With globalization of the economy, vast opportunities of growth are available in the IT industry. IT industry is one of the largest growing sectors of the world economy with the perspective of digitalization of the resources. Computer Science Engineers are engaged in analyzing problems for solutions, formulating and testing, using advanced communications or multi-media equipment or working in teams for software development.
Our Department of Computer Science and Engineering has state-of-the-art infrastructure to support and complement our progressive and comprehensive degree course. We have well-equipped labs with latest generation of computer systems with high-end processors, HDD, Hi-speed internet and latest versions of softwares.
The course is well-organized with core and advanced areas and electives, to give complete and adequate knowledge on one hand and varied choice on the other. Regular and exhaustive lab sessions, seminars, group discussions, assignments and projects; industrial visits, workshops and versatile industry interactions form a crucial component of our training. The program, thus, helps our students to tighten their grip over crucial and latest areas, widen their exposure and harness their competencies and personality. The department has a very talented pool of faculty and support staff, which facilitates the steady progress in this direction.
B.Tech in Computer Science & Engineering, promises bright career prospects, as, Programmer Analyst, System Integrators MIS Specialist, Database Administrators, Management Consultants, Multimedia System Managers , Network Specialist & Software programmers, to name a few. Excellent career opportunities prevail in computer systems hardware, computer networking, software development, Internet technology, as well.
Our alumni are highly sought after in fields such as full stack development, machine learning and artificial intelligence (AI), cyber security, cloud computing, game innovation, data science and analytics, financial analytics, computer and information systems functions, interactive entertainment, research & development, software architecture & development, software consultancy & analytics, and many more.
Vision and Mission
Desk Message
Faculty List
Syllabus
PO's, PSO's and PEO's
CO's
Facilities
Vision and Mission
VISION
To be in the pioneer of Computer science & Engineering to create innovative engineers with moral values in a myriad of application areas in industry & research
MISSION
To groom the students with the quality of technical skill, who will be able to create, share and apply their knowledge in multidisciplinary areas for the benefit of society.
Toexpertise the students in advanced technology thereby promoting research.
To pursue excellence in Industry Institute Interaction program for students to get acquainted with corporate culture.
To impart moral, ethical values and interpersonal skills to the students.
Desk Message
The Department of Computer Science and Engineering welcomes you to be a part of the thriving computer science community and become visionaries and change makers of the future. The Department of CSE started its journey of UG program B.Tech (CSE) in the year 2009 with an intake of 60 and PG program M.Tech (CSE) in the year 2012 initially with an intake of 18, in year 2021 B.Tech (AI&ML) launched with 60 Seats. The Department goal is to provide students with a balance of intellectual and practical experiences that enable them to serve a variety of societal needs. Department takes the initiative to improve the soft skills, analytical capabilities and verbal communication of the students so that they can face the competition in the corporate world confidently. To meet the objectives, department pays special emphasis on teaching and hands on practical work. Students exhibit their innovative ideas, skills and potentials as final year projects and have won many awards at University level. Faculty also teach the students to work in teams, share their ideas, present, improve communication skills and join creative teams that make a positive difference.
You are welcome in the department as a prospective student.
For further details, please contact:
Contact Info
With Best Wishes, Prof. M.K. Chaudhary Head – Department CSE, AI & ML JB Institute of Technology Dehradun Mail: hod.cse@jbitdoon.edu.in
Program Specific Outcomes and Program Educational Objectives
Engineering knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and an engineering specialisation for the solution of complex engineering problems.
Problem analysis: Identify, formulate, research literature, and analyse complex engineering problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and engineering sciences.
Design/Development of Solutions: Design solutions for complex engineering problems and design system components or processes that meet the specified needs with appropriate consideration for public health and safety, and cultural, societal, and environmental considerations.
Conduct investigations of complex problems: Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions.
Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools including prediction and modelling to complex engineering activities with an understanding of the limitations.
The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal, and cultural issues and the consequent responsibilities relevant to the professional engineering practice.
Environment and sustainability: Understand the impact of the professional engineering solutions in societal and environmental contexts, and demonstrate the knowledge of, and the need for sustainable development.
Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering practice
Individual and team work: Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings.
Communication: Communicate effectively on complex engineering activities with the engineering community and with the society at large, such as being able to comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions
Project management and finance: Demonstrate knowledge and understanding of the engineering and management principles and apply these to one’s work, as a member and leader in a team, to manage projects and in multidisciplinary environments.
Life-long learning: Recognise the need for, and have the preparation and ability to engage in independent and life- long learning in the broadest context of technological change.
Students will be able to apply fundamental knowledge of theoretical computer science and analyze problems to provide computer based solutions for engineering applications.
Students will be able to design cost effective hardware/software systems and components for engineering/social applications using knowledge of hardware or software architecture, programming and development.
Students will be able to apply appropriate technology to find solution for complex problems.
The graduates will utilize their expertise in Engineering to solve industry’s technological problems.
Analyse real-life problems, design appropriate system to provide technically sound, economically feasible, and socially acceptable solutions.
Exhibit professionalism, ethical attitude, communication skills, teamwork in their profession and adapt to current trends by engaging in lifelong learning.
CO's
S.NO
Subject Name
Subject Code
Course Outcome
1
B.Tech. -3rd Sem CSE Department
2
Computer Organization& Architecture
BCST-404
CO1 Draw the functional block diagram of a single bus architecture of a computer and describe the function of the instruction execution cycle, RTL interpretation of instructions, addressing modes, instruction set.
CO2 Write assembly language program for specified microprocessor for computing 16-bit multiplication, division and I/O device interface (ADC, Control circuit, serial port communication).
CO3 Write a flowchart for Concurrent access to memory and cache coherency in Parallel Processors and describe the process.
CO4 Given a CPU organization and instruction, design a memory Unit and analyse its operation by interfacing with the CPU.
