Course Details
Course Details
Course Content:
5. Formal power series: Basic algebraic properties, Diagrammatic calculus, Extensive study
of ordinary and exponential series, Newton’s binomial series, Generalized Chu–
Vandermonde identity, Lagrange inversion, Various combinatorial applications.
References:
[1] Martin Aigner. Combinatorial Theory (reprint of the 1st edition). Springer, 1996.
[3] Richard A. Brualdi and Herbert J. Ryser. Combinatorial Matrix Theory (1st edition).
Cambridge University Press, 1991.
[4] Ronald Graham, Donald Knuth and Oren Patashnik. Combinatorial Theory (2nd edition).
Addison–Wesley, 1994.
Course Name: Graph Theory
Course Content:
1. Basic graph theoretic notions: Graphs and subgraphs, Vertex and edges, Degree of a
vertex, Complete graphs, Complement of graphs, Paths and cycles, Trees and forests,
Regular graphs, Bipartite graphs, Line graph, Graph isomorphism.
2. Linear algebraic notions: Vertex and edge space, Cycle space, Cut space, Adjacency
matrix, Incidence matrix, Laplacian matrix, Tree counting using matrix tree theorem.
5. Graph colouring: Colouring vertices and edges, Chromatic numbers, Perfect graphs,
Chromatic polynomial.
8. Eulerian and Hamiltonian graphs: Basic notions and results, Fleury’s and Hierholzer’s
algorithm, Sufficient conditions for Hamiltonicity, Toughness.
9. Extremal graph theory and Ramsey theory: Basic notions, Forbidden subgraphs and
minors, Mantel’s and Turán’s theorem, Ramsey’s theorem, Ramsey numbers.
References:
[1] Ravindra B. Bapat. Graphs and Matrices (2nd edition). Springer, 2014.
[2] Bela Bollobas. Modern Graph Theory (1st edition, corr. 2nd printing). Springer, 2002.
[3] Reinhard Diestel. Graph Theory (4th edition, corr. 3rd printing). Springer, 2012.
[4] Douglas B. West. Introduction to Graph Theory (2nd edition). Pearson, 2000.
Course Name: TOPOLOGY - 2
Course Content:
5. Topological Manifold,
6. Orientation of Manifold
References:
[2] W.S.Massey, A basic course in algebraic topology, GTM (127), Springer (1991).
Course Content:
1. Smooth manifolds.
2. Partition of unity.
4. Sard’s theorem.
5. Vector fields.
6. Morse Theory.
8. Transversality.
References:
Course Content:
1. Differentiable Manifolds.
2. Riemannian metrics.
3. Affine connections.
4. Riemannian connections.
5. Geodesics.
6. Convex neighborhoods.
7. Curvature.
8. Jacobi fields.
9. Isometric immersions.
References:
Course Content:
1. Affine Varieties: Algebraic sets and the Zariski topology, irreducibility and the dimension
of a topological space, basic dictionary between algebra and geometry, Hilbert
Nullstelenzatz;
2. Regular functions and morphisms of affine varieties, Rational functions and rational maps
between affine varieties; Affine varieties as a ringed space.
3. Projective Varities: projective spaces and projective varieties; Regular functions and
morphisms on projective varieties, Cones and projective Nullstelenzatz, projective varieties
as a ringed space, product of varieties.
4. Dimension of affine and projective varieties, Zariski tangent space, non singular varieties,
blowing up, intersection in projective space, Hilbert polynomial.
5. Algebraic curves: Bezout’s theorem, non singular projective curves over complex
numbers, Riemann-Hurwitz formula (geometric idea to show how the formula works);
Riemann-Roch theorem statement and applications (a brief indication of cohomological
interpretation of the theorem and how basic cohomology machinary can be used to prove it).
6. Where to go? Broad problems and goals in algebraic geometry; overview of certain topics
where research in modern algebraic geometry takes place.
Prerequisite: Basic familiarity with algebra and topology. Main background materials in
commutative algebra will be covered in the course.
References:
Course Content:
5. flatness and faithfully flatness. Associated primes and primary decompositions, rings and
modules of fractions.
6. Integral dependence, Going up theorem, Integrally closed integral domains, Going down
theorem, Noether's Normalization, valuations.
7. Chain conditions, Noetherian and Artinian Rings, Hilbert’s basis theorem, Hilbert
Nullstellensatz.
References:
[2] H. Matsumura, Commutative ring theory, 2nd ed., Cambridge Studies in Advanced
Mathematics, Cambridge University Press, Cambridge, 1989.
[3] D. Eisenbud, Commutative algebra with a view towards algebraic geometry, Graduate
Texts in Math. 150, Springer, New York, 1995.
Course Name: Introduction to knot theory and low dimensional topology
Course Content:
1. Basics of knot theory: Basic definitions and concepts involving knots and links,
Reidemeister moves, knot invariants, fundamental group of a knot and Wirtinger
presentation, Braids and representations of the braid group.
2. 3-manifolds and Dehn surgery: Heegaard splittings, the mapping class group, surgery on
links in S^3, surgery description of lens spaces and Seifert manifolds, Lickorish–Wallace
theorem, Kirby moves and the linking matrix
3. Invariants of knots and links: Seifert surface, Seifert form, Alexander polynomial,
signature and determinant of a knot, slice knots, Jones polynomial, Khovanov homology and
a glimpse of invariants bounding genus and slice genus of a knot.
References:
[2] Prasolov, V.V., & Sossinsky, A.B. Knots, Links, Braids and 3-Manifolds: An
Introduction to the New Invariants in Low-Dimensional Topology. American
Mathematical Society, Providence, 154.
Course Name: Advanced Complex Analysis
Course Content:
References:
Course Content:
1. Algorithms: Dijkstra’s shortest path algorithm, BFS and DFS, Hungarian method and
Hopcroft–Karp algorithm for maximum matching, Ford–Fulkerson method and Dinitz’s
algorithm.
2. Linear and integer programs: Basic notions, Simplex and ellipsoid method, Primal-dual
methods.
References:
[1] William W. Adams and Philippe Loustaunau. An Introduction to Gröbner Bases. AMS,
1994
[3] David A Cox, John Little and Donal O’Shea. Ideals, Varieties, and Algorithms – An
Introduction to Computational Algebraic Geometry and Commutative Algebra (4th edition).
Springer, 2015.
Course Name: Advanced Functional Analysis and Noncommutative Geometry
Course Content:
Course Content:
1. Modules: Rings and Modules, Local Property, Sums and Products of Modules, Free and
Projective Modules, Dualization, Injective Modules, Cofree Modules.
3. Extension of Modules: Extensions of Modules, The Functor Ext, Ext Using Injective,
Computation of some Ext-Groups, The Tensor Product, The Functor Tor.
4. Derived Functors: Complexes, The Long Exact (Co) Homology Sequence, Homotopy,
Resolutions, Derived Functors, The Two Long Exact Sequences of Derived Functors, The
Functors Extn Using Projective, Extn and n-Extensions, Another Characterization of Derived
Functors.
5. Cohomology of Groups: The Group Ring, Definition of (Co) Homology, The (Co)
Homology of Finite Cyclic Groups, Second cohomology and Extensions, The Universal
Coefficient Theorem.
6. Cohomology of Lie Algebras: Lie Algebras and their Universal Enveloping Algebra,
Definition of Cohomology, second cohomology and Extensions, The two Whitehead
Lemmas.
Course Name: Advanced Cryptology
Course Content:
2. Introduction to one way function, How to construct PRG and PRF from one way function
5. Introduction to Interactive Proof System and Zero Knowledge Proof, A basic introduction
to SNARK and its usefulness
7. KEM: CPA, CCA security, Towards RSA based CPA-secure encryption without ROM and
RSA based CCA-secure KEM in ROM, Fujisaki-Okamoto transform and its security
8. PKE: Public key encrytion (PKE) from trapdoor permuations, Pallier encryption scheme
and it’s generalization (Damgard-Jurik ecnryption scheme), Goldwasser-Micali encryption
scheme, Rabin Ecnryption scheme
References:
Course Content:
1. Internet Security: Basics of Networks, Concepts of threat, vulnerability and risk; Basics of
data communication. Various layers of TCP/IP protocol suite. Common threats in data
communication. Concepts of Sniffing and Spoofing; Concepts of Malware and Phishing;
Concepts of DNS and cache poisoning attacks, and Concepts of reconnaissance. Web and
DNS reconnaissance using DNSrecon tools; Concepts of TCP and UDP, various attacks on
TCP and UDP, port scanning techniques using Nmap tools; Network Defense tools –
Firewalls, Intrusion Detection, Filtering; Denial of Service Attacks with various examples.
2. Side-Channel Attack: Concepts, Timing Attack, Example with RSA, Simple and
Differential Power Attacks, An Introduction to Leakage Resilient Cryptography
3. Fault Attack: Concepts (Fixed Faults, Random Faults etc.), Types: Statistical Fault Attack,
Differential Fault Attack, Ineffective Fault Attack, Statistically Ineffective Fault Attack,
Examples with RSA, AES
References:
[2] Kazuo Sakiyama, Yu Sasaki, Yang Li: Security of Block Ciphers – From Algorithm
Design to Hardware Implementation.
Course Content:
3. Quantum True Random Number Generators (QTRNG): (a) Detailed design and issues of
quantumness; (b) Commercial products and applications
4. Quantum key distribution (QKD): (a) BB84, Ekert, Semi-Quantum QKD protocols and
their variations; (b) Issues of Device Independence; (c) Commercial products
5. Other cryptologic issues, such as Quantum secret sharing and multiparty computation.
References:
Course Content:
1. Linear Systems
2. Solutions to over determined and under determined cases
5. Lagrangians
6. KKT conditions
8. Simplex Algorithm
9. Bipartite and Non-bipartite Matching
10. Polyhedral Combinatorics
11. Max Flow, Min Cut
12. Matroids
13. Ellipsoid Algorithm, Karmakar's Algorithm
14. Travelling Salesman problem
References:
[2] B. Korte, J. Vygen, Combinatorial Optimization: Theory and Algorithms (6th Edition)
[3] A. Schrijver, Combinatorial Optimization: Polyhedra and Efficiency.
Course Name: Design and Analysis of Algorithms
Course Content:
1. Introduction: Algorithm, Instance of a problem, Efficiency of algorithm, Growth of
Functions, Asymptotic notation, Worst case, Best case, Average Case time complexity,
Substitution method, Recursion tree method, Masters Theorem
2. Advanced Data Structure: Hash table, Binary Search Tree, Disjoint Set Data Structure
3. Searching and Sorting: Linear and Binary Search, Heap Sort, Quick Sort, Sorting in linear
time.
4. Divide and Conquer Paradigm: Merge Sort, Counting Inversion, Closest Pair of Points.
5. Greedy Algorithms: Interval Scheduling Problem and its variants, Optimal Caching
Problem, Minimum Spanning tree Problem, Huffman Code, Clustering Problem, Fractional
Knapsack problem, Dijkstra Algorithm.
8. Advanced Topics: P, NP, NPC (Circuit Satisfiability, Vertex Cover, Graph Coloring),
Approximation Algorithm of some NPC Problems, Probabilistic Algorithms.
References:
[2] A. Aho, J. Hopcroft and J. Ullman: The Design and Analysis of Computer Algorithms, A.
W. L, International Student Edition, Singapore, 1998.
Course Content:
Philosophy & Ethics: Introduction to Philosophy, definition, nature and scope, concepts,
branches, nature of moral philosophy, nature of moral judgements and reactions, Ethics with
respect to science and research, Intellectual honesty and research integrity; Scientific
misconducts: Falsification, Fabrication, and Plagiarism, Redundant publications; duplicate
and overlapping publications, Selective reporting and misrepresentation of data, Conflict of
interest.
Course Name: Deep Learning
Course Content:
4. CNNs in computer vision: Image classification, object detection, and image segmentation.
References:
[1] Aston Zhang, Zachary C. Lipton, Mu Li, and Alexander J. Smola, Dive into Deep
Learning, Cambridge University Press, 2023.
[2] Simon J.D. Prince, Understanding Deep Learning, MIT Press, 2023.
[3] Christopher M. Bishop, Hugh Bishop, Deep Learning Foundations and Concepts,
Springer Cham, 2023.
[4] Ian Goodfellow and Yoshua Bengio and Aaron Courville, Deep Learning, MIT Press,
2016.
Course Name: Computer Vision
Course Content:
3. Image descriptors and Features: Texture descriptors, Colour Features, Edge Detection,
Object Boundary and shape representations, Interest or Corner Point detectors, HOG and
SIFT features, Speeded up Robust Features
4. Machine learning for Computer Vision: Statistical machine learning for different
Computer Vision applications, Artifical and Deep Networks for Computer Vision
applications
References:
[1] Richard Szeliski. 2022. Computer Vision: Algorithms and Applications (2nd. ed.).
Springer Nature.
[2] Forsyth, D.A. and Ponce, J. (2003) Computer Vision: A Modern Approach. Pearson
Education, Upper Saddle River.
[3] Ballard, D.H., and Brown, C.M. (1982) Computer Vision. Prentice Hall: New York.
[4] Bhuyan, M.K. (2019). Computer Vision and Image Processing: Fundamentals and
Applications (1st ed.). CRC Press.
Course Name: Signal Processing for Machine Learning
Instructor: Md Sahidullah
Course Content:
1. Basics of Signals & Systems: Analog and digital signals, sampling theorem, LTI systems,
impulse response, convolution, stability.
4. Digital Filters: Concept of filtering, all-pass filters, IIR and FIR filters, design of filters.
5. Introduction to Speech, Audio, and Music Processing: Speech signals, speech production,
perception models, speech feature extraction, acoustic modeling, sequential modeling with
HMM, LSTM, and transformer.
7. Case Studies from Emerging Applications: Foundation models for speech and language
processing (Wav2Vec2.0, GPT).
References:
[1] Oppenheim, A. V., Willsky, A. S., Nawab, S. H. (1996). Signals and Systems (2 nd ed). Pearson.
[2] Oppenheim, A. V., Schafer, R. W., & Buck, J. R. (1999). Discrete-Time Signal Processing.
Pearson.
[3] Quatieri, T. F. (2001). Discrete-Time Speech Signal Processing: Principles and Practice.
Pearson.
[4] Jurafsky, D., & Martin, J. H. (2020). Speech and Language Processing. PHI.
[5] Goldberg, Y. (2017). Neural Network Methods for Natural Language Processing. Springer
Cham.