TY Syllabus 2025-26 (Regulations 2023)
TY Syllabus 2025-26 (Regulations 2023)
Institute Vision
To be one of the top 100 Engineering Institutes of India in coming five years by offering exemplarily
Ethical, Sustainable and Value-Added Quality Education through a matching ecosystem for building
successful careers.
Institute Mission
1. Serving the needs of the society at large through establishment of a state-of-art Engineering
Institute.
2. Imparting right Attitude, Skills, Knowledge for self-sustenance through Quality Education.
3. Creating globally competent and Sensible engineers, researchers and entrepreneurs with an ability
to think and act independently in demanding situations.
EOMS Policy
“We at PCCOE are committed to offer exemplarily Ethical, Sustainable and Value Added Quality
Education to satisfy the applicable requirements, needs and expectations of the Students and
Stakeholders.
We shall strive for technical development of students by creating globally competent and sensible
engineers, researchers, and entrepreneurs through Quality Education.
We are committed for Institute’s social responsibilities and managing Intellectual property.
We shall achieve this by establishing and strengthening state-of-the-art Engineering Institute through
continual improvement in effective implementation of Educational Organizations Management
Systems (EOMS).”
Department of Computer Engineering
INDEX
CURRICULUM FRAMEWORK
(Regulations 2023)
LIST OF ABBREVIATIONS
Page | 1
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Page | 2
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Page | 3
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Page | 4
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Curriculum Structure
Third Year B. Tech.
Computer Engineering
Page | 5
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
CURRICULUM STRUCTURE
Third Year B.Tech. (Computer Engineering) Semester – V
Third Year Computer Engineering (Regulations 2023)
(With effect from Academic Year 2025-26)
Semester V
Teaching Scheme
Credit Scheme Evaluation Scheme and Marks
(Hours/Week)
Course
Course Name FA
Code
L P T Total L P T O* FA FA SA TW PR OR Total
1 2
Theory of
BCE25PC01 2 - 1 3 2 - 1 1 20 20 60 - - - 100
Computation
Technical
BCE25PC04 - 1 - 1 - 2 - 1 - - - 50 - - 50
Seminar
Open Elective
2 - - 2 2 - - - 10 10 30 - - - 50
Course IV
Multidisciplinary
3 - - 3 3 - - - 20 20 60 - - - 100
Minor III
Multidisciplinary
Minor III - 1 - 1 - 2 - - - - - 50 - - 50
Laboratory
Theory cum Practical
Note: -
1. Exit Policy: Available as a separate document
2. Students must ensure that the same course(Contents) is not selected under multiple categories (Core Courses, Professional
Electives, Open Electives, or Multidisciplinary Minors (MDMS), or any other Course where choices are given. Each course can
only be credited once towards the degree requirements.
Page | 6
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Semester - V
List of Courses – Programme Elective Course I
Page | 7
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Note: -
3. Exit Policy: Available as a separate document
4. Students must ensure that the same course (Contents) is not selected under multiple categories (Core Courses, Professional
Electives, Open Electives, or Multidisciplinary Minors (MDMS), or any other Course where choices are given. Each course can
only be credited once towards the degree requirements.
Page | 8
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Semester - VI
Deep Learning
BCE26PE01-02
Deep Learning Lab Choose any one
Blockchain Technology
BCE26PE03-04
Blockchain Technology Lab
UI and UX Design
BCE26PE05-06
UI and UX Design Lab
Cloud Computing
BCE26PE07-08
Cloud Computing Lab Choose any one
Cyber Security and Forensics
BCE26PE09-10
Cyber Security and Forensics Lab
Image and Video Processing
BCE26PE11-12
Image and Video Processing Lab
Page | 9
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Course Syllabus
Semester V
Page | 10
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
3 2 - 1 1 20 20 60 100
Prior knowledge of discrete mathematics is essential
Course Objectives:
1.
To study abstract computing models.
2.
To model problems mathematically using basic types of Automata.
3.
To develop skills of solving problems efficiently.
4.
To learn Grammar, Push Down Automata, Turing Machine for language processing and
algorithm design.
Course Outcomes:
After learning the course, the students will be able to:
1. Analyze and design basic mathematical model of computation like deterministic
and non- deterministic finite automata.
2. Design the Regular Expression for defining the search patterns.
3. Design formal languages using Context Free Grammar
4. Construct Push Down Automata for solving problems
5. Design model of computation using Turing Machine
Detailed Syllabus
Page | 11
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Self-Study
Decidable and Undecidable Problems, Traveling salesman problem, Post 6*
Correspondence Problem, research paper reading.
Text Books:
1. John E. Hopcroft, Rajeev Motwani, Jeffrey D.Ullman, “Introduction to Automata Theory Languages
and Computation”, Pearson,3rd Edition, 2008, ISBN-13: 978-8131720479.
2. Vivek Kulkarni “Theory of Computation”, Oxford University Press, 2013, ISBN-13 978-0198084587.
Reference Books:
1. H.L. Lewis, Christos H. Papadimitriou, “Elements of the Theory of Computation”, Pearson, 2nd
edition,1997, ISBN- 13: 978-0132624787.
2. John Martin, “Introduction to Languages and The Theory of Computation”, 2nd Edition, McGraw-
Hill Education, 4th edition, 2010, ISBN-13: 978-0073191461.
Online Sources:
1. NPTEL Theory of Computation , https://nptel.ac.in/courses/106/106/106106049/
2. Coursera - Automata Theory by Stanford (Free audit option) https://www.coursera.org/learn/automata
3. MITOpenCourseWare Automata, Computability, and Complexity https://ocw.mit.edu/courses/electrical-
engineering-and-computer-science/6-045j-automata-computability-and-complexity-spring-2011/
Page | 12
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Credit FA
Lecture Practical Tutorial Other SA TW OR PR Total
FA1 FA2
3 2 2 - 1 10 10 30 50 - - 100
Prior knowledge of basic mathematics is essential.
Course Objectives:
This course aims at enabling students to:
1. Fundamental concepts and types of machine learning algorithms.
2. Use data preprocessing techniques essential for preparing datasets.
3. Applying appropriate machine learning algorithms to real-world problems.
4. Evaluate machine learning models using relevant performance metrics.
Course Outcomes:
After learning the course, the students will be able to:
1. Examine data preprocessing techniques for effective data cleaning.
2. Evaluate the effectiveness of linear regression models.
3. Assess the performance of various classification algorithms.
4. Investigate the clustering algorithms for performance insights.
1. Continuous assessment of laboratory work is done based on overall performance and lab assignments
performance of students. Each lab assignment assessment will assign marks based on parameters with
appropriate weightage.
2. 50% weightage of term work is based on suggested parameters for lab assignment includes-
understanding and participation, timely completion, punctuality and neatness, overall professional
behavior.
3. 50% weightage of term work is based on internal oral/practical examination.
Page | 13
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Self-Study
Feature Engineering: Handling different types of data, feature transformation:
6*
normalization and standardization. Density Based clustering (DBSCAN), research
paper reading.
Text Books:
1. Giuseppe Bonaccorso, “Machine Learning Algorithms”, Packt Publishing Ltd. 2017, ISBN 978-1-78588-
962- 2
2. Jiawei Han, Micheline Kamber, “Data mining: concepts and techniques", Morgan Kaufmann Publisher
2023, fourth edition, ISBN 13: 978-1-55860-901-3.
Reference Books:
1. Ethem Alpaydin, “Introduction to Machine Learning”, PHI second edition-2021, ISBN: 978-0-262-01243-0
2. Tom Mitchell, “Machine Learning” McGraw Hill Publication 1997, ISBN: 0070428077
3. Aurélien Géron, “Hands-On Machine Learning with Scikit-Learn and TensorFlow”, O'Reilly Media, Inc.
publisher 2017, ISBN: 9781491962299
Online Sources:
1. https://balasahebtarle.files.wordpress.com/2020/01/machine-learning-algorithms_text-book.pdf
2. https://www.cin.ufpe.br/~cavmj/Machine%20-%20Learning%20-%20Tom%20Mitchell.pdf
3. http://scikit-learn.org/stable/datasets/
4. https://scikit-learn.org/stable/modules/model_evaluation.html
5. https://www.kaggle.com/datasets
Page | 14
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Credit FA
Lecture Practical Tutorial Other SA TW OR PR Total
FA1 FA2
3 2 2 - 1 10 10 30 50 - - 100
Prior knowledge of Digital Electronics and Computer Organization is essential.
Course Objectives:
This course aims at enabling students:
1. To understand the fundamental concepts of networking standards, protocols and technologies.
2. To learn the role of protocols at various layers in the protocol stacks.
3. To acquire knowledge of standard algorithms and protocols employed to provide confidentiality,
integrity and authenticity.
4. To aware students with various algorithms of Cryptography.
Course Outcomes:
After learning the course, the students will be able to:
1. Apply concepts of a network, its models, architectures for network design with data link layer services.
2. Determine the services and protocols used at upper layers of TCP/IP model.
3. Identify various security challenges, threats, attacks, and apply knowledge of security models to
prevent attacks.
4. Use Cryptographic Techniques to encrypt and decrypt the messages.
Detailed Syllabus
Basic of Networking:
Physical Layer:
Introduction, LAN, MAN, WAN, PAN; Physical Mediums, Networking Devices:
Bridge, Switch, Router and Access Point; Concept of Network Topologies, OSI 8
I Model; TCP/IP Model; addressing, Network Architectures: Peer-to-Peer, Client-
Server.
Data Link Layer:
Logical Link Control: Framing ; Error Control: Parity Bits and CRC; Flow Control
Protocols: Simplex, Stop and Wait, Sliding Window protocol
Page | 15
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
TCP/IP Model:
Network Layer: IPv4 and IPv6 protocols; Routing Algorithms: RIP, OSPF, BGP.
Transport Layer: Socket; Structure of TCP and UDP; Flow Control; Congestion 8
II
Control
Application Layer: Protocols: HTTP (Overview, Persistent and Non-Persistent,
Message Format, Cookies, Caches); Overview of SMTP, DNS, DHCP, FTP, Telnet
Security Basics:
Computer Security Concepts - Confidentiality, Integrity & Availability (CIA), The
challenges of Security, Threats, Attacks, Operational Model of Security;
Basics: Symmetric and Asymmetric Cipher Model; Cryptography; Cryptanalysis and 7
III
Brute-Force Attack
Classical Encryption Techniques - Substitution Techniques: Caesar Cipher, Play
fair Cipher
Symmetric Cipher: Stream ciphers and Block Ciphers; Feistel Cipher Structure, Data
Encryption Standard (DES): DES Encryption; DES Decryption; DES Example; 7
IV Strength of DES,
Asymmetric Cipher: Public-Key Cryptosystems, RSA Algorithm, Diffie-Hellman
Key Exchange Algorithm
Self-Learning
Media Access Control: MAC Address; Overview of Multiple Access Protocols,
4*
Basics of Ethernet, Monoalphabetic Ciphers, Polyalphabetic Ciphers, Double DES
and triple DES (with 2 & 3 keys), research paper reading.
Text Books:
1. Andrew S. Tanenbaum, “Computer Networks”, Pearson Education India,6th Edition, 2021 ISBN:
9780136764052, 0136764053.
2. Fourauzan B., "Data Communications and Networking", 5th Edition, Tata McGraw- Hill Publications,
2013 ISBN: 1259064751 · 9781259064753.
3. William Stallings, “Cryptography and network security principles and practices”, Pearson, 6th Edition,
ISBN: 978-93-325-1877-3
4. Atul Kahate, “Cryptography and Network Security”, McGraw Hill Publication, 2nd Edition, 2008, ISBN:
978- 0-07-064823-4
Page | 16
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Reference Books:
1. Kurose, Ross , “Computer Networking a Top-Down Approach Featuring the Internet”, 8/E, 2021, ISBN-
10:0136681557, ISBN-13: 9780136681557, 2021, Pearson.
2. Matthew S. G, “802.11 Wireless Networks”, O„Reilly publications,3rd Edition, 2017, ISBN: 81-7656-992-
5.
3. Eoghan Casey, “Digital Evidence and Computer Crime Forensic Science, Computers and the Internet”,
ELSEVIER, 2011, ISBN 978-0-12-374268-1
4. Bernard Menezes, “Network Security and Cryptography”, Cengage Learning India, 2014, ISBN No.:
8131513491
Online Sources:
1. https://www.javatpoint.com/computer-network-tutorial
2. http://nptel.ac.in/courses/106105081/1
Page | 17
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Credit FA
Lecture Practical Tutorial Other SA TW OR PR Total
FA1 FA2
4 2 4 - 1 10 10 30 50 50 - 150
Prior knowledge of Basic Geometry, Trigonometry, Vectors and Matrices, Data Structures and Algorithms is
essential
Course Objectives:
This course aims at enabling students to:
1. Apply fundamental graphics algorithms such as line, circle drawing, polygon filling, and clipping.
2. study projection, windowing, clipping, and viewports in the context of image display.
3. Apply 2D and 3D geometric transformations using programming tools and graphics libraries.
4. Design interactive visual applications incorporating sprites, scenes, sound, and physics.
Course Outcomes:
After learning the course, the students will be able to:
1. Apply various algorithms for scan conversion to draw the basic geometrical primitives.
2. Apply 2D and 3D transformation operations to graphical objects
3. Apply various viewing, filling and clipping techniques on 2D polygon.
4. Design and develop interactive applications or games using graphics tools and engines.
1. Continuous assessment of laboratory work is done based on overall performance and lab assignments
performance of students. Each lab assignment assessment will assign marks based on parameters with
appropriate weightage.
2. 50% weightage of term work is based on suggested parameters for lab assignment includes- understanding
and participation, timely completion, punctuality and neatness, overall professional behavior.
3. 50% weightage of term work is based on internal oral/practical evaluation.
Detailed Syllabus
Page | 18
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Game Design
Introduction to gaming: Types of games, Different aspects of game design; Different
components in a game; Game engines & Gaming platform.
IV Game Design Steps: Storyboard layout, Object definitions, Animation using Key- 7
frame Specifications, Generation of in between frames, Rendering
OpenGL: Graphics function, OpenGL Interface, primitives and attributes, Control
functions, programming events. (Simple Interaction with the Mouse and Keyboard)
Self-Learning
Game engines & Gaming platform- Unity, Unreal Engine, Godot, Twine, CoCoS 2D.
5
AI Tools for Game Development- Meshy AI, LPC Sprite Generator, Character.ai,
Leonardo.ai, research paper reading.
Lab Assignment:
Game Theme Identification
1. Before starting with the assignments, each student/group must:
2. Choose the type of game: e.g., car racing, obstacle dodger, maze explorer, shooter, puzzle,
etc.
3. Sketch a basic idea of game layout and objectives.
4. Identify key characters/objects needed.
5. Define what can be drawn with lines, circles, polygons, etc.
Page | 19
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
objects.
Design of interaction between the player and the world, optionally using the physics
engine.
Insert audio.
Rendering
Text Books:
1. Donald D. Hearn and Baker, Computer Graphics with OpenGL, 4th Edition, ISBN-13:
9780136053583.
2. Nystrom Robert, Game Programming Patterns, 2014, 3rd edition, Genever Benning, 978-0990582908
Reference Books:
1. David F Rogers, “Procedural elements for Computer Graphics”, Second Edition, Tata Mc Graw Hill,
ISBN 0-07-047371-4
2. F. Hill, “Computer Graphics: Using OpenGL”, Second Edition, Pearson Education, ISBN 81-297-
0181-2
3. Paris Buttfield-Addison et al., Unity Game Development Cookbook: Essentials for Every Game, 1st
Edition, O’Reilly Media, 2019
Online Sources:
1. https://onlinecourses.nptel.ac.in/noc20_cs90/preview
2. https://www.udemy.com/course/unitycourse/?couponCode=IND21PM
3. https://www.udemy.com/course/unreal-engine-5-3d-game-art-fantasy-swords-with-bonus-
vfx/?couponCode=IND21PM
4. https://www.udemy.com/course/unityfpsgame/?couponCode=IND21PM
5. https://www.coursera.org/specializations/game-design
6. https://www.coursera.org/learn/game-development-html-to-unreal-engine-mastery
Page | 20
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Credit FA
Lecture Practical Tutorial Other SA TW OR PR Total
FA1 FA2
4 2 4 - 1 10 10 30 50 50 - 150
Course Objectives:
This course aims at enabling students:
1. To understand the fundamentals, reference architectures, communication models, and enabling technologies of the
Internet of Things (IoT).
2. To apply IoT platform design methodology for modeling system requirements, functionality, and integration.
3. To explore sensor types, development boards, and communication interfaces relevant to IoT applications.
4. To analyze communication protocols and security mechanisms used in IoT systems for ensuring reliable and secure
data exchange.
Course Outcomes:
After learning the course, the students will be able to:
1. Interpret IoT architectures, communication models, enabling technologies, and associated challenges in IoT systems..
2. Apply IoT platform design methodology to define functional, operational, and integration views of IoT systems.
3. Select appropriate sensors, actuators, development boards, and communication interfaces for IoT applications.
4. Analyze IoT communication protocols and security mechanisms to determine suitable strategies for secure and reliable
data transmission.
Detailed Syllabus
Unit Description Duration
(Hrs)
Page | 21
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Sensors and IoT Hardware: Sensor types and categories, Actuators, Development Boards 7
III (Arduino, ESP8266, Raspberry Pi), Basics of Interfacing (GPIO, I2C, SPI)
IoT Protocol Stack: PHY/MAC (BLE, Zigbee, Z-Wave, LoRa), Network (6LoWPAN, RPL),
Application (CoAP, MQTT, XMPP, AMQP), Introduction to Next Generation Networks 8
IV
IoT Security: Types of Attacks, Vulnerabilities in IoT, Key Elements of IoT Security, Security
Model
Self-Study
IoT Security basics: Encryption, Authentication, and Privacy Challenges, Comparing Arduino vs.
6*
Raspberry Pi vs. ESP32 for IoT Projects, Comparison between Cloud, Edge, and Fog Computing
in IoT, Research Paper Reading.
Page | 22
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Page | 23
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Credit FA
Lecture Practical Tutorial Other SA TW OR PR Total
FA1 FA2
4 2 4 - 1 10 10 30 50 50 - 150
Detailed Syllabus
Unit Description Duration
(Hrs)
Data Mining, Need of data mining, Data, Information and Knowledge, Knowledge
Discovery form Data (KDD), Attribute Types: Nominal, Binary, Ordinal and 8
I
Numeric attributes; Data pre-processing: Data Cleaning, Data Integration, Data
transformation, data reduction, Data Discretization, Binning techniques.
Page | 24
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Self-Study
Study of POWER-BI Tool for OLAP operations
Research Paper reading for use of distance measures in different data mining
6*
applications
Research Paper reading for use of data mining techniques in real world applications
2. OLAP operations
Select any suitable dataset from standard repository of data and perform OLAP operations such as Slicing,
Drill-Down, Drill-Up etc. using POWER-BI or any suitable tool.
3. K-Means Clustering
Consider a normalized dataset collected from schools showing details of student performance in two subjects S1
and S2. For clustering of data instances in different groups, apply k-mean clustering with initial centroids as
C1=P1 =Cluster#1 and C2=P8=cluster#2. Answer the following and visualize the clusters using suitable
method. 1. Which cluster does P6 belong to? 2. What is the population of cluster around C2? 3. What is the
updated value of C1 and C2?
Points S1 S2
P1 0.1 0.6
P2 0.15 0.71
P3 0.08 0.9
P4 0.16 0.85
P5 0.2 0.3
P6 0.25 0.5
P7 0.24 0.1
P8 0.3 0.2
Page | 25
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
5. KNN Classification
A dataset collected from hospital showing details of medical test reports with symptom values observed in the
patient’s and medical test either positive or negative.
Write a program to build k-NN classifier models. If k=3, find the class of the point (6, 6).
S1 S2 Test Class
2 4 Negative
4 6 Negative
4 4 Positive
4 2 Negative
6 4 Negative
6 2 Positive
6. WEKA tool
Install WEKA tool and perform different Data Mining operations such as Data Preprocessing, Data filtering,
Classification and clustering in it.
7. Mini Project
Using Data mining concepts covered in the assignments and Data Mining and Warehouse theory course design
and develop an application/Decision Support System for the selected problem statement. Visualize the results
using suitable tools and methods and prepare a report in suitable format.
For Example: Health Care Domain for predicting disease, Shopping mall application for Market Basket
Analysis.
Text Books:
1. Jiawei Han, Micheline Kamber, “Data mining: concepts and techniques", Morgan Kaufmann Publisher
2012, third edition, ISBN 978-0-12-381479-1.
2. 2. G. K. Gupta, “Introduction to Data mining with Case Studies", PHI Learning Private Limited, Delhi
2014, third edition, ISBN-978-81-203-5002-1.
3. 3. William H Inmon, “Building the data Warehouse”, Wiley Publication 2005, fourth edition, ISBN:
978-0-764- 59944-6.
Reference Books:
1. Dunham, M. H., “Data mining: Introductory and advanced topics”, Upper Saddle River, N.J: Pearson
education/Prentice Hall 2003.
2. Ralph Kimball, Margy Ross, “The Data Warehouse Toolkit”, 3rd Edition, Wiley 2013, ISBN-13: 978-
11185308 01.
3. Ian H. Witten and Eibe Frank, “Data Mining: Practical Machine Learning Tools and Techniques”,
Second Edition, Morgan Kaufmann Publishers 2005, ISBN: 0-12-088407-0
4. Giuseppe Bonaccorso, “Machine Learning Algorithms”, Packt Publishing Ltd. 2017, ISBN 978-1-
78588-962- 2
Online Sources:
1. http://myweb.sabanciuniv.edu/rdehkharghani/files/2016/02/The-Morgan-Kaufmann-Series in-Data-
Management-Systems-Jiawei-Han-Micheline-Kamber-Jian-Pei-Data-Mining. Concepts-and-
Techniques-3rd-Edition-Morgan-Kaufmann-2011.pdf
2. http://www.academia.dk/BiologiskAntropologi/Epidemiologi/DataMining/Witten_and_Frank
_DataMining_ Weka_2nd_Ed_2005.pdf
3. http://scikit-learn.org/stable/datasets/
4. https://scikit-learn.org/stable/modules/model_evaluation.html
5. https://www.kaggle.com/datasets
Page | 26
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
1 - 2 - - 25 - - 25
Course Objectives:
This course aims at enabling students to:
1. Explore and analyze recent trends, technologies, and research advancements in their area of interest
2. Cultivate the skill of conducting systematic literature surveys using authentic and credible research sources
3. Enhance critical thinking and analytical skills by evaluating existing research work, identifying research
gaps, and proposing ideas.
4. Solve potential research problems, laying a foundation for final year projects or publications.
5. Improve students' technical communication, including writing seminar reports and delivering effective oral
presentations.
Course Outcomes:
After learning the course, the students will be able to:
1. Conduct a detailed literature review using research databases and analyze the state-of-the-art techniques and
methodologies.
2. Compare and critically evaluate existing solutions, technologies, or frameworks.
3. Define a research problem based on recent developments and gaps in the literature.
4. Prepare a comprehensive technical report that adheres to academic writing standards
Guidelines for Students:
1. Seminar teams: 3-4 students can form a team within the same or different discipline and their area of interest
is to be registered with seminar Coordinator.
2. Selection of Seminar Topic:
3. a. Students shall identify the area or topics in recent trends and developments in consultation with seminar
guides or industry or any research organization.
4. Guide Allotment:
5. a. Considering registered teams’ area of interest/domain and expertise of guide, the Seminar coordinator in
consultation with HOD allots Seminar guides.
6. b. Guide should be allotted from the same program.In case of interdisciplinary Seminar, along with the
guide from same program, co-guide should be allotted from the other program
7. Teams in consultation with guides will prepare Seminar Synopsis.
8. Each student/ group shall maintain a seminar diary and the guide shall monitor the progress of the seminar
work on a weekly basis and shall approve the entries in the seminar diary during the weekly meeting with
the student.
9. Seminar Review:
10. The Seminar coordinator with the Head of the department shall constitute a review committee comprising of
domain experts and senior faculty members.
11. The review committee will approve the Seminar group and title. Discussion / presentation may be arranged
covering topics listed in the synopsis.
12. The seminar Review committee will evaluate the timely progress of the projects.
13. Students with group members are expected to appear for minimum three reviews as per the seminar
calendar.
14. Attendance for all the reviews is mandatory.
15. Report should be prepared as per the template provided by the department. Seminar reports shall be
submitted in softcopy form/ Hard bound reports as per the decision of the department. In case of
Interdisciplinary Seminar, students must submit a Completion certificate with the signature of Co-Guide
Page | 27
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Page | 28
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
FA
Credit
Lecture Practical Tutorial Other SA Total
FA1 FA2
2 2 - - - 10 10 30 50
Course Objectives:
This course aims at enabling students:
1. To introduce the fundamental concepts and various types of digital marketing.
2. To familiarize students with different social media advertising platforms and their role in effective digital
marketing campaigns.
3. To equip students with essential skills to implement Search Engine Optimization (SEO) technique.
4. To provide an understanding of E-commerce principles and business models, and to develop the ability to
apply E-marketing techniques in digital environments.
Course Outcomes:
After learning the course, the students will be able to:
1. Understand the different types of Digital Marketing.
2. Learn social media advertising platforms for digital marketing campaigns.
3. Apply the fundamental principles and concepts of Search Engine Optimization (SEO).
4. Apply e-commerce and e-marketing concepts in Business Models.
Detailed Syllabus
Page | 29
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Total 30
Text Books:
1. Damian Ryan& Calvin Jones . Understanding DIGITAL Marketing
2. Vandana Ahuja(2015), Digital Marketing. Oxford University Press, New Delhi
3. Neetu Kapoor, Concept Building Approach to Digital Marketing, Cengage, 2nd Edition.
4. The digital marketing Handbook, A step by step guide, Mohit Pawar,2015 Edition.
5. Joseph P. T., E - Commerce – An Indian Perspective, PHI publication, 6th Edition
Reference Books:
1. George Pain(2019). Marketing Automation and Online Marketing: Automate Your Business through
Marketing Best Practices such as Email Marketing and Search Engine Optimization
2. Barker, M., Barker, D., & Bormann, N. (2016), Social Media Marketing: A Strategic Approach, Boston,
MA : Cengage Learning.
3. Tuten, T., Solomon M., Social Media Marketing, SAGE, 2nd Edition.
4. Ian Dodson, The art of Digital Marketing, 2016, Wiley, 978-1-119-26570-2.
Online Sources:
1. https://www.coursera.org/learn/foundations-of-digital-marketing-and-e-commerce
2. https://open.umn.edu/opentextbooks/textbooks/1602
3. https://www.coursera.org/learn/social-media-marketing-introduction
4. https://www.coursera.org/specializations/social-media-marketing
5. https://www.coursera.org/projects/create-your-ecommerce-store-with-shopify
Page | 30
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Course: Data Security Resiliency and Governance (offered by Computer Code: BCE25OE02
Engineering)
FA
Credit
Lecture Practical Tutorial Other SA Total
FA1 FA2
2 2 - - - 10 10 30 50
Prior knowledge of Database Management System is essential.
Course Objectives:
This course aims at enabling students:
1. To get acquainted with the high-level phases of data life cycle management.
2. To acquire knowledge about the various aspects of data storage, data availability, data protection.
3. To gain exposure to various solutions/reference architectures for various use-cases.
4. To understand the technical capabilities and business benefits of data protection.
Course Outcomes:
After learning the course, the students will be able to:
1. Understand the data management world, challenges, best practices and compare various concepts and
technologies for enabling data storage and high availability.
2. Describe the various concepts related to data protection.
3. Illustrate various types of data threats and approaches to ensure data center security.
4. Identify different standards for compliance and governance of data and discuss various approaches for
designing data enterprise applications
Detailed Syllabus
Total 30
Text Books:
1. Storage Networks: The complete Reference. Robert Spalding
2. Vic (J.R.) Winkler, “Securing The Cloud: Cloud Computing Security Techniques and Tactics”
(Syngress/Elsevier) 2011
Page | 32
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Reference Books:
1. Martin Kleppmann, Designing Data-Intensive Applications , O’Reilly, 17th Release 2021
2. TBD: provide more online material details and books (This can include some publicly available white-
paper, solution guides etc.)
Hands On/Demos
• Demonstrate the use of Veritas InfoScale Logical Volume Manager for cover storage management aspects.
• Demonstrate Veritas InfoScale CFT on AWS can help create 2-node cluster for some hand-on
• Demonstrate the use of Veritas Backup Exec for data protection related hands-on. Concepts like backup
storage targets, deduplication, retention periods, backup selections, data protection SLAs, students can relate
to.
• Demonstrate using AWS/Azure console, we can demonstrate some aspects on data security aspects in Cloud
Computes.
• Demonstrate data governance and archiving basic use cases using Veritas Archiving Solution
• Application Unit, data will be provided with details.
Online Sources:
1. https://www.enterprisestorageforum.com/storage-hardware/storage-virtualization.html
2. https://searchstorage.techtarget.com/definition/data-life-cycle-management
3. https://www.hitechnectar.com/blogs/three-goals-data-lifecycle-management/
4. https://www.bmc.com/blogs/data-lifecycle-management/
5. https://medium.com/jagoanhosting/what-is-data-lifecycle-management-and-what-phases-would-it-pass-
through-94dbd207ff54
6. https://www.spirion.com/data-lifecycle-management/
7. https://www.bloomberg.com/professional/blog/7-phases-of-a-data-life-cycle/
8. https://www.datacore.com/storage-virtualization/
9. https://www.veritas.com/content/dam/Veritas/docs/solution-overviews/V0907_SB_InfoScale-Software-
Defined-Infrastructure.pdf
10. https://www.veritas.com/solution/digital-compliance
11. https://www.veritas.com/solution/data-protection
12. https://www.veritas.com/gdpr
Page | 33
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Duration
Unit Description
(Hrs)
Fundamentals of Remote Sensing:
Introduction to Remote Sensing: Definition, History, and Applications
I Electromagnetic Radiation (EMR): Spectrum, Energy Interactions with Atmosphere and Earth
8
Surface, Remote Sensing Sensors and Platforms: Optical, Microwave, and Hyperspectral Sensors,
Resolution in Remote Sensing: Spatial, Spectral, Temporal, and Radiometric Resolution, Recent
Advances: UAV (Drone) Remote Sensing, AI-based Remote Sensing
Satellite Image Processing and Interpretation:
Types of Remote Sensing Data, Satellite Image Acquisition and Preprocessing Techniques:
II Radiometric and Geometric Corrections, Image Enhancement and Filtering Techniques, Image 8
Classification Methods: Supervised and Unsupervised Approaches, Cloud-based Remote Sensing:
Google Earth Engine and Big Data GIS
Geographic Information System (GIS) Fundamentals:
Introduction to GIS: Definitions, Components, and Functions, Spatial Data Models: Raster vs. Vector
III Data, Topology, GIS Data Sources: Digitization, GPS Data Collection, Open-Source Data, GIS 7
Software and Tools: ArcGIS, QGIS, Python for GIS, Georeferencing, Map Projections, and
Coordinate Systems, Thematic Mapping and Visualization Techniques
GIS Data and Case Studies:
Role of AI & Machine Learning in GIS: Object Detection, Land Cover Classification
IV Real-time GIS and Web-based GIS Technologies, Case Studies: GIS Applications in Urban 7
Planning, Disaster Management, Environmental Monitoring, and Smart Cities
Total 30
Text Books:
1. Bhatta, B. – Remote Sensing and GIS (Oxford University Press, 2011)
2. Lillesand, T., Kiefer, R., & Chipman, J. – Remote Sensing and Image Interpretation (Wiley, 7th Ed., 2015)
3. Remote Sensing & Geographical Information System, M. Anji Reddy, BS Publications, Hyderabad, 4th Edition, 2022
Page | 34
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Reference Books:
1. Textbook on Remote Sensing, C. S. Agarwal and P. K. Garg, Wheeler Publishing House, 2000.
2. Campbell, J. B., & Wynne, R. H. – Introduction to Remote Sensing (Guilford Press, 5th Ed., 2011)
3. Chang, K. – Introduction to Geographic Information Systems (McGraw Hill, 9th Ed., 2019)
Online Sources:
1. https://onlinecourses.nptel.ac.in/noc22 ce84/preview
2. https://onlinecourses.nptel.ac.in/noc23_ce52/preview
3. https://onlinecourses.nptel.ac.in/noc22_ce26/preview
4. https://elearn.nptel.ac.in/shop/nptel/remote-sensing-and-gis/
Page | 35
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
02 02 - - 10 10 30 50
Prior knowledge of Electronics and electrical engineering, Basic programming concepts is essential.
Course Objectives:
1. Equip students with a comprehensive understanding of ADAS technologies.
2. Enable students to evaluate and apply sensor technologies.
3. Foster proficiency in integrating embedded systems and real-time data processing.
4. Prepare students to design and implement testing strategies for ADAS
Course Outcomes:
After learning the course, the students should be able to:
1. Analyze the role of ADAS in vehicle safety and automation.
2. Evaluate sensor technologies and sensor fusion methods for ADAS functionality.
3. Apply embedded system concepts and real-time processing in ADAS.
4. Create testing strategies for ADAS using V2X communication.
Detailed Syllabus:
Duration
Unit Description
(Hrs)
Overview of ADAS and Core Functionalities:
Introduction to ADAS, importance of ADAS in vehicle safety, ADAS levels of
I automation, sensor technologies in ADAS, lane-keeping assist, adaptive cruise 7
control, automatic emergency braking, collision avoidance, parking assist, and traffic
sign recognition.
Sensor Technologies and Sensor Fusion in ADAS:
Types of sensors used in ADAS, principles of sensor operation, sensor fusion for
II 8
enhanced ADAS functionality, challenges of sensor calibration, sensor performance
in various conditions, sensor integration with vehicle control systems.
Embedded Systems and Real-Time Data Processing in ADAS:
Role of embedded systems in ADAS, microcontroller architectures for ADAS, real-
III time operating systems for data processing, system integration and communication 7
between ECUs, decision-making algorithms, embedded software for ADAS, fault
detection and self-diagnostics in ADAS systems.
Vehicle-to-Everything (V2X) Communication and Testing ADAS:
Introduction to V2X communication (Vehicle-to-Vehicle, Vehicle-to-Infrastructure,
IV Vehicle-to-Pedestrian), V2X communication protocols, integration of V2X with 8
ADAS, testing methodologies for ADAS, validation of sensor fusion algorithms,
ethical concerns, regulatory standards for ADAS.
Total 30
Text Books:
1. Hussein T. Mouftah, Melike Erol-Kantarci, and Mubashir Husain Rehmani, "Connected and Autonomous
Vehicles in Smart Cities", CRC Press, 1st Edition, 2020.
2. Claire Vishik, Simon Winberg, and Axel Sikora, "Cybersecurity for Connected and Automated Vehicles",
Artech House, 1st Edition, 2021.
3. Andreas Herrmann, Walter Brenner, and Rupert Stadler, "Autonomous Driving: How the Driverless
Revolution Will Change the World", Emerald Publishing, 1st Edition, 2018.
Page | 36
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Reference Books:
1. Burkhard Huhnke, Markus Maurer, and Christoph Stiller, "Handbook of Driver Assistance Systems: Basic
Information, Components and Systems for Active Safety and Comfort", Springer, 1st Edition, 2016.
2. Ramiro Liscano, Juan Carlos Garcia, and Miguel Angel Sotelo, "Advanced Driver Assistance Systems:
Fundamentals, Applications, and Advances", CRC Press, 1st Edition, 2021.
3. Wolfgang Runge, "Autonomous Driving: Technical, Legal and Social Aspects", Springer, 1st Edition, 2016.
Page | 37
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Course Outcomes:
After learning the course, the students should be able to:
1. Understand fundamental psychological concepts and their engineering applications.
2. Understand the theories of cognitive works
3. Apply psychological principles to improve teamwork and leadership.
4. Integrate human-centered approaches in engineering design and problem-solving.
Detailed Syllabus:
Unit Duration
Description
(Hrs)
Introduction to Engineering Psychology
History of Engineering Psychology, Methods of Engineering Psychology
I 08
Perspective on Engineering Psychology-Human-Centric Design, Balance in Cognitive
Load, Ethical & Sustainable Technology, Holistic Decision-Making:
Design of Cognitive Work-1
Attention Vigilance and Fatigue
Information Processing
Training and Automaticity
II 08
Stress and Workload
Displays, Monitors, and Screens
Usability
Teams and Performance
Design of Cognitive Work-2
Situation Awareness
III Emotion, Motivation, and Boredom 07
Decision-Making and Expertise
Language and Artificial Intelligence
Importance of EI for engineering professionals
Components of EI (as per Goleman's Model)
Daniel Goleman’s Model (Five components: Self-awareness, Self-regulation,
Motivation, Empathy, Social skills)
IV Role of EI in team collaboration, leadership, and conflict resolution 07
Applications of EI in decision-making and problem-solving
Examples of high-EI engineering leaders
Developing Emotional Intelligence- Techniques for enhancing self-awareness and
empathy, Managing emotions under stress
Total 30
Text Books:
1. Elliott, L. J. (2021). Engineering psychology. Penn State University Libraries.
https://doi.org/10.26209/engin-psych
Page | 38
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
2. D. Goleman, Emotional Intelligence: Why It Can Matter More Than IQ. New York, NY, USA: Bantam
Books, 1995.
Reference Books:
1. Baron, R. A., & Branscombe, N. R. Psychology (13th Edition). Pearson.Nagraj, Vyavhar Darshan (The
Conduct Perspective)
2. Schultz, D. P., & Schultz, S. E. Psychology and Work TodayNagraj, Jeevan Vidya: Ek Parichay
3. R.R. Gaur, R. Sangal, G.P. Bagaria, A Foundation Course in Human Values and Professional Ethics
Page | 39
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Credit FA
Lecture Practical Tutorial Other SA Total
FA1 FA2
2 2 - - - 10 10 30 50
Prior knowledge of Basic knowledge of Engineering Physics, Mechanics and Materials Engineering is
essential.
Course Objectives:
This course aims at enabling the students to
1. To introduce students to the fundamental principles of UAV systems, including types, components, flight
dynamics, materials and manufacturing.
2. To equip students with the fundamental knowledge for designing lightweight and smart UAV.
Course Outcomes:
After learning the course, the students will be able to:
1. Describe the classification, anatomy, and flight principles of various UAV systems used in different
applications.
2. Select appropriate materials and explain relevant manufacturing techniques for UAV structural components.
3. Investigate UAV airframe design principles to develop structural configurations by analyzing aerodynamic
loads and stress distribution
4. Explain the role of AI, ML, IoT, and cyber security in enhancing UAV intelligence, connectivity, and real-
world applications.
Detailed Syllabus
Total 30
Text Books:
1. Garg, P. K. (2021). Unmanned aerial vehicles: An introduction.
2. Sebbane, Y. B. (2022). A first course in aerial robots and drones. CRC Press.
3. Gundlach, J. (2014). Designing unmanned aircraft systems. Reston: American Institute of Aeronautics &
Astronautics.
Reference Books
1. Yang, L. J., & Esakki, B. (2021). Flapping Wing Vehicles: Numerical and Experimental Approach. CRC
Press.
2. Barnhart, R. K., Marshall, D. M., & Shappee, E. (Eds.). (2021). Introduction to unmanned aircraft systems.
Crc Press.
3. Austin, R. (2011). Unmanned aircraft systems: UAVS design, development and deployment. John Wiley &
Sons.
Online Sources:
1. https://archive.nptel.ac.in/courses/101/104/101104073/
2. https://onlinecourses.swayam2.ac.in/ntr24_ed12/preview
Page | 41
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Industrial Engineering
(Open Elective –IV offered by Mechanical department)
Course: Code : BME25OE02
Applicable to E&Tc, Comp, Civil, IT, CSE (AIML), Computer
regional
Credit FA
Lecture Practical Tutorial Other SA Total
FA1 FA2
2 2 - - - 10 10 30 50
Prior knowledge of Basic manufacturing processes, Basic mechanical components is essential
Course Objectives:
This course aims at enabling the students to
1. To introduce the concepts, principles and framework of contents of Industrial Engineering.
2. To acquaint the students with various productivity enhancement techniques.
3. To acquaint the students with different aspects of Production Planning and Control and Facility Design.
4. To introduce the concepts of various cost accounting and financial management practices as applied in
industries.
Course Outcomes:
After learning the course students will be able to-
1. Apply principles of management and evaluate productivity of an organization/Scenario.
2. Determine work content and standard time using different methods of work measurement.
3. Apply/use different techniques / concepts of production planning and control.
4. Analyze the strategic and operational aspects of plant location and layout, apply assembly line balancing
techniques, and inventory control models
Detailed Syllabus
Work Study
Definition, objective and scope of work-study, Human factors in work-study. Work
II
Measurements: Definition, objectives and uses, Work measurement techniques. 8
Method Study: Definition, objective and scope of method study, work content,
activity recording and exam aids, micro motion study. Time Study: Definition, time
study equipment, selection of job, steps in time study.
Page | 42
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Total 30
Text Books:
1. Industrial Engineering and Production Management, M Mahajan, Dhanpat Rai and Co., 2015
2. Industrial Engineering and Production Management, M. Telsang, S. Chand Publication, 2018
Reference books:
1. Introduction to Work Study by ILO, ISBN 978-81-204-1718-2, Oxford & IBH Publishing Company, New
Delhi, Second Indian Adaptation, 2008.
2. Maynard‘s Industrial Engineering Hand Book, H. B. Maynard, K Jell, McGraw Hill Education, 2001
3. Design and Analysis of Lean Production System, R. Askin, Wiley, 2001
4. Most Work Measurement Systems, Zandin K.B., ISBN 0824709535, CRCPress, 2002
5. SAP ERP: Functionality and Technical Configuration, Martin Murry, SAP Press, 2010
6. Motion and time Study design and Measurement of Work, R. Barnes, Wiley, 2009
7. ‘Process Simulation using WITNESS’, R. Al-Aomar, A. Williams, O. M. Uigen, Wiley, 2015
8. Applied Ergonomics, Hand Book, Brien Shakel, Butterworth Scientific, 1988
9. Introduction to Human factor and Ergonomics, R. C. Bridger, McGraw Hill, 2017
10. Human Factor Engineering and Design, M. Sanders and E. McCormick, McGraw Hill, 1992
11. Ergonomics: How to Design for Ease and Efficiency, K. Elbert and H. Kroemer, Prentice Hall, 2018
Online sources
1. https://onlinecourses.nptel.ac.in/noc21_me15/preview
Page | 43
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Credit FA
Lecture Practical Tutorial Other SA Total
FA1 FA2
2 2 - - - 10 10 30 50
Prior knowledge of Statistics is essential.
Course Objectives:
This course aims at enabling the students to
1. To equip students with foundational knowledge of Lean and Six Sigma methodologies, including key tools
such as DMAIC, 7QC tools.
2. To develop students’ ability to apply continuous improvement techniques for effective decision-making and
sustainable operational excellence.
Course Outcomes:
after learning the course students will be able to-
1. Analyze quality-related issues using Cost of Quality and 7QC tools to improve product and process
performance.
2. Analyze data using statistical tools like Pareto charts, histograms, and process capability indices to evaluate
process performance.
3. Apply risk assessment and control tools such as FMEA, control charts to sustain process improvements.
4. Apply the continuous improvement techniques in the industry to improve the process performance.
Detailed Syllabus
Total 30
Page | 44
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Text Books:
1. Six Sigma: A Complete Step-by-Step Guide, Craig Joseph Setter and the Council for Six Sigma
Certification, Harmony Living, LLC, ISBN: 1732592624, 2018.
2. The Six Sigma Handbook: A Complete Guide for Green Belts, Black Belts, and Managers at All
Levels,Thomas Pyzdek, Paul A. Keller, Third Edition, McGraw-Hill, ISBN: 978-0-07-162337-7, 2010.
Reference books:
1. The Six Sigma Way: How to Maximize the Impact of Your Change and Improvement Efforts, Peter S.
Pande, Robert P. Neuman, and Roland Cavanagh, McGraw Hill Professional, ISBN:0071823018, 2014.
Online Sources:
1. https://www.sixsigmacouncil.org/six-sigma-training-material/
2. https://onlinecourses.nptel.ac.in/noc20_mg19/preview
Page | 45
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Credit FA
Lecture Practical Tutorial Other SA Total
FA1 FA2
2 2 - - - 10 10 30 50
Course Objectives:
This course aims at enabling the students to
1. To provide exposure to the students about safety and health provisions, including the need for and
methods of safety training.
2. To create awareness on safety standards in residential, commercial and agricultural applications.
3. To help students to learn about Factory act 1948, Environment act 1986 and rules framed under the act.
4. To describe the chemistry of fire & explosion and select & use appropriate fire-fighting and explosion proof
equipment.
Course Outcomes:
After learning the course students will be able to-
1. Demonstrate the safety, ethical issues, and importance of safety training that may arise from industrial
processes.
2. Identify the safety standards in residential, commercial and agricultural applications
3. List out important legislations related to Health, Safety and Environment
4. Select a suitable method for prevention of fire and explosion
Detailed Syllabus
Page | 46
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Total 30
Reference books:
1. Philip E. Hagan, John F. Montgomery, James T. O‘reilly ―Accident Prevention Manual for Business and
Industry: Administration and Programs‖, 14th Edition, National Safety Council, Illinois, Chicago, 2015.
2. Heinrich H.W. ―Industrial Accident Prevention‖ McGraw-Hill Company, New York, 1980.
3. Krishnan N.V. ―Safety Management in Industry‖ Jaico Publishing House, Bombay, 1997.
Online Sources:
1. https://nptel.ac.in/courses/114106039
Page | 47
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Credit FA
Lecture Practical Tutorial Other SA Total
FA1 FA2
2 2 - - - 10 10 30 50
Course Objectives:
This course aims at enabling the students to
1. To make the learners conversant with various battery chemistries used for Electric Vehicles and impart a
thorough understanding of Lithium-Ion Battery
2. To understand the various battery performance parameters and testing procedures
3. To understand the requirements and functioning of the battery management system
4. To make the learners conversant with battery pack design procedure and Equivalent Circuit Cell Modeling
of Battery
Course Outcomes:
after learning the course students will be able to-
1. Compare various battery chemistries and select a suitable battery for EV application
2. Analyze Li-ion Battery's performance based on various parameters
3. Select BMS for a given battery pack
4. Design a battery pack for a given EV application
Detailed Syllabus
Page | 48
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Total 30
Text Books:
1. Gregory L. Plett, Battery Management Systems, Volume I: Battery Modeling, Artech House, London
2. Gregory L. Plett, Battery Management Systems Volume II, Equivalent-Circuit Methods, Artech House,
London
3. Gianfranco Pistoia, Boryann Liaw (eds.), Behaviour of Lithium-Ion Batteries in Electric Vehicles_ Battery
Health, Performance, Safety, and Cost, Springer International Publication
4. Jiuchun Jiang, Caiping Zhang - Fundamentals and Application of Lithium-ion Batteries in Electric Drive
Vehicles,Wiley
Online Sources:
1. https://www.coursera.org/learn/battery-management-systems
2. https://www.coursera.org/learn/equivalent-circuit-cell-model-simulation?specialization=algorithms-for-
battery-management-systems
Page | 49
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
FA
Lecture Practical Tutorial Other SA Total
FA1 FA2
2 2 - - - 10 10 30 50
Course Objectives:
This course aims at enabling the students to
1. Develop an understanding of ethical principles, professional conduct, and responsibilities in engineering
and artificial intelligence (AI) practices.
2. Adapt the ability to identify and apply ethical frameworks for decision-making in research, AI system
design, intellectual property, and sustainable engineering activities.
3. Create awareness of environmental ethics, sustainability principles, and the societal impacts of engineering
and AI-based technological advancements.
4. Promote a global and culturally inclusive perspective on ethical issues, focusing on regulatory frameworks
and the role of engineers in addressing contemporary challenges related to AI governance and sustainable
development.
Course Outcomes:
After learning the course students will be able to-
1. Understand fundamental ethical principles and professional responsibilities related to engineering, artificial
intelligence (AI), and emerging technologies
2. Apply ethical frameworks and decision-making models to analyze dilemmas involving AI systems, research
practices, intellectual property, and sustainable engineering solutions.
3. Evaluate the environmental and societal impacts of engineering and AI technologies, and promote
sustainable and responsible innovations aligned with ethical standards.
4. Demonstrate awareness of global, cultural, and regulatory perspectives in professional practice, with an
emphasis on ethics in AI governance, sustainability initiatives, and inclusive technological development.
Detailed Syllabus
Page | 50
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Total 30
Text Books:
1. Harris, C. E., Pritchard, M. S., &Rabins, M. J. (2019). Engineering ethics: Concepts and cases. 6th Edition,
Cengage Learning, Inc.
2. Coeckelbergh, M. (2020). AI Ethics (1st ed.). MIT Press.
Reference books:
1. Mike W. Martin and Roland Schinzinger, (2019). Ethics in Engineering, 3rdEdition,Tata McGraw Hill, New
Delhi,
2. Caroline Whitbeck, Ethics in Engineering practice and Research. (2011) 2nd Edition, Cambridge.
3. Virginia Dignum (2019). Responsible Artificial Intelligence: How to Develop and Use AI in a Responsible
Way. Springer.
4. Wendell Wallach and Colin Allen (2008). Moral Machines: Teaching Robots Right From Wrong. Oxford
University Press.
Page | 51
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Course Syllabus
Semester VI
Page | 52
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Credit FA
Lecture Practical Tutorial Other SA TW OR PR Total
FA1 FA2
3 2 2 - - 10 10 30 50 - - 100
Prior knowledge of Computer Organization, Data Structures, basics of Linux commands, and programming is
essential
Course Objectives:
This course aims at enabling students:
1. To introduce the Operating system and process, threads and CPU scheduling
2. To explore inter process communication mechanisms, to introduce the critical-section problem and
solutions.
3. To explore various techniques of allocating memory to processes and explain the concepts of demand
paging, page-replacement algorithms.
4. To describe the details of implementing local file systems and directory structures
Course Outcomes:
After learning the course, the students will be able to:
1. Compare various process scheduling algorithms for a given snapshot of the system.
2. Analyze IPC mechanisms and solutions of process synchronization for critical section problems.
3. Analyze the performance of memory management algorithms for a given problem.
4. Apply disk scheduling policies for a given I/O request sequence with file management concepts
Detailed Syllabus
Page | 53
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Memory management:
Introduction, Contiguous and non-contiguous, Swapping,
III 8
Memory Allocation Strategies, Paging, Segmentation, Virtual Memory:
Background, Demand paging, Page Replacement Policies.
I/O Management
IV Concept of Files, File Allocation Methods, Free -Space Management. Disk 7
Scheduling- FIFO, SSTF, SCAN, C-SCAN.
Self Study
Study the corresponding components and services of contemporary Linux distribution, 6*
research paper reading.
Text Books:
1. 1. Silberschatz, Galvin, Gagne, "Operating System Principles", 10th Edition,2018, Wiley, ISBN 978 – 1 –
118 - 063330
2. Stallings W., "Operating Systems - internals and design principles", 9th Edition - 2018, Pearson, ISBN -
13: 978 – 013 – 467 – 0959
3. H.M. Deitel, P. J. Deitel, D. R. Choffnes, “Operating Systems “, Pearson, 3rd Edition, ISBN 0131828274,
97801318282
Page | 54
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Reference Books:
1. Dhamdhere D., "Systems Programming and Operating Systems", Revised 2nd Edition- 2009, McGraw Hill,
ISBN - 13: 9780074635797
2. Andrew S. Tanenbaum; Modern Operating Systems; Prentice Hall of India Publication; 4th Edition -
2015. ISBN - 13: 978 – 0133 - 591620
Online Sources:
1. https://www.kernel.org/
2. https://github.com/torvalds/linux
3. NPTEL Course: Operating System- by Prof. Sorav Bansal, IIT Delhi
https://archive.nptel.ac.in/courses/106/102/106102132/
3. NPTELCourse : Operating System Fundamentals – by Prof. Santanu Chattopadhyay, IITKhargpur
4. https://archive.nptel.ac.in/courses/106/105/106105214/
Page | 55
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
3 2 2 - 1 10 10 30 50 - - 100
Course Outcomes:
After learning the course, the students will be able to:
1. Analyze the efficiency of algorithms using mathematical techniques to evaluate algorithm performance.
2. Analyze the efficiency of algorithm using either Divide and Conquer or Greedy strategy
3. Apply computational techniques to solve optimization and decision-making problems using either Dynamic
programming or Branch and Bound.
4.Apply Backtracking approach to implement solutions for combinatorial problems.
Guidelines for Laboratory/Term Work Assessment:
Detailed Syllabus
Problem solving and Algorithmic Analysis: Asymptotic notations, lower bound and
upper bound: Best case, worst case, average case analysis, classification of time
I complexities (linear, logarithmic etc)-Growth of function, Recurrences: Formulation 8
and solving recurrence equations using Master Theorem, Introduction: P,NP, NP hard,
NP Complete.
Page | 56
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Divide and Conquer Strategy: Problem subdivision – Divide and Conquer: Binary
search, Quick sort, Integer Arithmetic- Multiplication.
II Greedy strategy: Principle, control abstraction, time analysis of control abstraction, 7
knapsack problem, Job scheduling algorithm with deadlines, Single Source Shortest
Path Dijkstra’s.
Self Study:
Solving recurrence relation using substitution and Tree method.
Implement Selection sort, Insertion sort, Merge Sort, Quick Sort and compare
performance. 6*
Solution and Comparative analysis of one example with all strategies e.g. knapsack
problem, sum of subset problem etc., research paper reading.
1. You are working as a data analyst for a financial institution that handles high-precision transactions
involving large, multi-digit monetary values. Recently, the institution needs to calculate the product of
two exceptionally large numbers (each over 15 digits) representing aggregated transaction amounts for
quarterly reports. Due to the size of these values, traditional multiplication methods are
computationally inefficient. Implement the algorithm to perform high-precision multiplication of these
large integers accurately and efficiently. Test your implementation with multiple large-number pairs to
ensure reliability and precision in financial reporting.
2. Design a greedy algorithm to maximize profit in a warehouse by selecting and transporting items to a
single destination within a given weight limit. Each item has a specified weight and profit. Implement
the algorithm and verify that it maximizes profit while staying within the weight constraint.
3. You find yourself in a labyrinthine dungeon with multiple rooms and connecting passageways. Each
passage has a specific time to travel, and some passages are blocked due to cave-ins. Starting from the
main entrance, you must find the shortest escape routes to every other room in the dungeon. Use
Dijkstra’s algorithm to determine the quickest time required to reach each room from the entrance. If
any room is isolated and unreachable, mark it as -1. Test this with a dungeon of at least 15 rooms and
random travel times for each accessible passage.
4. You are on a treasure hunt and have a map that shows various caves connected by tunnels. Each tunnel
has a different cost to cross, representing difficulty or danger levels. You need to calculate the safest
path between each pair of caves (i.e., the path with the minimum danger). Use the Floyd-Warshall
Page | 57
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
algorithm to determine the safest paths between all pairs of caves, and apply it to a network with at
least 8 caves and randomly assigned danger levels for each tunnel.
5. You are given a set of items, each with a weight and profit, and a maximum weight capacity. Using the
Branch and Bound approach, find the optimal subset of items that maximizes total profit while staying
within the weight limit. Implement and compare FIFO, LIFO, and Least Cost (LC) approaches (any 2)
for this problem.
6. .Implement a backtracking algorithm to solve a Sudoku puzzle. The program should read an
incomplete puzzle grid and output a solution, if one exists. Ensure the program handles edge cases like
unsolvable puzzles, and test it with multiple inputs.
7. Mini Project
Text Books:
1. Parag Himanshu Dave, Himanshu Bhalchandra Dave, “ Design And Analysis of Algorithms”,Pearson
Education, ISBN 81-7758-595-9
2. Gilles Brassard, Paul Bratley, “Fundamentals of Algorithmics”, PHI, ISBN 978-81-203-1131-2
Reference Books:
1. Thomas H Cormen and Charles E.LLeiserson, “Introduction to Algorithms”, The MIT Press; 4th edition,
April 5, 2022, ISBN-13: 978-0262046305
2. Horowitz, Sahani, “Fundamentals of computer Algorithms”, Galgotia. 2Nd Edition, 2008.ISBN 13. 978-
8173716126
Page | 58
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
FA
Credit Lecture Practical Tutorial Other SA TW OR PR Total
FA1 FA2
2 1 2 - - - 25 - 25 - - 50
Prior knowledge of Basic Programming skills, fundamental of Computer Science, understanding of Object-
Oriented Concepts is essential
Course Objectives:
This course aims at enabling students:
1. Understand core software engineering concepts, life-cycle models, and guiding principles.
2. Analyze and select suitable software process models for various development scenarios.
3. Apply requirements engineering techniques to define and document software requirements.
4. Design and model software systems using UML diagrams and develop basic test cases.
Course Outcomes:
After learning the course, the students will be able to:
1. Apply the principles and phases of the Software Development Life Cycle (SDLC) and different
software process models based on their characteristics and suitability for various project scenarios.
2. Apply software engineering principles to analyze problems, classify requirements, and develop basic
requirements engineering artifacts.
3. Apply software design principles and effectively use UML modeling techniques to represent system
functionality, structure, and behavior through various diagrams
Guidelines for Laboratory/Term Work Assessment:
1. Continuous assessment of laboratory work is done based on overall performance and lab
assignments performance of students. Each lab assignment assessment will assign marks based on
parameters with appropriate weightage.
2. 50% weightage of term work is based on suggested parameters for lab assignment includes-
contents, requirement understanding, participation, timely completion, punctuality and neatness,
overall professional behavior.
3. 50% weightage of term work is based on internal oral/practical examination.
Page | 59
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Self-Study
Waterfall with Feedback-Incremental Process Model, Spiral Process Model, Review
and summarize all the Process Models, Requirements modeling strategies and
6*
different approaches for organizing and structuring requirements, validating
Requirements-Requirements Analysis-Requirements Modeling Strategies, Study of a
testing tool, AI tool for software development, research paper reading.
1. Identify the Application based case study (Hospital management, AI-Powered Healthcare App for Chronic
Disease Management, Logistics management & Optimization, Continuous Risk Assessment and other
applications)
● Identify the problem statement, scope, objective
● Identify the stakeholders
● Identify domain
2. Based on above problem statement:
● Identify the initial(broadly) requirement. (In detail requirement identification will be in lab 4)
● Identify and Compare the Process Models for selection of appropriate process models for software
development.
3. Introduction to UML: Modelling Concepts and Diagrams, Use Case Diagram.
4. Elaborate the functional requirement as per the Use case scenario template.
5. Prepare SRS Document
6. For given case study prepare the
● UML diagrams: Class Diagram
● Activity Diagram, Sequence Diagram
● Package and deployment diagram
7. Prepare Test case report
Text Books:
1. Roger S Pressman, "Software Engineering – A Practitioner‟s Approach", Pearson Education, 8th Edition,
2019.
2. Ian Sommerville, "Software Engineering", 9th edition, 2011.
3. Unified Modeling Language User Guide, The (2nd Edition) (Addison-Wesley Object Technology Series),
May 2005.
Reference Books:
1. Carlo Ghezzi, "Fundamentals of Software Engineering", Prentice Hall India, ISBN 10: 0133056996, 2002.
2. Rajib Mall, "Fundamentals of Software Engineering", Prentice Hall India, ISBN 13: 978-8120348981,
2014.
3. Pankaj Jalote, "An Integrated Approach to Software Engineering", Springer, ISBN 13: 9788173192715,
2010.
Page | 60
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Online Sources:
1. https://staruml.io/
2. https://www.lucidchart.com/blog/types-of-UML-diagrams
Page | 61
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Credit FA
Lecture Practical Tutorial Other SA Total
FA1 FA2
2 2 - - 1 10 10 30 50
Prior knowledge of Machine Learning is essential.
Course Objectives:
This course aims at enabling students:
1. Learn fundamental concepts of artificial neural network
2. Introduce neural network architecture and its training
3. Learn fundamental concepts of convolution neural network
4. Understand the Recurrent neural network
5. Learn concepts of autoencoders
Course Outcomes:
After learning the course, the students will be able to:
1. Articulate the fundamental concepts of deep learning.
2. Apply convolutional neural networks for image classification tasks using visual features
3. Analyze the working principles and architectures of sequence models such as RNN, LSTM, and GRU
for processing sequential data.
4. Generate the synthetic data using generative models and process language data by using sequence-to-
sequence models
Detailed Syllabus
Page | 62
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Self-Study:
Explainable AI methods like LIME, GRADCAM, SHAP, Integrated Gradients, 6*
Agentic AI, research paper reading.
Text Books:
1. Ian Goodfellow Yoshua Bengio Aaron Courville, Deep Learning, MIT Press, 2017.
2. Nikhil Ketkar (Author), Jojo Moolayil, Deep Learning with Python: Learn Best Practices of Deep
Learning Models with PyTorch, Paperback, 2021
3. Aggarwal, Charu C. Neural networks and deep learning. Vol. 10. No. 978. Cham: springer, 2018.
Reference Books:
1. Jacek M. Zurada,"Introduction to artificial neural systems", West Publishing Co., 1992, ISBN: 0-3 14-
93391 - 3.
2. Bishop C. M., "Pattern Recognition and Machine Learning", Springer, 2006, ISBN: 978-0-387-31073-2
3. Applied Deep Learning. A Case-based Approach to Understanding Deep Neural Networks,
4. Umberto Michelucci, Apress, 2018.
5. Deep Learning with Python", Francois Chollet, Manning Publications, 2017.
Online Sources:
1. Deep Learning NPTEL - Prof. Mitesh Khapra-
https://www.youtube.com/playlist?list=PLEAYkSg4uSQ1r-2XrJ_GBzzS6I-f8yfRU
2. Deep Learning For Computer Vision - Prof. Vineeth N Balasubramanian
https://www.youtube.com/playlist?list=PLEAYkSg4uSQ0Q5Z1IYI-0g2cbD-2Rt-I6
3. Stanford CS224N NLP (for more detail in RNN, LSTMs)-
https://www.youtube.com/playlist?list=PLoROMvodv4rMFqRtEuo6SGjY4XbRIVRd4
4. Stanford CS231N CV (for more detail in CNNs)-
https://www.youtube.com/playlist?list=PL3FW7Lu3i5JvHM8ljYj-zLfQRF3EO8sYv
5. https://pytorch.org/
6. Research Paper - Attention Is All You Need- https://arxiv.org/abs/1706.03762
7. Research Paper- fairseq: A Fast, Extensible Toolkit for Sequence Modeling-
https://arxiv.org/abs/1904.01038
Page | 63
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Page | 64
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
CNN for Image Classification- Design and implement a Convolutional Neural Network
(CNN) for image classification on the CIFAR-10 dataset. Tune key hyperparameters such as-
● learning rate,
● optimizer (SGD, Adam, etc.),
● batch size, dropout,
2. ● number of convolutional layers and
● filters
Additionally, apply data augmentation techniques such as flipping and rotation. Each group
must experiment through trial and error to identify the best hyperparameter combination that
maximizes accuracy and minimizes error. [Benchmarking of model performance will be
recorded across the class for comparative evaluation and accordingly marks will be assigned].
Sequence Models for Next word Prediction- Develop and compare RNN, LSTM, and GRU
models for next-word prediction using a small text dataset.
● Preprocess the dataset using tokenization and convert words to integer indices.
● Create input sequences (e.g., 5 words → predict the 6th word).
3.
● Use an embedding layer for input representation.
● Train each model using CrossEntropy loss and Backpropagation Through Time
(BPTT).
● Apply gradient clipping to handle vanishing/exploding gradients.
● Evaluate models based on prediction accuracy.
Basic Autoencoder for Image Reconstruction- Implement a basic autoencoder using the
MNIST dataset for image reconstruction.
GAN for Synthetic Image Generation- Implement a basic GAN using the MNIST dataset
to generate synthetic handwritten digit images.
● Generator should take random noise as input and output 28×28 grayscale images.
5. ● Discriminator should classify input images as real or fake.
● Use Binary Cross-Entropy loss for both networks.
● Train using Adam optimizer and alternate updates between generator and
discriminator.
● Run training for 10–20 epochs.
● Execute the assignment on GPU for faster training. [Kaggle/Google Colab/Lab
GPUs/ Virtual Computing Power]
Mini Project- Design and implement a deep learning-based mini-project to solve a real-world
6.
problem,
Page | 65
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Online Sources:
1. https://www.youtube.com/watch?v=oXlwWbU8l2o
2. https://www.datacamp.com/community/tutorials/exploratory-data-analysis-python
3. https://www.analyticsvidhya.com/blog/2020/02/learn-image-classification-cnn-convolutional-neural-
networks-3- datasets/
Page | 66
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
FA
Credit Lecture Practical Tutorial Other SA Total
FA1 FA2
2 2 - - 1 10 10 30 50
Page | 67
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Self-Study:
BFSI, Blockchain in Governance, Blockchain Solutions like Digiyatra Implemented by 4*
Indian Government, research paper reading.
Total(*Not Included) 30
Text Books:
1. Daniel Drescher, Blockchain Basics, A Non-Technical Introduction in 25 Steps, Publisher-Apress
Berkeley, CA, 978-1-4842-2603-2 Published: 16 March 2017
2. Arshdeep Bahga, Vijay Madisetti, Blockchain Applications: A Hands-on Approach, PublisherArshdeep
Bahga, 2017, ISBN 0996025561, 9780996025560
3. Bikramaditya Singhal, Gautam Dhameja, Priyansu Sekhar Panda, Beginning Blockchain, A Beginner’s
Guide to Building Blockchain Solutions, 2018, 1st edition, Apress, New York.
Reference Books:
1. Tiana Laurence, Blockchain For Dummies, Edition 2, Publisher:John Wiley & Sons, 2019
ISBN:1119555019, 9781119555018
2. Pethuru Raj and Ganesh Chandra Deka. 2018. Blockchain Technology: Platforms, Tools and Use
Cases, Volume 111 (1st. ed.). Academic Press, Inc., USA.
3. Mastering Blockchain: A deep dive into distributed ledgers, consensus protocols, smart contracts,
DApps, cryptocurrencies, Ethereum, and more, 3rd Edition, Imran Bashir, Packt Publishing, 2020,
ISBN:9781839213199,book website: https://www.packtpub.com/product/mastering-blockchain-third-
edition/9781839213199
Online Sources:
1. https://ethereum.org/en/whitepaper/
2. https://www.bitcoin.com/satoshi-archive/whitepaper/
3. “Blockchain - Complete Blockchain Course for Beginners.” https://www.udemy.com/course/learn-
blockchain-technology-and-cryptocurrency-for-beginners
4. Blockchain and its Applications By Prof. Sandip Chakraborty, Prof. Shamik Sural | IIT Kharagpur 12
Week Course on NPTEL Swayam.
5. Hyperledger Tutorials - https://www.hyperledger.org/use/tutorials
6. Ethereum Development Resources - https://ethereum.org/en/developers
Page | 68
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Course Outcomes:
After learning the course, the students will be able to:
1. Develop and deploy smart contracts on Ethereum/Hyperledger Fabric.
2. Use Polygon to improve transaction speed and reduce costs while maintaining security.
3. Create a user-friendly front-end to interact with the blockchain and sign transactions.
4. Implement IPFS to store documents like invoices and product details securely in a decentralized way along
with set up of DAO
Assignment
Assignment Title
No.
Page | 69
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Set up a Polygon test network. Deploy the previously created smart contract to Polygon for
2
improved scalability.
Design a web interface where users can sign and send transactions (e.g., product transactions) to
3
the blockchain using MetaMask.
4 Implement IPFS for decentralized file storage.
Develop a decentralized supply chain management system that integrates blockchain technologies at
multiple layers. The system will allow participants to securely and transparently track and manage products
as they move through different stages of the supply chain, ensuring data integrity, scalability, and governance.
Page | 70
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Credit FA
Lecture Practical Tutorial Other SA Total
FA1 FA2
2 2 - - 1 10 10 30 50
User Research, Personas, and Journey Mapping: User research techniques: Interviews, 8
II surveys, contextual inquiry, creating empathy maps and personas, Task flows and user
journey mapping, identifying pain points and defining opportunities.
Self-Study
4*
AI-Driven UX Personalization, Metaverse & Web3 UX, research paper reading.
Page | 71
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Text Books:
1. Anthony E. Sanchez, “Newbies Guide to UI/UX Design Using Figma”, paperback edition 2025
2. THE DESIGN OF EVERYDAY THINGS, Don Norman, Paperback, edition 2013
3. "About Face: The Essentials of Interaction Design", Steve Schoger, Alan Cooper, Robert Reimann,
David Cronin, Christopher Noessel, Wiley, 4th Edition, 2014
4. "Refactoring UI" by Adam Wathan & Steve Schoger Edition: Latest (Self-published, widely used in
2023–2025)
Reference Books:
Online Sources:
1. https://pencil.evolus.vn
2. https://figma.com
3. https://penpot.app
4. https://onlinecourses.nptel.ac.in/noc21_ar05/preview
Page | 72
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
2. Create user journey maps and task flows for the selected application.
Page | 73
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Mini Project: Define problem statement, personas, journey, wireframes, Finalize high-fidelity
9. design and build front-end screens, Final testing, iteration, and presentation/demo.
Text Books:
1. Don Norman, The Design of Everyday Things, MIT Press, Revised Edition, 2013.
2. Alan Cooper, Robert Reimann, David Cronin, Christopher Noessel, About Face: The Essentials of
Interaction Design, Wiley, 4th Edition, 2014.
3. Jon Duckett, HTML and CSS: Design and Build Websites, Wiley, 1st Edition, 2011.
Reference Books:
1. Jennifer Tidwell, Designing Interfaces: Patterns for Effective Interaction Design, O'Reilly Media, 3rd
Edition, 2019.
2. Steve Krug, Don't Make Me Think: A Common Sense Approach to Web Usability, New Riders, 3rd
Edition, 2014.
3. Joel Marsh, UX for Beginners: A Crash Course in 100 Short Lessons, O'Reilly Media, 1st Edition, 2015.
Online Sources:
1. Interaction Design Foundation (IDF), Website: https://www.interaction-design.org
2. Figma Learn & Community, Website: https://www.figma.com/learn
Coursera – Google UX Design Professional Certificate Website: https://www.coursera.org/professional-
certificates/google-ux-design
Page | 74
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Credit FA
Lecture Practical Tutorial Other SA Total
FA1 FA2
2 2 - - 1 10 10 30 50
Prior knowledge of Computer Networks ,Operating Systems and Database Management System is essential.
Course Objectives:
This course aims at enabling students:
1. To introduce various cloud computing services and models.
2. To learn how to select the appropriate configuration to compute a node.
3. To configure appropriate storage service for the specific application.
4. To understand networking and security settings in a cloud environment.
5. To design the application using high scalability and reliability considerations.
Course Outcomes:
After learning the course, the students will be able to:
1. Understand various cloud computing services, models and virtualization.
2. Analyze the various storage-related services while computing..
3. Apply appropriate database services during application deployment. .
4. Apply various networking and security options to the cloud..
Detailed Syllabus
Page | 75
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Self-Study
virtual machines and containers,Storage for Backups and databases- in
Azure and GCP, Databases, Storage gateway for hybrid cloud storage 6*
systems,Time series database, Ledger based database,Cloud Security in
Azure and GCP, research paper reading.
Text Books:
1. A.Srinivasan,J.Suresh,“CloudComputing:APracticalApproachforLearningandImplementation”,
Pearson, ISBN: 978-81-317-7651-3.
2. RajkumarBuyya,ChristianVecchiola,and Thamarai Selvi Mastering Cloud. Computing McGraw Hill
Education, 2023.
3. Wittig,Michael,AndreasWittig,and Ben Whaley.Amazon webservices in action. Manning, 2022.
4. Murty,James.Programming amazon web services:S3,EC2,SQS,FPS,andSimpleDB,“O’Reilly Media,
Inc.”, 2015.
Reference Books:
1. Kavis, MichaelJ.Architecting the cloud:design decisions for cloud computing service models
(SaaS, PaaS, and IaaS). John Wiley Sons, 2024.
2. Vacca,JohnR.,ed.Cloud computing security:foundationsandchallenges.CRCPress,2023.
3. Furht,Borivoje, and Arman do Escalante.Handbook of cloud computing.
Vol.3.NewYork: springer, 2021.
4. Piper, Ben,and David Clinton. AWS Certified Solutions Architect Study Guide: Associate SAA-
C02 Exam. John Wiley Sons, 2020.
5. Anthony,Albert.MasteringAWSSecurity:Create and maintain a secure cloud ecosystem. Packt
Publishing Ltd, 2017.
Online Sources:
1. CloudComputingbySoumyaGhosh,https://nptel.ac.in/courses/106105167
2. Indian Institute of Technology Delhi: https://library.iitd.ac.in/arpit_2020-2021/Week%2016%20-
%20Module%2039%20-%20PPT-
%20Cloud%20Computing%20and%20Its%20Application%20in%20Libraries.pdf
3. IIT Roorkee: Intellipaat.com/advanced-certification-cloud-computing.
4. Cloud computing By Prof. Soumya Kanti Ghosh | IIT Kharagpur:
https://onlinecourses.nptel.ac.in/noc21_cs14/preview.
Page | 76
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Page | 77
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Page | 78
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Credit FA
Lecture Practical Tutorial Other SA Total
FA1 FA2
2 2 - - 1 10 10 30 50
Course Outcomes:
After learning the course, the students will be able to:
1. Analyze the tools, methods and legal aspects of cyber crimes
2. Analyze the security aspects of digital security.
3. Develop a forensic plan for ascertaining the crime
4. Apply Vulnerability Assessment and Penetration Testing using relevant tools
Detailed Syllabus
Computer and Mobile Forensics: Digital evidence, forensics life cycle, chain of
custody, Approaches to computer forensics investigation, Mobile phones and
basics of SIM, mobile phone forensics tools and methods, Threats to mobile
applications, Mobile access permissions, analyzers for Mobile Applications to
III discover Security vulnerabilities, Android Security Architecture, social media 8
forensics on mobile devices, Cloud Forensics
IV 6
Vulnerability analysis and penetration testing :Psychology of attackers, Social
Page | 79
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Self-Study:
Recent cyber crimes and its modus operandi, Testing code vulnerability. Machine
Learning for cyber security, Windows forensics using Belkasoft, Forensic tools 6*
for computer and mobile devices, OWASP Top10, CTF, Bounties, research paper
reading.
Text Books:
1. Nina Godbole, Sunita Belapure, “Cyber Security- Understanding cyber crimes, computer forensics,
and legal perspectives,” Wiley India,
2. Allen Harper, Jonathan Ness, Gideon Lenkey, Shon Harris, CrisEagle, Terron Williams, “ GrayHat
Hacking- The ethical hackers handbook”, McGrawHill 3 edition
rd
3. Bill Nelson, Amelia Phillips, Christ Steuart, “Guide to Computer Forensics and Investigations-
Processing Digital Evidence,” Cengage Learning, 6 Edition.
th
Reference Books:
1. The Web Application Hacker’s Hand Book - Discovering and Exploiting Security flaws, Dafydd
Suttard, Marcuspinto,2 Edition, Wiley Publishing.
nd
2. William Stallings, “Cryptography and Network Security: Principles and Practice”, 6th Edition, Pearson
Education, ISBN 13: 9781292158587
3. Forouzan, B.A., “Cryptography & Network Security” Tata McGraw-Hill Education, ISBN-13: 978-
0070702080
Online Sources:
1. Cyber Security and Privacy, by Prof. Saji K Mathew, IIT Madras,
https://nptel.ac.in/courses/106106248
2. Introduction to Cyber Security, Jeetendra Pande.http://uou.ac.in/foundation-course
3. https://belkasoft.thinkific.com/courses/windows-forensics-with-belkasoft
4. https://www.youtube.com/@DEFCONConference/videos
Page | 80
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Course Outcomes:
After learning the course, the students will be able to:
1. Apply basic security features for a computer system
2. Analyze the network traffic for anomalies
3. Create evidence of crime using forensic tools
4. Apply Vulnerability Assessment and Penetration Testing using relevant tools
Detailed Syllabus
Suggested List of Assignments
Assignment No. Assignment Title
Setting, configuring and managing three password policy in the computer (BIOS,
1.
Administrator and Standard User)
Page | 81
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Mobile Forensics using open source tools like Volatility/ Autopsy / CAINE (Computer-
5.
Aided Investigative Environment)
Web application assessment using open source tools like Acunetix / Burpsuite /
6.
(JFrogXRay)
Vulnerability scanning using open source tools like OpenVAS /Nikto / Nuclei/
7.
SecretScanner
Text Books:
1. Nina Godbole, Sunita Belapure, “Cyber Security- Understanding cyber crimes, computer forensics,
and legal perspectives,” Wiley India,
2. Allen Harper, Jonathan Ness, Gideon Lenkey, Shon Harris, CrisEagle, Terron Williams, “ GrayHat
Hacking- The ethical hackers handbook”, McGrawHill 3 edition
rd
3. Bill Nelson, Amelia Phillips, Christ Steuart, “Guide to Computer Forensics and Investigations-
Processing Digital Evidence,” Cengage Learning, 4 Edition
th
Reference Books:
1. The Web Application Hacker’s Hand Book - Discovering and Exploiting Security flaws, Dafydd
Suttard, Marcuspinto,2 Edition, Wiley Publishing.
nd
2. William Stallings, “Cryptography and Network Security: Principles and Practice”, 6th Edition, Pearson
Education, ISBN 13: 9781292158587
3. Forouzan, B.A., “Cryptography & Network Security” Tata McGraw-Hill Education, ISBN-13: 978-
0070702080
Online Sources:
1. Cyber Security and Privacy, by Prof. Saji K Mathew, IIT Madras,
https://nptel.ac.in/courses/106106248
2. Introduction to Cyber Security, Jeetendra Pande.http://uou.ac.in/foundation-course
Page | 82
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Credit FA
Lecture Practical Tutorial Other SA Total
FA1 FA2
2 2 - - 1 10 10 30 50
Prior knowledge of Matrix Operations and Binarization is essential
Course Objectives:
This course aims at enabling students for
1. Application of point processing methods on digital image.
2. Application of spatial domain methods on digital image.
3. Application of image compression methods like RLE/Huffman coding and orthogonal transforms on digital
image
4. Comprehension of the video processing techniques and the role of AI in video analysis.
Course Outcomes:
After learning the course, the students will be able to:
1. Apply point processing methods on digital image.
2. Apply spatial domain methods on digital image.
3. Apply the image compression methods like RLE/Huffman coding and orthogonal transforms on digital image
4. Comprehend the video processing techniques and the role of AI in video analysis.
Detailed Syllabus
AI in video analysis
Introduction to Video Processing and AI: Introduction to Digital Video, Video
IV Preprocessing and Frame Analysis, Role of machine learning and deep learning 7
in video analysis, Extraction of visual and audio parts from digital video, Object
Detection and Tracking in Video, Human-Centric Video Analytics.
Page | 83
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Self-Study:
Image Texture Analysis, Morphological Image Processing, Scene change
6*
detection, clustering-based summarization, reinforcement learning in video
summarization, research paper reading.
Text Books:
1. Rafael.C, Gonzalez, Richard E Woods, “Digital Image Processing”,4th Edition, Pearson
India, ISBN:9353062985, 2018.
2. Maria Petrou,“Image Processing: The Fundamentals”, 2nd Edition, Wiley, ISBN: 978-1119740462, 2022.
Reference Books:
1. Mukesh D Patil, Gajanan K Birajdar, Sangita S Chaudhari, "Computational Intelligence in Image and Video
Processing", 1st edition, ISBN 9781032420769, 2023.
2.Milan Sonka, Vaclav Hlavac, and Roger Boyle,"Image Processing, Analysis, and Machine Vision", 4th
edition, ISBN-13: 978-1473738201,2014.
3.B.Chanda, D. DuttaMajumder, “Digital Image Processing and Analysis”, 2 nd Edition, PHI learning, ISBN-
978-81-203-4325-2, 2011.
Online Sources:
1. https://www.coursera.org/learn/digital
2. https://www.imageprocessingplace.com/
3. https://image-net.org/
4. https://www2.eecs.berkeley.edu/Research/Projects/CS/vision/grouping/
Page | 84
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Detailed Syllabus
Suggested List of Assignments
Assignment No. Assignment Title
Apply point processing techniques such as image negative, contrast stretching, thresholding,
1. brightening and darkening an image. Display the original and processed images with
analysis of the results.
Apply Spatial filters, Median and High boost filter on image. Display the original and
2. processed images with brief analysis of the results.
Apply histogram equalization to improve the contrast of a low-contrast image. Use a real-
3. world image (e.g., medical, satellite, or low-light photograph) and compare the visual
quality of the enhanced image against the original image.
Perform Edge detection using First order and Second order derivatives like Laplacian,
4.
Robert , Prewitt and Sobel.
Page | 85
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Implement an Image compression on a sample image using Huffman coding and Run length
5.
Coding.
6. Implement an Image compression on a sample image using DCT and Haar Transformation.
Implement a program to extract frames from a video file and perform basic point and mask
7. processing methods on extracted frames. Also apply edge detection on Extracted frames
using Sobel ,roberts and prewitt methods.
Implement a program to extract the audio from a video file. Save the extracted audio in a
8. common format (e.g., WAV or MP3) and analyze the properties of the extracted audio, such
as its duration, sampling rate, and file size.
Implement object detection to detect objects in a sample image or video. Use a pre-trained
9 YOLO model(not limited to) and apply it to detect multiple objects in real-time. Highlight
the detected objects with bounding boxes and labels.
Mini Project based on a problem statement approved by the faculty member. Note:
● Instructor should maintain progress report of mini project throughout the semester from
project group and assign marks as a part of the term work
10.
● Oral examination will be on the Solution Proposed in Mini Project and Image and video
processing Concepts used in the laboratory assignments.
● Mini Projects in this course should facilitate Project Based Learning among students.
Text Books:
1. Rafael.C, Gonzalez, Richard E Woods, “Digital Image Processing”,4th Edition, Pearson
India, ISBN:9353062985, 2018.
2. Maria Petrou,“Image Processing: The Fundamentals”, 2nd Edition, Wiley, ISBN: 978-1119740462, 2022.
Reference Books:
1. Mukesh D Patil, Gajanan K Birajdar, Sangita S Chaudhari, "Computational Intelligence in Image and Video
Processing", 1st edition, ISBN 9781032420769, 2023.
2. Milan Sonka, Vaclav Hlavac, and Roger Boyle,"Image Processing, Analysis, and Machine Vision", 4th
edition, ISBN-13: 978-1473738201,2014.
3. B.Chanda, D. DuttaMajumder, “Digital Image Processing and Analysis”, 2 nd Edition, PHI learning, ISBN-
978-81-203-4325-2, 2011.
Online Sources:
1. https://www.coursera.org/learn/digital
2. https://www.imageprocessingplace.com/
3. https://image-net.org/
4. https://www2.eecs.berkeley.edu/Research/Projects/CS/vision/grouping/
Page | 86
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Course Objectives:
This course aims at enabling students:
1. To familiarize with the core concepts of frontend and backend programming.
2. To explore the MERN (Mongo, Express, React, Node) web development technologies.
3. To get acquainted with NOSQL databases.
Course Outcomes:
After learning the course, the students will be able to:
1. Explore the latest technological stack for web application development.
2. Apply the concepts of React.js for web applications development.
3. Evaluate the features of NOSQL databases for designing data models.
4. Design dynamic web applications for real life scenarios.
2. Design a Personal Portfolio Page using HTML and CSS. Use bootstrap CDN if required.
Design a dynamic web app like fashion store / E- Commerce product using HTML, CSS &
3.
JS. Also use bootstrap CDN if required.
Create any interactive data visualization dashboard for any real-life application like weather
4.
dashboard. Visualize data using charts and graphs (use libraries like Chart.js or D3.js).
Create a simple functional college website / travel agency website / insurance website using
5.
Node.js and Express using any NoSQL data set like MongoDB if required.
Page | 87
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Create Online appointment booking application / E-commerce portal for used items sales
6. like car, bike etc. or similar type application using Node.js and Express use any NoSQL data
set like MongoDB if required.
Design a web application for e-commerce or students feedback review systems or any other
7
applications with MongoDB Backend. using React.js and Express.
8 Mini project -Build a full-stack MERN Project using React JS, MongoDB, Node & Express.
Text Books:
1. HTML CSS and JavaScript for Beginners - A Web Design Course, by Laurence Svekis Released January
2019, Publisher(s): Packt Publishing, ISBN: 9781838551278.
2. Learning React, 2nd Edition by Alex Banks, Eve Porcello, Released June 2020, Publisher(s): O'Reilly
Media, Inc. ISBN: 9781492051725
3. MongoDB: The Definitive Guide, 3rd Edition by Shannon Bradshaw, Eoin Brazil, Kristina Chodorow
Released December 2019, Publisher(s): O'Reilly Media, Inc. ISBN: 9781491954461
Reference Books:
1. Kyle Banker, Peter Bakkum, Shaun Verch, Dough Garrett, Tim Hawkins “MongoDB in Action”, Manning
Publications, Second Edition, 2016.
2. Beginning MERN Stack: Build and Deploy a Full Stack MongoDB, Express, React, Node.js App by Greg
Lim (Author)
Online Sources:
1. https://www.w3schools.com/whatis/whatis_fullstack.asp
2. https://www.geeksforgeeks.org/what-is-full-stack-development/
3. https://github.com/bmorelli25/Become-A-Full-Stack-Web-Developer
Page | 88
Curriculum T.Y. B.Tech. Computer Engineering
Department of Computer Engineering
Department Vision
To be a premier Computer Engineering program by achieving
excellence in Academics and Research for creating globally
competent and ethical professionals.
Department Mission
M1: To develop technologically competent and self-sustained
professionals through contemporary curriculum.
M2: To nurture innovative thinking and collaborative research,
making a positive impact on society.
M3: To provide state-of-the art computing environment and
learning opportunities through Center of Excellence.
M4: To foster leadership skills and ethics with holistic
development.
Page | 89
Curriculum T.Y. B.Tech. Computer Engineering