0% found this document useful (0 votes)
17 views327 pages

m.tech Computer Science and Engineering Syllabus 2021

The document outlines the academic curricula for postgraduate degree programs, specifically the Master of Technology under the Choice Based Flexible Credit System at SRM Institute of Science and Technology. It includes detailed syllabi for various professional core and elective courses within the School of Computing, covering topics such as mathematical foundations, security management, cloud computing, and artificial intelligence. The document serves as a comprehensive guide for students regarding course offerings and their respective learning outcomes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views327 pages

m.tech Computer Science and Engineering Syllabus 2021

The document outlines the academic curricula for postgraduate degree programs, specifically the Master of Technology under the Choice Based Flexible Credit System at SRM Institute of Science and Technology. It includes detailed syllabi for various professional core and elective courses within the School of Computing, covering topics such as mathematical foundations, security management, cloud computing, and artificial intelligence. The document serves as a comprehensive guide for students regarding course offerings and their respective learning outcomes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 327

ACADEMIC CURRICULA

POST GRADUATE DEGREE


PROGRAMMES

Master of Technology

(Choice Based Flexible Credit System)

Regulations 2021

Volume – 23
Syllabi for School of Computing Programmes

Professional Core and Elective Courses

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India
SRM INSTITUTE OF SCIENCE AND TECHNOLOGY
Kattankulathur, Chengalpattu District 603203, Tamil Nadu, India

Contents (Volume - 23)


Syllabi for Computing Programme Courses

No Title Page No

1 Mathematical Professional Core Courses……....................................................................................... 6


21MAC503T Discrete Mathematics and Probability Theory…………………………………………. 7
21MAC504T Number Theory…………………………………………………………………………… 9
21MAC505T Linear Algebra and Statistical Methods…………………………………………………. 11
2 Professional Core Courses………………………………………………………………………………… 13
21CSC503T Security Service Management ………………………………………………………….. 14
21CSC510T Parallel Computing……………………………………………………………………….. 16
21CSC511J Web Technologies………………………………………………………………………… 18
21CSC519J Web Development for Internet of Things……………………………………………….. 21
21CSC520J Cloud Storage and Edge Computing……………………………………………………. 23
21CSC522J Embedded System and Software Development for Internet of Things ………………. 25
21CSC526J Cyber Forensic and Incident Response………………………………………………… 27
21CSC527J Ethical Hacking and Vulnerability Assessment………………………………………… 29
21CSC528J Applied Machine Learning Algorithms………………………………………………….. 31
21CSC529T Inferential Statistics……………………………………………………………………….. 34
21CSC530J Cloud Architecture and Design………………………………………………………….. 36
21CSC531J Data Center Networking…………………………………………………………………. 38
21CSC532J Cloud Security Essentials………………………………………………………………… 40
21CSC533J Advanced Data Processing Techniques ………………………………………………. 42
21CSC534J Python for Data Science…………………………………………………………………. 44
21CSC535J Deep Learning from Production to Deployment……………………………………….. 47
21CSC536J Principles of Data Engineering ………………………………………………………….. 49
21CSC546J Understanding Cyber Attacks……………………………………………………………. 51
21CSC547J Designing Security Controls, Governance and Compliance…………………………. 53
21CSC548J Blockchain Technology with Hyperledger…………………………………………….. 55
21CSC549J Fundamentals of Blockchain…………………………………………………………….. 57
21CSC550J Database Technology…………………………………………………………………….. 59
21CSC551J Advanced Data Structures and Algorithms…………………………………………….. 61
21CSC552J Advanced Software Engineering……………………………………………………… 63
21CSC553J Full Stack Development Frameworks ………………………………………………….. 65
21CSC554J Applied Data Science…………………………………………………………………….. 67

1
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
21CSC555J Machine Learning Algorithms…………………………………………………………… 70
21CSC556J Database Systems Design: Relational and NoSQL……………………………………. 72
21CSC558J Deep Learning Approaches……………………………………………………………… 74
21CSC566J Cyber Physical Systems in IoT………………………………………………………….. 76
21CSC567J Big Data Frameworks and MLOps………………………………………………………. 78
21CSC569J Fundamentals of Artificial Intelligence………………………………………………….. 80
21CSC571J Reinforcement Learning Algorithms…………………………………………………….. 82
21CSC572J Applied Malware Analysis………………………………………………………………... 84
21CSC573J Data Analysis and Interpretation ……………………………………………………….. 86
21CSC574J Big Data Analytics using Artificial Intelligence Technologies…………………………. 88
3 Professional Elective Courses………………………………………………………………………………… 90
21AIE532T Soft Computing and its Applications……………………………………………………. 91
21AIE536T Artificial Intelligence Engines……………………………………………………………. 93
21AIE538T Artificial Intelligence for Industrial Applications………………………………………… 95
21AIE 541T Multimodal Machine Learning…………………………………………………………… 97
21CSE519T Geospatial Data Analysis………………………………………………………………… 99
21CSE521T Advanced Algorithms Analysis………………………………………………………….. 101
21CSE522T Functional Programming…………………………………………………………………. 103
21CSE523T Data Engineering Principles for Enterprises…………………………………………… 105
21CSE524T Computer Vision Techniques……………………………………………………………. 107
21CSE526T End-End Deep Learning for Production………………………………………………… 109
21CSE527T Text Mining and Analytics……………………………………………………………….. 111
21CSE531T Cyber Security Operations………………………………………………………………. 113
21CSE532T Network Management and Protocols ………………………………………………….. 115
21CSE533T Firewalls and Access Controls …………………………………………………………. 117
21CSE534T Network Programming and Management……………………………………………… 119
21CSE535T Network Intrusions and Computer Forensics………………………………………….. 121
21CSE536T Mobile Forensics………………………………………………………………………….. 123
21CSE537T Digital Forensics………………………………………………………………………….. 125
21CSE538T Security Scripting and Analysis…………………………………………………………. 127
21CSE539T Principles of Secure Coding Principles…………………………………………………. 129
21CSE540T Android Security and Design Internals…………………………………………………. 131
21CSE541T Probabilistic Graphical Models: Principles and Techniques…………………………. 133
21CSE542T Deep Generative Models………………………………………………………………… 135
21CSE543T Brain Machine Interface: Science, Technology and Application…………………….. 137
21CSE548T Spatial and Temporal Computing……………………………………………………… 139
21CSE549T Decision Making Under Uncertainty……………………………………………………. 141
21CSE554T Computer Networking…………………………………………………………………….. 143

2
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
21CSE555T Internet of Things in Edge Computing………………………………………………….. 145
21CSE556T Generative Adversarial Networks and its Applications……………………………….. 147
21CSE557T Streaming Data Analytics………………………………………………………………… 149
21CSE558T Deep Neural Network Architectures…………………………………………………….. 151
21CSE559T Cloud Computing for Data Analytics……………………………………………………. 153
21CSE560T Generative AI with Large Language Models…………………………………………… 155
21CSE561T Ethics in Data Science …………………………………………………………………... 157
21CSE562T SQL and NoSQL for Data Science…………………………………………………….. 159
21CSE563T Big Data Database Technologies……………………………………………………….. 161
21CSE564T Big Data Ecosystem……………………………………………………………………… 163
21CSE565T Web Development………………………………………………………………………… 165
21CSE566T IoT Data Analytics………………………………………………………………………… 167
21CSE567T Communication and Networking Technologies for Internet of Things ……………… 169
21CSE568T Privacy and Security in IoT………………………………………………………………. 171
21CSE569T Components and Energy Optimization Techniques for Internet of Things…………. 173
21CSE570T Sensor Data Management in IoT……………………………………………………….. 175
21CSE571T SDN and NFV for Internet of Things……………………………………………………. 177
21CSE572T IoT Visualization…………………………………………………………………………... 179
21CSE573T Real Time Systems in Emerging IoT …………………………………………………... 181
21CSE574T Digital Twins Driven Distributed IoT Solutions………………………………………… 183
21CSE575T API Design and Management…………………………………………………………… 185
21CSE576T Micro Services and Containerization in Cloud Computing…………………………… 187
21CSE577T Data Center Virtualization and Management Tools ………………………………… 189
21CSE578T Cloud Compliance and Governance …………………………………………………… 191
21CSE579T Application Architecture and Deployment……………………………………………… 193
21CSE580T Business Continuity planning and Disaster Recovery ……………………………… 195
21CSE581T Cloud Services Architect…………………………………………………………………. 197
21CSE582T Cloud Security Builder……………………………………………………………………. 199
21CSE583T Natural Language Processing and its Applications…………………………………… 201
21CSE584T Time Series Analysis and Forecasting…………………………………………………. 203
21CSE585T Front End Development Technologies…………………………………………………. 205
21CSE586T REST APIs Development using Spring Framework………………………………… 207
21CSE587T Full Stack Application Development using React and Spring Framework…………. 209
21CSE588T Deploying Full Stack Application………………………………………………………... 211
21CSE589T Mobile Application Development………………………………………………………... 213
21CSE590T Agile and DevOps…………………………………………………………………………. 215
21CSE591T Advanced Data Visualization……………………………………………………………. 217
21CSE592T Statistical Machine Learning…………………………………………………………….. 219

3
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
21CSE593T User Experience Design Thinking………………………………………………………. 221
21CSE594T Full Stack Development………………………………………………………………….. 223
21CSE595T Web 3.0 …………………………………………………………………………………... 225
21CSE596T Security Operations and Incident Management……………………………………….. 227
21CSE597T Containers and Cloud DevOps………………………………………………………… 229
21CSE598T Big Data Analytics and Microservices………………………………………………….. 231
21CSE599T Security and Architecture………………………………………………………………… 233
21CSE619T Smart Convergent Technologies………………………………………………………... 235
21CSE620T Cognitive Internet of Things……………………………………………………………… 237
21CSE621T Advanced Distributed Systems………………………………………………………….. 239
21CSE622T Industrial Internet of Things …………………………………………………………….. 241
21CSE623T Wireless Sensor Networks in IoT……………………………………………………….. 243
21CSE624T Fog Networks in IoT……………………………………………………………………… 245
21CSE626T Hacker Techniques and Incident Handling…………………………………………….. 247
21CSE627T Internet of Things and Cognitive Computing………………………………………… 249
21CSE628T Cyber Law and Ethics……………………………………………………………………. 251
21CSE629T Wireless Security…………………………………………………………………………. 253
21CSE630T Operating System Internals……………………………………………………………… 255
21CSE631T Risk Assessment and Security Audit…………………………………………………… 257
21CSE632T Essentials of Data Science on Cloud Computing……………………………………... 259
21CSE633T Computer Vision on Edge Computing …………………………………………………. 261
21CSE634T Migration Techniques on Cloud Architecture………………………………………… 263
21CSE635T Designing Scalable Cloud-Native Systems……………………………………………. 265
21CSE636T Emerging Technologies in Cloud Computing………………………………………….. 267
21CSE637T Deep Learning and its Applications…………………………………………………….. 269
21CSE638T Machine Learning Engineering for Production…………………………………………
21CSE639T Blockchain Technologies………………………………………………………………. 271
21CSE640T Industry Specific Applications of GenAI………………………………………………..
21CSE641T Security for Machine Learning Applications……………………………………………. 274
21CSE642T Cloud Native Application Development………………………………………………… 276
21CSE643T Microservices and Service Based Architectures………………………………………. 278
21CSE644T Web and Social Media Analytics ………………………………………………………. 280
21CSE645T Server-Side Programming……………………………………………………………….. 282
21CSE646T Biologically Inspired Intelligent systems………………………………………………... 284
21CSE647T Artificial Intelligence for Ambient systems……………………………………………… 286
21CSE650T Penetration Testing……………………………………………………………………….. 288
21CSE651T InfoSec Leadership……………………………………………………………………….. 290
21CSE652T Advanced Cryptography…………………………………………………………………. 292

4
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
21CSE653T Cloud Computing with Blockchain………………………………………………………. 294
21CSE654T Cryptocurrencies and Blockchain Technology………………………………………… 296
21CSE655T Advanced Machine Learning Algorithms………………………………………………. 298
21CSE656T Social Media Analytics…………………………………………………………………… 300
21CSE658T Large Language Models…………………………………………………………………. 302
21CSE659T Reinforcement Learning…………………………………………………………………. 304
21CSE664P Product Thinking………………………………………………………………………….. 306
21CSE665T Revolutioning Business with Blockchain……………………………………………….. 308
21CSE666T Transforming Business Paradigms of Distributed Ledger Technology…………… 310
21CSE667T Empowering Business with Smart Contracts………………………………………….. 312
21CSE668T Business Data Analytics…………………………………………………………………. 314
21CSE669P Quantum Communication and Cryptography………………………………………….. 316
21CSE670P NP Completeness and Beyond………………………………………………………….. 318
4 Non Credit Courses………………………………………………………………………………… 320
21CSM501L Professional Soft Skills-I………………………………………………………………….. 321
21CSM502L Professional Soft Skills-II………………………………………………………………….. 323

5
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
ACADEMIC CURRICULA

Mathematical Professional Core Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

6
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21MAC503T DISCRETE MATHEMATICS AND PROBABILITY THEORY C PROFESSIONAL CORE
Code Name Category 3 1 0 4

Pre-requisite Courses Nil Co-requisite Courses Nil Progressive Courses Nil


Course Offering Department Mathematics Data Book / Codes/Standards Statistical Table

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: learn about logic, connectives and to understand inference theory.
CLR-2: develop the understanding of the mathematical and logical basis to many modern techniques.
CLR-2: develop the understanding of the mathematical and logical basis to many modern techniques.
CLR-3: know about Recurrence relations, Generating functions.
CLR-4: understand the basic notions of discrete and continuous probability

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: symbolize the statement problems in propositional calculus and also in predicate calculus. 3 3 -
CO-2: select or arrange objects, identify types of graphs. 3 3 -
CO-3: solve both homogeneous and non-homogeneous recurrence relations using particular solution and generating functions. 3 3 -
CO-4: identify the type of distribution and solve them. 3 3 -
CO-5: obtain the knowledge on statistical methods in engineering. 3 3 -

Module-1: Logics 12 Hour


Proposition and Logical Connectives – Equivalence using Truth Table – Laws of logics – Tautological Implications – Theory of Inference for Statement Calculus – Predicate Calculus – Quantifiers, Free and Bound
Variables, Scope of the quantifier– Indirect method – Conditional Proof – Mathematical Induction.
Module-2: Introduction to Combinatorics and Graph Theory 12 Hour
Combinations and Permutations – Pigeonhole principle – Principle of Inclusion and Exclusion – Graph Theory basic definitions – Isomorphism – Hamiltonian Circuits – Eulerian Circuits – Path, Walk, Tree – Spanning
tree by Krushkal’s Algorithm.
Module-3: Recurrence Relation and Generating Function 12 Hour
Recurrence relation formation – Types of Recurrence Relation – Homogeneous Recurrence Relation - Homogeneous Finite Order Recurrence Relation – Non-homogeneous Recurrence relation – Non-
homogeneous Finite Order Recurrence Relation – Generating functions – Homogeneous Recurrence Relation using Generating Function – Non-homogeneous Recurrence Relation using Generating Function.
Module-4: Introduction to Probability 12 Hour
Discrete Random Variable – Continuous Random Variable – Moments – Introduction to Binomial Distribution – MGF, Mean, Variance – Poisson Distribution – Normal Distribution – MGF, Mean, Variance.
Module-5: Estimation Theory 12 Hour
Introduction to Estimation Theory – Various methods of Estimation – Consistency – Efficiency – Sufficiency – Maximum Likelihood Estimation – Method of Moments.

7
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Tremblay J. P. And Manohar R., “Discrete Mathematical Structures With Applications To
5. Gupta.S.C., And Kapoor, V.K., “Fundamentals Of Mathematical Statistics”, Sultan Chand
Computer Science”, Tata Major Core Graw Hill Publishing Co.,35th Edition, 2008.
And Sons, 11th Edition, 2002.
Learning 2. John Vince, “Foundation Mathematics For Computer Science”, Springer, 2015.
6. Jay L.Devore, “Probability And Statistics For Engineering And The Sciences”, 5th Edition,
Resources 3. Alan Tucker, “Applied Combinatorics”, 6th edition, Wiley.2012
Thomson And Duxbury, Singapore, 2002
4. K. Trivedi, “Probability And Statistics With Reliability, Queueing And Computer Science
Applications”, 2nd edition, Wiley, 2016.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Madhan Shanmugasundaram, Infosys 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr. V. Subburayan, SRMIST
Technologies
2. Prof. K.C. Sivakumar, IIT Madras 2. Dr. D. K. Sheena Christy, SRMIST

8
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21MAC504T NUMBER THEORY C PROFESSIONAL CORE
Code Name Category 3 1 0 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department Mathematics Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand GCD and will be able to study about its Classification of prime numbers
CLR-2: relate the concepts of arithmetical functions
CLR-3: understand concepts of averages arithmetic functions
CLR-4: learn the concepts of some elementary theorems of prime numbers
CLR-5: relate the concepts of Congruences

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand basic properties of prime number system 3 3
CO-2: familiar with congruence relations and techniques of solving arithmetical functions 3 3
CO-3: understand the techniques of applying to solve number theoretic problems on averages arithmetic functions 3 3
CO-4: understand the concepts of some elementary theorems of prime numbers. 3 3
CO-5: familiar with congruence relations and techniques of solving linear congruences 3 3

Module-1 - Fundamental Theorem of Arithmetic 12 Hour


The principle of induction- The well ordering principle- Divisibility- Properties of Divisibility- Greatest Common Divisor- Properties of GCD- GCD more than two numbers- Prime Numbers- The fundamental theorem
of arithmetic- The series of reciprocals of the primes- The Euclidean algorithm.
Module-2 - Arithmetical Functions and Dirichlet Multiplication 12 Hour
Introduction- Mobius function- Euler totient function- Relation between Mobius function and Euler totient function- A product formula for Euler totient function- The Dirichlet product of arithmetical functions- Dirichlet
inverses and Mobius inversion formula- The Mangoldt function- Multiplicative functions and Dirichlet multiplication.
Module-3 - Averages of Arithmetical Functions 12 Hour
Introduction- The big oh notation, Asymptotic equality of functions- Euler summation formula- Some elementary asymptotic formula- Average order of 𝜑𝜑(𝑛𝑛)- The average of 𝜇𝜇(𝑛𝑛) and ⋀(𝑛𝑛)- The partial sums of a
Dirichlet product- Applications of 𝜇𝜇(𝑛𝑛) and ⋀(𝑛𝑛).
Module-4 – Some Elementary Theorems on the Distribution of Prime Numbers 12 Hour
Introduction- Chebyshev’s functions- Relations connecting Chebyshev’s functions- Some equivalent forms of the Prime number theorem- Inequalities for 𝜋𝜋(𝑛𝑛) and nth prime- Shapiro’s Tauberian theorem-
Applications of Shapiro’s Tauberian theorem- Asymptotic formula for partial sums of prime- partial sums of Mobius functions.
Module-5 - Congruences 12 Hour
Definition and basic properties of Congruences- Residue classes and complete residue system- Linear congruences- Reduced residue system- Euler - Fermat theorem- Polynomial congruence modulo 𝑝𝑝 and
Lagrange’s theorem- The Chinese Remainder theorem- Applications of The Chinese Remainder theorem.

9
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
4. David M. Burton , “Elementary Number Theory “, Mcgraw Hill science, Seventh edition.2010.
1. Tom M. Apostol, Introduction to Analytic Number Theory, Springer, 2013.
5. Ivan Nivan, Herbert S. Zuckerman & Hugh L. Montgomery, An Introduction to the Theory of
Learning 2. A. Jones & M. Jones, Elementary Number Theory, Springer publications, 2005.
Numbers, John Wily & Sons, Fifth Edition, 1991.
Resources 3. William Stein, Elementary Number Theory, Springer 2009.
6. k. Ireland and M. Rosen, A classical Introduction to Modern Number Theory, Springer New
York, 2014.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Madhan Shanmugasundaram, Infosys Technologies, 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras, sryedida@iitm.ac.in 1. Dr. V. Subburayan, SRMIST
madshan@gmail.com
2. Prof. K.C. Sivakumar, IIT Madras, kcskumar@iitm.ac.in 2. Dr. V. Raja, SRMIST

10
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21MAC505T LINEAR ALGEBRA AND STATISTICAL METHODS C PROFESSIONAL CORE
Code Name Category 3 1 0 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department Mathematics Data Book / Codes / Standards Statistical Tables

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: define and apply basic concepts of linear algebra, including vectors, matrices, vector spaces, and linear transformations.
CLR-2: demonstrate foundational knowledge of probability theory and statistical concepts.
CLR-3: apply concepts from gradient calculus to analyze and optimize learning models.
CLR-4: explain the principles of non-parametric statistics and its uses
CLR-5: utilize statistical tools and techniques for analyzing complex and high-dimensional datasets.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: explain the concepts of linear algebra, vectors, projections, principal component analysis and generative models 3 3
CO-2: demonstrate the mathematics knowledge with respect to matrices, gradient calculus, optimization models. 3 3
CO-3: familiarize the mathematics knowledge with respect to probability, statistics. 3 3
CO-4: explain the concepts of non-parametric statistics 3 3
CO-5: apply the concepts of statistics to complex datasets 3 3

Module-1 - Linear Algebra 12 Hour


Systems of Linear Equations - Machine learning motivation - A geometric notion of singularity - Singular vs non-singular matrices - Linear dependence and independence - Matrix row-reduction - Row operations
that preserve singularity - The rank of a matrix - Row echelon form - Reduced row echelon form- LU decomposition- Solving Systems of Linear Equations - Machine learning motivation - Solving non- singular
systems of linear equations - Solving singular systems of linear equations - Solving systems of equations with more variables - Gaussian elimination.
Module-2 - Probability and Statistics 12 Hour
Introduction to probability - Concept of probability: repeated random trials - Conditional probability and independence - Random variables - Cumulative distribution function - Discrete random variables: Binomial
distribution - Probability mass function - Continuous random variables: Uniform distribution - Continuous random variables: Gaussian distribution -Joint distributions - Marginal and conditional distributions -
Independence - covariance - Multivariate normal distribution - Sampling and point estimates - Interval estimation -Confidence intervals – Confidence Interval for mean of population - Biased vs Unbiased estimates-
Maximum likelihood estimation - Intuition behind maximum likelihood estimation - Hypothesis testing - Describing samples: sample proportion and sample mean - Two types of errors - Test for proportion and
means - Two sample inference for difference between groups.
Module-3 - Bayesian Statistics and its applications in various fields 12 Hour
Bayesian statistics and its applications in various fields - Bayesian Learning: Bayes theorem - maximum likelihood and least squared error hypotheses – Naïve Bayes classifier- Bayesian belief networks- gradient
ascent training of Bayesian networks- learning the structure of Bayesian networks- the EM algorithm- mixture of models- Markov models- hidden Markov models - Time series analysis and forecasting techniques -
Basic Properties of time-series data: Distribution and moments- Stationarity- Autocorrelation- Heteroscedasticity- Normality- Survival Analysis.
Module-4 - Non-Parametric Statistics 12 Hour
Non-parametric Statistics - Chi square test- Sign test -Wilcoxon signed rank test - Mann Whitney test - Run test - Kolmogorov Smirnov test - Spearmann and Kendall’s test - Tolerance region.
Module-5 - Multivariate Statistical Methods for Analyzing Complex Datasets 12 Hour
Multivariate statistical methods for analysing complex datasets - Factor Analysis - Cluster Analysis- Regression Analysis - Discriminant Analysis.

11
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. James D. Miller, Statistics for Data Science, Packt Publishing (2017) 4. Nonparametric Statistical Methods, Myles Hollander, Douglas A. Wolfe, Eric
Learning 2. IND James D. Hamilton, Time Series Analysis, Levant Books (2012) Chicken, Wiley (2013)
Resources 3. Bayesian Statistics for Beginners: a step-by-step approach, Therese M. Donovan, 5. Introduction to Probability, Benedek Valkó, David F. Anderson, Cambridge (2017)
Ruth M. Mickey (2019) 6. Introduction to Linear Algebra, 5th Edition, Gilbert Strang, Wellesley (2016)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 25% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Madhan Shanmugasundaram, Infosys Technologies 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras, sryedida@iitm.ac.in 1. Dr. V. Subburayan, SRMIST
2. Prof. K.C. Sivakumar, IIT Madras, kcskumar@iitm.ac.in 2. Dr. P. Sambath. SRM IST
3. Dr. M. Sivaji, SRMIST

12
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Core Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

13
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC503T SECURITY SERVICE MANAGEMENT C PROFESSIONAL CORE
Code Name Category 3 1 0 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand risk management security principles and concepts, and threat modelling concepts and methodologies
CLR-2: explain concepts of security models, vulnerabilities of security architectures and methods of cryptanalytic attacks
CLR-3: study secure design principles in network architectures and Manage identification and authentication of people, devices, and services
CLR-4: demonstrate the knowledge and skills for Security Assessment and Testing and security audits
CLR-5: manage Security Operations concepts and logging and monitoring activities with various recovery plans

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: identify security principles and concepts, and threat modelling concepts and methodologies
CO-2: obtain knowledge from vulnerabilities of security architectures and methods of cryptanalytic attacks
CO-3: gain information from secure design principles in network architectures
CO-4: gain knowledge for Security Assessment and Testing and security audits
CO-5: enhance their knowledge of obtaining logging and monitoring activities with various recovery plans

Unit-1 - Security and Risk Management 12 Hour


security concepts, security governance principles, requirements for investigation types, security policy, standards, procedures, and guidelines, Business Continuity (BC) requirements, risk management concepts,
threat modelling concepts and methodologies.
Unit-2 - Security Architecture and Engineering 12 Hour
fundamental concepts of security models (e.g., Biba, Star Model, Bell-LaPadula), security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption),
vulnerabilities of security architectures, designs, and solution elements, cryptographic solutions, methods of cryptanalytic attacks, security principles to site and facility design.
Unit-3 - Communication and Network Security 12 Hour
secure design principles in network architectures, Secure network components, secure communication channels according to design, Identity and Access Management (IAM)- Physical and logical access to
assets, identification and authentication of people, devices, and services, identity with a third-party service, authorization mechanisms.
Unit-4 - Security Assessment and Testing 12 Hour
Design and validate assessment, test, and audit strategies, conduct security control testing, collect security process data (e.g., technical, and administrative), Analyze test output and generate report, Conduct, or
facilitate security audits.
Unit-5 - Security Operations 12 Hour
Understand and comply with investigations, conduct logging and monitoring activities, Perform Configuration Management (CM) (e.g., provisioning, baselining, automation), Apply foundational security operations
concepts, apply resource protection, conduct incident management, Implement Disaster Recovery (DR) processes, Test Disaster Recovery Plans (DRP).

14
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. https://www.koenig-solutions.com/security-management-training-certification-courses. 4. https://www.linkedin.com/learning/certified-information-security-manager-cism-cert-prep-2022-3-
Learning
2. https://www.koenig-solutions.com/cissp-certification-training-course#benefitsc information-security-program?trk=learning-topics_learning-search-card_search-
Resources
3. https://www.linkedin.com/learning/topics/security-management-and-policy card&upsellOrderOrigin=default_guest_learning.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.T Ravichandran, Product Manager, Servis2 IT Team, Chennai. 1. Dr. P. Balamurugan, SRMIST
2. Mr. Dhanvanth Kesavan, NTT Data Cyber security analyst, Chennai.

15
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC510T Course PARALLEL COMPUTING Course C PROFESSIONAL CORE L T P C
Code Name Category 3 1 0 4
Pre-requisite Nil Co-requisite Nil Progressive Nil
Courses Courses Courses

Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: give a motivation for the study of parallel computing and in particular parallel programming
CLR-2: study different parallel and distributed systems, multi-core and shared memory multiprocessors using OpenMP
CLR-3: get knowledge on distributed memory systems multiprocessors using MPI
CLR-4: provide an introduction to the concepts of massively parallel programming on GPUs and heterogeneous systems
CLR-5: learn GPU programming using OpenCL

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand the basic concepts of parallel programming
CO-2: identify different parallel and distributed systems, multi-core and shared memory multiprocessors using OpenMP
CO-3: acquire the knowledge on distributed memory systems multiprocessors using MPI
CO-4: analyze the concepts of massively parallel programming on GPUs and heterogeneous systems
CO-5: implement GPU programming using OpenCL

Unit-1 Overview of Parallel Systems 12 hour


Need for Parallel Programming, History of Parallel computing, Types of Parallelism, Speedup, Modelling parallel computation, Multiprocessor Models, Interconnection Networks, Basic Properties of Interconnection
Networks, Classification of Interconnection Networks, Topologies of Interconnection Networks, Parallel Computational Complexity, Brent’s Theorem, Amdahl’s Law
Unit-2 Programming Multi-core and Shared Memory Multiprocessors Using OpenMP 12 hour
Programming Multi-core and Shared Memory Multiprocessors Using OpenMP, Shared Memory Programming Model, Multithreaded Programs using OpenMP, Parallelization of Loops, Independent Iterations,
Distributing Iterations Among Threads, Reductions, Parallel Tasks
Unit-3 MPI Processes and Messaging 12 hour
Distributed Memory Computers, Message Passing Interface, MPI Operation Syntax, MPI Data Types, Basic MPI Operations, Process-to-Process Communication, Measuring Performances, Collective MPI
Communication, Collective MPI Data Manipulations
Unit-4 GPU Processors 12 hour
Communication and Computation Overlap, MPI Communicators, Anatomy of a GPU, Introduction to GPU Evolution, A Modern GPU, Scheduling Threads on Compute Units, Memory Hierarchy on GPU, OpenCL,
Execution Model, Memory Model,
Unit-5 OpenCL for Massively Parallel Graphic Processors 12 hour
Programming in OpenCL, Sum of Arbitrary Long Vectors, Dot Product in OpenCL, Dot Product in OpenCL Using Local Memory, Naive Matrix Multiplication in OpenCL, Tiled Matrix Multiplication in OpenCL

16
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. Roman Trobec · Boštjan Slivnik Patricio Bulić · Borut Robič, Introduction to Parallel 3. Cameron Hughes, Tracey Hughes, "Parallel and Distributed Programming using
Resources Computing From Algorithms to Programming on State-of-the-Art Platforms, 2018 C++.Pearson education, 2005
2. Ananth Grama, Vipin Kumar, "Introduction to parallel computing", Second edition, 2007

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 50% - 50% - 50% -
Level 4 Analyze 10% - 10% - 10% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.V.Solai Murugan, CDAC 1. Prof. Valliammai, MIT,Chennai 1. Dr.S.Nagadevi, SRMIST
2. Mr.Saju G Nair,Kyndryl India Pvt. Ltd 2. Dr.Noor Mohammed,IIITDM,Kancheepuram 2. Dr.R.Vidhya, SRMIST

17
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC511J WEB TECHNOLOGIES C PROFESSIONAL CORE
Code Name Category 3 0 2 4
Pre-requisite Co-requisite Progressive
Nil Nil XML, Semantic web, Intelligent web
Courses Courses Courses

Course Offering Department School of Computing Data Book / Codes/Standards Nil

Program
Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Specific
Outcomes
CLR-1: learns how to develop a web page 1 2 3 4 5 6 7 8 9 10 11 12
CLR-2: illustrate client side programming for web applications

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: identify the framework to deploy responsive web pages

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: express the client side application accessed on server side technologies

Communication
Environment &
Sustainability
CLR-5: demonstrate the working of dynamic web applications

solutions

society

PSO-1
PSO-2
PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
understand, apply and analyze mark-up languages like HTML, DHTML, and JavaScript for -
CO-1: 3 2 - - - - - - - - - - - 2
development of different web applications.
CO-2: develop interactive web applications using client-side scripting languages 3 3 - - - - - - - - - - - 2 -
CO-3: create Framework for responsive, mobile-first websites 3 3 - - 2 - - - - - - - - 2 -
CO-4: develop and deploy web applications on server-side technology (Apply) 3 3 - - - - - - - - - - - 2 -
shifting from traditional static web pages to more intelligent, dynamic, and interactive web -
CO-5: 3 3 - - - - - - - - - - - 2
applications

Unit-1 Introduction 9 hour


HTML: Formatting Tags, Links, List, Tables, Frames, forms, Comments in HTML, DHTML, and Introduction to HTML 5,CSS 3 -JavaScript: Introduction, Documents, Documents, forms, Statements,
functions, objects in JavaScript,-JSON, Events and Event Handling, Arrays, FORMS, Buttons, Checkboxes, Text fields and Text areas, Introduction to j-Query.
Unit-2 AJAX, JSP, Netbeans 9 hour
Introduction to advanced dynamic web client side programming :
AJAX, xhtmlHttpRequest,xhtmlHttpRequest Object, AJAX Applications, AJAX Framework, Introduction to java in web technology-Servlets JavaServer Pages- JavaServer Faces Web Technologies in
Netbeans -Creating and Running a Simple Application in Netbeans Examining a JSP File Examining a Page Bean File - Event-Processing Life Cycle - Relationship Between the JSP and Page Bean
Files - Examining the XHTML- Generated by a Java Web Application - Building a Web Application in Netbeans.
Unit-3 Bootstrap, React, NodeJS 9 hour
Bootstrap 5- Bootstrap forms, Grids.-React ES6,List, Forms, Events, React Hooks, Node.js- HTTP module, File system and NPM -Package manager.
Unit-4 PHP, ASP.NET 9 hour
Rich internet applications on server technology PHP-PHP Basics- connecting to a database, cookies, dynamic content. ASP.NET 2.0- creating and running simple web forms- web controls, session
tracking .
Unit-5 Web 4.0
18
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Web 4.0 – Intelligent Web -Progressive Web App Installing and uninstalling web apps, Making PWAs installable.
5. create predefined alert messages using Bootstrap alert
6. Design a React event that triggers any function like click, change, mouseover
LAB EXPERIMENTS:
7. Create a Node.js file that reads the HTML file, and return the content
30 hrs
8. Design a Node.js file that will convert the output "SRM University!" into upper-case letters using
1. Design a HTML page to display your CV.
package manager NPM
2. Design a DHTML form to reserve a railway ticket use CSS3
9. Create XHTML forms in the client side and retrieve the form using PHP program on the server
3. In the form mentioned in problem 2 to reserve a railway ticket add the following validations using
end.
java Script.
10. Write a PHP script that tests whether an e-mail address is input correctly. Verify that theinput
• From city and to city are two different cities.
begins with series of characters, followed by the @ character, another series of characters, a period
• Age of passengers should not be greater than 100.
(.) and a final series of characters. Test your program, using both valid and invalid e-mail
• Name of the passenger should be a string of a maximum length
addresses.
4. Create a Registration form that demonstrates Web controls using ASP.NET
11. Install and Create an Progressive web app that provides an app-like experience
12. Using intelligent web create pixel-perfect designs using Tailwind CSS.

1. Deitel & Deitel, “Internet and World Wide Web – How to Program”, Goldberg, Pearson
Education. 2010 4. Paul Deitel, Harvey Deitel, Abbey Deitel Internet & World Wide Web: How to
Learning
2. Eric Ladd, Jim O’ Donnel, Using HTML 4, XML and JAVA”, Prentice Hall of India 2010 Program, Fifth Edition,2011
Resources
3. Patrick Naughton and Herbert Schildt, The complete Reference Java 2 Fifth Edition by 5. Jennifer Robbins, Learning Web Design, 4th Edition, O’Reilly 2012
TMH 2009

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Life Long Learning Summative
Bloom’s
CLA-1 Average of unit test CLA-2- Practice Final Examination (40% weightage)
Level of Thinking
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - - 15% -
Level 2 Understand 20% - - 30% 20% -
Level 3 Apply 35% - - 35% 35% -
Level 4 Analyze 30% - - 35% 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
Dr. Mariappan Vaithilingam, Senior Engineering Manager, Uber India
Mr.Babumonie, CEO, Digital Analyst Team, Northwestern University, USA Dr.Akilandeswari, SRMIST
Research and Development Pvt centre

19
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC519J WEB DEVELOPMENT FOR INTERNET OF THINGS C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: memorize advanced concepts in IoT technology, protocols, and communication, along with web development fundamentals.
CLR-2: acquire knowledge and skills in collecting, storing, and managing data from IoT devices in web applications.
CLR-3: develop proficiency in designing and implementing real-time data visualization features in IoT web applications.
CLR-4: gain practical experience in integrating different types of IoT devices with web applications, including device control and monitoring functionalities.
CLR-5: summarize the security challenges and implement appropriate security measures, along with deploying and scaling IoT web applications.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: demonstrate an advanced understanding of IoT technology, protocols, and web development fundamentals. 3 - -
CO-2: effectively collect, store, and manage data from IoT devices in web applications. 3 - -
CO-3: implement interactive and real-time data visualization features in IoT web applications. - - 3
CO-4: integrate diverse IoT devices with web applications, enabling device control and monitoring functionalities. 3 - -
CO-5: develop security measures, deploy IoT web applications on cloud platforms, and scale them to handle a large number of IoT devices. - - 3

Module-1 - Introduction to IoT and Web Fundamentals 9 Hour


Overview of IoT technology: protocols and communication, IoT security considerations. Web Application Architecture: Client-server model, HTTP and HTTPS protocols, Web application frameworks.
Front-End Development: HTML5, CSS3, and JavaScript, Responsive web design, User interface (UI) frameworks. Back-End Development: Server-side programming languages (e.g., Python, Node.js), Web
frameworks (e.g., Django, Express.js), RESTful API development
Module-2 - IoT Data Collection and Management 9 Hour
Sensor Networks and Data Collection: Sensor types and characteristics, Wireless sensor networks (WSNs), Data acquisition and preprocessing. Data Storage and Management: Databases for IoT applications,
Data modeling and storage techniques, Storing and managing IoT data in databases, Real-time data processing, Integrating data from IoT devices into web applications.
Module-3 - Real-time Data Visualization in IoT Web Applications 9 Hour
Streaming Data Visualization: Introduction to real-time data visualization, Data streaming protocols (e.g., MQTT, WebSockets), Real-time data visualization libraries and frameworks (e.g., D3.js, Chart.js).
Interactive Dashboards: Overview of interactive dashboards, Designing and implementing interactive and responsive dashboards, Real-time updates and data filtering in dashboards. Data Analytics and Insights:
Extracting insights from IoT data, Data aggregation and summarization techniques, Implementing data analytics algorithms in web applications.
Module-4 - Integrating IoT and Web Applications 9 Hour
IoT Web Application Communication: MQTT and CoAP protocols, WebSockets for real-time communication, API integration with IoT platforms. Integrating IoT with Web: Exploring different IoT devices and their
communication protocols, Integrating IoT devices with web applications, Implementing device control and monitoring functionalities.
Module-5 - Security and Deployment of IoT Web Applications 9 Hour

20
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
IoT Security Best Practices: Understanding security challenges in IoT applications, Implementing authentication and authorization mechanisms, Ensuring data privacy and secure communication in IoT web
applications. Deployment and Scalability: Deploying IoT web applications on cloud platforms, Containerization and microservices, Scaling web applications to handle a large number of IoT devices. Case Study:
Perform one deployment IoT Web based case study on any title like Smart Home Automation, Smart Agriculture, Environmental Monitoring, Retail Analytics etc.
List of Experiments: 30 Hour
7. Real-Time Data Visualization and Interactive Dashboard Development:
1. Building a Weather Monitoring Web Application:
8. Implementing Data Analytics and Insights in IoT Web Applications:
2. Developing a Secure IoT Data Transmission System:
9. IoT Device Integration and Control in a Web Application:
3. Creating a RESTful API for a Task Management Application:
10. Real-Time Communication and API Integration with IoT Platforms:
4. Designing a Responsive Web Application Using UI Frameworks:
11. Implementing IoT Security Measures in a Web Application:
5. Building a Wireless Sensor Network for Environmental Monitoring:
12. Deployment and Scalability of IoT Web Applications on Cloud Platforms:
6. Developing a Real-Time Monitoring System for Industrial IoT:

1. Rajkumar Buyya, Amir Vahid Dastjerdi, and Arkady Zaslavsky, Internet of Things: 5. Scott Murray, Interactive Data Visualization for the Web: An Introduction to Designing with
Principles and Paradigms, Morgan Kaufmann Publishers, 2016. D3, Oreilly, 2017.
2. Jennifer Niederst Robbins, Learning Web Design: A Beginner's Guide to HTML, 6. Nick Qi Zhu, Data Visualization with D3.js Cookbook, Illustrated, Packt Publishing, 2013.
CSS, JavaScript, and Web Graphics, Fifth Edition, SPD Publishers, 2018. 7. Claire Rowland, Elizabeth Goodman, Martin Charlier, and Ann Light, Designing Connected
Learning
3. Ethan Brown, Web Development with Node and Express: Leveraging the JavaScript Products: UX for the Consumer Internet of Things, Kindle (I) Edition, Oreilly, 2015.
Resources
Stack, Oreilly, 2014. 8. Brian Russell, Drew Van Duren, and John Sammons, Practical Internet of Things Security,
4. Maciej Kranz, Building the Internet of Things: Implement New Business Models, Pack Publishing, 2016.
Disrupt Competitors, Transform Your Industry, Old edition, Wiley, 2016. 9. Chandraish Sinha, Building Interactive Dashboards with Tableau, Kindle Edition, eBook,
Books District Publication, 2023.

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Life Long Learning Summative
Bloom’s
CLA-1 Average of unit test CLA-2- Practice Final Examination (40% weightage)
Level of Thinking
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
Ms. Aparna, Analyst - Salt Lake City Sector 5, TCS, Kolkata Dr. Krupa N, Assistant Professor, NIT, Surat Dr V Anbarasu, SRMIST

21
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC520J CLOUD STORAGE AND EDGE COMPUTING C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: establish a foundational understanding of cloud storage and edge computing
CLR-2: explore practical applications in real-world use cases of cloud storage and edge computing
CLR-3: examine emerging trends and innovations in cloud storage and edge computing
CLR-4: realize the improved performance of edge computing in Internet of things
CLR-5: summarize the concept of multi-access edge computing and Implement edge computing in MEC

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: memorize the fundamentals of cloud storage and edge computing. 3 - -
CO-2: explore different cloud storage models and services - - 3
CO-3: analyze the benefits and challenges of edge computing 3 - -
CO-4: create use cases in IoT with edge computing 3 - -
CO-5: develop services in MEC and Implement use cases in MEC - - 3

Module-1 - Introduction to Cloud Storage and Edge Computing 9 Hour


Overview of Cloud Computing, Cloud Deployment Models, Private Vs Public Clouds, Business Drivers for Cloud Computing, Introduction to Cloud Technologies, Cloud Service Models (IaaS, PaaS, SaaS),
Introduction to Edge Computing, Basic Characteristics and Attributes, Edge and Real-Time Network Edge, Benefits of Edge Computing, “CROSS Value of Edge Computing, Collaboration of Edge Computing and
Cloud Computing, Fog and Edge Computing, Drawbacks of Edge Computing, Integration of Cloud and Edge Computing Environments.
Module-2 - Cloud Storage and Edge Computing 9 Hour
Evolution of Computing Models towards Edge Computing: Shared and central resources versus exclusive and local computation, IoT disrupts the cloud, Characteristics of the new computing model, Blueprint of
edge computing intelligence, Definition and high level architecture, Key Drivers of Edge Computing, Application areas, Mobile-Edge Computing, Edge Computing Reference Architecture: Model- Driven Reference
Architecture, Multi- View Display, Concept View, ECNs, Development Frameworks, and Product Implementation, Edge Computing Domain Models , Function view, Edge computing Network, Development service
framework, Deployment operation service framework (Smart services), Full life cycle data service, Security service, Deployment View.
Module-3 - Edge Computing in Internet of Things 9 Hour
Edge Computing in the IoT-Introduction- Mobile operation IoT edge, Key benefits of edge for the IoT- Unique requirements of edge for the IoT, Use cases for IOT edge, Device management, security, Service
enablement, Message prioritization, Data replication, Cloud enablement IoT Solutions-, Standards for self-organization, self-configuration, self-discovery, Trust/Decentralized trust, Credible information, E/W
communication Standards between multiple ECNs, Standard implementation of algorithms for machine learning, loss of connectivity.
Module-4 - Multi-Access Edge Computing 9 Hour
From Cloud computing to Multi access edge computing- The Edge and not to edge, Edge part of MEC, Access part of MEC, Edge computing in the network – ME HOST, MEC Management, ETSI MEC and ETSI
NFV, MEC use cases and Service Scenarios, Assistance for intensive computation MEC in the enterprise setting, Enabling MEC in 4G networks, MEC in 5G networks, Network evolution
towards 5G, Network performance drivers for 5G systems

22
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Module-5 - Implement Edge Computing in MEC 9 Hour
Infrastructure Evolution – Datacenter, Communication Network Evolution, Devices Evolution, Edge cloud deployment options – Real estate model, Infrastructure as a Service, Platform as a Service.
Collaboration Platform – as a service, TCO Analysis – an Operator Perspective, Focus on energy cost, Deployment cost, Business Model aspects, MEC Market, the new vertical perspective, New players in 5G role
of verticals, Overview of vertical segments – Smart Manufacturing, Smart Transportation, E-Health.
List of Experiments: 30 Hour 8. Introduction to iofog Tools Installation tools to create and manage ECN’s
1. Case Study on Cloud Storage services 9. Deploy micro services and writing your own microservices
2. Implementation of Hypervisor and Multiple Virtual Machine Creation 10. Introduction to iofogtcl, common header YAML
3. Implementation of Aneka Cloud Installation and configuration 11. Platform YAML specification Agent configuration YAML specification
4. Implementation of Openstack cloud Installation and configuration 12. System-Hardware abstraction layer
5. Implementation Hadoop Distributed File system single node 13. System-Bluetooth REST API
6. Implementation of Google Cloud SQL Database 14. ioFog connectors
7. Implementation of AWS S3 bucket data storing and removal 15. Implementation of Minimal Spanning Tree

1. Dinkar Sitaram and Geetha Manjunath, Moving to the Cloud: Developing 4. Dario Sabella, Alex Reznik and Rui Frazao, Multi-Access Edge Computing in Action, CRC
Apps in the New World of Cloud Computing, Syngress, 2013. Press, 2019.
Learning 2. Ajit Singh, Edge Computing: Simply in Depth, Independently Published, 2019. 5. Rajkumar Buyya and Satish Narayana Srirama, Fog and Edge Computing Principles and
Resources 3. Cao, Jie, Zhang, Quan, Shi and Weisong, Edge Computing: A Primer, Pearson Paradigms, John Wiley & Sons, Inc. 2019.
Education, Springer, 2018. 6. Yu Hua, Xue Liu, Searchable Storage in Cloud Computing, Springer Nature Singapore Pte Ltd.
2019.

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Life Long Learning Summative
Bloom’s
CLA-1 Average of unit test CLA-2- Practice Final Examination (40% weightage)
Level of Thinking
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Sherly A, Schneider Electric, Lead Application Developer 1. Dr. Suresh Sankaranarayanan, Professor, King Faisal 1. Dr Mary Subaja Christo, SRMIST
University

23
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course EMBEDDED SYSTEM AND SOFTWARE DEVELOPMENT FOR Course L T P C
21CSC522J C PROFESSIONAL CORE
Code Name INTERNET OF THINGS Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: describe the Building Blocks of Embedded System
CLR-2: solve program to control ARM microcontrollers for direct hardware interaction.
CLR-3: emphasize the hands-on learning approach.
CLR-4: create prototype and applications on the ESP8266 platform.
CLR-5: transform theoretical IoT knowledge into practical skills by exploring real-world applications

Programme Outcomes
Course
At the end of this course, learners will be able to: (PO)
Outcomes (CO):
1 2 3
CO-1: gain fundamental knowledge of embedded systems, their design process, and connectivity with the Internet of Thing 1 - 2
CO-2: combine the ability to develop programs and understand the underlying ARM architecture. 3 - -
CO-3: configure XBee modules, develop sensor nodes with Arduino and Raspberry Pi, integrate cameras, and implement the Zigbee protocol on ARM. 3 - 3
CO-4: program ESP8266 for Wi-Fi connectivity, sensor data acquisition, web interaction, and cloud data logging, visualization. 3 - 3
bridge the gap between IoT theory and practice through case studies in health monitoring, irrigation control, environment, weather stations, and cloud-based home
CO-5: 3 - 3
automation

Module-1 - Introduction to Embedded 9 Hour


Definition- Examples and components of embedded Systems - Classification of an Embedded system. Architecture of Embedded system.-General purpose computers vs embedded system,-Embedded System
Design Process- Various Embedded cores controller.-Embedded system with IoT connectivity.
Module-2 - ARM Microcontroller Architecture and Programming - Thumb 9 Hour
ARM Architecture -ARM Assembly Language Programming-ARM Organization and Implementation-The ARM Instruction Set-The Thumb Instruction Set-ARM Processor Cores
Module-3 - XBee with Arduino and Raspberry Pi 9 Hour
Introduction to Xbee wireless modules-Pin layout- configuring modules-Configuring the router-Configuring the XBee modules-Testing the network-Arduino based sensor nodes-Arduino models-The Arduino IDE-
Hosting sensors with Arduino-Hardware and software setup-Using an Arduino as a Data collector for Xbee sensor nodes-Raspberry Pi based sensor nodes-Models-Installing a Boot Image-
GPIO pin mapping-Hosting sensors with Raspberry Pi-Understanding and connectivity of Raspberry-Pi /Arduino board with camera. Write an application to capture and store the image-Implementing zigbee protocol
with ARM.
Module-4 - ESP8266: Connect and Control 9 Hour
Introduction to ESP8266-Hardware requirement-Hardware configuration - Installing the Arduino IDE for the ESP8266-Connection your module to your wi-fi network-Controlling LED-Reading data from a GPIO pin-
Grabbing the content from a web page-Reading data from a digital sensor-Cloud Data logging- Hardware and software requirement-Displaying data
Module-5 - Smart environment IoT-Case studies 9 Hour
Health Monitoring System for Solar Panel with Cayenne APP-Smart Irrigation System in Agricultural Field with Blynk APP-Environmental Parameters Monitoring System with Virtuino APP-Weather Station with Thing
Speak Server, Cloud based home automation system.
24
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
8. Implementing zigbee protocol with ARM.
9. Study of Connectivity and configuration of Raspberry-Pi /Arduino board circuit with basic peripherals,
List of Experiments: 30 Hour
LEDS. Understanding GPIO and its use in program.
1. Study of ARM evaluation system Lab
10. Basic structure of Arduino code and how to control an output (LED) with simple commands.
2. Exploring the Instruction Set Architecture (ISA) of an ARM Processor
11. Understanding the connectivity of Raspberry-Pi /Arduino board circuit with IR sensor. Write an
3. Interfacing an LED and controlling its brightness using PWM on an ARM platform.
application to detect obstacle and notify user using LEDs.
4. Interfacing real time clock and serial port.
12. Understanding and connectivity of Raspberry-Pi /Arduino board with camera. Write an application to
5. Interfacing keyboard and LCD.
capture and store the image.
6. Implementing basic arithmetic operations on an ARM microcontroller.
13. Study of ESP8266 and Arduino
7. Interfacing stepper motor and temperature sensor.
14. Implementation of ESP8266 based LED control
15. Implementation of Cloud data logging with the ESP8266

1. Simon Cirani, Gianluigi Ferrari, Marco Picone & Luca Vetri, Internet of Things, 6. Márquez, F. P., & Lev, B. ‘Internet of things: Cases and studies, Springer, 2022
Architectures, Protocols and Standards, Weily, 2016 7. Bahga, A., & Madisetti, V. Internet of things: A hands-on approach, VPT,2014
Learning 2. Furber, Arm system-on-Chip architecture, 2/E. Pearson Education India.,2001 8. Prasad, Bb. John Wiley & Sons, Embedded real time Systems: Concepts, Design Prog,
3. Bell, Charles. ‘Beginning sensor networks with Arduino and Raspberry Pi, Apress, 2003.
Resources
2014. 9. Afif Osseiran, Jose F. Monserrat and Patrick Marsch, 5G Mobile and Wireless Communications
4. Shibu, Introduction to Embedded Systems, McGraw Hill, 2017. Technology, Cambridge University Press, 2016.
5. R. Kamal, Embedded Systems: Architecture, Programming and Design, MGH, 2008

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Life Long Learning Summative
Bloom’s
CLA-1 Average of unit test CLA-2- Practice Final Examination (40% weightage)
Level of Thinking
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Kanagachidambaresan Ramasubramanian, PhD, Founder 1. Dr. J. Arul Valan, Assistant Professor, Department of Computer
1. Dr. M. Safa, SRMIST
EAZYTHINGS TECHNOLOGY PVT LTD Science, NIT Nagaland

25
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC526J CYBER FORENSIC AND INCIDENT RESPONSE C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the basic of forensic investigation and its procedure, policies on laws
CLR-2: understand the network, filesystem, user system level forensic
CLR-3: acquire knowledge in investigation procedure and its policies
CLR-4: exploring new aspect in investigation in every role of incident response team
CLR-5: implement and analyze the evidence to formulate the strategy

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: apply the knowledge forensic investigation 3 1
CO-2: identify and design the attack scenario for volatile & non volatile 2 1
CO-3: implement and investigate the procedure evolve in forensic duplication 1 3
CO-4: identify , implement and investigate on the hard disk imaging 3 2
CO-5: identify and investigate the network and browser forensic 1 1
CO-6: design and implement the file system , forensic report writing 1 3 2

Module-1: Introduction 15 Hour


Introduction to incident response process, Incident response methodology - Incident process, Preparation for incident response – Overview Pre incident preparation, Global cybercrime landscape, Overview of cyber
forensics Preparing Individual Hosts, Lab 1: lab setup for pre-incident preparation, Preparing a Network, Establishing Appropriate Policies and Procedures, Creating a Response Toolkit, Establishing an Incident
Response Team, Overview of the Initial Response Phase, Establishing an Incident Notification Procedure, Introduction to forensic tools, Lab 2- Volatile data collection – Windows Live Data Collection, Recording the
Details after Initial Detection, Incident Declaration, Investigation Guidelines, Legalities of Forensic- Reason for Legal , Statutory Governmental laws: US, Legal and ethical considerations Lab 3- Volatile data collection
– WinLift Imager &Analyser.
Module-2:Evidence and Volatile Data Collection 15 Hour
Introduction to evidence data collection –Volatile data collection - Windows Creating Response tool kit , Storing Information Obtained during the Initial Response, Obtaining Volatile Data, Performing an In-Depth Live
Response, Lab 4: Memory / Process data collection – Volatility, Volatile data collection, Storing Information Obtained During the Initial Response, Network forensics tools, Memory forensics tools, Obtaining Volatile
Data Prior to Forensic Duplication, Introduction to Memory, Process data collection, Introduction to windows process, Lab 5: Registry , Recycle bin and data storage, Introduction to registry structure, Evidence
collection from registry – System, Application, Evidence collection from registry, Evidence collection from network, Analysis on evidence collection, Importance of digital evidence, Types of digital evidence, Lab 6:
Hard drive imaging – True Imager 4.0
Module-3: Evidence handling Procedures 15 Hour
Introduction to Evidence data collection – Nonvolatile Introduction to computer storage fundamentals Hard drives and interfaces, Preparation of hard drive media. Introduction to files system and storage layers.
Introduction to files system and storage layers, Forensic duplication, Lab 7: Hard drive Imager/Analyser – Cyber Check Tool, Overview of evidence handling procedures- Chain of custody, Forensic Duplicates
As Admissible Evidence, Forensic Duplication Tool Requirements, Creating a Forensic Duplicate of a Hard Drive, Creating a Qualified Forensic Duplicate of a Hard Drive, Forensic Imaging and Analysis: Disk imaging
techniques, File system analysis, Metadata analysis, Data recovery methods Lab 8: Tableau Write Blocking Utility Tools (HDD/Flash Drive), Creating a Qualified Forensic Duplicate with Safe Back, Evidence system
description, Evidence tags, Evidence label, storage , backup , disposition, Case Study : Evidence Handling reporting, Case study : Report Writing, Evidence Custodian audits, Lab 9 : SIM CARD Extractor

26
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Module-4: Investigation and Report Writing 15 Hour
Introduction to analyses / Detect malicious code and intruders, System process, Unusual or hidden files, Root kits and backdoors, Introduction to network forensic, Introduction to browser forensic, Types of network
monitoring, Lab 10: How to collect network logs for investigation Firewall logs, Virus logs, Browser Investigation, Browser Investigation Firefox- IE, Browser Investigation –Firefox, Case Study : Browser Investigation,
Case study : Report Writing, Network Investigation, Lab 11 : Network Forensic using TCP Dump/ Wireshark, Finding Network-Based Evidence, Generating Session Data with tcptrace, Cloud forensics, Financial
Frauds, Espionage and Investigations. Reassembling Sessions Using Ethereal, Refining tcpdumpFilters. Lab 12 : Disk Forensics
Module-5: File System Management 15 Hour
Introduction to file system analysis, How Files Are Compiled, Statically Linked Programs, Dynamically Linked Programs, Compilation Techniques and File Analysis, Static Analysis of a Hacker Tool, Lab 13: Mobile
/ Browser Forensic, NTFS_File system category, content category, NTFS_Metadata category, Filename category, NTFS_Application - Specific file system, NTFS_Application level search technique, Comparison of
windows (FAT/EXFAT/NTFS), EXT_File system category, content category, Lab 14: NTFS File system, EXT_Metadata category, Filename category, EXT_Application level search technique, Comparison of Linux
(EXT 2/3/4/ MacOS), Case Study : File system, Forensic Report Writing, Case study Report Writing, Lab 15:EXT file system, Current challenges and future directions, Trends in cyber threats and attacks,
Advancements in forensic techniques and tools.

1. Kevin Mandia, Chris Prosise, “Incident Response and computer forensics”, Tata 6. Kevin Mandia , "Incident Response & Computer Forensics, 3rd Edition" : 2012. The McGraw:Hill, ISBN-
McGrawHill,2006. 13: 978-0071798686
2. Peter Stephenson, "Investigating Computer Crime: A Handbook for Corporate 7. Douglas Schweitzer ,”Incident Response - Computer Forensics Toolkit”, Copyright © 2003 by Wiley
Investigations", Sept 1999 Publishing, Inc, ISBN: 0-7645-2636-7
Learning 3. Eoghan Casey, "Handbook Computer Crime Investigation's Forensic Tools and 8. AymanShaaban ,Konstantin Sapronov “Practical Windows Forensics -Leverage the power of digital
Resources Technology", Academic Press, 1st Edition, 2001 forensics for Windows systems” , Packt Publishing, June 2016 , ISBN 978-1-78355-409-6
4. Skoudis. E., Perlman. R. Counter Hack: A Step-by-Step Guide to Computer Attacks and 9. Leighton R. Johnson III ,”Computer Incident Response and Forensics Team Management”,Syngress
Effective Defenses. Prentice Hall Professional Technical Reference. 2001 ISBN: 978-1-59749-996-5
5. Norbert Zaenglein, "Disk Detective: Secret You Must Know to Recover Information from a 10. Brian Carrier "File System Forensic Analysis" – by Addison Wesley, 1st edition,2005. ISBN-13: 978-
Computer", Paladin Press, 2000 0321268174

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr.A.Mohanraj, Data Engineer, Standard Chartered 1.Mr.Ashok Kumar Mohan , Amrita University 1.Dr. C.N.S.Vinoth Kumar, SRMIST
2. Ms. Chitra, SSN college of Engineering

27
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC527J ETHICAL HACKING AND VULNERABILITY ASSESSMENT C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the fundamentals of hacking techniques.
CLR-2: gain knowledge about information gathering and choosing target.
CLR-3: study about various vulnerability assessment tool.
CLR-4: study about various network attacks and its countermeasures.
CLR-5: explore about wireless hacking and web hacking with real world examples.

Programme Outcomes
Course Outcomes (PO)
At the end of this course, learners will be able to:
(CO):
1 2 3
CO-1: gain knowledge about operating system used for security assessment. 2 2 3
CO-2: setup as virtual environment to exploit various attacks. 2 - -
CO-3: navigate, comment, and modify tools for vulnerability assessment. 2 - 3
CO-4: use various sniffing tools to exploit over networks. - 2 -
CO-5: use air crack and air dump tool for wireless hacking. - 2 3

Module -1 : Introduction to Hacking 9 Hour


Important Terminologies- Categories of Penetration Testing – Writing Reports and its structure- Vulnerability assessment summary- Risk Assessment Methodology – File Structure in Linux-Scheduler- Users –
Applications – Kali Linux– Services.
Module -2: Information Gathering and Target Enumeration 9 Hour
Active Information Gathering- Passive Information Gathering- What Web -Net craft- Xcode Exploit Scanner - Intercepting a Response- Interacting with DNS Servers- Nslookup- Forward and Reverse DNS Lookup-
SNMP- SMTP Enumeration- Intelligence Gathering Using Shodan- Host Discovery- Scanning for Open Ports and Services- Types of Port Scanning- TCP Three-Way Handshake- Scanning for a Vulnerable Host-
Port Status Types- OS Fingerprinting- Advanced Firewall/IDS Evading Techniques- Using Wireshark- Decoys - ZENMAP
Module -3 : Vulnerability Assessment 9 Hour
What Are Vulnerability Scanners? - Pros and Cons of a Vulnerability Scanner- Vulnerability Assessment with Nmap- Scanning netapi- Testing SCADA Environments with Nmap- Nessus Vulnerability Scanner-
Installing Nessus on Kali Linux- Nessus Integration with Metasploit- Importing Nessus to Metasploit- Using Exploit-db. with Kali Linux.
Module -4 : Network Sniffing 9 Hour
Types of Sniffing- ARP Attacks- Denial of Service Attacks- Using ARP Spoof to Perform MITM Attacks- Sniffing the Traffic with Dsniff- Sniffing Pictures with Drifnet- Urlsnarf and Webspy- Sniffing with Wireshark-
Hijacking Session with MITM Attack- ARP Poisoning with Cain and Abel- Sniffing Session Cookies with Wireshark- Hijacking the Session- SSL Strip: Stripping HTTPS Traffic- DNS Spoofing- DHCP Spoofing
Module-5 Wireless and Web Hacking 9 Hour
Introducing Aircrack-ng- Uncovering Hidden SSIDs-Monitoring Beacon Frames on Wireshark-Monitoring with Airodump-ng.Determining the Target with Airodump-ng-Cracking a WPA/WPA2 Wireless Network Using
Aircrack-ng-Evil Twin Attack-Scanning the Neighbors-Spoofing the MAC-Setting Up a Fake Access Point-Causing Denial of Service on the Original AP-Attacking the Authentication-Brute Force and Dictionary
Attacks-Types of Authentication-Brute Force Attack-SQL Injection Attacks-Testing for SQL Injection-XSS (Cross-Site Scripting)-Cross-Site Request Forgery (CSRF)-Real-World Example on Web Hacking.
28
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Lab Experiments
S.
Title of Experiment S. No Title of Experiment - 30 Hour
No
1 Understanding of VM and Installation of Kali Linux 9 OS Fingerprinting
2 Basic and Advanced Linux Commands 10 Analyzing packets using Wireshark tool
3 Foot printing using advanced Google hacking techniques 11 Vulnerability Assessment with Nmap tool
4 Gathering information from social engineering site using theHarvester tool. 12 Understanding of Nessus Vulnerability Scanner and its features
5 Implementing active online attack using Trojan Horse 13 Using Metasploit framework in Kali Linux
6 Implementing Forward and Reverse DNS Lookup 14 Implementation of ARP Spoof to Perform MITM Attacks
7 Implementing Intelligence Gathering Using Shodan 15 Performing SQL Injection attack
8 Scanning for a Vulnerable Host

2. Glen D. Singh, The Ultimate Kali Linux Book ,Packt Publishing Limited, 2022. ISBN:
Learning 1. Rafay Baloch, Ethical Hacking and Penetration Testing Guide, Auerbach 9781801818933
Resources Publications, 2014. ISBN: 9781351381345 3. SagarRahalkar, Network Vulnerability Assessment, Packt Publishing Limited, 2018. ISBN:
9781788627252

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. BhawanaRudra Assistant Professor (Grade I) National Institute
1.Mr.Karthik Expert Member from k7 Computing 1.Dr.V.Joseph Raymond,SRMIST
of Technology, Warangal

29
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC528J APPLIED MACHINE LEARNING ALGORITHMS C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: acquire knowledge about supervised and unsupervised learning algorithms
CLR-2: understand and perform feature engineering, statistical data analysis and outlier analysis
CLR-3: develop, deploy and evaluate machine learning models with explainability

Course Outcomes Programme Outcomes (PO)


At the end of this course, learners will be able to:
(CO): 1 2 3
CO-1: devise suitable algorithms with supervised and unsupervised learning 3 1 2
CO-2: apply feature engineering to select optimal features and remove outliers 2 3 3
CO-3: develop and deploy machine learning models. 3 1 3
CO-4: evaluate the usability and explainability of the model. 1 3 3

Module-1 - Supervised Learning 15 Hour


Implement and understand the cost function and gradient descent for multiple linear regression - Implement and understand methods for improving machine learning models by choosing the learning rate - plotting the
learning curve - performing feature engineering - applying polynomial regression - Implement and understand the logistic regression model for classification -Learn why logistic regression is better suited for classification
tasks than the linear regression model is - Implement and understand the cost function and gradient descent for logistic regression - Understand the problem of - overfitting - improve model performance using
regularization - Implement regularization to improve both regression and classification models
Module-2 - Advanced Learning Algorithms 15 Hour
Build a neural network for binary classification of handwritten digits using TensorFlow - Gain a deeper understanding by implementing a neural network in Python from scratch - Optionally learn how neural network
computations are vectorized to use parallel processing for faster training and prediction - Build a neural network to perform multi-class classification of handwritten digits in TensorFlow -using categorical cross-entropy
loss functions and the SoftMax activation - Learn where to use different activation functions – ReLu - linear - sigmoid - SoftMax in a neural network - depending on the task you want your model to perform - Use the
advanced Adam optimizer to train your model more efficiently - Discover the value of separating your data set into training - cross-validation -test sets - Choose from various versions of your model using a cross-
validation dataset -evaluate its ability to generalize to real-world data using a test dataset - Use learning curves to determine if your model is experiencing high bias or high variance - learn which techniques to apply
regularization - adding more data - adding or removing input features to improve your model’s performance - Learn how the bias-variance trade-off is different in the age of deep learning - and apply Andrew Ng’s advice
for handling bias and variance when training neural networks - Learn to apply the iterative loop of machine learning development to train - evaluate - tune your model - Apply data-centric AI to not only tune your model
but tune your data using data synthesis or data augmentation to improve your model’s performance - Build decision trees and tree ensembles - such as random forest and XGBoost - boosted trees - to make predictions
- Learn when to use neural network or tree ensemble models for your task - as these are the two most commonly used supervised learning models in practice today.
Module-3 - Unsupervised Learning and Recommender Systems 15 Hour
Use unsupervised learning techniques for unsupervised learning: including clustering and anomaly detection - Build recommender systems with a collaborative filtering approach and a content-based deep learning
method - Build a deep reinforcement learning model - Implement K-mean clustering - Implement anomaly detection - Learn how to choose between supervised learning or anomaly detection to solve certain tasks -
Build a recommender system using collaborative filtering - Build a recommender system using a content-based deep learning method - Build a deep reinforcement learning model (Deep Q Network)." - Histograms -
Box Plots etc - use of frequency distributions – mean comparisons - cross tabulation - statistical inferences using chi square - t-test and ANOVA - Outlier Analysis and Detection - outlier analysis - density based and
distance based.

30
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Suggested Lab Exercises 30 Hour
Lab 1: Understanding "Mobile Price" dataset by doing feature analysis. Data is available at: https://www.kaggle.com/datasets/iabhishekofficial/mobile-price-classification/data
Lab 2: Execute data preprocessing step on the above dataset: perform outlier and missing data analysis towards building a refined dataset
Lab 3: Build machine learning model/s to predict the actual price of the new mobile based on other given features like RAM, Internal Memory etc
Lab 4: Calculate the prediction accuracy of the models used in Experiment 3 and do comparative analysis among them to identify the best technique.
Lab 5: Understanding "Second Hand Car Prediction Price" dataset by doing feature analysis. Data is available at: https://www.kaggle.com/datasets/sujithmandala/second-hand-car-price-prediction
Lab 6: Perform data preprocessing step on the above dataset: perform outlier and missing data analysis towards building a refined dataset.
Lab 7: Perform Feature Engineering towards building new feature which is more impactful. Build machine learning model/s to predict the price of the car based on other given features like Brand, Model, Year, Fuel
Type etc
Lab 8: Calculate the prediction accuracy of the models used in Experiment 7 and do comparative analysis among them to identify the best technique.
Lab 9: Plot the features (actual price and predicted price) in scatter plot to understand the variation.
Lab 10: Understanding "Marketing Campaign Positive Response Prediction" dataset by analysing all the features. Data is available at: https://www.kaggle.com/datasets/sujithmandala/marketing-
campaign-positive-response-prediction
Lab 11: Perform exploratory data analysis on the above dataset: perform outlier and missing data analysis towards building a refined dataset. Show the outliers in box plot or through some statistical
technique. Find the numerical and categorial features.
Lab 12: Perform Feature Engineering towards building new feature which is more impactful than the existing ones. Build the correlation matrix and show visually the relationship among various features.
Lab 13: Build machine learning model/s to predict the result of marketing campaign based on other given features like customer details, gender, annual income etc
Lab 14: Calculate the prediction accuracy of the models used in Experiment 13 and do comparative analysis among them to identify the best technique.
Lab 15: Find imbalanced classes, overfitting, and data bias in the above two datasets and apply some technique to overcome it.

1. Hang Li, Machine Learning Methods - By Springer Nature Singapore (2023)


2. Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow by Aurélien 4. Reinforcement Learning: An Introduction by Richard S. Sutton and Andrew G. Barto, 1998
Géron, 2019 (2nd edition) (1st edition), 2018 (2nd edition)
Learning
3. Pattern Recognition and Machine Learning by Christopher M. Bishop, Springer 5. Dr. R. Nageswara Rao, Machine Learning in Data Science Using Python - By Dreamtech
Resources
(2006) Press (2022
6. Introduction to Machine Learning with Python by Andreas C. Müller and Sarah Guido(2016)

31
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - - 10% 25% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 15% - - 25% 20% -
Level 4 Analyze 15% - - 30% 20% -
Level 5 Evaluate 20% - - 10% 10% -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan,SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja,SRMIST
3. Dr.R.Balaji Ganesh,SRMIST
4.Dr.R.Deebalakshmi,SRMIST

32
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC529T INFERENTIAL STATISTICS C PROFESSIONAL CORE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the role of statistics and its models in data analytics
CLR-2: get to know the probability and its application on data analysis
CLR-3: gain knowledge on sampling and hypothesis
CLR-4: implement the various hypothesis tests
CLR-5: know about independence, variance and statistical simulations

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: categorize various probably representation to understand the data. - 3 1
CO-2: use appropriate probability models in problem space 2 1 -
CO-3: collect/make sample data and choose hypothesis choices - 3 2
CO-4: apply/ perform hypothesis test to infer the insight of resultant data 1 - 2
CO-5: implement various statistical test to analyze the data 3 1 -

Module-1 - Introduction To Statistics 9 Hour


Role of statistics in Data science - Different types of data. - Understanding Random variable Numerical Variable Categorical Variable - Data Collection, Types of Sampling, Descriptive Statistics - Measure of
Central Tendency Mean, Median and Mode - Measure of Dispersion Range, Quartiles, Standard Deviation, Variance - Distribution of Data Skewness and Kurtosis - Covariance and Correlation, Difference between
covariance and correlation and its significance.
T1: Building programs to work with the Python packages for Statistics
T2: Building programs to work with Descriptive statistics in Python
T3: Building programs to perform Correlation analysis in Python
Module-2 - Probability 9 Hour
Permutation and Combination – Types of Probability - Rules for computing probability - Marginal probability Conditional probability - Bayes Theorem - Applications of Bayes Theorem – Problem-solving in Bayes
theorem - Probability Distributions Binomial & Poisson - Normal Distribution.
T4: Building programs to perform Probability computation in Python
T5: Building programs work with Bayes theorem applications in Python
T6: Building programs work with Plotting and analyzing the distribution in Python
Module-3 - Estimation and Hypothesis Testing 9 Hour
Sampling Distribution & Central limit theorem, Point estimate, confidence interval - Hypothesis Testing Basics Null & Alternative Hypothesis formulation - Types of hypotheses - Hypothesis testing process - Errors
in hypothesis testing – Type I and Type II - Power of test - Number of tails - Choice of test statistic - Examples.
T7: Simulations of Central Limit Theorem
T8: Building Python programs to use Hypothesis testing in Python

33
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
T9: Case study in Python using Estimation & Hypothesis Testing
Module-4 – Test of Mean and Proportion 9 Hour
Test of Mean - One sample Z Test - Test of Mean - One sample t-Test - Test of Mean – 2 samples - Independent and Dependent - 2 samples - Test of proportion - One sample (Z proportion test) – Two samples
(Z proportion test) - Case Study - Categorical vs Continuous –- More than 2 samples.
T10: Building programs to implement z-test and t-test in Python
T11: Building programs to implement one sample and two sample tests in Python
T12: Case study in Python
Module-5 - Hypothesis Testing 9 Hour
Hypothesis Testing – Analysis of Variance - One way ANOVA Two-way ANOVA, Categorical vs Categorical – Chi-Square, Test of the goodness of fit - Test of independence - Test of variance
T13: Building programs to implement the Chi-square test in Python
T14: Building programs to implement non-parametric tests in Python
T15: Case Study in Python

1. Kathryn A Szabat David M. Levine, P. K. Viswanathan, David Stephan (2017). 6. Hastie, T., Friedman, J., & Tisbshirani, R. (2018). The Elements of statistical learning: Data
Business Statistics: A First Course, 7th Edition mining, inference, and prediction. New York: Springer.
2. Haslwanter T. An introduction to statistics with python. With applications in the life 7. Grus, J. (2019). Data Science from Scratch, 2nd Edition. Place of publication not identified:
sciences. Switzerland: Springer International Publishing. 2016. O'Reilly Media, Inc.
Learning
3. Downey, A., & Green Tea Press. (2012). Think Bayes: Bayesian statistics made 8. 7. McKinney, W. (2018). Python for data analysis: Data wrangling with pandas, NumPy, and
Resources
simple. Needham, Massachusetts: Green Tea Press. IPython. O'Reilly Media, Inc.
4. Montgomery, D.C. and Runger, G.C. (2011). Applied Statistics and Probability for 9. Vanderplas, J. T. (2017). Python data science handbook: Essential tools for working with
Engineers, John Wiley & Sons, 5th Edition data. O'Reilly Media, Inc.
5. https://www.openintro.org/book/os/ 10. https://greenteapress.com/wp/think-stats-2e/

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 5% - 5% - 5% -
Level 6 Create 5% - 5% - 5% -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Abhinanda Sarkar, Academic Director, Great Learning. 1. Dr. Masilamani, IITDM, Kanchipuram 1. Dr. A. Shobanadevi, SRMIST
2. Dr Srabashi Basu, Senior Faculty, Great Learning 2. Dr. D. Hemavathi, SRMIST

34
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC530J CLOUD ARCHITECTURE AND DESIGN C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: review the fundamentals of cloud architecture
CLR-2: infer the technologies used with cloud platforms
CLR-3: discover the advanced cloud architecture and storage structures
CLR-4: classify the importance of cloud architecture design
CLR-5: examine virtualization architecture and future trends in cloud structures

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: persist the concept of basic cloud computing paradigms 3
CO-2: interpret the concepts of cloud service structures 2
CO-3: analyze the components of cloud computing and business agility in an organization 1
CO-4: relate with the market service providers in the cloud 2
CO-5: evaluate data center technologies and cloud architecture patterns 3

Module-1 – Introduction to Cloud Models 15 Hour


Introduction to Cloud Computing fundamentals, Cloud Computing definition, Cloud deployment models, Private, Public, Hybrid, Community Cloud, Cloud services: IaaS, PaaS, SaaS, Enabling Technologies of Cloud
Computing, Benefits and Challenges of Cloud Computing, Business Agility: Benefits and Challenges to Cloud, Architecture. Cloud Applications, Application availability, Performance, Various types of disaster in
Cloud environment
Module-2 - Service Oriented Architecture 15 Hour
REST, Systems of Systems, Web Services, Publish-Subscribe Model, Basics of Virtualization, Types of Virtualizations, Implementation Levels of Virtualization, Virtualization Structures- Advantages and
Disadvantages, Tools and Mechanisms, Virtualization of CPU Memory, I/O Devices, Virtualization Support and Disaster Recovery, Server Virtualization, Parallel Processing, Vector Processing, Symmetric
Multiprocessing Systems, Massively Parallel Processing Systems.
Module-3 - Cloud Storage Infrastructures 15 Hour
Introduction to cloud storage infrastructures, Concept, planning and Design, Business continuity, Basic concepts of information security, Managing VDC and cloud environments and infrastructures, Securing storage
in virtualized and cloud environments, Monitoring and management, Security auditing and SIEM, Storage Network Design, Architecture of storage, analysis and planning, Storage network design considerations,
NAS and FC SANs, Hybrid storage networking technologies, iSCSI, FCIP, FCoE, Design for storage virtualization in cloud computing, Host system design considerations, Cloud Applications, Technologies and the
processes required for deploying web services.
Module-4 - Resource Provisioning 15 Hour
Management of Cloud Services, Reliability, availability and security of services deployed from the cloud, Performance and scalability of services, Tools and technologies used to manage cloud services deployment,
Cloud Economics, Cloud Computing infrastructures available for implementing cloud based services, Economics of choosing a Cloud platform for an organization, Runtime Support Services Resource Provisioning
and Platform Deployment- Provisioning of Compute Resources (VMs),Resource Provisioning Methods, NIST Cloud Computing Reference Architecture, Demand-Driven, Event-Driven Resource Provisioning,
Popularity-Driven Resource Provisioning, Dynamic Resource Deployment Storage-as-a-Service, Advantages of Cloud Storage - Global Exchange of Cloud Resources Application Development. Service creation
environments to develop cloud-based applications
35
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Module-5 - Data Center Design 15 Hour
Introduction to Cloud Architecture patterns, Horizontally Scaling Compute Pattern- Cloud Significance, Queue-Centric Workflow Pattern Auto-Scaling Pattern, Eventual Consistency Prime, MapReduce Pattern,
Database Sharding Pattern, Node Failure Pattern, Network Latency Primer CDN Pattern, Multisite Deployment Pattern, Network connectivity optimization evolution: Top of rack (TOR), end of rack (EOR), connectivity,
Stand-alone, blades, stateless, clustering, scaling optimization, virtualization, Limitation of traditional server deployments, Case studies

1. Gautam Shroff, “Enterprise Cloud Computing Technology Architecture Applications”, Cambridge 6. Klaus Schmidt, “High Availability and Disaster Recovery” Springer; edition [ISBN: 978-
University Press; 1 edition, [ISBN: 978-0521137355], 2010. 3540244608], 2006.
2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical Approach” 7. Kai Hwang, Geoffrey C. Fox, Jack G. Dongarra, "Distributed and Cloud Computing,
McGraw-Hill Osborne Media; 1 edition [ISBN:0071626948],2009 From Parallel Processing to the Internet of Things", Morgan Kaufmann Publishers,
Learning 3. 3Greg Schulz, “Cloud and Virtual Data Storage Networking”, Auerbach Publications [ISBN: 978- 2012.
Resources 1439851739],2011 8. Rittinghouse, John W., and James F. Ransome, ―Cloud Computing: Implementation,
4. EMC, “Information Storage and Management” Wiley; 2ndedition [ISBN: 978-0470294215], 2012. Management and Security, CRC Press, 2017.
5. Volker Herminghaus, Albrecht Scriba, “Storage Management in Data Centers” Springer; edition 9. Silvano Gai, Claudio DeSanti, “I/O Consolidation in the Data Center” Cisco Press;
[ISBN: 978- 3540850229], 2009 1stedition [ISBN: 9781587058882], 2009.
10. Bill wilder, Cloud Architecturepatterns,2012

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. PartheepanRudrapathi, CEO, KXE 1.Dr. V. Arulkumar, Associate Professor, SSN College of Engineering 1.Dr. M. Shobana, SRMIST

36
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC531J DATA CENTER NETWORKING C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: describe various data-centric Networking Concepts
CLR-2: gain knowledge of the data center architectures & network connectivity
CLR-3: articulate networking caching policies
CLR-4: understand the security issues in data-centric networks
CLR-5: learn the application of IoT in ICN

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: identify various data-centric networking concepts 3
CO-2: distinguish different data center architectures & core network connectivity issues 2
CO-3: design the caching policies in DCN 3
CO-4: protect the data-centric networks from different attacks 3
CO-5: make use of IoT and ML techniques in Data-centric networks for more efficient 2

Module-1 - Introduction 15 Hour


Introduction to Information-Centric Networks, Data-centric networking from different perspectives, Requirements for modern data centers, Internet architecture, Content Distribution Networks (CDN), Content-Centric
Communication, Characteristics of ICN, Design Principles, and Assumptions, Design Principles, Key Building Blocks of ICN and Design Challenges, TRIAD Architecture, DONA Architecture.
Module-2 - Data Center Design 15 Hour
Network Information (NetInf) Architecture, Top of Rack (TOR) Network Connectivity, End of Rack (EOR) Network Connectivity, NDN Architecture, Comparative Analysis of ICN Architectures, Software-Defined
Networking in ICN, Data Routing Schemes, Realization of Routing in ICN, Stateful Forwarding Paradigm for NDN, OSPF-Based Routing for NDN- NLSR
Module-3 - Computing Architecture 15 Hour
Introduction to Server Architectures, Clustering in Server Architectures, Redundant Layer 2 Designs, Redundant Layer 3 design, Network Caching, Issues in ICN Caching, Leave Copy Everywhere (LCE), Leave
Copy Down, SDN Based Caching, Analysis of Various Caching Methods, Caching policies, Caching with Amazon Elastic Cache.
Module-4 - Data Centric Networking Protocols 15 Hour
RSTP protocol, PVST protocol, Monitoring Your Applications and Infrastructure - Working with AWS CloudTrail, MSTP protocol, TRILL protocols Security in DCN, Key Security & Privacy Concerns in ICN
Architectures, Attacks in ICN, Naming, routing related attacks, ICN Attributes Leading to Security Threats, Optimization in ICN, Application of ML in Communication Networks, ML in caching, naming, Routing
Module-5 - Data Centric Services 15 Hour
State-of-the-Artwork in SDN-Based ICN, CORNET architecture, Recent Trends in ICN Applications, Data-Centric Networks in Internet of Things, Adaptation of Information-Centric Networks for Internet of Things
(IoT): Challenges and Opportunities, Design Issues of IoT over ICN, Information-Centric Networks in Wireless, Sensor Networks, ICN-based VANETs, Locator Identifier Separation Protocol (LISP)

37
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Zhi-Li Zhang, “Information Centric Networks (ICN), Nitul Dutta · Hiren Kumar Deva Sarma, 5. Silvano Gai, TommiSalli, RogerAndersson, “Cisco Unified Computing System”
Rajendrasinh Jadeja · Krishna Delvadia, Gheorghita Ghinea, Architecture & Current Trends,2021 CiscoPress; 1stedition, [ISBN: 9781587141935], 2010.
2. Mouricio Arregoces, “Data Centre Fundamentals”, CiscoPress,2003 6. Information Centric Networks: A New Paradigm for the Internet by Released May 2013
3. SilvanoGai, Claudio DeSanti, “I/O Consolidation in the Data Center” Cisco Press; 1st edition Publisher(s): Wiley ISBN: 9781848214491
Learning
[ISBN: 9781587058882], 2009. 7. RobertW.Kembel, Roger Cummings (Introduction), “The Fibre Channel Consultant”
Resources
4. Kevin Corbin, Ron Fuller, David Jansen, “NX-OS and Cisco Nexus Switching: Next-Generation Northwest Learning Assoc; 3rdedition, [ISBN: 0931836840], 1998.
Data Center Architectures” Cisco Press; 1 edition [ISBN: 9781587058929], 2010. 8. Robert W Kembal “Fiber Channel Switched Fabric” Northwest Learning Associates, inc.
[ISBN: 0931836719], 2009.
9. JohnL.Hufferd, “ISCSI”, Addison-WesleyBoston [ISBN: 978-0201784190], 2003.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. N. Vijaya Sankar Associate Tech Lead MST Solutions 1.Dr. Soundarrajan, Associate Professor, Department of Computer Science 1. Dr. V. Pandimurugan, SRMIST
and Engineering, Amrita Vishwa Vidyapeetham, Chennai

38
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC532J CLOUD SECURITY ESSENTIALS C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: identify the concept of cloud security
CLR-2: compute the issues related to virtualized infrastructure security
CLR-3: predict and gain knowledge on the various issues in cloud security
CLR-4: contrast the methods to improve virtualization security and technologies in security
CLR-5: design the cloud contracting model and case study of commercial cloud

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: demonstrate the main concepts of cloud security 3 1 2
CO-2: illustrate the architecture design of cloud storage 3 1 2
CO-3: classify the cloud security key management schemes 3 1 2
CO-4: categorize the types of attacks and phases of malware 3 1 2
CO-5: summarize the security design for cloud models 3 1 2

Module-1 - Introduction 15 Hour


Cloud Security Fundamentals - Infrastructure Security - Network level security - Host level security - Application-level security - Data security and Storage - Data privacy and security Issues - Jurisdictional issues
raised by Data location - Identity and Access Management - Access Control - Trust, Reputation- Risk.
Module -2 - Information Gathering and Foot printing 15 Hour
Layered Cloud Architecture Design- NIST cloud computing Reference Architecture-Public, Private and Hybrid Cloud- IaaS, PaaS, SaaS - Architectural design Challenges- Cloud Storage- Storage-as-a-service-
Advantages of Cloud storage- Cloud storage Provider- Storage Provider-S3
Module -3 - Web and Database Attacks 15 Hour
Confidentiality, Privacy, Integrity, Authentication, - Non-repudiation, Availability, Access control, Defense in Depth, Least Privilege - Cryptographic Systems - Symmetric Cryptography - Stream Ciphers, Block Ciphers,
Modes of operation - Public-key Cryptography, Hashing - Digital Signatures, Public-Key infrastructures - Key Management for IaaS, PaaS, SaaS - Cryptographic key Management Issues and challenges in Cloud
Services.
Module-4 - Attacks and Malware Lifecycle 15 Hour
Multi-tenancy software and its issues - IBM security virtual server protection - Virtualization-based Sandboxing - Cloud Storage – Security – HIDPS - log management - Data Loss Prevention - Security Governance-
Cloud security Challenges - Virtual Machine Security - ESX, ESX File system Security Storage considerations - ESIX security - Security Management Standards - SaaS, PaaS, and IaaS Availability management
Module -5 - Wireless Security Technologies 15 Hour
Authentication in cloud computing- Client access in Cloud - Cloud contracting Model - Commercial and business considerations - Case Study on Open Source & Commercial Clouds - X.509 certificates, OpenSSL -
Eucalyptus - Microsoft Azure - Amazon EC2 - Legal and Compliance Issues in Cloud Computing - Examination of modern security standards.

