0% found this document useful (0 votes)
93 views20 pages

Onboard Present

This document provides the syllabus for the 4th year M.Tech Integrated program in Computer Science and Engineering at DR. A.P.J. Abdul Kalam Technical University Lucknow. It outlines the courses, evaluation schemes, course curriculum, and detailed syllabus for semesters 7 and 8. Semester 7 includes courses in artificial intelligence, cryptography and network security, departmental electives, and labs. Semester 8 includes courses in research methodology, cloud computing, departmental electives, labs, and a project. The document gives the course codes, credit hours, evaluation criteria, course outcomes, and topics to be covered for each course.

Uploaded by

chutiya college
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views20 pages

Onboard Present

This document provides the syllabus for the 4th year M.Tech Integrated program in Computer Science and Engineering at DR. A.P.J. Abdul Kalam Technical University Lucknow. It outlines the courses, evaluation schemes, course curriculum, and detailed syllabus for semesters 7 and 8. Semester 7 includes courses in artificial intelligence, cryptography and network security, departmental electives, and labs. Semester 8 includes courses in research methodology, cloud computing, departmental electives, labs, and a project. The document gives the course codes, credit hours, evaluation criteria, course outcomes, and topics to be covered for each course.

Uploaded by

chutiya college
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

DR. A.P.J.

ABDUL KALAM TECHNICAL UNIVERSITY LUCKNOW

Evaluation Scheme & Syllabus

for

M. Tech. Integrated 4th Year

Computer Science and Engineering

(Effective from the Session: 2022-23)

DR. A.P.J. ABDUL KALAM TECHNICAL UNIVERSITY LUCKNOW


STUDY & EVALUATION SCHEME
M. TECH INTEGRATED (COMPUTER SCIENCE AND ENGINEERING) 4TH YEAR

COURSE CURRICULUM

SEMESTER- VII

End
Sl. Subject Periods Evaluation Schemes
Subjects Semester Total Credit
No. Codes
L T P CT TA Total PS TE PE
1 MKOE07X Open Elective -II 3 0 0 30 20 50 100 150 3
2 MKCS701 Artificial 3 0 0 30 20 50 100 150 3
Intelligence
3 MKCS702 Cryptography & 3 0 0 30 20 50 100 150 3
network security
4 MKCS07X Departmental 3 0 0 30 20 50 100 150 3
Elective IV
5 MKCS751 Artificial 0 0 2 25 25 50 1
Intelligence Lab
6 MKCS752 Cryptography & 0 0 2 --- --- --- 25 25 50 1
Network Security
Lab
7 MKCS753 Internship 0 0 2 50 50 1
Assessment
8 MKCS754 Project Based 0 0 10 50 100 150 5
Learning - I
Total 900 20
M. TECH INTEGRATED (COMPUTER SCIENCE AND ENGINEERING) 4th Year

COURSE CURRICULUM

SEMESTER- VIII

End
Sl. Subject Periods Evaluation Schemes Credi
Subjects Semester Total
No. Codes t
L T P CT TA Total PS TE PE
1 MTCC 101 Research Process 3 0 0 30 20 50 100 150 3
and
Methodology
2 MKCS801 Cloud 3 0 0 30 20 50 100 150 3
Computing
3 MKCS08X Departmental 3 0 0 30 20 50 100 150 3
Elective –V
4 MKCS851 Cloud 0 0 2 25 25 50 1
Computing Lab
5 MKCS852 Project Based 18 50 300 350 9
Learning - II
6 MKCS853 Seminar -I 0 0 2 50 50 1

Total 900 20
Departmental Elective-IV

1. MKCS071 Design & Development of Applications


2. MKCS072 Software Testing
3. MKCS073 High Performance Computing
4. MKCS074 Mobile Computing

Departmental Elective-V
1. MKCS081 Deep Learning
2. MKCS082 Quantum Computing
3. MKCS083 Internet of Things
4. MKCS084 Blockchain Architecture Design
M.TECH. INTEGRATED (Computer Science and Engineering) 4th Year
SEMESTER VII (DETAILED SYLLABUS)

MKCS 701 ARTIFICIAL INTELLIGENCE


Course Outcome (CO) Bloom’s Knowledge
Level(KL)
At the end of course, the student will be able to understand
Understand the basics of the theory and practice of Artificial Intelligence as a discipline K2
CO1
and about intelligent agents.
CO2 Understand search techniques and gaming theory. K2,K3
The student will learn to apply knowledge representation techniques and problem-solving K3,K4
CO3
strategies to common AI applications.
CO4 Student should be aware of techniques used for classification and clustering. K2,K3
CO5 Student should be aware of basics of pattern recognition and steps required for it. K2,K4
DETAILED SYLLABUS
Proposed
Unit Topic Lecture
Overview of History and Goals of AI: Artificial Intelligence -- Definition, components,
I scope, and application areas; Turing's test; Review of AI success and failure. 08
State Spaces, Production Systems, and Search: State space representation of problems;
Problem solving using search; Definition and examples of production systems; Heuristic search
techniques i.e. generate-and-test, hill climbing, best-first search, constraint satisfaction and 08
II mean-ends analysis.
Knowledge Representation: Definition of knowledge; Issues in knowledge representation;
Procedural vs declarative knowledge and their representation; Predicate logic, production
III rules, semantic nets, and frames; Meta-knowledge. 08
Reasoning and Inference Strategies: Forward vs backward reasoning; Depth first, breadth
IV first, min-max etc.; Non-monotonic reasoning; Symbolic reasoning under uncertainty; 08
Probability and Baye’s theorem; Certainty factors, Dempster-Shafer theory; Fuzzy logic etc.
Expert Systems and their Applications: Justification, structure, knowledge sources; Expert
V knowledge acquisition; Expert system languages; ES building tools/shells; Applications of AI 08
in CAD, CAPP, process selection, GT, MRP II, adaptive control, robotics, process control,
fault diagnosis, failure analysis, etc
Textbooks:
1. S.Russell and P.Norvig, “Artificial Intelligence: A Modern Approach‖, Prentice Hall, Third Edition ,2009.
2. I.Bratko, “Prolog: Programming for Artificial Intelligence”, Fourth edition, Addison-Wesley
Educational Publishers Inc., 2011.
3. M. Tim Jones,―Artificial Intelligence: A Systems Approach (Computer Science), Jones and
Bartlett Publishers,Inc.FirstEdition,2008
4. Nils J. Nilsson, The Quest for Artificial Intelligence, Cambridge University Press, 2009.
5. WilliamF.ClocksinandChristopherS.Mellish,‖ProgramminginProlog:UsingtheISOStandard‖,FifthEd
ition,Springer,2003.
6. Gerhard Weiss, Multi Agent Systems, Second Edition,MIT Press, 2013.
7. David L. Poole and Alan K. Mackworth, Artificial Intelligence: Foundations of Computational Agents‖,
Cambridge University Press, 2010.
MKCS 702 CRYPTOGRAPHY & NETWORK SECURITY
Course Outcome (CO) Bloom’s Knowledge Level
(KL)
At the end of course, the student will be able to understand
Student will be able to understand basic cryptographic algorithms, message and web K2,K3
CO1
authentication and security issues.
Ability to identify information system requirements for both of them such as client and K1,K2
CO2 server
CO3 Ability to understand the current legal issues towards information security K4

CO4 Be able to understand the Transport Layer security Socket Layer and wireless security. K3

CO5 Summarize the IP Security and its solutions to overcome the attacks. K2

DETAILED SYLLABUS
Unit Proposed
Topic
Lecture
Security Concepts: Introduction, The need for security, Security approaches, Principles of
I security, Types of Security attacks, Security services, Security Mechanisms, A model for 08
Network Security Cryptography Concepts and Techniques: Introduction, plain text and cipher
text, substitution techniques, transposition techniques, encryption and decryption, symmetric
and asymmetric key cryptography, steganography, key range and key size, possible types of
attacks.

Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block
II cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers: Principles of public key 08
cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange,
Knapsack Algorithm.

Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-


512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital
III signatures, Elgamal Digital Signature Scheme. Key Management and Distribution: 08
Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of
Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure
Transport-level Security: Web security considerations, Secure Socket Layer and Transport
IV Layer 08
Security, HTTPS, Secure Shell (SSH) Wireless Network Security: Wireless Security, Mobile
Device Security, IEEE 802.11 Wireless LAN, IEEE 802.11i Wireless LAN Security

E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP


V Security architecture, Authentication Header, Encapsulating security payload, combining 08
security associations, Internet Key Exchange Case Studies on Cryptography and security:
Secure Multiparty Calculation, Virtual Elections, Single sign On, Secure Inter-branch Payment
Transactions, Cross site Scripting Vulnerability.
Textbooks:
1. WilliamStallings,“CryptographyandNetworkSecurity:PrincipalsandPractice”,PearsonEducation.
2. Behrouz A. Frouzan: Cryptography and Network Security, McGraw Hill.
3. C K Shyamala,N Harini, Dr. T. R. Padmnabhan Cryptography and Security, Wiley
4. Bruce Schiener,“Applied Cryptography”.John Wiley & Sons
5. Bernard Menezes,”Network Security and Cryptography”,Cengage Learning.
6. Atul Kahate,“Cryptography and Network Security”, McGraw Hill
MKCS 071 DESIGN & DEVELOPMENT OF APPLICATIONS
Course Outcome(CO) Bloom’s Knowledge Level(KL)
At the end of course, the student will be able to understand
CO1 Be exposed to technology and business trends impacting mobile applications K1, K2

CO2 Be competent with the characterization and architecture of mobile applications. K3

CO3 Be competent with understanding enterprises requirements of mobile applications. K1, K2


Be competent with designing and developing mobile applications using one K3
CO4 application development framework.
CO5 Be exposed to Android and iOS platforms to develop the mobile applications K1, K2

DETAILED SYLLABUS
Proposed
Unit Topic Lecture
INTRODUCTION: Introduction to mobile applications–Embedded systems–Market and
I Business drivers for mobile applications–Publishing and delivery of mobile applications– 08
Requirements gathering and validation for mobile applications

BASIC DESIGN: Introduction – Basics of embedded systems design – Embedded OS –


II Design constraints for mobile applications, both hardware and software related– 08
Architecting mobile applications–User interfaces for mobile applications–touch events and
gestures–Achieving quality constraints–performance, usability, security, availability and
modifiability
ADVANCED DESIGN: Designing applications with multimedia and web access
III capabilities –Integration with GPS and social media networking applications – Accessing 08
applications hosted in a cloud-computing environment –Design patterns for mobile
applications.
TECHNOLOGY –ANDROID: Introduction–Establishing the development environment–
IV Android architecture–Activities and views–Interacting with UI–Persisting data using 08
SQLite–Packaging and deployment–Interaction with server side applications–Using Google
Maps, GPS and Wi-Fi – Integration with social media applications.
TECHNOLOGYII–iOS: Introduction to Objective C–iOS features–implementation–Touch
V frameworks–Data persistence using Core Data and SQLite–Location aware applications 08
using Core Location and Map Kit–Integrating calendar and address book with social media
application–Using Wi-Fi – iPhone market place. Swift: Introduction to Swift, features of
swift
Textbooks:
1. CharlieCollins,MichaelGalpinandMatthiasKappler,“AndroidinPractice”, Dream Tech, 2012
2. Anubhav Pradhan, Anil V Despande, Composing Mobile Apps, Learn, explore, apply
3. James Dovey and AshFurrow,“BeginningObjectiveC”,Apress,2012
4. JeffMc Wherter and ScottGowell,“ProfessionalMobileApplicationDevelopment”,Wrox,2012
5. David Mark, Jack Nutting, Jeff La Marche and Frederic Olsson, “Beginning iOS
6. Development: Exploring the iOS SDK”, Apress, 2013.
MKCS 072 SOFTWARE TESTING
Course Outcome(CO) Bloom’s Knowledge Level(KL)
At the end of course, the student will be able to understand
CO1 Have an ability to apply software testing knowledge and engineering methods. K2, K3
CO2 Have an ability to design and conduct a software test process for a software-testing K3,K4
project.
Have an ability to identify the needs of software test automation, and define and develop
CO3 a test tool to support test automation. K1, K2
Have an ability understand and identify various software testing problems, and solve
CO4 these problems by designing and selecting software test models, criteria, strategies, and K1, K2
methods.
Have basic understanding and knowledge of contemporary issues in software testing,
CO5 such as component-based software testing problems. K2

DETAILED SYLLABUS
Proposed
Unit Topic Lecture
TESTING BASICS : Testing as an engineering activity – Role of process in software
quality – Testing as a process – Basic definitions – Software testing principles – The
tester’s role in a software development organization – Origins of defects – Defect classes
I – The defect repository and test design – Defect examples – Developer / Tester support 08
for developing a defect repository.
TEST CASE DESIGN : Introduction to testing design strategies – The smarter tester
II – Test case design strategies – Using black box approach to test case design – Random 08
testing – Equivalence class partitioning – Boundary value analysis – Other black box
test design approaches – Black box testing and COTS – Using white box approach to
test design – Test adequacy criteria – Coverage and control flow graphs – Covering
code logic – Paths – Their role in white box based test design – Additional white box
test design approaches – Evaluating test adequacy criteria.

LEVELS OF TESTING: The need for levels of testing – Unit test – Unit test
III planning – Designing the unit tests – The class as a testable unit – The test harness – 08
Running the unit tests and recording results – Integration tests – Designing integration
tests – Integration test planning – System test – The different types – Regression
testing – Alpha, beta and acceptance tests

Software Testing Activities: Levels of Testing, Debugging, Testing techniques and


IV their applicability, Exploratory Testing Automated Test Data Generation: Test Data, 08
Approaches to
Test data generation, test data generation using genetic algorithm, Test Data
Generation Tools, Software Testing Tools, and Software test Plan.

Object Oriented Testing: Definition, Issues, Class Testing, Object Oriented


V Integration and System Testing, Testing Web Applications: Web Testing, User 08
Interface Testing, Usability
Testing, Security Testing, Performance Testing, Database testing, Post Deployment
Testing

Textbooks:
1. Yogesh Singh,“Software Testing”, Cambridge University Press, NewYork, 2012
2. K. K. Aggarwal & Yogesh Singh, “Software Engineering”, New Age International Publishers, New Delhi,
2003.
3. Roger S. Pressman, “Software Engineering–A Practitioner’s Approach”, Fifth Edition, McGraw-Hill
International Edition, New Delhi, 2001.
4. Marc Roper, “Software Testing”, McGraw-Hill Book Co., London, 1994.
5. M.C. Trivedi, Software Testing & Audit, Khanna Publishing House
6. Boris Beizer,“Software System Testing and Quality Assurance”, Van Nostr and Reinhold, New York,
1984
MKCS 073 HIGH PERFORMANCE COMPUTING
Course Outcome (CO) Bloom’s Knowledge Level(KL)
At the end of course, the student will be able to understand
CO1 Able to understand the basic concept of Computer architecture and Modern Processor K2
CO2 Able to understand the basic concepts of access optimization and parallel computers K2,K3
Able to describe different parallel processing platforms involved in achieving high K3,K4
CO3
Performance computing
CO4 Develop efficient and high-performance parallel programming. K2,K3
CO5 Able to learn parallel programming using message-passing paradigm. K2,K4
DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
Overview of Grid Computing Technology, History of Grid Computing, High Performance
Computing, Cluster Computing. Peer‐to‐Peer Computing, Internet Computing, Grid
08
I Computing Model and Protocols, Types of Grids: Desktop Grids, Cluster Grids, Data Grids,
High‐Performance Grids, Applications and Architectures of High-Performance Grids,
High Performance Application Development Environment.

II Open Grid Services Architecture: Introduction, Requirements, Capabilities, Security 08


Considerations, GLOBUS Toolkit

Overview of Cluster Computing: Cluster Computer and its Architecture, Clusters


III 08
Classifications, Components for Clusters, Cluster Middleware and SSI, Resource
Management and Scheduling, Programming, Environments and Tools, Cluster Applications,
Cluster Systems,

IV Beowulf Cluster: The Beowulf Model, Application Domains, Beowulf System 08


Architecture, Software Practices, Parallel Programming with MPL, Parallel Virtual Machine
(PVM).
Overview of Cloud Computing: Types of Cloud, Cyber infrastructure, Service Oriented
V 08
Architecture, Cloud Computing Components: Infrastructure, Storage, Platform,
Application Services, Clients, Cloud Computing Architecture.

Textbooks:
1. Laurence T.Yang, Minyi Guo–High Performance Computing Paradigm and Infrastructure, John Wiley
2. Ahmar Abbas, “Grid Computing: Practical Guide to Technology & Applications”, Firewall Media, 2004.
3. Joshy Joseph and Craig Fellenstein, “Grid Computing”, Pearson Education, 2004.
4. Lan Foster, et al., “The Open Grid Services Architecture”, Version 1.5(GFD.80).Open Grid Forum, 2006.
5. Rajkumar Buyya. High Performance Cluster Computing: Architectures and Systems. Prentice Hall India
MKCS 074 MOBILE COMPUTING
Course Outcome(CO) Bloom’s Knowledge Level (KL)

At the end of course, the student will be able to understand


Explain and discuss issues in mobile computing and illustrate overview of wireless telephony K1,K4
CO1 and channel allocation in cellular systems.
CO2 Explore the concept of Wireless Networking and Wireless LAN. K1
Analyze and comprehend Data management issues like data replication for mobile computers, K4
CO3 adaptive clustering for mobile wireless networks and Disconnected operations.
Identify Mobile computing Agents and state the issues pertaining to security and fault to K1,K2
CO4 Mobile computing environment.
Compare and contrast various routing protocols and will identify and interpret the K2
CO5 performance of networks systems using Adhoc networks.

DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
Introduction, issues in mobile computing, overview of wireless telephony: cellular concept,
I GSM:air- interface, channel structure, location management: HLR-VLR, hierarchical, 08
handoffs, channel allocation in cellular systems, CDMA, GPRS.
Wireless Networking, Wireless LAN Overview: MAC issues ,IEEE802.11, Blue Tooth,
II Wireless multiple access protocols, TCP over wireless, Wireless applications, data broad 08
casting, Mobile IP,WAP: Architecture, protocol stack , application environment,
applications.
Data management issues, data replication for mobile computers, adaptive clustering for
III mobile Wireless networks, Files system, Disconnected operations. 08
Mobile Agents computing, security and fault tolerance, transaction processing in mobile
IV computing Environment. 08
Adhoc networks, localization, MAC issues, Routing protocols, global state routing(GSR),
V Destination sequenced distance vector routing (DSDV), Dynamic source routing (DSR), Ad 08
Hoc on demand and distance vector routing(AODV),Temporary ordered routing
algorithm(TORA),QoS in Adhoc Networks, applications.
Textbooks:
1. J. Schiller, Mobile Communications, Addison Wesley.
2. A. Mehrotra, GSM System Engineering.
3. M.V.D. Heijden, M. Taylor, Understanding WAP, Artech House.
4. Charles Perkins, Mobile IP, Addison Wesley.
5. Charles Perkins, Adhoc Networks, Addison Wesley.
MKCS 751 ARTIFICIAL INTELLIGENCE LAB
Course Outcome(CO) Bloom’s Knowledge Level(KL)
At the end of course, the student will be able to understand
Explain unification, Recursion and listing using Prolog. K2
CO1
CO2 Identify problems that are amenable to solution by AI methods, and which AI methods K4
may be suited to solving a given problem.
CO3 Design and carry out an empirical evaluation of different algorithms on a problem K5
formalization and state the conclusions that the evaluation supports.
CO4 Implement basic AI algorithms (e.g., standard search algorithms or dynamic K5
programming).
DETAILED SYLLABUS

The following programs may be developed–


1. Study of Prolog.
2. Write simple fact for the statements using PROLOG.
3. Write predicates One converts centigrade temperatures to Fahrenheit, the other checks if a
temperature is below freezing.
4. Write a program to solve the Monkey Banana problem.
5. WAP in turboprolog for medical diagnosis and show the advantage and disadvantage of
green and redcuts.
6. 6WAP to implement factorial ,Fibonacci of a given number.
7. Write a program to solve4-Queenproblem.
8. Write a program to solve traveling salesman problem.
9. Write a program to solve waterjug problem using LISP
MKCS 752 CRYPTOGRAPHY & NETWORK SECURITY LAB
Course Outcome(CO) Bloom’s Knowledge Level(KL)
At the end of course, the student will be able to understand
Use C language to develop simple XOR operation for encryption of data K3
CO1
CO2 Make use of C/Java to implement Symmetric cryptography K3, K5
CO3 Choose C/Java to develop Asymmetric cryptography K5
CO4 Implement Diffie-Hellman Key exchange using HTML and JavaScript K3, K5
CO5 Develop java programs on MD-5 and SHA-1 algorithms K5
DETAILED SYLLABUS

The following programs may be developed -


1. Write a C program that contains a string (char pointer) with a value \Hello World’. The program should
XOR each character in this string with 0 and displays the result.
2. Write a C program that contains a string (char pointer) with a value \Hello World’. The program should
AND or and XOR each character in this string with 127 and display the result
3. Write a Java program to perform encryption and decryption using the following algorithms:
i. Ceaser Cipher
ii. Substitution Cipher
iii. Hill Cipher
4. Write a Java program to implement the DES algorithm logic
5. Write a C/JAVA program to implement the BlowFish algorithm logic
6. Write a C/JAVA program to implement the Rijndael algorithm logic.
7. Using Java Cryptography, encrypt the text “Hello world” using Blow Fish. Create your own key using
Java keytool.
8. Write a Java program to implement RSA Algoithm
9. Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript. Consider the end
user as one of the parties (Alice) and the JavaScript application as other party (bob).
10. Calculate the message digest of a text using the SHA-1 algorithm in JAVA.
11. Calculate the message digest of a text using the SHA-1 algorithm in JAVA.
MKCS 753 INTERNSHIP ASSESSMENT
Course Outcome(CO) Bloom’s Knowledge Level(KL)
At the end of course, the student will be able to understand
Developing a technical artifact requiring new technical skills and effectively utilizing K4,K5
CO1 a new software tool to complete a task
Writing requirements documentation, selecting appropriate technologies, identifying K5,K6
CO2 and
Creating appropriate test cases for systems.
Demonstrating professional customs & practices and working with K4,K5
CO3 understanding professional
standards.
CO4 Improving problem-solving, critical thinking skills and report writing. K4,K5
Learning professional skills like exercising leadership, behaving professionally, K2,K4
CO5 behaving ethically, listening effectively, participating as a member of a team,
developing appropriate work place attitudes.

M.TECH. INTEGRATED (Computer Science and Engineering)


SEMESTER VIII (DETAILED SYLLABUS)
MKCS 801 CLOUD COMPUTING
Course Outcome (CO) Bloom’s Knowledge Level(KL)

At the end of course, the student will be able to understand

CO1 Describe architecture and underlying principles of cloud computing. K3


CO2 Explain need, types and tools of Virtualization for cloud. K3,K4

CO3 Describe Services Oriented Architecture and various types of cloud services. K2,K3

Explain Inter cloud resources management cloud storage services and their providers K2,K4
CO4 Assess security services and standards for cloud computing.
CO5 Analyze advanced cloud technologies. K3,K6
DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
Overview of Computing Paradigm: Recent trends in Computing Grid Computing, Cluster
I Computing, Distributed Computing, Utility Computing, Cloud Computing Evolution of 08
cloud computing Business driver for adopting cloud computing.
Introduction to Cloud Computing: Cloud Computing (NIST Model) Introduction to
Cloud Computing, History of Cloud Computing, Cloud service providers Properties,
Characteristics & Disadvantages Pros and Cons of Cloud Computing, Benefits of Cloud
Computing, Cloud computing vs. Cluster computing vs. Grid computing Role of Open
Standards

Cloud Computing Architecture: Cloud computing, stack Comparison with traditional


computing architecture (client/server), Services provided at various levels, How Cloud
II Computing Works, Role of Networks in Cloud computing, protocols used, Role of Web 08
services Service Models (XaaS), Infrastructure as a Service (IaaS) , Platform as a Service
(PaaS), Software as a Service(SaaS) Deployment Models Public cloud, Private cloud,
Hybrid cloud, Community cloud.

Infrastructure as a Service(IaaS) :Introduction to IaaS, IaaS definition, Introduction to


virtualization, Different approaches to virtualization, Hypervisors, Machine Image,
III Virtual Machine(VM) Resource Virtualization Server, Storage, Network Virtual Machine 08
(resource) provisioning and manageability, storage as a service, Data storage in cloud
computing(storage as a service) Examples Amazon EC2 Renting, EC2 Compute Unit,
Platform and Storage, pricing, customers Eucalyptus
Platform as a Service(PaaS): Introduction to PaaS What is PaaS, Service Oriented
Architecture (SOA) Cloud Platform and Management Computation Storage Examples
Google App Engine Microsoft Azure
Software as a Service (PaaS): Introduction to SaaS, Web services, Web 2.0, Web OS, Case
Study on SaaS

Service Management in Cloud Computing: Service Level Agreements(SLAs), Billing &


Accounting, Comparing Scaling Hardware: Traditional vs. Cloud, Economics of scaling:
IV Benefitting enormously Managing Data Looking at Data, Scalability & Cloud Services 08
Database & Data Stores in Cloud Large Scale Data Processing.

Cloud Security: Infrastructure Security Network level security, Host level security,
V Application level security Data security and Storage Data privacy and security Issues, 08
Jurisdictional issues raised by Data location Identity & Access Management, Access
Control, Trust, Reputation, Risk, Authentication in cloud computing, Client access in cloud,
Cloud contracting Model, Commercial and business considerations.

Textbooks:
1. Kai Hwang, Geoffrey C. Fox, Jack G. Dongarra, “Distributed and Cloud Computing, From
Parallel Processing to the Internet of Things”, Morgan Kaufmann Publishers, 2012.
2. Rittinghouse, John W., and James F. Ransome, ―Cloud Computing: Implementation, Management
and Security, CRC Press, 2017.
3. Rajkumar Buyya ,Christian Vecchiola, S. Thamarai Selvi,―Mastering Cloud Computing, Tata Mcgraw
Hill, 2013.
4. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing–A Practical Approach, Tata Mcgraw
Hill, 2009.
5. George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in the
Cloud: Transactional Systems for EC2 and Beyond (Theory in Practice),O’Reilly, 2009.
MKCS 081 DEEP LEARNING
Course Outcome(CO) Bloom’s Knowledge Level(KL)
At the end of course, the student will be able to understand
To present the mathematical, statistical and computational challenges of building K1, K2
CO1 neural networks
CO2 To study the concepts of deep learning K1,K2
CO3 To introduce dimensionality reduction techniques K2
CO4 To enable the students to know deep learning techniques to support real-time K2,K3
applications
CO5 To examine the case studies of deep learning techniques K3,K6
DETAILED SYLLABUS
Proposed
Topic Lecture
Unit
INTRODUCTION: Introduction to machine learning-Linear models (SVMs and
I Perceptrons, logistic regression)-Introduction to Neural Nets: What a shallow network 08
computes-Training a network:
Loss functions, back propagation and stochastic gradient descent-Neural networks as
universal function approximates
DEEPNETWORKS: History of Deep Learning- A Probabilistic Theory of Deep Learning-
II Backpropagation and regularization, batch normalization- VC Dimension and Neural Nets- 08
Deep Vs Shallow Networks-Convolutional Networks-Generative Adversarial
Networks(GAN),Semi-Supervised Learning
DIMENTIONALITY REDUCTION Linear (PCA, LDA) and manifolds, metric learning –
III Auto encoders and dimensionality reduction in networks - Introduction to Convnet - 08
Architectures –AlexNet, VGG, Inception, ResNet-Training a Convnet: weights
initialization, batch normalization, hyper parameter optimization
OPTIMIZATION AND GENERALIZATION: Optimization in deep learning –Non-
convex optimization for deep networks- Stochastic Optimization Generalization in neural
IV networks- Spatial Transformer Networks- Recurrent networks, LSTM-Recurrent Neural 08
Network Language Models-Word-Level RNNs & Deep Reinforcement Learning-
Computational & Artificial
Neuroscience
CASE STUDY AND APPLICATIONS: Image net- Detection-Audio Wave Net-Natural
V Language Processing Word2Vec - Joint Detection-Bioinformatics- Face Recognition- 08
Scene Understanding-Gathering Image Captions
Textbooks:
1. Cosma Rohilla Shalizi, Advanced Data Analysis from an Elementary Point of View, 2015.
2. Deng &Yu, Deep Learning: Methods and Applications, Now Publishers, 2013.
3. Ian Goodfellow, Yoshua Bengio, Aaron Courville, Deep Learning, MIT Press, 2016.
4. Michael Nielsen, Neural Networks and Deep Learning, Determination Press, 2015.
MKCS 082 QUANTUM COMPUTING
Course Outcome(CO) Bloom’s Knowledge Level(KL)

At the end of course, the student will be able to understand


Distinguish problems of different computational complexity and explain why certain problems K 1, K 2
CO1 are rendered tractable by quantum computation with reference to the relevant concepts in
quantum theory.
Demonstrate an understanding of a quantum computing algorithm by simulating it on a K 2, K 3
CO2
Classical computer, and state some of the practical challenges in building a quantum computer.
Contribute to a medium-scale application program as part of a co-operative team, making use of K 2, K 3
CO3
appropriate collaborative development tools (such as version control systems).
Produce code and documentation that is comprehensible to a group of different programmers K 3, K 4
CO4
and present the theoretical background and results of a project in written and verbal form.
Apply knowledge, skills, and understanding in executing a defined project of research, K3,K6
CO5
development, or investigation and identifying and implementing relevant outcomes.
DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
I Fundamental Concepts: Global Perspectives, Quantum Bits, Quantum Computation, Quantum 08
Algorithms, Quantum Information, Postulates of Quantum Mechanisms.
Quantum Computation: Quantum Circuits–Quantum algorithms, Single Orbit operations, Control
Operations, Measurement, Universal Quantum Gates, Simulation of Quantum Systems ,Quantum
II Fourier transform, Phase estimation, Applications, Quantum search algorithms–Quantum counting – 08
Speeding up the solution of NP– complete problems – Quantum Search for an
Unstructured database.
Quantum Computers: Guiding Principles, Conditions for Quantum Computation, Harmonic
III Oscillator Quantum Computer, Optical Photon Quantum Computer–Optical cavity Quantum 08
electrodynamics, Ion traps, Nuclear Magnetic resonance
Quantum Information: Quantum noise and Quantum Operations – Classical Noise and Markov
IV Processes, Quantum Operations, Examples of Quantum noise and Quantum Operations–Applications 08
of Quantum operations, Limitations of the Quantum operations formalism, Distance
Measures for Quantum information.
Quantum Error Correction: Introduction, Shor code, Theory of Quantum Error –Correction,
V Constructing Quantum Codes, Stabilizer codes, Fault – Tolerant Quantum Computation, Entropy and 08
information–Shannon Entropy, Basic properties of Entropy, Von Neumann, Strong Sub
Additivity, Data Compression, Entanglement as a physical resource.
Textbooks:
1. Micheal A. Nielsen. & IssacL.Chiang,“Quantum Computation and Quantum Information”,Cambridge University
Press, Fint South Asian edition, 2002.
2. Eleanor G.Rieffel, Wolfgang H Polak,“Quantum Computing-A Gentle Introduction” , Scientific and Engineering
Computation, Oct 2014
3. Computing since Democritus by Scott Aaronson, Computer Science:An Introduction by N. David Mermin.
Yanofsky and Mannucci, Quantum Computing for Computer Scientists.
MKCS 083 INTERNET OF THINGS
Course Outcome(CO) Bloom’s Knowledge Level(KL)
At the end of course, the student will be able to understand
CO1 Demonstrate basic concepts, principles and challenges in IoT. K1, K2
CO2 Illustrate functioning of hardware devices and sensors used for IoT. K2
CO3 Analyze network communication aspects and protocols used in IoT. K4
CO4 Apply IoT for developing real life applications using Ardunio programming. K3

CP5 To develop IoT infrastructure for popular applications K2,K3

DETAILED SYLLABUS
Proposed
Unit Topic
Lecture
Internet of Things (IoT): Vision, Definition, Conceptual Framework, Architectural view,
technology behind IoT,Sources of the IoT, M2M Communication, IoT Examples. Design Principles
I for Connected Devices: IoT / M2M systems layers and design standardization, communication 08
technologies, data enrichment and consolidation, ease of designing and affordability

Hardware for IoT: Sensors, Digital sensors, actuators, radio frequency identification (RFID)
technology, wireless sensor networks, participatory sensing technology. Embedded Platforms for
II 08
IoT: Embedded computing basics, Overview of IOT supported Hardware platforms such as
Arduino, Net Arduino, Raspberry pi, Beagle Bone, Intel Galileo boards and ARM cortex.
Network &Communication aspects in IoT: Wireless Medium access issues, MAC protocol
III survey, Survey routing protocols, Sensor deployment & Node discovery, Data aggregation & 08
Dissemination
Programming the Ardunio: Ardunio Platform Boards Anatomy, Ardunio IDE, coding, using
IV 08
emulator, using libraries, additions in ardunio, programming the ardunio for IoT.
Challenges in IoT Design challenges: Development Challenges, Security Challenges, Other
challenges IoT Applications: Smart Metering, E-health, City Automation, Automotive Applications
V 08
,home automation, smart cards, communicating data with H/W units, mobiles, tablets,
Designing of smart street lights in smart city.
Textbooks:
1. Olivier Hersent, David Boswarthick, Omar Elloumi, “The Internet of Things key applications and protocols”,
Wiley
2. Jeeva Jose, Internet of Things, Khanna Publishing House
3. Michael Miller “The Internet of Things” by Pearson
4. Raj Kamal “INTERNET OF THINGS”, McGraw-Hill,1ST Edition, 2016
5. Arshdeep Bahga, Vijay Madisetti, “Internet of Things (A hands on approach)”1ST edition, VPI publications, 2014
6. Adrian McEwen, Hakin Cassimally “Designing the Internet of Things”, Wiley India
MKCS 084 BLOCKCHAIN ARCHITECTURE DESIGN
Course Outcome(CO) Bloom’s Knowledge Level(KL)
At the end of course, the student will be able to understand

CO1 Describe the basic understanding of Block chain architecture along with its primitive. K1,K2
CO2 Explain the requirements for basic protocol along with scalability aspects. K2,K3

CO3 Design and deploy the consensus process using frontend and backend. K3,K4
Apply Block chain techniques for different use cases like Finance, Trade /
CO4 Supply and Government activities. K4,K5

DETAILED SYLLABUS
Unit Topic Proposed
Lecture
Introduction to Blockchain: Digital Money to Distributed Ledgers, Design Primitives:
I Protocols, Security, Consensus, Permissions, Privacy. 08
Blockchain Architecture and Design: Basic crypto primitives: Hash, Signature, Hash chain
to Blockchain, Basic consensus mechanisms
Consensus: Requirements for the consensus protocols, Proof of Work (PoW), Scalability
II aspects of Blockchain consensus protocols 08
Permissioned Blockchains: Design goals, Consensus protocols for Permissioned
Blockchains
Hyperledger Fabric(A): Decomposing the consensus process, Hyperledger fabric
III components, Chain code Design and Implementation 08
Hyperledger Fabric(B): Beyond Chain code: fabric SDK and Front End(b) Hyper
ledger composer tool
Usecase1:Blockchain in Financial Software and Systems(FSS):(i) Settlements,(ii)
IV KYC,(iii) Capital markets, (iv) Insurance 08
Usecase2: Blockchain in trade/ supply chain, Provenance of goods, visibility, trade/supply
chain finance, invoice management discounting, etc.
Usecase3: Blockchain for Government:(i) Digital identity, land records and other kinds of
V record keeping between government entities, (ii) public distribution system social welfare 08
systems Blockchain Cryptography, Privacy and security on Blockchain
Textbooks:
1. Mastering Bitcoin: Unlocking Digital Cryptocurrencies, by Andreas Antonopoulos
2. Blockchain by Melanie Swa, O’Reilly
3. Hyperledger Fabric-https://www.hyperledger.org/projects/fabric
4. ZerotoBlockchain-An IBM Redbooks course, by BobDill,DavidSmits-
https://www.redbooks.ibm.com/Redbooks.nsf/RedbookAbstracts/crse0401.html
MKCS 851 CLOUD COMPUTING LAB
Course Outcome(CO) Bloom’s Knowledge Level(KL)
At the end of course, the student will be able to understand
To know about the use AWS management console, create and manipulate Amazon K1, K5
CO1 instances.
CO2 Access the encrypting and controlling of S3 K3
CO3 Describe how to create private and virtual private cloud. K1
CO4 How to create IAM group in cloud. K5
CO5 To understand the steps of Installation of Open Stack K2
DETAILED SYLLABUS

1. Navigate the AWS Management Console. CO1


2. Create and manipulate Elastic Compute Cloud instances. CO1
3. Create AWS EC2 Virtual Machine Using AWS Console. CO1
4. Monitoring Virtual Resources in AWS. CO2
5. Getting Started with S3 in Cloud. CO3
6. Working with EBS in AWS .CO3
7. Build a relational database server. CO3
8. Create private cloud - Designing a Custom VPC (Virtual Private Cloud). CO4
9. Create an IAM Group in Cloud. CO4
10. Built a RESTful serverless API on AWS

MKCS 754/ MKCS 852 PROJECT BASED LEARNING I / PROJECT BASED LEARNING II

Course Outcome (CO) Bloom’s Knowledge Level(KL)


At the end of course, the student will be able to understand
Analyze and understand the real-life problem and apply their knowledge to get K4,K5
CO1
programming solution.
Engage in the creative design process through the integration and application of diverse K4,K5
CO2 Technical knowledge and expertise to meet customer needs and address social issues.
Use the various tools and techniques, coding practices for developing real life solution to K5,K6
CO3
the
Problem.
Find out the errors in software solutions and establishing the process to design K4,K5
CO4
maintainable
Software applications
CO5 Write the report about what they are doing in project and learning the team working K5,K6
skills

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy