PhD-Syllabus-2023-24_batch-20-12-2024

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

GOVERNMENT OF ASSAM

DEPARTMENT OF COMPUTER APPLICATIONS


ASSAM ENGINEERING COLLEGE
GUWAHATI-13
PhD Syllabus: Session 2023-24 onwards
Dept. Of Computer Application
Stream/Discipline: Computer Science & Engineering

Structure of PhD Coursework (Autumn and Spring Session):


Sl Papers Category Title of the course Credit Marks
No. CE ESE
1 Paper-I Compulsory Research Methodology Refer Annexure-I 2 30 70
(as per UGC recommendation)
2 Paper-II Compulsory Data Structures, Algorithms and Applications 2 30 70
(Departmental) Refer Annexure-I :( Departmental)
3 Paper-III Compulsory Research and Publication Ethics 2 30 70
Refer Annexure-I (as per UGC recommendation)
4 Paper-IV Elective Refer Annexure-II 3 30 70
(Departmental)
5 Paper-V Elective Refer Annexure-II 3 30 70
(Departmental)
Total 12 500

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-I
Syllabus of Paper-I, & III (common to all branches)
PAPER-I: RESEARCH METHODOLOGY (CREDIT 2)
Course Outcomes: At the end of this course, students will be able to:
CO1: Understand research problem formulation.
CO2: Analyze research related information.
CO3: Follow research ethics.
CO4: Understand that today’s world is controlled by Computer, Information Technology, but
tomorrow world will be ruled by ideas, concept, and creativity.

MODULE 1:
Meaning of research problem, sources of research problem, criteria characteristics of a good research
problem, errors in selecting a research problem, scope and objectives of research problem. Approaches of
investigation of solutions for research problem, data collection, analysis, interpretation, Necessary
instrumentations
MODULE 2:
Effective literature studies approaches, analysis Plagiarism, and research ethics
MODULE 3:
Effective technical writing, how to write report, paper developing a research proposal, format of
research proposal, a presentation and assessment by a review committee
REFERENCES:
1. Stuart Melville and Wayne Goddard, “Research methodology: an introduction for science &
engineering students’”
2. Wayne Goddard and Stuart Melville, “Research Methodology: An Introduction”
3. Ranjit Kumar, 2nd Edition, “Research Methodology: A Step by Step Guide for beginners”

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-I
PAPER II: DATA STRUCTURE, ALGORITHMS & APPLICATIONS
Course Outcome: At the end of the course the students will be able to:
CO1: Understand various data structure, develop algorithms, and write modular, efficient and
readable programs
CO2: analyze algorithms and their time and space complexity.
CO3: Apply and evaluate various algorithms in real life problems

Module I:
Introduction to Data Structure Linear Data Structure: Stack, Queue, Linked List various operations and
application, Nonlinear Data Structure: Binary Tree, Binary Search Tree, AVL Tree, B Tree, Graph, Depth First
Search, Breadth First Search.
Module II:
Introduction to Algorithms, Analysis of Algorithms, Design of Algorithms and complexity of Algorithms,
Asymptotic Notations, Growth of Function, Recurrences Sorting in Polynomial Time: Insertion Sort, Merge Sort
Module III:
Data structures: Priority queues, binary heaps, binomial and Fibonacci heaps, binary search trees, Cost
Amortization.
Design and Analysis Techniques: Divide and Conquer, merge sort, finding closest pair of points. Augmented
Data Structure: Red-Black tree, OS-Tree, Interval Tree, B-Tree, AVL tree
Module IV:
Greedy Algorithms: Coin charging, Kruskal’s, Prim and Dijkstra’s algorithm, Knapsack problem. Dynamic
Programming: Coin charging problem, matrix multiplication, longest common subsequence, Floyd and
Warshall algorithm. Application of Sorting and Searching.
Graph Algorithms: Topological sort, minimum spanning trees, shortest paths, maximum-flow –Flow networks,
Ford-Fulkerson method, Maximum bipartite matching.
Module V :
Concept of different classes of problems: P, NP, NP-Complete, Easy vs. Hard, Polynomial time, non-
deterministic algorithms, reducibility.
Approximation Algorithms: Travelling salesman problem, Parallel and Distributed algorithms.

Text Books/Reference:
1. Introduction to Algorithm by Thomas Corman , CE Leiserson Roland L Rivest, C Stein
2. Fundamentals of Algorithms-Ellis Horowitz, S Salini S. Rajasekaran
3. Cormen , Leiserson , Rivest, Introduction to Algorithms, Mil Press & MeGraw -Hill Books Company.
4. Rauthan & Patel, Expert Data Structures, Khanna Publication Co(Ltd ).
5. Weiss, Data Structures and Algorithm Analysis in C++, Pearson Education.
6. G.S.Baluja, Data Structures Through C, Dhanpat Rai & Co., 4th Edition

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-I
PAPER III: RESEARCH AND PUBLICATION ETHICS (CREDIT 2)
Course Objective: To create awareness about the publication ethics and publication misconducts
Course Outcome: At the end of the course the students will be able to:
CO1: Understand the philosophy of science and ethics, research integrity and publication ethics
CO2: Identify research misconduct and predatory publications
CO3: Understand indexing and citation databases, open access publications, research metrics (citations, h-
index, impact Factor, etc.)
CO4: Apply plagiarism tools

Module I: PHILOSOPHY AND ETHICS (3 Hrs.)


Introduction to philosophy: definition, nature and scope, concept, branches - Ethics: definition, moral philosophy,
nature of moral judgements and reactions.
Module II: SCIENTIFIC CONDUCT (5 Hrs.)
Ethics with respect to science and research - Intellectual honesty and research integrity - Scientific misconducts:
Falsification, Fabrication and Plagiarism (FFP) - Redundant Publications: duplicate and overlapping publications, salami
slicing - Selective reporting and misrepresentation of data.
Module III: PUBLICATION ETHICS (7 hrs)
Publication ethics: definition, introduction and importance - Best practices / standards setting initiatives and guidelines:
COPE, WAME, etc. - Conflicts of interest - Publication misconduct: definition, concept, problems that lead to unethical
behaviour and vice versa, types - Violation of publication ethics, authorship and contributor ship - Identification of
publication misconduct, complaints and appeals - Predatory publisher and journals.
Module IV: OPEN ACCESS PUBLISHING (4 Hrs.)
Open access publications and initiatives - SHERPA/RoMEO online resource to check publisher copyright & self-archiving
policies - Software tool to identify predatory publications developed by SPPU - Journal finger / journal suggestion tools
viz. JANE, Elsevier Journal Finder, Springer, Journal Suggester, etc.
Module V: PUBLICATION MISCONDUCT (4Hrs.)
Subject specific ethical issues, FFP, authorship, conflicts of interest, complaints and appeals: examples and fraud from
India and abroad. Software tools: Use of plagiarism software like Turnitin, Urkund and other open source software
tools.
Module VI: DATABASES AND RESEARCH METRICS(7Hrs.)
Indexing databases, Citation databases, Web of Science, Scopus, etc. Research Metrics: Impact Factor of journal as per
Journal Citations Report, SNIP, SJR, IPP, Cite Score - Metrics: h-index, g index, i10 Index, altmetrics.

References:
1. Nicholas H. Steneck: Introduction to the Responsible Conduct of Research. Office of Research Integrity. 2007:
Available at: https://ori.hhs.gov/sites/default/files/rcrintro.pdf
2. The Student's Guide to Research Ethics by Paul Oliver Open University Press, 2003
3. Responsible Conduct of Research by Adil E. Shamoo, David B. Resnik, Oxford University Press, 2003
4. Ethics in Science Education, Research and Governance Edited by Kambadur Muralidhar, Amit Ghosh, Ashok
Kumar Singhvi: Indian National Science Academy, 2019. ISBN : 978-81-939482-1-7.
5. Anderson B.H., Dursaton, and Poole M.: Thesis and assignment writing, Wiley Eastern 1997.
6. Bijorn Gustavii: How to write and illustrate scientific papers? Cambridge University Press.
7. Bordens K.S. and Abbott, B.b.: Research Design and Methods, Mc Graw Hill, 2008.
8. Graziano, A., M., and Raulin, M.,L.: Research Methods – A Process of Inquiry, Sixth Edition, Pearson, 2007.

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
Paper IV & Paper V :( Departmental)

A Student can opt for any two subjects from the following on recommendation of PhD guides of the scholar
/the DRC.
PHD-45-001: GRAPH THEORY
MODULE 1:
Graph: Incidence and degree; Handshaking Lemma; Isomorphism ; Sub graphs and Union of graphs ;
Connectedness ; Walks , Paths and Circuits ;Components and Connectedness algorithms; Shortest Path
Algorithms , Eulerian graph Fieury's algorithms and Chinese postman problem ; Hamiltonian graph -necessary
and sufficient conditions ; Travelling salesman problem ; Bipartite graph .
MODULE 2:
Tree :Properties of trees ; Pedant vertices in a tree ; Centre of a tree ; Rooted binary trees ; Spanning trees -
Spanning tree algorithms ; Fundamental circuits Spanning trees of weighted graph ; cut -sets and cut -vertices ;
Fundamental cut -sets ; Connectivity and separativity ; Connectivity , K-connectivity Planner graph :
Combinatorial and geometric duals ; Kuratowski 's graph; Detection of planarity; Thickness crossings,
properties of planarity.
MODULE 3:
Colourings :Chromatic number ; Chromatic polynomial ; The six and five colour theorems ; The four colour
problem , vertex colouring and upper bounds and its applications , structure of k-chromatic graph , critical
graphs, perfect graph, Imperfect graph , perfect graph -theorem ,Matroids, properties of matroids. Directed
graphs: Binary relations ; Directed graphs and connectedness ; Directed trees ; Aborecence ; Polish method ;
Tournaments , matching in bipartite graph Counting of labelled trees : Cayley's theorem ; Counting methods;
Polya theory
MODULE 4:
Matrix representations of graph: Incidence; matrices and their properties; Directed graphs; Binary relations;
Directed graphs and Application of graphs in computer science.

Text Books:
1.Narsing Deo: Graph Theory with Applications to Engineering and Computer Science, PHI(EEE)
2.Agnarsson:Graph Theory: Modeling, Applications and Algorithms, Pearson Education India
Reference Books:
1.Harry, F.: Graph Theory, Addison -Wesley Publ. Comp. 1972.
2.Douglas B. West : Graph Theory, PHI .
3.Tremley , J.P. and Manohar, R.P. : Discrete Mathematical Structures with Applications to computer science,
McGraw-Hill, 1975.

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PHD-45-002: COMPUTER NETWORKS
MODULE 1:
Network Layer :Logical IPV4 Address: Address space, Notations, Classful Addressing, Classless Addressing,
Network Address Translation (NAT), IPV6 Address: Structure, Address space.
Internet Protocol:Internetworking, IPV4 Datagram, IPV6 Packet Format, Transition from IPV4to IPV6: Dual
Stack, Tunnelling, Header Translation
MODULE 2:
Address Mapping, Error Reporting: Address Mapping: Logical to Physical Address: ARP, Physical to logical
Address: RARP, BOOTP, DHCP, ICMP, IGMP
Delivery, Forwarding and Routing: Direct Vs Indirect Delivery, forwarding: Forwarding Techniques, Process,
Routing Table. Uncast Routing Protocols: Distance Vector Routing, Link State Routing, Path Vector Routing,
Multicast Routing Protocols

MODULE 3:
Transport Layer: Process-to-Process Delivery: UDP, TCP and SCTP
Congestion Control and QoS: Data traffic, Congestion, Congestion Control, Quality of Service, Techniques to
improve QoS
Application Layer : Domain Name System, Remote Logging, FTP, SMTP

MODULE 4
Network Security: Cryptography Principles, Symmetric-Key Cryptography, Asymmetric-Key Cryptography,
Digital Signature, Firewalls

Textbooks:
1. Forouzan, Data communication and networking, TMGH
2. A.S. Tanenbaum, Computer Networks (4th ed.), Prentice-Hall of India
ReferencesBooks:
1. Stalling, Data and Computer Communication, PHI (EEE)
2. Stevens, UNIX Network Programming, PHI (EEE

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PHD-45-003: ADVANCED DATABASE SYSTEMS
MODULE 1:
Introduction to Relational Database Design :What is DBMS, advantage of using DBMS, data models
(object based logical models, record based logical models), DBMS users, overall system structure
Hierarchical and network data models and related data structures
Entity Relationship Models and Relational Database Design:ER diagrams, generalization, specialization,
aggregation. Database models -Network model, Hierarchical model, and Relational model. Relational
database design:Underlying concepts, structure, study of relational languages (relational algebra, SQL,
QBE). Integrity constraints (domain constraints, referential, assertions, triggers, functional
dependencies), Normalization (using FDs, multivalued dependencies, join dependencies), Domain -key
normal for
MODULE 2
Transactions :Concept, state, ACID properties, serializability and recoverability, testing for
serializability. Concurrency Control:Lock -based, protocols, timestamp based protocols, validation based
protocols, multi version schemes, deadlock handling
MODULE 3:
Query Processing:Storage and file structure, file organization:disk storage systems, blocking factor,
Access path: searching, indexing and hashing techniques, external sorting, transformation of relational
expressions, breaking of queries into sub queries to optimize execution plan,Select, Project and Join
Operations, set operations, aggregation Cost based query optimization. measurement of cost of a query
considering different access path, evaluation of expressions. Heuristic query optimizations: query tree query
graph and representation of queries in query tree, Steps for heuristic query optimization, semantic query
optimization.
MODULE 4
Recovery System:Log based recovery (deferred and immediate database modification), checkpoints,
shadow paging, recovery with concurrent with transactions, buffer managements in recovery, recovery from
loss of non -volatile storage, logical undo logging, transaction rollback, restart recovery, fuzzy checkpointing
MODULE 5:
Parallel Databases and Distributed Databases :Parallel database architecture, scale up and speedup using
parallel database architecture, Introductory concepts, partitioning techniques, interoperation parallelism
and intra operation parallelism -Parallel Sort algorithms (range partitioning sort, parallel external sort-
merge), Parallel Join Algorithms (partitioned join, fragment-and-replicate join, parallel hash join),
interoperation parallelism (pipelined, independent). Example of parallel databases
Distributed Databases : Replication and fragmentation, network transparency, join processing,
distributed transaction processing, two-phase and three-phase commit protocols, handling failure,
coordinator selection, concurrency control (locking, timestamping), deadlock handling (centralized, fully
distributed), multi-database systems.

Text Books/ References Books:


1. Elmasari and Navathe, Fundamentals Of Database System, Narosa Publishing Company, 1989.
2. J.D. Ullman, principles of Database Systems, Galgotia Publishing Private Limited.
3. Silberschats, Kroth and Sudershan, Principles of Database Systems, McGraw Hill Publication.
4. C.J. Date, An Introduction to Database Systems, Vol-I and Vol-II, Addison-Wesley Publishing Company

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PHD-45-004: ADVANCED DATA STRUCTURES
MODULE 1
Introduction to Algorithms:Role of Algorithms in computing, Analyzingalgorithm, Designing algorithm,
Asymptotic Notations, Summations, Formulas and properties, Recurrences.
SortingTechniques: Heapsort, Quicksort, Radix sort, Bucket sort, Analysis of sorting techniques
MODULE 2
Search Trees: Binary Search Trees, AVL Trees, Red-Black trees, B-Trees, Splay Trees.Heap Structures: Min/Max
heaps, Leftist Heaps, Binomial Heaps, Fibonacci Heaps

MODULE 3:
Multimedia Structures : Segment Trees, K-D Trees, Point Quad Trees, MX-Quad Trees, R-Trees, TV-Trees

MODULE 4:
Problem Solving Techniques :Branch & Bound, NP hard and NP complete problems, Huffman Coding,
Activity Networks, Flow Shop Scheduling, Randomized Algorithms, Greedy algorithms, Back tracking,Dynamic
Programming, Divide and Conquer

MODULE 5
Graph Algorithms:Graphic Representation, BFS, DFS, Topological Sort, Connected Components, Minimum
Spanning trees, Kruskal’s Algorithm, Prims Algorithm –Dijkstra’sAlgorithm –Floyd’s Algorithm, Bellman Ford
AlgorithmPattern Matching and Tries:Pattern matching algorithms-Brute force, the Boyer –Moore algorithm,
the Knuth-Morris-Pratt algorithm, Standard Tries,Compressed Tries, Suffix tries

TEXT BOOKS:
1. Data structures, Algorithms and Applications in C++, S.Sahni, University Press (India) Pvt.Ltd, 2nd
edition, Universities Press Orient Longman Pvt. Ltd.
2. Data structures and Algorithms in C++, Michael T.Goodrich, R.Tamassia and Mount, Wiley student
edition, John Wiley and Sons
REFERENCES:
1. Data structures and Algorithm Analysis in C++, Mark Allen Weiss, Pearson Education Ltd., Second
Edition.
2. Data structures and algorithms in C++, 3rd Edition, Adam Drozdek, Thomson
3. Data structures using C and C++, Langsam, Augenstein and Tanenbaum, PHI
4. Problem solving with C++, The OOP, Fourth edition,W.Savitch, Pearson Education

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PHD-45-005: DATA WAREHOUSING AND DATA MINING
Course Objective and Learning Outcomes: This course gives an introduction to methods and theory for the
development of data warehouses and data analysis using data mining. Data quality and methods and
techniques for pre-processing of data. Modelling and design of data warehouses. Algorithms for classification,
clustering, and association rule analysis. Practical use of software for data analysis.
MODULE 1
Introduction: Fundamentals of data mining, Data Mining Functionalities, Classification of Data Mining Systems,
Data Mining Task Primitives, Integration of a Data Mining System with a Database or a Data Warehouse
System, Major issues in Data Mining. Data Preprocessing: Need for Preprocessing; the Data, Data Cleaning,
Data Integration and Transformation, Data Reduction, Discretization, and Concept Hierarchy Generation.
MODULE 2
Data Warehouse and OLAP Technology for Data Mining: Data Warehouse, Multidimensional Data Model, Data
Warehouse Architecture, Data Warehouse Implementation, Further Development of Data Cube Technology,
From Data Warehousing to Data Mining Different types of Cubes and Data Generalization: Further
Development of Data Cube and OLAP Technology, Attribute-Oriented Induction.
MODULE 3
Mining Frequent Patterns, Associations, and Correlations: Basic Concepts, Efficient and Scalable Frequent
Itemset Mining Methods, Mining various kinds of Association Rules, From Association Mining to Correlation
Analysis, Constraint-Based Association Mining. Classification and Prediction: Issues Regarding Classification and
Prediction, Classification by Decision Tree Induction, Bayesian Classification, Rule-Based Classification,
Classification by Backpropagation, Support Vector Machines, Associative Classification, Lazy Learners, Other
Classification Methods, Prediction, Accuracy and Error measures, Evaluating the accuracy of a Classifier or a
Predictor, Ensemble Methods
MODULE 4
Cluster Analysis Introduction: Types of Data in Cluster Analysis, A Categorization of Major Clustering Methods,
Partitioning Methods, Hierarchical Methods, Density-Based Methods, GridBased Methods, Model-Based
Clustering Methods.
MODULE 5
Introduction to different applications of Data Mining: Time Series and Sequence Data Mining, Graph Mining,
Social Network Analysis, Spatial Data Mining, Multimedia Data Mining, Text Mining, Mining the World Wide
Web. Additional Themes on Data Mining and Social Impacts of Data Mining.

Suggested Reading:
1. Data Mining – Concepts and Techniques - Jiawei Han & Micheline Kamber, Morgan Kaufmann Publishers,
2nd Edition, 2006.
2. Introduction to Data Mining – Pang-Ning Tan, Michael Steinbach and Vipin Kumar, Pearson education.
3. Data Warehousing in the Real World – Sam Aanhory & Dennis Murray Pearson Edn Asia.
4. Data Warehousing Fundamentals – Paulraj Ponnaiah Wiley student Edition
5 Data Mining Introductory and advanced topics –Margaret H Dunham, Pearson education
6. Data Mining Techniques – Arun K Pujari, University Press.

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PhD-45-006: PRINCIPLES OF DATA SCIENCE
Unit 1:
Introduction to core concepts and technologies: Introduction of data science Terminologies, Types of Data,
Data Science Process, Data science toolkit, Data science classification,Data Science Algorithms, Components of
Data Science
Unit 2:
Data collection and Analysis: Sources of data, Data collection and APIs, Exploring and fixing data, Data storage
and management.Data analysis: Introduction, Terminology and concepts, Introduction to statistics, Central
tendencies and distributions, Variance, Distribution properties and arithmetic, Samples/CLT, Basic machine
learning algorithms, Linear regression, SVM, Naive Bayes,Recent trends in various data collection and analysis
techniques.
Unit 3:
DATA Visualization: Introduction, Types of Data visualization, Technologies for visualization, Various
visualization techniques, The Five Cs of Data Visualization.Data types, Data encodings, Retinal variables,
Mapping variables to encodings, Visual encodings.
Unit 4:
Data Analytics and Modeling : Data Science Methodology, Analytics for Data Science, Data Analytics Examples,
Data Analytics Life Cycle- Data Discovery, Data preparation, Model Planning, Model Building.
Unit 5:
Feature Selection and Forecasting: Introduction, Feature Selection: Classifying feature selection methods,
Anomaly Detection: Introduction, Distance and Density based outlier detection, Local Outlier Factor, Time
series Forecasting, Decomposition, Smoothing based methods, Regression based methods, Machine Learning
methods.
Unit 6:
Data Science Tools and Applications
Introduction to different Data Science Tools: SAS, APACHE FLINK ,BigML, , Tableau, Matplotlib, TensorFlow,
Weka etc. Applications: Knowledge on Data Science application development methods, Collecting and
Analyzing Twitter Data, YouTube Data.
Text Books:
1. Sanjeev J. Wagh, Manisha S. Bhende, Anuradha D. Thakare, Fundamentals of Data Science,
1st Edition, 2022
2. Daimi, Kevin, Ed. Hamid R. Arabnia, Principles of Data Science, Springer, 2020.
3. Vijay Kotu, Bala Deshpande, Data Science: Concepts and Practices, Morgan Kaufmann
Publishers, Second edition, 2019
4. D J Patil, Hilary Mason, Mike Loukides, Ethics and Data Science, O’ Reilly, 1st edition, 2018
5. Sinan Ozdemir, Principles of Data Science, Packt Publishing, December 2016

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PHD-45-007: EMBEDDED COMPUTING
MODULE-1
Introduction to embedded systems: Embedded systems, Processor embedded into a system, Embedded
hardware units and device in a system, Embedded software in a system, Examples of embedded systems,
Design process in embedded system, Formalization of system design, Design process and design examples,
Classification of embedded systems, skills required for an embedded system designer.
MODULE-2
Devices and communication buses for devices network: IO types and example, Serial communication devices,
Parallel device ports, Sophisticated interfacing features in device ports, Wireless devices, Timer and counting
devices, Watchdog timer, Real time clock, Networked embedded systems, Serial bus communication protocols,
Parallel bus device protocols-parallel communication internet using ISA, PCI, PCI-X and advanced buses,
Internet enabled systems network protocols, Wireless and mobile system protocols
MODULE-3
Device drivers and interrupts and service mechanism: Programming-I/O busy-wait approach without
interrupt service mechanism, ISR concept, Interrupt sources, Interrupt servicing (Handling) Mechanism,
Multiple interrupts, Context and the periods for context switching, interrupt latency and deadline,
Classification of processors interrupt service mechanism from Context-saving angle, Direct memory access,
Device driver programming.
MODULE-4
Inter process communication and synchronization of processes, Threads and tasks: Multiple process in an
application, Multiple threads in an application, Tasks, Task states, Task and Data, Clear-cut distinction between
functions. ISRS and tasks by their characteristics, concept and semaphores, Shared data, Inter-process
communication, Signal function, Semaphore functions, Message Queue functions, Mailbox functions, Pipe
functions, Socket functions, RPC functions.
MODULE-5
Real-time operating systems: OS Services, Process management, Timer functions, Event functions, Memory
management, Device, file and IO subsystems management, Interrupt routines in RTOS environment and
handling of interrupt source calls, Real-time operating systems, Basic design using an RTOS, RTOS task
scheduling models, interrupt latency and response of the tasks as performance metrics, OS security issues.
Introduction to embedded software development process and tools, Host and target machines, Linking and
location software.

Textbook/Reference Books
Textbook(s): 1 Embedded Systems: Architecture, Programming, and Design Raj Kamal Tata McGraw hill, 2nd
edition 2013

Reference Book(s):
1 Computer as Components, Principles of Embedded Computing System Design Marilyn Wolf Elsevier, 3rd
edition 2014

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PhD-45-008: MOBILE COMPUTING

MODULE-1
Introduction: Cellular networks, wireless LANs, application adaptation.
Cellular Overview : Cellular concepts, location management, handoffs.

MODULE-2
Wireless LAN overview : MAC issues, mobile IP, ad hoc networks, TCP issues. Applications overview : wireless
applications, disconnected operations, data broadcasting, mobile agents.
MODULE-3
GSM: Air-interface, channel structure, timing, architecture.
WAP: Architecture, protocol stack, application environment.
TCP: Asymmetric links, wireless errors, handoffs; i-tcp, snoop, link rxmit, m-tcp. Ad hoc networks: MAC,
routing, transport.

MODULE-4
Routing: Virtual backbone, Kelpi, mobile-IP.
Data broadcasting: Push-pull, consistency.
Location management: HLR-VLR, hierarchical.
Access Technologies: Blue Tooth, GPRS, IEEE 802.11, CDMA. QoS in Wireless

Text Book:
1. Mobile Communications by Jochen Schiller, 2nd Edition, Pearson Education Limited
Reference Book:
1. T. S. Rappaport: Wireless Communications: Principles and Practice, 2nd Edition, PHI
2. Stefano Basagni, Marco Conti, Silvia Giordano, Ivan Stojmenovic: Mobile Ad Hoc Networking: The
Cutting Edge Directions, Wiley-IEEE Press; 2 edition (March 4, 2013)

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PhD-45-009: IMAGE PROCESSING

MODULE-1
Introduction: Digital Image representation; Fundamental steps in Image processing, Elements of digital Image
processing systems.

MODULE-2
Image Enhancement: Enhancement by point processing, spatial filtering, Frequency domain enhancement,
Color image processing.

MODULE-3
Image Restoration: Unconstrained and constraint restoring, inverse filtering, Wiener Filter, Geometric
transforms.
MODULE-4
Image Compression: Image Compression models, Error-free compression, Lossy compression, Image
compression standards.
Image Segmentation: Detection of discontinuities, edge linking, Thresholding.
MODULE-5
Representations and Descriptions: Chain codes, shape numbers, moments and Fourier and other descriptors.
Recognition & Interpretations;

Text Book:
1. R.C. Gonzalez & R./E. Woods, Digital Image Processing : Addison - Wesley Pub. comp.
Books/References:
1. Ralph Gonzalez, Richard Woods, Steven Eddins, Digital Image Processing Using MATLAB, McGraw Hill
Education (India) Private Limited; 2 edition (8 June 2010)

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PHD-45-010: NATURAL LANGUAGE PROCESSING
MODULE-1
Introduction to NLP:Definition, issues and strategies, application domain, tools for NLP, Linguistic organisation
of NLP, NLP vs PLP. Word Classes:Review of Regular Expressions, CFG and different parsing techniques
Morphology: Inflectional, derivational, parsing and parsing with FST, Combinational Rules Phonology: Speech
sounds, phonetic transcription, phoneme and phonological rules, optimality theory, machine learning of
phonological rules, phonological aspects of prosody and speech synthesis. Pronunciation.
MODULE-2
Spelling and N-grams: Spelling errors, detection and elimination using probabilistic models,
pronunciation variation (lexical, allophonic, dialect), decision tree model, counting words in Corpora,simple N-
grams, smoothing (Add One, Written-Bell, Good-Turing), N-grams for spelling and pronunciation.
MODULE-3
Syntax:POS Tagging: Tagsets, concept of HMM tagger, rule based and stochastic POST, algorithm for HMM
tagging, transformation based tagging Sentence level construction & unification: Noun phrase, co-ordination,
sub-categorization, concept of feature structure and unification.
MODULE-4
Semantics:Representing Meaning: Unambiguous representation, canonical form, expressiveness, meaning
structure of language, basics of FOPC Semantic Analysis: Syntax driven, attachment &integration, robustness
Lexical Semantics: Lexemes (homonymy, polysemy, synonymy, hyponymy),WordNet, internal structure of
words, metaphor and metonymy and their computational approaches Word Sense Disambiguation: Selectional
restriction based, machine learning based and dictionary based approaches.
MODULE-5
Pragmatics: Discourse: Reference resolution and phenomena, syntactic and semantic constraints on
Coreference, pronoun resolution algorithm, text coherence, discourse structure. Dialogues: Turns and
utterances, grounding, dialogue acts and structures. Natural Language Generation: Introduction to language
generation, architecture, dicourse planning (text schemata, rhetorical relations).

Text Books:
1. Speech and Language Processing:An introduction to Language processing, Computational
Linguistics, and Speech Recognition- D. Jurafsky & J. H. Martin(Second Edition), Prentice
Hall(2008).
2. Foundation of Statistical Natural Language Processing(Kindle edition)- Christopher D.
Manning, Hinrich Schutze, The MIT Press(1999).
3. Machine Translation-Pushpak Bhattacharyya, Chapman and Hall/CRC publication(2015).
Reference Books:
1. Natural Language Understanding(Second Edition) – James Allen, Pearson(1994).
2. Natural Language Processing:A Pananian Perspective(Eastern Economy Edition)- Bharathi,
A. Vineet Chaitanya and Rajeev Sangal Prentice Hll India.
3. Statistical Language Learning- Eugene Cherniak MIT Press

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PhD-45-011: MOBILE AD-HOC NETWORKS
MODULE-1
Introduction to Adhoc networks: definition, characteristics features, Application, Characteristics
of Wireless channel, Adhoc Mobility Models: Indoor and outdoor models, WLAN, Bluetooth,
Short range ADHOC networks- Body area network, Wireless Personal area network.
MAC protocols: design issues, goals and classification. Contention based protocols -with
reservation, scheduling algorithms, protocols using direction antennas. IEEE standards: 802.11a,
802.11b, 802.11g, 802.15. HIPERLAN.
MODULE-2
Network Protocols:
Routing protocols: Decentralized Routing Algorithm, Global routing algorithm, Proactive vs.
reactive routing, uncast routing algorithms, Multicast routing hierarchical routing, Link state routing, distance
vector routing, QoS aware routing, Routing and mobile management in
mobile wireless network
MODULE-3
End-End Delivery and Security:
Transports layer: Issues in desiging- transport layer classification, adhoc transport protocols.
Security issues in adhoc network: issues and challenges, network security attacks, secure
routing protocols.
MODULE-4
Cross Layer Design And Integration Of Adhoc For 4G:
Cross layer design: need for cross layer design, cross layer optimization, parameter optimizations, techniques,
cross layer cautionary perspective. Integration of adhoc with mobile IP networks. Mesh networks, vehicular
area networks.

Books:
1. C K Toh, "Ad-hoc mobile wireless network - protocols and systems", prentice hall.
2. Siva Ram Murthy, "Ad-hoc wireless networks - architecture and protocols", Addison-Wesley.
3. Stefano Basagni, Marco Conti, Silvia Giordano, Ivan Stojmenovic , "Mobile Ad Hoc Networking", Wiley-
Interscience.
4. Edgar H. Callaway, "Wireless sensor networks: architecture and protocols", Auerbach publications.
5. Azzedine Boukerche, "Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks", Wiley.
6. Yi Pan, Yang Xiao,"Ad Hoc and Sensor Networks", Nova Science Publishers.
7. Hai Liu, Xiaowen Chu, Yiu-Wing Leung, "Ad Hoc and Sensor Wireless Networks:Architectures, Algorithms and
Protocols", Bentham Science.
8. Pedro Cuenca, Carlos Guerrero, Ramon Puigjaner, Bartomeu Serra, "Advances in AdHoc Networking",
Springer
9. Jonathan Loo, Jaime Lloret Mauri, Jesus Hamilton Ortiz, "Mobile Ad Hoc Networks: Current Status and Future
Trends ", CRC Pres.
10. Aggelou, "Mobile Ad Hoc Networks", Tata McGraw-Hill Education

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PHD-45-012: ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING
COURSE OUTCOME:
 Demonstrate fundamental understanding of the history of artificial intelligence (AI) and its
foundations.
 Apply basic principles of AI in solutions that require problem solving, inference,perception, knowledge
representation, and learning.
 Demonstrate awareness and a fundamental understanding of various applications of AI techniques in
intelligent agents, expert systems, artificial neural networks and other machine learning models.
 Demonstrate profciency developing applications in an 'AI language', expert system shell, or data
mining tool.
 Demonstrate profciency in applying scientifc method to models of machine learning.
 Demonstrate an ability to share in discussions of AI, its current scope and limitations, and societal
implications

MODULE 1
Introduction: Introduction to AI applications and AI techniques, Production systems, control
strategies,reasoning - forward and backward chaining. Intelligent Agents: Definitions of a rational agent, reflex,
modelbased, goal-based, and utility-based agents, the environment in which a particular agent operates.
MODULE 2
Searching Techniques and Game Playing: Breadth first search, depth first search, iterative deepening, uniform
cost search, hill climbing, simulated annealing, genetic algorithm search, heuristic search, Best first search, A*
algorithm, AO* algorithm, Minimax and game trees, refining minimax, Alpha - Beta pruning, constraint
satisfaction.
MODULE 3
Knowledge Representation: First order predicate calculus, resolution, unification, natural deduction system,
refutation, logic programming, PROLOG, semantic networks, frame system, value inheritance, conceptual
dependency, Ontologies. Planning: basic representation for planning, symbolic-centralized vs.
reactivedistributed, partial order planning algorithm.
MODULE 4
Machine learning: Introduction to different types of learning, Supervised and Unsupervised learning —
Reinforcement learning- Basics of Neural network models.
MODULE 5
Applications of Artificial Intelligence: Natural Language Processing, Speech recognition, Computer
vision,Expert systems.

Suggested Reading
1. S. Russell and P. Norvig, Artificial Intelligence: A Modern Approach (3rd ed.), Pearson Education, 2010.
2. Elaine Rich and Kelvin Knight, Artificial Intelligence, Tata McGraw Hill, 2002.
3. Nils J Nilson, Artificial Intelligence: A New Synthesis, Morgan Kaufmann Publishers, Inc.,San Francisco,
California, 2000.

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PhD-45-013: DATA COMMUNICATION & COMPUTER NETWORKS
MODULE-1
Overview: Objectives and Applications of Computer Communication.
Computer Communication Network Architecture: ISO-OSI reference model, design philosophy, layer,
protocol, interface, and service concepts. Layer-wise functionality.
Physical Layer : Concepts of data transmission, modulation and multiplexing methods, modem, encoding
methods, communication media, standard protocols, RS-232C, RS-449, X.21.
MODULE-2
Medium Assess Control in broadcast networks: ALOHA, CSMA, CSMA/CD, token ring, token bus, Standard LAN
Protocols (IEEE 802.X), FDDI, satellite networks.
Data link layer: Framing, error control techniques, datalink protocols and their performance, SDLC protocol.
Network layer: Routing, Congestion and deadlock control Algorithms, Internetworking issues and devices,
gateways, bridges and routers, IP & X.25 protocols.
MODULE-3
Review of Computer Network Architecture and the Subnet layers.
Data Transport: Connection management, Quality of Service, TCP/IP Protocol, ATM.
Session Management: Session establishment and maintenance, Dialogue management, Recovery.
MODULE-4
End-to-end Data: Presentation formatting issues and methods: XDR, ASN.1, NDR; Data Compression, Lossless
Compression Algorithms- Run length encoding, DPCM, Dictionarybased methods, Image compression- JPEG,
Video compression- MPEG; Security and authentication techniques, Encryption algorithms.
MODULE-5
Applications: E-mail, Remote login, File transfer, Network file system, Network management. UNIX network
programming with TCP/IP; Network File System, Novell Netware, and Windows NT installation, configuration
and use.

Text Book:
Books/References:
1. Stalling W.: Data and Computer Communication, Pearson; Nineth edition (2013)
2. Behrouz A Forouzan, DeAnza CollegeFirouz Mosharraf: Computer Networks: A Top-Down Approach,
McGraw Hill Education (India) Private Limited (11 November 2011)
1. Tanenbaum A.S., Computer Network, Pearson; Fifth edition (9 January 2010)
2. William J Beyda: Data Communications: From Basics to Broadband, Pearson Education; Fourth edition (1
January 2012)
3. Tanenbaum A.S., David J. Wetherall : Computer Network, Pearson; Pearson; 5 edition (17 January 2012)
4. Stalling W.: Data and Computer Communication, Pearson; Nineth edition (2013)
5. Peterson L L, Davie B S, Computer Networks: A Systems Approach, Morgan Kaufmann Publishers In; 5th
Revised edition edition (20 April 2011)
6. Stevens, UNIX Network Programming, Pearson Education; 1ST edition (2003) 5. Comer D E.,
Internetworking With TCP/IP Principles, Protocols, And Architecture, PHI (2013)

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PhD-45-014: CRYPTOGRAPHY & NETWORK SECURITY
MODULE-1
Introduction of Information Security: Cryptography, Conventional Encryption, Traditional technique:
Substitution cipher, Transmission cipher, Stream Cipher, Block Cipher, Roaster Machine.
MODULE-2
Symmetric Techniques: Modern Symmetric Techniques, Mathematics of symmetric key cryptography,
Cryptanalysis of classical ciphers, General Attacks, Secret and Private Key Cryptography, DES, Modes of
operation of DES, Automatic Variable Key, Proof of DES, Merits and Demerits of DES, Quantification of
Performance, TDES, Advanced Encryption Standard/AES, Comparison of Secret Key Systems, Modes of
operation of AES Limitations of AES, Limitation of Secret or Private Key Crypto systems. Asymmetric key
cryptography: Mathematics of Asymmetric key cryptography, Public Key Cryptography RSA Algorithm,
Limitations of RSA Algorithm, Comparison of RSA and TRAP DOOR Public Key Crypto systems, Rabin
Cryptosystem, ElGamal Cryptosystem, Elliptic Curve Cryptosystems.
MODULE-3
Key management: Key Transport Protocols, Needham Schroeder Protocol, Key Agreement Protocol, Diffie -
Hellman Protocol, Station to Station Protocol, Merkless Puzzle Technique of key agreement, Public Key
Distribution, Message integrity and message authentication, Cryptography hash function, Digital Signature,
Entity Authentication.
MODULE-4
Encryption: Cryptanalysis on Stream Cipher, Modern Stream Ciphers, Shamir's secret sharing and BE,
Identity-based Encryption (IBE), Attribute-based Encryption (ABE), Side-channel attack, Introduction to
Quantum Cryptography, Blockchain, Bitcoin and Cryptocurrency.
MODULE-5
Networks security: Application Layer: PGP and S/MIME, Transport Layer: SSL and TLS, Network Layer: IPSec.

Text Books/Reference Book:


1. AtulKahate, —Cryptography and Network Security, Tata McGraw-Hill Education, 07-2008.
2. Behrouz A. Forouzan & D. Mukhopadhyay - Cryptography and Network Security, Tata McGraw-Hill
Education, 3E, 2015
3. William Stallings - Cryptography and Network Security, Principle and Practice, Pearson Education India, 5E,
2011
4. Michael Erschloe, —Information Warfare: How to Survive Cyber AttacksW, Osborne/McGraw-Hill, 2001.
5. Brian Hatch, James Lee and George Kurtz, —Hacking Exposed : Linux: Linux Security Secrets and Solutions
W, Osborne McGraw-Hill, 1983.
6. Kenneth R. Van Wyk, RichardForno, —Incident ResponseW, O'Reilly, 2001.
7. Kevin Mandia, Chris Prosise, —Incident Response: Investigating Computer CrimeW,Osborne/McGraw-Hill,
2001.
8. Mike Schiffman, —Hacker's ChallengeW, McGraw Hill Professional, 2002.
9. Julia Allen, —The CERT Guide to System and Network Security PracticesW Addison-Wesley,2001.
10. Richard E. Smith —Authentication: From Passwords to Public KeysW, Addison-Wesley, 2002.
11. StuartMcClure, Saumil Shah, ShreerajShah ,—Web Hacking: Attacks and DefenseW,Addison-Wesley
Professional, 2003 .
12. Mike Shema, Bradley C. Johnson, Keith J. Jones, —Anti Hacker Tool Kit: Key Security Tools and
Configuration TechniquesW, San Val, Incorporated, 2002.

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PHD-45-015: INFORMATION AND NETWORK SECURITY
MODULE-1
Classical Encryption Techniques :Symmetric Cipher Model, Cryptography, Cryptanalysis and BruteForce Attack,
Substitution Techniques, Caesar Cipher, Mono-alphabetic Cipher, Playfair Cipher, Hill Cipher, Poly alphabetic Cipher, One
Time Pad. Block Ciphers and the data encryption standard: Traditional block Cipher structure, stream Ciphers and block
Ciphers, Motivation for the Feistel Cipher structure, the Feistel Cipher, The data encryption standard, DES encryption, DES
decryption, A DES example, results, the avalanche effect, the strength of DES, the use of 56-Bit Keys, the nature of the DES
algorithm, timing attacks, Block cipher design principles, number of rounds, design of function F, key schedule algorithm
MODULE-2
Public-Key Cryptography and RSA: Principles of public-key cryptosystems. Public-key cryptosystems. Applications for
public-key cryptosystems, requirements for public-key cryptosystems. Public-key cryptanalysis. The RSA algorithm,
description of the algorithm, computational aspects, the security of RSA. Other Public-Key Cryptosystems:Diffie-Hellman
key exchange, The algorithm, key exchange protocols, man in the middle attack, Elgamal Cryptographic systems, Elliptic
curve arithmetic, abelian groups, elliptic curves over real numbers, elliptic curves over Zp, elliptic curves overGF(2m),
Elliptic curve cryptography, Analog of Diffie-Hellman key exchange, Elliptic curve encryption/ decryption, security of Elliptic
curve cryptography, Pseudorandom number generation based on an asymmetric cipher, PRNG based on RSA.
MODULE-3
Key Management and Distribution: Symmetric key distribution using Symmetric encryption, A key distribution scenario,
Hierarchical key control, session key lifetime, a transparent key control scheme, Decentralized key control, controlling key
usage, Symmetric key distribution using asymmetric encryption, simple secret key distribution, secret key distribution with
confidentiality and authentication, A hybrid scheme, distribution of public keys, public announcement of public keys,
publicly available directory, public key authority, public keys certificates, X-509 certificates. Certificates, X-509 version 3,
public key infrastructure. User Authentication: Remote user Authentication principles, Mutual Authentication, one way
Authentication, remote user Authentication using Symmetric encryption, Mutual Authentication, one way Authentication,
Kerberos, Motivation , Kerberos version 4, Kerberos version 5, Remote user Authentication using Asymmetric encryption,
Mutual Authentication, one way Authentication, federated identity management, identity management, identity
federation, personal identity verification.
MODULE-4
Wireless network security: Wireless security, Wireless network threats, Wireless network measures, mobile device
security, security threats, mobile device security strategy, IEEE 802.11 Wireless LAN overview, the Wi-Fi alliance, IEEE 802
protocol architecture. Security, IEEE 802.11i services, IEEE 802.11i phases of operation, discovery phase, Authentication
phase, key management phase, protected data transfer phase, the IEEE 802.11i pseudorandom function. Web Security
Considerations: Web Security Threats, Web Traffic Security Approaches. Secure Sockets Layer: SSL Architecture, SSL
Record Protocol, Change Cipher Spec Protocol, Alert Protocol, and shake Protocol, Cryptographic Computations. Transport
Layer Security: Version Number, Message Authentication Code, Pseudorandom Functions, Alert Codes, Cipher Suites,
Client Certificate Types, Certificate Verify and Finished Messages, Cryptographic Computations, and Padding. HTTPS
Connection Initiation, Connection Closure. Secure Shell(SSH) Transport Layer Protocol, User Authentication Protocol,
Connection Protocol.
MODULE-5
Electronic Mail Security: Pretty good privacy, notation, operational; description, S/MIME, RFC5322, Multipurpose internet
mail extensions, S/MIME functionality, S/MIME messages, S/MIME certificate processing, enhanced security services,
Domain keys identified mail, internet mail architecture, E-Mail threats, DKIM strategy, DKIM functional flow. IP Security: IP
Security overview, applications of IPsec, benefits of IPsec, Routing applications, IPsec documents, IPsec services, transport
and tunnel modes, IP Security policy, Security associations, Security associations database, Security policy database, IP
traffic processing, Encapsulating Security payload, ESP format, encryption and authentication algorithms, Padding, Anti
replay service, transport and tunnel modes, combining security associations, authentication plus confidentiality, basic
combinations of security associations, internet key exchange, key determinations protocol, header and payload formats,
cryptographic suits.
Textbook/Reference Books: Textbook(s):
1. Cryptography and Network Security William Stallings Pearson, 6th edition 2013
nd
2. Cryptography and Information Security V K Pachghare PHI, 2 edition 2015

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PHD-45-016: ADVANCED CRYPTOGRAPHY
MODULE-1
Number Theory: Introduction to number theory, Overview of modular arithmetic, discrete logarithms, and
primality/factoring, Euclid’s algorithm, Finite fields, Prime numbers, Fermat’s and Euler’s theorem Testing for
primality.
MODULE-2
Symmetric & Asymmetric Cryptography: Classical encryption techniques, Block cipher design principles and
modes of operation, Data encryption standard, Evaluation criteria for AES, AES cipher, Principles of public key
cryptosystems, The RSA algorithm, Key management – Diffie Hellman Key exchange, Elliptic curve arithmetic-
Elliptic curve cryptography
MODULE-3
Authentication functions: MAC ,Hash function, Security of hash function and MAC,MD5 ,SHA ,HMAC, CMAC ,
Digital signature and authentication protocols , DSS ,EI Gamal –Schnorr.
MODULE-4
Authentication applications: Kerberos & X.509 Authentication services Internet Firewalls for Trusted System:
Roles of Firewalls , Firewall related terminology-,Types of Firewalls ,Firewall designs, Intrusion detection
system , Virus and related threats, Countermeasures , Firewalls design principles ,Trusted systems, Practical
implementation of cryptography and security.
MODULE-5
Quantum Cryptography and Quantum Teleportation: Heisenberg uncertainty principle, polarization states of
photons, quantum cryptography using polarized photons, local vs. non local interactions, entanglements, EPR
paradox, Bell’s theorem, Bell basis, teleportation of a single qubit theory and experiments
Textbook/Reference Books
1 Cryptography and Network Security Principles And Practice William Stallings Pearson Education, Fourth
Edition 2005 2 A Course in Number Theory and Cryptology Neal Koblitz Springer 1987

Reference Book(s):
1. Cryptography and Network Security Behrouz A Forouzan, DebdeepMukhop adhyay Mc-GrawHill,
3rd Edition 2015
2. Applied Cryptography and Network Security Damien Vergnaud and Michel Abdalla 7th
International, Conference, ACNS 2009, Paris, France, June 2-5, 2009, Proceedings 2009

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PHD-45-017: INFORMATION RETRIEVAL
MODULE-1
Introduction: Motivation, Basic concepts, Past, present, and future, The retrieval process. Modeling:
Introduction, A taxonomy of information retrieval models,Retrieval:Adhoc and filtering, A formal
characterization of IR models, Classic information retrieval, Alternative set theoretic models, Alternative
algebraic models, Alternative probabilistic models, Structured text retrieval models, Models for browsing.
MODULE-2
Retrieval Evaluation: Introduction, Retrieval performance evaluation, Reference collections. Query Languages:
Introduction, keyword-based querying, Pattern matching, Structural queries, Query protocols. Query
Operations: Introduction, User relevance feedback, Automatic local analysis, Automatic global analysis.
MODULE-3
Text and Multimedia Languages and Properties: Introduction, Metadata, Text, Markup languages,
Multimedia. Text Operations: Introduction, Document preprocessing, Document clustering, Text compression,
Comparing text compression techniques.
MODULE-4
User Interfaces and Visualization: Introduction, Human-Computer interaction, The information access
process, Starting pints, Query specification, Context, Using relevance judgments, Interface support for the
search process. Searching the Web: Introduction, Challenges, Characterizing the web, Search engines,
Browsing, Meta searchers, Finding the needle in the haystack, Searching using hyperlinks.
MODULE-5
Indexing and Searching: Introduction; Inverted Files; Other indices for text; Boolean queries; Sequential
searching; Pattern matching; Structural queries; Compression. Parallel and Distributed IR: Introduction,
Parallel IR, Distributed IR

Textbook/Reference Books
Textbook(s):
1. Modern Information Retrieval, Ricardo BaezaYates, BerthierRibeiroN eto Pearson 1999
Reference Book(s):
1. Information Retrieval Algorithms and Heuristics David A. Grossman, OphirFrieder Springer, 2nd Edition 2004

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PHD-45-018: NEURAL NETWORK
MODULE-1
General characteristics of the human brain, Introduction to Biological Neural Networks, Nerve structure and
synapse, Basic concepts of Neural Networks, Characteristics of Neural Networks, Terminologies, Applications
of the artificial neural networks.
MODULE-2
Structure of a neural net (topology), Directed graphs, Models of Neuron, Neural Network Architectures,
Artificial Neuron, Activation functions, Threshold function, Piecewise linear function, Sigmoidal function,
Supervised learning, Unsupervised learning, Re-inforcement learning.
MODULE-3
Knowledge Representation, Artificial Intelligence, Learning rules, Error correction learning,Memory based
learning, Hebbian learning, Competitive learning, Boltzmann learning, Single layer perceptron, Multilayer
perceptron, Back propagation, Recurrent networks, Network Pruning
MODULE-4
Adaptive networks, Supervised Learning Neural Networks, Decision-based neural networks, Hierarchical neural
networks, Probabilistic neural network, Radial basis function networks, Comparison of RBF Networks and
Multilayer perceptron.
.
MODULE-5
Adaptive networks, Supervised Learning Neural Networks, Decision-based neural networks, Hierarchical neural
networks, Probabilistic neural network, Radial basis function networks, Comparison of RBF Networks and
Multilayer perceptron.

Text Books:
1. S. Haykin, “Neural Networks a comprehensive Foundation” second edition, Prentice-Hall India.
2. Laurene Fausett, “Fundamentals of Neural Networks, Architecture, Algorithms, and Applications”, Prentice
Hall, 1993.
3. Michael A Arbib, “The Handbook of Brain Theory and Neural Networks”, Second Edition, MIT Press
Reference Books:
1. Jacek M. Zurada, Introduction to artificial neural systems, Jaico Publ. House, 1994.
2. Anderson, ―An introduction to ArtiPicial Neural Networks‖, Prentice Hall
3. B. Yegnanarayana, ―ArtiPicial Neural Networks‖, PHI

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PHD-45-019: HUMAN COMPUTER INTERACTION

MODULE-1
Introduction: Importance of user Interface –Characteristics of graphical and web user interfaces, importance
of good design. Benefits of good design, Principles of good Screen design.

MODULE-2
System menus and navigation schemes, kinds of windows, device based controls, screen based controls, test
and messages.
MODULE-3
Feedback, guidance and assistance, Internationalization and Accessibility, graphics, icons and images, colors,
layout windows and pages.
MODULE-4
Interaction design - introduction, goals, usability. Conceptualizing interaction problem space, conceptual
models, interface metaphors, interaction paradigms, cognition, conceptual framework for cognition,
collaboration, communication, social mechanisms conceptual frame work
MODULE-5
Affective aspects, Expressive interface, user frustration agents process of interaction design, activities,
characteristics, practical issues, life cycle models, design , prototyping and conceptual design, physical design,
evaluation, framework, testing modeling users-kinds of tests, doing user testing, experiments, predictive
model.

Text Books:
1. The essential guide to user interface design, Wilbert O Galitz, Wiley DreamTech.Designing the user
interface. 3rd Edition Ben Sheidermann, Pearson Education Asia.
2. Preece, Rogers, Sharp, “interaction design”, John Wiley 2002
3. Human – Computer Interaction. Alan Dix, Janet Fincay, Gre Goryd, Abowd, Russell Bealg, Pearson
Education
Reference Books:
1. Sheiderman B Desiging the user interface, “Strategies for Effective Human Computer Interaction” , 2nd ed.
Addison Wesley , 1992 Pub.
2. Sudifte AG , “Human Computer Interface Design” , 2nd ed, Macmillan ,1995

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati
GOVERNMENT OF ASSAM
DEPARTMENT OF COMPUTER APPLICATIONS
ASSAM ENGINEERING COLLEGE
GUWAHATI-13
Annexure-II
PHD-45-020: FUZZY SYSTEMS

MODULE-1
Introduction, Basic Types, Basic Concepts, Representations of Fuzzy Sets, Extension Principle for Fuzzy Sets,
Types of Operations. Fuzzy Complements, Fuzzy Intersections: t- Norms. Fuzzy Unions: t-Conorms,
Combinations of Operations. Aggregation Operations. Arithmetic: Fuzzy Numbers, inguistic Variables,
Arithmetic Operations on Intervals, Arithmetic Operations on Fuzzy Numbers, Fuzzy Equations.
MODULE-2
Crisp versus Fuzzy Relations, Projections and Cylindric Extensions, Binary Fuzzy Relations, Binary Relations on a
Single Set. Fuzzy Equivalence Relations, Fuzzy Compatibility Relations. Fuzzy Ordering Relations, Fuzzy
Morphisms, Sup-i Compositions of Fuzzy Relations, Compositions of Fuzzy Relations.
MODULE-3
Fuzzy Measures, Fuzzy Sets and Possibility Theory, Classical Logic: An Overview. Multivalued Logics. Fuzzy
Propositions. Fuzzy Quantifiers. Linguistic Hedges. Inference from Conditional Fuzzy Propositions. Inference
from Conditional and Qualified Propositions. Inference from Quantified Propositions, Information and
Uncertainty, Nonspecificity of Fuzzy Sets. Fuzziness of Fuzzy Sets. Principles of Uncertainty.
MODULE-4
Fuzzy Expert Systems: An Overview. Fuzzy Implications. Selection of Fuzzy Implications. Multiconditional
Approximate Reasoning. The Role of Fuzzy Relation Equations, Fuzzy Controllers:
Overview, Fuzzy Neural Networks. Fuzzy Automata. Fuzzy Dynamic Systems.
MODULE-5
Fuzzy Databases. Fuzzy Information Retrieval, Individual Decision Making, Multiperson Decision Making,
Multicriteria Decision Making, Multistage Decision Making, Fuzzy Systems and Genetic Algorithms.

Text Books:
1. George J. Klir, Bo Yuan, "Fuzzy Sets and Fuzzy Logic", PHI
Reference Books:
1. Witold Pedrvcz and Femando Gomide. "An Introduction to Fuzzy Sets", PHI

Dr. Maushumi Barooah Dr. Subhrajyoti Bordoloi Dr. Jyoti Prokash Goswami Dr. Amrita Bose Paul
Member,DRC Member,DRC Member,DRC Member,DRC

Head of the Department,


Department of Computer Applications,
Assam Engineering College, Guwahati

You might also like