Syllabus
Syllabus
COURSE STRUCTURE
M. Tech. (IT) Curriculum, 2021-22
1st SEMESTER
SL. CONTACT
PAPER CODE PAPER NAME L T P CREDIT
NO. HRs./WEEK
THEORY
01 ITPC101 Advanced Engineering Mathematics 3 1 0 4 4
02 ITPC102 Advanced Computer Architecture 3 1 0 4 4
03 ITPC103 Computer Network 3 1 0 4 4
04 ITPEC101 A: Internet and Web Technology 3 0 0 3 3
B: Advanced Software Engineering
C: Advanced Data Structures
05 ITPEC102 A: Information Theory and Coding 3 0 0 3 3
B: Pattern Recognition
C: Digital Signal Processing
D: Cloud Computing
06 ITAUD101 A: Indian Constitution 2 0 0 2 0
B: Value Education
C: Pedagogy Studies
D: Stress Management by Yoga
SESSIONAL/PRACTICAL
01 ITPCL101 PC Lab. I 0 0 3 3 1.5
02 ITPEC101(A/B/C)L PEC101 Lab. 0 0 3 3 1.5
03 ITASGN101 Seminar 0 0 0 0 1
TOTAL 17 3 6 26 22
nd
2 SEMESTER
SL. CONTACT
PAPER CODE PAPER NAME L T P CREDIT
NO. HRs./WEEK
THEORY
01 ITPC204 Advanced Operating System 3 1 0 4 4
02 ITPC205 Database Design 3 1 0 4 4
03 ITPC206 Advanced Algorithm 3 1 0 4 4
04 ITPEC203 A: Image and video Processing 3 0 0 3 3
B: Machine Learning
C: Soft Computing
05 ITPEC204 A: Mobile Computing 3 0 0 3 3
B: IoT and Its Application
C: Data Mining
06 ITRES201 Research Methodology and IPR 2 0 0 2 2
SESSIONAL/PRACTICAL
01 ITPCL202 PC Lab. II 0 0 3 3 1.5
M. Tech. (IT) Curriculum, 2021-22
TOTAL 3 0 18 21 13
th
4 SEMESTER
SL. CONTACT
PAPER CODE PAPER NAME L T P CREDIT
NO. HRs./WEEK
SESSIONAL/PRACTICAL
01 ITPRJ403 Dissertation (Part 3) 0 0 24 24 12
TOTAL 0 0 24 24 12
(Total Credit=22+25+13+12=72)
M. Tech. (IT) Curriculum, 2021-22
FIRST SEMESTER
M. Tech. (IT) Curriculum, 2021-22
1st SEMESTER
SL. CONTACT
PAPER CODE PAPER NAME L T P CREDIT
NO. HRs./WEEK
THEORY
01 ITPC101 Advanced Engineering Mathematics 3 1 0 4 4
02 ITPC102 Advanced Computer Architecture 3 1 0 4 4
03 ITPC103 Computer Network 3 1 0 4 4
04 ITPEC101 A: Internet and Web Technology 3 0 0 3 3
B: Advanced Software Engineering
C: Advanced Data Structures
05 ITPEC102 A: Information Theory and Coding 3 0 0 3 3
B: Pattern Recognition
C: Digital Signal Processing
D: Cloud Computing
06 ITAUD101 A: Indian Constitution 2 0 0 2 0
B: Value Education
C: Pedagogy Studies
D: Stress Management by Yoga
SESSIONAL/PRACTICAL
01 ITPCL101 PC Lab. I 0 0 3 3 1.5
02 ITPEC101(A/B/C)L PEC101 Lab. 0 0 3 3 1.5
03 ITASGN101 Seminar 0 0 0 0 1
TOTAL 17 3 6 26 22
4. To learn the concept of eigen values, eigen vectors, diagonalisation of matrices for understanding
engineering problems.
5. To understand counting techniques and combinatorics in the context of discrete probability.
6. To learn recurrence relations and generating functions.
7. To understand basic concept of modelling system using fuzzy set.
Pre-Requisite:
1. Discrete Mathematics
2. Engineering Mathematics (UG level)
Module Content Hours Marks
1 Integral Transform: Fourier Series and Transform: Periodic functions, 8
Trigonometric functions, Trigonometric Series, Fourier series, Dirichlet conditions,
Euler formula for Fourier coefficients, Even and Odd functions, Half range series
expansion, Parseval’s formula.
Fourier transform, Properties of Fourier transform, Fourier sine and cosine
transform, Convolution theorem, First Fourier transform.
2 Z- Transform: Sequence, Representation of sequence, Basic operations on 4
sequences, Z-transforms, Properties of Z-transforms, Change of scale, Shifting
property, Inverse Z-transform, Solution of difference equation , Region of
convergence.
3 Advanced Linear Algebra: 10
Vector / Linear Space: Definitions and examples, Subspace, Union and
intersection of subspaces, Linear sum of two subspaces, Linear combination,
independence and dependence, Linear span, Generators of vector space, Finite
dimensional vector space, Replacement Theorem, Extension theorem, Statement
of the result that any two bases of a finite dimensional vector space have same
number of elements. Dimension of a vector space, Extraction of basis, formation
of basis with special emphasis on Rn (n ≤ 3),
Eigenvalue and eigenvectors of matrices, Caley Hamilton Theorem, Simple
properties of eigenvalues and eigenvectors- for symmetric, and general matrices,
Diagonalisation.
4 Counting Technique: Permutations, Combinations, Binomial Coefficients, Pigeon- 3
hole principle, Principles of inclusion and exclusions.
5 Recurrence Relation: Formulation, modeling, of different counting problems in 8
terms of recurrence relation, Solution of Linear recurrence relations with
constant coefficients (upto second order) by 1) iterative method, 2) characteristic
roots method, 3) generating functions method.
Stochastic Process: Review of probability, Random variable, Random process,
Random walk, Brownian motion, Markov process.
6 Fuzzy sets: Introduction, crispness, vagueness, fuzziness, uncertainty. Basic 7
definitions and examples, basic set theoretic operations – union, intersection,
M. Tech. (IT) Curriculum, 2021-22
Learning Resources:
1 Hayes, ―Computer Architecture and Organiza on, McGraw-Hill
2 Stallings William, "Computer organization and architecture, designing for performance", Prentice
Hall of India.
3 J. L. Hennessy and D. A. Patterson, "Computer architecture: a quantitative approach", Harcourt Asia,
Singapore.
4 Hwang and Briggs, ―Computer Architecture and Parallel Processing, TMH.
5 Hamacher, Computer Organization, McGraw-Hill
6 M. R. Bhujade, Parallel Computing, Newage International Pvt. Ltd
Session Bean, Entity Bean, Message Driven Bean, Writing Enterprise Bean,
Introduction to EJB, Enterprise Bean Architecture, Benefits of Enterprise Bean,
Types of Enterprise Bean, Writing Enterprise Beans.
Course Outcomes:
After completion of this course, the learners will be able to -
CO1 Illustrate the concepts of Internetworking and some of its common services and security.
CO2 Apply the skills related to client-side validation technique and able to recognize different aspects of
document type definition in web design.
CO3 Design the front-end of any web application with the help of associated technologies and
CO4 Categorize different database management system and also able to perform different database
CRUD operations.
CO5 Create dynamic web pages and also be able to develop server-side scripting for server-side
processing.
CO6 Apply user sessions in dynamic web project and also be able to design enterprise business logic.
Learning Resources:
1 Java EE for Beginners, Sharanam Shah, SPD Publications.
2 Beginning Java EE 5: From Novice to Professional, Mukhar and Zelenak, Apress.
3 Behrouz A. Forouzan, ―Data Communica ons and Networking, 4th Edi on, Tata McGraw-Hill.
4 Professional Java Server Programming, Allamaraju, WROX Publishers.
5 Java Server Programming Java EE 7 (J2EE 1.7), Kogent Learning Solutions Inc.
CO1 Describe the hash function and concepts of collision and its resolution methods.
CO2 Implement algorithms for skip lists.
CO3 Apply tree data structure in various problems.
CO4 Analyze algorithms for various variations of Heaps.
CO5 Identify suitable data structures for Multidimensional Searching.
Learning Resources:
1 Ellis Horowitz, Sartaj Sahni, Susan Anderson Freed, “Fundamentals of Data Structures in C”, Second
Edition, Universities Press, 2008.
2 Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, 4th Edition, Pearson, 2004
3 Data Structures and Algorithms, 3/e, Adam Drozdek, Cengage
4 Michael T Goodrich, Roberto Tamassia, Data Structures and Algorithms in C++, Second Edition John
Wiley & Sons, Inc., 2011.
5 Yedidyah Langsam, Moshe J. Augenstein, Aaron M. Tenenbaum, “Data Structures using C and C++”,
Second Edition, PHI Learning Private Limited, 2010
6 Ellis Horowitz, Dinesh Mehta, Sartaj Sahni, Fundamentals of Data Structures in C++, University Press
Function.
2 Source Coding: Entropy and Coding, Shannon-Fano Coding, Variable-Length 6
Codes: Unique Decoding, Instantaneous Codes, Construction of Instantaneous
Codes, Prefix tree for prefix code, The Kraft Inequality, Huffman codes.
3 Information Channel: Channel models, channel capacity, channel coding, 4
information capacity theorem, The Shannon limit.
4 Error Control Coding: Introduction, Examples of Error control coding, Minimum 7
Distance of a Block code, Linear Block Codes: Matrix description of linear block
codes, Error-Detecting and Error-correcting Capabilities of a Linear Block code,
parity check matrix, Encoding and decoding of Linear Block-codes, Syndrome
Decoding, Hamming Codes.
5 Cyclic Codes: Polynomial representation of codewords, Generator Polynomial, 10
Systematic Codes, Syndrome Calculation and Error Detection, Decoding of Cyclic
Codes, Generator and Parity-check Matrices, Golay Codes, Introduction to Galois
Field, BCH Codes: Properties of BCH codes, examples of BCH codes; Reed
Solomon Code.
6 Convolutional Codes: Introduction, Polynomial description of Convolutional 5
Codes, Generating function, Matrix description of Convolutional Codes, Viterbi
Decoding of Convolutional codes, Trellis codes
Course Outcomes:
After completion of this course, the learners will be able to-
CO1 explain the basic notions of information and channel capacity.
CO2 analyse the channel performance issues using Information theory.
CO3 illustrate various properties of error control coding
CO4 implement some linear block codes and cyclic codes for error detection and correction
CO5 justify BCH & RS codes for Channel performance improvement against burst errors.
CO6 apply convolution codes for performance analysis.
Learning Resources:
1 Information theory, coding and cryptography - Ranjan Bose; TMH.
2 Introduction to Error Control Codes – S Gravano; Oxford.
3 Coding and Information Theory – R. W. Hamming; Prentice Hall.
4 Information and Coding Theory - G. A. Jones and J. M. Jones ; Springer – Verlag.
5 Essentials of Error-Control Coding – Jorge C. Moreira and Patrick G Farrell; Wiley.
6 Error Control Coding - Shu Lin and D J Costello Jr.; Prentice Hall.
CO4
CO5
Learning Resources:
1 Devi V.S.; Murty, M.N. (2011) Pattern Recognition: An Introduction, Universities Press, Hyderabad.
2 R.O.Duda, P.E.Hart and D.G.Stork, Pattern Classification, John Wiley, 2001.
3 Statistical pattern Recognition; K. Fukunaga; Academic Press, 2000.
4 S.Theodoridis and K.Koutroumbas, Pattern Recognition, 4th Ed., Academic Press, 2009.
SECOND SEMESTER
M. Tech. (IT) Curriculum, 2021-22
2nd SEMESTER
SL. CONTACT
PAPER CODE PAPER NAME L T P CREDIT
NO. HRs./WEEK
THEORY
01 ITPC204 Advanced Operating System 3 1 0 4 4
02 ITPC205 Database Design 3 1 0 4 4
03 ITPC206 Advanced Algorithm 3 1 0 4 4
04 ITPEC203 A: Image and video Processing 3 0 0 3 3
B: Machine Learning
C: Soft Computing
05 ITPEC204 A: Mobile Computing 3 0 0 3 3
B: IoT and Its Application
C: Data Mining
06 ITRES201 Research Methodology and IPR 2 0 0 2 2
SESSIONAL/PRACTICAL
01 ITPCL202 PC Lab. II 0 0 3 3 1.5
02 ITPEC203(A/B/C)L ITPEC203 Lab. 0 0 3 3 1.5
03 ITPRJ201 Dissertation (Part 1) 0 0 4 4 2
TOTAL 17 3 10 30 25
5 Advanced Concepts in operating Systems - Mukesh Singhal and Niranjan G. Shivaratri, TMH
6 Distributed Operating system- A S Tanenbaum- Pearson
7 Real-Time and Embedded Guide by Herman B.
Objective:
1. Introduce students to correctness proof of algorithms
2. The student should be able to select appropriate algorithm for a specific problem
3. To learn new techniques for solving specific problems more efficiently
4. To learn various algorithmic techniques for efficient processing of string data
5. To introduce the power of randomization in the design and analysis of algorithms
6. To introduce students to various problems in Computational Geometry
Pre-Requisite:
1. Design and Analysis of Algorithm
Module Content Hours Marks
1. Sorting and Graphs 04
Insertion Sort Analysis with emphasis on correctness proof of the algorithm,
Union-Find Algorithm, Example of amortized analysis
2. String Algorithms 06
Rabin-Karp Algorithm, KMP, Suffix Trees
3. Maximum Flows 06
Augmenting Paths, Minimum Cost Flows, Bipartite Matching
4. Randomized Algorithms 06
A Min-Cut Algorithm, Las Vegas and Monte Carlo, Binary Planar Partitions, A
Probabilistic Recurrence, Computation Model and Complexity Classes
5. Approximation Algorithms 10
P and NP, One Way of Coping with NP-Hardness, Greedy Approximation
Algorithms, Dynamic Programming and Weakly Polynomial-Time Algorithms,
Randomized Rounding, Vertex Cover, Wiring, and TSP
6. Computational Geometry 04
Convex Hull, Line-segment Intersection, Sweep Lines
Course Outcomes:
After completion of this course the students will be able to -
CO1 Prove correctness of different algorithms
CO2 Solve various problems using String-Matching Algorithms
CO3 Use advanced graph algorithms to solve various problems
CO4 Apply randomized algorithms to solve different problems
CO5 Design approximation algorithms to solve different NP complete problems
CO6 Implement computational geometry algorithms
Learning Resources:
1. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, Introduction to Algorithms,
Third Edition, The MIT Press, ISBN: 9780262033848
2. Jon Kleinberg, Eva Tardos, Algorithm Design, Pearson, ISBN: 9789332518643
3. S. Sridhar, Design and Analysis of Algorithms, Oxford, ISBN: 9780198093695
M. Tech. (IT) Curriculum, 2021-22
3. To apply standard machine learning frameworks for implementing real world problems.
Pre-Requisite:
1. Knowledge of Linear Algebra, Probability and Statistics
2. Programming knowledge in Python
Module Content Hours Marks
1 Introduction: Types of learning. Preparation of Data for Machine Learning 3
Algorithms - Data Cleaning, Handling Text and Categorical Attributes, Handling
Missing Values, Exploration of Data using Visualization, Regression - Linear
regression, Multivariate regression, Multi-collinearity, Logistic Regression.
2. Supervised Learning : Classifiers - Classification using Regression, Multiclass 5
Classifier, Multi-label Classification. Gradient Descent Algorithm for Linear
Regression Model, Naive Bayes Classifiers, Decision Trees, Ensembles of
Decision Trees: Random Forests, Support Vector Machines, Model Evaluation
and Improvement.
3 Dimensionality Reduction : Dimensionality Reduction, Feature Extraction, 4
Feature Selection, and Manifold Learning, Principal Component Analysis (PCA),
Randomized PCA, Incremental PCA, Kernel PCA, Selecting a Kernel and Tuning
Hyper-parameters.
4 Unsupervised Learning: Partitive, Hierarchical and Density based clustering, 5
Comparative analysis, Clustering for big data, Anomaly Detection using
Gaussian Mixtures, Cluster validity indices.
5 Reinforcement Learning : Model free and model based reinforcement 4
algorithms – Q learning, State-Action-Reward-State-Action (SARSA) etc.
6 Neural Networks : Perceptrons, Multilayer Perceptrons, Backpropagation 7
learning, Initialization, Training & Validation, Parameter Estimation - MLE, MAP,
Bayesian Estimation.
7 Deep Neural Networks : Difference from shallow networks, Convolutional Neural 8
Network and Recurrent Neural Network. Construction of Neural Network models
using Machine learning frameworks - Tensorflow and Keras, SciKit - Learn,
PyTorch
Course Outcomes:
After successful completion of this course, the learners will be able to -
CO1 Define the fundamental issues of machine learning : data, model selection, model complexity etc.
CO2 Analyze the underlying mathematical relationships within and across different machine learning
algorithms.
CO3 Implement different learning algorithms like supervised, un-supervised and reinforcement learning.
CO4 Compare different network models like Convolutional, Recurrent etc.
CO5 Apply standard machine learning frameworks for implementing real world machine learning
algorithms.
Learning Resources:
M. Tech. (IT) Curriculum, 2021-22
Course Outcomes:
After completion of the course students will able to -
CO1 Interpret the impact and challenges posed by IoT and the Internet technologies behind it.
CO2 Explain the new architectural models of IoT and the different communication protocols for
connecting IoT nodes.
CO3 Compare and contrast the deployment of smart objects and the technologies to connect them to
networks.
CO4 Develop interoperability among some of the IoT technologies.
CO5 Implement different Application protocols and security measures for IoT.
Learning Resources:
1 David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry,"IoT
Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things”,
Pearson Education
2 Adrian McEwen and Hakim Cassimally, “Designing the Internet of Things”, Wiely,
3 Simone Cirani, Gianluigi Ferrari, Marco Picone, Luca Veltri, “Internet of Things: Architectures,
Protocols and Standards”, John Wiley & Sons.
4 Raj Kamal, “Internet of Things: Architecture and Design Principles”, 1st Edition, McGraw Hill
Education.
3. Research Methodology: A Step by Step Guide for beginners, Ranjit Kumar, 2nd Edition, SAGE
publications, 2014
4. Resisting Intellectual Property, Halbert, Taylor & Francis Ltd, 2007
5. Resisting Intellectual Property, Halbert, Taylor & Francis Ltd, 2007
6 Industrial Design, Mayall, McGraw Hill, 1992.
7 Product Design, Niebel, McGraw Hill, 1974
8. Intellectual Property in New Technological Age, Robert P. Merges, Peter S. Menell, Mark A. Lemley,
2016
9. Intellectual Property Rights Under WTO, T. Ramappa, S. Chand, 2008
10. Introduction to Design, Asimov, Prentice Hall, 1962
CO1 Understand the implementation procedures for the machine learning algorithms.
CO2 Design Java/Python programs for various Learning algorithms.
CO3 Apply appropriate data sets to the Machine Learning algorithms.
CO4 Identify and apply Machine Learning algorithms to solve real world problems
M. Tech. (IT) Curriculum, 2021-22
THIRD SEMESTER
M. Tech. (IT) Curriculum, 2021-22
3rd SEMESTER
SL. CONTACT
PAPER CODE PAPER NAME L T P CREDIT
NO. HRs./WEEK
THEORY
01 ITOEC301 A: Quantum Computing 3 0 0 3 3
B: Big Data Analytics
C: Software Project Management
D: Information and System Security
E: Social Network Analysis
SESSIONAL/PRACTICAL
01 ITPRJ302 Dissertation (Part 2) 0 0 18 18 9
02 ITASGN302 Comprehensive Viva-voce 0 0 0 0 1
TOTAL 3 0 18 21 13
Density Operator.
2 Introduction to Quantum Mechanics: Classical Deterministic Systems, 6
Probabilistic Nature of Quantum Systems, Basics of Quantum Theory,
Schrodinger's Equation and Born Rule, Wave -Particle Duality, Postulates of
Quantum Mechanics, Dirac Formalism, Stern-Gerlach Experiment and
Measurement, Electron Spin, Superposition of States, Quantum Entanglement.
3 Quantum Circuits: Bits and Qubits, Bloch sphere 8
representation of a qubit, multiple qubits. Classical gates versus quantum gates,
single qubit gates, multiple qubit gates, design of quantum circuits.
4 Quantum Information and Cryptography: Comparison between classical and 8
quantum information theory. Bell states. Quantum teleportation. Quantum
Cryptography, no cloning theorem.
5 Quantum Algorithms: Introduction to quantum algorithm, quantum parallelism, 8
Deutsch’s algorithm, Deutsch’s-Jozsa algorithm, Shor factorization algorithm,
Grover Search algorithm, Simon’s algorithm, Quantum Fourier Transform.
Course Outcomes:
After completion of this course students will be able to-
CO1 Define Hilbert Space and Operators.
CO2 Explain basic concepts of quantum mechanics as applied in Quantum computing.
CO3 Develop quantum logic gate circuits.
CO4 Differentiate the classical and quantum information processing concepts.
CO5 Implementation of simple quantum algorithms using quantum parallelism.
Learning Resources:
1. Quantum Computation and Quantum Information, Michael A. Nielsen and Isaac L. Chuang,
Cambridge University Press 2010.
2. Quantum computing explained, David McMahon, Wiley-interscience, John Wiley & Sons, Inc.
Publication 2008.
3. Quantum computing for computer scientists, Noson S. Yanofsky, Mirco A. Mannucci, Cambridge
University Press 2008
4. Introduction to Quantum Mechanics, 2nd Edition, David J. Griffiths, Prentice Hall New Jersey 1995
5. Reskill Lecture notes http://www.theory.caltech.edu/~preskill/ph229/.Engineering Circuit Analysis,
W.H. Hyat, J.E. Kemmerly & S.M. Durbin, The Mc Graw Hill
6. Principles of Quantum Computation and Information, Vol. I: Basic Concepts, Vol II: Basic Tools and
Special Topics, Benenti G., Casati G. and Strini G, World Scientific.
Course Outcomes:
After completion of this course the students will be able to -
CO1 Assess different methodologies for data and system security
CO2 Investigate different cryptography techniques
CO3 Assess different security model for transport and IP layer
CO4 Compose different security model for web
CO5 Investigate different media security methodologies
CO6 Real life design of problems and solution for security application(e.g. in cloud or IOT)
Learning Resources:
1. Cryptography & Network Security : Principles and practices: William Stalling, Pearson
2. Cryptography & Network Security: Atul Kahate, TMH
3. Cryptography & Network Security: Forouzen. Mc.graw hill
FOURTH SEMESTER
M. Tech. (IT) Curriculum, 2021-22
4th SEMESTER
SL. CONTACT
PAPER CODE PAPER NAME L T P CREDIT
NO. HRs./WEEK
SESSIONAL/PRACTICAL
01 ITPRJ403 Dissertation (Part 3) 0 0 24 24 12
TOTAL 0 0 24 24 12