1644397192phd Computer Engg
1644397192phd Computer Engg
1644397192phd Computer Engg
For
Ph.D.COURSE
In
Computer Engineering
FARIDABAD
PhD (Computer Engineering)
Scheme of Studies / Examination (w.e.f. July, 2020)
Marks
TOTA
Course Course Title Teaching For Marks for End L
Schedule Session Term Examination MARK
No. als S
CREDITS
TOTA THEOR PRACTI
L P
L Y CAL
PHD-100A Research
4 - 4 25 75 - 100 4
Methodology
Elective-I 4 - 4 25 75 - 100 4
Elective -1
PHDCE-17-01
2 PHDCE-17-02
Information Retrieval Systems
4 Data Mining
PHDCE-18-01A
5 Advanced Internet of Things
PHDCE-18-01
6 Web Search and Information Retrieval
PHDCE-18-03
7 Machine Learning
MCS-18-106
8 Deep Learning
PHDCE-19-01
9 Digital Image Processing and Analysis
PHDCE-19-02
10 Big Data and Machine Learning Techniques
PHDCE-19-03
11 Agile Software development
PCE-02
12 Cloud Computing
MCS-18-304
13 Data Science
MCS-18-110
14 Advanced Software Testing
PHDCE-20-01
15 Computer Vision
MCS-18-208
16 Software Testing
MCS-18-209
17 Advances in Computer Vision and Image Processing PHDCE-20-02
Course Objectives:
• Understand research process in order to plan a research proposal
• Learn methods to devise and design a research set-up
• Plan and perform data collection methods and its analysis
• Conclude research in report writing
Unit 1 Introduction to Research: Definition, need and purpose of research, types of research,
research process, approaches to research, planning a research proposal, literature review.
Unit 2 Measurement Scales: Indexes vs. Scales, Types of Scale, construction of Scale, Bogardus
social distance scale, Thurstone Scale, Likert Scale, Semantic Differential Scale,
Guttmann Scale.
Unit 3 Data Collection Methods: Experiments and Surveys, Experiments: Classical Experiments,
Independent & Dependent Variables, Pre Testing & Post Testing, Double Blind
Experiment, Subject Selection, Variation on Experiment Design. Survey Research: Topics
appropriate for survey research, Guidelines for asking questions, Questionnaire
Construction, Strengths & Weakness of Survey Research, Types of Surveys.
Unit 4 Sampling: Types of sampling methods: Non Probability Sampling, Probability Sampling,
Theory & Logic of Probability Sampling, Sampling Distributions & Estimates of
Sampling Error.
Unit 5 Data Analysis: Qualitative v/s Quantitative data analysis, Qualitative Data Analysis:
Discovering Patterns, Grounded Theory Method, Semiotics, Conversation Analysis,
Qualitative Data Processing. Quantitative Data Analysis: Quantification of Data,
Univariate Analysis, Bivariate Analysis, Multivariate Analysis, Regression Analysis,
Description Analysis. Hypothesis. Multiple Attribute Decision Making.
Unit 6 Report Writing, Ethical Issues and Outcomes: Report Preparation, Structure of Report,
Report Writing Skills, Citations, Research Papers, Intellectual Property Rights,
Plagiarism, Patent, Commercialization, Ethical Issues.
References:
1. Research Methodology by R. Panneerselvam, 2nd Ed. PHI
2. Research Methodology by C.R. Kothari & Gaurav Garg, 3rd Ed. New Age Publishers
3. Research Methodology and Scientific Writing by C. George Thomas, Ane Books
4. The practice of social research by Earl Babbie, 14th Ed. Cengage
5. Multiple Attribute Decision Making, Gwo-Hshiung Tzeng and Jih-Jeng Huang, CRC Press
Research & Publication Ethics
Code: CPE-RPE
Phd- CommonSubject
Code: PHDCE-17-01
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL : 100
COURSE OBJECTIVES
Wireless Networks, Infrastructure and Infrastructure less Wireless Networks, Ad hoc Wireless
Networks, Types of Ad hoc Mobile Communications, Challenges Facing Ad hoc Mobile Networks,
Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks.
Basic definition and concepts of Wireless Networks, design principles for WSNs, comparison of
MANET & WSN, Architecture and Protocol Stack of WSN, Unique constraints and challenges of
WSNs, Applications of WSNs(Military Applications, Environmental Applications, Health
Applications, Home Applications).
Physical Layer Technologies & Standards, Channel Coding,Source Coding, PHY Layer Standards,
Challenges for MAC, Classification of MAC Protocols , Contention free and Contection Based MAC
Protocols.
Challenges of Security in WSN, Security Attacks in WSN, Protocols and Mechanisms for Security,
IEEE 802.15.4 and ZigBee Security
COURSE OUTCOMES
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL : 100
Course Objectives
COURSE OUTCOMES
1. To identify basic theories and analysis tools as they apply to information retrieval.
2. To develop understanding of problems and potentials of current IR systems.
3. To learn and appreciate different retrieval algorithms and systems.
4. To apply various indexing, matching, organizing, and evaluating methods to IR problem.
5. To become aware of current experimental and theoretical IR research.
CODE: PHDCE-17-03
Subject Name: ADVANCED INFORMATION RETRIEVAL SYSTEMS
NO OF CREDITS: 4
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL : 100
Course Objectives
L T P THEORY EXAM: 75
4 0 0 TOTAL : 100
Course Objectives
Unit 1: Introduction to Data Warehouse Data warehousing Definition, DBMS vs data warehouse,
Three-tier architecture, Multidimensional data model, Various Schemas, OLAP operations, OLAP
Servers, OLAP indexing, multi-feature cubes.
Unit 2: Introduction to Data Mining Data mining definition & task, KDD process, KDD versus data
mining, data mining issues, data mining task primitives, supervised and unsupervised learning
approaches, Data preprocessing.
Unit 3: Mining Association rules The a-priori algorithm and FP growth algorithm, generating rules,
improving the efficiency of apriori, rule mining by partitioning, multi-dimensional and multi-level
association rules, correlation rules; meta-rule guided mining and constraint based rule mining,
Incremental rule mining.
Unit 4: Clustering techniques Cluster analysis, similarity and distance measures, partitioning methods:
squared error, k-means and k-medoids approach; Hierarchical Clustering: agglomerative vs Divisive,
Density based methods: Basic definitions and DBSCAN algorithm; Constraint based clustering.
Unit 5: Classification and Prediction Classification by Decision tree induction: information gain
measure, Tree pruning methods, Bayesian classification, rule based classification, backpropagation
through Neural Networks, Genetic Algorithm, Rough Sets, Support Vector Machines and Fuzzy
techniques; Prediction: linear and non-linear regression techniques.
Unit 6: Recent trends and Web Mining Mining of Complex Data Objects, Spatial Databases, Temporal
Databases; Web Mining, categories of web mining: web structure mining, web content mining and web
usage mining, recent research in Data Mining and Web mining.
REFERENCES
1. Data Mining- Concepts & Techniques; Jiawei Han & Micheline Kamber- 2001, Morgan Kaufmann.
2. Data Mining: Introductory and advanced topics: Margaret H Dunham, S. Sridhar; Pearson education,
2008.
3. Data Warehousing in the Real World; Sam Anahory & Dennis Murray, Pearson.
5. Data Warehousing, Data Mining and OLTP; Alex Berson, 1997, Mc Graw Hill.
Course Outcomes
NO OF CREDITS: 4
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL : 100
Pre-requisites: Internet and web Technology, Computer Networks
Course Objectives:
Introduction to IoT, Characteristics of IoT, Physical design of IoT, Logical design of IoT, Functional
blocks of IoT, Communication models & APIs ,IoT & M2M Machine to Machine, Difference between
IoT and M2M, Software define Network, Challenges in IoT(Design ,Development, Security).
Wireless medium access issues, MAC protocol survey, Survey routing protocols, Protocols for
machine to machine communication, Sensor deployment & Node discovery, Data aggregation &
dissemination.
Interoperability in IoT, Domain specific applications of IoT, Home automation, Industry applications,
Surveillance applications, Other IoT applications Clustering, Synchronization, Software agents.
MODULE-4:
Recent trends in various learning techniques of machine learning and classification methods for IOT
applications. Various models for IOT applications, Recent research paper studies.
Course Outcomes:
REFERENCES:
1. Vijay Madisetti, Arshdeep Bahga, “Internet of Things: A Hands-On Approach”
2. Waltenegus Dargie,Christian Poellabauer, "Fundamentals of Wireless Sensor Networks:
Theory and Practice"
CODE: PHDCE-18-03
NO OF CREDITS: 4
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL : 100
Course Objectives:
Information retrieval problem, an inverted index, Processing Boolean queries ,The extended Boolean
model versus ranked retrieval , an inverted index ,Bi-word indexes, Positional indexes, Combination
schemes
Parametric and zone indexes ,Weighted zone scoring, Learning weights ,The optimal weight, Term
frequency and weighting, Inverse document frequency, Tf-idf weighting, The vector space model for
scoring, Variant tf-idf functions.
Efficient scoring and ranking, In exact top K document retrieval, Index elimination ,Champion lists,
Static quality scores and ordering ,Impact ordering ,Cluster pruning ,Component so fan information
retrieval system, Tiered indexes
MODULE-5: WEB SEARCH BASICS
Background and history, Web characteristics, The web graph, Spam, Advertising as the economic
model, The search user experience, User query needs Crawling, Crawler architecture, DNS resolution,
The URL frontier, Link analysis, The Web as a graph, Anchor text and the web graph ,Page Rank,
Markov chains, The Page Rank computation, Topic-specific Page Rank
Language models, Finite automata and language models, Types of language models, Multinomial
distributions over words , The query likelihood model, Using query like lihood language models in IR,
Estimating the query generation probability ,Language modeling versus other approaches in IR
Course Outcomes:
REFERENCES
NO OF CREDITS: 4
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL : 100
Course Objectives:
1. To learn the concept of how to learn patterns and concepts from data without being
explicitly programmed in various IOT nodes.
2. To design and analyse various machine learning algorithms and techniques with a modern
outlook focusing on recent advances.
3. Explore supervised and unsupervised learning paradigms of machine learning.
4. To explore Deep learning technique and various feature extraction strategies.
MODULE-3:
Evaluating Machine Learning algorithms and Model Selection, Introduction to Statistical Learning
Theory, Ensemble Methods (Boosting, Bagging, Random Forests)
MODULE-4:
Sparse Modeling and Estimation, Modeling Sequence/Time-Series Data, Deep Learning and Feature
Representation Learning
MODULE-5:
A selection from some other advanced topics, e.g., Semi-supervised Learning, Active Learning,
Reinforcement Learning, Inference in Graphical Models, Introduction to Bayesian Learning and
Inference
MODULE-6:
Recent trends in various learning techniques of machine learning and classification methods for IOT
applications, Various models for IOT applications.
Course Outcomes:
a. Extract features that can be used for a particular machine learning approach in various IOT
applications.
b. To compare and contrast pros and cons of various machine learning techniques and to get an
insight of when to apply a particular machine learning approach.
c. To mathematically analyse various machine learning approaches and paradigms.
REFERENCES
NO OF CREDITS: 4
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
Unit2: Linear Classifiers, Linear Machines with Hinge Loss, Optimization Techniques,
Gradient Descent, Batch Optimization
Unit 5: Recent Trends in Deep Learning Architectures, Residual Network, Skip Connection
Network, Fully Connected CNN etc.
Unit 6: Classical Supervised Tasks with Deep Learning, Image Denoising, Semanticd,
Segmentation, Object Detection etc.
Course Outcomes:
NO OF CREDITS: 4
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL: 100
Course Objectives: The aim of the course is to provide:
Introduction to Digital Image Analysis, Characteristics of Digital Image Data, Elements of digital
image processing and analysis systems: Digital image representation, visual perception, pixel
connectivity, Digital Image Fundamentals: Image sensing and Acquisition; Image Sampling and
Quantization.
Unit-2
Unit-3
Image Processing Techniques, Visualization tools, Analysis tools and techniques, Colour image
processing, Pixel relationship, Image enhancement, Smoothening, Sharpening, filtering, Compression
and Restoration.
Unit-4
Course Outcomes: Upon successful completion of the course students should be able to: ·
1. Describe the fundamental concepts and process flow of digital image analysis ·
2. Appropriately apply digital image analysis techniques to their research ·
3. Enhance their critical thinking skills .
TEXTBOOKS:
• Digital Image processing (3rd Edition) by Rafael C. Gonzalez, Richard E. Woods Publisher:
Prentice Hall, ISBN-10: 013168728X, ISBN-13: 978-0131687288 [Available at SU's bookstore].
• Remote Sensing Digital Image Analysis (4th Edition) by John A. Richards and XiupingJia,
Springer-Verlag Berlin Heidelberg.
REFERENCES:
• Anil Jain K. “Fundamentals of Digital Image Processing”, PHI Learning Pvt. Ltd., 2011.
• Willliam K Pratt, “Digital Image Processing”, John Willey, 2002.
• Malay K. Pakhira, “Digital Image Processing and Pattern Recognition”, First Edition, PHI
Learning Pvt. Ltd., 2011.
CODE: PHDCE-19-03
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL: 100
Course Objectives:
1. Understand big data for business intelligence. Learn business case studies for big data analytics.
2. Perform map-reduce analytics using Hadoop and related tools.
3. Understand machine learning algorithms.
MODULE-1:
What is big data, why big data, convergence of key trends, unstructured data, industry examples of big
data, big data and marketing, fraud and bigdata, risk and big data, credit risk management, big data and
algorithmic trading, big data and healthcare, big data in medicine, advertising and big data, big data
technologies, open source technologies, cloud and bigdata, mobile business intelligence.
MODULE-2:
Introduction to Hadoop,, analyzing data with Hadoop, Hadoop streaming, design of Hadoop distributed
file system (HDFS), HDFS concepts, MapReduce workflows, anatomy of MapReduce job run, classic
Map-reduce, MapReduce types.
MODULE-3:
Hbase, data model and implementations, Hbase clients, Hbase examples, Cassandra, Cassandra data
model, Cassandra examples, Cassandra clients, Hadoop integration, YARN, failures in classic Map-
reduce and YARN, job scheduling, shuffle and sort, task execution.
MODULE 4
Introduction to machine learning, types of machine learning, Supervised learning: regression,
classification, decision trees, naive bayes, Unsupervised learning: clustering: k-means/kernel k-means.
Course Outcomes:
After completion of course, students would be able to:
a. Describe big data and use cases from selected business domains.
b. Install, configure, and run Hadoop and HDFS.
c. Perform map-reduce analytics using Hadoop.
d. Use Hadoop related tools.
e. Familiar with Machine Learning.
REFERENCES
1. Michael Minelli, Michelle Chambers, and AmbigaDhiraj, "Big Data, Big Analytics: Emerging
Business Intelligence and Analytic Trends for Today's Businesses", Wiley, 2013.
2. P. J. Sadalage and M. Fowler, "NoSQL Distilled: A Brief Guide to the Emerging World of
3. Polyglot Persistence", Addison-Wesley Professional, 2012.
4. Tom White, "Hadoop: The Definitive Guide", Third Edition, O'Reilley, 2012.
5. Eric Sammer, "Hadoop Operations", O'Reilley, 2012.
6. E. Capriolo, D. Wampler, and J. Rutherglen, "Programming Hive", O'Reilley, 2012.
7. Lars George, "HBase: The Definitive Guide", O'Reilley, 2011.
8. Eben Hewitt, "Cassandra: The Definitive Guide", O'Reilley, 2010.
9. Alan Gates, "Programming Pig", O'Reilley, 2011.
CODE: MCS-18-304
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Course Objectives:
1. The student will also learn how to apply trust-based security model to real-world security problems.
2. An overview of the concepts, processes, and best practices needed to successfully secure information
within Cloud infrastructures.
3. Students will learn the basic Cloud types and delivery models and develop an understanding of the risk
and compliance responsibilities and Challenges for each Cloud type and service delivery model.
MODULE-1:
Introduction to Cloud Computing
Online Social Networks and Applications, Cloud introduction and overview, Different clouds, Risks,
Novel applications of cloud computing.
MODULE-2:
Cloud Computing Architecture
Requirements, Introduction Cloud computing architecture, On Demand Computing Virtualization at the
infrastructure level, Security in Cloud computing environments, CPU Virtualization, A discussion on
Hypervisors Storage Virtualization Cloud Computing Defined, The SPI Framework for Cloud Computing,
The Traditional Software Model, The Cloud Services
Delivery Model.
Cloud Deployment Models
Key Drivers to Adopting the Cloud, The Impact of Cloud Computing on Users, Governance in the Cloud,
Barriers to Cloud Computing Adoption in the Enterprise.
MODULE-3:
Security Issues in Cloud Computing
Infrastructure Security, Infrastructure Security: The Network Level, The Host Level, The Application
Level, Data Security and Storage, Aspects of Data Security, Data Security Mitigation Provider Data and
Its Security.
Identity and Access Management
Trust Boundaries and IAM, IAM Challenges, Relevant IAM Standards and Protocols for Cloud Services,
IAM Practices in the Cloud, Cloud Authorization Management.
MODULE-4:
Security Management in the Cloud
Security Management Standards, Security Management in the Cloud, Availability Management: SaaS,
PaaS, IaaS
Privacy Issues
Privacy Issues, Data Life Cycle, Key Privacy Concerns in the Cloud, Protecting Privacy, Changes to
Privacy Risk Management and Compliance in Relation to Cloud Computing, Legal and Regulatory
Implications, U.S.Laws and Regulations, International Laws and Regulations.
MODULE-5:
Audit and Compliance
Internal Policy Compliance, Governance, Risk, and Compliance (GRC), Regulatory/External Compliance,
Cloud Security Alliance, Auditing the Cloud for Compliance, Security-as-a-Cloud.
MODULE-6:
ADVANCED TOPICS
Recent developments in hybrid cloud and cloud security.
Course Outcomes:
After completion of course, students would be able to:
a. Identify security aspects of each cloud model
b. Develop a risk-management strategy for moving to the Cloud
c. Implement a public cloud instance using a public cloud service provider
d. Apply trust-based security model to different layer
CODE: PCE-02
NO OF CREDITS: 4
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL: 100
NOTE: Question paper has two parts. Part-1 has 10 questions each of 2 marks. It covers the
entire syllabus. Attempt any four questions out of six from Part-2.
Key motivations for iterative development, meeting the requirements and challenges iteratively, Risk
driven & client-driven iterative planning, time-box iterative development, Evolutionary & adaptive
development, Evolutionary requirement analysis, incremental & evolutionary delivery.
Background, overview & definitions, Agile manifesto, Agile principles, Agile Methods-
Extreme Programming, Scrum Development methodology, Crystal family of methodologies, Rational
Unified Process (RUP).
Unit-3 Agile Planning & Prioritization
Agile application to planning, Success features for Agile planning, velocity, prioritizing story & themes,
Kano model for prioritization, Relative weighing model for prioritization.
Estimation, estimating size with story points, estimating with ideal days & ideal time, ideal day as a
measure of time, techniques for estimating, re-estimation, choosing between story points & ideal days,
Splitting user-stories, estimating user-stories, release plan, updating the release plan.
Adaptive scrum, Product backlog, Sprint, Scrum life cycle, Scrum estimation, Scrum Planning, Working
with scrum.
Introduction to Agile testing quadrants, test-driven development, unit testing, component testing,
functional testing, story testing, exploratory testing, scenario testing, usability testing, acceptance testing,
performance and load testing, security testing, ility testing, pair testing,
References
1. S/w development using Scrum, Succeeding with Agile by Mike Cohn
2. Agile & iterative development- A manager’s Guide Craig Larman.
3. Agile Testing, A Practical Guide for Testers and Agile Teams,Lisa Crispin, Janet Gregory
CODE: MCS-18-110
SUBJECT NAME: DATA SCIENCE
NO OF CREDITS: 4
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL: 100
Course Objectives:
1. Provide you with the knowledge and expertise to become a proficient datascientist.
2. Demonstrate an understanding of statistics and machine learning concepts that arevital
for datascience.
MODULE-1:
Introduction to core concepts and technologies: Introduction, Terminology, datascience process,
data science toolkit, Types of data, Example applications.
MODULE-2:
Data collection and management: Introduction, Sources of data, Data collection andAPIs,
Exploring and fixing data, Data storage and management, Using multiple dataSources.
MODULE-3:
Data analysis: Introduction, Terminology and concepts, Introduction to statistics,Central
tendencies and distributions, Variance,Distribution properties andarithmetic, Samples/CLT, Basic
machine learning algorithms, Linear regression,SVM, NaiveBayes.
MODULE-4:
Data visualisation:Introduction, Types of data visualisation,Dataforvisualisation:Data types, Data
encodings, Retinal variables, Mapping variables toencodings, Visual encodings.
MODULE-5:
Applications of Data Science,Technologies for visualization, Bokeh (Python)
MODULE-6:
Recent trends in various data collection and analysis techniques, variousvisualization techniques,
application development methods of used in data science.
Course Outcomes:
After completion of course, students would be able to:
a. Explain how data is collected, managed and stored for datascience;
b. Understand the key concepts in data science, including their real-world applications and
the
REFERENCES
1. Cathy O‟Neil and Rachel Schutt. Doing Data Science, Straight Talk From The Frontline.
O‟Reilly.
2. Jsure Leskovek, AnandRajaraman and Jeffrey Ullman.Mining of Massive
Datasets.v2.1,Cambridge UniversityPress.
CODE: PHDCE-20-01
NO OF CREDITS: 4
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL : 100
Course Objectives
1. To get familiar the students about basic concepts of agile testing and its techniques.
3. To study about the various testing automation and debugging tools and case studies.
Basics and Fundamentals of Agile Process Methods, Values of Agile, Principles of Agile, stakeholders,
Challenges, Agile Testing: Agile Testing Techniques, Test-Driven Development, User Acceptance Test
White Box testing: Boundary value analysis, equivalence class portioning, state table based
Black Box Testing: Logic coverage criteria, basic path testing, graph matrices.
Unit testing, drivers, stubs, integration testing, methods, functional testing, system testing,
recovery testing, security testing, stress testing, performance testing, usability testing
Big Data overview, Characteristics, Big Data Analytics, Application of Big Data- in science,
manufacturing, health care, Government, Education, Information Technology.
Course Outcomes
a. The students will be able to understand the concepts of agile testing and its
techniques.
b. The Students will be able to implement Knowledge of verification and validation activities.
c. The Students will be able to apply black box and white box testing techniques.
d. The Students will be able to implement the concept of regression testing and its techniques.
REFERENCES
1. G.J Myers, The Art of Software Testing, John Wiley & Sons, 1979
NO OF CREDITS: 4
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL : 100
Course Objectives:
1. Be familiar with both the theoretical and practical aspects of computing with images.
MODULE-1:
Overview, computer imaging systems, lenses, Image formation and sensing, Image analysis, pre-
processing and Binary image analysis
MODULE-2:
MODULE-3:
MODULE-4:
Feature extraction, shape, histogram, color, spectral, texture, using CVIPtools,Feature analysis, feature
vectors, distance /similarity measures, data preprocessing.
MODULE-5:Pattern Analysis
MODULE-6:
b. To have gained exposure to object and scene recognition and categorization from images.
REFERENCES
NO OF CREDITS: 4
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL : 100
Pre-requisites: Knowledge of Software Engineering
Course Objectives
1. To get familiar the students about basic concepts of software testing and its
techniques.
3. To study in detail the process of performing the black box and white box testing approaches with
examples.
4. To get familiar the students with the concept of regression testing, various testing automation and
debugging tools and case studies.
Definition of testing, goals, psychology ,model for testing, effective testing, limitations of testing,
Importance of Testing, Definition of Failure, faults or bug, error, incident, test case, test ware, life
cycle of bug, bug effects, bug classification, test case design, testing methodology, development of
test strategy, verification, validation, Static testing: Inspection, Review and Walk through, dynamic
testing ,testing life cycle model, testing techniques, testing principles, Testing Metrics.
MODULE -2: Verification and validation
White Box testing: Boundary value analysis, equivalence class portioning, state table based
testing, decision table based, error guessing.
Black Box Testing: Logic coverage criteria, basic path testing, graph matrices.
MODULE -4: Validation Testing
Unit testing, drivers, stubs, integration testing, methods, functional testing, system testing, recovery
testing, security testing, stress testing, performance testing, usability testing
a. The students will be able to understand the concepts of software testing, its techniques,
verification andvalidation activities.
b. Study of black box, white box testing, regression testing and its techniques.
metrics.
d. Study of case studies and various testing automation and debugging tools.
REFERENCES
1. G.J Myers, The Art of Software Testing, John Wiley & Sons, 1979
2. Naresh Chauhan, Software Testing Principles and Practices, OXFORD University Press.
CODE: PHDCE-20-02
SUBJECT NAME: ADVANCES IN COMPUTER VISION & IMAGE PROCESSING
NO OF CREDITS: 4
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL : 100
Pre-requisites: Basic co-ordinate geometry, matrix algebra, linear algebra & random process.
Course Objectives
Unit 1: Introduction to Computer Vision and Basic Concepts of Image Formation: Introduction and
Goals of Computer Vision and Image Processing, Image Formation Concepts, Geometric
Transformations, Geometric Camera Models, Camera Calibration, Image Formation in a Stereo Vision
Setup, Image Reconstruction from a Series of Projections.
Unit 2: Image Processing Concepts: Image Transforms, Image Enhancement, Image Filtering, Colour
Image Processing, Image Segmentation
Unit 3: Image Descriptors and Features: Texture Descriptors, Colour Features, Edges/Boundaries,
Object Boundary and Shape Representations, Interest or Corner Point Detectors, Speeded up Robust
Features, Saliency
Unit 4: Fundamentals of Machine Learning: Linear Regression, Basic Concepts of Decision Functions,
Elementary Statistical Decision Theory, Parameter Estimation, Clustering for Knowledge Representation,
Dimension Reduction, Linear Discriminant Analysis.
Unit 5: Applications of Computer Vision: Artificial Neural Network for Pattern Classification,
Convolutional Neural Networks, Machine Learning Algorithms and their Applications in Image
Segmentation, Motion Estimation and Object Tracking, Gesture Recognition, Face and Facial Expression
Recognition, Image Fusion.
COURSE OUTCOMES
References:
1. MOOCs course by Prof. M. K. Bhuyan, “Computer Vision and Image Processing - Fundamentals and
Applications”https://onlinecourses.nptel.ac.in/noc21_ee23/course
2. Forsyth & Ponce, “Computer Vision-A Modern Approach”, Pearson Education.
3. M.K. Bhuyan , “ Computer Vision and Image Processing: Fundamentals and Applications”, CRC Press,
USA, ISBN 9780815370840 - CAT# K338147.
4. Richard Szeliski, “Computer Vision- Algorithms & Applications”, Springer.
*
CODE: PHDCE-20-03
SUBJECT NAME: SECURITY ASPECTS IN BIG DATA
NO OF CREDITS: 4
SESSIONAL: 25
L T P THEORY EXAM: 75
4 0 0 TOTAL : 100
COURSE OBJECTIVES:
This course is to help students
1. Outline the basic concepts and foundations of computer security,Identify concepts and ethics in
Computer Security.
2. Demonstrate a breadth of knowledge in the topics of Computer Security, and understand its
relevance and potential for an ever-increasing number of applications.
3. Possess the fundamental methodology for how to design and analyze security critical systems
along with the identification of abnormalities caused by worms, viruses etc.
4. Learn and understand concepts of big data which include the study of modern computing big data
technologies focusing on security.
5. To have knowledge about security-relevant decisions in context with 4 V’s of Big data along with
the working of programming tools like PIG, HIVE in Hadoop ecosystem.
Definition of Security, Traditional Cipher Systems, Stream ciphers, Block ciphers. Stream Ciphers,
Cryptanalysis of stream ciphers, Block Ciphers: DES, modes of use of DES, AES, Diffie Hellman Key
Exchange – Authentication and Digital signatures, Hash function – Authentication: Protocols – Digital
Signature standards, RSA, MD-5, SHA, Firewall, types of Firewalls.
UNIT- II
Big Data - Introduction, Why Big Data, Types of Data, Characteristics of Big Data - The Four V's,
advantages and disadvantages, Technology challenges for Big Data, Big Data Architecture, Applications
of Big Data, Hadoop framework, Hadoop Distributed File System (HDFS), Comparison between HDFS
and Google File system, Building Blocks of Hadoop, Introducing and configuring Hadoop cluster,
MapReduce, Big Data Security issues, attacks and their solutions, Traditional Data Analytics v/s Big Data
Analytics.
Big Privacy: Content Privacy and Interaction Privacy, privacy preserving data publishing, Roles and
operations of a privacy system, Privacy Research, Attacks: Active and Passive attacks, Linkage attack,
probabilistic attack, Web Browsing attacks and Defence, Onion Routing, TOR System and Crowds
System, Milestones of Privacy Study, Various privacy models, such as the k-anonymity, `diversity, t-
closeness, and ε-differential privacy, Disciplines in Privacy Study: Cryptography, Data Mining and
Machine learning, Biometric Privacy, challenges of Privacy Study.
Introduction to Pig, Pig Architecture, Pig Latin Data model, operators, Introduction to Hive: Hive
architecture, working with Hive Data Types, Creating and Managing Databases and Tables, views and
indexes, Hive Data Manipulation Language, Querying and Analyzing Data, Introduction to Spark, Spark
Architecture, Advantages over traditional data approaches, Spark Ecosystem, Spark for Big Data
processing and its applications, Introduction to NoSQL, MongoDB.
COURSE OUTCOMES: