School of Electrical Sciences Curriculum and Syllabus for M.Tech (Computer Science and Engineering)

School of Electrical Sciences Curriculum and Syllabus for M.Tech (Computer Science and Engineering)

School of Electrical Sciences Curriculum and Syllabus for M.Tech (Computer Science and Engineering) M.Tech. (Computer Science and Engineering) Semester –I SL. Course Name Code L-T-P Credit No 1 Networks and Systems Security CS6L002 3-1-0 4 2 Advanced Algorithms CS6L007 3-1-0 4 3 Elective-I CS6LXXX 3-0-0 3 4 Elective-II CS6LXXX 3-0-0 3 5 Elective-III CS6LXXX 3-0-0 3 6 Computer Systems Lab CS6P001 0-0-3 2 7 Security & Forensics Lab-I/ML & DA Lab-I CS6P002/CS6P003 0-0-3 2 8 Seminar-I CS6S001 0-0-0 2 Total 23 Semester-II Sl. Course Name Code L-T-P Credit No 1 Cloud Computing CS6L008 4-0-0 4 2 High Performance Computer Architecture CS6L009 3-1-0 4 3 Elective-IV CS6LXXX 3-0-0 3 4 Elective-V CS6LXXX 3-0-0 3 Elective-VI CS6LXXX 3-0-0 3 5 Security & Forensics Lab-II/ML & DA Lab-II CS6P004/CS6P005 0-0-3 2 6 Seminar-II CS6S002 0-0-0 2 Total 21 Semester-III Sl. No Course Name Code L-T-P Credit 1 Research Review-I CS6D001 0-0-0 4 2 Thesis (Part-I) CS6D002 0-0-0 16 Total 20 Semester-IV Sl. No Course Name Code L-T-P Credit 1 Research Review-II CS6D003 0-0-0 4 2 Thesis (Part-II) CS6D004 0-0-0 16 Total 20 Total Credit: 84 Elective Courses Electives I, II, and III Group 1 Code Group2 Code Digital Forensics-I CS6L010 Artificial Intelligence CS6L019 Cryptography CS6L005 Machine Learning and Data Analytics-I Web Technology CS6L011 Fault Tolerant Systems CS6L006 Complexity Theory CS6L012 Complexity Theory CS6L018 Multimedia Systems CS6L013 Advanced Data bases and Mining CS6L017 Principles of Mathematical CS6L014 Mathematical Foundations of Computer CS6L015 Logic Science Mathematical Foundations of CS6L015 Image and Video processing EC6L002 Computer Science VLSI circuits CS6L016 VLSI circuits CS6L016 Electives IV, V and VI Group 1 Code Group2 Code Digital Forensics-II CS6L020 Machine Learning & Data Analytics-II Enterprise and Network CS6L021 Wireless Sensor Networks CS6L026 Forensics Complex Networks CS6L022 Natural Language Processing CS6L027 Software Testing and CS6L023 Computational aspects of Smart CS6L028 Verification Grids Internet of Things CS6L024 Complex Networks CS6L022 Information theory and EC6L003 Software Testing and Verification CS6L023 Coding Object Oriented Systems CS6L025 Object Oriented Systems Design CS6L025 Design Cyber Forensics Specific courses: Cryptography, Digital Forensics-I, Digital Forensics-II, Enterprise and Network Forensics, Security & Forensics Labs Data Analytics specific courses: Machine Learning & Data Analytics I&II, Advanced Data bases and Mining, Natural language processing and Machine Learning and Data Analytics Labs Vertical Theory (Core Courses) Code: CS6L008 Name: Cloud Computing L-T-P: 3-1-0 Credits: 4 Introduction to Cloud Computing; Enabling Technologies and System Models for Cloud computing; Benefits, Challenges and Risks in Cloud Computing; Cloud Computing Service Models: Infrastructure/Platform/Software – as-a-service; Cloud Architectures including Federated Clouds; Public, Private and Hybrid clouds; Cloud Operating System; Scalability, Performance and QoS in Cloud Computing; Data-Center Architectures for Cloud Computing; Principles of Virtualization platforms; Virtual machine migration and Load balancing; Security and Privacy issues in Cloud; VMWare ESX Memory Management; Capacity Planning and Disaster Recovery in Cloud Computing. Simulation tools: CloudSim Case studies: Cloud computing systems from Amazon, Microsoft and IBM Text books: Kai Hwang, Jack Dongarra, Geoffrey C. Fox, Distributed and Cloud Computing, 1st edition, Morgan Kaufmann, 2013. Reference books: Thomas Erl, Cloud Computing: Concepts, Technology & Architecture, Pearson. John Rhoton, Cloud Computing Explained: Handbook for Enterprise Implementation. Technical papers from major journals and major conferences on computing, networking, cloud computing. Code: CS6L002 Name: Networks and Systems L-T-P: 3-1-0 Credits: 4 Security Introduction to Networking principles: Introduction to networking, datalink layer, network layer and transport layer protocols, DNS, mail servers, web servers, peer-to-peer network Security, wireless communication protocol. Overview of System Security: Exploiting bugs in programs. Buffer overflows, fuzzing, Certification, secure socket layer (SSL), Kerberos, SQL injection, concepts of vulnerability, risk management, worm, virus, malwares, IDS, anti-viruses. Basics of Cryptography: Basic cryptography and techniques, block ciphers, message authentication, symmetric-key encryption, hash functions, public-key encryption, digital signatures. Data Privacy: Privacy changing online, mathematical definitions of privacy, attacks on privacy and anonymity, K-anonymity, Differential privacy, Private information retrieval, basics of multiparty computation and relationship to privacy. Network Security: Access control, sate full firewall, IPSec, modeling and analysis of various security violation in wireless and sensor networks, trusted computing techniques, ARP Poisoning, IP spoofing, hidden tunnels, denial of service attack, firewalls. Prerequisite: none Test Books 1. Network Security Essentials (Applications and Standards) by William Stallings Pearson Education. 2. Hack Proofing your network by Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, David Ahmad, Hal Flynn Ido Dubrawsky, Steve W.Manzuik and Ryan Permeh, Wiley Dreamtech Reference Books: 1. Network Security and Cryptography: Bernard Menezes, CENGAGE Learning. 2. Network Security - Private Communication in a Public World by Charlie Kaufman, Radia Perlman and Mike Speciner, Pearson/PHI. 3. Cryptography and network Security, Third edition, Stallings, PHI/Pearson 4. Principles of Information Security, Whitman, Cengage Learning. Code: CS6L007 Name: Advanced Algorithms L-T-P:3-1-0 Credits: 4 Data Structures: More Advanced Solutions to Basic Data Structuring Problems: Fibonacci Heaps. Van Emde Boas Priority Queues. Dynamic Data Structures for Graph Connectivity/Reachability. Bit Tricks: Word-level Parallelism. Transdichotomous Model. o(n \log n) Integer Sorting. String Algorithms: Rabin-Karp Fingerprinting Algorithm. Suffix Trees. Maximum Flows: Augmenting Paths and Push-Relabel Methods. Minimum Cost Flows. Bipartite Matching. Linear Programming: Formulation of Problems as Linear Programs. Duality. Simplex, Interior Point, and Ellipsoid Algorithms. Online Algorithms: Ski Rental. River Search Problem. Paging. The k-Server Problem. List Ordering and Move-to-Front. Approximation Algorithms: One Way of Coping with NP-Hardness. Greedy Approximation Algorithms. Dynamic Programming and Weakly Polynomial-Time Algorithms. Linear Programming Relaxations. Randomized Rounding. Vertex Cover, Wiring, and TSP. Fixed-Parameter Algorithms: Another Way of Coping with NP-Hardness. Parameterized Complexity. Kernelization. Vertex Cover. Connections to Approximation. Parallel Algorithms: PRAM. Pointer Jumping and Parallel Prefix. Tree Contraction. Divide and Conquer. Randomized Symmetry Breaking. Maximal Independent Set. External-Memory Algorithms: Accounting for the Cost of Accessing Data from Slow Memory. Sorting. B-trees. Buffer Trees. Cache-oblivious Algorithms for Matrix Multiplication and Binary Search. Computational Geometry: Convex Hull. Line-segment Intersection. Sweep Lines. Voronoi Diagrams. Range Trees. Seidel's Low-dimensional LP Algorithm. Streaming Algorithms: Sketching. Distinct and Frequent Elements. Prerequisite: Designing and Analysis of Algorithms Text Books: 1. Thomas H. Cormen, Charles E. Leiserson, R.L. Rivest.. Introduction to Algorithms, Prentice Hall of India Publications. 2. Algorithm Design by Kleinberg and Tardos, Pearson. 3. Merc De-Berg eta al. Computational Geometry: Algorithms and Applications, 3rd Edition, Springer. Reference Books: 1. Sara Baase and Allen Van Gelder. Computer Algorithms: Introduction to Design and Analysis, Pearson education (Singapore) Pvt. Ltd, New Delhi 2007. 2. Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman.. The Design and Analysis of Computer Algorithms, Pearson Education (Singapore) 2006. 3. Algorithmics: Theory and Practice by Brassard and Bratley, Prentice Hall. Code: CS6L009 Name: High Performance L-T-P: 3-1-0 Credits: 4 Computing Architecture Introduction: review of basic computer architecture, quantitative techniques in computer design, measuring and reporting performance. CISC and RISC processors. Pipelining: Basic concepts, instruction and arithmetic pipeline, data hazards, control hazards, and structural hazards, techniques for handling hazards. Exception handling. Pipeline optimization techniques. Compiler techniques for improving performance. Hierarchical memory technology: Inclusion, Coherence and locality properties; Cache memory organizations, Techniques for reducing cache misses; Virtual memory organization, mapping and management techniques, memory replacement policies. Instruction-level parallelism: basic concepts, techniques for increasing ILP, superscalar, superpipelined and VLIW processor architectures. Array and vector processors. Multiprocessor architecture: taxonomy of parallel architectures. Centralized shared-memory architecture: synchronization, memory consistency, interconnection networks. Distributed shared-memory architecture. Cluster computers. Non von Neumann architectures: data flow computers, reduction computer architectures, systolic architectures. GPU architectures: NVIDEA and AMD architectures, gem5 and GPGPU-sim simulators GPU Computing: CUDA and OpenCL programming with case studies Text Books: 1. John L. Hennessy and David A. Patterson, Computer Architecture -- A Quantitative Approach,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    23 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us