Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
23 views144 pages

Syllabus

The document outlines the curriculum and syllabus for the B.E. Cyber Security program at SRM Valliammai Engineering College, detailing the regulations for 2023. It includes a comprehensive list of courses, categorized by semesters, with information on course codes, titles, categories, and credit hours. The program follows a choice-based credit system and spans eight semesters, incorporating both theoretical and practical components.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views144 pages

Syllabus

The document outlines the curriculum and syllabus for the B.E. Cyber Security program at SRM Valliammai Engineering College, detailing the regulations for 2023. It includes a comprehensive list of courses, categorized by semesters, with information on course codes, titles, categories, and credit hours. The program follows a choice-based credit system and spans eight semesters, incorporating both theoretical and practical components.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 144

`

SRM VALLIAMMAI ENGINEERING COLLEGE


(An Autonomous Institution)
SRM Nagar, Kattankulathur, Chengalpattu Dt.-603203, Tamil Nadu.

DEPARTMENT OF CYBER SECURITY

Under Graduate

CURRICULUM AND SYLLABUS


(REGULATIONS 2023)

Programme: B.E., Cyber Security

1
`

SRM VALLIAMMAI ENGINEERING COLLEGE


(An Autonomous Institution, Affiliated to Anna University, Chennai)
B.E, CYBER SECURITY
REGULATIONS – 2023
CHOICE BASED CREDIT SYSTEM
I TO VIII SEMESTERS CURRICULA & SYLLABI
SEMESTER I
SL. COURSE CONTACT
COURSE TITLE CATEGO L T P C
NO. CODE PERIODS
RY
THEORY
1. EN3111 Professional English - I HSMC 3 3 0 0 3
2. MA3122 Matrices and Calculus BSC 4 3 1 0 4
3. PH3123 Engineering Physics BSC 3 3 0 0 3
4. CH3124 Engineering Chemistry BSC 3 3 0 0 3
5. GE3131 Basic Electrical and Electronics Engineering ESC 3 3 0 0 3

6. GE3111 தமிழர் மரபு / Heritage of Tamils HSMC 1 1 0 0 1


PRACTICALS
7. EN3119 English Language Learning Laboratory I EEC 2 0 0 2 1
8. GE3121 Physics and Chemistry Laboratory BSC 4 0 0 4 2
9. GE3134 Engineering Practices Laboratory ESC 4 0 0 4 2
TOTAL 27 16 1 10 22

SEMESTER II
SL. COURSE COURSE TITLE CATEGO
CONTACT
L T P C
NO. CODE PERIODS
RY
THEORY
1. EN3211 Professional English - II HSMC 3 3 0 0 3
2. MA3222 Statistics and Numerical Methods BSC 4 3 1 0 4
3. PH3222 Physics for Information Science BSC 3 3 0 0 3
4. CH3222 Chemistry for Information Science BSC 3 3 0 0 3
5. GE3231 Problem Solving and Python Programming ESC 3 3 0 0 3
தமிழரும் ததொழில் நுட்பமும் /Tamils and
6. GE3211 HSMC 1 1 0 0 1
Technology
THEORY CUM PRACTICALS
GE3233
7. Engineering Graphics and Design ESC 5 1 0 4 3
PRACTICALS
8. GE3221 Engineering Sciences Laboratory BSC 4 0 0 4 2
Problem Solving and Python Programming
9. GE3232 Laboratory ESC 4 0 0 4 2
NSS / YRC / NSO / Club Activities#
10. GE3251 PCD 0# 0 0 0 0#

Common for all Students TOTAL 30 17 1 12 24

2
`

SEMESTER III
SL. COURS CONTACT
COURSE TITLE CATEG L T P C
NO. E PERIODS
ORY
CODE
THEORY
1. MA3322 Discrete Mathematics BSC 3 3 0 0 3
2. AD3363 Digital Principles and Computer Organization PCC 3 3 0 0 3
3. IT3361 Programming and Data Structures PCC 3 3 0 0 3
4. CS3361 Object Oriented Programming PCC 3 3 0 0 3
Fundamentals of Computer Networks and
5. CY3361 PCC 2 3 0 0 3
Communication
6. CY3362 Introduction to Cyber Security PCC 3 3 0 0 3
PRACTICALS
7. IT3363 Programming and Data Structures Laboratory PCC 3 0 0 3 1.5
8. CS3364 Object Oriented Programming Laboratory PCC 3 0 0 3 1.5
Computer Networks and Communication
9. CY3363 PCC 3 0 0 3 1.5
Laboratory
TOTAL 26 18 0 9 22.5

SEMESTER IV
SL. COURSE CONTACT
COURSE TITLE CATEG L T P C
NO. CODE PERIODS
ORY
THEORY
1. MA3422 Applied Mathematics for Information Science BSC 2 2 0 0 2
2. CS3463 Database Management Systems PCC 3 3 0 0 3
3. IT3461 Operating Systems PCC 3 3 0 0 3
4. CY3461 Basics of Cyber Forensics PCC 3 3 0 0 3
5. CY3462 Secure Software Engineering PCC 3 3 0 0 3
6. CY3463 Cyber Laws and Ethics PCC 3 3 0 0 3
7. GE3451 NCC Credit Course Level – I * PCD 3* 3* 0 0 3*
PRACTICALS
8. CS3466 Database Management Systems Laboratory PCC 3 0 0 3 1.5
9. IT3464 Operating Systems Laboratory PCC 3 0 0 3 1.5
10. CY3464 Open Source Software Laboratory PCC 3 0 0 3 1.5
TOTAL 26 20 0 9 21.5

3
`

SEMESTER V

SL. COURSE CONTACT


COURSE TITLE CATEGO L T P C
NO. CODE PERIODS
RY
THEORY
1. CS3564 Web Development and User Interface Design PCC 3 3 0 0 3
2. CY3561 Biometric Security PCC 3 3 0 0 3
3. CY3562 Ethical Hacking Practices PCC 3 3 0 0 3
4. CY3563 Information Warfare PCC 3 3 0 0 3
5. PCYXXX Professional Elective - I PEC 3 3 0 0 3
6. PCYXXX Professional Elective - II PEC 3 3 0 0 3
7. CE3531 Environmental Studies ESC 2 2 0 0 2
PRACTICALS
8. CS3567 Web and Full stack Development Laboratory PCC 3 0 0 3 1.5
9. CY3565 Biometric Image Processing Laboratory PCC 3 0 0 3 1.5
10. CY3566 Ethical Hacking Practices Laboratory PCC 3 0 0 3 1.5
11. GE3551 NCC Credit Course Level – II* PCD 3 3 0 0 3#
TOTAL 29 20 0 11 24.5

SEMESTER VI

SL. COURSE CONTACT


COURSE TITLE CATEGORY L T P C
NO. CODE PERIODS
THEORY
1. CY3661 Intrusion Detection and prevention Systems PCC 3 3 0 0 3
2. CY3662 Cryptography and Network Security PCC 3 3 0 0 3
3. CY3663 Digital Forensics PCC 3 3 0 0 3
4. MAN601 Management Elective HSMC 2 2 0 0 2
5. PCYXXX Professional Elective – III PEC 3 3 0 0 3
6. PCYXXX Professional Elective – IV PEC 3 3 0 0 3
7. MCYXXX Mandatory Course-I MCC 3 3 0 0 0
PRACTICALS
8. CY3663 Cryptography and Network Security PCC 3 0 0 3 1.5
Laboratory
9. CY3641 Mini Project EEC 4 0 0 4 2
10. EN3649 Professional Communication Laboratory EEC 2 0 0 2 1
TOTAL 29 20 0 9 21.5

4
`

SEMESTER VII
SL. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
NO. CODE PERIODS
THEORY
1. BA3711 Human Values and Ethics HSMC 2 2 0 0 2
2. CY3761 Security in Mobile Exploitation PCC 3 3 0 0 3
3. CY3762 Artificial Intelligence in Cyber Security PCC 3 3 0 0 3
4. PCYXXX Professional Elective – V PEC 3 3 0 0 3
5. PCYXXX Professional Elective – VI PEC 3 3 0 0 3
6. OCYXXX Open Elective OEC 3 3 0 0 3
7. MCYXXX Mandatory Course-II MCC 3 3 0 0 0
PRACTICALS
8 CY3763 Security in Mobile Exploitation PCC 4 0 0 4 1.5
Laboratory
9 Artificial Intelligence in Cyber
CY3764 PCC 4 0 0 4 1.5
Security Laboratory
10 CY3741 Internship EEC 0 0 0 0 1
TOTAL 28 20 0 8 21

* Mandatory Course- II is a Non-credit Course (Student shall select one course from the list given under Mandatory Course- II)
SEMESTER VIII

SL. COURSE
COURSE TITLE CATEGORY CONTACT L T P C
NO. CODE PERIODS
PRACTICALS
1. CY3841 Project Work EEC 12 0 0 20 10
TOTAL 12 0 0 20 10

Subjects Offered to other Departments (CSE & IT)

SL. COURSE CONTACT


COURSE TITLE CATEGORY L T P C
NO. CODE PERIODS
PRACTICALS
1. CY3765 Cryptography and Cyber Security PCC 3 3 0 0 3
2. CY3766 Cryptography And Cyber Security PCC 3 0 0 3 1.5
Laboratory

Mandatory Course II

SL. COURSE
COURSE TITLE CATEGORY CONTACT L T P C
NO. CODE PERIODS
PRACTICALS
1. MCY201 Awareness Of Cyber Security and Cyber PCC 3 3 0 0 3
Law

5
`

PROFESSIONAL ELECTIVE COURSES: VERTICALS

VERTICAL II
VERTICAL I VERTICAL V
CLOUD VERTICAL III VERTICAL IV VERTICAL VI
DATA COMPUTATIONAL
COMPUTING CYBER CREATIVE INDUSTRY
SCIENCE INTELLIGENCE
AND DATA SECURITY AND MEDIA 4.0
CENTRE DATA PRIVACY
TECHNOLOGIES
Fundamentals of Multimedia Data
Modern Knowledge Introduction to
Text and Speech Data Warehousing Compression and
Cryptography Engineering Industry 4.0
Analysis Storage
Crypto Currency
Image and video Storage Video Creation 3D Printing and
and Block Chain Soft Computing
Analytics Technologies and Editing Design
Technologies
Augmented
Introduction to Multimedia and Reality, Virtual
Virtualization Ethical Hacking Cognitive Science
Deep Learning Animation Reality and Mixed
Reality
Augmented
Business Cloud Services and Optimization
Social Engineering Reality and Virtual Neural Networks
Analytics Management Techniques
Reality
Exploratory Data Security and Game Internet of
Big Data Security Computer Vision
Analysis Privacy in Cloud Development Everything

Recommender Software Defined Computational Robotic Process


Data Privacy Digital marketing
Systems Networks Linguistics Automation

6
`

PROFESSIONAL ELECTIVES (PE)


VERTICAL I
DATA SCIENCE

SL. COURSE
COURSE TITLE CATEGORY CONTACT L T P C
NO. CODE PERIODS
THEORY
1. PAD102 Fundamentals of Text and Speech Analysis PEC 3 0 0 3 3

2. PAD103 Image and video Analytics PEC 3 0 0 3 3

3. PAD105 Introduction to Deep Learning PEC 3 0 0 3 3


4. PAD106 Business Analytics PEC 3 0 0 3 3
5. PAD107 Exploratory Data Analysis PEC 3 0 0 3 3

6. PAD110 Recommender Systems PEC 3 0 0 3 3

VERTICAL II
CLOUD COMPUTING AND DATA CENTRE TECHNOLOGIES
SL. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
NO. CODE PERIODS
THEORY
1. PIT201 Data Warehousing PEC 3 0 0 3 3
2. PIT202 Storage Technologies PEC 3 0 0 3 3
3. PIT203 Virtualization PEC 3 0 0 3 3

4. PIT204 Cloud Services and Management PEC 3 0 0 3 3

5. PIT205 Security and Privacy in Cloud PEC 3 0 0 3 3


6. PIT206 Software Defined Networks PEC 3 0 0 3 3

VERTICAL III
CYBER SECURITY AND DATA PRIVACY
SL. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
NO. CODE PERIODS
THEORY
1. PCY301 Modern Cryptography PEC 3 3 0 0 3
PCY302
2. Crypto Currency and Block Chain PEC 3 3 0 0 3
Technologies
3. PCY303 Ethical Hacking PEC 3 3 0 0 3

4. PCY304 Social Engineering PEC 3 3 0 0 3

5. PCY305 Big Data Security PEC 3 3 0 0 3


6. PCY306 Data Privacy PEC 3 3 0 0 3

7
`

VERTICAL IV
CREATIVE MEDIA

SL. COURSE CONTACT


COURSE TITLE CATEGORY L T P C
NO. CODE PERIODS
THEORY
1. PIT401 Multimedia Data Compression and Storage PEC 3 0 0 3 3
2. PIT402 Video Creation and Editing PEC 3 0 0 3 3

3. PIT403 Multimedia and Animation PEC 3 0 0 3 3


4. PIT404 Augmented Reality and Virtual Reality PEC 3 0 0 3 3

5. PIT405 Game Development PEC 3 0 0 3 3

6. PIT406 Digital marketing PEC 3 0 0 3 3

VERTICAL V
COMPUTATIONAL INTELLIGENCE
SL. COURSE CONTACT
COURSE TITLE CATEGORY L T P C
NO. CODE PERIODS
THEORY
1. PCS501 Knowledge Engineering PEC 3 0 0 3 3

2. PCS502 Soft Computing PEC 3 0 0 3 3


3. PCS503 Cognitive Science PEC 3 0 0 3 3

4. PCS504 Optimization Techniques PEC 3 0 0 3 3


5. PCS505 Computer Vision PEC 3 0 0 3 3
6. PCS506 Computational Linguistics PEC 3 0 0 3 3

VERTICAL VI
INDUSTRY 4.0

SL. COURSE CONTACT


COURSE TITLE CATEGORY L T P C
NO. CODE PERIODS
THEORY
1. PCS601 Introduction to Industry 4.0 PEC 3 0 0 3 3

2. PCS602 3D Printing and Design PEC 3 0 0 3 3


Augmented Reality, Virtual Reality and
3. PCS603 Mixed Reality PEC 3 0 0 3 3

4. PCS604 Neural Networks PEC 3 0 0 3 3

5. PCS605 Internet of Everything PEC 3 0 0 3 3

6. PCS606 Robotic Process Automation PEC 3 0 0 3 3

8
`

S.R.M. Nagar, Kattankulathur - 603 203.


DEPARTMENT OF CYBER SECURITY

SUMMARY
Name of the
Programme: B.E.
Cyber Security
SL. SUBJECT TOTAL
CREDITS PER SEMESTER
NO. CREDITS
AREA I II III IV V VI VII VIII
1. HSMC 4 4 2 2 12
2. BSC 12 12 3 2 2 31
3. ESC 5 8 13
4. PCC 19.5 19.5 16.5 10.5 9 75
5. PEC 6 6 6 18
6. OEC 3 3
7. EEC 1 3 1 10 15

Non–Credit
1# 3# 3# √ √ 7#
/(Mandatory)

Total 22 24 22.5 21.5 24.5 21.5 21 10 167

9
`

SEMESTER I
EN3111 PROFESSIONAL ENGLISH – I L T P C
3 0 0 3
COURSE OBJECTIVES:
• To upgrade the English language skills of students by introducing communication techniques,
speaking and grammar learning activities which are relevant to authentic contexts.
• To improve the basic reading and writing skills of the learners.
• To enhance the communicative competence of the first-year engineering students.
• To enable learners to use language effectively in academic/work contexts.
• To help learners understand content- context in relevant situations.

UNIT – I: INTRODUCTION TO FUNDAMENTALS OF COMMUNICATION 9


Listening: Podcast watching – Listening for new words and pronunciation.
Speaking: Note of appreciation for classmates /family member – formal appreciation of someone, expression of
feelings.
Reading: Books, shorts stories to be read. Filling forms (i.e.) post office or bank.
Writing: Film and series Review / Book Review, Email and Informal letters.
Language and Vocabulary development: WH questions, Yes/No questions, Single Word Substitutes, Pronouns,
Parts of Speech, Question tags, Prefixes and Suffixes.
UNIT – II: NARRATION AND SUMMATION 9
Listening: Books – Short Stories to be read aloud in class for listening purpose.
Speaking: Short stories to be read and narrated in the class.
Reading: Reading favourite blogs on Travel, Sports and Food and expressing opinions regarding the same.
Writing: Paragraph writing, Report – field trip / I.V., Autobiography and Comprehension.
Language and Vocabulary development: Tenses – Past, Antonyms, Synonyms, Subject Verb agreement and
Prepositions
UNIT – III: DESCRIPTION OF A PROCESS/PRODUCT 9
Listening: Listening to snippets from celebrities/ National leaders’ lives.
Speaking: Narrating personal experiences/ events – Expression of emotions and feelings.
Reading: Reading short biographies – famous people and description of the same.
Writing: Instruction, Product / Process description and Advertisements (classified advertisement and display
advertisement)
Language and Vocabulary development: Adjectives- Degrees of Comparison, Tenses – Present, Compound
Nouns, Homonyms, Homophones and Discourse markers – connective and sequence words
UNIT – IV: CLASSIFICATION AND INTERPRETATION 9
Listening: Listening to Ted Talks.
Speaking: Recreating a Ted talk session in the class.
Reading: Newspaper Reading (Editorial) and understanding.
Writing: Note making, Blogging, Interpretation of charts and graphs.
Language and Vocabulary development: Articles, Collocations and Phrasal Verbs.

UNIT – V: EXPRESSION OF THOUGHTS AND IDEAS 9


Listening: Listening to audio books and answering questions.
Speaking: Presentation on a non-technical topic.
Reading: Editorials from newspaper.
Writing: Essay writing – Descriptive and Narrative essays.
Language and Vocabulary development: Tenses – future, Negative statements and questions, Punctuations,
Cause and Effect, Content and Function words.
TOTAL: 45 PERIODS

SRMVEC R2023
1
`

COURSE OUTCOMES:
At the end of the course, learners will be able
• CO1: To strengthen the basics of grammar.
• CO2: To narrate informal and informal situations.
• CO3: To describe a process/product and express opinion.
• CO4: To interpret and analyse the content/information given.
• CO5: To write short essays, personal letters and emails in English.

TEXT BOOKS:
1. English for Science and Technology Cambridge University Press,2021. Dr.Veena Selvam,
Dr.Sujatha Priyadarshini, Dr. Deep Mary Francis, Dr.K.N.Shoba and Dr.Lourdes Joevani,
Department of English, Anna University.
2. Technical Communication – Principles and Practice by Meenakshi Raman & Sangeeta Sharma,
Oxford Univ.Press, 2016, New Delhi.

REFERENCE BOOKS:
1.Effective Communication Skill, Kulbhusan Kumar, R.S.Salaria, Khanna Publishing House.
2.Wings of Fire - An Autobiography by A.P.J Abdul Kalam with Arun Tiwari, Sangam Books Ltd ,
Edition: 50, 1999
3.World's Most Popular Short Stories Saki Maupassant, Anton Chekhov, O Henry Paperback
4.Professional Speaking skills, Aruna Koneru, Oxford University Press.
5.English For Engineers and Technologists, Orient Blackswan Private Ltd. Department of
English,Anna University,2020.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 3 2 2 2 - - - - 3 - - - - - -
CO 2 2 2 - - - - - - - 3 1 1 - - - -
CO 3 2 - 2 2 - - - - - 3 - 1 - - - -
CO 4 3 3 - 2 - - 2 - - 3 - - - - - -
CO 5 1 - - - - - - - - 2 - - - - - -
AVG 2.2 1.6 2 2 2 - - - - 2.8 1 1 - - - -

SRMVEC R2023
2
`

MA3122 MATRICES AND CALCULUS L T P C


3 1 0 4
COURSE OBJECTIVES:

• To understand and apply matrix techniques for engineering applications.


• To familiarize the student with basic calculus and traditions of traditional calculus.
• To solve the problems in single and multivariable calculus and plays an important role in science,
economics, engineering.
• Vector calculus can be widely used for modeling the various laws of physics.
• To familiarize the student with multiple integrals and their usage in find the area and volume of two
and three dimensional objects

UNIT – I: MATRICES 9L+3T


Eigen values and Eigen vectors of a real matrix - Characteristic equation - Properties of Eigen values and Eigen
vectors - Statement and Applications of Cayley-Hamilton Theorem - Reduction of a quadratic form into canonical
form by orthogonal transformation.
UNIT – II: DIFFERENTIAL CALCULUS OF ONE VARIABLE 9L+3T
Limit of a function - Continuity - Derivatives - Differentiation rules (sum, product, quotient, chain rules) - Implicit
differentiation - Rolle’s Theorem and Mean Value theorem -Taylor’s series- Maxima and Minima of functions of one
variable.
UNIT – III: DIFFERENTIAL CALCULUS OF SEVERAL VARIABLES 9L+3T
Partial derivatives - Total derivatives - Jacobians and properties - Taylor’s series for functions of two variables -
Maxima and Minima of functions of two variables - Lagrange’s method of undetermined multipliers
UNIT – IV: MULTIPLE INTEGRALS 9L+3T
Double integrals in Cartesian and polar coordinates - Change of order of integration - Area enclosed by plane curves
- Change of variables in Polar coordinates - Triple integrals - Volume of solids
UNIT – V: VECTOR CALCULUS 9L+3T
Gradient and directional derivative – Divergence and curl – Vector identities – Irrotational and Solenoidal vector fields
– Vector Integration Green’s, Gauss divergence and Stoke’s theorems – Verification and application in evaluating line,
surface and volume integrals
TOTAL: 45L +15T PERIODS

COURSE OUTCOMES:
On Completion of the course, the students should be able to have:
• To apply the idea of reducing complex problems into simple form using matrix technique.
• Basic application of calculus in engineering problems and to tackle for different geometries.
• This course equips the students to have basic knowledge and understanding the Partial derivatives
and maxima and minima by Lagrange’s method.
• Basic application of Double and Triple integrals used in Engineering real life problems
• To study the vector differentiation and vector integration by using standard theorems.

TEXT BOOKS:
1. Baloch, R., Ethical Hacking and Penetration Testing Guide, CRC Press, 2019.

SRMVEC R2023
3
`

REFERENCE BOOKS:
1.McClure S., Scam bray J., and Kurtz G, Hacking Exposed. Tata McGraw– Hill Education, 6th Edition
2019
2.Davidoff, S. and Ham, J., Network Forensics Tracking Hackers through Cyber space, Prentice Hall,
2012.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 - 3 - 3 - - 2 - - - - - 2 - - -
CO 2 3 2 - - 3 - - 2 - - - - - 3 2 -
CO 3 3 2 - - 2 - - 2 - - 2 - 3 - - 1
CO 4 2 - - 1 3 - - - - 1 2 - - 3 2 3
CO 5 1 3 2 1 2 - - - 2 2 3 1 - 2 3 1
AVG 2.2 2.5 2 1.6 2.5 - - 2 2 1.5 2.3 1 2.5 2.6 2.3 1.6

SRMVEC R2023
4
`

PH3123 ENGINEERING PHYSICS L T P C


3 0 0 3
COURSE OBJECTIVES:

• To enhance the fundamental knowledge in crystalline materials and its applications.


• To explore the knowledge in the production of ultrasonic waves and application in the engineering
field.
• To familiarize the basics of laser and their technical advances in scientific, industrial and health
care areas.
• To understand the principle of fibre optical fibre and its applications.
• To explore basic concept of quantum and dual nature of particles.

UNIT – I: PROPERTIES OF MATERIALS 9


Elasticity - Hooke’s law - Stress-strain and its uses - Poisson ratio - factors affecting elastic modulus and tensile
strength. Single crystalline, polycrystalline and amorphous materials - unit cell - space lattice - crystal systems -
Bravais lattice - Miller indices - d-spacing - characteristics of unit cell - SC, BCC, FCC and HCP structure - - thermal
and mechanical properties of materials - crystal growth techniques - Czochralski and Bridgmann.
UNIT – II: ULTRASONICS 9
Introduction - Properties - Production: Magnetostriction method and Piezoelectric method - Acoustical grating -
determination of ultrasonic velocity in liquid - Application: Detection of flaw in materials (Non Destructive Testing) -
ultrasonic soldering, welding - SONAR - diagnostic sonography - cars’ air bag sensor-dispersion of fog - Probe
sonication for 2D material formation.
UNIT – III: LASERS AND ITS APPLICATIONS 9
Basic concepts and characteristics - Einstein’s A and B coefficients (derivation) - population inversion - Pumping
methods - Nd-YAG laser - CO2 laser - Semiconductor lasers: homo junction and heterojunction - applications: laser
welding, laser cutting, laser cooling, pattern formation by laser etching, laser bar code scanner - LIDAR - Laser
tissue interaction, laser surgery - Holography - NLO - electro-optic effect.
UNIT – IV: FIBRE OPTICS 9
Structure and principle - Propagation of light through optical fibre - acceptance angle, numerical aperture - fractional
index change - Types of optical fibres (material, mode and refractive index) - Attenuation: absorption, scattering and
bending - Dispersion - Fibre optic communication system (Block diagram) and advantages over conventional methods
- fibre optic sensors: pressure and displacement- Endoscope.
UNIT – V: QUANTUM PHYSICS 9
Black body radiation and energy distribution spectrum - Planck’s theory of radiation - matter waves - de-Broglie
wavelength in terms of energy, voltage and temperature - Electron diffraction - G.P.Thomson experiment - wave
function and its physical significance - Schrödinger’s wave equation - time independent and time dependent equations
- Particle in a one-dimensional box- Normalization of wave function - Quantum Tunnelling - Scanning Tunnelling
Microscope.
TOTAL: 45 PERIODS

SRMVEC R2023
5
`

COURSE OUTCOMES:
At the end of the course, learners will be able to:
• To understand the crystalline material, crystal defects and growth techniques.
• To understand the basics, generation and application of ultrasonics.
• To acquire knowledge on the concepts of lasers and their applications in industry and medical field.
• To conversant on principle behind the fibres and their applications in communication and devices
made out of optical fibre.
• To get knowledge on advanced physics concepts of quantum theory and its applications

TEXT BOOKS:
1. Bhattacharya, D.K. & Poonam, T. “Engineering Physics”. Oxford University Press, 2015.
2. Gaur, R.K. & Gupta, S.L. “Engineering Physics”. Dhanpat Rai Publishers, 2012.
3. Pandey, B.K. & Chaturvedi, S. “Engineering Physics”. Cengage Learning India, 2012.
4. Brijlal and Subramanyam, “Properties of Matter”, S .Chand publishing, 2002.
5. M.N.Avadhanulu & P.G.Kshirasagar, “A Text Book of Engineering Physics” – IX Edition, S.Chand
Publications, 2014.
6. V.Rajendiran, Engineering Physics, Tata McGraw-Hill, New Delhi. 2011.

REFERENCE BOOKS:
1. Halliday, D., Resnick, R. & Walker, J. “Principles of Physics”. Wiley, 2015.
2. Serway, R.A. & Jewett, J.W. “Physics for Scientists and Engineers”. Cengage Learning, 2010.
3. Shatendra Sharma & Jyotsna Sharma, “Engineering Physics”. Pearson, 2018.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 1 1 - - 1 1 - - - - 1 - - - -
CO 2 3 1 1 1 2 1 1 - - - 1 - - - - -
CO 3 3 2 2 1 1 1 1 - - - - 1 - - - -
CO 4 3 2 2 1 1 1 1 - - - - 1 - - - -
CO 5 2 1 1 1 1 1 1 - - - - 1 - - - -
AVG 2.8 1.4 1.4 1 1.25 1 1 - - - - 1 - - - -

SRMVEC R2023
6
`

CH3124 ENGINEERING CHEMISTRY L T P C


3 0 0 3
COURSE OBJECTIVES:

• To make the students familiar with boiler feed water requirements, related problems and domestic
water treatment techniques.
• To introduce the basic concepts and applications of chemical thermodynamics.
• To acquaint the student with the principles of chemical kinetics and its applications towards
engineering.
• To make the student conversant with the basics of surface chemistry and catalysis.
• To inculcate the students with the basics principles and preparatory methods of nanomaterials.

UNIT – I: WATER TECHNOLOGY 9


Introduction-sources of water-impurities present in water-hard water and hardness - types, Municipal water
treatment: primary treatment and disinfection - Desalination of brackish water: Reverse Osmosis, Boiler troubles:
scale and sludge, caustic embrittlement, boiler corrosion priming and foaming, Treatment of boiler feed water -
Internal treatment (phosphate, colloidal, sodium aluminate and Calgon conditioning). External treatment: Ion
exchange process, cooling waters (Langelier index).
UNIT – II: CHEMICAL THERMODYNAMICS 9
Introduction-terminology of thermodynamics, the first law of thermodynamics: enthalpy, second law: Entropy - entropy
change for an ideal gas, reversible and irreversible processes; entropy of phase transitions: Clausius inequality. Free
energy and work function: Helmholtz and Gibbs free energy functions, Criteria of spontaneity; Gibbs-Helmholtz
equation, Clausius-Clapeyron equation, Maxwell relations, Van’t Hoff isotherm and isochore.
UNIT – III: CHEMICAL KINETICS 9
Introduction-factors influencing the rate of reaction, order and molecularity of a reaction, kinetic equations of different
orders (first, second and third order) - determination of the order of a reaction, the temperature dependence of
reaction rates, unimolecular reactions, photochemical reactions and chain reactions, Theories of reaction rates,
lasers in chemistry, fast reactions.
UNIT – IV: SURFACE CHEMISTRY AND CATALYSIS 9
Adsorption: classification - adsorption of gases on solids - adsorption from solutions - adsorption isotherms -
applications of adsorption - Freundlich’s adsorption isotherm - Langmuir’s adsorption isotherm, B.E.T isotherm.
Catalysis: introduction - types of catalysis - criteria - autocatalysis - catalytic poisoning and catalytic promoters - acid
-base catalysis - enzyme catalysis - Michaelis - Menten equation.
UNIT – V: NANOCHEMISTRY 9
Basics: Distinction between molecules, nanomaterials and bulk materials; Size-dependent properties; Types of
nanomaterials: Definition, properties and uses of - nanoparticle, nanocluster, nanorod, nanowire and nanotube.
Preparation of nanomaterials: sol-gel, solvothermal, laser ablation, chemical vapour deposition, electrochemical
deposition and lectrospinning. Applications of nanomaterials in medicine, agriculture, food science and energy
resources.
TOTAL: 45 PERIODS

SRMVEC R2023
7
`

COURSE OUTCOMES:
At the end of the course, learners will be able to:
• To infer the quality of water from quality parameter data and propose suitable treatment.
• To apply the knowledge of chemical thermodynamics for material design and aspects
• To recommend the proper chemical kinetics for engineering processes and applications.
• To recognize the surface morphology and its engineering applications.
• To identify and apply basic concepts of nanoscience and nanotechnology in designing the synthesis
of nanomaterials for engineering and technology applications

TEXT BOOKS:
1. Payal B. Joshi and Shashank Deep, “Engineering Chemistry”, Oxford University Press, New
Delhi, 2019.
2. Shikha Agarwal, “Engineering Chemistry”-Fundamentals and Applications, 2nd Edition,
Cambridge University Press, New Delhi, 2019.
3. P. C. Jain and Monica Jain, “Engineering Chemistry”, 18th Edition, DhanpatRaiPublishing
Company (P) Ltd, New Delhi, 2021.

REFERENCE BOOKS:
1. R. V. Gadag and A. Nithyananda Shetty, “Engineering Chemistry”, 3rd Edition, Wiley & I.K.
International (P), LTD, New Delhi, 2019.
2. S.S. Dara and S.S. Umare, “A Text Book of Engineering Chemistry”, 12th Edition, S. Chand &
Company LTD, New Delhi, 2018.
3. B. Sivasankar, “Engineering Chemistry”, Tata McGraw-Hill Publishing Company LTD, 2023.
4. B. S. Murty, P. Shankar, Baldev Raj, B. B. Rath and James Murday, “Text book of nanoscience and
nanotechnology”, Universities Press-IIM Series in Metallurgy and Materials Science, 2018.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 2 3 2 - 1 3 - - - - 2 - - - -
CO 2 3 1 2 1 - - - - - - - - - - - -
CO 3 3 2 2 1 - - - - - - - - - - - -
CO 4 3 2 1 - - - - - - - - - - - - -
CO 5 2 2 3 2 1 - 1 - - - - 2 - - - -
AVG 2.8 1.8 2.2 1.2 0.2 0.2 0.8 - - - - 0.8 - - - -

SRMVEC R2023
8
`

GE3131 BASIC ELECTRICAL AND ELECTRONICS ENGINEERING L T P C


3 0 0 3
COURSE OBJECTIVES:

• To introduce the basics of electric circuits and analysis


• To impart knowledge in the basics of working principles and application of electrical machines
• To introduce analog devices and their characteristics
• To educate on the fundamental concepts of digital electronics
• To introduce the functional elements and working of measuring instruments.

UNIT – I: ELECTRICAL CIRCUITS 9


DC Circuits: Circuit Components: Conductor, Resistor, Inductor, Capacitor – Ohm’s Law - Kirchhoff’s Laws –
Independent and Dependent Sources – Simple problems- Nodal Analysis, Mesh analysis with independent sources
only (Steady state) Introduction to AC Circuits and Parameters: Waveforms, Average value, RMS Value,
Instantaneous power, real power, reactive power and apparent power, power factor – Steady state analysis of RLC
circuits (Simple problems only).
UNIT – II: ELECTRICAL MACHINES 9
Construction and Working principle- DC Separately and Self excited Generators, EMF equation, Types and
Applications. Working Principle of DC motors, Torque Equation, Types and Applications. Construction, working
principle and Applications of Transformer, three phase Alternator, Synchronous motor and Three Phase Induction
Motor.
UNIT – III: ANALOG ELECTRONICS 9
Resistor, Inductor and Capacitor in Electronic Circuits- Semiconductor Materials: Silicon &Germanium – PN
Junction Diodes, Zener Diode –Characteristics Applications – Bipolar Junction Transistor-Biasing, JFET, SCR,
MOSFET, IGBT – Types, I-V Characteristics and Applications, Rectifier and Inverters.
UNIT – IV: DIGITAL ELECTRONICS 9
Review of number systems, binary codes, error detection and correction codes, Combinational logic - representation
of logic functions-SOP and POS forms, Kmap representations – minimization using K maps (Simple Problems only).
UNIT – V: MEASUREMENTS AND INSTRUMENTATION 9
Functional elements of an instrument, Standards and calibration, Operating Principle, types Moving Coil and Moving
Iron meters, Measurement of three phase power, Energy Meter, Instrument Transformers-CT and PT, DSO- Block
diagram- Data acquisition.
TOTAL: 45 PERIODS

COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Ability to compute the electric circuit parameters for simple problems
• Ability to explain the working principle and applications of electrical machines
• Ability to analyze the characteristics of analog electronic devices
• Ability to explain the basic concepts of digital electronics
• Ability to explain the operating principles of measuring instruments

SRMVEC R2023
9
`

TEXT BOOKS:
1. Kothari DP and I.J Nagrath, “Basic Electrical and Electronics Engineering”, Second Edition,
McGraw Hill Education, 2020
2. S.K. Bhattacharya “Basic Electrical and Electronics Engineering”, Pearson Education, Second
Edition, 2017.
3. Sedha R.S., “A textbook book of Applied Electronics”, S. Chand & Co., 2008
4. James A. Svoboda, Richard C. Dorf, “Dorf’s Introduction to Electric Circuits”, Wiley, 2018.
5. A.K. Sawhney, Puneet Sawhney ‘A Course in Electrical & Electronic Measurements &
Instrumentation’, Dhanpat Rai and Co, 2015.

REFERENCE BOOKS:
1. Thomas L. Floyd, ‘Digital Fundamentals’, 11th Edition, Pearson Education, 2017.
2. Albert Malvino, David Bates, ‘Electronic Principles, McGraw Hill Education; 7th edition, 2017.
3. Mahmood Nahvi and Joseph A. Edminister, “Electric Circuits”, Schaum’ Outline Series, McGraw
Hill, 2002.
4. H.S. Kalsi, ‘Electronic Instrumentation’, Tata McGraw-Hill, New Delhi, 2010

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 3 2 2 - - 3 - - - - - 2 - 2 -
CO 2 3 2 - - - 2 - 2 - - - - 1 2 - 2
CO 3 2 3 2 2 - - - - - - - - 3 - - -
CO 4 3 3 1 - 3 - 2 - - - - - 1 - 3 -
CO 5 3 3 2 1 - - 1 - - - - - 2 1 - 2
AVG 2.8 2.8 1.7 1.6 3 2 2 2 - - - - 1.8 1.5 2.5 2

SRMVEC R2023
10
`

GE3111 தமிழர்மரபு L T P C
1 0 0 1

அலகு – I: மமொழி மற்றும் இலக்கியம் 3

இந்திய ம ொழிக் குடும்பங்கள் - திரொவிட ம ொழிகள்- த ிழ் ஒரு மெம்ம ொழி- த ிழ் மெவ்விலக்தியங்கள்- ெங்க
இலக்கியத்தின் ெ யச் ெொர்பற்ற தன்ம - ெங்க இலக்கியத்தில் பதிர்தல் அறம்- திருக்குறளில் ம லொண்ம க்
கருத்துகள்- த ிழ்க் கொப்பியங்கள், த ிழகத்தில் ெ ண மபளத்த ெ யங்களின் தொக்கம் - பக்தி இலக்கியம்,
ஆழ்வொர்கள் ற்றும் நொயன் ொர்கள்- ெிற்றிலக்கியங்கள்- த ிழில் நவன
ீ இலக்கியத்தின் வளர்ச்ெி - த ிழ் இலக்கிய
வளர்ச்ெியில் பொரதியொர் ற்றும் பொரதிதொென் ஆகிமயொரின் பங்களிப்பு

அலகு – II: மரபு - பொறை ஓவியங்கள் முதல் நவன


ீ ஓவியங்கள் – சிற்பக் கறல 3

நடுகல் முதல் நவன


ீ ெிற்பங்கள் வமர -ஐம்மபொன் ெிமலகள் - பழங்குடியினர் ற்றும் அவர்கள் தயொரிக்கும்
மகவிமனப் மபொருட்கள் , மபொம்ம கள் - மதர் மெய்யும் கமல - சுடு ண் ெிற்பங்கள்

அலகு – III: நொட்டுபுைக் கறலகள் மற்றும் வரீ விறையொட்டுகள் 3

நொட்டுப்புற கமதகள், பொடல்கள்-மதருக்கூத்து, கரகொட்டம், வில்லுப்பொட்டு, கணியொன் கூத்து- ஒயிலொட்டம்,


மதொல்பொமவக் கூத்து, ெிலம்பொட்டம்- வளரி, புலியொட்டம், த ிழர்களின் விமளயொட்டுகள்

அலகு – IV: தமிழர்கைின் திறைக் ககொட்பொடுகள் 3

த ிழகத்தின் தொவரங்களும், விலங்குகளும் - மதொல்கொப்பியம் ற்றும் ெங்க இலக்கியத்தில் அகம் ற்றும் புறக்
மகொட்பொடுகள்- த ிழர்கள் மபொற்றிய அறக்மகொட்பொடு -த ிழ் ெங்கம்-ெங்கம் வளர்த்த த ிழ்- ெங்ககொலத்தில்
த ிழகத்தில் எழுத்தறிவும், கல்வியும்- ெங்ககொல நகரங்களும் துமறமுகங்களும் - ெங்ககொலத்தில் ஏற்று தி ற்றும்
இறக்கு தி கடல்கடந்த நொடுகளில் மெொழர்களின் மவற்றி

அலகு – V: இந்திய கதசிய இயக்கம் மற்றும் இந்திய பண்பொட்டிற்குத் 3


தமிழர்கைின் பங்கைிப்பு

இந்திய விடுதமலப்மபொரில் த ிழர்களின் பங்கு இந்தியொ ற்றும் மவளிநொட்டின் பிற பகுதிகளின் த ிழ்ப்
பண்பொட்டின் தொக்கம். சுய ரியொமத இயக்கம் - இந்திய ருத்துவத்தில், ெித்த ருத்துவத்தின் பங்கு- கல்மவட்டுகள்,
மகமயழுத்துப்படிகள் - த ிழ்ப் புத்தகங்களின் அச்சு வரலொறு

TOTAL: 15 PERIODS

TEXT CUM REFERENCES:


1. தமிழக வரலாறு - மக்களும் பண்பாடும் - கக.கக.பிள்ளை (வவளியீடு: தமிழ்நாடு பாடநூல் மற்றும்
கல்வியியல் பணிகள் கழகம்).
2. கணினித்தமிழ் - முளைவர். இல.சுந்தரம். (விகடன் பிரசுரம்)
3. கீழடி - ளவளக நதிக்களரயில் சங்ககால நகர நாகரிகம் (வதால்லியல் துளை வவளியீடு)
4. வபாருளந - ஆற்ைங்களர நாகரிகம். (வதால்லியல் துளை வவளியீடு)
5. Social Life of Tamils (Dr.K.K.Pillay) A joint publication of TNTB & ESC and RMRL – (in
print)
6. Social Life of the Tamils - The Classical Period (Dr.S.Singaravelu) (Published by:
International Institute of Tamil Studies.
7. Historical Heritage of the Tamils (Dr.S.V.Subaramanian, Dr.K.D. Thirunavukkarasu)
(Published by: International Institute of Tamil Studies).

SRMVEC R2023
11
`

8. The Contributions of the Tamils to Indian Culture (Dr.M.Valarmathi) (Published by:


International Institute of Tamil Studies.)
9. Keeladi - ‘Sangam City Civilization on the banks of river Vaigai’ (Jointly Published by:
Department of Archaeology & Tamil Nadu Text Book and Educational Services
Corporation, Tamil Nadu)
10. Studies in the History of India with Special Reference to Tamil Nadu (Dr.K.K.Pillay)
(Published by: The Author)
11. Porunai Civilization (Jointly Published by: Department of Archaeology & Tamil Nadu Text
Book and Educational Services Corporation, Tamil Nadu)
12. Journey of Civilization Indus to Vaigai (R.Balakrishnan) (Published by: RMRL) – Reference
Book.

SRMVEC R2023
12
`

GE3111 HERITAGE OF TAMILS L T P C


1 0 0 1

UNIT – I: LANGUAGE AND LITERATURE 3


Language Families in India - Dravidian Languages – Tamilas a Classical Language - Classical Literature
in Tamil – Secular Nature of Sangam Literature – Distributive Justice in Sangam Literature - Management
Principles in Thirukural - Tamil Epics and Impact of Buddhism & Jainism in Tamil Land - Bakthi Literature
Azhwars and Nayanmars - Forms of minor Poetry - Development of Modern literature in Tamil -
Contribution of Bharathiyar and Bharathidhasan.
UNIT – II: HERITAGE - ROCK ART PAINTINGS TO MODERN ART – 3
SCULPTURE
Hero stone to modernsculpture - Bronze icons - Tribes and their handicrafts – Art of temple car making -
Massive Terracotta sculptures, Village deities.
UNIT – III: FOLK AND MARTIAL ARTS 3
Therukoothu, Karagattam, Villu Pattu, Kaniyan Koothu, Oyillattam, Leatherpuppetry, Silambattam, Valari,
Tiger dance - Sports and Games of Tamils.
UNIT – IV: THINAI CONCEPT OF TAMILS 3
Flora and Fauna of Tamils & Aham and Puram Concept from Tholkappiyam and Sangam Literature - Aram
Concept of Tamils –Tamil Sangam- Education and Literacy during Sangam Age - Ancient Cities and Ports
of Sangam Age - Export and Import during Sangam Age - Overseas Conquest of Cholas
UNIT – V: CONTRIBUTION OF TAMILS TO INDIAN NATIONAL 3
MOVEMENT AND INDIAN CULTURE
Contribution of Tamils to Indian Freedom Struggle - The Cultural Influence of Tamils over the other parts of
India – Self-Respect Movement - Role of Siddha Medicine in Indigenous Systems of Medicine – Inscriptions
& Manuscripts – Print History of Tamil Books.
TOTAL: 15 PERIODS

TEXT CUM REFERENCES:


1. தமிழக வரலாறு - மக்களும் பண்பாடும் - கக.கக.பிள்ளை (வவளியீடு: தமிழ்நாடு பாடநூல் மற்றும்
கல்வியியல் பணிகள் கழகம்).
2. கணினித்தமிழ் - முளைவர். இல.சுந்தரம். (விகடன் பிரசுரம்)
3. கீழடி - ளவளக நதிக்களரயில் சங்ககால நகர நாகரிகம் (வதால்லியல் துளை வவளியீடு)
4. வபாருளந - ஆற்ைங்களர நாகரிகம். (வதால்லியல் துளை வவளியீடு)
5. Social Life of Tamils (Dr.K.K.Pillay) A joint publication of TNTB & ESC and RMRL – (in
print)
6. Social Life of the Tamils - The Classical Period (Dr.S.Singaravelu) (Published by:
International Institute of Tamil Studies.
7. Historical Heritage of the Tamils (Dr.S.V.Subaramanian, Dr.K.D. Thirunavukkarasu)
(Published by: International Institute of Tamil Studies).
8. The Contributions of the Tamils to Indian Culture (Dr.M.Valarmathi) (Published by:
International Institute of Tamil Studies.)

SRMVEC R2023
13
`

9. Keeladi - ‘Sangam City Civilization on the banks of river Vaigai’ (Jointly Published by:
Department of Archaeology & Tamil Nadu Text Book and Educational Services
Corporation, Tamil Nadu)
10. Studies in the History of India with Special Reference to Tamil Nadu (Dr.K.K.Pillay)
(Published by: The Author)
11. Porunai Civilization (Jointly Published by: Department of Archaeology & Tamil Nadu Text
Book and Educational Services Corporation, Tamil Nadu)
12. Journey of Civilization Indus to Vaigai (R.Balakrishnan) (Published by: RMRL) – Reference
Book.

SRMVEC R2023
14
`

GE3121 PHYSICS AND CHEMISTRY LABORATORY L T P C


0 0 4 2
COURSE OBJECTIVES:

• To learn the proper use of various kinds of physics laboratory equipment.


• To learn how data can be collected, presented and interpreted in a clear and concise manner.
• To learn problem solving skills related to physics principles and interpretation of experimental data.
• To determine error in experimental measurements and techniques used to minimize such error.
• To make the student as an active participant in each part of all lab exercises.

LIST OF EXPERIMENTS: PHYSICS LABORATORY (Any 5 Experiments)


1. Calculation of lattice cell parameter – X-ray diffraction method.
2. Determination of velocity of sound and compressibility of liquid – Ultrasonic interferometer
3. (a) Compact disc- Determination of width of the groove using Laser.
(b) Determination of particle size using Laser
4. (a) Determination of wavelength using Laser
(b) Determination of acceptance angle and numerical aperture in an optical fiber.
5. Determination of Planck’s constant using LED.
6. Determination of thickness of a thin wire – Air wedge method
7. Determination of wavelength of mercury spectrum – spectrometer grating
8. Determination of rigidity modulus – Torsion pendulum
9. Determination of Young’s modulus by non-uniform bending method.

TOTAL : 30 PERIODS

COURSE OUTCOMES:
At the end of the course, the students should be able
• Understand the functioning of various physics laboratory equipment.
• Use graphical models to analyze laboratory data.
• Use mathematical models as a medium for quantitative reasoning and describing physical
reality.
• Access, process and analyze scientific information.
• Solve problems individually and collaboratively.

REFERENCE:
1. Wilson J.D. and Hernaandez Hall C.A.,― Physics Laboratory Experiments, Houghton Mifflin Company,
New York, 2005.
2. S. Srinivasan, A Text Book of Practical Physics, S. Sultan Chand publications. 2005
3. R. Sasikumar, Practical Physics, PHI Learning Pvt. Ltd, New Delhi, 2011.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 2 3 1 1 - - - - - - - - - - -
CO 2 3 3 2 1 1 - - - - - - - - - - -
CO 3 2 3 1 1 - - - - - - - - - - - -
CO 4 3 3 2 1 1 - - - - - - - - - - -
CO 5 3 2 3 1 1 - - - - - - - - - - -
AVG 3 2.4 2.6 1 1 - - - - - - - - - - -

SRMVEC R2023
15
`

CHEMISTRY LABORATORY: (Any five experiments to be conducted)

COURSE OBJECTIVES:

• To inculcate experimental skills to test basic understanding of water quality parameters, such as
acidity, alkalinity, hardness, DO, TDS, chloride, and chlorine.
• To familiarise the students with electroanalytical techniques like conductometry and flame
photometry to determine the impurities in aqueous solution.
• To find the various characteristics of domestic water.
• To understand the Pseudo first-order kinetics reaction.
• To make the students know the synthesis of nanoparticles.

LIST OF EXPERIMENTS:

1. Determination of chloride content of water sample by Argentometric method.


2. Determination of total, temporary & permanent hardness of water by EDTA method.
3. Determination of DO content of water sample by Winkler’s method.
4. Preparation of Na2CO3 as a primary standard and estimation of acidity of a water sample using the
primary standard.
5. Determination of types and amount of alkalinity in water samples.
6. Estimation of available chlorine in bleaching powder solution.
7. Conductometric titration of barium chloride against sodium sulfate (Precipitation titration).
8. Estimation of sodium /potassium present in water using a flame photometer.
9. Estimation of TDS of a water sample by gravimetry.
10. Preparation of nanoparticles (Ag/Au/TiO2/ZnO/CuO).
11. Pseudo first-order kinetics- ester hydrolysis.
TOTAL : 30 PERIODS
COURSE OUTCOMES:
At the end of the course, the students should be able
• To infer the quality of water samples for alkalinity, hardness, DO, TDS, chloride, and chlorine.
• To apply the knowledge on the estimation of metal ions, acidity and its precipitation nature towards
their process.
• To recognize the threshold limit for various characteristics of domestic water.
• To identify the simple method of synthesis of nanoparticles.
• To understand the pseudo first-order kinetics reaction from ester hydrolysis.
TEXTBOOKS:
1. Vogel’s Textbook of Quantitative Chemical Analysis (8th Edition, 2014).
2. Suchi Tiwari, Engineering Chemistry Lab Manual, Scitech Publications (India) Pvt. Ltd. (2nd
Edition, 2013).
3. Pushpendra Kumar, Laboratory Manual for Engineering Chemistry, Reyansh Authortopic Pvt. Ltd.,
(1st Edition, 2022).
CO-PO and PSO MAPPING:
Programme Outcomes (PO) PSO
Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 2 3 1 1 - 1 - - - - - - - - -
CO 2 3 3 2 1 1 - - - - - - - - - - -
CO 3 3 2 3 1 1 - - - - - - - - - - -
CO 4 3 3 2 1 2 - - - - - - 1 - 2 - -
CO 5 3 2 3 1 1 - - - - - - - - - - -
AVG 3 2.4 2.6 1 1.2 - 0.2 - - - - 0.2 - 0.4 - -

SRMVEC R2023
16
`

GE3134 ENGINEERING PRACTICES LABORATORY L T P C


(Common to all branches of B.E. / B.Tech. Programmes) 0 0 4 2

COURSE OBJECTIVES:
• To provide exposure to the students with hands on experience on various basic engineering
practices in Civil, Mechanical, Electrical and Electronics Engineering.
• To provide hands on training for fabrication of components using carpentry, sheet metal and
welding equipment / tools
• To gain the skills for making fitting joints and assembling air conditioner
• To develop the skills for making simple electrical wiring connections using suitable tools
• To provide hands on experience for soldering and gain knowledge about the behavior of
electronics components
GROUP A (CIVIL & MECHANICAL)

I CIVIL ENGINEERING PRACTICE 15


Buildings:
a) Study of plumbing and carpentry components of residential and industrial buildings safety aspects.
Plumbing Works:
a) Study of pipeline joints, its location and functions: valves, taps, couplings, unions, reducers, elbows
in household fittings.
b) Study of pipe connections requirements for pumps and turbines.Preparation of plumbing line
sketches for water supply and sewage works.
c) Hands-on-exercise: Basic pipe connections – Mixed pipe material connection – Pipe connections
with different joining components.
d) Demonstration of plumbing requirements of high-rise buildings.
Carpentry works:
a) Study of the joints in roofs, doors, windows and furniture.
b) Hands-on-exercise:
Wood work, joints by sawing, planning and cutting.
II MECHANICAL ENGINEERING PRACTICE 15
Welding:
a) Preparation of butt joints, lap joints and T- joints by Shielded metal arc welding
b) Gas welding practice - Study

Basic Machining:
a) Facing
b) Simple Turning
c) Step Turning

SRMVEC R2023
17
`

Sheet Metal Work:


a) Forming & Bending
b) Model making – Trays
Demonstration on:
a) Smithy operations, upsetting, swaging, setting down and bending.
b) Foundry operations like mould preparation for gear and step cone pulley.
c) Assembly of centrifugal pump
d) Assembly of air conditioner
GROUP B (ELECTRICAL & ELECTRONICS)

III ELECTRICAL ENGINEERING PRACTICE 15


1. Residential house wiring using Switches, Fuse, Indicator, Lamp and Energy meter.
2. Fluorescent Lamp Wiring.
3. Staircase Wiring.
4. Measurement of Voltage, Current, Power and Power factor in electrical circuit.
5. Measurement of Energy using Analog & Digital Energy meter.
6. Measurement of Earth Resistance.
7. Study of Industrial house wiring.
8. Identification & Study of protective devices: Fuses & Fuse carriers, MCB, ELCB and Isolators
with ratings and usage.
IV ELECTRONICS ENGINEERING PRACTICE 15
1. Study of Electronic components and equipments – Resistor, colour coding measurement of
AC signal parameter (peak-peak, RMS period, frequency) using CR.
2. Study of logic gates AND, OR, EX-OR and NOT.
3. Generation of Clock Signal.
4. Soldering practice – Components, Devices and Circuits – Using general purpose PCB.
5. Measurement of ripple factor of HWR and F

TOTAL: 60 PERIODS

SRMVEC R2023
18
`

EN3119 ENGLISH LANGUAGE LEARNING LABORATORY L T P C


0 0 2 1
COURSE OBJECTIVES:

• Enhance the employability and career skills of students.


• Orient the students towards grooming as a professional.
• Make them industry ready.
• Develop their confidence and help them attend interviews successfully.
• Help students to interact confidently in a professional scenario.

UNIT – I: PRONUNCIATION 6
Tone- Pronunciation – Intonation- Reading Aloud and Addressing- Syllable- Rhythm-Accent- Wrongly Pronounced
words -Poetry Reading
UNIT – II: NON VERBAL COMMUNICATION 6
Non Verbal Communication - Facial expressions- Eye contact - Subtle (and not so subtle) gestures -Tone of voice –
Touch- Posture -Personal space.
UNIT – III: SELF INTRODUCTION AND PRESENTATION 6
Self Introduction- Introducing oneself to the audience- Introducing the Topic – answering questions – Individual
Presentation Practice – Presenting Visuals effectively -5 Minute Presentations.
UNIT – IV: BASICS OF SOFT SKILLS 6
Recognizing differences between groups and teams – managing time – networking professionally – Respecting social
protocols- understanding career management – Developing a long - term career plan- making career changes.
UNIT – V: GROUP DISCUSSION 6
Introduction to Group Discussion – Participating in Group discussions – Understanding group dynamics –
Brainstorming the Topic – Questioning and Clarifying – GD Strategies – activities to improve GD Skills.
TOTAL: 30 PERIODS

COURSE OUTCOMES:
At the end of the course, the student should be able to:
• Pronounce the words correctly.
• Understand the nonverbal clues.
• Make an effective presentation.
• Adequate soft skills required for the workplace.
• Participate confidently in Group Discussions.

REFERENCE BOOKS:
1. Professional Communication by Meenakshi Raman & Sangeeta Sharma, Oxford Univ.Press, 2014.
2. Soft Skills by S. Hariharan , N. Soundarajaran and S.P. Shanmugapriya MJP Publishers, Edition:
2013
3. Soft Skills for Everyone by Butterfield , Jeff, Cengage Learning India Pvt. Ltd.,2015. New Delhi.

SRMVEC R2023
19
`

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 - - - 1 - - - - - 3 - 1 - - - -
CO 2 1 1 - - - - 1 - - 2 - 1 - - - -
CO 3 2 2 1 2 2 - - - - 3 - 1 - - - -
CO 4 2 1 1 - - - 3 - - 3 - 1 - - - -
CO 5 - 1 - 1 - - - - - 3 - 1 - - - -
AVG 1.6 1.2 1 1.5 2 - 2 - - 2.8 - 1 - - - -

SRMVEC R2023
20
`

SEMESTER II
EN3211 PROFESSIONAL ENGLISH – II L T P C
3 0 0 3
COURSE OBJECTIVES:
• To develop strategies and techniques to enhance their reading skills.
• To engage them in meaningful activities in order to improve their listening, speaking, reading and
writing skills.
• To improve their ability to write effective job application, resumes and draft impressive reports.
• To develop analytical thinking skills for problem solving in communicative contexts.
• To participate in group discussions.
UNIT – I: MAKING COMPARISON 9
Listening: Clippings of Ted talk, cartoon and interviews of sports personalities for listening and discussion.
Speaking: Descriptions and discussions based on newspaper.
Reading: Learning shades of meaning (using Thesaurus) and inferring the context from general passages.
Writing: Compare & Contrast essays and Jumbled Sentences.
Language and Vocabulary development: Prepositional phrases, contextual meaning of words. Verbal Analogy,
Same word used as Noun and Verb.
UNIT – II: EXPRESSING CAUSAL RELATIONS IN SPEAKING AND WRITING 9
Listening: Anecdotes to be read from books like Chicken Soup books. Evaluative listening – Advertisement and
Product description.
Speaking: Marketing a product, persuasive speech
Reading: Description of any product / jewellery, Brochures and Manual.
Writing: Formal letters- letters of complaint, appreciation, and suggestion, Comprehension and E-mail (formal)
Language and Vocabulary development: Active & Passive, Infinitive, Gerund, Purpose Statements, Adverbs and
Word formation
UNIT – III: ABILITY TO PUT IDEAS OR INFORMATION COGENTLY 9
Listening: Listen to English songs and find the lyrics/new words
Speaking: Role play and Interviews
Reading: Reading magazine articles, Excerpts from literary texts
Writing: Job Application, Resume, Cover letter, SWOC Analysis and Recommendations.
Language and Vocabulary development: Correction of errors, If conditional, Sentence completion and
Connotations.
UNIT – IV: ANALYZING PROBLEMS AND EXPRESSING SOLUTIONS 9
Listening: Watching Stand-up comedies and comprehending ideas expressed there.
Speaking: Speak about the Stand-up comedies viewed and express personal views about the same
Reading: Reading different types of books (novels, short stories, biographies, magazines etc. and speaking about
the same.
Writing: Dialogue Writing, Checklist and Problem Solving essays.
Language and Vocabulary development: Reported Speech, Modals, Slogan writing and Conjunctions.
UNIT – V: REPORTING EVENTS 9
Listening: Listening to spot errors, listening to varied dialects and accents of English.
Speaking: Group discussion- Expression of opinions, assertion, coercion etc.
Reading: Reading life experiences of common man from magazines.
Writing: Accident Report / Survey Report and Letters to the Editor.
Language and Vocabulary development: Numerical Adjective, Idioms, Vocabulary – Shades of Meaning.
TOTAL: 45 PERIODS

SRMVEC R2023
21
`

COURSE OUTCOMES:
At the end of the course, the student should be able to:
• To compare and contrast ideas and information from technical texts.
• To incorporate basic grammar structures to express appreciation, suggestion and complaint in
writing.
• To draft effective resumes using appropriate vocabulary and to avoid common errors.
• To analyse problems so as to arrive at appropriate solutions and to communicate relevantly.
• To draft technical reports, letters and to express ideas creatively.

TEXT BOOKS:
1.English for Science and Technology Cambridge University Press,2021. Dr.Veena Selvam,
Dr.Sujatha Priyadarshini, Dr. Deep Mary Francis, Dr.K.N.Shoba and Dr.Lourdes Joevani,
Department of English, Anna University.
2.Technical Communication – Principles and Practice by Meenakshi Raman & Sangeeta Sharma,
Oxford Univ.Press, 2016, New Delhi.
3.Technical English for Professional – Advanced by C. Gangalakshmi, B. Rathika and L. Saranraj,
Cengage Learning India Pvt. Ltd.,2022.

REFERENCE BOOKS:
1.Learning to communicate – Dr. V. Chellammal, Oxford Univ.Press,2001 New Delhi.
2.Business Correspondence and Report Writing by Prof. R. C. Sharma & Krishna Mohan, Tata
McGraw Hill & Co. Ltd., 2001, New Delhi.
3.Developing Communication Skills by Krishna Mohan, Meera Bannerji- Macmillan India Ltd. 1990,
Delhi.
4.Improve Your Writing ed. V.N Arora Laxmi Chandra, Oxford Univ. Press, 2001, New Delhi.
5.English For Engineers and Technologists, Orient Blackswan Private Ltd. Department of English,
Anna University,2020.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 - 1 2 1 - - - - - 3 - 1 - - - -
CO 2 2 2 1 2 2 - - - - 3 1 1 - - - -
CO 3 - - 1 - - - - - - 3 - - - - - -
CO 4 2 3 2 3 - - 2 - - 3 - - - - - -
CO 5 2 - 1 - - - - - 2 - - - - - -
AVG 2 2 1.4 2 2 - 2 - - 2.8 1 1 - - - -

SRMVEC R2023
22
`

MA3222 STATISTICS AND NUMERICAL METHODS L T P C


3 1 0 4
COURSE OBJECTIVES:

• This course aims at providing the necessary basic concepts of statistical and Numerical Methods
for solving numerically different problems of engineering and Technology.
• To acquaint the knowledge of testing of hypothesis for small and large samples which plays an
important role in real life problems.
• To introduce the basic concepts of solving algebraic and transcendental equations.
• To introduce the numerical techniques of interpolation in various intervals and differentiation and
integration in engineering and technology disciplines.
• To acquaint the knowledge of various techniques and methods of solving ordinary differential
equations.

UNIT – I: STATISTICAL HYPOTHESIS TESTS 9L+3T


Sampling distributions - Tests for single mean and difference of means (Large and small samples) – Tests for single
variance and equality of variances – Chi square test for goodness of fit – Independence of attributes.
UNIT – II: EXPERIMENTAL DESIGN FOR ANOVA 9L+3T
One way and two way classifications - Completely randomized design – Randomized block design – Latin square
design
UNIT – III: SOLUTION OF EQUATIONS AND EIGEN VALUE PROBLEMS 9L+3T
Solution of algebraic and transcendental equations - Fixed point iteration method – Newton - Raphson method -
Solution of linear system of equations - Gauss elimination method – Pivoting - Gauss Jordan method – Iterative
method of Gauss Seidel –Dominant Eigenvalue of a matrix by Power method.
UNIT – IV: INTERPOLATION, NUMERICAL DIFFERENTIATION AND 9L+3T
NUMERICAL INTEGRATION
Lagrange’s and Newton’s divided difference interpolations – Newton’s forward and backward difference interpolation
– Approximation of derivates using interpolation polynomials – Numerical integrations using Trapezoidal, Simpson’s
rules.
UNIT – V: NUMERICAL SOLUTION OF ORDINARY DIFFERENTIAL EQUATIONS 9L+3T
Single step methods: Taylor’s series method - Euler’s method - Modified Euler’s method Fourth order Runge-Kutta
method for solving first order equations - Multi step methods: Milne’s and Adams -Bash forth predictor corrector
methods for solving first order equations.
TOTAL: 45L +15T PERIODS

COURSE OUTCOMES:
On Completion of the course, the students should be able to have:
• Apply the concept of testing of hypothesis for small and large samples in real life problems.
• Apply the basic concepts of classifications design of experiments in the field of agriculture.
• Appreciate the numerical techniques of interpolation in various intervals and apply the numerical
techniques of differentiation and integration for engineering problems.
• Understand the knowledge of various techniques and methods for solving first and second order
ordinary differential equations.
• Solve the ordinary differential equations with initial and boundary conditions by using certain
techniques with engineering application.
SRMVEC R2023
23
`

TEXT BOOKS:
1. Grewal. B.S. and Grewal. J.S., “Numerical Methods in Engineering and Science ", 10th
2. Edition, Khanna Publishers, New Delhi,2015.
3. Johnson, R.A., Miller, I and Freund J., “Miller and Freund’s Probability and Statistics for Engineers",
Pearson Education, Asia, 8th Edition,2015.

REFERENCE BOOKS:
1. Burden, R.L and Faires, J.D, "Numerical Analysis”, 9th Edition, Cengage Learning,2016.
2. Devore. J.L., "Probability and Statistics for Engineering and the Sciences”, Cengage Learning, New
Delhi, 8th Edition, 2014.
3. Gerald.C.F., Wheatley. P.O. "Applied Numerical Analysis” Pearson Education, Asia, New Delhi,
2006.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 3 - - - - - - - - - - 1 - - -
CO 2 3 3 - - - - - - - - - - 1 - - -
CO 3 3 3 - - - - - - - - - - 1 - - -
CO 4 3 3 - - - - - - - - - - 1 - - -
CO 5 3 3 - - - - - - - - - - 1 - - -
AVG 3 3 - - - - - - - - - - 1 - - -

SRMVEC R2023
24
`

PH3222 PHYSICS FOR INFORMATION SCIENCE L T P C


For Second Semester-B.E. /B.Tech. 3 0 0 3
(CSE, IT, AI&DS and Cyber Security)
COURSE OBJECTIVES:

• To provide information on the free electron theories and to understand the electrical properties of
conducting material.
• To teach the basic knowledge of semiconductors and their applications.
• To enhance the idea of magnetic materials in storage devices and also to enrich the basic
knowledge of superconductors and their applications.
• To gain knowledge about the interaction of photons with materials and optoelectronic devices.
• To understand the fundamental concepts of nanomaterials and quantum computing.

UNIT – I: CONDUCTING MATERIALS 9


Classical free electron theory - postulates - Expression for electrical conductivity and thermal conductivity -
Wiedemann-Franz law - Success and failures - Quantum free electron theory (qualitative) - Fermi distribution
function - Density of energy states - Electron in periodic potential - Energy bands in solids - Low and high resistivity
alloys.
UNIT – II: SEMICONDUCTOR PHYSICS 9
Properties - Intrinsic semiconductors - Direct and indirect band gap semiconductors - Carrier concentration in intrinsic
semiconductors - Extrinsic semiconductors - Carrier concentration in N-type & P-type semiconductors - Variation of
Fermi level with temperature and impurity concentration - Variation of carrier concentration with temperature for
extrinsic semiconductors - Hall effect - Theory and experiment and applications.
UNIT – III: MAGNETIC MATERIALS AND SUPERCONDUCTOR 9
Basic definitions of magnetism - Classification (based on spin): Diamagnetism, Paramagnetism, Ferromagnetism,
anti-Ferromagnetism and ferrimagnetism - Ferromagnetic domain theory - Energy involved in domains - Hysteresis
curve - Temporary and permanent magnetic materials, examples and uses - Magnetic principles in computer data
storage - Magnetic hard disc (GMR sensor).
Superconductors - properties - Applications (Magnetic levitation, Cryotron and SQUID).
UNIT – IV: OPTOELECTRONIC DEVICES 9
Classification of optical materials - Optical processes in semiconductors: optical absorption and emission - carrier
injection and recombination - Photodiode - Solar cell - Light Emitting Diode - Organic Light Emitting Diode - Quantum
dot laser - Optical data storage devices-plasmonics.
UNIT – V: NANODEVICES AND QUANTUM COMPUTING 9
Introduction - Quantum confinement - Quantum structures (qualitative) - Band gap of nanomaterial - Single Electron
Transistor (SET): Tunnelling - Coulomb-blockade effect - Carbon nanotubes: Properties and applications. Quantum
cellular automata (QCA) - Quantum system for information processing - Characteristics and working of quantum
computers - Advantages and disadvantages of quantum computing over classical computing
TOTAL: 45 PERIODS

SRMVEC R2023
25
`

COURSE OUTCOMES:
At the end of the course, the student should be able to:
• To understand the classical and quantum-free electron theories, and energy bands in solids.
• To apply the concepts of semiconductor Physics and its applications in various devices.
• To apply the properties of magnetic materials and superconductors in various fields.
• To understand the basics of optical materials and apply knowledge to develop materials for
optoelectronic devices.
• To know the concepts and applications of quantum structures and the basics of quantum computing.

TEXT BOOKS:
1. Kasap, S.O., “Principles of Electronic Materials and Devices”, McGraw-Hill Education,2007.
2. M. Arumugam, “Semiconductor Physics and optoelectronics”, Anuradha agencies,2003.
3. Kittel, C., “Introduction to Solid State Physics”, Wiley, 2005.
4. Wahab, M.A. “Solid State Physics: Structure and Properties of Materials”.Narosa Publishing House,
2009.
5. B. K. Pandey., S. Chaturvedi., “Engineering Physics”, Cengage Learning, 2012.
6. V.Rajendiran, Engineering Physics, Tata McGraw-Hill, New Delhi. 2011.

REFERENCE BOOKS:
1. B. N. Sankar., S. O. Pillai., “Engineering Physics” New age international publishers, 2007.
2. Donald .A.Neamen., “Semiconductor Physics and devices” Tata Mc Graw-Hill, New Delhi. 2007
3. Rogers, B., Adams, J. & Pennathur, S. “Nanotechnology: Understanding small systems”, CRC
Press, 2014.

ONLINE RESOURCES:
1. “Optoelectronics - An introduction” -Jhon Wilson and Jhon Hawkes- Prentice Hall Europe- ISBN
0-13-1039M-X
2. “Quantum Computing -A Gentle Introduction”- Eleanor Rieffel and Wolfgang Polak - ISBN 978-
0-262-01506-6
3. “An introduction to Quantum Computing” -NPTEL - https://nptel.ac.in/courses/106106232

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 1 - - - - - - - - - 1 - - - -
CO 2 3 1 2 - 1 - - - - - - 1 - - - -
CO 3 3 - 1 - 2 1 1 - - - - 1 - - - -
CO 4 3 - 2 1 3 - 1 - - - - 1 - - - -
CO 5 3 1 2 1 2 1 2 - - - - 1 - - - -
AVG 3 1 1.75 1 2 1 1.3 - - - - 1 - - - -

SRMVEC R2023
26
`

CH3222 CHEMISTRY FOR INFORMATION SCIENCE L T P C


For Second Semester-B.E. /B.Tech. 3 0 0 3
(CSE, IT, AI&DS and Cyber Security)
COURSE OBJECTIVES:

• To make the students acquainted with various energy sources, storage devices, and battery
technology.
• To acquaint the student with the principles of photochemistry, application of spectroscopy, and
sample analyzing techniques.
• To understand the preparation, properties, and engineering applications of functional materials,
nanoreactors, nanoelectronics, and sensors.
• To make the student conversant with the basics of composites, their properties, and applications in
memory devices.
• To acquaint the students with the basics of biomolecule networks, metabolic pathways, drug
design applications, drawing tools, and structure visualizations.

UNIT – I: ENERGY SOURCES AND STORAGE DEVICES 9


Introduction - nuclear energy - light water nuclear power plant - breeder reactor, solar energy conversion - solar
cells: principle, working and applications. Types of batteries - primary battery (alkaline battery), secondary battery
(lead acid battery, NICAD battery, lithium-ion battery), fuel cells (H2-O2 fuel cell). Supercapacitors: storage principle,
applications. Electric vehicles- working principles.
UNIT – II: PHOTOCHEMISTRY AND SPECTROSCOPY 9
Photochemistry: laws of photochemistry - Grotthuss-Draper law, Stark-Einstein law, and Lambert-Beer Law, quantum
efficiency - determination - Jablonski diagram: internal conversion, intersystem crossing, fluorescence,
phosphorescence, chemiluminescence, and photo-sensitization - applications. Spectroscopy: electromagnetic
spectrum - absorption of radiation - electronic, vibrational, and rotational transitions, UV-visible and IR spectroscopy:
principles, instrumentation (block diagram) - applications.
UNIT – III: SMART MATERIALS 9
Introduction - organic functional materials: preparation, properties, and engineering applications of graphite,
fullerenes, carbon nanotubes, smart materials: nanoporous zeolites, self-assembled nanoreactors, nanostructures
for molecular recognition, the chemistry of nanoelectronics: data memory, lighting, and displays, thin films, OLEDs,
sensors: electrochemical sensors, neuro-electronic interfaces.
UNIT – IV: NANOCOMPOSITES & MEMORY DEVICES 9
Introduction - definition - need, constitution: matrix materials (polymer matrix, metal matrix) and reinforcement (fiber),
properties and applications of metal matrix composites (MMC), and polymer matrix composites - micro and
nanoelectromechanical systems, applications of nanomaterials in memory devices.
UNIT – V: CHEMINFORMATICS 9
Introduction - coordinate-bond, bond length, bond angles, torsional angles - chemical structure - confirmation -
representation of structural information - sources - formats - graph theory - molecular numerology - storage of structural
data - databases - types - fingerprint - similarity search - applications of cheminformatics in drug designing.
TOTAL: 45 PERIODS

SRMVEC R2023
27
`

COURSE OUTCOMES:
At the end of the course, the student should be able to:
• To apply the gained knowledge on different energy sources and storage devices.
• To recognize the principle and concepts in photochemistry and spectroscopy.
• To recommend smart materials and sensors for the development of innovative materials.
• To utilize the different composites and memory devices.
• To identify the structural information about different materials with help of software.

TEXT BOOKS:
1.Shikha Agarwal, “Engineering Chemistry”-Fundamentals and Applications, 2nd Edition, Cambridge
University Press, New Delhi, 2019.
2.P. C. Jain and Monika Jain, “Engineering Chemistry”, 17th Edition, Dhanpat Rai Publishing
Company (P) LTD, New Delhi, 2019.
3.S. Vairam, P. Kalyani and Suba Ramesh, “Engineering Chemistry”, Wiley India PVT, LTD, New
Delhi, 2013.

REFERENCE BOOKS:
1.Friedrich Emich, “Engineering Chemistry”, Scientific International PVT, LTD, New Delhi, 2014.
2.S.S. Dara and S.S. Umare, “A Text Book of Engineering Chemistry”, 12th Edition, S. Chand &
Company LTD, New Delhi, 2018.
3.B. Sivasankar, “Engineering Chemistry”, Tata McGraw-Hill Publishing Company LTD, 2023.
4.O. G. Palanna, Engineering Chemistry, McGraw Hill Education (India) Pvt, Ltd, New Delhi, 2017.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 1 - - 1 1 - 1 - - - - - - - - -
CO 2 1 1 - 3 3 - - - - - - - - - - -
CO 3 1 - 1 - 2 - - - - - - 1 - - 1 -
CO 4 2 - 1 - - - - - - - - - - - - -
CO 5 3 1 - - 3 - - - - - - - 2 - - -
AVG 1.6 0.4 0.4 0.8 1.8 - 0.2 - - - - 0.2 0.4 - 0.2 -

SRMVEC R2023
28
`

GE3231 PROBLEM SOLVING AND PYTHON PROGRAMMING L T P C


(Common to All branches) 3 0 0 3
COURSE OBJECTIVES:

• To know the basics of Python programming


• To read and write simple Python programs.
• To develop Python programs with conditionals and loops.
• To define Python functions and call them.
• To use Python data structures and its implementation – lists, tuples, dictionaries.
• To understand Object Oriented Concept in Python.

UNIT – I: PYTHON BASICS 9


Introduction to Python – Literals – Variables and Identiiers – Data Types – Input Operation – Comments – Reserved
words – Indentation – Operators and Expressions – Modes of python. Conditionals: Boolean values and operators
- conditional if - alternative if - chained conditional - Iteration, Illustrative programs: Basic Arithmetic Operations,
GCD of numbers, Square root (Newton’s Method).
UNIT – II: FUNCTIONS, LIST, TUPLES 9
Functions, function definition and use. Fruitful functions: return values, parameters, local and global scope,
recursion. Lists: list operations, list slices, list methods, list loop, mutability, list parameters; Tuples: tuple assignment,
tuple as return value. Comparison of Lists and tuples. Illustrative programs: exchange the values of two variables,
square root, Linear and Binary search. Fibonacci series using functions.
UNIT – III: STRINGS, DICTIONARY, SET 9
Strings: string slices, immutability, string functions and methods, string module. Dictionaries: Operations (create,
access, add, remove) and methods. (Insert, delete). Set operation (Access, Add, Remove). Illustrative programs:
creates a dictionary of radius of a circle and its circumference.
UNIT – IV: FILES, EXCEPTIONS, MODULES AND PACKAGES 9
Files and exception: Text Files, Reading and Writing files, Format operator; Errors and Exceptions, Handling
Exceptions, Multiple Except blocks, Modules, Packages; Illustrative programs: word count, copy file, Creating user
defined Exceptions.
UNIT – V: CLASSES AND OBJECTS 9
Classes and Objects: Introduction, Classes and Objects, Defining Classes, Creating Objects, Data Abstraction and
Hiding, The Class Method and Self Argument, The init ( ) method, Class Variables and Object Variables, Public and
Private data members, Private Methods. Illustrative Programs: Creating Student Class and Objects.
TOTAL: 45 PERIODS

COURSE OUTCOMES:
At the end of the course, the student should be able to:
• Develop simple computational problems using control flow statements.
• Decompose a Python program into functions, Modules and Packages.
• Represent compound data using Python lists, tuples, Strings, Set and dictionaries.
• Read and write data from/to files and Exception handling in Python Programs.
• Understand the concepts of Object Oriented Programming and to develop real time applications.

SRMVEC R2023
29
`

TEXT BOOKS:
1.Reema Thareja, “Python Programming using Problem solving Approach”, Oxford Higher
Education,2018.
2.Allen B. Downey, “Think Python: How to Think Like a Computer Scientist”, 2nd edition, Updated for
Python 3, Shroff/O’Reilly Publishers, 2016 (http://greenteapress.com/wp/think- python/)
3.Guido van Rossum and Fred L. Drake Jr, “An Introduction to Python” – Revised and updated for
Python 3.2, Network Theory Ltd., 2011.

REFERENCE BOOKS:
1.Charles Dierbach, “Introduction to Computer Science using Python: A Computational Problem-
Solving Focus”, Wiley India Edition, 2013.
2.John V Guttag, “Introduction to Computation and Programming Using Python’’, Revised and
expanded Edition, MIT Press , 2013
3.Kenneth A. Lambert, “Fundamentals of Python: First Programs”, CENGAGE Learning, 2012.
4.Paul Gries, Jennifer Campbell and Jason Montojo, “Practical Programming: An Introduction to
Computer Science using Python 3”, Second edition, Pragmatic Programmers,LLC,2013.
5.Robert Sedgewick, Kevin Wayne, Robert Dondero, “Introduction to Programming in Python: An
Inter-disciplinary Approach”, Pearson India Education Services Pvt. Ltd., 2016.

WEB REFERENCES:
1.http://greenteapress.com/wp/think-python/
2.www.docs.python.org

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 3 3 3 2 - - - - - 2 2 2 - - 1
CO 2 3 3 3 3 2 - - - - - 2 2 - - 3 -
CO 3 3 3 3 3 2 - - - - - 2 - - - 1 -
CO 4 2 2 - 2 2 - - - - - 1 - 3 - 2 -
CO 5 1 2 - - 1 - - - - - 1 - - - - 1
AVG 2.4 2.6 3 2.7 1.8 - - - - - 1.6 2 2.5 - 2 1

SRMVEC R2023
30
`

GE3211 தமிழரும் மதொழில்நுட்பமும் L T P C


1 0 0 1

அலகு – I: மநசவு மற்றும் பொறனத் மதொழில்நுட்பம் 3

ெங்க கொலத்தில் மநெவுத் மதொழில் - பொமனத் மதொழில்நுட்பம் - கருப்பு ெிவப்பு பொண்டங்கள் - பொண்டங்களில் கீ றல்
குறியீடுகள்.

அலகு – II: வடிவறமப்பு மற்றும் கட்டிடத் மதொழில்நுட்பம் 3

ெங்ககொலத்தில் வடிவம ப்பு ற்றும் கட்டு ொனங்கள் & ெங்க கொலத்தில் வட்டு
ீ மபொருட்களில் வடிவம ப்பு -
ெங்ககொலத்தில் கட்டு ொன மபொருட்களும் நடுகல்லும் - ெிலப்பதிகொரத்தில் ம மட அம ப்பு பற்றிய விவரங்கள் -
ொ ல்லபுரம் ெிற்பங்களும் மகொவில்களும் - மெொழர் கொலத்துப் மபருங்மகொயில்கள் ற்றும் பிற வழிபொட்டு தலங்கள்
- நொயக்கர் கொல மகொவில்கள் - ொதிரி கட்டம ப்புகள் பற்றி அறிதல், துமர ீ னொட்ெி அம் ன் ஆலயம் ற்றும்
திரு மல நொயக்கர் ஹொல் - மெட்டிநொடு வடுகள்
ீ - பிரிட்டிஷ் கொலத்தில் மென்மனயில் இந்மதொ-ெொமரொமெனிக்
கட்டிடக்கமல.

அலகு – III: உற்பத்தி மதொழில்நுட்பம் 3

கப்பல் கட்டும் கமல – உமலொகவியல் - இரும்புத் மதொழிற்ெொமல - இரும்மப உருக்குதல், எஃகு - ஃப் வரலொற்று
ெொன்றுகளொக மெம்பு ற்றும் தங்க நொணயங்கள் - நொணயங்கமள அச்ெடித்தல் - ணி உருவொக்கும்
மதொழிற்ெொமலகள் – கல் ணிகள், கண்ணொடி ணிகள் - சுடு ண் ணிகள் - ெங்கு ணிகள் - எழும்பு துண்டுகள்
- மதொல்லியல் ெொன்றுகள் - ெிலப்பதிகொரத்தில் ணிகளின் வமககள்.

அலகு – IV: விவசொயம் மற்றும் நீர்ப்பொசன மதொழில்நுட்பம் 3

அமண, குளம், குளங்கள், தகு, மெொழர் கொல கு ிழி தூம்புவின் முக்கியத்துவம், விலங்கு கொல்நமட - கொல்நமட
பயன்பொட்டிற்கொக வடிவம க்கப்பட்ட கிணறுகள் - மவளொண்ம ற்றும் மவளொண்ம ெொர்ந்த மெயல்பொடுகள் -
கடல்ெொர் அறிவு - ீ ன்வளம் – முத்துக்குளித்தல் - மபருங்கடல் குறித்த பண்மடய அறிவு - அறிவு ெொர்ந்த ெமூகம்.

அலகு – V: அைிவியல் தமிழ் மற்றும் கைித்தமிழ் 3

அறிவியல் த ிழின் வளர்ச்ெி - கணித்த ிழ் வளர்ச்ெி - த ிழ் நூல்கமள ின்பதிப்பு மெய்தல் - த ிழ்
ம ன்மபொருட்கள் உருவொக்கம் - த ிழ் இமணயக் கல்விக்கழகம் - த ிழ் ின்நூலகம் - இமணயத்தில் த ிழ்
அகரொதிகள் - மெொற்குமவ திட்டம்.

TOTAL: 15 PERIODS

TEXT CUM REFERENCES:


1. தமிழக வரலாறு - மக்களும் பண்பாடும் - கக.கக.பிள்ளை (வவளியீடு: தமிழ்நாடு பாடநூல் மற்றும்
கல்வியியல் பணிகள் கழகம்).
2. கணினித்தமிழ் - முளைவர். இல.சுந்தரம். (விகடன் பிரசுரம்)
3. கீழடி - ளவளக நதிக்களரயில் சங்ககால நகர நாகரிகம் (வதால்லியல் துளை வவளியீடு)
4. வபாருளந - ஆற்ைங்களர நாகரிகம். (வதால்லியல் துளை வவளியீடு)
5. Social Life of Tamils (Dr.K.K.Pillay) A joint publication of TNTB & ESC and RMRL – (in
print)
6. Social Life of the Tamils - The Classical Period (Dr.S.Singaravelu) (Published by:
International Institute of Tamil Studies.
7. Historical Heritage of the Tamils (Dr.S.V.Subaramanian, Dr.K.D. Thirunavukkarasu)
SRMVEC R2023
31
`

(Published by: International Institute of Tamil Studies).


8. The Contributions of the Tamils to Indian Culture (Dr.M.Valarmathi) (Published by:
International Institute of Tamil Studies.)
9. Keeladi - ‘Sangam City Civilization on the banks of river Vaigai’ (Jointly Published by:
Department of Archaeology & Tamil Nadu Text Book and Educational Services
Corporation, Tamil Nadu)
10. Studies in the History of India with Special Reference to Tamil Nadu (Dr.K.K.Pillay)
(Published by: The Author)
11. Porunai Civilization (Jointly Published by: Department of Archaeology & Tamil Nadu Text
Book and Educational Services Corporation, Tamil Nadu)
12. Journey of Civilization Indus to Vaigai (R.Balakrishnan) (Published by: RMRL) – Reference
Book.

SRMVEC R2023
32
`

GE3211 TAMILS AND TECHNOLOGY L T P C


1 0 0 1

UNIT – I: WEAVING AND CERAMIC TECHNOLOGY 3


Weaving Industry during Sangam Age –Ceramic technology – Black and Red Ware Potteries (BRW) –
Graffiti on Potteries.
UNIT – II: DESIGN AND CONSTRUCTION TECHNOLOGY 3
Designing and Structural construction House & Designs in household materials during Sangam Age -
Building materials and Hero stones of Sangam age – Details of Stage Constructions in Silappathikaram -
Sculptures and Temples of Mamallapuram - Great Temples of Cholas and other worship places - Temples
of Nayaka Period - Type study (Madurai Meenakshi Temple)- Thirumalai Nayakar Mahal - Chetti Nadu
Houses, Indo - Saracenic architecture at Madras during British Period.
UNIT – III: MANUFACTURING TECHNOLOGY 3
Art of Ship Building - Metallurgical studies - Iron industry - Iron smelting, steel -Copper and gold- Coins as
source of history - Minting of Coins – Beads making-industries Stone beads - Glass beads - Terracotta
beads -Shell beads/ bone beats - Archeological evidences - Gem stone types described in
Silappathikaram.
UNIT – IV: AGRICULTURE AND IRRIGATION TECHNOLOGY 3
Dam, Tank, ponds, Sluice, Significance of Kumizhi Thoompu of Chola Period, Animal Husbandry - Wells
designed for cattle use - Agriculture and Agro Processing - Knowledge of Sea - Fisheries – Pearl - Conche
diving- Ancient Knowledge of Ocean - Knowledge Specific Society.
UNIT – V: SCIENTIFIC TAMIL & TAMIL COMPUTING 3
Development of Scientific Tamil - Tamil computing – Digitalization of Tamil Books – Development of Tamil
Software – Tamil Virtual Academy – Tamil Digital Library – Online Tamil Dictionaries – Sorkuvai Project.
TOTAL: 15 PERIODS

TEXT CUM REFERENCES:


1. தமிழக வரலாறு - மக்களும் பண்பாடும் - கக.கக.பிள்ளை (வவளியீடு: தமிழ்நாடு பாடநூல் மற்றும்
கல்வியியல் பணிகள் கழகம்).
2. கணினித்தமிழ் - முளைவர். இல.சுந்தரம். (விகடன் பிரசுரம்)
3. கீழடி - ளவளக நதிக்களரயில் சங்ககால நகர நாகரிகம் (வதால்லியல் துளை வவளியீடு)
4. வபாருளந - ஆற்ைங்களர நாகரிகம். (வதால்லியல் துளை வவளியீடு)
5. Social Life of Tamils (Dr.K.K.Pillay) A joint publication of TNTB & ESC and RMRL – (in
print)
6. Social Life of the Tamils - The Classical Period (Dr.S.Singaravelu) (Published by:
International Institute of Tamil Studies.
7. Historical Heritage of the Tamils (Dr.S.V.Subaramanian, Dr.K.D. Thirunavukkarasu)
(Published by: International Institute of Tamil Studies).
8. The Contributions of the Tamils to Indian Culture (Dr.M.Valarmathi) (Published by:
International Institute of Tamil Studies.)
9. Keeladi - ‘Sangam City Civilization on the banks of river Vaigai’ (Jointly Published by:

SRMVEC R2023
33
`

Department of Archaeology & Tamil Nadu Text Book and Educational Services
Corporation, Tamil Nadu)
10. Studies in the History of India with Special Reference to Tamil Nadu (Dr.K.K.Pillay)
(Published by: The Author)
11. Porunai Civilization (Jointly Published by: Department of Archaeology & Tamil Nadu Text
Book and Educational Services Corporation, Tamil Nadu)
12. Journey of Civilization Indus to Vaigai (R.Balakrishnan) (Published by: RMRL) – Reference
Book.

SRMVEC R2023
34
`

GE3233 ENGINEERING GRAPHICS AND DESIGN L T P C


(Common to all branches of B.E. / B.Tech. Programmes) 1 0 4 3
COURSE OBJECTIVES:

• To draw the conics curves and special curves, use BIS conventions, and specifications for
engineering drawing.
• To draw the orthographic projection of lines and plane surfaces.
• To draw the projections and solids and Isometric projection of simple solids.
• To draw the section of solids and the development of surfaces.
• To draw free hand sketching of basic geometrical constructions, multipleviews of objects and
Perspective Projection of simple solids.

CONCEPTS AND CONVENTIONS (Not for Examination) 1


Importance of graphics in engineering applications – Use of drafting instruments – BIS conventions and specifications – Size,
layout and folding of drawing sheets – Lettering and dimensioning.
UNIT – I: PLANE CURVES AND SPECIAL CURVES 11
Basic Geometrical constructions, Curves used in engineering practices: Conics – Construction of ellipse, parabola
and hyperbola by eccentricity method – Construction of cycloid (Rolling Circle rolls on flat surface only). construction
of involutes of square and circle – Drawing of tangents and normal to the above curves.
UNIT – II: PROJECTION OF POINTS, LINES AND PLANE SURFACES 12
Orthographic projection- Principles-Principal planes - First angle projection-projection of points at the First Quadrant
only. Projection of straight lines (only First angle projections) inclined to both the principal planes - Determination of
true lengths and true inclinations by rotating line method. Projection of planes (polygonal and circular surfaces) which
inclined to both the principal planes by rotating object method.
UNIT – III: PROJECTION OF SOLIDS AND ISOMETRIC PROJECTION 12
Projection of simple solids like prisms, pyramids, cylinders and cones when the axis is inclined to one of the principal
planes by the rotating object method. Principles of isometric projection – isometric scale – Isometric projections of
simple solids - Prisms, pyramids, cylinders, cones - isometric view of the object from the 2D coded plan.
UNIT – IV: PROJECTION OF SECTIONED SOLIDS & DEVELOPMENT 12
OF SURFACES
Sectioning of the above solids in the simple vertical position when the cutting plane is inclined to one of the principal
planes and perpendicular to the other – obtaining the true shape of the section. Development of lateral surfaces of
simple and sectioned solids – Prisms, pyramids cylinders and cones.
UNIT – V: FREE-HAND SKETCHING AND PERSPECTIVE 12
PROJECTIONS
Free Hand sketching: Visualization principles – Representation of Three-Dimensional objects – Layout of views- Free
hand sketching of multiple views from pictorial views of objects. Perspective projection of simple solids-Prisms and
pyramids by visual ray method.
TOTAL: (L=15; P=60) 75 PERIODS

SRMVEC R2023
35
`

COURSE OUTCOMES:
At the end of the course, the student should be able to:
• To construct the conics curves & special curves, use BIS conventions, and specifications for
engineering drawing.
• To construct the orthographic projection of lines and plane surfaces.
• To construct the projections and solids and Isometric projection of simple solids.
• To construct projections of section of solids and development of surfaces.
• To construct free hand sketching of basic geometrical constructions, multiple views of objects and
Perspective Projection of simple solids

TEXT BOOKS:
1. N.D.Bhatt, “Engineering Drawing (Plane and Solid Geometry)”, Charotar Publishing House PVT.
LTD. 53rd Edition 2019 (Fifth Reprint)
2. Venugopal K. and Prabhu Raja V., “Engineering Graphics”, New Age International (P) Limited,
15th Edition 2018.

REFERENCE BOOKS:
1. T. Jeyapoovan, “Engineering Graphics Using Auto CAD”, Vikas Publishing House Pvt. LTD,
seventh Edition, 2015.
2. Luzzader, Warren.J. and Duff, John M., “Fundamentals of Engineering Drawing with an
introduction to Interactive Computer Graphics for Design and Production”, Eastern Economy
Edition, Prentice Hall of India Pvt. Ltd, New Delhi, 2005.
3. Shah M.B., and Rana B.C., “Engineering Drawing”, Pearson, 2nd Edition, 2011.
4. Basant Agarwal and Agarwal C.M., “Engineering Drawing”, Tata McGraw Hill Publishing
Company Limited, New Delhi, 2013

PUBLICATION OF BUREAU OF INDIAN STANDARDS:


1. IS 10711 – 2001: Technical products Documentation – Size and lay out of drawing sheets.
2. IS 9609 (Parts 0 & 1) – 2001: Technical products Documentation – Lettering.
3. IS 10714 (Part 20) – 2001 & SP 46 – 2003: Lines for technical drawings.
4. IS 11669 – 1986 & SP 46 – 2003: Dimensioning of Technical Drawings.
5. IS 15021 (Parts 1 to 4) – 2001: Technical drawings – Projection Methods.

SPECIAL POINTS APPLICABLE TO UNIVERSITY EXAMINATIONS ON ENGINEERING GRAPHICS:


1. There will be five questions, each of either or type covering all units of the syllabus.
2. All questions will carry equal marks of 20 each making a total of 100.
3. The answer paper shall consist of drawing sheets of A3 size only. The students will be
permitted to use appropriate scales to fit solutions within A3 size.
4. The examination will be conducted in appropriate sessions on the same day

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 1 2 - 2 - - - - 3 - 2 2 1 - 1
CO 2 3 1 2 - 2 - - - - 3 - 2 2 1 - 1
CO 3 3 1 2 - 2 - - - - 3 - 2 2 1 - 1
CO 4 3 1 2 - 2 - - - - 3 - 2 2 1 - 1
CO 5 3 1 2 - 2 - - - - 3 - 2 2 1 - 1
AVG 3 1 2 - 2 - - - - 3 - 2 2 1 - 1

SRMVEC R2023
36
`

GE3221 ENGINEERING SCIENCES LABORATORY L T P C


0 0 4 2
COURSE OBJECTIVES:

• To gain practical knowledge and to co-relate with the theoretical studies.


• To achieve perfectness in experimental skills and the study of practical applications.
• To bring more confidence and ability to develop and fabricate engineering and technical equipment.
• To learn problem solving skills related to physics principles and interpretation of experimental data.
• To make the student as an active participant in each part of all lab exercises.

LIST OF EXPERIMENTS: PHYSICS LABORATORY (Any 5 Experiments)


1. Determination of the electrical conductivity of metals by plotting a current-voltage characteristic
curve.
2. Determination of band gap of a semiconductor.
3. Determination of Fermi energy. (Measurement of Fermi energy in copper).
4. Study of I-V characteristics of solar cell and determination of its efficiency
5. Determination of electrical resistivity of metal and alloy –Carey foster Bridge.
6. Measurement of susceptibility of paramagnetic solution by Quinke’s method.
7. Study of magnetic Hysteresis-B-H curve.
8. Determination of the dark resistance of light detective resister (LDR).
9. Measurement of Temperature using LM35.

TOTAL : 30 PERIODS

COURSE OUTCOMES:
At the end of the course, the students should be able
• To understand the functioning of various physics laboratory equipment.
• To use graphical models to analyze the laboratory data and to solve problems individually and
collaboratively.
• Use mathematical models as a medium for quantitative reasoning and describing physical
reality.
• Access, process and analyze scientific information.
• Solve problems individually and collaboratively.
REFERENCE:
1. Wilson J.D. and Hernaandez Hall C.A.,― Physics Laboratory Experiments, Houghton Mifflin Company,
New York, 2005.
2. S. Srinivasan, A Text Book of Practical Physics, S. Sultan Chand publications. 2005
3. R. Sasikumar, Practical Physics, PHI Learning Pvt. Ltd, New Delhi, 2011.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 2 3 1 1 - - - - - - - - - - -
CO 2 3 3 2 1 1 - - - - - - - - - - -
CO 3 3 2 3 1 1 - - - - - - - - - - -
CO 4 3 3 2 1 1 - - - - - - - - - - -
CO 5 3 2 3 1 1 - - - - - - - - - - -
AVG 3 2.4 2.6 1 1 - - - - - - - - - - -

SRMVEC R2023
37
`

CHEMISTRY LABORATORY: (Any five experiments to be conducted)

COURSE OBJECTIVES:
• To train the students in basic experimental skills in water contaminants such as copper and
chromium.
• To familiarise the students with electroanalytical techniques such as pH metry, potentiometry, and
conductometry to determine impurities in aqueous solutions.
• To familiarize the students with the determination of the molecular weight of a polymer by a
viscometer.
• To make the student up-to-date with the properties and nature of alloys experimentally.
• To demonstrate the analysis of coal.
LIST OF EXPERIMENTS:
1. Estimation of copper content of the given solution by Iodometry.
2. Determination of strength and amount of acids in a mixture of acids using a conductivity meter.
3. Determination of strength and amount of HCl present in the whole of the given solution using a
conductivity meter.
4. Estimation of the iron content of the given solution using a potentiometer.
5. Determination of chromium by EDTA titration.
6. Determination of strength of given hydrochloric acid using a pH meter.
7. Determine the molecular weight of the polyvinyl alcohol using an Ostwald viscometer.
8. Estimation of Nickel in steel.
9. Proximate Analysis of Coal.
10. Corrosion experiment-weight loss method.
11. Determination of COD value of industrial effluents.
TOTAL : 30 PERIODS
COURSE OUTCOMES:
At the end of the course, the students should be able
• To find the quality of water samples for copper and chromium present in water.
• To recognize the amount of various ions present in the water sample through volumetric and
instrumentation techniques.
• To identify the molecular weight of the polymer using an Ostwald viscometer.
• To recognize an environmental hazardous and threshold limit for industrial effluents.
• To recommend quality of coal and steel when it is exposed to various environment.
TEXTBOOKS:
1. Vogel’s Textbook of Quantitative Chemical Analysis (8th Edition, 2014).
2. Suchi Tiwari, Engineering Chemistry Lab Manual, Scitech Publications (India) Pvt. Ltd. (2nd
Edition, 2013).
3. Pushpendra Kumar, Laboratory Manual for Engineering Chemistry, Reyansh Authortopic Pvt. Ltd.,
(1st Edition, 2022).
CO-PO and PSO MAPPING:
Programme Outcomes (PO) PSO
Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 2 3 1 1 - 1 - - - - - - - - -
CO 2 3 3 2 1 1 - - - - - - - - - - -
CO 3 3 2 3 1 1 - - - - - - - - - - -
CO 4 3 3 2 1 2 - - - - - - 1 - 2 - -
CO 5 3 2 3 1 1 - - - - - - - - - - -
AVG 3 2.4 2.6 1 1.2 - 0.2 - - - - 0.2 - 0.4 - -

SRMVEC R2023
38
`

GE3232 PROBLEM SOLVING AND PYTHON PROGRAMMING LABORATORY L T P C


0 0 4 2
COURSE OBJECTIVES:

• To write, test, and debug simple Python programs.


• To implement Python programs with conditionals and loops.
• Use functions for structuring Python programs.
• Represent compound data using Python lists, tuples, and dictionaries.
• Read and write data from/to files in Python.
• Knowing about Object Oriented Concepts.

LIST OF EXPERIMENTS:
1. Compute the GCD of two numbers.
2. Find the square root of a number. (Newton’s method)
3. Find exponentiation of a number. (power of a number)
4. Find the maximum of a list of numbers.
5. Program for basic calculator operations using functions.
6. Generate Fibonacci series using function.
7. Program for Armstrong number.
8. Program for check the number is Palindrome or Not.
9. Program for sum of array of numbers.
10. How to create, slice, change, add, delete and index elements using list.
11. Linear search and Binary search.
12. Find First n prime numbers.
13. Program to remove duplicate elements from a list.
14. Program for addition and transpose of a matrix.
15. How to create, slice, change, delete and index elements using Tuple.
16. Write a program to reverse the string.
17. How to change, delete, add and remove elements in Dictionary.
18. Create a dictionary of radius of circle and its circumference.
19. Program for count the number of words in a file.
20. Find the most frequent words in a text read from a file.
21. Program for student information system using class and objects.
22. Program for Employee Payroll Processing using class and objects.

TOTAL : 60 PERIODS

PLATFORM NEEDED:
Python 3 interpreter for Windows/Linux

COURSE OUTCOMES:
At the end of the course, the students should be able
• Develop simple computational problems using control flow statements.
• Decompose a Python program into functions, Modules and Packages.
• Represent compound data using Python lists, tuples, Strings, Set and dictionaries.
• Read and write data from/to files and Exception handling in Python Programs.
• Understand the concepts of Object Oriented Programming and to develop real time
applications.

SRMVEC R2023
39
`

TEXT BOOKS:
1.Reema Thareja, “Python Programming using Problem solving Approach”, Oxford Higher
Education,2018.
2.Allen B. Downey, “Think Python: How to Think Like a Computer Scientist”, 2nd edition, Updated
for Python 3, Shroff/O’Reilly Publishers, 2016 (http://greenteapress.com/wp/think- python/)
3.Guido van Rossum and Fred L. Drake Jr, “An Introduction to Python” – Revised and updated for
Python 3.2, Network Theory Ltd., 2011.

REFERENCE:
1.Charles Dierbach, “Introduction to Computer Science using Python: A Computational Problem-
Solving Focus”, Wiley India Edition, 2013.
2.John V Guttag, “Introduction to Computation and Programming Using Python’’, Revised and
expanded Edition, MIT Press , 2013
3.Kenneth A. Lambert, “Fundamentals of Python: First Programs”, CENGAGE Learning, 2012.
4.Paul Gries, Jennifer Campbell and Jason Montojo, “Practical Programming: An Introduction to
Computer Science using Python 3”, Second edition, Pragmatic Programmers,LLC,2013.
5.Robert Sedgewick, Kevin Wayne, Robert Dondero, “Introduction to Programming in Python: An
Inter-disciplinary Approach”, Pearson India Education Services Pvt. Ltd., 2016.

WEB REFERENCES:
1. http://greenteapress.com/wp/think-python/
2. www.docs.python.org
3. https://nptel.ac.in/courses/106/106/106106182/

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 2 1 1 1 1 - 1 - - - - - - - - -
CO 2 2 2 1 1 1 - - - - - - - - - - -
CO 3 2 1 1 1 2 - - - - - - - - - - -
CO 4 2 2 1 1 1 2 2 2 - - - - - - - -
CO 5 2 1 1 1 1 - - - - - - - - - - -
AVG 2 1.4 1 1 1.2 2 1.5 2 - - - - - - - -

SRMVEC R2023
40
`

GE3251 NSS/NCC/NSO/YRC/CLUB ACTIVITIES L T P C


Eclectic Lingua – Skill based activities 0 0 0 1
COURSE OBJECTIVES:

• To enhance the communicative competence of the first-year engineering students by means of


creating opportunity for impromptu/ /spontaneous speeches.
• To upgrade the English language skills of students by introducing appropriate vocabulary in different
situations.

ACTIVITIES:

1. Extempore - Giving expression to thoughts (2)

2. Building Vocabulary - Using relevant set of words for different contexts (2)

3. Pronunciation - Speaking accurately and fluently (1)

COURSE OUTCOMES:
At the end of the course, the students should be able
• To enable students to express themselves easily and coherently.
• To help students to speak the language using the right words and pronouncing them
correctly.

REFERENCE:
1.https://www.cambridgeenglish.org/learning-english/activities-for- learners/?skill=pronunciation
2.https://www.quillsandquotes.ca/post/12-fun-games-to-get-students-public-speaking

SRMVEC R2023
41
`

GE3251 NSS/NCC/NSO/YRC/CLUB ACTIVITIES L T P C


Fine Arts Club VECTORIANS – Skill based activities 0 0 0 1
COURSE OBJECTIVES:

• To enhance the inbuilt talents in arts and crafts and fine arts activities.
• To explore and exhibit theirs qualities in cultural activities as well as in the leadership.

ACTIVITIES:

1. ARTS & CRAFTS - The students will be given with innovative Theme, (1)
they have to Show their talents in one hour time with basic facilities
provided.

2. SINGING & DANCING - The students are expected to present their (2)
talents on spot or With given Theme, either solo or group performance.

3. MIME & DRAMA - Students will be given 5 - 7 minutes of time to present (2)
their variety Entertainments in way of Mono acting or Drama .

COURSE OUTCOMES:
At the end of the course, the students should be able
• To enable students to explore their inbuilt talents in fine arts activities.
• To motivate the students to show case their cultural and leadership qualities.

REFERENCE:
1.https://www.youtube.com/watch?v=1mkESRWiSKc – Teach your own crafts.
2.https://www.youtube.com/watch?v=YHqwrDGywH4 – How to teach Arts & Crafts

SRMVEC R2023
42
`

GE3251 NSS/NCC/NSO/YRC/CLUB ACTIVITIES L T P C


EULER.COM – Skill based activities 0 0 0 1
COURSE OBJECTIVES:

• To enhance the Logical reasoning of the first-year engineering students by means of creating
opportunity to improve the aptitude skill.
• To explore the applications of Mathematics in the field of Engineering, Science and Technology and
to utilize this skill for their academic activities.

ACTIVITIES:

1. OLYMPIAD - The students will be provided with 25 questions in (1)


Engineering Mathematics. This should be completed in one hour.

2. MATHEMATICAL MODELLING - The students are expected to present (2)


physical models (Working as well as static models) based on the
application of Engineering Mathematics.

3. PAPER PRESENTATION - Students will be provided 5-7 minutes of time (2)


to present their findings in application of Mathematics.

COURSE OUTCOMES:
At the end of the course, the students should be able
• To enable students to explore their mathematical reasoning skills.
• To motivate the students to apply Mathematics in Engineering and Technology and demonstrate
their work by means of Physical model and present their research article.

REFERENCE:
1.Advanced Engineering Mathematics , Erwin Kreyszig, 10th Edition, Wiely India Pvt Ltd.
2.https://www.stewartcalculus.com/

SRMVEC R2023
43
`

GE3251 NSS/NCC/NSO/YRC/CLUB ACTIVITIES L T P C


RESONANCE – SKILL BASED ACTIVITIES 0 0 0 1
COURSE OBJECTIVES:

• To know the basics and general principles of Physics.


• To provide knowledge of the current trends in Physics.
• To develop a solid scientific and technical competence for investigating and applying the
relationships of Physics phenomena in various fields of Physics.

ACTIVITIES:

1. QUIZ - Basics and general principle (1)

2. PAPER PRESENTATION - Current trends (2)

3. PROJECTS - Fun with Physics (2)

COURSE OUTCOMES:
At the end of the course, the students should be able
• Recollect the general principles of Physics.
• To explore the topics in the current trends in Physics.
• Develop practical expertise in various areas of Physics.

REFERENCE:
1.Principles of Physics, 10Ed, Isv by Robert Resnick Jearl Walker, David Halliday (2015)
2.‘The Feynman Lectures on Physics’ (Volume I, II and III) , Matthew Sands, Richard Feynman, and
Robert B. Leighton.
3.https://www.science-sparks.com/top-5-physics-experiments-you-can-try-at-home
4.https://www.electronicsforu.com/category/electronics-projects/hardware-diy.

SRMVEC R2023
44
`

GE3251 NSS/NCC/NSO/YRC/CLUB ACTIVITIES L T P C


Catalysis – Skill-based activities 0 0 0 1
COURSE OBJECTIVES:

• To inculcate a scientific attitude and temper.


• To provide an opportunity to develop constructive, explorative & inventive ideas among the students.
• To develop training in the scientific method of problem-solving for engineering

ACTIVITIES:

1. Quiz/debate- the latest advancement in Chemistry towards engineering (2)

2. Essay competition/Chart preparation - Environmental sustainability (2)

3. Nature Study - Field visit to eco-parks etc. (1)

COURSE OUTCOMES:
At the end of the course, the students should be able
• To promote inquisitiveness among the students and inculcate Scientific mind mapping.
• To develop students, interest and participation in the practical applications of the knowledge
related to environmental sciences.
• Take part in practical, hands-on science activities close to nature.

REFERENCE:
1.M. Senapati, Advanced Engineering Chemistry, Infinity science press, New Delhi, 2007.
2.https://www.sciencedirect.com/topics/agricultural-and-biological- sciences/environmental-
sustainability
3.https://www.indiabix.com/general-knowledge/chemistry/

SRMVEC R2023
45
`

GE3251 NSS/NCC/NSO/YRC/CLUB ACTIVITIES L T P C


National Sports Organization (NSO) 0 0 0 1
COURSE OBJECTIVES:

• To create awareness about basic fitness and mental strength


• To promote the development of physical fitness
• To develop the sporting activities of the youth
• To create the social responsibilities and social interaction through participation

ACTIVITIES:

1. INTRODUCTION - Introduction of NSO & Physical Fitness and games Skills (1)
Test

2. PHYSICAL FITNESS ACTIVITIES - Importance of Basic Physical (2)


Fitness - BMI Calculation

3. SPORTS PRACTICE - Games and fitness activities Physical Fitness (2)


Activities

COURSE OUTCOMES:
At the end of the course, the students should be able
• Get basic knowledge about physical and mental fitness
• NSO create self-esteem and self confidence
• NSO provide opportunity get social interaction
• Development of character and personality through participation

REFERENCE:
1.www.google.com
2.https://scholar.google.com/
3.https://www.medindia.net/patients/lifestyleandwellness/five-essential-components-of- physical-
fitness-references.htm
4.https://pubmed.ncbi.nlm.nih.gov/

SRMVEC R2023
46
`

GE3251 NSS/NCC/NSO/YRC/CLUB ACTIVITIES L T P C

தமிழ் மன்ைம் 0 0 0 1

பொடத்திட்டத்தின் கநொக்கங்கள்:

• ொணவர்கமள ெிறந்த ம மட மபச்ெொளர்களொக உருவொக்குவது


• தொய்ம ொழியின் ம ன்ம மய பொதுகொப்பது

பயிற்சி திட்டம்:
1.மபச்சுகமல பயிற்ெி
2.கவிமத ற்றும் கட்டுமரகள் எழுதும் பயிற்ெி
3.அறிவியல் மபொறியியல் மதொழில்நுட்பங்கமள த ிழில் எழுதுதல்
4.பட்டி ன்ற ம மடகளில் மபசும் பயிற்ெி
5.நொட்டுப்புற பொடல்கள் பொடுதல் ற்றும் கமதகள் எழுதும் பயிற்ெி

கற்ைல் முடிவு:
• மபச்சுகமலத் மதர்ச்ெி
• நொட்டுப்புற பொடல்கள் பற்றிய புரிதல்

கமற்ககொள்கள்:
1.https://eegarai.darkbb.com/t63483-topic
2.https://poriyari.in/

SRMVEC R2023
47
`

GE3251 NSS/NCC/NSO/YRC/CLUB ACTIVITIES L T P C


YOUTH RED CROSS – Social Service based activities 0 0 0 1
COURSE OBJECTIVES:

• To enhance the societal awareness


• To upgrade the Personality

ACTIVITIES:

1. HEALTH PROMOTION- Activities that promotes health (2)

2. SOCIETAL SERVICE-Social Service activities (2)

3. FRIENDSHIP BUILDING - Friendship building activities between (1)


communities

COURSE OUTCOMES:
At the end of the course, the students should be able
• Enhanced Social Awareness
• Personality development of the individual

REFERENCE:
1.IRCS/YRC Handbook
2.https://www.indianredcross.org/youth/Guidelines-for-JYRC-LR.pdf

SRMVEC R2023
48
`

GE3251 NSS/NCC/NSO/YRC/CLUB ACTIVITIES L T P C


NATIONAL SERVICE SCHEME (NSS) 0 0 0 1
COURSE OBJECTIVES:

• To help learners know about NSS in the context of youth, community and voluntary service.
• To teach the importance of health, hygiene and sanitation for a healthy Nation.
• To understand the community in which they work.
• To identify the problems of the community and involve them in problem-solving.
• To develop the capacity to meet emergencies and natural disasters.
• To practice the National integration and social harmony.
• To utilize their knowledge in finding practical solutions to individual and community

CREDIT:

Total Lecture Total Tutorial Total Practical


Credit
Hours / Semester Hours / Semester Hours / Semester

6 0 18 1*

COURSE OUTCOMES:
Learners will have the knowledge about NSS and its role in the fields of health, hygiene, emergencies
& natural disasters and involve them in problem-solving of the nearest community so as to build a
strong country.
SYLLABUS:
Topic - I : Introduction and Basic Concepts of NSS [8]
a) History – Aim – Objectives of NSS
b) Emblem – Motto – Badge - Song
c) Organizational structure - Roles and Responsibilities of NSS
d) Regular activities
e) Any approved indoor / outdoor programs by the Principal

Topic - II : Youth Leadership, Social Harmony and National Integration [8]


a) Meaning and types of Leadership
b) Qualities of good leaders and leadership
c) Importance and role of youth leadership
d) Role of youth in peace and Nation building
e) Any approved indoor / outdoor programs by the Principal

Topic - III : Health, Hygiene and Sanitation and Youth Health [8]
a) Definition, Needs and Scope of Health Education
b) Swachh Bharat Abhiyan
c) Healthy Lifestyles
d) HIV, AIDS, Drugs abuse
e) Any approved indoor / outdoor programs by the Principal

Topic - IV : Environment Issues, Emergencies and Disaster Management [8]


a) Environment conservation, enrichment and sustainability
b) Waste management
c) Natural resource management [Rain water harvesting and Energy
conservation]
d) Introduction to Disaster Management, Classification of Disasters
e) Any approved indoor / outdoor programs by the Principal

SRMVEC R2023
49
`

REFERENCE:
1.National Service Scheme Manual (Revised) 2006, Government of India, Ministry ofYouth Affairs
and Sports, New Delhi.
2.National Youth Policy, Government of India, Ministry of Youth Affairs and Sports, New Delhi.
3.https://nss.gov.in/

SRMVEC R2023
50
`

SEMESTER III
MA3322 DISCRETE MATHEMATICS L T P C
3 0 0 3
COURSE OBJECTIVES:

• To extend student‘s logical and mathematical maturity and ability to deal with abstraction.
• To introduce most of the basic terminologies used in computer science courses and application of
ideas to solve practical problems.
• To understand the basic concepts of Combinatorics and graph theory.
• To familiarize the applications of algebraic structures.
• To understand the concepts and significance of lattices and Boolean algebra which are widely
used in computer science and engineering.

UNIT – I: LOGICS 9L
Propositional logic – Propositional equivalences – Normal Forms – Rules of inference.
UNIT – II: ADVANCED COUNTING PRINCIPLE 9L
Mathematical induction – Strong induction and well ordering – The basics of counting – The pigeonhole principle –
Permutations and combinations - Inclusion and exclusion principle and its applications.
UNIT – III: GRAPH THEORY 9L
Graphs and graph models – Graph terminology and special types of graphs – Matrix representation of graphs and
graph isomorphism – Connectivity –Euler and Hamilton Graphs Definition.
UNIT – IV: GROUP THEORY 9L
Algebraic systems - Groups – Subgroups – Homomorphism‘s – Cosets – Lagrange‘s theorem.
UNIT – V: LATTICES AND BOOLEAN ALGEBRA 9L
Partial ordering – Posets – Lattices as Posets – Properties of lattices – Some special lattices – Boolean algebra
definition.
TOTAL: 45L PERIODS

COURSE OUTCOMES:
At the end of the course, the student should be able to:
• Have knowledge of the concepts needed to test the logic of a program.
• Have an understanding in counting principle on many levels.
• To understand the concepts of graphs and its applications in computer science.
• Be exposed to concepts and properties of algebraic structures like groups, subgroups and cosets.
• To understand the concepts of Lattices and Boolean algebra.

TEXT BOOKS:
1.Kenneth H. Rosen . Dr. Kamala Krithivasan, "Discrete Mathematics and Its Applications (SIE) | 8th
Edition, McGraw Hill, Special Indian Edition, 2021.
2.Tremblay, J.P. and Manohar.R, “Discrete Mathematical Structures with Applications to Computer
Science”, McGraw Hill Pub. .Co. Ltd, New Delhi 2017.

SRMVEC R2023
51
`

REFERENCE BOOKS:
1. Grimaldi, R.P. "Discrete and Combinatorial Mathematics: An Applied Introduction", 4thEdition,
Pearson Education Asia, Delhi, 2007.
2. Veerarajan. T, “Discrete Mathematics with graph theory and Combinatorics”, McGraw Hill Publication
Pvt Ltd. 2018.
3. Sivarama Krishna Dass.P & Vijayakumari. C “Discrete Mathematics” Person Education, 2020.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 3 2 - - - - - - - - 1 - - 1 -
CO 2 3 3 3 - - - - - 1 - - 1 - - 1 -
CO 3 3 3 2 - - - - - 1 - - 1 - - 1 -
CO 4 3 3 2 - - - - - - - - 1 - - 1 -
CO 5 3 3 3 - - - - - 1 - - 1 - - 1 -
AVG 3 3 2.4 - - - - - 1 - - 1 - - 1 -

SRMVEC R2023
52
`

AD3363 DIGITAL PRINCIPLES AND COMPUTER ORGANIZATION L T P C


3 0 0 3
COURSE OBJECTIVES:

• To analyze and design combinational circuits.


• To analyze and design sequential circuits.
• To understand the basic structure and operation of a digital computer.
• To study the design of data path unit, control unit for processor and to familiarize with the hazards.
• To understand the concept of various memories and I/O interfacing.

UNIT – I: COMBINATIONAL LOGIC 9


Combinational Circuits – Karnaugh Map - Analysis and Design Procedures – Binary Adder – Subtractor – Decimal
Adder - Magnitude Comparator – Decoder – Encoder – Multiplexers - Demultiplexers.
UNIT – II: SYNCHRONOUS SEQUENTIAL LOGIC 9
Introduction to Sequential Circuits – Flip-Flops – operation and excitation tables, Triggering of FF, Analysis and design
of clocked sequential circuits – Design – Moore/Mealy models, state minimization, state assignment, circuit
implementation - Registers – Counters.
UNIT – III: COMPUTER FUNDAMENTALS 9
Functional Units of a Digital Computer: Von Neumann Architecture – Operation and Operands of Computer
Hardware Instruction – Instruction Set Architecture (ISA): Memory Location, Address and Operation – Instruction
and Instruction Sequencing – Addressing Modes, Encoding of Machine Instruction – Interaction between Assembly
and High Level Language.
UNIT – IV: PROCESSOR 9
Instruction Execution – Building a Data Path – Designing a Control Unit – Hardwired Control, Microprogrammed
Control – Pipelining – Data Hazard – Control Hazards.
UNIT – V: MEMORY AND I/O 9
Memory Concepts and Hierarchy – Memory Management – Cache Memories: Mapping and Replacement Techniques
– Virtual Memory – DMA – I/O – Accessing I/O: Parallel and Serial Interface – Interrupt I/O – Interconnection
Standards: USB, SATA.
TOTAL: 45 PERIODS

COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Design various combinational digital circuits using logic gates
• Design sequential circuits and analyze the design procedures
• State the fundamentals of computer systems and analyze the execution of an instruction
• Analyze different types of control design and identify hazards
• Identify the characteristics of various memory systems and I/O communication.

TEXT BOOKS:
1. M. Morris Mano, Michael D. Ciletti, “Digital Design: With an Introduction to the Verilog HDL, VHDL,
and System Verilog”, Sixth Edition, Pearson Education, 2018.
2. David A. Patterson, John L. Hennessy, “Computer Organization and Design, The Hardware/Software
Interface”, Sixth Edition, Morgan Kaufmann/Elsevier, 2020.

SRMVEC R2023
53
`

REFERENCE BOOKS:
1.Carl Hamacher, Zvonko Vranesic, Safwat Zaky, Naraig Manjikian, “Computer Organization and
Embedded Systems”, Sixth Edition, Tata McGraw-Hill, 2012.
2.William Stallings, “Computer Organization and Architecture – Designing for
Performance”, Tenth Edition, Pearson Education, 2016.
3.M. Morris Mano, “Digital Logic and Computer Design”, Pearson Education, 2016.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 - - 3 2 2 1 1 - - - - 1 - 2 -
CO 2 3 - 3 - - - - - 1 1 - - 2 - - -
CO 3 - 3 - - - 2 - - - 1 - 3 1 - 2 -
CO 4 - 2 - 2 - - - - - - - - 2 - - -
CO 5 2 - 2 - - 2 1 - 1 - - 2 1 - 2 -
AVG 2.7 2.5 2.5 2.5 2.0 2.0 1.0 1.0 1.0 1.0 - 2.5 1.5 - 2.0 -

SRMVEC R2023
54
`

IT3361 PROGRAMMING AND DATA STRUCTURES L T P C


3 0 0 3
COURSE OBJECTIVES:

• To introduce the fundamentals of C programming language


• To learn the concepts of Arrays and Pointers in C
• To learn about the basics of data structure
• To know the concepts of linear data structures
• To get familiarize the concepts of non-linear data structures

UNIT – I: INTRODUCTION TO C PROGRAMMING 9


Data Types – Variables – Operations – Expressions and Statements – Conditional Statements – Arrays – Single
and Multi-Dimensional Arrays.
UNIT – II: ADVANCED CONCEPTS IN C 9
Functions – Recursive Functions, Parameter Passing Techniques, Pointer - Pointer to Structure, Structures
UNIT – III: DATA STRUCTURES & LINEAR DATA STRUCTURES 9
Introduction to Data Structures- Abstract Data Types (ADTs) – List ADT – Array-Based Implementation – Linked
List – Doubly- Linked Lists – Circular Linked List – Stack ADT – Implementation of Stack – Applications – Queue
ADT – Priority Queues – Queue Implementation – Applications.
UNIT – IV: NON LINEAR DATA STRUCTURES – TREES 9
Tree ADT – tree traversals - Binary Tree ADT – expression trees – binary search tree ADT – applications of trees.
Implementation of Binary search tree and its operations, tree traversal methods, finding height of the tree using C,
AVL Trees.
UNIT – V: NON LINEAR DATA STRUCTURES –GRAPHS 9
Definition – Representation of Graph – Breadth-first traversal - Depth-first traversal – Topologial Sort – Dynamic
programming Technique – Warshall’s and Floyd’s algorithm – Greedy method – Dijkstra’s algorithm – applications of
graphs. Implementation of graph, graph traversal methods, finding shortest path using Dijkstra’s algorithm in C.
TOTAL: 45 PERIODS

COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Develop C programs for any real world or technical problem.
• Apply the advanced features of C in problem solving.
• Apply the different linear data structures to problem solutions.
• Apply the different non-linear data structures to problem solutions.
• Suggest and use appropriate linear/non–linear data structure operations for solving a given problem.

TEXT BOOKS:
1. E. Balaguruswamy, “Programming in ANSI C”, 8th Edition, 2019, McGraw Hill Education, ISBN: 978-
93-5316-513-0. (Unit-I and Unit-II)
2. Reema Thareja, ―Data Structures Using C, Second Edition , Oxford University Press, 2011 (Unit-
III, IV and V)

SRMVEC R2023
55
`

REFERENCE BOOKS:
1.Pradip Dey, Manas Ghosh, “Programming in C”, 2nd Edition, 2018, Oxford University Press, ISBN:
978-01-9949-147-6. (Unit-I and Unit-II)
2.Aho, Hopcroft and Ullman, ―Data Structures and Algorithms, Pearson Education, 1983. (Unit- III,
IV and V)
3.Byron Gottfried, Jitender Chhabra, “Programming with C” (Schaum’s Outlines Series), Mcgraw Hill
Higher Ed., III Edition, 2010. (Unit-I and Unit-II)
4.Ellis Horowitz, Sartaj Sahni, Susan Anderson-Freed, ―Fundamentals of Data Structures in C,
Second Edition, University Press, 2008. (Unit-III, IV and V)
5.Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein, “Introduction to
Algorithms”, Second Edition, McGraw Hill, 2002 (Unit-III)

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 2 2 - - - - - - - - - 3 2 - -
CO 2 3 3 2 - - - - - - - - - 3 2 - -
CO 3 3 3 3 - - - - - - - - - 3 2 - -
CO 4 3 3 3 - - - - - - - - - 3 2 - -
CO 5 3 3 3 - - - - - - - - - 3 2 - -
AVG 3 2.8 2.6 - - - - - - - - - 3 2 - -

SRMVEC R2023
56
`

CS3361 OBJECT ORIENTED PROGRAMMING L T P C


3 0 0 3
COURSE OBJECTIVES:

• To understand Object Oriented Programming concepts and basics of Java programming language
• To know the principles of packages, inheritance and interfaces
• To develop a java application with threads and generics classes
• To define exceptions and use I/O streams
• To design and build Graphical User Interface Application using JAVAFX

UNIT – I: INTRODUCTION TO OOP AND JAVA 9


Overview of OOP – Object oriented programming paradigms – Features of Object Oriented Programming – Java
Buzzwords – Overview of Java – Data Types, Variables and Arrays – Operators – Control Statements –
Programming Structures in Java – Defining classes in Java – Constructors - Methods -Access specifiers - Static
members- Java Doc comments.
UNIT – II: INHERITANCE, PACKAGES AND INTERFACES 9
Overloading Methods – Objects as Parameters – Returning Objects –Static, Nested and Inner Classes. Inheritance:
Basics– Types of Inheritance -Super keyword -Method Overriding –Abstract Classes – final with Inheritance.
Packages and Interfaces: Packages – Packages and Member Access –Importing Packages – Interfaces.
UNIT – III: EXCEPTION HANDLING AND MULTITHREADING 9
Exception Handling basics – Multiple catch Clauses – Nested try Statements – Java’s Built-in Exceptions – User
defined Exception. Multithreaded Programming: Java Thread Model–Creating a Thread and Multiple Threads –
Priorities – Synchronization – Inter Thread Communication- Suspending –Resuming, and Stopping Threads –
Multithreading.
UNIT – IV: GENERICS, STRING HANDLING 9
I/O Basics – Reading and Writing Console I/O – Reading and Writing Files. Generics: Generic Programming – Generic
classes – Generic Methods – Bounded Types – Restrictions and Limitations. Strings: Basic String class, methods and
String Buffer Class.
UNIT – V: JAVAFX EVENT HANDLING, CONTROLS AND COMPONENTS 9
AWS vs Swing Components - JAVAFX Events and Controls: Event Basics – Handling Key and Mouse Events.
Controls: Checkbox, ToggleButton – RadioButtons – ListView – ComboBox – ChoiceBox – Text Controls –
ScrollPane. Layouts – FlowPane – HBox and VBox – BorderPane – StackPane – GridPane. Menus – Basics – Menu
– Menu bars – MenuItem
TOTAL: 45 PERIODS

COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Apply the concepts of classes and objects to solve simple problems
• Develop programs using inheritance, packages and interfaces
• Make use of exception handling mechanisms and multithreaded model to solve real world problems
• Build Java applications with I/O packages, string classes, Collections and generics concepts
• Integrate the concepts of event handling and JavaFX components and controls for developing GUI
based applications.

SRMVEC R2023
57
`

TEXT BOOKS:
1. Herbert Schildt, “Java: The Complete Reference”, 11 th Edition, McGraw Hill Education, New Delhi,
2019
2. Herbert Schildt, “Introducing JavaFX 8 Programming”, 1 st Edition, McGraw Hill Education, New
Delhi, 2015

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 1 1 3 1 3 - - - 3 2 2 2 3 1 2 -
CO 2 2 1 3 2 1 - - - 2 1 1 3 3 3 2 -
CO 3 3 3 1 2 2 - - - 3 2 1 2 3 1 3 -
CO 4 3 1 2 2 2 - - - 1 2 1 3 3 1 1 -
CO 5 1 1 2 3 2 - - - 3 2 1 2 3 3 3 -
AVG 2 1 2 2 2 - - - 2 2 1 2 3 2 2 -

SRMVEC R2023
58
`

CY3361 FUNDAMENTALS OF COMPUTER NETWORKS AND COMMUNICATION L T P C


3 0 0 3
COURSE OBJECTIVES:

• To understand the data communication models, protocol layering and physical level communication.
• To understand the various components required to build different networks.
• To understand the basic concepts of networking devices.
• To understand the concept of IP security.
• To understand the various methods and protocols to maintain E–mail security.
• To understand the various methods and protocols to maintain web security.
• To understand security measures for wireless and cell phone communications.

UNIT – I: DATA COMMUNICATIONS 9


Networks – Components and Categories – types of Connections – Topologies – Protocols and Standards – ISO /
OSI model – Transmission Media – Coaxial Cable – Fiber Optics
UNIT – II: DATA–LINK LAYER & MEDIA ACCESS 9
Introduction – Link–Layer Addressing – DLC Services – Data–Link Layer Protocols –HDLC – PPP – Media Access
Control – Wired LANs: Ethernet – Wireless LANs – Introduction – IEEE 802.11, Bluetooth – Connecting Devices.
UNIT – III: NETWORK LAYER 9
Network Layer Services – Packet switching – Performance – IPV4 Addresses – Forwarding of IP Packets – Network
Layer Protocols: IP, ICMP v4 – RoutingAlgorithms: Distance vector routing- Link State routing - Unicast routing
algorithm: OSPF– Multicasting Basics – IPV6 Addressing – IPV6 Protocol.
UNIT – IV: TRANSPORT LAYER 9
Introduction – Transport Layer Protocols – Services – Port Numbers – User Datagram Protocol (UDP)Transmission
Control Protocol (TCP) – SCTP.
UNIT – V: APPLICATION LAYER 9
WWW and HTTP – FTP – Email –Telnet –SSH – DNS – SNMP.
TOTAL: 45 PERIODS

COURSE OUTCOMES:
At the end of the course, learners will be able to:
• The Protocol layering and physical leel communication
• The various components required to build different networks.
• Basic concepts of networking devices
• Concept of IP security
• The various methods and protocols

TEXT BOOKS:
1. Behrouz A. Forouzan Data Communications and Networking, Fifth Edition TMH, 2013.(Units: 1-5)

REFERENCE BOOKS:
1.Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security, Prentice Hall of India,2002.
2.Bernard Menezes–Network security and Cryptography–Cengage Learning 2010.

SRMVEC R2023
59
`

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 2 1 - - - - - - - - - 1 - - -
CO 2 3 3 2 1 - - - - - - - - 2 1 - -
CO 3 3 3 2 - - - - - - - - - 2 1 - -
CO 4 3 3 1 - - - - - - - - - 2 1 - -
CO 5 3 1 2 - - - - - - - - - 1 - - -
AVG 3 2.4 1.6 1 - - - - - - - - 1.6 1 - -

SRMVEC R2023
60
`

CY3362 INTRODUCTION TO CYBER SECURITY L T P C


3 0 0 3
COURSE OBJECTIVES:

• To learn cybercrime and cyber law.


• To understand the cyber-attacks and tools for mitigating them.
• To understand information gathering.
• To learn how to detect a cyber-attack.
• To learn how to prevent a cyber-attack.

UNIT – I: INTRODUCTION 9
Cyber Security – History of Internet – Impact of Internet – CIA Triad; Reason for CyberCrime – Need for Cyber
Security – History of Cyber Crime; Cybercriminals – Classification of Cybercrimes – A Global Perspective on Cyber
Crimes; Cyber Laws – The Indian IT Act – Cybercrime and Punishment.
UNIT – II: ATTACKS AND COUNTERMEASURES 9
OSWAP; Malicious Attack Threats and Vulnerabilities: Scope of Cyber-Attacks – Security Breach – Types of Malicious
Attacks – Malicious Software – Common Attack Vectors – Social engineering Attack – Wireless Network Attack – Web
Application Attack – Attack Tools – Countermeasures.
UNIT – III: RECONNAISSANCE 9
Harvester – Whois – Netcraft – Host – Extracting Information from DNS – Extracting Information from E-mail Servers
– Social Engineering Reconnaissance; Scanning – PortScanning – Network Scanning and Vulnerability Scanning
– Scanning Methodology – Ping Sweer Techniques – Nmap Command Switches.
UNIT – IV: INTRUSION DETECTION 9
Host -Based Intrusion Detection – Network -Based Intrusion Detection – Distributed orHybrid Intrusion Detection –
Intrusion Detection Exchange Format – Honeypots – Example System Snort.
UNIT – V: INTRUSION PREVENTION 9
Firewalls and Intrusion Prevention Systems: Need for Firewalls – Firewall Characteristics and Access Policy – Types
of Firewalls – Firewall Basing – Firewall Location and Configurations –Intrusion Prevention Systems – Example Unified
Threat Management Products.
TOTAL: 45 PERIODS

COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Explain the basics of cyber security, cybercrime and cyber law
• Classify various types of attacks and learn the tools to launch the attacks
• Apply various tools to perform information gathering
• Apply intrusion techniques to detect intrusion
• Apply intrusion prevention techniques to prevent intrusion

TEXT BOOKS:
1. Anand Shinde, “Introduction to Cyber Security Guide to the World of CyberSecurity”, Notion
Press, 2021. (Unit-1 &2)
2. William Stallings, Lawrie Brown, “Computer Security Principles and Practice”,Third Edition,
Pearson Education, 2015. (Unit-4 & 5)

SRMVEC R2023
61
`

REFERENCE BOOKS:
1.Patrick Engebretson, “The Basics of Hacking and Penetration Testing: EthicalHacking and
Penetration Testing Made easy”, Elsevier, 2011. (Unit-3)
2.David Kim, Michael G. Solomon, “Fundamentals of Information SystemsSecurity”, Jones & Bartlett
Learning Publishers, 2013.
3.Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes,Computer Forensics
and Legal Perspectives”, Wiley Publishers, 2011.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 2 2 2 - - - - - - - - 2 - - -
CO 2 3 2 1 1 1 - - - - - - - 1 1 - -
CO 3 3 3 2 1 2 - - - - - - - 1 1 - -
CO 4 3 2 1 2 - - - - - - - - 2 2 2 -
CO 5 3 1 1 2 - - - - - - - - 1 - - -
AVG 3 2 1.4 1.6 1.5 - - - - - - - 1.4 1.3 2 -

SRMVEC R2023
62
`

IT3363 PROGRAMMING AND DATA STRUCTURES LABORATORY L T P C


0 0 3 1.5
COURSE OBJECTIVES:

• To develop C programs using basic constructs.


• To implement Linear Data Structures.
• To implement Non-Linear Data Structures.
• To implement Tree Traversal Algorithms.
• To implement Graph Traversal Algorithms.

LIST OF EXPERIMENTS:
1. Implement C program using I/O Statements, Operators and Expressions
2. a) Decision-making constructs: if-else, goto, switch-case, break-continue
b) Loops: for, while, do-while
3. Arrays: 1D and 2D, Multi-dimensional arrays, traversal
4. Array implementation of Stack, Queue and Circular Queue ADTs
5. Implementation of Singly Linked List
6. Linked list implementation of Stack and Linear Queue ADTs
7. Implementation of Polynomial Manipulation using Linked list
8. Implementation of Evaluating Postfix Expressions, Infix to Postfix conversion
9. Implementation of Binary Search Trees
10. Implementation of Tree Traversal Algorithms
11. Implementation Graph Traversal Algorithms
12. Implementation of Dijkstra’s Algorithm
TOTAL : 45 PERIODS

COURSE OUTCOMES:
• Develop C programs for real world problems
• Implement Linear Data Structures and its applications.
• Implement Non-Linear Data Structures and its applications.
• Implement Binary Search tree operations.
• Implement graph algorithms.

LIST OF EQUIPMENTS FOR A BATCH OF 30 STUDENTS:


SOFTWARE: Turbo C++ Programming
HARDWARE: High-Resolution Cameras, Workstations with GPU, Standalone desktops - 30 Nos. (or) Server
supporting 30 terminals or more.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 - - - 2 - - - - - - - 3 2 - -
CO 2 2 2 - - - - - - - - - - 3 2 - -
CO 3 2 2 - - - - - - - - - - 3 - - -
CO 4 3 - - - - - - - - - - - 3 2 - -
CO 5 3 3 3 - 2 - - - - - - - 3 2 - -
AVG 2.6 2.3 3 - 2 - - - - - - - 3 2 - -

SRMVEC R2023
63
`

CS3364 OBJECT ORIENTED PROGRAMMING LABORATORY L T P C


0 0 3 1.5
COURSE OBJECTIVES:

• To build software development skills using java programming for real-world applications.
• To understand and apply the concepts of classes, packages, interfaces, inheritance, exception
handling and file processing.
• To develop applications using generic programming and event handling

LIST OF EXPERIMENTS:
1. Solve problems by using sequential search, binary search, and quadratic sorting algorithms
(selection, insertion)
2. Develop stack and queue data structures using classes and objects.
3. Develop a java application with an Employee class with Emp_name, Emp_id, Address, Mail_id,
Mobile_no as members. Inherit the classes, Programmer, Assistant Professor, Associate
Professor and Professor from employee class. Add Basic Pay (BP) as the member of all the
inherited classes with 97% of BP as DA, 10 % of BP as HRA, 12% of BP as PF, 0.1% of BP for
staff club funds. Generate pay slips for the employees with their gross and net salary.
4. Write a Java Program to create an abstract class named Shape that contains two integers and an
empty method named printArea(). Provide three classes named Rectangle, Triangle and Circle
such that each one of the classes extends the class Shape. Each one of the classes contains only
the method printArea( ) that prints the area of the given shape.
5. Solve the above problem using an interface.
6. Implement exception handling and creation of user defined exceptions.
7. Write a java program that implements a multi-threaded application that has three threads. First
thread generates a random integer every 1 second and if the value is even, the second thread
computes the square of the number and prints. If the value is odd, the third thread will print the
value of the cube of the number.
8. Write a program to perform file operations.
9. Develop applications to demonstrate the features of generics classes.
10. Develop applications using Swing and JavaFX controls, layouts and menus.
11. Develop a mini project for any application using Java concepts.
TOTAL : 45 PERIODS

COURSE OUTCOMES:
• Design and develop java programs using object oriented programming concepts
• Develop simple applications using object oriented concepts such as package, exceptions
• Implement multithreading, and generics concepts
• Create GUIs and event driven programming applications for real world problems
• Implement and deploy web applications using Java

LIST OF EQUIPMENTS FOR A BATCH OF 30 STUDENTS:


Operating Systems: Linux / Windows
Front End Tools: Eclipse IDE / Netbeans IDE

SRMVEC R2023
64
`

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 2 1 2 1 - - - - 1 2 2 2 1 2 3 -
CO 2 2 1 3 1 - - - - 2 3 3 2 1 3 1 -
CO 3 2 2 1 2 1 - - - 1 2 1 3 2 3 2 -
CO 4 2 2 1 3 - - - - 3 1 1 1 2 1 2 -
CO 5 1 3 3 1 3 - - - 1 1 1 1 2 1 2 -
AVG 1.8 1.8 2 1.6 2 - - - 1.6 1.8 1.6 1.8 1.6 2 2 -

SRMVEC R2023
65
`

CY3363 COMPUTER NETWORKS AND COMMUNICATION LABORATORY L T P C


0 0 3 1.5
COURSE OBJECTIVES:

• To learn and use network commands.


• To learn socket programming.
• To implement and analyze various network protocols.
• To learn and use simulation tools.
• To use simulation tools to analyze the performance of various network protocols.

LIST OF EXPERIMENTS:
1. Learn to use commands like tcpdump, netstat, ifconfig, nslookup,ping andtraceroute.
2. Write a code simulating Socket Programming and Client – Server model
3. Write a code simulating Stop and Wait protocol.
4. Write a code simulating ARP /RARP protocols.
5. Develop a TCP daytime server and client.
6. Applications using TCP sockets like:
• Echo client and echo server
• Chat
• File Transfer
7. Write a HTTP web client program to download a web page using TCP sockets.
8. Simulation of DNS using UDP sockets.
9. Simulation of Distance Vector/ Link State Routing algorithm.
10. Study of TCP/UDP performance using Simulation tool.
TOTAL : 45 PERIODS

COURSE OUTCOMES:
• Implement various network commands.
• Develop applications using socket programming.
• Implement applications using TCP and UDP protocols.
• Use simulation tools to analyze the performance of various network protocols.
• Analyze various routing algorithms.

LIST OF EQUIPMENTS FOR A BATCH OF 30 STUDENTS:


SOFTWARE: C /C++ / Java / Equivalent Compiler, Network simulator likeNS2 / Equivalent
HARDWARE: Standalone desktops - 30 Nos. (or) Server supporting 30 terminals or more.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 - - - 2 2 1 - - - - - 2 2 - -
CO 2 3 - - - - - - - - - - - 2 2 - -
CO 3 3 - - - - - - - - - - - 3 - - -
CO 4 3 - - - - - - - - - - - 3 - - -
CO 5 3 3 3 - 3 2 - - - - - - 3 2 - -
AVG 3 3 3 - 1.5 2 1 - - - - - 2.6 2 - -

SRMVEC R2023
66
`

SEMESTER IV
MA3422 APPLIED MATHEMATICS FOR INFORMATION SCIENCE L T P C
2 0 0 2
COURSE OBJECTIVES:

• To introduce the basic notions of groups, rings, fields which will then be used to solve related
problems.
• To introduce and apply the concepts of rings, finite fields and polynomials.
• To understand the basic concepts in number theory
• To examine the key questions in the Theory of Numbers.
• To give an integrated approach to number theory and abstract algebra, and provide a firm basis
for further reading and study in the subject.

UNIT – I: GROUPS AND RINGS 6L


Algebra: groups, rings, fields, finite fields – definitions-examples - properties
UNIT – II: FINITE FIELDS AND POLYNOMIALS 6L
Rings - Polynomial rings - Irreducible polynomials over finite fields - Factorization of polynomials over finite fields.
UNIT – III: ANALYTIC NUMBER THEORY 6L
Division algorithm – Prime and composite numbers – GCD – Euclidean algorithm – LCM.
UNIT – IV: DIOPHANTINE EQUATIONS AND CONGRUENCES 6L
Linear Diophantine equations – Congruence‘s – Linear Congruence‘s - Modular exponentiation- Chinese remainder
theorem
UNIT – V: CLASSICAL THEOREMS AND MULTIPLICATIVE FUNCTIONS 6L
Wilson‘s theorem – Fermat‘s little theorem – Euler‘s theorem – statements- examples-Euler‘s Phi functions – Tau and
Sigma functions. (Statement only)
TOTAL: 30L PERIODS

COURSE OUTCOMES:
At the end of the course, the student should be able to:
• Apply the basic notions of groups, rings, fields which will then be used to solve related problems.
• Explain the fundamental concepts of advanced algebra and their role in modern mathematics and
applied contexts.
• Demonstrate accurate and efficient use of advanced algebraic techniques.
• Demonstrate their mastery by solving non - trivial problems related to the concepts, and by proving
simple theorems about the, statements proven by the text.
• Apply integrated approach to number theory and abstract algebra, and provide a firm basis for further
reading and study in the subject.

TEXT BOOKS:
1.Grimaldi, R.P and Ramana, B.V., "Discrete and Combinatorial Mathematics", Pearson Education,
5th Edition, New Delhi, 2007.
2.Koshy, T., ―Elementary Number Theory with Applications‖, Elsevier Publications, New Delhi, 2002.

SRMVEC R2023
67
`

REFERENCE BOOKS:
1. Lidl, R. and Pitz, G, "Applied Abstract Algebra", Springer Verlag, New Delhi, 2nd Edition, 2006.
2. Niven, I., Zuckerman.H.S., and Montgomery, H.L., ―An Introduction to Theory of Numbers‖, John
Wiley and Sons , Singapore, 2004.
3. San Ling and Chaoping Xing, ―Coding Theory – A first Course‖, Cambridge Publications,
Cambridge, 2004.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 3 3 - - - - - 1 1 - 1 - - 1 -
CO 2 3 3 3 - - - - - 1 1 - 1 - - 1 -
CO 3 3 3 3 - - - - - 1 1 - 1 - - 1 -
CO 4 3 3 3 - - - - - 1 1 - 1 - - 1 -
CO 5 3 3 3 - - - - - 1 1 - 1 - - 1 -
AVG 3 3 3 - - - - - 1 1 - 1 - - 1 -

SRMVEC R2023
68
`

CS3463 DATABASE MANAGEMENT SYSTEMS L T P C


3 0 0 3
COURSE OBJECTIVES:

• To learn the fundamentals of data models, relational algebra and SQL


• To represent a database system using ER diagrams and to learn normalization techniques
• To understand the fundamental concepts of transaction, concurrency and recovery processing
• To understand the internal storage structures using different file and indexing techniques which will
help in physical DB design
• To have an introductory knowledge about the Distributed databases, NOSQL and database security.

UNIT – I: INTRODUCTION TO DATABASES AND SQL 9


Purpose of Database System – View of data –Database and Application Architecture– Database Administrator–
Introduction to Relational model – Structure of Relational Database– Database Schema– Keys – Schema diagram
–Introduction to SQL– SQL Data Definition –basic Structure of SQL Queries– Additional Basic operation– Set
operation–Null Values– Aggregate Function– Modification of the Database– Intermediate SQL –Join operation–
Transactions–Integrity constraints– Trigger.
UNIT – II: DATABASE DESIGN 9
Entity–Relationship model — E–R Diagrams — Enhanced–ER Model — ER–to– Relational Mapping — Functional
Dependencies — Non–loss Decomposition — First, Second, Third Normal Forms, Dependency Preservation —
Boyce/Codd Normal Form — Multi–valued Dependencies and Fourth Normal Form — Join Dependencies and Fifth
Normal Form.
UNIT – III: TRANSACTION AND CONCURRENCY CONTROL 9
Transaction Concepts – ACID Properties – simple transaction model– Transaction Atomicity and Durability –
Transaction Isolation –Serializability – Transaction Isolation and Atomicity –Concurrency Control – Lock based
protocols – Locking Protocols – Two Phase Locking – Deadlock –prevention– Deadlock Detection and Recovery –
Multiple Granularity – Timestamp–Based Protocols.
UNIT – IV: IMPLEMENTATION TECHNIQUES 9
RAID – File Organization – Organization of Records in Files – Indexing and Hashing – Ordered Indices – B+ tree
Index Files – Static Hashing – Dynamic Hashing – Query Processing Overview .– Algorithms for SELECT and JOIN
operations
UNIT – V: ADVANCED TOPICS 9
Distributed Databases: Architecture, Data Storage— Object–based Databases: Object Database Concepts, Object–
Relational features, ODMG Object Model, ODL, OQL — XML Databases: XML Hierarchical Model, DTD, XML
Schema, XQuery — Information Retrieval: IR Concepts, Retrieval Models, Queries in IR systems.
TOTAL: 45 PERIODS

COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Classify the modern and futuristic database applications based on size and complexity
• Map ER model to Relational model to perform database design effectively
• Compare and contrast various indexing strategies in different database systems
• Appraise how advanced databases differ from traditional databases.

SRMVEC R2023
69
`

TEXT BOOKS:
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, Database System Concepts, Sixth Edition,
Tata McGraw Hill, 2016
2. Ramez Elmasri, Shamkant B. Navathe,– Fundamentals of Database Systems, Sixth Edition,
Pearson, 2016.

REFERENCE BOOKS:
1.C. J. Date, A.Kannan, S. Swamynathan, – An Introduction to Database Systems, Eighth Edition,
Pearson Education, 2006.
2.Raghu Ramakrishnan, ―Database Management Systems, Fourth Edition,
McGraw– Hill College Publications, 2015.
3.G.K.Gupta, "Database Management Systems, Tata McGraw Hill, 2011.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 2 2 3 2 1 – – – 2 1 1 1 2 1 3 -
CO 2 3 1 1 1 1 – – – 2 3 3 3 3 1 2 -
CO 3 3 2 3 2 1 – – – 2 1 1 2 2 3 3 -
CO 4 1 2 3 2 – – – – 3 2 3 3 1 2 3 -
CO 5 1 1 3 3 2 – – – 1 3 3 1 2 2 2 -
AVG 2 2 3 2 1 – – – 2 2 2 2 2 2 3 -

SRMVEC R2023
70
`

IT3461 OPERATING SYSTEMS L T P C


3 0 0 3
COURSE OBJECTIVES:

• To learn the basic concepts and functions of operating systems.


• To analyze scheduling algorithms and Deadlock.
• To analyze various memory management schemes.
• To be familiar with I/O management and file systems.
• To be familiar with Mobile OS and Linux OS.

UNIT – I: INTRODUCTION 9
Introduction to Operating System: Operating System Operations- Operating System Structures : Operating System-
Services - User Operating System Interface - System Calls – System programs – Operating System Structure
(monolithic, layered, modular, micro- kernel models).
UNIT – II: PROCESS MANAGEMENT 9
Processes - Process Concept - Process Scheduling - Operations on Processes - Inter- process Communication; CPU
Scheduling - Scheduling criteria - Scheduling algorithms: Process Synchronization - The Critical-Section problem –
Semaphores, Deadlock - Methods for handling deadlocks, Deadlock prevention, Deadlock avoidance, Deadlock
detection, Recovery from deadlock.
UNIT – III: MEMORY MANAGEMENT 9
Main Memory: Swapping- Contiguous Memory Allocation – Paging - Structure of the Page Table - Segmentation,
Virtual Memory - Demand Paging – Copy on Write – Page Replacement - Allocation of Frames –Thrashing.
UNIT – IV: STORAGE MANAGEMENT 9
File-System Interface -File concept - Access methods - Directory Structure – Protection. - File System Implementation
- File System Structure – File System Operations - Directory implementation - Allocation Methods - Free Space
Management; Mass Storage system – Disk Structure - Disk Scheduling –Disk Management- Swap-Space
Management.
UNIT – V: MOBILE OS AND CASE STUDIES 9
Mobile OS - iOS and Android. The Linux System: Design Principles-Kernel Modules- Process Management-
Scheduling-Memory Management-File Systems - Input and Output- Inter process communication.
TOTAL: 45 PERIODS

COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Analyze various main concepts, key ideas, strengths and limitations of operating systems.
• Design various scheduling algorithms.
• Design and implement memory management schemes
• Understand various file management systems
• Understand the Mobile OS and Linux.

TEXT BOOKS:
1. Silberschatz Abraham, Greg Gagne, Peter B. Galvin. “Operating System Concepts”, Ninth Edition,
Wiley, 2014.(Unit-I-V)
2. Andrew S Tanenbaum, "Modern Operating Systems", Pearson, 5th Edition,2022 New Delhi.(Unit-
II,III,IV).

SRMVEC R2023
71
`

REFERENCE BOOKS:
1.Ramaz Elmasri, A. Gil Carrick, David Levine, “ Operating Systems – A Spiral Approach”, Tata
McGraw Hill Edition, 2010.
2.William Stallings, "Operating Systems: Internals and Design Principles", 7th Edition, Prentice Hall,
2018
3.Achyut S.Godbole, Atul Kahate, “Operating Systems”, McGraw Hill Education, 2016.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 1 2 2 - - - - - - - - - 2 - -
CO 2 2 2 3 1 - - - - - - - - - 2 - -
CO 3 1 3 2 2 1 - - - - - - - - 2 - -
CO 4 1 3 3 3 - - - - - - - - - 2 - -
CO 5 3 1 2 1 1 - - - - - - - - 2 - -
AVG 2 2 2 2 1 - - - - - - - - 2 - -

SRMVEC R2023
72
`

CY3461 BASICS OF CYBER FORENSICS L T P C


3 0 0 3
COURSE OBJECTIVES:

• To learn computer forensics


• To become familiar with forensics tools
• To analyze and validate forensics data

UNIT – I: INTRODUCTION TO DIGITAL FORENSICS 9


Introduction Digital Forensics - Preparing for Digital Investigations - Maintaining Professional Conduct - Preparing
a Digital Forensics Investigation - Understanding Data Recovery Workstations and Software - Conducting an
Investigation.
UNIT – II: PROCESSING CRIME AND INCIDENT SCENES 9
Identifying Digital Evidence – Collecting Evidence in Private-Sector Incident Scenes- Preparingfor a Search- Securing
a Digital Incident or Crime Scene- Seizing Digital Evidence at the Scene - Storing Digital Evidence- Reviewing a Case.
UNIT – III: ANALYSIS AND VALIDATION 9
Validating Forensics Data – Data Hiding Techniques – Performing Remote Acquisition –Network Forensics – Email
Investigations – Cell Phone and Mobile Devices Forensics
UNIT – IV: E-MAIL AND SOCIAL MEDIA INVESTIGATIONS 9
Role of E-mail in Investigations – Roles of the Client and Server in E-mail – Investigating E- mail Crimes and Violations-
Understanding E-mail Server- E-mail Forensics Tools - Social Media Forensics on Mobile Devices Performing
UNIT – V: CLOUD FORENSICS 9
Overview of Cloud Computing - Legal Challenges in Cloud Forensics - Technical Challenges inCloud Forensics -
Standards and Training - Acquisitions in the Cloud – Cloud Investigation
TOTAL: 45 PERIODS

COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Understand the basics of computer forensics
• Apply a number of different computer forensic tools to a given scenario
• Analyse and validate forensics data
• Understand the basics of Email and Social Media Investigations

TEXT BOOKS:
1. Bill Nelson, Amelia Phillips, Frank Enfinger, Christopher Steuart, ―Computer Forensics and
Investigations‖, Cengage Learning, Sixth Edition, 2019. (Units 1-5)

REFERENCE BOOKS:
1.John R.Vacca, ―Computer Forensics‖, Cengage Learning, 2005
2.MarjieT.Britz, ―Computer Forensics and Cyber Crime‖: An Introduction‖, 3rd Edition,Prentice Hall,
2013.
3.AnkitFadia ― Ethical Hacking‖ Second Edition, Macmillan India Ltd, 2006
4.Kenneth C.Brancik ―Insider Computer Fraud‖ Auerbach Publications Taylor & FrancisGroup–2008.

SRMVEC R2023
73
`

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 1 1 - - - - - - - - - 2 - - -
CO 2 3 1 - - - - - - - - - - 1 1 - -
CO 3 3 3 - - - - - - - - - - 3 2 - -
CO 4 3 3 1 2 - - - - - - - - 3 3 1 -
CO 5 3 1 2 2 - - - - - - - - 3 - - -
AVG 3 1.8 1.3 2 - - - - - - - - 2.4 2 1 -

SRMVEC R2023
74
`

CY3462 SECURE SOFTWARE ENGINEERING L T P C


3 0 0 3
COURSE OBJECTIVES:

• To understand the knowledge of the software security.


• To understand and demonstrate project including planning, scheduling and risk
assessment/management.
• To identify specific components of a software design that can be targeted for reuse.
• To learn various testing and maintenance measures.
• To Understand Project Management principles while developing software.

UNIT – I: SECURITY A SOFTWARE ISSUE AND WHAT MAKES 9


SOFTWARE SECURE
Introduction, the problem, Software Assurance and Software Security, Threats to software security, Sources of
software insecurity, Benefits of Detecting Software Security, Properties of Secure Software, Influencing the security
properties of software, Asserting and specifying the desired security properties.
UNIT – II: REQUIREMENTS ENGINEERING FOR SECURE SOFTWARE 9
Introduction, the SQUARE process Model, Requirements elicitation and prioritization.
UNIT – III: SECURE SOFTWARE ARCHITECTURE AND DESIGN 9
Introduction, software security practices for architecture and design: architectural risk analysis, software security
knowledge for architecture and design: security principles, security guidelines and attack patterns Secure coding
and Testing: Code analysis, Software Security testing, Security testing considerations throughput the SDLC.
UNIT – IV: SECURITY AND COMPLEXITY 9
System Assembly Challenges: introduction, security failures, functional and attacker perspectives for security analysis,
system complexity drivers and security.
UNIT – V: GOVERNANCE AND MANAGING MORE SECURE SOFTWARE 9
Governance and security, Adopting an enterprise software security framework, How much security is enough?,
Security and project management, Maturity of Practice.
TOTAL: 45 PERIODS

COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Identify the key activities in managing a software project.
• Concepts of requirements engineering and Analysis Modeling.
• Apply systematic procedure for software design and deployment.
• Compare and contrast the various testing and maintenance.
• Manage project schedule, estimate project cost and effort required.

TEXT BOOKS:
1. Ian Sommerville - “Software engineering”, Seventh Edition, Pearson Education Asia, 2007.

REFERENCE BOOKS:
1.Developing Secure Software: Jason Grembi, Cengage Learning
2.Software Security : Richard Sinn, Cengage Learning

SRMVEC R2023
75
`

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 1 1 - - - - - - - - - 3 - - -
CO 2 2 1 1 - - - - - - - - - 3 2 - -
CO 3 3 3 3 - - - - - - - - - 3 1 - -
CO 4 3 3 1 2 - - - - - - - - 2 3 2 -
CO 5 3 1 2 2 - - - - - - - - 1 - - -
AVG 2.8 1.8 1.6 2 - - - - - - - - 2.4 2 2 -

SRMVEC R2023
76
`

CY3463 CYBER LAWS AND ETHICS L T P C


3 0 0 3
COURSE OBJECTIVES:

• To understand the basics of cyber law,


• To understand the problems and issues associated with it,
• To understand the various act or regulations,
• To understand the various approaches for incident analysis and response.
• To understand the ethical laws of computer for different countries.

UNIT – I: INTRODUCTION TO CYBER LAW 9


Emergence of Cyber space. Cyber Jurisprudence, Jurisprudence and law, Doctrinal approach, Consensual
approach, Real Approach, Cyber Ethics, Cyber Jurisdiction, Hierarchy of courts, Civil and criminal jurisdictions,
Cyberspace-Web space, Web hosting and web Development agreement.
UNIT – II: INFORMATION TECHNOLOGY ACT 9
Overview of IT Act, 2000, Amendments and Limitations of IT Act, Digital Signatures, Cryptographic Algorithm, Public
Cryptography, Private Cryptography, Electronic Governance, Legal Recognition of Electronic Records, Legal
Recognition of Digital Signature Certifying Authorities, Cyber Crime and Offences.
UNIT – III: CYBER LAW AND RELATED LEGISLATION 9
Patent Law, Trademark Law, Copyright, Software – Copyright or Patented, Domain Names and Copyright disputes,
Electronic Data Base and its Protection, IT Act and Civil Procedure Code, IT Act and Criminal Procedural Code,
Relevant Sections of Indian Evidence Act, Relevant Sections of BankersBook Evidence Act, Relevant Sections of
Indian Penal Code.
UNIT – IV: ELECTRONIC BUSINESS AND LEGAL ISSUES 9
Evolution and development in Ecommerce, paper vs paper less contracts E-Commerce models- B2B, B2C,E security.
Application area: Business, taxation, electronic payments, supply chain, EDI, E- markets, Emerging Trends
UNIT – V: CASE STUDY ON CYBER CRIMES 9
Harassment Via E-Mails, Email Spoofing (Online A Method Of Sending E-Mail Using A False Name Or E-Mail Address
To Make It Appear That The E-Mail Comes From Somebody Other Than The TrueSender, Cyber Pornography
(Exm.MMS), Cyber-Stalking.
TOTAL: 45 PERIODS

COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Make learner conversant with the social and intellectual property issues emerging from cyber space.
• Explore the legal and policy developments in various countries to regulate cyberspace;
• Develop the understanding of relationship between commerce and cyberspace;
• Give learners in depth knowledge of information technology act and legal frame work of right to
privacy, data security and data protection.
• Make Study On Various Case Studies On Real Time Crimes.

SRMVEC R2023
77
`

TEXT BOOKS:
1. K.Kumar,” Cyber Laws: Intellectual property & E Commerce, Security”,1st Edition,
DominantPublisher,2011. (Units 1-2)
2. 2. Rodney D. Ryder, “ Guide To Cyber Laws”, Second Edition, Wadhwa And Company, NewDelhi,
2007. 3. Information Security policy &implementation Issues, NIIT, PHI. (Units 3-5)

REFERENCE BOOKS:
1.Vakul Sharma, "Handbook Of Cyber Laws" Macmillan India Ltd, 2 nd Edition,PHI,2003.
2.Justice Yatindra Singh, " Cyber Laws", Universal Law Publishing, 1 st Edition,New Delhi,2003.
3.Sharma, S.R., “Dimensions Of Cyber Crime”, Annual Publications Pvt. Ltd., 1st Edition,2004.
4.Augastine, Paul T.,” Cyber Crimes And Legal Issues”, Crecent Publishing Corporation, 2007.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 2 2 - - - - - - - - - 2 - - -
CO 2 3 2 2 2 1 - - - - - - - 1 1 - -
CO 3 3 3 3 3 2 - - - - - - - 2 2 - -
CO 4 3 3 1 2 - - - - - - - - 1 1 1 -
CO 5 3 1 1 1 - - - - - - - - 1 - - -
AVG 3 2.2 1.8 1.8 1.5 - - - - - - - 1.4 1.3 1 -

SRMVEC R2023
78
`

GE3451 NCC Credit Course Level – I L T P C


(Common to Army, Navy & Air) 3 0 0 3
COURSE OBJECTIVES:

• To know the basic structure of NCC and Role of NCC


• To improve the cadet’s personality skill and leadership quality
• To make the interest of cadets to involve in social activities
• Preventing the potential damage and suffering
• To destruction of the enemy's ability to fight and will to fight

UNIT – I: INTRODUCTION TO NCC 9


Aims, Objectives & Organization of NCC, Incentives, Duties of NCC Cadet, NCC Camps and Types National
Integration: Importance & Necessity, Factors Affecting National Integration, Unity in Diversity & Role of NCC in
Nation Building, Threats to National Security.
UNIT – II: PERSONALITY DEVELOPMENT 9
Personal Transformation, Personal Productivity Skills - time management, organizational and planning skills, problem
solving and decision-making abilities, basics of psychology, Leadership, Meditation
UNIT – III: SOCIAL SERVICE AND COMMUNITY DEVELOPMENT 9
Basics, Rural Development Programmes, NGOs, Contribution of Youth, Protection of Children and Women Safety,
Road / Rail Travel Safety, New Initiatives, Cyber and Mobile Security Awareness
UNIT – IV: DISASTER MANAGEMENTS AND ITS AWARENESS 9
Importance of Hazards and Disaster, Types of disasters, Earthquakes and its types, flood types and its management,
landside and its managements case studies of disasters in Sikkim, Training and drills for disaster preparedness,
Awareness generation program, Usages of GIS and Remote sensing techniques in disaster management
UNIT – V: WAR AND PEACE IN CONTEMPORARY WORLD 9
Conceptual framework of War and Peace, Concepts of theories and approaches, Modern /warfare: Conventional,
nuclear, Guerilla and Irregular Warfare, Limited and Specialized Warfare with reference to mountain, desert and jungle
warfare, terrorism as a new mode of conflict, War as an Economic Problem, Defence and Development, Defence and
Development, Defence and Development
TOTAL: 45 PERIODS
Note: NCC Credit Course Level – I is offered for NCC students only. The grades earned by the students will be
recorded in the mark sheet, however the same shall not be considered for the computation of CGPA

COURSE OUTCOMES:
At the end of the course, learners will be able to:
• Understand their roles and responsibilities
• Demonstrate the knowledge of human values and morals
• Actively participate in social service and development activities
• Understand the importance of disaster management
• Analyse the issues related to war and its effects.

TEXT BOOKS:
1. R. Gupta’s NCC Handbook of NCC Cadets ‘A’, ‘B’ and ‘C’ certificate Examinations

SRMVEC R2023
79
`

REFERENCE BOOKS:
1.V. B. RAO, Personality Development and Soft Skills, BS Publications
2.Harish K. Gupta, Disaster Management, Universities press

SRMVEC R2023
80
`

CS3466 DATABASE MANAGEMENT SYSTEMS LABORATORY L T P C


0 0 3 1.5
COURSE OBJECTIVES:

• To learn and implement important commands in SQL.


• To learn the usage of nested and joint queries.
• To understand functions, procedures and procedural extensions of databases.
• To understand design and implementation of typical database applications.
• To be familiar with the use of a front end tool for GUI based application development.

LIST OF EXPERIMENTS:
1. Create a database table, add constraints (primary key, unique, check, Not null), insert rows,
update and delete rows using SQL DDL and DML commands.
2. Create a set of tables, add foreign key constraints and incorporate referential integrity.
3. Query the database tables using different ‘where’ clause conditions and also implement aggregate
functions.
4. Query the database tables and explore sub queries and simple join operations.
5. Query the database tables and explore natural, equi and outer joins.
6. Write user defined functions and stored procedures in SQL.
7. Execute complex transactions and realize DCL and TCL commands.
8. Write SQL Triggers for insert, delete, and update operations in a database table.
9. Create View and index for database tables with a large number of records.
10. Case Study using any of the real life database applications from the following list
a) Inventory Management for a EMart Grocery Shop
b) Society Financial Management
c) Cop Friendly App – Eseva
d) Property Management – eMall
e) Star Small and Medium Banking and Finance
• Build Entity Model diagram. The diagram should align with the business and functional goals stated
in the application.
• Apply Normalization rules in designing the tables in scope.
• Prepared applicable views, triggers (for auditing purposes), and functions for enabling enterprise
grade features.
TOTAL : 45 PERIODS

COURSE OUTCOMES:
• Create databases with different types of key constraints.
• Construct simple and complex SQL queries using DML and DCL commands.
• Use advanced features such as stored procedures
• Create a trigger for the database.
• Create and manipulate database application.

LIST OF EQUIPMENTS FOR A BATCH OF 30 STUDENTS:


SOFTWARE: MySQL / SQL : 30 Users

SRMVEC R2023
81
`

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 3 3 3 - - - - 3 1 3 2 2 3 2 -
CO 2 2 2 3 2 2 - - - 1 2 3 3 2 1 2 -
CO 3 3 3 2 1 1 - - - 1 1 1 3 2 3 3 -
CO 4 1 3 3 3 1 - - - 1 1 3 2 3 1 3 -
CO 5 3 2 1 1 1 - - - 2 2 3 1 3 1 2 -
AVG 2 3 2 2 1 - - - 2 1 3 2 2 2 2 -

SRMVEC R2023
82
`

IT3464 OPERATING SYSTEMS LABORATORY L T P C


0 0 3 1.5
COURSE OBJECTIVES:

• To understand the basics of Unix command and shell programming.


• To implement various CPU scheduling algorithms.
• To implement Deadlock Avoidance and Deadlock Detection Algorithms
• To implement Page Replacement Algorithms
• To implement various memory allocation methods.
• To be familiar with File Organization and File Allocation Strategies.

LIST OF EXPERIMENTS:
1. UNIX commands and Basic Shell Programming
2. Process Management using System Calls : Fork, Exit, Getpid, Wait, Close
3. Write C programs to implement the various CPU Scheduling Algorithms
4. Implement mutual exclusion by Semaphore
5. Write C programs to avoid Deadlock using Banker's Algorithm
6. Write a C program to Implement Deadlock Detection Algorithm
7. Write C program to implement Threading
8. Write C program to Implement the paging Technique.
9. Write C programs to implement the following Memory Allocation Methods
a) First Fit
b) Worst Fit
c) Best Fit
10. Write C programs to implement the various Page Replacement Algorithms
11. Write C programs to Implement the various File Organization Techniques
12. Implement the following File Allocation Strategies using C programs
a) Sequential
b) Indexed
c) Linked
13. Write C programs for the implementation of various disk scheduling algorithms
TOTAL : 45 PERIODS

COURSE OUTCOMES:
• Define and implement UNIX Commands.
• Compare the performance of various CPU Scheduling Algorithms.
• Compare and contrast various Memory Allocation Methods.
• Define File Organization and File Allocation Strategies.
• Implement various Disk Scheduling Algorithms

LIST OF EQUIPMENTS FOR A BATCH OF 30 STUDENTS:


SOFTWARE: C/C++ Programming
HARDWARE: High-Resolution Cameras, Workstations with GPU, Standalone desktops - 30 Nos. (or) Server
supporting 30 terminals or more.

SRMVEC R2023
83
`

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 1 3 1 1 - - - - - - - - 2 - -
CO 2 3 1 1 2 2 - - - - - - - - 2 - -
CO 3 3 3 2 1 2 - - - - - - - - 2 - -
CO 4 1 2 2 3 2 - - - - - - - - 2 - -
CO 5 2 2 1 1 3 - - - - - - - - 2 - -
AVG 2 2 2 2 2 - - - - - - - - 2 - -

SRMVEC R2023
84
`

CY3464 OPEN SOURCE SOFTWARE LABORATORY L T P C


0 0 3 1.5
COURSE OBJECTIVES:

• Learn the basics of OO analysis and design skills.


• Be exposed to the UML design diagrams.
• Learn to map design to code.
• Be familiar with the various testing techniques

LIST OF EXPERIMENTS:

To develop a mini-project by following the 9 exercises listed below.


1. To develop a problem statement.
2. Identify Use Cases and develop the Use Case model.
3. Identify the conceptual classes and develop a domain model with UML Class diagram.
4. Using the identified scenarios, find the interaction between objects and represent them using UML
Sequence diagrams.
5. Draw relevant state charts and activity diagrams.
6. Identify the User Interface, Domain objects, and Technical services. Draw the partial layered,
logical architecture diagram with UML package diagram notation.
7. Develop and test the Technical services layer.
8. Develop and test the Domain objects layer.
9. Develop and test the User interface layer.
TOTAL : 45 PERIODS

SUGGESTED DOMAINS FOR MINI-PROJECT


1. Passport automation system.
2. Book bank
3. Exam Registration
4. Stock maintenance system.
5. Online course reservation system
6. E-ticketing
7. Software personnel management system
8. Credit card processing
9. e-book management system
10. Recruitment system
11. Foreign trading system
12. Conference Management System
13. BPO Management System
14. Library Management System
15. Student Information System

COURSE OUTCOMES:
• Design and implement projects using OO concepts.
• Use the UML analysis and design diagrams.
• Apply appropriate design patterns.
• Create code from design.
• Compare and contrast various testing techniques

SRMVEC R2023
85
`

LIST OF EQUIPMENTS FOR A BATCH OF 30 STUDENTS:


SOFTWARE: Rational Suite (or) Argo UML (or) equivalent, Eclipse IDE and Junit
HARDWARE: High-Resolution Cameras, Workstations with GPU, Standalone desktops - 30 Nos. (or) Server
supporting 30 terminals or more.

CO-PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 3 2 2 - 1 - - - - - - - 3 3 2 -
CO 2 2 2 - - - - - - - - - - 3 2 2 -
CO 3 2 1 - - - - - - - - - - 3 2 - -
CO 4 3 1 - - - - - - - - - - 3 2 - -
CO 5 3 2 3 - 2 - - - - - - - 3 2 - -
AVG 2.6 1.6 2.5 - 1.5 - - - - - - - 3 2.2 2 -

SRMVEC R2023
86
`

SEMESTER V

CY3561 BIOMETRIC SECURITY LT PC


3 00 3
COURSE OBJECTIVES:

 Introduce Bio–metric and traditional authentication methods.


 Describe the background theory of image processing required in biometric
Security
 Classify algorithms related to various biometrics
 Evaluate the performance of various biometric systems
 Study the challenges and limitations associated with bio–metrics security

UNIT – I: INTRODUCTION 9
Introduction and Definitions of bio–metrics, Traditional authenticated methods and
technologies. Introduction to Image Processing, Image Enhancement Techniques: Spatial
Domain Methods: Smoothing, sharpening filters, Laplacian filters, Frequency domain filters,
Smoothing and sharpening filters.

UNIT – II: IMAGE ANALYSIS 9


Image Restoration & Reconstruction: Model of Image Degradation/restoration process, Noise
models, spatial filtering, inverse filtering, Minimum mean square Error filtering.

UNIT – III: IMAGE EXTRACTION 9


Introduction to image segmentation: Image edge detection: Introduction to edge detection,
typesof edge detectors. Introduction to image feature extraction.

UNIT – IV: TECHNOLOGIES IN BIO–METRIC 9


Bio–metric technologies: Fingerprint, Face, Iris, Hand Geometry, Gait recognition, Ear, Voice,
Palm print, On–Line Signature Verification, 3D Face Recognition, Dental Identification and
DNA.

UNIT – V: BIO–METRIC SYSTEMS 9


Multi bio–metrics Introduction –Sources of Multiple Evidence, Acquisition and Processing
Architecture– Fusion levels–sensor–level, feature–level, score–level, rank–level, decision–
level fusion; Security of biometric systems– introduction, Adversary attacks, attacks at the
user interface, attacks on biometric processing, attacks on the template Database– Case
study of 3D face recognition and DNA matching.

TOTAL: 45 PERIODS

10
`

COURSE OUTCOMES:
At the end of the course, the student should be able to:
 A good understanding of the various modules constituting a bio–metric system.
 Familiarity with different bio–metric traits and to appreciate their relative significance.
 A good knowledge of the feature sets used to represent some of the popular bio– metric traits.
 Evaluate and design security systems incorporating bio–metrics.
 Understand the Law and the use of multi bio–metrics systems.

TEXT BOOKS:
1. Gonzalez, R.C. and Woods, R.E., Digital Image Processing. 2nd ed. India: Person
Education, 2017.
2. Anil Jain, Arun A. Ross, Karthik Nandakumar, Introduction to biometric, Springer, 2011.

REFERENCE BOOKS:
1. Kennesaw State University, Big Data Security and Privacy Group (2018). Privacy and
Security in
Big Data, 1st Edition, Springer
2. J. Wayman, A.K. Jain, D. Maltoni, and D. Maio (Eds.), Biometric Systems: Technology,
Design and Performance Evaluation, Springer, 2013.
3. A. K. Jain, R. Bolle, S. Pankanti (Eds.), BIOMETRICS: Personal Identification in
Networked Society, Kluwer Academic Publishers, 2013.
4. Paul Reid, Biometrics for network security, Hand book of Pearson, 2004.

PO and PSO MAPPING:

Course Programme Outcomes (PO) PSO


Outcom
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
es
CO 1 2 2 - 3 - - 2 - - 1 - - 2 - 2 -

CO 2 - 2 2 - 2 - 1 - - - 3 - - 2 - -

CO 3 2 - - 2 - 1 - - 2 - - - 2 - 2

CO 4 - 2 2 - 1 - - - - 2 - - 1 - 1 -

CO 5 2 - 1 2 - - - - - - - - - 2 1 -

AVG 2 2 1.6 2.3 1.5 1 1.5 - 2 1.5 3 - 1.6 2 1.3 2

11
`

CY3562 ETHICAL HACKING PRACTICES LT PC


3003
OBJECTIVES:

 Introduces the concepts of Ethical Hacking.


 Gives the students the opportunity to learn about different tools and techniques
In Ethical hacking and security.
 Practically apply Ethical hacking tools to perform various activities.
 Understand the core concepts related to vulnerabilities and their causes
 Study the challenges and limitations associated with hacking.

UNIT – I : INTRODUCTION 9
Ethical hacking process-Hackers behavior & mindset-Vulnerability versus
Penetration test- Penetration Test. Categories of Penetration test–Black box–
White box–Grey box– Types of Penetration Test.

UNIT – II : INFORMATION GATHERING TECHNIQUES 9


Active Information Gathering–Passive Information Gathering–Sources of Information
Gathering–Neo Trace– Traceroute–ICMP Traceroute–TCP Traceroute–UDP Traceroute
– Intercepting a Response–What Web – Net craft–Interacting with DNS Servers

UNIT – III : SNOOPING ATTACKS &PORT SCANNING TECHNIQUES 9


Enumerating SNMP–Problem with SNMP–Sniffing SNMP Passwords–SNMP Brute
Force Tool– SMTP Enumeration–Types of Port Scanning–Understanding the TCP
Three–Way Handshake– Anonymous Scan Types–OS Fingerprinting–Advanced
Firewall/IDS Evading Techniques

UNIT – IV : VULNERABILITY ASSESSMENT & NETWORK SNIFFING 9


Vulnerability Scanners–Vulnerability Assessment with Nmap–Nessus Vulnerability
Scanner– Types of Sniffing–MITM Attacks–ARP Attacks–Using ARP Spoof to Perform
MITM Attacks– Hijacking Session with MITM Attack–Sniffing Session Cookies with
Wireshark–DNS Spoofing– DHCP Spoofing

UNIT – V : EXPLOITATION 9
Remote Exploitation–Attacking Network Remote Services–Overview of Brute Force
Attacks– Common Target Protocols–Client Side Exploitation–Methods–
Postexploitation–Escalating Privileges–Installing a Backdoor–MSFVenom– Cracking
the Hashes–Rainbow Crack– Identifying and Exploiting Further Targets

TOTAL: 45 PERIODS

12
`

COURSE OUTCOMES:
On Completion of the course, the students should be able to have:
 Apply the theory of data, information and knowledge as they pertain to
Ethical Hacking.
 Understand ethics behind hacking and vulnerability disclosure.
 Appreciate the impact of hacking.
 Exploit the vulnerabilities related to computer system and
networks using state of the art tools and technologies.
 Exploit the challenges and limitations associated with hacking.

TEXT BOOKS:

1. Baloch, R., Ethical Hacking and Penetration Testing Guide, CRC Press, 2019.

REFERENCES:

1. McClure S., Scam bray J., and Kurtz G, Hacking Exposed. Tata McGraw– Hill Education,
6th Edition 2019
2. Davidoff, S. and Ham, J., Network Forensics Tracking Hackers through Cyber space,
Prentice Hall, 2012.

CO – PO and PSO MAPPING:

Course Programme Outcomes (PO) PSO


Outcom
es
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4

CO 1 - 3 - 3 - - 2 - - - - - 2 - - -

CO 2 3 2 - - 3 - - 2 - - - - - 3 2 -

CO 3 3 2 - - 2 - - 2 - - 2 - 3 - - 1

CO 4 2 - - 1 3 - - - - 1 2 - - 3 2 3

CO 5 1 3 2 1 2 - - - 2 2 3 1 - 2 3 1

AVG 2.2 2.5 2 1.6 2.5 - - 2 2 1.5 2.3 1 2.5 2.6 2.3 1.6

13
`

CY3563 INFORMATION WARFARE LT PC


3003

OBJECTIVES:

 To address the unique and emerging policies, doctrines and strategies of


information warfare.
 To study the operational requirements of conducting cyber warfare at the nation level.
 To provide with a unified battle–space perspective.
 To enhance the ability to manage and develop operational systems and concepts.
 To study the integrated, controlled, and effective use of cyber assets in warfare.

UNIT – I: INTRODUCTION AND MODELS OF INFORMATION WARFARE 9


Information Resources-The Value of Resources-Players-The Offense- The
Defense- A Dual Role- Offensive Information Warfare- Increased Availability to
Offensive Player- Decreased Availability to Defensive Player- Decreased
Integrity- Other Classification Schemes- Defensive Information Warfare- Types
of Defense- Information Security and Information Assurance- The CIA Model and
Authorization- Playgrounds to Battlegrounds.

UNIT – II: OPEN SOURCES 9


Open Source and Competitive Intelligence- Privacy- Snooping on People
through Open Sources- Web Browsing- Privacy Regulations- Privacy- Copyright
Infringement- Trademark Infringement- Dark Sides.

UNIT – III: PSYOPS AND PERCEPTION MANAGEMENT 9


Lies and Distortions- Distortion- Fabrication- Hoaxes- Social Engineering-
Denouncement- Conspiracy Theories- Defamation- Harassment- Advertising-
Scams- Spam Wars- Censorship.

UNIT – IV: INSIDE THE FENCE 9


Traitors and Moles- State and Military Espionage- Economic Espionage-
Corporate Espionage- Privacy Compromises- Business Relationships- Visits
and Requests- Fraud and Embezzlement- Bogus Transactions- Data Diddling-
Inside Sabotage- Physical Attacks- Software Attacks.

UNIT – V: COMPUTER BREAK–INS AND HACKING 9


Accounts- Getting Access- Tools and Techniques- A Demonstration- Network
Scanners- Packet Sniffers- Password Crackers- Buffer Overþows and Other
Exploits- Covering up Tracks- Information Theft- Gathering Trophies- More than
Trophies- Tampering- Web Hacks-Domain Name Service Hacks- Takedown-
Remote Shutdown Extent.

TOTAL: 45 PERIODS

14
`

COURSE OUTCOMES:

At the end of the course, learners will be able to:

 Apply the theory of data, information and knowledge as they pertain to information
Warfare
 Apply strategies of using information as a weapon and a target
 Apply the principles of offensive and defensive information warfare for a given
Context
 Discuss the social, legal and ethical implications of information warfare
 Evaluate contemporary information warfare concepts for their application
In a corporate environment.

TEXT BOOKS:
1. Rahul Pandit, “Information Warfare: Battleground of the Digital Age”, 1st Edition,
Notion Press,2024.
2. Tamara Schwartz, “Information Warfare”, 1st Edition, Kendall Hunt Publishing,2023

REFERENCE BOOKS:

1. Jim Ridolfo and William Hart-Davidson, “Rhetoric and Information Warfare”, 1st Edition,
University of Pittsburgh Press, 2023.
2. Dr. Steve Tatham, “Information Operations: Facts, Fakes, Conspiracists”, 1st Edition,
Universal Defence,2023.

CO – PO and PSO MAPPING:


Course Programme Outcomes (PO) PSO
Outcomes

1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4

CO 1 3 3 - - - 2 1 - - 1 1 2 2 - -
CO 2 2 3 3 3 - - - - - - - - 3 1 - -
CO 3 2 - - - - 2 - - 2 - - - - - - -
CO 4 - - - - - - - - 2 2 - - - 2 - -
CO 5 3 3 1 3 2 - - - - - - - - - 1
AVG 2.5 3 3 2 3 2 2 1 2 2 1 1 2.5 1.6 - 1

15
`

CY3565 BIOMETRIC IMAGE PROCESSING LABORATORY LT P C


0 0 3 1.5

OBJECTIVES:
• To learn about the Image transformation
• To know about the Image enhancement
• To learn about the Image segmentation
• To learn about the Morphological image processing
• To know about the Feature extraction and recognition

LIST OF EXPERIMENTS:
1. Write a program to perform Image transformation
2. Write a program to perform Image enhancement
3. Simulate Image segmentation
4. Simulate Morphological image processing
5. Implement the Feature extraction and recognition
6. Simulate Hand Geometry
7. Mini Project

COURSE OUTCOMES:
• learn about the Image transformation
• know about the Image enhancement
• learn about the Image segmentation
• learn about the Morphological image processing
• know about the Feature extraction and recognition

TOTAL: 45 PERIODS
LIST OF EQUIPMENTS FOR A BATCH OF 30 STUDENTS:
SOFTWARE: MATLAB with Image Processing Toolbox, OpenCV (Python/C++),
MATLAB Biometric Datasets & GUI Tools
HARDWARE: High-Resolution Cameras, Workstations with GPU, Standalone
desktops - 30 Nos. (or) Server supporting 30 terminals or more.

CO – PO and PSO MAPPING:

Course Programme Outcomes (PO) PSO


Outcome
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4

CO 1 1 2 - 3 - 2 - 1 - 2 - - 3 1 -

CO 2 - 2 - 3 - - 2 - - - 3 - 2 2 - -

CO 3 1 - 2 - - - - - 2 - - - 3 - 1 -

CO 4 2 1 - 3 - 3 - 2 - - - - 3 - - -
CO 5 2 - 3 3 - - - - - 1 - - 1 - 3 -

AVG 1.5 1.6 2.5 3 - 2.5 - 1.5 2 1.5 3 - 2.4 2 1.6 -

16
`

CY3566 ETHICAL HACKING PRACTICES LABORATORY LT P C


0 0 3 1.5
OBJECTIVES:
To learn different network reconnaissance tools
To Study of packet sniffer tools.
To implement and install nmap.
TO Use the Nessus tool to scan the network.
To Set up IPSEC under LINUX

LIST OF EXPERIMENTS:
1. Study the use of network reconnaissance tools like WHOIS, dig, traceroute,
nslookup To gather information about networks and domain registrars
2. Study of packet sniffer tools like Wireshark, ethereal, tcpdump etc.
Use the tools to do the following
3. Observer performance in promiscuous as well as non–promiscuous mode. ii.
Show that packets can be traced based on different filters
4. Download and install nmap. Use it with different options to scan Open ports, perform
OS fingerprinting, do a ping scan, tcp port scan, udp port scan, etc.
5. Detect ARP spoofing using open source tool ARP WATCH 5. Use the
Nessus tool to scan the network for vulnerabilities.
6. Implement a code to simulate buffer overflow attack.
7. Set up IPSEC under LINUX
8. Install IDS (e.g. SNORT) and study the logs.
9. Use of iptables in linux to create firewalls
10. Mini project.
TOTAL: 45 PERIODS

COURSE OUTCOMES:
At the end of the course, the student should be able to:
• Use different network reconnaissance tools to solve real time problems.
• Build packet sniffer tools like wireshark, ethereal, tcpdump.
• Construct Detect ARP spoofing using open source tool ARPWATCH
• Use the Nessus tool to scan the network.
• Demonstrate the ethical hacking using mini project.

LIST OF EQUIPMENT FOR A BATCH OF 30 STUDENTS:


SOFTWARE: Kali Linux, Metasploit Framework, Wireshark, Nmap, Burp Suite, John the Ripper
HARDWARE: Standalone desktops – 30 Nos. (or) Server supporting 30 terminals or more.
CO – PO and PSO MAPPING:
Programme Outcomes (PO) PSO
Course
Outcome
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
s
CO 1 1 2 3 3 1
CO 2 2 3 2 2
CO 3 1 2 3 1
CO 4 2 1 3 3
CO 5 2 3 3 1 3
avg 1.5 1.6 2.5 3 2.4 2 1.7

17
`

SEMESTER VI
CY3661 INTRUSION DETECTION AND PREVENTION SYSTEMS LT PC
30 03

OBJECTIVES:
 To provide an in–depth introduction to the science and art of intrusion detection.
 To study the methodology- Techniques- and tools for monitoring events in
Computer network.
 To provide the study of preventing and detecting unwanted process
activity and recovering from malicious behavior.
 To compare alternative tools and approaches for Intrusion Detection through
Quantitative analysis.
 To Identify and describe the parts of all intrusion detection systems
and characterize new and emerging IDS technologies

UNIT – I: INTRODUCTION 9
Network Attacks- Attack Taxonomies- Probes - IPSweep and PortSweep- NMap-
MScan- SAINT- Satan- Privilege Escalation Attacks- Denial of Service (DoS) and
Distributed Denial of Service (DDoS) Attacks- Worms Attacks - Routing Attacks

UNIT – II: DETECTION APPROACHES 9


Detection Approaches- Misuse Detection- Pattern Matching- Rule–based
Techniques- State–based Techniques- Techniques based on Data Mining-
Anomaly Detection- Advanced Statistical Models- Rule based Techniques- Biological
Models - Learning Models- Specification–based Detection- Hybrid Detection

UNIT – III: DATA COLLECTION AND THEORETICAL FOUNDATION 9


Data Collection- Data Collection for Host–Based IDSs- Audit Logs- System Call
Sequences and Data Collection for Network–Based IDSs- Theoretical
Foundation of Detection- Taxonomy of Anomaly Detection Systems- Fuzzy Logic-
Architecture and Implementation- Centralized- Distributed- Intelligent Agents-
Mobile Agents and Cooperative Intrusion Detection

UNIT – IV: ALERT MANAGEMENT AND CORRELATION 9


Alert Management and Correlation- Data Fusion- Alert Correlation- Preprocess-
Correlation Techniques- Postprocess- Alert Correlation Architectures- Validation
of Alert Correlation System- Cooperative Intrusion Detection- Basic Principles of
Information Sharing and Cooperation Based on Goal–tree Representation of
Attack Strategies

UNIT – V: EVALUATION CRITERIA 9


Evaluation Criteria- Accuracy- False Positive and Negative- Confusion Matrix-
Precision- Recall- and F– Measure- ROC Curves- The Base–Rate Fallacy-
Performance- Completeness- Timely Response- Intrusion Tolerance and Attack
- Resistance- Redundantand Fault Tolerance Design and Test- Evaluation and
data Sets.

TOTAL: 45 PERIODS

18
`

TEXT BOOK:
1. Monowar H. Bhuyan, Dhruba K. Bhattacharyya,” Network Traffic Anomaly Detection and
Prevention Concepts, Techniques, and Tools” Springer 2017.
2. Kishan G. Mehrotra , Chilukuri K. Mohan,” Anomaly Detection Principles and Algorithms”
springer ,2017
3. Ali A. Ghorbani, Network Intrusion Detection and prevention concepts and techniques,
Springer,2010.

REFERENCES:
1. Syed Ali, L. L. M. S. Zegura (2019). Intrusion Detection and Prevention Systems: Concepts
and Practice, 1st Edition, Wiley.
2. William Stallings (2017). Network Security Essentials: Applications and Standards, 6th
Edition, Pearson.
3. Peter Szor, The Art of Computer Virus Research and Defense, Symantec Press, 2010,
ISBN 0–321–30545–3.
4. Markus Jakobsson and Zulfikar Ramzan, Crimeware, Understanding NewAttacks and
Defenses, Symantec Press, 2008, ISBN: 978–0–321–50195–0.
5. Roberto Di Pietro, Luigi V. Mancini, Intrusion Detection System, Springer, 2008.

CO – PO and PSO MAPPING:

Course Programme Outcomes (PO) PSO


Outcomes 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4

CO 1 3 3 - - - - 2 1 -
- - 2 - -
CO 2 3 2 - 3 - - - - 3 -
- - - 2 - 2
CO 3 3 2 - - 2 - 2 - 3 - - 1
- - 2 -
CO 4 2 - 1 3 2 1 2 - - 3 2 3
- - - -
CO 5 1 3 2 1 2 2 2 3 1 - 2 3 1
- - -
AVG 2.2 2.5 2 1.6 2.5 2 2 2 2 1.5 2.3 1 2.5 2.6 2 1.6

19
`

CY3662 CRYPTOGRAPHY AND NETWORK SECURITY LT PC


3003

OBJECTIVES:
 To understand basics of Cryptography and Network Security
 To understand the number theory used for network security
 To understand Cryptography Theories, Algorithms and Systems.
 To understand the design concept of cryptography and authentication
 To understand necessary Approaches and Techniques to build
protection mechanisms in order to secure computer networks.

UNIT – I : INTRODUCTION & NUMBER THEORY 9


Services, Mechanisms and attacks–the OSI security architecture–Network
security model–Classical Encryption techniques (Symmetric cipher model,
substitution techniques, transposition techniques, steganography). FINITE
FIELDS AND NUMBER THEORY: Modular arithmetic– Euclid’s algorithm– Prime
numbers–Fermat’s and Euler’s theorem–Testing for primality –The Chinese
remainder theorem– Discrete logarithms

UNIT – II : SYMMETRIC KEY CRYPTOGRAPHY 9


SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength
ofDES – Differential and linear cryptanalysis – Block cipher design principles –
Block cipher mode of operation – Evaluation criteria for AES – Advanced
Encryption Standard – RC4 – Key distribution.

UNIT – III : ASYMMETRIC KEY CRYPTOGRAPHY 9


ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution – Key
management – Diffie Hellman key exchange – ElGamal cryptosystem –
Ellipticcurve arithmetic–Elliptic curve cryptography.

UNIT – IV : MESSAGE AUTHENTICATION AND INTEGRITY 9


Authentication requirement – Authentication function – MAC – Hash function –
Security of hash function and MAC – SHA –Digital signature and authentication
protocols – DSS– Authentication applications – Kerberos, X.509

UNIT – V : SECURITY PRACTICE AND SYSTEM SECURITY 9


Electronic Mail security – PGP, S/MIME – IP security – Web Security – SYSTEM
SECURITY: Intruders – Malicious software – viruses – Firewalls.

TOTAL: 45 PERIODS

20
`

COURSE OUTCOMES:
At the end of the course, learners will be able to:
 Understand the fundamentals of networks security, security architecture,
threats and vulnerabilities
 Apply the different cryptographic operations of symmetric cryptographic algorithms
 Apply the different cryptographic operations of public key cryptography
 Apply the various Authentication and hash algorithms to simulate different applications.
 Understand various Security practices and System security standards

TEXT BOOKS:

1. William Stallings, Cryptography and Network Security: Principles and Practice,PHI


8th Edition, 2023.

REFERENCE BOOKS:

1. Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata Mc Graw Hill, 2018.
2. Charlie Kaufman and Radia Perlman, Mike Speciner, “Network Security, Second
Edition, Private Communication in Public World”, PHI 2016.

CO – PO and PSO MAPPING:

Course Programme Outcomes (PO) PSO


Outcom
es 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4

CO 1 2 - 2 - - - - - - - 2 - - - 2 -

CO 2 - 2 2 1 2 - - - - - - 2 2 - - 1

CO 3 - 2 2 2 - - - - - - - 2 - 2 - 1

CO 4 2 - - 2 - - 1 - - 1 2 - - - 1 -

CO 5 3 - 2 2 2 - - - - 1 - - 2 - 1 -

AVG 2.3 2 2 1.7 2 - 1 - - 1 2 2 2 2 1 .3 1

21
`

CY3663 DIGITAL FORENSICS LT P C


3 0 03
COURSE OBJECTIVES:
 To understand basic digital forensics and techniques.
 To understand digital crime and investigation.
 To understand how to be prepared for digital forensic readiness.
 To understand and use forensics tools for iOS devices.
 To understand how to examine digital evidences such as
the data acquisition, identification analysis.

UNIT I INTRODUCTION TO DIGITAL FORENSICS 9


Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensics
Process – Introduction – The Identification Phase – The Collection Phase – The
Examination Phase – The Analysis Phase – The Presentation Phase

UNIT II DIGITAL CRIME AND INVESTIGATION 9


Digital Crime – Substantive Criminal Law – General Conditions – Offenses –
Investigation Methods for Collecting Digital Evidence – International Cooperation to
Collect Digital Evidence

UNIT III DIGITAL FORENSIC READINESS 9


Introduction – Law Enforcement versus Enterprise Digital Forensic Readiness –
Rationale for Digital Forensic Readiness – Frameworks, Standards and
Methodologies – Enterprise Digital Forensic Readiness – Challenges in Digital
Forensics

UNIT IV PROCESSING DIGITAL CRIME SCENES AND SECURING EVIDENCE 9


Overview of Digital Crime Scene Processing- Securing a Computer Incident or Crime
Scene- Seizing Digital Evidence at the Scene- Storing Digital Evidence- Obtaining
Digital Hashes- Reviewing the Case and Evidence- Evidence Documentation and
Chain of Custody- Case Management and Collaboration- Legal and Ethical
Considerations

UNIT V ADVANCED COMPUTER FORENSICS TOOLS AND TECHNIQUES 9


Introduction to Computer Forensics Tools- Validating and Testing Forensic Software-
Addressing Data-Hiding Techniques- Performing Remote Acquisitions- Email
Investigations: Investigating Email Crime and Violations- Understanding Email
Servers- Specialized Email Forensics Tools- Digital Forensics in Legal Context-
Ethical Considerations in Email Investigations
TOTAL: 45 PERIODS

11
`

COURSE OUTCOMES:
On completion of the course, the students will be able to:
 Have knowledge on digital forensics.
 Know about digital crime and investigations.
 Be forensic ready.
 Investigate, identify and extract digital evidence from iOS devices.
 Investigate, identify and extract digital evidence from Android devices.

TEXT BOOK
1. Andre Arnes, “Digital Forensics”, Wiley, 2018.
2. Chuck Easttom, “An In-depth Guide to Mobile Device Forensics”,
FirstEdition, CRC Press, 2022.
REFERENCES
1. Eoghan Casey (2019). Digital Evidence and Computer Crime:
Forensic Science, Computers, and the Internet, 4th Edition, Academic
Press.
2. Vacca, J, Computer Forensics, Computer Crime Scene Investigation,
2nd Ed, Charles River Media, 2005, ISBN: 1 58450-389.

CO’s-PO’s & PSO’s MAPPING

CO’ PO’s PSO’s


s 1 2 3 4 5 6 7 8 9 10 11 12 1 2
1 3 1 3 2 1 - - - 1 1 3 3 1 3
2 3 3 3 3 3 - - - 2 2 1 2 1 3
3 3 3 2 3 1 - - - 3 2 1 1 3 2
4 3 1 2 2 3 - - - 1 3 3 2 1 3
5 1 3 2 3 2 - - - 2 3 2 3 1 2
AVg 3 2 2 3 2 - - - 2 2 2 2 1 3
.

1 - low, 2 - medium, 3 - high, ‘-' - no correlation

11
`

CY3662 CRYPTOGRAPHY AND NETWORK SECURITY LABORATORY LT PC


0 0 3 1.5
COURSE OBJECTIVES:
 Learn different cipher techniques.
 Implement the algorithms DES, AES.
 Implement the RSA and Diffie-Hellman.
 Implement hashing techniques such as SHA-1, MD-5.
 Develop a digital signature scheme.
PRACTICAL EXERCISES:
1. Write a program to implement the following cipher techniques to perform
encryption and decryption
i.Caesar Cipher ii. Playfair Cipher iii. Hill Cipher
2. Write a program to implement the following transposition techniques
i. Rail fence technique –Row major transformation
ii. Rail fence technique - Column major transformation
3. Write a program to implement DES algorithm
4. Write a program to implement AES algorithm
5. Write a program to implement RSA Encryption algorithm
6. Write a program to implement the Diffie-Hellman Key Exchange mechanism.
Consider one of the parties as Alice and the other party as bob.
7. Write a program to calculate the message digest of a text using the
SHA-1 algorithm.
8. Write a program to calculate the message digest of a text using the
MD-5 algorithm.
9. Write a program to implement digital signature standard.
TOTAL: 45 PERIODS

COURSE OUTCOMES:
 CO1: Develop a code for classical encryption techniques.
 CO2: Build a symmetric and asymmetric algorithms.
 CO3: Construct a code for various Authentication schemes.
 CO4: Apply the principles of digital signature.
 CO5: Apply necessary Approaches and Techniques to build protection
mechanisms in order to secure computer networks.

112
`

LIST OF EQUIPMENT FOR A BATCH OF 30 STUDENTS:

SOFTWARE: C / C++ / Java or equivalent compiler


HARDWARE: Standalone desktops – 30 Nos. (or) Server supporting 30 terminals
or more.

CO – PO and PSO MAPPING:

Course Programme Outcomes (PO) PSO


Outcom 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
es

CO 1 3 - 3 - 3 - - - - - 2 - - 3 3 -
CO 2 3 - 3 - 3 - - - - - 2 - 3 - 3 2
CO 3 3 - 3 - 3 - - - - - 2 - 3 3 - -
CO 4 3 - 3 - 3 - - - - - 2 - 3 3 - -
CO 5 3 - 3 - 3 2 - - - 2 2 - 3 3 - -
AVG 3 - 3 - 3 2 - - - 2 2 - 3 3 3 2

113
`

SEMESTER - VII

BA3711 HUMAN VALUES AND ETHICS L T P C


2 0 0 2

OBJECTIVES:

1. To introduce and educate the students on the concept of Human Values.

2. To support students to understand the need, basic guidelines, content and process
of value education.
3. To facilitate the students to understand harmony at all the levels of human living.

4. To help the students to understand social ethics and live accordingly.

5. To facilitate the students in applying the understanding of harmony in existence


in their profession and lead an ethical life.
UNIT I: HUMAN VALUES 6
Human value – needs, Values and its Types - Ethics. Moral values and Ethics – Integrity –
Work ethic – Service learning – Civic virtue – Respect for others – Living peacefully – Caring
– Sharing – Honesty – Courage – Valuing time – Cooperation – Commitment – Empathy –
Self-confidence – Character.
UNIT II: VALUE EDUCATION 6
Value Education: Definition, Concept and Need for Value Education. The Content and
Process of Value Education. Basic Guidelines for Value Education.
UNIT III: HARMONY 6
Harmony in the Family- the basic unit of human interaction, Trust and Respect, Harmony of
the Self with the Body: Self -regulation and Health. Harmony in Society: Dimensions system
of Human Order. Harmony in Nature: The Four Orders in Nature.
UNIT IV: SOCIAL ETHICS 6
The Basics for Ethical Human conduct - Defects in Ethical Human Conduct - Holistic and
Universal order - Universal Human Order and Ethical Conduct.
UNIT V: ETHICS IN PROFESSION 6
Professional Integrity, Respect & Equality, Privacy, Positive co-operation, Respecting the
competence of other professions. - Business ethics - Environmental ethics - Internet ethics
- Engineers as expert witnesses and advisors.

TOTAL HOURS: 30

114
`

OUTCOMES:

1. Students will be able to understand the significance of value inputs in a classroom


and start applying them in their life and profession.
2. Students will be able to understand the need, basic guidelines, content and process
of value education.
3. Students will be able to the role of a human being in ensuring harmony in society and
nature.
4. Students will be able to understand social ethics.

5. Students will be able to Distinguish between ethical and unethical practices and start
working out the strategy to actualize a harmonious environment wherever they work.
TEXTBOOKS:

1. Jonathan Ham, Michael G. Gannon (2019). Digital Forensics and Cyber Crime: 11th International
Conference, ICDF2C 2019, 1st Edition, Springer.
2. Gary Palmer (2018). Guide to Computer Forensics and Investigations, 5th Edition, Cengage
Learning.

REFERENCES:
1. R. Subramanian, ‘Professional Ethics’ Oxford University Press, 2nd Edition 2017
2. Mike Martin and Roland Schinzinger, “Ethics in Engineering”, McGraw Hill, New
York, 3rd edition (2017).
3. Mike Martin and Roland Schinzinger, “Ethics in Engineering”, McGraw Hill, New
York, 3rd edition (2017).

4. R. S. Nagarazan, ‘A Textbook on Professional Ethics and Human Values’ New Age


International Publishers, 2015.

5. Professional Ethics and Human Values by Prof.D.R.Kiran-Tata McGraw-Hill – 2013.


6. Govindarajan M, Natarajan S, Senthil Kumar V. S, “Professional Ethics and Human
Values”, Prentice Hall of India, New Delhi, 2013.
7. Govindarajan M, Natarajan S, Senthil Kumar V. S, “Professional Ethics and Human
Values”, Prentice Hall of India, New Delhi, 2013.
8. World Community Service Centre, “Value Education", Vethathiri publications, Erode, 2011.
9. World Community Service Centre, “Value Education", Vethathiri publications, Erode, 2011.
10. R R Gaur, R Sangal, G P Bagaria, 2009, A Foundation Course in Human Values
and Professional Ethics, Excel Books First Edition 2009.

11. R R Gaur, R Sangal, G P Bagaria, 2009, A Foundation Course in Human Values

115
`
and Professional Ethics, Excel Books First Edition 2009.

12. Ethics in Engineering by Mike W. Martin and Roland Schinzinger - Tata McGraw-Hill - 2003.
13. Langford, Duncan (EDT): Internet Ethics, London, Macmillan Press Ltd., 2000.
14. Erwann, M. David, Michele S. Shauf, Computers, Ethics and Society, Oxford University
Press, 2003.
15. Suresh Jayshree, 2003, Human Values and Professional Ethics, ,S. Chand Publishing,
Third Revised Edition.
E-BOOK :
1. Gary Palmer (2018). Guide to Computer Forensics and Investigations, 5th Edition, Cengage
Learning.
2. R. S. Nagarazan, ‘A Textbook on Professional Ethics and Human Values’ New Age
International Publishers, 2015.
3. R R Gaur, R Sangal, G P Bagaria, 2009, A Foundation Course in Human Values and
Professional Ethics, Excel Books First Edition 2009.

CO-PO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8
Mapping
CO1 1
CO2 1
CO3 1
CO4 1
CO5 2
Avg 1 2 1

116
`

CY3761 SECURITY IN MOBILE EXPLOITATION L TP C


3 00 3
COURSE OBJECTIVES:
 To understand the basics of mobile security
 To understand the methods of mobile application security.
 To understand the concepts of security in android application.
 To understand the concepts of android security.
 To understand about the mobile exploitation.

Unit I: Introduction to Mobile Security 9


Overview of mobile security landscape--Importance of mobile security -Mobile
operating systems and their vulnerabilities-Common attack vectors on mobile
devices --Legal and ethical considerations in mobile security-- Impact of mobile
exploits onpersonal and enterprise security--Introduction to mobile malware and
its types

Unit II: Mobile Application Security 9


Fundamentals of secure mobile app development OWASP Mobile Top 10
vulnerabilities--Techniques for secure coding in mobile apps-Reverse engineering
of mobile applications--Securing data storage mobile apps-- Authentication and
authorization mechanisms in mobile apps--Best practices for secure API usage
inmobile apps.

Unit III: Android Security 9


Android security architecture overview -Android permissions model and best
practices- Exploitation techniques targeting Android devices--Rooting Android
devices: risks and implications--specific security vulnerabilities-- Android
malwareanalysis and detection-- Securing Android devices in enterprise
environments.

Unit IV: iOS Security 9


iOS security architecture overview--iOS app sandboxing and code signing—
Jailbreaking iOS devices: risks and security implications--Techniques for securing
iOS applications-- iOS malware analysis and detection--iOS security updates and
patch management-- Securing iOS devices in enterprise environments

Unit V: Advanced Topics in Mobile Exploitation 9


Mobile device management (MDM) and its role in security--BYOD (Bring Your
Own Device) policies and security considerations--Securing mobile payment
systems and digital wallets--IoT (Internet of Things) devices and mobile security.

TOTAL : 45 PERIODS

117
`

TEXT BOOKS:

1. J. P. Anderson (2018). Mobile Security and Privacy: Protection Against Threats to the Mobile World,
1st Edition, Wiley.
2. "The Mobile Application Hacker's Handbook" by Dominic Chell, Tyrone
Erasmus,Shaun Colley, Ollie Whitehouse.2011
3. "Mobile Application Security" by Himanshu Dwivedi, Chris Clark, David Thiel.2010

REFERENCE BOOKS:

1. Vijayakumar V, S. S. (Sundar) (2019). Mobile Security: A Guide for Users and Developers, 1st
Edition, CRC Press.
2. "Mobile Malware Attacks and Defense" by Ken Dunham, Rohit Dhamankar.2011
3. "Mobile Security and Privacy: Advances, Challenges and Future Research
Directions" edited by Man Ho Au, Raymond Choo.2015

COURSE OUTCOMES:

At the end of the course, the student should be able to:


 Understand the fundamentals of networks security, security
architecture, threats and vulnerabilities
 Apply the different operations of to provide mobile security
 Apply the different android and ios security techniques
 Understand various Security practices and System security standards
 Understand the mobile device management.

CO – PO and PSO MAPPING:

Course Programme Outcomes (PO) PSO


Outcome 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
s

CO 1 2 2 2

CO 2 2 2 1 2 2 2 1

CO 3 2 2 2 2 2 1

CO 4 2 2 1 1 2 1

CO 5 3 2 2 2 1 2 1

AVG 2.3 2 2 1.7 2 1 1 2 2 2 2 1.3 1

118
`

CY3762 ARTIFICIAL INTELLIGENCE IN CYBERSECURITY LT P C


3 0 0 3

COURSE OBJECTIVES:
 To understand the basics of Artificial Intelligence
 To understand the various AI techniques
 To understand the basic concepts detecting cyber threats
 To understand the techniques to detect the cyber threats
 To understand the various methods of machine learning to prevent fraudulent access.

Unit I: Introduction to AI for Cyber security 9


Applying AI in cyber security--The evolution from expert systems to data mining and AI--
Thedifferent forms of automated learning--The characteristics of algorithm training and
optimization--Beginning with AI via Jupyter Notebooks--Introducing AI in the context of
cybersecurity.

Unit II: AI for Cyber security Arsenal 9


Classification—Regression--Dimensionality reduction—Clustering--Speech recognition
Video anomaly detection-- Natural language processing (NLP)-NLP- Large-scale image
processing -Social media analysis.

Unit III: Detecting Cyber security Threats with AI 9


How to detect spam with Perceptrons -Image spam detection with support vector machines
(SVMs)-Phishing detection with logistic regression and decision trees - Spam detection with Naive
Bayes-- Spam detection adopting NLP.

Unit IV: Protecting Sensitive Information and Assets 9


Authentication abuse prevention -Account reputation scoring-User authentication with keystroke
recognition-Biometric authentication with facial recognition.

Unit V: Fraud Prevention with Cloud AI Solutions 9


How to leverage machine learning (ML) algorithms for fraud detection -How bagging and boosting
techniques can improve an algorithm's effectiveness -How to analyze data with IBM-Watson and
Jupyter Notebook-How to resort to statistical metrics for results evaluation.

TOTAL : 45 PERIODS

119
`

TEXT BOOKS
1. Dr. Nilakshi Jain (2019). Artificial Intelligence, As per AICTE: Making a System
Intelligent, Wiley Publication.
2. Alessandro Parisi (2019). Hands-On Artificial Intelligence for Cybersecurity: Implement
Smart AI Systems for Preventing Cyber Attacks and Detecting Threats and Network
Anomalies, Packt Publication.

REFERENCE BOOKS
1. "AI in Cybersecurity" by Leslie F. Sikos Publisher: Springer, 2019
2. " Jalil Boudjerda (2020). Artificial Intelligence in Cybersecurity, Springer.

COURSE OUTCOMES:
At the end of the course, the student should be able to:
 Understanding the basics of AI
 Learn the AI techniques
 Cyber security threats and detection
 Authentication techniques
 Unauthorized access prevention

CO – PO and PSO MAPPING:

PO PSO
CO

1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO1 3 2 1 - - - - - - - - - 1 - - -
CO2 3 3 2 1 - - - - - - - - 2 1 - -
CO3 3 3 2 - - - - - - - - - 2 1 - -
CO4 3 3 1 - - - - - - - - - 2 1 - -
CO5 3 1 2 - - - - - - - - - 1 - - -
AVG 3 2.4 1.6 1 - - - - - - - - 1.6 1 - -

120
`

CY3763 SECURITY IN MOBILE EXPLOITATION LABORATORY L TP C


0 0 3 1.5
COURSE OBJECTIVES:
• Learn how to analyze the structure of an Android APK file.
• Perform static code analysis on decompiled Android APK code
• Monitor and analyze network traffic from a mobile app.
• Reverse engineer Android applications to understand their functionality.
• Identify insecure coding practices in mobile apps.
• Automate security testing of mobile applications.

List of Experiments

1. Basic Android APK Analysis


2. Static Code Analysis
3. Dynamic Analysis Setup
4. Network Traffic Analysis
5. Reverse Engineering
6. Exploiting Vulnerable Components
7. Automating Mobile Malware Analysis
8. Secure Code Practices
9. Automated Testing of Mobile Apps
10. Building a Mobile App Security Scanner
TOTAL : 45 PERIODS

COURSE OUTCOMES:
At the end of the course, the student should be able to:
• Use Python to extract the contents of an APK file.
• Use tools like Androguard to decompile APKs. Use adb (Android Debug
Bridge) commands in Python to interact with an Android device.
• Set up a proxy (e.g., mitmproxy) to capture network traffic.Write a Python script
to extract and analyze APKs for known malware indicators.
• Use Appium or Selenium with Python to automate UI testing.
• Integrate the lab exercises into a single Python tool. Create a user
interface (CLI or GUI) for the tool.

121
`

LIST OF EQUIPMENT FOR A BATCH OF 30 STUDENTS:


SOFTWARE: Android Studio + SDK + ADB, APKTool, Wireshark.
HARDWARE: Standalone desktops –30 Nos. (or) Server supporting 30 terminals
or more.

CO – PO and PSO MAPPING:

CO’ PO’s PSO’s


s 1 2 3 4 5 6 7 8 9 10 11 12 1 2
1 3 2 1 1 1 - - - 1 - - 1 1 3
2 3 3 3 3 3 - - - 2 - - 1 3 3
3 3 3 3 3 3 - - - 2 - - 1 3 3
4 3 3 2 3 2 - - - 3 - - 3 3 3
5 3 3 3 3 3 - - - 3 - - 2 3 3
Avg. 3 2.8 2.4 2.6 2.4 - - - 2.2 - - 1.6 2.6 3

122
`

CY3764 ARTIFICIAL INTELLIGENCE IN CYBER SECURITY LT PC


LABORATORY
0 0 3 1.5

COURSE OBJECTIVES:

• Develop an IDS using machine learning techniques.


• Classify malware samples using deep learning models. Detect phishing
emails using NLP techniques.
• Detect anomalies in network traffic using auto encoders.
• Use machine learning to detect insider threats based on user behavior.
Predict future cyber attacks using time series analysis.
• Classify network traffic into different types using deep learning.

List of Experiments
1. Intrusion Detection System (IDS) using Machine Learning
2. Malware Classification using Deep Learning
3. Phishing Email Detection using Natural Language Processing (NLP)
4. Anomaly Detection in Network Traffic using Autoencoders
5. User Behavior Analytics for Insider Threat Detection
6. Ransomware Detection using Behavioral Analysis
7. Spam Detection using Machine Learning
8. Predicting Cyber Attacks using Time Series Analysis
9. Network Traffic Classification using Deep Learning
10. Building a Secure Chat Application with AI-based Anomaly Detection.

TOTAL : 60 PERIODS

COURSE OUTCOMES:
 At the end of the course, the student should be able to:
 Build deep learning neural network models
 Use appropriate search algorithms for problem
solving Predicting cyber attacks using ML
algorithms
 Anomaly detection using AI techniques
 To know about various machine learning models

123
`

CO – PO and PSO MAPPING:

CO’s PO’s PSO’s


1 2 3 4 5 6 7 8 9 10 11 12 1 2
1 - - 1 - 1 - - - 2 1 2 2 1 2
2 - - - - 1 - - - 2 1 2 2 1 2
3 - - 1 - - - 2 - 1 - 3 3 2 2
4 1 - - - 1 - - - 2 - 3 2 1 2
5 1 - 1 - 1 - - - 2 - 2 2 2 2
Avg. 1 - 1 - 1 - 2 2 1 2 2 1 2

124
`

Subjects offered to CSE & IT


CY3765 CRYPTOGRAPHY AND CYBER SECURITY LT P C
3003
Objective:
 To understand basics of Cryptography and Network Security.
 To understand the number theory used for network security.
 To understand Cryptography Theories, Algorithms and Systems.
 Learn the security issues involving information stored in computers.
 Learn about the investigations related to the information theft and
attacks related to it.

UNIT – I: INTRODUCTION & NUMBER THEORY 9


Services, Mechanisms and attacks–the OSI security architecture–Network
security model– Classical Encryption techniques (Symmetric cipher model,
substitution techniques, transposition techniques, steganography). FINITE
FIELDS AND NUMBER THEORY: Modular arithmetic– Euclid’s algorithm–
Prime numbers–Fermat’s and Euler’s theorem–Testing for primality –The
Chinese remainder theorem– Discrete logarithms.

UNIT – II: SYMMETRIC KEY CRYPTOGRAPHY 9


SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength
of DES –Block cipher design principles – Block cipher mode of operation –
Advanced EncryptionStandard – RC4 – Key distribution.

UNIT – III: ASYMMETRIC KEY CRYPTOGRAPHY 9


ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution – Key
management Diffie Hellman key exchange – ElGamal cryptosystem – Elliptic
curve arithmetic–Ellipticcurve cryptography.

UNIT –IV: INTRODUCTION TO CYBER SECURITY 9


Introduction – Computer Security – Threats – Harm – Vulnerabilities – Controls
– Authentication – Access Control and Cryptography – Web—User Side –
Browser Attacks Web Attacks Targeting Users – Obtaining User or Website Data
– Email Attacks.

UNIT – V: DEFENCES: SECURITY COUNTERMEASURES 9


Cryptography in Network Security – Firewalls – Intrusion Detection and
Prevention Systems – Network Management – Databases – Security
Requirements of Databases –Reliability and Integrity – Database Disclosure –
Data Mining and Big Data.

TOTAL : 45 PERIODS

125
`

COURSE OUTCOMES:
Upon completion of the course, the student should be able to:
 Understand the fundamentals of networks security, security architecture,
threats and vulnerabilitieS.Apply the different cryptographic operations of
symmetric cryptographic algorithms.
 Apply the different cryptographic operations of public key cryptography.
 Gain knowledge on the nature of threats and cyber security management goals
and framework.
 Knowledge on the landscape of hacking and perimeter defense mechanisms.

TEXT BOOKS:

1. Bernard Menezes (2019). Cryptography and Network Security, 6th Edition, Wiley.
2. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in
Computing, 5th Edition, Pearson Education, 2015.
3. William Stallings, Cryptography and Network Security: Principles and
Practice, PHI 4th Edition,2006.

REFERENCE BOOKS:

1. Daphne Yao, Moti Yung (2017). Cyber Security: Cryptography and Digital Forensics,
1st Edition, Springer.
2. Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata Mc Graw Hill, 2007.
3. Charlie Kaufman and Radia Perlman, Mike Speciner, “Network Security,
Second Edition, Private Communication in Public World”, PHI 2002.
4. The Cyber Security Management System: A Conceptual Mapping, John
Dexter,SANS Institute Information Security Reading Room 2002.

CO – PO and PSO MAPPING:


Course Programme Outcomes (PO) PSO
Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 2 2 2

CO 2 2 2 1 2 2 2 1

CO 3 2 2 2 2 2 1

CO 4 2 2 1 1 2 1

CO 5 3 2 2 2 1 2 1

AVG 2.3 2 2 1.7 2 1 1 2 2 2 2 1 1

126
`

CY3766 CRYPTOGRAPHY AND CYBER SECURITY LABORATORY LT P C


0 0 3 1.5
OBJECTIVES:
 To implement the algorithms DES.
 To implement the RSA Algorithm.
 To learn different network reconnaissance tools
 To Study of packet sniffer tools.
 To Study Encase Forensics and implement install HEX Editor.
LIST OF EXPERIMENTS:
1. Perform encryption, decryption using the following substitution techniques.
(i) Ceaser cipher
(ii) Play fair cipher
(iii) Hill Cipher
(iv) Vigenere cipher
2. Perform encryption and decryption using following transposition techniques.
(i) Rail fence
(ii) Row & Column Transformation
3. Apply DES algorithm for practical applications.
4. Apply AES algorithm for practical applications.
5. Implement RSA Algorithm using HTML and JavaScript.
6. Implement the Diffie–Hellman Key Exchange algorithm for a given problem.
7. Study the use of network reconnaissance tools like WHOIS, dig, trace
route, nslookup to gather information about networks and domain
registrars.
8. Study of packet sniffer tools like wireshark, ethereal, tcpdump etc. Use
thetools to do the following.
(i) Observer performance in promiscuous as well as non–promiscuous mode.
(ii) Show that packets can be traced based on different filters.
9. Comparison of Files using HEX Editor 18.5 and FC Command.
10. Imaging using FTK Imager 3.2.0.
TOTAL: 60 PERIODS

COURSE OUTCOMES:
At the end of the course, the student should be able to:
 Develop code for classical Encryption Techniques to solve the problems.
 Build cryptosystems by applying symmetric and public key encryption algorithms.
 Use different network reconnaissance tools to solve real time problems.
 Build packet sniffer tools like wire shark, ethereal, tcpdump.
 Implement and install HEX Editor and Use Encase Forensics.
LIST OF EQUIPMENT FOR A BATCH OF 30 STUDENTS:
SOFTWARE: C / C++ / Java or equivalent compiler GnuPG, Snort, N–Stalker or
Equivalent.
HARDWARE: Standalone desktops –30 Nos. (or) Server supporting 30 terminals
or more.

127
`

CO – PO and PSO MAPPING:

Course Programme Outcomes (PO) PSO


1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
Outcome
s
CO 1 3 3 3 2 3 3

CO 2 3 3 3 2 3 3 2

CO 3 3 3 3 2 3 3

CO 4 3 3 3 2 3 3

CO 5 3 3 3 2 2 2 3 3

Avg 3 3 3 2 2 2 3 3 3 2

128
`

VERTICALS- III
PCY301 MODERN CRYPTOGRAPHY L T P C
3 0 0 3
COURSE OBJECTIVES:
 To learn about Modern Cryptography.
 To focus on how cryptographic algorithms and protocols work and how to use
them.
 To build a pseudorandom permutation.
 To construct Basic cryptanalytic techniques.
 To provide instruction on how to use the concepts of block ciphers and
message authentication codes.

UNIT I INTRODUCTION 9
Basics of Symmetric Key Cryptography- Basics of Asymmetric Key Cryptography-
Hardness of Functions. Notions of Semantic Security (SS) and Message
Indistinguishability (MI): Proof of Equivalence of SS and MI- Hard Core Predicate- Trap-
door permutation- Goldwasser-Micali Encryption. Goldreich-Levin Theorem: Relation
between Hardcore Predicates and Trap-door permutations.

UNIT II FORMAL NOTIONS OF ATTACKS 9


Attacks under Message Indistinguishability: Chosen Plaintext Attack (IND-CPA)-
ChosenCiphertext Attacks (IND-CCA1 and IND-CCA2)- Attacks under Message Non-
malleability: NM-CPA and NM-CCA2- Inter- relations among the attack model

UNIT III RANDOM ORACLES 9


Provable Security and asymmetric cryptography- hash functions. One-way functions: Weak
and Strong one-way functions. Pseudo-random Generators (PRG): Blum-Micali-Yao
Construction- Construction of more powerful PRG- Relation between One-way functions
and PRG- Pseudo random Functions (PRF)

UNIT IV BUILDING A PSEUDORANDOM PERMUTATION 9


The LubyRackoff Construction: Formal Definition- Application of the LubyRackoff
Construction to the construction of Block Ciphers- The DES in the light of LubyRackoff
Construction.

UNIT V MESSAGE AUTHENTICATION CODES 9


Left or Right Security (LOR). Formal Definition of Weak and Strong MACs- Using a PRF
as a MAC- Variable length MAC. Public Key Signature Schemes: Formal Definitions-
Signing and Verification- Formal Proofs of Security of Full Domain Hashing. Assumptions
for Public Key Signature.
Schemes: One-way functions Imply Secure One-time Signatures. Shamir's Secret
Sharing Scheme. Formally Analyzing Cryptographic Protocols. Zero Knowledge Proofs
and Protocols.

129 TOTAL : 45 PRE2R02IO


3 DS
`

COURSE OUTCOMES:
CO1: Interpret the basic principles of cryptography and general cryptanalysis.
CO2: Determine the concepts of symmetric encryption and authentication.
CO3 Identify the use of public key encryption, digital signatures, and key establishment.
CO4: Articulate the cryptographic algorithms to compose, build and analyze simple
cryptographic solutions.
CO5: Express the use of Message Authentication Codes.

TEXT BOOKS:
1. Jonathan Katz, Yehuda Lindell (2020). Introduction to Modern Cryptography,
3rd Edition,Springer.
2. Prof. Dr. Hans Delfs and Helmut Knebl, Introduction to Cryptography: Principles and
Applications, Springer Verlag second edition 2007.
3. Wenbo Mao, Modern Cryptography, Theory and Practice, Pearson Education (Low Priced
Edition).2003

REFERENCES:
1. Sanjay Kumar, Dinesh Goyal (2019). Modern Cryptography: Theory and
Practice, 1st Edition, Wiley.
2. William Stallings, “Cryptography and Network Security: Principles and Practice”,PHI
sixth Edition, 2014.
3. Czesław Koscielny , Mirosław Kurkowski ,”Modern Cryptography Primer Theoretical
Foundations and Practical Application”, Springer 2013.
4. ShaffiGoldwasser and MihirBellare, Lecture Notes on Cryptography, Available at
http://citeseerx.ist.psu.edu/.(2004)

CO-PO MAPPING:
Program Outcomes (POs) Program Specific
COs Outcomes
(PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3 PSO4
1 - 2 - - - 1 - - - 1 - - - - - -
2 2 - - - 2 - - 1 - - - 2 - 2 - -
3 - - - - - - - - 2 - - - - - 1 -
4 - - 2 - 1 - 2 - - - 2 - 3 - 2 -
5 - - - 2 - - - - - - - - - - - 2
AVG 2 2 2 2 1.5 1 2 1 2 1 2 2 3 2 1.5 2

130
`

PCY302 CRYPTO CURRENCY AND BLOCK CHAIN TECHNOLOGIES L T P C

3 0 0 3

COURSE OBJECTIVES:
 To learn about Bit coin, Cryptocurrency.
 To understand the concepts of block chain
 To explore the concepts of Ethereum.
 To learn about Hyper ledger Fabric model and its architecture.
 To integrate ideas from block chain technology into projects.

UNIT I INTRODUCTION TO CRYPTO CURRENCY 9


Bitcoin – Digital keys and addresses: Private and public keys, Base58 check encoding,vanity
addresses – Transactions: transaction life cycle, transaction data structure, types of transactions
– Mining – Bitcoin Network and Payments – Wallets – Bitcoin Payments

UNIT II BITCOIN CLIENTS AND APIS 9


Bitcoin installation: Types of Bitcoin Core clients, setting up a Bitcoin node, source node,
bitcoin.conf, settin up a node in testnet, regtest. Alternative coins – Theoretical Foundations -
Bitcoin limitations – Name coin – Lite coin – Prime coin.

UNIT III INTRODUCTION TO BLOCK CHAIN AND ETHEREUM 9


Block Chain - History of Block Chain – Types of Block Chain – Consensus – CAPTheorem and
Block Chain – Decentralization using Block Chai. Ethereum network– Components of the Ethereum
ecosystem – Programming Languages –Ethereum Development Environment– Development Tools
and Frameworks. Illustrative: Setup the Ethereum development environment.

UNIT IV WEB3 AND HYPERLEDGER 9


Introduction to Web3 – Contract Deployment – Development Frameworks
Hyperledgeras a protocol – Reference Architecture – Hyperledger Fabric – SawtoothLake – Corda.
Illustrative: Creating and deploying a business network on Hyperledger Composer
Playground.

UNIT V BLOCK CHAIN APPLICATIONS 9


IoT with Block Chain – Block Chain based voting system - Border Control – MedicalRecord
Management System - Alternative Block chains – Kadena – Ripple – Rootstock – Quorum -
Scalability – Privacy.
TOTAL – 45 Periods

131
`
COURSE OUTCOMES
After completion of the course, the students will be able to
CO1 - Explain the functional /operational aspects of Cryptocurrency Ecosystem
CO2 -. Understand the basic concepts of Block Chain Technologies.
CO3 - Develop application using Ethereum.
CO4 -Compute models for Block Chain Technology.
CO5 - Illustrate Blockchain with IoT and track the emerging trends in Blockchain.
Text Books
1. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology, Decentralization
andSmart Contracts Explained”, Second Edition, Packt Publishing, 2018.
2. A. Narayanan, J. Bonneau, E. Felten, A. Miller, S. Goldfeder, “Bitcoin and
CryptocurrencyTechnologies: A Comprehensive Introduction”, Princeton University
Press, 2016.
Reference Books
1. Mastering Ethereum: Building Smart Contracts and DApps by Andreas M. Antonopoulos,
1stEdition, 2018.
2. Building Blockchain Projects by Narayan Prusty, 2017.
3. Mastering Bitcoin: Unlocking Digital Cryptocurrencies by Andreas M. Antonopoulos, 2015

Web References
1. https://developer.ibm.com/technologies/blockchain/

2. https://www.edx.org/course/introduction-to-hyperledger-blockchain-technologie/

3. https://nptel.ac.in/courses/106104220/blockchain technology and applications/

4. https://blockgeeks.com/

COs/POs/PSOs Mapping
Program Outcomes (POs) Program Specific
COs Outcomes (PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3 PSO4
1 - 2 - - - 1 - - - 1 - - - - - -
2 2 - 2 - 2 - - 1 - - - 2 - 2 - -
3 - - - - - - - - 2 2 - - - - 1 -
4 1 - 2 - 1 - 2 - - - 2 - 3 - 2 -
5 - 3 - 2 - - - 2 - - - - - - - 2
AVG 1.5 2.5 2 2 1.5 1 2 1.5 2 1.5 2 2 3 2 1.5 2

132
`

PCY303 ETHICAL HACKING L TP C


3 0 0 3
OBJECTIVES:
 Introduces the concepts of Ethical Hacking.
 Gives the students the opportunity to learn about different tools and techniques in
Ethical hacking and security.
 Practically apply Ethical hacking tools to perform various activities.
 Understand the core concepts related to vulnerabilities and their causes
 Study the challenges and limitations associated with hacking.
UNIT – I : INTRODUCTION 9
Ethical hacking process, Hackers behavior & mindset, Vulnerability versus Penetration test,
Penetration Test. Categories of Penetration test–Black box– White box–Grey box–Types of
Penetration Test.

UNIT – II : INFORMATION GATHERING TECHNIQUES 9


Active Information Gathering–Passive Information Gathering–Sources of Information
Gathering– NeoTrace–Traceroute–ICMP Traceroute–TCP Traceroute–UDP Traceroute –
WhatWeb – Netcraft– Interacting with DNS Servers

UNIT – III : SNOOPING ATTACKS &PORT SCANNING TECHNIQUES 9


Enumerating SNMP–Problem with SNMP–Sniffing SNMP Passwords–SNMP Brute
ForceTool– SMTP Enumeration–Types of Port Scanning– Anonymous Scan Types–OS
Fingerprinting– Advanced Firewall/IDS Evading Techniques

UNIT – IV : VULNERABILITY ASSESSMENT & NETWORK SNIFFING 9


Vulnerability Scanners–Vulnerability Assessment with Nmap–Nessus Vulnerability Scanner–
Types of Sniffing–MITM Attacks–ARP Attacks–Using ARP Spoof to PerformMITM Attacks–
Hijacking Session with MITM Attack– Sniffing Session Cookies with Wireshark

UNIT – V : EXPLOITATION 9
Remote Exploitation–Attacking Network Remote Services–Overview of Brute Force Attacks–
Common Target Protocols–Client Side Exploitation–Methods–Post exploitation–Escalating
Privileges–Installing a Backdoor–MSFVenom–Crackingthe Hashes–Rainbow Crack–
Identifying and Exploiting Further Targets

TOTAL : 45 PERIODS

133
`

COURSE OUTCOMES:

On Completion of the course, the students should be able to have:

 Apply the theory of data, information and knowledge as they pertain to


Ethical Hacking.
 Understand ethics behind hacking and vulnerability disclosure.
 Appreciate the impact of hacking.
 Exploit the vulnerabilities related to computer system and
networks using state of the art tools and technologies.
 Exploit the challenges and limitations associated with hacking

TEXT BOOKS:

1. Tushar Sharma (2019). Ethical Hacking: A Hands-on Introduction to Breaking In, 1st Edition, Packt
Publishing.
2. Baloch, R., Ethical Hacking and Penetration Testing Guide, CRC Press, 2015.

REFERENCES:
1. Rafay Baloch (2020). Mastering Ethical Hacking, 1st Edition, Packt Publishing.
2. Davidoff, S. and Ham, J., Network Forensics Tracking Hackers through Cyberspace, Prentice
Hall, 2012.
3. McClure S., Scam bray J., and Kurtz G, Hacking Exposed. Tata McGraw–Hill Education, 6TH Edition,
2009

CO – PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course
Outcomes 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4

CO 1 3 3 2 2
CO 2 3 2 3 2 3 2
CO 3 3 2 2 2 2 3 1
CO 4 2 1 3 1 2 3 2 3
CO 5 1 3 2 1 2 2 2 3 1 2 3 1
AVG 2.2 2.5 2 1.6 2.5 2 2 2 1.5 2.3 1 2.5 2.6 2.3 1.3

134
`

PCY304 SOCIAL ENGINEERING L T P C


3 0 0 3

Course Objectives:
• To understand the concept of Social Engineering attacks and related applications.
• To learn knowledge representation using Social Engineering.
• To understand human behaviour in social web and related communities.
• To learn visualization of social networks.
• To understand the applications of Social Entrepreneurship

UNIT I INTRODUCTION 9
Introduction to Social Engineering – Importance – Social Ethics – Vision & Mission towards
Society- Individual Social Responsibility (ISR) UNSDGs- Relevance & impactof SDGs.

UNIT II PHYSICAL SOCIAL ENGINEERING 9


Real World Example of Collecting OSINT – Non technical OSINT – Tools of the Trade – Profiling
People Through Communication: The Approach – Enter the DISC.

UNIT III SOCIAL MARKETING 9


Social Marketing-Marketing Mix-Process-Social Entrepreneurship-History-Impact-Types -Social
Entrepreneurs-Social Enterprises-Social Business model canvas.

UNIT IV HACKING THE HUMANS 9


An Equal Opportunity Victimizer – The Principles of the Pentest – Phishing- Vishing- SMishing-
Impersonation- Reporting – Legal implications of social engineering – Ethical behaviour and
responsible use of knowledge.

UNIT V SOCIAL ENGINEERING ATTACKS 9


Social Engineering Attacks-Develop Actionable and Realistic Policies- Real-World Check
-ups-Security Awareness Programs – Open source Intelligence (OSINT) – Online Research
and Profiling – Data aggregation and correlation.

` TOTAL : 45 PERIODS

135
`

Textbook:

1. Christopher Hadnagy, Social Engineering: The Art of Human Hacking, Wiley Publications,2nd
Edition, 2018.

Reference Books:
1. Joe Navarro, “Social Engineering: A Guide to Manipulation and Influence”,edition1st, 2019.

2. Christopher Hadnagy and Michele Fincher, Phishing Dark Waters: The Offensive and Defensive
Sides of Malicious Emails, Wiley Publications 1st edition 2015.

3. Kevin D. Mitnick and William L. Simo, The Art of Deception: Controlling the Human Element of
Security, Wiley Publications, 1st edition 2007.
OUTCOMES:
Upon completion of the course, the students should be able to:
• Develop web related applications and attacks.
• Represent knowledge using Social Engineering.

• Predict human behaviour in social web and related communities.


• Visualize social networks.
• Improve Social Security Awareness.

CO-PO matrices of courses

Course Programme Outcomes (PO) PSO


Outcomes 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
CO 1 2 - 2 - - - - - - - - - - - 2 -
CO 2 - 2 2 1 2 - - - - - - 2 2 - - 1
CO 3 - 2 2 2 - - - - - - - 2 - 2 - 1
CO 4 2 - - 2 - - 1 - - 1 2 - - - 1 -
CO 5 3 - 2 2 2 - - - - 1 - - 2 - 1 -
AVG 2.3 2 2 1.7 2 - 1 - - 1 2 2 2 2 1 1

` 136
`

PCY305 BIG DATA SECURITY L T P C


3 0 0 3
Course Objectives
 To learn tips and tricks for Big Data use cases and solutions.
 To learn about reliable, scalable, distributed systems with Apache Hadoop.
 To explore the concepts of Hadoop Architecture.
 To apply Hadoop ecosystem components.
 To understand the concepts of Hive, HBase and HIVEQL.

UNIT I INTRODUCTION TO BIG DATA 9


Introduction – distributed file system – Big Data and its importance, Four Vs, Drivers
for Big data, big data analytics, big data applications. Algorithms using map reduce,
Matrix-Vector Multiplication by Map Reduce.

UNIT II INTRODUCTION HADOOP 9


Big Data – Apache Hadoop & Hadoop Eco System – Moving Data in and out of
Hadoop – Understanding inputs and outputs of MapReduce - Data Serialization.

UNIT III HADOOP ARCHITECTURE 9


Hadoop Architecture, Hadoop Storage: HDFS, Common Hadoop Shell commands,
Anatomy of File Write and Read., Name Node, Secondary Name Node,and Data
Node, Hadoop MapReduce paradigm, Map and Reduce tasks, Job,Task trackers -
Cluster Setup – SSH & Hadoop Configuration – HDFS Administering – Monitoring&
Maintenance.

UNIT IV HADOOP ECOSYSTEM AND YARN 9


Hadoop ecosystem components - Schedulers - Fair and Capacity, Hadoop 2
.0 New Features Name Node High Availability, HDFS Federation, MRv2, YARN,
Running MRv1in YARN.

UNIT V SECURITY AND STORING SYSTEM 9


Hive Architecture and Installation, Comparison with Traditional Database,HiveQL –
Querying Data Sorting And Aggregating, Map Reduce Scripts,Joins & Subqueries,
HBase concepts Advanced Usage, Schema Design, Advance Indexing - PIG,
Zookeeper - how it helps in monitoring a cluster, HBase uses Zoo keeper and how to
Build Applications with Zookeeper.

TOTAL : 45 PERIODS

137
`

Course Outcomes
After completion of the course, the students will be able to
CO1 - Explain the fundamental concepts of Big Data and Big Data Analytics with its
CO2 - Identify about the Hadoop Framework and the Map Reduce procedure
CO3 - Illustrate the operational aspects of Hadoop Distributed File System
and examine the process of MapReduce paradigm
CO4 - Demonstrate the different versions of Map Reduce model to process the big
data along with Hadooptools
CO5 - Apply tools like HIVE, HIVEQL and HBase on real time
applications and buildapplications usingZookeeper.
Text Books
1. Vangelis K. Iliadis, Rania Kora, and Konstantinos G. Vamvoudakis (2019). Big Data
Security and Privacy, 1st Edition, Springer.
2. Boris lublinsky, Kevin t. Smith, Alexey Yakubovich, “Professional Hadoop Solutions”,Wiley,
ISBN:9788126551071, 2015.
3. Chris Eaton, Dirk deroos et al., “Understanding Big data”, McGraw Hill, 2012.
4. Vignesh Prajapati,“Big Data Analytics with R and Haoop”, Packet Publishing 2013.
Reference Books
1. Kennesaw State University, Big Data Security and Privacy Group (2018). Privacy and Security
in Big Data, 1st Edition, Springer.
2. TomWhite, “HADOOP: The definitive Guide”, O Reilly 2012.
3. Tom Plunkett, Brian Macdonald et al, “Oracle Big Data Handbook”, Oracle Press, 2014.
4. Jy Liebowitz, “Big Data and Business analytics”, CRC press, 2013.
Web References
1. http://www.bigdatauniversity.com/
CO – PO and PSO MAPPING:

Course Programme Outcomes (PO) PSO


Outcomes 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4

CO 1 - 2 1 - - 1 - - - 3 - - - - - -

CO 2 2 - - - 2 - - 3 - - - 2 - 2 - -

CO 3 - 2 - - - - - - 2 - - - - - 1 -

CO 4 - - 2 - 1 - 2 - - - 2 - 3 - - -

CO 5 - - - 2 - - - - - - - - - - - 2

AVG 2 2 2 2 1.5 1 2 3 2 3 2 2 3 2 1 2

138
`

PCY306 DATAPRIVACY L T P C
3 0 0 3
OBJECTIVES :

 To understand basics of Data Privacy.


 To understand the sets of standards and safe guards.To understand the
Privacy Regulations.
 To understand the Data classifications.
 To understand necessary Approaches and Techniques to build
protection mechanisms in order to secure data.

UNIT 1 PRIVACY, DATA, AND YOUR BUSINESS 9


Introduction to Privacy Engineering and Its Importance -Understanding the Need for Privacy
Engineering in Modern Business -Scaling Privacy Engineering-Managing and Protecting Data
Flows-Adopting a Privacy - Navigating Privacy Regulations and Ensuring Compliance- Leveraging
Privacy Technologies and Tools for Data Protection.

UNIT 2 UNDERSTANDING DATA AND PRIVACY 9


Privacy and What It Entails: An Overview- Privacy, Data Systems, and Policy Enforcement-
Integrating Privacy into Business Growth Strategies- Case Studies: Privacy Violations – Equifax,
OPM - Privacy and the Regulatory Landscape: Key Considerations - The Impact of Regulations on
Products and Users.

UNIT 3 DATA CLASSIFICATION 9


Data Classification and Context- Necessity of Data Classification- Data Classification in
Governance- Industry Benchmarks for Classification- Unstructured Data Governance- Improving
with Data Classification- Data Classification and Access- Privacy Laws and Classification-
Collaborating on Data Classification.

UNIT 4 DATA INVENTORY 9


Data inventory - Data inventory tags, Machine-readable tags: A specific example - Creating a
baseline - The technical architecture ,Structured and unstructured data - Data inventory
architectural capabilities ,Data inventory workflow - metadata definition process - The metadata
discovery process- Data inventory level 1,level 2,level 3.

UNIT 5 DATA SHARING 9


The Need for Data Sharing in Business- Ensuring Safe Data Sharing Through Security
Measures- Obfuscation Techniques to Protect Privacy- Techniques for Safe Data Sharing- Data
Anonymization and Universal ID Mapping- Use Case 1: Single Session per Dataset- Measuring
Privacy Impact with K-Anonymity and L-Diversity- Privacy and Data Protection Impact
Assessments (PIA & DPIA)

TOTAL: 45 PERIODS
`

COURSE OUTCOMES:
At the end of the course, learners will be able to:
 Will develop advanced theoretical or practical research skills in the area of privacy.
 Students will make original research contributions.
 Become familiar with the basics of privacy.
 Understand how privacy is formalized.
 Understand the common data privacy techniques.

TEXT BOOKS
1. Gerardus Blokdyk, “Data Privacy and Security: A Complete Guide”,
First Edition, 5STARCooks, 2024.
2. Katharine Jarmul, “Practical Data Privacy”, First Edition, O'Reilly Media,2023.

REFERENCES
1. Shikha Ahuja, “Data Privacy and Protection”, First Edition, Wiley India, 2024.
2. Nishant Bhajaria, “Data Privacy: A Runbook for Engineers”, 1st
Edition, Manning Publications, 2022.

CO – PO and PSO MAPPING:

Course Programme Outcomes (PO) PSO


Outcome 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4
s
CO 1 2 2 - - - - - - - 2 - - - 2 -

CO 2 - 2 2 1 2 - - - - - - 2 2 - - 1

CO 3 - 3 2 2 - - - - - - - 2 - 3 - 1
CO 4 2 - - 1 - - 1 - - 1 3 - - - 1 -
CO 5 3 - 2 2 2 - - - - 2 - - 2 - 1 -
AVG 2.3 2.5 2 1.5 2 - 1 - - 1.5 2.5 2 2 3 1.3 1
`

OCY101 CYBER FORENSIC AND INVESTIGATION L T P C


3 0 0 3
OBJECTIVES:

 Principles of digital evidence handling and forensic investigation techniques.


 Proficiency in using forensic tools for imaging, data recovery, and analysis.
 Understanding legal and ethical considerations in cyber investigations.
 Incident response planning and execution for cyber incidents.
 Documentation and reporting of forensic findings for stakeholders
and legal purposes.

UNIT – I : INTRODUCTION TO CYBER FORENSICS 9


Computer Forensics Fundamentals – Types of Computer Forensics Technology
– Types of Computer Forensics Systems – Vendor and Computer Forensics
Services.
UNIT – II : COMPUTER FORENSICS EVIDENCE AND CAPTURE 9

Data Recovery – Evidence Collection and Data Seizure-Duplication and


Preservation of Digital Evidence-Computer Image Verification and Authentication.

UNIT – III : COMPUTER FORENSIC ANALYSIS 9


Discover of Electronic Evidence- Identification of Data – Reconstructing Past
Events – Fighting against Macro Threats – Information Warfare Arsenal – Tactics
Of the Military Tactics of Terrorist and Rogues – Tactics of Private Companies.

UNIT – IV : INVESTIGATION 9
Arsenal – Surveillance Tools – Hackers and Theft of Components – Contemporary
Computer Crime- Identity Theft and Identity Fraud – Organized Crime &Terrorism
– Avenues Prosecution and Government Efforts – Applying the First Amendment
to Computer Related Crime-The Fourth Amendment and other Legal Issues.

UNIT – V : COMPUTER FORENSIC INVESTIGATION CASES 9


Developing Forensic Capabilities – Searching and Seizing Computer Related
Evidence –Processing Evidence and Report Preparation – Future Issues.

TOTAL : 45 PERIODS

143
`

COURSE OUTCOMES:
 To demonstrate proficiency in using forensic tools and techniques for digital
evidence analysis.
 To critically evaluate and interpret digital artifacts to reconstruct cyber incident timelines.
 To apply legal and ethical principles to ensure compliance in cyber forensic investigations.
 To formulate and implement incident response strategies to mitigate cyber threats
effectively. To prepare clear and comprehensive forensic reports and presentations
for stakeholders.
TEXT BOOKS
1. Albert J. Marcella (2022). Cyber Forensics: Examining Emerging and Hybrid Technologies, 1st
Edition, CRC Press.
2. Marjie T Britz, “Computer Forensics and Cyber Crime: An Introduction”, PearsonEducation, 2nd
Edition, 2008. (CHAPTERS 3 – 13). (UNIT IV – V)
3. John R. Vacca, “Computer Forensics: Computer Crime Scene Investigation”, Cengage Learning,
2nd Edition, 2005. (CHAPTERS 1 – 18). (UNIT I – IV)

REFERENCE BOOKS
1. Eoghan Casey (2019). Digital Evidence and Computer Crime: Forensic Science, Computers, and
the Internet, 4th Edition, Academic Press.
2. MariE-Helen Maras, “Computer Forensics: Cybercriminals, Laws, and Evidence”, Jones & Bartlett
Learning; 2nd Edition, 2014.
3. Majid Yar, “Cybercrime and Society”, SAGE Publications Ltd, Hardcover,2nd Edition, 2013.
4. Chad Steel, “Windows Forensics”, Wiley, 1st Edition, 2006.
5. Robert M Slade, “Software Forensics: Collecting Evidence from the Scene of a Digital Crime”,
Tata McGraw Hill, Paperback, 1st Edition, 2004.

CO – PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course
Outcomes
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4

CO 1 3 2 3
CO 2 3 3 2
CO 3 3 2 3 3
CO 4 2 2 2
CO 5 3 2 2 2
Avg 2. 2.5 2 2.5 2.5 3 2 2.
7 5

144
`

OCY102 SOCIAL MEDIA SECURITY L T P C


3 0 0 3
OBJECTIVES :
 To Understand Social Media Platforms: Learn how popular social media platforms
work.
 To Identify Security Risks: Recognize threats and vulnerabilities on social media.
 To Privacy and Data Protection: Protect personal information on social media.
 To Legal and Ethical Issues: Understand legal and ethical issues in social media.
 To Security Best Practices: Apply methods to secure social media accounts.

Unit 1: INTRODUCTION TO SOCIAL MEDIA SECURITY 9


Social Media Platforms-Communication Impact-Cybersecurity Basics-Security
Threats- UserAwareness-Breach Case Studies-Data Collection-Security Features-
Future Trends.

Unit 2: PRIVACY AND ACCOUNT SECURITY 9


Privacy Settings-Strong Passwords-Two-Factor Authentication (2FA)-Geotagging
Risks Personal Information- Third-Party Apps-Account Takeover-Encryption Role-
Safe Posting.

Unit 3: THREATS AND ATTACKS 9


Social Engineering-Cybercriminal Tactics-Suspicious Activity-Malware Links-
Hacking Cases-Suspicious Content-Security Tests-Insider Threats-Threat
Intelligence.

Unit 4: LEGAL AND ETHICAL ISSUES 9


International Laws-Intellectual Property-Privacy Policies-Ethical Data Use-User
Responsibilities-Legal Disputes- Freedom of Speech-Compliance Requirements-
RegulationFuture.

Unit 5: ONLINE REPUTATION AND POLICIES 9


Reputation Strategies-Brand Impact-Crisis Management-Corporate
Communication- Social Media Policies- Governance Role-Monitoring Tools-
Employee Training- Cybersecurity Integration.
TOTAL:45 PERIODS
COURSE OUTCOMES:
 To Understand Social Media Platforms.
 To Identify Security Threats.
 To Protect Privacy and Apply best practices to protect personal information on social media.
 To Address Legal and Ethical Issues.
 To Apply Security Measures and Use tools and techniques to secure social media.

145
`

TEXT BOOK:

1. Kennesaw State University, Big Data Security and Privacy Group (2019). Social Media Security:
Threats, Countermeasures, and Best Practices, 1st Edition, Springer.
2. "The Social Media Handbook: Rules, Policies, and Best Practices to
Successfully Manage Your Organization's Social Media Presence, Posts, and
Potential Legal Issues" by Nancy Flynn.2013
3. "Social Media Security: Leveraging Social Networking While Mitigating Risk" by Michael Cross.2010.

REFERENCE:

4. Natasha L. Miller (2022). Social Media Risk and Governance: Preventing Fraud, Cybercrime, and Other
Threats, 1st Edition, Wiley.
5. The Ethical Hack: A Framework for Business Value Penetration Testing" by James S. Tiller.2020
6. "Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails" byChristopher
Hadnagy and Michele Fincher.2015

CO – PO and PSO MAPPING:

Programme Outcomes (PO) PSO


Course
Outcomes 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4

CO 1 1 2 3 3 2
CO 2 1 2 3 1
CO 3 1 2 3 3 1
CO 4 1 2 3 2
CO 5 1 1 2 2 3 1 2
avg 1 1.2 1 2.2 2.5 3 1 1.6

146
`

MANDATORY COURSE - II

MCY201 AWARENESS OF CYBER SECURITY AND CYBER LAW LT PC


3003

Course Objectives
 To understand the basics of cyber security and cyber law,
 To understand the problems and issues associated with it,
 To understand the various act or regulations,
 To understand the various approaches for incident analysis and response.
 To understand the ethical laws of computer for different countries.

UNIT I INTRODUCTION TO CYBER SECURITY AND CYBER CRIME 9


Introduction–Cyber Crime: Definition and origins– Cybercrime and information
Security– Cyber criminals– Classification of Cybercrimes.

UNIT II LEGAL PERSPECTIVES 9


Introduction to the Legal Perspectives of Cybercrimes and Cyber security,
Cybercrime and the Legal Landscape around the World, Why Do We Need Cyber
laws, The Indian IT Act, Challenges to Indian Law and Cybercrime Scenario in India.

UNIT III CYBER ACT 9


Consequences of Not Addressing the Weakness in Information Technology Act,
Digital Signatures and the Indian IT Act, Cybercrime and Punishment, Cyber law,
Technology and Students: Indian Scenario.

UNIT IV CYBER LIABILITY 9


Private ordering solutions, Regulation and Jurisdiction for global Cyber security, Copy
Right–source of risks, Pirates, Internet Infringement, Fair Use, postings, criminal
liability, First Amendments, Data Losing.

UNIT V CYBER CHANGES 9


Ethics, Legal Developments, Cyber security in Society, Security in cyber lawscase
studies, General law and Cyber Law–a Swift Analysis.

TOTAL: 45 PERIODS
Course Outcomes
After completion of the course, the students will be able to

CO1 - Understand key terms and concepts in cyber security and cyber law, intellectual
property and cyber– crimes,trademarks and domain theft.
CO2 -. Determine computer technologies, digital evidence collection.
CO3 - Determine evidentiary reporting in forensic acquisition.
CO4 - Secure both clean and corrupted systems, protecting personal data,securing
simple computer networks, and safe Internet usage.
CO5 – Incorporate approaches for incident analysis and response.

147
`

Text Books
1. Kennesaw State University, Big Data Security and Privacy Group (2020). Cyber
Security and Cyber Law: A Comprehensive Guide to Legal Aspects of Cyber
Security, 1st Edition, Wiley.
2. Sunit Belapure and Nina Godbole, Cyber Security: UnderstandingCyber
Crimes, Computer Forensics and Legal Perspectives, WileyIndia Pvt. Ltd, 2011.
3. Jonathan Rosenoer, “Cyber Law: The law of the Internet”, Springer–Verla..1997

Reference Books
1. Michael J. Kearns, Aaron K. B. P. (2022). Cyber Security Law: A Practical
Guide to Emerging Legal Issues, 1st Edition, Oxford University Press
2. Dr. Farooq Ahmad, Cyber Law in India, Allahbad Law Agency– Faridabad.2012
3. Mark F Grady, Fransesco Parisi, “The Law andEconomics of Cyber Security”,
Cambridge University Press, 2006.

COs/POs/PSOs Mapping

Program Specific
Program Outcomes (POs)
Outcomes(PSOs)
COs

PO1 PO2 PO 3 PO4 PO 5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO PSO PSO PSO
1 2 3 4
1 2 2 1
2 2 2 2 2 2
3 2 1
4 3 2 2 2 2 1
5 2 2 2

avg 2 2.5 2 2 2 2 2 1 2 2 1.5

148

You might also like