Mtech Cse
Mtech Cse
Program Name
Master of Technology in Computer Science & Engineering
Effective from the Academic Year: 2021-2022
1|Page
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
2|Page
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
3|Page
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
4|Page
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
5|Page
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
DETAILED SYLLABUS
Topics Mathematics
Covered Proof Techniques: Non-constructive proof, proof by contradiction, contrapositive proofs, Proof by
Mathematical Induction- Coloring problem on line intersection graph, Well ordering principle,
Pigeonhole principle, Ramsey number. Generating Functions - Counting with Generating Functions,
Partial Fractions (6)
Probability: Probability Spaces with Examples, Basic Rules of Probability, Uniform Probability
Spaces, The Birthday Paradox, Throwing Balls into Boxes; The Big Box Problem, The Monty Hall
Problem; Conditional Probability, Rolling a Die; The Law of Total Probability, Flipping a Coin and
Rolling Dice, Independent Events, Rolling Two Dice, Pairwise and Mutually Independent Events;
Describing Events by Logical Propositions - Flipping a Coin and Rolling a Die, Flipping Coins, The
Probability of a Circuit Failing; Infinite Probability Spaces- Infinite Series, Who Flips the First
Heads, Who Flips the Second Heads; Random Variables, Flipping Three Coins, Random Variables
and Events, Independent Random Variables, Distribution Functions, Expected Values, Comparing
the Expected Values of Comparable Random Variables, Linearity of Expectation, The Geometric
Distribution and its Expected Value, The Binomial Distribution and its Expected Value, Indicator
Random Variables, Largest Elements in Prefixes of Random Permutations, Expected number of
swaps on random input in the Insertion-Sort Algorithm (10)
PROCESSOR AND CONTROL UNIT: A Basic MIPS implementation – Building a Data path –
Control Implementation Scheme – Pipelining – Pipelined data path and control – Handling Data
Hazards & Control Hazards – Exceptions.
(10)
6|Page
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
MEMORY & I/O SYSTEMS: Memory Hierarchy – memory technologies – cache memory –
measuring and improving cache performance – virtual memory, TLB‘s – Accessing I/O Devices –
Interrupts. (5)
PARALLELISIM: Parallel processing challenges – Flynn‘s classification – SISD, MIMD, SIMD,
SPMD, and Vector Architectures – Hardware multithreading – Multi-core processors and other
Shared Memory Multiprocessors – Introduction to Graphics Processing Units, Clusters, Warehouse
Scale Computers and other Message-Passing Multiprocessors. (6)
Text Books, Text Books:
and/or 1. C. L. Liu, Elements of Discrete Mathematics, Tata McGraw Hill
reference 2. Norman L. Biggs, Discrete Mathematics, Oxford
material 3. Douglas B. West, Introduction to Graph Theory, Prentice Hall, India
4. G. Strang, Linear Algebra and Its Applications, Cengage Learning
5. S. S. Rao, Engineering Optimization: Theory and Practice, New Age International.
6. Sheldon Ross, A First course in Probability, University of Southern California, Pearson
Education
7|Page
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Randomized Algorithm- Las Vegas and Monte Carlo algorithms, Five essential
mathematical tools for Randomized algorithms: Linearity of expectation, Markov inequality,
Chebyshev's inequality, Chernoff bound, and Union bound with examples to Randomized
algorithm design. Examples and analysis of: Randomized Quick Sort, Min Cut problem, and
Skip list. (6)
Online Algorithms: Overview, Online scheduling and online Steiner tree, Online Bipartite
matching, Online learning and multiplicative weights algorithm. (6)
NP- Completeness - Classes of P, NP, NP-Hard, NP-Complete, Co-NP; Reduction ; Cook's
Theorem, SAT, NP-Completeness proof of different problems: CLIQUE, VERTEX COVER,
INDEPENDENT SET, SET COVER. (6)
Approximation Algorithms - Constant factor approximation algorithm: VERTEX COVER
and TSP; Christofides algorithm on TSP with 1.5 approximation factor; SET-COVER problem
with log n factor approximation algorithm; PTAS and FPTAS, Linear programs and
approximation algorithms. (8)
8|Page
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
10 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
11 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
12 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
13 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
14 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
15 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
18 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Course Title of the course Program Core Total Number of contact hours Credit
Code (PCR) /
Lecture Tutorial Practical Total
Electives (PEL)
(L) (T) (P) Hours
CS Mathematical PEL 3 0 0 3 3
90XX Programming
20 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Introduction , Discrete Integral Transforms , Quantum Fourier Transform , Period Finding , Unitary
Operator for QFT , Implementation , QFT for 3 Qubits
13. Shor's Factorization Algorithm (2L)
Introduction, Shor’s Algorithm , Implementation of Quantum Computation Part , Method of Continued
Fraction
14. Classical Information Theory Revisited (1L)
15. Shannon Entropy (1L)
16. Von-Neumann Entropy (1L)
17. EPR and Bell's Inequality (2L)
Introduction , Bell States and Local Measurement, Bell's Inequalities ,CHSH Inequality
18. RSA Algorithm (2L)
Introduction , Fermat's Little Theorem , Euler's Theorem , Chinese Remainder Theorem , RSA
Encryption and Decryption , Euclid's Algorithm , Extended Euler's Algorithm
19. Quantum Cryptography (2L)
Introduction , BB-84 Protocol , Eve's Interception ,B-g2 Protocol , Ekert Protocol using EPR Pairs (E-
D1),
20. Quantum Error Correction (2L)
Introduction , Errors in Classical Communication , Errors in Quantum Communications , Three Qubit
Error Code for Bit Flip Errors , Generating Logical Qubits, Corrective Steps Taken by Bot, Shor's 9-
Qubit Code , Conversion of Phase Error to Bit Error , Shor's9 Qubit Code – Encoding, The Decoding
Circuit
Text Books, Text Books:
and/or 1. Quantum Computation and Quantum Information, by Michael A.
reference Nielsen , Isaac L. Chuang, Cambridge Press
material
2. An Introduction to Quantum Computing, by Phillip Kaye , Raymond
Laflamme , Michele Mosca, Oxford Press
3. The Feynman Lectures on Physics - Vol.3, by Richard P. Feynman, Pearson
Publishing
21 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
6. Non-linear CA (6L)
Characterization of non-linear rules, invertible and non-invertible CA, CA with point states;
applications in VLSI domain: Test Hardware Design, Self Testable Hardware Design, Fault
Tolerant Circuit Design, Memory Testing
Reference Books:
1. Game of Life Cellular Automata, by Andrew Adamatzky, Springer; 2010 Edition.
2. A New Kind of Science, by Stephen Wolfram, Wolfram Media.
3. A New Kind of Computational Biology, by Chaudhuri, P.P., Ghosh, S., Dutta, A.,
Choudhury, S.P; Springer.
4. Cellular Automata: A Discrete View of the World by Joel L. Schiff
Pre-Requisite: Database Course Assessment methods (Continuous (CT) and end assessment
Management Systems (EA))
CT+EA
Course CO1: To understand the basic concepts and terminology related to DBMS and Relational
Outcomes Database Design
CO2: To the design and implement Distributed Databases.
CO3:To understand advanced DBMS techniques to construct tables and write effective queries,
forms, and reports
Topics Introduction: Comparison between different databases: Significance of Databases, Database System
Covered Applications, Advantages and Disadvantages of different Database Management systems, Comparison
between DBMS, RDBMS, Distributed and Centralized DB, Introduction of various types of index
structures: Primary, Secondary, Multilevel, Dynamic multilevel (B-tree and B+- tree). (3)
Query Optimization & Query Execution: Algorithm for Executing Query Operations, External sorting,
select operation, join operation, PROJECT and set operation, Aggregate operations, Outer join, Heuristics
in Query Optimization, Converting Query Tree to Query Evaluation Plan, Efficient and extensible
algorithms for multi-query optimization, Introduction to Physical-Query-Plan Operators, One-Pass
Algorithms for Database, Operations, Nested-Loop Joins, Two-Pass Algorithms Based on Sorting, Two-
Pass, Algorithms Based on Hashing, Index-Based Algorithms, Buffer Management, Parallel Algorithms
for Relational Operations, Using Heuristics in Query Optimization. (6)
XML Query processing: XML query languages: XML-QL, Lorel, Quilt, XQL, XQuery, and Approaches
for XML query processing, Query processing on relational structure and storage schema, XML database
management system. (3)
Data Warehousing: Overview of DW, Multidimensional Data Model, Dimension Modelling, OLAP
Operations, Warehouse Schema (Star Schema, Snowflake Schema), Data Warehousing Architecture (3)
Big Data: Motivation, Big data storage systems, MapReduce paradigm, streaming data, Graph database
(3)
Advanced database applications: Multimedia database, Geographical Information System
(GIS) (3)
23 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
24 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
25 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Course CO1: To understand professional and ethical responsibilities, including those defined
Outcomes in the ACM/IEEE Professional Code of Ethics.
CO2: To ensure fairness, accountability, and transparency while working on machine
learning, artificial intelligence and related fields.
CO3: To appreciate the threats to privacy posed by modern data aggregation and data
processing techniques.
CO4: To design technologies incorporating ethical considerations from the
specification provided.
Topics Introduction: What is Ethics?, Ethics and Computer Science, Social consensus on
Covered unethical practices by computer professionals, Conventional issues, Emerging issues in the
age of data driven (AI/ML based) decision making, History and Evolution of ethics with
advances in computer science and engineering. (4L)
Ethics in Data collection and aggregation: Basic mechanism of data driven (AI/ML
based) decision making, Data aggregation and decision making, Data Ownership,
Collection and collation of digital imprints of users, Data stealing and data broking,
Informed consent, Data repurposing, Privacy, Anonymity, Data validity, Establishing data
protection framework with legal backing, Concept of differential privacy, GPDR.
(10L)
AI Ethics: Moral issues in autonomous and intelligent systems, Narrow (or Weak) AI and
General (or Strong) AI, Weaponization of AI, Moral issues in autonomous robots, Robot
ethics, Moral issues in self-driving cars, Moral Machine Quiz. (5L)
Reference Books:
1. Cathy O'Neil, “Weapons of Math Destruction: How Big Data Increases Inequality and
Threatens Democracy”, Crown; 1st edition (September 6, 2016).
26 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
27 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Optical Multicast Routing: Multicast routing problem, different types of nodes to support
multicasting, Network with full splitting and sparse splitting, Multicast Tree generation
algorithms. (05L)
Text Books, Text Books:
and/or
reference 1. WDM OPTICAL NETWORKS Concepts, Design and algorithms
material by C. Siva Ram Murthy and Mohan Gurusamy (PHI)
2. Optical Networks: A Practical Perspective (3rd Edition) by R. Ramaswami, K.
Sivarajan, G. Sasaki (Morgan Kaufmann Publishers)
Reference Books:
1. OPTICAL NETWORKS by Biswanath Mukherjee (TMH)
28 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
2. Moray Rumney, ‘LTE and the Evolution to 4G Wireless Design and Measurement
Challenges’, Agilent Technologies.
3. Leonid G. Kazovsky, Ning Cheng, Wei-Tao Shaw, David Gutierrez, Shing-Wa
Wong, ‘Broadband Optical Access Networks’, John Wiley and Sons, New Jersey.
4. P.E. Green, Jr., ‘Fiber Optic Networks’, Prentice Hall, NJ.
Reference Books:
2. G.E. Keiser, ‘Optical fiber communication’, McGraw Hill.
3. Andrea Goldsmith, ‘Wireless Communications’, Cambridge University Press.
4. R. Ramaswami, K. Sivarajan, G. Sasaki, ‘Optical Networks: A Practical
Perspective’ (3rd Edition), (Morgan Kaufmann Publishers).
Course Title of the course Program Total Number of contact hours Credi
Code Core t
(PCR) /
Electives Lectur Tutorial Practica Total
(PEL) e (L) (T) l (P) Hours
29 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Topics Covered Module 1: Basic Introduction of TCP/IP Protocol Stack & Hands-on (4
Hours)
Introduction of TCP/IP Protocol Stack, Functionalities of each and every Layers,
Concept of Socket. Difference between Wireless Networks & Mobile Computing
Analysis of TCP/IP stack using Wireshark.
References:
Research Papers
1. IEEE Infocom Tutorials slides by Prof. Nitin Vaidya.
1. OMNET
2. ONE
3. NS3
30 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
31 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Pre-Requisite: Computer Course Assessment methods (Continuous (CT) and end assessment
architecture, OS and (EA))
Networking
CT+EA
Course CO1: Provide systematic and comprehensive treatment of the hardware and the software high
Outcomes performance techniques involved in current day computing.
CO2: Introduce the learner to fundamental and advanced parallel algorithms through the GPU
and MIC programming environments
CO3: Provide systematic and comprehensive treatment of the components in the pipeline that
extract instruction level parallelism.
CO4: Provide a strong foundation on memory hierarchy design and tradeoffs in both uniprocessor
and multiprocessors.
Topics Graphics Processing Units: Introduction to Heterogeneous Parallel Computing, GPU architecture,
Covered Thread hierarchy,GPU Memory Hierarchy. (8)
GPGPU Programming: Vector Addition, Matrix Multiplication algorithms. 1D, 2D, and 3D Stencil
Operations. Image Processing algorithms – Image Blur, Grayscaling. Histogramming, Convolution, Scan,
Reduction techniques. (8)
Many Integrated Cores: Introduction to Many Integrated Cores. MIC, Xeon Phi architecture, Thread
hierarchy. Memory Hierarchy. Memory Bandwidth and performance considerations. (8)
Xeon Phi Programming: Vector Addition, Matrix Multiplication algorithms. 1D, 2D, and 3D Stencil
Operations. Image Processing algorithms – Image Blur, Grayscaling. Histogramming, Convolution, Scan,
Reduction techniques. (8)
Message Passing Interface: MPI Introduction. Collective communication. Data grouping for
communication. (5)
Pre-Requisite: Data Course Assessment methods (Continuous (CT) and end assessment
Communication and Computer (EA))
Networks
CT+EA
Course CO1: To understand the WSN node Architecture and Network Architecture
Outcomes CO2:To identify the Wireless Sensor Network Platforms
CO3: Explain fundamental principles of Ad-hoc Networks
CO4: Discuss a comprehensive understanding of Ad-hoc network protocols
Topics Introduction: Introduction to Wireless Sensor Networks (WSNs), Motivation, Performance Requirement,
Covered Diverse applications, Ad-hoc Wireless Networks Introduction, Issues in Ad-hoc Wireless Networks, Ad-
hoc Wireless Internet; MAC Protocols for Ad-hoc Wireless Networks: Introduction, Issues in Designing
a MAC Protocol, Design Goals of MAC Protocols, Classification of MAC protocols
(4)
Wireless Sensor Network Architecture: Hardware components, Energy consumption of sensor nodes,
Motes, Sensor Devices, Types of Sensors, Sensor's specification, Operating systems and execution
environments, Sensor network scenarios, Design principles for WSNs, Service interfaces of WSNs,
Gateway concepts (3)
Localization and positioning: Properties of localization and positioning procedures, Possible approaches
(Proximity, Trilateration and triangulation, Scene analysis), Mathematical basics for the lateration
problem, Single-hop localization, Positioning in multi-hop environments (5)
Topology control: Motivation and basic ideas, Controlling topology in flat networks – Power control,
Hierarchical networks by dominating sets, Hierarchical networks by clustering, Combining hierarchical
topologies and power control, Adaptive node activity (5)
Routing protocols: Forwarding and routing, Energy-efficient unicast routing, Geographic and Random
Routing, Clustering Algorithms in routing, Fault Tolerance in Wireless Sensor Networks, Routing
Protocols for Ad-hoc Wireless Networks Introduction, Issues in Designing a Routing Protocol for Ad-hoc
Wireless Networks; Classification of Routing Protocols; Table Driven Routing Protocols; On-Demand
Routing Protocols, Hybrid Routing Protocols, Hierarchical Routing Protocols and Power-Aware Routing
Protocols. (12)
Transport layer and Quality of Service (QoS): Coverage and deployment, Reliable data transport,
Single packet delivery, Block delivery, Congestion control and rate control, Energy Management in Ad-
hoc Wireless Networks, Classification of Energy Management Schemes, Battery Management Schemes,
Transmission Management Schemes, System Power Management Schemes. (10)
Security in Ad-hoc Wireless Networks: Issues and Challenges in Security Provisioning, Network
Security Attacks, Key Management and Secure Touting Ad-hoc Wireless Networks. (3)
33 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Course Title of the course Program Total Number of contact hours Credit
Code Core
(PCR) /
Electives Lecture Tutoria Practical Total
(PEL) (L) l (T) (P) Hour
s
34 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
UNIT-II: Cloud Architecture- Layers and Models Layers in cloud architecture, Software as a
Service (SaaS), features of SaaS and benefits, Platform as a Service ( PaaS ), features of PaaS
and benefits, Infrastructure as a Service ( IaaS), features of IaaS and benefits, Service
providers, challenges and risks in cloud adoption. Cloud deployment model: Public clouds –
Private clouds – Community clouds - Hybrid clouds - Advantages of Cloud computing. (8L)
35 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
UNIT-IV: Defining the Clouds for Enterprise: Storage as a service, Database as a service,
Process as a service, Information as a service, Integration as a service and Testing as a service.
Scaling cloud infrastructure - Capacity Planning, Cloud Scale. Layered Data Processing
Approach – Cloud, Fog and Edge. (6L)
Pre-Requisite: Database Course Assessment methods (Continuous (CT) and end assessment
Management System (EA))
CT+EA
Course CO1: To introduce basic principles, concepts and applications of data warehousing
Outcomes CO2: To introduce mathematical statistics foundations in data warehousing
CO3: Understand the design of data warehouse with dimensional modeling
CO4: Apply OLAP operations and its advanced applications
Topics Introduction: Moving toward the Information Age, Evolution of Information Technology, Different types
Covered of data (Database Data, Data Warehouses, Transactional Data, Other Kinds of Data), Database Systems
and Data Warehouses, Data warehousing applications (2)
Getting to Know Your Data: Data Objects and Attribute Types (Nominal Attributes, Binary Attributes,
Ordinal Attributes, Numeric Attributes, Discrete versus Continuous Attributes), Basic Statistical
Descriptions of Data (Measuring the Central Tendency: Mean, Median, and Mode, Measuring the
Dispersion of Data: Range, Quar tiles, Variance, Standard Deviation, and Inter quartile Range), Measuring
Data Similarity and Dissimilarity (Data Matrix versus Dissimilarity Matrix, Proximity Measures for
Nominal Attributes, Proximity Measures for Binary Attributes, Dissimilarity of Numeric Data: Minkowski
36 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Distance, Proximity Measures for Ordinal Attributes, Dissimilarity for Attributes of Mixed Types, Cosine
Similarity), (6)
Data Preprocessing: Data Quality, Major Tasks in Data Preprocessing, Data Cleaning (Missing Values,
Noisy Data, Data Cleaning as a Process), Data Integration (Entity Identification Problem, Redundancy
and Correlation Analysis, Tuple Duplication, Data Value Conflict Detection and Resolution), Data
Reduction (Attribute Subset Selection, Regression and Log-Linear Models: Parametric Data Reduction),
Histograms, Data Transformation and Data Discretization (Data Transformation Strategies Overview,
Data Transformation by Normalization, Discretization by Binning) (6)
Data Warehouse: What Is a Data Warehouse? Differences between Operational Database Systems and
Data Warehouses, But, Why Have a Separate Data Warehouse?, Data Warehousing: A Multi-tiered
Architecture, Data Warehouse Models: Enterprise Warehouse, Data Mart, and Virtual Warehouse,
Extraction, Transformation, and Loading, Metadata Repository, Data Warehouse Design and Usage : Data
Warehouse Design Process, Data Warehouse Usage for Information Processing, A Business Analysis
Framework for Data Warehouse Design (6)
Data Warehouse Modeling: Data Cube and OLAP, Data Cube: A Multidimensional Data Model, Stars,
Snowflakes, and Fact Constellations: Schemas for Multidimensional Data Models, Dimensions: The Role
of Concept Hierarchies, Measures: Their Categorization and Computation (4)
OLAP Operations: Typical operations in OLAP, A Starnet Query Model for Querying Multidimensional
Databases, From Online Analytical Processing to Multidimensional Data Mining, Indexing OLAP Data:
Bitmap Index and Join Index, Efficient Processing of OLAP Queries, OLAP Server Architectures:
ROLAP versus MOLAP versus HOLAP, Data Generalization by Attribute-Oriented Induction: Attribute-
Oriented Induction for Data Characterization, Efficient Implementation of Attribute-Oriented Induction,
Attribute-Oriented Induction for Class Comparisons (6)
Data Cube Technology: Data Cube Computation: Preliminary Concepts (Cube Materialization: Full
Cube, Iceberg Cube, Closed Cube, and Cube Shell, General Strategies for Data Cube Computation), Data
Cube Computation Methods: Multiway Array Aggregation for Full Cube Computation, BUC: Computing
Iceberg Cubes from the Apex Cuboid Downward, Star-Cubing: Computing Iceberg Cubes Using a
Dynamic Star-Tree Structure, Pre-computing Shell Fragments for Fast High-Dimensional OLAP,
Processing Advanced Kinds of Queries by Exploring Cube Technology, Sampling Cubes: OLAP-Based
Mining on Sampling Data, Ranking Cubes: Efficient Computation of Top-k Querie
(8)
Multidimensional Data Analysis in Cube Space: Prediction Cubes: Prediction Mining in Cube Space,
Multifeature Cubes: Complex Aggregation at Multiple Granularities, Exception-Based, Discovery-Driven
Cube Space Exploration (4)
Text Text Books:
Books, 1. Building The Data Warehouse, W. H. Inmon, Wiley Computer Publication, 3rd
and/or Edition.
reference 2. Data Modeling Techniques for Data Warehousing, Chuck Ballard, Dirk Herreman,
material Don Schau, Rhonda Bell, Eunsaeng Kim, Ann Valencic, IBM Red Book, February
1998
3. The Data Warehouse Toolkit: The Complete Guide to Dimensional Modeling, Ralph
Kimball & Margy Ross, Wiley Computer Publication, 2nd Edition
37 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Pre-Requisite: Database Course Assessment methods (Continuous (CT) and end assessment
Management System (EA))
CT+EA
Course CO1: To introduce students to the basic concepts and techniques of Data Mining.
Outcomes CO2: To introduce a wide range of clustering, estimation, prediction, and classification
algorithms.
CO3: introduce mathematical statistics foundations of the Data Mining Algorithms
CO4: Apply data mining techniques in inter-disciplinary areas
Topics Introduction: Data Mining as the Evolution of Information Technology, What Kinds of Data Can Be
Covered Mined? What Kinds of Patterns Can Be Mined? Technologies Used in data mining, Different Applications
in data mining, Major Issues in Data Mining, Data Mining and Society, Basic concepts on Data
Warehousing (2)
Mining Frequent Patterns, Associations, and Correlations: Basic Concepts - Frequent Itemsets, Closed
Itemsets, and Association Rule, Apriori Algorithm: Finding Frequent Itemsets by Confined Candidate
Generation, Generating Association Rules from Frequent Itemsets, Improving the Efficiency of Apriori,
A Pattern-Growth Approach for Mining Frequent Itemsets, Mining Frequent Itemsets using Vertical Data
Format, Mining Closed and Max Patterns, Pattern Evaluation Methods (6)
Cluster Analysis: Basic Concepts and Methods, Partitioning Methods (k-Means: A Centroid-Based
Technique, k-Medoids: A Representative Object-Based Technique), Hierarchical Methods (
Agglomerative vs. Divisive Hierarchical Clustering, Distance Measures in Algorithmic Methods, BIRCH:
Multiphase Hierarchical Clustering Using Clustering Feature Trees), Density-Based Methods ( DBSCAN:
Density-Based Clustering Based on Connected Regions with High Density), Grid-Based Methods (
CLIQUE: An Apriori-like Subspace Clustering Method), Evaluation of Clustering (8)
Advanced Cluster Analysis: Probabilistic Model-Based Clustering (Fuzzy Clusters), Clustering High-
Dimensional Data (Problems, Challenges, and Major Methodologies ), Clustering Graph and Network
Data (Applications and Challenges, Similarity Measures, Graph Clustering Methods), Clustering with
Constraints (6)
Outlier Detection: Outliers and Outlier Analysis, Types of Outliers, Challenges of Outlier Detection,
Outlier Detection Methods (Supervised, Semi-Supervised, and Unsupervised Methods, Statistical
Methods, Proximity-Based Methods, Clustering-Based Approaches, Classification-Based Approaches)
(4)
38 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Pre-Requisite: Database Course Assessment methods (Continuous (CT) and end assessment
Management System (EA))
CT+EA
Course CO2: Understand the necessity of Big Data Infrastructure Plan in Information System
Outcomes Design
CO1: Recognize different types of data elements – structural issues, characterization
issues, modelling issues
CO3: Identify the frequent data operations required for various types of data
CO4: Apply techniques to handle streaming data
Topics Introduction: Big data attributes and Definitions, Data Variety – Structured, Semi-structured and
Covered Unstructured, Defining Big Data from 3Vs to 32Vs - Data Domain, Business Intelligent (BI) Domain,
Statistics Domain, Introduction of big data platforms: Hadoop, HDFS, MapReduce, Spark, Google File
System (GFS) and HDFS. (4)
Database Techniques for Big Data: Big data management - Data ingestion, Data storage, Data quality,
Data operations, Data scalability and security; Big data management services - Data cleansing, Data
integration; Storage models - Block-based storage, File-based storage, Object-based storage; Data
Models - Navigational Data Models, Relational Data Models, XML, Canonical Data Model, NoSQL
Movement, NoSQL Solutions for Big Data Management. (6)
NoSQL Data Models: Key-Value Stores, Column-Based Stores, Graph-Based Stores, Document-Based
Stores. (6)
Operation On NoSQL Databases: CRUD operations – Creating, Updating, Accessing and Deleting
Data; Query – Non-DBMS Vs DBMS Approaches, Declarative Query Language (DQL), Hive Query
Language (HQL), Cassandra Query Language (CQL), Spark SQL, Query for Document Store data,
MapReduce functionality; Transaction Management – Isolation Levels and Isolation Strategies, BASE
Theorem, CAP Theorem. (8)
Modelling Streaming Data: Data stream and data model versus data format, Use cases of stream
processing, Data streaming systems - Data harvesting, Data processing, Data analytics; Importance and
implications of streaming data, streaming data solutions, Exploring streaming sensor data, Analyzing the
streaming data. (4)
Resource Management in Big Data Processing Systems: Types of Resource Management – CPU,
Storage, Network, Big Data Processing Systems and Platforms, Big data and Cloud Resources - Single-
Resource Management, Multi-resource Management. (4)
System Optimization for Big Data Processing: Basic Framework of the Hadoop Ecosystem, Parallel
Computation Framework: MapReduce; Job Scheduling of Hadoop, Performance Optimization of HDFS,
Performance Optimization of HBase, Performance Enhancement of Hadoop System. (4)
Security and Privacy in Big Data: Secure Queries Over Encrypted Big Data - Threat Model and Attack
Model, Secure Query Scheme in Clouds, Security Definition of Index-Based Secure Query Techniques,
Implementations of Index-Based Secure Query Techniques; Privacy on Correlated Big Data (4)
39 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Course Title of the course Program Core Total Number of contact hours Credit
Code (PCR) / Lecture Tutorial Practical Total
Electives (PEL) (L) (T) (P) Hours
CSE Business Process PEL 3 0 0 3 3
90X5 Modelling &
Analysis
Pre-Requisite: Basic Knowledge Course Assessment methods (Continuous (CT) and end assessment
of Unified Modelling Language (EA))
CT+EA
Course CO1: Learn the shared language and notations that are used by Information
Outcomes Technology (IT) specialist to communicate with business stakeholders.
CO2: To obtain a comprehensive idea to Manage, analyze, design, improve and
reengineer business processes in industry setting scenarios.
CO3: Understand the core concepts of business processes and their components
and to apply process analysis concepts and techniques.
CO4: Understand how the business process model may interface with business
process management software suites (BPMS), service-oriented architecture
platforms and other modern IT infrastructure platform software
Topics Introduction to Business Process Management: Ingredients of a Business Process, the business
Covered process Lifecycle; Process Identification - Key Processes, Designing a Process Architecture, Construct
Case/Function Matrices, Simple Case studies. (2)
Process Modelling Foundation: Business Process Modelling and Notations (BPMN) core concepts,
Branching and Merging, Exclusive Decisions, Parallel Execution, Inclusive Decisions, Information
Artefacts. (4)
Advanced Process Modelling: Process Decomposition, Process Reuse, Process Rework and
Repetition; Handling Events, Handling Exceptions, Processes and Business Rules, Process
Choreographies and orchestration. (4)
Process Analysis: Qualitative analysis - Value-Added Analysis, Root Cause Analysis Cause–Effect
Diagram, Why–Why Diagram, Quantitative Analysis - Performance Measures, Flow Analysis,
Calculating Cycle Time,
Queueing Theory, Process simulation. (6)
Process Based analysis: Introduction to Analytical Hierarchy Process and Analytical Network
Process. (3)
Process Redesign: The Essence of Process Redesign, Heuristic Process Redesign, Business Process
Operation Heuristics, Business Process Behaviour Heuristics, Organization Heuristics, Information
Heuristics
Deriving business Process from a Product Data Model (5)
Process Automation: Automating Business Processes - BPMS and Architecture of BPMS; Workload
Reduction, Flexible System Integration Execution Transparency, Rule Enforcement, (5)
Process Intelligence: Process Execution and Event Logs, Automatic Process Discovery - The α-
Algorithm, Robust Process Discovery; Performance Analysis - Time Measurement, Cost
Measurement; Quality Measurement, Flexibility Measurement; Conformance Checking -
Conformance of Control Flow, Data and Resources (5)
40 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Course • CO1: To explain why a general graph theory course fails to deal with
Outcomes structure and dynamics of large-scale real-world networks
41 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
REFERENCE Books:
1. M. E. J. Newman, The structure and function of complex networks,
SIAM Review 45, 167-256 (2003).
2. R. Albert and A. L. Barabasi Statistical mechanics of complex networks.
Rev. Mod. Phys., Vol. 74, No. 1, January 2002.
42 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Topics Introduction to Soft Computing: Characteristics of soft computing, soft computing vs.
Covered hard computing, soft computing constituents, hybrid computing, some applications of
soft computing techniques. 3L
Fuzzy Logic: Crisp Sets vs. fuzzy sets, membership functions, Characteristics of fuzzy
sets, Operations on fuzzy sets, Fuzzy Variable, Fuzzy Extension principles, Fuzzy and
Crisp relations, Operations on Fuzzy Relations, Composition and Decomposition of
Fuzzy Relations. Fuzzy Measures and Fuzzy Arithmetic, Fuzzification and
Defuzzification, Fuzzy System, Fuzzy Inference /Approximate reasoning, fuzzy decision
making.Applications: Pattern Recognition, Image Processing and Controller. 12L
Neural Networks: Introduction to Neural Networks, Biological Neural Networks,
McCulloch Pitt model, Neuron and its model, Activation functions, Learning rules,
Supervised Learning: Single Layer and Multi-layer perceptron, Delta learning rule, Back
Propagation algorithm, Unsupervised Learning: Hebbian Learning, Competitive
learning, Self-organizing Maps. 12L
Evolutionary Computing and Genetic Algorithm:Optimization and Some Traditional
Methods.Evolutionary Computing, Basic concepts and working principle of simple GA
(SGA), Genetic Operators: Selection, Crossover and Mutation, Algorithm and flow chart
of SGA, Encoding & Decoding, Population Initialization, Objective/fitness Function,
Applications: TSP. Multi-objective Genetic Algorithm (MOGA): Multi-objective
optimization problems (MOOPs), Conflicting objectives, Non-Pareto and Pareto-based
approaches to solve multi-objective optimization problems, Objective space and variable
space, Domination, Pareto front, Pareto Set, NSGA-II: Non-domination Sorting,
Crowding distance operator. 12L
Hybrid Systems: Integration of neural networks, fuzzy logic and genetic algorithms. 3L
Suggested Simulation/Experiments using Matlab/Python Lib: Study of neural network
toolbox and fuzzy logic toolbox, Simple implementation of Artificial Neural Network,
genetic Algorithm and Fuzzy Logic.
Text Text Books:
Books, 1. S. Rajsekharan and VijayalakshmiPai, “Neural Networks, Fuzzy Logic and Genetic
and/or Algorithm: Synthesis and Applications”, Prentice Hall of India.
reference 2. S.N. Sivanandam& S.N. Deepa, Principles of Soft Computing, Wiley Publications,
material 2nd Edition, 2011.
3. Timothy J. Ross, “Fuzzy Logic with Engineering Applications”.
4. K. Deb, Multi-objective Optimization using Evolutionary Algorithms, Wiley India.
Reference Books:
5. George J Klir, Bo Yuan, Fuzzy sets & Fuzzy Logic, Theory & Applications, PHI
Publication, 1st Edition, 2009.
6. Neuro-Fuzzy Systems, Chin Teng Lin, C. S. George Lee, PHI.
7. Fuzzy Logic: A Pratical approach, F. Martin, Mc neill, and Ellen Thro, AP
Professional, 2000.
8. An Introduction to Genetic Algorithms, Melanie Mitchell, MIT Press, 2000.
9. Neuro-Fuzzy and soft Computing, J.-S. R. Jang, C.-T. Sun, and E. Mizutani, PHI
Learning, 2009.
10. Neural Networks and Learning Machines, (3rd Edn.), Simon Haykin, PHI.
11. Fuzzy Logic with Engineering Applications (3rd Edn.), Timothy J. Ross, Willey,
2010
12. Foundations of Neural Networks, Fuzzy Systems, and Knowldge Engineering,
Nikola K. Kasabov, MIT Press, 1998., 2011
43 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Course Title of the course Program Core Total Number of contact hours Credit
Code (PCR) / Lecture Tutorial Practical Total
Electives (PEL) (L) (T) (P) Hours
CS Pattern PEL 3 1 0 4 4
90XX Recognition (G.
Sarker)
Pre-requisites Course Assessment methods (Continuous evaluation (CE) and end
assessment (EA))
Artificial Intelligence CE+EA
Course CO1: Idea about Pattern and Pattern Class, Design of a Pattern Recognition System
Outcomes CO2: Idea of Instar , Outstar, Groups of Instar and Outstar, Different types of
Memories.
CO3: Concept of Feedforward, Feedback and Competitive Learning Network
CO4: Concept of Complex PR Tasks: RBF, RBF Network for Pattern Classification
CO5 : Idea of Temporal Pattern Recognition: Concepts
Topics 1. Pattern and Pattern Class: Design of a Pattern Recognition System, Syntactic and
Covered Decision Theoretic Approach, Bayesian Decision Theory, Continuous Features, Error,
Risk and Loss
2. Parametric and Non Parametric Methods: Histogram Method – Kernel Based
Methods – K - Nearest Neighbour Method -- Probabilistic Neural Network base on
Parzon Window.
3. Basics of ANN : Instar , Outstar, Groups of Instar and Outstar, Different types of
Memories.
4. Pattern Recognition Tasks and Pattern Recognition Problems: Different PR Tasks by
FF, FB and Competitive Learning Network, Pattern Clustering, Feature Mapping
Problem, Different Feature Mapping Network, Self Organizing Network.
5. FF ANN: FF ANN: Pattern Association Network, Hebb’s Law, Pattern Classification
Network.
6. Single and Multilayer Network: Gradient Descent Procedure, Newton’s Algorithm,
Fixed Increment Learning, Variable Increment Learning, Support Vector
Machine(SVM), Multilayer Neural Networks, Unsupervised Learning.
7. FB ANN: Pattern Association, Pattern Storage, Pattern Environment Storage, Auto
association , Hopfield Network, Capacity and Energy of a Hopfield Network, State
Transition Diagram, Stochastic Network and Boltzmann Machine.
8. Competitive Learning Network: Pattern Storage, Pattern Clustering Network,
Minimal Learning, Malsburg Learning and Leaky Learning
9. Complex PR Tasks: RBF, RBF Network for Pattern Classification, Advantages of RBF
over MLFF ANN, CPN Network
10. Temporal Pattern Recognition: Concepts, Problems in temporal sequence,
Architecture for temporal PR Tasks, Avalanche Structure, Jordon Network, Fully
Connected Recurrent Network, Difference between Avalanche Network and Jordon
Network.
44 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
45 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Reference Books:
3. John M. Semmlow, Biosignal and Biomedical Image Processing, Marcel Dekker,
Inc., 2004.
4. R. C. Ganzalez and R. E. Woods, Digital Image Processing, 4th edition, Pearson,
2018.
5. J. S. Suri, D. L. Wilson, and S. Laxminarayan, Handbook of Biomedical Image
Analysis, Vol. 1 and Vol. 2, Kluwer Academic, 2005.
16. The MIT Encyclopedia of the Cognitive Sciences edited by Robert A. Wilson and Frank
C. Keil
Topics Basic Concepts: Speech Fundamentals: Articulatory Phonetics – Production and Classification
Covered of Speech Sounds; Acoustic Phonetics – acoustics of speech production; Review of Digital
Signal Processing concepts; Short-Time Fourier Transform, Filter-Bank and LPC Methods. (10
classes)
Speech Analysis: Features, Feature Extraction and Pattern Comparison Techniques: Speech
distortion measures – mathematical and perceptual – Log Spectral Distance, Cepstral
Distances, Weighted Cepstral Distances and Filtering, Likelihood Distortions, Spectral
Distortion using a Warped Frequency Scale, LPC, PLP and MFCC Coefficients, Time Alignment
and Normalization – Dynamic Time Warping, Multiple Time – Alignment Paths. (10 classes)
Speech Modeling: Hidden Markov Models: Markov Processes, HMMs – Evaluation, Optimal
State Sequence – Viterbi Search, Baum-Welch Parameter Re-estimation, Implementation
issues. (5 classes)
Speech Recognition: Large Vocabulary Continuous Speech Recognition: Architecture of a large
vocabulary continuous speech recognition system – acoustics and language models – ngrams,
context dependent sub-word units; Applications and present status. (7 classes)
Speech Synthesis: Text-to-Speech Synthesis: Concatenative and waveform synthesis methods,
subword units for TTS, intelligibility and naturalness – role of prosody, Applications and
present status. (8 classes)
2.Daniel Jurafsky and James H Martin, “Speech and Language Processing – An Introduction to
Natural Language Processing, Computational Linguistics, and Speech Recognition”, Pearson
Education.
REFERENCES
1.Steven W. Smith, “The Scientist and Engineer’s Guide to Digital Signal Processing”,
California Technical Publishing.
2.Thomas F Quatieri, “Discrete-Time Speech Signal Processing – Principles and Practice”,
Pearson Education.
3.Claudio Becchetti and Lucio Prina Ricotti, “Speech Recognition”, John Wiley and Sons, 1999.
4.Ben gold and Nelson Morgan, “Speech and audio signal processing”, processing and
perception of speech and music, Wiley- India Edition, 2006 Edition.
5.Frederick Jelinek, “Statistical Methods of Speech Recognition”, MIT Press.
Topics Covered
UNIT I Fundamentals of knowledge and its types: Concept of knowledge, types
of knowledge, declarative knowledge, procedural knowledge, inheritable knowledge,
inferential knowledge, relational knowledge, heuristic knowledge, commonsense
knowledge, explicit knowledge, tacit knowledge, expert knowledge, uncertain
knowledge. Need for maintaining Knowledge base and its management and
engineering, Valuation of Intellectual Capital, Intellectual Capital: Human vs.
Structural Capital. The knowledge Life Cycle and its models. (5)
UNIT II Knowledge Representation and understanding: Data, information and
knowledge relation, Knowledge vs Intelligence, the need of knowledge
representation, knowledge representation using rules, procedural vs. declarative
knowledge. Levels of knowledge representation, granularity of knowledge
representation, granularity vs. size of knowledge-base, techniques of knowledge
representation, frames, frame-based reasoning, rule-based reasoning, case-based
reasoning, frame based knowledge representation, forward vs. backward reasoning.
48 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
(10 L)
UNITIII Knowledge Creation, Storage And Acquisition: Nonaka’s Model of
Knowledge Creation & Transformation, Knowledge Architecture, knowledge
acquisition, indexing techniques, fuzzy distance calculation, issues in knowledge
acquisition, requirements of knowledge acquisition techniques, issues in knowledge
acquisition in organization, knowledge organization and management, consistency of
knowledge representation during creation, storage and acquisition. (8 L)
UNIT IV Knowledge Search: Dumb search, Heuristic search in Knowledge-
Based Systems, depth-first search, breadth-first search, heuristic search, greedy
search, A* algorithms, hill climbing. (3 L)
UNIT IV Knowledge organization in knowledge base: Need of organizing
knowledge, techniques of knowledge organization, Application of object-oriented
and case-based knowledge organizations with case studies. (4L)
UNIT V Knowledge reuse: Knowledge reuse technique in the designing of expert
systems, components of knowledge engineering based problem solution
methodology: problem representation and derivation of solution through reasoning,
rule-based systems, case based reasoning (CBR), decision tree etc., weaknesses of
rule based systems. Re-Using Past History Explicitly as Knowledge in CBR systems,
some Case studies of CBR, Successful vs failed cases, Indexing the case library:
Advantages and Disadvantages of Case based systems. Knowledge Based systems as
Expert systems, Decision Support Systems (DSS) or Detections Systems (DS);
Knowledge Based Systems vs Expert Systems, Advantage and disadvantage of
Knowledge Based Systems vs Expert Systems. Practical case studies of expert
systems, DSS and DS. (12)
Textbooks/Reference Text Books:
books 1. Artificial Intelligence and Knowledge Engineering, Winston, PHI publication ,
2004.
2. Conceptual Information Processing, R.C Schank, Amsterdum North Holland,
2003.
3. Introduction to Expert Systems, Peter Jackson, Addison Wesley, 3rd. edition.
4. Artificial Intelligence: A Modern Approach, Russell, Stuart, and Peter Norvig. 4th.
ed. Pearson, 2020.
Reference Books:
1. The basic concepts of knowledge engineering by Shank and J.G. Carbonell, PHI
publication, 2003.
2. Principles of Artificial intelligence, Nillson, N.J., Morgan Kaufmann publication,
2004.
3. Knowledge Management, by Shelda Debowski, John Wiley & Sons publication,.
4. Machine Learning and Data mining: Methods and Applications, Michalski,
Bratko, Kubat, Wiley.
49 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Textbooks/Reference Jurafsky, David, and James H. Martin. Speech and Language Processing: An
books Introduction to Natural Language Processing, Computational Linguistics and
Speech Recognition. Prentice-Hall, 2000. ISBN: 0130950696.
50 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
51 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Department of Biotechnology
Course Title of the course Program Core Total Number of contact hours Credit
Code (PCR) / Lecture Tutorial Practical Total
Electives (PEL) (L) (T) (P) Hours
CSE Deep Learning for PEL 3 0 0 3 3
90XX Image Analysis
Basics of image processing, Course Assessment methods (Continuous (CT) and end assessment
probability and statistics, linear (EA))
algebra, Fourier transform, etc.
CT+EA
Course CO1: To develop the idea of using deep learning models for image preprocessing and
Outcomes image restoration problems.
CO2: To learn about the principles of deep learning models used for image
classification and segmentation.
CO3: To understand the deep learning models for image representation.
CO4: To apply deep learning models to state-of-the-art image processing problems.
Topics 1) Introduction to artificial neural network, deep learning for visual data, data-driven
Covered image classification, linear classification, activation functions, various cost
functions, gradient-based optimization with backpropagation. [6]
2) Introduction to different deep learning models: Convolutional Neural Networks
(CNNs), Long Short Term Memory Networks (LSTMs), Recurrent Neural Networks
(RNNs), Generative Adversarial Networks (GANs), Deep Belief Networks (DBNs),
Restricted Boltzmann Machines ( RBMs), Autoencoders, Transfer Learning, Deep
Neural Networks (DNN), R-CNN, etc. [12]
3) Introduction to image processing, image enhancement, image restoration, image
classification and recognition, image segmentation and image representation. [8]
4) Applications of deep learning models in image enhancement, image restoration,
image classification, image segmentation and image representation. [16]
Text Books, Text Books:
and/or 1. Deep Learning By Ian Goodfellow, Yoshua Bengio and Aaron Courville, MIT
reference Press
material 2. Deep Learning: Methods and Applications By Li Deng and Dong Yu,
Nowpublishers
3. Neural Networks and Deep Learning By Michael Nielsen, Determination Press
4. Deep Learning with Python by Francois Chollet, Manning Publications
5. Digital Image Processing by Gonzalez and Woods, Prentice Hall
6. Fundamentals of Digital Image Processing by Anil. K. Jain, Prentice Hall.
52 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
53 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Enabling real time systems: Existing systems, novel systems, evaluation. [5]
54 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Reference Books:
7) Yun Fu, Human Activity Recognition and Prediction, Springer, 2015.
56 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
12) Deep Learning Models: Convolutional Neural Networks (CNNs), Long Short Term
Memory Networks (LSTMs), Recurrent Neural Networks (RNNs), Generative
Adversarial Networks (GANs), Deep Belief Networks (DBNs), Restricted
Boltzmann Machines (RBMs), Autoencoders, Transfer Learning, Deep Neural
Networks (DNN), R-CNN, etc. [10]
14) Face Recognition: Introduction, image acquisition, face detection, feature extraction,
matching and advanced topics. [4]
15) Iris Recognition: Introduction, iris recognition systems, image acquisition, iris
segmentation, iris normalization, iris encoding and matching, iris quality and
performance evaluation. [4]
57 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
10. Richard O. Duda, Peter E. Hart, David G. Stork, Pattern Classification, 2nd
Edition, Wiley, 2000.
11. R.C. Gonzalez and R. E. Woods, Digital Image Processing, Pearson, 2009.
Reference Books:
D. R. Kisku, P. Gupta and M. Tistarelli, Multibiometrics Systems: Modern
Perspectives to Identity Verification, LAMBERT Publishing, 2012.
D. R. Kisku, P. Gupta and J. K. Sing, Advances in Biometrics for Secure Human
Authentication and Recognition, CRC Press, Taylor & Francis, 2013.
D. R. Kisku, P. Gupta and J. K. Sing, Design and Implementation of Healthcare
Biometric Systems, IGI Global, 2019.
M. Dawson, D. R. Kisku, P. Gupta, J. K. Sing and W. Li, Developing Next-
Generation Countermeasures for Homeland Security Threat Prevention, IGI
Global, 2016.
58 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
59 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Course Title of the course Program Core Total Number of contact hours Credit
Code (PCR) / Lecture Tutorial Practical Total
Electives (PEL) (L) (T) (P) Hours
CSE 9056 Digital Forensics PEL 3 0 0 3 3
Digital Forensics
Introduction to Forensics
Legal issues, context, and digital forensics.
Overview of Digital investigation: The Need for Digital Forensics and Types of Digital
Forensics: File System Forensics, Memory Forensics, Network Forensics, Cloud Forensics,
Database and email forensics.
Digital Evidences: Types and characteristics
Challenges for Evidence Handling (Evidence collection, preservation, testimony)
use of digital forensics tools.
Memory Forensics
History of Memory Forensics and Challenges, x86/x86_64 architectures
Memory Acquisition, Live Collection in Linux with open-source tool LiME,
Memory Analysis/examination using open-source tool Volatility
Analysis Techniques: keyword searches, timelines, hidden data, application analysis,
Command execution and User activity, Recovering and tracking user activity, Recovering
attacker activity from memory,
Evidence preservation and Report Generation
Network Forensics
Introduction to Network Forensics
Introduction to Wireshark, understanding network Protocols with Wireshark, Packet
Capture using Wireshark, tshark and tcpdump, Packet analysis.
Artifact collection, Analysis/ examination of logs.
Cloud Forensics
Introduction to Cloud Forensics
Challenges faced by Law enforcement and government agencies
Cloud Storage Forensics: Evidence Source Identification and preservation in the cloud
storage, Collection of Evidence from cloud storage services, Examination and analysis of
collected data.
Dropbox Analysis: Data remnants on user machines, Evidence source identification and
collection, Examination and analysis of collected data
60 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Google Drive Analysis: Data remnants on cloud storages, Evidence source identification
and collection, Examination and analysis of collected data
Issues in cloud forensics
Text Books, Text Books:
and/or Casey, Eoghan. Handbook of digital forensics and investigation, Academnic Press, 2009
reference Reference Books:
material Sammons, John, and Michael Cross. The basics of cyber safety: computer and
mobile device safety made easy. Elsevier, 2016.
Marjie T. Britz, Computer Forensics and Cyber Crime, Pearson, Third Edition.
Clint P Garrison, Digital Forensics for Network, Internet, and Cloud Computing A
forensic evidence guide for moving targets and data. Syngress Publishing, Inc. 2010.
Bill Nelson, Amelia Phillips,Christopher Steuart, Guide to Computer Forensics and
Investigations . Cengage Learning, 2014
Incident Response & Computer Forensics by Kevin Mandia, Chris Prosise, Wiley.
Cory Altheide, Harlan Carvey, Digital Forensics with Open-Source Tools, Syngress
imprint of Elsevier.
(8L)
UNIT-IV: Cyber Security: Organizational Implications: Introduction cost of cybercrimes
and IPR issues, web threats for organizations, security and privacy implications, social media
marketing: security risks and perils for organizations, social computing and the associated
challenges for organizations. Cybercrime and Cyber terrorism: Introduction, intellectual
property in the cyberspace, the ethical dimension of cybercrimes the psychology, mind set and
skills of hackers and other cyber criminals. (12L)
UNIT-V: Privacy Issues: Basic Data Privacy Concepts: Fundamental Concepts, Data Privacy
Attacks, Data linking and profiling, privacy policies and their specifications, privacy policy
languages, privacy in different domains- medical, financial, etc. (5L)
62 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
63 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
UNIT-II: Process Modelling Foundation: Business Process Modelling and Notations (BPMN) core
concepts, Branching and Merging, Exclusive Decisions, Parallel Execution, Inclusive Decisions,
Information Artefacts. (4L)
64 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
UNIT-III: Advanced Process Modelling: Process Decomposition, Process Reuse, Process Rework
and Repetition; Handling Events, Handling Exceptions, Processes and Business Rules, Process
Choreographies and orchestration. (4L)
UNIT-IV: Process Discovery: The Setting of Process Discovery, Discovery Methods - Evidence-
Based Discovery, Interview-Based Discovery, Workshop-Based Discovery, Strengths and
Limitations; Process Modelling Method - Identify the Process Boundaries, Activities, Events,
Resources Control Flow and Additional Elements, Process Model Quality Assurance (6L)
UNIT-V: Process Analysis: Qualitative analysis - Value-Added Analysis, Root Cause Analysis
Cause–Effect Diagram, Why–Why Diagram, Quantitative Analysis - Performance Measures, Flow
Analysis, Calculating Cycle Time, Queueing Theory, Process simulation. (6L)
UNIT-VI: Process Based analysis: Introduction to Analytical Hierarchy Process and Analytical
Network Process. (4L)
UNIT-VII: Process Redesign: The Essence of Process Redesign, Heuristic Process Redesign,
Business Process Operation Heuristics, Business Process Behaviour Heuristics, Organization
Heuristics, Information Heuristics, Deriving business Process from a Product Data Model (6L)
65 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
UNIT-IV: Lightweight ontologies for the Semantic Web: Syntax vs. Semantics, Syntactic
foundations: XML and URIs, Resource Description Framework (RDF) and RDF Schema,
Linked Data. (8L)
UNIT-V: First-order logic ontologies - Syntax and semantics of first-order logic, Structures,
interpretations, models; Reasoning with first-order logic ontologies– CNF, skolemization,
unification, Resolution-based theorem proving– Theorem proving with ontologies, SAT-
based model finding - Common Logic syntax.(8L)
UNIT-VI: The Web Ontology Language (OWL2) - OWL2 syntax and semantics, Description
Logics – OWL2 syntax, Reasoning with OWL2, Expressiveness and tractability trade off;
Advanced aspects of logic-based ontologies - Reference, domain, and application ontologies,
Ontology patterns, Modules and relationships between ontologies, Ontology Verification and
Definability. (8L)
66 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Pre-requisites: Those who opted Course Assessment methods (Continuous Assessment (CA), Mid-Term
Advanced S/W Engg in pool-1 (MT), End Term (ET))
is not eligible
CA+ MT + ET [CA: 15%, MT: 25%, ET: 60%]
Course At the completion of this course students will be able to:
Outcomes ● CO1: Understand the evolution of software testing techniques, their goals and learn
the various models of software testing.
● CO2: Generate test cases for software systems using black box and white box testing
techniques.
● CO3: Carry out regression testing of software systems.
● CO4: Test conventional, object-oriented and web based software.
● CO5: Understand debugging software and types of debuggers.
Topics UNIT-I: Introduction to software testing, Basic concepts, Verification and Validation, Black
Covered box testing: Boundary value testing, Equivalence class testing, State Table Based Testing,
Decision Table Based Testing, Cause-Effect Graph based Testing, Positive and Negative
Testing, Orthogonal Array Testing. [10L]
UNIT-II: White box testing: statement coverage, Branch coverage, condition coverage,
MC/DC, path coverage, McCabe’s cyclomatic complexity, Data flow based testing, Mutation
testing. [10L]
UNIT-III: Static testing, Integration testing, System testing, Interaction testing, Performance
testing, Regression testing, Error seeding, Debugging. [10L]
67 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
UNIT-IV: S/W configuration management, monitoring & controlling S/W projects, developing
requirements, risk management, project tracking & control, communication & negotiating.
(10L)
UNIT-V: S/W quality, S/W quality engineering, defining quality requirements, quality
standards, practices & conventions, ISO 9000, ISO 9001, S/W quality matrices, managerial and
organization issues, defect prevention, reviews & audits, SEI capability maturity model, PSP,
six sigma. (8L)
Text Books, Text Books:
and/or 1. B. Hughes, M. Cotterell, Rajib Mall, Software Project Management, McGraw Hill ,
reference 2015
material 2. R. Walker, Software Project Management, Pearson , 2003
Reference Books:
7. R. H. Thayer, Software Engineering Project management, IEEE CS Press , 1988.
8. R. Pressman, Software Engineering: A Practitioner’s approach, McGraw Hill , 2005.
UNIT-II: Cloud Architecture- Layers and Models Layers in cloud architecture, Software as a
Service (SaaS), features of SaaS and benefits, Platform as a Service ( PaaS ), features of PaaS
and benefits, Infrastructure as a Service ( IaaS), features of IaaS and benefits, Service
providers, challenges and risks in cloud adoption. Cloud deployment model: Public clouds –
Private clouds – Community clouds - Hybrid clouds - Advantages of Cloud computing. (8L)
UNIT-IV: Defining the Clouds for Enterprise: Storage as a service, Database as a service,
Process as a service, Information as a service, Integration as a service and Testing as a service.
Scaling cloud infrastructure - Capacity Planning, Cloud Scale. Layered Data Processing
Approach – Cloud, Fog and Edge. (6L)
Topics Introduction and basic concepts for DAI (distributed artificial intelligence). (4)
Covered Coordination methods general models, joint coordination techniques,
organizational structures, information exchange on the metalevel, multi-agent
planning, explicit analysis and synchronisation. (10)
Negotiation methods: principles, protocols, production sequencing as negotiations,
conventions for automatic negotiations. (6)
Interoperability: Methods for interoperation of software, speech acts, KQML,
FIPA. (5)
Multi-agent architectures: Low-level architectural support, DAI-testbeds, agent-
oriented software development. (10)
Agent theory: Fundamentals of modal logic, the BDI architecture. (5)
Agent architectures: deliberative, reactive and hybrid architectures. (5)
Mobile agents: requirements, implementation, safety for mobile agents,
environments for mobile agents. Agent typology and technical questions.
Applications. (6)
Practical part of the course that contains exercises and a project that includes
implementation of a multi-agent system. (5)
UNIT-III: Web Services and Contemporary SOA: Message exchange patterns- Service
activity-coordination-Atomic transactions- Business activities-Orchestration-Choreography;
Web Services and Contemporary SOA(Issues) : Addressing- Reliable messaging- Correlation
Policies- Metadata exchange- Security- Notification and eventing. (6L)
UNIT-IV: Building SOA (Planning and Analysis): SOA Delivery Strategies- SOA delivery
lifecycle phases- The top-down strategy- The bottom-up strategy- The agile strategy Service-
Oriented Analysis (Introduction): Introduction to service-oriented analysis- Benefits of a
business-centric SOA- Deriving business services. (6L)
72 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Course ∙ CO1: Can have the efficiency to act in a strategic situation. ∙ CO2: Can
Outcomes
analyse the strategic interactions among agents. ∙ CO3: Can understand the
modern state of the art in Game Theory and its applications.
73 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
74 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
75 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Course CO1: The course would give sufficient insights in the evolution of reasonable and
Outcomes formal models of computation and overall development of the theory of
Computability to define what is Computable.
CO2: The Course will enable students to perceive Computability Theory as a basis
for Computational Complexity Theory and efficient computation.
CO3: The course will enable the students to infer practical consequences of the
concepts and theorems at each stage and relate to applications of the theory in a
natural way
Topics Review of: Basic Notations, Logic, Set Theory, Algebra (Structures, k-adic Representation,
Covered Partial and Total Functions), Formal Language Theory (Words and Languages). [2]
Axioms, theories and Paradoxes-Models and Interpretations, Formal Axiomatic Systems,
Formalization of Logic and Mathematics – Decidability, Completeness (Gödel’s First
Incompleteness Theorem), Consistency (Gödel’s Second Incompleteness Theorem) and
consequences. [4]
Formal Models of Computation, Algorithms and Computability; General Recursive
Functions, λ-Calculus, TMs, The Computability Thesis (Church Turing Thesis). [5]
The Turing Machine – Basic Model, Generalized Models, Reduced Model, Equivalence
between Models, The Universal Turing Machine -Coding and Enumeration, Evolution of
the Modern Computer – The Generalized View (General Purpose Computers {GPC}),
Formalization of Definition and Characterization for Design of Algorithms, Conceptualizing
Operating Systems, Design of Random-Access Machines. [10]
Semi-Decidable sets, Parametrization and Recursion Theorems (RT), Recursive Program
Definition and Execution, Conceptualization of Function Calls in GPC. [2]
Decidability, Semi-decidability and Undecidability in the Light of Turing Machine based
Inferences, Computable and Incomputable Functions/Problems. [2]
Computational Problems and Algorithm Design – The Decision, Search, Counting and
Enumeration Problems. [2]
Incomputable (Non-Computable) Problems – The Halting Problem, Properties of Turing
Languages, The Post’s Correspondence Problem, Program Termination, Correctness of
Algorithms (and Programs), Word Problems, Existence of Zeros and Functions, Provability
and Satisfiability of Formulas of the First order theory. [8]
Proving Non-computability – Using Methods of Diagonalization and Reduction, Using the
RT, Using Rice’s Theorem. [2]
Oracle TMs and Computation, Turing Reductions and Turing Degrees and Hierarchies of
Unsolvability. [3]
P, NP and Relative Computability. [2]
Text Books, Text Books:
and/or Introduction to the Theory of Computation by Michael Sipser
reference Reference Books:
material Handbook of Computability Theory by Edward Griffor
Computability and Complexity Theory by Homer and Selman
Computers and Intractability by Garey & Johnson
78 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
CS 90 Computational PEL 3 0 0 3 3
Complexity
Theory
79 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
80 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
CS 90 Online PEL 3 0 0 3 3
Algorithms
81 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Probability
Course ∙ CO1: To be able to understand the need for online algorithm design.
Outcomes
∙ CO2: To be able to recognize a real life problem as an online
algorithm design problem.
∙ CO3: Can analyze the online algorithms..
CS 90 Algorithmic PEL 3 0 0 3 3
Mechanism
Design
82 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
84 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Reference Books:
1. N. Deo. Graph Theory; With Applications to Engineering and Computer Science. PHI,
1974
2. S. Pirzada. An Introduction to Graph Theory. Orient Blackswan, 2014
85 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
3. R. J. Wilson and J.J. Watkins. Graphs: An Introductory Approach. John Wiley and Sons
Inc.
Pre-requisites Course Assessment methods (Continuous (CT) and end assessment (EA))
Digital Electronics, CT + EA
Computer Organisation,
Algorithm Design..
Course CO1: To visit the various stages of the VLSI design cycle and appreciate the role of
Outcomes automation therein.
CO2 : To appreciate how High Level Synthesis converts an HDL code into an
architecture level design.
CO3 : To discuss the algorithmic approach to physical design.
CO4 : To emphasize the importance to testability measures in the design.
Topics VLSI Design cycle. Design styles. System packaging styles. Fabrication of VLSI devices.
Covered Design rules-overview. (5)
HLS : Scheduling in High Level Synthesis. ASAP and ALAP schedules. Time constrained
and Resource constrained scheduling. (5)
HLS : Allocation and Binding. Datapath Architectures and Allocation tasks. (5)
Partitioning. Clustering techniques. Group Migration algorithms. (3)
Floorplanning. Constraint based Floorplanning. Rectangular Dualization. Hierarchical
Tree based methods. Simulated Evolution approaches. Timing Driven floorplanning.
(5)
Placement. Simulation based placement algorithms. Partitioning based placement
algorithms. Cluster Growth. (4)
Global Routing. Maze Routing algorithms. Line probe algorithms. Shortest Path based
algorithms. Steiner’s Tree based algorithms. (4)
Detailed Routing. Channel Routing Algorithms. Switchbox Routing. Over-the-cell
routing. Clock and Power Routing. (4)
Design for testability. Fault testing. Ad-hoc and structured DFT techniques. (7)
Text Books, Text Books
and/or 1. Algorithms for VLSI Physical Design Automation. N.A.Sherwani. Kluwer Academic
reference Publishers.
material 2. High-Level Synthesis : Introduction to Chip and System Design. Gajski et. al. . Kluwer
Academic Publishers.
3. Digital Systems Testing and Testable Design. Abramovici et.al. Jaico Publications
Reference Books
4. VLSI Physical Design Automation. Sadiq M. Sait and Habib Youssef. Kluwer
Academic Publishers.
5. Algorithms for VLSI Design Automation. Sabih H. Gerez. Wiley India.
6. Essentials of Electronic Testing for Digital, Memory and Mixed Signal VLSI Circuits.
Bushnell and Agrawal. Kluwer Academic Publishers.
Topics
Covered Unit 1 :What are Cyber-Physical Systems? [2 hours]
Cyber-Physical Systems (CPS) in the real world, Basic principles of design and
validation of CPS, Industry 4.0, AutoSAR, IIOT implications, Building
Automation, Medical CPS
87 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
Attacks on SmartGrids
instruction delivery and Speculation, Case study of ILP concepts in the Cortex-
A75, Cortex-A77, and Cortex-A55 processors. [10]
89 | P a g e
M. TECH. IN COMPUTER SCIENCE AND ENGINEERING
UNIT-II: Sensors and Signals, Discretization of Signals and A/D Converter, Quantization
Noise, SNR and D/A Converter, Arduino Uno, I/O Devices: Timers and Counters, Watchdog
Timers, Interrupt Controllers, Serial Communication and Timer, Controller Design using
Arduino
(10L)
UNIT-III: Power Aware Embedded System, SD and DD Algorithm, Parallel Operations and
VLIW, Code Efficiency, DSP Application and Address Generation Unit
(5L)
UNIT-IV: Real Time OS, RMS Algorithm, EDF Algorithm and Resource Constraint Issue,
Priority Inversion and Priority Inheritance Protocol
(5L)
UNIT-V: Modelling and Specification, FSM, State chart and Statemate Semantics, Program
State Machines, SDL, Data Flow Model, Hardware Synthesis, Scheduling, Case study: Digital
camera design.
(7L)
UNIT-VI: HW-SW Partitioning, Optimization, Simulation, Formal Verification.
(5L)
Text Books, Text Books:
and/or 9. Embedded System Design: A Unified Hardware / Software Introduction -Frank
reference Vahid, Tony Givargis.
material 10. Embedded System Design: Modeling, Synthesis and Verification- D.D. Gajski, S.
Abdi, A. Gerstlauer, G. Schirner
Reference Books:
9. Embedded System Design- Peter Marwedel.
91 | P a g e