M Tech IT
M Tech IT
UNIVERSITY DEPARTMENTS
M.TECH. INFORMATION TECHNOLOGY
REGULATIONS - 2023
CHOICE BASED CREDIT SYSTEM
To educate students with conceptual knowledge and technical skills in the field of Information
Technology with moral and ethical values to achieve excellence in academic, industry and
research centric environments.
1. To inculcate in students a firm foundation in theory and practice of IT skills coupled with the
thought process for disruptive innovation and research methodologies, to keep pace with
emerging technologies.
3. To stimulate the growth of graduates and doctorates, who will enter the workforce as
productive IT engineers, researchers and entrepreneurs with necessary soft skills, and
continue higher professional education with competence in the global market.
4. To enable seamless collaboration with the IT industry and Government for consultancy and
sponsored research.
6. To educate the students on the social, ethical, and moral values needed to make
significant contributions to society.
1
ANNA UNIVERSITY, CHENNAI
UNIVERSITY DEPARTMENTS
M.TECH. INFORMATION TECHNOLOGY
REGULATIONS - 2023
CHOICE BASED CREDIT SYSTEM
II. To provide students with a solid foundation in mathematical, scientific and engineering
fundamentals required to provide IT solutions to real-world problems of Industries,
Businesses and Society.
III. To train students with good computer science and engineering knowledge so as to
comprehend, analyze, design and create novel products and novel IT services.
IV. To inculcate students in solving real-time problems through IT knowledge and with
attention to team work, effective communication skills and critical thinking.
On successful completion of the programme, the students will acquire the following:
PO # Programme Outcome
1 An ability to independently carry out research /investigation and development
work to solve practical problems.
2 An ability to write and present a substantial technical report/document.
3 A degree of mastery over the field of Information Technology.
4 An ability to comprehend, select and adopt appropriate and emerging computing and
communication technologies to solve the challenging problems of this information
era.
5 An ability to recognize the need for applying efficient software and hardware based
solutions to improve the quality of life.
6 An ability to function effectively as an individual and a team member, in project and
product development and to follow professional ethics in the career.
2
3. PEO / PO Mapping:
Programme
Educational PO1 PO2 PO3 PO4 PO5 PO6
Objectives
PEO1 3 3 3 3 3
PEO2 3 3 3 3 3
PEO3 3 3 3 3 3
PEO4 3
PEO5 3 3 3 3
Advanced Database
3 2 3 3 3 1.8
Management Systems
High Performance
2.7 1.2 1.5 1.8 2 1.8
Year I
Computing
Research Methodology
and IPR
Software Design
3 1 3 2.7 3 1
Methodologies
Fundamentals of
Sem 2
3 1 3 3 2.7 2.2
Machine Learning
Information Security 3 1 3 2.2 3 3
Professional Elective I
Professional Elective II
Next Generation
2 2 2 2 2 1.8
Wireless Networks
Sem 3
Professional Elective V
Project Work I 3 3 3 3 3 2
Sem 4
Project Work II 3 3 3 3 3 2
3
ANNA UNIVERSITY, CHENNAI
UNIVERSITY DEPARTMENTS
M.TECH. INFORMATION TECHNOLOGY
REGULATIONS - 2023
CHOICE BASED CREDIT SYSTEM
CURRICULA AND SYLLABI
SEMESTER I
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. MA3160 Probability and Statistical Methods FC 4 0 0 4 4
2. RM3151 Research Methodology and IPR RMC 2 1 0 3 3
3. Advanced Data Structures and
IF3151 PCC 3 0 3 6 4.5
Algorithms
4. IF3101 Full Stack Technologies PCC 3 0 3 6 4.5
5. Advanced Database Management
IF3152 PCC 3 0 2 5 4
Systems
6. IF3102 High Performance Computing PCC 3 0 0 3 3
TOTAL 18 1 8 27 23
SEMESTER II
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. IF3201 Software Design Methodologies PCC 3 0 2 5 4
2. Fundamentals of Machine
IF3202 PCC 3 0 2 5 4
Learning
3. IF3203 Information Security PCC 3 0 0 3 3
4. Professional Elective I PEC 3 0 0 3 3
5. Professional Elective II PEC 3 0 2 5 4
TOTAL 15 0 6 21 18
4
SEMESTER III
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. Next Generation Wireless
IF3351 PCC 3 0 2 5 4
Networks
2. Professional Elective III PEC 3 0 2 5 4
3. Professional Elective IV PEC 3 0 2 5 4
4. Professional Elective V PEC 3 0 2 5 4
PRACTICALS
5. IF3311 Project Work I EEC 0 0 12 12 6
TOTAL 12 0 20 32 22
SEMESTER IV
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
PRACTICALS
1. IF3411 Project Work II EEC 0 0 24 24 12
TOTAL 0 0 24 24 12
(GROUP – I)
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. IF3051 Artificial Life and Robotics PEC 3 0 0 3 3
2. IF3057 Information Retrieval PEC 3 0 0 3 3
3. IF3055 Human Computer Interaction PEC 3 0 0 3 3
Autonomous Ground Vehicle
4. IF3052 PEC 3 0 0 3 3
Systems
5. IF3060 Open Source Technologies PEC 3 0 0 3 3
Reasoning Methods in Computer
6. IF3061 PEC 3 0 0 3 3
Science
7. IF3062 Social Network Analysis PEC 3 0 0 3 3
8. IF3001 Conversational Systems PEC 3 0 0 3 3
(GROUP – II)
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. Wireless Sensor Networks and
IF3002 PEC 3 0 2 5 4
Protocols
2. IF3003 Advanced Computer Architecture PEC 3 0 2 5 4
3. IF3004 Virtualization PEC 3 0 2 5 4
4. Advanced Operating System
IF3005 PEC 3 0 2 5 4
Techniques
5. IF3006 Deep Learning PEC 3 0 2 5 4
6. Mobile Application Development
IF3059 PEC 3 0 2 5 4
and Deployment
7. IF3053 Blockchain Technologies PEC 3 0 2 5 4
8. IF3054 Building IOT Systems PEC 3 0 2 5 4
9. Visualization Methods and
IF3063 PEC 3 0 2 5 4
Techniques
10. Image Processing and Computer
IF3056 PEC 3 0 2 5 4
Vision
11. IF3058 Mixed Reality Techniques PEC 3 0 2 5 4
6
12. GPU Architecture and
IF3007 PEC 3 0 2 5 4
Programming
13. Service Oriented Architecture and
IF3008 PEC 3 0 2 5 4
Microservices
14. IF3009 Cyber Forensics PEC 3 0 2 5 4
15. IF3010 BioMetrics PEC 3 0 2 5 4
16. Advanced Computer Graphics
IF3011 PEC 3 0 2 5 4
and Animation
PERIODS TOTAL
S. COURSE
COURSE TITLE CATEGORY PER WEEK CONTACT CREDITS
NO. CODE
L T P PERIODS
1. IF3311 Project Work I EEC 0 0 12 12 6
2. IF3411 Project Work II EEC 0 0 24 24 12
TOTAL CREDITS 18
SUMMARY
I II III IV
1. FC 4 4
2. PCC 16 11 4 31
3. PEC 7 12 19
4. RMC 3 3
5. EEC 6 12 18
6. TOTAL CREDIT 23 18 22 12 75
7
MA3160 PROBABILITY AND STATISTICAL METHODS LT P C
4 0 0 4
Random variables - Probability function – Moments – Moment generating functions and their
properties – Binomial, Poisson, Geometric, Uniform, Exponential, Gamma and Normal
distributions – Functions of a Random Variable.
Joint distributions – Marginal and Conditional distributions – Functions of two dimensional random
variables – Regression Curve – Correlation.
Sampling distributions - Type I and Type II errors - Tests based on Normal, t, Chi-Square and F
distributions for testing of mean, variance and proportions – Tests for Independence of attributes
and Goodness of fit.
Random Vectors and Matrices - Mean vectors and Covariance matrices - Multivariate Normal
density and its properties - Principal components: Population principal components – Principal
components from standardized variables.
TOTAL: 60 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1 Use the appropriate and relevant, fundamental and applied mathematical and statistics
knowledge and methodologies in solving practical problem.
CO2 Bring together and flexibly apply knowledge to characterize, analyse and solve a wide range
of problems.
CO3 Understand the balance between the complexity/accuracy of the mathematical/statistical
models used and the timeliness of the delivery of the solution.
CO4 Steeped in research methods and rigor.
CO5 Develop critical thinking based on empirical evidence and the scientific approach to
knowledge development.
REFERENCES:
Dallas E Johnson , “Applied multivariate methods for data analysis”, Thomson and Duxbury
press, Singapore, 1998.
Gupta S.C. and Kapoor V.K. “Fundamentals of Mathematical Statistics”, Sultan and Sons, 11th
Edition, Reprint, New Delhi, 2019.
8
Jay L. Devore, “Probability and statistics for Engineering and Sciences”, Thomson and Duxbury,
9th Edition, Singapore, Boston, 2016.
Krishnaiah K. and Shahabudeen P, “Applied Design of Experiments and Taguchi Methods”, PHI,
New Delhi, 2012.
Richard A. Johnson and Dean W. Wichern, “Applied Multivariate Statistical Analysis”, Pearson
Education, Fifth Edition, 6th Edition, New Delhi, 2013.
Richard Johnson. ”Miller & Freund‟s Probability and Statistics for Engineer”, Prentice Hall of India
Private Ltd., 8th Edition, New Delhi, 2011.
9
UNIT V PATENTS 9
Patents – objectives and benefits of patent, concept, features of patent, inventive steps,
specifications, types of patent application; patenting process - patent filling, examination of patent,
grant of patent, revocation; equitable assignments; Licenses, licensing of patents; patent agents,
registration of patent agents.
TOTAL: 45 PERIODS
COURSE OUTCOMES
Upon completion of the course, the student can
CO1: Describe different types of research; identify, review and define the research problem
CO2: Select suitable design of experiment s; describe types of data and the tools for collection of
data
CO3: Explain the process of data analysis; interpret and present the result in suitable form
CO4: Explain about Intellectual property rights, types and procedures
CO5: Execute patent filing and licensing
REFERENCES:
1. Cooper Donald R, Schindler Pamela S and Sharma JK, “Business Research Methods”, Tata
McGraw Hill Education, 11e (2012).
2. Soumitro Banerjee, “Research methodology for natural sciences”, IISc Press, Kolkata, 2022,
3. Catherine J. Holland, “Intellectual property: Patents, Trademarks, Copyrights, Trade Secrets”,
Entrepreneur Press, 2007.
4. David Hunt, Long Nguyen, Matthew Rodgers, “Patent searching: tools & techniques”, Wiley,
2007.
5. The Institute of Company Secretaries of India, Statutory body under an Act of parliament,
“Professional Programme Intellectual Property Rights, Law and practice”, September 2013.
10
UNIT IV GRAPH ALGORITHMS 9
Graphs: Representations of Graphs – Breadth First Search- Depth First Search- Topological Sort
– Strongly Connected Components – Minimum Spanning Trees: Kruskal and Prim – Single-Source
Shortest Paths: The Bellman Ford Algorithm, Single-Source Shortest Paths in Directed Acyclic
Graphs, Dijkstra’s Algorithm – All- Pairs Shortest Paths: The Floyd-Warshall Algorithm.
PRACTICAL EXCERCISE: 45
1. Iterative and recursive algorithms and its complexity analysis.
2. Merge sort algorithm analysis using Divide and Conquer approach.
3. Quick sort algorithm using randomized algorithmic approach.
4. Matrix chain multiplication using Dynamic programming approach.
5. Activity selection and Huffman coding using Greedy approach.
6. Binary search tree and a Red-Black tree implementation.
7. Implementation of basic heap operations.
8. Implementation of Top down Splay and Fibonacci Heap operations using Amortized
analysis.
9. Representation of Graphs and Graph traversals.
10. Implementation of a Spanning tree for a given graph using Prim’s algorithm.
11. Implementation of a Shortest path of a given graph using Dijkstra’s algorithm
TOTAL: 90 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to:
CO1: Analyze and implement suitable iterative or recursive algorithms for a given problem with
minimum complexity.
CO2: Create suitable design strategies to solve a problem in an efficient manner.
CO3: Implement hierarchical data structures to approach a real time problem and also to solve
it in amortized runs.
CO4: Understand and develop algorithms using graph structures for suitable applications.
CO5: Solve NP Complete problems efficiently.
CO6: Apply appropriate data structures and suitable algorithmic design to implement real time
applications.
REFERENCES:
1. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, “Introduction to
Algorithms”, Fourth Edition, Prentice-Hall, 2022.
2. S. Sridhar, “Design and Analysis of Algorithms”, Second Edition, Oxford University Press,
2014.
3. Mark Allen Weiss, “Data Structures and Algorithm Analysis using C”, Second Edition,
Pearson Education, 2002.
4. Robert Sedgewick, Kevin Wayne, “Algorithms”, Fourth Edition, Pearson Education. 2011.
11
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 - 3 3 3 2
CO2 3 - 3 3 3 2
CO3 3 - 3 3 3 2
CO4 3 - 3 3 3 2
CO5 3 - 3 3 2 2
CO6 3 2 3 3 3 3
UNIT IV WEBPACK 9
Introduction to webpack - dependency graph - Plugins - Modules - Adding node modules - REST
Endpoint - mailer - other examples
REFERENCES:
1. Frank Zammetti, Modern Full-Stack Development Using TypeScript, React, Node.js,
Webpack, and Docker, Apress, 2020
2. David Choi, Full-Stack React, TypeScript, and Node, Packt Publications, 2020
3. Vasan Subramanian, Pro MERN Stack, Full Stack Web App Development with Mongo,
Express, React, and Node, Vasan Subramanian, A Press Publisher, 2019.
13
UNIT V GRAPH DATABASES 9
Introduction to Graph Databases – The Power of Graph Databases – Data Modeling with Graphs –
Querying Graphs – Introduction to Cypher – CQL Clauses – Write Clause – Read Clause –
General Clauses – CQL Functions – Building a Graph Database application.
PRACTICAL EXERCISES: 30
1. Create a distributed database using horizontal and vertical fragmentation in any DBMS.
2. Creation of distributed queries using the fragmented data created.
3. Create a document based database using MongoDB and manipulate the data.
4. Create a document database using Cassandra and manipulate the data.
5. Create a database to store multimedia elements and perform data retrieval operations.
6. Create a temporal database and explore the usage of temporal queries in it.
7. Creation of an XML document and validate it using an XML schema.
8. Given JSON and BSON document database and manipulate the data.
9. Create a simple Recommendation engine in E commerce use graph database.
10 Develop a social media application using Graph database.
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Design a distributed database system and execute distributed queries.
CO2: Implement NoSQL database systems and manipulate the data associated with it.
CO3: Disseminate knowledge on advanced database system concepts.
CO4: Create real time applications using Spatial, temporal and Mobile Databases.
CO5: Design and develop document databases using XML /JSON databases.
CO6: Build a simple real time application using graph databases and execute queries on it.
REFERENCES:
1. Henry F. Korth, Abraham Silberschatz, S. Sudharshan, “Database System Concepts”, Sixth
Edition, McGraw-Hill, 2011.
2. R. Elmasri, S. B. Navathe, “Fundamentals of Database Systems”, Seventh Edition, Pearson
Education/Addison Wesley, 2017.
3. C. J. Date, A. Kannan, S. Swamynathan, “An Introduction to Database Systems”, Eighth
Edition, Pearson Education, 2006.
4. Brad Dayley, “Teach Yourself NoSQL with MongoDB in 24 Hours”, Sams, 2014.
5. Shashank Tiwari, “Professional NoSQL”, O’Reilly Media, 2011.
6. Vijay Kumar, “Mobile Database Systems”, John Wiley, 2006.
7. Ian Robinson, Jim Webber and Emil Eifrem, "Graph Databases”, O’Reilly Media, Second
Edition, 2015
8. Elliotte Rusty Harold, W. Scott Means, “XML in a Nutshell“,O’Reilly Media, Third Edition, 2004.
9. Shakuntala Gupta Edward (Author), Navin Sabharwal, “Practical MongoDB: Architecting,
Developing, and Administering MongoDB”, APRESS, First Edition, 2018.
REFERENCES:
1. Georg Hager, Gerhard Wellein,"Introduction to High Performance Computing for Scientists
and Engineers", Chapman & Hall/CRC Computational Science series, 2011.
2. John Levesque, Gene Wagenbreth, “High Performance Computing: Programming and
Application, CRC Press, 2010
3. Kai Hwang, Zhiweixu, “Scalable Parallel Computing: Technology, Architecture,
Programming, McGraw Hill Education, 1998
4. Charles Severance, Kevin Dowd, "High Performance Computing", O‘Reilly Media, 2nd
Edition,1998.
5. Introduction to Parallel Computing, Ananth Grama, Anshul Gupta, George Karypis, and
Vipin Kumar, 2nd edition, Addison-Welsey, 2003.
6. Petascale Computing: Algorithms and Applications, David A. Bader (Ed.), Chapman
&Hall/CRC Computational Science Series, 2007.
7. Sterling, Thomas, Maciej Brodowicz, and Matthew Anderson. High performance
computing: modern systems and practices. Morgan Kaufmann, 2017.
16
UNIT III SOFTWARE DESIGN AND SOFTWARE IMPLEMENTATION 9
Software Design Process – Component based and Model-driven Development – Design Methods:
Procedural and Structural Design Methods, Object Oriented Design Method, Real-time Software
Design -– Design Guidelines for Real-time Software- Design Thinking with Agile - Agile UX Design
- Unified Modeling Language.
PRACTICAL EXERCISES: 30
Design, develop, implement and test any one of the following projects:
1. Data Mining.
2. Embedded Projects, Smart Card/Biometrics.
3. Web Based Projects.
4. Information Security.
5. Artificial Intelligence.
The road map for the project will be the following:
Identify and propose ways to build quality software for the chosen project.
Identify, justify and develop an appropriate generic software process model for the chosen
project.
Using the FDD feature template, define a feature set for the chosen project.
Perform requirements elicitation mechanisms on the selected project and justify the
selection of an appropriate strategy.
Categorize the requirements (considering contradicting, omission, commission of
requirements) in a software project.
Perform analysis.
Develop a complete process framework.
Design and model for the chosen project.
Draw the activity network representation of the tasks for the chosen project.
Determine ES, EF, and LS, LF for every task.
Develop the Gantt chart representation for the project.
Perform software project management tasks.
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Analytically apply general principles of software development in the development of
complex software and software- intensive systems.
17
CO2: Understand methods and techniques for advanced software development and also be able
to use these in various development situations.
CO3: Apply testing techniques for object oriented software and web-based systems.
CO4: Familiarize with the basic concepts of Software design and implementation.
CO5: Apply various software metrics on software quality products.
CO6: Apply various skills on real-time projects.
REFERENCES:
1. Ian Sommerville, Engineering Software Products: An Introduction To Modern Software
Engineering, 1st edition, Pearson India,2020.
2. Roger Pressman, ISE Software Engineering: A Practitioner's Approach, Ninth edition
McGraw Hill, 2019.
3. Learning Agile, Andrew Stellman and Jennifer Greene, O’Reilly, 4th Indian Reprint, 2018
UNIT I INTRODUCTION 9
Machine Learning – Basic Concepts in Machine Learning – Types of Machine Learning –
Applications of Machine Learning - Basics of Learning Theory – Concept Learning - Hypothesis
Space - Find-S algorithm - Version spaces - Bias-Variance Trade offs - Modelling in Machine
learning- Model Selection and Model Evaluation - Model Performance - Resampling Methods.
18
UNIT V UNSUPERVISED LEARNING AND REINFORCEMENT LEARNING 9
Clustering– K-means Clustering– Hierarchical Clustering – Expectation Maximization algorithm –
Gaussian Mixture Model - Cluster Evaluation Methods. Overview of Reinforcement Learning -
Components of Reinforcement Learning - Model Based Learning - Model Free Learning - Q
Learning.
PRACTICAL EXERCISES: 30
1. Develop an application that makes predictions from data using Linear Regression.
2. Develop an application that makes predictions from data using Logistic Regression.
3. Implement a classifier using ID3 and CART algorithms.
4. Implement a classifier using Perceptron and Multi-Layer Perceptron.
5. Develop a system to implement a classifier using SVM
6. Implement Ensemble Models using Random Forest and AdaBoost.
7. Develop a system that can extract the word from the given sentences using the Hidden
Markov model.
8. Develop a system that can automatically group articles by similarity using K–Means
cclustering.
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Disseminate the key elements of machine learning and the basics of learning theory.
CO2: Apply regression analysis and decision tree models for regression and classification
problems.
CO3: Implement SVM or Neural Network model for an appropriate application and improve the
performance using ensemble models.
CO4: Design and implement an BBN, HMM for a sequence model type of application and
implement a PGM for any real time application using an open-source tool.
CO5: Use a tool to implement typical clustering algorithms for different types of applications.
CO6: Identify suitable learning tasks to which Reinforcement learning techniques can be applied.
REFERENCES:
1. Sridhar S, Vijayalakshmi M, “Machine Learning”, First Edition, Oxford University Press,
2022.
2. Christopher Bishop, “Pattern Recognition and Machine Learning”, First Edition, Springer,
2006.
3. T. V. Geetha, S. Sendhilkumar, “Machine Learning: Concepts, Techniques and
Applications” Chapman & Hall/CRC Press, 2023.
4. Kevin P. Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012.
5. EthemAlpaydin, “Introduction to Machine Learning”, Third Edition, Prentice Hall of India,
2005.
6. Tom Mitchell, “Machine Learning”, McGraw-Hill, 1997.
7. Stephen Marsland, “Machine Learning – An Algorithmic Perspective”, CRC Press, 2009.
19
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 3 3 2 1
CO2 3 3 3 3 1
CO3 3 2 3 3 3 3
CO4 3 2 3 3 3 3
CO5 3 2 3 3 3 3
CO6 3 3 3 2 2
TOTAL: 45 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Understand the fundamentals of network security, security architecture, threats and
vulnerabilities.
CO2: Apply the different cryptographic operations of symmetric cryptographic algorithms.
20
CO3: Apply the different cryptographic operations of public key cryptography.
CO4: Apply the various Authentication schemes to simulate different applications.
CO5: Understand various Security practices and System security standards
CO6: Know the state of art technologies like Ethical Hacking, Block chain etc.
REFERENCES:
1. William Stallings, “Cryptography and Network security Principles and Practices”, Pearson
Education/PHI, Fourth Edition, 2006.
2. Behourz Forouzan, Debdeep Mukhopadyay, “Cryptography & Network Security” Tata
MCGraw-Hill Education, 2010
3. Charles P. Pfleeger, Shari L. Pfleeger, “Security in Computing”, Third Edition, PHI/Pearson
Education, 2003.
4. Wenbo Mao, “Modern Cryptography Theory and Practice”, Pearson Education, 2004.
5. Gilles van Assche, “Quantum Cryptography and Secret-Key Distillation”, Cambridge
University Press, 2010.
6. Oded Goldreich, Foundations of Cryptography (two volumes) Cambridge university Press,
2004.
7. Patrick Engebretson, “The basics of Hacking and Penetration Testing”, Elsevier, 2011
21
UNIT IV NETWORKING TECHNIQUES AND APPLICATIONS FOR 5G NETWORKS 9
5G RAN Architecture: C-RAN with NGFI- User-Centric Wireless Network for 5G - Energy
Harvesting Based Green Heterogeneous Wireless Access for 5G -Resource Allocation for
Cooperative D2D Communication Networks- Fog Computing and Its Applications in 5G -A
Conceptual 5G Vehicular Networking -Communications Protocol Design for 5G Vehicular
Networks -Next-Generation High-Efficiency WLAN -Shaping 5G for the Tactile Internet
PRACTICAL EXERCISES: 30
1. Model,Simulate and Test 5G NR PHY in Matlab
2. Evaluating 5G cloud based networks system using C-RAN Simulator.
3. Model a simulator software to generates realistic spatial and temporal wideband
channel impulse response using NYUSIM
4. Model and simulate 6G-enabling technologies with MATLAB
5. Create and optimize your intellectual property (IP) for 6G using open MATLAB
functions and compare your innovations to existing benchmarks.
6. Explore 6G waveform generation beyond the parameters allowed in the current 5G
standard (with new frequency ranges, bandwidths, numerologies).
7. Scale your simulations for massive MIMO, larger bandwidths, and higher sampling
rates. Manage large and long-running simulations by distributing them on multiple
cores, clusters, or the cloud and by leveraging GPUs.
8. Perform faster and more accurate RF component modeling for new mmWave and sub-
THz frequencies.
9. Simulate propagation loss and channel models in mmWave and sub-THz frequency
ranges.
10. Model non-terrestrial networks (NTN) by performing end-to-end link-level simulations,
scenario modeling, orbit propagation, and visualization.
11. Explore RF sensing and detect the presence of events or persons in a scene by
analyzing RF waveforms.
12. Examine the effect of reconfigurable intelligent surfaces (RIS) on overall system
performance.
13. Apply artificial intelligence (AI) techniques, including machine learning, deep learning,
or reinforcement learning workflows to solve 6G wireless communications problems.
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Compare the 5G network with older generations of networks.
CO2: Identify suitable small cells for different applications in 5G networks.
CO3: Simulate 5G network scenarios.
CO4: Connect applications of FOG Computing
CO5: Design applications with 5G network support.
CO6: Analyze the 6G Networks
22
REFERENCES:
1. Jonathan Rodriguez, “Fundamentals of 5G Mobile Networks”, Wiley, 2015.
2. Wireless Communications: Principles and Practice, by Theodore S. Rappaport, Prentice
Hall., 2014
3. Mobile Communication Networks: 5G and a Vision of 6G springer Božanić, Mladen, and
Saurabh Sinha. Mobile Communication Networks: 5G and a Vision of 6G. Springer, 2021.
4. 5G Mobile Communications: Concepts and Technologies 1st Edition
Individual student carry out project I , the goal of project I is to choose the final year project,
Perform Literature Survey, refer IEEE papers, IEEE/ACM papers, study the implementation issues,
familiarize with the tools needed for implementation, study necessary simulation software (if any)
and implement the initial phase of the project. Three reviews needs to be conducted project report
has to be submitted by the team. Final review will be conducted by external member.
COURSE OUTCOMES:
CO1: Work as a team, identify a real-world problem that can be solved using IT tools and
techniques.
CO2: Analyse existing artifacts and solutions and design novel effective approaches.
CO3: Explore, select, and deploy the appropriate tools for effective implementation of the design.
CO4: Prepare the documentation for the design and implementation, write reports and make
presentations justifying the choices made.
CO5: Develop the required collaboration and communication skills to work in a professional team
and multi-disciplinary context.
CO6: Quickly develop Proof-of-Concept of solutions to problems.
Individual student carry out project II , which can be a continuation of project I work or a new
problem can be formulated, with necessary Literature Survey by referring to IEEE/ACM
transactions/standard peer reviewed journals/conference papers, identify the challenges to be
addressed/gaps in the existing research works, propose a solution with necessary architecture with
modular design including data required, relevant algorithms, study of necessary simulation
software (if any), implement the project, evaluate the work with relevant metrics and finally present
the project work with a detailed report.
COURSE OUTCOMES:
Upon completion of this course, the student should be able to:
CO1: Apply the acquired knowledge of basic science and engineering concepts to solve real-
world problems.
CO2: Analyse, design and develop IT solutions following best practices.
CO3: Explore, select, and deploy the appropriate tools for effective implementation of projects.
CO4: Prepare the documentation for the design and implementation, write reports and make
presentations justifying the choices made.
CO5: Develop the required collaboration and communication skills to work in a professional team
and multi-disciplinary context.
CO6: Develop and showcase the complete solution for a given problem in industry/research.
REFERENCES:
1. S.R. Deb, Robotics Technology and flexible automation, Tata McGraw-Hill Education.,
2009
2. Richard D. Klafter, Thomas A. Chmielewski, Michael Negin, “Robotic Engineering – An
integrated approach”, PHI Publication
3. S. B. Nikku, Introduction to Robotics – Analysis, Control, Applications, 3rd edition, John
Wiley & Sons Ltd., (2020)
4. Langton, C. G. (Ed.), Artificial life: An overview, 1997.
5. Caldwell, D. G. (Ed.), Robotics and automation in the food industry: current and future
technologies. Elsevier,2012
25
6. Gomes, P. (Ed.), Medical robotics: Minimally invasive surgery. Elsevier,2012.
7. Samani, H. (Ed.), Cognitive robotics. CRC Press, 2015.
8. S. R. Ruocco, Robot Sensors & Transducers, Springer, 2013
9. Martin, F.G. Robotic explorations: a hands-on introduction to engineering. Upper Saddle
River, N.J.: Prentice-Hall, 2001. ISBN 0130895687.
REFERENCES:
1. Christopher D. Manning, Prabhakar Raghavan, Hinrich Schütze, “Introduction to
Information Retrieval”, Cambridge University Press, 2008.
2. F. Ricci, L. Rokach, B. Shapira, P. B. Kantor, “Recommender Systems Handbook”,
Springer, 2011.
3. Peter Brusilovsky, “The Adaptive Web Methods and Strategies of Web Personalization”,
Springer, 2007.
4. Manu Konchady, “Building Search Applications: Lucene, LingPipe, and Gate”, Mustru
Publishing 2008.
27
Implementation support – Windowing systems – Programming in the application – Toolkits – User
Interface Management Systems
REFERENCES:
1. Alan Dix, Janet Finlay, Gregory Abowd, Russell Beale, “Human Computer Interaction”,
Third Edition, Prentice Hall, 2004.
2. Preece, J., Sharp, H., Rogers, Y., “Interaction Design: Beyond Human-Computer
Interaction”, Sixth Edition, Wiley, 2022.
3. Jonathan Lazar Jinjuan Heidi Feng, Harry Hochheiser, “Research Methods in Human-
Computer Interaction”, Second Edition, Morgan Kaufmann, 2021.
28
4. Ben Shneiderman, Catherine Plaisant, “Designing the User Interface: Strategies for
Effective Human-Computer Interaction”, Sixth Edition, Addison Wesley, 2021.
5. Jeff Johnson, “Designing with the Mind in Mind: Simple Guide to Understanding User
Interface Design Rules”, Third Edition, Morgan Kaufmann, 2020.
6. Benyon, D, “Designing Interactive Systems: A Comprehensive Guide to HCI, UX and
Interaction Design”, Third Edition, Pearson Education Limited, 2019.
REFERENCES:
1. Shaoshan Liu, Liyun Li, Jie Tang, Shuang Wu, Jean-Luc Gaudiot, “Creating Autonomous
Vehicle Systems”, Morgan & Claypool, 2018.
2. Umit Ozguner, Tankut Acarman, Keith Redmill, “Autonomous Ground Vehicles”, Artech
House, 2011.
3. A. R. Jha, “ Theory, design and applications of Unmanned Aerial Vehicles”, 2016.
4. Hong Cheng, “Autonomous Intelligent Vehicles Theory, Algorithms, and Implementation”,
Springer, 2011.
5. Mohinder S. Grewal, Angus P. Andrews, Chris G. Bartone, “Global Navigation Satellite
Systems, Inertial Navigation, and Integration”, Third Edition, John Wiley & Sons, 2013.
6. Kenzo Nonami, Muljiowidodo Kartidjo, “Autonomous Control Systems and Vehicles”,
Intelligent Unmanned Systems, Springer, 2013.
7. Anthony Finn, Steve Scheding, “Development and challenges for Autonomous Unmanned
Vehicles”, A compendium, Springer, 2010.
UNIT I INTRODUCTION 9
Need for Free and Open Source Software – Overview of Linux – Distributions – Licensing
Schemes – Versions – Collaborative Version Control Systems – Shell Commands
30
UNIT III WEB DEVELOPMENT WITH PYTHON 9
HTML – CSS – Bootstrap – Introduction to Flask – Templates – Models – Forms – Modules.
REFERENCES:
1. Jesus M. Gonzalez Barahona, Joaquin Seoane Pascual, Gregorio Robles, “Introduction to
Free Software”, Third Edition, Free Technology Academy, 2009.
2. http://ftacademy.org/sites/ftacademy.org/files/materials/fta–m1–intro_to_FS–v1.pdf
3. Irv Kalb, Object-Oriented Python, O’Reilly, 2022
4. https://getbootstrap.com/
5. Peter Wentworth, Jeffrey Elkner, Allen B. Downey, Chris Meyers, “How to Think Like a
Computer Scientist”, Open Book, 2012.
6. Scott Chacon, Ben Straub, “Pro Git”, Free ebook under Creative Commons, Second
Edition, Apress, 2016.
7. Miguel Grinberg, “Flask Web Development Developing Web Applications with Python”,
O’Reilly, 2014. 7. Karl Seguin, “The Little Mongo DB Book”,
8. https://github.com/karlseguin/the–little– mongodb–book.
9. Jeff Nickoloff and Stephen Kuenzli, Docker in Action, Second Edition, Manning
Publications, 2020
31
IF3061 REASONING METHODS IN COMPUTER SCIENCE LTPC
3 003
REFERENCES:
1. Michael Huth and Mark Ryan, Logic in Computer Science, Modelling and Reasoning about
Systems, 2nd edition, Cambridge University Press, 2005
2. Johan van Benthem, Hans van Ditmarsch, Jan van Eijck, Jan Jaspars, Logic in Action, an
open course and e-book inhttp://www.logicinaction.org/, 2016
32
IF3062 SOCIAL NETWORK ANALYSIS LTPC
3 003
UNIT I INTRODUCTION 9
Social Network Analysis: Definition and Features – The Development of Social Network Analysis –
Basic Graph Theoretical Concepts of Social Network Analysis – Ties, Density, Path, Length,
Distance, Betweenness, Centrality, Clique – Electronic Sources for Network Analysis – Electronic
Discussion Networks, Blogs and Online Communities, Web-based Networks – Applications of
Social Network Analysis.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Understand basic principles behind network analysis algorithms and developpractical
skills in network analysis.
CO2: Model and represent knowledge for social semantic Web.
CO3: Apply data mining techniques on social networks.
CO4: Use extraction and mining tools for analyzing Social networks.
CO5: Develop secure social network applications.
CO6: Develop personalized visualization for Social networks.
33
REFERENCES:
1. Peter Mika, “Social Networks and the Semantic Web”, Springer, 2007.
2. Borko Furht, “Handbook of Social Network Technologies and Applications”, Springer,2010.
3. Song Yang, Franziska B. Keller, Lu Zheng, “Social Network Analysis: Methods and
Examples”, Sage Publication, 2016.
4. GuandongXu, Yanchun Zhang, Lin Li, “Web Mining and Social Networking
Techniques and Applications”, Springer, 2011.
5. Max Chevalier, Christine Julien, Chantal Soulé-Dupuy, “Collaborative and Social
Information Retrieval and Access: Techniques for Improved User Modelling”, IGI Global,
2009.
6. John G. Breslin, Alexandre Passant, Stefan Decker, “The Social Semantic Web”, Springer,
2009.
7. John Scott, Peter J. Carrington, “The SAGE Handbook of Social Network Analysis”, Sage
Publication, 2011.
34
Dialogue Management Strategies, Natural Language Generation. UX design, APIs and SDKs,
Usage of Conversational Design Tools. Introduction to popular chatbot frameworks – Google
Dialog flow, Microsoft Bot Framework, Amazon Lex, RASA Channels: Facebook Messenger,
Google Home, Alexa, WhatsApp, Custom Apps. Overview of CE Testing techniques, A/B Testing,
Introduction to Testing Frameworks - Botium /Mocha ,Chai. Security & Compliance – Data
Management, Storage, GDPR, PCI.
REFERENCES:
1. Michael McTear, “Conversational AI: Dialogue Systems, Conversational Agents, and
Chatbots”, Second Edition, Moran and Claypool Publishers, 2020.
2. Cathy Pearl, “Designing Voice User Interfaces: Principles of Conversational Experiences”,
O’REILLY, 2016.
35
IF3002 WIRELESS SENSOR NETWORKS AND PROTOCOLS LTPC
3 024
PRACTICAL EXERCISES: 30
1. Simulate a WSN using MatLab with a 'n' number of nodes and implement data aggregation.
2. Create a WSN and compute the distance between the nodes deployed
3. Simulate an geographical routing protocol using Omnet++
4. Build a WBAN hardware prototype for an health monitoring application using Bluetooth
connectivity
5. Deploy an WBAN in hub and spoke model extend the network using Zigbee modules
6. Create WSN model to deploy data centric routing protocols using ns-3
7. Explore Contiki OS and COOJA IDE to simulate a real world application
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Understand different types of sensors, their actuators and the architecture of motes.
CO2: Design a WBAN using different networking concepts and hardware interfaces.
CO3: Understand and apply data centric computing in wireless sensor networks.
36
CO4: Apply appropriate localization techniques for different scenarios.
CO5: Manage sensor networks by synchronizing the time, locating and tracking objects.
CO6: Carry out experiments in simulators and real sensors.
REFERENCES:
1. Mohammed A. Matin, “Wireless Sensor Networks: Technology and Protocols”, InTech,
2012
2. Holger Karl, Andreas Willig, “Protocols and Architectures for Wireless Sensor Networks”,
John Wiley, 2011.
3. Robert Faludi, “Building Wireless Sensor Networks”, O‘Reilly Media, 2011.
4. Feng Zhao, Leonidas Guibas, “Wireless Sensor Networks”, Morgan Kaufmann, 2004 5.
Bob Tucker, “Wireless Sensor Networks: Signals and Communication Technology”, NY
Research Press, 2015
5. Al-Turjman, Fadi. Internet of nano-things and wireless body area networks (WBAN). CRC
Press, 2019.
6. Mehmet R. Yuce, Jamil Khan , Wireless Body Area Networks: Technology,
Implementation, and Applications‖,CRC press,2012.
37
UNIT IV MEMORY HIERARCHY DESIGN 9
Introduction - Optimizations of Cache Performance - Memory Technology and Optimizations –
Name Mapping Implementations - Virtual Memory and Virtual Machines - Design of Memory
Hierarchies - Case Studies.
PRACTICAL EXERCISES: 30
1. Write a MIPS program for a simple application in MARS simulator and analyse the
possibility of parallel execution.
2. Write a MIPS code to explore string based operation
3. Explore the different system call in MARS simulator for the RISC code execution
4. Consider a RISC code and simulate a compiler based static scheduling of instruction
5. Consider a RISC code and simulate(PDIWeb) instruction dynamic scheduling
6. Explore CodeApeel to simulate Pipeline Dependencies
7. Consider a RISC code and simulate(PDIWeb) instruction dynamic scheduling
8. Write a CUDA program for simple SIMD application
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Compare and evaluate the performance of various architectures.
CO2: Design a coherent and consistent memory system for multiprocessor.
CO3: Analyze the requirements of large systems to select and build the right infrastructure
CO4: Design and analyze memory and interconnection system for processor.
CO5: Distinguish and model the multiprocessor architecture styles.
CO6: Point out the hazards present in a pipeline and suggest remedies
REFERENCES:
1. John L. Hennessey and David A. Patterson, “Computer Architecture – A quantitative
approach”, Morgan Kaufmann / Elsevier, sixth edition, 2017.
2. Richard Y. Kain, “Advanced Computer Architecture a Systems Design Approach”, PHI,
2011.
3. Hwang, Kai, A. Ramachandran, and R. Purushothaman. Advanced computer architecture:
parallelism, scalability, programmability. Vol. 199. New York: McGraw-Hill, 1993.
38
IF3004 VIRTUALIZATION LT PC
3 02 4
UNIT V APPLICATIONS 9
Understanding availability: Increasing availability, protecting a virtual machine, protecting multiple
virtual machines, protecting data centers-Understanding applications in a virtual machine: virtual
infrastructure performance capabilities, deploying applications in a virtual environment,
understanding virtual appliances and vApps, Openstack and containers.
PRACTICAL EXERCISES: 30
1. installation of various hypervisors and instantiation of VMs with image file using open source
hypervisors such as Virtual Box, VMWare Player, Xen and KVM.
2. Simple application for communications across VMs using VMware
3. Installation of OpenStack.
4. Creation of VMs and installing applications and executing simple programs in OpenStack.
5. Implementing windows and linux virtual file systems.
6. Creation of simple network topology using open source network virtualization tools (like
mininet and others).
7. Building microsoft and Linux virtual machine clusters
8. Implementation of various scheduling mechanisms using an open source cloud simulator.
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Analyse the virtualization concepts and Hypervisor
CO2: Work with virtual machines on windows and linux.
CO3: Setup, Configure and manage virtual storage with RAID and Intelligent storage systems.
39
CO4: manage networks for VM and additional devices in virtual machine
CO5: gain knowledge on availability and deploy application VM environments.
CO6: Apply the Virtualization for real-world applications and Experiment with the VM with
various software
REFERENCES:
1. Matthew Portnoy,”virtualization essentials” second edition, sybex 2016.
2. Chris Wolf, Erick M. Halter, “Virtualization: From the Desktop to the Enterprise”, APress,
2005.
3. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and
Processes”, Elsevier/Morgan Kaufmann, 2005.
4. David Marshall, Wade A. Reynolds, “Advanced Server Virtualization: VMware and
Microsoft Platform in the Virtual Data Center”, Auerbach Publications, 2006.
PRACTICAL EXERCISES: 30
1. Introduction to Linux and shell programming. (4 hours)
2. Write a program to implement a distributed chat server using TCP socket.
3. Write a program to implement client server RPC and client server based program using RMI.
4. Write a multi threaded client server program.
5. Write a program to simulate the functioning of lamports logical clock and lamports vector
clock.
6. Write a program to implement Christian’s algorithm and Berkeley algorithm.
7. Write a program to check grep and pipe commands in FreeBSD.
8. Write a program to do file permission and directory file permission in free BSD.
9. Write a program to building multi-threaded and multi-process application.
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Articulate the main concepts, key ideas, strengths and limitations of operating systems.
CO2: Analyze the structure and basic architectural components of OS.
CO3: Have an understanding of high-level OS kernel structure.
CO4: Used gained insight into hardware-software interactions for compute and I/O.
CO5: Acquire practical skills in system tracing and performance analysis.
CO6: Explore research ideas in system structure and behaviour.
REFERENCES:
1. Mukesh Singhal, Niranjan G. Shivaratri, “Advanced Concepts in Operating Systems –
Distributed, Database, and Multiprocessor Operating Systems”, Tata McGraw-Hill, 2001.
2. Abraham Silberschatz, Peter Baer Galvin, Greg Gagne, “Operating System Concepts”,
Ninth Edition, John Wiley, 2012.
3. Andrew S. Tanenbaum, “Modern Operating System”, Third Edition, Prentice Hall, 2008.
4. Rajib Mall, “Real-Time Systems: Theory and Practice”, Pearson Education, 2006.
5. H. M. Deitel, P. J. Deitel, D. R. Choffnes, “Operating Systems”, Pearson Education, 2004.
6. Neil Smyth, “iPhone Ios 4 Development Essentials – Xcode”, Fourth Edition, Payload
Media, 2011.
7. Neil Smyth, “Android 4.4 for App Development Essentials”, Payload Media, 2014.
41
PO1 PO2 PO3 PO4 PO5 PO6
CO1 2 2 2 1 1 2
CO2 1 2 3 1 1 1
CO3 2 2 3 1 1 1
CO4 1 2 3 2 1 1
CO5 1 2 2 3 1 1
CO6 3 2 3 3 2 1
PRACTICAL EXERCISES: 30
1. Implement Simple Programs like vector addition in TensorFlow.
2. Implement a simple problem like regression model in Keras.
3. Implement a perceptron in TensorFlow/Keras Environment.
4. Implement a Feed-Forward Network in TensorFlow/Keras.
5. Implement an Image Classifier using CNN in TensorFlow/Keras.
6. Implement a Transfer Learning concept in Image Classification.
7. Implement an Autoencoder in TensorFlow/Keras.
8. Implement a SimpleLSTM using TensorFlow/Keras.
9. Implement an Opinion Mining in Recurrent Neural network.
10. Implement an Object Detection using CNN.
11. Mini Project
TOTAL: 75 PERIODS
42
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Understand the role of Deep learning in Machine Learning Applications.
CO2: To get familiar with the use of TensorFlow/Keras in Deep Learning Applications.
CO3: To design and implement Deep Learning Applications.
CO4: Critically Analyse Different Deep Learning Models in Image Related Projects.
CO5: To design and implement Convolutional Neural Networks.
CO6: To know about applications of Deep Learning in NLP and Image Processing.
REFERENCES:
1. Ian Good Fellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2017.
2. Francois Chollet, “Deep Learning with Python”, Manning Publications, 2018.
3. T.V.Geetha and S.Sendhilkumar, Machine Learning: Concepts,Techniques and
Applications, 1 st Edition, CRC Press, Taylor and Franics, 2023.
4. Phil Kim, “Matlab Deep Learning: With Machine Learning, Neural Networks and
Artificial Intelligence”, Apress , 2017.
5. Jon Krohn,” Deep Learning Illustrated: A Visual, Interactive Guide to Artificial Intelligence,”
Addison-Wesley, 2020.
6. Andrew Glassner, “Deep Learning – A visual Approach,” No Starch Press, 2021.
UNIT I INTRODUCTION 9
Introduction to Mobile Computing – Characteristics and benefits – Mobile Software Engineering –
Mobile application development Environment –– Application models – Infrastructure and managing
resources – Mobile device profiles – Frameworks and tools.
PRACTICAL EXERCISES: 30
1. Install and configure java development kit (JDK), android studio and android SDK.
2. Develop an application that uses GUI components, fonts and colors.
3. Design an application that uses Layout Managers, Event listeners, Event handling and push
notification in Android.
4. Build a simple native calculator application to do simple arithmetic operations.
5. Create animations and graphical primitives in Android environment.
6. Develop an application that makes use of SQL Lite mobile database.
7. Develop an application that makes use of internet for communication using Firebase to send
SMS and E-Mail services.
8. Implement an android application that writes data into the SD card and makes use of
Notification Manager.
9. Develop a native application that uses Location based services such as GPS tracking, geo
fencing, and activity recognition using Google play services.
10. Implement simple gaming application using open source tools like flutter or Unity.
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Design the right user interface for mobile application
CO2: Implement mobile application using UI toolkits and frameworks
CO3: Design mobile applications that is aware of the resource constraints of mobile devices
CO4: Develop web based mobile application that accesses internet and location data
CO5: Implement android application to use telephony for SMS communication
CO6: Implement android application with multimedia support
REFERENCES:
1. Reto Meier, Professional Android 4 Application Development, Wiley India Pvt Ltd, 2012.
2. Zigurd Mednieks, Laird Dornin, G, Blake Meike and Masumi Nakamura, Programming
Android, O‟Reilly, 2011.
3. Alasdair Allan, iPhone Programming, O‟Reilly, 2010.
4. Reza B'Far, "Mobile Computing Principles: Designing and Developing Mobile Applications
with UML and XML", Cambridge Press University, 2009.
5. Neil Smyth, “iPhone iOS 4 Development Essentials – Xcode”, 4 Edition, Payload media,
2011.
6. Ben Shneiderman and Catherine Plaisant, “Designing the User Interface: Strategies for
Effective Human Computer Interaction”, Addison– Wesley, 5th Edition, 2009.
44
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 1 3 3 1 1
CO2 2 1 3 2 1 1
CO3 3 1 2 3 1 1
CO4 2 1 3 2 1 1
CO5 3 1 2 3 1 1
CO6 3 1 3 3 1 1
PRACTICAL EXERCISES: 30
1. Construct the simple blockchain based application to store and retrieve the crypto-
currencies.
2. Create the wallet to send the digital currencies from one account to another account.
45
3. Understand the technology components of Blockchain and how it works behind – the scenes.
4. Be aware of different approaches to developing decentralized applications.
5. Perform bitcoin transactions using Python - bitcoinlib.
6. Understand the Bitcoin and its limitations by comparing with other alternative coins.
7. Develop the environment for Ethereum by using Ganache.
8. Create the nodes on Ethereum blockchain and mine the blockchain.
9. Establish deep understanding of the Ethereum model, its consensus model and code
execution.
10. Learn Solidity programming language and develop simple Ethereum based applications.
11. Build the decentralized app and deploy it to provide Ethereum environment.
12. Build a simple application using hyperledger in blockchain environment.
13. Understand the architectural components of a Hyperledger and its development framework.
14. Design a smart contract and test it in a Ethereum environment.
15. Develop a block chain based applications which is suitable for your online shopping services.
16. Aware of the Alternative blockchains and emerging trends in blockchain.
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Understand the technology components of Blockchain and how it works behind-the scenes.
CO2: Aware of different approaches to developing decentralized applications.
CO3: Understand the Bitcoin and its limitations by comparing with other alternative coins.
CO4: Establish deep understanding of the Ethereum model, its consensus model, code
execution.
CO5: Understand the architectural components of a Hyperledger and its development
framework.
CO6: Come to know the Alternative blockchains and emerging trends in blockchain.
REFERENCES:
1. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology, Decentralization, and
Smart Contracts Explained”, Second Edition, Packt Publishing.
2. Arshdeep Bahga, Vijay Madisetti, “Blockchain Applications: A Hands-On Approach”, VPT,
2017.
3. Andreas Antonopoulos, Satoshi Nakamoto, “Mastering Bitcoin”, O’Reilly Publishing, 2014.
4. Roger Wattenhofer, “The Science of the Blockchain” CreateSpace Independent Publishing
Platform, 2016.
5. A. Narayanan, J. Bonneau, E. Felten, A. Miller, S. Goldfeder, “Bitcoin and Cryptocurrency
Technologies: A Comprehensive Introduction”, Princeton University Press, 2016.
6. Alex Leverington, “Ethereum Programming”, Packt Publishing, 2017.
UNIT I INTRODUCTION 9
Evolution of the Internet – Things/Real World Objects – Smart Objects – Technology enablers of
IoT – Device layer – Role of WSNs in IoT - Edge/Fog Layer – Role of Cloud in IoT – Possible IoT
reference models - M2M Communication – Domain Specific IoTs – Complexity and Levels of IoT
based Systems – IIoT and Industry 4.0
PRACTICAL EXERCISES: 30
1. Develop a BLINK sketch in Arduino.
2. Develop an Arduino sketch that repeats an LED to glow brightly, decrease the brightness,
switches off the LED, increases the brightness and LED glows with maximum intensity (a
sketch for fading).
3. Develop an Arduino sketch that takes sensor readings for five seconds during the startup,
and tracks the highest and lowest values it gets. These sensor readings during the first five
seconds of the sketch execution define the minimum and maximum of expected values for
the readings taken during the loop (a sketch for calibrating a sensor).
4. Develop an Arduino sketch that reads the value of a variable resistor as an analog input and
changes blink rate of the LED.
5. Develop an Arduino sketch to use a piezo element to detect the vibration.
6. Develop a Python program to control an LED using Rapberry Pi.
7. Develop a Python program to interface an LED with a switch using Rapberry Pi.
8. Miniproject.
TOTAL: 75 PERIODS
47
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Understand the evolution of the Internet and the impact of IoT in the society.
CO2: Design portable IoT devices using Arduino IDE/ Raspberry Pi with Python.
CO3: Apply appropriate protocols in various parts of IoT based systems.
CO4: Use cloud offerings and big data tools in IoT based systems.
CO5: Implement Map-Reduce based programs using Apache frameworks.
CO6: Design, deploy and manage complex IoT based systems.
REFERENCES:
1. Arshdeep Bahga, Vijay Madisetti, “Internet of Things – A Hands-On Approach”, Universities
Press, 2015.
2. Manoel Carlos Ramon, “Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino
Projects for Linux Programmers”, Apress, 2014.
3. David Hanes, Gonzalo Salguerio, Patrick Grossetete, Rob Barton, Jerome Henry, “IoT
Fundamentals: Networking Technologies, Protocols, and Use Cases for Internet of Things”,
Cisco Press, 2017. 4. Perry Lea, “Internet of Things for Architects”, PACKT, 2018
4. Andy King, “Programming the Internet of Things: An Introduction to Building Integrated,
Device to Cloud IoT solutions”, O’REILLY’, 2021
UNIT I INTRODUCTION 9
Presentation - Explorative Analysis-Confirmative Analysis-Mental Model-Scientific Visualization-
Reference Model-Designing a Visual Application-Linear Data Representation-Perception-Issues.
48
UNIT IV INTERACTION TYPES 9
Interaction Concepts and Techniques – Problem of Information overload – Interaction Types-
Human Computer Interaction-Norman’s Action Cycle-Interaction for: Information Visualization,
Navigation, Models, Involuntary, Interactive Medical Application- Tactile Maps for Visually
Challenged People.
PRACTICAL EXERCISES: 30
1. Representing data in different visualization chart ( bar, pie, etc) R language
2. Exploring various Visualization tools (Open Source)
3. Implementation of the interactive forms.
4. Implementing various types of data representation.
5. Creating Interoperable Web Visualization Components using Candela tool.
6. Implementing Line and Stacked charts with Labels and Notes using Data wrapper tool.
7. Creating Interactive Charts using Google Chart tool.
8. Working with animation using Chartist.js tool.
9. Analyzing data in Tableau.
10. Creating Mobile Friendly Interactive Maps using Leaflet tool.
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Understand the concepts and techniques used in Visualization Techniques.
CO2: Implement different techniques of information representation.
CO3: Implement various presentations of information.
CO4: Apply different interaction types used to present information.
CO5: Design and implement effective Visualization.
CO6: Create and evaluate interactive data Visualization real-time problem.
REFERENCES:
1. O.Ward, Georges Grinstein and Daniel Keim,” Interactive Data Visualization Foundations,
Techniques, and Applications”, Second Edition, A K Peters,2021.
2. Robert Spence, “Information Visualization An Introduction”, Third Edition, Pearson
Education, 2014.
3. Colin Ware, “Information Visualization Perception for Design”, Third Edition, Morgan
Kaufmann Publishers, 2012.
4. Jason Gregory, “Game Engine Architecture”, Third Edition, A K Press, 2015.
5. Riccardo Mazza, “Introduction to Information Visualization”, Springer.
6. Joerg Osarek, “Virtual Reality Analytics”, Gordon’s Arcade, 2016
49
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 1 3 3 1 1
CO2 3 1 3 3 1 1
CO3 3 1 3 3 1 1
CO4 3 1 3 3 1 1
CO5 3 1 3 3 1 1
CO6 3 1 3 3 1 1
PRACTICAL EXCERCISES: 30
50
5. Implementation of Fourier and Wavelet Transforms in Matlab/Octave.
6. Implementation of SIFT, SURF in Matlab/Octave/SciLab/opencv.
7. Implementation of PCA in Matlab/Octave/opencv.
8. Implementation of Image Classifier using SVM in Matlab/Octave/ OpenCV..
9. Implementation of Image Clustering algorithms in Matlab/Octave/opencv.
10. Implementation of Feature extraction in images using Matlab/Octav/opencv
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Implement basic image processing operations.
CO2: Apply and develop new techniques in the areas of image enhancement and frequency
transforms
CO3: To restore images from noise and to extract edges and boundaries.
CO4: Understand the image segmentation algorithms and Extract features from images.
CO5: Apply classifiers and clustering algorithms for image classification and clustering.
CO6: Design and develop an image processing application that uses different concepts of
image processing.
REFERENCES:
1. Rafael Gonzalez, Richard E. Woods, “Digital Image Processing”, Fourth Edition, Pearson
Education, 2018.
2. S. Sridhar, “Digital Image Processing”, Second Edition, Oxford University Press, 2016.
3. Forsyth and Ponce, “Computer Vision – A Modern Approach”, Second Edition, Prentice Hall,
2011.
4. Anil K. Jain, “Fundamentals of Digital Image Processing”, PHI, 2011.
5. Milan Sonka, Vaclav Hlavac, Roger Boyle, “Image Processing Analysis and Machine Vision”,
Fourth Edition, Cengage India, 2017
51
UNIT II INTERACTION DESIGN IN MR 9
Integrating Framework For MR –Embedded MR environment - Tangible Interaction – Auditory-
Induced presence – Exertion in MR systems – Mixed Interaction in MR
PRACTICAL EXERCISES: 30
1. Design and implement an interactive MR application with gesture or motion controller input
for interacting with virtual objects.
2. Create a virtual tour MR application for exploring historical sites or museum exhibits with
informative content.
3. Develop an AR experience using marker-based tracking for scanning physical markers to
reveal interactive virtual content.
4. Design and implement a collaborative MR application for multiple users to interact and
collaborate in a shared virtual space.
5. Create an MR puzzle game where users solve virtual puzzles and challenges using
interactions with virtual objects and the real-world environment.
6. Develop an MR application for visualizing and interacting with virtual product models in the
real-world environment.
7. Design an AR educational experience that reveals interactive 3D models and additional
information when scanning textbook pages or learning materials.
8. Create an immersive MR storytelling experience where users interact with characters and
objects to progress through a narrative.
9. Develop an MR training simulation for practicing specific tasks or skills in a safe and
controlled environment.
10. Design and implement an AR wayfinding application for overlaying navigation instructions
and points of interest onto the real-world environment.
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Demonstrate knowledge and understanding of VR, AR, and MR concepts, technologies,
and applications.
CO2: Apply design principles and considerations specific to Mixed Reality platforms.
CO3: Understand interaction design principles in Mixed Reality.
CO4: Apply software design and implementation skills for Mixed Reality systems.
CO5: Demonstrate knowledge of the intersection of Mixed Reality and Human-Robot Interaction
(HRI).
52
CO6: Analyze and evaluate the integration of Mixed Reality technologies and principles into
real-world applications
REFERENCES:
1. O'Connell, Kharis, “Designing for Mixed Reality”, O'Reilly Media, Inc, 2016.
2. Dubois E, Gray P, Nigay L, “The engineering of mixed reality systems” Springer Science &
Business Media, 2009.
3. Wang, Xiangyu, “Mixed reality and human-robot interaction”. Vol. 47. Springer Science &
Business Media, 2011.
4. Benyon, D, “Designing Interactive Systems: A Comprehensive Guide to HCI, UX and
Interaction Design”. Pearson Education Limited, 2013
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 - 2 3 3 -
CO2 3 - 2 3 3 -
CO3 2 - 3 3 3 -
CO4 3 1 3 3 3 1
CO5 3 - 2 3 3 -
CO6 3 2 3 3 3 2
53
PRACTICAL EXERCISES: 30
1. Implement matrix multiplication using CUDA. Experiment with different matrix sizes and
kernel launch options and compare the performance. (4 hours )
2. Implement vector reduction using CUDA, and check output with CUDA profiler.
3. Implement matrix multiplication with tiling and shared memory.
4. Implement various performance tuning techniques for matrix multiplication.
5. Implement matrix multiplication using OpenCL.
6. Implement vector reduction using OpenCL.
7. Implement graph traversal using CUDA
8. Implement image processing algorithms using CUDA
9. Experiment with advanced features such as dynamic parallelism
10. Mini project: Choose an application and implement using GPU and do performance analysis.
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Describe GPU Architecture
CO2: Write programs using CUDA, identify issues and debug them
CO3: Program GPU using OpenCL
CO4: Program GPU using CUDA and PyCUDA
CO5: Given a problem, identify efficient parallel programming patterns to solve it
CO6: Compare different GPU programming paradigms
REFERENCES:
1. David B. Kirk, Wen-mei W. Hwu, Programming Massively Parallel Processors – A Hands-
on Approach, Fourth Edition, Morgan Kaufmann, 2022.
2. Gerassimos Barlas, Multicore and GPU Programming: An Integrated Approach, Second
Edition, Morgan Kaufmann, 2022.
3. Brian Tuomanen, Hands-On Gpu Programming with Python and CUDA: Explore high-
performance parallel computing with CUDA, Packt Publishing Limited, 2018.
4. Shane Cook, “CUDA Programming: A Developer’s Guide to Parallel Computing with
GPUs”, Morgan Kaufmann, 2013.
5. David R. Kaeli, Perhaad Mistry, Dana Schaa, Dong Ping Zhang, “Heterogeneous
Computing with OpenCL 2.0”, Morgan Kauffman, 2015.
6. Nicholas Wilt, “CUDA Handbook: A Comprehensive Guide to GPU Programming”, Addison
Wesley, 2013.
7. Jason Sanders, Edward Kandrot, “CUDA by Example: An Introduction to General Purpose
GPU Programming”, Addison Wesley, 2011.
8. http://www.nvidia.com/object/cuda_home_new.html.
9. http://www.openCL.org.
PRACTICAL EXERCISES: 30
1. Implementing a Tier – 1, Tier – 2 and Tier – 3 programs
2. UML diagrams for a business application
3. Implementation of SOAD process
4. Implementation of Strawman architecture for loan application
5. Service Oriented Model using Java EE Enterprise Application
6. Design activity services for banking application
7. Design data services for banking application
8. Design client services for banking application
9. Virtual implementation of micro services in cloud environment
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Analyze and design SOA based solutions.
CO2: Understand the basic principles of service orientation.
CO3: Implement and analyze Java EE Enterprise Application
55
CO4: Understand the technology underlying service design.
CO5: Implement SOA with Micro Services applications.
CO6: Classify and make reasoned decision about the adoption of different SOA
platforms.
REFERENCES:
1. Shankar Kambhampaty, “Service-oriented Architecture & Microservice Architecture: For
Enterprise, Cloud, Big Data and Mobile”, Third Edition, Wiley, 2018.
2. Practical Microservices Architectural Patterns, Event-Based Java Microservices with Spring
Boot and Spring Cloud, Binildas Christudas, APress, 2019.
3. Thomas Erl, “Service Oriented Architecture: Concepts, Technology, and Design”, Pearson
Education, 2005.
4. Practical Event-Driven Microservices Architecture (Building Sustainable and Highly
Scalable Event-Driven Microservices), Hugo Filipe Oliveira Rocha, Apress, 2022.
5. Nicolai M. Josuttis, “SOA in Design – The Art of Distributed System Design”, O'REILLY
publication, 2007.
6. Raj Balasubramanian, Benjamin Carlyle, Thomas Erl, Cesare Pautasso, “SOA with REST
– Principles, Patterns & Constraints for Building Enterprise Solutions with REST”, Prentice
Hall, 2013.
56
UNIT III FILE STORAGE AND DATA RECOVERY 9
Definition and Cardinal Rules, Data Acquisition and Authentication Process, Windows Systems-
FAT12, FAT16, FAT32 and NTFS, UNIX file Systems, mac file systems, computer artifacts,
Internet Artifacts, OS Artifacts and their forensic applications, Forensic analysis of File systems,
Initial Response and Volatile Data Collection from Windows System - Initial Response and Volatile
Data Collection from UNIX System – Forensic Duplication – Tools – Discover of Electronic
Evidence – Identification of Data – Reconstructing Past Events - Networks
PRACTICAL EXERCISES: 30
1. Demonstrate some of the mechanisms used by malicious attackers as well as forensic
experts to disrupt computer networks and manipulate information access.
2. Demonstrate FTK Imager to access data's evidence. It is used to quickly preview and create
a forensically sound image of the disk if the preview warrants such action.
3. Demonstrate how data can be modified within a file or hidden on a disk without the data
being saved as a file.
a. Hex Workshop v4.23 hex editor (Shareware download from www.hexworkshop.com).
b. MD5Hash (Freeware download from www.digitaldetective.co.uk/freetools/md5.asp).
c. Text editor (Notepad is good enough).
4. Demonstrate how an attacker could exploit a machine and obtain access to a server with a
filtered port by piping another unfiltered port.
a. Quick 'n Easy FTP Server (Freeware download from http://www.pablovandermeer.nl).
b. FPIPE (Freeware download from http://www.foundstone.com)
c. FPORT (Freeware download from www.digitaldetective.co.uk/freetools/md5.asp).
5. Show how the encrypted Internet Explorer cache may be viewed using some freely
available tools.
a. Pasco (Freeware download from http://www.foundstone.com).
b. Galleta (Freeware download from http://www.foundstone.com).
6. Demonstrate the typical use of steganography
7. Demonstrate mobile forensics with software:
a. BitPim.
b. Mobile Phone Examiner (MPE+).
c. Trace an Email.
d. eMailTrackerPro.
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Recognize attacks on systems.
57
CO2: Design a counter attack incident response and incident-response methodology.
CO3: Illustrate the methods for data recovery, evidence collection and data seizure.
CO4: Understand network and email attacks and forensic investigation with tools.
CO5: Use Forensic tools and collect evidences of a computer crime.
CO6: Analyze various image encryption/decryption, steganography and fraud in image.
REFERENCES:
1. Kevin Mandia, T. Jason Luttgens, Matthew Pepe, “Incident Response and Computer
Forensics”, Tata McGraw-Hill, 2014.
2. Bill Nelson, Amelia Philips, Christopher Stueart, “Guide to Computer Forensics and
Investigations”, Cengage Learning, 2018.
3. John R. Vacca, “Computer Forensics”, Firewall Media, 2009.
4. Eoghan Casey, “Handbook of Computer Crime Investigation's Forensic Tools and
Technology”, Academic Press, 2001.
5. Davide Cowen, “Computer Forensics: A Beginners Guide”, McGraw-Hill Education, 2011.
6. Rafay Baloch, “Ethical Hacking and Penetration Testing Guide”, Auerbach Publications,
2014
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 3 - 2 3 -
CO2 3 3 3 2 3 2
CO3 3 3 3 - 3 -
CO4 3 2 3 2 - -
CO5 2 2 2 - 3 3
CO6 3 3 3 2 2 2
PRACTICAL EXERCISES: 30
Installation of Matlab / Octave / Scilab Environments.
1. Explore the Octave / Scilab open-source software.
2. Implement a Matlab/Octave program to
3. Remove the noise present in an image.
4. Implement spatial filters to enhance the quality of the image.
5. Extraction of intensity features from an image
6. Extraction of features from the face, such as fiducial points.
7. Extraction of features from Iris images.
8. Read and playing of an audio file.
9. Extraction of audio features.
10. To extract keystroke features.
11. To match two images.
12. To match two signatures using template matching.
TOTAL: 75 PERIODS
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Implement basic biometrics related algorithms
CO2: Familiar with the use of MATLAB and its equivalent open source environments
CO3: Design and implement industrial applications that incorporates different
concepts of biometrics
CO4: Critically analyze different approaches to implement mini projects in industrial
environment and in security related projects
CO5: To know about Biometric standards
CO6: To know about Biometrics Application development
REFERENCES:
1. Anil K. Jain, Arun A. Ross and Karthik Nandakumar, "Introduction to Biometrics", Springer,
2011.
2. James L. Wayman, Anil K. Jain, Davide Maltoni, and Dario Maio, Biometric Systems:
Technology, Design and Performance Evaluation, Springer, 2004.
3. Samir Nanavati, Michael Thieme, Raj Nanavati Biometrics, " Identity Verification in a
Networked World", John WILEY and Sons, 2002.
4. Stan Z. Li and Anil K. Jain, 'Handbook of Face Recognition', 2005.
59
CO3 3 3 2 3 3 3
CO4 3 3 3 3 2 2
CO5 2 2 3 2 2 2
CO6 3 3 2 2 3 3
UNIT II RASTERIZATION 9
Lines-Filled Triangles-Shaded Triangles-Perspective Projection-Describing and Rendering a
Scene-Clipping-Hidden Surface Removal-Shading-Textures-Extending the Rasterizer.
PRACTICAL EXERCISES: 30
1. Implementation of OpenGL and Blender
2. Creating simple objects in OpenGL applying color and pattern
3. Creating object in OpenGL and applying transformation to it.
4. Creating interactive Scene using OpenGL.
5. Implementing the concept of Ray tracing in OpenGL.
6. Developing Human Characters using Blender.
7. Developing Environmental Effects using Blender.
8. Developing a Speaking Human Avatar and embedding voice to it.
9. Writing Script for a interactive Game of your choice.
10. Developing an interactive animated game.
TOTAL: 75 PERIODS
60
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: Demonstrate the concepts and techniques used in Animation Tool
CO2: Design and implement algorithms and techniques applied to Rendering.
CO3: Design and implement real world effect to scene.
CO4: Understand the basic concept of animation design.
CO5: Apply the mechanics concepts to design animation.
CO6: Create an interactive animation using animation techniques
REFERENCES:
1. Gabriel Gambetta, “Computer Graphics from Scratch” , Np Starch press,2021.
2. Ann Wright, “Animation Writing and Devlopment”, Routledge, 2013.
3. Rick Parent “Computer Animation” Third Edition, Morgan Kaufmann, 2012.
4. Isaac V.Kerlow, The Art of 3D Computer Animation and Effects”, Fourth Edition,Wiley,2009
4.John M.Blain, “The Complete Guide to Blender Graphice”, CRC Press, 2012.
5. Donald D. Hearn, M. Pauline Baker, Warren Carithers, “Computer Graphics with Open GL”,
Fourth Edition, Prentice Hall, 2011.
61