MTech CE Syllabus
MTech CE Syllabus
W.e.f AY 2019-20 and Applicable for batches admitted from AY 2019-20 to 2022-23
List of Abbreviations
Abbreviation Title No of courses Credits % of
Credits
PSMC Program Specific Mathematics 1 4 5.9%
Course
PSBC Program Specific Bridge Course 1 3 4.4%
DEC Department Elective Course 3 9 13.2%
MLC Mandatory Learning Course 2 0 0%
PCC Program Core Course 6 22 32.4%
LC Laboratory Course 2 2 2.9%
IOC Interdisciplinary Open Course 1 3 4.4%
LLC Liberal Learning Course 1 1 1.5%
SLC Self Learning Course 2 6 8.8%
SBC Skill Based Course 2 18 26.5%
Semester I
Semester II
Sr. Course Teaching Scheme
Course Code Course Name Credits
No. Type L T P
1. IOC *Interdisciplinary Open Course 3 -- -- 3
Department Elective –II
COC(DE)-19004 1. Data Analytics
2. Cloud Computing and
2. DEC COC(DE)-19005 3 -- -- 3
Virtualization
COC(DE)-19006 3. Natural Language Processing
COC(DE)-19007 4. Advanced Algorithms
Department Elective –III
COC(DE)-19009 1. Bioinformatics (BI)
3. DEC 2. Advanced Compiler 3 -- -- 3
COC(DE)-19010
Construction (ACC)
COC(DE)-19011 3. Deep Learning
4. LLC LL-19001 Liberal Learning Course 1 -- -- 1
Data Mining and Machine
5.1 PCC COC-19009 Learning 3 -- 3
5.2 PCC COC-19010 Security in Computing 3 -- 3
5.3 PCC COC-19011 Embedded Systems 3 -- 3
Data Mining and Machine
5.4 LC COC-19012 Learning - Laboratory -- 2 1
Security in Computing -
5.5 LC COC-19013 Laboratory -- 2 1
5.6 LC COC-19014 Embedded Systems - Laboratory -- 2 1
Total 19 -- 6 22
*: Department is going to offer ‘Data Structures’ as IOC for students of other departments.
Semester-III
Course Outcomes:
Text Books:
1. Ronald Walpole, Probability and Statistics for Engineers and Scientists, Pearson, ISBN-13:
978-0321629111
References:
1. Kishor Trivedi, Probability and Statistics with Reliability, Queuing, and Computer Science
Applications, John Wiley and Sons, New York, 2001, ISBN number 0-471-33341-7
Course Outcomes:
Text Books:
1. Thomas Cormen, Charles Leiserson, Ronald Rivest and Cliford Stein, “Introduction to
Algorithms” , PHI
Reference Books:
1. E. Horowitz and S. Sahni. “Fundamentals of Computer Algorithms” , Galgotia, 1991
Course Outcomes:
Text Books:
1. Sinha P. K., Distributed Operating Systems Concepts and Design, PHI, 1997
References:
1. Tanenbaum A. S., Distributed Operating Systems, Pearson Education India, 1995
Unit I: [6 Hrs]
Introduction: Artificial Intelligence, AI Problems, AI Techniques, The Level of the Model,
Criteria For Success. Defining the Problem as a State Space Search, Problem Characteristics,
Production Systems, Search: Issues in The Design of Search Programs, Un-Informed Search,
BFS, DFS; Heuristic Search Techniques: Generate-And- Test, Hill Climbing, Best-First Search,
A* Algorithm, Problem Reduction, AO*Algorithm, Constraint Satisfaction, Means-Ends
Analysis
Unit V: [6 Hrs]
Natural Language Processing: Role of Knowledge in Language Understanding, Approaches
Natural Language Understanding, steps in The Natural Language Processing, Syntactic
Processing and Augmented Transition Nets, Semantic Analysis, NLP Understanding Systems;
Planning: Components of a Planning System, Goal Stack Planning, Hierarchical Planning,
Reactive Systems
Text Book:
1. Artificial Intelligence, George F Luger, Pearson Education Publications
2. Artificial Intelligence, Elaine Rich and Knight, Mcgraw-Hill Publications
References:
1. Introduction To Artificial Intelligence & Expert Systems, Patterson, PHI 2.
2. Multi Agent systems- a modern approach to Distributed Artificial intelligence, Weiss.G, MIT
Press.
3. Artificial Intelligence: A modern Approach, Russell and Norvig, Printice Hall
Course Outcomes:
Students will get
1. Familiarity with basic concepts and terminology of graph theory
2. Exposure to advanced topics such as matchings, graph coloring etc.
Text Books:
1. Douglas B. West, “Introduction to Graph Theory”, Pearson Education India; 2nd edition
(2015), ISBN-10: 9789332549654, ISBN-13: 978-9332549654
2. Béla Bollobás, Modern Graph Theory, Springer, 2013, ISBN-10: 9788181283092, ISBN-13:
978-818128309
Reference Books:
1. Reinhard Diestel, Graph Theory, 4th edition (2010), ISBN-10: 3642142788,
a. ISBN-13: 978-3642142789
2. Adrian Bondy and U.S.R. Murty, "Graph Theory", Springer, 1st edition (2008),
ISBN-10: 1846289696, ISBN-13: 978-1846289699
Internet Resources:
1. NPTEL Course: https://nptel.ac.in/courses/106108054/
Unit I: [5 Hrs]
Meaning of research problem, Sources of research problem, Criteria Characteristics of a good
research problem, Errors in selecting a research problem, Scope and objectives of research
problem.
Approaches of investigation of solutions for research problem, data collection, analysis,
interpretation, necessary instrumentations.
Unit V: [7 Hrs]
Understanding the types of Intellectual Property Rights: -Patents-Indian Patent Office and its
Administration, Administration of Patent System – Patenting under Indian Patent Act , Patent
Rights and its Scope, Licensing and transfer of technology, Patent information and database.
Provisional and Non Provisional Patent Application and Specification, Plant Patenting, Idea
Patenting,
Integrated Circuits, Industrial Designs, Trademarks (Registered and unregistered trademarks),
Copyrights, Traditional Knowledge, Geographical Indications, Trade Secrets, Case Studies
Reference Books:
Reference Books
Course Outcomes:
Students will be able to:
1. Understand foundation of the RDBMS theory
2. Understand internal functioning of RDBMS
3. Understand advanced topics of RDBMS
4. Analyze and understand the latest trends of RDBMS
Reference Books:
1. Korth, Silberschatz and Sudarshan, “Database System Concepts”, Tata McGraw Hill, 6th
edition (2013), ISBN-10: 9332901384, ISBN-13: 978-9332901384
2. R. Elmasri, and S. Navathe, “Fundamentals of Database Systems”, Pearson, 7th edition
(2017), ISBN-10: 9789332582705, ISBN-13: 978-9332582705
Internet Resources:
1. http://hadoop.apache.org
[COC-19004] Advanced Computer Networks
Unit I: [4 Hrs]
Routing Algorithms, Congestion Control, Quality of Service, Queue Management, High Speed
Networks, Performance Modeling and Estimation
Unit V: [6 Hrs]
SNMPv1 Network Management: Organization and Information Models, SNMPv2: major
changes, SNMPv3, RMON, Network Management Tools, Systems, and Engineering, Network
Management Applications.
Text Books:
1. Mani Subramanian, Timothy A. Gonsalves,N. Usha Rani; Network Management: Principles
and Practice; Pearson Education India, 2010
2. William Stallings, High-Speed Networks and Internets, Pearson Education, 2nd Edition,
2002.
3. C. Siva Ram Murthy, B.S. Manoj, Ad Hoc Wireless Networks: Architectures and Protocols,
Prentice Hall, 2004
4. Muthukumaran B, Introduction to High Performance Networks, Tata Mc Graw Hill, 2008
Reference Books:
1. Thomas D NAdeau and Ken Grey, Software Defined Networking, O'Reilly, 2013
2. Pete Loshin IPv6, Theory, Protocols and Practice, Morgan Kaufmann, 2nd Edition, 2004
3. Tom Clark, Designing Storage Area Networks, A Practical Reference for Implementing
Fibre Channel and IP SANs, Addison-Wesley Professional, 2nd Edition, 2003.
Course Outcomes:
Text Books:
Reference Books:
Course Outcomes:
Course Outcomes:
Students will:
1. Be able to relate theory with practice by performing programming assignments
2. Get proficiency in designing programming solutions
3. Get proficiency in variety of tools and environments like C, C++, Java, and Linux OS
4. Be able to analyze various algorithms and implementation options to solve a problem
5. Learn to work in teams while carrying out the assignments
6. Imbibe good programming practices
List of Assignments:
Reference Books:
1. Peter S. Pacheco, “An Introduction to Parallel Programming”, Morgan Kaufmann, Elsevier
Series, 2011, ISBN:978-0-12-374260-5.
2. Jason Sanders, Edward Kandrot, “CUDA by Example: An Introduction to General Purpose
GPU Programming”, 2011, ISBN:978-0-13-138768-3.
Course Outcomes:
Students will be able to:
1. Apply and implement advanced data structures, such as B-trees, multi-way trees,
balanced trees, heaps, priority queues, to solve computational problems
2. Analyze the time and space complexity of advanced data structures and their
supported operations
3. Compare the time and space tradeoff of different advanced data structures and their
common operations
Unit I: [6 Hrs]
Review of Basic Concepts: Abstract data types, Data structures, Algorithms, Big Oh, Small Oh,
Omega and Theta notations, Solving recurrence equations, Master theorems, Generating function
techniques, Constructive induction.
Unit II: [8 Hrs]
Advanced Search Structures for Dictionary ADT: Splay trees, Amortized analysis, 2-3 trees, 2-3-
4 trees, Red-black trees, Randomized structures, Skip lists, Treaps, Universal hash functions.
Unit V: [6 Hrs]
Graph Algorithms: DFS, BFS, Biconnected components, Cut vertices, Matching, Network flow;
Maximum-Flow / Minimum-Cut; Ford–Fulkerson algorithm, Augmenting Path.
Text Books:
1. Introduction to Algorithms; 3rd Edition; by by Thomas H. Cormen, Charles E. Leiserson,
Ronald L. Rivest and Clifford Stein; Published by PHI Learning Pvt. Ltd. ; ISBN-13: 978-
0262033848 ISBN-10: 0262033844
2. Algorithms; 4th Edition; by Robert Sedgewick and Kevin Wayne; Pearson Education, ISBN-
13: 978-0321573513
References:
1. Algorithms; by S. Dasgupta, C.H. Papadimitriou, and U. V. Vazirani; Published by Mcgraw-
Hill, 2006; ISBN-13: 978-0073523408 ISBN-10: 0073523402
2. Algorithm Design; by J. Kleinberg and E. Tardos; Published by Addison-Wesley, 2006;
ISBN-13: 978-0321295354 ISBN-10: 0321295358
Text Books:
1. Anil Maheshwari, “Data Analytics made accessible,” Amazon Digital Publication, 2014.
2. Song, Peter X. -K, “Correlated Data Analysis: Modeling, Analytics, and Applications”,
Springer-Verlag New York 2007.
3. Glenn J. Myatt, Wayne P. Johnson, “Making Sense of Data I: A Practical Guide to
Exploratory Data Analysis and Data Mining”, Wiley 2009.
Reference Books:
1. Thomas H. Davenport, Jeanne G. Harris and Robert Morison, “Analytics at Work: Smarter
Decisions, Better Results”, Harvard Business Press, 2010
2. Rachel Schutt, Cathy O’Neil, “Doing Data Science”, O’REILLY, 2006.
3. Shamanth Kumar Fred Morstatter Huan Liu “Twitter Data Analytics”, Springer-Verlag,
2014.
Course Outcomes:
Student will be able to
1. Characterize the distinctions between various cloud models and services
2. Compare the functioning and performance of virtualization of CPU, memory and I/O
with traditional systems
3. Familiar with cloud platforms and technologies like AWS, vSphere etc.
4. Create a cloud infrastructure after learning OpenStack components
5. Analyze the security risks associated with virtualization, cloud computing and
evaluate how to address them
Unit I: [6 Hrs]
Introduction: Benefits and challenges to Cloud architecture, Cloud delivery models- SaaS, PaaS,
LaaS. Cloud Deployment Models- Public Cloud, Private Cloud, Community Cloud and Hybrid
Cloud, Service level agreements in clouds, case Studies on Cloud services, Cloud Adoption
Challenges.
Unit V: [4 hrs]
Cloud Platforms: Overview and Architecture, Azure, Google App Engine, Amazon Web
Services.
Unit VI: [8 Hrs]
Virtualization Security: Security Challenges Raised by Virtualization, Virtualization Attacks,
VM Migration Attacks, Launch Pad for Brute Force attacks, Security Solutions, Hypervisor-
Based Segmentation, case studies of Hypervisors.
Cloud Security: Issues with Multi-tenancy, Isolation of users/VMs from each other, VM
vulnerabilities, hypervisor vulnerabilities, VM migration attacks, Cloud based DDOS,
Developing cloud security models, end-to-end methods for enforcing Security, Security policies
and programming models with privacy aware APIs
Text Books:
1. Kai Hwang, Geoffrey and KJack, Distributed and Cloud computing, Elsevier
2. Shailendra Singh, Cloud Computing, Oxford Higher Education, , 2018
References:
1. Danielle Ruest and Nelson Ruest, Virtualization, A beginners Guide, Tata McGraw Hill,2009
2. Tom White, Hadoop: The Definitive Guide, O’REILLY, 3rd Edition, 2012
3. Dinakar Sitaram and Geetha Manjunath, Moving to the cloud, Elsevier
Course Outcomes:
Text Books:
1. Daniel Jurafsky and James H. Martin, “Speech and Language Processing”, Second Edition,
Prentice Hall, 2008, ISBN: 978-0131873216.
2. Allen James, “Natural Language Understanding”, Second Edition, Benjamin/Cumming,
1994, ISBN: 978-0805303346.
3. Chris Manning and Hinrich Schuetze, “Foundations of Statistical Natural Language
Processing”, MIT Press, ISBN: 978-0262133609.
Reference Books:
1. Journals: Computational Linguistics, Natural Language Engineering, Machine Learning,
Machine Translation, Artificial Intelligence.
2. Conferences: Annual Meeting of the Association of Computational Linguistics (ACL),
Computational Linguistics (COLING), European ACL (EACL), Empirical Methods in NLP
(EMNLP), Annual Meeting of the Special Interest Group in Information Retrieval (SIGIR),
Human Language Technology (HLT).
Course Outcomes:
Students will be able to:
1. Understand various algorithm design paradigms and solve typical problems using
those paradigms
2. Apply the advanced techniques to solve real life problems
Text Books:
1. Thomas Cormen, Charles Leiserson, Ronald Rivest and Cliford Stein, “Introduction to
Algorithms” , PHI
2. Jure Leskovec, Anand Rajaraman and Jeffrey Ullman, “Mining of Massive Datasets”,
Dreamtech Press
Reference Books:
1. Rajeev Motwani and Prabhakar Raghavan, “Randomized Algorithms”, Cambridge
University Press
2. Vijay V. Vazirani, "Approximation Algorithms", Springer
[COC(DE)-19009] Bioinformatics
Course Outcomes:
Students will be able to:
1. Learn various algorithms for sequencing and alignments
2. Implement proof of concepts for the algorithm studied with some sample data
3. Evaluate how networks, algorithms, and models are employed in bioinformatics
4. Compare the molecular biology techniques for drug design for various diseases
Reference Books:
1. Teresa Attwood, David Parry-Smith, “Introduction to Bioinformatics”, Pearson Education
Series, 9788180301971
2. R. Durbin, S. Eddy, A. Krogh, G. Mitchison., “Biological Sequence Analysis: Probabilistic
Models of proteins and nucleic acids”, Cambridge University Press, 9780521629713.
3. Arthur M. Lesk, Introduction to Bioinformatics, Oxford University Press, 3rd Edition,2008
4. Andreas D. “Bioinformatics: A Practical Guide to the Analysis of Genes and Proteins”,
Second Edition,
5. Baxevanis, B. F. Francis Ouellette.Des Higgins (Editor), Willie Taylor Bioinformatics: A
Biologist's Guide to Biocomputing and the Internet, Stuart M. Brown
Course Outcomes:
Unit IV: Data Flow Analysis & Scalar Optimization [10 Hrs]
Basic concepts : Lattices, flow functions and fixed points, Iterative data flow analysis, Lattice of
flow functions, Control –tree based data flow analysis, Structural analysis and interval analysis,
Static Single Assignment (SSA) form, Dealing with arrays, structures and pointers, Advanced
topics: Structures data-flow algorithms and reducibility, Inter procedural analysis (Control flow,
data flow, constant propagation, alias), Inter procedural register allocation, Aggregation of global
references, Introduction to scalar optimization, Machine –independent and dependent
transformations, Example optimizations (eliminating useless and unreachable code, code motion,
specialization, enabling other transformation, redundancy elimination)., Advanced topics
(Combining optimizations, strength reduction).
Text Books:
1. Keith D. Cooper and Linda Torczon, Engineering a Compiler, Elsevier-Morgan Kaufmann
Publishers, 2004.
2. Steven S. Muchnick, Advanced Compiler Design Implementation, Elsevier-Morgan
Kaufmann Publishers, 2003.
3. Uday Khedker, Amitabha Sanyal, Bageshri Karkare , Data Flow Analysis: Theory and
Practice, CRC Press, 2009
References:
1. Andrew Appel, Modern Compiler Implementation in C: Basic Techniques, Cambridge
University Press, 1997.
2. Y.N. Srikant, Priti Shankar, The Compiler Design Handbook: Optimizations and Machine
Code Generation, CRC Press, 2nd Edition, 2002.
3. David R. Hanson , Christopher W. Fraser, A Retargetable C Compiler: Design and
Implementation, Addison-Wesley, 1995
4. Morgan, Robert, Building an Optimizing Compiler, Digital Press Newton, 1998.
5. John Levine, Tony Mason & Doug Brown, Lex and Yacc, O’Reilly
Course Outcomes:
Text Books:
1. Deep Learning- Ian Goodfelllow, Yoshua Benjio, Aaron Courville, The MIT Press
References:
Course Outcomes:
Students will
1. Understand Supervised, unsupervised and semi supervised machine learning algorithm
2. Study of probabilistic analysis, parametric and non-parametric algorithms
3. Estimation of Maximum Likelihood, losses and risks for sample implementation
4. Study and Compare various classification, association, clustering algorithms
5. Apply data mining algorithms for solving real life problems
6. Discuss active areas of research in Data Mining and Machine Learning
Text Books:
1. Tom Mitchell, Machine Learning, McGraw-Hill, 1997.
2. Jiawei Han Micheline Kamber, Data Mining Concepts and Techniques, Latest Edition
References:
1. Ethem Alpaydin, Introduction to Machine Learning, PHI, 2005
2. D. Hand, H. Mannila and P. Smyth. Principles of Data Mining. Prentice-Hall. 2001
3. K.P. Soman, R. Longonathan and V. Vijay, Machine Learning with SVM and Other Kernel
Methods, PHI-2009
4. Christopher M. Bishop, Pattern Recognition and Machine Learning, Springer 2006.
5. M. H. Dunham. Data Mining: Introductory and Advanced Topics. Pearson Education. 2001
I. Witten, E. Frank, Mark Hall, C. Pal. Data Mining: Practical Machine Learning
Tools and Techniques. Morgan Kaufmann. 2016
6. T. Fawcett, “An introduction to ROC analysis,” Pattern Recognit. Lett., vol. 27, no. 8, pp.
861–874, 2006. Link: https://people.inf.elte.hu/kiss/13dwhdm/roc.pdf
Course Outcomes:
Text Books:
1. William Stallings, Cryptography and Network Security, Prentice Hall, 4th Edition, 2006
2. Behrouz A Forouzan, Cryptography & Network Security, McGraw-Hill, 2008
3. Atul Kahate, Cryptography and Network Security, Tata McGraw-Hill, 2nd Edition, 2008.
4. William Stallings, Network Security Essentials Applications and Standards, Pearson
Education, New Delhi.
References:
1. C. Pfleeger and S. Pfleeger, Security in Computing, Prentice Hall,4th Edition, 2007.
2. Eric Maiwald, Fundamentals of Network Security, McGraw-Hill, 2004.
3. Jay Ramachandran, Designing Security Architecture Solutions, Wiley Computer Publishing,
2002.
4. Bruce Schneier, Applied Cryptography, John Wiley & Sons Inc, 2001.
5. Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security Private
Communication in a public world, Prentice Hall of India Private Ltd., New Delhi
[COC-19011] Embedded Systems
Course Outcomes:
Students will be able to:
1. Explain Characteristics & Salient Features of Embedded Systems
2. Analyze Architecture & Recent Trends of Embedded Systems
3. Discuss PIC and ARM families
4. Understand general process of embedded system development and implement them.
5. Explain communication interface for wired and wireless protocols
6. Discuss hardware and software design methodologies for embedded systems
References:
1. Vahid F. and Givargies T., Embedded Systems Design, John Wiley X. Sons, 2002
2. John B Peatman, Design with PIC Microcontrollers, Pearson Education, 1998
3. Liu, Real-Time Systems, Pearson Education, 2000.
4. Technical Manuals of ARM Processor Family available at ARM Website on Net
1. Take any benchmark dataset (both numeric and text) and apply preprocessing techniques on
it.
2. Compare the performance of 10 machine learning models for regression data set (eg. UCI
repository Breast Cancer dataset) for the data partition of 70-30% with acceptable error of ±100.
The comparative study of machine learning models should be of the form:
Model Method Package r R2 Error Accuracy
M1
M2
…
M10
3. Study 5 feature selection techniques on the regression data set considered in (2) and report top
five features. The study of feature selection techniques should be represented as :
4. Estimate the accuracy of the Naive Bayes classifier on the breast cancer data set using 5-fold
cross-validation.
5. Implement the SVM algorithm with RBF. Estimate the precision, recall, accuracy, and F-
measure on the text classification task for each of the 10 categories using 10-fold cross-
validation of Reuters dataset.
6. Implement both the k-means algorithm and the Hierarchical Agglomerative Clustering (HAC)
algorithm. For both, assume that all features are real-valued. Also assume that there is no need
for normalization of the features. Use the Ln-norm for distance calculations with a default value
of n=2 (Euclidean).
Note that the datasets you are to test your algorithms with contain labeled items. You will need
to ignore the label (target attribute, always last here) while clustering.
Implement the k-means clustering algorithm and the HAC algorithm (using single linkage). For
k-means, your program should automatically try 2 <= k <= 7 and compute the squared error in
each case. You should then return the value of k that produces the lowest squared error, together
with that error. For HAC, you should compute (and store) the squared errors of all possible
clustering's (as they are built from the bottom up). Upon completion, you should return the value
of t (distance threshold) that produces the lowest squared error, the corresponding number of
clusters, and the corresponding error.
Use the algorithms on the Iris dataset(available on UCI repository) .
Compare the best number of clusters obtained by k-means and HAC. How do these also compare
with the underlying structure of the dataset in which there are 3 classes of iris plants?
Experiment with your distance metric -- can you find a value of n for the Ln-norm that changes
the number of clusters found?
Graph the value of the squared error for each clustering as HAC executes (with no threshold).
What do you observe? Is this surprising?
7. Implement the Apriori algorithm. Build your own association task. Design your task so that
it contains some simple associations you can check your algorithm against. List these
associations. Run Apriori for various combinations of minsup and minconf values. Verify that the
associations you designed into the task are discovered by your algorithm.
Note: The teacher taking the course can change the list of assignments. This is just a guideline of
list of assignments.
1. Blink an LED with software delay, delay generated using the SysTick timer.
2. System clock real time alteration using the PLL modules.
3. Control intensity of an LED using PWM implemented in software and hardware.
4. Control an LED using switch by polling method, by interrupt method and flash the LED
once every five switch presses.
5. Key matrix and alphanumeric LCD interfacing and programming.
6. UART programming with accessing TX ad RX buffers directly and using DMA.
7. Recording of analog readings at the output of rotary potentiometer connected to ADC
channel.
8. Programming (ISL 29023) Ambient and Infrared Light sensor available on Sensor Hub
Booster Pack using I2C interface.
9. Calling C functions from assembly programs and vice versa.