HEAD
New Scheme Based On AICTE Flexible Curricula Information Technology, VII- semester
The objective of this course is to familiarize the students with different soft computing tools to use them to be able to solve complex problems
S.N. Shivnandam, “Principle of soft computing”, Wiley.
S. Rajshekaran and G.A.V. Pai, “Neural Network , Fuzzy logic And Genetic Algorithm”, PHI.
Jack M. Zurada, “Introduction to Artificial Neural Network System” JAico Publication.
Simon Haykins, “Neural Network- A Comprehensive Foudation”
Timothy J.Ross, “Fuzzy logic with Engineering Applications”, McGraw-Hills 1.
Form a perceptron net for basic logic gates with binary input and output.
Using Adaline net, generate XOR function with bipolar inputs and targets.
Calculation of new weights for a Back propagation network, given the values of input pattern, output pattern, target output, learning rate and activation function.
Design fuzzy inference system for a given problem.
Maximize the function y =3x2 + 2 for some given values of x using Genetic algorithm.
Implement Travelling salesman problem using Genetic Algorithm.
Optimisation of problem like Job shop scheduling using Genetic algorithm
After the completion of this course, the students will be able to:
Understand concept of ANN and explain the XOR problem
Use supervised neural networks to classify given inputs
Understand unsupervised neural networks for clustering data .
Build Fuzzy inference system using concepts of fuzzy logic.
Obtain an optimized solution to a given problem using genetic algorithm.
New Scheme Based On AICTE Flexible Curricula Information Technology, VII-Semester Departmental Elective IT 702(A) Data Science
The objective of this course is to familiarize students with the roles of a data scientist and enable them to analyze data to derive meaningful information from it.
EMC Education Services, “Data Science and Big Data Analytics”, Wiley, 2015.
Judith Hurwitz, Alan Nugent, Fern Halper, and Marcia Kaufman, “Big Data for Dummies”,Wiley & Sons, 2013.
VigneshPrajapati, “Big Data Analytics with R and Hadoop” ,Packt Publishing, 2013.
David Dietrich, Barry Heller, and Beibei Yang“Data Science and Big Data Analytics:Discovering, Analyzing, Visualizing and Presenting Data”, John Wiley & Sons, Inc.
After the completion of this course, the students will be able to:
Demonstrate proficiency with statistical analysis of data.
Build and assess data-based models.
Execute statistical analyses with professional statistical software.
Demonstrate skill in data management.
Apply data science concepts and methods to solve problems in real-world contexts and will communicate these solutions effectively
New Scheme Based On AICTE Flexible Curricula Information Technology, VII-Semester Departmental Elective IT 702(B) Cloud Computing
The objective of this course is to provide students with the comprehensive and in-depth knowledge of Cloud Computing concepts, technologies, architecture and applications.
Introduction of Grid and Cloud computing, characteristics, components, business and IT perspective, cloud services requirements, cloud models, Security in public model, public verses private clouds, Cloud computing platforms: Amazon EC2,Platform as Service: Google App Engine, Microsoft Azure, Utility Computing, Elastic Computing.
Cloud services- SAAS, PAAS, IAAS, cloud design and implementation using SOA, conceptual cloud model, cloud stack, computing on demand, Information life cycle management, cloud analytics, information security, virtual desktop infrastructure, storage cloud.
Virtualization technology: Definition, benefits, sensor virtualization, HVM, study of hypervisor, logical partitioning- LPAR, Storage virtualization, SAN, NAS, cloud server virtualization, virtualized data center.
Cloud security fundamentals, Vulnerability assessment tool for cloud, Privacy and Security in cloud, Cloud computing security architecture: Architectural Considerations- General Issues, Trusted Cloud computing, Secure Execution Environments and Communications, Micro- architectures; Identity Management and Access control-Identity management, Access control, Autonomic Security, Cloud computing security challenges: Virtualization security management- virtual threats, VM Security Recommendations, VM-Specific Security techniques, Secure Execution Environments and Communications in cloud.
SOA and cloud, SOA and IAAS, cloud infrastructure benchmarks, OLAP, business intelligence, e-Business, ISV, Cloud performance monitoring commands, issues in cloud computing. QOS issues in cloud, mobile cloud computing, Inter cloud issues, Sky computing, Cloud Computing Platform, Xen Cloud Platform, Eucalyptus, OpenNebula, Nimbus, TPlatform, Apache Virtual Computing Lab (VCL), Anomaly Elastic Computing Platform.
Dr.Kumar Saurabh, “Cloud Computing”, Wiley India.
Ronald Krutz and Russell Dean Vines, “Cloud Security”, Wiley-India.
Judith Hurwitz, R.Bloor, M.Kanfman, F.Halper, “Computing for Dummies”, Wiley India Edition.
Anthony T.Velte Toby J.Velte, “Cloud Computing – A Practical Approach”, TMH.
Barrie Sosinsky, ‘Cloud Computing Bible”, Wiley India.
After the completion of this course, the students will be able to:
Explain the core concepts of the cloud computing paradigm
Explain the core issues of cloud computing such as security, privacy, and interoperability. Choose the appropriate technologies, algorithms, and approaches for the related issues.
Identify problems, and explain, analyze, and evaluate various cloud computing solutions.
Demonstrate knowledge of virtualization 3.
4.
New Scheme Based On AICTE Flexible Curricula Information Technology, VII-Semester
The objective of this course is to
introduce students to basic simulation methods and tools for modeling and
simulation of continuous, discrete and combined systems. The objective is to impart knowledge of simulation principles. The ability to create simulation models of various types.
Deo, Narsing “System Simulation with Digital Computers”
Gorden G, “System Simulation”, Prentice Hall
Shridhar Bhai Trivedi, Kishore “Probability & Statistics with reliability Queuing, Computer Science Applications”
Payer, T.A., “Introduction to System Simulation”, McGraw Hill
Reitman, J, “Computer Simulation Application”, Wiley
Barnes B, “Modeling and Performance Measurement of Computer System
Spriet, WIA. “Computer Aided Modeling and Simulation (Academic Press).
After the completion of this course, the students will be able to:
Define, describe and apply basic concepts related to modeling, identification and simulation
Classify various simulation models and give practical examples for each category.
Demonstrate the ability to apply knowledge of probability and statistics for simulation & modeling,
Generate and test random numbers and apply them to develop simulation models.
Construct a model for a given set of data and motivate its validity.
New Scheme Based On AICTE Flexible Curricula Information Technology, VII-Semester
The objective of this course is to provide students a general introduction of Virtual and Augmented Environments followed by an analysis of features, requirement and issues in real-life applications.
John Vince, “Virtual Reality Systems “, Pearson Education Asia, 2007.
Anand R., “Augmented and Virtual Reality”, Khanna Publishing House, Delhi.
Adams, “Visualizations of Virtual Reality”, Tata McGraw Hill, 2000.
Grigore C. Burdea, Philippe Coiffet , “Virtual Reality Technology”, Wiley Inter Science, 2 nd Edition, 2006.
William R. Sherman, Alan B. Craig, “Understanding Virtual Reality: Interface, Application and Design”, Morgan Kaufmann, 2008.
Alan B Craig, William R Sherman and Jeffrey D Will, Developing Virtual Reality Applications: Foundations of Effective Design, Morgan Kaufmann, 2009.
Gerard Jounghyun Kim, Designing Virtual Systems: The Structured Approach, 2005.
Alan B. Craig, Understanding Augmented Reality, Concepts and Applications, Morgan Kaufmann, 2013.
After the completion of this course, the students will be able to:
Demonstrate knowledge of virtual reality and its applications
To describe the importance of viewing and projections.
Understand geometric modeling and Virtual environment.
Explain about virtual reality hardware and software
Develop Virtual Reality applications.
New Scheme Based On AICTE Flexible Curricula Information Technology, VII-Semester
The objective of this course is to emphasize the importance of cyber laws and digital forensics, and to prepare students to conduct a digital investigation in an organized and systematic way.
The Indian Cyber law with Cyber glossary, Suresh T. Vishwanathan, New Delhi, Bhart Law House, 2000.
Law of Cyber Crimes and Information Technology Law, S.V. JogaRao, 2007.
