6 Cs 2 Ebctsyll
6 Cs 2 Ebctsyll
2022) Annexure-III
@#$ 1
MKV-TEMPLATE for IPCC (26.04.2022) Annexure-III
MODULE-1
Microprocessors versus Microcontrollers, ARM Embedded Systems: The RISC design philosophy, The ARM
Design Philosophy, Embedded System Hardware, Embedded System Software, ARM Processor Fundamentals:
Registers, Current Program Status Register, Pipeline, Exceptions, Interrupts, and the Vector Table , Core
Extensions.
Text book 1: Chapter 1 - 1.1 to 1.4, Chapter 2 - 2.1 to 2.5 RBT: L1, L2
MODULE-2
Introduction to the ARM Instruction Set : Data Processing Instructions , Programme Instructions,
Software Interrupt Instructions, Program Status Register Instructions, Coprocessor Instructions,
Loading Constants
ARM programming using Assembly language: Writing Assembly code, Profiling and cycle
counting, instruction scheduling, Register Allocation, Conditional Execution, Looping Constructs.
Text book 1: Chapter 3:Sections 3.1 to 3.6 ( Excluding 3.5.2), Chapter 6(Sections 6.1 to 6.6) RBT:
L1, L2
MODULE-3
@#$ 2
MKV-TEMPLATE for IPCC (26.04.2022) Annexure-III
Text book 2:Chapter 1(Sections 1.2 to 1.6),Chapter 2(Sections 2.1 to 2.3) RBT: L1, L2
MODULE-4
Embedded System Design Concepts:
Characteristics and Quality Attributes of Embedded Systems, Operational quality attributes, non-
operational quality attributes, Embedded Systems-Application and Domain specific, Hardware
Software Co-Design and Program Modelling.
Text book 2: Chapter-3, Chapter-4, Chapter-7 (Sections 7.1, 7.2 only), RBT: L1, L2
MODULE-5
RTOS and IDE for Embedded System Design:
Operating System basics, Types of operating systems, Task, process and threads (Only POSIX
Threads with an example program), Thread preemption, Multiprocessing and Multitasking, Task
Communication (without any program), Task synchronization issues – Racing and Deadlock,
Concept of Binary and counting semaphores (Mutex example without any program), How to choose
an RTOS, Integration and testing of Embedded hardware and firmware.
Text book 2: Chapter-10 (Sections 10.1, 10.2, 10.3, 10.4 , 10.7, 10.8.1.1, 10.8.1.2, 10.8.2.2, 10.10
only), Chapter 12, RBT: L1, L2 08
@#$ 3
MKV-TEMPLATE for IPCC (26.04.2022) Annexure-III
@#$ 4
MKV-TEMPLATE for IPCC (26.04.2022) Annexure-III
Sl.NO Experiments
1 Develop a program to multiply two 16 bit binary numbers.
2
Write a program to find the sum of first 10 integer numbers.
3
Write a program to find factorial of a number.
4
Write a program to add an array of 16 bit numbers and store the 32 bit result in internal RAM
5
Write a program to find the square of a number (1 to 10) using look-up table.
6
Write a program to find the largest/smallest number in an array of 32 numbers .
7
Display “Hello World” message using Internal UART.
8
Interface a Stepper motor and rotate it in clockwise and anti-clockwise direction
9 Display the Hex digits 0 to F on a 7-segment LED interface, with an appropriate delay in
between
10 Interface a 4x4 keyboard and display the key code on an LCD.
● Apply the knowledge gained for Programming ARM for different applications.
● Interpret the basic hardware components and their selection method based on the characteristics and
attributes of an embedded system.
@#$ 5
MKV-TEMPLATE for IPCC (26.04.2022) Annexure-III
CIE for the theory component of the IPCC (maximum marks 50)
● IPCC means practical portion integrated with the theory of the course.
● CIE marks for the theory component are 25 marks and that for the practical component is 25
marks.
● 25 marks for the theory component are split into 15 marks for two Internal Assessment Tests
(Two Tests, each of 15 Marks with 01-hour duration, are to be conducted) and 10 marks for other
assessment methods mentioned in 22OB4.2. The first test at the end of 40-50% coverage of the syllabus
and the second test after covering 85-90% of the syllabus.
● Scaled-down marks of the sum of two tests and other assessment methods will be CIE marks for
the theory component of IPCC (that is for 25 marks).
● The student has to secure 40% of 25 marks to qualify in the CIE of the theory component of IPCC.
CIE for the practical component of the IPCC
● 15 marks for the conduction of the experiment and preparation of laboratory record, and 10
marks for the test to be conducted after the completion of all the laboratory sessions.
● On completion of every experiment/program in the laboratory, the students shall be evaluated
including viva-voce and marks shall be awarded on the same day.
● The CIE marks awarded in the case of the Practical component shall be based on the continuous
evaluation of the laboratory report. Each experiment report can be evaluated for 10 marks. Marks of all
experiments’ write-ups are added and scaled down to 15 marks.
● The laboratory test (duration 02/03 hours) after completion of all the experiments shall be
conducted for 50 marks and scaled down to 10 marks.
● Scaled-down marks of write-up evaluations and tests added will be CIE marks for the laboratory
component of IPCC for 25 marks.
● The student has to secure 40% of 25 marks to qualify in the CIE of the practical component of the
IPCC.
SEE for IPCC
Theory SEE will be conducted by University as per the scheduled timetable, with common question
papers for the course (duration 03 hours)
1. The question paper will have ten questions. Each question is set for 20 marks.
2. There will be 2 questions from each module. Each of the two questions under a module (with a
maximum of 3 sub-questions), should have a mix of topics under that module.
3. The students have to answer 5 full questions, selecting one full question from each module.
4. Marks scoredby the student shall be proportionally scaled down to 50 Marks
The theory portion of the IPCC shall be for both CIE and SEE, whereas the practical portion will
have a CIE component only. Questions mentioned in the SEE paper may include questions from the
practical component.
@#$ 6
MKV-TEMPLATE for IPCC (26.04.2022) Annexure-III
Textbooks:
1. Andrew N Sloss, Dominic Symes and Chris Wright, ARM system developers guide, Elsevier,
Morgan Kaufman publishers, 2008.
2. Shibu K V, “Introduction to Embedded Systems”, Tata McGraw Hill Education, Private Limited, 2
nd Edition.
Reference Books:
2. The Insider’s Guide to the ARM7 Based Microcontrollers, Hitex Ltd.,1st edition, 2005.
4. Raj Kamal, Embedded System, Tata McGraw-Hill Publishers, 2nd Edition, 2008.
http://www.digimat.in/nptel/courses/video/106105193/L01.html
http://www.digimat.in/nptel/courses/video/106105159/L01.html
http://www.digimat.in/nptel/courses/video/106105036/L01.html
@#$ 7
Annexure-II 1
Teaching-Learning Process
These are sample Strategies, which teachers can use to accelerate the attainment of the
various course outcomes.
1. Lecturer method (L) needs not to be only a traditional lecture method, but alternative
effective teaching methods could be adopted to attain the outcomes.
2. Use of Video/Animation to explain functioning of various concepts.
3. Encourage collaborative (Group Learning) Learning in the class.
4. Ask at least three HOT (Higher order Thinking) questions in the class, which promotes
critical thinking.
5. Adopt Problem Based Learning (PBL), which fosters students’ Analytical skills, develop
design thinking skills such as the ability to design, evaluate, generalize, and analyze
information rather than simply recall it.
6. Introduce Topics in manifold representations.
7. Show the different ways to solve the same problem with different circuits/logic and
encourage the students to come up with their own creative ways to solve them.
8. Discuss how every concept can be applied to the real world - and when that's possible, it
helps improve the students' understanding
9. Use any of these methods: Chalk and board, Active Learning, Case Studies
Module-1 10 hours
A model for Network Security, Classical encryption techniques: Symmetric cipher model,
Substitution ciphers-Caesar Cipher, Monoalphabetic Cipher, Playfair Cipher, Hill Cipher,
Polyalphabetic Ciphers, One time pad, Steganography.
