m.tech Computer Science and Engineering Syllabus 2021
m.tech Computer Science and Engineering Syllabus 2021
Master of Technology
Regulations 2021
Volume – 23
Syllabi for School of Computing Programmes
No Title Page No
1
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
21CSC555J Machine Learning Algorithms…………………………………………………………… 70
21CSC556J Database Systems Design: Relational and NoSQL……………………………………. 72
21CSC558J Deep Learning Approaches……………………………………………………………… 74
21CSC566J Cyber Physical Systems in IoT………………………………………………………….. 76
21CSC567J Big Data Frameworks and MLOps………………………………………………………. 78
21CSC569J Fundamentals of Artificial Intelligence………………………………………………….. 80
21CSC571J Reinforcement Learning Algorithms…………………………………………………….. 82
21CSC572J Applied Malware Analysis………………………………………………………………... 84
21CSC573J Data Analysis and Interpretation ……………………………………………………….. 86
21CSC574J Big Data Analytics using Artificial Intelligence Technologies…………………………. 88
3 Professional Elective Courses………………………………………………………………………………… 90
21AIE532T Soft Computing and its Applications……………………………………………………. 91
21AIE536T Artificial Intelligence Engines……………………………………………………………. 93
21AIE538T Artificial Intelligence for Industrial Applications………………………………………… 95
21AIE 541T Multimodal Machine Learning…………………………………………………………… 97
21CSE519T Geospatial Data Analysis………………………………………………………………… 99
21CSE521T Advanced Algorithms Analysis………………………………………………………….. 101
21CSE522T Functional Programming…………………………………………………………………. 103
21CSE523T Data Engineering Principles for Enterprises…………………………………………… 105
21CSE524T Computer Vision Techniques……………………………………………………………. 107
21CSE526T End-End Deep Learning for Production………………………………………………… 109
21CSE527T Text Mining and Analytics……………………………………………………………….. 111
21CSE531T Cyber Security Operations………………………………………………………………. 113
21CSE532T Network Management and Protocols ………………………………………………….. 115
21CSE533T Firewalls and Access Controls …………………………………………………………. 117
21CSE534T Network Programming and Management……………………………………………… 119
21CSE535T Network Intrusions and Computer Forensics………………………………………….. 121
21CSE536T Mobile Forensics………………………………………………………………………….. 123
21CSE537T Digital Forensics………………………………………………………………………….. 125
21CSE538T Security Scripting and Analysis…………………………………………………………. 127
21CSE539T Principles of Secure Coding Principles…………………………………………………. 129
21CSE540T Android Security and Design Internals…………………………………………………. 131
21CSE541T Probabilistic Graphical Models: Principles and Techniques…………………………. 133
21CSE542T Deep Generative Models………………………………………………………………… 135
21CSE543T Brain Machine Interface: Science, Technology and Application…………………….. 137
21CSE548T Spatial and Temporal Computing……………………………………………………… 139
21CSE549T Decision Making Under Uncertainty……………………………………………………. 141
21CSE554T Computer Networking…………………………………………………………………….. 143
2
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
21CSE555T Internet of Things in Edge Computing………………………………………………….. 145
21CSE556T Generative Adversarial Networks and its Applications……………………………….. 147
21CSE557T Streaming Data Analytics………………………………………………………………… 149
21CSE558T Deep Neural Network Architectures…………………………………………………….. 151
21CSE559T Cloud Computing for Data Analytics……………………………………………………. 153
21CSE560T Generative AI with Large Language Models…………………………………………… 155
21CSE561T Ethics in Data Science …………………………………………………………………... 157
21CSE562T SQL and NoSQL for Data Science…………………………………………………….. 159
21CSE563T Big Data Database Technologies……………………………………………………….. 161
21CSE564T Big Data Ecosystem……………………………………………………………………… 163
21CSE565T Web Development………………………………………………………………………… 165
21CSE566T IoT Data Analytics………………………………………………………………………… 167
21CSE567T Communication and Networking Technologies for Internet of Things ……………… 169
21CSE568T Privacy and Security in IoT………………………………………………………………. 171
21CSE569T Components and Energy Optimization Techniques for Internet of Things…………. 173
21CSE570T Sensor Data Management in IoT……………………………………………………….. 175
21CSE571T SDN and NFV for Internet of Things……………………………………………………. 177
21CSE572T IoT Visualization…………………………………………………………………………... 179
21CSE573T Real Time Systems in Emerging IoT …………………………………………………... 181
21CSE574T Digital Twins Driven Distributed IoT Solutions………………………………………… 183
21CSE575T API Design and Management…………………………………………………………… 185
21CSE576T Micro Services and Containerization in Cloud Computing…………………………… 187
21CSE577T Data Center Virtualization and Management Tools ………………………………… 189
21CSE578T Cloud Compliance and Governance …………………………………………………… 191
21CSE579T Application Architecture and Deployment……………………………………………… 193
21CSE580T Business Continuity planning and Disaster Recovery ……………………………… 195
21CSE581T Cloud Services Architect…………………………………………………………………. 197
21CSE582T Cloud Security Builder……………………………………………………………………. 199
21CSE583T Natural Language Processing and its Applications…………………………………… 201
21CSE584T Time Series Analysis and Forecasting…………………………………………………. 203
21CSE585T Front End Development Technologies…………………………………………………. 205
21CSE586T REST APIs Development using Spring Framework………………………………… 207
21CSE587T Full Stack Application Development using React and Spring Framework…………. 209
21CSE588T Deploying Full Stack Application………………………………………………………... 211
21CSE589T Mobile Application Development………………………………………………………... 213
21CSE590T Agile and DevOps…………………………………………………………………………. 215
21CSE591T Advanced Data Visualization……………………………………………………………. 217
21CSE592T Statistical Machine Learning…………………………………………………………….. 219
3
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
21CSE593T User Experience Design Thinking………………………………………………………. 221
21CSE594T Full Stack Development………………………………………………………………….. 223
21CSE595T Web 3.0 …………………………………………………………………………………... 225
21CSE596T Security Operations and Incident Management……………………………………….. 227
21CSE597T Containers and Cloud DevOps………………………………………………………… 229
21CSE598T Big Data Analytics and Microservices………………………………………………….. 231
21CSE599T Security and Architecture………………………………………………………………… 233
21CSE619T Smart Convergent Technologies………………………………………………………... 235
21CSE620T Cognitive Internet of Things……………………………………………………………… 237
21CSE621T Advanced Distributed Systems………………………………………………………….. 239
21CSE622T Industrial Internet of Things …………………………………………………………….. 241
21CSE623T Wireless Sensor Networks in IoT……………………………………………………….. 243
21CSE624T Fog Networks in IoT……………………………………………………………………… 245
21CSE626T Hacker Techniques and Incident Handling…………………………………………….. 247
21CSE627T Internet of Things and Cognitive Computing………………………………………… 249
21CSE628T Cyber Law and Ethics……………………………………………………………………. 251
21CSE629T Wireless Security…………………………………………………………………………. 253
21CSE630T Operating System Internals……………………………………………………………… 255
21CSE631T Risk Assessment and Security Audit…………………………………………………… 257
21CSE632T Essentials of Data Science on Cloud Computing……………………………………... 259
21CSE633T Computer Vision on Edge Computing …………………………………………………. 261
21CSE634T Migration Techniques on Cloud Architecture………………………………………… 263
21CSE635T Designing Scalable Cloud-Native Systems……………………………………………. 265
21CSE636T Emerging Technologies in Cloud Computing………………………………………….. 267
21CSE637T Deep Learning and its Applications…………………………………………………….. 269
21CSE638T Machine Learning Engineering for Production…………………………………………
21CSE639T Blockchain Technologies………………………………………………………………. 271
21CSE640T Industry Specific Applications of GenAI………………………………………………..
21CSE641T Security for Machine Learning Applications……………………………………………. 274
21CSE642T Cloud Native Application Development………………………………………………… 276
21CSE643T Microservices and Service Based Architectures………………………………………. 278
21CSE644T Web and Social Media Analytics ………………………………………………………. 280
21CSE645T Server-Side Programming……………………………………………………………….. 282
21CSE646T Biologically Inspired Intelligent systems………………………………………………... 284
21CSE647T Artificial Intelligence for Ambient systems……………………………………………… 286
21CSE650T Penetration Testing……………………………………………………………………….. 288
21CSE651T InfoSec Leadership……………………………………………………………………….. 290
21CSE652T Advanced Cryptography…………………………………………………………………. 292
4
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
21CSE653T Cloud Computing with Blockchain………………………………………………………. 294
21CSE654T Cryptocurrencies and Blockchain Technology………………………………………… 296
21CSE655T Advanced Machine Learning Algorithms………………………………………………. 298
21CSE656T Social Media Analytics…………………………………………………………………… 300
21CSE658T Large Language Models…………………………………………………………………. 302
21CSE659T Reinforcement Learning…………………………………………………………………. 304
21CSE664P Product Thinking………………………………………………………………………….. 306
21CSE665T Revolutioning Business with Blockchain……………………………………………….. 308
21CSE666T Transforming Business Paradigms of Distributed Ledger Technology…………… 310
21CSE667T Empowering Business with Smart Contracts………………………………………….. 312
21CSE668T Business Data Analytics…………………………………………………………………. 314
21CSE669P Quantum Communication and Cryptography………………………………………….. 316
21CSE670P NP Completeness and Beyond………………………………………………………….. 318
4 Non Credit Courses………………………………………………………………………………… 320
21CSM501L Professional Soft Skills-I………………………………………………………………….. 321
21CSM502L Professional Soft Skills-II………………………………………………………………….. 323
5
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
ACADEMIC CURRICULA
Regulations 2021
6
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21MAC503T DISCRETE MATHEMATICS AND PROBABILITY THEORY C PROFESSIONAL CORE
Code Name Category 3 1 0 4
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: symbolize the statement problems in propositional calculus and also in predicate calculus. 3 3 -
CO-2: select or arrange objects, identify types of graphs. 3 3 -
CO-3: solve both homogeneous and non-homogeneous recurrence relations using particular solution and generating functions. 3 3 -
CO-4: identify the type of distribution and solve them. 3 3 -
CO-5: obtain the knowledge on statistical methods in engineering. 3 3 -
7
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Tremblay J. P. And Manohar R., “Discrete Mathematical Structures With Applications To
5. Gupta.S.C., And Kapoor, V.K., “Fundamentals Of Mathematical Statistics”, Sultan Chand
Computer Science”, Tata Major Core Graw Hill Publishing Co.,35th Edition, 2008.
And Sons, 11th Edition, 2002.
Learning 2. John Vince, “Foundation Mathematics For Computer Science”, Springer, 2015.
6. Jay L.Devore, “Probability And Statistics For Engineering And The Sciences”, 5th Edition,
Resources 3. Alan Tucker, “Applied Combinatorics”, 6th edition, Wiley.2012
Thomson And Duxbury, Singapore, 2002
4. K. Trivedi, “Probability And Statistics With Reliability, Queueing And Computer Science
Applications”, 2nd edition, Wiley, 2016.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Madhan Shanmugasundaram, Infosys 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr. V. Subburayan, SRMIST
Technologies
2. Prof. K.C. Sivakumar, IIT Madras 2. Dr. D. K. Sheena Christy, SRMIST
8
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21MAC504T NUMBER THEORY C PROFESSIONAL CORE
Code Name Category 3 1 0 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand GCD and will be able to study about its Classification of prime numbers
CLR-2: relate the concepts of arithmetical functions
CLR-3: understand concepts of averages arithmetic functions
CLR-4: learn the concepts of some elementary theorems of prime numbers
CLR-5: relate the concepts of Congruences
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand basic properties of prime number system 3 3
CO-2: familiar with congruence relations and techniques of solving arithmetical functions 3 3
CO-3: understand the techniques of applying to solve number theoretic problems on averages arithmetic functions 3 3
CO-4: understand the concepts of some elementary theorems of prime numbers. 3 3
CO-5: familiar with congruence relations and techniques of solving linear congruences 3 3
9
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
4. David M. Burton , “Elementary Number Theory “, Mcgraw Hill science, Seventh edition.2010.
1. Tom M. Apostol, Introduction to Analytic Number Theory, Springer, 2013.
5. Ivan Nivan, Herbert S. Zuckerman & Hugh L. Montgomery, An Introduction to the Theory of
Learning 2. A. Jones & M. Jones, Elementary Number Theory, Springer publications, 2005.
Numbers, John Wily & Sons, Fifth Edition, 1991.
Resources 3. William Stein, Elementary Number Theory, Springer 2009.
6. k. Ireland and M. Rosen, A classical Introduction to Modern Number Theory, Springer New
York, 2014.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Madhan Shanmugasundaram, Infosys Technologies, 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras, sryedida@iitm.ac.in 1. Dr. V. Subburayan, SRMIST
madshan@gmail.com
2. Prof. K.C. Sivakumar, IIT Madras, kcskumar@iitm.ac.in 2. Dr. V. Raja, SRMIST
10
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21MAC505T LINEAR ALGEBRA AND STATISTICAL METHODS C PROFESSIONAL CORE
Code Name Category 3 1 0 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: define and apply basic concepts of linear algebra, including vectors, matrices, vector spaces, and linear transformations.
CLR-2: demonstrate foundational knowledge of probability theory and statistical concepts.
CLR-3: apply concepts from gradient calculus to analyze and optimize learning models.
CLR-4: explain the principles of non-parametric statistics and its uses
CLR-5: utilize statistical tools and techniques for analyzing complex and high-dimensional datasets.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: explain the concepts of linear algebra, vectors, projections, principal component analysis and generative models 3 3
CO-2: demonstrate the mathematics knowledge with respect to matrices, gradient calculus, optimization models. 3 3
CO-3: familiarize the mathematics knowledge with respect to probability, statistics. 3 3
CO-4: explain the concepts of non-parametric statistics 3 3
CO-5: apply the concepts of statistics to complex datasets 3 3
11
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. James D. Miller, Statistics for Data Science, Packt Publishing (2017) 4. Nonparametric Statistical Methods, Myles Hollander, Douglas A. Wolfe, Eric
Learning 2. IND James D. Hamilton, Time Series Analysis, Levant Books (2012) Chicken, Wiley (2013)
Resources 3. Bayesian Statistics for Beginners: a step-by-step approach, Therese M. Donovan, 5. Introduction to Probability, Benedek Valkó, David F. Anderson, Cambridge (2017)
Ruth M. Mickey (2019) 6. Introduction to Linear Algebra, 5th Edition, Gilbert Strang, Wellesley (2016)
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Madhan Shanmugasundaram, Infosys Technologies 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras, sryedida@iitm.ac.in 1. Dr. V. Subburayan, SRMIST
2. Prof. K.C. Sivakumar, IIT Madras, kcskumar@iitm.ac.in 2. Dr. P. Sambath. SRM IST
3. Dr. M. Sivaji, SRMIST
12
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
ACADEMIC CURRICULA
Regulations 2021
13
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC503T SECURITY SERVICE MANAGEMENT C PROFESSIONAL CORE
Code Name Category 3 1 0 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand risk management security principles and concepts, and threat modelling concepts and methodologies
CLR-2: explain concepts of security models, vulnerabilities of security architectures and methods of cryptanalytic attacks
CLR-3: study secure design principles in network architectures and Manage identification and authentication of people, devices, and services
CLR-4: demonstrate the knowledge and skills for Security Assessment and Testing and security audits
CLR-5: manage Security Operations concepts and logging and monitoring activities with various recovery plans
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: identify security principles and concepts, and threat modelling concepts and methodologies
CO-2: obtain knowledge from vulnerabilities of security architectures and methods of cryptanalytic attacks
CO-3: gain information from secure design principles in network architectures
CO-4: gain knowledge for Security Assessment and Testing and security audits
CO-5: enhance their knowledge of obtaining logging and monitoring activities with various recovery plans
14
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. https://www.koenig-solutions.com/security-management-training-certification-courses. 4. https://www.linkedin.com/learning/certified-information-security-manager-cism-cert-prep-2022-3-
Learning
2. https://www.koenig-solutions.com/cissp-certification-training-course#benefitsc information-security-program?trk=learning-topics_learning-search-card_search-
Resources
3. https://www.linkedin.com/learning/topics/security-management-and-policy card&upsellOrderOrigin=default_guest_learning.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.T Ravichandran, Product Manager, Servis2 IT Team, Chennai. 1. Dr. P. Balamurugan, SRMIST
2. Mr. Dhanvanth Kesavan, NTT Data Cyber security analyst, Chennai.
15
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC510T Course PARALLEL COMPUTING Course C PROFESSIONAL CORE L T P C
Code Name Category 3 1 0 4
Pre-requisite Nil Co-requisite Nil Progressive Nil
Courses Courses Courses
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: give a motivation for the study of parallel computing and in particular parallel programming
CLR-2: study different parallel and distributed systems, multi-core and shared memory multiprocessors using OpenMP
CLR-3: get knowledge on distributed memory systems multiprocessors using MPI
CLR-4: provide an introduction to the concepts of massively parallel programming on GPUs and heterogeneous systems
CLR-5: learn GPU programming using OpenCL
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand the basic concepts of parallel programming
CO-2: identify different parallel and distributed systems, multi-core and shared memory multiprocessors using OpenMP
CO-3: acquire the knowledge on distributed memory systems multiprocessors using MPI
CO-4: analyze the concepts of massively parallel programming on GPUs and heterogeneous systems
CO-5: implement GPU programming using OpenCL
16
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. Roman Trobec · Boštjan Slivnik Patricio Bulić · Borut Robič, Introduction to Parallel 3. Cameron Hughes, Tracey Hughes, "Parallel and Distributed Programming using
Resources Computing From Algorithms to Programming on State-of-the-Art Platforms, 2018 C++.Pearson education, 2005
2. Ananth Grama, Vipin Kumar, "Introduction to parallel computing", Second edition, 2007
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 50% - 50% - 50% -
Level 4 Analyze 10% - 10% - 10% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.V.Solai Murugan, CDAC 1. Prof. Valliammai, MIT,Chennai 1. Dr.S.Nagadevi, SRMIST
2. Mr.Saju G Nair,Kyndryl India Pvt. Ltd 2. Dr.Noor Mohammed,IIITDM,Kancheepuram 2. Dr.R.Vidhya, SRMIST
17
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC511J WEB TECHNOLOGIES C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Pre-requisite Co-requisite Progressive
Nil Nil XML, Semantic web, Intelligent web
Courses Courses Courses
Program
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Specific
Outcomes
CLR-1: learns how to develop a web page 1 2 3 4 5 6 7 8 9 10 11 12
CLR-2: illustrate client side programming for web applications
Design/development of
Communication
Environment &
Sustainability
CLR-5: demonstrate the working of dynamic web applications
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
understand, apply and analyze mark-up languages like HTML, DHTML, and JavaScript for -
CO-1: 3 2 - - - - - - - - - - - 2
development of different web applications.
CO-2: develop interactive web applications using client-side scripting languages 3 3 - - - - - - - - - - - 2 -
CO-3: create Framework for responsive, mobile-first websites 3 3 - - 2 - - - - - - - - 2 -
CO-4: develop and deploy web applications on server-side technology (Apply) 3 3 - - - - - - - - - - - 2 -
shifting from traditional static web pages to more intelligent, dynamic, and interactive web -
CO-5: 3 3 - - - - - - - - - - - 2
applications
1. Deitel & Deitel, “Internet and World Wide Web – How to Program”, Goldberg, Pearson
Education. 2010 4. Paul Deitel, Harvey Deitel, Abbey Deitel Internet & World Wide Web: How to
Learning
2. Eric Ladd, Jim O’ Donnel, Using HTML 4, XML and JAVA”, Prentice Hall of India 2010 Program, Fifth Edition,2011
Resources
3. Patrick Naughton and Herbert Schildt, The complete Reference Java 2 Fifth Edition by 5. Jennifer Robbins, Learning Web Design, 4th Edition, O’Reilly 2012
TMH 2009
Learning Assessment
Continuous Learning Assessment (CLA)
Formative Life Long Learning Summative
Bloom’s
CLA-1 Average of unit test CLA-2- Practice Final Examination (40% weightage)
Level of Thinking
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - - 15% -
Level 2 Understand 20% - - 30% 20% -
Level 3 Apply 35% - - 35% 35% -
Level 4 Analyze 30% - - 35% 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
Dr. Mariappan Vaithilingam, Senior Engineering Manager, Uber India
Mr.Babumonie, CEO, Digital Analyst Team, Northwestern University, USA Dr.Akilandeswari, SRMIST
Research and Development Pvt centre
19
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC519J WEB DEVELOPMENT FOR INTERNET OF THINGS C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: memorize advanced concepts in IoT technology, protocols, and communication, along with web development fundamentals.
CLR-2: acquire knowledge and skills in collecting, storing, and managing data from IoT devices in web applications.
CLR-3: develop proficiency in designing and implementing real-time data visualization features in IoT web applications.
CLR-4: gain practical experience in integrating different types of IoT devices with web applications, including device control and monitoring functionalities.
CLR-5: summarize the security challenges and implement appropriate security measures, along with deploying and scaling IoT web applications.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: demonstrate an advanced understanding of IoT technology, protocols, and web development fundamentals. 3 - -
CO-2: effectively collect, store, and manage data from IoT devices in web applications. 3 - -
CO-3: implement interactive and real-time data visualization features in IoT web applications. - - 3
CO-4: integrate diverse IoT devices with web applications, enabling device control and monitoring functionalities. 3 - -
CO-5: develop security measures, deploy IoT web applications on cloud platforms, and scale them to handle a large number of IoT devices. - - 3
20
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
IoT Security Best Practices: Understanding security challenges in IoT applications, Implementing authentication and authorization mechanisms, Ensuring data privacy and secure communication in IoT web
applications. Deployment and Scalability: Deploying IoT web applications on cloud platforms, Containerization and microservices, Scaling web applications to handle a large number of IoT devices. Case Study:
Perform one deployment IoT Web based case study on any title like Smart Home Automation, Smart Agriculture, Environmental Monitoring, Retail Analytics etc.
List of Experiments: 30 Hour
7. Real-Time Data Visualization and Interactive Dashboard Development:
1. Building a Weather Monitoring Web Application:
8. Implementing Data Analytics and Insights in IoT Web Applications:
2. Developing a Secure IoT Data Transmission System:
9. IoT Device Integration and Control in a Web Application:
3. Creating a RESTful API for a Task Management Application:
10. Real-Time Communication and API Integration with IoT Platforms:
4. Designing a Responsive Web Application Using UI Frameworks:
11. Implementing IoT Security Measures in a Web Application:
5. Building a Wireless Sensor Network for Environmental Monitoring:
12. Deployment and Scalability of IoT Web Applications on Cloud Platforms:
6. Developing a Real-Time Monitoring System for Industrial IoT:
1. Rajkumar Buyya, Amir Vahid Dastjerdi, and Arkady Zaslavsky, Internet of Things: 5. Scott Murray, Interactive Data Visualization for the Web: An Introduction to Designing with
Principles and Paradigms, Morgan Kaufmann Publishers, 2016. D3, Oreilly, 2017.
2. Jennifer Niederst Robbins, Learning Web Design: A Beginner's Guide to HTML, 6. Nick Qi Zhu, Data Visualization with D3.js Cookbook, Illustrated, Packt Publishing, 2013.
CSS, JavaScript, and Web Graphics, Fifth Edition, SPD Publishers, 2018. 7. Claire Rowland, Elizabeth Goodman, Martin Charlier, and Ann Light, Designing Connected
Learning
3. Ethan Brown, Web Development with Node and Express: Leveraging the JavaScript Products: UX for the Consumer Internet of Things, Kindle (I) Edition, Oreilly, 2015.
Resources
Stack, Oreilly, 2014. 8. Brian Russell, Drew Van Duren, and John Sammons, Practical Internet of Things Security,
4. Maciej Kranz, Building the Internet of Things: Implement New Business Models, Pack Publishing, 2016.
Disrupt Competitors, Transform Your Industry, Old edition, Wiley, 2016. 9. Chandraish Sinha, Building Interactive Dashboards with Tableau, Kindle Edition, eBook,
Books District Publication, 2023.
Learning Assessment
Continuous Learning Assessment (CLA)
Formative Life Long Learning Summative
Bloom’s
CLA-1 Average of unit test CLA-2- Practice Final Examination (40% weightage)
Level of Thinking
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
Ms. Aparna, Analyst - Salt Lake City Sector 5, TCS, Kolkata Dr. Krupa N, Assistant Professor, NIT, Surat Dr V Anbarasu, SRMIST
21
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC520J CLOUD STORAGE AND EDGE COMPUTING C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: establish a foundational understanding of cloud storage and edge computing
CLR-2: explore practical applications in real-world use cases of cloud storage and edge computing
CLR-3: examine emerging trends and innovations in cloud storage and edge computing
CLR-4: realize the improved performance of edge computing in Internet of things
CLR-5: summarize the concept of multi-access edge computing and Implement edge computing in MEC
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: memorize the fundamentals of cloud storage and edge computing. 3 - -
CO-2: explore different cloud storage models and services - - 3
CO-3: analyze the benefits and challenges of edge computing 3 - -
CO-4: create use cases in IoT with edge computing 3 - -
CO-5: develop services in MEC and Implement use cases in MEC - - 3
22
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Module-5 - Implement Edge Computing in MEC 9 Hour
Infrastructure Evolution – Datacenter, Communication Network Evolution, Devices Evolution, Edge cloud deployment options – Real estate model, Infrastructure as a Service, Platform as a Service.
Collaboration Platform – as a service, TCO Analysis – an Operator Perspective, Focus on energy cost, Deployment cost, Business Model aspects, MEC Market, the new vertical perspective, New players in 5G role
of verticals, Overview of vertical segments – Smart Manufacturing, Smart Transportation, E-Health.
List of Experiments: 30 Hour 8. Introduction to iofog Tools Installation tools to create and manage ECN’s
1. Case Study on Cloud Storage services 9. Deploy micro services and writing your own microservices
2. Implementation of Hypervisor and Multiple Virtual Machine Creation 10. Introduction to iofogtcl, common header YAML
3. Implementation of Aneka Cloud Installation and configuration 11. Platform YAML specification Agent configuration YAML specification
4. Implementation of Openstack cloud Installation and configuration 12. System-Hardware abstraction layer
5. Implementation Hadoop Distributed File system single node 13. System-Bluetooth REST API
6. Implementation of Google Cloud SQL Database 14. ioFog connectors
7. Implementation of AWS S3 bucket data storing and removal 15. Implementation of Minimal Spanning Tree
1. Dinkar Sitaram and Geetha Manjunath, Moving to the Cloud: Developing 4. Dario Sabella, Alex Reznik and Rui Frazao, Multi-Access Edge Computing in Action, CRC
Apps in the New World of Cloud Computing, Syngress, 2013. Press, 2019.
Learning 2. Ajit Singh, Edge Computing: Simply in Depth, Independently Published, 2019. 5. Rajkumar Buyya and Satish Narayana Srirama, Fog and Edge Computing Principles and
Resources 3. Cao, Jie, Zhang, Quan, Shi and Weisong, Edge Computing: A Primer, Pearson Paradigms, John Wiley & Sons, Inc. 2019.
Education, Springer, 2018. 6. Yu Hua, Xue Liu, Searchable Storage in Cloud Computing, Springer Nature Singapore Pte Ltd.
2019.
Learning Assessment
Continuous Learning Assessment (CLA)
Formative Life Long Learning Summative
Bloom’s
CLA-1 Average of unit test CLA-2- Practice Final Examination (40% weightage)
Level of Thinking
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Sherly A, Schneider Electric, Lead Application Developer 1. Dr. Suresh Sankaranarayanan, Professor, King Faisal 1. Dr Mary Subaja Christo, SRMIST
University
23
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course EMBEDDED SYSTEM AND SOFTWARE DEVELOPMENT FOR Course L T P C
21CSC522J C PROFESSIONAL CORE
Code Name INTERNET OF THINGS Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: describe the Building Blocks of Embedded System
CLR-2: solve program to control ARM microcontrollers for direct hardware interaction.
CLR-3: emphasize the hands-on learning approach.
CLR-4: create prototype and applications on the ESP8266 platform.
CLR-5: transform theoretical IoT knowledge into practical skills by exploring real-world applications
Programme Outcomes
Course
At the end of this course, learners will be able to: (PO)
Outcomes (CO):
1 2 3
CO-1: gain fundamental knowledge of embedded systems, their design process, and connectivity with the Internet of Thing 1 - 2
CO-2: combine the ability to develop programs and understand the underlying ARM architecture. 3 - -
CO-3: configure XBee modules, develop sensor nodes with Arduino and Raspberry Pi, integrate cameras, and implement the Zigbee protocol on ARM. 3 - 3
CO-4: program ESP8266 for Wi-Fi connectivity, sensor data acquisition, web interaction, and cloud data logging, visualization. 3 - 3
bridge the gap between IoT theory and practice through case studies in health monitoring, irrigation control, environment, weather stations, and cloud-based home
CO-5: 3 - 3
automation
1. Simon Cirani, Gianluigi Ferrari, Marco Picone & Luca Vetri, Internet of Things, 6. Márquez, F. P., & Lev, B. ‘Internet of things: Cases and studies, Springer, 2022
Architectures, Protocols and Standards, Weily, 2016 7. Bahga, A., & Madisetti, V. Internet of things: A hands-on approach, VPT,2014
Learning 2. Furber, Arm system-on-Chip architecture, 2/E. Pearson Education India.,2001 8. Prasad, Bb. John Wiley & Sons, Embedded real time Systems: Concepts, Design Prog,
3. Bell, Charles. ‘Beginning sensor networks with Arduino and Raspberry Pi, Apress, 2003.
Resources
2014. 9. Afif Osseiran, Jose F. Monserrat and Patrick Marsch, 5G Mobile and Wireless Communications
4. Shibu, Introduction to Embedded Systems, McGraw Hill, 2017. Technology, Cambridge University Press, 2016.
5. R. Kamal, Embedded Systems: Architecture, Programming and Design, MGH, 2008
Learning Assessment
Continuous Learning Assessment (CLA)
Formative Life Long Learning Summative
Bloom’s
CLA-1 Average of unit test CLA-2- Practice Final Examination (40% weightage)
Level of Thinking
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Kanagachidambaresan Ramasubramanian, PhD, Founder 1. Dr. J. Arul Valan, Assistant Professor, Department of Computer
1. Dr. M. Safa, SRMIST
EAZYTHINGS TECHNOLOGY PVT LTD Science, NIT Nagaland
25
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC526J CYBER FORENSIC AND INCIDENT RESPONSE C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the basic of forensic investigation and its procedure, policies on laws
CLR-2: understand the network, filesystem, user system level forensic
CLR-3: acquire knowledge in investigation procedure and its policies
CLR-4: exploring new aspect in investigation in every role of incident response team
CLR-5: implement and analyze the evidence to formulate the strategy
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: apply the knowledge forensic investigation 3 1
CO-2: identify and design the attack scenario for volatile & non volatile 2 1
CO-3: implement and investigate the procedure evolve in forensic duplication 1 3
CO-4: identify , implement and investigate on the hard disk imaging 3 2
CO-5: identify and investigate the network and browser forensic 1 1
CO-6: design and implement the file system , forensic report writing 1 3 2
26
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Module-4: Investigation and Report Writing 15 Hour
Introduction to analyses / Detect malicious code and intruders, System process, Unusual or hidden files, Root kits and backdoors, Introduction to network forensic, Introduction to browser forensic, Types of network
monitoring, Lab 10: How to collect network logs for investigation Firewall logs, Virus logs, Browser Investigation, Browser Investigation Firefox- IE, Browser Investigation –Firefox, Case Study : Browser Investigation,
Case study : Report Writing, Network Investigation, Lab 11 : Network Forensic using TCP Dump/ Wireshark, Finding Network-Based Evidence, Generating Session Data with tcptrace, Cloud forensics, Financial
Frauds, Espionage and Investigations. Reassembling Sessions Using Ethereal, Refining tcpdumpFilters. Lab 12 : Disk Forensics
Module-5: File System Management 15 Hour
Introduction to file system analysis, How Files Are Compiled, Statically Linked Programs, Dynamically Linked Programs, Compilation Techniques and File Analysis, Static Analysis of a Hacker Tool, Lab 13: Mobile
/ Browser Forensic, NTFS_File system category, content category, NTFS_Metadata category, Filename category, NTFS_Application - Specific file system, NTFS_Application level search technique, Comparison of
windows (FAT/EXFAT/NTFS), EXT_File system category, content category, Lab 14: NTFS File system, EXT_Metadata category, Filename category, EXT_Application level search technique, Comparison of Linux
(EXT 2/3/4/ MacOS), Case Study : File system, Forensic Report Writing, Case study Report Writing, Lab 15:EXT file system, Current challenges and future directions, Trends in cyber threats and attacks,
Advancements in forensic techniques and tools.
1. Kevin Mandia, Chris Prosise, “Incident Response and computer forensics”, Tata 6. Kevin Mandia , "Incident Response & Computer Forensics, 3rd Edition" : 2012. The McGraw:Hill, ISBN-
McGrawHill,2006. 13: 978-0071798686
2. Peter Stephenson, "Investigating Computer Crime: A Handbook for Corporate 7. Douglas Schweitzer ,”Incident Response - Computer Forensics Toolkit”, Copyright © 2003 by Wiley
Investigations", Sept 1999 Publishing, Inc, ISBN: 0-7645-2636-7
Learning 3. Eoghan Casey, "Handbook Computer Crime Investigation's Forensic Tools and 8. AymanShaaban ,Konstantin Sapronov “Practical Windows Forensics -Leverage the power of digital
Resources Technology", Academic Press, 1st Edition, 2001 forensics for Windows systems” , Packt Publishing, June 2016 , ISBN 978-1-78355-409-6
4. Skoudis. E., Perlman. R. Counter Hack: A Step-by-Step Guide to Computer Attacks and 9. Leighton R. Johnson III ,”Computer Incident Response and Forensics Team Management”,Syngress
Effective Defenses. Prentice Hall Professional Technical Reference. 2001 ISBN: 978-1-59749-996-5
5. Norbert Zaenglein, "Disk Detective: Secret You Must Know to Recover Information from a 10. Brian Carrier "File System Forensic Analysis" – by Addison Wesley, 1st edition,2005. ISBN-13: 978-
Computer", Paladin Press, 2000 0321268174
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr.A.Mohanraj, Data Engineer, Standard Chartered 1.Mr.Ashok Kumar Mohan , Amrita University 1.Dr. C.N.S.Vinoth Kumar, SRMIST
2. Ms. Chitra, SSN college of Engineering
27
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC527J ETHICAL HACKING AND VULNERABILITY ASSESSMENT C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the fundamentals of hacking techniques.
CLR-2: gain knowledge about information gathering and choosing target.
CLR-3: study about various vulnerability assessment tool.
CLR-4: study about various network attacks and its countermeasures.
CLR-5: explore about wireless hacking and web hacking with real world examples.
Programme Outcomes
Course Outcomes (PO)
At the end of this course, learners will be able to:
(CO):
1 2 3
CO-1: gain knowledge about operating system used for security assessment. 2 2 3
CO-2: setup as virtual environment to exploit various attacks. 2 - -
CO-3: navigate, comment, and modify tools for vulnerability assessment. 2 - 3
CO-4: use various sniffing tools to exploit over networks. - 2 -
CO-5: use air crack and air dump tool for wireless hacking. - 2 3
2. Glen D. Singh, The Ultimate Kali Linux Book ,Packt Publishing Limited, 2022. ISBN:
Learning 1. Rafay Baloch, Ethical Hacking and Penetration Testing Guide, Auerbach 9781801818933
Resources Publications, 2014. ISBN: 9781351381345 3. SagarRahalkar, Network Vulnerability Assessment, Packt Publishing Limited, 2018. ISBN:
9781788627252
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. BhawanaRudra Assistant Professor (Grade I) National Institute
1.Mr.Karthik Expert Member from k7 Computing 1.Dr.V.Joseph Raymond,SRMIST
of Technology, Warangal
29
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC528J APPLIED MACHINE LEARNING ALGORITHMS C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: acquire knowledge about supervised and unsupervised learning algorithms
CLR-2: understand and perform feature engineering, statistical data analysis and outlier analysis
CLR-3: develop, deploy and evaluate machine learning models with explainability
30
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Suggested Lab Exercises 30 Hour
Lab 1: Understanding "Mobile Price" dataset by doing feature analysis. Data is available at: https://www.kaggle.com/datasets/iabhishekofficial/mobile-price-classification/data
Lab 2: Execute data preprocessing step on the above dataset: perform outlier and missing data analysis towards building a refined dataset
Lab 3: Build machine learning model/s to predict the actual price of the new mobile based on other given features like RAM, Internal Memory etc
Lab 4: Calculate the prediction accuracy of the models used in Experiment 3 and do comparative analysis among them to identify the best technique.
Lab 5: Understanding "Second Hand Car Prediction Price" dataset by doing feature analysis. Data is available at: https://www.kaggle.com/datasets/sujithmandala/second-hand-car-price-prediction
Lab 6: Perform data preprocessing step on the above dataset: perform outlier and missing data analysis towards building a refined dataset.
Lab 7: Perform Feature Engineering towards building new feature which is more impactful. Build machine learning model/s to predict the price of the car based on other given features like Brand, Model, Year, Fuel
Type etc
Lab 8: Calculate the prediction accuracy of the models used in Experiment 7 and do comparative analysis among them to identify the best technique.
Lab 9: Plot the features (actual price and predicted price) in scatter plot to understand the variation.
Lab 10: Understanding "Marketing Campaign Positive Response Prediction" dataset by analysing all the features. Data is available at: https://www.kaggle.com/datasets/sujithmandala/marketing-
campaign-positive-response-prediction
Lab 11: Perform exploratory data analysis on the above dataset: perform outlier and missing data analysis towards building a refined dataset. Show the outliers in box plot or through some statistical
technique. Find the numerical and categorial features.
Lab 12: Perform Feature Engineering towards building new feature which is more impactful than the existing ones. Build the correlation matrix and show visually the relationship among various features.
Lab 13: Build machine learning model/s to predict the result of marketing campaign based on other given features like customer details, gender, annual income etc
Lab 14: Calculate the prediction accuracy of the models used in Experiment 13 and do comparative analysis among them to identify the best technique.
Lab 15: Find imbalanced classes, overfitting, and data bias in the above two datasets and apply some technique to overcome it.
31
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - - 10% 25% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 15% - - 25% 20% -
Level 4 Analyze 15% - - 30% 20% -
Level 5 Evaluate 20% - - 10% 10% -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan,SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja,SRMIST
3. Dr.R.Balaji Ganesh,SRMIST
4.Dr.R.Deebalakshmi,SRMIST
32
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC529T INFERENTIAL STATISTICS C PROFESSIONAL CORE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the role of statistics and its models in data analytics
CLR-2: get to know the probability and its application on data analysis
CLR-3: gain knowledge on sampling and hypothesis
CLR-4: implement the various hypothesis tests
CLR-5: know about independence, variance and statistical simulations
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: categorize various probably representation to understand the data. - 3 1
CO-2: use appropriate probability models in problem space 2 1 -
CO-3: collect/make sample data and choose hypothesis choices - 3 2
CO-4: apply/ perform hypothesis test to infer the insight of resultant data 1 - 2
CO-5: implement various statistical test to analyze the data 3 1 -
33
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
T9: Case study in Python using Estimation & Hypothesis Testing
Module-4 – Test of Mean and Proportion 9 Hour
Test of Mean - One sample Z Test - Test of Mean - One sample t-Test - Test of Mean – 2 samples - Independent and Dependent - 2 samples - Test of proportion - One sample (Z proportion test) – Two samples
(Z proportion test) - Case Study - Categorical vs Continuous –- More than 2 samples.
T10: Building programs to implement z-test and t-test in Python
T11: Building programs to implement one sample and two sample tests in Python
T12: Case study in Python
Module-5 - Hypothesis Testing 9 Hour
Hypothesis Testing – Analysis of Variance - One way ANOVA Two-way ANOVA, Categorical vs Categorical – Chi-Square, Test of the goodness of fit - Test of independence - Test of variance
T13: Building programs to implement the Chi-square test in Python
T14: Building programs to implement non-parametric tests in Python
T15: Case Study in Python
1. Kathryn A Szabat David M. Levine, P. K. Viswanathan, David Stephan (2017). 6. Hastie, T., Friedman, J., & Tisbshirani, R. (2018). The Elements of statistical learning: Data
Business Statistics: A First Course, 7th Edition mining, inference, and prediction. New York: Springer.
2. Haslwanter T. An introduction to statistics with python. With applications in the life 7. Grus, J. (2019). Data Science from Scratch, 2nd Edition. Place of publication not identified:
sciences. Switzerland: Springer International Publishing. 2016. O'Reilly Media, Inc.
