Monday, 19 November 2012

syllabus



Appendix – I: Study and Evaluation Scheme

UPTU M. Tech. - CS/IT


SEMESTER-1




S.N.

Course Code

Subject

Periods

Evaluation Scheme

Subject Total

Sessional


ESE



Theory
L
T
Lab

CT
TA
Total

Total

1.
CS/IT 11
Foundations of  Computer Science
3
1

20
30
50
100
150
2.
CS/IT 12
Computer Organization and Architecture
3
1

20
30
50
100
150
3.
CS/IT 13

OS and DBMS
3
1
2
 20
30*
50
100
150
4.
CS/IT 14

Data Networks
3
1
2
20
30*
50
100
150


Total

12
4
4


200
400
600


               * 30 marks are kept for tutorials, assignments, quizzes and lab








UPTU M. Tech.  – CS/IT


SEMESTER-II




S.N.

Course Code

Subject

Periods

Evaluation Scheme

Subject Total

Sessional


ESE



Theory
L
T
Lab
(*)
CT
TA
Total

Total

1.
CS/IT 2xy **
Elective – 1

3
1

20
30*

100
150
2.
CS/IT 2xy **
Elective – 2

3
1

20
30*

100
150
3.
CS/IT 2xy **
Elective - 3
3
1

 20
30*

100
150
4.
CS/IT 2xy **
Elective - 4
3
1

20
30*

100
150


Total

12
4



200
400
600


* 30 marks are kept for tutorials, assignments, quizzes and lab

            ** Refer the list of streams and their respective courses for the values of x and y

 (*)  The existence of 2 periods of lab for elective will be decided as per the nature of the elective
 









UPTU M. Tech. – CS/IT



SEMESTER-III




S.N.

Course Code

Subject

Periods

Evaluation Scheme

Subject Total

Sessional


ESE



Theory
L
T
Lab
(*)
CT
TA
Total

Total

1.
CS/IT 3xy **
Elective – 5

3
1

20
30*
50
100
150
2.
CS/IT 3xy **
Elective – 6

3
1

20
30*
50
100
150
3.
CS/IT 31
Professional Aspects in Software Engineering
2
-
-
 50
-
50
-
50
4.
CS/IT 32
Seminar

-
-
-
-
-
50
-
50
5.
CS/IT 33
Dissertation

-
-

-
-
100
-
100


Total

8
2

-
-
300
200
500

                * 30 marks are kept for tutorials, assignments, quizzes and lab

**  Refer the list of streams and their respective courses for the values of x and y

(*)  The existence of 2 periods of lab for elective/dissertation will be decided as per the nature of the elective/dissertation



UPTU M. Tech. – CS/IT



SEMESTER-IV




S.N.

Course Code

Subject

Periods

Evaluation Scheme

Subject Total

Sessional


ESE



Theory
L
T
Lab
(*)
CT
TA
Total

Total

1.
CS/IT 41
Dissertation

-
-

-
-
100
200
300


Total






100
200
300

     (*)  The existence and duration of lab will be decided as per the nature of the dissertation









Stream

Subject

Value of xy for subject code

Prerequisite

Elective Subject

Distributed Systems
Distributed Computing
11


Mobile Computing
12


Analysis & Design of Real-Time Systems
13


Dedicated System Design
14


VLSI Design
15





Software Engineering
Engineering and
Testing Structured Systems
21


Object-Oriented Programming
22


Engineering Object Oriented Systems
23
OOP

Multimedia System
24


Internet Programming and Web Service Engineering
25





Information Systems
Conceptual Modeling
31


Requirements Engineering
32
ETSS/CM

Method Engineering
33
ETSS/CM

Process Engineering
34
ETSS

Simulation and Modeling
35





Data Management
Distributed DBMS
41


Data Warehousing
42


Multimedia Databases
43





AI
AI
51


Data Mining
52
AI

Knowledge Based System
53
AI

Natural Language Processing
54
AI




Theoretical CS
Parallel Algorithms
61


Randomized Algorithms
62


Approximation Algorithms
63


Complexity Theory
64


Computational Geometry
65





Security
Cryptography
71


Network and System Security
72
Cryptography

Digital Forensic
73
Cryptography
                       
NOTE:            The students are required to select courses from at least three streams. 
CS students have to select at least one course each from Theoretical CS and from Distributed Systems.
IT students have to select at least one course each from Software Engineering, Information Systems and Data Management.


CS/IT 11 FOUNDATIONS OF COMPUTER SCIENCE

SECTION A: Discrete Mathematical Structure
15 Hours
Algebraic Structures:
 Semigroups, Monoids, Groups, Substructures and Morphisms, Rings, Fields, Lattices, distributive, modular and complemented lattice, Boolean Algebras.

Formal Logic:
Propositional logic: Predicate logic, limitations of predicate logic, universal and existential quantification; modus ponens and modus tollens. Proof technique: Notions of Implication, converse, inverse, contra positive, negations and contradiction

Introduction to Counting
Basic counting techniques, principles of inclusion and exclusion, permutations, combinations, summations, probability, Recurrence Relations, Generating Functions.

Introduction to Graphs:
Graphs and their basic properties, Eulerian and Hamiltonian walk, graph colouring, planar graph, enumeration, vector graph

References
  1. Kenneth Rosen, Discrete Mathematics and its application, TMH
  2. C.L. Liu , Element of Discrete mathematics ,TMH
  3. D.B. West ,Introduction to Graph Theory ,PHI
  4. J.P.Trebley and R.Manohar , Discrete Mathematical Structure with Applications to computer science, TMH

SECTION B: Data Structures and Algorithm
15 Hours
Algorithm and Complexity, Notation of complexity. Sorting and Divide and Conquer Strategy: Merge-Sort, Quick Sort with average case analysis. Heaps and heap sort. Lower bound on comparison –based sorting

Advanced search Structures: Representation, Insertion and Deletion operations on Red-Black trees, B-Trees, Hashing

Dynamic programming , matrix multiplications, longest common subsequence, Greedy method, Knapsack Problem, 8 queens Problems , Backtracking, branch and bound , Fibonacci Heap

Graph Algorithm
Graphs and their representation. BFS, DFS, Minimum spanning trees, shortest paths Kruskal and Prim’s algorithms, connected components.

References
1.Coreman ,Leiserson and Rivest, Algorithm , MIT Press
2.E. Horowithz and S. Sahni , Fundamentals of Computer Algorithm, Galgottia
3.Donald Knuth,, The Art of Computing Programming –vol-1 and 3 ,Pearson
4.V.Aho, J.E.Hopcroft and Ullman, Design and Analysis of Computer Algorithm ,Addison Wesley
5.K. Melhorrn, Datastructures and Algorithms, Vol II Springer Verlag


SECTION C: Theory of Computation
15 Hours

Regular Languages
Alphabet Langauges and grammars, Regular grammars, regular expressions and finite auotomata, deterministic and non-deterministic. Closure and decision properties of regular sets. Pumping lemma of regular sets. Minimization of finite automata.

Context free Language
Context free grammars and pushdown automata. Chomsky and Griebach normal forms. Cook, younger and Kasami Algorithm, Ambiguity and properties of context free languages pumping lemma. Deterministic pushdown automata. Closure properties of deterministic context free languages.

Turing Machine
Turing machines and variation of turing machine model, Halting problem, Universal turing machine, Type 0 Languages. Linear bounded automata and context sensitive languages. Turing Computable functions, Church Turing hypothesis. Recursive and recursively enumerable sets, Universal Turing machine and undecidable problems, Rice’s Theorems for RE sets, Undecidability of Post correspondence problem. Valid and invalid computations of Turing machines, undecidable properties of context free language problems, Basics of Recursive function theory.

References
1. C. Papadimitrou and C.L. Lewis Elements of Theory of Computation,PHI
2. J.E. Hopcroft and J.D. Ullman, Introduction to Automata Theory,Languages of Computations, Addison-Wesley




CS/IT 12 COMPUTER ORGANIZATION & ARCHITECTURE


Computer Organization

Unit I                                                                                                  10 Hours

Basic Computer Organization and design:  Instruction set Principles: Classifying Instruction set Architectures, Memory Addressing , Type and Size of operands, Operations in the instruction set; Instruction Codes, Computer Register, Register , Register Transfer Language, time and Control , Instruction Cycle, Memory references instructions, Input Output and Interrupt, Design of Basic Computer and Arithmetic and Logic Unit.

Micro programmed Control: Control Memory, address Sequencing, Design of Control unit

Central Processing Unit: General Register Organization, Stack Organization, Instruction format, Data Transfer and manipulations program control.

Unit 2                                                                                                  8 Hours

Computer Arithmetic: Addition, Subtraction, Multiplication and Division Algorithms. Floating point arithmetic operation, IEEE-754, Decimal arithmetic unit and Decimal Arithmetic operations.

Unit 3

Input- Output Organization:  Peripheral Devices, Input–Output Interface, Asynchronous data transfer, Modes & Transfer, Priority interrupt, Direct Memory access, I/O Performance Measures, Benchmarks of Storage Performance and Availability.

Memory Organization: Memory Hierarchy, Main Memory, Auxiliary Memory, Associative Memory, Shared Cache memory
Cache Memory and its performance, Reducing Cache Miss Penalty, Reducing Miss Rate, Reducing cache Miss Penalty or Miss Rate via Parallelism, Reducing Hit Time, Virtual Memory












Computer Architecture

Unit 4

Principle of Scalable Performance:  Performance metric and measures, speedup performance laws, scalability analysis and approaches. Parallel processing and application

Advanced Processor Technology: Design space of processors, Instruction set architectures, CISC, RISC

Pipelining: Linear and Non-Linear pipeline processors, Instruction pipeline design, arithmetic pipeline design, super scalar and super pipeline design, Superscalar and Vector processors.

Unit 5
Multiprocessor system Interconnects, Cache coherence and synchronization and mechanisms, message passing mechanism
System Interconnect Architecture: network property and routing, static connection network and dynamic connection network.

REFERENCES

1. Mano M: computer System Architecture –PHI 3rd Edition
2. Henessy J L, Patterson D A: Computer Architecture: A Quantitative approach – 3rd (Elsevier)
3. Kai Hwang: Advanced Computer Architecture TMH
4. Hamacher V C, et al: Computer Organization – 4 Edition (McGraw Hill)


CS/IT 13 OPERATING SYSTEM AND DATABASE MANAGEMENT SYSTEM

Unit I                                                                                                              10 Hours
Operating System: Structure, Components and Services, Time Sharing and Real-Time System, process Management, Concurrency Critical Section, Semaphores, InterProcess Communication, Process scheduling producer/ consumer and reader writer problem, Concept of Distributed and Real-Time operating system.

Unit II                                                                                                             8 Hours
CPU Scheduling: Concept and Scheduling algorithm, multiprocessor scheduling, deadlock prevention, avoidance and detection, recovery from deadlock.
Memory Management: Multiprogramming with fixed partition, multiprogramming with variable partition, segmentation virtual memory and demand paging. Page Replacement Policies Thrashing and pre-paging

Unit III                                                                                                           10 Hours
I/O Management, File System:  File organization and access mechanism, file sharing and file directories, Case Study of Linux Kernel- File Management, Memory Management and Process Management

Unit IV                                                                                                           10 Hours
Overview of Database Management System,  Data Model- Relational Algebra, Relational Calculus –Tuple Relation Calculus and Domain Relation Calculus, Normal Forms
SQL, DDL, DCL DML, PL/SQL

Unit V                                                                                                             7 Hours
Deadlock – Prevention and avoidance, Transaction and Data Recovery Method. Introduction of Object Oriented DBMS, Object Relational DBMS, Distributed DBMS and Data mining & Data warehousing

References:
1. A.S. Tanenbaum: “Modern Operating System” , Prentice Hall
2. William Stalling: “Operating System” Maxwell McMellon
3. J. Peterson ,A. Silberschatz  and P. Galvin: Operating System Concepts, Addison Wesley ,3rd edition
4. Milenkovic :Operating System Concept ,TMH
5. Korth and Silberschatz :Database System Concept; Second Edition, Tata McgrawHill,1991
6. R. Elmasri and N.Navathe :Benjamin Cumming, Fundamental of Database System , 2nd 1994
7. Boveti et al:Understanding the Linux Kernel 3rd O’Reilly
8.C.J. Date Database management Systems.


PCS/IT 14 DATA NETWORK

Unit-I  Overview of Wired and Wireless DataNetworks                           8 Hours

Review of Layered Network Architecture ,ISO-OSI and TCP/IP Network Model Datagram Networks and Virtual Circuit Networks, Point to Point and Point to Multipoint Networks Layer 2 Switches.
IEEE 802.3U(Fast Ethernet) and IEEE 802.3Z(Gigabit Ethernet)
Virtual LAN
Wireless LAN: IEEE 802.11, Bluetooth
Broadband Wireless LAN : 802.16, WIMAX

Unit-II Internetworking                                                                               10 Hours

Review of IP Addressing and Routing
Internet Architecture :Layers 3 Switch, Edge Router and Core Router
Overview of Control Plane, Data Plane ,Management Plane
Internet Routing Protocols: OSPF, BGP
Broadcast and Multicast Routing:  Flooding, Reverse Path Forwarding, Pruning, Core based trees, PIM
Mobility Issues and Mobile IP
Adhoc Routing: Dynamic Source Routing, Destination Sequenced Distance Vector Routing, Hierarchial Routing
Signalling :Introduction ,ICMP,LDP and MPLS Architecture

Unit III Transport Layer Protocols                                                             7 Hours

Process to Process Delivery
Review of UDP, TCP
SCTP Protocol: Services, Features, Packet Format, Association, Error Control Wireless TCP and RTP, RTCP
Real Time Application: Voice and Video over IP

Unit-IV Traffic Control and Quality of Service                                         12 Hours

Flow Control: Flow Model, Open Loop: Rate Control, LBAP, Closed Loop: Window scheme, TCP and SCTP Flow Control
Congestion Control: Congestion Control in packet networks, ECN and RED Algorithm, TCP and SCTP Congestion Control
Quality of Service: IP Traffic Models, Classes and Subclasses, Scheduling: GPS, WRR, DRR, WFQ, PGPS, VC Algorithm; Integrated Services Architecture, Differentiated Services Architecture, RSVP and RSVP- TE
Traffic Management Framework: Scheduling, Renegotiation, Signaling, Admission Control, Capacity Planning





Unit-V                                                                                                                        8 Hours

Security Issues,
Symmetric Encryption: DES , TripleDES ,Modes, AES
Public Key Encryption: RSA , Diffie Hellman, Elliptic Curve
Hashing :MDS , SHA-1 , DSA
Protocols: Kerberos,SSL/TLS, IPSec

Reference
  1. Srinivasan Keshav” An Engineering Approach To Computer Networking “,Pearson
  2. W. Richard Stevens “TCP/IP ILLustrated “-Vol1 Pearson
  3. D. Bertsekas , R Gallagar ,”Data Networks and Internets” PHI
  4. W. Stalling “High Speed Networks  and Internets”, Pearson
  5. W. Stallings, “ Wireless Communication and Networks” Pearson
  6. W. Stallings,” Cryptography and Networks Security”,Pearson
  7. A. Tanenenbaum, “ Computer Network”,PHI






Appendix II: Streams and their Courses

1. Distributed Stream

Distributed Computing


Basic Concepts                                                                                                                                                                    6 Hours

Characterization, Resource Sharing, Internet Implementations, Name Resolution, DNS

Computation: Full Asynchronism and Full Synchronism, Computation on Anonymous Systems, Events, Orders, Global States, Complexity


Distributed Synchronization                                                                                                                                            8 Hours

Processes and Threads, IEEE POSIX.1c

Mutual Exclusion: Classification, Algorithms, Mutual Exclusion in Shared Memory; Clock Synchronization, NTP

Distributed Deadlock: Detection Methods, Prevention Methods, Avoidance Methods


BSD Sockets                                                                                                                                                                         8 Hours

TCP/IP Model, BSD Sockets Overview, TCP Sockets and Client/Server, UDP Sockets and Client/Server, Out of Band Data, Raw Sockets, PING & TRACEROUTE Programs, Routing, Multicasting using UDP Sockets


Distributed OS                                                                                                                                                                  10 Hours

Communication between distributed objects, RPC Model and Implementation Issues, Sun RPC, Events and Notifications, Java RMI and its Applications

CORBA Architecture: Introduction and Applications

Distributed File System Design and Case Studies: NFS, Coda, Google FS

Distributed Databases                                                                                                                                                       8 Hours

Introduction, Structure, Data Models, Query Processing, Transactions, Nested Transactions, Atomic Commit Protocols, Transaction Recovery, Transactions with replicated data, Concurrency Control Methods, Distributed Deadlocks


References:

1. Tanenbaum, “Distributed Systems”, Pearson
2  W Richard Stevens, “UNIX Network Programming Vol 1 & 2”, Pearson
3. Sinha, ”Distributed Operating Systems”, Prentice Hall of India/ IEEE Press
4. Barbosa, “Distributed Algorithms”, MIT Press
5. Ceri, Palgatti,”Distributed Databases”, McGraw-Hill



Mobile Computing

Introduction                                                                                                                                                                        8 Hours

Basic Concepts, Principles of Cellular Communication, Overview of 1G, 2G, 2.5G, 3G and 4G technologies, GSM and CDMA Architecture, Mobility Management, Mobile Devices: PDA, Mobile OS: Palm OS, Mobile Linux Initiative, Symbian.

Process Migration                                                                                                                                                              8 Hours

Kernel Support for Migration: Mobility Enhancement in modern UNIX Systems, Transparent Process Migration Design Alternatives, Removing Process Migration Bottlenecks, Task Migration Issues

User Space support for Migration: Checkpointing, Process Migration

Data Issues                                                                                                                                                                            8 Hours

Workload Balancing Strategies in migration, Process lifetime distributions for dynamic load balancing, Disconnected Operations in Coda File System, Weak Connectivity for Mobile File Access, Weakly Connected Replicated Storage System.

Mobile Data Networking                                                                                                                                                 8 Hours

Mobile IPv4 and Mobile IPv6, Mobile Internetworking Architecture, Internet Mobility Issues, Route Optimization, Performance of Wireless TCP, GPRS Services, IP over CDMA

Mobile Agents                                                                                                                                                                      8 Hours

Basic Concepts, OS support for Mobile Agents, Java Aglet API, AGENT TCL, Network Aware Mobile Programs, Mobile Objects and Agents, OMG MASIF Framework, Mobile Agent Security Issues


References:

1.       Richard Wheeler, ”Mobility: Processes, Computers and Agents”
2.       Charles Perkins et.al.,”Mobile IP: Design Principles and Practices”, Pearson
3.       Tomasz Imielinski, “Mobile Computing”, Springer Verlag



















Analysis and Design of Real-Time Systems


Basic Concepts                                                                                                                                                                    6 Hours

IEEE Definition of Real-Time Systems, Characterization of Real-Time Systems, Process, IEEE POSIX.1c Threads, Tasks and Priorities, Pre-emptive and Non-Preemptive Tasks, Soft and Hard Real-Time Systems


Scheduling                                                                                                                                                                        10 Hours

Scheduling Paradigms: Priority Driven, Time Driven, and Share Driven

Priority Driven Scheduling of Periodic, Aperiodic and Sporadic tasks

Static Priority Scheduling: Rate Monotonic Scheduling Algorithm and its exact analysis using Response Time Test

Dynamic Priority Scheduling: Analysis of EDF and LLF Algorithms and their open issues


Specification and Verification                                                                                                                                    10 Hours

Modeling Real-Time System, Requirement Specification, Assumptions, Design, Basic Duration Calculus, Specification of Scheduling Policies, Probabilistic Duration Calculus, Applications of Duration Calculus


RTOS                                                                                                                                                                                     8 Hours

Introduction, Requirement of Real-Time Guarantees in industrial applications, Soft and Hard RTOS, Commercial RTOS Examples

IEEE POSIX.1b: Priority Scheduling, Real-Time Signals, Timers, Binary Semaphores, Counting Semaphores, MUTEX operations and usage, Message Passing, Message Queues operations and usage, Shared Memory, Synchronous and Asynchronous I/O, Memory Locking
   
RTOS Services, Case Studies of Real Time Capabilities of Linux Kernel 2.6, RTLinux and VxWorks


Applications                                                                                                                                                                         6 Hours

Real-Time Application Design, Real-Time Application Interface (RTAI), Real-Time Java, Real-Time Communications and Networking


References:

1. JWS Liu, “Real-Time Systems”, Pearson
2. Mathai Joseph, ”Real-Time Systems: Specification, Verification and Synthesis”, Prentice-Hall
3. Qing Li, “Real-Time Concepts for Embedded Systems”, CMP Books
4. Krishna, Shin, “Real-Time Systems”, TMH
5. Burns, Wellings, “Real-Time Systems and Programming Languages”, Pearson






Dedicated System Design


Review of Digital Computer & Digital Arithmetic                                                                                                    8 Hours

Algorithm and Algorithmic Notation, Timing, Synchronization and Memory, Fixed and Floating point Arithmetic operations, Arithmetic primitives, Sequential and Distributed Arithmetic.

Hardware Elements and Hardware Design using VHDL                                                                         8 Hours

Gates, Flip-Flops, Registers, Synchronization Signals, Power Consumption and related design rules, Pulse generation and Interfacing, Chip Technology: Semiconductor Memories, Processors and Configurable Logic, Chip Level and Board Level Design Considerations

Hardware Design Languages, Simulation of Hardware Elements using VHDL, Timing Behavior and Simulation, Test Benches, Synthetic Aspects

Sequential Control Circuits and Processors                                                                                                                8 Hours

Mealy and Moore Automaton, Designing the Control Automaton, Implementing Control Flow and Synchronization

Designing for ALU efficiency, Memory Subsystems, Simple Programmable Processor Design, Interrupt Processing and Context Switching, Interfacing Techniques, Standard Processor Architectures

System Level Design                                                                                                                                                     10 Hours

Aspects of System Design, Scalable System Architecture, Regular Processors, Network Architecture, Integrated Processor Networks, Static Application Mapping and Dynamic Resource Allocation, Resource Allocation on Crossbar Networks and FPGA Chips, Communication Data and Control Information, P(Pi)-nets Language for Heterogeneous Programmable Systems

Digital Signal Processors                                                                                                                                                 8 Hours

DSP Elements and Algorithms, Integrated DSP Chips, Floating Point Processors, DSPs on FPGA, Typical Applications


References:

1. Mayer, Lindenberg, ”Dedicated Digital Processors”, Wiley
2. R Gupta, “Co-Synthesis of Hardware and Software for Embedded Systems”, Kluwer
3. “Digital Signal Processing”, IEEE Press













VLSI Design & Testing

                                                                                                                                                               
Manipulation of Boolean expressions                                                                                                                    10 Hours

Two level realizations with NAND or NOR gates, Standard form of Boolean functions, Minterm & maxterm designation of functions, simplification of functions on Karnaugh Maps, Map minimization of product-of-sums expression, incompletely specified functions, logic Hazards, Elimination of Hazards.

Algorithms for optimization of combinational logic, impact of logic synthesis, cubical representation of Boolean functions, determination of prime implicants selection of optimum set of prime implicates, multiple output circuit, programmed logic array, minimization of multiple output function, Tabular determination of prime implicats, field programmable logic arrays.
                                                                                                                                                               

VLSI Realizations of Combinational Logic                                                                                                             10 Hours


Introduction, pass transistor network realization, Steering of 0,1,X & X to the output, tree networks, negative gate realization, logic design with CMOS standard cells, pre charged clocking of CMOS PLA.

Multilevel logic using complex (MSI) ports & cells:- The place for complex parts & cells, decoders, ROM as a logic element, binary adder, design with multiplexers, more than two level realizations with basic primitives, combinational MSI parts & cells, multilevel logic manipulation & optimization.

                                                                                                                                               

Sequential circuits                                                                                                                                                             8 Hours

Sequential activity, memory elements, general model for Sequential circuits, clock mode Sequential circuits., Synthesis of clock mode Sequential circuits: Analysis of a sequential circuit, design procedure, synthesis of state diagrams, equivalent state & circuits, simplification by implication tables, state assignment & memory element input equations.

                                                                                                               

VLSI Realization of Digital Systems                                                                                                                            8 Hours                
Alternative Structural descriptions, levels of descriptions, Standard cell CMOS layout & delay model, Timing analysis & simulation, Event driven gate level simulations, Switch level simulation, PLD & programmable gate arrays

Test Generation for VLSI                                                                                                                                              10 Hours

Fault detection & diagnosis, Stuck at fault model, test generation strategy, test generation by evaluation & search, modeling CMOS, Stuck-open faults, fault simulation in sequential systems, boundary scan, built-in-self test.  Fault Tolerant Design: Hardware redundancy, Information redundancy, time redundancy, software redundancy, system level Fault Tolerance. Self-checking sequential circuit Design: Faults in state machines, self checking state machines design Techniques, Synthesis of redundant fault-free state machines.

References:

1.       Parag K. Lala , “Fault-Tolerant & Fault Testable Hardware” , B-S-Publication Hyderabad
2.       Parag K. Lala ,“Self checking & Fault-Tolerant Digital Design”, Morgan Kaufman Publishers
3.       Frederick J. Hill and Gerald R. Peterson, “Computer Aided Logical Design with Emphasis on VLSI”, John Wiley & Sons Inc.




2. Software Engineering Stream

Engineering and Testing Structured Systems

                                                                                                                                                    10 hours

Scope of Software Engineering, The Software Crisis, The functional approach. Structuring a problem. Notion of analysis. Design as synthesis.

The Yourdon method: need for Event Partitioning, Context Diagram, Event typology, converting from events to software system functions
                                                                                                                                                                                                       
                                                                                                                                                                                              14 hours

Data Flow diagrams, Constraints, Data Dictionary, Process specification techniques.

Construction Design: Coupling and Cohesion. Afferent and Efferent modules, Design Heuristics for Module Design

                                                                                                                                                                                              12 Hours

Maturity levels of testing, Unit, Module, Sub-System and System Testing Interaction., Top down and bottom up testing, Constructing Stubs and Drivers. Notion of a test case, test design approach to software design

White box testing: Testing Hypotheses, Statement testing, branch testing, branch and statement testing, Path, predicate path, path interpretation, Cyclomatic complexity, condition testing, loop testing.

                                                                                                                                                                                                5 Hours

Black box testing: Cause-effect technique
Implications of software systems on underlying IT infrastructure


References:

        1. Yourdon, “Modern Structured Analysis”, Pearson
        2. Beizer, “Software Testing”, Van Nostrand Reinhold CO.
        3. Pressman, “Software engineering”, McGraw-Hill
        4. Sommerville, “Software Engineering”, Pearson

















Object –Oriented Programming

                                                                                                                                                  10 Hours

The OO manifesto for Programming Languages. Definition of Object, representing an object, Object classes: constructor, destructor, copy constructor and their defaults, public and private protection.

                                                                                                                                                                                            15 Hours

Complex Objects and complex classes, their constructors and destructors and policies for these. Privacy for complex objects. Inheritance: simple, multiple, repeated. Resolving inheritance conflicts. Rules for constructors, destructors. Protection policies for Inheritance.

                                                                                                                                                                                              10 Hours

Notion of Late Binding. Polymorphism and its forms. Abstract classes and their use, Meta-classes and templates.

                                                                                                                                                                                                5 Hours

Special language features like friend functions, type casting etc. Separation of specification  from implementation. Object-orientation for reuse and maintenance.

All the above to be introduced through C++.


References:

1. Bjarne Stroustrap, “The C++ Programming Language”, Pearson
2. Parimala N. “Object orientation Through C++”, MacMillam
3. Lippman, Lajoie, and Moo, “C++ Primer”, Addison Wesley
4. Robert Lafore, “Object Orientation in C++”, Galgotia
























Engineering OO Systems

                                                                                                                                                                                            5 Hours

OO manifesto for OO Analysis. Object modeling and difference with data-oriented, process-oriented and behaviour modeling.

                                                                                                                                                                                              15 Hours

Object modeling: classes, complex object classes, inheritance. Sub systems and systems in OO modeling. State transition diagrams.

                                                                                                                                                                                              10 Hours

Dynamic Modeling: Modeling an event. Event typology, event as trigger

                                                                                                                                                                                              10 Hours

Functional Modeling: Review of Structured techniques, Cross model constraints and linkages. Conversion to OO implementation, UML notation


References:

1. Rumbaugh et al, “Object Oriented Modeling and Design”, Prentice Hall
2. Odell and Martin, “Object Oriented Analysis and Design”, Prentice Hall





























Multimedia Systems

                                                                                                                                                      15 Hours

Components of multimedia, multimedia and hypermedia, Multimedia authoring: metaphor, production, presentation, automatic authoring, VRML,

                                                                                                                                                                                              10 Hours

Graphics and Image data representation, Colour in Image and Video- colour science, colour models in image and video, Fundamentals of video: types of video signals, analog and digital video,

                                                                                                                                                                                              10 Hours

Basics of Digital Audio: digitization, quantization, MIDI, multimedia data compression: lossy compressions; Image compression standards, basic video compression techniques, MPEG video coding, MPEG audio compression,

                                                                                                                                                                                                5 Hours

Multimedia communication: quality of multimedia transmission, multimedia over IP, video delay in ATM, multimedia, across DSL

References:

1. Ze-nian and Drew, “Fundamentals of Multimedia”, Prentice Hall
2. Rao, K.R. et al., “Multimedia Communication Systems. Techniques, Standards, and Networks”, Pearson
3. Y. Ramesh, “Multimedia Systems Concepts Standards and Practice, Kluwer


























Internet Programming and Web Service Engineering

                                                                                                                                               10 Hours

Notion of mark up. HTML and XHTML. Style sheets, Cascading style sheets. Javascript, Dynamic HTML.

                                                                                                                                                                                              15 Hours

SGML. XML, DTD, XML schema. ASP.Net, Perl/CGI and Python

                                                                                                                                                                                              15 Hours

Notion of a web service. Service Oriented Architecture, SOAP, UDDI, WSDL, WSQM. Issues in providing QoS. Elements of Service oriented software engineering.


References:

1. Deitel, Deitel and Goldberg, “Internet & World Wide Web How to Program”, Pearson
2. W3 SOAP Standard
3. UDDI Standard
4. WSDL standard































3. Information Systems Stream

Conceptual Modeling

                                                                                                                                                  12 Hours

Why conceptual modeling, ANSI/SPARC framework, 100 % principle, conceptualization principle

                                                                                                                                                                                              12 Hours

Data-oriented Models: ER, SHM, SHM+.

                                                                                                                                                                                                6 Hours

Translation of into relational schemata

                                                                                                                                                                                              10 Hours

Behaviour-oriented Models: Why these models? Interpretations of an Event, Remora model
Benefits of Conceptual Modeling


References:

1. Batini, Ceri, Navathe,” Conceptual Database Design: An Entity-Relationship Approach”, The Benjamin-    Cummings Pub
2. Loucopoulos and Zicari,” Conceptual Modeling, Databases, and Case: An Integrated View of Information Systems Development”, John Wiley & Sons

























Requirements Engineering

                                                                                                                                                  10 Hours

Why requirements engineering? Difference between Conceptual Modeling and RE. Context Diagram and RE. Organizational versus Technical requirements,

Preparing IEEE SRS document

                                                                                                                                                                                                7 Hours

Stakeholders and their identification. Designing and conducting interviews, questionnaires, brainstorming sessions

                                                                                                                                                                                                7 Hours

RE in functional systems: Types of goals, goal satisfaction and satisficing, Goal modeling and decomposition, Goal operationalizing.

                                                                                                                                                                                                7 Hours

Scenario modeling. Scenario classification. Goal-scenario coupling. Handling RE problems like conflicts

                                                                                                                                                                                                9 Hours

RE in decisional systems: the changed role of RE. notions of goals, decisions, and information. Informational scenarios.


References:

1. Hull, Jackson, and Dick,Requirements Engineering, Springer
2. Macaulay: Requirements Engineering, Springer
3. Jackson M., “Software requirements & specifications: a lexicon of practice, principles and prejudices”, ACM Press/Addison-Wesley





















Method Engineering

                                                                                                                                                                                                7 Hours

Notion of a method. Method models, meta-models, and generic models. CAME, CASE, meta CASE  and their differences.

                                                                                                                                                                                                8 Hours

Product oriented meta-models: The OPRR model, the GOPRR model, Product-Process meta-models: The fragment model

                                                                                                                                                                                                8 Hours

Integrated meta-models: The contextual approach, the decisional approach

                                                                                                                                                                                                 6 Hours

The generic method model: Engineering methods for diverse domains

                                                                                                                                                                                              10 Hours

Situational method engineering. SDLC for method engineering. Intentional approach to method engineering. Method engineering processes. Open Issues


References:

1. Brinkkemper et al, “Method Engineering”, Chapman and Hall, 1996
2. Jolita R.et al, “Method Engineering”, Chapman and Hall, 2007

























Process Engineering

                                                                                                                                                  10 Hours

SDLC in S/W and IS engineering, Relationship of SDLC to process models, Classical process models: Code and Fix, Waterfall, Prototype, Spiral, V, Fountain. Iterative and Incremental process models

                                                                                                                                                                                              12 Hours

Process meta-models: Activity based models, IBIS, Contextual model, and Map model, Tracing, Backtracking, and Guidance

                                                                                                                                                                                              10 Hours

The personal process and team process, CMM and its variants, ITIL, Six Sigma, ISO9000

                                                                                                                                                                                                8 Hours

Workflow Modeling


References:

1. Pressman, “Software Engineering”, Mcgraw-Hill
2. Sommerville, “Software Engineering”, Pearson
3. Pfleegar, “Software Engineering Theory and Practice”, Pearson



























Simulation and Modeling

                                                                                                                                                    10 Hours


Basic Simulation Modeling: The Nature of simulation system, models and simulation, discrete-event simulation, simulation of a single-server queuing, alternative approaches to modeling and coding simulations, network simulation, parallel and distributed simulation, simulation across the internet and web based simulation, steps in a sound simulation study, other types of simulation: continuous simulation, combined discrete-continuous simulation, Monte Carlo simulation, advantages, disadvantages and pitfalls of simulation.

                                                                                                                                                                                               7 Hours


Modeling Complex Systems: Introduction, list processing in simulation, approaches to stering lists in a computer linked storage allocation

Simulation examples using any simulation language: Single-server Queuing simulation with time-shared computer model, job-shop model, and event-list manipulation.

                                                                                                                                                                                              7 Hours


Discrete System Modeling: Classification of simulation models the simulation process, system investigation validation and translation, simulation of complex discrete-event systems with application in industrial and service organization tactical planning and management aspects, Random variable generation and analysis.

                                                                                                                                                                                                8 Hours


Simulation Software: Comparison of simulation packages with programming languages classification of simulation software, general-purpose simulation packages, object-oriented simulation, building valid, credible and appropriately detailed simulation models, experimental design, sensitivity analysis and optimization simulation of manufacturing systems.

                                                                                                                                                                                                9 Hours


Embedded System Modeling: Embedded systems and system level design, models of computation, specification languages, hardware/software code design, system partitioning, application specific processors and memory, low power design.

Real-Time system modeling, Fixed Priority scheduling, Dynamic Priority Scheduling

Data Communication Network modeling, IP network intradomain (e.g. OSPF, RIP) routing simulation.


References:


                1. Law Kelton,”Simulation Modeling and Analysis”, McGraw-Hill
                2. Geoffrey Gordon,”System Simulation”, PHI








4. Data Management Stream

Distributed DBMS

                                                                                                                                                 6 Hours

Review of computer networks and centralized DBMS, Why distributed databases, basic principles of DDBMS, distribution, heterogeneity, autonomy,

                                                                                                                                                                                                6 Hours

DDB architecture: client-server, peer-to-peer, federated, multidatabase,

                                                                                                                                                                                              15 Hours

DDB design and implementation: fragmentation, replication and allocation techniques,

                                                                                                                                                                6 Hours

Distributed query processing and optimization,

                                                                                                                                                                                                7 Hours

Distributed transaction management, concurrency control and reliability, DDB interoperability


References:

1. Ceri and Pelagatti, “Distributed Data Base Systems”, Addison
2. Ozsu,Valduriez, “Distributed Data Base Systems”, Pearson






















Data Warehousing

                                                                                                                                                                                              14 Hours

The organizational perspective, the technical perspective, Dimensional Modeling: facts, dimensions, slowly and rapidly changing dimensions,  Data Warehouse operations

                                                                                                                                                                                                8 Hours

Aggregation, historical information, Query facility, OLAP functions and Tools, Data Mining interfaces, 

                                                                                                                                                                                              8 Hours

Relational representation, Multidimensional representation, Meta-data and CWM, DW process and architecture.

                                                                                                                                                                                            10 Hours

SDLC of a Warehouse project: business process driven, Information systems product driven and goal driven approaches.

Design approaches: data driven design, user driven design. Information Package, Diagram driven design.

Physical design: clustering, partitioning etc.


References:

1. Ponnaih, “Data Warehouse Fundamentals”, Wiley
2. Inmon, “Building the Data Warehouse”, Wiley
3. Kimball and Ross, “The Data Warehouse Toolkit” Wiley
4. Murray, “Data Warehousing in the Real World”, Wiley
5. Imhoff C., “Mastering Data Warehouse Design” Wiley























Multi-media Databases

                                                                                                                                                 8 Hours

Relational versus multimedia databases, Handling object data, Multidimensional structures: insertion, deletion, search in 2-d trees, point quadtrees, MX-quadtrees, and R-trees

                                                                                                                                                                                               6 Hours

Image databases: Raw and compressed images, Discrete Fourier transform and Discrete Cosine transform, segmentation, similarity based and spatial layout retrieval, image representation in relations and R-trees

                                                                                                                                                                                                4 Hours

Document databases: precision and recall, Latent semantic indexing, operating on TV trees, inverted indices and sequential files.

                                                                                                                                                                                                8 Hours                                                                                                
Video databases: organization of video content, querying content of video libraries, video segmentation, video standards

                                                                                                                                                                                                4 Hours

Audio databases: general model, metadata, signal based audio content, discrete transformations for audio content, indexing techniques

                                                                                                                                                                                              6 Hours

Multimedia databases: Principle of Uniformity, media abstractions, query languages, indexing, query relaxation/expansion

                                                                                                                                                                                                4 Hours

Physical storage and retrieval: retrieving form disk, CD-ROM, Tapes: recording and placement methods, retrieval techniques.

Open issues: security, compression for special data bases e.g. in medicine.


References:

1. Subrahmaniam VS, “Principles of Multimedia Systems”, Morgan Kaufman
2. Apers et al, “Multimedia Databases in Perspective, Springer
3. Dunckley, “Multimedia Databases: An Object Relational Approach”, Holborn











5. AI STREAM

Artificial Intelligence

                                                                                                                                                 8 Hours

Knowledge: Introduction, definition and importance, knowledge base system, representation of knowledge, organization of knowledge, knowledge manipulation, knowledge acquisition, introduction to PROLOG.

                                                                                                                                                                                                 8 Hours

Formalized symbolic Logics, Syntax and Semantics for FOPL, Inference rules, The resolution principle, No deductive inference methods, Bayesian probabilistic informer, Dimpster-Shafer theory, Heuristic Reasoning Methods.

                                                                                                                                                                                                 8 Hours

Search and Control strategies: introduction, concepts, uniformed or blind search, informal search, searching and-or graphs, Matching techniques, structures used in retrieval techniques, integrating knowledge in memory, memory organization system.

                                                                                                                                                                                                 8 Hours

Fuzzy Logic: Basic concepts, Fuzzy sets, Membership Function, Types of membership Function, Basic operations in Fuzzy sets, Intersection & Union-Complementary, Subsethood, Properties of Fuzzy sets.

                                                                                                                                                                                                 8 Hours

Expert System architectures: Rule-Based system architectures, Non production system architecture, dealing with uncertainty, knowledge organization and validation.


References:

1. Dan W Patterson, “Introduction to Artificial Intelligence and Expert System”. PHI
2. Peter Jackson, “Introduction to Expert System”, Pearson
3. A Gonzalbz and D.Dankel,  “The Engineering Knowledge Base System”, PHI
4. Stuart Russell and Peter nerving, “Artificial Intelligence: A Modern approach”, PHI
5. John Yen & Reza Langari , “Fuzzy: Intelligence, Control and Information” , Pearson
















Learning Systems

 

                                                                                                                                                8 Hours


Introduction: Definition, Human Brain, Model of Neuran, Feed back, Network Architectures, Knowledge Representation, AI & Neural Networks.

Learning Processes: Introduction, Error-correction Memory-Based Learning, Hebbian Learning, Competitive Learning, Boltzmann Learning, Learning with a teacher, Learning without a teacher, Memory Adaptation.

                                                                                                                                                                                                 8 Hours


Single Layer Perceptrons: Concepts, Adaptive Filtering, Unconstrained optimization, Steepest Descent Method, Newton’s Method, Perceptron, Perceptron Convergence Theorem.

Multilayer Perceptrons: Preliminaries, Back-propagation algorithm, activation function, Rate of learning.

 

                                                                                                                                                                                               8 Hours


Neurodynamics: Introduction Associative Memory, Linear Associater, Dynamical Systems, Stability of Equilibrium States, Attractros, Hopfied models, Brain-state-in-a-box model.

                                                                                                                                                                                                 8 Hours


Genetic Algorithms: Basics of genetic algorithms, binary GA implementation, Real coded GA, Design issues in GA, Choice of encoding, selection probability, mutation and cross over probabiltity, fitness evaluation function.


References:

                1. Simon Haykin, “Neural Networks”, Pearson
                2. Mohamad H. Hassoun, “Fundamentals of Artificial Neural Networks”, PHI
                3. James A. Anderson , “An Introduction to Neural Networks”, PHI
                4. Melanie Mitchall, “An Introduction to Genetic Algorithm”, PHI


















Data Mining

                                                                                                                                        8 Hours

Overview, types of mining, Mining operations, introduction of statistical Data Mining, Heuristic Mining, Introduction of mining in data  warehousing ,  Stages of DM process. Decision-Tree based classifiers: infomation gain, decision tree learning.

                                                                                                                                                                                                7 Hours

Data Mining Techniques: Association- Rule mining methodes, supervised neural network, perceptron, back propagation, bayesian methods, cross-validation, Time sequence discovery.

                                                                                                                                                                                                7 Hours

Clustering: Similarity and distance measures, hierarchical algorithms, partitional algorithms, clustering large databases, clustering with categorical attributes. K - means.

                                                                                                                                                                                              10 Hours

Introduction to information retrieval, Query optimization, Unstructured and semi-structured text, Text encoding, Tokenization, Steaming, Lemmatization, Index Compression, Lexicon Compression, Gap encoding, gamma codes, Index constructions, Dynamic indexing, Positional indexes, n-gram indexes, real-world issues, Vector-Space Scoring, Nearest neighbor techniques.

                                                                                                                                                                                              10 Hours

Introduction to information retrieval , Inverted indices and Boolean queries, Query optimization, Unconstrained and semi constrained text, Text encoding, Tokenization, Stemming, Lemmatization, Tolerant retrieval:  Spelling correction and synonymes, permuterm indices, n-gram indices, Edit distance, Index compression, Lexicon compression, Gap encoding, Gamma codes, Web structure,the user, search engine, optimization/spam,web characteristic, web size measurement, near duplicate detection, crawling and web indexes, link analysis.


References:

            1. M.H. Dunham, “Data mining: Introductory and Advanced Topics”, Pearson
            2. J. Han and M. Kamber, “Data Mining: Concept and Techniques”, Morgan Kaufman
            3. Mallach, "Data Warehousing System”, McGraw-Hill
            4. Rechard J. Roiger and michal W. Greatz, “Data Mining: A Tutorial based primer”, Pearson
            5. Tom Mitchell, “Machine Learning”, McGraw-Hill

















Natural Language Processing

                                                                                                                                                                                              10 Hours

Context Free grammars, Lexical analysis, Introduction to parsing, Context Sensitive grammars
                                                                                                                                                                               

                                                                                                                                                                                              10 Hours

Linguistics of English: Review of English Grammar, Morphology, syntax, semantics, structure of discourse. Words and the lexicon: word classes.
                                                                                                                                                                               
                                                                                                                                                                                              12 Hours

Semantic Grammars, TN, ATN, Case grammars, Paninian Grammars, Parsers of NL statements, Determiners and quantifiers, Noun-noun modification, pronoun resolution, relative clauses
                                                                                                                               
                                                                                                                                                                                                 8 Hours

Deep structure, shallow structure, Differences between English and Hindi Application
(a)                 MT
(b)                 ASR
(c)                 IR
(d)                 Q & A


References:

1.Manning,C.D, Schutze H, “Foundations of statistical natural language processing”, MIT press
2.Jurafsby D. Martin J.H, “Speech and language processing” , PHI
3.Allen , J., “Natural language understanding.”, Benjamin/ Cummins Publishing
4. Wall L. et W, ”Programming PERL”, O’Reilly

















6. SECURITY STREAM

Cryptography


Number Theory                                                                                                                                                              10 Hours


Prime numbers, Euler’s Totient function, Fermat’s and Eulers Theorem, Primality Testing, Chinese Remainder Theorem, Discrete Logarithms, Group, Rings, Fields, Modular Arithmetic, Euclidean Algorithm, Finite Fields of the form GF(p), Polynomial Arithmetic, Fields of the form GF(2n), Random Number Generation and Testing

Public Key Encryption                                                                                                                                                 10 Hours


RSA System, Implementing RSA, Attacks on RSA, Rabin Crypto System, Factoring algorithms. The (p-1) method, Dixon’s algorithm and Quadratic sieve

Elliptic Curve Cryptography: Elliptic curves over GF(p), Elliptic curves over GF(2m), Elliptic curve cryptography, factoring with ECC, Key Management and Diffie Hellman Key Exchange,

Symmetric Encryption                                                                                                                                                      8 Hours

Block Cipher and DES, The strength of DES, Differential and Linear Cryptanalysis of DES, Advanced Encryption Standard, Stream Ciphers and RC4,

 

Hash Functions                                                                                                                                                                    8 Hours

Hash Functions, Security of hash functions, MD5, Secure Hash Algorithm, Whirlpool, HMAC, CMAC, The birthday attack problem.

Digital Signatures, Requirement, Authentication protocols, Digital Signature Standard, ECDSA

Finite Automata and Ciphers                                                                                                                                          6 Hours


Finite Automata and Ciphers, Structure of Ciphers, Selection of the Ma, h and g functions, Cipher Design using Automata


References:

                1. Douglas R Stinson, “Cryptography Theory and practice”, CRC Press
                2. William Stallings, “Cryptography and Network Security 4e”, Pearson
                3. Simon J Shepherd, “Cryptography: Diffusing the Confusion”, Research press studies














Network and System Security


Network Security                                                                                                                                                               6 Hours


AH and ESP Protocols, Security associations, Key management, Web security Considerations, secure socket layer and Transport layer security.

PKI Infrastructure                                                                                                                                            8 Hours


Concept of an infrastructure, application enables secure single sign-on, comprehensive security, defining PKI, LDAP and X500.

Core PKI Services: Authentication, Integrity and confidentiality, Mechanism required to create PKI enabled services X-509 certificate.

                                                                                                                                                                                                8 Hours

System Security: Intrusion Detection, Password Management, Base Rate Fallacy.
Malicious Software: Virus and related threats, virus countermeasures, Distributed Denial of Service attacks.
Firewalls: Design principles, Trusted Systems common criterion for IT security evaluation

OS and Database Security                                                                                                                                             10 Hours

Structure of an OS and application, application and OS security, security in Unix and Linux Pluggable Authentication Modules, Access Control Lists, SELinux.

Database Security:Database Security Evolution, Role-based an object-oriented encapsulation procedural extension to SQL, Security through Restrictive Clauses.

Secure Applications                                                                                                                                                           8 Hours

PGP and SMIME, Kerberos version IV and V, Security in Cellular Communication System, Secure Electronic Transaction.


References:

1. William Stalling, “Cryptography and Network Security 4e”, PHI
2. C Adams, Steve Lloyd, “Understanding PKI”, Addison Wesley
3. Jay Ram Chandran, ”Designing Security Architecture”, Wiley Computer Publishing
4. C Kaufman, Radia Perlman and Mike, “Network Security 2e”, Pearson.













Digital Forensic

                                                                                                                                                                                                 8 Hours
Transform Methods: Fourier Transformation, Fast Fourier Transformation, Discrete Cosine Transformation, Mellin-Fourier Transformation, Wavelets, Split Images in Perceptual Bands, Applications of Transformation in Steganography.
 8 Hours
Biometrics:  Overview of Biometrics, Biometric Identification, Biometric Verification, Biometric Enrollment, Biometric System Security.
Authentication and Biometrics: Secure Authentication Protocols, Access Control Security Services, Authentication Methods, Authentication Protocols, Matching Biometric Samples, Verification by humans.
Common biometrics: Finger Print Recognition, Face Recognition, Speaker Recognition, Iris Recognition, Hand Geometry, Signature Verification, Positive and Negative of Biometrics.
Matching: Two kinds of errors, Score distribution, Estimating Errors from Data, Error Rate of Match Engines, Definition of FAR and FRR
8 Hours
Introduction to Information Hiding: Technical Steganography, Linguistic Steganography, Copy Right Enforcement, Wisdom from Cryptography
Principles of Steganography: Framework for Secret Communication, Security of Steganography System, Information Hiding in Noisy Data , Adaptive versus non-Adaptive Algorithms, Active and Malicious Attackers, Information hiding in Written Text.
8 Hours
Survey of Steganographic Techniques: Substitution systems and Bit Plane Tools, Transform Domain Techniques: - Spread Spectrum and Information hiding, Statistical Steganography, Distortion Techniques, Cover Generation Techniques.
Steganalysis: Looking for Signatures: - Extracting hidden Information, Disabling Hidden Information.
10 Hours
Watermarking and Copyright Protection: Basic Watermarking, Watermarking Applications, Requirements and Algorithmic Design Issues, Evaluation and Benchmarking of Watermarking system.
References:
  1. Katzendbisser, Petitcolas, “ Information Hiding Techniques for Steganography and Digital Watermarking”, Artech House.
  2. Peter Wayner, “Disappearing Cryptography: Information Hiding, Steganography and Watermarking 2/e”, Elsevier
  3. Bolle, Connell et. al., “Guide to Biometrics”, Springer

7. THEORETICAL CS STREAM


Parallel Algorithms

8 Hours

Sequential model, need of alternative model , parallel computational models such as PRAM , LMCC , Hypercube , Cube Connected Cycle , Butterfly , Perfect Shuffle Computers , Tree model , Pyramid model , Fully Connected model , PRAM-CREW , EREW models , simulation of one model from another one.
                8 Hours

Performance Measures of Parallel Algorithms , speed-up and efficiency of PA , Cost-optimality , An example of illustrate Cost-optimal algorithms- such as summation , Min/Max on various models.

                8 Hours

Parallel Sorting Networks , Parallel Merging Algorithms on CREW/EREW/MCC/ , Parallel Sorting Networks on CREW/EREW/MCC/, linear array

8 Hours

Parallel Searching Algorithm , Kth element , Kth element in X+Y on PRAM , Parallel Matrix Transportation and Multiplication Algorithm on PRAM , MCC , Vector-Matrix Multiplication , Solution of Linear Equation , Root finding.
                8 Hours

Graph Algorithms - Connected Graphs , search and traversal , Combinatorial Algorithms- Permutation , Combinations , Derrangements.


References:

1. M.J. Quinn, “Designing Efficient Algorithms for Parallel Computer” by Mc Graw Hill.
2. S.G. Akl, “Design and Analysis of Parallel Algorithms”
3. S.G. Akl, ”Parallel Sorting Algorithm” by Academic Press
















Randomized Algorithms
                        8 Hours

Introduction:  Basic Probability Theory, Probability Spaces; Bayes' Rule; Independence; Expectation; Moments; Common Distributions , Randomized Algorithm: General concepts and definitions, Quicksort ,  Min-Cut, Random Partitions,  Probabilistic recurrences , Randomized Complexity Classes: RP, PP, BPP

Game Theoretic Techniques and Lower Bounds: Game theory concepts; Applications to lower bounds, Examples: Sorting and Game tree evaluation
8 Hours
Moments and Deviations: Random sampling/bucketing, Tail bounds : Markov and Chebyshev inequalities, High confidence selection, Pairwise independence,  Applications : The stable marriage problem
Tail Inequalities : Chernoff bounds; Applications: Network routing and gate-array wiring
7 Hours
Markov Chains and Random Walks: A 2-SAT Example, Markov Chains, Random Walks on Graphs, Graph Connectivity, Expanders , Probability Amplification by Random Walks on Expanders
Algebraic methods: Fingerprinting and Freivald's technique, Verifying polynomial identities, Randomized pattern matching
6 Hours
Data  Structures: Random treaps; Skip lists
Randomized Graph Algorithm: Shortest paths; Minimum spanning tree
7 Hours
Parallel and Distributed Algorithms: The PRAM Model, Sorting on a PRAM, Maximal Independent Sets, Perfect Matchings,
Number Theory and Algebra: Elementary number theory,  Quadratic residues, Primality testing, RSA cryptosystem

References:   
1. R. Motwani and P. Raghavan, “Randomized Algorithms”, Cambridge University Press
2. Michael Mitzenmacher, Eli Upfal , “Probability and Computing”, Cambridge University Press






Approximation Algorithms

 
             7 Hours
 
Introduction, Overview of Complexity Theory: Class NP, NP-Completeness, reductions, Randomized Complexity Classes,  Basics of Probability Theory, Expectation and moments, basic distributions
 
7 Hours
 
Vertex/set cover, Greedy algorithm, Hardness of approximating Traveling Salesman Problem (TSP), Set cover, layering algorithm, shortest superstring,
 
Steiner tree, Metric Steiner tree, Metric TSP; Minimum weight multiway cut 

minimum weight k-cut , k-center
 
8 Hours
 
Knapsack problem, Pseudo polynomial time algorithms PTAS, Fully polynomial time approximation scheme FPTAS, Strong NP-hardness, Bin packing, Asymptotic PTAS, Euclidean TSP, Proof of correctness
 
6 Hours
 
LP Duality, LP Duality Theorem, Dual-fitting -based analysis for the greedy set cover algorithm
 
Rounding Algorithm: set cover, randomized rounding
 
7 Hours
 
Half-integrality of vertex cover; Primal-dual Schema: set cover
 
Scheduling on Unrelated Parallel Machines, Primal-Dual algorithms, Facility Location and the k-Median Problem, Steiner Network Design 
                                                                                               

References:

1. Vijay V.Vazirani, “Approximation Algorithm”, Springer

















Complexity Theory

 8 Hours

Models of Computation, resources (time and space), algorithms, computability, complexity;

8 Hours

Complexity classes, P/NP/PSPACE, reductions, hardness, completeness, hierarchy, relationships between  complexity classes
8 Hours

Randomized computation and complexity; Logical characterizations, incompleteness; Approximability
8 Hours

Circuit complexity, lower bounds; Parallel computation and complexity; Counting problems; Interactive proofs;

8 Hours

Probabilistically checkable proofs; Communication complexity; Quantum computation.


References:

1. Christos H. Papadimitriou, “Combinatorial Optimization: Algorithms and Complexity”
2. Sanjeev Arora and Boaz Barak , “Complexity Theory: A Modern Approach”
3. Steven Homer, Alan L. Selman, Computability and Complexity Theory , Springer


























Computational Geometry

8 Hours

Convex hulls: construction in 2d and 3d, lower bounds; Triangulations: polygon triangulations, representations, point-set triangulations, planar graphs;
8 Hours

Voronoi diagrams: construction and applications, variants; Delayney triangulations: divide-and-conquer, flip and incremental algorithms, duality of Voronoi diagrams, minmax angle properties.
8 Hours

Geometric searching: point-location, fractional cascading, linear programming with prune and search, finger trees, concatenable queues, segment trees, interval trees; Visibility: algorithms for weak and strong visibility, visibility with reflections, art-gallery problems;
8 Hours

Arrangements of lines: arrangements of hyper planes, zone theorems, many-faces complexity and algorithms; Combinatorial geometry: Ham-sandwich cuts
8 Hours

Sweep techniques: plane sweep for segment intersections, Fortune's sweep for Voronoi diagrams, topological sweep for line arrangements; Randomization in computational geometry: algorithms, techniques for counting; Robust geometric computing; Applications of computational geometry



References:

1. Franco P. Preparata, Michael Ian Shamos, “Computational Geometry: An Introduction”  SpringerVerlag.

2. Mark Berg, Marc van Kreveld, Mark Overmars, and Otfried Schwarzkopf,Computational Geometry, Algorithms and Applications”. Springer.





















COMPULSORY COURSE FOR SEM III

Professional Aspects in Software Engineering (1/2 Unit)

 

Intellectual Property rights                                                                                                                                             5 Hours 

Confidential Information, Copyright, Infringement of Copyright, Acts permitted in Relation to Copyright Works, Licensing and Assignment of Copyright, Moral Rights, Designs, Trademarks, The tort of passing off, Domain Names, Patents.


Software Licenses                                                                                                                                              5 Hours


Copyright, Contract, Patent, Free Software and Open Source Software, MIT License, BSD License, GNU General Public License, GNU Lesser General Public License, Q Public License, Proprietary License, Sun Community License,

Software Contracts:                                                                                                                                                          5 Hours

Basics of Software Contracts, Extent of liability, Contract for the supply of custom-built software at a fixed price, other types of software service Contract, Liability for defective software.


Software Crime Prevention                                                                                                                                            5 Hours

Computing and criminal Activity, Reforms of Criminal Law, Categories of Misuse, Computer Fraud, Obtaining Unauthorized Access to Computer, Unauthorized Alteration or Destruction of Information, Denying Access to an Authorized user, Unauthorized Removal of Information Stored in a Computer.


Data Protection Regulations                                                                                                                                           5 Hours

Data Protection and Privacy, The impact of the Internet, Factors Influencing the Regulation of Data Processing, Convergence of Data Protection Practice, Defamation and the protection of Reputation.


References:

1. Andrew M. St. Laurent, “Open Source and Free Software Licensing”, O’Reilly Publications
2. Frank Bott, et. al, “Professional Issues in Software Engineering”, Taylor & Francis














Appendix III


Thesis Requirements for M.Tech. Courses in Computer Science and Information Technology


The work reported in the thesis shall be an extension of the state of the art to demonstrate the capability of the student to do creative work, develop the idea, prove its efficacy, report it in a convincing manner and finally, defend it. The work must have scientific and/ or industrial relevance.

The thesis shall be done in two parts. During the third semester, the student shall carry out literature survey and develop the necessary background (familiarity with tools, techniques) for the work to be carried out in the fourth semester. At the end of the third semester, the student shall submit a synopsis clearly stating the problem to be addressed, report on the background developed, and layout a concrete project plan for the fourth semester. A Pre-thesis examination consisting of a presentation and viva shall be conducted after the synopsis has been submitted.

Passing the Pre-thesis examination is a pre-requisite for continuing with the thesis in the fourth semester.

The thesis shall be submitted following the format of UPTU. It shall be examined by an external expert decided by UPTU. After a written report is received expressing satisfaction with the thesis, a viva voce examination shall be conducted in the presence of the external expert. The thesis requirement shall be fulfilled upon the student passing the viva examination.