Block Ciphers and Data Encryption Standards: Traditional Block Cipher structures, data
Encryption Standard (DES), A DES Example, The strength of DES, Block cipher design
principles.
Chapter 1: 1.8 Chapter 3: 3.1, 3.2, 3.5 Chapter 4: 4.1, 4.2, 4.3, 4.4, 4.5
Module-2 10 hours
@#$ 1
Annexure-II 2
Public key cryptography and RSA: Principles of public key cryptosystems-Public key
cryptosystems, Applications for public key cryptosystems, Requirements for public key
cryptography, Public key Cryptanalysis, The RSA algorithm: Description of the Algorithm,
Computational aspects, The Security of RSA.
Module-3 10 hours
Applications of Cryptographic Hash functions, Two simple Hash functions, Key management
and distribution: Symmetric key distribution using symmetric encryption, Symmetric key
distribution using asymmetric encryption, Distribution of public keys, X.509 Certificates,
Public Key Infrastructures.
Chapter 11: 11.1, 11.2 Chapter 14: 14.1, 14.2, 14.3, 14.4, 14.5
Module-4 10 hours
User Authentication: Remote user authentication principles, Kerberos, Remote user
authentication using asymmetric encryption.
Web security consideration, Transport layer security.
Email Threats and comprehensive email security, S/MIME, Pretty Good Privacy.
Chapter 15: 15.1, 15.3, 15.4 Chapter 17: 17.1, 17.2 Chapter 19: 19.3, 19.4, 19.5
Module-5 10 hours
Domainkeys Identified Mail.
IP Security: IP Security overview, IP Security Policy, Encapsulating Security Payload,
Combining security associations, Internet key exchange.
Chapter 19: 19.9 Chapter 20: 20.1, 20.2, 20.3, 20.4, 20.5
Course outcome
At the end of the course, the student will be able to :
@#$ 2
Annexure-II 3
Semester-End Examination:
Theory SEE will be conducted by University as per the scheduled timetable, with common question papers for
the course (duration 03 hours).
1. The question paper will have ten questions. Each question is set for 20 marks.
2. There will be 2 questions from each module. Each of the two questions under a module (with a maximum
of 3 sub-questions), should have a mix of topics under that module.
3. The students have to answer 5 full questions, selecting one full question from each module.
4. Marks scored shall be proportionally reduced to 50 marks.
Books
Text Books:
William stallings, “Cryptography and Network Security”, Pearson Publication, Seventh Edition.
References:
1. Keith M Martin, “Everyday Cryptography”, Oxford University Press.
2. V.K Pachghare,“Cryptography and Network Security”, PHI, 2nd Edition.
Activity Based Learning (Suggested Activities in Class)/ Practical Based learning
● Group (2 students] programming assignment to implement Cryptographic
Algorithms [25 marks]
@#$ 3
Annexure-II 1
Textbook-1: Chap-1 (1.1, 1.2), Chap-2 (2.2, 2.3), Chap-3 (3.1, 3.2)
Module-2
Image processing: More neighborhood operators, Fourier transforms, Pyramids and wavelets, and
Geometric transformations.
Image Segmentation: Fundamentals, Point, Line and edge detection, thresholding (Foundation & Basic
global thresholding only), Segmentation by region growing & region splitting & merging.
@#$ 1
Annexure-II 2
Feature Extraction: Background, Boundary preprocessing (Boundary following & Chain codes only).
Image pattern Classification: Background, Patterns and classes, Pattern classification by prototype
matching (Minimum distance classifier only).
Semester-End Examination:
Theory SEE will be conducted by University as per the scheduled timetable, with common question papers
for the course (duration 03 hours).
1. The question paper will have ten questions. Each question is set for 20 marks.
2. There will be 2 questions from each module. Each of the two questions under a module (with a
maximum of 3 sub-questions), should have a mix of topics under that module.
3. The students have to answer 5 full questions, selecting one full question from each module.
@#$ 2
Annexure-II 3
Reference books
1. David Forsyth and Jean Ponce, Computer Vision: A Modern Approach, 2nd Edition, Pearson, 2015.
2. Reinhard Klette, Concise Computer Vision - An Introduction into Theory and Algorithms, Springer,
2014.
@#$ 3
Annexure-II 1
Course objectives:
● Introduce the rationale behind the cloud computing revolution and the business drivers
● Understand various models, types and challenges of cloud computing
● Understand the design of cloud native applications, the necessary tools and the design
tradeoffs.
● Realize the importance of Cloud Virtualization, Abstraction`s, Enabling Technologies
and cloud security
Module-1
Distributed System Models and Enabling Technologies: Scalable Computing Over the
Internet, Technologies for Network Based Systems, System Models for Distributed and
Cloud Computing, Software Environments for Distributed Systems and Clouds,
Performance, Security and Energy Efficiency.
Textbook 1: Chapter 1: 1.1 to 1.5
Module-2
Virtual Machines and Virtualization of Clusters and Data Centers: Implementation Levels
of Virtualization, Virtualization Structure/Tools and Mechanisms, Virtualization of
CPU/Memory and I/O devices, Virtual Clusters and Resource Management, Virtualization for
Data Center Automation.
Textbook 1: Chapter 3: 3.1 to 3.5
Module-3
Cloud Platform Architecture over Virtualized Datacenters: Cloud Computing and
Service Models, Data Center Design and Interconnection Networks, Architectural Design of
@#$ 1
Annexure-II 2
Compute and Storage Clouds, Public Cloud Platforms: GAE, AWS and Azure, Inter-Cloud
Resource Management.
Textbook 1: Chapter 4: 4.1 to 4.5
Module-4
Cloud Security: Top concern for cloud users, Risks, Privacy Impact Assessment, Cloud Data
Encryption, Security of Database Services, OS security, VM Security, Security Risks Posed by
Shared Images and Management OS, XOAR, A Trusted Hypervisor, Mobile Devices and
Cloud Security.
Cloud Security and Trust Management: Cloud Security Defense Strategies, Distributed
Intrusion/Anomaly Detection, Data and Software Protection Techniques, Reputation-Guided
Protection of Data Centers.
Textbook 2: Chapter 11: 11.1 to 11.3, 11.5 to 11.8, 11.10 to 11.14
Textbook 1: Chapter 4: 4.6
Module-5
Cloud Programming and Software Environments:
Features of Cloud and Grid Platforms, Parallel and Distributed Computing Paradigms,
Programming Support for Google App Engine, Programming on Amazon AWS and Microsoft,
Emerging Cloud Software Environments.
Textbook 1: Chapter 6: 6.1 to 6.5
Course outcome (Course Skill Set)
@#$ 2
Annexure-II 3
Semester-End Examination:
Theory SEE will be conducted by University as per the scheduled timetable, with common question papers for
the course (duration 03 hours).
1. The question paper will have ten questions. Each question is set for 20 marks.
2. There will be 2 questions from each module. Each of the two questions under a module (with a maximum
of 3 sub-questions), should have a mix of topics under that module.
3. The students have to answer 5 full questions, selecting one full question from each module.
4. Marks scored shall be proportionally reduced to 50 marks.
Reference Books:
1. Rajkumar Buyya, Christian Vecchiola, and Thamrai Selvi, Mastering Cloud Computing McGrawHill
Education, 1st Edition, 2017
2. Toby Velte, Anthony Velte, Cloud Computing: A Practical Approach, McGraw-Hill Education, 2017.
3. George Reese, Cloud Application Architectures: Building Applications and Infrastructure in the Cloud,
O'Reilly Publication, 1st Edition, 2009
4. John Rhoton, Cloud Computing Explained: Implementation Handbook for Enterprises, Recursive Press, 2 nd
Edition, 2009.
Web links and Video Lectures (e-Resources):
● https://freevideolectures.com/course/4639/nptel-cloud-computing/1.
