Onboard Present
Onboard Present
for
COURSE CURRICULUM
SEMESTER- VII
End
Sl. Subject Periods Evaluation Schemes
Subjects Semester Total Credit
No. Codes
L T P CT TA Total PS TE PE
1 MKOE07X Open Elective -II 3 0 0 30 20 50 100 150 3
2 MKCS701 Artificial 3 0 0 30 20 50 100 150 3
Intelligence
3 MKCS702 Cryptography & 3 0 0 30 20 50 100 150 3
network security
4 MKCS07X Departmental 3 0 0 30 20 50 100 150 3
Elective IV
5 MKCS751 Artificial 0 0 2 25 25 50 1
Intelligence Lab
6 MKCS752 Cryptography & 0 0 2 --- --- --- 25 25 50 1
Network Security
Lab
7 MKCS753 Internship 0 0 2 50 50 1
Assessment
8 MKCS754 Project Based 0 0 10 50 100 150 5
Learning - I
Total 900 20
M. TECH INTEGRATED (COMPUTER SCIENCE AND ENGINEERING) 4th Year
COURSE CURRICULUM
SEMESTER- VIII
End
Sl. Subject Periods Evaluation Schemes Credi
Subjects Semester Total
No. Codes t
L T P CT TA Total PS TE PE
1 MTCC 101 Research Process 3 0 0 30 20 50 100 150 3
and
Methodology
2 MKCS801 Cloud 3 0 0 30 20 50 100 150 3
Computing
3 MKCS08X Departmental 3 0 0 30 20 50 100 150 3
Elective –V
4 MKCS851 Cloud 0 0 2 25 25 50 1
Computing Lab
5 MKCS852 Project Based 18 50 300 350 9
Learning - II
6 MKCS853 Seminar -I 0 0 2 50 50 1
Total 900 20
Departmental Elective-IV
Departmental Elective-V
1. MKCS081 Deep Learning
2. MKCS082 Quantum Computing
3. MKCS083 Internet of Things
4. MKCS084 Blockchain Architecture Design
M.TECH. INTEGRATED (Computer Science and Engineering) 4th Year
SEMESTER VII (DETAILED SYLLABUS)
CO4 Be able to understand the Transport Layer security Socket Layer and wireless security. K3
CO5 Summarize the IP Security and its solutions to overcome the attacks. K2
DETAILED SYLLABUS
Unit Proposed
Topic
Lecture
Security Concepts: Introduction, The need for security, Security approaches, Principles of
I security, Types of Security attacks, Security services, Security Mechanisms, A model for 08
Network Security Cryptography Concepts and Techniques: Introduction, plain text and cipher
text, substitution techniques, transposition techniques, encryption and decryption, symmetric
and asymmetric key cryptography, steganography, key range and key size, possible types of
attacks.
Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block
II cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers: Principles of public key 08
cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange,
Knapsack Algorithm.
DETAILED SYLLABUS
Proposed
Unit Topic Lecture
INTRODUCTION: Introduction to mobile applications–Embedded systems–Market and
I Business drivers for mobile applications–Publishing and delivery of mobile applications– 08
Requirements gathering and validation for mobile applications
DETAILED SYLLABUS
Proposed
Unit Topic Lecture
TESTING BASICS : Testing as an engineering activity – Role of process in software
quality – Testing as a process – Basic definitions – Software testing principles – The
tester’s role in a software development organization – Origins of defects – Defect classes
I – The defect repository and test design – Defect examples – Developer / Tester support 08
for developing a defect repository.
TEST CASE DESIGN : Introduction to testing design strategies – The smarter tester
II – Test case design strategies – Using black box approach to test case design – Random 08
testing – Equivalence class partitioning – Boundary value analysis – Other black box
test design approaches – Black box testing and COTS – Using white box approach to
test design – Test adequacy criteria – Coverage and control flow graphs – Covering
code logic – Paths – Their role in white box based test design – Additional white box
test design approaches – Evaluating test adequacy criteria.
LEVELS OF TESTING: The need for levels of testing – Unit test – Unit test
III planning – Designing the unit tests – The class as a testable unit – The test harness – 08
Running the unit tests and recording results – Integration tests – Designing integration
tests – Integration test planning – System test – The different types – Regression
testing – Alpha, beta and acceptance tests
Textbooks:
1. Yogesh Singh,“Software Testing”, Cambridge University Press, NewYork, 2012
2. K. K. Aggarwal & Yogesh Singh, “Software Engineering”, New Age International Publishers, New Delhi,
2003.
3. Roger S. Pressman, “Software Engineering–A Practitioner’s Approach”, Fifth Edition, McGraw-Hill
International Edition, New Delhi, 2001.
4. Marc Roper, “Software Testing”, McGraw-Hill Book Co., London, 1994.
5. M.C. Trivedi, Software Testing & Audit, Khanna Publishing House
6. Boris Beizer,“Software System Testing and Quality Assurance”, Van Nostr and Reinhold, New York,
1984
MKCS 073 HIGH PERFORMANCE COMPUTING
Course Outcome (CO) Bloom’s Knowledge Level(KL)
At the end of course, the student will be able to understand
CO1 Able to understand the basic concept of Computer architecture and Modern Processor K2
CO2 Able to understand the basic concepts of access optimization and parallel computers K2,K3
Able to describe different parallel processing platforms involved in achieving high K3,K4
CO3
Performance computing
CO4 Develop efficient and high-performance parallel programming. K2,K3
CO5 Able to learn parallel programming using message-passing paradigm. K2,K4
DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
Overview of Grid Computing Technology, History of Grid Computing, High Performance
Computing, Cluster Computing. Peer‐to‐Peer Computing, Internet Computing, Grid
08
I Computing Model and Protocols, Types of Grids: Desktop Grids, Cluster Grids, Data Grids,
High‐Performance Grids, Applications and Architectures of High-Performance Grids,
High Performance Application Development Environment.
Textbooks:
1. Laurence T.Yang, Minyi Guo–High Performance Computing Paradigm and Infrastructure, John Wiley
2. Ahmar Abbas, “Grid Computing: Practical Guide to Technology & Applications”, Firewall Media, 2004.
3. Joshy Joseph and Craig Fellenstein, “Grid Computing”, Pearson Education, 2004.
4. Lan Foster, et al., “The Open Grid Services Architecture”, Version 1.5(GFD.80).Open Grid Forum, 2006.
5. Rajkumar Buyya. High Performance Cluster Computing: Architectures and Systems. Prentice Hall India
MKCS 074 MOBILE COMPUTING
Course Outcome(CO) Bloom’s Knowledge Level (KL)
DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
Introduction, issues in mobile computing, overview of wireless telephony: cellular concept,
I GSM:air- interface, channel structure, location management: HLR-VLR, hierarchical, 08
handoffs, channel allocation in cellular systems, CDMA, GPRS.
Wireless Networking, Wireless LAN Overview: MAC issues ,IEEE802.11, Blue Tooth,
II Wireless multiple access protocols, TCP over wireless, Wireless applications, data broad 08
casting, Mobile IP,WAP: Architecture, protocol stack , application environment,
applications.
Data management issues, data replication for mobile computers, adaptive clustering for
III mobile Wireless networks, Files system, Disconnected operations. 08
Mobile Agents computing, security and fault tolerance, transaction processing in mobile
IV computing Environment. 08
Adhoc networks, localization, MAC issues, Routing protocols, global state routing(GSR),
V Destination sequenced distance vector routing (DSDV), Dynamic source routing (DSR), Ad 08
Hoc on demand and distance vector routing(AODV),Temporary ordered routing
algorithm(TORA),QoS in Adhoc Networks, applications.
Textbooks:
1. J. Schiller, Mobile Communications, Addison Wesley.
2. A. Mehrotra, GSM System Engineering.
3. M.V.D. Heijden, M. Taylor, Understanding WAP, Artech House.
4. Charles Perkins, Mobile IP, Addison Wesley.
5. Charles Perkins, Adhoc Networks, Addison Wesley.
MKCS 751 ARTIFICIAL INTELLIGENCE LAB
Course Outcome(CO) Bloom’s Knowledge Level(KL)
At the end of course, the student will be able to understand
Explain unification, Recursion and listing using Prolog. K2
CO1
CO2 Identify problems that are amenable to solution by AI methods, and which AI methods K4
may be suited to solving a given problem.
CO3 Design and carry out an empirical evaluation of different algorithms on a problem K5
formalization and state the conclusions that the evaluation supports.
CO4 Implement basic AI algorithms (e.g., standard search algorithms or dynamic K5
programming).
DETAILED SYLLABUS
CO3 Describe Services Oriented Architecture and various types of cloud services. K2,K3
Explain Inter cloud resources management cloud storage services and their providers K2,K4
CO4 Assess security services and standards for cloud computing.
CO5 Analyze advanced cloud technologies. K3,K6
DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
Overview of Computing Paradigm: Recent trends in Computing Grid Computing, Cluster
I Computing, Distributed Computing, Utility Computing, Cloud Computing Evolution of 08
cloud computing Business driver for adopting cloud computing.
Introduction to Cloud Computing: Cloud Computing (NIST Model) Introduction to
Cloud Computing, History of Cloud Computing, Cloud service providers Properties,
Characteristics & Disadvantages Pros and Cons of Cloud Computing, Benefits of Cloud
Computing, Cloud computing vs. Cluster computing vs. Grid computing Role of Open
Standards
Cloud Security: Infrastructure Security Network level security, Host level security,
V Application level security Data security and Storage Data privacy and security Issues, 08
Jurisdictional issues raised by Data location Identity & Access Management, Access
Control, Trust, Reputation, Risk, Authentication in cloud computing, Client access in cloud,
Cloud contracting Model, Commercial and business considerations.
Textbooks:
1. Kai Hwang, Geoffrey C. Fox, Jack G. Dongarra, “Distributed and Cloud Computing, From
Parallel Processing to the Internet of Things”, Morgan Kaufmann Publishers, 2012.
2. Rittinghouse, John W., and James F. Ransome, ―Cloud Computing: Implementation, Management
and Security, CRC Press, 2017.
3. Rajkumar Buyya ,Christian Vecchiola, S. Thamarai Selvi,―Mastering Cloud Computing, Tata Mcgraw
Hill, 2013.
4. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing–A Practical Approach, Tata Mcgraw
Hill, 2009.
5. George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in the
Cloud: Transactional Systems for EC2 and Beyond (Theory in Practice),O’Reilly, 2009.
MKCS 081 DEEP LEARNING
Course Outcome(CO) Bloom’s Knowledge Level(KL)
At the end of course, the student will be able to understand
To present the mathematical, statistical and computational challenges of building K1, K2
CO1 neural networks
CO2 To study the concepts of deep learning K1,K2
CO3 To introduce dimensionality reduction techniques K2
CO4 To enable the students to know deep learning techniques to support real-time K2,K3
applications
CO5 To examine the case studies of deep learning techniques K3,K6
DETAILED SYLLABUS
Proposed
Topic Lecture
Unit
INTRODUCTION: Introduction to machine learning-Linear models (SVMs and
I Perceptrons, logistic regression)-Introduction to Neural Nets: What a shallow network 08
computes-Training a network:
Loss functions, back propagation and stochastic gradient descent-Neural networks as
universal function approximates
DEEPNETWORKS: History of Deep Learning- A Probabilistic Theory of Deep Learning-
II Backpropagation and regularization, batch normalization- VC Dimension and Neural Nets- 08
Deep Vs Shallow Networks-Convolutional Networks-Generative Adversarial
Networks(GAN),Semi-Supervised Learning
DIMENTIONALITY REDUCTION Linear (PCA, LDA) and manifolds, metric learning –
III Auto encoders and dimensionality reduction in networks - Introduction to Convnet - 08
Architectures –AlexNet, VGG, Inception, ResNet-Training a Convnet: weights
initialization, batch normalization, hyper parameter optimization
OPTIMIZATION AND GENERALIZATION: Optimization in deep learning –Non-
convex optimization for deep networks- Stochastic Optimization Generalization in neural
IV networks- Spatial Transformer Networks- Recurrent networks, LSTM-Recurrent Neural 08
Network Language Models-Word-Level RNNs & Deep Reinforcement Learning-
Computational & Artificial
Neuroscience
CASE STUDY AND APPLICATIONS: Image net- Detection-Audio Wave Net-Natural
V Language Processing Word2Vec - Joint Detection-Bioinformatics- Face Recognition- 08
Scene Understanding-Gathering Image Captions
Textbooks:
1. Cosma Rohilla Shalizi, Advanced Data Analysis from an Elementary Point of View, 2015.
2. Deng &Yu, Deep Learning: Methods and Applications, Now Publishers, 2013.
3. Ian Goodfellow, Yoshua Bengio, Aaron Courville, Deep Learning, MIT Press, 2016.
4. Michael Nielsen, Neural Networks and Deep Learning, Determination Press, 2015.
MKCS 082 QUANTUM COMPUTING
Course Outcome(CO) Bloom’s Knowledge Level(KL)
DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
Internet of Things (IoT): Vision, Definition, Conceptual Framework, Architectural view,
technology behind IoT,Sources of the IoT, M2M Communication, IoT Examples. Design Principles
I for Connected Devices: IoT / M2M systems layers and design standardization, communication 08
technologies, data enrichment and consolidation, ease of designing and affordability
Hardware for IoT: Sensors, Digital sensors, actuators, radio frequency identification (RFID)
technology, wireless sensor networks, participatory sensing technology. Embedded Platforms for
II 08
IoT: Embedded computing basics, Overview of IOT supported Hardware platforms such as
Arduino, Net Arduino, Raspberry pi, Beagle Bone, Intel Galileo boards and ARM cortex.
Network &Communication aspects in IoT: Wireless Medium access issues, MAC protocol
III survey, Survey routing protocols, Sensor deployment & Node discovery, Data aggregation & 08
Dissemination
Programming the Ardunio: Ardunio Platform Boards Anatomy, Ardunio IDE, coding, using
IV 08
emulator, using libraries, additions in ardunio, programming the ardunio for IoT.
Challenges in IoT Design challenges: Development Challenges, Security Challenges, Other
challenges IoT Applications: Smart Metering, E-health, City Automation, Automotive Applications
V 08
,home automation, smart cards, communicating data with H/W units, mobiles, tablets,
Designing of smart street lights in smart city.
Textbooks:
1. Olivier Hersent, David Boswarthick, Omar Elloumi, “The Internet of Things key applications and protocols”,
Wiley
2. Jeeva Jose, Internet of Things, Khanna Publishing House
3. Michael Miller “The Internet of Things” by Pearson
4. Raj Kamal “INTERNET OF THINGS”, McGraw-Hill,1ST Edition, 2016
5. Arshdeep Bahga, Vijay Madisetti, “Internet of Things (A hands on approach)”1ST edition, VPI publications, 2014
6. Adrian McEwen, Hakin Cassimally “Designing the Internet of Things”, Wiley India
MKCS 084 BLOCKCHAIN ARCHITECTURE DESIGN
Course Outcome(CO) Bloom’s Knowledge Level(KL)
At the end of course, the student will be able to understand
CO1 Describe the basic understanding of Block chain architecture along with its primitive. K1,K2
CO2 Explain the requirements for basic protocol along with scalability aspects. K2,K3
CO3 Design and deploy the consensus process using frontend and backend. K3,K4
Apply Block chain techniques for different use cases like Finance, Trade /
CO4 Supply and Government activities. K4,K5
DETAILED SYLLABUS
Unit Topic Proposed
Lecture
Introduction to Blockchain: Digital Money to Distributed Ledgers, Design Primitives:
I Protocols, Security, Consensus, Permissions, Privacy. 08
Blockchain Architecture and Design: Basic crypto primitives: Hash, Signature, Hash chain
to Blockchain, Basic consensus mechanisms
Consensus: Requirements for the consensus protocols, Proof of Work (PoW), Scalability
II aspects of Blockchain consensus protocols 08
Permissioned Blockchains: Design goals, Consensus protocols for Permissioned
Blockchains
Hyperledger Fabric(A): Decomposing the consensus process, Hyperledger fabric
III components, Chain code Design and Implementation 08
Hyperledger Fabric(B): Beyond Chain code: fabric SDK and Front End(b) Hyper
ledger composer tool
Usecase1:Blockchain in Financial Software and Systems(FSS):(i) Settlements,(ii)
IV KYC,(iii) Capital markets, (iv) Insurance 08
Usecase2: Blockchain in trade/ supply chain, Provenance of goods, visibility, trade/supply
chain finance, invoice management discounting, etc.
Usecase3: Blockchain for Government:(i) Digital identity, land records and other kinds of
V record keeping between government entities, (ii) public distribution system social welfare 08
systems Blockchain Cryptography, Privacy and security on Blockchain
Textbooks:
1. Mastering Bitcoin: Unlocking Digital Cryptocurrencies, by Andreas Antonopoulos
2. Blockchain by Melanie Swa, O’Reilly
3. Hyperledger Fabric-https://www.hyperledger.org/projects/fabric
4. ZerotoBlockchain-An IBM Redbooks course, by BobDill,DavidSmits-
https://www.redbooks.ibm.com/Redbooks.nsf/RedbookAbstracts/crse0401.html
MKCS 851 CLOUD COMPUTING LAB
Course Outcome(CO) Bloom’s Knowledge Level(KL)
At the end of course, the student will be able to understand
To know about the use AWS management console, create and manipulate Amazon K1, K5
CO1 instances.
CO2 Access the encrypting and controlling of S3 K3
CO3 Describe how to create private and virtual private cloud. K1
CO4 How to create IAM group in cloud. K5
CO5 To understand the steps of Installation of Open Stack K2
DETAILED SYLLABUS
MKCS 754/ MKCS 852 PROJECT BASED LEARNING I / PROJECT BASED LEARNING II