39
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Rittinghouse, John W., and James F. Ransome, ―Cloud Computing: 4. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing – A Practical Approach,
Implementation, Management and Security, CRC Press, 2017. Tata McGraw Hill, 2009.
Learning 2. Kai Hwang, Geoffrey C Fox, Jack G Dongarra, “Distributed and Cloud Computing, From Parallel 5. Tim Mather, Subra Kumaraswamy, ShahedLatif, “Cloud Security and Privacy: An Enterprise
Resources Processing to the Internet of Things”, Morgan Kaufmann Publishers, 2012. Perspective on Risks and Compliance” O'Reilly Media; 1stedition [ISBN: 0596802765], 2009.
3. Ronald L. Krutz, Russell Dean Vines, “Cloud Security” [ISBN: 0470589876], 2010. 6. George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in
the Cloud: Transactional Systems for EC2 and Beyond (Theory in Practice), O’Reilly, 2009

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40%)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. T. Madhan, Team Leader, Tata Consultancy Services, 1. Dr. S. Janakiraman, Associate Professor, Pondicherry University. 1. Dr. R. Naresh, SRMIST
Siruseri Campus, Chennai.
2. Mrs. K. Saranya, IT Analyst, Tata Consultancy Services, Siruseri 2. Dr. R. Shyamala, Associate Professor, Anna University College of 2. Dr. C.N.S. Vinoth Kumar, SRMIST
Campus, Chennai. Engineering, Tindivanam.

40
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC533J ADVANCED DATA PROCESSING TECHNIQUES C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the fundamental concepts of Big Data, including its characteristics, challenges, and solutions
CLR-2: learn how to use Hadoop and MapReduce to process and analyze large datasets
CLR-3: master Hive, Sqoop, and Apache Spark for scalable data warehousing, data integration, and real-time stream processing
CLR-4: gain expertise in Spark SQL and Spark Streaming for SQL-like queries and stream processing on Spark
CLR-5: learn how to use Cassandra for distributed NoSQL storage and retrieval

At the end of this course, learners will be able to: Programme Outcomes
Course Outcomes
(PO)
(CO):
1 2 3
CO-1: apply Hadoop and HDFS to architect and establish distributed data processing and analytical workflows for extensive datasets 2 2 3
CO-2: use Hive for data warehousing and analysis, combine YARN and Hive for efficient data processing, and manage resources with YARN 2 3 3
CO-3: implement Sqoop and Apache Spark to transfer and process large datasets. 2 3 3
CO-4: use Spark Streaming to process and analyze large datasets. 2 3 3
CO-5: learn and demonstrate how to integrate Cassandra with Apache Spark for large-scale data processing. 2 3 3

Module – 1 - Diving into Big Data: A Comprehensive Study of Hadoop, Spark, and Job Scheduling 15 Hour
Introduction to Hadoop and the Hadoop Ecosystem - Hadoop Distributed File System (HDFS) – MapReduce - Introduction to Apache Spark - Spark Programming Basics -Data Processing with Spark - Machine
Learning with Spark MLLib - Hadoop Mahout-Job Scheduling with Oozie. Laboratory session 1: Hadoop single node cluster Setup with Yarn, Laboratory session 2: Drug Data Processing using MapReduce.
Laboratory session 3: Dry Run Top 10 Hadoop Shell Commands.
Module – 2 - Unravelling Big Data: An In-depth Exploration of YARN and Hive 15 Hour
Introduction to YARN (Yet Another Resource Negotiator) - YARN Architecture - Resource Management with YARN - Job Scheduling with YARN - Introduction to Hive -Hive Architecture - Data Warehousing with
Hive - Hive Query Language (HQL) - Data Analysis with Hive. Laboratory session 4: Hive Partition and the Performance Testing, Laboratory session 5: Hive Storage Formats TextFile vs ORC vs RC, Laboratory
session 6: Hive UDF.
Module – 3 - Navigating Data Engineering: A Deep Dive into Sqoop, Spark, and SparkSQL 15 Hour
Introduction to Sqoop-Sqoop Architecture-Sqoop Commands and Basic Usage-Data Transfer with Sqoop-Introduction to Apache Spark-Spark Architecture-Data Processing with Spark-Introduction to SparkSQL-
Data Analysis with SparkSQL. Laboratory session 7: Data Migration from MYSQL to Hive with SQOOP, Laboratory session 8: SparkSQL Retail Data Processing to analyze the Sales, Laboratory session 9:
Spark RDD with drug data set and compare the complexity of the code with MapReduce.
Module- 4 - Mastering Real-Time Data Processing with Spark Streaming 15 Hour
Introduction to Spark Streaming - Spark Streaming Architecture-Data Processing with Spark Streaming. - Spark Streaming vs. Structured Streaming-Real-Time Data Analytics with Spark Streaming-Spark
Streaming and Machine Learning-Data Ingestion with Spark Streaming-Fault Tolerance in Spark Streaming-Spark Streaming and Kafka. Laboratory session 10: Kafka Producer and Consumer via Java API,
Laboratory session 11: Spark Streaming with word count via network, Laboratory session 12: END to END Real-time click event sales data analysis with Spark Streaming, KAFKA, and Cassandra (by building
a local website and hosting it on to Tomcat server).
Module – 5 - Exploring Apache Cassandra: From Fundamentals to Integration 15 Hour

41
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Introduction to Cassandra-Cassandra Architecture-Data Modelling in Cassandra-Cassandra Query Language (CQL)-Data Ingestion with Cassandra-Cassandra Functions Tuning and Optimization in Cassandra-
Fault Tolerance in Cassandra-Cassandra and Spark Integration. Laboratory session 13: Apache Cassandra Single Node Cluster Creation, Laboratory Session 14: Behind the scenes of Cassandra internal write
via practical, Laboratory Session 15: Connect Cassandra with Apache Zeppelin visualization tool.

1. Alfonso Antolínez, García, "Hands-on Guide to Apache Spark 3: Build Scalable


Computing Engines for Batch and Stream Data Processing", ApressCity, 2023, 7. Kathleen Ting, Jarek Jarcec Cecho," Apache Sqoop Cookbook", O'Reilly Media, 2013, ISBN:
Edition:1, ISBN:1484293797. 1449364624.
2. Nitin Kumar, "Big Data Using Hadoop and Hive", Mercury Learning and 8. Eben Hewitt, "Cassandra: The Definitive Guide", OReilly Media,
Information,2021, ISBN:1683926455. 9. Jeff Carpenter, Eben Hewitt, "Cassandra: The Definitive Guide: Distributed Data at Web Scale
3. Rathinaraja Jeyaraj, Ganeshkumar Pugalendhi, Anand Paul, "Big Data with Edition", O’Reilly Media, 2016, ISBN: 1491933666.
Learning Hadoop MapReduce: A Classroom Approach ", Apple Academic Press,2020, 10. Holden Karau, Andy Konwinski, Patrick Wendell, Matei Zaharia, "Learning Spark: Lightning-Fast
Resources Edition 1, ISBN:1771888342. Big Data Analysis Edition", O'Reilly Media,2015.
4. Tom White, "Hadoop: the definitive guide", O'Reilly Media,2009, 11. Mayank Bhushan, Big Data and Hadoop: Fundamentals, tools, and techniques for data-driven
5. Bill (B.) Chambers, Matei (M.) Zaharia, "Spark: The Definitive Guide: Big Data success - 2nd Edition [2 ed.] BPB Online,2023
Processing Made Simple Edition", O'Reilly Media,2018, ISBN: 1491912219. 12. Manoj Kukreja Data Engineering with Apache Spark, Delta Lake, and Lakehouse: Create
6. Scott Shaw, Andreas François Vermeulen, Ankur Gupta, David Kjerrumgaard scalable pipelines that ingest, curate, and aggregate complex data in a timely and secure way,
"Practical Hive: A Guide to Hadoop's Data Warehouse System Edition", Apress, Packt Publishing,2021.
Year: 2016, ISBN: 9781484202722

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. V. Govindasamy, Professor - IT
1.Mr Gowtham SB, Data Engineer | PayPal 1.Dr. S. Prabakeran, SRMIST
Puducherry Technological University

42
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC534J PYTHON FOR DATA SCIENCE C PROFESSIONAL CORE
Code Name Category 2 0 2 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: explore the fundamental concepts of Python
CLR-2: study the importance of Numpy, Pandas and DS libraries
CLR-3: analyze the Matplotlib for visualization
CLR-4: evaluate the data using regression and classification
CLR-5: design of engineering applications with unsupervised and advanced machine learning

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand the basics of python for data structures, and modules 3 2 3
CO-2: illustrate the standard modules of data science with hands-on in Anaconda 3 2 2
CO-3: apply visualization used for data science using Matplotlib 3 3 3
CO-4: design the models of data with regression and classification 3 2 2
CO-5: analyze machine learning libraries for unsupervised learning techniques 2 2 2

Module-1 - Python-Data Structures, OOPS and Modules 6 Hour


Data structures: Dictionaries - Maps - Hash Tables - Array Data Structures - Records - Structs - Data Transfer Objects - Sets and Multisets-Stacks (LIFOs) - Queues (FIFOs) ; Python : Python installation - Python
OOPs - Polymorphism in OOPs programming - Python String Concatenation - Print Exception in Python - Python Libraries - Python Pandas - Python Matplotlib - Python Seaborn - Python SciPy - Chatbot in Python -
Machine Learning using Python - Exploratory Data Analysis in Python - Open CV Python - Tkinter - Pythons Turtle Module - PyGame in Python - Pytorch - Scrapy - Web Scraping - Django - Python Programs - Types
of Data structure in Python - Built in data structures - User defined data structures; Object Oriented Concepts and Design : APIs and Data Collection - Simple API - REST APIs & HTTP Requests - Web scraping -
HTML for Web Scraping - file formats
Module-2 - Python- Numpy, Pandas and DS Libraries 6 Hour
Installation and setup : Anaconda Distribution - Anaconda Navigator to create a New Environment - Startup and Shutdown Process - Intro to the Jupyter Lab Interface - Code Cell - execution; Python : Basic datatypes
- Operators - variables - Built in Functions - Custom Functions - String Methods - Lists - Index Positions and Slicing - Navigating Libraries using Jupyter Lab; Series : Create series object from a list and dictionary -
The head and Tail methods - Passing Series to Python Built-In Functions – Methods for Data sorting ; Dataframe : Methods and Attributes between Series andDataFrames - Fill in Missing Values - Filtering data and
methods in Dataframe - Data Extraction in dataframes -Working with Text Data - Merging Dataframes; Data Mining - Data Processing and Modelling - Data Visualization
Module-3 -Visualization 6 Hour
Introduction to Matplotlib - Matplotlib Basics - Matplotlib - Understanding the Figure Object - Matplotlib - Implementing Figures and Axes - Matplotlib - Figure Parameters - Matplotlib Styling - Legends - Matplotlib
Styling - Colors and Styles - Advanced Matplotlib Commands - Introduction to Seaborn - Scatterplots with Seaborn - Distribution Plots - Part One - Understanding Plot Types - Distribution Plots - Part Two - Coding
with Seaborn - Categorical Plots - Statistics within Categories - Understanding Plot Types - Categorical Plots - Statistics within Categories - Coding with Seaborn - Categorical Plots - Distributions within Categories -
Understanding Plot Types - Categorical Plots - Distributions within Categories - Coding with Seaborn - Seaborn - Comparison Plots - Understanding the Plot Types - Seaborn - Comparison Plots - Coding with
Seaborn - Seaborn Grid Plots - Seaborn - Matrix Plots.
Module-4 - Regression and Classification 6 Hour

43
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Introduction to Linear Regression : Cost Functions - Gradient Descent - Python coding Simple - Overview of Scikit-Learn and Python - Residual Plots - Model Deployment and Coefficient Interpretation - Polynomial
Regression - Theory and Motivation - Creating Polynomial Features - Training and Evaluation - Bias Variance Trade-Off - Polynomial Regression - Choosing Degree of Polynomial - Model Deployment - Feature Scaling;
Introduction to Cross Validation : Regularization Data Setup - Ridge Regression Theory - Lasso Regression - Background and Implementation - Elastic Net - Feature Engineering and Data Preparation; Dealing with
Outliers - Dealing with Missing Data - Evaluation of Missing Data - Filling or Dropping data based on Rows - Fixing data based on Columns - Dealing with Categorical Data - Encoding Options - Cross Validation - Test
- Validation - Train Split - cross_val_score - cross validate - Grid Search; Linear Regression Project: The Logistic Function - Logistic Regression - Theory and Intuition; Linear to Logistic: Logistic Regression - Theory
and Intuition - Linear to Logistic Math; Logistic Regression : Theory and Intuition Logistic Regression Model Training - Classification Metrics - Confusion Matrix and Accuracy - Classification Metrics - Precison, Recall,
F1-Score - ROC Curves - Logistic Regression with Scikit-Learn - Performance Evaluation - Multi-Class Classification with Logistic Regression - Data and EDA – Model
Module-5 - Unsupervised and Machine Learning 6 Hour
Introduction to KNN Section: KNN Classification, KNN Coding with Python - Choosing K, KNN Classification Project Exercise; Introduction & history of Support Vector Machines- Hyperplanes and Margins, Kernel
Intuition, Kernel Trick and Mathematics; SVM with Scikit-Learn and Python – Classification, Regression Tasks; Introduction to Tree Based Methods- Decision Tree, Understanding Gini Impurity; Constructing Decision
Trees with Gini Impurity, Coding Decision Trees; Introduction to Random Forests-Key Hyperparameters, Number of Estimators and Features in Subsets, Bootstrapping and Out-of-Bag Error; Coding Classification with
Random Forest Classifier, Coding Regression with Random Forest Regressor, Advanced Models. Introduction to K-Means Clustering Section; K-Means Color Quantization; K-Means Clustering Exercise Overview,
Solution; Introduction to Hierarchical Clustering, Coding - Data and Visualization, Scikit-Learn; Introduction to Principal Component Analysis(PCA)-Manual Implementation in Python-SciKit-Learn.
Lab Exercises 30 Hour
Case Study 1: Present your view on the different techniques you have employed to do outlier analysis, handling missing data, feature engineering, feature importance and improving the
accuracy of the model both from a classifier as well as a regressor. Use any sample data and present your POV in a well-structured presentation.
Case Study 2: Present your findings on different activation functions you have used and methods to improve the accuracy of the model using neural networks. You should be able to clearly
articulate the advantage and disadvantage of each activation function. Use any sample data and present your POV in a well-structured presentation.
Case Study 3: Present your findings on different techniques of anomaly detection and k means clustering. Use any sample data and present your POV in a well-structured presentation
Case Study 4: Present your POV on how to generate synthetic data using GANs. You can assume a sample dataset from an IOT enabled machine where the failure rates are minimal.
Case Study 5: Present your POV on Style related GANS. Explore the earliest models to the current models. Articulate the successive improvements in the models. Also articulate the future
of GANs in generating realistic images.
Case Study 6: Present your POV on GANs used for Deep Fakes. Articulate how we can identify the Deep Fake from the original.

1. Alvaro Fuentes, Become a Python Data Analyst – By Packt Publishing (2018) 4.Jules S. Damji, Learning Spark: Lightning-Fast Data Analytics, Second Edition – By Shroff/O'Reilly
Learning 2. Bharti Motwani, Data Analytics using Python – By Wiley (2020) (2020).
Resources 3. Introduction to Machine Learning with Python by Andreas C. Müller and Sarah Guido(2016) 5. Matplotlib for Python Developers by Aldrin Yim, Claire Chung, and Allen Yu(2018)
6. Python Data Science Handbook by Jake VanderPlas(2016)

44
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - - 10% 25% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 20% - - 3% 20% -
Level 4 Analyze 20% - - 30% 20% -
Level 5 Evaluate 10% - - 10% 10% -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan ,SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja,SRMIST
3. Dr.R.Balaji Ganesh,SRMIST
4.Dr.R.Deebalakshmi,SRMIST

45
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC535J DEEP LEARNING FROM PRODUCTION TO DEPLOYMENT C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand basics of computer vision, time series analysis and natural language processing
CLR-2: implement an application for facial recognition system
CLR-3: comprehend and implement weather forecasting system
CLR-4: design a chatbot

Course Outcomes Programme Outcomes (PO)


At the end of this course, learners will be able to:
(CO): 1 2 3
CO-1: understand the fundamentals of deep learning and its applications in computer vision, time series analysis and natural language processing. 1 3 3
CO-2: build a facial recognition system. 3 2 3
CO-3: build a weather forecasting system. 3 2 3
CO-4: build a chatbot. 3 3 2

Module-1 - Building a Facial Recognition System - Part 1 9 Hour


Convolutional Neural Network (CNN): Transfer learning - Data Augmentation - Image segmentation - Object detection - Video classification - Text and natural language processing - Structured data - Model
optimization
Module-2 - Building a Facial Recognition System - Part 2 12 Hour
Facial recognition model: Writing the code - Deploying the API as container - Consuming the API from Frontend and display- Preparing the image dataset - Creating and training the Model; Build and deploy Flask REST
API on Docker: steps to dockerize your flask app; Docker: Docker Installation – Architecture – Working of Docker; Kubernetes: Overview – Architecture – Kubernetes Setup – Advanced Kubernetes; Flask: Overview –
Environment – Application
Module-3 - Building a Facial Recognition System - Part 3 9 Hour
Facial Recognition system: Create Endpoints and UI to retrain the system with new data (faces) - Feedback system for face labels - Transfer Learning - Reusing the knowledge with additional learning; Technology:
Flask, streamlit and Tensorflow - Create a multipage app - API reference - Advanced features - Components - Roadmap - Changelog - Cheat sheet - Streamlit community cloud.
Module-4 - Building a Weather Forecasting System with Chatbot - Part 1 6 Hour
Recurrent Neural Network: Architecture - Technology and libraries - Application of RNN - Limitations of RNN - Improvement LSTM - RNN in time series - Build an RNN to predict time series in TensorFlow - Text
generation with an RNN ; Chatbot : Working of chatbot - Types of Chatbot - Use cases of chatbots - Objective - End goal - constraints - How to build a chatbot - A ten - minute introduction to sequence to sequence
learning in keras - Chatbot using seq2seq LSTM models - Architecture of seq2seq model
Module-5 - Building a Weather Forecasting System with Chatbot - Part 2 9 Hour
Intelligent Chatbox: Using LSTM - Using NLP - LSTM Time series Analysis - LSTM weather - Create an Intelligent chatbot in Python using the spaCy NLP Library - Prerequisites - Setting up the environment - creating
the city weather program - Creating the chatbot.

46
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Lab Exercises 30 Hour
Lab 1: Take any large language model (say GPT 3.5) and try to execute some query through it. Create a small program where you can change the parameter values of Temperature, Top P and Max
Token and. identify how you can make your answer more deterministic?
Lab 2: Identify what are the basic metrices to evaluate your large language model response? (As example, toxicity, biasness etc). Write a short program where you can take model
response as input and calculate the score for the above metrices to understand output quality.
Lab 3: Write a program where you can perform keyword-based search. take any text file as input and provide "keyword" dynamically and see whether your algorithm can search it effectively.
Lab 4: Write a program where you take perform embedding based search. Take any vector database and use any embedding technique to search the answer of the query from the given
input text file where query and text files are the inputs of your program.
Lab 5: Take 2/3 medical reports (may be blood reports) and store them in a place. Write a program which can read all the files dynamically from the given locations. Please try to understand the metadata of the reports.
Lab 6: Create a set of questions for which you want to retrieve information from the medical reports through large language models. Save it in some database and keep in the excel file.
Lab 7: Individual queries from the documents where two inputs will be taken: set of medical reports prepared in Experiment 5 and questions prepared in Experiment 6.
Lab 8: Perform the evaluation based on RAG-triad (Context Relevance, Grounded Ness and Answer Relevance). Show the importance of "context" towards getting the optimized output.
Lab 9: Use Palm 2 (or any other LLM) to perform automation of software development tasks which includes code generation, code debugging and test case generation.
Lab 10: Use any diffusion model to generate images based on given prompt.
Lab 11: Apply zero shot, one shot and few shot prompting and show how performance is improved in few shot prompting.
Lab 12: Apply chain-of-thought (CoT) in prompting and see how output accuracy increases. Do a comparison between normal prompting and CoT based prompting from output performance perspective.
Lab 13: Take a foundation model, create an instruction based fine tuning dataset, apply instruction fine tuning on the base model.
Lab 14: Perform performance evaluation of the model response between foundation model and after fine tuning it.
Lab 15: Explore various task specific benchmark datasets and create a new one.

1. James D. Hamilton, Time Series Analysis – By Levant Books (2012) 4. V Kishore Ayyadevara & Yeshwanth Reddy, Modern Computer Vision with PyTorch -
2. Kubernetes Up & Running: Dive into the Future of Infrastructure by Kelsey Hightower, Brendan By Packt Publishing (2020)
Learning
Burns, and Joe Beda, 2019 (2nd edition) 5. Deep Learning for Computer Vision with Python by Adrian Rosebrock(2017)
Resources
3. Natural Language Processing with Python by Steven Bird, Ewan Klein, and Edward 6. Hands-On Machine Learning for Algorithmic Trading by Stefan Jansen(2020)
Loper(2009)

47
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan , SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja, SRMIST
3. Dr.R.Balaji Ganesh, SRMIST
4.Dr.R.Deebalakshmi, SRMIST

48
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC536J PRINCIPLES OF DATA ENGINEERING C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: classify various examples and use cases for each type of data format.
CLR-2: analyze the advantages and limitations of ETL and stream processing techniques.
CLR-3: evaluate data quality metrics to ensure data accuracy, completeness, and consistency.
CLR-4: design storage solutions for large-scale data sets using relational databases, NoSQL databases, and distributed file systems.
CLR-5: solve complex real-world data engineering challenges using best practices in data warehousing, big data analytics, and machine learning.

Course Programme Outcomes(PO)


At the end of this course, learners will be able to:
Outcomes (CO): 1 2 3
CO-1: describe different data formats and their use cases, including structured, semi-structured, and unstructured data. 3 2 2
CO-2: explain various data ingestion techniques, such as ETL, and stream processing, and their advantages and limitations. 3 2 2
CO-3: interpret data profiling results to resolve quality issues. 3 3 2
design and implement effective storage and retrieval methods for large-scale data sets, including relational databases, NoSQL databases, and distributed file
CO-4: 3 2 3
systems.
CO-5: articulate data engineering principles to real-world scenarios, such as data warehousing, big data analytics, and machine learning. 3 3 3

Module-1 - Data Types and Formats 15 Hour


Introduction to Data Types and Formats - Types of Data - Structured vs. Unstructured Data - Formats of Data - Semi-Structured Data - Data Type Conversion and Transformation - Data Serialization - Choosing the
Right Data Type and Format - Tools and Technologies for Data Types and Formats.
Lab 1: Convert JSON to CSV using Python.
Lab 2: Serialize and deserialize data with JSON and XML.
Lab 3: Explore structured, semi-structured, and unstructured data examples.
Module-2 - Data Ingestion Techniques 15 Hour
Introduction to Data Ingestion - Streaming Data Ingestion - Batch Data Ingestion - Hybrid Data Ingestion - Data Ingestion vs. Data Integration - Data Ingestion Challenges - Tools and Solutions for Data Ingestion -
StreamSetsDataOps Platform - Benefits of Data Ingestion - Data Ingestion Framework.
Lab 4: Batch ingest CSV data into SQL database.
Lab 5: Stream data with Apache Kafka setup.
Lab 6: Hybrid ingestion combining batch and streaming.
Module-3 - Data Profiling and Visual Representation via Various Tools (Pandas) 15 Hour
Introduction to Data Profiling and Visualization - Exploratory Data Analysis (EDA) with Pandas - Steps Involved in Exploratory Data Analysis (EDA) Data Analysis (EDA) with Pandas - Market Analysis with Exploratory
Data Analysis (EDA) - Data Analytics and Its Future Scope - Data Analytics with Python - Top Business Intelligence Tools - Application of Data Analytics - Retrieving and Cleaning Data - Exploratory Data Analysis
and Feature Engineering - Inferential Statistics and Hypothesis Testing - Descriptive Statistics - Types of Descriptive Statistics - Concepts of Populations, Samples, and Variables - Statistical Methods for Describing
Data Characteristics - Real-World Applications of Descriptive Statistics using Excel - Types of Missing Data and Handling Techniques.
Lab 7: Perform EDA on dataset using pandas.
Lab 8: Visualize data with Matplotlib and Seaborn.
49
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Lab 9: Handle missing data in pandas.
Module-4 - Storage and Retrieval Methods 15 Hour
Introduction to Storage and Retrieval - Types of Data and Storage Methods - Local vs. Distributed Storage & Retrieval - Hardware Aspects of Storage & Retrieval - Choosing Storage Methods - Data Partitioning and
Sharding - Data Replication and Redundancy - Data Compression and Encoding - Data Archiving and Retrieval - Backup and Disaster Recovery - Data Lifecycle Management.
Lab 10: Set up local and HDFS storage systems.
Lab 11: Implement data partitioning and sharding.
Lab 12: Design backup and disaster recovery plan.
Module-5 - Data Lineage Analysis 15 Hour
Introduction to Data Lineage Analysis - Building a Data Flow - ETL (Extract, Transform, Load) Process - Usage of Data Warehouse - Edge Intelligence in Data Flow - Understanding Data Lineage - How Data Lineage
Works - Benefits of Data Lineage - Data Lineage Tool Features.
Lab 13: Implement ETL process with Apache NiFi.
Lab 14: Create data flow diagram for sample data.
Lab 15: Analyze data lineage using MANTA tool.

1. Charles M.Judd, Data Analysis: A Model Comparison Approach To Regression, ANOVA, 3. Data Engineering with Python by Paul Crickard Packt Publishing (2020)
Learning and Beyond 3rd Edition - By Routledge (2017) 4. Fundamentals of Data Engineering by Joe Reis and Matt Housley, O'Reilly Media(2022)
Resources 2. Pierre-Yves Bonnefoy, EmericChaize, RaphaëlMansuy& Mehdi TAZI, The Definitive Guide 5. Python Data Science Handbook by Jake VanderPlas, O'Reilly Media(2016)
to Data Integration 1st Edition - By Packt Publishing (2024). 6. Data Management for Researchers by Kristin Briney, Elsevier(2015)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan, SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja, SRMIST
3. Dr.R.Balaji Ganesh, SRMIST
4.Dr.R.Deebalakshmi, SRMIST

50
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC546J Course UNDERSTANDING CYBER ATTACKS Course C PROFESSIONAL COURSE L T P C
Code Name Category 3 0 2 4

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: learners should be aware of different types of attacks
CLR-2: develop ability to identify attack types
CLR-3: navigate different frameworks such as MITRE
CLR-4: explore dark web as a security professional
CLR-5: understand threat intelligence

Course Program Outcomes (PO)


At the end of this course, learners will be able to:
Outcomes (CO): 1 2 3
CO-1: define ransom ware and different types of ransom ware. 1
CO-2: list different physical attacks like card skimming, ATM attacks, sim swapping, identity theft, etc. 3 1
CO-3: examine industrial control systems, why they're needed along, and security controls. 2 3 1
CO-4: recognize different dark web anonymity systems. 2 3

Module 1: Cyber Ops Reconnaissance 15 Hour


Common attack types, Social Engineering Deep Dive, Attack vector: phishing, attack vector: malware, Types of Malware, Malware Analysis Process, Dark Web, Criminal Underground Markets.
Lab 1: Phishing Email Analysis
Lab 2: Cracking password
Module 2: Threats Cape Analysis 15 Hour
Case study: Bangladesh Bank Heist, Computer Worms, Trojans, Spyware & Its operations, Pegasus Spyware, Wiper Attack, Bots and Botnets, DDOS Threats.
Lab 3: Building a WORM and Deploying it, detecting a malware, Using Kali Linux for creating phishing links creation
Module 3: Advanced Tactics and Defense 15 Hour
Advanced Persistent Threats, MITRE ATT & CK Framework, MITRE ATT&CK Framework for ICS, Tactics Techniques; Procedures, Case Study: Miraj Botnet, Credential Attack, Physical Security Attacks,
Physical Security Defensive Measures.
Lab 4: Using MITRE ATT; CK to create a defense strategy
Lab 5: Miraj Botnet
Module 4: Decrypting Cyber Intricacies 15 Hour
Affiliates in Ransomware, Obfuscation in Ransomware Malware code, Attacking Encryption, MOVE it Breach, MOVE it Breach Victims
Analysis, Case Study: Uber Hack 2022.
Lab 6: Ransomware Lab, Security Mobile Devices
Lab 7: Uber Hack 2022
Module 5: Cloud Guard Nexus: Fortifying Digital Skies 15 Hour
Attack vector: Cloud Misconfiguration, Detecting Leaky Buckets, Case Study: Cloud Security Breaches, Third party risks, supply chain security attacks, zero-day attacks, Nobelium APT-29, Attacks on DNS
51
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Lab 8: Detecting misconfigurations in Azure, Analyzing network traffic with Wireshark for DNS.

Learning 1. Zero Trust: https://www.paloaltonetworks.com/zero-trust


Resources 2. SABSA: https://sabsa.org/
3. AWS Well Architected Framework: https://aws.amazon.com/architecture/well- 6. Phishing Emails https://www.itgovernance.co.uk/blog/5-ways-to-detect-a-
architected/ phishing-email
4. SIEM https://www.microsoft.com/en-ww/security/business/security-101/what-is- 7. Mirai Botnet https://en.m.wikipedia.rg/wiki/Mirai_(malwar)
SIEM
5. Disaster Recovery: https://www.kyndryl.com/in/en/learn/disaster-recovery-plan

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Aniket Amdekar General Manager, Cyber Defense 1.Mr.Ashok Kumar Mohan , Amrita University 1. Aniket Amdekar General Manager, Cyber Defense
Education, Great Learning Education, Great Learning
2. Ms. Chitra , SSN college of Engineering

52
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC547J Course DESIGNING SECURITY CONTROLS, GOVERNANCE AND Course C PROFESSIONAL CORE L T P C
Code Name COMPLIANCE Category 3 0 2 4

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the purpose of security controls
CLR-2: identify the categories of controls
CLR-3: learn about network security controls
CLR-4: learn about endpoint security controls
CLR-5: implementing monitoring controls

Course Outcomes Program Outcomes (PO)


At the end of this course, learners will be able to:
(CO): 1 2 3
CO-1: identify a control framework along with the list of controls to be implemented 3 1
CO-2: implementing the controls in a planned manner 3 2
CO-3: planning for high resiliency in the network with backups 3 2 1
CO-4: configuring an audit policy for the network 3 2
CO-5: understanding data protection and data loss prevention controls 3 1

Module 1: Introduction 15 Hour


Security Controls and their types Control Frameworks Endpoint Security Controls EDR Features Deep dive Event Viewer Logs Enterprise Implementation of Endpoint Security Controls: USB Control,
Application and Device Policies Vulnerabilities and their types Vulnerability management
Lab: Antivirus & EDR
Lab: Windows Defender
Lab: Nessus Scanner
Module 2: Email Security 15 Hour
Email Security Securing Email Infrastructure Office 365 Security Features Network Security Controls overview Firewall Features Deep Dive Application Firewall, and IDS IPS Bypassing methods for
Firewall and WAF
Lab: Email Security
Lab: Firewall Configuration Web
Lab: Firewall Evasion
Module 3 Data Security 15 Hour
Data Security and Privacy GDPR Maintaining Compliance with GDPR Data Recovery and Backup Data Backup Protection against Ransomware NIST Patch Management recommendations CASB and
Its configuration Shadow IT
Lab: Perform a GDPR Audit
Lab: DLP
Lab: Creating Detection Rules for DLP
53
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Module 4 SIEM 15 Hour
SIEM Features of SIEM Creating Correlation Rules SIEM Installation ELK: Elastic Search, Logstash, Kibana Log Pathway SIEM Demo SIEM Log Ingestion
Module 5 System Addit 15 Hour
System Audit types of System Audits NIST Patch Management recommendations Forensic Analysis Understanding Security Features of Operating Systems Creating hardening policies for enterprises
Identity & Access Management (IAM) Privileged Account Management (PAM) Implementing IAM & PAM
Lab: Perform a System Audit
Lab: Creating Hardening Policies
Lab: Demo Project Deployment

Learning 1. Types of Security Controls: https://www.ibm.com/topics/security-controls 3. NIST 800-53 https://sysdig.com/blog/nist-800-53-compliance/


Resources 4. WAF : https://www.f5.com/company/blog/where-does-a-waf-fit-in-the-data-path
2. GDPR : :https://gdpr-info.eu/chapter-3/

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Aniket Amdekar General Manager, Cyber Defense 1.Mr.Ashok Kumar Mohan , Amrita University 1. Aniket Amdekar General Manager, Cyber Defense
Education, Great Learning Education, Great Learning
2. Ms. Chitra , SSN college of Engineering

54
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC548J BLOCKCHAIN TECHNOLOGY WITH HYPERLEDGER C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: realize the blockchain in industry perspective
CLR-2: apply the concepts of Hyperledger fabric component designs
CLR-3: apply the Hyperledger trade network concepts in business networks
CLR-4: apply the concepts of smart contract transactions and ledger data structures
CLR-5: develop smart contracts for any use case

Programme Outcomes
Course Outcomes At the end of this course, learners will be able to: (PO)
(CO): 1 2 3
CO-1: comprehend the enterprise blockchain and the basics of Hyperledger fabric 3
CO-2: apply the concepts of hyper-edger fabric component designs 2
CO-3: apply the Hyperledger trade network concepts in business networks 1
CO-4: apply the concepts of smart contract transactions and ledger data structures 2
CO-5: build smart contracts for real-time use cases 3

Module-1 - Enterprise Blockchain Implementation: Hyperledger Fabric Perspective 15 Hour


Blockchain: An Enterprise and Industry Perspective - Blockchain in the enterprise: Good fit applications - Enterprise blockchain business evaluation considerations - Enterprise view blockchain: Integrating a
blockchain infrastructure for the whole enterprise - Enterprise design principles - Business considerations for choosing a blockchain framework - Exploring Hyperledger Fabric: Building on the foundations of open
computing - Fundamentals of the Hyperledger project - Hyperledger frameworks, tools, and building blocks
Module-2 - Exploring Hyperledger Fabric 15 Hour
Transactions and Business Networks Hyperledger Fabric component design: Hyperledger Fabric - The journey of a sample transaction - Actors and components in a Hyperledger Fabric network - CAP theorem:
new features - Business Networks - A busy world of purposeful activity - Language for business networks: Defining a business network - Participants - Assets - Transactions – Events - Business network
technology
Module-3 - Navigating Trade Networks: Hyperledger Fabric Deployment Essentials 15 Hour
Setting the Stage with a Business Scenario: Introduction - Trading and letters of credit - Business scenario and use case - Designing and configuring a Hyperledger Fabric trade network - Launching a sample trade
network - Configuring our development environment for network operations
Module-4 - Smart Contract Development: From Design to Implementation 15 Hour
Designing Smart Contract Transactions and Ledger Data Structures: Introduction - Architecture of the trade solution - Starting the contract development - Creating a contract - Access Control - Implementing contract
functions - Testing a contract - Advanced contract designs - Transaction mechanisms - Logging output
Module-5 - Implementing Security Awareness Program and Project Debrief 15 Hour
Developing Smart Contracts and Use Cases: Introduction - Developing Smart Contracts - Use case 1: Blockchain in trade/supply chain: (i) Provenance of goods, visibility, trade/supply chain finance, invoice
management discounting, etc., - Use case 2: Blockchain for Government:(i) Digital identity, land records and other kinds of record-keeping between government entities, (ii) public distribution system social welfare
systems Blockchain Cryptography - Privacy and Security on Blockchain - Practical Component Building a Network and Deploying Smart Contract & Security
55
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1.Gaur, Nitin., O'Dowd, Anthony., Novotny, Petr., Desrosiers, Luc., Ramakrishna, Venkatraman., Baset, Salman 4. Shah, Nakul. Blockchain for Business with Hyperledger Fabric. India: BPB
A. Blockchain with Hyperledger Fabric: Build Decentralized Applications Using Hyperledger Fabric 2, 2nd Publications, 2019.
Edition. India: Packt Publishing, 2020. 5. Wu, Xun (Brian)., Zhang, Chuanfeng., Zhang, Andrew. Hyperledger Cookbook: Over
Learning
2. Kumar, Ashwani. Hyperledger Fabric In-Depth: Learn, Build and Deploy Blockchain Using Hyperledger 40 Recipes Implementing the Latest Hyperledger Blockchain Frameworks and
Resources
Fabric. India: Bpb Publications, 2020. Tools. India: Packt Publishing, 2019.
3. Zand, Matt., Wu, Xun (Brian)., Morris, Mark Anthony. Hands-On Smart Contract Development with 6. https://hyperledger-fabric.readthedocs.io/en/latest/tutorials.html
Hyperledger Fabric V2. United States: O'Reilly Media, 2021.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mrs. S. Gomathi Sankar, Technical Lead, LTI Mindtree 1. Dr. Soma Prathibha, Sri Sai Ram Engineering College, Chennai 1.Dr. A. Siva Kumar, SRMIST

56
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC549J FUNDAMENTALS OF BLOCKCHAIN C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the fundamentals of blockchain architecture
CLR-2: categorize cryptography techniques and blocks
CLR-3: illustrate the principles of consensus algorithms
CLR-4: articulate different attacks
CLR-5: relate hyper ledger and solidity in applications of blockchain

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: comprehend the knowledge of the fundamentals of blockchain 3
CO-2: interpret the ability to apply models and methods of classical cryptography 2
CO-3: utilize the principles of consensus mechanisms in real-time 1
CO-4: categorize the attacks and their impacts. 2
CO-5: appraise the blockchain principles in real-time applications 3

Module-1 - Introduction - Blockchain Architecture 15 Hour


Backstory of Bitcoin, Backstory of Bitcoin, Distributed Ledger Technology, Centralized vs. Decentralized Systems, Centralized Systems, Decentralized Systems, Layers of Blockchain, Application Layer, Execution
Layer, Semantic Layer, Propagation Layer, Consensus Layer, Importance Blockchain, Limitations of Centralized Systems
Module-2 - Blockchain and Cryptography 15 Hour
Peer to Peer Networking, Types of Blockchain: Public Blockchain, Private Blockchain, Consortium Blockchain, Cryptographic Hash Functions, Cryptographic Nonce, Transactions, Merklee Tree - Symmetric,
Asymmetric Key Cryptography, Ledgers, Blocks, Chaining blocks, Blockchain Wallets and its types
Module-3 - Consensus Mechanism 15 Hour
Proof of Work Consensus Algorithm, Proof of Stake Consensus Algorithm, Delegated Proof of Stake, Round Robin Consensus Algorithm, Proof of Authority/Proof of Identity Consensus Algorithm, Proof of Elapsed,
Time Consensus Algorithm, Byzantine Fault Tolerance, Consensus Comparison Matrix, Ledger Conflicts and Resolution
Module-4 - Basic Attacks 15 Hour
Sybil attack, DDOS, Eclipse Attack, Selfish Mining Attack, Finney attack, Race attack, Wallet Attacks. Zero-knowledge proof, Non-interactive Zero Knowledge Proof, Ring Signature, Homomorphic Encryption
Module-5 - Decentralized Applications 15 Hour
Ethereum, Smart contracts, Decentralized Applications – Basics: Hyperledger, Fabric, Corda, Solidity, Remix IDE, Ganache, MetaMask, Truffle, NodeJS, Blockchain Testnet, blockchain in IoT, Cloud computing,
Supply chain management, Automation, Finance

57
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Bikramaditya Singhal, Gautam Dhameja, Priyansu Sekhar Panda, “Beginning Blockchain”, 4. Mohammad Ayoub Khan, Mohammad Tabrez Quasim, Fahad Algarni, Abdullah Alharthi,
Apress, 2018. “Decentralised Internet of Things – A Blockchain Perspective, Springer 2020
Learning 2. Sandeep Kumar Panda, Ajay Kumar Jena, Santosh Kumar Swain, Suresh Chandra Satapathy, 5. Alessandro Parisi, “Securing Blockchain Networks like Ethereum and Hyperledger
Resources “Blockchain Technology: Applications and Challenges”, Springer Nature, 2021 Fabric”, Packt 2020.
3. Sachin S. Shetty, Charles A. Kamhoua, Laurent L. Njilla, “Blockchain for Distributed Systems 6. Shahid Shaikh, “Building Decentralized Blockchain Applications”, BPB.
Security”, IEEE PRESS WILEY, 2019. 7. Siraj Raval, “Decentralized Applications”, O’Reilly Media, 2016.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Kishore Kumar K, Senior Technical Consultant (Strategic 1.Dr. K. Suresh, Associate Professor, Department of Information 1.Dr. S. Srividhya, SRMIST
Accounts) ManageEngine (A Division of Zoho Corporation) Technology, Sri Venkateswara College of Engineering Sriperumbudur

58
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC550J Course DATABASE TECHNOLOGY Course C PROFESSIONAL CORE L T P C
Code Name Category 3 0 2 4

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: conceive the database design process through ER Model and Relational Model
CLR-2: familiarize queries using Structure Query Language (SQL)
CLR-3: become acquainted with enhancing database design through normalization.
CLR-4: gain knowledge about failures and recovery
CLR-5: understand the concept of NOSQL Databases

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: exhibit knowledge on ER and Relational Modeling 3 - -
CO-2: devise appropriate queries using Structure Query Language (SQL) - 3 3
CO-3: design a normalized database 2 - -
CO-4: efficiently manage and execute transactions on a database. - - -
CO-5: develop a Web application using NOSQL 2 3 3

Module-1- Entity Relationship Model and Relational Model 9 hour


Data Models – Entity Types, Entity Sets, Attributes, and Keys – Relationship Types – Steps to Model an Entity Relationship Diagram – Relational Model Concepts – Relational Model Constraints and
Relational Database Schemas – Update Operations, Transactions, and Dealing with Constraint Violations – Mapping Entity Relationship Model to Relational Data Model.
Module-2 - Relational Algebra and Structured Query Language 9 hour
Unary Relational Operations: SELECT and PROJECT – Relational Algebra Operations from Set Theory – Binary Relational Operations: Cartesian Product – Equi Join – Left Outer Join – Right Outer
Join – Full Outer Join – Data Definition Language – Data Manipulation Language – Transaction Control Language – Aggregate Functions – Joins – Nested Queries –Views – Stored Procedures –
Cursors – Functions – Triggers.
Modulet-3 - Database Normalization 9 Hour
Normalization – Need for Database Normalization – Functional Dependencies – Armstrong’s Axioms – First Normal Form – Second Normal Form – Third Normal Form – Boyce-Codd Normal Form –
Dependency Preservation – Lossless Decomposition – Algorithms for Relational Database Schema – Design Multivalued Dependency and Fourth Normal Form – Join Dependencies and Fifth Normal
Form – Spurious Tuples.
Module-4 - Transaction Management and Recovery 9 Hour
Introduction to Transaction Processing – Properties of Transactions – Schedule – Lost Update Problem – Uncommitted Dependency Problem – Serializability –Transaction Support in SQL –
Concurrency Control Techniques – Locking – Timestamping – Deadlock. Crash Recovery – ARIES Algorithm – Write-Ahead Logging Protocol – Checkpointing –Media Recovery.
Module-5 - NoSQL Databases 9 Hour
59
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
NoSQL Database vs. SQL Databases – Types of NoSQL Databases – CAP Theorem – Migrating from RDBMS to NoSQL – MongoDB – CRUD Operations – MongoDB Sharding – MongoDB
Replication – Web Application Development using MongoDB with PHP and Java.
List of Experiments (30 Hour): Lab 7: Create Database Objects
Lab 1: Create a simple database and retrieve information. Lab 8: Demonstrate exception handling in PL/SQL
Lab 2: Perform the operations Insert, Delete, Modify, Alter, Update and View on a database Lab 9: Implement PL/SQL program using Cursors
Lab 3: Construct ER Model for a given application Lab 10: Create triggers for a database
Lab 4: Practice Basic SQL functions Lab 11: Develop a student database with appropriate triggers
Lab 5: Access database using SQL joins (inner, outer and self-join) Lab 12: Web Application using MongoDB
Lab 6: Practice SQL subqueries, nested subqueries

Learning 1. Ramez Elmasri and Shamkant B. Navathe, “Fundamentals of Database Systems”, 3. Raghu Ramakrishnan, Johannes Gehrke, “Database Management System”, McGraw Hill., 3rd
Resources Seventh Edition, Pearson, 2016. Edition, 2007.
2. Silberschatz, H. Korth and S. Sudarshan, “Database System Concepts”, 7th 4. Peter rob, Carlos Coronel, “Database Systems – Design, Implementation, and Management”,
Edition, McGraw-Hill International, 2020. 10th Edition, Thomson Learning, 2014.

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - 15% 15% -
Level 2 Understand 20% - - 20% 25% -
Level 3 Apply 20% - - 25% 30% -
Level 4 Analyze 20% - - 25% 30% -
Level 5 Evaluate 10% - - 10% - -
Level 6 Create 10% - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Jaya R, Faculty, Great Learning 1. Prof. H. Khanna Nehemiah, Anna University, Chennai 1. Dr. K. Vijaya, SRMIST
2. 2. Dr. C. Pretty Diana Cyril, SRMIST

60
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC551J Course ADVANCED DATA STRUCTURES AND ALGORITHMS Course C PROFESSIONAL CORE L T P C
Code Name Category 3 0 2 4

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand advanced techniques of algorithmic analysis
CLR-2: analyse various self-balancing binary search trees and its applications
CLR-3: learn the various multidimensional search trees and its applications
CLR-4: apply advanced heap structures and disjoint-set to graph algorithms
CLR-5: understand the complexity classes of algorithms

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: compare the time complexity of various algorithms 3 - -
CO-2: design and analyse self-balancing binary search trees 3 - -
CO-3: apply various multidimensional search trees to searching and querying 3 - -
CO-4: apply heap and disjoint-set operations on various graph algorithms 3 - -
CO-5: demonstrate ability to prove that a problem is NP-complete 3 - -

Module-1 – Basic Data Structures and Algorithmic Analysis 12 Hour


Linear and Non-linear Data Structures: Linked Lists, Stacks, Queues, Trees, Graphs - Asymptotic analysis of algorithms – recurrence tree method – Master theorem
Module-2 – Binary Search Trees and Suffix Trees 8 Hour
Binary Search tree - AVL tree - Splay trees – Red-black trees -2-3 Trees - Tries – Suffix Trees
Module-3 – Multiway Search Trees and Heaps 9 Hour
m-way Search Trees – B+ trees - Quad trees- k-d Trees – Nearest Neighbor Search
Module-4 – Heaps and Disjoint Sets 9 Hour
Skew heaps - Leftist Heaps – Applications to Dijkstra's and Prim's algorithms– Treaps - Disjoint-set data structure – Applications to Kruskal’s algorithms - union by rank
Module-5 – Complexity classes 7 Hour
Classes of P, NP and NP-complete - Polynomial reductions including 3SAT, CLIQUE, VERTEX COVER, INDEPENDENT SET.

61
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
List of Experiments (30 Hour):
Write a C / C++ program for the implementation of 2-3 Trees - Searching, Insertion and Deletion
Arrays and Structures B+ tree - Searching, Insertion and Deletion
Singly and Doubly Linked List Skew and Leftist Heaps – Insertion and Del-Min
Stacks and Queues using Linked Lists Dijkstra’s and Prim’s Algorithms using Heaps
Binary Search Tree using Linked Lists - Searching, Insertion and Deletion Treaps – Insertion and Deletion
AVL Trees – Insertion and Deletion Kruskal’s algorithm using Disjoint Set operations
Splay Trees – Insertion and Deletion

Learning 1.Thomas H Cormen, Charles E Leiserson, Ronald L Rivest, Clifford Stein, 5.Sahni Sartaj, "Data Structures, Algorithms and Applications in C++", Silicon
Resources “Introduction to Algorithms”, MIT Press, 2022. Press, 2013.
2. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C++”, Addison- 6.Motwani R, Raghavan P ,“Randomized Algorithms”, Cambridge University Press,
Wesley, 2014. 2014.
3.Michael T. Goodrich, Roberto Tamassia, David Mount, “Data Structures and 7.David P. Williamson, David B. Shmoys, “The design of approximation algorithms”,
Algorithms in C++”, John Wiley, 2016. Cambridge University Press, 2011.
4.Robert L Kruse, Clovis L Tondo, “Data Structures and Program design in C”,
Pearson, 2013.

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - 15% 15% -
Level 2 Understand 20% - - 20% 25% -
Level 3 Apply 20% - - 25% 30% -
Level 4 Analyze 20% - - 25% 30% -
Level 5 Evaluate 10% - - 10% - -
Level 6 Create 10% - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Mariappan Vaithilingam, Brahmarsive Inc, Bengaluru, 1. Prof. Venkatesh Raman, IMSc, Chennai. 1. Dr. Indhumathi Raman, SRMIST
2. Prof. N.S. Narayanaswamy, IIT Madras. 2. Dr. K. Vijaya, SRMIST

62
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC552J ADVANCED SOFTWARE ENGINEERING C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: learn about various software process models and project management activities.
CLR-2: understand the requirements engineering process and its specification models.
CLR-3: gain knowledge of the architectural styles and design patterns.
CLR-4: acquire the knowledge to create test cases utilizing various tools and techniques.
CLR-5: understand the various software measures and metrics.

Programme Outcomes
Course
At the end of this course, learners will be able to: (PO)
Outcomes (CO):
1 2 3
CO-1: identify and use appropriate process model for a given project. 2 2 -
CO-2: classify the user requirements and represent them using various specification models and UML diagrams. 2 3 -
CO-3: create the software design using architecture style and design patterns 1 - -
CO-4: develop test cases and test the software using automated testing tools. - 2 -
CO-5: evaluate processes and products against the applicable measures and metrics. - 3 3

Module-1 – Software Process Models and Project Management Activities 9 Hour


Software engineering concepts – Software Process – Software lifecycle models - waterfall – RAD - Prototyping – Evolutionary - Spiral – Agile – XP – Scrum – Kanban - Software project management – Management
Activities - Project planning – Scheduling – Risk management – Software Configuration Management.
Module-2 – Software Requirements Engineering 9 Hour
Requirement Engineering – Functional and Non-Functional requirements - Requirements engineering processes - Requirements Elicitation, Validation & Management - Software Requirement Specification – Formal
system specification – Finite State Machines – Petrinets – Object modelling using UML – Use case Model – Class diagrams – Interaction diagrams – Activity diagrams – State chart diagrams – Functional modelling
– Data Flow Diagram.
Module-3 – Software Architecture and Design 9 Hour
Software design – Design process – Design concepts – Coupling – Cohesion – Functional independence – Design patterns – Model-view-controller – Publish-subscribe – Adapter – Command – Strategy – Observer
– Proxy – Facade – Architectural styles – Layered - Client-server - Tiered - Pipe and filter - User interface design.
Module-4 – Software Testing 9 Hour
Test Planning - Test case Design Strategies – Using Black Box & White Box Approach to Test Case Design - Software test automation – skills needed for automation – scope of automation – design and architecture
for automation – requirements for a test tool – Selecting a test tool - Challenges in automation - Automated Software Testing Tools
Module-5 – Software Metrics 9 Hour
Framework for Product Metrics, Metrics for the Requirements Model, Metrics for the Design Model - Architectural Design Metrics, Object-Oriented Design - Software Measurement, Metrics for Software Quality.
List of Experiments: (30 Hour) Lab 7: Create the User Interface design.
Lab 1: Define the problem statement and business case for a project. Lab 8: Develop a Test Plan
Lab 2: Identify the appropriate process model suitable for the project. Lab 9: Perform Unit testing & Integration Testing.
63
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Lab 3: Develop the project plan and schedule. Lab 10: Perform System testing.
Lab 4: Identify requirements and develop SRS Lab 11: Devise the metrics for the Product
Lab 5: Develop the various UML diagrams. Lab 12: Perform Size Estimation.
Lab 6: Create the System and Architecture design

5.Carlo Ghezzi, Mehdi Jazayeri, Dino Mandrioli, Fundamentals of Software Engineering, 2nd
1.Roger Pressman, Software Engineering: A Practitioner's Approach, 7th Edition, McGraw-Hill, 2010
edition, PHI Learning Pvt. Ltd., 2010.
2.Ian Sommerville, Software Engineering, 9th Edition, Addison-Wesley, 2010
Learning 6.Bernd Bruegge, Alan H Dutoit, Object-Oriented Software Engineering, 2nd edition, Pearson
3.Pankaj Jalote, A Concise Introduction to Software Engineering, Springer,2008
Resources Education, 2004.
4.William E. Lewis, “Software Testing and Continuous Quality Improvement”, Third Edition, Auerbach
7.Srinivasan Desikan and Gopalaswamy Ramesh, ―Software Testing – Principles and
Publications, 2008
Practices‖, Pearson Education, 2006

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100% 100% 100%

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Premanandh, Sutherland Global Services, 1. Prof. V. Vani, NIT Puducherry 1. Dr. B. Arthi, SRMIST
2. Prof. R. Vijaya Arjunan, Manipal Institute of Technology 2. Dr. C. Pretty Diana Cyril, SRMIST

64
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC553J Course FULL STACK DEVELOPMENT FRAMEWORKS Course C PROFESSIONAL CORE L T P C
Code Name Category 3 0 2 4

Pre-requisite Nil Co- requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: Understanding the importance of web application and full stack development
CLR-2: Knowledge and abilities to develop web sites for the internet
CLR-3: Create servers and databases for functionality of websites
CLR-4: Learn libraries or frameworks for front and backend development
CLR-5: Usage of different API paradigms and DevOps

Course Outcomes At the end of this course, learners will be able to: Programme Outcomes
(CO): (PO)
1 2 3
CO-1: demonstrate knowledge of web development technologies 2 1 -
CO-2: develop interactive and dynamic web pages 3 - 2
CO-3: implement server-side operations for web applications. 2 - 3
CO-4: integrate front-end and back-end of applications 3 - 2
CO-5: design and deploy Application Programming Interfaces (APIs) - 3 2

Module-1 – Introduction to Web Applications and Full Stack Development 7 Hour


Overview of Web Development, Basics of Client-side and server-side development, Structure of web application, Introduction to Full stack development, tools for full stack developer, Introduction to HTML,
CSS and JavaScript.
Module-2 – Client-Side Programming 10 Hour
Creating web pages using HTML – Basic tags, links, lists, images, forms, tables, Designing web pages using CSS – External style sheets, Internal CSS, Inline styles, selectors, classes, colors, fonts, and
margins, XML- XML format, Displaying XML files, XML schema, Interactive web pages with JavaScript – variables, strings, expressions, operators, control flow, objects and arrays, functions and error
handling, React – React components, creation, exploration and booting of React app.
Module-3 – Server-Side Programming 10 Hour
PHP- Introduction to PHP, PHP development environment, Variables, Operators, String functions, Arrays, Files, GET and POST methods, MYSQL – Creating and managing database, database connectivity,
jQuery – Selectors and methods, event handlers, Ajax – Ajax methods
Module-4 – Backend Development 10 Hour
Backend – Introduction, Backend tools and Technology, Node Js – Features, Uses, Environment setup, Installation on Linux and Windows, Executing the file, Command line interface, Express Js –
Introduction, Installation and usage in node applications, Creating node and express based servers, Creating middleware.
Module-5 – Data formats and APIs 8 Hour
JSON – Syntax, Values, Objects, Strings, Arrays, Numbers, JSON methods, API – Introduction to APIs, SOAP APIs, REST APIs, Types of APIs, Calling APIs, API authentication, DevOps – Operations,
Architecture, Building and Testing, Deployment.
Lab Experiments (30 Hour): Lab 6: Writing PHP program to connect to the database MySQL and to learn to create database and
Lab 1: Create a simple webpage using HTML table, insert data into table, update, delete data using SQL connect functions

65
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Lab 2: Designing a web page using CSS Lab 7: Build a responsive web application for shopping cart with registration, login, catalog and cart
Lab 3: Designing an interactive web page using JavaScript pages with Express server and Node.Js
Lab 4: Writing PHP program to familiarize with looping statements, associative arrays and functions Lab 8: Create Simple Restful API using Node.Js and project the data on your webpage
Lab 5: Developing a dynamic web page using PHP Lab 9: Write code for a simple user registration form for an event using Docker in DevOps.

Learning 1. Philip Ackermann, Full Stack Web Development - The Comprehensive Guide, Rheinwerk 5. Jack Chan, Ray Chung, & Jack Huang, Python API Development Fundamentals,
Resources Computing, 2023. Packt Publishing, 2019.
2. Paul Wellens, Practical Web Development, Packt Publishing, 2015. 6. Anthony Accomazzo, Ari Lerner, Nate Murray, Clay Allsopp, David Gutman, and Tyler
3. Sammie Smith, Full Stack Web Development Guide, Fullstack Publication, 2022. McGinnis, Fullstack React – The Complete Guide to ReactJs and Friends,
4. Chris Northwood, The Full Stack Developer, Apress Publications, 2018. Fullstack.io, 2017.
7. Len Bass, Ingo Weber and Liming Zhu,DevOps – A Software Architect’s Perspective,
Pearson Education, 2015.

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 30% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 5% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Atham Abdul Hameed,Senior Technical Manager, 1. Prof. Saira Banu Atham, Presidency University, Bangalore, 1. Dr. S. Poornima, SRMIST
Renault Nissan Technology Business Centre of India, Karnataka.
Chennai

66
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course C PROFESSIONAL CORE L T P C
21CSC554J APPLIED DATA SCIENCE
Code Name Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: construct different data structures and their packages in Python
CLR-2: analyze real-world datasets in different formats using Python libraries for exploratory data analysis
CLR-3: apply methods to collect, load, and store data effectively for better analysis and informed decision-making.
CLR-4: show different methods to clean and organize raw data effectively for better analysis and decision-making.
CLR-5: demonstrate different types of plots using matplotlib and seaborn to better understand and present data.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: apply and utilize various data structures in Python effectively. - 1 2
CO-2: implement real-world datasets using Python libraries for insightful exploratory data analysis. 1 2 -
CO-3: apply methods to collect, load, and store data efficiently for informed decision-making. - 2 1
CO-4: demonstrate techniques for cleaning and organizing raw data for improved analysis. 2 - 3
CO-5: describe different types of plots using matplotlib and seaborn for clear data representation and presentation. - 3 1

Module-1 - Introduction to Numpy and Pandas 15 Hour


Introduction to Data science: Facets of data, Data Science Process, Getting to know your data: Data Objects & attribute types, Measuring Data Similarity and Dissimilarity.
Introduction to Numpy: Numpy, creating array, attributes, Numpy Arrays objects: Creating Arrays, basic operations (Array Join, split, search, sort), Indexing, Slicing and iterating, copying arrays, Arrays shape
manipulation, Identity array, eye function
Pandas: Exploring Data using Series, Exploring Data using Data Frames, Arithmetic and logical operations on dataframe, Accessing and slicing of series and dataframes - Arithmetic and logical operations on
dataframe, Index objects, Re-indexing, Drop Entry, Selecting Entries, Data Alignment, Rank and Sort, Summary Statistics, Index Hierarchy
Lab 1: Using Numpy implement Array Indexing, slicing and array basic operations
Lab 2: Perform different arithmetic, logical, and filtering operations on dataframes
Lab 3: Build program to demonstrate Indexing and Reindexing
Module-2 - Data Acquisition, Loading and Storing 15 Hour
Regular Expressions: Implement Regular Expression and its Basic Functions - findall(),search(),split(),sub(). The Match Object
Data Acquisition: Gather information from different sources, Web APIs, Open Data Sources, Web Scraping.
Data Loading and Storing : Reading and Writing Data in Text Format: Reading Text file in Pieces, Writing Data to Text Format, Working with Delimited Formats, JSON Data, XML and HTML
Lab 4: Implement programs to work with Regex functions and classes
Implement program to demonstrate Web Scraping by using a suitable library
Lab 5: Building programs to access different types of files
Lab 6: Construct programs to read and write data
Module-3 - Data Wrangling 15 Hour
Data Wrangling: Clean, Transform, Merge, Reshape: Combining and Merging Datasets, Merging on Index, Concatenate, Combining with overlap, Reshaping, Pivoting, Groupby operations on Dataframe, Pivot

67
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
tables to understand the relationship between variables in the data with different aggregation-Crosstab to understand the relationship between variables in the data, Handling Missing Data, Data Transformation,
String Manipulation, Summarizing, Binning, classing and Standardization, outlier, Noise and Anomalies, Encoding Techniques, Choice of encoding
Lab 7: Perform group by, pivot and crosstab aggregation on the dataframes
Lab 8: Construct program to demonstrate Data Transformation and Summarizing, encoding for categorical data.
Lab 9: Implement a program to demonstrate Binning, Classing and Standardization
Module-4 – Time Series, Advanced Pandas and Numpy 15 Hour
Time Series: Date and Time Data Types and Tools, Time Series Basics, Data Ranges, Frequencies and Shifting, Time Zone Handling, Periods and Period Arithmetic, Resampling and Frequency Conversion,
Moving Window Functions
Advanced Pandas: Categorical Data, Advanced GroupBy Use, Techniques for Method Chaining
Advanced Numpy: Advanced Array Manipulation, Broadcasting, Structured and Record Arrays
Lab 10: Implement program to demonstrate Time Series Data
Lab 11: Demonstrate Advanced GroupBy
Lab 12: Construct program to demonstrate advanced array manipulation
Module-5 - Visualization 15 Hour
Customizing Plots: Introduction to Matplotlib, Plots, making subplots, controlling axes, Ticks, Labels & legends, annotations and Drawing on subplots, saving plots to files, matplotlib configuration using different
plot styles, Seaborn library.
Making sense of data through advanced visualization : Controlling line properties of chart, creating multiple plots, Scatter plot, Line plot, bar plot, Histogram, Box plot, Pair plot, playing with text, styling your plot, 3d
plot of surface
Lab 13: Building programs to visualize the dataframe in matplotlib and seaborn
Lab 14: Building programs to visualize the univariate, bivariate and multivariate relation
Lab 15: Case study with all the appropriate graphs to visualize the relationship in the data

1. Reema Thareja “Python Programming: Using Problem Solving approach, Second Edition,
Oxford University Press, India, 2023. 4. Davy Cielen, Arno D. B. Meysman, and Mohamed Ali, Introducing Data Science: Big data,
Learning
2. Grus, J. Data Science from Scratch, 2nd Edition. O'Reilly Media, Inc, 2019. machine learning, and more, using Python tools, Manning Publications, (2016),
Resources
3. McKinney, W.). Python for data analysis: Data wrangling with pandas, NumPy, and 5. Wes Mc Kinney, “Python for Data Analysis”, O'Reilly Media,2012.
IPython. O'Reilly Media, Inc. 2018.

68
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Formative Life Long Learning Summative
Bloom’s
CLA-1 Average of unit test CLA-2- Practice Final Examination (40% weightage)
Level of Thinking
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 25% 25% -
Level 3 Apply 30% - - 30% 30% -
Level 4 Analyze 30% - - 30% 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Snehith Allam Raju, Senior Manager Advanced Analytics 1.Dr. Evangelos E. Milios 1.Dr A V Kalpana, SRMIST
,Architecture and IoT · Envista Holdings Corporation, Hyderabad
2.Dr D Hemavathi, SRMIST

69
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course C PROFESSIONAL CORE L T P C
21CSC555J MACHINE LEARNING ALGORITHMS
Code Name Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the human learning aspects.
CLR-2: acquaintance with primitives in the learning process by computer.
CLR-3: develop the linear learning models and classification in machine learning
CLR-4: implement the clustering techniques and their utilization in machine learning
CLR-5: implement the tree-based machine learning techniques and to appreciate their capability

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: demonstrate knowledge of learning algorithms and concept learning through implementation for sustainable solutions of applications. 1 2 2
CO-2: evaluation of different algorithms on well formulated problems along with stating valid conclusions that the evaluation supports. 2 3 3
CO-3: formulate a given problem within the Bayesian learning framework with focus on building lifelong learning ability. 3 3 3
analyze research-based problems using machine learning techniques and apply different clustering algorithms used in machine learning to generic datasets and
CO-4: 1 3 2
specific multidisciplinary domains.
CO-5: apply decision tree learning algorithms. 2 3 3

Module-1 - Introduction and Types of Learning 15 Hour


Introduction: Machine Learning: What & Why? - Examples of Machine Learning applications, Training versus Testing, Positive and Negative Class, Cross-validation. Types of Learning: Supervised, Unsupervised and
Semi-Supervised Learning. The Curse of dimensionality -Over fitting and under fitting-Linear regression-Bias and Variance tradeoff-Regularization-Learning-Evaluation Metrics, Gradient Descent Curve-Classification-
Error and noise-Parametric vs. non-parametric models-Linear Algebra for machine learning.
Lab 1: Building programs to work with the data pre-processing in python
Lab 2: Building programs to work with linear regression in python
Lab 3: Building programs to work with cross validation in Python
Module-2 - Design And Analysis of Machine Learning Algorithms 15 Hour
Guidelines for machine learning experiments, Cross Validation (CV) and resampling – K-fold CV, measuring classifier performance, assessing a single classification algorithm and comparing two classification
algorithms - K-fold CV Performance metrics-MSE, accuracy, confusion matrix, precision, recall, F1-score- Linear Regression - Logistic Regression with Binomial & Multi class classification
Lab 4: Building programs to performance metrics in python
Lab 5: Building programs work with linear regression with multiple variables in Python
Lab 6: Building programs work with logistic regression in python
Module-3 - Non-Parametric Model 15 Hour
K nearest neighbor classification –Gaussian Naive Bayes Classification-Multinomial Naïve Bayes classification-Bernoulli Naïve Bayes Classification - Comparison of Gaussian, Multinomial, Bernoulli naive bayes
classification -Support vector machine.
Lab 7: Building python programs to use principal component analysis
Lab 8: Building python programs to use Naïve Bayes classification
70
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Lab 9: Building programs to use Support Vector Machine
Module-4 – Decision Tree and Ensembling models 15 Hour
Decision tree representation-Basic decision tree learning algorithm-Inductive bias in decision tree Decision tree construction-Issues in decision tree-Classification and regression trees
(CART)- Random Forest-Random Forest with scikit-learn Minority Class, bootstrapping, Impurity Measures – Gini Index and Entropy, Best Split -Multivariate adaptive regression trees (MART). Boosting Technique-
Working of Adaboost, Gradient boost, Extreme Gradient Boost, Stacking and voting ensemble models
Lab 10: Building programs to implement decision tree algorithm
Lab 11: Building programs to implement random forest algorithm and hyper-tunning the parameters
Lab 12: Building programs with Boosting models
Module-5 - Unsupervised Techniques 15 Hour
Measuring (dis)similarity-Evaluating output of clustering methods-Spectral Clustering-Hierarchical Clustering-Agglomerative clustering-Divisive clustering-Choosing the number of clusters-Clustering data points and
features-Bi-clustering-Multi-view clustering-K-Means clustering-K-medoids clustering, Principal component Analysis, Singular value decomposition (SVD).
Lab 13: Building programs to implement Hierarchical clustering
Lab 14: Building programs to implement K-Means clustering
Lab 15: Building program to implement PCA, SVD.

1. Géron, “Hands-On Machine Learning with Scikit-Learn, Keras, and TensorFlow”, O'Reilly 5. Stephen Marsland, “Machine Learning: An Algorithmic Perspective, “Second Edition”, CRC
Media, Third Edition, 2022. Press, 2014.
2. Ethem Alpaydin, “Introduction to Machine Learning”, MIT Press, Fourth Edition, 2020. 6. Kevin P. Murphy,” Machine Learning: A Probabilistic Perspective”, MIT Press, 2012.
Learning 3. Tom Mitchell, "Machine Learning", McGraw-Hill, 1997. Sebastian Raschka, Vahid Mirji, 7. https://github.com/ageron/handson-ml3
Resources Python Machine Learning and deep learnin, 2nd edition, kindle book, 2018 8. https://www.kaggle.com/learn/intro-to-machine-learning
3. Carol Quadros,”Machine Learning with python, scikit-learn and Tensorflow”, Packet 9. https://docdrop.org/download_annotation_doc/AAAMLP-569to.pdf
Publishing, 2018. 10.http://14.139.161.31/OddSem-0822-1122/Hands-On_Machine_Learning_with_Scikit-Learn-
4. Gavin Hackeling,”Machine Learning with scikit-learn‖, Packet publishing”, O‘Reily, 2018. Keras-and-TensorFlow-2nd-Edition-Aurelien-Geron.pdf

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - 20% 20% -
Level 2 Understand 20% - - 20% 20% -
Level 3 Apply 30% - - 30% 30% -
Level 4 Analyze 30% - - 30% 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Balaji Haridoss LGSI,Chennai 1. Pao-Ann, Cheng Cheng University,Taiwan 1. Dr.G.Vadivu, , SRMIS
2. Dr.A.Shobanadevi, SRMIST

71
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC556J DATABASE SYSTEMS DESIGN: RELATIONAL AND NoSQL C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the fundamentals of Database Management Systems, Architecture, Language and Database design through Relational model
CLR-2: describe Database design through Relational model, Relational Algebra, Design Logical schema with constraints, Familiarize SQL Queries
CLR-3: apply Standard Database design through Normalization
CLR-4: build different kinds of real-world application using NoSQL
CLR-5: implement Transactional NoSQL Database

Programme Outcomes
Course Outcomes (PO)
At the end of this course, learners will be able to:
(CO):
1 2 3
CO-1: acquire knowledge on DBMS architecture, languages and Design of entire database - 1 3
CO-2: demonstrate Database design with SQL Queries 2 - 1
CO-3: formulate removal of anomalies using Normalization concepts 2 3 -
CO-4: analyze various real time applications of NoSQL 1 - 2
CO-5: implement Transactional NoSQL Database. - 1 3

Module-1 - Introduction 15 Hour


Issues in File Processing System, Need for DBMS, Basic terminologies of Database, Database system Architecture, Various Data models, ER diagram basics and extensions, Keys, Constraints, Conversion of ER
to Relational model, Tuple Relational calculus, Domain relational calculus.
Lab 1: Construction of Database design using Entity Relationship diagram for an application such as University Database
Lab 2: Conversion of ER model of university database to Relational model
Module-2 - SQL 15 Hour
Relational Algebra – Fundamental Operators, SQL commands- DDL, DML and DCL, Integrity Constraints, Aggregate Functions-Joins- Types of Joins: Inner join, outer joins, self-join, Sub queries-single row and
multiple row subqueries, Views, PL – SQL, Triggers, and Cursors.
Lab 3: Basic SQL commands with constraints
Lab 4: Implement Joins and Subqueries
Module-3 - Normalization 15 Hour
Pitfalls in Relational database, decomposing bad schema, Normalization, Need for Normalization, 1 NF, Functional Dependency, Closure of FD set, closure of attributes, 2 NF, 3 NF, BCNF, Multi- valued dependency,
4 NF, Join dependency 5 NF.
Lab 5: Implement Relational Model with 1NF,2NF
Lab 6: Implement Relational Model with 3NF and BCNF, 4 and 5NF
Module-4 - NoSQL Fundamentals 15 Hour
Overview and History of NoSQL Databases. Types of NoSQL Database, The Value of Relational Databases, Getting at Persistent Data, Concurrency, Integration, Impedance Mismatch, Application and Integration
Databases, Attack of the Clusters, The Emergence of NoSQL. Comparison of relational databases to new NoSQL stores, MongoDB, Cassandra, HBASE, Challenges NoSQL approach, Key-Value and Document
Data Models, Column-Family Stores, Aggregate-Oriented Databases. Replication and sharding, MapReduce on databases.
72
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Lab 7: Implement aggregation and indexing with suitable example using MongoDB.
Lab 8: Implement Map reduces operation with suitable example using MongoDB
Module-5 - Transactions with NoSQL 15 Hour
NoSQL Key-Value databases using MongoDB, Document Databases, Document oriented Database Features, Consistency, Transactions, Availability, Query Features, Scaling, Suitable Use Cases, Event Logging,
Content Management Systems, Blogging Platforms, Web Analytics or Real-Time Analytics, Social media Applications, Column- oriented NoSQL databases using Apache HBASE
Lab 9: Design and implement any aggregation pipeline using MongoDB
Lab 10: Practice with collection of data for document-oriented database. Import restaurants collection and apply some queries to get specified output.

1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, Database System Concepts, 4. Raghurama Krishnan, Johannes Gehrke, Database Management Systems, 3rdEdition,
Seventh Edition, Tata McGraw Hill, 2019. McGrawHill Education, 2003.
Learning 2. Ramez Elmasri, Shamkant B. Navathe, Fundamentals of Database Systems Sixth 5. Sadalage, P. & Fowler, NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot
Resources Edition, Pearson Education, 2011. Persistence, Wiley Publications,1st Edition ,2019.
3. CJ Date, A Kannan, S Swamynathan, An Introduction to Database Systems, Eight 6. NoSQL Distilled, A brief guide to the emerging world of Polygot persistence, First
Edition, Pearson Education, 2006. Edition,Promod J,Sadalage Martin Fowler,2012.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - 20% 20% -
Level 2 Understand 20% - - 20% 20% -
Level 3 Apply 30% - - 30% 30% -
Level 4 Analyze 30% - - 30% 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. E Nagarajan, R&D Head, Solvedge Technology 1. Dr. Anandhakumar P, Professor, Madras Institute of Technology, 1. Dr. D Hemavathi , SRM IST
Chrompet
2. Mrs. S Sindhu , SRM IST

73
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC558J Course DEEP LEARNING APPROACHES Course C PROFESSIONAL CORE L T P C
Code Name Category 3 0 2 4

Pre-requisite Nil Co- requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: understand the foundations of neural network concepts
CLR-2: acquire various optimization, regularization and normalization approaches in neural networks
CLR-3: appreciate the architectures of Convolutional neural network and Recurrent Neural Networks
CLR-4: comprehend the functionalities of Auto encoders, transformers and Generative networks
CLR-5: explore the application of deep neural network architectures in language, text, speech, video and image processing

Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: learn the fundamental concepts of neural networks 3 - -
CO-2: recognize the significance of optimization, regularization and normalization techniques in neural networks - 3 -
CO-3: implement the Convolutional neural network and Recurrent Neural Networks 2 - 1
CO-4: learn about the Auto encoders, transformers and Generative networks - 1 3
CO-5: apply deep neural network architectures for language, text, speech, video and image processing - 2 2

Module-1 - Fundamentals of Deep Learning 15 Hour


Introduction to neural networks-machine learning vs deep learning, biological motivation of neural networks, fundamentals of tensor flow-data structures in tensor flow, Perceptron model-perceptron
learning rule, learning Ex-OR problem, activation functions- role of activation function, different types of activation functions, feedforward neural networks, back propagation in neural networks-chain
rule, loss function s- binary cross entropy loss, categorical cross entropy loss
Lab 1: exploring the environment of tensor flow
Lab 2: Building Programs to Perform Basic Operations in Tensors, regression
Module-2 - Optimization, Regularization and Normalization in Deep Neural Networks 15 Hour
Gradient descent algorithm-types of gradient descent, RMS prop, Adagrad, ADAM optimiser, Unit Saturation- Vanishing And Exploding Gradient, Underfitting, Overfitting And Learning Rate,
Regularization Techniques In Neural Networks-LASSO Regression, Ridge Regression, Dropouts, Early Stopping, Normalization techniques in Neural Networks- Batch Normalization, Group
Normalization, Instance Normalization
Lab 3: Building neural network using Keras
Lab 4: Building programs to optimize the neural network using gradient descent. normalization techniques
Module-3 - Convolutional Neural Networks and Recurrent Neural Networks 15 Hour
Convolutional neural networks- biological motivation, convolution operation, Pooling layer, types of pooling, Fully connected layer, Applications in Computer vision, Imagenet, Transfer Learning,
Sequence modelling- Recurrent Neural Networks- RNN Topologies, Difficulty in training in RNN, Long Short-Term Memory networks, Bi-Directional LSTM, Gated, Recurrent units.
Lab 5: Building Programs for Compute vision problems using CNN

74
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Lab 6: Building Programs for multi class computer vision problem using CNN, LSTM
Module-4 – Autoencoders, Transformers and Generative Networks 15 Hour
Auto Encoders and Decoders- introduction using auto encoders, educational auto encoders, regularized auto encoder, variational Auto encoders, denoising autoencoder, applications of auto
encoder, Generative Adverserial Networks (GAN), Transformers-attention mechanisms BERT.
Lab 7: Building Programs to create Autoencoders with Keras
Lab 8: Building Programs to create a denoising autoencoders, GAN
Module-5 - Deep Architectures for Heterogeneous Data Processing 15 Hour
GPT, auto regressive models, stability diffusion models, Vision and Language applications-Image captioning, Visual QA, Visual Dialog, Pixel RNNs, Cycle GANs, Progressive GAN, Stcak GAN,
Pix2Pix
Lab 9: implement stable diffusion model
Lab 10: Implement Image caption generation models, pre trained model

Learning 1. Chollet, F, “Deep learning with Python”, Manning Publication, 2019 4. J ason Brownlee, “Deep Learning with Python”,ebook,2016
Resources 2. Ian Goodfellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2017. 5. Seth Weidman Seth Weidman, “Deep Learning from Scratch: Building with Python from
3. Kevin P. Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012. First Principles”,Oreilly, 2019.
6. Antonio Gulli, “TensorFlow 1.x Deep Learning Cookbook,” Packt Publishing Limited,
2017.

