2022 - Final - VIT - CMPN - Autonomy Scheme and Syllabus - FY - MTech - V3
2022 - Final - VIT - CMPN - Autonomy Scheme and Syllabus - FY - MTech - V3
2022 - Final - VIT - CMPN - Autonomy Scheme and Syllabus - FY - MTech - V3
Master of Technology
in
Computer Engineering
Preamble
To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to
be addressed, debated, and taken forward in a systematic manner. Therefore, autonomy for
Vidyalankar Institute of Technology is not merely a transition from pre-cooked syllabi to self-designed
curriculum. Autonomy curriculum of the Institute offers required academic flexibility with emphasis on
industry requirements and market trends, employability, problem-solving approach and research
ability which leads to improving competency level of learners with diverse strengths. In line with this,
the curriculum framework designed is Choice-Based Credit and Grading System (CBCGS). Number
of credits for courses learnt by learners, internships and dissertation is finalized considering the scope
of study and the ability that a learner should gain through the programme.
The curriculum has core courses of engineering, specific to the branch. These courses are completed in
first year of the engineering programme that enables learners to work on their chosen dissertation
topic during their final year. The curriculum planned by the Institute offer flexibility and diversity to
learners to choose any set of courses from a basket of professional electives. Learner can also choose
to specialize in a domain as per their field of interest. The selection of unique specialization tracks
based on recent developments and industrial requirements is a salient feature of this curricula
ensuring employability. Each specialization track has mandatory courses positioned and sequenced to
achieve sequential and integral learning for the required depth of the specific domain. Learner can
choose to complete these courses in first year of the engineering program that enables him/her to
prepare for research during their final year. Credits additional to core and professional elective courses,
include dissertation, internships, advanced courses in the field of computer engineering, multi-
disciplinary courses, special skill development courses and similar knowledge that make learner
capable to do further research or work in industrial environment.
Thus, the academic plan of VIT envisages a shift from summative to formative and competency-based
learning system which will enhance learner’s ability towards higher education, employability and
entrepreneurship.
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
the above, each course faculty shall have the choice to propose her/his assessment methodology
based on the nature of the course. However, the proposed assessment methodology shall be
approved by a panel constituted at Institute level and published to the learners before the
commencement of the semester.
Refer Appendix-A for guidelines on Professional Elective Courses and Specialization Certificate
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
the above, each course faculty shall have the choice to propose her/his assessment methodology
based on the nature of the course. However, the proposed assessment methodology shall be
approved by a panel constituted at Institute level and published to the learners before the
commencement of the semester.
Category: Core
Preamble:
This course introduces different Advanced Data Structures and aims to provide Mathematical
Approach for Analysing the Complexities of Algorithms with their real-life applications.
Pre-requisites:
1. Data Structures
2. Analysis of Algorithms
Course Objective:
Course Outcome:
Course Scheme:
Assessment Guidelines:
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
the above, each course faculty shall have the choice to propose her/his assessment methodology
based on the nature of the course. However, the proposed assessment methodology shall be
Vidyalankar Institute of Technology (An Autonomous Institute affiliated to University of Mumbai)
Page 5
First Year Scheme & Syllabus (2022) Master of Technology (M.Tech.)
Computer Engineering
approved by a panel constituted at Institute level and published to the learners before the
commencement of the semester.
Detailed Syllabus:
Module No. of
Module name Content
No. Hours
Complexity: Finding complexity by tree method, master
method, proving technique (contradiction, mathematical
Fundamental of
1 induction). 6
Algorithms
Amortized analysis- aggregate analysis, accounting analysis,
potential analysis dynamic tables
Probabilistic
The hiring problem Indicator random variables, Randomized
Analysis and
2 algorithms Probabilistic analysis and further uses of indicator 6
Randomized
random variable
Algorithm
Introduction to trees and heap Red-Black Trees: properties of
Advanced Data red-black trees, Operations on Red-black trees Binomial
3 12
Structure Heaps: Binomial trees and binomial heaps, Operation on
Binomial heaps Analysis of all above operations
Shortest Path, The Floyd - Warshall Algorithm, Johnson's
Flow N/W Algorithm for sparse graphs, Flow Networks, The Ford-
4 10
Maximum Flow Fulkerson method, Maximum bipartite matching, Push relabel
algorithms, The relabel-to-front algorithm.
An Introduction to Linear Programming, Flows in networks,
Linear
5 Bipartite matching, Duality, Zero- sum games, The simplex 5
Programming
algorithm, Post script: circuit evaluation
Approximation Algorithms: The vertex - cover problem, the
travelling salesman problem, the set- covering problem,
Approximation
Randomization and linear programming, The subset- sum
6 & Optimization 6
problem.
Algorithms
Optimization Algorithms: Genetic Algorithm, K- means
Algorithm
Total 45
Text Books:
Reference Books:
Category: Core
Preamble:
Goal of this course is to learn basics of High-Performance Computing, clustering and grid computing,
it will cover theoretical and practical knowledge regarding parallel computing, high-performance
computing, supercomputers, and the development and performance analysis of parallel applications.
Pre-requisites:
1. Computer Networks
2. Microprocessor
3. Operating Systems
Course Objectives:
• Understand different parallel processing approaches and platforms involved in achieving High
Performance Computing.
• Understand design issues and limitations in Parallel Computing.
• Programming using message passing paradigm using open-source APIs, design algorithms suited
for Multicore processor and OpenMP.
• Analyse and optimize performance parameters, for cluster and grid computing.
Course Outcome:
Course Scheme:
Assessment Guidelines:
ISA=In Semester Assessment, MSE= Mid Semester Examination, ESE= End Semester Examination
ISA*: Specific rubric for the 40 marks of the In-Semester Assessment (ISA) will be, as stated by the
course teacher in their Academic Administration Plan (AAP) for the current half of the academic year.
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
the above, each course faculty shall have the choice to propose her/his assessment methodology
based on the nature of the course. However, the proposed assessment methodology shall be
approved by a panel constituted at Institute level and published to the learners before the
commencement of the semester.
Detailed Syllabus:
Solve given problems using OpenMP/MPI/OpenCL and compare their performance on CPU.
Text Books:
1. R. K. Buyya, High Performance Cluster Computing: Programming and Applications, PHI , 1999
2. D. Janakiram, Grid Computing, Tata Mcgraw Hill , 2005.
3. Ananth Grama, Anshul Gupta, George Karypis, Vipin Kumar, Introduction to Parallel Computing”
. Pearson Education, , Second Edition 2007.
4. Benedict R Gaster, Lee Howes, David R KaeliPerhaad Mistry Dana Schaa, “Heterogeneous
Computing with OpenCL”, Elsevier, Second Edition, 2013
Reference Books:
1. J. J. Jos & R. K. Buyya, High Performance Cluster Computing: Architecture and Systems, PHI , 1999
2. P. Jalote, Fault Tolerance in Distributed Systems, Prentice Hall, 1994, P. Jalote, Fault Tolerance in
Distributed Systems, Prentice Hall, 1994, Prentice Hall , 1994
Preamble:
This required course for the M.Tech. with specialization in Data Science should be taken in the first
year of study. It covers fundamental concepts in probability and statistics from a data-science
perspective.
Pre-requisites:
1. Engineering Mathematics
2. Probability and Statistics
Course Objectives:
Course Outcome:
Course Scheme:
Assessment Guidelines:
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
the above, each course faculty shall have the choice to propose her/his assessment methodology
based on the nature of the course. However, the proposed assessment methodology shall be
approved by a panel constituted at Institute level and published to the learners before the
commencement of the semester.
Detailed Syllabus:
Module No. of
Module name Content
No. Hours
Data and Statistics: Elements, Variables, and
Observations, Scales of Measurement, Categorical and
Quantitative Data, Cross-Sectional and Time Series
Data, Descriptive Statistics, Statistical Inference,
Descriptive Statistics: Tabular and Graphical
Summarizing Categorical Data, Summarizing
1 Introduction Quantitative Data, Cross Tabulations and Scatter 7
Diagram.
Descriptive Statistics: Numerical Measures: Measures
of Location, Measures of Variability, Measures of
Distribution Shape, Relative Location, and Detecting
Outliers, Box Plot, Measures of Association Between
Two Variables
Probability: Experiments, Counting Rules, and
Assigning Probabilities, Events and Their Probabilities,
Complement of an Event, Addition Law Independent
Events, Multiplication Law, Baye’s theorem.
Discrete Probability Distributions Random Variables,
Discrete Probability Distributions, Expected Value and
2 Probability 8
Variance, Binomial Probability Distribution, Poisson
Probability Distribution.
Continuous Probability Distributions: Uniform
Probability Distribution, Normal Curve, Standard
Normal Probability Distribution, Computing
Probabilities for Any Normal Probability Distribution
Sampling from a Finite Population, Sampling from an
Infinite Population, Other Sampling Methods,
Stratified Random Sampling, Cluster Sampling,
Sampling and
Systematic Sampling, Convenience Sampling,
3 Sampling 4
Judgment Sampling.
Distributions
Interval Estimation: Population Mean: Known,
Population Mean: Unknown, Determining the Sample
Size, Population Proportion.
4 Hypothesis Tests Developing Null and Alternative Hypotheses, Type I 4
Module No. of
Module name Content
No. Hours
and Type II Errors, Population Mean: Known
Population Mean: Unknown Inference About Means
and Proportions with Two Populations-Inferences
About Population Variances, Inferences About a
Population Variance, Inferences About Two
Population Variances.
Tests of Goodness of Fit and Independence,
Goodness of Fit Test: A Multinomial Population, Test
of Independence.
Simple Linear Regression: Simple Linear Regression
Model, Regression Model and Regression Equation,
Estimated Regression Equation, Least Squares
Method, Coefficient of Determination, Correlation
Coefficient, Model Assumptions, testing for
Significance, Using the Estimated Regression Equation
for Estimation and Prediction Residual Analysis:
5 Regression 8
Validating Model Assumptions, Residual Analysis:
Outliers and Influential Observations.
Multiple Regression: Multiple Regression Model, Least
Squares Method, Multiple Coefficient of
Determination, Model Assumptions, Testing for
Significance, Categorical Independent Variables,
Residual Analysis.
Time Series Patterns, Forecast Accuracy, Moving
Averages and Exponential Smoothing, Trend
Projection, Seasonality and Trend and Time Series
Time Series Analysis
6 Decomposition. 5
and Forecasting
Nonparametric Methods: Sign Test, Wilcoxon Signed-
Rank Test, Mann-Whitney-Wilcoxon Test, Kruskal-
Wallis Test, Rank Correlation.
Total 45
Determination of sample size for the 1000 students (dataset marks ) and perform
2.
1. Random Sampling 2. Stratified Sampling
Perform Linear regression and prediction on the datasets downloaded from the datasets
4.
repository. Example Airline dataset. Predict when a flight in delayed.
Perform multiple regression and prediction on the datasets downloaded from the datasets
5.
repository. Example Uber Fares Dataset. predict the fare for Uber Rides
Text Books:
1. Data Science from Scratch, FIRST PRINCIPLES WITH PYTHON, O’Reilly, Joel Grus
2. Data Science from Scratch (oreillystatic.com)
3. Practical Time Series Analysis, Prediction with statistics and Machine Learning, O’Reilly, Aileen
Nielsen [DOWNLOAD] O'Reilly Practical Time Series Analysis PDF (lunaticai.com)
4. R for data science: Import, Tidy, Transform, Visualize, And Model Data, O’Reilly , Garrett
Grolemund, Hadley Wickham
5. Python for Data Analysis, 2nd Edition, O'Reilly Media, Wes McKinney
Reference Books:
Preamble:
Learners will learn how to prepare data for visualization, perform exploratory data analysis and develop
meaningful data visualization. They will work with variety of real-world data sets and learn how to
prepare data sets for analysis by cleaning and reformatting.
