IntMTechPhD ComputerAndInformation
IntMTechPhD ComputerAndInformation
Department of Technology
Board of Studies Computer and Information Technology (CI)
Curriculum Structure for Integrated M.Tech-PhD Program and Ph. D. Program
Ph.D. Program
SEMESTER 1
1 TechPhDRM Research Methodology and IPR 4
2 TechPhDMath Data Analytics through Mathematical Modelling 4
3 CIDS DS(Directed Study) 4
4 RPE Research Publication Ethics 2
5 CISM Seminar 2
LIST OF ELECTIVES FOR BOARD OF COMPUTER & INFORMATION TECHNOLOGY
24 CIE24 Meshups
Partial differential equation Laplace and Poisson’s equation-solution, method of characteristics for
solution of initial boundary value problems, relaxation method
Unit 2: Numerical differentiation II:
Finite Difference, Gaussian elimination and Gauss, Jordan methods, matrix inversion, Gauss Seidel
method –Newton- Raphson method
Unit 3: Statistics and Probability:
Regression and correlation – rank correlation – multiple and partial correlation – analysis of
variance-one way and two way classifications – experimental design – Latin square design
Unit 5: Transforms:
Laplace Transformer: LT of standard function, inversions and their application in civil engg.
Fourier Transformer: Fourier integral, Fourier transform and their application in civil engg.
Unit 6: Matrix method and Finite element:
Matrix method analysis (Stiffness) co ordinate calculation for different types of structure. Finite
element method basics (1D and 2D) co ordinate calculations.
Reference Books
5. Gupta, S.C. and Kapur, V.K., “Fundamentals of Mathematical Statistics ", Sultan Chand &
Sons, New Delhi, 1999.
Parallel and Distributed Computing
Scope and issues of parallel and distributed computing, Taxonomy of parallel structures, Control
mechanism, Address-Space Organization, Interconnection connection networks: Static and Dynamic
interconnection networks, evaluating static interconnection networks, embedding other networks
(Linear Array, Mesh, Binary Tree) into a hypercube; Routing mechanisms for static interconnection
networks: Store and Forward (SF) Routing; Cut - Theory (CT) Routing; Cost-Performance trade-off;
Architectural Models for Parallel Algorithm design, Simple message transfer between two processors;
One-to-all broadcast; All-to-all broadcast; Reduction and prefix sums; One-to-all personalized
communication; All-to-all personalized communication; circular shift, Performance matrices for
Parallel systems: Run time, Speed up, Efficiency and Cost; The effect of granularity and data mapping
on performance; Scalability of parallel systems; Iso-efficiency metric of scalability; Mini computer
model; Workstation pool model; Client-server model; Pool of processors model; Hybrid model
Network technologies and Protocols, Building blocks; Client-server communication; group
communication; Case study: Inter processor communication in UNIX; Design issues in Remote
procedure calling; Implementation; Case Studies: SUN and ANSA; Various sorting and searching
algorithms, performance metrics for parallel algorithm implementations.
References
1. Vipin Kumar, Ananth Grama, Anshul Gupta and George Karypis, Introduction to Parallel Computing,
Addison Wesley (2003) 2nd ed.
2. George Coulouris, Jean Dollimore and Tim Kindberg, Distributed Systems Concepts and Design, Addison-
Wesley (2000) 3rd ed.
3. S G Akl, The Decision and Analysis of Parallel Algorithms, Prentice Hall (1989).
4. Hwang, Kai, Advanced Computer Architecture: Parallelism, Scalability, Programmability, McGraw Hill
(1992).
5. J Jaja, An Introduction to Parallel Algorithms, Addison Wesley (1992).
6. T G Lewis and H El Rewini, Introduction to Parallel Computing, Prentice-Hall (1992).
7. M J Quinn, Parallel Computing: Theory and Practice, McGraw Hill (1994) 2nd ed.
Computer Architecture
Fundamentals of computer design, instruction set principles and examples, pipelining, advanced
pipelining and instruction-level parallelism, memory-hierarchy design and survey of design issues in
storage, interconnection network and multiprocessor systems.
Quantitative Measure of Performance for Evaluation of Designs, Instruction Set Architecture:
Principles and Examples, Process Design: Data path and control units, Pipelining: Advanced design
technologies and hazards, Instruction-level parallelism, Memory subsystems: Caches, Input/Output
subsystems: Interfacing I/O to CPU/OS, Memory subsystems: Caches, Architectural support for
security
References
1. Computer Organization and Design: The hardware/Software Interface (4th edition), By David A.
Patterson and John L. Hennessy, Morgan Kaufmann, 2008.
Concurrency & Recovery Management in Centralized DBMS, Concept of Transaction and its
properties, Scheduling of transactions, Conflict operations, Two Phase Locking protocol, Recovery
management in Centralized DBMS, Distributed DBMS - Concepts and design, functions and
architecture of a DDBMS, distributed relational database design, Transparencies in a DDBMS, Date’s
Twelve rules for a DDBMS, Distributed transaction management, distributed concurrency control,
distributed deadlock management, distributed database recovery, Replication servers, and
Distributed query optimization, Mobile databases
Advanced database applications, weakness of RDBMS, storing objects in a relational database, next-
generation database systems, OODBMS perspectives, persistence, issues in OODBMS, advantages and
disadvantages of OODBMS, Object-oriented database design, Object relational DBMS: Introduction,
third generation database manifestos, SQL8, Object oriented extensions in Oracle, Comparison of
ORDBMS and OODBMS, Web technology and DBMS
References
1. Thomas Connolly, Carolyn Begg, Database Systems, Dorling Kingsley (2009) 4th ed.
2. H. F. Korth and A. Silverschatz, Database Concepts, Tata McGraw Hill (2003) 3rd ed.
3. Hoffer, Prescott, Mcfadden, Modern Database Management, Pearson education (2008) 3rd ed.
4. Elmasri, Navathe, Fundamentals of Database systems, Addison Wesley (2003) 4th ed.
5. C. J. Date, An Introduction to Database Systems, Pearson education (2002) 7th ed.
6. C.S.R. Prabhu, Object-oriented Database Systems, Eastern Economy Edition (2005) 2nd ed.
Software Project Management
Characteristics of a software project, Software scope and feasibility, resources, the SPM plan,
Size/scope estimation, Decomposition techniques, WBS, Sizing, Function point, LOC, FP vs LOC, GANTT
Charts, Activity networks, PERT/CPM networks, COCOMO I, COCOMO II models, Quality control,
Quality assurance, Formal Technical Reviews, The SQA Plan, ISO and CMM standards, Reactive vs.
proactive Risk strategies, Risk projection, Risk Refinement, Risk Monitoring, Monitoring and
management, RMMM plan, Earned Value Analysis, Team structures: hierarchical, Egoless, chief
programmer, mixed; Team software Process; Resource leveling, Building a team: Skill sets,
Configuration Management: Baselines, Configurable items, SCM repository, SCM process, version
control change control, configuration audit, Project Monitoring and Control - Audits and Reviews
References
1. Pankaj Jalote, Software Project Management in Practice, Pearson Education Asia (2002).
2. Bob Hughes and Mike Cotterell, Software Project Management, Tata McGraw Hill Publishing Company
Ltd., New Delhi (2006) 3rd ed.
3. Roger Pressman, A practitioner’s Guide to Software Engineering, Tata McGraw Hill (2004).
4. Tom Demarco, Controlling Software Project Management, Measurement, Prentice Hall, New Jersey
(1982).
5. Watts S. Humphrey, Winning with Software An Executive Strategy, Pearson Education Asia (1998).
6. Philip Metzger, Managing A Programming Project, Prentice Hall, New Jersey (1983).
7. Tom Glib, Finzi Susannah, Principles of Software Engineering Management, Addison Wesley, England
(2000).
Introduction to the study of computer and network security from the view of information
warfare, Information system threats, vulnerabilities and defensive mechanisms including
cryptography, crypto-analysis, authentication, digital signatures, PKI, buffer overflow,
vulnerability analysis, penetration testing, firewall and IDS, DDoS attacks and their defenses
Introduction to computer and Network Security, Security policies and security standards,
Basic cryptography, Crypto-analysis, Digital certificate creation and signing, PKI, Use of digital
certificates in secure email and web system mutual authentication, Network Attacks,
Penetration Testing, Backtrack tool set, Nessus network scanner, and Metasploit, Buffer
Overflow attacks and defense, Network Defenses, Firewalls, IP tables, IDS, Snort, DDoS and
Autonomous Anti-DDos Defense, Access Control, Multilevel Security, SELinux, Privilege
Management
References
1. Ross Anderson, Security Engineering,John Wiley & Sons, ISBN 0-471-38922-6. (Can be downloaded here
- http://www.cl.cam.ac.uk/~rja14/book.html)
Security and Privacy in the Cloud
Security and privacy in the cloud, including confidentiality, integrity, and availability,
authentication, identity and access management in the cloud, Current state of cloud security
and privacy research
Review of the current state of data security and storage in the cloud, including confidentiality,
integrity, and availability, Identity and access management (IAM) practice for authentication,
authorization, and auditing of the users accessing cloud services, Discovery of security
management frameworks and standards relevant for the cloud, Understanding of privacy
aspects needed to consider in the cloud, including how they compare with traditional
computing models, Importance of audit and compliance functions within the cloud, various
standards and frameworks, Examination of security delivered as a service: a different facet of
cloud security
References
1. Cloud Security and Privacy: An Enterprise Per... (Paperback) by Tim Mather, Subra Kumaraswamy
Introduction to Fuzzy Logic, Classical and Fuzzy Sets: Overview of Classical Sets, Membership Function,
Fuzzy rule generation, Fuzzy Sets: Compliment, Intersections, Unions, Combinations of
Operations,Aggregation Operations,
Fuzzy Arithmetic, Fuzzy Numbers, Linguistic Variables, Arithmetic Operations on Intervals & Numbers,
Lattice of Fuzzy Numbers, Fuzzy Equations,
Introduction of Neuro-Fuzzy Systems, Architecture of Neuro Fuzzy Networks,
Application of Fuzzy Logic: Medicine, Economics etc,
An Overview of Genetic Algorithms (GAs), GA operators, GA in problem solving, Implementation of GA
References
Review of Protocols & Packet Format, Network Systems & the Internet, Network Systems
Engineering, Packet Processing, Achieving high speed, Network Speed, Hardware, Software &
hybrids, A conventional computer system, Fetch-Store paradigm, Network Interface Card
functionality, Onboard address recognition, Packet Buffering, Promiscuous mode
IP Datagram, Fragmentation, Reassembly, Forwarding, TCP Splicing, RISC vs CISC, Network Processors,
Ingress & Egress Processing, Parallel & Distributed Architecture, Network Processor Design, Examples
of Commercial Network Processors, Overview of Intel Network Processor, Micro engine Programming,
Core Programming
References
1. Network Systems Design using Network Processor, Douglas Comer, Pearson Education, ISBN 81-7808-
994 (2004).
2. IXP 1200 Programming, Erik J. Johnson and Aaron Kunze, Intel Press (2002).
References
1. Solaris Internals, Second Edition: Richard McDougall, Jim Mauro, Pearson Education: ISBN: 81-317-
1620-1(2009).
2. Open Solaris student guide, available from Sun Microsystems.
Software Engineering for Embedded Systems
Programming in assembly Language and High level language C /C++ and/OR Java. Compilers and Cross
compilers, Source Code Engineering Tools, Programme modeling concept in single and multiprocessor
system software, Software Engineering Practices in the Embedded software Development Process
System-on-a-Chip (SoC), IP Blocks and Design Reuse, Processor Cores and SoC, Non-programmable
accelerators, reconfigurable logic, multiprocessing on a chip, symmetric multiprocessing,
heterogeneous multiprocessing, use of simulators, Compilers, Loaders, Linkers, locators, assemblers,
Libraries, post run optimizer, debuggers, profiling techniques, binary utilities, linker script, system
simulation, In Circuit Emulation, Validation and verification, Hardware Software partitioning, Co-
design
References
Digital data transmission modes, methods and media, Encoding & decoding principles, Identify and
describe the protocol data units, networking devices, and purpose of the seven layers of the OSI model
and compare that with the TCP/IP protocol stack, Protocols on the transport layer, reliable
communication. Routing packets through a LAN and WAN, Link State and Distance Vector, Compare
and contrast different data-link protocols including Ethernet, Token Ring and Wireless (802.11).
References
1. James F. Kuros and Keith W. Ross. Computer Networking: A Top-Down Approach (2002).
2. Featuring the Internet, Addison Wesley (2001) 3rd ed.
Machine Learning
Designing a Learning System, Perspectives and Issues in machine learning, Decision Tree learning,
Appropriate problems for decision tree Learning, Basic Decision tree learning algorithms, Issues in
Decision tree learning, Estimating Hypothesis accuracy, Comparing learning algorithms, Analytical
Learning: Inductive and Analytical learning problems, Explanation based learning of search control
knowledge
Introduction to Regular Expression and Finite Automata, Follow Automata, Conversion of DFA to RE
using vertical and horizontal chopping, Multi-node loop, Reducing NFAs by invariant equivalences,
Finite automata on infinite words and trees, Finite automata and monadic second order (MSO) logic
on words and trees, Decidability of MSO theory of various infinite graphs, Application of Regular
expression in Natural Language processing, Finding pattern in DNA and protein sequence, grep in Unix,
Regular expression in Scheduling of process, Regular expression in perl, Context free grammar and
Parsing, Application of context free grammar in Markup language and XML
References
Interprocess communication using pipes, FIFO or named pipes, Mutex and Condition variables, Record
locking, IPC facilities: Message passing, Semaphores, shared memory, Multitasking with Processes and
Threads, Scheduling, Synchronization, Memory, Communications, TCP Client algorithms, Socket
Interface, Programming a UDP Client. The Conceptual Server algorithm, Basic Types of Servers and
their comparisons, Interactive Server algorithms, Concurrent Server algorithms, Problem of Server
Deadlock, Architecting Portable Application Code, Architecting Platform-Independent Source-Code,
Operating System / Communications/ File System independent modules, Client Server Applications
Architecting using Frameworks
References
1. Douglas E. Comer, David L. Stevens, Inter-networking with TCP/IP: Client Server Programming and
Applications: Vol. III, PHI (1996).
2. Jaffrey D. Schank, Client server Applications and Architecture, BPB Novell press (2000).
3. Douglas J. Reilly, Client-server Developers guide, Addision Wesley Developers press (1999).
Web Services
Managing the web services specifications, key components, tools and vendors, advantages of web
services, disadvantages and pitfalls of Web Services, comparison of web services and other
technologies, Goals, SOA, Major components of the architecture SOAP, XML, HTTP, Cookies, WSDL,
XML schema, UDDI, Interactions between components
References
1. Understanding Web Services, XML, WSDL, SOAP, and UDDI, Eric Newcomer (2002).
2. Web Technologies: A complete Science Perspective, Jeffrey C. Jackson,, Pearson Education(2007).
3. Understanding SOA with Web Services, Eric Newcomer, Greg Lomow, Pearson Education (2004).
Aspect Oriented Programming
Evolution of programming methodologies, What are aspects and how are they useful, OOPS Vs. AOP,
What kind of problems can AOP solve, Tips and tricks for effective use of AOP , different AOP tools,
importance of AOP in software development, Global trends in software development using AOP,
Thinking aspects - in software design, code and testing. Writing and deploying reusable aspects, Using
AOP to get more value from design patterns, Writing efficient AOP code Separation of concerns, point-
cuts, Static aspects Dynamic aspects, Introduction to AspectJ, Meta-AspectJ, String templates,
Template meta-programming, Domain modelling, Model transformations, Model-driven Architecture
(MDA) , Embedding Domain-specific Languages
References
1. Siobhán Clarke, Elisa Baniassad , “Aspect-Oriented Analysis and Design: The Theme
Approach”, Addison-Wesley Object Technology Series (2005).
2. Ivan Kiselev, “Aspect-Oriented Programming with AspectJ”, SAMS (2002).
3. Ramnivas Laddad, “AspectJ in Action: Practical Aspect-Oriented Programming”, Manning (2003).
4. Adrian Colyer, Andy ClementGeorge Harley Matthew Webster, “ Eclipse AspectJ: Aspect-Oriented
Programming with AspectJ and the Eclipse AspectJ Development Tools”, Addison-Wesley Professional
(2004).
5. Kleppe, Anneke G. “The model driven architecture : practice and promise”, Addison-Wesley (2003).
6. The AspectJ Programming Guide. Available at:
http://www.eclipse.org/aspectj/doc/released/progguide/index.html.
Software Product Assurance
References
Software Metrics
Measuring size, aspects of software size, length, functionality and complexity, measuring structure,
types of structural measures, control-flow structure, modularity and information flow attributes, data
structures, Modeling software quality, measuring aspects of software quality, software reliability,
basics of software reliability, software reliability problem, parametric reliability growth models,
predictive accuracy, recalibration of software-reliability growth predictions, importance of
operational environment, wider aspects of software reliability, The intent of object-oriented metrics,
distinguishing characteristics of object-oriented metrics, various object-oriented metric suites LK
suite, CK suite and MOOD metrics, Runtime Software Metrics, Extent of Class Usage, Dynamic
Coupling, Dynamic Cohesion, and Data Structure Metrics, The intent of component-based metrics,
distinguishing characteristics of component-based metrics, various component-based metrics,
Measuring productivity, teams, tools, and methods.
References
1. Norman E. Fenton and Shari Lawrence Pfleeger, Software Metrics: A rigorous and Practical Approach,
International Thomson Computer Press (1997) 2nd ed.
2. Capers Jones, Applied Software Measurement, McGraw Hill (2008).
3. Mark Lorenz, Jeff Kidd, Object-Oriented Software Metrics, Prentice Hall (1994).
4. Robert B Grady, Practical Software Metrics For Project Management And Process Improvement, Hewlett
Packard Professional Books (2004) 1st ed.
Real Time Software and Systems
Real Time Software (RTS), Characteristics of RTS, Real Time Operating Systems (RTOS), Types of RTOS,
Characteristics of RTOS, Processors and micro controllers of RTS, Skill set required for various types of
RTS, SDLC for RTS, Process models for RTS-SPIRAL, incremental Xtreame, prototyping, RAD, Risk &
Failure Analysis
RT requirement eliciation and analysis using structured and object-oriented approach, Applications of
formal methods for requirement specification, Architecture properties, RT Architecture, design
temporal & non temporal, Techniques, scheduling- (Tasks, T&S, RM scheduling), verification&
validation, test strategy, RTS test techniques, Introduction to languages used for development of RTS,
Introduction to Tools
References
1. Alan C Shaw: Real-Time Systems and software, John Wiely and Sons (2001).
2. Philip Laplante: Real-Time Systems and design and analysis, an engineer’s handbook, IEEE computer
society press (2004) 3rd ed.
3. J. E .Cooling:Software design for Real-Time Systems, Chapman and Hall(1991).
4. Krishna M Kavi, Real-Time Systems, abstraction, languages and design methodologies, IEEE Computer
Society press (1998).
Digital image representation, fundamental steps in image processing, elements of digital image
processing systems digitization, A Simple Image Model, Sampling and Quantization, Relationship
between Pixel, Image Formats, Image Transforms, Histogram processing, image subtraction, image
averaging, smoothing filters, sharpening filters, enhancement in frequency and spatial domain, low
pass filtering, high pass filtering
References
1. Gonzalez, R.C., and Woods, R.E., Digital Image Processing, Dorling Kingsley (2009) 3rd ed.
2. Jain A.K., Fundamentals of Digital Image Processing, Prentice Hall (2007).
3. Tekalp A.M., Digital Video Processing, Prentice Hall (1995).
4. Ghanbari M., Standard Codecs: Image Compression to Advanced Video Coding, IET Press (2003).
5. Sonka M., Image Processing and Machine Vision, Prentice Hall (2007) 3rd ed.
6. Wang Y., Ostermann J., and Zhang Y., Video Processing and Communications, Prentice Hall (2001).
Grid Computing
Definition of Grid, history and evolution of Grid Computing, Virtual Organizations, Computational Grid
projects around the world, Grid challenges, Grid organizations, Service Oriented Architecture (SOA),
Issues in Management of Grid Models, Components of Layered Grid Architecture, Open Grid Services
Architecture (OGSA), Grid architecture models, Grid Resource Information Service (GRIS). Resource
infrastructure, Globus: Overview, resource specification language, information services, Globus
Resource Allocation Manager (GRAM), job submission with managed-job-globusrun, security,
scheduling, Grid FTP protocol, overview of other middleware like Condor, Condor-G
Resource Discovery and Information Services, Information directory services, schedulers and resource
brokers, Characterization of resource management problems based on job requirements, algorithms,
tools and sample resource management systems, Monitoring, Scheduling, Performance tuning,
Debugging and performance diagnostic issues, Grid security demands and solutions; authentication,
authority, assurance, accounting, trust, group communication for large-scale, dynamic, multi-
organization environments, Functionality and underlying infrastructure for sample general and
application specific portals, Key issues for data management in Grids, including file transfer, data
replication, data caching issues, catalog issues, Topics from Seti project, Sun Grid engine, EuroGrid and
some other national grid projects, Overview of Grid simulation, Grid Economy, Semantic Grid,
Autonomic Grid, Cloud Computing.
References
1. Foster, I. and Kesselman, C. (eds.). The Grid: Blueprint for a New Computing Infrastructure. Morgan
Kaufmann Publishers, (1999).
2. Luis Ferreira et al., Grid Computing in Research and Education, ibm.com/redbooks, (September 2003).
3. Joshy Joseph and Craig Fellenstein, Grid Computing, Person Edition, (2004).
4. Ahmar Abbas, Grid Computing: A Practical Guide to Technology and Applications, Firewall Media (2004).
5. Maozhen Li, Mark Baker, “The Grid Core Technologies”, John Wiley & Sons, (2005).
Cryptographic protocols for mobile & wireless networks, management issues in mobile and
wireless computing, privacy and anonymity in wireless computing, security architecture
& protocols in WLANs, B3G/4G mobile networks, security and privacy in mobile and
wearable devices, sensors to enable security, security and privacy in pervasive
computing.
References
Transclusion: Client and Server based remixing of Information. Working with XML, Validating XML
content, Online bookmarking, Designing, Creating and Publishing Blogs, RSS, Wikis, Bookmark sharing,
Folksonomies and tagging, Tag cloud to blogs, Online sharing, RDF, Design, Create and Publish,
Webcasts, AudioPodCasts, VideoPodCasts, Screencasts, Using Camtasia, Create API for use with
Meshups, reuse API from Google/ Yahoo/ Microsoft: GIS / Maps / Satellite tools, Use SWX API with
social networking sites like: Flickr or Twitter
References
1. Raymond Yee, Pro Web 2.0 Mashups: Remixing Data and Web Services, ISBN( Feb 2008).
2. Scott Davis, Google Maps API V2 at (http://www.pragprog.com/titles/sdgmapi2/google-maps-api-v2).
Threats, enforcing security, authentication processes, encryption of data, defensive programming and
ethical hacking in addition to ASP.NET
References
Component Definition: Definition of Software Component and its Elements. Component Models and
Component Services: Concepts and Principles, COTS Myths and Other Lessons Learned in Component-
Based Software Development, Roles for Component-Based Development, Common High Risk Mistakes
in Component-Based Software Engineering, CBSE Success Factors: Integrating Architecture, Process,
and Organization, Software Engineering Practices: The Practice of Software Engineering, From
Subroutines to Subsystems: Component-Based Software Development, The Design Of Software
Component Infrastructures: Software Components and the UML, Component Infrastructures: Placing
Software Components in Context, Business Components, Components and Connectors: Catalysis
Techniques for Defining Component Infrastructures, An Open Process for Component-Based
Development, Designing Models of Modularity and Integration
The Management Of Component-Based Software Systems: Measurement and Metrics for Software
Components, The Practical Reuse of Software Components, Selecting the Right COTS Software: Why
Requirements are Important, Software Component Project Management Processes, The Trouble with
Testing Software Components, configuration Management and Component Libraries, The Evolution,
Maintenance and Management of Component-Based Systems, Component Technologies: Overview
of the CORBA Component Model, Transactional COM+: Designing Scalable Applications, The
Enterprise JavaBeans Component Model, Choosing Between COM+, EJB, and CCM, Software Agents
as Next Generation Software Components, Legal And Regulatory: CBSE as a Unique Engineering
Discipline, The Future of Software Components: Standards and Certification, Commercial Law
Applicable to Component-Based Software, The Effects of UCITA on Software Component Development
and Marketing, Future of CBSE
References
References
1. A Quantitative Approach by David A. Patterson, John L. Hennessy, David Goldberg, MKP (2006) 3rd ed.
2. Parallel Computer Architecture: A Hardware/Software Approach David Culler and J.P. Singh with Anoop
Gupta, Morgan Kaufmann (August 1998).
3. High-performance Computer Architecture, by Harold Stone Addison Wesley (1993) 3rd ed.
Software Engineering Concepts and Methods
Principles of software projects management; Organizational and team structure; Project planning;
Project initiation and Project termination; Technical, quality, and management plans; Project control;
Cost estimation methods: Function points and COCOMO, Quality control, quality assurance and
quality standards with emphasis on ISO 9000; Functions of software QA organization does in a project;
interactions with developers; Quality plans, quality assurance towards quality improvement; Role of
independent verification & validation; Total quality management; SEI maturity model; Software
metrics, Need for configuration management; Configuration management functions and activities;
Configuration management techniques; Examples and case studies, Basic Terminology, Testing
Techniques and strategies, Brief introduction to various standards related to Software Engineering
References
1. Pressman, Roger, Software Engineering - A Practitioners Approach, McGraw Hill (2008) 6th ed.
2. Sommerville, Ian, Software Engineering, Addison-Wesley Publishing Company, (2006) 8th ed.
3. Peter, James F., Software Engineering - An Engineering Approach, John Wiley (2004).
4. Jalote, Pankaj, An integrated Approach to Software Engineering, Narosa (2005).
Nature and objectives of research, Study and formulation of research problem, Scope and formulation
of hypothesis, Preparation and presentation of research proposal using statistical package, Appraisal
of axiomatic approach of probability, Conditional probability, Baye’s rule, Conditional distributions,
and conditional expectations, Basics of markov chains, Finite state space, Markov chains, Transition
and stationary markov chains. Continuous time markov process: continuous time branching processes,
Kolmogorov, Forward and backward equations, Pure birth, Pure death, Birth and death process
One Way Classification: ANOVA for fixed effect model, ANOVA for Random Effect Model, Two-way
Classification (one observation per cell): ANOVA for fixed effect model, ANOVA for Random Effect
Model, Completely Randomised Design, Randomised Block Design, Latin Square Design, their
statistical analysis and variance of estimates, Analysis of Covariance, Introduction, multivariate normal
distributions, Mean vector, Variance-covariance matrix, Correlation matrix and their estimation for
multivariate data., Step wise regression, Selection of best set of variables, Classification and
discrimination problems. Factor analysis and principal component analysis. Illustrative examples and
Multivariate data analysis using statistical package
Components of time series, Analysis of time series, Measurement of trend, Measurement of seasonal
variations , Measurement of cyclic variations , Auto-Regression Analysis, Auto-correlation , Random
component in time series, Implementation of statistical techniques using statistical packages viz. SPSS,
Mathematica including evaluation of statistical parameters and data interpretation, Regression
Analysis, covariance, Analysis of variance, multivariate data analysis and problems based on time
series and forecasting
References
Arrays, linked lists, stacks, queues, binary trees, hashing, graphs, sorting & searching techniques,
Properties of sparse matrices, Linked list representation of sparse matrices,
Properties of threaded trees, insertion, deletion and traversal, Properties of AVL trees, rotations,
insertion and deletion, Properties of red-black trees, rotations, insertion and deletion, Definition of B-
trees, basic operations on B-trees, deleting a key from a B-tree,
Properties of Min-max heaps, building a heap, basic operations on heaps, application of min-max
heaps
Binomial tress and binomial heaps, operations on binomial, Structure of Fibonacci heaps, merge able
heap operations, decreasing a key and deleting a node, bounding a maximum degree, Disjoint set
operations, linked list representation of disjoint sets, disjoint set forests, Topological sort, minimum
Spanning tree, single-source shortest paths, all-pairs shortest paths, bi-connected components,
strongly connected components, cycles, articulation points, bridges, string-matching algorithm, Rabin-
Karp algorithm, String matching with automata, Knuth-Morris-Pratt algorithm, Boyer-Moore
algorithm
References
1. Thomas Coremen, Introduction to Algorithms, Second edition, Prentice Hall of India (2007) 2nd ed.
2. Mark Allen Weiss, Data Structures & Algorithm analysis in C, Dorling Kingsley (2002) 3rd ed.
3. Tannenbaum, Augenstein and Langsam, Data Structures using C and C++, Dorling Kingsley (2008) 3rd
ed.
Text & Web Mining
Syllabus
Preprocessing Data: Data Cleaning, Data Integration, Data Reduction ,Data Transformation and Data
Discretization
2. Association Rule Mining: Different Algorithms for Association Rule Mining, Mining with Multiple
minimum support, Sequential pattern Mining, Mining Navigational Patterns, Markov Chain for
Navigational Data
3. Supervised Learning: Basic Concepts, Decision tree Induction, Rule based Algorithm, Naive Bayes,
k-nearest Neighbor, Ensemble Methods, Evaluation of Classifiers
5. Foundation of Web Mining: Characteristics of Web Data, Web Data Model; Textual, Linkage and
Usage Expressions; Similarity Functions, Information Retrieval, Performance Evaluation Metrics, Web
Mining Categories, Techniques and Applications,
Web Content Mining: Structured Data Extraction, Building DOM trees, Web Crawling, Web Search,
Feature Enrichment of Short Texts, Automatic Topic Extraction from Web Documents
Web Structure Mining: Web Search and Hyperlinks, Co-citation and Biographic Coupling, Page Rank
and HITS Algorithm, Weighted Page Rank Algorithm, Web Graph Measurement and Modeling, Using
Link Information for Web Page Classification.
Web Usage Mining: Modeling Web User Interests, Discovery and Analysis of Web Usage
Patterns, Clustering user sessions and web pages, Mining Web Logs
to Improve Website Organization.
6. Text Mining :Text Mining Tasks & Usage, Information Extraction, Document Clustering, Document
Classification, Feature vector Generation, Supervised & Unsupervised Algorithms for text Data
7. Recommendation Systems: User based and Item based Collaborative Filtering Recommender
Systems, Web Query Recommendations. References
References:
1. Bing Liu, Web Data Mining: Exploring Hyperlinks, Content, and Usage Data, Springer, Second
Edition.
2. Ian Witten, Eibe Frank,, Data Mining: Practical Machine Learning Tools and Techniques,
Morgan Kaufmann, Third Edition.
3. Yi-Fang Brook Wu, Min Song, Handbook of Research on Text and Web Mining Technologies, IGI
Global, .62
Text Mining & Analytics
References :
1.Mining Text Data. Charu C. Aggarwal and ChengXiang Zhai, Springer, 2012.
2. Speech & Language Processing. Dan Jurafsky and James H Martin, Pearson Education
India, 2000.
Literature search, selection of research topic (case study based), maintaining laboratory records
(case study based). Safety in Laboratories, Ethical considerations.
Writing research paper and/or thesis, making a presentation, writing a research proposal, and
patents in Science, technology.
Introduction, Intellectual Property (IP) Vs. Physical property, Importance of IP, Basic principles of
IPR, Economic Importance of IPR,
Types of IPR - Patents, Copyright, Industrial Design, Trade Marks, Trade Secrets, GI, etc.
Introduction to Patents, Examples, Patentable Inventions as per the Indian Patent Act, Non-
patentable inventions in Indian Patent act, Patent searching, Types of Patent applications, Procedure
for filing application (National and International), Patents offices, Register of Patents
Introduction to Patent Drafting, structure of the patent specification: Field of invention, prior art,
patent classifications, technical advance, Invention Disclosure Form, problem-solution statement
How to write claims, Case studies discussion and practice of drafting patents
Rights and obligations of the patentee, Term of patent, Patent of Addition, How to write claims, Case
studies discussion and practice of drafting patents, Compulsory Licensing, Revocation of patents,
Concept of Infringement, Case study discussions, Patent Co-operation Treaty (PCT),
Commercialisation of Patents, Advances in IPR, Summary, and Conclusion
References
1. Mishra, “An Introduction to Intellectual property Rights”, Central Law Publications
2. R Anita, V. Bhanoji Rao, “Intellectual property Rights, - A Primer”, Eastern book Company
3. R Puri, “Practical approach to intellectual property Rights”
4. Niraja Pandya, Kushdeep Dharni, “Intellectual property Rights”
5. P Ganguly, “IPR unlisting the Knowledge economy”
4. Niraja pandya, kushdeep dharni, “Intellectual property Rights”
5. P Ganguly, “IPR unlisting the knowlege economy”
Data Analytics through Mathematical Modeling
Course description:
Data analytics is the science of analyzing data. The first step in analytics is to understand the data,
its nature, subtle variations, and clear interrelationships. In this class, students learn to appreciate,
extract, and simulate the behavior of observed data. Prime objective of this course is to write
compact equations for a given dataset by using mathematical modeling techniques. These
equations are further used for making forecasts.
Course Outline:
Statistical Preliminaries: Understanding the central tendencies of a time series. Explaining the data
sets using data variance, covariance, correlation coefficient, autocorrelation.
Noise in data: The nature of noise, its impact on linear representation, outliers, the concept of signal
to noise ratio.
Linear regression, deriving the equations for linear regression.
Stochastic and deterministic systems and models. Bridging the gap between stochastic and
deterministic leading to ARMA.
Auto-Regressive and Moving Average (ARMA) models. Conditions for using the ARMA models.
Beginning with the order (1,0) and leading to (m, n). Backshift operator, Green’s function.
Extracting equations from a dataset exhibiting sinusoidal varying patterns, logarithmic variations,
and exponential variations. Weibull distribution.
Converting observational facts into mathematical equations. Differential equation-based modeling.
An introduction to Markov models. Applications for banking, hospitals, and other businesses.
Case studies, papers, related to complex systems models will be discussed.