CO5 Given a CPU organization, assess its performance, and apply design techniques to enhance performance using pipelining, parallelism and RISC methodology.
CO6 Analyze the memory access operations and memory architecture.
3
Database Management System
BCST402
CO1 For a given query explain relational algebra expressions for that query and optimize the developed expressions
CO2 For a given specification of the requirement design the databases using ER method and normalization.
CO3 For a given specification develop the SQL queries for Open source and Commercial DBMS -MYSQL, ORACLE, and DB2.
CO4 For a given query optimize its execution using Query optimization algorithms
CO5 For a given transaction-processing system, determine the transaction atomicity, consistency, isolation, and durability.
CO6 Implement the isolation property, including locking, time stamping based on concurrency control and Serializability of scheduling
4
Unix And Shell Programming
TCS-402
CO1 Understand the basic concepts of UNIX Architecture and basic Commands.
CO2 Understand different types of Files, File system and basic file system commands.
CO3 Understand the commands related to Shell basics, vi editor and regular expression commands.
CO4 Understand the concepts of advance file concepts, commands related to Shell script and filter commands.
CO5 Understand the concepts of process and commands related to Perl script.
5
Theory of Computation
TCS 403
CO1 Apply knowledge in designing or enhancing compilers.
CO2 Apply grammars and automata (recognizers) for different language classes.
CO3 Apply knowledge in developing tools for language processing or text processing
6
Cyber Security
BCST-408
CO1 Know about various attacks and viruses in cyber systems
CO2 Know about how to prevent digital attacks
CO3 Know about how to prevent Phishing Attacks
CO4 Know about how to do secure transactions
7
Discrete Structures
BCST-302
CO-1 Evaluate a given logic sentence express it in terms of predicates, quantifiers, and logical connectives
CO-2 Illustrate a given a problem, derive the solution using deductive logic and prove the solution based on logical inference
CO-3 Analyze a given a mathematical problem, classify its algebraic structure
CO-4 Remember Boolean functions and simplify expressions using the properties of Boolean algebra
CO-5 Develop the given problem as graph networks and solve with techniques of graph theory.
8
Data Structure
TCS-303
CO1 Student will be able to understand the basic concepts of Data Structures.
CO2 Student will be able to understand Procedures, Tools & Practices of Data Structures.
CO3 Student will be able to understand latest trends of Tools & Practices of Data Structures.
CO4 Student will be able to understand the Target & Prepare for the Test and report making integration.
CO5 Student will perform EH with latest Tools, Practices & will be Blue Hat Hacker.
9
Object Oriented Programming and Methodology
TCS-304
CO1 Explain the procedural and object oriented paradigm with concepts of streams, classes, functions, data and objects
CO2 Show dynamic memory management techniques using pointers, constructors, destructors, etc
CO3 Apply the concept of function overloading, operator overloading, virtual functions and polymorphism.
CO4 Develop inheritance with the understanding of early and late binding, usage of exception handling, generic programming.
CO5 Apply the use of various OOPs concepts with the help of programs
10
ARTIFICIAL INTELLIGENCE
TCS-603
CO1 Acquire advanced Data Analysis skills.
CO2 Stay Industry relevant and grow in your career.
CO3 CreateAI/MLsolutionsforvariousbusinessproblems.ŸBuildanddeployproductiongradeAI/MLapplications.
CO4 Apply AI/ML methods, techniques and tools immediately
11
Compiler Design
BCST-602
CO-1 Understands compiler and various phases in compilation.
CO-2 Understands Lexical Analysis and implement it using LEX tool.
CO-3 Understands LL, LR, and SLR parsing techniques.
CO-4 Implement parsing using YACC tool.
CO-5 Understands Syntax Directed Translation, Symbol Tables and their applications.
12
Visual Programming& .NET Technologies
BCST 605
CO1 Understanding the philosophy of .NET and its basic building blocks
CO2 Applying C# Language Fundamentals to build build C# Applications using VS.NET IDE
CO3 Applying Object Oriented Programming with C# in .NET
CO4 Analyzing Interfaces and Collections in .NET
CO5 Analyzing .Net Assembles
13
COMPUTER GRAPHICS
TCS – 501
CO1 Apply metrics to measure the performance of various data mining algorithms.
CO2 Explain the importance of data warehousing and OLAP technology
CO3 Explain an understanding of data mining on various types of data like web data and spatial data.
CO4 Apply appropriate data mining methods like classification, clustering or Frequent Pattern mining on various data sets.
CO5 Explain the data needed for data mining using
Pre-processing techniques
14
Computer Networks
TCS-502
CO-1 Characterize and appreciate computer networks from the view point of components and from the view point of services.
CO-2 Model a problem or situation in terms of layering concept and map it to the TCI/IP stack.
CO-3 Display good understanding of the flow of a protocol in general and a network protocol.
CO-4 Design a Reliable Data Transfer Protocol and develop solutions of Transport Layer.
CO-5 Describe principles of Network Layers and use IP addressing to create subnets.
15
Design & Analysis of Algorithms
BCST-503
CO-1 Student should able to distinguish which algorithm is time and space efficient asymptotically.
CO-2 Student should be able to find the space and time efficient sorting and searching strategy.
CO-3 Student should by able to analyze the different designed strategy of algorithm.
CO-4 Student should be able to apply a designed strategy of algorithm to solve a particular problem.
CO-5 Understanding of NP- Complete and randomized algorithm.
CO-4 Utilize the Modeling Process to identify the key parameters of a model, estimate model outcomes, utilize a computational tool, e.g., Matlab to implement the mathematical representation of the model, convey the results of the simulation accurately, validate the model with data, and discuss the quality and sources of errors in the model.
CO-5 Construct difference-based computer models.
CO-6 Complete a capstone modeling project that identifies a problem, develops a mathematical representation and transforms it to a computational model. Document the development and implementation of the model and present in oral and written form.
17
Visual Programming& .NET Technologies
BCST 605
CO1 Understanding the philosophy of .NET and its basic building blocks
CO2 Applying C# Language Fundamentals to build build C# Applications using VS.NET IDE
CO3 Applying Object Oriented Programming with C# in .NET
CO4 Analyzing Interfaces and Collections in .NET
CO5 Analyzing .Net Assembles
18
OPERATING SYSTEM
TCS 601
CO1 Understanding the philosophy of .NET and its basic building blocks
CO2 Applying C# Language Fundamentals to build build C# Applications using VS.NET IDE
CO3 Applying Object Oriented Programming with C# in .NET
CO4 Analyzing Interfaces and Collections in .NET
CO5 Analyzing .Net Assembles
19
Cryptography & Network Security
TCS 089
CO1 Provide security of the data over the network.
CO2 Do research in the emerging areas of cryptography and network security.
CO3 Implement various networking protocols.
CO4 Protect any network from the threats in the world.
20
ACN
TCS-803
CO1 Acquire advanced Network Analysis skills.
CO2 Stay Industry relevant and grow in your career.
CO3 Create network solutions for various business problems. Build and deploy production grade network applications.
CO4 Apply network methods, techniques and tools immediately
21
DISTRIBUTED COMPUTING
TCS-801
22
Computer Organization & Architecture
BCST-404
CO1 Draw the functional block diagram of a single bus architecture of a computer and describe the function of the instruction execution cycle, RTL interpretation of instructions, addressing modes, instruction set.
CO2 Write assembly language program for specified microprocessor for computing 16 bit multiplication, division and I/O device interface (ADC, Control circuit, serial port communication).
CO3 Write a flowchart for Concurrent access to memory and cache coherency in Parallel Processors and describe the process.
CO4 Given a CPU organization and instruction, design a memory Unit and analyze its operation by interfacing with the CPU.
CO5 Given a CPU organization, assess its performance, and apply design techniques to enhance performance using pipelining, parallelism and RISC methodology.
CO6 Analyze the memory access operations and memory architecture.
23
Database Management System
BCST402
CO1 For a given query explain relational algebra expressions for that query and optimize the developed expressions
CO2 For a given specification of the requirement design the databases using ER method and normalization.
CO3 For a given specification develop the SQL queries for Open source and Commercial DBMS -MYSQL, ORACLE, and DB2.
CO4 For a given query optimize its execution using Query optimization algorithms
CO5 For a given transaction-processing system, determine the transaction atomicity, consistency, isolation, and durability.
CO6 Implement the isolation property, including locking, time stamping based on concurrency control and Serializability of scheduling
24
Cyber Security
BCST-408
CO1 Know about various attacks and viruses in cyber systems
CO2 Know about how to prevent digital attacks
CO3 Know about how to prevent Phishing Attacks
CO4 Know about how to do secure transactions
25
Software Engineering
BCST-403
CO1 Apply Software life cycle models and have a knowledge of different phases of Software life cycle
CO2 Identify, formulate, review, estimate and schedule complex software projects using principles of mathematics.
CO3 Demonstrate bug free software with good design and quality by using appropriate techniques and modern engineering and IT tools.
CO4 Analyze verification, validation activities, static, dynamic testing, debugging tools and techniques and importance of working in teams.
CO5 Apply Software life cycle models and have a knowledge of different phases of Software life cycle
26
Theory of Automata & Formal Languages
BCST405
CO1 Apply knowledge in designing or enhancing compilers.
CO2 Apply grammars and automata (recognizers) for different language classes.
CO3 Apply knowledge in developing tools for language processing or text processing
27
Compiler Design
BCST-602
CO-1 Understands compiler and various phases in compilation.
CO-2 Understands Lexical Analysis and implement it using LEX tool.
CO-3 Understands LL, LR, and SLR parsing techniques.
CO-4 Implement parsing using YACC tool.
CO-5 Understands Syntax Directed Translation, Symbol Tables and their applications.
28
GRAPH THEORY
TCS 604
29
ARTIFICIAL INTELLIGENCE
TCS-603
CO1 Acquire advanced Data Analysis skills.
CO2 Stay Industry relevant and grow in your career.
CO3 CreateAI/MLsolutionsforvariousbusinessproblems.ŸBuildanddeployproductiongradeAI/MLapplications.
CO4 Apply AI/ML methods, techniques and tools immediately
30
COMPUTER GRAPHICS
TCS – 501
CO1 Apply metrics to measure the performance of various data mining algorithms.
CO2 Explain the importance of data warehousing and OLAP technology
CO3 Explain an understanding of data mining on various types of data like web data and spatial data.
CO4 Apply appropriate data mining methods like classification, clustering or Frequent Pattern mining on various data sets.
CO5 Explain the data needed for data mining using Pre-processing techniques
31
Design & Analysis of Algorithms
BCST-503
CO-1 Student should able to distinguish which algorithm is time and space efficient asymptotically.
CO-2 Student should be able to find the space and time efficient sorting and searching strategy.
CO-3 Student should by able to analyze the different designed strategy of algorithm.
CO-4 Student should be able to apply a designed strategy of algorithm to solve a particular problem.
CO-5 Understanding of NP- Complete and randomized algorithm.
32
Computer Network
TCS- 502
CO-1 Characterize and appreciate computer networks from the view point of components and from the view point of services.
CO-2 Model a problem or situation in terms of layering concept and map it to the TCI/IP stack.
CO-3 Display good understanding of the flow of a protocol in general and a network protocol.
CO-4 Design a Reliable Data Transfer Protocol and develop solutions of Transport Layer.
CO-5 Describe principles of Network Layers and use IP addressing to create subnets.
CO-4 Utilize the Modeling Process to identify the key parameters of a model, estimate model outcomes, utilize a computational tool, e.g., Matlab to implement the mathematical representation of the model, convey the results of the simulation accurately, validate the model with data, and discuss the quality and sources of errors in the model.
