Cyber Security 2 Year
Cyber Security 2 Year
NAGAR
(AN AUTONOMOUS INSTITUTE)
Affiliated to
For
Bachelor of Technology
Bachelor of Technology
Computer Science and Engineering (Cyber Security)
Evaluation Scheme
SEMESTER - III
End
Sl. Periods Evaluation Schemes
Subject Semester Tota
No Subject Name Credit
Codes C T TOTA P l
. L T P PS TE
T A L E
WEEKS COMPULSORY INDUCTION PROGRAM
1 AAS0303 Statistics and Probability 3 1 0 30 20 50 100 150 4
2 ACSE0306 Discrete Structures 3 0 0 30 20 50 100 150 3
Logic Design and
3 ACSAI0302 3 0 0 30 20 50 100 150 3
Computer Architecture
Object Oriented
4 ACSE0302 3 0 0 30 20 50 100 150 3
Techniques using Java
Data Structures and
5 ACSIOT0301 3 1 0 30 20 50 100 150 4
Algorithms Design
6 ACSCY0301 Operating Systems 3 0 0 30 20 50 100 150 3
Object Oriented
7 ACSE0352 Techniques using Java 0 0 2 25 25 50 1
Lab
Data Structures and
8 ACSIOT0351 0 0 2 25 25 50 1
Algorithms Design Lab
9 ACSCY0351 Operating Systems Lab 0 0 2 25 25 50 1
10 ACSE0359 Internship Assessment -I 0 0 2 50 50 1
ANC0301 / Cyber Security /
11 2 0 0 50 50 100 0
ANC0302 Environmental Science
MOOCs (For B.Tech.
12
Hons. Degree)
TOTAL
List of MOOCs Based Recommended Courses for Second year B. Tech Students
S. No. Subject Course Name University/ No. of Hours Credits
Code Industry Partner
Name
1. Hands-on Introduction to Linux Commands
AMC0213 IBM 14 1
and Shell Scripting
2. Exploiting and Securing Vulnerablities in Java
AMC0214 UC Davis 23 1.5
Applications
PLEASE NOTE:-
Internship (3-4 weeks) shall be conducted during summer break after semester-II and will be assessed during
semester-III
Compulsory Audit Courses (Non Credit - ANC0301/ANC0302)
All Compulsory Audit Courses (a qualifying exam) has no credit.
Total and obtained marks are not added in the Grand Total.
Abbreviation Used: -
L: Lecture, T: Tutorial, P: Practical, CT: Class Test, TA: Teacher Assessment, PS: Practical Sessional, TE: Theory End
Semester Exam., PE: Practical End Semester Exam.
NOIDA INSTITUTE OF ENGG. & TECHNOLOGY, GREATER NOIDA, GAUTAM BUDDH NAGAR
(AN AUTONOMOUS INSTITUTE)
Bachelor of Technology
Computer Science and Engineering (Cyber Security)
Evaluation Scheme
SEMESTER - IV
End
Sl. Periods Evaluation Schemes
Subject Semester Credi
No Subject Name Total
Codes C T TOTA t
. L T P PS TE PE
T A L
1 AAS0404 Optimization Techniques 3 1 0 30 20 50 100 150 4
2 AASL0401 Technical Communication 2 1 0 30 20 50 100 150 3
ACSCY040 Computer Networks and
3 3 0 0 30 20 50 100 150 3
1 Network Programming
ACSAI040 Database Management
4 3 1 0 30 20 50 100 150 4
2 Systems
ACSAI040 Introduction to Artificial
5 3 0 0 30 20 50 100 150 3
1 Intelligence
Theory of Automata &
6 ACSE0404 3 0 0 30 20 50 100 150 3
Formal Languages
ACSCY045 Computer Networks and
7 0 0 2 25 25 50 1
1 Network Programming Lab
ACSAI045 Database Management
8 0 0 2 25 25 50 1
2 Systems Lab
ACSAI045
9 Artificial Intelligence Lab 0 0 2 25 25 50 1
1
Mini Project using Open
10 ACSE0459 0 0 2 50 50 1
Technology
ANC0402 / Environmental Science/
11 2 0 0 50 50 100 0
ANC0401 Cyber Security
MOOCs (For B.Tech.
12
Hons. Degree)
TOTAL
Mini Project or Internship (3-4 weeks) shall be conducted during summer break after III semester and will be
assessed during IVsemester
PLEASE NOTE:-
List of MOOCs (Coursera) Based Recommended Courses for Second Year (Semester-IV) B. Tech Students
S. No. Subject Code Course Name University/ Industry N. of Hours Credits
Partner Name
1. AMC0215 Ethical Hacking Essentials (EHE) EC-Council 32 2.5
2. Identifying Security Vulnerabilities in
AMC0216 UC Davis 22 1.5
C/C++ Programming
Compulsory Audit Courses (Non Credit - ANC0401/ANC0402)
All Compulsory Audit Courses (a qualifying exam) has no credit.
Total and obtained marks are not added in the Grand Total.
Abbreviation Used: -
L: Lecture, T: Tutorial, P: Practical, CT: Class Test, TA: Teacher Assessment, PS: Practical Sessional, TE: Theory End
Semester Exam., PE: Practical End Semester Exam.
NOIDA INSTITUTE OF ENGG. & TECHNOLOGY, GREATER NOIDA, GAUTAM BUDDH NAGAR
(AN AUTONOMOUS INSTITUTE)
Bachelor of Technology
Computer Science and Engineering (Cyber Security)
A student will be eligible to get Under Graduate degree with Honours only, if he/she completes the additional
MOOCs courses such as Coursera certifications, or any other online courses recommended by the Institute
(Equivalent to 20 credits). During Complete B.Tech. Program Guidelines for credit calculations are as follows.
Course objective: The objective of this course is to familiarize the engineers with concept of Statistical
techniques, probability distribution, hypothesis testing and ANOVA and numerical aptitude. It aims to show
case the students with standard concepts and tools from B. Tech to deal with advanced level of mathematics
and applications that would be essential for their disciplines.
Covariance,Correlation and Regression analysis, Correlation coefficient: Karl Pearson coefficient, rank
correlation coefficient, uni-variate and multivariate linear regression, application of regression analysis,
Logistic Regression, time series analysis- Trend analysis (Least square method).
Random variables: discrete and continuous, probability mass function, density function, distribution
function, Mathematical expectation, mean, variance. Moment generating function, characteristic function,
Two dimensional random variables: probability mass function, density function,
Statistical Inference, Parameter estimation, Least square estimation method, Maximum Likelihood
estimation.
Course outcome: After completion of this course students will be able to:
CO 1 Understand the concept of moments, skewness, kurtosis, correlation, curve fitting K1, K3
and regression analysis.
CO 5 Solve the problems of Time & Work, Pipe & Cistern, Time, Speed & Distance, Boat K3
&Stream, Sitting Arrangement, Clock & Calendar.
Text books
(1) P. G. Hoel, S. C. Port and C. J. Stone, Introduction to Probability Theory, Universal Book Stall,
2003(Reprint)
(2) S. Ross: A First Course in Probability, 6th Ed., Pearson Education India, 2002
(3) W. Feller, An Introduction to Probability Theory and its Applications, Vol. 1, 3rd Ed., Wiley, 1968.
Reference Books
(1) B.S. Grewal, Higher Engineering Mathematics, Khanna Publishers, 35th Edition, 2000.