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination (40% weightage)
CLA-1 Average of unit test CLA-2- Practice
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 25% 25% -
Level 3 Apply 30% - - 30% 30% -
Level 4 Analyze 30% - - 30% 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr.Sagarika, Senior Data Scientist, Great Learning 1.Dr. Anandhakumar P, Professor, Madras Institute of Technology, 1. Dr M Prakash, SRMIST
Chrompet
2. Dr. S. Sharanya, SRMIST

75
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC566J CYBER PHYSICAL SYSTEMS IN IoT C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: describe the practical aspects and possible vulnerabilities in cyber-physical systems.
CLR-2: introduce essential tools to implement CPS for the different application domains.
CLR-3: bridge the cyber-world of computing and communications with the physical world.
CLR-4: analyze real-world applications related to cyber-physical systems
CLR-5: apply cyber-physical system concepts to handle real-world security challenges

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: memorize the nature of cyber-physical systems in IoT 2 2 -
CO-2: apply the principles of cyber-physical systems 2 - 3
CO-3: address the security challenges and develop a secure application 3 - 2
CO-4: analyze existing cyber-physical systems. - 2 3
CO-5: design cyber-physical systems according to the requirements. 2 - 2

Module-1 - Cyber-Physical Systems 9 Hour


Introduction to Internet of Things, Comparison of CPS and IoT, Distinct Origins, Description of Previously-Proposed CPS/IoT Overlap Models, Analysis of Overlap Models, Significance of Convergence, Unified
Perspective, Components Model, Interactions Model, Design Assurance, Synchronous Model, Reactive Components, Properties of Components.
Module-2 - Safety Requirements 9 Hour
Safety Specifications, Asynchronous Model, Processes, Design Primitive, Asynchronous Coordination Protocols, Liveness Requirements, Temporal Logic, Model Checking. Proving Liveness, Dynamical Systems,
Continuous-Time Models, Linear Systems, Designing Controllers, Analysis Techniques.
Module-3 - Timed Model 9 Hour
Timed Processes -Based Protocols, Real-Time Scheduling EDF Scheduling, Fixed-Priority Scheduling, Designing Hybrid Systems, Linear Hybrid Automata, CPS Hardware platforms, Different CPS ensembled
Networks, CPS SW stack RTOS, Scheduling Real-Time control tasks, Principles of Automated Control Design, Dynamical Systems and Stability, Controller Design Techniques.
Module-4 - Stability Analysis 9 Hour
CLFs, MLFs, stability under slow switching, Performance under Packet drop and Noise, CPS software component, Mapping software components to ECUs, CPS Performance Analysis, Secure Deployment of
CPS, Security of Cyber-Physical Systems, Fundamental and advanced Techniques in CPS Securities, Cyber Security Requirements, Attack Model and Countermeasures.
Module-5 - Case Study 9 Hour
Vehicle ABS hacking. Power Distribution, Attacks on Smart grid, Precision Agriculture, Health care, Medical Cyber-Physical systems, Smart Cities, Smart grid Energy Cyber-Physical Systems, WSN- based Cyber-
Physical Systems, Building Automation.
List of Experiments: 30 Hour
1. Familiarity with Embedded and robot platforms.
2. Implementation of Moore Machine using Traffic Light controller.
3. Implementation of Mealy Machine using rocket controller.
76
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
4. Implementation of open-loop system stability for a CPS application.
5. Implementation of automation in Industry 4.0 based CSP scenario.
6. Implementation of automating and enhancing security functionalities in drone application.
7. Study of smart grids and its cyber monitoring.
8. Simulation of a Continuous/Discrete-Time Model of a Ground Vehicle.
9. Simulation of the CSP Automation in an office Room.
10. Simulation of the CSP Automation for Agricultural scenario.

1. R. Alur, Principles of Cyber-Physical Systems, MIT Press, 2015. 4. Hongmei He, Carsten Maple, Tim Watson, Ashutosh Tiwari, Jorn Mehnen, Yaochu Jin and
2. Christopher Greer, Martin Burns, David Wollman, Edward Griffor, Cyber-Physical Bogdan Gabrys, The Security Challenges in the IoT enabled Cyber-Physical Systems and
Learning Systems and Internet of Things, NIST Special Publication 1900-202, Opportunities for Evolutionary Computing & Other Computational Intelligence, IEEE
Resources https://doi.org/10.6028/NIST.SP.1900-202. 2019. Congress on Evolutionary Computation
3. E. A. Lee and S. A. Seshia, Introduction to Embedded Systems: A Cyber- Physical 5. Marilyn Wolf and Dimitrios Serpanos, Safety and Security in Cyber-Physical Systems and
Systems Approach, LeeSeshia.org, 2011. Internet-of-Things Systems, Proceedings of the IEEE, 2018.

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Life Long Learning Summative
Bloom’s
CLA-1 Average of unit test CLA-2- Practice Final Examination (40% weightage)
Level of Thinking
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Murali Sundaram, NPedia Technologies Pvt. Ltd., Technology
1. Dr. Elakiya, Assistant Professor, BITS Pillani - Dubai Campus 1. Dr. Vaishnavi Moorthy, SRMIST
consultant for Corporates - SMEs – Universities, Chennai
2. Dr. Mahalakshmi P, SRMIST
3. Dr. M. Thenmozhi, SRMIST

77
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC567J BIG DATA FRAMEWORKS AND MLOps C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the basics of Hadoop and related technologies to big data analytics and examine the ecosystem tools in Hadoop
CLR-2: provide with comprehensive Apache Spark knowledge for Big data processing
CLR-3: design and build applications with Apache airflow and Kafka
CLR-4: impart knowledge on ML pipelines for cloud-based ML-Model Deployments
CLR-5: understand about ML models deployment using optimized Kuberenetes workflows

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: apply MapReduce, HDFS and YARN develop big data applications 1
CO-2: develop Apache Spark applications 1 2
CO-3: comprehend the importance of Apache Airflow and Implement producer consumer application using Kafka 1 3
CO-4: apply transfer learning for ML Model deployment on cloud platforms 2
CO-5: build and maintain ML pipelines for cloud-based ML-Model Deployments and Deploy ML models using optimized Kuberenetes workflows 3

Module-1 - Introduction to Big Data 9 Hour


Overview of Hadoop- HDFS architecture-Hadoop MapReduce-Processing data with map reduce-YARN architecture-Anatomy of file Read and Write in Hadoop-Hadoop Shell commands - Overview of Hadoop
Ecosystem-Apache Hive-Datatypes-Create, Alter and Drop Commands-Built in operators and Functions-Views-Interaction with Hadoop framework-Apache Pig-Pig Latin-Load and store operators-Utility commands
and diagnostic operators-Basic operators-Filtering operators. Zookeeper-Zookeeper Architecture-Data Model-Zookeeper Operations-Creating and managing Znodes-operations on Znodes
Module-2 - Apache Spark 9 Hour
Introduction to Apache Spark- Architecture of Apache Spark- RDDs (Resilient Distributed Datasets): creation, transformations, and actions-Spark SQL-SQL queries in Spark- Introduction to Spark Streaming-
Streaming API-Spark Machine learning-Spark MLlib-PySpark
Module-3 Kafka and Apache Airflow 9 Hour
Introduction to Apache Kafka-Cluster Architecture-Kafka Messaging-components in messaging-Creating and deleting Kafka Topic-Creating multiple brokers-Kafka Producers-API for a Kafka Producers-Producer
implementation -Three ways to send Kafka message-Kafka Consumers-Consumer groups-API for Kafka Consumer—Consumer implementation -Integration with spark.- Apache Airflow- Directed Acyclic Graph- CLI
commands-Automate specific tasks with Apache Airflow - MLFlow architecture.
Module-4 – ML Deployment and CI/CD pipelines 9 Hour
Introduction to ML Deployment - Introduction to MLOps – Foundations - MLOps for containers - Continuous Integration - Continuous Deployment for ML models - Monitoring and Feedback - CI/CD pipelines -
Gitlab,Jenkins - YAML/XML – Profiler – MLFLOW architecture
Module-5 - Docker and Kubernetes 9 Hour
Docker Containers – Kubernetes – Deploy and manage containers - Orchestrate multiple services and manage scalability - FluentD - Elk Stack

78
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
List of Experiments 30 Hour Lab 6: Building Data Pipelines with Apache Kafka Connect
Lab 1: Hadoop Shell commands Lab 7: Implementation of CI/CD workflows, model monitoring, and data engineering concepts relevant
Lab 2: Map reduce program for Word Count and with any excel dataset to production ML
Lab 3: Basic commands in Pig and Analyse any dataset using various operators in pig Lab 8: Implementation of Jenkins
Lab 4: Basic commands in Hive and Processing Data in Hadoop with Hive Lab 9: Implementation of Docker Containers
Lab 5: Exploring Spark SQL for Data Analysis Lab 10: Deploy ML models using optimized Kuberenetes workflows

1. Tom White ,Hadoop:The Definitive Guide, O'Reilly Media, Fourth Edition 2015. 7. Yaron Haviv, Noah Gift, Hands-On Implementing MLOps in the Enterprise, O'Reilly
2. Srini Panchkula , Big Data Processing with Apache Spark , Lulu, First Edition, Media, Inc., First Edition, 2023
2018 8. Noah Gift, Alfredo Deza, Practical MLOps: Operationalizing Machine Learning Models,
3. Brindha Priyadarshini Jeyaraman,Real-Time Streaming with Apache Kafka, O'Reilly Media, Inc. First Edition, 2021
Learning Spark and Storm, BPB Publishers, First Edition, 2021 9. Chip Huyen, Designing Machine Learning Systems: An Iterative Process for Production-
Resources 4. Jisha Mariam Jose, Hadoop Practice Guide-SQOOP, PIG, HIVE, HBASE for Ready Applications, O'Reilly Media, Inc., First Edition,2022
Beginners, Notion Press, First Edition, 2019 10. Andrew P. McMahan, Machine Learning Engineering with Python, Packt Publishers, First
5. Aurélien Géron, Hands-On Machine Learning with Scikit-Learn, Keras, and Edition, 2023
TensorFlow, O'Reilly Media, Inc, Second Edition, 2019
6. Mark Treveil, Introducing MLOps, O'Reilly Media Inc, First Edition, 2020

Learning Assessment
Continuous Learning Assessment (CLA)
Formative Life Long Learning Summative
Bloom’s
CLA-1 Average of unit test CLA-2- Practice Final Examination (40% weightage)
Level of Thinking
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - 15% 20% -
Level 2 Understand 20% - - 20% 20% -
Level 3 Apply 20% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate 5% - - 10% - -
Level 6 Create 5% - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr . N Mohanraj, Software Engineer 2, PayPal Inc., Dr. Joe Louis Paul, SSN College of Engineering 1. Dr.S.Sindhu, SRMIST
2. Dr. A. Shobanadevi, SRMIST

79
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC569J FUNDAMENTALS OF ARTIFICIAL INTELLIGENCE C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR)
CLR-1 : understand the basic data structures involved in python to perform exploratory data analysis
CLR-2 : understands data analysis and visualization using python
CLR-3 : learn the distinction between optimal reasoning Vs human like reasoning and formulate an efficient problem space for a problem expressed in natural language. Also select a
search algorithm for a problem and estimate its time and space complexities.
CLR-4 : understand the concepts of constraint satisfaction problems and optimal decision making
CLR-5 : understand the various methods of Knowledge representation and Reasoning with examples.

Course At the end of this course, learners will be able to: Program Outcomes (PO)
Outcomes (CO): 1 2 3
CO-1: do the exploratory data analysis techniques in Python environment. 2 - -
CO-2: formulate and use appropriate data analysis and visualization techniques for their data 2 - -
CO-3: identify and design the suitable AI Agents and also Apply the basic search techniques for problem solving 2 2 -
CO-4: solve the constraint satisfaction problems with optimal decision. 2 2 -
CO-5: solve the AI problems by incorporating the optimal knowledge Representation and Reasoning techniques - - 3

Module-1 Introduction to Python for Data Science 15 Hour


Python Programming Introduction, Python Data structures and Functions, Basic Python programs, Introduction to Data science, Understanding the nature of Data -Types of Data, Introduction to libraries:
NumPy, Pandas, Matplotlib , Data types in Python relevant to data science ,Applications using Python libraries, Hands-on practice with NumPy and Pandas.
Lab 1 Python Basics and Control Structures
Lab 2 Create a NumPy array and perform basic operations
Lab 3 Use Pandas to load a CSV file, display the first 10 rows, and perform basic data manipulation (sorting, filtering).
Module-2 Data Analysis and Visualization with Python 15 Hour
Data Loading and Cleaning:Reading and Writing Data with Pandas, Data Manipulation with Pandas,Exploratory Data Analysis (EDA):Descriptive Statistics, Data Visualization with Matplotlib and
Seaborn, Correlation and Covariance, Advanced Data Visualization-Interactive Plots with Plotly.
Lab 4 Load a dataset into a Pandas DataFrame and clean the data (handle missing values, drop unnecessary columns) and Perform group by operations and calculate summary statistics.
Lab 5 Create a variety of plots using Matplotlib,Use Seaborn to create advanced visualizations (box plot, heatmap) and customize them (titles, labels, colors).
Module -3 Introduction to AI and Problem Solving/ Searching Techniques 15 Hour
Introduction to AI: Problems of AI, AI techniques, Intelligent Agents and Environment, Defining the problem as state space search, production system, problem characteristics, and issues in the design of
search programs. Problem solving agents, searching for solutions; uniform search strategies: breadth first search, depth first search, depth limited search, bidirectional search, comparing uniform search
strategies. Heuristic search strategies Greedy best -first search, A* search, AO* search, memory bounded heuristic search: local search algorithms & optimization problems: Hill climbing search, simulated
annealing search, local beam search.
Lab 6 Developing agent programs for real world problems
Lab 7 Implementation and Analysis solution for TSP
80
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Lab 8 Developing Best first search and A*Algorithm for real world problems
Lab 9 Implementation of Simulated Annealing Algorithm and Hill Climbing for real world problem
Module-4 Constraint Satisfaction Problems and Game Theory: 15 Hour
Local search for constraint satisfaction problems. Adversarial search, Games, optimal decisions & strategies in games, the minimax search procedure, alpha-beta pruning, additional refinements, iterative
deepening.
Lab 10 Implementation of constraintsatisfaction problems
Lab 11 Implementation of alpha-beta pruning algorithm for an application
Lab 12 Develop an agent using Minimax algorithm to play Tic-Tac-Toe
Module -5 Knowledge Representation and Reasoning for various AI applications 15 Hour
Statistical Reasoning: Probability and Bayes' Theorem, Certainty Factors and Rule-Base Systems, Bayesian Networks, Dempster-Shafer Theory, Fuzzy Logic. AI for knowledge representation, rule-based
knowledge representation, procedural and declarative knowledge, Logic programming, Forward and backward reasoning.
Applications: Expert Systems, Decision Support System, Generative AI in Natural Language Processing (NLP) AI-based Programming tools.
Lab 13 Implementation of unification and resolution for real world problems.
Lab 14 Implementation of knowledge representation schemes - use cases
Lab 15 Develop Chatbot for SRM Admission Enquiry

1. Joel Grus,” Data Science from Scratch: First Principles with Python, Second 4. “A First Course in Artificial Intelligence”, Deepak Khemani, McGraw Hill
Edition.O’Reilly,2019 Education, 2013.
Learning 2. Charles R. Severance, "Python for Everybody Exploring Data Using Python", 5. Gerhard Weiss, ―Multi Agent Systems‖, Second Edition, MIT Press, 2013
Resources Charles Severance, 2016. 6. https://towardsai.net/p/machine-learning/large-language-models-and-gpt-4-
3. “Artificial Intelligence” E. Rich and K. Knight, Mc Graw Hill Publishers INC, 3rd architecture-and-openai-api
Edition 2017.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2- Practice
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - - 15% 20% -
Level 2 Understand 20% - - 20% 20% -
Level 3 Apply 20% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate 5% - - 10% - -
Level 6 Create 5% - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.JagatheeswaranSenthilvelan, Managing Partner , ProtoHubs.io 1.Dr. Latha Parthiban, Pondicherry University 1. Dr.M. Karpagam, SRMIST

2. Dr.C. Lakshmi, SRMIST

81
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC571J Course REINFORCEMENT LEARNING ALGORITHMS Course C PROFESSIONAL CORE L T P C
Code Name Category 3 0 2 4

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book /Codes/Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR)
CLR-1 : understand the fundamental concepts of reinforcement learning.
CLR-2 : explore Finite Markov Decision Processes, policies, value functions, and optimal strategies using dynamic programming techniques
CLR-3 : explore Monte Carlo methods for prediction and control as well as temporal-difference learning for online updates and control strategies
CLR-4 : learn how to handle large state spaces using value function approximation, gradient-based methods, and policy approximation techniques
CLR-5 : apply reinforcement learning algorithms to real-world problems

Course Program Outcomes (PO)


Outcomes (CO): At the end of this course, learners will be able to: 1 2 3
CO-1: understand the core concepts and principles of reinforcement learning 2 - -
CO-2: apply model-based learning techniques such as dynamic programming for policy evaluation, improvement, and iteration in Markov 3 - -
Decision Processes.
CO-3: implement model-free learning algorithms including Monte Carlo methods and temporal-difference learning for prediction and 3 - -
control tasks.
CO-4: utilize approximate solution methods like value function approximation and gradient-based methods to handle large state spaces 3 2 -
and complex decision-making scenarios.
CO-5: apply reinforcement learning algorithms to practical problems and real-world applications, demonstrating proficiency in designing - 2 3
and implementing solutions for various domains.

Module-1 Introduction 15 Hour


Introduction to reinforcement learning, Examples, Elements of Reinforcement Learning, Limitations and Scope, An Extended Example: Tic-Tac-Toe, A k-armed Bandit Problem, Lab 1- Implementation
of Tic Tac Toe with Value Function, Action-value Methods, The 10-armed Testbed, Lab 2- ε-greedy algorithm for Multi-armed bandit problem, Incremental Implementation, Tracking a Nonstationary
Problem, Optimistic Initial Values, Upper-Confidence-Bound Action Selection, Gradient Bandit Algorithms, Associative Search, Lab 3-UCB for Multi-armed bandit problem.
Module – 2 Model Based Learning 15 Hour
Finite Markov Decision Processes- The Agent–Environment Interface, Goals and Rewards, Returns and Episodes, Lab 4- Cart Pole Balancing with Random Policy, Unified Notation for Episodic and
Continuing Tasks, Policies and Value Functions, Optimal Policies and Optimal Value Functions, Optimality and Approximation, Lab 5- Policy Iteration on GridWorld problem, Dynamic Programming-
Policy Evaluation (Prediction), Policy Improvement, Policy Iteration, Value Iteration, Asynchronous Dynamic Programming, Generalized Policy Iteration, Lab 6- Value iteration on gambler’s problem.
Module -3 Model Free learning 15 Hour
Monte Carlo Methods- Monte Carlo Prediction, Monte Carlo Estimation of Action Values, Monte Carlo Control, Monte Carlo Control without Exploring Starts, Off-policy Prediction via Importance Sampling,
Incremental Implementation, Off-policy Monte Carlo Control, Lab 7- Monte carlo prediction for Blackjack, Temporal-Difference Learning- TD Prediction, Advantages of TD Prediction Methods, Lab 8 –
SARSA for windy GridWorld problem, Optimality of TD(0), Sarsa: On-policy TD Control, Q-learning: Off-policy TD Control, Expected Sarsa, Maximization Bias and Double Learning, Lab 9- Q learning for
Cliff walk example.
Module -4 Approximate Solution Methods 15 Hour

82
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
On-policy Prediction with Approximation- Value-function Approximation, The Prediction Objective, Stochastic-gradient and Semi-gradient Methods, Linear Methods, Episodic Semi-gradient Control, Semi-
gradient n-step Sarsa, Lab 10- Episodic SARSA in mountain car, Off-policy Methods with Approximation- Semi-gradient Methods, Examples of Off-policy Divergence, Eligibility Traces- The -return, TD(),
Sarsa(), Policy Gradient Method- Policy Approximation and its Advantages, The Policy Gradient Theorem, REINFORCE: Monte Carlo Policy Gradient ,Lab 11- CartPolewith Monte-Carlo Policy Gradient,
REINFORCE with Baseline , Actor–Critic Methods, Lab 12-Implementation of Actor-Critic.
Module-5 Applications and Case Studies 15 Hour
TD-Gammon, Lab 13- Implementation of TD-Gammon, Samuel’s Checkers Player, Lab 14- Implementation of Samuel’s Checkers Player, Watson’s Daily-Double Wagering, Optimizing Memory Control,
Human-level Video Game Play, Mastering the Game of Go, Personalized Web Services, Thermal Soaring, Lab 15- Implementation of Personalized Web Services

Learning 1. Richard S. Sutton & Andrew G. Barto“Reinforcement Learning: An 4. CsabaSzepesvári, “Algorithms for Reinforcement Learning”, Morgan & Claypool,
Resources Introduction”,MIT Press; second edition,2018 2010.
2. Dimitri P. Bertsekas, “Reinforcement Learning and Optimal Control”, Athena 5. Boris Belousov, HanyAbdulsamad, Pascal Klink, Simone Parisi, Jan Peters,
Scientific, 2019 “Reinforcement Learning Algorithms: Analysis and Applications”, Springer, 2021
3. Maxim Lapan, “Deep Reinforcement Learning Hands-On”Packt Publishing, 2020

Learning Assessment
Continuous Learning Assessment (CLA
Formative Life Long*Learning Summative
Bloom’s CLA-I Average ofunit test CLA-II- Practice FinalExamination
Level of Thinking (45%) (15%) (40% weightage)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - - 15% 15% -
Level 2 Understand 25% - - 25% 20% -
Level 3 Apply 20% - - 20% 15% -
Level 4 Analyze 15% - - 20% 25% -
Level 5 Evaluate 15% - - 20% 25% -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. S. Smilin Sam, Principal Engineer, Athenahealth Pvt Ltd. 1.Dr. R. Gayathri, Professor, Sri Venkateswara College of 1.Dr.C. Sherin Shibi, SRMIST
Engineering, Sriperumbudur.
2.Dr. C. Lakshmi, SRMIST

83
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSC572J APPLIED MALWARE ANALYSIS C PROFESSIONAL CORE
Code Name Category 3 0 2 4

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the fundamentals of static and dynamic analysis.
CLR-2: gain knowledge about running malware in virtual environment.
CLR-3: study about disassembly constructs and its structures.
CLR-4: study about new processors and file types using the IDA SDK
CLR-5: explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: gain knowledge about the different forms of malware. 1
CO-2: set up a safe virtual environment to analyze malware. 2
CO-3: navigate, comment, and modify disassembly. 2
CO-4: use code graphing to quickly make sense of cross references and function calls 1 3
CO-5: use IDA's built-in debugger to tackle hostile and obfuscated code. 2

Module-1: Introduction 9 Hour


What Is Malware?Why Malware Analysis? - Types Of Malware Analysis - Malware Sources - Static Analysis- Determining the File Type- Identifying File Type Using Manual Method -Multiple Anti-Virus Scanning -
Scanning the Suspect Binary with Virus Total
Module-2: Dynamic Analysis 9 Hour
System And Network Monitoring - Dynamic Analysis (Monitoring) Tools- Process Inspection with Process Hacker - Determining System Interaction with Process Monitor - Logging System Activities Using Noriben
- Capturing Network Traffic With Wire shark - Dynamic-Link Library (DLL) Analysis - Computer Basics- Memory-How Data Resides In Memory-CPU- Program Basics- CPU Registers
Module-3 IDA Pro 9 Hour
Disassembly Using IDA-Code Analysis Tools - Static Code Analysis (Disassembly) UsingIDA - Exploring IDA Displays - Improving Disassembly Using IDA - Debugging Malicious Binaries - Debugging a Binary Using
x64dbg
Module-4 Malware Functionalities and Persistence 9 Hour
Functionalities - Malware Persistence Methods - Virtual Memory and its use in Operating System - User Mode And Kernel Mode -Code Injection Techniques, Hooking Techniques - Custom Encoding/Encryption -
Malware Unpacking - Displaying Device Trees
Module-5 OLLYDBG 9 Hour
Loading Malware - The OllyDbg Interface - Memory Map and its management - First and Second chance Exception, Common exceptions in Malware Payload. - Patching options in OllyDbg, Standard Plug-in with
DLL’s. - Viewing Threads and Stacks - Executing Code and its impact - Purpose of Breakpoints
List of Lab Experiments - 30 Hour
LAB1:Understanding Malware Analysis Lab Environment LAB6: Performing Static Analysis of Malware Payload Using IDA PRO
84
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
LAB2: Create Simple Virus Using Notepad, Vbscript and Analyze in Sandboxing Environment. LAB7: Static Analysis of Malware WithOllyDbg
LAB3:Dynamic Malware Analysis - Tolls LAB8: Static Analysis of Malware Payload with OllyDbg
LAB4:Dynamic Malware Analysis- Payload LAB9: Extracting Strings, Inspecting PE Header of Payload
LAB5: Performing Static Analysis of Malware Using IDA PRO LAB10: Patching Binary Using Ida Scripting and Plugins

1. Monnappa K A,Learning Malware Analysis, Published by Packt Publishing Ltd,


3. Chris Eagle, the IDA Pro Book, 2nd Edition, No Starch Press, 2011.
Learning 1st Edition 2018.
4. Ken Dunham, Android Malware and Analysis, Kindle Edition, Auerbach Publications.
Resources 2. Michael Sikorski,Practical Malware Analysis: The Hands-On Guide to Dissecting
Malicious Software, No Starch Press; 1 edition (February 1, 2012).

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 20% 25% -
Level 3 Apply 30% - - 25% 30% -
Level 4 Analyze 30% - - 25% 30% -
Level 5 Evaluate - - - 10% - -
Level 6 Create - - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Bhawana Rudra Assistant Professor (Grade I) National 1.Dr.M.B.Mukesh Krishnan,SRMIST
1.Mr.Karthik Expert Member from k7 Computing
Institute of Technology, Warangal
2.Dr.V.Joseph Raymond,SRMIST

85
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC573J Course DATA ANALYSIS AND INTERPRETATION Course C PROFESSIONAL CORE L T P C
Code Name Category 3 0 2 4

Pre-requisite Nil Co- requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: demonstrate a strong foundation in core data science principles, including statistics, machine learning, and data mining.
CLR-2: design and implement data analysis pipelines, handling data acquisition, cleaning, transformation, and visualization.
CLR-3: build and evaluate predictive and descriptive models for solving real-world problems.
CLR-4: gain knowledge of tableau and effectively communicate data insights through visualizations, reports, and presentations.
CLR-5: possess the ability to critically evaluate the ethical implications and societal impact of data analysis practices.

Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: apply data analysis principles for data cleaning, transformation, and exploration using programming languages or tools like Python or R - 3 -
CO-2: master the functionalities of Tableau for creating interactive and informative data visualizations for various data types 1 - 3
CO-3: explain the challenges of interpreting complex machine learning models and the need for Explainable AI (XAI). 2 -
CO-4: implement XAI techniques like feature importance, SHAP values, and LIME to understand a model's decision-making process. 2 - 1
CO-5: utilize Tableau and XAI techniques to analyze and interpret a dataset, effectively communicating insights to a broad audience. - 2 2

Module-1 Fundamentals of Data Analysis and Visualization 15 Hour


Data Understanding: Data Types and Structures, Descriptive Analysis, Exploratory Data Analysis, Summary Statistics, Distribution - Introduction to Tableau: Data Connection, Visual Analytics, and
Basic Charts - Data Granularity, Groups & Sets, Filters, and Calculations in Tableau
Forecasting, Confidence Intervals, and Reference Lines - Basic functions: Sorting, Filtering, Grouping, and Basic Calculations
Lab 1 : Understanding Data using Tableau
Lab 2: Create multiple visualizations in Tableau to explore the dataset
Lab 3: Identifying Patterns and relationships
Module-2- Intermediate Tableau for Data Storytelling 15 Hour
Advanced Visualization Techniques: Treemaps, Network Graphs, Time Series Visualizations and Geospatial Visualizations - Complex Data Handling: Calculated Fields, Table Calculations, and Level
of Detail (LOD) Expressions - Mapping Techniques: Plotting Latitude and Longitude, Crafting Data Stories: Using Dashboards, Stories, and Annotations for Effective Communication
Lab 4 : Visualizing advanced charts with tableau
Lab 5 : Create a multi-page Tableau dashboard that offers different views and summaries of the data.
Lab 6: Incorporate filters, actions, and parameters for user interaction.
Module-3 - Tableau for Specialized Domains and Advanced Techniques 15 Hour
Financial Data Visualization: Stock Charts, Market Trends, and Financial Data Analysis - Scientific Visualization: Exploring Possibilities and Limitations in Tableau - Exploring Model Performance:
Analyzing Model Outputs and Error Metrics in Tableau - Hands-on exploration: Financial Data Visualization, Scientific Visualization, and Model Performance Analysis in Tableau - Case Study
Labl 7 : Financial Data Visualization
Labl 8: Model Outputs and Error metrics

86
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Lab 9: Case study
Module-4 – Introduction to Machine Learning and Model Interpretability 15 Hour
Understanding Machine learning algorithms and applications: Supervised, Unsupervised - Exploring Algorithms: Linear regression, Decision tree, Random forest , etc - Model Interpretation:
Complexity, challenges, Significance of model transparency, Need of Model explainability - Enhancing Model Interpretability: Explainable AI (XAI), Importance, AI driven decision making.
Lab 10 : Train a relatively simple model (like a decision tree or linear regression).
Labl 11: Apply feature importance techniques to understand which variables have the most impact.
Labl 12: Enhance model interpretability using Explainable AI
Module-5 - Advanced Explainable AI Techniques 15 Hour
Exploring Advanced Model Interpretation techniques: LIME, SHAP - Partial Dependence Plots: Analyzing, impact of individual features in model prediction - Counterfactual explanations of model
interpretability - Deeper dives into XAI libraries - Case Study
Lab 13: Demonstrate the use of LIME, SHAP
Labl 14: Partial Dependence Plots
Lab 15 :Case study

Learning 1. Ossama Embarak ,”Data Analysis and Visualization Using Python: Analyze Data to 5.Ryan Sleeper,” Practical Tableau: 100 Tips, Tutorials, and Strategies from a
Resource Create Visualizations for BI Systems” Apress; First Edition 2018. Tableau Zen Master”, O'Reilly Media pulication, 2018.
2. Suresh Kumar Mukhiya, Usman Ahmed , “Hands-On Exploratory Data Analysis with 6. Tegarden, D. P, ”Business Information Visualization”, Communications of the AIS,
Python”, Packt Publishing,2020 1(4): 1-38.1999.
3. Glenn J. Myatt,” Making Sense of Data”, Wiley publication, 2007. 7. Lurie, N.H. and C.H. Mason, V\isual Representation: Implications for Decision
4. McKinney, W,” Python for Data Analysis: Data Wrangling with Pandas, NumPy and making” Journal of Marketing, 71(1): 160-177. 2007.
IPython”, 2nd edition. O’Reilly Media,2017

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination (40% weightage)
CLA-1 Average of unit test CLA-2- Practice
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - - 15% 15% -
Level 2 Understand 25% - - 25% 25% -
Level 3 Apply 30% - - 30% 30% -
Level 4 Analyze 30% - - 30% 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Gangeyan Ranganathan, Project Delivery Specialist Ii, 1.Dr Surendiran B, Associate Professor, National Institute of 1.Dr.P.Rajasekar, SRMIST
Deloitte Consulting Llp, Sacramento, California Technology, Puducherry
2. Dr K Sornalakshmi,SRMIST

87
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSC574J Course BIG DATA ANALYTICS USING ARTIFICIAL INTELLIGENCE Course C PROFESSIONAL CORE L T P C
Code Name TECHNOLOGIES Category 3 0 2 4

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR)
CLR-1 : understand the basics of Hadoop and related technologies to big data analytics and Examine the ecosystem tools in hadoop
CLR-2 : provide with comprehensive Apache Spark & Spark SQL knowledge for Big data processing
CLR-3 : provide with comprehensive in Spark MLlib and structured streaming
CLR-4 : recognize the applications with Apache airflow and Zookeeper
CLR-5 : explore the advantages of using Ontologies for enhanced data integration and knowledge representation in Big Data contexts.

Course Program Outcomes (PO)


Outcomes (CO): At the end of this course, learners will be able to: 1 2 3
CO-1: apply MapReduce, HDFS and YARN develop big data applications 2 - -
CO-2: provide with comprehensive Apache Spark & Spark SQL knowledge for Big data processing 2 - -
CO-3: identify the importance of Spark MLlib and structured streaming 2 3 -
CO-4: identify the importance of Apache Airflow and Zookeeper tool 2 3 -
CO-5: utilize Ontologies to enhance data integration, interoperability, and knowledge representation in Big Data environments. 2 3 3

Module-1 Introduction to HDFS and Hive 15 Hour


Overview of Hadoop- HDFS architecture-Hadoop MapReduce-Processing data with map reduce-YARN architecture-Anatomy of file Read and Write in Hadoop-Hadoop Shell commands - Overview of
Hadoop Ecosystem-Apache Hive-Data Types-Create, Alter and Drop Commands-Built in operators and Functions-Views-Interaction with Hadoop framework.
Lab 1 : HDFS Shell commands
Lab 2 : Job execution on Yarn
Lab 3 : HQL executions
Module -2 Apache Spark and SparkSQL 15 Hour
Introduction to Apache Spark- Architecture of Apache Spark- RDDs (Resilient Distributed Datasets): creation, transformations, and actions-Spark SQL-SQL queries in Spark
Lab 4: Creating RDD from external sources
Lab 5: Create Dataframe from CSV
Lab 6: Dataframe operations
Module – 3 Spark MLlib and Spark structured Streaming 15 Hour
Spark MLlib – pySpark – Spark Structured Streaming –Basic concepts, Programming Model, APIs using Streaming Dataframes, Creating Streaming Dataframes, Operations using Streaming dataframes
Lab 7 : Features Engineering using Spark MILib
Lab 8 : Classification and Regression model building using Spark
Lab 9 : Stream processing using Kafka
Module - 4 Zookeeper and Apache Airflow 15 Hour

88
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Introduction to Apache, Kafka-Cluster Architecture –Kafka messaging –components in messaging – creating and deleting kafkaTopic- Creating multiple brokers- Kafka producers- API for a kafka producers-
Producer implementation – Three ways to send kafka message- Kafka consumers – Consumer group- API for kafka Consumer-Consumer Implementation-Integration with Spark, Apache, Airflow- Directed
Acyclic Graph – CLI commands
Lab 10 : Znode demo
Lab 11 : Task scheduling using Airflow
Lab 12 : Orchestration demo with Airflow
Module -5 Ontology for Big Data 15 Hour
Human brain and Ontology, Ontology of information science, Ontology properties, Advantages of Ontologies, Components of Ontologies, The role Ontology plays in BigData, Ontology alignment, Goals
of Ontology in big data, Challenges with Ontology in Big Data, RDF – the universal data format, Using OWL, the Web Ontology Language, SPARQL query language, Building intelligent machines with
Ontologies, Ontology learning, Ontology learning process.
Case studies for Big data using artificial Intelligence Technologies

Learning 1. Anand Deshpande& Manish Kumar, Artificial Intelligence for Big Data,Packt 4.Raj Kamal and PreetiSaxena, Big Data Analytics: Introduction to Hadoop, Spark,
Resources Publishing, 2018. and Machine-Learning,McGraw Hill Education, 2019
2. Rinku Sharma Dixit &ShaileeLohmorChoudhary, Big Data Analytics Using Artificial 5.www.spark.apache.org
Intelligence Technologies Transforming Organizations, IK International Pvt. Ltd, 2021 6. www.splunk.com
3. Seema Acharya, Big Data and Analytics, Wiley, 2019 7. Databricks Documentation: https://docs.databricks.com/en/index.html

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination (40% weightage)
CLA-1 Average of unit test CLA-2- Practice
(45%) (15%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - - 15% 15% -
Level 2 Understand 25% - - 25% 20% -
Level 3 Apply 20% - - 20% 15% -
Level 4 Analyze 15% - - 20% 25% -
Level 5 Evaluate 15% - - 20% 25% -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.KaustuvKunal, Principal Data scientist, Great Learning 1.Dr. R. Gayathri, Professor, Sri Venkateswara College of 1.Dr.G.Maragatham , SRMIST
Engineering, Sriperumbudur.
2.Mr. S. Smilin Sam, Principal Engineer, AthenahealthPvt Ltd. 2.Dr. C. SherinShibi, SRMIST

89
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
ACADEMIC CURRICULA

Professional Elective Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

90
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21AIE532T SOFT COMPUTING AND ITS APPLICATIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department Computational Intelligence Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: get familiar with fuzzy sets, fuzzy logic, fuzzy membership and fuzzification 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand fuzzy classification and pattern recognition

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: design and implement feed forward, Back propagation neural networks and Hybrid systems

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: understand and implement genetic algorithms and its applications

Communication
Environment &
Sustainability
CLR-5: understand swarm and colony based evolutionary computing techniques

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain knowledge on Fuzzy sets to recognize the appropriateness of computational task - 1 - 1 - - - - - - - - 2 - -
CO-2: design a fuzzy based soft computing system to address the computational task - - - 3 - 2 - - - - - - 2 - -
CO-3: apply a given computational task to solve it through neuro-fuzzy based hybrid model - 3 - - - 2 - - - - - - - - -
CO-4: acquire and apply Genetic Algorithm operations for solving a computational task - 3 - - - 2 - - - - - - - - -
apply soft computing system based on swarm and colony optimization to achieve a computational
CO-5: - 2 - 2 - - - - - - - - - - -
solution

Unit-1 - Fuzzy Logic and Fuzzy System 9 Hour


Introduction to Soft Computing- Evolution from Conventional AI to Computational intelligence - Evolutionary Search Strategies.Fuzzy Sets – Fuzzy relations, value assignments, Fuzzy Membership Functions –
Fuzzification, Defuzzification.to Crisp Set, problems on fuzzification- classical logic, Fuzzy Logic-Approximate reasoning, fuzzy systems, problems on fuzzy logic –Development of Membership functions: membership
value assignments, intuition, Inference, rank ordering –Neural Network, Problems on membership value assignments.
Unit-2 - Fuzzy Decision Making and Classification 9 Hour
Fuzzy Decision Making: Fuzzy Bayesian Decision Method, Decision Making under Fuzzy States and Fuzzy Actions - Fuzzy Classification and Pattern Recognition: c-Means Clustering, Fuzzy c-Means - Boltzmann’s
Machine Learning Algorithm –problems on fuzzy classification, Pattern Recognition: Single sample Identification, Multifeature pattern recognition, problems on Multifeature pattern recognition -case study: Handwritten
character recognition using fuzzy logic.
Unit-3 - Artificial Neural Networks 9 Hour
Neural Networks in Computer Science – Basic models of artificial neural network – important terminologies of ANNs-McCulloch-Pitts Model- Back propagation network: architecture, training algorithm, learning factors,
Layered Feed Forward Neural Networks – Generative adversarial network- Kohonen’s Self Organizing Maps- Learning Vector Quantization – limitations of neural network – Neuro Fuzzy Hybrid Systems –-Case study:
Colour Recipe Prediction
Unit-4 - Evolutionary Algorithms 9 Hour
Components of evolutionary algorithms – natural versus artificial Evolution –Development of Genetic Algorithm – genetic algorithm and search space – basic terminologies in GA- chromosomes, parameters and
parameter tuning, convergence - GA operators– Genetic modelling: inheritance - inversion & deletion - Generational Cycle, working principle of GA - Applications & advances in GA, genetic neuro hybrid systems-
job shop scheduling using genetic algorithm approach

91
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-5 – Optimization Techniques 9 Hour
Simulated annealing – particle swarm optimization: basic PSO parameters - local best, global best, velocity component, working principle of PSO– Travelling salesman problem optimization using PSO - Ant colony
optimization – Multi objective evolutionary algorithms – case study: Internet search techniques.

1. Ross, T. J., “Fuzzy logic with engineering applications,” John Wiley & Sons, Second Edition, 2017 7. Samir Roy and Udit Chakraborthy, “Introduction to Soft Computing: Neuro-Fuzzy
2. Charu C. Aggarwal, “Neural Networks and Deep Learning”, Springer, 2018. and Genetic Algorithms” Pearson Education, 2013.
3. S.N.Sivanandam, S.N.Deepa, “Priciples of Soft Computing”, 2nd Edition, John-Wiley India, 2011. 8. Marco Dorigo and Thomas Stützle, “Ant Colony Optimization”, MIT press, 2004.
Learning
4. A.E.Eiben and J.E.Smith, “Introduction to Evolutionary Computing”, Second edition, Springer, 2015. 9. Maurice Clerc, “Particle Swarm Optimization”, ISTE,2006
Resources
5. References 10. https://hal-enac.archives-ouvertes.fr/hal-01887543/document
6. Saroj koushik & Sunita Tiwari “Soft Computing, Fundamentals, Techniques and Applications” 1st
Edition, McGraw Hill Publication, 2018

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 20% - 20% - 20% -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.A.Vasanthi, Senior Consultant, Slalom · Sydney, New 1. Dr. B. Rajesh Kanna, Professor, VIT 1. Mr. S. Joseph James, SRMIST
South Wales, Australia

92
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21AIE536T ARTIFICIAL INTELLIGENCE ENGINES E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department Computational Intelligence Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the fundamentals of Artificial Neural Networks and Linear Associative Networks 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: gain Knowledge on Hopfield Network, Boltzmann Machines

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gain Knowledge on Hopfield Network, Boltzmann Machines

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: illustrate the Variational Auto encoders and Deep Back propagation Networks

Communication
Environment &
Sustainability
CLR-5: learn Reinforcement Learning function

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: describe the features of Artificial Neural network and Linear Associative Networks 3 2 1 - - - - - - - - - 1 1 1
CO-2: understand the Perceptrons and Back propagation algorithms 3 2 2 - - - - - - - - - - 1 -
CO-3: apply AI techniques in Hopfield Networks and Boltzmann Machines 3 1 1 - - - - - - - - - 1 2 1
CO-4: articulate AI systems that are used in Convolutional Neural Networks and Autoencoder networks 3 1 2 - - - - - - - - - - 1 -
CO-5: understand the Reinforcement Learning function and Applications 3 2 1 - - - - - - - - - 1 1 1

Unit-1 - Introduction 9 Hour


Artificial Neural Networks- Origins of Neural Networks, From Backprop to Deep Learning, Linear Associative Networks- Setting One Connection Weight, Learning One Association, Gradient Descent, Learning Two
Associations, Learning Many Associations, Learning Photographs
Unit-2 - Perceptrons and Backpropagation 9 Hour
Perceptron Learning Algorithm- Exclusive OR Problem, Exclusive OR Matters, Backpropagation Algorithm- Sigmoidal Hidden Units, Generalisation and Overfitting, Vanishing Gradients, Speeding Up Backprop,
Local and Global Mimima, Temporal Backprop, Early Backprop Achievements
Unit-3 - Hopfield Nets and Boltzmann Machines 9 Hour
Hopfield Network- Content Addressable Memory, Tolerance to Damage, Energy Function, Boltzmann Machines- Generative Models, Energy Function, Simulated Annealing, Learning by Sculpting Distributions,
learning in Boltzmann Machines, Learning by Maximising Likelihood, Restricted Boltzmann Machines, Autoencoder and Deep Autoencoder Networks, Deep RBMs - Restricted Boltzmann Machines, Training
Restricted Boltzmann Machines, Deep Autoencoder Networks
Unit-4 - Variational Autoencoder and Deep Backprop Networks 9 Hour
Variational Autoencoders- Overview of Variational Autoencoders, Latent Variables and Manifolds, Key Quantities, VA Work, Evidence Lower Bound, Alternative Derivation, Maximising the Lower Bound, Conditional
Variational Autoencoders Applications, Convolutional Neural Networks- LeNet1, LeNet5, AlexNet, GoogLeNet and ResNet, Ladder Autoencoder Networks- Denoising Autoencoders- Fooling Neural Networks-
Generative Adversarial Networks- Temporal Deep Neural Networks- Capsule Networks, Case Studies: Backpropagation neural network for Landslide monitoring,
Unit-5 - Reinforcement Learning 9 Hour
Reinforcement Learning- Markov Decision Processes- Formalising the Problem- Bellman Equation- Learning State-Value Functions- Eligibility Traces- Learning Action-Value Functions- Balancing a Pole-
Applications, Case Studies: Adaptive Traffic Signal Control, Pommerman.
93
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Artificial Intelligence Engines: A Tutorial Introduction to the Mathematics of Deep Learning, 5. Machine learning with neural networks: Bernhard Mehlig, Cambridge University Press 2021.
James V Stone, Sebtel Press 2019. 6. https://www.elsevier.com/books/artificial-intelligence-and-data-driven-optimization-of-
Learning 2. Deep learning: Ian Goodfellow and Yoshua Bengio and Aaron Courville, MIT press 2016. internal-combustion-engines/badra/978-0-323-88457-0
Resources 3. Dive into Deep Learning: Aston Zhang, Zachary C. Lipton, Mu Li, And Alexander J. 2018. 7. https://www.deeplearningbook.org/lecture_slides.html
4. MATLAB Deep Learning-with Machine Learning, Neural Networks and Artificial Intelligence: 8. https://d2l.ai/d2l-en-mxnet.pdf
Phil Kim, Springer, Apress 2017.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Kodainathan, Data Scientist Elpis IT solutions pvt Ltd 1. Dr. A. Menaka Pushpa, Assistant Professor (SG) SCOPE, VIT, 1. Dr.AR. Arunarani,, SRMIST,
Chennai Campus

94
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21AIE538T ARTIFICIAL INTELLIGENCE FOR INDUSTRIAL APPLICATIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department Computational Intelligence Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: analyze the various characteristics of Intelligent agents 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the growth of AI Technology in Industry

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: learn the technical elements and algorithm for solving problems using Artificial Intelligence

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: apply knowledge to establish Industrial AI Technology and its assessment

Communication
Environment &
Sustainability
CLR-5: apply the concepts of AI to attain industrial automation and its application

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: use appropriate search algorithms for any AI problem - - - 3 3 - - - - 1 - 2 1 2 -
CO-2: identify appropriate AI methods and new opportunity spaces AI for industrial application - - - 2 2 - - - - 1 - 1 1 2 -
CO-3: understand the categories of Algorithm in Industrial AI - - - 2 2 - - - - 1 - 1 1 3 2
CO-4: understanding the assessment and capability to establish industrial AI - - - 2 2 - - - - 1 - 2 1 2 2
CO-5: understand the levels of automation and its application - - - 2 2 - - - - - - 2 1 2 -

Unit-1 - Introduction to Al and Production Systems 9 Hour


Introduction to Al - Problem formulation, Problem Definition - Production systems, Control strategies, Search strategies. Problem characteristics, Production system characteristics - Specialized production systems
- Problem solving methods -Problem graphs, Matching, Indexing and Heuristic functions -Hill Climbing, Depth first and Breath first, Constraints satisfaction, Knowledge Representation and Reasoning.
Unit-2 - The Development and Application of AI Technology 9 Hour
Why do we need Industrial AI – New Perspective in industrial systems for AI, Basic problem in Industry, Basic method of problem solving with AI, what kind of AI Technology is most suitable for industry, Machine
Intelligence meets industry, Difference between industry AI and AI, Challenge of AI in Industry, New opportunity spaces for industry AI to realize industrial value transformation. Definition and Meaning of Industrial
AI – The Beginning of Industrial AI, Purpose and value of Industrial AI, GE predix success and failure.
Unit-3 - Technical Elements and Algorithm of Industrial AI 9 Hour
Technical Element – Data, Analytics, Platform, Operation and Human Machine Technology, CPS, Industrial AI: Categories of Algorithm, Industrial AI Algorithm: Selection and Application. Application Scenario Types
of Industrial AI, Enabling Industrial AI system – Intelligence monitoring and maintenance platform for CNC machine, Intelligence operation, intelligence rail transit predictive maintenance system.
Unit-4 - How to Establish Industry AI Technology and Capability 9 Hour
Assessment of Basic capability Maturity during industrial intelligence transformation – Assessment Tools for global industrial AI enterprise transformation achievement – Foxconn Lighthouse factory – How to
construct organizational intelligence transformation ability in industrial enterprises – Open-source industrial big data competitions.
Unit-5 - Industrial AI applications and Case Studies 9 Hour
Applications of Industrial AI in Monitoring, optimization and control.AI applications in Industry Automation using -Natural Language Processing-Speech Recognition-Computer vision. Machine Learning Models for
Industrial Applications, AI & Digital Platforms case study. A Framework for Learning System for Complex Industrial Processes.

95
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Elaine Rich, “Artificial Intelligence”, 2nd Edition, McGraw Hill, 2005 4. Anuradha Srinivasaraghavan, Vincy Joseph “Machine Learning”, Wiley, 2019
Learning 2. AI and Learning Systems - Industrial Applications and Future Directions, Konstantinos 5. Wolfgang Ertel,” Introduction to Artificial Intelligence”, Second Edition, Springer, 2017.
Resources Kyprianidis and Erik Dahlquist, published in London, United Kingdom, 2021. 6. Rajiv Chopra, “Deep Learning”, 1st edition, Khanna Publishing House, 2018.
3. Industrial AI – Application with sustainable performance, Jay Lee, Springer Publication, 2020.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 10% - 20% -
Level 2 Understand 15% - 10% - 20% -
Level 3 Apply 30% - 35% - 20% -
Level 4 Analyze 30% - 25% - 20% -
Level 5 Evaluate 10% - 20% - 20% -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Naveen Baskaran, ADP Solution Chennai 1. Dr.P.SivaKumar, VIT Chennai 1. Dr.S.Nagendra Prabhu, SRMIST
2. Dr.Senthil, NHCE Bangalore

96
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21AIE541T MULTIMODAL MACHINE LEARNING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department Computational Intelligence Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: provide the basic understanding of multimodal data and its importance in various fields 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: various representations used in multimodal machine learning using different models

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the details about the translation and mapping algorithms of multimodal data

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: create interest to develop a project using various applications of multimodal machine learning framework

Communication
Environment &
Sustainability
CLR-5: importance of multimodal deep learning and behavior generations functions

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: outline the critical elements of multimodal data and models 3 3 3 - - - - - - - - - 1 - -
CO-2: illustrate different kinds of unimodal and multimodal representations 3 2 2 - - - - - - - - - - 2 -
CO-3: demonstrate multimodal translation and mapping 3 2 2 - - - - - - - - - 1 - -
CO-4: classify machine learning techniques and frameworks of multimodal applications in real time scenario 3 2 2 - - - - - - - - - - - -
CO-5: analyze various multimodal fusion and behavior generation for multimodal applications 3 2 2 - - - - - - - - - 1 - 2

Unit-1 - Introduction 9 Hour


Introduction – Multimodal, Basic Concepts - Linear models - Score and loss functions – regularization, Neural networks - Activation functions - multi-layer perceptron, Optimization - Stochastic gradient descent –
back propagation
Unit-2 - Unimodal and Multimodal Representations 9 Hour
Language representations - Distributional hypothesis and word embedding, Visual representations - Convolutional neural networks, Acoustic representations - Spectrograms – Auto encoders, Multimodal
representations - Joint representations - Visual semantic spaces - multimodal auto encoder, Orthogonal joint representations - Component analysis, Parallel multimodal representations - Similarity metrics, canonical
correlation analysis
Unit-3 - Multimodal Translation and Mapping 9 Hour
Language models – Unigrams – bigrams - skip-grams - skip-thought, Unimodal sequence modelling - Recurrent neural networks, LSTMs, Optimization - Back propagation through time, Multimodal translation and
mapping - Encoder-decoder models - Machine translation - Image captioning, Generative vs retrieval approaches - Viseme generation - visual puppetry, Modality alignment - Latent alignment approaches - Attention
models - multi-instance learning, Explicit alignment - Dynamic time warping
Unit-4 - Multimodal Applications 9 Hour
Multimodal fusion and co-learning - Model free approaches - Early and late fusion - hybrid models, Kernel-based fusion - Multiple kernel learning, Multimodal graphical models - Factorial HMM, Multi-view Hidden
CRF, Case studies - Automatic Face Recognition - Video Segmentation and Keyframe Extraction - Gesture Recognition - Biometric-based System
Unit-5 - Deep Learning for Multimodal 9 Hour
Deep Learning for multimodal data fusion – Basics of multimodal deep learning – Multimodal image-to-image translation networks – Multimodal encoder decoder networks, Multimodal applications - Image captioning
- Video description - AVSR, Core technical challenges - Representation learning – translation – alignment - fusion and co-learning
97
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Multimodal Scene Understanding: Algorithms, Applications and Deep Learning, 4. Unifying Visual-Semantic Embeddings with Multimodal Neural Language Models. Ryan Kiros,
Michael Ying Yang, Bodo Rosenhahn, Vittorio Murino, Academic Press, Elsevier, 2019, Ruslan Salakhutdinov, and Richard S. Zemel; TACL 2015
ISBN:978-0-12-817358-9 (Unit V) 5. Multi-View Latent Variable Discriminative Models for Action Recognition. Yale Song, Louis-Philippe
Learning 2. Representation Learning: A Review and New Perspectives. Yoshua Bengio, Aaron Morency, Randall Davis, CVPR 2012
Resources Courville, and Pascal Vincent 6. M. Gori, “Machine Learning: A Constraint-Based Approach”, 2017, Morgan Kauffman, ISBN: 978-
3. Visualizing and understanding recurrent networks. Andrej Karpathy, Justin Johnson, Li 0081006597
Fei-Fei, 2015 7. F. Camastra, A. Vinciarelli, “Machine Learning for Audio, Image and Video Analysis: Theory and
Applications”, 2nd Edition, 2016, Springer Verlag, ISBN: 978-1447168409

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sanjay Hotwani, Senior Manager – Data Science, 1. Dr. Tulasi Prasad Sariki, Associate Professor, VIT, Chennai, 1. Dr.T.Subha, SRMIST
Products &Technology, PwC US tulasiprasad.sariki@vit.ac.in

98
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE519T GEOSPATIAL DATA ANALYSIS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understanding concept of geospatial analysis.
CLR-2: acquire comprehensive exploration of common geospatial data formats.
CLR-3: develop various aspects of data access in geospatial analysis.
CLR-4: implement range of essential geospatial analysis and visualization.
CLR-5: implement advanced geospatial modeling techniques.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: demonstrate knowledge of Geospatial analysis. 2 2 -
CO-2: analyze Geospatial data using vector and raster data. 1 - 2
CO-3: explore Geospatial technologies GDAL, OGR and Desktop tools. - 1 2
CO-4: analyze Geographic Information Systems using shapefiles, visualization and Geocoding 2 - 3
CO-5: implement Geospatial modeling using NDVI and LiDAR. - 3 1

Module-1 - Introduction to Geospatial Analysis 9 Hour


History of geospatial analysis, Geographic information systems, Remote sensing, Elevation data, Geospatial analysis and computer Programming, Importance of geospatial analysis, Geographic information system
concepts, Common vector GIS concepts, Common raster data concepts, Creating the simplest possible Python GIS.
T1: Building Python program to build Thematic Maps
T2: Building programs to work with Visualization of spatial data in Python
T3: Building simple GIS using python
Module-2 - Geospatial Data 9 Hour
An overview of common data formats, Data structures, Spatial indexing- Indexing algorithms, Overviews, Metadata, File structure, Vector data: Shapefiles, CAD files,Tag-based and markup-based formats, GeoJSON,
Raster data: TIFF files, JPEG, GIF, BMP, and PNG, Compressed formats, ASCII Grids, World files, Point cloud data, Web services.
T4: Building Python program for Spatial Indexing
T5: Building Python program using Vector data
T6: Building Python program using Raster data
Module-3 - Geospatial Technology 9 Hour
Data access: GDAL- Setting Up GDAL, Working with GDAL at the Command Line, Editing Your Data with GDAL, Working with the GDAL Library in Python, Exploring Open-Source Raster Files, OGR, Computational
geometry, Desktop tools: Quantum GIS, OpenEV, GRASS GIS, uDig, gvSIG, OpenJUMP, Google Earth, NASA World Wind, ArcGIS, Metadata management - GeoNetwork, CatMDEdit.
T10: Building programs for Data Access with GDAL in Python
T11: Building programs to Exploring Open-Source Raster Files
T12: Building programs to perform vector operations using GRASS GIS Python API
Module-4 - Geographic Information Systems 9 Hour
99
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Measuring distance, calculating line direction, Coordinate conversion, Reprojection, editing shapefiles: Accessing the shapefile, Reading shapefile attributes, Reading shapefile geometry, changing a shapefile,
merging shapefiles, splitting shapefiles, Performing selections, Creating images for visualization, Choropleth maps, Using spreadsheets, Using GPS data, Geocoding.
T7: Building python programs to measuring distance, calculate line direction, coordinate conversion and reprojection
T8: Building python programs for all operations using shapefiles
T9: Building python programs to use Choropleth maps and Geocoding.
Module-5 - Geospatial Modeling 9 Hour
Creating a Normalized Difference Vegetative Index, creating a flood inundation model, Creating a color hillshade, Least cost path analysis, Routing along streets, Geolocating photos, ASCII Grid files, creating a
shaded relief, Creating elevation contours, Working with LiDAR.
T13: Building python programs to Calculate NDVI from Landsat imagery
T14: Building python programs to Simulate flood inundation
T15: Building python programs for Geolocating photos.

Learning 1. Lawhead J. Learning geospatial analysis with Python. Packt Publishing Ltd; 2015 Dec 31.
3. Diener M. Python Geospatial Analysis Cookbook. Packt Publishing Ltd; 2015 Nov 30.
Resources 2. McClain BP. Python for Geospatial Data Analysis. " O'Reilly Media, Inc."; 2022 Oct 19.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 5% - 5% - 5% -
Level 6 Create 5% - 5% - 5% -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Balaji Haridoss LGSI 1.Pao-Ann, Taiwan 1. Dr.M.Lakshmi, SRMIST
2. Dr Srabashi Basu, Senior Faculty, GreatLearning 2.Dr.V.Vijayalakshmi, SRMIST

100
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE521T ADVANCED ALGORITHMS ANALYSIS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the fundamentals of algorithms and its complexity 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: analyse algorithm design strategies

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: implement graph and network algorithms

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: design the Parallel and Distributed algorithms

Communication
Environment &
Sustainability
CLR-5: utilize the search algorithms

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: develop algorithms and analyze its complexity 3 - - - - - - - - - - - - - -
CO-2: utilize appropriate design strategies - 3 - - - - - - - - - - - - -
CO-3: implement the graph and network algorithms - - 3 - - - - - - - - - - - -
CO-4: design and analysis of paradigms for sequential and parallel models - - 3 - - - - - - - - - - - -
CO-5: implement search algorithms - - 3 - - - - - - - - - - - -

Unit-1 - Introduction to Algorithms 9 Hour


Introduction to Preliminaries - Design and Analysis Fundamentals - Mathematical Tools for Algorithm Analysis - Trees and Applications to Algorithms - More on Sorting Algorithms - Probability and Average Complexity
of Algorithms.
T 1: Implementation of Sorting Algorithms
T 2: Implementation of Greedy algorithm
T 3: Implementation of Divide and Conquer algorithm
Unit-2 - Design Strategies 9 Hour
Major Design Strategies - The Greedy Method – Divide and Conquer - Dynamic Programming - Backtracking and Branch and Bound
T 4: Implementation of Dynamic Programming algorithm
T 5: Implementation of Backtracking algorithms
T 6: Implementation of Branch and Bound algorithms
Unit-3 - Graph and Network Algorithms 9 Hour
Graph and Network Algorithms - Graphs and Digraphs - Minimum Spanning Tree and Shortest Path Algorithms - Graph Connectivity and Fault-Tolerance of Networks - Matching and Network Flow Algorithms –
Case study on water management system
T 7: Implementation of Minimum spanning Tree
T 8: Implementation of Shortest Path algorithms
T 9: Implementation of Network Flow algorithm

101
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-4 - Parallel and Distributed Algorithms 9 Hour
Parallel and Distributed Algorithms - Introduction to Parallel Algorithms and Architectures - Parallel Design Strategies - Internet Algorithms -Distributed Computation Algorithms - Distributed Network Algorithms.
T 10: Implementation of Parallel algorithms
T 11: Implementation of Internet algorithms
T 12: Implementation of Distributed Network Algorithms
Unit-5 - Search Algorithms 9 Hour
String Matching and Document Processing - Balanced Search Trees - The Fast Fourier Transform - Heuristic Search Strategies: A* - Search and Game Trees 24 - Probabilistic and Randomized Algorithms - Lower-
Bound Theory - NP-Complete Problems - Approximation Algorithms – case study on bin packing, Dock management system.
T 13: Implementation of String-Matching Algorithms
T 14: Implementation of Randomized algorithms
T 15: Case study for NP Complete Problem

1. Kenneth A. Berman, Jerome L. Paul, “Algorithms: Sequential, Parallel, and Distributed”, 4. Michael Goodrich, Roberto Tamassia, “Algorithm Design” Wiley Student Edition
Amazon Bestsellers, 2004. 5. Horowitz, Sahni, Mehta: Fundamentals of Data Structures in C++, 2nd edition, University
Learning 2. Russ Miller, Laurence Boxer, “Algorithms Sequential and Parallel: A Unified Approach”, Press, 2007
Resources Prentice Hall, 1 edition, 1999.
3. Dimitri P. Bertsekas and John N. Tsitsiklis, “Parallel and Distributed Computation: Numerical
Methods”, Prentice Hall, 1989.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Radha R, SRMIST

102
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE522T FUNCTIONAL PROGRAMMING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn the purpose of functional programming paradigm and Scala basic constructs 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: comprehend the different types of functions in scala

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: utilize traits and mixins in functional programming

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: learn the basics of lists and collections data structures

Communication
Environment &
Sustainability
CLR-5: explore the functors, monads, and monoids

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: identify and apply the appropriate construct in functional programming - - - - - - - - - - - - 2 - -
CO-2: construct programs using different types of functions - - - - - - - - - - - - - 2 -
CO-3: create programs using traits and mixins - - - - - - - - - - - - - 1 -
CO-4: construct programs using lists and different types of collections - - - - - - - - - - - - - - 1
CO-5: create programs using functors, monads, and monoids - - - - - - - - - - - - 2 - -

Unit-1 - Programming Paradigms 9 Hour


Different types of programming paradigms - Functional vs OOP-Scala Language Basics - Variables, Expressions, Functions-Recursion-Call By Name-Call By Value-Conditionals-Looping – for each and for -
Significance of vals- Classes - Types - Fields - Methods - Variable scope - Objects - Singleton object, Variables of objects
T1: Scala language basic constructs
T2: Loops and Classes in Scala
Unit-2 - Functions 9 Hour
Modules, Objects and Namespaces, Objects and Namespaces - Anonymous Functions - Polymorphic Functions, Nested Functions - Closures - Repeated Parameters - Tail Recursion - Define a tail recursive function
- Tracing tail recursive functions - Limits of tail recursive functions - Higher Order Functions Definition , Uses and Examples
T3: Scala language basic constructs
T4: Loops and Classes in Scala
Unit-3 - Interfaces 9 Hour
Traits Purpose and Syntax - Define a trait - Interface types - Interface types examples - Thick Interfaces - Thin Interfaces - Comparison of Thick vs Thin Interfaces - Ordered trait - Trait Comparisons - Traits for
modifying interfaces - Stacking modifications - Mixin Purpose & Composition, Example
T5: Mixin Development
T6: Trait Development

103
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-4 – Data Structures 9 Hour
Lists definitions and usage - Working with Lists - Constructing Lists - Basic operations on lists - head, tail, isEmpty demo - List Patterns - Lists First Order methods - Lists Higher Order methods - Sequences Overview
and operations - Tuples Overview and operations - Sets and Maps – Lists and Collections
T7: Lists and basic operations in lists
T8: Tuples and Collections
Unit-5 – Applicative Development 9 Hour
Functors Purpose and Use - Writing a simple functor - Functor Laws - Applicatives Concepts and use - Defining an applicative - Demo of Applicatives - Monads - Defining Monads - Monad Laws - Demo of Monads
and Monad Laws - Monoid Concept, Purpose, and Use - Examples of Monoid
T9: Applicatives development
T10: Traversable functors development

Learning 1. Chiusano.P,Bjarnason R,Functional Programming in Scala,Manning Publications,2015 3. Hortsmann, C., Scala for the Impatient, 2nd ed., Addison-Wesley, 2016.
Resources 2. Oderskey M, SpoonL, Venners B, Programming in Scala, Third edition. 4. Raychaudhuri R, Scala in Action, 1st ed. Manning Publications, 2013.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 20% - 40% -
Level 2 Understand 40% - 20% - 40% -
Level 3 Apply 10% - 20% - 10% -
Level 4 Analyze 10% - 20% - 10% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 10% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. K. Sornalakshmi, SRMIST

104
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE523T DATA ENGINEERING PRINCIPLES FOR ENTERPRISES E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: distinguish various examples and use cases for each type of data formats.
CLR-2: critique the benefits and limitations of ETL versus stream processing techniques.
CLR-3: measure data quality metrics to assess accuracy, completeness, and consistency.
CLR-4: construct effective storage solutions for large-scale data sets using relational databases, NoSQL databases, and distributed file systems.
CLR-5: formulate strategies for addressing complex real-world data engineering challenges through best practices in data warehousing, big data analytics, and machine learning.

Course Outcomes Programme Outcomes(PO)


At the end of this course, learners will be able to:
(CO): 1 2 3
CO-1: identify different data formats and their use cases, including structured, semi-structured, and unstructured data. 3 2 2
CO-2: discuss various data ingestion techniques, such as ETL and stream processing, highlighting their advantages and limitations. 3 2 2
CO-3: analyze data profiling results to identify and address quality issues. 3 3 2
CO-4: develop effective storage and retrieval strategies for large-scale data sets, including relational databases, NoSQL databases, and distributed file systems. 3 2 3
CO-5: implement data engineering principles to solve practical problems in data warehousing, big data analytics, and machine learning. 3 3 3

Module-1 - Data Types and Formats 9 Hour


Introduction to Data Engineering – Data Engineering Ecosystem - Overview of Data Types and Formats - Types of Data - Structured vs. Unstructured Data - Formats of Data - Semi-Structured Data - Data Type
Conversion and Transformation - Data Serialization - Choosing the Right Data Type and Format - Tools and Technologies for Data Types and Formats - The role of data engineering in the data lifecycle.
Module-2 - Data Ingestion Techniques 9 Hour
Introduction to Data Ingestion - Streaming Data Ingestion - Batch Data Ingestion - Hybrid Data Ingestion - Data Ingestion vs. Data Integration - Data Ingestion Challenges - Tools and Solutions for Data Ingestion -
Enterprise Data Platform- StreamSets DataOps Platform - Best Practices in DataOps - StreamSets Data Collector- Benefits of Data Ingestion - Data Ingestion Framework .
Module-3 - Data Profiling and Visual Representation via Various Tools (Pandas) 9 Hour
Introduction to Data Profiling and Visualization - Exploratory Data Analysis (EDA) with Pandas - Steps Involved in Exploratory Data Analysis (EDA) Data Analysis (EDA) with Pandas - Market Analysis with Exploratory
Data Analysis (EDA) - Data Analytics and Its Future Scope - Data Analytics with Python - Top Business Intelligence Tools - Application of Data Analytics - Retrieving and Cleaning Data - Exploratory Data Analysis
and Feature Engineering - Inferential Statistics and Hypothesis Testing - Descriptive Statistics - Types of Descriptive Statistics - Concepts of Populations, Samples, and Variables - Statistical Methods for Describing
Data Characteristics - Real-World Applications of Descriptive Statistics using Excel - Types of Missing Data and Handling Techniques.
Module-4 - Storage and Retrieval Methods 9 Hour
Introduction To The Data Warehouses- Storage and Retrieval Introduction - Types of Data and Storage Methods - Local vs. Distributed Storage & Retrieval - Hardware Aspects of Storage & Retrieval - Choosing
Storage Methods - Data Partitioning and Sharding - Data Replication and Redundancy - Data Compression and Encoding - Data Archiving and Retrieval - Backup and Disaster Recovery - Data Lifecycle
Management.
Module-5 - Data Lineage Analysis 9 Hour
Introduction to Data Lineage Analysis - Building a Data Flow - ETL (Extract, Transform, Load) Process - Usage of Data Warehouse - Edge Intelligence in Data Flow - Understanding Data Lineage - How Data Lineage
Works - Benefits of Data Lineage - Data Lineage Tool Features-Data Engineering in Practice- Best practices of ETL processes.

105
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Charles M.Judd, Data Analysis: A Model Comparison Approach To Regression, ANOVA,
and Beyond 3rd Edition - By Routledge (2017) 4. Fundamentals of Data Engineering by Joe Reis and Matt Housley, O'Reilly Media(2022)
Learning
2. Pierre-Yves Bonnefoy, EmericChaize, RaphaëlMansuy& Mehdi TAZI, The Definitive Guide 5. Python Data Science Handbook by Jake VanderPlas, O'Reilly Media(2016)
Resources
to Data Integration 1st Edition - By Packt Publishing (2024). 6. Data Management for Researchers by Kristin Briney, Elsevier(2015)
3. Data Engineering with Python by Paul Crickard Packt Publishing (2020)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
2. 1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras, sryedida@iitm.ac.in 1. Dr.R.Jagadeesh Kannan, SRMIST
2. Prof. K.C. Sivakumar, IIT Madras, kcskumar@iitm.ac.in 2.. Dr.S.Kanaga Suba Raja, SRMIST
3. Dr.R.Balaji Ganesh, SRMIST
4.Dr.R.Deebalakshmi, SRMIST

106
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE524T COMPUTER VISION TECHNIQUES E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
recognize and describe both the theoretical and practical aspects of computing with images.connect Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
issues from computer vision to human vision
describe the foundation of image formation and image analysis, Understand the basics of 2D and 3D

Environment & Sustainability


CLR-2:
Computer Vision

The engineer and society


Conduct investigations of

Individual & Team Work


Engineering Knowledge

Design/development of
become familiar with the major technical approaches involved in computer vision, describe various

Project Mgt. & Finance


CLR-3:

Modern Tool Usage


methods used for registration, alignment, and matching in images

Life Long Learning


complex problems
Problem Analysis
CLR-4: get an exposure to advanced concepts leading to object and scene categorization from images

Communication
CLR-5: build computer vision applications

solutions

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand computer vision including fundamentals of image formation - - - - - - - - - - - - 2 - -
CO-2: learn about image formation - - - - - - - - - - - - - - 2
CO-3: apply image processing techniques - - - - - - - - - - - - 1 - 1
CO-4: calibrate computational photography - - - - - - - - - - - - - 1 -
CO-5: learn about Image rendering - - - - - - - - - - - - - - 1

Unit-1 - Introduction to Computer Vision 9 Hour


Review of image processing techniques – classical filtering operations – thresholding techniques – edge detection techniques – corner and interest point detection.
T1: Implementation of 2D and 3D Projections
T2: Build a color constancy algorithm that uses the assumption that the spatial average of reflectance is constant. Use finite-dimensional linear models.
Unit-2 – Image Formation 9 Hour
Points and patches-An Introduction - Binary shape analysis – connectedness – object labeling and counting – size filtering – distance functions – skeletons and thinning – deformable shape analysis – boundary
tracking procedures – active contours – shape models and shape recognition - Feature detectors -Feature descriptors, Matching - Feature tracking - Edge detection - Edge linking - Successive approximation -
Hough transforms -Hough Transform (HT) for line detection – foot-of-normal method – line localization – line fitting – RANSAC for straight line detection – HT based circular object detection – accurate center location
– speed problem – ellipse detection – Case study: Human Iris location – hole detection – generalized Hough Transform (GHT) – spatial matched filtering – GHT for ellipse detection – object location – GHT for
feature collation. Vanishing points
T3: Implementation Two-dimensional Fourier transforms, Wiener filtering
T4: Write a program that produces a Gaussian pyramid from an image

107
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-3 – Image Processing Techniques 9 Hour
Active contours - Snakes -Dynamic snakes and Condensation - Scissors, Level Sets - Split and merge - Mean shift and mode finding - Normalized cuts - Graph cuts and energy-based methods - 2D and 3D feature-
based alignment - Pose estimation
T5: Obtain an implementation of Canny’s edge detector
T6: Implement a Hough transform based line finder
Unit-4 – Computational Photography 9 Hour
Triangulation - Two-frame structure from motion - Projective reconstruction - Self-calibration - Perspective and projective factorization - Bundle adjustment - Exploiting sparsity - Constrained structure and motion -
Hierarchical motion estimation - Fourier-based alignment - Incremental refinement
T7: Count lines with an HT line finder. How well does it work?
T8: Implement a mean shift segmenter.
Unit-5 – Image Rendering 9 Hour
Motion models - Planar perspective motion - Rotational panoramas - Gap closing - Cylindrical and spherical coordinates - Bundle adjustment - Parallax removal - Recognizing panoramas – Compositing
T9: Case Study
T10: Case Study

1. RichardSzeliski,"Computer Vision: Algorithms and Applications”, Springer, 2010. 4. Rafael C. GonzaLez'"Digital Image Processing”, Pearson Education; Fourth edition (2018)
Learning 2. Forsyth/Ponce,"ComputerVision: AModernApproach”, PearsonEducationIndia;2edition (2015)
Resources 3. S. Nagabhushana,"Computer Vision and Image Processing”, NewAge International Pvt Ltd;
First edition (2005)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. N. Mohanraj, Software Engineer 2, Pay Pal Inc, Chennai 1. Dr. A.P.Shanthi , CEG Campus Anna University 1. Dr.T.Veeramakali, SRMIST

108
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE526T END – END DEEP LEARNING FOR PRODUCTION E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand basics of computer vision, time series analysis and natural language processing
CLR-2: implement an application for facial recognition system
CLR-3: comprehend and implement weather forecasting system
CLR-4: acquire knowledge on various chatbot frameworks

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand the fundamentals of deep learning and its applications in computer vision, time series analysis and natural language processing. 1 3 3
CO-2: build a facial recognition system. 3 2 3
CO-3: build a weather forecasting system. 3 2 3
CO-4: earn various chatbot frameworks and implement 3 3 2

Module-1 - Building a Facial Recognition System - Part 1 9 Hour


Convolutional Neural Network (CNN): Transfer learning - Data Augmentation - Image segmentation - Object detection - Video classification - Text and natural language processing - Structured data - Model
optimization
Module-2 - Building a Facial Recognition System - Part 2 12 Hour
Facial recognition model: Writing the code - Deploying the API as container - Consuming the API from Frontend and display- Preparing the image dataset - Creating and training the Model; Build and deploy Flask REST
API on Docker: steps to dockerize your flask app; Docker: Docker Installation – Architecture – Working of Docker; Kubernetes: Overview – Architecture – Kubernetes Setup – Advanced Kubernetes; Flask: Overview –
Environment – Application
Module-3 - Building a Facial Recognition System - Part 3 9 Hour
Facial Recognition system: Create Endpoints and UI to retrain the system with new data (faces) - Feedback system for face labels - Transfer Learning - Reusing the knowledge with additional learning; Technology:
Flask, streamlit and Tensorflow - Create a multipage app - API reference - Advanced features - Components - Roadmap - Changelog - Cheat sheet - Streamlit community cloud.
Module-4 - Building a Weather Forecasting System with Chatbot - Part 1 6 Hour
Recurrent Neural Network: Architecture - Technology and libraries - Application of RNN - Limitations of RNN - Improvement LSTM - RNN in time series - Build an RNN to predict time series in TensorFlow - Text
generation with an RNN ; Chatbot : Working of chatbot - Types of Chatbot - Use cases of chatbots - Objective - End goal - constraints - How to build a chatbot - A ten - minute introduction to sequence to sequence
learning in keras - Chatbot using seq2seq LSTM models - Architecture of seq2seq model
Module-5 - Building a Weather Forecasting System with Chatbot - Part 2 9 Hour
Intelligent Chatbox: Using LSTM - Using NLP - LSTM Time series Analysis - LSTM weather - Create an Intelligent chatbot in Python using the spaCy NLP Library - Prerequisites - Setting up the environment - creating
the city weather program - Creating the chatbot, Rasa – Opensource framework.