CO-5 Construct difference-based computer models.
CO-6 Complete a capstone modeling project that identifies a problem, develops a mathematical representation and transforms it to a computational model. Document the development and implementation of the model and present in oral and written form.
36
Human Value
TCS-07
37
SYSTEM ADMINISTRATION
TCS- 701
38
ADVANCE COMPUTER ARCHITECTURE
TCS-702
39
Wireless Networks
TCS- 073
40
Computer Organization & Architecture
BCST-404
CO1 Draw the functional block diagram of a single bus architecture of a computer and describe the function of the instruction execution cycle, RTL interpretation of instructions, addressing modes, instruction set.
CO2 Write assembly language program for specified microprocessor for computing 16 bit multiplication, division and I/O device interface (ADC, Control circuit, serial port communication).
CO3 Write a flowchart for Concurrent access to memory and cache coherency in Parallel Processors and describe the process.
CO4 Given a CPU organization and instruction, design a memory Unit and analyze its operation by interfacing with the CPU.
CO5 Given a CPU organization, assess its performance, and apply design techniques to enhance performance using pipelining, parallelism and RISC methodology.
CO6 Analyze the memory access operations and memory architecture.
41
Universal Human Values -2
BHUT-401
42
Database Management System
BCST402
CO1 For a given query explain relational algebra expressions for that query and optimize the developed expressions
CO2 For a given specification of the requirement design the databases using ER method and normalization.
CO3 For a given specification develop the SQL queries for Open source and Commercial DBMS -MYSQL, ORACLE, and DB2.
CO4 For a given query optimize its execution using Query optimization algorithms
CO5 For a given transaction-processing system, determine the transaction atomicity, consistency, isolation, and durability.
CO6 Implement the isolation property, including locking, time stamping based on concurrency control and Serializability of scheduling
43
Cyber Security
BCST-408
CO1 Know about various attacks and viruses in cyber systems
CO2 Know about how to prevent digital attacks
CO3 Know about how to prevent Phishing Attacks
CO4 Know about how to do secure transactions
44
Theory of Automata & Formal Languages
BCST405
CO1 Apply knowledge in designing or enhancing compilers.
CO2 Apply grammars and automata (recognizers) for different language classes.
CO3
Apply knowledge in developing tools for language processing or text processing
45
ENERGY AND ENVIRONMENTAL ENGNEERING
BCET-301
CO1 Apply advanced level knowledge, techniques, skills and modern tools in the field of Energy and Environmental Engineering
CO2 Distinguish the different energy generation systems and their environmental impacts
CO3 Respond to global policy initiatives and meet the emerging challenges with sustainable technological solutions in the field of energy and environment.
CO4 Gain the knowledge about the ecosystem, different types of pollutions and their control technologies and waste management system.
CO5 Understand the role of government and NGOs in implementing environmental protection programs. Apply moral values and confer to professional ethics and responsibilities for sustainable development.
46
Discrete Structures
BCST-302
CO-1 Examine it in terms of predicates, quantifiers and logical connectives
CO-2 Derive the solution using deductive logic and prove the solution based on logical inference
CO-3 Classify mathematical problem and its algebraic structure
CO-4 Evaluate Boolean functions and simplify expressions using the properties of Boolean algebra
CO-5 Develop the given problem as graph networks and solve with techniques of graph theory
47
Object Oriented Programming and Methodology
BEET-305
CO1 Explain the procedural and object oriented paradigm with concepts of streams, classes, functions, data and objects
CO2 Show dynamic memory management techniques using pointers, constructors, destructors, etc
CO3 Apply the concept of function overloading, operator overloading, virtual functions and polymorphism.
CO4 Develop inheritance with the understanding of early and late binding, usage of exception handling, generic programming.
CO5 Apply the use of various OOPs concepts with the help of programs
48
Compiler Design
BCST-602
CO-1 Understands compiler and various phases in compilation.
CO-2 Understands Lexical Analysis and implement it using LEX tool.
CO-3 Understands LL, LR, and SLR parsing techniques.
CO-4 Implement parsing using YACC tool.
CO-5 Understands Syntax Directed Translation, Symbol Tables and their applications.
49
Data Analytics
BCST-603
50
Design & Analysis of Algorithms
BCST-503
CO-1 Student should able to distinguish which algorithm is time and space efficient asymptotically.
CO-2 Student should be able to find the space and time efficient sorting and searching strategy.
CO-3 Student should by able to analyze the different designe strategy of algorithm.
CO-4 Student should be able to apply a designe strategy of algorithm to solve a particular problem.
CO-5 Understanding of NP- Complete and randomized algorithm.
51
ACN
TCS-083
CO1 Acquire advanced Network Analysis skills.
CO2 Stay Industry relevant and grow in your career.
CO3 Create network solutions for various business problems. Build and deploy production grade network applications.
CO4 Apply network methods, techniques and tools immediately
52
Distributed Computing
TCS-801
CO1 Acquire advanced of Distributed Computing.
CO2 Stay Limitation of Distributed system
CO3 Discuss application of Timestamp ordering
CO4 Apply Comparison of methods for concurrency control.
53
DATA WAREHOUSING AND DATA MINING
TCS – 703
CO1 Apply metrics to measure the performance of various data mining algorithms.
CO2 Explain the importance of data warehousing and OLAP technology
CO3 Explain an understanding of data mining on various types of data like web data and spatial data.
CO4 Apply appropriate data mining methods like classification, clustering or Frequent Pattern mining on various data sets.
CO5 Explain the data needed for data mining using Pre-processing techniques
54
SYSTEM ADMINISTRATION
TCS – 701
CO1 Duties of the Administrator, Administration tools, Overview of permissions. Processes: Process status, Killing processes, process priority. Starting up and Shut down: Peripherals, Kernel loading, Console, The scheduler, init and the inittab file, Run-levels, Run level scripts.
CO2 Partitions, Swap space, Device files, Raw and Block files, Formatting disks, Making file systems, Superblock, I-nodes, File system checker, Mounting file systems, Logical Volumes, Network File systems, Boot disks Configuring the TCP/IP Networking : Kernel Configuration; Mounting the /proc File system, Installing the Binaries, Setting the Hostname, Assigning IP Addresses, Creating Subnets,
CO3 TCP/IP Firewall: Methods of Attack, What Is a Firewall? What Is IP Filtering? Setting Up Linux for Firewalling Testing a Firewall Configuration; A Sample Firewall Configuration: IP Accounting, Configuring the Kernel for IP Accounting, Configuring IP Accounting
CO4 Using IP Accounting Results IP Masquerade and Network Address Translation : Side Effects and Fringe Benefits, Configuring the Kernel for IP Masquerade, Configuring IP Masquerade.
CO5 Getting Acquainted with NIS, NIS Versus NIS+ , The Client Side of NIS, Running an NIS Server, NIS Server Security. Network file system: Preparing NFS, Mounting an NFS Volume, The NFS Daemons, The exports File. System Backup & Recovery: Log files for system and applications; Backup schedules and methods (manual and automated).
55
Wireless Networks
TCS- 073
56
Computer Organization & Architecture
BCST-404
CO1 Draw the functional block diagram of a single bus architecture of a computer and describe the function of the instruction execution cycle, RTL interpretation of instructions, addressing modes, instruction set.
CO2 Write assembly language program for specified microprocessor for computing 16 bit multiplication, division and I/O device interface (ADC, Control circuit, serial port communication).
CO3 Write a flowchart for Concurrent access to memory and cache coherency in Parallel Processors and describe the process.
CO4 Given a CPU organization and instruction, design a memory Unit and analyze its operation by interfacing with the CPU.
CO5 Given a CPU organization, assess its performance, and apply design techniques to enhance performance using pipelining, parallelism and RISC methodology.
CO6 Analyze the memory access operations and memory architecture.
57
Universal Human Values -2
BHUT-401
58
Database Management System
BCST 402
CO1 For a given query explain relational algebra expressions for that query and optimize the developed expressions
CO2 For a given specification of the requirement design the databases using ER method and normalization.
CO3 For a given specification develop the SQL queries for Open source and Commercial DBMS -MYSQL, ORACLE, and DB2.
CO4 For a given query optimize its execution using Query optimization algorithms
CO5 For a given transaction-processing system, determine the transaction atomicity, consistency, isolation, and durability.
CO6 Implement the isolation property, including locking, time stamping based on concurrency control and Serializability of scheduling
59
Cyber Security
BCST-408
CO1 Know about various attacks and viruses in cyber systems
CO2 Know about how to prevent digital attacks
CO3 Know about how to prevent Phishing Attacks
CO4 Know about how to do secure transactions
60
Software Engineering
BCST-403
CO1 Apply Software life cycle models and have a knowledge of different phases of Software life cycle
CO2 Identify, formulate, review, estimate and schedule complex software projects using principles of mathematics.
CO3 Demonstrate bug free software with good design and quality by using appropriate techniques and modern engineering and IT tools.
CO4 Analyze verification, validation activities, static, dynamic testing, debugging tools and techniques and importance of working in teams.
CO5 Apply Software life cycle models and have a knowledge of different phases of Software life cycle
61
Theory of Automata & Formal Languages
BCST405
CO1 Apply knowledge in designing or enhancing compilers.
CO2 Apply grammars and automata (recognizers) for different language classes.
CO3
Apply knowledge in developing tools for language processing or text processing
62
ENERGY AND ENVIRONMENTAL ENGNEERING
BCET-301
CO1 Apply advanced level knowledge, techniques, skills and modern tools in the field of Energy and Environmental Engineering
CO2 Distinguish the different energy generation systems and their environmental impacts
CO3 Respond to global policy initiatives and meet the emerging challenges with sustainable technological solutions in the field of energy and environment.
CO4 Gain the knowledge about the ecosystem, different types of pollutions and their control technologies and waste management system.
CO5 Understand the role of government and NGOs in implementing environmental protection programs. Apply moral values and confer to professional ethics and responsibilities for sustainable development.
63
Discrete Structures
BCST-302
CO-1 Examine it in terms of predicates, quantifiers and logical connectives
CO-2 Derive the solution using deductive logic and prove the solution based on logical inference
CO-3 Classify mathematical problem and its algebraic structure
CO-4 Evaluate Boolean functions and simplify expressions using the properties of Boolean algebra
CO-5 Develop the given problem as graph networks and solve with techniques of graph theory
64
Data Structure
BCST-303
BCST-303.1 Explain and Select appropriate data structures as applied to specified problem definition.
BCST-303.2 Calculate the computational efficiency of the principal algorithms for different data structure, sorting, searching, and hashing
BCST-303.3 Develop programs and algorithms that use arrays, records, linked structures, stacks, queues, trees, and graphs.
BCST-303.4 Compare alternative implementations of data structures with respect to performance
BCST-303.5 Design and implement an appropriate hashing function for an application.
BCST-303.6 Design algorithm for problem involving graphs, trees and heaps
65
Object Oriented Programming and Methodology
BEET305
CO1 Explain the procedural and object oriented paradigm with concepts of streams, classes, functions, data and objects
CO2 Show dynamic memory management techniques using pointers, constructors, destructors, etc
CO3 Apply the concept of function overloading, operator overloading, virtual functions and polymorphism.
CO4 Develop inheritance with the understanding of early and late binding, usage of exception handling, generic programming.
CO5 Apply the use of various OOPs concepts with the help of programs
66
Software Engineering
BCST-403
CO1 Apply Software life cycle models and have a knowledge of different phases of Software life cycle
CO2 Identify, formulate, review, estimate and schedule complex software projects using principles of mathematics.
CO3 Demonstrate bug free software with good design and quality by using appropriate techniquesandmodern engineeringandIT tools.
CO4 Analyzeverification,validationactivities,static,dynamictesting,debuggingtoolsandtechniquesand importanceof workingin teams.
CO5 Apply Software life cycle models and have a knowledge of different phases ofSoftwarelife cycle
67
Compiler Design
BCST-602
68
DATA MINING
BCST-604(B)
69
DATA ANALYTICS
BCST-603
CO1
Develop relevant programming abilities.
CO2 Demonstrate proficiency with statistical analysis of data.
CO3 Develop the ability to build and assess data-based models.
CO4 Execute statistical analyses with professional statistical software.
CO5 Demonstrate skill in data managementand will apply data science concepts and methods to solve problems in real world Contexts and will communicate these solutions effectively.
70
MACHINE LEARNING
CS605(B)
71
DATA ANALYTICS
BCST-603
CO1
Develop relevant programming abilities.
CO2 Demonstrate proficiency with statistical analysis of data.
CO3 Develop the ability to build and assess data-based models.
CO4 Execute statistical analyses with professional statistical software.
CO5 Demonstrate skill in data managementand will apply data science concepts and methods to solve problems in real world Contexts and will communicate these solutions effectively.
72
Computer Network
TCS- 502
73
Design & Analysis of Algorithms
BCST-503
CO-1 Student should able to distinguish which algorithm is time and space efficient asymptotically.
CO-2 Student should be able to find the space and time efficient sorting and searching strategy.
CO-3 Student should by able to analyze the different designe strategy of algorithm.
CO-4 Student should be able to apply a designe strategy of algorithm to solve a particular problem.
CO-5 Understanding of NP- Complete and randomized algorithm.
CO1 Explainhigh-level OS kernel structure
CO2 Explain hardware-software interactions for compute and I/O
CO3 Apply practical skills in system tracing and performance analysis
CO4 Analyze the research ideas in system structure and behavior
CO5 Apply the system style performance evaluations
77
Open Elective
BOCS 804
CO-1 To understand how block chain system work
CO-2 Security interact with bit coin and ethereum
CO-3 Simplified Payment verification protocol
CO-4 List and describe differences between proof of work and proof of stake consensus
CO-5 Interact with a block chain system by sending and reading transactions
78
Cryptography & Network Security
TCS 089
CO1 Provide security of the data over the network.
CO2 Do research in the emerging areas of cryptography and network security.
CO3 Implement various networking protocols.
CO4 Protect any network from the threats in the world.
79
Ad Hoc & Wireless Networks
BCST-702
CO-1 Understand the under lying technologies of wireless networks.
CO-2 Specify and identify deficiencies in existing wireless protocols for MAC layer and Network layer, and then go onto formulate new and better protocols.
CO-3 Understand the technology behind the cellular network, installation of base station, Bluetooth etc.
CO-4 To master the concepts of ad hoc networks and the design / performance issues in wireless local area networks and wide area networks.
CO-5 To be familiar with contemporary issues in networking technologies.
80
Ethical Hacking
BOCS-704
81
Human Computer Interface
BCST-703
CO-1 Describe typical human–computer interaction (HCI) models and styles, as well as various historic HCI paradigms.
CO-2 Describe and use HCI design principles, standards and guidelines.
CO-3 Analyze and identify user models, user support, socio-organizational issues, and stakeholder requirements of HCI systems.
CO-4 Discuss tasks and dialogs of relevant HCI systems based on task analysis and dialog design.
CO-5 Analyze and discuss HCI issues in groupware, ubiquitous computing, virtual reality, multimedia, and Word Wide Web-related environments.
82
.Net Framework and C# Programming
BCST 701
CO1 Apply the C# Programming fundamentals in Common Language Runtime environment and analyze the various C# programming concepts used for building console applications and windows forms.
CO2 Analyze the OOPs concepts and Advanced class construction with respect to C# programming
CO3 Analyze C# Assemblies, Thread and AppDomains and the different techniques to achieve concurrency and synchronization
CO4 Analyze the different ways to accomplish IO, Object serialization and remoting and methods in ADO.NET for data control in C# windows forms
CO5 Analyze ASP.NET architecture and web forms with web servers, server controls, data connectivity and usage of XML in ASP.NET
83
Computer Organisation & Architecture
BCST-404
CO1 Draw the functional block diagram of a single bus architecture of a computer and describe the function of the instruction execution cycle, RTL interpretation of instructions, addressing modes, instruction set.
CO2 Write assembly language program for specified microprocessor for computing 16 bit multiplication, division and I/O device interface (ADC, Control circuit, serial port communication).
CO3 Write a flowchart for Concurrent access to memory and cache coherency in Parallel Processors and describe the process.
CO4 Given a CPU organization and instruction, design a memory Unit and analyze its operation by interfacing with the CPU.
CO5 Given a CPU organization, assess its performance, and apply design techniques to enhance performance using pipelining, parallelism and RISC methodology.
CO6 Analyze the memory access operations and memory architecture.
84
Database Management System
BCST402
CO1 For a given query explain relational algebra expressions for that query and optimize the developed expressions
CO2 For a given specification of the requirement design the databases using ER method and normalization.
CO3 For a given specification develop the SQL queries for Open source and Commercial DBMS -MYSQL, ORACLE, and DB2.
CO4 For a given query optimize its execution using Query optimization algorithms
CO5 For a given transaction-processing system, determine the transaction atomicity, consistency, isolation, and durability.
CO6 Implement the isolation property, including locking, time stamping based on concurrency control and Serializability of scheduling
85
Cyber Security
BCST-408
CO1 Know about various attacks and viruses in cyber systems
CO2 Know about how to prevent digital attacks
CO3 Know about how to prevent Phishing Attacks
CO4 Know about how to do secure transactions
86
SOFTWARE ENGINEERING
BCST-403
CO1 Apply Software life cycle models
CO2 Explain the techniques of software project management
CO3 Demonstrate bug free software with good design and quality by using appropriate techniques and modern engineering and IT tools.
CO4 Explain testing and debugging tools and techniques
CO5 Apply Software life cycle models and have a knowledge of different phases of Software life cycle
87
Theory of Automata & Formal Languages
BCST405
CO1 Apply knowledge in designing or enhancing compilers.
CO2 Apply grammars and automata (recognizers) for different language classes.
CO3
Apply knowledge in developing tools for language processing or text processing
88
Universal Human Values 2
BHUT-401
89
ENERGY AND ENVIRONMENTAL ENGNEERING
BCET-301
CO1 Apply advanced level knowledge, techniques, skills and modern tools in the field of Energy and Environmental Engineering
CO2 Distinguish the different energy generation systems and their environmental impacts
CO3 Respond to global policy initiatives and meet the emerging challenges with sustainable technological solutions in the field of energy and environment.
CO4 Gain the knowledge about the ecosystem, different types of pollutions and their control technologies and waste management system.
CO5 Understand the role of government and NGOs in implementing environmental protection programs. Apply moral values and confer to professional ethics and responsibilities for sustainable development.
90
Data Structures
BCST-303
CO-1 Student will be able to understand the basic concepts of Data Structures.
CO-2 Student will be able to understand Procedures, Tools & Practices of Data Structures.
CO-3 Student will be able to understand latest trends of Tools & Practices of Data Structures.
CO-4 Student will be able to understand the Target & Prepare for the Test and report making integration.
CO-5 Student will perform EH with latest Tools, Practices & will be Blue Hat Hacker.
91
Digital Electronics
BECT- 303
CO-1 Understand number system and binary codes.
CO-2 Identify various combinational circuits.
CO-3 Apply various sequential circuit and counters circuits.
CO-4 Classify different state machines and logic families.
CO-5 Examine the various hazards and fault detection in digital circuits.
92
Discrete Structures
BCST-302
CO-1 Evaluate a given logic sentence express it in terms of predicates, quantifiers, and logical connectives
CO-2 Illustrate a given a problem, derive the solution using deductive logic and prove the solution based on logical inference
CO-3 Analyze a given a mathematical problem, classify its algebraic structure
CO-4 Remember Boolean functions and simplify expressions using the properties of Boolean algebra
CO-5 Develop the given problem as graph networks and solve with techniques of graph theory.
93
Object Oriented Programming and Methodology
BCST305
CO1 Explain the procedural and object oriented paradigm with concepts of streams, classes, functions, data and objects
CO2 Show dynamic memory management techniques using pointers, constructors, destructors, etc
CO3 Apply the concept of function overloading, operator overloading, virtual functions and polymorphism.
CO4 Develop inheritance with the understanding of early and late binding, usage of exception handling, generic programming.
CO5 Apply the use of various OOPs concepts with the help of programs
94
Compiler Design
BCST-602
CO-1 Understands compiler and various phases in compilation.
CO-2 Understands Lexical Analysis and implement it using LEX tool.
CO-3 Understands LL, LR, and SLR parsing techniques.
CO-4 Implement parsing using YACC tool.
CO-5 Understands Syntax Directed Translation, Symbol Tables and their applications.
95
MACHINE LEARNING
CS605
CO1 List various approaches of Machine Learning.
CO2 Define machine learning algorithms to solve the real world problems
CO3 Develop Hypothesis and machine learning models
CO4 Identify appropriate models for solving machine learning problems.
CO5 Apply learning techniques to solve real world machine learning problems.
CO6 Evaluate and interpret the results of the algorithms.
96
Microprocessor& its Applications
BCST-601
CO-1 Students will be able to understand memory mapping standards, register organization, architecture, modes and timing and evolution of microprocessors 8086, 8088, 80186. 80286, 80386 & 80486.
CO-2 Students will be able to apply instruction set, addressing modes and assembly language programming of 8086 microprocessor.
CO-3 Students will be able to understand various interfacing chips like8255, keyboards, LEDs, ADC& DAC and memory interfacing and program for these modules.
CO-4 Students will be able to understand general purposes programmable peripheral devices: Timer (8253/8254), 8259A programmable interrupt controller, USART, serial I/O & data Communication.
CO-5 Students will be able to design products for societal use like 8bit and 16-bit microcontrollers and embedded systems, 8051 architecture, pin description, I/O configuration, interrupts, addressing modes instruction set, embedded system, use of microcontrollers in embedded systems, display systems using microcontrollers.
97
DATA ANALYTICS
BCST-603
CO1
Develop relevant programming abilities.
CO2 Demonstrate proficiency with statistical analysis of data.
CO3 Develop the ability to build and assess data-based models.
CO4 Execute statistical analyses with professional statistical software.
CO5 Demonstrate skill in data management and will apply data science concepts and methods to solve problems in real world Contexts and will communicate these solutions effectively.
98
Computer Networks
BCST-502
CO-1 Characterize and appreciate computer networks from the view point of components and from the view point of services.
CO-2 Model a problem or situation in terms of layering concept and map it to the TCI/IP stack.
CO-3 Display good understanding of the flow of a protocol in general and a network protocol.
CO-4 Design a Reliable Data Transfer Protocol and develop solutions of Transport Layer.
CO-5 Describe principles of Network Layers and use IP addressing to create subnets.
99
Cyber Security
BOCS-505
CO1 Know about various attacks and viruses in cyber systems
CO2 Know about how to prevent digital attacks
CO3 Know about how to prevent Phishing Attacks
CO4 Know about how to do secure transactions
CO5 Know about the Laws and Regulatory requirements
100
Design & Analysis of Algorithms
BCST-503
CO-1 Student should able to distinguish which algorithm is time and space efficient asymptotically.
CO-2 Student should be able to find the space and time efficient sorting and searching strategy.
CO-3 Student should by able to analyze the different designe strategy of algorithm.
CO-4 Student should be able to apply a designe strategy of algorithm to solve a particular problem.
CO-5 Understanding of NP- Complete and randomized algorithm.
101
Internet & Web Technologies
BCST-504 C
CO-1 Describe the concepts of WWW including browser and HTTP protocol.
CO-2 List the various HTML tags and use them to develop the user friendly web pages.
CO-3 Define the CSS with its types and use them to provide the styles to the webpages at variouslevels.
CO-4 Develop the modern web pages using the HTML and CSS features withdifferent layouts asper need of applications.
CO-5 Use the JavaScript to develop the dynamic web pages. Use server side scripting with PHP to generate the web pages dynamically using the database connectivity. Develop the modern Web applications using the client and server sidetechnologies and theweb design fundamentals.
102
ADVANCED OPERATING SYSTEM
BCST 801
CO1 Explainhigh-level OS kernel structure
CO2 Explain hardware-software interactions for compute and I/O
CO3 Apply practical skills in system tracing and performance analysis
CO4 Analyze the research ideas in system structure and behavior
CO5 Apply the system style performance evaluations
103
Cryptography & Network Security
BCST-802
CO-1 Provide security of the data over the network.
CO-2 Do research in the emerging areas of cryptography and network security.
CO-3 Implement various networking protocols.
CO-4 Protect any network from the threats in the world.
CO-5 Apply the security techniques & underlying principles.
104
DATA MINING
BCST-604(B)
CO1 Apply metrics to measure the performance of various data mining algorithms.
CO2 Explain the importance of data warehousing and OLAP technology
CO3 Explain an understanding of data mining on various types of data like web data and spatial data.
CO4 Apply appropriate data mining methods like classification, clustering or Frequent Pattern mining on various data sets.
CO5 Explain the data needed for data mining using
Pre-processing techniques
105
Ad Hoc & Wireless Networks
BCST-702
CO-1 Understand the under lying technologies of wireless networks.
CO-2 Specify and identify deficiencies in existing wireless protocols for MAC layer and Network layer, and then go onto formulate new and better protocols.
CO-3 Understand the technology behind the cellular network, installation of base station, Bluetooth etc.
CO-4 To master the concepts of ad hoc networks and the design / performance issues in wireless local area networks and wide area networks.
CO-5 To be familiar with contemporary issues in networking technologies.
106
Ethical Hacking
BOCS-704(C)
CO-1 Student will be able to understand the basic concepts of Ethical Hacking.
CO-2 Student will be able to understand Procedures, Tools & Practices of Ethical Hacking.
CO-3 Student will be able to understand latest trends of Tools & Practices of Ethical Hacking.
CO-4 Student will be able to understand the Target & Prepare for the Test and report making integration.
CO-5 Student will perform EH with latest Tools, Practices & will be Blue Hat Hacker.
107
Internet-of-Things Systems
CS 703(D)
CO1 Understand the concepts of Internet of Things
CO2 Analyze basic protocols in wireless sensor network.
CO3 Develop IoT applications in different domain and be able to analyze their performance.
CO4 Demostrate basic IoT applications on embedded platform
108
.Net Framework and C# Programming
CO1 Apply the C# Programming fundamentals in Common Language Runtime environment and analyze the various C# programming concepts used for building console applications and windows forms.
CO2 Analyze the OOPs concepts and Advanced class construction with respect to C# programming
CO3 Analyze C# Assemblies, Thread and AppDomains and the different techniques to achieve concurrency and synchronization
CO4 Analyze the different ways to accomplish IO, Object serialization and remoting and methods in ADO.NET for data control in C# windows forms
CO5 Analyze ASP.NET architecture and web forms with web servers, server controls, data connectivity and usage of XML in ASP.NET
Facilities
.NET LAB: is a cross-platform implementation for running websites, services, and console apps on Windows, Linux, and macOS..net is open source on GitHub. .NET was previously called .NET Core.
.NET is a software development framework for building and running applications on Windows.
AWN/LAB.
VIRTUAL LAB.
PYTHON PROGRAMMING LAB. Programming lab facilitates to inculcate programming skills among the students. This lab is helps them to specialize in their concerned subjects. The lab is equipped with Optiplex 330 PC’s, Processor- Pentium Core II dual HDD- 160 GB 1 APC UPS providing power backup in case of power failure. This lab is meant for conducting labs mainly for programming languages like VB.Net, SQL Server Enterprise, Java, C++, and Graphics in C & Mini projects.
DSA LAB.
DBMS LAB.
DATA STRUCTURES LAB
OOPS LAB.
O.S. LSB: This lab is well equipped with the latest Optiplex Computer systems for the students. This lab providesexposure to students in the areas of Operating Systems & Systems Development. The students are taught UNIX, Red Hat Linux, Ms-Windows Operating Systems besides courses on Data Structures etc.
Operating System Lab is basically designed to teach the concepts of operating systems related to basics of LINUX and UNIX. For the same, the lab is outfitted with most up-to-date hardware and software. In addition to the syllabus, importance is also given to real time applications in order to enable students to use it on a day to day basis.
CN LAB: This lab is well established and fully equipped with Dell PC’s and Netsim, Ns2 Simulators. This lab is utilized by UG and MCA students and faculty members to conduct research in the area of wired and wireless networks. For UG students, we are emphasizing primarily on network protocols implementation and detailed study of TCP/IP protocol stack for computer communication. This lab emphasizes on experimental research in communication networking and in the recent years there have also been contributions in Wireless networks and Network security.
DAA LAB.
IOT LAB: IoT lab is at the forefront of developing both hardware including novel sensors, communication platform and analytics for Internet of Things (IoT) and smart environments.
Embedded systems
Ultra Low Power Applications
Analog System Design
Internet of Things (IOT)
Internet of Things is the next big innovation in the world of computers and the institute wants its students to be ready for the future.