● https://www.youtube.com/playlist?list=PLShJJCRzJWxhz7SfG4hpaBD5bKOloWx9J
● https://www.youtube.com/watch?v=EN4fEbcFZ_E
● https://www.youtube.com/watch?v=RWgW-CgdIk0
● https://www.geeksforgeeks.org/virtualization-cloud-computing-types/
● https://www.javatpoint.com/cloud-service-provider-companies
@#$ 3
Annexure-II 4
@#$ 4
Annexure-II 1
@#$ 1
Annexure-II 2
Module-4
Introduction to Edge Computing Scenarios and Use cases - Edge computing purpose and definition, Edge
computing use cases, Edge computing hardware architectures, Edge platforms, Edge vs Fog Computing,
Communication Models - Edge, Fog, and M2M.
Textbook 3: Ch:8
Module-5
IoT Architecture and Core IoT Modules-A connected ecosystem, IoT versus machine-to-machine versus,
SCADA, The value of a network and Metcalfe's and Beckstrom's laws, IoT and edge architecture, Role of
an architect, Understanding Implementations with the examples- Edge computing with RaspberryPi,
Industrial, and Commercial IoT and Edge, and Edge computing and solutions.
Textbook 3: Ch:2
Course outcome (Course Skill Set)
At the end of the course, the student will be able to :
1. Explore the need for new computing paradigms.
2. Explain the major components of fog and edge computing architectures.
3. Identify potential technical challenges of the transition process and suggest solutions.
4. Analyze data and application requirements and pertaining issues.
5. Compare design and model infrastructures.
Semester-End Examination:
Theory SEE will be conducted by University as per the scheduled timetable, with common question papers
for the course (duration 03 hours).
1. The question paper will have ten questions. Each question is set for 20 marks.
2. There will be 2 questions from each module. Each of the two questions under a module (with a
maximum of 3 sub-questions), should have a mix of topics under that module.
@#$ 2
Annexure-II 3
3. The students have to answer 5 full questions, selecting one full question from each module.
4. Marks scored shall be proportionally reduced to 50 marks.
Suggested Learning Resources:
Textbooks
1. Satish Narayana Srirama and Rajkumar Buyya, Fog and Edge Computing: Principles and Paradigms,
(Wiley Series on Parallel and Distributed Computing), 2019.
2. Assad Abbas, Samee U. Khan, Albert Y. Zomaya. Fog Computing: Theory and Practice, Wiley 2020.
3. Perry Lea, IoT and Edge Computing for Architects - Second Edition, Publisher: Packt Publishing,
2020, ISBN: 9781839214806.
Reference books
1. Shanhe Yi, Cheng Li, Qun Li, ―A Survey of Fog Computing: Concepts, Applications and Issuesǁ,
Mobidata’15, ACM 978-1-4503-3524-9/15/06, DOI: 10.1145/2757384.2757397, June 21, 2015,
Hangzhou, China.
2. Flavio Bonomi, Rodolfo Milito, Jiang Zhu, Sateesh Addepalli, ―Fog Computing and Its Role in the
Internet of Thingsǁ, MCC’12, August 17, 2012, Helsinki, Finland, ACM, 2012.
3. Raspberry Pi Cookbook, 3rd Edition, by Simon Monk, Publisher: O'Reilly Media, Inc., 2019, ISBN:
978149204322.
4. David Jensen, “Beginning Azure IoT Edge Computing: Extending the Cloud to the Intelligent Edge,
MICROSOFT AZURE.
@#$ 3
Wireless and Mobile Device Security Semester VI
Course Code BCY613D CIE Marks 50
Teaching Hours/Week (L: T:P: S) 3:0:0:0 SEE Marks 50
Total Hours of Pedagogy 40 Total Marks 100
Credits 03 Exam Hours 03
Examination type (SEE) Theory
Course objectives:
● Understand the evolution of wired and wireless networks and their societal and
economic impacts.
● Learn about mobile communication technologies and associated security challenges.
● Analyse WLAN fundamentals, vulnerabilities, and threat scenarios.
● Explore security measures for WLANs and mobile devices.
● Gain proficiency in risk assessment and security tools for wireless networks.
Teaching-Learning Process (General Instructions)
These are sample strategies; which teachers can use to accelerate the attainment of the various
course outcomes.
1. Lecturer method (L) does not mean only the traditional lecture method, but different
types of teaching methods may be adopted to achieve the outcomes.
2. Utilize video/animation films to illustrate the functioning of various concepts.
3. Promote collaborative learning (Group Learning) in the class.
4. Pose at least three HOT (Higher Order Thinking) questions in the class to stimulate
critical thinking.
5. Incorporate Problem-Based Learning (PBL) to foster students' analytical skills and
develop their ability to evaluate, generalize, and analyze information rather than
merely recalling it.
6. Introduce topics through multiple representations.
7. Demonstrate various ways to solve the same problem and encourage students to
devise their own creative solutions.
8. Discuss the real-world applications of every concept to enhance students'
comprehension.
9. Use any of these methods: Chalk and board, Active Learning, Case Studies.
Module-1 8 Hours
Evolution of Data and Wired Networking
The Evolution of Data Networks: The Dawn of Data Communication; Early Data
Networks; The Internet Revolution; Advances in Personal Computers and Mobile Phones;
Computers Go Mobile; Convergence of Mobile and Data Networks; Business Challenges
Addressed by Wireless Networking; IP Mobility and BYOD Impact; Security
Considerations and Cybercrime Evolution;
Module-2 8 Hours
@#$ 1
The Mobile Revolution and Security Threats
The Mobile Revolution: Cellular Communication and Coverage; Frequency Sharing and
Handoff; Evolution of Mobile Networks (1G to 4G/LTE); BYOD and Economic Impact of
Mobility; Business Use Cases for Mobile Networking;
Security Threats Overview: Threat Categories: Confidentiality, Integrity, Availability;
Wireless and Mobile Device Threats: Data Theft, System Access; Risk Mitigation and
BYOD for SMBs; Security Standards and Regulatory Compliance (ISO, NIST, PCI DSS);
Module-3 8 Hours
WLAN Fundamentals and Threat Analysis:
How Do WLANs Work? WLAN Topologies, Service Sets, and Standards; Wireless
Access Points (WAPs) and Antennas; Coverage Area Determination and Site Surveys;
Spectrum and Protocol Analysis;
WLAN and IP Networking Threat and Vulnerability Analysis: Types of Attackers:
Insiders vs. Outsiders; Physical Security, Social Engineering, and Wardriving; Rogue
Access Points and Bluetooth Vulnerabilities; Malicious Data Insertion, Denial of Service,
and Peer to Peer Hacking;
Module-4 Hours
WLAN Security Measures
Basic WLAN Security Measures: Design and Implementation for Security;
Authentication, MAC Filters, VPN, and VLANs; Wired Equivalent Privacy, WPA, WPA2;
Ongoing Management Considerations (Firmware, Physical Security);
Advanced WLAN Security Measures: Comprehensive Security Policies; Authentication
and Access Control (EAP, RADIUS); Intrusion Detection/Prevention Systems and Protocol
Filtering; Advanced Data Protection: WPA2 Modes, VPN, IPsec; User Segmentation,
VLANs, DMZ Segmentation; Device and Network Management;
Module-5 8 Hours
Advanced Mobile Security and Risk Management
WLAN Auditing Tools: Discovery Tools (NetStumbler, Kismet); Penetration Testing
Tools (Metasploit, Aircrackng); Network Enumerators, Protocol Analyzers, and Attack
Tools;
WLAN and IP Network Risk Assessment: Risk Assessment Methodologies and Stages;
Security Risk Analysis and Audits; Legal Requirements and IT Security Management;
Mobile Communication Security Challenges: Mobile Phone Threats: Exploits, Tools, and
Techniques; Security Architectures: Android, iOS, Windows Phone; BYOD and Enterprise
Mobility Management;
Mobile Device Security Models: Security Models: Android, iOS, Windows Phone; Device
Management, Encryption, and Handoff Challenges;
Semester-End Examination:
Theory SEE will be conducted by University as per the scheduled timetable, with common question
papers for the course (duration 03 hours).
1. The question paper will have ten questions. Each question is set for 20 marks.
2. There will be 2 questions from each module. Each of the two questions under a module (with
a maximum of 3 sub-questions), should have a mix of topics under that module.
3. The students have to answer 5 full questions, selecting one full question from each module.
4. Marks scored shall be proportionally reduced to 50 marks.
Suggested Learning Resources:
Text book
1. J. Doherty, Wireless and Mobile Device Security. Jones & Bartlett Learning, 2nd edition
Dec. 2021.
