Information Technology P.G. Syllabus
Information Technology P.G. Syllabus
Program: M.Sc.
Revised Syllabus of M.Sc. Information Technology(Part-I)
Choice Based Credit & Grading System (60:40)
w.e.f. Academic Year 2020-2021
1
M.Sc. Part I, Information Technology Syllabus
OR
6 Level P.G.
8 Status Revised
To be implemented from 2020-2021
9
Academic year
2
M.Sc. Part I, Information Technology Syllabus
The new syllabus is aimed to achieve the objectives. The syllabus spanning three years covers the
industry relevant courses. The students will be ready for the jobs available in different fields like:
Course Outcome: By the end of the course, a student should develop the
Ability:
Learners are able to use and apply current technical concepts and practices in the core
information technologies.
Learners are able to apply knowledge of computing and mathematics appropriate to the
discipline.
Learners are able to analyze a problem, and identify and define the computing
requirements appropriate to its solution.
Learners are able to effectively integrate IT based solutions into the user environment.
Learners are able to design, implement, and evaluate a computer based system, process,
component, or program to meet desired needs.
3
M.Sc. Part I, Information Technology Syllabus
Scheme of Examination
A) Internal Assessment: 40 % 40 Marks
Passing Standard
The learners to pass a course shall have to obtain a minimum of 40% marks in aggregate for each
course where the course consists of Internal Assessment and Semester End Examination. The
learners shall obtain minimum of 40% marks (i.e. 16 out of 40) in the Internal Assessment and
40% marks in Semester End Examination (i.e. 24 Out of 60) separately, to pass the course and
minimum of Grade D, wherever applicable, to pass a particular semester. A learner will be said to
have passed the course if the learner passes the Internal Assessment and Semester End
Examination together.
4
M.Sc. Part I, Information Technology Syllabus
SEMESTER I
Total 24
5
M.Sc. Part I, Information Technology Syllabus
SEMESTER II
PIT2MSA Microservices 4
Architecture
PIT2IGP Image Processing 4
PIT2BDP Big Data Analytics 2
Practical
PIT2MAP Microservices 2
Architecture Practical
Total 24
6
M.Sc. Part I, Information Technology Syllabus
Semester I
Course Code
Research in Computing
PIT1RIC
Objectives
To be able to conduct business research with an understanding of all the latest theories.
To develop the ability to explore research techniques used for solving any real world or innovate
problem.
Expected Learning Outcomes:
The learner will be able to:
1) Solve real world problems with scientific approach.
2) Develop analytical skills by applying scientific methods.
3) Recognize, understand and apply the language, theory and models of the field of business
Analytics.
4) Foster an ability to critically analyze, synthesize and solve complex unstructured business
problems
5) Understand and critically apply the concepts and methods of business analytic
Introduction:
I Role of Business Research, Information Systems and Knowledge Management, Theory 12
Building, Organization ethics and Issues
Beginning Stages of Research Process:
II Problem definition, Qualitative research tools, Secondary data research 12
Reference Books:
1. Business Research Methods William G.Zikmund, B.J Babin, J.C. Carr,
Cengage 8e 2016 6 Atanu Adhikari, M.Griffin
2. Business Analytics Albright Winston Cengage 5e 2015
3. Research Methods for Business Students Fifth Edition Mark Saunders 2011
4. Multivariate Data Analysis Hair Pearson 7e 2014
8
M.Sc. Part I, Information Technology Syllabus
Course
Code Data Science
PIT1DSC
Objectives:
Develop in depth understanding of the key technologies in data science and business analytics:
data mining, machine learning, visualization techniques, predictive modeling, and statistics.
Practice problem analysis and decision-making. Gain practical, hands-on experience with
statistics programming languages and big data tools through coursework and applied research
experiences.
Expected Learning Outcomes
The learners will be able to
1) Recognize and analyze ethical issues in business related to intellectual property, data security,
integrity, and privacy.
2) Apply ethical practices in everyday business activities and make wellreasoned ethical business and
data management decisions.
3) Demonstrate knowledge of statistical data analysis techniques utilized in business decision making.
4) Apply principles of Data Science to the analysis of business problems.
5) Demonstrate use of team work, leadership skills, decision making and organization theory
Data Science Technology Stack: Rapid Information Factory Ecosystem, Data Science
Storage Tools, Data Lake, Data Vault, Data Warehouse Bus Matrix, Data Science
Processing Tools ,Spark, Mesos, Akka , Cassandra, Kafka, Elastic Search, R ,Scala,
Python, MQTT, The Future
I Layered Framework: Definition of Data Science Framework, CrossIndustry Standard
12
Process for Data Mining (CRISP-DM), Homogeneous Ontology for Recursive
Uniform Schema, The Top Layers of a Layered Framework, Layered Framework for
High-Level Data Science and Engineering
Business Layer: Business Layer, Engineering a Practical Business Layer
Utility Layer: Basic Utility Design, Engineering a Practical Utility Layer
Three Management Layers: Operational Management Layer, Processing-Stream
Definition and Management, Audit, Balance, and Control Layer, Balance, Control,
Yoke Solution, Cause-and-Effect, Analysis System, Functional Layer, Data Science
II
Process Retrieve Superstep : Data Lakes, Data Swamps, Training the Trainer Model, 12
Understanding the Business Dynamics of the Data Lake, Actionable Business
Knowledge from Data Lakes, Engineering a Practical Retrieve Superstep, Connecting
to Other Data
Sources.
Assess Superstep: Assess Superstep, Errors, Analysis of Data, Practical Actions,
III Engineering a Practical Assess Superstep, 1
12
Reference Books:
4. Data Science from Scratch first Principle in python Joel Grus Shroff Publishers 2017
5. Experimental Design in Data science with Least Resources N C Das Shroff Publishers
2018
10
M.Sc. Part I, Information Technology Syllabus
11
M.Sc. Part I, Information Technology Syllabus
Fundamental Cloud Architectures: Workload Distribution Architecture,
Resource Pooling Architecture, Dynamic Scalability Architecture, Elastic
IV
Resource Capacity Architecture, Service Load Balancing Architecture, Cloud
Bursting Architecture, Elastic Disk Provisioning Architecture, Redundant
Storage Architecture.
Advanced Cloud Architectures: Hypervisor Clustering Architecture, Load
12
Balanced Virtual Server Instances Architecture, Non-Disruptive Service
Relocation Architecture, Zero Downtime Architecture, Cloud Balancing
Architecture, Resource Reservation Architecture, Dynamic Failure Detection
and Recovery Architecture, Bare-Metal Provisioning Architecture, Rapid
Provisioning Architecture, Storage Workload Management Architecture
Cloud Delivery Model Considerations: Cloud Delivery Models: The Cloud
Provider Perspective, Cloud Delivery Models: The Cloud Consumer
V
Perspective,
Cost Metrics and Pricing Models: Business Cost Metrics, Cloud Usage Cost 12
Metrics, Cost Management Considerations,
Service Quality Metrics and SLAs: Service Quality Metrics, SLA Guidelines
Reference Books:
Introduction of soft computing, soft computing vs. hard computing, various types of soft
I computing techniques, Fuzzy Computing, Neural Computing, Genetic Algorithms,
12
Associative Memory, Adaptive Resonance Theory, Classification, Clustering, Bayesian
Networks, Probabilistic reasoning, applications of soft computing.
UnSupervised Learning Networks: Fixed weight competitive nets, Kohonen self- organizing
feature maps, learning vectors quantization, counter propogation networks, adaptive
resonance theory networks. Special Networks: Simulated annealing, Boltzman machine,
III Gaussian Machine, Cauchy Machine, Probabilistic neural net, cascade
12
correlation network, cognition network, neo-cognition network, cellular neural network,
optical neural network Third Generation Neural Networks: Spiking Neural networks,
convolutional neural networks, deep learning neural networks, extreme learning machine
model.
12
M.Sc. Part I, Information Technology Syllabus
Introduction to Fuzzy Logic, Classical Sets and Fuzzy sets: Classical sets, Fuzzy sets.
Classical Relations and Fuzzy Relations: Cartesian Product of relation, classical relation,
fuzzy relations, tolerance and equivalence relations, non-iterative fuzzy sets. Membership
IV
Function: features of the membership functions, fuzzification, methods of membership 12
value assignments. Defuzzification: Lambda-cuts for fuzzy sets, Lambda-cuts for fuzzy
relations, Defuzzification methods. Fuzzy Arithmetic and Fuzzy measures: fuzzy
arithmetic, fuzzy measures, measures of fuzziness, fuzzy integrals.
