Syllabus CSE MTECH CS 2020-21
Syllabus CSE MTECH CS 2020-21
Institute Vision
Institute Mission
To educate students at Undergraduate, Postgraduate, Doctoral, and Post-Doctoral levels
to perform challenging engineering and managerial jobs in industry.
• To provide excellent research and development facilities to take up Ph.D. programmes and
research projects.
• To develop effective teaching and learning skills and state of art research potential of the
faculty.
• To build national capabilities in technology, education and research in emerging areas.
• To provide excellent technological services to satisfy the requirements of the industry and
overall academic needs of society.
Department Vision
The department strives to be recognized globally for outstanding education and research, leading
to excellent professionals and innovators in the field of Computer Science and Engineering, who
can positively contribute to the society.
Department Mission
To impart quality education and equip the students with strong foundation that could make
them capable of handling challenges of the new century.
Page 1 of 204
2. To maintain state of the art research facilities and facilitate interaction with world’s leading
universities, industries and research organization for constant improvement in the quality of
education and research.
PEO1:Students are trained in such a way that makes them capable of exploiting and enhancing
theoretical and practical knowledge in various domains of Computer Science.
PEO2:Students are imparted with strong base of knowledge that makes them suitable for both
industry teaching and research.
PEO3:Students are trained to develop practical and efficient solutions to the challenges in the
growing field of software industry to gain leadership positions in their organization and/or
teams.
PEO4:Students are inculcated with the sensitivity towards ethics, public policies and their
responsibilities towards the society to gain trust and respect of others as ethical team members.
PO1: An ability to independently carry out research /investigation and development work to
solve practical problems.
PO3: Students should be able to demonstrate a degree of mastery over the area as per the
specialization of the program. The mastery should be at a level higher than the requirements
in the appropriate bachelor program.
Page 2 of 204
PO5:Ability for analytical and critical thinking in order to analyse, design and improve
existing tools and techniques.
Page 3 of 204
COURSE INFORMATION SHEET
Co- requisite(s):
Credits: 3 L: 3 T: 0 P: 0
Class: M. Tech
Name of Teacher:
Course Objectives
Course Outcomes
After the completion of this course, students will be able to:
Page 4 of 204
CO3 Analyze problems and identify the computing requirements appropriate to
its solution
SYLLABUS
Module I:
Linear Algebra
Introduction: Matrices and solving set of linear equations, Vector space, Subspace, Linear
combination of vectors, Linear dependence and independence of vectors, Bases and dimensions.
(8L)
Module II:
Inner product spaces, Orthogonal vectors and dual vectors, Eigen values and Eigen vectors, Linear
programming.
(8L)
Module III:
Frequency distribution and measures of central tendency mean, median mode, quartiles, measures
of dispersions and skewness, standard deviation, mean deviation, coefficient of variation,
moments.
(8L)
Module IV:
(8L)
Module V:
Graph Theory
Introduction: Graphs and its types, Representation of graphs: Adjacency matrix, Incidence matrix,
Page 5 of 204
Adjacency list, Planar graph, Kuratowski’s Graphs, Clique and maximum Clique finding
algorithms.
(8L)
Books recommended:
TEXT BOOK
Course Evaluation:
Direct Assessment
Page 6 of 204
Continuous Internal Assessment % Distribution
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 2 1 1 1 1
CO2 3 3 1 1 1 1
CO3 2 3 2 1 1 1
Page 7 of 204
CO4 3 2 1 1 1 1
CO5 3 1 1 1 1 1
Co- requisite(s):
Class: M. Tech
Name of Teacher:
Page 8 of 204
Course Objectives
Course Outcomes
CO2 Develop and analyze algorithms for red-black trees, B-trees and Splay trees.
SYLLABUS
Module I:
Page 9 of 204
(8L)
Module II:
Skip Lists: Need for Randomizing Data Structures and Algorithms, Search and Update Operations
on Skip Lists, Probabilistic Analysis of Skip Lists, Deterministic Skip Lists
(8L)
Module III:
Trees: Binary Search Trees, AVL Trees, Red Black Trees, 2-3 Trees, B-Trees, Splay Trees
(8L)
Module IV:
Heaps: Balanced Search Trees as Heaps, Array-Based Heaps, Heap-Ordered Trees and Half-
Ordered Trees, Leftist Heaps, Skew Heaps, Binomial Heaps, Changing Keys in Heaps, Fibonacci
Heaps, Heaps of Optimal Complexity, Double-Ended Heap Structures and Multidimensional
Heaps, Heap-Related Structures with Constant-Time Updates.
(8L)
Module V:
Text Processing: Sting Operations, Brute-Force Pattern Matching, The Boyer-Moore Algorithm,
The Knuth-Morris-Pratt Algorithm, Standard Tries, Compressed Tries, Suffix Tries, The Huffman
Coding Algorithm, The Longest Common Subsequence Problem (LCS), Applying Dynamic
Programming to the LCS Problem.
(8L)
Books recommended:
TEXT BOOK
1. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C++,” 2ndEdition, Pearson,
2004.(T1)
2. Peter Brass, “Advanced Data Structures,” Cambridge University Press, 1stEdition.(T2)
3. M T Goodrich, & Roberto Tamassia, “Algorithm Design,” John Wiley, 2002.(T3)
Page 10 of 204
Course Evaluation:
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Page 11 of 204
Continuous Internal Assessment ✓ ✓ ✓ ✓ ✓
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 1 1 1 1 1
CO2 2 3 3 1 1 1
CO3 2 3 3 2 1 1
CO4 3 1 1 1 1 1
CO5 3 1 1 1 1 1
Page 12 of 204
MAPPING BETWEEN COURSE OUTCOMES AND COURSE DELIVERY METHOD
Co- requisite(s):
Class: M. Tech
Name of Teacher:
Course Objectives
Page 13 of 204
1. Role of distributed systems in day-to-day life
Course Outcomes
CO3 Learn the concepts of distributed file systems and distributed transactions
CO5 Understand the requirements for designing and supporting distributed systems
SYLLABUS
Module 1:
(8L)
Module 2:
Remote Invocation: Request-reply protocols, Remote procedure call, Remote method invocation.
Page 14 of 204
Indirect Communication: Publish subscribe system, Message queues, Shared memory
approaches.
(8L)
Module 3:
Peer to Peer Systems: Introduction, Napster and its legacy, Middleware, Routing overlays.
Distributed File systems: Introduction, File service architecture, Case Study: NFS.
(8L)
Module 4:
Time and Global States: Clocks, events, and process states, Synchronizing physical clocks,
Logical time and logical clocks, Global states, Distributed debugging
(8L)
Module 5:
Distributed Transactions: Flat and nested transactions, Atomic commit protocols, Concurrency
Control, Distributed deadlocks, Transaction recovery.
Replication: Introduction, System model, Fault tolerant services, Transactions with replicated
data.
(8L)
TEXT BOOK
Page 15 of 204
1. A. S. Tanenbaum, M. Van Steen, Distributed Systems: Principles and Paradigms, Pearson
Education, 2007. .(R1)
2. P. K. Sinha, Distributed Systems: Concepts and Design, Prentice Hall, 2007. (R1)
Course Evaluation:
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment –
1. Student Feedback on Faculty
Page 16 of 204
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 2 2 2 1 2
CO2 3 3 3 1 3 1
CO3 2 3 3 3 2 1
CO4 3 3 3 3 1 1
CO5 2 2 3 2 1 1
Page 17 of 204
Course Outcomes Course Delivery Method
CO1 CD1, CD6
CO2 CD1, CD6, CD7
CO3 CD1, CD2, CD3, CD6, CD7
CO4 CD1, CD3, CD6, CD7
CO5 CD1, CD2, CD3, CD4,CD5,CD7
Pre-requisite(s):
Credits: 2 L: 0 T: 0 P: 4
Class: M. Tech
Name of Teacher:
Course Objectives
Page 18 of 204
3. To familiarize students with advanced paradigms and data structure used to
solve algorithmic problems.
Course Outcomes
After the completion of this course, students will be able to:
CO2 Develop program for AVL, Red-Black trees, B-trees and Splay trees
SYLLABUS
Each ADT should support five operations, void Insert(val), boolean Delete(val), boolean
Search(val), void ClearADT() and void DisplayADT(). Both search and delete operations
should respond with a boolean value indicating whether the search/delete was successful
or not. The objective of this assignment is to compare the performance of BST and RBT
ADTs. You have to compute the time taken for completion of operations and study how
the running times of ADT operations will vary across the two ADT implementations.
Page 19 of 204
a) remove() b) insert () c) Search() d) Update()
Assume the coin flips for the first insertion yield two heads followed by tails, and those for
the second insertion yield three heads followed by tails.
Your program should then create an appropriate priority queue object and perform
makeHeap() method. After that, you should give the user menu options to insert(key),
delete(key), extractMin(), findMin(), decrease(key), increase(key) updateKey(currentKey,
newKey), and displayHeap(filename). You may assume that keys will be unique. For
displayHeap(filename), you must output the tree structure of the priority queue (including
linked list edges in Binomial Heap, etc) as a directed tree in the dot language format1 and
store it in a file named filename (given as parameter).
6. Lab Assignment No: 7&8
Implement Text Processing using Huffman Coding.
Implement the compact representation of the suffix trie for the string "minimize minime".
Implement a standard trie for the following set of strings: {abab, baba, ccccc, bbaaaa, caa,
bbaacc, cbcc, cbca }.
ILOVEMOM,
AMIJLONDPVGEMRPIOM.
Page 20 of 204
It is an example of hiding the string, M, in plain sight, since the characters in M and C are
not encrypted. As long as someone knows where the random
Books recommended:
TEXTBOOK
1. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C++,” 2nd Edition, Pearson,
2004. (T1)
2. Peter Brass, “Advanced Data Structures,” Cambridge University Press, 1st Edition. (T2)
3. M T Goodrich, & Roberto Tamassia, “Algorithm Design,” John Wiley, 2002. (T3)
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Page 21 of 204
Continuous Internal Assessment % Distribution
Quiz (es) 10
Viva 20
Quiz 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Course Delivery Methods
CD2 Assignments/Seminars
Page 22 of 204
CD7 Simulation
CO1 3 1 1 1 1 1
CO2 3 2 2 1 1 1
CO3 2 3 3 2 1 1
CO4 3 1 1 1 1 1
CO5 3 1 1 1 1 1
Course Objectives
After the completion of this course, students will be able to:
1. Identify and relate different algorithm design techniques to real world problems.
Page 23 of 204
2. Able to describe a non-deterministic solution of different problem also they will be apply
the concept of reducibility to convert one problem to another problem.
3. Able to relate parallel, randomized and approximate solution of various problem.
4. Able to analyze parallel, randomized and approximation algorithms.
5. Able to design and criticize algorithms for different domains.
Course Outcomes
After the completion of this course, students will be able to:
CO1 Identify and compare different approaches of computer algorithm for different practical
application.
CO2 Understand the concept of NP-hard and NP-complete and reducibility.
CO3 Able to design and criticize of a wide range of advanced algorithms techniques namely,
approximation, randomized and parallel algorithm
CO4 Can analyze the approximation algorithms using approximation ratio and can perform
probabilistic analysis of randomized algorithms
CO5 Gain a good understanding on a wide range of advanced algorithmic problems, their
relations and variants, and application to real-world problems
SYLLABUS
Module I:
Design Paradigms
Overview of Divide and Conquer, Greedy and Dynamic Programming strategies. Basic search and
traversal techniques for graphs, Backtracking, Branch and Bound.
(8L)
Module II:
Theory of NP- Hard and NP-Complete Problems
P, NP and NP-Complete complexity classes; A few NP-Completeness proofs; Other complexity
classes.
(8L)
Module III:
ApproximationAlgorithms
Introduction, Combinatorial Optimization, approximation factor, PTAS, FPTAS,
Approximation algorithms for vertex cover, set cover, TSP, knapsack, bin packing, subset-sum
problem etc. Analysis of the expected time complexity of the algorithms.
(8L)
Module IV:
Parallel Algorithms
Introduction, Models, speedup and efficiency, Some basic techniques, Examples from graph
theory, sorting, Parallel sorting networks. Parallel algorithms and their parallel time and processors
complexity.
(8L)
Module V:
Probabilistic Algorithms & Randomized Algorithms
Page 24 of 204
Numerical probabilistic algorithms, Las Vegas and Monte Carlo algorithms, Game-theoretic
techniques, Applications on graph problems
(8L)
Text Books:
1. T.H. Cormen, C.E.Leiserson, and R.L. Rivest, “Introduction to Algorithms”.
2. G.Brassard, and P.Bratley, “Fundamentals of Algorithmics”.
3. Vijay V.Vazirani, “Approximation Algorithms”.
Reference Books:
1. D.Harel, “Algorithmics: The spirit of computing”.
2. R. Motwani& P. Raghavan, “Randomized Algorithms,” Cambridge University Press,
1995.
Course Evaluation:
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Page 25 of 204
Seminar before a committee 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
Page 26 of 204
Mapping Between COs and Course Delivery (CD) methods
Course Objectives
This course enables the students to:
1. Understand transaction control and concurrency issues in databases.
2. Have knowledge of locking mechanisms in a database management system
3. Have idea of the backend activities involved in recovering data from databases
4. Have knowledge of data warehousing and features of centralized and distributed database
5. Obtain an insight into Open Issues in Data Warehouses, Mobile Databases Multimedia
Databases Geographic Information Systems Genome Data Management
Course Outcomes
Page 27 of 204
After the completion of this course, students will be able to:
CO1 To understand the fundamental and advanced concepts required for modeling and
designing the database
CO2 To understand the advanced database technologies.
CO3 To effectively model and design the complex database systems
CO4 To effectively map the well-designed database to the level of implementation.
CO5 To understand the concepts of distributed database and various access and allocation
methods.
SYLLABUS
Module I :
Review of basic concepts, Transaction and System Concepts, Desirable Properties of Transactions,
Characterizing Schedules Based on Recoverability, Characterizing Schedules Based on
Serializability, Transaction Support in SQL.
(8L)
Module II :
Concurrency Control Techniques, Two-Phase Locking Techniques for Concurrency Control,
Concurrency Control Based on Timestamp Ordering, Multiversion Concurrency Control
Techniques, Validation (Optimistic) Concurrency Control Techniques, Granularity of Data Items
and Multiple Granularity Locking.
(8L)
Module III :
Recovery Concepts, Recovery Techniques Based on Deferred Update, Recovery Techniques
Based on Immediate Update, Shadow Paging, The ARIES Recovery Algorithm, Recovery in
Multidatabase Systems, Database Backup and Recovery from Catastrophic Failures.
(8L)
Module IV :
Distributed Databases and Client-Server Architectures, Distributed Database Concepts, Data
Fragmentation, Replication and Allocation Techniques for Distributed Database Design, Types of
Distributed Database Systems, Query Processing in Distributed Databases, Overview of
Concurrency Control and Recovery in Distributed Databases, An Overview of 3-Tier Client-
Server Architecture.
(8L)
Module V :
Data Modeling for Data Warehouses, Characteristics of Data Warehouses, Introduction,
Definitions, and Terminology Building a Data Warehouse, Typical Functionality of a Data
Warehouse, Data Warehouse Versus Views Problems and Open Issues in Data Warehouses,
Mobile Databases, Multimedia Databases, Geographic Information Systems, Genome Data
Management.
(8L)
Page 28 of 204
Text Books:
1. Elmasri R., Navathe S.B., “Fundamentals of Database Systems”, 5 Edition, Pearson
th
Reference Books:
1. C.J. Date, “An introduction to Database Systems”, 7 Edition.,Pearson Education, New
th
2002. (R2)
3. B.Desai, “Database Management Systems”, Galgotia Publications, New Delhi, 1998. (R3)
Course Evaluation:
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Page 29 of 204
Assessment Components CO1 CO2 CO3 CO4 CO5
Continuous Internal Assessment ✓ ✓ ✓ ✓ ✓
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
Page 30 of 204
CD1 Lecture by use of boards/LCD CO1, CO2, CO3, CD1
projectors/OHP projectors CO4, CO5
CD2 Laboratory
experiments/teaching aids
Course Objectives
After the completion of this course, students will be able to:
1. An ability to apply knowledge of mathematics, science and engineering to both software
and hardware design problems.
2. An ability to design and conduct experiments and to analyze and interpret data related to
software and hardware design solutions.
3. An ability to design a system, component or process to meet desired needs within realistic
constraints.
Page 31 of 204
4. An ability to function on multidisciplinary teams using current computer engineering tools
and technologies.
5. An ability to identify, formulate and solve engineering problems based on a
fundamental understanding of concepts of computer engineering topics.
Course Outcomes
After the completion of this course, students will be able to:
CO1 Recall the principles and approaches of artificial intelligence and understand different
aspects of Intelligent agent.
CO2 Apply different search techniques for solving real world problems and select the most
appropriate solution by comparative evaluation.
CO3 Understanding the various concepts of knowledge representations and demonstrate
working. knowledge of reasoning in the presence of incomplete and/or uncertain
information.
CO4 To develop a basic understanding of some of the more advanced topics of AI such as
learning, natural language processing, Robotics etc.
CO5 Write various types of LISP and PROLOG programs and explore more sophisticated
LISP and PROLOG code.
SYLLABUS
Module I:
Introduction: Overview of Artificial Intelligence- Problems of AI, AI Technique, Tic - Tac - Toe
Problem.
Intelligent Agents: Agents & Environment, Nature of Environment, Structure of Agents, Goal
Based Agents, Utility Based Agents, Learning Agents.
Problem Solving: Problems, Problem Space & Search: Defining The Problem as State Space
Search, Production System, Problem Characteristics, Issues in The Design of Search Programs.
(8L)
Module II:
Search Techniques: Solving Problems by Searching, Problem Solving Agents, Searching for
Solutions; Uniform Search Strategies: Breadth First Search, Depth First Search, Depth Limited
Search, Bi-directional Search, Comparing Uniform Search Strategies.
Heuristic Search Strategies: Greedy Best-First Search, A* Search, Memory Bounded Heuristic
Search: Local Search Algorithms & Optimization Problems: Hill Climbing Search, Simulated
Annealing Search, Local Beam Search, Genetic Algorithms; Constraint Satisfaction Problems,
Local Search for Constraint Satisfaction Problems.
Adversarial Search: Games, Optimal Decisions & Strategies in Games, The Minimax Search
Procedure, Alpha-Beta Pruning, Additional Refinements, Iterative Deepening.
(8L)
Module III:
Knowledge & Reasoning: Knowledge Representation Issues, Representation & Mapping,
Approaches to Knowledge Representation, Issues in Knowledge Representation.
Using Predicate Logic: Representing Simple Fact in Logic, Representing Instant & ISA
Relationship, Computable Functions & Predicates, Resolution, Natural Deduction.
Representing Knowledge Using Rules: Procedural Versus Declarative Knowledge, Logic
Programming, Forward Versus Backward Reasoning, Matching, Control Knowledge.
Page 32 of 204
(8L)
Module IV:
Probabilistic Reasoning: Representing Knowledge in an Uncertain Domain, Bayesian Networks,
Dempster -Shafer Theory.
Planning: Overview, Components of A Planning System, Goal Stack Planning, Hierarchical
Planning.
Learning: Forms of Learning, Inductive Learning, Explanation Based Learning, Neural Net
Learning & Genetic Learning.
(8L)
Module V:
Natural Language Processing: Brief introduction to Syntactic Processing, Semantic Analysis,
Discourse & Pragmatic Processing.
Robotics: Introduction, Robot hardware, robotic perception, planning to move, planning uncertain
movements, robotic software architecture, application domains.
(8L)
TEXT BOOKS:
1. S. Russel and P. Norvig, “Artificial Intelligence: A Modern Approach”, 3 Edition, Pearson
rd
Education. (T1)
2. E. Rich & K. Knight, “Artificial Intelligence”, 2/e, TMH, New Delhi, 3 Edition, TMH.
rd
(T2)
REFERENCE BOOKS:
1. Dan W. Patterson, “Introduction to Artificial Intelligence and Expert Systems”, PHI, New
Delhi, 2006. (R1)
2. D.W. Rolston, “Principles of AI & Expert System Development”, TMH, New Delhi. (R2)
Course Evaluation:
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Direct Assessment
Page 33 of 204
Assessment Tool % Contribution during CO Assessment
Continuous Internal Assessment 50
Semester End Examination 50
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
Page 34 of 204
CO4 3 3 3 2 1 1
CO5 2 2 2 3 1 1
Course Objectives
After the completion of this course, students will be able to:
1. Able to match and implement various design strategies of algorithms.
Page 35 of 204
2. Able to interpret the efficiency of algorithm by changing the places of important steps.
3. Able to compare approximate and exact solutions.
4. Able to criticize effect randomness on correctness and efficiency of algorithms.
5. Able to design approximate, random and parallel solution of different problems.
Course Outcomes
After the completion of this course, students will be able to:
CO1 Should able to write and explain different algorithm design approaches. .
CO2 Solve real life problems by an appropriate and efficient algorithm. .
CO3 Analyse of an approximate or randomized solution to different practical problem.
CO4 Compare and justify appropriate number of processors required for parallel algorithms.
CO5 Construct algorithm for various graph problems.
SYLLABUS
Page 36 of 204
10. Lab Assignment No: 10
Parallel Algorithms: Prefix Computation, Merging of two sorted list[CO4]
Books recommended:
Textbooks:
Course Evaluation:
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Page 37 of 204
Day to day performance & Lab files 30
Quiz (es) 10
Viva 20
Quiz 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
Page 38 of 204
CO2 3 3 2 2
CO3 2 3 3 2 3 1
CO4 2 3 2 3
CO5 1 2 3 3 2 3
If satisfying and < 34% = L, 34-66% = M, > 66% = H
Course Objectives
This course enables the students to:
1. Learn and become comfortable with graphs and its terminologies
Page 39 of 204
2. Understand applications of graph theory to practical problems and other branches of
mathematics
3. Understand various graphs algorithms along with its analysis.
4. Practice creative problem solving and improve skills in this area
Course Outcomes
After the completion of this course, students will be able to:
CO1 Attain knowledge about different types of graphs and their applications in real world.
CO2 Perceive the role of cut-set, cut-vertex and fundamental circuits in network flows.
SYLLABUS
Module I:
Introduction: Graphs and its applications, Finite and infinite graphs, incidence and degree,
isolated Vertex, pendant Vertex, and Null graph, paths and circuits, isomorphism, sub graphs,
walks, paths, and circuits, connected graphs, disconnected graphs and components, Connectivity
checking algorithm, Euler graphs, Operations on graphs, more on Euler graphs, Hamiltonian paths
and circuits, Travelling Salesman problem.
(8L)
Module II:
Trees and Fundamental circuits: Trees and its properties, Distance and centers in a tree,
Algorithm for checking if a graph is Tree, Partial k-trees, Dynamic Programming in partial k-trees,
spanning trees, Spanning trees in a Weighted graph, Prim’s and Kruskal’s algorithms
Cut set and cut vertices: Properties of a cut set, Fundamental circuits and cut sets, connectivity
and separability, Computing connected components, Menger's theorem, Network flows, 1-
Isomorphism, 2-Isomorphism.
(8L)
Module III:
Planar and Dual Graphs: Planar graph, Kuratowski’s Graphs, Representations of a planar graph,
Detection of planarity, Planar Separator Theorem, Geometric Dual, Combinatorial, Duel,
Thickness and crossings, Algorithms for finding Clique and maximum clique.
(8L)
Module IV:
Matrix Representation of Graphs: Incidence matrix, Adjacency matrix, Adjacency list, Circuits
Matrix, Fundamental Circuit Matrix and Rank of B, Cut-set Matrix, Relationships among A f, Bf
and Cf, path Matrix.
(8L)
Module V:
Page 40 of 204
Coloring, Covering and partitioning: Chromatic number, Chromatic partitioning, Chromatics
polynomial, Coverings, Four colour problem, Algorithm for graph colouring.
Directed Graphs: Digraphs and its types, Digraphs and binary Relations, Directed paths and
connectedness, Euler Digraphs, Trees with Directed Edges, Fundamental Circuits in Di graphs,
Matrices A, B and C of Digraphs, Adjacency Matrix of a Digraph, Paired Comparisons and
Tournaments, Acyclic Di graphs and De-cyclization.
(8L)
Textbooks:
1. Narasingh Deo, “Graph Theory with Applications to engineering and Computer Science”,
Prentice Hall of India, 2001. (T1)
Reference Books:
1. Douglas B. West, “Introduction to Graph theory”, Pearson Education, 2002. (R1)
Course Evaluation:
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Direct Assessment
Page 41 of 204
Continuous Internal Assessment % Distribution
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
CD2 Assignments/Seminars
CD7 Simulation
Page 42 of 204
Mapping Between COs and Course Delivery (CD) methods
PROGRAM ELECTIVE I
Co- requisite(s):
Credits: 3 L: 3 T: 0 P: 0
Page 43 of 204
Class: M. Tech
Course Objectives
3. To familiarize various machine learning software libraries and data sets publicly
available.
Course Outcomes
Page 44 of 204
CO4 Design and implement various machine learning algorithms in a range of real-
world applications
SYLLABUS
Module I:
Introduction to Machine Learning
Machine Learning – what and why? Basics of Linear Algebra and Statistics, Overview of target
function representations; Linear Regression.
(8L)
Module II:
Supervised Learning
Basics of Feature Selection and Evaluation, Decision Tree, Overfitting and Pruning, Logistic
regression, Support Vector Machine and Kernel; Noise, bias-variance trade-off, under-fitting and
over-fitting concepts.
(8L)
Module III:
Neural Networks
Perceptrons: representational limitation and gradient descent training. Multilayer networks and
backpropagation. Hidden layers and constructing intermediate, distributed representations.
Overfitting, learning network structure, recurrent networks.
(8L)
Module IV:
Unsupervised and Semi Supervised Learning
Learning from unclassified data. Clustering. Hierarchical Agglomerative Clustering. K-means
partitional clustering. Expectation maximization (EM) for soft clustering. Semi-supervised
learning with EM using labeled and unlabled data.
(8L)
Module V:
Ensemble
Committees of multiple hypotheses, bagging, boosting, active learning with ensembles.
(8L)
Books recommended:
TEXT BOOK
Page 45 of 204
1. Tom Mitchell, “Machine Learning”, Latest Edition, Mc-Graw Hill. (T1)
REFERENCE BOOK
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Page 46 of 204
Assessment Components CO1 CO2 CO3 CO4 CO5
Continuous Internal Assessment ✓ ✓ ✓ ✓ ✓
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 3 2 3 1 1
Page 47 of 204
CO2 3 2 3 3 1 1
CO3 3 3 3 2 1 2
CO4 3 3 3 3 2 2
CO5 3 3 3 2 2 1
Co-requisite(s):
Credits: 3 L: 3 T: 0 P: 0
Class: M. Tech
Name of Teacher:
Page 48 of 204
Course Objectives
2. Know the data transmission and routing protocols. Know the differences among
different networks.
5. Compute the throughput and channel utilization for different network scenarios.
Course Outcomes
CO2 Understand all basic characteristics of wireless sensor networks and sensor
nodes.
CO4 Analyze and evaluate different constraint of wireless sensor network, e.g.,
coverage, power management, security and data collisions.
SYLLABUS
Module I:
Page 49 of 204
Introduction to wireless sensor networks, Wireless Sensor nodes- Sensing and sensors-challenges
and constraints - node architecture-sensing subsystem, processor subsystem communication
interfaces- prototypes, Application of Wireless sensors.
(8L)
Module II:
(8L)
Module III:
Mac Layer
(8L)
Module IV:
Design Issues in WSN routing- Data Dissemination and Gathering-Routing Challenges in WSN -
Flooding-Flat Based Routing – SAR, Directed Diffusion, Hierarchical Routing- LEACH,
PEGASIS - Query Based Routing- Negotiation Based Routing Geographical Based Routing-
Transport layer- Transport Protocol Design issues, Performance of Transport Control Protocols.
(8L)
Module V:
Page 50 of 204
WSN middleware Principles-Middleware Architecture-Existing middleware - operating systems
for wireless sensor networks-performance and traffic management - Fundamentals of network
security-challenges and attacks - Protocols and mechanisms for security.
(8L)
Books recommended:
TEXT BOOK
REFERENCE BOOK
Course Evaluation:
Page 51 of 204
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
Page 52 of 204
CO1 3 2 1 1 1 1
CO2 3 2 1 1 1 1
CO3 3 3 1 1 1 1
CO4 2 3 2 1 1 1
CO5 2 3 3 2 1 1
Co-requisite(s):
Credits: 3 L: 3 T: 0 P: 0
Class: M. Tech
Name of Teacher:
Course Objectives
Page 53 of 204
This course enables the students to:
2. Learn about the issues in finite representations for languages and machines, as
well as gain a more formal understanding of algorithms and procedures.
Course Outcomes
CO3 Understand the limitations on what computers can’t do, and learn
examples of unsolvable problems
Module I:
Basic background on automata and languages, Types of automata and languages, Turing machines,
Encoding and Enumeration of Turing Machines, k-tape Turing machines, non-deterministic
Turing machines, Universal Turing machine, Resource bounded computation, Halting problem
(8L)
Module II:
Module III:
Primitive recursive function, partial recursive function, Recursive and recursive enumeration sets,
Programming systems, Unsolvable problems, a non-recursive language and an unsolvable
problem, Rice Theorem, More unsolvable problems, PCP
(8L)
Module IV:
Measuring complexity- Big Oh, small oh and other notations, Analysing algorithms, Time and
space complexity of a Turing machine, Complexity analysis of multi-tape TM
(8L)
Module V:
Complexity classes: P, NP, NP-C, NP-Hard problem, PSPACE, NP-complete problems- clique,
vertex cover, Hamiltonian cycle, graph colouring problem, graph isomorphism, Reduction from
NP-C problem to another problem, Cook-Levin Theorem,Tractable and Intractable problems,
Reducing one problem to another problem, Additional classes of problems- RP, ZPP
(8L)
Books recommended:
TEXT BOOK
1. Lewis H.R., Papadimitriou C.H., “Elements of the Theory of Computation”, PHI Publ., 2nd
edition, New Delhi. (T1)
REFERENCE BOOK
1. Hopcroft J.E., Motwani R. and Ullman J.D, “Introduction to Automata Theory, Languages
and Computations”, Second Edition, Pearson Education, 2008. (R1)
2. John Martin, “Introduction to Languages and the Theory of Computation”, 3rd
ed. McGraw Hill, New York, NY, 2003. (R2)
3. Dexter Kozen, “Theory of Computation”, Springer publication. (R3)
Course Evaluation:
Page 55 of 204
Gaps in the syllabus (to meet Industry/Profession requirements):
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
Page 56 of 204
CD6 Self- learning such as use of NPTEL materials and internets
CD7 Simulation
CO1 3 2 1 1 1 1
CO2 3 2 1 1 1 1
CO3 3 3 1 1 1 1
CO4 2 3 2 1 1 1
CO5 2 3 3 2 1 1
PE Lab 1
Pre-requisite(s):
Co- requisite(s):
Page 57 of 204
Credits: 2 L: 0 T: 0 P: 4
Class: M. Tech
Name of Teacher:
Course Objectives
Course Outcomes
After the completion of this course, students will be able to:
SYLLABUS
Page 58 of 204
1. Lab Assignment No: 1
Objective: To Understand and Implement Matrix Algebra
1. To create Sparse matrices using the function sparse.
2. To convert a sparse matrix to full matrix.
Page 59 of 204
2. Design a Surface plot using the surf function.
2. Write a program using the function guidata, which stores and retrieves data in the GUI
figure ’ApplicationData’ property.
3. How to put walls by clicking a mouse button to make an arbitrary maze.
4. Design a GUI System.
Books recommended:
TEXTBOOK
REFERENCE BOOK
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Page 60 of 204
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Quiz (es) 10
Viva 20
Quiz 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Page 61 of 204
CD1 Lecture by use of boards/LCD projectors/OHP projectors
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 3 2 2 1 1
CO2 3 3 2 2 1 1
CO3 2 3 2 1 2 1
CO4 3 3 2 2 1 1
CO5 3 2 1 1 1 1
Page 62 of 204
Pre-requisite(s):
Credits: 2 L: 0 T: 0 P: 4
Class: M. Tech
Name of Teacher:
Course Objectives
Course Outcomes
After the completion of this course, students will be able to:
CO1 Write, compile, and execute Java programs that may include basic data
types and control flow constructs using J2SE or other Integrated
Development Environments (IDEs)
CO2 Write, compile, and execute Java programs manipulating Strings and text
documents.
CO3 Write, compile, execute Java programs that include GUIs and event driven
programming
Page 63 of 204
CO5 Executing Client server and socket programming
SYLLABUS
Page 64 of 204
1. Working with URLs
2. Socket Server Programming
3. Client Server Programming
9. Lab Assignment No: 9
Books recommended:
TEXTBOOKS
1. Uttam K Roy, Advanced JAVA Programming, Oxford University Press, 1st Edition,
2015 (T1)
2. HeerbertSchildt, Java: A Beginner's Guide, SeventhEdition,Oracle Press, 2014 (T2)
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Page 65 of 204
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Quiz (es) 10
Viva 20
Quiz 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Page 66 of 204
Course Delivery Methods
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 3 2 2 1 1
CO2 3 3 2 2 1 1
CO3 3 2 2 2 2 1
CO4 3 2 3 2 1 1
CO5 3 2 1 1 1 1
Page 67 of 204
COURSE INFORMATION SHEET
Pre-requisite(s):
Credits: 2 L: 0 T: 0 P: 4
Class: M. Tech
Name of Teacher:
Course Objectives
Course Outcomes
After the completion of this course, students will be able to:
Page 68 of 204
CO3 Create plots
SYLLABUS
List of Programs as Assignments:
Page 69 of 204
1. To design Spline differentiation and Integration.
2. To design interpolated Spiral Y=f(X).
Books recommended:
TEXT BOOKS
Course Evaluation:
Page 70 of 204
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Quiz (es) 10
Viva 20
Quiz 10
Page 71 of 204
Assessment Components CO1 CO2 CO3 CO4 CO5
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 3 2 2 1 1
CO2 3 3 2 2 1 1
CO3 2 2 2 1 1 1
Page 72 of 204
CO4 3 1 1 1 1 1
CO5 3 2 1 1 1 1
Course Objectives
Page 73 of 204
This course enables the students to:
4 Evaluate performance metrics and scalability and selection criteria for parallelism
and different parallel systems and able to modify it.
Course Outcomes
After the completion of this course, students will be:
C03 Compare and differentiate the different parallel architectures in terms of various parameters.
CO4 Evaluate performance metrics and scalability and selection criteria for parallelism and
different parallel systems and able to modify it.
CO5 Design effective high-performance systems as per users’ criteria with proper justification by
self or in a group.
Page 74 of 204
SYLLABUS
Module I
Parallel Computer Models: The State of Computing, Multiprocessors and Multicomputers,
Multivector and SIMD Computers, PRAM and VLSI Models, Architectural Development Tracks.
(8L)
Program and Network Properties: Conditions for Parallelism, Program Partitioning and
Scheduling, Program Flow Mechanism, System Interconnect Architectures.
Module II
Program and Network Properties: Conditions for Parallelism, Program Partitioning and
Scheduling, Program Flow Mechanism, System Interconnect Architectures.
Module III
Processors and Memory Hierarchy: Advanced Processor Technology, Super Scaler and Vector
Processors, Memory Hierarchy Technology, Virtual Memory Technology.
Bus, Cache, and Shared Memory: Bus Systems, Cache Memory Organizations, Shared-Memory
Organizations, Sequential and Weak Consistency Models, Weak Consistency Models.
(8L)
Module IV
Page 75 of 204
Pipelining and Superscalar Techniques: Linear Pipeline Processors, Non-Linear Pipeline
Processor, Instruction Pipeline Design, Arithmetic Pipeline Design, Superscalar Pipeline Design
Module V
Multivector and SIMD Computers: Vector Processing Principles, Multivector
Multiprocessor, Compound Vector Processing, SIMD Computer Organizations, The Connection
Machine CM-5
Textbook:
1.Hwang K., Jotwani N., Advanced Computer Architecture, 2nd Edition, Tata Mc-Graw Hill,
India, 2010. (T1)
Reference Book:
1.Stone, H. S., High Performance Computer Architecture, 3rd Edition, Addison Wesley
Publishing Company, USA. (R1)
Page 76 of 204
Gaps in the syllabus (to meet Industry/Profession requirements):
Course Evaluation:
Individual assignment, Theory (Quiz and End semester) examinations
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Page 77 of 204
CD1 Lecture by use of boards/LCD projectors/OHP projectors
CD2 Assignments/Seminars
CD7 Simulation
Course Outcome #
CO1 3 1 2 1
CO2 3 3 1 1 1
C03 3 3 3 1
CO4 2 3 2 1
CO5 2 3 2 1
Page 78 of 204
MAPPING BETWEEN COURSE OUTCOMES AND COURSE DELIVERY METHOD
Program Elective II
Course Objectives
This course enables the students to:
1. Introducing the advance concepts of modern operating systems
Page 79 of 204
Course Outcomes
After the completion of this course, students will be able to:
CO1 Understand and implement basic services and functionalities of the
operating system using system calls. .
CO2 Use modern operating system calls and synchronization libraries in
software/ hardware interfaces.
CO3 Understand the benefits of thread over process and implement
synchronized programs using multithreading concepts.
CO4 Analyze and simulate CPU Scheduling Algorithms like FCFS, Round
Robin, SJF, and Priority.
CO5 Implement memory management schemes and page replacement schemes.
SYLLABUS
Module I:
Introduction: History, Hardware Review, Types of Operating Systems, Operating System
Concepts, System Calls, Operating System Structure, Research on Operating systems
(8L)
Module II:
Virtualization and Clouds: Requirements, Hypervisors, Techniques, Memory Virtualization, I/O
Virtualization, Multicore CPUs, Clouds.
(8L)
Module III:
Multiple Processor Systems: Multiprocessors, Multicomputers, Distributed Systems, Research on
Multiple Processor Systems
(8L)
Module IV:
Security: Security Problems, /controlling Access to Resources, Formal Models, Cryptography,
Authentication, Exploiting Software, Attacks, Malwares, Defenses
(8L)
Module V:
Operating system Design: Design Problem, Interface Design, Implementation, Performance,
Trends
(8L)
TEXT BOOKS:
1. Andrew S. Tanenbaum, Modern Operating Systems, 4th Edition, Pearson Education,
2014. (T2)
REFERENCE BOOKS:
Page 80 of 204
2. William Stalling, Operating System: Internal and Design Principles, 8th Edition,
Pearson International, 2014. (R1)
3. Silberschatz, Galvin, Gagne, Operating System Concepts, 10th Edition, Wiley, 2017.
(R2)
4. D. M. Dhamdhare, Operating Systems, Tata McGraw Hill India, 2012. (R3)
Course Evaluation:
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment –
1. Student Feedback on Faculty
Page 81 of 204
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
Page 82 of 204
CD5 Self- learning such as use of
NPTEL materials and internets
Course code:IT516
Pre-requisite(s):
Credits: 3 L: 3 T: 0 P: 0
Class: M. Tech
Name of Teacher:
Course Objectives
5. Learn about traditional and modern data driven approach and problem
Page 83 of 204
solving techniques for various datasets
Course Outcomes
After the completion of this course, students will be able to:
CO1 Understand Data Warehousing and Data Mining and its applications and
challenges and Create mini data warehouse.
SYLLABUS
Module I:
Data Analysis foundation, Numeric and Categorical attributes, Dimensionality reduction.
(8L)
Module II:
Data Warehouse: Introduction, A Multidimensional Data Model, Data Warehouse Architecture,
Data Warehouse Implementation, Data Cube Technology, From Data Warehousing to Data
Mining. Data Cube Computation and Data Generalization.
(8L)
Module III:
Frequent Pattern Mining, Summarizing Item sets, Itemset Mining, Sequence Mining.
(8L)
Module IV:
Classification: Naïve Bayes, KNN, Decision Tree, Classification Performance measures,
Classifier evaluation.
(8L)
Module V:
Page 84 of 204
Clustering: K-Means, Agglomerative, Hierarchical, DBSCAN, Spectral and Graph Clustering.
Anomaly detection, Statistical, distance and density-based approaches.
(8L)
Text Books:
1. Mohammed J. Zaki, and Wagner Meira Jr., “Data Mining and Analysis: Fundamental
Concepts and Algorithms”, Cambridge University Press, 2016. (T1)
2. Pang-Ning Tan, Michael Steinbach, and Vipin Kumar, “Introduction to Data Mining”,
Pearson, 2014. (T2)
3. Jiawei Han, and Micheline Kamber, “Data Mining Concepts & Techniques”, 3rd Edition,
Publisher Elsevier India Private Limited, 2015. (T3)
Course Evaluation:
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Page 85 of 204
Semester End Examination ✓ ✓ ✓ ✓ ✓
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
Page 86 of 204
CD2 Laboratory experiments/teaching
aids
Course code:CS517
Class: M.Tech
Semester / Level:II/5
Course Objectives
Page 87 of 204
1. An implementation-oriented introduction to programming paradigms for parallel
computers.
Course Outcomes
CO1 Understand principles of parallel algorithms and describe the developments in the
field of parallel computing.
SYLLABUS
ModuleI:
(8L)
Module II:
Page 88 of 204
Principles of Parallel Algorithm Design: Preliminaries, Decomposition Techniques,
Characteristics of Tasks and Interactions, Mapping Techniques for Load Balancing, Methods for
Containing Interaction Overheads, Parallel Algorithm Models.
(8L)
Module III :
(8L)
Module IV :
(8L)
Module V:
(8L)
Textbooks:
1. Ananth Grama, Anshul Gupta, Gorge Karypis, Vipin Kumar, Introduction to Parallel
Computing, 2nd Edition, Pearson Education,2004. (T1)
Reference Book:
1. Michael J. Quinn, Parallel Computing: Theory and Practice, 2nd Edition, McGraw Higher
Education, 2002. (R1)
2. Zbinieu J Czech, Introduction to Parallel Computing, 1st Edition, Cambridge University
Press, 2017. (R2)
3. An Introduction to Parallel Programming, Peter Pacheco, 1st Edition, Morgan Kaufmann,
2011. (R3)
Page 89 of 204
Gaps in the syllabus (to meet Industry/Profession requirements):
Course Evaluation:
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Page 90 of 204
CD1 Lecture by use of boards/LCD projectors/OHP projectors
CD2 Assignments/Seminars
CD7 Simulation
1 3 3 3 3 2 1
2 3 3 3 2 1 1
3 3 2 2 3 1 1
4 3 3 2 1 3 1
5 2 1 3 2 1 1
Page 91 of 204
PE LAB-2
Course code:IT517
Pre-requisite(s):
Credits: 2 L: 0 T: 0 P: 4
Class: M. Tech
Name of Teacher:
Course Objectives
Page 92 of 204
1. Explain about the necessity of preprocessing and its procedure.
5. Learn about traditional and modern data driven approach and problem-
solving techniques for various datasets
Course Outcomes
After the completion of this course, students will be able to:
CO1 Understand Data Warehousing and Data Mining and its applications and
challenges and Create mini data warehouse.
SYLLABUS
Page 93 of 204
. Build a Data Warehouseand Explore WEKA tool.
Page 94 of 204
Q12. Case Study on Text Mining or any commercial application
Books recommended:
TEXTBOOKS:
1. Jiawei Han &MichelineKamber - Data Mining Concepts & Techniques Publisher Harcout India.
Private Limited. (T1)
REFERENCE BOOKS:
1. G.K. Gupta – Introduction to Data Mining with case Studies, PHI, New Delhi – 2006. (R1)
2. A. Berson& S.J. Smith – Data Warehousing Data Mining, COLAP, TMH, New Delhi – 2004. (R2)
3. H.M. Dunham & S. Sridhar – Data Mining, Pearson Education, New Delhi, 2006. (R3)
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Page 95 of 204
Assessment Tool % Contribution during CO Assessment
Quiz (es) 10
Viva 20
Quiz 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Page 96 of 204
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 3 2 2 1
CO2 3 3 2 1
CO3 2 3 2 1 1 1
CO4 3 1 1
CO5 3 2 1 1
Course code:CS518
Page 97 of 204
Course title: PARALLEL COMPUTING LAB.
Pre-requisite(s):
Credits: 2 L: 0 T: 0 P: 4
Class: B. Tech
Course Objectives
Course Outcomes
After the completion of this course, students will be able to:
Page 98 of 204
CO2 Express common algorithms in a functional style and solve them in parallel.
CO3 To analyse a problem, and identify, formulate and use the appropriate
computing and engineering requirements for obtaining its solution.
CO4 Write parallel program using OpenMP, CUDA, MPI programming models.
SYLLABUS
Page 99 of 204
Q2. Write a parallel program to implement ring topology.
7. Lab Assignment No: 7
Objective: To Understand and Implement MPI program.
Q1. Write a parallel program to find the largest and the second largest from a list of
elements considering minimum no. of comparisons.
Q2. Write a parallel program to sort n elements, using any sorting technique.
8. Lab Assignment No: 8
Objective: To Understand and Implement MPI program.
Q1. Write a parallel program to solve a set of linear equations using gauss elimination
method.
Q2. Write a parallel program to find the inverse of a given matrix of n*n order.
9. Lab Assignment No: 9
Objective: To Understand and Implement MPI program.
Q1. Write a parallel program to find minimal path (minimal cost) in an undirected graph.
Q2. Write a parallel program to find roots of an equation using N-R method.
Books recommended:
TEXTBOOKS
1. Ananth Grama, Anshul Gupta, George Karypis, and Vipin Kumar, Introduction to
Parallel Computing (2nd Edition). (T1)
2. Edition), PDF, Amazon, cover theory, MPI and OpenMP introduction Recommended:
John Cheng, Max Grossman, and Ty McKercher, Professional CUDA C
Programming, 1st Edition 2014. (T2)
REFERENCE BOOKS
1. Barbara Chapman, Gabriele Jost, and Ruud van der Pas, Using OpenMP: Portable
Shared Memory Parallel Programming, 2007. (R1)
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and Viva
Voce
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Quiz (es) 10
Viva 20
Quiz 10
Indirect Assessment –
1. Student Feedback on Faculty
CD2 Assignments/Seminars
CD7 Simulation
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 2 2 1 1 3
CO2 2 1 1 1 3 3
CO3 1 2 3 3 3
CO4 1 1 3 2 1
CO5 1 1 2 2 2 3
Course Objectives
This course enables the students to:
1. Gain practical experience with designing and implementing concepts of
operating systems such as system calls.
Course Outcomes
After the completion of this course, students will be able to:
CO1 Understand and implement basic services and functionalities of the
operating system using system calls. .
CO2 Use modern operating system calls and synchronization libraries in
software/ hardware interfaces.
CO3 Understand the benefits of thread over process and implement
synchronized programs using multithreading concepts.
CO4 Analyze and simulate CPU Scheduling Algorithms like FCFS, Round
Robin, SJF, and Priority.
SYLLABUS
Books recommended:
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
Gaps in the syllabus (to meet Industry/Profession requirements):
Implementing of real-world problems
POs met through Gaps in the Syllabus: PO5&6
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Quiz (es) 10
Viva 20
Quiz 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
PE – 3
Class: M. Tech
Semester / Level: II/6
Branch: Computer Science &Engineering
4. Evaluate performance metrics and scalability and selection criteria for parallelism
and different parallel systems and able to modify it.
5. Provide the students with practice on running complex problem in high performance
computing machines.
Course Outcomes
After the completion of this course, students will be:
CO2 Demonstrate and Implement the concepts of High Performance Computer Architecture
C03 Compare and differentiate the different parallel architectures in terms of various parameters.
CO4 Evaluate performance metrics and scalability and selection criteria for parallelism and
different parallel systems and able to modify it.
CO5 Design effective high-performance systems as per users’ criteria with proper justification by
self or in a group.
Module I:
(8L)
Module II:
Program and Network Properties : Conditions for Parallelism, Program Partitioning and
Scheduling, Program Flow Mechanism, System Interconnect Architectures.
Module III:
Processors and Memory Hierarchy: Advanced Processor Technology, Super Scaler and Vector
Processors, Memory Hierarchy Technology, Virtual Memory Technology.
Bus, Cache, and Shared Memory: Bus Systems, Cache Memory Organizations, Shared-Memory
Organizations, Sequential and Weak Consistency Models, Weak Consistency Models.
(8L)
Module IV:
Pipelining and Superscalar Techniques: Linear Pipeline Processors, Non Linear Pipeline
Processor, Instruction Pipeline Design, Arithmetic Pipeline Design, Superscalar Pipeline Design
Module V:
Multivector and SIMD Computers: Vector Processing Principles, Multivector
Multiprocessor, Compound Vector Processing, SIMD Computer Organizations, The
Connection Machine CM-5
TEXT BOOK:
nd
1. Hwang K., Jotwani N., Advanced Computer Architecture, 2 Edition, Tata Mc-Graw
Hill, India, 2010. (T1)
REFERENCE BOOK:
Course Evaluation:
Individual assignment, Theory (Quiz and End semester) examinations
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
CD2 Assignments/Seminars
CD7 Simulation
Course Outcome #
CO1 3 1 2 1
CO2 3 3 1 1 1
C03 3 3 3 1
CO4 2 3 2 1
CO5 2 3 2 1
Course Objectives:
Course Outcomes:
After the completion of this course, students will be able to:
Syllabus:
Module-I
Introduction:
Cloud computing at a glance: vision of cloud computing, defining a cloud, cloud computing
reference model, characteristics and benefits, challenges ahead, Historical Developments: DS,
virtualization, web 2.0, SOC, UOC, Building cloud computing environments: application,
infrastructure and system development, Computing Platforms and Technologies.
(8L)
Module-II
Principles of Parallel and Distributed Computing:
Parallel vs. Distributed computing, Elements of parallel computing: parallel processing, H/W
architecture of parallel processing, parallel programming, levels of parallelism, Elements of
distributed computing: Defination, components architectural style and models for inter-prosses
communication, Technologies for distributed computing: RPC, distributed object framework.
(8L)
Module-III
Virtualization:
Introduction, Characteristics of virtualized environments, Taxonomy of virtualization techniques,
Virtualization and cloud computing, Pros and cons of virtualization, Technology examples: XEN,
VMware, Microsoft hyper-V. (8L)
Module-IV
Cloud computing architecture and Cloud Security:
Introduction, Cloud reference model (IAAS, PAAS and SAAS), Types of clouds, Economics of
the cloud, Cloud compliance, Data confidentiality and interoperability challenges, Salability and
Fault tolerance, Security, trust and privacy issues in cloud computing.
(8L)
Module-V
Cloud platforms in industry and Cloud applications:
Amazon web services: EC2, S3, communication services, Google app engine: Architecture, core
concept and application, Microsoft azure: core concept, SQL azure and windows azure platform
appliance, Cloud application: Scientific applications, Business, and Consumer applications.
(8L)
Text Books:
Reference Books:
1. Borko Furht Armando Escalante, Hand book of Cloud Computing, Editors, springer
Publication.
2. Judith Hurwitz, Robin Bloor, Marcia Kaufman, Fern Halper, Cloud Computing for Dummies,
Wiley Publication.
3. John W. Rittinghouse, JamesF. Ran some, Cloud Computing: Implementation, management
and security, CRC Press, Taylor and Francis Publication.
Course Evaluation: Individual assignment, Theory (Quiz and End semester) examinations
Gaps in the syllabus (to meet Industry/Profession requirements): POs met through Gaps in the
Syllabus.
Topics beyond syllabus/Advanced topics/Design: POs met through Topics beyond syllabus/Advanced
topics/Design: Teaching through research papers.
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 3 1 1 1 1
CO2 3 3 3 2 1 1
CO3 3 2 2 1 1 1
CO4 3 2 1 1 1 1
CO5 1 2 3 1 1 1
Course Objectives
Course Outcomes
After the completion of this course, students will be:
CO2 Explain the architectural view of IoT under real world constraints
SYLLABUS
Module I:
(8L)
ModuleII:
State of the art, Reference Model and architecture, IoT Reference Architecture; Introduction,
Functional View, Information View, Deployment and Operational View, Other Relevant
architectural views.
(8L)
ModuleIII:
Sensor Technology, RFID Technology, WPAN Technologies for IoT/M2M, Cellular and Mobile
Network Technologies for IoT/M2M CoAP, REST, Zigbee, Bluetooth
(8L)
ModuleIV:
Mobile IPv6 technology for IoT, 6LoWPAN, Transport Layer TCP, MPTCP, UDP, DCCP,
ModuleV:
TEXTBOOK
REFERENCE BOOK
Course Evaluation:
Individual assignment, Theory (Quiz and End semester) examinations
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
CD2 Assignments/Seminars
D4 Industrial/guest lectures
CD7 Simulation
Program Outcomes
CO2 3 3 3 2 1 1
C03 3 2 2 3 1 1
CO4 3 3 2 1 3 1
CO5 2 1 2 2 1 1
PE LAB-3
Course Objectives
Course Outcomes
After the completion of this course, students will be:
CO2 Explain the architectural view of IoT under real world constraints
SYLLABUS
Textbooks:
MUMBAI. (T2)
Reference books:
Daniel Minoli, “Building the Internet of Things with IPv6 and MIPv6:” (R2)
Gaps in the syllabus (to meet Industry/Profession requirements):
Course Evaluation:
Individual assignment, Theory (Quiz and End semester) examinations
Quiz (es) 10
Viva 20
Quiz 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
D4 Industrial/guest lectures
CD7 Simulation
Program Outcomes
CO2 3 3 3 2 1 1
C03 3 2 2 3 1 1
CO4 3 3 2 1 3 1
CO5 2 1 2 2 1 1
Course code:IT603
Pre-requisite(s):
Credits: 2 L: 0 T: 0 P: 4
Class schedule per week: 04
Class:
Name of Teacher:
Course Objectives
3. To learn how to use basic data structures such as List, Dictionary and be
able to manipulate text files and images.
Course Outcomes
After the completion of this course, students will be able to:
CO4 To understand the fact that there is more than one right solution to a
problem.
CO5 Work in industry environment with good enough knowledge about Python
programming.
SYLLABUS
Page 129 of 204
List of Programs as Assignments:
1. Lab Assignment No: 1
Objective: To Implement basic Python programming.
Q1. Create a new program called hello world.py. Use this file to write your very
First “Hello, world!” program.
Q2. Write a Python program containing exactly one print statement that produces the
following output:
A
B
C
D
E
F
2. Lab Assignment No: 2
Objective: To Understand and Implement the concept of if-else-if statements.
Q1. Write a Python program that requests five integer values from the user. It then prints
one of two things: if any of the values entered are duplicates, it prints "DUPLICATES";
otherwise, it prints "ALL UNIQUE".
Q2. Write a Python program that allows the user to enter a four-digit binary number and
displays its value in base 10. Each binary digit should be entered one per line, starting with
the leftmost digit, as shown below.
Enter leftmost digit: 1
Enter the next digit: 0
Enter the next digit: 0
Enter the next digit: 1
The value is 9
Q3. Develop and test a program that prompts the user for their age and determines
approximately how many breaths and how many heartbeats the person has had in their life.
The average respiration (breath) rate of people changes during different stages of
development. Use the breath rates given below for use in your program:
Breaths per Minute
Infant 30–60
1 –4 years 20–30
5 –14 years 15–25
adult 12–20
For heart rate, use an average of 67.5 beats per second.
*
**
***
****
*****
******
*******
******
*****
****
***
**
*
Books recommended:
TEXTBOOKS
1. Krishna P. R., Object Oriented Programming through JAVA, 1st Edition, Universities
Press, 2008. (T1)
REFERENCE BOOKS
1. C. Horstmann,G. Cornell - Core Java 2 Vol I & Vol II ; Pearson Education , New Delhi.
(R1)
2. Balagurusamy -Programming in Java, 2nd Edition; Tata McGraw Hill Publication; New
Delhi. (R2)
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and Viva
Voce
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Quiz (es) 10
Viva 20
Quiz 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
Program Outcomes
CO1 2 2 1 1 3
CO2 2 1 1 1 3
CO3 1 2 3 3 3
CO4 1 1 3 2
CO5 1 1 2 2
Course code:IT604
Pre-requisite(s):
Credits: 2 L: 0 T: 0 P: 4
Class:
Name of Teacher:
Course Objectives
Course Outcomes
After the completion of this course, students will be able to:
CO1 Analyze a web page and identify its elements and attributes.
CO2 Implement interactive web page(s) using HTML, CSS and JavaScript.
SYLLABUS
b) Include the internal style sheet for body tags & also use class name, so that the style
can be applied for all tags.
Books recommended:
TEXTBOOKS
1. Eric Ladd, Jim O' Donnel, Using HTML 4, XML and Java, Prentice Hall of India-
QUE, 1999 (R1)
3. Deitel, Deitel & Nieto, Internet and World Wide Web - How to Program, Pearson
Education Asia, 2000. (R3)
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Quiz (es) 10
Viva 20
Quiz 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
Program Outcomes
Course Outcome
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 2
CO2 1 3 3 1 2
CO3 2 1 2 2 1
CO4 1 3 3 1
OPEN ELECTIVES I
Co- requisite(s):
Class: M. Tech
Name of Teacher:
Course Objectives
Course Outcomes
SYLLABUS
Page 142 of 204
ModuleI:
(8L)
ModuleII:
Measuring size, Aspects of software size Length, functionality and complexity Measuring
structure Types of structural measures Control-flow structure Modularity and information flow
attributes Data structures.
(8L)
ModuleIII:
Modeling software quality Measuring aspects of software quality Software reliability Basics of
software reliability Software reliability problem Parametric reliability growth models Predictive
accuracy Recalibration of software-reliability growth predictions Importance of operational
environment Wider aspects of software reliability.
(8L)
ModuleIV:
Runtime Software Metrics Extent of Class Usage Dynamic Coupling Dynamic Cohesion and Data
Structure Metrics.
(8L)
ModuleV:
(8L)
Books recommended:
Textbook
1. “Software Metrics: A rigorous and Practical Approach” by Norman E. Fenton and Shari
Lawrence Pfleeger, International Thomson Computer Press, 2nd Edition, 1997. (T1)
2. “Applied Software Measurement” by Capers Jones, McGraw Hill, 2008. (T2)
Reference Book
1. “Object-Oriented Software Metrics” by Mark Lorenz, Jeff Kidd, Prentice Hall, 1994. (R1)
2. “Practical Software Metrics for Project Management And Process Improvement” by
Robert B Grady, Hewlett Packard Professional Books, 1st Edition, 2004. (R2)
Course Evaluation:
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 3 2 2 1 1
CO3 1 3 3 2 2 2
CO4 3 3 3 2 1 1
CO5 2 1 3 3 3 1
Co- requisite(s):
Credits: 3 L: 3 T: 0 P: 0
Semester / Level:I/5
Name of Teacher:
Course Objectives
1. Be familiar with both the theoretical and practical aspects Pattern Recognition.
Course Outcomes
CO1 Apply their knowledge on Real World Problems while converting these
problems to computer compatible problems for Pattern Recognition.
CO3 Design clusters for various Pattern using classical and Modern clustering
techniques.
SYLLABUS
(8L)
ModuleII:
(8L)
Module III:
(8L)
Module IV:
(8L)
ModuleV:
(8L)
Books recommended:
TEXT BOOK
1. “Pattern Recognition” by S Theodoridis, K Koutroumbas, Elsevier, 5thEdition, 2015. (T1)
2. “Pattern Recognition” by N NarshimaMurty, Springer, University press, 2nd Edition, 2015.
(T2)
REFERENCE BOOK
1. R.O. Duda et.al,“Pattern Classification”, 2ndEdition, John Wiley, New York, 2002. (R1)
Course Evaluation:
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 3 3 3 2 1
CO2 3 3 3 2 1 1
CO3 3 2 2 3 1 1
CO4 3 3 2 1 3 1
CO5 2 1 2 2 1 1
Pre-requisite(s):
Co-requisite(s):
Class: M. Tech
Name of Teacher:
Course Objectives
Course Outcomes
After the completion of this course, students will be able to:
CO2 Explain the architectural view of IoT under real world constraints
SYLLABUS
Module I:
(8L)
ModuleII:
State of the art, Reference Model and architecture, IoT Reference Architecture; Introduction,
Functional View, Information View, Deployment and Operational View, Other Relevant
architectural views.
(8L)
ModuleIII:
Sensor Technology, RFID Technology, WPAN Technologies for IoT/M2M, Cellular and Mobile
Network Technologies for IoT/M2M CoAP, REST, Zigbee, Bluetooth
(8L)
ModuleIV:
ModuleV:
(8L)
Books recommended:
TEXTBOOK
Course Evaluation:
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 3 3 3 2 1
CO2 3 3 3 2 1 1
CO3 3 2 2 3 1 1
CO4 3 3 2 1 3 1
CO5 2 1 2 2 1 1
Co- requisite(s):
Class: M. Tech
Semester / Level:
Branch:
Course Objectives
Course Outcomes
After the completion of this course, students will be able to do the following:
3. Design programs with Interactive Input and Output, utilizing arithmetic expression
repetitions, decision making, arrays.
Syllabus
Module I
Module II
Control Statements- Decision making statements, Iterative Statements, Loop Control Statements
Strings and Lists- String Operations, Tuples and Dictionaries-Operations and Examples
Module III
Functions- Function Definition and Call, Mathematical functions, User defined Functions,
Parameters and Arguments, Type Conversion and Coercion
Module IV
Exceptions- Except clause, Exception with arguments, Raising an Exception, User Defined
Exceptions
Module V
Introduction to Classes and Objects- Object Oriented Features, Attributes, Instances, Garbage
Collection
SYLLABUS
*
**
***
****
*****
******
*******
******
*****
****
***
**
*
Text book:
Reference books:
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Quiz (es) 10
Viva 20
Quiz 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 3 2 2 1 3
CO2 3 3 2 2 1 3
CO4 3 1 1 3 2 2
CO5 3 2 1 3 1 3
Co-requisite(s):
Credits: 3 L: 3 T: 0 P: 0
Class schedule per week: 03
Class: M. Tech.
Semester / Level: I/5
Branch: Computer Science and Engineering
Name of Teacher:
Course Outcomes
CO4 Learn the procedures of recovering computer evidence and seize process.
SYLLABUS
Module I:
Introduction: Cyberspace and Criminal Behavior, Traditional problems associated with computer-
based crime, e cash problems, Computer Technology and History: Computer Language, Hardware,
software, operating system, Internet, Network language.
(8L)
ModuleII:
Early Hackers and Theft Components: Phreakers, Hacking, Commodities, Intellectual property.
Module III:
Identity theft and identity fraud: Typologies of internet theft, virtual identity, credit identity.
Prevalence and victimology, physical methods, of identity theft, phishing, spyware, trojans,
insurance and loan fraud, immigration fraud. Terrorism and organized crime:Terror online,
criminal activities, organized crime as cyber gangs., technology used in organized crime. Data
piracy.
(8L)
Module IV:
Avenues for Prosecution and Government efforts: Act, Law enforcement agencies, International
efforts, Cyber law and its amendments of current state, other legal considerations.
(8L)
ModuleV:
Forensic Terminologies and Developing forensic capabilities, Searching and seizing computer
related evidence, Processing of evidence and report preparation.
(8L)
Books recommended:
TEXT BOOK
1. “Computer Forensics and Cyber Crime” by M.T.Britz, Pearson Education, First
Impression, 2012.(T1)
2. “Computer Crime and investigation” by E Casey, Springer, 1stEdition, 2001. (T2)
REFERENCE BOOK
1. “Computer Crime Investigations and Law” by C Easttom& D.J.Taylor, Carenage Learning.
(R1)
Course Evaluation:
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 3 1 1 2 1
CO2 3 3 3 1 1 1
CO3 3 3 3 2 1 1
CO4 2 3 2 2 2 1
CO5 2 3 2 2 2 1
OPEN ELECTIVE-II
Course Objectives
3.• To increase the likelihood that biometric technologies, when deployed, will be as
protective of personal and informational privacy as possible.
4.• To raise awareness of privacy issues for end users and for students.
Course Outcomes
1. Demonstrate knowledge of the basic physical and biological science and engineering
principles underlying biometric systems.
2. Identify the sociological and acceptance issues associated with the design and
implementation of biometric systems.
SYLLABUS
Module I:
(8L)
Module II:
Physiological Biometric Technologies: Fingerprints - Technical description –characteristics -
Competing technologies - strengths – weaknesses – deployment - Facial scan - Technical
description - characteristics - weaknesses-deployment - Iris scan - Technical description –
characteristics - strengths – weaknesses – deployment - Retina vascular pattern.
(8L)
Module III :
(8L)
Module IV:
(8L)
Module V:
Multi biometrics and multi factor biometrics - two-factor authentication with passwords - tickets
and tokens – executive decision - implementation plan.
TEXT BOOKS :
1. Samir Nanavathi, Michel Thieme, and Raj Nanavathi: “Biometrics -Identity verification in
a network”, 1st Edition, Wiley Eastern, 2002. (T1)
2. John Chirillo and Scott Blaul : “Implementing Biometric Security”, 1st Edition, Wiley
Eastern Publication, 2005. (T2)
REFERENCE BOOKS :
1. John Berger: “Biometrics for Network Security”, 1st Edition, Prentice Hall, 2004. (R1)
Course Evaluation:
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
1 3 3 3 3 2 1
2 3 3 3 2 1 1
3 3 2 2 3 1 1
4 3 3 2 1 3 1
5 2 1 3 2 1 1
3. Prepare students for research in the area of cryptography and enhance student’s
communication and problem-solving skills
Course Outcomes
After the completion of this course, students will be able to:
CO1 Understand the various types of cryptographic protocols and the mathematics behind
cryptography.
CO3 Apply the different cryptographic techniques to solve real life problems.
CO5 Develop a cryptosystem keeping in view social issues and societal impacts.
SYLLABUS
Module I:
Key Length - Key Management – Public Key Cryptography versus Symmetric Cryptography -
Encrypting Communications Channels - Encrypting Data for Storage - Hardware Encryption
versus Software Encryption - Compression, Encoding, and Encryption - Detecting Encryption –
Hiding and Destroying Information.
(8L)
Module III:
(8L)
Module IV:
Pseudo-Random-Sequence Generators and Stream Ciphers – RC4 - SEAL - Feedback with Carry
Shift Registers - Stream Ciphers Using FCSRs - Nonlinear-Feedback Shift Registers - System-
Theoretic Approach to Stream-Cipher Design - Complexity-Theoretic Approach to Stream-
Cipher Design - N- Hash - MD4 - MD5 - MD2 - Secure Hash Algorithm (SHA) - OneWay Hash
Functions Using Symmetric Block Algorithms - Using Public-Key Algorithms - Message
Authentication Codes
(8L)
Module V:
RSA - Pohlig-Hellman - McEliece - Elliptic Curve Cryptosystems -Digital Signature Algorithm
(DSA) - Gost Digital Signature Algorithm - Discrete Logarithm Signature Schemes - Ongchnorr-
Shamir -Cellular Automata - Feige-Fiat-Shamir -Guillou-Quisquater - Diffie-Hellman - Station-
to-Station Protocol -Shamir’s Three-Pass Protocol - IBM Secret-Key Management Protocol -
MITRENET - Kerberos - IBM Common Cryptographic Architecture.
(8L)
TEXT BOOKS:
REFERENCE BOOKS:
1. William Stallings- Cryptography & Network Security Principles and Practice, Pearson
Education. (R1)
Course Evaluation:
Individual assignment, Theory (Quiz and End semester) examinations
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 3 1 2
CO2 3 3 3 2
CO4 3 2 2
CO5 3 1 1
Course Objectives
This course enables the students:
1. Understand the basic concept of Digital Image Processing
2. To Learn the Fourier, Transform & its application
3. Understand the basic components of filters
4. Understand the basic concept of Image Compression Fundamentals
5. Understand the basic concept of Image Segmentation.
Course Outcomes
After the completion of this course, students will be:
1. Understand the concept of image formation, digitization, and role human visual system
plays in perception of image data and spatial filtering techniques for enhancing the
appearance of an image.
3. Discern the difference between noise models, gain an insight into assessing the
degradation function and realize different spatial and frequency-based filtering
techniques for reduction and removal of noise.
5. Design and create practical solutions using morphological and image segmentation
operators for common image processing problems and assess the results.
Syllabus
Module I:
Introduction to Digital Image Processing, Elements of Visual Perception, Image Sensing &
Acquisition, Sampling and Quantization, Basic Relationships between Pixels, Intensity
Transformations, Histogram Processing, Spatial Convolution & Correlation, Smoothing Spatial
Filters, Sharpening Spatial Filters.
(8L)
Module II:
Introduction to the Fourier Transform, Discrete Fourier Transform, Properties of the Two-
Dimensional Fourier Transform, Image Smoothing using Frequency Domain filters, Image
Module III:
Model of Image Degradation/Restoration Process, Noise Probability Density Functions,
Restoration in presence of Noise only, Periodic Noise Reduction using Frequency Domain
filtering, Circulant Matrices, Block Circulant Matrices, Unconstrained Restoration, Constrained
Restoration, Basics of Inverse Filtering
(8L)
Module IV:
Image Compression Fundamentals – Coding Redundancy, Interpixel Redundancy, Psychovisual
Redundancy, Fidelity Criteria, Image Compression Models– Source Encoder and Decoder,
Channel Encoder and Decoder, Elements of Information Theory, Error-Free Compression –
Variable-Length Coding, Bit-Plane Coding, Lossless Predictive Coding. Lossy Compression –
Lossy Predictive Coding, Transform Coding.Color Fundamentals, Color Models, Basics of Full
Color Image Processing.
(8L)
Module V:
Morphological Image Processing- Preliminaries, Dilation and Erosion, Opening and Closing, Hit-
or-Miss Transformation, Boundary Extraction, Hole Filling, Connected Components, Convex
Hull, Thinning, Thickening, Skeletons, Pruning
Image Segmentation- Fundamentals, Point, Line and Edge Detection, Thresholding, Region Based
Segmentation, Segmentation based on color.
(8L)
Text books:
1. Rafael. C. Gonzalez & Richard E. Woods- Digital Image Processing, 3/e Pearson
Education, New Delhi – 2009. (T1)
Reference books:
1. W.K.Pratt-Digital Image Processing, 4/e, John Wiley & sons, Inc. 2006. (R1)
2. M. Sonka et al. Image Processing, Analysis and Machine Vision, 2/e, Thomson, Learning,
India Edition, 2007. (R2)
3. Jayaraman, Digital Image Processing, Tata McGraw-Hill Education, 2011. (R3)
Gaps in the syllabus (to meet Industry/Profession requirements):
Course Evaluation:
Individual assignment, Theory (Quiz and End semester) examinations
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
CD7 Simulation
CO1 3 1 2 1
CO2 3 3 1 1 1
C03 3 3 3 1
CO4 2 3 2 1
CO5 2 3 2 1
Course Objectives
After the completion of this course, students will be:
2. To introduce the ideas of fuzzy sets, fuzzy logic and use of heuristics based on human
experience.
3. To become familiar with neural networks that can learn from available examples and
generalize to form appropriate rules for inference systems.
4. To provide the mathematical background for carrying out the optimization and
familiarizing genetic algorithm for seeking global optimum in self-learning situation.
Course Outcomes
SYLLABUS
Module I:
Introduction:Soft Computing vs. hard computing, soft computing paradigms, Basic mathematics
of soft computing, learning and statistical approaches to classification and regression.
Fuzzy Logic: Introduction, Fuzzy set theory and operations, Fuzzy set versus crisp set, Crisp
relation & fuzzy relations, Membership functions, fuzzification and defuzzification.
(8L)
Module II:
Module III:
Neural Networks: Introduction, Biological neural network, learning paradigms. Artificial Neural
Network (ANN): Evolution of Basic neuron modeling, Difference between ANN and human brain,
McCulloch-Pitts neuron models, Learning paradigms, activation function, Single layer Perceptron,
Perceptron learning, Windrow-Hoff/ Delta learning rule, Multilayer Perceptron, Adaline,
Madaline, different activation functions, Back propagation network, momentum, limitation,
FBFN, Convolution Networks, Kohonen SOM, Hopfield Networks, HebbNet.
(8L)
Module IV:
(8L)
Module V:
Ant Colony Optimization: Ant Colony Optimization Algorithm, Ant System, Ant
Colony System, Basic Flow of Ant colony Optimization, Applications of ACO.
(8L)
Course Evaluation:
Individual assignment, Theory (Quiz and End semester) examinations
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
CD2 Assignments/Seminars
CD7 Simulation
Course Outcome #
CO1 3 3 2 3 1 1
CO2 3 2 3 3 1 1
C03 3 3 3 2 1 3
CO4 2 2 3 3 1 2
CO5 2 3 3 2 1 1
Pre-requisite(s):
Co- requisite(s):
Class: M. Tech
Semester / Level:
Branch:
Course Objectives
Course Outcomes
Syllabus
Module I
Getting Data in and out of R –Accessing the Keyboard and Monitor, Reading in Larger Datasets
Module II
Control Statements- if ..else, for loop, while loop, repeat loop, break and next
Data Structures- Vectors, Arrays, Matrices, Lists, Data Frames, Factors, Operations on Dates and
Times
Module III
Strings: Overview of String Manipulation Functions
Interfaces to the Outside World: File Connections, Reading Lines of a Text File Reading From
a URL Connection
Module IV
Maths in R- Math Functions, Functions for Statistical Distributions, Sorting, Linear Algebra
Operations, Set Operations.
Module V
Text books:
3. Hadley Wickham, Garrett Grolemund, R for Data Science: Import, Tidy, Transform,
Visualize, and Model Data, Orielly, 1st Edition. (T2)
Reference books:
Course Evaluation:
Day to day progressive evaluation, Lab Quizzes, Surprise Tests, Online Lab performance and
Viva Voce
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Quiz (es) 10
Viva 20
Quiz 10
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 3 2 2 1 3
CO2 3 3 2 2 1 2
CO3 2 2 2 3 1 3
CO4 3 1 2 3 1 1
CO5 3 2 1 3 2 2
Course Objectives
After the completion of this course, students will be able to:
Course Outcomes
After the completion of this course, students will be able to:
CO1 Recall the principles and approaches of artificial intelligence and understand
different aspects of Intelligent agent.
CO2 Apply different search techniques for solving real world problems and select the
most appropriate solution by comparative evaluation.
CO4 To develop a basic understanding of some of the more advanced topics of AI such
as learning, natural language processing, Robotics etc.
CO5 Write various types of LISP and PROLOG programs and explore more sophisticated
LISP and PROLOG code.
Intelligent Agents: Agents & Environment, Nature of Environment, Structure of Agents, Goal
Based Agents, Utility Based Agents, Learning Agents.
Problem Solving: Problems, Problem Space & Search: Defining the Problem as State Space
Search, Production System, Problem Characteristics, Issues in The Design of Search Programs.
(8L)
Module II:
Search Techniques: Solving Problems by Searching, Problem Solving Agents, Searching for
Solutions; Uniform Search Strategies: Breadth First Search, Depth First Search, Depth Limited
Search, Bi-directional Search, Comparing Uniform Search Strategies.
Heuristic Search Strategies: Greedy Best-First Search, A* Search, Memory Bounded Heuristic
Search: Local Search Algorithms & Optimization Problems: Hill Climbing Search, Simulated
Annealing Search, Local Beam Search, Genetic Algorithms; Constraint Satisfaction Problems,
Local Search for Constraint Satisfaction Problems.
Adversarial Search: Games, Optimal Decisions & Strategies in Games, The Minimax Search
Procedure, Alpha-Beta Pruning, Additional Refinements, Iterative Deepening.
(8L)
Module III:
Using Predicate Logic: Representing Simple Fact in Logic, Representing Instant & ISA
Relationship, Computable Functions & Predicates, Resolution, Natural Deduction. Representing
Knowledge Using Rules: Procedural Versus Declarative Knowledge, Logic Programming,
Forward Versus Backward Reasoning, Matching, Control Knowledge.
(8L)
Learning: Forms of Learning, Inductive Learning, Explanation Based Learning, Neural Net
Learning & Genetic Learning.
(8L)
Module V:
(8L)
TEXTBOOKS:
2. E. Rich & K. Knight, “Artificial Intelligence”, 2/e, TMH, New Delhi, 3 Edition, TMH. (T2)
rd
REFERENCE BOOKS:
1. Dan W. Patterson, “Introduction to Artificial Intelligence and Expert Systems”, PHI,
New Delhi, 2006. (R1)
2. D.W. Rolston, “Principles of AI & Expert System Development”, TMH, New Delhi.
(R2)
Course Evaluation:
Individual assignment, Theory (Quiz and End semester) examinations
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
CD2 Assignments/Seminars
CD7 Simulation
CO1 3 3 3 3 3 2
CO2 3 3 3 3 3 3
CO3 3 3 3 2 2 3
CO4 3 3 3 2 1 1
CO5 2 2 2 3 1 1
Course code:IT516
Pre-requisite(s):
Credits: 3 L: 3 T: 0 P: 0
Class: M. Tech
Course Objectives
5. Learn about traditional and modern data driven approach and problem-
solving techniques for various datasets
Course Outcomes
After the completion of this course, students will be able to:
CO1 Understand Data Warehousing and Data Mining and its applications and
challenges and Create mini data warehouse.
SYLLABUS
Module I:
Data Analysis foundation, Numeric and Categorical attributes, Dimensionality reduction.
(8L)
Module II:
Data Warehouse: Introduction, A Multidimensional Data Model, Data Warehouse Architecture,
Data Warehouse Implementation, Data Cube Technology, From Data Warehousing to Data
Mining. Data Cube Computation and Data Generalization.
(8L)
Module III:
Frequent Pattern Mining, Summarizing Itemsets, Itemset Mining, Sequence Mining.
(8L)
Module IV:
Classification: Naïve Bayes, KNN, Decision Tree, Classification Performance measures,
Classifier evaluation.
Course Evaluation:
POs met through Topics beyond syllabus/Advanced topics/Design: Teaching through research
papers.
Direct Assessment
3 Quizzes 30 % (3 × 10%)
Assignment (s) 10
Indirect Assessment –
1. Student Feedback on Faculty
2. Student Feedback on Course Outcome
CD # Course Delivery methods
CD2 Assignments/Seminars
CD7 Simulation