Reference Books:
Reference book
1. M. S. Obaidat, A. Anpalagan, I. Woungang, and S. Misra, Security and Privacy in
Wireless and Mobile Networks. MDPI, 2021.
2. M. Zinkus, T. M. Jois, and M. Green, "Data Security on Mobile Devices: Current State of
the Art, Open Problems, and Proposed Solutions," arXiv, 2021. [Online]. Available:
https://arxiv.org/abs/2105.12613
3. J. Stevenson, Mobile Offensive Security Pocket Guide: A Quick Reference Guide for
Android and iOS. Independently Published, 2022.
@#$ 3
Activity Based Learning (Suggested Activities in Class)/ Practical Based learning
1. Use any WLAN simulator tools to demonstrate the working of RADIUS
protocol (10 marks)
2. Students in a group of TWO or THREE are expected to prepare report on
different Intrusion Detection and Prevention techniques. (15)
@#$ 4
INTRODUCTION TO DATA STRUCTURES Semester 6
Course Code BCS654A CIE Marks 50
Teaching Hours/Week (L: T:P: S) 3:0:0:0 SEE Marks 50
Total Hours of Pedagogy 40 Total Marks 100
Credits 03 Exam Hours 03
Examination type (SEE) Theory
Course Objectives:
● Introduce primitive and non-primitive data structures
● Understand the various types of data structure along their operations
● Study various searching and sorting algorithms
● Assess appropriate data structures during program development / problem
solving
Teaching-Learning Process (General Instructions)
These are sample strategies; which teachers can use to accelerate the attainment of the various
course outcomes.
1. Lecturer method (L) does not mean only the traditional lecture method, but different
types of teaching methods may be adopted to achieve the outcomes.
2. Utilize video/animation films to illustrate the functioning of various concepts.
3. Promote collaborative learning (Group Learning) in the class.
4. Pose at least three HOT (Higher Order Thinking) questions in the class to stimulate
critical thinking.
5. Incorporate Problem-Based Learning (PBL) to foster students' analytical skills and
develop their ability to evaluate, generalize, and analyze information rather than
merely recalling it.
6. Introduce topics through multiple representations.
7. Demonstrate various ways to solve the same problem and encourage students to
devise their own creative solutions.
8. Discuss the real-world applications of every concept to enhance students'
comprehension.
9. Use any of these methods: Chalk and board, Active Learning, Case Studies.
Module-1
Arrays: Introduction, One-Dimensional Arrays, Two-Dimensional Arrays, Initializing Two-
Dimensional Arrays, Multidimensional arrays.
Pointers: Introduction, Pointer Concepts, Accessing Variables through Pointers, Pointer
Applications, Dynamic Memory Allocation Functions.
Structures and Unions: Introduction, Declaring Structures, Giving Values to Members,
Structure Initialization, Comparison of Structure Variables, Arrays of Structures, Arrays
within Structures, Nested Structures, Unions, Size of Structures.
Textbook 1: Ch. 8.1 to 8.5, Ch. 12.1 to 12.8, 12.10, 12.11.
Textbook 2: Ch. 2.1 to 2.3, 2.5, 2.9.
Module-2
@#$ 1
Stacks: Introduction, Stack Operations, Stack Implementation using Arrays, Applications of
Stacks.
Queues: Introduction, Queue Operations, Queue Implementation using Arrays, Different
Types of Queues: Circular Queues, Double-Ended Queues, Priority Queues, Applications of
Queues.
Textbook 2: Ch. 6.1 to 6.3, Ch. 8.1 to 8.2.
Module-3
Linked Lists: Introduction, Singly Linked List, Self-Referential Structures, Operations on
Singly Linked Lists: Insert-Delete-Display, Implementation of Stacks and Queues using
Linked List, Concatenate two Lists, Reverse a List without Creating a New Node, Static
Allocation Vs Linked Allocation.
Circular Singly Linked List: Introduction, Operations: Insert-Delete-Display.
Textbook 2: Ch. 9.1 to 9.2, 9.3 (Only 9.3.1 to 9.3.5, 9.3.11 to 9.3.12), 9.4 to 9.5.
Module-4
Trees: Introduction, Basic Concepts, Representation of Binary Trees, Operations on Binary
Trees: Insertion-Traversals-Searching-Copying a Tree, Binary Search Trees, Operations on
Binary Search Trees: Insertion-Searching-Find Maximum and Minimum Value-Count
Nodes, Expression Trees.
Textbook 2: Ch. 10.1 to 10.4, 10.5 (Only 10.5.1, 10.5.2, 10.5.3.1, 10.5.3.2, 10.5.3.4), 10.6.3.
Module-5
Sorting: Introduction, Bubble Sort, Selection Sort, Insertion Sort.
Searching: Introduction, Linear Search, Binary Search.
Textbook 1: Ch. 17.1, 17.2.6, 17.3.2.
Textbook 2: Ch. 11.1 to 11.3, 11.10.1.
@#$ 2
Assessment Details (both CIE and SEE)
The weightage of Continuous Internal Evaluation (CIE) is 50% and for Semester End Exam (SEE)
is 50%. The minimum passing mark for the CIE is 40% of the maximum marks (20 marks out of
50) and for the SEE minimum passing mark is 35% of the maximum marks (18 out of 50 marks).
A student shall be deemed to have satisfied the academic requirements and earned the credits
allotted to each subject/ course if the student secures a minimum of 40% (40 marks out of 100) in
the sum total of the CIE (Continuous Internal Evaluation) and SEE (Semester End Examination)
taken together.
Semester-End Examination:
Theory SEE will be conducted by University as per the scheduled timetable, with common question
papers for the course (duration 03 hours).
1. The question paper will have ten questions. Each question is set for 20 marks.
2. There will be 2 questions from each module. Each of the two questions under a module (with
a maximum of 3 sub-questions), should have a mix of topics under that module.
3. The students have to answer 5 full questions, selecting one full question from each module.
4. Marks scored shall be proportionally reduced to 50 marks.
Suggested Learning Resources:
Text Books:
1. E Balagurusamy, “C Programming and Data Structures”, 4th Edition, McGraw-Hill,
2007.
2. A M Padma Reddy, “Systematic Approach to Data Structures using C”, 9th Revised
Edition, Sri Nandi Publications, 2009.
Reference Books:
1. Ellis Horowitz and Sartaj Sahni, “Fundamentals of Data Structures in C”, 2nd Edition,
Universities Press, 2014.
2. Seymour Lipschutz, “Data Structures Schaum’s Outlines”, Revised 1st Edition,
McGraw-Hill, 2014.
Web links and Video Lectures (e-Resources):
● https://www.youtube.com/watch?v=DFpWCl_49i0
● https://www.youtube.com/watch?v=x7t_-ULoAZM
● https://www.youtube.com/watch?v=I37kGX-nZEI
● https://www.youtube.com/watch?v=XuCbpw6Bj1U
● https://www.youtube.com/watch?v=R9PTBwOzceo
@#$ 3
● https://www.youtube.com/watch?v=qH6yxkw0u78
● https://archive.nptel.ac.in/courses/106/105/106105085/
● https://onlinecourses.swayam2.ac.in/cec19_cs04/preview
Develop C programs that focus on Data Structure concepts such as arrays, pointers,
structures, stacks, queues, linked lists, trees as well as, sorting and searching algorithms
(25 Marks).
@#$ 4
FUNDAMENTALS OF OPERATING SYSTEMS Semester 6
Course Code BCS654B CIE Marks 50
Teaching Hours/Week (L: T:P: S) 3:0:0:0 SEE Marks 50
Total Hours of Pedagogy 40 Total Marks 100
Credits 03 Exam Hours 03
Examination type (SEE) Theory
Course objectives:
● To demonstrate the need and different types of OS
● To discuss suitable techniques for management of different resources
● To analyse different memory, storage, and file system management strategies.
