84
Curriculum Framework under Choice Based Credit System (CBCS) and Syllabus for Outcome Based Education (OBE) in B.Sc (Digital & Cyber Forensic Science) degree program PEO, PO and PSO Degree Programme for the students admitted from the academic year 2019 2020 SREE SARASWATHI THYAGARAJA COLLEGE An Autonomous, NAAC Re Accredited with ‘AGrade, ISO 21001:2018 Certified Institution, Affiliated to Bharathiar University, Coimbatore, Approved by AICTE for MBA/MCA and by UGC for 2(f) & 12(B) status Palani Road, Pollachi 642107, Coimbatore Dist, Tamilnadu Email: [email protected] Website: www.stc.ac.in

Curriculum Framework under Choice Based Credit System

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Curriculum Framework under Choice Based Credit System (CBCS) and

Syllabus for Outcome Based Education (OBE) in

B.Sc (Digital & Cyber Forensic Science) degree program PEO, PO and PSO Degree Programme

for the students admitted from the academic year 2019 – 2020

SREE SARASWATHI THYAGARAJA COLLEGE

An Autonomous, NAAC Re – Accredited with ‘A’ Grade, ISO 21001:2018 Certified Institution, Affiliated to Bharathiar

University, Coimbatore, Approved by AICTE for MBA/MCA and by UGC for 2(f) & 12(B) status

Palani Road, Pollachi – 642107, Coimbatore Dist, Tamilnadu

Email: [email protected] Website: www.stc.ac.in

1

SREE SARASWATHI THYAGARAJA COLLEGE [AUTONOMOUS], POLLACHI

B.Sc (Digital & Cyber Forensic Science) degree program PEO, PO and PSO

PROGRAMME EDUCATIONAL OBJECTIVES (PEO)

Within a few years of obtaining B.Sc degree in Digital Cyber and Forensic Science, the student will be able to

PEO1: Graduates are prepared to be employed in the field of cyber security and IT industries by providing expected domain knowledge in Cyber Security and Digital Forensic Science PEO2: Graduates are provided with practical training, hands-on and project experience to meet the needs in the field of Digital and Cyber Security. PEO3: Achieve advanced knowledge in field of Cyber and Digital Forensic Science to excel professionally in the Industry with effective communication to work in a team. PEO4: Produce graduates who demonstrate ethical backgrounds and who can articulate the ethical and professional standards of the discipline. PROGRAMME OUTCOMES (PO) The students at the completion of the programme will be able to PO1: Investigate professionally with ethical responsibility as an individual as well as in

multifaceted teams with positive attitude

PO2: Adapt to sustain in emerging era in the field of digital forensic science and constantly

upgrade skills towards independent and lifelong learning.

PO3: Develop oral and written communication skills through the sequence of courses, with

particular attention to development of the ability to present technical information without

bias, at a variety of levels in criminal justice system.

PO 4: Design, develop models and provide solutions to cater the needs and to develop the

skills to take up research and higher studies in the field of digital forensic science.

PO 5: Inculcate skills to excel in the fields of digital forensic science and IT enabled services,

Criminology sectors, Teaching and Research.

2

PROGRAMME SPECIFIC OUTCOMES (PSO) At the completion of the programme, the students will be able to PSO1: Apply the knowledge gained during the course of the program with the ability to

apply diverse information to solve a real problem.

PSO2: Apply the knowledge of ethical and management principles required to work in a

team with stewardship of the society.

PSO3: Able to apply the knowledge gained during the course of the programme in the areas

of problem solving, analysis, critical thinking and analysis abilities

PSO4: Develop a conceptual understanding cyber laws, rules of evidence, legal system.

PSO5: To acquire the knowledge and to develop the ability to use diplomacy and

professionalism in group interactions throughout the sequence of courses.

Mapping the POs with PEO

POs/PEOs PEO1 PEO2 PEO3 PEO4 PO1 S M M M PO2 M S M S PO3 L M S M PO4 M M M S PO5 L M S S

S- Strong; L- Low; M-Medium

Mapping the PSOs with PEO

PSOs/PEOs PEO1 PEO2 PEO3 PEO4 PSO1 M S M M PSO2 S M M M PSO3 M S S S PSO4 M S S S PSO5 M S S S

S- Strong; L- Low; M-Medium

3

Curriculum Framework with Choice Based Credit System (CBCS) and Syllabus for

Outcome Based Education (OBE) in Bachelor of Science ( Digital & Cyber Forensic Science)

degree programme for the students admitted from the academic year 2019 – 20

The Choice Based Credit System (CBCS) preserves the identity, autonomy and uniqueness of

every programme and reinforce their efforts to be student centric in curriculum designing and skill

imparting.

Choice Based Credit System (CBCS): Choice based credit system (CBCS), provides a learning

platform wherein the student has the flexibility to choose their course from a list of electives, core,

allied, non-major courses, value-based courses, and skill-based courses. This is a student-centric

approach to learning or acquiring higher education. The curriculum with CBCS aims to achieve

and accomplish the students experience their choice of courses and credits for their horizontal and

vertical mobility

For BSc (DCFS) programme, a student must earn 140 credits as mentioned in the below table.

B.Sc (DCFS) 2019-2020

Summary of Courses Pattern and Credit Distribution in Choice Based Credit System

Part Curriculum Structure No. of Courses Credits to be earn I Languages 2 6 II English 2 6

III

Core (Major) Courses 21 81

Allied Courses 4 16

Core Electives 3 15

IV Non-Major Electives (NME) 2 4 Value Based Courses (VBC) 2 4 Skill Based Courses (SBC) 4 8

V Extension Activities 1 Grade Total 41 140 Extra Credit Courses (ECC) 4 8 Grand Total 45 148

4

Outcome Based Education:

“Outcome-Based Education” (OBE) is considered as a student-centered instruction model that

focuses on measuring student performance through outcomes. Outcomes include knowledge,

skills and attitudes. In the OBE model, the required knowledge and skill sets for a particular

degree is predetermined and the students are evaluated for all the required parameters (Outcomes)

during the course of the program.

Part – I : Languages: Part – 1 comprises of category namely

Tamil/Hindi/Malayalam/French

Part – II: English: Part – 2 comprises of the category namely English

Part – III: Core Courses: A set of major papers that include Theory, Practical, Allied, Core

Electives, Project and Internship in the major field of study selected by the student. Core courses

are mandatory in nature.

Part – IV: Non - Major Electives (NME): A set of non – major elective courses are offered as

choices of the students, outside of their major discipline. The courses other than the core and

allied shall be opted by the students as Non – Major Elective.

Value Based Courses (VBC): Courses of cross-cutting issues relevant to the current pressing

concerns both nationally and internationally such as gender, environment and sustainability,

human values and professional ethics, development of creative and divergent competencies.

Skill Based Courses (SBC): The courses offered as skill - based courses under Part IV of the

programme is aimed at imparting Advanced Skill of the programme. This comprises of four

courses from 3rd to 6th semesters.

Massive Open Online Courses (MOOC): According to the guidelines of UGC, the students are

encouraged to avail this option of enriching by enrolling themselves in the MOOC provided by

various portals such as SWAYAM, NPTEL, Coursera, etc. As per University Grants Commission

(UGC) notification published in the gazette of India about UGC (Credit Framework for Online

Learning Courses through SWAYAM) Regulation, 2016 on 19th July 2016, The Massive Open

Online Course (MOOC) through online portal is compulsory. The institute is transferring the

equivalent credit earned through SWAYAM on receipt of MOOCs completion certificate and it

shall incorporate these marks/credits in the overall mark sheet of the student.

Part – V: Extension Activities: Students shall be actively participated in the extension activities

such as National Service Scheme (NSS), Youth Red Cross (YRC), Sports, and Red Ribbon Club

(RRC). The extension activities are must for each student to take part in at-least in any one of

these activities for the fulfilment of the degree.

5

Scheme of Examination (Student admitted from 2019-20 onwards)

PART TYPE

OF COURSE

COURSE CODE NAME OF THE COURSE INS.HR CIA EXT TOT CR

SEMESTER – I I Language-1 Theory 18XXX1L10 Language – I 6 25 75 100 3 II English Theory 19GEN1L10 English – I 6 25 75 100 3 III Core1 Theory 19BFS1C10 Basics of Cyber Crime 4 25 75 100 4 III Core2 Theory 19BFS1C20 Programming in C 4 25 75 100 4 III Core3 Practical 19BFS1C30 Programming in C Lab 3 40 60 100 2 III Allied1 Theory - Allied – 1 5 25 75 100 4 IV VBC1 Theory - Value Based Courses – 1 2 50 - 50 2

Total for Semester – I 30 - - 650 22

SEMESTER – II

I Language -2 Theory 18XXX2L20 Language – II 6 25 75 100 3

II English Theory 19GEN2L20 English – II 6 25 75 100 3

III Core4 Theory 19BFS2C10 Information Security 4 25 75 100 4

III Core5 Theory 19BFS2C20 Operating System 4 25 75 100 4

III Core6 Practical 19BFS2C30 Operating System and Security Lab 3 40 60 100 2

III Allied2 Theory - Allied – 2 5 25 75 100 4

IV VBC2 Theory - Value Based Courses 2 50 - 50 2

Total for Semester – II 30 - - 650 22

SEMESTER – III

III Core7 Theory 19BFS3C10 Python Programming 5 25 75 100 5

III Core8 Theory 19BFS3C20 Network Security & Ethical Hacking 5 25 75 100 5

III Core9 Practical 19BFS3C30 Hacking & Network Security Lab 5 40 60 100 5

III Core10 Practical 19BFS3C40 Python Programming Lab 4 40 60 100 2 III Allied3 Theory 19BCH3A10 Allied – 3 5 25 75 100 4

IV SBC1 Theory 19BFS3S10 Digital Image Processing & Biometric Security 4 20 55 75 2

IV NME1 Theory - NME Course – 1 2 50 50 2

Total for Semester – III 30 - - 625 25

SEMESTER – IV

III Core11 Theory 19BFS4C10 Forensic audio-video analysis and speaker identification

5 25 75 100 5

III Core12 Theory 19BFS4C20 Cyber Forensic 5 25 75 100 5

III Core13 Practical 19BFS4C30 Cyber Forensic Lab 4 40 60 100 4

III Core14 Practical 19BFS4C40 Audio-video analysis Lab 5 40 60 100 5 III Allied4 Theory - Allied – 4 5 25 75 100 4 IV SBC2 Theory 19BFS4S20 Social Media Forensics 4 20 55 75 2

IV NME2 Theory - NME Course – 2 2 - 50 50 2

Total for Semester – IV 30 - - 625 27

6

SEMESTER – V

III Core15 Theory 19BFS5C10 Cloud & Web Security 5 25 75 100 5

III Core16 Theory 19BFS5C20 Penetration & Vulnerability Testing 6 25 75 100 4

III Core17 Practical 19BFS5C30 Penetration & Vulnerability Testing Lab 6 40 60 100 3

III CE1 Theory - Core Elective – 1 5 25 75 100 5

IV SBC3 Theory 19BFS5S30 Free and Open Source Soft wares (FOSS)

4 20 55 75 2

IV SBC4 Practical 19BFS5S40 FOSS Lab 4 30 45 50 2

V EAC 18ETN5XXX

Extension Activity National Service Scheme / Sports

GRADE

Total for Semester – V 30 - - 525 21

SEMESTER – VI

III Core18 Theory 19BFS6C10 Cyber Warfare & Cyberspace Operations

4 - 100 100 2

III Core19 Theory 19BFS6C20 Malware Analysis and Cyber threat Intelligence

6 25 75 100 5

III Core20 Practical 19BFS6C30 Mobile & Wireless Device Forensics Lab 6 40 60 100 4

III Core21 Theory 19BFS6C40 Bank Frauds & Forensics Accounting

4 25 75 100 2

III CE2 Theory - Core Elective – 2 5 25 75 100 5

III CE3 Theory - Core Elective – 3 5 25 75 100 5

Total for Semester – VI 30 - - 600 23

Total 180 - - 3700 140

ECC - MOOC (4 courses) - - - - 8

Grand Total 180 3700 148 $ INS.HR = Instructional Hours

**Note: As per UGC guidelines SWAYAM Courses are made compulsory for students of BSc DCFS programme admitted during 2019 – 20 onwards. Every student has to compulsorily complete 4 SWAYAM courses and earn 8 credits (2 Credits per course) to become eligible for the award of degree. Credits will appear in the consolidated mark sheet only. This Regulation regarding SWAYAM-MOOC course was subsequently amended in Standing Committee meeting held on 9th Dec, 2020 as … As per UGC Guidelines Online Courses are made compulsory for the students of all Under Graduate & Post Graduate programmes admitted during 2019-20 and onwards. Every student has to compulsorily complete 2 MOOC courses and earn 4 credits (2 credits per course) during the course of study to become eligible for the award of degree. Credits will appear only in the consolidated mark sheet.

7

List of Part – 1 Language Courses (CBCS) S.No. Semester Type of course Course Code Course Name

1 I Theory 18TAM1L10 Tamil – I

2 I Theory 18HIN1L10 Hindi – I

3 I Theory 18MAL1L10 Malayalam – I

4 I Theory 18FRE1L10 French – I

5 II Theory 18TAM2L20 Tamil – II

6 II Theory 18HIN2L20 Hindi – II

7 II Theory 18MAL2L20 Malayalam – II

8 II Theory 18FRE2L20 French – II List of Allied Courses (CBCS)

S.No. Semester Type of course Course Code Course Name

Allied – I

1 I Theory 19BMAGAI0 Fundamentals of Statistics Allied – II

1 II Theory 19BMAGAJ0 Discrete Structures Allied – III

1 III Theory 19BCH3A10 Forensic Chemistry Allied – IV

1 IV Theory 19BPH4A10 Forensic Physics List of Value Based Courses

S.No. Semester Type of course Course Code Course Name

1 I Theory 18DHE1V10 Environmental Studies

2 II Theory 18DHE2V20 Value Education and Human Rights

List of Non – Major Electives (CBCS) S.

No. Semester Type of course

Course Code Course Name Offering

Department 1 III Theory 18TAM3N10 Basic Tamil – I

Tamil 2 III Theory 18TAM3N20 Advanced Tamil – I 3 IV Theory 18TAM4N30 Basic Tamil II 4 IV Theory 18TAM4N40 Advanced Tamil II 5 III Theory 19BEN3N10 Basic English for Competitive Examinations - I

English 6 IV Theory 19BEN4N20 Basic English for Competitive Examinations II 7 III Theory 19BMA3N10 Numerical Ability-I

Mathematics 8 IV Theory 19BMA4N20 Numerical Ability-II 9 III Theory 19BPH3N10 Physics of Sports

Physics 10 IV Theory 19BPH4N20 Physics of Music

8

11 III Theory 19BCH3N10 Chemistry for everyday life -1 Chemistry

12 IV Theory 19BCH4N20 Chemistry for everyday life -2 13 III Theory 19BSY3N10 Psychology Life Skills-I

Psychology 14 IV Theory 19BSY4N20 Psychology Life Skills-II 15 III Theory 19BCM3N10 Practical Banking

Commerce 16 IV Theory 19BCM4N20 Capital Market 19 III Theory 19BBA3N10 Customer Relationship Management

Management 20 IV Theory 19BBA4N10 Rural Marketing 21 III Practical 19BCS3N10 Excel Communications and Slide Logic Computer

Science 22 IV Practical 19BCS4N20 Web Design for Non-Designers 23 III Theory 19BFS3N10 Risk & Threat Management

DCFS 24 IV Theory 19BFS4N20 Forensics Auditing List of Core Elective Courses (CBCS)

S.No. Semester Elective Type of course Course Code Course Name

Electives of B.Sc (CS)

1 V I Theory 18BCS5EA0 Object Oriented System Development 2 V I Theory 18BCS5EB0 Mobile computing and WAP

3 VI II Theory 18BCS6EA0 Software Testing and Software Quality Assurance

4 VI II Theory 18BCS6EB0 Network Protocols 5 VI III Theory 18BCS6EC0 Software Project Management 6 VI III Theory 18BCS6ED0 Network Security

Electives of BCA

1 V I Theory 18BCA5EA0 E- Commerce and M-Commerce 2 VI II Theory 18BCA6EA0 Business Intelligence 3 VI III Theory 18BCA6EB0 Cloud Computing

Electives of B.Sc(CT)

1 V I Theory 18BCT5EA0 Computer Installation and Servicing 2 VI II Theory 18BCT6EA0 Mastering LAN and Troubleshooting

3 VI III Theory 18BCT6EB0 Embedded Systems and Real Time Operating Systems

Electives of B.Sc(IT)

1 V I Theory 18BIT5EA0 Data Mining & Data Warehousing 2 VI II Theory 18BIT6EA0 Big Data Analytics 3 VI III Theory 18BIT6EB0 Internet of Things

9

Electives of B.Sc(DCFS)

1 V I Theory 19BFS5EA0 Machine Learning and AI Kernel Level Security Disaster Recovery Plan

2 VI II Theory 19BFS6EA0 Block Chain & IoT Security Incidence Response & Management Risk Assessment & Security Audit

3 VI III Theory 19BFS5EB0 Enterprise Security & Management SCADA & DCS Security Windows & Linux Forensics Analysis

Electives of B.Sc. (AI&ML)

1 V I Theory 20BAM5EA0 Neural Networks Digital Image Processing Wireless Network

2 VI II Theory 20BAM6EA0 Fuzzy Logic Pattern Recognition Information Security

3 VI III Theory 20BAM6EB0 Embedded Systems Advanced data mining Social and web media analytics

List of Skill Based Courses S.No. Semester Type of course Course Code Course Name

1 III Theory 19BFS3S10 Digital Image Processing & Biometric Security

2 IV Theory 19BFS4S20 Social Media Forensics

3 V Theory 19BFS5S30 Free and Open Source Soft wares (FOSS)

4 V Practical 19BFS5S40 FOSS Lab The Courses “Yoga” is offered as Capability Enhancement Course. Certificate with grade will be awarded according to the marks obtained.

10

List of Core Courses:

S.No. Semester Core Type of course Course Code Course Name

1 I Core1 Theory 19BFS1C10 Basics of Cyber Crime 2 I Core2 Theory 19BFS1C20 Programming in C 3 I Core3 Practical 19BFS1C30 Programming in C Lab 4 II Core4 Theory 19BFS2C10 Information Security 5 II Core5 Theory 19BFS2C20 Operating System 6 II Core6 Practical 19BFS2C30 Operating System and Security Lab 7 III Core7 Theory 19BFS3C10 Python Programming 8 III Core8 Theory 19BFS3C20 Network Security & Ethical Hacking 9 III Core9 Practical 19BFS3C30 Hacking & Network Security Lab 10 III Core10 Practical 19BFS3C40 Python Programming Lab

11 IV Core11 Theory 19BFS4C10 Forensic audio-video analysis and speaker identification

12 IV Core12 Theory 19BFS4C20 Cyber Forensic 13 IV Core13 Practical 19BFS4C30 Cyber Forensic Lab 14 IV Core14 Practical 19BFS4C40 Audio-video analysis Lab 15 V Core15 Theory 19BFS5C10 Cloud & Web Security 16 V Core16 Theory 19BFS5C20 Penetration & Vulnerability Testing 17 V Core17 Practical 19BFS5C30 Penetration & Vulnerability Testing Lab 18 VI Core18 Theory 19BFS6C10 Cyber Warfare & Cyberspace Operations

19 VI Core19 Theory 19BFS6C20 Malware Analysis and Cyber threat Intelligence

20 VI Core20 Practical 19BFS6C30 Mobile & Wireless Device Forensics Lab 21 VI Core21 Theory 19BFS6C40 Bank Frauds & Forensics Accounting

11

SEMESTER – I SEMESTER – I

Course Code Type Course Name Category Lecture (L)

Tutorial (T)

Practical (P) Credit

18TAM1L10 Language - I Tamil-I Language 75 - - 3

Preamble: jkpo; ,yf;fpaj;jpy; cs;s Neubj;jd;ik> epfo;fhy r%f mirTfs;>

nkhopeil Kjypatw;iw khzth;fs; vspjpy; tpsq;fpf; nfhs;Sk; tifapy; Kjy; gUtj;Jf;fhd

ghlq;fs; njhpT nra;ag;gl;Ls;sd. ,d;iwa ,yf;fpaq;;fs; jUk; gilg;gDgtj;jpd; ePl;rpahfg;

nghJf; fl;Liufs;> fbjk;> ftpij> rpWfij gilg;gjw;fhd gapw;rpfisAk; jkpo;g;;ghlk;

toq;FfpwJ.

Prerequisite: Nkdpiyg;gs;sp Kba fw;wtw;iwg; gFj;J njhFj;J MuhAk; Nghf;fpy;

ghlj;jpl;lk; mikf;fg;gl;Ls;sJ.

khdpl kjpg;Gfis czUk; tifapYk;> Nghl;bj;Njh;Tfis

vjph;nfhs;Sk; epiyapYk; ‘jkpo;’ - gFjp - I mikf;fg;gl;Ls;sJ.

gpioapd;wp> Ngr> vOj MuhAk; Kaw;rpf;Fg; gapw;rp jug;gLfpwJ.

SYLLABUS:

Unit Course contents Instructional Hours

I

myF I ftpijfs;

;

ghujpahh; ghuj [dq;fspd; jw;fhy epiyik

ghujpjhrd; ve;ehNsh? ftpkzp ngz;fspd; chpikfs; cLkiy ehuhazftp ghj;Jf;Nfhq;f rpw;gp ftpij Kbatpy;iy K.Nkj;jh ,e;jpa rPij GtpauR je;ij kfw;fhw;Wk; cjtp mg;Jy;fhjh; %tz;z K$h;j;jr; Nriy Njdurd; re;ijf;Fg;Nghd mk;kh Mz;lhs; gphpajh;rpdp vd; ,wg;Gf;Fg; gpd;dhd cyfk; jkpor;rp jq;fghz;bad; rpwg;G tpUe;jpdh; m.ntz;zpyh Njtijiag;Nghy i`f;$ ftpijfs; Ie;J

17

II

myFIIrpWfijfs;

F. g. uh[Nfhghyd; TpbAkh

eh. ghh;j;jrhujp tyk;Ghpr; rq;F

16

12

ty;ypf;fz;zd; Ch;tyk; Nghd nghpa kD\p rp.R. nry;yg;gh nehz;bf;Foe;ij ,sir v];. Re;juk; gypahLfs; `uzp %f;Fj;jp ypq;fd; Njhg;gpw;Fs; rpy jdpkuq;fs; R. jkpo;r;nry;tp ajhh;j;jk;

III myFIIIGjpdk; gpugQ;rd; - Kjy; kioj;Jsp 15

IV

myFIV ,yf;fpa tuyhW

1. ftpij ,yf;fpaj;jpd; Njhw;wKk; tsh;r;rpAk; 2. rpWfijapd; Njhw;wKk; tsh;r;rpAk; 3. Gjpdj;jpd; Njhw;wKk; tsh;r;rpAk;

12

V

myFV,yf;fzk;

gapw;rp mspj;jy; - ey;y jkpopy; vOJtJ vg;gb? - nkhopj;jpwd; tsh;j;jy;

1. vOj;J khw;wj;jhy; Vw;gLk; gpiofs; 2. thf;fpaq;fspy; Vw;gLk; gpiofs; 3. ty;ypdk; kpFk;> kpfh ,lq;;fs; 4. nky;nyOj;J kpFk; ,lq;fs; 5. ,yf;fzf; Fwpg;G

rhpahd nrhw;fisf; fz;lwpjy; ftpij vOJjy;> fbjk;> tpz;zg;gk; tiujy;

15

Total 75

Course Outcomes (COs)

On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level

CO1 ,f;fhy ,yf;fpaq;fspd; gad;fis mwptpj;jypd; ntspg;ghlhf> ftpijg; ghpkhzq;fs;> gilg;Gfs; Fwpj;j mbg;gil nra;jpfis czh;e;J nfhs;Sjy;.

K1

CO2 jkpoh;fspd; gz;ghl;Lf; $WfisAk; gpd;dzpiaAk; ntspg;gLj;Jk; tpjkhfr; rpWfijfs;> Gjpdk; rhh;e;j fUj;Jfis Ghpaitj;jy;;. K2

CO3 eilKiwapy;> jkpiog; gpioapd;wp vOj cjTjy;. ftpij> fbjk;> fij vOJk; jpwikia tsh;j;jy;. K3

Mapping Course Outcomes with Programme Outcomes& Programme Specific Outcomes: COs/POs/

PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 S S M L L S S L L L CO2 S S M L L S S L L L CO3 S S S L L M S L L L

S- Strong; L- Low; M-Medium

13

SEMESTER – I

HINDI PAPER - I

Course Code:18HIN1L10

(Prose, Non-detailed, Grammar & Translation, Comprehension)

1. PROSE: NUTHAN GADYA SANGRAH Editor: Jayaprakash (Prescribed Lessons – only 6) Lesson 1 – Bharathiya Sanskurthi Lesson 3 – Razia Lesson 4 – Makreal Lesson 5 – Bahtha Pani Nirmala. Lesson 6 – Rashtrapitha Mahathma Gandhi Lesson 9 – Ninda Ras. Publisher : Sumitra Prakashan Sumitravas,

16/4, Hastings Road, Allahabad – 211 001.

2. NON DETAILED TEXT : KAHANI KUNJ Editor : Dr. V.P. Amithab. (Stories 1-6 only) Publisher : Govind Prakashan Sadhar Bagaar, Mathura,Uttar Pradesh – 281 001. 3. GRAMMAR : SHABDHA VICHAR ONLY (NOUN, PRONOUN, ADJECTIVE, VERB, TENSE, CASE ENDINGS) Theoretical & Applied. Book for Reference : Vyakaran Pradeep by Ramdev Publisher : Hindi Bhavan, 36, Tagore Town Allahabad – 211 002. 4. TRANSLATION : English – Hindi only. ANUVADH ABHYAS – III (1-15 lessons only) Publisher : DAKSHIN BHARAT HINDI PRACHAR SABHA CHENNAI – 17. 5. COMPREHENSION : 1 Passage from ANUVADH ABHYAS – III (16-30) DAKSHIN BHARATH HINDI PRACHAR SABHA CHENNAI-1

14

SEMESTER – I

MALAYALAM PAPER - I

Course Code: 18MAL1L10

Prose, Composition & Translation This paper will have the following five units:

Unit I & II Novel Unit III & IV Short story Unit V Composition & Translation

Text books prescribed: Unit I & II Pathummayude Aadu - Vaikam Muhammed Basheerr (D.C.Books, Kottayam, Kerala) Unit III & IV Ente Priyappeta Kadhakal – Akbar Kakkattil) (D.C. Books, Kottayam, Kerala) Unit V Expansion of ideas, General Eassay and Translation. (A simple passage from English about 100 works to Malayalam)

Reference Books:

1. Malayala Novel Sahithya Charitram-K.M.Tharakan (N.B.S.Kottayam) 2. Cherukatha Innale Innu-M.Achuyuthan (D.C Books, Kottayam) 3. Sahithya Charitram Prasthanangalilude- Dr.K.M George, (D.C.Books Kottayam) 4. Malayala Sahithya vimarsam-Sukumar Azhee kode (D.C.books)

SEMESTER – I

FRENCH PAPER - I Credits : 3 Course Code : 18FRE1L10 Hours per Week: 6 Total Instructional hours: 75 Prescribed text : ALORS I Units : 1 – 5 Authors : Marcella Di Giura Jean-Claude Beacco Available at : Goyal Publishers Pvt Ltd 86, University Block Jawahar Nagar (Kamla Nagar) New Delhi – 110007.

Tel : 011 – 23852986 / 9650597000

15

SEMESTER – I

Course Title: English Paper-I

Course Code Course Name

Category Lecture (L) Tutorial (T) Practical (P) Credit

19GEN1L10 English Paper-I

Part-II 70 5 - 3

Preamble:This course aims at facilitating the student to understand the nuances of English Language through literary texts and Grammar Prerequisite: Basic knowledge in English

Syllabus

Unit Course Contents Instructional Hours

I

Prose :How I became a Public Speaker-G.B.Shaw Poetry: The Ballad of Father Gilligan W.B.Yeats Short story:The Umbrella Man-Roald Dahl Grammar: Parts of Speech, Prefix, suffix

15

II

Prose: The Conjurer’s Revenge-Stephen Leacock Poetry: From Homecoming-R.Parthasarathy Short Story: The Bird-Amar Jalil Grammar: Sentence pattern SV,SVDO,SVDOIO,SVC,SVOAVoice

15

III

Prose: Principles of Good Writing-L.A.Hill Poetry: The Nose-Ian Crichton Smith Short Story: Little Girls Wiser than Men-Leo Tolstoy Grammar: Tenses

15

IV

Biography Bill Gates Kiran Bedi Charlie Chaplin Grammar:Idioms and phrases

15

V

Filling up the Forms i) Railway Reservation& Cancellation Forms ii) Bank-Challan iii) Convocation Form iv) Money Order Form Conversational Practice:(for Internal Assessment only) Common Greetings Expressions of emothions-joy and surprise, wishes,grief,insult,warning, anger,commands,requests,instructions,invitations, suggestions

15

Total 75 1. Text Book(s): English Paper I, Department of English, Sree Sarawathi Thyagaraja College,2019. 2. Reference Book(s) 3. Sparkles English for Communication, Board of Editors, Emerald Publishers,2015

Course Designer: BoS Chairman Dr. P.Renuga, AssistantProfessor, Dr. Vennila Nancy Christina Dept of English, STC Course Outcomes (COs) On successful completion of this course the students will be able to:

16

CO Number Course Outcome (CO) Statement Blooms Taxonomy Knowledge Level

CO1 Understand the fundamentals of Grammar K1 CO2 Understand simple literary texts. K1 CO3 Apply the reading skills and practice it K3 CO4 Develop the quality of practical application of Grammar K3

Mapping with programme Outcome

COs/Pos PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 M S M L L M M M L L

CO2 M S S L L M M L L L

CO3 M S S L L S M M L L

CO4 S S S L L S L M L L S –Strong; L –Low; M –Medium

17

SEMESTER – I

Course Code Type Course Name Category Lecture (L) Tutorial (T) Practical (P) Credit

19BFS1C10 Core Basics of Cyber

Crime

Concept 45 5 - 3

Preamble: To make the students to understand the basic concepts of Cyber Crime, Cyber Security, Boolean algebra,

Malware and Back door attacks and to acquire the knowledge on the Basics of Cyber Security.

Prerequisite: Knowledge in Logical Skills

Syllabus:

Unit Course contents Instructional Hours

I

Introduction to Cyber Crime : Introduction - Cyber Crime - Definition and Origins of the Word-Cyber Crime and Information Security - Who are Cyber criminals? - Classification of Cyber Crimes - The Legal perspectives - An Indian Perspective

9

II Cyber offenses: How Criminals Plan them: Introduction - How criminals plan the attacks - Social Engineering - Cyberstalking - Cybercafe and cybercrimes - Botnets- Attack vector.

9

III

Cyber Crime: Mobile and Wireless Devices: Introduction - Proliferation of Mobile and Wireless Devices - Trends in Mobility - Credit card frauds in mobile and wireless computing Era - Security challenges posed by mobile devices - Registry setting for mobile devices - Authentication service security - Attacks on Mobile/Cell phones.

12

IV

Mobile Devices : Security implications for organizations - Organizational measures for handling mobile -Organizational security policies and measure in mobile computing era- Laptops Tools and Methods used in Cyber Crime: Introduction - Proxy servers and Anonymizers - Phishing - Password Cracking-Key loggers and Spywares - Virus and Worms - Trojan Horse and Backdoors - steganography

10

V

Phishing and Identity Theft: Phishing –Methods – Techniques – Spear phishing – Types of phishing scams – Phishing Toolkits and spy phishing – Phishing counter measures. Identity Theft: Personally identifiable information – Types - Techniques – countermeasures – How to efface your online identity.

10

Total 50

Text Book(s): 1) Cyber Security Understanding Cyber Crimes, Computer Forensics and Legal Perspectives by Nina

Godbole, SunitBelapure Reference book(s):

1) Fundamental Of Cyber Security (Principles, Theory and Practices) by MayankBhushan , Rajkumar Singh Rathore , AatifJamshed

2) Cyber security: Managing Systems, Conducting Testing, and Investigating Intrusions by Thomas J. Mowbray

18

Focus of Course: Employability

e-Resource/e-Content URL: • Vidyamithra Portal : http://vidyamitra.inflibnet.ac.in/ • NPTEL Course Designer : Mr. S.Dhanaraj Dr.S.Sasikala PC , Dept. of DCFS, BoS Chairman

Course Outcomes (COs) On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO1 Define cybercrime and its classification K1 CO2 Outline the offenses K2 CO3 Summaries the different types of frauds K2 CO4 Make use of the tools to identify cyber crime K3

Mapping Course Outcomes with Programme Outcomes and Programme Specific Outcomes: COs/POs/

PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 L L L M M M L M M M

CO2 M L M M M M L M M M

CO3 L M M S M M M S M M

CO4 L M S M S S M S M S

S –Strong; L –Low; M –Medium

19

SEMESTER – I

Course Code Type Course Name Category Lecture

(L) Tutorial

(T) Practical

(P) Credit

19BFS1C20 Core Programming In C Application 45 5 - 3

Preamble: This course provides the student with strong foundation on programming concepts and its application.

Prerequisite: Mathematical and logical skills.

SYLLABUS:

Unit Course contents Instructional Hours

I

Introduction to C: Structure of a C Program - Programming Rules - The C Character Set - The C Keywords - Identifiers – Constants. Variables: Rules for Defining Variables - Declaring Variables - Data Types - Type Conversion - Arithmetic Operators - Relational Operators - Logical Operators - Bitwise Operators - Comma and Conditional Operator.

09

II

Input and Output in C: Formatted Functions - Unformatted Functions. Decision Statements: If Statements - The Break Statement - The Continue Statement - The GOTO Statement - The Switch Statement. Looping Statements: For Loops - The While Loop - The Do-While Loop - Bohm and Jacopini’s Theory.

09

III

Arrays: Array Initialization - Definition of Array - Characteristic of Array - Two-Dimensional Array - Three or Multi-Dimensional Arrays. Functions: Basics of a function – Function Definition – The return statement - Types of Functions - Call by Value - Call by Reference - Recursion. Strings: Introduction - String Standard Functions.

11

IV

Pointers: Introduction - Features of Pointers - Pointer Declaration - Array of Pointers - Pointers to Pointers. Structure and Union: Introduction - Features of Structures - Declaration & Initialization of Structures - Array of Structures - Pointer to Structures – Union.

11

V Files: Introduction - Streams & File Types - Steps for File Operations - File I/O - Structures Read & Write - Other File Functions - Command Line Arguments - Environment Variables - I/O Redirection

10

Total 50

Text Book(s): 1. Ashok N.Kamthane,Amit Ashok Kamthane, “Programming in C”, Pearson India Education Services

Pvt, Ltd, Third Edition, 2019. Reference book(s): 1. YaeshwantKanitkar, “Let Us C”, BPB publications, New Delhi, 16th Edition, 2018. 2. E. Balagurusamy, “Programming in ANSI C”, TMH Publishing Pvt., Ltd., 6th Edition, 2013. 3. Byron S. Gottfried, “Programming with C”, TMH Publishing Pvt., Ltd., 3rd Edition, 2013. 4. Paul Deitel, Harvey Deitel “, C How to Program”,PearsonIndia Education Services Pvt, Ltd, 6th Edition,

2010.

Focus of Course: Employability

e-Resource/e-Content URL: https://nptel.ac.in/courses/106104128/ https://www.udemy.com/c-programming-for-beginners Course Designer : Mr. S.Dhanaraj Dr.S.Sasikala PC , Dept. of DCFS, BoS Chairman

20

Course Outcomes (COs) On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement Blooms Taxonomy

Knowledge Level CO1 Define the structure and fundamental concept of C programming. K1 CO2 Demonstrate various control statements. K2 CO3 Construct program using arrays, functions, structures and union. K3 CO4 Implement pointer and file operations for any given application. K3

Mapping Course Outcomes with Programme Outcomes &Programme Specific Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO

4 PSO5

CO1 L M M S M M L S M M

CO2 L M M M M M L M M M

CO3 M M M S M S M S M M

CO4 M M S M M S M S M M

S –Strong; L –Low; M –Medium

21

SEMESTER - I

Course Code Type Course Name Category Lecture

(L) Tutorial

(T) Practical (P) Credit

19BFS1C30 Core Programming In C Lab Practical - 5 30 3

Preamble: Students will be able to apply logic which helps to develop programs, applications in C.

Prerequisite: Basic programming skills and logical thinking.

Syllabus:

Ex. No Course contents Instructional

Hours

Implementation of Control structures

1 Develop a C Program to find the sum and average of a mark. 2

2 Develop a C program using Switch case. 2

Implementation of Loopings

3 Develop a C program to find the Fibonacci series for a given limit 2

4 Develop a C program to check whether the given number is prime or not and display the n range of prime numbers. 2

Implementation of Functions

5 Develop a C program to illustrate recursive function. 3

6 Develop a C program to find the palindrome in a given sentence 3

7 Develop a C program to manipulate strings using string functions. 3

8 Develop a C Program using Functions 2

Implementation of Pointers

9 Develop a C program to swap two integers using pointers. 2

10 Develop a C program using Array of Pointers. 2

Implementation of Structures

11 Develop a C program using the structures. 2

12 Develop a C program using Array of Structures. 2

Implementation of Files

13 Develop a C program to calculate electricity bill using files. 2

Implementation of Security

14 Develop a C program to encrypt and decrypt a string 3

15 Develop a C program to encrypt and decrypt Files 3

Total 35

Reference Book: 1. Ashok N.Kamthane, Amit Ashok Kamthane, “Programming in C”, Pearson India Education Services Pvt, Ltd,

Third Edition, 2019.

22

Recommended Tools to be used: C Editor

Focus of Course: Employability

Course Designer : Mr. S.Dhanaraj Dr.S.Sasikala PC , Dept. of DCFS, BoS Chairman

Course Outcomes (COs) On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO1 Apply the fundamental concepts of C programming & Data Structures K3 CO2 Implement various control statements K3 CO3 Develop C programs to implement arrays, function, structures, pointers K3 CO4 Solve analytical problems using Data Structure programming paradigm K4

Mapping Course Outcomes with Programme Outcomes and Programme Specific Outcomes:

COs/POs/

PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 L M M S M M M M M M

CO2 L M M M M M M M M M

CO3 M M S S S S M S M M

CO4 M M S S M S M S S S

S –Strong; L –Low; M –Medium

23

SEMESTER – I

Course Code Course Name Category Lecture (L) Tutorial (T) Practical (P) Credit

19BMAGAI0 Fundamentals of Statistics Employability 48 12 - 5

Preamble: To facilitate the learner to have sound knowledge of various measures of central tendency & Dispersion application of correlation & Regression, importance of Index numbers and Time series

Prerequisite: Basic knowledge of statistics taught at HSC level

SYLLABUS

Unit Course contents Instructional Hours

I

Measure of Central Tendency :Averages- Introduction- Requisites of a good average or Measure of Central Tendency –Various Measure of Central Tendency-Arithmetic Mean: Step Deviation Method for Computing Arithmetic Mean – Merits and Demerits of Arithmetic Mean –Median: Calculation of Median – Merits and Demerits of Median Mode : Computation of Mode -– Merits and Demerits of Mode Measures of Dispersion : Introduction-Range-Quartile deviation or Semi Quartile deviation- Mean Deviation -Standard Deviation-Standard Deviation of the combined Series –Coefficient of Variation (Derivations excluded)

12

II

Correlation : Introduction- Types of Correlation-Methods of studying Correlation -Scatter Diagram – Karl Pearson’s Coefficient of Correlation – Properties of Correlation Coefficient - Rank Correlation method –Computation of Rank Correlation Coefficient (Derivations excluded)

12

III

Linear Regression Analysis : Introduction-Linear and nonlinear Regression – Lines of Regression-Deviation of line of Regression of y on x- line of Regression of x on y-Theorems on Regression Coefficients-To find the Mean values( , ) from the Two lines of Regression- To find the Regression Coefficients and The Correlation Coefficient from the Two lines of Regression (Derivations excluded)

12

IV

Time Series Analysis: Introduction -components of time series– Secular Trend-Short Term Variations – Random or Irregular Variations-Analysis of Time series-Mathematical Models for Time series-Measurement of Trend – Graphic or free Hand Curve fitting by the principle of Least squares-Conversion of Trend Equation

12

V Method of Moving Averages-Measurement of Seasonal Variations –Method of Simple Averages-Ratio to Trend Method-Ratio to Moving Average Method (Derivations excluded)) 12

Total 60

Text Book: Theory -20%,Problems -80% S.C.Gupta ,Indira Gupta., ”Business Statistics “ Himalaya Publishing House Mumbai Reprint 2007 UNIT I: [Page No:5.1-5.12,5.20-5.24,5.33-5.36,6.1-6.7,6.9-6.13,6.16-6.276.38 Sec- 5.1.5-5.4.3,5.6-5.6.2,5.7-5.7.3,6.1-6.11] UNIT II:[Page No:8.1-8.5,8.6-8.10,8.30,8.31-8.36,Sec-8.1,8.1.1,8.2-8.4,8.7,8.7.2] UNIT III :[Page No:9.1-9.5,9.6-9.14,9.18-9.21,Sec-9.1-9.3.9.3.2,9.4,9.4.1,9.5,9.6] UNIT IV :[Page No:11.1-11.24, Sec-11.1 -11.5.4] UNITV:[Page No 11.29 – 11.35,11.37 -11.45 Sec 11.5.6 -11.6.3] Reference Book(s):

1. Gupta, S.C., Kapoor, V.K., “Elements of Mathematical Statistics”, Sultan Chand & Sons, New Delhi. 2. Gupta C.B, Vijay Gupta, “An introduction to Statistical Methods”, Vikas publishing house private

limited. 3. R.S.N.Pillai, Bagavathi, Statistics theory & Practice, S. Chand company PVT Ltd, New Delhi , Reprint

2015. 4. P.R. Vittal, Mathematical Statistics, MarghamPublications, 2004.

Course Designer : R.Karpagam Prof.P.Sivasamy Assistant Professor, Dean Dept. of Mathemetics STC

24

Course Outcomes (COs)

On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO 1 To list various measures of Central Tendency, Dispersion and components of Time

Series. K1

CO 2 To learn the concepts of correlation K1

CO 3 To learn the concepts of Regression and Index Numbers K2

CO 4 To learn the concepts of Index Numbers and Solve the problems in Index Numbers K3

CO 5 To apply these concepts in statistical tools. K3

Mapping with Program Outcomes:

COs/Pos PO1 PO2 PO3 PO4 PO5 PO6 PO7

CO1 L M L M M M M

CO2 S M S L M M S

CO3 M S L M M S M

CO4 M M L M M M S

CO5 S M M M M S M

S – Strong; L – Low; M – Medium

25

SEMESTER – I

Course Code Type Course Name Category Lecture (L) Tutorial (T)

Practical (P) Credit

18DHE1V10 VBC1 Environmental

Studies

- 27 - - 2

1.1. Definition, scope and importance 1.2. Need for public awareness 1.3. Natural resources 1.3.1. NATURAL RESOURCES AND ASSOCIATED PROBLEMS 6 Hours a. Forest resources: use and over-exploitation, deforestation, case studies. Timber extraction, mining, dams and their

effects on forests and tribal people. b. Water resources: use and over- utilization of surface and ground water, floods, drought, conflicts over water, dams-

benefits and problems c. Mineral resources: Use and exploitation, environmental effects of extracting and using mineral resources, case

studies. d. Food resources: world food problems, changes caused by agriculture and overgrazing, effects of modern

agriculture, fertilizer-pesticide problems, water logging, salinity, case studies. e. Energy resources: growing energy needs, renewable and non-renewable energy sources, use of alternate sources.

Case studies. f. Land resources: land as a resource, land degradation, man induced landslides, soil erosion and desertification. 1.3.2. Role of an individual in conservation of natural resources. 1.3.3. Equitable use of resources for sustainable lifestyles. 2. ECOSYSTEMS 5 Hours 2.1 Concept of an ecosystem. 2.2 Structure and function of an ecosystem. 2.3 Producers, consumers and decomposers. 2.4 Energy flow in the ecosystem. 2.5 Ecological succession. 2.6 Food chains, food webs and ecological pyramids. 2.7 Introduction, types, characteristic features, structure and function of the following ecosystem: -

a. Forest ecosystem. b. Grassland ecosystem. c. Desert ecosystem. d. Aquatic ecosystems (ponds, streams, lakes, rivers, oceans, estuaries)

3. BIODIVERSITY AND ITS CONSERVATION 5 Hours 3.1 Introduction – Definition: genetic, species and ecosystem diversity. 3.2 Biogeographical classification of India. 3.3 Value of biodiversity: consumptive use, productive use, social, ethical. Aesthetic and option values 3.4 Biodiversity at global, National and local levels. 3.5 India as a mega –diversity nation. 3.6 Hot-spots of biodiversity. 3.7 Threats to biodiversity: habitat loss, poaching of wildlife man-wildlife conflicts. 3.8 Endangered and endemic species of India. 3.9 Conservation of biodiversity: In-situ and Ex-situ conservation of biodiversity. 4. ENVIRONMENTAL POLLUTION 5 Hours 4.1 Definition Causes, effects and control measures of: -

1. Air pollution 2. Water pollution

26

3. Soil pollution 4. Noise pollution 5. Thermal pollution

4.2 Solid Waste Management: Causes, effects and control measures of urban and industrial wastes. 4.3 Role of an individual in Prevention of Pollution. 4.4 Pollution Case Studies. 4.5 Disaster Management: Floods, Earthquake, Cyclone and Landslides. 5. SOCIAL ISSUES AND THE ENVIRONMENT 6 Hours 5.1 Sustainable development 5.2 Urban problems related to energy. 5.3 Water conservation, rainwater harvesting, watershed management. 5.4 Resettlement and rehabilitation of people; its problems and concerns. Case studies. 5.5 Environmental ethics: issues and possible solutions. 5.6 Climate change, global warming, ozone layer, depletion, acid rain, nuclear accidents and holocaust. Case studies 5.7 Consumerism and waste products. 5.8 Environmental protection Act. 5.9 Air (Prevention and Control of Pollution) Act. 5.10 Water (Prevention and Control of Pollution) Act. 5.11 Wildlife Protection Act. 5.12 Forest Conservation Act. 5.13 Issues involved in enforcement of environmental legislation. 5.14 Public awareness. 5.15 Human population and the environment.

5.15.1 Population growth and distribution. 5.15.2 Population explosion – Family Welfare Programme. 5.15.3 Environment and human health. 5.15.4 Human rights. 5.15.5 Value Education. 5.15.6 HIV/ AIDS 5.15.7 Women and Child Welfare 5.15.8 Role of Information Technology in Environment and Human Health 5.15.9 Medical Transcription and Bioinformatics

TEXT BOOKS:

1. Balu V, “Environmental Studies”, Sri Venkateshwara Publications, 2004 2. Arumugam N, Kumaresan V, “Environmental Studies”, Saras Publication, 2004 3. Rajagopalan R, “Environmental Studies”, Oxford University Press, 2005

27

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level

CO1 To remember key concepts from environmental studies, political and social studies K1

CO2 To understand the concepts and methods from renewable and non-renewable sources and their applications in environmental problem solving K2

CO3 To acquire knowledge on concept of environment issues and links between human and natural system K3

CO4 To demonstrate the general understanding of the breadth and inter disciplinary nature of environmental issues K3

Mapping Course Outcomes with Programme Outcomes & Programme Specific Outcomes:

S –Strong; L –Low; M –Medium

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 S S M S L S S M S S

CO2 S S M S L S S M S S

CO3 S S M S L S S M S S

CO4 S S M S M S S M S M

28

SEMESTER – II

Course Code Type Course Name Category Lecture (L)

Tutorial (T) Practical (P) Credit

18TAM2L20 Language – I Tamil -II Language 75 3

Preamble: njhd;ikahd jkpo;r; r%fj;jpd; gz;ghL thapyhf vLj;Jf; nfhs;sg;gl Ntz;ba mk;rq;fis

tpsf;FjiyAk;> tho;f;ifia newpg;gLj;JtijAk; r%f Nehf;fkhff; nfhz;bUf;Fk; ,yf;fpaq;fspd;

topNa khdpl kjpg;Gfis mwpe;J nfhs;Sk; tifapy; jkpo;g;ghlk; mikf;fg;gl;Ls;sJ.

khzth;fSf;Fg; gad;ghl;L Nehf;fpy; nkhopngah;g;Gg; gapw;rp itf;fg;gl;Ls;sJ.

Prerequisite: 1. Nkdpiyg;gs;sp Kba fw;wtw;iwg; gFj;J njhFj;J MuhAk; Nghf;fpy; ghlj;jpl;lk; mikf;fg;gl;Ls;sJ.

2. khdpl kjpg;Gfis czUk; tifapYk;> Nghl;bj;Njh;Tfis vjph;nfhs;Sk; epiyapYk; ‘jkpo;’ -

gFjp - I mikf;fg;gl;Ls;sJ. 3. gpioapd;wp> Ngr> vOj MuhAk; Kaw;rpf;Fg; gapw;rp jug;gLfpwJ.

Unit Course contents Instructional Hours

I

myF I rq;f ,yf;fpak; ew;wpiz - flTs; fw;Rid mil ,we;J (34) FWe;njhif - ahUk; ,y;iy jhNd fs;td; (25) fodp khmj;J tpise;JcF jPk;gok; (08) fypj;njhif - jspngW jz;Gyj;Jj; jiyg;ngaw;F (101) mfehD}W - <d;W Gwe;je;j vk;Kk; cs;shs; (35)

ed;fyk; fspw;nwhL ez;zhh; Ve;jp (124) GwehD}W - ahz;L gy Mf eiu ,yMFjy; (191) gy;rhd;wPNu gy;rhd;wPNu (195)

15

II

myF II gf;jp ,yf;fpaq;fs; &rpw;wpyf;fpaq;fs; jpUthrfk; - khzpf;fthrfh; - jpUkhYk; gd;wpaha;r; nrd;Wczu MM mhp mad; ,e;jpud; thNdhh;f;F (2 ghly;fs;) jpUke;jpuk; - jpU%yh; - ngUik rpWik mwpe;njk;gpuhd;Nghy(133); ahth;f;Fkhk; ,iwtw;F xU gr;rpiy (252) gpwg;gwp ahh;gy gpr;irnra; khe;jh; (1626) khia kiwf;f kiwe;j kiwg;nghUs; (2548) vy;yhk; mwpAk; mwpT jidtpl;L (2596) nghpaGuhzk; - Nrf;fpohh; - (jLj;jhl; nfhz;l Guhzk;) gpj;jDk; Mfg; gpd;Dk; (187) fz;lNjhh; tbthy; cs;sk; (188) Xiy fhl;nld;w ek;gp (189) Mtzk; gwpf;fr; nrd;w (190) kiwfsh apdKd; Nghw;wp (191) ehyhapu jpt;ag; gpuge;jk; : njhz;lubg; nghbaho;thh; - gr;ir khkiyNghy; Nkdp (873)> Ch; ,Nyd; fhzp ,y;iy (900) jpUkopiraho;thh; - Ie;Jk; Ie;Jk; Ie;Jk; Mfp (754)> thdfKk; kz;zfKk; ntw;Gk; (781) nghpaho;thh; - fz;zd; jpU mtjhur; rpwg;G (10 ghly;fs;)

21

29

rpj;jh;ghly;fs; - gl;bdj;jhh; (2 ghly;fs;) nfhq;fzr;rpj;jh; (2 ghly;fs;) rl;ilKdp (2 ghly;fs;) Fjk;igr;rpj;jh; (3 ghly;fs;) gj;jpufphpahh; (5 ghly;fs;) rpw;wpyf;fpaq;fs; - mofh; fps;istpLJ}J - <Lgl;l nts;is vfpdj;ijj; J}Jtpl;l> mq;fpUe;jhw; rPh;j;jdQ;nra; thaLj;j ehr;rpahh; (2 ghly;fs;) fypq;fj;Jg;guzp - $o; mLjy; - rikayiw mikj;jy;> nkOfy; - Nfhykply; - mLg;gikj;jy;> ghidia mLg;gpy; Vw;wy;> cz;nghUs; nfhzh;jy;> ciyePh; Cw;wy;> cg;Gk; fhaKk; ,ly; (06ghly;fs;) tpf;fpukNrhoDyh - kle;ijg;gUtk; - ge;jhly;> Nrhod; cyhtuy; (198- 216 thpfs;)

III

myF III ciueil 1. MSikg; gz;ig Nkk;gLj;Jk; cstpay; topKiwfs; - v];. Re;jurPdpthrd; 2. gazq;fSk; kUj;JtKk; - nt. ,iwad;G 3. ,e;jpa Xtpaf;fiyapd; Njhw;wk; - gp.Nfhjz;luhkd; 4. fg;gy; Vwpa xl;lfr;rptpq;fp - v];. uhkfpU\;zd; 5. kiyafj; jkpo; - Kidth; M. fhh;j;jpNfad;

15

IV

myF IV ,yf;fpa tuyhW

1. rq;f ,yf;fpaj;jpd; rpwg;Gfs; 2. gf;jp ,yf;fpak; kw;Wk; rpw;wpyf;fpaj;jpd; Njhw;wKk;

tsh;r;rpAk; 3. ciueilapd; Njhw;wKk; tsh;r;rpAk;

12

V

myF V ,yf;fzk; gapw;rp mspj;jy; - ey;y jkpopy; vOJtJ vg;gb -nkhop MSik

1. xUik> gd;ik kaf;fq;fs; 2. t*cr;nrhw;fis ePf;Fjy; 3. gpwnkhopr; nrhw;fis ePf;Fjy; 4. nrhw;gphpg;G gpiofis ePf;Fjy; 5. xyp NtWghL mwpe;J rhpahd nghUs; mwpjy; 6. nkhopngah;g;G (Mq;fpyj;jpypUe;J jkpOf;F) 7. rpWfij vOJjy;.

12

Total 75

Text Book(s):ghl E}y;fs; 1. rq;f> gf;jp ,yf;fpa> ciueilj;jpul;L - jkpo;j;Jiw ntspaPL>

= ru];tjp jpahfuh[h fy;Y}hp 2018 [_d; gjpg;G

2. jkpo; ,yf;fpa tuyhW - Kidth; fh. thRNjtd; Njtd; gjpg;gfk;> 16 /43>jpUefh;> jpUthidf;Nfhtpy;> jpUr;rpuhg;gs;sp - 620 005

gd;dpnuz;lhk; gjpg;G - 2017. 3. jkpo; ,yf;fpa tuyhW - K. tujuhrd;

30

rhfpj;a mfhlkp ntspaPL> GJjpy;yp. kWgjpg;G – 2012 Reference Book(s):ghh;it E}y;fs;

1. rq;f ,yf;fpaj; njhFg;Gfs; - epa+ nrQ;Rhp Gf; `T]; (gp) ypl;> 41 - B> rpl;Nfh ,z;l];bhpay; v];Nl> mk;gj;J}h;> nrd;id - 600 098

,uz;lhk; gjpg;G - 2004.

2.gj;jhapuk; iky; gazk; - nt. ,iwad;G Gjpa jiykiw gjpg;gfk;> 24> [p.vd;. nrl;b rhiy> jpahfuhaefh;> nrd;id - 600 017> Mwhk;gjpg;G - 2015.

3. ,e;jpaf; fiyfs; - gp. Nfhjz;luhkd; epa+ nrQ;Rhp Gf; `T]; (gp) ypl;>

41 - B> rpl;Nfh ,z;l];bhpay; v];Nl> mk;gj;J}h;> nrd;id - 600 098

,uz;lhk; gjpg;G - 2009. 4. miyflYf;fg;ghy; mUe;jkpo; - Kidth; M. fhh;j;jpNfad; mfuk;> kid vz;.1> eph;kyh efh;

jQ;rht+h; - 613 007. Kjy; gjpg;G - 2007. 5. gf;jp ,yf;fpak; - g. mUzhryk;

irt rpj;jhe;j E}w;gjpg;Gf;fofk; nrd;id - 06> gjpg;G - 1900. 6. irtKk; rkzKk;; - NtYg;gps;is vdp ,e;jpad; gjpg;gfk; 102 vz; 57 gp.vk;.[p.fhk;nsf;]; njw;F c];khd; rhiy jp.efh;> nrd;id -17> gjpg;G -1900 7. jkpopy; jtwpdpwp vOj>Ngr

fw;f! - ey;yh%h;. Kidth; Nfh. nghpaz;zd; Kj;jkpo; gjpg;gfk;

9v Nkf;kpy;yd; fhydp> eq;if ey;Y}h;> nrd;id - 61> gjpg;G - 2006.

Focus of Course:jkpo; tuyhW> r%f tuyhW Fwpj;j fhyj;jpd; nra;jpfs; jug;gl;Ls;sd. gpioapd;wp vOj> Ngr> fl;Liu> fij vOJjYf;Fg; gad;gLk; tifapy; gapw;rp jug;gl;Ls;sJ. Course Designer: Dr. V.Sumathi, Dr.S.Rajalatha Assistant Professor, Dept. of Tamil, STC HoD, Dept. of Tamil BoS Chairman

Course Outcomes (COs)

On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level

CO1 jkpo;g;gz;ghL> r%fmikg;G> Fwpf;Nfhs; mike;j ,dtho;f;iff; gw;wpa nra;jpfis czh;e;Jnfhs;Sjy;. K1

31

CO2 gf;jp ,af;fk; tsh;e;j tuyhW> jkpo; ciueil fhye;NjhWk; khwpte;j epiy Mfpait rhh;e;j fUj;Jfis Ghpaitj;jy;. K2

CO3 eilKiwapy;> jkpiog; gpioapd;wp vOj cjTjy;. nkhopngah;g;G fiy> fij vOJk; jpwikia tsh;j;jy;. K3

Mapping Course Outcomes with Programme Outcomes & Programme Specific Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 S S M L L S S L L L

CO2 S S M L L S S L L L

CO3 M M S M L S M M M L

S- Strong; L- Low; M-Medium

SEMESTER – II

HINDI PAPER - II Course Code: 18HIN2L20

(Modern Poetry, One Act Play, Translation & Letter Writing, Conversation)

1.MODERN POETRY : BHOOMIJA by NAGARJUN Publishers : Rajkamal Prakashan 1B Nethaji Subash Marg, New Delhi. 2. ONE ACT PLAY : NAVEEN EKANKI SANGRAH By Dr. Smt. MALATI THIVARI SUMITHRA PRAKASHAN ASHOK NAGAR ALLAHABAD – 1. 3. TRANSLATION : HINDI-ENGLISH ONLY (ANUVADH ABYAS-III) Lessons – 1-15 only PUBLISHER : DAKSHIN BHARATH HINDI PRACHAR SABHA CHENNAI – 600 017. 4. LETTER WRITING : (Leave Letter, Job Application, Ordering Books, Letter to Publisher, Personal Letter) 5. CONVERSATION : (Doctor & Patient, Teacher & Student, Storekeeper & Buyer, Two Friends,Booking Clerk & Passenger at Railway Station, Auto rickshaw driver and Passenger) Ref : Bolchal Ki Hindi Aur Sanchar by Dr. Madhu Dhavan Vani Prakashan, New Delhi.

32

SEMESTER – II

MALAYALAM PAPER - II Course Code: 18MAL2L20 Prose : Non-Fiction This paper will have the following five units: Unit I & II Autobiography Unit III,IV& V Travelogue Text Books prescribed: Unit I & II Vazhithiruvukal-Dr.A.P.J.Abdulkalam (D.C.Books, Kottayam) Unit III,IV& V Alkoottathil Thaniyae - M.T Vasudhevan Nair (D.C.Books, Kottayam) Reference books: 1. Athmakathasahithyam Malayalathil-Dr.Vijayalam Jayakumar (N.B.S.Kottayam) 2. Sancharasahithyam Malayalathil –Prof.Ramesh chandran. V,(Kerala Bhasha Institute, Trivandrum)

SEMESTER – II

FRENCH PAPER - II

Credits : 3 Course Code:18FRE2L20 Hours perWeek:6 Total Instructional hours:75

Prescribedtext : ALORS I Units : 6 – 10 Authors : Marcella Di Giura Jean-ClaudeBeacco Availableat : Goyal Publishers Pvt Ltd 86, UniversityBlock Jawahar Nagar (Kamla Nagar) New Delhi – 110007. Tel : 011 – 23852986 /9650597000

SEMESTER – II

Syllabus

Unit Course contents Instructional Hours

I Prose : Engine Trouble -R.K.Narayan Poetry: Digging-Seamus Heaney Grammar: Question Tags

15

II Prose : Not All’s wrong With the Next Generation-Sudha Murthy Poetry :My Wish for My Land-Randloph Stow Grammar: Reported SpeechKinds of sentences

15

Course Code Course Name

Category Lecture (L) Tutorial (T) Practical (P) Credit

19GEN2L20 English Paper-II

Part-II 70 5 - 3

Preamble: This course aims at facilitating the student to understand the functional usage of English language and apply it in real time situation

Prerequisite: Basic knowledge in English

33

III Prose : The Art of Understanding other People-Clarence Hall Poetry: What I leave to My Son-Nguyen Ngoc Bich Grammar: Common Errors in English

15

IV Hints Developing,Paragraph Writing, Report Writing, Note Making Preparing Agenda, Minutes

15

V ConversationalPractice:Self Introduction, Introduction of Chief guest Telephone etiquettes, Welcome Address, vote of Thanks(for Internal Assessment only) 15

Total 75 Text Book(s): English Paper II, Department of English, Sree Sarawathi Thyagaraja College,2019. Reference Book(s) 1.English Grammar Made Easy, Padmini Dev Kumar, T.Krishna Press, 2008 2.General Grammar &interactive English, H.S.Bhatia,Ramesh Publishing House, 2009. Focus of the Course: Skill Development e-Resources or e-Content: https://www.youtube.com/watch?v=ejGoHFGJQ Course Designer: BoS Chairman Dr. Vennila Nancy Christina, Assistant Professor, Dr. Vennila Nancy Christina Dept of English, STC Course Outcomes (COs) On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement Blooms Taxonomy Knowledge Level

CO1 Understand grammar as an inherent tool for learning English language K1

CO2 Analyze the improvement in their communication skills. K2 CO3 To acquire knowledge to face the challenges of the professional world K2 CO4 To gain confidence to apply language skills in practical life. K3

Mapping Course Outcomes with Programme Outcomes and Programme Specific Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO

4 PSO5

CO1 S S M L L M M L M L

CO2 M S S L L S M L L L

CO3 S S S M M S M M M M

CO4 M S S M M S M M M M

S – Strong; L – Low; M – Medium

34

SEMESTER – II

Course Code Type Course Name Category Lecture

(L) Tutorial

(T) Practical

(P) Credit

19BFS2C10 Core Information Security Concept 45 5 - 3

Preamble: This course provides the student with basic knowledge in Information Security

Prerequisite: Should have the basic knowledge in Cyber Security.

Syllabus:

Unit Course contents Instructional Hours

I

Introduction to Information Security, The history of Information security, What is security, CNSS security model, Component s of an Information system, Balancing Information security and access, Approaches to Information security implementation, The systems development life cycle, The security systems development life cycle, Security professionals and the organization, Communities of Interest. Information Security :is it an Art or a Science

09

II

The need for security: Introduction, Business needs first, Threats-Compromises to individual property, Deliberate software attacks, Deviations in quality of service, Espionage, Sabotage, Theft, Attacks :Malicious code, Hoaxes, Back doors, Password crack, Brute force, Dictionary, Denial of service and Distributed denial of service, Spoofing, Man-in-the-middle, Spam, Mail bombing, Sniffers, Social Engineering, Pharming, Timing attack, Secure software development.

10

III

Risk Management: Introduction, An overview of Risk Management, Risk Identification : lan and Organize, Asset Identification and Inventory Classifying and Prioritizing Information assets, Information Asset Valuation, Identifying and Prioritizing Threats, Vulnerability identification Risk Assessment : Introduction, Likelihood, Risk Determination, Identify Possible Controls, Documenting the Results of Risk Assessment Risk Control Strategies: Defend, Transfer, Mitigate, Accept, Terminate

11

IV

Information security planning and governance- Planning levels, Planning and the CISO, Information security governance, Information security policy, standards and practices- Definitions, EISP, ISSP, SysSP, Policy management, The Information security blueprint, Designing of security architecture, Security education training and awareness program, Continuity strategies, Security technology Firewalls and VPNs, Access control- Identification, Authentication, Authorization , Accountability, Firewall processing modes, Firewalls categorized by generation, Firewalls categorized by structure, Firewall architectures, Selecting the right firewall, Configuring and managing firewalls, Content filters, Protecting remote connections- Remote access, VPNs.

10

V

Intrusion detection and prevention systems- Why IDPS?, types, detection models, response behavior ,strengths and limitations, deployment and implementation, measuring the effectiveness. Honeypots, Honey nets and padded cell systems- Trap-and-trace systems, Active intrusion prevention

09

Total 50

Text Book(s): 1.Principles of Information Security- Michael E. Whitman, Herbert J. Mattord, Cengage Learning, Fourth edition, 2011

Reference book(s): 1.Information Security Management Principles- Andy Taylor, David Alexander, Amanda Finch, DavidSutton, BCS publishers, 2008 2.Guide to Computer forensics and Investigations- B. Nelson, A. Phillips, F. Enfinger, C. Steuart, CengageLearning, 4th edition, 2010 3.Applied Information security: A Hands-On guide to Information security- R. Boyle, Prentice Hall, 2010

35

4.Fundamentals of Network Security- E. Maiwald, McGraw- Hill, 2004 5.Managing Information Security- John R. Vacca, Elsevier Inc, 2010 6.Computer Security basics- Rick Lehtinen, O’Reilly, 2nd edition, 2006 7.Absolute beginner’s guide to Security, Spam, Spyware& Viruses- Andy Walker, Que publishers,2005

Focus of Course: Employability

e-Resource/e-Content URL: Vidya-Mitra Portal:http://vidyamitra.inflibnet.ac.in/index.php/search Tutorials point :https://www.tutorialspoint.com/information_security_cyber_law/ Course Designer : BoS Chairman Mr. S.Dhanaraj Dr.S.Sasikala PC , Dept. of DCFS, HOD, CS

Course Outcomes (COs) On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement Blooms Taxonomy

Knowledge Level CO1 Define the Security and its models K1 CO2 Outline the concepts of attacks. K2 CO3 Define the risk management policies. K2

CO4 Employ the methods Intrusion detection and prevention and security Planning K3

Mapping Course Outcomes with Programme Outcomes & Programme Specific Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 L L L L L L L L M L

CO2 L M L L L M L M M S

CO3 L M M M M S L M M L

CO4 L L M M S S L M M S

S –Strong; L –Low; M –Medium

36

SEMESTER – II

Course Code Type Course Name Category Lecture

(L) Tutorial

(T) Practical

(P) Credit

19BFS2C20 Core Operating System Concept 45 5 - 3

Preamble: This course provides the student with the knowledge in Operating System

Prerequisite: Should have the basic knowledge in Operating System.

Syllabus:

Unit Course contents Instructional Hours

I

OPERATING SYSTEMS OVERVIEW : What OS Do – Computer system Organization – Architecture- Structure – Operations- Process Management – Memory management – Storage management – Protection and Security – Kernel Data structures Computing Environments – Open source OS

10

II

PROCESS MANAGEMENT: Processes-Process Concept, Process Scheduling, Operations on Processes, Inter process Communication; Threads- Overview, Multicore Programming, Multithreading Models; Windows and Linux model. Deadlocks – Detection – Handling - Prevention – Avoidance.

10

III

STORAGE MANAGEMENT :Main Memory-Contiguous Memory Allocation, Segmentation, Paging, 32 and 64 bit architecture Examples; Virtual Memory- Demand Paging, Page Replacement, Allocation, Thrashing; Allocating Kernel Memory, OS Examples.

10

IV

I/O SYSTEMS :Mass Storage Structure- Overview, Disk Scheduling and Management; File System Storage-File Concepts, Directory and Disk Structure, Sharing and Protection; File System Implementation- File System Structure, Directory Structure, Allocation Methods, Free Space Management, I/O Systems

10

V

CASE STUDY: Linux System- Basic Concepts; System Administration-Requirements for Linux System Administrator, Setting up a LINUX Multifunction Server, Domain Name System, Setting Up Local Network Services; Virtualization- Basic Concepts, Setting Up Xen, VMware on Linux Host and Adding Guest OS.

10

Total 50

Text Book(s): 1.Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating System Concepts”, 9th Edition, John Wiley and Sons Inc., 2012. Reference book(s): 1. William Stallings, “Operating Systems – Internals and Design Principles”, 7th Edition, Prentice Hall, 2011. 2. Andrew S. Tanenbaum, “Modern Operating Systems”, Second Edition, Addison Wesley, 2001. 3. Charles Crowley, “Operating Systems: A Design-Oriented Approach”, Tata McGraw Hill Education”, 1996. 4. D M Dhamdhere, “Operating Systems: A Concept-Based Approach”, Second Edition, Tata McGraw-Hill Education, 2007.

Focus of Course: Concept

Course Designer : BoS Chairman Mr. S.Dhanaraj Dr.S.Sasikala PC , Dept. of DCFS, HOD, CS

37

Course Outcomes (COs) On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement Blooms Taxonomy

Knowledge Level CO1 Define the Overview of Operating Systems K1

CO2 Outline the concepts of Process Management K2

CO3 Define the Storage management policies. K2

CO4 Apply the methods in Operating Systems K3

Mapping Course Outcomes with Programme Outcomes & Programme Specific Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 L M L L L L L L M L

CO2 L L L L L M M M M S

CO3 M M M M M S L M M L

CO4 L L M M S S L M M S

S –Strong; L –Low; M –Medium

38

SEMESTER – II

Course Code Type Course Name Category Lecture (L) Tutorial

(T) Practical (P) Credit

19BFS2C30 Core Operating System and Security Lab Practical - 5 30 3

Preamble: Students will be able to apply Operating System Concepts and provide security

Prerequisite: Basic usage of Operating System

Syllabus:

Ex. No Course contents Instructional

Hours

Implementation of Installation

1 Installation of Windows Operating system 6

2 Installation of Linux Operating system 6

3 Installation of Multiple OS on a single machine 6

4 Installation of VM Virtual Box 5

Implementation of Security Tools

5 Hex analysis using Hex Editors 2

6 Registry Editing and Viewing using native tools of OS 2

7 Hash code generation, comparison of files using tools like HashCal 2

8 File analysis using Sleuthkit 2

9 Graphical File analysis and Image Analysis 2

10 Email Analysis involving Header check, tracing route, performing a check on Spam mail and Non-Spam mail. 2

Total 35

Reference Book: 1. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating System Concepts”, 9th Edition, John

Wiley and Sons Inc., 2012.

Recommended Tools to be used: Windows and Linux Operating Systems and Open source Tools

Focus of Course: Employability

Course Designer : BoS Chairman Mr. S.Dhanaraj Dr.S.Sasikala PC , Dept. of DCFS, HOD, CS

39

Course Outcomes (COs) On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO1 Understanding the concept of OS Installation K3 CO2 Implement various Operating System on a single machine K3 CO3 Analyze the problem and Solve K3 CO4 Solve security problems using tools K4

Mapping Course Outcomes with Programme Outcomes and Programme Specific Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 M M M S M M M M M M

CO2 L M L M M M M M M M

CO3 M M S M S S M S M M

CO4 M M S M M S M S S S

S –Strong; L –Low; M –Medium

40

SEMESTER – II

Course Code Course Name Category Lecture (L) Tutorial (T) Practical (P) Credit

19BMAGAJ0 Discrete Structures Employability 48 12 - 4

Preamble:This course aims at facilitating the student to learn the concepts in Discrete Mathematics and apply the fundamental concepts in graph theory and apply the fundamental concepts in Number theory

Prerequisite: Basic concepts in Mathematics at HSC level and know the concept of number theory, matrices and basic set operations in Mathematics

SYLLABUS:

Unit Course contents Instructional Hours

I

Relations Relations: Cartesian product of two sets – Relations – Representation of Relation – Operations on Relations – Equivalence of Relation – Closures and Warshall’s Algorithm – Partitions and equivalence classes

12

II

Coding Theory Coding Theory: Introduction – Hamming distance – Encoding a Message – Group codes –Procedure for Generating Group Codes – Decoding and error correction – An example of Simple Error Correcting Code.

12

III

Mathematical Logic Logic: Introduction – True / False - Statements – Connectives – Atomic and Compound Statements – Well Formed (Statement) Formulae – The truth table of a formula – Tautology – Tautological implications and equivalence of a formula – Normal forms – Principal Normal Forms.

12

IV

Graph Theory Graphs and sub graphs - Operations on Graphs - Isomorphism of Graphs - Walks, paths and cycles - Trees - spanning trees of graph - Algorithm for finding a spanning tree of a connected graph - Krushkal’s algorithm to find an optimal tree of a weighted graph.

12

V

Number Theory Divisibility: Divisibility of integer – Division algorithm – Common divisor – Greatest common divisor– The Euclidean algorithm –Primes and Composite Number: Definition of Prime, Composite, Twin prime – Euclid’s theorem – Unique factorization theorem – To find GCD & LCM of two integers – Positional representation of on integers – Worked examples

12

Total 60

Text Book: Unit – I, II, III Dr. M. K. Venkataraman, Dr. N. Sridharan, N. Chandarasekaran, Discrete Mathematics, The National Publishing Company Chennai, 2006. Unit – I Chapter 2: 2.1, 2.6., 2.10, 2.13, 2.21, 2.29, 2.40 Unit – II Chapter 8: 8.1, 8.2, 8.3, 8.5, 8.6, 8.8, 8.11 Unit – III Chapter 9: 9.1, 9.4, 9.13, 9.14, 9.21, 9.25, 9.30, 9.34, 9.40, 9.42,9,49 Unit – IV S. Kumaravelu & Susheela Kumaravelu, Graph Theory, Janki Calender Corporation, Sivakasi, 1999, Graph Theory: Page No. 1 to 54, 56 to 64, 66 to 77, 88 to 90 Unit – V Kumaravelu and Suseela Kumaravelu, Elements of Number Theory, Raja Sankar offset Printers, 2002. Number Theory: Chapter 3 Page no 45-57 Chapter 4 Page no 60-75

41

Course Outcomes (COs)

On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO 1 Understand the concepts of sets and relations Know the concepts of mathematical

logic. K1

CO 2 Know the concepts of mathematical coding theory K1

CO 3 Know the concepts of mathematical logic K2

CO 4 Know the basic concept of graph theory and the types of graphs and Relate connectedness, connectivity and various matrices

K3

CO 5 Find results involving divisibility and greatest common divisors and Find integral solution to specified linear Diophantine equations

K3

Mapping with Program Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO

4 PSO5

CO1 S M M S M M M M M M

CO2 L L L M M M M M M L

CO3 L M S L S S M S M M

CO4 M M S M M S M S S S

CO5 S S S L L M M S S S

S – Strong; L – Low; M – Medium

Reference Books 1)Jean-Paul Tremblay , R Manohar, Discrete mathematical structures with applications to computer science , Paperback – 1 Jul 2017,McGraw Hill. 2)Seymour Lipschutz , Marc Laras Lipson , Varsha H. Patil , Discrete Mathematics (Schaum's Outlines) (SIE) Paperback – 1 Jul 2017 Course Designer : R.Karpagam Prof.P.Sivasamy Assistant Professor, Dean Dept. of Mathemetics STC

42

SEMESTER – II

Course Code Type Course Name Category Lecture (L)

Tutorial (T)

Practical (P) Credit

18DHE2V20 VBC2 Value Education & Human Rights

- 27 - - 2

Preamble: In order to promote and encourage interest in Value Education and Human rights, we, teach the noble purpose of education, life and living standards- Create patriotism and awareness in the national interest by teaching the history of the country’s freedom struggle – Make a good citizen imbibed with the knowledge of Indian constitution and human rights. Prerequisite:

• The curriculum has been setup in the course of the classroom with the study of the lessons learned from the higher Secondary school.

• The syllabus is setup, to realize human values, to promote patriotism and to compete with competitive exams. Syllabus:

Unit Course contents Instructional Hours

I Education – Definition –The purpose of education – Important values of life – The excellence of family and family relations – The significance and the necessity of culture – The role of individual in a society – The art of complete life.

05

II

History of Indian freedom struggle – East India Company and its rule in India 1757 -1858 – Its unlawful practices and atrocities – Direct rule by British Government – Sepoy mutiny – Indians revolt against British Raj – The massacre of Jallionwalah Bagh – Indians’ non-cooperation movement.

Short notes: Pandit Jawaharlal Nehru, Patel, Subash Chandra Bose,V.O.Chithambaram pillai, Baghat Sing.

05

III

Indian Constitution – The birth and the significance of Indian Constitution – Indian citizenship – Equality of rights – The right to freedom – Right to arts, culture and education –Right to property – Basic responsibilities of every Indian – The rights and the Acts concerned.

06

IV Gandhian thoughts – Gandhi and his principle of Sathyagraha – Sarvodhaya – concept and meaning – Swami Vivekananda and his teachings to the students – Dr. Abdul Kalam and the students.

05

V

Human rights – Definition – Classification of human rights – Rights to live – Rights to Equality – Traditional and cultural rights – Social, political and economic rights – Rights of women – Rights of children – Exploitation and cruelty to women – Organization protecting women’s rights – Human rights organizations – Courts of justice – Safety of women rights.

06

Total 27

43

Course Outcomes (COs)

On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement Blooms Taxonomy

Knowledge Level

CO1 Define the purpose of education, role of a person in a family relationship, culture and society. K1

CO2 Understand the history of Indian independence and the Indian constitution. K2

CO3 Develop Gandhian ideas, Vivekananda’s norms, Abdulkalam’s languages, need for human rights and feminism. K3

Mapping Course Outcomes with Programme Outcomes & Programme Specific Outcomes

COs/POs/PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 S S M S L S S M M M

CO2 S M M L L S S L L L

CO3 S S M M M S S M M L

S- Strong; L- Low; M-Medium

44

Semester III

Course Code Type Course Name Category Lecture (L)

Tutorial (T) Practical (P) Credit

19BFS3C10 Core Python Programming Application 45 5 - 5

Preamble: This course provides the student with the knowledge in Python programming

Prerequisite: Should have the basic knowledge in Programming languages

SYLLABUS

Unit Course contents Instructional Hours

I

ALGORITHMIC PROBLEM SOLVING: Algorithms, building blocks of algorithms (statements, state, control flow, functions), notation (pseudo code, flow chart, programming language), algorithmic problem solving, simple strategies for developing algorithms (iteration, recursion). Illustrative problems: find minimum in a list, insert a card in a list of sorted cards, guess an integer number in a range, Towers of Hanoi.

10

II

DATA, EXPRESSIONS, STATEMENTS :Python interpreter and interactive mode; values and types: int, float, Boolean, string, and list; variables, expressions, statements, tuple assignment, precedence of operators, comments; modules and functions, function definition and use, flow of execution, parameters and arguments; Illustrative programs: exchange the values of two variables, circulate the values of n variables, distance between two points.

10

III CONTROL FLOW : Conditionals: Boolean values and operators, conditional (if), alternative (if-else), chained conditional (if-elif-else); Iteration: state, while, for, break, continue, pass;

10

IV

Functions: Fruitful functions: return values, parameters, local and global scope, function composition, recursion; Strings: string slices, immutability, string functions and methods, string module; Lists as arrays. Illustrative programs: square root, gcd, exponentiation, sum an array of numbers, linear search, binary search.

10

V FILES, MODULES, PACKAGES : Files and exception: text files, reading and writing files, format operator; command line arguments, errors and exceptions, handling exceptions, modules, packages; Illustrative programs: word count, copy file

10

Total 50 TEXT BOOKS: 1. Allen B. Downey, ``Think Python: How to Think Like a Computer Scientist‘‘, 2nd edition, Updated for Python 3, Shroff/O‘Reilly Publishers, 2016 (http://greenteapress.com/wp/thinkpython/) 2. Guido van Rossum and Fred L. Drake Jr, “An Introduction to Python – Revised and updated for Python 3.2, Network Theory Ltd., 2011. REFERENCES: 1. John V Guttag, “Introduction to Computation and Programming Using Python‘‘, Revised and expanded Edition, MIT Press , 2013 2. Robert Sedgewick, Kevin Wayne, Robert Dondero, “Introduction to Programming in Python: An Inter-disciplinary Approach, Pearson India Education Services Pvt. Ltd., 2016. Course Designer : BoS Chairman Ms. Anjana K S Prof. D Geetha Assistant Professor , Dept. of DCFS, HOD, CS

45

Course Outcomes (COs)

On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO 1 Understand the Algorithms and building blocks K1

CO 2 Remember the basic of programming K1

CO 3 Apply the control flow K2

CO 4 Apply the functions and file concepts K3

Mapping with Program Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 L M S L L M L L L M

CO2 L L S L L M L M L S

CO3 L M M S M L L M L L

CO4 L L M S S S L M L M

S – Strong; L – Low; M – Medium

46

SEMESTER – III

Course Code

Type Course Name Category Lecture (L)

Tutorial (T)

Practical (P) Credit

19BFS3C20 Core Network Security &

Ethical Hacking Concept 45 5 - 5

Preamble: This course provides the student with the knowledge in Hacking Techniques & Networks security.

Prerequisite: Basic knowledge about networks

SYLLABUS

Unit Course contents Instructional Hours

I

Overview of Networking & Ethical Hacking: Introduction to Network and Communication technologies – Overview of OSI Model and TCP/IP Protocol. IP Addressing and NAT. Routers and Routing Protocols. Important Terminologies - Asset, Vulnerability, Threat, Risk. Introduction to Hacking, Phases involved in Hacking: Foot printing, Scanning, System Hacking, Session Hijacking. Basic Cryptography Concepts- Symmetric Encryption Algorithms, Purpose of Cryptography, Data Encryption Standard (DES), Triple DES, Advanced Encryption Standard (AES). Penetration Testing – Methodologies: OSSTMM, NIST, OWASP.

10

II

Threats, Vulnerabilities and Attacks : Network threats and vulnerabilities, Types of network attacks- eavesdropping, spoofing, modification, Cross-site scripting, DNS Spoofing, ARP Poisoning, Web Jacking. Evading antiviruses and firewalls, Tools used; Attacks on Wireless Networks.CIA Triad, Security Concepts- exploit, threat, vulnerability, risk, attack. Malware Terminology: Rootkits, Trapdoors, Botnets, Key loggers. Active and Passive Security Attacks. Teardrop, DoS, DDoS, XSS, SQL injection, MITM Attack. Evading IDS, Firewall and Honey pots. Intrusion Detection Systems (IDS), Intrusion Detection Tools

10

III

Web based Attacks & web Security – Firewalls, IDS, IPS, IDPS – Types and Technologies. Passwords, Cryptographic authentication protocol, Kerberos, X.509 LDAP Directory. Digital Signatures. Web Security, SSL Encryption, TLS, SET. Trusted systems – Electronic payment protocols, Virtual private networks. Web server Attacks, DNS Server Hijacking, Directory Traversal Attacks, MITM /Sniffing Attack, Phishing Attacks, Website Defacement, Web server Misconfiguration, HTTP Response Splitting Attack, SSH Brute-force Attack, Web Application Attacks, Session Management Attack, SQL Injection Attacks. Wireless Encryption: WEP, WPA & WPA2 Encryption, Wireless Threats, Access Control Attacks, Integrity and Confidentiality Attacks

10

IV

Network Forensics, System Hacking & VAPT: Monitoring of computer network and activities, Live Packet Capturing and Analysis. Searching and collection of evidences from the network. Network Intrusion Detection and Analysis: SQL Injection, Event Log Aggregation – role of logs in forensic analysis, tools and techniques. Investigating network attacks. Password Cracking, Malware Threats, Trojan Concept, Virus and Worms Concepts, Virus Analysis and Detection Methods, Malware Analysis. DoS/DDoS Concepts, Identity Theft Overview.

10

V

VAPT, Incident Response and Industrial Policy Standards: Vulnerability Assessment, Types of Vulnerability Assessment, Penetration Testing, Types of Penetration Testing, Phases of Penetration Testing, Security Testing Methodology. Vulnerability Assessment versus Penetration Testing. Automated Assessment Tools – Incident Response Planning for disaster and recovery - Evidence Handling – Requirements of Regulated Industries – Intrusion Detection Systems. Information Security Laws and Standards : Payment Card Industry Data Security Standard (PCI-DSS), ISO/IEC 27001:2013, Health Insurance Portability and Accountability Act (HIPAA), Sarbanes Oxley Act (SOX). Information Security Policies, Types of Security Policies.

10

Total 50 Text Books 1. Hacker Techniques, Tools and Incident Handling, Sean Philip Oriyano and Michael Gregg. 2. William Stallings; "Network Security Essentials", 3rd Edition, Pearson Education, 2006. 3. “Ethical Hacking and Countermeasures (Book 1)”, EC-Council, Publisher: Course Technology; 2nd edition – 2016.

47

Course Outcomes (COs)

On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO 1 Define the Overview of Computer Networks & Hacking Techniques K1

CO 2 Understand the concepts of Threats & Attack Vectors K1

CO 3 Define the Web based & Social attacks K2

CO 4 Apply Network forensics & Outline industrial policy standards K3

Mapping with Program Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 S M L M M L L L M L

CO2 S L L L L M M M M S

CO3 M M M M M S L M M L

CO4 S M M M S S L M M S

S – Strong; L – Low; M – Medium

4. AtulKahate; “Cryptography and Network Security” McGraw Hill Education (India), 2008

Reference Books 1. CEH v10: Certified Ethical Hacker - Version 10 Study - 14 May 2018. 2. Shon Harris; “All in One CISSP, Exam Guide Sixth Edition”, McGrawHill, 2013. 3. Sherri Davidoff and Jonathan Ham; “Network Forensics – Tracking Hackers through Cyberspace”, Pearson Publications, 2012. Course Designer : BoS Chairman Ms. Anjana K S Prof. D Geetha Assistant Professor , Dept. of DCFS, HOD, CS

48

SEMESTER – III

Course Code Type Course Name Category Lecture

(L) Tutorial

(T) Practical (P) Credit

19BFS3C30 Core Hacking & Network Security Lab Practical - 7 35 5

Preamble: To Understand the Network Security practical’s

Prerequisite: Basic knowledge in Computer Networks& Hacking

Syllabus:

Ex. No Course contents Instructional

Hours

1 Port Scanning using NMap, Superscan 3

2 Enumeration-SNMP, SMTP, Unix/Linux, LDAP, NTP 3

3 Monitoring Live Network capturing packets and analyzing over the live network using Wireshark 3

4 Vulnerability Scanning 3

5 Firewall, Intrusion detection and Honey pots 3

6 Password Guessing and Password cracking 3

7 Buffer overflow attacks 3

8 Monitoring Network Communication: Working with Trojans, Backdoors and sniffer 3

9 Client side script injection to a web application using XSS 3

10 Wireless Network attacks, Bluetooth attacks 3

11 Website mirroring using HTTrack and hosting on a Local Network 3

12 Penetration testing and justification of penetration testing through risk analysis, SQL injection Attacks 3

13 Steganographic Tools 3

14 Cryptanalysis Tools 3

42

Reference Book: 1.William Stallings; "Network Security Essentials", 3rd Edition, Pearson Education, 2006. 2. AtulKahate; “Cryptography and Network Security” McGraw Hill Education (India), 2008 3. Beherouz. A Forouzan; “Data Communication and Networking”, 4thEdition, TMH, 2000.

Recommended Tools to be used: Network simulator

Focus of Course: Computer Network management

Course Designer : BoS Chairman Ms. Anjana K S Prof. D Geetha Assistant Professor , Dept. of DCFS, HOD, CS

49

Course Outcomes (COs) On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO1 Define the Overview of Computer Networks K3

CO2 Outline the concepts of Networking K3

CO3 Define the Social attacks K3

CO4 Apply Network forensics K4

Mapping Course Outcomes with Programme Outcomes and Programme Specific Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 S M S S S L L M M M

CO2 S M M M M M M S L L

CO3 S M L L L L L S M L

CO4 L S M S S M M M M L

S –Strong; L –Low; M –Medium

50

SEMESTER – III

Course Code Type Course Name Category Lecture

(L) Tutorial

(T) Practical (P) Credit

19BFS3C40 Core Python Programming Lab Practical - 5 25 2

Preamble: Students will be able to apply Operating System Concepts and provide security

Prerequisite: Python programming

Syllabus:

Ex. No Course contents Instructional

Hours

1 Compute the GCD of two numbers. 3

2 Find the square root of a number (Newton‘s method) 3

3 Exponentiation (power of a number) 3

4 Programs using Nested If 3

5 Program using While Loop 3

6 Programs using For loop 3

7 Program using Break, continue and pass 3

8 First n prime numbers 3

9 Multiply matrices 3

10 Programs that take command line arguments (word count) 3

Total 30

Reference Book: 1. Allen B. Downey, ``Think Python: How to Think Like a Computer Scientist‘‘, 2nd edition, Updated for Python 3, Shroff/O‘Reilly Publishers, 2016 (http://greenteapress.com/wp/thinkpython/) 2. Guido van Rossum and Fred L. Drake Jr, “An Introduction to Python – Revised and updated for Python 3.2, Network Theory Ltd., 2011.

Recommended Tools to be used: Python compiler

Focus of Course: Programming

Course Designer : BoS Chairman Ms. Anjana K S Prof. D Geetha Assistant Professor , Dept. of DCFS, HOD, CS

51

Course Outcomes (COs) On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO1 Understand the Algorithms and building blocks K3 CO2 Remember the basic of programming K3 CO3 Apply the control flow K3 CO4 Apply the functions K4

Mapping Course Outcomes with Programme Outcomes and Programme Specific Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 S M L L L L L L M L

CO2 S L L L L M M M L M

CO3 S M M M M L L L L L

CO4 S L M M S L L L L M

S –Strong; L –Low; M –Medium

52

SEMESTER – III

Course Code Course Name Category Lecture (L) Tutorial (T) Practical (P) Credit

19BCH3A10 Forensics Chemistry Concept 45 5 - 4

Preamble: This course provides the student with the knowledge in crime investigation

Prerequisite: Should have the basic knowledge in chemistry

SYLLABUS

Unit Course contents Instructional Hours

I

UNIT I: BASICS OF CHEMISTRY Organic chemistry: Introduction, classification, IUPAC Nomenclature.-Basic properties: isomerism, resonance.-Basic reactions: addition, substitution, oxidation, reduction, hydrogenation and hydrolysis.- Buffer: preparation, capacity buffer equation Importance.

10

II

UNIT II: PETROLEUM PRODUCTS Petroleum products: types, by products, uses and importance.-Examination of petroleum products: distillation and fractionation-Commercial uses of petroleum. Standard methods of analysis of petroleum products for adulteration.-Scope, importance and forensic importance of analysis for the adulterants in petroleum products.

10

III

UNIT III: ARSON AND FIRE INVESTIGATION Chemistry of fire, pyrolysis, combustion, fire tetrahedron, flash point and ignition temperature.-Fire categories, burn patterns, finding the igniter.-Investigation of arson cases, functions of a fire investigator, collection preservation and packing of fire evidences.-Lab analysis of the evidence, instrumental techniques used.

10

IV

UNIT IV: EXPLOSIVES Introduction, classification, composition and characteristics.-Synthesis and actions of explosives (TNT, PETN and RDX, IED). Explosion process and affect types of explosions, post blast residue collection. Examination of explosion residues in laboratory (chemical and instrumental).

10

V

UNIT V: QUANTITATIVE AND QUALITATIVE ANALYSIS Industrial products: insecticides, fertilizers, metallic products, non metallic products. Consumer products: alcohol, gold, silver, acids, alkalies. Trace evidences: paint, soil, industrial dust, oil, dyes. Analysis and forensic importance.-Importance, actions and forensic importance of products.-Analysis: chemical and instrumental for the verification of purity, adulterants.

10

Total 50 TEXT BOOKS: 1. Criminalistics: an introduction to Forensic Science; Safferstein R; Prentice Hall; 9th edition. 2. Standard methods of chemical analysis; Welcher Frank; Van Nostrand Reinhold; 6th edition. REFERENCES: 1. Fire scene evidence; Almirall J R & Furton K G; CRC Press (2004) 2. Practical: Fire and arson investigation; redsickerr D R & Cannor J J. Course Designer : BoS Chairman Ms. Anjana K S Prof. D Geetha Assistant Professor , Dept. of DCFS, HOD, CS

53

Course Outcomes (COs)

On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO 1 Define the Overview of Forensic Chemistry K1

CO 2 Outline the concepts behind forensic samples. K2

CO 3 Define the examination of explosives. K3

CO 4 Apply forensic chemistry. K3

Mapping with Program Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 L M S L L M L L L M

CO2 L L S L L M L M L S

CO3 L M M S M L L M L L

CO4 L L M S S S L M L M

S – Strong; L – Low; M – Medium

54

SEMESTER – III

Course Code Type Course Name Category Lecture

(L) Tutorial (T)

Practical (P) Credit

19BFS3S10 Core

Digital Image Processing and Biometric Security

Concept 45 5 - 2

Preamble: To make the students to understand the basic concepts of image processing and to acquire the knowledge on the Basics of biometric security. Prerequisite: Basic concepts of image processing & Biometrics

Syllabus:

Unit Course contents Instructional Hours

I Introduction: steps in image processing, Image acquisition, basics in sampling and quantization- representation -relationship between pixels. Color models – basics of color image processing.

9

II

Image enhancement in spatial domain: Some basic gray level transformations – histogram processing – enhancement using arithmetic, logic operations – basics of spatial filtering and smoothing. Image enhancement in Frequency domain: smoothing and sharpening filters.

12

III

Image restoration: Model of degradation and restoration process – noise models. Image segmentation: Thresholding and region based segmentation. Image compression: Error free compression –Lossy compression. 10

IV

Biometrics- Introduction- benefits of biometrics over traditional authentication systems -benefits of biometrics in identification systems. Physiological Biometric Technologies: Fingerprints-description –characteristics - strengths – weaknesses - Facial scan - description- characteristics - weaknesses - Iris scan - description – characteristics -strengths – weaknesses - -Voice – data acquisition - feature extraction - characteristics - strengths – weaknesses-

9

V

Other Physiological Biometrics: Hand scan - description characteristics- strengths – weaknesses -Retina vascular pattern - description –characteristics - strengths – weaknesses. Behavioural Biometric Technologies: Signature and handwriting technology - Technical description – classification - keyboard / keystroke dynamics. Multi biometrics: Multi biometrics and multi factor biometrics - two-factor authentication with Passwords - tickets and tokens

10

Total 50 Text Book(s): 1. R.C. Gonzalez, R.E.Woods, 2002, Digital Image processing, 2nd Edition, Pearson Education.

2. Samir Nanavathi, Michel Thieme, and Raj Nanavathi, “Biometrics -Identity verification in a networked World ”, Wiley Eastern, 2002.

55

Reference book(s): a. Anil K. Jain, 1994, Fundamentals of Digital image Processing, 2nd Edition, Prentice Hall of

India, New Delhi.

b. Pratt. W.K., Digital Image Processing, 3rd Edition, John Wiley & Sons.

c. Rosenfled A. &Kak, A.C, 1982, Digital Picture Processing, vol .I & II, Academic Press.

d. John Chirillo and Scott Blaul,” Implementing Biometric Security”, Wiley Eastern Publications, 2005.

e. John Berger,” Biometrics for Network Security”, Prentice Hall, 2004.

Website, E-learning resources (i) http://www.imageprocessingplace.com/ Course Designer : BoS Chairman Ms. Anjana K S Prof. D Geetha Assistant Professor , Dept. of DCFS, HOD, CS

Course Outcomes (COs)

On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO 1 Define the Overview of Image Processing K1

CO 2 Outline the concepts of Enhancement Models K2

CO 3 Define the Identity Verification K3

CO 4 Apply Biometric Security K3

Mapping with Program Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 M M L L L L L L M L

CO2 L L L L L M M M M S

CO3 S M L M M S L L M L

CO4 L L M M S S L M M S

S – Strong; L – Low; M – Medium

56

Semester IV

Course Code

Type Course Name Category Lecture (L)

Tutorial (T)

Practical (P) Credit

19BFS4C10

Core

Forensic Audio-Video Analysis

And Speaker Identification

Concept 45 5 - 5

Preamble: This course analyze audio and video , speaker in a crime scene

Prerequisite: Basic knowledge of electronics and networks

SYLLABUS

Unit Course contents Instructional Hours

I

Basic Circuits: Basic Electric Circuits-LR, CR, LCR circuits, Conventional Filters and Digital Filters (high pass filters, low pass filters).Noise Characteristics: Properties of Noise, Acoustic Characteristics of Environments-Diffraction, Reverberation and Diffusion. Recording Formats-Analog and Digital, Audio and Video file formats. Linear and Non –linear Editing.

10

II

Introduction to video technology: Concept of Video film production-Introduction to video technology component of Digital Image Processing. Concept of Digital Water Marking. Visual examination technique on video frame image- Facial Image Recognition from video frame image

10

III

Forensic audio and video analysis: Introduction to Forensic Audio & Video Analysis: A basic understanding of forensic audio and video technology-Audio and Video Evidence handling procedures. Authentication of recorded audio and video. Scientific methodology of forensic audio-video analysis. Recovery of digital audio-video / Deleted Video & Audio Files recovery- Exporting evidence as video or still image files-Software used for audio and video analysis.-Admissibility of audio and video evidence in court.

10

IV

Basics of speaker identification: Introduction: Forensic Speaker Identification, Forensic Phonetics-Forensic challenges in Voicerecognition.Forensic Phonetic Parameters: Acoustic vs. Auditory Parameters, Linguistic vs. NonLinguistic Parameters. Forensic Significance: Linguistic Analysis- Requirements on forensic phonetic parameters. The human vocal tract and the production and description of speech parameters: Vocal tract structures. Forensic Significance – Vocal cord activity, Nasals and Nasalization-Phonetic Aspects of Speech: Articulators – Active/Passive, Phonemes –Segmental and Supra segmental, Prosodic features- Stress, Intonation, Duration, Syllables, Nasalization, and Accent features.

10

V

Forensic speaker identification: Characterizing Forensic Speaker Identification: Speaker Recognition – Speaker Identification and Verification, Forensic Significance. Components of Speaker Recognition.-Approaches to Speaker Recognition System of Auditory Analysis, Spectrographic approach or Voice Print Identification. Automatic Approach: Gaussian Mixture Models, Long Term Averaging, Vector Quantization, Hidden Markov Models, Neural Networks. Expressing Results in Forensic Speaker Recognition–Likelihood Ratio, Objective/Subjective Methods. Concept of Test and Error in Speaker Identification.-Admissibility of Voice evidence in Court.

10

Total 50

Text Books 1) Forensic Speaker Identification, Philip Rose: CRC Press Book, (2002). REFERENCE BOOKS 1) A Simplified Guide to Forensic Audio and Video Analysis (PDF Notes). 2) The Physics of Speech, D.B. Fry: Cambridge University Press, (1979). 3) The Complete Book of Video Techniques Subjects Equipment, David Cheshire: Dorling Kindersley Publication London, (1992). Course Designer : BoS Chairman Ms. Anjana K S Prof. D Geetha Assistant Professor , Dept. of DCFS, HOD, CS

57

Course Outcomes (COs)

On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO 1 Remember the knowledge K1

CO 2 Understand the algorithms K1

CO 3 Apply the tools K2

Co $ Apply the algorithms K3

Mapping with Program Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 S M L L L L L L M L

CO2 S L M L L L L M M S

CO3 M M M M M S L S M L

CO4 L S M M S S L M M S

S – Strong; L – Low; M – Medium

58

SEMESTER – IV

Course Code Type Course Name Category Lecture (L)

Tutorial (T) Practical (P) Credit

19BFS4C20 Core Cyber Forensic Concept 45 5 - 5

Preamble: To provide students self-analysis exercise the hands on practice in cyber forensic

Prerequisite: Basic of information security and Cyber crime

SYLLABUS

Unit Course contents Instructional Hours

I NETWORK LAYER SECURITY &TRANSPORT LAYER SECURITY IPSec Protocol - IP Authentication Header - IP ESP - Key Management Protocol for IPSec .Transport layer Security: SSL protocol, Cryptographic Computations – TLS Protocol.

10

II PGP - S/MIME - Internet Firewalls for Trusted System: Roles of Firewalls – Firewall related terminology- Types of Firewalls - Firewall designs - SET for E-Commerce Transactions. 10

III

INTRODUCTION TO COMPUTER FORENSICS Introduction to Traditional Computer Crime, Traditional problems associated with Computer Crime. Introduction to Identity Theft & Identity Fraud. Types of CF techniques - Incident and incident response methodology - Forensic duplication and investigation. Preparation for IR: Creating response tool kit and IR team. - Forensics Technology and Systems - Understanding Computer Investigation – Data Acquisition.

10

IV EVIDENCE COLLECTION AND FORENSICS TOOLS Processing Crime and Incident Scenes – Working with Windows and DOS Systems. Current Computer Forensics Tools: Software/ Hardware Tools.

10

V ANALYSIS AND VALIDATION Validating Forensics Data – Data Hiding Techniques – Performing Remote Acquisition – Network Forensics – Email Investigations – Cell Phone and Mobile Devices Forensics

10

Total 50

Textbook: 1. Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and Protocols”, Wiley Publications, 2003. 2. Nelson, Phillips, Enfinger, Steuart, “Computer Forensics and Investigations”, Cengage Learning, India Edition, 2008. Reference: 1. John R.Vacca, “Computer Forensics”, Cengage Learning, 2005 2. Richard E.Smith, “Internet Cryptography”, 3 rd Edition Pearson Education, 2008. 3. MarjieT.Britz, “Computer Forensics and Cyber Crime”: An Introduction”, 3 rd Edition, Prentice Hall, 2013. Course Designer : BoS Chairman Ms. Anjana K S Prof. D Geetha Assistant Professor , Dept. of DCFS, HOD, CS

59

Course Outcomes (COs)

On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO 1 Discuss the security issues over network layer and transport layer K1

CO 2 Apply security principles in the application layer K1

CO 3 Explain computer forensics K2

CO 4 Use forensics tools Analyze and validate forensics data K3

Mapping with Program Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 L M L L L L L L M L

CO2 L L L L L M M M M S

CO3 M M M M M S L M M L

CO4 L L M M S S L M M S

S – Strong; L – Low; M – Medium

60

SEMESTER – IV

Course Code Type Course Name Category Lecture

(L) Tutorial

(T) Practical (P) Credit

19BFS4C30 Core Cyber Forensic Lab Practical - 5 27 4

Preamble: To provide students self-analysis exercise the hands on practice in cyber forensic

Prerequisite: Basic of Cyber Crime

Syllabus: Ex. No Course contents Instructional

Hours

1 Live Network capturing packets and analyzing over the live network 4

2 Vulnerability Scanning 4

3 Software Firewall and Hardware Firewall Intrusion detection and Testing 4

4 Incidence Response 4

5 Computer Investigation and Data collection 4

6 Processing Crime and Incident Scenes 4

7 Email Investigation 4

8 Mobile device investigations 4

Total 32

Reference Book: 1. Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and Protocols”, Wiley Publications, 2003. 2. Nelson, Phillips, Enfinger, Steuart, “Computer Forensics and Investigations”, Cengage Learning, India Edition, 2008.

Recommended Tools to be used: Open source tools

Focus of Course: Cyber investigation and response

Course Designer : BoS Chairman Ms. Anjana K S Prof. D Geetha Assistant Professor , Dept. of DCFS, HOD, CS

Course Outcomes (COs) On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO1 Discuss the security issues network layer and transport layer K3 CO2 Apply security principles in the application layer K3 CO3 Explain computer forensics K3 CO4 Use forensics tools & Analyze and validate forensics data K4

61

Mapping Course Outcomes with Programme Outcomes and Programme Specific Outcomes:

COs/POs/

PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 S M M L L S M L L L

CO2 M L S S M M M M M S

CO3 M L L S S M M M M S

CO4 L S S S L L M M M M

S –Strong; L –Low; M –Medium

62

SEMESTER – IV

Course Code

Type Course Name Category Lecture (L)

Tutorial (T) Practical (P) Credit

19BFS4C40 Core Audio & Video Analysis Lab Practical - 5 35 5

Preamble: To provide students self-analysis exercises the hands on practice in Audio and Video analysis.

Prerequisite: Basics of Forensic audio-video analysis and speaker identification

Syllabus:

Ex. No Course contents Instructional Hours

1 Video preprocessing 4

2 Working Copy Creation 4

3 Object identification 4

4 Human Being identification 4

5 Audio Enhancement 4

6 Video Enhancement 4

7 Image Content Analysis 4

8 Interlacing Techniques 4

9 Video Stabilization and Sharpening 4

10 Masking 4

Total 40

Text Books 1) Forensic Speaker Identification, Philip Rose: CRC Press Book, (2002).

Recommended Tools to be used: Open source tools

Focus of Course: Audio and Video analysis

Course Designer : BoS Chairman Ms. Anjana K S Prof. D Geetha Assistant Professor , Dept. of DCFS, HOD, CS

63

Course Outcomes (COs) On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO1 Understand the audio and video analysis K3 CO2 Remember the tools used K3 CO3 Apply the tools to find the speaker K3 CO4 Apply the tool to match the speaker K3

Mapping Course Outcomes with Programme Outcomes and Programme Specific Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 S M L L M L S L M L

CO2 M L M L L M S S M S

CO3 M M S M M S L M M L

CO4 S L M M S S L M M S

S –Strong; L –Low; M –Medium

64

SEMESTER – IV

Course Code Course Name Category Lecture (L) Tutorial (T) Practical (P) Credit

19BPH4A10 Forensic Physics Concept 45 5 - 4

Preamble: This course provides the student with the knowledge in Physical Crime Investigation.

Prerequisite: Basic knowledge about Physics

SYLLABUS

Unit Course contents Instructional Hours

I

UNIT I: Glass Glass: Types of glass and their composition-Forensic examination of glass fractures; Determination of direction of impact: concentric fracture, cone fracture, radial fracture, rib marks, hackle marks, backward fragmentation; Examination of glass: color, fluorescence, physical matching, density comparison, refractive index, elemental analysis, Interpretation of glass evidence; -Case studies related to glass

10

II

UNIT II: Soil Soil: Formation and types of soil; Composition and color of soil-Forensic examination of soil: particle size distribution, turbidity test-microscopic examination, density gradient analysis, ignition loss, differential thermal analysis, elemental analysis-Interpretation of soil evidence; Case studies.

10

III

UNIT 3: Toll marks Tool Marks: Types of tool marks: compression marks, striated marks, combination of compression and striated marks, repeated marks. Class characteristics and individual characteristics; Tracing and Lifting of tool marks.-Photographic examination of tool marks and cut marks; Forensic examination and comparison of tool marks.-Expert testimony in tool marks.- Comparison microscope and its applications in tool mark analysis.

10

IV

UNIT IV: Paint Paints: Types of paint and their composition; Forensic examination of paints: microscopic and macroscopic studies-pigment distribution- micro-chemical analysis, physical matching, solubility test, elemental analysis-pyrolysis, Cyclic voltammetry, AAS. Chromatographic technique- TLC, colorimetry. IR spectroscopy, X-ray diffraction; Interpretation of paint evidence; Case studies.

10

V

UNIT V Restoration of erased or obliterated marks: Method of marking-cast, punch and engrave; Methods of Obliteration; Method of restoration- etching, magnetic, electrolytic; Recording of restored marks on different surfaces. Building Materials: Types of cement and their composition. Determination of adulterants by physical, chemical and instrumental methods. Examination of brick; Analysis of Bitumen and road material.-Analysis of cement mortar, cement concrete and stones.

10

Total 50

Text Books

1. C.E.O Hara and J.W. Osterburg; an Introduction to Criminalistic, Indiana University Press, Blomington, 1972.

2. Working Procedure Manual: Physics BP R&D Publication, 2000. 3. R. Saferstein; Forensic Science Handbook, Vol.-I, II, 2004. 4. B. Caddy; Forensic Examination of Glass and Paints Analysis and Interpretation ISBN 0784 05749, 2001.

Reference Books

65

Course Outcomes (COs)

On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO 1 Define the Overview of Forensic Physics K1

CO 2 Outline the concepts of forensic sample examination. K2

CO 3 Define the Tools Verification. K3

CO 4 Apply Forensic Physics. K3

Mapping with Program Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO2 PSO3 PSO4 PSO5

CO1 S M L M M L L L M L

CO2 S L L L L M M M M S

CO3 M M M M M S L M M L

CO4 S M M M S S L M M S

S – Strong; L – Low; M – Medium

1. James Michael Curran, Tachia Natilie Hicks and John S. Buckleton; Forensic Interpretation of Glass Evidence, CRC Press, 2000.

2. David A. Crown; the Forensic Examination of Paints and Pigments, Taylor & Francis, NY, 2001. 3. Jay A.Siegel, Pekka J Saukko and Geoffrey C. Kooupfer; Encyclopedia of Forensic Science, Academic Press,

2000. Course Designer : BoS Chairman Ms. Anjana K S Prof. D Geetha Assistant Professor , Dept. of DCFS, HOD, CS

66

SEMESTER – IV

Course Code Course Name Category Lecture (L) Tutorial (T) Practical (P) Credit

19BFS4S20 Social Media Forensic Concept 45 5 - 2

Preamble: This course provides the student with the knowledge in Social Media Forensic.

Prerequisite: Know about social media in general

SYLLABUS

Unit Course contents Instructional Hours

I

Networks- Concepts: nodes, edges, adjacency matrix, one and two-mode networks, node degree Random network models: Erdos-Renyi and Barabasi-Albert- Concepts: connected components, giant component, average shortest path, diameter, breadth-first search, preferential attachment

10

II Network centrality- Concepts: Betweenness, closeness, eigenvector centrality (+ PageRank), network centralization 10

III Community- Concepts: clustering, community structure, modularity, overlapping communities Small world network models, optimization, strategic network formation and search Concepts: small worlds, geographic networks, decentralized search

10

IV Contagion, opinion formation, coordination and cooperation- Concepts: simple contagion, threshold models, opinion formation, unusual applications of SNA 10

V SNA and online social networks- Concepts: how services such as Facebook, LinkedIn, Twitter, Couch Surfing, etc. are using SNA to understand their users and improve their functionality

10

Total 50

Text books 1. John Scott, Social Network Analysis, 3rd Edition, SAGE, 2012. 2. Wouter de Nooy, Andrej Mrvar, Vladimir Batagelj, Exploratory Social Network Analysis withPajek, 2nd Revised Edition, Cambridge University Press, 2011. Reference Books 1. Patrick Doreian, FransStokman, Evolution of Social Networks, Routledge, 2013. 2. David Easley and Jon Kleinberg, Networks, Crowds, and Markets: Reasoning About a Highly Connected World, Cambridge University Press, 2010. Course Designer : BoS Chairman Ms. Anjana K S Prof. D Geetha Assistant Professor , Dept. of DCFS, HOD, CS

67

Course Outcomes (COs)

On successful completion of this course the students will be able to:

CO Number Course Outcome (CO) Statement

Blooms Taxonomy Knowledge

Level CO 1 Understanding the Networking concepts K1

CO 2 Remember network centrality concepts K1

CO 3 Apply the community and social media K2

CO 4 Applications of Social Media K3

Mapping with Program Outcomes:

COs/POs/ PSOs PO1 PO2 PO3 PO4 PO5 PSO1 PSO

2 PSO3 PSO4 PSO5

CO1 S M L L M L M L M L

CO2 S L L L L M M S M S

CO3 M L S M S S L M M L

CO4 L L M M S S L M M S

S – Strong; L – Low; M – Medium

68

1.

.

2.

.

3 .

CU

RR

ICU

LU

M S

TR

UC

TU

RE

OF

UG

PR

OG

RA

MS

(2019 –

20

B

atc

h O

nw

ard

s)

PA

RT

-

I

PA

RT

-

II

PA

RT

-

III

PA

RT

-

IV

PA

RT

- V

En

vir

on

men

tal S

tudie

s,

Valu

e E

du

cati

on

an

d H

um

an

Rig

hts

Rig

hts

Skill B

ased C

ou

rses

Or

r

Or

r

O

r

r

Non

– M

ajo

r E

lecti

ves

1.

.

C

ore

e

2.

.

A

llie

d

d

3.

.

E

lecti

ves

s

En

glish

h

: E

nglish

for

En

rich

men

t I

& I

I

II

Exte

nsio

n A

cti

vit

ies

a.

Tam

il

Tam

il

b.

Hin

di

Hin

di

c.

Mala

yala

m

Mala

yala

m

d.

Fre

nch

Fre

nch

1.

NS

S /

Sport

s

4.

Extr

a C

redit

Course -

MO

OC

cou

rses

69

EXAMINATION SYSTEM UNDER AUTONOMY

1. OBE ASSESSMENT COMPONENT MATRIX

Course Category

Lan

guag

e

Con

cept

App

licat

ion

Ana

lysi

s

Prac

tical

(R

egul

ar)

Prac

tical

(M

SW)

Prac

tical

(S

kill

Bas

ed)

Training / Project

Training / Project

Assessment Components UG PG

Component -1 CIA – Test 10 10 10 10 20 10

(No

inte

rnal

mar

ks)

Component -2 Attendance 5 5 5 5 5 10 5 5

Component -3 Assignments 5 5 5 5 -

Component -4 List of evaluation components given below based on the course scope whichever conducted (any three)

5 5 5 5 15 30 * 5 35 *

Total Marks 25 25 25 25 40 40 20 40 * no. of evaluation components may vary

Component – 4 1. Puzzles (Word / Logic / Math) 2. Games 3. Simulation Exercises 4. Reports 5. Group Discussion 6. Article Review 7. Flowcharts 8. Miniatures 9. Models 10. Portfolios 11. Demonstration 12. Business Plan

13. Snap Talk 14. Questionnaire 15. Class Presentation (Oral / Poster) 16. Debate 17. Seminar 18. Paper Presentation 19. Publication 20. Viva-voce 21. Case Study 22. Survey 23. Mini Project (Group / Individual) 24. USP Component (Unique to the Course)

2. MARK PREPARATION FORMAT:

Sl.No

Name

Reg. No.

RUBRICS EVALUATION Total

Component 1

Component 2

Component 3

Component 4

3. Pattern of Examinations: The college follows semester pattern. Each academic year consists

of two semesters and each semester ends with the End Semester Examination. A student should

70

have a minimum of 75% attendance out of 90 working days to become eligible to sit for the

examinations.

4. Internal Examinations: The questions for every examination shall have equal representation

from the units of syllabus covered. The question paper pattern and coverage of syllabus for each

of the internal (CIA) tests for UG programs are as follows.

i) First Internal Assessment Test

Syllabus : First Two Units

Working Days : On completion of 30 working days, approximately

Duration : Two Hours

Max. Marks : 50

For the First internal assessment test, the question paper pattern shall be as given below.

CIA Assessment (For CIA - I and CIA - II) Bloom’s Category

Level Sections Marks Description

K1=Remember K2= Understand

Section A 6 Questions * 1 Mark 6 Multiple choice

Questions

K1=Remember K2= Understand K3= Apply

Section B 4 Questions * 5 Marks

20 Either or type Questions

(250 words) K1 K2 K3 2 4 2

K1=Remember K2= Understand K3= Apply

Sections C 3 Questions * 8 Marks

24 Either or type Questions

(500 words) K1 K2 K3 2 2 2

Total 50 (Both the either or choice must be in same level) K1= Remember Level, K2= Understand Level, K3= Apply Level.

Question Paper Pattern Section A

Attempt all questions (three each from both units) 06 questions – each carrying one mark 06 X 01 = 06 Multiple Choice

Section B Attempt all questions (two each from both units) 04 questions – each carrying five marks 04 X 05 = 20 Inbuilt Choice [Either / Or]

Section C Attempt all questions (Minimum one question shall be asked from each unit) 03 questions - each carrying eight marks 03 X 08 = 24

71

Inbuilt Choice [Either / Or]

(IDC- General Intelligence and Reasoning) Section A

Attempt all questions (Minimum 22 questions from each unit) 50 questions – each carrying one mark 50X 01 = 50 Multiple Choice

Convert this marks to a maximum of 5 i.e., (Marks obtained/50) X 0.5 === A ii) Second Internal Assessment Test

Syllabus : Third and Fourth Units

Working Days : On completion of 65 working days approximately,

Duration : Two Hours

Max. Marks : 50

For the Second internal assessment test, the question paper pattern shall be as given

below.

Question Paper Pattern

Section A

Attempt all questions (three each from both units)

06 questions – each carrying one mark 06 X 01 = 06

Multiple Choice

Section B

Attempt all questions (two each from both units)

04 questions – each carrying five marks 04 X 05 = 20

Inbuilt Choice [Either / Or]

Section C

Attempt all questions

(Minimum one question shall be asked from each unit)

03 questions - each carrying eight marks 03 X 08 = 24

Inbuilt Choice [Either / Or] (IDC - General Intelligence and Reasoning)

Section A Attempt all questions (Minimum 22 questions from each unit) 50 questions – each carrying one mark 50X 01 = 50

Multiple Choice Convert this marks to a maximum of 5 i.e., (Marks obtained/50) X 0.5 === B Average of CIA I & II i.e., A & B is to be taken.

iii) Model Examination

72

Syllabus : All Five Units

Working Days : On completion of 85 working days approximately,

Examination : Commences any day from 86th working day to 90th working day.

Duration : Three Hours

Max. Marks : 75

For the model examinations, the question paper pattern shall be the same for all UG programmes,

as given below. Model and Semester Exam

Bloom’s Category Level Sections Marks Description

K1= Remember Section A 10 Questions * 1 Marks

10 Multi choice Questions

K1= Remember K2= Understand K3= Apply

Section B 5 Questions * 5 Marks (either or type)

25 Either or types Questions (250 words) K1 K2 K3

4 4 2 K1= Remember K2= Understand K3= Apply K4 = Analyze

Sections C 5 Questions * 8 Marks (either or type)

40 Either or types Questions (500 words) K1 K2 K3 / K4

4 4 2 Total 75

(Both the either or choice must be in same level)

K1= Remember Level, K2= Understand Level, K3= Apply Level, K4= Analyze Level.

Question Paper Pattern

Section – A (10 X 1 = 10 Marks)

Answer the following questions

Multiple Choice questions

1 Unit I

2 Unit I

3 Unit II

4 Unit II

5 Unit III

6 Unit III

7 Unit IV

8 Unit IV

9 Unit V

10 Unit V

73

Section – B (5 X 5 = 25 Marks)

Answer either (a) or (b) in each unit of the following questions

11. a) Unit – I Or

b) Unit – I

12. a) Unit II Or

b) Unit II

13. a) Unit III Or

b) Unit III

14. a) Unit IV Or

b) Unit IV

15. a) Unit V Or

b) Unit V

Section – C (5 X 8 = 40 Marks)

Answer either (a) or (b) in each unit of the following questions

16. a) Unit – I Or

b) Unit – I

17. a) Unit II Or

b) Unit II

18. a) Unit III Or

b) Unit III

19. a) Unit IV Or

b) Unit IV

20. a) Unit V Or

b) Unit V

(IDC - General Intelligence and Reasoning) Section A

Attempt all questions (Minimum 12 questions from each unit)

75 questions – each carrying one mark 75X 01 = 75

Multiple Choice Reduce these marks to a maximum of 05 i.e., (Marks obtained / 75) X 05 C The following is the Question Paper Pattern for the courses Environmental Studies and Value Education and Human Rights,. Syllabus : All Five Units

Duration : Three Hours

Max. Marks : 50

74

Question Paper Pattern

Section A (5 x 10 = 50 marks)

Five Questions of “either / or” type. Each question carries 10 marks. Answer all questions Q.1 (a) ___________________ or (b) ___________________ Q.2 (a) ___________________ or (b) ___________________ Q.3 (a) ___________________ or (b) ___________________ Q.4 (a) ___________________ or (b) ___________________ Q.5 (a) ___________________ or (b) ___________________

Assignments Each student is expected to submit at least two assignments per course. The assignment topics will be allocated by the course teacher. The students are expected to submit the first assignment before the commencement of first CIA and the second assignment before the commencement of second CIA.

Scoring pattern for Assignments Punctual Submission : 2 Marks Contents : 4 Marks Originality/Presentation skill : 4 Marks Maximum : 10 Marks x 2 Assignments = 20 marks (Redu

Attendance Mark Attendance Range Marks 96 % and above - 5 Marks 91 % & up to 95 % - 4 Marks 86% & up to 90 % - 3 Marks 81% & up to 85 % - 2 Marks From 75 % to 80% - 1 Mark

Maximum -

Outcome Based Education Assessment Pattern (Internals) 2019 – 20 batch onwards

Internals Setup : UG I (25) + E (75) – Type 1

Name of the Examination

Mark Entry In CAMU Conversion Calculation

Final Mark Generated by (CAMU)

CIA Test – I 50 5 Average of CIA I & II (5) 5 CIA Test – II 50 5

Model Examination 75 5 5 Assignment 10 5 5 Attendance 5 - 5 OBE Component 30 5 5

Total Marks 25

75

Internals Setup : UG I (20) + E (55) – Type 2 (Skill Based Theory)

Name of the Examination

Mark Entry In CAMU Conversion Calculation

Final Mark Generated by (CAMU)

CIA Test – I 50 4 Average of CIA

I & II (4)

4

CIA Test – II 50 4 Model Examination 75 4 4 Assignment 10 4 4 Attendance 4 - 4 OBE Component 30 4 4

Total Marks 20

Internals Setup : UG (I-50) - Type 3 (EVS/YOGA)

Name of the Examination

Mark Entry In CAMU

Conversion Calculation Final Mark Generated by (CAMU)

CIA Test – I 50 20 Average of CIA I & II (20) 20 CIA Test – II 50 20

Model Examination 75 25 25 Attendance 5 - 5

Total Marks 50

4. Internals Setup : UG IP (40) + EP (60) – Type 5 (Practicals)

Name of the Examination

Mark Entry In CAMU Conversion Calculation

Final Mark Generated by (CAMU)

CIA Test – I 50 10 Average of CIA I & II (10)

10 CIA Test – II 50 10 Model Examination 75 10 10 Record 8 - 8 Lab Performance / OBE Component 30 12 12

Total Marks 40

5. Internals Setup : UG IP (30) + EP (45) – Type 8 (Skill Based

Practicals)

Name of the Examination

Mark Entry In CAMU Conversion Calculation

Final Mark Generated by (CAMU)

CIA Test – I 50 5 Average of CIA I & II (5) 5 CIA Test – II 50 5

Model Examination 75 5 5 Record/ Observation 8 - 8

Lab Performance/ OBE Component 30 12 12

Total Marks 30

76

5. External Examinations: The external examinations for theory courses will be conducted for 75 % marks, for all UG and PG degree programs. The external theory examinations will be conducted only after the completion of 90 working days in each semester. Normally, the external practical examinations will be conducted before the commencement of theory examinations. Under exceptional conditions these examinations may be conducted after theory examinations are over. The external evaluation will be for 60 % marks of each practical course. The External Assessment marks for Practical Examinations are based on the following criteria. The assessment is for 60 % marks of each practical course.

Programmes (2*24) 48 (Algorithm 12 marks, Key and execution12 marks) Record 12 --------

Total 60 --------

The External Assessment marks for Skill Based Practical Examinations are based on the following criteria. The assessment is for 45 marks of each practical course.

Programmes (2*20) 40 (Algorithm 08 marks, Key and execution12 marks) Record 05 --------

Total 45 --------

The External Assessment marks for Non Major Elective Practical Examinations are based on the following criteria. The assessment is for 50 marks.

Programmes (2*21) 42 (Algorithm 7 marks, Key and execution 14 marks) Record 8 --------

Total 50 _____

77

The external viva voce examinations for project works also will be conducted after completion of theory examinations. The external assessment is for 100 % marks of the project work..

The External Assessment mark for project evaluation is based on the following criteria. a) Assessment (80%) 80 b) Viva (20%) 20

----------------- Total 100 -----------------

End Semester Examination Question Paper Pattern

Syllabus : All Five Units Working Days : On completion of a minimum of 90 working days. Duration : Three Hours Max. Marks : 75

Question Paper Pattern

For the End Semester External Theory Examinations (including Part IV - Non Major

Elective & Inter Disciplinary Courses), the question paper pattern shall be the same for all UG

programmes.

Section – A (10 X 1 = 10 Marks)

Answer the following questions

Multiple Choice questions

1 Unit I

2 Unit I

3 Unit II

4 Unit II

5 Unit III

6 Unit III

7 Unit IV

8 Unit IV

9 Unit V

10 Unit V

78

Section – B (5 X 5 = 25 Marks)

Answer either (a) or (b) in each unit of the following questions

Answers should not exceed 250 words

11. a) Unit – I Or

b) Unit – I

12. a) Unit II Or

b) Unit II

13. a) Unit III Or

b) Unit III

14. a) Unit IV Or

b) Unit IV

15. a) Unit V Or

b) Unit V

Section – C (5 X 8 = 40 Marks)

Answer either (a) or (b) from all questions

Answers should not exceed 500 words

16. a) Unit – I Or

b) Unit – I

17. a) Unit II Or

b) Unit II

18. a) Unit III Or

b) Unit III

19. a) Unit IV Or

b) Unit IV

20. a) Unit V Or

b) Unit V Part IV-Non Major Elective/Inter Disciplinary Courses

IDC - General Intelligence and Reasoning Section A

Attempt all questions (Minimum 12 questions from each unit)

75 questions – each carrying one mark 75X 01 = 75

Multiple Choice

(Reduce these marks to a maximum of 55 i.e., (Marks obtained / 75) X 55)

79

NME - Numerical Ability-I, Numerical Ability-II

Section A

Attempt all questions (Minimum 12 questions from each unit)

75 questions – each carrying one mark 75X 01 = 75

Multiple Choice

(Reduce these marks to a maximum of 50 i.e., (Marks obtained / 75) X 50)

6. Essential conditions for the Award of Degree / Diploma / Certificates:

1. Pass in all components of the degree, i.e., Part–I, Part–II, Part–III, Part – IV and Part–V

individually is essential for the award of degree.

2. First class with Distinction and above will be awarded for part III only. Ranking will be based

on marks obtained in Part – III only.

3. GPA (Grade Point Average) will be calculated every semester separately. If a candidate has

arrears in a course, then GPA for that particular course will not be calculated. The CGPA will

be calculated for those candidates who have no arrears at all. The ranking also will be done

for those candidates without arrears only.

4. The improvement marks will not be taken for calculating the rank. In the case of courses

which lead to extra credits also, they will neither be considered essential for passing the

degree nor will be included for computing ranking, GPA, CGPA etc.

5. The grading will be awarded for the total marks of each course.

6. Fees shall be paid for all arrears courses compulsorily.

7. There is provision for re-totaling and revaluation for UG and PG Programmes on payment of

prescribed fees. 7. Grade system for extra credit courses

S.No Marks Grade

1 90 – 100 O – Outstanding

2 75 – 89 D – Distinction

3 70 – 74 A – Very Good

4 60 – 69 B – Good

5 50 – 59 C – Average

6 Less than 50 R – Reappear

8. Classification of Successful Candidates [Course-wise]

RANGE OF MARKS (In percent) GRADE POINTS GRADE DESCRIPTION

90 - 100 9.0 - 10.0 O OUTSTANDING 80 - 89 8.0 - 8.9 D+ EXCELLENT

80

75 - 79 7.5 - 7.9 D DISTINCTION 70 – 74 7.0 - 7.4 A+ VERY GOOD 60 – 69 6.0 - 6.9 A GOOD 50 – 59 5.0 - 5.9 B AVERAGE

40 – 49 # 4.0 - 4.9 C SATISFACTORY 00 – 39 0.0 U RE-APPEAR

ABSENT 0.0 U ABSENT

Reappearance is necessary for those who score below 50% Marks in PG **;

those who score below 40% Marks in UG*;

# only applicable for UG programs

Individual Courses

Ci = Credits earned for course “i” in any semester

Gi = Grade Point obtained for course “I” in any semester

'n' refers to the semester in which such courses were credited.

GRADE POINT AVERAGE [GPA] = ΣCi G i

ΣCi Sum of the multiplication of grade points by the credits of the courses

GPA = ---------------------------------------------------------------------------------- Sum of the credits of the courses in a semester

Classification of Successful Candidates (Overall):

CGPA GRADE CLASSIFICATION OF FINAL RESULT

9.5 to 10.0 O+ First Class - Exemplary *

9.0 and above but below 9.5 O 8.5 and above but below 9.0 D++

First Class with Distinction * 8.0 and above but below 8.5 D+ 7.5 and above but below 8.0 D 7.0 and above but below 7.5 A++

First Class 6.5 and above but below 7.0 A+ 6.0 and above but below 6.5 A 5.5 and above but below 6.0 B+

Second Class 5.0 and above but below 5.5 B 4.5 and above but below 5.0 C+ #

Third Class 4.0 and above but below 4.5 C # 0.0 and above but below 4.0 U Re-appear

“*” The candidates who have passed in the first appearance and within the prescribed semester of the Programme (Major, Allied, Inter Departmental and Elective Course alone)

are eligible. “#” Only applicable to U.G. Programme

Σn Σi Cni Gni CUMULATIVE GRADE POINT AVERAGE [CGPA] = ------------------

81

Σn Σi Cn i Sum of the multiplication of grade points by the credits of entire program

CGPA = --------------------------------------------------------------------------------- Sum of the Courses of entire Program

In order to get through the examination, each student has to earn the minimum marks

prescribed in the internal (wherever applicable) and external examinations in each of the

theory course, practical course and project viva.

Normally, the ratio between internal and external marks is 25:75. There is no passing

minimum for internal component. The following are the minimum percentage and marks

for passing of each course, at UG and PG levels for external and aggregate is as follows:

S. No Program Passing Minimum in Percent External (75) Aggregate (100)

1 UG Degree 40% (30) 40% (40) 2 PG Degree 50% (38) 50% (50)

However, the passing minimum marks may vary depending up on the maximum marks of

each course. The passing minimum at different levels of marks is given in the following

table:

S. No

UG & PG Maximum Marks Passing minimum for UG Passing minimum for PG

Int. Ext. Total Int. Ext. Agg. 40% Int. Ext. Agg.

50% 1 25 75 100 - 30 40 - 38 50 2 50 150 200 - 60 80 - 75 100 3 40 60 100 - 24 40 - 30 50 4 80 120 200 - 48 80 - 60 100 5 80 20 100 - 8 40 - 10 50 6 160 40 200 - 16 80 - 20 100 7 15 60 75 - 24 30 - 30 38 8 50 - 50 20 - 20 25 - 25 9 - 50 50 - 20 20 - 25 25 10 - - 100 - - - - 50 50 11 20 30 50 - - - - 15 25 12 - - 200 - - - - 100 100 13 10 40 50 - - - - 20 25

Reappearance The students having arrears shall appear in the subsequent semester (external) examinations

compulsorily. The candidates may be allowed to write the examination in the same syllabus

for 3 years only. Thereafter, the candidates shall be permitted to write the examination in the

82

revised / current syllabus depending on various administrative factors. There is no re-

examination for internals.

Criteria for Ranking of Students:

1. Marks secured in core, elective and Inter Disciplinary Course (Part III) courses will be

considered for PG Programs and marks secured in Core, Elective, Inter Departmental

and Allied Courses (Part-III) will be considered for UG programs, for ranking of

students.

2. Candidate must have passed all courses prescribed chosen / opted in the first attempt

itself.

3. Improvement marks will not be considered for ranking but will be considered for

classification.

External Examination Grievances Committee:

Those students who have grievances in connection with examinations may represent their

grievances, in writing, to the chairman of examination grievance committee in the

prescribed Performa. The Principal will be chairman of this committee.

83

SREE SARASWATHI THYAGARAJA COLLEGE (AUTONOMOUS)

THIPPAMPATTI, POLLACHI - 642 107

Student Grievance Form

(Forms Available at Utility Stores) Date:

Place:

From

Register No : ………………………………………........,

Name : ………………………………………........, Class : ………………………………………….....,

Sree Saraswathi Thyagaraja College,

Pollachi – 642 107

To

The Principal / Examination-in-charge,

Sree Saraswathi Thyagaraja College, Pollachi – 642 107

Through: 1. Head of the Department,

Department of ……………….……….,

Sree Saraswathi Thyagaraja College,

Pollachi – 642 107 2. Dean of the Department

Faculty of ……………………………….,

Sree Saraswathi Thyagaraja College,

Pollachi – 642 107

Respected Sir / Madam,

Sub: ………………………………………………………………………... - reg.

NATURE OF GRIEVANCE

………………………………………………………………...…………………………………………………………

……………………………………………………………………………………………………………………………

……………………………………………………………………………………………………………………………

………

Thanking you, Yours Truly,

Signature

Forwarded by:

1. HOD with comments / recommendation

………………………………………………………………………………...…………………………............

2. Dean with comments / recommendation

………………………………………………………………………………...…………………………............

3. Signature and Directions of the Principal

………………………………………………………………………………...…………………………............

4. Controller of Examinations:

………………………………………………………………………………...…………………………............