2022 - DCOM-Diploma in Computer Engineering - (WWW - Arjun00.com - NP)
2022 - DCOM-Diploma in Computer Engineering - (WWW - Arjun00.com - NP)
2022 - DCOM-Diploma in Computer Engineering - (WWW - Arjun00.com - NP)
50
Computer Graphics
EG3101CT
Year: III Total: 6 hours /week
Part: I Lecture: 3 hours/week
Tutorial: 1 hour/week
Practical: … hours/week
Lab: 2 hours/week
Course description:
This course deals with graphics hardware, two dimensional and three-dimensional
graphics, fundamentals of animation techniques; graphical user interface design, web
graphics design and graphics design packages.
Course objectives:
After completion of this course students will be able to:
1. Acquire the knowledge of computer graphics.
2. Familiarize with hardware involved in graphics.
3. Familiarize with the algorithms to generate two-dimensional and three-
dimensional graphical objects and animations.
Course Contents:
Theory
Unit 1. Introduction [3 Hrs.]
1.1. History of Computer Graphics
1.2. Application of Computer Graphics
1.3. CAD and CAM
51
3.6.2. Scaling
3.6.3. Rotation
3.6.4. Reflection
3.6.5. Shearing
3.7. Two-Dimensional Viewing Pipeline
52
6.3. Applications of Virtual Reality
References:
1. D. Hearn and M. P. Baker, “Computer Graphics”, PHI Edition
2. T. I. James, D. Foley, A. Van Dam, S. K. Feiner, and J. F. Hughes, “Computer
Graphics, Principles, and Practice”, PHI Edition
53
Data Communication and Computer Network
EG3102CT
Year: II Total: 7 hours /week
Part: I Lecture: 3 hours/week
Tutorial: 1 hour/week
Practical: hours/week
Lab: 3 hours/week
Course description:
This course is designed to understand computer networks and digital data communications
with a focus on Internet protocols: Application layer architectures (client/server, peer-to-
peer) and protocols (HTTP-web, SMTP-mail, etc), Transport layer operation: (reliable
transport, congestion and flow control, UDP, TCP); Network layer operation - (routing,
addressing, IPv4 and IPv6), Data Link layer operation (error detection/correction, access
control, Ethernet, 802.11, Physical Layer operation. Similarly, selected topics such as:
network security (Network attack, cryptography, VPN, firewall).
Course objectives:
After completion of this course students will be able to:
1. Gain a good understanding of the architecture of computer networks.
2. Identify and understand various hardware devices and software used in computer
networks.
3. Learn different types of protocols used for transmission of data.
4. Use routing and addressing.
5. Setup small home/office networks.
Course Contents:
Theory
Unit 1. Introduction [4 Hrs.]
1.1. Definition, Advantages and disadvantages, applications
1.2. Communication system: Analog and digital, Block diagram
1.3. Network as platform, Internet architecture, Trends in networking
1.4. Data Transmission: Analog and digital transmission
1.5. Transmission impairment
54
Unit 4. Data link Layer [6 Hrs.]
4.1. Introduction and function of data link layer and its issues
4.2. Framing
4.3. Flow Control issues at data link layer
4.4. Piggybacking and Sliding Window Protocol
4.5. Error Control issues at data link layer
4.6. Error Detection Method and Error Correction Method
4.7. Data Link Layer Protocol: HDLC, PPP
55
9.3. Cryptography: Symmetric Key and public key, Digital signature
9.4. Firewalls
9.5. Virtual private network
Note: Use packet Tracer software for performing the above practical lab works
References:
1. Behrouz Forouzan, “Data Communications and Networking”, Edition 5, Tata
McGraw-Hill., 2012.
2. Andrews S. Tanenbaum, David J Wetherall, “Computer Networks”, Edition 5,
Pearson Education, 2012.
3. William Stallings, “Data & Computer Communications”, PHI, Edition 6, 2012.
56
4. Jerry Fitzgerald, Alan Dennis, “Business Data Communications & Networking”,
John Wiley & Sons Inc, 2010.
57
Operating System
EG3103CT
Year: III Total: 5 hours /week
Part: I Lecture: 3 hours/week
Tutorial: hours/week
Practical: hours/week
Lab: 2 hours/week
Course description:
This course includes the basic concepts and core structure, functions and design principles
of operating system. It consists of the various functions of operating system like process
and memory management, file and I/O Management, Deadlock Management and Security.
The course gives ideas in designing the operating system and its services.
Course objectives
After completion of this course students will be able to:
1. Describe the functions of operating system.
2. Explain design of the operating system and its components.
3. Demonstrate and simulate the algorithms used in operating system.
Course Contents:
Theory
Unit 1. Introduction [6 Hrs.]
1.1. Operating system and its functions
1.2. Evolution of Operating System
1.3. Types of Operating System
1.4. Operating System Components
1.5. Operating System Services: System Call, Shell
1.6. Example of Operating System: Unix, Linux, Windows, Handheld OS
58
4.3. Deadlock Handling Strategies:
4.3.1. Deadlock Prevention
4.3.2. Deadlock Detection
4.3.3. Deadlock Avoidance
4.3.4. Recovery from Deadlock
4.4. Banker’s Algorithm
References:
1. Andrew S. Tanenbaum, “Modern Operating Systems”, 3rd Edition, PHI
2. Stalling William, “Operating Systems”, 6th Edition, Pearson Education
3. Silbcrschatz A.,Galvin P., Gagne G., “Operating System Concepts”, 8th Edition,
John Wiley and Sons
59
Computer Repair and Maintenance
EG3104CT
Year: III Total: 5 hours /week
Part: I Lecture: 2 hours/week
Tutorial: hour/week
Practical: hours/week
Lab: 3 hours/week
Course Description:
This course deals about fundamental concept, theories and popular principles of repair and
Maintenance systems of computer. The major focus is trouble shooting, repairing and
maintenance into real-life by utilizing the knowledge and skill of computer hardware and
software. This makes the learning-teaching process more interactive, skillful and
interesting.
Course Objectives:
At the end of the course student will be able to
1. Explain basic operation of computer
2. Perform the maintenance of computer, its accessories and peripherals
3. Take Care of computer and its accessories
Course Contents:
Theory
Unit 1. Introduction [2 Hrs.]
1.1. Definition of Computer, Hardware and software
1.2. Computer Repair and Maintenance
1.3. Importance of Computer Repair and Maintenance
1.4. Hardware maintenance
1.5. Software Based maintenance
60
Unit 5. Processor [3 Hrs.]
5.1. Arithmetic Logic Unit (ALU)
5.2. Control Unit, Register
5.3. Buses (Data bus, Address Bus, Control Bus)
61
10.3.4. Recovery of data
62
Final written exam evaluation scheme
Unit Title Hours Marks Distribution*
1 Introduction 2 3
2 System Case 2 3
3 Power Supply 2 3
4 Mother Board and System Devices: 2 3
5 Processor 3 4
6 UPS 2 3
7 Input devices 2 3
8 Storage Devices 4 5
9 Output Devices 3 4
10 System Care 8 9
Total 30 40
* There may be minor deviation in marks distribution.
Reference:
1. Winn, L. Rosch (1994). The hardware Bible (3rd Edition). Brady Publishing
2. Peter, Norton (2000). Introduction to Computers (4th Edition). New York city:
McGraw-Hill Higher Education
3. Mark, Minasi (1998). The Complete PC Upgrade and Maintenance Guide.
United States: Sybex Inc
4. Mueller, Scott (2015). Upgrading and Repairing PCs (22nd ed). Que Publishing
63
Data Mining and Data Warehousing
EG3105CT
Year: III Total: 6 hours /week
Part: I Lecture: 3 hours/week
Tutorial: … hour/week
Practical: … hours/week
Lab: 3 hours/week
Course description:
This course studies algorithms and computational paradigms that allow computers to find
patterns and regularities in databases, perform prediction and forecasting, and generally
improve their performance through interaction with data. The course will cover all these
issues and will illustrate the whole process by examples.
Course objectives:
After completion of this course students will be able to:
1. Explain the concept of Data preprocessing, Data Mining and Data Warehousing
2. Understand Data preprocessing Techniques.
3. Discuss multi-dimensional data representation and OLAP operations
4. Understand the concept and use of clustering, classification, and association rule
mining algorithms.
5. Discuss on advanced concept and trends of Data Mining and Data Warehousing.
Course Contents:
Theory
Unit 1. Introduction to Data Mining [5 Hrs.]
1.1. Basic concepts of Data Mining
1.2. Use and benefits of Data Mining
1.3. Application of data mining
1.4. Knowledge Discovery Process (KDD)
1.5. Data Mining Functionalities
1.6. Data Mining System Architecture
64
3.8. Multi-dimensional Data, Data Cube
3.9. Data Warehouse Schemas
3.9.1. Star Schema
3.9.2. Snowflake Schema
3.9.3. Fact Constellation Schema
3.10. Fact tables and Dimensions Tables
3.11. OLAP Operations in Multidimensional data models: Roll-up, Drill-Down, Slice
and Dice, and Pivot (Rotate) Operations
3.12. Types of OLAP Servers: ROLAP, MOLAP, HOLAP
65
Final written exam evaluation scheme
Unit Title Hours Marks Distribution*
1 Introduction to Data Mining 5 8
2 Data Preprocessing 5 8
3 Data Warehousing and Online Analytical
8 16
Processing (OLAP)
4 Mining Frequent Pattern and Associations 7 12
5 Classification 8 12
6 Clustering 8 16
7 Data Mining Trends and Applications 4 8
Total 45 80
* There may be minor deviation in marks distribution.
References:
1. Jiawei Han, Micheline Kamber, Jian Pei; Data Mining: Concepts and Techniques,
Morgan Kaufman Publication, 3rd Edition
2. Pang-Ning Tan, Michael Steinbach, Anuj Karpatne, Vipin Kumar, Introduction to
DataMining, Pearson Publication, First Edition
3. Charu C. Agrawal, Data Mining: The Textbook, Springer Nature Publication, First
Edition
4. Sam Anahory, Dennis Murray, Data warehousing In the Real World, Pearson
Education.
5. Alex Berson and Stephen J. Smith, Data Warehousing, Data Mining & OLAP,
Tata McGraw Hill, 1st Edition.
66
Geographical Information System
(Elective I)
EG3106CT.1
Course objectives:
After completion of this course students will be able to:
1. Explain GIS, development and components of GIS
2. Explain data capturing techniques
3. Analyze spatial and non- spatial data
Course Contents:
Theory
Unit 1. Introduction [ 4 Hrs.]
1.1. Historical Background
1.2. Scope and application areas
1.3. Benefits and importance
1.4. Functional components
1.5. GIS in Organizations
1.6. Elements of GIS
67
4.1.3. Map scales and representation
4.1.4. Map Boundaries and Spatial Data
4.2. Digitizing
4.2.1. The Digitizing Process
4.2.2. Digitizing Errors
4.2.3. Node and Line Snapping
4.3. Reshaping
4.3.1. Line Smoothing and Thinning
4.3.2. Scan Digitizing, Editing Geographic Data
4.3.3. Features Common to Several Layers
4.4. Coordinate Transformation:
4.4.1. Control Points
4.4.2. The Affine Transformation
4.4.3. Other Coordinate Transformations
4.4.4. Caution When Evaluating Transformations
4.4.5. Projection Vs Transformation
4.5. Output: Maps, Digital Data, Metadata
68
6. Digitize polygon features, use advanced edit tools, digitize point features, Digitize
line features
7. Map Designing using tools
References:
1. De By R, Knippers R.A, sun Y. Principles of geographic information systems: An
introductory textbook, international institute for Geoinformation science and Earth
observation, the Netherlands
2. Paul B, GIS Fundamentals: A First Text on Geographic Information Systems Fifth
Edition,
3. Chang K.T. Introduction to Geographic Information System
69
E-Commerce
(Elective I)
EG3106CT.2
Course Objectives:
After completing this course, the students will be able to
1. Explain the steps required to set-up your E-commerce website for advertising
purposes
2. Introduce the e-commerce.
3. Identify security issues of e-Commerce and e-commerce related Public Policy.
4. Explain the types of payment system and payment gateway.
5. Describe the legal and ethical issues of e-commerce and cyber law,
6. Familiarize with online marketing.
Course Contents:
Theory
Unit 1. Fundamental concept of e-Commerce [6 Hrs.]
1.1. Definition of Electronic Commerce
1.2. Scope of Electronic Commerce
1.3. Electronic E-commerce and the Trade Cycle
1.4. Emergence of Internet and commercial use of Internet
1.5. E-commerce Models, Personal web server, Internet information server, ASP
page Contain scripts, Contain objects and components, Database access,
1.6. Application of E-Commerce
70
Unit 3. E-marketing and Advertising Concepts [5 Hrs.]
3.1. Define E-marketing
3.2. Explain Traditional Marketing
3.3. Online Marketing vs offline marketing
3.4. Tools for online and offline marketing
3.5. Issues with online marketing
3.6. Model of an online video store
71
8.3. Ethical and other public policy issues
8.4. Protecting privacy
8.5. Protecting intellectual property
8.6. Internet indecency and censorship
8.7. Taxation and encryption policies
8.8. E-commerce Law
8.9. Forms of Agreement
8.10. Government policies
References:
1. Noel Jerke, April 2012. E-Commerce Developer's Guide to Building Community
and using Promotional Tools. Sybex Inc.
2. Kenneth C. Laudon and Carol Guercio Traver, (11th edition), 2015. E-
commerce 2015 business, technology, society. Pearson
3. Janice Reynolds, (2nd edition, 2015. The Complete E-Commerce Book,
Design, Build & Maintain a Successful Web-based Business. Focal Press
4. Amir Manzoor, (1st edition), 2015. E-commerce 2016. Printed in the United
States of America.
72
Management Information System
(Elective I)
EG3106CT.3
Course Objectives:
After completing this course, the student will able to:
1. Explain the significance of information systems in organizations, Strategic
management processes and the implications for the management.
2. Describe different types of management information systems.
3. Identify the basic technologies used in the field of Management Information
System.
4. Explain the developments of electronic commerce and the role of Internet.
5. Describe the processes of developing and implementing information systems.
6. Familiarize with ethical and social issues related to information system.
Course contents:
Theory
Unit 1. Foundation of Information System [7 Hrs.]
1.1. Introduction to information system
1.2. Role of information system in Business
1.3. Components of Information Systems
1.4. Types of information systems
1.5. Effectiveness and efficiency criteria in information system
73
3.4. The importance of planning
3.5. Business applications of information technology
3.6. Information System for Business Operations (SDLC)
3.7. Information System for Strategic Advantage
3.8. Decision Support Systems and its benefits and characteristic
74
An overview of Management Information
2 6 11
Systems
3 Concept of planning 8 14
4 Managing Information Technology 5 10
5 MIS in functional areas of business 7 12
Information security challenges in e-
6 6 11
Enterprises
7 Knowledge based systems 3 5
8 Office information system 3 5
Total 45 80
* There may be minor deviation in marks distribution.
References:
1. Brian (2004). Introduction to Information System. New York: MCGRAW HILL.
2. Murdick (1971). Information System for Modern Management New Jersey:PHI.
3. Jawadekar,S.S(2019). Management Information System (6th ed). India: MC
GRAW HILL.
75
Minor Project
EG3107CT
Year: III Total: 3 hours /week
Part: I Lecture: … hours/week
Tutorial: … hour/week
Practical: 3 hours/week
Lab: … hours/week
Course description:
This course provides students with an idea of how to transform the theoretical knowledge
gained in earlier semesters into practical applications. The students will build a real-life
project during this course using the knowledge gained in earlier semesters.
Course objectives:
After completing this course, the students will be able to:
1. Learn and gain the knowledge about the programming tool they used to
implement the real-life project.
2. Plan, design, develop and implement the real-life problem as a project.
3. Formulate project documentation and oral presentation for his/her final year
project.
Project Overview:
1. Group formation (3-4 persons / group)
2. Project concept development
a. Finding Project concept
b. Scope of project
c. Completion time
3. Proposal preparation and presentation-2 weeks
4. Mid-term defense (should complete literature review, methodology, project design
and project progress report)-8 weeks after the proposal acceptance
5. Final defense (should deliver complete project and report)-4 weeks after mid-term
defense
6. Project documentation (must follow project documentation guide line given by
supervisor or the department)
7. Submission of hard cover project document to department-1 week after final
defense
The project should:
1. Be intended to develop an Computer Engineering solution to a practical problem
2. Be carried out using an engineering approach
3. Emphasize design
4. Be carried out in a group (3-4 person/group)
5. Normally result in the production of a piece of software
6. Include technical documentation based on documentation guideline.
7. Be fully described from inception to completion in a written report produced to a
good level of professional competence
Procedure:
1. Explain the minor project concept in a class by project teachers.
2. Preliminary selection of topic.
3. Discussion with department regarding the feasibility/practicality of the project
(e.g. cost, usefulness, market).
4. Finalization of topic.
76
5. Submission of the detail proposal (Extensive literature review).
6. After approval by project teachers, start of minor project work in laboratory
/home.
7. Monitoring of the work progress by project teachers and report to department.
8. A mid-term progress report should be submitted by the student on the date fixed
by department.
9. Presentation of mid-term progress of the minor project along with report.
10. Final presentation of minor project should be conducted by the department and
should be evaluated by the project teachers in the presence of other teachers in the
related field, not involved in minor projects, but from the same department.
11. Students must submit a group report in the format prescribed below.
77
- Abbreviation list should provide the details of the abbreviations used in the report in
alphabetical order.
11. Main body
11.1. Chapter 1: Project Overview (Introduction, Objectives and Scope, Project
Features,
Feasibility, System Requirement)
11.2. Chapter 2: Literature Review
11.3. Chapter 3: Design and Methodology (e.g. System Design, methods used,
tools, data source)
11.4. Chapter 4: Result and Analysis
11.5. Chapter 5: Conclusion, Recommendation and Limitations
12. References
- The reference material should include the author name, title, year. Do not
mention the references of the websites in the report.
13. Appendices (if any)
- Appendices are provided to give supplementary information, which is
included in the main text may serve as a distraction and cloud the central
theme. Appendices should be numbered using Arabic numerals, e.g.
Appendix 1, Appendix 2, etc. Tables and References appearing in
appendices should be numbered and referred to appropriate places just as in
the case of chapters.
Figure and Table numbering: It is useful and convenient to number the figures also
chapter-wise. The figures in chapter 4 will be numbered as Figure 4.1: Figure Name. This
helps you in assembling the figures and putting it in proper order. Similarly, the tables are
also numbered as Table 4.1: Table Name. All figures and tables should have proper
captions. Usually the figure captions are written below the figure and table captions on top
of the table.
Evaluation Scheme:
The marks should be evaluated by project teachers as well as other teachers in the related
field on the basis of:
78
Detailed evaluation scheme:
79