HEAD
New Scheme Based On AICTE Flexible Curricula
Bluetooth, Firewalls.
Socket Programming using C/C++
Network System Administration: Understanding switches and routers
Study & demo of all networking equipments and Functionalities.
Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc. LAN installations and Configurations.
Network System Administration: Understanding switches and routers.
Network configuration commands using Linux.
Implementation of various error detection and correction mechanisms.
Implementation of various framing methods.
Implementation of various error flow control mechanisms.
Study and Installation of Standard Network Simulator: NS-2, NS-3, OpNet, QualNet etc. Observing Packets across the network and Performance Analysis of Routing protocols.
Implement & simulate various types of routing algorithm.
Socket programming (TCP and UDP) – Multi client chatting.
Develop a DNS client server to resolve the given host name or IP address.
Configure 802.11 WLAN.
Implementation of Layers for security protocols - SSL/TLS.
Study & Simulation of MAC Protocols like Aloha, CSMA, CSMA/CD and CSMA/CA using Standard Network Simulators.
Study of Application layer protocols-DNS, HTTP, HTTPS, FTP and TelNet.
Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education.
William Stallings, “Data and computer communications” Pearson Education India.
Perlman, R., Kaufman, C., and Speciner, M. (2016). Network security: private communication in a public world. Pearson Education India.
Stevens, W. R., Fenner, B., and Rudoff, A. M. (2018). UNIX Network Programming Volume SMIT-SMU.
Douglas E Comer, “Internetworking With Tcp/Ip Principles, Protocols, And Architecture - Volume I" 6th Edition, Pearson Education.
Dhanashree K. Toradmalle "Computer Networks and Network Design", Wiley India
Dimitri Bertsekas, Robert Gallager, “Data Networks”, PHI Publication, Second Edition.
Kaveh Pahlavan, Prashant Krishnamurthy, “Networking Fundamentals”, Wiley Publication.
Uyless Black, “Computer Networks”, PHI Publication, Second Edition.
Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source Approach”, McGraw Hill.
New Scheme Based On AICTE Flexible Curricula
Overview of Security Parameters: Confidentiality, integrity and availability; Security violation and threats; Security policy and procedure; Assumptions and Trust; Security Assurance, Implementation and Operational Issues; Security Life Cycle.
Access Control Models: Discretionary, mandatory, role-based and task-based models, unified models, access control algebra, temporal and spatio-temporal models.
Security Policies: Confidentiality policies, integrity policies, hybrid policies, non-interference and policy composition, international standards.
Systems Design: Design principles, representing identity, control of access and information flow, confinement problem. Assurance: Building systems with assurance, formal methods, evaluating systems.
Logic-based System: Malicious logic, vulnerability analysis, auditing, intrusion detection. Applications: Network security, operating system security, user security, program security. Special Topics: Data privacy, introduction to digital forensics, enterprise security specification.
Operating Systems Security: Security Architecture, Analysis of Security in Linux/Windows. Database Security: Security Architecture, Enterprise security, Database auditing.
Analysis of security in Unix/Linux.
Administration of users, password policies, privileges and roles
Analysis of security in Unix/Linux.
Administration of users, password policies, privileges and roles.
Implementation of discretionary access control and mandatory access control.
Demonstrate intrusion detection system (ids) using any tool Eg. Snort or any other software.
Implementation of IT audit, malware analysis and vulnerability assessment and generate the report.
Implementation of mobile audit and generate the report of the existing artifacts.
Implementation of OS hardening and RAM dump analysis to collect the artifacts and other information.
Implementation of digital forensics tools for disk imaging, data acquisition, data extraction and data analysis and recovery.
Perform mobile analysis in the form of retrieving call logs, SMS log, and all contacts list using the forensics tool like SAFT.
Implementation to identify web vulnerabilities, using OWASP project.
R. Anderson, “Security engineering”. John Wiley & Sons, 2008.
M. Bishop, “Computer Security: Art and Science”, Pearson Education
M. Stamp, “Information security: principles and practice”. John Wiley & Sons, 2014.
William Stallings, “Cryptography and Network Security Principles and Practice” Fourth Edition, Pearson Education.
C. P. Pfleeger, S. L. Pfleeger, J. Margulies, “Security in Computing”, Prentice Hall of India.
D. A Wheeler, Secure programming HOWTO, 2017.
C K Shyamala, N Harini, Dr. T R Padmanabhan, "Cryptography and Security", Wiley India
M. Zalewski, Google browser security handbook, 2009.
M. Gertz, & S. Jajodia, “Handbook of database security: applications and trends”, Springer Science & Business Media, 2007.
William Stallings, “Network Security Essentials: Applications and Standards”, Prentice Hall.
Behrouz A Ferouzan, “Cryptography and Network Security”, Tata Mc Graw Hills.
Jonathan Katz and Yehuda Lindell, “Introduction to Modern Cryptography”, Chapman and Hall/CRC
New Scheme Based On AICTE Flexible Curricula
Introduction, Overview of Artificial intelligence: Problems of AI, AI technique, Tic-Tac-Toe problem. Intelligent Agents, Agents & environment, nature of environment, structure of agents, goal based agents, utility based agents, learning agents.
Problem Solving, Problems, Problem Space & search: Defining the problem as state space search, production system, problem characteristics, issues in the design of search programs.
Search techniques: Problem solving agents, searching for solutions; uniform search strategies: breadth first search, depth first search, depth limited search, bidirectional search, comparing uniform search strategies. Heuristic search strategies Greedy best-first search, A* search, AO* search, memory bounded heuristic search: local search algorithms & optimization problems: Hill climbing search, simulated annealing search, local beam search
Constraint satisfaction problems: Local search for constraint satisfaction problems. Adversarial search, Games, optimal decisions & strategies in games, the minimax search procedure, alpha-beta pruning, additional refinements, iterative deepening.
Knowledge & reasoning: Knowledge representation issues, representation & mapping, approaches to knowledge representation. Using predicate logic, representing simple fact in logic, representing instant & ISA relationship, computable functions & predicates, resolution, natural deduction. Representing knowledge using rules, Procedural verses declarative knowledge, logic programming, forward verses backward reasoning, matching, control knowledge.
Probabilistic reasoning: Representing knowledge in an uncertain domain, the semantics of Bayesian networks, Dempster-Shafer theory, Planning Overview, components of a planning system, Goal stack planning, Hierarchical planning, other planning techniques.
Expert Systems: Representing and using domain knowledge, expert system shells, and knowledge acquisition.
Implementation of Breadth First Search.
Implementation of Depth First Search.
Implementation of Tic-Tac-Toe game.
Implementation of A* algorithm
Implementation of 8-Puzzle problem.
Implementation of Water-Jug problem.
Implementation of Travelling Salesman Problem.
Implementation of Monkey Banana Problem.
Implementation of N-Queens Problem.
Implementation of Unification and Resolution Algorithm
Implementation of Backward Chaining
Implementing Artificial Neural Networks for an application using python.
Implementation of Blocks World program
Implementation of SVM for an application using python.
Implementation of K-mean algorithm.
Stuart Russell and Peter Norvig, “Artificial Intelligence: A Modern Approach”, Pearson education.
Elaine Rich, Kevin Knight, Shivashankar B. Nair, “Artificial Intelligence”, Tata McGraw Hill.
Dan W. Patterson, “Introduction to Artificial Intelligence and Expert Systems”, Prentice India.
Dr. Nilakshi Jain, "Artificial Intelligence, As per AICTE: Making a System Intelligent", Wiley India
Nils J. Nilson, “Principles of Artificial Intelligence”, Narosa Publishing House.
William F. Clocksin, Christopher S. Mellish, “Programming in PROLOG”, Narosa Publishing House.
M. Sasikumar, S. Ramani etc. “Rule based Expert System”, Narosa Publishing House.
Lavika Goel, "Artificial Intelligence: Concepts and Applications", Wiley India
New Scheme Based On AICTE Flexible Curricula
Accounting Concept: Introduction, Techniques and Conventions, Financial Statements- Understanding & Interpreting Financial Statements. Company Accounts and Annual Reports- Audit Reports and Statutory Requirements, Directors Report, Notes to Accounts, Pitfalls.
Accounting Process: Book Keeping and Record Maintenance, Fundamental Principles and Double Entry, Journal, Ledger, Trial Balance, Balance Sheet, Final Accounts, Cash Book and Subsidiary Books, Rectification of Errors.
Financial Statements: Form and Contents of Financial Statements, Analyzing and Interpreting Financial Statements, Accounting Standards.
Class Discussion: Corporate Accounting Fraud- A Case Study of Satyam
Cash Flow and Fund Flow Techniques: Introduction, How to prepare, Difference between them.
Costing Systems: Elements of Cost, Cost Behaviour, Cost Allocation, OH Allocation, Unit Costing, Process Costing, Job Costing, Absorption Costing, Marginal Costing, Cost Volume Profit Analysis, Budgets, ABC Analysis
Class Discussion: Application of costing concepts in the Service Sector.
Robert N Anthony, David Hawkins, Kenneth Marchant, “Accounting: Texts and Cases”, Thirteenth Edition, McGraw-Hill, 2017.
M.Y. Khan & P.K. Jain, “Management Accounting”, Tata McGraw Hill, 2011.
R. Narayanaswamy, “Financial Accounting – A managerial perspective”, Fifth Edition, PHI Learning, New Delhi, 2011.
S.M. Shukla, "Financial Accounting", Sahitya Bhawan Publications.
K. L. Gupta, Dr. S.P. Gupta, "Management & Cost Accounting", Sahitya Bhawan Publications.
Jan Williams, “Financial and Managerial Accounting – The basis for business Decisions”, Fifteenth Edition, Tata McGraw Hill Publishers, 2010.
Horngren, Surdem, Stratton, Burgstahler, Schatzberg, “Introduction to Management Accounting”, Sixteenth Edition, PHI Learning, 2014.
New Scheme Based On AICTE Flexible Curricula
Activity: Group business proposals – presentation of proposal – Story telling using charts and graphs (demonstrative speech).
Activity: Any two Anubhaav activities – 10 ways to build Emotional Intelligence by Daniel Goleman – Mock interview.
Activity: Creating posters with stress management tips – open house discussion on challenges of time management – Tracking time activity.
Activity: Discussion & Role play in diversity – Ubuntu story of social responsibility – creating audio embedded PPT on the concept of social responsibility.
Activity: Pitch in start-up idea – watching videos of public speaking – Finding similarities among world famous speeches – watching videos of Sw. Vivekananda’s speech – Martin Luther King’s My Dream speech.
Shalini Kalia, Shailja Agarwal, "Business Communication: A Practice-Oriented Approach", Wiley India
Arthur H. Bell, Dayle M. Smith, K M Baharul Islam, "Business Communication, 3ed (An Indian Adaptation)", Wiley India
https://economictimes.indiatimes.com/tata-success-story-is-based-on-humanity- philanthropy-and-ethics/articleshow/41766592.cms
https://youtu.be/reu8rzD6ZAE
https://youtu.be/Wx9v_J34Fyo
https://youtu.be/F2hc2FLOdhI
https://youtu.be/wHGqp8lz36c
https://youtu.be/hxS5He3KVEM
New Scheme Based On AICTE Flexible Curricula
Build a Self-Driving Robot that can automatically follow a line.
Build a basic obstacle-avoiding robot and improve the design to help it avoid getting stuck.
Build a Humanoid Robot.
Autonomous Robot Navigation using Computer Vision for exhaustive path-finding.
A Mobile Autonomous Chemical Detecting Robot.
Build a voice controlled robot.
Web-Controlled Mobile Video-Enabled Robotic Litter Collection Device.
Utilizing Artificial Neural Networks to Create a Learning Robot.
Hospital Sanitizing Robot.
Autonomous Robotic Vehicle: Saving lives, preventing accidents one at a time.
Build a robot with Python and 3D Printed Robotic Arm.
Build an Intelligent Irrigation Control System.
AI-powered Hearing Aid.
Fire Extinguishing Robot.
Remote Operated Spy Robot Circuit.
Saeed Benjamin Niku, “Introduction to Robotics: Analysis, Control, Applications”, Wiley Publishers, 2nd edition, 2011.
Simon J. D. Prince, “Computer Vision: Models, Learning, and Inference”, Cambridge University Press, 2012.
Francis X. Govers,” Artificial Intelligence for Robotics: Build Intelligent Robots that Perform Human Tasks Using AI Techniques”, Packt publishing, 2018.
Krishnendu Kar, “Mastering Computer Vision with TensorFlow 2.x: Build Advanced Computer Vision Applications Using Machine Learning and Deep Learning Techniques”, Packt publishing, 2020.
Armando Vieira, Bernardete Ribeiro,” Introduction to Deep Learning Business Applications for Developers from Conversational Bots in Customer Service to Medical Image processing”,Apress, 2018.
Steve Heath, "Embedded System Design 2nd Edition", EDN Series for Design Engineers, 2003
New Scheme Based On AICTE Flexible Curricula
History of the Internet & World- Wide Web, Web Browsers, Web Servers, Uniform Resource Locator, Tools and Web Programming Languages. Web Standards, Categories of Web Applications, Characteristics of Web Applications, Tiered Architecture.
HTML: Basic HTML page, Text Formatting, Table, Headers, Linking, Images, List, Meta Elements.
CSS: Inline, Internal and External Style Sheet, Bootstrap-CSS Text, CSS forms, CSS components drop down.
JavaScript: Introduction to Java Scripts, Objects in Java Script, Dynamic HTML with Java Script, Bootstrap- JS Alert, JS Button, JS popover.
XML: Introduction, Structuring Data, Document Type Definition, XML Vocabularies, Document Object Model (DOM) with JavaScript, Extensible Stylesheet Language Transforms (XSL).
Introduction to PHP, Numbers and Strings, Literals and Variables, Operators and Functions, arrays. Creating PHP Programs,.
PHP Form: Creating Form Controls, Using Values Returned From, Forms Using PHP - User Authentication: Creating Session, Authorization Level.