Learning
3. Downey, A., & Green Tea Press. (2012). Think Bayes: Bayesian statistics made 8. 7. McKinney, W. (2018). Python for data analysis: Data wrangling with pandas, NumPy, and
Resources
simple. Needham, Massachusetts: Green Tea Press. IPython. O'Reilly Media, Inc.
4. Montgomery, D.C. and Runger, G.C. (2011). Applied Statistics and Probability for 9. Vanderplas, J. T. (2017). Python data science handbook: Essential tools for working with
Engineers, John Wiley & Sons, 5th Edition data. O'Reilly Media, Inc.
5. https://www.openintro.org/book/os/ 10. https://greenteapress.com/wp/think-stats-2e/
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 5% - 5% - 5% -
Level 6 Create 5% - 5% - 5% -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Abhinanda Sarkar, Academic Director, Great Learning. 1. Dr. Masilamani, IITDM, Kanchipuram 1. Dr. A. Shobanadevi, SRMIST
2. Dr Srabashi Basu, Senior Faculty, Great Learning 2. Dr. D. Hemavathi, SRMIST
34
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC530J CLOUD ARCHITECTURE AND DESIGN C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: review the fundamentals of cloud architecture
CLR-2: infer the technologies used with cloud platforms
CLR-3: discover the advanced cloud architecture and storage structures
CLR-4: classify the importance of cloud architecture design
CLR-5: examine virtualization architecture and future trends in cloud structures
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: persist the concept of basic cloud computing paradigms 3
CO-2: interpret the concepts of cloud service structures 2
CO-3: analyze the components of cloud computing and business agility in an organization 1
CO-4: relate with the market service providers in the cloud 2
CO-5: evaluate data center technologies and cloud architecture patterns 3
1. Gautam Shroff, “Enterprise Cloud Computing Technology Architecture Applications”, Cambridge 6. Klaus Schmidt, “High Availability and Disaster Recovery” Springer; edition [ISBN: 978-
University Press; 1 edition, [ISBN: 978-0521137355], 2010. 3540244608], 2006.
2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical Approach” 7. Kai Hwang, Geoffrey C. Fox, Jack G. Dongarra, "Distributed and Cloud Computing,
McGraw-Hill Osborne Media; 1 edition [ISBN:0071626948],2009 From Parallel Processing to the Internet of Things", Morgan Kaufmann Publishers,
Learning 3. 3Greg Schulz, “Cloud and Virtual Data Storage Networking”, Auerbach Publications [ISBN: 978- 2012.
Resources 1439851739],2011 8. Rittinghouse, John W., and James F. Ransome, ―Cloud Computing: Implementation,
4. EMC, “Information Storage and Management” Wiley; 2ndedition [ISBN: 978-0470294215], 2012. Management and Security, CRC Press, 2017.
5. Volker Herminghaus, Albrecht Scriba, “Storage Management in Data Centers” Springer; edition 9. Silvano Gai, Claudio DeSanti, “I/O Consolidation in the Data Center” Cisco Press;
[ISBN: 978- 3540850229], 2009 1stedition [ISBN: 9781587058882], 2009.
10. Bill wilder, Cloud Architecturepatterns,2012
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. PartheepanRudrapathi, CEO, KXE 1.Dr. V. Arulkumar, Associate Professor, SSN College of Engineering 1.Dr. M. Shobana, SRMIST
36
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC531J DATA CENTER NETWORKING C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: describe various data-centric Networking Concepts
CLR-2: gain knowledge of the data center architectures & network connectivity
CLR-3: articulate networking caching policies
CLR-4: understand the security issues in data-centric networks
CLR-5: learn the application of IoT in ICN
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: identify various data-centric networking concepts 3
CO-2: distinguish different data center architectures & core network connectivity issues 2
CO-3: design the caching policies in DCN 3
CO-4: protect the data-centric networks from different attacks 3
CO-5: make use of IoT and ML techniques in Data-centric networks for more efficient 2
37
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Zhi-Li Zhang, “Information Centric Networks (ICN), Nitul Dutta · Hiren Kumar Deva Sarma, 5. Silvano Gai, TommiSalli, RogerAndersson, “Cisco Unified Computing System”
Rajendrasinh Jadeja · Krishna Delvadia, Gheorghita Ghinea, Architecture & Current Trends,2021 CiscoPress; 1stedition, [ISBN: 9781587141935], 2010.
2. Mouricio Arregoces, “Data Centre Fundamentals”, CiscoPress,2003 6. Information Centric Networks: A New Paradigm for the Internet by Released May 2013
3. SilvanoGai, Claudio DeSanti, “I/O Consolidation in the Data Center” Cisco Press; 1st edition Publisher(s): Wiley ISBN: 9781848214491
Learning
[ISBN: 9781587058882], 2009. 7. RobertW.Kembel, Roger Cummings (Introduction), “The Fibre Channel Consultant”
Resources
4. Kevin Corbin, Ron Fuller, David Jansen, “NX-OS and Cisco Nexus Switching: Next-Generation Northwest Learning Assoc; 3rdedition, [ISBN: 0931836840], 1998.
Data Center Architectures” Cisco Press; 1 edition [ISBN: 9781587058929], 2010. 8. Robert W Kembal “Fiber Channel Switched Fabric” Northwest Learning Associates, inc.
[ISBN: 0931836719], 2009.
9. JohnL.Hufferd, “ISCSI”, Addison-WesleyBoston [ISBN: 978-0201784190], 2003.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. N. Vijaya Sankar Associate Tech Lead MST Solutions 1.Dr. Soundarrajan, Associate Professor, Department of Computer Science 1. Dr. V. Pandimurugan, SRMIST
and Engineering, Amrita Vishwa Vidyapeetham, Chennai
38
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC532J CLOUD SECURITY ESSENTIALS C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: identify the concept of cloud security
CLR-2: compute the issues related to virtualized infrastructure security
CLR-3: predict and gain knowledge on the various issues in cloud security
CLR-4: contrast the methods to improve virtualization security and technologies in security
CLR-5: design the cloud contracting model and case study of commercial cloud
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: demonstrate the main concepts of cloud security 3 1 2
CO-2: illustrate the architecture design of cloud storage 3 1 2
CO-3: classify the cloud security key management schemes 3 1 2
CO-4: categorize the types of attacks and phases of malware 3 1 2
CO-5: summarize the security design for cloud models 3 1 2
39
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Rittinghouse, John W., and James F. Ransome, ―Cloud Computing: 4. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing – A Practical Approach,
Implementation, Management and Security, CRC Press, 2017. Tata McGraw Hill, 2009.
Learning 2. Kai Hwang, Geoffrey C Fox, Jack G Dongarra, “Distributed and Cloud Computing, From Parallel 5. Tim Mather, Subra Kumaraswamy, ShahedLatif, “Cloud Security and Privacy: An Enterprise
Resources Processing to the Internet of Things”, Morgan Kaufmann Publishers, 2012. Perspective on Risks and Compliance” O'Reilly Media; 1stedition [ISBN: 0596802765], 2009.
3. Ronald L. Krutz, Russell Dean Vines, “Cloud Security” [ISBN: 0470589876], 2010. 6. George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in
the Cloud: Transactional Systems for EC2 and Beyond (Theory in Practice), O’Reilly, 2009
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40%)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. T. Madhan, Team Leader, Tata Consultancy Services, 1. Dr. S. Janakiraman, Associate Professor, Pondicherry University. 1. Dr. R. Naresh, SRMIST
Siruseri Campus, Chennai.
2. Mrs. K. Saranya, IT Analyst, Tata Consultancy Services, Siruseri 2. Dr. R. Shyamala, Associate Professor, Anna University College of 2. Dr. C.N.S. Vinoth Kumar, SRMIST
Campus, Chennai. Engineering, Tindivanam.
40
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC533J ADVANCED DATA PROCESSING TECHNIQUES C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the fundamental concepts of Big Data, including its characteristics, challenges, and solutions
CLR-2: learn how to use Hadoop and MapReduce to process and analyze large datasets
CLR-3: master Hive, Sqoop, and Apache Spark for scalable data warehousing, data integration, and real-time stream processing
CLR-4: gain expertise in Spark SQL and Spark Streaming for SQL-like queries and stream processing on Spark
CLR-5: learn how to use Cassandra for distributed NoSQL storage and retrieval
At the end of this course, learners will be able to: Programme Outcomes
Course Outcomes
(PO)
(CO):
1 2 3
CO-1: apply Hadoop and HDFS to architect and establish distributed data processing and analytical workflows for extensive datasets 2 2 3
CO-2: use Hive for data warehousing and analysis, combine YARN and Hive for efficient data processing, and manage resources with YARN 2 3 3
CO-3: implement Sqoop and Apache Spark to transfer and process large datasets. 2 3 3
CO-4: use Spark Streaming to process and analyze large datasets. 2 3 3
CO-5: learn and demonstrate how to integrate Cassandra with Apache Spark for large-scale data processing. 2 3 3
Module – 1 - Diving into Big Data: A Comprehensive Study of Hadoop, Spark, and Job Scheduling 15 Hour
Introduction to Hadoop and the Hadoop Ecosystem - Hadoop Distributed File System (HDFS) – MapReduce - Introduction to Apache Spark - Spark Programming Basics -Data Processing with Spark - Machine
Learning with Spark MLLib - Hadoop Mahout-Job Scheduling with Oozie. Laboratory session 1: Hadoop single node cluster Setup with Yarn, Laboratory session 2: Drug Data Processing using MapReduce.
Laboratory session 3: Dry Run Top 10 Hadoop Shell Commands.
Module – 2 - Unravelling Big Data: An In-depth Exploration of YARN and Hive 15 Hour
Introduction to YARN (Yet Another Resource Negotiator) - YARN Architecture - Resource Management with YARN - Job Scheduling with YARN - Introduction to Hive -Hive Architecture - Data Warehousing with
Hive - Hive Query Language (HQL) - Data Analysis with Hive. Laboratory session 4: Hive Partition and the Performance Testing, Laboratory session 5: Hive Storage Formats TextFile vs ORC vs RC, Laboratory
session 6: Hive UDF.
Module – 3 - Navigating Data Engineering: A Deep Dive into Sqoop, Spark, and SparkSQL 15 Hour
Introduction to Sqoop-Sqoop Architecture-Sqoop Commands and Basic Usage-Data Transfer with Sqoop-Introduction to Apache Spark-Spark Architecture-Data Processing with Spark-Introduction to SparkSQL-
Data Analysis with SparkSQL. Laboratory session 7: Data Migration from MYSQL to Hive with SQOOP, Laboratory session 8: SparkSQL Retail Data Processing to analyze the Sales, Laboratory session 9:
Spark RDD with drug data set and compare the complexity of the code with MapReduce.
Module- 4 - Mastering Real-Time Data Processing with Spark Streaming 15 Hour
Introduction to Spark Streaming - Spark Streaming Architecture-Data Processing with Spark Streaming. - Spark Streaming vs. Structured Streaming-Real-Time Data Analytics with Spark Streaming-Spark
Streaming and Machine Learning-Data Ingestion with Spark Streaming-Fault Tolerance in Spark Streaming-Spark Streaming and Kafka. Laboratory session 10: Kafka Producer and Consumer via Java API,
Laboratory session 11: Spark Streaming with word count via network, Laboratory session 12: END to END Real-time click event sales data analysis with Spark Streaming, KAFKA, and Cassandra (by building
a local website and hosting it on to Tomcat server).
Module – 5 - Exploring Apache Cassandra: From Fundamentals to Integration 15 Hour
41
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Introduction to Cassandra-Cassandra Architecture-Data Modelling in Cassandra-Cassandra Query Language (CQL)-Data Ingestion with Cassandra-Cassandra Functions Tuning and Optimization in Cassandra-
Fault Tolerance in Cassandra-Cassandra and Spark Integration. Laboratory session 13: Apache Cassandra Single Node Cluster Creation, Laboratory Session 14: Behind the scenes of Cassandra internal write
via practical, Laboratory Session 15: Connect Cassandra with Apache Zeppelin visualization tool.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. V. Govindasamy, Professor - IT
1.Mr Gowtham SB, Data Engineer | PayPal 1.Dr. S. Prabakeran, SRMIST
Puducherry Technological University
42
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC534J PYTHON FOR DATA SCIENCE C PROFESSIONAL CORE
Code Name Category 2 0 2 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: explore the fundamental concepts of Python
CLR-2: study the importance of Numpy, Pandas and DS libraries
CLR-3: analyze the Matplotlib for visualization
CLR-4: evaluate the data using regression and classification
CLR-5: design of engineering applications with unsupervised and advanced machine learning
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand the basics of python for data structures, and modules 3 2 3
CO-2: illustrate the standard modules of data science with hands-on in Anaconda 3 2 2
CO-3: apply visualization used for data science using Matplotlib 3 3 3
CO-4: design the models of data with regression and classification 3 2 2
CO-5: analyze machine learning libraries for unsupervised learning techniques 2 2 2
43
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Introduction to Linear Regression : Cost Functions - Gradient Descent - Python coding Simple - Overview of Scikit-Learn and Python - Residual Plots - Model Deployment and Coefficient Interpretation - Polynomial
Regression - Theory and Motivation - Creating Polynomial Features - Training and Evaluation - Bias Variance Trade-Off - Polynomial Regression - Choosing Degree of Polynomial - Model Deployment - Feature Scaling;
Introduction to Cross Validation : Regularization Data Setup - Ridge Regression Theory - Lasso Regression - Background and Implementation - Elastic Net - Feature Engineering and Data Preparation; Dealing with
Outliers - Dealing with Missing Data - Evaluation of Missing Data - Filling or Dropping data based on Rows - Fixing data based on Columns - Dealing with Categorical Data - Encoding Options - Cross Validation - Test
- Validation - Train Split - cross_val_score - cross validate - Grid Search; Linear Regression Project: The Logistic Function - Logistic Regression - Theory and Intuition; Linear to Logistic: Logistic Regression - Theory
and Intuition - Linear to Logistic Math; Logistic Regression : Theory and Intuition Logistic Regression Model Training - Classification Metrics - Confusion Matrix and Accuracy - Classification Metrics - Precison, Recall,
F1-Score - ROC Curves - Logistic Regression with Scikit-Learn - Performance Evaluation - Multi-Class Classification with Logistic Regression - Data and EDA – Model
Module-5 - Unsupervised and Machine Learning 6 Hour
Introduction to KNN Section: KNN Classification, KNN Coding with Python - Choosing K, KNN Classification Project Exercise; Introduction & history of Support Vector Machines- Hyperplanes and Margins, Kernel
Intuition, Kernel Trick and Mathematics; SVM with Scikit-Learn and Python – Classification, Regression Tasks; Introduction to Tree Based Methods- Decision Tree, Understanding Gini Impurity; Constructing Decision
Trees with Gini Impurity, Coding Decision Trees; Introduction to Random Forests-Key Hyperparameters, Number of Estimators and Features in Subsets, Bootstrapping and Out-of-Bag Error; Coding Classification with
Random Forest Classifier, Coding Regression with Random Forest Regressor, Advanced Models. Introduction to K-Means Clustering Section; K-Means Color Quantization; K-Means Clustering Exercise Overview,
Solution; Introduction to Hierarchical Clustering, Coding - Data and Visualization, Scikit-Learn; Introduction to Principal Component Analysis(PCA)-Manual Implementation in Python-SciKit-Learn.
Lab Exercises 30 Hour
Case Study 1: Present your view on the different techniques you have employed to do outlier analysis, handling missing data, feature engineering, feature importance and improving the
accuracy of the model both from a classifier as well as a regressor. Use any sample data and present your POV in a well-structured presentation.
Case Study 2: Present your findings on different activation functions you have used and methods to improve the accuracy of the model using neural networks. You should be able to clearly
articulate the advantage and disadvantage of each activation function. Use any sample data and present your POV in a well-structured presentation.
Case Study 3: Present your findings on different techniques of anomaly detection and k means clustering. Use any sample data and present your POV in a well-structured presentation
Case Study 4: Present your POV on how to generate synthetic data using GANs. You can assume a sample dataset from an IOT enabled machine where the failure rates are minimal.
Case Study 5: Present your POV on Style related GANS. Explore the earliest models to the current models. Articulate the successive improvements in the models. Also articulate the future
of GANs in generating realistic images.
Case Study 6: Present your POV on GANs used for Deep Fakes. Articulate how we can identify the Deep Fake from the original.
1. Alvaro Fuentes, Become a Python Data Analyst – By Packt Publishing (2018) 4.Jules S. Damji, Learning Spark: Lightning-Fast Data Analytics, Second Edition – By Shroff/O'Reilly
Learning 2. Bharti Motwani, Data Analytics using Python – By Wiley (2020) (2020).
Resources 3. Introduction to Machine Learning with Python by Andreas C. Müller and Sarah Guido(2016) 5. Matplotlib for Python Developers by Aldrin Yim, Claire Chung, and Allen Yu(2018)
6. Python Data Science Handbook by Jake VanderPlas(2016)
44
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - - 10% 25% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 20% - - 3% 20% -
Level 4 Analyze 20% - - 30% 20% -
Level 5 Evaluate 10% - - 10% 10% -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan ,SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja,SRMIST
3. Dr.R.Balaji Ganesh,SRMIST
4.Dr.R.Deebalakshmi,SRMIST
45
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC535J DEEP LEARNING FROM PRODUCTION TO DEPLOYMENT C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand basics of computer vision, time series analysis and natural language processing
CLR-2: implement an application for facial recognition system
CLR-3: comprehend and implement weather forecasting system
CLR-4: design a chatbot
46
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Lab Exercises 30 Hour
Lab 1: Take any large language model (say GPT 3.5) and try to execute some query through it. Create a small program where you can change the parameter values of Temperature, Top P and Max
Token and. identify how you can make your answer more deterministic?
Lab 2: Identify what are the basic metrices to evaluate your large language model response? (As example, toxicity, biasness etc). Write a short program where you can take model
response as input and calculate the score for the above metrices to understand output quality.
Lab 3: Write a program where you can perform keyword-based search. take any text file as input and provide "keyword" dynamically and see whether your algorithm can search it effectively.
Lab 4: Write a program where you take perform embedding based search. Take any vector database and use any embedding technique to search the answer of the query from the given
input text file where query and text files are the inputs of your program.
Lab 5: Take 2/3 medical reports (may be blood reports) and store them in a place. Write a program which can read all the files dynamically from the given locations. Please try to understand the metadata of the reports.
Lab 6: Create a set of questions for which you want to retrieve information from the medical reports through large language models. Save it in some database and keep in the excel file.
Lab 7: Individual queries from the documents where two inputs will be taken: set of medical reports prepared in Experiment 5 and questions prepared in Experiment 6.
Lab 8: Perform the evaluation based on RAG-triad (Context Relevance, Grounded Ness and Answer Relevance). Show the importance of "context" towards getting the optimized output.
Lab 9: Use Palm 2 (or any other LLM) to perform automation of software development tasks which includes code generation, code debugging and test case generation.
Lab 10: Use any diffusion model to generate images based on given prompt.
Lab 11: Apply zero shot, one shot and few shot prompting and show how performance is improved in few shot prompting.
Lab 12: Apply chain-of-thought (CoT) in prompting and see how output accuracy increases. Do a comparison between normal prompting and CoT based prompting from output performance perspective.
Lab 13: Take a foundation model, create an instruction based fine tuning dataset, apply instruction fine tuning on the base model.
Lab 14: Perform performance evaluation of the model response between foundation model and after fine tuning it.
Lab 15: Explore various task specific benchmark datasets and create a new one.
1. James D. Hamilton, Time Series Analysis – By Levant Books (2012) 4. V Kishore Ayyadevara & Yeshwanth Reddy, Modern Computer Vision with PyTorch -
2. Kubernetes Up & Running: Dive into the Future of Infrastructure by Kelsey Hightower, Brendan By Packt Publishing (2020)
Learning
Burns, and Joe Beda, 2019 (2nd edition) 5. Deep Learning for Computer Vision with Python by Adrian Rosebrock(2017)
Resources
3. Natural Language Processing with Python by Steven Bird, Ewan Klein, and Edward 6. Hands-On Machine Learning for Algorithmic Trading by Stefan Jansen(2020)
Loper(2009)
47
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan , SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja, SRMIST
3. Dr.R.Balaji Ganesh, SRMIST
4.Dr.R.Deebalakshmi, SRMIST
48
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC536J PRINCIPLES OF DATA ENGINEERING C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: classify various examples and use cases for each type of data format.
CLR-2: analyze the advantages and limitations of ETL and stream processing techniques.
CLR-3: evaluate data quality metrics to ensure data accuracy, completeness, and consistency.
CLR-4: design storage solutions for large-scale data sets using relational databases, NoSQL databases, and distributed file systems.
CLR-5: solve complex real-world data engineering challenges using best practices in data warehousing, big data analytics, and machine learning.
1. Charles M.Judd, Data Analysis: A Model Comparison Approach To Regression, ANOVA, 3. Data Engineering with Python by Paul Crickard Packt Publishing (2020)
Learning and Beyond 3rd Edition - By Routledge (2017) 4. Fundamentals of Data Engineering by Joe Reis and Matt Housley, O'Reilly Media(2022)
Resources 2. Pierre-Yves Bonnefoy, EmericChaize, RaphaëlMansuy& Mehdi TAZI, The Definitive Guide 5. Python Data Science Handbook by Jake VanderPlas, O'Reilly Media(2016)
to Data Integration 1st Edition - By Packt Publishing (2024). 6. Data Management for Researchers by Kristin Briney, Elsevier(2015)
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan, SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja, SRMIST
3. Dr.R.Balaji Ganesh, SRMIST
4.Dr.R.Deebalakshmi, SRMIST
50
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC546J Course UNDERSTANDING CYBER ATTACKS Course C PROFESSIONAL COURSE L T P C
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: learners should be aware of different types of attacks
CLR-2: develop ability to identify attack types
CLR-3: navigate different frameworks such as MITRE
CLR-4: explore dark web as a security professional
CLR-5: understand threat intelligence
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Aniket Amdekar General Manager, Cyber Defense 1.Mr.Ashok Kumar Mohan , Amrita University 1. Aniket Amdekar General Manager, Cyber Defense
Education, Great Learning Education, Great Learning
2. Ms. Chitra , SSN college of Engineering
52
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC547J Course DESIGNING SECURITY CONTROLS, GOVERNANCE AND Course C PROFESSIONAL CORE L T P C
Code Name COMPLIANCE Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the purpose of security controls
CLR-2: identify the categories of controls
CLR-3: learn about network security controls
CLR-4: learn about endpoint security controls
CLR-5: implementing monitoring controls
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Aniket Amdekar General Manager, Cyber Defense 1.Mr.Ashok Kumar Mohan , Amrita University 1. Aniket Amdekar General Manager, Cyber Defense
Education, Great Learning Education, Great Learning
2. Ms. Chitra , SSN college of Engineering
54
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC548J BLOCKCHAIN TECHNOLOGY WITH HYPERLEDGER C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: realize the blockchain in industry perspective
CLR-2: apply the concepts of Hyperledger fabric component designs
CLR-3: apply the Hyperledger trade network concepts in business networks
CLR-4: apply the concepts of smart contract transactions and ledger data structures
CLR-5: develop smart contracts for any use case
Programme Outcomes
Course Outcomes At the end of this course, learners will be able to: (PO)
(CO): 1 2 3
CO-1: comprehend the enterprise blockchain and the basics of Hyperledger fabric 3
CO-2: apply the concepts of hyper-edger fabric component designs 2
CO-3: apply the Hyperledger trade network concepts in business networks 1
CO-4: apply the concepts of smart contract transactions and ledger data structures 2
CO-5: build smart contracts for real-time use cases 3
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mrs. S. Gomathi Sankar, Technical Lead, LTI Mindtree 1. Dr. Soma Prathibha, Sri Sai Ram Engineering College, Chennai 1.Dr. A. Siva Kumar, SRMIST
56
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC549J FUNDAMENTALS OF BLOCKCHAIN C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the fundamentals of blockchain architecture
CLR-2: categorize cryptography techniques and blocks
CLR-3: illustrate the principles of consensus algorithms
CLR-4: articulate different attacks
CLR-5: relate hyper ledger and solidity in applications of blockchain
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: comprehend the knowledge of the fundamentals of blockchain 3
CO-2: interpret the ability to apply models and methods of classical cryptography 2
CO-3: utilize the principles of consensus mechanisms in real-time 1
CO-4: categorize the attacks and their impacts. 2
CO-5: appraise the blockchain principles in real-time applications 3
57
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Bikramaditya Singhal, Gautam Dhameja, Priyansu Sekhar Panda, “Beginning Blockchain”, 4. Mohammad Ayoub Khan, Mohammad Tabrez Quasim, Fahad Algarni, Abdullah Alharthi,
Apress, 2018. “Decentralised Internet of Things – A Blockchain Perspective, Springer 2020
Learning 2. Sandeep Kumar Panda, Ajay Kumar Jena, Santosh Kumar Swain, Suresh Chandra Satapathy, 5. Alessandro Parisi, “Securing Blockchain Networks like Ethereum and Hyperledger
Resources “Blockchain Technology: Applications and Challenges”, Springer Nature, 2021 Fabric”, Packt 2020.
3. Sachin S. Shetty, Charles A. Kamhoua, Laurent L. Njilla, “Blockchain for Distributed Systems 6. Shahid Shaikh, “Building Decentralized Blockchain Applications”, BPB.
Security”, IEEE PRESS WILEY, 2019. 7. Siraj Raval, “Decentralized Applications”, O’Reilly Media, 2016.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Kishore Kumar K, Senior Technical Consultant (Strategic 1.Dr. K. Suresh, Associate Professor, Department of Information 1.Dr. S. Srividhya, SRMIST
Accounts) ManageEngine (A Division of Zoho Corporation) Technology, Sri Venkateswara College of Engineering Sriperumbudur
58
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC550J Course DATABASE TECHNOLOGY Course C PROFESSIONAL CORE L T P C
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: conceive the database design process through ER Model and Relational Model
CLR-2: familiarize queries using Structure Query Language (SQL)
CLR-3: become acquainted with enhancing database design through normalization.
CLR-4: gain knowledge about failures and recovery
CLR-5: understand the concept of NOSQL Databases
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: exhibit knowledge on ER and Relational Modeling 3 - -
CO-2: devise appropriate queries using Structure Query Language (SQL) - 3 3
CO-3: design a normalized database 2 - -
CO-4: efficiently manage and execute transactions on a database. - - -
CO-5: develop a Web application using NOSQL 2 3 3
Learning 1. Ramez Elmasri and Shamkant B. Navathe, “Fundamentals of Database Systems”, 3. Raghu Ramakrishnan, Johannes Gehrke, “Database Management System”, McGraw Hill., 3rd
Resources Seventh Edition, Pearson, 2016. Edition, 2007.
2. Silberschatz, H. Korth and S. Sudarshan, “Database System Concepts”, 7th 4. Peter rob, Carlos Coronel, “Database Systems – Design, Implementation, and Management”,
Edition, McGraw-Hill International, 2020. 10th Edition, Thomson Learning, 2014.
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - 15% 15% -
Level 2 Understand 20% - - 20% 25% -
Level 3 Apply 20% - - 25% 30% -
Level 4 Analyze 20% - - 25% 30% -
Level 5 Evaluate 10% - - 10% - -
Level 6 Create 10% - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Jaya R, Faculty, Great Learning 1. Prof. H. Khanna Nehemiah, Anna University, Chennai 1. Dr. K. Vijaya, SRMIST
2. 2. Dr. C. Pretty Diana Cyril, SRMIST
60
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC551J Course ADVANCED DATA STRUCTURES AND ALGORITHMS Course C PROFESSIONAL CORE L T P C
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand advanced techniques of algorithmic analysis
CLR-2: analyse various self-balancing binary search trees and its applications
CLR-3: learn the various multidimensional search trees and its applications
CLR-4: apply advanced heap structures and disjoint-set to graph algorithms
CLR-5: understand the complexity classes of algorithms
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: compare the time complexity of various algorithms 3 - -
CO-2: design and analyse self-balancing binary search trees 3 - -
CO-3: apply various multidimensional search trees to searching and querying 3 - -
CO-4: apply heap and disjoint-set operations on various graph algorithms 3 - -
CO-5: demonstrate ability to prove that a problem is NP-complete 3 - -
61
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
List of Experiments (30 Hour):
Write a C / C++ program for the implementation of 2-3 Trees - Searching, Insertion and Deletion
Arrays and Structures B+ tree - Searching, Insertion and Deletion
Singly and Doubly Linked List Skew and Leftist Heaps – Insertion and Del-Min
Stacks and Queues using Linked Lists Dijkstra’s and Prim’s Algorithms using Heaps
Binary Search Tree using Linked Lists - Searching, Insertion and Deletion Treaps – Insertion and Deletion
AVL Trees – Insertion and Deletion Kruskal’s algorithm using Disjoint Set operations
Splay Trees – Insertion and Deletion
Learning 1.Thomas H Cormen, Charles E Leiserson, Ronald L Rivest, Clifford Stein, 5.Sahni Sartaj, "Data Structures, Algorithms and Applications in C++", Silicon
Resources “Introduction to Algorithms”, MIT Press, 2022. Press, 2013.
2. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C++”, Addison- 6.Motwani R, Raghavan P ,“Randomized Algorithms”, Cambridge University Press,
Wesley, 2014. 2014.
3.Michael T. Goodrich, Roberto Tamassia, David Mount, “Data Structures and 7.David P. Williamson, David B. Shmoys, “The design of approximation algorithms”,
Algorithms in C++”, John Wiley, 2016. Cambridge University Press, 2011.
4.Robert L Kruse, Clovis L Tondo, “Data Structures and Program design in C”,
Pearson, 2013.
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - 15% 15% -
Level 2 Understand 20% - - 20% 25% -
Level 3 Apply 20% - - 25% 30% -
Level 4 Analyze 20% - - 25% 30% -
Level 5 Evaluate 10% - - 10% - -
Level 6 Create 10% - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Mariappan Vaithilingam, Brahmarsive Inc, Bengaluru, 1. Prof. Venkatesh Raman, IMSc, Chennai. 1. Dr. Indhumathi Raman, SRMIST
2. Prof. N.S. Narayanaswamy, IIT Madras. 2. Dr. K. Vijaya, SRMIST
62
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC552J ADVANCED SOFTWARE ENGINEERING C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: learn about various software process models and project management activities.
CLR-2: understand the requirements engineering process and its specification models.
CLR-3: gain knowledge of the architectural styles and design patterns.
CLR-4: acquire the knowledge to create test cases utilizing various tools and techniques.
CLR-5: understand the various software measures and metrics.
Programme Outcomes
Course
At the end of this course, learners will be able to: (PO)
Outcomes (CO):
1 2 3
CO-1: identify and use appropriate process model for a given project. 2 2 -
CO-2: classify the user requirements and represent them using various specification models and UML diagrams. 2 3 -
CO-3: create the software design using architecture style and design patterns 1 - -
CO-4: develop test cases and test the software using automated testing tools. - 2 -
CO-5: evaluate processes and products against the applicable measures and metrics. - 3 3
5.Carlo Ghezzi, Mehdi Jazayeri, Dino Mandrioli, Fundamentals of Software Engineering, 2nd
1.Roger Pressman, Software Engineering: A Practitioner's Approach, 7th Edition, McGraw-Hill, 2010
edition, PHI Learning Pvt. Ltd., 2010.
2.Ian Sommerville, Software Engineering, 9th Edition, Addison-Wesley, 2010
Learning 6.Bernd Bruegge, Alan H Dutoit, Object-Oriented Software Engineering, 2nd edition, Pearson
3.Pankaj Jalote, A Concise Introduction to Software Engineering, Springer,2008
Resources Education, 2004.
4.William E. Lewis, “Software Testing and Continuous Quality Improvement”, Third Edition, Auerbach
7.Srinivasan Desikan and Gopalaswamy Ramesh, ―Software Testing – Principles and
Publications, 2008
Practices‖, Pearson Education, 2006
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100% 100% 100%
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Premanandh, Sutherland Global Services, 1. Prof. V. Vani, NIT Puducherry 1. Dr. B. Arthi, SRMIST
2. Prof. R. Vijaya Arjunan, Manipal Institute of Technology 2. Dr. C. Pretty Diana Cyril, SRMIST
64
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC553J Course FULL STACK DEVELOPMENT FRAMEWORKS Course C PROFESSIONAL CORE L T P C
Code Name Category 3 0 2 4
Course Outcomes At the end of this course, learners will be able to: Programme Outcomes
(CO): (PO)
1 2 3
CO-1: demonstrate knowledge of web development technologies 2 1 -
CO-2: develop interactive and dynamic web pages 3 - 2
CO-3: implement server-side operations for web applications. 2 - 3
CO-4: integrate front-end and back-end of applications 3 - 2
CO-5: design and deploy Application Programming Interfaces (APIs) - 3 2
65
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Lab 2: Designing a web page using CSS Lab 7: Build a responsive web application for shopping cart with registration, login, catalog and cart
Lab 3: Designing an interactive web page using JavaScript pages with Express server and Node.Js
Lab 4: Writing PHP program to familiarize with looping statements, associative arrays and functions Lab 8: Create Simple Restful API using Node.Js and project the data on your webpage
Lab 5: Developing a dynamic web page using PHP Lab 9: Write code for a simple user registration form for an event using Docker in DevOps.
Learning 1. Philip Ackermann, Full Stack Web Development - The Comprehensive Guide, Rheinwerk 5. Jack Chan, Ray Chung, & Jack Huang, Python API Development Fundamentals,
Resources Computing, 2023. Packt Publishing, 2019.
2. Paul Wellens, Practical Web Development, Packt Publishing, 2015. 6. Anthony Accomazzo, Ari Lerner, Nate Murray, Clay Allsopp, David Gutman, and Tyler
3. Sammie Smith, Full Stack Web Development Guide, Fullstack Publication, 2022. McGinnis, Fullstack React – The Complete Guide to ReactJs and Friends,
4. Chris Northwood, The Full Stack Developer, Apress Publications, 2018. Fullstack.io, 2017.
7. Len Bass, Ingo Weber and Liming Zhu,DevOps – A Software Architect’s Perspective,
Pearson Education, 2015.
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 30% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 5% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Atham Abdul Hameed,Senior Technical Manager, 1. Prof. Saira Banu Atham, Presidency University, Bangalore, 1. Dr. S. Poornima, SRMIST
Renault Nissan Technology Business Centre of India, Karnataka.
Chennai
66
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course C PROFESSIONAL CORE L T P C
21CSC554J APPLIED DATA SCIENCE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: construct different data structures and their packages in Python
CLR-2: analyze real-world datasets in different formats using Python libraries for exploratory data analysis
CLR-3: apply methods to collect, load, and store data effectively for better analysis and informed decision-making.
CLR-4: show different methods to clean and organize raw data effectively for better analysis and decision-making.
CLR-5: demonstrate different types of plots using matplotlib and seaborn to better understand and present data.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: apply and utilize various data structures in Python effectively. - 1 2
CO-2: implement real-world datasets using Python libraries for insightful exploratory data analysis. 1 2 -
CO-3: apply methods to collect, load, and store data efficiently for informed decision-making. - 2 1
CO-4: demonstrate techniques for cleaning and organizing raw data for improved analysis. 2 - 3
CO-5: describe different types of plots using matplotlib and seaborn for clear data representation and presentation. - 3 1
67
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
tables to understand the relationship between variables in the data with different aggregation-Crosstab to understand the relationship between variables in the data, Handling Missing Data, Data Transformation,
String Manipulation, Summarizing, Binning, classing and Standardization, outlier, Noise and Anomalies, Encoding Techniques, Choice of encoding
Lab 7: Perform group by, pivot and crosstab aggregation on the dataframes
Lab 8: Construct program to demonstrate Data Transformation and Summarizing, encoding for categorical data.
Lab 9: Implement a program to demonstrate Binning, Classing and Standardization
Module-4 – Time Series, Advanced Pandas and Numpy 15 Hour
Time Series: Date and Time Data Types and Tools, Time Series Basics, Data Ranges, Frequencies and Shifting, Time Zone Handling, Periods and Period Arithmetic, Resampling and Frequency Conversion,
Moving Window Functions
Advanced Pandas: Categorical Data, Advanced GroupBy Use, Techniques for Method Chaining
Advanced Numpy: Advanced Array Manipulation, Broadcasting, Structured and Record Arrays
Lab 10: Implement program to demonstrate Time Series Data
Lab 11: Demonstrate Advanced GroupBy
Lab 12: Construct program to demonstrate advanced array manipulation
Module-5 - Visualization 15 Hour
Customizing Plots: Introduction to Matplotlib, Plots, making subplots, controlling axes, Ticks, Labels & legends, annotations and Drawing on subplots, saving plots to files, matplotlib configuration using different
plot styles, Seaborn library.
Making sense of data through advanced visualization : Controlling line properties of chart, creating multiple plots, Scatter plot, Line plot, bar plot, Histogram, Box plot, Pair plot, playing with text, styling your plot, 3d
plot of surface
Lab 13: Building programs to visualize the dataframe in matplotlib and seaborn
Lab 14: Building programs to visualize the univariate, bivariate and multivariate relation
Lab 15: Case study with all the appropriate graphs to visualize the relationship in the data
1. Reema Thareja “Python Programming: Using Problem Solving approach, Second Edition,
Oxford University Press, India, 2023. 4. Davy Cielen, Arno D. B. Meysman, and Mohamed Ali, Introducing Data Science: Big data,
Learning
2. Grus, J. Data Science from Scratch, 2nd Edition. O'Reilly Media, Inc, 2019. machine learning, and more, using Python tools, Manning Publications, (2016),
Resources
3. McKinney, W.). Python for data analysis: Data wrangling with pandas, NumPy, and 5. Wes Mc Kinney, “Python for Data Analysis”, O'Reilly Media,2012.
IPython. O'Reilly Media, Inc. 2018.
68
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Formative Life Long Learning Summative
Bloom’s
CLA-1 Average of unit test CLA-2- Practice Final Examination (40% weightage)
Level of Thinking
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 25% 25% -
Level 3 Apply 30% - - 30% 30% -
Level 4 Analyze 30% - - 30% 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Snehith Allam Raju, Senior Manager Advanced Analytics 1.Dr. Evangelos E. Milios 1.Dr A V Kalpana, SRMIST
,Architecture and IoT · Envista Holdings Corporation, Hyderabad
2.Dr D Hemavathi, SRMIST
69
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course C PROFESSIONAL CORE L T P C
21CSC555J MACHINE LEARNING ALGORITHMS
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the human learning aspects.
CLR-2: acquaintance with primitives in the learning process by computer.
CLR-3: develop the linear learning models and classification in machine learning
CLR-4: implement the clustering techniques and their utilization in machine learning
CLR-5: implement the tree-based machine learning techniques and to appreciate their capability
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: demonstrate knowledge of learning algorithms and concept learning through implementation for sustainable solutions of applications. 1 2 2
CO-2: evaluation of different algorithms on well formulated problems along with stating valid conclusions that the evaluation supports. 2 3 3
CO-3: formulate a given problem within the Bayesian learning framework with focus on building lifelong learning ability. 3 3 3
analyze research-based problems using machine learning techniques and apply different clustering algorithms used in machine learning to generic datasets and
CO-4: 1 3 2
specific multidisciplinary domains.
CO-5: apply decision tree learning algorithms. 2 3 3
1. Géron, “Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow”, O'Reilly 5. Stephen Marsland, “Machine Learning: An Algorithmic Perspective, “Second Edition”, CRC
Media, Third Edition, 2022. Press, 2014.
2. Ethem Alpaydin, “Introduction to Machine Learning”, MIT Press, Fourth Edition, 2020. 6. Kevin P. Murphy,” Machine Learning: A Probabilistic Perspective”, MIT Press, 2012.
Learning 3. Tom Mitchell, "Machine Learning", McGraw-Hill, 1997. Sebastian Raschka, Vahid Mirji, 7. https://github.com/ageron/handson-ml3
Resources Python Machine Learning and deep learnin, 2nd edition, kindle book, 2018 8. https://www.kaggle.com/learn/intro-to-machine-learning
3. Carol Quadros,”Machine Learning with python, scikit-learn and Tensorflow”, Packet 9. https://docdrop.org/download_annotation_doc/AAAMLP-569to.pdf
Publishing, 2018. 10.http://14.139.161.31/OddSem-0822-1122/Hands-On_Machine_Learning_with_Scikit-Learn-
4. Gavin Hackeling,”Machine Learning with scikit-learn‖, Packet publishing”, O‘Reily, 2018. Keras-and-TensorFlow-2nd-Edition-Aurelien-Geron.pdf
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - 20% 20% -
Level 2 Understand 20% - - 20% 20% -
Level 3 Apply 30% - - 30% 30% -
Level 4 Analyze 30% - - 30% 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Balaji Haridoss LGSI,Chennai 1. Pao-Ann, Cheng Cheng University,Taiwan 1. Dr.G.Vadivu, , SRMIS
2. Dr.A.Shobanadevi, SRMIST
71
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC556J DATABASE SYSTEMS DESIGN: RELATIONAL AND NoSQL C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the fundamentals of Database Management Systems, Architecture, Language and Database design through Relational model
CLR-2: describe Database design through Relational model, Relational Algebra, Design Logical schema with constraints, Familiarize SQL Queries
CLR-3: apply Standard Database design through Normalization
CLR-4: build different kinds of real-world application using NoSQL
CLR-5: implement Transactional NoSQL Database
Programme Outcomes
Course Outcomes (PO)
At the end of this course, learners will be able to:
(CO):
1 2 3
CO-1: acquire knowledge on DBMS architecture, languages and Design of entire database - 1 3
CO-2: demonstrate Database design with SQL Queries 2 - 1
CO-3: formulate removal of anomalies using Normalization concepts 2 3 -
CO-4: analyze various real time applications of NoSQL 1 - 2
CO-5: implement Transactional NoSQL Database. - 1 3
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, Database System Concepts, 4. Raghurama Krishnan, Johannes Gehrke, Database Management Systems, 3rdEdition,
Seventh Edition, Tata McGraw Hill, 2019. McGrawHill Education, 2003.
Learning 2. Ramez Elmasri, Shamkant B. Navathe, Fundamentals of Database Systems Sixth 5. Sadalage, P. & Fowler, NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot
Resources Edition, Pearson Education, 2011. Persistence, Wiley Publications,1st Edition ,2019.
3. CJ Date, A Kannan, S Swamynathan, An Introduction to Database Systems, Eight 6. NoSQL Distilled, A brief guide to the emerging world of Polygot persistence, First
Edition, Pearson Education, 2006. Edition,Promod J,Sadalage Martin Fowler,2012.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - 20% 20% -
Level 2 Understand 20% - - 20% 20% -
Level 3 Apply 30% - - 30% 30% -
Level 4 Analyze 30% - - 30% 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. E Nagarajan, R&D Head, Solvedge Technology 1. Dr. Anandhakumar P, Professor, Madras Institute of Technology, 1. Dr. D Hemavathi , SRM IST
Chrompet
2. Mrs. S Sindhu , SRM IST
73
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC558J Course DEEP LEARNING APPROACHES Course C PROFESSIONAL CORE L T P C
Code Name Category 3 0 2 4
Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: learn the fundamental concepts of neural networks 3 - -
CO-2: recognize the significance of optimization, regularization and normalization techniques in neural networks - 3 -
CO-3: implement the Convolutional neural network and Recurrent Neural Networks 2 - 1
CO-4: learn about the Auto encoders, transformers and Generative networks - 1 3
CO-5: apply deep neural network architectures for language, text, speech, video and image processing - 2 2
74
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Lab 6: Building Programs for multi class computer vision problem using CNN, LSTM
Module-4 – Autoencoders, Transformers and Generative Networks 15 Hour
Auto Encoders and Decoders- introduction using auto encoders, educational auto encoders, regularized auto encoder, variational Auto encoders, denoising autoencoder, applications of auto
encoder, Generative Adverserial Networks (GAN), Transformers-attention mechanisms BERT.
Lab 7: Building Programs to create Autoencoders with Keras
Lab 8: Building Programs to create a denoising autoencoders, GAN
Module-5 - Deep Architectures for Heterogeneous Data Processing 15 Hour
GPT, auto regressive models, stability diffusion models, Vision and Language applications-Image captioning, Visual QA, Visual Dialog, Pixel RNNs, Cycle GANs, Progressive GAN, Stcak GAN,
Pix2Pix
Lab 9: implement stable diffusion model
Lab 10: Implement Image caption generation models, pre trained model
Learning 1. Chollet, F, “Deep learning with Python”, Manning Publication, 2019 4. J ason Brownlee, “Deep Learning with Python”,ebook,2016
Resources 2. Ian Goodfellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2017. 5. Seth Weidman Seth Weidman, “Deep Learning from Scratch: Building with Python from
3. Kevin P. Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012. First Principles”,Oreilly, 2019.
6. Antonio Gulli, “TensorFlow 1.x Deep Learning Cookbook,” Packt Publishing Limited,
2017.
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination (40% weightage)
CLA-1 Average of unit test CLA-2- Practice
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 25% 25% -
Level 3 Apply 30% - - 30% 30% -
Level 4 Analyze 30% - - 30% 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr.Sagarika, Senior Data Scientist, Great Learning 1.Dr. Anandhakumar P, Professor, Madras Institute of Technology, 1. Dr M Prakash, SRMIST
Chrompet
2. Dr. S. Sharanya, SRMIST
75
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC566J CYBER PHYSICAL SYSTEMS IN IoT C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: describe the practical aspects and possible vulnerabilities in cyber-physical systems.
CLR-2: introduce essential tools to implement CPS for the different application domains.
CLR-3: bridge the cyber-world of computing and communications with the physical world.
CLR-4: analyze real-world applications related to cyber-physical systems
CLR-5: apply cyber-physical system concepts to handle real-world security challenges
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: memorize the nature of cyber-physical systems in IoT 2 2 -
CO-2: apply the principles of cyber-physical systems 2 - 3
CO-3: address the security challenges and develop a secure application 3 - 2
CO-4: analyze existing cyber-physical systems. - 2 3
CO-5: design cyber-physical systems according to the requirements. 2 - 2
1. R. Alur, Principles of Cyber-Physical Systems, MIT Press, 2015. 4. Hongmei He, Carsten Maple, Tim Watson, Ashutosh Tiwari, Jorn Mehnen, Yaochu Jin and
2. Christopher Greer, Martin Burns, David Wollman, Edward Griffor, Cyber-Physical Bogdan Gabrys, The Security Challenges in the IoT enabled Cyber-Physical Systems and
Learning Systems and Internet of Things, NIST Special Publication 1900-202, Opportunities for Evolutionary Computing & Other Computational Intelligence, IEEE
Resources https://doi.org/10.6028/NIST.SP.1900-202. 2019. Congress on Evolutionary Computation
3. E. A. Lee and S. A. Seshia, Introduction to Embedded Systems: A Cyber- Physical 5. Marilyn Wolf and Dimitrios Serpanos, Safety and Security in Cyber-Physical Systems and
Systems Approach, LeeSeshia.org, 2011. Internet-of-Things Systems, Proceedings of the IEEE, 2018.
Learning Assessment
Continuous Learning Assessment (CLA)
Formative Life Long Learning Summative
Bloom’s
CLA-1 Average of unit test CLA-2- Practice Final Examination (40% weightage)
Level of Thinking
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Murali Sundaram, NPedia Technologies Pvt. Ltd., Technology
1. Dr. Elakiya, Assistant Professor, BITS Pillani - Dubai Campus 1. Dr. Vaishnavi Moorthy, SRMIST
consultant for Corporates - SMEs – Universities, Chennai
2. Dr. Mahalakshmi P, SRMIST
3. Dr. M. Thenmozhi, SRMIST
77
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC567J BIG DATA FRAMEWORKS AND MLOps C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the basics of Hadoop and related technologies to big data analytics and examine the ecosystem tools in Hadoop
CLR-2: provide with comprehensive Apache Spark knowledge for Big data processing
CLR-3: design and build applications with Apache airflow and Kafka
CLR-4: impart knowledge on ML pipelines for cloud-based ML-Model Deployments
CLR-5: understand about ML models deployment using optimized Kuberenetes workflows
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: apply MapReduce, HDFS and YARN develop big data applications 1
CO-2: develop Apache Spark applications 1 2
CO-3: comprehend the importance of Apache Airflow and Implement producer consumer application using Kafka 1 3
CO-4: apply transfer learning for ML Model deployment on cloud platforms 2
CO-5: build and maintain ML pipelines for cloud-based ML-Model Deployments and Deploy ML models using optimized Kuberenetes workflows 3
78
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
List of Experiments 30 Hour Lab 6: Building Data Pipelines with Apache Kafka Connect
Lab 1: Hadoop Shell commands Lab 7: Implementation of CI/CD workflows, model monitoring, and data engineering concepts relevant
Lab 2: Map reduce program for Word Count and with any excel dataset to production ML
Lab 3: Basic commands in Pig and Analyse any dataset using various operators in pig Lab 8: Implementation of Jenkins
Lab 4: Basic commands in Hive and Processing Data in Hadoop with Hive Lab 9: Implementation of Docker Containers
Lab 5: Exploring Spark SQL for Data Analysis Lab 10: Deploy ML models using optimized Kuberenetes workflows
1. Tom White ,Hadoop:The Definitive Guide, O'Reilly Media, Fourth Edition 2015. 7. Yaron Haviv, Noah Gift, Hands-On Implementing MLOps in the Enterprise, O'Reilly
2. Srini Panchkula , Big Data Processing with Apache Spark , Lulu, First Edition, Media, Inc., First Edition, 2023
2018 8. Noah Gift, Alfredo Deza, Practical MLOps: Operationalizing Machine Learning Models,
3. Brindha Priyadarshini Jeyaraman,Real-Time Streaming with Apache Kafka, O'Reilly Media, Inc. First Edition, 2021
Learning Spark and Storm, BPB Publishers, First Edition, 2021 9. Chip Huyen, Designing Machine Learning Systems: An Iterative Process for Production-
Resources 4. Jisha Mariam Jose, Hadoop Practice Guide-SQOOP, PIG, HIVE, HBASE for Ready Applications, O'Reilly Media, Inc., First Edition,2022
Beginners, Notion Press, First Edition, 2019 10. Andrew P. McMahan, Machine Learning Engineering with Python, Packt Publishers, First
5. Aurélien Géron, Hands-On Machine Learning with Scikit-Learn, Keras, and Edition, 2023
TensorFlow, O'Reilly Media, Inc, Second Edition, 2019
6. Mark Treveil, Introducing MLOps, O'Reilly Media Inc, First Edition, 2020
Learning Assessment
Continuous Learning Assessment (CLA)
Formative Life Long Learning Summative
Bloom’s
CLA-1 Average of unit test CLA-2- Practice Final Examination (40% weightage)
Level of Thinking
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - 15% 20% -
Level 2 Understand 20% - - 20% 20% -
Level 3 Apply 20% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate 5% - - 10% - -
Level 6 Create 5% - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr . N Mohanraj, Software Engineer 2, PayPal Inc., Dr. Joe Louis Paul, SSN College of Engineering 1. Dr.S.Sindhu, SRMIST
2. Dr. A. Shobanadevi, SRMIST
79
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC569J FUNDAMENTALS OF ARTIFICIAL INTELLIGENCE C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course At the end of this course, learners will be able to: Program Outcomes (PO)
Outcomes (CO): 1 2 3
CO-1: do the exploratory data analysis techniques in Python environment. 2 - -
CO-2: formulate and use appropriate data analysis and visualization techniques for their data 2 - -
CO-3: identify and design the suitable AI Agents and also Apply the basic search techniques for problem solving 2 2 -
CO-4: solve the constraint satisfaction problems with optimal decision. 2 2 -
CO-5: solve the AI problems by incorporating the optimal knowledge Representation and Reasoning techniques - - 3
1. Joel Grus,” Data Science from Scratch: First Principles with Python, Second 4. “A First Course in Artificial Intelligence”, Deepak Khemani, McGraw Hill
Edition.O’Reilly,2019 Education, 2013.
Learning 2. Charles R. Severance, "Python for Everybody Exploring Data Using Python", 5. Gerhard Weiss, ―Multi Agent Systems‖, Second Edition, MIT Press, 2013
Resources Charles Severance, 2016. 6. https://towardsai.net/p/machine-learning/large-language-models-and-gpt-4-
3. “Artificial Intelligence” E. Rich and K. Knight, Mc Graw Hill Publishers INC, 3rd architecture-and-openai-api
Edition 2017.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2- Practice
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - 15% 20% -
Level 2 Understand 20% - - 20% 20% -
Level 3 Apply 20% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate 5% - - 10% - -
Level 6 Create 5% - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.JagatheeswaranSenthilvelan, Managing Partner , ProtoHubs.io 1.Dr. Latha Parthiban, Pondicherry University 1. Dr.M. Karpagam, SRMIST
81
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC571J Course REINFORCEMENT LEARNING ALGORITHMS Course C PROFESSIONAL CORE L T P C
Code Name Category 3 0 2 4
82
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
On-policy Prediction with Approximation- Value-function Approximation, The Prediction Objective, Stochastic-gradient and Semi-gradient Methods, Linear Methods, Episodic Semi-gradient Control, Semi-
gradient n-step Sarsa, Lab 10- Episodic SARSA in mountain car, Off-policy Methods with Approximation- Semi-gradient Methods, Examples of Off-policy Divergence, Eligibility Traces- The -return, TD(),
Sarsa(), Policy Gradient Method- Policy Approximation and its Advantages, The Policy Gradient Theorem, REINFORCE: Monte Carlo Policy Gradient ,Lab 11- CartPolewith Monte-Carlo Policy Gradient,
REINFORCE with Baseline , Actor–Critic Methods, Lab 12-Implementation of Actor-Critic.
Module-5 Applications and Case Studies 15 Hour
TD-Gammon, Lab 13- Implementation of TD-Gammon, Samuel’s Checkers Player, Lab 14- Implementation of Samuel’s Checkers Player, Watson’s Daily-Double Wagering, Optimizing Memory Control,
Human-level Video Game Play, Mastering the Game of Go, Personalized Web Services, Thermal Soaring, Lab 15- Implementation of Personalized Web Services
Learning 1. Richard S. Sutton & Andrew G. Barto“Reinforcement Learning: An 4. CsabaSzepesvári, “Algorithms for Reinforcement Learning”, Morgan & Claypool,
Resources Introduction”,MIT Press; second edition,2018 2010.
2. Dimitri P. Bertsekas, “Reinforcement Learning and Optimal Control”, Athena 5. Boris Belousov, HanyAbdulsamad, Pascal Klink, Simone Parisi, Jan Peters,
Scientific, 2019 “Reinforcement Learning Algorithms: Analysis and Applications”, Springer, 2021
3. Maxim Lapan, “Deep Reinforcement Learning Hands-On”Packt Publishing, 2020
Learning Assessment
Continuous Learning Assessment (CLA
Formative Life Long*Learning Summative
Bloom’s CLA-I Average ofunit test CLA-II- Practice FinalExamination
Level of Thinking (45%) (15%) (40% weightage)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - - 15% 15% -
Level 2 Understand 25% - - 25% 20% -
Level 3 Apply 20% - - 20% 15% -
Level 4 Analyze 15% - - 20% 25% -
Level 5 Evaluate 15% - - 20% 25% -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. S. Smilin Sam, Principal Engineer, Athenahealth Pvt Ltd. 1.Dr. R. Gayathri, Professor, Sri Venkateswara College of 1.Dr.C. Sherin Shibi, SRMIST
Engineering, Sriperumbudur.
2.Dr. C. Lakshmi, SRMIST
83
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC572J APPLIED MALWARE ANALYSIS C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the fundamentals of static and dynamic analysis.
CLR-2: gain knowledge about running malware in virtual environment.
CLR-3: study about disassembly constructs and its structures.
CLR-4: study about new processors and file types using the IDA SDK
CLR-5: explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: gain knowledge about the different forms of malware. 1
CO-2: set up a safe virtual environment to analyze malware. 2
CO-3: navigate, comment, and modify disassembly. 2
CO-4: use code graphing to quickly make sense of cross references and function calls 1 3
CO-5: use IDA's built-in debugger to tackle hostile and obfuscated code. 2
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Bhawana Rudra Assistant Professor (Grade I) National 1.Dr.M.B.Mukesh Krishnan,SRMIST
1.Mr.Karthik Expert Member from k7 Computing
Institute of Technology, Warangal
2.Dr.V.Joseph Raymond,SRMIST
85
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC573J Course DATA ANALYSIS AND INTERPRETATION Course C PROFESSIONAL CORE L T P C
Code Name Category 3 0 2 4
Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: apply data analysis principles for data cleaning, transformation, and exploration using programming languages or tools like Python or R - 3 -
CO-2: master the functionalities of Tableau for creating interactive and informative data visualizations for various data types 1 - 3
CO-3: explain the challenges of interpreting complex machine learning models and the need for Explainable AI (XAI). 2 -
CO-4: implement XAI techniques like feature importance, SHAP values, and LIME to understand a model's decision-making process. 2 - 1
CO-5: utilize Tableau and XAI techniques to analyze and interpret a dataset, effectively communicating insights to a broad audience. - 2 2
86
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Lab 9: Case study
Module-4 – Introduction to Machine Learning and Model Interpretability 15 Hour
Understanding Machine learning algorithms and applications: Supervised, Unsupervised - Exploring Algorithms: Linear regression, Decision tree, Random forest , etc - Model Interpretation:
Complexity, challenges, Significance of model transparency, Need of Model explainability - Enhancing Model Interpretability: Explainable AI (XAI), Importance, AI driven decision making.
Lab 10 : Train a relatively simple model (like a decision tree or linear regression).
Labl 11: Apply feature importance techniques to understand which variables have the most impact.
Labl 12: Enhance model interpretability using Explainable AI
Module-5 - Advanced Explainable AI Techniques 15 Hour
Exploring Advanced Model Interpretation techniques: LIME, SHAP - Partial Dependence Plots: Analyzing, impact of individual features in model prediction - Counterfactual explanations of model
interpretability - Deeper dives into XAI libraries - Case Study
Lab 13: Demonstrate the use of LIME, SHAP
Labl 14: Partial Dependence Plots
Lab 15 :Case study
Learning 1. Ossama Embarak ,”Data Analysis and Visualization Using Python: Analyze Data to 5.Ryan Sleeper,” Practical Tableau: 100 Tips, Tutorials, and Strategies from a
Resource Create Visualizations for BI Systems” Apress; First Edition 2018. Tableau Zen Master”, O'Reilly Media pulication, 2018.
2. Suresh Kumar Mukhiya, Usman Ahmed , “Hands-On Exploratory Data Analysis with 6. Tegarden, D. P, ”Business Information Visualization”, Communications of the AIS,
Python”, Packt Publishing,2020 1(4): 1-38.1999.
3. Glenn J. Myatt,” Making Sense of Data”, Wiley publication, 2007. 7. Lurie, N.H. and C.H. Mason, V\isual Representation: Implications for Decision
4. McKinney, W,” Python for Data Analysis: Data Wrangling with Pandas, NumPy and making” Journal of Marketing, 71(1): 160-177. 2007.
IPython”, 2nd edition. O’Reilly Media,2017
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination (40% weightage)
CLA-1 Average of unit test CLA-2- Practice
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 25% 25% -
Level 3 Apply 30% - - 30% 30% -
Level 4 Analyze 30% - - 30% 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Gangeyan Ranganathan, Project Delivery Specialist Ii, 1.Dr Surendiran B, Associate Professor, National Institute of 1.Dr.P.Rajasekar, SRMIST
Deloitte Consulting Llp, Sacramento, California Technology, Puducherry
2. Dr K Sornalakshmi,SRMIST
87
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC574J Course BIG DATA ANALYTICS USING ARTIFICIAL INTELLIGENCE Course C PROFESSIONAL CORE L T P C
Code Name TECHNOLOGIES Category 3 0 2 4
88
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Introduction to Apache, Kafka-Cluster Architecture –Kafka messaging –components in messaging – creating and deleting kafkaTopic- Creating multiple brokers- Kafka producers- API for a kafka producers-
Producer implementation – Three ways to send kafka message- Kafka consumers – Consumer group- API for kafka Consumer-Consumer Implementation-Integration with Spark, Apache, Airflow- Directed
Acyclic Graph – CLI commands
Lab 10 : Znode demo
Lab 11 : Task scheduling using Airflow
Lab 12 : Orchestration demo with Airflow
Module -5 Ontology for Big Data 15 Hour
Human brain and Ontology, Ontology of information science, Ontology properties, Advantages of Ontologies, Components of Ontologies, The role Ontology plays in BigData, Ontology alignment, Goals
of Ontology in big data, Challenges with Ontology in Big Data, RDF – the universal data format, Using OWL, the Web Ontology Language, SPARQL query language, Building intelligent machines with
Ontologies, Ontology learning, Ontology learning process.
Case studies for Big data using artificial Intelligence Technologies
Learning 1. Anand Deshpande& Manish Kumar, Artificial Intelligence for Big Data,Packt 4.Raj Kamal and PreetiSaxena, Big Data Analytics: Introduction to Hadoop, Spark,
Resources Publishing, 2018. and Machine-Learning,McGraw Hill Education, 2019
2. Rinku Sharma Dixit &ShaileeLohmorChoudhary, Big Data Analytics Using Artificial 5.www.spark.apache.org
Intelligence Technologies Transforming Organizations, IK International Pvt. Ltd, 2021 6. www.splunk.com
3. Seema Acharya, Big Data and Analytics, Wiley, 2019 7. Databricks Documentation: https://docs.databricks.com/en/index.html
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination (40% weightage)
CLA-1 Average of unit test CLA-2- Practice
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - - 15% 15% -
Level 2 Understand 25% - - 25% 20% -
Level 3 Apply 20% - - 20% 15% -
Level 4 Analyze 15% - - 20% 25% -
Level 5 Evaluate 15% - - 20% 25% -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.KaustuvKunal, Principal Data scientist, Great Learning 1.Dr. R. Gayathri, Professor, Sri Venkateswara College of 1.Dr.G.Maragatham , SRMIST
Engineering, Sriperumbudur.
2.Mr. S. Smilin Sam, Principal Engineer, AthenahealthPvt Ltd. 2.Dr. C. SherinShibi, SRMIST
89
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
ACADEMIC CURRICULA
Regulations 2021
90
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21AIE532T SOFT COMPUTING AND ITS APPLICATIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: get familiar with fuzzy sets, fuzzy logic, fuzzy membership and fuzzification 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand fuzzy classification and pattern recognition
Design/development of
Communication
Environment &
Sustainability
CLR-5: understand swarm and colony based evolutionary computing techniques
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain knowledge on Fuzzy sets to recognize the appropriateness of computational task - 1 - 1 - - - - - - - - 2 - -
CO-2: design a fuzzy based soft computing system to address the computational task - - - 3 - 2 - - - - - - 2 - -
CO-3: apply a given computational task to solve it through neuro-fuzzy based hybrid model - 3 - - - 2 - - - - - - - - -
CO-4: acquire and apply Genetic Algorithm operations for solving a computational task - 3 - - - 2 - - - - - - - - -
apply soft computing system based on swarm and colony optimization to achieve a computational
CO-5: - 2 - 2 - - - - - - - - - - -
solution
91
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-5 – Optimization Techniques 9 Hour
Simulated annealing – particle swarm optimization: basic PSO parameters - local best, global best, velocity component, working principle of PSO– Travelling salesman problem optimization using PSO - Ant colony
optimization – Multi objective evolutionary algorithms – case study: Internet search techniques.
1. Ross, T. J., “Fuzzy logic with engineering applications,” John Wiley & Sons, Second Edition, 2017 7. Samir Roy and Udit Chakraborthy, “Introduction to Soft Computing: Neuro-Fuzzy
2. Charu C. Aggarwal, “Neural Networks and Deep Learning”, Springer, 2018. and Genetic Algorithms” Pearson Education, 2013.
3. S.N.Sivanandam, S.N.Deepa, “Priciples of Soft Computing”, 2nd Edition, John-Wiley India, 2011. 8. Marco Dorigo and Thomas Stützle, “Ant Colony Optimization”, MIT press, 2004.
Learning
4. A.E.Eiben and J.E.Smith, “Introduction to Evolutionary Computing”, Second edition, Springer, 2015. 9. Maurice Clerc, “Particle Swarm Optimization”, ISTE,2006
Resources
5. References 10. https://hal-enac.archives-ouvertes.fr/hal-01887543/document
6. Saroj koushik & Sunita Tiwari “Soft Computing, Fundamentals, Techniques and Applications” 1st
Edition, McGraw Hill Publication, 2018
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 20% - 20% - 20% -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.A.Vasanthi, Senior Consultant, Slalom · Sydney, New 1. Dr. B. Rajesh Kanna, Professor, VIT 1. Mr. S. Joseph James, SRMIST
South Wales, Australia
92
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21AIE536T ARTIFICIAL INTELLIGENCE ENGINES E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the fundamentals of Artificial Neural Networks and Linear Associative Networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: gain Knowledge on Hopfield Network, Boltzmann Machines
Design/development of
Communication
Environment &
Sustainability
CLR-5: learn Reinforcement Learning function
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: describe the features of Artificial Neural network and Linear Associative Networks 3 2 1 - - - - - - - - - 1 1 1
CO-2: understand the Perceptrons and Back propagation algorithms 3 2 2 - - - - - - - - - - 1 -
CO-3: apply AI techniques in Hopfield Networks and Boltzmann Machines 3 1 1 - - - - - - - - - 1 2 1
CO-4: articulate AI systems that are used in Convolutional Neural Networks and Autoencoder networks 3 1 2 - - - - - - - - - - 1 -
CO-5: understand the Reinforcement Learning function and Applications 3 2 1 - - - - - - - - - 1 1 1
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Kodainathan, Data Scientist Elpis IT solutions pvt Ltd 1. Dr. A. Menaka Pushpa, Assistant Professor (SG) SCOPE, VIT, 1. Dr.AR. Arunarani,, SRMIST,
Chennai Campus
94
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21AIE538T ARTIFICIAL INTELLIGENCE FOR INDUSTRIAL APPLICATIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: analyze the various characteristics of Intelligent agents 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the growth of AI Technology in Industry
Design/development of
Communication
Environment &
Sustainability
CLR-5: apply the concepts of AI to attain industrial automation and its application
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: use appropriate search algorithms for any AI problem - - - 3 3 - - - - 1 - 2 1 2 -
CO-2: identify appropriate AI methods and new opportunity spaces AI for industrial application - - - 2 2 - - - - 1 - 1 1 2 -
CO-3: understand the categories of Algorithm in Industrial AI - - - 2 2 - - - - 1 - 1 1 3 2
CO-4: understanding the assessment and capability to establish industrial AI - - - 2 2 - - - - 1 - 2 1 2 2
CO-5: understand the levels of automation and its application - - - 2 2 - - - - - - 2 1 2 -
95
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Elaine Rich, “Artificial Intelligence”, 2nd Edition, McGraw Hill, 2005 4. Anuradha Srinivasaraghavan, Vincy Joseph “Machine Learning”, Wiley, 2019
Learning 2. AI and Learning Systems - Industrial Applications and Future Directions, Konstantinos 5. Wolfgang Ertel,” Introduction to Artificial Intelligence”, Second Edition, Springer, 2017.
Resources Kyprianidis and Erik Dahlquist, published in London, United Kingdom, 2021. 6. Rajiv Chopra, “Deep Learning”, 1st edition, Khanna Publishing House, 2018.
3. Industrial AI – Application with sustainable performance, Jay Lee, Springer Publication, 2020.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 20% -
Level 2 Understand 15% - 10% - 20% -
Level 3 Apply 30% - 35% - 20% -
Level 4 Analyze 30% - 25% - 20% -
Level 5 Evaluate 10% - 20% - 20% -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Naveen Baskaran, ADP Solution Chennai 1. Dr.P.SivaKumar, VIT Chennai 1. Dr.S.Nagendra Prabhu, SRMIST
2. Dr.Senthil, NHCE Bangalore
96
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21AIE541T MULTIMODAL MACHINE LEARNING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: provide the basic understanding of multimodal data and its importance in various fields 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: various representations used in multimodal machine learning using different models
Design/development of
Communication
Environment &
Sustainability
CLR-5: importance of multimodal deep learning and behavior generations functions
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: outline the critical elements of multimodal data and models 3 3 3 - - - - - - - - - 1 - -
CO-2: illustrate different kinds of unimodal and multimodal representations 3 2 2 - - - - - - - - - - 2 -
CO-3: demonstrate multimodal translation and mapping 3 2 2 - - - - - - - - - 1 - -
CO-4: classify machine learning techniques and frameworks of multimodal applications in real time scenario 3 2 2 - - - - - - - - - - - -
CO-5: analyze various multimodal fusion and behavior generation for multimodal applications 3 2 2 - - - - - - - - - 1 - 2
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sanjay Hotwani, Senior Manager – Data Science, 1. Dr. Tulasi Prasad Sariki, Associate Professor, VIT, Chennai, 1. Dr.T.Subha, SRMIST
Products &Technology, PwC US tulasiprasad.sariki@vit.ac.in
98
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE519T GEOSPATIAL DATA ANALYSIS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understanding concept of geospatial analysis.
CLR-2: acquire comprehensive exploration of common geospatial data formats.
CLR-3: develop various aspects of data access in geospatial analysis.
CLR-4: implement range of essential geospatial analysis and visualization.
CLR-5: implement advanced geospatial modeling techniques.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: demonstrate knowledge of Geospatial analysis. 2 2 -
CO-2: analyze Geospatial data using vector and raster data. 1 - 2
CO-3: explore Geospatial technologies GDAL, OGR and Desktop tools. - 1 2
CO-4: analyze Geographic Information Systems using shapefiles, visualization and Geocoding 2 - 3
CO-5: implement Geospatial modeling using NDVI and LiDAR. - 3 1
Learning 1. Lawhead J. Learning geospatial analysis with Python. Packt Publishing Ltd; 2015 Dec 31.
3. Diener M. Python Geospatial Analysis Cookbook. Packt Publishing Ltd; 2015 Nov 30.
Resources 2. McClain BP. Python for Geospatial Data Analysis. " O'Reilly Media, Inc."; 2022 Oct 19.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 5% - 5% - 5% -
Level 6 Create 5% - 5% - 5% -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Balaji Haridoss LGSI 1.Pao-Ann, Taiwan 1. Dr.M.Lakshmi, SRMIST
2. Dr Srabashi Basu, Senior Faculty, GreatLearning 2.Dr.V.Vijayalakshmi, SRMIST
100
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE521T ADVANCED ALGORITHMS ANALYSIS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the fundamentals of algorithms and its complexity 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: analyse algorithm design strategies
Design/development of
Communication
Environment &
Sustainability
CLR-5: utilize the search algorithms
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: develop algorithms and analyze its complexity 3 - - - - - - - - - - - - - -
CO-2: utilize appropriate design strategies - 3 - - - - - - - - - - - - -
CO-3: implement the graph and network algorithms - - 3 - - - - - - - - - - - -
CO-4: design and analysis of paradigms for sequential and parallel models - - 3 - - - - - - - - - - - -
CO-5: implement search algorithms - - 3 - - - - - - - - - - - -
101
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-4 - Parallel and Distributed Algorithms 9 Hour
Parallel and Distributed Algorithms - Introduction to Parallel Algorithms and Architectures - Parallel Design Strategies - Internet Algorithms -Distributed Computation Algorithms - Distributed Network Algorithms.
T 10: Implementation of Parallel algorithms
T 11: Implementation of Internet algorithms
T 12: Implementation of Distributed Network Algorithms
Unit-5 - Search Algorithms 9 Hour
String Matching and Document Processing - Balanced Search Trees - The Fast Fourier Transform - Heuristic Search Strategies: A* - Search and Game Trees 24 - Probabilistic and Randomized Algorithms - Lower-
Bound Theory - NP-Complete Problems - Approximation Algorithms – case study on bin packing, Dock management system.
T 13: Implementation of String-Matching Algorithms
T 14: Implementation of Randomized algorithms
T 15: Case study for NP Complete Problem
1. Kenneth A. Berman, Jerome L. Paul, “Algorithms: Sequential, Parallel, and Distributed”, 4. Michael Goodrich, Roberto Tamassia, “Algorithm Design” Wiley Student Edition
Amazon Bestsellers, 2004. 5. Horowitz, Sahni, Mehta: Fundamentals of Data Structures in C++, 2nd edition, University
Learning 2. Russ Miller, Laurence Boxer, “Algorithms Sequential and Parallel: A Unified Approach”, Press, 2007
Resources Prentice Hall, 1 edition, 1999.
3. Dimitri P. Bertsekas and John N. Tsitsiklis, “Parallel and Distributed Computation: Numerical
Methods”, Prentice Hall, 1989.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Radha R, SRMIST
102
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE522T FUNCTIONAL PROGRAMMING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the purpose of functional programming paradigm and Scala basic constructs 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: comprehend the different types of functions in scala
Design/development of
Communication
Environment &
Sustainability
CLR-5: explore the functors, monads, and monoids
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify and apply the appropriate construct in functional programming - - - - - - - - - - - - 2 - -
CO-2: construct programs using different types of functions - - - - - - - - - - - - - 2 -
CO-3: create programs using traits and mixins - - - - - - - - - - - - - 1 -
CO-4: construct programs using lists and different types of collections - - - - - - - - - - - - - - 1
CO-5: create programs using functors, monads, and monoids - - - - - - - - - - - - 2 - -
103
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-4 – Data Structures 9 Hour
Lists definitions and usage - Working with Lists - Constructing Lists - Basic operations on lists - head, tail, isEmpty demo - List Patterns - Lists First Order methods - Lists Higher Order methods - Sequences Overview
and operations - Tuples Overview and operations - Sets and Maps – Lists and Collections
T7: Lists and basic operations in lists
T8: Tuples and Collections
Unit-5 – Applicative Development 9 Hour
Functors Purpose and Use - Writing a simple functor - Functor Laws - Applicatives Concepts and use - Defining an applicative - Demo of Applicatives - Monads - Defining Monads - Monad Laws - Demo of Monads
and Monad Laws - Monoid Concept, Purpose, and Use - Examples of Monoid
T9: Applicatives development
T10: Traversable functors development
Learning 1. Chiusano.P,Bjarnason R,Functional Programming in Scala,Manning Publications,2015 3. Hortsmann, C., Scala for the Impatient, 2nd ed., Addison-Wesley, 2016.
Resources 2. Oderskey M, SpoonL, Venners B, Programming in Scala, Third edition. 4. Raychaudhuri R, Scala in Action, 1st ed. Manning Publications, 2013.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. K. Sornalakshmi, SRMIST
104
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE523T DATA ENGINEERING PRINCIPLES FOR ENTERPRISES E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: distinguish various examples and use cases for each type of data formats.
CLR-2: critique the benefits and limitations of ETL versus stream processing techniques.
CLR-3: measure data quality metrics to assess accuracy, completeness, and consistency.
CLR-4: construct effective storage solutions for large-scale data sets using relational databases, NoSQL databases, and distributed file systems.
CLR-5: formulate strategies for addressing complex real-world data engineering challenges through best practices in data warehousing, big data analytics, and machine learning.
105
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Charles M.Judd, Data Analysis: A Model Comparison Approach To Regression, ANOVA,
and Beyond 3rd Edition - By Routledge (2017) 4. Fundamentals of Data Engineering by Joe Reis and Matt Housley, O'Reilly Media(2022)
Learning
2. Pierre-Yves Bonnefoy, EmericChaize, RaphaëlMansuy& Mehdi TAZI, The Definitive Guide 5. Python Data Science Handbook by Jake VanderPlas, O'Reilly Media(2016)
Resources
to Data Integration 1st Edition - By Packt Publishing (2024). 6. Data Management for Researchers by Kristin Briney, Elsevier(2015)
3. Data Engineering with Python by Paul Crickard Packt Publishing (2020)
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
2. 1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras, sryedida@iitm.ac.in 1. Dr.R.Jagadeesh Kannan, SRMIST
2. Prof. K.C. Sivakumar, IIT Madras, kcskumar@iitm.ac.in 2.. Dr.S.Kanaga Suba Raja, SRMIST
3. Dr.R.Balaji Ganesh, SRMIST
4.Dr.R.Deebalakshmi, SRMIST
106
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE524T COMPUTER VISION TECHNIQUES E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
recognize and describe both the theoretical and practical aspects of computing with images.connect Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
issues from computer vision to human vision
describe the foundation of image formation and image analysis, Understand the basics of 2D and 3D
Design/development of
become familiar with the major technical approaches involved in computer vision, describe various
Communication
CLR-5: build computer vision applications
solutions
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand computer vision including fundamentals of image formation - - - - - - - - - - - - 2 - -
CO-2: learn about image formation - - - - - - - - - - - - - - 2
CO-3: apply image processing techniques - - - - - - - - - - - - 1 - 1
CO-4: calibrate computational photography - - - - - - - - - - - - - 1 -
CO-5: learn about Image rendering - - - - - - - - - - - - - - 1
107
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-3 – Image Processing Techniques 9 Hour
Active contours - Snakes -Dynamic snakes and Condensation - Scissors, Level Sets - Split and merge - Mean shift and mode finding - Normalized cuts - Graph cuts and energy-based methods - 2D and 3D feature-
based alignment - Pose estimation
T5: Obtain an implementation of Canny’s edge detector
T6: Implement a Hough transform based line finder
Unit-4 – Computational Photography 9 Hour
Triangulation - Two-frame structure from motion - Projective reconstruction - Self-calibration - Perspective and projective factorization - Bundle adjustment - Exploiting sparsity - Constrained structure and motion -
Hierarchical motion estimation - Fourier-based alignment - Incremental refinement
T7: Count lines with an HT line finder. How well does it work?
T8: Implement a mean shift segmenter.
Unit-5 – Image Rendering 9 Hour
Motion models - Planar perspective motion - Rotational panoramas - Gap closing - Cylindrical and spherical coordinates - Bundle adjustment - Parallax removal - Recognizing panoramas – Compositing
T9: Case Study
T10: Case Study
1. RichardSzeliski,"Computer Vision: Algorithms and Applications”, Springer, 2010. 4. Rafael C. GonzaLez'"Digital Image Processing”, Pearson Education; Fourth edition (2018)
Learning 2. Forsyth/Ponce,"ComputerVision: AModernApproach”, PearsonEducationIndia;2edition (2015)
Resources 3. S. Nagabhushana,"Computer Vision and Image Processing”, NewAge International Pvt Ltd;
First edition (2005)
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. N. Mohanraj, Software Engineer 2, Pay Pal Inc, Chennai 1. Dr. A.P.Shanthi , CEG Campus Anna University 1. Dr.T.Veeramakali, SRMIST
108
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE526T END – END DEEP LEARNING FOR PRODUCTION E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand basics of computer vision, time series analysis and natural language processing
CLR-2: implement an application for facial recognition system
CLR-3: comprehend and implement weather forecasting system
CLR-4: acquire knowledge on various chatbot frameworks
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand the fundamentals of deep learning and its applications in computer vision, time series analysis and natural language processing. 1 3 3
CO-2: build a facial recognition system. 3 2 3
CO-3: build a weather forecasting system. 3 2 3
CO-4: earn various chatbot frameworks and implement 3 3 2
109
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. James D. Hamilton, Time Series Analysis – By Levant Books (2012)
4. V Kishore Ayyadevara & Yeshwanth Reddy, Modern Computer Vision with PyTorch - By Packt
2. Kubernetes Up & Running: Dive into the Future of Infrastructure by Kelsey
Learning Publishing (2020)
Hightower, Brendan Burns, and Joe Beda, 2019 (2nd edition)
Resources 5. Deep Learning for Computer Vision with Python by Adrian Rosebrock(2017)
3. Natural Language Processing with Python by Steven Bird, Ewan Klein, and Edward
6. Hands-On Machine Learning for Algorithmic Trading by Stefan Jansen(2020)
Loper(2009)
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. 1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras, sryedida@iitm.ac.in 1. Dr.R.Jagadeesh Kannan, SRMIST
2. Prof. K.C. Sivakumar, IIT Madras, kcskumar@iitm.ac.in 2.. Dr.S.Kanaga Suba Raja, SRMIST
110
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE527T TEXT MINING AND ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the fundamentals of text mining 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: utilize text for prediction techniques
Design/development of
Communication
Environment &
Sustainability
CLR-5: analyze different case studies related to text mining
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire knowledge on fundamentals of text mining - - - - - - - - - - - - 1 - -
CO-2: perform prediction from text and evaluate it - - - - - - - - - - - - - 2 -
CO-3: perform document matching - - - - - - - - - - - - - 2 -
CO-4: identify patterns and entities from text - - - - - - - - - - - - - 2 -
CO-5: understand how text mining is implemented - - - - - - - - - - - - - - 1
111
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-3 - Information Retrieval for Text Mining 9 Hour
Linear scoring Methods-Evaluation of Performance-Estimating current and future performance-Getting the most from a Learning Method-Errors and Pitfalls in Big data Evaluation-Graph models for social Networks-
Information Retrieval and Text Mining-Keyword Search-Nearest- Neighbor Methods-Measuring Similarity-Shared Word Count-Word count and Bonus-Cosine Similarity-Web based Document Search-Link Analysis-
Document Matching-Inverted List-Evaluation of Performance
T7- Assigning Scores using Linear Scoring method,
T8 - Finding Cosine Similarity of Given Text
T9 – Web Based Document Search
Unit-4 - Finding Structure in Document Collection 9 Hour
Clustering Documents by similarity-Similarity of composite documents-K-means Clustering-Hierarchical Clustering-The EM Algorithm-Goals for Information Extraction-Finding Patterns and Entities from Test-Entity
Extraction as Sequential Tagging-Tag Prediction as Classification-The maximum Entropy method-Linguistic Features and Encoding-Local Sequence Prediction Models-Global sequence Prediction Models-Reference
and relationship Extraction-Template Filling And Database Construction-Commercial Extraction System: Application-Criminal Justice : Application-Intelligence Application
T10- Implementing K-means Clustering
T11- EM Algorithm implementation
T12 – Template Filling and Database Construction practice
Unit-5 - Case Studies 9 Hour
Ideal Model of Data-Practical Data Sourcing-Prototypical Examples-Hybrid Example-Mixed Data in Standard Table Format-Case study: Market Intelligence from the web-Case Study: Lightweight Document Matching
for Digital Libraries-Generating Model cases for Help desk Application: case study-Assigning topics to news articles: Case study-E-mail Filtering: Case study-Search Engines : case study Extracting Named Entities
from Documents-Mining Social Media-Customized Newspapers-Emerging Directions-Different ways of collecting samples-Learning to-Unlabeled data-Distributed Text Mining
T13- Case study Analysis for Search Engines
T14- Hybrid Exercise Practice
T15- social media – Data customized
1. By Sholom M. Weiss, Nitin Indurkhya, Tong Zhang.,Fundamentals of Predictive Text Mining 2010 3. Springer- ISBN:9781849962261, 184996226X
Learning
2. Text Mining Classification, Clustering, and Applications,By Ashok N. Srivastava, Mehran
Resources
Sahami,2009
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms.Sabna Sulamain,Nokia 1. Dr.M.Venkatestan, IITM 1. Dr.A.Murugan,SRMIST
112
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE531T CYBER SECURITY OPERATIONS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic security operations 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquire knowledge in assessing security operation capabilities
Design/development of
Communication
Environment &
Sustainability
CLR-5: understand the types of events and Incidents
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the knowledge of security technologies - 2 - - - - 2 - - - - - - - -
CO-2: analyze the security operation capabilities - - - - - - - - - 3 - 3 - - -
CO-3: evaluate the security Events Generation - 2 - - - - - - - - - 3 - - 3
CO-4: analyze the preparing to operate - - - - - - 2 - - 3 - - - - 3
CO-5: evaluate the Events and Incidents - 2 - - - - - - - - - 3 - - -
1. Joseph Muniz, Gary McIntyre, Security Operations Center, Cisco press 2015 3. Russel C Hibler, Engineering Mechanics: Statics, Dynamics, Pearson,14th ed., 2015
Learning
2. John Rittinghouse PhD CISM Captain, William M. Hancock PhD CISSP CISM, Digital 4. Robert H. Deatherage, Jr., Security Operations an Introduction to planning and Conductive Private
Resources
Press, 2003 Security Details for High-Risk Areas
113
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sankaranarayanan, Security Analyst, Philips 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr. J. Godwin Ponsam, SRMIST
114
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE532T NETWORK MANAGEMENT AND PROTOCOLS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: determine the various type of Networks and the Network Management basics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: exploring the Network Management Standards
Design/development of
Communication
Environment &
Sustainability
CLR-5: analyze the Network Management Applications
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: produce knowledge on networks and network management - 3 - - - - - - - - - - - - -
CO-2: gain knowledge on various standards - - - - 3 - - - - - - - - - 3
CO-3: analyze the working of SNMP protocol and its various applications - - - - - - - - - - 3 - - - 3
CO-4: apply the network management tools and gather information from the network - 3 - - 3 - - - - - - - - - -
CO-5: apply the knowledge to create an efficient network - - - - 3 - - - - - 3 - - - -
115
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Mani Subramanian ―Network Management Principles and Practice‖, Second Edition, 3. Greg Tomsho, Ed Tittel, David Johnson, ―Guide to Network Essentials, Fifth Edition, Cengage
Learning Pearson Publication, 2012. Learning, 2010
Resources 2. Dinesh Chandra Verma―Principles of Computer Systems and Network Management, 4. Teresa C. Piliouras, Network Design Management and Technical Perspectives, Second
Springer,2009 Edition,2004
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Srinivasan Varadarajan, Manhattan Associates, Atlanta 1. Dr. I.Joe Louis Paul, Associate Professor, SSN College of 1. Dr S. Metilda Florence, SRMIST
Engineering, TamilNadu
2. Mr. Shiva Praveen, American Express, USA 2. Dr. B. Vinayaga Sundaram, Associate Professor, Madras Institute of
Technology, Chennai
116
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE533T FIREWALLS AND ACCESS CONTROLS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
understanding why port-based firewalls have become obsolete & addressing the data leakage problem, Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
device sprawl
CLR-2: recognizing the security and business benefits of next-generation firewalls
Design/development of
Communication
Environment &
Sustainability
CLR-5: examining the Challenges in a Global Access Controls Strategy
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understanding accessibility tactics and examining the shortcomings of intrusion prevention - - - - - - 2 - - - - - - - -
comparing performance between next-generation and legacy firewall architectures and knowing what
CO-2: - - - - - - - - - 3 - - - - 3
features to look for in a next-generation firewall
configuring Advanced Global Protect Features, Centralizing logs, and setting up site-to-site VPNs and
CO-3: - - - - - - 2 - - - - - - - 3
Large-Scale VPNs.
understanding SELinux Decisions and Logging and Defining users that have sufficient rights to do their
CO-4: - - - - - - 2 - - 3 - - - - -
jobs, ranging from unprivileged users to fully privileged users, running almost without SELinux protection
CO-5: understanding the Security Matrix and Developing a Directory-Based Access Control Strategy - - - - - - 2 - - - - - - - -
117
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-5 - Security Controls 9 Hour
Simplifying the Security Matrix - Understanding Identification - Understanding Authentication - Understanding Authorization - Understanding Access Control - Examining Directory Services - Understanding LDAPv3
- Understanding the Meta-Directory - Revisiting Security Policy Domains- Examining the Challenges in a Global Access - Exploring a Future with Global Access Controls-Understanding Standard Data-Related
Access Rights.
1. Lawrence C. Miller - Next-Generation Firewalls for Dummies Wiley Publishing, ISBN 3. Sven Vermeulen - SELinux System Administration_ A Comprehensive Guide to Walk You Through
978-0-470-93955-0 SELinux Access Controls-Packt Publishing (2013)
Learning
2. Tom Piens - Securing Remote Access in Palo Alto Networks_ Practical techniques to 4. Dennis C Brewer - Security controls for Sarbanes-Oxley section 404 IT compliance _ authorization,
Resources
enable and protect remote users, improve your security posture, and troubleshoot next- authentication, and access-Wiley Pub (2006)
generation firewalls-Packt Publication
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. S. Sajiv, Technical Leader, CISCO 1. Dr. A. Balaji, School of Computing Science and Engineering 1. Dr. S. Prabakeran, SRMIST
(SCSE), VIT Bhopal University
2. Mr. Varun Subramanian, QA Automation Tester, Likewize
118
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE534T NETWORK PROGRAMMING AND MANAGEMENT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: explore different socket function and implement client server applications using sockets 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: analyze various application program like TELNET, DNS, DHCP
Design/development of
Communication
Environment &
Sustainability
CLR-5: explore SNMPv1, v2 and v3 protocols and practical issues
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: define elementary socket functions - 3 - - - - - - - - - - - - -
CO-2: implement client –server applications using Sockets - - - - - - - - - - - 2 - - 3
CO-3: create Thread and Raw Socket - 3 - - - - - - - - - - - - 3
CO-4: implement Macros for including Objects In MIB Structure - 3 - - - - - - - - - - - - 3
CO-5: determine SNMPv1, v2 and v3 protocols and practical issues - - - - - - - - - - - 2 - - 3
1. W. Richard Stevens, “UNIX Network Programming Vol-I”, Third Edition, PHI Pearson 3. D... E. Comer, “Internetworking with TCP/IP Vol- III: Client-Server Programming and
Learning Education, 2003. Application BSD Sockets Version”, Second Edition, Pearson Edition, 2003.
Resources 2. William Stallings, “SNMP, SNMPv2, SNMPv3 and RMON 1 and 2”, Third Edition, Pearson 4. Behrouz A.Forouzan , ― TCP/IP protocol suite‖, 4th edition, Mc Graw Hill education private
Edition, 2009. limited,2010
119
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Srinivasan Varadarajan, Manhattan Associates, Atlanta 1. Dr. I.Joe Louis Paul, Associate Professor, SSN College of 1. Dr S. Metilda Florence, SRMIST
Engineering, TamilNadu
2. Mr. Shiva Praveen, American Express, USA 2. Dr. B. Vinayaga Sundaram, Associate Professor, Madras Institute of
Technology, Chennai
120
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE535T NETWORK INTRUSIONS AND COMPUTER FORENSICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic of forensic investigation and its procedure 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the packet capturing and Analysis
Design/development of
Communication
Environment &
Sustainability
CLR-5: understand the types of scanning
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the knowledge forensic investigation 2 - - - - - - - - - - - - - -
CO-2: implement packet capturing and analysis - 2 - - - - - - - - - - - - 3
CO-3: evaluate the different types of logs 2 2 - - - - - - - - - - - - 3
CO-4: analyze the intrusion detection system - 2 - - - - - - - - - - - - -
CO-5: test using scanning technique 2 - - - - - - - - - - - - - -
1. Network Forensics, Ric Messier, Wiley, ISBN: 978‐1‐119‐32828‐5, August 2017 3. Computer Forensics: Investigating Network Intrusions and Cyber Crime, EC‐Council.
Learning
2. Network Attacks and Exploitation: A Framework, Matthew Monte, Wiley, 2015 4. Network Forensics: Tracking Hackers through Cyberspace, Sherri Davidoff and Jonathan Ham,
Resources
Prentice Hall, 2015
121
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sankaranarayanan, Security Analyst, Philips 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr. J. Godwin Ponsam, SRMIST
122
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE536T MOBILE FORENSICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the challenges of mobile forensics and the process model on mobile device forensics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquire in-depth knowledge about smartphone acquisition and acquisition methods
Design/development of
Communication
Environment &
Sustainability
CLR-5: explore the types of evidence available on iOS, Android, Windows, and BlackBerry mobile devices
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the mobile forensics process model on mobile device forensics - - 2 - - - - - - - - - - - -
CO-2: plan and prepare the knowledge about smartphone acquisition and acquisition methods - - - - - - - 2 - - - - - - -
CO-3: acquire the knowledge on handling iOS devices - - 2 - - - - - - - - - - - 3
CO-4: utilize the concepts of Android model, file system, and its security features - - 2 - - - - - - - - - - - 3
demonstrate the ability to accurately document using Android Forensics, Windows Phone Forensics and
CO-5: - - - - - - - 2 - - - - - - -
BlackBerry Forensics
123
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-4 – Android Model 9 Hour
Android Forensic Setup and Pre Data Extraction Techniques – The Android model – Android security – Android file system -Extended File System – Android Software Development Kit – Android Debug Bridge -Lab
10: How to View Last Activity of Your PC- Accessing the device using adb – Handling an Android device – Screen lock bypassing techniques – Smudge attack – Lab 11: Comparison of two Files for forensics
investigation by Compare IT software – Gaining root access – Rooting an Android device – Imaging an Android Phone – Data extraction techniques – Lab 12: Live Forensics Case Investigation using Autopsy-
Android Data Recovery Techniques
Unit-5 – BlackBerry OS 9 Hour
Analysis and Overview of Forensic Tools on Android App,Windows Phone & Blackberry – Reverse engineering Android apps – Forensic tools overview – Windows Phone OS – Lab 13: windows phone acquisition
& analysis – Windows chambers – Windows Phone file system – Extracting the data – Lab 14 : BlackBerry Investigation – BlackBerry OS – Security features -Data acquisition – Creating a BlackBerry backup –
BlackBerry analysis – BlackBerry forensic image analysis – Forensic tools for BlackBerry analysis – Lab 15: Acquiring and Analyzing a BlackBerry device
1. Satish Bommisetty, Rohit Tamma, Heather Mahalik, Practical Mobile Forensics – 3. Mobile Forensics: Advanced Investigative Strategies, Oleg Afonin, Vladimir Katalov, Packt Publishing.
Learning
2014 Packt Publishing. 4. Lee Reiber, Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and
Resources
2. Soufiane Tahiri, Mastering Mobile Forensics, Packt Publishing. Presentation, Second Edition, 2nd Edition,McGraw-Hill
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sankaranarayanan, Security Analyst, Philips 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr.M.Jeyaselvi, SRMIST
2. Dr. Raju Abraham, NIOT, Chennai 2. Mr. Joseph Raymond V, SRMIST
124
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE537T DIGITAL FORENSICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the history and purpose of digital forensics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquire in-depth knowledge about workings of computer hardware and the operating systems
Design/development of
Communication
Environment &
Sustainability
CLR-5: explore the knowledge in rich resources of digital evidence
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the digital forensics process model - - - - 2 - - - - - - - - - -
CO-2: plan and prepare the knowledge about Hardware and Software Environments - - - - - - 2 - - - - - - - -
CO-3: acquire the knowledge on digital Forensic Tools - - - - 2 - 2 - - - - - - - 3
CO-4: apply the Digital Evidence in Windows OS - - - - 2 - - - - - - - - - 3
CO-5: demonstrate the ability to accurately document using rich resources of digital evidence - - - - 2 - 2 - - - - - - - -
125
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Practical Digital Forensics – Richard Boddington [PACKT] Publication, Open-source 3. Nelson, B, Phillips, a, Enfinger, F, Stuart, C., “Guide to Computer Forensics and Investigations,
Learning community 2nd ed., Thomson Course Technology, 2006, ISBN: 0-619-21706-5.
Resources 2. Warren G. Kruse II and Jay G. Heiser, “Computer Forensics: Incident Response 4. Vacca, J, Computer Forensics, Computer Crime Scene Investigation, 2nd Ed, Charles River
Essentials”, Addison Wesley, 2002. Media, 2005, ISBN: 1-58450-389.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sankaranarayanan, Security Analyst, Philips 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr.M.Jeyaselvi, SRMIST
2. Dr. Raju Abraham, NIOT, Chennai 2. Mr. Joseph Raymond V, SRMIST
126
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE538T SECURITY SCRIPTING AND ANALYSIS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: gain mastery in scripting application 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: practice computer network security scripting and packet analysis automation
Design/development of
Communication
Environment &
Sustainability
CLR-5: analyze and expertise over the tool wireshark scripting
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: experience on scripting programming for network security - - 2 - - - - 2 - - - - - - -
CO-2: acquire knowledge on developing web servers and clients - - 2 - - - - - - - - - - - 3
CO-3: develop their own packet capturing and analyzing tools - - 2 - - - - 2 - - - - - - 3
CO-4: develop source code vulnerability detecting scripts - - 2 - - - - 2 - - - - - - -
CO-5: perform exploit analysis tools and network security analysis using packet capturing tools - - 2 - - - - - - - - - - - -
127
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-4 – Computer Network Exploit Scripting and Vulnerability Analysis 9 Hour
Exploit Development techniques-introduction, Types of exploit development techniques, Immunity Debuggers and Libs, Attaching and detaching process, Writing plugins for Immunity debugger, Malware sample
analysis, Advanced exploitation techniques, Writing payloads for exploitation, Buffer overflow attack, Example with immunity debugger, Pyhook introduction, Examples for pyhook key loggers, Source code
vulnerability –introduction, Source code vulnerability analysis, Static source code vulnerability detection –scripting, Example scripts for static detection, dynamic source code vulnerability detection-scripting, Example
methods for dynamic detection.
Unit-5 – Computer Network Packet Analysis Scripting 9 Hour
Wireshark- introduction, Capturing methodologies, Capture filters, Display filters, Searching for packets using the Find dialog, Create new Wireshark profiles, Usage of Graphs, IO,TCP,Flow Graphs, Inspection of
Application Layer protocols, DNS,FTP, HTTP, SMTP, Colourcoding, Creation of colouringrules, Analyzing Transport Layer Protocol, TCP-UDP, Analyzing packets for security tasks, Security analysis methodology,
Scans and sweeps, ARP ICMP TCP UDP
1. Mike Dawson, More Python programming for Absolute Beginner, CengageLearning 3. Mastering Wireshark, PACKT Publishing, By Charit Mishra, March 2016
Learning PTR; 3rd edition, ISBN-10: 1435455002, ISBN-13: 978-14354550092, 2010. 4. James H.Baxter, Wireshark essentials, 2014
Resources 2. The Web Application Hacker’s Handbook, 2nd Edition, Wiley Publication, 5. TJ. O’Connor, Violent Python A Cookbook for Hackers, Forensic Analysts, Penetration Testers,
DafyddStuttard, Marcus Pinto and Security Engineers (2013), Elsevier
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sankaranarayanan, Security Analyst, Philips 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr.P.Savaridassan, SRMIST
2. Dr. Raju Abraham, NIOT, Chennai
128
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE539T PRINCIPLES OF SECURE CODING PRINCIPLES E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: discover the need for secure coding and proactive development process 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: demonstrate secure coding practices
Design/development of
Communication
Environment &
Sustainability
CLR-5: incorporate fundamental principles of software security engineering
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the knowledge on secured software development and life cycle process - - 2 - - - - - - - - - - - -
CO-2: design secure software by incorporating security principles and mitigation strategies - - 2 - 2 - - - - - - - - - -
CO-3: analyze vulnerable code in implemented software and describe attack consequences - - 2 - 2 - - - - - - - - - 3
CO-4: apply mitigation and implementation practices to construct attack resistant web applications - - 2 - 2 - - - - - - - - - 3
CO-5: apply secure design principles for developing attack resistant software applications - - 2 - - - - - - - - - - - 3
129
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Michael Howard, David LeBlanc, “Writing Secure Code”, Microsoft Press, 2nd Edition, 2003. 4. David A. Wheeler, “Secure Programming for Linux and Unix HOWTO”
Learning 2. Robert C. Seacord, “Secure Coding in C and C++”, Pearson Education, 2nd edition, 2013. 5. Bryan Sullivan, Vincent Liu, “Web Application Security – A Beginner’s Guide”
Resources 3. Julia H. Allen, Sean J. Barnum, Robert J. Ellison, Gary McGraw, Nancy R. Mead, “Software 6. Ron Ben Natan, “Implementing Database Security and Auditing: A guide for DBAs,
Security Engineering: A guide for Project Managers”, Addison-Wesley Professional, 2008. Information security administrators and auditors”, Published by Elsevier Inc., 2005
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Praveen Kumar, Team Lead, Cognizant Technology Solutions. 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr. Savaridassan.P, SRM IST
2. Dr. Raju Abraham, NIOT, Chennai 2. Mr. Joseph Raymond V, SRM IST
130
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE540T ANDROID SECURITY AND DESIGN INTERNALS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the Android Security Model 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: develop the android security design and architecture
Design/development of
Communication
Environment &
Sustainability
CLR-5: demonstrate Network Security and PKI, Enterprise Security and Device Security
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the Android Security Model 2 2 - 2 - - - - - - - - - - -
CO-2: develop the android security design and architecture 2 2 - - - - - - - - - - - - -
CO-3: explore Android attacks and hacking methods - 2 - 2 - - - - - - - - - - 3
CO-4: understand the User Space Software and Return Oriented Programming - 2 - 2 - - - - - - - - - - 3
CO-5: demonstrate Network Security and PKI, Enterprise Security and Device Security 2 - - 2 - - - - - - - - - - -
131
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-5 - Network Security and PKI 9 Hour
Cryptographic Providers - JCA Provider Architecture, JCA Engine Classes, Android JCA Providers, Using a Custom Provider. Network Security and PKI - PKI and SSL Overview, JSSE Introduction, Android JSSE
Implementation. Credential Storage - VPN and Wi-Fi EAP Credentials, Credential Storage Implementation, Public APIs. Online Account Management - Android Account Management Overview, Account Management
Implementation, Google Accounts Support. Enterprise Security – Device Administration, VPN Support, Wi-Fi EAP. Device Security - Controlling OS Boot-Up and Installation, Verified Boot, Disk Encryption, Screen
Security, Secure USB Debugging, Android Backup.
1. Android Security Internals – An In-depth Guide To Android’s Security Architecture, 4. Android Security: Attacks and Defenses, Anmol Misra, Abhishek Dubey, CRC Press, ISBN
by Nikolay Elenkov, No Starch Press 9780367380182
Learning 2. Android™ Hacker’s Handbook, Joshua J. Drake, Pau Oliva Fora, Zach Lanier, Collin 5. Android Security Cookbook, Keith Makan , Scott Alexander-Bown, December 2013, ISBN:
Resources Mulline, Stephen A. Ridley, Georg Wicherski, Welly, ISBN: 978-1-118-60864-7 9781782167167
3. Android Security (and Not) Internals, Yury Zhauniarovich, June 2014 6. Android Application Security Essentials, Pragati Ogal Rai, Packt Publishing (21 August 2013), ISBN:
978-1849515603
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. N. Arun, Senior Software Engineer, Quick Heal 1. Dr. Vigneshwaran P, SRMIST
132
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course PROBABILISTIC GRAPHICAL MODELS: PRINCIPLES AND Course L T P C
21CSE541T E PROFESSIONAL ELECTIVE
Code Name TECHNIQUES Category 3 0 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline the ideas of probabilistic model used in probability theory, statistics, and machine learning 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate directed and undirected graphical models
Design/development of
Communication
Environment &
Sustainability
CLR-5: learn about different learning algorithms
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the fundamentals of probability theory 1 - - - - - - - - - - - 1 - -
CO-2: learn the directed and undirected graphical models with example algorithms 2 - - - - - - - - - - - - - 2
CO-3: understand the Inference in exact, approximate Inference with algorithms - - - 2 - - - - - - - - - - 2
CO-4: analyze the Inference in MAP and Temporal Inference with algorithms - - - 2 - - - - - - - - - - 2
CO-5: design different learning algorithms in graphical models - - - 3 - - - - - - - - - - 3
133
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Koller, D. and Friedman, N. (2009). Probabilistic Graphical Models: Principles and Techniques. 4. Barber, D. (2011). Bayesian Reasoning and Machine Learning. Cambridge University
MIT Press. Press, 1st edition.
Learning 2. Jensen, F. V. and Nielsen, T. D. (2002). Bayesian Networks and Decision Graphs. Information 5. Wainwright, M. and Jordan, M. (2008). Graphical Models, Exponential Families, and
Resources Science and Statistics. Springer, 2nd edition. Variational Inference. Foundations and Trends in Machine Learning, 1:1–305.
3. Kevin P. Murphy (2013) Machine Learning: A Probabilistic Perspective. 4th Printing. MIT Press. 6. David Bellot (2016) Learning Probabilistic Graphical Models in R
7. Kiran R Karkera, (2014) Building Probabilistic Graphical Models with Python
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 40% - 40% -
Level 2 Understand 40% - 40% - 30% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze - - - - 10% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mrs.Savitha Boomiperumal, Technical Lead, 1. Dr.Anusha K, Associate Professor, 1. Dr.Sumathy G, SRMIST
Accenture Technology Solutions, Portugal, Europe School of Computing, VIT Chennai.
134
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE542T DEEP GENERATIVE MODELS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basics of generative models and deep learning architectures 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the significance of autoregressive and flow-based models
Design/development of
Communication
Environment &
Sustainability
CLR-5: explore deep GAN models for various multimedia applications
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain the knowledge on basic units of generative models and their types - 1 - - - - - - - - - - - - -
CO-2: implement autoregressive models and flow-based models with continuous and discrete random variables - 2 - 3 - - - - - - - - - - -
CO-3: learn the latent variable models and variational encoders - 3 - 3 - - - - - - - - - - 2
CO-4: develop the hybrid model and energy-based models for different applications - 3 - 3 - - - - - - - - - - 2
CO-5: apply various case studies that adapt deep GAN models - 2 - 3 - - - - 3 - - - - - 3
135
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. David Foster, Generative Deep Learning, Teaching Machines to Paint, Write, Compose, and 4. Roozbeh Razavi-Far, Ariel Ruiz-Garcia, Vasile Palade, Juergen Schmidhuber,
Play, O'Reilly Media, Inc., 2019, ISBN: 9781492041948 Generative Adversarial Learning: Architectures and Applications, (2022), Springer Cham
Learning 2. Jakub M. Tomczak, Deep Generative Modeling, Springer nature, Edition 1, 2022, ISBN - 978- 5. Jakub M. Tomczak, Deep Generative Modeling, Springer, 2022, 978-3-030-93158-2
Resources 3-030-93157-5
3. Kailash Ahirwar, Generative Adversarial Networks Projects, build next-generation generative
models using TensorFlow and Keras, pakt publisher, 2019. ISBN: 978-1789136678
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 30% - 30% -
Level 2 Understand 30% - 30% - 30% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 10% - 10% - 10% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100% 100% 100%
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mrs.Kavita Ganeshan Artificial Intelligence Principal - AI Products and 1. Dr. S. Chandrakala, Professor, 1. Dr. A. Robert Singh, SRMIST
Solutions, Accenture, Mumbai, India School of Computing, Sastra Deemed to be University, Thanjavur
136
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course BRAIN MACHINE INTERFACE: SCIENCE, TECHNOLOGY AND Course L T P C
21CSE543T E PROFESSIONAL ELECTIVE
Code Name APPLICATION Category 3 0 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic concepts of brain computer/machine interface 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: study the various signal acquisition methods of Brain Machine/Computer Interface
Design/development of
Communication
Environment &
Sustainability
CLR-5: learn the various applications of Brain Machine/Computer Interface
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: summarize the Brain Machine /Computer Interface 2 1 - 2 - - - - - - - - 1 - -
CO-2: assess concept of BCI 2 1 - 2 - - - - - - - - - 1 -
CO-3: assign functions appropriately to the human and to the machine 3 1 - 2 - - - - - - - - 1 - -
CO-4: choose appropriate feature extraction methods 2 1 - 3 - - - - - - - - - 1 -
CO-5: apply machine learning algorithms for translation 3 2 - 3 - - - - - - - - - - 3
137
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Rajesh.P.N.Rao, “Brain-Computer Interfacing: An Introduction”, Cambridge University Press, First 5. Ali Bashashati, MehrdadFatourechi, Rabab K Ward, Gary E Birch,” A survey of signal
edition, 2019. Processing algorithms in brain–computer interfaces based on electrical brain signals”
2. Jonathan Wolpaw, Elizabeth Winter Wolpaw, “Brain Computer Interfaces: Principles and practice”, Journal of Neural Engineering, Vol.4, 2007, PP.32-57.
Learning Oxford University Press, USA, Edition 1, January 2012. 6. Arnon Kohen, “Biomedical Signal Processing”, Vol I and II, CRC Press Inc, Boca
Resources 3. Ella Hassianien, A &Azar.A.T (Editors), “Brain-Computer Interfaces Current Trends and Rato, Florida.Bishop C.M., “Neural networks for Pattern Recognition”, Oxford,
Applications”, Springer, 2015. Clarendon Press, 1995.
4. Bernhard Graimann, Brendan Allison, GertPfurtscheller, "Brain-Computer Interfaces: 7. Andrew Webb, “Statistical Pattern Recognition”, Wiley International, Second Edition,
Revolutionizing Human-Computer Interaction", Springer, 2010 2002.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 30% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.M.Prakash Team Lead(Associate Consultant) , 1. Dr.V Haribaabu Associate Faculty in Entrepreneurship Development 1. Dr.M.Uma, SRMIST
Virtusa ,Chennai Institute of India Gandhi Nagar, Gujarat.
138
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE548T SPATIAL AND TEMPORAL COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline the ideas of traditional relational data and spatial data 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate the basics of spatial databases
Design/development of
Communication
Environment &
Sustainability
CLR-5: learn about different Application programming Interfaces
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: illustrate the concepts of traditional relational data and spatial data - 2 - - - - - - - - - - - - -
CO-2: learn the spatial databases - 2 2 - - - - - - - - - - 1 -
CO-3: understand the spatial data models - 2 - - - - - - - - - - - 1 -
CO-4: analyze Spatio-Temporal computing Techniques - - 2 - 2 - - - - - - - - 2 -
CO-5: analyze various Application programming Interfaces - 2 - - 2 - - - - - - - - - 2
139
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Christopher K. Wikle, Andrew Zammit-Mangion, Noel Cressie, Spatio Temporal 3. Narayan Panigrahi, Computing in Geographic Information Systems, CRC press, 2014.
Statistics with R, CRC Press, 2019. 4. Shashi Shekhar and Sanjay Chawla “Spatial Databases: A Tour “Pearson.
Learning
1. Philippe Rigaux, Michel Scholl, Agnes Voisard, “Spatial Databases with Applications to 5. Evangelos Petroutsos, Google Maps: Power Tools for maximizing the API, McGraw-Hill, 2014.
Resources
GIS”, Morgan Kaufman, 2002. 6. Noel Cressie, Christopher K. Wikle, Statistics for Spatio-Temporal data, Wiley, 2015.
2. Shashi Shekhar, Pamela Vold, Spatial Computing, The MIT Press, 2020.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 40% - 40% -
Level 2 Understand 40% - 40% - 30% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze - - - - 10% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mrs.Savitha Boomiperumal, Technical Lead, Accenture 1. Dr.Anusha K, Associate Professor, School of Computing, VIT 1. Dr.Sumathy G, SRMIST
Technology Solutions, Portugal, Europe Chennai.
140
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE549T DECISION MAKING UNDER UNCERTAINTY C PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn and identify the opportunities for creating value using these models 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: develop models that can be used to improve decision making under uncertainty within an organization
Design/development of
Communication
Environment &
Sustainability
CLR-5: develop the skills to identify, define, scope, model, and analyze complex decision problems
solutions
society
PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
gain a broad fundamental understanding of the mathematical models and solution methods for decision
CO-1: - 3 1 - - - - - - - - - 1 - -
making
CO-2: implement and extend key algorithms for learning and decision making - 3 2 - - - - - - - - - - - 2
CO-3: identify an application of the theory and formulate it mathematically - 3 - 2 - - - - - - - - - - 2
CO-4: gain a deep understanding of an area of particular interest and apply it to a problem - 3 - 2 - - - - - - - - - - 3
CO-5: make inferences about a management problem based on the solution of a model - 3 - 2 - - - - - - - - - - 2
1. Mykel J. Kochenderfer, Tim A. Wheeler, Kyle H. Wray Algorithms for Decision Making, 4. Richard S. Sutton and Andrew G. Barto, Reinforcement Learning: An Introduction, 2nd Ed. MIT
MIT Press, 2022 Press, 2018. Dimitri P. Bertsekas, Dynamic Programming and Optimal Control, Athena
Learning
2. https://github.com/JuliaAcademy/Decision-Making-Under-Uncertainty Scientific, 2012 (4th Ed.).
Resources
3. Laura Graesser, Wah Loon Keng, Foundations of Deep Reinforcement Learning: Theory 5. D.V.Lindley, Making Decisions, 2nd Edition, John wiley & Sons.
and Practice in Python. Pearson Education, 2020.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 40% - 40% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.S Sai Manjunath Software engineer – I Cisco Systems 1. Dr. P Vetrivelan Professor, VIT-Chennai 1. Dr. Kanipriya M, SRMIST
142
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE554T COMPUTER NETWORKING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: introduce fundamentals of network architecture
CLR-2: understand the medium used for data transmission and controlling the data traffic
CLR-3: understand the difference of wired and wireless networks over data traffic and its error control
CLR-4: familiarize the wireless network evolutions and cellular concepts
CLR-5: elaborate the wireless data connectivity through various technologies
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: exhibit understanding of network architecture principles. 2 - -
CO-2: analyze and categorize the characteristics of data transmission and traffic control. 3 - 2
CO-3: apply knowledge of wired and wireless networks to manage data traffic effectively. 2 - 1
CO-4: demonstrate an understanding of cellular wireless network concepts. 3 - 3
CO-5: implement data connectivity using various advanced wireless technologies. 2 - 3
143
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Forouzan, Behrouz A, Data communications and networking. 2013. 4. William Stallings, Data and Computer Communications, 10th Edition, 2013.
Learning 2. William Stallings, Computer Networking with Internet Protocols and Technology, 2003. 5. Theodore S. Rappaport, Wireless Communications Principles and Practice. 2nd Edition.
Resources 3.DharmaPrakash, Agrawal and Qing-An Zeng, Introduction to Wireless and Mobile Systems and 3rd 6.Data Communications and Networking with TCP/IP Protocol Suite, 6TH Edition, 2022.
Edition, 2011.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100% 100% 100%
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Er. B. Saranya, EPAM Systems India Private Limited, 1. Prof. E. Ilavarasan, Puducherry Technological University. 1. Dr. M. Baskar, SRMIST
Hyderabad.
2. Prof. M. Manoj Kumar, Vel Tech Rangarajan Dr. Sagunthala R & 2. Dr. J. Ramkumar, SRMIST
D Institute of Science and Technology, Chennai.
144
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE555T INTERNET OF THINGS IN EDGE COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: describe IoT architecture and how it is interpreted
CLR-2: discuss Edge Computing Orchestration and it’s storage management
CLR-3: explore the End-To-End Security Services and interfacing capacity
CLR-4: execute IoT and Edge Computing applications in relevant tools
CLR-5: understand IoT and Edge Computing in real world Scenario
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: construct suitable architecture for IoT applications 1
CO-2: apply resource management in Edge Storage application 1 1
CO-3: create a Secured Edge Application with suitable interface 1 2
CO-4: implement Edge Computing and IoT applications using tools 2
CO-5: create use cases based on the sample applications 3
1. Yunlong Cui, Edge Computing-IoT, Addison-Wesley, Third Edition, May 2007 4. Robert Lafore, Edge Computing for IoT, SAMS Publishing, Fourth Edition,2008
Learning 2. Lawrence Miller, Edge Computing, Oxford University Press, First Edition,2015 5. Robert Barton, Patrick Grossetete, David Hanes, Jerome Henry, Gonzalo Salgueiro, “IOT
Resources 3. Ezhilmathi Krishnasamy, Edge Computing: An Overview of Framework and Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of
Applications,Oxford University Press, Second Edition,2017 Things”, CISCO Press, First Edition,2017
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 15% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Srikanth Satyanarayanan,Principal Chief Engineer 1. Dr. J. Umarani , IIITDM Kancheepuram 1. Dr.K.Arthii, SRMIST
Uno Minda
2. Dr.K.Sornalakshmi, SRMIST
146
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE556T GENERATIVE ADVERSARIAL NETWORK AND ITS APPLICATIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: gain foundational knowledge of GANs and advanced generative methods.
CLR-2: develop practical skills for constructing robust GANs with PyTorch.
CLR-3: evaluate GAN performance using various metrics for informed decision-making.
CLR-4: discover real-world applications and potential of GAN technology.
CLR-5: develop practical problem-solving abilities by implementing and debugging GAN models.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan, SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja, SRMIST
3. Dr.R.Balaji Ganesh, SRMIST
4.Dr.R.Deebalakshmi, SRMIST
148
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE557T STREAMING DATA ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: introduce the fundamentals of stream processing frameworks
CLR-2: explore the components of Apache Spark Streaming and its API
CLR-3: familiarize the concept of stream processing in Apache Kafka
CLR-4: introduce the streaming cloud processing frameworks and Flink
CLR-5: process real time sensor data
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: comprehend the fundamentals of stream processing frameworks 1
CO-2: develop applications using Apache Spark Streaming and its API 1 2
CO-3: apply Apache Kafka Streams on real time data 2
CO-4: appreciate the usage of cloud stream processing frameworks 2
CO-5: connect, collect and analyze sensor data 3
6. Gerard Maas and Francois Garillot, Stream Processing with Apache Spark, O’Reilly, First
1. https://spark.apache.org/docs/latest/structured-streaming-programming-guide.html
Edition, 2019
2. Zubair Nabi , ProSpark Streaming, Springer, First Edition, 2016
7. Neha Narkhede, Gwen Shapira & Todd Palino, Kafka The definitive guide, O’Reilly , First
Learning 3. https://aws.amazon.com/kinesis/data-streams/getting-started/
Edition, 2017
Resources 4. https://cloud.google.com/dataflow/docs/overview
8. William P. Bejeck Jr., Kafka Streams in Action, Manning, Second Edition, 2024
5. https://azure.microsoft.com/en-in/products/stream-analytics
9. Fabian Heueske and Valliski Kalavari, Event-driven applications and microservices Stream
Processing with Apache Flink, O’Reilly, First Edition 2019
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 15% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Hariseharan, Advisor, Pratya AI Labs 1. Dr. J. Umarani , IIITDM Kancheepuram 1. Dr.K.Sornalakshmi, SRMIST
2. Dr.D.Hemavathi, SRMIST
150
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE558T DEEP NEURAL NETWORK ARCHITECTURES E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the fundamental concepts and basic tools of deep neural networks
CLR-2: recognize and appreciate the functionalities of various layers in deep neural networks
CLR-3: explorer the application of deep neural networks in image processing
CLR-4: comprehend convolutional neural networks and its layer wise functionality
CLR-5: getting familiar with transfer learning techniques
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: create a simple deep neural network and explain its functions 3 - 1
CO-2: building neural networks with multiple layers with appropriate activations 1 2 -
CO-3: application of deep neural networks in Image processing problems - 2 1
CO-4: implementation of convolutional neural networks 2 - 1
CO-5: determine the application of appropriate transfer learning techniques 1 3 -
4. Brownlee J. Deep learning with Python: develop deep learning models on Theano and
1. Chollet F. Deep learning with Python. Simon and Schuster; 2021 Dec 7. TensorFlow using Keras. Machine Learning Mastery; 2016 May 13.
Learning 2. Ian Goodfellow, YoshuaBengio, Aaron Courville, “Deep Learning”, MIT Press, 2017 5. Weidman S. Deep learning from scratch: Building with python from first principles. O'Reilly
Resources (available at http://www.deeplearningbook.org) Media; 2019 Sep 9.
3. Kevin P. Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012 6. Gulli A, Kapoor A. TensorFlow 1. x Deep Learning Cookbook: Over 90 unique recipes to
solve artificial-intelligence driven problems with Python. Packt Publishing Ltd; 2017 Dec 12.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 5% - 5% - 5% -
Level 6 Create 5% - 5% - 5% -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Sagarika, Senior Data Scientist, Great Learning 1. Dr.S Muthurajkumar, Asst. Professor, Department of Computer 1. Dr. G. Vadivu, SRMIST
Technology, muthuraj@annauniv.edu, Anna University, Chennai
2. Dr Srabashi Basu, Senior Faculty, GreatLearning 2. Dr. S. Sharanya, SRMIST
152
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE559T CLOUD COMPUTING FOR DATA ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: provide an understanding about the enabling technologies for big data computing, cloud computing infrastructure and machine intelligence.
CLR-2: gain knowledge on cloud computing models, virtual machines, docker containers, cloud architectures and resources management
CLR-3: equip students with a comprehensive understanding of cloud computing services, mobile clouds and inter-cloud mashup services.
CLR-4: equip students with the knowledge and skills required to leverage cloud storage, databases, and advanced analytics tools effectively.
CLR-5: impart to students the information and abilities needed to successfully use managed machine learning systems, cloud-based ETL procedures, and serverless computing.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
demonstrate proficiency in the enabling technologies for big data computing, including distributed storage systems, distributed processing frameworks, and data
CO-1: - 2 1
analytics
CO-2: develop the ability to evaluate different cloud computing models, virtual machines, docker containers and cloud architectures 2 - -
CO-3: describe the principles and applications of IaaS, PaaS, SaaS Clouds and mobile clouds. - 1 2
CO-4: demonstrate a strong understanding of cloud storage concepts, including different cloud storage services and their functionalities. 1 2 -
develop AWS Lambda functions using AWS Cloud9, understanding the fundamentals of serverless computing and Function as a Service (FaaS) paradigm.
CO-5: 2 - 3
Additionally, utilize core functionalities of popular managed machine learning systems
153
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Kai Hwan, Min Chen, Big-Data Analytics for Cloud, IoT and Cognitive Learning, 4. Lizhe Wang, Rajiv Ranjan, Jinjun Chen, Boualem Benatallah, Cloud Computing -
JohnWiley & Sons Ltd, First Edition, 2017. (Unit 1, 2 & 3) Methodlogy, Systems, and Aplications, CRC Press (Taylor & Francis Group), 2012.
