M.Sc_. & Int M.Sc_. Syllabus Oct 2022
M.Sc_. & Int M.Sc_. Syllabus Oct 2022
M.Sc_. & Int M.Sc_. Syllabus Oct 2022
SYLLABUS &
INT M.SC. SEM VII - X
Academic Year 2022-2023
Central University of
Rajasthan
NH-8 Jaipur- Ajmer Highway, Bandarsindri
Kishangarh -305817
District-Ajmer, Rajasthan
Website: www.curaj.ac.in
CENTRAL UNIVERSITY OF RAJASTHAN
Department of Computer Science
Semester Wise Scheme and Syllabus of
M. Sc (Computer Science) (2 Year Course)
(For Semesters- I to IV Semesters: 2022-2023 to Onward)
Semester-I
S. Course Course Title Type of L T P Credit
No. Code Course s
(CC/EC)
1 CSC-401 Introduction to Artificial CC 3 1 0 4
Intelligence
2 CSC-402 Discrete Structures & Graph CC 3 1 0 4
Theory
3 CSC-403 Probability & Statistics CC 3 1 0 4
4 CSC-404 Advanced Algorithms CC 3 1 0 4
5 CSC-405 Programming in Python CC 2 0 4 4
6 CSC-406 Professional Communication CC 2 0 0 2
7 CSC-407 Artificial Intelligence Lab CC 0 0 2 1
8 CSC-408 Advanced Algorithms Lab CC 0 0 2 1
Total 24
Semester – II
S. Course Course Title Type of L T P Credi
No. Code Course ts
(CC/EC)
1 CSC-409 Machine Learning CC 3 0 0 3
2 CSC-410 Big Data Analytics CC 3 0 0 3
3 CSC-411 Natural Language Processing CC 3 0 2 4
4 CSC-412 Soft Computing CC 3 0 2 4
5 Elective-V EC 3 1 0 4
6 CSC-413 Dissertation – I * CC 0 4 0 4
7 CSC-414 Machine Learning Lab CC 0 0 2 1
8 CSC-415 BDA Lab CC 0 0 2 1
Total 24
* Students will prepare a report on a research topic.
Semester – III
S. Course Course Title Type of L T P Credits
No. Code Course
(CC/EC)
1 CSC-501 Data Warehousing & CC 3 0 0 3
Mining
2 CSC-502 Neural Network & Deep CC 3 0 0 3
Learning
3 CSC-503 Image Processing & CC 3 0 2 4
Computer Vision
4 Elective-VI EC 3 0 0 3
5 Elective-VII EC 3 0 0 3
6 CSC-504 Dissertation – II CC 0 0 8 4
7 CSC-505 Data Warehousing & CC 0 0 2 1
Mining Lab
8 CSC-506 Neural Network & Deep CC 0 0 2 1
Learning Lab
9 CSC-507 Summer Training CC 0 2 0 2
Presentation
Total 24
* Summer Training after semester II (Duration 4 – 6 weeks).
Semester – IV
S. Course Course Title Type of Course L T P Credits
No. Code (CC/EC)
1 CSC-508 Project Work in Industry or CC 0 20 20 20
Institution
(16 week)
2 CSC-509 Self Study Course EC 0 0 0 4
Total 20
List of Electives:
UNIT 2: Informed search: Best First Search, Heuristic Search, A* Search, Admissible
heuristic, Consistent heuristic, optimality and admissibility, IDA* search, Weighted A* search
and inconsistency. Hill Climbing, Local Search, Simulated Annealing, local beam search and
Genetic Algorithm.
UNIT 3: Adversarial search: Adversarial Search and Game Playing, Min-max Algorithm,
Alpha-beta pruning, partially observable games, stochastic games.
BOOKS
1. Artificial Intelligence: A Modern Approach (third Edition): S. Russel and P. Norvig.
2.Artificial Intelligence: Foundation of Computational Agents: D Poole and AMckworth.
Outcomes:-
Upon successful completion of the course, the student will be able to:
• Design a knowledge based system.
• Explain what constitutes "Artificial" Intelligence and how to identify systems with
Artificial Intelligence.
• Ability to apply Artificial Intelligence techniques for problem solving.
• Use classical Artificial Intelligence techniques, such as search algorithms, minimax
algorithm, and neural networks.
• Have read and analyzed important historical and current trends addressing artificial
intelligence.
Course Outline:
Discrete mathematics is the backbone of computer sciences. It provides the base for algorithm
development and semantics of programming languages. This course is designed to given an
introductory idea of different discrete structures, including graph theory. In particular, this
course introduces logic, proofs, sets, relations, functions, counting, and abstract structure,
with an emphasis on applications in computer science.
UNIT I: Sets: Definition and types, Set operations, Partition of set, Cardinality (Inclusion-
Exclusion & Addition Principles), Recursive definition of set. Functions, Relations, Properties
of binary relations, closure, Partial Ordering Relations, The Pigeonhole & Generalized
Pigeonhole Principles, Composition of Functions Concept, Mathematical induction
UNIT II: Graph Theory: Graphs – Directed, Undirected, Simple,. Adjacency & Incidence,
Degree of Vertex, Subgraph, Complete graph, Cycle & Wheel Graph, Bipartite & Complete
Bipartite Graph, Weighed Graph, Union of Simple Graphs. Complete Graphs. Isomorphic
Graphs, Path, Cycles & Circuits Euclerian & Hamiltonian Graphs.
UNIT III: Planar Graph: Kuratowski’s Two Graphs, Euler’s Formula, Kuratowski’s Theorem.
Trees: Spanning trees- Kruskal’s Algo, Finding Spanning Tree using Depth First Search,
Breadth First Search, Complexity of Graph, Minimal Spanning Tree, Graph Coloring.
Text/Reference Books
1. C.L Liu and D.P. Mohapatra, Elements of Discrete Mathematics: A Computer Oriented
Approach, TMH, 3rd Edition
2. Rosen, Discrete Mathematics and its applications, 6th Edition
3. Schaum’s Outlines of Discrete Mathematics, Seymour Lipschutz & Marc Lipson, 2nd
Edition
4. Narsingh & Deo, Graph Theory with Applications to Engineering and Computer Science,
PHI 2004 Publication
4. Kanti Swarup and Man Mohan, Operations Research
5. Combinatorial Optimization -Theory and Algorithms, Bemhard Korte, Jens Vygen.
Course Objectives
UNIT II: Probability densities, joint densities, marginal densities, conditional densities
Expectation and covariances, Bayesian probabilities, Gaussian distribution.
BOOKS
1. Probability and Computing, by Michael Mitzenmacher and Eli Upfal, Cambridge University
Press
2. Christopher M. Bishop. Pattern Recognition and Machine Learning, Springer, 2006. (For
first two chapters)
3. Artificial Intelligence: A Modern Approach (third Edition): S. Russel and P. Norvig.
Learning Outcomes
Total: 4
Course Objectives:
4 Elabrate advanced techniques for the design and analysis of algorithms, and explores a
variety of applications
Course Content:
UNIT- 3 Brief overview of Notations and Recurrence analysis, Amortized (08 Hours)
analysis, B- Trees, AVL trees
UNIT- 4 Dictionaries and tries, Binomial Heaps, Fibonacci Heaps, (06 Hours)
Disjoint Sets, Union by Rank and Path Compression
Theory Assessment:
EoSE UNIT-1,2,3,4,5,6
Term Work:
Text Books:
Reference Books:
Course Objectives
• To introduce the basics of Python programming.
• Laboratory exercises to cover in Lab sessions.
UNIT II: Python operators: arithmetic, assignment, relational operators etc. Decision making
and loop control structures.
UNIT III: Built-in functions in python, built-in string methods. User-defined functions,
keyword arguments. Lambda functions.
UNIT IV: Python lists, tuples, dictionaries. Performing basic operations on lists, tuples and
dictionaries.
UNIT V: Python modules, namespace and scoping. File handling, access modes, reading and
writing files, renaming and deleting files.
UNIT VI: Plotting graphs in python, Introduction to Matplotlib. Developing basic GUI
applications using Tkinter.
Text/References
1. Introduction to computation and programming using Python, John V. Guttag, MIT
Press.
Outcomes:-
Outline
The course has been designed keeping in mind the communicative needs of the students as
lack of proficiency and fluency of students is one of the major barriers in getting employment
in the job market.
Objectives
The objectives of the course are:
• to make the student proficient and fluent in speaking
• to enable the student to comprehend what is spoken and written
• to ensure that they become fast readers
• to make them handle basic correspondence effectively
• to enhance their vocabulary base
Course Content:-
UNIT-1
Grammar and Vocabulary: Tenses, subject–verb agreement. Sentence Analysis: Simple,
Compound and Complex sentences. Phrases: Adjective, Adverb and Noun Phrase, Clauses:
Adjective, Adverb and Noun Phrase. Voice, Narration, Gerund, Participle.
UNIT-3
Listening Skill – Active listening, Barriers to active listening.
Speaking Skill-Stress patterns in English, Questioning skills, Barriers in Speaking.
UNIT-4: Reading Skill-Skimming, Scanning, Intensive reading, linking devices in a text,
Different versions of a story/ incident.
UNIT-5:
Written communication:
Writing process, paragraph organization, writing styles.Types of Writing - Technical vs.
creative; Types of technical writing, Scientific Writing:Writing a Scientific Report Soft Skills:
BOOKS:
1. Advanced English Usage: Quirk & Greenbaum; Pearson Education.
2. Developing Communication Skills: Banerjee Meera & Mohan Krishna; Macmillan
Publications, 1990.
3. Business Communication: Chaturvedi, P.D.; Pearson Publications.
4. Business Communication; Mathew, M.J.; RBSA Publications, 2005.
5. Communication of Business; Taylor, Shirley; Pearson Publications.
6. Soft Skills: ICFAI Publication
7. Collins English Dictionary and Thesaurus, Harper Collins Publishers and Times
8. Longman Language Activator, Longman Group Pvt Ltd
9. Longman Dictionary of contemporary English, Longman
10. The new Penguin Dictionary – a set of dictionaries of abbreviations, spelling, punctuation,
plain English, grammar, idioms, thesaurus, 2000.
11. New Oxford Dictionary.
12. Wren & Martin: High School English Grammar and Composition
13. Raymond Murphy: English Grammar in Use (4th edition)
14. Martin Hewings: Advanced Grammar in Use
15. Betty Schrampfer: Understanding and Using English Grammar
Outcomes:
After completion of the course student will become fluent speakers. Not only this, they will
be able to comprehend the spoken and the written word in a better way. With enhanced
vocabulary they will become confident users of English and be more market-ready to get a job.
Practical: 4 hours / Week Term Work & OR: 50 Marks Term Work & OR: 2
Total: 2
Course Objectives:
4 Elabrate advanced techniques to implement for the design and analysis of algorithms,
and explores a variety of applications
Course Content:
Implement randomised search algo for las vegas and Monti Carlo algo,
fingerprinting algo, pattern matching algo
Text Books:
Reference Books:
1 Python Programing
• Define machine learning and understand the basic theory underlying machine learning.
• Differentiate supervised, unsupervised and reinforcement learning
• Understand the basic concepts of learning and decision trees.
• Understand neural networks and Bayesian techniques for problems appear in machine
learning
• Understand the instant based learning and reinforced learning
• Perform statistical analysis of machine learning techniques.
2 Identify the characteristics of decision tree and solve problems associated with
5 Evaluate hypothesis and investigate instant based learning and reinforced learning
Course Content:
UNIT- 3 Neural Networks: Non-linear Hypotheses, Neurons and the Brain, (08 Hours)
Model Representation, Multi-layer Networks, Back-propagation,
Multi-class Discrimination, Training Procedures, Localized Network
Structure, Deep Learning.
UNIT- 4 Graphical Models: Hidden Markov Models, Bayesian Networks, (08 Hours)
Markov Random Fields, Conditional Random Fields. Ensemble
Methods:Boosting - Adaboost, Gradient Boosting, Bagging - Simple
Methods, Random Forest.
Assessment:
Text Books:
Tom M. Mitchell, Machine Learning, India Edition 2013, McGraw Hill Education.
Data Mining: Tools and Techniques. Jiawei Han and Michelline Kamber.
Total: 4
Course Objectives:
• To understand the need of Big Data, challenges, and different analytical architectures
• Installation and understanding of Hadoop Architecture and its ecosystems
• Processing of Big Data with Advanced architectures like Spark.
Course Content:
UNIT- 1 Introduction to Big Data, Types of Digital Data, Characteristics of Data, (7 Hours)
Evolution of Big Data, Data Storage and Analysis, Characteristics of Big Data,
Big Data Architecture, Requirement for new analytical architecture, Challenges
in Big Data analytics, Need of big data frameworks
UNIT- 5 Spark Framework, Writing Spark Application, Spark Programming in Scala, (8 Hours)
Python, R, Java, Application Execution
UNIT- 6 SQL Context, Importing and Saving data, Data frames using SQL, GraphX (8 Hours)
overview, Creating Graph, Graph Algorithms
Internal Assessment:
Text Books:
• Michael Minelli, Michelle Chambers, and Ambiga Dhiraj, Big Data, Big Analytics: Emerging Business
Intelligence and Analytic Trends for Today's Businesses, John Wiley & Sons, 2013.
• Douglas Eadline,"Hadoop 2 Quick-Start Guide: Learn the Essentials of Big Data Computing in the
Apache Hadoop 2 Ecosystem”, Pearson Education, 2016.
Reference Books:
e-Resources
• https://www.coursera.org/specializations/big-data
CSC-411: NATURAL LANGUAGE PROCESSING
Objectives:
UNIT IIII: Grammars and Parsing: Grammars and sentence Structure, Top-Down and
Bottom-Up Parsers, Transition Network Grammars, Top-Down Chart Parsing, Morphological
Analysis and the Lexicon.
UNIT IV: Parsing with Features, Augmented Transition Networks, Various Lexicon Resource
& Knowledge Source, Study of Word Net and Indo Net
UNIT V: Grammars for Natural Language: Auxiliary Verbs and Verb Phrases, Movement
Phenomenon in Language, Handling questions in Context-Free Grammars, Hold mechanisms
in ATNs. Human preferences in Parsing, Encoding uncertainty, Deterministic Parser, Study
of POS Tagger, Stemmer
UNIT VI
Ambiguity Resolution: Statistical Methods, Estimating Probabilities, Part-of-Speech tagging,
Obtaining Lexical Probabilities, Probabilistic Context-Free Grammars, Best First Parsing.
Semantics and Logical Form: Word senses and Ambiguity, Encoding Ambiguity in Logical
Form. Discourse Analysis and Pragmatic Analysis
Books Recommended:
1. JAMES ALLEN, Natural Language Understanding, 2/e, Pearson Education, 2003.
2. D. JURAFSKY, J. H. MARTIN, Speech and Language Processing, Pearson Education,
2002.
3. CHRISTOPHER D. MANNING, HINRICH SCHÜTZE, Foundations of Statistical Natural
Language Processing, The MIT Press, Cambridge, Massachusetts.1999.
4. U. S. TIWARY, TANVEER SIDDIQUI, Natural Language Processing and Information
Retrieval, Oxford University Press (2008).
5. AKSHAR BHARATI, VINEET CHAITANYA, RAJEEV SANGAL, Natural Language
Processing: A Paninian Perspective
Outcome: After completion of this course students will be able to design a model of a
prototype language.
Soft computing is an emerging approach to computing which can parallel the remarkable
ability of the human mind to reason and learn in an environment of uncertainty and
imprecision. Soft computing is based on some biologically inspired computing paradigms such
as Genetic Algorithms, Evolutionary computing, Particle Swarm Optimization, human
nervous system, etc. Applying Soft Computing can help in solving real-time problems that
cannot be solved using mathematical modeling. Varied applications of Soft Computing include
Computer Vision, medical diagnosis, pattern recognition, network optimization etc.
Course Objectives
This course will uncover the fundamental concepts used in Soft computing. The concepts of
fuzzy logic, Neuro-fuzzy computing, genetic algorithms will be discussed. Applications of Soft
Computing techniques to solve a number of real life problems will be covered to have hands
on practices. In summary, this course will provide exposure to theory as well as practical
systems and software used in soft computing. Broad Objectives of the course are:
• To develop understanding of Fuzzy logic and its applications.
• Solve problems using Neuro-fuzzy computing and its applications.
• In-depth study and discussion on Genetic Algorithms and Evolutionary computing.
• Apply Particle Swarm optimization, ant colony optimization and other algorithms to
real life problems.
• Laboratory exercises to be covered in Lab sessions.
Books
1.Neuro Fuzzy & Soft Computing - J.-S.R.Jang, C.-T.Sun, E.mizutani, Pearson Education
2.Digital Neural Network - S.Y.Kung, Prentice Hall International Inc.
3.Spiking Neural Networks - Wulfram Gerstner, Wenner Kristler, Cambridge University Press.
4.Neural Networks and Fuzzy Systems: Dynamical Systems Application to Machine
Intelligence - Bart Kosko, Prentice Hall.
Outcomes:-
After completing this course, you will be able to learn:
• Understand the basic concepts of Soft Computing.
• Solve real life problems using fuzzy logic.
• Implement genetic and evolutionary computing in different scenarios.
Analyze the applicability of Particle swarm optimization and other swarm optimization
techniques in practical situations.
CSC-413: Dissertation - I
Outline: The students will be select a supervisor, as per the suggestion of student will select
a research field, in that field student will be instructed to read research papers from reputed
journals form IEEE and Elsevier or any other peer reviewed journals. The student will write a
Dissertation on review of the research work.
Theory: 4 hours / Week Term Work & OR: 50 Marks Term Work & OR: 2
1 Python Programing
Ex- 2 For a given set of training data examples stored in a .CSV file, implement and
demonstrate the Candidate-Elimination algorithm to output a description of the
set of all hypotheses consistent with the training examples
Ex-3 Write a program to demonstrate the working of the decision tree based ID3
algorithm. Use an appropriate data set for building the decision tree and apply
this knowledge to classify a new sample.
Ex-- 5 Write a program to implement the naïve Bayesian classifier for a sample training
data set stored as a .CSV file. Compute the accuracy of the classifier, considering
few test data sets.
Ex-- 7 Assuming a set of documents that need to be classified, use the naïve Bayesian
Classifier model to perform this task. Built-in Java classes/API can be used to
write the program. Calculate the accuracy, precision, and recall for your data set.
Ex-- 8 Write a program to construct a Bayesian network considering medical data. Use
this model to demonstrate the diagnosis of heart patients using standard Heart
Disease Data Set. You can use Java/Python ML library classes/API.
Ex-- 9 Apply EM algorithm to cluster a set of data stored in a .CSV file. Use the same
data set for clustering using k-Means algorithm. Compare the results of these
two algorithms and comment on the quality of clustering. You can add
Java/Python ML library classes/API in the program.
Ex-- 10 Write a program to implement k-Nearest Neighbour algorithm to classify the iris
data set. Print both correct and wrong predictions. Java/Python ML library
classes can be used for this problem.
Reference Books:
Python Crash Course, 2nd Edition: A Hands-On, Project-Based Introduction to Programming
Machine Learning for Hackers by Drew Conway and John Myles White
Practical: 2 hours / Week Term Work & OR: Term Work & OR: 1
Total: 4
Course Pre-requisites:
1 The students should have basic knowledge of Mathematics, Statistics and Machine Learning.
Course Objectives:
To develop the basic understanding of Data Mining Algorithms, Applications of Data Mining Algorithms
and Information Retrieval
1 Develop the skills to gain a basic understanding of Data Mining Algorithms and their Applications
6 To demonstrate Data Mining and Information Retrieval Algorithms applications in solving the real-
world tasks
Course Content:
UNIT- 1 Fundamental of Data Mining: Data Mining, History of Data Mining, Data (10 Hours)
Mining Strategies, Data Mining Techniques, KDD process, Applications of
Data Mining, Challenges and Future of data mining. Data Preprocessing and
Data Warehousing: Data, information, knowledge, and intelligence, Types of
data, Data warehouses, Data cleaning, Data de-normalization, Data
transformation, Data quality measures, OLAP technology, OLAP vs OLTP.
Data Sampling.
UNIT- 2 The Classification Task: Introduction to classification, Decision trees, (10 Hours)
Random forests, Naïve Bayes’, K-NN, SVM, ANNs, applications of
classification. Model evaluation techniques- ROC, Lift Charts, cost and utility,
Parsimony, Bagging and Boosting, The model ranking approach.
UNIT- 3 The Clustering Task: Introduction to clustering, Distance measures, types of (10 Hours)
clustering-hierarchical: agglomerative and divisive, Non-hierarchical: Partition
based, Density based, Probability based, K-means clustering, Self-organizing
concept, self-organizing maps, SOM algorithm, cluster validation, strength and
weaknesses of clustering algorithms, applications of clustering.
UNIT- 4 Association Rule Mining: Concepts of association rules, relevance and (10 Hours)
functions of association rules, the problem of large data set, Apriori algorithm,
scalable association rule mining-FP-Growth algorithm, Applications of ARM,
strength and weaknesses of ARM.
UNIT- 5 Information Retrieval: Boolean Retrieval, The term vocabulary and postings (10 Hours)
lists: Document delineation and character sequence decoding, determining the
vocabulary of terms. Dictionaries and tolerant retrieval: Search structures for
dictionaries, spelling correction. Scoring, term weighting and vector space
model, the vector space model for scoring, variant tf-idf functions.
UNIT- 6 Computing scores in a complete search system: Efficient scoring and (10 Hours)
ranking, components of an information retrieval system. Evaluation in
information retrieval. Relevance feedback and query expansion: Relevance
feedback and pseudo relevance feedback, global methods for query
reformulation.
Internal Assessment:
Term Work:
Part - A
Text Books:
Data Mining Concepts & techniques: Jai wei Han and Micheline Kamber, Morgan Kaufman.
Christopher D. Manning, Prabhakar Raghavan, Hinrich Schutze, Introduction to Information Retrieval, Cambridge
University Press
Reference Books:
Data Mining Techniques : Arun K. Pujari, Universities Press, Fourth Edition, ck and ps2016.
Mastering Data Mining: M. Berry and G. Linoff, John Wiley & Sons., 2000
Data Mining: Methods and Techniques: A B M Shawkat Ali, Saleh A. Wasimi, 2009, Cengage Learning
Total: 4
Course Pre-requisites:
1 The students should have basic knowledge of Algebra, Statistics and Machine Learning.
Course Objectives:
To develop the basic understanding of ANNs and various ANN Algorithms, Applications of ANN
Algorithms in Machine Learning and data analysis.
1 Develop the skills to gain a basic understanding of neural network theory and its applications.
Course Content:
UNIT- 1 Overview of biological neurons: Structure of biological neurons relevant to (10 Hours)
ANNs. Fundamental concepts of Artificial Neural Networks: Models of ANNs;
Feed-forward & feedback networks; learning rules; Hebbian learning rule,
perception learning rule, delta learning rule, Widrow-Hoff learning rule,
UNIT- 2 Single layer Perception Classifier: Classification model, Features & Decision (10 Hours)
regions; training & classification using discrete perceptron algorithm, single
layer continuous perceptron networks for linearly separable classifications.
UNIT- 3 Multi-layer Feed forward Networks: linearly non-separable pattern (10 Hours)
classification, Delta learning rule for multi-perceptron layer, generalized delta
learning rule, Error back-propagation training, learning factors, Examples.
Single layer feedback Networks: Basic Concepts, Hopfield networks, Training
& Examples
UNIT- 4 Self-Organizing Networks: Introduction, Self-organizing concept, self- (10 Hours)
organizing maps, SOM algorithm, adaptive resonance theory (ART), ART
algorithm, and variations of ART algorithm. Adaptive pattern classification.
UNIT- 5 Associative memories: Linear Association, Basic Concepts of recurrent. Auto (10 Hours)
associative memory: retrieval algorithm, storage algorithm; Bi-directional
associative memory, Architecture, Association encoding & decoding, and
Stability.
UNIT- 6 Introduction to Deep Learning: Deep learning vs. machine learning, (10 Hours)
significance of deep learning, deep neural networks vs. traditional neural
networks. Convolutional neural networks (CNNs): convolution, pooling,
padding, and stride. Image classification using CNNs.
Internal Assessment:
Term Work:
Part – A
Text Books:
Neural networks a comprehensive foundation, Simon Haykin, Pearson Education 2nd Edition 2004.
Reference Books:
2003.
Introduction to artificial neural systems”, Jacek M. Zurada, 1994, Jaico Publ. House.
Total: 4
Course Objectives:
Course Content:
Assessment:
EOSE UNIT 1, 2, 3, 4, 5, 6
Text Books:
Forsyth and Ponce, “Computer Vision – A Modern Approach”, Second Edition, Prentice Hall, 2011.
Emanuele Trucco and Alessandro Verri, “Introductory Techniques for 3-D Computer Vision”, Prentice
Hall, 1998.
Reference Books:
Milan Sonka, Vaclav Hlavac and Roger Boyle, “Image Processing, Analysis and Machine Vision”, Third
Edition, CL Engineering, 2013.
Total: 4
1 • Basics of Internet
• Operating System.
Course Objectives:
• This Subject is useful for Making own Web page and how to host own web site on internet.
Course Outcomes:
• After Studying that subject students would have capability to make own web site and host their own web
site on internet. Also students would have enough knowledge about what are the technologies used in
internet.
Course Content:
UNIT- 2 Introduction to HTML : The development process, Html tags and simple HTML (7 Hours)
forms, web site structure Introduction to XHTML : XML, Move to XHTML,
Meta tags, Character entities, frames and frame sets, inside browser.
UNIT- 3 Style sheets : Need for CSS, introduction to CSS, basic syntax and structure, (7 Hours)
using CSS, background images, colors and properties, manipulating texts, using
fonts, borders and boxes, margins, padding lists, positioning using CSS, CSS2
UNIT- 4 Javascript : Client side scripting, What is Javascript, How to develop Javascript, (8 Hours)
simple Javascript, variables, functions, conditions, loops and repetition
UNIT- 5 DHTML : Combining HTML, CSS and Javascript, events and buttons, (8 Hours)
controlling your browser, Ajax: Introduction, advantages & disadvantages
,Purpose of it ,ajax based web application, alternatives of ajax
UNIT- 6 PHP : Starting to script on server side, Arrays, function and forms, advance (8 Hours)
PHP Databases : Basic command with PHP examples, Connection to server,
creating database, selecting a database, listing database, listing table names
creating a table, inserting data, altering tables, queries, deleting database,
deleting data and tables, PHP myadmin and database bugs
Internal Assessment:
Text Books:
Reference Books:
• Steven Holzner,”HTML Black Book”, Dremtech press.
• Web Technologies, Black Book, Dreamtech Press
• Web Applications : Concepts and Real World Design, Knuckles, Wiley-India
• Internet and World Wide Web How to program, P.J. Deitel & H.M. Deitel Pearson.
Lab:
Total: 4
1 • Computer Networks.
• Operating System.
Course Objectives:
• Demonstrate the various Distributed technologies to perform the complex task in highly distributed
environment.
• Demonstrate the service oriented architecture to provide on-demand services to Internet users.
• Design service level agreements (SLA) to meet the guaranty services in Cloud Environment.
• Design Energy efficient Scheduling techniques to balance the Workload in a distributed environment.
• Design Energy Efficient model for sustainable cloud platform for next decade various novel service
integration paradigm.
Course Outcomes:
• Student will able to understand basic concepts required to develop cloud computing applications.
• Student will able to develop applications for cloud computing to provide on-demand services required
for users.
• Student will able to understand the service oriented architecture such as IaaS, PaaS and SaaS.
• Student will able to design and implement a novel cloud computing application in simulation
environment.
• Student will able to do comparative study and analysis of different economic cloud computing models
with existing conventional software developing methodologies.
Course Content:
UNIT- 1 Introduction Introduction to Cloud Computing, Roots of Cloud Computing: (10 Hours)
Fundamental concepts of Distributed Systems, Cluster Computing, Grid
Computing, and Mobile Computing.
UNIT- 2 Cloud Models Basics of Cloud Computing Concepts, Characteristics of Cloud (10 Hours)
Computing, Need for Cloud, Cloud Deployment models: private, public, hybrid
and community cloud, Cloud Services: Resource-as-a-Service (RaaS),
Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-
as-a-Service (SaaS), Examples of each service.
UNIT- 3 Cloud Services RaaS: Usage of Physical resources like servers, networks, data (10 Hours)
center etc, IaaS: Virtualization,. PaaS: Integrated lifecycle platform: Google
App Engine, Microsoft Azure, Anchored life cycle platform: Salesforce
platform, SaaS: Characterizing SaaS, Salesforce’s software environment.
UNIT- 4 Resource Scheduling for Cloud Computing: - Introduction, Virtual Machine (10 Hours)
provisioning and Migration Services, Scheduling techniques of Virtual
machines for resource reservation, Cloud Service Scheduling hierarchy
UNIT- 5 Economic models for Resource-allocation scheduling , Heuristic Models for (10 Hours)
task –execution scheduling : Static Strategies , Dynamic Strategies , Heuristic
Schedulers.
UNIT- 6 Cloud Applications Cloud Applications, Cloud challenges, Cloud Security and (10 Hours)
privacy issues, Mobile Cloud Computing, Integration of Cloud with Wireless
Sensor Network and its application.
Internal Assessment:
Text Books:
Reference Books:
• Cloud Computing for Dummies, Judith Hurwitz, Robin Bloor, Marcia Kaufman and Fern Halper, Wiley
Publication.
• New frontiers in information and software as a service, Divyakant Agrawal, K. SelcukCandan, WenSyan
Li (Eds.), Springer Proceedings.
• Cloud Computing Theory and Practice Danc. Marinercus, Elsevier, 2013.
CSC-433: PARALLEL PROCESSING
Objective: After completion of this course students will be able to understand architectural
design that provides the parallel computational power to the computer.
Unit-I: Pipeline and Vector Processing: Nonlinear and linear pipelining, Multiprocessor,
Multicomputer, Super computer. Array Processors. Scope and Application of Parallel
approach.
BOOKS:
1. M. J. Quinn.Parallel Computing: Theory and Practice, McGraw Hill, New York, 1994.
2. T. G. Lewis and H. El-Rewini. Introduction to Parallel Computing, Prentice Hall, New
Jersey, 1992.
3. T. G. Lewis.Parallel Programming: A Machine-Independent Approach, IEEE Computer
Society Press, Los Alamitos.
4. Sima and Fountain, Advanced Computer Architectures, Pearson Education.
5. Mehdi R. Zargham, Computer Architectures single and parallel systems, PHI.
6. Ghosh, Moona and Gupta, Foundations of parallel processing, Narosa publishing.
7. Ed. Afonso Ferreira and Jose’ D. P. Rolin, Parallel Algorithms for irregular problems - State
of the art, Kluwer Academic Publishers.
8. Selim G. Akl, The Design and Analysis of Parallel Algorithms, PH International.
Learning Outcomes:
At the end of this course, the student will be able to:
• Understand uniprocessor computer architecture
• Understand the computer architecture (i.e., pipelining and superscalar processor
design and memory hierarchy)
• Understand parallel hardware and parallel software
• Understand shares-memory management
• Understand distributed-memory with MPI
• Understand general-purpose GPU
CSC-434: Adhoc & Wireless Network
Total: 4
Course Objectives:
To study about the issues pertaining to major obstacles in establishment and efficient management of Ad-
hoc and sensor networks.
To understand various security practices and protocols of Ad-hoc and Sensor Networks.
3 To identify and address the security threats in ad hoc and sensor networks.
Course Content:
UNIT- 1 Introduction: What is an Ad Hoc Network?, Types of Ad hoc Mobile (10 Hours)
Communications , Types of Mobile Host Movements, Challenges Facing Ad
hoc Mobile Networks, Ad hoc wireless Internet, Issues in Designing a Routing
Protocol for Ad Hoc Wireless Networks, Classifications of Routing Protocols:
Table–Driven Routing Protocols, Destination Sequenced Distance Vector
(DSDV), Wireless Routing Protocol (WRP), Cluster Switch Gateway Routing
(CSGR), Source–Initiated On–Demand Approaches, Ad hoc On–Demand
Distance Vector Routing (AODV), Dynamic Source Routing (DSR),
Temporally Ordered Routing Algorithm (TORA), Signal Stability Routing
(SSR), Location–Aided Routing (LAR), Power–Aware Routing (PAR), Zone
Routing Protocol (ZRP).
UNIT- 2 Wireless Sensor Networks: Introduction to Wireless sensor networks, Single- (10 Hours)
sink single-hop WSN, Single-sink multi-hop WSN, Multi-sink multi-hop WSN,
Advantages of ad-hoc/sensor networks, Node and Network Architectures,
Wireless Sensor Device Architecture, Network Architectures, Main features of
WSANs, Current and future research on WSANs
UNIT- 3 Applications of WSNs: Positioning and animals tracking, Entertainment, (10 Hours)
Logistics, Transportation, Industrial Control and Monitoring, Home
Automation and Consumer Electronics, Security and Military Sensing, Asset
Tracking and Supply Chain Management, Intelligent Agriculture and
Environmental monitoring, Health Monitoring.
UNIT- 4 Technologies for WSNs: ZigBee technology, Ultrawide bandwidth technology, (10 Hours)
Bluetooth technology, Comparison among technologies
UNIT- 5 The Physical Layer: Introduction, Wireless Propagation Models: The Free (10 Hours)
Space Propagation Model, The Two-Ray Ground Model, The Log-Distance
Path Model, Energy Dissipation Model, Error Models: The Independent Error
Model, The Two-State Markov Error Model, Sensing Models: The Binary
Sensing Model, The Probabilistic Sensing Model
Internal Assessment:
1) Roberto Verdone, Davide Dardari, Gianluca Mazzini and Andrea Conti, “Wireless Sensor and Actuator
Networks: Technologies, Analysis and Design”, Academic Press, 2008.
2) Miguel A. Labrador and Pedro M. Wightman, “Topology Control in Wireless Sensor Networks-with a
companion simulation tool for teaching and research”, Springer Science, 2009.
3) Azzedine Boukerche, “Handbook of Algorithms for Wireless Networking and Mobile Computing”,
Chapman & Hall/CRC, 2005.
Practical:
Total: 4
Computer Networks.
Operating Systems.
Course Objectives:
• Able to understand the difference between sequential architecture and parallel architecture to execute the
scientific applications.
• Understand the way to develop parallel algorithm and way of execution on parallel computing
environment.
• Analysis of time and space complexity for a particular mathematical problem in sequential as well as
parallel.
• Writing programs for to solve Partial differential equations (PDE) and Matrix decomposition.
• Solve some Computational biology applications using Dynamic programming approaches.
Course Content:
UNIT- 1 Single-processor Computing, The Von Neumann architecture, Modern (10 Hours)
processors, Memory Hierarchies, Multi core architectures, Locality and data
reuse, Programming strategies for high performance, Power consumption,
Review questions.
UNIT- 2 Parallel Computing, Introduction, Quantifying parallelism, Parallel Computers (10 Hours)
Architectures, Different types of memory access, Granularity of parallelism,
Parallel programming, Topologies, Multi-threaded architectures ,Co-
processors, Remaining topics, Computer Arithmetic, Integers, Real numbers,
Round-off error analysis, Compilers and round-off, More about floating point
arithmetic, Conclusions.
UNIT- 3 Numerical treatment of differential equations, Initial value problems, Boundary (10 Hours)
value problems, Initial boundary value problem, Numerical linear algebra,
Elimination of unknowns, Linear algebra in computer arithmetic, LU
factorization, Sparse matrices, Iterative methods, Further Reading.
UNIT- 4 High performance linear algebra, Collective operations, Parallel dense matrix- (10 Hours)
vector product, LU factorization in parallel, Matrix-matrix product, Sparse
matrix-vector product, Parallelism in solving linear systems from Partial
Differential Equations (PDEs), Computational aspects of iterative methods ,
Parallel preconditions ,Ordering strategies and parallelism, Operator splitting,
Parallelism and implicit operations ,Grid updates ,Block algorithms on multi
core architectures.
UNIT- 6 N-body problems, The Barnes-Hut algorithm, The Fast Multipole Method, Full (10 Hours)
computation, Implementation Monte Carlo Methods, Parallel Random Number
Generation, Examples, Computational biology Dynamic programming
approaches, Suffix tree.
Internal Assessment:
Text Books:
• Introduction to High Performance Scientific Computing Evolving Copy - open for comments Victor
Eijkhout, Edmond Chow, Robert van de Geijn.
• High Performance Computing (RISC Architectures, Optimization & Benchmarks), Charles Severance,
Kevin Dowd, Oreilly.
Reference Books:
• High Performance Computing (RISC Architectures, Optimization & Benchmarks), Georg Hager,
Gerhard Wellein, CRC Press.
• Introduction to High-Performance Scientific Computing (Scientific and Engineering Computation),
Lloyd D. Fosdick, Elizabeth R. Jessup
Course Outline:
Internet of Things (IoT) is presently an emerging technology worldwide. Government,
academia, and industry are involved in different aspects of research, implementation, and
business with IoT. IoT cuts across different application domain verticals ranging from civilian
to defense sectors. These domains include agriculture, space, healthcare, manufacturing,
construction, water, and mining, which are presently transitioning their legacy infrastructure
to support IoT. Today it is possible to envision pervasive connectivity, storage, and
computation, which, in turn, gives rise to building different IoT solutions. IoT-based
applications such as innovative shopping system, infrastructure management in both urban
and rural areas, remote health monitoring and emergency notification systems, and
transportation systems, are gradually relying on IoT based systems.
Course Objectives
• To teach state of art of wireless sensor networks
• To discuss importance of communication protocols.
• To teach challenges in routing protocols and overview of protocols across different
layers.
• To teach basics of Internet of Things.
Unit II: Medium Access Control protocols for Wireless sensor networks: Functions of MAC
layer, Fundamental MAC protocols, Objectives of MAC protocols, Energy efficiency in MAC
design, Fixed assignment protocols, demand assignment protocols.
Unit III: Network and Transport Layer protocols for wireless sensor networks: Fundamentals
and Challenges of Routing protocol, routing strategies in wireless sensor networks. Traditional
transport protocols, Transport protocols for sensor networks.
Unit IV: Basics on Internet of Things: Introduction, Components of IoT, IoT communication
technologies and protocols, developing basic IoT applications.
Unit V: Physical and Data link layer protocols for IoT like Zigbee and Z-Wave. Network layer
protocols for IoT like RPL.
Unit VI: Transport layer protocols for IoT. Application layer protocols for IoT like MQTT.
Emerging technologies in IoT.
Text/References:
1. Jun Zheng, Abbas, “ Wireless sensor networks A networking perspective”, WILEY, 2009.
2. Kazem Sohraby, Daniel Minoli, & Taieb Znati, ―Wireless Sensor Networks-Technology,
Protocols, And Applications‖, John Wiley, 2007
3. Thomas Haenselmann, ―Wireless Sensor Networks: Design Principles for Scattered
Systems‖, Oldenbourg Verlag, 2011
4. Vijay Madisetti and Arshdeep Bahga, “Internet of Things (A Hands-on-Approach)”, 1st 9
Edition, VPT, 2014.
5. E. H. Callaway, Jr. E. H. Callaway, Wireless Sensor Networks Architecture and Protocols:
CRC Press
6. F. Zhao and L. Guibas, Wireless Sensor Network: Information Processing Approach,
Elsevier.
7. A. Hac, Wireless Sensor Network Designs, John Wiley & Sons 8. Francis daCosta,
“Rethinking the Internet of Things: A Scalable Approach to Connecting Everything”, 1st
Edition, Apress Publications, 2013
Learning Outcomes
• At the end of the course students can be able to:
• Understand technological background of sensor networks.
• Able to design applications using Raspberry Pi.
• Design and apply various existing routing protocols of sensor networks.
• Design the architecture and reference model of IoT.
CSC-437: ADBMS
Total: 4
Course Pre-requisites: The students should have knowledge of Database System and Computer Networking
1 Basic concepts of Distributed Database Systems , Parallel Database Systems, Distributed Object
Database Management systems
Course Objectives:
To develop the understanding of various Advanced Database Systems and how they are utilized in
present era of computing.
1 Enrich their the knowledge in the area of various Advanced Database Systems
4 Get the idea of Parallel Database Systems and Distributed Object Database Management systems and
their architecture
5 Understand the concept of Concurrency Control , Recovery, and security mechanism in Distributed
environment
Course Content:
UNIT- 1 Introduction: Distributed Data processing, Distributed Database Systems (10 Hours)
(DDBMSs), Promises of DDBMSs, Complicating factors and Problem areas in
DDBMSs. Overview of relational database system.
UNIT- 2 Distributed Database Design: Alternative design Strategies, Distribution (10 Hours)
design issues, Fragmentation, Allocation. Semantic Data Control: View
Management, Data security, Semantic Integrity Control.
UNIT- 3 Overview of Query Processing: Query processing problem, Objectives of (10 Hours)
Query Processing, Complexity of Relational Algebra operations,
characterization of Query processors, Layers of Query Processing.
Introduction to Distributed Transaction Management: Definition of
Transaction, Properties of transaction, types of transaction.
UNIT- 5 Parallel Database Systems: Database servers, Parallel architecture, Parallel (10 Hours)
DBMS techniques, Parallel execution problems, Parallel execution for
hierarchical architecture. Database Interoperability: Database Integration,
Query processing
UNIT- 6 Distributed Object Database Management systems: Fundamental Object (10 Hours)
concepts and Object models, Object distribution design. Architectural issues,
Object management, Distributed object storage, Object query processing.
Transaction management. Introduction to other Advanced Database
Systems: Multimedia Databases, Spatial Databases, Deductive Databases, etc.
Internal Assessment:
Term Work:
Part – A
Text Books:
Principles of Distributed Database Systems, M.TamerOzsu, Patrick Valduriez, 2nd Edition, 1999.
Reference Books:
Distributed Databases principles and systems, Stefano Ceri, Giuseppe Pelagatti, TMH, 2008.
Database System Concepts, 7th Edition, Abraham Silberschatz, Henry F. Korth, S. Sudarshan
Total: 4
Course Objectives:
To develop the knowledge of Distributed Systems and how they are utilized in contemporary computing
3 Understand the evolution and applications of operations in various fields, mathematically formulate
linear programming problems and solve them using different techniques
4 Construct a project network and apply program evaluation review technique and critical path method to
find date of completion of project and other project related metrics
Course Content:
UNIT- 1 Introduction Project Management (PM) Fundamentals, People, Process, and (10 Hours)
Product, Technology Classic mistakes, PMI Processes, Software project phases,
Organizational structures, Project charter Statement of Work (SOW)
UNIT- 2 Planning Phase Development lifecycle models, Matching lifecycles to (10 Hours)
projects, Project plans Work Breakdown Structures (WBS)
UNIT- 3 Estimation and Budgeting Estimation, Budgeting, Project selection, NPV, (10 Hours)
ROI, Payback models, Scheduling: Project network diagram fundamentals,
PERT techniques, Gantt charts, Critical chain scheduling
UNIT- 4 Risk and Change Management Risk management, Change control, More MS- (10 Hours)
Project
UNIT- 6 System Test Process Test specifications, Black box and white box testing, (10 Hours)
Test scripts, Unit and integration testing, Acceptance test specifications, Test
tools, Final Phases & Other Issues: Project Recovery, Documentation,
Cutover/Migration, Post Project Reviews, Closing
Internal Assessment:
Text Books:
Kathy Schwalbe, “Information Technology Project Management”, Cengage Learning, 7/e, 2013.
Reference Books:
QuantumPM, “Microsoft Office Project Server 2003 Unleashed”, Pearson Education India, 2005.
Robert T. Futrell, Donald F. Shafer and Linda Isabell Shafer , “Quality Software Project”, Pearson India, 2002.
About the subject: The course is mainly based upon the book Lilavati, originally, authored by
the mathematician Bhaskaracarya in vedic perid. The Lilavati is a book on arithmetic written
in the twelfth century. It has been used as a textbook for 800 years in India.
Objective: The objective of the course is to introduce the methods used for arithmetic in vedic
period. After studying this course the students will be able to use vedic methods in arithmetic
which are easy to use and/ or whose computer algorithms are of less complexity.
Pre-requisite: None
Credit: 4
UNIT I
UNIT II
Rules concerning zero, Reverse process, To find an unknown quantity, Method of transition,
square transition. Linear and quadratic equations, The rule of three, Inverse proportion, The
rule of five, Rules for Barter, Simple interest, Combinations. [13 Lecture]
UNIT III
Progression: Arithmetic and geometric progressions, and series, Mensuration, [15 Lectures]
UNIT IV
UNIT V
Pingal's binary number system, Different types of Meru Prastar (including Pascal triangle).
[8 Lectures]
UNIT VI
Computer programmming based on methods given in Unit I - IV and comparing complexity
with the respective modern methods. Square root as numerical approach as prescribed in
Sulbasutras. [10–15 Lab sessions]
References
The first book covers syllabus from Unit I – III of the course. Second book covers last half of
the Unit III. Third book covers some part of Unit IV.
Practical: 2 hours / Week Term Work & OR: Term Work & OR: 1
Total: 4
Course Pre-requisites: The students should have basic knowledge of Database System, Statistics and Machine
Learning.
1 Basic concepts of Data Science, Data Analytics, and Data Science Algorithms, Applications of Data
Science Algorithms.
Course Objectives:
To develop the basic understanding of various Data Science Algorithms, Applications of Data Science
Algorithms.
1 Enrich their knowledge in the area of Data Science and its allied areas.
Course Content:
UNIT- 1 Introduction Data Science: The Art of Data Science, Volume, Velocity, (10 Hours)
Variety, Machine Learning, Supervised and Unsupervised Learning,
Predictions and Forecasts, Innovation and Experimentation , The Dark Side-Big
Errors, Privacy. Theories, Models, Intuition, Causality, Prediction, Correlation
UNIT- 2 Classification: K-nearest neighbors (K-NNs), Text classification using K- (10 Hours)
nearest neighbors, Naïve Bayes Theorem and Extended Naïve Bayes Theorem
for Classification.
UNIT- 3 Decision Trees (DTs): Information theory, information entropy and (10 Hours)
information gain. Decision tree construction using ID3 algorithm and
classification using DTs. Random Forest-construction and classification.
UNIT- 4 Clustering: Types of clustering, clustering using AGNES and DIANA, (10 Hours)
clustering using k-means, k-means vs. k-mediods. Density based clustering
using DBSCAN. Clustering documents using clustering.
UNIT- 5 Regression Analysis: Linear regression, gradient descent algorithm for (10 Hours)
regression model. Non-linear regression model.
UNIT- 6 Temporal Data Analysis: Temporal data, Temporal Sequence analysis, Time (10 Hours)
Series Analysis, Analyzing data trends using regression, creating a time-
dependent model.
Internal Assessment:
Term Work:
Part - A
Text Books:
Data Science Algorithms in a Week, David Natingga, Packt Publishing Ltd., Birminggham
Reference Books:
Algorithms for Data Science Book by B. C. H. Steele, John Chandler, and Swarna Reddy
Total: 4
Course Pre-requisites: The students should have knowledge of
Course Objectives:
• Design and Develop GUI based Applications using Vb.Net and C#.
• Integrate different components of the .net framework, including the database.
Course Content:
UNIT- 1 Introduction to .Net, .Net Framework Features & Architecture, CLR, Common (7 Hours)
Type System, MSIL, Types of Assemblies, Class Libraries. Event Drive
Programming, Methods and Events, Related with Mouse and Keyboard.
UNIT- 2 Programming into Visual Studio, Toolbox, Properties Window, Form Designer, (7 Hours)
Form Layout, Immediate Window.
UNIT- 3 VB.Net language, Variables, Data Types, Scope & Lifetime of a Variable, (8 Hours)
Arrays, Types of Array, Control Array, Subroutine, Functions, Passing
Argument to Functions, Optional Argument, Returning Value from Function.
UNIT- 4 Conditional and Loop Statement. Loading, Showing and Hiding Forms, (7 Hours)
Working with Multiple Forms, Controlling one Form within Another, Overview
of C#, Structure of C# Program, C# in .Net.
UNIT- 5 GUI Programming, Windows Form and Properties, Methods, Events, Text Box (8 Hours)
Control, Label Control, Button Control, List box, Combo Box, Checked Box,
Picture Box, Radio Button, Scroll Bar, Timer Control, Common Dialog
Control, Designing Menus, MDI Forms.
UNIT- 6 ADO .Net Architecture, Create Connection, Accessing Data Using Data 8 Hours)
Adapters and Datasets, Using Command & Data Reader, Data Bind Controls,
Displaying Data in Data Grid. Data Form Wizard, SQL queries, Database Using
Ado.Net Object Model, Connection Object, Command Object, Add, Delete,
Move & Update Records to Dataset, Executing Queries.
Internal Assessment:
• Steven Holzner, Visual Basic .NET Programming Black Book, Dreamtech Publications
• E. Balagurusamy, Programming in C# A primer, Tata McGraw-Hill Publishing Company Limited,
Delhi.
Reference Books:
• Jeffrey R. Shapiro, Visual Basic.NET: The Complete Reference, McGraw Hill Education
Total: 4
1 Theory of Computation
Course Objectives:
To understand various models to produce tokens which are inputs syntax phase.
Try to understand various parsing techniques such as top-down and bottom-up parsing
techniques.
Symbol Table generation and mechanisms to store information while scanning source
code from various phases of the compiler.
1 Students are able to understand the functionality of compiler design various phases.
2 Able to learn functionalities of various phases.
4 Able Design various parsing techniques such as SLR, LALR and CLR.
Course Content:
UNIT- 2 Top down Parsing: Context-free grammars, Top down parsing – (10 Hours)
Backtracking, LL (1), recursive descent parsing, Predictive parsing,
Preprocessing steps required for predictive parsing.
UNIT- 3 Bottom up parsing: Shift Reduce parsing, LR and LALR parsing, (10 Hours)
Error recovery in parsing, handling ambiguous grammar, YACC –
automatic parser generator.
UNIT- 5 Symbol Tables: Symbol table format, organization for block (10 Hours)
structures languages, hashing, and tree structures representation of
scope information. Block structures and non-block structure
storage allocation: static, Runtime stack and heap storage
allocation, storage allocation for arrays, strings and records.
Assessment:
Text Books:
Reference Books:
1. lex & yacc – John R. Levine, Tony Mason, Doug Brown, O’reilly
2. Modern Compiler Design- Dick Grune, Henry E. BAL, Cariel T. H. Jacobs, Wiley
dreamtech.
3. Engineering a Compiler-Cooper & Linda, Elsevier.
4. Compiler Construction, Louden, Thomson.
UNIT-II:
Open Flow: Introduction, Hybrid Approaches Conclusions SDN Controllers Introduction
General Concepts Layer 3 Centric Plexxi Cisco One PK Conclusions.
UNIT-III:
Network Programmability: Introduction, the Management Interface the Application-
Network DivideModern Programmatic Interfaces, I2RSModern Orchestration Data Center
Concepts and Constructs.
UNIT-IV:
Introduction: The Multitenant Data Centerthe Virtualized Multitenant Data Center SDN
Solutions for the Data Center Network VLANsEVPN, VxLan, NVGRE, Conclusions, Network
Function Virtualization Introduction Virtualization and Data Plane I/O Services Engineered
Path, Service Locations and Chaining, NFV at ETSI, Non-ETSI NFV Work, Conclusions.
Text Books:
1. SDN: Software Defined Networks An Authoritative Review of Network
Programmability Technologies By Thomas D. Nadeau, Ken Gray Publisher: O'Reilly
Media Final Release Date: August 2013 Pages: 384.
2. Software Defined Networks: A Comprehensive Approach Paperback – Import, 30 Jun
2014by Paul Goransson (Author), Chuck Black (Author)
3. Software Defined Networking with Open Flow by SiamakAzodolmolky (Author).
Outcomes:
• Understanding between conventional networks and SDN Supportive networks to
provide high throughput based on user needs.
• Understanding of Network Virtualization and requirements and changes in hardware
design point of view.
• Virtual LAN supportive protocols and its operations to enhance the Quality of Service
parameters.
• Understand and identify security vulnerabilities in open flow based networks.
Understand prevention mechanism for well-known security attacks in conventional
networks.
• Adaptive machine learning techniques to prevent security attacks in SDN.
UNIT-I
Introduction, Applications, A short history of wireless Communication, A market for Mobile
Communications, Some open research topics, A Simple Reference Model.
UNIT-III
Medium Accesses Control, Motivation for Specialization MAC, Hidden and exposed terminals,
near and Far Terminals, SDMA, FDMA, TDMA, CDMA.
UNIT-IV
Wireless LAN, IEEE 802.11: System Architecture, Protocol architecture, Physical Layer, MAC
Control Layer, MAC Management, 802.11b, 80.11a,HIPERLAN:
UNIT-V
Bluetooth: User Scenario, Architecture, Radio Layer, Link Manager Protocol, L2CAP, SDP,
IEEE 802.15.
UNIT-VI
Mobile Network Layer, Mobile IP, Dynamic Host Configuration Protocol, Mobile Ad-Hoc
Networks, Mobile Transport Layer, Classical TCP Improvements.
Text Books:
• Mobile Communications by JochenH.Schiller.
• Mobile Computing, Technology Applications and Service Creation by Asoke K
Talukder and Roopa R Yavagal.
Reference Books:
• Stojmenovic and Cacute, “Handbook of Wireless Networks and Mobile Computing”, Wiley,
2002, ISBN0471419028.
• Reza Behravanfar, “Mobile Computing Principles: Designing and Developing Mobile
Applications with UML and XML”, ISBN: 0521817331, Cambridge University Press, October
2004,
• Adelstein, Frank, Gupta, Sandeep KS, Richard III, Golden, Schwiebert, Loren,
“Fundamentals of Mobile and Pervasive Computing”, ISBN: 0071412379, McGraw-Hill
Professional, 2005.
CSC-536 HUMAN COMPUTER INTERACTION
Human Computer Interaction deals with how humans interact with the Computer System. The
course will uncover how designs are aesthetically done, details of ergonomics and evaluation
techniques
Course Objectives
• Demonstrate how input-output channels work.
• To introduce the details of interaction and design.
• To discuss different evaluation techniques and cognitive methods.
• Laboratory exercises to be covered in Lab sessions.
UNIT-I
The Human: input-output channels, Human memory, thinking, emotions, individual
differences, psychology and the design of interactive systems.
The Computer: Text entry devices with focus on the design of key boards, positioning, pointing
and drawing, display devices.
UNIT-II
The Interaction: Models of interaction, ergonomics, interaction styles, elements of WIMP
interfaces, interactivity, experience, engagement and fun. Paradigms for Interaction.
UNIT-III
Design Process: The process of design, user focus, scenarios, navigation design screen design
and layout, iteration & prototyping. Usability Engineering
Design rules: Principles to support usability, standards, guidelines, rules and heuristics, HCI
patterns.
UNIT-IV
Evaluation Techniques: Definition and goals of evaluation, evaluation through expert analysis
and user participation, choosing an evaluation method.
UNIT-V
Cognitive methods: Goals and task hierarchies, linguistic models, challenges of display based
systems, physical and device models, cognitive architectures.
UNIT-VI
Communications and collaborations models: Face to Face communication, conversations,
Text based communication, group working.
BOOK:
Human Computer Interaction; Alan Dix et.al, 3rd ed., Pearson.
Outcomes:
At the end of this course, the student will be able to:
• Develop better interfaces that are more usable.
• Demonstrate understanding of design guidelines, principles and standards.
Objective: After completion of this course students will be able to draw fractals and develop
understanding of chaos.
Unit 1: The basic concepts of geometric iteration, principle of feedback processes
Fundamentals of Fractals, Types of fractal (mathematical and nature), self-similarity, fractal
dimension, multiple reduction copy machines, the chaos game, fractals in nature, and
decoding fractals. Chaos wipes out every computer. Chaos in (nature and Math).
Unit 2: Standard mathematical fractals (Seirpinski carpet ,gasket, cantor dust , koch curve
etc), limits and self similarity, Fractal dimension, Types of fractal dimension, implementation
of standard fractal and calculating their dimensions.
Unit 4: Deterministic Chaos, analysis of chaos, periodic points, sensitivity, fixed points,
logistic map, sensitivity dependence of initial condition, implementation and detailed analysis
of logistic map (mathematically and in real life).
Unit 6: Julia set ( Fractal basin boundaries), complex numbers, escape and prisoners set,
filled Julia set, Quaternion Julia set, exploring Julia sets by varying complex numbers.
Mandelbrot set, geometric features and properties , study structure of Mandelbrot set.
Implementation of Julia set and Mandelbrot set.
Project: Students will complete a final creative project that involves researching an application
to fractals and chaos. Students will create something to go along with the project, like artwork,
a short story, or a computer generated image.
Learning Outcomes:
• Iterated Function System
• Escape-time Fractals
• Behavior of Chaotic logistic map
• L-system
Unit 1:
• Brief Introduction to S/W agent Technology
• Agent & AI
Unit 2:
• Practical design of intelligent agent System
• Intelligent Agent application Area
Unit 3:
• Biological Foundations of Swarm Intelligence
• Swarm Intelligence in Optimization
Unit 4:
• Routing protocols for next-generation network Inspired by collective Behaviours of
insects societies: An overview
Unit 5:
• An Agent based approach to self-organised production
Unit 6:
• Organic Computing and Swarm Intelligence
BOOKS:
Total: 4
Course Objectives:
2 Explore the major components of Blockchain and Identify a use case for a Blockchain application
Course Content:
UNIT- 1 Introduction to Blockchain: Digital Trust, Asset, Transactions, Distributed (10 Hours)
Ledger Technology, Types of networks, Components of blockchain
(cryptography, ledgers, consensus, smart contracts) Introduction to security,
attacks, computer criminals, security services.
UNIT- 2 Cryptography: Substitution ciphers, transposition cipher, confusion, diffusion, (10 Hours)
symmetric and asymmetric encryption. DES, odes of DES. Hash function, key
exchange, digital signatures and certificates.
UNIT- 3 PKI and Cryptography: Private keys, Public keys, Hashing, Digital Signature, (10 Hours)
Principles of Public Key Cryptosystems, Factorization, RSA Algorithm,
security analysis of RSA, Exponentiation in Modular Arithmetic. Key
Management in Public Key Cryptosystems: Distribution of Public Keys,
Distribution of Secret keys using Public Key Cryptosystems. Discrete
Logarithms, Diffie-Hellman Key Exchange.
UNIT- 4 Cryptocurrency: Bitcoin creation and economy, Limited Supply and Deflation, (10 Hours)
Hacks, Ethereum concept and Ethereum classic, Hacks Why it is so
revolutionary.
UNIT- 5 Blockchain Applications: Building on the Blockchain, Ethereum Interaction - (10 Hours)
Smart Contract and Token (Fungible, non-fungible), Languages, Blockchain-
as-a-service.
UNIT- 6 Blockchain Use Cases: Finance, Industry and Blockchain in Government (10 Hours)
Security and Research Aspects: Blockchain Security (DDos), Research Aspects
in Blockchain, AI, Blockchain and Big Data.
Internal Assessment:
1) Bahga, A., & Madisetti, V. (2017). Blockchain Applications: A Hands-On Approach. VPT.
2) Stalling Williams: Cryptography and Network Security: Principles and Practices, 4th Edition, Pearson
Education, 2006.
3) Kaufman Charlie et.al; Network Security: Private Communication in a Public World, 2nd Ed.,
PHI/Pearson.
Course Outline:
Course Overview:
The novel concepts of game theory and how to find different equilibrium solutions to different
types of games will be extensively covered in this course. These will be explained and
elucidated with relevant examples.
This course provides a rigorous treatment of solution concepts for games with perfect and
imperfect information including rationalxizability, Nash and subgame perfect Nash
equilibria. It covers topics such as auction, VNM utility function, bargaining game etc. It also
discusses cooperative game solution concepts-core, Shapley value and bayesian game with
Cournot’s duopoly.
UNIT 1- Games with Perfect Information-Strategic Games; Nash Equilibrium and Existence
Properties; Some Games in Normal Form, Nash Equilibria in Zero-Sum Games, Bräss'
Paradox, and more on Mixed Strategies, Games in Extensive Form, Market Equilibrium and
Pricing.
UNIT 2- Electoral Competition: Median Voter Theorem; Auctions: Definitions and The role
of Knowledge; Decision Making and Utility Theory; Mixed Strategy Equilibrium;
UNIT 3-The Paretian System Equilibrium, and Walrasian General Equilibrium Theory, Von
Neumann and Morgenstern Utility Function, Theory of Risk Aversion, Equilibrium Theory.
UNIT 4- Sealed Bid Auctions, VCG Procedures, Generalized Vickrey Auctions, VCG
Procedures, Cournot Competition and Stackelberg Equilibrium; Arrow's Impossibility
Theorem, Gibbard-Satterthwaite Theorem, Bargaining Game with Alternating Offers;
Bargaining Game with Alternating Offers (General Utilities); Nash Bargaining Solution; Stable
Marriages; Multi-Item Auctions;
UNIT 5-Cooperative Game Theory: Cores; Stable Sets and Shapley Value.
BOOKS:
1. "Fun and Games: A Text on Game Theory", Ken Binmore, A.I.T.B.S Publishers.
2. "A Course in Game Theory", Martin J. Osborne and Ariel Rubinstein, MIT Press.
3. Prajit Dutta, Strategies and Games, MIT Press
Learning Outcomes:
On successful completion of this course, students will be able to model competitive real world
phenomena using concepts from game theory and identify optimal strategy and equilibrium
solution for such models. They will be ready to explain the potential or proven relevance of
game theory and its impact in various fields of human interaction which involve conflict of
interest between two or more participants.