109
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. James D. Hamilton, Time Series Analysis – By Levant Books (2012)
4. V Kishore Ayyadevara & Yeshwanth Reddy, Modern Computer Vision with PyTorch - By Packt
2. Kubernetes Up & Running: Dive into the Future of Infrastructure by Kelsey
Learning Publishing (2020)
Hightower, Brendan Burns, and Joe Beda, 2019 (2nd edition)
Resources 5. Deep Learning for Computer Vision with Python by Adrian Rosebrock(2017)
3. Natural Language Processing with Python by Steven Bird, Ewan Klein, and Edward
6. Hands-On Machine Learning for Algorithmic Trading by Stefan Jansen(2020)
Loper(2009)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. 1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras, sryedida@iitm.ac.in 1. Dr.R.Jagadeesh Kannan, SRMIST
2. Prof. K.C. Sivakumar, IIT Madras, kcskumar@iitm.ac.in 2.. Dr.S.Kanaga Suba Raja, SRMIST

110
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE527T TEXT MINING AND ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the fundamentals of text mining 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: utilize text for prediction techniques

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the relevance between information retrieval and text mining

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: understand the goals of information extraction

Communication
Environment &
Sustainability
CLR-5: analyze different case studies related to text mining

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire knowledge on fundamentals of text mining - - - - - - - - - - - - 1 - -
CO-2: perform prediction from text and evaluate it - - - - - - - - - - - - - 2 -
CO-3: perform document matching - - - - - - - - - - - - - 2 -
CO-4: identify patterns and entities from text - - - - - - - - - - - - - 2 -
CO-5: understand how text mining is implemented - - - - - - - - - - - - - - 1

Unit-1 - Overview of Text Mining 9 Hour


Overview of text mining-Special about Text Mining-Structured Data-Unstructured Data-Is text different from numbers-Types of Problem can be solved. -Document Classification-Informational Retrieval-Prediction
and Evaluation From Textual Information to Numerical Vectors-Collecting Documents-Document Standardization-Tokenization-Lemmatization-Inflectional Stemming-Stemming to a Root-Vector Generation for
Prediction-Multiword Features
T1 - String Tokenization- Stemming
T2- Root vector Generation
T3 – Multiword Features
Unit-2 - Textual Predication 9 Hour
Labels for the Right Answers-Feature selection by attribute ranking-Sentence-Boundary Determination-Part of speech Tagging-Word Sense Disambiguation-Phrase Recognition-Named Entity Recognition-Parsing-
Feature Generation-Using text for prediction-Recognizing that document Fit a pattern-Document Classification-Learning to Predict from Text-Similarity and Nearest-Neighbor Method-Document Similarity-Decision
Rules-Decision Trees-Scoring by Probabilities
T4 - Attribute Ranking using Feature Selection
T5 – Text Similarity Practice
T6- Decision Tree

111
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-3 - Information Retrieval for Text Mining 9 Hour
Linear scoring Methods-Evaluation of Performance-Estimating current and future performance-Getting the most from a Learning Method-Errors and Pitfalls in Big data Evaluation-Graph models for social Networks-
Information Retrieval and Text Mining-Keyword Search-Nearest- Neighbor Methods-Measuring Similarity-Shared Word Count-Word count and Bonus-Cosine Similarity-Web based Document Search-Link Analysis-
Document Matching-Inverted List-Evaluation of Performance
T7- Assigning Scores using Linear Scoring method,
T8 - Finding Cosine Similarity of Given Text
T9 – Web Based Document Search
Unit-4 - Finding Structure in Document Collection 9 Hour
Clustering Documents by similarity-Similarity of composite documents-K-means Clustering-Hierarchical Clustering-The EM Algorithm-Goals for Information Extraction-Finding Patterns and Entities from Test-Entity
Extraction as Sequential Tagging-Tag Prediction as Classification-The maximum Entropy method-Linguistic Features and Encoding-Local Sequence Prediction Models-Global sequence Prediction Models-Reference
and relationship Extraction-Template Filling And Database Construction-Commercial Extraction System: Application-Criminal Justice : Application-Intelligence Application
T10- Implementing K-means Clustering
T11- EM Algorithm implementation
T12 – Template Filling and Database Construction practice
Unit-5 - Case Studies 9 Hour
Ideal Model of Data-Practical Data Sourcing-Prototypical Examples-Hybrid Example-Mixed Data in Standard Table Format-Case study: Market Intelligence from the web-Case Study: Lightweight Document Matching
for Digital Libraries-Generating Model cases for Help desk Application: case study-Assigning topics to news articles: Case study-E-mail Filtering: Case study-Search Engines : case study Extracting Named Entities
from Documents-Mining Social Media-Customized Newspapers-Emerging Directions-Different ways of collecting samples-Learning to-Unlabeled data-Distributed Text Mining
T13- Case study Analysis for Search Engines
T14- Hybrid Exercise Practice
T15- social media – Data customized

1. By Sholom M. Weiss, Nitin Indurkhya, Tong Zhang.,Fundamentals of Predictive Text Mining 2010 3. Springer- ISBN:9781849962261, 184996226X
Learning
2. Text Mining Classification, Clustering, and Applications,By Ashok N. Srivastava, Mehran
Resources
Sahami,2009

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms.Sabna Sulamain,Nokia 1. Dr.M.Venkatestan, IITM 1. Dr.A.Murugan,SRMIST

112
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE531T CYBER SECURITY OPERATIONS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic security operations 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquire knowledge in assessing security operation capabilities

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: understand the SOC Infrastructure and security Events Generation

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: understand the security technology and preparation to operate

Communication
Environment &
Sustainability
CLR-5: understand the types of events and Incidents

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the knowledge of security technologies - 2 - - - - 2 - - - - - - - -
CO-2: analyze the security operation capabilities - - - - - - - - - 3 - 3 - - -
CO-3: evaluate the security Events Generation - 2 - - - - - - - - - 3 - - 3
CO-4: analyze the preparing to operate - - - - - - 2 - - 3 - - - - 3
CO-5: evaluate the Events and Incidents - 2 - - - - - - - - - 3 - - -

Unit-1 - Introduction to Security Operations and the SOC Technologies 9 Hour


Cyber security Challenges- Introduction to Information Assurance- Introduction to Risk Management- Information Security Incident Response- SOC Generations- Characteristics of an Effective SOC–Introduction to
Maturity Models - Applying Maturity Models to SOC- Phases of Building a SOC- Challenges and Obstacles-Data Collection and Analysis-Vulnerability Management-Threat Intelligence-Compliance- Ticketing and
Case Management- Collaboration- SOC Conceptual Architecture
Unit-2 - Assessing Security Operations Capabilities 9 Hour
Assessment Methodology-Organization’s Threat Landscape-SOC Sponsorship- Allocated Budget- Presenting Data Strategy Elements-SOC Model of Operation-SOC Services-SOC Capabilities Roadmap
Unit-3 - SOC Infrastructure and Security Events Generation, Collection Vulnerability Management 9 Hour
Design Considerations- Model of operation-Facilities-Active Infrastructure-Data Collection- Cloud Security- Intrusion Detection and Prevention System- Network Telemetry with Network Flow - Handling
Vulnerabilities-Automating Vulnerability Management- Threat Intelligence
Unit-4 - Technology and Preparing to Operate 9 Hour
Network- Security- Systems- Storage- Collaboration- Technologies to consider during SOC design- Breach Detection- Final SOC Architecture- Preparing to Operate-Key Challenges- Managing Challenges through
a Well Managed Transition
Unit-5 - Reacting to Events and Incidents 9 Hour
Event Intake, Enrichment, Monitoring and Handling- Closing and Reporting on the case- Review and Assessing the SOC- Maintaining and Improving SOC

1. Joseph Muniz, Gary McIntyre, Security Operations Center, Cisco press 2015 3. Russel C Hibler, Engineering Mechanics: Statics, Dynamics, Pearson,14th ed., 2015
Learning
2. John Rittinghouse PhD CISM Captain, William M. Hancock PhD CISSP CISM, Digital 4. Robert H. Deatherage, Jr., Security Operations an Introduction to planning and Conductive Private
Resources
Press, 2003 Security Details for High-Risk Areas

113
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sankaranarayanan, Security Analyst, Philips 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr. J. Godwin Ponsam, SRMIST

114
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE532T NETWORK MANAGEMENT AND PROTOCOLS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: determine the various type of Networks and the Network Management basics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: exploring the Network Management Standards

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: analyze the working of Simple Network Management Protocol and its various versions

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: exploring the working of Remote Monitoring

Communication
Environment &
Sustainability
CLR-5: analyze the Network Management Applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: produce knowledge on networks and network management - 3 - - - - - - - - - - - - -
CO-2: gain knowledge on various standards - - - - 3 - - - - - - - - - 3
CO-3: analyze the working of SNMP protocol and its various applications - - - - - - - - - - 3 - - - 3
CO-4: apply the network management tools and gather information from the network - 3 - - 3 - - - - - - - - - -
CO-5: apply the knowledge to create an efficient network - - - - 3 - - - - - 3 - - - -

Unit-1 - Network Management Overview 9 Hour


Telephone Network Management, Distributed Computing Environment ,TCP/IP Based Networks, Communication Protocols and Standards, Protocol Layer and Services, Challenges of IT Managers, Network
Management, Network and System Management, Network Management System Platform, Current status and future of Network, Management Network Management Standards, Network Management Model -
Organizational model, Information Model, Management Information Trees, Communication Model, ASN.1, Terminology, Symbols and Conventions, Functional Model
Unit-2 - SNMP and Network Management 9 Hour
Introduction to SNMP, SNMP v1 model, Organization Model, System overview, SNMP v1 Information model, Structure of Management Information, Managed Objects MIB-Object Group, System Group, Interfaces
Group, Address Translation group, IP Group, ICMP Group, TCP Group, UDP Group, SNMP v1Communication model, Functional model, SNMPv2, System Architecture, MIB, Protocol, SNMPv3, MIB, User Based
Security Model, Access Control
Unit-3 - Remote Monitoring System 9 Hour
Remote Monitoring, RMON SMI and MIB, RMON1, RMON2, System Utilities for Management, Tools, Network Statistics Measurement Systems, Traffic Load, Protocol Statistics, Data and Error Statistics, Network
Management System, Components, Requirements, System Management, Network Management Applications, Configuration Management, Inventory Management, Performance Management, Tools
Unit-4 - Fault Management 9 Hour
Fault Management -Architecture, Fault location, Fault isolation, Algorithm, Self-healing, avoiding failures, Configuration setting, Configuration discovery and Change Control, Configuration Management Applications,
Patch Management, Approaches for Performance Management, Performance Monitoring and Reporting, Performance trouble shooting, Capacity Planning, Account Management, Report Management-System and
User Reports, Policy Management, Service Level Management
Unit-5 - Network Design and Planning 9 Hour
Network Design and Planning, Network Design for Enterprise Network, Network Design Process, Data Collection, Data Generation, Traffic Generators, Cost Generators, Topology, Architecture, Graph, Link,
Algorithms, Network Design Techniques, Performance Analysis, Queuing Essentials, Loss and Delay, Reliability, Network Cost

115
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Mani Subramanian ―Network Management Principles and Practice‖, Second Edition, 3. Greg Tomsho, Ed Tittel, David Johnson, ―Guide to Network Essentials, Fifth Edition, Cengage
Learning Pearson Publication, 2012. Learning, 2010
Resources 2. Dinesh Chandra Verma―Principles of Computer Systems and Network Management, 4. Teresa C. Piliouras, Network Design Management and Technical Perspectives, Second
Springer,2009 Edition,2004

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Srinivasan Varadarajan, Manhattan Associates, Atlanta 1. Dr. I.Joe Louis Paul, Associate Professor, SSN College of 1. Dr S. Metilda Florence, SRMIST
Engineering, TamilNadu
2. Mr. Shiva Praveen, American Express, USA 2. Dr. B. Vinayaga Sundaram, Associate Professor, Madras Institute of
Technology, Chennai

116
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE533T FIREWALLS AND ACCESS CONTROLS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
understanding why port-based firewalls have become obsolete & addressing the data leakage problem, Specific
CLR-1: 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
device sprawl
CLR-2: recognizing the security and business benefits of next-generation firewalls

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: configure and troubleshoot remote connectivity through direct access and the cloud

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: learn to interpret the SELinux log events that describe to us what activities SELinux has prevented

Communication
Environment &
Sustainability
CLR-5: examining the Challenges in a Global Access Controls Strategy

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understanding accessibility tactics and examining the shortcomings of intrusion prevention - - - - - - 2 - - - - - - - -
comparing performance between next-generation and legacy firewall architectures and knowing what
CO-2: - - - - - - - - - 3 - - - - 3
features to look for in a next-generation firewall
configuring Advanced Global Protect Features, Centralizing logs, and setting up site-to-site VPNs and
CO-3: - - - - - - 2 - - - - - - - 3
Large-Scale VPNs.
understanding SELinux Decisions and Logging and Defining users that have sufficient rights to do their
CO-4: - - - - - - 2 - - 3 - - - - -
jobs, ranging from unprivileged users to fully privileged users, running almost without SELinux protection
CO-5: understanding the Security Matrix and Developing a Directory-Based Access Control Strategy - - - - - - 2 - - - - - - - -

Unit-1 - Introduction to Firewalls 9 Hour


Why Legacy Firewalls Are No Longer Effective - Data Leakage Is a Problem - Compliance Is Not Optional - Applications Are Not All Good or All Bad - Applications Are Evasive - Threats Are Coming Along for the
Ride - Whatever Happened to the Firewall? - Traditional IPS Is a Poor Match for Today’s Threats - UTM Only Makes What Is Broken Cheaper - It’s Time to Fix the Firewall
Unit-2 - Solving the Problem with Next-Generation Firewalls 9 Hour
The Next-Generation Firewall - What a Next-Generation Firewall Isn’t - Benefits of Next-Generation - Safe Enablement through Smart Policies Firewalls - Defining Your Requirements and Developing an RFP -
Deployment Flexibility Matters - Addressing Mobile and Remote Users - Ten Evaluation Criteria for Next-Generation Firewalls-Identify Applications, Not Ports - Identify Users, Not IP Addresses - Identify Content,
Not Packets – Control
Unit-3 - Securing Remote Access in Palo Alto Networks 9 Hour
Understanding log forwarding profiles and best practices - Learning about Panorama and log collectors - Forwarding logs to syslog, SMTP, and other options - Exploring log forwarding profiles - Troubleshooting
logs and log forwarding - Learning about advanced configuration features - Leveraging quarantine to isolate agents - Configuring a site-to-site VPN connection - Anti Phishing with User Credential Detection -
Practical troubleshooting and Best Practice Tools.
Unit-4 - SELinux Access Controls 9 Hour
SELinux users and roles - Jumping from one role to another - Context switching during authentication - Application-based contexts - Reading and changing file contexts - The context of a process - Dealing with
types, permissions, and constraints - Integrating with Linux netfilter - Introducing labeled networking - Example – labeled IPSec

117
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-5 - Security Controls 9 Hour
Simplifying the Security Matrix - Understanding Identification - Understanding Authentication - Understanding Authorization - Understanding Access Control - Examining Directory Services - Understanding LDAPv3
- Understanding the Meta-Directory - Revisiting Security Policy Domains- Examining the Challenges in a Global Access - Exploring a Future with Global Access Controls-Understanding Standard Data-Related
Access Rights.

1. Lawrence C. Miller - Next-Generation Firewalls for Dummies Wiley Publishing, ISBN 3. Sven Vermeulen - SELinux System Administration_ A Comprehensive Guide to Walk You Through
978-0-470-93955-0 SELinux Access Controls-Packt Publishing (2013)
Learning
2. Tom Piens - Securing Remote Access in Palo Alto Networks_ Practical techniques to 4. Dennis C Brewer - Security controls for Sarbanes-Oxley section 404 IT compliance _ authorization,
Resources
enable and protect remote users, improve your security posture, and troubleshoot next- authentication, and access-Wiley Pub (2006)
generation firewalls-Packt Publication

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. S. Sajiv, Technical Leader, CISCO 1. Dr. A. Balaji, School of Computing Science and Engineering 1. Dr. S. Prabakeran, SRMIST
(SCSE), VIT Bhopal University
2. Mr. Varun Subramanian, QA Automation Tester, Likewize

118
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE534T NETWORK PROGRAMMING AND MANAGEMENT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: explore different socket function and implement client server applications using sockets 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: analyze various application program like TELNET, DNS, DHCP

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: create Thread and Raw Socket

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: create Macros for including Objects In MIB Structure

Communication
Environment &
Sustainability
CLR-5: explore SNMPv1, v2 and v3 protocols and practical issues

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: define elementary socket functions - 3 - - - - - - - - - - - - -
CO-2: implement client –server applications using Sockets - - - - - - - - - - - 2 - - 3
CO-3: create Thread and Raw Socket - 3 - - - - - - - - - - - - 3
CO-4: implement Macros for including Objects In MIB Structure - 3 - - - - - - - - - - - - 3
CO-5: determine SNMPv1, v2 and v3 protocols and practical issues - - - - - - - - - - - 2 - - 3

Unit-1 – Sockets and Application Development 9 Hour


Introduction to Socket Programming – System Calls – Address conversion functions – POSIX Signal Handling – Server with multiple clients – Boundary conditions – Server process Crashes, Server host Crashes,
Server Crashes and reboots, Server Shutdown – I/O Multiplexing – I/O Models -TCP echo client/server with I/O Multiplexing
Unit-2 – Socket Options 9 Hour
Socket options – getsockopt and setsockopt functions – Generic socket options – IP socket options – ICMP socket options – TCP socket options – Multiplexing TCP and UDP sockets – SCTP Sockets – SCTP
Client/server – Streaming Example – Domain name system – gethostbyname, gethostbyaddr, getservbyname and getservbyport functions – Protocol Independent functions in TCP Client/Server Scenario
Unit-3 – Advanced Sockets 9 Hour
Ipv4 and Ipv6 interoperability – Threaded servers – Thread creation and termination – TCP echo server using threads – Mutex – Condition variables – Raw sockets – Raw socket creation – Raw socket output –
Raw socket input – ping program – traceroute program
Unit-4 – Simple Network Management 9 Hour
SNMP network management concepts – SNMPv1 – Management information – MIB Structure – Object syntax – Standard MIB‟s – MIB-II Groups – SNMPv1 protocol and Practical issues.
Unit-5 – SNMP V2, V3 and RMON 9 Hour
Introduction to SNMPv2 – SMI for SNMPV2 – Protocol – SNMPv3 – Architecture and applications – Security and access control model – Overview of RMON

1. W. Richard Stevens, “UNIX Network Programming Vol-I”, Third Edition, PHI Pearson 3. D... E. Comer, “Internetworking with TCP/IP Vol- III: Client-Server Programming and
Learning Education, 2003. Application BSD Sockets Version”, Second Edition, Pearson Edition, 2003.
Resources 2. William Stallings, “SNMP, SNMPv2, SNMPv3 and RMON 1 and 2”, Third Edition, Pearson 4. Behrouz A.Forouzan , ― TCP/IP protocol suite‖, 4th edition, Mc Graw Hill education private
Edition, 2009. limited,2010
119
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Srinivasan Varadarajan, Manhattan Associates, Atlanta 1. Dr. I.Joe Louis Paul, Associate Professor, SSN College of 1. Dr S. Metilda Florence, SRMIST
Engineering, TamilNadu
2. Mr. Shiva Praveen, American Express, USA 2. Dr. B. Vinayaga Sundaram, Associate Professor, Madras Institute of
Technology, Chennai

120
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE535T NETWORK INTRUSIONS AND COMPUTER FORENSICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic of forensic investigation and its procedure 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the packet capturing and Analysis

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: acquire knowledge in location awareness and Logs

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: understand the network Intrusions and Alerting

Communication
Environment &
Sustainability
CLR-5: understand the types of scanning

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the knowledge forensic investigation 2 - - - - - - - - - - - - - -
CO-2: implement packet capturing and analysis - 2 - - - - - - - - - - - - 3
CO-3: evaluate the different types of logs 2 2 - - - - - - - - - - - - 3
CO-4: analyze the intrusion detection system - 2 - - - - - - - - - - - - -
CO-5: test using scanning technique 2 - - - - - - - - - - - - - -

Unit-1 - Introduction to Network Forensics 9 Hour


Handling Evidence-Cryptographic Hashes-Incident Response-Need for Forensic practitioners. Networking basics-Host side Artifacts-Services- Connections- Tools-netstat, nbstat- ifconfig-ntop- Task Manage/
Resource Monitor-ARP.
Unit-2 - Packet Capture and Analysis 9 Hour
Capture Packets- Packet Analysis with wireshark- Network Miner-Attack Types –SYN Floods- Malformed Packets- UDP floods- Amplification Attacks- Distributed Attacks- Backscatter-Vulnerability Exploits-Insider
Threats- Evasion- Application Attacks
Unit-3 - Location Awareness 9 Hour
Time zones- Using Whois- Traceroute-Geo Location- Location based services- Wifi Positioning- Preparing for Attacks-Netflow- Logging- Syslog- Windows Event Logs- Firewall Logs- Router and Switch Logs- Log
Servers and Monitors- Antivirus- Incident Response Preparation- Security Information and Event Management
Unit-4 - Intrusion Detection System 9 Hour
Detection Styles- Signature Based-Heuristic- Host based versus Network based- Snort- Suricata and Sagan- Bro- Tripwire-OSSEC- Architecture- Alerting
Unit-5 - Correlating Attacks 9 Hour
Packet Capture Times- Log Aggregation and Management- Timelines- Network Scanning- Port Scanning- Vulnerability Scanning- Port Knocking- Tunnelling- Passive Data Gathering

1. Network Forensics, Ric Messier, Wiley, ISBN: 978‐1‐119‐32828‐5, August 2017 3. Computer Forensics: Investigating Network Intrusions and Cyber Crime, EC‐Council.
Learning
2. Network Attacks and Exploitation: A Framework, Matthew Monte, Wiley, 2015 4. Network Forensics: Tracking Hackers through Cyberspace, Sherri Davidoff and Jonathan Ham,
Resources
Prentice Hall, 2015

121
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sankaranarayanan, Security Analyst, Philips 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr. J. Godwin Ponsam, SRMIST

122
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE536T MOBILE FORENSICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the challenges of mobile forensics and the process model on mobile device forensics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquire in-depth knowledge about smartphone acquisition and acquisition methods

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gain a solid understanding of iOS devices and guides to prepare the desktop machine for forensic work

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: explore the topics of Android model, file system, and its security features

Communication
Environment &
Sustainability
CLR-5: explore the types of evidence available on iOS, Android, Windows, and BlackBerry mobile devices

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the mobile forensics process model on mobile device forensics - - 2 - - - - - - - - - - - -
CO-2: plan and prepare the knowledge about smartphone acquisition and acquisition methods - - - - - - - 2 - - - - - - -
CO-3: acquire the knowledge on handling iOS devices - - 2 - - - - - - - - - - - 3
CO-4: utilize the concepts of Android model, file system, and its security features - - 2 - - - - - - - - - - - 3
demonstrate the ability to accurately document using Android Forensics, Windows Phone Forensics and
CO-5: - - - - - - - 2 - - - - - - -
BlackBerry Forensics

Unit-1 – Introduction 9 Hour


Introduction to Mobile Forensics -Mobile forensics – Mobile forensic challenges – Mobile phone evidence extraction process – Other sources of potential evidence -Lab:1 Study of Mobile Forensics and different
tools used for forensic investigation – Practical mobile forensic approaches – Mobile operating systems overview – Mobile forensic tool levelling system- Lab 2. Implement how to Recover Deleted Files using
Forensics Tools - - Data acquisition methods – Potential evidence stored on mobile phones – Good forensic practices- Lab 3: Forensics environment setup (Install Linux VM and intro to Linux command)
Unit-2 – iOS 9 Hour
Internals of iOS Devices and Data Acquisition from iOS Devices-iPhone models-iPhone operating system – The iOS architecture – iOS security -Address Space Layout Randomization – Lab 4: Using Android SDK
Tools (AVD to create simulator, ADB to explore the data, etc.)-Data Acquisition from iOS Devices – Physical acquisition – The forensic environment setup – Downloading iPhone Data Protection Tools – Building
the IMG3FS tool – Creating and loading the forensic toolkit – Establishing communication with the device – Lab 5: Android acquisition & analysis – Data Acquisition from iOS Backups -iTunes backup – Understanding
the backup structure – Unencrypted backup – Encrypted backup – iCloud backup -Extracting iCloud backups- Lab 6: Case study on iphone
Unit-3 – iOS Forensic Tools 9 Hour
iDevices from a Forensic Point of View – The iOS architecture – The iOS filesystem – iOS platform and hardware security – Identifying stored data – iOS acquisition and forensic approaches Lab 7: iOS forensics
setup – iOS Data Analysis and Recovery – Timestamps – SQLite databases – Important database files -Property lists – Important plist files- Cookies Lab 8:- iphone acquisition & analysis – iOS Forensic Tools –
Elcomsoft iOS Forensic Toolkit – Oxygen Forensic Suite 2014 – Cellebrite UFED Physical Analyzer – Paraben iRecovery Stick – Lab 9: Case study on Oxygen Forensic Suite

123
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-4 – Android Model 9 Hour
Android Forensic Setup and Pre Data Extraction Techniques – The Android model – Android security – Android file system -Extended File System – Android Software Development Kit – Android Debug Bridge -Lab
10: How to View Last Activity of Your PC- Accessing the device using adb – Handling an Android device – Screen lock bypassing techniques – Smudge attack – Lab 11: Comparison of two Files for forensics
investigation by Compare IT software – Gaining root access – Rooting an Android device – Imaging an Android Phone – Data extraction techniques – Lab 12: Live Forensics Case Investigation using Autopsy-
Android Data Recovery Techniques
Unit-5 – BlackBerry OS 9 Hour
Analysis and Overview of Forensic Tools on Android App,Windows Phone & Blackberry – Reverse engineering Android apps – Forensic tools overview – Windows Phone OS – Lab 13: windows phone acquisition
& analysis – Windows chambers – Windows Phone file system – Extracting the data – Lab 14 : BlackBerry Investigation – BlackBerry OS – Security features -Data acquisition – Creating a BlackBerry backup –
BlackBerry analysis – BlackBerry forensic image analysis – Forensic tools for BlackBerry analysis – Lab 15: Acquiring and Analyzing a BlackBerry device

1. Satish Bommisetty, Rohit Tamma, Heather Mahalik, Practical Mobile Forensics – 3. Mobile Forensics: Advanced Investigative Strategies, Oleg Afonin, Vladimir Katalov, Packt Publishing.
Learning
2014 Packt Publishing. 4. Lee Reiber, Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and
Resources
2. Soufiane Tahiri, Mastering Mobile Forensics, Packt Publishing. Presentation, Second Edition, 2nd Edition,McGraw-Hill

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sankaranarayanan, Security Analyst, Philips 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr.M.Jeyaselvi, SRMIST
2. Dr. Raju Abraham, NIOT, Chennai 2. Mr. Joseph Raymond V, SRMIST

124
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE537T DIGITAL FORENSICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the history and purpose of digital forensics 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: acquire in-depth knowledge about workings of computer hardware and the operating systems

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gain knowledge about disruptive technology that is challenging in digital forensic

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: understand the Windows Registry as a resource of digital evidence

Communication
Environment &
Sustainability
CLR-5: explore the knowledge in rich resources of digital evidence

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: apply the digital forensics process model - - - - 2 - - - - - - - - - -
CO-2: plan and prepare the knowledge about Hardware and Software Environments - - - - - - 2 - - - - - - - -
CO-3: acquire the knowledge on digital Forensic Tools - - - - 2 - 2 - - - - - - - 3
CO-4: apply the Digital Evidence in Windows OS - - - - 2 - - - - - - - - - 3
CO-5: demonstrate the ability to accurately document using rich resources of digital evidence - - - - 2 - 2 - - - - - - - -

Unit-1 - The Role of Digital Forensics and Its Environment 9 Hour


Understanding the history and purpose of forensics -Defining digital forensics and its role-Looking at the history of digital forensics-Studying criminal investigations and cybercrime-Outlining civil investigations and
the nature of e-discovery-The role of digital forensic practitioners and the challenges they face- Special Properties of Digital Evidence-The special characteristics and technical complexities of digital evidence.
Unit-2 - Hardware and Software Environments 9 Hour
Computers and the nature of digital information – Operating systems – Filesystems that contain evidence – Locating evidence in filesystems – Explaining password security, encryption, and hidden files -Case study
: linking the evidence to the user – Recovering and Preserving Digital Evidence – Understanding the chain of custody.
Unit-3 - Physical Acquisition and Safekeeping of Digital Evidence 9 Hour
Recovering digital evidence through forensic imaging processes -Acquiring digital evidence through live recovery processes -Outlining the efficacy of existing forensic tools and the emergence of enhanced processes
and tools -The Need for Enhanced Forensic Tools -Digital forensics laboratories -Emerging problems with datasets -Case study : Illustrating the challenges of interrogating large datasets
Unit-4 - Selecting and Analysing Digital Evidence 9 Hour
Structured processes to locate and select digital evidence – Locating digital evidence – Selecting digital evidence – Case study : Illustrating the recovery of deleted evidence held in volume shadows – Windows and
Other Operating Systems as Sources of Evidence – The Windows Registry and system files and logs as resources of digital evidence – Apple and other operating system structures – Remote access and malware
threats
Unit-5 - Examining Browsers 9 Hour
E-mails, Messaging Systems, and Mobile Phones – Locating evidence from Internet browsing – Messaging systems – E-mail analysis and the processing of large e-mail databases – The growing challenge of
evidence recovery from mobile phones and handheld devices -Case study : mobile phone evidence in a bomb hoax – Validating the Evidence – The nature and problem of unsound digital evidence ,Impartiality in
selecting evidence -The structured and balanced analysis of digital evidence ,Ethical issues confronting digital forensics practitioners

125
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Practical Digital Forensics – Richard Boddington [PACKT] Publication, Open-source 3. Nelson, B, Phillips, a, Enfinger, F, Stuart, C., “Guide to Computer Forensics and Investigations,
Learning community 2nd ed., Thomson Course Technology, 2006, ISBN: 0-619-21706-5.
Resources 2. Warren G. Kruse II and Jay G. Heiser, “Computer Forensics: Incident Response 4. Vacca, J, Computer Forensics, Computer Crime Scene Investigation, 2nd Ed, Charles River
Essentials”, Addison Wesley, 2002. Media, 2005, ISBN: 1-58450-389.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sankaranarayanan, Security Analyst, Philips 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr.M.Jeyaselvi, SRMIST
2. Dr. Raju Abraham, NIOT, Chennai 2. Mr. Joseph Raymond V, SRMIST

126
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE538T SECURITY SCRIPTING AND ANALYSIS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: gain mastery in scripting application 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: practice computer network security scripting and packet analysis automation

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: apply the secure web app scripting development

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: analyze and practice exploit scripting and vulnerability analysis techniques

Communication
Environment &
Sustainability
CLR-5: analyze and expertise over the tool wireshark scripting

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: experience on scripting programming for network security - - 2 - - - - 2 - - - - - - -
CO-2: acquire knowledge on developing web servers and clients - - 2 - - - - - - - - - - - 3
CO-3: develop their own packet capturing and analyzing tools - - 2 - - - - 2 - - - - - - 3
CO-4: develop source code vulnerability detecting scripts - - 2 - - - - 2 - - - - - - -
CO-5: perform exploit analysis tools and network security analysis using packet capturing tools - - 2 - - - - - - - - - - - -

Unit-1 – Scripting Techniques 9 Hour


Introduction to Interpreted Language, Coding standards and data types, Mutable and immutable datatypes comparison in memory level, Variables, operators and Expressions, Program Structure and Control
statements, Loops - different types of for, while, Functions and lambda expression, Examples for different types functions, Classes, Objects and Other OOPS Concepts, Scope of variables-class level, instance level
and local, Inheritance and Overloading-types and examples, Exception handling, Introduction to IO streams and programming in file concepts, Directory Access and file traversing, Creation of Threads and its need,
Multithreading and Concurrency using locks and synchronization, Inter Process Communication (IPC, Permissions and Controls.
Unit-2 – Computer Network Security Scripting Techniques 9 Hour
Raw Socket programming, Packet injection using raw socket programming, Socket Libraries and its functionalities, Programming server clients using TCP, Asynchronous socket channels, Programming Servers
and Clients using UDP, Multithreaded server-TCP and UDP, Example programs applying multithreaded server concepts, Scapy Introduction, Packet crafting using scapy, Programming Wired Sniffers-scapy, Packet
injection –scapy wired, Programming Wireless Sniffers-scapy, Wireless sniffers examples, Programming arbitrary packet Injectors- wireless, Packet injection examples, Read and write to pcap file –scapy, Attack
automation using scapy
Unit-3 – Web App Security Scripting 9 Hour
Web Servers, Client side scripting, HTML basics, CGI scripts, Web Application Fuzzers, Types of fuzzing techniques, Types of fuzzing techniques, Scraping Web Applications- introduction, Remote file access -
Urlopen, urlretrive, Beautiful soup-urllib, HTML parsing, XML file analysis, Examples for XML file analysis, Web Browser Emulation- introduction, Mechanize- examples, Application Proxy, Own proxy creation,
Attacking Web Services, Examples for attacking web services.

127
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-4 – Computer Network Exploit Scripting and Vulnerability Analysis 9 Hour
Exploit Development techniques-introduction, Types of exploit development techniques, Immunity Debuggers and Libs, Attaching and detaching process, Writing plugins for Immunity debugger, Malware sample
analysis, Advanced exploitation techniques, Writing payloads for exploitation, Buffer overflow attack, Example with immunity debugger, Pyhook introduction, Examples for pyhook key loggers, Source code
vulnerability –introduction, Source code vulnerability analysis, Static source code vulnerability detection –scripting, Example scripts for static detection, dynamic source code vulnerability detection-scripting, Example
methods for dynamic detection.
Unit-5 – Computer Network Packet Analysis Scripting 9 Hour
Wireshark- introduction, Capturing methodologies, Capture filters, Display filters, Searching for packets using the Find dialog, Create new Wireshark profiles, Usage of Graphs, IO,TCP,Flow Graphs, Inspection of
Application Layer protocols, DNS,FTP, HTTP, SMTP, Colourcoding, Creation of colouringrules, Analyzing Transport Layer Protocol, TCP-UDP, Analyzing packets for security tasks, Security analysis methodology,
Scans and sweeps, ARP ICMP TCP UDP

1. Mike Dawson, More Python programming for Absolute Beginner, CengageLearning 3. Mastering Wireshark, PACKT Publishing, By Charit Mishra, March 2016
Learning PTR; 3rd edition, ISBN-10: 1435455002, ISBN-13: 978-14354550092, 2010. 4. James H.Baxter, Wireshark essentials, 2014
Resources 2. The Web Application Hacker’s Handbook, 2nd Edition, Wiley Publication, 5. TJ. O’Connor, Violent Python A Cookbook for Hackers, Forensic Analysts, Penetration Testers,
DafyddStuttard, Marcus Pinto and Security Engineers (2013), Elsevier

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Sankaranarayanan, Security Analyst, Philips 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr.P.Savaridassan, SRMIST
2. Dr. Raju Abraham, NIOT, Chennai

128
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE539T PRINCIPLES OF SECURE CODING PRINCIPLES E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: discover the need for secure coding and proactive development process 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: demonstrate secure coding practices

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: implement automated tools to analyze and test the code for vulnerabilities

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: analyze input issues related to database and web

Communication
Environment &
Sustainability
CLR-5: incorporate fundamental principles of software security engineering

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: acquire the knowledge on secured software development and life cycle process - - 2 - - - - - - - - - - - -
CO-2: design secure software by incorporating security principles and mitigation strategies - - 2 - 2 - - - - - - - - - -
CO-3: analyze vulnerable code in implemented software and describe attack consequences - - 2 - 2 - - - - - - - - - 3
CO-4: apply mitigation and implementation practices to construct attack resistant web applications - - 2 - 2 - - - - - - - - - 3
CO-5: apply secure design principles for developing attack resistant software applications - - 2 - - - - - - - - - - - 3

Unit-1 - Secure Development Techniques 9 Hour


Introduction to secure coding principles, Need for secure systems - ideas for instilling Security culture and deploying Information Security culture frameworks, Attackers advantage and defenders dilemma, Proactive
security, Design phase considerations, Development and test phase considerations, Security principles to live by – SD3, Security principles, Secure design through threat modeling, Security Techniques, Threat
Modeling Tools, Security Into DevOps Processes.
Unit-2 - Secure Coding In C 9 Hour
Character strings- Common string manipulation errors – String Vulnerabilities and exploits –Mitigation strategies for strings, Obsolete functions, and secure functions by standards – Pointers, C Dynamic Memory
Management, Common errors in memory management, Instruction pointer modification, Targets for instruction pointer modification, Referencing Freed Memory, Mitigation strategies in pointer-based vulnerabilities
– Buffer Overflow based vulnerabilities.
Unit-3 - Secure Coding in C++ and Java 9 Hour
Dynamic memory management- Common errors in dynamic memory management- Memory managers, Double–free vulnerabilities, Integer Security-Mitigation strategies, Tools to check code for common
programming errors - Static code checkers, Runtime code checkers.
Unit-4 - Database and Web Specific Input Issues 9 Hour
Quoting the Input – Use of stored procedures- SQL injection – Anatomy of the vulnerability, Building SQL statements securely-XSS related attacks and remedies, Web Server and Database Attacks and
Countermeasures.
Unit-5 - Software Security Engineering 9 Hour
Requirements engineering for secure software: Misuse and abuse cases-SQUARE process model- Software security practices and knowledge for architecture and design.

129
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Michael Howard, David LeBlanc, “Writing Secure Code”, Microsoft Press, 2nd Edition, 2003. 4. David A. Wheeler, “Secure Programming for Linux and Unix HOWTO”
Learning 2. Robert C. Seacord, “Secure Coding in C and C++”, Pearson Education, 2nd edition, 2013. 5. Bryan Sullivan, Vincent Liu, “Web Application Security – A Beginner’s Guide”
Resources 3. Julia H. Allen, Sean J. Barnum, Robert J. Ellison, Gary McGraw, Nancy R. Mead, “Software 6. Ron Ben Natan, “Implementing Database Security and Auditing: A guide for DBAs,
Security Engineering: A guide for Project Managers”, Addison-Wesley Professional, 2008. Information security administrators and auditors”, Published by Elsevier Inc., 2005

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Praveen Kumar, Team Lead, Cognizant Technology Solutions. 1. Mr.Karthikeyan.C.M.T,Govt College of Engg,Bargur 1. Dr. Savaridassan.P, SRM IST
2. Dr. Raju Abraham, NIOT, Chennai 2. Mr. Joseph Raymond V, SRM IST

130
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE540T ANDROID SECURITY AND DESIGN INTERNALS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the Android Security Model 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: develop the android security design and architecture

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: identify various Android attacks and hacking methods

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: understand the User Space Software and Return Oriented Programming

Communication
Environment &
Sustainability
CLR-5: demonstrate Network Security and PKI, Enterprise Security and Device Security

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the Android Security Model 2 2 - 2 - - - - - - - - - - -
CO-2: develop the android security design and architecture 2 2 - - - - - - - - - - - - -
CO-3: explore Android attacks and hacking methods - 2 - 2 - - - - - - - - - - 3
CO-4: understand the User Space Software and Return Oriented Programming - 2 - 2 - - - - - - - - - - 3
CO-5: demonstrate Network Security and PKI, Enterprise Security and Device Security 2 - - 2 - - - - - - - - - - -

Unit-1 - Android’s Security Model 9 Hour


Android’s Security Model – Android Architecture, Android’s Security Model. Permissions – The Nature of Permission, Requesting Permission, Permission Management, Permission Protection Levels, Permission
Assignment, Permission Enforcement, System Permission, Shared user ID, Custom Permission, Public and Private components, Activity and Service Permission, Broadcast Permission, Content Provider Permission.
Package Management – Android Application package format, Code signing, APK Install Process, Package verification. User Management – Multiuser support overview, Type of users, user management, user
metadata, Per User Application Management, External Storage, Other Multiuser features
Unit-2 - Android Security Design and Architecture 9 Hour
Android Security Design and Architecture - Understanding Android System Architecture, Understanding Security Boundaries and Enforcement, Complex Security, Complex Exploits. Rooting Your Device -
Understanding the Partition Layout, Understanding the Boot Process, Locked and Unlocked Boot Loaders, Rooting with an Unlocked Boot Loader, Rooting with a Locked Boot Loader, History of Known Attacks.
Reviewing Application Security - Common Issues, Case Study: Mobile Security App, Case Study: SIP Client.
Unit-3 - Android Attacks and Hacking 9 Hour
Understanding Android’s Attack Surface - An Attack Terminology Primer, Classifying Attack Surfaces, Remote Attack Surfaces, Physical Adjacency, Local Attack Surfaces, Physical Attack Surfaces, and Third-Party
Modifications. Finding Vulnerabilities with Fuzz Testing -Fuzzing Background, Fuzzing on Android, Fuzzing Broadcast Receivers, Fuzzing Chrome for Android, Fuzzing the USB Attack Surface. Debugging and
Analyzing Vulnerabilities – Choosing a Tool Chain, Debugging with Crash Dumps, Remote Debugging, Debugging Dalvik Code, Debugging Native Code, Debugging Mixed Code, Alternative Debugging Techniques,
Vulnerability Analysis.
Unit-4 - User Space Software 9 Hour
Exploiting User Space Software - Memory Corruption Basics, A History of Public Exploits, Exploiting the Android Browser. Return Oriented Programming - History and Motivation, Basics of ROP on ARM, Case
Study: Android 4.0.1 Linker. Hacking and Attacking the Kernel - Android’s Linux Kernel, Extracting Kernels, Running Custom Kernel Code, Debugging the Kernel, Exploiting the Kernel.

131
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-5 - Network Security and PKI 9 Hour
Cryptographic Providers - JCA Provider Architecture, JCA Engine Classes, Android JCA Providers, Using a Custom Provider. Network Security and PKI - PKI and SSL Overview, JSSE Introduction, Android JSSE
Implementation. Credential Storage - VPN and Wi-Fi EAP Credentials, Credential Storage Implementation, Public APIs. Online Account Management - Android Account Management Overview, Account Management
Implementation, Google Accounts Support. Enterprise Security – Device Administration, VPN Support, Wi-Fi EAP. Device Security - Controlling OS Boot-Up and Installation, Verified Boot, Disk Encryption, Screen
Security, Secure USB Debugging, Android Backup.

1. Android Security Internals – An In-depth Guide To Android’s Security Architecture, 4. Android Security: Attacks and Defenses, Anmol Misra, Abhishek Dubey, CRC Press, ISBN
by Nikolay Elenkov, No Starch Press 9780367380182
Learning 2. Android™ Hacker’s Handbook, Joshua J. Drake, Pau Oliva Fora, Zach Lanier, Collin 5. Android Security Cookbook, Keith Makan , Scott Alexander-Bown, December 2013, ISBN:
Resources Mulline, Stephen A. Ridley, Georg Wicherski, Welly, ISBN: 978-1-118-60864-7 9781782167167
3. Android Security (and Not) Internals, Yury Zhauniarovich, June 2014 6. Android Application Security Essentials, Pragati Ogal Rai, Packt Publishing (21 August 2013), ISBN:
978-1849515603

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. N. Arun, Senior Software Engineer, Quick Heal 1. Dr. Vigneshwaran P, SRMIST

132
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course PROBABILISTIC GRAPHICAL MODELS: PRINCIPLES AND Course L T P C
21CSE541T E PROFESSIONAL ELECTIVE
Code Name TECHNIQUES Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline the ideas of probabilistic model used in probability theory, statistics, and machine learning 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate directed and undirected graphical models

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gain knowledge on Inference in exact, approximate inferences with algorithms

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: relate inference in MAP and temporal inference algorithms

Communication
Environment &
Sustainability
CLR-5: learn about different learning algorithms

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: understand the fundamentals of probability theory 1 - - - - - - - - - - - 1 - -
CO-2: learn the directed and undirected graphical models with example algorithms 2 - - - - - - - - - - - - - 2
CO-3: understand the Inference in exact, approximate Inference with algorithms - - - 2 - - - - - - - - - - 2
CO-4: analyze the Inference in MAP and Temporal Inference with algorithms - - - 2 - - - - - - - - - - 2
CO-5: design different learning algorithms in graphical models - - - 3 - - - - - - - - - - 3

Unit-1 - Fundamentals 9 Hour


Fundamentals of Probability Theory - Views of Probability, Random Variables and Joint Distributions, Conditional Probability, Conditional Independence, Expectation and Variance, Probability Distributions - Conjugate
Priors, Introduction to Exponential Family; Fundamentals of Graph Theory - Paths, Cliques, Subgraphs, Cycles and Loops.
Unit-2 - Graphical Models 9 Hour
Introduction - Directed Models -Bayesian Network, Undirected Models -Markov Random Fields, Dynamic Models -Hidden Markov Model & Kalman Filters and Factor Graph; Conditional Independence -Bayes Ball
Theorem and D-separation, Markov Blanket, Factorization-Hammersley-Clifford Theorem, Equivalence: I-Maps & Perfect Maps; Factor Graphs - Representation, Relation to Bayesian Network and Markov Random
Field.
Unit-3 - Inference in Graphical Models 9 Hour
Exact Inference - Variable Elimination, Elimination Orderings, Relation to Dynamic Programming, Dealing with Evidence, Forward-Backward Algorithm, Viterbi Algorithm; Clique Tree Algorithm; Belief Propagation
(Sum Product); Approximate Inference - Variation Methods-Kikuchi & Bethe Approximation, Expectation Propagation, Gaussian Belief Propagation;
Unit-4 - Inference in MAP and Temporal 9 Hour
Max-Product, Graph Cuts, Linear Programming Relaxations to MAP: Tree-Reweighted Belief Propagation, MPLP; Sampling - Markov Chain Monte Carlo, Metropolis Hastings, Gibbs - Collapsing & Blocking, Case
study: Particle filtering applications.
Unit-5 - Learning in Graphical Models 9 Hour
Parameter Estimation - Expectation Maximization, Maximum Likelihood Estimation, Maximum Entropy, Pseudo likelihood, Bayesian Estimation, Conditional Likelihood, Structured Prediction; Learning with
Approximate Inference; Learning with Latent Variables; Structure Learning, Case Study-Structure Search.

133
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Koller, D. and Friedman, N. (2009). Probabilistic Graphical Models: Principles and Techniques. 4. Barber, D. (2011). Bayesian Reasoning and Machine Learning. Cambridge University
MIT Press. Press, 1st edition.
Learning 2. Jensen, F. V. and Nielsen, T. D. (2002). Bayesian Networks and Decision Graphs. Information 5. Wainwright, M. and Jordan, M. (2008). Graphical Models, Exponential Families, and
Resources Science and Statistics. Springer, 2nd edition. Variational Inference. Foundations and Trends in Machine Learning, 1:1–305.
3. Kevin P. Murphy (2013) Machine Learning: A Probabilistic Perspective. 4th Printing. MIT Press. 6. David Bellot (2016) Learning Probabilistic Graphical Models in R
7. Kiran R Karkera, (2014) Building Probabilistic Graphical Models with Python

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 40% - 40% -
Level 2 Understand 40% - 40% - 30% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze - - - - 10% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mrs.Savitha Boomiperumal, Technical Lead, 1. Dr.Anusha K, Associate Professor, 1. Dr.Sumathy G, SRMIST
Accenture Technology Solutions, Portugal, Europe School of Computing, VIT Chennai.

134
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE542T DEEP GENERATIVE MODELS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basics of generative models and deep learning architectures 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: understand the significance of autoregressive and flow-based models

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: apply latent variable models for non-linear variables and to improve the performance

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: understand various basic generative adversarial networks for different applications

Communication
Environment &
Sustainability
CLR-5: explore deep GAN models for various multimedia applications

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: gain the knowledge on basic units of generative models and their types - 1 - - - - - - - - - - - - -
CO-2: implement autoregressive models and flow-based models with continuous and discrete random variables - 2 - 3 - - - - - - - - - - -
CO-3: learn the latent variable models and variational encoders - 3 - 3 - - - - - - - - - - 2
CO-4: develop the hybrid model and energy-based models for different applications - 3 - 3 - - - - - - - - - - 2
CO-5: apply various case studies that adapt deep GAN models - 2 - 3 - - - - 3 - - - - - 3

Unit-1 - Generative Modeling 9 Hour


Introduction - Generative Versus Discriminative Modeling - Advances in Machine Learning - The Rise of Generative Modeling - The Generative Modeling Framework – Probabilistic Generative Models - The
Challenges of Generative Modeling - Representation Learning -Setting Up Your Environment – Deep Learning – Structural and unstructural data – Deep Neural Network – Example – Improving model.
Unit-2 - Deep Generative Modelling 9 Hour
Types – Autoregressive models - Autoregressive Models Parameterized by Neural Networks - Deep Generative Autoregressive Model: an example Flow based models - Flows for Continuous Random Variables -
Change of Variables for Deep Generative Modeling - Building Blocks of RealNVP – example - Flows for Discrete Random Variables - Flows in R or Maybe Rather in Z - Integer Discrete Flows. Case study using
Deep generative modeling
Unit-3 - Latent Variable Models 9 Hour
probabilistic principal component analysis - Variational Auto-Encoders: Variational Inference for Non-linear Latent Variable Models - Improving Variational Auto-Encoders - Hierarchical Latent Variable Models.
Unit-4 - Hybrid Modeling and GAN 9 Hour
Naïve approach – shared parameterization approach – example – Energy based models – model formation – training – example – restricted Boltzmann machines Generative adversarial networks – GAN architecture
– GAN challenges – Wassertein GAN – WGAN – GP. Case study using Hybrid approach with GAN
Unit-5 - Future of Generative Modelling 9 Hour
the transformer – advances in image generation – applications of generative modelling
Case studies – BERT – GPT-2- MuseNet – ProGAN – SAGAN – BigGAN – StyleGAN – AI Art – AI Music

135
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. David Foster, Generative Deep Learning, Teaching Machines to Paint, Write, Compose, and 4. Roozbeh Razavi-Far, Ariel Ruiz-Garcia, Vasile Palade, Juergen Schmidhuber,
Play, O'Reilly Media, Inc., 2019, ISBN: 9781492041948 Generative Adversarial Learning: Architectures and Applications, (2022), Springer Cham
Learning 2. Jakub M. Tomczak, Deep Generative Modeling, Springer nature, Edition 1, 2022, ISBN - 978- 5. Jakub M. Tomczak, Deep Generative Modeling, Springer, 2022, 978-3-030-93158-2
Resources 3-030-93157-5
3. Kailash Ahirwar, Generative Adversarial Networks Projects, build next-generation generative
models using TensorFlow and Keras, pakt publisher, 2019. ISBN: 978-1789136678

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 30% - 30% -
Level 2 Understand 30% - 30% - 30% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 10% - 10% - 10% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100% 100% 100%

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mrs.Kavita Ganeshan Artificial Intelligence Principal - AI Products and 1. Dr. S. Chandrakala, Professor, 1. Dr. A. Robert Singh, SRMIST
Solutions, Accenture, Mumbai, India School of Computing, Sastra Deemed to be University, Thanjavur

136
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course BRAIN MACHINE INTERFACE: SCIENCE, TECHNOLOGY AND Course L T P C
21CSE543T E PROFESSIONAL ELECTIVE
Code Name APPLICATION Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: understand the basic concepts of brain computer/machine interface 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: study the various signal acquisition methods of Brain Machine/Computer Interface

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: interpret signal processing methods used in Brain Machine/Computer Interface

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: understand the various machine learning methods of Brain Machine/Computer Interface

Communication
Environment &
Sustainability
CLR-5: learn the various applications of Brain Machine/Computer Interface

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: summarize the Brain Machine /Computer Interface 2 1 - 2 - - - - - - - - 1 - -
CO-2: assess concept of BCI 2 1 - 2 - - - - - - - - - 1 -
CO-3: assign functions appropriately to the human and to the machine 3 1 - 2 - - - - - - - - 1 - -
CO-4: choose appropriate feature extraction methods 2 1 - 3 - - - - - - - - - 1 -
CO-5: apply machine learning algorithms for translation 3 2 - 3 - - - - - - - - - - 3

Unit-1 - Introduction to BCI 9 Hour


Introduction - Brain structure and function, Brain Computer Interface Types - Synchronous and Asynchronous -Invasive BCI -Partially Invasive BCI - Non Invasive BCI, Structure of BCI System- BCI Monitoring
Hardware, EEG, ECoG, MEG, fMRI-10-20 electrode positions.
Unit-2 - Brain Activation 9 Hour
Brain activation patterns - Spikes, Oscillatory potential and ERD, Slow cortical potentials, Movement related potentials-Mu rhythms, motor imagery, Stimulus related potentials - Visual Evoked Potentials – P300 and
Auditory Evoked Potentials, Potentials related to cognitive tasks.
Unit-3 - Feature Extraction Methods 9 Hour
Data Processing – Spike sorting, Frequency domain analysis, Wavelet analysis, Time domain analysis, Spatial filtering -Principal Component Analysis (PCA), Independent Component Analysis (ICA), Artefacts
reduction, Feature Extraction - Phase synchronization and coherence. Case study : Application of Feature extraction methods
Unit-4 - Machine Learning Methods for BCI 9 Hour
Classification techniques –Binary classification, Ensemble classification, Multiclass Classification, Evaluation of classification performance, Regression - Linear, Polynomial, RBF’s, Perceptron’s, Multilayer neural
networks, Support vector machine, Graph theoretical functional connectivity analysis. Case study: Machine learning methods in BCI applications.
Unit-5 - Applications of BCI 9 Hour
Invasive BCIs: decoding and tracking arm (hand) position, controlling prosthetic devices such as orthotic hands, Cursor and robotic control using multi electrode array implant, Cortical control of muscles via functional
electrical stimulation. Non-invasive BCIs: P300 Mind Speller, Visual cognitive BCI, Emotion detection. Ethics of Brain Computer Interfacing.

137
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Rajesh.P.N.Rao, “Brain-Computer Interfacing: An Introduction”, Cambridge University Press, First 5. Ali Bashashati, MehrdadFatourechi, Rabab K Ward, Gary E Birch,” A survey of signal
edition, 2019. Processing algorithms in brain–computer interfaces based on electrical brain signals”
2. Jonathan Wolpaw, Elizabeth Winter Wolpaw, “Brain Computer Interfaces: Principles and practice”, Journal of Neural Engineering, Vol.4, 2007, PP.32-57.
Learning Oxford University Press, USA, Edition 1, January 2012. 6. Arnon Kohen, “Biomedical Signal Processing”, Vol I and II, CRC Press Inc, Boca
Resources 3. Ella Hassianien, A &Azar.A.T (Editors), “Brain-Computer Interfaces Current Trends and Rato, Florida.Bishop C.M., “Neural networks for Pattern Recognition”, Oxford,
Applications”, Springer, 2015. Clarendon Press, 1995.
4. Bernhard Graimann, Brendan Allison, GertPfurtscheller, "Brain-Computer Interfaces: 7. Andrew Webb, “Statistical Pattern Recognition”, Wiley International, Second Edition,
Revolutionizing Human-Computer Interaction", Springer, 2010 2002.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - 20% - 20% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 30% - 40% - 40% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.M.Prakash Team Lead(Associate Consultant) , 1. Dr.V Haribaabu Associate Faculty in Entrepreneurship Development 1. Dr.M.Uma, SRMIST
Virtusa ,Chennai Institute of India Gandhi Nagar, Gujarat.

138
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE548T SPATIAL AND TEMPORAL COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: outline the ideas of traditional relational data and spatial data 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: illustrate the basics of spatial databases

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: gain knowledge on spatial data models

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: gain knowledge on Spatio-Temporal computing Techniques

Communication
Environment &
Sustainability
CLR-5: learn about different Application programming Interfaces

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
CO-1: illustrate the concepts of traditional relational data and spatial data - 2 - - - - - - - - - - - - -
CO-2: learn the spatial databases - 2 2 - - - - - - - - - - 1 -
CO-3: understand the spatial data models - 2 - - - - - - - - - - - 1 -
CO-4: analyze Spatio-Temporal computing Techniques - - 2 - 2 - - - - - - - - 2 -
CO-5: analyze various Application programming Interfaces - 2 - - 2 - - - - - - - - - 2

Unit-1 - Introduction to Spatio Temporal Data 9 Hour


Representation of Spatio temporal data, Visualization of Spatio-Temporal Data – Spatial plots – Time series plots - Hovmoller plot – Interactive plots, Visualizing large spatial temporal datasets –Visualizing
Uncertainity- Exploratory Analysis of Spatio-Temporal Data - Empirical Spatial Means and Covariances - Spatio-Temporal Covariograms and Semivariograms - Empirical Orthogonal Functions (EOFs) - Spatio-
Temporal Canonical Correlation Analysis
Unit-2 - Introduction to Spatial Databases 9 Hour
Requirements, Principles, and Concepts for Spatial Database Management Systems (SDBMS) – Spatial Databases and Geographic Information Systems SDBMS and GIS Applications. Spatial networks: conceptual,
logical and physical level design issues, Spatial networks Query: shortest path from a start-point to a destination, shortest route to deliver packages to a set of homes, Query processing in spatial network databases.
Unit-3 - Models for Spatial Data: Geographic Space Modelling 9 Hour
Representation Models – Geometry of Collection of Objects – Vector Data – Raster Data. Modelling Spatial Data. Spatial Access Methods (SAM): Issues in SAM Design – Space Driven Structures versus Data
Driven Structures – The Grid File – Quadtree and Variants – R-Tree and Variants – k-d-B Tree. Case study- SAM Cost Models
Unit-4 - Spatio-Temporal Computing 9 Hour
Techniques of spatial and temporal analysis, point patterns, spatio - temporal database applications. Geostatistics, spectral analysis, wavelet analysis, interpolation, and mapping. Spatial information services: virtual
globes, location-based services, Case study-Enterprise consulting service.
Unit-5 - Application Programming Interfaces 9 Hour
HTML5 Geolocation API, Google Maps API, Bing Maps API, Maps SDK, Flickr location API, Twitter location API, OSHDB: a framework for spatio-temporal analysis of OpenStreetMap history data.

139
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Christopher K. Wikle, Andrew Zammit-Mangion, Noel Cressie, Spatio Temporal 3. Narayan Panigrahi, Computing in Geographic Information Systems, CRC press, 2014.
Statistics with R, CRC Press, 2019. 4. Shashi Shekhar and Sanjay Chawla “Spatial Databases: A Tour “Pearson.
Learning
1. Philippe Rigaux, Michel Scholl, Agnes Voisard, “Spatial Databases with Applications to 5. Evangelos Petroutsos, Google Maps: Power Tools for maximizing the API, McGraw-Hill, 2014.
Resources
GIS”, Morgan Kaufman, 2002. 6. Noel Cressie, Christopher K. Wikle, Statistics for Spatio-Temporal data, Wiley, 2015.
2. Shashi Shekhar, Pamela Vold, Spatial Computing, The MIT Press, 2020.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 40% - 40% -
Level 2 Understand 40% - 40% - 30% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze - - - - 10% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mrs.Savitha Boomiperumal, Technical Lead, Accenture 1. Dr.Anusha K, Associate Professor, School of Computing, VIT 1. Dr.Sumathy G, SRMIST
Technology Solutions, Portugal, Europe Chennai.

140
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE549T DECISION MAKING UNDER UNCERTAINTY C PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Program Outcomes (PO) Program
Specific
CLR-1: learn and identify the opportunities for creating value using these models 1 2 3 4 5 6 7 8 9 10 11 12 Outcomes
CLR-2: develop models that can be used to improve decision making under uncertainty within an organization

Individual & Team Work


Engineering Knowledge

Design/development of

Project Mgt. & Finance


Conduct investigations
of complex problems
CLR-3: sharpen their ability to structure problems and to perform logical analyses

Modern Tool Usage

Life Long Learning


The engineer and
Problem Analysis
CLR-4: know how to assess the significance of model outputs for managerial insights and action

Communication
Environment &
Sustainability
CLR-5: develop the skills to identify, define, scope, model, and analyze complex decision problems

solutions

society

PSO-1

PSO-2

PSO-3
Ethics
Course Outcomes (CO): At the end of this course, learners will be able to:
gain a broad fundamental understanding of the mathematical models and solution methods for decision
CO-1: - 3 1 - - - - - - - - - 1 - -
making
CO-2: implement and extend key algorithms for learning and decision making - 3 2 - - - - - - - - - - - 2
CO-3: identify an application of the theory and formulate it mathematically - 3 - 2 - - - - - - - - - - 2
CO-4: gain a deep understanding of an area of particular interest and apply it to a problem - 3 - 2 - - - - - - - - - - 3
CO-5: make inferences about a management problem based on the solution of a model - 3 - 2 - - - - - - - - - - 2

Unit-1 - Probabilistic Reasoning 9 Hour


Introduction-Degrees of Belief and Probability-Probability Distributions-Bayesian Networks-Inference in Bayesian Networks- Inference in naïve Bayes Models-Direct Sampling-Gibbs Sampling-Inference in Gaussian
Models-Bayesian Parameter Learning-Nonparametric Learning-Learning with Missing Data-Bayesian Network Scoring-Directed Graph Search-Markov Equivalence Classes-Partially Directed Graph Search-Simple
Decisions-Constraints on Rational Preferences-Utility Functions-Utility Elicitation-Maximum Expected Utility Principle-Decision Networks.
Unit-2 - Sequential Problems 9 Hour
Markov Decision Processes-Policy Evaluation-Value Function Policies-Policy Iteration-Value Iteration-Asynchronous Value Iteration-Linear Program Formulation-Linear Systems with Quadratic Reward-Parametric
Representations-Nearest Neighbor-Kernel Smoothing-Linear Interpolation-Simplex Interpolation-Linear Regression-Neural Network regression-Forward Search-Branch and Bound-Sparse Sampling-Monte Carlo
Tree Search-Heuristic Search-Labeled Heuristic Search-Open-Loop Planning-Local Search-Genetic Algorithms-Cross Entropy Method-Evolution Strategies.
Unit-3 - Model Uncertainty 9 Hour
Bandit Problems-Bayesian Model Estimation-Undirected Exploration Strategies-Directed Exploration Strategies –Optimal Exploration Strategies-Maximum Likelihood Models-Bayesian Methods-Bayes-Adaptive
Markov decision Processes-Incremental Estimation of the Mean- Q-Learning- Sarsa-Eligibility Trace-Action Value Function Approximation-Behavioural Cloning-Data Set Aggregation-Stochastic Mixing Iterative
Learning-Maximum Margin Inverse Reinforcement Learning-Maximum Entropy Inverse Reinforcement Learning.
Unit-4 - State Uncertainty 9 Hour
Belief Initialization-Discrete State Filter-Kalman Filter-Extended Kalman Filter-Unscented Kalman Filter-Belief-State Markov Decision Processes-Conditional Plans-Alpha Vectors-Pruning-Value Iteration-Linear
Policies-Fully Observable Value Approximation-Fast Informed Bound-Fast Lower Bounds-Point-Based Value Iteration-Randomized Point-Based Value Iteration-Sawtooth Heuristic Search-Triangulated Value
Functions-Online Belief State Planning- Forward Search-Branch and Bound-Sparse Sampling-Monte Carlo Tree Search-Determinized Sparse Tree Search
141
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Unit-5 - Multiagent Systems 9 Hour
Multiagent Reasoning-Simple Games-response Models-Dominant Strategy Equilibrium-Nash Equilibrium-Correlated Equilibrium-Hierarchical Softmax-Sequential Problems- Markov Games-Response Models- Nash
Equilibrium-Fictious Play-Gradient Ascent-Nash Q-Learning-State Uncertainty-Partially Observable Markov Games-Policy Evaluation-Nash Equilibrium-Dynamic Programming-Decentralized Partially Observable
Markov Decision Processes-Subclasses-Dynamic Programming-Iterative Best Response-Heuristic Search-Nonlinear Programming.

1. Mykel J. Kochenderfer, Tim A. Wheeler, Kyle H. Wray Algorithms for Decision Making, 4. Richard S. Sutton and Andrew G. Barto, Reinforcement Learning: An Introduction, 2nd Ed. MIT
MIT Press, 2022 Press, 2018. Dimitri P. Bertsekas, Dynamic Programming and Optimal Control, Athena
Learning
2. https://github.com/JuliaAcademy/Decision-Making-Under-Uncertainty Scientific, 2012 (4th Ed.).
Resources
3. Laura Graesser, Wah Loon Keng, Foundations of Deep Reinforcement Learning: Theory 5. D.V.Lindley, Making Decisions, 2nd Edition, John wiley & Sons.
and Practice in Python. Pearson Education, 2020.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 40% - 40% - 40% -
Level 2 Understand 40% - 40% - 40% -
Level 3 Apply 20% - 20% - 20% -
Level 4 Analyze - - - - - -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.S Sai Manjunath Software engineer – I Cisco Systems 1. Dr. P Vetrivelan Professor, VIT-Chennai 1. Dr. Kanipriya M, SRMIST

142
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE554T COMPUTER NETWORKING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: introduce fundamentals of network architecture
CLR-2: understand the medium used for data transmission and controlling the data traffic
CLR-3: understand the difference of wired and wireless networks over data traffic and its error control
CLR-4: familiarize the wireless network evolutions and cellular concepts
CLR-5: elaborate the wireless data connectivity through various technologies

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: exhibit understanding of network architecture principles. 2 - -
CO-2: analyze and categorize the characteristics of data transmission and traffic control. 3 - 2
CO-3: apply knowledge of wired and wireless networks to manage data traffic effectively. 2 - 1
CO-4: demonstrate an understanding of cellular wireless network concepts. 3 - 3
CO-5: implement data connectivity using various advanced wireless technologies. 2 - 3

Module -1 Computer Networks and Protocol Architecture 9 Hour


Computer Networks: Data Communication and networking, Communication Model, Types of Networks: Internet, Intranet and Extranet, TCP / IP Protocol Architecture: TCP/IP Layers, TCP and UDP, IP and IPV6,
Addressing: Logical Addressing, TCP/IP Applications, OSI Model and its Primitive Services, OSI Framework Standardization
Module - 2 Transmission Media and Network Traffic Control 9 Hour
Guided and Un Guided Media, Digital Transmission, Analog Transmission, Bandwidth Utilization: Multiplexing and Spreading, Transmission Media, Switching and its types: Circuit Switched and Virtual Circuit,
Datagram Networks, Congestion Control, Flow Control, Error Control and Traffic Management, Quality of Service in IP Networks, Process-to-Process Delivery and Routing
Module - 3 Networks Traffic and Error Control Over Wireless 9 Hour
Internet Protocols: IPv4 and IPv6, Internet Protocol Version 6 (IPv6): Transition from IPv4 to IPv6, IPv6 Header Format, Features of IPv6, Differences between IPv6 and IPv4, Multiple Divisions Models: FDMA,
TDMA, CDMA, OFDM, SDMA, Error Handling Mechanism: ARQ Schemes, Unicasting and Multicasting, TCP over Wireless, Differences Between Wireless and Fixed Telephone Networks.
Module - 4 Wireless Data and Associated Characteristics 9 Hour
Wireless Networks Evolutions from 1G to 4G beyond, Traffic Routing in Wireless Networks and Wireless Data Services, Characteristics of Cellular Systems, Fundamentals of Cellular Systems,
Cellular System Structure, Network Protocols: Ad Hoc Networks and Sensor Networks, Wireless LANs, MANs, and PANs,
Module-5 Wireless Data Connectivity 9 Hour
Wireless LANs: IEEE 802.11 and its enhancement, Hyper LAN, Wireless MANs: IEEE 802.16 based WiMAX and LTE Mesh Networks, and Wireless PANs: IEEE 802.15.1, IEEE 802.15.3 MAC and PHY Layer,
IEEE 802.15.4, ZigBee.

143
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Forouzan, Behrouz A, Data communications and networking. 2013. 4. William Stallings, Data and Computer Communications, 10th Edition, 2013.
Learning 2. William Stallings, Computer Networking with Internet Protocols and Technology, 2003. 5. Theodore S. Rappaport, Wireless Communications Principles and Practice. 2nd Edition.
Resources 3.DharmaPrakash, Agrawal and Qing-An Zeng, Introduction to Wireless and Mobile Systems and 3rd 6.Data Communications and Networking with TCP/IP Protocol Suite, 6TH Edition, 2022.
Edition, 2011.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100% 100% 100%

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Er. B. Saranya, EPAM Systems India Private Limited, 1. Prof. E. Ilavarasan, Puducherry Technological University. 1. Dr. M. Baskar, SRMIST
Hyderabad.
2. Prof. M. Manoj Kumar, Vel Tech Rangarajan Dr. Sagunthala R & 2. Dr. J. Ramkumar, SRMIST
D Institute of Science and Technology, Chennai.

144
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE555T INTERNET OF THINGS IN EDGE COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: describe IoT architecture and how it is interpreted
CLR-2: discuss Edge Computing Orchestration and it’s storage management
CLR-3: explore the End-To-End Security Services and interfacing capacity
CLR-4: execute IoT and Edge Computing applications in relevant tools
CLR-5: understand IoT and Edge Computing in real world Scenario

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: construct suitable architecture for IoT applications 1
CO-2: apply resource management in Edge Storage application 1 1
CO-3: create a Secured Edge Application with suitable interface 1 2
CO-4: implement Edge Computing and IoT applications using tools 2
CO-5: create use cases based on the sample applications 3

Module-1 - Introduction to Edge Computing 9 Hour


Introduction: Edge computing purpose and definition, Edge vs Fog Computing, IoT Architecture and Core IoT Modules-A connected ecosystem, Event Detection, Discretization (Sampling and Quantization),
Frequency Domain Tools: FFT
T1: IoT Weather Station using Raspberry Pi and Sensors
T2: Smart Home Automation
Module-2 - Edge Computing Architecture 9 Hour
Edge Computing Architecture, Virtualisation, Resource Management and Edge Orchestration, Edge Computing Node Lifecycle, Multi-Layer Edge System – Introduction to docker container and Kubernetes in edge
computing. Design of edge storage systems like key-value stores
T3: Fog Computing with Docker Swarm
T4: Edge Orchestration with Kubernetes and KubeEdge
Module-3 Edge Computing Security 9 Hour
End-To-End Security Module: End-To-End Security Services, System Security Management, Interfaces: Communication Security Interfaces, Security Service Interfaces, Security Management Interfaces, Node
Management Module Interface, Application Service Module Interface
T5: Edge Storage Management with Kubernetes and Persistent Volumes
T6: Edge Storage Management with Distributed File Systems
Module-4 - Edge to Cloud Protocols 9 Hour
Edge to Cloud Protocols, MQTT, Edge computing with Raspberry Pi, ATMEGA 328P (Arduino), Nvidia Jetson, ASUS Tinker Board.
145
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
T7: Edge Computing with Raspberry Pi and TensorFlow Lite
T8: Edge Computing for IoT Sensor Data Analysis using Apache Kafka and Spark
Module-5 - Industrial Edge and IoT Application 9 Hour
Industrial and Commercial IoT and Edge Use Cases: Smart Charging Pile, IoT Pole Site, Ubiquitous Electric Power IoT, Ubiquitous Electric Power IoT, Example Applications
T9: Edge Computing with Raspberry Pi and ATmega328P for Sensor Data Processing
T10: Edge Computing with Raspberry Pi and ATmega328P for Smart Agriculture

1. Yunlong Cui, Edge Computing-IoT, Addison-Wesley, Third Edition, May 2007 4. Robert Lafore, Edge Computing for IoT, SAMS Publishing, Fourth Edition,2008
Learning 2. Lawrence Miller, Edge Computing, Oxford University Press, First Edition,2015 5. Robert Barton, Patrick Grossetete, David Hanes, Jerome Henry, Gonzalo Salgueiro, “IOT
Resources 3. Ezhilmathi Krishnasamy, Edge Computing: An Overview of Framework and Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of
Applications,Oxford University Press, Second Edition,2017 Things”, CISCO Press, First Edition,2017

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 15% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Srikanth Satyanarayanan,Principal Chief Engineer 1. Dr. J. Umarani , IIITDM Kancheepuram 1. Dr.K.Arthii, SRMIST
Uno Minda
2. Dr.K.Sornalakshmi, SRMIST

146
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE556T GENERATIVE ADVERSARIAL NETWORK AND ITS APPLICATIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: gain foundational knowledge of GANs and advanced generative methods.
CLR-2: develop practical skills for constructing robust GANs with PyTorch.
CLR-3: evaluate GAN performance using various metrics for informed decision-making.
CLR-4: discover real-world applications and potential of GAN technology.
CLR-5: develop practical problem-solving abilities by implementing and debugging GAN models.

Course Outcomes Programme Outcomes (PO)


At the end of this course, learners will be able to:
(CO): 1 2 3
CO-1: understand generative models such as generative adversarial networks (GANs) and their advanced techniques. 3 2 3
CO-2: build sophisticated and robust GAN models using PyTorch & convolutional layers etc., 2 2 3
CO-3: learn about the advantages and disadvantages of different GAN performance measures. 3 2 3
CO-4: explore and examine the applications of GANs 3 2 2

Module-1 - Build Basic Generative Adversarial Networks (GANs) 15 Hour


Overview of GenAI - Intro to GANs - Learn about GANs and their applications, understand the intuition behind the basic components of GANs -build your very own GAN using PyTorch - Deep Convolutional GAN -
Build a more sophisticated GAN using convolutional layers - Learn about useful activation functions - batch normalization - and transposed convolutions to tune your GAN architecture and apply them to build an
advanced DCGAN specifically for processing images - Wasserstein GANs with Normalization - Reduce instances of GANs failure due to imbalances between the generator and discriminator by learning advanced
techniques such as WGANs to mitigate unstable training and mode collapse with a W-Loss and an understanding of Lipschitz Continuity - Conditional and Controllable GANs - Understand how to effectively control
your GAN - modify the features in a generated image - and build conditional GANs capable of generating examples from determined categories.
Module-2 - Build Better Generative Adversarial Networks (GANs) 15 Hour
GAN Evaluation - Understand the challenges of evaluating GANs - learn about the advantages and disadvantages of different GAN performance measures - and implement the Fréchet Inception Distance FID method
using embeddings to assess the accuracy of GANs -GAN Disadvantages and Bias - Find out the disadvantages of GANs when compared to other generative models - discover the pros/cons of these models — plus -
learn about the many places where bias in machine learning can come from - why it’s important - and an approach to identify it in GANs - StyleGAN and Advancements - Understand how StyleGAN improves upon
previous models and implements the components and the techniques associated with StyleGAN - currently the most state-of-the-art GAN with powerful capabilities.
Module-3 - Apply Generative Adversarial Networks (GANs) 15 Hour
GANs for Data Augmentation and Privacy Preservation - Explore the applications of GANs and examine them wrt data augmentation, privacy, and anonymity-Improve your downstream AI models with GAN-
generated data - Image-to-Image Translation - Leverage the image-to-image translation framework and identify extensions – generalizations - applications of this framework to modalities beyond images -Implement
Pix2Pix - a paired image-to-image translation GAN - to adapt satellite images to map routes with advanced U-Net generator -Patch GAN discriminator architectures - Image-to-Image Unpaired Translation - Compare
paired image-to-image translation to unpaired image-to-image translation and identify how their key difference necessitates different GAN architectures - Implement CycleGAN- an unpaired image-to-image translation
model, to adapt horses to zebras with two GANs in one.
147
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Jakub Langr & Vladimir Bok, GANs in Action: Deep learning with Generative 4. Hands-On Generative Adversarial Networks with PyTorch 1.x by John Hany and Arisha Ghous,
Adversarial Networks - By Manning; 1st edition (2019) Packt Publishing
Learning 2. John Hany, Hands-On Generative Adversarial Networks with PyTorch 1.x - By 5. GANs in Action: Deep learning with Generative Adversarial Networks by Jakub Langr and
Resources Packt Publishing, (2019) Vladimir Bok, Manning Publications(2019)
3. Generative Deep Learning: Teaching Machines to Paint, Write, Compose, and 6. Deep Convolutional Generative Adversarial Networks with Python by Jason Brownlee, Machine
Play by David Foster, O'Reilly Media(2019) Learning Mastery(2020)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan, SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja, SRMIST
3. Dr.R.Balaji Ganesh, SRMIST
4.Dr.R.Deebalakshmi, SRMIST

148
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE557T STREAMING DATA ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: introduce the fundamentals of stream processing frameworks
CLR-2: explore the components of Apache Spark Streaming and its API
CLR-3: familiarize the concept of stream processing in Apache Kafka
CLR-4: introduce the streaming cloud processing frameworks and Flink
CLR-5: process real time sensor data

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: comprehend the fundamentals of stream processing frameworks 1
CO-2: develop applications using Apache Spark Streaming and its API 1 2
CO-3: apply Apache Kafka Streams on real time data 2
CO-4: appreciate the usage of cloud stream processing frameworks 2
CO-5: connect, collect and analyze sensor data 3

Module-1 - Introduction to Stream Computing Terminologies 4 Hour


Introduction to Stream Processing, Directed Acyclic Graphs, Sources, Sinks, Tuples, Transformations and Aggregations, Windowing Operations, Types of Windows, Stateful and Stateless Stream Processing,
Lambda and Kappa Architecture
Module-2 - Apache Spark Streaming 12 Hour
Spark Streaming – RDDs, DStreams, Transformations, Actions, Spark Structured Streaming, API Data sets and DataFrames, Join Operations -Stream Stream, Stream Static Joins , Checkpointing and Watermarking
T1 Spark Streaming Transformations and Actions
T2 Network Word Count
T3 Spark Structured Streaming Network Word Count
Module-3 Kafka Streams 12 Hour
Kafka – Producers, Consumers, Topics, Partitions, Consumer Groups, Exchange of messages between producers and Consumers, Consumer Group Rules, Kafka Streams Architecture, Streams DSL, Developing
Hello World for Kafka Streams, KTable API, Windowing and Timestamps
T4 Kafka Producer Consumer Message Exchange
T5 Kafka Streams Hello World
T6 Kafka KTable Example
Module-4 - Apache Flink and Stream Processing in Cloud 12 Hour
System Architecture, Data Transfer, Timestamps and Watermarks, DataStream API, Transformations, Time Based and Window Operators, Introduction to Amazon Kinesis Data Streams, Google Cloud Dataflow,
Azure Stream Analytics
T7 Flink Data Stream API
149
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
T8 Flink Transformations
T9 – Flink Windowing
Module-5 - Real-time stream processing on IoT data 5 Hour
Publishing sensor data from Arduino/Raspberry Pi to Kafka or any other Streaming Platform, Analysis on Streaming Data and Dashboard Visualization
T10 – Streaming Dashboard Visualization

6. Gerard Maas and Francois Garillot, Stream Processing with Apache Spark, O’Reilly, First
1. https://spark.apache.org/docs/latest/structured-streaming-programming-guide.html
Edition, 2019
2. Zubair Nabi , ProSpark Streaming, Springer, First Edition, 2016
7. Neha Narkhede, Gwen Shapira & Todd Palino, Kafka The definitive guide, O’Reilly , First
Learning 3. https://aws.amazon.com/kinesis/data-streams/getting-started/
Edition, 2017
Resources 4. https://cloud.google.com/dataflow/docs/overview
8. William P. Bejeck Jr., Kafka Streams in Action, Manning, Second Edition, 2024
5. https://azure.microsoft.com/en-in/products/stream-analytics
9. Fabian Heueske and Valliski Kalavari, Event-driven applications and microservices Stream
Processing with Apache Flink, O’Reilly, First Edition 2019

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 15% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Hariseharan, Advisor, Pratya AI Labs 1. Dr. J. Umarani , IIITDM Kancheepuram 1. Dr.K.Sornalakshmi, SRMIST
2. Dr.D.Hemavathi, SRMIST

150
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE558T DEEP NEURAL NETWORK ARCHITECTURES E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the fundamental concepts and basic tools of deep neural networks
CLR-2: recognize and appreciate the functionalities of various layers in deep neural networks
CLR-3: explorer the application of deep neural networks in image processing
CLR-4: comprehend convolutional neural networks and its layer wise functionality
CLR-5: getting familiar with transfer learning techniques

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: create a simple deep neural network and explain its functions 3 - 1
CO-2: building neural networks with multiple layers with appropriate activations 1 2 -
CO-3: application of deep neural networks in Image processing problems - 2 1
CO-4: implementation of convolutional neural networks 2 - 1
CO-5: determine the application of appropriate transfer learning techniques 1 3 -

Module-1 - Introduction to Deep Learning 9 Hour


Fundamentals Of Deep Learning Architecture, Motivation: Biological Neurons, Perceptron Model-AND-OR Models, Multilayer Perceptron -X-OR Problem, Basics of Tensor Flow-Data Structures In Tensorflow, Need
and Use Of Activation Functions-Types Of Activation Functions, Layers In Neural Networks, Mathematical Model Of Feedforward Neural Network, Back Propagation In Neural Networks, Loss Functions And It's
Types
T1: Getting Familiar with Tensor Flow Environment
T2: Working With Tensors
T3: Building Programs to Perform Basic Operations in Tensors
Module-2 - Optimization And Regularization in Deep Neural Networks 9 Hour
Optimization Algorithms-Gradient Descent Algorithm, Stochastic Gradient Descent, Mini Batch Gradient Descent, Batch Gradient Descent, Unit Saturation- Vanishing And Exploding Gradient, Underfitting, Overfitting.
Hyper Parameter Tuning, Learning Rate, Regularization Techniques In Neural Networks-LASSO Regression, Ridge Regression, Dropouts, Early Stopping, Normalization In Neural Networks -Batch Normalization,
Group Normalization, Instance Normalization.
T4: Building basic neural network in Python
T5: Building neural network using Keras
T6: Building programs to optimize the neural network using gradient descent
Module-3 - Image Processing And Deep Neural Networks 9 Hour
Fundamentals Of Image Processing- Image Enhancement, Noise Removal Techniques, Edge Detection Techniques, Image Segmentation, ROI Segmentation, Morphological Processing, Feature Extraction from
Images-Shape, Colour and Texture, Unstructured Image Structural Data, Image Classification from Extracted Features, Various Applications of Computer Vision
T7: Building Programs on Image Processing Using Open CV
151
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
T8: Building Programs to Perform Image Segmentation Using Open CV
T9: Building Programs to Extract Features from Image Using Open CV
Module-4 - Convolutional Neural Network and Transfer Learnings 9 Hour
Biological Motivation for Convolutional Neural Networks, 1D, 2D And 3D CNN, Layered Architecture Of CNN- Convolution Operation, Pooling Layer, Types of Pooling, Fully Connected Layer, Regularization In
CNN, Applications in Computer Vision, Stride Convolutions, Introduction To Transfer Learning, Image Net, Pre Trained Network Architectures-Alexnet, VGG, Resnet, Mobilenet, Fine Tuning Transfer Learning.
T10: Building Programs to Perform Classification Using CNN In Keras
T11: Building Programs to Perform Multiclass Classification with Data Augmentation
T12: Building Programme to Develop A LSTM Model
Module-5 - Object Localization and Detection Models 9 Hour
Object localization and object detection models, Single shot approaches (YOLO/ SSD), Two stage approaches (RCNN family), RCNN, Fast RCNN, Faster RCNN, IOU, MAP, non-maximal Suppression.
T13: Building programs to implement prediction using pre-trained model
T14: Building programs to implement transfer learning with fine tuning
T15: Building programs to implement object detection using RCNN

4. Brownlee J. Deep learning with Python: develop deep learning models on Theano and
1. Chollet F. Deep learning with Python. Simon and Schuster; 2021 Dec 7. TensorFlow using Keras. Machine Learning Mastery; 2016 May 13.
Learning 2. Ian Goodfellow, YoshuaBengio, Aaron Courville, “Deep Learning”, MIT Press, 2017 5. Weidman S. Deep learning from scratch: Building with python from first principles. O'Reilly
Resources (available at http://www.deeplearningbook.org) Media; 2019 Sep 9.
3. Kevin P. Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012 6. Gulli A, Kapoor A. TensorFlow 1. x Deep Learning Cookbook: Over 90 unique recipes to
solve artificial-intelligence driven problems with Python. Packt Publishing Ltd; 2017 Dec 12.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 5% - 5% - 5% -
Level 6 Create 5% - 5% - 5% -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Sagarika, Senior Data Scientist, Great Learning 1. Dr.S Muthurajkumar, Asst. Professor, Department of Computer 1. Dr. G. Vadivu, SRMIST
Technology, muthuraj@annauniv.edu, Anna University, Chennai
2. Dr Srabashi Basu, Senior Faculty, GreatLearning 2. Dr. S. Sharanya, SRMIST

152
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE559T CLOUD COMPUTING FOR DATA ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: provide an understanding about the enabling technologies for big data computing, cloud computing infrastructure and machine intelligence.
CLR-2: gain knowledge on cloud computing models, virtual machines, docker containers, cloud architectures and resources management
CLR-3: equip students with a comprehensive understanding of cloud computing services, mobile clouds and inter-cloud mashup services.
CLR-4: equip students with the knowledge and skills required to leverage cloud storage, databases, and advanced analytics tools effectively.
CLR-5: impart to students the information and abilities needed to successfully use managed machine learning systems, cloud-based ETL procedures, and serverless computing.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
demonstrate proficiency in the enabling technologies for big data computing, including distributed storage systems, distributed processing frameworks, and data
CO-1: - 2 1
analytics
CO-2: develop the ability to evaluate different cloud computing models, virtual machines, docker containers and cloud architectures 2 - -
CO-3: describe the principles and applications of IaaS, PaaS, SaaS Clouds and mobile clouds. - 1 2
CO-4: demonstrate a strong understanding of cloud storage concepts, including different cloud storage services and their functionalities. 1 2 -
develop AWS Lambda functions using AWS Cloud9, understanding the fundamentals of serverless computing and Function as a Service (FaaS) paradigm.
CO-5: 2 - 3
Additionally, utilize core functionalities of popular managed machine learning systems

Module-1 - Smart Clouds, Virtualization and Basic Cloud Services 9 Hour


Cloud Computing Models and Services: Cloud Taxonomy based on Services Provided, Layered Development Cloud Service Platforms, Virtualization of Machine Resources, Hypervisor. Primary Cloud Services in
Compute, Storage and Networking - Amazon EC2, S3
Module-2 - Data Analytics and Enabling Technologies & Cloud Services 9 Hour
Data analytics concepts, terminology and definitions, Databases – RDBMS. ETL (Extract Transform Load) Methodologies, AWS Athena - serverless SQL, AWS Glue - Glue Catalog, Glue ETL jobs, Pipelines,
Amazon RDS.
Module-3 - Big Data Technologies and Corresponding Services 9 Hour
Hadoop overview and architecture, Hadoop Distributed File System (HDFS), Hive. Spark - architecture and components, core Spark, Spark SQL. Amazon EMR with Hive and Spark. Data Lake concept and
processes, AWS Lake Formation.
Module-4 - Streaming Analytics 9 Hour
Streaming Analytics concepts and case studies. Overview of Amazon Data Firehose. Spark Structured Streaming with simple streaming sources, Kafka platform for streaming data
Module-5 - Visualization and Machine Learning at scale 9 Hour
Visualization using Amazon QuickSight/ D3.js, Overview of Spark MLlib and Overview of AWS Sagemaker

153
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Kai Hwan, Min Chen, Big-Data Analytics for Cloud, IoT and Cognitive Learning, 4. Lizhe Wang, Rajiv Ranjan, Jinjun Chen, Boualem Benatallah, Cloud Computing -
JohnWiley & Sons Ltd, First Edition, 2017. (Unit 1, 2 & 3) Methodlogy, Systems, and Aplications, CRC Press (Taylor & Francis Group), 2012.
2. Noah Gift, Cloud Computing for Data Analysis, Leanpub (Lean Publishing), 2021. 5. Pethuru Raj, Ganesh Chandra Deka, Handbook of Research on Cloud Infrastructures for
Learning
(Unit 4 & 5) Big Data Analytics, Information Science Reference, 2014.
Resources
3. Souvik PAl, Dac-Nhuong Le, Prasant Kumar Pattnaik, Cloud Computing Solutions 6. AWS Documentation: https://docs.aws.amazon.com/
- Architecture, Data Storage, Implementation, and Security, John Wiley & Sons, 7. Databricks Documentation: https://docs.databricks.com/en/index.html
First Edition, 2022. 8. Joe Minichino, Data Analytics in the AWS Cloud, Sybex Inc, 2023.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 5% - 5% - 5% -
Level 6 Create 5% - 5% - 5% -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ravi Annadanam, Software Consultant & Trainer, Great Learning. 1. Dr. J. Umarani , IIITDM Kancheepuram 1. Dr. M. Prakash, SRMIST
2. Dr Srabashi Basu, Senior Faculty, GreatLearning 2. Dr. K. Arthi, SRMIST

154
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE560T GENERATIVE AI WITH LARGE LANGUAGE MODELS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: introduce the fundamental concepts of Generative AI and pre-trained LLMs
CLR-2: explore the different techniques for fine tuning LLMs
CLR-3: understand the working of Reinforcement learning and LLMs applications

Course Outcomes Programme Outcomes (PO)


At the end of this course, learners will be able to:
(CO): 1 2 3
CO-1: outline the basics of Generative AI with LLMs and Prompt Engineering 1 2 3
CO-2: analyze the various techniques for fine tuning Large Language Models 2 2 3
CO-3: explain the techniques of Reinforcement learning and LLMs 3 2 3
CO-4: explain the Project lifecycle of Generative AI and its applications 3 2 3

Module-1 - Introduction to Generative AI 15 Hour


Introduction Generative AI & LLMs - LLM use cases and tasks - Text generation before transformers - Transformers architecture - Generating text with transformers - Prompting and prompt engineering (CoT) – RAG
Technique for retrieval - Generative configuration - Generative AI project lifecycle - Pre-training large language models - Computational challenges of training LLMs.
Case Study: 1. Present you POV on the evolution of Large Language Models. Articulate their growth, architecture changes and application landscape.
2. Present your POV on the different fine-tuning methodologies. Articulate the differences, the advantages, and disadvantages of each approach.
Module-2 - Fine Tuning and Evaluation 15 Hour
Instruction fine-tuning - Fine-tuning on a single task - multi-task instruction fine-tuning - Model evaluation – Benchmarks -Parameter efficient fine-tuning (PEFT) -PEFT techniques 1: LoRA - PEFT techniques 2: Soft
prompts.
Case Study: 1.Present your POV on the constitutional AI, how it’s different from RLHF.
2.Present your POV on the Quantization of LLMs, different techniques that are available, performance of the Quantized Models in comparison to the Original Models
Module-3 - Reinforcement learning and LLM-powered applications 15 Hour
Aligning models with human values - Reinforcement learning from human feedback (RLHF) - RLHF: Obtaining feedback from humans - Reward model - Fine-tuning with reinforcement learning - Model optimizations
for deployment - Generative AI Project Lifecycle - Using the LLM in applications - Interacting with external applications - Helping LLMs reason and plan with chain-of-thought - Program-aided language models (PAL) -
ReAct: Combining reasoning and action - LLM application architectures.
Case Study: 1.Present your POV on innovative architectures in transformer model that can lead to savings in training or inference time. As an example, MoE from Mistral is one such unique architecture
. Articulate tne performance of new architectures compared to the original architectures and come up with some new architecture that can lead to savings
2. Present your POV on the Sustainable AI, Ethical AI, Trustworthy AI

155
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Edward R. Deforest, Prompt Engineering with Transformers and LLM – By Kindle 4. Deep Learning for NLP and Speech Recognition" by Uday Kamath, John Liu, and James
(2024). Whitaker, Springer(2019)
Learning
2. Altaf Rehmani, Generative AI for everyone – By Altaf Rehmani; 1st edition (2024). 5. Hands-On Natural Language Processing with PyTorch 1.x" by Thomas Wolf, Julien Chaumond,
Resources
3. Natural Language Processing with Transformers" by Lewis Tunstall, Leandro von and Lysandre Debut, Packt Publishing(2020)
Werra, and Thomas Wolf, O'Reilly Media(2022) 6. "Pre-trained Models for Natural Language Processing" by Julien Simon, O'Reilly Media(2020)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - 20% - 20% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 20% - 25% - 25% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan, SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja, SRMIST
3. Dr.R.Balaji Ganesh, SRMIST
4.Dr.R.Deebalakshmi, SRMIST

156
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE561T ETHICS IN DATA SCIENCE E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: utilize foundational ethical frameworks and philosophies relevant to data science
CLR-2: apply ethical principles and analyze research ethics and data handling practices
CLR-3: evaluate and implement policies for data protection and algorithmic fairness

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: define key ethical theories and frameworks, including utilitarianism and contemporary theories of fairness. 1 2 2
CO-2: explain the ethical issues in data-driven research, including the methods of data collection and data types. 2 3 3
CO-3: analyze the distinctions between data ownership, privacy, and anonymity, and their implications. 3 3 3
CO-4: evaluate the effectiveness of data protection policies like GDPR and India's Personal Data Protection Bill. 3 3 3

Module 1: Introduction and Philosophical Frameworks for Assessing Fairness 7 Hour


Foundations of ethics - early theories of fairness (Utilitarianism etc.) - contemporary theories of fairness - significance of ethics in data science - ethics vs. law/compliance/public relations - cultural relativism -
“professional” ethics in data science - individuals vs. collectives.
Module 2: Research Ethics 7 Hour
Data driven research, methods of collection of data - different types of data: qualitative and quantitative - overview of ethical issues in data-driven organizations - doing ethical data analysis - responsible use of
research data - plagiarism - fake data and fabrication of data - creation of data base.
Module 3: Data Ownership, Privacy, and Anonymity 7 Hour
Understanding the difference between data ownership - data privacy and data anonymity - under- standing the idea behind data surveillance - data privacy vs. data security.
Module 4: Algorithmic Fairness 7 Hour
Discrimination and algorithms- obscure and unintentional bias displayed by the algorithms - ethics of data scraping and storage- Mosaic data- found data- and designed data.
Module 5: Policies on Data Protection 5 Hour
EU’s general data protection rules - GDPR - digital India policy - personal data protection bill - 2019 -PDP Bill- ethical issues on data privacy in context with India - case studies.
Module 6: Responsible AI 7 Hour
Various dimensions of Responsible AI - Dimensions of Ethical AI - Bias Mitigation Techniques; Constitutional AI: Rules of Constitutional AI - How to create Constitutional AI complaint system - Model fine tuning for
Constitutional AI.
Module 7: Red Teaming on LLM and Case study 5 Hour
What are the vulnerabilities - How to attack those problems by Red Teaming.

157
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. "Ethics of Artificial Intelligence and Robotics" by Vincent C. Müller, 4. "Ethics and Data Science" by Mike Loukides, Hilary Mason, and DJ Patil, O'Reilly Media(2018)
Publisher: Routledge(2020) 5. "Fairness and Machine Learning: Limitations and Opportunities" by Solon Barocas, Moritz
Learning 2. "Data Ethics: The New Competitive Advantage" by Gry Hasselbalch and Pernille Hardt, and Arvind Narayanan, fairmlbook.org (Open Access)2019
Resources Tranberg, Publisher: Apress(2016) 6. "Data Privacy and Security: A Practical Guide for In-House Counsel and the Data Privacy
3. "The Ethical Algorithm: The Science of Socially Aware Algorithm Design" by Officer" by David A. Zetoony, American Bar Association(2021)
Michael Kearns and Aaron Roth, Oxford University Press(2019)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. 1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan ,SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja,SRMIST
3. Dr.R.Balaji Ganesh,SRMIST
4.Dr.R.Deebalakshmi,SRMIST

158
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE562T Course SQL AND NoSQL FOR DATA SCIENCE Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3

Pre-requisite Nil Co- requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department Data Science and Business Systems Data Book / Codes / Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: apply fundamental algorithmic ideas to process data
CLR-2: understand the various functionalities of database
CLR-3: construct models using MySQL and NoSQL
CLR-4: apply various sub queries in MySQL
CLR-5: implement various constraints and transactional queries

Course Outcomes At the end of this course, learners will be able to: Programme Outcomes
(CO): (PO)
1 2 3
CO-1: comprehend basic methods of processing data from real world problems - 1 -
CO-2: convert data into actionable insights 3 2 -
CO-3: build data model into advanced actionable insights - - 3
CO-4: apply different kinds of sub queries in real world application - 2 -
CO-5: understand different constraints and transactional queries to application 1 2 -

Module-1 - SQL Fundamentals 9 Hour


Data and Types of Data, DBMS Concepts and Relational Database Management System, Create Database and Drop Database, Data Types, Types of Constraints, Data Manipulation Language and
examples, Data Definition Language commands with examples, Data Definition Language L, DML Commands, Select Clause ,where clause, Operators with where clause, Limit, Compound search
condition, Working with NULL Values, Date Functions and Formatting, To_Date, To_Number, To_Char, SQL Constraints, NOT NULL, UNIQUE, PRIMARY KEY, FOREIGN KEY, CHECK,DEFAULT,
SELECT with predicates, Comparison Operator, Between, IN, Like, Wildcard Filters, LIMIT
T1: SQL –Basic SELECT Commands, Create Table, T2: Implementation of SELECT, WHERE, Date functions,
T3: Explore usage of Constraints, Usage of LIKE, BETWEEN, LIMIT, Comparison operator
Module-2- SQL Functions 9 Hour
Operator Precedence, Single row Functions, Number Functions and their various examples, Round, Trunc, Floor, Ceil with different parameters and examples, String Function, Upper, Lower, Instr,
Substr, lstrip ,rstrip, concat, Date Function with examples ,Using Bin, Cast, Coalesce, Sorting using Order By in ascending and descending order, Conditional statements, IFNULL, GROUP Functions
count(), Avg(), Max(), Min(),sum(), GROUP By with aggregate function, Multiple Grouping Columns, Null values in Grouping Clause, Filtering using Having Clause, Aggregation with Having clause and
Ordering of While and Having Clause, Having with -out Group by, Restriction on Grouped Queries.
T4: Usage of Single row functions, T5: Implementation of Date Functions and Conditional statements, T6: Interpreting & Implementation of Group By with / without Having Clause.
Module-3 - Joins and Subqueries 9 Hour
Introduction to Join, ER Diagram, Simple Join, Table Aliases, Multi table joins, Joins with Group by JOINS with WHERE / ON/USING, Join with Row selection, Natural Join, Equi Join, Non Equi Joins,
Left Join, Right Join, Syntax and Different examples of Left Join and Right Join, Full Outer Join, Cross joins with examples and usage, Windows Functions, Rules for Multi Join query, Sub Queries-
159
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Need, Single row and Multirow operators, Types, Correlated Subqueries.
T7: Implementation of Different types Joins in MYSQL, T8: Implementation of Different types of subqueries, windows function, T9 : Implementation of correlated sub queries
Module-4 – NoSQL Fundamentals 9 Hour
Overview and History of NoSQL Databases. Definition of the Four Types of NoSQL Database, The Value of Relational Databases, Getting at Persistent Data, Concurrency, Integration, Impedance
Mismatch, Application and Integration Databases, Attack of the Clusters, The Emergence of NoSQL. Comparison of relational databases to new NoSQL stores, MongoDB, Cassandra, HBASE, Neo4j
use and deployment, Application, RDBMS approach, Challenges NoSQL approach, Key-Value and Document Data Models, Column-Family Stores.
T10: Implement aggregation and indexing with suitable example using MongoDB, T11: Implement Map reduces operation with suitable example using MongoDB
T12: Practice CRUD (Create, Read, Update, and Delete) operations on the databases: MongoDB
Module-5 - Transactions with NoSQL 9 Hour
NoSQL Key/Value databases using MongoDB, Document Databases, Document oriented Database Features, Consistency, Transactions, Availability, Query Features, Scaling, Suitable Use Cases,
Event Logging, Content Management Systems, Blogging Platforms, Web Analytics or Real-Time Analytics, E-Commerce Applications, Complex Transactions Spanning Different Operations, Queries
against Varying Aggregate Structure. T13: Design and implement aggregation pipeline using MongoDB, T14: Practice with ' macdonalds' collection data for document-oriented database. Import
restaurants collection and apply some queries to get specified output. T15: Develop an application using any of using NOSQL

Learning 1.Anthony Molinaro, Robert De Graaf Nield, T., Safari “SQL Cookbook, 2E: Query 3. Lynn Beighley, Sadalage, P. & Fowler, “Head First SQL: Your Brain on SQL -- A
Resources Solutions and Techniques for All SQL Users” O'Reilly Media Company,2019. Learner's Guide NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot
2. Avi Silberschatz, Henry F. Korth,S. Sudarshan, ”Database System Concepts” , Persistence” , Wiley Publications,1st Edition ,2019.
McGraw-Hill, 7th Edition,2019 4. Ramez Elmasri, Shamkant B. Navathe,”Fundamentals of Database systems”,
Pearson publication, 7th edition, 2021.

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms S. Vidhya, HoP, DSE, Great Learning 1.Prof. Masilamani V, Professor, CSE, IIITDM, chennai 1.Dr M Aarthy, SRMIST
2. Dr. Jaya R, Faculty, Great Learning 2.Dr.D.Hemavathi, SRMIST

160
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE563T Course BIG DATA DATABASE TECHNOLOGIES Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: define the fundamentals of big data and its significance in engineering applications
CLR-2: identify various components of the big data ecosystem, including storage systems, processing frameworks, and analytics tools
CLR-3: implement big data technologies using Hadoop, Spark, and NoSQL databases
CLR-4: develop the skills to analyze large-scale datasets and derive actionable insights for decision-making
CLR-5: design, deploy and manage big data solutions

Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: organize big data using appropriate tools and techniques, 3
CO-2: compose and preprocess large-scale datasets. 3
CO-3: identify techniques for data transformation and work with streaming data 3
CO-4: apply big data technologies to process and analyze real-world datasets 3
CO-5: perform descriptive, predictive, and prescriptive analytics on big data, 2

Module-1 - Introduction to Big Data 7 Hour


Importance of big data in Engineering- Big Data Storage Systems-distributed file systems - NoSQL databases- Consistency, availability, and partition tolerance. Case study
Module-2 - Big Data Processing Techniques 9 Hour
Data Ingestion and ETL Techniques for ingesting data into the big data ecosystem-Data preprocessing and transformation -Data modeling and schema design – Case study on optimization of big data
processing in real time applications
Module-3 -Big Data Processing Frameworks 11 Hour
Apache Hadoop ecosystem -Hadoop MapReduce, YARN, Hive-Hadoop Distributed File System -Apache Spark. Spark Apache Flink-Comparative analysis of processing frameworks- Case study on
Big Data Processing Frameworks in E-commerce for Real-Time Analytics
Module-4 - Big Data Database 9 Hour
NoSQL databases -Data lakes and data warehouse -Case study
Module-5 - Big Data Analytics 9 Hour
Descriptive, predictive, and prescriptive analytics- Big data Real-time analytics and stream processing- Case study

161
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1.Kuan-Ching Li, Hai Jiang, Laurence T. Yang, and Alfredo Cuzzocrea: Big Data: 3.Bill Chambers and Matei Zaharia, Spark: The Definitive Guide 2015
Resources Algorithms, Analytics, and Applications” 2023
2.Tom White, Hadoop: The Definitive Guide" 4th edition 2015

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 20% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 15% - - -
Level 6 Create - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Expert
1. Dr. Mariappan Vaithilingam, Brahmarsive Inc., 1. Prof. Loganathan, Pondicherry Engineering College
1. Dr. B. Kanisha, SRMIST.
Coimbatore

162
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE564T BIG DATA ECOSYSTEM E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the Hadoop architecture and its use cases
CLR-2: understand Hadoop ecosystem component particularly its data warehouse Hive
CLR-3: store and process data through NoSQL database
CLR-4: process Big data using Spark libraries
CLR-5: build ML Model using Big data processing libraries

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: recall the Hadoop architecture and HDFS commands 1
CO-2: implement data processing using Hive 1 2
CO-3: process Big data through NoSQL database 2
CO-4: process Big data through Spark Ecosystem Libraries 2
CO-5: build ML models on Big Data using Pyspark MLLib 3

Module-1 - Introduction to Hadoop 9 Hour


Overview of Big data-4Vs of big data- HDFS architecture-Hadoop Shell commands- Name Node and Data Node-Anatomy of file read and write- Data serialization -Yarn-Yarn Architecture.
T1 HDFS Commands – Data moving
T2 HDFS Commands - Admin
Module-2 - Hadoop Ecosystem Components: Hive 9 Hour
Brief introduction of MapReduce , Intro to Hive, Hive Architecture, Hive execution engine, HQL, Bucketing and partitioning in Hive, Hive Data Types-Basic commands in Hive-Built in operators and Functions-
Views– Importing/Exporting data to/from Hive (using Sqoop) Brief Introduction to other hadoop ecosystem components- Pig & SQOOP
T3 Creating Hive internal External table
T4 Inserting Data into Hive tables and perform partitioning Bucketing
Module-3 Data Storage Technologies NoSQL: HBase 9 Hour
Introduction to NoSQL Databases, CAP Theorem, Types of NoSQL, Introduction to HBase - Introduction to HBase data model: tables, rows, columns, and cells- CRUD operations: put, get, scan, and delete on
HBase tables.
T5 HBase Loading data into a table
T6 HBase CRUD Operations
Module-4 - Spark Ecosystem 9 Hour
Introduction to Spark, Spark Architecture ,Resilient Distributed Datasets (RDDs), Action & Transformer, Spark RDD , PySpark and Spark Dataframe, Introduction to Spark SQL
T7 Spark Demo on Data Bricks portal
T8 Spark Dataframe demo
163
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Module-5 - Machine Learning on Big Data : PySpark-MLlib 9 Hour
Intro to Spark MLlib , Basic MLlib Data Types and statistics, Classification and Regression,Model selection and tuning ,Evaluation metrics - Spark ML Pipeline - Transformers, Estimators, Spark ML Algorithms,
Model Persistence, Building Pipeline
T9 – Data Preprocessing & Feature engineering using Spark MLlib
T10 – Classification and Regression Modeling with Spark MLlib

3. Brindha Priyadarshini Jeyaraman, Real-Time Streaming with Apache Kafka, Spark and
1. Tom White ,Hadoop:The Definitive Guide, O'Reilly Media, Fourth Edition,2015.
Storm, BPB Publishers, First Edition, 2021
Learning 2. Srini Panchkula , Big Data Processing with Apache Spark , Lulu, First Edition,
4. Jisha Mariam Jose, Hadoop Practice Guide-SQOOP, PIG, HIVE, HBASE for Beginners,
Resources 2018.
Notion Press, First Edition, 2019

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 15% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr . N Mohanraj, Software Engineer 2, PayPal Inc.,. Dr. Joe Louis Paul, SSN College of Engineering 1. Dr.S.Sindhu, SRMIST
2. Mr. Kaustuv Kunal, Great Learning 2. Dr. K.Sornalakshmi, SRMIST

164
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE565T WEB DEVELOPMENT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards NA

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: generate Web pages using HTML, CSS
CLR-2: understand the dynamic behavior of website using CSS
CLR-3: process unformatted data using XML
CLR-4: generate dynamic webpages
CLR-5: understand the technology for dynamic web content generation

Programme Outcomes
Course (PO)
At the end of this course, learners will be able to:
Outcomes (CO):
1 2 3
CO-1: create static web pages 1
CO-2: create dynamic webpages using client-side scripting 3
CO-3: create web pages using unstructured data using XML 1
CO-4: create web pages with server-side functionality. 1 3
CO-5: demonstrate expertise in managing and generating dynamic web content. 3

Module-1- Introduction to Web Development 9 Hour


HTML and Cascading Style Sheets, Introduction to PHP: Declaring variables, data types, arrays, strings, operations, expressions, control structures, functions, Reading data from web form controls like Text Boxes,
radio buttons, lists etc., Handling File Uploads, Connecting to database (My SQL as reference), executing simple queries, handling results, Handling sessions and cookies. File Handling in PHP: File operations like
opening, closing, reading, writing, appending, deleting etc. on text and binary files, listing director
Module-2 - Client-side Scripting 9 Hour
Introduction to JavaScript: JavaScript language – declaring variables, scope of variables functions, event handlers (on click, on submit etc.), Document Object Model, Form validations. Simple AJAX applications.
Understand basics of React JS and Angular
Module-3 - Application Programming Interface 9 Hour
XML: Defining XML tags, their attributes and values, Document type definition, XML Schemas, Document Object model, XHTML Parsing XML Data - DOM and SAX parsers in java, Introduction to JSON,
DreamWeaver
Module-4 - Introduction to Servlets 9 Hour
Common Gateway Interface (CGI), Lifecycle of a Servlets, deploying a Servlets, The Servlets API, Reading Servlets parameters, Reading initialization parameters, Handling Http Request & Responses, Using
Cookies and sessions, connecting to a database using JDBC, Introduction to Spring and Struts Framework
Module-5 - Introduction to JSP 9 Hour
The Anatomy of a JSP Page, JSP Processing, Declarations, Directives, Expressions, Code Snippets, implicit objects, Using Beans in JSP Pages, Using Cookies and session tracking, connecting to database in
JSP. Understanding Spring MVC

165
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1.Uttam K Roy, Web Technologies, Oxford University Press 4.D. Flanagan, Java Script, , O’Reilly, SPD.
Learning 2.Steven Holzner, The Complete Reference PHP –, Tata McGraw-Hill REFERENCE BOOKS: 5.Jon Duckett, Beginning Web Programming- WROX.
Resources 3.Chris Bates, Web Programming, building internet applications, 2nd edition, Wiley Dremtech 6.R.W. Sebesta, Programming world wide web, Fourth Edition, Pearson
Java Server Pages – Hans Bergste,n, SPD O’Reilly 7.Dietel and Nieto, Internet and World Wide Web – How to program, , Pearson

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - 20% - 25% -
Level 2 Understand 30% - 20% - 30% -
Level 3 Apply 25% - 25% - 25% -
Level 4 Analyze 20% - 25% - 20% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Ramesh/ Fiserv Global services, India 1. Prof. G. R. Sakthidharan, Gokaraju Rangaraju Institute of 1.Dr. R. Jeya, SRMIST
Engineering and Technology, Hyderabad

166
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE566T IoT DATA ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: memorize the fundamentals of IoT and its applications.
CLR-2: describe various Data analytic techniques suitable for IoT data
CLR-3: analyze various analytic algorithms applicable to IoT data.
CLR-4: develop skills in visualizing and interpreting IoT data.
CLR-5: apply IoT analytics concepts to real-world scenarios.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: memorize basic concepts of IoT data collection from its devices 2 - 1
CO-2: interpret various data analytics techniques suitable for IoT time series analysis, predictive modeling, and anomaly detection. 2 - 3
CO-3: recognize different cloud based IoT analytic tools. 3 - -
CO-4: apply and visualize data in AWS IoT platforms and gain hands-on experience. 3 - 2
CO-5: analyze the real-world IoT applications across various domains, including healthcare, smart cities, industrial IoT, and agriculture. 3 - 2

Module-1 - Introduction 9 Hour


Overview of IoT: Concepts and Applications, IoT Architecture: Sensors, Devices, Gateways, and Cloud, IoT Protocols and Communication Standards, IoT Data Collection Data Sources in IoT, Data Acquisition
Techniques, Data Storage Options; Preprocessing IoT Data, Data Cleaning and Transformation.
Module-2 - Analytics Fundamentals 9 Hour
Introduction to Data Analytics-Descriptive, Predictive, and Prescriptive Analytics, Hypothesis formulation, Machine Learning Basics for IoT Data-Supervised, Unsupervised and reinforced, Analytics Techniques for
IoT Data, Statistical Analysis of IoT Data, Anomaly Detection, Predictive Modeling for IoT Applications.
Module-3 - IoT Analytics for the Cloud 9 Hour
Introduction to elastic analytics, Decouple key components, Cloud security and analytics, Applying big data technology to storage-HDFS, Data Lake Architectures, Designing data processing for analytics-- Hadoop,
Spark. Cloud-based Analytics Services: AWS IoT Analytics, Azure IoT Central, Google Cloud IoT Core.
Module-4 - AWS IoT Analytics 9 Hour
Introduction to AWS IoT Core Rules Engine, Setting Up AWS IoT Analytics, Data collection and Ingestion, Data Processing with IoT pipelines, Data Visualization with AWS Quick sight.
Module-5 - Advanced Topics in IoT Analytics and Case Studies 9 Hour
Integration with Other AWS Services for real-time processing: S3, Lambda, Kinesis. Security Practices in AWS IoT, Cost Optimization Strategies

167
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Harry G. Perros, An Introduction to IoT Analytics, Chapman & Hall, 1st Edition, 2021. 4. Sachi Nandan Mohanty, Jyotir Moy Chatterjee, Monika Mangla, Suneeta Satpathy
2. Misra S, Mukherjee A, and Roy A, IoT Analytics. In: Introduction to IoT, Cambridge and Sirisha Potluri, Machine Learning Approach for Cloud Data Analytics in IoT,
Learning University Press; 2021. Scrivener Publishing, 2021.
Resources 3. Kai Hwang and Min Chen, Big-Data Analytics for Cloud, IoT and Cognitive Computing, 5. Hwaiyu Geng, Internet of Things and Data Analytics Handbook, Wiley, 2016.
John Wiley & Sons, 2017. 6. https://docs.aws.amazon.com/lambda/latest/dg/services-iot.html
7. https://aws.amazon.com/iot-analytics/

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. B. Amirtharaj, Senior Associative, Cognizant 1. Dr. S. Shoba, Assistant Professor (Sr.Gr), VIT Chennai 1. Dr. T. Preethiya, SRMIST

168
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course COMMUNICATION AND NETWORKING TECHNOLOGIES FOR Course L T P C
21CSE567T E PROFESSIONAL ELECTIVE
Code Name INTERNET OF THINGS Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: recall the different data communication and networking concept for constructing IoT networks and data transfer.
CLR-2: define IoT reference model and architecture model for real-time applications.
CLR-3: recognize the traditional security concept and customize the security model for various IoT deployments.
CLR-4: develop IoT platforms and understand the hardware deployment for IoT.
CLR-5: utilize the concept of 5G technology and its operations for Machine to Machine communications.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: identify the importance of data communications and the Internet in supporting business communications and daily activities. 2 - -
CO-2: design networks with the help of IoT reference model and architecture. 2 - 3
CO-3: customize security model for different IoT deployments. 2 - 3
CO-4: deploy IoT network in real-time with IoT enabled hardware devices. 2 - 3
CO-5: visualize beyond 5G networks 2 - 3

Module-1 - Introduction to IoT and Data Communications 9 Hour


IoT - An Architectural Overview, Building architecture, Main design principles, State of the Art and needed capabilities. Reference Model and Architecture - IoT Reference Model, Functional View, Information View,
Deployment and Operational View, Technical Design Constraints, Data Representation, Interaction and Remote Control, Devices and Gateways, NFC, RFID and Tags, Local and Wide Area Networking, Data
Management in IoT, Distributed Cloud and Edge Computing.
Module-2 - Communication Protocol 9 Hour
Designing the Architecture of an IP‐based Internet of Things, Communication protocol groups relevant for IoT scenarios, IEEE 802.15.4 and ZigBee, Low‐power Wi‐Fi, Bluetooth and BLE, Powerline Communications,
IP based IoT, The 6LoWPAN Adaptation Layer, Transport layer communication in the IoT, Dedicated application layer, MQTT Protocol. Constrained Application Protocol (CoAP) - Constrained Application Protocol
(CoAP) Stack, CoAP embedded IoT‐oriented features, CoAP messaging model, CoAP message format, CoAP group communication.
Module-3 - Applications in the IoT and DNMP 9 Hour
Cloud IoT platform architecture, REST Architectures: The Web of Things, Resource Representations and Identifiers, Applications as Finite‐state Machines, Hypermedia as the Engine of Application State, Dual‐
network Management Protocol, DNMP Operations, DNMP message format, Route establishment in DNMP, Implementation of DNMP with IEEE, 802.15.4 and IEEE 802.11s.
Performance Evaluation - Security Issues in the IoT, Security Mechanisms for IoT, Lightweight Cryptography, Lightweight Cryptographic Hash Functions, Homomorphic Encryption Schemes, Authorization
Mechanisms for Secure IoT Services.
Module-4 - IoT Interfacing 9 Hour
Hardware for the IoT - Classes of Constrained Devices, Hardware Platforms, TelosB, Zolertia Z1, OpenMote, Arduino, Intel Galileo. Software for the IoT - Contiki OS, Simulation and Programming model in
Contiki, Features of Contiki. Vision and Architecture of a Testbed for the Web of Things, All‐IP‐based Infrastructure for Smart Objects, Enabling Interactions with Smart Objects through the IoT Hub, WoT
Applications for Mobile and Wearable Devices, Wearable Computing for the IoT, Effective Authorization for the Web of Things.
169
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Module-5 - Security and Case Study 9 Hour
Architectures and standards for machine-to-machine (M2M) communications, Lower-power wireless mesh networks for M2M, communications using the IEEE802.15.4 standard, Security Architecture for machine-
to-machine (M2M) communications in 5G capillary, Network Security threats and attacks for 5G, Security Service requirements for 5G, Security protocols and algorithms for 5G, Machine-to-machine (M2M)
communications for smart cities, Smart city technologies, Smart city platform, Smart city challenges, Machine-to-machine (M2M) communications for e-health applications, E- Health Applications and Network
Architecture. 5G Radio Access Network for IoT Wireless Spectrum Sharing in Device, Positioning Applications, Millimetre Wave Communication for 5G IoT, Applications
Challenges Implementing Internet of Things, (IoT) Using Cognitive Radio Capabilities in 5G Mobile Networks, A Vision of 6G System on Chip technology (SoC), Reconfigurable SoC.

1. Simon Cirani, Gianluigi Ferrari, Marco Picone and Luca Vetri, Internet of Things, 4. Peter Waher, Learning Internet of Things, Packet publishing, 2015.
Architectures, Protocols and Standards, Weily, 2016. 5. Wei Xiang, Kan Zheng and Xuemin (Sherman) Shen, 5G Mobile Communications, Springer,
2. Mavromoustakis, Constandinos, Mastorakis, George, Batalla and Jordi Mongay, 2017.
Learning
Internet of Things (IoT) in 5G Mobile Technologies, Springer, 2016. 6. Afif Osseiran, Jose F. Monserrat and Patrick Marsch, 5G Mobile and Wireless Communications
Resources
3. Carles Anton and Haro Mischa Dohler, Machine-to-machine (M2M) Technology, Cambridge University Press, 2016.
Communications, Architecture, Performance and Applications, 1st Edition,
Elsevier, 2015.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Mathangi Nageswar, Director - IoT CS Delivery Mgmt, CTS, 1. Dr Surendar M. Assistant Professor; National Institute of 1. Dr. A. Prabhu Chakkaravarthy, SRMIST
Chennai Technology, Puducherry

170
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE568T PRIVACY AND SECURITY IN IoT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: explain how security is important in IoT
CLR-2: identify the cryptographic fundamentals for IoT
CLR-3: apply the authentication credentials and access control
CLR-4: evaluate the various types of Trust models
CLR-5: explore the need for cloud security for IoT

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: clarify the need of securing the internet of things in an increasing interconnected world 3 - -
CO-2: analyze the cryptographic fundamentals in securing communication and data within the IoT landscape 3 - -
CO-3: identify robust identity and access management solutions in IoT 3 - -
CO-4: develop Trust models to ensure secure interactions between devices, users, and services and do evaluation - - 3
CO-5: examine how cloud security plays a vital role in protecting the vast amount of data generated by the ever-growing network of IoT devices. 3 - -

Module-1 - Introduction: Securing the Internet of Things 9 Hour


Security Requirements in IoT Architecture - Security in Enabling Technologies -Security Concerns in IoT Applications. Security Architecture in the Internet of Things -Security Requirements in IoT - Insufficient
Authentication/Authorization – Insecure Access Control - Threats to Access Control, Privacy, and Availability - Attacks Specific to IoT. Vulnerabilities – Secrecy and Secret-Key Capacity - Authentication/Authorization
for Smart Devices - Transport Encryption – Attack & Fault trees
Module-2 - Cryptographic Fundamentals for IoT 9 Hour
Cryptographic primitives and its role in IoT – Encryption and Decryption – Hashes –Digital Signatures – Random number generation –Cipher suites- Block ciphers, message integrity, authenticated encryption, hash
functions, elliptic curves, public-key crypto (PKI), signature algorithms – key management fundamentals – cryptographic controls built into IoT messaging and communication protocols –
IoT Node Authentication.
Module-3 - Identity and Access Management Solutions for IoT 9 Hour
Identity lifecycle –authentication credentials – IoT, Privacy Preservation Data Dissemination- Social Features for Location Privacy Enhancement in Internet of Vehicles- Lightweight and Robust, Schemes for Privacy
Protection in Key Personal IoT Applications: Mobile WBSN and Participatory Sensing IAM infrastructure – Authorization with Publish / Subscribe schemes – access control
Module-4 - Privacy Preservation and Trust Models for IoT 9 Hour
Authentication in IoT- Computational Security for the IoT- Privacy-Preserving Time Series Data Aggregation- Secure Path Generation Scheme for Real-Time Green Internet of Things- Security Protocols for IoT
Access Networks- Framework for Privacy and Trust in IoT- Policy-Based Approach for Informed Consent in Internet of Things
Module-5 - Cloud Security for IoT 9 Hour
Cloud services and IoT – offerings related to IoT from cloud service providers – Cloud IoT security controls – An enterprise IoT cloud security architecture – New directions in cloud enabled IoT computing

171
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Brian Russell and Drew Van Duren, Practical Internet of Things Security 4. Whitehouse O, Security of things: An implementers’ guide to cyber-security for internet
(Kindle Edition), Packet Publishing, 2016. of things devices and beyond, 1st edition, NCC Group, 2014.
Learning
2. Shancang Li and Li Da Xu, Securing the Internet of Things, Syngress, 2016. 5. DaCosta, Francis and Byron Henderson, Rethinking the Internet of Things: a scalable
Resources
3. Fei Hu, Security and Privacy in Internet of Things (IoTs): Models, Algorithms, approach to connecting everything, Springer Nature, 2013.
and Implementations, CRC Press, 2016.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Thamizh Arasan, Technical Lead, Tech Mahindra, Chennai 1. M Varaprasad Rao, Professor, Sree Dattha Institute of 1. Dr. Nimala. K, SRMIST.
Engineering & Science, Hyderabad.

172
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course COMPONENTS AND ENERGY OPTIMIZATION TECHNIQUES FOR Course L T P C
21CSE569T E PROFESSIONAL ELECTIVE
Code Name INTERNET OF THINGS Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: extract knowledge on Internet of Things (IoT), which relates to the study of sensors, actuators
CLR-2: relate knowledge on IoT devices with a focus on sensors
CLR-3: impart knowledge on IoT applications and examples (building automation, transportation, healthcare, industry, etc.) with a focus on wearable electronics
CLR-4: investigate the rudiments of energy conservation and on various energy conservation schemes in IoT
CLR-5: describe various techniques of green IoT and gain the knowledge on low energy Bluetooth devices and its importance

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: identify IoT sensors and technological challenges faced by IoT devices, with a focus on wireless, energy, power, RF and sensing modules. 3 - -
CO-2: justify the appropriate model to implement for a project 3 - -
CO-3: forecast IoT devices with a focus on sensors - - 3
CO-4: develop energy conservation algorithms for improving the lifetime of IoT devices and energy efficient architecture for real world problems 3 - -
compare and contrast of various green IoT techniques to design green IoT for real world problems and develop energy efficient architecture for real world problems
CO-5: - - 3
using low energy Bluetooth devices

Module-1 - Fundamentals of IoT 9 Hour


Introduction, Definitions & Characteristics of IoT, IoT Architectures, IoT Map Device Industrial sensors, Description & Characteristics, First Generation, Description & Characteristics, Advanced Generation, Description
& Characteristics, Integrated IoT Sensors, Description & Characteristics, Polytronics Systems, Description & Characteristics, Sensors' Swarm.
Module-2 - Wireless Technologies for IoT 9 Hour
WPAN Technologies for IoT: IEEE 802.15.4, Zigbee, HART, NFC, Z-Wave, BLE, Bacnet, Modbus. IP Based Protocols for IoT IPv6, 6LowPAN, RPL, REST, AMPQ, CoAP, MQTT. Edge connectivity and protocols.
Module-3 - Design Issues, Models and Simulation Platforms 9 Hour
Topology Control Design issues, Network Models, Simulation Platforms, Simulation using MATLAB for IoT domain, Future research direction: Heterogeneity of Network Technologies.
Module-4 - Link Efficiency for IoT Domain Application 9 Hour
Introduction, Network Model, Improved Link Efficiency Based Topology Control Algorithm, Implementations, Future research direction: Gateway placement and energy efficient scheduling in IoT, Low Power IOT
Devices, Automation and controls for HVAC systems.
Module-5 - Energy-Efficient Topology for IoT Domain Applications 9 Hour
Introduction, Network Model, Energy Efficient Algorithm Based on Connected Dominating Set, sustainability and emission reductions, Implementations: POLY and iPOLY, Future Research Direction: IoT Reliability,
IoT network issues, Optimization issues in IoT networks, Optimization levels in IoT, Optimal operation of IoT Networks.

173
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Vijay Madisetti and ArshdeepBahga, Internet of Things (A Hands- on-Approach), 3. Rushan Arshad, Saman Zahoor, Munam Ali Shah, Abdul Wahid, and Hongnian Yu, Green
Orient Blackswan Private Limited, 2015. IoT: An Investigation on Energy Saving Practices for 2020 and Beyond,
Learning
2. Madhur Bhargava, IoT projects with Bluetooth Low Energy- Harness the power of https://eprints.bournemouth.ac.uk/29694/1/07997698.pdf, 2017.
Resources
connected things, Packet Publishing, 2017. 4. Sanjeev J. Wagh, Manisha Sunil Bhende, Anuradha D. Thakare, Energy Optimization
Protocol Design for Sensor Networks in IoT Domain, 1st Edition, CRC Press. 2022.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Mathangi Nageswar, Director - IoT CS Delivery Mgmt, CTS, 1. Dr. Bhuvan Unhelkar, Professor, Muma College of Business, 1. Dr. Senthil Murugan. V, SRMIST
Chennai University of South Florida

174
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE570T SENSOR DATA MANAGEMENT IN IoT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: familiarize about different type of sensors used in different applications and type of data generated
CLR-2: memorize about IoT data management
CLR-3: popularize the distributed databases
CLR-4: provide hands-on practice on Mongo DB and Python
CLR-5: describe the role of big data analytics in IoT applications

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: identify the appropriate sensors for real time applications 3 - -
CO-2: explore data storage solutions for IoT environments 3 - -
CO-3: apply storage solutions for Big Data in Cloud environments - - 3
CO-4: install, run and apply Mongo DB in real-world applications 3 - -
CO-5: design data analytic models for IoT applications - - 3

Module-1 - Sensors 9 Hour


Introduction - Data Acquisition - Sensors, Signals, and Systems - Sensor Classification - Units of Measurements - SI basic units - Sensor characteristics - Motion detectors - Optical sensors - Ultra-sonic sensors -
Radar sensors – Accelerometer – Gyroscopes - Acoustic sensors - Humidity and Moisture Sensors - Light Detectors - Temperature and Chemical sensors - Piezoelectric sensor - Microflow sensor - Error Analysis
characteristics
Module-2 - IoT Data Management 9 Hour
Introduction- Types of data - IoT Data examples - IoT Data sources - IoT data management - IoT data lifecycle - IoT Data Management versus Traditional Database Management Systems - Data Processing and
Analysis in IoT - Data Management Framework for IoT - Analysis of IoT Data Managements Proposals Against Design Primitives - Data Collection Elements - Database System Design Elements - Processing
Elements - IoT data management solutions addressing design primitives - Data Management Framework for IoT - Outline of the proposed IoT data management framework and mapping of its layers to the IoT data
lifecycle - Comparison of the Framework to IoT Architecture Reference Model - IoT Data Storage Solutions - Data Processing and Analysis in IoT - Use case: IoT-empowered mobile health (m- health) system.
Module-3 - Sensor Data Management in Cloud 9 Hour
Introduction to Big data - Evolution of Big data - Characteristics of Big data - Why Big data - Role of Big data in IoT - Relationship between, IoT, Big data and Cloud computing - Cloud computing
– Architectures - Time series data- examples - Scheme based, scheme-less databases - Data Storage- NOSQL Databases - Distributed Databases: Google’s Big Table - Amazon DynamoDB - Apache Cassandra
- Apache Spark – MongoDB – Sharding - Choice of NoSQL Distributed Database - Data Ingestion - Data Retrieval - Data Storage Solutions in the Cloud
Module-4 - MongoDB 9 Hour
Introduction to MongoDB - Installing MongoDB, Running MongoDB - The data model - MongoDB in the real world - Working with data -Navigating databases - Inserting the data - Querying for data - Using the
aggregation commands - Working with conditional operators - Updating data - Processing data in Bulk, Deleting data - Python and MongoDB, Working with Documents in Python - Connecting and Disconnecting,
Inserting data, Finding your data - Modifying and processing data - deleting data - Data Aggregation and Pipeline - MongoDB Data Model - Indexing in MongoDB - Monitoring and performance tuning

175
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Module-5 - Big Data Analytics and IoT Applications 9 Hour
Introduction to Big Data Analytics - Classification of Analytics - Capitalizing on Big Data - Challenges Facing Big Data – Need for Big Data Analytics - Introduction to Machine Learning - Machine Learning Algorithms
- Role of machine learning in IoT - IoT in Agriculture - Machine learning in Agriculture domain - Machine learning in Healthcare domain - Issues in data collection - Blind spots of IoT Devices - Massive and
heterogeneity of data - Data Administration Issues - Data processing - Security and privacy

1. Jacob Fraden, Handbook of Modern Sensors: Physics, Designs, and Applications, 4. David Hows, Peter Membrey, Eelco Plugge, Tim Hawkins, The definitive guide to MongoDB,
Springer, 2014. 3rd Edition, A complete guide to dealing with Bigdata using mongodb, 2016.
2. Abu-Elkheir M, Hayajneh M and Ali NA, Data Management for the Internet of 5. Subhashini Chellappan and Seema Acharya, Big data and Analytics, 2ed, Wiley, 2019.
Things: Design Primitives and Solution, Sensors, 6. Suwimon Vongsingthong and Sucha Smanchat Sucha, “A Review of Data Management in
Learning
https://doi.org/10.3390/s131115582, 2013. Internet of Things”, KKU Res.j, https://doi.org/10.14456/kkurj.2015.18, 2015.
Resources
3. Prajwol Sangat, Maria Indrawan-Santiago and David Taniar, Sensor data
management in the cloud: Data storage, data ingestion, and data retrieval,
Concurrency and Computation; Practice and Experience,
https://doi.org/10.1002/cpe.4354, 2017

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Hariharan Ramalingam, Vertical Delivery Head, Wipro 1. Dr. A. Amuthan, Associate Dean, Dept. of CSE, Pondicherry 1. Dr. Banu Priya P, SRMIST
Engineering College, Pondicherry
2. Dr. Noor Mahammad, IIITDM, Kancheepuram

176
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE571T SDN AND NFV FOR INTERNET OF THINGS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: memorize the basic principles and Core importance about SDN, NFV and IoT.
CLR-2: define the various approaches and in Real world applications of SDN.
CLR-3: exploit the different evolutions of NFV and its deployment.
CLR-4: recognize the Era of IoT begins in different fields of real-world technologies.
CLR-5: predict the advanced applications of SDN, NFV and IoT.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: determine the basic ethics and its essentials of SDN, NFV and IoT. 2 - -
CO-2: classify the different SDN Real world applications. 2 - 3
CO-3: illustrate the various progressions of NFV. 2 - 3
CO-4: describe the new technologies evolved in IoT in the modern era. 2 - 3
CO-5: identify the Advanced applications of SDN, NFV and IoT. 2 - 3

Module-1 - Introduction and Grids of SDN, NFV and IoT 9 Hour


Introduction to SDN, SDN Architecture & its Applications, The Road to SDN: An Intellectual History of Programmable Networks, SDN Evolution, SDN basics and OpenFlow, Introduction to Network Function
Virtualization (NFV), NFV Architecture, Evolution of IoT, IoT and its Framework, Architecture of IoT, IoT Analytics, Challenges of IoT.
Module-2 - Faces of SDN 9 Hour
The SDN Approach, Characteristics of Software Defined Networking, SDN Controllers, Data Plane Function, Data Plane Protocols, SDN Application Plane, SDN Control Plane Architecture, Control Plane Function,
South Bound Interface & North bound Interface, SDN Network Updates, SDN Virtualization, An SDN application: Google B4.
Module-3 - Contextual of NFV 9 Hour
Background and Motivation for NFV, Benefits of NFV, NFV Requirements, NFV Security, NFV Infrastructure, Evolution of NFV Deployment, NFV Reference Architecture, NFV Management and Orchestration,
Infrastructure Network Domains, Virtualization Network Function, NFV Ongoing Research Efforts, NFV Use Cases.
Module-4 - A New IoT Eon 9 Hour
The IoT Era Begins, Components of IoT, Security of IoT, IoTvity, IoT Data Acquisition, IoT Complete Architectural Stack, Sensors and Hardware for IoT, Implementation of IoT, IoT World Forum Reference Model,
ITU- T IoT Reference Model, IoT Security and Privacy Requirement defined by ITU –T, IoT enabling Technologies.
Module-5 - Advanced Applications of SDN, NFV and IoT 9 Hour
Real time Applications of SDN, NFV Implementations, IoT Real time Applications, The impact of the New Networking on IT Careers, SDN and NFV over IoT Deployment, Visualization tools for IoT, IoT Communication
Technologies, Case Study of Networking Protocols in IoT, Case Studies with Architectural Analysis of IoT, Case Study of Patching Vulnerability in IoT, AWS IoT Core, Case Study of Connecting a web application
to AWS IoT using MQTT.

177
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Brij B Gupta, Amrita Dahiya, Elhadj Benkhelifa, SDN and NFV: A New Dimension to 5. Rahamatullah Khondoker, SDN and NFV Security: Security Analysis of Software-Defined
Virtualization, World Scientific Publishing Company Publisher, 2024. Networking and Network Function Virtualization, Springer International Publishing, 2018.
2. Fetia Bannour, Sami Souihi, Abdelhamid Mellouk, Software-Defined Networking 2 6. Ying Zhang, Network Function Virtualization: Concepts and Applicability in 5G Networks,
Extending SDN Control to Large-Scale Networks, Wiley Publisher, 2023. Wiley Publisher, 2018.
Learning 7. Larry Peterson, Carmelo Cascone and Bruce Davie, Software Defined Networks: A Systems
3. K. Hemant Kumar Reddy, Tapas Kumar Mishra, Mir Wajahat Hussain, Diptendu Sinha
Resources Approach, Systems Approach LLC (Publisher), 2021.
Roy, Handbook of Research on Network-Enabled IoT Applications for Smart City
Services, IGI Global Publisher, 2023. 8. William Stallings, Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud,
4. Alcardo Barakabitze, Andrew Hines, Multimedia Streaming in SDN/NFV and 5G Pearson, 2015.
Networks: Machine Learning for Managing Big Data Streaming, Wiley Publisher, 2022.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Mathangi Nageswar, Director - IoT CS Delivery Mgmt, CTS,
1. Dr. Sudeepta Mishra, Indian Institute of Technology, Punjab 1. Dr. A. Suresh, SRMIST
Chennai
2. Mr. Harishankar, Renault Nissan Automotive India Pvt Ltd, Chennai 2. Dr. B. Surendiran, National Institute of Technology, Puducherry 2. Mr. V. Shanmuganathan SRMIST

178
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE572T IoT VISUALIZATION E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: memorize the Data acquisition process, IoT servers and Data science
CLR-2: implement appropriate deep learning models for IoT applications
CLR-3: apply the knowledge of Data analytics
CLR-4: analyze data using Visualization tools
CLR-5: build any one of the case study

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: memorize IoT architecture, Data acquisition, Data management and Data science - - 1
CO-2: process the data and usage of modern ML tools 3 - 3
CO-3: analyze various type of data using data analytic tools 3 - 3
CO-4: choose appropriate latest visualization tools for analysis of data 3 - 3
CO-5: implement any IoT application mentioned in the case studies 3 - 3

Module-1 - IoT and Big data 9 Hour


IoT architecture – IoT Data streams - Data acquisition through sensing, aggregation, social media etc – IoT Servers MQTT, COAP, Data management - IoT Visualization – Importance – Applications –– Big Data –
Parameters for visualization software – Types of data Visualization – Criteria for evaluation of tools - Data Segregation – IBM Big Data Strategy – Infosphere Big Insights – Big Sheets - Data science.
Module-2 - Data Processing 9 Hour
Data conversion Analog to Digital conversion and Digital to Analog Conversion - Design for appropriate accuracy with error budgeting - System Integration - Choosing appropriate embedded boards for IoT applications
- Integrating all elements like sensors, ADC, power supply, batteries, communication modules, etc., for a given application - System software - Choice of OS (usually embedded Linux)
and other drivers for a given application and their integration to system firmware - Inference engines and their applications - System Integration, integrating signal acquisition, Data Pre-Processing - ML and AI
techniques for complete solution delivery - System software ML tools for training and verification (such as YOLO), Optimization – hyperparameter tuning – validation.
Module-3 - Data Analytics 9 Hour
Exploratory Data Analysis – Numerical and categorical data – Single and Multi-Variable analysis – Predictive data Analysis – Association – Correlation – Classification – Prediction – Clustering - Python
– Matplot – Orange – Visual Programming – Time series analysis – Image, Video and Speech analysis – Offline analysis – Hadoop – Batch Analysis - Apache Spark – Spark ML – Analytics in Cloud –
IoT Analytics in AWS.
Module-4 - Visualization Tools 9 Hour
Guidelines for visuals - Statistics - Histograms – Pictograms - Scatterplots – Line charts - Line graphs - Pie charts - Bar charts – Time line – Scatter graph - Interactive maps - multisource data analytics
dashboards - multilayer geo charts - cross filtering - geospatial contextualization – Heavy. AI Immerse – Cross filtering – Multi Layer Geo Charts
Module-5 - Case Studies 9 Hour
To build an IoT application (Data acquisition, Processing and apply visualization Tools) for any of the following use cases, IoT Control Panel for Multiple devices – Electricity Consumption Monitoring – Business
Productivity Management – Parking Management system.
179
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Sergio Saponara, Enabling Technologies for the Internet of Things Wireless 4. Pethuru Raj, Anupama Raman, DhivyaNagaraj and Siddhartha Duggirala, High
Circuits, Systems and Networks, River Publishers, 2022. Performance Big-Data Analytics: Computing Systems and Approaches, Springer, 2015.
Learning 2. Jake VanderPlas, Python Data Science Handbook - Essential Tools for Working 5. Jonathan R. Owens, Jon Lentz and Brian Femiano, Hadoop Real-World Solutions
Resources with Data, O’Reily Media Inc., 2016. Cookbook, Packt Publishing, 2013.
3. Massimo AlIoTo, Enabling the Internet of Things, From Integrated Circuits to 6. Zeynep Turgut, Arzu Gorgulu Kakisim, An explainable hybrid deep learning architecture for
Integrated Systems, Springer, 2017. WiFi-based indoor localization in Internet of Things environment, Elsevier, 2024.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Mathangi Nageswar, Director - IoT CS Delivery Mgmt, CTS, 1. Dr Surendar M. Assistant Professor; National Institute of Technology, 1. Dr. S. Usha sukhanya, SRMIST
Chennai Puducherry

180
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE573T REAL TIME SYSTEMS IN EMERGING IoT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: memorize the fundamental concepts of Internet of Thing technologies and its role in real time applications.
CLR-2: familiarize the real time processors and health care requirement for IoT
CLR-3: develop IoT enabled smart cities and power management techniques for IoT.
CLR-4: study the various IoT based industrial automation systems
CLR-5: realize the different case studies and real time applications of IoT

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: memorize the basic concepts of real time systems and IoT 3 - -
CO-2: apply the monitored health parameter sensor output data for further computing, analyzation and visualization. 3 - -
CO-3: implement the IoT solutions for smart cities development and energy management system - - 3
CO-4: analyze the big data analytic and programming of IoT 3 - -
CO-5: solve the various societal challenges using IoT - - 3

Module-1 - Introduction to Real Time IoT 9 Hour


Functional Requirements - Components of IoT: Next Generation Sensors, Sensor’s calibration and validate sensor measurements, placement of IoT devices, low-cost communication system design Sensors –
Actuators – Embedded Computation, Real time Trends in the Adoption of IoT– Societal Benefits of IoT, Health Care –– Machine to Machine (M2M) - Smart Transportation – Smart Living - Smart Grid, IoT Architecture:
IoT reference model and architecture -Node Structure - Sensing, Processing, Communication, IoT standards, Cloud computing for IoT, Communication Interfaces.
Module-2 - IoT Processors and IoT for healthcare 9 Hour
Services and Attributes: Big-Data Analytics for IOT, Dependability, Interoperability, Security, Maintainability. Embedded processors for IOT: Building IOT with RASPERRY PI and Arduino. Architecture of
IoT for Healthcare, IoT based Health Monitoring System using Arduino, Smart continuous glucose monitoring (CGM) and insulin pens, Remote Patient Monitoring- IoT Heart Rate Monitoring, remote monitoring of
physiological parameters. Architecture of IoT for Healthcare Applications, Emerging Technologies for Health and Medicine Virtual Reality, Augmented Reality.
Module-3 - IoT Enabled Smart Cities and Power Management 9 Hour
Smart home powered by IoT, Intelligent Parking System, Livestock monitoring system, Smart Sensors and actuators as per requirement for Smart Cities, air quality, noise pollution measured using Electrochemical
Sensors, Ultrasonic Sensors, IR, Obstacle, Proximity. IoT Data Acquisition System, Smart Farming: Animal Intrusion detection in farms, soil moisture detection and Irrigation system, Pest monitoring and control
Energy Consumption Monitoring, Smart Energy meters to minimize power consumptions.
Module-4 - IoT based Industrial Automation 9 Hour
IoT based gas leakage monitoring system, Temperature and liquid level monitoring in boilers, Fire detection system, wireless video surveillance robot, Automatic Solar Tracker, develops a physics-based and data-
driven digital equipment model to monitor assets and systems, Introduction to device localization and tracking; different types of localization techniques, Radio-Frequency Identification (RFID) and fingerprinting,
Device diversity/heterogeneity issue in Industrial IoT networks.
Module-5 - Case Studies 9 Hour
Smart Greenhouse, Drones for pesticides Energy Consumption Monitoring, Data Lake services scenarios. Medical Waste Management, Weather update system with IoT, Women security system, IoT based air
181
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
pollution meter, electric vehicle charging, Home Intrusion Detection, Home Automation.

1. Adrian McEwen and Hakim Cassimally, Designing the Internet of Things, John 5. Vijay Madisetti and Arshdeep Bahga, Internet of Things (A Hands-on Approach), Universities
Wiley and Sons Ltd, 2014. Press, 2015.
2. Dac-Nhuong Le, Emerging Technologies for Health and Medicine: Virtual Reality, 6. Ameya Deshpande, Bidyut Sarkar, Deep Dave, Ravi Dave, Advanced Manufacturing and
Augmented Reality, Artificial Intelligence, Internet of Things, Robotics, Industry 4.0. Supply Chain with IoT, BPB Publications, 2024.
Learning Wiley, 2019. 7. Monteiro, A.C.B., França, R.P., Arthur, R., Iano, Y., Segatti, A.C., Carnielli, G.P., Pereira,
Resources 3. Fadi Al-Turjman, Intelligence in IoT- enabled Smart Cities, 1st edition, CRC Press, J.C., de Godoy, H.A. and Fernandes, E.C. A Look at IIoT: The Perspective of IoT Technology
2019. Applied in the Industrial Field. In The Industrial Internet of Things (IIoT), (eds R. Anandan,
4. Giacomo Veneri, and Antonio Capasso, Hands-on Industrial Internet of Things: S. Gopalakrishnan, S. Pal and N. Zaman). https://doi.org/10.1002/9781119769026.ch1,
Create a powerful industrial IoT infrastructure using Industry 4.0, Packet Publishing, 2022.
2018.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Mathangi Nageswar, Director - IoT CS Delivery Mgmt, CTS, 1. Dr. Suresh. S, Professor, King Faisal University, Saudi Arabia 1. Dr. Mahalakshmi. M, SRMIST
Chennai.

182
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE574T DIGITAL TWINS DRIVEN DISTRIBUTED IoT SOLUTIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: memorize the purpose of digital twining and IoT ecosystems
CLR-2: introduce essential immersive tools for creating digital twinning applications
CLR-3: analyze practical knowledge of concepts with Unity software
CLR-4: know the concepts for developing unreal scenarios and components
CLR-5: apply immersive concepts to develop digitally twinning IoT use case scenarios

Programme Outcomes
Course Outcomes (PO)
At the end of this course, learners will be able to:
(CO):
1 2 3
CO-1: synergize the technology connect between digital twining and IoT 2 2 -
CO-2: know the tools to develop 3D visualization of real-time scenarios 2 - 3
CO-3: implement the functionalities of unity software 3 - 2
CO-4: integrate the concepts of unreal engine system design - 2 3
CO-5: design digital twinning for smart applications 2 - 2

Module-1 - Digital Twining of IoT solutions 9 Hour


Introduction to Digital twin-importance and need- archetypes- types of model/architecture – synergy between digital twins and IoT -- features- challenges
Module-2 - Immersive Technologies for Digital Twining 9 Hour
VR, AR, MR, xR: similarities and differences, Current trends, and state of the art in immersive technologies, - Human Perception and Cognition, Technology on Stereoscopic Display: Immersion and
Presence, Developing platforms and consumer devices, Physiology, Psychology and the Human Experience, Adaptation and Artefacts, Ergonomics, Ethics, Guidelines for Proper VR Usage, User- Centered Design,
User Experience: Scientific Concerns, Effects of VR Simulations on Users, Cyber sickness
Module-3 - Understanding Unity Platform 9 Hour
AR advanced SDKs, AR core: Kit, AR spark studio, Vuforia engine, perform preliminary data quality and formatting, Hands on Unity Software and Use case applications
Module-4 - Understanding Unreal Engine Platform 9 Hour
Specific aspects of Unreal engine, Unreal engine vs unity, Unreal/Unity engine Physics & optimization techniques, Application demos, The present and the future of MR/xR
Module-5 - Case Studies 9 Hour
IoT based digital twining: Utilities: Asset tracking/performance and management- Real Estate: building maintenance & space optimization-Automotive: transport maintenance-weight monitoring- conditions stipulation
Manufacturing: Twin engineering, operations management HealthCare: remote health monitoring, smart hospital.

183
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. David Rose, “Super sight: What Augmented Reality Means for our lives, our work, 4. Jonathan Linowes, Augmented Reality with Unity AR Foundation- a practical guide to cross
and the way we imagine our future, BenBella Books, 2021. platform AR development with Unity and later versions, Packet Publisher, 2021.
Learning
2. Lily Sayter and Brain Solis, The augmented Workforce, 2020. 5. Kenneth J.Varnum, Beyond Reality- Augmented Virtual and Mixed Reality in the library,
Resources
3. Hevin W Allen, Meta Verse- A beginner’s guide to the new digital Revolution, Jeff Packet Publisher, 2020.
H. Bolton, 2022.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Jagatheeswaran Senthilvelan, Head - IoT and Robotics, Auxo Labs 1. Prof Thuong Hoang, Research Faculty of Sci Eng & Built Env, 1. Dr. Vaishnavi Moorthy, SRMIST
School of Info Technology, Deakin University, Australia
2. Mr. Gowtham, Head - Innovation and Technology, ProtoHubs.io

184
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE575T API DESIGN AND MANAGEMENT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the importance of API in the cloud environment
CLR-2: facilitation of Effective Cloud-Based System Development
CLR-3: emphasizes the implementation of secure and efficient APIs
CLR-4: preparation for the API Economy
CLR-5: build and manage APIs in a microservices architecture

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand the architecture and tools used to design API 3 2 3
CO-2: design, implement, and manage APIs in cloud computing environments 3 2 3
CO-3: design and implement secure APIs, utilizing industry-standard security mechanisms 3 3 3
CO-4: evaluate various API monetization strategies and business models. 3 3 2
analyze the principles of API composition, aggregation, and versioning to construct resilient and scalable cloud-based systems utilizing microservices and tools 3 3 2
CO-5:
used to design API

Module-1 - Introduction to APIs and API Design Fundamentals 9 Hour


Overview of APIs - Importance of API in cloud computing, Different types of APIs: RESTful, SOAP, GraphQL - Understanding API architecture and components, Hands-on: Introduction to API development tools -
Principles of good API design - RESTful API design best practices - API versioning and backward compatibility, Hands-on: Designing RESTful APIs
Module-2 - API Security and Documentation 9 Hour
Understanding API security challenges - Authentication and authorization mechanisms for APIs - Securing RESTful APIs with OAuth 2.0 – Hands-on: Implementing OAuth 2.0 for API security - API Documentation
and Testing - Tools for API documentation (Swagger, OpenAPI) – API testing strategies and tools, Hands-on: Documenting and testing APIs
Module-3 - API Lifecycle Management and API Monetization 9 Hour
Overview of API lifecycle management - API versioning, deprecation, and retirement - Introduction to API gateways - Hands-on: API lifecycle management using an API gateway - API Governance and Compliance
- API governance frameworks - Regulatory compliance and APIs (GDPR, HIPAA) - Managing API usage policies - Hands-on: Implementing API governance policies
Introduction to API monetization - API business models - Strategies for API monetization - Hands-on: Implementing API monetization strategies
Module-4 - Advanced API Management 9 Hour
API analytics and monitoring - API performance optimization - Hypermedia APIs and HATEOAS - Hands-on: Advanced API management techniques - Using serverless architecture for APIs - Deploying APIs on
serverless platforms - Hands-on: Building serverless APIs
Module-5 - API Management Platforms 9 Hour
Overview of API management platforms - Comparing different API management platforms (Apigee, AWS API Gateway, Azure API Management) - Hands-on: API management using Apigee - Building APIs for
microservices - API composition and aggregation - Hands-on: Developing APIs for microservices
185
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
5. Daniel Jacobson, Greg Brail, and Dan Woods, "APIs: A Strategy Guide", O'Reilly Media,
1. Leonard Richardson and Mike Amundsen, "RESTful Web APIs", O'Reilly
September 8, 2011, ISBN-10: 1449308929, ISBN-13: 978-1449308926
Media, November 5, 2013, ISBN-10: 1449358063, ISBN-13: 978-1449358068
6. Brenda Jin, Saurabh Sahni, and Amir Shevat, "Designing Web APIs: Building APIs That
2. Brajesh De, "API Management: An Architect's Guide to Developing and
Developers Love", O'Reilly Media, December 3, 2019, ISBN-10: 1492026921, ISBN-13: 978-
Managing APIs for Your Organization", Apress, February 26, 2017, ISBN-10:
1492026921
Learning 1484225393, ISBN-13: 978-1484225393
7. Sam Newman, "Building Microservices: Designing Fine-Grained Systems", O'Reilly Media,
Resources 3. Aaron Parecki, "OAuth 2.0 Simplified", Okta, September 1, 2015, ISBN-10:
February 20, 2015, ISBN-10: 1491950358, ISBN-13: 978-1491950357
0692442741, ISBN-13: 978-0692442746
8. Mehdi Medjaoui, Erik Wilde, and Ronnie Mitra, "Continuous API Management", Manning
4. Matthias Biehl, "API Security: How to Build a Secure API", July 2020, ISBN-10:
Publications, September 25, 2018, ISBN-10: 1617293717, ISBN-13: 978-1617293718
979-8668220679, ISBN-13: 979-8668220679
9. Peter Sbarski, "Serverless Architectures on AWS: With examples using AWS Lambda",
Manning Publications, November 7, 2017, ISBN-10: 1617293822, ISBN-13: 978-1617293824

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of Unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.S.Ramraj, Senior Analyst, Accenture Technologies 1.Mr.Muthuram, Associate Professor, GCT Coimbatore 1.Mr.H.Karthikeyan, SRMIST

186
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course MICRO SERVICES AND CONTAINERIZATION IN CLOUD Course L T P C
21CSE576T E PROFESSIONAL ELECTIVE
Code Name COMPUTING Category 2 1 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: review the fundamental ideas behind microservice and containerization
CLR-2: explore on design aspects of microservice and containerization
CLR-3: employ the testing strategies in microservices and containerization
CLR-4: adapt the security and scaling mechanism in microservices
CLR-5: discover the reactive microservices and utilize the tool usage.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: describe the fundamentals of microservice, containerization 3
CO-2: illustrate the microservice and containers design principles 2
CO-3: demonstrate the integration with testing strategies of microservices and containerization 3
CO-4: investigate the orchestration in containerization 3
CO-5: deploy the reactive microservices, Kubernetes and Containerization-based Applications 2

Module – 1 - Understanding Microservice and Containerization 9 Hour


The Microservices Way - Microservices Value Proposition - Designing Microservice Systems - Establishing a Foundation – What and Why Containers – Installation - Docker Fundamentals – Common Docker
Commands
Module – 2 - Service Design Principles 9 Hour
Service Design - System Design, and Operations - Adopting Microservices in Practice – Image Distribution – Using Docker in Development – Creating a simple web app – Continuous Integration and Testing with
Docker
Module – 3 - Integration, Testing Strategies of Microservice and Containerization 9 Hour
Building Microservices – Integration Techniques - Testing Strategies - Deployment – Deploying Containers – Logging and Monitoring – Networking and Service Discovery.
Module – 4 - Advanced Features 9 Hour
Security in Microservices – Azure Active Directory - Monitoring – Logging – ELK stack - Scaling – Orchestration Clustering and Management – Security and Limiting Containers.
Module – 5 - Reactive Microservices 9 Hour
Reactive Microservices – The Microservice ecosystem – Architectures before microservices – Monolithic transitioning – Greenfield Application – Understanding Kubernetes architecture - Introduction to
Kubernetes objects - Leveraging Kubernetes.

187
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Irakli Nadareishvili, Ronnie Mitra, Matt McLarty, and Mike Amundsen, “Microservice
4. Adrian Mouat, “Using Docker”, O’Reilly 2016.
Architecture: Aligning Principles, Practices, and Culture”, O’Reilly Edition:2016
5. Vikram Murugesan, “Microservices Deployment Cookbook”, Packt Publishing, 2017.
Learning 2. Gaurav Kumar Aroraa Lalit Kale Kanwar Manish, “Building Microservices with ASP.NET
6. Rick Splair, “Maximizing the Power of Kubernetes, Containers, and Microservices”, Rick Splair, 2023.
Resources Core”, Packt Publishing, 2017
7 Navin Sabharwal, Piyush Pandey, “Monitoring Microservices and Containerized Applications”, Apress
3. Pethuru Raj, Jeeva S. Chelladhurai, Vinod Singh, “Learning Docker”, Packt Publishing,
2020.
2015.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr.R.Muthuram, Associate Professor,
1.Mr.S.Ramraj, Senior Analyst, Accenture Technologies. 1.Dr. S.Thenmalar, SRMIST
Government College of Technology, Coimbatore

188
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE577T DATA CENTER VIRTUALIZATION AND MANAGEMENT TOOLS E PROFESIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understanding the basics concept of virtualization technologies
CLR-2: gain knowledge on virtualization in networking technology
CLR-3: understanding the concept of storage technology in virtualization
CLR-4: familiarize the server technologies in virtualization
CLR-5: have a comprehensive Journey through DCIM Implementation, Integration, and Innovation.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: gain expertise in data center essentials and virtualization, from definitions to classifications 2 - -
CO-2: excel in data center network evolution and VLAN deployment for superior infrastructure design 3 1 -
CO-3: master storage evolution and data center networking convergence for streamlined resource access and consolidation. 3 1 -
gain knowledge in server architectures, x86 hardware evolution, virtualization, and unified computing to seamlessly manage service profiles and optimize 2 1 -
CO-4:
infrastructure.
CO-5: analyze the concept of Data center infrastructure management 3 2 1

Module-1 - Introduction to Virtualization 9 Hour


Data Center Essential Definitions-Data Center Evolution-Operational Areas and Data Center Architecture, The Origins of Data Center Virtualization-Virtual Memory-Mainframe Virtualization-Hot Standby Router
Protocol-Defining Virtualization, Classifying Virtualization Technologies-Technology Areas and Virtualization Technologies
Module-2 - Virtualization in Network Technologies 9 Hour
Data center network Evolution - Ethernet Protocol, Data Center network topologies- Data Center Network Layers-Design Factors for Data Center Networks- Physical Network Layout Considerations-The ANSI/TIA-
942 Standard-Network Virtualization Benefits, Network Partitioning, Concepts from the Bridging World, Defining VLANs, Two Common Misconceptions About VLANs , Spanning Tree Protocol and VLANs, Private
VLANs , VLAN Specifics.
Module-3 - Virtualization in Storage Technologies 9 Hour
Storage Evolution - Data Center Storage Devices - Accessing Data in Rest - Storage Virtualization, Fiber Channel Definitions- Fabric Processes - Defining and Exploring VSANs - Use Case: SAN Consolidation,
Data Center Networking Convergence - Data Center Bridging - Introducing Fiber Channel over Ethernet - Deploying Unified Server Access - Deploying Multihop FCoE - Unified Fabric Designs - FCoE and SAN
Extension.
Module-4 - Virtualization in Server Technologies 9 Hour
Server Architectures - x86 Hardware Evolution - Introducing x86 Server Virtualization - Unified Computing, Unified Computing and Service Profiles, Building Service Profiles- Identifying a Service Profile - Storage
Definitions - Network Definitions, Virtual Interface Placement, Server Boot Order, Maintenance Policy, Server Assignment, Operational Policies, Configuration, External IPMI Management Configuration, Management
IP Address, Additional Policies, Using Policies - BIOS Setting Policies - Firmware Policies
Module-5 - Data Center Infrastructure Management (DCIM) 9 Hour

189
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Identifying the Components of DCIM - Understanding the Goals of DCIM - Applying DCIM at the Edge - Recognizing the Fundamental and Strategic Nature of DCIM, Addressing Data Center Challenges with DCIM
- Inaccurate and Incomplete Capacity Management, Exploring Next Generation DCIM - Workload Optimization - Asset Integrity Monitoring - Machine Learning - Augmented Reality - Integration with ITSM, BMSs,
and Security Systems.

3. Linjiun Tsai, Wanjiun Liao, Virtualized Cloud Data Center Networks: Issues in Resource
1. Gustavo Alessandro Andrade Santana, Data Center Virtualization Fundamentals, Cisco Press 2013.
Learning Management, Springer.
2. Atisaadi, Nijab, Management of Data Center Networks, IEEE, 2021.
Resources 4.Lawrence Miller, Data center infrastructure management (DCIM), John Wiley & Sons
publication, Nlyte 3rd Special Edition.

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of Module test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Mohan Raj , Senior Technical Specialist, Nokia 1. Dr. C.M, Ragavan , Research Associate, Aston University. 1.Dr.J.Umamageswaran, SRMIST

2. Dr. K Saravanan, Associate Professor, RMK Engineering college.

190
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE578T CLOUD COMPLIANCE AND GOVERNANCE E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the importance of security in the cloud computing.
CLR-2: compare modern security concepts as they are applied to cloud computing.
CLR-3: assess the need for an established governance function that defines frameworks, policies, standards, and procedures for the adoption of the cloud.
CLR-4: understand, define, and enhance organizational culture as it relates to performance, risk, and compliance
CLR-5: implement the governance, risk management and compliance processes that are effective and efficient.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: appreciate the importance of security in the cloud environment. 1 2 2
CO-2: analyze the modern security concepts using various data protection methods. 2 3 2
CO-3: evaluate the various compliance and governance policies protected by cloud. 2 3 2
CO-4: evaluate the organizational protection measures in cloud environment. 2 3 2
CO-5: describe legal and compliance issues that arises with cloud computing 2 3 2

Module-1 - Cloud Computing: Basics of Security Compliance and Governance 9 Hour


What is Cloud Computing? - Legal Challenges, Terms and Condition for Cloud Computing Contracts – Contracts Formation, Jurisdiction and Applicable Law, Information Ownership in the Cloud, Data Protection,
Responsibility and Accountability, Technical Challenges in the Cloud, Trust, Cloud Governances and Standards, Perspectives on security: TO, FOR and FROM the Cloud, The importance of data classification
and process maturity.
Module-2 - Security, Privacy and Integrity in the Cloud 9 Hour
Data Protection and Privacy, Identity and Access Management, Segregation of Duties, Incident Response, Patch and Configuration Management, Physical Security, Guarantee for Data integrity, Tracking and
Auditing data in the cloud, Legal Data Disclosure, Data and Contract Termination, Case Study -Security through Encryption.
Module-3 - Compliance and Governance in the Cloud 9 Hour
Multinational considerations, Business continuity and disaster recovery (DR), Log and audit trail management, Specific regulatory requirements, Legal issues, Recommendations for Effective Cloud Security and
Compliance, What in the World is Cloud Governance?, Basic Governance Ecosystem, The Essential Role of the CRO in Cloud Governance, Cloud ERM Responsibilities, Cloud Risk Register, Cloud ERM Profile,
Case Study – Examples of Vendor Selection Criteria.
Module-4 - Corporate Dilligence and Compliance 9 Hour
Trust, Dilligence and Prudence, Understanding the Division of Liability, Liability in the Supply Chain, Building Trust to Adherence to Standards, Security Standards, Certification and the Contract, Compliance and
Audit.
Module-5 - Security Principles: Putting it to all together 9 Hour
The Pursuit of Reasonableness, Dealing with Data Protection, Negotiating the data protection clause, Dealing with Confidentiality, Negotiating the Confidentiality Clause, Dealing with Professional Negligence –
Don’t Panic Stay CAMM, Towards Cloud Interoperability, Jurisdiction and Information Security, Essential Contractual Clauses.

191
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Russel Ballantine, “Cloud Computing: Security Compliance and Governance”,
BookBaby; 1st edition. 2012. 5. John R. Vacca, “Cloud Computing Security”, 2nd Edition, CRC Press, 2020.
2. Sumner Blount, Rob Zanella, “Cloud Security and Governance: Who's on your 6. Ted Coombs, “Cloud Security For Dummies”, Wiley, 2022.
Learning
cloud?”, IT Governance Publishing, 2010. 7. Eyal Estrin, “Cloud Security Handbook”, Packt Publishing,2022.
Resources
3. Steven Mezzio, Vincent Campitelli, Meredith Stein, “Cloud Governance: Basics and
Practice”, De Gruyter, 2022.
4. Zeal Vora, “Enterprise Cloud Security and Governance”, Packt Publishing,2017.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of Unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mrs.K.Saranya, Team Lead, Tata Consultancy 1.Dr. S. Janakiraman, Professo,Pondicherry University, Puducherry
1. Dr.R.Naresh, SRMIST
Services 2.Dr. G. R. Gangadharan, Associate Professor, National Institute of Technology, Trichy

192
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE579T APPLICATION ARCHITECTURE AND DEPLOYMENT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand and differentiate monolithic and microservices architecture to optimize scalability in AI applications
CLR-2: introduce Kubernetes fundamentals for efficient AI deployment
CLR-3: introduce integrating Application Programming Interface for robust AI model management
CLR-4: introduce MLOps strategies for robust AI model management

Course Outcomes Programme Outcomes (PO)


At the end of this course, learners will be able to:
(CO): 1 2 3
CO-1: illustrate the differences between monolithic and microservices architecture and their respective advantages and disadvantages in AI applications 1 3 2
CO-2: discuss the basics of Kubernetes, develop and deploy AI models in a production environment. 2 3 2
CO-3: explain application programming interfaces (APIs) and their role in integrating AI models into larger systems. 3 3 3
CO-4: apply MLOps to streamline the machine learning lifecycle, from data preparation to model deployment and monitoring. 2 3 2

Module-1 - Monolithic vs Microservices 9 Hour


Introduction to Software Architecture and its types - What is Monolithic Architecture and its Importance - Characteristics of Monolithic Architecture - Limitations of Monolithic Architecture - What are Microservices -
Working of Microservices - Main Components of Microservices Architecture - Advantages of Microservices - Monolithic vs Microservices - Real World Example of Microservices - Challenges in Microservices
Module-2 - Application Programming Interface 9 Hour
What is an API - How do an API Work - WEB APIs - LOCAL APIs - PROGRAM APIs - SOAP, REST API - What are REST APIs - HTTP methods (GET, POST, PUT, DELETE) - Status Codes and URI structure -
SOAP vs REST - What is API testing - Types of Testing - Tools for API Testing - Authentication Mechanisms - Authorization Mechanisms - Role Based Access Control (RBAC)
Module-3 - Containers - Introduction 9 Hour
What is Virtualization - Virtualization in Cloud Computing - Introduction to containerization - Container Lifecycle - Virtualization vs Containerization - Container Security - Serverless Containers - Introduction to Docker -
Docker Architecture - Components of Docker - Concept of Docker Images - Docker Commands - Advantages of Docker - Introduction to Orchestration tools
Module-4 - Kubernetes - Introduction 9 Hour
What is Kubernetes (K8s) - Why Kubernetes and not only docker - Kubernetes Components - Node - Control Plane - Networking in Kubernetes - Kubernetes Resources - Pod, Deployment, Service, Volume,
Namespace, node, cluster - Storage - Security - Monitoring, Logging, Scaling - Writing YAML files.
Module-5 - ML Operations 9 Hour
Introduction to ML Operations - What is SDLC - Stages of SDLC - Waterfall Model - Agile Model - Iterative Model - Importance of Each Models - Model Training - Model Deployment.

193
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Scott Surovich & Marc Boorshtein, Kubernetes and Docker – By Packt Publishing (2021) 4. RESTful Web APIs" by Leonard Richardson and Mike Amundsen, O'Reilly Media(2013)
2. Mark Treveil, Nicolas Omont & Clément Stenac, Introducing MLOps: How to Scale 5. "Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation" by
Learning
Machine Learning in the Enterprise (Grayscale Indian Edition) – By Shroff/O'Reilly (2020) Jez Humble and David Farley, Addison-Wesley(2010)
Resources
3. Site Reliability Engineering: How Google Runs Production Systems" by Niall Richard 6. "API Design Patterns" by JJ Geewax, Manning Publications(2020)
Murphy, Betsy Beyer, Jennifer Petoff, and others, O'Reilly Media(2016)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 25% - 25% - 30% -
Level 5 Evaluate - 10% - - -
Level 6 Create - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan, SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja, SRMIST
3. Dr.R.Balaji Ganesh, SRMIST
4.Dr.R.Deebalakshmi, SRMIST

194
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course BUSINESS CONTINUITY PLANNING AND DISASTER Course L T P C
21CSE580T E PROFESSIONAL ELECTIVE
Code Name RECOVERY Category 2 1 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understanding the basic methods and paradigms of business continuity plan
CLR-2: elaborate the factors essential for implementing an effective business continuity plan
CLR-3: acquire the knowledge of business continuity standards
CLR-4: enumerate the real-time procedures in sorting out disaster recovery
CLR-5: identify the ways of protecting and managing data

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: determine the roles of the business continuity management 1 3 3
CO-2: effectiveness in execution of business continuity plan 3 3 2
CO-3: follow up of standard to be applied in business continuity plan 2 3 2
CO-4: recognize practices to be set forth for disaster recovery 3 3 3
CO-5: monitore and managing effective data security control 3 3 3

Module-1 - Business Continuity Management 9 Hour


Business Continuity Cycle - Business Continuity Planning process - Disaster Types - Need for Disaster Plan – Risk Assessment: Process & Methods - Recovery Strategies - Business Continuity Plan – Business
Continuity Vs. Disaster Recovery - Disaster Prevention and Recovery
Module-2 - Business Continuity Plan 9 Hour
Types – Importance – Elements – Steps – Standards - BCDR Tools - Strategy Management: Developing business continuity strategy - Business Continuity Policy: Policy Considerations, Business Contingency
Plan
Module-3 - Business Continuity Standard: ISO 22301:2019 9 Hour
Clauses of ISO22301:2019 - Implementation- Framework – Policies and Procedures – Business Continuity Risks – Testing Business Continuity arrangements - Auditing and Compliance -Requirements – Benefits
Module-4 - Disaster Recovery Project 9 Hour
Introduction – Initiating the project – Role of Business Continuity Manager – Adequate Funding – Selection of Team – Planning the Project – Execution and Control - Closing the project – Open Source Tools:
CloudBerry Backup, Amanda, OpenStack
Module-5 - Information Security and Data Management 9 Hour
Information Security Risks - Security categories for information - Incident Management - Data Recovery plan – Planning-Identify Critical Data - Creating Policies - Determine backups - Recovery Process - Data
Storage Options - Virtualization - Case Study: Special Disaster issues - Information security tools: Snort, OpenVAS, Zeek

195
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Nijaz Bajgorić , Lejla Turulja , Semir Ibrahimović , Amra Alagić ,” Enhancing
Business Continuity and IT Capability: System Administration and Server
Operating Platforms”, CRC Press,First Edition, [ISBN: 978-0367652616],2023. 4. Brenda D. Phillips (Author), Mark Landahl (Author),” Business Continuity Planning:
2. Alan Calder,” ISO 22301:2019 and Business Continuity Management - Increasing Workplace Resilience to Disasters “, Butterworth Heinemann publications,[ISBN:
Learning Understand how to Plan, Implement and Enhance a Business Continuity 978-0128138441],2020.
Resources Management System (BCMS)”, O'Reilly Media Company publications, [ISBN: 5. Samuel F. Elder, Jennifer H. Elder,” Faster Disaster Recovery: The Business Owner's Guide
9781787783010],2021. to Developing a Business Continuity Plan (AICPA), Wiley Publications,[ISBN: 978-
3. Gerardus Blokdyk,” Business Continuity Management and IT Disaster 1119570967]2019.
Recovery Management A Complete Guide”, 5STAR cooks, [ISBN:
9781867485315], 2021.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of Unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr Ramachandran A , Associate Professor
1.Mr.Hari Prasad Prabhu, Senior Consultant , Deloitte, Chennai 1.Dr A Vijay Vasanth , SRMIST
Anna University (Panruti Campus)

196
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE581T CLOUD SERVICES ARCHITECT E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the importance of basics in the AWS Cloud Computing.
CLR-2: compare modern security concepts with deployment models as they are applied to AWS cloud computing.
CLR-3: assess the need that defines architecture, frameworks, policies, standards, and procedures for the adoption of the AWS cloud.
CLR-4: understand, define, and enhance organizational culture as it relates to performance, risk, and storage
CLR-5: implement the repeatability, consistency, and reliability of application deployments across different environments.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand the importance of the cloud environment. 2 3 2
CO-2: illustrate the modern service and deployment model concepts. 2 3 2
CO-3: demonstrate the Paradigms and Solutions for AWS Cloud Computing. 2 3 2
CO-4: evaluate the organizational protection measures in AWS Core Services. 2 3 2
CO-5: analyze AWS Cloud Storage Advanced Technology, and classify importance of Real world cost management scenarios 2 3 2

Module – 1 - Introduction to AWS Cloud Computing 9 Hour


Definition of Cloud Computing, Key characteristics of Cloud Computing, Benefits and drawbacks of Cloud Computing, Cloud Service Models: IaaS, PaaS, SaaS, Cloud Deployment Models: Public, Private,
Hybrid, Community Clouds, Introduction to Amazon Web Services (AWS), History and Evolution of AWS, AWS Global Infrastructure, AWS Management Console and CLI.
Module – 2 - AWS Core Services 9 Hour
AWS Identity and Access Management (IAM), AWS Regions, Availability Zones, and Edge Locations, AWS Compute Services (EC2, Lambda, ECS, EKS), AWS Storage Services (S3, EBS, EFS, Glacier), AWS
Networking Services (VPC, Route 53, CloudFront), AWS Database Services (RDS, DynamoDB, Redshift), AWS Shared Responsibility Model, Identity and Access Management (IAM) best practices, Network
security and VPC best practices, Data encryption options in AWS, AWS Security Services (AWS WAF, AWS Shield, AWS Inspector).
Module – 3 - Advanced AWS Services 9 Hour
Auto Scaling, Elastic Load Balancing (ELB), AWS CloudFormation for Infrastructure as Code (IaC), Serverless Architecture with AWS Lambda and API Gateway, AWS Well-Architected Framework, Designing
for fault tolerance and high availability, Multi-region architecture and disaster recovery
Module – 4 - Designing for Scalability and High Availability 9 Hour
AWS CloudWatch for monitoring and logging, AWS CloudTrail for auditing and compliance, Performance optimization techniques for AWS services, AWS Pricing Models, Cost optimization strategies, AWS Cost
Explorer and Budgets
Module – 5 - Case Studies and Real-World Applications 9 Hour
AWS Machine Learning Services (SageMaker, Recognition, Comprehend), Internet of Things (IoT) services in AWS, Big Data and Analytics services (EMR, Athena, Glue), Containerization with AWS ECS and
EKS, Case studies of organizations using AWS for various use cases, Hands-on projects and exercises to apply learned concepts

197
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. "AWS Certified Solutions Architect by " by Ben Piper, David Clinton - (2019)
Learning 2. "AWS Certified Solutions Architect " by Joe Baron, Hisham Baz, Tim Bixler, Biff 4. "AWS Certified Solutions Architect " by Joe Baron, Hisham Baz, Tim Bixler, et al. (Year: 2016)
Resources Gaut, Kevin E. Kelly, Sean Senior, John Stamper - (2019) 5. "AWS Certified Solutions Architect -" by Ben Piper and David Clinton (Year: 2016)
3. "Amazon Web Services in Action" by Andreas Wittig, Michael Wittig - (2015)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100% 100% 100%

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.S.Senthilkumar, Associate professor and head,
1.Mr.G.Gopalakrishnan, Capgemini Tech Lead, United States Anna University - Pattukkottai 1.Dr.N.Deepa, SRMIST
2.Mr.S.Janakiraman, Professor, Pondicherry university

198
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE582T CLOUD SECURITY BUILDER E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the importance of cloud security in cloud environment
CLR-2: facilitate of effective cloud-based system development
CLR-3: emphasize the implementation of a secure cloud environment
CLR-4: prepare for the future-proof cloud infrastructure
CLR-5: build and manage privacy and trust in cloud environment.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand cloud security is crucial in ensuring the protection of data and resources within a cloud environment 3 2 3
design effective cloud-based system development optimizes scalability, flexibility, and efficiency in software development processes through strategic utilization 3 2 3
CO-2:
of cloud technologies.
prioritize the implementation of a secure cloud environment underscores the necessity of deploying robust security measures to protect data integrity and 3 3 3
CO-3:
mitigate risks effectively.
CO-4: create future-proof cloud infrastructure involves architecting adaptable systems with emerging technologies to support evolving business needs effectively. 3 3 2
build privacy and trust in a cloud environment entails implementing robust security measures and transparent practices to safeguard data and cultivate user 3 3 2
CO-5:
confidence.

Module – 1 - Introduction to Cloud Security: Attacks, Techniques, Tools, and Challenges 9 Hour
Overview of Cloud Computing- Cloud service models, deployment models, Cloud Service Platforms. Cloud Security -Cloud Security Standards, Creating and Managing Virtual Machines (VMs), Applying ITIL
Principles for Cloud Management, Securing and Auditing a Cloud Environment, Building and Testing a Cloud Threat Model, Implementing and Evaluating Intrusion Detection Systems (IDS) for Cloud Environments,
Exploring Virtual Machine Introspection (VMI) with LibVMI Tool.
Module – 2 - Building a Future-Proof Cloud Infrastructure 9 Hour
Introduction to Distributed Systems, Configuring VXLAN (Virtual Extensible LAN) Overlay Networking, Deploying and Managing Containers with Docker and Kubernetes, Implementing Software-Defined Networking
(SDN) with OpenFlow and Open vSwitch, Exploring Network Interface Cards (NICs) and SmartNICs, Designing and Implementing a Cloud-Native Management Control Plane for Distributed Services Platforms
Module – 3 - Cloud Security Using SECaaS and DevSecOps 9 Hour
Evolution of Cloud Computing and its Impact on Security, Understanding the Core Principles of Cloud Security and its Importance, Cloud Solutions for Enterprises, Implementation of Cloud Security Framework,
Native Cloud Security Controls, Cloud Regulatory Compliance Roadmap, Effective Cloud Security Policy Enforcement, Cloud-based Security: Enabling Security-as-a-Service, Cloud Security Recommendations
and Best Practices.
Module – 4 - Data Privacy and Trust in Cloud Computing 9 Hour
Understanding Trust and Cloud Computing: An Integrated Framework for Assurance and Accountability in the Cloud, Cloud Computing Contracts and Trust, Data Privacy Across the Borders, Understanding
and Enhancing Consumer Privacy Perceptions in the Cloud, A Conceptual Framework for Positioning a Cloud Service Provider’s Privacy Orientation, Ethics and Cloud Computing, Trustworthy Cloud Computing

199
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Module – 5 - Secure Cloud Environments using AWS, Azure, and GCP 9 Hour
Overview of Cloud Security, Implementation of Command Line tools, Securing Computing, Storage and networking services, implementing effective Strategies of IAM Solutions, Applying Encryption in cloud
Services, Understanding common security threats to cloud services, Managing hybrid and multi clouds.

5. Theo Lynn, Data Privacy and Trust In Cloud Computing: Building Trust In The Cloud
1. Preeti Mishra, Emmanuel S Pilli, R C Joshi, Cloud Security: Attacks, Through Assurance And Accountability, Palgrave Macmillan, 2021, ISBN: 978-
Techniques, Tools, and Challenges, Chapman and Hall/CRC, 2021, ISBN: 3030636475.
978-0367236318 6. Eyal, Cloud Security Handbook: Find out how to effectively secure cloud environments
2. Gai, Silvano, Building a Future-Proof Cloud Infrastructure: A Unified using AWS, Azure, and GCP, Packt Publishing, 2022, ISBN: 978-1801076910
Architecture for Network, Security, and Storage Services, Addison-Wesley 7. Cloud Security Alliance, Security Guidance: For Critical Areas of Focus in Cloud
Learning Professional, 2020, ISBN: 978-0136610345 Computing V4.0, Cloud Security Alliance, 2017, ISBN: 978-0983476080
Resources 3. Ashish Mishra, Cloud Security Handbook for Architects: Practical Strategies 8. Shinesa Cambric, Michael Ratemo, Cloud Auditing Best Practices: Perform Security and IT
and Solutions for Architecting Enterprise Cloud Security Using SECaaS and Audits across AWS, Azure, and GCP by building effective cloud auditing plans, Packt
DevSecOps, Orange Education PVT Ltd, 2023, ISBN: 978-9389987587 Publishing, 2023, ISBN: 978-1801819958
4. Raghu Yeluri, Enrique Castro-Leon, Building the Infrastructure for Cloud 9. Tasha Penwell, Beginning AWS Security: Build Secure, Effective, and Efficient AWS
Security: A Solutions view, Apress, 2014, ISBN: 978-1430261454 Architecture, Apress, 2023, ISBN: 978-1484276733
10. Prashant Priyam, Cloud Security Automation: Get to Grips with Automating Your Cloud
Security on AWS and OpenStack, Packt Publishing, 2018, ISBN: 978-1788391050

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Renganathan, Agile Coach and Cloud Engineer, Tata 1.Mr.K. Prakash, Assistant Professor, Dept. Of CSE, Government
1.Dr. Savaridassan.P, SRMIST
Communications College of Engineering, Dharmapuri

200
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE583T Course NATURAL LANGUAGE PROCESSING AND ITS Course E PROFESSIONAL ELECTIVE L T P C
Code Name APPLICATIONS Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: familiarize the basic concepts of NLP
CLR-2: inculcate the knowledge of preprocessing techniques of NLP
CLR-3: build probabilistic language models
CLR-4: brief about syntax and sematic techniques
CLR-5: design the application models of NLP

Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: comprehend the ambiguity, challenges, and applications of NLP 3 - -
CO-2: demonstrate NLP techniques such as Part-of-Speech tagging, morphology, and text processing. 3 - -
CO-3: create applications using probabilistic models. 3 - -
CO-4: develop applications utilizing probabilistic models. 3 - -
CO-5: develop NLP applications using machine learning and deep learning models. 3 - -

Module-1 – NLP Overview 9 Hour


History of NLP, Applications of NLP: Information Retrieval, Information Extraction, Question Answering, Sentiment Analysis Optical Character Recognition, Text Categorization Word Prediction, Speech
Recognition Machine Translation, Introduction to Text preprocessing, Tokenization, Lemmatization and stemming, Feature extraction NLP terminology, Components of NLP, Term Frequency (TF),
Inverse Document Frequency (IDF), Modeling using TF-IDF, Spam Filtering
Module-2 – NLP Techniques 9 Hour
Parts of Speech: Tagsets for English, POS (Part of Speech) tagging, POS (Part of Speech) tagging, Named entity recognition (NER), Language Model Vectorization, Word Embedding, Bag of Words,
Continuous Bag of Words, Word Cloud - Pre-trained models, Word2Vec, Discovering Semantic relationship using, Word2Vec , Glove, Elmo embedding, Topic Modeling, Latent Dirichlet Allocation
(LDA) , Applications of LDA, Tutorial4 :Implementation of POS Tagging, NER
Module-3 – Web Scraping and Language Models 9 Hour
Basic HTML tags, Beautiful Soup, Web Scraping on HTML page, scraping ecommerce site, retrieve data with API, Modelling using N-Gram Model, Skip Gram, N-Gram, Document Similarity, Deep
Learning models, Sequence modeling, Why Recurrence is necessary, Backpropagation through time (BPTT), Understanding gates, RNN, LSTM Basics, Multilayer LSTM, Bi-Directional LSTM.
Module-4 – Large Language Models 9 Hour

201
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Attention Mechanism, Large Language Models, Encoder – Decoder Architecture, Transformers, BERT, XLNet, BART, GPT, Claude Gemma and Gemini APIs. Large Language models for Indian
Languages – MURIL BERT, Multilingual models, mBERT, mBART.
Module-5 – Introduction to Generative AI 9 Hour
Generative AI and Large Language Models, Building Sarcasm Detection, End to End Case study, Generative AI using Hugging Face API, RAG model demonstration, Building Co-Pilots for health Care
and Fin Tech, Handling Hallucination and data security.

Learning 1.Mugan, J., Natural language text processing with Python: Hands-on NLP in 3.Tunstall L., Werra L., and Wolf T, Natural Language Processing with Transformers. [ISBN-13:
Resources Python using NLTK, spaCy, gensim, and scikit-learn., 2017 978-1098136796], (available on O'Reilly), 2022
2.In Loonycorn (Firm), From 0 to 1: Machine learning, NLP & Python: cut to the 4.Dan Jurafsky, D. and James H. Martin, J., Speech and Language Processing Links to an
chase. &PacktPublishing, 2017 external site. (3rd ed), 2019
5.Raaijmakers S. 2022. Deep Learning for Natural Language Processing Links to an external
site. O'Reilly. [ISBN-13: 978-1617295447].

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life-Long Learning Final Examination
CLA-1 Average of unit test CLA-2 (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Mariappan Vaithilingam, Brahmarsive Inc, Bengaluru, India 1.Ms. B. G. Sudha, Great Learning 1.Dr. C. N. Subalalitha, SRMIST

202
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE584T TIME SERIES ANALYSIS AND FORECASTING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the need, basic concepts and components of forecasting
CLR-2: gain knowledge about simple forecasting with smoothing and exponential smoothing
CLR-3: acquire insights of mean, correlation and auto-correlation
CLR-4: Understand the basic concepts of ARIMA Model
CLR-5: grasp about Vector autoregression and VARMA models

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: apply simple time series model for forecasting analysis - 1 2
CO-2: implement forecasting with smoothing exponential models - 3 3
CO-3: analyze correlation on mean, correlation and auto correction and apply them 2 - 1
CO-4: apply ARIMA model and evaluate it 2 1 -
CO-5: understand the problem statement and choose Multivariate Time Series algorithm and perform forecasting 2 3 -

Module-1 - Introduction to Time Series 9 Hour


Time Series – what is time series Need for forecasting - Univariate and Multivariate Time Series - Special Features of time series - Exploratory Data Analysis of time series - Trend, Seasonality, Irregular component
- Decomposition of time series - Additive model - Multiplicative model - Examples of Additive and Multiplicative models.
T1: Building programs to work with EDA of time series signals in python
T2: Building programs to work with Decomposition analysis of Time series data in python
T3: Building programs to perform Time series data visualization in Python
Module-2 - Moving Average 9 Hour
Moving Average - Simple Forecasting - Exponential smoothing - Simple exponential smoothing – Example - Double exponential smoothing (Holt model) - Example - Triple exponential smoothing (Holt-Winter model)
– Example. T4: Building programs to perform Moving average model in python
T5: Building programs work with Exponential smoothing in Python
T6: Time series model evaluation in python
Module-3 - Stationary Processes 9 Hour
Stationary Processes - Dicky Fuller test Lag and Differencing - ARMA(p, q) Processes - Properties of sample mean and correlation AR(1) and MA(1) - The Autocorrelation Function – The Partial Autocorrelation
Function ACF and PACF - Hands on Forecasting stationary time series - Yule–Walker Estimation - Maximum Likelihood Estimation Forecast ARMA - AR, MA and ARMA process Parameter estimators - Example of
ARMA process. T7: Auto regression model in Python
T8: ARMA model implementation in Python
T9: Case study in Python
Module-4 - Non - Stationary Processes 9 Hour
203
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Non-Stationary Processes - ARIMA Models for Non - Stationary Time Series Forecasting - ARIMA models - Akaike Information Criterion and Model Evaluation - ARIMA Example – Seasonal ARIMA Models -
Forecasting SARIMA Models - Akaike Information Criterion and Model Evaluation - Example of SARIMA proces
T10: ARIMA implementation in Python
T11: SARIMA implementation in Python
T12: Case study in Python
Module-5 - Multivariate Time Series 9 Hour
Multivariate Time Series - Approaches to Statistical Analysis in a Time Series - General Applications of VAR Model. - VAR Model - Forecasting - VAR Model - VARMA Model – Forecasting - VARMA Model - Modeling
and Forecasting with Multivariate AR Processes. - Deep Learning models for TSF, - Case Study.
T13: Implementation of VAR model in Python
T14: Implementation of VARMA model in Python
T15: Case study in Python

1. Pal A, Prakash PK. Practical time series analysis: master time series data processing, 5. Hastie, T., Friedman, J., & Tisbshirani, R. (2018). The Elements of statistical learning:
visualization, and modeling using python. Packt Publishing Ltd; 2017 Sep 28. Data mining, inference, and prediction. New York: Springer.
2. Yang, K., & Safari, an O'Reilly Media Company. Time Series Analysis with Python 3.x, 6. Grus J. Data science from scratch: first principles with python. O'Reilly Media; 2019 Apr
Learning Packt Publishing, 2020. 12.
Resources 3. Hyndman RJ, Athanasopoulos G. Forecasting: principles and practice. OTexts; 2018 7. McKinney, W. (2018). Python for data analysis: Data wrangling with pandas, NumPy,
May 8. and IPython. O'Reilly Media, Inc.
4. Montgomery DC, Runger GC. Applied statistics and probability for engineers. John 8. Vanderplas, J. T. (2017). Python data science handbook: Essential tools for working with
wiley & sons; 2010 Mar 22. data. O'Reilly Media, Inc.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 20% - 20% - 20% -
Level 5 Evaluate 5% - 5% - 5% -
Level 6 Create 5% - 5% - 5% -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Abhinanda Sarkar, Academic Director, Great Learning. 1. Dr Surendiran B, Associate Professor, National Institute of Technology, 1. Dr. A. Shobanadevi, SRMIST
Puducherry
2. Dr Srabashi Basu, Senior Faculty, GreatLearning 2. Dr. Sornalakshmi K, SRMIST

204
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE585T Course FRONT END DEVELOPMENT TECHNOLOGIES Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department Computing Technologies Data Book / Codes / Standards NA

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: establish foundational skills in HTML and CSS for creating structured web content
CLR-2: introduce Bootstrap for rapid development of responsive web layouts and interactive components.
CLR-3: use React JS to build dynamic user interfaces with efficient state management and event handling.
CLR-4: explore Angular framework for creating scalable web applications with modular components and data binding.
CLR-5: focus on advanced data binding techniques and form validation in Angular for enhanced user interaction and data integrity.

Programme Outcomes
Course
At the end of this course, learners will be able to: (PO)
Outcomes (CO):
1 2 3
CO-1: create and style web pages using HTML and CSS. 1 - -
CO-2: design responsive web layouts and interactive components and utilizing the grid system effectively. 2 - -
CO-3: develop dynamic web applications and leveraging React Developer Tools 2 - -
CO-4: build robust web applications and utilize Bootstrap for creating responsive layouts. - - 3
CO-5: implement advanced data binding and form validation techniques in Angular applications - - 3

Module-1 – HTML, CSS and Java Script 10 Hour


HTML Basic Tags -HTML Images and Attributes - HTML Lists - HTML Block Level – Inline Elements - HTML Forms - CSS - CSS Colors - CSS Background and Border - CSS Selectors - CSS Text and
Fonts - Debugging in CSS - Box Model - CSS Position - CSS Float - Display Property, Java Script- Introduction, Functions, Arrays, OOP, XMLHttpRequest()
Module-2 – Bootstrap 8 Hour
Bootstrap - Bootstrap Web Design - Bootstrap Modals - Modals-2 - Bootstrap Cards - Bootstrap Cards - Bootstrap Nav Bar - Grid System - Bootstrap Header Section - Bootstrap Modals - Bootstrap
Cards - CSS Z-Index - Z-Index Project - Image Gallery - Forms
Module-3 – React JS 9 Hour
React - React vs Vanilla JavaScript - Setting up our Development environment - Look at React Official Documentation - Pure React - Handling Events – state - Creating a state with useState - Set -
Adding open-close button- React Developer Tools - Updating state based on current state.
Module-4 – Angular JS 9 Hour
Angular - Angular Project Files - Angular Development Environment - First Application in Angular JS - Angular App Structure - First Project Edit - Using Bootstrap for Styling - Angular Basic Features -
Angular apps Loadded and Started - Components in Angular - Creating New Component with CLI - Working with Template in Components - Working with Styles in Component - Using Selector - Data
Binding - String Interpolition - Property Binding- Event Binding - Two Way Binding.
Module-5 – Angular Data Binding 9 Hour
Angular Data Binding - Creating Class for Data Binding - Creating New Component - Property Binding - Class Binding - Style Binding - Event Binding - KeyUp Event - Two Way Binding – Pipes.
Handling Template Driven Form: Preparing the Form - Validation with NgModel - Validation Rule to Controls Adding - Validation Messages Demonstration - Customized Error Messages - Method of
Validation Messages Demonstration with - Validation with NgForm - Adding a Validation Rule to the Form.
205
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. HTML and CSS: Design and Build Websites, by Jon Duckett, First edition, 2011. 3. Sridhar Rao Chivukula; Aki Iskandar, Web Development with Angular and Bootstrap:
2. Jake Spurlock, Bootstrap: Responsive Web Development, First Edition, O'Reilly Embrace responsive web design and build adaptive Angular web applications, 3rd
Learning
Media, 2013 edition, PACKT Publishing Limited, 2019
Resources
4. . David B. Copeland, Rails, Angular, Postgres, and Bootstrap: Powerful, Effective, and
Efficient Full-Stack Web Development, Pragmatic Bookshelf Publication, 2016

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. P. Gunaseelan, Senior Technical Expert, M.S.C Ltd 1. Prof. Ch. Sudhakar, NIT, Warangal. 1. Dr. C. Jothikumar, SRMIST

206
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE586T Course REST APIs DEVELOPMENT USING SPRING FRAMEWORK Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: introduce basic concepts of Spring Framework
CLR-2: understand Development process of spring framework
CLR-3: familiarize Exception handling and HATEOAS for RESTful Services
CLR-4: understand filtering and versioning in RESTful services
CLR-5: understand Development process of JPA

Course Outcomes At the end of this course, learners will be able to: Programme Outcomes
(CO): (PO)
1 2 3
CO-1: build a Web Application, REST API and Full Stack Application using Spring Boot and Spring Frameworks 3 - 3
CO-2: apply the Best Practices in Developing Java Spring Applications 3 - 3
CO-3: develop a RESTful service capable of handling exceptions. 3 - 3
CO-4: apply Filtering and versioning in RESTful Service 3 - 3
CO-5: develop RESTful CRUD Applications Using JPA. 3 - 3

Module-1 –Foundations of Spring Framework 9 Hour


Spring Introduction - Spring IOC, DI - Spring IOC: practical demonstration - Spring DI : practical demonstration - JSON Overview - JSON practical example - Spring Annotations theory - Spring
Annotations practical - Spring Application Properties - Spring Starter Parents theory - Spring Starter Parents practical demonstration - Spring Starter Web - Spring Starter JPA, Starter Actuator
Module-2 - Spring Boot: From Development Tools to CRUD Operations 9 Hour
Spring Dev Tools - Spring Hello World Project - Spring Boot AOP, Spring Boot Before - After Advice - After Returning Advice - After Throwing Advice - Spring Boot JDBC theory steps - Spring Boot
JDBC practical demonstration - Spring Boot H2 database theory - Spring Boot H2 database practical setup - Spring Boot CRUD operations flow - Spring Boot CRUD operations practical
Module-3 - Advanced RESTful Service Development with Spring MVC 9 Hour
Dispatcher Servlet, Enhancing the Hello World Service with a Path Variable - Implementing the POST Method to create User Resource - Implementing Exception Handling- 404 Resource Not
Found - Arithmetic, Logical & Relational Operators - Implementing Generic Exception Handling for all Resources, Implementing DELETE Method to Delete a User Resource - Implementing
Validations for RESTful Services - Hateos Theory - Implementing HATEOAS for RESTful Services
Module-4 Advanced Topics in RESTful Services and API Management with Spring Boot 9 Hour
Internationalization theory, Internationalization of RESTful Services - Configuring Auto Generation of Swagger Documentation - Introduction to Swagger Documentation Format - Spring Boot
Actuator overview - Monitoring APIs with Spring Boot Actuator - Static Filtering, Implementing Static Filtering for RESTful Services - Dynamic Filtering - Implementing Dynamic Filtering for RESTful
Services - Versioning Overview, Versioning RESTful Web Services-Basic Approach With URIs - Authentication overview - Implementing Basic Authentication with Spring Security - Connecting
RESTful Services to JPA, Updating GET Methods on User Resource to Use JPA
Module-5 –JPA Integration and RESTful CRUD Operations 9 Hour

207
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Updating POST and DELETE methods on User Resource to use JPA - Creating Post Entity - Many to One Relationship with User Entity theory - Many to One Relationship with User Entity practical -
Implementing a GET service to retrieve all Posts of a User Implementing POST Service to Create a Post for a User - Restful CRUD application using JPA theory - Restful CRUD application using JPA
practical steps - Student Management System CRUD web app theory , Student Management Create, Read theoretical steps - Student Management Create implementation - Student Management
Read implementation - Student Management Update, Delete theoretical steps - Student Management Update, Delete implementation

Learning 1. Craig Walls , Spring in Action, Manning Publication, Fifth edition(2018) 2. https://docs.spring.io/
Resources

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Mariappan Vaithilingam, Brahmarsive Inc, Bengaluru, India Experts from Great Learning 1.Dr.T.Senthil Kumar, SRMIST

208
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE587T Course FULL STACK APPLICATION DEVELOPMENT USING Course E PROFESSIONAL ELECTIVE L T P C
Code Name REACT AND SPRING FRAMEWORK Category 3 0 0 3
Pre-requisite Nil Co-requisite Nil Progressive Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards NA

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: develop Full Stack Application with React and Spring
CLR-2: become familiar with the functionality of Spring Framework and React
CLR-3: learn to connect REST API to JPA/Hibernate with Spring Boot
CLR-4: understand the best practices in designing RESTful web services
CLR-5: implementing security features for an application.

Course Outcomes At the end of this course, learners will be able to: Programme Outcomes
(CO): (PO)
1 2 3
CO-1: develop FULL STACK Application using React and Spring Boot. 3 - 3
CO-2: create an application using React, Bootstrap, and session-based authentication. 3 - 3
CO-3: develop a project that combines RESTful services implemented with Spring Boot and a front-end developed using React. 3 - 3
CO-4: apply Spring Security for RESTful services 3 - 3
CO-5: implement and manage JWT resources 3 - 3

Module-1 –Full Stack Application Development with React 9 Hour


Understanding Full Stack Application Architecture - Quick Overview of modern JavaScript - Creating React Application - Creating React Components - React Forms introduction, Creating React forms
- Generating Welcome Component - Generating and Setting up Login Component, Understanding Event Binding - Adding click event on Login Page - Adding Hardcoded Authentication to Logic
Component - Implementing Routes for Login - Implementing Routes for Welcome and Error Components - Implementing Routing from Login to Welcome Component - Adding Route Parameter for
Welcome Component
Module-2 –Building a Responsive and Secure Web Application with React 9 Hour
To do list functional components theory, Create List Todos Functional Components - Create a Link to Todos in Welcome Component - Understanding Bootstrapping with React application - Adding
Bootstrap Framework - Creating Components for Menu and Footer, Using Bootstrap to Create a Menu with Navigation Links - Styling Footer - Styling Other Components with CSS and Bootstrap -
Good Practice - Use RouterLink instead of href for Routes ,Using Session Storage to Store User Authentication Token - Enabling Menu Links Based on User Authentication Token - Implementing
Logout to remove User Authentication Token - Securing Components using Route Guards - What is Web Service Web Service - Key terminologies
Module-3 –Building a RESTful Services Project with Spring Boot and React Integration 9 Hour
Initializing a RESTful Services Project with Spring Boot, Connecting React Frontend with Restful API theory - Connecting React Frontend with Restful API practical - Designing RESTful Services for
Todo Resource - Creating REST API for retrieving Todo List, Connecting React Frontend with Todo List RESTful Service - Creating REST API to delete a Todo - 1 - Create DELETE Request Method -
Adding Delete Todo Feature to React Frontend - Creating Todo Component and Handle Routing - , Designing Todo Page with Bootstrap Framework - Creating Retrieve Todo Service and Connect
React Frontend - Improve Todo Page Appearance - Creating REST API for Updating Todo - PUT Request Method - Creating REST API for Creating a Todo - POST Request Method, RESTful Web
Services - Best Practices
Module-4 – Enhancing Todo Application with React and Spring Security Integration 9 Hour
209
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Implementing Update Todo Feature in React Frontend - Implementing New Todo Feature in React Frontend - Improving Todo Form - Validation - Form Submit on Enter - ngSubmit, Enhancing
Validation Messages on Todo Page - Setting up Spring SecurityConfigure standard userid - Setting up Spring Security Configure standard password - Configure HttpInterceptor as Provider in App
Module, Create Basic Authentication RESTful Service in Spring Boot - Assignment to check the understanding of the following: Implement Spring Security in RESTFul Service - Authentication
introduction - Create React Basic Authentication Service - Connect Login Page to Basic Authentication Service theory - Connect Login Page to Basic Authentication Service - Best Practice - Use
Constants for URLs , TOKENS
Module-5 –Building a Secure Web Application with JWT Integration 9 Hour
Importing JWT Framework into Eclipse part 1- Importing JWT Framework into Eclipse part 2 - Executing JWT Resources - Get Token and Refresh Token part 1 - Executing JWT Resources - Get
Token and Refresh Token part 2 - Understanding JWT Spring Security Framework Setup - Creating a New User with Encoded Password part - Using JWT Token in Angular Frontend part 1- Using
JWT Token in Angular Frontend part 2 - Setting up Todo Entity and Populating Data part - Connecting GET REST APIs to JPA Repository part 1- Connecting GET REST APIs to JPA Repository part 2
- Connecting POST, PUT and DELETE REST APIs to JPA Repository part

Learning 1. Full Stack Development with Spring Boot and React: Build Modern and 2. https://docs.spring.io/spring-framework/docs/current/reference/html/
Resources Scalable Full Stack Applications Using the Power of Spring Boot and 3. https://reactjs.org/docs/getting-started.html
React, 3rd Edition (2022)

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Mariappan Vaithilingam, Brahmarsive Inc, Bengaluru, India 1.Dr. Narayana Darapaneni, Great Learning 1.Dr.T.Senthil Kumar, SRMIST

210
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE588T Course DEPLOYING FULL STACK APPLICATION Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: understand Full stack Application architecture and cloud.
CLR-2: develop full stack application to interact with the Rest of full web services
CLR-3: create full stack web application with the visually appealing user interface.
CLR-4: develop a secure, full-stack Todo application
CLR-5: build a full-stack Todo application with JWT-secured Angular frontend, Spring Boot JPA backend on AWS.

Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: create full stack application using Spring and React. 3 3 3
CO-2: develop front-end using Angular and Rest API. 3 - 3
CO-3: develop back-end using Spring boot and Rest API. 3 - 3
CO-4: explore authentication and authorization using JWT. 3 3 3
CO-5: deploy full stack application on AWS cloud. 2 - 3

Module-1 – Introduction 9 Hour


Getting Started with AWS, Creating root account AWS. Creating IAM User for AWS account AWS Resources creation by Elastic Beanstalk Monitoring AWS Billing Setting AWS Environment
Understanding Full Stack Application Architecture Quick Overview of modern JavaScript Creating React Application Creating React forms, generating welcome component and setting up login
component Implementing routes for login Adding routes parameter for welcome component Create List Todo Functional Component
Module-2–Bootstrap Framework 9 Hour
Adding Bootstrap Framework and Creating Components for Menu and Footer Styling Footer and Other Components with CSS and Bootstrap Using Session Storage to Store User Authentication
Token Enabling Menu Links Based on User Authentication Token Good Practice - Use RouterLink instead of href for Routes Implementing Logout to remove User Authentication Token What is Web
Service Web Service - Key terminologies Securing Components using Route Guards Initializing a RESTful Services Project with Spring Boot Designing RESTful Services for Todo Resource Creating
REST API for retrieving Todo List Connecting React Frontend with Todo List RESTful Service.
Module-3 – REST API Operations 9 Hour
Creating REST API to delete a Todo - 1 - Create DELETE Request Method Creating REST API to delete a Todo - 2 - Execute DELETE Request Method Adding Delete Todo Feature to React
Frontend Creating Todo Component and Handle Routing Designing Todo Page with Bootstrap Framework Creating Retrieve Todo Service and Connect React Frontend Improve Todo Page
Appearance Creating REST API for Updating Todo - PUT Request Method Creating REST API for Creating a Todo - POST Request Method RESTful Web Services - Best Practices Implementing
Update Todo Feature in React Frontend Implementing New Todo Feature in React Frontend.
Module-4 – RESTful services 9 Hour

211
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Improving Todo Form - Validation and Form Submit on Enter - ngSubmit Enhancing Validation Messages on Todo Page Setting up Spring Security Configure standard userid and password Configure
HttpInterceptor as Provider in App Module Create Basic Authentication RESTful Service in Spring Boot Create React Basic Authentication Service Connect Login Page to Basic Authentication Service
Best Practice - Use Constants for URLs and TokensImporting JWT Framework into Eclipse part 1 Importing JWT Framework into Eclipse part 2 Executing JWT Resources - Get Token and Refresh
Token part 1 Executing JWT Resources - Get Token and Refresh Token part 2
Module-5 –JWT Spring 9 Hour
Understanding JWT Spring Security Framework Setup Creating a New User with Encoded Password part Using JWT Token in Angular Frontend part 1 Using JWT Token in Angular Frontend part 2
Setting up Todo Entity and Populating Data part Connecting GET REST APIs to JPA Repository part 1 Connecting GET REST APIs to JPA Repository part 2 Connecting POST, PUT and DELETE
REST APIs to JPA Repository partDeploying Java REST API Backend to AWS Elastic Beanstalk Quick Introduction to AWS Simple Storage Service - S3 Deploying React Frontend to AWS S3 Static
Website Running the entire Full Stack deployed application

Learning 1. https://docs.aws.amazon.com/ 5. https://docs.aws.amazon.com/


Resources 2. https://docs.aws.amazon.com/#user_guides 6. https://docs.aws.amazon.com/#user_guides
3. https://docs.aws.amazon.com/#tutorials 7. https://docs.aws.amazon.com/#tutorials
4. https://aws.amazon.com/architecture/this-is-my-architecture/ 8. https://aws.amazon.com/architecture/this-is-my-architecture/

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 25% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 20% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 15% - - -
Level 6 Create - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Mariappan Vaithilingam, Brahmarsive Inc, Bengaluru, India 1.Dr. Narayana Darapaneni, Great Learning 1.Dr.T.Senthil Kumar, SRMIST

212
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE589T Course MOBILE APPLICATION DEVELOPMENT Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: analyze various mobile technologies and create basic mobile apps.
CLR-2: design, implement and deploy mobile applications for Android OS.
CLR-3: create advanced application involving graphics, animation, images, and video in android.
CLR-4: develop and deploy mobile applications for iOS.
CLR-5: develop and deploy mobile applications for windows OS.

Course Program Outcomes (PO)


At the end of this course, learners will be able to:
Outcomes (CO): 1 2 3
CO-1: assess various mobile technologies and develop basic Android application. 1 - 1
CO-2: create applications in android and publish the application 2 - 2
CO-3: create advanced android applications integrating maps and graphics - - 3
CO-4: deploy and publish IOS applications 2 - 2
CO-5: deploy and publish Windows applications 2 - 2

Module-1 - Introduction to ANDROID 9 Hour


Introduction to mobile technologies, mobile operation systems - pros and cons, Introduction to Android, Features, Architecture, UI Widgets and Events handling, Layouts, Application structure, Android
Manifest file, Creating Android applications
Module-2 - Building Blocks and Database 9 Hour
Introduction to Activities and Intents - Understanding Activity life cycle, Linking Activities, Passing Data, Toast, displaying a Dialog Window and Notifications, Content Provider, Services, Broadcast
receiver, Introduction to SQLite database, Event Handling, Deploying and publishing application
Module-3 - Location Services and Animation 9 Hour
Location Services and Maps and Google Maps. Graphics and Animation Working with Graphics, Using the Drawable Object, Using the Shape Drawable object, Hardware Acceleration, Audio, Video
and Camera, Use Media Player, Recording and Playing sound, Using Camera, Recording Video.
Module-4 - Introduction to IOS 9 Hour
Introduction to iPhone, MVC Architecture, View Controller - Building the UI and Event handling, Application life cycle, Tab Bars, Story Boards and Navigation Controllers, Table View, Push Notification,
Database handling, Deploying and publishing application.
Module-5 – Windows Mobile App Development 9 Hour
Introduction to Windows Phone 8, Application Life cycle, UI Designing and events, Building, Files and Storage Network Communication, Push Notification, Background Agents, Maps and Locations,
Data Access and storage, Deploying and Publishing the app.

213
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Dawn Griffiths,Head First Android Development: A Brain-Friendly Guide, 3rd Edition, 4. Bill Phillips, Android Programming: The Big Nerd Ranch Guide, 5th
November 2021. Edition, May 2022.
Learning 2. Barry Burd,Android Application Development All-in-One For Dummies,3rd Edition, July 5. Ahmad Sahar, iOS 16 Programming for Beginners - Seventh Edition,
Resources 2020.. Nov 2022.
3. Christian Keur,iOS Programming: The Big Nerd Ranch Guide,7th Edition, April 2020. 6. Andrew Whitechapel Sean McKenna, Windows Phone 8 Development
Internals, Microsoft Press, 2013.

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Umesh Goyal, Senior Manager, Presales India, 1. Prof. Anand, East Point College of Engineering and Technology, 1. Dr. J. Selvin Paul Peter, SRMIST
Broadcom Bangalore
2. Dr. K. R. Jansi, SRMIST

214
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE590T Course AGILE AND DevOps Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department Computing Technologies Data Book / Codes / Standards NA

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the process models of agile methodologies
CLR-2: design an application by adopting Agile methodologies
CLR-3: understand the various concepts of DevOps
CLR-4: implement container-based application development and management using DevOps tool.
CLR-5: build collaborative applications using Agile and DevOps

Programme Outcomes
Course
At the end of this course, learners will be able to: (PO)
Outcomes (CO):
1 2 3
CO-1: demonstrate understanding of the different process models in agile methodologies. 3 - -
CO-2: develop an application using agile methods for efficient project management 3 2 -
CO-3: assess the challenges and opportunities associated with DevOps 3 - -
CO-4: apply container-based application development and management using DevOps tool. - 2 3
CO-5: demonstrate web applications using Agile and DevOps - - 3

Module-1 –Foundations of Agile Development 9 Hour


Introduction to Agile Development - Understanding the Origins and Evolution of Agile - Agile Manifesto: Values and Principles - Agile Methods Overview: Scrum, XP, Kanban, Lean. Agile Principles
and Practices- Agile Roles: Scrum Master, Product Owner, Team Members - Agile Practices: Sprint Planning, Daily Stand-ups, Sprint Review, Retrospective - Continuous Integration and Test-Driven
Development (TDD) - Agile Estimation and Planning Techniques – Tutorial on scrum master
Module-2 –Advanced Agile Concepts 9 Hour
Introduction to Large-Scale Scrum (LeSS) and Scaled Agile Framework (SAFe) - Distributed Agile Teams: Challenges and Best Practices - Agile at Enterprise Level: Portfolio Management and
Release Planning. Agile Leadership and Culture- Servant Leadership in Agile Organizations - Creating a Culture of Collaboration and Continuous Improvement - Agile Transformation: Strategies and
Challenges – Tutorial on Jira
Module-3 –Introduction to DevOps 9 Hour
Definition and Evolution of DevOps - Core Principles: Culture, Automation, Measurement, Sharing (CAMS) - DevOps vs. Traditional IT Operations: Contrasts and Similarities. DevOps Practices and
Tools - Infrastructure as Code (IaC) and Configuration Management- Tutorial on CI/CD(GitLab)
Module-4 –DevOps Application Management and Tools 9 Hour
Docker Engine Architecture, Docker Image, Basic Container Operations, Interacting with a Running Container, Inspecting a Container, Kubernetes Architecture, Kubernets -Scheduling, Logging &
Monitoring, Cluster Maintenance, Security &Storage, Choosing Kubernetes infrastructure, Creating Helm charts- Tutorial on working with Docker images and using kubernetes for deployments.
Module-5 –Collaborative Application Development 9 Hour

215
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
DevOps Foundations and Automatic Testing, Strategy for Application Deployment, Monitoring, Introduction to GIT, Jenkins, Continuous Integration and Continuous Delivery (CI/CD) Pipelines -
Automated Testing, Deployment, and Monitoring Tools -Synergies between Agile and DevOps Methodologies - DevOps in Agile Development Lifecycle: From Planning to Operations. Case study-
Develop 3 tier web applications using agile and DevOps-Tutorials on Jenkins tool.

1. James Shore and Shane Warden," The Art of Agile Development", O'Reilly Media, Inc., 4. Len Bass, Ingo Weber, Liming Zhu, “DevOps: A Software Architect's
2021. Perspective”, Addison-Wesley, 2015
2. Robert C. Martin, "Agile Software Development, Principles, Patterns, and Practices", PHI, 5. Sanjeev Sharma, The DevOps Adoption Playbook: A Guide to Adopting
Learning
2002 DevOps in a Multi-Speed IT Enterprise, Wiley, 2017.
Resources
3. Gene Kim, Jez Humble, Patrick Debois, John Allspaw and John WillisJason Bell, The 6. Mokhtar Ebrahim, Andrew Mallett, “Mastering Linux Shell Scripting: A
DevOps Handbook, IT revolutionPress, 2016. practical guide to Linux command-line, Bash scripting, and Shell
programming”, Packt, 2018.

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Suresh Malai, HCL Tech 1. Dr. S. Kaushik, ICFAI Tech, ICFAI Foundation for Higher Education (IFHE) 1. Dr. J. Kalaivani, SRMIST

2. Dr. V. Deeban Chakravarthy, SRMIST

216
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE591T Course ADVANCED DATA VISUALIZATION Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the basic of data visualization through Tableau
CLR-2: gain knowledge on maps and plotting maps with tableau
CLR-3: get introduced with plat and charts for data visualization
CLR-4: infer the insights of problem statement by story and related techniques
CLR-5: know about VizQL, and Tableau Prep

Programme Outcomes
Course
At the end of this course, learners will be able to: (PO)
Outcomes (CO):
1 2 3
CO-1: visualize the various forms of data to understanding 3 - -
CO-2: picturize data through various maps and Level of Details 2 - -
CO-3: plot different graphs and reveal the insights of the data 3 - -
CO-4: envisage the problem statement by creating stories and dashboards 3 3 -
CO-5: create dashboards, perform data management and perform data analytics with prep 3 3 3

Module-1 – Introduction to Tableau 9 Hour


Introduction to Tableau - Data Connection using Tableau Desktop,Visual Analytics- Basic ChartsDataGranularity,Groups&Sets,Filters,Calculations in Tableau - Types of Calculations,Operators and
syntaxConventions,Quick Table Calculations,Date Math, Data Aggregations, Custom aggregations and ratios, Organising Data, Formatting Data using labels and ToolTip, Annotations, Trendline, Reference
line, K Means Clusters. Tutorial 1 : Perform Sorting, Filtering and Grouping techniques in Tableau, Tutorial 2: Using the problem statement perform the tableau calculations
Tutorial 3: Tutorial 1: Identify the trends in given dataset using Tableau
Module-2 – Map Boards and Calculated Parameter 9 Hour
Forecasting, confidence interval, Reference lines and bands, Working with Maps,Plotting Latitude and longitude, Working with Unrecognized Locations, Working with coordinate points, Customizing
geocoding, polygon maps , WMS: web mapping services, Plotting points on images and generating coordinates from them , Map box, WMS map, LOD Expressions, Aggregation and Replication using LOD,
Nested LOD expressions and Levels of details, Parameters in detailed Parameters in calculations, Using parameters with filters, Column selection parameters, Chart selection parameters, Parameters in the
reference line. Tutorial4 : Create Map Project using Tableau, Tutorial5 : Handle Unidentified/Unrecognized Locations in map. Tutorial 6: Tableau project using Parameters
Module-3 – Advanced Visual Analytics 9 Hour
Histogram, Single axes graph, Dual axes graphs, Box plot, Funnel Chart, Waterfall Chart, Pareto Chart, Tree Map, Heat Map, Market Basket Analysis (MBA), MBA with Example, Dashboards and its
relevance, Building a Dashboard, Interactive Dashboard, Action Based Dashboard, Formatting, Dashboard, Legends and Highlights in Dashboards
Tutorial 7 : Explore the problem statement and find insights using appropriate charts, Tutorial 8: Explore MBA scenario using Tableau, Tutorial9: Create first dashboard and use action.
Module-4 – Story Dashboard 9 Hour
217
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Create a Story, Adding Story Points, Understanding Story Points, Formatting Story, Visualizations in Story, Adding Annotations and Captions in Story and Dashboards, Relevance of Description points,
Actions in Dashboard and Story, Highlight Actions, URL Actions, Filter Actions, Best Practices in Dashboard, Best Practices in Story, Joins in Detail, Joining different sources, Data blending,,Publishing Data
source. Tutorial10: Create the first story board, Tutorial 11: Using problem statement create a story to identify insights , Tutorial 12: Create a Datasource and Publish in tableau public
Module-5 – Creative Dashboards 9 Hour
Creating Dashboards for device, Dashboard for Mobile device, Tableau Architecture , Tableau Server, What is VizQL, Relevance of VizQL, Tableau Online, Publishing Workbook, Data Management, AI in
Tableau Online, Ask Data, Explain Data, Introduction to Tableau Prep, Combine join, shape, and clean data for analysis, Examples with Tableau Prep, Examples with Tableau Prep, Introduction to Data
Analysis using Prep, Create a analytic Workflow. Tutorial 13: Create a dashboard for different devices, Tutorial 14: Explore free Trial on Tableau Online
Tutorial 15 :Create your analytic workflow using prep and connect to tableau

1. Alexander Loth (2019), Visual Analytics with Tableau, Wiley 3. Ryan Sleeper (2018). Practical Tableau: 100 Tips, Tutorials, and Strategies from a Tableau
2. Marlin Meir, Mastering Tableau 2023 - Fourth Edition: Implement advanced Zen Master
Learning business intelligence techniques, analytics, and machine learning models with 4. Business Information Visualization by Tegarden, D. P.. Communications of the AIS, 1(4): 1-
Resources Tableau 38.1999.
5. Visual Representation: Implications for Decision Making by Lurie, N.H. and C.H.
Mason.Journal of Marketing, 71(1): 160-177. 2007

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Final Examination
(40% weightage)
Formative Life Long Learning
CLA-1 Average of unit test CLA-2 –
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Rohan Rupesh Gurubhaiye, Senior Data Scientist, Great 1.Dr.Chitra, MIT, Guindy Campus
1.Dr.G.Maragatham , SRMIST
Learning

218
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE592T Course STATISTICAL MACHINE LEARNING Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards NA

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: grasp the mathematical concepts necessary for carrying out machine learning
CLR-2: comprehend data handling techniques for executing machine learning tasks.
CLR-3: familiarise various supervised learning algorithms
CLR-4: understand the different algorithms used in unsupervised learning.
CLR-5: grasp the foundational concepts of Neural networks.

Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: apply suitable mathematical concepts to carry out machine learning 3 - -
CO-2: acquire and process data for performing machine learning tasks. 3 - -
CO-3: choose an apply appropriate supervised learning model 3 - -
CO-4: determine the suitable type of unsupervised learning for the given problem. 3 - -
CO-5: implement Neural network algorithms on applications 3 - -

Module-1 – Fundamentals of Machine Learning 9 Hour


Linear Algebra - matrix vector operations, Eigen Values, Eigen Vectors; Orthogonality; Gaussian distribution; Gradient Descent; Prior probability; Bayes rule; Gaussian normal distribution
Role of machine Learning in computer science and problem solving; problem formulation; Role of Loss Functions and Optimization; Types of machine learning.
Module-2 – Data Management 9 Hour
Acquisition; Representation; Pre-processing; transformation; Principal Component Analysis; Autoencoders; Overfitting; Underfitting, Data Management using NumPy
Module-3 – Supervised Learning 10 Hour
Regression - Linear, Logistic, Ridge; Decision tree classifiers; Support Vector Machines; Naïve Bayes classifier; Random Forest; AdaBoost; Gradient Boost; Multi-Layer Perceptron; Exploring
Supervised Learning using Pandas and Sci-kit Learn
Module-4 – Unsupervised Learning 10 Hour
Clustering - k-means, Hierarchical, DBSCAN; Association – Apriori, FP-growth; Applications, Exploring Unsupervised Learning using Pandas and Sci-kit Learn
Module-5 – Neural Networks 7 Hour
Types of Network Architectures, Feed forward Networks, Activation functions, Linear Separability problem, Back Error Backpropagation, Case studies in Machine Learning

219
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. Marc Peter Deisenroth, A. Aldo Faisal, Cheng Soon Ong, Mathematics 4. Ian Goodfellow, Yoshoua Bengio, and Aaron Courville Deep Learning MIT Press Ltd,
Resources for Machine Learning, Cambridge University Press (23 April 2020) Illustrated edition
2. Tom M. Mitchell- Machine Learning - McGraw Hill Education, 5. Christopher M. Bishop Pattern Recognition and Machine Learning - Springer, 2nd
International Edition edition
3. Aurélien Géron Hands-On Machine Learning with Scikit-Learn, Keras, 6. Trevor Hastie, Robert Tibshirani, and Jerome Friedman - The Elements of Statistical
and TensorFlow, O'Reilly Media, Inc. 2nd Edition Learning: Data Mining, Inference, and Prediction - Springer, 2nd edition

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100% 100% 100%

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Mariappan Vaithilingam, Brahmarsive Inc 1. Dr. H. Khanna Nehemiah, Anna University, Chennai 1. Dr. K. Vijaya, SRMIST

220
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE593T Course USER EXPERIENCE DESIGN THINKING Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards NA

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: apply user-centered design principles to enhance user experiences
CLR-2: utilize foundational principles of Human-Computer Interaction (HCI) heuristics
CLR-3: develop impactful user interfaces through utilization of design systems
CLR-4: test and assess UI/UX designs to ensure effectiveness and user satisfaction
CLR-5: build a personalized design portfolio to showcase learnings

Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: develop design concepts based on clearly defined goals and scenarios. - 2 -
CO-2: utilize innovative frameworks for UI design. 2 - 3
CO-3: leverage design tools for creating effective user interfaces. - 3 2
CO-4: utilize testing tools for evaluating design effectiveness. - 2 -
CO-5: develop design use cases and prototypes to address real-world challenges. - 2 2

Module-1 – UI/UXFundamentals 9 Hour


Fundamentals of User Experience Design - User Experience Design for Business Applications • Design Thinking and Human-centered Design Process • Establishing a Business Case for UI/UX
Design, User Personas • Empathy Maps and User Journey Mapping • User Stories and Storyboards
Module-2 - User Experience Design and Engineering 9 Hour
User Experience Design Methods: Conceptual Models, User Models • Systems Thinking and Innovation Frameworks (Mental Models, Feedback Loops) • Wireframing, Prototyping and Information
Architecture, Design Principles & Heuristics • Design Standards & Guidelines • Usability & Accessibility Studies, Gestalt’s Principles of Design • User Interface Design & Design Systems. Case
based discussion.
Module-3 - User Interface Design 9 Hour
Branding through UI Design, Introduction to Figma, Figma training - Color, typography, proximity, contrast issues • Understanding hierarchy issue, scale issues, balance/ alignment issues, emphasis
dominance issues. Case based discussion.
Module-4 - Design Testing and Evaluation 9 Hour
Design Testing and Evaluation Method • Designing for Mobile Applications (iOS/Android) and Progressive Web Applications • HCI in Software Engineering • User Experience Metrics • Conversion
Rate Optimization and A/B Testing. Case based discussion.
Module-5 – Design Case Study 9 Hour
Develop an End-to-End Design Experience and Build Solutions Based on Real-World Problems.

221
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. Introduction to Design Thinking for UX Beginners: 5 Steps to Creating a Digital 5. Hasso Plattner, Christoph Meinel and Larry Leifer (eds), "Design Thinking:
Resources Experience That Engages Users with UX Design, UI Design, and User Rese, UIJUN Understand – Improve– Apply", Springer, 2011
PARK,SBN: 9798218198954 Publisher: Uijun Company. 6. Jeanne Liedtka , Andrew King, Kevin Bennett , “Book - Solving Problems with
Design Thinking - Ten Stories of What Works” (Columbia Business School
2. Norman, D. (2013). The design of everyday things: Revised and expanded edition. Basic Publishing), 2013
books. 2 Gothelf, J. (2013). 7. Maurício Vianna, Ysmar Vianna, Isabel K. Adler, Brenda Lucena, Beatriz Russo,
3. Lean UX: Applying lean principles to improve user experience. " O'Reilly Media, Inc.". “Design thinking: Business Innovation” MJV Press, 2011
4. Roger Martin, "The Design of Business: Why Design Thinking is the Next Competitive 8. Burgelman, Christensen, and Wheelwright, “Strategic Management of Technology
Advantage”, Harvard Business Press , 2009. and Innovation”5th Edition, McGraw Hill Publications, 2017

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life-Long Learning Final Examination
CLA-1 Average of unit test CLA-2 (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Hareesh, AdTech, Walmart. 1. Dr. Mohammed Javed, IIIT Allahabad. 1. Dr. M. Suchithra, SRMIST
2. Dr. K. Anitha, SRMIST

222
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE594T Course FULL STACK DEVELOPMENT Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: become knowledgeable about the most recent web development technologies
CLR-2: learn the core concept of developing the front end.
CLR-3: emphasize the basics of spring
CLR-4: develop a comprehensive understanding of building robust, scalable, and efficient spring boot applications.
CLR-5: indulge in authentication, authorization, encryption and common security vulnerabilities

Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: structure the web development architecture and manage databases effectively. 3 - -
CO-2: create user interfaces using the latest technologies. 3 - -
CO-3: exhibit proficiency in planning, developing, and maintaining Spring-based applications using dependency injection. - 3 -
CO-4: develop Spring Boot applications using Hibernate ORM, JDBC connectivity, and perform CRUD operations with JPA Repository. - - 3
CO-5: analyze the security aspects of web development concepts. - - 3
Module-1 Introduction to Web Development. 9 Hour
Understanding Full Stack Application Architecture, Overview of HTML/CSS, Overview of modern JavaScript, Summarization of searching and sorting techniques, Functionalities of array, stack, queue,
tree, graph and linked list operation, RDBMS Fundamentals-relational database design principles, Benefits of using Tables to store data, Relational Algebra, CRUD operations.
Module-2 - User Interface and Front-end Development 9 Hour
HTML5, CSS3, Blocks, Floats and Layouts, Media Queries for Responsive Web Design, Bootstrap Basics, Grid and Fluid Layouts, Responsive Layouts, Interactive Web pages using JavaScript, Unit
Testing Using Mocha and Chai. Building client-side applications with Angular or React, Introduction to component programming, Using routing, Directives, Build single page applications.
Module-3 - Introduction to Spring 9 Hour
Understanding spring framework, Dependency injection in spring, Spring java-based configuration, Dependency injection via setter / constructor, Spring Bean scopes with examples, Autowiring in
spring, Aspect Oriented Programming, Spring MVC Architecture, Advantages and disadvantages of Spring MVC, creating Model, View and Controller layers
Module-4 - Introduction to Spring Boot. 9 Hour
Spring Boot, spring boot-based application using multiple approaches, Dependencies, Annotations, ORM framework, Architecture of Hibernate, Versions and Configurations of Hibernate, Mapping Entity,
Various Hibernate Association mapping works, Working on JDBC using Spring, CRUD Operations implementing JPA Repository.
Module-5 – Spring Security 9 Hour
Setting up Spring Security, configure standard userid, setting up Spring Security, configure standard password, Configure HttpInterceptor as Provider in App Module, Create Basic Authentication RESTful
Service in Spring Boot Authentication introduction, Create React Basic Authentication Service, Connect Login Page to Basic Authentication Service theory, Connect Login Page to Basic Authentication
Service, Best Practice - Use Constants for URLs, TOKENS

223
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. Web Development & Design Foundations with HTML 5 by Terry Felke-Morris, 4. "Learning Web Design: A Beginner's Guide to HTML, CSS, JavaScript, and
Resources Pearson Publication, 2019 Web Graphics" by Jennifer NiederstRobbins,O'Reilly Media,2018
2. Beginning CSS Web Development by simoncollison, Apress,2007 5. "Spring Integration in Action",Iwein Fuld, Jonas Partner, Mark Fisher, Marius
3. "Pro HTML5 and CSS3 Design Patterns" by Michael Bowers, Dionysios Synodinos, Bogoevici,Manning Publishing 2012
and Victor Sumner, Apress, 2017.

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life-Long Learning Final Examination
CLA-1 Average of unit test CLA-2 (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Navneet kumar, RealPage INC 1. Prof. J. M. Gnanasekar, SVCE, Sriperumbudur 1. Dr. R. S. Ponmagal, SRMIST
2. Dr. T. Senthilkumar, SRMIST

224
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE595T WEB 3.0 E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: learn about the evolution of Web 1.0 to Web 3.0
CLR-2: know about social media and digital platforms
CLR-3: impart strong fundamental knowledge on Blockchain technologies
CLR-4: explore web 3.0 protocol stack and Ethereum decentralized applications
CLR-5: understand the components of Metaverse

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: demonstrate knowledge of the design philosophy behind Web 3.0. 2 2 -
CO-2: analyze the integration of Web 3.0 with existing digital platforms 3 2 -
CO-3: demonstrate expertise in the fundamentals of blockchain technology. 3 - -
CO-4: build an Ethereum decentralized application 3 - 2
CO-5: design augmented reality / virtual reality solution for an application 2 - 1

Module-1 – Design Elements of Web 3.0 9 Hour


HTTP request and response - Web 1.0 – Web 2.0 - Web 3.0 - Design elements of Web 3.0 – Layers of Web 3.0 - Human Computer Interaction – Search engine ecosystem – Search engine working
mechanism - The syntactic web – Semantic web – Search engine advertisements and networks – Web analytics – Machine learning for E-commerce and sales
Module-2 – Social media and Digital Platforms 9 Hour
Social media – Business practices – Emerging business models – Digital platforms: Philosophy and functionalities – Business models - Data privacy concerns for Internet ecosystem – regulation for data
privacy
Module-3 – Blockchain for Web 3.0 9 Hour
Introduction to Blockchain technology – Centralized vs Decentralized system – Layers of Blockchain – Importance of Blockchain – Properties of Blockchain solutions – Blockchain transactions – Distributed
consensus mechanisms
Module-4 – Web 3.0 Protocols 9 Hour
Ethereum – NextGen Blockchain – Design philosophy of Ethereum – Ethereum Network – Components of Ethereum Ecosystem Building a Ethereum DApp – Private Ethereum network - Interplanetary File
system - SmartAnvil: Open source tool for smart contract analysis
Module-5 – Application of Web 3.0 - Metaverse 9 Hour
Evolution of metaverse – Functional blocks – Extended reality – AR/VR for metaverse – XR applications – VR ecosystem – Role of AI, 5G and 6G towards Metaverse

225
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Croft, W. Bruce, Donald Metzler, and Trevor Strohman. “Search engines: Information
retrieval in practice”. Vol. 520. Reading: Addison-Wesley, 2010. 8. Doe, Daniel Mawunyo, Jing Li, Niyato Dusit, Zhen Gao, Jun Li, and Zhu Han.
2. Iankova, Severina, Iain Davies, Chris Archer-Brown, Ben Marder, and Amy Yau. "A "Promoting the sustainability of blockchain in web 3.0 and the metaverse
comparison of social media marketing between B2B, B2C and mixed business through diversified incentive mechanism design." IEEE Open Journal of the
models." Industrial Marketing Management 81 (2019): 169-179. Computer Society (2023).Al-Ghaili, Abbas M., Hairoladenan Kasim, Naif
3. Rohn, Daniel, Peter M. Bican, Alexander Brem, Sascha Kraus, and Thomas Clauss. Mohammed Al-Hada, Zainuddin Bin Hassan, Marini Othman, Jakir Hussain
"Digital platform-based business models–An exploration of critical success factors." Tharik, Rafiziana Md Kasmani, and Ibraheem Shayea. "A review of metaverse’s
Journal of Engineering and Technology Management 60 (2021): 101625. definitions, architecture, applications, challenges, issues, solutions, and future
Learning
4. Fritsch, Lothar. "The clean Privacy Ecosystem of the future internet." Future Internet trends." IEEE Access 10 (2022): 125835-125866.
Resources
5, no. 1 (2013): 34-45. 9. Dudley, John, Lulu Yin, Vanja Garaj, and Per Ola Kristensson. "Inclusive
5. Bikramaditya Singhal, Gautam Dhameja, Priyansu Sekhar Panda “Beginning Immersion: a review of efforts to improve accessibility in virtual reality,
Blockchain : A Beginner’s Guide to Building Blockchain Solutions”,: Apress 2018 augmented reality and the metaverse." Virtual Reality 27, no. 4 (2023): 2989-
6. Imran Bashir: “Mastering Blockchain”, Packt- Birmingham-Mumbai Third Edition A 3020.
deep dive into distributed ledgers, consensus protocols, smart contracts, DApps, 10. M. Zawish et al., "AI and 6G Into the Metaverse: Fundamentals, Challenges and
crypto currencies, Ethereum, and more Future Research Trends," in IEEE Open Journal of the Communications
7. Massimo Ragnedda and Giuseppe Destefanis, “Blockchain and Web 3.0: Social, Society, vol. 5, pp. 730-778, 2024, doi: 10.1109/OJCOMS.2024.3349465.
Economic and Technological Challenges”, Routledge Press

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100% 100% 100%

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Peter Pethururaj, Jio Communications, 1. Dr. Anbuchelian, Anna University, Guindy 1. Dr. B. Baranidharan, SRMIST
Bengaluru

226
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE596T Course SECURITY OPERATIONS AND INCIDENT MANAGEMENT Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: applying NIST Incident Response Standard
CLR-2: understanding the Red Teaming, Blue Teaming & Purple Teaming
CLR-3: understand the security operations and monitoring process
CLR-4: incident response planning
CLR-5: understand investigations process

Program Outcomes (PO)


Course Outcomes (CO): At the end of this course, learners will be able to:
1 2 3
CO-1: apply and implement NIST Incident Repones Standard 2
CO-2: plan the team structure needed for Security Operations 3 1
CO-3: create a monitoring plan for Security Operations 2 3 1
CO-4: setup a standard process for investigating security incidents 2 1
CO-5: implement a forensic analysis and evidence management process 3 2 1

Module 1: Foundations of Incident Response 9 Hour


Incident Response basics -Case study: Equifax - NIST Incident Response lifecycle - Preparing for an incident - Incident Response Charter - Building an Incident Response Policy - Sources of Incidents - Incident
Classification
Module 2: Advanced Incident Response and Recovery Strategies 9 Hour
Incident Containment - Evidence gathering and Handling - Identifying Attacking Hosts - The Golden Hour - Investigations 101 - Investigations: Advanced - Incident Eradication & Recovery - Planning Incident
Recovery
Module 3: Cloud Incident Management and Investigation Strategies 9 Hour
Incidents in Cloud - Cloud Investigations - Evidence management in cloud - Policies and Procedures for Investigations - Chain of Evidence - Investigating a Compromised Machine - Honeypots & Honey
nets - Implementing Honeypots
Module 4: Foundations of Security Operations and Incident Response 9 Hour
SOC Teams - SOC Team structure - SOC Roles & Responsibilities - SOAR - Features and Functions of SOAR - XSOAR - Forensics Basics - Forensics Deep dive
Module 5: Implementing Security Awareness program and Project debrief 9 Hour
Red Teaming - Blue Teaming - Purple Teaming - Writing Incident Reports - Types of Documentations - Trouble Ticketing Systems - File Carving & Binary Analysis - Forensics Investigation Toolkit

227
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. Honeypots: https://www.blumira.com/video/what-is-a-honeypot/ 3. Equifax: https://en.wikipedia.org/wiki/2017_Equifax_data_breach
Resources 2. Forensics: https://onlinedegrees.und.edu/blog/cyber-security-forensics/ 4. Executive Order on Cybersecurity:
https://cyberlaw.stanford.edu/blog/2023/03/thoughts-biden-national-
cybersecurity-strategy

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Aniket Amdekar General Manager, Cyber Defense 1. Dr. V. Arulkumar, Associate Professor, SSN College 1. Dr. M.B. Mukesh Krishnan, SRMIST
Education, Great Learning of Engineering

228
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE597T Course CONTAINERS AND CLOUD DevOps Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning Rationale


The purpose of learning this course is to:
(CLR):
CLR-1: learn and understand how containers impact the development and deployment of software applications
CLR-2: understand why DevOps is needed and has become indispensable to today's infrastructure
CLR-3: modern applications follow an agile process thus requiring frequent updates to be pushed out
CLR-4: predict of deployments and application bundling is key to reduce post deployment failures
CLR-5: infrastructure as code is core to repeatable infrastructure creation and tear down Container orchestration allows customers to scale applications very effectively across platforms

Program Outcomes (PO)


Course Outcomes (CO): At the end of this course, learners will be able to:
1 2 3
CO-1: Install, configure a Docker container system 2 1 3
CO-2: Create a DevOps plan, choose the right tools and implement each phase with CI/CD 3 2 1
CO-3: Apply principles of code version management 3 2
CO-4: Automate build push to IaaS 2 3
CO-5: Apply cloud automation techniques 2 3

Module 1: Introduction 9 Hour


Introduction to Docker Ecosystem, DevOps Toolchain, Git Essentials
Module 2: AWS 9 Hour
Introduction to AWS, AWS Entities, AWS container entities , AWS ECR, AWS ECS, AWS Code Commit, AWS Code Build, Code Deploy, Code Pipeline, Jenkins
Module 3: IaC and Configuration management 9 Hour
Cloud Formation, Terraform, Ansible, Infrastructure automation for Multi service deployment through CloudFormation, workflow management with Terraform, Ansible & Automating management of cloud
services
Module 4 : Observability 9 Hour
IAM, CloudTrail, CloudWatch, CLI, Lambda, Kinesis, S3, IAM (Identity and Access Management), Event Logging and Insights using CloudTrail, Visualizing using CloudWatch ,CLI (Command Line Interface),
Lambda, Creating, deploying, and managing Lambda functions.
Module 5: Containerized workload management 9 Hour
Container Orchestration cluster Introduction to Elastic Kubernetes Service (EKS), Azure Kubernetes service, Containers and multi cloud deployment strategies

229
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning https://aws.amazon.com/ecs/ https://aws.amazon.com/cloudformation/
Resources https://aws.amazon.com/ecr/ https://developer.hashicorp.com/terraform/docs
https://docs.aws.amazon.com/whitepapers/latest/cicd_for_5g_networks_on_aws/ https://www.docker.com/
cicd-on-aws.html https://git-scm.com/doc
https://kubernetes.io/docs/home/

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Partheepan Rudrapathi, CEO, KXE 1. Dr. V. Arulkumar, Associate Professor, SSN College of Engineering 1. Dr. M. Shobana, SRMIST
2. Aniket Amdekar, General Manager, Cyber
Defense Education, Great Learning

230
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE598T Course BIG DATA ANALYTICS AND MICROSERVICES Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: learn about Cassandra
CLR-2: understand Data Analytics & its implementation
CLR-3: learn basics of Hadoop, Hive, AWS EMR, Spark
CLR-4: understand Data Warehousing
CLR-5: learn about limitations of a monolithic application approach

Course Outcomes Program Outcomes (PO)


At the end of this course, learners will be able to:
(CO): 1 2 3
CO-1: implement data analytics solutions using tools like Hadoop, Hive on AWS EMR 2 3
CO-2: implement data warehousing solutions using tools like Spark SQL on AWS EMR 2 1
CO-3: architect solutions using microservices based architectural style 2 3
CO-4: work on microservices to create and deploy a microservices based application 2 1 3
CO-5: develop familiarity of various microservice design patterns 2 3

Module 1: Introduction 9 Hour


Cassandra Core Concepts, Introduction to Bigdata Analytics, Overview of Big Data Tools, Hadoop
Module 2: Amazon Elastic Map Reduce 9 Hour
Amazon Elastic Map Reduce (EMR), Spark Introduction, Spark Architecture, How Spark Handles data Spark on EMR
Module 3: Data Warehousing 9 Hour
Data warehousing, Spark SQL as an ETL tool Handling file formats in Spark SQL, ETL case study Microservices Use Case - ECommerce example Microservices - Deep Dive Components of
monolithic application
Module 4: Microservices 9 Hour
MS - Expectations & Characteristics Components Vs Services Interservice Communication Failure & Operations Data & Compliance The 12 Factor App, Load Balancing for Microservices Event driven
architecture Reactive Extensions Event Sourcing Transactional Logs Security Enforcement Anti Pattern
Module 5: Design Pattern 9 Hour
Design pattern - CQRS Design pattern - Circuit breaker Design pattern - Strangler - SAGA Service Orchestration Service Choreography Time instrumentation Idempotent operations

231
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. https://aws.amazon.com/emr/ 5. https://spark.apache.org/
Resources 2. https://12factor.net/ 6. https://martinfowler.com/bliki/StranglerFigApplication.html
3. https://hadoop.apache.org/ 7. https://hive.apache.org/
4. https://martinfowler.com/bliki/CQRS.html

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Aniket Amdekar 1.Dr. L. Ramanathan, Associate Professor, VIT Vellore 1. Dr. SV Shri Bharathi, SRMIST
General Manager, Cyber Defense Education
Great Learning

232
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE599T Course SECURITY AND ARCHITECTURE Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand Shared Responsibility Model
CLR-2: understand AWS Well Architected Framework
CLR-3: understand Zero Trust Principles
CLR-4: design a network for compliance with standards like PCI DSS
CLR-5: secure GRC Architecture

Course Outcomes Program Outcomes (PO)


At the end of this course, learners will be able to:
(CO): 1 2 3
CO-1: architect operationally efficient, secure applications 2 3
CO-2: architect reliable and high performing applications 2 1
CO-3: architect cost optimized and sustainable applications 2 3
CO-4: discuss and debate pros and cons of architecture 2 1 3
CO-5: design a network that is resilient against attacks such as Ransomware 2 3

Module 1 : Security Architecture Fundamentals 9 Hour


Foundations of Security Architecture - Production, HA & Quarantine Networks - Too Much trust Breaches - Zero trust Masterclass - On Prem to Cloud Migration - Active Directory Architecture
Module 2: Foundations of Security Architecture: From SABSA to Cloud Security Models 9 Hour
Popular Security Architecture frameworks - SABSA - Understanding Network Diagrams - Building a network diagram - Network Security Architecture - Cloud Architecture - Shared Security Model
Module 3: Architectural Security Frameworks and Implementations for Cloud Environments 9 Hour
AWS Well Architected Framework : Operational Excellence Pillar - Application Security Architecture - log Storage architecture - On-Prem, Cloud Based, Hybrid Model Security requirements -
Architecting a Firewall Implementation - TOGAF - O-ESA, OSA
Module 4 : Securing Cloud Platform: Architectural Strategies and Risk 9 Hour
GCP Security Architecture - RTO, RPO planning and measurement - Network Services overview - Defense in Depth
Module 5: Secure Architecture Design for E-Commerce Tech Company 9 Hour
E-Commerce Company Architecture - Tech Company Architecture - Designing an architecture for Security Monitoring (SIEM, Incident Response, Threat Intelligence, UEBA) - Case Study

233
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. https://www.iso.org/isoiec-27001-information-security.html 4. Burp suite: https://medium.com/@ramsha.kamran/burp-suite-tutorial-f3ca5bc3368
Resources 2. NIST Risk Management Framework: https://csrc.nist.gov/Projects/risk- 5. Ransomware: https://www.sans.org/blog/protecting-against-ransomware-from-the-
management/sp800-53-controls human-perspective/
3. PCI DSS: https://www.manageengine.com/network-configuration- 6. About Kali Linux: https://kalilinuxtutorials.com/category/blog/
manager/pci-compliance.html

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Partheepan Rudrapathi, CEO, KXE 1. Dr. V. Arulkumar, Associate Professor, SSN College 1. Dr. M. Shobana, SRMIST
of Engineering
2. Aniket Amdekar, General Manager, Cyber Defense Education 2. 2.
Great Learning

234
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE619T SMART CONVERGENT TECHNOLOGIES E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: state the research challenges and innovation directions in IoT Smart environments
CLR-2: explore the IoT and related future internet technologies
CLR-3: address security, energy issues and IoT protocols convergence
CLR-4: summarize the convergence of IoT enabled technologies
CLR-5: define IoT Standardization and case studies

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: outline the smart environment challenge and innovation direction 3 - -
CO-2: demonstrate the IoT enabled technologies for data collection through sensors 3 - 3
CO-3: analyse the various IoT protocols and their usage 2 - 3
CO-4: compile the innovation using cloud computing, big data and AI 2 - 3
CO-5: implement the concepts in any of the case studies mentioned in real time. 3 - 3

Module-1 - Driving Internet of Things Research 9 Hour


IoT Today, IoT Tomorrow, Time for convergence, Towards the IoT Universe, IoT Vision-Future communication challenges, IP convergence, IoT Layered Architecture, IoT Strategic Research and Innovation Directions,
IoT landscape, IoT Enabling Technologies, IoT Smart Environments and Smart Spaces Creation, IoT Smart-X applications, Electronic Platforms- Arduino, Raspberry Pi, Beagle Bone
Module-2 - IoT and Related Future Internet Technologies 9 Hour
Cloud Computing, IoT and Semantic Technologies, Networking Technology, Communication Technology, Processes-Adaptive and Event -Driven, dealing with unreliable data and processes, highly distributed
process, Data Management-Data Collection and Analysis, Big data, Semantic Sensor networks and semantic annotation of data, virtual sensors
Module-3 - IoT Protocols Convergence 9 Hour
Security, Privacy and Trust, Device Level Energy issues- Low Power Consumption, Energy Harvesting, Future trends and recommendations, IoT Protocols Convergence-MQTT, CoAP, AMQP, REST, JMS, DDS
XMPP
Module-4 - IoT Cloud Convergence 9 Hour
Introduction-Cloud Computing deployment models, How Cloud becomes handy? Application Areas for IoT-Cloud Convergence, Challenges that come with convergence, Architecture for convergence, Integration
of Artificial Intelligence, Big Data, and Cloud Computing with Internet of Things- Role of Artificial Intelligence, Big Data and Cloud Computing in IoT, Integration of Artificial Intelligence with the
Internet of Things Devices, Integration of Big Data with the Internet of Things.
Module-5 - IoT Standardization and Case Studies 9 Hour
Introduction, M2M Service Layer Standardization, IEE and IETF. Case Studies: Smart home, Smart Mobility, Smart Transport, Smart Health, Smart Logistics and Retail, IoT for oil and gas Industry

235
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Ovidiu Vermesan, SINTEF, Norway & Peter Friess, EU and Belgium, Internet of 3. Ovidiu Vermesan and & Peter Friess, “Internet of Things-From Research and Innovation to
Things: Converging Technologies for Smart Environments and Integrated Market Deployment, River Publishers, 2014.
Ecosystems, River Publishers, 2013. 4. Ajay Rana, Arun Kumar, Sachin Dhawan, Sharad Sharma, Ahmed A Elngar, Convergence
Learning
2. Danda B. Rawat, Lalit K. Awasthi, Valentina Emilia Balas, Mohit Kumar and of Deep Learning and Artificial Intelligence in IoT, CRC Press, 2023.
Resources
Jitendra Kumar Samriya, Convergence of Cloud with AI for Big Data Analytics: 5. Parikshit N, Mahalle, Nancy Ambritta P, Gitanjali Rahul Shinde and Arvind Vinayak
Foundations and Innovations, Wiley, 2023. Deshpande, The convergence of internet of things and cloud for smart computing, CRC
Press, 2023.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Mathangi Nageswar, Director - IoT CS Delivery Mgmt, CTS, 1. Dr. S.Ramakrishna, GITAM University 1. Dr. TYJ Naga Malleswari, SRMIST
Chennai
2. Mr. Harishankar, Renault Nissan Automotive India Pvt Ltd, Chennai 2. Dr. P.Ezhumalai, RMD Engineeering College, Chennai 2. Dr. Annapurani K, SRMIST

236
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE620T COGNITIVE INTERNET OF THINGS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: summarize the fundamentals of IoT and Cognitive Computing
CLR-2: define the various technologies and integration of cognitive capabilities into IoT systems
CLR-3: exploit the different evolutions of deep learning for Cognitive IoT
CLR-4: recognize the security challenges in Cognitive IoT platforms
CLR-5: predict the advanced applications of Cognitive IoT

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: determine the basic ethics and its essentials of Cognitive IoT 2 - 3
CO-2: explore the integration of cognitive capabilities of IoT systems 3 - 3
CO-3: illustrate the various deep learning algorithms for Cognitive IoT solutions 3 - 3
CO-4: implement secure cognitive IoT Framework 2 - 3
CO-5: demonstrate the Advanced applications of Cognitive IoT, 3 - 3

Module-1 - Introduction to Cognitive IoT 9 Hour


Overview of IoT- The Trends and Transitions towards the IoT Era- Software-defined Cloud Infrastructures for the IoT Era -IoT Reference Architecture, Demystifying the Cognitive Computing Paradigm, Cognitive
Internet of Things and its Impact on Human Life, The Cognitive IoT: The Platforms, Technologies, and Their Use Cases.
Module-2 - Enabling Technologies for Cognitive Internet of Things 9 Hour
Definition of Software Defined Radio and its Architecture-Understanding of Cognitive Radio-Architecture and its Characteristics-Applications and challenges of Cognitive internet of Things, The Emergence of
Cognitive IoT Systems, Machine Learning for Cognitive IoT Systems, Supervised ML Algorithms, Unsupervised and Semi-supervised Machine Learning Algorithms for Cognitive IoT Systems, Use Cases of Machine
Learning towards Cognitive Systems.
Module-3 - Deep learning for Cognitive IoT Solutions 9 Hour
Briefing Deep Learning, The Significance of Deep Learning Algorithms-Classification -Object Detection -Segmentation, Multilayer Perceptron Neural Network (MLPNN) Backpropagation, Convolutional Neural
Network (CNN), Recurrent Neural Network (RNN), Long Short-Term Memory (LSTM), Generative Adversarial Network (GAN), Deep Belief Network (DBN).
Module-4 - Security of Cognitive IoT Platforms 9 Hour
Sensor Technologies-Different types of sensors used in Cognitive IoT-Importance of data collection and integration-Sensor networks and protocols-Challenges and advancements in sensor technologies, Threats
and vulnerabilities in connected devices, Security in Data and Network layer of Cognitive IoT Framework, Threat Monitoring and Intelligence, Security Concerns in IoT Components, Security Measures for Cognitive
IoT Platforms/Devices-Secure Booting.-Mandatory Access Control Mechanisms-Device Authentication for Networks-Device-specific Firewalls-Controlled Mechanism to Ensure
Application of Security -Patches and Upgrades, Security Threats in Different Use Cases of Cognitive IoT.
237
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Module-5 - Advanced Applications of Cognitive IoT 9 Hour
Wearable Internet of Things-Wireless Body Area Network-WBAN Architecture- Body Sensors-WBAN Technologies-issues and Challenges in WBAN, Localization in WBAN, Cognitive IoT Integration of 5G and edge
computing, NLP methods for Cognitive IoT, CIoT in Healthcare-Remote monitoring and personalized care, CIoT application in agricultures, Smart cities in Cognitive IoT, Future trends and challenges in Cognitive
IoT.

1. Pethuru Raj, Anupama C. Raman, and Harihara Subramanian, Cognitive Internet 5. S. Shanmugavel, M. A. Bhagyaveni and R. Kalidoss, Cognitive Radio-An Enabler for Internet
of Things -Enabling Technologies, Platforms, and Use Cases, CRC Press of Taylor of Things, River Publishers Series in Communications, 2017.
& Francis Group, 2022. 6. K. Hemant Kumar Reddy, Tapas Kumar Mishra, Mir Wajahat Hussain, Diptendu Sinha Roy,
2. JP Patra Gurudatta Verma, Cognitive IoT- Emerging Technology towards Human Handbook of Research on Network-Enabled IoT Applications for Smart City Services, IGI
Learning
Wellbeing, CRC Press Taylor & Francis Group, 2023. Global Publisher, 2023
Resources
3. Mark Fenner, Machine Learning with Python for Everyone, Pearson Education, 7. Dr Ramkumar J and Mr Jegatheesh Kumar G, Cognitive IoT: Internet of Things,
2019. Independently published, 2023.
4. Antonio Gulli, Amita Kapoor, Sujit Pal, Deep Learning with TensorFlow 2 and Keras,
Packet Publishing, 2019.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Mathangi Nageswar, Director - IoT CS Delivery Mgmt, CTS, 1. Dr Surendar M. Assistant Professor; National Institute of 1. Dr. V. Nallarasan, SRMIST
Chennai. Technology, Puducherry.