Pre-requisites:
1. Python
Course Objectives:
• To prepare data for analysis to uncover interesting structure and unusual observations.
• To learn data exploratory analysis techniques for appropriate analysis and to define what we would
expect to see in the data.
• To interpret the results of visual inference and assess the strengths and adequacy of data analysis.
Course Outcomes:
Course Scheme:
Assessment Guidelines:
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
the above, each course faculty shall have the choice to propose her/his assessment methodology
based on the nature of the course. However, the proposed assessment methodology shall be
approved by a panel constituted at Institute level and published to the learners before the
commencement of the semester.
Detailed Syllabus:
Module No. of
Module name Content
No. Hours
How to generate data and how analysts decide which
Data types and
1 data to collect for analysis. Structured and 6
structures
unstructured data, data types, and data formats
When data analysts work with data. Identify different
Bias, credibility,
types of bias in data and how to ensure credibility in
2 privacy, ethics, and 7
data. Explore open data and the relationship between
access
and importance of data ethics and data privacy.
Data Gathering and Data Munging, Wrangling, Data formats, parsing and
3 8
Preparation transformation, Scalability, and real-time issues
Consistency checking, Heterogeneous and missing
4 Data Cleaning data, Data Quality, Data Transformation, and 8
segmentation
Descriptive and comparative statistics, Clustering and
5 Exploratory Analysis 8
association, Hypothesis generation
Designing visualizations, Time series, Geolocated data,
6 Visualization Correlations and connections, Hierarchies and 8
networks, interactivity
Total 45
Programming assignments based on following topics to be performed using data analysis tool
like R
4. Data Wrangling
5. Data Transformation
6. Data Cleaning
Text Books:
1. Glenn J. Myatt, Making sense of Data: A practical Guide to Exploratory Data Analysis and Data
Mining, John Wiley Publishers, 2007.
Reference Books:
1. Data Preparation for Data Mining by Dorian Pyle, Morgan Kaufmann Publishers, Inc.
Preamble:
This course introduces learners an overview of concepts, main trends and challenges of Internet of
Things. Develop the ability to use Internet of Things related software and hardware technologies. And
provide the knowledge of data management business processes and analytics of IoT
Pre-requisites:
Course Objectives:
Course Outcome:
Course Scheme:
Assessment Guidelines:
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
the above, each course faculty shall have the choice to propose her/his assessment methodology
based on the nature of the course. However, the proposed assessment methodology shall be
approved by a panel constituted at Institute level and published to the learners before the
commencement of the semester.
Detailed Syllabus:
Module No. of
Module name Content
No. Hours
IoT Paradigm, IoT Architecture – State of the Art, IoT
Protocols, IoT Communication Models, IoT in Global
Introduction to
Context, Cloud Computing, Big Data Analytics,
1 Internet of Things 10
Concepts of Web of Things, Concept of Cloud of
and smart sensors
Things with emphasis on Mobile Cloud Computing,
Smart Objects.
Open – Source Basic Arduino Programming Extended Arduino
2 Prototyping Libraries, Arduino – Based Internet Communication, 6
Platforms for IoT Raspberry PI, Sensors and Interfacing.
RFID + NFC, Wireless Networks + WSN, RTLS + GPS,
Agents + Multi – Agent Systems, Composition Models
3 IoT Technology 7
for the Web of Things and resources on the Web,
Discovery, Search, IoT Mashups and Others.
Wireless Sensor History and Context, The Node, Connecting Nodes,
4 6
Networks Networking Nodes, Secured Communication for IoT
Data Management, Business Process in IoT, IoT
Analytics, Creative Thinking Techniques, Modification,
Data Management, Combination Scenarios, Decentralized and
5 Business Process and Interoperable Approaches, Object – Information 12
Analytics Distribution Architecture, Object Naming Service
(ONS), Service Oriented Architecture, Network of
Information, Etc.
Concrete Applications and Use – Cases of Web
Application and Use Enabled Things: Energy Management and Smart
6 4
Cases Homes, Ambient Assisted Living, Intelligent Transport,
Etc. M2M, Industrial IoT Applications.
Total 45
Text Books:
Reference Books:
1. The Internet of Things Key applications and Protocols, 2nd Edition, (Wiley Publication) by Olivier
Hersent, David Boswarthick and Omar Elloumi.
2. IoT –From Research and Innovation to Market development, River Publication by Ovidiu Vermesan
and Peter Friess.
Preamble:
The Internet of Things (IoT) is a course about the new paradigm of objects interacting with people,
with information systems, and with other objects. The purpose of this course is to impart knowledge
on IoT Architecture and various protocols, study their implementations and applications.
Pre-requisites:
Course Objectives:
• To equip learners with the fundamental knowledge and basic technical competence in the field
of Internet of Things (IoT)
• Introduce multiple way of data communication and networking.
• Identify the IoT networking components with respect to OSI layer
Course Outcome:
Course Scheme:
Assessment Guidelines:
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
the above, each course faculty shall have the choice to propose her/his assessment methodology
based on the nature of the course. However, the proposed assessment methodology shall be
approved by a panel constituted at Institute level and published to the learners before the
commencement of the semester.
Detailed Syllabus:
Module No. of
Module name Content
No. Hours
IoT architecture outline, standards - IoT Technology
Fundamentals- Devices and gateways, IoT Sensors, Sensors
for IoT Applications, Local and wide area networking, Data
1 Introduction 6
management, Business processes in IoT, Everything as a
Service(XaaS), M2M and IoT Analytics. Sensors for IoT
Applications
Introduction, Functional View, Information View, Deployment
IoT Reference and Operational View, Other Relevant architectural views.
2 8
Architecture Real-World Design Constraints- Introduction, Technical
Design constraints
IoT Data link PHY/MAC Lay’er(3GPP MTC, IEEE 802.11, IEEE 802.15),
layer and Wireless HART, ZWave, Bluetooth Low Energy, Zigbee Smart
3 12
Network layer Energy, DASH7 - Network Layer-IPv4,IPv6, 6LoWPAN,
protocols 6TiSCH,ND, DHCP, ICMP, RPL, CORPL, CARP
IoT Transport
Transport Layer (TCP, MPTCP, UDP, DCCP, SCTP)-(TLS, DTLS) –
4 layer and session 8
Session Layer-HTTP, CoAP, XMPP, AMQP, MQTT
layer protocols
IoT service layer Service Layer -oneM2M, ETSI M2M, OMA, BBF – Security in
5 protocol and IoT Protocols – MAC802.15.4 , 6LoWPAN, RPL, Application 6
security protocol Layer
IOT Applications. IoT applications in home, infrastructures,
buildings, security, Industries, Home appliances, other IoT
6 Application in IoT electronic equipment’s, Industry 4.0 concepts. Case study on: 5
Lighting as a service, Intelligent Traffic systems, Smart Parking
and Smart water management.
Total 45
To interface bluetooth with arduino/raspberry pi and write a program to send sensor data
6.
to smartphone using bluetooth
8. Smart Liquid Level Detector simulation and analysis of data using MATLAB and SIMULINK
Text Books:
1. Daniel Minoli, “Building the Internet of Things with IPv6 and MIPv6: The EvolvingWorld of M2M
Communications”, ISBN: 978-1-118-47347-4, Willy Publications ,2016
2. Jan Holler, VlasiosTsiatsis, Catherine Mulligan, Stefan Avesand,StamatisKarnouskos, David Boyle,
“From Machine-to-Machine to the Internet ofThings: Introduction to a New Age of Intelligence”, 1st
Edition, Academic Press, 2015.
Reference Books:
1. Bernd Scholz-Reiter, Florian Michahelles, “Architecting the Internet of Things”,ISBN 978-3-642-
19156-5 e-ISBN 978-3-642-19157-2, Springer, 2016.
2. N. Ida, Sensors, Actuators and Their Interfaces, Scitech Publishers, 2014
Preamble:
This course introduces learners to process image and video signals which is incredibly important skill
to master for engineering learners. The course focusses on details of cryptographic systems as well to
make learners aware of the details regarding various encryption algorithms used.
Pre-requisites:
Course Objectives:
• Understanding of data compression methods for text, images, video, and audio.
• Understand the concepts of cryptography and different algorithms to provide system security.
• Learn the various types of cyber-attacks and methods to mitigate them.
Course Outcome:
Course Scheme:
Assessment Guidelines:
ISA*: Specific rubric for the 40 marks of the In-Semester Assessment (ISA) will be, as stated by the
course teacher in their Academic Administration Plan (AAP) for the current half of the academic year.
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
the above, each course faculty shall have the choice to propose her/his assessment methodology
based on the nature of the course. However, the proposed assessment methodology shall be
approved by a panel constituted at Institute level and published to the learners before the
commencement of the semester.
Detailed Syllabus:
Module No. of
Module name Content
No. Hours
Loss less compression, Lossy compression, measure of
performance, modelling and coding, different types of
Data models, and coding techniques. Minimum variance
1 6
Compression Huffman coding, extended Huffman coding, Adaptive
Huffman coding. Arithmetic coding, Dictionary coding
techniques, LZ 77, LZ 78, LZW.
High quality digital audio, frequency and temporal masking,
Audio
2 lossy sound compression, µ-law and A-law companding, 6
Compression
and MP3 audio standard
PCM, DPCM JPEG, JPEG –LS, and JPEG 2000 standards, Intra
Image and Video
3 frame coding, motion estimation and compensation, 5
Compression
introduction to MPEG - 2 H-264 encoder and decoder
Data Security Concepts, Security goals, cryptography,
stenography cryptographic attacks, services and mechanics,
4 Data Security 10
Block Cipher and Encryption Link State and Distance Vector
algorithms, Routing in the Internet RIP, OSPF, and BGP
Number Theory Number Theory and Asymmetric Key Cryptography Public
and Asymmetric Key Encryption and RSA, Cryptographic Data Integrity
5 10
Key Algorithms, Message integrity, message authentication,
Cryptography MAC, hash function, HMAC, and digital signature algorithm
Malware, Intruders, Intrusion detection system, firewall
6 System Security design, antivirus techniques, digital Immune systems, 8
biometric authentication, and ethical hacking.
Total 45
7. Simulation of MAC
Text books:
Reference Books:
Preamble:
Ethical hacking and Digital evidence feature in just about every part of our personal and business lives.
Legal and business decisions hinge on having timely data about what people have done. This course
provides understanding of how to conduct investigations to correctly gather, analyse and present
digital evidence to both business and legal audiences. It also outlines the tools to locate and analyse
digital evidence on a variety of devices, how to keep up to date with changing technologies, and laws
and regulations in digital forensics.
Pre-requisites:
1. System security
Course Objectives:
• Understand the concepts of Ethical Hacking and Digital Forensics, various tools and
methodologies used in Digital Forensics and concepts of Mobile Forensics.
• Apply Digital Forensics tools to generate Forensic report which can be used for legal or
administrative cases.
Course Outcome:
Course Scheme:
Assessment Guidelines:
ISA=In Semester Assessment, MSE= Mid Semester Examination, ESE= End Semester Examination
ISA*: Specific rubric for the 40 marks of the In-Semester Assessment (ISA) will be, as stated by the
course teacher in their Academic Administration Plan (AAP) for the current half of the academic year.
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
the above, each course faculty shall have the choice to propose her/his assessment methodology
based on the nature of the course. However, the proposed assessment methodology shall be
approved by a panel constituted at Institute level and published to the learners before the
commencement of the semester.
Detailed Syllabus:
Module No. of
Module name Content
No. Hours
Ethical Introduction, Steps of Ethical Hacking: Planning,
1 Hacking Reconnaissance, Scanning, Exploitation, post exploitation 6
Methodology and result reporting. Ethical Hacking Tool: Metasploit
Computer Forensics Fundamentals, Types of Computer
Forensics Technology – Types of Computer Forensics
Introduction to
Systems-Data Recovery and Evidence Collection–
computer forensics
2 Forensic duplication and preservation of DE, 9
and Digital
Understanding Computer Investigation. Digital Forensic,
Forensics
Rules for Digital Forensic The Need for Digital Forensics,
Types of Digital Forensics, Ethics in Digital Forensics
Evaluating Computer Forensics Tool Needs, Types of
Computer Forensics Tools, Tasks Performed by
Computer Forensics Tools, Tool Comparisons, Other
Computer Considerations for Tools, Computer Forensics Software
3 9
Forensics Tools Tools, Command-Line Forensics Tools, UNIX/Linux
Forensics Tools, Other GUI Forensics Tools, Computer
Forensics Hardware Tools, Forensic Workstations, Using
a Write-Blocker.
Technical Exploits and Password Cracking, Introduction
to Intrusion Detection systems, Types of IDS
Understanding Network intrusion and attacks, Analysing
Network
4 Network Traffic, Collecting Network based evidence, 9
Forensics
Evidence Handling. Investigating Routers, Handling
Router Table Manipulation Incidents, Using Routers as
Response Tools
Crime and mobile phones, evidence, forensic
Mobile
procedures, files present in SIM cards, device data,
5 Device 6
external memory dump, and evidence in memory card,
Forensics
operator’s networks.
Forensic Report: Goals of Report, Layout of an Investigative
6 6
Investigation Report, Guidelines for Writing a Report, sample for
Vidyalankar Institute of Technology (An Autonomous Institute affiliated to University of Mumbai)
Page 28
First Year Scheme & Syllabus (2022) Master of Technology (M.Tech.)
Computer Engineering
Module No. of
Module name Content
No. Hours
Report and writing a forensic report. Computer Forensic Tools: need
Forensic Tools and types of computer forensic tools, task performed by
computer forensic tools. Study of open-source Tools like
SFIT, Autopsy etc. to acquire, search, analyse and store
digital evidence
Total 45
Exploring Router and VLAN security, setting up access lists using Cisco Packet
4.
tracer(student edition)
Explore forensics tools in Kali Linux for acquiring, analyzing and duplicating data: dd,
8.
dcfldd, foremost, scalpel, debugfs, wireshark, tcptrace, tcpflow
9. Analysis of forensic images using open source tools like Autopsy, like SIFT, FKT Imager
Use Password cracking using tools like John the Ripper/Cain and Abel/ Ophcrack to detect
10.
weak passwords.
Text Books:
1. Jason Luttgens, Matthew Pepe, Kevin Mandia, “Incident Response and computer forensics”,3rd
Edition Tata McGraw Hill, 2014.
2. Nilakshi Jain, Dhananjay Kalbande, ”Digital Forensic : The fascinating world of Digital Evidences”
Wiley India Pvt Ltd 2017.
Reference Books:
1. Cory Altheide, Harlan Carvey ”Digital forensics with open source tools “Syngress Publishing, Inc.
2011.
2. Chris McNab, Network Security Assessment, By O’Reily.
3. Clint P Garrison “Digital Forensics for Network, Internet, and Cloud Computing A forensic evidence
guide for moving targets and data , Syngress Publishing, Inc. 2010
4. Bill Nelson,Amelia Phillips,Christopher Steuart, “Guide to Computer Forensics and Investigations”.
Cengage Learning, 2014
5. Debra Littlejohn Shinder Michael Cross “Scene of the Cybercrime: Computer Forensics Handbook”,
2nd Edition Syngress Publishing, Inc.2008.
6. Marjie T. Britz, Computer Forensics and Cyber Crime, Pearson, Third Edition.
Category: Core
Preamble:
The goal of the course is to introduce the students, Principles, methodologies and technologies in
parallel algorithms and programming. With the help of different tools, it provides algorithm analysis,
algorithm design, algorithm optimized, algorithm implementation and evaluation working, and helps
in developing the programming ability of student strategies.
Pre-requisites:
1. Computer Network
2. Advance operating system
3. Microprocessor
Course Objectives:
Course Outcome:
Course Scheme:
Assessment Guidelines:
ISA=In Semester Assessment, MSE= Mid Semester Examination, ESE= End Semester Examination
ISA*: Specific rubric for the 40 marks of the In-Semester Assessment (ISA) will be, as stated by the
course teacher in their Academic Administration Plan (AAP) for the current half of the academic year.
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
table. Notwithstanding the above, each course faculty shall have the choice to decide her/his
assessment methodology based on the nature of the course. Faculty may propose the revised
assessment methodology for his/her course. However, the revised assessment methodology shall be
approved by a panel constituted at institute level and published to the learners before the
commencement of the semester.
Detailed Syllabus:
Module No of
Module Name Content
No. Hours
History. Parallel architecture, simple parallel arrays,
1 Introduction processor Array , Parallel architecture 06
,multiprocessor. Parallel algorithm design Elements,
task/channel models. Fosters design methodology
Text Books:
References:
1. Laurence T. Yang, Minyi Guo, “High- Performance Computing: Paradigm and Infrastructure”
Wiley, 2006.
2. Kai Hwang, Naresh Jotwani, “Advanced Computer Architecture: Parallelism, Scalability,
Programmability”, McGraw Hill, Second Edition, 2010.
3. https://cse.iitkgp.ac.in/~debdeep/courses_iitkgp/PAlgo21
4. https://www.ques10.com/p/36530/explain-the-various-types-of-parallel-programming-/
5. https://www.spiceworks.com/tech/iot/articles/what-is-parallel-processing/
6. https://www.coursera.org/learn/scala-parallel-programming
Category: Core
Preamble:
This course introduces learners to various computational intelligence techniques. Learners will become
familiarized with Neural Network, Fuzzy logic & Evolutionary techniques. Course will also offer in-
depth understanding to apply computational Intelligence to different applications.
Pre-requisites:
1. Soft Computing
2. Mathematics
3. Artificial Intelligence
Course Objectives:
Course Outcome:
Course Scheme:
Assessment Guidelines:
ISA*: Specific rubric for the 40 marks of the In-Semester Assessment (ISA) will be, as stated by the
course teacher in their Academic Administration Plan (AAP) for the current half of the academic year.
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
the above, each course faculty shall have the choice to propose her/his assessment methodology
based on the nature of the course. However, the proposed assessment methodology shall be
approved by a panel constituted at Institute level and published to the learners before the
commencement of the semester.
Detailed Syllabus:
Module No. of
Module name Content
No. Hours
Introduction to
Artificial Neural Networks, Fuzzy Systems, Genetic
Computational
1 Algorithms, Swarm Intelligence, Artificial Immune 6
Intelligence
System, Applications.
paradigms
Basic models of ANN: NN Architecture, MP Neuron,
Linear separability, activation functions, types of learning.
Artificial Neural Learning Rules: Hebbian, Perceptron, Delta, Winner- take
2 12
Networks all.
Supervised NN: Perceptron Network: SDPTA, SCPTA,
MCPTA, Adaline networks.
Fuzzy Relations and Fuzzy Rules
Fuzzy Rules, Modus Ponens and Inference
Fuzzy Logic &
3 Defuzzification and its Types 11
Rough Set Theory
Fuzzy Inference Systems & Design of Fuzzy Controller
Introduction to Rough Sets
GA: Selection, Encoding, Crossover, Mutation,
Examples.
Swarm Intelligence:
Single Solution Particle Swarm Optimization: Guaranteed
4 Optimization Convergence PSO, Social-Based Particle Swarm 10
Optimization, Hybrid Algorithms, Sub-Swarm Based PSO,
Multi-Start PSO Algorithms, Repelling Methods, Binary
PSO.
Ant Algorithm: Simple Ant Colony Optimization
Typical applications of Fuzzy Inference system,
Character Recognition, Colour Recipe prediction- Single
5 Applications 6
MLP approach, ANT algorithm/Swarm Intelligence – TSP,
Best path Finding
Total 45
Create a perceptron with appropriate number of inputs and outputs. Train it using fixed
1. increment learning algorithm until no change in weights is required. Output the final
weights
Write a program to implement artificial neural network without back propagation.
2.
Write a program to implement artificial neural network with back propagation.
Implement Union, Intersection, Complement and Difference operations on fuzzy sets. Also
3. create fuzzy relation by Cartesian product of any two fuzzy sets and perform max-min
composition on any two fuzzy relations.
4. Implement travelling salesperson problem (TSP) using genetic algorithms.
Implement Particle Swarm Optimization algorithm for given initial positions, velocity and
5.
best positions of all particles
6. To do comparative study of all the variants of Particle Swarm Optimization algorithms.
To do case study of Vehicle routing problem with pick-up and delivery (VRPPD) based on
7.
Ant colony optimization algorithm.
8. To do case study of Natural immune system and Artificial Immune Models
9. To do the case study of Optimization using Clonal Selection Algorithm.
Text Books:
References:
1. Fuzzy sets, fuzzy membership functions, fuzzy characteristics, fuzzy operations (D’Morgans
Theorem) be quickly revised from [5]-2.2,2.3(Transformation excluded), 2.4.
See NPTEL Video lectures of Prof. Laxmidhar Behra on Intelligent Systems and Control –
Module 2.
2. http://www.eecs.ceas.uc.edu/~mazlack/dbm.w2011/Komorowski.RoughSets.tutor.pdf
Preamble:
In today's data-driven world, the ability to process and analyze vast amounts of data efficiently is
crucial for organizations. This course on Big Data Analytics aims to provide students with a
comprehensive understanding of Big Data technologies and tools. Through a combination of
theoretical concepts and practical hands-on exercises, participants will learn about various
components of the Hadoop ecosystem, including HDFS, MapReduce, Apache Sqoop, NoSQL databases
like HBase, Apache Hive, and Apache Spark.
Pre-requisites:
1. Data Structures
2. Analysis of Algorithms
Course Objective:
Course Outcome:
Course Scheme:
Assessment Guidelines:
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
the above, each course faculty shall have the choice to propose her/his assessment methodology
based on the nature of the course. However, the proposed assessment methodology shall be
approved by a panel constituted at Institute level and published to the learners before the
commencement of the semester.
Detailed Syllabus:
Develop and execute a simple MapReduce program to count word occurrences in a text
3.
file.
Design an HBase schema for a given use case and perform queries and scans on the HBase
9.
table.
Create a Hive table, load data into it, and define partitions and buckets for efficient
10.
storage.
11. Write and execute HQL queries for data querying and analysis on Hive tables.
Optimize Hive queries using techniques such as indexing, partitioning, and performance
12.
tuning.
Use Spark SQL to process structured data and perform SQL-like queries on Spark
14.
DataFrames.
Textbooks:
Reference Books:
Preamble:
This course aims to provide students with a comprehensive understanding of the principles,
techniques, and best practices related to securing and controlling access to databases. Students will
gain knowledge and skills in designing secure database systems, implementing access control
mechanisms, detecting, and preventing security breaches, and managing user privileges
Pre-requisites:
1. DBMS
Course Objective:
• To introduce the fundamental concepts and principles of database security.
• To explore different types of security threats and vulnerabilities in database systems.
• To examine access control models and mechanisms for protecting data in databases.
• To understand encryption techniques for securing data at rest and in transit.
• To learn about authentication and authorization mechanisms in database systems
• To study techniques for auditing and monitoring database activities to detect security breaches.
Course Outcome:
Course Scheme:
Assessment Guidelines:
ISA*: Specific rubric for the 40 marks of the In-Semester Assessment (ISA) will be, as stated by the
course teacher in their Academic Administration Plan (AAP) for the current half of the academic year.
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
the above, each course faculty shall have the choice to propose her/his assessment methodology
based on the nature of the course. However, the proposed assessment methodology shall be
approved by a panel constituted at Institute level and published to the learners before the
commencement of the semester.
Detailed Syllabus:
Module No of
Module Name Content
No. Hours
Introduction to Overview of database security, Importance of database
1 Database security, Threats and vulnerabilities in database systems, 6
Security Security goals: confidentiality, integrity, and availability
Discretionary access control (DAC), Mandatory access
Access Control
control (MAC), Role-based access control (RBAC),
2 Models and 8
Attribute-based access control (ABAC), Access control
Mechanisms
lists (ACLs), Privileges and permissions.
User authentication techniques, Password policies and
Authentication
management, multi-factor authentication, Single sign-on
3 and 8
(SSO), Authorization and access rights, Role-based
Authorization
authorization
Encryption concepts and algorithms, Symmetric and
Encryption and asymmetric encryption, Secure key management,
4 Data Database-level encryption, Transparent data encryption 10
Protection (TDE), Secure Socket Layer/Transport Layer Security
(SSL/TLS)
Auditing and logging concepts, Audit trails and log
Auditing and management, Database activity monitoring (DAM),
5 8
Monitoring Intrusion detection and prevention systems (IDPS), Security
Information and Event Management (SIEM)
Secure database design principles, Secure coding practices
Security Best
for databases, Patch management and vulnerability
6 Practices and 5
assessment, Database hardening techniques, Compliance
Standards
with relevant security standards.
Total 45
Textbooks:
1. William Stallings and Lawrie Brown, “Computer Security: Principles and Practice” pearson
Reference Books:
1. Hassan A. Afyouni, “Database Security and Auditing: Protecting Data Integrity and Accessibility"”,
Cengage Learning
2. Tom Slodichak, Himanshu Gupta “Database Security and Encryption: A Practical Approach", CRC
Press.
Preamble:
This course introduces learners to various techniques for natural language processing. Learners will
become familiarized with Morphological analysis, syntactic and semantic analysis of text. Course will
also offer in-depth understanding of Natural language processing applications like Machine
translation, Question answering system, etc.
Pre-requisites:
Course Outcome:
Course Scheme:
Assessment Guidelines:
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
the above, each course faculty shall have the choice to propose her/his assessment methodology
based on the nature of the course. However, the proposed assessment methodology shall be
approved by a panel constituted at Institute level and published to the learners before the
commencement of the semester.
Detailed Syllabus:
Module No. of
Module name Content
No. Hours
Generic NLP system, Levels of NLP, Ambiguity in
1 Introduction to NLP Natural language, stages in NLP, Challenges of NLP, 02
Applications of NLP
Morphology analysis –survey of English Morphology,
Inflectional morphology & Derivational morphology,
Lemmatization, Regular expression, finite automata,
finite state transducers (FST), Morphological parsing
2 Lexical Analysis with FST, Lexicon free FST Porter stemmer. 08
Tokenization, Detecting and Correcting Spelling
Errors, Minimum Edit Distance.
N –Grams- N-gram language model, Smoothing, N-
gram for spelling correction.
Part-Of-Speech tagging (POS)- Tag set for English
(Penn Treebank), Rule based POS tagging, Stochastic
POS tagging, Issues –Multiple tags & words,
Unknown words. Introduction to CFG, Normal Forms
for grammar – Dependency Grammar – Syntactic
3 Syntax Analysis Parsing, Ambiguity, Dynamic Programming parsing – 10
Shallow parsing – Probabilistic CFG, Probabilistic CYK,
Probabilistic Lexicalized CFGs – Feature structures,
Unification of feature structures. Sequence labeling:
Hidden Markov Model (HMM), Maximum Entropy,
and Conditional Random Field (CRF).
Lexical Semantics, First-Order Logic, Description
Logics – Syntax-Driven Semantic analysis, Semantic
attachments – Word Senses, Relations among
lexemes & their senses –Homonymy, Polysemy,
Semantics and
4 Synonymy, Hyponymy, WordNet, Robust Word Sense 08
Pragmatics
Disambiguation (WSD), WSD using Supervised,
Unsupervised and Dictionary approach, Bootstrapping
methods – Word Similarity using Thesaurus and
Distributional methods.
Discourse Analysis Discourse –reference resolution, reference
5 08
and Lexical phenomenon, Discourse segmentation, Coherence –
Module No. of
Module name Content
No. Hours
Resources Reference Phenomena, Anaphora Resolution using
Hobbs and Centering Algorithm – Coreference
Resolution, syntactic & semantic constraints on co
reference
Machine translation, Information retrieval, Cross
Lingual Information Retrieval (CLIR), Question answers
6 Applications 09
system, categorization, summarization, sentiment
analysis.
Total 45
3.
N-gram model
4.
Anaphora resolution
Text Books:
1. Daniel Jurafsky and James H Martin, “Speech and Language Processing”, 3e, Pearson Education,
2018
2. Christopher D.Manning and Hinrich Schutze, ― Foundations of Statistical Natural Language
Processing ―, MIT Press, 1999.
3. Steven Bird, Ewan Klein and Edward Loper, ―Natural Language Processing with Python, First
Edition, OReilly Media, 2009.
4. Daniel and James H. Martin “Speech and Language Processing: An Introduction to Natural
Language Processing, Computational Linguistics and Speech Recognition”, Second Edition,
Prentice Hall of India, 2008.
Reference Books:
1. Tanveer Siddiqui, U.S. Tiwary, ―Natural Language Processing and Information Retrieval, Oxford
University Press, 2008.
2. Alexander Clark (Editor), Chris Fox (Editor), Shalom Lappin (Editor) ― The Handbook of
Computational Linguistics and Natural Language Processing
3. James Allen “Natural Language Understanding”, Pearson Publication 8th Edition. 2012
Preamble:
The goal of the course is to introduce the students to principles, methodologies and technologies used
in intrusion detection and prevention systems. With the help of tools, it provides analysis, mitigation of
intrusion and helps in preventing the same using effective strategies.
Pre-requisites:
1. Computer Network
2. Cyber Security
Course Objective:
Course Outcome:
Course Scheme:
Assessment Guidelines:
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
the above, each course faculty shall have the choice to propose her/his assessment methodology
based on the nature of the course. However, the proposed assessment methodology shall be
approved by a panel constituted at Institute level and published to the learners before the
commencement of the semester.
Detailed Syllabus:
Module No of
Module Name Content
No. Hours
History of Intrusion detection, Audit, Concept and
definition, Internal and external threats to
1 Introduction data, attacks, Key functions of IDPS technologies- 4
Common Detection methodologies-Signature
& Anomaly based Detection,
Intrusion
Stateful protocol analysis Types of IDS, Information
Detection
2 sources Host based information sources, Network 5
Systems
based information sources.
Principles
Components & Architecture-Typical components,
Network Architectures Security capabilities -
Information gathering capabilities, logging
capabilities, detection & prevention capabilities.
Intrusion Prevention Systems, Network protocol
3 IDS Technologies based IDS, Hybrid IDS, Analysis schemes, thinking 9
about intrusion. A model for intrusion analysis,
techniques Responses requirement of responses,
types of responses mapping responses to policy
Vulnerability analysis, credential analysis non
credential analysis
Networking Overview-OSI layers. Components and
Architecture - Typical components, Network
Network Based architectures and sensor locations. Security
4 9
IDS capabilities Wireless IDPS-Wireless Networking
overview-WLAN standards & components.
Components Network Behavior analysis system.
Components and Architecture-Typical components,
Network architectures, Agent locations, host
architectures. Security capabilities-Logging,
detection, prevention, and other capabilities. Using
5 Host Based IDS & Integrating multiple IDPS technologies-Need for 9
multiple IDPS technologies, integrating different
IDPS technologies-Direct & Indirect IDPS
integration other technologies with IDPS
capabilities. Network Forensic Analysis Tool, Anti-
Vidyalankar Institute of Technology (An Autonomous Institute affiliated to University of Mumbai)
Page 48
First Year Scheme & Syllabus (2022) Master of Technology (M.Tech.)
Computer Engineering
Preamble:
This course is to make the students understand the importance of research and various methods that
researcher used to investigate problems. The course will also help the students to make meaningful
decisions.
Pre-requisites:
1. Quantitative Techniques
2. Operations and production management
Course Objective:
• To understand importance of research and various methods that researcher used to investigate
problems.
problems.
CO4: Understand the challenges in collecting the data collection and analysis.
Course Scheme:
Assessment Guidelines:
ISA*: Specific rubric for the 40 marks of the In-Semester Assessment (ISA) will be, as stated by the
course teacher in their Academic Administration Plan (AAP) for the current half of the academic year.
The assessment guidelines for the courses of different credits are mentioned above. Notwithstanding
the above, each course faculty shall have the choice to propose her/his assessment methodology
based on the nature of the course. However, the proposed assessment methodology shall be
approved by a panel constituted at Institute level and published to the learners before the
commencement of the semester.
Detailed Syllabus:
Module No of
Module Name Content
No. Hours
Meaning of research; Types of research- Exploratory
Introduction to research, Conclusive research; The process of research;
1 4
Research Research applications in social and business sciences;
Features of a Good research study
Defining the Research problem; Management Decision
Research Problem Problem vs Management Research Problem; Problem
and Formulation identification process; Components of the research
2 of problem; Formulating the research hypothesis- Types of 6
Research Research hypothesis; Writing a research proposal-
Hypotheses Contents of a research proposal and types of research
proposals.
Meaning of Research Designs; Nature and Classification of
Research Designs; Exploratory Research Designs: Secondary
Research Resource analysis, Case study Method, Expert opinion
3 6
Design survey, Focus group discussions; Descriptive Research
Designs: Cross sectional studies and Longitudinal studies;
Experimental Designs, Errors affecting Research Design
Primary Classification of Data; Secondary Data: Uses, Advantages,
and Disadvantages, Types and sources; Primary Data Collection:
4 4
Secondary Observation method, Focus Group Discussion, Personal
Data Interview method
Attitude Types of Measurement Scales; Attitude; Classification of
Measurement Scales: Single item vs Multiple Item scale, Comparative vs
5 6
and non-Comparative scales, Measurement Error, Criteria for
Scaling Good Measurement
Questionnaire method; Types of Questionnaires; Process
Questionnaire
6 of Questionnaire Designing; Advantages and 4
Design
Disadvantages of Questionnaire Method
Sampling concepts- Sample vs Census, Sampling vs Non
Sampling and
Sampling error; Sampling Design- Probability and Non
7 Data 6
Probability Sampling design; Determination of Sample
Processing
size- Sample size for estimating population mean,
Appendix-A
Professional Elective courses are designed to meet industrial requirements. All learners must opt for 4
professional elective courses as a part of requirement for M.Tech. degree.
Specialization Certificate is introduced in order to build competency of learners in the chosen domain.
Department of Computer Engineering offers the following specialization tracks:
Learners can take courses from any track. However, if learners complete all Professional Elective
Courses from the same chosen track, they will be eligible to receive a Specialization Certificate
from the Institute.
Learners who choose professional elective courses from different specialisation tracks will not be
eligible for a Specialization Certificate.
It should be noted that there are no additional credit requirements for these specialisations.
Appendix B