PHP Database Connectivity: Connecting to MySQL Server, Selecting Databases, Checking for Errors, Closing the MySQL Server Connection.
Manipulating Data in MySQL Using PHP: Inserting, Viewing, Updating and Deleting Records, Manipulating joined tables.
User Authentication: Creating Session, Authorization Level.
Design static web pages required for an online grocery store web site using HTML and CSS.
Design a web page with the following using HTML:
To embed a map in a web page.
To fix the hot spots in that map.
Show all the related information when the hot spots are clicked.
Embed an image map picture (India map) on a Web page that provides different links to other Web pages (different states) and show the all the related information depending on where a user clicks on the image.
Design a webpage to embed a human body image, identify and display all the related information about the human body parts (head, eye, nose, finger etc.) based on the user clicks on the human body image map.
Design a HTML page with frames, links, tables and other tags for highlighting the facilities in the Department in your College.
Design a web page for online cloths store with the following:
Cascading style sheets.
Embedded style sheets.
Inline style sheets.
Write a JavaScript program to validate the fields required for book Store -
Registration page.
Create and Validate the Login page.
After successful login, update the book details dynamically.
Write an XML file which will display the Book information which includes the following: Title of the book, Author Name, ISBN number, Publisher name, Edition, Price
Write PHP Program to for Book Store.
Registration Page and
Login Page
Define Cart to select books and number of books, maintain Session for the page.
Validate the Session data before completing the Order.
Write a PHP Code to make database connection and perform various CRUD operations.
Design a website for health and Fitness.
Deitel P. J., Deitel H. M. and Deitel A., “Internet and World Wide Web: How to Program”, Fifth Edition, Pearson Prentice Hall, 2012.
Jon Duckett, “HTML & CSS: Design and Build Websites”, First Edition, John Wiley & Sons, 2011.
Naramore E., Gerner J., Scouarnec Y.L., et al., “Beginning PHP5, Apache, MySQL Web Development: Programmer to Programmer”, John Wiley & Sons Inc., 2005.
Sebesta R. W.,” Programming the World Wide Web”, Eight Edition, Pearson, 2014.
Pressman R. and Lowe D.,” Web Engineering: a practitioner's approach”, First Edition, McGrawHill, 2008.
Kappel G., et al.,” Web Engineering: The Discipline of systematic Development of Web Applications”, First Edition, John Wiley & Sons, 2006.
Suh W., “Web Engineering: Principles and Techniques”, Idea Group Inc., 2005.
Ullman L ,” PHP for the Web: Visual Quick Start Guide”, Fifth Edition, Peach pit Press,2016.
New Scheme Based On AICTE Flexible Curricula
Installing Weka and exploring a dataset.
Create a Weather Table with the help of WEKA tool.
Apply Pre-Processing techniques to the training data set of Weather Table.
Normalize Weather Table data using Knowledge Flow.
Implement A-priori algorithm.
Implement FP Growth algorithm.
Implement Decision Tree learning.
Implement linear regression technique for statistical model building.
Implement Non-linear regression technique for statistical model building.
Implement Logistic Regression.
Implement classification using Multilayer perceptron.
Implement Bagging using Random Forests
Implement Bayesian networks
Implement K-Mean algorithm.
Jiawei Han and Micheline Kamber, “Data Mining: Concepts and Techniques”, Morgan Kaufmann Publishers, 3rd ed, 2010.
Lior Rokach and Oded Maimon, “Data Mining and Knowledge Discovery Handbook”, Springer, 2nd edition, 2010.
Daniel T. Larose, O.P. Wali, "Data Mining and Predictive Analytics, 2ed (An Indian Adaptation)", Wiley India
Box, G.E.P and Jenkins G.M. (1970) Time Series Analysis, Forecasting and Control, Holden-Day.
Draper, N. R. and Smith, H. (1998). Applied Regression Analysis (John Wiley) Third Edition.
Hosmer, D. W. and Lemeshow, S. (1989). Applied Logistic Regression (Wiley).
New Scheme Based On AICTE Flexible Curricula
The Internship-III is to be completed anytime during Fifth/Sixth semester. Its evaluation/credit will be added in Seventh Semester. Students can opt for Industry on their level and can go for internship. The student can choose internship based on their choice. There will be a faculty coordinator and a coordinator from the industry who will monitor student during internship. A detailed report on Internship III shall be submitted during the Seventh semester at the department level for its final evaluation.
New Scheme Based On AICTE Flexible Curricula
The Minor Project-II is to be taken up with relevance to Industry and solve any real life problem. The supervisor continuously assesses the students during their project development process. At the end of the semester, Minor Project-II shall be presented at the department level for final evaluation. The Minor Project-II report shall be presented before Project Review Committee.
=======New Scheme Based On AICTE Flexible Curricula
Bluetooth, Firewalls.
Socket Programming using C/C++
Network System Administration: Understanding switches and routers
Study & demo of all networking equipments and Functionalities.
Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc. LAN installations and Configurations.
Network System Administration: Understanding switches and routers.
Network configuration commands using Linux.
Implementation of various error detection and correction mechanisms.
Implementation of various framing methods.
Implementation of various error flow control mechanisms.
Study and Installation of Standard Network Simulator: NS-2, NS-3, OpNet, QualNet etc. Observing Packets across the network and Performance Analysis of Routing protocols.
Implement & simulate various types of routing algorithm.
Socket programming (TCP and UDP) – Multi client chatting.
Develop a DNS client server to resolve the given host name or IP address.
Configure 802.11 WLAN.
Implementation of Layers for security protocols - SSL/TLS.
Study & Simulation of MAC Protocols like Aloha, CSMA, CSMA/CD and CSMA/CA using Standard Network Simulators.
Study of Application layer protocols-DNS, HTTP, HTTPS, FTP and TelNet.
Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education.
William Stallings, “Data and computer communications” Pearson Education India.
Perlman, R., Kaufman, C., and Speciner, M. (2016). Network security: private communication in a public world. Pearson Education India.
Stevens, W. R., Fenner, B., and Rudoff, A. M. (2018). UNIX Network Programming Volume SMIT-SMU.
Douglas E Comer, “Internetworking With Tcp/Ip Principles, Protocols, And Architecture - Volume I" 6th Edition, Pearson Education.
Dhanashree K. Toradmalle "Computer Networks and Network Design", Wiley India
Dimitri Bertsekas, Robert Gallager, “Data Networks”, PHI Publication, Second Edition.
Kaveh Pahlavan, Prashant Krishnamurthy, “Networking Fundamentals”, Wiley Publication.
Uyless Black, “Computer Networks”, PHI Publication, Second Edition.
Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source Approach”, McGraw Hill.
New Scheme Based On AICTE Flexible Curricula
Overview of Security Parameters: Confidentiality, integrity and availability; Security violation and threats; Security policy and procedure; Assumptions and Trust; Security Assurance, Implementation and Operational Issues; Security Life Cycle.
Access Control Models: Discretionary, mandatory, role-based and task-based models, unified models, access control algebra, temporal and spatio-temporal models.
Security Policies: Confidentiality policies, integrity policies, hybrid policies, non-interference and policy composition, international standards.
Systems Design: Design principles, representing identity, control of access and information flow, confinement problem. Assurance: Building systems with assurance, formal methods, evaluating systems.
Logic-based System: Malicious logic, vulnerability analysis, auditing, intrusion detection. Applications: Network security, operating system security, user security, program security. Special Topics: Data privacy, introduction to digital forensics, enterprise security specification.
Operating Systems Security: Security Architecture, Analysis of Security in Linux/Windows. Database Security: Security Architecture, Enterprise security, Database auditing.
Analysis of security in Unix/Linux.
Administration of users, password policies, privileges and roles
Analysis of security in Unix/Linux.
Administration of users, password policies, privileges and roles.
Implementation of discretionary access control and mandatory access control.
Demonstrate intrusion detection system (ids) using any tool Eg. Snort or any other software.
Implementation of IT audit, malware analysis and vulnerability assessment and generate the report.
Implementation of mobile audit and generate the report of the existing artifacts.
Implementation of OS hardening and RAM dump analysis to collect the artifacts and other information.
Implementation of digital forensics tools for disk imaging, data acquisition, data extraction and data analysis and recovery.
Perform mobile analysis in the form of retrieving call logs, SMS log, and all contacts list using the forensics tool like SAFT.
Implementation to identify web vulnerabilities, using OWASP project.
R. Anderson, “Security engineering”. John Wiley & Sons, 2008.
M. Bishop, “Computer Security: Art and Science”, Pearson Education
M. Stamp, “Information security: principles and practice”. John Wiley & Sons, 2014.
William Stallings, “Cryptography and Network Security Principles and Practice” Fourth Edition, Pearson Education.
C. P. Pfleeger, S. L. Pfleeger, J. Margulies, “Security in Computing”, Prentice Hall of India.
D. A Wheeler, Secure programming HOWTO, 2017.
C K Shyamala, N Harini, Dr. T R Padmanabhan, "Cryptography and Security", Wiley India
M. Zalewski, Google browser security handbook, 2009.
M. Gertz, & S. Jajodia, “Handbook of database security: applications and trends”, Springer Science & Business Media, 2007.
William Stallings, “Network Security Essentials: Applications and Standards”, Prentice Hall.
Behrouz A Ferouzan, “Cryptography and Network Security”, Tata Mc Graw Hills.
Jonathan Katz and Yehuda Lindell, “Introduction to Modern Cryptography”, Chapman and Hall/CRC
New Scheme Based On AICTE Flexible Curricula
Introduction, Overview of Artificial intelligence: Problems of AI, AI technique, Tic-Tac-Toe problem. Intelligent Agents, Agents & environment, nature of environment, structure of agents, goal based agents, utility based agents, learning agents.
Problem Solving, Problems, Problem Space & search: Defining the problem as state space search, production system, problem characteristics, issues in the design of search programs.
Search techniques: Problem solving agents, searching for solutions; uniform search strategies: breadth first search, depth first search, depth limited search, bidirectional search, comparing uniform search strategies. Heuristic search strategies Greedy best-first search, A* search, AO* search, memory bounded heuristic search: local search algorithms & optimization problems: Hill climbing search, simulated annealing search, local beam search
Constraint satisfaction problems: Local search for constraint satisfaction problems. Adversarial search, Games, optimal decisions & strategies in games, the minimax search procedure, alpha-beta pruning, additional refinements, iterative deepening.
Knowledge & reasoning: Knowledge representation issues, representation & mapping, approaches to knowledge representation. Using predicate logic, representing simple fact in logic, representing instant & ISA relationship, computable functions & predicates, resolution, natural deduction. Representing knowledge using rules, Procedural verses declarative knowledge, logic programming, forward verses backward reasoning, matching, control knowledge.
Probabilistic reasoning: Representing knowledge in an uncertain domain, the semantics of Bayesian networks, Dempster-Shafer theory, Planning Overview, components of a planning system, Goal stack planning, Hierarchical planning, other planning techniques.
Expert Systems: Representing and using domain knowledge, expert system shells, and knowledge acquisition.
Implementation of Breadth First Search.
Implementation of Depth First Search.
Implementation of Tic-Tac-Toe game.
Implementation of A* algorithm
Implementation of 8-Puzzle problem.
Implementation of Water-Jug problem.
Implementation of Travelling Salesman Problem.
Implementation of Monkey Banana Problem.
Implementation of N-Queens Problem.
Implementation of Unification and Resolution Algorithm
Implementation of Backward Chaining
Implementing Artificial Neural Networks for an application using python.
Implementation of Blocks World program
Implementation of SVM for an application using python.
Implementation of K-mean algorithm.
Stuart Russell and Peter Norvig, “Artificial Intelligence: A Modern Approach”, Pearson education.
Elaine Rich, Kevin Knight, Shivashankar B. Nair, “Artificial Intelligence”, Tata McGraw Hill.
Dan W. Patterson, “Introduction to Artificial Intelligence and Expert Systems”, Prentice India.
Dr. Nilakshi Jain, "Artificial Intelligence, As per AICTE: Making a System Intelligent", Wiley India
Nils J. Nilson, “Principles of Artificial Intelligence”, Narosa Publishing House.
William F. Clocksin, Christopher S. Mellish, “Programming in PROLOG”, Narosa Publishing House.
M. Sasikumar, S. Ramani etc. “Rule based Expert System”, Narosa Publishing House.
Lavika Goel, "Artificial Intelligence: Concepts and Applications", Wiley India
New Scheme Based On AICTE Flexible Curricula
Accounting Concept: Introduction, Techniques and Conventions, Financial Statements- Understanding & Interpreting Financial Statements. Company Accounts and Annual Reports- Audit Reports and Statutory Requirements, Directors Report, Notes to Accounts, Pitfalls.
Accounting Process: Book Keeping and Record Maintenance, Fundamental Principles and Double Entry, Journal, Ledger, Trial Balance, Balance Sheet, Final Accounts, Cash Book and Subsidiary Books, Rectification of Errors.
Financial Statements: Form and Contents of Financial Statements, Analyzing and Interpreting Financial Statements, Accounting Standards.
Class Discussion: Corporate Accounting Fraud- A Case Study of Satyam
Cash Flow and Fund Flow Techniques: Introduction, How to prepare, Difference between them.
Costing Systems: Elements of Cost, Cost Behaviour, Cost Allocation, OH Allocation, Unit Costing, Process Costing, Job Costing, Absorption Costing, Marginal Costing, Cost Volume Profit Analysis, Budgets, ABC Analysis
Class Discussion: Application of costing concepts in the Service Sector.
Robert N Anthony, David Hawkins, Kenneth Marchant, “Accounting: Texts and Cases”, Thirteenth Edition, McGraw-Hill, 2017.
M.Y. Khan & P.K. Jain, “Management Accounting”, Tata McGraw Hill, 2011.
R. Narayanaswamy, “Financial Accounting – A managerial perspective”, Fifth Edition, PHI Learning, New Delhi, 2011.
S.M. Shukla, "Financial Accounting", Sahitya Bhawan Publications.
K. L. Gupta, Dr. S.P. Gupta, "Management & Cost Accounting", Sahitya Bhawan Publications.
Jan Williams, “Financial and Managerial Accounting – The basis for business Decisions”, Fifteenth Edition, Tata McGraw Hill Publishers, 2010.
Horngren, Surdem, Stratton, Burgstahler, Schatzberg, “Introduction to Management Accounting”, Sixteenth Edition, PHI Learning, 2014.
New Scheme Based On AICTE Flexible Curricula
Activity: Group business proposals – presentation of proposal – Story telling using charts and graphs (demonstrative speech).
Activity: Any two Anubhaav activities – 10 ways to build Emotional Intelligence by Daniel Goleman – Mock interview.
Activity: Creating posters with stress management tips – open house discussion on challenges of time management – Tracking time activity.
Activity: Discussion & Role play in diversity – Ubuntu story of social responsibility – creating audio embedded PPT on the concept of social responsibility.
Activity: Pitch in start-up idea – watching videos of public speaking – Finding similarities among world famous speeches – watching videos of Sw. Vivekananda’s speech – Martin Luther King’s My Dream speech.
Shalini Kalia, Shailja Agarwal, "Business Communication: A Practice-Oriented Approach", Wiley India
Arthur H. Bell, Dayle M. Smith, K M Baharul Islam, "Business Communication, 3ed (An Indian Adaptation)", Wiley India
https://economictimes.indiatimes.com/tata-success-story-is-based-on-humanity- philanthropy-and-ethics/articleshow/41766592.cms
https://youtu.be/reu8rzD6ZAE
https://youtu.be/Wx9v_J34Fyo
https://youtu.be/F2hc2FLOdhI
https://youtu.be/wHGqp8lz36c
https://youtu.be/hxS5He3KVEM
New Scheme Based On AICTE Flexible Curricula
Build a Self-Driving Robot that can automatically follow a line.
Build a basic obstacle-avoiding robot and improve the design to help it avoid getting stuck.
Build a Humanoid Robot.
Autonomous Robot Navigation using Computer Vision for exhaustive path-finding.
A Mobile Autonomous Chemical Detecting Robot.
Build a voice controlled robot.
Web-Controlled Mobile Video-Enabled Robotic Litter Collection Device.
Utilizing Artificial Neural Networks to Create a Learning Robot.
Hospital Sanitizing Robot.
Autonomous Robotic Vehicle: Saving lives, preventing accidents one at a time.
Build a robot with Python and 3D Printed Robotic Arm.
Build an Intelligent Irrigation Control System.
AI-powered Hearing Aid.
Fire Extinguishing Robot.
Remote Operated Spy Robot Circuit.
Saeed Benjamin Niku, “Introduction to Robotics: Analysis, Control, Applications”, Wiley Publishers, 2nd edition, 2011.
Simon J. D. Prince, “Computer Vision: Models, Learning, and Inference”, Cambridge University Press, 2012.
Francis X. Govers,” Artificial Intelligence for Robotics: Build Intelligent Robots that Perform Human Tasks Using AI Techniques”, Packt publishing, 2018.
Krishnendu Kar, “Mastering Computer Vision with TensorFlow 2.x: Build Advanced Computer Vision Applications Using Machine Learning and Deep Learning Techniques”, Packt publishing, 2020.
Armando Vieira, Bernardete Ribeiro,” Introduction to Deep Learning Business Applications for Developers from Conversational Bots in Customer Service to Medical Image processing”,Apress, 2018.
Steve Heath, "Embedded System Design 2nd Edition", EDN Series for Design Engineers, 2003
New Scheme Based On AICTE Flexible Curricula
History of the Internet & World- Wide Web, Web Browsers, Web Servers, Uniform Resource Locator, Tools and Web Programming Languages. Web Standards, Categories of Web Applications, Characteristics of Web Applications, Tiered Architecture.
HTML: Basic HTML page, Text Formatting, Table, Headers, Linking, Images, List, Meta Elements.
CSS: Inline, Internal and External Style Sheet, Bootstrap-CSS Text, CSS forms, CSS components drop down.
JavaScript: Introduction to Java Scripts, Objects in Java Script, Dynamic HTML with Java Script, Bootstrap- JS Alert, JS Button, JS popover.
XML: Introduction, Structuring Data, Document Type Definition, XML Vocabularies, Document Object Model (DOM) with JavaScript, Extensible Stylesheet Language Transforms (XSL).
Introduction to PHP, Numbers and Strings, Literals and Variables, Operators and Functions, arrays. Creating PHP Programs,.
PHP Form: Creating Form Controls, Using Values Returned From, Forms Using PHP - User Authentication: Creating Session, Authorization Level.
PHP Database Connectivity: Connecting to MySQL Server, Selecting Databases, Checking for Errors, Closing the MySQL Server Connection.
Manipulating Data in MySQL Using PHP: Inserting, Viewing, Updating and Deleting Records, Manipulating joined tables.
User Authentication: Creating Session, Authorization Level.
Design static web pages required for an online grocery store web site using HTML and CSS.
Design a web page with the following using HTML:
To embed a map in a web page.
To fix the hot spots in that map.
Show all the related information when the hot spots are clicked.
Embed an image map picture (India map) on a Web page that provides different links to other Web pages (different states) and show the all the related information depending on where a user clicks on the image.
Design a webpage to embed a human body image, identify and display all the related information about the human body parts (head, eye, nose, finger etc.) based on the user clicks on the human body image map.
Design a HTML page with frames, links, tables and other tags for highlighting the facilities in the Department in your College.
Design a web page for online cloths store with the following:
Cascading style sheets.
Embedded style sheets.
Inline style sheets.
Write a JavaScript program to validate the fields required for book Store -
Registration page.
Create and Validate the Login page.
After successful login, update the book details dynamically.
Write an XML file which will display the Book information which includes the following: Title of the book, Author Name, ISBN number, Publisher name, Edition, Price
Write PHP Program to for Book Store.
Registration Page and
Login Page
Define Cart to select books and number of books, maintain Session for the page.
Validate the Session data before completing the Order.
Write a PHP Code to make database connection and perform various CRUD operations.
Design a website for health and Fitness.
Deitel P. J., Deitel H. M. and Deitel A., “Internet and World Wide Web: How to Program”, Fifth Edition, Pearson Prentice Hall, 2012.
Jon Duckett, “HTML & CSS: Design and Build Websites”, First Edition, John Wiley & Sons, 2011.
Naramore E., Gerner J., Scouarnec Y.L., et al., “Beginning PHP5, Apache, MySQL Web Development: Programmer to Programmer”, John Wiley & Sons Inc., 2005.
Sebesta R. W.,” Programming the World Wide Web”, Eight Edition, Pearson, 2014.
Pressman R. and Lowe D.,” Web Engineering: a practitioner's approach”, First Edition, McGrawHill, 2008.
Kappel G., et al.,” Web Engineering: The Discipline of systematic Development of Web Applications”, First Edition, John Wiley & Sons, 2006.
Suh W., “Web Engineering: Principles and Techniques”, Idea Group Inc., 2005.
Ullman L ,” PHP for the Web: Visual Quick Start Guide”, Fifth Edition, Peach pit Press,2016.
New Scheme Based On AICTE Flexible Curricula
Installing Weka and exploring a dataset.
Create a Weather Table with the help of WEKA tool.
Apply Pre-Processing techniques to the training data set of Weather Table.
Normalize Weather Table data using Knowledge Flow.
Implement A-priori algorithm.
Implement FP Growth algorithm.
Implement Decision Tree learning.
Implement linear regression technique for statistical model building.
Implement Non-linear regression technique for statistical model building.
Implement Logistic Regression.
Implement classification using Multilayer perceptron.
Implement Bagging using Random Forests
Implement Bayesian networks
Implement K-Mean algorithm.
Jiawei Han and Micheline Kamber, “Data Mining: Concepts and Techniques”, Morgan Kaufmann Publishers, 3rd ed, 2010.
Lior Rokach and Oded Maimon, “Data Mining and Knowledge Discovery Handbook”, Springer, 2nd edition, 2010.
Daniel T. Larose, O.P. Wali, "Data Mining and Predictive Analytics, 2ed (An Indian Adaptation)", Wiley India
Box, G.E.P and Jenkins G.M. (1970) Time Series Analysis, Forecasting and Control, Holden-Day.
Draper, N. R. and Smith, H. (1998). Applied Regression Analysis (John Wiley) Third Edition.
Hosmer, D. W. and Lemeshow, S. (1989). Applied Logistic Regression (Wiley).
New Scheme Based On AICTE Flexible Curricula
The Internship-III is to be completed anytime during Fifth/Sixth semester. Its evaluation/credit will be added in Seventh Semester. Students can opt for Industry on their level and can go for internship. The student can choose internship based on their choice. There will be a faculty coordinator and a coordinator from the industry who will monitor student during internship. A detailed report on Internship III shall be submitted during the Seventh semester at the department level for its final evaluation.
New Scheme Based On AICTE Flexible Curricula
The Minor Project-II is to be taken up with relevance to Industry and solve any real life problem. The supervisor continuously assesses the students during their project development process. At the end of the semester, Minor Project-II shall be presented at the department level for final evaluation. The Minor Project-II report shall be presented before Project Review Committee.
>>>>>>> html