(2) T.Veerarajan : Engineering Mathematics (for semester III), Tata McGraw-Hill, New Delhi
(3) R.K. Jain and S.R.K. Iyenger: Advance Engineering Mathematics; Narosa Publishing House, New
Delhi.
(4) J.N. Kapur: Mathematical Statistics; S. Chand & Sons Company Limited, New Delhi.
(5) D.N.Elhance,V. Elhance& B.M. Aggarwal: Fundamentals of Statistics; KitabMahal Distributers, New
Delhi.
Link:
Unit 1 https://youtu.be/wWenULjri40
https://youtu.be/mL9-WX7wLAo
https://youtu.be/nPsfqz9EljY
https://youtu.be/nqPS29IvnHk
https://youtu.be/aaQXMbpbNKw
https://youtu.be/wDXMYRPup0Y
https://youtu.be/m9a6rg0tNSM
https://youtu.be/Qy1YAKZDA7k
https://youtu.be/Qy1YAKZDA7k
https://youtu.be/s94k4H6AE54
https://youtu.be/lBB4stn3exM
https://youtu.be/0WejW9MiTGg
https://youtu.be/QAEZOhE13Wg
https://youtu.be/ddYNq1TxtM0
https://youtu.be/YciBHHeswBM
https://youtu.be/VCJdg7YBbAQ
https://youtu.be/VCJdg7YBbAQ
https://youtu.be/yhzJxftDgms
Unit 2 https://youtu.be/bhp4nVkqA9o
https://youtu.be/8sJ9dFj_ydg
https://youtu.be/u_x8zQvWWLk
https://youtu.be/3rYYPWN_QS0
https://youtu.be/HZGCoVF3YvM
https://youtu.be/z4e4E9igjIE
https://youtu.be/dOr0NKyD31Q
https://youtu.be/YXLVjCKVP7U
https://youtu.be/l0ecMiNUZu8
https://youtu.be/L0zWnBrjhng
https://youtu.be/cbmfYoepHPk
https://youtu.be/_DWnI-gk0ys
https://youtu.be/d_9KT2abCAY
https://youtu.be/sSUCwLvmCLg
https://youtu.be/H2Ji-Q4MfqU
https://youtu.be/TwN79BuwiMM
https://youtu.be/yXsvMlqoiK4
Unit 3 https://youtu.be/gT26Y_VJmOM
https://youtu.be/onFv73Btdno
https://youtu.be/mYFygtQrDxc
https://youtu.be/S8YrED3mf5s
https://youtu.be/z5gongqrMv8
https://youtu.be/4vsGyghhxVg
https://youtu.be/CW-3qjcw-GA
https://youtu.be/RqiqhrZE6Uk
Unit 4 https://youtu.be/L3wQw0wva3g
https://youtu.be/n9qpktdFfLU
https://youtu.be/_Qlxt0HmuOo
https://youtu.be/YSwmpAmLV2s
https://youtu.be/KLnGOL_AUgA
https://youtu.be/cQp_bJdxjWw
https://youtu.be/geB0A7CPGaQ
https://youtu.be/zmyh7nCjmsg
https://youtu.be/ohquDY3fZqk
https://youtu.be/izGZLnB-mEo
https://youtu.be/q48uKU_KWas
https://youtu.be/lZFmFuZGQTk
https://youtu.be/iin6vthyzsQ
https://youtu.be/ysjkkBspbYY
https://youtu.be/pXjaMY29k1g
https://youtu.be/pvvoK4rlzqQ
Unit 5 https://www.youtube.com/playlist?list=PLFqNfk5W2ZuzjUsRqDp1Zj3S8n9yfdmN9
https://youtu.be/x3SEYdBUGaA
https://youtu.be/B7sMHZj_p18
https://youtu.be/4HRLswVPOG8
https://youtu.be/aHEWcn_bPYc
https://youtu.be/ePQiVq8WtL8
B. TECH. SECOND YEAR
Course Code ACSE0306 L T P Credits
Course Title Discrete Structures 3 0 0 3
Course objective:
The subject enhances one’s ability to develop logical thinking and ability to problem solving. The objective
of discrete structure is to enables students to formulate problems precisely, solve the problems, apply formal
proofs techniques and explain their reasoning clearly.
Pre-requisites:
1. Basic Understanding of mathematics
2. Basic knowledge algebra.
3. Basic knowledge of mathematical notations
Course Contents / Syllabus
Unit 1 Set Theory, Relation, Function 8 Hours
Set Theory: Introduction to Sets and Elements, Types of sets, Venn Diagrams, Set Operations, Multisets,
Ordered pairs. Proofs of some general Identities on sets.
Relations: Definition, Operations on relations, Pictorial Representatives of Relations, Properties of relations,
Composite Relations, Recursive definition of relation, Order of relations.
Functions: Definition, Classification of functions, Operations on functions, Growth of Functions.
Combinatorics: Introduction, basic counting Techniques, Pigeonhole Principle.
Recurrence Relation & Generating function: Recursive definition of functions, Recursive Algorithms,
Method of solving Recurrences.
Proof techniques: Mathematical Induction, Proof by Contradiction, Proof by Cases, Direct Proof.
Course outcome: After completion of this course students will be able to:
CO1 Apply the basic principles of sets, relations & functions and mathematical K3
induction in computer science & engineering related problems.
CO2 Understand the algebraic structures and its properties to solve complex K2
problems.
CO3 Describe lattices and its types and apply Boolean algebra to simplify digital K2, K3
circuit.
CO4 Infer the validity of statements and construct proofs using predicate logic K3, K5
formulas.
CO5 Design and use the non-linear data structure like tree and graphs to solve real K3, K6
world problems.
Text books:
1) B. Kolman, R.C. Busby, and S.C. Ross, Discrete Mathematical Structures, 5/e, Prentice Hall, Edition 6th,
2018.
2) Liptschutz, Seymour, “Discrete Mathematics”, McGraw Hill, Edition 3rd, 2017.
3) Trembley, J.P & R. Manohar, “Discrete Mathematical Structure with Application to Computer Science”,
McGraw Hill, Edition 1st, 2017.
4) Liu and Mohapatra, “Elements of Discrete Mathematics”, McGraw Hill.
Reference Books:
1) Deo & Narsingh, “Graph Theory With application to Engineering and Computer Science.”, PHI.
2) Krishnamurthy, V., “Combinatorics Theory & Application”, East-West Press Pvt. Ltd., New Delhi.
3) Koshy, Discrete Structures, Elsevier Pub. 2008 Kenneth H. Rosen, Discrete Mathematics and Its
Applications, 6/e, Mc Graw-Hill, Edition 7th, 2017.
Links:
Unit 1 https://www.youtube.com/watch?
v=hGtOLG3SsjI&list=PLwdnzlV3ogoVxVxCTlI45pDVM1aoYoMHf&index=9
https://www.youtube.com/watch?
v=rGcTcGFx9_s&list=PLwdnzlV3ogoVxVxCTlI45pDVM1aoYoMHf&index=10
https://www.youtube.com/watch?v=oU60TuGHxe0&list=PL0862D1A947252D20&index=11
Unit 2 https://www.youtube.com/watch?
v=M8nh83bFJAA&list=PLwdnzlV3ogoVxVxCTlI45pDVM1aoYoMHf&index=38
https://www.youtube.com/watch?v=CjmWE-
f3vEc&list=PLwdnzlV3ogoVxVxCTlI45pDVM1aoYoMHf&index=41
Unit 3 https://www.youtube.com/watch?
v=c6ARWh6lVgc&list=PLwdnzlV3ogoVxVxCTlI45pDVM1aoYoMHf&index=24
https://www.youtube.com/watch?
v=QKP6sOnu1vg&list=PLwdnzlV3ogoVxVxCTlI45pDVM1aoYoMHf&index=22
Unit 4 https://www.youtube.com/watch?
v=hklHg9oMkGA&list=PLwdnzlV3ogoVxVxCTlI45pDVM1aoYoMHf&index=3
https://www.youtube.com/watch?
v=ASDaXWCExzo&list=PLwdnzlV3ogoVxVxCTlI45pDVM1aoYoMHf&index=4
Unit 5 https://www.youtube.com/watch?v=AtDgXyluW-
Y&list=PLwdnzlV3ogoVxVxCTlI45pDVM1aoYoMHf&index=12
https://www.youtube.com/watch?
v=cwbZUjfz_I0&list=PLwdnzlV3ogoVxVxCTlI45pDVM1aoYoMHf&index=13
B. TECH. SECOND YEAR
Course Code ACSAI0302 L T P Credit
Course objective:To understand the types of organizations, structures, and functions of computers, design of
arithmetic and logic units, and float point arithmetic. To understand the concepts of the memory system,
communication with I/O devices, and interfaces.
Pre-requisites:
Basic knowledge of computer systems.
Logic gates and their operations.
Computer Organization and Architecture, Functional units of a digital system and their interconnections,
buses, bus architecture, types of buses,and bus arbitration and its types. Register, bus, and memory transfer.
Process or organization, general registers organization, stack organization,and addressing modes.
Course outcome: After completion of this course students will be able to:
CO 2 Analyze the design of arithmetic & logic unit and understand the fixed point K4
and floating-point arithmetic operations.
Text books:
1) M. Mano, “Computer System Architecture”, 3rd Edition, Pearson Publication, 2007.
2) John P. Hayes, Computer Architecture and Organization, Tata McGraw Hill, Third Edition, 1998.
3) William Stallings, Computer Organization and Architecture-Designing for Performance, Pearson
Education, Seventhedition,2006.
Reference Books:
1) Carl Hamacher, ZvonkoVranesic, SafwatZaky Computer Organization, McGraw-Hill, Fifth Edition,
Reprint2012
2) Ray A K, Bhurchandi K M, “Advanced Microprocessors and Peripherals”, TM.
Links:
Unit 1 https://www.youtube.com/watch?
v=L9X7XXfHYdU&list=PLxCzCOWd7aiHMonh3G6QNKq53C6oNXGrX
Unit 2 https://www.youtube.com/watch?v=WLgXUPOjKEc
Unit 3 https://www.youtube.com/watch?v=BPhWlFIU1rc
Unit 4 https://www.youtube.com/watch?
v=6R7JDkpG1Wk&list=PLrjkTql3jnm8HbdMwBYIMAd3UdstWChFH
Unit 5 https://www.youtube.com/watch?v=nxryfWg5Hm4
B.TECH. SECOND YEAR
Course Code ACSE0302 L T P Credit
Course Title Object Oriented Techniques using Java 3 0 0 3
Course objective:
The objective of this course is to understand the object-oriented methodology and its techniques to
design and develop conceptual models and demonstrate the standard concepts of object-oriented
techniques modularity, I/O. and other standard language constructs. The basic objective of this course is
to understand the fundamental concepts of object-oriented programming in Java language and also
implement the Multithreading concepts, GUI based application and collection framework.
Pre-requisites:
Student must know at least the basics of how to use a computer, and should be able to start a
command line shell.
Knowledge of basic programming concepts, as covered in ‘Programming Basic” course is
necessary.
Course Contents / Syllabus
UNIT-I Introduction 8 Hours
Object Oriented Programming: Introduction and Features: Abstraction, Encapsulation, Polymorphism,
and Inheritance.
Modeling Concepts: Introduction,Class Diagram and Object Diagram.
Control Statements: Decision Making, Looping and Branching, Argument Passing Mechanism:
Command Line Argument.
Course outcome: After completion of this course students will be able to:
CO1 Identify the concepts of object-oriented programming and relationships
K2
among them needed in modeling.
CO2 Demonstrate the Java programs using OOP principles and also implement the
K3
concepts of lambda expressions.
CO3 Implement packages with different protection level resolving namespace
collision and evaluate the error handling concepts for uninterrupted execution K5
of Java program.
CO4 Implement Concurrency control, I/O Streams and Annotations concepts by
K3
using Java program.
CO5 Design and develop the GUI based application, Generics and Collections in
K6
Java programming language to solve the real-world problem.
Text books:
1) Herbert Schildt,” Java - The Complete Reference”, McGraw Hill Education 12th edition
2) Herbert Schildt,” Java: A Beginner’s Guide”, McGraw-Hill Education 2nd edition
3) James Rumbaugh et. al, “Object Oriented Modeling and Design”, PHI 2nd Edition
Reference Books:
1) Cay S. Horstmann, “Core Java Volume I – Fundamentals”, Prentice Hall
2) Joshua Bloch,” Effective Java”, Addison Wesley
3) E Balagurusamy, “Programming with Java A Primer”, TMH, 4th edition.
Link:
Unit 1 https://www.youtube.com/watch?
v=r59xYe3Vyks&list=PLS1QulWo1RIbfTjQvTdj8Y6yyq4R7g-Al
Unit 2 https://www.youtube.com/watch?
v=ZHLdVRXIuC8&list=PLS1QulWo1RIbfTjQvTdj8Y6yyq4R7g-Al&index=18
Unit 3 https://www.youtube.com/watch?v=hBh_CC5y8-s
Unit 4 https://www.youtube.com/watch?v=qQVqfvs3p48
Unit 5 https://www.youtube.com/watch?v=2qWPpgALJyw
B. TECH. SECOND YEAR
Course Code ACSIOT0301 LTP Credits
Course Title Data Structures and Algorithms Design 3 1 0 4
Course objective:
In this course, the students will gain the knowledge of the structure and working of non-primitive data
structures, searching, sorting algorithms with their complexities and learn different algorithm design
techniques to solve real world problems.
Pre-requisites:
Course Contents / Syllabus
UNIT-I Introduction 8 Hours
Overview and importance of algorithms and data structures. Characteristics of data structures, Operations
on data structures, Fundamental of algorithm analysis, time and space complexity, types of asymptotic
notations and order of growth, Algorithm efficiency-best case, worst case and average case, Analysis of
non-recursive and recursive algorithms. Asymptotic analysis for recurrence relation.
Arrays: 1D and 2D arrays, Row and column major order. Linear Search, Bubble Sort, Selection Sort,
Insertion Sort.
UNIT-II Algorithm Design Approaches 8 Hours
Divide and conquer: Concepts, Binary Search, Merge Sort, Quick Sort, Dynamic programming: Concepts,
0-1 knapsack problem, Greedy Programming: Concepts, Huffman Coding, Fractional knapsack,
Backtracking: Concepts, N-queen Problem.
UNIT-III Linear Data Structures 8 Hours
Linked lists: types of linked lists – Singly, Doubly and Circular linked lists, Operations on linked lists.
Stacks: Implementation of stacks– Using array and linked list, operations on stacks, Applications of
Stacks, Notations – infix, prefix and postfix, Conversion and evaluation of arithmetic expressions using
Stacks.
Queues: Implementation of queues– Using array and linked list, Operations on queues, Double ended
queue and Priority queue.
CO 5 Analyse the use of Graph related algorithms and its applications in real world. K3
Text books:
1) Aaron M. Tenenbaum, YedidyahLangsam and Moshe J. Augenstein, “Data Structures Using C and
C++”, PHI Learning Private Limited, Delhi India
2) Horowitz and Sahani, “Fundamentals of Data Structures”, Galgotia Publications Pvt Ltd Delhi
India.
3) Lipschutz, “Data Structures” Schaum’s Outline Series, Tata McGraw-hill Education (India) Pvt.
Ltd.
4) Thomas H. Coreman, Charles E. Leiserson and Ronald L. Rivest, “Introduction to Algorithms”,
Printice Hall of India.
5) E. Horowitz & S Sahni, "Fundamentals of Computer Algorithms".
6) Aho, Hopcraft, Ullman, “The Design and Analysis of Computer Algorithms” Pearson Education,
2008.
7) LEE "Design & Analysis of Algorithms (POD)", McGraw Hill.
Reference Books:
1) Gajendra Sharma, Design & Analysis of Algorithms, Khanna Publishing House
2) Richard E.Neapolitan "Foundations of Algorithms" Jones & Bartlett Learning
3) Jon Kleinberg and ÉvaTardos, Algorithm Design, Pearson, 2005.
4) Michael T Goodrich and Roberto Tamassia, Algorithm Design: Foundations, Analysis, and Internet
Examples, Second Edition, Wiley, 2006.
5) Harry R. Lewis and Larry Denenberg, Data Structures and Their Algorithms, Harper Collins, 1997
6) Robert Sedgewick and Kevin Wayne, Algorithms, fourth edition, Addison Wesley, 2011.
7) Harsh Bhasin,”Algorithm Design and Analysis”,FirstEdition,Oxford University Press.
8) Gilles Brassard and Paul Bratley,Algorithmics:Theory and Practice,Prentice Hall,1995.
Links:
https://www.youtube.com/playlist?list=PLDN4rrl48XKpZkf03iYFl-O29szjTrs_O
https://www.youtube.com/watch?
Unit 1 v=aGjL7YXI31Q&list=PLEbnTDJUr_IeHYw_sfBOJ6gk5pie0yP-0
https://nptel.ac.in/courses/106/106/106106131/
https://nptel.ac.in/courses/106/101/106101060/
Unit 2 https://nptel.ac.in/courses/106/106/106106127/
https://nptel.ac.in/courses/106/106/106106127/
Unit 3 https://www.youtube.com/watch?v=g1USSZVWDsY&list=PLBF3763AF2E1C572F&index=2
https://www.youtube.com/playlist?list=PLDN4rrl48XKpZkf03iYFl-O29szjTrs_O
https://www.youtube.com/watch?
Unit 4 v=aGjL7YXI31Q&list=PLEbnTDJUr_IeHYw_sfBOJ6gk5pie0yP-0
https://nptel.ac.in/courses/106/106/106106131/
https://nptel.ac.in/courses/106/101/106101060/
https://nptel.ac.in/courses/106/106/106106127/
https://www.youtube.com/watch?v=tORLeHHtazM&list=PLBF3763AF2E1C572F&index=6
Unit 5 https://nptel.ac.in/courses/106/106/106106127/
Course outcome: After completion of this course students will be able to:
CO 1 Understand the fundamentals of an operating systems, functions and their structure and K1, K2
functions.
CO 2 Implement concept of process management policies, CPU Scheduling and thread K5
management.
CO 3 Understand and implement the requirement of process synchronization and apply K2, K5
deadlock handling algorithms.
CO 4 Evaluate the memory management and its allocation policies. K5
CO 5 Understand and analyze the I/O management and File systems K2, K4
Text books:
1) Operating System Concepts Essentials. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne.
Reference Books:
1) Operating Systems: Internals and Design Principles. William Stallings.
2) Operating System: A Design-oriented Approach. Charles Patrick Crowley.
3) Operating Systems: A Modern Perspective. Gary J. Nutt.
4) Design of the Unix Operating Systems. Maurice J. Bach.
5) Understanding the Linux Kernel, Daniel Pierre Bovet, Marco Cesati.
Link:
Unit 1 https://www.youtube.com/watch?v=783KAB-tuE4
https://www.youtube.com/watch?v=Bxx2_aQVeeg
https://www.youtube.com/watch?v=ZaGGKFCLNc0
https://nptel.ac.in/courses/106/105/106105214/
Unit 2 https://www.youtube.com/watch?v=NShBeqTkXnQ
https://www.youtube.com/watch?v=4hCih9eLc7M
https://www.youtube.com/watch?v=9YRxhlvt9Zo
Unit 3 https://www.youtube.com/watch?v=UczJ7misUEk
https://www.youtube.com/watch?v=_IxqinTs2Yo
Unit 4 https://www.youtube.com/watch?v=IwESijQs9sM
https://www.youtube.com/watch?v=-orfFhvNBzY
https://www.youtube.com/watch?v=2OobPx246zg&list=PL3-wYxbt4yCjpcfUDz-
TgD_ainZ2K3MUZ&index=10
Unit 5 https://www.youtube.com/watch?v=AnGOeYJCv6s
https://www.youtube.com/watch?v=U1Jpvni0Aak
B. TECH. SECOND YEAR
Course Code ACSE0352 L T P Credit
Course Title Object Oriented Techniques using Java Lab 0 0 2 1
List of Experiments:
Sr. Name of Experiments CO
No.
1. Write a simple program in Java. CO1
2. Write a Java program to display default values of all primitive data types CO1
6. Write a Java Program to check whether the given number is Palindrome or not CO1
Write a JAVA program to implement class mechanism. Create a class, methods and invoke
8. CO2
them inside main method.
10. Write a Java program to Access the instance variables by using this keyword CO2
11. Write a Java class to show the concept of static class CO2
12. Write a Java program to Access the Class members using super Keyword CO2
16. Write a JAVA program to implement constructor and constructor overloading. CO2
17. Write a JAVA program implement method overloading and method overriding. CO2
Write a JAVA program to implement a user defined functional interface using lambda
18. CO2
expressions.
19. Write a program prints a multidimensional array of integers. CO2
20. Write a JAVA program to show the multiplication of two matrices using arrays. CO2
21. Write a Java program to Search an element using Linear Search CO2
22. Write a Java program to Search an element using Binary Search CO2
23. Write a Java Program to Sort elements using Insertion Sort CO2
24. Write a Java Program to Sort elements using Selection Sort - Largest element method CO2
25. Write a Java program to Sort elements using Bubble Sort CO2
26. Write a Java program to handle an Arithmetic Exception - divided by zero CO3
Write a Java program to print the output by appending all the capital letters in the input in a
33. CO3
string.
34. Write a JAVA program to show the usage of string builder. CO3
35. Write a JAVA program to show the usage of string buffer. CO3
Write a JAVA program to implement even and odd thread by using Thread class and
36. CO4
Runnable interface.
Write a JAVA program to synchronize the threads by using Synchronize statements and
37. CO4
Synchronize block
38. To demonstrate the concept of type annotations in JAVA programming language. CO4
39. To demonstrate the concept of user defined annotations in JAVA programming language. CO5
40. Write a JAVA program to implement the concept of Generic and Collection classes. CO5
Lab Course Outcome: After completion of this course students will be able to
CO1 Understand how to design and implement basic data types, command line arguments and K3
control statements
Demonstrate the Java programs using OOP principles and also implement the concepts of
CO2 K3
lambda expressions and arrays.
CO4 Solve the real time problems using multithreading and annotations concept. K3
CO5 Design and develop collections and generic classes in JAVA programming language K6
B. TECH. SECOND YEAR
Course Code ACSIOT0351 L T P Credit
Course Title Data Structures and Algorithms Design Lab 0 0 2 1
List of Experiments:
Sr. No. Name of Experiment CO
1 Searching Algorithms: Linear and Binary. CO2
2 Program for Recursive Binary Search. CO2
3 Program for Bubble Sort. CO2
4 Program for Selection Sort. CO2
5 Program for Insertion Sort. CO2
6 Program for Merge Sort. CO2
7 Program for Quick Sort. CO2
8 Implement 0/1 Knapsack. CO5
9 Implementation of Linked List CO1
10 Implementation of Stack using Array. CO1
11 Implementation of Queue using Array. CO1
12 Implementation of Circular Queue using Array. CO1
13 Implementation of Stack using Linked List. CO1
14 Implementation of Queue using Linked List. CO1
15 Implementation of Circular Queue using Linked List. CO1
16 Implementation of Tree Structures, Tree Traversal, Binary Search Tree, Insertion and CO4
Deletion in BST.
17 Program for Heap Sort. CO2
18 Graph Implementation of BFS, DFS. CO4
19 Find Minimum Spanning Tree using Kruskal’s Algorithm. CO4
20 Graph Implementation of Shortest path Algorithm. CO4
Lab Course Outcome: Upon the completion of the course, the student will be able to:
CO 1 Implement various data structures like stacks, queue, linked lists, sparse matrices, hash K3
tables using arrays and linked list data structure.
CO 2 Implement and analyze sorting and searching programs. K4
CO 3 Implement various Algorithm design techniques like greedy method, dynamic K3
programming, backtracking to solve complex problems.
CO 4 Implement non-linear data structure like trees and graph to solve real life problems. K6
CO 5 Solve real life problems by identifying the applicable data structures and algorithms. K6
B. TECH. SECOND YEAR
List of Experiments:
Write a shell program, which accepts the name of a file from standard input and
perform the following test on it:
i. File readable
ii. File writable
iii. Both readable and writable
2. CPU Lab3: Implement CPU Scheduling Algorithms: CO3
Scheduling
1. FCFS
Algorithms
2. SJF
3. PRIORITY
Lab4:
4. Round Robin
4. Memory Lab6: Write a program to simulate the following contiguous memory allocation CO4
Management techniques:
Techniques
a) First fit
b) Best fit
c) Worst Fit
Lab7: a) Write a Program for implementation of Contiguous memory fixed
partition technique.
a) FIFO
b) LRU
c) Optimal
5. Disk Scheduling Lab9: Write a program to simulate Disk Scheduling Algorithms: CO5
Techniques
a) FCFS
b) SSTF
Lab Course Outcome: After completion of this course students will be able to
CO4 Analyze and implement Memory allocation and Memory management techniques. K4
Course objective: Achieve knowledge about Security of Information system and Risk factors and examine
security threats and vulnerability in various scenarios, understand concept of cryptography and encryption
technique to protect the data from cyber-attack and provide protection for software and hardware.
Pre-requisites: Basics recognition in the domain of Computer Science, Concept of network and operating
system, Commands of programming language.
Data Security Considerations-Backups, Archival Storage and Disposal of Data, Security Technology-Firewall,
Intrusion Detection System, Access Control, Security Threats -Viruses, Worms, Trojan Horse, Bombs,
Trapdoors, Spoofs, E-mail Viruses, Macro Viruses, Malicious Software, Network and Denial of Services
Attack, Security, Threats to E-Commerce: Electronic Payment System, E-Cash, Issues with Credit/Debit Cards.
Application Development Security, Architecture & Design, Security Issues in Hardware: Data Storage and
Downloadable Devices, Mobile Protection, Security Threats involving in social media, Physical Security of IT
Assets, CCTV, Backup Security Measures.
Policy design Task, WWW Policies, Email based Policies, Policy Revaluation Process-Corporate Policies,
Sample Security Policies, Publishing and Notification Requirement of the updated and new Policies. Resent
trends in Cyber security.
CO 5 Understand and apply cyber security methods and policies to enhance current K3
scenario security.
Text books:
1) Charles P. Pfleeger, Shari LawerancePfleeger, “Analysing Computer Security”, Pearson Education India
2) V.K.Pachghare, “Cryptography and information Security”, PHI Learning Private Limited, Delhi India
3) Sarika Gupta & Gaurav Gupta, Information Security and Cyber Laws, Khanna Publishing House
Reference Books:
1) Schou, Shoemaker, “Information Assurance for the Enterprise”, Tata McGraw Hill.
2) CHANDER, HARISH,” Cyber Laws and It Protection”, PHI Learning Private Limited,Delhi
3) V.K. Jain, Cryptography and Network Security, Khanna Publishing House, Delhi
4) William Stallings, Network Security Essentials: Applications and Standards, Prentice Hall, 4th edition, 2010
E-books& E-Contents:
1) https://prutor.ai/welcome/
2) https://crypto.stanford.edu/cs155old/cs155-spring11/lectures/03-ctrl-hijack.pdf
3) https://cybermap.kaspersky.com/stats
4) https://www.fireeye.com/cyber-map/threat-map.html
Reference Links:
1) https://crypto.stanford.edu/cs155old/cs155-spring11/lectures/03-ctrl-hijack.pdf
2) https://cs155.stanford.edu/lectures/03-isolation.pdf
3) http://uru.ac.in/uruonlinelibrary/Cyber_Security/Cryptography_and_Network_Security.pdf
1) https://www.youtube.com/watch?v=vv1ODDhXW8Q
2) https://www.youtube.com/watch?v=fQ3ESFfvchg&list=PLUtfVcb-iqn834VGI9faVXGIGSDXZMGp8
3) https://www.youtube.com/watch?v=iTVyKbDCJrA&list=PLgMDNELGJ1CbdGLyn7OrVAP-IKg-0q2U2
4) https://www.youtube.com/watch?v=1plMO7ChXMU&list=PLJ5C_6qdAvBFAuGoLC2wFGruY_E2gYtev
5) https://www.youtube.com/watch?v=_9QayISruzo
B. TECH. SECOND YEAR
Course Code ANC0302 LT P Credits
Course Title Environmental Science 2 0 0 0
Course objective:
1 To help the students in realizing the inter-relationship between man and environment. and
help the students in acquiring basic knowledge about environment.
2 To develop the sense of awareness among the students about environment and its various problems.
3 To create positive attitude about environment among the student.
4 To develop proper skill required for the fulfilment of the aims of environmental education and educational
evaluations
5 To develop the capability of using skills to fulfil the required aims, to realise and solve environmental problems
through social, political, cultural and educational processes
Pre-requisites: Basic knowledge of nature.
Course Contents / Syllabus
UNIT-I Basic Principle of Ecology 8 Hours
Definition, Scope and basic principles of ecology and environment. Ecosystem: Basic concepts, components of
ecosystem. Food chains and food webs. Ecological pyramids, Energy flow in ecological systems, Characteristics of
different ecosystems. Biogeochemical Cycles: Importance, gaseous and sedimentary cycles. Carbon, Nitrogen,
Phosphorus and Sulphur Cycles.
Basic concepts of sustainable development, SDGs, Ecosystem services, UN Decade for Ecorestoration.
UNIT-II Natural Resources and Associated Problems 8 Hours
Natural resources and associated problems. Forest resources: Use and over-exploitation, deforestation. Timber extraction, mining,
dams and their effects on forest and tribal people. Mineral resources: Use and exploitation, environmental effects of extracting and
using mineral resources. Food resources: World food problems, changes caused by agriculture and over-grazing, effects of modern
agriculture, fertilizer-pesticide problems, water logging, salinity.
Land resources: Land as a resource, land degradation, man induced landslides. Equitable use of resources for sustainable lifestyles.
Non-Renewable Energy Resources: Fossil fuels and their reserves, Nuclear energy, types, uses and effects, Renewable Energy
Resources: hydropower, Solar energy, geothermal, tidal and wind energy, Biomass energy, biogas and its advantages.
Introduction, Elements of Constraint Programming, Lagrange multiplier method, Kuhn Tucker Condition.
Solution of system of linear equations, Crout’s method, Gauss- Seidel method. Numerical integration,
Trapezoidal rule, Simpson’s one third and three-eight rules, Solution of first order ordinary differential equations
by fourth-order Runge- Kutta methods.
Text books:
(1) Sharma J K - Operations Research (Pearson, 3rd Edition.
(2) Rao S.S,”Optimization – Theory and applications”, Wiley Easter Ltd., 1979.
(3) Introduction to Linear Optimization by Dimitris Bertsimas & John N. Tsitsiklis, Athena Scientific 1997.
Reference Books:
(1) An introduction to Optimization by Edwin P K Chong, Stainslaw Zak.
(2) Hillier F S and Lieberman G J, Operations Research, Holden Day Inc., San Francisco.
(3) David G.Luerbeggan, “Introduction to Linear and Non Linear Programming”, Addison Wesley Publishing
Co. 1973.
(4)Cordan C.C. Beveridge and Robert S. Schedther, “Optimization, Theory and Practice” McGraw Hill Co.1970.
Link:
Unit 1 https://youtu.be/a2QgdDk4Xjw
https://youtu.be/XEA1pOtyrfo
https://youtu.be/qxls3cYg8to
https://youtu.be/DUFcNysR-w8
https://youtu.be/OUduOnhO94k
https://youtu.be/_uRKG9tkrew
https://youtu.be/7w30ueP5ayI
B. TECH. SECOND YEAR
CO3 Understand the duties of the transport layer and the addressing and functions of sockets. K2
CO4 Implement and analyzed the network connections using programming skills. K4
CO5 Understand and analyzed the different protocols used at application layer. K4
Textbooks:
(1) Behrouz Forouzan, “Data Communication and Networking” Fourth Edition-2006, Tata McGraw Hill
(2) UNIX Network Programming: The sockets networking API, Vol 1
ReferenceBooks:
(1) William Stallings, “Data and Computer Communication”, Eighth Edition-2008, Pearson.
(2) Andrew Tanenbaum “Computer Networks”, Fifth Edition-2011, Prentice Hall.
(3) Kurose and Ross, “Computer Networking- A Top-Down Approach”, Eighth Edition-2021, Pearson.
NPTEL/ Youtube/ Faculty Video Link:
1. https://onlinecourses.nptel.ac.in/noc21_cs18/preview
2. https://nptel.ac.in/courses/106105081
3. https://elearn.nptel.ac.in/shop/nptel/computer-networks-and-internet-protocol/
4. https://archive.nptel.ac.in/courses/106/105/106105080/
B. TECH. SECOND YEAR
Course Code ACSAI0402 LTP Credit
Data Modeling using the Entity Relationship Model: ER model concepts, notation for ER diagram,
mapping constraints, keys, Concepts of Super Key, Candidate key, Primary key, Generalization,
Aggregation, Reduction of an ER diagrams to tables, Extended ER model, Relationship of higher degree.
UNIT-II Relational Data Model and Language 8 Hours
Relational data model Concepts, Integrity constraints, Entity integrity, Referential integrity, Keys
constraints, Domain constraints, Relational algebra, Relational calculus, Tuple and Domain calculus.
Introduction on SQL: Characteristics of SQL, advantage of SQL. SQL data type and literals. Types of
SQL commands. SQL operators and their procedure. Tables, Views and indexes. Queries and sub queries.
Aggregate functions. Insert, Update and Delete operations, Joins, Unions, Intersection, Minus, Cursors,
Triggers, Procedures in SQL/PL SQL.
UNIT-III Database Design-Normalization 8 Hours
Normalization, Normal Form (NF), Functional Dependencies (FD), Closure of an attribute set and FD
sets, Canonical Cover of FD Sets, Normal Forms based on Functional Dependencies (1 NF, 2 NF, 3 NF,
BCNF), Multivalued Dependencies (MVDs) and 4NF, Join Dependencies (JDs) and 5NF and Domain
Key Normal Formal (DKNF or 6NF), Inclusion Dependencies, Loss-Less Join Decompositions.
Control Concurrency Techniques: Concurrency Control, Locking Techniques for concurrency control,
Time stamping protocols for concurrency control, Validation-based protocol, Multiple granularity, Multi
version schemes, Recovery with concurrent transaction, Case study of Oracle.
Distributed Database: -Introduction Distributed Database, Centralized and Distributed System Database
System.
UNIT-V Introduction No-SQL with cloud Database 8 Hours
Definition of NoSQL, History of NoSQL and Different NoSQL products, Exploring Mongo DB,
Interfacing and Interacting with NoSQL, NoSQL Storage Architecture, CRUD operations with MongoDB,
Querying, Modifying and Managing NoSQL Data stores, Indexing and ordering datasets(MongoDB).
Cloud database: - Introduction of Cloud database, NoSQL with Cloud Database, Introduction to Real
time Database.
Course outcome: After completion of this course students will be able to:
CO 1 Analyze database used to solve real world and complex problem and design K4
the ER, EER Model.
CO 2 Analyze and apply Structured Query Language (SQL) or Procedural Query K4,K3
Language (PL/SQL) to solve the complex queries. Implement relational
model, integrity constraints.
CO 3 Design and implement database for storing, managing data efficiently by K6
applying the Normalization process on the database.
CO 4 Synthesize the concepts of transaction management, concurrency control and K5
recovery.
CO 5 Understand and implement the concepts of NoSQL with cloud database. K2, K5
Text books:
1) Korth, Silbertz, Sudarshan,” Database System Concepts”, Seventh Edition, McGraw - Hill.
Reference Books:
1) Thomas Cannolly and Carolyn Begg, “Database Systems: A Practical Approach to Design,
Implementation and Management”, Third Edition, Pearson Education, 2007.
2) Raghu Ramakrishan and Johannes Gehrke “Database Management Systems” Third Edition, McGraw-
Hill.
3) NoSQL and SQL Data Modeling: Bringing Together Data, Semantics, and Software First Edition by
Ted Hills.
4) Brad Dayley “NoSQL with MongoDB in 24 Hours” First Edition, Sams Publisher.
Course outcome: After completion of this course students will be able to:
CO 1 After completion of this course students will be able to Understand fundamental K2
understanding of the history of artificial intelligence (AI) and its foundations
CO 2 Apply principles of AI in solutions that require problem solving, inference and K3
perception.
CO 3 Explain strong familiarity with a number of important AI techniques, including in K3
particular intelligent search methods and solutions
CO4 Apply the concepts of knowledge & reasoning of predicate logic and representing K3
knowledge using rules, Probabilistic reasoning
CO 5 Assess/ Evaluate critically the techniques presented and apply them to real world K5
problems
Textbooks:
B. TECH. SECOND YEAR
Course Code ACSE0404 LTP Credits
Course Title Theory of Automata and Formal Languages 3 0 0 3
Course objective:
To teach mathematical foundations of computation including automata theory, provide the design concepts of
abstract computation model of finite automata, push down automata and turing Machine and familiarize the
notions of algorithm, decidability, complexity, and computability.
Pre-requisites:
Discrete Mathematics
Fundamental of Computer System
Course outcome: After completion of this course students will be able to:
CO Design and Simplify automata for formal languages and transform non-deterministic finite K6
1 automata to deterministic finite automata.
CO Identify the equivalence between the regular expression and finite automata and apply closure K3
2 properties of formal languages to construct finite automata for complex problems.
CO Define grammar for context free languages and use pumping lemma to disprove a formal K3
3 language being context- free.
CO Design pushdown automata (PDA) for context free languages and Transform the PDA to K6
B. TECH. SECOND YEAR
5 Implementation of stop and wait protocol in any language like C , Java or Python. CO1
Implementation of hamming code (7, 4) code to limit the noise. We have to code
6 the bit data in to 7bit data by adding 3 parity bits. Implement in in any language CO1
like C , Java or Python
Introduction to CISCO Packet Tracer. Design Bus, Star, Mesh, Ring Topology and
8 check the connectivity using ping command. Switch Configuration on CISCO CO2
packet tracer using CLI.
Lab Course Outcome: After the completions of this course students will be able to
9. Practicing on Triggers - creation of trigger, Insertion using trigger, Deletion using CO4
trigger, Updating using trigger
10. Procedures- Creation of Stored Procedures, Execution of Procedure, and CO4
Modification of Procedure
11. Cursors- Declaring Cursor, Opening Cursor, Fetching the data, closing the cursor. CO4
12. Study of Open Source NOSQL Database: MongoDB (Installation, Basic CRUD CO5
operations, Execution)
13. Design and Develop MongoDB Queries using CRUD operations. (Use CRUD CO5
operations, SAVE method, logical operators)
14. Implement aggregation and indexing with suitable example using MongoDB. CO5
15. Mini project (Design & Development of Data and Application) for following: - CO1
a) Inventory Control System.
b) Material Requirement Processing.
c) Hospital Management System.
d) Railway Reservation System.
e) Personal Information System.
f) Web Based User Identification System.
g) Timetable Management System.
h) Hotel Management System
Lab Course Outcome: After completion of this course students will be able to
CO 1 Design and implementthe ER, EER model to solve the real-world problem and K6
transform an information model into a relational database schema and to use a data.
CO 2 Formulate and evaluate query using SQL solutions to a broad range of query and K6
data update problems.
CO 3 Apply and create PL/SQL blocks, procedure functions, packages and triggers, K6
cursors.
CO 4 Analyze entity integrity, referential integrity, key constraints, and domain K4
constraints on database.
CO5 Demonstrate understanding of MongoDB and its query operations. K3
B. TECH. SECOND YEAR
Course Code ACSAI0451 LTP Credit
Course Title Introduction to Artificial Intelligence Lab 0 0 2 1
List of Experiments:
Lab Course Outcome: After completion of this course students will be able to
CO 1 Apply searching problems using various algorithms. Explain functionality of K3
Chat-bot.
CO 2 Identify problems that are amenable to solution by AI methods, and which AI K1
methods may be suited to solving a given problem.
CO 3 Implement the program to POS (Parts of Speech) tagging for the give sentence K3
using NLTK.
CO 4 Design and carry out an empirical evaluation of different algorithms on a K3
problem formalization, and state the conclusions that the evaluation supports.
CO5 Implement basic AI algorithms (e.g., standard search algorithms or dynamic K3
programming).
B. TECH. SECOND YEAR
Course Code ANC0402 LT P Credits
Course Title Environmental Science 2 0 0 0
Course objective:
1 To help the students in realizing the inter-relationship between man and environment. and
help the students in acquiring basic knowledge about environment.
2 To develop the sense of awareness among the students about environment and its various problems.
3 To create positive attitude about environment among the student.
4 To develop proper skill required for the fulfilment of the aims of environmental education and educational
evaluations
5 To develop the capability of using skills to fulfil the required aims, to realise and solve environmental
problems through social, political, cultural and educational processes
Pre-requisites: Basic knowledge of nature.
Course Contents / Syllabus
UNIT-I Basic Principle of Ecology 8 Hours
Definition, Scope and basic principles of ecology and environment. Ecosystem: Basic concepts, components of
ecosystem. Food chains and food webs. Ecological pyramids, Energy flow in ecological systems, Characteristics of
different ecosystems. Biogeochemical Cycles: Importance, gaseous and sedimentary cycles. Carbon, Nitrogen,
Phosphorus and Sulphur Cycles.
Basic concepts of sustainable development, SDGs, Ecosystem services, UN Decade for Ecorestoration.
UNIT-II Natural Resources and Associated Problems 8 Hours
Natural resources and associated problems. Forest resources: Use and over-exploitation, deforestation. Timber extraction, mining,
dams and their effects on forest and tribal people. Mineral resources: Use and exploitation, environmental effects of extracting
and using mineral resources. Food resources: World food problems, changes caused by agriculture and over-grazing, effects of
modern agriculture, fertilizer-pesticide problems, water logging, salinity.
Land resources: Land as a resource, land degradation, man induced landslides. Equitable use of resources for sustainable
lifestyles.
Non-Renewable Energy Resources: Fossil fuels and their reserves, Nuclear energy, types, uses and effects, Renewable Energy
Resources: hydropower, Solar energy, geothermal, tidal and wind energy, Biomass energy, biogas and its advantages.
UNIT-III Biodiversity Succession and Non-Renewable Energy Resources 8 Hours
Biodiversity and their importance, Threats to biodiversity, major causes, extinction’s, vulnerability of species to
extinction, IUCN threat categories, Red data book.
Strategies for biodiversity conservation, principles of biodiversity conservation in-situ and ex-situ conservation
strategies Mega diversity zones and Hot spots, concepts, distribution and importance.
Succession: Concepts of succession, Types of Succession. Trends in succession. Climax and stability.
UNIT-IV Pollution and Solid Waste Management 8 Hours
Air pollution: sources of air pollution, Primary and secondary air pollutants. Origin and effects of SOX, NOX, Cox, CFC,
Hydrocarbon, control of air pollution. Water pollution: sources and types of water pollution, Effects of water pollution,
Eutrophication, Soil pollution: Causes of soil pollution, Effects of soil pollution, Major sources of and effects of noise pollution
on health, Radioactive and thermal pollution sources and their effects on surrounding environment.
Solid waste disposal and its effects on surrounding environment, Climate change, global warming, acid rain, ozone layer
depletion.
UNIT-V Role of Community and Environmental Protection Acts 8 Hours
Role of community, women and NGOs in environmental protection, Bioindicators and their role, Natural hazards,
Chemical accidents and disasters risk management, Environmental Impact Assessment (EIA), Salient features of
following Acts: a. Environmental Protection Act, 1986, Wildlife (Protection) Act, 1972.b. Water (Prevention and
control of pollution) Act, 1974.c. Air (Prevention and control of pollution) Act, 1981. Forest (Conservation) Act,
1980.d. Wetlands (Conservation and Management) Rules, 2017; e. Chemical safety and Disaster Management law. F.
District Environmental Action Plan. Climate action plans.
Course outcome: After completion of this course students will be able to
CO 1 Understand the basic principles of ecology and environment. Ecosystem: Basic concepts, K2
components of ecosystem., food chains and food webs. Ecological pyramids
CO 2 Understand the different types of natural recourses like food, forest, minerals and energy and their K2
conservation
CO 3 Understand the importance of biodiversity, Threats of biodiversity and different methods of K2
biodiversity conservation.
CO 4 Understand the different types of pollution, pollutants, their sources, effects and their control K3
methods
CO 5 Understand the basic concepts of sustainable development, Environmental Impact Assessment K3
(EIA) and different acts related to environment
Text books:
1. Brady, N.C. 1990. The nature and properties of Soils, Tenth Edition. Mac Millan Publishing Co., New York.
2. Botkin, D.B and Kodler E.A., 2000, Environmental Studies: The earth as a living planet. John Wiley and Sons Inc.
3. Rao M.N. and H.V.N. Rao, 1989: Air Pollution, Tata McGraw Hill Publishing Co. Ltd., New Delhi
4. Singh J.S., Singh S.P. and Gupta S.R., 2006, Ecology Environment and Resource Conservation, Anamaya
Publishers, New Delhi.
5.Environmental Studies -Benny Joseph-Tata McgrawHill-2005
6. Environmental Studies- Dr. D.L. Manjunath, Pearson Education-2006.
7. Environmental studies- R, Rajagopalan -Oxford Pubtiotion2005.
Reference Books:
1.Sodhi G.S. 2005, Fundamentals of Environmental Chemistry: Narosa Publishing House, New Delhi.
2.Dash, M.C. (1994), Fundamentals of Ecology, Tata Mc Graw Hill, New Delhi.
3. Sharma P. D. (1996). Environmental Biology, Rastogi Publications, Meerut.
4. Verma P.S. and V.K. Agarwal. (1985). Principles of Ecology. S. Chand and Company (Pub.), New Delhi.
5.Principles of Environmental Sciences and Engineering -P. Venugoplan Rao, Prenitice Hall of India.
6. Environmental Science and Engineering Meenakshi, Prentice Hall India.
NPTEL/ Youtube/ Faculty Video Link:
https://www.youtube.com/watch?v=T21OO0sBBfc, https://www.youtube.com/watch?
Unit 1 v=qt8AMjKKPDohttps://www.youtube.com/watch?v=yAK-m91Nxrshttps://www.youtube.com/watch?v=ha_O-
1uOWkk, https://www.youtube.com/watch?v=brF0RWJyx9w
https://www.youtube.com/watch?v=mOwyPENHhbc,https://www.youtube.com/watch?v=yqev1G2iy20,
Unit 2 https://www.youtube.com/watch?v=_74S3z3IO_I, https://www.youtube.com/watch?v=jXVw6M6m2g0
https://www.youtube.com/watch?v=GK_vRtHJZu4,https://www.youtube.com/watch?v=b6Ua_zWDH6U,
https://www.youtube.com/watch?v=7tgNamjTRkk,https://www.youtube.com/watch?v=ErATB1aMiSU,
Unit 3 https://www.khanacademy.org/science/high-school-biology/hs-ecology/hs-human-impact-on-ecosystems/v/
conservation-and-the-race-to-save-biodiversity
https://www.youtube.com/watch?v=7qkaz8ChelI,https://www.youtube.com/watch?v=NuQE5fKmfME,
Unit 4 https://www.youtube.com/watch?v=9CpAjOVLHII,https://www.youtube.com/watch?v=yEci6iDkXYw,
https://www.youtube.com/watch?v=yEci6iDkXYw
https://www.youtube.com/watch?v=ad9KhgGw5iA,https://www.youtube.com/watch?v=nW5g83NSH9M,
Unit 5 https://www.youtube.com/watch?v=xqSZL4Ka8xo,https://www.youtube.com/watch?v=WAI-hPRoBqs,
https://www.youtube.com/watch?v=o-WpeyGlV9Y, https://www.youtube.com/watch?v=EDmtawhADnY
B. TECH. SECOND YEAR
Course Code ANC0401 L T P Credit
Course objective: Achieve knowledge about Security of Information system and Risk factors and examine
security threats and vulnerability in various scenarios, understand concept of cryptography and encryption
technique to protect the data from cyber-attack and provide protection for software and hardware.
Pre-requisites: Basics recognition in the domain of Computer Science, Concept of network and operating
system, Commands of programming language.
Data Security Considerations-Backups, Archival Storage and Disposal of Data, Security Technology-Firewall,
Intrusion Detection System, Access Control, Security Threats -Viruses, Worms, Trojan Horse, Bombs,
Trapdoors, Spoofs, E-mail Viruses, Macro Viruses, Malicious Software, Network and Denial of Services
Attack, Security, Threats to E-Commerce: Electronic Payment System, E-Cash, Issues with Credit/Debit Cards.
Application Development Security, Architecture & Design, Security Issues in Hardware: Data Storage and
Downloadable Devices, Mobile Protection, Security Threats involving in social media, Physical Security of IT
Assets, CCTV, Backup Security Measures.
CO 5 Understand and apply cyber security methods and policies to enhance current K3
scenario security.
Text books:
1) Charles P. Pfleeger, Shari LawerancePfleeger, “Analysing Computer Security”, Pearson Education India
2) V.K.Pachghare, “Cryptography and information Security”, PHI Learning Private Limited, Delhi India
3) Sarika Gupta & Gaurav Gupta, Information Security and Cyber Laws, Khanna Publishing House
Reference Books:
1) Schou, Shoemaker, “Information Assurance for the Enterprise”, Tata McGraw Hill.
2) CHANDER, HARISH,” Cyber Laws and It Protection”, PHI Learning Private Limited,Delhi
3) V.K. Jain, Cryptography and Network Security, Khanna Publishing House, Delhi
4) William Stallings, Network Security Essentials: Applications and Standards, Prentice Hall, 4th edition, 2010
E-books& E-Contents:
1) https://prutor.ai/welcome/
2) https://crypto.stanford.edu/cs155old/cs155-spring11/lectures/03-ctrl-hijack.pdf
3) https://cybermap.kaspersky.com/stats
4) https://www.fireeye.com/cyber-map/threat-map.html
Reference Links:
1) https://crypto.stanford.edu/cs155old/cs155-spring11/lectures/03-ctrl-hijack.pdf
2) https://cs155.stanford.edu/lectures/03-isolation.pdf
3) http://uru.ac.in/uruonlinelibrary/Cyber_Security/Cryptography_and_Network_Security.pdf
1) https://www.youtube.com/watch?v=vv1ODDhXW8Q
2) https://www.youtube.com/watch?v=fQ3ESFfvchg&list=PLUtfVcb-iqn834VGI9faVXGIGSDXZMGp8
3) https://www.youtube.com/watch?v=iTVyKbDCJrA&list=PLgMDNELGJ1CbdGLyn7OrVAP-IKg-0q2U2
4) https://www.youtube.com/watch?v=1plMO7ChXMU&list=PLJ5C_6qdAvBFAuGoLC2wFGruY_E2gYtev
5) https://www.youtube.com/watch?v=_9QayISruzo