R19M.Tech - CS CSESyllabus
R19M.Tech - CS CSESyllabus
R19M.Tech - CS CSESyllabus
CSE/CS
I YEAR I – SEMESTER
Course Code Course Title L T P Credits
Professional Mathematical Foundations of Computer Science
3 0 0 3
Core - I
Professional Advanced Data Structures
3 0 0 3
Core - II
1. Information Security
Professional
2. Mobile Application Development 3 0 0 3
Elective - I
3. Machine Learning
1. Network Security
Professional
2. Cloud Computing 3 0 0 3
Elective - II
3. Data Mining
Lab - I Advanced Data Structures Lab 0 0 4 2
Lab - II Machine Learning Lab 0 0 4 2
Research Methodology & IPR 2 0 0 2
Audit - I Audit Course - I 2 0 0 0
Total 16 0 8 18
I YEAR II – SEMESTER
Course Code Course Title L T P Credits
Professional Advanced Algorithms
3 0 0 3
Core - III
Professional Advanced Computer Architecture
3 0 0 3
Core - IV
1. Web and Database Security
Professional
2. Internet of Things 3 0 0 3
Elective - III
3. Data Science
1. Cyber Security
Professional
2. Advanced Computer Networks 3 0 0 3
Elective - IV
3. Big Data Analytics
Lab - III Advanced Algorithms Lab 0 0 4 2
Lab - IV Data Science Lab 0 0 4 2
Mini Project with Seminar 0 0 4 2
Audit - II Audit Course - II 2 0 0 0
Total 14 0 12 18
Page 1 of 55
R19 M.TECH. CSE/CS
II YEAR II - SEMESTER
Course Code Course Title L T P Credits
Dissertation Dissertation Work Review - III 0 0 12 6
Dissertation Dissertation Viva-Voce 0 0 28 14
Total 0 0 40 20
*For Dissertation Work Review - I, Please refer 7.8 in R19 Academic Regulations.
Page 2 of 55
R19 M.TECH. CSE/CS
Course Objectives:
To understand the mathematical fundamentals that is prerequisites for a variety of courses
like Data mining, Network protocols, analysis of Web traffic, Computer security, Software
engineering, Computer architecture, operating systems, distributed systems, Bioinformatics,
Machine learning.
To develop the understanding of the mathematical and logical basis to many modern
techniques in information technology like machine learning, programming language design,
and concurrency.
To study various sampling and classification problems.
UNIT – I
Probability mass, density, and cumulative distribution functions, Parametric families of distributions,
Expected value, variance, conditional expectation,
Applications of the univariate and multivariate Central Limit Theorem, Probabilistic inequalities,
Markov chains
UNIT - II
Random samples, sampling distributions of estimators, Methods of Moments and Maximum
Likelihood,
UNIT - III
Statistical inference, Introduction to multivariate statistical models: regression and classification
problems, principal components analysis, The problem of over fitting model assessment.
UNIT – IV
Graph Theory: Isomorphism, Planar graphs, graph colouring, Hamilton circuits and Euler cycles.
Permutations and Combinations with and without repetition. Specialized techniques to solve
combinatorial enumeration problems
UNIT-V
Computer science and engineering applications Data mining, Network protocols, analysis of Web
traffic, Computer security, Software engineering, Computer architecture, operating systems,
distributed systems, Bioinformatics, Machine learning.
Recent Trends in various distribution functions in mathematical field of computer science for varying
fields like bio-informatics, soft computing, and computer vision.
Page 3 of 55
R19 M.TECH. CSE/CS
Text Book:
John Vince, Foundation Mathematics for Computer Science, Springer.
References:
1. K. Trivedi. Probability and Statistics with Reliability, Queuing, and Computer Science
Applications. Wiley.
2. M. Mitzenmacher and E. Upfal. Probability and Computing: Randomized Algorithms and
Probabilistic Analysis.
3. Alan Tucker, Applied Combinatorics, Wiley
Page 4 of 55
R19 M.TECH. CSE/CS
UNIT - I
Dictionaries:
Definition, Dictionary, Abstract Data Type, Implementation of Dictionaries.
Hashing:
Review of Hashing, Hash Function, Collision Resolution Techniques in Hashing, Separate Chaining,
Open Addressing, Linear Probing, Quadratic Probing, Double Hashing, Rehashing, Extendible
Hashing.
UNIT - II
Skip Lists:
Need for Randomizing Data Structures and Algorithms, Search and Update Operations on Skip Lists,
Probabilistic Analysis of Skip Lists, Deterministic Skip Lists.
UNIT - III
Trees:
Binary Search Trees, AVL Trees, Red Black Trees, 2-3 Trees, B-Trees, Splay Trees
UNIT - IV
Text Processing:
Sting Operations, Brute-Force Pattern Matching, The Boyer- Moore Algorithm, The Knuth-Morris-Pratt
Algorithm, Standard Tries, Compressed Tries, Suffix Tries, The Huffman Coding Algorithm, The
Longest Common Subsequence Problem (LCS), Applying Dynamic Programming to the LCS Problem
UNIT - V
Computational Geometry:
One Dimensional Range Searching, Two-Dimensional Range Searching, constructing a Priority
Search Tree, Searching a Priority Search Tree, Priority Range Trees, Quadtrees, k-D Trees.
Recent Trands in Hashing, Trees, and various computational geometry methods for efficiently solving
the new evolving problem
Page 5 of 55
R19 M.TECH. CSE/CS
References:
1. Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, 2nd Edition, Pearson,
2004.
2. M T Goodrich, Roberto Tamassia, Algorithm Design, John Wiley, 2002.
Page 6 of 55
R19 M.TECH. CSE/CS
Prerequisites
1. A Course on “Computer Networks and a course on Mathematics
Course Objectives
1. To understand the fundamentals of Cryptography
2. To understand various key distribution and management schemes
3. To understand how to deploy encryption techniques to secure data in transit across data
networks
4. To apply algorithms used for secure transactions in real world applications
Course Outcomes
1. Demonstrate the knowledge of cryptography, network security concepts and applications.
2. Ability to apply security principles in system design.
3. Ability to identify and investigate vulnerabilities and security threats and mechanisms to
counter them.
UNIT - I
Security Attacks (Interruption, Interception, Modification and Fabrication), Security Services
(Confidentiality, Authentication, Integrity, Non-repudiation, access Control and Availability) and
Mechanisms, A model for Internetwork security.
Classical Encryption Techniques, DES, Strength of DES, Differential and Linear Cryptanalysis, Block
Cipher Design Principles and Modes of operation, Blowfish, Placement of Encryption Function, Traffic
Confidentiality, key Distribution, Random Number Generation.
UNIT - II
Public key Cryptography Principles, RSA algorithm, Key Management, Diffie-Hellman Key Exchange,
Elliptic Curve Cryptography.
Message authentication and Hash Functions, Authentication Requirements and Functions, Message
Authentication, Hash Functions and MACs Hash and MAC Algorithms SHA-512, HMAC.
UNIT - III
Digital Signatures, Authentication Protocols, Digital signature Standard, Authentication Applications,
Kerberos, X.509 Directory Authentication Service.
Email Security: Pretty Good Privacy (PGP) and S/MIME.
UNIT - IV
IP Security:
Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload,
Combining Security Associations and Key Management.
Web Security: Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer Security
(TLS), Secure Electronic Transaction (SET).
UNIT - V
Intruders, Viruses and Worms Intruders, Viruses and related threats Firewalls: Firewall Design
Principles, Trusted Systems, Intrusion Detection Systems.
Text Book:
Page 7 of 55
R19 M.TECH. CSE/CS
1. Cryptography and Network Security (principles and approaches) by William Stallings Pearson
Education, 4th Edition.
Reference Books:
1. Network Security Essentials (Applications and Standards) by William Stallings Pearson
Education.
2. Principles of Information Security, Whitman, Thomson.
Page 8 of 55
R19 M.TECH. CSE/CS
Prerequisites
1. Acquaintance with JAVA programming
2. A Course on DBMS
Course Objectives:
1. To demonstrate their understanding of the fundamentals of Android operating systems
2. To improves their skills of using Android software development tools
3. To demonstrate their ability to develop software with reasonable complexity on mobile
platform
4. To demonstrate their ability to deploy software to mobile devices
5. To demonstrate their ability to debug programs running on mobile devices
Course Outcomes:
1. Student understands the working of Android OS Practically.
2. Student will be able to develop Android user interfaces
3. Student will be able to develop, deploy and maintain the Android Applications.
UNIT - I
Introduction to Android Operating System: Android OS design and Features – Android development
framework, SDK features, Installing and running applications on Android Studio, Creating AVDs,
Types of Android applications, Best practices in Android programming, Android tools
Android application components – Android Manifest file, Externalizing resources like values, themes,
layouts, Menus etc, Resources for different devices and languages, Runtime Configuration Changes
Android Application Lifecycle – Activities, Activity lifecycle, activity states, monitoring state changes
UNIT - II
Android User Interface: Measurements – Device and pixel density independent measuring UNIT - s
Layouts – Linear, Relative, Grid and Table Layouts
User Interface (UI) Components – Editable and non editable TextViews, Buttons, Radio and Toggle
Buttons, Checkboxes, Spinners, Dialog and pickers
Event Handling – Handling clicks or changes of various UI components
Fragments – Creating fragments, Lifecycle of fragments, Fragment states, Adding fragments to
Activity, adding, removing and replacing fragments with fragment transactions, interfacing between
fragments and Activities, Multi-screen Activities
UNIT - III
Intents and Broadcasts: Intent – Using intents to launch Activities, Explicitly starting new Activity,
Implicit Intents, Passing data to Intents, Getting results from Activities, Native Actions, using Intent to
dial a number or to send SMS
Broadcast Receivers – Using Intent filters to service implicit Intents, Resolving Intent filters, finding
and using Intents received within an Activity
Notifications – Creating and Displaying notifications, Displaying Toasts
UNIT - IV
Page 9 of 55
R19 M.TECH. CSE/CS
Persistent Storage: Files – Using application specific folders and files, creating files, reading data from
files, listing contents of a directory Shared Preferences – Creating shared preferences, saving and
retrieving data using Shared Preference
UNIT - V
Database – Introduction to SQLite database, creating and opening a database, creating tables,
inserting retrieving and etindelg data, Registering Content Providers, Using content Providers (insert,
delete, retrieve and update)
Text Books:
1. Professional Android 4 Application Dnetwork evelopment, Reto Meier, Wiley India, (Wrox) ,
2012
2. Android Application Development for Java Programmers, James C Sheusi, Cengage
Learning, 2013
Reference:
1. Beginning Android 4 Application Development, Wei-Meng Lee, Wiley India (Wrox), 2013
Page 10 of 55
R19 M.TECH. CSE/CS
Course Objectives:
To learn the concept of how to learn patterns and concepts from data without being explicitly
programmed in various IOT nodes.
To design and analyse various machine learning algorithms and techniques with a modern
outlook focusing on recent advances.
Explore supervised and unsupervised learning paradigms of machine learning.
To explore Deep learning technique and various feature extraction strategies.
UNIT - I
Supervised Learning (Regression/Classification)
Basic methods: Distance-based methods, Nearest-Neighbours, Decision Trees, Naive Bayes.
Linear models: Linear Regression, Logistic Regression, Generalized Linear Models.
Support Vector Machines, Nonlinearity and Kernel Methods.
Beyond Binary Classification: Multi-class/Structured Outputs, Ranking.
UNIT – II
Unsupervised Learning:
Clustering: K-means/Kernel K-means.
Dimensionality Reduction: PCA and kernel PCA.
Matrix Factorization and Matrix Completion.
Generative Models (mixture models and latent factor models).
UNIT - III
Evaluating Machine Learning algorithms and Model Selection, Introduction to Statistical Learning
Theory, Ensemble Methods (Boosting, Bagging, Random Forests)
UNIT - IV
Sparse Modeling and Estimation, Modeling Sequence/Time-Series Data, Deep Learning and Feature
Representation Learning
UNIT - V
Scalable Machine Learning (Online and Distributed Learning) A selection from some other advanced
topics, e.g., Semi-supervised Learning, Active Learning, Reinforcement Learning, Inference in
Graphical Models, Introduction to Bayesian Learning and Inference.
Recent trends in various learning techniques of machine learning and classification methods for IOT
applications. Various models for IOT applications.
References:
1. Kevin Murphy, Machine Learning: A Probabilistic Perspective, MIT Press, 2012
Page 11 of 55
R19 M.TECH. CSE/CS
2. Trevor Hastie, Robert Tibshirani, Jerome Friedman, The Elements of Statistical Learning,
Springer 2009 (freely available online)
3. Christopher Bishop, Pattern Recognition and Machine Learning, Springer, 2007
Page 12 of 55
R19 M.TECH. CSE/CS
Course Objectives:
To learn the basics of security and various types of security issues.
To study different cryptography techniques available and various security attacks.
Explore network security and how they are implemented in real world.
To get an insight of various issues of Web security and biometric authentication.
UNIT – I
Data security: Review of cryptography. Examples RSA, DES, ECC.
UNIT – II
Authentication, non-repudiation and message integrity. Digital signatures and
certificates. Protocols using cryptography (example Kerberos). Attacks on
protocols
UNIT - III
Network security: Firewalls, Proxy-Servers, Network intrusion detection.
Transport security: Mechanisms of TLS, SSL, IPSec.
UNIT - IV
Web security – SQL injection, XSS, etc. Software security and buffer overflow.
Malware types and case studies. Access Control, firewalls and host/network intrusion detection.
UNIT - V
Other topics: Biometric authentication, Secure E-Commerce (ex. SET), Smart
Cards, Security in Wireless Communication. Recent trends in IOT security, IDS and Biometric.
References:
1. W. R. Cheswick and S. M. Bellovin. Firewalls and Internet Security. Addison Wesley, 1994.
2. W. Stallings. Cryptography and Network Security. Prentice Hall, 1999.
3. B. Schneier. Applied Cryptography. Wiley, 1999.
Page 13 of 55
R19 M.TECH. CSE/CS
Course Objectives:
The student will also learn how to apply trust-based security model to real-world security
problems.
An overview of the concepts, processes, and best practices needed to successfully secure
information within Cloud infrastructures.
Students will learn the basic Cloud types and delivery models and develop an understanding
of the risk and compliance responsibilities and Challenges for each Cloud type and service
delivery model.
UNIT – I
Introduction to Cloud Computing:
Online Social Networks and Applications, Cloud introduction and overview, Different clouds, Risks,
Novel applications of cloud computing
UNIT – II
Cloud Computing Architecture:
Requirements, Introduction Cloud computing architecture, On Demand Computing Virtualization at
the infrastructure level, Security in Cloud computing environments, CPU Virtualization, A discussion
on Hypervisors Storage Virtualization Cloud Computing Defined, The SPI Framework for Cloud
Computing, The Traditional Software Model, The Cloud Services Delivery Model
Cloud Deployment Models:
Key Drivers to Adopting the Cloud, The Impact of Cloud Computing on Users, Governance in the
Cloud, Barriers to Cloud Computing Adoption in the Enterprise
UNIT - III
Security Issues in Cloud Computing:
Infrastructure Security, Infrastructure Security: The Network Level, The Host Level, The Application
Level, Data Security and Storage, Aspects of Data Security, Data Security Mitigation Provider Data
and Its Security
Identity and Access Management:
Trust Boundaries and IAM, IAM Challenges, Relevant IAM Standards and Protocols for Cloud
Services, IAM Practices in the Cloud, Cloud Authorization Management
UNIT - IV
Security Management in the Cloud
Security Management Standards, Security Management in the Cloud, Availability Management:
SaaS, PaaS, IaaS
Privacy Issues
Page 14 of 55
R19 M.TECH. CSE/CS
Privacy Issues, Data Life Cycle, Key Privacy Concerns in the Cloud, Protecting Privacy, Changes to
Privacy Risk Management and Compliance in Relation to Cloud
Computing, Legal and Regulatory Implications, U.S. Laws and Regulations, International Laws and
Regulations
UNIT - V
Audit and Compliance
Internal Policy Compliance, Governance, Risk, and Compliance (GRC), Regulatory/External
Compliance, Cloud Security Alliance, Auditing the Cloud for
Compliance, Security-as-a-Cloud
Advanced Topics
Recent developments in hybrid cloud and cloud security.
References:
1. Cloud Computing Explained: Implementation Handbook for Enterprises, John Rhoton,
Publication Date: November 2, 2009.
2. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in
Practice), Tim Mather, ISBN-10: 0596802765, O'Reilly Media, September 2009.
Page 15 of 55
R19 M.TECH. CSE/CS
Course Objectives:
To understand data mining concepts.
To learn about various data preprocessing techniques.
To learn about data warehousing.
To learn about various data mining functionalities such as association rule mining, clustering,
classification and outlier analysis.
UNIT - I
Introduction: Fundamentals of data mining, Data Mining Functionalities, Classification of Data Mining
systems, Data Mining Task Primitives, Integration of a Data Mining System with a Database or a Data
Warehouse System, Issues in Data Mining.
Data Preprocessing: Need for Preprocessing the Data, Data Cleaning, Data Integration and
Transformation, Data Reduction, Discretization and Concept Hierarchy Generation.
UNIT - II
Data Warehouse and OLAP Technology for Data Mining: Data Warehouse, Multidimensional Data
Model, Data Warehouse Architecture, Data Warehouse Implementation, Usage of Data Warehousing
Online Analytical Processing and Mining
Data Cube Computation: Efficient Methods for simple Data Cube Computation (Full Cube, Iceberg
Cube, Closed Cube and Shell Cube), Discovery Driven exploration of data cubes, Attribute-Oriented
Induction for data characterization and its implementation
UNIT - III
Mining Frequent Patterns, Associations and Correlations: Basic Concepts, The Apriori algorithm
for finding frequent itemsets using candidate generation, Generating association rules from frequent
itemsets, Mining frequent itemsets without candidate generation, Mining various kinds of Association
Rules, Correlation Analysis
UNIT - IV
Classification and Prediction: Description and comparison of classification and prediction,
preparing data for Classification and Prediction
Classification by Decision Tree Induction, Bayesian Classification, Rule-Based Classification,
Classification by Backpropagation
Prediction, linear and non-linear regression, evaluating accuracy of a Classifier or a Predictor
UNIT - V
Cluster Analysis: Types of Data in Cluster Analysis, A Categorization of Major Clustering Methods,
k-means and k-mediods methods, CLARANS, Agglomerative and divisive hierarchical clustering,
chameleon dynamic modeling, DBSCAN, Grid based clustering method: STING, Conceptual
Clustering, Constraint-Based Cluster Analysis, Outlier Analysis.
Text Books:
1. Data Mining – Concepts and Techniques - Jiawei Han, Micheline Kamber and Jian Pei, 3rd
edition, Morgan Kaufmann Publishers, ELSEVIER.
2. Introduction to Data Mining – Pang-Ning Tan, Michael Steinbach and Vipin Kumar, Pearson
education.
Page 16 of 55
R19 M.TECH. CSE/CS
References:
1. Data Warehousing in the Real World – Sam Aanhory & Dennis Murray Pearson Edn Asia.
2. Insight into Data Mining, K. P. Soman, S. Diwakar, V. Ajay, PHI, 2008.
3. Data Warehousing Fundamentals – Paulraj Ponnaiah Wiley student Edition
4. The Data Warehouse Life cycle Tool kit – Ralph Kimball Wiley student edition
5. Building the Data Warehouse By William H Inmon, John Wiley & Sons Inc, 2005.
6. Data Mining Introductory and advanced topics –Margaret H Dunham, Pearson education
7. Data Mining Techniques – Arun K Pujari, 2nd edition, Universities Press.
8. Data Mining, V. Pudi and P. Radha Krishna, Oxford University Press.
9. Data Mining: Methods and Techniques, A.B. M Shawkat Ali and S. A. Wasimi, Cengage
Learning.
10. Data Warehouse 2.0, The Architecture for the next generation of Data Warehousing, W.H.
Inmon, D. Strauss, G. Neushloss, Elsevier, Distributed by SPD.
Page 17 of 55
R19 M.TECH. CSE/CS
Course Objectives:
1. Introduces the basic concepts of Abstract Data Types.
2. Reviews basic data structures such as stacks and queues.
3. Introduces a variety of data structures such as hash tables, search trees, tries, heaps, graphs,
and B-trees.
4. Introduces sorting and pattern matching algorithms.
Course Outcomes:
1. Ability to select the data structures that efficiently model the information in a problem.
2. Ability to assess efficiency trade-offs among different data structure implementations or
combinations.
3. Implement and know the application of algorithms for sorting and pattern matching.
4. Design programs using a variety of data structures, including hash tables, binary and general
tree structures, search trees, tries, heaps, graphs, and B-trees.
List of Programs
1. Write a program to perform the following operations:
a) Insert an element into a binary search tree.
b) Delete an element from a binary search tree.
c) Search for a key element in a binary search tree.
Page 18 of 55
R19 M.TECH. CSE/CS
11. Write a program for implementing Brute Force pattern matching algorithm.
TEXT BOOKS:
1. Fundamentals of Data structures in C, E.Horowitz, S.Sahni and Susan Anderson Freed, 2nd
Edition, Universities Press
2. Data Structures Using C – A.S.Tanenbaum, Y. Langsam, and M.J. Augenstein, PHI/Pearson
education.
3. Introduction to Data Structures in C, Ashok Kamthane, 1st Edition, Pearson.
REFERENCES:
1. The C Programming Language, B.W. Kernighan, Dennis M.Ritchie, PHI/Pearson Education
2. C Programming with problem solving, J.A. Jones & K. Harrow, Dreamtech Press
3. Data structures: A Pseudocode Approach with C, R.F.Gilberg And B.A.Forouzan, 2nd
Edition, Cengage Learning.
Page 19 of 55
R19 M.TECH. CSE/CS
Course Objective:
1. The objective of this lab is to get an overview of the various machine learning techniques and
can able to demonstrate them using python.
Course Outcomes: After the completion of the “Machine Learning” lab, the student can able to:
1. Understand complexity of Machine Learning algorithms and their limitations;
2. Understand modern notions in data analysis-oriented computing;
3. Be capable of confidently applying common Machine Learning algorithms in practice and
implementing their own;
4. Be capable of performing experiments in Machine Learning using real-world data.
List of Experiments
1. The probability that it is Friday and that a student is absent is 3 %. Since there are 5 school
days in a week, the probability that it is Friday is 20 %. What is theprobability that a student is
absent given that today is Friday? Apply Baye’s rule in python to get the result. (Ans: 15%)
2. Extract the data from database using python
3. Implement k-nearest neighbours classification using python
4. Given the following data, which specify classifications for nine combinations of VAR1 and
VAR2 predict a classification for a case where VAR1=0.906 and VAR2=0.606, using the
result of k-means clustering with 3 means (i.e., 3 centroids)
VAR1 VAR2 CLASS
1.713 1.586 0
0.180 1.786 1
0.353 1.240 1
0.940 1.566 0
1.486 0.759 1
1.266 1.106 0
1.540 0.419 1
0.459 1.799 1
0.773 0.186 1
5. The following training examples map descriptions of individuals onto high, medium and low
credit-worthiness.
medium skiing design single twenties no -> highRisk
high golf trading married forties yes -> lowRisk
low speedway transport married thirties yes -> medRisk
medium football banking single thirties yes -> lowRisk
high flying media married fifties yes -> highRisk
low football security single twenties no -> medRisk
medium golf media single thirties yes -> medRisk
medium golf transport married forties yes -> lowRisk
high skiing banking single thirties yes -> highRisk
low golf unemployed married forties yes -> highRisk
Input attributes are (from left to right) income, recreation, job, status, age-group, home-owner. Find
the unconditional probability of `golf' and the conditional probability of `single' given `medRisk' in the
dataset?
Page 20 of 55
R19 M.TECH. CSE/CS
Text Books:
1. Machine Learning – Tom M. Mitchell, MGH
2. Fundamentals of Speech Recognition By Lawrence Rabiner and Biing – Hwang Juang.
Reference Book:
1. Machine Learning: An Algorithmic Perspective, Stephen Marsland, Taylor & Francis
Page 21 of 55
R19 M.TECH. CSE/CS
Prerequisite: None
Course Objectives:
To understand the research problem
To know the literature studies, plagiarism and ethics
To get the knowledge about technical writing
To analyze the nature of intellectual property rights and new developments
To know the patent rights
UNIT-I:
Meaning of research problem, Sources of research problem, Criteria Characteristics of a good
research problem, Errors in selecting a research problem, Scope and objectives of research problem.
Approaches of investigation of solutions for research problem, data collection, analysis, interpretation,
Necessary instrumentations
UNIT-II:
Effective literature studies approaches, analysis, Plagiarism, Research ethics
UNIT-III:
Effective technical writing, how to write report, Paper Developing a Research Proposal, Format of
research proposal, a presentation and assessment by a review committee
UNIT-IV:
Nature of Intellectual Property: Patents, Designs, Trade and Copyright. Process of Patenting and
Development: technological research, innovation, patenting, development. International Scenario:
International cooperation on Intellectual Property. Procedure for grants of patents, Patenting under
PCT.
UNIT-V:
Patent Rights: Scope of Patent Rights. Licensing and transfer of technology. Patent information
and databases. Geographical Indications. New Developments in IPR: Administration of Patent
System. New developments in IPR; IPR of Biological Systems, Computer Software etc. Traditional
knowledge Case Studies, IPR and IITs.
Page 22 of 55
R19 M.TECH. CSE/CS
TEXT BOOKS:
1. Stuart Melville and Wayne Goddard, “Research methodology: an introduction for science &
engineering students’”
2. Wayne Goddard and Stuart Melville, “Research Methodology: An Introduction”
REFERENCES:
1. Ranjit Kumar, 2nd Edition, “Research Methodology: A Step by Step Guide for beginners”
2. Halbert, “Resisting Intellectual Property”, Taylor & Francis Ltd ,2007.
3. Mayall, “Industrial Design”, McGraw Hill, 1992.
4. Niebel, “Product Design”, McGraw Hill, 1974.
5. Asimov, “Introduction to Design”, Prentice Hall, 1962.
6. Robert P. Merges, Peter S. Menell, Mark A. Lemley, “Intellectual Property in New
Technological Age”, 2016.
7. T. Ramappa, “Intellectual Property Rights Under WTO”, S. Chand, 2008
Page 23 of 55
R19 M.TECH. CSE/CS
UNIT – I
Sorting:
Review of various sorting algorithms, topological sorting
Graph:
Definitions and Elementary Algorithms: Shortest path by BFS, shortest path in edge-weighted case
(Dijkasra's), depth-first search and computation of strongly connected components, emphasis on
correctness proof of the algorithm and time/space analysis, example of amortized analysis.
UNIT – II
Matroids:
Introduction to greedy paradigm, algorithm to compute a maximum weight maximal independent set.
Application to MST.
Graph Matching:
Algorithm to compute maximum matching. Characterization of maximum matching by augmenting
paths, Edmond's Blossom algorithm to compute augmenting path.
UNIT - III
Flow-Networks:
Maxflow-mincut theorem, Ford-Fulkerson Method to compute maximum flow, Edmond-Karp
maximum-flow algorithm.
Matrix Computations:
Strassen's algorithm and introduction to divide and conquer paradigm, inverse of a triangular matrix,
relation between the time complexities of basic matrix operations, LUP-decomposition.
UNIT - IV
Shortest Path in Graphs:
Floyd-Warshall algorithm and introduction to dynamic programming paradigm. More examples of
dynamic programming.
Page 24 of 55
R19 M.TECH. CSE/CS
UNIT - V
Linear Programming:
Geometry of the feasibility region and Simplex algorithm
NP-completeness:
Examples, proof of NP-hardness and NP-completeness.
One or more of the following topics based on time and interest:
Approximation algorithms, Randomized Algorithms, Interior Point Method, Advanced Number
Theoretic Algorithm
Recent Trends in problem solving paradigms using recent searching and sorting techniques by
applying recently proposed data structures.
References:
1. "Introduction to Algorithms" by Cormen, Leiserson, Rivest, Stein.
2. "The Design and Analysis of Computer Algorithms" by Aho, Hopcroft, Ullman.
3. "Algorithm Design" by Kleinberg and Tardos.
Page 25 of 55
R19 M.TECH. CSE/CS
UNIT - I
Theory of Parallelism, Parallel computer models, The State of Computing, Multiprocessors and
Multicomputers, Multivector and SIMD Computers, PRAM and VLSI models, Architectural
development tracks, Program and network properties, Conditions of parallelism, Program partitioning
and Scheduling, Program flow Mechanisms, System interconnect Architectures.
UNIT - II
Principals of Scalable performance, Performance metrics and measures, Parallel Processing
applications, Speed up performance laws, Scalability Analysis and Approaches, Hardware
Technologies, Processes and Memory Hierarchy, Advanced Processor Technology, Superscalar and
Vector Processors, Memory Hierarchy Technology, Virtual Memory Technology.
UNIT - III
Bus Cache and Shared memory, Backplane bus systems, Cache Memory organizations, Shared-
Memory Organizations, Sequential and weak consistency models, Pipelining and superscalar
techniques, Linear Pipeline Processors, Non-Linear Pipeline Processors, Instruction Pipeline design,
Arithmetic pipeline design, superscalar pipeline design.
UNIT - IV
Parallel and Scalable Architectures, Multiprocessors and Multicomputers, Multiprocessor system
interconnects, cache coherence and synchronization mechanism, Three Generations of
Multicomputers, Message-passing Mechanisms, Multivetor and SIMD computers, Vector Processing
Principals, Multivector Multiprocessors, Compound Vector processing, SIMD computer Organizations,
The connection machine CM-5,
UNIT - V
Scalable, Multithreaded and Dataflow Architectures, Latency-hiding techniques, Principals of
Multithreading, Fine-Grain Multicomputers, Scalable and multithreaded Architectures, Dataflow and
hybrid Architectures.
Text Book
1. Advanced Computer Architecture, Kai Hwang, 2nd Edition, Tata McGraw Hill Publishers.
Page 26 of 55
R19 M.TECH. CSE/CS
References:
1. Computer Architecture, J.L. Hennessy and D.A. Patterson, 4th Edition, ELSEVIER.
2. Advanced Computer Architectures, S.G.Shiva, Special Indian edition, CRC, Taylor &Francis.
3. Introduction to High Performance Computing for Scientists and Engineers, G. Hager and G.
Wellein, CRC Press, Taylor & Francis Group.
4. Advanced Computer Architecture, D. Sima, T. Fountain, P. Kacsuk, Pearson education.
5. Computer Architecture, B. Parhami, Oxford Univ. Press.
Page 27 of 55
R19 M.TECH. CSE/CS
UNIT - I
The Web Security
The Web Security Problem, Risk Analysis and Best Practices
Cryptography and the Web: Cryptography and Web Security, Working Cryptographic Systems and
Protocols, Legal Restrictions on Cryptography, Digital Identification
UNIT - II
The Web Privacy
The Web’s War on Your Privacy, Privacy-Protecting Techniques, Backups and Antitheft, Web Server
Security, Physical Security for Servers, Host Security for Servers, Securing Web Applications
UNIT - III
Database Security
Recent Advances in Access Control, Access Control Models for XML, Database Issues in Trust
Management and Trust Negotiation, Security in Data Warehouses and OLAP Systems
UNIT - IV
Security Re-engineering for Databases
Concepts and Techniques, Database Watermarking for Copyright Protection, Trustworthy Records
Retention, Damage Quarantine and Recovery in Data Processing Systems, Hippocratic Databases:
Current Capabilities and
UNIT - V
Future Trends Privacy in Database Publishing
A Bayesian Perspective, Privacy-enhanced Location-based Access Control, Efficiently Enforcing the
Security and Privacy Policies in a Mobile Environment
Text Books:
1. Web Security, Privacy and Commerce, Simson G. Arfinkel, Gene Spafford, O’ Reilly.
2. Handbook on Database security applications and trends, Michael Gertz, Sushil Jajodia.
Page 28 of 55
R19 M.TECH. CSE/CS
Course Objectives:
To introduce the terminology, technology and its applications
To introduce the concept of M2M (machine to machine) with necessary protocols
To introduce the Python Scripting Language which is used in many IoT devices
To introduce the Raspberry PI platform, that is widely used in IoT applications
To introduce the implementation of web-based services on IoT devices
UNIT - I
Introduction to Internet of Things –Definition and Characteristics of IoT,
Physical Design of IoT – IoT Protocols, IoT communication models, Iot Communication APIs
IoT enabaled Technologies – Wireless Sensor Networks, Cloud Computing, Big data analytics,
Communication protocols, Embedded Systems, IoT Levels and Templates
Domain Specific IoTs – Home, City, Environment, Energy, Retail, Logistics, Agriculture, Industry,
health and Lifestyle
UNIT - II
IoT and M2M – Software defined networks, network function virtualization, difference between SDN
and NFV for IoT
Basics of IoT System Management with NETCOZF, YANG- NETCONF, YANG, SNMP NETOPEER
UNIT - III
Introduction to Python - Language features of Python, Data types, data structures, Control of flow,
functions, modules, packaging, file handling, data/time operations, classes, Exception handling
Python packages - JSON, XML, HTTPLib, URLLib, SMTPLib
UNIT - IV
IoT Physical Devices and Endpoints - Introduction to Raspberry PI-Interfaces (serial, SPI, I2C)
Programming – Python program with Raspberry PI with focus of interfacing external gadgets,
controlling output, reading input from pins.
UNIT - V
IoT Physical Servers and Cloud Offerings – Introduction to Cloud Storage models and communication
APIs
Webserver – Web server for IoT, Cloud for IoT, Python web application framework
Designing a RESTful web API
Text Books:
1. Internet of Things - A Hands-on Approach, Arshdeep Bahga and Vijay Madisetti, Universities
Press, 2015, ISBN: 9788173719547
2. Getting Started with Raspberry Pi, Matt Richardson & Shawn Wallace, O'Reilly (SPD), 2014,
ISBN: 9789350239759
Page 29 of 55
R19 M.TECH. CSE/CS
Course Objectives:
Provide you with the knowledge and expertise to become a proficient data scientist.
Demonstrate an understanding of statistics and machine learning concepts that are vital for
data science;
Produce Python code to statistically analyse a dataset;
Critically evaluate data visualizations based on their design and use for communicating
stories from data;
UNIT – I
Introduction to core concepts and technologies: Introduction, Terminology, data science process, data
science toolkit, Types of data, Example applications.
UNIT – II
Data collection and management: Introduction, Sources of data, Data collection and APIs, Exploring
and fixing data, Data storage and management, Using multiple data
Sources
UNIT-III
Data analysis: Introduction, Terminology and concepts, Introduction to statistics, Central tendencies
and distributions, Variance, Distribution properties and arithmetic, Samples/CLT, Basic machine
learning algorithms, Linear regression, SVM, Naive Bayes.
UNIT-IV
Data visualization: Introduction, Types of data visualization, Data for visualization: Data types, Data
encodings, Retinal variables, Mapping variables to encodings, Visual encodings.
UNIT-V
Applications of Data Science, Technologies for visualization, Bokeh (Python).
Recent trends in various data collection and analysis techniques, various visualization techniques,
application development methods of used in data science.
References:
1. Cathy O’Neil and Rachel Schutt. Doing Data Science, Straight Talk from The Frontline.
O’Reilly.
2. Jure Leskovek, Anand Rajaraman and Jeffrey Ullman. Mining of Massive Datasets. v2.1,
Cambridge University Press.
Page 30 of 55
R19 M.TECH. CSE/CS
Course Objectives:
To learn about cyber crimes and how they are planned.
To learn the vulnerabilities of mobile and wireless devices.
To learn about the crimes in mobile and wireless devices.
UNIT - I
Introduction to Cybercrime: Introduction, Cybercrime and Information security, who are
cybercriminals, Classifications of Cybercrimes, Cybercrime: The legal Perspectives and Indian
Perspective, Cybercrime and the Indian ITA 2000, A Global Perspective on Cybercrimes.
Cyber offenses: How criminals Plan Them: Introduction, How Criminals plan the Attacks, Social
Engineering, Cyber stalking, Cyber cafe and Cybercrimes, Botnets: The Fuel for Cybercrime, Attack
Vector, Cloud Computing.
UNIT- II
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and Wireless
Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless Computing Era, Security
Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices, Authentication service
Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security Implications for Organizations,
Organizational Measures for Handling Mobile, Organizational Security Policies an Measures in Mobile
Computing Era, Laptops.
UNIT - III
Cybercrimes and Cyber security: the Legal Perspectives
Introduction, Cyber Crime and Legal Landscape around the world, Why Do We Need Cyber laws: The
Indian Context, The Indian IT Act, Challenges to Indian Law and Cybercrime Scenario In India, Digital
signatures and the Indian IT Act, Amendments to the Indian IT Act, Cybercrime and Punishment,
Cyber law, Technology and Students: Indian Scenario.
UNIT - IV
Understanding Computer Forensics
Introduction, Historical background of Cyber forensics, Digital Forensics Science, The Need for
Computer Forensics, Cyber Forensics and Digital evidence, Forensics Analysis of Email, Digital
Forensics Lifecycle, Chain of Custody concept, Network Forensics, Approaching a computer,
Forensics Investigation, Challenges in Computer Forensics, Special Tools and Techniques, Forensics
Auditing
UNIT - V
Cyber Security: Organizational Implications
Introduction, Cost of Cybercrimes and IPR issues, Web threats for Organizations, Security and
Privacy Implications, Social media marketing: Security Risks and Perils for Organizations, Social
Computing and the associated challenges for Organizations.
Text Books:
1. Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives,
Nina Godbole and Sunil Belapure, Wiley INDIA.
Page 31 of 55
R19 M.TECH. CSE/CS
2. Introduction to Cyber Security, Chwan-Hwa(john) Wu, J. David Irwin. CRC Press T & F
Group.
Reference Book:
1. Cyber Security Essentials, James Graham, Richard Howard and Ryan Otson, CRC
Page 32 of 55
R19 M.TECH. CSE/CS
Course Outcomes:
Understanding of holistic approach to computer networking
Ability to understand the computer networks and their application
Ability to design simulation concepts related to packet forwarding in networks.
UNIT - I
Review of Computer Networks, Devices and the Internet: Internet, Network edge, Network core,
Access Networks and Physical media, ISPs and Internet Backbones, Delay and Loss in Packet-
Switched Networks, Networking and Internet - Foundation of Networking Protocols: 5-layer TCP/IP
Model, 7-Layer OSI Model, Internet Protocols and Addressing.
Multiplexers, Modems and Internet Access Devices, Switching and Routing Devices, Router
Structure. The Link Layer and Local Area Networks-Link Layer, Introduction and Services, Error-
Detection and Error-Correction techniques, Multiple Access Protocols, Link Layer
Addressing, Ethernet, Interconnections: Hubs and Switches, PPP: The Point-to-Point Protocol, Link
Virtualization
UNIT - II
Data-link protocols: Ethernet, Token Ring and Wireless (802.11). Wireless Networks and Mobile IP:
Infrastructure of Wireless Networks, Wireless LAN Technologies, IEEE 802.11 Wireless Standard,
Cellular Networks, Mobile IP, Wireless Mesh Networks (WMNs), Multiple access schemes Routing
and Internetworking: Network–Layer Routing, Least-Cost-Path algorithms, Non-Least-Cost-Path
algorithms, Intra-domain Routing Protocols, Inter-domain Routing Protocols, Congestion Control at
Network Layer.
UNIT - IV
Transport and Application Layer Protocols: Client-Server and Peer-To-Peer Application
Communication, Protocols on the transport layer, reliable communication. Routing packets through a
LAN and WAN. Transport Layer, Transmission Control Protocol (TCP), User Datagram Protocol
(UDP), Mobile Transport Protocols, TCP Congestion Control. Principles of Network Applications,
UNIT - V
The Web and HTTP, File Transfer: FTP, Electronic Mail in the Internet, Domain Name System (DNS),
P2P File Sharing, Socket Programming with TCP and UDP, building a Simple Web Server Creating
simulated networks and passing packets through them using different routing techniques. Installing
and using network monitoring tools.
Text books:
1. Computer Networking: A Top-Down Approach, James F. Kuros and Keith W. Ross, Pearson,
6th Edition, 2012.
2. Computer Networks and Internets, Duglas E. Comer, 6th Edition, Pearson.
Page 33 of 55
R19 M.TECH. CSE/CS
References:
1. A Practical Guide to Advanced Networking, Jeffrey S. Beasley and Piyasat Nilkaew, Pearson,
3rd Edition, 2012
2. Computer Networks, Andrew S. Tanenbaum, David J. Wetherall, Prentice Hall.
Page 34 of 55
R19 M.TECH. CSE/CS
Course Objectives:
To understand about big data
To learn the analytics of Big Data
To Understand the MapReduce fundamentals
UNIT - I
Big Data Analytics: What is big data, History of Data Management; Structuring Big Data; Elements of
Big Data; Big Data Analytics; Distributed and Parallel Computing for Big Data;
Big Data Analytics: What is Big Data Analytics, What Big Data Analytics Isn’t, Why this sudden Hype
Around Big Data Analytics, Classification of Analytics, Greatest Challenges that Prevent Business
from Capitalizing Big Data; Top Challenges Facing Big Data; Why Big Data Analytics Important; Data
Science; Data Scientist; Terminologies used in Big Data Environments; Basically Available Soft State
Eventual Consistency (BASE); Open source Analytics Tools;
UNIT - II
Understanding Analytics and Big Data: Comparing Reporting and Analysis, Types of Analytics; Points
to Consider during Analysis; Developing an Analytic Team; Understanding Text Analytics;
Analytical Approach and Tools to Analyze Data: Analytical Approaches; History of Analytical Tools;
Introducing Popular Analytical Tools; Comparing Various Analytical Tools.
UNIT - III
Understanding MapReduce Fundamentals and HBase : The MapReduce Framework; Techniques to
Optimize MapReduce Jobs; Uses of MapReduce; Role of HBase in Big Data Processing; Storing
Data in Hadoop : Introduction of HDFS, Architecture, HDFC Files, File system types, commands,
org.apache.hadoop.io package, HDF, HDFS High Availability; Introducing HBase, Architecture,
Storing Big Data with HBase , Interacting with the Hadoop Ecosystem; HBase in Operations-
Programming with HBase; Installation, Combining HBase and HDFS;
UNIT - IV
Big Data Technology Landscape and Hadoop: NoSQL, Hadoop; RDBMS versus Hadoop; Distributed
Computing Challenges; History of Hadoop; Hadoop Overview; Use Case of Hadoop; Hadoop
Distributors; HDFC (Hadoop Distributed File System), HDFC Daemons, read, write, Replica
Processing of Data with Hadoop; Managing Resources and Applications with Hadoop YARN.
UNIT - V
Social Media Analytics and Text Mining: Introducing Social Media; Key elements of Social Media;
Text mining; Understanding Text Mining Process; Sentiment Analysis, Performing Social Media
Analytics and Opinion Mining on Tweets;
Mobile Analytics: Introducing Mobile Analytics; Define Mobile Analytics; Mobile Analytics and Web
Analytics; Types of Results from Mobile Analytics; Types of Applications for Mobile Analytics;
Introducing Mobile Analytics Tools;
Page 35 of 55
R19 M.TECH. CSE/CS
Text Books:
1. Big Data and Analytics, Seema Acharya, Subhasinin Chellappan, Wiley publications.
2. Big Data, Black BookTM , DreamTech Press, 2015 Edition.
3. Business Analytics 5e , BY Albright |Winston
Reference Books:
1. Rajiv Sabherwal, Irma Becerra- Fernandez,” Business Intelligence –Practice, Technologies
and Management”, John Wiley 2011.
2. Lariss T. Moss, Shaku Atre, “Business Intelligence Roadmap”, Addison-Wesley It Service.
3. Yuli Vasiliev, “Oracle Business Intelligence: The Condensed Guide to Analysis and
Reporting”, SPD Shroff, 2012.
Page 36 of 55
R19 M.TECH. CSE/CS
Course Objective: The student can able to attain knowledge in advance algorithms.
Course Outcomes: The student can able to analyze the performance of algorithms
List of Experiments
1. Implement assignment problem using Brute Force method
2. Perform multiplication of long integers using divide and conquer method.
3. Implement solution for knapsack problem using Greedy method.
4. Implement Gaussian elimination method.
5. Implement LU decomposition
6. Implement Warshall algorithm
7. Implement Rabin Karp algorithm.
8. Implement KMP algorithm.
9. Implement Harspool algorithm
10. Implement max-flow problem.
Text Book:
1. Design and Analysis of Algorithms, S.Sridhar, OXFORD University Press
References:
1. Introduction to Algorithms, second edition, T.H. Cormen, C.E. Leiserson, R.L. Rivest and
C.Stein,PHI Pvt. Ltd./ Pearson Education.
2. Fundamentals of Computer Algorithms, Ellis Horowitz, Satraj Sahni and Rajasekharam,
Universities Press.
3. Design and Analysis of algorithms, Aho, Ullman and Hopcroft, Pearson education.
Page 37 of 55
R19 M.TECH. CSE/CS
Course Objectives:
To make students understand learn about a Big Data – R Programming, way of solving
problems.
To teach students to write programs in Scala to solve problems.
Introduction to R Programming:
What is R and RStudio? R is a statistical software program. It has extremely useful tools for data
exploration, data analysis, and data visualization. It is flexible and also allows for advanced
programming. RStudio is a user interface for R, which provides a nice environment for working with R.
1. Write an R program to evaluate the following expression ax+b/ax-b.
2. Write an R program to read input from keyboard (hint: readLine()).
3. Write an R program to find the sum of n natural numbers: 1+2+3+4+….n
4. Write an R program to read n numbers.
(i) Sum of all even numbers (ii) Total number of even numbers.
5. Write an R program to read n numbers.
(i) Total number of odd numbers (ii) Sum of all odd numbers
6. Write an R program to obtain
(i)sum of two matrices A and B (ii) subtraction of two matrices A and B
(iii) Product of two matrices.
7. Write an R program for “declaring and defining functions “
8. Write an R program that uses functions to add n numbers reading from keyboard
9. Write an R program uses functions to swap two integers.
10. Write an R program that use both recursive and non-recursive functions for implementing the
Factorial of a given number, n.
11. Write an R program to reverse the digits of the given number {example 1234 to be written as
4321}
12. Write an R program to implement
(i)Linear search (ii) Binary Search.
13. Write an R program to implement
(i)Bubble sort (ii) selection sort.
14. Write a R program to implement the data structures
(i) Vectors (ii) Array (iii) Matrix (iv) Data Frame (v) Factors
15. Write a R program to implement scan(), merge(), read.csv() and read.table() commands.
16. Write an R program to implement “Executing Scripts” written on the note pad, by
calling to the R console.
17. Write a R program, Reading data from files and working with datasets
(i) Reading data from csv files, inspection of data.
(ii) Reading data from Excel files.
18. Write a R program to implement Graphs
(i) Basic high-level plots (ii)Modifications of scatter plots
(iii) Modifications of histograms, parallel box plots.
Page 38 of 55
R19 M.TECH. CSE/CS
Suggested Links:
1. https://www.tutorialspoint.com/scala/
2. https://www.tutorialspoint.com/r/
Page 39 of 55
R19 M.TECH. CSE/CS
Course Objectives:
Provides an in-depth study of the rapidly changing and fascinating field of computer forensics.
Combines both the technical expertise and the knowledge required to investigate, detect and
prevent digital crimes.
Knowledge on digital forensics legislations, digital crime, forensics processes and procedures,
data acquisition and validation, e-discovery tools
E-evidence collection and preservation, investigating operating systems and file systems,
network forensics, art of steganography and mobile device forensics
UNIT - I
Digital Forensics Science: Forensics science, computer forensics, and digital forensics.
Computer Crime: Criminalistics as it relates to the investigative process, analysis of cyber-
criminalistics area, holistic approach to cyber-forensics
UNIT - II
Cyber Crime Scene Analysis:
Discuss the various court orders etc., methods to search and seizure electronic evidence, retrieved
and un-retrieved communications, Discuss the importance of understanding what court documents
would be required for a criminal investigation.
UNIT - III
Evidence Management & Presentation:
Create and manage shared folders using operating system, importance of the forensic mindset, define
the workload of law enforcement, Explain what the normal case would look like, Define who should be
notified of a crime, parts of gathering evidence, Define and apply probable cause.
UNIT - IV
Computer Forensics: Prepare a case, Begin an investigation, Understand computer forensics
workstations and software, Conduct an investigation, Complete a case, Critique a case,
Network Forensics: open-source security tools for network forensic analysis, requirements for
preservation of network data.
UNIT - V
Mobile Forensics: mobile forensics techniques, mobile forensics tools.
Legal Aspects of Digital Forensics: IT Act 2000, amendment of IT Act 2008.
Recent trends in mobile forensic technique and methods to search and seizure electronic evidence
Page 40 of 55
R19 M.TECH. CSE/CS
References:
1. John Sammons, The Basics of Digital Forensics, Elsevier
2. John Vacca, Computer Forensics: Computer Crime Scene Investigation, Laxmi Publications
Page 41 of 55
R19 M.TECH. CSE/CS
Course Outcomes:
Understanding the concepts in grid computing
Ability to set up cluster and run parallel applications
Ability to understand the cluster projects and cluster OS
Understanding the concepts of pervasive computing & quantum computing.
UNIT - I
Grid Computing: Data & Computational Grids, Grid Architectures And Its Relations To Various
Distributed Technologies. Autonomic Computing, Examples Of The Grid Computing Efforts (Ibm).
UNIT - II
Cluster Setup & Its Advantages, Performance Models & Simulations; Networking Protocols & I/O,
Messaging Systems. Process Scheduling, Load Sharing And Balancing; Distributed Shared Memory,
Parallel I/O.
UNIT - III:
Example Cluster System – Beowulf; Cluster Operating Systems: Compas And Nanos Pervasive
Computing Concepts & Scenarios; Hardware & Software; Human – Machine Interface.
UNIT - IV
Device Connectivity; Java For Pervasive Devices; Application Examples.
UNIT - V
Classical Vs Quantum Logic Gates; One, Two & Three Qubit Quantum Gates; Fredkin & Toffoli
Gates; Quantum Circuits; Quantum Algorithms.
Text Book:
1. “Selected Topics In Advanced Computing” Edited By Dr. P. Padmanabham And Dr. M.B.
Srinivas, 2005 Pearson Education.
References:
1. J. Joseph & C. Fellenstien: ‘Grid Computing ‘, Pearson Education
2. J. Burkhardt et.al: ‘pervasive computing’ Pearson Education
3. Marivesar:’ Approaching quantum computing’, Pearson Education.
4. Raj kumar Buyya:’High performance cluster computing’, Pearson Education.
5. Neilsen & Chung L:’Quantum computing and Quantum Information’, Cambridge University
Press.
6. A networking approach to Grid Computing, Minoli, Wiley.
Page 42 of 55
R19 M.TECH. CSE/CS
Course Objectives:
To introduce the foundations of Artificial Neural Networks
To acquire the knowledge on Deep Learning Concepts
To learn various types of Artificial Neural Networks
To gain knowledge to apply optimization strategies
Course Outcomes:
Ability to understand the concepts of Neural Networks
Ability to select the Learning Networks in modeling real world systems
Ability to use an efficient algorithm for Deep Models
Ability to apply optimization strategies for large scale applications
UNIT - I
Deep Feedforward Networks: Example: Learning XOR, Gradient-Based Learning, Hidden Units,
Architecture Design, Back-Propagation and Other Differentiation Algorithms, Historical Notes
UNIT - II
Regularization for Deep Learning:
Parameter Norm Penalties, Norm Penalties as Constrained Optimization, Regularization and Under-
Constrained Problems, Dataset Augmentation, Noise Robustness, Semi-Supervised Learning, Multi-
Task Learning, Early Stopping, Parameter Tying and Parameter Sharing, Sparse Representations,
Bagging and Other Ensemble Methods, Dropout, Adversarial Training, Tangent Distance, Tangent
Prop, and Manifold Tangent Classifier.
UNIT - III
Optimization for Training Deep Models, How Learning Differs from Pure Optimization, Challenges in
Neural Network Optimization, Basic Algorithms, Parameter Initialization Strategies, Algorithms with
Adaptive Learning Rates, Approximate Second-Order Methods, Optimization Strategies and Meta-
Algorithms
UNIT - IV
Convolutional Networks:
The Convolution Operation, Motivation, Pooling, Convolution and Pooling as an Infinitely Strong Prior,
Variants of the Basic Convolution Function, Structured Outputs, Data Types, Efficient Convolution
Algorithms, Random or Unsupervised Features, The Neuro-scientific Basis for Convolutional
Networks, Convolutional Networks and the History of Deep Learning
UNIT - V
Applications:
Large-Scale Deep Learning, Computer Vision, Speech Recognition, Natural Language Processing,
Other Applications
Text Book:
1. Goodfellow, Yoshua Bengio, Aaron Courville, Deep Learning (Adaptive Computation and
Machine Learning series), MIT Press.
Page 43 of 55
R19 M.TECH. CSE/CS
Reference Books:
1. Li Deng and Dong Yu, Deep Learning Methods and Applications, Foundations and Trends®
in Signal Processing Volume 7 Issues 3-4, ISSN: 1932-8346.
2. Dr. N.D. Lewis, Deep Learning Made Easy with R A Gentle Introduction for Data Science.
Create Space Independent Publishing Platform (January 10, 2016).
3. François Chollet, JJ Allaire, MEAP Edition Manning Early Access Program Deep Learning
with R Version 1, Copyright 2017 Manning Publications.
Page 44 of 55
R19 M.TECH. CSE/CS
Prerequisite: None
UNIT-I:
Planning and Preparation, Word Order, Breaking up long sentences, Structuring Paragraphs and
Sentences, Being Concise and Removing Redundancy, Avoiding Ambiguity and Vagueness
UNIT-II:
Clarifying Who Did What, Highlighting Your Findings, Hedging and Criticizing, Paraphrasing and
Plagiarism, Sections of a Paper, Abstracts. Introduction
UNIT-III:
Review of the Literature, Methods, Results, Discussion, Conclusions, The Final Check.
UNIT-IV:
key skills are needed when writing a Title, key skills are needed when writing an Abstract, key skills
are needed when writing an Introduction, skills needed when writing a Review of the Literature,
UNIT-V:
skills are needed when writing the Methods, skills needed when writing the Results, skills are needed
when writing the Discussion, skills are needed when writing the Conclusions. useful phrases, how to
ensure paper is as good as it could possibly be the first- time submission
Page 45 of 55
R19 M.TECH. CSE/CS
Prerequisite: None
UNIT-I:
Introduction:
Disaster: Definition, Factors and Significance; Difference Between Hazard and Disaster; Natural and
Manmade Disasters: Difference, Nature, Types and Magnitude.
Disaster Prone Areas in India:
Study of Seismic Zones; Areas Prone to Floods and Droughts, Landslides and Avalanches; Areas
Prone to Cyclonic and Coastal Hazards with Special Reference to Tsunami; Post-Disaster Diseases
and Epidemics
UNIT-II:
Repercussions of Disasters and Hazards:
Economic Damage, Loss of Human and Animal Life, Destruction of Ecosystem. Natural Disasters:
Earthquakes, Volcanisms, Cyclones, Tsunamis, Floods, Droughts and Famines, Landslides and
Avalanches, Man-made disaster: Nuclear Reactor Meltdown, Industrial Accidents, Oil Slicks and
Spills, Outbreaks of Disease and Epidemics, War and Conflicts.
UNIT-III:
Disaster Preparedness and Management:
Preparedness: Monitoring of Phenomena Triggering A Disaster or Hazard; Evaluation of Risk:
Application of Remote Sensing, Data from Meteorological and Other Agencies, Media Reports:
Governmental and Community Preparedness.
UNIT-IV:
Risk Assessment Disaster Risk:
Concept and Elements, Disaster Risk Reduction, Global and National Disaster Risk Situation.
Techniques of Risk Assessment, Global Co-Operation in Risk Assessment and Warning, People’s
Participation in Risk Assessment. Strategies for Survival.
UNIT-V:
Disaster Mitigation:
Meaning, Concept and Strategies of Disaster Mitigation, Emerging Trends In Mitigation. Structural
Mitigation and Non-Structural Mitigation, Programs of Disaster Mitigation in India.
Page 46 of 55
R19 M.TECH. CSE/CS
Page 47 of 55
R19 M.TECH. CSE/CS
Prerequisite: None
Course Objectives:
To get a working knowledge in illustrious Sanskrit, the scientific language in the world
Learning of Sanskrit to improve brain functioning
Learning of Sanskrit to develop the logic in mathematics, science & other subjects enhancing
the memory power
The engineering scholars equipped with Sanskrit will be able to explore the huge knowledge
from ancient literature
UNIT-I:
Alphabets in Sanskrit,
UNIT-II:
Past/Present/Future Tense, Simple Sentences
UNIT-III:
Order, Introduction of roots,
UNIT-IV:
Technical information about Sanskrit Literature
UNIT-V:
Technical concepts of Engineering-Electrical, Mechanical, Architecture, Mathematics
Page 48 of 55
R19 M.TECH. CSE/CS
Prerequisite: None
UNIT-I:
Values and self-development –Social values and individual attitudes. Work ethics, Indian vision of
humanism. Moral and non- moral valuation. Standards and principles. Value judgements
UNIT-II:
Importance of cultivation of values. Sense of duty. Devotion, Self-reliance. Confidence, Concentration.
Truthfulness, Cleanliness. Honesty, Humanity. Power of faith, National Unity. Patriotism. Love for
nature, Discipline
UNIT-III:
Personality and Behavior Development - Soul and Scientific attitude. Positive Thinking. Integrity and
discipline, Punctuality, Love and Kindness.
UNIT-IV:
Avoid fault Thinking. Free from anger, Dignity of labour. Universal brotherhood and religious
tolerance. True friendship. Happiness Vs suffering, love for truth. Aware of self-destructive habits.
Association and Cooperation. Doing best for saving nature
UNIT-V:
Character and Competence –Holy books vs Blind faith. Self-management and Good health. Science
of reincarnation, Equality, Nonviolence, Humility, Role of Women. All religions and same message.
Mind your Mind, Self-control. Honesty, Studying effectively
Page 49 of 55
R19 M.TECH. CSE/CS
Prerequisite: None
UNIT-I:
History of Making of the Indian Constitution: History Drafting Committee, (Composition &
Working), Philosophy of the Indian Constitution: Preamble, Salient Features.
UNIT-II:
Contours of Constitutional Rights & Duties: Fundamental Rights Right to Equality, Right to
Freedom, Right against Exploitation, Right to Freedom of Religion, Cultural and Educational Rights,
Right to Constitutional Remedies, Directive Principles of State Policy, Fundamental Duties.
UNIT-III:
Organs of Governance: Parliament, Composition, Qualifications and Disqualifications, Powers and
Functions, Executive, President, Governor, Council of Ministers, Judiciary, Appointment and Transfer
of Judges, Qualification, Powers and Functions.
UNIT-IV:
Local Administration: District’s Administration head: Role and Importance, Municipalities:
Introduction, Mayor and role of Elected Representative, CEO of Municipal Corporation. Pachayati raj:
Introduction, PRI: Zila Pachayat. Elected officials and their roles, CEO Zila Pachayat: Position and
role. Block level: Organizational Hierarchy (Different departments), Village level: Role of Elected and
Appointed officials, Importance of grass root democracy.
UNIT-V:
Election Commission: Election Commission: Role and Functioning. Chief Election Commissioner
and Election Commissioners. State Election Commission: Role and Functioning. Institute and Bodies
for the welfare of SC/ST/OBC and women.
Page 50 of 55
R19 M.TECH. CSE/CS
Page 51 of 55
R19 M.TECH. CSE/CS
Prerequisite: None
UNIT-I:
Introduction and Methodology: Aims and rationale, Policy background, Conceptual framework and
terminology Theories of learning, Curriculum, Teacher education. Conceptual framework, Research
questions. Overview of methodology and Searching.
UNIT-II:
Thematic overview: Pedagogical practices are being used by teachers in formal and informal
classrooms in developing countries. Curriculum, Teacher education.
UNIT-III:
Evidence on the effectiveness of pedagogical practices, Methodology for the indepth stage: quality
assessment of included studies. How can teacher education (curriculum and practicum) and the scho
curriculum and guidance materials best support effective pedagogy? Theory of change. Strength and
nature of the body of evidence for effective pedagogical practices. Pedagogic theory and pedagogical
approaches. Teachers’ attitudes and beliefs and Pedagogic strategies.
UNIT-IV:
Professional development: alignment with classroom practices and follow-up support, Peer support,
Support from the head teacher and the community. Curriculum and assessment, Barriers to learning:
limited resources and large class sizes
UNIT-V:
Research gaps and future directions: Research design, Contexts, Pedagogy, Teacher education,
Curriculum and assessment, Dissemination and research impact.
Page 52 of 55
R19 M.TECH. CSE/CS
Page 53 of 55
R19 M.TECH. CSE/CS
Prerequisite: None
Course Objectives:
To achieve overall health of body and mind
To overcome stress
UNIT-I:
Definitions of Eight parts of yog. (Ashtanga)
UNIT-II:
Yam and Niyam.
UNIT-III:
Do`s and Don’t’s in life.
i) Ahinsa, satya, astheya, bramhacharya and aparigraha
ii) Shaucha, santosh, tapa, swadhyay, ishwarpranidhan
UNIT-IV:
Asan and Pranayam
UNIT-V:
i) Various yog poses and their benefits for mind & body
ii) Regularization of breathing techniques and its effects-Types of pranayam
Page 54 of 55
R19 M.TECH. CSE/CS
UNIT-I:
Neetisatakam-Holistic development of personality
Verses- 19,20,21,22 (wisdom)
Verses- 29,31,32 (pride & heroism)
Verses- 26,28,63,65 (virtue)
UNIT-II:
Neetisatakam-Holistic development of personality
Verses- 52,53,59 (dont’s)
Verses- 71,73,75,78 (do’s)
UNIT-III:
Approach to day to day work and duties.
Shrimad Bhagwad Geeta: Chapter 2-Verses 41, 47,48,
Chapter 3-Verses 13, 21, 27, 35, Chapter 6-Verses 5,13,17, 23, 35,
Chapter 18-Verses 45, 46, 48.
UNIT-IV:
Statements of basic knowledge.
Shrimad Bhagwad Geeta: Chapter2-Verses 56, 62, 68
Chapter 12 -Verses 13, 14, 15, 16,17, 18
Personality of Role model. Shrimad Bhagwad Geeta:
UNIT-V:
Chapter2-Verses 17, Chapter 3-Verses 36,37,42,
Chapter 4-Verses 18, 38,39
Chapter18 – Verses 37,38,63
Page 55 of 55