M techComputerNew
M techComputerNew
M techComputerNew
University-Lonere
Syllabus
for
M. Tech. (Computer Engineering)
M. Tech(Computer Science)
M. Tech. (Computer Science & IT)
M. Tech. (Computer Science & Engg.)
w.e.f. July 2017
1
Dr. B. A. Tech. University-Lonere
2
Dr. B. A. Tech. University-Lonere
List of Electives
Elective 1 Elective 2
1. Cloud Computing 1. Intrusion Detection System
2. Game Theory 2. Model Checking
3. Natural Language Processing 3. Artificial Intelligence and Knowledge Reasoning
4. Social Network Analysis 4. High Performance Computing
Elective 3 Elective 4
1. Software Testing 1. Introduction to Cognitive System
2. Algorithms for Big Data-structures 2. Virtual Reality
3. Software Language Engineering 3. Mobile Computing
4. Cryptography and Network 4. Storage Systems
Security
Elective 5:
1. Functional Programming
2. Object Oriented Systems
3. Reinforcement Learning
4. Pattern Recognition
3
Dr. B. A. Tech. University-Lonere
4
Dr. B. A. Tech. University-Lonere
recommendation.
Probability and Bayes learning, Evaluation Measures, Hypothesis Testing.
Logistic Regression, Linear Classification, Support Vector Machine, Kernel function and Kernel SVM.
Neural network: Perceptron, multilayer network, backpropagation, introduction to deep neural
network.
Computational learning theory, PAC learning model, Sample complexity, VC Dimension, Ensemble
learning ad methods.
Clustering: k-means, adaptive hierarchical clustering, Gaussian mixture model.
Expectation Maximization, Introduction to Reinforcement Learning.
REFERENCES:
1. T. Hastie, R. Tibshirani, J. Friedman. The Elements of Statistical Learning, 2e, 2008.
2. Christopher Bishop. Pattern Recognition and Machine Learning. 2e.
3. Machine Learning. Tom Mitchell. First Edition, McGraw- Hill, 1997.
4. Introduction to Machine Learning Edition 2, by Ethem Alpaydin.
5. Darren Cook Practical Machine Learning with H2O Oreilly 2017
NPTEL Courses:
1. Introduction to Machine Learning by Dr. Balaraman Ravindran, IIT Madras.
2. Introduction to Machine Learning by Prof. S. Sarkar, IIT Kharagpur.
MTCE1103: Advanced Computer Network
L:3 T:1 P:0 MSE:20 IA:20 ESE:60
Prerequisites: Computer Network.
Course Contents
Review to Fundamentals of Computer N/Ws, TCP/IP reference model, Interior and Exterior Gateways
routing application layered protocols such as DHCP, BOOTP OSI, TCP/IP, ATMX.25, frame relay,
switching techniques in communication system.
Fundamentals of Optical Networks, SONET/SDH Introduction, TDM Networks elements, Generation
of optical N/W’s.
Introduction to key optical node Organization and key other terms, Cross connect Terminology, brief
introduction to TDM and WDM, Evolution of optical system, Key Attributes of optical fiber, Digital
Multiplexing Hierarchy, Characterization of optical fiber, timing and Synchronization.
5
Dr. B. A. Tech. University-Lonere
Fiber Optic Technologies History, Basic fundamentals Operation, Physical properties, networking
elements. Wavelength Division Multiplexing Principle of Operation, CDM/DWDM, and WDM
networks elements, Impairments and Compensation in WDM.
SONET/ SDH Multiservice platform. Protection / Restoration and diversity in optical N/W’s,
MPLS/GMPLS introduction.
REFERENCES:
1. Optical Networks Control, Bala Rajagopalan, Gerg Bernstein, Debanjan saha.
2. Optical Networks and WDM, Walter J. Goralski, McGraw-Hill 2001.
3. Computer Networks: A System Approach, Larry L. Peterson, Bruce S. Davie, Morgan
Kaufmann.
4. WDM Optical Networks: Concepts, Design and Algorithms, C. Siva Ram Murthy, Prentice Hall
of New Jersey USA.
MTCE1104: Cloud Computing (Elective I)
L:3 T:1 P:0 MSE:20 IA:20 ESE:60
Prerequisites: Distributed Systems, Computer Networks
Course Contents
Unit1: Introduction to distributed and cluster computing, Basics of the emerging cloud
computing paradigm, Cloud Benefits (10)
Unit 2: Virtualization concepts and types, KVM, VM Scheduling (8)
Unit 3: Disaster Recovery, Scaling (6)
Unit 4: Cloud security, Regulatory and compliance issues, VM Security Issues (6)
Unit 5: Latest Research Paper Topics (10
Text Books:
1. Cloud Computing, Michael Miller, Pearson, 2012
2. Cloud Computing: Implementation, Management, and Security, , John Ritting house and James
F.Ransome, CRC Press Taylor and Francis Group, 2009
3. Dan Kusnetzky , “Virtualization: A Manager’s Guide”, 1st Edition ,O’Reilly,2011
4. Tim Mather Cloud Security and Privacy, Oreilly 2015
References:
1. Barrie Sosinsky, “Cloud Computing Bible”, 1 st Edition ,Wiley India Pvt Ltd,2011.
2. Robert Elsenpeter, Toby J. Velte, Anthony T. Velte, “Cloud Computing : A Practical Approach”, 1st
Edition, Tata Mcgraw Hill Education, 2011.
6
Dr. B. A. Tech. University-Lonere
7
Dr. B. A. Tech. University-Lonere
London, 2009.
NPTEL/Open Course
1. http://lcm.csa.iisc.ernet.in/gametheory/index.html
8
Dr. B. A. Tech. University-Lonere
NPTEL Course:
1. Natural Language Processing by Prof. Pushpak Bhattacharyya, IIT Bombay.
MTCE1104: Social Network Analysis (Elective I)
L:3 T:1 P:0 MSE:20 IA:20 ESE:60
Course Contents
REFERENCE:
1. Networks: An Introduction, Oxford University Press, Oxford, 2010.
2. Evolution of Networks, Oxford University Press, Oxford, 2003.
3. The structure and function of complex networks, SIAM Review 45, 167-256, 2003.
4. Statistical mechanics of complex networks, Rev. Mod. Phys., 74(1), 2002.
5. Social Network Analysis for Startup Tsvetovat, 2015 Oreilly.
NPTEL Course:
1. Complex Network : Theory and Application by Prof. Animesh Mukherjee, IIT Kharagpur.
MTCE1105: Intrusion Detection System (Elective 2)
L:3 T:0 P:0 MSE:20 IA:20 ESE:60
Prerequisites:
Course Contents
Intruder types, intrusion methods, processes and detection, message integrity and authentication, honey
pots.
General IDS model, data mining based IDS, Denning model, data mining framework for constructing
features and models for intrusion detection systems
Unsupervised anomaly detection, CV5 clustering, SVM, probabilistic and statistical modeling, general
IDS model and taxonomy, evaluation of IDS, cost sensitive IDS.
NBAD, specification based and rate based DDOS, scans/probes, predicting attacks, network based
9
Dr. B. A. Tech. University-Lonere
anomaly detection, stealthy surveillance detection; Defending against DOS attacks in scout:
signature-based solutions, snort rules.
Host-based anomaly detection, taxonomy of security flaws in software, self-modeling system calls for
intrusion detection with dynamic window size.
Secure intrusion detection systems, network security, secure intrusion detection environment, secure
policy manager, secure IDS sensor, alarm management, intrusion detection system signatures, sensor
configuration, signature and intrusion detection configuration, IP blocking configuration, intrusion
detection system architecture
Reference Books
1. Endorf, C., Schultz E. and Mellander J., “Intrusion Detection and Prevention,” McGraw-Hill.
2003
2. Bhatnagar, K., “Cisco Security”, Course Technology. 2002
3. Marchette, D. J., “Computer Intrusion Detection and Network Monitoring: A Statistical
Viewpoint”, Springer. 2001
4. Rash, M., Orebaugh, A. and Clark, G., “Intrusion Prevention and Active Response: Deploying
Network and Host IPS”, Syngress. 2005
5. Cooper, M., Northcutt, S., Fearnow, M. and Frederick, K., “Intrusion Signatures and Analysis”,
Sams. 2001
MTCE1105: Model Checking (Elective 2)
L:3 T:0 P:0 MSE:20 IA:20 ESE:60
Prerequisites: Familiarity with basic algorithms and finite-state machines preferable
Course Contents
Modeling systems as Finite-state machines, Using the model-checker NuSMV, Linear-time properties
for verification, Regular properties – automata over finite words, Omega-regular properties – automata
over infinite words, Model checking omega-regular properties, Linear Temporal Logic (LTL),
Algorithms for LTL, Computation Tree Logic (CTL), Algorithms for LTL, Models with timing
constraints – timed automata, More on timed automata, Probabilistic models I, Probabilistic models II,
Probabilistic models III.
REFERENCES:
10
Dr. B. A. Tech. University-Lonere
1. Principles of Model-checking, Christel Baier and Joost-Pieter Katoen, MIT Press (2008).
NPTEL Course:
1. Model Checking by Prof. B. Srivathsan, CMI.
MTCE1105 Artificial Intelligence: Knowledge Representation and Reasoning
L:3 T:0 P:0 MSE:20 IA:20 ESE:60
Prerequisites: Some exposure to formal languages, logic and programming.
Course Contents
Introduction: Introduction to Knowledge Representation and Reasoning and Formal Logics.
Propositional Logic: Language, Semantics and Reasoning, Syntax and Truth Values, Valid Arguments
and Proof Systems, Rules of Inference and Natural Deduction, Axiomatic Systems and Hilbert Style
Proofs, The Tableau Method, The Resolution Refutation Method.
First Order Logic(FOL): Syntax, Semantics, Entailment and Models, Proof Systems, Forward
Chaining, Unification, Forward Chaining Rule Based Systems, The Rete Algorithm, Programming in a
Rule Based Language, The OPS5 Expert System Shell.
Representation in FOL: Skolemization, Knowledge Representation, Properties and Categories,
Reification and Abstract Entities, Resource Description Framework(RDF), Event Calculus: Reasoning
About Change.
Mapping Natural Language to FOL: Understanding=Fulfilling Expectations, Conceptual
Dependency (CD) Theory, Understanding Language, Conceptual Analysis: Mapping English to CD
Theory.
Programming in Logic: Deductive Retrieval in Backward Chaining, Logic Programming, Prolog,
Depth First Search and Efficiency Issues, Controlling Search, The Cut Operator in Prolog.
Theorem Proving in FOL: Incompleteness of Forward and Backward Chaining, The Resolution
Refutation Method for FOL, Clause Form and The Resolution Rule, FOL with Equality, Complexity.
Knowledge Structures: Semantic Nets using Frames, Scripts, Script Applier Mechanism(SAM),
Goals, Plans and Actions, Plan Applier Mechanism(PAM): Expectations and Recognition, PAM: Top
Down and Bottom Up Reasoning.
Ontology and Description Logics: A Description Logic, Normalisation, Structure Matching,
Classification, A-box Reasoning, Extensions, ALC, Further Extensions.
Inheritance: Taxonomies and Inheritance, Beliefs, Credulous and Skeptical Reasoning.
Default Reasoning: Introduction to Default Reasoning, Circumscription, Minimal Models, The Event
Calculus Revisited, Default Logic, Autoepistemc Logic.
Reasoning in Multi-agent Systems: Epistemic Logic: Kripke Semantics in a Multi Agent Scenario,
The Muddy Children Puzzle.
REFERENCES:
1. Ronald J. Brachman, Hector J. Levesque: Knowledge Representation and Reasoning, Morgan
Kaufmann, 2004.
2. Deepak Khemani. A First Course in Artificial Intelligence, McGraw Hill Education (India),
2013.
NPTEL Course
11
Dr. B. A. Tech. University-Lonere
NPTEL Course:
1. High Performance Computing by Prof. Mathew Jacob, IISc Bangalore.
12
Dr. B. A. Tech. University-Lonere
Semester II
MTCE1201: Data Science
L:3 T:1 P:0 MSE:20 IA:20 ESE:60
Prerequisites:
Course Contents
Data Mining Patterns: Cluster Analysis, Anomaly Detection, Association Rules,
Data Mining Sequences:
Text Mining: Text mining Text Clusters
Data Analysis: Simple regression, Multiple Regression, Multivariate Regression Analysis, Robust
Regression, Correlation, Clustering.
Data Viualization: R graphics, Plotting, Scatter Plots Bar Charts and Plots 3D graphics
Machine Learning: Data Partitioning Predicting events with machine learning, Supervised and
Unsupervised learning.
Reference Books
1. Dan Toomey, R for Data Science, Packit First Edition Publishing 2014 NPTEL/Open Course
2. Hadley Wickham et al R for Data Science Oreilly 2016
3. Richard Cotton Learning R Oreilly 2013
1.
MTCE1202: Software Architecture
L:3 T:1 P:0 MSE:20 IA:20 ESE:60
Prerequisites:
Course Contents
Review of Software Engineering, Various Definitions of Software Architecture, Architecture
Documentation: SEI Framework, Module View, Component and Connector View, Deployment View,
Pattern-Oriented Software Architecture: Layer, MVC, Pipe-Filter, Publish/Scriber, Presentation
Abstraction and Control Patterns, Software Architecture quality Attributes, Evaluating Software
Architecture, Architecture Decisions, Architecture Knowledge Management, Technology Architectures.
Reference Books
13
Dr. B. A. Tech. University-Lonere
REFERENCE:
1. Srinivasan Desikan, Gopalaswamy Ramesh, “Software Tesing Principles and Practices”,
Pearson Education.
2. William Perry, “Effective Methods for Software Testing”, John Wiley & Sons, New York, 1995.
MTCE1203 Algorithm for Big Data (Elective3)
14
Dr. B. A. Tech. University-Lonere
Real-Time Task Scheduling: Concept, Types of real time task and their characteristics, Task
scheduling, Clock-Driven Scheduling, Hybrid Schedulers, Event-driven scheduling, EDF scheduling,
Rate monotonic System, Issue associate with RMA, Issue in using RMA in practical situations.
Handling Resource Sharing and Dependencies Among Real-Time Tasks: Resource Sharing Among
15
Dr. B. A. Tech. University-Lonere
Real-time Tasks, Priority Inversion, Priority Inheritance Protocol (PIP), Higher Locker Protocol (HLP),
Priority Ceiling Protocol (PCP), Difference types of Priority Inversion under PCP, Important features of
PCP, Some issues in Using A Resource Sharing Protocol.
Commercial Real-Time Operating Systems: Time Services, Features of Real Time Operating
System, Unix as a Real Time Operating System, UNIX-based Real-Time Operating System, Wndows
as a Real-Time Operating System, POSIX, A Survey of contemporary Real-Time Operating System,
Benchmarking Real-Time System.
REFERENCE:
1. Rajib Mall, "Real-Time Systems: Theory and Practice," Pearson, 2008.
2. Jane W. Liu, "Real-Time Systems" Pearson Education, 2001.
3. Krishna and Shin, "Real-TIme Systems," Tata McGraw Hill. 1999.
NPTEL Course:
1. Real Time Systems by Prof. Rajib Mall, IIT Kharagpur.
16
Dr. B. A. Tech. University-Lonere
hash functions, attacks on hash functions. Public-key parameters: Modular arithmetic, gcd, primality
testing, Chinese remainder theorem, modular square roots, finite fields. Intractable problems: Integer
factorization problem, RSA problem, modular square root problem, discrete logarithm problem,
Diffie-Hellman problem, known algorithms for solving the intractable problems. Public-key
encryption: RSA, Rabin and EIGamal schemes, side channel attacks. Key exchange: Diffie-Hellman
and MQV algorithms. Digital signatures: RSA, DAS and NR signature schemes, blind and undeniable
signatures. Entity authentication: Passwords, challenge-response algorithms, zero-knowledge protocols.
Standards: IEEE, RSA and ISO standards. Network issues: Certification, public-key infrastructure
(PKI), secured socket layer (SSL), Kerberos. Advanced topics: Elliptic and hyper-elliptic curve
cryptography, number field sieve, lattices and their applications in cryptography, hidden monomial
cryptosystems, cryptographically secure random number generators.
Text Books:
1. Cryptography and Network Security, William Stallings, Prentice Hall of India
2. Cryptography and Network Security, Forouzan, Tata McGraw-Hill
3. Network Security: Private Communication in a Public World, Charlie Kaufman, Prentice Hall Series
NPTEL course
Prof. D. Mukhopadhyay, Cryptography and Network Security.
17
Dr. B. A. Tech. University-Lonere
REFERENCE:
1. Wilson, Robert A., & Keil, Frank C. (eds.), The MIT Encyclopedia of the Cognitive Sciences
(MITECS), MIT Press, 2001 [Primary text; available on Cognet].
2. Bowerman, Melissa and Stephen C. Levinson, Language Acquisition and Conceptual
Development, Cambridge University Press 2001.
3. Sternberg, Robert J., Cognitive Psychology, 4th ed., Cengage Learning India, 2008.
4. Gardenfors, Peter, Conceptual Spaces: The Geometry of Thought, MIT Press, 2000, 317 pages.
MTCE1204 Virtual Reality (Elective 4)
L:3 T:0 P:0 MSE:20 IA:20 ESE:60
Prerequisites: Basic maths and exposure to engineering.
Course Contents
Introduction: Course mechanics, Goals and VR definitions, Historical perspective, Birds-eye
view(general), Birds-eye view(hardware), Birds-eye view(software), Birds-eye view(sensation and
perception).
Geometry of Virtual Worlds: Geometric modeling, Transforming models, Matrix algebra and 2D
rotations, 3D rotations and yaw, pitch, and roll, Axis-angle representations, Quaternions, Converting
and multiplying rotations, Homogeneous transforms, The chain of viewing transforms, Eye transforms,
Canonical view transform, Viewport transform.
Light and Optics: Three interpretations of light, Refraction, Simple lenses, Diopters, Imaging,
properties of lenses, Lens aberrations, Optical system of eyes.
Visual Physiology: Photoreceptors, Sufficient resolution for VR, Light intensity, Eye movements, Eye
movement issues for VR, Neuroscience of vision.
Visual Perception: Depth perception, Motion perception, Frame rates and displays.
Tracking Systems: Overview, Orientation tracking, Tilt drift correction, Yaw drift correction, Tracking
with a camera, Perspective n-point problem, Filtering, Lighthouse approach.
Audio: Physics and physiology, Auditory perception, Auditory localization, Rendering, Spatialization
18
Dr. B. A. Tech. University-Lonere
REFERENCE:
1. http://msl.cs.uiuc.edu/vr/
2. George Mather, Foundations of Sensation and Perception: Psychology Press; 2nd edition, 2009.
3. Peter Shirley, Michael Ashikhmin, and Steve Marschner, Fundamentals of Computer Graphics,
A K Peters/CRC Press; 3 edition, 2009.
NPTEL Course:
1. Virtual Reality by Prof. Steven LaValle, IIT Madras.
19
Dr. B. A. Tech. University-Lonere
Multiple form factors, sensors, Google cloud messaging, monetizing your app.
REFERENCE:
1. Android Programming (Big Nerd Ranch Guide), by Phillips, Stewart, Hardy and Marsicano.
2. Android Programming – Pushing the limits by Hellman.
NPTEL Course:
1. Mobile Computing by Prof. Pushpendra Singh, IIITD.
MTCE104 Storage System (Elective 4)
L:3 T:0 P:0 MSE:20 IA:20 ESE:60
Prerequisites: Operating System.
Course Contents
Introduction: History: computing, networking, storage, Need for storage networking, SAN, NAS,
SAN/NAS Convergence, Distributed Storage Systems, Mainframe/proprietary vs. open storage,
Storage Industry Organizations and Major Vendors Market, Storage networking strategy (SAN/NAS or
Distr storage), Impact of Regulations: existing and new.
Technology: Storage components, Data organization: File vs. Block, Object; Data store; Searchable
models, Storage Devices (including fixed content storage devices), File Systems, Volume Managers,
RAID systems, Caches, Prefetching.
Network Components: Connectivity: switches, directors, highly available systems, Fibre Channel,
1GE/10GE, Metro-ethernet, Aggregation, Infiniband.
Error Management: Disk Error Mgmt, RAID Error Mgmt, Distr Systems Error Mgmt
Highly available and Disaster-tolerant designs: Ordered writes, Soft updates and Transactions, 2
phase, 3 phase, Paxos commit protocols, Impossibility Results from Distributed Systems, Choose 2 of
3: Availability, Consistency and Partition Tolerance.
SAN Components: Fibre Channel, IP-based Storage (iSCSI, FCIP, etc.), Examples, NAS: NFS, CIFS,
DAFS
Large Storage Systems: Google FS/BigTable, Cloud/Web-based systems (Amazon S3), FS+DB
convergence, Programming models: Hadoop
Archival Systems: Content addressable storage, Backup: serverless, LAN free, LAN Replication
issues, Storage Security, Storage Management, Device Management, NAS Management,
Virtualization : Virtualization solutions, SAN Management: Storage Provisioning, Storage Migration,
20
Dr. B. A. Tech. University-Lonere
SRM.
NPTEL Course:
1. Storage Systems by Dr. K. Gopinath, IISc Bangalore.
REFERENCE:
21
Dr. B. A. Tech. University-Lonere
REFERENECE:
1. R. S. Sutton and A. G. Barto. Reinforcement Learning - An Introduction. MIT Press. 1998.
NPTEL Course:
1. Reinforcement Learning by Dr. B. Ravindran, IIT Madras.
MTCE1205 Pattern Recognition (Elective 5)
L:3 T:0 P:0 MSE:20 IA:20 ESE:60
Prerequisites: Vector spaces and Linear Algebra, Algorithms, Probability theory, Statistics.
Course Contents
Introduction and mathematical preliminaries: What is pattern recognition?, Clustering vs.
Classification; Applications; Linear Algebra, vector spaces, probability theory, estimation techniques,
Decision Boundaries, Decision region / Metric spaces/ distances.
Classification: Bayes decision rule, Normal Distribution, Error probability, Error rate, Minimum
distance classifier, Mahalanobis distance; K-NN Classifier, Linear discriminant functions and
Non-linear decision boundaries. Mahalanobis Distance, K-NN Classifier, Fisher’s LDA, Single and
Multilayer perceptron, training set and test sets, standardization and normalization.
Clustering: Basics of Clustering; similarity/dissimilarity measures, clustering criteria, Different
distance functions and similarity measures, Minimum within cluster distance criterion, K-means
clustering, single linkage and complete linkage clustering, MST, K-medoids, DBSCAN, Visualization
22
Dr. B. A. Tech. University-Lonere
REFERENCE:
1. R.O.Duda, P.E.Hart and D.G.Stork, Pattern Classification, John Wiley, 2001.
2. Statistical pattern Recognition; K. Fukunaga; Academic Press, 2000.
3. S.Theodoridis and K.Koutroumbas, Pattern Recognition, 4th Ed., Academic Press, 2009.
NPTEL Course:
1. Pattern Recognition by Prof. Sukhendu Das and Prof. C.A. Murthy, IIT Madras.
23