Xyz
Xyz
UNIVERSITY OF MUMBAI
Semester – II
Course Code Course Title Credits
PSIT201 Big Data Analytics 4
PSIT202 Modern Networking 4
PSIT203 Microservices Architecture 4
PSIT204 Image Processing 4
PSIT2P1 Big Data Analytics Practical 2
PSIT2P2 Modern Networking Practical 2
PSIT2P3 Microservices Architecture Practical 2
PSIT2P4 Image Processing Practical 2
Total Credits 24
2
Program Specific Outcomes
PSO1: Ability to apply the knowledge of Information Technology with recent trends aligned with
research and industry.
PSO2: Ability to apply IT in the field of Computational Research, Soft Computing, Big Data
Analytics, Data Science, Image Processing, Artificial Intelligence, Networking and Cloud
Computing.
PSO3: Ability to provide socially acceptable technical solutions in the domains of Information
Security, Machine Learning, Internet of Things and Embedded System, Infrastructure Services as
specializations.
PSO4: Ability to apply the knowledge of Intellectual Property Rights, Cyber Laws and Cyber
Forensics and various standards in interest of National Security and Integrity along with IT
Industry.
PSO5: Ability to write effective project reports, research publications and content development
and to work in multidisciplinary environment in the context of changing technologies.
3
SEMESTER I
4
M. Sc (Information Technology) Semester – I
Course Name: Research in Computing Course Code: PSIT101
Periods per week Lectures 4
1 Period is 60 minutes
Credits 4
Hours Marks
Evaluation System Theory Examination 2½ 60
Theory Internal -- 40
Pre requisites Basic knowledge of statistical methods. Analytical and logical thinking.
5
Atanu Adhikari,
M.Griffin
2. Business Albright Cengage 5e 2015
Analytics Winston
3. Research Methods for Mark Saunders 2011
Business Students Fifth
Edition
4. Multivariate Data Analysis Hair Pearson 7e 2014
Practical No Details
1 - 10 10 Practical based on above syllabus, covering entire syllabus
6
M. Sc (Information Technology) Semester – I
Course Name: Data Science Course Code: PSIT102
Periods per week Lectures 4
1 Period is 60 minutes
Credits 4
Hours Marks
Evaluation System Theory Examination 2½ 60
Theory Internal -- 40
7
IV Process Superstep : Data Vault, Time-Person-Object-Location-Event
Data Vault, Data Science Process, Data Science,
Transform Superstep : Transform Superstep, Building a Data 12
Warehouse, Transforming with Data Science, Hypothesis Testing,
Overfitting and Underfitting, Precision-Recall, Cross-Validation Test.
V Transform Superstep: Univariate Analysis, Bivariate Analysis,
Multivariate Analysis, Linear Regression, Logistic Regression,
Clustering Techniques, ANOVA, Principal Component Analysis
(PCA), Decision Trees, Support Vector Machines, Networks, Clusters,
and Grids, Data Mining, Pattern Recognition, Machine Learning, 12
Bagging Data,Random Forests, Computer Vision (CV) , Natural
Language Processing (NLP), Neural Networks, TensorFlow.
Organize and Report Supersteps : Organize Superstep, Report
Superstep, Graphics, Pictures, Showing the Difference
Practical No Details
1 - 10 10 Practical based on above syllabus, covering entire syllabus
Course Outcome Apply quantitative modeling and data analysis techniques to the
solution of real world business problems, communicate findings, and
effectively present results using data visualization techniques.
Recognize and analyze ethical issues in business related to intellectual
property, data security, integrity, and privacy.
8
Apply ethical practices in everyday business activities and make well-
reasoned ethical business and data management decisions.
Demonstrate knowledge of statistical data analysis techniques utilized
in business decision making.
Apply principles of Data Science to the analysis of business problems.
Use data mining software to solve real-world problems.
Employ cutting edge tools and technologies to analyze Big Data.
Apply algorithms to build machine intelligence.
Demonstrate use of team work, leadership skills, decision making and
organization theory.
9
M. Sc (Information Technology) Semester – I
Course Name: Cloud Computing Course Code: PSIT103
Periods per week Lectures 4
1 Period is 60 minutes
Credits 4
Hours Marks
Evaluation System Theory Examination 2½ 60
Theory Internal -- 40
10
Sign-On (SSO), Cloud-Based Security Groups, Hardened Virtual
Server Images
IV Fundamental Cloud Architectures: Workload Distribution
Architecture, Resource Pooling Architecture, Dynamic Scalability
Architecture, Elastic Resource Capacity Architecture, Service Load
Balancing Architecture, Cloud Bursting Architecture, Elastic Disk
Provisioning Architecture, Redundant Storage Architecture. Advanced
Cloud Architectures: Hypervisor Clustering Architecture, Load
12
Balanced Virtual Server Instances Architecture, Non-Disruptive
Service Relocation Architecture, Zero Downtime Architecture, Cloud
Balancing Architecture, Resource Reservation Architecture, Dynamic
Failure Detection and Recovery Architecture, Bare-Metal Provisioning
Architecture, Rapid Provisioning Architecture, Storage Workload
Management Architecture
V Cloud Delivery Model Considerations: Cloud Delivery Models: The
Cloud Provider Perspective, Cloud Delivery Models: The Cloud
Consumer Perspective, Cost Metrics and Pricing Models: Business
12
Cost Metrics, Cloud Usage Cost Metrics, Cost Management
Considerations, Service Quality Metrics and SLAs: Service Quality
Metrics, SLA Guidelines
11
M. Sc (Information Technology) Semester – I
Course Name: Cloud Computing Practical Course Code: PSIT1P3
Periods per week Lectures 4
1 Period is 60 minutes
Credits 2
Hours Marks
Evaluation System Practical Examination 2 40
Practical No Details
1 - 10 10 Practical based on above syllabus, covering entire syllabus
Course Outcome Analyze the Cloud computing setup with its vulnerabilities and
applications using different architectures.
Design different workflows according to requirements and apply
map reduce programming model.
Apply and design suitable Virtualization concept, Cloud Resource
Management and design scheduling algorithms.
Create combinatorial auctions for cloud resources and design
scheduling algorithms for computing clouds
Assess cloud Storage systems and Cloud security, the risks
involved, its impact and develop cloud application
Broadly educate to know the impact of engineering on legal and
societal issues involved in addressing the security issues of cloud
computing.
12
M. Sc (Information Technology) Semester – I
Course Name: Soft Computing Techniques Course Code: PSIT104
Periods per week Lectures 4
1 Period is 60 minutes
Credits 4
Hours Marks
Evaluation System Theory Examination 2½ 60
Theory Internal -- 40
Objectives • Soft computing concepts like fuzzy logic, neural networks and genetic
algorithm, where Artificial Intelligence is mother branch of all.
• All these techniques will be more effective to solve the problem
efficiently
13
IV Introduction to Fuzzy Logic, Classical Sets and Fuzzy sets:
Classical sets, Fuzzy sets.
Classical Relations and Fuzzy Relations:
Cartesian Product of relation, classical relation, fuzzy relations,
tolerance and equivalence relations, non-iterative fuzzy sets.
Membership Function: features of the membership functions, 12
fuzzification, methods of membership value assignments.
Defuzzification: Lambda-cuts for fuzzy sets, Lambda-cuts for fuzzy
relations, Defuzzification methods.
Fuzzy Arithmetic and Fuzzy measures: fuzzy arithmetic, fuzzy
measures, measures of fuzziness, fuzzy integrals.
V Fuzzy Rule base and Approximate reasoning:
Fuzzy proportion, formation of rules, decomposition of rules,
aggregation of fuzzy rules, fuzzy reasoning, fuzzy inference systems,
Fuzzy logic control systems, control system design, architecture and
operation of FLC system, FLC system models and applications of FLC
System.
Genetic Algorithm: Biological Background, Traditional optimization
and search techniques, genetic algorithm and search space, genetic
algorithm vs. traditional algorithms, basic terminologies, simple genetic
12
algorithm, general genetic algorithm, operators in genetic algorithm,
stopping condition for genetic algorithm flow, constraints in genetic
algorithm, problem solving using genetic algorithm, the schema
theorem, classification of genetic algorithm, Holland classifier systems,
genetic programming, advantages and limitations and applications of
genetic algorithm.
Differential Evolution Algorithm, Hybrid soft computing techniques –
neuro – fuzzy hybrid, genetic neuro-hybrid systems, genetic fuzzy
hybrid and fuzzy genetic hybrid systems.
14
6. Genetic Algorithms: Search, Davis Addison 1989
Optimization and Machine E.Goldberg Wesley
Learning
7. Introduction to AI and Dan W. Prentice 2009
Expert System Patterson Hall of
India
Practical No Details
1 - 10 10 Practical based on above syllabus, covering entire syllabus
Course Outcome • Identify and describe soft computing techniques and their roles in
building intelligent machines
• Recognize the feasibility of applying a soft computing methodology
for a particular problem
• Apply fuzzy logic and reasoning to handle uncertainty and solve
engineering problems
• Apply genetic algorithms to combinatorial optimization problems
• Apply neural networks for classification and regression problems
• Effectively use existing software tools to solve real problems using
a soft computing approach
• Evaluate and compare solutions by various soft computing
approaches for a given problem.
15
SEMESTER II
16
M. Sc (Information Technology) Semester – II
Course Name: BigData Analytics Course Code: PSIT201
Periods per week Lectures 4
1 Period is 60 minutes
Credits 4
Hours Marks
Evaluation System Theory Examination 2½ 60
Theory Internal -- 40
17
Advanced MapReduce. In-Memory Computing with Spark, Spark
Basics, Interactive Spark with PySpark, Writing Spark Applications,
V Distributed Analysis and Patterns, Computing with Keys, Design
Patterns, Last-Mile Analytics, Data Mining and Warehousing,
Structured Data Queries with Hive, HBase, Data Ingestion, Importing 12
Relational data with Sqoop, Injesting stream data with flume. Analytics
with higher level APIs, Pig, Spark’s higher level APIs.
,
Books and References:
Sr. No. Title Author/s Publisher Edition Year
1. Big Data and Analytics Subhashini Wiley First
Chellappan
Seema Acharya
2. Data Analytics with Hadoop Benjamin O’Reilly 2016
An Introduction for Data Bengfort and
Scientists Jenny Kim
3. Big Data and Hadoop V.K Jain Khanna First 2018
Publishing
Practical No Details
1 - 10 10 Practical based on above syllabus, covering entire syllabus
Course Outcome • Understand the key issues in big data management and its
associated applications in intelligent business and scientific
computing.
• Acquire fundamental enabling techniques and scalable
algorithms like Hadoop, Map Reduce and NO SQL in big data
analytics.
• Interpret business models and scientific computing paradigms,
and apply software tools for big data analytics.
• Achieve adequate perspectives of big data analytics in various
applications like recommender systems, social media
applications etc.
18
M. Sc (Information Technology) Semester – I
Course Name: Modern Networking Course Code: PSIT202
Periods per week Lectures 4
1 Period is 60 minutes
Credits 4
Hours Marks
Evaluation System Theory Examination 2½ 60
Theory Internal -- 40
19
Defined Networking, SDN- and NFV-Related Standards Standards-
Developing Organizations Industry Consortia Open Development
Initiatives, SDN Data Plane and OpenFlow SDN Data Plane, Data
Plane Functions Data Plane Protocols OpenFlow Logical Network
Device Flow Table Structure Flow Table Pipeline, The Use of Multiple
Tables Group Table OpenFlow Protocol, SDN Control Plane
SDN Control Plane Architecture Control Plane Functions, Southbound
Interface Northbound InterfaceRouting, ITU-T Model, OpenDaylight
OpenDaylight Architecture OpenDaylight Helium, REST REST
Constraints Example REST API, Cooperation and Coordination
Among Controllers, Centralized Versus Distributed Controllers, High-
Availability Clusters Federated SDN Networks, Border Gateway
Protocol Routing and QoS Between Domains, Using BGP for QoS
Management IETF SDNi OpenDaylight SNDi SDN Application Plane
SDN Application Plane Architecture Northbound Interface Network
Services Abstraction Layer Network Applications, User Interface,
Network Services Abstraction Layer Abstractions in SDN, Frenetic
Traffic Engineering PolicyCop Measurement and Monitoring Security
OpenDaylight DDoS Application Data Center Networking, Big Data
over SDN Cloud Networking over SDN Mobility and Wireless
Information-Centric Networking CCNx, Use of an Abstraction Layer
III Virtualization, Network Functions Virtualization: Concepts and
Architecture, Background and Motivation for NFV, Virtual Machines
The Virtual Machine Monitor, Architectural Approaches Container
Virtualization, NFV Concepts Simple Example of the Use of NFV,
NFV Principles High-Level NFV Framework, NFV Benefits and
Requirements NFV Benefits, NFV Requirements, NFV Reference
Architecture NFV Management and Orchestration, Reference Points
Implementation, NFV Functionality, NFV Infrastructure,Container
Interface,Deployment of NFVI Containers,Logical Structure of NFVI
Domains,Compute Domain, Hypervisor Domain,Infrastructure
Network Domain, Virtualized Network Functions, VNF
Interfaces,VNFC to VNFC Communication,VNF Scaling, NFV
12
Management and Orchestration, Virtualized Infrastructure
Manager,Virtual Network Function Manager,NFV Orchestrator,
Repositories, Element Management, OSS/BSS, NFV Use Cases
Architectural Use Cases, Service-Oriented Use Cases, SDN and NFV
Network Virtualization, Virtual LANs ,The Use of Virtual
LANs,Defining VLANs, Communicating VLAN Membership,IEEE
802.1Q VLAN Standard, Nested VLANs, OpenFlow VLAN Support,
Virtual Private Networks, IPsec VPNs,MPLS VPNs, Network
Virtualization, Simplified Example, Network Virtualization
Architecture, Benefits of Network Virtualization, OpenDaylight’s
Virtual Tenant Network, Software-Defined Infrastructure,Software-
Defined Storage, SDI Architecture
20
IV Defining and Supporting User Needs, Quality of Service, Background,
QoS Architectural Framework, Data Plane, Control Plane, Management
Plane, Integrated Services Architecture, ISA Approach
ISA Components, ISA Services, Queuing Discipline, Differentiated
Services, Services, DiffServ Field, DiffServ Configuration and
Operation, Per-Hop Behavior, Default Forwarding PHB, Service Level
Agreements, IP Performance Metrics, OpenFlow QoS Support, Queue
Structures, Meters, QoE: User Quality of Experience, Why
QoE?,Online Video Content Delivery, Service Failures Due to
Inadequate QoE Considerations QoE-Related Standardization Projects,
Definition of Quality of Experience, Definition of Quality, Definition
of Experience Quality Formation Process, Definition of Quality of
Experience, QoE Strategies in Practice, The QoE/QoS Layered Model
Summarizing and Merging the ,QoE/QoS Layers, Factors Influencing
QoE, Measurements of QoE, Subjective Assessment, Objective
12
Assessment, End-User Device Analytics, Summarizing the QoE
Measurement Methods, Applications of QoE Network Design
Implications of QoS and QoE Classification of QoE/ QoS Mapping
Models, Black-Box Media-Based QoS/QoE Mapping Models, Glass-
Box Parameter-Based QoS/QoE Mapping Models,Gray-Box QoS/QoE
Mapping Models, Tips for QoS/QoE Mapping Model Selection,IP-
Oriented Parameter-Based QoS/QoE Mapping Models,Network Layer
QoE/QoS Mapping Models for Video Services, Application Layer
QoE/QoS Mapping Models for Video Services Actionable QoE over
IP-Based Networks, The System-Oriented Actionable QoE Solution,
The Service-Oriented Actionable QoE Solution, QoE Versus QoS
Service Monitoring, QoS Monitoring Solutions, QoE Monitoring
Solutions, QoE-Based Network and Service Management, QoE-Based
Management of VoIP Calls, QoE-Based Host-Centric Vertical
Handover, QoE-Based Network-Centric Vertical Handover
V Modern Network Architecture: Clouds and Fog, Cloud Computing,
Basic Concepts, Cloud Services, Software as a Service, Platform as a
Service, Infrastructure as a Service, Other Cloud Services, XaaS, Cloud
Deployment Models, Public Cloud Private Cloud Community Cloud,
Hybrid Cloud, Cloud Architecture, NIST Cloud Computing Reference
Architecture,ITU-T Cloud Computing Reference Architecture, SDN and
NFV, Service Provider Perspective Private Cloud Perspective, ITU-T
Cloud Computing Functional Reference Architecture, The Internet of
Things: Components The IoT Era Begins, The Scope of the Internet of
Things Components of IoT-Enabled Things, Sensors, Actuators, 12
Microcontrollers, Transceivers, RFID, The Internet of Things:
Architecture and Implementation, IoT Architecture,ITU-T IoT
Reference Model, IoT World Forum Reference Model, IoT
Implementation, IoTivity, Cisco IoT System, ioBridge, Security
Security Requirements, SDN Security Threats to SDN, Software-
Defined Security, NFV Security, Attack Surfaces, ETSI Security
Perspective, Security Techniques, Cloud Security, Security Issues and
Concerns, Cloud Security Risks and Countermeasures, Data Protection
21
in the Cloud, Cloud Security as a Service, Addressing Cloud Computer
Security Concerns, IoT Security, The Patching Vulnerability, IoT
Security and Privacy Requirements Defined by ITU-TAn IoT Security
Framework, Conclusion
Practical No Details
1 - 10 10 Practical based on above syllabus, covering entire syllabus
22
M. Sc (Information Technology) Semester – I
Course Name: Microservice Architecture Course Code: PSIT203
Periods per week Lectures 4
1 Period is 60 minutes
Credits 4
Hours Marks
Evaluation System Theory Examination 2½ 60
Theory Internal -- 40
23
Microservices Ecosystems, Building the location Service, Enhancing
Team Service.
IV Creating Data Service: Choosing a Data Store, Building a Postgres
Repository, Databases are Backing Services, Integration Testing Real
Repositories, Exercise the Data Service.Event Sourcing and CQRS:
Event Sourcing, CQRS pattern, Event Sourcing and CQRS, Running
the samples. Building an ASP.NET Core Web Application: 12
ASP.NET Core Basics, Building Cloud-Native Web Applications.
Service Discovery: Cloud Native Factors, Netflix Eureka, Discovering
and Advertising ASP.NET Core Services. DNS and Platform Supported
Discovery.
V Configuring Microservice Ecosystems: Using Environment
Variables with Docker, Using Spring Cloud Config Server, Configuring
Microservices with etcd, Securing Applications and Microservices:
Security in the Cloud, Securing ASP.NET Core Web Apps, Securing
ASP.NET Core Microservices. Building Real-Time Apps and 12
Services: Real-Time Applications Defined, Websockets in the Cloud,
Using a Cloud Messaging Provider, Building the Proximity Monitor.
Putting It All Together: Identifying and Fixing Anti-Patterns,
Continuing the Debate over Composite Microservices, The Future.
24
M. Sc (Information Technology) Semester – II
Course Name: Microservices Architecture Course Code: PSIT2P3
Practical
Periods per week Lectures 4
1 Period is 60 minutes
Credits 2
Hours Marks
Evaluation System Practical Examination 2 40
Practical No Details
1 - 10 10 Practical based on above syllabus, covering entire syllabus
25
M. Sc (Information Technology) Semester – II
Course Name: Image Processing Course Code: PSIT204
Periods per week Lectures 4
1 Period is 60 minutes
Credits 4
Hours Marks
Evaluation System Theory Examination 2½ 60
Theory Internal -- 40
26
Images, Fourier-Related Transforms, Walsh-Hadamard Transforms, Slant
Transform, Haar Transform, Wavelet Transforms
Color Image Processing: Color Fundamentals, Color Models, Pseudocolor
Image Processing, Full-Color Image Processing, Color Transformations,
Color Image Smoothing and Sharpening, Using Color in Image Segmentation,
Noise in Color Images, Color Image Compression.
Image Compression and Watermarking: Fundamentals, Huffman Coding,
Golomb Coding, Arithmetic Coding, LZW Coding, Run-length Coding,
Symbol-based Coding, 8 Bit-plane Coding, Block Transform Coding,
Predictive Coding, Wavelet Coding, Digital Image Watermarking,
IV Morphological Image Processing: Preliminaries, Erosion and Dilation,
Opening and Closing, The Hit-or-Miss Transform, Morphological
Algorithms, Morphological Reconstruction¸ Morphological Operations on
Binary Images, Grayscale Morphology
Image Segmentation I: Edge Detection, Thresholding, and Region 12
Detection: Fundamentals, Thresholding, Segmentation by Region Growing
and by Region Splitting and Merging, Region Segmentation Using Clustering
and Superpixels, Region Segmentation Using Graph Cuts, Segmentation
Using Morphological Watersheds, Use of Motion in Segmentation
V Image Segmentation II: Active Contours: Snakes and Level Sets:
Background, Image Segmentation Using Snakes, Segmentation Using Level
Sets.
Feature Extraction: Background, Boundary Preprocessing, Boundary 12
Feature Descriptors, Region Feature Descriptors, Principal Components as
Feature Descriptors, Whole-Image Features, Scale-Invariant Feature
Transform (SIFT)
Practical No Details
1 - 10 10 Practical based on above syllabus, covering entire syllabus
27
Course Outcome Understand the relevant aspects of digital image representation and
their practical implications.
Have the ability to design pointwise intensity transformations to meet
stated specifications.
Understand 2-D convolution, the 2-D DFT, and have the abitilty to
design systems using these concepts.
Have a command of basic image restoration techniques.
Understand the role of alternative color spaces, and the design
requirements leading to choices of color space.
Appreciate the utility of wavelet decompositions and their role in image
processing systems.
Have an understanding of the underlying mechanisms of image
compression, and the ability to design systems using standard
algorithms to meet design specifications.
28
Evaluation Scheme
Internal Evaluation (40 Marks)
The internal assessment marks shall be awarded as follows:
1. 30 marks (Any one of the following):
a. Written Test or
b. SWAYAM (Advanced Course) of minimum 20 hours and certification exam
completed or
c. NPTEL (Advanced Course) of minimum 20 hours and certification exam
completed or
d. Valid International Certifications (Prometric, Pearson, Certiport, Coursera,
Udemy and the like)
e. One certification marks shall be awarded one course only. For four courses,
the students will have to complete four certifications.
2. 10 marks
The marks given out of 40 for publishing the research paper should be divided into
four course and should awarded out of 10 in each of the four course.
ii. 10 marks from every course coming to a total of 40 marks, shall be awarded on
publishing of research paper in UGC approved Journal with plagiarism less than
10%. The marks can be awarded as per the impact factor of the journal, quality of
the paper, importance of the contents published, social value.
29
External Examination: (60 marks)
1. Practical Question 1 20
2. Practical Question 2 20
3. Journal 5
4. Viva Voce 5
OR
1. Practical Question 40
2. Journal 5
3. Viva Voce 5
30