Fuzzy Rule base and Approximate reasoning: Fuzzy proportion, formation of rules,
decomposition of rules, aggregation of fuzzy rules, fuzzy reasoning, fuzzy inference
systems, Fuzzy logic control systems, control system design, architecture and operation of
FLC system, FLC system models and applications of FLC System. Genetic Algorithm:
Biological Background, Traditional optimization and search techniques, genetic algorithm
and search space, genetic algorithm vs. traditional algorithms, basic terminologies, simple
V
genetic algorithm, general genetic algorithm, operators in genetic algorithm, stopping 12
condition for genetic algorithm flow, constraints in genetic algorithm, problem solving
using genetic algorithm, the schema theorem, classification of genetic algorithm, Holland
classifier systems, genetic programming, advantages and limitations and applications of
genetic algorithm. Differential Evolution Algorithm, Hybrid soft computing techniques –
neuro – fuzzy hybrid, genetic neuro-hybrid systems, genetic fuzzy hybrid and fuzzy
genetic hybrid systems.
Semester II
1) Understand the key issues in big data management and its associated applications in
intelligent business and scientific computing.
2) Acquire fundamental enabling techniques and scalable algorithms like Hadoop, Map Reduce and NO
SQL in big data analytics.
3) Interpret business models and scientific computing paradigms, and apply software tools for big data
analytics.
4) Achieve adequate perspectives of big data analytics in various applications like recommender
systems, social media applications etc.
14
M.Sc. Part I, Information Technology Syllabus
Data Product, Building Data Products at Scale with Hadoop Data Science Pipeline
and Hadoop Ecosystem, Operating System for Big Data, Concepts, Hadoop
Architecture, Working with Distributed file system, Working with Distributed
IV 12
Computation, Framework for Python and Hadoop Streaming, Hadoop Streaming,
MapReduce with Python, Advanced MapReduce. In-Memory Computing with Spark,
Spark Basics, Interactive Spark with PySpark, Writing Spark Applications,
Reference Books:
1. Big Data and Analytics: Subhashini Chellappan Seema Acharya, Wiley, First
2. Data Analytics with Hadoop An Introduction for Data Scientists: Benjamin Bengfort
and Jenny Kim, O’Reilly, 2016
3. Big Data and Hadoop: V.K Jain, Khanna Publishing, First, 2018
15
M.Sc. Part I, Information Technology Syllabus
16
M.Sc. Part I, Information Technology Syllabus
16
M.Sc. Part I, Information Technology Syllabus
Reference Books:
1. Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud William
Stallings AddisonWesley
2. Network Functions Virtualization (NFV) with a Touch of SDN Rajendra Chayapathi
Syed Farrukh Hassan AddisonWesley
17
M.Sc. Part I, Information Technology Syllabus
Course Code
Microservice Architecture
PIT2MSA
Objectives
Gain a thorough understanding of the philosophy and architecture of Web applications using ASP.NET
Core MVC;
Gain a practical understanding of.NET Core;
Acquire a working knowledge of Web application development using ASP.NET Core MVC 6 and
Visual Studio Persist data with XML Serialization and ADO.NET with SQL Server Create HTTP
services using ASP.NET Core Web API;
Deploy ASP.NET Core MVC applications to the Windows Azure cloud.
1) Develop web applications using Model View Control. Create MVC Models and write code that
implements business logic within Model methods, properties, and events.
2) Create Views in an MVC application that display and edit data and interact with Models and
Controllers..
3) Gaining a thorough understanding of the philosophy and architecture of .NET
4) Core Understanding packages, met packages and frameworks
5) Acquiring a working knowledge of the .NET programming model
Building the Proximity Monitor. Putting It All Together: Identifying and Fixing Anti-
Patterns, Continuing the Debate over Composite Microservices, The Future.
Reference Books:
1) Understand the relevant aspects of digital image representation and their practical implications.
2) Have the ability to design pointwise intensity transformations to meet stated specifications.
3) Understand 2-D convolution, the 2-D DFT, and have the abitilty to design systems using these
concepts.
4) Have a command of basic image restoration techniques.
5) Understand the role of alternative color spaces, and the design requirements leading to choices of
color space.
.
Introduction: Digital Image Processing, Origins of Digital Image Processing,
Applications and Examples of Digital Image Processing, Fundamental Steps in Digital
Image Processing, Components of an Image Processing System, Digital Image
Fundamentals: Elements of Visual Perception, Light and the Electromagnetic Spectrum,
Image Sensing and Acquisition, Image Sampling and Quantization, Basic Relationships
I Between Pixels, Basic Mathematical Tools Used in Digital Image Processing, Intensity 12
Transformations and Spatial Filtering: Basics, Basic Intensity Transformation Functions,
Basic Intensity Transformation Functions, Histogram Processing, Fundamentals of
Spatial Filtering, Smoothing (Lowpass) Spatial Filters, Sharpening (Highpass) Spatial
Filters, Highpass, Bandreject, and Bandpass Filters from Lowpass Filters, Combining
Spatial Enhancement Methods, Using Fuzzy Techniques for Intensity Transformations
and Spatial Filtering
Filtering in the Frequency Domain: Background, Preliminary Concepts, Sampling and
II the Fourier Transform of Sampled Functions, The Discrete Fourier Transform of One 12
Variable, Extensions to Functions of Two Variables, Properties of the 2-D DFT and
IDFT, Basics of Filtering in the Frequency Domain, Image Smoothing Using Lowpass
f Image Registration
2 Intensity transformation and Spatial Filtering
IMAGE ENHANCEMENT
a Basic Intensity Transformation functions
i. Program to perform Image negation
ii. Program to perform threshold on an image.
iii. Program to perform Log transformation
iv. Power-law transformations
v. Piecewise linear transformations
a. Contrast Stretching
b. Gray-level slicing with and without background.
c. Bit-plane slicing
b Program to plot the histogram of an image and categorise 2. Program to apply histogram equalization.
c Write a program to perform convolution and correlation.
d Write a program to apply smoothing and sharpening filters on grayscale and color images
a) Low Pass
b) High Pass
Note: Use all kernels mentioned in the reference book
3 Filtering in Frequency Domain
M.Sc. Part II, Information Technology Syllabus
a) Program to apply Discrete Fourier Transform on an image
b) Program to apply Low pass and High pass filters in frequency domain
c) Program to apply Laplacian filter in frequency domain
d) Note: All other filters can be applied, studied and compared with filters in spatial domain.
e) Program for high frequency emphasis filtering, high boost and homomorphic filtering.
4 Image Denoising
i. Program to denoise using spatial mean, median and adaptive mean filtering
ii. ii. Program for Image deblurring using inverse, Weiner filters
5 Color Image Processing
i. Program to read a color image and segment into RGB planes , histogram of color image
ii. Program for converting from one color model to another model iii. Program to apply false
colouring(pseudo) on a gray scale image
6 Fourier Related Transforms
Program to compute Discrete Cosine Transforms, Walsh -Hadamard Transforms, Haar Transform ,
Wavelet
7 Image compression
Program to apply compression and decompression algorithm on an image (Arithmetic, Huffman and
LZW coding techniques.
8 Morphological Image Processing
i. Program to apply erosion, dilation, opening, closing
ii. Program for detecting boundary of an image
iii. Program to apply Hit-or-Miss transform
iv. Program to apply morphological gradient on an image
v. Program to apply Top-Hat/Bottom-hat Transformations
9 Image Segmentation
i. Program for Edge detection using
a. Sobel, Prewitt, Marr-Hildreth and Canny
ii. Illustrate Watershed segmentation algorithm
iii. Any more to be included(to be consulted)
10 Feature Extraction
i. Apply Principal components for image description
ii. Apply Harris-Stephens corner detector algorithm
Reference Books:
Program: M.Sc
Revised Syllabus of M.Sc. Information Technology
Choice Based Credit & Grading System (60:40)
w.e.f. Academic Year 2019-2020
1
M.Sc. Part II, Information Technology Syllabus
b) Semester IV
6 Level P.G.
8 Status Revised
To be implemented from 2020-2021
9
Academic year
2
M.Sc. Part II, Information Technology Syllabus
The new syllabus is aimed to achieve the objectives. The syllabus spanning two years covers the
industry relevant courses. The students will be ready for the jobs available in different fields like:
Course Outcome: By the end of the course, a student should develop the
Ability:
Learners are able to get the knowledge and ability to develop creative solutions on the basis
of technology-oriented syllabus.
Learners are able to develop skills to learn new technology.
3
M.Sc. Part II, Information Technology Syllabus
Learners are able to apply theory and software development concepts to construct
computing-based solutions.
Learners are able to Design and develop computer programs/computer-based systems in
the areas related to algorithms, networking, cloud computing, Artificial Intelligence, Mobile
applications, etc.
Scheme of Examination
A) Internal Assessment: 40 % 40 Marks
Passing Standard
The learners to pass a course shall have to obtain a minimum of 40% marks in aggregate for each
4
M.Sc. Part II, Information Technology Syllabus
course where the course consists of Internal Assessment and Semester End Examination. The
learners shall obtain minimum of 40% marks (i.e. 16 out of 40) in the Internal Assessment and
40% marks in Semester End Examination (i.e. 24 Out of 60) separately, to pass the course and
minimum of Grade D, wherever applicable, to pass a particular semester. A learner will be said to
have passed the course if the learner passes the Internal Assessment and Semester End
Examination together.
Choice Based Credit Grading and Semester System (CBCGS)
M. Sc. Information Technology Syllabus
To be implemented from the Academic year 2019-2020
SEMESTER III
Course Course Lectures Cred Practical Hours Credits Total
Code Nomenclature its Course Credits
PIT3EMS Embedded 60 4 PIT3ESP 60 2 6
Systems
PIT3ISM Information 60 4 PIT3ISP 60 2 6
Security
Management
Elective 1 60 4 Elective 1 60 2 6
PIT3VIR Virtualization PIT3VIP
PIT3ANN Artificial Neural PIT3ANP
Networks
Elective 2 60 4 Elective 2 60 2 6
PIT3DIP Digital Image PIT3DPP
Processing
PIT3ETH Ethical Hacking PIT3EHP
Total 24
5
M.Sc. Part II, Information Technology Syllabus
Systems
PIT4COF Computer PIT4CFP
Forensics
Elective 2 60 4 Elective 2 60 2 6
PIT4DEC Design of PIT4DEP
Embedded
Control Systems
PIT4AIP Advanced Image PIT4APP
Processing
PIT4CLM Cloud PIT4CMP
Management
PIT4PRO Project 2 PIT4PRP 2 4
Total 24
Semester III
Course Code
Embedded system
PIT3EMS
Objectives
The objective of this course is to have Skills in analysis, organisation and planning in the fields of electronics,
information technology and embedded systems. Skills in oral and written communication of analysis,
development and evaluation in the field of embedded systems.
Expected Learning Outcomes:
1) To be able to design, describe, validate and optimize embedded electronic systems in
different industrial application areas.
2) To be able to define hardware and software communication and control requirements.
3) To acquire knowledge of and be able to use tools for the development and debugging of
programs implemented on microcontrollers and DSPs.
4) To design electronic circuits for the processing of information in communications and
control systems.
5) To acquire knowledge of sensor properties and apply these in the design of Electronic
systems which integrate measurement and actuation in different industrial production
contexts.
Introduction
What is an Embedded System, Embedded System Vs, General Computing System.
The Typical Embedded System
Core of Embedded System, Memory, Sensors and Actuators, Communication Interface,
I
Embedded Firmware. 12
Characteristic and quality attributes of Embedded System
Characteristics of an Embedded System, Quality Attributes of Embedded System.
Embedded product development life cycle
What is EDLC, Why EDLC? Objectives of EDLC, Different Phases of EDLC.
Hardware Software Co-design and Program Modelling
Fundamental Issues in Hardware Software Co-Design, Computational Models in
II
Embedded Design, Introduction to Unified Modelling Language (UML), Hardware 12
Software Trade-offs.
Embedded Hardware design and development
6
M.Sc. Part II, Information Technology Syllabus
Reference Books:
7
M.Sc. Part II, Information Technology Syllabus
Course
Code Information Security Management
PIT3ISM
Objectives: Information Security Management is the study of identification of an organization's assets
(including people, buildings, machines, systems and information assets), followed by the development,
documentation, and implementation of policies and procedures for protecting these assets.
Expected Learning Outcomes
1) Risk management will make the students able to identify potential problems before they occur so that
risk-handling activities may be planned and invoked as needed across the life of the product or project
to mitigate adverse impacts on achieving objectives.
2) Students will be able to provide a basic level of security, independent of external requirements so that
they can maintain the uninterrupted operation of the IT organisation.
3) It will make learners aware of key management which is the process of administering or managing
cryptographic keys for a cryptosystem.
4) It will make learners aware of the risks or threats to the success of the plan and test the controls in
place to determine whether or not those risks are acceptable.
5) Students will know the basic process of identifying, preserving, analyzing and presenting the digital
evidence in such a manner that the evidences are legally acceptable
8
M.Sc. Part II, Information Technology Syllabus
Reference Books:
9
M.Sc. Part II, Information Technology Syllabus
OVERVIEW OF VIRTUALIZATION
Basics of Virtualization - Virtualization Types – Desktop Virtualization –
I
NetworkVirtualization – Server and Machine Virtualization – Storage
Virtualization – System-level or Operating Virtualization – Application
12
Virtualization- Virtualization Advantages – Virtual Machine Basics – Taxonomy
of Virtual machines - Process Virtual Machines – System Virtual Machines –
Hypervisor - Key Concepts
SERVER CONSOLIDATION
Hardware Virtualization – Virtual Hardware Overview - Sever Virtualization –
II 12
Physicaland Logical Partitioning - Types of Server Virtualization – Business
cases for SeverVirtualization – Uses of Virtual server Consolidation – Planning
for Development-Selecting server Virtualization Platform
NETWORK VIRTUALIZATION
Design of Scalable Enterprise Networks - Virtualizing the Campus
III
WAN Design – WAN Architecture - WAN Virtualization - Virtual Enterprise
Transport Virtualization– VLANs and Scalability - Theory Network Device
Virtualization Layer 2 - VLANs Layer 3 VRF 12
Instances Layer 2 - VFIs Virtual Firewall Contexts Network Device
Virtualization - Data-Path Virtualization Layer 2: 802.1q
- Trunking Generic Routing Encapsulation - IPsecL2TPv3 Label Switched Paths
- Control-Plane Virtualization–Routing Protocols- VRF - Aware Routing Multi-
Topology Routing
VIRTUALIZING STORAGE
SCSI- Speaking SCSI- Using SCSI buses – Fiber Channel – Fiber Channel
IV
Cables –Fiber Channel Hardware Devices – iSCSI Architecture – Securing
iSCSI – SAN backupand recovery techniques – RAID – SNIA Shared Storage
12
Model – Classical Storage Model – SNIA Shared Storage Model – Host based
Architecture – Storage based architecture – Network based Architecture – Fault
tolerance to SAN – PerformingBackups – Virtual tape libraries.
Blades and Virtualization — Building Blocks for Next- Generation Data
Centers,Evolution of Computing Technology-Setting the Stage,Evolution of
V
Blade and Virtualization Technologies,Blade Architecture,Assessing Needs — 12
Blade System Hardware Considerations
10
M.Sc. Part II, Information Technology Syllabus
Reference Books:
Course Code
Ethical Hacking
PIT3ETH
Objectives
The main objective and aim of this study is to let students know about what is ethical hacking and how they
can take advantage of it to prevent from fraud regarding their hacking situations.
Expected Learning Outcomes:
1) It prepares students to handle information security with more simplicity.
2) It provides knowledge in advanced Hacking concepts – hacking Mobile devices & smart
phones, writing Virus codes, Corporate Espionage, exploit writing & Reverse Engineering.
3) It evaluates the security of and identifies the vulnerabilities in systems, networks or system
infrastructure.
11
M.Sc. Part II, Information Technology Syllabus
Reference Books:
12
M.Sc. Part II, Information Technology Syllabus
Semester IV
Course Code Artificial Intelligence
PIT4ARI
Objectives: The basic objective of AI is to enable computers to perform intellectual tasks such as decision
making, problem solving, perception, understanding human communication.
Expected Learning Outcomes:
1) Students will able to Demonstrate knowledge of the building blocks of AI as presented in terms of
intelligent agents.
2) Analyze and formalize the problem as a state space, graph, design heuristics and select amongst
different search or game based techniques to solve them.
3) Develop intelligent algorithms for constraint satisfaction problems and also design intelligent systems
for Game Playing.
4) Attain the capability to represent various real life problem domains using logic based techniques and
use this to perform inference or planning.
5) Formulate and solve problems with uncertain information using Bayesian approaches.
Introduction: AI, Components of AI, History of AI, Salient Points, Knowledge and
Knowledge Based Systems, AI in Future, Applications.
Logic and Computation: Classical Concepts, Computational Logic, FOL, Symbol
I Tableau, Resolution, Unification, Predicate Calculus in Problem Solving, Model Logic, 12
Temporal Logic.
Heuristic Search: Search-Based Problems, Informed Search, Water Jug Problem, TSP,
Branch and Bound Method, TSP Algorithm.
Game Playing: AND/OR Graph, Minimax Problem, Alpha-Beta Search, Puzzle
Solving, AI versus Control Robot.
Knowledge Representation: Structure of an RBS, Merit, Demerit and Applicability of
RBS, Semantic Nets, Frames, Conceptual Graphs, Conceptual Dependency, Scripts.
II 12
Automated Reasoning: Default Logic, Problem for Default Reasoning, Closed World
Assumption, Predicate Completion, Circumscription, Default Reasoning, Model Based
Reasoning, Case Based Reasoning, Reasoning Models, Multimodels, Multimodal
Reasoning.
Probabilistic Reasoning: Bayes Theorem, Bayesian Network, Dempster and Shafer
Theory of Evidence, Confidence Factor, Probabilistic Logic.
III Knowledge Acquisition: Knowledge Acquisition process, Automatic Knowledge 12
Acquisition, Machine Learning, Induction, Analogical Reasoning, Explanation-Based
Learning, Inductive Learning, Knowledge Acquisition Tools.
Planning: Necessity of planning, Planning Agents, Planning generating schemes, Non-
hierarchical planning, Hierarchical planning, Script-based planning, Oppurtunistic
planning, Algorithm for planning, planning representation with STRIPS an example.
IV 12
Constraint Satisfaction Problem: Constraints and Satisfiabillity, Basic search
strategies for solving CSP, Representation of CSP problem, Examples of constraint
satisfaction problem.
Knowledge-Based Systems: Structure of an Expert System, Expert Systems in different
Areas, Expert System Shells, Comparison of Expert Systems, Comparative View,
V Ingredients of Knowledge-Based Systems, Web-based Expert Systems. 12
Prolog: Prolog programming features, Syntax, Syntax of Rules, LIST, Structure, Some
Solutions using TURBO PROLOG.
13
M.Sc. Part II, Information Technology Syllabus
Reference Books:
14
M.Sc. Part II, Information Technology Syllabus
Reference Books:
Course Code
Computer Forensics
PIT4COF
Objectives
The main objective of studying computer forensics is to train students about the science of cyber security,
digital and computer forensics and other advanced technologies and tools.
Expected Learning Outcomes:
1) Interpret and appropriately apply the laws and procedures associated with identifying,
acquiring, examining and presenting digital evidence.
2) Create a method for gathering, assessing and applying new and existing legislation and
industry trends specific to the practice of digital forensics.
3) Adhere to the ethical standards of the profession and apply those standards to all aspects of
the study and practice of digital forensics.
4) Using the scientific process, apply the principles of effective digital forensics investigation
techniques.
5) Identify the culture of white-collar crime and the methods used by white-collar criminals
and employ this knowledge to guide economic crime investigations.
15
M.Sc. Part II, Information Technology Syllabus
II Processing Crime and Incident Scenes, Working with Windows and DOS Systems, Current
Computer Forensics Tools. 12
III Macintosh and Linux Boot Processes and File Systems, Computer Forensics Analysis,
Recovering Graphics Files. 12
IV Virtual Machines, Network Forensics, and Live Acquisitions, E-mail Investigations, Cell
Phone and Mobile Device Forensics 12
V Report Writing for High-Tech Investigations, Expert Testimony in High-Tech Investigations,
Ethics and High-Tech Investigations. 12
Reference Books:
16
M.Sc. Part II, Information Technology Syllabus
Reference Books:
2) Microsft System Center 2012 Unleashed Chris Amaris, Rand Morimoto, Pete
Handley,David E. Ross, Technical Edit by Yardeni,Pearson Education.
17
M.Sc. Part II, Information Technology Syllabus
3) The.Official.VCP5.Certification.Guide, Aug.2012,VMware.Press.
18