Cory Altheide, Harlan Carvey, Digital Forensics with Open Source Tools, Syngress imprint of Elsevier.
Bill Nelson, Amelia Phillips, Christopher Steuart, “Guide to Computer Forensics and Investigations”, Fourth Edition, Course Technology.
Angus M. Marshall, “Digital forensics: Digital evidence in criminal investigation”, John – Wiley and Sons, 2008.
Nina Godbole and Sunit Belapure– Cyber Security, Wiley India Publication.
Nina Godbole, Information system security, Wiley India Publication.
Information Warfare: Corporate attack and defense in digital world, William
After the completion of this course, the students will be able to:
Become aware of various cyber crimes and cyber laws
Underline the need of digital forensic and role of digital evidences
Understand different types of digital evidences that can be presented to support investigations
List the methods to generate legal evidence and supporting investigation reports
Use various digital forensic tools
New Scheme Based On AICTE Flexible Curricula Information Technology, VII-Semester
The objective of this course is to provide an understanding of the technologies and the standards relating to the Internet of Things and to develop skills on IoT technical planning.
Vijay Madisetti, Arshdeep Bahga, “Ïnternet of Things, A Hands on Approach”, University Press
Dr. SRN Reddy, Rachit Thukral and Manasi Mishra, “Introduction to Internet of Things: A practical Approach”, ETI Labs
Pethuru Raj and Anupama C. Raman, “The Internet of Things: Enabling Technologies, Platforms, and Use Cases”, CRC Press
Jeeva Jose, “Internet of Things”, Khanna Publishing House, Delhi
Adrian McEwen, “Designing the Internet of Things”, Wiley
Raj Kamal, “Internet of Things: Architecture and Design”, McGraw Hill
Cuno Pfister, “Getting Started with the Internet of Things”, O Reilly Media
After the completion of this course, the students will be able to:
Understand Internet of Things and its hardware and software components
Interface I/O devices, sensors & communication modules
Analyze data from various sources in real-time and take necessary actions in an intelligent fashion
Remotely monitor data and control devices
Develop real life IoT based projects
New Scheme Based On AICTE Flexible Curricula Information Technology, VII-Semester
The objective of this course is to focus on the importance of social network analysis and to
students for analyzing social media and networking data.
enhance skills of
- Reality mining - Context - Awareness - Privacy in online social networks - Trust in online environment - Trust models based on subjective logic - Trust network analysis - Trust transitivity analysis - Combining trust and reputation - Trust derivation based on trust comparisons - Attack spectrum and countermeasures.
Ajith Abraham, Aboul Ella Hassanien, Václav Snášel, ―Computational Social Network Analysis: Trends,
Tools and Research Advances‖, Springer, 2012
Borko Furht, ―Handbook of Social Network Technologies and Applications‖, Springer, 1st edition, 2011
Charu C. Aggarwal, ―Social Network Data Analytics‖, Springer; 2014
Giles, Mark Smith, John Yen, ―Advances in Social Network Mining and Analysis‖, Springer, 2010.
Guandong Xu , Yanchun Zhang and Lin Li, ―Web Mining and Social Networking – Techniques and applications‖, Springer, 1st edition, 2012
Peter Mika, ―Social Networks and the Semantic Web, Springer, 1st edition, 2007.
Przemyslaw Kazienko, Nitesh Chawla,‖Applications of Social Media and Social Network Analysis‖,
Springer,2015
Maksim Tsvetovat and Alexander Kouznetsov , “Social Network Analysis for Startups”, O’Reilly Media, 2011.
Charles Kadushin, “Understanding Social Networks”, Oxford University Press, 2012
Social Network Analysis: Theory and Applications
After the completion of this course, the students will be able to:
Understand the importance of social media and networks
Have skills for analyzing social media and networking data
Visualize social networks
Plan and execute a small-scale network analysis project.
Create real-life case studies using social media data 5.
New Scheme Based On AICTE Flexible Curricula
The objective of this course is to describe and explain basic principles of digital image processing.
R.C Gonzalez & Richard E Wood, “Digital Image Processing”, Addison Wesley Publishing
Anil K Jain, “Fundamentals of Digital image processing”. PHI.
Sonka, Hlavac, Boyle, “Digital image processing and computer vision”, Cengage learning, India Edition.
B Chanda, D. Dutta Majumder, “Digital image Processing and Analysis”, PHI.
After the completion of this course, the students will be able to:
Explain basic concepts of image processing.
Have knowledge of techniques employed for the enhancement of images
Categorize image compression techniques
Interpret image segmentation and representation techniques.
Develop any image processing application
New Scheme Based On AICTE Flexible Curricula Information Technology, VII- semester
The objective of this course is to make students understand Cloud computing concepts and the installation of different cloud simulation tools/ cloud setup tools.
Study of cloud computing concepts
Using Eucalyptus or Open Nebula or equivalent to set up the cloud
Find procedure to run the virtual machine of different configuration.
Check how many virtual machines can be utilized at particular time.
Install a C compiler in the virtual machine and execute a sample program.
Show the virtual machine migration based on the certain condition from one node to the other.
To develop web applications in cloud
To learn the design and development process involved in creating a cloud based application
To learn to implement and use parallel programming using Hadoop
Install Virtualbox/VMware Workstation with different flavours of linux or windows OS on top of windows 7 or 8.
Install a C compiler in the virtual machine created using virtual box and execute Simple Programs
Install Google App Engine. Create hello world app and other simple web applications using python/java.
Use GAE launcher to launch the web applications.
Simulate a cloud scenario using CloudSim.
Implementation of various scheduling mechanisms using open source cloud simulator.
Find a procedure to transfer the files from one virtual machine to another virtual machine.
Find a procedure to launch virtual machine using trystack (Online Openstack Demo Version)
Install Hadoop single node cluster and run simple applications like wordcount
On completion of this course, the students will be able to:
Configure various virtualization tools such as Virtual Box, VMware workstation.
Design and deploy a web application in a PaaS environment.
Learn how to simulate a cloud environment to implement new schedulers.
Install and use a generic cloud environment that can be used as a private cloud.
Manipulate large data sets in a parallel environment.
New Scheme Based On AICTE Flexible Curricula Information Technology, VII- semester
The objective of this course is to to create a competitive industry required IoT skill in students.
Familiarization with Arduino/Raspberry Pi and perform necessary software installation.
To interface LED/Buzzer with Arduino/Raspberry Pi and write a program to turn ON LED for 1 sec after every 2 seconds.
To interface Push button/Digital sensor (IR/LDR) with Arduino/Raspberry Pi and write a program to turn ON LED when push button is pressed or at sensor detection.
To interface DHT11 sensor with Arduino/Raspberry Pi and write a program to print temperature and humidity readings.
To interface motor using relay with Arduino/Raspberry Pi and write a program to turn ON motor when push button is pressed.
To interface OLED with Arduino/Raspberry Pi and write a program to print temperature and humidity readings on it.
To interface Bluetooth with Arduino/Raspberry Pi and write a program to send sensor data to smartphone using Bluetooth.
To interface Bluetooth with Arduino/Raspberry Pi and write a program to turn LED ON/OFF when ‘1’/’0’ is received from smartphone using Bluetooth.
Write a program on Arduino/Raspberry Pi to upload temperature and humidity data to thingspeak cloud.
Write a program on Arduino/Raspberry Pi to retrieve temperature and humidity data from thingspeak cloud.
To install MySQL database on Raspberry Pi and perform basic SQL queries.
Write a program on Arduino/Raspberry Pi to publish temperature data to MQTT broker.
Write a program on Arduino/Raspberry Pi to subscribe to MQTT broker for temperature data and print it.
Write a program to create TCP server on Arduino/Raspberry Pi and respond with humidity data to TCP client when requested.
Write a program to create UDP server on Arduino/Raspberry Pi and respond with humidity data to UDP client when requested.
On completion of this course, the students will be able to:
Have understanding of Arduino/Raspberry Pi
Apply the skills learned by designing, building, and testing a microcontroller-based embedded system
Publishing/Subscribing to connect, collect data, monitor and manage assets
Remotely monitor data and control devices
Perform experiments and mini projects on IoT
New Scheme Based On AICTE Flexible Curricula Information Technology, VII- semester
The objective of this course is to familiarize the students with different soft computing tools to use them to be able to solve complex problems
S.N. Shivnandam, “Principle of soft computing”, Wiley.
S. Rajshekaran and G.A.V. Pai, “Neural Network , Fuzzy logic And Genetic Algorithm”, PHI.
Jack M. Zurada, “Introduction to Artificial Neural Network System” JAico Publication.
Simon Haykins, “Neural Network- A Comprehensive Foudation”
Timothy J.Ross, “Fuzzy logic with Engineering Applications”, McGraw-Hills 1.
Form a perceptron net for basic logic gates with binary input and output.
Using Adaline net, generate XOR function with bipolar inputs and targets.
Calculation of new weights for a Back propagation network, given the values of input pattern, output pattern, target output, learning rate and activation function.
Design fuzzy inference system for a given problem.
Maximize the function y =3x2 + 2 for some given values of x using Genetic algorithm.
Implement Travelling salesman problem using Genetic Algorithm.
Optimisation of problem like Job shop scheduling using Genetic algorithm
After the completion of this course, the students will be able to:
Understand concept of ANN and explain the XOR problem
Use supervised neural networks to classify given inputs
Understand unsupervised neural networks for clustering data .
Build Fuzzy inference system using concepts of fuzzy logic.
Obtain an optimized solution to a given problem using genetic algorithm.
New Scheme Based On AICTE Flexible Curricula Information Technology, VII-Semester Departmental Elective IT 702(A) Data Science
The objective of this course is to familiarize students with the roles of a data scientist and enable them to analyze data to derive meaningful information from it.
EMC Education Services, “Data Science and Big Data Analytics”, Wiley, 2015.
Judith Hurwitz, Alan Nugent, Fern Halper, and Marcia Kaufman, “Big Data for Dummies”,Wiley & Sons, 2013.
VigneshPrajapati, “Big Data Analytics with R and Hadoop” ,Packt Publishing, 2013.
David Dietrich, Barry Heller, and Beibei Yang“Data Science and Big Data Analytics:Discovering, Analyzing, Visualizing and Presenting Data”, John Wiley & Sons, Inc.
After the completion of this course, the students will be able to:
Demonstrate proficiency with statistical analysis of data.
Build and assess data-based models.
Execute statistical analyses with professional statistical software.
Demonstrate skill in data management.
Apply data science concepts and methods to solve problems in real-world contexts and will communicate these solutions effectively
New Scheme Based On AICTE Flexible Curricula Information Technology, VII-Semester Departmental Elective IT 702(B) Cloud Computing
The objective of this course is to provide students with the comprehensive and in-depth knowledge of Cloud Computing concepts, technologies, architecture and applications.
Introduction of Grid and Cloud computing, characteristics, components, business and IT perspective, cloud services requirements, cloud models, Security in public model, public verses private clouds, Cloud computing platforms: Amazon EC2,Platform as Service: Google App Engine, Microsoft Azure, Utility Computing, Elastic Computing.
Cloud services- SAAS, PAAS, IAAS, cloud design and implementation using SOA, conceptual cloud model, cloud stack, computing on demand, Information life cycle management, cloud analytics, information security, virtual desktop infrastructure, storage cloud.
Virtualization technology: Definition, benefits, sensor virtualization, HVM, study of hypervisor, logical partitioning- LPAR, Storage virtualization, SAN, NAS, cloud server virtualization, virtualized data center.
Cloud security fundamentals, Vulnerability assessment tool for cloud, Privacy and Security in cloud, Cloud computing security architecture: Architectural Considerations- General Issues, Trusted Cloud computing, Secure Execution Environments and Communications, Micro- architectures; Identity Management and Access control-Identity management, Access control, Autonomic Security, Cloud computing security challenges: Virtualization security management- virtual threats, VM Security Recommendations, VM-Specific Security techniques, Secure Execution Environments and Communications in cloud.
SOA and cloud, SOA and IAAS, cloud infrastructure benchmarks, OLAP, business intelligence, e-Business, ISV, Cloud performance monitoring commands, issues in cloud computing. QOS issues in cloud, mobile cloud computing, Inter cloud issues, Sky computing, Cloud Computing Platform, Xen Cloud Platform, Eucalyptus, OpenNebula, Nimbus, TPlatform, Apache Virtual Computing Lab (VCL), Anomaly Elastic Computing Platform.
Dr.Kumar Saurabh, “Cloud Computing”, Wiley India.
Ronald Krutz and Russell Dean Vines, “Cloud Security”, Wiley-India.
Judith Hurwitz, R.Bloor, M.Kanfman, F.Halper, “Computing for Dummies”, Wiley India Edition.
Anthony T.Velte Toby J.Velte, “Cloud Computing – A Practical Approach”, TMH.
Barrie Sosinsky, ‘Cloud Computing Bible”, Wiley India.
After the completion of this course, the students will be able to:
Explain the core concepts of the cloud computing paradigm
Explain the core issues of cloud computing such as security, privacy, and interoperability. Choose the appropriate technologies, algorithms, and approaches for the related issues.
Identify problems, and explain, analyze, and evaluate various cloud computing solutions.
Demonstrate knowledge of virtualization 3.
4.
New Scheme Based On AICTE Flexible Curricula Information Technology, VII-Semester
The objective of this course is to
introduce students to basic simulation methods and tools for modeling and
simulation of continuous, discrete and combined systems. The objective is to impart knowledge of simulation principles. The ability to create simulation models of various types.
Deo, Narsing “System Simulation with Digital Computers”
Gorden G, “System Simulation”, Prentice Hall
Shridhar Bhai Trivedi, Kishore “Probability & Statistics with reliability Queuing, Computer Science Applications”
Payer, T.A., “Introduction to System Simulation”, McGraw Hill
Reitman, J, “Computer Simulation Application”, Wiley
Barnes B, “Modeling and Performance Measurement of Computer System
Spriet, WIA. “Computer Aided Modeling and Simulation (Academic Press).
After the completion of this course, the students will be able to:
Define, describe and apply basic concepts related to modeling, identification and simulation
Classify various simulation models and give practical examples for each category.
Demonstrate the ability to apply knowledge of probability and statistics for simulation & modeling,
Generate and test random numbers and apply them to develop simulation models.
Construct a model for a given set of data and motivate its validity.
New Scheme Based On AICTE Flexible Curricula Information Technology, VII-Semester
The objective of this course is to provide students a general introduction of Virtual and Augmented Environments followed by an analysis of features, requirement and issues in real-life applications.
John Vince, “Virtual Reality Systems “, Pearson Education Asia, 2007.
Anand R., “Augmented and Virtual Reality”, Khanna Publishing House, Delhi.
Adams, “Visualizations of Virtual Reality”, Tata McGraw Hill, 2000.
Grigore C. Burdea, Philippe Coiffet , “Virtual Reality Technology”, Wiley Inter Science, 2 nd Edition, 2006.
William R. Sherman, Alan B. Craig, “Understanding Virtual Reality: Interface, Application and Design”, Morgan Kaufmann, 2008.
Alan B Craig, William R Sherman and Jeffrey D Will, Developing Virtual Reality Applications: Foundations of Effective Design, Morgan Kaufmann, 2009.
Gerard Jounghyun Kim, Designing Virtual Systems: The Structured Approach, 2005.
Alan B. Craig, Understanding Augmented Reality, Concepts and Applications, Morgan Kaufmann, 2013.
After the completion of this course, the students will be able to:
Demonstrate knowledge of virtual reality and its applications
To describe the importance of viewing and projections.
Understand geometric modeling and Virtual environment.
Explain about virtual reality hardware and software
Develop Virtual Reality applications.
New Scheme Based On AICTE Flexible Curricula Information Technology, VII-Semester
The objective of this course is to emphasize the importance of cyber laws and digital forensics, and to prepare students to conduct a digital investigation in an organized and systematic way.
The Indian Cyber law with Cyber glossary, Suresh T. Vishwanathan, New Delhi, Bhart Law House, 2000.
Law of Cyber Crimes and Information Technology Law, S.V. JogaRao, 2007.
Cory Altheide, Harlan Carvey, Digital Forensics with Open Source Tools, Syngress imprint of Elsevier.
Bill Nelson, Amelia Phillips, Christopher Steuart, “Guide to Computer Forensics and Investigations”, Fourth Edition, Course Technology.
Angus M. Marshall, “Digital forensics: Digital evidence in criminal investigation”, John – Wiley and Sons, 2008.
Nina Godbole and Sunit Belapure– Cyber Security, Wiley India Publication.
Nina Godbole, Information system security, Wiley India Publication.
Information Warfare: Corporate attack and defense in digital world, William
After the completion of this course, the students will be able to:
Become aware of various cyber crimes and cyber laws
Underline the need of digital forensic and role of digital evidences
Understand different types of digital evidences that can be presented to support investigations
List the methods to generate legal evidence and supporting investigation reports
Use various digital forensic tools
New Scheme Based On AICTE Flexible Curricula Information Technology, VII-Semester
The objective of this course is to provide an understanding of the technologies and the standards relating to the Internet of Things and to develop skills on IoT technical planning.
Vijay Madisetti, Arshdeep Bahga, “Ïnternet of Things, A Hands on Approach”, University Press
Dr. SRN Reddy, Rachit Thukral and Manasi Mishra, “Introduction to Internet of Things: A practical Approach”, ETI Labs
Pethuru Raj and Anupama C. Raman, “The Internet of Things: Enabling Technologies, Platforms, and Use Cases”, CRC Press
Jeeva Jose, “Internet of Things”, Khanna Publishing House, Delhi
Adrian McEwen, “Designing the Internet of Things”, Wiley
Raj Kamal, “Internet of Things: Architecture and Design”, McGraw Hill
Cuno Pfister, “Getting Started with the Internet of Things”, O Reilly Media
After the completion of this course, the students will be able to:
Understand Internet of Things and its hardware and software components
Interface I/O devices, sensors & communication modules
Analyze data from various sources in real-time and take necessary actions in an intelligent fashion
Remotely monitor data and control devices
Develop real life IoT based projects
New Scheme Based On AICTE Flexible Curricula Information Technology, VII-Semester
The objective of this course is to focus on the importance of social network analysis and to
students for analyzing social media and networking data.
enhance skills of
- Reality mining - Context - Awareness - Privacy in online social networks - Trust in online environment - Trust models based on subjective logic - Trust network analysis - Trust transitivity analysis - Combining trust and reputation - Trust derivation based on trust comparisons - Attack spectrum and countermeasures.
Ajith Abraham, Aboul Ella Hassanien, Václav Snášel, ―Computational Social Network Analysis: Trends,
Tools and Research Advances‖, Springer, 2012
Borko Furht, ―Handbook of Social Network Technologies and Applications‖, Springer, 1st edition, 2011
Charu C. Aggarwal, ―Social Network Data Analytics‖, Springer; 2014
Giles, Mark Smith, John Yen, ―Advances in Social Network Mining and Analysis‖, Springer, 2010.
Guandong Xu , Yanchun Zhang and Lin Li, ―Web Mining and Social Networking – Techniques and applications‖, Springer, 1st edition, 2012
Peter Mika, ―Social Networks and the Semantic Web, Springer, 1st edition, 2007.
Przemyslaw Kazienko, Nitesh Chawla,‖Applications of Social Media and Social Network Analysis‖,
Springer,2015
Maksim Tsvetovat and Alexander Kouznetsov , “Social Network Analysis for Startups”, O’Reilly Media, 2011.
Charles Kadushin, “Understanding Social Networks”, Oxford University Press, 2012
Social Network Analysis: Theory and Applications
After the completion of this course, the students will be able to:
Understand the importance of social media and networks
Have skills for analyzing social media and networking data
Visualize social networks
Plan and execute a small-scale network analysis project.
Create real-life case studies using social media data 5.
New Scheme Based On AICTE Flexible Curricula
The objective of this course is to describe and explain basic principles of digital image processing.
R.C Gonzalez & Richard E Wood, “Digital Image Processing”, Addison Wesley Publishing
Anil K Jain, “Fundamentals of Digital image processing”. PHI.
Sonka, Hlavac, Boyle, “Digital image processing and computer vision”, Cengage learning, India Edition.
B Chanda, D. Dutta Majumder, “Digital image Processing and Analysis”, PHI.
After the completion of this course, the students will be able to:
Explain basic concepts of image processing.
Have knowledge of techniques employed for the enhancement of images
Categorize image compression techniques
Interpret image segmentation and representation techniques.
Develop any image processing application
New Scheme Based On AICTE Flexible Curricula Information Technology, VII- semester
The objective of this course is to make students understand Cloud computing concepts and the installation of different cloud simulation tools/ cloud setup tools.
Study of cloud computing concepts
Using Eucalyptus or Open Nebula or equivalent to set up the cloud
Find procedure to run the virtual machine of different configuration.
Check how many virtual machines can be utilized at particular time.
Install a C compiler in the virtual machine and execute a sample program.
Show the virtual machine migration based on the certain condition from one node to the other.
To develop web applications in cloud
To learn the design and development process involved in creating a cloud based application
To learn to implement and use parallel programming using Hadoop
Install Virtualbox/VMware Workstation with different flavours of linux or windows OS on top of windows 7 or 8.
Install a C compiler in the virtual machine created using virtual box and execute Simple Programs
Install Google App Engine. Create hello world app and other simple web applications using python/java.
Use GAE launcher to launch the web applications.
Simulate a cloud scenario using CloudSim.
Implementation of various scheduling mechanisms using open source cloud simulator.
Find a procedure to transfer the files from one virtual machine to another virtual machine.
Find a procedure to launch virtual machine using trystack (Online Openstack Demo Version)
Install Hadoop single node cluster and run simple applications like wordcount
On completion of this course, the students will be able to:
Configure various virtualization tools such as Virtual Box, VMware workstation.
Design and deploy a web application in a PaaS environment.
Learn how to simulate a cloud environment to implement new schedulers.
Install and use a generic cloud environment that can be used as a private cloud.
Manipulate large data sets in a parallel environment.
New Scheme Based On AICTE Flexible Curricula Information Technology, VII- semester
The objective of this course is to to create a competitive industry required IoT skill in students.
Familiarization with Arduino/Raspberry Pi and perform necessary software installation.
To interface LED/Buzzer with Arduino/Raspberry Pi and write a program to turn ON LED for 1 sec after every 2 seconds.
To interface Push button/Digital sensor (IR/LDR) with Arduino/Raspberry Pi and write a program to turn ON LED when push button is pressed or at sensor detection.
To interface DHT11 sensor with Arduino/Raspberry Pi and write a program to print temperature and humidity readings.
To interface motor using relay with Arduino/Raspberry Pi and write a program to turn ON motor when push button is pressed.
To interface OLED with Arduino/Raspberry Pi and write a program to print temperature and humidity readings on it.
To interface Bluetooth with Arduino/Raspberry Pi and write a program to send sensor data to smartphone using Bluetooth.
To interface Bluetooth with Arduino/Raspberry Pi and write a program to turn LED ON/OFF when ‘1’/’0’ is received from smartphone using Bluetooth.
Write a program on Arduino/Raspberry Pi to upload temperature and humidity data to thingspeak cloud.
Write a program on Arduino/Raspberry Pi to retrieve temperature and humidity data from thingspeak cloud.
To install MySQL database on Raspberry Pi and perform basic SQL queries.
Write a program on Arduino/Raspberry Pi to publish temperature data to MQTT broker.
Write a program on Arduino/Raspberry Pi to subscribe to MQTT broker for temperature data and print it.
Write a program to create TCP server on Arduino/Raspberry Pi and respond with humidity data to TCP client when requested.
Write a program to create UDP server on Arduino/Raspberry Pi and respond with humidity data to UDP client when requested.
On completion of this course, the students will be able to:
Have understanding of Arduino/Raspberry Pi
Apply the skills learned by designing, building, and testing a microcontroller-based embedded system
Publishing/Subscribing to connect, collect data, monitor and manage assets
Remotely monitor data and control devices
Perform experiments and mini projects on IoT