Iiest PG Syllabus It
Iiest PG Syllabus It
Iiest PG Syllabus It
Theory Subtotal 15
Practical Subtotal 6
Total Credit 21
1. Soft Computing Techniques (IT 5121) 1. Complex Systems and Cellular Automata
2. Embedded Systems and IoT (IT 5122) (IT 5161)
3. Pervasive Computing (IT 5123) 2. Wireless Networks (IT 5162)
4. Discrete and Computational Geometry (IT 3. Cryptographic Techniques (IT 5163)
5124) 4. Medical Image Processing (IT 5164)
5. Information and Coding Theory (IT 5125) 5. Multi-core Architecture and Parallel Pro-
6. Design of Operating Systems (IT 5126) gramming (IT 5165)
7. Mathematics for Computation (IT 5127) 6. Introduction to Embedded Systems (IT 5166)
Second Semester
Serial Number Subject Code Paper Credit
1 IT 5201 Paper VI: Advanced Database Management 3
System
Theory Subtotal 15
Practical Subtotal 6
Total Credit 21
1. Multimedia Coding and Compression (IT 5221) 1. CAD Algorithms for VLSI (IT 5261)
2. Mobile Computing (IT 522) 2. Computational Topology (IT 5262)
3. Approximation Algorithms (IT 5223) 3. IoT Systems (IT 5263)
4. Real Time Systems (IT 5224) 4. DSP Algorithms (IT 5264)
5. Machine Learning (IT 5225) 5. Embedded System Security (IT 5265)
6. Cloud and Services Computing (IT 5226) 6. Cognitive Radio and Networks (IT 5266)
Third Semester
Total Credit 18
Fourth Semester
Total Credit 30
FIRST SEMESTER
1. Models of Computation; Algorithms and Complexity; Best case, worst case and av- 6
erage case; asymptotic notations
2. Elementary Algorithms: Sorting and searching; search trees; balanced trees; hashing 6
5. Graph algorithms: BFS and DFS, Minimum Spanning Trees, Shortest Paths, Max Flow 6
6. Randomized algorithms: identity testing, primality and min cut, Number theoretic 6
algorithms
TOTAL 38
Books:
1. Aho, Hopcroft and Ullman: The Design and Analysis of Computer Algorithms (Pearson)
2. Cormen, Leiserson, Rivest and Stein: Introduction to Algorithms, 3rd Edition (The MIT Press)
Syllabus:
Sl. No. Module Name and Topics No. of Classes
TOTAL 38
Text Books:
1. Computer Architecture: A quantitative approach – John L. Hennessy, David A. Patterson – Morgan
Kaufmann
2. Computer organization and Architecture: Designing for performance William Stallings – Pearson
3. Advanced Computer Architecture: Parallelism,Scalability and programmability Kai Hwang, NareshJot-
wani – Mc Graw Hill,2008.
Reference Books:
1. Computer Organization and design: The Hardware/Software Interface, David A. Patterson, John L. Hen-
nessy -Morgan Kaufmann, Year: 2004.
Pre-requisites: Students are expected to have knowledge on probability and statistics, random processes, and
communication engineering.
Syllabus:
Sl. No. Module Name and Topics No. of Classes
1. Baseband, narrowband and wideband signals and noise representation and charac- 4
teristics of communication channels.
2. Baseband binary signal transmission over band limited channels, Transmission cod- 4
ing and PSD, ISI and its control
5. Digital carrier modulation techniques: Binary and M-ary shift keying techniques, 8
QPSK, MPSK, MSK, GMSK, coherent and non-coherent detection, PSD and bit error
rate calculation
6. Spread Spectrum: Concept of spectrum spreading, process gain, properties and gen- 8
eration of code patterns, DSSS, FHSS, THSS techniques and their comparison
7. Principle of detection and estimation: Binary and M-ary hypothesis testing. Bayes' 6
likelihood ratio test, waveform estimation, linear estimation problems, Wiener fil-
tering, Kalman filtering
TOTAL 38
Books:
1. Digital communications by Simon Haykin-Wiley.
2. Modern Communications and Spread Spectrum by G. R. Cooper and C. D. McGllem-McGraw-Hill Int.
3. Digital Communication Techniques Signal Design and Detection by Marvin K. Simon, Sami M. Hinedi, William
C. Lindsey, PHI
4. Digital Communication by J. R. Barry, E. A. Lee and D. G. Messerschmitt, Springer International.
Syllabus:
Sl. No. Module Name and Topics No. of Classes
6 Meta-heuristics 4
PSO, Ant Colony Optimization, Honey Bee etc.
TOTAL 38
Text Books:
1. Neural networks A comprehensive foundation, Simon Haykin, Pearson Education 2nd Edition 2004
2. Neural Fuzzy Systems- A Neuro-Fuzzy Synergism to Intelligent System, C.T. Lin and George Lee, Pren-
tice Hall
3. Genetic Algorithms in Search, Optimization and Machine Learning, David E. Goldberg.
Reference Books:
1. Artificial neural networks by B.Vegnanarayana Prentice Halll of India P Ltd 2005
2. Neural networks in Computer intelligence, Li Min Fu TMH 2003
3. Neural networks, James A Freeman David M S Kapura Pearson Education 4. An Introduction to Genetic
Algorithms, Melanie Mitchell, MIT Press.
4. Uncertain Rule-Based Fuzzy Logic Systems: Introduction and New Directions, Jerry M. Mendel.
5. Fuzzy Logic with Engineering Applications, Timothy. J. Ross
6. Fuzzy Sets and Fuzzy Logic – Theory and Applications, G. J. Klir and Bo Yuan, Prentice Hall India
Syllabus:
Sl. No. Module Name and Topics No. of Classes
1 Introduction to Embedded System 8
Definition of Embedded System & its classification, characteristics of embedded
systems, design parameters/Metrics of embedded systems.
Components of embedded systems with review of Microprocessor & Microcon-
trollers, introduction to embedded processor, Digital signal processor, Applica-
tion specific system processor, Multiprocessor systems using General Purpose
Processor.
2 System Processor 6
Standard Single purpose processors: Peripherals, Introduction, Timers, Counters
and watchdog Timers, UART, Pulse Width Modulators, Clocking unit, Real Time
Clock Reset Circuitry. Processor and memory organization, processor and
memory selection, Memory Types, Memory map and addresses.
3 I/O Interfacing 6
I/O devices: ADC/DAC, Optical Devices such as LED/LCD Display devices, Key-
board controller, Timer & counting devices, serial communication using I2C,
SPI,CAN, RS232, & USB.
Device drivers & interrupt service Mechanism: ISR concepts and ISR handling
mechanisms
7 Internet of Things 4
IoT evolution, Basics of IoT, Embedded systems design standards and metrics for
IoT, IoT in home automation, healthcare, agriculture, and industrial applications,
Different IoT platforms (hardware), Emerging directions in IoT.
TOTAL 38
Text Books:
1. Embedded System Design A Unified Hardware/Software Introduction (3e) - by Frank Vahid / Tony
Givargis - Wiley India
2. Embedded systems architecture, programming and design (2e) - by Raj Kamal – TMH
Reference Books:
1. Introduction to Embedded Systems (2e) – by Shibu K V, McGraw Hill Education (India)
2. Computer Organization and Embedded Systems (6e) – by Carl Hamacher et al, McGraw Hill Interna-
tional
3. Embedded Systems – Concepts, Design and Programming - by Dave and Dave, Pearson
4. Embedded/Real Time Systems: Concepts, Design and Programming – by Prasad, Dreamtech Press
5. Embedded Microcontrollers and Processor Design – by Osborn, Pearson
6. Embedded Systems Architecture – by Noergaard, ELSEVIER
7. Embedded System Design for students – by Verma, SPD
8. Designing Embedded Hardware – by Catsoulis, SPD, O’Reilly
Prerequisites: The student may have basic concepts on computer networks and operating system.
Course outcome: After completion of this course the student will learn about the basics of modern smart com-
puting, sensing system, context aware and intelligent system, HCI, and pervasive communication
Syllabus:
Sl. No. Module Name and Topics No. of Classes
8. Intelligent systems 3
Basic concept, architecture, design, and systems operation
9. Pervasive communication 8
Introduction, data network, wireless network, ubiquitous network, future network and
issues
TOTAL 38
Books:
1. Ubiquitous Computing: Smart Devices, Environments and Interactions, By Stefan Poslad, J Wiley.
2. Fundamentals of Mobile And Pervasive Computing, By Adelstein, Tata McGraw-Hill Education
3. Pervasive Computing and Networking edited by Mohammad S. Obaidat, Mieso Denko, Isaac Woungang, J
Wiley
4. Pervasive Computing, by Jochen Burkhardt, Dr. Horst Henn, Stefan Hepper, Klaus Rindtorff, Thomas Schack,
Pearson Education India
5. Pervasive Computing: Concepts, Technologies and Applications, By Minyi Guo, Jingyu Zhou, Feilong Tang,
Yao Shen, CRC
Syllabus:
Sl. No. Module Name and Topics No. of Classes
2. Orthogonal range searching (in brief): kd-tree, range tree, Lower Bounds on 5
Algebraic tree model and Geometric data structures (DCEL)
3. The Maximal Points Problem (closest pair and farthest pair), Geometric search- 3
ing, Slab method, Range searching
TOTAL 38
Books:
1. Computational Geometry Algorithms and Applications, Authors: de Berg, M., Cheong, O., van Kreveld, M.,
Overmars, M.
2. Computational Geometry, An Introduction, Authors: Preparata, Franco P., Shamos, Michael.
3. Discrete and Computational Geometry, Satyan L. Devadoss& Joseph O'Rourke.
4. Matoušek, Jiří. Lectures on discrete geometry. Vol. 108. New York: Springer, 2002.
Paper IV: IT 5125 Elective (Departmental)
Information and Coding Theory
Pre-requisites:Students are expected to have knowledge on Probability, Statistics, random process, and Com-
munication Engineering.
Syllabus:
Sl. No. Module Name and Topics No. of Classes
2. Shannon’s noisy coding theorem and converse for discrete channels; Continuous 4
channels
3. Channel Coding, linear block codes; cycle codes, Golay codes and cyclic Redundancy 14
Check (CRC) codes; BCH and Reed-Soloman codes, LDPC codes; Convolution codes;
majority logic decoding; Viterbi decoding algorithm
5. Information theory and coding for physical layer security: Wire-tap channel, Slowly 10
fading wiretap channel, Relay channel and in presence of un-trusted relay
TOTAL 38
Books:
1. Information Theory, Coding and Cryptography by Ranjan Bose, TMH
2. Elements of Information Theory, 2nd Edition Thomas M. Cover, Joy A. Thomas, Wiley
3.An Introduction to information theory by REZA, FAZLOLLAH M.
4.Error Control Coding from theory to practice by Peter Sweeney John Wiley
Prerequisites: None
Course Objectives: This course aims towards providing a detailed understanding of structure, purpose and func-
tions of modern operating systems, including hardware and software concepts related to design of OS, process
control, concurrency control, processor/disk scheduling, memory management, storage management.
The course will include case studies on Linux and Windows operating systems.
Course Outcome:Upon successful completion of this course a student will gain the followings:
1. Detailed understanding of structure, purpose and functioning of modern operating systems
2. Problem solving capabilities related to process management, scheduling, synchronization,concurrency
control, deadlock handling
3. Understand memory management, use of virtual memory in modern operating systems, and the struc-
ture of the most common file-systems
4. Understanding of Linux and Windows operating systems
Syllabus:
Sl. No. Module Name and Topics No. of Classes
3. Process/Thread Concepts: 2
Concept of process, Process synchronization, Process Management and Scheduling,
Co-operating processes, Inter-process communication (IPC), Remote procedure call
(RPC), Hardware requirements: protection, privileged mode, Threads and their man-
agement, Communication in client-server systems
4. Concurrency Control: 4
The critical section problem, Synchronization hardware, Semaphores, Classical prob-
lems of synchronization, Tools and constructs for concurrency, Detection prevention
and avoidance of deadlocks, Recovery from deadlocks, Dynamic resource allocation
5. Processor Scheduling: 3
Scheduling criteria, Pre-emptive Non-pre-emptive scheduling, Priorities, Aging,
Scheduling algorithms, Multiple processor scheduling, Algorithm evaluation
6. Memory Management: 5
Physical and Virtual Memory, Paging, Segmentation, Locality, Demand Paging, Pro-
cess creation, Page replacement, Frame allocation, Thrashing
8. File Management: 3
File Systems, File Organization, File Allocation, Free Space Management, Swap Space
Management, File Access Control
9. I/O Management: 2
I/O Hardware, Application I/O Interface, Kernel I/O Subsystem, Transforming I/O Re-
quests to Hardware Operations
TOTAL 38
Essential Reading:
1. Abraham Silberschatz, Peter B. Galvin, Greg Gagne, Operating System Concepts, Wiley.
2. Harvey M. Deitel, Paul J. Deitel and David R. Choffnes. Operating systems. Delhi.: Pearson Education:
Dorling Kindersley.
3. Maurice J. Bach, The design of the UNIX operating system. Englewood Cliffs, NJ: Prentice-Hall.
4. Arpaci-Dusseau, Remzi H., and Andrea C. Arpaci-Dusseau. Operating systems: Three easy pieces. Vol.
1. Arpaci-Dusseau Books, 2015.
References:
1. William Stallings, Operating Systems, Internals and Design Principles, Pearson Education.
2. Andrew S. Tanenbaum, Herbert Bos, Modern Operating Systems, Prentice Hall
3. Randal E. Bryant and David Richard O'Hallaron. Computer systems: a programmer's perspective, Pren-
tice Hall
3. Vector Calculus: Surface and Volume Integral, Stoke’s Theorem, Green’s Theorem, 8
Divergence Theorem
TOTAL 38
Books:
1. Lehman, Eric, Tom Leighton, and Albert R. Meyer. Mathematics for computer science. Technical report,
2006. Lecture notes, 2010.
2. Kleinrock, Leonard. "Queueing Systems: Volume 1: Theory, 1975." A Wiley-Interscience Publica-
tion (1975).
3. Kleinrock, Leonard. Queueing systems, volume 2: Computer applications. Vol. 66. New York: wiley, 1976.
4. Gilbert and Nicholson: Modern algebra with applications. Second Edition.
5. S Barry Cooper: Computability Theory
6. Angelo Margaris: First order mathematical logic.
3. Reversible cellular automata, de Bruijn graphs and testing reversibility and sur- 8
jectivity of one-dimensional CA, Amoroso and Patt's algorithm, Reachability tree
TOTAL 38
References:
1. Joel L. Schife. Cellular Automata: A Discrete View of the World. Wiley-Interscience
2. TommasoToffoli, Norman Margolus. Cellular Automata Machines: A New Environment for Modeling. MIT
Press
Prerequisite: Students should have knowledge in communication technologies and computer networking.
Course objective: This course covers advanced topics in wireless networking and mobile computing, including
supporting wireless technologies, various types of wireless networks, mobile protocols, and emerging wireless
and mobile technologies.
Syllabus:
Sl. No. Module Name and Topics No. of Classes
7 Data network: GPRS and higher data rate, short messaging service 4
9 Wireless HIPERLAN 2
TOTAL 38
Books:
1. William Stallings, “Wireless Communications and Networks”, Pearson Education,
2002.
2. Jochen Schiller, “Mobile Communications”, Second Edition, Pearson Education, 2003.
3. Cory Beard and William Stallings, “Wireless Communication Networks and Systems”, 1st edition
4. KavehPahlavan, PrasanthKrishnamoorthy, “Principles of Wireless Networks”, First
Edition, Pearson Education, 2003.
5. C.K.Toh, “AdHoc Mobile Wireless Networks”, First Edition, Pearson Education, 2002.
Course Objectives: This course aims towards teaching the basics of computer/data security goals and tech-
niques. This will help the students to develop a mathematical basis of cryptography and cryptanalysis.
Course Outcome: On successful completion of the course, the students will gain in-depth knowledge on the
followings:
1. Basic knowledge of classical cryptosystems and the major goals of security
2. Private and public key cryptosystems with mathematical foundation
3. Key domain analysis of traditional and modern cryptosystems
4. Message authentication, digital signature, cryptographic hash functions, public key infrastructure
5. Entity authentication and key distribution infrastructures
Syllabus:
Sl. No. Module Name and Topics No. of Classes
2. Mathematical Background: 3
Introduction to Number theory, Modular arithmetic, Prime number generation, Pri-
mality Testing, Euclidean Algorithm, Chinese Remainder Theorem, Fermat’s Little
Theorem and Euler’s Theorem, Index of Coincidence
3. Cryptographic Techniques: 3
Introduction to Substitution Ciphers, Transposition Ciphers, Encryption and Decryp-
tion, Symmetric and Asymmetric Key Cryptography, Key Range and Key Size, Key Do-
main Analysis
8. Entity Authentication: 3
Differentiate between message authentication and entity authentication, Data
origin vs. entity authentication, Verification categories, Password based authentica-
tion, Challenge-response based authentication, Zero-knowledge authentication, bi-
ometric authentication
9. Key Management: 3
Key Distribution Center (KDC), Symmetric key agreement protocol, Kerberos as a
KDC, Certification Authorities for Public Keys, Role of Public Key Infrastructure
TOTAL 38
Essential Reading:
1. Behrouz A. Forouzan and D. Mukhopadhyay - Cryptography & Network Security, McGraw Hill.
2. Douglas R. Stinson, Cryptography: Theory and Practice, Chapman and Hall.
3. William Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall.
4. Schneier, Bruce. Applied cryptography: protocols, algorithms, and source code in C. john wiley & sons, 2007.
5. Katz, Jonathan, and Yehuda Lindell. Introduction to modern cryptography. CRC press, 2014.
Syllabus:
Sl. No. Module Name and Topics No. of Classes
6. 3D Image Analysis 2
Feature extraction and analysis of 3D MR images
TOTAL 38
Books:
1. Gonzalez R. C. y Woods, R. E. “Digital Image Processing” Prentice Hall 3rd Ed. (2007)
2. Davies, E.R. “Computer and Machine Vision: Theory, Algorithms, Practicalities” Academic Press 4th Ed.
(2012),
3. Bushberg, J. T., Seibert, J. A., Leidholt, E. M. and Boone, J. M. “The essential physics of medical imaging”
Wolters Kluwer and Lippincott Williams & Wilkins 3rd Ed. (2012)
4. Frackowiack et al “Human Brain Function” Academic Press 2nd Ed. (2004), 1144 pgs.
Prerequisites: First course on Digital Logic and Circuit Design, Knowledge of microprocessors, microcontrollers,
first course on programming.
Course Objective: Primary objective of this course is to provide a comprehensive introduction towards the grad-
ual transition from single core based computing to multi-core era, design and architecture details of multi-core
based systems, programming and examples with case studies.
Program Outcome: After attending this course students will be able to
1. Get the idea of benefits achieved due to transition from single core to multi-core based computing
systems.
2. Get to know detailed architecture of different multi-core based systems in use.
3. Get to know and experience with different types of programming models used to optimize the perfor-
mance of multi-core systems.
4. Acquire the art of parallel processor programming with MPI and OpenMP programming models – state
of the art programming model used by industry for parallel programming on multi-core systems.
5. Compare programming for serial processors and programming for parallel processors.
Syllabus:
Sl. No. Module Name and Topics No. of Classes
1 Multi-core Processors 8
Single core to Multi-core architectures – SIMD and MIMD systems – Interconnec-
tion networks - Symmetric and Distributed Shared Memory Architectures –
Cache coherence - Performance Issues – Parallel program design.
TOTAL 38
Text Books:
1. An Introduction to Parallel Programming – by Peter S. Pacheco, Morgan-Kauffman/ELSEVIER
2. Multicore Application Programming for Windows, Linux and Oracle Solaris – by Darryl Gove, Pearson
Reference Books:
1. Parallel Programming in C with MPI and OpenMP – by Michael J Quinn, TMH
2. Multi-core Programming – by Shameem Akhter and Jason Roberts, Intel Press
Prerequisites: A first course on Digital Logic and Circuit Design, Basic knowledge of microprocessors, microcon-
trollers (essential), Basic programming concepts (desirable)
Course Objective: Primary objective of this course is to introduce the concepts of necessity, characteristics, de-
sign, and detailed working principles of an embedded system dominating each electrical/electronic and compu-
ting application sector in industry.
Program outcome:
1. Students will get a first-hand introduction towards the basic design as well as working principle of em-
bedded systems.
2. Details regarding different components used as building blocks in an embedded system should be in-
troduced to the reader.
3. Both electronic/electrical aspects as well as programming aspects to be introduced to get the entire
working flavour of the system.
4. Different simple case studies taken from different application sectors to be introduced to prepare the
students ready for the real-life applications of such systems.
Syllabus:
Sl. No. Module Name and Topics No. of Classes
2 System Processor 8
Standard Single purpose processors: Peripherals, Introduction, Timers, Counters
and watchdog Timers, UART, Pulse Width Modulators, Clocking unit, Real Time
Clock Reset Circuitry. Processor and memory organization, processor and
memory selection, Memory Types, Memory map and addresses.
3 I/O Interfacing 8
I/O devices: ADC/DAC, Optical Devices such as LED/LCD Display devices, Key-
board controller, Timer & counting devices, serial communication using I2C,
SPI,CAN, RS232, & USB.
Device drivers & interrupt service Mechanism: ISR concepts and ISR handling
mechanisms
4 Programming Concepts, Embedded System Programming C & C++ 6
Assemble language high level lang. C program Elements, Micros & Function, Data
types, Data Structures, Modifiers, Statement, loops & Pointers, queues & Stacks,
List & order list, Embedded System Programming in C++. C Program Compilers &
Cross Compilers. In Circuit emulator.
TOTAL 38
Text Books:
1. Embedded System Design A Unified Hardware/Software Introduction (3e) - by Frank Vahid / Tony
Givargis - Wiley India
2. Embedded systems architecture, programming and design (2e) - by Raj Kamal – TMH
Reference Books:
1. Introduction to Embedded Systems (2e) – by Shibu K V, McGraw Hill Education (India)
2. Computer Organization and Embedded Systems (6e) – by Carl Hamacher et al, McGraw Hill Interna-
tional
3. Embedded Systems – Concepts, Design and Programming - by Dave and Dave, Pearson
4. Embedded/Real Time Systems: Concepts, Design and Programming – by Prasad, Dreamtech Press
5. Embedded Microcontrollers and Processor Design – by Osborn, Pearson
6. Embedded Systems Architecture – by Noergaard, ELSEVIER
7. Embedded System Design for students – by Verma, SPD
8. Designing Embedded Hardware – by Catsoulis, SPD, O’Reilly
2. Implementation of graph algorithms; Study of data structures’ roles in developing efficient algo-
rithms (in connection with graph algorithms)
1. Software Simulation and verification in hardware platform different transmission coding signal-
ing- ON OFF, Polar, Biploar techniques and spectrum analysis
2. Baseband data decoding using integrate and dump receiver
3. Software simulation and verification in hardware digital carrier modulation-BASK, BPSK, BFSK
4. Generation and verification of MLS (maximum length sequence) properties.
5. DS-SS modulation and demodulation in baseband transmission
6. CDMA code generation and DS-CDMA decoding in baseband transmission
7. Software simulation on binary and M-ary hypothesis, likelihood ratio test
SECOND SEMESTER
Syllabus:
Sl. No. Module Name and Topics No. of Classes
References:
1. Abraham Silberschatz, Henry F. Korth and S. Sudarshan, “Database System Concepts”, Mc Graw Hill,
6th ed, 2013.
2. Ramez Elmasri and Shamkant B. Navathe, “Fundamentals of Database Systems”, Pearson, 7th ed,
2016.
3. C. J Date, “An Introduction to Database System”, Pearson, 8th ed, 2003.
4. G. Pelagatti and S. Cerri, “Distributed Databases:Principles and Systems”, Mc Graw Hill, 2008
Course Objectives: This course aims towards presenting an overview of security requirements and challenges in
network communication. This course will include the concepts of internetworking and various goals of security
at different layers of the ISO/OSI model. It focusses on addressing those network security challenges using cryp-
tographic techniques and protocols. This also includes state-of-the-art applications and practices that are imple-
mented to provide email and web security.
Course Outcome: On successful completion of the course, the students will be able to
1. Identify network security threats at different layers of the ISO/OSI model and propose solutions to
overcome those.
2. Achieve secure network communications
3. Verify the integrity of information exchanges in computer networks
4. Develop email and file transfer security systems
5. Develop SSL or Firewall based solutions against security threats
Syllabus:
Sl. No. Module Name and Topics No. of Classes
3. Cryptographic Techniques: 2
Introduction to SubstitutionTechniques, Transposition Techniques, Encryption and
decryption, Symmetric and Asymmetric Key Cryptography, Key Range and Key Size
8. System Security: 2
Buffer overflow and malicious software, malicious programs, intrusion detection sys-
tem. Firewalls: Definition, Construction, Working principles
9. Media Security: 3
Data hiding, Steganography &Steganalysis, Digital watermarking, Visual Cryptog-
raphy
TOTAL 38
Essential Reading:
1. Behrouz A. Forouzan and D. Mukhopadhyay - Cryptography & Network Security, McGraw Hill.
2. William Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall.
3. Douglas E. Comer and David L. Stevens. Internetworking with TCP/IP: Volume II: Design, Implementation,
and Internals. Prentice Hall.
References:
1. Douglas R. Stinson, Cryptography: Theory and Practice, Chapman and Hall.
1. Review of TCP/IP Protocol Stack: IPv4, IPv6, TCP, UDP, ARP, ICMP, SMTP etc. 4
TOTAL 38
Books:
1. Ajoy D. Kshemkalyani and MukeshSinghal. Distributed Computing: Principles, Algorithms, and Systems.
Cambridge University Press
2. Andrew S. Tannenbaum and Maarten van Steen. Distributed Systems: Principles and Paradigms. Prentice
Hall, 2nd Edition
3. Bruce Croft, Donal Metzler and Trevor Strohman. Search Engines: Information Retrieval in Practice. Pear-
son Education
Pre-requisites: Basic knowledge of multimedia systems and information and coding theory
Syllabus:
Sl. No. Module Name and Topics No. of Classes
2. Transform Coding 6
Transforms, block-wise transform coding, orthogonal and orthonormal trans-
form, Transform coding gain, Bit allocation for transform coefficients, DCT &
DFT, Threshold coding, Typical coding artifacts, Fast implementation of the DCT,
Haar Transform, KarhunenLoève Transform (KLT),Walsh-Hadamard Transform
(WHT)
3 Wavelet Coding 6
Embedded Zero Tree Wavelet (EZW), Set-Partitioning in Hierarchical Trees
(SPIHT), Embedded Block Coding with Optimized Truncation (EBCOT), Wavelet
Difference Reduction (WDR ), Space – Frequency Quantization (SFQ), Stack- Run
(SR), Geometric Wavelet (GW), Filters and Filterbanks
7 Image Compression 4
JPEG, JPEG 2000, Embedded Block Coding with Optimized Truncation (EBCOT)
in JPEG 2000. JPEG XT
8. Audio Compression 4
PCM, ADPCM in Speech Coding, Linear Predictive Coding, MP3, MPEG
TOTAL 38
Text Books:
1. Sun, Huifang, and Yun Q. Shi. Image and video compression for multimedia engineering: Fundamentals,
algorithms, and standards. CRC press, 2008.
2. Gibson, J. D., Berger, T., Lookabaugh, T., Baker, R., & Lindbergh, D. (1998). Digital compression for mul-
timedia: principles and standards.
3. Steinmetz, R., &Nahrstedt, K. (2002). Multimedia fundamentals, volume 1: media coding and content
processing. Pearson Education.
Reference Books:
1. Steinmetz, Ralf, and KlaraNahrstedt. Multimedia: Computing, Communications and Applications: Me-
dia Coding and Content Processing. Prentice Hall PTR, 2002.
2. Nelson, Mark, and Jean-Loup Gailly. The data compression book. New York: M & t Books,
3. Richardson, Iain E. H. 264 and MPEG-4 video compression: video coding for next-generation multime-
dia. John Wiley & Sons, 2004.
Pre requisites: The students opting this subject must have prior knowledge in Networking, Operating System
and basic communication.
Syllabus:
Sl. No. Module Name and Topics No. of Classes
Total 38
Books:
1. Fundamentals of Mobile Computing by Pattnaik Mall, PHI.
2. Mobile Computing, by TalukderAsoke K. Hasan Ahmed and Roopa Yavagal, Mcgraw Hill.
3. Mobile Computing Third Edition, by RAJ KAMAL, Oxford University Press.
4. Mobile Communications, by Jochen Schiller, Second Edition, Pearson Education, 2003.
Syllabus:
Sl. No. Module Name and Topics No. of Classes
2 Combinatorial Algorithms: 4
Approximation Schemes: a. Approximation Scheme for Scheduling b. Approxima-
tion Scheme for Knapsack c. Fully Polynomial Approximation Schemes d. Pseudo-
Polynomial Algorithms e. Strong N P-completeness and FPAS
5 Bin Packing a) Asymptotic Approximation Scheme i) Restricted Bin Packing ii) Elimi- 5
nating Small Items iii) Linear Grouping iv) APAS for Bin Packing b) Asymtotic Fully
Polynomial Scheme i) Fractional Bin Packing and Rounding ii) AFPAS for Bin Packing
iii) Near-Absolute Approximation
6. LP-Based Algorithms 4
Introduction to LP-Duality
a. The LP-duality theorem
b. Min–max relations and LP-duality
c. Two fundamental algorithm design techniques
6 Set Cover via Dual Fitting a) Dual-fitting-based analysis for the greedy set cover al- 4
gorithm b) Generalizations of set cover
7 Maximum Satisfiability 4
a) Dealing with large clauses
b) Derandomizing via the method of conditional expectation
c) Dealing with small clauses via LP-rounding
d) A 3/4 factor algorithm
8 Facility Location 3
a) An intuitive understanding of the dual
b) Relaxing primal complementary slackness conditions
c) Primal–dual schema based algorithm
d) Analysis
TOTAL 38
Books:
1. Vazirani, Vijay V. Approximation algorithms. Springer Science & Business Media, 2013.
2. Motwani, Rajeev. "Lecture notes on approximation algorithms: Volume I." Dept. Comput. Sci., Stan-
ford Univ., Stanford, CA, Tech. Rep. CS-TR-92-1435 (1992).
Syllabus:
Sl. No. Module Name and Topics No. of Classes
TOTAL 38
Text Books:
1. Real-Time Systems by Jane W. S. Liu Prentice Hall; 1 edition ISBN: 978-0130996510
2. Krishna .C.M “Real Time Systems” Mc-Graw Hill Publication.
3. Hamid A. Toliyat and Steven G. Campbell, “DSP based Electromechanical Motion Control” CRC Press,
2003, ISBN 9780849319181.
4. Embedded systems architecture, programming and design (2e) - by Raj Kamal – TMH.
Reference Books:
1. Jean J Labrosse, “Embedded System Design blocks”, CMP books, Second Edition, ISBN 0-87930-604-1.
2. Embedded Systems Architecture – by Noergaard, ELSEVIER
Prerequisite:
• Linear algebra: Simple linear algebra.
• Basic Programming concepts.
• Calculus: Some differential calculus.
Syllabus:
Sl. No. Module Name and Topics No. of Classes
2 Neural Networks 4
Single and multi-layer perceptron learning algorithms
3 Supervised Learning 8
Linear Regression (Gradient Descent, Normal Equations), Weighted Linear Re-
gression (LWR), Logistic Regression, Perceptron, Newton's Method, KL-diver-
gence, (cross-)Entropy, Natural Gradient, Exponential Family and Generalized
Linear Models, Generative Models (Gaussian Discriminant Analysis, Naive Bayes)
, Kernel Method (SVM, Gaussian Processes), Tree Ensembles (Decision trees,
Random Forests, Boosting and Gradient Boosting).
4 Learning Theory 8
Regularization, Bias-Variance Decomposition and Trade-off, Concentration Ine-
qualities, Generalization and Uniform Convergence, VC-dimension.
5 Unsupervised Learning 8
K-means, Gaussian Mixture Model (GMM), Expectation Maximization (EM), Var-
iational Auto-encoder (VAE), Factor Analysis, Principal Components Analysis
(PCA), Independent Components Analysis (ICA).
TOTAL 38
Text books
1. Christopher M. Bishop. Pattern Recognition and Machine Learning (Springer)
2. David Barber, Bayesian Reasoning and Machine Learning (Cambridge University Press).
3. Tom Mitchell. Machine Learning (McGraw Hill)
4. Richard O. Duda, Peter E. Hart, David G. Stork. Pattern Classification (John Wiley & Sons)
Reference texts
• Trevor Hastie, Robert Tibshirani, Jerome Friedman, The Elements of Statistical Learning, Springer, 2009
(freely available online)
• Hal Daumé III, A Course in Machine Learning, 2015 (in preparation; most chapters freely available
online)
• Kevin Murphy, Machine Learning: A Probabilistic Perspective, MIT Press, 2012
• Christopher Bishop, Pattern Recognition and Machine Learning, Springer, 2007.
• Shai Shalev-Shwartz and Shai Ben-David. Understanding Machine Learning: From Theory to Algorithms,
Cambridge University Press, 2014.
Prerequisites: The students required to know about the basic computer network, data structure, database man-
agements, operating systems
TOTAL 38
Books:
1. Cloud Computing: A Hands-On Approach By Arshdeep Bahga, Vijay Madisetti,
2. Fox, Armando, et al. "Above the clouds: A berkeley view of cloud computing." Dept. Electrical Eng. And Com-
put. Sciences, University of California, Berkeley, Rep. UCB/EECS 28.13 (2009): 2009.
3. Cloud Computing: Concepts, Technology & Architecture, Book by Richardo Puttini, Thomas Erl, and Zaigham
Mahmood, Prentice Hall.
Syllabus:
Sl. No. Module Name and Topics No. of Classes
7 Testability issues: Fault modelling and simulation, test generation, design for 6
testability, built-in self-test. Testing SoCs.
TOTAL 38
Text Books:
1. M.D.Ciletti, “Modeling, Synthesis and Rapid Prototyping with the Verilog HDL”, Prentice-Hall.
2. M.G.Arnold, “Verilog Digital – Computer Design”, Prentice-Hall.
3. VLSI Physical Design Automation Theory and Practice – by Sait, Youssef, World Scientific.
4. Algorithms for VLSI Physical Design Automation by Naveed Shervani, Springer International Edition, 3rd
Edition, 2005.
5. G. De Micheli. Synthesis and optimization of digital circuits, 1st edition, 1994
6. Gary D. Hachtel and Fabio Somenzi, Logic Synthesis and Verification Algorithms. Springer.
Reference Books:
1. Digital Integrated Circuits- A Design Perspective by J M Rabaey, Prentice Hall, 3rd Edition, 2012.
2. S. Palnitkar, Verilog HDL: A Guide to Digital Design and Synthesis, Prentice Hall, 2nd edition, 2003.
3. Douglas L. Perry, VHDL: Programming by Example 4th Edition, TMH.
4. D. D. Gajski, N. D. Dutt, A.C.-H. Wu and S.Y.-L. Lin, High-Level Synthesis: Introduction to Chip and System
Design, Springer, 1st edition, 1992.
5. Rudiger E bendt, Görschwin Fey, Rolf Drechsler. Advanced BDD Optimization.
4. Complexes: 4
Simplicial Complexes, Convex Set Systems, Delaunay Complexes, Alpha Complexes
6. Duality: 4
Cohomology, Poincar ́e Duality, Intersection Theory, Alexander Duality
9. Applications: 3
Image Segmentation, Elevation, Gene Expression, Local Homology for Plant Root
Architecture
TOTAL 38
Books:
1. P. S. Alexandroff. Elementary Concepts in Topology. translated by A. E. Farley, Dover, New York, 1961.
2. H. Edelsbrunner. Geometry and Topology for Mesh Generation. Cambridge Univ. Press, England, 2001.
3. P. J. Giblin. Graphs, Surfaces and Homology. 2nd edition, Chapman and Hall, London, 1977.
4. Y. Matsumoto. An Introduction to Morse Theory. Amer. Math. Soc., Providence, Rhode Island, 2002.
5. J. W. Milnor. Topology from the Differential Viewpoint. Princeton Univ. Press, New Jersey, 1965.
6. J. R. Munkres. Topology. A First Course. Prentice-Hall, Englewood Cliffs, New Jersey, 1975.
7. J. R. Munkres. Elements of Algebraic Topology. Perseus, Cambridge, Massachusetts, 1984.
Prerequisite: The student may have concepts of embedded systems, wireless and computer network, operat-
ing system.
Course outcome:After completion of the course, students will gather knowledge on:
• IoT architecture and smartness of IoT
• IoT open source web infrastructure
• IoT network and transport layer protocols
• IoT Data analytics
• Introductory overview on embedded computing and IoT systems
• IoT security
Syllabus:
Sl. No. Module Name and Topics No. of Classes
3. IoT standards, open source vs close source, open source web infrastructure,
5
openIoT architecture, cloud convergence
6. Application protocols for IoT, IoT transport layer, IoT application layer 4
7. Data and analytics for IoT: streaming process, scalability, robustness, framework
6
for distributed data analysis
9. IoT security and privacy, network and transport layer challenges, security frame-
4
work: light weight cryptography
TOTAL 38
Books:
1. Designing the Internet of Things By Adrian McEwen, Hakim Cassimally, J Wiley
2. Precision - Principles, Practices and Solutions for the Internet of Things, Book by Timothy C K Chou,
McGraw-Hill
3. Getting Started with the Internet of Things, Cuno Pfister, O Reilly media
4. IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things, Da-
vid Hanes, Gonzalo Salgueiro, Patrick Grossetete, Robert Barton, Jerome Henry, Cisco Press
Course outcome:Students who successfully complete the course will be able to:
1. Determine the frequency response and the z-transform of discrete-time systems.
2. Determine the discrete Fourier transform of discrete-time signals
3. Design Finite Impulse Response (FIR) and Infinite Impulse Response (IIR) filters
4. Design adaptive filters
Syllabus:
Sl. No. Module Name and Topics No. of Classes
IIR filter design techniques: Approximation theory, Impulse invariant and bilin-
6 6
ear transformations, Frequency transformations
Introduction to adaptive filter-LMS FIR, Weiner filter theory; multi-rate filter de-
9 4
sign-Up-sampling, down-sampling, sub-band decomposition, Applications
TOTAL 38
Books:
1. Digital Signal Processing, Principles, Algorithms and Applications- Proakis, Manolakis and Sharma, Pearson
Education.
2. Digital Signal Processing by Alan V. Openheim and Ronald W. Schafer, Prentice-Hall.
3. Digital Signal Processing Fundamentals and Applications- Li Tan and Jean Jiang.
4. Digital Signal Processing- A computer-Based Approach- Sanjit K. Maitra, TMH.
5. Digital Signal Processing with Field Programmable Gate Arrays, U.Meyer-Baese, Springer Third Edition.
Syllabus:
Sl. No. Module Name and Topics No. of Classes
1 Introduction 4
Embedded systems and need for security, Embedded security trends, Security poli-
cies, Security threats.
4 Embedded Cryptography 6
Introduction, One-time pad, Cryptographic modes, Block ciphers, Authenticated en-
cryption, Public key cryptography, Key agreement, Public key authentication, Elliptic
curve cryptography, Cryptographic hashes, Message authentication codes, Random
number generation, Key management for embedded systems, Cryptographic certifi-
cations – FIPS, NSA.
7 Emerging Applications 4
Embedded network transactions, Automotive security, Secure Android, Next gener-
ation Software Defined Radio.
TOTAL 38
Text Books:
1. Embedded Systems Security – Practical Methods for Safe and Secure Software and Systems Develop-
ment - by Kleidermacher and Kleidermacher – Newnes, ELSEVIER
2. Security in Embedded Devices – by Cathy Gebotys, Springer US
Reference Books:
1. Trusted Computing for Embedded Systems – Bernard Candaele et al, Springer International
2. Embedded Systems Architecture – by Noergaard, ELSEVIER
3. Designing Embedded Hardware – by Catsoulis, SPD, O’Reilly.
Pre-requisites: The students are expected to have basic knowledge on Wireless Communications/Wireless Net-
works, Communication Engineering
Course Outcome:Cognitive networks represent a relatively novel paradigm in which it is supposed that users
device sense and understand the electromagnetic environment to become aware of the available transmission
opportunities even in frequency intervals nominally assigned to other specific service. When available, cognitive
devices may exploit these opportunities provided they vacate the channel as soon as a legitimate user starts
transmission. Besides providing potential very high gains in terms of spectrum efficiency, cognitive radios and
networks pose several challenges that will be described in the lectures.
Syllabus:
Sl. No. Module Name and Topics No. of Classes
3. Joint SS and Data Transmission: Link layer design and common control channel, re- 8
source allocation-power allocation and channel assignment, optimized system de-
sign
4. Multi-hop CRN: Routing protocols, both centralized, and distributed geographic for- 4
warding and probabilistic approaches-outage analysis
5. Network Protocol Design for CR: Transport layer protocol design, both TCP- and 4
equation-based Standards and applications
6. Security in CRN data transmission: Eavesdropping and secrecy outage in CRN, Jam- 4
ming for eavesdropping protection, jammer selection, ergodic capacity analysis
TOTAL 38
Books:
1) Principles of Cognitive Radio, EzioBiglieri, Andrea J. Goldsmith, Larry J. Greenstein, H. Vincent Poor, Narayan
B. Mandayam, Cambridge University Press, 2013 - Computers - 299 pages.
2) Handbook of Cognitive Radio, Editors: Zhang, Wei (Ed.) Springer
3) Cognitive Wireless Communication Networks, Editors: Hossain, Ekram, Bhargava, Vijay K. (Eds.) Springer
*******************