UG Syllabus DCSE Acad Year 2020-21 Onwards - For - UPLOAD
UG Syllabus DCSE Acad Year 2020-21 Onwards - For - UPLOAD
UG Syllabus DCSE Acad Year 2020-21 Onwards - For - UPLOAD
Bachelor of Technology
Computer Science and Engineering
B. Tech. CSE
Curriculum
Page 1 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Semester II
Sr. Cre Teaching Examination
Course Code Total
No. dits Scheme Scheme
L T P L T P
1 Engineering Mechanics AM108S2 4 3 0 2 100 0 50 150
Fundamentals of Computer
2 CS109S2 4 3 0 2 100 0 50 150
& Programming
English & Professional
3 HU110S2 3 3 0 0 100 0 0 100
Communication
4 Workshop Practice ME111S2 2 0 0 4 0 0 100 100
Physics of Materials and
5 PH112S2 4 4 0 0 100 0 0 100
Nuclei
Web Programming
6 CSCS113S2 4 3 0 2 100 0 50 150
Branch Specific Course-II
7 Mathematics-II MA114S2 4 3 1 0 100 25 0 125
Total 25 18 2 10 600 25 250 875
Total Contact Hours per week 30
S1 = Semester-1, S2 = Semester-2, AM = Applied Mechanics, CH = Chemical, CE = Civil, CS = Computer,
ME = Mechanical, EE = Electrical, EC = Electronics, PH = Physics, CY = Chemistry, MA = Mathematics, HU
= Humanities. Branch Specific Course: First two letters indicate branch for which the course is offered
and the last two letters indicate the department which is offering the course.
Page 2 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Semester-II
Sr. Cre Teaching Examination
Course Code Total
No. dits Scheme Scheme
L T P L T P
Mechanics, Lasers and Fiber
1 PH103S2 4 4 0 0 100 0 0 100
Optics
2 Applied Chemistry CY104S2 4 3 0 2 100 0 50 150
3 Engineering Drawing CEME105S2 4 2 0 4 50 0 100 150
Energy & Environmental
4 CEME106S2 4 3 1 0 100 25 0 125
Engineering
Holistic Empowerment &
5 HU107S2 0 3 0 0 100 0 0 100
Human Values*
Web Programming
6 CSCS113S2 4 3 0 2 100 0 50 150
Branch Specific Course-II
7 Mathematics-II MA112S2 4 3 1 0 100 25 0 125
Total 24 21 2 8 650 50 200 900
Total Contact Hours per week 31
*Audit Course
Page 3 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Page 4 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Page 5 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Artificial Intelligence
2 CS304 5 3 1 2 100 25 50 175
(Core-13)
System Software
3 CS306 5 3 1 2 100 0 50 150
(Core-14)
Innovation, Incubation
4 HU3XY 3 3 0 0 100 0 0 100
and Entrepreneurship
5 Core Elective-2 CS3BB 3 3 0 0 100 0 0 100
6 Core Elective-3 CS3CC 3 3 0 0 100 0 0 100
7 Institute Elective-2 CS3YY 3 3 0 0 100 0 0 100
Total 27 21 3 6 700 75 200 925
Total Contact Hours per week 30
Practical Examination Scheme (Continuous Evaluation 50% and End-Semester Evaluation 50%)
Page 6 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Page 7 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Page 8 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
ELECTRICAL NETWORKS
L T P Credit
CSEE102S1
(BRANCH SPECIFIC COURSE-I) Scheme 3 0 2 04
2. Syllabus
AC FUNDAMENTALS AND CIRCUITS (07 Hours)
Alternating Voltages and Currents through Purely Resistive Inductive and Capacitive Circuits, R-L,
R-C, R-L-C Series Circuits, Impedance and Admittance, Circuits in Parallel, Series and Parallel
Resonance, Complex Algebra and its Application to Circuit Analysis, Circuit Transient, Initial and
Final Value Theorem, DC and Induction Machines, Electrical Measurements, Power System.
Page 9 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
3. Practicals:
1. To study Ammeter and Voltmeter for current and voltage measurement in circuit.
2. To study Energy meter.
3. To study Power measurement method for three phase circuits using watt meter method.
4. Verification of superposition theorem for electric circuit.
5. Verification of Thevenin’s theorem of electric circuit.
6. Calculation and verification Norton’s theorem.
7. Open circuit and short circuit test for the transformers for efficiency calculation.
8. Verification of Kirchhoff’s current law and Kirchhoff’s voltage law for electric circuit.
9. Capacitance measurement of parallel plates.
10. Calculation of efficiency of auto transformer.
Page 10 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
4. BooksRecommended:
1. V. N. Mittle & Arvind Mittal, “Basic Electrical Engineering”, 2 nd edition, Tata McGraw-Hill Education,
2005.
Page 11 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Introduction to Memory, Input and Output Devices, Memory Hierarchy, Primary Memory and its
Types, Secondary Memory, Classification of Secondary Memory, Various Secondary Storage
Devices and their Functioning.
Introduction and type of Number System, Conversion between Number System, Arithmetic
Operations in different Number System, Signed and Unsigned Number System.
Page 12 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Introduction to Unix based OS, Configuration, Setup, Services, Scripting, Network Configuration.
Different Debugging tools, Commands, Memory dump, Register and Variable Tracking, Instruction
and Function level debugging, Compiler Options, Profile Generation.
Data Communication and Transmission media, Multiplexing and Switching, Computer Network and
Network Topology, Communication Protocols and Network Devices, Evolution and Basic Internet
Term, Getting Connected to Internet and Internet Application, Email and its working, Searching the
Web, Languages of Internet, Internet and Viruses.
Characteristics of C Language, Identifiers and Keywords, Data Types Constants and Variables,
Declarations and Statements, Representation of Expressions, Classification of Operators and
Library Functions for Data Input and Output Statements, Formatted Input and Output Statements.
Conditional Control Statements, Loop Control Statements, One Dimensional Array of Numbers and
Characters, Two-Dimensional Array, Introduction and Development of User Defined Functions,
Different Types of Variables and Parameters, Structure and Union, Introduction to Pointers,
Pointer Arithmetic, Array of Pointers, Pointers and Functions, Pointers and structures, File
Handling Operations.
Functions, Passing the arguments, Return values from functions, Recursion, Header Files Design,
File handling operations, Read and Write to Secondary Devices, Read and Write to Input and
Output Ports.
Include Graphics Library, Debugging, Linking, Compilation Option for Optimization, Make file.
Practicals will be based on the coverage of the above topics. (28 Hours)
Page 13 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
3. Practicals:
1 Basic commands of Windows and Linux
2 Installing and configuring using Windows and Linux
3 Flow chart drawing and writing pseudo steps or algorithms steps
4 Programming using different data structures
5 Solving complex problems
4. Books Recommended:
1. “Introduction to Computer Science”, Fourth Impression, Pearson Education, ITL Education Solutions
Limited, 2009.
2. Gottfried B.S., “Programming with C Schaum’s outline Series”, Outline Series, 2/E, Tata McGraw-Hill,
2006.
3. Brian W. Kernighan, Dennis M. Ritchie, “The C Programming language”, 2/E, Prentice Hall PTR
publication, 1988.
4. E. Balagurusamy, “Programming in ANSI C”, 6/E, Tata Mc-Graw Hill, 2012.
5. Pradip Dey, “Programming in C”, 2/E, Oxford University Press, 2012.
Page 14 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
WEB PROGRAMMING
L T P Credit
CSCS113S2
(BRANCH SPECIFIC COURSE-II) Scheme 3 0 2 04
2. Syllabus
Basics of Internet, World Wide Web, HTTP Protocol, Universal Resource Locator, Web Server,
Different Types of Web Servers, Domain Name Server, Web Server Configuration, Internet
Browser, Web Document and Mark-Up Language, Hypertext Mark-Up Language, Hypermedia,
Web Site Organization, Content Organization, Web Server on Different Operating System
Platforms, Web Applications, Web Interface, Web Standards & Accessible Design.
Web Page, Static Web Page, Hypertext Mark-Up Tags, Handling Font Style, Types, Size, Colour
Etc., Handling Table, List, Images, Graphics, Menu Etc.
Forms, Input Text Box, Drop Down Menu, Name Variable, Cookie Management, Session
Management, Animation, Structure Web Pages, Image Mapping, Link Setup In Image, Frames,
Structuring Web Pages Using Frames, Multimedia Handling, Linking To Pages.
Page 15 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Scripting Language, Dynamic Pages and Forms Validation, Validation of Input Text Box, Dynamic
Drop Down Menu, Validation and Accessing Name Variable-Value Pair, Cookie Management
Through Scripting, Session Management through Scripting, Animation through Scripting,
Dynamic Image Mapping Through Scripting, Link Handling through Scripting, Multimedia
Handling through Scripting.
Web Page Designing using Style Sheet, Different Types of Style Sheet, Defining Different Styles,
Export and Importing Style Sheet, Cascade Style Sheet.
Different Steps of Web Hosting and Publishing, Documents Interchange Standards, Website
Evaluation, Components of Web Publishing, Document Management, Search Engines, and
Registration of a Web Site on Search Engines, Publishing Tools.
Practicals will be based on the coverage of the above topics. (28 Hours)
3. Practicals:
1 To prepare the web page using hypertextmark-up language
2 To study and setup the web server for implementation
3 To learn client side scripting
4 To learn server side scripting
5 To apply style to the web pages
4. Books Recommended:
1. Martin C. Brown, “Python: The Complete Reference, Osborne / McGraw-Hill, 2018.
2. Thomas Powell and fritz Schneider, “JavaScript: The Complete Reference, McGraw-Hill, 2017.
3. J. Sklar, “Principles of Web Design”, 7/E, Cengage Learning, 2017.
4. H. Deitel, A. Deitel, “Internet and World Wide Web How to Program”, 5/E, Pearson, 2012.
5. Jon Duckett, “HTML & CSS Design and Build Websites”, John Wiley & Sons, Inc., 2011.
Page 16 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Page 17 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Set Definition, Finite and Infinite Sets, Equality of Sets, Disjoint Sets, Family of Sets, Types of Sets,
Operations on Sets, Algebra of Sets, Cardinality of a Set, Venn Diagrams, Multisets, Cartesian
Product, Principle Inclusion and Exclusion, Functions as a Set, Domain and Co-domain, Image,
Range, Types of Functions, Equal and Identity Functions, Invertible Functions, Composition of
Functions, Application of Functions in Computer Science Areas.
Basic Properties of Group, Groupoid, Semigroup & Monoid, Abelian Group, Subgroup, Cosets,
Normal Subgroup, Lagrange’s Theorem, Cyclic Group, Permutation Group, Homomorphism
&Isomorphism of Groups, Basic Properties, Error Correction & Detection Code.
Page 18 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Logic).
Graph Definition, Graph Representation, Basic Concepts Of Finite & Infinite Graph, Incidence
&Degree, Isomorphism, Subgraph, Walk, Path & Circuits, Cliques, Cycles and Loops, Operations On
Graphs, Connected Graph, Disconnected Graph & Components, Complete Graph, Regular Graph,
Bipartite Graph, Planar Graphs, Weighted Graphs, Directed &Undirected Graphs, Connectivity Of
Graphs.
Flows, Combinatorics, Euler’s Graph, Hamiltonian Paths & Circuits, Activity Planning and Critical
Path, Planar Graphs: Properties, Graph Coloring, Vertex Coloring, Chromatic Polynomials, Edge
Coloring, Planar Graph Coloring, Matching and Factorizations: Maximum Matching In Bipartite
Graphs, Maximum Matching In General Graphs, Hall’s Marriage Theorem, Factorization; Networks:
Max-Flow Min-Cut Theorem, Menger’s Theorem, Graph and Matrices.
Tutorials will be based on the coverage of the above topics separately (14 Hours)
3. Tutorials:
1 Examples using different set operations
2 Examples of defining groups and studying properties
3 Examples on formal verification and applying different functions
4 Examples of mathematical logics and relations
5 Examples of recurrence and counting
4. Books Recommended:
1. Rosen K.H., "Discrete Mathematics and Its Applications", 6/E, MGH, 2006.
2. Liu C.L., "Elements of Discrete Mathematics", MGH, 2000.
3. Deo Narsingh., "Graph theory with applications to Engineering & Computer Science", PHI, 2000.
4. J A Bondy and USR Murty, “Graph Theory”, Springer, 2008.
Page 19 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Page 20 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Review of Concepts: Information and Meaning, Abstract Data Types, Internal Representation of
Primitive Data Structures, Arrays, Strings, Structures, Pointers.
Sequential and Linked Representations of Linear Lists, Comparison of Insertion, Deletion and
Search Operations for Sequential and Linked Lists, Doubly Linked Lists, Circular Lists, Lists in
Standard Template Library(STL), Applications Of Lists.
STACKS (06Hours)
Page 21 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Binary Trees and Their Properties, Terminology, Sequential and Linked Implementations, Tree
Traversal Methods and Algorithms, Complete Binary Trees, General Trees, AVL Trees, Threaded
Trees, Arithmetic Expression Evaluation, Infix-Prefix-Postfix Notation Conversion, Heaps as
Priority Queues, Heap Implementation, Insertion and Deletion Operations, Heapsort, Heaps in
Huffman Coding, Tournament Trees, Bin Packing.
Issues in Large Dictionaries, M-Way Search Trees, BTrees, Search, Insert and Delete Operations,
Height of B-Tree, 2-3 Trees, Sets and Multisets in STL.
Tutorials will be based on the coverage of the above topics separately (14 Hours)
Practicals will be based on the coverage of the above topics separately (28 Hours)
3. Tutorials:
1 Problems on Array
2 Problems on Stack and Queue
3 Problems on Linked List
4 Problems on Trees
5 Problems on Graph
4. Practicals:
1 Implementation of Array and its applications
2 Implementation of Stack and its applications
3 Implementation of Queue and its applications
4 Implementation of Link List and its applications
Page 22 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
5. Books Recommended:
1. Trembley & Sorenson: "An Introduction to Data Structures with Applications", 2/E, TMH, 1991.
2. Tanenbaum & Augenstein: "Data Structures using C and C++", 2/E, Pearson, 2007.
3. Horowitz and Sahani: "Fundamentals of Data Structures in C", 2/E, Silicon Press, 2007.
4. T. H. Cormen, C. E. Leiserson, R. L. Rivest: "Introduction to Algorithms",3/E, MIT Press, 2009.
5. Robert L.Kruse, C.L.Tondo and Brence Leung: "Data Structures and Program Design in C", 2/E,
PearsonEducation, 2001.
Page 23 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Basics CPU Organization - Functional Units, Data Paths, Registers, Stored Program Concept, Data
Representation - Basic Formats, Fixed and Floating Point Representation, Instruction Sets,
Instruction Types, Instruction Formats, Addressing Modes, Designing of an Instruction Set, Data
path Design, Concepts of Machine Level Programming, Assembly Level Programming and High Level
Programming.
Arithmetic and Logical Operation and Hardware Implementation, Implementation of some Complex
Operation: Fixed-Point Arithmetic Multiplication Algorithms-Hardware Algorithm, Booth
Multiplication Algorithm, Division Algorithm, Divide Overflow Algorithm, Combinational ALU and
Sequential ALU, Floating Point Arithmetic Operations.
Page 24 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
3. Tutorials:
1 Problems on data conversion in various formats and floating-point representation
2 Solving computations involving complex arithmetic operations and hardware implementation of the
same
3 Interpretation of basic instruction execution and various addressing modes possible
4 Learning instruction set architecture level instructions for the high level language programming
5 Problems on memory management, mapping and replacement policies
4. Practicals:
1 Implementation of arithmetic operations on various number systems
2 Implementation of basic combinatorial logic circuits in Logisim
3 Implementation of complex combinatorial logic circuits in Logisim
4 Design storage components as per the given specifications
5 Design of arithmetic logic unit and its associated control unit
Page 25 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
5. Books Recommended:
1. John L. Hannessy, David A. Patterson, "Computer organization and Design", 3/E, Morgan Kaufmaan,
reprint -2003.
2. Andrew S. Tanenbaum, "Structured Computer Organization", 6/E, PHI EEE, reprint 1995.
3. William Stallings,"Computer Organization & Architecture: Designing For Performance", 6/E, PHI, 2002.
4. Carl Hamacher, Zvonko Vranesic, Safwat Zaky, "Computer Organization", 5/E, McGraw-Hill, 2002.
5. Morris Mano, "Computer Systems Architecture", 3/E, PHI, reprint 1997.
Page 26 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
1. Course Outcomes(COs):
At the end of the course, students will be able to
CO1 acquire knowledge about different types of diodes and circuits.
CO2 apply the knowledge of gates, Boolean algebra and operational amplifier in designing logical and
integrated circuits.
CO3 analyse the logical, integrated, and operational amplifier based circuits.
CO4 evaluate the different circuits and compare their performance.
CO5 design ALU and control unit.
2. Syllabus
PN DIODE AND TRANSITOR (04 Hours)
PN Diode Theory, PN Characteristic and Breakdown Region, PN Diode Application as Rectifier,
Zener Diode Theory, Zener Voltage Regulator, Diode as Clamper and Clipper, Photodiode Theory,
LED Theory, 7 Segment LED Circuit Diagram and Multi Colour LED, LASER Diode Theory and
Applications, Bipolar Junction Transistor Theory, Transistor Symbols And Terminals, Common
Collector, Emitter and Base Configurations, Different Biasing Techniques, Concept of Transistor
Amplifier, Introduction to FET Transistor And Its Feature.
WAVESHAPING CIRCUITS AND OPERATIONAL AMPLIFIER (06 Hours)
Linear Wave Shaping Circuits, RC High Pass and Low Pass Circuits, RC Integrator and Differentiator
Circuits, Nonlinear Wave Shaping Circuits, Two Level Diode Clipper Circuits, Clamping Circuits,
Operational Amplifier OP-AMP with Block Diagram, Schematic Symbol of OP-AMP, The 741
Package Style and Pinouts, Specifications of Op-Amp, Inverting and Non-Inverting Amplifier,
Voltage Follower Circuit, Multistage OP-AMP Circuit, OP-AMP Averaging Amplifier, OP-AMP
Subtractor.
BOOLEAN ALGEBRA AND SWITCHING FUNCTIONS (04 Hours)
Basic Logic Operation and Logic Gates, Truth Table, Basic Postulates and Fundamental Theorems of
Boolean Algebra, Standard Representations of Logic Functions- SOP and POS Forms, Simplification
of Switching Functions-K-Map and Quine-Mccluskey Tabular Methods, Synthesis of Combinational
Logic Circuits.
Page 27 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Binary Parallel Adder; BCD Adder; Encoder, Priority Encoder, Decoder; Multiplexer and
Demultiplexer Circuits; Implementation of Boolean Functions Using Decoder and Multiplexer;
Arithmetic and Logic Unit; BCD to 7-Segment Decoder; Common Anode and Common Cathode 7-
Segment Displays; Random Access Memory, Read Only Memory And Erasable Programmable
ROMS; Programmable Logic Array (PLA) and Programmable Array Logic (PAL).
3. Tutorials:
1 Problems on different diode based circuits and wave shaping circuit design
2 Problems on logic gates and application of operational amplifiers
3 Problems on boolean algebra and logical circuit design
4 Problems on designing sequential circuits using digital logic gates and integrated circuits
5 Problems on designing ALU and CPU
Page 28 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
4. Practicals:
1. Study of BJT Characteristics
2. Study of CE Amplifier
3. Study of RC Coupled / Tuned Amplifier
4. Study of FET Characteristics
5. Study of Diode Clipper Circuits
6. Study of Diode Clamper Circuits
7. Study and Implement RC Low Pass and High Pass Filter Circuits
8. Study and Implement RC Integrator Circuits
9. Study and Implement RC Differentiator Circuits
10. Full and Half-Adder/ Half-subtarctor Circuits using a serial Input
11. 4-Bit Gray to Binary/ Binary to Gray Code convertor using Select input
12. Logic expression with the Help of MUX IC 74153
13. Flip-flops using NAND/ NOR Gate
14. Modulo-7 Ripple Counter
15. 4-Bit Shift Left/Right Register
16. Sequence Generator
5. Books Recommended:
1. Schilling Donald L. and Belove E., "Electronics Circuits- Discrete and Integrated", 3rd Ed., McGraw-
Hill, 1989, Reprint 2008.
2. Millman Jacob, Halkias Christos C. and Parikh C., "Integrated Electronics", 2nd Ed., McGraw-Hill,
2009.
3. Taub H. and Mothibi Suryaprakash, Millman J., "Pulse, Digital and Switching Waveforms", 2nd Ed.,
McGraw-Hill, 2007.
4. Mano Morris, “Digital Logic and Computer Design”, 5th Ed., Pearson Education, 2005.
5. Lee Samual, “Digital Circuits and Logic Design”, 1st Ed., PHI, 1998.
Page 29 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
AM, AM Index, Frequency spectrum, Average Power for Sinusoidal AM, Effective Voltage and
Current, Non sinusoidal Modulation, DSBFC & DSBSC Modulation, Amplitude modulator and
Demodulator Circuits, AM Transmitters.
Page 30 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Frequency Modulation (FM), Frequency spectra, Average power, Deviation Ratio, Measurement of
Modulation Index, Phase Modulations (PM), Sinusoidal PM, Digital PM, Angle Modulator Circuits,
FM Transmitters, Angle Modulations Detectors.
Pulse Amplitude Modulation, Pulse Code Modulation, Delta Modulation, Pulse Frequency
Modulation, Pulse Time Modulation, Pulse Position modulation and Pulse Width Modulation.
Introduction and representation of Digital Modulated Signal, ASK, PSK, FSK, QAM with
Mathematics and Constellation Diagram, Spectral Characteristics of Digitally Modulated Signals.
M-Ary Digital Carrier Modulation.
FIBER-OPTIC COMMUNICATIONS (06 Hours)
Principles of Light Transmission in Fiber Losses in Fibers, Dispersion, Light Sources and Detectors
for Fiber Optics.
3. Practicals:
4. Books Recommended:
1. Dennis Roddy & John Coolen, “Electronic Communications”, PHI, 4/E, 1995.
Page 31 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. George Kennedy, “Electronic Communication Systems”, 3/E, McGraw Hill Book Co., 1993.
3. Simon Haykin, “Communication Systems”, 2/E, Wiley Eastern Ltd, 1994.
4. Taub and Schilling, “Principles of communication Systems”,3/E, Mc Graw Hill Publication, 1992.
5. B. P. Lathi, ”Modern digital and analog communication systems”,4th Ed., Holt, Sounders Pub. 1998.
1. Lathi B. P. and Ding Zhi, "Modern Digital and Analog Communication Systems", Oxford University Press,
4th Ed., 2010.
2. Proakis J. and Salehi M., "Fundamental Of Communication Systems", PHI/Pearson Education-LPE, 2nd Ed.,
2006.
Page 32 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Page 33 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Tutorials will be based on the coverage of the above topics separately. (14 Hours)
3. Tutorials:
1 Preliminary exercises based on different terminology learned of various Graphs and statistics
2 Use different types of graph and its algorithm for solving basic problems
3 Use probability and estimation methods for solving different problems in core subjects
4 Use different graphical models to build different network models for high end applications
4. Books Recommended:
1. Gilbert Strang, “Introduction to Linear Algebra”, Wellesley Cambridge Press, 4th Ed., 2009.
2. Kenneth Hoffman and Ray Kunze, “Linear Algebra”, 2nd Ed., Prentice Hall India, 2013.
3. David C. Lay, “Linear Algebra and its applications”, 3rd Ed., Pearson, 2006.
4. A. Papoulis and S. U. Pillai, “Probability, Random Variables and Stochastic Processes”, 4th Ed., Mc-
Graw Hill, 2002.
5. Murray R. Spiegel, John J. Schiller, R. Alu Srinivasan, “Theory and Problems of Probability and
Page 34 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
1. Gilbert Strang, “Linear Algebra and its Applications”, Cengage Learning, 4th Ed., 2006.
2. Cheney and Kincaid, “Linear Algebra”, 2nd Ed., Jones and Bartlett learning, 2014.
3. Koller, D. and Friedman, N.,“Probabilistic Graphical Models: Principles and Techniques”, MIT Press,
2009.
4. Jensen, F. V. and Nielsen, T. D.,“Bayesian Networks and Decision Graphs. Information Science and
Statistics”, Springer, 2nd edition, 2002.
Page 35 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
INTRODUCTION TO MICROPROCESSORS EVOLUTION (02 Hours)
Introduction to Microprocessor and Development and its Operation.
Page 36 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Access and 8237 DMA Controller, The 8279 Programmable Keyboard/Display Interface, Interfacing
Scanned Multiplexed Displays and Liquid Crystal Displays, Interfacing a Matrix Keyboard, Serial I/O
and Data Communication: Basic concepts in Serial I/O, Software-Controlled Asynchronous Serial
I/O, The 8085-Serial I/O lines: SOD and SID, Hardware Controlled Serial I/O Using Programmable
Chips.
8086 ARCHITECTURE (03 Hours)
8086 Architecture, Pin Out Diagram and its Features, Registers of 8086.
Tutorials will be based on the coverage of the above topics separately (14 Hours)
Practicals will be based on the coverage of the above topics separately (28 Hours)
(Total Contact Time: 42 Hours + 14 Hours + 28 Hours= 84 Hours)
3. Practicals:
Page 37 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
4. Books Recommended:
1. Abel Peter and Nizamuddin, "IBM PC Assembly Language and Programming", 5/E, Pearson
Education, 2001.
Page 38 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Basic Concepts, Design Process, Constraints, Keys, Design Issues, E-R Diagrams, Attribute Types,
Mapping Cardinality, Types of Relationship, Weak/Strong Entity Sets, Extended E-R Features –
Generalization, Specialization, Aggregation.
Functional Dependency – Definition, Trivial and Non-trivial FD, Closure of FD Set, Closure of
Attributes, Irreducible Set of FD, Normalization – 1Nf, 2NF, 3NF, Decomposition using FD-
Dependency Preservation, BCNF, Multi- Valued Dependency, 4NF, Join Dependency and 5NF.
Page 39 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Overview of Query Processing, Measures of Query Cost, Select Operation, Sorting, Join
Operation, Other Operations, Evaluation of Expressions, Overview of Query Optimization,
Transformation of Relational, Expressions, Estimating Statistics of Expression Results, Choice of
Evaluation Plans, Materialized Views, Advanced Topics in Query Optimization.
Data Security: Introduction, Discretionary Access Control, Mandatory Access Control, Data
Encryption, Semi Structured Data and XML, Object Oriented and Object Relational DBMS,
Distributed DBMS, NOSQL DBMS.
Tutorials will be based on the coverage of the above topics separately (14 Hours)
Practicals will be based on the coverage of the above topics separately (28 Hours)
3. Tutorials:
1 Introduction and application of DBMS
2 Designing Relational Models, ER Models and Relational databases
3 Query solving using SQL and PL/SQL
4 Optimum query designing
5 Managing Locks for the management of Transactions and concurrent access of the database
4. Practicals:
1 Implementation for Physical data storage (Sequential, Index Sequential..)
Page 40 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2 Practicing DDL and DML Queries for database creation and managing the data
3 Develop a Database system for the real life application scenario by managing the storage constrains
4 Practicing PL/SQL with the designed databases
5 Design considering Transaction management and concurrency control
6 Design of ER model based example
7 Design of Relational model based example
8 Design of Normalized form of database
5. Books Recommended:
Page 41 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Sorting & Order Statistics, Divide and Conquer Technique, Various Comparison based Sorts,
Analysis of the Worst-Case and the Best-Cases, Randomized Sorting Algorithms, Lower Bound on
Sorting, Non-comparison based Sorts, Medians and Order Statistics, Min-Max Problem, Polynomial
Multiplication, Fast Fourier Transform.
Basic Greedy Control Abstraction, Motivation, Thirsty Baby Problem, Formalization, Activity
Selection and its Variants, Huffman Coding, Horn Formulas, Tape Storage Problem, Container
Loading Problem, Knapsack Problem, Graph Algorithms, Graph algorithms: All-pairs Shortest
Paths, Topological Ordering of DAG, DFS in Directed Graphs, Strongly Connected Components,
Minimum Spanning Trees, Single Source Shortest Paths, Maximum Bipartite Cover Problem,
Network Flows: Ford Fulkerson Algorithm, Max-flow Min-cut Theorem, Polynomial Time
Algorithms for Max-flow.
Page 42 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Motivation, Matrix Multiplication Problem, Assembly Line Problem, Coin Changing Problem,
Longest Common Subsequence, 0/1 Knapsack problem, All-pairs Shortest Path Problems, Dynamic
Programming Control Abstraction, Optimal Binary Search Tree.
Backtracking, N-Queens Problem, Sum of Subset Problem, Complexity Analysis, Branch & Bound,
Least Cost Branch & Bound (LCBB), LCBB Complexity Analysis, 15-Puzzle Problem, Traveling Sales
Person Problem.
Number Theoretic Notions, GCD, Modular Arithmetic, Chinese Remainder Theorem, Generators,
Cyclic Groups, Galois Fields, Applications in Cryptography, Primality Testing.
Polynomial Time, Verification, NP-completeness, Search Problems, Reductions, Dealing with NP-
Completeness, Approximation Algorithms, Local Search Heuristics.
Tutorials will be based on the coverage of the above topics. (14 Hours)
Practicals will be based on the coverage of the above topics. (28 Hours)
3. Practicals:
1 Practical based on time analysis of sorting algorithms.
2 Practical based on divide and conquer technique.
3 Practical based on greedy design technique.
4 Practical based on dynamic programming.
5 Practical based on searching algorithms.
6 Practical based on back tracking technique.
7 Practical based on Graph based algorithms.
8 Practical based on branch and bound technique.
4. Books Recommended:
1. Cormen, Leiserson, Rivest, Stein,” Introduction to Algorithms”, 3/E, MIT Press, 2009.
Page 43 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Page 44 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Page 45 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Tutorials will be based on the coverage of the above topics. (14 Hours)
3. Tutorials:
1 Problem statements based on Regular Language and Finite Automata.
2 Questions based on Context Free Grammar.
3 Problems regarding Push Down Automata.
4 Solving Problems for Turing Machine.
5 Decidable and Undecidable Problems.
4. Books Recommended:
1. Sushil Kumar Azad, “Theory of Computation, An introduction to /automata, Formal Languages And
Computability”, Dhanpat Ray & Co., New Delhi, 2005.
2. A.M. Natarajan, A.Tamilarasi, “Theory of computation”, New Age Publication, 1/E, 2003.
Page 46 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Page 47 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
I/O MANAGEMENT AND DISK SCHEDULING (04 Hours)
I/O Device, Organisation of the I/O Function, Operating System Design Issue, I/O Buffering, Disk
Scheduling, RAID, Disk Cache, Case Study: Linux & Windows I/O.
Practicals will be based on the coverage of the above topics separately (28 Hours)
(Total Contact Time: 42 Hours + 14 Hours + 28 Hours= 84 Hours)
3. Tutorials:
1 Assignment based on Process scheduling algorithm.
2 Questions based on Page replacement algorithm.
3 Assignment based on Banker’s algorithm.
4 Assignment based on Semaphores and monitors.
5. Practicals:
1 Introduction to Basic and Advance commands of Linux.
2 Introduction to Shell Script and programs based on it.
3 Practical based on different Memory management scheme.
Page 48 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
6. Books Recommended:
1. Silberschatz, Galvin and Gagne, "Operating System Concepts", 10/E, John Wiley & Sons, 2018.
2. W. Stallings, "Operating Systems: Internals and Design Principles", 9/E, Pearson Pub., 2017.
3. W Richard Stevens, Stephen A Rago, "Advanced Programming in the UNIX Environment"; 3/E,
Addison Wesley Professional, 2013.
4. Kernighan & Pike, "UNIX programming Environment", 2/E, PHI-EEE, 2001.
5. A Tanenbaum, A Woodhull, "Operating Systems - Design and Implementation", 3/E, PHI EEE, 2006.
1. Crawley, "Operating Systems - A Design Oriented Approach", 1/E, McGraw Hill, 1998.
Page 49 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Overview of Computer Networks and Data Communication, Computer Networking Protocols and
Standards, Types of Computer Networks, Network Topology, Protocol Hierarchies and Design
Issues, Interfaces and Services, Networking Devices, OSI and TCP/IP Reference Models.
Physical Layer Design Issues, Data Transmission Techniques, Multiplexing, Transmission Media,
Asynchronous Communication, Wireless Transmission, ISDN, ATM, Cellular Radio, Switching
Techniques and Issues.
LLC Design Issues, Framing, Error and Flow Control, Framing Techniques, Error Control Methods,
Flow Control Methods, PPP and HDLC.
MAC Layer Design Issues, Channel Allocation Methods, Multiple Access Protocols - ALOHA, CSMA,
CSMA/CD Protocols, Collision Free Protocols, Limited Contention Protocols, LAN Architectures, IEEE
-802 Standards, Ethernet(CSMA/CD), Token Bus, Token Ring, DQDB, FDDI, Bridges and Recent
Page 50 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Developments.
Network Layer Design Issues, Routing Algorithms and Protocols, Congestion Control Algorithms and
QoS, Internetworking, Addressing, N/W Layer Protocols and Recent Developments.
Transport Layer Design Issues, Transport Services, Sockets, Addressing, Connection Establishment,
Connection Release, Flow Control and Buffering, Multiplexing, Transport Layer Protocols, Real Time
Transport Protocol (RTP), Stream Control Transmission Protocol (SCTP), Congestion Control, QoS
and Recent Developments, Virtualization, Network Functions Virtualization(NFV), Software Defined
Networks.
Client Server Model, Domain Name System (DNS), Hyper Text Transfer Protocol (HTTP), Email:
SMTP, MIME, POP3, Webmail, FTP, TELNET, Dynamic Host Control Protocol (DHCP), Simple
Network Management Protocol (SNMP) and Recent Developments.
Tutorials will be based on the coverage of the above topics separately (14 Hours)
Practicals will be based on the coverage of the above topics separately (28 Hours)
(Total Contact Time: 42 Hours + 14 Hours + 28 Hours= 84 Hours)
3. Practicals:
1 Study network configuration commands and computer network setup.
2 Implementation of different Data Link and MAC Layer protocols.
3 Implementationof different Network Layer protocols.
4 Implementation of different Transport and Application Layer protocols.
5 Design and configure a network systems using modern network simulator softwares.
6 Implementation of Secured Socket Layer protocol.
7 Implementation of ICMP based message transmission over network.
8 Implementation of SMTP protocol for mail transfer.
4. Tutorials:
1 Problem solving on basics of data communication and networking.
2 Problem solving on framing, error control and flow control of Data link layer.
Page 51 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
5. Books Recommended:
1. William Stalling, "Data and Computer Communication", 10/E, Pearson India, 2017.
2. B. Forouzan, "Data Communication and Networking", 5/E, McGraw Hill, 2017.
3. Douglas E. Comer, "Internetworking with TCP/IP Volume – I”, 6/E Pearson India, 2015.
4. Andrew S. Tanenbaum, "Computer Network", 5/E, Pearson India, 2013.
5. W. Richard Stevens, "TCP/IP Illustrated Volume - I", 2/E, Addison Wesley, 2011.
Page 52 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Linear Regression, Gradient Descent, Support Vector Machines, Artificial Neural, Networks,
Decision Trees, ML and MAP Estimates, K-Nearest Neighbor, Naive Bayes, Bayesian Networks,
Classification, Overfitting, Regularization, Multilayer Networks, Back-propagation, Bayes
Classification, Nearest Neighbor Classification, Cross Validation and Attribute Selection, K Means
Clustering, Agglomerative Hierarchical Clustering.
K-Means Clustering, Gaussian Mixture Models, Learning with Partially Observable Data,
Expectation Maximization Approach. Dimensionality Reduction, Principal Component Analysis,
Model Selection and Feature Selection.
Page 53 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Signal Processing Application, Image Processing, Biometric Recognition, Face and Speech
Recognition, Information Retrieval, Natural Language Processing.
3. Practical:
4. Books Recommended:
1. Geoff Dougherty, “Pattern Recognition and Classification: An Introduction”, 1st Edition, Springer,
2013.
2. Theodoridis and K.Koutroumbas, “Pattern Recognition”, 4th Ed., Academic Press, 2009.
3. Christopher M. Bishop, “Pattern Recognition and Machine Learning”, 1 st Edition, Springer, 2006.
4. Richard O. Duda, Peter E. Hart, David G. Stork, “Pattern Classification”, 2 nd Edition, Wiley, 2001.
5. K. Fukunaga, “Introduction to Statistical Pattern Recognition”, 2 nd Edition, Academic Press, 2000.
1. Ranjjan Shinghal, “Pattern Recognition Techniques and Application”, 1st Edition, Oxford university
press, 2006.
Page 54 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Introduction, Meaning of Ethics, Approaches to Ethics, Major attributes of Ethics, Business Ethics,
Factors influencing Ethics, Importance of Ethics, Ethics in Management, Organizational Ethics, Ethical
aspects in Marketing, Mass communication and Ethics - Television, Whistle blowing, Education –
Ethics and New Professional, Intellectual Properties and Ethics, Introduction to Professional Ethics,
Engineering Ethics.
Introduction To Economics, Applications & Scopes Of Economics, Micro & Macro Economics,
Demand Analysis, Demand Forecasting, Factors Of Production, Types Of Cost, Market Structures,
Break Even Analysis.
Page 55 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Tutorials will be based on the coverage of the above topics separately (02 Hours)
3. Books Recommended:
1. Balachandran V. and Chandrasekaran, “Corporate Governance, Ethics and Social Responsibility”,
PHI, 2nd Edition, 2011.
2. Prasad L.M., “Principles & Practice of Management, Sultan Chand & Sons”, 8th Edition, 2015.
3. Banga T. R. & Shrama S.C., “Industrial Organisation & Engineering Economics”, Khanna Publishers,
25th Edition, 2015.
4. Everett E. Adam, Ronald J. Ebert, “Production and Operations Management”, Prentice Hall of India,
5th edition, 2012.
5. Kotler P., Keller K. L, Koshi A.& Jha M., “Marketing Management – A South Asian Perspective”,
Pearson, 14th Edition, 2014.
6. Tripathi P.C., Personnel Management & Industrial Relations, Sultan Chand & sons, 21st Edition, 2013
7. Chandra P., Financial Management, Tata McGraw Hill, 9th Edition, 2015.
Page 56 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Software Process - Software Development Life Cycle – Software Qualities - Problems with
Software Production – Brooke’s No Silver Bullet.
SOFTWARE LIFE-CYCLE MODELS (04 Hours)
Build-and-Fix, Waterfall, Rapid Prototyping, Incremental, Spiral, Agile, Comparison, ISO 9000 –
CMM levels , Comparing ISO 9000 and CMM.
SOFTWARE REQUIREMENTS AND ANALYSIS (06 Hours)
Page 57 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Formal Specifications, Software Verification & Validation, Clean Room Engineering, Formal
Approaches, Model Checking, SPIN Tool for Distributed Software.
CASE Tools, Stepwise Refinement, Cost-Benefit Analysis, Scope of CASE, Versions Control,
Current State of the Art in Software Engineering.
SOFTWARE TESTING PRINCIPLES (06 Hours)
Non-execution & Execution based Testing, Automated Static Analysis, Test-Case Selection,
Black-Box and Glass-Box Testing, Testing Objects, Testing vs. Correctness Proof.
Tutorials will be based on the coverage of the above topics separately (14 Hours)
Practicals will be based on the coverage of the above topics separately (28 Hours)
3. Books Recommended:
Page 58 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Page 59 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Architecture and Programming Including Xeon and Others, Dual Processors, DSP Processors,
Various Peripherals and Interfacing Including Memory and I/O.
Bus Characteristics, Bus Design Considerations, Bus Communications, Bus Standards, Bus Details.
3. Books Recommended:
1. Douglas V Hall, "Microprocessors and Interfacing: Programming & Hardware", 3/E, TMH, 2013.
2. Barry B. Brey, "The Intel Microprocessors: 8086/8088, 80186/80188, 80286, 80386, 80486,
Pentium, Pentium Pro Processor, Pentium II, Pentium III, Pentium 4, and Core2 with 64-bit
Extensions, 8/e, 2008.
3. Mohamed Ali Mazidi, Janice Gillispie Mazidi, Rolin McKinlay, “The 8051 Microcontroller and
Embedded Systems: Using Assembly and C”, 2nd Edition, Pearson Education, 2011.
4. James L. Antonakos, "An introduction to the Intel Family of Microprocessors", 3/E, Pearson
Education, Reprint 2001.
5. Shameem Akhter and Jason Roberts, “Multi-Core Programming: Increasing Performance through
Software Multi-Threading”, Intel Press, 2006.
1. Maurice Herlihy and NirShavit, “The Art of Multiprocessor Programming“, Revised First Edition,
Elsevier Publication, 2012.
Page 60 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
INTRODUCTION (04 Hours)
Implicit Parallelism: Microprocessor Architectures, Limitations of Memory System Performance,
Dichotomy of Parallel Computing Platforms, Parallel Platforms and Its Physical Organization,
Routing Mechanisms for Networks, Communication Costs in Parallel Machines, Impact of
Process-Processor Mapping and Mapping Techniques.
PARALLEL ALGORITHM DESIGN ALGORITHMS (06 Hours)
Preliminaries, Decomposition Techniques, Load Balancing in Parallel System, Mapping
Techniques for Load Balancing, Tasks and Interactions, Interaction Overheads, Parallel Algorithm
and its Models.
COMMUNICATION OPERATIONS (06 Hours)
One-To-All Broadcast and All-To-One Reduction, All-To-All Broadcast and Reduction, All-Reduce
and Prefix-Sum Operations, Scatter and Gather, All-To-All Personalized Communication, Circular
Shift, Improving the Speed of Some Communication Operations.
ANALYTICAL MODELING (06 Hours)
Sources of Overhead in Parallel Programs, Performance Metrics, Effect of Granularity and Data
Mapping on Performance, Scalability, Minimum Execution Time and Minimum Cost-Optimal
Execution Time, Asymptotic Analysis of Parallel Programs.
MESSAGE PASSING PARADIGM (06 Hours)
Principles of Message-Passing Programming, The Building Blocks for Send and Receive
Page 61 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Operations, MPI for The Message Passing Interface, Topologies, Embedding, Overlapping
Communication with Computation, Collective Communication and Computation Operations,
Groups and Communicators.
SHARED ADDRESS SPACE PLATFORMS THREAD BASICS (04 Hours)
Thread Application Programmer Interface, Synchronization Primitives, Controlling Thread and
Synchronization Attributes, Thread Cancellation, Composite Synchronization Constructs.
ALGORITHMIC APPROACHES (05 Hours)
Matrix-Vector Multiplication, Matrix-Matrix Multiplication, Issues in Sorting on Parallel
Computers, Sorting Networks, Bubble Sort and its Variants, Quick Sort: Definitions and
Representation, Minimum Spanning Tree: Prim's Algorithm, Single-Source Shortest Paths:
Dijkstra's Algorithm, All-Pairs Shortest Paths.
ADVANCE TOPICS AND TOOLS (05 Hours)
Counting Problems, Interactive Proofs, Probabilistically Checkable Proofs, OpenMP Tools,
OpenMP Compilers, High Performance Parallel Programming, CUDA.
(Total Contact Time: 42 Hours)
3. Books Recommended:
1. Kai Hwang, F. Briggs, "Computer Architecture and Parallel Processing", McGraw Hill International
Edition, Reprint 2006.
2. M. Flynn, "Computer Architecture: Pipelined and Parallel Processor Design", 1/E, Jones and
Bartlett, 1995.
3. Harry F. Jordan, "Fundamentals of Parallel Processing", 1/E, Prentice Hall, 2002.
4. Kai Hwang, "Advanced Computer Architecture: Parallelism, Scalability, Programmability", 1/E,
Tata McGraw Hill, Reprint 2008.
5. Ananth Grama, Anshul Gupta, George Karypis, Vipin Kumar, “Introduction to Parallel Computing”,
2/E, Pearson Publication, 2003.
Page 62 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Information Source, Symbols and Entropy, Mutual Information, Information Measures for
Continuous Random Variable, Joint and Conditional Entropy, Relative Entropy, Applications
Based on Information Theoretic Approach.
Source Coding Theorem, Kraft Inequality, Shannon-Fano Codes, Huffman Codes, Run Length
Code, Arithmetic Codes, Lempel-Ziv-Welch Algorithm, Universal Source Codes, Prefix Codes,
Variable Length Codes, Uniquely Decodable Codes, Instantaneous Codes, Shannon’s Theorem,
Shannon Fano Encoding Algorithm, Shannon’s Noiseless Coding Theorem, Shannon’s Noisy
Coding Theorem.
Channel and its Capacity, Continuous and Gaussian Channels, Discrete Memory-Less Channels,
Symmetric Channel, Binary Erasure Channel, Estimation of Channel Capacity, Noiseless Channel,
Channel Efficiency, Shannon’s Theorem on Channel Capacity, MIMO Channels, Channel Capacity
with Feedback.
Page 63 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Video Coding Basics, Quantization, Symbol Encoding, Intraframe Coding, Predictive Coding,
Transform Coding, Subband Coding, Vector Quantization, Interframe Coding, Motion
Compensated Coding, Image Compression, JPEG, LZ78 Compression, Dictionary Based
Compression, Statistical Modelling, Variable Length Coding, Bit Allocation.
Overview of Field, Group, Galois Field, Types of Codes, Hamming Weight, Minimum Distance
Based Codes, Error Detection and Error Correction Theorems, Maximum Likelihood Decoder,
MAP Decoder, Linear Block Codes and Their Properties, Equivalent Codes, Generator Matrix and
Parity Check Matrix, Systematic Codes, Cyclic Codes, Convolution Codes and Viterbi Decoding
Algorithm, Turbo Codes and Low Density-Parity-Check Codes, Asymptotic Equipartition Property.
Rate Distortion Function, Random Source Codes, Joint Source-Channel Coding and the Separation
Theorem.
3. Books Recommended:
1. R. Bose, “Information Theory, Coding and Cryptography”, 3rd Edition, McGraw-Hill, 3rd Ed., 2016.
2. R. Johannesson and K.S. Zigangirov, “Fundamentals of Convolutional Coding”, 2nd Edition,
Wiley-IEEE Press, 2015.
3. T. M. Cover and J. A. Thomas,” Elements of Information Theory”, 2 nd Edition John Wiley & Sons,
New York, 2012.
4. A. B. Robert, “Information Theory”, 2nd Edition, Dover Special Priced Titles, 2007.
5. R. M. Roth, “Introduction to Coding Theory”, Cambridge University Press, 2006.
1. R.H. Morelos-Zaragoza, “The Art of Error Correcting Coding”, Wiley and sons, 2006.
2. T. K. Moon, “Error Correction Coding: Mathematical Methods and Algorithms”, Wiley, 2005.
3. S. Lin and D. J. Costello, “Error Control Coding”, 2nd Edition, Prentice-Hall, 2004.
4. Mark Nelson, Jean-Loup Gailly, “Data Compression” ,2nd Ed., BPB Publication,1996.
5. R. Hill, ”A First Course in Coding Theory”, Oxford University Press, 1986.
Page 64 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Object Oriented Fundamentals, Basic Structural Modelling, UML Model, Class Diagrams, Object
Diagrams, Packages and Interfaces, Case Studies.
Use Case Diagrams, Interaction Diagrams, State Chart Diagrams, Collaborations, Design Patterns,
Component Diagrams, Deployment Diagrams, Case Studies.
Implications of Inheritance on Testing, State Based Testing, Adequacy and Coverage, Scenario
Based Testing, Testing Workflow, Case Studies, Object Oriented Metrics.
Page 65 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
3. Books Recommended:
1. Bahrami A., “Object Oriented System Development”, McGraw Hill, 1/E, 2017, ISBN: 9780070265127.
2. Page Jones M., “Fundamentals of Object Oriented Design in UML”, Pearson Education, 2/E, 2005,
ISBN: 9780321267979.
3. Baugh J., Jacobson I. & Booch G., “The unified Modelling Language Reference Manual”, Addison
Wesley, 2/E, 2004, ISBN-13: 978-0321718952.
4. Booch G., Rumbaugh J. & Jacobsons I., “The Unified Modelling Language User Guide”, Addison
Wesley 3/E, 2004, ISBN: 9789332553941.
5. Simon Benett, Steve Mc Robb & Ray Farmer, “Object Oriented System Analysis and Design using
UML”, McGraw Hill, 2/E, 2004, ISBN: 9780070597914.
1. Lar Man C., Applying UML & Patterns: “An Introduction to Object-Oriented Analysis& Design”,
Addison Wesley, 2002, ISBN: 9780201699463.
Page 66 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Concepts of Artificial Intelligence, Need of Machine Learning, Learning Methods, Soft Computing
Approach, Fuzzy Computing, Neural Computing, Genetic Algorithms, Associative Memory,
Adaptive Resonance Theory, Applications.
Model of Artificial Neuron, Neural Network Architectures, Weights, Activation Functions, Learning
Models, Learning Rate, Bias, McCulloch Pitts Neuron, Single Layer Neural Network, Multi Layers
Neural Networks, Training Algorithms, Back Propagation Method, Supervised Learning,
Unsupervised Learning, Radial Basis Functions, Auto-associative Memory, Bi-directional Hetero-
associative Memory, Hopfiled Network, Kohonen Self-organizing Network, Learning Vector
Quantization, Simulated Annealing Network, Boltzmann Machine, Applications.
Fuzzy Sets, Membership, Fuzzy Operations, Properties, Fuzzy Relation, Fuzzy Systems, Fuzzy Logic,
Fuzzification, Fuzzy Inference, Decision Making, Fuzzy Rule based System, De-fuzzification,
Applications.
Page 67 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Ant Colony, Particle Swarm Optimization, Integrating Neural Networks, Fuzzy Logic, and Genetic
Algorithms, GA based Back Propagation Networks, Fuzzy Back Propagation Networks,
Applications.
3. Books Recommended:
1. Timothy J. rd Ross, “Fuzzy Logic with Engineering Applications”, 3rd Ed., Willey, 2010.
2. B. Yagnanarayana, "Artificial Neural Networks", 1 st Ed., PHI, 2009.
3. Simon O. Haykin, "Neural Networks and Learning Machines", 3/E, Prentice Hall, 2009.
4. S. Rajasekaran, G. A. Vijayalakshmi Pai, "Neural Networks, Fuzzy Logic and Genetic Algorithm:
Synthesis and Applications", PHI, 2007.
5. David E. Goldberg, "Genetic Algorithms in Search, Optimization, and Machine Learning", 1st Ed.,
Addison-Wesley Professional, 2006.
Page 68 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Line, Circle, Ellipse Generating Algorithms, Character Generation, Polygon Drawing and
Representation, Polygon Filling Algorithms – Scanline Algorithms, Edge List Algorithm, Edge Fill
Algorithm, Fence Fill Algorithm, Edge Flag Algorithm, Seed Fill Algorithms, Simple Seed Fill, Scan
Line Seed Fill Algorithms.
Page 69 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Overview of Hidden Lines and Visible Surface Methods, Fundamentals of Curve Generation,
Illumination, Shading Lighting, Color and Animation, Special-Purpose Graphics Hardware, Recent
Developments.
Tutorials will be based on the coverage of the above topics separately. (14 Hours)
3. Books Recommended:
1. Peter Shirley, Steve Marschner and others, “Fundamentals of Computer Graphics”, 4/E, A K
Peters/CRC Press, 2015.
2. James D. Foley, Andries van Dam, Steven K. Feiner, F. Hughes John, “Computer Graphics: Principles
and Practice in C”, Addison Wesley, 2/E, 2012.
3. D. Hearn and M. Baker, “Computer Graphics with OpenGL“, 3/E, Pearson India, 2013.
4. Edward Angel, “Interactive Computer Graphics - A Top-Down Approach Using OpenGL”, 5/E,
Pearson Education, 2012.
5. F. S. Hill Jr. and S. M. Kelley, “Computer Graphics using OpenGL”, 3/E, Pearson India, 2015.
Page 70 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Line Segment Intersection, Doubly-Connected Edge List, Computing the Overlay of Two
Subdivisions, Boolean Operations.
POLYGON TRIANGULATION AND PARTITIONING (04 Hours)
The Complexity of Convex Hulls in 2D and 3D Space, Computing Convex Hulls, The Analysis,
Convex Hulls and Half-Space Intersection.
Page 71 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Definition and Basic Properties, Computing the Voronoi Diagram, Voronoi Diagrams of Line
Segments, Farthest-Point Voronoi Diagrams, Connection to Convex hulls.
Point Location and Trapezoidal Maps, Randomized Incremental Algorithm, Dealing with
Degenerate Cases, Tail Estimate.
Shortest Path, Moving a Disk, Translating a Convex Polygon, Moving a Ladder, Robot Arm
Motion, Separability.
Interval Trees, Priority Search Trees, Segment Trees, Binary Space Partitions, Robot Motion
Planning, Quadtrees, Visibility Graphs.
3. Books Recommended:
Page 72 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Signal Classification: Analog vs. Digital Signal, Energy, Power, Even-odd, Periodic-aperiodic,
Deterministic-random Signals, Standard Signals: Unit Step, Unit Impulse, Ramp, Exponential,
Sinusoids, Continuous-time Signals and Discrete Signals and their Properties, Discrete Exponential
Functions and their Properties, Discrete Unit Step and Impulse Signals and their Properties.
Laplace Transform, Fourier Series and Fourier Transform, Digital Sequences, Linear Difference
Equations with Constant Coefficients, Realizations, Frequency-domain Representation of Discrete-
time Signals and Systems, Sampling of Continuous-time Signals: Periodic Sampling, Frequency-
Domain Representation of Sampling, Reconstruction of a Band-limited Signal, Changing the
Sampling Rate Using Discrete-time Processing, Quantization, Aliasing, Interpolation, Decimation.
Page 73 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Discrete-Time Fourier Transform (DTFT), The Discrete Fourier Series, The Fourier Transform of
Periodic Signals, Discrete Fourier Transform (DFT), Properties of the DFT, System Analysis via the
DTFT and DFT, Circular Convolution, Linear Convolution Using the DFT, Implementation of the DFT
Using Convolution
Decimation in Time FFT, Introduction to Radix-2 FFTs, Some Properties of Radix-2 Decimation in
Time FFT, Decimation in Frequency Algorithm, Computing the Inverse DFT by Doing a Direct DFT.
Multirate Signal Processing, Finite Impulse Response (FIR) and Infinite Impulse Response (IIR) Filter
Design, Power Spectral Density, Applications of Digital Signal Processing.
3. Books Recommended:
1. Alan V. Oppenheim and Alan S. Willsky, “Signals and Systems”, 2nd Edition, Pearson Education,
2014.
2. Vinay K. Ingle and John G. Proakis, “Digital Signal Processing using MATLAB”, 2 nd Edition,
Companion Series 2000.
3. Johnny Johnson,” Introduction to Digital Signal Processing”, PHI, New Delhi, 1997.
4. John G. Proakis & Dimitris G. Manolakis, “Digital Signal Processing: Principles, Algorithms, and
Applications”, 3/E, PHI,1996
5. Alan W. Oppenheim & Ronald W. Schafer, “Discrete-time Signal Processing”, 2nd Edition, PHI, New
Delhi, 1992.
Page 74 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Propositional Logic and Predicate Logic, Converse and Contrapositive, Reasoning with Propositions,
Natural Deduction – Rules, Provable Equivalence, Semantics, Logical Connectives, Soundness and
Completeness of Propositional Logic, Normal Forms, Identities of Propositions and Dual, Use of
Identities, Reasoning with Propositions, Semantic Equivalence, Satisfiability and Validity,
Conjunctive Normal Forms.
PREDICATE LOGIC (03 Hours)
Terms, Formulas - Well Formed Formula (WFF) of Predicate Logic, Constructing Formulas; Free and
Bound Variables, Reasoning with Predicate Logic, Deduction Rules, Quantifier, Semantics, Un-
Decidability of Predicate Logic, Expressiveness, Second-Order Logic.
Linear-Time Temporal (LTL) Logic, Syntax and Semantics, Model Checking: Systems, Tools,
Properties, Branching-Time Temporal Logic – Syntax and Semantics of CTL, Model-Checking
Algorithms. Program Verification: Partial and Total Correctness, Proof Calculus, Modal Logic –
Syntax and Semantics, Binary Decision Diagrams.
The Syntax of the Lambda Calculus, Lambda Abstractions,Operational Semantics of the Lambda
Calculus, Bound and Free Variables, Recursive Functions, The Denotational Semantics of the
Lambda Calculus, Defining the Semantics of Built-In Functions and Constants, Strictness and
Page 75 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Structure of the Translation Process, Translating Miranda Into the Enriched Lambda Calculus, The
TE Translation Scheme.
The Pattern-Matching Compiler Algorithm: Function Match, Variable Rule, Constructor Rule, Empty
Rule, Example.
(05 Hours)
TRANSFORMING THE ENRICHED LAMBDA CALCULUS
Transforming Pattern–Matching Lambda Abstractions: Constant Patterns, Product-Constructor
Patterns, Sum-Constructor Patterns, Dependency Analysis, Transforming Case-Expressions: Case-
Expressions Involving a Product Type, Case-Expressions Involving a Sum Type.
Introduction to List Comprehensions, Reduction Rules for List Comprehensions, Translating List
Comprehensions.
Informal Notation for Types: Types, Lists, Structured Types, Functions, Polymorphism: The Identity
Function, Rule for Applications, Lambda Abstractions, and Let-Expressions.
Abstract Syntax Trees, The Graph, Concrete Representation of the Graph, Tags and Type-Checking,
Boxed and Unboxed Objects, Tagged Pointers, Storage Management, Garbage Collection,Data
Constructors, Input and Output, Evaluating Arguments of Built-In Functions.
Reducing a Lambda Application: Substituting Pointers to the Argument, Overwriting The Roots of
the Redex, Constructing a New Instance of the Lambda Body. Reducing a Built-In Function
Application, Reduction Algorithm, Indirection Nodes.
Page 76 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Full Laziness, Maximal Free Expressions, Lambda-Lifting Using Maximal Free Expressions.
3. BooksRecommended:
1. Greg Michaelson, “An Introduction to Functional Programming through Lambda Calculus”, Dover
Publications, 2011.
2. Michael Huth, Mark Ryan, “Logic in Computer Science: Modelling and Reasoning about Systems”,
Cambridge University Press, 2004.
3. Anthony J. Field, Peter Harrison, “Functional Programming”, Addison Wesley Publishing Company,
2000.
4. Richard S. Bird, Philip Wadler, “Introduction to Functional Programming”, Prentice Hall, 1998.
5. Simon L. Peyton Jones, “The Implementation of Functional Programming Languages”, Prentice Hall
International, 1987.
1. George Metakides, Anil Nerode, “Principles of Logic and Logic Programming”, Elsevier Science Ltd.,
1996.
2. Kees Doets, “From Logic to Logic Programming”, MIT Press, 1994.
Page 77 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Security Attacks, Services and Mechanisms, CIA Traid, Security Design Principles, Attack Surface
and Attack Trees, Model for Network Security, Introduction to Number Theory, Shannon’s Theory
Hash Functions and Data Integrity, Security of Hash Functions-The Random Oracle Model, Iterated
Hash Functions- Merkel Damgard Construction, Secure Hash Algorithm (SHA).
Page 78 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Security requirements, RSA Digital Signatures, NIST Digital Signature Algorithm (DSA), Elliptic
Curve Digital Signature Algorithm (ECDSA), RSA-PSS Digital Signature Algorithm
Practicals will be based on the coverage of the above topics. (28 Hours)
Tutorials will be based on the coverage of the above topics. (14 Hours)
3. Books Recommended:
1. William Stallings, Cryptography and Network Security – Principles and Practice, 7th Edition, Pearson
Education, 2013.
2. Forouzan and Mukhopadhyay, Cryptography and Network Security, 3 rd Edition, McGraw Hill, 2015.
3. Menezes Bernard, Network Security and Cryptography, 1 st Edition, Cengage Learning India, 2010.
4. Douglas Stinson, Cryptography: Theory and Practice, 3rd Edition, CRC Press, 2006.
5. William Stallings, Network Security Essentials: Applications and Standards, 3 rd Edition, Pearson
Education, 2009.
1. Menezes, Oorschot and Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
2. Dhiren Patel,Information Security: Theory and Practice, PHI, 2008.
Page 79 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Defining the Problems as a State Space Search, Production Systems, Production Characteristics,
Production System Characteristics, Forward and Backward, State-Space Search, Problem Solving
Methods – Problem Graphs, Matching, Indexing.
Page 80 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Generate and Test, BFS, DFS, Blind, Heuristic, Problem-Reduction, A, A*, AO*, Minimax, Constraint
Propagation, Neural, Stochastic, and Evolutionary Search Algorithms, Sample Applications,
Measure of Performance and Analysis of Search Algorithms, Problem Reduction, Constraint
Satisfaction, Means-Ends Analysis, Issues in the Design of Search Programs.
Knowledge Representation -Production Based System, Frame Based System; Inference – Backward
Chaining, Forward Chaining, Rule Value Approach; Fuzzy Reasoning – Certainty Factors, Bayesian
Theory-Bayesian Network-Dempster – Shafer Theory; Symbolic Logic Under Uncertainty: Non-
Monotonic Reasoning, Logics for Non-Monotonic Reasoning; Statistical Reasoning : Probability and
Bayes Theorem, Certainty Factors, Probabilistic Graphical Models, Bayesian Networks, Markov
Networks, Fuzzy Logic.
Overview and Example Domain: Overview, Minimax, Alpha-Beta Cut-Off, Refinements, Iterative
Deepening, The Blocks World, Components of a Planning System, Goal Stack Planning, Nonlinear
Planning Using Constraint Posting, Hierarchical Planning, Reactive Systems, Other Planning
Techniques.
Introduction, Syntactic Processing, Semantic Analysis, Discourse and Pragmatic Processing, Spell
Checking.
Expert Systems, Architecture of Expert Systems, Roles of Expert Systems, Knowledge Acquisition,
Meta Knowledge, Heuristics, Typical Expert Systems – MYCIN, DART, XOON, Expert Systems Shells.
Practicals will be based on the coverage of the above topics using prolog. (28 Hours)
Tutorials will be based on the coverage of the above topics. (14 Hours)
3. Practicals:
1 Practical assignment to understanding basic concepts of prolog.
2 Practical assignment to implement various search strategies.
3 Practical assignment to implement various algorithm based on game theory.
4 Implementation of heuristic based search techniques.
5 Implementation of neural network based application.
Page 81 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
4. Books Recommended:
1. Elaine Rich and Kevin Knight, “Artificial Intelligence”, 2nd Edition, Tata McGraw-Hill, 2003.
2. Stuart Russell, Peter Norvig, Artificial Intelligence: A Modern Approach, 3rd Edition, Prentice Hall,
2009.
3. Nils Nilsson, Artificial Intelligence: A New Synthesis, Morgan Kaufmann, 1998,
4. W. Patterson, ‘Introduction to Artificial Intelligence and Expert Systems’, Prentice Hall of India, 2010.
5. I. Bratko, "Prolog Programming for Artificial Intelligence", 3/E, Addison-Wesley, 2001,
0-201-40375-7.
Page 82 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Overview of the Assembly Process, Cross Assembler, Micro Assembler, Meta Assembler, Single
Pass Assembler, Two Pass Assembler, Design of Operation Code Table, Symbol Table, Literal Table,
Advanced Assembly Process .
Phases of Compiler, Analysis-Synthesis Model of Compilation, Interface with Input, Parser and
Symbol Table, Token, Lexeme, Patterns and Error Reporting in Lexical Analysis, Programming
Page 83 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Design of a Linker, Program Relocation, Linking of Overlay Structured Programs, Dynamic Linking,
General Loader Schemes, Absolute Loader, Relocating Loader, Dynamic Loader, Bootstrap Loader,
Linking Loader, other Loading Schemes, Linkers v/s Loaders.
Practicals will be based on the coverage of the above topics separately. (28 Hours)
Tutorials will be based on the coverage of the above topics separately. (14 Hours)
3. Practicals:
1 Study, install and setup various system software tools.
2 Implementation ofsingle pass and two pass assembler.
3 Design and implement scanner using lexical analyzer (LEX) tool.
4 Design and implement parser using YACC tools.
5 Design and configure a compiler application using modern tools and softwares.
6 Implementation of different stages of compiler.
7 Implementation of interpreter and debugger.
8 Implementation of optimization based compiler design.
4. Tutorials
1 Problem solving on the basics of assembler.
2 Problem solving on the basics of macro processor.
3 Problem solving on the basics of lexical analysis.
4 Problem solving on the basics of parsing.
Page 84 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
BOOKS RECOMMENDED
Page 85 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Page 86 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Search for Business Idea, Product Innovations, New Product Development – Stages in Product
Development; Sequential stages of Project Formulation; Feasibility analysis – Technical, Market,
Economic, Financial etc.; Project report; Project appraisal; Setting up an Industrial unit –
procedure and formalities in setting up an Industrial unit; Business Plan Development.
3. BooksRecommended:
Page 87 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
PARADIGMS FOR DATA MANIPULATION, LARGE SCALE DATA SET (08 HOURS)
Mapreduce (Hadoop), Query Large Data Sets in Near Real Time with Pig and Hive, Moving
from Traditional Warehouses to Map Reduce, Distributed Databases, Distributed Hash Tables.
Page 88 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Sampling Data in a Stream, Filtering Streams, Counting Distinct Elements in a Stream, Moments,
Windows, Clustering for Streams.
1. Tom White, “Hadoop: The Definitive Guide”, 4th Edition, O’reilly Media, 2015, ISBN:
9781491901687.
2. Anand Rajaraman and Jeffrey David Ullman, “Mining of Massive Datasets”, 2 nd Edition, Cambridge
University Press, 2014, ISBN: 9781107077232.
3. Peter Bruce, Andrew Bruce, “Practical Statistics for Data Scientists: 50” by , 1st Edition, O’reilly
publishing house, 2017, ISBN: 9781491952962.
4. Joel Grus, J. “Data science from scratch”, 1 st Edition, O'Reilly Media, 2015, ISBN: 9781491901410.
5. Montgomery, Douglas C., and George C. Runger. “Applied statistics and probability for engineers”,
John Wiley & Sons, 7th Edition, 2018, ISBN: 9781119400363.
Page 89 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Data Visualization, Design, Data and Tasks, Data Types, Dataset Types, Basic Charts and Plots,
Use of Statistical Indicators, Multivariate Data Visualization, Principles of Perception, Color,
Design, and Evaluation, Graphical Integrity, Data-Ink Ratio, Aspect Ratios & Scales.
Text Data Visualization, Document Visualization, Images and Video, Interactivity and Animation,
Temporal Data Visualization, Part-to-Whole Relationships Visualization, Geospatial Data
Visualization, Hierarchical Data Visualization, Network Data Visualization, High-Dimensional Data
Visualization, Maps.
Visual Story Telling, Messaging, Effective Presentations, Design for Information, Visualization and
Arts, Visualization Systems, Database Visualization, Redesign Principles and Design
Page 90 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Introduction, Relative vs. Absolute Judgments, Luminance Perception, D3 Key Features and
Concepts, Visualization Process, Design Iterations, Sketching, Data Types, Statistical Graphs,
Interaction Design, Brushing and Linking, Animation, Trees and Networks, Radial Layouts, Linear
Layouts, Maps, Tree maps, Choropleth Maps, Cartograms, Symbol Maps, Flow Maps, Real-Time
Maps.
3. Books Recommended:
1. Scott Murray "Interactive Data Visualization for the Web" O'Reilly Media, 2/E, 2017.
2. Alberto Cairo, “The Truthful Art: Data, Charts, and Maps for Communication” 1/E, Berkeley,
California: New Riders, 2016, ISBN: 9780321934079.
3. Colin Ware, “Visual Thinking for Design”, Morgan Kaufman Series, 1/E, 2008, ISBN: 9780123708960.
4. Ben Fry "Visualizing Data: Exploring and Explaining Data with the Processing Environment" O'Reilly
Media, 1/E, 2008, ISBN: 9780596514556.
5. Few, S, “Information dashboard design: The effective visual communication of data Sebastopol”
O’Reilly, 1/E, 2006, ISBN: 9780596100162.
1. Edward Tufte "The Visual Display of Quantitative Information" Graphics Press, 2/E, 2001, ISBN:
9781930824133.
Page 91 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Levels of Parallelism (Instruction, Transaction, Task, Thread, Memory, Function), Models (SIMD,
MIMD, SIMT, SPMD, Dataflow Models, Demand-driven Computation etc.), Architectures: N-wide
Superscalar Architectures, Multi-core, Multi-threaded.
Page 92 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Programming Parallel Programming with OpenMP and (Posix) Threads, Message Passing with
MPI.
3. Books Recommended:
1. John L. Hennessy and David A. Patterson, “Computer Architecture -- A Quantitative Approach”, 4th
Edition, Morgan Kaufmann Publishers, 2017, ISBN 13: 978-0-12-370490-0.
2. Barbara Chapman, Gabriele Jost and Ruud van der Pas, “Using OpenMP: portable shared memory
parallel programming”, The MIT Press, 2008, ISBN-13: 978-0-262-53302-7.
3. Marc Snir, Jack Dongarra, Janusz S. Kowalik, Steven Huss-Lederman, Steve W. Otto, David W.
Walker, “MPI: The Complete Reference, Volume2”, The MIT Press, 1998, ISBN: 9780262571234.
4. Pacheco S. Peter, “Parallel Programming with MPI”, Morgan Kaufman Publishers, 1992, Paperback
ISBN: 9781558603394.
5. https://docs.nvidia.com/cuda/cuda-c-programming-guide/index.html.
Page 93 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Time Division Multiple Access (TDMA), Frequency Division Multiple Access (FDMA), Spread
Spectrum Technique, Code Division Multiple Access (CDMA).
Topology-Based Versus Position Based Approaches, Proactive Routing Protocols, Reactive Routing
Protocols, Hybrid Routing Protocols, Position Based Routing Issues and Forwarding Strategies.
WIRELESS SENSOR NETWORKS (08 Hours)
Routing Protocols, Localization Methods, Sensor Deployment Strategies, Traffic Flow Pattern in
WSN, One to Many, Many to One and Many to Many, Routing Protocols for Delay Tolerant
Networks, Routing protocols for Vehicular Ad-hoc Networks, Wireless Access Protocol, GPS
(Global Positioning System) and Applications, RFID and its Applications.
Page 94 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Physical Design, Logical Design, IoT Enabling Technologies, IoT Levels & Deployment Templates,
Domain Specific IoTs, IoT and M2M, IoT System Management, IoT Platforms Design Methodology.
3. Books Recommended:
1. M. S. Gast, "802.11 wireless networks: The Definitive Guide", 3/E, O'Reilly, 2017.
2. J. Schiller, "Mobile Communications", 2/E, Pearson India, 2008.
3. Charles Perkins, "Adhoc Networking", Addison Wesley, 1/E, 2000.
4. WCY Lee, " Mobile Cellular Telecommunications: Analog and Digital Systems ", 2/E,TMH, 2017.
5. J. W. Mark and W. Zhuang, "Wireless Communications and Networking", 1/E, Pearson, 2002.
Page 95 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Methods of Proof, Vector Spaces and Matrices, Real Vector Space, Rank of a Matrix, Linear
Equations, Inner Product and Norms, Linear Transformations, Eigen Values and Eigen Vectors,
Orthogonal Projections, Quadratic Forms, Matrix Norms, Line Segments, Hyperplanes and Linear
Varieties, Convex Sets, Neighbourhood, Polytopes and Polyhedral, Sequences and Limits,
Differentiability, The Derivative Matrix, Differentiation Rules, Level Sets and Gradients, Taylor
Series.
Page 96 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
Problems with Equality Constraints, Tangent and Normal Spaces, Lagrange Condition, Second-
Order Conditions, Minimizing Quadratics Subject to Linear Constraints, Problems with Inequality
Constraints, Karush-Kuhn-Tucker Condition, Second-Order Conditions, Convex Optimization
Problems, Convex Functions, Algorithms for Constrained Optimization, Projections, Projected
Gradient Methods, Penalty Methods.
Accelerated First Order Methods, Bayesian Methods, Coordinate Methods, Cutting Plane
Methods, Interior Point Methods, Optimization Methods for Deep Learning, Parallel and
Distributed Methods, Robust Optimization Problems and Methods, Stochastic Mini-batch
Methods, Submodular Optimization Problems and Methods, Variance Reduced Stochastic
Methods, Zeroth Order Methods.
3. Books Recommended:
1. E. K. P. Chong and S. Zak, “An introduction to optimization”, 2nd Edition, John Wiley and Sons (Asia)
Pvt. Ltd., Singapore, 2004.
2. T. Hastie, R. Tibshirani and M. J. Wainwright, “Statistical Learning with Sparsity: The Lasso and
Generalizations”, 1st Edition, Chapman and Hall/CRC Press, 2015.
3. S. Sra, S. Nowozin, and S. Wright (eds), “Optimization for Machine Learning”, 1 st Edition, The MIT
Press, 2011.
4. Y. Nesterov, “Introductory lectures on convex optimization”, 2nd Edition, Kluwer-Academic, 2003.
5. S. Boyd and L. Vandenberghe, “Convex Optimization”, 1st Edition, Cambridge University Press,
2003.
Page 97 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
INTRODUCTION ( 08 Hours)
Introduction of Social Networks, Social Networks Data, Development of Social Network
Analysis, Analyzing Social Network Data, Formal Methods, Paths and Connectivity, Graphs to
Represent Social Relations, Working with Network Data, Network Datasets, Strong and Weak
Ties, Closure, Structural Holes, and Social Capital, Measures for Social Network Analysis.
SOCIAL INFLUENCE ( 09 Hours)
Homophily, Mechanisms Underlying Homophily, Social Influence, Affiliation, Identification of
Roles, Tracking Link Formation in OnLine Data, Spatial Model of Segregation - Positive and
Negative Relationships , Structural Balance, Applications of Structural Balance, Weaker Form of
Structural Balance.
WEB INFORMATION NETWORKS ( 09 Hours)
The Structure of the Web, World Wide Web, Information Networks, Hypertext, and Associative
Memory, Web as a Directed Graph, Bow-Tie Structure of the Web, Link Analysis and Web
Search, Searching the Web: Ranking, Link Analysis using Hubs and Authorities, Page Rank, Link
Analysis in Modern Web Search, Applications, Spectral Analysis, Random Walks, and Web
Search, Social Network Visualization.
Page 98 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
3. Books Recommended:
1. Jure Leskovec, Anand Rajaraman, Jeffrey D. Ullman, “Mining of Massive Datasets”, Cambridge
University Press, 2/E, 2014, ISBN: 9781316638491.
2. Borgatti, S. P., Everett, M. G. & Johnson, J. C., “Analyzing social networks”, SAGE Publications Ltd;
1/E, 2013, ISBN: 9781446247419.
3. David Easley and Jon Kleinberg, “Networks, Crowds, and Markets: Reasoning about a highly
connected world”, Cambridge Univ. Press, 2010, ISBN: 9780521195331.
4. Robert A., Hanneman and Mark Riddle, “Introduction to social network methods”, University of
California, 2005.
5. John Scott, “Social Network Analysis: A Handbook”, SAGE Publications Ltd; 2/E, 2000, ISBN:
9780761963394.
1. Wasserman S. & Faust K., “Social Network Analysis: Methods and Applications”, Cambridge
University Press, 1/E, 1994, ISBN: 9780521387071.
Page 99 of 173
Computer Science and Engineering Department, SVNIT, Surat
B. Tech. Computer Science and Engineering – Curriculum
2. Syllabus
Deleted Data, File Carving, Hibernation, Sleep, Hybrid Sleep, Registry Structure, Attribution,
External Devices, Print Spooling, Recycle Bin, Date and Time Stamp, Thumbnail Cache, Restore
Points, Shadow Copy, Link Files.
DIGITAL EVIDENCE ON UNIX SYSTEM (04 Hours)
UNIX Boot Disk, File System, Data Recovery, Log Files, File System Traces, Internet Traces.
Collecting and Analysing Network-Based Evidence, Reconstructing Web Browsing, Email Activity,
and Windows Registry Changes, Intrusion Detection, Tracking Offenders, etc.
INTERNET AND EMAIL FORENSICS (06 Hours)
Internet Overview, Role of Internet in Criminal Investigation, Online Anonymity and Self-
Protection, Web Technology, Web Browsers, Cookies, Cache, History, Browser Artifacts in
Registry, Chat Clients, Email Protocols, Email Evidence, Tracing Email, Email Forgery, Social
Networking Sites.
Forensic Tools, Forensic report writing, Criminal Law, Expectation of Privacy, Private Searches,
Privacy Law, Search Warrant.
3. Books Recommended:
1. Eoghan Casey, “Digital evidence and computer crime: Forensic science, computers, and the
internet”, 3rd Edition, Academic press, 2011.
2. Dejey and Murugan, “Cyber Forensics”, 1st Edition, Oxford University Press, 2018.
3. Sammons, John, “The basics of digital forensics: the primer for getting started in digital
forensics”, 2nd Edition, Elsevier, 2012.
4. Sherri Davidoff, Jonathan Ham, “Network Forensics: Tracking Hackers Through Cyberspace”,
Prentice Hall, 2012.
5. Computer Forensics: Hard Disk and Operating Systems, 2nd Edition, EC Council, September 17,
2009.
Detecting Malware and Threats in Windows, Linux, and Mac Memory”, ISBN: 978-1-118-82509-9,
July 2014.
CO1 acquire knowledge about the signalling system and different spread spectrum techniques.
CO3 analyze the cellular system and mobile applications for different types of networks like GSM,
GPRS, CDMA and Adhoc.
CO4 evaluate the performance of the protocols, mobile applications and network solutions for
wireless communication.
CO5 design and develop the techniques to solve the issues of communication in different types of
networks.
2. Syllabus
(GSM) Network, General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA
2000), Cordless System, Wireless Local Loop, Mobility Management-Location Management,
HLR-VLR Scheme, Hierarchical Scheme, Predictive Location Management Schemes, Types of
Interference, Estimation of Adjacent Channel Interference and Co-channel Interference, Trunk
Efficiency, Grade of Service, Blocking Probabilities, Propagation Models, Frequency
Management and Channel Assignment.
Cellular vs. Ad Hoc, Applications, Issues, MAC protocols, Routing Protocols, Transport Layer
Protocol, Multicasting protocols, Wireless Access Protocol, Standards: IEEE 802.11, Wi-Fi,
Wireless Broadband-Wi-MAX, Bluetooth, IEEE 802.15, Security in Wireless Network, Hyper
LAN.
3. Books Recommended:
1. William Stallings, "Wireless Communications & Networks", 2/E, Pearson Education India, Reprint
2007.
2. Jochen Schiller, "Mobile Communications", 2/E, Pearson Education India, reprint 2007.
3. T S Rappaport, "Wireless Communications: Principles & Practice", 2/E, Pearson Education, 2002.
4. C E Perkins, "Ad Hoc Networking", 1st Edition, Addison Wesley, 2000.
5. Asoke K Talukder, Roopa R Yavagal, “Mobile Computing: Technology, Applications and Service
Creation”, Tata McGraw-Hill , Third reprint 2006.
1. Sandeep Singhal, "The Wireless Application Protocol", Addison Wesley, India, reprint 2001.
2. C. Siva Ram Murthy and B. S. Manoj,“Ad Hoc Wireless Networks: Architectures and Protocols”,
Pearson education 2007.
3. Gottapu Sasibhushana Rao, “Mobile Cellular Communication”, Pearson, 2013.
2. Syllabus
Introduction, Motion Estimation and Compensation, Full Search Motion Estimation, Comparison
of Motion Estimation Algorithms, Sub-Pixel Motion Estimation, Choice of Reference Frames,
Enhancements to the Motion Model, Implementation.
Discrete Wavelet Transform, Fast Algorithms for the DCT, Separable Transforms, Flow Graph
Algorithms, Distributed Algorithms, Other DCT Algorithms, Implementing the DCT, Software DCT,
Hardware DCT, Quantization, Types of Quantizing methodologies: Related Design,
Implementation, Vector Quantization.
H.261, H.263 and H.26L, Motion Estimation and Compensation, Transform Coding, Entropy
Coding, Pre and Post Processing, Rate, Distortion and Complexity, Transmission of Coded Video,
Platforms, And Video CODEC Design.
Introduction, The International Standard Bodies, The Expert Groups, The Standardization
Process, Understanding and Using the Standards, JPEG, Motion JPEG, MPEG , JPEG-2000, lMPEG-
1, MPEG-2, MPEG-4.
Introduction, Video CODEC Interface, Coded Data In/Out, Control Parameters , Status
Parameters, Design of a Software CODEC, Design Goals, Specification and Partitioning, Designing
the Functional Blocks, Improving Performance, Testing, Design of a Hardware CODEC: Design
Goals.
Current Standard Evolution, Video Coding Research, Platform Trends, Application Trends, Video
CODEC Design, Contemporary Research Topics.
3. Books Recommended:
1. Iain E. Richardson, “Video Codec Design: Developing Image and Video Compression Systems” 1/E,
Wiley, 2002.
2. Iain E. Richardson, “H.264 and MPEG-4 Video Compression: Video Coding for Next Generation
Multimedia “, 1/E, Wiley, 2008.
3. M. Ghanbari, “Standard Codecs: Image Compression to Advanced Video Coding
(Telecommunications)”, 3/E, Institution of Engineering and Technology, 2010.
4. Khalid Sayood, “Lossless Compression Handbook (Communications, Networking and
Multimedia)”, 1/E, Academic Press, 2002.
5. Aaron Owen and Andy Beach, “Video Compression Handbook, 2E, Peachpit Press, ISBN:
9780134846736, July 2018.
2. Syllabus
XML Document Structure, Well Formed and Valid Documents, Namespaces, DTD, XML Schema,
X-Files, Parsing XML using DOM –SAX, XML Transformation and XSL, XSL Formatting, Modelling
Databases in XML.
SOA and Web Services, Web Services Protocol Stack, Service Descriptions, WSDL, Messaging with
SOAP, Service Discovery, UDDI, Service Level Interaction Patterns, XML and Web Services,
Enterprise Service Bus, Message Exchange Patterns, WS Transactions, Web Services
Technologies, JAX-RPC, JAX-WS, Web Service Standards, WS-RM, WS-Addressing, WS-Policy,
Service Orchestration and Choreography, Composition Standards , BPEL, Service Oriented
Analysis and Design, Search Engine Optimization.
Service Oriented Analysis and Design, Service Modelling, Design Standards and Guidelines,
Composition, WS-BPEL, WS-Coordination, WS-Policy, WS-Security, SOA Support in Java, B2B and
B2C E-commerce Development, REST Architecture, REST Full APIs, Micro Service Architecture for
Highly Scalable Applications.
3. Books Recommended:
1. Thomas Erl, “Service Oriented Architecture: Concepts, Technology, and Design”, 1st Edition, Pearson
Education, 2005.
2. Eric Newcomer, Greg Lomow, “Understanding SOA with Web Services”, 1 st Edition, Pearson Education,
2005.
3. Sandeep Chatterjee and James Webber, “Developing Enterprise Web Services: An Architect’s Guide”,
Prentice Hall, 2004.
4. James McGovern, Sameer Tyagi, Michael E. Stevens, Sunil Mathew, ”Java Web Services Architecture”,
1st Edition, Morgan Kaufmann Publishers, 2003.
5. Ron Schmelzer et al. “XML and Web Services”, 1 st Edition, Pearson Education, 2002.
2. Syllabus
Introduction to Embedded System Hardware Needs, Typical and Advanced, Timing Diagrams,
Memories (RAM, ROM, EPROM), Tristate Devices, Buses, DMA, UART and PLD's Built-ins on the
Microprocessor.
Interrupts Basics ISR, Context Saving, Shared Data Problem, Atomic and Critical Section, Interrupt
Latency.
Survey of Software Architectures, Round Robin, Function Queue Scheduling Architecture, Use of
Real Time Operating System, RTOS, Tasks, Scheduler, Shared Data Re-entrancy, Priority Inversion,
Mutex Binary Semaphore and Counting Semaphore.
Inter Task Communication, Message Queue, Mailboxes and Pipes, Timer Functions, Events Interrupt
Routines in an RTOS Environment.
Soft Real-Time System Principles, Task Division, Need of Interrupt Routines, Shared Data.
Introduction, IoT Work Flow, IoT Protocols: HTTP, CoAP, MQTT, 6LoWPAN, Building IoT
Applications.
Distributed Embedded Architectures, Networks for Embedded Systems, Network-Based Design, and
Internet Enabled Systems.
Design Methodologies, Requirements Analysis, System Analysis and Architecture Design, Quality
Assurance.
3. Books Recommended:
1. Mohamed Ali Mazidi, Janice Gillispie Mazidi, Rolin McKinlay, “The 8051 Microcontroller and
Embedded Systems: Using Assembly and C”, 2nd Edition, Pearson Education, 2011.
2. Raj Kamal, “Embedded Systems-Architecture, Programming and Design”, 2/E, TMH, 2007.
3. Jonathan W. Valvano, “Embedded Microcomputer Systems-Real Time Interfacing”, 2 nd Edition,
Thomson Learning, 2006.
4. David A. Simon, “An Embedded Software Primer”, 1/E, Pearson Education,2001.
5. Louis L. Odette, “Intelligent Embedded Systems”, Addison-Wesley, 1991.
2. Syllabus
3. Books Recommended:
1. Dominic Chell, Tyrone Erasmus, Shaun Colley, Oflie Whitehouse,” The Mobile Application Hacker’s
Handbook”, 2nd Edition, Wiley, 2015.
2. Michael Gregg, "Certified Ethical Hacker (CEH) Cert Guide", 2 nd Edition, Pearson India, 2014.
3. Rafay Baloch, “Ethical Hacking and Penetration Testing Guide”, 2nd Edition, CRC Press, 2017.
4. Allen Harper, Shome Harris, Jonathan Ness,Chris Eagle, Gideon Lenkey, TerronVilliams “Gray Hat
Hacking The Ethical Hakers Handbook”, 3rd Edition, TMH, 2011.
5. Patrick Engebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and
Penetration Testing Made Easy”, 2nd Edition, Elsevier, 2013.
1. Jon Erickson “HACKING: The art of Exploitation”, 2nd Edition, William Pollock No Starch Press, 2008.
2. Syllabus
Comparing and Contrasting Architectures of All Three – Android, iOS and Windows, Underlying OS,
Kernel Structure and Native Level Programming. Approaches to Power Management, Security.
Android/iOS/Win 8 Survival and Basic Apps: Building a Simple “Hello World” App in All Three
Applications, App-structure, Built-in Controls, File Access, Basic Graphics. Platforms and Additional
Issues: Development Process, Architecture, Design, Technology Selection, Mobile App
Development Hurdles, Testing.
Intents and Services: Android Intents and Services, Characteristics of Mobile Applications,
Successful Mobile Development; Storing and Retrieving Data: Synchronization and Replication of
Mobile Data, Getting the Model Right, Android Storing and Retrieving Data, Working with a
Content Provider; Putting It All Together: Packaging and Deploying, Performance Best Practices,
Android Field Service App.
Power Management: Wake Locks and Assertions, Low-Level OS Support, Writing Power-Smart
Applications. Augmented Reality via GPS and Other Sensors: GPS, Accelerometer, Camera. Mobile
Device Security in Depth: Mobile Malware, Device Protections, iOS “Jailbreaking”, Android
“rooting” and Windows “defenestration”; Security and Hacking: Active Transactions, More on
Security, Hacking Android.
Side Channel Attacks, Inference Algorithms, Hardware Loopholes, Sensor Data Leaks, Case Studies.
3. Books Recommended:
1. Tomasz Nurkiewicz and Ben Christensen, “Reactive Programming with RxJava”, O’Reilly Media, 2016.
2. Bill Phillips, Chris Stewart, Brian Hardy, and Kristin Marsicano, “Android Programming: The Big Nerd
Ranch Guide”, Big Nerd Ranch LLC, 2nd edition, 2015.
3. Cristian Crumlish and Erin Malone, “Designing Social Interfaces”, 2nd edition, O’Reilly Media, Inc.,
2014.
4. Maximiliano Firtman, “Programming the Mobile Web”, O’Reilly Media Inc., 2nd edition, 2013.
5. Suzanne Ginsburg, “Designing the iPhone User Experience: A User-Centered Approach to Sketching
and Prototyping iPhone Apps”, Addison-Wesley Professional, 2010.
1. Brian Fling, “Mobile Design and Development”, O’Reilly Media Inc., 2009.
2. Valentino Lee, Heather Schneider, and Robbie Schell, “Mobile Applications: Architecture, Design and
Development”, Prentice Hall, 2004.
2. Syllabus
Image Model, Image Sensing and Acquisition, Sampling and Quantization, Mathematical Tool for
Digital Image Processing, Types of Digital Images, Image File Formats, Colour Fundamentals and
Models.
Sampling and Fourier Transform, Discrete Fourier Transform (DFT), 2-D DFT, Filtering in the
Frequency Domain, Smoothing and Sharpening Frequency Domain Filters, Selective Filtering.
Image Degradation/ Restoration Process, Noise Models, Spatial Filtering and Frequency Domain
Filtering for Noise Reduction, Linear Position-Invariant Degradations, Estimating the Degradation
Function, Filtering, Image Reconstruction from Projection.
Color Models, Pseudocolor Image Processing, Full Color Image Processing, Color Transformation,
Smoothing and Sharpening, Color Based Image Segmentation.
Erosion and Dilation, Opening and Closing, Morphological Algorithms, Grey Scale Morphology,
Point, Line and Edge Detection, Thresholding, Region based Segmentation, Segmentation using
Morphological Watersheds, Use of Motion in Segmentation.
3. Books Recommended:
1. Rafael C. Gonzales andRichard E. Woods,“Digital Image Processing”, 4/E, Pearson Education, 2018.
2. Anil K. Jain, “Fundamentals of Digital Image Processing”, 1/E, Pearson India, 2015.
3. S. Jayaraman, T. Veerakumar and S. Esakkirajan, “Digital Image Processing”, 1/E, TMG, 2017
4. S. Sridhar, “Digital Image Processing”, 2/E, Oxford University Press, 2016.
5. S. Annadurai, R. Shanmugalakshmi, “Fundamentals of Digital Image Processing”, 1/E, Pearson
Education, 2006.
2. Syllabus
FIR Adaptive Filters, Newton’s Method, Steepest Descent Method, Convergence Analysis,
Performance Surface, LMS Adaption Algorithms, Convergence, Excess Mean Square Error, Leaky
LMS, Normalized LMS, Block LMS.
Least Square Estimation Problem, Geometric Approach, Projection Theorem, Stochastic Linear
Least Square Estimation, Recursive Least Square (RLS) Algorithm for Adaptive Filtering of
Stationary Process, RLS Adaptive Lattice, RLS Lattice Recursions, Matrix Inversion, Comparison
with LMS, RLS for Quasi-Stationary Signals, Exponentially Weighted RLS, Sliding Window RLS, RLS
Algorithm for Array Processing, Adaptive Beam Forming, Other Applications of Adaptive Filters,
State Space Model, Dynamic State Estimation, Statistical Filtering for Non-Stationary Signals,
Kalman filtering Principles, Initialization and Tracking, Scalar and Vector Kalman filter, Derivation
of Kalman Filter using Innovations Approach, Continuous time Kalman Filter, Discrete Kalman
Filter, Convergence, Applications in Signal Processing, Time Varying Channel Estimation, Radar
Target Tracking.
Process of System Identification, Least Square System Identification Method, RLS based System
Identification, Levinson Type Identification, Adaptive Blind Equalization, MIMO, Multi User
Detection Application, Channel Estimation, Interference Cancelling, Beam-Forming, Speech
Processing.
3. Books Recommended:
1. Simon O. Haykin, “Adaptive Filter Theory”, 5th Edition, Pearson Education Limited, 2014.
2. Monson H. Hayes, “Statistical Digital Signal Processing and Modeling,” 1st Edition, Wiley India Pvt.
Ltd, 2008.
3. Alexander D. Poularikas, Zayed M. Ramadan, “Adaptive filtering primer with MATLAB”, 1 st Edition,
CRC Press, 2006.
4. Dimitris G. Manolakis, Vinay K. Ingle, Stephen M. Kogon, “Statistical and Adaptive Signal Processing:
Spectral Estimation, Signal Modeling, Adaptive Filtering, and Array Processing”, 1st Edition, McGraw-
Hill, 2005.
5. Bernard Widrow, Samuel D Stearns, “Adaptive Signal Processing”, 1 st Edition, Pearson Education,
2002.
1. Ali H. Sayed, “Fundamentals of Adaptive Filtering”, 1st Edition, Wiley-IEEE Press, 2003.
2. Michael G. Larimore, C. Richard Johnson, “Theory and Design of Adaptive Filters”, 1 st Edition,
Pearson, 2001.
Co5 To design the solution for the real life problems using machine learning approaches.
2. Syllabus
Supervised Learning, Unsupervised Learning, Statistical Learning, Support Vector Machine, Neural
Networks, Decision Tree Learning, Tree Based Ensembles.
Data Analysis, Cluster Analysis, standard Clustering Techniques, Classification, Data Enhancement,
standard transformation Techniques, Feature Selection, Feature Extraction.
Overview, Design cycle, Machine Learning Applications like Mobility: Robotics, Action Learning,
Automatic Driving; Imaging: Object / Face Detection, Recognition, Tracking; Interfaces: Brainwaves
(for the disable), Handwriting &Speech Recognition; Security: Spam / Virus Filtering, Virus
Troubleshooting; Banking: Identify Good Customers, Minimize Credit Risk, Market Analysis;
Gaming: Intelligent Player/Agent, Object Tracking, 3D Modelling; Medicine: Screening, Diagnosis of
Drug Discovery; Security: Face, Signature, Iris Recognition; Bioinformatics: Disease Classification,
Gene Detection, Protein Folding Prediction.
3. Practical (Problem statements will be changed every year and will be notified on website.)
1 Lab assignments based on designing algorithms for supervised, unsupervised learning and
statistical learning.
2 Lab assignments based on designing algorithms using SVM and Neural Network.
3 Lab assignments based on designing algorithms using Decision Tree Learning, Tree Based
Ensembles.
4 Lab assignments based on designing algorithms using data clustering and transformation
techniques.
5 Lab assignments based on Machine Learning Applications.
6 Lab assignments based on advanced Machine Learning Applications.
4. BOOKS RECOMMENDED
2. Syllabus
Concept of Threads, Process, Processor Allocation, Process Migration and Related Issues, Software
Agents, Scheduling in Distributed System, Load Balancing and Sharing Approaches, Fault
Tolerance, Real Time Distributed System.
Clock Synchronization, Logical Clocks, Global State, Election Algorithms-The Bully algorithm-A Ring
algorithm, Mutual Exclusion-A Centralized Algorithm-A Distributed Algorithm-A token ring
Introduction, Failure Models, Failure Masking, Process Resilience, Agreem in Faulty Systems,
Reliable Client Server communication, Group communication, Distributed Commit, Recovery.
Introduction to Distributed Objects, Compile Time Vs Run Time Objects, Persistent and Transient
Objects, Enterprise JAVA Beans, Stateful and Stateless Sessions, Global Distributed Shared Objects,
Object Servers, Object Adaptors, Implementation of Object References, Static And Dynamic
Remote Method Invocations, Replica Framework.
Practicals will be based on the coverage of the above topics. (28 Hours)
Tutorials will be based on the coverage of the above topics. (28 Hours)
3. Practicals:
1 Implementation of concepts of communication protocols using UDP and TCP IP.
2 Implement the remote procedure call with an application.
3 Implementation of object based system using RMI or CORBA.
4 Implementation of distributed system for file sharing and message passing.
4. Tutorials:
1 Concepts of communications (UDP and TCP IP).
2 Concepts of fault tolerance.
3 Concept of time Synchronization.
4 Concepts of process management.
5 Concepts of replication and consistency.
6 Object based system (RMI and CORBA).
5. Books Recommended:
1. Andrew S Tanenbaum, “Distributed systems: Principles and Paradigms”, Second Edition, Pearson
Education. Inc 2007.
2. Mukesh Singhal and Niranjan G. Shivaratri, “Advanced Concepts in Operating Systems”, TMH,
McGraw-Hill, Inc. New York, USA 1994.
3. Pradeep K. Sinha, “Distributed Operating System: Concept and design”, PHI, New Delhi 2019.
4. W Richard Stevens, “Unix Network Programming: Vol 1, Networking APIS: Sockets & XTI”, Second
Edition E, Pearson Education, 1998.
5. Colouris, Dollimore, Kindberg, "Distributed Systems Concepts & Design", Fourth Edition, Pearson Ed.
2005.
2. Syllabus
Introduction, PAAS – Working Principle, Example, SAAS – Working Principle, Example, IAAS –
Working Principle, Examples, Service Level Agreements (SLAs), Billing & Accounting, Comparing
Scaling Hardware, Economics of Scaling, Managing Data.
Infrastructure Security, Data Security and Storage, Identity and Access Management, Access
Control, Trust and Reputation, Authentication in Cloud Computing.
Eucalyptus, VMware Cloud, GCP, AWS, MS AZURE, IBM CLOUD, Elastic Search.
● Practicals will be based on the coverage of the above topics. (28 Hours)
(Total Contact Time: 42 Hours + 28 Hours = 70 Hours)
3. Books Recommended:
1. Nikos Antonopoulos, Lee Gillam: "Cloud Computing: Principles, Systems and Applications", 2 nd
Edition, Springer, 2012.
2. Rajkumar Buyya, James Broberg, Andrzej M. Goscinski: "Cloud Computing: Principles and
Paradigms",1st Edition, Wiley, 2011.
3. Ronald L. Krutz, Russell Dean Vines: "Cloud Security: A Comprehensive Guide to Secure Cloud
Computing", 1st Edition, Wiley-India, 2010.
4. Barrie Sosinsky: "Cloud Computing Bible", 1 st Edition, Wiley-India, 2010.
5. Tim Mather, Subra Kumara swamy, Shahed Latif, “Cloud Security and Privacy: An Enterprise
Perspective on Risks and Compliance”, 1st Edition, O'Reilly Media, 2009.
2. Syllabus
● Practicals will be based on the coverage of the above topics. (28 Hours)
● Tutorials will be based on the coverage of the above topics. (14 Hours)
(Total Contact Time: 42 Hours + 28 Hours + 14 Hours = 84 Hours)
3. Practicals:
1 Introduction to various software tools related to cyber law and cyber forensics.
2 Practical based on disk forensics.
3 Practical based on network forensics.
4 Practical based on device forensics.
5 Practical based on email security.
6 Practical using forensic tools for image and video fraud.
7 Practical using on e-commerce related cyber-attacks.
8 Practical based on social network and online transactions related cyber threats.
4. Books Recommended:
1. Sunit Belapure and Nina Godbole, Cyber “Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives, 1st Edition, Wiley India Pvt. Ltd, 2011.
2. Mark F Grady, Fransesco Parisi, “The Law and Economics of Cyber Security”, 1 st Edition,
Cambridge University Press, 2006.
3. Jonathan Rosenoer, “Cyber Law: The law of the Internet”, 1 st Edition, Springer-Verlag, 1997.
4. Warren G. Kruse II and Jay G. Heiser, “Computer Forensics: Incident Response Essentials”, 1 st
Edition, Addison Wesley, 2002.
5. B. Nelson, A. Phillips, F. Enfinger, C. Stuart, “Guide to Computer Forensics and Investigations, 2 nd
Edition, Thomson Course Technology, 2006, ISBN: 0-619-21706-5.
1. J. Vacca, “Computer Forensics: Computer Crime Scene Investigation”, 2nd Edition, Charles River
2. Syllabus
Natural Language Grammars, Lexeme, Phonemes, Phrases and Idioms, Word Order, Tense,
Probabilistic Models of Spelling, N-grams, Word Classes and Part of Speech Tagging using
Maximum Entropy Models, Transformation Based Tagging (TBL), Context Free Grammars for
English, Features and Unification, Lexicalized and Parsing, Treebanks, Language and Complexity,
Representing Meaning, Semantic Analysis, Lexical Semantics, Word Sense Disambiguation.
Statistical Inference, Hidden Markov Models, Probabilistic (weighted) Finite State Automata,
Estimating the Probability of a Word, and Smoothing, Probabilistic Parsing, Generative Models of
Language, Probabilistic Context Free Grammars, Probabilistic Parsing, Statistical Alignment and
Machine Translation, Clustering, Text Categorization, Viterbi Algorithm for Finding Most Likely
HMM Path.
Probabilistic Models for Translating One to Another Language, Alignment, Translation, Language
Generation, Expectation Maximization, Automatically Discovering Verb Subcategorization,
Language Modelling Integrated into Social Network Analysis, Automatic Summarization,
Question-Answering, Interactive Dialogue Systems.
3. Books Recommended:
1. Daniel Jurafsky, James H. Martin: "Speech and Language Processing", 2/E, Pearson Education, 2009.
2. James Allen, "Natural Language Understanding", 2/E, Addison-Wesley, 1994.
3. Christopher D. Manning, Hinrich Schutze: "Foundations of Statistical Natural Language Processing",
1/E, MIT Press, 1999.
4. Steven Bird, “Natural Language Processing with Python”, 1st Edition, O'Reilly, 2009.
5. Jacob Perkins, “Python Text Processing with NLTK 2.0 Cookbook”, 2 nd Edition, Packt Publishing, 2010.
6. Bharati A., Sangal R., Chaitanya V., “Natural language processing: A Paninian perspective”, PHI, 2000.
7. Siddiqui T., Tiwary U. S., “Natural language processing and Information retrieval”, 1 st Edition,
OUP,2008.
2. Syllabus
Internet Security Protocols and Standards-Secure E-mail and S/MIME, Pretty Good Privacy
(PGP), Domain Keys Identified Mail, Secure Sockets Layer (SSL) and Transport Layer Security
(TLS), HTTPS, IPv4 and IPv6 Security, IPSec Protocol, Internet Authentication Applications-
Kerberos, X.509, Public-Key Infrastructure, Federated Identity Management, Wireless Network
Security-Wireless Security Overview, IEEE 802.11 Wireless LAN Overview, IEEE 802.11i
Wireless LAN Security, Network Management Security-SNMP Protocol.
3. Books Recommended:
1. William Stallings, Computer Security: Principles and Practice, 2/E, Pearson, 2012.
2. John Vacca, Network and System Security, 2/E, Elsevier, 2013.
3. William Stallings, Network Security Essentials: Applications and Standards, Prentice Hall, 4th edition,
2010.
4. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography,
CRC Press, 2001.
5. William Stallings, Cryptography and Network Security, 7/E, Pearson, 2018.
2. Syllabus
Operational.
3. Books Recommended:
1. J. W. Satzinger, R. B. Jackson and S. D. Burd, “Systems Analysis and Design in a Changing World”, 6th
ed. Boston, USA: Thomson Course Technology, 2012.
2. Averill M. Law, “Simulation modelling and analysis (SIE)”, 4 th Edition, Tata McGraw Hill India, 2007.
3. David Cloud, Larry Rainey, “Applied Modelling and Simulation”, Tata McGraw Hill, India.
4. Gabriel A. Wainer, “Discrete-event modelling and simulation: a practitioner's approach”, 1 st Edition,
CRC Press, 2009.
5. Bernard P. Zeigler, Herbert Praehofer, Tag Gon Kim, “Theory of modelling and simulation:
integrating discrete event and continuous complex dynamic systems”, 2 nd Edition, Academic Press,
2000.
1. Walter J. Karplus, George A. Bekey, Boris Yakob Kogan, “Modelling and simulation: theory and
practice”, 1st Edition, Springer, 2003.
2. Syllabus
Properties of Audio and Speech Signal, Audio Signal Features, Short Time Fourier Transform,
Audio Effects, Harmonics, Spectrogram, Audio and Speech Signal Compression, Speech
Production, Equalization, Perceptual Audio Coding, Sound Synthesis, Pattern Recognition,
Acoustics and Auditory Perception, Auto Correlation Function, Power Spectral Density Function,
Wiener Filter.
Psychoacoustic Representation, Compression Schemes, MP3 and Other Formats, Sound Mixture
Organization, Code Book, Audio Coding, Linear Prediction Coding, Noise Reduction, Music Signal
Processing, Modulation, Filters for Audio Signal Processing, Echo Cancellation, Music Analysis
and Retrieval, Acoustic Source Localization and Tracking.
Articulatory Phonetics, Models of Speech Production, Waveform Coding, Time Domain Analysis,
Frequency Domain Analysis, Speech Features: Energy, Magnitude, Zero-crossing,
Autocorrelation, Silence, Linear Prediction, Acoustic Feature Extraction, Ceptral Processing,
Pitch, Mel Frequency Cepstral Coefficients, Speech Recognition, Speaker Recognition, Linear
Discriminant Analysis, Principle Component Analysis, Hidden Markov Models, Acoustic
Classification Methods: Bayes Methods, Gaussians Mixture Models.
Independent Component Based Analysis, Neural Network Based Processing, Blind Source
Separation, Recognition, Transcription, Enhancement, Coding, Synthesis as well as Applications
to Advanced Fixed and Wireless Communication Systems, Speech Conversion, Deep Learning and
Audio Activity Detection.
3. Books Recommended:
1. Zölzer, Udo, “Digital Audio Signal Processing”, John Wiley & Sons Ltd., 2nd edition, 2008.
2. Quatieri, T.F., “Discrete-time speech signal processing: principles and practice”, 1st Edition, Upper
Saddle River, NJ: Prentice Hall, 2002.
3. Gold, B.; Morgan, N.; Ellis, D., “Speech and audio signal processing: processing and perception of
speech and music”, 2nd rev. ed. Wiley-Blackwell, 2011.
4. Dutoit, T.; Marqués, F.; Rabiner, L.R., “Applied signal processing: a MATLAB-based proof of concept”,
1st Edition, New York; London:Springer, 2009.
5. Rabiner, L.R.; Schafer, R.W., “Theory and applications of digital speech processing”, 1 st Edition,
Prentice Hall, 2010.
1. Huang, Y.A.; Benesty, J. (eds.), “Audio signal processing for next-generation multimedia
communication systems”, New York: Kluwer Academic Publishing, 2004.
2. Syllabus
Mathematical Modeling, Experimental Skills, Simulation Skills , Data Analysis and Interpretation.
3. Books Recommended:
1. John W. Creswell, “Research Design: Qualitative, Quantitative, and Mixed Methods Approaches”,
2nd Edition, SAGE Publications, 2002.
2. C.R. Kothari, “Research Methodology: Methods and Techniques”, 4 th Edition, New Age
International, 2012.
3. David Silverman, “Qualitative Research”, 4 th Edition, SAGE Publications Ltd, 2016.
4. Norman K. Denzin, Yvonna Sessions Lincoln, “Handbook of Qualitative Research”, 2 nd Edition,
SAGE Publications Ltd, 2011.
5. Michael Quinn Patton, “Qualitative research and evaluation methods”, 3rd Edition, SAGE
Publications Ltd, 2002.
2. Syllabus
Conceptual Data Models for Spatial Databases (e.g. Pictogram Enhanced ERDs), Logical Data Models
for Spatial Databases: Raster Model (Map Algebra), Vector Model, Spatial Query Languages, Need
for Spatial Operators and Relations, SQL3 and ADT, Spatial Operators, OGIS Queries.
3. Books Recommended:
2. Syllabus
3. Books Recommended:
1. John Slavio. Hacking: A Beginners’ Guide to Computer Hacking, Basic Security, And Penetration
Testing.
2. Yuri Diogenes, Dr. Erdal Ozkaya. Cybersecurity – Attack and Defense Strategies: Counter modern
threats and employ state-of-the-art tools and techniques to protect your organization against
cybercriminals, 2nd Edition Kindle Edition, Packt Publishing; 2nd edition, 2019.
3. Hidaia Mahmood Alassouli. Footprinting, Reconnaissance, Scanning and Enumeration
Techniques of Computer Networks, Blurb Publishers.
4. Robert Shimonski. Cyber Reconnaissance, Surveillance and Defense 1st Edition, Kindle Edition,
Syngress; 2014.
5. by Format: Kindle Edition Michael Sikorski, Andrew Honig. Practical Malware Analysis: The
Hands-On Guide to Dissecting Malicious Software
6. Dafydd Stuttard and Marcus Pinto. The Web Application Hacker's Handbook: Finding and
Exploiting Security Flaws
2. Syllabus
___________________________________________________________________________________
3. Books Recommended:
1. J. Han, M. Kamber, “Data Mining Concepts and Techniques”, 3 rd Edition, Morgan Kaufmann, Jun 22,
2011.
2. Paulraj Ponnian, “Data Warehousing Fundamentals”, 1st Edition, John Willey, May 24, 2010.
3. Robert D. Schneider, Hadoop for Dummies, 1st Edition, Wiley India, Apr 14, 2014.
4. M. Kantardzic, “Data mining: Concepts, models, methods and algorithms”, 3rd Edition, John Wiley
&Sons Inc., Nov 12, 2019.
5. M. Dunham, “Data Mining: Introductory and Advanced Topics”, 1st Edition, Pearson, Sep 1, 2002.
2. Syllabus
● THE WEB VULNERABILITIES IN MEMORY SAFE LANGAUGES & COUNTERMEASURES (08 Hours)
Introduction to Session Management in Web Applications. Session Management best practices. The
XSRF (Cross-site Request Forgery) Attack. Security vulnerabilities in Java: Connection String
Injection, LDAP Injection, Reflected XSS, Resource Injection, Persistent XSS attacks in Java, The
XPath Injection. Insecure deserialization, Remote code execution (RCE).Log injection.Mail
injection.Vulnerabilities in Java libraries. Vulnerabilities in the Java sandboxing mechanism.
Insufficient Transport Layer Protection (ITLP). Application misconfiguration and Software
Composition Analysis (SCA).
● CODE REVIEWS AND STATIC ANALYSIS OF THE SOURCE CODE (04 Hours)
Introduction to Code reviews and Static Informal reviews, Formal inspections.
Illustrations.Introduction to Code reviews and Static Analysis. Code Reviews. Static Code Analysis.
Static and Dynamic Application Security Testing (SAST and DAST)tools. Using basic linting to detect
security vulnerabilities in the code with the linux find(), grep(), awk(), splint() and the FlawFinder. A
glance at Code Analyzer Tools : Top-10: Raxis, SonarQube for Code Quality and Code Security, PVS-
Studio, reshift, Embold, SmartBear Collaborator, CodeScene Behavioral Code Analysis, RIPS
Technologies.Others: Cscope, Ctags, Editors, Cbrowser. Comparison with the Dynamic Application
Security Testing.
Secure UML, UMLSec and Misuse cases. Illustrating the design of a security protocol.
___________________________________________________________________________________
3. Books Recommended:
2. Syllabus
3. Books Recommended:
1. J. L. Hennessy, and D.A. Patterson, “Computer Architecture: A quantitative approach”, Fifth Edition,
Morgan Kaufman Publication, 2012.
2. M. J. Flynn, “Computer Architecture: Pipelined and Parallel Processor Design”, 1 st Edition, Narosa
Publishing House, 2011.
3. J.P. Shen and M.H. Lipasti, “Modern Processor Design”, 1 st Edition, MC Graw Hill, Crowfordsville,
2005.
4. Kai Hwang and Faye Briggs, “Computer Architecture and Parallel Processing”, 1 st Edition, MC Graw-
Hill International Edition, 2000.
Sima D, Fountain T and Kacsuk P,” Advanced Computer Architectures: A Design Space Approach”, 1 st
Edition, Addison Wesley, 2000.
2. Syllabus
Hands-on on the TinyOS Operating Environment, the NesC Programming Language. The TOSSIM
Simulator. The Avrora Emulator. The TinySec Environment and its Files. Hands-on on
ContikiCooja Simulator.
Motivation for Secure Data Aggregation in Wireless Sensor Networks. End-to-End and Hop-by-
Hop Secure Data Aggregation and Issues, Design of a Hop-by-Hop Link Layer Security Protocol in
Wireless Sensor Networks. Design Issues Viz. Security Issues, Performance Issues, Ciphers,
Initialization Vector, Message Authentication Code, Authenticated Encryption Modes.
Investigating Replay attacks in Link Layer Security Architectures and Typical Mitigation
Approaches. The Replay Protection Algorithms Continued. Flexibly Configurable Link Layer
Security Architecture for Wireless Sensor Networks.
The End-to-End Secure Data Aggregation in Wireless Sensor Networks. The Concept of Fully
Homomorphic Encryption, Using the Classical Homomorphic Encryption Algorithms for Privacy in
WSNs. Different Approaches to Offer Data Integrity viz. using Conventional MAC - Aggregate
MAC, Homomorphic MAC Hybrid Secure Data Aggregation, Malleability Resilient Concealed Data
Aggregation.
Lightweight Ciphers for RFID Devices. The AES Cipher Working and Demo in WSNs. Assignment
on AES Encryption Decryption Routines. The TEA Cipher Operation, Demo of Executing RC5 and
XXTEA Ciphers in TinySec Environment. Case Study of the Ciphers – Representative Ciphers from
the List viz. TEA, XXTEA, RC5, miniAES, PRESENT, Simon, Speck – their Encryption, Decryption and
Key Management Routines. Doing Hand Computation of the Intermediate Ciphertext at each
Stage in all these Ciphers.
Public Key Infrastructure in Wireless Sensor Networks, The TinyPK Protocol as a Case Study.
Attribute Based Encryption and its Motivation for Embedded Systems.
The Internet of Things, Architecture, Constituent Elements, The Security and Privacy Issues in IoT
Systems, Overview of the IoT Protocols Viz. Continua for Home Health Devices, DDS, DPWS: WS-
Discovery-SOAP-WS Addressing-WDSL-XML Schema, HTTP/REST, MQTT, UPnP, XMPP, ZeroMQ.
The IoT Security Protocols viz. ZigBee, Bluetooth, 6LowPAN, RPL. The CoAP.
Introduction, Side Channel Attacks, Passive Versus Active Attacks, Timing, Analysis, Power
Analysis, Electromagnetic Analysis, Analysis Tools and Equipment.
Overview of Security Support in Data Protection Protocols for the Embedded Systems. SSL, IPSec,
IKE, and TLS in Resource Constrained Devices.
3. Books Recommended:
1. Fei Hu., “Security and Privacy in Internet of Things (IOT's): Models, Algorithms and Implementations
Handcover”, 1st Edition, CRC Press, 2016.
2. R.Giladi, N. Dimitrios, “Security and Embedded Systems”, VOL 2, IOS Press, 2006.
3. A.G. Voyiatzis, A.G. Fragopoulos, and D.N. Serpanos “Security in Embedded Systems Design Issues in
Secure Embedded Systems”, 1st Edition, CRC press,2005.
4. R. Zurawski, “Embedded Systems Handbook”, 1 st Edition, CRC Press,2006.
5. T. Stapko, “Practical Embedded Security: Building Secure Resource-Constrained Systems”, 2 nd
Editions, Newnes, 2007.
2. Syllabus
Modelling.
3. Books Recommended:
1. Watt A. and M. Watt, “Advanced Animation and Rendering Techniques: Theory and Practice”, 2nd
Edition, Addison-Wesley, 1992.
2. Mascelli Joseph V, “The Five C’s of Cinematography: Motion Pictures Filming Techniques”, 1 st
Edition, Silman-James Press, 1998.
3. Preston Blair, “Cartoon Animation”, 1st Edition, Walter Foster Publishing Inc., CA, 1995.
4. Richard Taylor , “Encyclopedia of Animation Techniques”,2 nd Edition, Book Sales, 2004.
5. David Lewis Yewdall, “Practical Art of Motion Picture Sound”, 2nd Edition, Focal Press, 2003.
1. Foley, J.D., A. Van Dam, S. Feiner, and J. Hughes, “Computer Graphics: Principles and Practice”, 2 nd
Edition in C, Addison-Wesley, 1996.
2. Zölzer, Udo, “Digital Audio Signal Processing”, 2 nd Edition, John Wiley & Sons Ltd, 2008.
3. B. Gold, N. Morgan, D. Ellis, “Speech and Audio Signal Processing: Processing and Perception of
Speech and Music”, 2nd Edition, John Wiley & Sons Ltd, 2011.
4. Ed Hooks, “Acting for Animators”, 2nd Edition, Routledge, 2013.
5. Harold Whitaker and John Halas, “Timing for Animation”, 2 nd Edition, Focal Press, Oxford, 2002.
6. John Culhane, “Disney’s Aladdin – The Making of an Animated Film Hyperion”, NY, 1992.
7. Dave Smith, “The Official Encyclopedia – Disney A to Z”, Hyperion, 1996.
8. Leonard Maltin, “Mice and Magic – A History of American Animated Cartoons Plume”, Penguin
Books. USA, 1990.
9. Bob Thompson, “Disney’s Art of Animation – From Mickey Mouse to Hercules Hyperion”, NY,
1997.
10. Donald Craften, “Before Mickey – The Animated Film [1898 – 1928]”, the University of Chicago
Press, 1993.
11. Peter Hames (edited by), “Dark Alchemy: The Films of Jan Svankmajer”, 2 nd Edition, Wallflower
Press, 2008.
12. Robert Russett, “Experimental Animation: Origins of a New Art Cecile Starr”, 1st Edition, Da Capo,
1988.
13. Daniel Arijon, “Film Technique”, 1st Edition, Silman-James Press, 1991.
14. David Sonnensch, “Sound Design: The Expressive Power of Music, Voice and Sound Effects in
Cinema”, 2nd Edition, Michael Wiese Productions, 2013.
15. Tomlinson Holman, “Sound for Film and Television”, 2nd Edition, Focal Press, 2001.
2. Syllabus
Neural Networks: Back Propagation Through Time, Long Short Term Memory, Gated Recurrent
Units, Bidirectional LSTMs, Bidirectional RNNs ;Convolution Neural Networks: LeNet, AlexNet;
Generative models: Restrictive Boltzmann Machines (RBMs), Introduction to MCMC and Gibbs
Sampling, Gradient Computations in RBMs, Deep Boltzmann Machines.
3. Books Recommended:
1. Ian Goodfellow and Yoshua Bengio and Aaron Courville, “Deep Learning (Adaptive Computation and
Machine Learning series)”, MIT Press, 2016.
2. Russell, S. and Norvig, N. “Artificial Intelligence: A Modern Approach”, 3 rd Edition, Prentice Hall
Series in Artificial Intelligence Pearson, 2015.
3. Christopher M. Bishop, “Pattern Recognition and Machine Learning (Information Science and
Statistics)”, 3rd Edition, Springer, 2016.
4. Raúl Rojas, “Neural Networks - A Systematic Introduction”, 2 nd Edition, Springer-Verlag, Berlin, New-
York, 2013.
5. Nikhil Buduma, Nicholas Locascio, “Fundamentals of Deep Learning: Designing Next-Generation
Machine Intelligence Algorithms”, 1st Edition, O’reily, 2017.
2. Syllabus
3. Books Recommended:
1. Gary McGraw, “Software Security: Building Security”, 2nd Edition, Addison Wesley Software Security
Series, 2006.
2. Theodor Richardson, Charles Thies, “Secure Software Design”, 2nd Edition, Jones and Bartlet
Learning, 2013.
3. Ghezzi, Jazayeri, Mandrioli, “Fundamentals of Software Engineering”, 2nd Edition, Pearson EDU,
2003.
4. Mark Merkow, “Secure, Resilient, and Agile Software Development”, 1st Edition, Auerbach
Publications, 2019.
5. Jason Grembi, “Secure Software Development: A Security Programmer's Guide”, 1st Edition,
Cengage Learning, 2008.
2. Syllabus
Parallelization and Multiprocessors, Iteration Spaces, Affine Array Indexes, Data Reuse, Array Data
Dependant Analysis, Synchronization Free Parallelism, Synchronization Between Parallel Loops,
Pipelining, Locality Optimization, Uses of Affine Transforms.
3. Books Recommended:
1. Aho, Sethi, Ullman, Compilers, “Principles, Techniques, and Tools”, 2 nd Edition, Addison Wesley,
2011.
2. Nandini Prasad, “Principles of Compiler”, 3rd Edition, Cengage Publication, 2017.
3. Steven Muchnick, “Advanced Compiler Design and Implementation”, 1 st Edition M. Kaufmann, 1997.
4. R. Wilhelm and D. Maurer, “Compiler Design (International Computer Science Series)”, 1 st Edition,
Addison Wesley, 1995.
5. V. Raghavan, “Principles of Compiler Design”, 1st Edition, TMG publication, 2017.
2. Syllabus
3. BooksRecommended:
2. Syllabus
3. Books Recommended:
1. Achyut Godbole, Atul Kahate “Web Technologies”, 3rd Edition, Tata McGraw Hill, India, 2017, ISBN:
978-1259062681.
2. Peter Smith, “Professional Website Performance”, 1st Edition, Wiley India Pvt. Ltd, 2012, ISBN:
9781118487525.
3. Roger Pressman and David Lowe, “Web Engineering: A Practitioner's Approach”, 1 st Edition,
McGraw-Hill, 2009, ISBN:0073523291, 9780073523293.
4. J. Governor, D. Hinchcliffe and D. Nickull, “Web 2.0 Architectures: What Entrepreneurs and
Information Architects Need to Know”, 1 st Edition, O'Reilly, 2009, ISBN: 9780596514433.
5. Andrew King, “Website Optimization”, 1st Edition, Shroff Publishers, India, 2009, ISBN:
9788184045628.
1. Guy W. Lecky-Thompson, “Just Enough Web Programming with XHTML, PHP, and Mysql”, 1st Edition,
Cengage Learning, 2008, ISBN 9781598634815.
2. Syllabus
Specifications, Important Equivalences Between CTL Formulas, Adequate Sets of CTL Connectives.
CTL* and The Expressive Powers of LTL and CTL, Boolean Combinations of Temporal Formulas in
CTL, Past Operators in LTL, Model-Checking Algorithms, The CTL Model-Checking Algorithm, CTL
Model Checking With Fairness, The LTL Model-Checking Algorithm, The Fixed-Point Characterisation
of CTL, Monotone Functions.
State Systems: Case Study of Languages and Systems like Z, B, Spin, PVS, Step.
3. Books Recommended:
1. Bloem Roderick, Clarke Edmund, M. Henzinger, Thomas A. Veith, Helmut, “Handbook of Model
Checking”, Springer International Publishing, 2018, ISBN: 978-3-319-10575-8,3319105752, 978-3-
319-10574-1.
2. Michael Huth Mark Ryan, “Logic in Computer Science: Modelling and Reasoning about Systems”, 2 nd
Edition, Cambridge University Press New York, NY, USA, 2004, ISBN:052154310X.
3. P. Cousot, Jan Van Leeuwen (edited by), “Methods and Logics for Proving Programs in Handbook of
Theoretical Computer Science”, The MIT Press, 1994.
4. Robinson, Alan JA, and Andrei Voronkov, “Handbook of Automated Reasoning”, 2 nd Edition, Gulf
Professional Publishing, 2001.
5. Antoni Ligeza, “Logical Foundations for Rule-Based Systems (Studies in Computational
Intelligence)”, 2nd Edition, Springer, 2006.
2. Syllabus
Emerging Challenges in Cyber Security for Intrusion Detection: Unifying the Current Anomaly
Detection Systems, Network Traffic Anomaly Detection. Imbalanced Learning Problem and
Advanced Evaluation Metrics for IDS. Reliable Evaluation Data Sets or Data Generation Tools.
Privacy Issues in Network Anomaly Detection. Machine Learning Techniques: for Anomaly Detection,
for Misuse/Signature detection, for Hybrid detection, for Scan detection. Cost-Sensitive Modeling
for Intrusion Detection. Data Cleaning and Enriched Representations for Anomaly Detection in
System Calls.
3. Books Recommended:
1. Clarence Chio, David Freeman. Machine Learning and Security. Protecting Systems with Data
and Algorithms, O’Reilly Media Publications. 2018
2. Marcus A. Maloof (Ed.) , Machine Learning and Data Mining for Computer Security: Methods
and Applications, Springer-Verlag London Limited, 2006
3. Sumeet Dua and Xian Du. Data Mining and Machine Learning in Cybersecurity. CRC Press, Taylor
and Francis Group, LLC. 2011
4. Research Papers Prescribed in the class.