Module-1
Introduction: What operating systems do; Computer System organization; Computer
System Organization, Computer System architecture; Operating System operations; Resource
Management
Operating System Structures: Operating System Servies, User and Operating System
interface; System calls, Application Program Interface, Types of system calls;
Textbook 1: Chapter 1: 1.1, 1.2, 1.3,1.4, 1.5 Chapter 2: 2.1, 2.2 (2.2.1, 2.2.2), 2.3 (2.3.2,
2.3.3)
Module-2
Process Management: Process concept; Process scheduling; Operations on processes;
Interprocess Communication
Multi-threaded Programming: Overview; Multithreading models, Thread Libraries
Textbook 1: Chapter 3: 3.1-3.4, Chapter 4: 4.1, 4.3 5, 4.4
Module-3
@#$ 1
CPU Scheduling: Basic Concepts, Scheduling criteria, Scheduling algorithms, Thread
Scheduling,
Process Synchronization: Synchronization: The critical section problem; Peterson’s
solution; Semaphores; Classical problems of synchronization;
Textbook 1: Chapter 5: 5.1, 5.2,5.3.1, 5.3.2, 5.3.3, 5.3.4, 5.4 Chapter 6: 6.1, 6.2.,6.3, 6.6
Module-4
Deadlocks: System model; Deadlock characterization; Methods for handling deadlocks;
Deadlock prevention; Deadlock avoidance; Deadlock detection and recovery from deadlock.
Memory Management: Background; Contiguous memory allocation; Paging; Structure of
page table
Textbook 1: Chapter 8: 8.1-8.8 Textbook 1: Chapter 9: 9.1-9.4 (9.4.1, 9.4.2)
Module-5
Virtual Memory Management: Background; Demand paging; Copy-on-write; Page
replacement;
File System Interface: File concept; Access methods; Directory Structure, Protection, File
System Implementation: File System Structure, File System Operations,
File System Internals: File Systems, File System Mounting; Partition and Mounting, File
sharing;
Textbook 1: Chapter 10: 10.1-10.3, 10.4 (10.4.1, 10.4.2, 10.4.4.) Chapter 13: 13.1, 13.2,
13.3 (13.3.1, 13.3.2, 13.3.3), 13.4 (13.4.1, 13.4.2) Chapter 15: 15.1-15.4
Course outcomes (Course Skill Set)
At the end of the course, the student will be able to:
1. Explain the fundamentals of operating systems.
2. Apply appropriate CPU scheduling algorithm for the given scenarios.
3. Analyse the various techniques for process synchronization and deadlock handling.
4. Apply the various techniques for memory management
5. Analyse the importance of File System Mounting and File Sharing
@#$ 2
Assessment Details (both CIE and SEE)
The weightage of Continuous Internal Evaluation (CIE) is 50% and for Semester End Exam (SEE)
is 50%. The minimum passing mark for the CIE is 40% of the maximum marks (20 marks out of
50) and for the SEE minimum passing mark is 35% of the maximum marks (18 out of 50 marks).
A student shall be deemed to have satisfied the academic requirements and earned the credits
allotted to each subject/ course if the student secures a minimum of 40% (40 marks out of 100) in
the sum total of the CIE (Continuous Internal Evaluation) and SEE (Semester End Examination)
taken together.
Semester-End Examination:
Theory SEE will be conducted by University as per the scheduled timetable, with common question
papers for the course (duration 03 hours).
1. The question paper will have ten questions. Each question is set for 20 marks.
2. There will be 2 questions from each module. Each of the two questions under a module (with
a maximum of 3 sub-questions), should have a mix of topics under that module.
3. The students have to answer 5 full questions, selecting one full question from each module.
4. Marks scored shall be proportionally reduced to 50 marks.
Suggested Learning Resources:
Text Books:
1. Abraham Silberschatz, Peter Baer Galvin, Greg Gagne, Operating System Principles
10th edition, Wiley-India, 2015
Reference Books
2. Ann McHoes Ida M Fylnn, Understanding Operating System, Cengage Learning, 6th
Edition, 2010
3. D.M Dhamdhere, Operating Systems: A Concept Based Approach 3rd Ed, McGraw-
Hill, 2013, P.C.P. Bhatt, An Introduction to Operating Systems: Concepts and Practice
4th Edition, PHI(EEE), 2014.
4. William Stallings Operating Systems: Internals and Design Principles, 6th Edition,
Pearson, 2008
Reference Books:
1. Akshay Kulkarni, Adarsha Shivananda, “Natural Language Processing Recipes -
Unlocking Text Data with Machine Learning and Deep Learning using Python”, Apress,
2019.
2. T V Geetha, “Understanding Natural Language Processing – Machine Learning and
Deep Learning Perspectives”, Pearson, 2024.
@#$ 3
3. Gerald J. Kowalski and Mark.T. Maybury, “Information Storage and Retrieval systems”,
Kluwer Academic Publishers.
@#$ 4
TEMPLATE for AEC (if the course is a theory) Annexure-IV
(Chapters 1 & 2)
Module-2
Create the first android application: Directory Structure. Android User Interface:
Understanding the Components of a screen– Linear Layout – Absolute Layout – Frame.
Layout Relative Layout – Table Layout.
(Chapters 3 & 4)
Module-3
@#$ 1
TEMPLATE for AEC (if the course is a theory) Annexure-IV
Designing User Interface with View – Text View – Button – Image Button – Edit Text
Check Box – Toggle Button – Radio Button and Radio Group – Progress Bar – Auto
complete Text View – Spinner – List View – Grid View – Image View - Scroll View –
Custom Toast – Alert – Time and Date Picker.
(Chapter 5)
Module-4
Activity: Introduction – Intent – Intent filter – Activity life cycle – Broadcast life cycle
Service. Multimedia: Android System Architecture – Play Audio and Video – Text to
Speech.
(Chapters 6 & 7)
Module-5
SQLite Database in Android: SQLite Database – Creation and Connection of the database –
Transactions. Case Study: SMS Telephony and Location Based Services.
@#$ 2
TEMPLATE for AEC (if the course is a theory) Annexure-IV
@#$ 3
TEMPLATE for AEC (if the course is a theory) Annexure-IV
● .https://www.geeksforgeeks.org/android-tutorial/
● https://developer.android.com/
● https://www.tutorialspoint.com/android
● https://www.w3schools.blog/android-tutorial
@#$ 4
INTRODUCTION TO ARTIFICIAL INTELLIGENCE Semester 6
Course Code BAI654D CIE Marks 50
Teaching Hours/Week (L: T:P: S) 3:0:0:0 SEE Marks 50
Total Hours of Pedagogy 40 Total Marks 100
Credits 03 Exam Hours 03
Examination type (SEE) Theory
Course objectives:
● To understand the primitives of AI
● To familiarize Knowledge Representation Issues
● To understand fundamentals of Statistical Reasoning, Natural Language Processing.
Teaching-Learning Process (General Instructions)
These are sample strategies; which teachers can use to accelerate the attainment of the various
course outcomes.
1. Lecturer method (L) does not mean only the traditional lecture method, but different
types of teaching methods may be adopted to achieve the outcomes.
2. Utilize video/animation films to illustrate the functioning of various concepts.
3. Promote collaborative learning (Group Learning) in the class.
4. Pose at least three HOT (Higher Order Thinking) questions in the class to stimulate
critical thinking.
5. Incorporate Problem-Based Learning (PBL) to foster students' analytical skills and
develop their ability to evaluate, generalize, and analyze information rather than
merely recalling it.
6. Introduce topics through multiple representations.
7. Demonstrate various ways to solve the same problem and encourage students to devise
their own creative solutions.
8. Discuss the real-world applications of every concept to enhance students'
comprehension.
9. Use any of these methods: Chalk and board, Active Learning, Case Studies
Module-1
What is artificial intelligence? Problems, Problem Spaces, and search
Text Book 1: Ch 1, 2
Module-2
Knowledge Representation Issues, Using Predicate Logic, representing knowledge using
Rules.
Text Book 1: Ch 4, 5 and 6.
Module-3
Symbolic Reasoning under Uncertainty, Statistical reasoning
Text Book 1: Ch 7, 8
Module-4
Game Playing, Natural Language Processing
Text Book 1: Ch 12 and 15
Module-5
Learning, Expert Systems.
Text Book 1: Ch 17 and 20
@#$ 1
Course outcomes (Course Skill Set)
At the end of the course, the student will be able to:
1. Identify the problems where the adaptation of AI has significant impact.
2. Analyse the different approaches of Knowledge Representation.
3. Explain Symbolic Reasoning under Uncertainty and Statistical reasoning.
4. Derive the importance of different types of Learning Techniques.
5. Explain Natural Language Processing and Expert System.
Assessment Details (both CIE and SEE)
The weightage of Continuous Internal Evaluation (CIE) is 50% and for Semester End Exam
(SEE) is 50%. The minimum passing mark for the CIE is 40% of the maximum marks (20
marks out of 50) and for the SEE minimum passing mark is 35% of the maximum marks (18
out of 50 marks). A student shall be deemed to have satisfied the academic requirements and
earned the credits allotted to each subject/ course if the student secures a minimum of 40%
(40 marks out of 100) in the sum total of the CIE (Continuous Internal Evaluation) and SEE
(Semester End Examination) taken together.
Semester-End Examination:
Theory SEE will be conducted by University as per the scheduled timetable, with common
question papers for the course (duration 03 hours).
1. The question paper will have ten questions. Each question is set for 20 marks.
2. There will be 2 questions from each module. Each of the two questions under a module
(with a maximum of 3 sub-questions), should have a mix of topics under that module.
3. The students have to answer 5 full questions, selecting one full question from each
module.
4. Marks scored shall be proportionally reduced to 50 marks.
Suggested Learning Resources:
Text Books:
1. E. Rich, K. Knight & S. B. Nair, Artificial Intelligence, 3rd Edition, McGraw
Hill.,2009
Reference Books
2. Stuart Rusell, Peter Norving, Artificial Intelligence: A Modern Approach, 2nd Edition,
Pearson Education
@#$ 2
3. Dan W. Patterson, Introduction to Artificial Intelligence and Expert Systems, 1st
Edition,Prentice Hal of India, 2015
4. G. Luger, Artificial Intelligence: Structures and Strategies for complex problem
Solving, 4th Edition, Pearson Education, 2002.
5. N.P. Padhy “Artificial Intelligence and Intelligent Systems”, Oxford University Press,
2015
Web links and Video Lectures (e-Resources):
1. https://nptel.ac.in/courses/106102220
2. https://nptel.ac.in/courses/106105077
3. https://archive.nptel.ac.in/courses/106/105/106105158/
4. https://archive.nptel.ac.in/courses/106/106/106106140/
@#$ 3
Template for Practical Course and if AEC is a practical Course Annexure-V
Sl.NO Experiments
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
Deliverable:
A screenshot of the XSS payload executing and a short explanation of the potential
consequences.
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
Tasks:
- Use OWASP ZAP to spider and scan the application.
- Identify various vulnerabilities (XSS, SQLi, broken authentication, insecure direct object
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
Tasks:
- Consolidate all findings from previous experiments into a structured, professional VAPT
report.
- Include vulnerability descriptions, risk ratings, proofs of concept, and recommended
mitigations.
- Provide a roadmap for future hardening and security improvements
Deliverable:
A polished final report (PDF or Markdown) that can be understood by both management and
IT staff, outlining the security posture, identified weaknesses, and steps for remediation.
Course outcomes:
At the end of the course the student will be able to:
● Implement Network Reconnaissance , Vulnerability Scanning and assessment.
● Demonstrate the working of Password Cracking, Reporting and Remediation strateg.
● Implement Full web applications penetration Testing .
● Experiment with Cross Site Scripting Attacks and SQL Injection attacks.
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
Textbooks
1. M. Scheffler, Hacking and Security: The Comprehensive Guide to Penetration Testing and
Cybersecurity. Addison-Wesley, 2022.
2. M. Chapple and D. Seidl, CompTIA PenTest+ Study Guide: Exam PT0-002. Wiley, 2021.
Reference books
S. Rahalkar, Metasploit 5.0 for Beginners: Perform Penetration Testing to Secure Your IT
Environment Against Threats and Vulnerabilities. Packt Publishing, 2020.
Websites:
1. TryHackMe, "Cybersecurity Training Platform," [Online]. Available: https://tryhackme.com/.
2. Hack The Box, "Online Penetration Testing Lab," [Online]. Available:
https://www.hackthebox.com/.
Infrastructure Requirements:
A hypervisor (e.g., VirtualBox or VMware) installed on a host machine with at least 8 GB RAM, 250
GB of disk space, and internet connectivity for initial setup.
- A virtual network isolated from the host’s primary LAN to prevent unintended impact.
- Attacker VM: Kali Linux (latest version), pre-installed with common pentest tools.
- Target VMs
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
Sl.NO Experiments
NOTE: the experiments are to be carried out in a team of size 2 or 3.
1 Network Traffic Analysis in ICS/SCADA Systems
Scenario: A manufacturing plant experiences intermittent communication issues between its SCADA
system and field devices. IT suspects abnormal traffic patterns are overwhelming the network.
Objective: Use Wireshark to capture and analyze network traffic to detect anomalies such as
unauthorized Modbus commands or excessive network scanning.
Tools : Wireshark
Deliverables: A detailed report of the traffic analysis, highlighting malicious or unusual traffic patterns
and recommendations for mitigation.
Scenario: An oil refinery has deployed an IDS in its control room but has not tested its effectiveness.
Simulated attacks are needed to evaluate the IDS's detection capability.
Objective: Configure Snort with custom rules to detect unauthorized login attempts, PLC command
injections, or DoS attacks on the refinery’s network.
Tools: Snort
Deliverables: A configured IDS, attack simulation results, and a performance evaluation report.
Scenario: A power plant is transitioning to a new ICS network. The cybersecurity team must perform a
vulnerability assessment before the network goes live.
Objective: Scan the simulated ICS network for open ports, outdated software, and misconfigurations.
Tools: Nmap, OpenVAS
Deliverables: A vulnerability assessment report listing critical issues, potential exploitation risks, and
suggested fixes.
Scenario: A water treatment facility reports unauthorized access to its PLCs, leading to erroneous water
treatment settings. Students are tasked to secure the PLC environment.
Objective: Simulate unauthorized PLC access, implement secure configurations, and monitor PLC traffic
for anomalies.
Tools: OpenPLC, Wireshark
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
Scenario: An attacker compromises an engineering workstation and uses it to issue malicious commands
to ICS devices. Students must simulate this attack and propose defenses.
Objective: Perform simulated attacks such as PLC logic manipulation and denial-of-service, then
implement measures like firewall rules or intrusion prevention systems.
Tools: Metasploit Framework, Security Onion
Deliverables: A report describing the attack, its impact, and the defense mechanisms implemented.
Scenario: The web-based interface of a chemical plant’s ICS is suspected to have vulnerabilities that
attackers could exploit to alter chemical mix ratios.
Objective: Conduct a security assessment of the web interface for vulnerabilities like SQL injection, cross-
site scripting, and improper authentication mechanisms.
Tools: OWASP ZAP
Deliverables: A vulnerability scan report with remediation recommendations for the ICS web application.
Scenario: A logistics company faces unauthorized Modbus/TCP communication between its control
system and conveyor belt motors, disrupting operations.
Objective: Configure secure communication using encryption and analyze normal vs. malicious protocol
traffic.
Tools: OpenSSL, Wireshark
Deliverables: Secured Modbus/TCP communication setup and a comparative analysis of traffic logs.
Scenario: A simulated ransomware attack encrypts critical ICS files at a gas distribution station. Students
act as the incident response team.
Objective: Detect the ransomware, isolate affected systems, and recover operations using backup and
monitoring tools.
Tools: Security Onion, GRR
Deliverables: An incident response report, including root cause analysis and recovery steps.
9 Firewall and Access Control Configuration for ICS
Scenario: An unauthorized laptop connects to the ICS network at a steel factory and issues shutdown
commands to operational systems.
Objective: Implement access control policies and configure firewalls to block unauthorized devices and
restrict communication to trusted sources.
Tools: pfSense, ModSecurity
Deliverables: Firewall and access control configuration files, along with a report on unauthorized device
mitigation.