2. Noah Gift, Cloud Computing for Data Analysis, Leanpub (Lean Publishing), 2021. 5. Pethuru Raj, Ganesh Chandra Deka, Handbook of Research on Cloud Infrastructures for
Learning
(Unit 4 & 5) Big Data Analytics, Information Science Reference, 2014.
Resources
3. Souvik PAl, Dac-Nhuong Le, Prasant Kumar Pattnaik, Cloud Computing Solutions 6. AWS Documentation: https://docs.aws.amazon.com/
- Architecture, Data Storage, Implementation, and Security, John Wiley & Sons, 7. Databricks Documentation: https://docs.databricks.com/en/index.html
First Edition, 2022. 8. Joe Minichino, Data Analytics in the AWS Cloud, Sybex Inc, 2023.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 5% - 5% - 5% -
Level 6 Create 5% - 5% - 5% -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ravi Annadanam, Software Consultant & Trainer, Great Learning. 1. Dr. J. Umarani , IIITDM Kancheepuram 1. Dr. M. Prakash, SRMIST
2. Dr Srabashi Basu, Senior Faculty, GreatLearning 2. Dr. K. Arthi, SRMIST
154
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE560T GENERATIVE AI WITH LARGE LANGUAGE MODELS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: introduce the fundamental concepts of Generative AI and pre-trained LLMs
CLR-2: explore the different techniques for fine tuning LLMs
CLR-3: understand the working of Reinforcement learning and LLMs applications
155
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Edward R. Deforest, Prompt Engineering with Transformers and LLM – By Kindle 4. Deep Learning for NLP and Speech Recognition" by Uday Kamath, John Liu, and James
(2024). Whitaker, Springer(2019)
Learning
2. Altaf Rehmani, Generative AI for everyone – By Altaf Rehmani; 1st edition (2024). 5. Hands-On Natural Language Processing with PyTorch 1.x" by Thomas Wolf, Julien Chaumond,
Resources
3. Natural Language Processing with Transformers" by Lewis Tunstall, Leandro von and Lysandre Debut, Packt Publishing(2020)
Werra, and Thomas Wolf, O'Reilly Media(2022) 6. "Pre-trained Models for Natural Language Processing" by Julien Simon, O'Reilly Media(2020)
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - 20% - 20% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 20% - 25% - 25% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan, SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja, SRMIST
3. Dr.R.Balaji Ganesh, SRMIST
4.Dr.R.Deebalakshmi, SRMIST
156
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE561T ETHICS IN DATA SCIENCE E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: utilize foundational ethical frameworks and philosophies relevant to data science
CLR-2: apply ethical principles and analyze research ethics and data handling practices
CLR-3: evaluate and implement policies for data protection and algorithmic fairness
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: define key ethical theories and frameworks, including utilitarianism and contemporary theories of fairness. 1 2 2
CO-2: explain the ethical issues in data-driven research, including the methods of data collection and data types. 2 3 3
CO-3: analyze the distinctions between data ownership, privacy, and anonymity, and their implications. 3 3 3
CO-4: evaluate the effectiveness of data protection policies like GDPR and India's Personal Data Protection Bill. 3 3 3
157
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. "Ethics of Artificial Intelligence and Robotics" by Vincent C. Müller, 4. "Ethics and Data Science" by Mike Loukides, Hilary Mason, and DJ Patil, O'Reilly Media(2018)
Publisher: Routledge(2020) 5. "Fairness and Machine Learning: Limitations and Opportunities" by Solon Barocas, Moritz
Learning 2. "Data Ethics: The New Competitive Advantage" by Gry Hasselbalch and Pernille Hardt, and Arvind Narayanan, fairmlbook.org (Open Access)2019
Resources Tranberg, Publisher: Apress(2016) 6. "Data Privacy and Security: A Practical Guide for In-House Counsel and the Data Privacy
3. "The Ethical Algorithm: The Science of Socially Aware Algorithm Design" by Officer" by David A. Zetoony, American Bar Association(2021)
Michael Kearns and Aaron Roth, Oxford University Press(2019)
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. 1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan ,SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja,SRMIST
3. Dr.R.Balaji Ganesh,SRMIST
4.Dr.R.Deebalakshmi,SRMIST
158
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE562T Course SQL AND NoSQL FOR DATA SCIENCE Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3
Course Outcomes At the end of this course, learners will be able to: Programme Outcomes
(CO): (PO)
1 2 3
CO-1: comprehend basic methods of processing data from real world problems - 1 -
CO-2: convert data into actionable insights 3 2 -
CO-3: build data model into advanced actionable insights - - 3
CO-4: apply different kinds of sub queries in real world application - 2 -
CO-5: understand different constraints and transactional queries to application 1 2 -
Learning 1.Anthony Molinaro, Robert De Graaf Nield, T., Safari “SQL Cookbook, 2E: Query 3. Lynn Beighley, Sadalage, P. & Fowler, “Head First SQL: Your Brain on SQL -- A
Resources Solutions and Techniques for All SQL Users” O'Reilly Media Company,2019. Learner's Guide NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot
2. Avi Silberschatz, Henry F. Korth,S. Sudarshan, ”Database System Concepts” , Persistence” , Wiley Publications,1st Edition ,2019.
McGraw-Hill, 7th Edition,2019 4. Ramez Elmasri, Shamkant B. Navathe,”Fundamentals of Database systems”,
Pearson publication, 7th edition, 2021.
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms S. Vidhya, HoP, DSE, Great Learning 1.Prof. Masilamani V, Professor, CSE, IIITDM, chennai 1.Dr M Aarthy, SRMIST
2. Dr. Jaya R, Faculty, Great Learning 2.Dr.D.Hemavathi, SRMIST
160
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE563T Course BIG DATA DATABASE TECHNOLOGIES Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3
Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: organize big data using appropriate tools and techniques, 3
CO-2: compose and preprocess large-scale datasets. 3
CO-3: identify techniques for data transformation and work with streaming data 3
CO-4: apply big data technologies to process and analyze real-world datasets 3
CO-5: perform descriptive, predictive, and prescriptive analytics on big data, 2
161
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1.Kuan-Ching Li, Hai Jiang, Laurence T. Yang, and Alfredo Cuzzocrea: Big Data: 3.Bill Chambers and Matei Zaharia, Spark: The Definitive Guide 2015
Resources Algorithms, Analytics, and Applications” 2023
2.Tom White, Hadoop: The Definitive Guide" 4th edition 2015
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 20% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 15% - - -
Level 6 Create - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Expert
1. Dr. Mariappan Vaithilingam, Brahmarsive Inc., 1. Prof. Loganathan, Pondicherry Engineering College
1. Dr. B. Kanisha, SRMIST.
Coimbatore
162
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE564T BIG DATA ECOSYSTEM E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the Hadoop architecture and its use cases
CLR-2: understand Hadoop ecosystem component particularly its data warehouse Hive
CLR-3: store and process data through NoSQL database
CLR-4: process Big data using Spark libraries
CLR-5: build ML Model using Big data processing libraries
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: recall the Hadoop architecture and HDFS commands 1
CO-2: implement data processing using Hive 1 2
CO-3: process Big data through NoSQL database 2
CO-4: process Big data through Spark Ecosystem Libraries 2
CO-5: build ML models on Big Data using Pyspark MLLib 3
3. Brindha Priyadarshini Jeyaraman, Real-Time Streaming with Apache Kafka, Spark and
1. Tom White ,Hadoop:The Definitive Guide, O'Reilly Media, Fourth Edition,2015.
Storm, BPB Publishers, First Edition, 2021
Learning 2. Srini Panchkula , Big Data Processing with Apache Spark , Lulu, First Edition,
4. Jisha Mariam Jose, Hadoop Practice Guide-SQOOP, PIG, HIVE, HBASE for Beginners,
Resources 2018.
Notion Press, First Edition, 2019
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 15% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr . N Mohanraj, Software Engineer 2, PayPal Inc.,. Dr. Joe Louis Paul, SSN College of Engineering 1. Dr.S.Sindhu, SRMIST
2. Mr. Kaustuv Kunal, Great Learning 2. Dr. K.Sornalakshmi, SRMIST
164
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE565T WEB DEVELOPMENT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: generate Web pages using HTML, CSS
CLR-2: understand the dynamic behavior of website using CSS
CLR-3: process unformatted data using XML
CLR-4: generate dynamic webpages
CLR-5: understand the technology for dynamic web content generation
Programme Outcomes
Course (PO)
At the end of this course, learners will be able to:
Outcomes (CO):
1 2 3
CO-1: create static web pages 1
CO-2: create dynamic webpages using client-side scripting 3
CO-3: create web pages using unstructured data using XML 1
CO-4: create web pages with server-side functionality. 1 3
CO-5: demonstrate expertise in managing and generating dynamic web content. 3
165
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1.Uttam K Roy, Web Technologies, Oxford University Press 4.D. Flanagan, Java Script, , O’Reilly, SPD.
Learning 2.Steven Holzner, The Complete Reference PHP –, Tata McGraw-Hill REFERENCE BOOKS: 5.Jon Duckett, Beginning Web Programming- WROX.
Resources 3.Chris Bates, Web Programming, building internet applications, 2nd edition, Wiley Dremtech 6.R.W. Sebesta, Programming world wide web, Fourth Edition, Pearson
Java Server Pages – Hans Bergste,n, SPD O’Reilly 7.Dietel and Nieto, Internet and World Wide Web – How to program, , Pearson
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - 20% - 25% -
Level 2 Understand 30% - 20% - 30% -
Level 3 Apply 25% - 25% - 25% -
Level 4 Analyze 20% - 25% - 20% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Ramesh/ Fiserv Global services, India 1. Prof. G. R. Sakthidharan, Gokaraju Rangaraju Institute of 1.Dr. R. Jeya, SRMIST
Engineering and Technology, Hyderabad
166
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE566T IoT DATA ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: memorize the fundamentals of IoT and its applications.
CLR-2: describe various Data analytic techniques suitable for IoT data
CLR-3: analyze various analytic algorithms applicable to IoT data.
CLR-4: develop skills in visualizing and interpreting IoT data.
CLR-5: apply IoT analytics concepts to real-world scenarios.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: memorize basic concepts of IoT data collection from its devices 2 - 1
CO-2: interpret various data analytics techniques suitable for IoT time series analysis, predictive modeling, and anomaly detection. 2 - 3
CO-3: recognize different cloud based IoT analytic tools. 3 - -
CO-4: apply and visualize data in AWS IoT platforms and gain hands-on experience. 3 - 2
CO-5: analyze the real-world IoT applications across various domains, including healthcare, smart cities, industrial IoT, and agriculture. 3 - 2
167
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Harry G. Perros, An Introduction to IoT Analytics, Chapman & Hall, 1st Edition, 2021. 4. Sachi Nandan Mohanty, Jyotir Moy Chatterjee, Monika Mangla, Suneeta Satpathy
2. Misra S, Mukherjee A, and Roy A, IoT Analytics. In: Introduction to IoT, Cambridge and Sirisha Potluri, Machine Learning Approach for Cloud Data Analytics in IoT,
Learning University Press; 2021. Scrivener Publishing, 2021.
Resources 3. Kai Hwang and Min Chen, Big-Data Analytics for Cloud, IoT and Cognitive Computing, 5. Hwaiyu Geng, Internet of Things and Data Analytics Handbook, Wiley, 2016.
John Wiley & Sons, 2017. 6. https://docs.aws.amazon.com/lambda/latest/dg/services-iot.html
7. https://aws.amazon.com/iot-analytics/
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. B. Amirtharaj, Senior Associative, Cognizant 1. Dr. S. Shoba, Assistant Professor (Sr.Gr), VIT Chennai 1. Dr. T. Preethiya, SRMIST
168
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course COMMUNICATION AND NETWORKING TECHNOLOGIES FOR Course L T P C
21CSE567T E PROFESSIONAL ELECTIVE
Code Name INTERNET OF THINGS Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: recall the different data communication and networking concept for constructing IoT networks and data transfer.
CLR-2: define IoT reference model and architecture model for real-time applications.
CLR-3: recognize the traditional security concept and customize the security model for various IoT deployments.
CLR-4: develop IoT platforms and understand the hardware deployment for IoT.
CLR-5: utilize the concept of 5G technology and its operations for Machine to Machine communications.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: identify the importance of data communications and the Internet in supporting business communications and daily activities. 2 - -
CO-2: design networks with the help of IoT reference model and architecture. 2 - 3
CO-3: customize security model for different IoT deployments. 2 - 3
CO-4: deploy IoT network in real-time with IoT enabled hardware devices. 2 - 3
CO-5: visualize beyond 5G networks 2 - 3
1. Simon Cirani, Gianluigi Ferrari, Marco Picone and Luca Vetri, Internet of Things, 4. Peter Waher, Learning Internet of Things, Packet publishing, 2015.
Architectures, Protocols and Standards, Weily, 2016. 5. Wei Xiang, Kan Zheng and Xuemin (Sherman) Shen, 5G Mobile Communications, Springer,
2. Mavromoustakis, Constandinos, Mastorakis, George, Batalla and Jordi Mongay, 2017.
Learning
Internet of Things (IoT) in 5G Mobile Technologies, Springer, 2016. 6. Afif Osseiran, Jose F. Monserrat and Patrick Marsch, 5G Mobile and Wireless Communications
Resources
3. Carles Anton and Haro Mischa Dohler, Machine-to-machine (M2M) Technology, Cambridge University Press, 2016.
Communications, Architecture, Performance and Applications, 1st Edition,
Elsevier, 2015.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Mathangi Nageswar, Director - IoT CS Delivery Mgmt, CTS, 1. Dr Surendar M. Assistant Professor; National Institute of 1. Dr. A. Prabhu Chakkaravarthy, SRMIST
Chennai Technology, Puducherry
170
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE568T PRIVACY AND SECURITY IN IoT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: explain how security is important in IoT
CLR-2: identify the cryptographic fundamentals for IoT
CLR-3: apply the authentication credentials and access control
CLR-4: evaluate the various types of Trust models
CLR-5: explore the need for cloud security for IoT
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: clarify the need of securing the internet of things in an increasing interconnected world 3 - -
CO-2: analyze the cryptographic fundamentals in securing communication and data within the IoT landscape 3 - -
CO-3: identify robust identity and access management solutions in IoT 3 - -
CO-4: develop Trust models to ensure secure interactions between devices, users, and services and do evaluation - - 3
CO-5: examine how cloud security plays a vital role in protecting the vast amount of data generated by the ever-growing network of IoT devices. 3 - -
171
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Brian Russell and Drew Van Duren, Practical Internet of Things Security 4. Whitehouse O, Security of things: An implementers’ guide to cyber-security for internet
(Kindle Edition), Packet Publishing, 2016. of things devices and beyond, 1st edition, NCC Group, 2014.
Learning
2. Shancang Li and Li Da Xu, Securing the Internet of Things, Syngress, 2016. 5. DaCosta, Francis and Byron Henderson, Rethinking the Internet of Things: a scalable
Resources
3. Fei Hu, Security and Privacy in Internet of Things (IoTs): Models, Algorithms, approach to connecting everything, Springer Nature, 2013.
and Implementations, CRC Press, 2016.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Thamizh Arasan, Technical Lead, Tech Mahindra, Chennai 1. M Varaprasad Rao, Professor, Sree Dattha Institute of 1. Dr. Nimala. K, SRMIST.
Engineering & Science, Hyderabad.
172
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course COMPONENTS AND ENERGY OPTIMIZATION TECHNIQUES FOR Course L T P C
21CSE569T E PROFESSIONAL ELECTIVE
Code Name INTERNET OF THINGS Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: extract knowledge on Internet of Things (IoT), which relates to the study of sensors, actuators
CLR-2: relate knowledge on IoT devices with a focus on sensors
CLR-3: impart knowledge on IoT applications and examples (building automation, transportation, healthcare, industry, etc.) with a focus on wearable electronics
CLR-4: investigate the rudiments of energy conservation and on various energy conservation schemes in IoT
CLR-5: describe various techniques of green IoT and gain the knowledge on low energy Bluetooth devices and its importance
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: identify IoT sensors and technological challenges faced by IoT devices, with a focus on wireless, energy, power, RF and sensing modules. 3 - -
CO-2: justify the appropriate model to implement for a project 3 - -
CO-3: forecast IoT devices with a focus on sensors - - 3
CO-4: develop energy conservation algorithms for improving the lifetime of IoT devices and energy efficient architecture for real world problems 3 - -
compare and contrast of various green IoT techniques to design green IoT for real world problems and develop energy efficient architecture for real world problems
CO-5: - - 3
using low energy Bluetooth devices
173
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Vijay Madisetti and ArshdeepBahga, Internet of Things (A Hands- on-Approach), 3. Rushan Arshad, Saman Zahoor, Munam Ali Shah, Abdul Wahid, and Hongnian Yu, Green
Orient Blackswan Private Limited, 2015. IoT: An Investigation on Energy Saving Practices for 2020 and Beyond,
Learning
2. Madhur Bhargava, IoT projects with Bluetooth Low Energy- Harness the power of https://eprints.bournemouth.ac.uk/29694/1/07997698.pdf, 2017.
Resources
connected things, Packet Publishing, 2017. 4. Sanjeev J. Wagh, Manisha Sunil Bhende, Anuradha D. Thakare, Energy Optimization
Protocol Design for Sensor Networks in IoT Domain, 1st Edition, CRC Press. 2022.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Mathangi Nageswar, Director - IoT CS Delivery Mgmt, CTS, 1. Dr. Bhuvan Unhelkar, Professor, Muma College of Business, 1. Dr. Senthil Murugan. V, SRMIST
Chennai University of South Florida
174
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE570T SENSOR DATA MANAGEMENT IN IoT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: familiarize about different type of sensors used in different applications and type of data generated
CLR-2: memorize about IoT data management
CLR-3: popularize the distributed databases
CLR-4: provide hands-on practice on Mongo DB and Python
CLR-5: describe the role of big data analytics in IoT applications
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: identify the appropriate sensors for real time applications 3 - -
CO-2: explore data storage solutions for IoT environments 3 - -
CO-3: apply storage solutions for Big Data in Cloud environments - - 3
CO-4: install, run and apply Mongo DB in real-world applications 3 - -
CO-5: design data analytic models for IoT applications - - 3
175
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Module-5 - Big Data Analytics and IoT Applications 9 Hour
Introduction to Big Data Analytics - Classification of Analytics - Capitalizing on Big Data - Challenges Facing Big Data – Need for Big Data Analytics - Introduction to Machine Learning - Machine Learning Algorithms
- Role of machine learning in IoT - IoT in Agriculture - Machine learning in Agriculture domain - Machine learning in Healthcare domain - Issues in data collection - Blind spots of IoT Devices - Massive and
heterogeneity of data - Data Administration Issues - Data processing - Security and privacy
1. Jacob Fraden, Handbook of Modern Sensors: Physics, Designs, and Applications, 4. David Hows, Peter Membrey, Eelco Plugge, Tim Hawkins, The definitive guide to MongoDB,
Springer, 2014. 3rd Edition, A complete guide to dealing with Bigdata using mongodb, 2016.
2. Abu-Elkheir M, Hayajneh M and Ali NA, Data Management for the Internet of 5. Subhashini Chellappan and Seema Acharya, Big data and Analytics, 2ed, Wiley, 2019.
Things: Design Primitives and Solution, Sensors, 6. Suwimon Vongsingthong and Sucha Smanchat Sucha, “A Review of Data Management in
Learning
https://doi.org/10.3390/s131115582, 2013. Internet of Things”, KKU Res.j, https://doi.org/10.14456/kkurj.2015.18, 2015.
Resources
3. Prajwol Sangat, Maria Indrawan-Santiago and David Taniar, Sensor data
management in the cloud: Data storage, data ingestion, and data retrieval,
Concurrency and Computation; Practice and Experience,
https://doi.org/10.1002/cpe.4354, 2017
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Hariharan Ramalingam, Vertical Delivery Head, Wipro 1. Dr. A. Amuthan, Associate Dean, Dept. of CSE, Pondicherry 1. Dr. Banu Priya P, SRMIST
Engineering College, Pondicherry
2. Dr. Noor Mahammad, IIITDM, Kancheepuram
176
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE571T SDN AND NFV FOR INTERNET OF THINGS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: memorize the basic principles and Core importance about SDN, NFV and IoT.
CLR-2: define the various approaches and in Real world applications of SDN.
CLR-3: exploit the different evolutions of NFV and its deployment.
CLR-4: recognize the Era of IoT begins in different fields of real-world technologies.
CLR-5: predict the advanced applications of SDN, NFV and IoT.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: determine the basic ethics and its essentials of SDN, NFV and IoT. 2 - -
CO-2: classify the different SDN Real world applications. 2 - 3
CO-3: illustrate the various progressions of NFV. 2 - 3
CO-4: describe the new technologies evolved in IoT in the modern era. 2 - 3
CO-5: identify the Advanced applications of SDN, NFV and IoT. 2 - 3
177
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Brij B Gupta, Amrita Dahiya, Elhadj Benkhelifa, SDN and NFV: A New Dimension to 5. Rahamatullah Khondoker, SDN and NFV Security: Security Analysis of Software-Defined
Virtualization, World Scientific Publishing Company Publisher, 2024. Networking and Network Function Virtualization, Springer International Publishing, 2018.
2. Fetia Bannour, Sami Souihi, Abdelhamid Mellouk, Software-Defined Networking 2 6. Ying Zhang, Network Function Virtualization: Concepts and Applicability in 5G Networks,
Extending SDN Control to Large-Scale Networks, Wiley Publisher, 2023. Wiley Publisher, 2018.
Learning 7. Larry Peterson, Carmelo Cascone and Bruce Davie, Software Defined Networks: A Systems
3. K. Hemant Kumar Reddy, Tapas Kumar Mishra, Mir Wajahat Hussain, Diptendu Sinha
Resources Approach, Systems Approach LLC (Publisher), 2021.
Roy, Handbook of Research on Network-Enabled IoT Applications for Smart City
Services, IGI Global Publisher, 2023. 8. William Stallings, Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud,
4. Alcardo Barakabitze, Andrew Hines, Multimedia Streaming in SDN/NFV and 5G Pearson, 2015.
Networks: Machine Learning for Managing Big Data Streaming, Wiley Publisher, 2022.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Mathangi Nageswar, Director - IoT CS Delivery Mgmt, CTS,
1. Dr. Sudeepta Mishra, Indian Institute of Technology, Punjab 1. Dr. A. Suresh, SRMIST
Chennai
2. Mr. Harishankar, Renault Nissan Automotive India Pvt Ltd, Chennai 2. Dr. B. Surendiran, National Institute of Technology, Puducherry 2. Mr. V. Shanmuganathan SRMIST
178
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE572T IoT VISUALIZATION E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: memorize the Data acquisition process, IoT servers and Data science
CLR-2: implement appropriate deep learning models for IoT applications
CLR-3: apply the knowledge of Data analytics
CLR-4: analyze data using Visualization tools
CLR-5: build any one of the case study
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: memorize IoT architecture, Data acquisition, Data management and Data science - - 1
CO-2: process the data and usage of modern ML tools 3 - 3
CO-3: analyze various type of data using data analytic tools 3 - 3
CO-4: choose appropriate latest visualization tools for analysis of data 3 - 3
CO-5: implement any IoT application mentioned in the case studies 3 - 3
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Mathangi Nageswar, Director - IoT CS Delivery Mgmt, CTS, 1. Dr Surendar M. Assistant Professor; National Institute of Technology, 1. Dr. S. Usha sukhanya, SRMIST
Chennai Puducherry
180
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE573T REAL TIME SYSTEMS IN EMERGING IoT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: memorize the fundamental concepts of Internet of Thing technologies and its role in real time applications.
CLR-2: familiarize the real time processors and health care requirement for IoT
CLR-3: develop IoT enabled smart cities and power management techniques for IoT.
CLR-4: study the various IoT based industrial automation systems
CLR-5: realize the different case studies and real time applications of IoT
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: memorize the basic concepts of real time systems and IoT 3 - -
CO-2: apply the monitored health parameter sensor output data for further computing, analyzation and visualization. 3 - -
CO-3: implement the IoT solutions for smart cities development and energy management system - - 3
CO-4: analyze the big data analytic and programming of IoT 3 - -
CO-5: solve the various societal challenges using IoT - - 3
1. Adrian McEwen and Hakim Cassimally, Designing the Internet of Things, John 5. Vijay Madisetti and Arshdeep Bahga, Internet of Things (A Hands-on Approach), Universities
Wiley and Sons Ltd, 2014. Press, 2015.
2. Dac-Nhuong Le, Emerging Technologies for Health and Medicine: Virtual Reality, 6. Ameya Deshpande, Bidyut Sarkar, Deep Dave, Ravi Dave, Advanced Manufacturing and
Augmented Reality, Artificial Intelligence, Internet of Things, Robotics, Industry 4.0. Supply Chain with IoT, BPB Publications, 2024.
Learning Wiley, 2019. 7. Monteiro, A.C.B., França, R.P., Arthur, R., Iano, Y., Segatti, A.C., Carnielli, G.P., Pereira,
Resources 3. Fadi Al-Turjman, Intelligence in IoT- enabled Smart Cities, 1st edition, CRC Press, J.C., de Godoy, H.A. and Fernandes, E.C. A Look at IIoT: The Perspective of IoT Technology
2019. Applied in the Industrial Field. In The Industrial Internet of Things (IIoT), (eds R. Anandan,
4. Giacomo Veneri, and Antonio Capasso, Hands-on Industrial Internet of Things: S. Gopalakrishnan, S. Pal and N. Zaman). https://doi.org/10.1002/9781119769026.ch1,
Create a powerful industrial IoT infrastructure using Industry 4.0, Packet Publishing, 2022.
2018.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Mathangi Nageswar, Director - IoT CS Delivery Mgmt, CTS, 1. Dr. Suresh. S, Professor, King Faisal University, Saudi Arabia 1. Dr. Mahalakshmi. M, SRMIST
Chennai.
182
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE574T DIGITAL TWINS DRIVEN DISTRIBUTED IoT SOLUTIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: memorize the purpose of digital twining and IoT ecosystems
CLR-2: introduce essential immersive tools for creating digital twinning applications
CLR-3: analyze practical knowledge of concepts with Unity software
CLR-4: know the concepts for developing unreal scenarios and components
CLR-5: apply immersive concepts to develop digitally twinning IoT use case scenarios
Programme Outcomes
Course Outcomes (PO)
At the end of this course, learners will be able to:
(CO):
1 2 3
CO-1: synergize the technology connect between digital twining and IoT 2 2 -
CO-2: know the tools to develop 3D visualization of real-time scenarios 2 - 3
CO-3: implement the functionalities of unity software 3 - 2
CO-4: integrate the concepts of unreal engine system design - 2 3
CO-5: design digital twinning for smart applications 2 - 2
183
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. David Rose, “Super sight: What Augmented Reality Means for our lives, our work, 4. Jonathan Linowes, Augmented Reality with Unity AR Foundation- a practical guide to cross
and the way we imagine our future, BenBella Books, 2021. platform AR development with Unity and later versions, Packet Publisher, 2021.
Learning
2. Lily Sayter and Brain Solis, The augmented Workforce, 2020. 5. Kenneth J.Varnum, Beyond Reality- Augmented Virtual and Mixed Reality in the library,
Resources
3. Hevin W Allen, Meta Verse- A beginner’s guide to the new digital Revolution, Jeff Packet Publisher, 2020.
H. Bolton, 2022.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Jagatheeswaran Senthilvelan, Head - IoT and Robotics, Auxo Labs 1. Prof Thuong Hoang, Research Faculty of Sci Eng & Built Env, 1. Dr. Vaishnavi Moorthy, SRMIST
School of Info Technology, Deakin University, Australia
2. Mr. Gowtham, Head - Innovation and Technology, ProtoHubs.io
184
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE575T API DESIGN AND MANAGEMENT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the importance of API in the cloud environment
CLR-2: facilitation of Effective Cloud-Based System Development
CLR-3: emphasizes the implementation of secure and efficient APIs
CLR-4: preparation for the API Economy
CLR-5: build and manage APIs in a microservices architecture
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand the architecture and tools used to design API 3 2 3
CO-2: design, implement, and manage APIs in cloud computing environments 3 2 3
CO-3: design and implement secure APIs, utilizing industry-standard security mechanisms 3 3 3
CO-4: evaluate various API monetization strategies and business models. 3 3 2
analyze the principles of API composition, aggregation, and versioning to construct resilient and scalable cloud-based systems utilizing microservices and tools 3 3 2
CO-5:
used to design API
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of Unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.S.Ramraj, Senior Analyst, Accenture Technologies 1.Mr.Muthuram, Associate Professor, GCT Coimbatore 1.Mr.H.Karthikeyan, SRMIST
186
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course MICRO SERVICES AND CONTAINERIZATION IN CLOUD Course L T P C
21CSE576T E PROFESSIONAL ELECTIVE
Code Name COMPUTING Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: review the fundamental ideas behind microservice and containerization
CLR-2: explore on design aspects of microservice and containerization
CLR-3: employ the testing strategies in microservices and containerization
CLR-4: adapt the security and scaling mechanism in microservices
CLR-5: discover the reactive microservices and utilize the tool usage.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: describe the fundamentals of microservice, containerization 3
CO-2: illustrate the microservice and containers design principles 2
CO-3: demonstrate the integration with testing strategies of microservices and containerization 3
CO-4: investigate the orchestration in containerization 3
CO-5: deploy the reactive microservices, Kubernetes and Containerization-based Applications 2
187
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Irakli Nadareishvili, Ronnie Mitra, Matt McLarty, and Mike Amundsen, “Microservice
4. Adrian Mouat, “Using Docker”, O’Reilly 2016.
Architecture: Aligning Principles, Practices, and Culture”, O’Reilly Edition:2016
5. Vikram Murugesan, “Microservices Deployment Cookbook”, Packt Publishing, 2017.
Learning 2. Gaurav Kumar Aroraa Lalit Kale Kanwar Manish, “Building Microservices with ASP.NET
6. Rick Splair, “Maximizing the Power of Kubernetes, Containers, and Microservices”, Rick Splair, 2023.
Resources Core”, Packt Publishing, 2017
7 Navin Sabharwal, Piyush Pandey, “Monitoring Microservices and Containerized Applications”, Apress
3. Pethuru Raj, Jeeva S. Chelladhurai, Vinod Singh, “Learning Docker”, Packt Publishing,
2020.
2015.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr.R.Muthuram, Associate Professor,
1.Mr.S.Ramraj, Senior Analyst, Accenture Technologies. 1.Dr. S.Thenmalar, SRMIST
Government College of Technology, Coimbatore
188
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE577T DATA CENTER VIRTUALIZATION AND MANAGEMENT TOOLS E PROFESIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understanding the basics concept of virtualization technologies
CLR-2: gain knowledge on virtualization in networking technology
CLR-3: understanding the concept of storage technology in virtualization
CLR-4: familiarize the server technologies in virtualization
CLR-5: have a comprehensive Journey through DCIM Implementation, Integration, and Innovation.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: gain expertise in data center essentials and virtualization, from definitions to classifications 2 - -
CO-2: excel in data center network evolution and VLAN deployment for superior infrastructure design 3 1 -
CO-3: master storage evolution and data center networking convergence for streamlined resource access and consolidation. 3 1 -
gain knowledge in server architectures, x86 hardware evolution, virtualization, and unified computing to seamlessly manage service profiles and optimize 2 1 -
CO-4:
infrastructure.
CO-5: analyze the concept of Data center infrastructure management 3 2 1
189
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Identifying the Components of DCIM - Understanding the Goals of DCIM - Applying DCIM at the Edge - Recognizing the Fundamental and Strategic Nature of DCIM, Addressing Data Center Challenges with DCIM
- Inaccurate and Incomplete Capacity Management, Exploring Next Generation DCIM - Workload Optimization - Asset Integrity Monitoring - Machine Learning - Augmented Reality - Integration with ITSM, BMSs,
and Security Systems.
3. Linjiun Tsai, Wanjiun Liao, Virtualized Cloud Data Center Networks: Issues in Resource
1. Gustavo Alessandro Andrade Santana, Data Center Virtualization Fundamentals, Cisco Press 2013.
Learning Management, Springer.
2. Atisaadi, Nijab, Management of Data Center Networks, IEEE, 2021.
Resources 4.Lawrence Miller, Data center infrastructure management (DCIM), John Wiley & Sons
publication, Nlyte 3rd Special Edition.
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of Module test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Mohan Raj , Senior Technical Specialist, Nokia 1. Dr. C.M, Ragavan , Research Associate, Aston University. 1.Dr.J.Umamageswaran, SRMIST
190
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE578T CLOUD COMPLIANCE AND GOVERNANCE E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the importance of security in the cloud computing.
CLR-2: compare modern security concepts as they are applied to cloud computing.
CLR-3: assess the need for an established governance function that defines frameworks, policies, standards, and procedures for the adoption of the cloud.
CLR-4: understand, define, and enhance organizational culture as it relates to performance, risk, and compliance
CLR-5: implement the governance, risk management and compliance processes that are effective and efficient.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: appreciate the importance of security in the cloud environment. 1 2 2
CO-2: analyze the modern security concepts using various data protection methods. 2 3 2
CO-3: evaluate the various compliance and governance policies protected by cloud. 2 3 2
CO-4: evaluate the organizational protection measures in cloud environment. 2 3 2
CO-5: describe legal and compliance issues that arises with cloud computing 2 3 2
191
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Russel Ballantine, “Cloud Computing: Security Compliance and Governance”,
BookBaby; 1st edition. 2012. 5. John R. Vacca, “Cloud Computing Security”, 2nd Edition, CRC Press, 2020.
2. Sumner Blount, Rob Zanella, “Cloud Security and Governance: Who's on your 6. Ted Coombs, “Cloud Security For Dummies”, Wiley, 2022.
Learning
cloud?”, IT Governance Publishing, 2010. 7. Eyal Estrin, “Cloud Security Handbook”, Packt Publishing,2022.
Resources
3. Steven Mezzio, Vincent Campitelli, Meredith Stein, “Cloud Governance: Basics and
Practice”, De Gruyter, 2022.
4. Zeal Vora, “Enterprise Cloud Security and Governance”, Packt Publishing,2017.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of Unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mrs.K.Saranya, Team Lead, Tata Consultancy 1.Dr. S. Janakiraman, Professo,Pondicherry University, Puducherry
1. Dr.R.Naresh, SRMIST
Services 2.Dr. G. R. Gangadharan, Associate Professor, National Institute of Technology, Trichy
192
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE579T APPLICATION ARCHITECTURE AND DEPLOYMENT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand and differentiate monolithic and microservices architecture to optimize scalability in AI applications
CLR-2: introduce Kubernetes fundamentals for efficient AI deployment
CLR-3: introduce integrating Application Programming Interface for robust AI model management
CLR-4: introduce MLOps strategies for robust AI model management
193
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Scott Surovich & Marc Boorshtein, Kubernetes and Docker – By Packt Publishing (2021) 4. RESTful Web APIs" by Leonard Richardson and Mike Amundsen, O'Reilly Media(2013)
2. Mark Treveil, Nicolas Omont & Clément Stenac, Introducing MLOps: How to Scale 5. "Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation" by
Learning
Machine Learning in the Enterprise (Grayscale Indian Edition) – By Shroff/O'Reilly (2020) Jez Humble and David Farley, Addison-Wesley(2010)
Resources
3. Site Reliability Engineering: How Google Runs Production Systems" by Niall Richard 6. "API Design Patterns" by JJ Geewax, Manning Publications(2020)
Murphy, Betsy Beyer, Jennifer Petoff, and others, O'Reilly Media(2016)
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 25% - 25% - 30% -
Level 5 Evaluate - 10% - - -
Level 6 Create - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan, SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja, SRMIST
3. Dr.R.Balaji Ganesh, SRMIST
4.Dr.R.Deebalakshmi, SRMIST
194
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course BUSINESS CONTINUITY PLANNING AND DISASTER Course L T P C
21CSE580T E PROFESSIONAL ELECTIVE
Code Name RECOVERY Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understanding the basic methods and paradigms of business continuity plan
CLR-2: elaborate the factors essential for implementing an effective business continuity plan
CLR-3: acquire the knowledge of business continuity standards
CLR-4: enumerate the real-time procedures in sorting out disaster recovery
CLR-5: identify the ways of protecting and managing data
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: determine the roles of the business continuity management 1 3 3
CO-2: effectiveness in execution of business continuity plan 3 3 2
CO-3: follow up of standard to be applied in business continuity plan 2 3 2
CO-4: recognize practices to be set forth for disaster recovery 3 3 3
CO-5: monitore and managing effective data security control 3 3 3
195
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Nijaz Bajgorić , Lejla Turulja , Semir Ibrahimović , Amra Alagić ,” Enhancing
Business Continuity and IT Capability: System Administration and Server
Operating Platforms”, CRC Press,First Edition, [ISBN: 978-0367652616],2023. 4. Brenda D. Phillips (Author), Mark Landahl (Author),” Business Continuity Planning:
2. Alan Calder,” ISO 22301:2019 and Business Continuity Management - Increasing Workplace Resilience to Disasters “, Butterworth Heinemann publications,[ISBN:
Learning Understand how to Plan, Implement and Enhance a Business Continuity 978-0128138441],2020.
Resources Management System (BCMS)”, O'Reilly Media Company publications, [ISBN: 5. Samuel F. Elder, Jennifer H. Elder,” Faster Disaster Recovery: The Business Owner's Guide
9781787783010],2021. to Developing a Business Continuity Plan (AICPA), Wiley Publications,[ISBN: 978-
3. Gerardus Blokdyk,” Business Continuity Management and IT Disaster 1119570967]2019.
Recovery Management A Complete Guide”, 5STAR cooks, [ISBN:
9781867485315], 2021.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of Unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr Ramachandran A , Associate Professor
1.Mr.Hari Prasad Prabhu, Senior Consultant , Deloitte, Chennai 1.Dr A Vijay Vasanth , SRMIST
Anna University (Panruti Campus)
196
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE581T CLOUD SERVICES ARCHITECT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the importance of basics in the AWS Cloud Computing.
CLR-2: compare modern security concepts with deployment models as they are applied to AWS cloud computing.
CLR-3: assess the need that defines architecture, frameworks, policies, standards, and procedures for the adoption of the AWS cloud.
CLR-4: understand, define, and enhance organizational culture as it relates to performance, risk, and storage
CLR-5: implement the repeatability, consistency, and reliability of application deployments across different environments.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand the importance of the cloud environment. 2 3 2
CO-2: illustrate the modern service and deployment model concepts. 2 3 2
CO-3: demonstrate the Paradigms and Solutions for AWS Cloud Computing. 2 3 2
CO-4: evaluate the organizational protection measures in AWS Core Services. 2 3 2
CO-5: analyze AWS Cloud Storage Advanced Technology, and classify importance of Real world cost management scenarios 2 3 2
197
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. "AWS Certified Solutions Architect by " by Ben Piper, David Clinton - (2019)
Learning 2. "AWS Certified Solutions Architect " by Joe Baron, Hisham Baz, Tim Bixler, Biff 4. "AWS Certified Solutions Architect " by Joe Baron, Hisham Baz, Tim Bixler, et al. (Year: 2016)
Resources Gaut, Kevin E. Kelly, Sean Senior, John Stamper - (2019) 5. "AWS Certified Solutions Architect -" by Ben Piper and David Clinton (Year: 2016)
3. "Amazon Web Services in Action" by Andreas Wittig, Michael Wittig - (2015)
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100% 100% 100%
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.S.Senthilkumar, Associate professor and head,
1.Mr.G.Gopalakrishnan, Capgemini Tech Lead, United States Anna University - Pattukkottai 1.Dr.N.Deepa, SRMIST
2.Mr.S.Janakiraman, Professor, Pondicherry university
198
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE582T CLOUD SECURITY BUILDER E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the importance of cloud security in cloud environment
CLR-2: facilitate of effective cloud-based system development
CLR-3: emphasize the implementation of a secure cloud environment
CLR-4: prepare for the future-proof cloud infrastructure
CLR-5: build and manage privacy and trust in cloud environment.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand cloud security is crucial in ensuring the protection of data and resources within a cloud environment 3 2 3
design effective cloud-based system development optimizes scalability, flexibility, and efficiency in software development processes through strategic utilization 3 2 3
CO-2:
of cloud technologies.
prioritize the implementation of a secure cloud environment underscores the necessity of deploying robust security measures to protect data integrity and 3 3 3
CO-3:
mitigate risks effectively.
CO-4: create future-proof cloud infrastructure involves architecting adaptable systems with emerging technologies to support evolving business needs effectively. 3 3 2
build privacy and trust in a cloud environment entails implementing robust security measures and transparent practices to safeguard data and cultivate user 3 3 2
CO-5:
confidence.
Module – 1 - Introduction to Cloud Security: Attacks, Techniques, Tools, and Challenges 9 Hour
Overview of Cloud Computing- Cloud service models, deployment models, Cloud Service Platforms. Cloud Security -Cloud Security Standards, Creating and Managing Virtual Machines (VMs), Applying ITIL
Principles for Cloud Management, Securing and Auditing a Cloud Environment, Building and Testing a Cloud Threat Model, Implementing and Evaluating Intrusion Detection Systems (IDS) for Cloud Environments,
Exploring Virtual Machine Introspection (VMI) with LibVMI Tool.
Module – 2 - Building a Future-Proof Cloud Infrastructure 9 Hour
Introduction to Distributed Systems, Configuring VXLAN (Virtual Extensible LAN) Overlay Networking, Deploying and Managing Containers with Docker and Kubernetes, Implementing Software-Defined Networking
(SDN) with OpenFlow and Open vSwitch, Exploring Network Interface Cards (NICs) and SmartNICs, Designing and Implementing a Cloud-Native Management Control Plane for Distributed Services Platforms
Module – 3 - Cloud Security Using SECaaS and DevSecOps 9 Hour
Evolution of Cloud Computing and its Impact on Security, Understanding the Core Principles of Cloud Security and its Importance, Cloud Solutions for Enterprises, Implementation of Cloud Security Framework,
Native Cloud Security Controls, Cloud Regulatory Compliance Roadmap, Effective Cloud Security Policy Enforcement, Cloud-based Security: Enabling Security-as-a-Service, Cloud Security Recommendations
and Best Practices.
Module – 4 - Data Privacy and Trust in Cloud Computing 9 Hour
Understanding Trust and Cloud Computing: An Integrated Framework for Assurance and Accountability in the Cloud, Cloud Computing Contracts and Trust, Data Privacy Across the Borders, Understanding
and Enhancing Consumer Privacy Perceptions in the Cloud, A Conceptual Framework for Positioning a Cloud Service Provider’s Privacy Orientation, Ethics and Cloud Computing, Trustworthy Cloud Computing
199
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Module – 5 - Secure Cloud Environments using AWS, Azure, and GCP 9 Hour
Overview of Cloud Security, Implementation of Command Line tools, Securing Computing, Storage and networking services, implementing effective Strategies of IAM Solutions, Applying Encryption in cloud
Services, Understanding common security threats to cloud services, Managing hybrid and multi clouds.
5. Theo Lynn, Data Privacy and Trust In Cloud Computing: Building Trust In The Cloud
1. Preeti Mishra, Emmanuel S Pilli, R C Joshi, Cloud Security: Attacks, Through Assurance And Accountability, Palgrave Macmillan, 2021, ISBN: 978-
Techniques, Tools, and Challenges, Chapman and Hall/CRC, 2021, ISBN: 3030636475.
978-0367236318 6. Eyal, Cloud Security Handbook: Find out how to effectively secure cloud environments
2. Gai, Silvano, Building a Future-Proof Cloud Infrastructure: A Unified using AWS, Azure, and GCP, Packt Publishing, 2022, ISBN: 978-1801076910
Architecture for Network, Security, and Storage Services, Addison-Wesley 7. Cloud Security Alliance, Security Guidance: For Critical Areas of Focus in Cloud
Learning Professional, 2020, ISBN: 978-0136610345 Computing V4.0, Cloud Security Alliance, 2017, ISBN: 978-0983476080
Resources 3. Ashish Mishra, Cloud Security Handbook for Architects: Practical Strategies 8. Shinesa Cambric, Michael Ratemo, Cloud Auditing Best Practices: Perform Security and IT
and Solutions for Architecting Enterprise Cloud Security Using SECaaS and Audits across AWS, Azure, and GCP by building effective cloud auditing plans, Packt
DevSecOps, Orange Education PVT Ltd, 2023, ISBN: 978-9389987587 Publishing, 2023, ISBN: 978-1801819958
4. Raghu Yeluri, Enrique Castro-Leon, Building the Infrastructure for Cloud 9. Tasha Penwell, Beginning AWS Security: Build Secure, Effective, and Efficient AWS
Security: A Solutions view, Apress, 2014, ISBN: 978-1430261454 Architecture, Apress, 2023, ISBN: 978-1484276733
10. Prashant Priyam, Cloud Security Automation: Get to Grips with Automating Your Cloud
Security on AWS and OpenStack, Packt Publishing, 2018, ISBN: 978-1788391050
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Renganathan, Agile Coach and Cloud Engineer, Tata 1.Mr.K. Prakash, Assistant Professor, Dept. Of CSE, Government
1.Dr. Savaridassan.P, SRMIST
Communications College of Engineering, Dharmapuri
200
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE583T Course NATURAL LANGUAGE PROCESSING AND ITS Course E PROFESSIONAL ELECTIVE L T P C
Code Name APPLICATIONS Category 3 0 0 3
Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: comprehend the ambiguity, challenges, and applications of NLP 3 - -
CO-2: demonstrate NLP techniques such as Part-of-Speech tagging, morphology, and text processing. 3 - -
CO-3: create applications using probabilistic models. 3 - -
CO-4: develop applications utilizing probabilistic models. 3 - -
CO-5: develop NLP applications using machine learning and deep learning models. 3 - -
201
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Attention Mechanism, Large Language Models, Encoder – Decoder Architecture, Transformers, BERT, XLNet, BART, GPT, Claude Gemma and Gemini APIs. Large Language models for Indian
Languages – MURIL BERT, Multilingual models, mBERT, mBART.
Module-5 – Introduction to Generative AI 9 Hour
Generative AI and Large Language Models, Building Sarcasm Detection, End to End Case study, Generative AI using Hugging Face API, RAG model demonstration, Building Co-Pilots for health Care
and Fin Tech, Handling Hallucination and data security.
Learning 1.Mugan, J., Natural language text processing with Python: Hands-on NLP in 3.Tunstall L., Werra L., and Wolf T, Natural Language Processing with Transformers. [ISBN-13:
Resources Python using NLTK, spaCy, gensim, and scikit-learn., 2017 978-1098136796], (available on O'Reilly), 2022
2.In Loonycorn (Firm), From 0 to 1: Machine learning, NLP & Python: cut to the 4.Dan Jurafsky, D. and James H. Martin, J., Speech and Language Processing Links to an
chase. &PacktPublishing, 2017 external site. (3rd ed), 2019
5.Raaijmakers S. 2022. Deep Learning for Natural Language Processing Links to an external
site. O'Reilly. [ISBN-13: 978-1617295447].
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life-Long Learning Final Examination
CLA-1 Average of unit test CLA-2 (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Mariappan Vaithilingam, Brahmarsive Inc, Bengaluru, India 1.Ms. B. G. Sudha, Great Learning 1.Dr. C. N. Subalalitha, SRMIST
202
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE584T TIME SERIES ANALYSIS AND FORECASTING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the need, basic concepts and components of forecasting
CLR-2: gain knowledge about simple forecasting with smoothing and exponential smoothing
CLR-3: acquire insights of mean, correlation and auto-correlation
CLR-4: Understand the basic concepts of ARIMA Model
CLR-5: grasp about Vector autoregression and VARMA models
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: apply simple time series model for forecasting analysis - 1 2
CO-2: implement forecasting with smoothing exponential models - 3 3
CO-3: analyze correlation on mean, correlation and auto correction and apply them 2 - 1
CO-4: apply ARIMA model and evaluate it 2 1 -
CO-5: understand the problem statement and choose Multivariate Time Series algorithm and perform forecasting 2 3 -
1. Pal A, Prakash PK. Practical time series analysis: master time series data processing, 5. Hastie, T., Friedman, J., & Tisbshirani, R. (2018). The Elements of statistical learning:
visualization, and modeling using python. Packt Publishing Ltd; 2017 Sep 28. Data mining, inference, and prediction. New York: Springer.
2. Yang, K., & Safari, an O'Reilly Media Company. Time Series Analysis with Python 3.x, 6. Grus J. Data science from scratch: first principles with python. O'Reilly Media; 2019 Apr
Learning Packt Publishing, 2020. 12.
Resources 3. Hyndman RJ, Athanasopoulos G. Forecasting: principles and practice. OTexts; 2018 7. McKinney, W. (2018). Python for data analysis: Data wrangling with pandas, NumPy,
May 8. and IPython. O'Reilly Media, Inc.
4. Montgomery DC, Runger GC. Applied statistics and probability for engineers. John 8. Vanderplas, J. T. (2017). Python data science handbook: Essential tools for working with
wiley & sons; 2010 Mar 22. data. O'Reilly Media, Inc.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 5% - 5% - 5% -
Level 6 Create 5% - 5% - 5% -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Abhinanda Sarkar, Academic Director, Great Learning. 1. Dr Surendiran B, Associate Professor, National Institute of Technology, 1. Dr. A. Shobanadevi, SRMIST
Puducherry
2. Dr Srabashi Basu, Senior Faculty, GreatLearning 2. Dr. Sornalakshmi K, SRMIST
204
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE585T Course FRONT END DEVELOPMENT TECHNOLOGIES Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: establish foundational skills in HTML and CSS for creating structured web content
CLR-2: introduce Bootstrap for rapid development of responsive web layouts and interactive components.
CLR-3: use React JS to build dynamic user interfaces with efficient state management and event handling.
CLR-4: explore Angular framework for creating scalable web applications with modular components and data binding.
CLR-5: focus on advanced data binding techniques and form validation in Angular for enhanced user interaction and data integrity.
Programme Outcomes
Course
At the end of this course, learners will be able to: (PO)
Outcomes (CO):
1 2 3
CO-1: create and style web pages using HTML and CSS. 1 - -
CO-2: design responsive web layouts and interactive components and utilizing the grid system effectively. 2 - -
CO-3: develop dynamic web applications and leveraging React Developer Tools 2 - -
CO-4: build robust web applications and utilize Bootstrap for creating responsive layouts. - - 3
CO-5: implement advanced data binding and form validation techniques in Angular applications - - 3
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. P. Gunaseelan, Senior Technical Expert, M.S.C Ltd 1. Prof. Ch. Sudhakar, NIT, Warangal. 1. Dr. C. Jothikumar, SRMIST
206
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE586T Course REST APIs DEVELOPMENT USING SPRING FRAMEWORK Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course Outcomes At the end of this course, learners will be able to: Programme Outcomes
(CO): (PO)
1 2 3
CO-1: build a Web Application, REST API and Full Stack Application using Spring Boot and Spring Frameworks 3 - 3
CO-2: apply the Best Practices in Developing Java Spring Applications 3 - 3
CO-3: develop a RESTful service capable of handling exceptions. 3 - 3
CO-4: apply Filtering and versioning in RESTful Service 3 - 3
CO-5: develop RESTful CRUD Applications Using JPA. 3 - 3
207
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Updating POST and DELETE methods on User Resource to use JPA - Creating Post Entity - Many to One Relationship with User Entity theory - Many to One Relationship with User Entity practical -
Implementing a GET service to retrieve all Posts of a User Implementing POST Service to Create a Post for a User - Restful CRUD application using JPA theory - Restful CRUD application using JPA
practical steps - Student Management System CRUD web app theory , Student Management Create, Read theoretical steps - Student Management Create implementation - Student Management
Read implementation - Student Management Update, Delete theoretical steps - Student Management Update, Delete implementation
Learning 1. Craig Walls , Spring in Action, Manning Publication, Fifth edition(2018) 2. https://docs.spring.io/
Resources
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Mariappan Vaithilingam, Brahmarsive Inc, Bengaluru, India Experts from Great Learning 1.Dr.T.Senthil Kumar, SRMIST
208
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE587T Course FULL STACK APPLICATION DEVELOPMENT USING Course E PROFESSIONAL ELECTIVE L T P C
Code Name REACT AND SPRING FRAMEWORK Category 3 0 0 3
Pre-requisite Nil Co-requisite Nil Progressive Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards NA
Course Outcomes At the end of this course, learners will be able to: Programme Outcomes
(CO): (PO)
1 2 3
CO-1: develop FULL STACK Application using React and Spring Boot. 3 - 3
CO-2: create an application using React, Bootstrap, and session-based authentication. 3 - 3
CO-3: develop a project that combines RESTful services implemented with Spring Boot and a front-end developed using React. 3 - 3
CO-4: apply Spring Security for RESTful services 3 - 3
CO-5: implement and manage JWT resources 3 - 3
Learning 1. Full Stack Development with Spring Boot and React: Build Modern and 2. https://docs.spring.io/spring-framework/docs/current/reference/html/
Resources Scalable Full Stack Applications Using the Power of Spring Boot and 3. https://reactjs.org/docs/getting-started.html
React, 3rd Edition (2022)
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Mariappan Vaithilingam, Brahmarsive Inc, Bengaluru, India 1.Dr. Narayana Darapaneni, Great Learning 1.Dr.T.Senthil Kumar, SRMIST
210
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE588T Course DEPLOYING FULL STACK APPLICATION Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: create full stack application using Spring and React. 3 3 3
CO-2: develop front-end using Angular and Rest API. 3 - 3
CO-3: develop back-end using Spring boot and Rest API. 3 - 3
CO-4: explore authentication and authorization using JWT. 3 3 3
CO-5: deploy full stack application on AWS cloud. 2 - 3
211
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Improving Todo Form - Validation and Form Submit on Enter - ngSubmit Enhancing Validation Messages on Todo Page Setting up Spring Security Configure standard userid and password Configure
HttpInterceptor as Provider in App Module Create Basic Authentication RESTful Service in Spring Boot Create React Basic Authentication Service Connect Login Page to Basic Authentication Service
Best Practice - Use Constants for URLs and TokensImporting JWT Framework into Eclipse part 1 Importing JWT Framework into Eclipse part 2 Executing JWT Resources - Get Token and Refresh
Token part 1 Executing JWT Resources - Get Token and Refresh Token part 2
Module-5 –JWT Spring 9 Hour
Understanding JWT Spring Security Framework Setup Creating a New User with Encoded Password part Using JWT Token in Angular Frontend part 1 Using JWT Token in Angular Frontend part 2
Setting up Todo Entity and Populating Data part Connecting GET REST APIs to JPA Repository part 1 Connecting GET REST APIs to JPA Repository part 2 Connecting POST, PUT and DELETE
REST APIs to JPA Repository partDeploying Java REST API Backend to AWS Elastic Beanstalk Quick Introduction to AWS Simple Storage Service - S3 Deploying React Frontend to AWS S3 Static
Website Running the entire Full Stack deployed application
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 20% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 15% - - -
Level 6 Create - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Mariappan Vaithilingam, Brahmarsive Inc, Bengaluru, India 1.Dr. Narayana Darapaneni, Great Learning 1.Dr.T.Senthil Kumar, SRMIST
212
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE589T Course MOBILE APPLICATION DEVELOPMENT Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: analyze various mobile technologies and create basic mobile apps.
CLR-2: design, implement and deploy mobile applications for Android OS.
CLR-3: create advanced application involving graphics, animation, images, and video in android.
CLR-4: develop and deploy mobile applications for iOS.
CLR-5: develop and deploy mobile applications for windows OS.
213
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Dawn Griffiths,Head First Android Development: A Brain-Friendly Guide, 3rd Edition, 4. Bill Phillips, Android Programming: The Big Nerd Ranch Guide, 5th
November 2021. Edition, May 2022.
Learning 2. Barry Burd,Android Application Development All-in-One For Dummies,3rd Edition, July 5. Ahmad Sahar, iOS 16 Programming for Beginners - Seventh Edition,
Resources 2020.. Nov 2022.
3. Christian Keur,iOS Programming: The Big Nerd Ranch Guide,7th Edition, April 2020. 6. Andrew Whitechapel Sean McKenna, Windows Phone 8 Development
Internals, Microsoft Press, 2013.
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Umesh Goyal, Senior Manager, Presales India, 1. Prof. Anand, East Point College of Engineering and Technology, 1. Dr. J. Selvin Paul Peter, SRMIST
Broadcom Bangalore
2. Dr. K. R. Jansi, SRMIST
214
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE590T Course AGILE AND DevOps Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the process models of agile methodologies
CLR-2: design an application by adopting Agile methodologies
CLR-3: understand the various concepts of DevOps
CLR-4: implement container-based application development and management using DevOps tool.
CLR-5: build collaborative applications using Agile and DevOps
Programme Outcomes
Course
At the end of this course, learners will be able to: (PO)
Outcomes (CO):
1 2 3
CO-1: demonstrate understanding of the different process models in agile methodologies. 3 - -
CO-2: develop an application using agile methods for efficient project management 3 2 -
CO-3: assess the challenges and opportunities associated with DevOps 3 - -
CO-4: apply container-based application development and management using DevOps tool. - 2 3
CO-5: demonstrate web applications using Agile and DevOps - - 3
215
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
DevOps Foundations and Automatic Testing, Strategy for Application Deployment, Monitoring, Introduction to GIT, Jenkins, Continuous Integration and Continuous Delivery (CI/CD) Pipelines -
Automated Testing, Deployment, and Monitoring Tools -Synergies between Agile and DevOps Methodologies - DevOps in Agile Development Lifecycle: From Planning to Operations. Case study-
Develop 3 tier web applications using agile and DevOps-Tutorials on Jenkins tool.
1. James Shore and Shane Warden," The Art of Agile Development", O'Reilly Media, Inc., 4. Len Bass, Ingo Weber, Liming Zhu, “DevOps: A Software Architect's
2021. Perspective”, Addison-Wesley, 2015
2. Robert C. Martin, "Agile Software Development, Principles, Patterns, and Practices", PHI, 5. Sanjeev Sharma, The DevOps Adoption Playbook: A Guide to Adopting
Learning
2002 DevOps in a Multi-Speed IT Enterprise, Wiley, 2017.
Resources
3. Gene Kim, Jez Humble, Patrick Debois, John Allspaw and John WillisJason Bell, The 6. Mokhtar Ebrahim, Andrew Mallett, “Mastering Linux Shell Scripting: A
DevOps Handbook, IT revolutionPress, 2016. practical guide to Linux command-line, Bash scripting, and Shell
programming”, Packt, 2018.
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Suresh Malai, HCL Tech 1. Dr. S. Kaushik, ICFAI Tech, ICFAI Foundation for Higher Education (IFHE) 1. Dr. J. Kalaivani, SRMIST
216
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE591T Course ADVANCED DATA VISUALIZATION Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the basic of data visualization through Tableau
CLR-2: gain knowledge on maps and plotting maps with tableau
CLR-3: get introduced with plat and charts for data visualization
CLR-4: infer the insights of problem statement by story and related techniques
CLR-5: know about VizQL, and Tableau Prep
Programme Outcomes
Course
At the end of this course, learners will be able to: (PO)
Outcomes (CO):
1 2 3
CO-1: visualize the various forms of data to understanding 3 - -
CO-2: picturize data through various maps and Level of Details 2 - -
CO-3: plot different graphs and reveal the insights of the data 3 - -
CO-4: envisage the problem statement by creating stories and dashboards 3 3 -
CO-5: create dashboards, perform data management and perform data analytics with prep 3 3 3
1. Alexander Loth (2019), Visual Analytics with Tableau, Wiley 3. Ryan Sleeper (2018). Practical Tableau: 100 Tips, Tutorials, and Strategies from a Tableau
2. Marlin Meir, Mastering Tableau 2023 - Fourth Edition: Implement advanced Zen Master
Learning business intelligence techniques, analytics, and machine learning models with 4. Business Information Visualization by Tegarden, D. P.. Communications of the AIS, 1(4): 1-
Resources Tableau 38.1999.
5. Visual Representation: Implications for Decision Making by Lurie, N.H. and C.H.
Mason.Journal of Marketing, 71(1): 160-177. 2007
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Final Examination
(40% weightage)
Formative Life Long Learning
CLA-1 Average of unit test CLA-2 –
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Rohan Rupesh Gurubhaiye, Senior Data Scientist, Great 1.Dr.Chitra, MIT, Guindy Campus
1.Dr.G.Maragatham , SRMIST
Learning
218
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE592T Course STATISTICAL MACHINE LEARNING Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3
Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: apply suitable mathematical concepts to carry out machine learning 3 - -
CO-2: acquire and process data for performing machine learning tasks. 3 - -
CO-3: choose an apply appropriate supervised learning model 3 - -
CO-4: determine the suitable type of unsupervised learning for the given problem. 3 - -
CO-5: implement Neural network algorithms on applications 3 - -
219
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. Marc Peter Deisenroth, A. Aldo Faisal, Cheng Soon Ong, Mathematics 4. Ian Goodfellow, Yoshoua Bengio, and Aaron Courville Deep Learning MIT Press Ltd,
Resources for Machine Learning, Cambridge University Press (23 April 2020) Illustrated edition
2. Tom M. Mitchell- Machine Learning - McGraw Hill Education, 5. Christopher M. Bishop Pattern Recognition and Machine Learning - Springer, 2nd
International Edition edition
3. Aurélien Géron Hands-On Machine Learning with Scikit-Learn, Keras, 6. Trevor Hastie, Robert Tibshirani, and Jerome Friedman - The Elements of Statistical
and TensorFlow, O'Reilly Media, Inc. 2nd Edition Learning: Data Mining, Inference, and Prediction - Springer, 2nd edition
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100% 100% 100%
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Mariappan Vaithilingam, Brahmarsive Inc 1. Dr. H. Khanna Nehemiah, Anna University, Chennai 1. Dr. K. Vijaya, SRMIST
220
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE593T Course USER EXPERIENCE DESIGN THINKING Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3
Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: develop design concepts based on clearly defined goals and scenarios. - 2 -
CO-2: utilize innovative frameworks for UI design. 2 - 3
CO-3: leverage design tools for creating effective user interfaces. - 3 2
CO-4: utilize testing tools for evaluating design effectiveness. - 2 -
CO-5: develop design use cases and prototypes to address real-world challenges. - 2 2
221
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. Introduction to Design Thinking for UX Beginners: 5 Steps to Creating a Digital 5. Hasso Plattner, Christoph Meinel and Larry Leifer (eds), "Design Thinking:
Resources Experience That Engages Users with UX Design, UI Design, and User Rese, UIJUN Understand – Improve– Apply", Springer, 2011
PARK,SBN: 9798218198954 Publisher: Uijun Company. 6. Jeanne Liedtka , Andrew King, Kevin Bennett , “Book - Solving Problems with
Design Thinking - Ten Stories of What Works” (Columbia Business School
2. Norman, D. (2013). The design of everyday things: Revised and expanded edition. Basic Publishing), 2013
books. 2 Gothelf, J. (2013). 7. Maurício Vianna, Ysmar Vianna, Isabel K. Adler, Brenda Lucena, Beatriz Russo,
3. Lean UX: Applying lean principles to improve user experience. " O'Reilly Media, Inc.". “Design thinking: Business Innovation” MJV Press, 2011
4. Roger Martin, "The Design of Business: Why Design Thinking is the Next Competitive 8. Burgelman, Christensen, and Wheelwright, “Strategic Management of Technology
Advantage”, Harvard Business Press , 2009. and Innovation”5th Edition, McGraw Hill Publications, 2017
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life-Long Learning Final Examination
CLA-1 Average of unit test CLA-2 (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Hareesh, AdTech, Walmart. 1. Dr. Mohammed Javed, IIIT Allahabad. 1. Dr. M. Suchithra, SRMIST
2. Dr. K. Anitha, SRMIST
222
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE594T Course FULL STACK DEVELOPMENT Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: structure the web development architecture and manage databases effectively. 3 - -
CO-2: create user interfaces using the latest technologies. 3 - -
CO-3: exhibit proficiency in planning, developing, and maintaining Spring-based applications using dependency injection. - 3 -
CO-4: develop Spring Boot applications using Hibernate ORM, JDBC connectivity, and perform CRUD operations with JPA Repository. - - 3
CO-5: analyze the security aspects of web development concepts. - - 3
Module-1 Introduction to Web Development. 9 Hour
Understanding Full Stack Application Architecture, Overview of HTML/CSS, Overview of modern JavaScript, Summarization of searching and sorting techniques, Functionalities of array, stack, queue,
tree, graph and linked list operation, RDBMS Fundamentals-relational database design principles, Benefits of using Tables to store data, Relational Algebra, CRUD operations.
Module-2 - User Interface and Front-end Development 9 Hour
HTML5, CSS3, Blocks, Floats and Layouts, Media Queries for Responsive Web Design, Bootstrap Basics, Grid and Fluid Layouts, Responsive Layouts, Interactive Web pages using JavaScript, Unit
Testing Using Mocha and Chai. Building client-side applications with Angular or React, Introduction to component programming, Using routing, Directives, Build single page applications.
Module-3 - Introduction to Spring 9 Hour
Understanding spring framework, Dependency injection in spring, Spring java-based configuration, Dependency injection via setter / constructor, Spring Bean scopes with examples, Autowiring in
spring, Aspect Oriented Programming, Spring MVC Architecture, Advantages and disadvantages of Spring MVC, creating Model, View and Controller layers
Module-4 - Introduction to Spring Boot. 9 Hour
Spring Boot, spring boot-based application using multiple approaches, Dependencies, Annotations, ORM framework, Architecture of Hibernate, Versions and Configurations of Hibernate, Mapping Entity,
Various Hibernate Association mapping works, Working on JDBC using Spring, CRUD Operations implementing JPA Repository.
Module-5 – Spring Security 9 Hour
Setting up Spring Security, configure standard userid, setting up Spring Security, configure standard password, Configure HttpInterceptor as Provider in App Module, Create Basic Authentication RESTful
Service in Spring Boot Authentication introduction, Create React Basic Authentication Service, Connect Login Page to Basic Authentication Service theory, Connect Login Page to Basic Authentication
Service, Best Practice - Use Constants for URLs, TOKENS
223
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. Web Development & Design Foundations with HTML 5 by Terry Felke-Morris, 4. "Learning Web Design: A Beginner's Guide to HTML, CSS, JavaScript, and
Resources Pearson Publication, 2019 Web Graphics" by Jennifer NiederstRobbins,O'Reilly Media,2018
2. Beginning CSS Web Development by simoncollison, Apress,2007 5. "Spring Integration in Action",Iwein Fuld, Jonas Partner, Mark Fisher, Marius
3. "Pro HTML5 and CSS3 Design Patterns" by Michael Bowers, Dionysios Synodinos, Bogoevici,Manning Publishing 2012
and Victor Sumner, Apress, 2017.
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life-Long Learning Final Examination
CLA-1 Average of unit test CLA-2 (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Navneet kumar, RealPage INC 1. Prof. J. M. Gnanasekar, SVCE, Sriperumbudur 1. Dr. R. S. Ponmagal, SRMIST
2. Dr. T. Senthilkumar, SRMIST
224
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE595T WEB 3.0 E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: learn about the evolution of Web 1.0 to Web 3.0
CLR-2: know about social media and digital platforms
CLR-3: impart strong fundamental knowledge on Blockchain technologies
CLR-4: explore web 3.0 protocol stack and Ethereum decentralized applications
CLR-5: understand the components of Metaverse
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: demonstrate knowledge of the design philosophy behind Web 3.0. 2 2 -
CO-2: analyze the integration of Web 3.0 with existing digital platforms 3 2 -
CO-3: demonstrate expertise in the fundamentals of blockchain technology. 3 - -
CO-4: build an Ethereum decentralized application 3 - 2
CO-5: design augmented reality / virtual reality solution for an application 2 - 1
225
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Croft, W. Bruce, Donald Metzler, and Trevor Strohman. “Search engines: Information
retrieval in practice”. Vol. 520. Reading: Addison-Wesley, 2010. 8. Doe, Daniel Mawunyo, Jing Li, Niyato Dusit, Zhen Gao, Jun Li, and Zhu Han.
2. Iankova, Severina, Iain Davies, Chris Archer-Brown, Ben Marder, and Amy Yau. "A "Promoting the sustainability of blockchain in web 3.0 and the metaverse
comparison of social media marketing between B2B, B2C and mixed business through diversified incentive mechanism design." IEEE Open Journal of the
models." Industrial Marketing Management 81 (2019): 169-179. Computer Society (2023).Al-Ghaili, Abbas M., Hairoladenan Kasim, Naif
3. Rohn, Daniel, Peter M. Bican, Alexander Brem, Sascha Kraus, and Thomas Clauss. Mohammed Al-Hada, Zainuddin Bin Hassan, Marini Othman, Jakir Hussain
"Digital platform-based business models–An exploration of critical success factors." Tharik, Rafiziana Md Kasmani, and Ibraheem Shayea. "A review of metaverse’s
Journal of Engineering and Technology Management 60 (2021): 101625. definitions, architecture, applications, challenges, issues, solutions, and future
Learning
4. Fritsch, Lothar. "The clean Privacy Ecosystem of the future internet." Future Internet trends." IEEE Access 10 (2022): 125835-125866.
Resources
5, no. 1 (2013): 34-45. 9. Dudley, John, Lulu Yin, Vanja Garaj, and Per Ola Kristensson. "Inclusive
5. Bikramaditya Singhal, Gautam Dhameja, Priyansu Sekhar Panda “Beginning Immersion: a review of efforts to improve accessibility in virtual reality,
Blockchain : A Beginner’s Guide to Building Blockchain Solutions”,: Apress 2018 augmented reality and the metaverse." Virtual Reality 27, no. 4 (2023): 2989-
6. Imran Bashir: “Mastering Blockchain”, Packt- Birmingham-Mumbai Third Edition A 3020.
deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, 10. M. Zawish et al., "AI and 6G Into the Metaverse: Fundamentals, Challenges and
crypto currencies, Ethereum, and more Future Research Trends," in IEEE Open Journal of the Communications
7. Massimo Ragnedda and Giuseppe Destefanis, “Blockchain and Web 3.0: Social, Society, vol. 5, pp. 730-778, 2024, doi: 10.1109/OJCOMS.2024.3349465.
Economic and Technological Challenges”, Routledge Press
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100% 100% 100%
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Peter Pethururaj, Jio Communications, 1. Dr. Anbuchelian, Anna University, Guindy 1. Dr. B. Baranidharan, SRMIST
Bengaluru
226
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE596T Course SECURITY OPERATIONS AND INCIDENT MANAGEMENT Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: applying NIST Incident Response Standard
CLR-2: understanding the Red Teaming, Blue Teaming & Purple Teaming
CLR-3: understand the security operations and monitoring process
CLR-4: incident response planning
CLR-5: understand investigations process
227
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. Honeypots: https://www.blumira.com/video/what-is-a-honeypot/ 3. Equifax: https://en.wikipedia.org/wiki/2017_Equifax_data_breach
Resources 2. Forensics: https://onlinedegrees.und.edu/blog/cyber-security-forensics/ 4. Executive Order on Cybersecurity:
https://cyberlaw.stanford.edu/blog/2023/03/thoughts-biden-national-
cybersecurity-strategy
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Aniket Amdekar General Manager, Cyber Defense 1. Dr. V. Arulkumar, Associate Professor, SSN College 1. Dr. M.B. Mukesh Krishnan, SRMIST
Education, Great Learning of Engineering
228
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE597T Course CONTAINERS AND CLOUD DevOps Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
229
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning https://aws.amazon.com/ecs/ https://aws.amazon.com/cloudformation/
Resources https://aws.amazon.com/ecr/ https://developer.hashicorp.com/terraform/docs
https://docs.aws.amazon.com/whitepapers/latest/cicd_for_5g_networks_on_aws/ https://www.docker.com/
cicd-on-aws.html https://git-scm.com/doc
https://kubernetes.io/docs/home/
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Partheepan Rudrapathi, CEO, KXE 1. Dr. V. Arulkumar, Associate Professor, SSN College of Engineering 1. Dr. M. Shobana, SRMIST
2. Aniket Amdekar, General Manager, Cyber
Defense Education, Great Learning
230
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE598T Course BIG DATA ANALYTICS AND MICROSERVICES Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: learn about Cassandra
CLR-2: understand Data Analytics & its implementation
CLR-3: learn basics of Hadoop, Hive, AWS EMR, Spark
CLR-4: understand Data Warehousing
CLR-5: learn about limitations of a monolithic application approach
231
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. https://aws.amazon.com/emr/ 5. https://spark.apache.org/
Resources 2. https://12factor.net/ 6. https://martinfowler.com/bliki/StranglerFigApplication.html
3. https://hadoop.apache.org/ 7. https://hive.apache.org/
4. https://martinfowler.com/bliki/CQRS.html
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Aniket Amdekar 1.Dr. L. Ramanathan, Associate Professor, VIT Vellore 1. Dr. SV Shri Bharathi, SRMIST
General Manager, Cyber Defense Education
Great Learning
232
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE599T Course SECURITY AND ARCHITECTURE Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand Shared Responsibility Model
CLR-2: understand AWS Well Architected Framework
CLR-3: understand Zero Trust Principles
CLR-4: design a network for compliance with standards like PCI DSS
CLR-5: secure GRC Architecture
233
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. https://www.iso.org/isoiec-27001-information-security.html 4. Burp suite: https://medium.com/@ramsha.kamran/burp-suite-tutorial-f3ca5bc3368
Resources 2. NIST Risk Management Framework: https://csrc.nist.gov/Projects/risk- 5. Ransomware: https://www.sans.org/blog/protecting-against-ransomware-from-the-
management/sp800-53-controls human-perspective/
3. PCI DSS: https://www.manageengine.com/network-configuration- 6. About Kali Linux: https://kalilinuxtutorials.com/category/blog/
manager/pci-compliance.html
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Partheepan Rudrapathi, CEO, KXE 1. Dr. V. Arulkumar, Associate Professor, SSN College 1. Dr. M. Shobana, SRMIST
of Engineering
2. Aniket Amdekar, General Manager, Cyber Defense Education 2. 2.
Great Learning
234
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE619T SMART CONVERGENT TECHNOLOGIES E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: state the research challenges and innovation directions in IoT Smart environments
CLR-2: explore the IoT and related future internet technologies
CLR-3: address security, energy issues and IoT protocols convergence
CLR-4: summarize the convergence of IoT enabled technologies
CLR-5: define IoT Standardization and case studies
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: outline the smart environment challenge and innovation direction 3 - -
CO-2: demonstrate the IoT enabled technologies for data collection through sensors 3 - 3
CO-3: analyse the various IoT protocols and their usage 2 - 3
CO-4: compile the innovation using cloud computing, big data and AI 2 - 3
CO-5: implement the concepts in any of the case studies mentioned in real time. 3 - 3
235
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Ovidiu Vermesan, SINTEF, Norway & Peter Friess, EU and Belgium, Internet of 3. Ovidiu Vermesan and & Peter Friess, “Internet of Things-From Research and Innovation to
Things: Converging Technologies for Smart Environments and Integrated Market Deployment, River Publishers, 2014.
Ecosystems, River Publishers, 2013. 4. Ajay Rana, Arun Kumar, Sachin Dhawan, Sharad Sharma, Ahmed A Elngar, Convergence
Learning
2. Danda B. Rawat, Lalit K. Awasthi, Valentina Emilia Balas, Mohit Kumar and of Deep Learning and Artificial Intelligence in IoT, CRC Press, 2023.
Resources
Jitendra Kumar Samriya, Convergence of Cloud with AI for Big Data Analytics: 5. Parikshit N, Mahalle, Nancy Ambritta P, Gitanjali Rahul Shinde and Arvind Vinayak
Foundations and Innovations, Wiley, 2023. Deshpande, The convergence of internet of things and cloud for smart computing, CRC
Press, 2023.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Mathangi Nageswar, Director - IoT CS Delivery Mgmt, CTS, 1. Dr. S.Ramakrishna, GITAM University 1. Dr. TYJ Naga Malleswari, SRMIST
Chennai
2. Mr. Harishankar, Renault Nissan Automotive India Pvt Ltd, Chennai 2. Dr. P.Ezhumalai, RMD Engineeering College, Chennai 2. Dr. Annapurani K, SRMIST
236
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE620T COGNITIVE INTERNET OF THINGS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: summarize the fundamentals of IoT and Cognitive Computing
CLR-2: define the various technologies and integration of cognitive capabilities into IoT systems
CLR-3: exploit the different evolutions of deep learning for Cognitive IoT
CLR-4: recognize the security challenges in Cognitive IoT platforms
CLR-5: predict the advanced applications of Cognitive IoT
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: determine the basic ethics and its essentials of Cognitive IoT 2 - 3
CO-2: explore the integration of cognitive capabilities of IoT systems 3 - 3
CO-3: illustrate the various deep learning algorithms for Cognitive IoT solutions 3 - 3
CO-4: implement secure cognitive IoT Framework 2 - 3
CO-5: demonstrate the Advanced applications of Cognitive IoT, 3 - 3
1. Pethuru Raj, Anupama C. Raman, and Harihara Subramanian, Cognitive Internet 5. S. Shanmugavel, M. A. Bhagyaveni and R. Kalidoss, Cognitive Radio-An Enabler for Internet
of Things -Enabling Technologies, Platforms, and Use Cases, CRC Press of Taylor of Things, River Publishers Series in Communications, 2017.
& Francis Group, 2022. 6. K. Hemant Kumar Reddy, Tapas Kumar Mishra, Mir Wajahat Hussain, Diptendu Sinha Roy,
2. JP Patra Gurudatta Verma, Cognitive IoT- Emerging Technology towards Human Handbook of Research on Network-Enabled IoT Applications for Smart City Services, IGI
Learning
Wellbeing, CRC Press Taylor & Francis Group, 2023. Global Publisher, 2023
Resources
3. Mark Fenner, Machine Learning with Python for Everyone, Pearson Education, 7. Dr Ramkumar J and Mr Jegatheesh Kumar G, Cognitive IoT: Internet of Things,
2019. Independently published, 2023.
4. Antonio Gulli, Amita Kapoor, Sujit Pal, Deep Learning with TensorFlow 2 and Keras,
Packet Publishing, 2019.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Mathangi Nageswar, Director - IoT CS Delivery Mgmt, CTS, 1. Dr Surendar M. Assistant Professor; National Institute of 1. Dr. V. Nallarasan, SRMIST
Chennai. Technology, Puducherry.
238
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE621T ADVANCED DISTRIBUTED SYSTEMS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: acquire basic knowledge about distributed systems and its paradigms
CLR-2: introduce different algorithms and consensus in distributed systems
CLR-3: memorize replicated data management and stabilization in distributed systems
CLR-4: obtain knowledge about sensor network and its protocols
CLR-5: gain knowledge about existing real-time distributed systems through use case studies
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: summarize distributed system basics and learn primary concepts 3 - -
CO-2: learn related algorithms for different scenarios 3 - -
CO-3: apply techniques for data management and stabilization 3 - -
CO-4: implementation and integration of distributed sensor network 2 - 3
CO-5: study of real-time use case scenarios 3 - 2
239
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Sukumar Ghosh, Distributed Systems: An Algorithmic Approach, CRC Publication, 3. Maarten Van Steen, Andrew S Tanenbaum, Distributed Systems, Amazon Digital Services,
Learning 2nd Edition, 2015. 4th Edition, 2023.
Resources 2. Nancy A Lynch, Distributed Algorithms, The Morgan Kaufmann Series in Data 4. Andrew S Tanenbaum, Distributed Systems: Principles and Paradigms, Pearson Edition,
Management Systems, 1996. 2023.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. M. Balamurugan, Consultant, TCS 1. Dr. B. Thanasekhar, Professor, MIT Campus, Anna University 1. Dr. R. Swathy, SRMIST
240
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE622T INDUSTRIAL INTERNET OF THINGS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: summarize the fundamental concepts of Industrial IoT, its frameworks and processes
CLR-2: familiarize the architectural modeling for Industrial IoT systems and projects
CLR-3: acquaint different communication and technology mechanisms to implement Industrial IoT in various industries
CLR-4: describe the significance of security and privacy in Industrial Internet of Things
CLR-5: realize the significant trade-offs for IIoT systems in different domains
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: choose the specific frameworks to develop systems for Industrial IoT 3 - -
CO-2: justify the appropriate model to implement for a project 3 - -
CO-3: implement appropriate Industrial IoT techniques using the available resources - - 3
CO-4: secure and implementation of access control techniques in Industrial Internet of Things 3 - -
CO-5: implement the appropriate technique for using Internet of Things in specific industry - - 3
241
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Mahmood, Z. The Internet of things in the industrial sector: Security and device 4. Ameya Deshpande, Bidyut Sarkar, Deep Dave and Ravi Dave, Advanced Manufacturing
connectivity, smart environments, and industry 4.0, Springer, 2019. and Supply Chain with IoT, BPB Publications, 2024.
2. Alcaraz, C. Security and privacy trends in the industrial Internet of things, Springer. 5. Monteiro, A.C.B., França, R.P., Arthur, R., Iano, Y., Segatti, A.C., Carnielli, G.P., Pereira,
2019. J.C., de Godoy, H.A. and Fernandes, E.C. A Look at IIoT: The Perspective of IoT Technology
Learning
3. S. Jha, U. Tariq, Gyanendra Prasad Joshi, and Vijender Kumar Solanki,Industrial Applied in the Industrial Field. In The Industrial Internet of Things (IIoT), (eds R. Anandan,
Resources
Internet of Things, CRC Press, 2022. S. Gopalakrishnan, S. Pal and N. Zaman). https://doi.org/10.1002/9781119769026.ch1,
2022
6. Chris, MQTT and the Purdue Model: IIoT Security Best Practices, Cirrus Link, Aug. 02, 2021.
https://cirrus-link.com/mqtt-and-the-purdue-model-iiot-security-best-practices/
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Mathangi Nageswar, Director - IoT CS Delivery Mgmt, CTS, 1. Dr. Suresh. S, Professor, King Faisal University, Saudi Arabia 1. Dr. Gouthaman. P, SRMIST
Chennai
242
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE623T WIRELESS SENSOR NETWORKS IN IoT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: summarize the wireless sensor networks and communication protocols
CLR-2: utilize localization techniques and time synchronization in wireless sensor network
CLR-3: analyze MAC Layer protocols in wireless sensor network
CLR-4: evaluate routing protocols in wireless sensor network
CLR-5: apply middleware architecture and security mechanism for wireless sensor network
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: identify the applications of wireless sensor network, communication protocols and configure the Contiki 3 - -
CO-2: describe how localization techniques and time synchronization work in wireless sensor network 3 - -
CO-3: analyze the different MAC protocols and its challenges in wireless sensor network 3 - -
CO-4: examine the various routing protocols, strategies and issues in wireless sensor network 2 - 3
CO-5: recognize the middleware and the need for the security and various attacks and solutions - - 2
243
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Kazem Sohraby and Daniel manoli, Wireless Sensor networks- Technology, 4. C.S Raghavendra, Krishna M.Sivalingam and Taieb znati, Wireless Sensor Networks,
Protocols and Applications, Wiley InterScience Publications, 2013. Springer Science, 2010.
2. Waltenegus Dargie and Christian Poellabauer, Fundamentals of Wireless Sensor 5. Bhaskar Krishnamachari, Networking Wireless Sensors, Cambridge University Press, 2005.
Learning
Networks, Theory and Practice, Wiley Series on wireless Communication and 6. https://anrg.usc.edu/contiki/index.php/Contiki_tutorials, 2016.
Resources
Mobile Computing, 2011.
3. S.Swapna Kumar, A Guide to Wireless Sensor Networks, kindle Edition, USP
publications, 2017.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Mohanraj, Standard Chartered GBS 1. Dr. P. T. V. Bhuvaneswari, Professor, MIT Campus, Anna University 1. Dr. R. Kayalvizhi, SRMIST
244
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE624T FOG NETWORKS IN IoT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: memorize the fundamentals of IoT and the new computing paradigms
CLR-2: gain knowledge about the Orchestration, Optimization and Middleware for Fog Computing:
CLR-3: apply techniques for data management and Predictive Analysis in Fog Computing
CLR-4: realize the significance of Security and Privacy of Internet of Things (IoT) Systems
CLR-5: explore the Modeling and Simulation of Fog Computing.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: summarize the need of Fog computing and its modelling techniques 3 3
CO-2: explore the Orchestration, Optimization techniques and design of Middleware for Fog Computing 3 -
CO-3: apply various data management techniques and analytics for fog computing - 3
CO-4: examine the security and privacy of Internet of Things (Iot) systems 3 2
CO-5: apply the knowledge of iFogSim for modelling and simulation of application 3 3
245
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Zaigham Mahmood FOG Computing: Concepts, Frameworks and Technologies, 3. Mahmood, Zaigham (Ed.), Fog Computing Concepts, Frameworks and Technologies,
Learning Springer Publications, 2018. Springer, 2018.
Resources 2. Buyya, Rajkumar, and Satish Narayana Srirama, Fog and Edge computing: 4. Bahga, Arshdeep, and Vijay Madisetti, Cloud computing: A hands-on approach, 2nd Edition,
Principles and Paradigms, 1st Edition, John Wiley & Sons, USA, 2019. CreateSpace Independent Publishing Platform, USA. 2014.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Thamizh Arasan, Technical Lead, Tech Mahindra, Chennai 1. Dr. A. Gayathri, Professor, Saveetha Institute of Medical and 1. Dr. G. Geetha, SRMIST
Technical Sciences (SIMATS), Chennai
246
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE626T HACKER TECHNIQUES AND INCIDENT HANDLING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand different profiles of hackers and ethical standards.
CLR-2: gain knowledge about cryptography concepts and physical access control.
CLR-3: know about social overview of various hacking techniques.
CLR-4: learn on concepts of enumeration and computer system hacking.
CLR-5: understand web attack and impact of malware with its persistent types.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: discuss about various hacking techniques and report incidents. 2 2 3
CO-2: use cryptography techniques in hacking for increasing stealth technique. 2 - -
CO-3: implement social engineering attack after target enumeration. 2 - 3
CO-4: use various password cracking techniques for performing active attacks. - 2 -
CO-5: classify different types of malware based on its families. - 2 3
247
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
2. Bothra Harsh,Mastering Hacking,Khanna Publishers, 2021.ISBN: 9789386173843
Learning 1. Oriyano Sean Philip,Hacker Techniques, Tools, And Incident Handling,Jones and
3. AbhinavOjha,Beginners Guide To Ethical Hacking and Cyber Security,Notion Press, 2020.
Resources Bartlett Publishers, 2018.ISBN: 9780763791834
ISBN: 9781649832900
Learning Assessment
Summative
Continuous Learning Assessment (CLA) Final Examination
(40% weightage)
Bloom’s Formative Life Long Learning
Level of Thinking CLA-1 Average of unit test CLA-2 –
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Bhawana Rudra Assistant Professor (Grade I) National
1.Mr.Karthik Expert Member from k7 Computing 1.Dr. V. Joseph Raymond, SRMIST
Institute of Technology, Warangal
248
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE627T Course INTERNET OF THINGS AND COGNITIVE COMPUTING Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course At the end of this course, learners will be able to: Programme
Outcomes (CO): Outcomes(PO)
1 2 3
CO-1: demonstrate knowledge of basics of the Internet of Things and Cognitive Computing 2
CO-2: choose and use appropriate Machine Learning algorithm for CIoT. 2
CO-3: develop and deploy the IoT application into the cloud environment 2
CO-4: identify efficient parallel programming patterns to solve problems. 1 3
CO-5: implement IoT application using Zynq programming 1 3
249
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. Machine Learning with Python for Everyone, By Mark Fenner, Pearson Education, 2019 5.. Exploring Zynq Mpsoc: With Pynq and Machine Learning Applications, Crockett H.
Resources 2. Real-Time Embedded Components and Systems with Linux and RTOS, Sam Siewert and John Louise, Northcote David, Ramsay Craig, Strathclyde Academic Media, 2019
Pratt, Mercury Learning 2015 6.Cognitive Internet of Things Enabling Technologies, Platforms, and Use Cases By
3. Deep Learning with TensorFlow 2 and Keras, By Antonio Gulli, Amita Kapoor, Sujit Pal, Packt Pethuru Raj, Anupama C.Raman, Harihara Subramanian,1st Edition CRC Press,
Publishing, 2019 Taylor & Francis Group,2022
4. Deep Learning with TensorFlow, By Giancarlo Zaccone, Md. Rezaul Karim, Ahmed Menshawy,
Packt Publishing, 2017
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100% 100% 100%
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. S. Kumarasamy, ASSO-consultant - HCL Technologies 1. Dr. L. Jayakumar, National Institute of Technology, Agartala, 1. Dr. S. Gnanavel, SRMIST
Limited Tripura
2. Prof. K. Jayashree, Panimalar Engineering College, Chennai
250
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE628T CYBER LAW AND ETHICS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: familiarize yourself with the meaning of cyberspace, cybercrime, cyberlaw, IT, the web, and web services.
CLR-2: learn the ins and outs of cyberspace, computing, and the many forms of cybercrime from a legal perspective.
CLR-3: learn the definitions of cybercrime and computer crime and be familiar with the international and Indian responses to this growing problem.
CLR-4: understand the repercussions and challenges of cybercrime and be familiar with the legalities of criminal liability.
CLR-5: explore the perspective of human rights on cyber-crime, precautions to take against cyber-crime, and methods to prevent cyber-crime.
Programme Outcomes
Course Outcomes (PO)
At the end of this course, learners will be able to:
(CO):
1 2 3
CO-1: familiarize yourself with the ideas behind cyberspace, cyber crime, IT, the Internet, and associated services. 2 1
CO-2: several kinds of cybercrime should be listed and examined. 2 3
CO-3: define cybercrime and computer crime 2 1
CO-4: get to know cyber crime from an international and indian point of view. 1 2
CO-5: defend human rights and prevent cybercrime by outlining the steps to take. 1
251
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Cyber Crimes: Discovery and Appreciation of Evidences: Introduction, Law of Evidence, Evidences in Cyber Crimes: Challenges and Implications, Computer Generated Evidence and their Admissibility, Judicial
Interpretation of Computer related Evidence. Prevention of Cyber Crimes: National and International Endeavors: Introduction, International Services on Discovery and Recovery of Electronic and Internet
Evidence, International Organization on Computer Evidence (IOCE), OECD Initiatives, Efforts of G-7 and G-8 Groups, Endeavors of Council of Europe, Measures of United Nations, Efforts of WTO, Measures of
World Intellectual Property Organization (WIPO),Interpol and its Measures, Efforts in India, Need of International Assistance and Appropriate Amendments, U.S. Laws on Cyber Crimes, U.S. Case-law on Cyber
Evidences and Related Issues.
1. Jonathan Rosenoer, “Cyber Law: The Law of the Internet”, Springer-Verlag, 3. Salvatore J. Stolfo, Steven M. Bellovin, ShlomoHershkop, AngelosKeromytis, Sara Sinclair,
Learning 1997. Sean W. Smith, “Insider Attack and Cyber Security – Beyond the Hacker”, Springer, 2008
Resources 2. Mark F Grady, Francesco Parisi, “The Law and Economics of Cyber Security”, 4. New Jersey division of consumer affairs, “Cyber Security Handbook”.
Cambridge University Press, 2006. India: Cybersecurity 2020, ICLG.com
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. A. Subashree, Sri Ramachandra Institute of Higher
1.Dr.A.Mohanraj, Data Engineer, Standard Chartered 1.Dr.C.N.S.Vinoth Kumar, SRMIST
Education and Research, Faculty of Management
252
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE629T WIRELESS SECURITY E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the Wireless Standards Security: Vulnerabilities in existing Wireless networks
CLR-2: learn Physical Layer Security and Detecting selfish behavior in hotspots, Selfish behavior in pure ad hoc networks, MAC layer defenses.
CLR-3: understand the various Network Layer Security, Securing ad hoc network routing protocols
CLR-4: understand the basic concepts of Game Theory: Normal Form Games, Strict Dominance, Weak Dominance
CLR-5: understand the various methods and protocols in Game. Applications: RFID Security, Security for Wireless Sensor Networks, Security for Vehicular Networks.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: acquire fundamental knowledge on the concepts of wireless standard security 2 1 1
CO-2: acquire the ability to apply physical layer security in wireless devices 1 3 2
CO-3: utilize the principles of Network Layer security in wireless devices 1 2 3
CO-4: acquire the ability to apply the concept of Game Theory 3 2 1
CO-5: acquire fundamental knowledge on the concepts of Game theory in wireless security 2 3 2
253
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. NicholosLekkas, “Wireless Security”, McGraw-Hill, 2000. 4. James Kempf, Wireless Internet Security: Architectures and Protocols, 2008.
2. KavehPahlavan and Prashant Krishnamurthy, “Principles of Wireless Networks”, 5. William Stallings, Wireless Communications & Networks, 2004.
Learning Prentice Hall, 2006 6. Jennifer Minella, Wireless Security Architecture: Designing and Maintaining Secure Wireless
Resources
3. D. P. Agrawal and Q.-A. Zeng, Introduction to Wireless and Mobile Systems (4th for Enterprise, Wiley Publication, 2022. ISBN: 978-1-119-88305-0
edition), Cengage Learning, 2014.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr.A.Mohanraj, Data Engineer
1.Dr.A.Arivudainambi , Professor, CEG, Anna University 1.Dr. K.A.Varunkumar, SRMIST
Standard Chartered
254
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE630T OPERATING SYSTEM INTERNALS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the sample open source programs and header files.
CLR-2: learn how the processes are implemented in Linux.
CLR-3: understand the implementation of the Linux file system.
CLR-4: acquire the knowledge in the implementation of interprocess communication.
CLR-5: understand the Linux memory management data structures and algorithms.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: acquire fundamental knowledge on the concepts of operating systems 2 1 1
CO-2: acquire the ability to apply process in operating system 1 3 2
CO-3: utilize the principles of file systems in operating system 1 2 3
CO-4: acquire the ability to apply the concept of memory management 3 2 1
CO-5: acquire fundamental knowledge on the concepts of process communications and memory management 2 3 2
255
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
2. Harold Abelson, Gerald Jay Sussman and Julie Sussman, Structure and Interpretation of
Learning 1. Daniel P. Bovet and Marco Cesati, "Understanding the Linux Kernel", 3rd Edition, O'Reilly
Computer Programs‖, Second Edition, Universities Press, 2021
Resources Publications, 2017.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr.A.Mohanraj, Data Engineer, Standard Chartered 1.Dr.A.Arivudainambi , Professor, CEG, Anna University 1.Dr. K.A.Varunkumar, SRMIST
256
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE631T RISK ASSESSMENT AND SECURITY AUDIT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the fundamental knowledge about Information Risk.
CLR-2: understand the various analysis on Information Risk Assessment.
CLR-3: understand the demand for IS Audit.
CLR-4: understand the IT audit and its activities.
CLR-5: understand the techniques for implementing security in audit.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: acquire the knowledge on the fundamentals of Risk assessment 1
CO-2: acquire the ability to apply various techniques for data collection 2
CO-3: utilize the principles of data analysis 2
CO-4: acquire the ability to apply IS audit 1 3
CO-5: apply the knowledge gained on auditing methodologies 2
257
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. MarkTalabis, “Information Security Risk Assessment Toolkit: Practical Assessments
3. RobertJ,Schalkoff,“PatternRecognition:Statistical,StructuralandNeuralApproaches”, John
through Data Collection and Data Analysis”, Syngress; 1 edition, ISBN: 978-1-
Learning Wiley&SonsInc.,New York, Reprint2014.
59749-735-0, 2012.
Resources 4. Douglas Landoll , The Security Risk Assessment Handbook, CRC Press,2021. ISBN:
2. David L. Cannon, “CISA Certified Information Systems Auditor Study Guide”, John
9781000413250
Wiley & Sons, ISBN: 978-0-470-23152-4, 2009.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Bhawana Rudra Assistant Professor (Grade I) National 1.Dr.M.B. Mukesh Krishnan,SRMIST
1.Mr.Karthik Expert Member from k7 Computing
Institute of Technology, Warangal
2.Dr.V.Joseph Raymond,SRMIST
258
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE632T ESSENTIALS OF DATA SCIENCE ON CLOUD COMPUTING E PROFESSSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: perform cloud based bigdata processing
CLR-2: use various cloud based tools for data processing
CLR-3: use various cloud based tools for data analysis
CLR-4: train machine learning models using cloud services
CLR-5: design interactive dashboards for data exploration and reporting
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: explain the basic concepts of data science and cloud computing 2 2
CO-2: apply the data processing techniques using cloud-based tools and services 2 2
CO-3: perform data analysis using cloud-based tools 2 2
CO-4: deploy machine learning models in the cloud 2 2
CO-5: perform data visualization using cloud-based tools 2 2
259
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Foster Provost and Tom Fawcett, Data Science for Business, first edn, O'Reilly Media, 2. Jiahui Liu and Wei Tan, Cloud Computing for Data Analysis and Scientific
Learning
Resources 2013. Research.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Hari Prasad Prabhu, Senior Consultant 1. Dr E Kavitha, Associate Professor
1.Dr. Vedhavathy T R, SRMIST
Deloitte, Chennai Anna University (Villupuram Campus)
260
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE633T COMPUTER VISION ON EDGE COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the fundamental concepts of computer vision for image processing
CLR-2: explain the image processing operators and methods for computer vision
CLR-3: understand the image recognition methods for edge and computer vision.
CLR-4: understand the architecture, technology, challenges, and applications for edge computing.
CLR-5: acquire the knowledge of the techniques and strategies for edge computing.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand the fundamental concepts of computer vision for image processing 2 2 2
CO-2: perform the image processing operators and methods for computer vision 2 2 2
CO-3: explore the image recognition methods for edge and computer vision. 2 2 2
CO-4: evaluate the architecture, technology, challenges, and applications for edge computing 2 2 2
CO-5: apply the techniques and strategies for edge computing. 2 2 2
261
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Richard Szeliski, Computer Vision: Algorithms and Applications
2nd Edition, The University of Washington, 2022. 5. https://moschip.com/blog/ai/model-quantization-for-edge-ai/
2. Ranjay Krishna, Computer Vision: Foundations and Applications, 6.https://www.edge-ai-vision.com/2023/12/from-theory-to-practice-quantizing-convolutional-neural-networks-for-
Learning Ist Edition, Stanford University, 2017. practical-
Resources 3. https://www.sciencedirect.com/science/article/pii/S23528648220 deployment/#:~:text=Model%20compression%20techniques%20are%20crucial,edge%20devices%20with%20reduced
0024 %20weight.
4. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9919555/pdf/sens 7. https://viso.ai/edge-ai/edge-devices/
ors-23-01279.pdf
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.Kumanan P, Technical lead, CTS, Chennai 1.Dr Rahul Raman, IIIITDM, Kanchipuram 1.Dr P Balamurugan, SRMIST
2.Dr V D Ambethkumar, Central University, Mizoram 2.Dr M Saravanan, SRMIST.
262
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE634T MIGRATION TECHNIQUES ON CLOUD ARCHITECTURE E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: apply the cloud computing characteristics to support effective and efficient cloud migration
CLR-2: perform application analysis, document the migration strategy and select the cloud provider.
CLR-3: migrate application data to the AWS PostgreSQL Relational Data Service.
CLR-4: present cloud-native agile development workflow within a provisioned environment
CLR-5: develop a cloud operations runbook to ensure smooth and express resolution of any post-migration or operational incidents
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: identify the necessity for cloud migration to build efficient cloud architecture. 3 2 3
CO-2: categorizing the documents for cloud migration to prepare a risk log. 3 2 3
CO-3: organize the cloud clusters for better deliverable in the Kubernetes. 3 3 3
CO-4: develop an agile workflow for cloud software development. 3 3 2
CO-5: implement the cloud migration techniques in the different cloud platforms. 3 3 2
263
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. Taras Gleb, “Systematic Cloud Migration A Hands-On Guide to Architecture, 3. Michael C. Daconta,” The Great Cloud Migration: Your Roadmap to Cloud Computing, Big Data
Resources Design, and Technical Implementation”, Apress, 2021, 978-1-4842-7251-0. and Linked data, Kindle edition, B00G4N2H9O.
2. Saurabh Shrivastava Neelanjali Srivastav,” Solutions Architect's Handbook 4. Kieran Broadfoot,” A Practical Guide to Cloud Migration”, O'Reilly Media, Inc,2021,
Second Edition”, Packt Publishing, 2022 978-1-80181-661-8. 9781492095170.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.Naveen, Lead Security Engineer 1.Dr. Anand Kumar, Assistant Professor, Department of Information 1.Dr.V.Pandimurugan SRMIST
Freshworks, GLOBAL INFOCITY PARK, 40, MGR Main Rd, Kodandarama Technology, NITK, Surathkal.
Nagar, Perungudi, Chennai,
264
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE635T DESIGNING SCALABLE CLOUD-NATIVE SYSTEMS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: design, architect, build, and deploy cloud-native application
CLR-2: choose the right services for public, private, and hybrid cloud deployments
CLR-3: optimize cloud resources by leveraging microservice architecture
CLR-4: containerize applications using Docker
CLR-5: orchestrate container deployment using Kubernetes
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: create Docker containers for microservices and set up continuous integration with Jenkins 2 3 2
CO-2: monitor and troubleshoot applications in the cloud 2 3 3
CO-3: use Docker and Kubernetes for containerization 3 3 3
CO-4: perform log aggregation and visualization with the Elasticsearch, Logstash, and Kibana (ELK) stack 2 2 2
CO-5: migrate from a monolithic architecture to a cloud-native deployment 3 2 2
265
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1.Anthony T.Velte, Toby J. Velte, Robert Elsenpeter, “Cloud Computing a Practical
Learning 3. Cloud Native Applications Micheal Wittig and Andreas Wittig.
Approach”, Tata McGraw-HILL, 2010 Edition.
Resources E-Book Innovate and Transform with a modern application platform
2. Barrie Sosinsky, “Cloud computing bible, Wiley Publishing
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr.Muthuraman, Associate Professor, Government College of
1.Mr.M.Saravana Kumar, TCS, Chennai 1.Dr.B.LakshmiDhevi, SRMIST
Technology, Coimbatore
266
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE636T EMERGING TECHNOLOGIES IN CLOUD COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the importance of emerging technologies in the cloud computing.
CLR-2: assess the need for serverless computing as it is implemented in the cloud.
CLR-3: understand the architecture of edge computing and the role in computation and data storage
CLR-4: emphasize the implementation of containerization and orchestration in cloud computing
CLR-5: understand the importance of green cloud computing and analyze the requirements for implementation in the real-time.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand the difference between the traditional and emerging technologies in cloud computing 1 2 1
CO-2: analyze the key components of serverless computing and develop applications using serverless architecture. 2 1 3
CO-3: understand of the architecture and infrastructure of edge computing and integration in various cloud architectures. 2 1 3
CO-4: understand and analyze the various components and their deployment of containerization and orchestration in cloud computing. 2 1 3
CO-5: awareness and understanding about the green computing in using the technologies in cloud computing 2 2 1
267
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Overview of Cloud Computing in Healthcare – Importance of Cloud Computing in Healthcare – Challenges and Opportunities – Fundamentals of Healthcare Data Management – Electronic Healthcare Records
(EHR) – EHR Cloud Ecosystem – Health Information Exchange (HIE) – Data Security and Privacy Concerns – Cloud Infrastructure for Healthcare – Applications of Cloud Computing in Clinical Practice –
Telemedicine and Remote Patient Monitoring – Health Analytics and Predictive Modeling – Cloud-based Healthcare Solutions Case Study
Module-5 - Green Cloud Computing 9 Hour
Understanding Green Cloud Computing – Energy Efficient Hardware and Infrastructure – Efficient Datacentre Design and Optimization – Renewable Energy in Cloud Data Centres – Virutalization and Resource
Consolidation – Cloud Provider Sustainability Initiatives – Carbon Offsetting – Renewable energy Procurement – Environmental Footprint – Green Data Management Practices – Energy Aware Workload Management
– Regulatory Compliance and Green Certifications - Energy Star, LEED, and ISO 50001 – Future Trends and Innovations in Green Cloud Computing – energy-powered data centers, energy-aware algorithms, and
carbon-neutral cloud services
1. Erl, T., Puttini, R., & Mahmood, Z. (2013). Cloud computing: concepts, technology & :
architecture. Pearson Education.Sumner Blount, Rob Zanella, “Cloud Security and 4. Sbarski, P., & Kroonenburg, S. (2017). Serverless architectures on AWS: with examples using Aws
Governance: Who's on your cloud?”, IT Governance Publishing, 2010. Lambda. Simon and Schuster.
Learning
2. Garrison, J., & Nova, K. (2017). Cloud native infrastructure: Patterns for scalable 5. Bhatt, C. M., & Peddoju, S. K. (Eds.). (2016). Cloud computing systems and applications in
Resources
infrastructure and applications in a dynamic environment. " O'Reilly Media, Inc.". healthcare. IGI Global.
3. Buyya, R., Broberg, J., & Goscinski, A. M. (Eds.). (2010). Cloud computing: Principles 6.. Gholamhosseinian, A., & Khalifeh, A. (2012). Cloud computing and sustainability: Energy efficiency
and paradigms. John Wiley & Sons. aspects.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of Unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Muthuraman, Associate Professor, Government College of Technology,
1.Mr. Hari Prasad Prabhu, Senior Consultant Coimbatore
1.Dr. Nivedhitha M, SRMIST
Deloitte, Chennai 2.Dr. K. Prakash, Assistant Professor, Government College of Engineering,
Dharmapuri
268
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE637T Course DEEP LEARNING AND ITS APPLICATIONS Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: demonstrate knowledge of the fundamentals of Neural Networks and Deep Learning. 3 - 2
CO-2: apply Advanced Deep Learning Techniques 3 - 3
CO-3: design and Implement Convolutional Neural Networks (CNNs) 3 - 3
CO-4: implement Recurrent Neural Networks (RNNs) and Sequence Modeling 3 - 3
CO-5: investigate Generative Models and Unsupervised Learning 3 - 3
269
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Greedy Layer-wise Unsupervised Training, Transfer Learning and Domain Adaptation, Semi-Supervised Disentangling of causal factors,Challenges of Unstructured Modelling, Sampling from
Graphical Models, Advantages of Structured Modelling, Learning about Dependencies, Inference and Approximate inferences, Sampling and Monte Carlo Methods , Importance Sampling, Markov
Chain Monte Carlo Methods , Gibbs Sampling and Challenges of Mixing of Separate Models.
Module-5 - Boltzmann and Deep Learning Applications 9 Hour
Boltzmann Machines, Deep Belief Networks, Deep Boltzmann Machine and with Real-valued data, convolutional boltzmann machine, Boltzmann machines for structured or sequential output, Other
Boltzmann Machines, Directed Generative Nets, Large Scale Deep Learning , Computer Vision , Speech Recognition
Learning 1. Ian Good Fellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2017. 4. Ragav Venkatesan, Baoxin Li, “Convolutional Neural Networks in Visual Computing”,
Resources 2. Francois Chollet, “Deep Learning with Python”, Manning Publications, 2018 CRc Press, 2018
3. Phil Kim, “Matlab Deep Learning: With Machine Learning, Neural Networks and Artificial 5. Navin Kumar Manaswi, “Deep Learning with Applications Using Python”, Apress,
Intelligence”, Apress , 2017. 2018.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100% 100% 100%
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Mariappan Vaithilingam, Brahmarsive Inc, Bengaluru, India 1.Dr. Sagarika, Great Learning 1.Dr.C.N.Subalalitha, SRMIST
270
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course E PROFESSIONAL ELECTIVE L T P C
21CSE639T BLOCKCHAIN TECHNOLOGIES
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the Blockchain and the Basics of Cryptography
CLR-2: acquire the knowledge of Consensus mechanisms and Smart contracts
CLR-3: develop acquaintance with the various Blockchain attacks
CLR-4: apply any programming techniques to understand the available blockchain platforms
CLR-5: implement any use cases using the blockchain technology
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: describe core blockchain concepts, the benefits, and the limitations of blockchain technologies. - 2 -
CO-2: evaluate the technical terms of different consensus of blockchain technology at sufficient depth to perform an analysis. 3 2 -
CO-3: understand the various types of attacks on blockchain networks. - - 3
CO-4: analyze various blockchain concepts to analyze types of blockchain platforms, proposals, and preliminary blockchain system design discussions. - 2 -
CO-5: evaluate real-world challenges that blockchain technologies may assist in solving 1 2 -
271
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
T8: Explanation of how each attack works and its potential impact on the blockchain network.
T9: Practical session on implementing and verifying zero-knowledge proofs using libraries like libsnark.
Module-4 – Blockchain Platforms 9 Hour
Ethereum: History of Ethereum - From Bitcoin to Ethereum – Blockchain Trilemma - DAO Attack – Ethereum Classic vs Ethereum - Ethereum accounts- Ether- Mining ether – Wallets for Ethereum – Tokens –
Ethereum 2.0 – Basics of Solidity Programming - Hyperledger Fabric: Architecture of Hyperledger Fabric v1.1-Introduction to Hyperledger Fabric v1.1, chain code.
T10: Practical session on creating Ethereum accounts and managing Ether.
T11: Hands-on demonstration of mining Ether and setting up a mining rig.
T12: Tutorial on different types of wallets
Module-5 - Blockchain Applications 9 Hour
Blockchain Finance: A Case study on Bitcoin - Blockchain in Financial Software and Systems (FSS) -Settlements – KYC - Capital Markets – Insurance - Blockchain in trade/supply chain – Adoption of Blockchain
Technology: A Case Study of Walmart - Blockchain in Healthcare - Blockchain for Government.
T13: Tutorial on implementing multi-factor authentication and other security measures for wallet access.
T14: Discuss blockchain trilemma and how Ethereum addresses scalability, security, and decentralization.
T15: Discuss any government case studies implementing blockchain.
1.Josh Thompson, ‘Blockchain: The Blockchain for Beginnings, Guild to Blockchain Technology and
3. Arshdeep Bahga and Vijay Madisetti. Blockchain applications: a hands-on approach.
Blockchain Programming’, Create Space Independent Publishing Platform, 2017.
Vpt, 2017.
Learning 2.Imran Bashir, “Mastering Blockchain: Distributed ledger technology, decentralization, and smart
4. Alessandro Parisi, securing blockchain networks like Ethereum and hyperledger
Resources contracts explained”, Packt Publishing,2019.
fabric:Learn advanced security configurations and design principles to safeguard
3.Imran Bashir, “Mastering Blockchain: A deep dive into distributed ledgers, consensus protocols,
blockchain networks, Ist edition, Packt publishing,Birmingham,2020
smart contracts, DApps, cryptocurrencies, Ethereum, and more”. Packt Publishing Ltd, 2020.
272
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr.Sagarika, Senior Data Scientist, Great Learning 1.Dr. Anandhakumar P, Professor, Madras Institute of Technology, 1. Dr.B.Subashini, SRMIST
Chrompet
2. Dr.Syed Ismail, SRMIST
273
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE641T SECURITY FOR MACHINE LEARNING APPLICATIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: introduce the fundamental concepts and intersections of cyber security and data science
CLR-2: understand core principles of cyber security and their application in protecting information systems
CLR-3: understand secure data sharing practices and cloud security to protect sensitive information
CLR-4: implement SIEM, real-time threat detection, and effective incident response
CLR-5: understand and apply defense mechanisms to enhance the security and privacy of machine learning models
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: explain the key concepts of cyber security and data science, and identify the impact of cyber threats on data science processes - 2 -
CO-2: apply CIA principles to ensure data security and regulatory compliance 2 3 2
CO-3: implement secure data transfer protocols ensuring privacy and compliance 2 2 3
CO-4: implement SIEM, analyze logs, and execute incident response frameworks for threat management 1 1 2
CO-5: analyze and implement advanced cybersecurity measures to safeguard data science models against adversarial attacks 3 2 3
274
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. "Cybersecurity and Data Science: How Data Science is Revolutionizing 4. "Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance" by Tim
Cybersecurity" by Kevin Mandia and Steve Johnson, Wiley(2021) Mather, Subra Kumaraswamy, and Shahed Latif, O'Reilly Media(2009)
Learning 2. "Data Science for Cyber Security: A Practical Guide" by Michael J. O'Leary, 5. "Security Information and Event Management (SIEM) Implementation" by David Miller and
Resources Springer(2021) Shon Harris, Syngress(2015)
3. "Principles of Cybersecurity: A Hands-On Guide" by Tim Mather, Subra 6. "Incident Response & Computer Forensics, Third Edition" by Jason Luttgens, Matthew Pepe,
Kumaraswamy, and Shahed Latif, Wiley(2017) and Kevin Mandia, McGraw-Hill Education(2014)
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan,SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2. Dr.S.Kanaga Suba Raja,SRMIST
3. Dr.R.Balaji Ganesh,SRMIST
4.Dr.R.Deebalakshmi,SRMIST
275
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE642T Course CLOUD NATIVE APPLICATION DEVELOPMENT Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: comprehend the Cloud Native system structure and its functionalities
CLR-2: experiment Kubernetes implementation on Public and Private Clouds along with Security Challenges
CLR-3: discover Cloud Native Patterns and Event Collaboration services
CLR-4: implement Cloud Native applications using JAVA Language
CLR-5: implement Cloud Native applications using PYTHON Language
Programme Outcomes
Course
At the end of this course, learners will be able to: (PO)
Outcomes (CO):
1 2 3
CO-1: design Cloud Native system design structure and its functionalities 3 - -
CO-2: build Kubernetes services and Security solutions under Cloud Native applications 3 - -
CO-3: deploy Cloud Native patterns and various Event based system components 2 - 3
CO-4: develop Cloud Native real time applications in JAVA Language - 2 3
CO-5: build Cloud Native real time applications in Python Language - 2 3
276
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Cloud Native Concepts – Python, Twelve factor app -Python Environment, Building Microservices in Python, Building Web applications in Python, AWS Platform deployment, Azure Platform deployment,
Dockerizing the Services, Securing the Web application.
1. Pethuru Raj,Skylab Vanga,AkshitaChaudhary, “Cloud-Native Computing”John Wiley& sons 5. Jonathan Bartlett, Cloud Native Applications with Docker and Kubernetes,
Publishers,2023. APress Publishers, 2022.
2. Boris Scholl, Trent Swanson, Peter,Cloud Native-using containers,Functions,and Data to Build 6. Ajit Pratap Kundan, Mainak Chakraborty, Monitoring Cloud-Native
Learning
Next Generation applications, O’Reilly Publishers,2019. Applications, APress Publishers, 2021.
Resources
3. Ajay Mahajan, Munish Kumar, shyam, Cloud Native applications in Java, Packt Publishing Ltd, 7. Kamal Arora, Erik Farr, Architecting Cloud Native applications, Packt
2018. Publishing Ltd, 2019
4. Manish Sethi, Cloud Native Python, Packt Publishing Ltd, 2017.
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. R. Shivakumar, Hexaware Technologies 1. Prof. K. Vivekanandan, Pondicherry technological University, 1. Dr. S. Ramamoorthy, SRMIST
2. Prof. U. Srinivasulu Reddy, NIT Trichy
277
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE643T Course MICROSERVICES AND SERVICE BASED Course E PROFESSIONAL ELECTIVE L T P C
Code Name ARCHITECTURES Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the main protocols and various Web services specification standards
CLR-2: understand the main concepts, principles, needs and evolution of Service Oriented Architecture (SOA)
CLR-3: understand and apply patterns for service design from the provider and requester perspectives
CLR-4: understand the architecture of Microservices and Hybrid cloud services and its tools
CLR-5: learn about the microservices implementation and its deployment on cloud
278
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Trend in SOA – Microservices Architecture (MSA): Services Model for Cloud and Mobile Solutions, API Adoption on the Rise, Challenges and Takeways from SOA Implementations Architecture Trend –
Microservices Architecture, Microservices Architecture in Action, Cloud and MSA: Cloud Services, Hybrid Cloud Service and its considerations, Cloud Services and MSA, MSA for SMAC Solutions, MSA
Platforms and tools: Docker, containers and Kubernetes, Graph QL integration, CI/CD Pipeline for Microservices.
Module-5 – Microservice Based Applications 9 Hour
Implementing Microservices with Python – Microservice Discovery Framework – Coding, Testing and Documenting Microservices – Interacting with Other Services – Monitoring and Securing the Services
– Containerized Services – Deploying on Cloud, Mobile and MSA: Mobile Technologies, Types of Mobile Applications, MSA for mobile solutions, Case study: MSA – APIary PoC, Building a scalable e-
commerce platform or a cloud-native application.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. D. V. Mohan, Cloudera, Bangalore, India. 1. Prof. Y. Asnath Phamila, VIT, Chennai. 1. Dr. M. Rajalakshmi, SRMIST.
2. Dr. G. Niranjana, SRMIST.
279
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE644T Course WEB AND SOCIAL MEDIA ANALYTICS Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: exhibit knowledge on key objectives and goals of web and social media analytics - 2 -
CO-2: apply the skills necessary to identify data from various web and social media platforms 3 - -
CO-3: analyze data for uncovering insights and trends within web and social media datasets 3 - 2
CO-4: derive actionable insights using key performance indicators - 2 -
CO-5: exhibit proficiency in using analytics tools for web and social media data analysis - - 3
280
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Google Analytics – Identifying and Optimizing Poorly Performing Pages –Top Landing Pages (Bounce Rates) – Funnel Visualization – IBM Amplify : Data Identification – Data Analysis – Information
Interpretation
Learning 1. Matthew Ganis, Avinash Kohirkar, “Social Media Analytics: Techniques and Insights for 5. Stefan Stieglitz, Christoph Nueberger, “Social Media analytics” Article in
Resources Extracting Business Value Out of Social Media” Pearson 2016 Business & Information Systems Engineering,· April 2014, DOI:
2. Brian Clifton, “Advanced Web Metrics with Google Analytics”, 2nd Edition, Wiley Publishing 10.1007/s12599-014-0315-7
Inc., 2012 6. Social Media analytics : Introduction:
3. Reza Zafarani, Mohammad Ali Abbasi, Huan Liu “Social Media Mining: An Introduction”, https://www.spiceworks.com/marketing/ advertising/articles/what-is-social-
Cambridge University Press, 2014 media-analytics/
4. Gabor Szabo Gungor Polatkan Oscar Boykin Antonios Chalkiopoulos, “Social Media Data 7. Web Analytics: Introduction: https://www.techtarget.com/searchbusiness
Mining and Analytics”, John Wiley & Sons, Inc, 2019. analytics /definition/Web-analytics
8. Web Analytics: https://www.tutorialspoint.com/web_analytics/web_analytics
quick_ guide.htm
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Saju G Nair, Associate director, Kyndryl India Pvt Ltd., 1. Dr. V. Shanmuganeedhi, NITTTR, Chennai. 1. Dr. D. Malathi, SRMIST
Bangalore
2. Prof. Khanna Nehemiah, Anna University, Chennai
281
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE645T SERVER-SIDE PROGRAMMING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the foundations of server-side programming concepts
CLR-2: explore the server-side scripting languages
CLR-3: implement different web application frameworks
CLR-4: design databases using SQL for web applications
CLR-5: comprehend advanced server-side concepts and security practices
Programme Outcomes
Course
At the end of this course, learners will be able to: (PO)
Outcomes (CO):
1 2 3
CO-1: exhibit knowledge of server-side programming concepts and carry out basic server setup. 1 - -
CO-2: demonstrate knowledge of server-side scripting languages. - 1 -
CO-3: develop scalable web applications - 1 -
CO-4: design and execute SQL queries for web applications - - 3
CO-5: integrate serverless computing and security practices to design scalable applications - - 3
282
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Introduction to databases (MySQL, PostgreSQL, MongoDB, COSMOS DB) - SQL fundamentals (SELECT, INSERT, UPDATE, DELETE) - Database design and normalization - Query optimization
techniques - Connecting to databases from server-side scripts - Executing SQL queries dynamically - Handling database transactions - Building a CRUD (Create, Read, Update, Delete) application -
Case Study: Building a student management system with CRUD functionality.
Module-5 – Advanced Server-Side Development and Security Practices 10 Hour
Serverless Architecture - Understanding serverless computing- Building serverless applications using platforms like AWS Lambda, and Google Cloud Functions - Pros and cons of serverless architecture
compared to traditional server-based approaches - Web Application Security, Web application architectures for high scalability, Fault tolerance in web applications - Industry Standard Secure
Development Methodologies and Maturity Models - Case Study: Implementing a serverless online quiz application.
1. PHP for the Web: Visual QuickStart Guide, by Larry Ullman, Peachpit Press, 3rd Edition. 5. Bryan Sullivan, Vincent Liu. Web Application Security, McGraw Hill Professional.
2. “Murach’s Java Servlets and JSP”. By Loel Murach and Andrea Steelman, Mike Murach 6. Shklar, Leon; Rosen, Rich. 2009. Web Application Architecture: Principles,
and Associates, Inc., 2nd Edition. Protocols and Practices. Published by Wiley.
Learning
3. Terry Felke-Morris. Web Development and Design Foundations with HTML5 (7th. ed.). 7. Hugh E. Williams and David Lane. 2004.Web Database Applications with PHP &
Resources
Addison-Wesley Professional. MySQL, 2nd Edition. O’Reilly & Associates, Inc., USA.
4. Robin Nixon. Learning PHP, MySQL, JavaScript, CSS & HTML5: A Step-by-Step Guide 8. Maddie Stigler. 2018. Beginning Serverless Computing - Developing with Amazon
to Creating Dynamic Websites (3rd. ed.). O'Reilly Media, Inc. Web Services, Microsoft Azure, and Google Cloud. Apress L.P., Berkeley, CA.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. T. Ruso, Project Manager, Cognizant Technology 1.Dr. S. Baghavathi Priya, Amrita Vishwa Vidyapeetham. 1. Dr. P. Saranya, SRMIST
Solutions.
2. Dr. P. Nancy, SRMIST
283
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE646T Course BIOLOGICALLY INSPIRED INTELLIGENT SYSTEMS Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3
Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: comprehend the fundamentals of evolutionary theory and cellular automata. 3 - -
CO-2: apply the artificial neural systems and swarm optimization for feature selection. - 2 -
CO-3: recognize the hybridization with memetic algorithms. - - 3
CO-4: describe the concepts of genetic algorithms 1 2 -
CO-5: interpret the concepts of memetic algorithms, swam optimization and immune inspired learning - 2 -
284
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Parent Selection, Survivor Selection, Solving a Job Shop Scheduling Problem, T10: Implementing a behavior-based robotic system using Python and a simulation environment (e.g., Webots, V-REP)
T11: Implement these operators in the context of a simple optimization problem, T12: Implementing recombination and crossover operators in Python
Module-5 - Memetic Algorithms and Collective Systems 9 Hour
Memetic Algorithms, Lamarckian and the Baldwin Effect, Structure of a Memetic Algorithm, Heuristic or Intelligent Initialization, Collective Systems and Swarm Intelligence. Biological self-
organization, Particle Swarm Optimization (PSO), ant colony optimization (ACO), Hybridization Strategies, case study. T13: Implement heuristic or intelligent initialization for a memetic algorithm using
Public Dataset, T14: Implement PSO and ACO algorithms for solving optimization problems, T15: Implementing a basic memetic algorithm in Python
Learning 1. D. Floreano and C. Mattiussi, "Bio-Inspired Artificial Intelligence", MIT Press, 2008. 4. D. E. Goldberg, "Genetic algorithms in search, optimization, and machine learning", Addison-
Resources 2. Tao Song, Pan Zheng, Mou Ling Dennis Wong, Xun Wang, "Bio-Inspired Computing Wesley, 1989.
Models and Algorithms", ISBN: 978-981-3143-19-7, world scientific, 2019 5. M. Dorigo and T. Stutzle, "Ant Colony Optimization", A Bradford Book, 2004.
3. F. Neumann and C. Witt, "Bioinspired Computation in combinatorial optimization:
Algorithms and their computational complexity", Springer, 2010.
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. T. Ruso,Senior Project Lead, HCL Technologies, Chennai 1. Sridharan Devarajan, IISC Bangalore 1. Dr. A. Shobanadevi, SRMIST
285
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE647T Course ARTIFICIAL INTELLIGENCE FOR AMBIENT SYSTEMS Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: create a new synergy between human and machine for smart environments 2 - -
CO-2: acquire the knowledge of multi camera coordination and its surveillance 2 - -
CO-3: acquire the knowledge on mobile and pervasive computing 2 - 2
CO-4: analyse the methodology for learning human activity and facial expression in the application area of automatic visual surveillance - 3 -
CO-5: develop and implement smart monitoring robots real-time systems - - 3
286
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Discriminative Local Features.
Module-5 - Artificial Intelligence and Robotics 9 Hour
Smart Monitoring for Physical Infrastructures: Introduction, Infrastructure Monitoring in the Context of Ambient Intelligence, Pattern-based Modeling of Context Information and Infrastructure Conditions,
Smart Monitoring Architecture, European Railway Monitoring as a Case Study- Autonomous Robots to Artificial Ecosystems: Introduction, State-of-the-art: Integrated Frameworks for Robots in Smart
Environments, Application Scenario: Cooperation and Competition for Transportation and Surveillance.
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.S. Smilin Sam, LMTS, Athena Health Private Limited 1.Dr. R. Gayathri, Professor, SVCE 1.Mr.S.Joseph James, SRMIST
2. Dr. C. Lakshmi, SRMIST
287
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE650T Course PENETRATION TESTING Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: learn the process of penetration testing
CLR-2: understand the process of finding the bugs in application
CLR-3: manually discovery key web application flaws
CLR-4: gain proficiency in the tools used for pen testing such as burp suite
CLR-5: evaluate the security of an AWS implementation
288
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. OWASP Top 10 https://owasp.org/www-project-top-ten/ 4. https://www.ibm.com/docs/en/qradar-on-cloud?topic=vulnerabilities-common-
Resources 2. GCP Security Features https://managedmethods.com/blog/google- vulnerability-scoring-system-cvss
cloud-platform-security-features/ 5. Framework for penetration testing https://owasp.org/www-project-web-security-
3. Azure Security Features https://start.paloaltonetworks.com/cloud- testing-guide/latest/3-The_OWASP_Testing_Framework/1-
security-blind-spots.html CVSS Score Penetration_Testing_Methodologies
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Partheepan Rudrapathi, CEO, KXE, 1. Dr. V. Arulkumar, Associate Professor, SSN College 1. Dr. M. Shobana, SRMIST
of Engineering
2. Aniket Amdekar, General Manager, Cyber Defense
Education, Great Learning
289
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE651T Course InfoSec LEADERSHIP Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: know the principles of leadership in InfoSec context
CLR-2: understand Risk Management
CLR-3: understand how to manage a security program
CLR-4: apply principles of Supply Chain Security
CLR-5: evaluate readiness for Audit and Compliance
290
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. SolarWinds Breach: 4. implementing an ISMS program: https://vitalii-susukailo.medium.com/10-steps-to-
Resources https://www.bleepingcomputer.com/news/security/solarwinds-reports-35- implement-isms-ab97f521046e
million-in-expenses-from-supply-chain-attack/ 5. Cyber Insurance: https://medium.com/@ratneshwarprasadsinha_66909/know-the-
2. CCPA: https://oag.ca.gov/privacy/ccpa facts-about-cyber-insurance-d2fab746c5c2
3. data privacy law in India: https://blog.ipleaders.in/data-protection-laws-in-
india-2/
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Partheepan Rudrapathi, CEO, KXE 1. Dr. V. Arulkumar, Associate Professor, SSN College of Engineering 1. Dr. M. Shobana, SRMIST
2. Aniket Amdekar, General Manager, Cyber Defense
Education, Great Learning
291
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE652T ADVANCED CRYPTOGRAPHY E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: comprehend the fundamental knowledge of the cryptographical technologies
CLR-2: remember the mathematics behind Cryptography.
CLR-3: analyze the design of various cryptographic primitives
CLR-4: apply the process of implementing the cryptographic algorithms
CLR-5: evaluate the foundations of modern cryptography toward practical applications
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: comprehend the principles of cryptography 3
CO-2: realize the current rigorous approaches for evaluating the security of cryptographic constructions on symmetric key algorithms 2
CO-3: analyze cryptographic schemes on public key algorithms 3
CO-4: describe core concepts of cryptography on examination of authentication 3
CO-5: apply the cryptographic concepts on various fields 2
292
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Katz, Jonathan., Lindell, Yehuda. Introduction to Modern Cryptography. United 4. Ferguson, Niels., Schneier, Bruce., Kohno, Tadayoshi. Cryptography Engineering:
States: CRC Press, 2020. Design Principles and Practical Applications. United States: John Wiley & Sons,
Learning 2. Menezes, Alfred J.., van Oorschot, Paul C.., Vanstone, Scott A. Handbook of Applied Incorporated, 2015.
Resources Cryptography. United States: CRC Press, 2018. 5. Stallings, William. Cryptography and Network Security: Principles and
3. Delfs, Hans., Knebl, Helmut. Introduction to Cryptography: Principles and Practice. Brazil: Pearson Education, 2017.
Applications. Germany: Springer Berlin Heidelberg, 2012.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. V. Gopinath, Solution Architect, Tata Consultancy Service 1.Dr. M. Sugumaran, Professor, Department of Computer Science and 1.Dr. Panimalar. K, SRMIST
Ltd., Chennai Engineering, Puducherry Technological University, Puducherry
293
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE653T CLOUD COMPUTING WITH BLOCKCHAIN E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: comprehend the fundamentals of cloud computing and blockchain.
CLR-2: recognize the protection of cloud resources.
CLR-3: know about blockchain as a service.
CLR-4: gain knowledge in cloud data management and smart contracts.
CLR-5: identify the uses of cloud computing and blockchain technology in the industry.
Programme Outcomes
Course Outcomes At the end of this course, learners will be able to: (PO)
(CO): 1 2 3
CO-1: recognize the concepts of cloud computing and blockchain. 3
CO-2: describe the features of cloud computing and implementation of smart contracts 2
CO-3: identify various blockchain business models and their applications 3
CO-4: explain cloud data management and implement integrated services using smart contracts. 3
CO-5: explain the uses of cloud and blockchain technology in the industry 2
294
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Chandrasekaran, K. “Essentials of Cloud Computing”, United Kingdom, CRC Press, 2014.
2. Zand, Matt., Wu, Xun (Brian), Morris, Mark Anthony, “Hands-On Smart Contract Development 6. Collier, Michael., Shahan, Robin. “Microsoft Azure Essentials - Fundamentals of
with Hyperledger Fabric V2”, O'Reilly Media, 2021. Azure”. N.p.: Pearson Education, 2015.
3. Bond, James. “The Enterprise Cloud: Best Practices for Transforming Legacy IT”. United 7. Holbrook, Joseph. Architecting “Enterprise Blockchain Solutions”, United
Learning
States, O'Reilly Media, 2015. Kingdom: Wiley, 2020.
Resources
4. The Cambridge Handbook of Smart Contracts, Blockchain Technology and Digital 8. Blockchain Technology and Applications. United States: CRC Press, 2020.
Platforms. United Kingdom, Cambridge University Press, 2020. 9. Briggs, Barry, Kassner, Eduardo. “Enterprise Cloud Strategy: Enterprise Cloud” Pearson
5. Attaran, Mohsen., Gunasekaran, Angappa. “Applications of Blockchain Technology in Business: Education, 2016.
Challenges and Opportunities”. Germany: Springer International Publishing, 2019
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Kishore Kumar K, Senior Technical Consultant 1.Dr. K. Suresh, Associate Professor, Department of Information 1.Dr. S. Srividhya, SRMIST
(Strategic Accounts) ManageEngine (A Division of Zoho Technology, Sri Venkateswara College of Engineering Sriperumbudur
Corporation)
295
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course L T P C
Course Course
21CSE654T Name CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY E PROFESSIONAL ELECTIVE
Code Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: comprehend the basic services and concepts related to cryptocurrencies
CLR-2: analyze the role of cryptography in the blockchain network
CLR-3: recognize the services and techniques of Ethereum and the cryptocurrency concept in blockchain
CLR-4: know the functions of cryptocurrency in blockchain networks
CLR-5: acquire knowledge in the Ethereum concept and its part using blockchain concepts
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: apply the knowledge of cryptocurrency in Blockchain 3
CO-2: identify and design the different Cryptographical algorithms using Blockchain 2
CO-3: design the network concepts and implement protocols using Blockchain 3
CO-4: describe the role of Ethereum and Cryptocurrency using Blockchain 2
CO-5: implement the various AI techniques in Blockchain 3
296
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Decentralized Finance (DeFi)-Introduction History of Decentralized Finance (DeFi) - DeFi Foundations – Characteristics - Advantages of DeFi - DeFi Primitives: Transaction Mechanisms - Fungible Token - Non-
Fungible Token Example -Supply and Ownership: Custody – supply Adjustment - incentives Exchanges: Centralized Exchange decentralized exchange (DEX) - Use cases Automated Market Makers (AMM) -
Uniswap - Collateralized Loan – Flash Loans - Incentives for Liquidity providers
Module-5 - Cryptocurrency Techniques 9 Hour
Cryptocurrency Techniques-Introduction Privacy for cryptocurrency Anonymity Privacy of Digital Payments Privacy of Digital Payments – demo Understanding Ethereum Privacy in Ethereum Privacy in Bitcoin - Coin
Mixing - Litecoin (LTC) - Altcoins – Example unidirectional, bi-directional and UTXO - Examples.
1. Koushik Raj, “Foundation of Blockchain: The pathway to Cryptocurrencies and 3. Cryptocurrencies and Blockchain Technology Applications. United
Decentralised Blockchain Applications “, Kindle Edition, 2019. States: Wiley, 2020.
Learning
2. Arvind Narayanan, Joesph Bonnecau, Edward Felten, Andrew Miller, and Steven 4. Drescher, Daniel. Blockchain Basics: A Non-Technical Introduction in 25
Resources
Goldfeder.” Bitcoin and cryptocurrency technologies: A Comprehensive Introduction” Steps. United States: Apress, 2017.
Princeton University Press, 2016.
Learning Assessment
Continuous Learning Assessment (CLA) Summative
Bloom’s Formative Life Long Learning Final Examination
Level of Thinking CLA-1 Average of unit test (50%) CLA-2 – (10%) (40% weightage)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Imthyaz Serif, Director IDEASSION Technology Solutions, 1.Dr. L. Ramanathan, Associate Professor, VIT Vellore 1.Dr. SV.Shri Bharathi, SRMIST
Chennai
297
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE655T Course ADVANCED MACHINE LEARNING ALGORITHMS Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3
Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: derive optimization algorithms for these models. - 3 -
CO-2: implement common neural network models for language. - - 2
CO-3: recognize a model to describe a particular type of data 2 - -
CO-4: design and implement various machine learning algorithms in a range of real world applications. - 3 -
CO-5: extract a range of applications of neural networks in natural language processing, including analyzing latent dimensions in text, translating between 1 2 -
languages, and answering questions.
298
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Module-4 - Recommendation Systems 9 Hour
Recommender System: Application of recommend dation engine Popularity based Recommendation system Content based recommendation system: User feature, Item feature Nearest neighbor
classifier to build the content-based recommendation Use case of Content based recommendation system Collaborative based Recommendation system User based Model – Item based model SVD
based Collaborative recommendation engine Evaluation Recommender System. T10: Implementation of content-based recommendation engine in pyt
T11: Implementation of popularity-based recommendation engine in python, T12: Implementation of collaborative recommendation engine in python
Module-5 - Machine Learning Model Deployment 9 Hour
The Machine Learning Pipeline- ML pipeline lifecycle - The Model in the Pipeline- Steps to deploy ML model in local server using flask - Machine Learning Model Deployment using Flask and Docker
in cloud platform - Machine Learning Model Deployment using Flask, Github and Heroku Cloud Services - Machine Learning Model Deployment using Flask, Github and AWS Lambda cloud instance /
Microsoft Azure Functions / Google Cloud Platform – Model Deployment Challenges. T13: Implementation of End-to-End case study for classification mode
T14: Machine Learning Model Deployment in local server, T15: Machine Learning Model Deployment using Heroku/AWS/Google Cloud Platforms
Learning 1. Kevin P. Murphy.” Machine Learning: A Probabilistic Perspective”. MIT Press 2012 3. William L. Hamilton, “Graph Representation Learning”, McGill University, 2020
Resources 2. Ian Goodfellow, Yoshua Bengio and Aaron Courville. “Deep Learning”, MIT Press 4.JasonBrownlee,”Deep Learning with Python”, ebook,2016.
“Second Edition”, CRC Press, 2016. 5.Sebastian Raschka, VahidMirjilili, “Python Machine Learning and deep learning”, 2nd edition,
2018
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Ms. Sudha B G, Faculty & Senior Manager,Great Learning 1.Dr. Masilamani, IITDM, Kanchipuram 1.Dr.A.Shobanadevi,SRMIST
2.Dr. G. Vadivu, SRMIST
299
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE656T SOCIAL MEDIA ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the foundations of Social Media Analytics.
CLR-2: visualize and understand the data mining aspects of social networks.
CLR-3: solve mining problems with different algorithms.
CLR-4: understand network measures for social data.
CLR-5: understand the behavioral part of web applications for Analysis.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand the basics of Social Media Analytics. 3 - -
CO-2: explain the significance of Data mining in Social media. - 2 -
CO-3: demonstrate the algorithms used for text mining. - - 1
CO-4: apply network measures for social media data. - 3 -
CO-5: explain Behavior Analytics techniques used for social media data. - 2 -
300
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Network Structure and Properties. Density, Reciprocity, diameter, clustering coefficient, Transitivity, Cliques and communities, Community Detection: Modularity-based methods. Spectral clustering. Hierarchical
clustering. Network Dynamics, Link prediction, Information diffusion, Multi-Layer Networks, Network visualization tools (e.g., Gephi/ NetworkX), Applications of SNA: Identifying influencers and opinion leaders,
Viral marketing and information diffusion, Community detection and segmentation, T7 Influencer Identification, T8 Community Detection
Module-5 - Behavior Analytics for Social Media 9 Hour
User behavior modeling: Clickstream analysis (tracking user interactions with content), Purchase behavior analysis (analyzing buying patterns), Churn prediction (identifying users likely to disengage) Predictive
analytics: Recommender systems for social media (suggesting content, products, or connections), Forecasting trends and viral content, Predicting user responses to campaigns Measuring user engagement: Time
spent on platform, content interactions (likes, comments, shares), Sentiment analysis of user-generated content, Analyzing user feedback and reviews, T9 – User engagement analysis, T10 – User review analysis
Learning 1. Social Media Analytics in Predicting Consumer Behavior,Selay Ilgaz 4. Analyzing Social Networks Using R, Stephen P. Borgatti, Martin G. Everett, Jeffrey C.
Resources Sumer,Nurettin Parilti,CRC Press, First Edition, 2023. Johnson, SAGE Publications, First Edition, 2022.
2. Social Media Analytics Strategy,Using Data to Optimize Business 5. Spatializing Social Media, Social Networks Online and Offline, Marco Bastos, Taylor &
Performance, April Ursula Fox, First Edition, 2022. Francis, First Edition, 2021.
3. Social Media Analytics and Practical Applications, Liangfei QiuLiangfei Qiu, 6. Applied Social Network Analysis with R, Emerging Research and
Subodha Kumar,CRC Press, First Edition, 2022. Opportunities, Mehmet Gençer, IGI Global, First Edition ,2020
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 10% - 20% -
Level 2 Understand 20% - 10% - 20% -
Level 3 Apply 30% - 40% - 30% -
Level 4 Analyze 30% - 40% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. N. Venkatesh, Tech Lead, Honeywell, Bengaluru, 1.Dr.V.Sivakumar, Associate Professor, Department of Information 1.Dr.T.Veeramakali, SRMIST
Karnataka, India and Communication Technology, Manipal Institute of Technology,
2.Ms. Sudha B G, Great Learning 2.Dr.G.Vadivu, SRMIST
301
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE658T Course LARGE LANGUAGE MODELS Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course At the end of this course, learners will be able to: Program Outcomes (PO)
Outcomes (CO):
1 2 3
CO-1: comprehend the applications of Language Models 2 - -
CO-2: design language models using RNN and Transformer models 2 2 -
CO-3: develop, train and fine tune LLMs 2 2 2
CO-4: design applications integrating Pinecone and Langchain for LLM application development 2 2 2
CO-5: evaluate the security risks and privacy concerns of using LLMs 2 3 3
302
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Harms and Ethical Concerns - Types of attacks: adversarial examples, poisoning, prompt injection - Non-adversarial harms caused by language models: hallucinations, biases, toxicity - Memorization
and Privacy - The data lifecycle
1. Deep Learning for Natural Language Processing: Develop Deep Learning Models for
3. Quick Start Guide to Large Language Models: Strategies and
Natural Language in Python, Jason Brownlee, Machine Learning Mastery, 21 Nov 2017
Learning Best Practices for Using ChatGPT and Other LLMs by
2. Transformers for Natural Language Processing: Build innovative deep neural network
Resources SinanOzdemir, 1st Edition, Addison-Wesley Professional
architectures for NLP with Python, PyTorch, TensorFlow, BERT, RoBERTa, and more 1st
October 2023.
Edition, by Denis Rothman, Packt Publishing, 29 January 2021.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.Jagatheeswaran Senthilvelan, Managing Partner , ProtoHubs.io 1.Dr. Subha Thangarajan, Associate Professor, NITTTR 1.Dr. M Vimaladevi, SRMIST
2.Dr.G.Maragatham,SRMIST
303
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE659T REINFORCEMENT LEARNING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: analyze the foundational concepts of reinforcement learning
CLR-2: build knowledge on finite Markov decision process and dynamic programming
CLR-3: deliver the concepts of Monte Carlo methods and Temporal Difference Learning
CLR-4: equip learners on planning and learning with tabular methods
CLR-5: introduce the basic concepts of deep reinforcement learning
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: comprehend the building concepts for reinforcement learning 2 1
CO-2: identify problems which are Markov Decision Processes and solve problems using Dynamic Programming 2
CO-3: apply Monte Carlo methods and Temporal Difference Learning to real world problems 2 2
CO-4: efficiently plan and learn actions for environments using tabular methods 2
CO-5: apply the basic concepts of deep reinforcement learning 3
Learning 1. Richard S. Sutton and Andrew G. Barto, Reinforcement Learning: An 3. Enes Bilgin, Mastering Reinforcement Learning with Python: Build next-generation,
Resources Introduction MIT Press; Second edition, 2018 self-learning models using reinforcement learning techniques and best practices,
2. Sudharsan Ravichandiran , Hands-On Reinforcement Learning with Packt Publishing, First Edition,2020
Python: Master reinforcement and deep reinforcement learning using 4. Miguel Morales , Grokking Deep Reinforcement Learning, Manning, First Edition
OpenAI Gym, Packt Publishing, Second Edition, 2020 2020
5. Aske Plaat , Learning to Play: Reinforcement Learning and Games, Springer
Nature, First Edition, 2022
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 10% - 20% -
Level 2 Understand 20% - 10% - 20% -
Level 3 Apply 30% - 40% - 30% -
Level 4 Analyze 30% - 40% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr.Hariseharan, Advisor, Pratya AI Labs 1.Dr. J. Umarani , IIITDM Kancheepuram 1.Dr.K.Sornalakshmi, SRMIST
2.Dr.D.Hemavathi, SRMIST
305
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE664P Course PRODUCT THINKING Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3
Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: apply user-centered design (UCD) principles to create technology products. 2 - 2
CO-2: create detailed user personas that accurately represent user needs, challenges, and motivations. - - 2
CO-3: create product concepts and strategies through brainstorming, market analysis, and feature prioritization. - 3 3
CO-4: create low-fidelity and high-fidelity prototypes using design tools to communicate design ideas and facilitate user testing. - 2 3
CO-5: evaluate usability test data to identify usability issues and iterate to improve user experience. - - 3
306
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Information Architecture (IA): Organizing content for optimal user experience; Interaction Design (IxD): Designing user interactions with the product; User Interface (UI) Design: Principles of UI design,
User interface elements; Low and High Fidelity Prototyping: Creating prototypes to test and validate design ideas.
Activities: 1. Develop an IA for a product concept. 2. Develop a low-fidelity and a high-fidelity prototype for the product concept.
Module-5 – Usability Testing and Iteration 9 Hour
Usability Testing Techniques: Planning, Conducting tests, Observing user behavior; Conducting Usability Testing with prototypes; Data Analysis & Iteration: Analyzing test results, identifying usability
issues, iterating on design; Design for Accessibility: Designing inclusive products for users with disabilities.
Activities:1. Conduct a usability test on a classmate's prototype and provide feedback. 2. Analyze usability test data and suggest iterations for the product prototype.
Learning 1. Norman, Don. The design of everyday things: Revised and expanded edition. 4. Saffer, Dan. Designing for Interaction: Creating Innovative Applications and
Resources Basic books, 2013. Devices.-Includes Index. New Riders, 2010
2. Cagan, Marty. Inspired: How to create tech products customers love. John 5. Shneiderman, Ben, and Catherine Plaisant. Designing the user interface: strategies
Wiley & Sons, 2017. for effective human-computer interaction. Pearson Education India, 2010.
3. Krug, Steve. Don't make me think!: a common sense approach to Web 6. Goodwin, Kim. Designing for the digital age: How to create human-centered
usability. Pearson Education India, 2000. products and services. John Wiley & Sons, 2011.
7. Norman Donald, A. (2013). The design of everyday things. MIT Press.
Learning Assessment
Bloom’s Level of Thinking Continuous Learning Assessment (CLA)
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr Ramakrishnan Kalyanaraman, Intellect Design Arena Ltd 1. Dr. Ramkumar Rajendran, IIT Bombay, Mumbai. 1. Dr. R I Minu, SRMIST
2. Dr. K. Anitha. SRMIST
307
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE665T REVOLUTIONING BUSINESS WITH BLOCKCHAIN E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: introduce students to the fundamentals of blockchain technology
CLR-2: explore real-world use cases and applications of blockchain technology
CLR-3: analyze blockchain-based business models, revenue streams, and value propositions
CLR-4: examine the legal and regulatory landscape surrounding blockchain technology
CLR-5: explore the practical aspects of blockchain implementation
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: demonstrate a comprehensive understanding of smart contract fundamentals 3
CO-2: demonstrate the technical skills required to develop, deploy, and interact with smart contracts using solidity programming language 2
CO-3: learners able to identify and evaluate business applications of smart contracts across various industries 3
CO-4: demonstrate the ability to critically analyze the challenges and limitations associated with smart contract adoption 3
CO-5: explore emerging trends and future directions in smart contract technology 2
308
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Antonopoulos, Andreas M., and Gavin Wood. Mastering ethereum: building smart 4. CFE, CITP. "Blockchain Basics: A Non-Technical Introduction in 25 Steps." The
contracts and dapps. O'reilly Media, 2018. CPA Journal 93.3/4 (2023): 13-13.
2. Infante, Roberto. Building Ethereum Dapps: decentralized applications on the Ethereum 5. Revolutionizing Financial Services and Markets Through FinTech and Blockchain,
Learning
blockchain. Simon and Schuster, 2019. Kiran Mehta, Renuka Sharma, Poshan Yu, IGI Global Publications, 1st edition,
Resources
3. Flynt, Oscar. Smart contracts: how to use blockchain smart contracts for cryptocurrency 2023.
exchange. Createspace Independent Publishing Platform, 2016. 6. Comert, Oguz. "Blockchain revolution: how the technology behind bitcoin and other
cryptocurrencies is changing the world." (2020): 272.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Kishore Kumar K, Senior Technical Consultant (Strategic 1. Dr.N.Balaji, Professor, Department of Computer Science and 1. Dr.A.Syed Ismail, SRMIST
Accounts) Manage Engine (A Division of Zoho Corporation) Engineering, Rajalakshmi Institute of Technology, Chennai
2. Dr. K. Suresh, Associate Professor, Department of Information
2. Dr.S.Ganesh Kumar, SRMIST
Technology, Sri Venkateswara College of Engineering, Sriperumbuthur
309
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course TRANSFORMING BUSINESS PARADIGMS OF DISTRIBUTED Course L T P C
21CSE666T E PROFESSIONAL ELECTIVE
Code Name LEDGER TECHNOLOGY Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the foundational principles of distributed ledger technology
CLR-2: explore diverse architectures and platforms
CLR-3: examine the diverse business applications across industries
CLR-4: analyze innovative business models and disruptions enabled by distributed ledger technology to empower
CLR-5: address the regulatory and ethical challenges associated with industries
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: demonstrate a solid understanding of the foundational principles of Distributed Ledger Technology 3 1 2
CO-2: explore to differentiate between different types such as blockchain, DAGs, and Hash graph 3 1 2
CO-3: identify and assess various business applications across industries. 3 1 2
CO-4: analyze innovative business models and disruptions enabled by Distributed Ledger Technology 3 1 2
CO-5: demonstrate an understanding of the legal and ethical implications in industries 3 1 2
1. Drescher, Daniel. Blockchain Basics: A Non-Technical Introduction in 25 Steps. United 4. The Business Blockchain: Promise, Practice, and Application of the Next Internet
States: Apress, 2017. Technology: [Summary].. N.p.: Skillsoft, 2018.
Learning 2. Lantz, Lorne., Cawrey, Daniel. Mastering Blockchain. United States: O'Reilly Media, 2020. 5. De Filippi, Primavera., Wright, Aaron. Blockchain and the Law: The Rule of
Resources 3. Tapscott, Don., Tapscott, Alex. Blockchain Revolution: How the Technology Behind Bitcoin Code. N.p.: Harvard University Press, 2018.
and Other Cryptocurrencies Is Changing the World. United States: Penguin Publishing
Group, 2018.
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Kishore Kumar K, Senior Technical Consultant (Strategic 1. Dr.N.Balaji, Professor, Department of Computer Science and 1. Dr.A.Syed Ismail, SRMIST
Accounts) ManageEngine (A Division of Zoho Corporation) Engineering, Rajalakshmi Institute of Technology, Chennai
2. Dr. K. Suresh, Associate Professor, Department of Information 2. Dr.S.Ganesh Kumar, SRMIST
Technology, Sri Venkateswara College of Engineering Sriperumbuthur
311
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE667T EMPOWERING BUSINESS WITH SMART CONTRACTS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: grasp the foundational principles and features of smart contracts
CLR-2: acquire the technical skills necessary to write, deploy, and interact with smart contracts
CLR-3: explore diverse business applications of smart contracts across industries
CLR-4: examine the challenges and limitations associated with smart contract adoption
CLR-5: explore potential disruptions and transformative impacts on industries
Programme Outcomes
Course Outcomes At the end of this course, learners will be able to: (PO)
(CO): 1 2 3
CO-1: demonstrate a comprehensive understanding of smart contract fundamentals 3
CO-2: demonstrate the technical skills required to develop, deploy, and interact with smart contracts using solidity programming language 2
CO-3: identify and evaluate business applications of smart contracts across various industries 3
CO-4: demonstrate the ability to critically analyze the challenges and limitations associated with smart contract adoption 2
CO-5: explore emerging trends and future directions in smart contract technology 3
312
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Antonopoulos, Andreas M., and Gavin Wood. Mastering ethereum: building smart 4. Flynt, Oscar. Smart contracts: how to use blockchain smart contracts for cryptocurrency
contracts and dapps. O'reilly Media, 2018 exchange. Createspace Independent Publishing Platform, 2016.
Learning 2. Infante, Roberto. Building Ethereum Dapps: decentralized applications on the Ethereum 5. CFE, CITP. "Blockchain Basics: A Non-Technical Introduction in 25 Steps." The CPA
Resources blockchain. Simon and Schuster, 2019 Journal 93.3/4 (2023): 13-13.
3. Flynt, Oscar. Smart contracts: how to use blockchain smart contracts for cryptocurrency 6. Comert, Oguz. "Blockchain revolution: how the technology behind bitcoin and other
exchange. Createspace Independent Publishing Platform, 2016. cryptocurrencies is changing the world." (2020): 272.
Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Kishore Kumar K, Senior Technical Consultant (Strategic 1. Dr.N.Balaji, Professor, Department of Computer Science and 1. Dr.A.Syed Ismail, SRMIST
Accounts) ManageEngine (A Division of Zoho Corporation Engineering, Rajalakshmi Institute of Technology, Chennai
2. Dr. K. Suresh, Associate Professor, Department of Information 2. Dr.S.Ganesh Kumar, SRMIST
Technology, Sri Venkateswara College of Engineering
313
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE668T BUSINESS DATA ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3
Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the role of data analytics in modern business.
CLR-2: master techniques for data collection, cleaning, and analysis.
CLR-3: apply statistical methods and machine learning algorithms to business problems.
CLR-4: interpret data analysis results and communicate findings effectively.
CLR-5: critically evaluate ethical concerns surrounding data usage.
Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: apply data analytics techniques and tools across finance, supply chain, HR, healthcare, and customer domains. 3
CO-2: identify and solve complex business problems using data-driven approaches. 2 1
CO-3: effectively communicate data-driven insights to diverse stakeholders. 2
CO-4: evaluate the ethical and privacy implications of data collection and analysis. 1 2
CO-5: collaborate with cross-functional teams to leverage data for business impact. 3
314
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Rajkumar Venkatesan, Paul W. Farris, Ronald T. Wilcox , Marketing Analytics: Essential 3. Liu, K, Supply Chain Analytics: Concepts, Techniques and Applications., Springer,
Tools for Data-Driven Decisions, University of Virginia Press, First Edition, 2021 First Edition, 2022.,
Learning 2. Nigel Guenole, Jonathan Ferrar, Sheri Feinzig , The Power of People: Learn how Successful 4. Peter D. Easton Financial Statement Analysis and Valuation Paperback, McGraw
Resources Organizations Use Workforce Analytics to Improve Business Performance, Pearson Hill Education; Fourth edition, 2020
Education, First Edition , 2017
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 15% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.V.Selvakumar,Hexaware Technologies 1.Dr. Evangelos E. Milios, Faculty of Computer Science, Dalhousie University 1.Mr.Venkatesh, SRMIST
2.Ms. Sudha B G, Great Learning 2.Dr.A.Shanthini, SRMIST
315
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE669P Course QUANTUM COMMUNICATION AND CRYPTOGRAPHY Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3
Course Outcomes At the end of this course, learners will be able to: Programme Outcomes
(CO): (PO)
1 2 3
CO-1: identify basic cryptographic techniques 1 - 2
CO-2: compare symmetric and asymmetric cryptographic algorithms 2 - 2
CO-3: develop a tool for cryptographic algorithm and error correction mechanisms 2 - 3
CO-4: incorporate the secure key transmission protocols 2 - 2
CO-5: demonstrate the post cryptographic techniques 1 - 3
316
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. William Stallings, Cryptography and Network Security Principles and Practice 3. Daniel J. Bernstein, Johannes Buchmann and Erik Dahmen, “Post-Quantum
Resources Fourth Edition, Pearson Education, 2019. Cryptography”, 2007.
2. Thomas Vidick and Stephanie Wehner, “Introduction to Quantum 4. N. David Mermin, "Quantum Computer Science" by Cambridge University Press, 2007.
Cryptography”, Cambridge University Press, 2023.
Learning Assessment
Bloom’s Level of Thinking Continuous Learning Assessment (CLA)
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Jithesh Lalwani, Founder and CEO, Artificial Brain, 1. Nishant K Pathak, Senior Research Fellow, 1. Dr. G. K. Sandhia, SRMIST
Pune (Experimental Quantum optics), IIT Delhi
2. Dr. M. Gayathri, SRMIST
317
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE670P Course NP COMPLETENESS AND BEYOND Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3
Course Outcomes At the end of this course, learners will be able to: Programme Outcomes
(CO): (PO)
1 2 3
CO-1: demonstrate ability to prove that a problem is NP-complete. 3 - 3
CO-2: design Parameterized algorithms for coping with NP-completeness. 3 - -
CO-3: design faster than brute force exponential algorithms for NP-complete problems, 3 - -
CO-4: utilize randomness to enhance algorithmic performance, and to 3 - 3
CO-5: develop and analyse algorithms that yield near-optimal solutions for NP-hard problems, within polynomial time. 3 - -
318
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. John Kleinberg and Eva Tardos, Algorithm Design, Pearson Education, Inc., 2006. 3. Fedor V. Fomin and Dieter Kratsch, Exact exponential algorithms. Springer,
Resources 2. Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Daniel Marx, 2010.
Marcin Pilipczuk, Michal Pilipczuk, Saket Saurabh: Parameterized Algorithms. 4. David P. Williamson, David B. Shmoys: The Design of Approximation Algorithms.
Springer 2015. Cambridge University Press 2011.
Learning Assessment
Bloom’s Level of Thinking Continuous Learning Assessment
CLA-1 Average of CLA-2 Project Report and Viva Final
Unit test (20%) Based Learning Voce Examination
(60%) (20% Weightage) (0% weightage)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - -- 20% - 10% - -
Level 2 Understand 30% - - 20% - 10% - -
Level 3 Apply 20% - - 20% - 10% - -
Level 4 Analyze 20% - - 20% - 10% - -
Level 5 Evaluate - - - 10% - 30% - -
Level 6 Create - - - 10% - 30% - -
Total 100 % 100 % 100 % -
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Prof. Venkatesh Raman, The Institute of Mathematical Sciences, 1. Prof. R. Indhumathi, SRMIST
Chennai
2. Prof. Saket Saurabh, The Institute of Mathematical Sciences, 2. Dr. K. Vijaya, SRMIST
Chennai
319
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
ACADEMIC CURRICULA
Non-Credit Courses
Regulations 2021
320
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSM501L Course PROFESSIONAL SOFT SKILLS-I Course M NON-CREDIT L T P C
Code Name Category 0 0 2 0
Course Outcomes At the end of this course, learners will be able to: Programme Outcomes
(CO): (PO)
1 2 3
CO-1: grasp and apply a positive outlook, accurately interpret the body language of team members and stakeholders and enhance interpersonal 1 - -
relationships.
CO-2: create effective presentations and deliver them with confidence. Additionally, to recognize and manage stress, prioritize tasks, and plan effectively. 1 - -
CO-3: listen with the intent to understand and to be capable of asking insightful questions. 1 - -
CO-4: comprehend the qualities of being a good team player, understand team dynamics, and grasp business ethics. 1 - -
CO-5: write and speak accurately, forming grammatically correct sentences. 1 - -
Learning 1. "The Power of a Positive Attitude: A Step-by-Step Guide to Achieving a Positive Attitude" 4. "The Art of Asking Questions" by Ernest Dichter, Routledge(2018)
Resources by Roger Fritz, HarperCollins(2022) 5. "Emotional Intelligence 2.0" by Travis Bradberry and Jean Greaves,
2. "Presentation Skills 201: How to Take Your Presentation to the Next Level" by William R. TalentSmart(2009)
Steele, Steele Publishing(2019) 6. "Effective Communication Skills: The Ultimate Guide to Being a Better
3. "The Art of Listening: Improve Your Listening Skills and Communicate More Effectively" Communicator" by John Nielsen, Skill Builders(2021)
by Michael S. Watkins, Harvard Business Review Press(2020)
Learning Assessment
Continuous Learning Assessment (CLA)
Final Examination
Bloom’s CLA-1 Average of Unit Tests CLA-2 Formative Assessments Summative
(0% weightage)
Level of Thinking (30%) (30%) (40% weightage)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember - 40% - 40% - 40%
Level 2 Understand - 40% - 40% - 40%
Level 3 Apply - 10% - 10% - 10%
Level 4 Analyze - 10% - 10% - 10%
Level 5 Evaluate - % - % - %
Level 6 Create - % - % - %
Total 100 % 100 % 100%
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan,SRMIST
322
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSM502L Course PROFESSIONAL SOFT SKILLS-II Course M NON-CREDIT L T P C
Code Name Category 0 0 2 0
Course Outcomes At the end of this course, learners will be able to: Programme Outcomes
(CO): (PO)
1 2 3
CO-1: Enhance pronunciation, clarity, and enunciation in professional settings. 1
CO-2: Manage customer interactions and distinguish between customer service and experience. 1
CO-3: Solve problems, make decisions, and address biases with creative and analytical methods. 1 1 1
CO-4: Apply email etiquette and chat practices in a professional setting. 1
CO-5: Explain financial statements, budgeting, and essential finance concepts. 1 1 1
323
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Accounting systems and how transactions are recorded - Financial statements: Profit &Loss account - balance sheet - cash flow statement - Fixed assets - depreciation and the capitalization of software
development expense - Working capital and cash management - Using ratio analysis to assess corporate health and performance - Funding the business: equity - debt and other aspects - Budgeting
&Forecasting – capex – apex - Designing a flexible budget - Capital expenditure appraisal and approval
Learning 1. "English Pronunciation in Use Advanced Book with Answers: A Comprehensive Course 4.. "Accent Neutralization: A Workbook for Mastering Pronunciation" by Michael J.
Resources for Professionals" by Martin Hewings, Cambridge University Press(2020) O’Neill,2019
2. "Creative Problem Solving for Managers: Developing Skills for Decision Making and 5. "Customer Service 101: Quick and Easy Techniques to Supercharge Your
Innovation" by Tony Proctor, Routledge(2022) Customer Service Skills" by Peter O’Neill, Morgan James Publishing(2022)
7. "Budgeting and Forecasting: A Practical Guide to Planning and Controlling Business 6. "Finance for Non-Financial Managers" by Gene Siciliano, AMACOM(2021)
Finances" by David O’Reilly, Wiley(2021)
Learning Assessment
Continuous Learning Assessment (CLA)
Final Examination
Bloom’s CLA-1 Average of Unit Tests CLA-2 Formative Assessments Summative
(0% weightage)
Level of Thinking (30%) (30%) (40% weightage)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember - 40% - 40% - 40%
Level 2 Understand - 40% - 40% - 40%
Level 3 Apply - 10% - 10% - 10%
Level 4 Analyze - 10% - 10% - 10%
Level 5 Evaluate - % - % - %
Level 6 Create - % - % - %
Total 100 % 100 % 100%
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan,SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja,SRMIST
3. Dr.R.Balaji Ganesh,SRMIST
4.Dr.R.Deebalakshmi,SRMIST
324
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
SRM INSTITUTE OF SCIENCE AND TECHNOLOGY
(Deemed to be University u/s 3 of UGC Act, 1956)
325
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Kattankulathur, Chengalpattu District 603203, Tamil Nadu,
India
326
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy