application of Lithium-ion Batteries in Electric Drive
Vehicles,Wiley
E-resources:
1. https://www.coursera.org/learn/battery-management-systems
2. ht tps://www.coursera.org/learn/equivalent-circuit-cell-model-simulation?specialization=algorithms-for-bat
tery-management-systems
Course Outcomes:
1. Understand fundamental ethical principles and professional responsibilities related to engineering, artificial
intelligence (AI), and emerging technologies
2. Apply ethical frameworks and decision-making models to analyze dilemmas involving AI systems, research
practices, intellectual property, and sustainable engineering solutions.
3. EvaluatetheenvironmentalandsocietalimpactsofengineeringandAItechnologies,andpromotesustainableand
responsible innovations aligned with ethical standards.
4. Demonstrateawarenessofglobal,cultural,andregulatoryperspectivesinprofessionalpractice,withanemphasis
on ethics in AI governance, sustainability initiatives, and inclusive technological development.
Detailed Syllabus:
Unit Description
oundations of Professional Ethics and Emerging Technologies
F
Role of ethics in engineering and AI; moral autonomy; types of ethics; professional
I 8
responsibilitiesinAI-drivenworld;ethicaltheories(utilitarianism,deontology,virtueethics)
with practical case studies.
Total 30
Text Books:
1. Harris, C. E., Pritchard, M. S., &Rabins, M. J. (2019). Engineering ethics: Concepts and cases. 6th Edition, Cengage
Learning, Inc.
2. Coeckelbergh, M. (2020). AI Ethics (1st ed.). MIT Press.
Reference Books:
1. Mike W. Martin and Roland Schinzinger, (2019). Ethics in Engineering, 3rdEdition,Tata McGraw Hill, New Delhi,
Caroline Whitbeck, Ethics in Engineering practice and Research. (2011) 2nd Edition, Cambridge.
2. Virginia Dignum (2019). Responsible Artificial Intelligence: How to Develop and Use AI in a Responsible Way.
Springer.
3. Wendell Wallach and Colin Allen (2008). Moral Machines: Teaching Robots Right From Wrong. Oxford University
Press.
ourse Outcomes:
C
After learning the course, the students will be able to:
1. To apply and analyze asymptotic notations and recurrence relations to evaluate algorithm efficiency
2. To apply different algorithmic design strategies to solve computational problems.
3. To identify computational problems in terms of complexity classes
4. To analyze advanced algorithms for solving complex problems
Detailed Syllabus:
Unit Description
lgorithmic Analysis & Divide & Conquer Strategy:
A
Asymptotic notations, lower bound and upper bound: Best case, worst case, average
case analysis, classification of time complexities (linear, logarithmicetc),Recurrences:
Formulation and solving recurrence, Equations using Master Theorem
08
reedy Strategy :
G
Principle, control abstraction, time analysis of control abstraction, knapsack problem,
Job scheduling algorithm, Huffman code generation algorithm, Bellman-Ford.
Dynamic Programming Strategy : 08
II
Dynamic Programming: Principle, control abstraction, time analysis of control
abstraction, 0/1 knapsack, All Pair Shortest Path - Floyd-Warshall, Chain Matrix
Multiplication, Sum of Subset.
elf LearningContents : Single Source Shortest Path Dijkstra’s Algorithm , Solve
S
binomial coefficients using Dynamic Programming 04
Reference Books:
1. Gilles Brassard, Paul Bratley, “Fundamentals of Algorithmics”, PHI, 2nd edition, 2011, ISBN
978-81-203-1131-2
2. Brian Christian , Tom Griffiths, “Algorithms to Live By: The Computer Science of Human Decisions”, 1st
edition, October 2017, ISBN-10:0143191616
E-resources:
1. https://academic.oup.com/comjnl/article/65/10/2709/6334046
2. Design and Analysis of Algorithm course on NPTEL : https://nptel.ac.in/courses/106106131
Course Objectives:
1. Introduce the fundamental problems of computer vision.
2. Provide an understanding of techniques, mathematical concepts, and algorithms used in computer vision to
facilitate further study in this area.
3. Utilize programming and software tools for relevant application implementation.
ourse Outcomes:
C
After learning the course, the students will be able to:
1. Apply image transformation techniques for computer vision applications.
2. Formulate and solve problems in computer vision using image processing techniques.
3. Apply appropriate feature extraction methods for computer vision applications.
4. Analyze and apply methods for image segmentation.
Detailed Syllabus:
Unit Description
I ntroduction:overviewofcomputervision,relatedareas,andapplications;overviewofsoftware
7
I tools, Fundamentals of Image Formation.
Self Learning Contents:Image Transformation: Orthogonal,Euclidean, Affine, Projective 4
onvolution and filtering, image enhancement, restoration, histogram processing, edges
C
8
detection techniques- Sobel, Canny
II
Self Learning Contents:edges detection techniques-LOG, DOG and line detectors (Hough
4
transform)
Corners - Harris and Hessian Affine, Orientation Histogram, SIFT, SURF, HOG, GLOH,
7
III Scale-Space Analysis- Image Pyramids.
Self Learning Contents:Gaussian Derivative Filters,Gabor Filters 3
Region Growing, Edge Based Approaches to Segmentation, Graph-Cut, Mean-Shift, MRFs,
Texture Segmentation; Object Detection 8
IV
Self Learning Contents:case studies considering MLand CV 4
Total 30
E-resources:
1. https://archive.nptel.ac.in/courses/106/105/106105216/
2. https://onlinecourses.nptel.ac.in/noc23_ee78/preview
Detailed Syllabus:
Unit Description Duration
[Hrs]
Deep Neural Networks (DNN):
I ntroduction to Deep Learning, Training DNN Using Back Propagation, Hyperparameters.
Effective training in Deep Net early stopping, dropout, regularizations, and Batch 07
I Normalization. Introduction to transfer learning. Optimization in Deep Learning: Need for
Stochastic gradient descent
Self-Learning:Artificial Neural Network, Perceptron,Multilayer Perceptrons
04
onvolutional Neural Networks (CNN):
C
Building blocks—convolution blocks, padding, strides, pooling layers, and activation
functions. Mathematical modeling of CNN. CNN Architecture, Transfer learning techniques 08
II
and popular CNNs.
Detailed Syllabus:
Assignmen
t No. Suggested List of Assignments
Image Filtering: Implement various image filters like Sobel, median, Gaussian and apply them to sample
1. images to observe their effects on image properties such as edges, noise, and blurriness.
Image Segmentation: Implement different segmentation techniques like thresholding, region growing, and
2. watershed segmentation and apply them to sample images to extract different regions of interest.
Image Registration: Implement different image registration techniques, like affine transformation, and apply
3. them on pairs of images of the same scene captured from different perspectives to align them.
4. Implement convolutional neural networks (CNNs) for image processing and visualization.
5. Object detection using deep learning frameworks like YOLO or Mask R-CNN.
11. Time series prediction using RNN – stock market analysis or weather forecasting.
12. Text identification using OpenCV, Tesseract (OCR) and deep neural network
14. Music composition using any one or combination of suitable deep neural networks - CNN/RNN/LSTM/GAN.
Reference Books:
1. Jan Erik Solen, “ Computer Vision with Python” Published by O'Reilly media 2012.
2. Reinhard Klette, “Concise Computer Vision- An Introduction to Theory and Algorithm”, Springer 2014
3. Robert M. Haralick and Linda G. Shapiro, "Computer and Robot Vision", Addison-Wesley, 1992-93.
4. Richard O. Duda, Peter E. Hart, and David G. Stork, "Pattern Classification", Wiley Interscience, 2001.
5. Aston Zhang, Zachary C. Lipton, Mu Li, and Alexander J. Smola, “Dive into Deep Learning”, 2021.
6. Giancarlo Zaccone, Md. Rezaul Karim, Ahmed Menshawy "Deep Learning with TensorFlow: Explore neural
networks with Python", Packt Publisher, 2017
E-resources:
. h ttps://onlinecourses.nptel.ac.in/noc23_cs24/, https://onlinecourses.nptel.ac.in/noc23_cs56
1
2. https://www.analyticsvidhya.com/blog/2020/02/learn-image-classification-cnn-convolutional-neural-networks-3
-datasets/
ourse Outcomes:
C
After learning the course, the students will be able to:
1. Apply Generative AI Models for various Applications.
2. Apply Large Language Models to Generative AI Applications.
3. Apply prompt Engineering Techniques to control and guide generative models effectively.
4. Demonstrate an application of stable diffusion Inference
Detailed Syllabus:
Unit Description
8
I ntroduction to Gen AI:
Introduction, Difference between ML and Generative AI pipeline, seq2seq model,
Transforming Text to numerical (vector) representations- word embedding, Types of
I Generative AI Model- Variational Autoencoder, Generative Adversarial Network (GANs)
Self Learning Content: 4
aseStudy:TutorialcodeonGANforimagegeneration,Sentimentanalysisusingseq2seq
C
model.
LM Models:
L 8
Introduction to Large Language Models, Transformers, Self Attention, Mask multihead
attentionMechanismindetail,CrossAttention,IntroductionGPT andBERTarchitecture.
Pre-training and Transfer Learning.
II
Self Learning Content: 4
Case Study: LLM apps using Prompt Engineering – BERT and ChatGPT (Gen Ai
Chatbots)
Positional encoding. Difference between BERT and GPT architecture.
Retrieval Augmented Generation 7
Prompt EngineeringTechniques,WorkingofRAG,ArchitectureofRAG,HuggingFace's
III transformers library, ALangChain, Multimodal RAG, RAG with agent-based systems
Self Learning Content: 4
Case Study: Improving Customer Support using Retrieval Augmented Generation (RAG),
Legal document summarisation and search by using multimodal RAG
table diffusion
S
IntroductiontoStableDiffusion,ComponentofStableDiffusion,TrainingStableDiffusion,
StableDiffusionInference-GeneratingImagesfromNoise(inference)andPrompt,Methods 7
and tools for stable diffusion, Different Versions of Stable Diffusion, Advanced Stable
IV Diffusion techniques.
Self Learning Content:
CaseStudy:GeneratingHigh-QualityArtworkusingStableDiffusionforCreativeProduct
3
Design. Comparison of stable diffusion techniques.
Total 30
Text Books:
1. D avid Sweenor and Yves Mulkers - Generative AI Business Applications: An Executive Guide with
Real-Life Examples and Case Studies.
2. Bernard Marr - Generative AI in Practice, Wiley Publication.
3. "Transformers for Natural Language Processing" by Denis Rothman
4. Generative AI with LangChain: Build Large Language Model (LLM) Apps with Python, ChatGPT, Other
LLMs" by Ben Auffarth
5. Retrieval-Augmented Generation (RAG): Empowering Large Language Models (LLMs)" by Dr. Ray
Islam
.
Reference Books:
1. Joseph Babcock and Raghav Bali - Generative AI with Python and TensorFlow 2: Create images, text, and music
with VAES, GANS, LSTMs, Transformer models
2. Zonunfeli Ralte and Indrajit Kar - Learn Python Generative AI: Journey from autoencoders to transformers to large
language
3. "Transformers for Natural Language Processing" by Denis Rothman
4. "Hands-On Large Language Models" by Yuxi (Hayden) Liu
5. "LLMs in Production" by Christopher Brousseau and Matthew Sharp.
6. "Prompt Engineering for Generative AI"
E-resources:
ourse Outcomes:
C
After learning the course, the students will be able to:
1. Analyze the fundamental concepts of blockchain and cryptocurrency, including its components, types, and consensus
mechanisms.
2. Evaluate the architecture and functionality of public and private blockchain frameworks, including Ethereum and
Hyperledger.
3. Design and implement smart contracts using Solidity for real-world applications.
4. Assess various enterprise blockchain platforms and their role in decentralized finance (DeFi) applications.
Detailed Syllabus:
Unit Description
Fundamentals of Blockchain and Cryptocurrency
Self learning Contents: case study - Food supply chain management 4
Blockchain Programming and Smart Contracts
Total 30
Text Books:
1. Imran Bashir, "Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized
Applications" Second Edition, Packet Publishing, ISBN: 978-1788839044, 2018
2. Don Tapscott , Alex Tapscott, "Blockchain Revolution: How the Technology Behind Bitcoin and Other
Cryptocurrencies is Changing the World", First Edition, Portfolio Publication, ISBN: 978-1101980132, 2016
3. Daniel Drescher,"Blockchain Basics: A Non-Technical Introduction in 25 Steps", First Edition, Apress, ISBN:
978-1484226032, 2017.
4. Blockchain Technology, Chandramouli Subramanian, Asha A. George, Abhillash K. A and Meena Karthikeyen,
Universities Press.
Reference Books:
1. Arshdeep Bahga and Vijay Madisetti, "Blockchain Applications: A Hands-On Approach" , First Edition, VPT, ISBN:
978-0996025567, 2017.
2. Melanie Swa, "Blockchain: Blueprint for a New Economy", First Edition, O'Reilly Media, ISBN: 978-1491920497,
2015
E-resources:
1. Blockchain for Business, https://www.ibm.com/downloads/cas/3EGWKGX7.
2. https://www.hyperledger.org/use/fabric
3. NPTEL: https://onlinecourses.nptel.ac.in/noc19_cs63/preview
dgeAnalytics,AI/MLandFederatedLearningattheEdge:Basicdataanalyticsin
E
Edge IoT, machine learning, Edge AI .
IV Federated Learning:Concept, architecture for federatedlearning(Flower architecture) 7
Applications:Deep learning at the edge, health monitoring,smart transportation.
Total 30
Text Books:
1. Perry Lea , “IoT and Edge Computing for Architects”, Packt Publishing, ISBN: 9781839214806, March 2020.
2. Rajkumar Buyya, Satish Srirama, “Fog and Edge Computing: Principles and Paradigms”, Wiley publication,
ISBN: 9781119524984, January 2019.
Reference Books:
1. David Jensen, “Beginning Azure IoT Edge Computing:Extending the Cloud to the Intelligent Edge, Springer
India, ISBN-13 978-1484275504, January 2022.
. T
1 he laboratory assignments are to be submitted by students in the form of a journal.
2. Each assignment write-up should have Title, Objectives, Outcomes, Theory- Concept in brief, dataset used, data
description, conclusion, and assessor's sign.
3. Program codes with sample output of all performed assignments should be submitted.
2. evelop an application for summarizing research papers or articles. Use natural language processing
D
techniques to extract essential information and provide concise summaries.
Key Components: Natural Language Processing libraries (e.g., NLTK, spaCy), LangChain, extractive
or abstractive summarization techniques, Python.
3. rite a program for Image Generation using Image Generation Models and Diffusion Models.
W
1. GPT4, Dall-E
2. Midjourney
3. Stable Diffusion
4. Implement use cases to demonstrate how Generative AI tools are transforming video motion and
camera control. Use tools that control both the object and camera motions, for the resulting
synthetic video:
1. Text-to-video object - text prompts
2. Text-to-video camera control - text prompts
3. Image-to-video object controls - sliders or brushes
4. Image-to-video camera motion controls - sliders or brushes
5. I mplement a GAN to generate synthetic insurance claim images for training fraud detection models using
OpenAI SDK.
6. Develop a VAE to generate synthetic financial transactiondata for anomaly detection using LangChain.
7. reate a text generation model to generate product descriptions for an e-commerce website using transformers
C
and attention mechanisms with LlamaIndex.
8. ransform policy documents to numerical representations using word embeddings and evaluate their
T
applications in claim processing with OpenAI SDK.
9. Train a large language model (LLM) for financial news classification using LangChain.
10. Create a foundation model for generating financial reports using LangChain.
11. evelop a chatbot using prompt engineering techniques to assist customers with insurance policy inquiries
D
using OpenAI SDK.
12. I mplement different prompting techniques for optimizing RAG solutions to generate personalized product
recommendations using LlamaIndex.
13. ine-tune an LLM for specific tasks such as loan approval processing using advanced RAG patterns with
F
OpenAI SDK.
Suggested List of Mini Project topics
Course Objectives:
1. Provide a comprehensive understanding of blockchain technology, its components, and types.
2. Explain cryptocurrency fundamentals, transactions, and mining concepts.
3. Analyze the differences between public and private blockchains, their architectures, and real-world applications.
4. Develop proficiency in smart contract programming using Solidity and understand its practical use cases.
5. Explore enterprise blockchain platforms and their applications in finance and decentralized ecosystems.
Course Outcomes:
After learning the course, the students will be able to:
1. Implement basic blockchain structures, cryptographic hashing, and transaction mechanisms to understand blockchain
fundamentals.
2. Demonstrate public and private blockchain networks, including Ethereum and Hyperledger, to compare their
architecture and consensus mechanisms.
3. Design and deploy smart contracts using Solidity for real-world applications.
4. Assess blockchain tools, explorers, and enterprise platforms to analyze their use in decentralized applications (DeFi,
enterprise solutions).
Assign
ment Suggested List of Assignments
No.
Configure and interact with a local Ethereum blockchain using Ganache and Truffle to simulate transactions.
5.
eploy a smart contract on the Ethereum test network using Remix and Metamask to analyze transaction
D
6.
workflow.
Develop a Solidity-based voting contract that allows users to cast and count votes securely.
7.
I mplement a Solidity contract with error handling to manage secure transactions and prevent common
8.
vulnerabilities.
xplore a decentralized finance (DeFi) platform and interact with a smart contract for staking or
E
9.
lending (test network).
et up and perform a transaction using an enterprise blockchain platform (Ripple, Corda, or
S
10.
Quorum) to study real-world blockchain applications.
Reference Books:
1. Don Tapscott , Alex Tapscott, “Blockchain Revolution: How the Technology Behind Bitcoin and Other
Cryptocurrencies is Changing the World”;, First Edition, Portfolio Publication, ISBN: 978-1101980132, 2016
2. Daniel Drescher,”Blockchain Basics: A Non-Technical Introduction in 25 Steps”, First Edition, Apress, ISBN:
978-1484226032, 2017.
3. Chandramouli Subramanian, Asha A. George, Abhillash K. A and Meena Karthikeyen, “Blockchain Technology”,
Universities Press.
4. Arshdeep Bahga and Vijay Madisetti, "Blockchain Applications: A Hands-On Approach" , First Edition,
VPT, ISBN: 978-0996025567, 2017.
5. Melanie Swa, “;Blockchain: Blueprint for a New Economy”, First Edition, O'Reilly Media, ISBN:
978-1491920497, 2015
E-resources:
1. Blockchain for Business, https://www.ibm.com/downloads/cas/3EGWKGX7.
2. https://www.hyperledger.org/use/fabric
3. NPTEL: https://onlinecourses.nptel.ac.in/noc19_cs63/preview
Prior knowledge of Internet of Things, Cloud Computing and Embedded AI is essential.
Course Objectives:
1. To understand the fundamental concepts of Edge Computing, its applications, and the associated hardware,
networking, and security requirements.
2. To explore various Edge computing platforms, their architectures, and deployment challenges.
3. To evaluate security considerations and implement AI/ML models for Edge computing applications.
4. To design and develop real-world applications using Edge computing frameworks and tools.
Course Outcomes:
1. Analyze the need for hardware, software, and platform-specific components in Edge computing based on
application and data requirements.
2. Evaluate Edge computing-related requirements, including networking, deployment, and security aspects.
3. Implement appropriate security and threat mitigation strategies in Edge environments, and develop Edge AI/ML
models using relevant tools.
4. Develop real-world Edge computing applications across various domains using suitable platforms and analytics
techniques.
Guidelines:
. T
1 he laboratory assignments are to be submitted by students in the form of a journal.
2. Each assignment write-up should have Title, Objectives, Outcomes, Theory- Concept in brief, dataset used, data
description, conclusion, and assessor's sign.
3. Program codes with sample output of all performed assignments should be submitted.
1. Continuous assessment of laboratory work is done based on the overall performance and laboratory
performance of the students.
2. Each laboratory assignment assessment should assign grade/marks based on parameters with appropriate
weightage.
3. Suggested parameters for overall assessment as well as each laboratory assignment assessment include- timely
completion, performance, innovation, efficiency, punctuality and neatness.
Guidelines for Laboratory Conduction:
Note: The suggested list of assignments is given below. Instructors can frame suitable assignments.
Students should perform any 13 assignment
Detailed Syllabus:
Assignme
nt No. Suggested List of Assignments
1. Build a basic IoT sensor application using Python, MQTT, and AWS DynamoDB or MongoDB
2. evelop a Web application for Edge IoT Communications by using WebAPI data, MQTT notifications, and
D
dashboard visualization. MQTT data may be accessed using REST API
3 tudy about Azure IoT Edge and prepare a report on “Install and provision IoT Edge
S
4 Study about Google Cloud IoT Edge and prepare a report on “Install and provision IoT Edge
5 tudy Microsoft Azure or Google Cloud IoT Edge Security model and prepare a report on “How to build security
S
model daemon
6 Develop an application using Microsoft Azure or Google Cloud IoT Edge platform: Smart Bus Transportation
7 evelop an application using Microsoft Azure or Google Cloud IoT Edge platform: Intelligent Traffic light
D
management system
8 Develop an Edge Analytics application for exploiting Edge Computing in Health Monitoring using Raspberry Pi.
evelop the following use case related to Edge AI or Edge Robotics using Nvidia Jetson platform - Develop a
D
9 device for Social Distancing Detector. Use machine learning or deep learning and configure it to run on edge AI
devices of NVIDIA Jetson.
evelop the following use case related to Edge AI or Edge Robotics using Nvidia Jetson platform - Deep Learning
D
10 based Automatic Speech Recognition.
Use machine learning or deep learning and configure it to run on edge AI devices of NVIDIA Jetson
evelop the following use case related to Edge AI or Edge Robotics using Nvidia Jetson platform - Deep Learning
D
11 based Automatic Object Recognition.
Use machine learning or deep learning and configure it to run on edge AI devices of NVIDIA Jetson
12 evelop the following use case related to Edge AI or Edge Robotics using M5stack Core2 and ESP32
D
microcontroller: Face mask detection.
13 evelop the following use case related to Edge AI or Edge Robotics using M5stack Core2 and ESP32
D
microcontroller - Health monitoring parameter analysis
14 Design any suitable Edge computing application using Tensorflow-Lite. May use any suitable hardware platform.
Reference Books:
1. David Jensen, “Beginning Azure IoT Edge Computing: Extending the Cloud to the Intelligent Edge,
Springer India, ISBN-13 978-1484275504, January 2022.
2. Pethuru Raj and Anupama C. Raman,"T
he Internet ofThings: Enabling Technologies, Platforms, and
Use Cases", CRC Press, ISBN 9781032509266, June 2022.
E-resources:
.
2 h ttps://github.com/Azure/iotedge/blob/main/edgelet/doc/devguide.md
3. https://advcloudfiles.advantech.com/ecatalog/2021/08041406.pdf
4. https://openautomationsoftware.com/knowledge-base/how-to-access-mqtt-data-rest-api/
5. https://learn.microsoft.com/en-us/azure/iot-edge/about-iot-edge?view=iotedge-1.4
6. https://www.upgrad.com/blog/iot-project-ideas-topics-for-beginners/
7. https://www.tensorflow.org/lite
Prior knowledge of Natural Language Processing, DeepLearning, Unsupervised MachineLearningis essential.
Course Objectives:
1. To understand the architecture, types, and real-world applications of recommender systems.
2. To analyze the design, functionality, and challenges of content-based and collaborative recommendation systems.
3. To apply advanced deep learning architectures such as RBM, RNN, and Autoencoders in building intelligent
recommendation-based applications.
4. To explore hybrid and ensemble approaches, and evaluate recommender systems using appropriate performance metrics.
ourse Outcomes:
C
After learning the course, the students will be able to:
1. Understand and compare various types of recommendation systems and their architectures.
2. Analyze content-based and collaborative filtering techniques.
3. Apply deep learning models to build recommender system components.
4. Design hybrid recommenders and evaluate their performance.
Detailed Syllabus:
Unit Description
Introduction to Recommendation Systems:
efinition and importance,Types of recommendationsystems,architecture of recommender engine,
D 7
I applications.Machine Learning based RecommendationSystems: Introduction, types,applications.
Self Learning Contents:
4
ase Study: Machine Learning Approach to recommend Suitable Crops and Fertilizers for Agriculture
C
Case Study: Personalized Recommendation to Citizens in the Health-Care Industry.
Content-Based and Collaborative Filtering Techniques:
ontent-Based Filtering:Architecture, components,recommendation process,TF-IDF, Cosine
C
Similarity, KNN for Learning user profiles and filtering techniques 8
II Collaborative Filtering:Similarity and sparsity,User-based and Item-based approaches
Model-based filtering: rule-based models, matrix factorization, association rule mining,Tuning and
evaluation
Self Learning Contents:
4
ase Studies: Movie recommendation, Health recommender systems
C
Deep Learning for Recommender Systems: Introductiontoneural-basedrecommenders,RBM,
Autoencoders, RNN for recommendations, TensorFlow Recommenders (TFRS): Retrieval stage, 8
III Ranking stage,Side features, Deep retrieval.
Self Learning Contents:Multi-task recommenders, Deepand Cross Networks.
4
Text Books:
1. Sachi Nandan Mohanty,Jyotir Moy Chatterjee, SarikaJain,Ahmed A. Elngar,Priya Gupta, "RecommenderSystem
with Machine Learning and Artificial Intelligence: Practical Tools and Applications in Medical,Agriculturaland Other
Industries" Wiley-Scrivener publishing, July 2020, ISBN: 978-1-119-71157-5
. Charu Aggarwal,"Recommender Systems",Springer Publishing,1st Edition,March 2016,ISBN 978-3-319-29657-9
2
Reference Books:
1. Frank Kane,"Building Recommender Systems with MachineLearning and AI", Packet Publishing,January 2021,
ISBN-9781789803273
2. Jannach D., ZankerM.and FelFering A.,"RecommenderSystems: An Introduction",Cambridge University Press(2011).
E-resources:
1. https://www.udemy.com/c ourse/b uilding-recommender-systems-with-machine-leaming-and-ai/
2. https://www.udemy.com/c ourse/r ecommender-systems/
1. To provide students with the fundamental and essentials of Cloud Computing.
2. To enable students to explore real time cloud computing-driven commercial systems and applications.
3. To Gain proficiency in containerization and orchestration technologies including Docker and Kubernetes and
understand their significance in modern cloud applications.
ourse Outcomes:
C
After learning the course, the students will be able to:
1. Comprehend the fundamentals of cloud computing.
2. Analyze cloud services, deployment models and virtualization techniques in cloud infrastructure.
3. Apply cloud services including compute, storage, data management across various cloud platforms.
4. Use containerization tools like Docker and Kubernetes for cloud-native applications.
Detailed Syllabus:
Unit Description
Introduction to Cloud Computing & Architecture
loudandCloudComputing,CloudComputingParadigmandCharacteristics,Components
C 07
ofCloudComputingArchitecture,CloudTechnologies:GridComputing,Service-Oriented
I Architecture (SOA)
Self Learning Contents: 03
Benefits and Drawbacks of Cloud Computing , Geographic and logical structure of cloud
loud Deployment, Service Models & Virtualization
C
Cloud Service Models:IaaS, PaaS, SaaS
II Cloud Deployment Models:Public, Private, Hybrid,and Community Clouds 07
Virtualization: Introduction, Types and Techniques,Hypervisor and Virtualization in Cloud
Containerization:
Containerization,Understanding Linux Namespaces.
ocker:Docker,Docker Images & Containers, Dockerfile, Docker Hub & Private
D
Repositories, Docker Compose. 09
ubernetes:Kubernetes, need of Kubernetes, Orchestration with Kubernetes,
K
IV Architecture:Nodes, Pods, Deployments, Services (ClusterIP, NodePort, LoadBalancer),
ReplicaSets, ConfigMaps & Secrets, Master Node &WorkerNodes,Kubelet,APIServer,
Controller Manager.
Self Learning Contents:
enefits of Containers vs Virtual Machines (VMs), Case Study: Enhancing Application
B 05
Deployment and Scalability for E-commerce Systems Using Docker and Kubernetes.
Total 30
Text Books:
1. Barrie Sosinsky,“Cloud Computing Bible”,Wiley,India,ISBN:978-1-118-02399-0,2010.
2. Ronald L. Krutz, Russell Dean Vines, “Cloud Security: A Comprehensive Guide to Secure Cloud Computing”,
Wiley-India, ISBN: 978-0-470-93894-2, 2010
Reference Books:
1. homas Erland ,Zaigham Mahmood ,Ricardo Puttini,“Cloud Computing:Concepts,Technology & Architecture”,
T
Pearson,2ndEdition, ISBN: 9780133387568, May 2013
2. Anthony T.Velte ,TobyJ.Velte, Robert Elsenpeter,“Cloud Computing:A Practical Approach”,The
McGraw-Hill,ISBN: 978-0070683518,2017.
E-resources:
1. https://nptel.ac.in/courses/106105167
2. CloudComputinghttps://onlinecourses.nptel.ac.in/noc21_cs14/preview?
3. https://studytm.files.wordpress.com/2014/03/hand-book-of-cloud-computing.pdf
ourse Outcomes:
C
After learning the course, the students will be able to:
1. Use the fundamentals of Virtual and Augmented Reality.
2. Apply computer graphics techniques for virtual environment modeling.
3. Apply animation and simulation techniques in AR/VR use cases.
4. Analyze Machine Learning & Data Visualization in AR/VR.
Detailed Syllabus:
Unit escription
D
Unit I: Introduction to Virtual and Augmented Reality
Virtual Reality (VR) and Virtual Environments, Computer Graphics andReal-timeRendering,
RequirementsandBenefitsofVR,HistoricalDevelopmentofVRandKeyScientificLandmarks, 7
Augmented Reality (AR) Concepts, Technology, and Features.
I
Self Learning Contents:
Differences Between AR and VR, Challenges in AR Development. 4
Total 30
Text Books:
1. Steven M. LaValle, “Virtual Reality,” Cambridge University Press, 2023.
2. Allan Fowler, “AR Game Development,” 1st Edition, Apress Publications, 2018, ISBN 978-1484236178.
Reference Books :
1. Gerard Jounghyun Kirn, “Designing Virtual Systems: The Structured Approach,” 2005.
2. Doug A Bowman, Ernest Kuijff, Joseph J LaViola, Jr. and Ivan Poupyrev, “3D User Interfaces, Theory and Practice, Addison
Wesley,” USA, 2005.
3. Kharis O'Connell, “Designing for Mixed Reality,” O'Reilly Media, Inc., 2016, ISBN: 9781491962381.
4. Sanni Siltanen, “Theory and applications of marker-based augmented reality,” Julkaisija-Utgivare Publisher, 2012, ISBN
978-951-38-7449-0.
E-resources:
1. https://elearn.nptel.ac.in/shop/iit-workshops/completed/foundation-course-on-virtual-reality-and-augmented-reality/?v=c86ee
0d9d7ed
2. https://archive.nptel.ac.in/courses/121/106/121106013
Prior knowledge of Natural Language Processing, Deep Learning, Unsupervised Machine learning is essential.
Course Objectives:
1. To study design issues of content-based recommendation systems,and its functionality.
2. To explore the design issues of collaborative filtering-based recommender systems.
3. To practice the modeling of various deep neural architectures like RBM,RNN,Auto-encoders in order to design
recommendation-based applications.
4. To learn the ensembling and hybridization of content-based and collaborative filtering methods for designing
advanced recommender systems.
5. To experiment the various performance measures for evaluation of recommender systems.
Course Outcomes:
1. The laboratory assignments are to be submitted by students in the form of a journal.
2. Each assignment write-up should have a title, objectives,outcomes,Theory- Concept in brief, dataset used,data
description,conclusion,and assessor's signature.
3. Program codes with sample output of all performed assignments should be submitted.
4. The laboratory assignments are to be submitted by students in the form of a journal.
5. Each assignment write-up should have a title, objectives,outcomes,Theory- Concept in brief, dataset used,data
description,conclusion,and assessor's signature.
6. Program codes with sample output of all performed assignments should be submitted.
1. Continuous assessment of laboratory work is done based on the overall performance and laboratory performance of
the students.
2. Each laboratory assignment assessment should assign grade/m
arks based on parameters with appropriateweightage.
3. Suggested parameters for overall assessment as well as each laboratory assignment assessment include- timely
completion,performance,innovation,efficiency,punctuality,and neatness.
Guidelines for Laboratory Conduction:
1. The suggested list of assignments is given below. Instructors can frame suitable assignments.
Detailed Syllabus:
1. To develop a machine Learning model to build a recommendation system for crop disease detection
and yield prediction in agriculture
2. To produce and evaluate content-based movie recommendation or content-based health recommender systems
4. evelop an user-based and item-based K-Nearest-Neighbor(KNN)on MovieLens Dataset for movie
D
recommendations using collaborative filtering method
5. To develop a machine Learning based recommender system for breast cancer prognosis
6. To build Temporal Change Analysis-Based Recommender System for Alzheimer Disease Classification
7. evelop an advanced recommendation system for e-commerce or online shopping applications using suitable
D
deep neural networks like RBM,RNN, Auto-encoders,etc
8. Develop an advanced recommendation system for e-commerceor online shopping applications using matrix
f actorization algorithm
Reference Books:
1. Sachi Nandan Mohanty,Jyotir Moy Chatterjee,SarikaJain,Ahmed A. Elngar,Priya Gupta, "RecommenderSystem
with Machine Learning and Artificial Intelligence: Practical Tools and Applications in Medical,Agriculturaland Other
Industries" Wiley-Scrivener publishing, July 2020, ISBN: 978-1-119-71157-5
2. Charu Aggarwal,"Recommender Systems",Springer Publishing,1st Edition,March 2016,ISBN 978-3-319-29657-9
E-resources:
1. Frank Kane, "Building Recommender Systems with MachineLearning and Al",Packet Publishing,January 2021,
ISBN-9781789803273
2. Jannach D., ZankerM.and FelFering A., "RecommenderSystems: An Introduction", Cambridge University Press
(2011).
Course Objectives:
1. To identify the technical foundations of cloud systems architectures.
2. To analyze the problems and solutions to cloud application problems.
3. To apply principles of best practice in cloud application design and management.
ourse Outcomes:
C
After learning the course, the students will be able to:
1. Develop and deploy basic web applications and machine learning models using cloud services and platforms.
2. Configure and manage virtual machines and serverless environments using open-source and commercial cloud
3. Design and implement cloud-based relational and NoSQL databases using AWS/Azure/GCP.
4. Build, containerize, and orchestrate cloud-native applications using Docker and Kubernetes for scalable deployment.
1. The laboratory assignments are to be submitted by students in the form of a journal.
2. Each assignment write-up should have Title, Objectives, Outcomes, Theory- Concept in brief, dataset used, data
description, conclusion, and assessor's sign.
3. Program codes with sample output of all performed assignments should be submitted.
4. The laboratory assignments are to be submitted by students in the form of a journal.
5. Each assignment write-up should have Title, Objectives, Outcomes, Theory- Concept in brief, dataset used, data
description, conclusion, and assessor's sign.
6. Program codes with sample output of all performed assignments should be submitted.
Guidelines for Laboratory /TW Assessment:
1. Continuousassessmentoflaboratoryworkisdonebasedontheoverallperformanceandlaboratoryperformanceof
the students.
2. Each laboratory assignment assessment should assign grade/marks based on parameters with appropriate weightage.
3. S uggested parameters for overall assessment as well as each laboratory assignment assessment include- timely
completion, performance, innovation, efficiency, punctuality and neatness.
Detailed Syllabus:
Assign
ment Suggested List of Assignments
No.
1. Install GAE and Create a hello world app and other simple web applications using python.
2. Creating a linear regression model for vehicle price prediction using Microsoft Azure Cloud Services.
3. Installation and Configuration of virtualization using Open Source Operating System.
6. Design and Implement No-SQL Database in AWS/GCP/Azure SQL Database.(MongoDB /DynamoDB).
7. Create Custom Docker Image for local application, host it on Docker Hub.
10. Creating a Kubernetes Deployment Cluster for Application Availability and Scalability.
eference Books:
R
1. ThomasErlandZaighamMahmood,RicardoPuttini,“CloudComputing:Concepts,Technology& Architecture”,
Pearson, 2nd Edition, ISBN: 9780133387568, May 2013
2. AnthonyT.VelteTobyJ.Velte,RobertElsenpeter,“CloudComputing:APracticalApproach”,The
McGraw-Hill,ISBN: 978-0070683518, 2017.
E-resources:
. https://learn.microsoft.com/en-us/training/modules/describe-cloud-compute
1
2. https://aws.amazon.com/what-is-aws/?nc2=h_ql_le_int
3. https://education.oracle.com/learn/oracle-cloud-infrastructure/pPillar_640
Course Objectives:
1. To provide students with a comprehensive understanding of the concepts,principles,and applications of
augmented and virtual reality technologies.
2. To equip students with the necessary knowledge and skills to design,develop,and evaluate augmentedand virtual
reality systems.
3. To foster critical thinking and problem-solving abilities in the context of augmented and virtual reality.
Course Outcomes:
Guidelines:
1. The laboratory assignments are to be submitted by students in the form of a journal.
2. Each assignment write-up should have a title, objectives,outcomes,theory/concept in brief, dataset used,data
description, conclusion,and assessor's signature.
3. Program codes with sample output of all performed assignments should be submitted.
Detailed Syllabus:
Assignme
nt No. Suggested List of Assignments
1. Create a 3D virtual art gallery where users can walk around and view paintings.
2. Im
plement an augmented reality application to overlay3D graphics on top of the real world.
4. Implement an augmented reality application to detect images and overlay graphics on them.
Design and develop an augmented reality application that enhances the shopping experience by providing
6. virtual product try-on capabilities.
Create a virtual reality simulation for training purposes in a specific industry,such as aviation,healthcare,
7. or manufacturing,focusing on improving safety andefficiency.
9. Develop a simple 3D visualization application that can be experienced using 3D goggles.
10. Create a simple VR environment in Unity where a user can look around using a VR headset .
Reference Books:
1. William R. Sherman and Alan B. Craig, “UnderstandingVirtual Reality: Interface,Application, and Design,”Morgan
Kaufmann Publishers,San Francisco,CA,ISBN: 9780128010389,2018.
2. Alan B Craig, “Understanding Augmented Reality Conceptsand Applications,” Morgan Kaufmann Publishers,
ISBN:978-0-240-82408-6,2013.
E-resources:
. h ttps://nptel.ac.in/courses/106/106/106106138/
1
2. https://www.coursera.org/learn/introduction-virtual-reality
Course Objectives:
1. To provide hands-on experience in solving real-world problems using knowledge from selected elective domains.
2. To foster creativity, problem-solving, and technical skills through a capstone project
3. To enable students to work in teams, manage tasks, and communicate outcomes effectively.
4. To develop the ability to analyze and evaluate solutions using appropriate tools and techniques.
ourse Outcomes:
C
After learning the course, the students will be able to:
1. Identify and define real-world problems using concepts from the chosen elective domain.
2. Design and develop effective solutions using appropriate tools, technologies, and methodologies.
3. Analyze and evaluate the solution's performance using relevant metrics or validation techniques.
4. Demonstrate problem solving abilities and technical skills.
Guidelines:
Guide Allotment:
. S
1 tudents may work individually or in teams of up to 3 members.
