A Unit of Health & Education Society (Regd.)

  • Recognized Under Sec. 2(f) of UGC Act 1956,
  • Approved by AICTE, Ministry of Education, Govt. of India,
  • Affiliated to Guru Gobind Singh Indraprastha University.

Value added courses

INTRODUCTION

IT skill based prestigious under graduate programme is BCA, the programme covers rudimentary to advance concepts in Computer Science and its applications in various domains. In broader perspective the mission of teaching BCA is to produce employable IT workforce, that will have sound knowledge of IT and business fundamentals that can be applied to develop and customize solutions for various Corporate Enterprises. An exceptionally broad range of topics covering current trends and technologies in the field of information technology and computer science are included in the syllabus. The hands on sessions in Computer labs using various Programming languages and tools are also given to have a deep conceptual understanding of the topics to widen the horizon of students’ self- experience. The learner, choose BCA Programme to develop the ability to think critically, logically, analytically and to use and apply current technical concepts and practices in the core development of solutions in the multiple domains. The knowledge and skills gained with a degree in Computer Application prepare graduates for a broad range of jobs in education, research, government sector, business sector and industry.

DICT-VAC-02 DIGITAL MARKETING Credits:4

Pre-Requisites

  1. Students should have knowledge of online marketing fundamentals and advertising via online media such as print, digital, internet marketing

Objectives

The main objective of this course to make participants understand the online business models and digital marketing methodology from the point of view of consumers, entrepreneurs. Moreover, the course aims at understanding the student’s different techniques of digital marketing so that they can utilize this technique to support organization’s marketing activities

LEARNING Outcomes

On successful completion of the course, the students will be able to:

  1. Different techniques of promotion on online platforms
  2. Internet marketing communication techniques
  3. Interpret the traditional marketing mix within the context of a changing and extended range of digital strategies and tactics.
  4. Comprehend the importance of conversion and working with digital relationship marketing

GGSIPU UNIVERSITY Syllabus

No. PROGRAMME COURSE CODECOURSE COURSE TYPE CREDITS PDF
MCA MCA 128Digital Marketing Discipline Specific Electives 4
BCA BCA 222Digital Marketing Skill Enhancement 4

Detail Contents

S.No. TOPIC DESCRIPTION MODULE DURATION
Introduction Digital Marketing Evolution, Consumer Behavior, STP, E-Marketing Mix, Content of Digital Marketing Theory 5 Hr
Google My Business Introduction, Create business, Profile generation, creation of website, promotion, keyword selection Theory+Practical 5 Hr
Search Engine Optimization Introduction, On page SEO, Offpage SEO Theory+Practical 4 Hr
Content Writing Introduction, different forms of content writing skills Theory+Practical 1 Hr
Ads Marketing Facebook, Instagram, Google Ads Marketing Practical 5 Hr
Google Analytics Google Analytics, evaluating traffic, cost/ lead Theory+Practical 2 Hr
Blog/Videos Writing impactful blogs and video creation Theory+Practical 2 Hr
Website Building and Marketing WordPress, Shopify, HTML Theory+Practical 4 Hr
Website Building and Marketing WordPress, Shopify, HTML Theory+Practical 4 Hr
Freelancing/Job How to become a digital marketing freelancer and how to get jobs in the field of digital Marketing Theory 2 Hr
 

List of Suggested Books

  1. 1. Chaffey, D, Ellis-Chadwick, F, Johnston, K. and Mayer, R, (4th Ed.,2009) Internet Marketing: Strategy, Implementation and Practice, Third Edition, Pearson Education, New Delhi.
  2. Strauss, Judy and Frost, Raymond (6th Ed, 2011), E-Marketing, 5th Edition, PHI Learning, New Delhi.
  3. Roberts, M, L,.(3rd Ed, 2013) Internet Marketing, 1st Indian Edition, Cengage Learning, New Delhi
  4. Shainash G, and Jagdish N Sheth (1st Ed, 2008). Customer Relationship Management- A Strategic Perspective, Macmillan India Ltd
DICT-VAC-01 BLOCK CHAIN (BASICS) Credits:2

Pre-Requisites

  1. Cryptography Techniques
  2. Data Structures and Algorithms
  3. Introduction to Programming

Objectives

The objective of this course is to provide conceptual understanding of how block chain technology can be used to innovate and improve business processes. The course covers the technological underpinning of block Chain operations in both theoretical and practical implementation of solutions using block Chain technology.

Learning Outcomes

At the end of this course, the students will be able to:

  1. Understand block chain technology.
  2. Develop block chain based solutions and write smart contract using Hyperledger Fabric and Ethereum frameworks.
  3. Build and deploy block chain application for on premise and cloud based architecture.
  4. Integrate ideas from various domains and implement them using block chain technology in different perspectives.