238
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE621T ADVANCED DISTRIBUTED SYSTEMS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: acquire basic knowledge about distributed systems and its paradigms
CLR-2: introduce different algorithms and consensus in distributed systems
CLR-3: memorize replicated data management and stabilization in distributed systems
CLR-4: obtain knowledge about sensor network and its protocols
CLR-5: gain knowledge about existing real-time distributed systems through use case studies

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: summarize distributed system basics and learn primary concepts 3 - -
CO-2: learn related algorithms for different scenarios 3 - -
CO-3: apply techniques for data management and stabilization 3 - -
CO-4: implementation and integration of distributed sensor network 2 - 3
CO-5: study of real-time use case scenarios 3 - 2

Module-1 - Introduction to Distributed Systems and Its Paradigms 9 Hour


Introduction to Distributed Systems, Models for communication; Time in Distributed System: Introduction, Logical Clocks, Vector Clocks, Physical Clock Synchronization; Mutual Exclusion Algorithm: Solutions on
Message Passing Systems, Token-Passing Algorithm, Solutions on the Shared Memory Model; Distributed Snapshot: Introduction, Properties, Chandy-Lamport Algorithm, Lai-Yang Algorithm.
Module-2 - Graph and Coordination Algorithms and Consensus 9 Hour
Graph Algorithm: Introduction, Routing Algorithm, Graph Traversal, Graph coloring; Coordination Algorithm: Introduction, Leader Election, Synchronizers; Distributed Consensus: Introduction, Consensus in
Asynchronous Systems, Consensus in Synchronous Systems: Byzantine Generals Problem. Paxos Algorithm, Failure Detectors
Module-3 - Replicated Data Management and Self-Stabilizing Systems 9 Hour
Replicated Data Management: Introduction, Architecture, Data centric consistency models, Client centric consistency protocols, Replica placement, Brewer’s CAP theorem; Self stabilizing systems: Introduction,
Theoretical foundation, Stabilizing mutual exclusion, Stabilizing graph coloring, Stabilizing spanning tree protocol, Stabilizing clock phase synchronization.
Module-4 - Sensor Network and Peer-to-Peer Network 9 Hour
Sensor Network: Vision, Architecture of sensor nodes, Challenges in wireless sensor networks, Routing algorithms, Time synchronization, Localization algorithms; Peer to Peer Network: Introduction, First
Generation P2P Systems: Napster and Gnutella, Second Generation P2P System: KaZaA, Chord, and Pastry, Koorde and De Bruijn graph, Skip Graph, BitTorrent and Free Riding.
Module-5 - Case Study on Large Scale Distributed Systems 9 Hour
Amazon Dynamo, Google Percolator, Corona, Facebook Cassandra, LinkedIn Voldemort, Condor, and Microsoft Dryad LINQ

239
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Sukumar Ghosh, Distributed Systems: An Algorithmic Approach, CRC Publication, 3. Maarten Van Steen, Andrew S Tanenbaum, Distributed Systems, Amazon Digital Services,
Learning 2nd Edition, 2015. 4th Edition, 2023.
Resources 2. Nancy A Lynch, Distributed Algorithms, The Morgan Kaufmann Series in Data 4. Andrew S Tanenbaum, Distributed Systems: Principles and Paradigms, Pearson Edition,
Management Systems, 1996. 2023.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. M. Balamurugan, Consultant, TCS 1. Dr. B. Thanasekhar, Professor, MIT Campus, Anna University 1. Dr. R. Swathy, SRMIST

240
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE622T INDUSTRIAL INTERNET OF THINGS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: summarize the fundamental concepts of Industrial IoT, its frameworks and processes
CLR-2: familiarize the architectural modeling for Industrial IoT systems and projects
CLR-3: acquaint different communication and technology mechanisms to implement Industrial IoT in various industries
CLR-4: describe the significance of security and privacy in Industrial Internet of Things
CLR-5: realize the significant trade-offs for IIoT systems in different domains

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: choose the specific frameworks to develop systems for Industrial IoT 3 - -
CO-2: justify the appropriate model to implement for a project 3 - -
CO-3: implement appropriate Industrial IoT techniques using the available resources - - 3
CO-4: secure and implementation of access control techniques in Industrial Internet of Things 3 - -
CO-5: implement the appropriate technique for using Internet of Things in specific industry - - 3

Module-1 - Concepts and Processes and Limitations 9 Hour


Comparison of IoT Communication Standards – Benefits and Limitations – Device Control, Integration and Simulation Frameworks – Evolution of Industrial IoT – MQTT and the Purdue Model - Industrial IoT
Applications – Industrial IoT use cases in Japanese Industry – Agriculture, Production, Energy, Garbage – Industrial IoT related R& D Projects Overview with Solutions for Industry of the Future
Module-2 - Frameworks and Methodologies 9 Hour
Metrology and Calibration – Calibration Domain Terminology - Notion of Internet Measurement things - Architectural modeling of Industrial IoT systems – Publish-Subscribe Architecture - Data Distribution Service
Middleware – Critical role of Hyper scalers in AI-Driven Future - Smart Traffic Systems - Automation Pyramid - Constraints and Requirements
Module-3 - Connectivity and Technologies 9 Hour
Blockchain Mechanisms as Security-Enabler for Industrial IoT Applications - Impact of Attacks on the Industrial IoT and Salient features of Blockchain - Visible Light Communications in Industrial Internet of Things
– VLC Transmitters and Receivers - Benefits and Limitations – VLC Implementations in the Industrial IoT Context - Utilization of low-power long-range WAN technologies - Implementation of Industrial Internet of
Things in the Renewable Energy Sector – Experimental Evaluation – 5G, WiFi6 for Factory of Future
Module-4 - Security and Privacy of Industrial IoT 9 Hour
Industrial Control Systems Security – Intrusion Detection – Information Technology in an Operational Technology Environment – SCADA related Protocols and Architectures – Attacking Industrial Robots – Access
Control in Industrial IoT – Components Placement – Exploiting the Physical layer of Industrial IoT Security – Understanding ISA-IEC Standards for Industries
Module-5 - Case Study 9 Hour
Implementation of Industrial IoT vision - The Internet of Things LoRaWAN Technologies in Academia: A Case Study - Technology Trade-offs for Industrial IoT Systems and Applications from a Developing Country
Perspective: Case of Egypt – Smart Microgrids’ Technology – Challenges due to Industrial IoT technologies - The Internet of Things in Health Care: Transforming the Industry with Technology - Internet of Things
Applications and Use Cases in the Era of Industry 4.0

241
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Mahmood, Z. The Internet of things in the industrial sector: Security and device 4. Ameya Deshpande, Bidyut Sarkar, Deep Dave and Ravi Dave, Advanced Manufacturing
connectivity, smart environments, and industry 4.0, Springer, 2019. and Supply Chain with IoT, BPB Publications, 2024.
2. Alcaraz, C. Security and privacy trends in the industrial Internet of things, Springer. 5. Monteiro, A.C.B., França, R.P., Arthur, R., Iano, Y., Segatti, A.C., Carnielli, G.P., Pereira,
2019. J.C., de Godoy, H.A. and Fernandes, E.C. A Look at IIoT: The Perspective of IoT Technology
Learning
3. S. Jha, U. Tariq, Gyanendra Prasad Joshi, and Vijender Kumar Solanki,Industrial Applied in the Industrial Field. In The Industrial Internet of Things (IIoT), (eds R. Anandan,
Resources
Internet of Things, CRC Press, 2022. S. Gopalakrishnan, S. Pal and N. Zaman). https://doi.org/10.1002/9781119769026.ch1,
2022
6. Chris, MQTT and the Purdue Model: IIoT Security Best Practices, Cirrus Link, Aug. 02, 2021.
https://cirrus-link.com/mqtt-and-the-purdue-model-iiot-security-best-practices/

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms. Mathangi Nageswar, Director - IoT CS Delivery Mgmt, CTS, 1. Dr. Suresh. S, Professor, King Faisal University, Saudi Arabia 1. Dr. Gouthaman. P, SRMIST
Chennai

242
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE623T WIRELESS SENSOR NETWORKS IN IoT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: summarize the wireless sensor networks and communication protocols
CLR-2: utilize localization techniques and time synchronization in wireless sensor network
CLR-3: analyze MAC Layer protocols in wireless sensor network
CLR-4: evaluate routing protocols in wireless sensor network
CLR-5: apply middleware architecture and security mechanism for wireless sensor network

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: identify the applications of wireless sensor network, communication protocols and configure the Contiki 3 - -
CO-2: describe how localization techniques and time synchronization work in wireless sensor network 3 - -
CO-3: analyze the different MAC protocols and its challenges in wireless sensor network 3 - -
CO-4: examine the various routing protocols, strategies and issues in wireless sensor network 2 - 3
CO-5: recognize the middleware and the need for the security and various attacks and solutions - - 2

Module-1 - Introduction 9 Hour


Introduction and overview – Background of Sensor Network Technology – Applications of Category 1 & 2 WSN Applications – Overview of sensor network protocols, architecture and its Challenges – Standards and
Specifications – IEEE 802.15.4 / Zigbee - Bluetooth – Introduction and exploration of Contiki tool
Module-2 - Time Synchronization and Localization Techniques 9 Hour
Time Synchronization: Clocks and the Synchronization Problems – Reasons and Challenges – Basics of Time Synchronization: Flooding Time Synchronization Protocol – Timing-sync Protocol for Sensor Networks.
Localization Techniques: Overview – Key Issues – Ranging Techniques: Time of Arrival, Time Difference of Arrival, Received Signal Strength - Range-Based Localization Techniques – Triangulation, Trilateration,
Iterative and Collaborative Multilateration - Range-Free Localization Techniques: Ad Hoc Positioning System, Approximate Point in Triangulation - Event Driven Localization
Module-3 - MAC Layer Protocols 9 Hour
Fundamentals of MAC Protocols – Performance Requirements, Common Protocols. MAC Protocols for WSN – Schedule based, Random Access based. Contention Free MAC – CSMA, Multiple Access with Collision
Avoidance (MACA), MACAW, Characteristics, TRAMA, Y-MAC. Contention based MAC Protocol – Power Aware Multi-Access with Signaling, Sensor MAC, Timeout MAC
Module-4 - Routing Protocols 9 Hour
Background – Data Dissemination & Data Gathering, Routing Challenges and Design Issues in WSN. WSN Routing Techniques - Flooding, Gossiping, LEACH, PEGASIS, Directed Diffusion. Transport Control
Protocols – Design Issues, Congestion Detection and Avoidance (CODA), Event-to-Sink Reliable Transport (ESRT), Adhoc Transport Protocol (ATP)
Module-5 - Middleware Architecture and Security Mechanism 9 Hour
Middleware for WSN – Architecture, Middleware Linking Applications and Networks (MiLAN). Fundamentals of Network Security – Challenges, Attacks in Sensor Networks – DoS, Routing Attacks, Transport Layer
Attack. Key Management, Defenses Against – DoS, Aggregation, Routing, Security Mechanism – TinySec, Localized Encryption and Authentication

243
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Kazem Sohraby and Daniel manoli, Wireless Sensor networks- Technology, 4. C.S Raghavendra, Krishna M.Sivalingam and Taieb znati, Wireless Sensor Networks,
Protocols and Applications, Wiley InterScience Publications, 2013. Springer Science, 2010.
2. Waltenegus Dargie and Christian Poellabauer, Fundamentals of Wireless Sensor 5. Bhaskar Krishnamachari, Networking Wireless Sensors, Cambridge University Press, 2005.
Learning
Networks, Theory and Practice, Wiley Series on wireless Communication and 6. https://anrg.usc.edu/contiki/index.php/Contiki_tutorials, 2016.
Resources
Mobile Computing, 2011.
3. S.Swapna Kumar, A Guide to Wireless Sensor Networks, kindle Edition, USP
publications, 2017.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Mohanraj, Standard Chartered GBS 1. Dr. P. T. V. Bhuvaneswari, Professor, MIT Campus, Anna University 1. Dr. R. Kayalvizhi, SRMIST

244
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE624T FOG NETWORKS IN IoT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: memorize the fundamentals of IoT and the new computing paradigms
CLR-2: gain knowledge about the Orchestration, Optimization and Middleware for Fog Computing:
CLR-3: apply techniques for data management and Predictive Analysis in Fog Computing
CLR-4: realize the significance of Security and Privacy of Internet of Things (IoT) Systems
CLR-5: explore the Modeling and Simulation of Fog Computing.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: summarize the need of Fog computing and its modelling techniques 3 3
CO-2: explore the Orchestration, Optimization techniques and design of Middleware for Fog Computing 3 -
CO-3: apply various data management techniques and analytics for fog computing - 3
CO-4: examine the security and privacy of Internet of Things (Iot) systems 3 2
CO-5: apply the knowledge of iFogSim for modelling and simulation of application 3 3

Module-1 - Introduction 9 Hour


Internet of Things (Iot) and New Computing Paradigms: From Cloud to Fog --Need for Fog Computing-Why IoT Needs Fog Computing? - Fog Computing architecture - fog networks - Principles of Edge/P2P
networking - Security and privacy in Fog. Integrating IoT, Fog and Cloud Infrastructures-Methodology: Modelling Technique-Analytical Models-Petri Net Models-Integer Linear Programming- Markov chains model-
Computation Offloading in Fog Computing-FoG Computing Conceptual Model- Fog node architectural service models- Fog node deployment models
Module-2 - Orchestration, Optimization and Middleware for Fog Computing 9 Hour
Orchestration of Network Slices in Fog- Formal Modeling Framework for Fog Computing- Metrics- Optimization Problem in fog computing- Optimization Techniques- Middleware for Fog Computing: Design Issues-
Need for Fog Computing Middleware-Design Goals-State-of-the-Art Middleware Infrastructures-System Model-Proposed Architecture.
Module-3 - Data Management and Predictive Analysis in Fog Computing 9 Hour
Structure of data management in fog computing-Fog data life cycle- Data Characteristics- Data Pre-Processing and Analytics- Data Privacy- Data Storage and Data Placement- e-Health Case Study- Proposed
Architecture- Predictive Analysis to Support Fog Application Deployment: Motivating Example: Smart Building- Predictive Analysis with FogTorch- Comparing iFogSim and FogTorch.
Module-4 - Security And Privacy of Internet of Things (IoT) Systems 9 Hour
Security and Privacy Issues in IoT-Security Concerns at Different Layers in IoT-Privacy Concerns in IoT Devices-Machine-Learning Algorithms in IoT- Use of Artificial Neural Networks (ANN) to Forecast and
Secure IoT Systems-New Flavors of Attacks on IoT Devices-Effective ML Techniques to Achieve IoT Security-Machine Learning in Fog Computing.
Module-5 - Modeling and Simulation of Fog Computing 9 Hour
Environments Using iFogSim Toolkit: iFogSim Simulator and Its Components-Installation of iFogSim-Building Simulation with iFogSim-Example Scenarios: Create Fog Nodes with Heterogeneous Configurations-
Create Different Application Models-Application Modules with Different Configuration-Sensors with Different Tuple Emission Rate-Send Specific Number of Tuples from a Sensor-Mobility of a Fog Device-Connect
Lower-Level Fog Devices with Nearby Gateways-Make Cluster of Fog Devices-Simulation of a Placement Policy- Exploiting Fog Computing in Health Monitoring: An Architecture of a Health Monitoring IoT-Based
System with Fog Computing- Fog Computing Model for Evolving Smart Transportation Applications.

245
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Zaigham Mahmood FOG Computing: Concepts, Frameworks and Technologies, 3. Mahmood, Zaigham (Ed.), Fog Computing Concepts, Frameworks and Technologies,
Learning Springer Publications, 2018. Springer, 2018.
Resources 2. Buyya, Rajkumar, and Satish Narayana Srirama, Fog and Edge computing: 4. Bahga, Arshdeep, and Vijay Madisetti, Cloud computing: A hands-on approach, 2nd Edition,
Principles and Paradigms, 1st Edition, John Wiley & Sons, USA, 2019. CreateSpace Independent Publishing Platform, USA. 2014.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Thamizh Arasan, Technical Lead, Tech Mahindra, Chennai 1. Dr. A. Gayathri, Professor, Saveetha Institute of Medical and 1. Dr. G. Geetha, SRMIST
Technical Sciences (SIMATS), Chennai

246
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE626T HACKER TECHNIQUES AND INCIDENT HANDLING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand different profiles of hackers and ethical standards.
CLR-2: gain knowledge about cryptography concepts and physical access control.
CLR-3: know about social overview of various hacking techniques.
CLR-4: learn on concepts of enumeration and computer system hacking.
CLR-5: understand web attack and impact of malware with its persistent types.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: discuss about various hacking techniques and report incidents. 2 2 3
CO-2: use cryptography techniques in hacking for increasing stealth technique. 2 - -
CO-3: implement social engineering attack after target enumeration. 2 - 3
CO-4: use various password cracking techniques for performing active attacks. - 2 -
CO-5: classify different types of malware based on its families. - 2 3

Module -1 : The Next Generation 9 Hour


Profiles and motives of different types of Hackers- History of computer hacking- Ethical Hacking and Penetration Testing- Common Hacking Methodologies- Performing a penetration test- Roles of the Law and
Ethical Standards.
Module-2: Cryptographic Concepts and Physical Security 9 Hour
Basics- Symmetric- Asymmetric- Purpose of PKI, Hashing- Common Cryptographic Systems- Cryptanalyst- Basic Equipment Controls- Physical Area Controls- Facility Controls- Personal Safety Controls- Physical
Access Controls- Avoiding Common Threats- Defense in Depth
Module-3 : Technical and Social Overview of Hacking 9 Hour
Information gathering process and company website- Google Hacking- Exploring Domain Information Leakage- Tracking and exploiting insecure applications- determine network range-identify active machines-
mapping open ports- OS Fingerprinting- Mapping the Network.
Module-4 : Network Sniffing 9 Hour
Windows Basics- Enumeration- Types of Password Cracking- Using PsTools- Importance of Wireless Security, Securing Bluetooth, Threats to Wireless LANs, IoT, Wireless Hacking Tools and protecting wireless
networks.
Module-5: Web and Malware Attacks 9 Hour
Attacking Web Servers- Examining a SQL Injection- Vandalizing Web Servers- Database Vulnerabilities- Virus- Worm-Significance of Trojan, Detection of Trojans and Virus- Trojan tools- Backdoors- Spyware-
Adware- Scareware- Ransomware

247
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
2. Bothra Harsh,Mastering Hacking,Khanna Publishers, 2021.ISBN: 9789386173843
Learning 1. Oriyano Sean Philip,Hacker Techniques, Tools, And Incident Handling,Jones and
3. AbhinavOjha,Beginners Guide To Ethical Hacking and Cyber Security,Notion Press, 2020.
Resources Bartlett Publishers, 2018.ISBN: 9780763791834
ISBN: 9781649832900

Learning Assessment
Summative
Continuous Learning Assessment (CLA) Final Examination
(40% weightage)
Bloom’s Formative Life Long Learning
Level of Thinking CLA-1 Average of unit test CLA-2 –
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Bhawana Rudra Assistant Professor (Grade I) National
1.Mr.Karthik Expert Member from k7 Computing 1.Dr. V. Joseph Raymond, SRMIST
Institute of Technology, Warangal

248
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE627T Course INTERNET OF THINGS AND COGNITIVE COMPUTING Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: learn the basics of the Internet of Things and Cognitive Computing
CLR-2: understand Machine Learning algorithms for CIoT concepts
CLR-3: gain knowledge of IoT infrastructure in the cloud environment
CLR-4: study the cognitive computing using GPU
CLR-5: program using Zynq for real-time IoT application development

Course At the end of this course, learners will be able to: Programme
Outcomes (CO): Outcomes(PO)
1 2 3
CO-1: demonstrate knowledge of basics of the Internet of Things and Cognitive Computing 2
CO-2: choose and use appropriate Machine Learning algorithm for CIoT. 2
CO-3: develop and deploy the IoT application into the cloud environment 2
CO-4: identify efficient parallel programming patterns to solve problems. 1 3
CO-5: implement IoT application using Zynq programming 1 3

Module-1 – Introduction to IoT and Cognitive Computing 9 Hour


IoT definitions, IoT Characteristics, Impacts of IoT, Cognitive Computing, IoT and Cognition, Applications, Client and Server Side Scripting for IoT, MQTT and COAP Protocol, Introduction to
Raspberry Pi and Python, Machine Learning Overview, Machine Learning Techniques, Introduction to TensorFlow, Introduction to PyTorch.
Module-2– Machine Learning Algorithms for Enabling the Cognitive Internet of Things 9 Hour
Data Analytics, Data Analytics for IoT Basics, Regression & Classification Techniques, Data Analytics for IoT Regression, Classification Artificial Neural Networks and CNN, CNN based Classification,
ANN-based Classification, Data Analytics using DNN, Programming DNNs using TensorFlow, Industrial IoT, Industrial IoT Use Cases.
Module-3 - Cloud Computing in IoT 9 Hour
Introduction to Cloud Computing in IoT, Edge Computing in IoT, Event Driven Programming, JavaScript Basics, Node JS, Angular JS, IoT Programming using Node RED, Programming the Raspberry
Pi using Node RED , Cloud IoT use cases.
Module-4 Cognitive computing using GPU 9 Hour
Parallel Programming for GPUs, GPU Parallel Programming in CUDA, CNN inference in GPU, Real-Time Operating Systems - Introduction, Real-Time Operating Systems – Key Characteristics, Real-
Time Operating Systems - Issues, Real-Time Operating Systems – Applications, Introduction to RTOS hardware devices, Introduction to Free RTOS, Programming in Free RTOS Real-Time Operating
Systems use Cases.
Module-5 – Advanced Cognitive computing 9 Hour
Introduction to FPGAs, FPGA for IoT Computing , Introduction to Zynq 7000 SoCs, , Programming Zynq 7000 SoCs , Application Areas for Zynq –Python Productivity for Zynq, Case Study: Prototyping
CNNs on Zynq for Space Applications, Using pynq.

249
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. Machine Learning with Python for Everyone, By Mark Fenner, Pearson Education, 2019 5.. Exploring Zynq Mpsoc: With Pynq and Machine Learning Applications, Crockett H.
Resources 2. Real-Time Embedded Components and Systems with Linux and RTOS, Sam Siewert and John Louise, Northcote David, Ramsay Craig, Strathclyde Academic Media, 2019
Pratt, Mercury Learning 2015 6.Cognitive Internet of Things Enabling Technologies, Platforms, and Use Cases By
3. Deep Learning with TensorFlow 2 and Keras, By Antonio Gulli, Amita Kapoor, Sujit Pal, Packt Pethuru Raj, Anupama C.Raman, Harihara Subramanian,1st Edition CRC Press,
Publishing, 2019 Taylor & Francis Group,2022
4. Deep Learning with TensorFlow, By Giancarlo Zaccone, Md. Rezaul Karim, Ahmed Menshawy,
Packt Publishing, 2017

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100% 100% 100%

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. S. Kumarasamy, ASSO-consultant - HCL Technologies 1. Dr. L. Jayakumar, National Institute of Technology, Agartala, 1. Dr. S. Gnanavel, SRMIST
Limited Tripura
2. Prof. K. Jayashree, Panimalar Engineering College, Chennai

250
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE628T CYBER LAW AND ETHICS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: familiarize yourself with the meaning of cyberspace, cybercrime, cyberlaw, IT, the web, and web services.
CLR-2: learn the ins and outs of cyberspace, computing, and the many forms of cybercrime from a legal perspective.
CLR-3: learn the definitions of cybercrime and computer crime and be familiar with the international and Indian responses to this growing problem.
CLR-4: understand the repercussions and challenges of cybercrime and be familiar with the legalities of criminal liability.
CLR-5: explore the perspective of human rights on cyber-crime, precautions to take against cyber-crime, and methods to prevent cyber-crime.

Programme Outcomes
Course Outcomes (PO)
At the end of this course, learners will be able to:
(CO):
1 2 3
CO-1: familiarize yourself with the ideas behind cyberspace, cyber crime, IT, the Internet, and associated services. 2 1
CO-2: several kinds of cybercrime should be listed and examined. 2 3
CO-3: define cybercrime and computer crime 2 1
CO-4: get to know cyber crime from an international and indian point of view. 1 2
CO-5: defend human rights and prevent cybercrime by outlining the steps to take. 1

Module-1: Introduction 9 Hour


Information Technology & Cyber Crimes: Introduction, Understanding the basics of cyber law, Evolution and development of cyber law, Glimpses, Definition and Scope, Nature and Extent, Know no Boundaries,
Rapid Transmission and Accuracy, Diversity and Span of Victimization, Cyber World, Inadequacy of Law, Influence of Teenagers, Jurisdictional issues in cyberspace.
Information Technology: Definition & Perspective, Growth & Future, Various Facets & Dimensions. Regulatory Perspective on Technology: Impact of Information and Technology, Regulation of Cyber Space, Legal
Aspects of Regulation.
Module-2: Cyber Law in Advanced Technology 9 Hour
Technology & Forms of Cyber Crimes: Influence of Technology on Criminality, Forms of Cyber Crimes. Computer Crimes & Cyber Crimes: A Criminological Analysis Computer Crimes and Cyber Crimes:
Terminological Aspects, OpportModuleies to Cyber Criminals, Motives of Offenders, Problems Affecting Prosecution, Cyber Crimes: Challenges of Prevention and Control, Need and Prospects Criminological
Research.
Module-3 Cyber Law: National and International Perspective 9 Hour
Cyber Crimes 'and Global Response: Global Perspective, Country wise Legal Response, Country wise Analysis. Cyber Crimes and Indian Response: Introduction, The Indian Information Technology Act 2000,
Preamble & Coverage, Nature of Offences and Penalties, Miscellaneous and Subsidiary Provisions Certain Shortcomings, Future Prospects and Needs.
Module-4 Dispute in Cyberspace 9 Hour
Mens Rea & Criminal Liability: Introduction, Historical Perspectives, Mens Rea in Indian Criminal Law, Mens Rea in English Criminal Law, Abetment of Offence, Criminal Liability and Role of Mens Rea in Indian
Information Technology Act, 2000 , Investigation in Cyber Crimes: Implications and Challenges: Introduction, Procedural Aspects, Issues, Complications and Challenges Concerning Cyber Crimes, Problems and
Precautionary measures for Investigation
Module-5 Cyber Ethics and Emerging Trends 9 Hour

251
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Cyber Crimes: Discovery and Appreciation of Evidences: Introduction, Law of Evidence, Evidences in Cyber Crimes: Challenges and Implications, Computer Generated Evidence and their Admissibility, Judicial
Interpretation of Computer related Evidence. Prevention of Cyber Crimes: National and International Endeavors: Introduction, International Services on Discovery and Recovery of Electronic and Internet
Evidence, International Organization on Computer Evidence (IOCE), OECD Initiatives, Efforts of G-7 and G-8 Groups, Endeavors of Council of Europe, Measures of United Nations, Efforts of WTO, Measures of
World Intellectual Property Organization (WIPO),Interpol and its Measures, Efforts in India, Need of International Assistance and Appropriate Amendments, U.S. Laws on Cyber Crimes, U.S. Case-law on Cyber
Evidences and Related Issues.

1. Jonathan Rosenoer, “Cyber Law: The Law of the Internet”, Springer-Verlag, 3. Salvatore J. Stolfo, Steven M. Bellovin, ShlomoHershkop, AngelosKeromytis, Sara Sinclair,
Learning 1997. Sean W. Smith, “Insider Attack and Cyber Security – Beyond the Hacker”, Springer, 2008
Resources 2. Mark F Grady, Francesco Parisi, “The Law and Economics of Cyber Security”, 4. New Jersey division of consumer affairs, “Cyber Security Handbook”.
Cambridge University Press, 2006. India: Cybersecurity 2020, ICLG.com

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. A. Subashree, Sri Ramachandra Institute of Higher
1.Dr.A.Mohanraj, Data Engineer, Standard Chartered 1.Dr.C.N.S.Vinoth Kumar, SRMIST
Education and Research, Faculty of Management

252
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE629T WIRELESS SECURITY E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the Wireless Standards Security: Vulnerabilities in existing Wireless networks
CLR-2: learn Physical Layer Security and Detecting selfish behavior in hotspots, Selfish behavior in pure ad hoc networks, MAC layer defenses.
CLR-3: understand the various Network Layer Security, Securing ad hoc network routing protocols
CLR-4: understand the basic concepts of Game Theory: Normal Form Games, Strict Dominance, Weak Dominance
CLR-5: understand the various methods and protocols in Game. Applications: RFID Security, Security for Wireless Sensor Networks, Security for Vehicular Networks.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: acquire fundamental knowledge on the concepts of wireless standard security 2 1 1
CO-2: acquire the ability to apply physical layer security in wireless devices 1 3 2
CO-3: utilize the principles of Network Layer security in wireless devices 1 2 3
CO-4: acquire the ability to apply the concept of Game Theory 3 2 1
CO-5: acquire fundamental knowledge on the concepts of Game theory in wireless security 2 3 2

Module-1: Wireless Standard Security 9 Hour


Wireless Standards Security: Vulnerabilities in existing Wireless networks, Bluetooth Security, 3G Security, Wifi Security. Trends and Upcoming Wireless Networks: Upcoming Wireless Networks, Trends and
Security challenges in wireless networks. Trust Assumptions and Adversary models: Trust, Trust in Ubiquitous computing.
Module-2: Physical Layer Security 9 Hour
Physical Layer Security: Jamming, Wiretapping, Physical Layer defenses. MAC Layer Security: Operating principles of IEEE 802.11, Detecting selfish behavior in hotspots, Selfish behavior in pure ad hoc networks,
MAC layer defenses.
Module-3: Network Layer Security 9 Hour
Network Layer Security: Securing ad hoc network routing protocols, Secure routing in sensor networks, Network layer defenses. Privacy in Wireless Networks: Privacy in RFID Systems, Location privacy in vehicular
networks, Privacy preserving routing in ad hoc networks.
Module-4: Game Theory 9 Hour
Game Theory: Normal Form Games, Strict Dominance, Weak Dominance, Iterated Dominance, Pure and Mixed Strategy Nash Equilibrium, Extensive Form Games, Backward Induction, Subgame Perfect Nash
Equilibrium
Module-5: Game Theory in Wireless Networks 9 Hour
Game Theory in Wireless Networks, Forwarder’s dilemma, Joint Packet Forwarding game, Multiple Access Game and Jamming Game. Applications: RFID Security, Security for Wireless Sensor Networks,
Security for Vehicular Networks.

253
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. NicholosLekkas, “Wireless Security”, McGraw-Hill, 2000. 4. James Kempf, Wireless Internet Security: Architectures and Protocols, 2008.
2. KavehPahlavan and Prashant Krishnamurthy, “Principles of Wireless Networks”, 5. William Stallings, Wireless Communications & Networks, 2004.
Learning Prentice Hall, 2006 6. Jennifer Minella, Wireless Security Architecture: Designing and Maintaining Secure Wireless
Resources
3. D. P. Agrawal and Q.-A. Zeng, Introduction to Wireless and Mobile Systems (4th for Enterprise, Wiley Publication, 2022. ISBN: 978-1-119-88305-0
edition), Cengage Learning, 2014.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr.A.Mohanraj, Data Engineer
1.Dr.A.Arivudainambi , Professor, CEG, Anna University 1.Dr. K.A.Varunkumar, SRMIST
Standard Chartered

254
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE630T OPERATING SYSTEM INTERNALS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co-requisite Progressive


Nil Nil NIl
Courses Courses Courses
Course Offering Department Networking and Communications Data Book / Codes/Standards NIl

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the sample open source programs and header files.
CLR-2: learn how the processes are implemented in Linux.
CLR-3: understand the implementation of the Linux file system.
CLR-4: acquire the knowledge in the implementation of interprocess communication.
CLR-5: understand the Linux memory management data structures and algorithms.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: acquire fundamental knowledge on the concepts of operating systems 2 1 1
CO-2: acquire the ability to apply process in operating system 1 3 2
CO-3: utilize the principles of file systems in operating system 1 2 3
CO-4: acquire the ability to apply the concept of memory management 3 2 1
CO-5: acquire fundamental knowledge on the concepts of process communications and memory management 2 3 2

Module-1: Introduction to Operating System 9 Hour


Basic Operating System Concepts - Overview of Unix File System - Files - Links - Types - Inodes -Access Rights - System Calls - Overview of Unix Kernels -Model – Implementation- Reentrant Kernels - Address
Space - Synchronization - Interprocess Communication - Process Management - Memory Management - Device Drivers.
Module-2: Processes 9 Hour
Processes, Lightweight Processes, and Threads - Process Descriptor - State - Identifying a Process - Relationships among processes - Organization - Resource Limits - Creating Processes - System Calls -
Kernel Threads - Destroying Processes -Termination - Removal.
Module-3 File System 9 Hour
The Virtual File System (VFS) - Role - File Model -System Calls - Data Structures - Super Block, Inode, File, dentry Objects - dentry Cache - Files Associated with a Process - Filesystem Types - Special
Filesystems - Filesytem Type Registration - Filesytem Handling - Namespaces - Mounting - Unmounting - Implementation of VFS System Calls.
Module-4 Memory Management 9 Hour
Page frame management -page descriptors - non-uniform memory access - memory zones - reserved page frames - zoned page frame allocator - kernel mappings - buddy system algorithm - page frame cache -
zone allocator.
Module-5 Process Communication and Program Execution 9 Hour
Process Communication - Pipes -Usage - Data Structures - Creating and Destroying a Pipe - Reading From and Writing into a Pipe. Program Execution - Executable Files – Process Credentials - Command-Line
Arguments and Shell Environment - Libraries - Program Segments and Process Memory Regions - Execution tracing - Executable Formats - Execution Domains - The exec Functions

255
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
2. Harold Abelson, Gerald Jay Sussman and Julie Sussman, Structure and Interpretation of
Learning 1. Daniel P. Bovet and Marco Cesati, "Understanding the Linux Kernel", 3rd Edition, O'Reilly
Computer Programs‖, Second Edition, Universities Press, 2021
Resources Publications, 2017.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr.A.Mohanraj, Data Engineer, Standard Chartered 1.Dr.A.Arivudainambi , Professor, CEG, Anna University 1.Dr. K.A.Varunkumar, SRMIST

256
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE631T RISK ASSESSMENT AND SECURITY AUDIT E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the fundamental knowledge about Information Risk.
CLR-2: understand the various analysis on Information Risk Assessment.
CLR-3: understand the demand for IS Audit.
CLR-4: understand the IT audit and its activities.
CLR-5: understand the techniques for implementing security in audit.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: acquire the knowledge on the fundamentals of Risk assessment 1
CO-2: acquire the ability to apply various techniques for data collection 2
CO-3: utilize the principles of data analysis 2
CO-4: acquire the ability to apply IS audit 1 3
CO-5: apply the knowledge gained on auditing methodologies 2

Module-1: Introduction to Risk 9 Hour


Elements of risk - Information Security Risk Assessment Overview -Information Risk Assessments Activities - Risk Assessments and the Security Program - Drivers - Laws Regulations -Primary Information Security
Risk Assessment “Drivers” - Threat Source Leveraging a Vulnerability - Federal Information Security Management Act of 2002 (FISMA) - Gramm-Leach-Bliley Act (GLBA) - Health Insurance Portability and
Accountability Act (HIPAA) - ISO 27001 - ISO 27005 - Risk Assessment Frame work -Risk Assessments and the Security Program - Practical Approach.
Module-2: Introduction to Data Collection 9 Hour
Planning – the essential element - The Sponsors - Characteristics of a good project sponsor -The project team -Factors that decide upon the size of the project team -Data collection mechanisms -Collectors and
Containers - Executive interviews – Questionnaire - Document requests -List of documents for the assessor - IT Assets inventory - Asset Scoping - Asset Scoping – Requirements - Techniques involved in asset
scoping - Profile survey - Control survey
Module-3 Introduction to Data Analysis 9 Hour
Compiling Observations - Risk assessment frameworks overview - Compiling Observations from Organizational Risk Documents - Format to collect your observations.- List of the documents to encounter- Threat
Catalog - List of threat catalogs that can be used as references - Sample Threat Catalog - Vulnerability Catalog -Vulnerability Catalog types - Documentation process - Threat Vulnerability Pairs - Sample Threat and
Vulnerability Pairs – Confidentiality - Confidentiality Determination Matrix - Analyzing Confidentiality Determination Matrix - Developing Sample Confidentiality Determination Matrix
Module-4 Demand for IS audit 9 Hour
Auditor Role - Process of auditing information system - Preplanning the audit - Audit process - Perform audit - Hierarchy of internal controls - Gathering audit evidence -Conducting audit evidence - Reporting
audit evidence - Strategy planning for organizational control - Issues register - Risk Assessment tools - Distinct types of risk tools - Planning - Performance
Module-5 Detailing Information Security Audit 9 Hour
Purpose of IS Audit - Expectation from IS Auditor - Steps to Conduct IS Audit - Classification of Audit, Traditional Audit - Difference Between Audit and Assessment -Relationship Between Auditor, Auditee and
Client; - Their Duties - SLA Introduction - SLA Components - Auditing Firm Organizational Chart - Auditing Firm -functionalities - Policy Vs Procedures Standard Vs Guideline - Basic Types of Measurement Metrics
- Members of Auditing Committee - Skills Matrix, Example - Audit Evidence, Examples - Direct and Indirect Evidence

257
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. MarkTalabis, “Information Security Risk Assessment Toolkit: Practical Assessments
3. RobertJ,Schalkoff,“PatternRecognition:Statistical,StructuralandNeuralApproaches”, John
through Data Collection and Data Analysis”, Syngress; 1 edition, ISBN: 978-1-
Learning Wiley&SonsInc.,New York, Reprint2014.
59749-735-0, 2012.
Resources 4. Douglas Landoll , The Security Risk Assessment Handbook, CRC Press,2021. ISBN:
2. David L. Cannon, “CISA Certified Information Systems Auditor Study Guide”, John
9781000413250
Wiley & Sons, ISBN: 978-0-470-23152-4, 2009.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Bhawana Rudra Assistant Professor (Grade I) National 1.Dr.M.B. Mukesh Krishnan,SRMIST
1.Mr.Karthik Expert Member from k7 Computing
Institute of Technology, Warangal
2.Dr.V.Joseph Raymond,SRMIST

258
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE632T ESSENTIALS OF DATA SCIENCE ON CLOUD COMPUTING E PROFESSSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: perform cloud based bigdata processing
CLR-2: use various cloud based tools for data processing
CLR-3: use various cloud based tools for data analysis
CLR-4: train machine learning models using cloud services
CLR-5: design interactive dashboards for data exploration and reporting

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: explain the basic concepts of data science and cloud computing 2 2
CO-2: apply the data processing techniques using cloud-based tools and services 2 2
CO-3: perform data analysis using cloud-based tools 2 2
CO-4: deploy machine learning models in the cloud 2 2
CO-5: perform data visualization using cloud-based tools 2 2

Module-1 - Introduction to Data Science and Cloud Computing 9 Hour


Overview of data science and its applications, Introduction to cloud computing and its benefits for data science, Overview of popular cloud platforms (AWS, Azure, Google Cloud), Introduction to cloud storage
services (Amazon S3, Azure Blob Storage, Google Cloud Storage)
Module -2 - Data Cleaning and Preprocessing Techniques 9 Hour
Understanding data formats and structures, Data ingestion strategies for cloud storage Data Preprocessing and Transformation in the Cloud, Introduction to ETL (Extract, Transform, Load) processes in the
cloud, Using cloud-based tools for data transformation (AWS Glue, Azure Data Factory)
Module -3 - Big Data Processing in the Cloud 9 Hour
Introduction to big data concepts and challenges, Overview of cloud-based big data processing frameworks (Apache Spark, Hadoop), Setting up and managing big data clusters on cloud platforms, Introduction
to cloud-based data analysis tools and services (AWS Athena, Google BigQuery, Azure Synapse Analytics), Writing SQL queries for data analysis in the cloud, Exploratory data analysis (EDA) techniques in
cloud environments.
Module -4 - Building and Deploying Machine Learning Models in the Cloud 9 Hour
Introduction to machine learning concepts and algorithms, Supervised vs. unsupervised learning, Overview of cloud-based machine learning services (AWS SageMaker, Azure Machine Learning, Google AI
Platform), Data preprocessing for machine learning tasks, Training machine learning models using cloud services, Deploying machine learning models as APIs or serverless functions on the cloud.
Module -5 - Data Visualization and Cost Optimization 9 Hour
Importance of data visualization in data science, Introduction to cloud-based data visualization tools ( AWS QuickSight, Google Data Studio, Power BI), Designing interactive dashboards for data exploration and
reporting, Scalability considerations for data science projects in the cloud, Cost optimization strategies for cloud-based data science projects.

259
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Foster Provost and Tom Fawcett, Data Science for Business, first edn, O'Reilly Media, 2. Jiahui Liu and Wei Tan, Cloud Computing for Data Analysis and Scientific
Learning
Resources 2013. Research.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Hari Prasad Prabhu, Senior Consultant 1. Dr E Kavitha, Associate Professor
1.Dr. Vedhavathy T R, SRMIST
Deloitte, Chennai Anna University (Villupuram Campus)

260
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE633T COMPUTER VISION ON EDGE COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the fundamental concepts of computer vision for image processing
CLR-2: explain the image processing operators and methods for computer vision
CLR-3: understand the image recognition methods for edge and computer vision.
CLR-4: understand the architecture, technology, challenges, and applications for edge computing.
CLR-5: acquire the knowledge of the techniques and strategies for edge computing.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand the fundamental concepts of computer vision for image processing 2 2 2
CO-2: perform the image processing operators and methods for computer vision 2 2 2
CO-3: explore the image recognition methods for edge and computer vision. 2 2 2
CO-4: evaluate the architecture, technology, challenges, and applications for edge computing 2 2 2
CO-5: apply the techniques and strategies for edge computing. 2 2 2

Module -1 - Introduction 9 Hour


Introduction to Computer Vision, Image Formation: Geometric Primitives and Transformation, Photometric Image Formation, Color and Compression.
Module -2 - Image Processing 9 Hour
Point Operators, Linear Filtering, Pyramids and Wavelets, Model fitting and Optimization: Scattered Data Interpolation, Variational Methods and Regularization, Markov Random Fields.
Module -3 - Image Recognition 9 Hour
Instance Recognition, Image Classification, Object Detection, Feature Detection and Matching: Points and Patches, Edges and Contours, Contour Tracking, Segmentation.
Module -4 - Introduction to Edge Computing 9 Hour
The Cloud and Edge Computing paradigms, Edge Computing Architecture and Technology, Components of Edge Computing Systems, Trends in Edge Computing, Edge Computing Challenges and Applications.
Module -5 - Optimization Techniques for Edge Computing 9 Hour
Techniques for Optimizing Computer Vision Algorithms, Model Compression and Quantization, Hardware-aware Optimization Strategies, Edge Devices for Computer Vision Applications, Case studies.

261
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Richard Szeliski, Computer Vision: Algorithms and Applications
2nd Edition, The University of Washington, 2022. 5. https://moschip.com/blog/ai/model-quantization-for-edge-ai/
2. Ranjay Krishna, Computer Vision: Foundations and Applications, 6.https://www.edge-ai-vision.com/2023/12/from-theory-to-practice-quantizing-convolutional-neural-networks-for-
Learning Ist Edition, Stanford University, 2017. practical-
Resources 3. https://www.sciencedirect.com/science/article/pii/S23528648220 deployment/#:~:text=Model%20compression%20techniques%20are%20crucial,edge%20devices%20with%20reduced
0024 %20weight.
4. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9919555/pdf/sens 7. https://viso.ai/edge-ai/edge-devices/
ors-23-01279.pdf

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.Kumanan P, Technical lead, CTS, Chennai 1.Dr Rahul Raman, IIIITDM, Kanchipuram 1.Dr P Balamurugan, SRMIST
2.Dr V D Ambethkumar, Central University, Mizoram 2.Dr M Saravanan, SRMIST.

262
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE634T MIGRATION TECHNIQUES ON CLOUD ARCHITECTURE E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Nil Co- requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book/Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: apply the cloud computing characteristics to support effective and efficient cloud migration
CLR-2: perform application analysis, document the migration strategy and select the cloud provider.
CLR-3: migrate application data to the AWS PostgreSQL Relational Data Service.
CLR-4: present cloud-native agile development workflow within a provisioned environment
CLR-5: develop a cloud operations runbook to ensure smooth and express resolution of any post-migration or operational incidents

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: identify the necessity for cloud migration to build efficient cloud architecture. 3 2 3
CO-2: categorizing the documents for cloud migration to prepare a risk log. 3 2 3
CO-3: organize the cloud clusters for better deliverable in the Kubernetes. 3 3 3
CO-4: develop an agile workflow for cloud software development. 3 3 2
CO-5: implement the cloud migration techniques in the different cloud platforms. 3 3 2

Module – 1 - Cloud Migration Fundamentals 9 Hour


Cloud migration success factors- Cloud Organizational Structure (People)- Migration Framework (Technologies)- Migration Design Principles- Cloud Maturity model- strategy selection criteria- Migration Strategy
Table-Technology selection- Cloud migration process- migration concepts map- Software Development Migration.
Module – 2 - Develop Target Architecture 9 Hour
Inputs- Process and Activities- Output and Deliverables-Review Current State Architecture-Cloud selection matrix -Strategy Selection-Sample application cloud technologies-Risk log-Conduct Cost Analysis-Tools,
Techniques and Best Practices-Build Secure Cloud Environment-Create Virtual Private Cloud (VPC)- SQL Database Service-Identity Access Management (IAM) Role.
Module – 3 - Migrate Software Application 9 Hour
Components and technologies-Inputs-Processes and Activities-Data Tier-Business Tier-Select the Kubernetes Cluster-Configure with ConfigMaps-Build Docker Container-Test with the Docker Engine-Deploy
to the Kubernetes Cluster-user interface-Output and Deliverables-Tools, Techniques and Best Practices-Monitoring, Logging and Alerting
Module – 4 - Software Delivery Migration 9 Hour
Procure Software Delivery Environment-Atlassian Confluence Configuration-GitLab Configuration-Sample Agile Development Workflow-Build Automated Pipeline-basic CICD pipeline-Inputs-Process and Activities-
GitLab Pipeline-Output and Deliverables-Tools, Techniques and Best Practices-Designing principles for architectural security-Responding to security incidents.
Module – 5 - Software Operations Migration 9 Hour
Cloud migration technology and service areas -Transition, Disaster Recovery-Migration impact analysis-checklist-Production Migration Plan-cloud disaster recovery-cloud operation-migration runbook-Efficient
Cloud Operations Process-AWS cost management- Output and Deliverables-Tools, Techniques and Best Practices.

263
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. Taras Gleb, “Systematic Cloud Migration A Hands-On Guide to Architecture, 3. Michael C. Daconta,” The Great Cloud Migration: Your Roadmap to Cloud Computing, Big Data
Resources Design, and Technical Implementation”, Apress, 2021, 978-1-4842-7251-0. and Linked data, Kindle edition, B00G4N2H9O.
2. Saurabh Shrivastava Neelanjali Srivastav,” Solutions Architect's Handbook 4. Kieran Broadfoot,” A Practical Guide to Cloud Migration”, O'Reilly Media, Inc,2021,
Second Edition”, Packt Publishing, 2022 978-1-80181-661-8. 9781492095170.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.Naveen, Lead Security Engineer 1.Dr. Anand Kumar, Assistant Professor, Department of Information 1.Dr.V.Pandimurugan SRMIST
Freshworks, GLOBAL INFOCITY PARK, 40, MGR Main Rd, Kodandarama Technology, NITK, Surathkal.
Nagar, Perungudi, Chennai,

264
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE635T DESIGNING SCALABLE CLOUD-NATIVE SYSTEMS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: design, architect, build, and deploy cloud-native application
CLR-2: choose the right services for public, private, and hybrid cloud deployments
CLR-3: optimize cloud resources by leveraging microservice architecture
CLR-4: containerize applications using Docker
CLR-5: orchestrate container deployment using Kubernetes

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: create Docker containers for microservices and set up continuous integration with Jenkins 2 3 2
CO-2: monitor and troubleshoot applications in the cloud 2 3 3
CO-3: use Docker and Kubernetes for containerization 3 3 3
CO-4: perform log aggregation and visualization with the Elasticsearch, Logstash, and Kibana (ELK) stack 2 2 2
CO-5: migrate from a monolithic architecture to a cloud-native deployment 3 2 2

Module – 1 - Introduction to Cloud Native Application 9 Hour


Introduction to cloud native – Cloud native and Microservices - The 12-factor app - Microservice adoption - Setting Up Your Developer Toolbox - Understanding the Development Life Cycle - Selecting a
Framework - Enabling Cloud-Native Behaviors - Service Registration and Discovery - Registering a Product Service
Module – 2 - Designing Cloud Native Application 9 Hour
Rise and Popularity of the APIs - Application Decoupling - Microservice Identification - Microservice Design and Patterns - Multiple Services per WAR File - Data Architecture - Role of Security - Applying CQRS to
Separate Data Models and Services - Data Update Services - Cache Invalidation - Exceptions and Error Messages
Module – 3 - Cloud Native Application Testing Deployment 9 Hour
Test Driven Development - Business Driven Development - Testing Patterns - Types of Testing - Testing the Product service - Deployment Models - Connecting to an External Postgres Container – Deployment
Patterns - Implementing Runtime Reference Architecture - Kubernetes – Container Orchestration
Module – 4 - Platform Deployment AWS and Azure 9 Hour
Introduction to AWS Platform - AWS Platform Deployment Options - Deploying a Runnable JAR - Deploying Docker Containers - Deploying Spring Boot App to the Elastic Container Service - Deploying to AWS
Lambda – Introduction to Azure Platform - Azure Platform Deployment Options - Deploying Spring Boot API to Azure App Service - Deploying Docker Containers to Azure Container Service
Module – 5 - API Design Practices and Digital Transformation 9 Hour
API Design Concerns – API Modeling - API Gateway Deployment Models - Application Portfolio Rationalization - Monolithic Application to Distributed Cloud-Native Application - Emerging Trends

265
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1.Anthony T.Velte, Toby J. Velte, Robert Elsenpeter, “Cloud Computing a Practical
Learning 3. Cloud Native Applications Micheal Wittig and Andreas Wittig.
Approach”, Tata McGraw-HILL, 2010 Edition.
Resources E-Book Innovate and Transform with a modern application platform
2. Barrie Sosinsky, “Cloud computing bible, Wiley Publishing

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr.Muthuraman, Associate Professor, Government College of
1.Mr.M.Saravana Kumar, TCS, Chennai 1.Dr.B.LakshmiDhevi, SRMIST
Technology, Coimbatore

266
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE636T EMERGING TECHNOLOGIES IN CLOUD COMPUTING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the importance of emerging technologies in the cloud computing.
CLR-2: assess the need for serverless computing as it is implemented in the cloud.
CLR-3: understand the architecture of edge computing and the role in computation and data storage
CLR-4: emphasize the implementation of containerization and orchestration in cloud computing
CLR-5: understand the importance of green cloud computing and analyze the requirements for implementation in the real-time.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand the difference between the traditional and emerging technologies in cloud computing 1 2 1
CO-2: analyze the key components of serverless computing and develop applications using serverless architecture. 2 1 3
CO-3: understand of the architecture and infrastructure of edge computing and integration in various cloud architectures. 2 1 3
CO-4: understand and analyze the various components and their deployment of containerization and orchestration in cloud computing. 2 1 3
CO-5: awareness and understanding about the green computing in using the technologies in cloud computing 2 2 1

Module-1 - Emerging Technologies in Cloud Computing: Introduction and Overview 9 Hour


Overview of cloud computing evolution – Importance of emerging technologies in cloud computing – Traditional Cloud Computing Models – Challenges in Traditional Cloud Computing – Introduction to Emerging
Technologies in Cloud Computing – Key Considerations for Adoption
Module-2 - Serverless Computing: Function as a Service (FaaS) 9 Hour
Definition and Principles of Serverless Computing – Key Components of Serverless Platforms – Function as a Service (FaaS) - Backend as a Service (BaaS) – Examples of Serverless Platforms – Serverless Use
cases and Benefits – Developing Applications with Serverless Architectures – Serverless Security and Monitoring – Security Considerations – Monitoring and Observability in Serverless Environments – Tools and
Services for Securing Serverless Applications – Challenges and Limitations of Serverless Computing
Module-3 - Edge Computing: Computation and Data Storage 9 Hour
Fundamentals of Edge Computing – Difference between Edge computing and Traditional Computing – Architecture and Components of Edge Computing – Edge Devices – Edge Infrastructure – Edge Services –
Integration with Cloud and Hybrid Cloud Architectures – Strength of Edge Computing – Edge Computing Architectures and Deployment Models – Centralized – Decentralized – Hybrid – Scalability and Regulatory
Requirements for Deployment – Future Trends and Innovations in Edge Computing
Module-4 - Cloud Computing in Healthcare 9 Hour

267
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Overview of Cloud Computing in Healthcare – Importance of Cloud Computing in Healthcare – Challenges and Opportunities – Fundamentals of Healthcare Data Management – Electronic Healthcare Records
(EHR) – EHR Cloud Ecosystem – Health Information Exchange (HIE) – Data Security and Privacy Concerns – Cloud Infrastructure for Healthcare – Applications of Cloud Computing in Clinical Practice –
Telemedicine and Remote Patient Monitoring – Health Analytics and Predictive Modeling – Cloud-based Healthcare Solutions Case Study
Module-5 - Green Cloud Computing 9 Hour
Understanding Green Cloud Computing – Energy Efficient Hardware and Infrastructure – Efficient Datacentre Design and Optimization – Renewable Energy in Cloud Data Centres – Virutalization and Resource
Consolidation – Cloud Provider Sustainability Initiatives – Carbon Offsetting – Renewable energy Procurement – Environmental Footprint – Green Data Management Practices – Energy Aware Workload Management
– Regulatory Compliance and Green Certifications - Energy Star, LEED, and ISO 50001 – Future Trends and Innovations in Green Cloud Computing – energy-powered data centers, energy-aware algorithms, and
carbon-neutral cloud services

1. Erl, T., Puttini, R., & Mahmood, Z. (2013). Cloud computing: concepts, technology & :
architecture. Pearson Education.Sumner Blount, Rob Zanella, “Cloud Security and 4. Sbarski, P., & Kroonenburg, S. (2017). Serverless architectures on AWS: with examples using Aws
Governance: Who's on your cloud?”, IT Governance Publishing, 2010. Lambda. Simon and Schuster.
Learning
2. Garrison, J., & Nova, K. (2017). Cloud native infrastructure: Patterns for scalable 5. Bhatt, C. M., & Peddoju, S. K. (Eds.). (2016). Cloud computing systems and applications in
Resources
infrastructure and applications in a dynamic environment. " O'Reilly Media, Inc.". healthcare. IGI Global.
3. Buyya, R., Broberg, J., & Goscinski, A. M. (Eds.). (2010). Cloud computing: Principles 6.. Gholamhosseinian, A., & Khalifeh, A. (2012). Cloud computing and sustainability: Energy efficiency
and paradigms. John Wiley & Sons. aspects.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of Unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Muthuraman, Associate Professor, Government College of Technology,
1.Mr. Hari Prasad Prabhu, Senior Consultant Coimbatore
1.Dr. Nivedhitha M, SRMIST
Deloitte, Chennai 2.Dr. K. Prakash, Assistant Professor, Government College of Engineering,
Dharmapuri

268
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE637T Course DEEP LEARNING AND ITS APPLICATIONS Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: understand the basic ideas and principles of Neural Networks
CLR-2: familiarize various neural network architectures, such as CNN, RNN, and LSTM.
CLR-3: gain an understanding of deep learning frameworks such as TensorFlow and Keras.
CLR-4: understand the use of transfer learning in deep learning applications.
CLR-5: deep Learning Applications in various domains

Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: demonstrate knowledge of the fundamentals of Neural Networks and Deep Learning. 3 - 2
CO-2: apply Advanced Deep Learning Techniques 3 - 3
CO-3: design and Implement Convolutional Neural Networks (CNNs) 3 - 3
CO-4: implement Recurrent Neural Networks (RNNs) and Sequence Modeling 3 - 3
CO-5: investigate Generative Models and Unsupervised Learning 3 - 3

Module-1 - Introduction 9 Hour


Basic concept of Neurons, Perceptron Algorithm, Deep Feed Forward Networks, Gradient Based Learning, Back Propagation Algorithm, Learning XOR, Regularization for Deep Learning, constrained
Optimization, Dataset Augmentation, Semi-supervised Learning, Ensemble Methods and Dropouts, Adversarial Training and Tangent
Classifier, Pure Optimization vs Learning, Challenges in Neural Network Optimization, Basic Optimization Algorithms, Parameter Initialization Strategies, Adaptive Learning based Optimization,
Second-order Optimization
Module-2 - Convolutional and Recursive Neural Network 9 Hour
Convolutional Operation, Pooling, Variants of Basic Convolutional Functions, Efficient Convolutional Algorithm, Random or Unsupervised Features, Application of convolutional neural network ,
Computational Graphs and its unfolding, Recurrent Neural Networks, Bidirectional Neural Networks, Encoders and Decoder Sequence-to- Sequence Architectures, Challenges of Long-Term
Dependencies , Echo State Networks, Leaky Units and Other Strategies for Multiple Time Scales , Long Short-Term Memory and other Gated RNNs, Optimization of Long-Term Dependencies.
Module-3 - Encoders and Decoders 9 Hour
Probabilistic PCA and Factor Analysis, Independent component analysis, Slow Feature Analysis, Sparse Encoding and Manifold, Under complete Auto Encoders, Regularized Auto Encoders,
Stochastic Encoders and Decoders, Denoising Autoencoders, Contractive Autoencoders, Predictive Sparse Decomposition, Applications of Autoencoders.
Module-4 - Representation Learning and Monte Carlo Methods 9 Hour

269
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Greedy Layer-wise Unsupervised Training, Transfer Learning and Domain Adaptation, Semi-Supervised Disentangling of causal factors,Challenges of Unstructured Modelling, Sampling from
Graphical Models, Advantages of Structured Modelling, Learning about Dependencies, Inference and Approximate inferences, Sampling and Monte Carlo Methods , Importance Sampling, Markov
Chain Monte Carlo Methods , Gibbs Sampling and Challenges of Mixing of Separate Models.
Module-5 - Boltzmann and Deep Learning Applications 9 Hour
Boltzmann Machines, Deep Belief Networks, Deep Boltzmann Machine and with Real-valued data, convolutional boltzmann machine, Boltzmann machines for structured or sequential output, Other
Boltzmann Machines, Directed Generative Nets, Large Scale Deep Learning , Computer Vision , Speech Recognition

Learning 1. Ian Good Fellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2017. 4. Ragav Venkatesan, Baoxin Li, “Convolutional Neural Networks in Visual Computing”,
Resources 2. Francois Chollet, “Deep Learning with Python”, Manning Publications, 2018 CRc Press, 2018
3. Phil Kim, “Matlab Deep Learning: With Machine Learning, Neural Networks and Artificial 5. Navin Kumar Manaswi, “Deep Learning with Applications Using Python”, Apress,
Intelligence”, Apress , 2017. 2018.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - - - - -
Total 100% 100% 100%

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. Mariappan Vaithilingam, Brahmarsive Inc, Bengaluru, India 1.Dr. Sagarika, Great Learning 1.Dr.C.N.Subalalitha, SRMIST

270
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course E PROFESSIONAL ELECTIVE L T P C
21CSE639T BLOCKCHAIN TECHNOLOGIES
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the Blockchain and the Basics of Cryptography
CLR-2: acquire the knowledge of Consensus mechanisms and Smart contracts
CLR-3: develop acquaintance with the various Blockchain attacks
CLR-4: apply any programming techniques to understand the available blockchain platforms
CLR-5: implement any use cases using the blockchain technology

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: describe core blockchain concepts, the benefits, and the limitations of blockchain technologies. - 2 -
CO-2: evaluate the technical terms of different consensus of blockchain technology at sufficient depth to perform an analysis. 3 2 -
CO-3: understand the various types of attacks on blockchain networks. - - 3
CO-4: analyze various blockchain concepts to analyze types of blockchain platforms, proposals, and preliminary blockchain system design discussions. - 2 -
CO-5: evaluate real-world challenges that blockchain technologies may assist in solving 1 2 -

Module-1 - Basics of Blockchain 9 Hour


Blockchain: History, Key Features of Blockchain - Cryptographic Hash functions – Hash Pointers – Digital Signatures - Merkle Tree - Symmetric, Asymmetric Key Cryptography - Elliptical Curve Cryptography - CAP
Theorem – Blockchain Architecture – Types of Blockchain: Public, Private and Consortium – Permissioned and Permissionless –Importance of Blockchain - Limitations of Centralized Systems.
T1: Case studies showcasing real-world applications of different types of blockchains.
T2: Implement a simple blockchain network using tools like Ethereum, Hyperledger, or Corda.
T3: Demonstration on generating hash values, creating digital signatures, and constructing Merkle trees.
Module-2- Smart Contracts and Consensus 9 Hour
Smart Contracts - History of Smart Contracts – Lifecycle of Smart Contract – Smart Contract Layout - Consensus - Algorithms: Proof of Work (POW) – Proof of Stake (POS) - Delegated Proof of Stake (DPOS) -
Byzantine Fault Tolerance (BFT) - Proof of Authority (POA)/Proof of Identity (POI) - Consensus Comparison Matrix, Ledger Conflicts and Resolution.
T4: Discussion on scalability challenges, transaction speed, and energy consumption in blockchain networks.
T5: Practical exercises on optimizing blockchain performance and scalability.
T6: Comparative analysis of consensus algorithms using a consensus comparison matrix
Module-3 - Attacks on Blockchain 9 Hour
Attacks – Double Spending Problem - 51% attack - Sybil attack – DDOS – Eclipse Attack – Selfish Mining Attack – Finney attack – Race attack - Wallet Attacks – Zero-knowledge proof – Non-interactive Zero
Knowledge Proof – Ring Signature - Homomorphic Encryption.
T7: Discuss the ledger conflicts in blockchain networks and the challenges they pose.

271
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
T8: Explanation of how each attack works and its potential impact on the blockchain network.
T9: Practical session on implementing and verifying zero-knowledge proofs using libraries like libsnark.
Module-4 – Blockchain Platforms 9 Hour
Ethereum: History of Ethereum - From Bitcoin to Ethereum – Blockchain Trilemma - DAO Attack – Ethereum Classic vs Ethereum - Ethereum accounts- Ether- Mining ether – Wallets for Ethereum – Tokens –
Ethereum 2.0 – Basics of Solidity Programming - Hyperledger Fabric: Architecture of Hyperledger Fabric v1.1-Introduction to Hyperledger Fabric v1.1, chain code.
T10: Practical session on creating Ethereum accounts and managing Ether.
T11: Hands-on demonstration of mining Ether and setting up a mining rig.
T12: Tutorial on different types of wallets
Module-5 - Blockchain Applications 9 Hour
Blockchain Finance: A Case study on Bitcoin - Blockchain in Financial Software and Systems (FSS) -Settlements – KYC - Capital Markets – Insurance - Blockchain in trade/supply chain – Adoption of Blockchain
Technology: A Case Study of Walmart - Blockchain in Healthcare - Blockchain for Government.
T13: Tutorial on implementing multi-factor authentication and other security measures for wallet access.
T14: Discuss blockchain trilemma and how Ethereum addresses scalability, security, and decentralization.
T15: Discuss any government case studies implementing blockchain.

1.Josh Thompson, ‘Blockchain: The Blockchain for Beginnings, Guild to Blockchain Technology and
3. Arshdeep Bahga and Vijay Madisetti. Blockchain applications: a hands-on approach.
Blockchain Programming’, Create Space Independent Publishing Platform, 2017.
Vpt, 2017.
Learning 2.Imran Bashir, “Mastering Blockchain: Distributed ledger technology, decentralization, and smart
4. Alessandro Parisi, securing blockchain networks like Ethereum and hyperledger
Resources contracts explained”, Packt Publishing,2019.
fabric:Learn advanced security configurations and design principles to safeguard
3.Imran Bashir, “Mastering Blockchain: A deep dive into distributed ledgers, consensus protocols,
blockchain networks, Ist edition, Packt publishing,Birmingham,2020
smart contracts, DApps, cryptocurrencies, Ethereum, and more”. Packt Publishing Ltd, 2020.

272
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr.Sagarika, Senior Data Scientist, Great Learning 1.Dr. Anandhakumar P, Professor, Madras Institute of Technology, 1. Dr.B.Subashini, SRMIST
Chrompet
2. Dr.Syed Ismail, SRMIST

273
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE641T SECURITY FOR MACHINE LEARNING APPLICATIONS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: introduce the fundamental concepts and intersections of cyber security and data science
CLR-2: understand core principles of cyber security and their application in protecting information systems
CLR-3: understand secure data sharing practices and cloud security to protect sensitive information
CLR-4: implement SIEM, real-time threat detection, and effective incident response
CLR-5: understand and apply defense mechanisms to enhance the security and privacy of machine learning models

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: explain the key concepts of cyber security and data science, and identify the impact of cyber threats on data science processes - 2 -
CO-2: apply CIA principles to ensure data security and regulatory compliance 2 3 2
CO-3: implement secure data transfer protocols ensuring privacy and compliance 2 2 3
CO-4: implement SIEM, analyze logs, and execute incident response frameworks for threat management 1 1 2
CO-5: analyze and implement advanced cybersecurity measures to safeguard data science models against adversarial attacks 3 2 3

Module-1 - Introduction to Cyber Security and Data Science 9 Hour


Overview of Cyber Security and Data Science - Definitions and Concepts - Intersection of Cyber Security and Data Science - Cyber Threat Landscape - Types of Cyber Threats - Attack Vectors and Techniques -
Impact of Cyber Attacks on Data Science Processes - Foundations of Data Science - Data Collection and Sources - Data Storage and Management - Data Processing and Analysis Techniques.
Module-2 - Foundations of Cyber Security 9 Hour
Principles of Cyber Security - Confidentiality, Integrity, and Availability (CIA) - Authentication and Authorization - Encryption and Cryptography - Secure Data Handling - Data Classification and Sensitivity - Data
Masking and Anonymization - Secure Data Transfer and Sharing - Data Privacy and Compliance - Privacy Regulations (GDPR, HIPAA) - Data Governance and Compliance Frameworks - Ethical Considerations in
Data Science and Cyber Security.
Module-3 - Data Privacy and Protection 9 Hour
Data Privacy and Protection -Secure Data Sharing and Transfer - Secure File Transfer Protocols - Secure Data Exchange Platforms - Securing Data Collection Systems - Best Practices for Secure Data Storage -
Cloud Security and Data Privacy - Secure Data Transfer and Backup Strategies - Data Retention Policies and Compliance.
Module-4 - Threat Detection and Incident Response 9 Hour
Threat Detection and Incident Response - Security Information and Event Management (SIEM) - Log Management and Analysis - Real-time Threat Detection - Incident Response Frameworks - Preparation,
Identification, Containment, Eradication, Recovery - Forensic Analysis Techniques - Machine Learning for Cyber Security - Threat Prediction and Classification - Behavioural Analysis and User Profiling.
Module-5 - Advanced Topics in Cyber Security for Data Science 9 Hour
Advanced Topics in Cyber Security for Data Science - Adversarial Machine Learning - Evasion Attacks - Defense Mechanisms - Secure Machine Learning Models - Privacy-Preserving Machine Learning - Federated
Learning - Ethical and Legal Considerations - Bias and Fairness in Cyber Security - Ethical Hacking and Responsible Disclosure.

274
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. "Cybersecurity and Data Science: How Data Science is Revolutionizing 4. "Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance" by Tim
Cybersecurity" by Kevin Mandia and Steve Johnson, Wiley(2021) Mather, Subra Kumaraswamy, and Shahed Latif, O'Reilly Media(2009)
Learning 2. "Data Science for Cyber Security: A Practical Guide" by Michael J. O'Leary, 5. "Security Information and Event Management (SIEM) Implementation" by David Miller and
Resources Springer(2021) Shon Harris, Syngress(2015)
3. "Principles of Cybersecurity: A Hands-On Guide" by Tim Mather, Subra 6. "Incident Response & Computer Forensics, Third Edition" by Jason Luttgens, Matthew Pepe,
Kumaraswamy, and Shahed Latif, Wiley(2017) and Kevin Mandia, McGraw-Hill Education(2014)

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan,SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2. Dr.S.Kanaga Suba Raja,SRMIST
3. Dr.R.Balaji Ganesh,SRMIST
4.Dr.R.Deebalakshmi,SRMIST

275
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE642T Course CLOUD NATIVE APPLICATION DEVELOPMENT Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: comprehend the Cloud Native system structure and its functionalities
CLR-2: experiment Kubernetes implementation on Public and Private Clouds along with Security Challenges
CLR-3: discover Cloud Native Patterns and Event Collaboration services
CLR-4: implement Cloud Native applications using JAVA Language
CLR-5: implement Cloud Native applications using PYTHON Language

Programme Outcomes
Course
At the end of this course, learners will be able to: (PO)
Outcomes (CO):
1 2 3
CO-1: design Cloud Native system design structure and its functionalities 3 - -
CO-2: build Kubernetes services and Security solutions under Cloud Native applications 3 - -
CO-3: deploy Cloud Native patterns and various Event based system components 2 - 3
CO-4: develop Cloud Native real time applications in JAVA Language - 2 3
CO-5: build Cloud Native real time applications in Python Language - 2 3

Module-1– Introduction to Cloud Native Design 9 Hour


Introduction, Architecture Style, Infrastructure, Kubernetes Architectures- containers-Orchestration, Cloud Environment, MicroServices Architectures (MSA), Kubernetes -Cloud, Multi-Cloud
Implementations, Patterns. Cloud Native -Resiliency, Observability – DevOps for Cloud Native, Cloud Native-application Challenges.
Module-2 – Cloud Native- Kubernetes and Security 9 Hour
Kubernetes Cluster-Private Cloud Environment- VMware-vSphere-Prerequisite, Procedure, Deployment. Kubernetes -Public Cloud Environment -Microsoft Azure -Prerequisite, Procedure, Deployment.
Microservices -Event Driven Model – Build Microservices, Implementation, Deployment strategies. Serverless Computing -Application Patterns, Container function, Components, Database. Security-
Challenges, Solution approaches, Microservices Security.
Module-3 – Cloud Native System- Patterns and Event Collaboration 9 Hour
Databases, Cloud Native Patterns, Bounded Isolative Patterns, Foundation Patterns -Database Per Components, Event streaming and Sourcing, Data Lake, Boundary Pattern – API Gateway, CQRS,
Control Patterns – Event Collaboration and Orchestration, Deployment – Pipeline, Zero-downtime, Testing
Module-4 – Cloud Native design -JAVA 9 Hour
Cloud Native application -Developer toolbox, Development Lifecycle, Framework Designing the trio – REST, HTTP and JSON, Design and deployment Patterns, Data architecture for Microservices,
Implementing Get services, Data update services, Implementing Runtime architecture – Kubernetes, Platform as a Service (PaaS), AWS-Platform Deployment, Azure – Platform Deployment.
Module-5 – Cloud Native design -PYTHON 9 Hour

276
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Cloud Native Concepts – Python, Twelve factor app -Python Environment, Building Microservices in Python, Building Web applications in Python, AWS Platform deployment, Azure Platform deployment,
Dockerizing the Services, Securing the Web application.

1. Pethuru Raj,Skylab Vanga,AkshitaChaudhary, “Cloud-Native Computing”John Wiley& sons 5. Jonathan Bartlett, Cloud Native Applications with Docker and Kubernetes,
Publishers,2023. APress Publishers, 2022.
2. Boris Scholl, Trent Swanson, Peter,Cloud Native-using containers,Functions,and Data to Build 6. Ajit Pratap Kundan, Mainak Chakraborty, Monitoring Cloud-Native
Learning
Next Generation applications, O’Reilly Publishers,2019. Applications, APress Publishers, 2021.
Resources
3. Ajay Mahajan, Munish Kumar, shyam, Cloud Native applications in Java, Packt Publishing Ltd, 7. Kamal Arora, Erik Farr, Architecting Cloud Native applications, Packt
2018. Publishing Ltd, 2019
4. Manish Sethi, Cloud Native Python, Packt Publishing Ltd, 2017.

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. R. Shivakumar, Hexaware Technologies 1. Prof. K. Vivekanandan, Pondicherry technological University, 1. Dr. S. Ramamoorthy, SRMIST
2. Prof. U. Srinivasulu Reddy, NIT Trichy

277
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE643T Course MICROSERVICES AND SERVICE BASED Course E PROFESSIONAL ELECTIVE L T P C
Code Name ARCHITECTURES Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the main protocols and various Web services specification standards
CLR-2: understand the main concepts, principles, needs and evolution of Service Oriented Architecture (SOA)
CLR-3: understand and apply patterns for service design from the provider and requester perspectives
CLR-4: understand the architecture of Microservices and Hybrid cloud services and its tools
CLR-5: learn about the microservices implementation and its deployment on cloud

Course Outcomes Programme Outcomes(PO)


At the end of this course, learners will be able to:
(CO): 1 2 3
CO-1: demonstrate knowledge of the basics of web services and protocols. 1 - -
CO-2: comprehend the need for SOA and MSA and their systematic evolution. 3 - 2
CO-3: design and analyze various SOA patterns and techniques. 2 - 3
CO-4: exhibit knowledge of microservices architecture and cloud services - - 3
CO-5: implement microservices using Python and deploy them on the cloud. - - 3

Module-1 - Introduction to Web Services 8 Hour


Introduction to XML, Creating well-formed XML- Web services overview - Architecture– DOM and SAX Processors – SOAP – WSDL – UDDI – JSON – WS – Security -Web Services Standards – Java,
.NET, Python Web Services – RESTful Web Services - Case studies - Payment Gateways, Social Plugins, Travel and Booking, Maps Services, E-commerce websites, Cloud-based storage providers
etc.
Module-2 - SOA and MSA Basics 9 Hour
Service Orientation in Daily Life, Evolution of SOA and MSA, Service-oriented Architecture and Microservices architecture –Drivers for SOA, Dimensions of SOA, Conceptual Model of SOA, Standards
and Guidelines for SOA, Emergence of MSA Service-Oriented Architecture: Considerations for Enterprise-wide SOA, Strawman Architecture for Enterprise-wide SOA, Enterprise SOA Reference
Architecture, Adopting Microservices in Practice, Service-oriented Analysis and Design (SOAD) Process.
Module-3 - Service-Oriented Applications 9 Hour
Considerations for Service-oriented Applications, Patterns for SOA, Pattern-based Architecture for Service-oriented Applications, Composite Applications, Composite Application Programming. Model
Service-Oriented Analysis and Design: Need for Models, Principles of Service Design Non-functional Properties for Services, Design of Activity Services (or Business Services) Design of Data Services,
Design of Client Services, Design of Business Process Services. Case Study: SOA – Loan Management System (LMS) PoC.
Module-4 - Microservices Architecture 10 Hour

278
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Trend in SOA – Microservices Architecture (MSA): Services Model for Cloud and Mobile Solutions, API Adoption on the Rise, Challenges and Takeways from SOA Implementations Architecture Trend –
Microservices Architecture, Microservices Architecture in Action, Cloud and MSA: Cloud Services, Hybrid Cloud Service and its considerations, Cloud Services and MSA, MSA for SMAC Solutions, MSA
Platforms and tools: Docker, containers and Kubernetes, Graph QL integration, CI/CD Pipeline for Microservices.
Module-5 – Microservice Based Applications 9 Hour
Implementing Microservices with Python – Microservice Discovery Framework – Coding, Testing and Documenting Microservices – Interacting with Other Services – Monitoring and Securing the Services
– Containerized Services – Deploying on Cloud, Mobile and MSA: Mobile Technologies, Types of Mobile Applications, MSA for mobile solutions, Case study: MSA – APIary PoC, Building a scalable e-
commerce platform or a cloud-native application.

1.Shankar Kambhampaty, Service - Oriented Architecture & Microservices Architecture: For


4.Leonard Richardson, Sam Ruby, “RESTful Web Services”, OREILLY publication, 2007.
Enterprise, Cloud, Big Data and Mobile;, 3rd Edition, Wiley, 2018, ISBN: 9788126564064.
5.Nicolai M. Josuttis, “SOA in Design – The Art of Distributed System Design”, OREILLY
Thomas Erl, “Service Oriented Architecture: Concepts, Technology, and Design”, Pearson
publication, 2007.
education, 2005.
Learning 6.Waseem Roshen, “SOA-Based Enterprise Integration”, Tata McGraw-HILL, 2009.
2.Irakli Nadareishvili, Ronnie Mitra, Matt McLarty, Mike Amundsen, Microservice Architecture:
Resources Guido Schmutz, Peter Welkenbach, Daniel Liebhart, Service-Oriented Architecture: An
Aligning Principles, Practices, and Culture Authors Edition illustrate,O'Reilly Media,
IntegrationBlueprint, Packt Publisher, 2010.
Incorporated, 2016.
7.Adrian Mouat, "Using Docker: Developing and Deploying Software with Containers",
3.Rafał Leszko, Continuous Delivery with Docker and Jenkins: Create secure applications by
OReilly, 2016.
building complete CI/CD pipelines, 2nd edition, Packt Publishing, 2019.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. D. V. Mohan, Cloudera, Bangalore, India. 1. Prof. Y. Asnath Phamila, VIT, Chennai. 1. Dr. M. Rajalakshmi, SRMIST.
2. Dr. G. Niranjana, SRMIST.

279
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE644T Course WEB AND SOCIAL MEDIA ANALYTICS Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: learn the fundamentals of web and social media analysis concepts, tools and best practices
CLR-2: identify web and social media data
CLR-3: perform how to analyze social media data
CLR-4: exhibit visualization of social data networks
CLR-5: exemplify knowledge on applying web analytics tool to different kind of applications

Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: exhibit knowledge on key objectives and goals of web and social media analytics - 2 -
CO-2: apply the skills necessary to identify data from various web and social media platforms 3 - -
CO-3: analyze data for uncovering insights and trends within web and social media datasets 3 - 2
CO-4: derive actionable insights using key performance indicators - 2 -
CO-5: exhibit proficiency in using analytics tools for web and social media data analysis - - 3

Module-1 – Introduction 9 Hour


Social Media - Key Objectives, Framework, Best Practices, and Examples – Types and Properties of Social networks– Visualizing Social Networks – Capturing Correlations: Triangles, Clustering, and
Assortativity –Social Media Analytics Tools and Techniques. Web Analytics Process – Data Collection Methods in Web Analytics – Essential Web Analytics Steps – Categories: Off-site Web, On-site
Web – Web Analytics Tools – Google Analytics – Features, Benefits and Limitations
Module-2 - Data Identification 9 Hour
Separating the Useful Data Based on Subset of Contents, Comments, Time, Attributes, Content, Venue Interested – Casting a net –Regular Expressions – Right Subset of People – Predictive versus
Descriptive Analysis – Sentiment Analysis – Social Data: Where and Why – Identifying Data in Social Media Outlets
Module-3 - Data Analysis 10 Hour
Selecting the Right Tool for Right Job – Discovering Themes, Topics or Trends – Stream Computing – Stream Processing Language (SPL) Applications – Directed Graphs – Simple Social Metrics
(SSM) – Streams Examples: SSM – Adhoc Analysis – Data Integrity – Deep Analysis - Case study : Real time Analytics - Conference Data Analytics
Module-4 - Information Interpretation 10 Hour
Visualization Tools as an aid to Analytics – Social Media Analytics Metrics – Web Analytics Key Performance Indicators – Networks Measures – Centrality: Degree Centrality, Eigenvector Centrality,
Katz Centrality, PageRank, Betweenness Centrality, Closeness Centrality, Group Centrality, Transitivity and Reciprocity, Balance and Status, Similarity: Structural Equivalence, Regular Equivalence
Module-5 - Case Study 7 Hour

280
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Google Analytics – Identifying and Optimizing Poorly Performing Pages –Top Landing Pages (Bounce Rates) – Funnel Visualization – IBM Amplify : Data Identification – Data Analysis – Information
Interpretation

Learning 1. Matthew Ganis, Avinash Kohirkar, “Social Media Analytics: Techniques and Insights for 5. Stefan Stieglitz, Christoph Nueberger, “Social Media analytics” Article in
Resources Extracting Business Value Out of Social Media” Pearson 2016 Business & Information Systems Engineering,· April 2014, DOI:
2. Brian Clifton, “Advanced Web Metrics with Google Analytics”, 2nd Edition, Wiley Publishing 10.1007/s12599-014-0315-7
Inc., 2012 6. Social Media analytics : Introduction:
3. Reza Zafarani, Mohammad Ali Abbasi, Huan Liu “Social Media Mining: An Introduction”, https://www.spiceworks.com/marketing/ advertising/articles/what-is-social-
Cambridge University Press, 2014 media-analytics/
4. Gabor Szabo Gungor Polatkan Oscar Boykin Antonios Chalkiopoulos, “Social Media Data 7. Web Analytics: Introduction: https://www.techtarget.com/searchbusiness
Mining and Analytics”, John Wiley & Sons, Inc, 2019. analytics /definition/Web-analytics
8. Web Analytics: https://www.tutorialspoint.com/web_analytics/web_analytics
quick_ guide.htm

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 5% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Saju G Nair, Associate director, Kyndryl India Pvt Ltd., 1. Dr. V. Shanmuganeedhi, NITTTR, Chennai. 1. Dr. D. Malathi, SRMIST
Bangalore
2. Prof. Khanna Nehemiah, Anna University, Chennai

281
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE645T SERVER-SIDE PROGRAMMING E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards NA

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the foundations of server-side programming concepts
CLR-2: explore the server-side scripting languages
CLR-3: implement different web application frameworks
CLR-4: design databases using SQL for web applications
CLR-5: comprehend advanced server-side concepts and security practices

Programme Outcomes
Course
At the end of this course, learners will be able to: (PO)
Outcomes (CO):
1 2 3
CO-1: exhibit knowledge of server-side programming concepts and carry out basic server setup. 1 - -
CO-2: demonstrate knowledge of server-side scripting languages. - 1 -
CO-3: develop scalable web applications - 1 -
CO-4: design and execute SQL queries for web applications - - 3
CO-5: integrate serverless computing and security practices to design scalable applications - - 3

Module-1 - Introduction to Server-Side Programming 8 Hour


Introduction to server-side programming - Client-server architecture – Common protocols and standards (HTTP, HTTPS, TCP/IP) - Overview of server-side scripting languages (e.g., PHP, Python,
Javascript) - Basics of web servers (Apache, Nginx) - Understanding RESTful APIs - Overview of cloud computing and serverless architecture - Security considerations in server-side programming -
Setting up a basic server environment.
Module-2 -Server-Side Scripting Languages 9 Hour
Advanced concepts in PHP/Python/Javascript/Node. Js/ASP.Net - Data types and variables - Control structures (loops, conditional statements) - Functions and libraries - File handling and database
connectivity - Error handling and debugging techniques - Performance optimization in server-side scripting - Handling form data and cookies - Building dynamic web applications with
PHP/Python/Javascript.
Module-3 - Web Application Frameworks 10 Hour
Overview of web application frameworks (Spring Boot, Django, Microservices) - MVC (Model-View-Controller) architecture - Routing and URL mapping - Templating engines and view management -
Data validation and form handling - Authentication and authorization mechanisms JWT, OAuth, Spring Boot Security - Middleware and request/response handling - RESTful API development with
frameworks - Case Study: Developing a microservices-based social networking platform.
Module-4 -Database Integration 8 Hour

282
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Introduction to databases (MySQL, PostgreSQL, MongoDB, COSMOS DB) - SQL fundamentals (SELECT, INSERT, UPDATE, DELETE) - Database design and normalization - Query optimization
techniques - Connecting to databases from server-side scripts - Executing SQL queries dynamically - Handling database transactions - Building a CRUD (Create, Read, Update, Delete) application -
Case Study: Building a student management system with CRUD functionality.
Module-5 – Advanced Server-Side Development and Security Practices 10 Hour
Serverless Architecture - Understanding serverless computing- Building serverless applications using platforms like AWS Lambda, and Google Cloud Functions - Pros and cons of serverless architecture
compared to traditional server-based approaches - Web Application Security, Web application architectures for high scalability, Fault tolerance in web applications - Industry Standard Secure
Development Methodologies and Maturity Models - Case Study: Implementing a serverless online quiz application.

1. PHP for the Web: Visual QuickStart Guide, by Larry Ullman, Peachpit Press, 3rd Edition. 5. Bryan Sullivan, Vincent Liu. Web Application Security, McGraw Hill Professional.
2. “Murach’s Java Servlets and JSP”. By Loel Murach and Andrea Steelman, Mike Murach 6. Shklar, Leon; Rosen, Rich. 2009. Web Application Architecture: Principles,
and Associates, Inc., 2nd Edition. Protocols and Practices. Published by Wiley.
Learning
3. Terry Felke-Morris. Web Development and Design Foundations with HTML5 (7th. ed.). 7. Hugh E. Williams and David Lane. 2004.Web Database Applications with PHP &
Resources
Addison-Wesley Professional. MySQL, 2nd Edition. O’Reilly & Associates, Inc., USA.
4. Robin Nixon. Learning PHP, MySQL, JavaScript, CSS & HTML5: A Step-by-Step Guide 8. Maddie Stigler. 2018. Beginning Serverless Computing - Developing with Amazon
to Creating Dynamic Websites (3rd. ed.). O'Reilly Media, Inc. Web Services, Microsoft Azure, and Google Cloud. Apress L.P., Berkeley, CA.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. T. Ruso, Project Manager, Cognizant Technology 1.Dr. S. Baghavathi Priya, Amrita Vishwa Vidyapeetham. 1. Dr. P. Saranya, SRMIST
Solutions.
2. Dr. P. Nancy, SRMIST

283
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE646T Course BIOLOGICALLY INSPIRED INTELLIGENT SYSTEMS Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3

Pre-requisite Nil Co- requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: understand the fundamentals of evolutionary theory and cellular automata.
CLR-2: learn the artificial neural systems and swarm optimization for feature selection.
CLR-3: acquire the hybridization with memetic algorithms.
CLR-4: understand the concepts of genetic algorithms
CLR-5: implement swam optimization and immune inspired learning

Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: comprehend the fundamentals of evolutionary theory and cellular automata. 3 - -
CO-2: apply the artificial neural systems and swarm optimization for feature selection. - 2 -
CO-3: recognize the hybridization with memetic algorithms. - - 3
CO-4: describe the concepts of genetic algorithms 1 2 -
CO-5: interpret the concepts of memetic algorithms, swam optimization and immune inspired learning - 2 -

Module-1 - Introduction to Evolutionary Algorithm 9 hour


Introduction, Evolutionary algorithm, Types of evolutionary Algorithms, Representation and Encoding of evolutionary algorithm, Evaluation function (Fitness function), Survivor Selection Mechanism
(Replacement), Initialization and Termination, Cellular systems, Modeling with cellular systems, Parallel and Distributed, Evolutionary Algorithms. T1: Basic Implementation of Evolutionary Algorithms
T2: Implement and fine-tune a more complex Encoding evolutionary algorithm, T3: Implementing the cellular model using a parallel evolutionary algorithm
Module-2- Neural Systems 9 Hour
Biological nervous systems, Artificial neural networks, Neuron models and architecture., Signal Processing in Neural Engineering, Unsupervised, Supervised, and reinforcement learning, Neural networks
and Deep Learning, evolution of neural networks, Cognitive Enhancement, Neural Augmentation and Future, Directions, case study, T4: Building Graph Neural Networks using PYTHON, T5: Implement
a basic artificial neural network (ANN) for a simple task, T6: Implementation of a neural network model for cognitive enhancement using public dataset
Module-3 - Developmental Systems and Immune 9 Hour
Rewriting system, Evolutionary rewriting systems, Synthesis of developmental system, Development systems theory (DST), Biological immune systems, Artificial immune systems, Supervised
Immune-Inspired Learning, Unsupervised Immune-Inspired Learning, Clonal selection algorithm. T7: Implementation of Rewriting Systems and Evolutionary Rewriting Systems (e.g., string rewriting,
graph rewriting), T8: Implementation of the synthesis of developmental systems and Development Systems Theory (DST) using Python, T9: Implementing the selection, cloning, and mutation
processes using public dataset
Module-4 – Behavioral Systems and Genetic Algorithms 9 Hour
Behavior in Al, Behavior based robotics, learning in behavioral systems and evolution of behavioral systems, GA Operators, Discrete recombination, Crossing over (binary recombination), Mutation,

284
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Parent Selection, Survivor Selection, Solving a Job Shop Scheduling Problem, T10: Implementing a behavior-based robotic system using Python and a simulation environment (e.g., Webots, V-REP)
T11: Implement these operators in the context of a simple optimization problem, T12: Implementing recombination and crossover operators in Python
Module-5 - Memetic Algorithms and Collective Systems 9 Hour
Memetic Algorithms, Lamarckian and the Baldwin Effect, Structure of a Memetic Algorithm, Heuristic or Intelligent Initialization, Collective Systems and Swarm Intelligence. Biological self-
organization, Particle Swarm Optimization (PSO), ant colony optimization (ACO), Hybridization Strategies, case study. T13: Implement heuristic or intelligent initialization for a memetic algorithm using
Public Dataset, T14: Implement PSO and ACO algorithms for solving optimization problems, T15: Implementing a basic memetic algorithm in Python

Learning 1. D. Floreano and C. Mattiussi, "Bio-Inspired Artificial Intelligence", MIT Press, 2008. 4. D. E. Goldberg, "Genetic algorithms in search, optimization, and machine learning", Addison-
Resources 2. Tao Song, Pan Zheng, Mou Ling Dennis Wong, Xun Wang, "Bio-Inspired Computing Wesley, 1989.
Models and Algorithms", ISBN: 978-981-3143-19-7, world scientific, 2019 5. M. Dorigo and T. Stutzle, "Ant Colony Optimization", A Bradford Book, 2004.
3. F. Neumann and C. Witt, "Bioinspired Computation in combinatorial optimization:
Algorithms and their computational complexity", Springer, 2010.

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. T. Ruso,Senior Project Lead, HCL Technologies, Chennai 1. Sridharan Devarajan, IISC Bangalore 1. Dr. A. Shobanadevi, SRMIST

2. Khanna Nehemiah, Associate Professor, Anna University


2. Dr Archana, SRMIST
Chennai

285
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE647T Course ARTIFICIAL INTELLIGENCE FOR AMBIENT SYSTEMS Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Nil Co- requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: gain knowledge in the fundamental principles, technologies for the development of Ambient Intelligence systems
CLR-2: understand the concepts of sensors and multi camera vision for surveillance
CLR-3: understand the concept of mobile and pervasive computing in smart environments
CLR-4: understand the concepts of human activity modelling and facial expression from video
CLR-5: infer knowledge in smart monitoring and robots in artificial eco systems

Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: create a new synergy between human and machine for smart environments 2 - -
CO-2: acquire the knowledge of multi camera coordination and its surveillance 2 - -
CO-3: acquire the knowledge on mobile and pervasive computing 2 - 2
CO-4: analyse the methodology for learning human activity and facial expression in the application area of automatic visual surveillance - 3 -
CO-5: develop and implement smart monitoring robots real-time systems - - 3

Module-1 - Ambient Intelligence and Smart Environments 9 Hour


Introduction- Sensors, Vision, and Networks- Mobile and Pervasive Computing- Human-centered Interfaces- Artificial Intelligence and Robotics- Multi-Agents- Applications- Societal Implications and
Impact- Smart Environments for Occupancy Sensing and Services: Overview, Detecting Devices, Estimation Algorithms, From Measurements to Meaning and Services, Platforms of smart environments-
Smart Classroom: Bringing Pervasive Computing into Distance
Module-2- Sensor Vision and Networks 9 Hour
Introduction: Camera Network Calibration, Non-overlapping Camera Calibration, Overlapping Camera Calibration, Improving Calibration Consistency, Tracking and Classification- Video-Based People
Tracking: Introduction, Generative Model for Human Pose, Image Measurements, Motion Models- Multi-Camera Vision for Surveillance: Introduction, Camera Systems, Case Studies: Applying a Form
of Memory-based Attention Control to Activity Recognition at a Subway Station
Module-3 - Mobile and Pervasive Computing 9 Hour
Introduction, Characteristics of Collaboration, Existing Technology in Support of Ubiquitous Collaboration, Human Grid as a Unifying Concept for AmI and CSCW, Implementation of Human Grid: The
UbiCollab Platform
Module-4 –Intelligent Interfaces to Empower People with Disabilities 9 Hour
Introduction, The Camera Mouse, Intelligent Devices for People with Motion Impairments, Camera-Based Music Therapy for People with Motion Impairments, Enabling Users to Create Their Own Smart
Environments, Assistive Software for Users with Severe Motion Impairments- Multi-modal Sensing for Human Activity Modeling in the Real World: Introduction, Technologies for Tracking Human
Activities, Usability, Adaptability, and Credibility- Recognizing Facial Expressions Automatically from Video: Introduction, Problem Space and State of the Art, Facial Expression Recognition with

286
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Discriminative Local Features.
Module-5 - Artificial Intelligence and Robotics 9 Hour
Smart Monitoring for Physical Infrastructures: Introduction, Infrastructure Monitoring in the Context of Ambient Intelligence, Pattern-based Modeling of Context Information and Infrastructure Conditions,
Smart Monitoring Architecture, European Railway Monitoring as a Case Study- Autonomous Robots to Artificial Ecosystems: Introduction, State-of-the-art: Integrated Frameworks for Robots in Smart
Environments, Application Scenario: Cooperation and Competition for Transportation and Surveillance.

Learning 1. Handbook of Ambient Intelligence and Smart Environments, HIDEYUKI


Resources 3. Paolo Remagnino, Gian Luca Foresti, Tim Eills, (Eds.), “Ambient Intelligence – A Novel
NAKASHIMA, HAMID AGHAJAN, JUAN CARLOS AUGUSTO, Springer
Paradigm”, Springer, 2005
“Ubiquitous Computing: Smart Devices, Environments and Interactions” (S.
4. G. Riva (Editor), Francesco Vatalaro (Editor), F. Davide (Editor), M. Alcaniz (Editor) “Ambient
Poslad, Wiley, 2009)
Intelligence-The Evolution of Technology, Communication and Cognition Towards the Future of
2. “Human Activity Recognition and Behaviour Analysis: For Cyber-physical Human Computer Interaction”, IOS Press, 2005
Systems in Smart Environments” (L. Chen and C. Nugent, Springer, 2020)

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.S. Smilin Sam, LMTS, Athena Health Private Limited 1.Dr. R. Gayathri, Professor, SVCE 1.Mr.S.Joseph James, SRMIST
2. Dr. C. Lakshmi, SRMIST

287
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE650T Course PENETRATION TESTING Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: learn the process of penetration testing
CLR-2: understand the process of finding the bugs in application
CLR-3: manually discovery key web application flaws
CLR-4: gain proficiency in the tools used for pen testing such as burp suite
CLR-5: evaluate the security of an AWS implementation

Course Outcomes Program Outcomes (PO)


At the end of this course, learners will be able to:
(CO): 1 2 3
CO-1: initiate a Penetration Test for a web application 2 1 3
CO-2: evaluate the Application against the OWASP Top 10 Standard 2 1
CO-3: assess the application for Secure design and best practices 2 3
CO-4: assess the security of AWS implementation for hosting an application 2 3
CO-5: gain proficiency in using the different tools for performing the penetration test 2 3

Module 1 : Foundations of Penetration Testing 9 Hour


Vulnerability Assessment vs Penetration Testing, Understanding Burp suite Features, Understanding Burp suite Features, Understanding Burp suite Features Using Kali, Linux for Penetration Testing,
Building a Threat Model OWASP, Top 10 Injection
Module 2: Cross Site Scripting 9 Hour
Types of XSS, Attacks Broken Access Control, Cryptographic Failure, Privilege Escalation, Lateral Movement & Pivoting, Attacking Active Directory, Golden Ticket Attack, Cross-Site Request Forgery,
Cross Site Request Forgery.
Module 3: Attacking Authentication 9 Hour
Test Role Definitions, Test User Registration Process, Account Enumeration, Input Validation, Attacking MFA, Insecure Design Security Misconfiguration.
Module 4 : AWS Penetration Testing 9 Hour
AWS Penetration Testing, AWS Keys, Azure Pen Testing, On-Prem Pen Testing, Pen Testing Masterclass with Q&A, Testing IAM
Module 5: Handling Application 9 Hour
Handling Application, Pen Test Project, Penetration Testing Reports, Providing Recommendations, Vulnerability, Analysis CVSS, Students Perform a Pen Test with Clock Ticking

288
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. OWASP Top 10 https://owasp.org/www-project-top-ten/ 4. https://www.ibm.com/docs/en/qradar-on-cloud?topic=vulnerabilities-common-
Resources 2. GCP Security Features https://managedmethods.com/blog/google- vulnerability-scoring-system-cvss
cloud-platform-security-features/ 5. Framework for penetration testing https://owasp.org/www-project-web-security-
3. Azure Security Features https://start.paloaltonetworks.com/cloud- testing-guide/latest/3-The_OWASP_Testing_Framework/1-
security-blind-spots.html CVSS Score Penetration_Testing_Methodologies

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Partheepan Rudrapathi, CEO, KXE, 1. Dr. V. Arulkumar, Associate Professor, SSN College 1. Dr. M. Shobana, SRMIST
of Engineering
2. Aniket Amdekar, General Manager, Cyber Defense
Education, Great Learning

289
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE651T Course InfoSec LEADERSHIP Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: know the principles of leadership in InfoSec context
CLR-2: understand Risk Management
CLR-3: understand how to manage a security program
CLR-4: apply principles of Supply Chain Security
CLR-5: evaluate readiness for Audit and Compliance

Course Outcomes Program Outcomes (PO)


At the end of this course, learners will be able to:
(CO): 1 2 3
CO-1: understand Risk Management from a Leadership perspective 2 1 3
CO-2: learn how to align the security strategy with the business strategy 2 1 3
CO-3: understand Data Privacy and Security 2 3
CO-4: learn to manage a security program 2 1 3
CO-5: understand and Manage Supply Chain Security 1 3

Module 1 : Introduction to Information Security Leadership Principles 9 Hour


Information Security Leadership Principles - Leadership Structure in an Organization - Risk Management from Leadership Perspective - Risk Management Frameworks - NIST Approach for Risk
management - Exploring Policies: AUP - Exploring Policies: AUP
Module 2: Introduction to Cyber Insurance and Key Risk Indicators (KRIs) and Key Performance Indicators (KPIs) 9 Hour
Cyber Insurance - Variables that impact Cyber Insurance costs - KRI & KPIs of Security - Metrics that matter - Activity: Preparing a presentation for Board of Directors - SOC 2 Compliance - Log4J
Impact on ISMS
Module 3: Compliance Regulations, Privacy laws and Intellectual Property Management 9 Hour
Compliance: HIPAA - Compliance: FISMA & FedRAMP - Compliance: FIPS - Privacy: Privacy Shield - CCPA - Intellectual Property: Types of Intellectual Property, Protection Mechanisms,
Enforcement Strategies - Managing a Crisis: Crisis Identification, Response Planning, Communication Strategies
Module 4 : Communication Strategies and Managing a Security Program 9 Hour
Communication in Cyber Security - Key strategy for communication within an organization - Managing a security program - Risk Culture in an Organization - Risk Register: Importance, Components,
and Maintenance Practices - Managing Finances for Cybersecurity: Budget Allocation, Resource Prioritization, Cost-Benefit Analysis
Module 5: Implementing Security Awareness Program and Project debrief 9 Hour
Managing Security Awareness Program - Metrics related to security awareness program - Students present an awareness session - Project Debrief: Reflecting on Lessons Learned, Successes, and
Challenges Encountered - Case Study

290
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. SolarWinds Breach: 4. implementing an ISMS program: https://vitalii-susukailo.medium.com/10-steps-to-
Resources https://www.bleepingcomputer.com/news/security/solarwinds-reports-35- implement-isms-ab97f521046e
million-in-expenses-from-supply-chain-attack/ 5. Cyber Insurance: https://medium.com/@ratneshwarprasadsinha_66909/know-the-
2. CCPA: https://oag.ca.gov/privacy/ccpa facts-about-cyber-insurance-d2fab746c5c2
3. data privacy law in India: https://blog.ipleaders.in/data-protection-laws-in-
india-2/

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Partheepan Rudrapathi, CEO, KXE 1. Dr. V. Arulkumar, Associate Professor, SSN College of Engineering 1. Dr. M. Shobana, SRMIST
2. Aniket Amdekar, General Manager, Cyber Defense
Education, Great Learning

291
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE652T ADVANCED CRYPTOGRAPHY E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: comprehend the fundamental knowledge of the cryptographical technologies
CLR-2: remember the mathematics behind Cryptography.
CLR-3: analyze the design of various cryptographic primitives
CLR-4: apply the process of implementing the cryptographic algorithms
CLR-5: evaluate the foundations of modern cryptography toward practical applications

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: comprehend the principles of cryptography 3
CO-2: realize the current rigorous approaches for evaluating the security of cryptographic constructions on symmetric key algorithms 2
CO-3: analyze cryptographic schemes on public key algorithms 3
CO-4: describe core concepts of cryptography on examination of authentication 3
CO-5: apply the cryptographic concepts on various fields 2

Module-1 - Introduction to Cryptography 9 Hour


Classic Ciphers, Substitution techniques, Transposition techniques, Stream Cipher, Properties of Stream Cipher, Model of a Stream Cipher, Block Cipher, Properties of Block Cipher, Model of a Block cipher.
Module-2 - Symmetric Key Ciphers 9 Hour
Block Cipher principles, Data Encryption Standard (DES), Triple 3DES, Advanced Encryption Standard (AES), RC4, RC5, Blowfish
Module-3 - Asymmetric Key Ciphers 9 Hour
Principles of public key cryptography, Adleman (RSA), Discrete Logarithm Schemes: Digital Signature Algorithm (DSA), ElGamal, Elliptic Curve Cryptography (ECC), Other public key algorithms, Cryptographic
Protocols, Diffie-Hellman Key Agreement Protocols, Fiat-Shamir Identification Scheme
Module-4 - Message Integrity and Hash Function 9 Hour
Message Authentication Code (MAC), CBC, MAC, HMAC -DAA-CMAC, Hash Function: Secure Hash Algorithm (SHA), SHA1, SHA2 - SHA3, Message digest, MD4, MD5
Module-5 - Cryptographic Applications 9 Hour
Wireless local area networks, mobile telecommunications, Secure payment card transactions, video broadcasting, identity cards, anonymity, digital currency, The Future of Cryptocurrency, Quantum computing,
Post-quantum cryptography, quantum cryptography

292
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Katz, Jonathan., Lindell, Yehuda. Introduction to Modern Cryptography. United 4. Ferguson, Niels., Schneier, Bruce., Kohno, Tadayoshi. Cryptography Engineering:
States: CRC Press, 2020. Design Principles and Practical Applications. United States: John Wiley & Sons,
Learning 2. Menezes, Alfred J.., van Oorschot, Paul C.., Vanstone, Scott A. Handbook of Applied Incorporated, 2015.
Resources Cryptography. United States: CRC Press, 2018. 5. Stallings, William. Cryptography and Network Security: Principles and
3. Delfs, Hans., Knebl, Helmut. Introduction to Cryptography: Principles and Practice. Brazil: Pearson Education, 2017.
Applications. Germany: Springer Berlin Heidelberg, 2012.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr. V. Gopinath, Solution Architect, Tata Consultancy Service 1.Dr. M. Sugumaran, Professor, Department of Computer Science and 1.Dr. Panimalar. K, SRMIST
Ltd., Chennai Engineering, Puducherry Technological University, Puducherry

293
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE653T CLOUD COMPUTING WITH BLOCKCHAIN E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: comprehend the fundamentals of cloud computing and blockchain.
CLR-2: recognize the protection of cloud resources.
CLR-3: know about blockchain as a service.
CLR-4: gain knowledge in cloud data management and smart contracts.
CLR-5: identify the uses of cloud computing and blockchain technology in the industry.

Programme Outcomes
Course Outcomes At the end of this course, learners will be able to: (PO)
(CO): 1 2 3
CO-1: recognize the concepts of cloud computing and blockchain. 3
CO-2: describe the features of cloud computing and implementation of smart contracts 2
CO-3: identify various blockchain business models and their applications 3
CO-4: explain cloud data management and implement integrated services using smart contracts. 3
CO-5: explain the uses of cloud and blockchain technology in the industry 2

Module-1 - Fundamentals of Cloud Computing and Blockchain 9 Hour


Cloud Computing: Concepts, Computing delivery services, and Network operations, Cloud deployment models, Models benefits and challenges, Blockchain: Concepts, features, Introduction to cryptocurrencies and
blockchain-based solutions, Configuration of the blockchain network.
Module-2 - Cloud Resources and Smart Contracts 9 Hour
Features of cloud computing providers, provisioning of cloud computing, storage and networking resources, Implementation of cloud-based solutions, Smart contracts functions and its uses, design, and
implementation of smart contracts
Module-3 - Blockchain as a Service 9 Hour
Blockchain Business Models, Traditional business models-Types of Blockchain Business Models- Blockchain as A Service (BaaS)-Token Economy-Utility Token Business Model- Blockchain-Based Software
Products, P2P Blockchain Business Model- Blockchain Professional Services, Blockchain for Banking and Financial transactions, The development of portable, scalable, and extensible cloud resources applications
(AWS)
Module-4 - Cloud Data Management and Integrated Services Using Smart Contracts 9 Hour
Cloud data protection, Data modernization, databases, and file storage cloud solutions implement strategies for backup and data recovery, IPFS, Analyze, design, and implement distributed applications (DApps).
Module-5 - Cloud Computing and Blockchain Technology in the Industry 9 Hour
Cloud development operations (DevOps) services, to propose a solution that integrates cloud services and blockchain technology to design and implement a hybrid architecture, Blockchain as a Service - Cloud
server security challenges Hybrid Cloud server with BaaS for Remote Monitoring

294
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Chandrasekaran, K. “Essentials of Cloud Computing”, United Kingdom, CRC Press, 2014.
2. Zand, Matt., Wu, Xun (Brian), Morris, Mark Anthony, “Hands-On Smart Contract Development 6. Collier, Michael., Shahan, Robin. “Microsoft Azure Essentials - Fundamentals of
with Hyperledger Fabric V2”, O'Reilly Media, 2021. Azure”. N.p.: Pearson Education, 2015.
3. Bond, James. “The Enterprise Cloud: Best Practices for Transforming Legacy IT”. United 7. Holbrook, Joseph. Architecting “Enterprise Blockchain Solutions”, United
Learning
States, O'Reilly Media, 2015. Kingdom: Wiley, 2020.
Resources
4. The Cambridge Handbook of Smart Contracts, Blockchain Technology and Digital 8. Blockchain Technology and Applications. United States: CRC Press, 2020.
Platforms. United Kingdom, Cambridge University Press, 2020. 9. Briggs, Barry, Kassner, Eduardo. “Enterprise Cloud Strategy: Enterprise Cloud” Pearson
5. Attaran, Mohsen., Gunasekaran, Angappa. “Applications of Blockchain Technology in Business: Education, 2016.
Challenges and Opportunities”. Germany: Springer International Publishing, 2019

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Kishore Kumar K, Senior Technical Consultant 1.Dr. K. Suresh, Associate Professor, Department of Information 1.Dr. S. Srividhya, SRMIST
(Strategic Accounts) ManageEngine (A Division of Zoho Technology, Sri Venkateswara College of Engineering Sriperumbudur
Corporation)

295
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course L T P C
Course Course
21CSE654T Name CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY E PROFESSIONAL ELECTIVE
Code Category 3 0 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: comprehend the basic services and concepts related to cryptocurrencies
CLR-2: analyze the role of cryptography in the blockchain network
CLR-3: recognize the services and techniques of Ethereum and the cryptocurrency concept in blockchain
CLR-4: know the functions of cryptocurrency in blockchain networks
CLR-5: acquire knowledge in the Ethereum concept and its part using blockchain concepts

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: apply the knowledge of cryptocurrency in Blockchain 3
CO-2: identify and design the different Cryptographical algorithms using Blockchain 2
CO-3: design the network concepts and implement protocols using Blockchain 3
CO-4: describe the role of Ethereum and Cryptocurrency using Blockchain 2
CO-5: implement the various AI techniques in Blockchain 3

Module-1 - Introduction 9 Hour


Introduction to cryptocurrency Basics of crypto and cryptocurrencies: Cryptographic Hash functions - Hash Pointers Digital Signatures Examples - Public Key as Identities Mechanics of Bitcoin: Bitcoin Transactions
Bitcoin Scripts - Applications of Bitcoin Scripts Bitcoin Blocks - Bitcoin Network - Limitations and Improvements - Construction of a Cryptocurrency Portfolio - Understanding Crypto Trading -Wallets - Public Key -
Private Key
Module-2 - Bitcoin Technology 9 Hour
Bitcoin Technology-Introduction Bitcoin storage Hot and Cold Storage, Splitting and Sharing Keys Online wallets and Exchanges, Payment Services - Simplified Payment Verification (SPV) - Transaction Fees -
Currency Exchange Markets - Managing secret keys of wallet - Hardware wallet - Paper wallet - Bitcoin Mining Cryptocurrencies as investment option- Example - Analytical framework for crypto investment option
Fundamental Analysis and Technical analysis - Network Metrics as a price indicator
Module-3 - Blockchain Technology 9 Hour
Blockchain Technology-Introduction Basics of Blockchain Technology - Introduction to Ledgers, Working of financial systems -Difference between blockchain with database History of Blockchain - Characteristics of
Blockchain - Distributed Ledger and Blockchain Comparison of Distributed Ledger and Blockchain - Types of Blockchain- – Public, Private, Consortium -Blockchain layers – Forks - Double Spending Problem -
Byzantine Fault Tolerance protocol - Voting Protocol - Sybil resistance - Permissioned Consensus - Streamlet: A blockchain protocol - Nakamoto consensus protocol - Mining Incentives – Case Study: Bitcoin vs
Bitcoin cash
Module-4 - Decentralized Finance 9 Hour

296
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Decentralized Finance (DeFi)-Introduction History of Decentralized Finance (DeFi) - DeFi Foundations – Characteristics - Advantages of DeFi - DeFi Primitives: Transaction Mechanisms - Fungible Token - Non-
Fungible Token Example -Supply and Ownership: Custody – supply Adjustment - incentives Exchanges: Centralized Exchange decentralized exchange (DEX) - Use cases Automated Market Makers (AMM) -
Uniswap - Collateralized Loan – Flash Loans - Incentives for Liquidity providers
Module-5 - Cryptocurrency Techniques 9 Hour
Cryptocurrency Techniques-Introduction Privacy for cryptocurrency Anonymity Privacy of Digital Payments Privacy of Digital Payments – demo Understanding Ethereum Privacy in Ethereum Privacy in Bitcoin - Coin
Mixing - Litecoin (LTC) - Altcoins – Example unidirectional, bi-directional and UTXO - Examples.

1. Koushik Raj, “Foundation of Blockchain: The pathway to Cryptocurrencies and 3. Cryptocurrencies and Blockchain Technology Applications. United
Decentralised Blockchain Applications “, Kindle Edition, 2019. States: Wiley, 2020.
Learning
2. Arvind Narayanan, Joesph Bonnecau, Edward Felten, Andrew Miller, and Steven 4. Drescher, Daniel. Blockchain Basics: A Non-Technical Introduction in 25
Resources
Goldfeder.” Bitcoin and cryptocurrency technologies: A Comprehensive Introduction” Steps. United States: Apress, 2017.
Princeton University Press, 2016.

Learning Assessment
Continuous Learning Assessment (CLA) Summative
Bloom’s Formative Life Long Learning Final Examination
Level of Thinking CLA-1 Average of unit test (50%) CLA-2 – (10%) (40% weightage)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Imthyaz Serif, Director IDEASSION Technology Solutions, 1.Dr. L. Ramanathan, Associate Professor, VIT Vellore 1.Dr. SV.Shri Bharathi, SRMIST
Chennai

297
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE655T Course ADVANCED MACHINE LEARNING ALGORITHMS Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3

Pre-requisite Nil Co- requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: understand the definition of a range of neural network models.
CLR-2: describe neural implementations of attention mechanisms and sequence embedding models and working principles of modular components can be combined to build state of
the art NLP systems.
CLR-3: understand the mathematics necessary for constructing novel machine learning solutions.
CLR-4: focus on recent advances in deep learning with neural networks, such as recurrent and Bayesian neural networks.
CLR-5: introduce the mathematical definitions of the relevant machine learning models and derive their associated optimization algorithms

Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: derive optimization algorithms for these models. - 3 -
CO-2: implement common neural network models for language. - - 2
CO-3: recognize a model to describe a particular type of data 2 - -
CO-4: design and implement various machine learning algorithms in a range of real world applications. - 3 -
CO-5: extract a range of applications of neural networks in natural language processing, including analyzing latent dimensions in text, translating between 1 2 -
languages, and answering questions.

Module-1 - Reinforcement Learning 9 hour


Introduction to Reinforcement Learning, Basic concepts in RL, value iteration, policy iteration, Model-Based Reinforcement Learning (Dynamic Programming), value function approximator , Model-
Free Reinforcement Learning (SARSA, Monte Carlo, Q-Learning), Approximate and Deep Reinforcement Learning (Deep Q-Learning), Policy Gradient Reinforcement Learning, Advanced Topics on
Exploration and Planning. T1: Implementation of reinforcement learning using public dataset – chatbot, T2: Implementation of Deep Reinforcement learning T3: Implementation of Policy Gradient
reinforcement learning
Module-2- Machine Learning with Graphs 9 Hour
Introduction; Machine Learning for Graphs, Traditional Methods for ML on Graphs, Node Embeddings, Link Analysis: PageRank, Label Propagation for Node Classification, Graph Neural Networks 1:
GNN Model, Graph Neural Networks 2: Design Space, Applications of Graph Neural Networks, Knowledge Graph Embeddings, Reasoning over Knowledge Graphs, Frequent Subgraph Mining with
GNNs T4: Building Graph Neural Networks using PYTHON, T5: Implementation of Knowledge Graphs, T6: Implementation of Frequent Subgraph Mining with GNNs
Module-3 - Association Rule Mining 9 Hour
The applications of Association Rule Mining: Market Basket, Recommendation Engines, etc. A mathematical model for association analysis; Large item sets; Association Rules, Apriori: Constructs
large item sets with mini sup by iterations; Interestingness of discovered association rules; Application examples; Association analysis vs. classification of FP-trees
T7: Implementation of Association Rule Mining in Real-time applications, T8: Implementation of Apriori Algorithm, T9: Building Frequent Pattern Tree for Classification

298
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Module-4 - Recommendation Systems 9 Hour
Recommender System: Application of recommend dation engine Popularity based Recommendation system Content based recommendation system: User feature, Item feature Nearest neighbor
classifier to build the content-based recommendation Use case of Content based recommendation system Collaborative based Recommendation system User based Model – Item based model SVD
based Collaborative recommendation engine Evaluation Recommender System. T10: Implementation of content-based recommendation engine in pyt
T11: Implementation of popularity-based recommendation engine in python, T12: Implementation of collaborative recommendation engine in python
Module-5 - Machine Learning Model Deployment 9 Hour
The Machine Learning Pipeline- ML pipeline lifecycle - The Model in the Pipeline- Steps to deploy ML model in local server using flask - Machine Learning Model Deployment using Flask and Docker
in cloud platform - Machine Learning Model Deployment using Flask, Github and Heroku Cloud Services - Machine Learning Model Deployment using Flask, Github and AWS Lambda cloud instance /
Microsoft Azure Functions / Google Cloud Platform – Model Deployment Challenges. T13: Implementation of End-to-End case study for classification mode
T14: Machine Learning Model Deployment in local server, T15: Machine Learning Model Deployment using Heroku/AWS/Google Cloud Platforms

Learning 1. Kevin P. Murphy.” Machine Learning: A Probabilistic Perspective”. MIT Press 2012 3. William L. Hamilton, “Graph Representation Learning”, McGill University, 2020
Resources 2. Ian Goodfellow, Yoshua Bengio and Aaron Courville. “Deep Learning”, MIT Press 4.JasonBrownlee,”Deep Learning with Python”, ebook,2016.
“Second Edition”, CRC Press, 2016. 5.Sebastian Raschka, VahidMirjilili, “Python Machine Learning and deep learning”, 2nd edition,
2018

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 20% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 30% - 30% -
Level 4 Analyze 30% - 30% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Ms. Sudha B G, Faculty & Senior Manager,Great Learning 1.Dr. Masilamani, IITDM, Kanchipuram 1.Dr.A.Shobanadevi,SRMIST
2.Dr. G. Vadivu, SRMIST

299
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE656T SOCIAL MEDIA ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the foundations of Social Media Analytics.
CLR-2: visualize and understand the data mining aspects of social networks.
CLR-3: solve mining problems with different algorithms.
CLR-4: understand network measures for social data.
CLR-5: understand the behavioral part of web applications for Analysis.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: understand the basics of Social Media Analytics. 3 - -
CO-2: explain the significance of Data mining in Social media. - 2 -
CO-3: demonstrate the algorithms used for text mining. - - 1
CO-4: apply network measures for social media data. - 3 -
CO-5: explain Behavior Analytics techniques used for social media data. - 2 -

Module-1 - Introduction to Social Media Data 9 Hour


Characteristics of social media data: Volume, velocity, variety (the 3 Vs of big data), Structured, semi-structured, and unstructured data, Challenges and opportunities in social media data analysis Social media
data sources and APIs: Publicly available datasets (e.g., Twitter API, Reddit API), Scraping and data collection tools (e.g., Beautiful Soup, Selenium), Ethical considerations in data collection (privacy, consent,
terms of service) Preprocessing and cleaning social media data: Handling noise, duplicates, and missing values, Text normalization (tokenization, stemming, lemmatization), Feature engineering for social media
data (e.g., sentiment scores, network metrics). T1 Text Pre Processing, T2 Sentiment Analysis
Module-2 - Text Mining and Natural Language Processing (NLP) for social media 9 Hour
Text representation: Bag-of-words, TF-IDF, word embeddings (e.g., Word2Vec, GloVe), Topic modeling (e.g., Latent Dirichlet Allocation), Sentiment analysis and opinion mining: Lexicon-based approaches (e.g.,
VADER), Machine learning-based approaches (e.g., Naive Bayes, SVM, deep learning), Aspect-based sentiment analysis Text classification and categorization: Supervised and unsupervised approaches,
Applications (e.g., spam detection, topic classification). T3 Spam Detection, T4 Topic Classification
Module-3 - Introduction to Social Networks 9 Hour
Definitions and key concepts: Nodes, edges, attributes, directed/undirected networks, weighted/unweighted networks, Types of networks: Social, information, biological, technological, Historical context and
applications of SNA, Network Representation and Visualization, Sociograms and graph layouts (force-directed, circular, hierarchical), Adjacency matrices and edge lists, Network visualization tools, Centrality
Measures: Degree centrality: Number of connections, Betweenness, Closeness centrality, Eigenvector centrality. T5 Graph Centrality measures, T6 Network Visualization
Module-4 - Social Network Structure, Visualization and Analysis 9 Hour

300
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Network Structure and Properties. Density, Reciprocity, diameter, clustering coefficient, Transitivity, Cliques and communities, Community Detection: Modularity-based methods. Spectral clustering. Hierarchical
clustering. Network Dynamics, Link prediction, Information diffusion, Multi-Layer Networks, Network visualization tools (e.g., Gephi/ NetworkX), Applications of SNA: Identifying influencers and opinion leaders,
Viral marketing and information diffusion, Community detection and segmentation, T7 Influencer Identification, T8 Community Detection
Module-5 - Behavior Analytics for Social Media 9 Hour
User behavior modeling: Clickstream analysis (tracking user interactions with content), Purchase behavior analysis (analyzing buying patterns), Churn prediction (identifying users likely to disengage) Predictive
analytics: Recommender systems for social media (suggesting content, products, or connections), Forecasting trends and viral content, Predicting user responses to campaigns Measuring user engagement: Time
spent on platform, content interactions (likes, comments, shares), Sentiment analysis of user-generated content, Analyzing user feedback and reviews, T9 – User engagement analysis, T10 – User review analysis

Learning 1. Social Media Analytics in Predicting Consumer Behavior,Selay Ilgaz 4. Analyzing Social Networks Using R, Stephen P. Borgatti, Martin G. Everett, Jeffrey C.
Resources Sumer,Nurettin Parilti,CRC Press, First Edition, 2023. Johnson, SAGE Publications, First Edition, 2022.
2. Social Media Analytics Strategy,Using Data to Optimize Business 5. Spatializing Social Media, Social Networks Online and Offline, Marco Bastos, Taylor &
Performance, April Ursula Fox, First Edition, 2022. Francis, First Edition, 2021.
3. Social Media Analytics and Practical Applications, Liangfei QiuLiangfei Qiu, 6. Applied Social Network Analysis with R, Emerging Research and
Subodha Kumar,CRC Press, First Edition, 2022. Opportunities, Mehmet Gençer, IGI Global, First Edition ,2020

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 10% - 20% -
Level 2 Understand 20% - 10% - 20% -
Level 3 Apply 30% - 40% - 30% -
Level 4 Analyze 30% - 40% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. N. Venkatesh, Tech Lead, Honeywell, Bengaluru, 1.Dr.V.Sivakumar, Associate Professor, Department of Information 1.Dr.T.Veeramakali, SRMIST
Karnataka, India and Communication Technology, Manipal Institute of Technology,
2.Ms. Sudha B G, Great Learning 2.Dr.G.Vadivu, SRMIST

301
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE658T Course LARGE LANGUAGE MODELS Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR)
CLR-1 : understand the Basics of Language Models
CLR-2 : gain knowledge on Neural Language Models for LLMs
CLR-3 : understand the process of training a LLM, fine tuning and inferring from the models
CLR-4 : gain knowledge on LangChains and storage in LLMs
CLR-5 : understand about the security risks and privacy concerns

Course At the end of this course, learners will be able to: Program Outcomes (PO)
Outcomes (CO):
1 2 3
CO-1: comprehend the applications of Language Models 2 - -
CO-2: design language models using RNN and Transformer models 2 2 -
CO-3: develop, train and fine tune LLMs 2 2 2
CO-4: design applications integrating Pinecone and Langchain for LLM application development 2 2 2
CO-5: evaluate the security risks and privacy concerns of using LLMs 2 3 3

Module-1 Introduction to Large Language Models (LLMs) 9 Hour


Defining a Language Model - Language Models: A History - Probabilistic Language Models - Statistical language models: N-gram models LLMs in the AI Landscape - Real World Applications –
Multimodal Applications - Challenges of language Modelling Evaluating Language Models – Perplexity, BLEU (Bilingual Evaluation Understudy), ROUGE (Recall-Oriented Understudy for Gisting
Evaluation), F1 Score, Accuracy
Module-2 Neural Language Models 9 Hour
Feedforward neural network-based language model, Recurrent neural network-based language model Recurrent Neural Networks (RNNs) – Long short-term memory (LSTM) - Gated Recurrent Units
(GRU) - Bidirectional RNNs - Multi-layer RNNs Transformers – Architecture - Attention mechanism, Self Vs Multi-head attention
Module-3 Language Model Training, Finetuning and Inference 9 Hour
Transfer Learning - ELMo - BERT - BERT Architecture - BERT Variants - GPTs - Seq2seq TLMs Fine Tuning and Optimizing LLMs - Model Quantization, PEFT(Parameter Efficient Fine Tuning),
RLHF (Reinforcement Learning from Human Feedback) based Fine tuning, LORA Prompt Engineering, Zero- and Few-Shot Inference
Module-4 LangChain for LLMs 9 Hour
LangChain Models-Langchain usage – Chains, Memory, agents and callbacks, Building applications using Langchain framework Vector Databases and stores, Vector search, Using Pinecorne for vector
store, Interacting with Pinecone and Langchain for LLM Application Development
Module-5 Security, Privacy and Misuse 9 Hour

302
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Harms and Ethical Concerns - Types of attacks: adversarial examples, poisoning, prompt injection - Non-adversarial harms caused by language models: hallucinations, biases, toxicity - Memorization
and Privacy - The data lifecycle

1. Deep Learning for Natural Language Processing: Develop Deep Learning Models for
3. Quick Start Guide to Large Language Models: Strategies and
Natural Language in Python, Jason Brownlee, Machine Learning Mastery, 21 Nov 2017
Learning Best Practices for Using ChatGPT and Other LLMs by
2. Transformers for Natural Language Processing: Build innovative deep neural network
Resources SinanOzdemir, 1st Edition, Addison-Wesley Professional
architectures for NLP with Python, PyTorch, TensorFlow, BERT, RoBERTa, and more 1st
October 2023.
Edition, by Denis Rothman, Packt Publishing, 29 January 2021.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.Jagatheeswaran Senthilvelan, Managing Partner , ProtoHubs.io 1.Dr. Subha Thangarajan, Associate Professor, NITTTR 1.Dr. M Vimaladevi, SRMIST
2.Dr.G.Maragatham,SRMIST

303
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE659T REINFORCEMENT LEARNING E PROFESSIONAL ELECTIVE
Code Name Category 2 1 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: analyze the foundational concepts of reinforcement learning
CLR-2: build knowledge on finite Markov decision process and dynamic programming
CLR-3: deliver the concepts of Monte Carlo methods and Temporal Difference Learning
CLR-4: equip learners on planning and learning with tabular methods
CLR-5: introduce the basic concepts of deep reinforcement learning

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: comprehend the building concepts for reinforcement learning 2 1
CO-2: identify problems which are Markov Decision Processes and solve problems using Dynamic Programming 2
CO-3: apply Monte Carlo methods and Temporal Difference Learning to real world problems 2 2
CO-4: efficiently plan and learn actions for environments using tabular methods 2
CO-5: apply the basic concepts of deep reinforcement learning 3

Module-1 - Introduction to Reinforcement Learning and multi-arm bandits 5 Hour


Reinforcement Learning- Elements of Reinforcement Learning- Limitations and Scope- An n-Armed Bandit Problem- Action-Value Methods- Incremental Implementation- Tracking a Nonstationary Problem-
Optimistic Initial Values-upper-confidence-bound action selection - associative search (contextual bandits)
T1 Cartploe simulation in OpenAI gym environment
T2 Carracing environment simulation
Module-2 - Finite Markov Decision Processes and Dynamic Programming 12 Hour
The Agent–Environment Interface, Goals and Rewards, Finite Markov Decision Process - The Agent–Environment Interface - Goals and Rewards - Returns and Episodes - Unified Notation for Episodic and
Continuing Tasks - Policies and Value Functions - Optimal Policies and Optimal Value Functions - Optimality and Approximation , Dynamic Programming - Policy Evaluation (Prediction) - Policy Improvement -
Policy Iteration - Value Iteration - Generalized Policy Iteration - Efficiency of Dynamic Programming - Asynchronous Dynamic Programming
T3 Policies and value functions for Gridworld example
T4 Policy evaluation for Gridworld example
Module-3 - Monte Carlo Methods and Temporal Difference Learning 12 Hour
Model-free learning - Model-free prediction - Monte Carlo methods - Monte Carlo Prediction - Monte Carlo Estimation of Action Values - Temporal-Difference Learning - TD Prediction - Advantages of TD
Prediction Methods - Optimality of TD(0) - n-step Bootstrapping - n-step TD Prediction - n-step Sarsa - Model-free control - Monte Carlo Control - Monte Carlo Control without Exploring Starts - Off policy learning -
Importance sampling - Off-policy Monte Carlo Control - Sarsa: On-policy TD Control - Q-learning: Off-policy TD control, T5 TD Prediction implementation, T6 Cliff walking implementation
Module-4 - : Planning and Learning with Tabular Methods 9 Hour
304
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Models and planning - Dyna: Integrated Planning, Acting and Learning - When the model is wrong - Prioritized Sweeping - Real-time Dynamic Programming - Monte Carlo Tree Search
T7 Maze traversal implementation
T8 Dynamic Programming implementation
Module-5 - Deep Reinforcement Learning 7 Hour
What is Deep Reinforcement Learning- Sequential Decision Problems- Tabular Value-Based Agents- Classic Gym Environments
T9 – DRL implementation on Open AI Gym
T10 - DRL implementation on Atari environment

Learning 1. Richard S. Sutton and Andrew G. Barto, Reinforcement Learning: An 3. Enes Bilgin, Mastering Reinforcement Learning with Python: Build next-generation,
Resources Introduction MIT Press; Second edition, 2018 self-learning models using reinforcement learning techniques and best practices,
2. Sudharsan Ravichandiran , Hands-On Reinforcement Learning with Packt Publishing, First Edition,2020
Python: Master reinforcement and deep reinforcement learning using 4. Miguel Morales , Grokking Deep Reinforcement Learning, Manning, First Edition
OpenAI Gym, Packt Publishing, Second Edition, 2020 2020
5. Aske Plaat , Learning to Play: Reinforcement Learning and Games, Springer
Nature, First Edition, 2022

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 10% - 20% -
Level 2 Understand 20% - 10% - 20% -
Level 3 Apply 30% - 40% - 30% -
Level 4 Analyze 30% - 40% - 30% -
Level 5 Evaluate - - - - - -
Level 6 Create - - - - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Dr.Hariseharan, Advisor, Pratya AI Labs 1.Dr. J. Umarani , IIITDM Kancheepuram 1.Dr.K.Sornalakshmi, SRMIST
2.Dr.D.Hemavathi, SRMIST

305
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE664P Course PRODUCT THINKING Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 3 0 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards NA

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: equip students with the skills to empathize with users and transform their needs into successful technological products
CLR-2: implement effective user research methods to gather actionable insights that guide the design and development of technology products
CLR-3: bridge the gap between technical expertise and user experience (UX) design principles, empowering engineers to create user-friendly and desirable technology products
CLR-4: foster a culture of iterative design and continuous improvement, enabling students to adapt and refine their designs based on user feedback
CLR-5: prepare students to effectively participate in cross-functional product development teams, collaborating with designers, product managers, and engineers

Course At the end of this course, learners will be able to: Programme Outcomes
Outcomes (CO): (PO)
1 2 3
CO-1: apply user-centered design (UCD) principles to create technology products. 2 - 2
CO-2: create detailed user personas that accurately represent user needs, challenges, and motivations. - - 2
CO-3: create product concepts and strategies through brainstorming, market analysis, and feature prioritization. - 3 3
CO-4: create low-fidelity and high-fidelity prototypes using design tools to communicate design ideas and facilitate user testing. - 2 3
CO-5: evaluate usability test data to identify usability issues and iterate to improve user experience. - - 3

Module-1 - Introduction to Product Design 8 Hour


Introduction to Product Design; User-Centered Design (UCD) principles-Empathy, Define, Ideate, Prototype, Test; Design Thinking- Understanding user needs, brainstorming solutions, rapid prototyping,
Elements of Good Design, D1-D3; Introduction to Design Tools: Sketching, wireframing, prototyping tools
Activities:1. Identify a real-world problem and apply UCD principles in a small group. 2. Design Challenge - Using design thinking to solve a user problem related to technology.
Module-2 - User Research and Understanding 8 Hour
User Research Methods- Surveys, Interviews, User observation, Usability testing; Conducting User Research- Planning, Interview techniques, Data Analysis; Persona Development- Creating user
profiles based on research; User Needs & Pain Points- Identifying user needs, challenges, and motivations. Case Study: Analyze a successful tech product and identify user needs it addresses.
Activities: 1. Develop a user research plan for a sample product. 2. Develop user personas based on research data. 3. Develop a Persona Template using Journey Mapping
Module-3 - Product Ideation and Strategy 10 Hour
Design Thinking Tools- Brainstorming techniques, SCAMPER, Mind Mapping; Product Strategy- Market analysis, Competitive landscape, Product positioning, Product fitment, value identification
product development versus customer development; Feature Prioritization-Techniques for prioritizing features based on value and feasibility; User Story Writing- Defining user stories for product
features; Introduction to the 4Cs framework
Activities: 1. Brainstorming session for product ideas based on user research. 2. Feature prioritization exercise for a product concept. 3. Writing user stories for a chosen product concept.
Module-4 - Design and Prototyping 10 Hour

306
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Information Architecture (IA): Organizing content for optimal user experience; Interaction Design (IxD): Designing user interactions with the product; User Interface (UI) Design: Principles of UI design,
User interface elements; Low and High Fidelity Prototyping: Creating prototypes to test and validate design ideas.
Activities: 1. Develop an IA for a product concept. 2. Develop a low-fidelity and a high-fidelity prototype for the product concept.
Module-5 – Usability Testing and Iteration 9 Hour
Usability Testing Techniques: Planning, Conducting tests, Observing user behavior; Conducting Usability Testing with prototypes; Data Analysis & Iteration: Analyzing test results, identifying usability
issues, iterating on design; Design for Accessibility: Designing inclusive products for users with disabilities.
Activities:1. Conduct a usability test on a classmate's prototype and provide feedback. 2. Analyze usability test data and suggest iterations for the product prototype.

Learning 1. Norman, Don. The design of everyday things: Revised and expanded edition. 4. Saffer, Dan. Designing for Interaction: Creating Innovative Applications and
Resources Basic books, 2013. Devices.-Includes Index. New Riders, 2010
2. Cagan, Marty. Inspired: How to create tech products customers love. John 5. Shneiderman, Ben, and Catherine Plaisant. Designing the user interface: strategies
Wiley & Sons, 2017. for effective human-computer interaction. Pearson Education India, 2010.
3. Krug, Steve. Don't make me think!: a common sense approach to Web 6. Goodwin, Kim. Designing for the digital age: How to create human-centered
usability. Pearson Education India, 2000. products and services. John Wiley & Sons, 2011.
7. Norman Donald, A. (2013). The design of everyday things. MIT Press.

Learning Assessment
Bloom’s Level of Thinking Continuous Learning Assessment (CLA)

CLA-1 Average of CLA-2 Project Report and Viva Final


Unit test (20%) Based Learning Voce Examination
(60%) (20% Weightage) (0% weightage)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - -- 10% - 5% - -
Level 2 Understand 25% - - 10% - 5% - -
Level 3 Apply 30% - - 30% - 30% - -
Level 4 Analyze 30% - - 30% - 30% - -
Level 5 Evaluate - - - 10%- - 15%- - -
Level 6 Create - - - 10% - 15% - -
Total 100 % 100 % 100 % -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr Ramakrishnan Kalyanaraman, Intellect Design Arena Ltd 1. Dr. Ramkumar Rajendran, IIT Bombay, Mumbai. 1. Dr. R I Minu, SRMIST
2. Dr. K. Anitha. SRMIST

307
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE665T REVOLUTIONING BUSINESS WITH BLOCKCHAIN E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: introduce students to the fundamentals of blockchain technology
CLR-2: explore real-world use cases and applications of blockchain technology
CLR-3: analyze blockchain-based business models, revenue streams, and value propositions
CLR-4: examine the legal and regulatory landscape surrounding blockchain technology
CLR-5: explore the practical aspects of blockchain implementation

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: demonstrate a comprehensive understanding of smart contract fundamentals 3
CO-2: demonstrate the technical skills required to develop, deploy, and interact with smart contracts using solidity programming language 2
CO-3: learners able to identify and evaluate business applications of smart contracts across various industries 3
CO-4: demonstrate the ability to critically analyze the challenges and limitations associated with smart contract adoption 3
CO-5: explore emerging trends and future directions in smart contract technology 2

Module-1 - Introduction to Blockchain Technology 9 Hour


Understanding Blockchain Basics: Blocks, Chains, Nodes-Evolution of Blockchain Technology: Types of Blockchains: Public, Private, Consortium-Consensus Mechanisms: Proof of Work, Proof of Stake-
Cryptography Fundamentals for Blockchain-Use Cases of Blockchain in Business.
Module-2 - Business Applications of Blockchain 9 Hour
Overview of Blockchain Business Models-Supply Chain Management with Blockchain-Blockchain in Finance and Banking-Blockchain for Identity Management and KYC Smart Contracts and Decentralized
Applications (DApps)-Use Cases and Case Studies.
Module-3 - Regulatory and Legal Aspects of Blockchain 9 Hour
Legal Framework for Blockchain Businesses-Regulatory Compliance: GDPR, AML/KYC, Securities Laws-Intellectual Property Rights in Blockchain-Legal Challenges and Solutions in Blockchain Contracts-Cross-
Border Legal Considerations-Emerging Legal Trends in Blockchain.
Module-4 - Blockchain Implementation and Adoption Strategies 9 Hour
Strategies for Implementing Blockchain in Business-Blockchain Integration with Existing Systems-Challenges and Solutions in Blockchain Implementation-Blockchain Adoption Roadmap for Organizations-
Business Development and Partnerships in the Blockchain Ecosystem-Building and Scaling Blockchain Ventures.
Module-5 - Future Trends and Opportunities in Blockchain 9 Hour
Emerging Trends in Blockchain Technology-DeFi (Decentralized Finance) and Open Finance-NFTs (Non-Fungible Tokens) and Digital Asset Management-Web3.0 and the Decentralized Internet-Impact of
Emerging Technologies (AI, IoT) on Blockchain-Ethical and Societal Implications of Blockchain Technology.

308
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Antonopoulos, Andreas M., and Gavin Wood. Mastering ethereum: building smart 4. CFE, CITP. "Blockchain Basics: A Non-Technical Introduction in 25 Steps." The
contracts and dapps. O'reilly Media, 2018. CPA Journal 93.3/4 (2023): 13-13.
2. Infante, Roberto. Building Ethereum Dapps: decentralized applications on the Ethereum 5. Revolutionizing Financial Services and Markets Through FinTech and Blockchain,
Learning
blockchain. Simon and Schuster, 2019. Kiran Mehta, Renuka Sharma, Poshan Yu, IGI Global Publications, 1st edition,
Resources
3. Flynt, Oscar. Smart contracts: how to use blockchain smart contracts for cryptocurrency 2023.
exchange. Createspace Independent Publishing Platform, 2016. 6. Comert, Oguz. "Blockchain revolution: how the technology behind bitcoin and other
cryptocurrencies is changing the world." (2020): 272.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Kishore Kumar K, Senior Technical Consultant (Strategic 1. Dr.N.Balaji, Professor, Department of Computer Science and 1. Dr.A.Syed Ismail, SRMIST
Accounts) Manage Engine (A Division of Zoho Corporation) Engineering, Rajalakshmi Institute of Technology, Chennai
2. Dr. K. Suresh, Associate Professor, Department of Information
2. Dr.S.Ganesh Kumar, SRMIST
Technology, Sri Venkateswara College of Engineering, Sriperumbuthur

309
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course TRANSFORMING BUSINESS PARADIGMS OF DISTRIBUTED Course L T P C
21CSE666T E PROFESSIONAL ELECTIVE
Code Name LEDGER TECHNOLOGY Category 3 0 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the foundational principles of distributed ledger technology
CLR-2: explore diverse architectures and platforms
CLR-3: examine the diverse business applications across industries
CLR-4: analyze innovative business models and disruptions enabled by distributed ledger technology to empower
CLR-5: address the regulatory and ethical challenges associated with industries

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: demonstrate a solid understanding of the foundational principles of Distributed Ledger Technology 3 1 2
CO-2: explore to differentiate between different types such as blockchain, DAGs, and Hash graph 3 1 2
CO-3: identify and assess various business applications across industries. 3 1 2
CO-4: analyze innovative business models and disruptions enabled by Distributed Ledger Technology 3 1 2
CO-5: demonstrate an understanding of the legal and ethical implications in industries 3 1 2

Module-1 - Introduction 9 Hour


Understanding the Foundations of DLT: Brief history of DLT, Core principles: decentralization, immutability, consensus, Comparison with traditional databases, Evolution of blockchain technology, Use cases across
industries, Challenges and limitations, Future trends and innovations, Impact on business processes, Role in digital transformation
Module-2 - Types and Architectures 9 Hour
Exploring DLT Architectures and Platforms, Types of DLT: Blockchain, DAGs, Hash graph, Core components and architectural concepts, Consensus mechanisms: PoW, PoS, DPoS, Scalability and performance
considerations, Interoperability between DLT platforms, Real-world examples and case studies, Hybrid and consortium DLT networks, Integration with emerging technologies (AI, IoT), Use of smart contracts and
oracles
Module-3 - Business Applications 9 Hour
Implementing DLT Solutions in Business, Supply chain management and traceability, Digital identity verification and management, financial services: payments, lending, and banking, Tokenization of assets and
securities, Decentralized marketplaces and exchanges, Healthcare data management, Real estate transactions and property records, Intellectual property rights protection, Gaming and entertainment industry
applications
Module-4 - Business Models and Innovations 9 Hour
Innovating Business Models with DLT, Decentralized finance (DeFi) platforms, Token economies and incentive mechanisms, Decentralized Autonomous Organizations (DAOs), Platform-as-a-Service (PaaS) models,
Initial Coin Offerings (ICOs) and Security Token Offerings (STOs), Non-Fungible Tokens (NFTs) and digital collectibles, Subscription-based blockchain services, Impact on traditional business models, Opportunities
for startups and entrepreneurs
Module-5 - Regulatory and Ethical Considerations 9 Hour
310
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Addressing Regulatory and Ethical Challenges in DLT, Regulatory Landscape and Compliance Issues, Data Privacy and Security Concerns, Legal implications of Smart Contracts, Intellectual Property Rights and
licensing, AML/KYC regulations in Blockchain Transactions, Social Impact and Inequality Considerations, Environmental Sustainability, and Energy Consumption, Ethical frameworks for DLT adoption, Global
perspectives on DLT regulation

1. Drescher, Daniel. Blockchain Basics: A Non-Technical Introduction in 25 Steps. United 4. The Business Blockchain: Promise, Practice, and Application of the Next Internet
States: Apress, 2017. Technology: [Summary].. N.p.: Skillsoft, 2018.
Learning 2. Lantz, Lorne., Cawrey, Daniel. Mastering Blockchain. United States: O'Reilly Media, 2020. 5. De Filippi, Primavera., Wright, Aaron. Blockchain and the Law: The Rule of
Resources 3. Tapscott, Don., Tapscott, Alex. Blockchain Revolution: How the Technology Behind Bitcoin Code. N.p.: Harvard University Press, 2018.
and Other Cryptocurrencies Is Changing the World. United States: Penguin Publishing
Group, 2018.

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2 –
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Kishore Kumar K, Senior Technical Consultant (Strategic 1. Dr.N.Balaji, Professor, Department of Computer Science and 1. Dr.A.Syed Ismail, SRMIST
Accounts) ManageEngine (A Division of Zoho Corporation) Engineering, Rajalakshmi Institute of Technology, Chennai
2. Dr. K. Suresh, Associate Professor, Department of Information 2. Dr.S.Ganesh Kumar, SRMIST
Technology, Sri Venkateswara College of Engineering Sriperumbuthur

311
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE667T EMPOWERING BUSINESS WITH SMART CONTRACTS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: grasp the foundational principles and features of smart contracts
CLR-2: acquire the technical skills necessary to write, deploy, and interact with smart contracts
CLR-3: explore diverse business applications of smart contracts across industries
CLR-4: examine the challenges and limitations associated with smart contract adoption
CLR-5: explore potential disruptions and transformative impacts on industries

Programme Outcomes
Course Outcomes At the end of this course, learners will be able to: (PO)
(CO): 1 2 3
CO-1: demonstrate a comprehensive understanding of smart contract fundamentals 3
CO-2: demonstrate the technical skills required to develop, deploy, and interact with smart contracts using solidity programming language 2
CO-3: identify and evaluate business applications of smart contracts across various industries 3
CO-4: demonstrate the ability to critically analyze the challenges and limitations associated with smart contract adoption 2
CO-5: explore emerging trends and future directions in smart contract technology 3

Module-1 - Introduction 9 Hour


Understanding the Fundamentals of Smart Contracts, Definition and overview of smart contracts, Core principles and features of smart contracts, History and evolution of smart contract technology, Comparison
with traditional contracts, Use cases and applications in business, Challenges and limitations, Future trends and innovations
Module-2 - Smart Contract Development 9 Hour
Developing Smart Contracts for Business Applications, Basics of Solidity programming language, Smart contract architecture and design patterns, Writing and deploying smart contracts on blockchain platforms,
Testing and debugging smart contracts, Security best practices for smart contract development, Interacting with smart contracts through front-end applications, Integrating oracles and external data sources
Module-3 - Business Applications of Smart Contracts 9 Hour
Leveraging Smart Contracts for Business Processes, Supply chain management and logistics, Financial services: payments, lending, and insurance, Tokenization of assets and securities, Digital identity
management, Legal agreements and contract automation, Real estate transactions and property management, Intellectual property rights management
Module-4 - Implementing Smart Contracts in Business 9 Hour
Integrating Smart Contracts into Business Operations, Evaluating readiness and feasibility for smart contract adoption, Designing smart contract-based solutions for specific business needs, Deploying smart contracts
on blockchain networks, Integrating smart contracts with existing systems and processes, Training employees on smart contract usage and management, Monitoring and managing smart contract performance and
security, Compliance considerations and regulatory frameworks
Module-5 - Challenges and Future Directions 9 Hour
Addressing Challenges and Exploring Future Opportunities, Security vulnerabilities and risk management, Scalability and performance issues, Interoperability between different blockchain platforms, Regulatory and
legal considerations, Ethical implications of smart contract adoption, Emerging trends and innovations in smart contract technology, Potential disruptions and transformative impacts on industries

312
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Antonopoulos, Andreas M., and Gavin Wood. Mastering ethereum: building smart 4. Flynt, Oscar. Smart contracts: how to use blockchain smart contracts for cryptocurrency
contracts and dapps. O'reilly Media, 2018 exchange. Createspace Independent Publishing Platform, 2016.
Learning 2. Infante, Roberto. Building Ethereum Dapps: decentralized applications on the Ethereum 5. CFE, CITP. "Blockchain Basics: A Non-Technical Introduction in 25 Steps." The CPA
Resources blockchain. Simon and Schuster, 2019 Journal 93.3/4 (2023): 13-13.
3. Flynt, Oscar. Smart contracts: how to use blockchain smart contracts for cryptocurrency 6. Comert, Oguz. "Blockchain revolution: how the technology behind bitcoin and other
exchange. Createspace Independent Publishing Platform, 2016. cryptocurrencies is changing the world." (2020): 272.

Learning Assessment
Bloom’s Continuous Learning Assessment (CLA) Summative
Level of Thinking Formative Life Long Learning Final Examination
CLA-1 Average of unit test CLA-2 – (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 15% - 15% - 15% -
Level 2 Understand 25% - 20% - 25% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Kishore Kumar K, Senior Technical Consultant (Strategic 1. Dr.N.Balaji, Professor, Department of Computer Science and 1. Dr.A.Syed Ismail, SRMIST
Accounts) ManageEngine (A Division of Zoho Corporation Engineering, Rajalakshmi Institute of Technology, Chennai
2. Dr. K. Suresh, Associate Professor, Department of Information 2. Dr.S.Ganesh Kumar, SRMIST
Technology, Sri Venkateswara College of Engineering

313
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course Course Course L T P C
21CSE668T BUSINESS DATA ANALYTICS E PROFESSIONAL ELECTIVE
Code Name Category 3 0 0 3

Pre-requisite Co- requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes / Standards Nil

Course Learning
The purpose of learning this course is to:
Rationale (CLR):
CLR-1: understand the role of data analytics in modern business.
CLR-2: master techniques for data collection, cleaning, and analysis.
CLR-3: apply statistical methods and machine learning algorithms to business problems.
CLR-4: interpret data analysis results and communicate findings effectively.
CLR-5: critically evaluate ethical concerns surrounding data usage.

Programme Outcomes
Course Outcomes
At the end of this course, learners will be able to: (PO)
(CO):
1 2 3
CO-1: apply data analytics techniques and tools across finance, supply chain, HR, healthcare, and customer domains. 3
CO-2: identify and solve complex business problems using data-driven approaches. 2 1
CO-3: effectively communicate data-driven insights to diverse stakeholders. 2
CO-4: evaluate the ethical and privacy implications of data collection and analysis. 1 2
CO-5: collaborate with cross-functional teams to leverage data for business impact. 3

Module-1 - Marketing Analytics 9 Hour


Resource Allocation, Cluster Analysis, Conjoint Analysis, Linear Regression, Customer Lifetime Value (CLTV), Marketing Experiments, Paid Search Advertising Text Analytics, Logistic Regression, Recommendation
Systems, Automation of Marketing Models, Case Studies
Module-2 - Workforce Analytics 9 Hour
Workforce Analytics Fundamentals. Building a Workforce Analytics Function, Data Collection and Measurement, Analyzing Workforce Data Linking to Business Outcomes. Actionable Recommendations,
Implementing Solutions, Evaluating Success, Future Trends, Case Studies
Module-3 Supply Chain Analytics 9 Hour
Introduction to Supply Chain Analytics, Data Management and Visualization, Forecasting and Demand Planning, Inventory Management Warehousing and Transportation, Network Optimization, Supply Chain Risk
Management, Sustainability and Social Responsibility
Module-4 - Financial Analytics 9 Hour
Introduction and Overview of Financial Statements, Analysis of Financial Statements, Profitability Analysis, Credit Risk Analysis Accounting Analysis and Adjustment, Forecasting and Valuation, Cost of Capital
Estimation, Company Valuation
Module-5 - Healthcare Analytics and Ethics 9 Hour
Healthcare Data Sources and Basic Analytics - various healthcare data sources and analytical techniques used in the processing and analysis of such data, Advanced Data Analytics for Healthcare - advanced
analytical methods, including clinical prediction models, temporal pattern mining methods, and visual analytics, Applications and Practical Systems for Healthcare - applications of data analytics to pervasive
healthcare, fraud detection, and drug discovery along with systems for medical imaging and decision support, Patient Privacy and Data Security (HIPAA), Bias and Fairness in Healthcare Algorithms, Informed
Consent and Data Sharing, Ethical Considerations in AI and Healthcare, Legal and Regulatory Compliance

314
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
1. Rajkumar Venkatesan, Paul W. Farris, Ronald T. Wilcox , Marketing Analytics: Essential 3. Liu, K, Supply Chain Analytics: Concepts, Techniques and Applications., Springer,
Tools for Data-Driven Decisions, University of Virginia Press, First Edition, 2021 First Edition, 2022.,
Learning 2. Nigel Guenole, Jonathan Ferrar, Sheri Feinzig , The Power of People: Learn how Successful 4. Peter D. Easton Financial Statement Analysis and Valuation Paperback, McGraw
Resources Organizations Use Workforce Analytics to Improve Business Performance, Pearson Hill Education; Fourth edition, 2020
Education, First Edition , 2017

Learning Assessment
Continuous Learning Assessment (CLA)
Summative
Formative Life-Long Learning
Bloom’s Final Examination
CLA-1 Average of unit test CLA-2
Level of Thinking (40% weightage)
(50%) (10%)
Theory Practice Theory Practice Theory Practice
Level 1 Remember 20% - 15% - 20% -
Level 2 Understand 20% - 20% - 20% -
Level 3 Apply 30% - 25% - 30% -
Level 4 Analyze 30% - 25% - 30% -
Level 5 Evaluate - - 10% - - -
Level 6 Create - - 5% - - -
Total 100 % 100 % 100 %

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr.V.Selvakumar,Hexaware Technologies 1.Dr. Evangelos E. Milios, Faculty of Computer Science, Dalhousie University 1.Mr.Venkatesh, SRMIST
2.Ms. Sudha B G, Great Learning 2.Dr.A.Shanthini, SRMIST

315
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE669P Course QUANTUM COMMUNICATION AND CRYPTOGRAPHY Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards NA

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: gain knowledge about basics of cryptographic techniques
CLR-2: learn about the symmetric and asymmetric cryptographic algorithms
CLR-3: utilize quantum tools for error correction, encryption and decryption
CLR-4: learn the protocols for secure key transmission
CLR-5: utilize the post quantum cryptographic techniques

Course Outcomes At the end of this course, learners will be able to: Programme Outcomes
(CO): (PO)
1 2 3
CO-1: identify basic cryptographic techniques 1 - 2
CO-2: compare symmetric and asymmetric cryptographic algorithms 2 - 2
CO-3: develop a tool for cryptographic algorithm and error correction mechanisms 2 - 3
CO-4: incorporate the secure key transmission protocols 2 - 2
CO-5: demonstrate the post cryptographic techniques 1 - 3

Module-1 - Basics of Cryptography 9 Hour


Introduction to Cryptography, Classical Cryptography Vs Quantum Cryptography, Need for Quantum Cryptography, Security Threats, Active and Passive attacks, Brute Force Attacks, Symmetric
Cipher Model, Cryptanalysis, Substitution Techniques, Transposition Techniques, Steganography.
Module-2 - Symmetric and Asymmetric Key Cryptography 9 Hour
Feistel Cipher Structure, Simplified DES, DES, AES, Public-Key Cryptography: Principles Of Public-Key Cryptography, RSA Algorithm, Diffie- Hellman Key Exchange, Cbits VS Qbits, Quantum bits,
Quantum entanglement, Quantum Teleportation.
Module-3- Quantum Communication 9 Hour
Single Qubits, Multiple Qubits, Quantum Circuits, Combining Qubits using Tensor Product, Quantum Tools and a first protocol, quantum money, Basic quantum error correction tools.
Module-4- Secure Key Distribution 9 Hour
Key distribution in a special classical channel, Quantum key distribution protocols - The BB84 quantum key distribution protocol, BBM92 protocol, Ekert91 protocol, Six state protocols.
Module-5 - Post Quantum Cryptography 9 Hour
Lattice Based Cryptography, Code-Based Cryptography, Hash-Based Cryptography, Multivariate Polynomial Cryptography, Use Cases in Quantum Cryptography.

316
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. William Stallings, Cryptography and Network Security Principles and Practice 3. Daniel J. Bernstein, Johannes Buchmann and Erik Dahmen, “Post-Quantum
Resources Fourth Edition, Pearson Education, 2019. Cryptography”, 2007.
2. Thomas Vidick and Stephanie Wehner, “Introduction to Quantum 4. N. David Mermin, "Quantum Computer Science" by Cambridge University Press, 2007.
Cryptography”, Cambridge University Press, 2023.

Learning Assessment
Bloom’s Level of Thinking Continuous Learning Assessment (CLA)

CLA-1 Average of CLA-2 Project Report and Viva Final


Unit test (20%) Based Learning Voce Examination
(60%) (20% Weightage) (0% weightage)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - -- 20% - 10% - -
Level 2 Understand 30% - - 20% - 10% - -
Level 3 Apply 20% - - 20% - 10% - -
Level 4 Analyze 20% - - 20% - 10% - -
Level 5 Evaluate - - - 10% - 30% - -
Level 6 Create - - - 10% - 30% - -
Total 100 % 100 % 100 % -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Jithesh Lalwani, Founder and CEO, Artificial Brain, 1. Nishant K Pathak, Senior Research Fellow, 1. Dr. G. K. Sandhia, SRMIST
Pune (Experimental Quantum optics), IIT Delhi
2. Dr. M. Gayathri, SRMIST

317
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSE670P Course NP COMPLETENESS AND BEYOND Course E PROFESSIONAL ELECTIVE L T P C
Code Name Category 2 1 0 3

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: have a deeper understanding of the notion of NP-completeness theory,
CLR-2: design faster algorithms when some parameters in the input are small,
CLR-3: develop better than brute force exponential algorithms for NP-complete problems,
CLR-4: learn about Randomization as a valuable asset/tool in crafting algorithms for computational problems, and
CLR-5: learn various techniques to design approximation algorithms for tackling NP-complete problems.

Course Outcomes At the end of this course, learners will be able to: Programme Outcomes
(CO): (PO)
1 2 3
CO-1: demonstrate ability to prove that a problem is NP-complete. 3 - 3
CO-2: design Parameterized algorithms for coping with NP-completeness. 3 - -
CO-3: design faster than brute force exponential algorithms for NP-complete problems, 3 - -
CO-4: utilize randomness to enhance algorithmic performance, and to 3 - 3
CO-5: develop and analyse algorithms that yield near-optimal solutions for NP-hard problems, within polynomial time. 3 - -

Module-1 - Reductions And Np-Completeness 9 Hour


Basic review of polynomial time solvable algorithms, Polynomial reductions, the notion of P, NP and NP-complete. Example reductions including to 3SAT, CLIQUE, VERTEX COVER, SET COVER,
DOMINATING SET.
Module-2 - Exact Exponential Time Algorithms 9 Hour
Exact Algorithms for Colouring, TSP, SAT, Directed Feedback Arc Set, Max-Cut, Monotone-Local-Search
Module-3 - Parameterized Algorithms 9 Hour
Basic Concepts, Branching, Kernelization, Iterative Compression, Randomized parameterised algorithms
Module-4 - Approximation Algorithms 9 Hour
Greedy Algorithm – Load Balancing, Centre Selection Problem, Set Cover, The Pricing Method: Vertex Cover, Linear Programming and Rounding: An application to Vertex Cover, Knapsack,
Randomized approximation algorithms
Module-5 - Graph Classes 9 Hour
Bipartite, Chordal and Interval Graphs, Tree-decompositions and Chordal Graphs

318
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Learning 1. John Kleinberg and Eva Tardos, Algorithm Design, Pearson Education, Inc., 2006. 3. Fedor V. Fomin and Dieter Kratsch, Exact exponential algorithms. Springer,
Resources 2. Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Daniel Marx, 2010.
Marcin Pilipczuk, Michal Pilipczuk, Saket Saurabh: Parameterized Algorithms. 4. David P. Williamson, David B. Shmoys: The Design of Approximation Algorithms.
Springer 2015. Cambridge University Press 2011.

Learning Assessment
Bloom’s Level of Thinking Continuous Learning Assessment
CLA-1 Average of CLA-2 Project Report and Viva Final
Unit test (20%) Based Learning Voce Examination
(60%) (20% Weightage) (0% weightage)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember 30% - -- 20% - 10% - -
Level 2 Understand 30% - - 20% - 10% - -
Level 3 Apply 20% - - 20% - 10% - -
Level 4 Analyze 20% - - 20% - 10% - -
Level 5 Evaluate - - - 10% - 30% - -
Level 6 Create - - - 10% - 30% - -
Total 100 % 100 % 100 % -

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Prof. Venkatesh Raman, The Institute of Mathematical Sciences, 1. Prof. R. Indhumathi, SRMIST
Chennai
2. Prof. Saket Saurabh, The Institute of Mathematical Sciences, 2. Dr. K. Vijaya, SRMIST
Chennai

319
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
ACADEMIC CURRICULA

Non-Credit Courses

Regulations 2021

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY


(Deemed to be University u/s 3 of UGC Act, 1956)

Kattankulathur, Chengalpattu District 603203, Tamil Nadu,


India

320
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSM501L Course PROFESSIONAL SOFT SKILLS-I Course M NON-CREDIT L T P C
Code Name Category 0 0 2 0

Pre-requisite Nil Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: Aid the students to develop a positive outlook, interpret body language of team members and stakeholders, and foster better interpersonal relationships. Build self-motivation,
confidence, and practice responding thoughtfully instead of reacting.
CLR-2: Create effective presentations and present with confidence. Recognize and manage stress, prioritize tasks, and plan efficiently.
CLR-3: Listen to understand and formulate insightful questions.
CLR-4: Understand team dynamics and apply principles of effective teamwork and business ethics.
CLR-5: Construct grammatically correct sentences in writing and speaking.

Course Outcomes At the end of this course, learners will be able to: Programme Outcomes
(CO): (PO)
1 2 3
CO-1: grasp and apply a positive outlook, accurately interpret the body language of team members and stakeholders and enhance interpersonal 1 - -
relationships.
CO-2: create effective presentations and deliver them with confidence. Additionally, to recognize and manage stress, prioritize tasks, and plan effectively. 1 - -
CO-3: listen with the intent to understand and to be capable of asking insightful questions. 1 - -
CO-4: comprehend the qualities of being a good team player, understand team dynamics, and grasp business ethics. 1 - -
CO-5: write and speak accurately, forming grammatically correct sentences. 1 - -

Module-1 – Positive Attitude 6 Hour


Attitude- Campus to Corporate attitude change, Recognizing Negative Attitude, Campus to Corporate attitude change; Attitude at work- Impact of Negative Attitude in the Workplace, Overcoming
Negative Attitude, positive attitude, thought process, Building self-confidence and Assertiveness; Toxic positivity;3Es, Motivation-Intrinsic and Extrinsic Motivation, Inspiration vs motivation; Emotional
Intelligence-Intro to EI, Four clusters. Transactional Analysis (TA), SWOT analysis - Professional analysis.
Module-2 – Body Language 6 Hour
Importance of Body Language, Five Cs of Body Language, Body language in different cultures, Positive Body Language; Voice Control- Pace. Pause and Pitch; Culture-Inclusivity and Proxemics across
Global Cultures, Understanding POSH; Stress Management-What is Stress, Eustress, Reasons of stress (work/ personal); Stress Management Techniques.
Module-3 – Presentation Skills 6 Hour
Self-introduction – Exercises, Why Give Presentations; Craft your message-Plan the visuals, Manage the Response; How to create an effective presentation -Virtual & Physical, Do’s & Don'ts of
Presentation Skills, Objection handling, Stage Fear – Causes and Cure, Practice the Delivery; Time Management-Common Time & Energy Wasters, Planning & Prioritizing Time Matrix & Analysis
Module-4 – Listening and Questioning Skills 6 Hour
Barriers to effective listening - how to overcome them; Exercises - Customer Call Flow – Role-play, Cust calls amongst the team; How to frame Questions, Different kinds of questions, asking
appropriate questions; Spoken English-Introduction to Parts of Speech and its usage; Subject- Verb Agreement; Basic conversation skills-sentence construction -SVO
Module-5 – Teamwork 6 Hour
321
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Teamwork and Ethics-Definition of TEAM - Team vs Groups. Difference b/w Healthy competition and cut throat competition, Importance of working in teams, Evolution of a TEAM, Benefits of team work;
Virtual teams- Challenges and ways to overcome it, Diversity and Inclusion in a team; Development of Teams Stages of team development; Team dynamics-its importance & Interpersonal Skills
Development Ethics- to enable students to identify and deal with ethical problems, develop their moral intuitions, which are implicit in everyday choices and actions; Conflict Management: Team building
Activities- Predetermined/ Predesigned Indoor/ Outdoor activities to build a team, enhance language and inter personal skills

Learning 1. "The Power of a Positive Attitude: A Step-by-Step Guide to Achieving a Positive Attitude" 4. "The Art of Asking Questions" by Ernest Dichter, Routledge(2018)
Resources by Roger Fritz, HarperCollins(2022) 5. "Emotional Intelligence 2.0" by Travis Bradberry and Jean Greaves,
2. "Presentation Skills 201: How to Take Your Presentation to the Next Level" by William R. TalentSmart(2009)
Steele, Steele Publishing(2019) 6. "Effective Communication Skills: The Ultimate Guide to Being a Better
3. "The Art of Listening: Improve Your Listening Skills and Communicate More Effectively" Communicator" by John Nielsen, Skill Builders(2021)
by Michael S. Watkins, Harvard Business Review Press(2020)

Learning Assessment
Continuous Learning Assessment (CLA)
Final Examination
Bloom’s CLA-1 Average of Unit Tests CLA-2 Formative Assessments Summative
(0% weightage)
Level of Thinking (30%) (30%) (40% weightage)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember - 40% - 40% - 40%
Level 2 Understand - 40% - 40% - 40%
Level 3 Apply - 10% - 10% - 10%
Level 4 Analyze - 10% - 10% - 10%
Level 5 Evaluate - % - % - %
Level 6 Create - % - % - %
Total 100 % 100 % 100%

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan,SRMIST

2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja,SRMIST


3. Dr.R.Balaji Ganesh,SRMIST
4.Dr.R.Deebalakshmi,SRMIST

322
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Course 21CSM502L Course PROFESSIONAL SOFT SKILLS-II Course M NON-CREDIT L T P C
Code Name Category 0 0 2 0

Pre-requisite 21CSM501L Co-requisite Nil Progressive Nil


Courses Courses Courses
Course Offering Department School of Computing Data Book / Codes/Standards Nil

Course Learning The purpose of learning this course is to:


Rationale (CLR):
CLR-1: Improve pronunciation and clarity in communication.
CLR-2: Learn effective customer service techniques and handle various customer interactions.
CLR-3: Understand problem-solving techniques and decision-making processes.
CLR-4: Master business email and chat communication practices.
CLR-5: Learn basic finance concepts like financial statements and budgeting.

Course Outcomes At the end of this course, learners will be able to: Programme Outcomes
(CO): (PO)
1 2 3
CO-1: Enhance pronunciation, clarity, and enunciation in professional settings. 1
CO-2: Manage customer interactions and distinguish between customer service and experience. 1
CO-3: Solve problems, make decisions, and address biases with creative and analytical methods. 1 1 1
CO-4: Apply email etiquette and chat practices in a professional setting. 1
CO-5: Explain financial statements, budgeting, and essential finance concepts. 1 1 1

Module-1 – Accent Neutralization 6 Hour


Identifying and dealing with Mother Tongue Influence (MTI) – Pronunciation - Vowel Sounds and Consonant Sounds – Inflection – Pausing - Reducing rate of speech - Volume and tone – Pitch –
Clarity - and enunciation.
Module-2 – Customer Service 6 Hour
Customer Service - Different types of customers - Difference between customer service and customer experience - Telephone Etiquette - Handling difficult customers.
Module-3 – Problem Solving and Decision Making 6 Hour
Define a Problem - Define Decision Making- Blocks in problem solving - Stereotyping and unconscious biases - The process of Problem Solving and decision making - Problem Analysis- Decision
Analysis - Potential Problem / Opportunity Analysis - Creative Thinking - Problem Solving process - Implementation of the solution.
Module-4 – Business Email Etiquette and Chat 6 Hour
Emails Etiquette: Share format/ signature - Emails etiquette - dos and don’ts.
Module-5 – Basics of Finance 6 Hour

323
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Accounting systems and how transactions are recorded - Financial statements: Profit &Loss account - balance sheet - cash flow statement - Fixed assets - depreciation and the capitalization of software
development expense - Working capital and cash management - Using ratio analysis to assess corporate health and performance - Funding the business: equity - debt and other aspects - Budgeting
&Forecasting – capex – apex - Designing a flexible budget - Capital expenditure appraisal and approval

Learning 1. "English Pronunciation in Use Advanced Book with Answers: A Comprehensive Course 4.. "Accent Neutralization: A Workbook for Mastering Pronunciation" by Michael J.
Resources for Professionals" by Martin Hewings, Cambridge University Press(2020) O’Neill,2019
2. "Creative Problem Solving for Managers: Developing Skills for Decision Making and 5. "Customer Service 101: Quick and Easy Techniques to Supercharge Your
Innovation" by Tony Proctor, Routledge(2022) Customer Service Skills" by Peter O’Neill, Morgan James Publishing(2022)
7. "Budgeting and Forecasting: A Practical Guide to Planning and Controlling Business 6. "Finance for Non-Financial Managers" by Gene Siciliano, AMACOM(2021)
Finances" by David O’Reilly, Wiley(2021)

Learning Assessment
Continuous Learning Assessment (CLA)
Final Examination
Bloom’s CLA-1 Average of Unit Tests CLA-2 Formative Assessments Summative
(0% weightage)
Level of Thinking (30%) (30%) (40% weightage)
Theory Practice Theory Practice Theory Practice Theory Practice
Level 1 Remember - 40% - 40% - 40%
Level 2 Understand - 40% - 40% - 40%
Level 3 Apply - 10% - 10% - 10%
Level 4 Analyze - 10% - 10% - 10%
Level 5 Evaluate - % - % - %
Level 6 Create - % - % - %
Total 100 % 100 % 100%

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Rathinavel, LTI MindTree 1. Prof. Y.V.S.S. Sanyasiraju, IIT Madras 1. Dr.R.Jagadeesh Kannan,SRMIST
2. Prof. K.C. Sivakumar, IIT Madras 2.. Dr.S.Kanaga Suba Raja,SRMIST
3. Dr.R.Balaji Ganesh,SRMIST
4.Dr.R.Deebalakshmi,SRMIST

324
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
SRM INSTITUTE OF SCIENCE AND TECHNOLOGY
(Deemed to be University u/s 3 of UGC Act, 1956)

325
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy
Kattankulathur, Chengalpattu District 603203, Tamil Nadu,
India

326
M.Tech Programmes-Regulations 2021-Volume-23-School of Computing Syllabi-Control Copy

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy