ME Computer Engineering Syllabus
ME Computer Engineering Syllabus
Subject
Teaching
Scheme
Hrs/Week
Lect. Pract
Examination Scheme
SEM
Tw Oral/P Marks
resenta
tion
Paper
In
Semest
er
Assess
ment
Credits
End
Semest
er
Assess
ment
510101
Applied Algorithms
04
50
50
100
510102
04
50
50
100
510103
50
50
100
510104
Research Methodology
04
50
50
100
510105
Elective I
05
50
50#
100
510106
Laboratory Practice-I
04
50
50
100
Total
21
04
250
50
50
600
25
Subject
Code
Subject
250
Teaching
Scheme
Hrs/Week
Lect. Pract
Examination Scheme
Paper
In
Semes
ter
Assess
ment
SEM II
04
50
04
50
Credits
Oral/Pre
Tw sentation Marks
End
Semes
ter
Assess
ment
50
50
100
100
4
4
04
510110 Elective II
05
510112 Seminar-I
Total
Subject
Code
17
Subject
04
04
08
50
50
50#
Paper
04
610103 Elective-III
05
610104 Seminar II
04
08
17
08
150
Total
Subject
Code
Subject
200
100
100
50
100
50
100
100
600
50
50
50
50
50#
Teaching
Scheme
Hrs/Week
5
4
4
25
Credits
Oral/Pre
Tw sentation Marks
150
100
100
100
50
50
100
50
50
100
100
100
500
Examination Scheme
Paper
In
Semes
ter
Assess
ment
End
Semes
ter
Assess
ment
Lect. Pract
100
Examination Scheme
In
Semes
ter
Assess
ment
SEM III
04
50
50
200
50
Teaching
Scheme
Hrs/Week
Lect. Pract
610101
50
End
Semes
ter
Assess
ment
Oral/Pre
Tw sentation Marks
4
4
4
5
8
25
Credits
SEM IV
610106 Seminar III
05
50
50
100
20
150
50
200
25
200
100
300
Total
5
20
25
#: Ref. Rule R-1.3 for Examination Rules of Rules and Regulations for M.E. Programs
under faculty of Engineering effective from June 2013.
Electives:
510105A
510105B
510105C
510105D
610103A
610103B
610103C
610103D
Elective I
Intelligent Systems
IR and Web Mining
Machine Learning and Translation
Open Elective /Real Time Systems
510110A
510110B
510110C
510110D
Elective II
Business Intelligence and Data Mining
Usability Engineering
Advanced Complier Design
Open Elective/ Embedded System Design
Elective III
Non Credit Courses
Semester -I Cyber Security
Network Security
Semester-II Information and Cyber Warfare
Cloud Computing
Computer
Vision
and
PatternSemester-III Bio-Metrics and Cyber Security
Recognition
Semester -IV Cyber
Open Elective/ Soft Computing
Forensics
and
Information
Security
The dissertation must result into the publication of at least two research papers (at StageI and Stage-II respectively)
preferably in the Journal having Citation Index 2.0 and ISSN number; or paper can be published in reputed International
Journal recommended by the guide of the Dissertation and the BoS supported cPGCON event for paper presentation and
participation. The guides certificate covering originality of the work and plagiarism-testing result shall be included in the
report along with the Published Journal Papers and. cPGCON paper presentation and participation certificates. The
comments received by the journal paper reviewers be attached in the Dissertation report and shall be made available during
dissertation presentation/viva to the examiners.
Note 1: Refer R-2.7 for Examination Rules of Rules and Regulations for M.E. Programs under faculty of
Engineering effective from June 2013. Non-credit courses are mandatory for the grant of the term and
shall be completed by the students as a self study either by referring to the Hand books,
Journal/Conference papers (atleast 25 in number), open source software, tools and in addition may be by
organizing educational visits to the technological/professional centers in the subject, if any. Each student is
required to produce in own words, one 10 pages innovative, technical paper to be submitted as a part of the
semester course work of non-credit courses.
Examination Scheme
Theory In-semester Assessment: 50 Marks
Theory End-semester Assessment: 50 Marks
Total Credits : 04
Objectives
This course covers selected topics in algorithms that have found applications in areas
such as geometric modeling, graphics, robotics, vision, computer animation, etc.
The course objective is to teach problem formulation and problem solving skills.
The course aims at keeping a sound balance between programming and analytical
problem solving.
Polynomial
time
Teaching Scheme
Lectures: 4 Hrs/week
Teaching Scheme
Lectures: 4 Hrs/week
Examination Scheme
Theory In-semester Assessment: 50 Marks
Theory End-semester Assessment: 50 Marks
Total Credits : 04
Objective: to introduce the student to research methodology, and to prepare them for
conduct independent research
ELECTIVE-I
510105A- Intelligent Systems
Teaching Scheme
Lectures: 5 Hrs/week
Examination Scheme
Theory In-semester Assessment: 50 Marks
Theory End-semester Assessment: 50 Marks
Total Credits : 05
1. Introduction
Intelligent Agents: Introduction. Agents and Environments, Good Behavior: The Concept of
Rationality, The Nature of Environments, The Structure of Agents.
Problem Formulation: Problem-Solving Agents, Example Problems, Searching for Solutions,
Uninformed Search Strategies, Avoiding Repeated States, Searching with Partial Information.
2. Search Methods
Informed Search and Exploration: Informed (Heuristic) Search Strategies, Heuristic
Functions, Local Search Algorithms and Optimization Problems, Local Search in Continuous
Spaces, Online Search Agents and Unknown Environments, Generic Algorithms for TSP.
Constraint Satisfaction Problems: Constraint Satisfaction Problems, Backtracking Search for
CSPs, Local Search for Constraint Satisfaction Problems, Structure of Problems.
3. Planning
The Planning Problem, Planning with State-Space Search, Partial-Order Planning,
Planning Graphs, Planning with Prepositional Logic, Analysis of Planning Approaches.
4. Planning and Acting in the Real World
Time, Schedules and Resources, Hierarchical Task Network Planning, Planning and
Acting in Nondeterministic Domains, Conditional Planning, Execution Monitoring and Replanning, Continuous Planning, Multi-Agent Planning.
5. Uncertain knowledge and reasoning
Acting under Uncertainty, Basic Probability Notation, Representing Knowledge in an
Uncertain Domain, The Semantics of Bayesian Networks, Efficient Representation of
Conditional Distributions, Exact Inference in Bayesian Networks, Approximate Inference in
Bayesian Networks, Extending Probability to First-Order Representations, Other Approaches to
Uncertain Reasoning.
6. Making Simple &Complex Decisions
Combining Beliefs and Desires under Uncertainty, The Basis of Utility Theory, Utility
Functions, Multi-attribute Utility Functions, Decision Networks, The Value of Information,
Decision-Theoretic Expert Systems, Sequential Decision Problems, Value Iteration, Policy
Iteration.
Reference Books:
1. Stuart Russell, Peter Norvig, Artificial Intelligence A Modern Approach 2 nd Edition
Pearson Publication, ISBN No.978-81-775-8367-0.
2. Patrick Henry Winston, Artificial Intelligence, 3rd Edition.,Pearson Publication, ISBN No.
978-81-317-1505-5.
3. Patrick Henry Winston., Lisp programming language, Pearson Publication.
Examination Scheme
Theory In-semester Assessment: 50 Marks
Theory End-semester Assessment: 50 Marks
Total Credits : 05
Additional References :
1. C.J. Rijsbergen, "Information Retrieval", (http://www.dcs.gla.ac.uk/Keith/Preface.html)
2. Grossman, D. A. and Frieder, O., Information Retrieval: Algorithms and Heuristics. Kluwer 1998.
3. Search Engines: Information Retrieval in Practice by Bruce Croft, Donald Metzler, and Trevor Strohman,
Addison-Wesley, 2009.
4. Information Retrieval: Implementing and Evaluating Search Engines by S. Buttcher, C. Clarke and G. Cormack,
MIT Press, 2010.
5. Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data by B. Liu, Springer, Second Edition, 2011.
Examination Scheme
Theory In-semester Assessment: 50 Marks
Theory End-semester Assessment: 50 Marks
Total Credits : 05
Unit I. Introduction
Issues in Real-Time Computing, Structures of Real-Time System, Task Classes, Performance
Measures for Real-Time Systems, Estimating Program Run Times
Unit II. Task Assignment and Scheduling
Classical Uni-processor Scheduling algorithm, Uni-processor Scheduling of IRIS Tasks, Task
Assignment, Mode Changes, Fault Tolerant Scheduling
Unit III. Programming Languages and Tools
Desired Language characteristics, Data Typing , Control Structures , Facilitating Hierarchical
Decomposition, Packages, Runtime Error (Exception) Handling, Overloading and Generics,
Multitasking ,Low-Level Programming, Task Scheduling, Timing Specifications, Some
experimental Languages, Programming Environments, Run-Time Support.
Unit IV. Real-Time Databases
Basic Definitions, Real-Time Vs General-Purpose Databases, Main Memory Databases,
Transaction Priorities, Transaction Aborts, Concurrency Control Issues, Disk Scheduling
algorithm, A Two Phase Approach To Improve Predictability, Maintain Serialization
Consistency, Databases for Hard Real Time Systems.
Unit V. Real-Time Communication
Network Topologies ,Protocols ,Clocks , A Non Fault Tolerant Synchronization
Algorithm, Impact of Faults , Fault Tolerant Synchronization in Hardware,
Synchronization in Software
Unit VI. Fault Tolerant Techniques
Fault Types , Fault Detection, Fault and error Containment, Redundancy, Data Diversity,
Reversal Checks, Malicious or Byzantine Failures, Integrated Failure Handing, Obtaining
Parameter Values, Reliability Models for Hardware Redundancy, Software Error models,
Taking Time into Account.
References:
1. C.M. Krishna, Kang G. Shin, Real-Time Systems, Tata McGraw Hill
Examination Scheme
OR: 50 Marks
TW: 50 Marks
Total Credits : 04
1. Develop algorithmic solution for solving the problem stated in assignment 2, 3 below
using set theory, Probability theory and/or required theories, strategy to design Turing
machine, multiplexer logic inducing concurrency and perform NP-Hard analysis for the
solution feasibility.
2. Design and implement the distributed architecture for the Hadoop having Name node,
Tracker node and data nodes (separated by ADSL routers) or such recent technology.
Prepare architecture diagram and installation document to be used for the assignment
number 3
3. Implement Digital Library Infrastructure using Hadoop or Similar recent technology for
distributed database storage. To develop front end GUI and algorithm for searching the
multimedia resource files, presentations in the selected domain, author, book title, ISBN..
Use different search exploration techniques.
Or Assignments equivalent to above assignments.
4. Elective teacher shall design four suitable assignments based on Elective I maintaining
above quality of the assignments.
5. Design and implement class/classes using latest 64-bit C++/JAVA/ Python/QT 5.1 and
above, Cuda C++ or such latest 64-bit programming tools for the implementation of Two
journal (IEEE Transactions/ACM Elsevier/Springer) papers published in the current year
related to the respective elective subjects. Development Tools such as
MATLAB/OPENCV/OPENMP/NS3 or equivalent may be used if required to interface
the developed classes to the simulators.
Tools for the Laboratories: The laboratories must be equipped with adequate, well
maintained working resources as per the software/equipment/tools list published by the
Board of Studies time to time. For maintaining the quality and effective performance the
Board of Studies may publish the quality guidelines for effective conduct of the
laboratories, seminars and dissertation.
Semester - II
510107- Operating System Design
Teaching Scheme
Lectures: 4 Hrs/week
Examination Scheme
Theory In-semester Assessment: 50 Marks
Theory End-semester Assessment: 50 Marks
Total Credits : 04
Unit I. Introduction
System levels, Hardware Resources, Resource management, Virtual Computers, The
Hardware Interface, The CPU, Memory and Addressing, Interrupts, I/O Devices, The Operating
System Interface, Information and Meta-Information, Naming Operating System Objects, Device
as Files, The process Concept, Communication between Processes, UNIX-Style Process
Creation, Standard Input and Standard Output, The User Interface to an Operating
Design Techniques: Operating Systems and Design, Design Problems, Design Techniques, Two
Level Implementation, Interface Design, Connection in Protocols, Interactive and Programming
Interfaces, Decomposition Patterns.
Unit II. Implementing Processes
Implementation of a Simple Operating System, Implementation of Processes, System
Initialization, Process Switching, System Call Interrupt Handling, Program Error Interrupts, Disk
Driver Subsystem, Implementation of Waiting, Flow of Control Through the Operating System,
Signaling in an Operating System, Interrupts in the Operating System, Operating Systems as
Event and Table Managers, Process Implementation, Examples of Process Implementation,
Mono-programming, Parallel System.
Unit III. Inter process Communication Patterns
Patterns of Inter process communication, New message-passing system calls, IPC
Patterns, Failure of Processes, Processes: Everyday Scheduling, Preemptive Scheduling
Methods, Policy versus Mechanism in Scheduling, Scheduling in Real Operating Systems,
Deadlock, Two Phase Locking, Starvation, Synchronization, Semaphores, Programming
Language Based Synchronization Primitives, Message Passing Design Issues
Design Techniques: Indirection, Using State Machines, Win Big Then Give Some Back,
Separation of Concepts, Reducing a Problem to a Special Case, Reentrant Programs, Using
Models for Inspiration, Adding a New Facility To a System.
Unit IV. Memory Management
Levels of Memory Management, Linking and Loading a Process, Variations in Program
Loading, The Memory Management Design Problem, Dynamic Memory Allocation, Keeping
Track of the Blocks, Multiprogramming Issues, Memory Protection, Memory Management
System Calls, Virtual Memory, Virtual Memory Systems
Design Techniques: Multiplexing, Late binding, Static Versus Dynamic, Space-Time Tradeoffs,
Simple Analytic Models
Teaching Scheme
Lectures: 4 Hrs/week
Unit I
Introduction: Types of Networks. Network design issues. Network design tools,
advanced network architectures. Reliable data delivery, Routing and forwarding, resource
allocation, Mobility, Networked applications, Data in support of network design, General
Principles of Network Design, network characteristics.
Unit II
Delay Models in Data Networks: Modeling and Performance evaluation. Multiplexing of
Traffic on a Communication Link, Queuing Models- Littles Theorem, Probabilistic Form of
Littles Theorem, Application of Littles Theorem, Queuing Systems: M/M/1, M/M/2, M/M/m,
M/M/, M/M/m/m, M/M/m/q, M/M/1/N, D/D/1, M/G/1 System, M/G/1 Queues with Vacations,
Reservations and Polling, Priority Queuing
Unit III
Modeling Networks as Graphs, Problems & algorithms: Multipoint line topology- CMST,
Esau-Williams Algorithm, Sharmas Algorithm, Bin Packing algorithms. Terminal AssignmentGreedy algorithm and exchange algorithms, Concentrator location- COM, Add, Drop,
Relaxation algorithm. Network of queues, Open, closed and semi-open queues, Network node,
Kleinrocks Independent approximation.
Unit IV
Quality of Service in Networks: Application and QoS, QoS mechanisms, Queue management
Algorithms, Feedback, Resource reservations, traffic engineering, Ubiquitous Computing:
Applications and Requirements, Smart Devices and Services, Smart Mobiles, Cards and Device
Networks.
Unit V
IP packet format, IP routing method, routing using masks, fragmentation of IP packet,
IPv6, advanced features of IP routers: filtering, IP QoS, NAT, routers
Unit VI
Advanced topics in computer networks: Wireless and sensor networks, multimedia
networking, content distribution networks, computer network simulation, Domain-specific
networks, Next generation networks, Cyber physical systems.
References:
1. Kershenbaum A., Telecommunication Network Design Algorithms, Tata McGraw Hill
2. Simulation Modeling and analysis, Averill M. Law, W. D. Kelton
3. Computer Networks, Priciples, Technologies and Protocols for network design Natalia Olifer,
Victor Olifer, Wiley India
4. Ubiquitous Computing, Stefan Poslad, WILEY INDIA EDITION
Elective II
Teaching Scheme
Lectures: 5 Hrs/week
Teaching Scheme
Lectures: 5 Hrs/week
interACTI
ON
DESIGN
References:
1. Linda Mcaulay, HCI for Software Designers,International Thompson Computer Press,
USA,1998.
2. Ben Schneiderman, "Designing the User Interface", Pearson Education, New Delhi,2005.
3. Alan Cooper, "The Essentials of User Interface Design", IDG Books, New Delhi,1995.
4. Jacob Nielsen, "Usability Engineering", Academic Press, 1993.
5. Alan Dix et al, "Human - Computer Interaction", Prentice Hall, USA,1993.
6. Elements of User Interface Design - Theo Mandel, John Wiley & Sons
7. Interaction Design Preece, Roger, Sharp, John Wiley & Sons
8. Object Modeling & User Interface Design - Mark Hamelen
Teaching Scheme
Lectures: 5 Hrs/week
Unit I. Introduction
Notation and Concepts for Languages and Grammars, Traditional compilers, structure of
compiler, architecture, properties, portability and re-targetability, optimization, grammars,
Closure algorithms, abstract syntax tree: lexical structure, syntax.
Unit II. Attribute grammars
Dependency graphs, attribute evaluation, cycle handling, attribute allocation, multi-visit
attribute grammars, types of attribute grammars, L-attribute grammar, S-attributed grammars,
equivalence of L-attributed and S-attributed grammars, Extended grammar notations and attribute
grammars, manual methods.
Unit III. Intermediate code processing
Interpretation, Code generation, Assembler design issues, linker design issues. Memory
Management: data allocation with explicit de-allocation, data allocation with implicit deallocation, Static, Dynamic and Heap Storage allocation.
Unit IV
Context handling, source language data representations, routines and their activation,
Code generation for control flow assessment, Code generation for modules. Examples of Parser
generators, machine-independent Code generation.
Unit V. Functional & Logic Programs
Offside rules, Lists, List comprehensions, pattern matching, polymorphic typing,
referential transparency, High-order functions, lazy evaluation, compiling functional languages,
polymorphic type checking, Desugaring, Graph reduction, Code generation for functional, core
programs, Optimizing the functional Core, Advanced graph manipulations
The logic programming models, implementation model interpretation, unification,
implementation model compilation, compiled code for unification.
Unit VI. Parallel programming
Parallel programming models, processes and threads, shared variables, message passing, parallel
object -oriented languages, Tuple space, automatic parallelization. Case study of simple objectoriented compiler/interpreter.
Reference Books
1. Modern Compiler Design, Dick Grune, Henri E Bal, Jacobs, Langendoen Wiley India Pvt Ltd,
ISBN: 81-265-0418-8
2. The Theory and Practice of Compiler Writing, Trembley Sorenson, MacGrawHill India
ISBN:0-07-Y66616-4
Teaching Scheme
Lectures: 5 Hrs/week
Unit I
Introduction to Embedded systems, building blocks, legacy Embedded processors, Integrated RISC
processors, DSP Processors Architecture, Selection of Processor,, LPC2148- Architecture, Register set,
Programmers Model,
Unit II
Memory Systems, DRAM Technology, Video RAM, SRAM: Pseudo-Static RAM, Battery Backup
SRAM, EPROM and OTP, Parity, Error Detection and Correcting Memory, Access times, Packages,
DRAM Interfaces, DRAM Refresh Techniques, Optimizing line length and cache size, Logical versus
physical caches, Unified versus Harvard caches, Cache coherency: Write through, write back, no caching
of write cycles, write buffer, Bus snooping, MESI Protocol, MEI Protocol, BIG and Little Endian, Dual
Port and Shared Memory, Bank Switching, Memory Overlays, Shadowing, Memory Interfacing,
HY27UU088G5M-Architecture, Register Set, Programmers Model
Unit III
Basic Peripherals: Parallel ports, Timer Counters, 8253, MC68230 modes, Timer Processors, Real-time
clocks, Serial Ports, serial peripheral interface, I 2C bus, M-Bus, RS232C, USB2.0, UART
implementations, DMA Controllers, DMA Controller Models, Channels and Control Blocks, Sharing Bus
Bandwidth, DMA Implementations, Intel82801 IO Controller HUB
Analogue to Digital Conversion, Sample Rate and Size, Codecs, Power Control
Unit IV
Interrupts and Exceptions, Interrupt Structure, Recognizing an Interrupt, Interrupt mechanism, MC68000
Interrupts, RISC Exceptions, Fast Interrupts, Interrupt Controllers, Instruction restart and continuation,
Interrupt Latency, Interrupt Handling Dos and Donts, Intel i7 interrupts and programmers model
Unit V
Real-Time Operating Systems, Operating systems internals, Multitasking OS, Scheduler Algorithms,
Priority Inversion, Tasks, Threads and processes, Exceptions, Memory Models, Memory Models and
Address Translation, Commercial Operating Systems, Resource Protection, Linux, Disk Partitioning,
Writing software for Embedded Systems: The Compilation Process, Native verses cross compilers, RunTime Libraries, Writing Library, Using Alternative Libraries, Using Standard Libraries, Porting Kernels, C
extensions for Embedded Systems, Downloading,
Emulation and Debugging techniques, The role of the development system, Emulation Techniques.
Unit VI
Buffering and other data Structures, buffers, Linear buffers, Directional Buffers, Double Buffering, Buffer
Exchange, Linked list, FIFO, Circular buffers, buffer under run and over run, Allocating buffer memory,
Memory leakage, effects of memory wait state scenarios, Making the right decisions, Software
Benchmark Examples, Creating Software State mechanisms, Design of Burglar alarm system, Digital
echo Unit, Choosing the software environment, Deriving realtime systems performance form non-realtime systems, Scheduling the data sampling, sampling the data, Controlling from an external Switch,
Problems.
References
1. Embedded Systems Design, Steve Heath, EDN Series for Design Engineers, Elsevier
ISBN: 978-81-8147-970-9
2. Philips LPC2148 Datasheet (lpc2141_42_44_46_48_4.pdf)
3. HY27UU0**G5M.pdf
4. Intel82801 IO Controller HUB.pdf
5. (Intel i7 interrupt registers and programming) 322165.pdf
Examination Scheme
OR: 50 Marks
TW: 50 Marks
Total Credits : 04
Use suitable 64-bit Linux environment and toolset to implement following assignments
1. Demonstrate the Reader-Writer Problem solution by creating multiple processes and share
regions or blocks. Use 64-bit Linux derivative and tools for implementation.
2. Write a program to identify the least used icons/files/folders on the desktop and move them
to temp folder created in Documents.
3. Create a computing facility grid using networks for Booths multiplication (64-bit) using
sign-extension method. Where bit multiplication, additions and merging of the addition
results for final processing. The computing grid is created using Advanced wireless network
with few computing resources are separated by the router and identified by the NAT. The
network controlling node will be submitted with files having total distributed storage of 1000
numbers as a SAN queued for the execution in sorted manner on the lesser cost due to length
of the multiplier and display the results along with the network tracking report for the
dynamic allocation of multiplier and addition nodes along with the sleeping/ inactive/
unutilized nodes in the network.
4. Design suitable software architecture for assignment number 1,2 and 3 above.
Or assignments equivalent to the above assignments
5. Design and implement class/classes using latest 64-bit C++/JAVA/ Python/QT 5.1 and above,
Cuda C++ or such latest 64-bit programming tools for the implementation of Two journal (IEEE
Transactions/ACM Elsevier/Springer) papers published in the current year related to the
respective elective subjects. Development Tools such as MATLAB/OPENCV/OPENMP/NS3 or
equivalent may be used if required to interface the developed classes to the simulators.
Tools for the Laboratories: The laboratories must be equipped with adequate, well
maintained working resources as per the software/equipment/tools list published by the
Board of Studies time to time. For maintaining the quality and effective performance the
Board of Studies may publish the quality guidelines for effective conduct of the
laboratories, seminars and dissertation.
510112- Seminar- I
Teaching Scheme
Practical: 4 Hrs/week
Examination Scheme
TW: 50 Marks
Presentation Oral: 50 Marks
Total Credits: 04
State-of-the-art topic approved by the guide useful for professional growth in the filed of
expertise. The presentation should cover motivation, mathematical modeling, data-table
discussion and conclusion. The reports to be prepared using LATEX derivative. To maintain the
quality of the seminar work it is mandatory on the seminar guides to maintain a progressive
record of the seminar contact Hrs of 1 Hrs per month per seminar which shall include the discussion
agenda, weekly outcomes achieved during practical sessions, corrective actions and comments on the
progress report as per the plan submitted by the students including dates and timing, along with the
signature of the student as per the class and teacher time table (as additional teaching load); such record
of progressive work shall be referred by the examiners during evaluation.
Semester III
610101- Advanced Storage Systems and Infrastructure Management
Teaching Scheme
Examination Scheme
Lectures: 4 Hrs/week
Theory In-semester Assessment: 50 Marks
Theory End-semester Assessment: 50 Marks
Total Credits : 04
Objectives:
Understanding components of modern information storage infrastructure.
Upon successful completion of this course, participants should be able to:
Evaluate storage architecture; understand logical and physical components of a storage
infrastructure including storage subsystems;
Describe storage networking technologies and data archival solution;
Understand and articulate business continuity solutions including, backup and recovery
technologies, and local and remote replication solutions;
Identify parameters of infrastructure management and describe common infrastructure
management activities and solutions;
Prerequisites
To understand the content and successfully complete this course, a participant must have a basic
understanding of computer architecture, operating systems, networking, and databases.
Unit I: Introduction to Information Storage Technology / Systems
Review data creation and the amount of data being created and understand the value of
data to a business, Challenges in Data Storage and Management, Data Storage Infrastructure.
Components of a Storage System Environment: Disk drive components, Disk Drive
performance, Logical Components.
Data protection: concept of RAID and different RAID levels (RAID 0, 1, 3, 5, 0+1/1+0,
and 6);
Intelligent Storage System (ISS) and its components, Implementation of ISS as high-end
and midrange storage arrays.
Unit II: Different Storage Technologies and Virtualization
Introduction to Networked Storage: Evolution of networked storage, Architecture,
Overview of FC-SAN, NAS, and IP-SAN. Network-Attached Storage (NAS): Benefits of NAS,
Components, Implementations, File Sharing, I/O operations, Performance and Availability.
Content Addressed Storage (CAS): features and Benefits of a CAS. CAS Architecture, Storage
and Retrieval, Examples.
Storage Virtualization: Forms, Taxonomy, Configuration, Challenges, Types of Storage
Virtualizations.
Overview of emerging technologies such as Cloud storage, Virtual provisioning, Unified
Storage, FCOE, FAST.
Additional References:
1. The Design of the Unix Operating System- Maurice J. Bach
Elective III
610103A - Network Security
Teaching Scheme
Lectures: 5 Hrs/week
Examination Scheme
Theory In-semester Assessment: 50 Marks
Theory End-semester Assessment: 50 Marks
Total Credits : 05
Unit I. Introduction
Security Trends, the OSI Security Architecture, Security Attacks, Security Services,
Security Mechanisms, A model for Network Security The Security problems, Avenues of
Attacks
Unit II. Security at each layer :
Security at Application Layer : PGP, and S/MIME, Email Security Security at Transport Layer :
SSL & TLS, SSL Architecture, Four Protocols, SSL message formats, Transport layer security
Security at Network Layer : IPSec, Two Modes, Two Security Protocols, Security Association,
security Policy, Internet Key Exchange (IKE), ISAKMP
Unit III. System Security :
Description of the system, Users, Trust and Trusted systems, Buffer overflow and
Malicious software, malicious program, worm, viruses, IDS, Firewall.
Firewalls: Network Partitioning, firewall platforms, partitioning models and methods,
Secure SNMP, Secure routing interoperability, virtual network.
Unit IV. Cryptographic Techniques
Secret versus Public key Cryptography, Types of attack, Types of cipher - Substitution,
transposition, Other Cipher properties, Secret key cryptography , Public key cryptography and
RSA key management, digital certificates, PKI, identity based encryption, Authentication
Unit V. Security Policies and Design Guidelines
Policies: Policy creation, Regularity considerations, Privacy regulations. Security: Infrastructure
and components. Design Guidelines. Authentication: Authorization and accounting. Physical and
logical access control. User authentication: Biometric devices.
Unit VI. Web Security
Computer Forensics: evidence , collecting Evidence Chain of Custody, free space vs
Stack space. TCP/IP Vulnerabilities : Securing TCP/IP Spoofing: The process of an IP spoofing
attack, Cost of Spoofing, Types of spoofing, spoofing tools, prevention and Mitigation
References:
1. Cryptography and Network Security Principles and Practices William Stallings
2. Cryptography and Network Security Forozan an Mukhopadhay Mc Graw Hill
3. Information Assurance & security Series Principles of Computer Security, Security + and
Beyond Conklin, White, Cothren, Williams, Davis Dreamtech Press
4. Cheswick W. Bellovin S. Firewall and Internet security Repelling the Wily Hacker, 2nd
Addison Wesley
5. Security Architecture, design, deployment and operations Christophr M King , Curtis,
Dalton and T Ertem Osmanoglu
6. Computer Security Concepts, Issues and Implementation Alfred Basta, Wolf Halton
Cengage Learning
Examination Scheme
Theory In-semester Assessment: 50 Marks
Theory End-semester Assessment: 50 Marks
Total Credits : 05
Unit I. Introduction
Cloud computing fundamentals, the role of networks in Cloud computing, Essential
characteristics of Cloud computing, Cloud deployment model, Cloud service models,
Multitenancy, Cloud cube model, Cloud economics and benefits, Cloud types and service
scalability over the cloud, challenges in cloud NIST guidelines
Unit II. Virtualization, Server, Storage and Networking
Virtualization concepts , types, Server virtualization, Storage virtualization, Storage
services, Network virtualization, Service virtualization, Virtualization management,
Virtualization technologies and architectures, Internals of virtual machine, Measurement and
profiling of virtualized applications. Hypervisors: KVM, Xen, HyperV Different hypervisors and
features
Unit III. Data in cloud
Storage system architecture, Big data, Virtualized Data Centre (VDC) architecture, VDC
environments, concepts, planning and design, Managing VDC and cloud infrastructures,
hybrid storage networking technologies (iSCSI, FCIP,FCoE), host system design consideration
Unit IV. Cloud security
Cloud Security risks, Security, Privacy, Trust, Operating system security, Security of
virtualization, Security risks posed by shared images, Security risk posed by a management OS,
Xoar, Trusted virtual machine monitor
Unit V. QoS [ Quality of Service ] of Cloud
Taxonomy and survey of QoS management and service , Selection methodologies for
cloud computing, Auto scaling, Load balancing and monitoring in open source cloud, Resource
scheduling for Cloud Computing
Unit VI. Cloud patterns and application
Cloud Platforms: Amazon EC2 and S3, Cloudstack, Intercloud, Mobile Cloud Designing
an image: Pre-packaged image, singleton instances prototype images Designing an architecture :
Adapters, Facades, Proxies and balancers Clustering : The n-Tier Web pattern, Semaphores and
Locking Map Reduce Peer-to-Peer framework
References:
1. Dr. Kumar Saurabh,Cloud Computing, Wiley Publication
2. Borko Furht, Handbook of Cloud Computing, Springer
3. Venkata Josyula,Cloud computing Automated virtualized data center, CISCO Press
4. Greg Schulr,Cloud and virtual data storage networking,CRC Press
5. Mark Carlson,Cloud data management and storage, Mc Graw hill
6. Lizhe Wang, Cloud Computing:Methodology, System and Applications, CRC Press
7. Cloud computing: Data Intensive Computing and Scheduling by Chapman Hall/CRC
8. Christopher M. Moyer, Building Applications in the Cloud: Concepts, Patterns, and
Projects
3.
4.
5.
Robert Haralick and Linda Shapiro, "Computer and Robot Vision", Vol I, II, Addison Wesley, 1993.
David A. Forsyth, Jean Ponce, "Computer Vision: A Modern Approach" PHI
R Jain, R Kasturi, , "Machine Vision", McGraw Hill
R. O. Duda, P. E. Hart, D. G. Stork, Pattern Classification, 2nd Edition, Wiley-Inter-science, John Wiley
&Sons, 2001
David G. Stork and Elad Yom-Tov, Computer Manual in MATLAB to accompany Pattern Classification
Wiley Inter-science, 2004
Examination Scheme
Theory In-semester Assessment: 50 Marks
Theory End-semester Assessment: 50 Marks
Total Credits : 05
Objectives:
Design and develop intelligent systems in the framework of soft computing, and to
acquire knowledge of scientific application-driven environments.
Outcomes:
Students who successfully complete this course will be able to
Have a general understanding of soft computing methodologies, including artificial
neural networks, fuzzy sets, fuzzy logic, fuzzy inference systems and genetic algorithms;
Design and development of certain scientific and commercial application using
computational neural network models, fuzzy models, fuzzy clustering applications and
genetic algorithms in specified applications.
Unit I: Soft Computing Basics
Introduction, soft computing vs. hard computing, various types of soft computing
techniques, applications of soft computing. Basic tools of soft computing Fuzzy logic, neural
network, evolutionary computing. Introduction: Neural networks, application scope of neural
networks, fuzzy
logic, genetic algorithm, hybrid systems.
Unit II: Neural Networks
Neuron, Nerve structure and synapse, Artificial Neuron and its model, activation
functions, Neural network architecture: single layer and multilayer feed forward networks,
recurrent networks. Various learning techniques; perception and convergence rule, Autoassociative and hetro-associative memory, perceptron model, single layer artificial neural
network, multilayer perception model; back propagation learning methods, effect of learning rule
co-efficient ;back propagation algorithm, factors affecting back propagation training,
applications.
Unit III: Fuzzy Logic
Basic concepts of fuzzy logic, Fuzzy sets and Crisp sets, Fuzzy set theory and operations,
Properties of fuzzy sets, Fuzzy and Crisp relations, Fuzzy to Crisp conversion. Membership
functions, interference in fuzzy logic, fuzzy if-then rules, Fuzzy implications and Fuzzy
algorithms, Fuzzyfications & Defuzzifications, Fuzzy Controller, Fuzzy rule base and
approximate reasoning: truth values and tables in fuzzy logic, fuzzy propositions formation of
rules ,decomposition of compound rules, aggregation of fuzzy rules, fuzzy reasoning, fuzzy
inference system, fuzzy expert systems.
Unit IV: Genetic Algorithm
Basic concepts, working principle, procedures of GA, flow chart of GA, Genetic
representations, (encoding) Initialization and selection, Genetic operators, Mutation,
Generational Cycle, Traditional algorithm vs genetic algorithm, simple GA, general genetic
algorithm, schema theorem, Classification of genetic algorithm, Holland classifier systems,
genetic programming, applications of genetic algorithm, Convergence of GA, Applications &
advances in GA, Differences & similarities between GA & other traditional method, applications.
610104 - Seminar- II
Teaching Scheme
Practical: 4 Hrs/week
Examination Scheme
TW: 50 Marks
Presentation Oral: 50 Marks
Total Credits: 04
Seminar based on state-of-the art in the selected electives. The presentation and the report should
cover motivation, mathematical modeling, data-table discussion and conclusion. The reports to
be prepared using LATEX derivative. To maintain the quality of the seminar work it is
mandatory on the seminar guides to maintain a progressive record of the seminar c ontact Hrs of 1
Hrs per month per seminar which shall include the discussion agenda, weekly outcomes achieved during
practical sessions, corrective actions and comments on the progress report as per the plan submitted by
the students including dates and timing, along with the signature of the student as per the class and
teacher time table (as additional teaching load); such record of progressive work shall be referred by the
examiners during evaluation.
Examination Scheme
TW: 50 Marks
OR: 50 Marks
Total Credits: 08
Motivation, Problem statement, survey of journal papers related to the problem statement,
problem modeling and design using set theory, NP-Hard analysis, SRS, UML, Classes, Signals,
Test scenarios and other necessary, problem specific UML, software engineering documents.
Student should publish one International Journal Paper (having ISSN Number and preferably with
Citation Index II); or paper can be published in reputed International Journal recommended by the guide
of the Dissertation and in addition to above the term work shall include the paper published, reviewers
comments and certificate of presenting the paper in the conference organized/sponsored by the Board of
Studies in Computer Engineering. To maintain the quality of the dissertation work it is mandatory on the
dissertation guides to maintain a progressive record of the dissertation c ontact Hrs of 1 Hrs per week which
shall include the dissertation discussion agenda, weekly outcomes achieved during practical sessions, corrective
actions and comments on the progress report as per the plan submitted by the students including dates and timing,
along with the signature of the student as per the class and teacher time table; such record of progressive work
shall be referred by the dissertation examiners during evaluation. At the most 8 dissertations can be assigned to a
guide.
Semester - IV
610106 - Seminar- III
Teaching Scheme
Practical: 5 Hrs/week
Examination Scheme
TW: 50 Marks
Presentation Oral: 50 Marks
Total Credits: 05
Examination Scheme
TW: 150 Marks
OR: 50
Total Credits: 20