Scenario: A renewable energy plant wants to evaluate cybersecurity risks before connecting its wind
turbines to the grid.
Objective: Conduct a risk assessment considering hardware vulnerabilities, communication protocols,
and environmental factors. Propose a mitigation plan.
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
Textbooks:
1. P. Ackerman, Industrial Cybersecurity: Efficiently Secure Critical Infrastructure Systems. Packt Publishing, 2021.
2. T. Macaulay and B. Singer, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS. CRC
Press, 2012.
Reference Books:
1. C. Bodungen, B. Singer, A. Shbeeb, K. Wilhoit, and S. Hilt, Hacking Exposed Industrial Control Systems: ICS and
SCADA Security Secrets & Solutions. McGraw-Hill, 2017.
2. P. A. Craig Jr., Practical Industrial Cybersecurity: IT and OT Convergence. Wiley, 2021.
3. Ginter, SCADA Security: What’s Broken and How to Fix It. Waterfall Security Solutions, 2016.
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
REACT Semester 6
Course Code BCSL657B CIE Marks 50
Teaching Hours/Week (L:T:P: S) 0:0:1:0 SEE Marks 50
Credits 01 Exam Hours 100
Examination type (SEE) Practical
Course objectives:
● Enable students to develop React applications utilizing functional and class-based components, effectively
managing state with hooks and lifecycle methods .
● Introduce, how to pass data dynamically between parent and child components using props, ensuring modular
and reusable component design.
● Create dynamic and responsive applications, integrating forms, validation, task management systems, and styled
components.
● Use React Router for navigation, external API integration for dynamic data handling, and CSS styling techniques
for modern UI/UX design.
Sl.NO Experiments
1. Use create-react-app to set up a new project. Edit the App.js file to include a stateful component with useState.
Add an input field and a <h1> element that displays text based on the input. Dynamically update the <h1> content
as the user types.
2. Develop a React application that demonstrates the use of props to pass data from a parent component to child
components. The application should include the parent component named App that serves as the central container
for the application. Create two separate child components, Header: Displays the application title or heading. Footer:
Displays additional information, such as copyright details or a tagline. Pass data (e.g., title, tagline, or copyright
information) from the App component to the Header and Footer components using props. Ensure that the content
displayed in the Header and Footer components is dynamically updated based on the data received from the parent
component.
3. Create a Counter Application using React that demonstrates state management with the useState hook. Display the
current value of the counter prominently on the screen. Add buttons to increase and decrease the counter value.
Ensure the counter updates dynamically when the buttons are clicked. Use the useState hook to manage the
counter's state within the component. Prevent the counter from going below a specified minimum value (e.g., 0).
Add a "Reset" button to set the counter back to its initial value. Include functionality to specify a custom increment
or decrement step value.
4. Develop a To-Do List Application using React functional components that demonstrates the use of the useState
hook for state management. Create a functional component named ToDoFunction to manage and display the to-
do list. Maintain a list of tasks using state. Provide an input field for users to add new tasks. Dynamically render
the list of tasks below the input field. Ensure each task is displayed in a user-friendly manner. Allow users to
delete tasks from the list. Mark tasks as completed or pending, and visually differentiate them.
5. Develop a React application that demonstrates component composition and the use of props to pass data. Create
two components: FigureList: A parent component responsible for rendering multiple child components.
BasicFigure: A child component designed to display an image and its associated caption. Use the FigureList
component to dynamically render multiple BasicFigure components. Pass image URLs and captions as props from
the FigureList component to each BasicFigure component. Style the BasicFigure components to display the image
and caption in an aesthetically pleasing manner. Arrange the BasicFigure components within the FigureList in a
grid or list format. Allow users to add or remove images dynamically. Add hover effects or animations to the
images for an interactive experience.
6. Design and implement a React Form that collects user input for name, email, and password. Form Fields are
Name, Email, Password. Ensure all fields are filled before allowing form submission.Validate the email field to
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
ensure it follows the correct email format (e.g., [email protected]). Optionally enforce a minimum password
length or complexity. Display error messages for invalid or missing inputs. Provide visual cues (e.g., red borders)
to highlight invalid fields. Prevent form submission until all fields pass validation. Log or display the entered data
upon successful submission (optional). Add a "Show Password" toggle for the password field. Implement client-
side sanitization to ensure clean input.
7. Develop a React Application featuring a ProfileCard component to display a user's profile information, including
their name, profile picture, and bio. The component should demonstrate flexibility by utilizing both external CSS
and inline styling for its design. Display the following information: Profile picture, User's name, A short bio or
description Use an external CSS file for overall structure and primary styles, such as layout, colors, and typography.
Apply inline styles for dynamic or specific styling elements, such as background colors or alignment. Design the
ProfileCard to be visually appealing and responsive. Ensure the profile picture is displayed as a circle, and the
name and bio are appropriately styled. Add hover effects or animations to enhance interactivity. Allow the
background color of the card to change dynamically based on a prop or state.
8. Develop a Reminder Application that allows users to efficiently manage their tasks. The application should include
the following functionalities: Provide a form where users can add tasks along with due dates. The form includes
task name,Due date,An optional description. Display a list of tasks dynamically as they are added. Show relevant
details like task name, due date, and completion status. Include a filter option to allow users to view all Tasks and
Display all tasks regardless of status. Show only tasks marked as completed. Show only tasks that are not yet
completed.
9. Design a React application that demonstrates the implementation of routing using the react-router-dom
library. The application should include the Navigation Menu: Create a navigation bar with links to three
distinct pages, Home, About, Contact. Develop separate components for each page (Home, About, and
Contact) with appropriate content to differentiate them. Configure routes using react-router-dom to render
the corresponding page component based on the selected link. Use BrowserRouter and Route components
for routing. Highlight the active link in the navigation menu to indicate the current page
10 Design a React application featuring a class-based component that demonstrates the use of lifecycle
methods to interact with an external API. The component should fetch and update data dynamically based
on user interactions or state changes. Use the componentDidMount lifecycle method to fetch data from an
API when the component is initially rendered. Display the fetched data in a structured format, such as a table
or list. Use the componentDidUpdate lifecycle method to detect changes in the component's state or props.
Trigger additional API calls to update the displayed data based on user input or actions (e.g., filtering,
searching, or pagination). Implement error handling to manage issues such as failed API requests or empty
data responses. Display appropriate error messages to the user when necessary. Allow users to perform
actions like filtering, searching, or refreshing the data. Reflect changes in the displayed data based on these
interactions.
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
● Students can pick one question (experiment) from the questions lot prepared by the
examiners jointly.
● Evaluation of test write-up/ conduction procedure and result/viva will be conducted
jointly by examiners.
● General rubrics suggested for SEE are mentioned here, writeup-20%, Conduction procedure
and result in -60%, Viva-voce 20% of maximum marks. SEE for practical shall be evaluated for
100 marks and scored marks shall be scaled down to 50 marks (however, based on course
type, rubrics shall be decided by the examiners)
Change of experiment is allowed only once and 15% of Marks allotted to the procedure part
are to be made zero.
The minimum duration of SEE is 02 hours
Suggested Learning Resources:
Books:
1. Beginning React JS Foundations Building User Interfaces with ReactJS: An Approachable Guide, Chris
Minnick, Wiley publications , 2022.
2. Learning React Functional Web Development with React and Redux , Alex Banks, Eve Porcello · 2017
● https://www.youtube.com/watch?v=V9i3cGD-mts
● https://youtu.be/PHaECbrKgs0
● https://youtu.be/uvEAvxWvwOs
● https://www.geeksforgeeks.org/state-management-with-usestate-hook-in-react/
● https://youtu.be/KU-I2M9Jm68
● https://youtu.be/H63Pd_lXkeQ
● https://youtu.be/oTIJunBa6MA
● https://youtu.be/3EbYJrAOpUs
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
Generative AI Semester 6
Course Code BAIL657C CIE Marks 50
Teaching Hours/Week (L:T:P: S) 0:0:1:0 SEE Marks 50
Credits 01 Exam Hours 100
Examination type (SEE) Practical
Course objectives:
● Understand the principles and concepts behind generative AI models
● Explain the knowledge gained to implement generative models using Prompt design frameworks.
● Apply various Generative AI applications for increasing productivity.
● Develop Large Language Model-based Apps.
Sl.NO Experiments
1. Explore pre-trained word vectors. Explore word relationships using vector arithmetic. Perform arithmetic
operations and analyze results.
2. Use dimensionality reduction (e.g., PCA or t-SNE) to visualize word embeddings for Q 1. Select 10 words from a
specific domain (e.g., sports, technology) and visualize their embeddings. Analyze clusters and relationships.
Generate contextually rich outputs using embeddings. Write a program to generate 5 semantically similar words
for a given input.
3. Train a custom Word2Vec model on a small dataset. Train embeddings on a domain-specific corpus (e.g., legal,
medical) and analyze how embeddings capture domain-specific semantics.
4. Use word embeddings to improve prompts for Generative AI model. Retrieve similar words using word
embeddings. Use the similar words to enrich a GenAI prompt. Use the AI model to generate responses for the
original and enriched prompts. Compare the outputs in terms of detail and relevance.
5. Use word embeddings to create meaningful sentences for creative tasks. Retrieve similar words for a seed word.
Create a sentence or story using these words as a starting point. Write a program that: Takes a seed word. Generates
similar words. Constructs a short paragraph using these words.
6. Use a pre-trained Hugging Face model to analyze sentiment in text. Assume a real-world application, Load the
sentiment analysis pipeline. Analyze the sentiment by giving sentences to input.
7. Summarize long texts using a pre-trained summarization model using Hugging face model. Load the
summarization pipeline. Take a passage as input and obtain the summarized text.
8. Install langchain, cohere (for key), langchain-community. Get the api key( By logging into Cohere and obtaining
the cohere key). Load a text document from your google drive . Create a prompt template to display the output in
a particular manner.
9. Take the Institution name as input. Use Pydantic to define the schema for the desired output and create a custom
output parser. Invoke the Chain and Fetch Results. Extract the below Institution related details from Wikipedia:
The founder of the Institution. When it was founded. The current branches in the institution . How many
employees are working in it. A brief 4-line summary of the institution.
10 Build a chatbot for the Indian Penal Code. We'll start by downloading the official Indian Penal Code document,
and then we'll create a chatbot that can interact with it. Users will be able to ask questions about the Indian Penal
Code and have a conversation with it.
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
● The examination schedule and names of examiners are informed to the university before
the conduction of the examination. These practical examinations are to be conducted
between the schedule mentioned in the academic calendar of the University.
● All laboratory experiments are to be included for practical examination.
● (Rubrics) Breakup of marks and the instructions printed on the cover page of the answer
script to be strictly adhered to by the examiners. OR based on the course requirement
evaluation rubrics shall be decided jointly by examiners.
● Students can pick one question (experiment) from the questions lot prepared by the
examiners jointly.
● Evaluation of test write-up/ conduction procedure and result/viva will be conducted
jointly by examiners.
● General rubrics suggested for SEE are mentioned here, writeup-20%, Conduction procedure
and result in -60%, Viva-voce 20% of maximum marks. SEE for practical shall be evaluated for
100 marks and scored marks shall be scaled down to 50 marks (however, based on course
type, rubrics shall be decided by the examiners)
Change of experiment is allowed only once and 15% of Marks allotted to the procedure part
are to be made zero.
The minimum duration of SEE is 02 hours
Suggested Learning Resources:
Books:
1. Modern Generative AI with ChatGPT and OpenAI Models: Leverage the Capabilities of OpenAI's LLM for
Productivity and Innovation with GPT3 and GPT4, by Valentina Alto, Packt Publishing Ltd, 2023.
2. Generative AI for Cloud Solutions: Architect modern AI LLMs in secure, scalable, and ethical cloud
environments, by Paul Singh, Anurag Karuparti ,Packt Publishing Ltd, 2024.
● https://www.w3schools.com/gen_ai/index.php
● https://youtu.be/eTPiL3DF27U
● https://youtu.be/je6AlVeGOV0
● https://youtu.be/RLVqsA8ns6k
● https://youtu.be/0SAKM7wiC-A
● https://youtu.be/28_9xMyrdjg
● https://youtu.be/8iuiz-c-EBw
● https://youtu.be/7oQ8VtEKcgE
● https://youtu.be/seXp0VWWZV0
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
DEVOPS Semester 6
Course Code BCSL657D CIE Marks 50
Teaching Hours/Week (L:T:P: S) 0:0:2:0 SEE Marks 50
Credits 01 Exam Hours 100
Examination type (SEE) Practical
Course objectives:
● To introduce DevOps terminology, definition & concepts
● To understand the different Version control tools like Git, Mercurial
● To understand the concepts of Continuous Integration/ Continuous Testing/ Continuous Deployment)
● To understand Configuration management using Ansible
● Illustrate the benefits and drive the adoption of cloud-based Devops tools to solve real world problems
Sl.NO Experiments
1 Introduction to Maven and Gradle: Overview of Build Automation Tools, Key
Differences Between Maven and Gradle, Installation and Setup
2 Working with Maven: Creating a Maven Project, Understanding the POM File,
Dependency Management and Plugins
3 Working with Gradle: Setting Up a Gradle Project, Understanding Build Scripts
(Groovy and Kotlin DSL), Dependency Management and Task Automation
4 Practical Exercise: Build and Run a Java Application with Maven, Migrate the
Same Application to Gradle
5 Introduction to Jenkins: What is Jenkins?, Installing Jenkins on Local or Cloud
Environment, Configuring Jenkins for First Use
6 Continuous Integration with Jenkins: Setting Up a CI Pipeline, Integrating
Jenkins with Maven/Gradle, Running Automated Builds and Tests
7 Configuration Management with Ansible: Basics of Ansible: Inventory,
Playbooks, and Modules, Automating Server Configurations with Playbooks, Hands-On: Writing
and Running a Basic Playbook
8 Practical Exercise: Set Up a Jenkins CI Pipeline for a Maven Project,
Use Ansible to Deploy Artifacts Generated by Jenkins
9 Introduction to Azure DevOps: Overview of Azure DevOps Services, Setting Up an Azure
DevOps Account and Project
10 Creating Build Pipelines: Building a Maven/Gradle Project with Azure Pipelines,
Integrating Code Repositories (e.g., GitHub, Azure Repos), Running Unit Tests and Generating
Reports
11 Creating Release Pipelines: Deploying Applications to Azure App Services, Managing Secrets
and Configuration with Azure Key Vault, Hands-On:
Continuous Deployment with Azure Pipelines
12 Practical Exercise and Wrap-Up: Build and Deploy a Complete DevOps
Pipeline, Discussion on Best Practices and Q&A
Course outcomes (Course Skill Set):
At the end of the course the student will be able to:
● Demonstrate different actions performed through Version control tools like Git.
● Perform Continuous Integration and Continuous Testing and Continuous Deployment using Jenkins by
building and automating test cases using Maven & Gradle.
● Experiment with configuration management using Ansible.
● Demonstrate Cloud-based DevOps tools using Azure DevOps.
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
@#$
Template for Practical Course and if AEC is a practical Course Annexure-V
● Students can pick one question (experiment) from the questions lot prepared by the
examiners jointly.
● Evaluation of test write-up/ conduction procedure and result/viva will be conducted
jointly by examiners.
● General rubrics suggested for SEE are mentioned here, writeup-20%, Conduction procedure
and result in -60%, Viva-voce 20% of maximum marks. SEE for practical shall be evaluated for
100 marks and scored marks shall be scaled down to 50 marks (however, based on course
type, rubrics shall be decided by the examiners)
Change of experiment is allowed only once and 15% of Marks allotted to the procedure part
are to be made zero.
The minimum duration of SEE is 02 hours
Suggested Learning Resources:
● https://www.geeksforgeeks.org/devops-tutorial/
● https://www.javatpoint.com/devops
● https://www.youtube.com/watch?v=2N-59wUIPVI
● https://www.youtube.com/watch?v=87ZqwoFeO88
@#$