Detail Contents

S.No. TOPIC DESCRIPTION DURATION
Introduction Introduction: Overview of Block chain, Public Ledgers, Bitcoin, Smart Contracts, Block in a Block chain, Transactions, Distributed Consensus, Public vs Private Block chain, Understanding Crypto currency to Block chain, Permissioned Model of Block chain, Overview of Security aspects of Block chain Basic Crypto Primitives: Cryptographic Hash Function, Properties of a hash function, Hash pointer and Merkle tree, Digital Signature, Public Key Cryptography, A basic cryptocurrency. (10 Hour)
Basic Crypto Primitives: y Cryptographic Hash Function, Properties of a hash function, Hash pointer and Merkle tree, Digital Signature, Public Key Cryptography, A basic cryptocurrency. (10 Hour)
Understanding Block chain with Crypto currency Bitcoin and Block chain: Creation of coins, Payments and double spending, Bitcoin Scripts, Bitcoin P2P Network, Transaction in Bitcoin Network, Block Mining, Block propagation and block relay. Working with Consensus in Bitcoin: Distributed consensus in open environments, Consensus in a Bitcoin network, Proof of Work (PoW) – basic introduction, Hashcash PoW, Bitcoin PoW, Attacks on PoW and the monopoly problem, Proof of Stake, Proof of Burn and Proof of Elapsed Time, The life of a Bitcoin Miner, Mining Difficulty, Mining Pool. (10 Hour)

List of Suggested Books

  1. 1. Melanie Swan, “Block Chain: Blueprint for a New Economy”, O’Reilly, 2015
  2. Josh Thompsons, “Block Chain: The Block Chain for Beginners- Guide to Blockchain Technology and Leveraging BlockChain Programming”
  3. Daniel Drescher, “Block Chain Basics”, Apress; 1stedition, 2017
  4. Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
  5. Imran Bashir, “Mastering Block Chain: Distributed Ledger Technology, Decentralization and Smart Contracts Explained”, Packt Publishing
  6. Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build Smart Contracts for Ethereum and Block Chain”, Packt Publishing
  7. Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O’Dowd, Venkatraman Ramakrishna, “Hands-On Block Chain with Hyperledger: Building Decentralized Applications with Hyperledger Fabric and Composer”, Import, 2018
DICT-VAC-02 ROBOTICS (BASICS) Credits:2

Pre-Requisites

  1. Basic Engineering Mathematics
  2. Automation and Control

Objectives

The objective of this course is to impart knowledge about industrial robots for their control and design.

Learning Outcomes

After the completion of this course, the students will be able to:

  1. Perform kinematic and dynamic analyses with simulation.
  2. Design control laws for a robot.
  3. Integrate mechanical and electrical hardware for a real prototype of robotic device.
  4. Select a robotic system for given application.

Detail Contents

S.No. TOPIC DESCRIPTION DURATION
Introduction to Robotics
  1. 1.1 Types and components of a robot, Classification of robots, closed-loop and open- loop control systems.
  2. 1.2 Kinematics systems; Definition of mechanisms and manipulators, Social issues and safety.
(7 Hour)
Robot Kinematics and Dynamics
  1. 2.1 Kinematic Modelling: Translation and Rotation Representation, Coordinate transformation, DH parameters, Jacobian, Singularity, and Statics
  2. 2.2 Dynamic Modelling: Equations of motion: Euler-Lagrange formulation
(10 Hour)
Sensors and Vision System
  1. 3.1 Sensor: Contact and Proximity, Position, Velocity, Force, Tactile etc.
  2. 3.2 Introduction to Cameras, Camera calibration,Geometry of Image formation, Euclidean/Similarity/Affine/Projective transformations
  3. 3.3 Vision applications in robotics.
(13 Hour)

List of Suggested Books

  1. Saha, S.K., “Introduction to Robotics, 2nd Edition, McGraw-Hill Higher Education, New Delhi, 2014.
  2. Ghosal, A., “Robotics”, Oxford, New Delhi, 2006.
  3. Niku Saeed B., “Introduction to Robotics: Analysis, Systems, Applications”, PHI, New Delhi.
  4. Mittal R.K. and Nagrath I.J., “Robotics and Control”, Tata McGraw Hill.
  5. Mukherjee S., “Robotics and Automation”, Khanna Publishing House, Delhi.
  6. Craig, J.J., “Introduction to Robotics: Mechanics and Control”, Pearson, New Delhi, 2009
  7. Mark W. Spong, Seth Hutchinson, and M. Vidyasagar, “Robot Modelling and Control”, John Wiley and Sons Inc, 2005
  8. Steve Heath, “Embedded System Design”, 2nd Edition, Newnes, Burlington, 2003
  9. Merzouki R., Samantaray A.K., Phathak P.M. and Bouamama B. Ould, “Intelligent Mechatronic System: Modeling, Control and Diagnosis”, Springer.
DICT-VAC-03 QUANTUM COMPUTING (BASICS) Credits:2

Pre-Requisites

  1. Data Structure and Algorithm.
  2. Programming in Python/C#

Objectives

The objective of this course is to impart necessary knowledge to the learner so that he/she can develop and implement algorithm and write programs using these algorithm.

Learning Outcomes

At the end of this course, the students will be able to:

  1. Explain the working of a Quantum Computing program, its architecture and program model.
  2. Develop quantum logic gate circuits
  3. Develop quantum algorithm
  4. Program quantum algorithm on major toolkits

Detail Contents

S.No. TOPIC DESCRIPTION DURATION
Introduction to Quantum Computing
  1. 1.1 Motivation for studying Quantum Computing
  2. 1.2 Major players in the industry (IBM, Microsoft, Rigetti, D-Wave etc.)
  3. 1.3 Origin of Quantum Computing
  4. 1.4 Overview of major concepts in Quantum Computing
    1. Qubits and multi-qubits states, Bra-ket notation
    2. Bloch Sphere representation
    3. Quantum Superposition
    4. Quantum Entanglement
(9 Hour)
Math Foundation for Quantum Computing
  1. 2.1 Matrix Algebra: basis vectors and orthogonality, inner product and Hilbert spaces, matrices and tensors, unitary operators and projectors, Dirac notation, Eigen values and Eigen vectors.
(9 Hour)
Building Blocks for Quantum Program
  1. 3.1 Architecture of a Quantum Computing platform
  2. 3.2 Details of q-bit system of information representation
    1. Block Sphere
    2. Multi-qubits States
    3. Quantum superposition of qubits (valid and invalid superposition)
    4. Quantum Entanglement
    5. Useful states from quantum algorithmic perceptive e.g. Bell State
    6. Operation on qubits: Measuring and transforming using gates.
    7. Quantum Logic gates and Circuit: Pauli, Hadamard, phase shift, controlled gates, Ising, Deutsch, swap etc.
  3. 3.3 Programming model for a Quantum Computing Program
    1. Steps performed on classical computer
    2. Steps performed on Quantum Computer
    3. Moving data between bits and qubits
(9 Hour)

List of Suggested Books

  1. Michael A. Nielsen, “Quantum Computation and Quantum Information”, Cambridge University Press.
  2. David McMahon, “Quantum Computing Explained”, Wiley
  3. IBM Experience https://quantumexperience,ng,bluemix.net
  4. Microsoft Quantum Development Kit https://www.microsoft.com/en-us/quantum/development-kit
  5. Forest SDK PyQuil: https://pyquil.readthedocs.io/en/stable/
DICT-VAC-04 CYBER SECURITY (BASICS) Credits:2

Pre-Requisites

  1. Basic knowledge of Computers
  2. Basic knowledge of networking and Internet
  3. Hands on Windows operating system

Objectives

The course has been designed to give students an extensive overview of cyber security issues, tools and techniques that are critical in solving problems in cyber security domains.The course aims at providing students with concepts of computer security, cryptography, digital money, secure protocols, detection and other security techniques. The course will help students to gauge understanding in essential techniques in protecting Information Systems, IT infrastructure, analysing and monitoring potential tHoureats and attacks, devising security architecture and implementing security solutions. The students will also have a wider perspective to information security from national security perspective from both technology and legal perspective.

Learning Outcomes

After completion of this course, the students should be able to:

  1. Understand, appreciate, employ, design and implement appropriate security technologies and policies to protect computers and digital information.
  2. Identify & Evaluate Information Security tHoureats and vulnerabilities in Information Systems and apply security measures to real time scenarios
  3. Identify common trade-offs and compromises that are made in the design and development process of Information Systems
  4. Demonstrate the use of standards and cyber laws to enhance information security in the development process and infrastructure protection

Detail Contents

S.No. TOPIC DESCRIPTION DURATION
Cyber Security Concepts Essential Terminologies: CIA, Risks, Breaches, THoureats, Attacks, Exploits. Information Gathering (Social Engineering, Foot Printing & Scanning). Open Source/ Free/ Trial Tools: nmap, zenmap, Port Scanners, Network scanners. (4 Hour)
Cryptography and Cryptanalysis Introduction to Cryptography, Symmetric key Cryptography, Asymmetric key Cryptography, Message Authentication, Digital Signatures, Applications of Cryptography. Overview of Firewalls- Types of Firewalls, User Management, VPN Security, Security Protocols: – security at the Application Layer- PGP and S/MIME, Security at Transport Layer- SSL and TLS, Security at Network Layer-IPSec. Open Source/ Free/ Trial Tools: Implementation of Cryptographic techniques, OpenSSL, Hash Values Calculations MD5, SHA1, SHA256, SHA 512, Steganography (Stools) (8 Hour)
Infrastructure and Network Security Introduction to System Security, Server Security, OS Security, Physical Security, Introduction to Networks, Network packet Sniffing, Network Design Simulation. DOS/ DDOS attacks. Asset Management and Audits, Vulnerabilities and Attacks. Intrusion detection and Prevention Techniques, Host based Intrusion prevention Systems, Security Information Management, Network Session Analysis, System Integrity Validation. Open Source/ Free/ Trial Tools: DOS Attacks, DDOS attacks, Wireshark, Cain & abel, iptables/ Windows Firewall, snort, suricata, fail2ban (8 Hour)
Cyber Security Vulnerabilities& Safe Guards Internet Security, Cloud Computing & Security, Social Network sites security, Cyber Security Vulnerabilities-Overview, vulnerabilities in software, System administration, Complex Network Architectures, Open Access to Organizational Data, Weak Authentication, Authorization, Unprotected Broadband communications, Poor Cyber Security Awareness. Cyber Security Safeguards- Overview, Access control, IT Audit, Authentication. Open Web Application Security Project (OWASP), Web Site Audit and Vulnerabilities assessment. Open Source/ Free/ Trial Tools: WinAudit, Zap proxy (OWASP), burp suite, DVWA kit. (10 Hour)

List of Suggested Books

  1. William Stallings, “Cryptography and Network Security”, Pearson Education/PHI, 2006.
  2. V.K. Jain, “Cryptography and Network Security”, Khanna Publishing House.
  3. Gupta Sarika, “Information and Cyber Security”, Khanna Publishing House, Delhi.
  4. Atul Kahate, “Cryptography and Network Security”, McGraw Hill.
  5. V.K. Pachghare, “Cryptography and Information Security”, PHI Learning
  6. Nina Godbole, “Information System Security”, Wiley
  7. Bothra Harsh, “Hacking”, Khanna Publishing House, Delhi.
DICT-VAC-05 3D PRINTING (BASICS) Credits:2

Pre-Requisites

  1. Computer Aided Design
  2. Engineering Materials

Objectives

The course is designed to impart knowledge and skills related to 3D printing technologies, selection of material and equipment and develop a product using this technique in Industry 4.0 environment.

Learning Outcomes

After completion of this course, the students will be able to:

  1. Develop CAD models for 3D printing.
  2. Import and Export CAD data and generate .stl file.
  3. Select a specific material for the given application.
  4. Select a 3D printing process for an application.
  5. Produce a product using 3D Printing or Additive Manufacturing (AM).

Detail Contents

S.No. TOPIC DESCRIPTION DURATION
3D Printing (Additive Manufacturing) Introduction, Process, Classification, Advantages, Additive V/s Conventional Manufacturing processes, Applications. (4 Hour)
CAD for Additive manufacturing CAD Data formats, Data translation, Data loss, STL format. (6 Hour)
Additive Manufacturing Techniques
  1. 3.1 Stereo- Lithography, LOM, FDM, SLS, SLM, Binder Jet technology.
  2. 3.2 Process, Process parameter, Process Selection for various applications.
  3. 3.3 Additive Manufacturing Application Domains: Aerospace, Electronics, Health Care, Defence, Automotive, Construction, Food Processing, Machine Tools
(12 Hour)
Materials
  1. 4.1 Polymers, Metals, Non-Metals, Ceramics
  2. 4.2 Various forms of raw material- Liquid, Solid, Wire, Powder; Powder Preparation and their desired properties, Polymers and their properties.
  3. 4.3 Support Materials
(8 Hour)

List of Suggested Books

  1. Lan Gibson, David W. Rosen and Brent Stucker, “Additive Manufacturing Technologies: Rapid Prototyping to Direct Digital Manufacturing”, Springer, 2010.
  2. Andreas Gebhardt, “Understanding Additive Manufacturing: Rapid Prototyping, Rapid Tooling, Rapid Manufacturing”, Hanser Publisher, 2011.
  3. Khanna Editorial, “3D Printing and Design”, Khanna Publishing House, Delhi.
  4. CK Chua, Kah Fai Leong, “3D Printing and Rapid Prototyping- Principles and Applications”, World Scientific, 2017.
  5. J.D. Majumdar and I. Manna, “Laser-Assisted Fabrication of Materials”, Springer Series in Material Science, 2013.
  6. L. Lu, J. Fuh and Y.S. Wong, “Laser-Induced Materials and Processes for Rapid Prototyping”, Kulwer Academic Press, 2001.
  7. Zhiqiang Fan And Frank Liou, “Numerical Modelling of the Additive Manufacturing (AM) Processes of Titanium Alloy”, InTech, 2012.
DICT-VAC-02 DIGITAL MARKETING Credits:4

Pre-Requisites

  1. Students should qualify basic level of digital marketing and must have the knowledge of marketing platforms for advertising via online media such as print, digital, internet marketing

Objectives

The main objective of this course is to make goals, plan campaigns, and reach customers. Understand what keeps customers engaged between attention and action Modify current business operations to provide a better online experience. Master the science of measuring performance versus plan. Grasp the Project management skills. Know how to continuously improve performance to increase ROI with data and analytics.to support organization’s marketing activities.

LEARNING Outcomes

On successful completion of the course, the students will be able to:

  1. Know different techniques of SEO
  2. Understand the target audience by using different tools
  3. Hands-on experience on different promotional techniques.
  4. Learn advanced promotional techniques by using different online marketing tools and channels.

GGSIPU UNIVERSITY Syllabus

No. PROGRAMME COURSE CODECOURSE COURSE TYPE CREDITS PDF
MCA MCA 128Digital Marketing Discipline Specific Electives 4
BCA BCA 222Digital Marketing Skill Enhancement 4

Detail Contents

S.No. TOPIC DESCRIPTION MODULE CONTACT HR. [30 hr] PRACTICE HR. [130 hr]
Introduction Marketing foundation, Digital marketing Ecosystem, consumer behavior, online visibility strategy , online lead strategy, Digital Marketing Evolution, E-Marketing Mix, Content of Digital Marketing Theory 2 Hr 2 Hr
Online Visibility creation Designing skill, Graphic creation using CANVA , video creation skill, building a website, SEO-On-page , off-page and Technical, Local SEO, analytics and Reporting, Google Tag Manager, Social media Optimization – Facebook, twitter, Linkedin, Quora Theory+Practical 12 Hr 48 Hr
Lead Generation Landing page optimization, Google ads , Google ads search campaign, Display advertising, Video advertising, Quora ads social media marketing – Facebook, Instagram, Twitter, linkedin, snapchat, pinterest, Quora. Theory+Practical 4 Hr 30 Hr
Lead Nurturing What’s app marketing, E-mail Marketing, Remarketing, Inbound marketing. Theory+Practical 2 Hr 10 Hr
Artificial Intelligence Introduction to Chat GPT, Chat GPT for communication, using Chat GPT for career advancement. Theory+Practical 2 Hr 10 Hr
E-Commerce Mastery E-commerce Website creation, shopping ads Theory+Practical 3 Hr 10 Hr
Online Earning Methods Blogging & Affiliate, sign up for an affiliate program ,Instagram & Facebook Money making, Making money with youtube, Earning as a Freelancer Theory+Practical 2 Hr 12 Hr
Project Mgmt. Skills Introduction and project work. Theory+Practical 1 Hr 2 Hr
Role of soft skills in Digital marketing Soft skills (Leadership, time mgmt., team work, communication, creativity, self-mgmt. etc.) Theory+Practical 1 Hr 2 Hr
Interview process and preparation session Resume building, Group discussion, Mock interview Theory+Practical 1 Hr 4 Hr
 

List of Suggested Books

  1. The psychology of email marketing Influencing subscribers and driving engagement Author: Eleanor Blake Year: 2023
  2. Strauss, Judy and Frost, Raymond (6th Ed, 2011), E-Marketing, 5th Edition, PHI Learning, New Delhi.
  3. Chaffey, D, Ellis-Chadwick, F, Johnston, K. and Mayer, R, (4th Ed.,2009) Internet Marketing: Strategy, Implementation and Practice, Third Edition, Pearson Education, New Delhi.
  4. Shainash G, and Jagdish N Sheth (1st Ed, 2008). Customer Relationship Management- A Strategic Perspective, Macmillan India Ltd.
  5. The Art Of SEO: Mastering Search Engine Optimization by Eric Enge of Stone Temple Consulting, Stephan Spencer, and Jessie C. Stricchiola.
DICT-VAC-06 BLOCK CHAIN (ADVANCED) Credits:2

Pre-Requisites

  1. Cryptography Techniques
  2. Data Structures and Algorithms
  3. Introduction to Programming

Objectives

The objective of this course is to provide conceptual understanding of how block chain technology can be used to innovate and improve business processes. The course covers the technological underpinning of block Chain operations in both theoretical and practical implementation of solutions using block Chain technology.

Learning Outcomes

At the end of this course, the students will be able to:

  1. Understand block chain technology.
  2. Develop block chain based solutions and write smart contract using Hyperledger Fabric and Ethereum frameworks.
  3. Build and deploy block chain application for on premise and cloud based architecture.
  4. Integrate ideas from various domains and implement them using block chain technology in different perspectives.

Detail Contents

S.No. TOPIC DESCRIPTION DURATION
Understanding Block chain for Enterprises Permissioned Block chain: Permissioned model and use cases, Design issues for Permissioned block chains, Execute contracts, State machine replication, Overview of Consensus models for permissioned block chain- Distributed consensus in closed environment, Paxos, RAFT Consensus, Byzantine general problem, Byzantine fault tolerant system, Lamport-Shostak-Pease BFT Algorithm, BFT over AsyncHouronous systems. Enterprise application of Block chain: Cross border payments, Know Your Customer (KYC), Food Security, Mortgage over Block chain, Block chain enabled Trade, We Trade – Trade Finance Network, Supply Chain Financing, Identity on Block chain. (10 Hour)
Enterprise application of Block chain: Cross border payments, Know Your Customer (KYC), Food Security, Mortgage over Block chain, Block chain enabled Trade, We Trade – Trade Finance Network, Supply Chain Financing, Identity on Block chain (10 Hour)
Block chain application development Hyperledger Fabric- Architecture, Identities and Policies, Membership and Access Control, Channels, Transaction Validation, Writing smart contract using Hyperledger Fabric, Writing smart contract using Ethereum, Overview of Ripple and Corda (10 Hour)

List of Suggested Books

  1. Melanie Swan, “Block Chain: Blueprint for a New Economy”, O’Reilly, 2015
  2. Josh Thompsons, “Block Chain: The Block Chain for Beginners- Guide to Block chain Technology and Leveraging Block Chain Programming”
  3. Daniel Drescher, “Block Chain Basics”, Apress; 1stedition, 2017
  4. Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
  5. Imran Bashir, “Mastering Block Chain: Distributed Ledger Technology, Decentralization and Smart Contracts Explained”, Packt Publishing
  6. Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build Smart Contracts for Ethereum and Block Chain”, Packt Publishing
  7. Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O’Dowd, Venkatraman Ramakrishna, “Hands-On Block Chain with Hyperledger: Building Decentralized Applications with Hyperledger Fabric and Composer”, Import, 2018
DICT-VAC-07 ROBOTICS (ADVANCED) Credits:2

Pre-Requisites

  1. Basic Engineering Mathematics
  2. Automation and Control

Objectives

The objective of this course is to impart knowledge about industrial robots for their control and design.

Learning Outcomes

After the completion of this course, the students will be able to:

  1. Perform kinematic and dynamic analyses with simulation.
  2. Design control laws for a robot.
  3. Integrate mechanical and electrical hardware for a real prototype of robotic device.
  4. Select a robotic system for given application.
 

Detail Contents

S.No. TOPIC DESCRIPTION DURATION
Robot Control
  1. 4.1 Basics of control: Transfer functions, Control laws: P, PD, PID
  2. 4.2 Non-linear and advanced controls
(12 Hour)
Robot Actuation Systems Actuators: Electric, Hydraulic and Pneumatic; Transmission: Gears, Timing Belts and Bearings, Parameters for selection of actuators (8 Hour)
Control Hardware and Interfacing Embedded systems: Architecture and integration with sensors, actuators, components, Programming for Robot Applications (10 Hour)
 

List of Suggested Books

  1. Saha, S.K., “Introduction to Robotics, 2nd Edition, McGraw-Hill Higher Education, New Delhi, 2014.
  2. Ghosal, A., “Robotics”, Oxford, New Delhi, 2006.
  3. Niku Saeed B., “Introduction to Robotics: Analysis, Systems, Applications”, PHI, New Delhi.
  4. Mittal R.K. and Nagrath I.J., “Robotics and Control”, Tata McGraw Hill.
  5. Mukherjee S., “Robotics and Automation”, Khanna Publishing House, Delhi.
  6. Craig, J.J., “Introduction to Robotics: Mechanics and Control”, Pearson, New Delhi, 2009
  7. Mark W. Spong, Seth Hutchinson, and M. Vidyasagar, “Robot Modelling and Control”, John Wiley and Sons Inc, 2005
  8. Steve Heath, “Embedded System Design”, 2nd Edition, Newnes, Burlington, 2003
  9. Merzouki R., Samantaray A.K., Phathak P.M. and Bouamama B. Ould, “Intelligent Mechatronic System: Modeling, Control and Diagnosis”, Springer.
DICT-VAC-08 QUANTUM COMPUTING (ADVANCED) Credits:2

Pre-Requisites

  1. Data Structure and Algorithm.
  2. Programming in Python/C#

Objectives

The objective of this course is to impart necessary knowledge to the learner so that he/she can develop and implement algorithm and write programs using these algorithm.

Learning Outcomes

At the end of this course, the students will be able to:

  1. Explain the working of a Quantum Computing program, its architecture and program model.
  2. Develop quantum logic gate circuits
  3. Develop quantum algorithm
  4. Program quantum algorithm on major toolkits

Detail Contents

S.No. TOPIC DESCRIPTION DURATION
Quantum Algorithms
  1. 1.1 Basic techniques exploited by quantum algorithms
    1. Amplitude amplification
    2. Quantum Fourier Transform
    3. Phase Kick-back
    4. Quantum Phase estimation
    5. Quantum Walks
  2. 1.2 Major Algorithms
    1. Shor’s Algorithm
    2. Grover’s Algorithm
    3. Deutsch’s Algorithm
    4. Deutsch -Jozsa Algorithm
  3. 1.3 OSS Toolkits for implementing Quantum program
    1. IBM quantum experience
    2. Microsoft Q
    3. Rigetti PyQuil (QPU/QVM)
(22 Hour)

List of Practicals

  1. Building Quantum dice
  2. Building Quantum Random No. Generation
  3. Composing simple quantum circuits with q-gates and measuring the output into classical bits.
  4. Implementation of Shor’s Algorithms
  5. Implementation of Grover’s Algorithm
  6. Implementation of Deutsch’s Algorithm
  7. Implementation of Deutsch-Jozsa’s Algorithm
  8. Mini Project such as implementing an API for efficient search using Grover’s Algorithms or Integer factorization using Shor’s Algorithm

List of Suggested Books

  1. Michael A. Nielsen, “Quantum Computation and Quantum Information”, Cambridge University Press.
  2. David McMahon, “Quantum Computing Explained”, Wiley
  3. IBM Experience https://quantumexperience,ng,bluemix.net
  4. Microsoft Quantum Development Kit https://www.microsoft.com/en-us/quantum/development-kit
  5. Forest SDK PyQuil: https://pyquil.readthedocs.io/en/stable/
DICT-VAC-09 CYBER SECURITY (ADVANCED) Credits:2

Pre-Requisites

  1. Basic knowledge of Computers
  2. Basic knowledge of networking and Internet
  3. Hands on Windows operating system

Objectives

The course has been designed to give students an extensive overview of cyber security issues, tools and techniques that are critical in solving problems in cyber security domains.The course aims at providing students with concepts of computer security, cryptography, digital money, secure protocols, detection and other security techniques. The course will help students to gauge understanding in essential techniques in protecting Information Systems, IT infrastructure, analysing and monitoring potential tHoureats and attacks, devising security architecture and implementing security solutions. The students will also have a wider perspective to information security from national security perspective from both technology and legal perspective.

Learning Outcomes

After completion of this course, the students should be able to:

  1. Understand, appreciate, employ, design and implement appropriate security technologies and policies to protect computers and digital information.
  2. Identify & Evaluate Information Security tHoureats and vulnerabilities in Information Systems and apply security measures to real time scenarios
  3. Identify common trade-offs and compromises that are made in the design and development process of Information Systems
  4. Demonstrate the use of standards and cyber laws to enhance information security in the development process and infrastructure protection

Detail Contents

S.No. TOPIC DESCRIPTION DURATION
Malware Explanation of Malware, Types of Malware: Virus, Worms, Trojans, Rootkits, Robots, Adware’s, Spywares, Ransom wares, Zombies etc., OS Hardening (Process Management, Memory Management, Task Management, Windows Registry/ services another configuration), Malware Analysis. Open Source/ Free/ Trial Tools: Antivirus Protection, Anti Spywares, System tuning tools, Anti Phishing. (10 Hour)
Security in Evolving Technology Biometrics, Mobile Computing and Hardening on android and ios, IOT Security, Web server configuration and Security. Introduction, Basic security for HTTP Applications and Services, Basic Security for Web Services like SOAP, REST etc., Identity Management and Web Services, Authorization Patterns, Security Considerations, Challenges. Open Source/ Free/ Trial Tools: adb for android, xcode for ios, Implementation of REST/ SOAP web services and Security implementations. (10 Hour)
Cyber Laws and Forensics Introduction, Cyber Security Regulations, Roles of International Law, the state and Private Sector in Cyberspace, Cyber Security Standards. The INDIAN Cyberspace, National Cyber Security Policy 2013. Introduction to Cyber Forensics, Need of Cyber Forensics, Cyber Evidence, Documentation and Management of Crime Sense, Image Capturing and its importance, Partial Volume Image, Web Attack Investigations, Denial of Service Investigations, Internet Crime Investigations, Internet Forensics, Steps for Investigating Internet Crime, Email Crime Investigations. Open Source/ Free/ Trial Tools: Case Studies related to Cyber Law, Common Forensic Tools like dd, md5sum, sha1sum, Ram dump analysis, USB device. (10 Hour)

List of Suggested Books

  1. William Stallings, “Cryptography and Network Security”, Pearson Education/PHI, 2006.
  2. V.K. Jain, “Cryptography and Network Security”, Khanna Publishing House.
  3. Gupta Sarika, “Information and Cyber Security”, Khanna Publishing House, Delhi.
  4. Atul Kahate, “Cryptography and Network Security”, McGraw Hill.
  5. V.K. Pachghare, “Cryptography and Information Security”, PHI Learning
  6. Nina Godbole, “Information System Security”, Wiley
  7. BotHoura Harsh, “Hacking”, Khanna Publishing House, Delhi.
DICT-VAC-10 3D PRINTING (ADVANCED) Credits:2

Pre-Requisites

  1. Computer Aided Design
  2. Engineering Materials

Objectives

The course is designed to impart knowledge and skills related to 3D printing technologies, selection of material and equipment and develop a product using this technique in Industry 4.0 environment.

Learning Outcomes

After completion of this course, the students will be able to:

  1. Develop CAD models for 3D printing.
  2. Import and Export CAD data and generate .stl file.
  3. Select a specific material for the given application.
  4. Select a 3D printing process for an application.
  5. Produce a product using 3D Printing or Additive Manufacturing (AM).

Detail Contents

S.No. TOPIC DESCRIPTION DURATION
Additive Manufacturing Equipment
  1. 1.1 Process Equipment- Design and process parameters
  2. 1.2 Governing Bonding Mechanism
  3. 1.3 Common faults and troubleshooting
  4. 1.4 Process Design
(10 Hour)
Post Processing: Requirement and Techniques (6 Hour)
Product Quality
  1. 3.1 Inspection and testing
  2. 3.2 Defects and their causes
(6 Hour)

List of Suggested Books

  1. Lan Gibson, David W. Rosen and Brent Stucker, “Additive Manufacturing Technologies: Rapid Prototyping to Direct Digital Manufacturing”, Springer, 2010.
  2. Andreas Gebhardt, “Understanding Additive Manufacturing: Rapid Prototyping, Rapid Tooling, Rapid Manufacturing”, Hanser Publisher, 2011.
  3. Khanna Editorial, “3D Printing and Design”, Khanna Publishing House, Delhi.
  4. CK Chua, Kah Fai Leong, “3D Printing and Rapid Prototyping- Principles and Applications”, World Scientific, 2017.
  5. J.D. Majumdar and I. Manna, “Laser-Assisted Fabrication of Materials”, Springer Series in Material Science, 2013.
  6. L. Lu, J. Fuh and Y.S. Wong, “Laser-Induced Materials and Processes for Rapid Prototyping”, Kulwer Academic Press, 2001.
  7. Zhiqiang Fan And Frank Liou, “Numerical Modelling of the Additive Manufacturing (AM) Processes of Titanium Alloy”, InTech, 2012.
DICT-VAC-11 ETHICAL HACKING Credits:2

Pre-Requisites

  1. Computer Networking Skills
  2. Programming Skills
  3. Database Skills

Objectives

The motive of this course is to learn ethical hacking Techniques. It is organized for BCA students to provide them practical exposure. This Ethical Hacking course leads students from the basics to more advanced features of the course. This course aims at providing the attendee with abroad introduction to the profound concepts in Ethical Hacking using forensic detection by exposing them to practical scenarios in order to make them industry ready.

Learning Outcomes

After completion of this course, the students will be able to:

  1. Understand, appreciate, employ, design and implement appropriate security technologies and policies to protect computers and digital information.
  2. Identify & Evaluate Information Security threats and vulnerabilities in Information Systems and apply security measures to real time scenarios
  3. Identify common trade-offs and compromises that are made in the design and development process of Information Systems
  4. Demonstrate the use of standards and cyber laws to enhance information security inthe development process and infrastructure protection

Detail Contents

S.No. TOPIC DESCRIPTION DURATION
Introduction to Ethical Hacking Understand the principles, methodologies, and legal considerations of ethical hacking (2 Hr)
Networking Fundamentals Identify and exploit vulnerabilities in computer systems, networks, and applications using ethical hacking techniques (3 Hr)
Information Gathering and Foot printing Conduct comprehensive reconnaissance and information gathering to assess the target environment (4 Hr)
Scanning and Enumeration Perform vulnerability assessments and penetration testing to identify and exploit weaknesses in network infrastructure and web applications (3 Hr)
System Hacking Utilize various hacking tools and techniques, such as scanning, enumeration, and exploitation, to gain unauthorized access (2 Hr)
Web Application Security Demonstrate proficiency in different types of attacks, including network attacks, web application attacks, wireless attacks, and social engineering attacks. (4 Hr)
Cryptography Understand the principles of cryptography and cryptographic attacks, as well as how to implement secure cryptographic practices (2 Hr)
Social Engineering Use advanced techniques for bypassing security controls, evading intrusion detection systems, and maintaining persistence on compromised systems. (2 Hr)
Wireless Security Understand and analyze malware, including reverse engineering and analyzing malicious code. (3 Hr)
Incident Response and Digital Forensics Apply techniques for securing computer systems and networks, including configuring firewalls, implementing intrusion detection and prevention systems, and implementing secure coding practices. (5 Hr)
Introduction to Ethical Hacking Develop skills in digital forensics to investigate security incidents, collect evidence, and analyze digital artifacts. (2 Hr)

List of Suggested Books

  1. The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws” by Dafydd Stuttard and Marcus Pinto
  2. Metasploit: The Penetration Tester’s Guide” by David Kennedy, Jim O’Gorman, Devon Kearns, and Mati Aharoni
  3. CEH Certified Ethical Hacker All-in-One Exam Guide” by Matt Walker
  4. Gray Hat Hacking: The Ethical Hacker’s Handbook” by Allen Harper, Daniel Regalado, Ryan Linn, Stephen Sims, Branko Spasojevic, Linda Martinez, and Michael Baucom
  5. Penetration Testing: A Hands-On Introduction to Hacking” by Georgia Weidman
S.No. TOPIC DURATION
Brochure
Notices
Course Module
List of Students Registered
Attendance
Reports
Sample Certificate
Sample Feedback
Assessment
Certificate Issued
Ethical Hacking Certificate
DICT-VAC-11 VIRTUAL REALITY Credits:2

Pre-Requisites

  1. Fundamentals of C++

Objectives

The objective of this course is to provide a detailed understanding of the concepts of Virtual Reality and its applications.

Learning Outcomes

At the end of the course, the students will be able to:

  1. Understand geometric modelling and Virtual environment.
  2. Study about Virtual Hardware and Software.
  3. Develop Virtual Reality applications.

Detail Contents

S.No. TOPIC DESCRIPTION DURATION
Introduction to Virtual Reality Virtual Reality and Virtual Environment: Introduction, Computer graphics, Real time computer graphics, Flight Simulation, Virtual environment requirement, benefits of virtual reality, Historical development of VR, Scientific Landmark. 3D Computer Graphics: Introduction, The Virtual world space, positioning the virtual observer, the perspective projection, human vision, stereo perspective projection, 3D clipping, Colour theory, Simple 3D modelling, Illumination models, Reflection models, Shading algorithms, Radiosity, Hidden Surface Removal, Realism-Stereographic image. (6 Hour)
Geometric Modelling Geometric Modelling: Introduction, From 2D to 3D, 3D space curves, 3D boundary representation. Geometrical Transformations: Introduction, Frames of reference, Modelling transformations, Instances, Picking, Flying, Scaling the VE, Collision detection. Generic VR system: Introduction, Virtual environment, Computer environment, VR technology, Model of interaction, VR Systems. (12 Hour)
Virtual Environment Animating the Virtual Environment: Introduction, The dynamics of numbers, Linear and Non- linear interpolation, the animation of objects, linear and non-linear translation, shape & object inbetweening, free from deformation, particle system. Physical Simulation: Introduction, Objects falling in a gravitational field, Rotating wheels, Elastic collisions, projectiles, simple pendulum, springs, Flight dynamics of an aircraft. (10 Hour)
VR Hardware and Software
  1. Human factors: Introduction, the eye, the ear, the somatic senses.
  2. VR Hardware: Introduction, sensor hardware, Head-coupled displays, Acoustic hardware, Integrated VR systems.
  3. VR Software: Introduction, Modelling virtual world, Physical simulation, VR toolkits, Introduction to VRML
(10 Hour)
VR Applications Introduction, Engineering, Entertainment, Science, Training. The Future: Virtual environment, modes of interaction (7 Hour)

List of Practicals

  1. Developing architecture of a house using Virtual Reality.
  2. Perform CRO based experiment using Virtual Reality.
  3. Undertaking qualitative analysis in Chemistry using Virtual Reality.
  4. Carry out assembly/disassembly of an engine using Virtual Reality.
  5. Explore human anatomy using Virtual Reality.
  6. Simulation of circulation of blood in heart.
  7. Simulation of Fight/Vehicle/Space Station.
  8. Building Electronic circuit using Virtual Reality, given basic electronic components.
  9. Developing concept of Virtual class room with multiplayer.

List of Suggested Books

  1. John Vince, “Virtual Reality Systems “, Pearson Education Asia, 2007.
  2. Anand R., “Augmented and Virtual Reality”, Khanna Publishing House, Delhi.
  3. Adams, “Visualizations of Virtual Reality”, Tata McGraw Hill, 2000.
  4. Grigore C. Burdea, Philippe Coiffet , “Virtual Reality Technology”, Wiley Inter Science, 2nd Edition, 2006.
  5. William R. Sherman, Alan B. Craig, “Understanding Virtual Reality: Interface, Application and Design”, Morgan Kaufmann, 2008.
  6. www.vresources.org
  7. www.vrac.iastate.edu
  8. www.w3.org/MarkUp/VRM
Skip to content