2. Consideringregisteredteamsareaofinterest/domainandexpertiseofguide,theProjectcoordinatorinconsultation
with a panel of experts allots Project guides.
3. Guide should be allotted from the same program.
4. Incaseofasponsoredproject(withareputedindustryoranyresearchorganization)externalguideshouldbefrom
sponsored company/Industry along with the internal guide from the program.
5. Teams in consultation with guides will prepare project Synopsis
1 . very student is required to use Project Management Tools like JIRA for documentation purposes.
E
2. There is no limit on meeting of student groups with faculty mentors, External mentors totrackanddiscussthe
progress and record of the same should be maintained by the student in his/her individual Project work logbook.
Report:
. R
1 eport should be prepared using Latex/ MS Word only as per the template provided by the department.
2. Project reports shall be submitted in softcopy form/ Hard copy.
3. In the case of Sponsored project, students must submit a Completion certificate with the signature of an external
guide from the sponsored company.
Project Deliverables/Outcomes:
As a project work's outcome, each group may complete at least one activity from the list below.
1. Paper publication in quality journals/conferences (such as SCOPUS).
2. IPR (Patent / Copyright).
3. Participation in various contests with awards.
4. Application development.
Plagiarism Policy
All submissions must be original.
1. Plagiarism in report, code, or presentation will result in disqualification.
2. Use plagiarism-check tools before submission.
E-resources:
1. Coursera –https://www.coursera.org
2. NPTEL (National Programme on Technology Enhanced Learning) –https://nptel.ac.in
3. Unity Learn (for AR/VR Projects) – https://learn.unity.com
4. AWS Free Tier –https://aws.amazon.com/free
5. Google Cloud Training – https://cloud.google.com/training
6. Microsoft Azure Training –https://learn.microsoft.com/en-us/training/
7. GitHub (for code version control) –https://github.com
8. Overleaf (for LaTeX reports) –https://www.overleaf.com
Course Outcomes:
After completing this course, students will be able to:
1 Develop RESTful APIs using Node.js and Express.js with CRUD operations and database integration.
2 Implement authentication, authorization, and role-based access control to secure APIs.
3 Apply input validation, error handling techniques, and real-time communication using WebSockets.
4 Deploy backend applications to cloud platforms and validate their functionality through unit testing.
Detailed Syllabus:
Assignment
No. Suggested List of Assignments
reate a RESTful API using Node.js and Express.js with endpoints for handling users. Implement basic CRUD
C
1.
operations (GET, POST, PUT, DELETE) and test the API using Postman.
onnect an Express.js application to MongoDB/PostgreSQL. Implement CRUD operations for managing a list of
C
2. products, ensuring proper database schema design and error handling.
evelop a secure user authentication system using JSON Web Token (JWT). Implement user registration, login,
D
3. and password hashing using bcrypt.
nhance the user authentication system by implementing role-based access control (e.g., Admin can add/edit
E
4. products, Users can only view).
ocument API endpoints using Swagger for multiple environments. Use Postman to test API functionality,
D
5. configuring environment variables and automating test cases.
I ntegrate a third-party API (e.g., weather API, payment gateway, or social login) into an Express.js application.
6. Implement proper API request handling and error management.
evelop a backend service that enables users to upload profile pictures using Multer. Store the images in a local
D
7. server directory or cloud storage like AWS S3 or Cloudinary.
se Jest or Mocha with Supertest to write unit tests for Express.js routes. Ensure test cases cover response status,
U
8. error handling, and input validation.
eploy an Express.js application to a cloud platform (AWS, Heroku, or Vercel). Use Docker for containerization
D
9. and set up a basic CI/CD pipeline for automated deployment.
Reference Books:
1. Mario Casciaro, Luciano Mammino, “Node.js Design Patterns”, 3rd ed., Packt Publishing, ISBN: 9781803285567,
2022.
2. Andrew Mead, “Learning Node.js Development: Learn Node.js by building real-world applications” Packt Publishing,
ISBN: 9781788626852, 2018.
3. Kristina Chodorow, “MongoDB: The Definitive Guide: Powerful and Scalable Data Storage.,O'Reilly Media, ISBN:
9781491954461, 2019.
4. Brian Mulloy,”Web API Design: Crafting Interfaces that Developers Love”API Academy (Apigee), ASIN:
B00IUVTY1A, 2013.
5. Full-Stack React Projects: Modern web development using React 16, Node, Express, and MongoDB”, Packt
Publishing, ISBN: 9781788835537, 2018.
Er esources :
.
1 ode.js Official Docs –https://nodejs.org/en/docs/
N
2. Express.js Guide –https://expressjs.com/
3. MongoDB Docs –https://www.mongodb.com/docs/
4. PostgreSQL Documentation –https://www.postgresql.org/docs/
5. JWT Authentication Docs –https://jwt.io/introduction/
6. Express Validator Docs – https://express-validator.github.io/docs/
7. Socket.io Documentation –https://socket.io/docs/
8. Multer (File Uploads) Docs –https://github.com/expressjs/multer
9. Docker Documentation – https://docs.docker.com/
10. CI/CD with GitHub Actions –https://docs.github.com/en/actions
Vision:
Mission:
● T
o develop technically competent and innovative computer science engineers
with in-depth knowledge of Artificial Intelligence and Machine Learning.
● T
o build ethically responsible, knowledgeable and skilled engineers to serve
the needs of industry and society at large.
● T
o provide a conducive environment and opportunities for holistic
development of students.