M.TechComputerUnitWise 4
M.TechComputerUnitWise 4
University-Lonere
Syllabus
for
M. Tech. (Computer Engineering)
M. Tech. (Computer Science)
M. Tech. (Computer Science & IT)
M. Tech. (Computer Science & Engg)
w.e.f. July 2017
1
Dr. B. A. Tech. University-Lonere
2
Dr. B. A. Tech. University-Lonere
List of Electives
Elective 1 Elective 2
1. Cloud Computing 1. Intrusion Detection System
2. Game Theory 2. Model Checking
3. Natural Language Processing 3. Artificial Intelligence and Knowledge Reasoning
4. Social Network Analysis 4. High Performance Computing
Elective 3 Elective 4
1. Software Testing 1. Introduction to Cognitive Sciences
2. Algorithms for Big Data 2. Virtual Reality
3. Software Language Engineering 3. Mobile Computing
4. Cryptography and Network 4. Storage Systems
Security
Elective 5:
1. Functional Programming
2. Object Oriented Systems
3. Reinforcement Learning
4. Pattern Recognition
3
Dr. B. A. Tech. University-Lonere
4
Dr. B. A. Tech. University-Lonere
5
Dr. B. A. Tech. University-Lonere
6
Dr. B. A. Tech. University-Lonere
REFERENCES:
1. Optical Networks Control, Bala Rajagopalan, Gerg Bernstein, Debanjan saha.
2. Optical Networks and WDM, Walter J. Goralski, McGraw-Hill 2001.
3. Computer Networks: A System Approach, Larry L. Peterson, Bruce S. Davie, Morgan
Kaufmann.
4. WDM Optical Networks: Concepts, Design and Algorithms, C. Siva Ram Murthy, Prentice Hall
7
Dr. B. A. Tech. University-Lonere
Unit1: Introduction to distributed and cluster computing, Basics of the emerging cloud
computing paradigm, Cloud Benefits (10)
Unit 2: Virtualization concepts and types, KVM, VM Scheduling (8)
Unit 3: Disaster Recovery, Scaling (6)
Unit 4: Cloud security, Regulatory and compliance issues, VM Security Issues (6)
Unit 5: Latest Research Paper Topics (10)
Text Books:
1. Cloud Computing, Michael Miller, Pearson, 2012
2. Cloud Computing: Implementation, Management, and Security, , John Ritting house and James
F.Ransome, CRC Press Taylor and Francis Group, 2009
3. Dan Kusnetzky , “Virtualization: A Manager’s Guide”, 1st Edition ,O’Reilly,2011
4. Tim Mather Cloud Security and Privacy, Oreilly 2015
References:
1. Barrie Sosinsky, “Cloud Computing Bible”, 1 st Edition ,Wiley India Pvt Ltd,2011.
2. Robert Elsenpeter, Toby J. Velte, Anthony T. Velte, “Cloud Computing : A Practical Approach”, 1st
Edition, Tata Mcgraw Hill Education, 2011.
4. Handbook of Cloud Computing , Borko Furht, Armando Escalante , Springer, 2010
8
Dr. B. A. Tech. University-Lonere
9
Dr. B. A. Tech. University-Lonere
Reference Books
1. Martin J. Osborne. An Introduction to Game Theory. Oxford University Press. Indian Edition,
2003.
2. Roger B. Myerson. Game Theory: Analysis of Conflict. Harvard University Press, 1991.
3. Y. Narahari, Dinesh Garg, Ramasuri Narayanam, Hastagiri Prakash.
4. Game Theoretic Problems in Network Economics and Mechanism Design Solutions. Springer,
London, 2009.
NPTEL/Open Course
1. http://lcm.csa.iisc.ernet.in/gametheory/index.html
10
Dr. B. A. Tech. University-Lonere
ASR, Speech Synthesis, HMM and Viterbi, Precision, Recall, F-score, Map, Semantic Relations; UNL;
Unit VI
Towards Dependency Parsing, Universal Networking Language, Semantic Role Extraction, Baum
Welch Algorithm; HMM training.
REFERENCES:
1. Allen, James, Natural Language Understanding, Second Edition, Benjamin/Cumming, 1995.
2. Charniack, Eugene, Statistical Language Learning, MIT Press, 1993.
3. Jurafsky, Dan and Martin, James, Speech and Language Processing, Second Edition, Prentice
Hall, 2008.
4. Manning, Christopher and Heinrich, Schutze, Foundations of Statistical Natural Language
Processing, MIT Press, 1999.
NPTEL Course:
1. Natural Language Processing by Prof. Pushpak Bhattacharyya, IIT Bombay.
11
Dr. B. A. Tech. University-Lonere
REFERENCE:
1. Networks: An Introduction, Oxford University Press, Oxford, 2010.
2. Evolution of Networks, Oxford University Press, Oxford, 2003.
3. The structure and function of complex networks, SIAM Review 45, 167-256, 2003.
4. Statistical mechanics of complex networks, Rev. Mod. Phys., 74(1), 2002.
5. Social Network Analysis for Startup Tsvetovat, 2015 Oreilly.
NPTEL Course:
1. Complex Network : Theory and Application by Prof. Animesh Mukherjee, IIT Kharagpur.
MTCE1105: Intrusion Detection System (Elective 2)
L:3 T:0 P:0 MSE:20 IA:20 ESE:60
Prerequisites:
Unit I
Intruder types, intrusion methods, processes and detection, message integrity and authentication, honey
pots.
Unit II
General IDS model, data mining based IDS, Denning model, data mining framework for constructing
features and models for intrusion detection systems
Unit III
Unsupervised anomaly detection, CV5 clustering, SVM, probabilistic and statistical modeling, general
IDS model and taxonomy, evaluation of IDS, cost sensitive IDS.
12
Dr. B. A. Tech. University-Lonere
NBAD, specification based and rate based DDOS, scans/probes, predicting attacks, network based
anomaly detection, stealthy surveillance detection; Defending against DOS attacks in scout: signature-
based solutions, snort rules.
Unit IV
Host-based anomaly detection, taxonomy of security flaws in software, self-modeling system calls for
intrusion detection with dynamic window size.
Unit V & VI
Secure intrusion detection systems, network security, secure intrusion detection environment, secure
policy manager, secure IDS sensor, alarm management, intrusion detection system signatures, sensor
configuration, signature and intrusion detection configuration, IP blocking configuration, intrusion
detection system architecture
Reference Books
1. Endorf, C., Schultz E. and Mellander J., “Intrusion Detection and Prevention,” McGraw-Hill.
2003
2. Bhatnagar, K., “Cisco Security”, Course Technology. 2002
3. Marchette, D. J., “Computer Intrusion Detection and Network Monitoring: A Statistical
Viewpoint”, Springer. 2001
4. Rash, M., Orebaugh, A. and Clark, G., “Intrusion Prevention and Active Response: Deploying
Network and Host IPS”, Syngress. 2005
5. Cooper, M., Northcutt, S., Fearnow, M. and Frederick, K., “Intrusion Signatures and Analysis”,
Sams. 2001
MTCE1105: Model Checking (Elective 2)
L:3 T:0 P:0 MSE:20 IA:20 ESE:60
Prerequisites: Familiarity with basic algorithms and finite-state machines preferable
Course Contents
Unit I Modeling systems as Finite-state machines, Using the model-checker NuSMV,.
Unit II Linear-time properties for verification, Regular properties – automata over finite words,
Omega-regular properties – automata over infinite words, Model checking omega-regular properties,
13
Dr. B. A. Tech. University-Lonere
14
Dr. B. A. Tech. University-Lonere
REFERENCES:
1. Ronald J. Brachman, Hector J. Levesque: Knowledge Representation and Reasoning, Morgan
Kaufmann, 2004.
2. Deepak Khemani. A First Course in Artificial Intelligence, McGraw Hill Education (India),
2013.
NPTEL Course
15
Dr. B. A. Tech. University-Lonere
NPTEL Course:
1. High Performance Computing by Prof. Mathew Jacob, IISc Bangalore.
16
Dr. B. A. Tech. University-Lonere
Semester II
MTCE1201: Data Science
L:3 T:1 P:0 MSE:20 IA:20 ESE:60
Prerequisites:
Course Contents
Unit I Data Mining Patterns: Cluster Analysis, Anomaly Detection, Association Rules,
Data Mining Sequences:
Unit II Text Mining: Text mining Text Clusters
Unit III Data Analysis: Simple regression, Multiple Regression, Multivariate Regression Analysis,
Robust Regression, Correlation, Clustering.
Unit IV Data Viualization: R graphics, Plotting, Scatter Plots Bar Charts and Plots 3D graphics
Unit V Machine Learning: Data Partitioning Predicting events with machine learning, Supervised and
Unsupervised learning.
Reference Books
1. Dan Toomey, R for Data Science, Packit First Edition Publishing 2014 NPTEL/Open Course
2. Hadley Wickham et al R for Data Science Oreilly 2016
3. Richard Cotton Learning R Oreilly 2013
17
Dr. B. A. Tech. University-Lonere
REFERENCE:
1. Srinivasan Desikan, Gopalaswamy Ramesh, “Software Tesing Principles and Practices”,
18
Dr. B. A. Tech. University-Lonere
Pearson Education.
2. William Perry, “Effective Methods for Software Testing”, John Wiley & Sons, New York, 1995.
MTCE1203 Algorithm for Big Data (Elective3)
L:3 T:1 P:0 MSE:20 IA:20 ESE:60
Prerequisites: Algorithms, probability theory.
Course Contents
Unit I Intro to Probability Theory, Tail bounds with Applications, Markov Chains and Random Walks.
Unit II Randomized Algorithms against an Oblivious Adversary, Pairwise Independence and Universal
Hashing, The Streaming Model, Approximate Counting, Approximate Median.
Unit III Flajolet Martin-Distinct Sampling, Alon-Mattias-Szegedy Sketch, Bloom Filters, Count-min
Sketch, Property Testing Model, Local search and testing connectivity.
Unit IV Enforce and Test Techique: Biclique and Bipartiteness Testing.
Unit V& VI Random Walks and Testing Bipartiteness & Expansion, Regularity Lemma and Testing,
Triangle Freeness, Boolean Functions, BLR test for Linearity.
REFERENCE:
1. Probability and Computing: Randomized Algorithms and Probabilistic Analysis, by
Mitzenmacher and Upfal.
2. Algorithmic and Analysis Techniques in Property Testing, by Dana Ron.
3. Synopses for Massive Data: Samples, Histograms, Wavelets, Sketches, by Graham Cormode,
Minos Garofalakis, Peter J. Haas and Chris Jermaine.
NPTEL Course:
1. Algorithms for Big Data by Prof. John Augustine, IIT Madras.
MTCE1203 Real-Time System (Elective 3)
L:3 T:1 P:0 MSE:20 IA:20 ESE:60
Prerequisites: Programming and Data Structures, Operating Systems, Computer Architecture and
Organization, Computer Communication, and Database Systems.
Course Contents
Unit I Introduction: What is Real Time System?, Application of Real Time System, A Basic Model
of Real Time System, Characteristics of Real Time System, Safety and Relibility, Types of Real-Time
Tasks, Timing Constraints, Modelling Timing Constraints.
19
Dr. B. A. Tech. University-Lonere
Unit II Real-Time Task Scheduling: Concept, Types of real time task and their characteristics, Task
scheduling, Clock-Driven Scheduling, Hybrid Schedulers, Event-driven scheduling, EDF scheduling,
Rate monotonic System, Issue associate with RMA, Issue in using RMA in practical situations.
Unit III Handling Resource Sharing and Dependencies Among Real-Time Tasks: Resource
Sharing Among Real-time Tasks, Priority Inversion, Priority Inheritance Protocol (PIP), Higher Locker
Protocol (HLP), Priority Ceiling Protocol (PCP), Difference types of Priority Inversion under PCP,
Important features of PCP, Some issues in Using A Resource Sharing Protocol.
Unit V Commercial Real-Time Operating Systems: Time Services, Features of Real Time Operating
System, Unix as a Real Time Operating System, UNIX-based Real-Time Operating System, Wndows
as a Real-Time Operating System, POSIX, A Survey of contemporary Real-Time Operating System,
Benchmarking Real-Time System.
REFERENCE:
1. Rajib Mall, "Real-Time Systems: Theory and Practice," Pearson, 2008.
2. Jane W. Liu, "Real-Time Systems" Pearson Education, 2001.
3. Krishna and Shin, "Real-TIme Systems," Tata McGraw Hill. 1999.
NPTEL Course:
1. Real Time Systems by Prof. Rajib Mall, IIT Kharagpur.
20
Dr. B. A. Tech. University-Lonere
way and trapdoor one-way functions, cryptanalysis, attack models, classical cryptography.
Unit II Block ciphers: Modes of operation, DES and its variants, RCS, IDEA, SAFER, FEAL,
BlowFish, AES, linear and differential cryptanalysis. Stream ciphers: Stream ciphers based on linear
feedback shift registers, SEAL, unconditional security.
Unit III Message digest: Properties of hash functions, MD2, MD5 and SHA-1, keyed hash functions,
attacks on hash functions. Public-key parameters: Modular arithmetic, gcd, primality testing, Chinese
remainder theorem, modular square roots, finite fields.
Unit IV Intractable problems: Integer factorization problem, RSA problem, modular square root
problem, discrete logarithm problem, Diffie-Hellman problem, known algorithms for solving the
intractable problems.
Unit V Public-key encryption: RSA, Rabin and EIGamal schemes, side channel attacks. Key exchange:
Diffie-Hellman and MQV algorithms. Digital signatures: RSA, DAS and NR signature schemes, blind
and undeniable signatures.
Unit VI Entity authentication: Passwords, challenge-response algorithms, zero-knowledge protocols.
Standards: IEEE, RSA and ISO standards. Network issues: Certification, public-key infrastructure
(PKI), secured socket layer (SSL), Kerberos. Advanced topics: Elliptic and hyper-elliptic curve
cryptography, number field sieve, lattices and their applications in cryptography, hidden monomial
cryptosystems, cryptographically secure random number generators.
Text Books:
1. Cryptography and Network Security, William Stallings, Prentice Hall of India
2. Cryptography and Network Security, Forouzan, Tata McGraw-Hill
3. Network Security: Private Communication in a Public World, Charlie Kaufman, Prentice Hall Series
NPTEL course
Prof. D. Mukhopadhyay, Cryptography and Network Security.
21
Dr. B. A. Tech. University-Lonere
REFERENCE:
1. Wilson, Robert A., & Keil, Frank C. (eds.), The MIT Encyclopedia of the Cognitive Sciences
(MITECS), MIT Press, 2001 [Primary text; available on Cognet].
2. Bowerman, Melissa and Stephen C. Levinson, Language Acquisition and Conceptual
Development, Cambridge University Press 2001.
3. Sternberg, Robert J., Cognitive Psychology, 4th ed., Cengage Learning India, 2008.
4. Gardenfors, Peter, Conceptual Spaces: The Geometry of Thought, MIT Press, 2000, 317 pages.
MTCE1204 Virtual Reality (Elective 4)
L:3 T:0 P:0 MSE:20 IA:20 ESE:60
Prerequisites: Basic maths and exposure to engineering.
Unit I
Introduction: Course mechanics, Goals and VR definitions, Historical perspective, Birds-eye
view(general), Birds-eye view(hardware), Birds-eye view(software), Birds-eye view(sensation and
perception).
Unit II
Geometry of Virtual Worlds: Geometric modeling, Transforming models, Matrix algebra and 2D
rotations, 3D rotations and yaw, pitch, and roll, Axis-angle representations, Quaternions, Converting
and multiplying rotations, Homogeneous transforms, The chain of viewing transforms, Eye transforms,
Canonical view transform, Viewport transform.
22
Dr. B. A. Tech. University-Lonere
Unit III
Light and Optics: Three interpretations of light, Refraction, Simple lenses, Diopters, Imaging,
properties of lenses, Lens aberrations, Optical system of eyes.
Visual Physiology: Photoreceptors, Sufficient resolution for VR, Light intensity, Eye movements, Eye
movement issues for VR, Neuroscience of vision.
Unit IV
Visual Perception: Depth perception, Motion perception, Frame rates and displays.
Tracking Systems: Overview, Orientation tracking, Tilt drift correction, Yaw drift correction, Tracking
with a camera, Perspective n-point problem, Filtering, Lighthouse approach.
Unit V
Visual Rendering: Visual Rendering-Overview, Shading models, Rasterization, Pixel shading, VR-
specific problems, Distortion shading, Post-rendering image warp.
Unit VI
Audio: Physics and physiology, Auditory perception, Auditory localization, Rendering, Spatialization
and display, Combining other senses.
REFERENCE:
1. http://msl.cs.uiuc.edu/vr/
2. George Mather, Foundations of Sensation and Perception: Psychology Press; 2nd edition, 2009.
3. Peter Shirley, Michael Ashikhmin, and Steve Marschner, Fundamentals of Computer Graphics,
A K Peters/CRC Press; 3 edition, 2009.
NPTEL Course:
1. Virtual Reality by Prof. Steven LaValle, IIT Madras.
23
Dr. B. A. Tech. University-Lonere
Course Contents
Unit I Introduction to mobile computing, installing of required software and preparing the working
environment, creatingyour first Android Application.
Unit II Layouts, Views, Resources.
Activities, Intents.
Background tasks, Connecting to the Internet.
Fragments, Preferences.
Unit III User Interaction – input, menu items, custom views.
User Experience – themes and styles, material design, adaptive layouts, accessibility, localization,
debuggingthe UI.
Unit IV Storing Data, SQLite database.
Sharing Data, content resolvers and providers, loaders to load data.
Unit V Services, background work, alarms, broadcast receivers.
Notification, widgets, transferring data efficiently, publishing app.
Unit VI Multiple form factors, sensors, Google cloud messaging, monetizing your app.
REFERENCE:
1. Android Programming (Big Nerd Ranch Guide), by Phillips, Stewart, Hardy and Marsicano.
2. Android Programming – Pushing the limits by Hellman.
NPTEL Course:
1. Mobile Computing by Prof. Pushpendra Singh, IIITD.
MTCE104 Storage System (Elective 4)
L:3 T:0 P:0 MSE:20 IA:20 ESE:60
Prerequisites: Operating System.
Unit I
Introduction: History: computing, networking, storage, Need for storage networking, SAN, NAS,
SAN/NAS Convergence, Distributed Storage Systems, Mainframe/proprietary vs. open storage,
Storage Industry Organizations and Major Vendors Market, Storage networking strategy (SAN/NAS or
Distr storage), Impact of Regulations: existing and new.
Technology: Storage components, Data organization: File vs. Block, Object; Data store; Searchable
models, Storage Devices (including fixed content storage devices), File Systems, Volume Managers,
RAID systems, Caches, Prefetching.
24
Dr. B. A. Tech. University-Lonere
Unit II
Network Components: Connectivity: switches, directors, highly available systems, Fibre Channel,
1GE/10GE, Metro-ethernet, Aggregation, Infiniband.
Error Management: Disk Error Mgmt, RAID Error Mgmt, Distr Systems Error Mgmt
Unit III
Highly available and Disaster-tolerant designs: Ordered writes, Soft updates and Transactions, 2
phase, 3 phase, Paxos commit protocols, Impossibility Results from Distributed Systems, Choose 2 of
3: Availability, Consistency and Partition Tolerance.
Unit IV
Layering and Interfaces in Storage Protocols: SCSI 1/2/3SNIA model.
SAN Components: Fibre Channel, IP-based Storage (iSCSI, FCIP, etc.), Examples, NAS: NFS, CIFS,
DAFS
Unit V
Large Storage Systems: Google FS/BigTable, Cloud/Web-based systems (Amazon S3), FS+DB
convergence, Programming models: Hadoop
Unit VI
Archival Systems: Content addressable storage, Backup: serverless, LAN free, LAN Replication
issues, Storage Security, Storage Management, Device Management, NAS Management,
Virtualization : Virtualization solutions, SAN Management: Storage Provisioning, Storage Migration,
SRM.
NPTEL Course:
1. Storage Systems by Dr. K. Gopinath, IISc Bangalore.
25
Dr. B. A. Tech. University-Lonere
REFERENCE:
1. Object Oriented System Analysis, Sally Shlaer, Prentice Hall PTR.
2. Object Oriented System Analysis and Design using UML, Simon Bennett, McGraw-Hill.
26
Dr. B. A. Tech. University-Lonere
REFERENECE:
1. R. S. Sutton and A. G. Barto. Reinforcement Learning - An Introduction. MIT Press. 1998.
NPTEL Course:
1. Reinforcement Learning by Dr. B. Ravindran, IIT Madras.
MTCE1205 Pattern Recognition (Elective 5)
L:3 T:0 P:0 MSE:20 IA:20 ESE:60
Prerequisites: Vector spaces and Linear Algebra, Algorithms, Probability theory, Statistics.
Course Contents
Unit I Introduction and mathematical preliminaries: What is pattern recognition?, Clustering vs.
Classification; Applications; Linear Algebra, vector spaces, probability theory, estimation techniques,
Decision Boundaries, Decision region / Metric spaces/ distances.
Unit II Classification: Bayes decision rule, Normal Distribution, Error probability, Error rate,
Minimum distance classifier, Mahalanobis distance; K-NN Classifier, Linear discriminant functions
and Non-linear decision boundaries. Mahalanobis Distance, K-NN Classifier, Fisher’s LDA, Single and
Multilayer perceptron, training set and test sets, standardization and normalization.
Unit III Clustering: Basics of Clustering; similarity/dissimilarity measures, clustering criteria,
Different distance functions and similarity measures, Minimum within cluster distance criterion, K-
means clustering, single linkage and complete linkage clustering, MST, K-medoids, DBSCAN,
27
Dr. B. A. Tech. University-Lonere
REFERENCE:
1. R.O.Duda, P.E.Hart and D.G.Stork, Pattern Classification, John Wiley, 2001.
2. Statistical pattern Recognition; K. Fukunaga; Academic Press, 2000.
3. S.Theodoridis and K.Koutroumbas, Pattern Recognition, 4th Ed., Academic Press, 2009.
NPTEL Course:
1. Pattern Recognition by Prof. Sukhendu Das and Prof. C.A. Murthy, IIT Madras.
28