Syllabus MSCIT Full
Syllabus MSCIT Full
IT syllabus
Admission criterion for MSc. Part I by papers:
For admission to MSc. IT, the following conditions will apply:
1. There will be 20 seats per batch. All the admissions will be on merit (i.e., percentage
of aggregate marks secured for the qualifying examination). Reservation criterion
should be followed as prescribed by government at the time of admission.
2. Students securing minimum 45 percent marks at the three year BSc degree in
Information Technology of Mumbai University or any recognized un
for theory and 50 marks for practical/case study/seminars.
a) For MSc part I all the papers will be compulsory.
b) MSc. Part II will have two subjects compulsory and two elective subjects
Each paper will have minimum 4 Theory lectures per week each lecture is of 1 hr duration.
The lectures should be organized in such a way that each paper will have minimum 100 hrs
contact sessions for the year.
Standard of passing:
For MSc part I: To pass examination a candidate will have to secure
1) Minimum 20% marks in each theory paper and minimum 40% marks in aggregate for all
the subjects.
For MSc part II: To pass examination a candidate will have to secure
1) Minimum 20% marks in each theory paper and minimum 40% marks in aggregate
including dissertation work on the project..
2) The submission of dissertation work is compulsory and student should appear for viva for
the same.
The candidate is allowed to keep terms for maximum of all the subjects for the Part I but can
take admission Part II. However the result of such student for part II examination will not be
declared till candidate successfully completes part I examination.
Award of class: As per the prevailing norms for other science subjects.
M Sc – IT First Year
Subjects Lect/ Pract/ Paper Prac Total
t
Week Week Hours Marks
I Year – I Term
1 Computer Simulation and Modeling 4 4 3 100 50 150
I Year – II Term
Programming with Components 4 4 3 100 50 150
I Year – I Term
2 Mobile Computing 4 4 3 100 50 150
I Year – II Term
Advanced Computer Networks 4 4 3 100 50 150
I Year – I Term
3 Image Processing 4 4 3 100 50 150
I Year – II Term
Speech Recognition 4 4 3 100 50 150
Page of 48 1
I Year – I Term
I Year – II Term
Advanced Database Systems 4 4 3 100 50 150
Total , I Year – I Term 16 16 - 400 200 600
Total , I Year – II Term 16 16 - 400 200 600
Page of 48 2
M Sc – IT Second Year
Subjects Lect/ Pract/ Paper Prac Total
t
Week Week Hours Marks
II Year – I Term
1 Software Testing 4 4 3 100 -- 100
II Year – II Term
Information Security 4 4 3 100 -- 100
II Year – I Term
2 Artificial Intelligence 4 4 3 100 -- 100
II Year – II Term
Robotics 4 4 3 100 -- 100
II Year – I Term
3 Elective I
I Term 4 4 100 50 150
II Term 4 4 100 50 150
4 Elective II
I Term 4 4 100 50 150
II Term 4 4 100 50 150
5 Project, I Term - - - 100 100
Project, II Term - - - 100 100
Total , II Year – I Term 16 16 - 400 200 600
Total , II Year – II Term 16 16 - 400 200 600
Elective-I Elective-II
1 Parallel Processing, (I Term) 1 Pattern Recognition, (I Term)
Distributed Computing, (II Term) Computer Vision, (II Term)
2 Intelligent Systems, (I Term) 2 System Security, (I Term)
Neural Networks and Fuzzy Systems (II Virtual Reality and Virtual
Term) Environment
3 Digital Signal Processing, (I Term) 3 Multimedia systems and
convergence of technologies
Enterprise Networking (II Term) Java Technology, (II Term)
Page of 48 3
M Sc – Information Technology Year I
M Sc – Information Technology Year I, Paper I, Term I
Page of 48 4
Simulation of super market, Simulation of pert network
BOOKS
Text Books:
1. Jerry Banks, John Carson, Barry Nelson, David Nicol, “Discrete Event System Simulation”
2. Averill Law, W. David Kelton, “Simulation Modeling and Analysis”, McGRAW-HILL
References:
1. Geffery Gordon, “System Simulation”, PHI
2. Bernard Zeigler, Herbert Praehofer, Tag Gon Kim, “Theory of Modeling and Simulation”,
Academic Press
3. Narsing Deo, “System Simulation with Digital Computer”, PHI
4. Donald W. Body, “System Analysis and Modeling”, Academic Press Harcourt India
5. W David Kelton, Randall Sadowski, Deborah Sadowski, “Simulation with Arena”,
McGRAW-HILL.
TERM WORK
1. Term work should consist of at least 10 practical experiments/Assignments covering the
topics of the syllabus.
ORAL EXAMINATION
An oral examination is to be conducted based on the above syllabus.
Page of 48 5
M Sc – Information Technology Year I, Paper I, Term II
Page of 48 6
BOOKS
Text Books:
1. Booch, Jacobson, Rambug, “Essential COM”, Pearson Education
2. Don Box, “Essential COM”, Pearson Education.
3. Jason Pritchard, “COM and CORBA side by side”, Pearson Education.
References:
1. Tom Valesky, “Enterprise Java Beans”, Pearson Education
TERM WORK
1. Term work should consist of at least 10 practical experiments covering the topics of the
syllabus using COM/ EJB Technologies
ORAL EXAMINATION
An oral examination is to be conducted based on the above syllabus.
Page of 48 7
M Sc – Information Technology Year I, Paper II, Term I
SUBJECT: MOBILE COMPUTING
Lectures: 4 Hrs per week Theory: 100 Marks
Practical: 4 Hrs per week Term work / Practical: 50 Marks
Objective: Recent developments in portable devices and high-bandwidth, ubiquitous
wireless networks has made mobile computing a reality. Indeed, it is widely predicted that
within the next few years’ access to Internet services will be primarily from wireless devices,
with desktop browsing the exception. Such predictions are based on the huge growth in the
wireless phone market and the success of wireless data services. This course will help in
understanding fundamental concepts, current developments in mobile communication
systems and wireless computer networks.
Pre-requisites: Computer Networks.
DETAILED SYLLABUS
1. Introduction: Applications, A short history of wireless communication
2. Wireless Transmission: Frequency for radio transmission, Signals, Antennas, Signal
propagation, Multiplexing, Modulation, Spread spectrum, Cellular systems.
3. Medium Access Control: Motivation for a specialized MAC: Hidden and Exposed
terminals. Near and Far terminals; SDMA, FDMA, TDMA: Fixed TDM, Classical
Aloha, Slotted Aloha, Carrier sense multiple access, Demand assigned multiple access,
PRMA packet reservation multiple access, Reservation TDMA, Multiple access with
collision avoidance, Polling, Inhibit sense multiple access; CDMA: Spread Aloha
multiple access.
4. Telecommunication Systems: GSM: Mobile services, System architecture, Radio
interface, Protocols, Localization And Calling, Handover, Security, New data services;
DECT: System architecture, Protocol architecture; TETRA, UMTS and IMT-2000:
UMTS Basic architecture, UTRA FDD mode, UTRA TDD mode
5. Satellite Systems: History, Applications, Basics: GEO, LEO, MEO; Routing,
Localization, Handover, Examples
6. Broadcast Systems: Overview, Cyclic repetition of data, Digital audio
broadcasting: Multimedia object transfer protocol; Digital video broadcasting
7. Wireless LAN: Infrared vs. Radio transmission, Infrastructure and Ad hoc Networks,
IEEE 802.11: System architecture, Protocol architecture, Physical layer, Medium access
control layer, MAC management, Future development; HIPERLAN: Protocol
architecture, Physical layer, Channel access control. Sublayer, Medium access control
Sublayer, Information bases And Networking; Bluetooth: User scenarios, Physical layer,
MAC layer, Networking. Security, Link management.
8. Wireless ATM: Motivation for WATM, Wireless ATM working group, WATM
services, Reference model: Example configurations, Generic reference model; Functions:
Wireless mobile terminal side, Mobility supporting network side; Radio access layer:
Requirements, BRAN; Handover: Handover reference model, Handover requirements,
Types of handover, Handover scenarios, Backward handover, Forward handover;
Location management: Requirements for location management, Procedures and
Entities; Addressing, Mobile quality of service, Access point control protocol
Page of 48 8
9. Mobile Network Layer: Mobile IP: Goals, assumptions and requirements, Entities and
Terminology, IP packet delivery, Agent advertisement and discovery, Registration,
Tunneling and Encapsulation , Optimizations, Reverse tunneling, Ipv6; Dynamic host
configuration protocol, Ad hoc networks: Routing, Destination sequence distance
vector, Dynamic source routing, Hierarchical algorithms, Alternative metrics
10. Mobile Transport Layer: Traditional TCP: Congestion control, Slow start, Fast
retransmit/fast recovery, Implications on mobility; Indirect TCP, Snooping TCP,
Mobile TCP, Fast retransmit/fast recovery, Transmission/time-out freezing, Selective
retransmission, Transaction oriented TCP
11. Support for Mobility: File systems: Consistency, Examples; World Wide Web:
Hypertext transfer protocol, Hypertext markup language, Some approaches that might
help wireless access, System architectures; Wireless application protocol: Architecture,
Wireless datagram protocol, Wireless transport layer security, Wireless transaction
protocol, Wireless session protocol, Wireless application environment, Wireless markup
language, WML script, Wireless telephony application, Examples Stacks with Wap,
Mobile databases, Mobile agents
BOOKS
Text Books:
1. Jochen Schiller, “Mobile communications”, Addison wisely , Pearson Education
2. Wiiliam Stallings, “Wireless Communications and Networks”
References :
1. Rappaort, “Wireless Communications Principals and Practices”
2. YI Bing Lin , “Wireless and Mobile Network Architectures”, John Wiley
3. P. Nicopolitidis , “Wireless Networks”, John Wiley
4. K Pahlavan, P. Krishnamurthy , “Principles of Wireless Networks”
5. M. Richharia , “Mobile Satellite Communication: Principles and Trends”, Pearson Education
TERM WORK
2. Term work should consist of at least 10 practical experiments and two assignments
covering the topics of the syllabus.
ORAL EXAMINATION
An oral examination is to be conducted based on the above syllabus.
Page of 48 9
M Sc – Information Technology Year I, Paper II, Term II
Page of 48 10
11. Requirements Definition: User requirements,
e traffic matrix, Capacity planning and Network vision, Design tool, Categories of tools,
Classes of design tool, Components of design projects, Types of design projects.
12. Technology Comparisons: Circuits-message-packet and cell switching methods, Packet
switching service aspects, Generic packet switching network characteristics, Private verses
public networking, Public network service selection, Business aspects of Packet-Frame and
cell switching services, High speed LAN protocols comparisons, Application performance
needs.
13. Access Network Design: Network design layers, Access layer design, Access network
capacity, network topology and hardware, completing the access network design.
14. Backbone Network Design: Backbone requirements, Network capacities, Topologies,
Topologies strategies, Tuning the network.
BOOKS
Text Books:
1. Darren L Spohn, “Data Network Design”, TMH
2. D. Bertsekas, R. Gallager, “Data Networks”, PHI
References:
1. W.R. Stevens, “Unix Network Programming”, Vol.1, Pearson Education
2. J.Walrand, P. Varaiya, “High Performance Communication Networks”, Morgan
Kaufmann
3. Y. Zheng, S. Akhtar, “Networks for Computer Scientists and Engineers”, Oxford
4. A.S. Tanenbaum, “Computer Networks”
5. Peterson & Davie, “Computer Networks”, Harcourt Asia.
6. James D. McCabe , “Practical Computer Analysis and Design”, Harcourt Asia.
TERM WORK
3. Term work should consist of at least 10 practical experiments and two assignments
covering all the topics of the syllabus.
ORAL EXAMINATION
An oral examination is to be conducted based on the above syllabus.
Page of 48 11
M Sc – Information Technology Year I, Paper III, Term I
Page of 48 12
BOOKS
Text Books:
1. R.C.Gonsales R.E.Woods, “Digital Image Processing”, Second Edition, Pearson
Education
2. Anil K. Jain, “Fundamentals of Image Processing”, PHI
References:
1. William Pratt, “Digital Image Processing”, John Wiley
2. S. Harrrington, “Computer Graphics”, McGraw Hill
3. Milan Sonka,Vaclav Hlavac, Roger Boyle, “Image Processing, Analysis, and Machine
Vision” Thomson Learning
3. N Ahmed & K.R. Rao, “Orthogonal Transforms for Digital Signal Processing” Springer
4. B. Chanda, D. Dutta Majumder, “Digital Image Processing and Analysis”, PHI
TERM WORK
4. Term work should consist of at least 10 practical experiments and two assignments
covering the topics of the syllabus.
ORAL EXAMINATION
An oral examination is to be conducted based on the above syllabus.
Page of 48 13
M Sc – Information Technology Year I, Paper III, Term II
SUBJECT: SPEECH RECOGNITION
Lectures: 4 Hrs per week Theory: 100 Marks
Practical: 4 Hrs per week Term work / Practical: 25 Marks
Objectives: Develop an understanding of the relationship of vocal tract shapes and physical
acoustics to the acoustic speech signal. Use a spectrum analyzer to relate the acoustic speech
signal to acoustical processes. Design and implement digital filters to synthesize speech and
code speech at a low bit rate. Implement speech analysis and speech synthesis modules using
object-oriented software programs, using techniques such as class derivation, the use of
software objects as components in a larger software system.
DETAILED SYLLABUS
1. Fundamentals Of Speech Recognition: Introduction, The paradigm for speech
Recognition, out line, Brief history of speech recognition research.
2. The Speech Signal: Production, reception, and Acoustic-phonetic characterization: The
speech production system, Representing speech in time and frequency domains, Speech
Sounds and features, Approaches to automatic speech recognition by machine.
3. Signal Processing And Analysis Methods For Speech Recognition: The bank-of-filters
front-end processor. Linear predictive model for speech recognition, Vector quantization,
Auditory based Spectral analysis model.
4. Pattern Comparison Techniques: Speech detection, Distortion Measures-Mathematical
Considerations, Distortion Measures-Perceptual Considerations, Spectral-Distortion
Measures, Incorporation of spectral dynamic features into distortion measures, Time
Alignment and Normalization.
5. Speech Recognition System Design And Implementation Issues: Application of source
coding techniques to recognition, Template training methods, Performance analysis and
recognition enhancements, Template adoption to new talkers, Discriminative methods in
speech recognition, Speech recognition in adverse environment.
6. Theory And Implementation Of Hidden Markov Models: Discrete time Markov
processes, Extensions to hidden Markov Models, The three basic problems for HMMs,
Types of HMMs, Implementation issues for HMMs, HMM system for isolated word
recognition
7. Speech Recognition Based On Connected Words Models: General notations for the
connected Word-Recognition problem, The two level dynamic programming algorithm,
The level building algorithm, The one pass algorithm, Multiple candidate strings,
Grammar networks for connected digit recognition, Segmental K-Means training
procedure, Connected digit recognition implementation.
8. Large Vocabulary Continuous Speech Recognition.
9. Task Oriented Applications Of Automatic Speech Recognition
BOOKS
Text Books:
1. L. Rabiner and B. Juang, “Fundamentals of Speech Recognition”, Pearson Education.
Page of 48 14
2. L R Rabiner and RW Schafer, “Digital Processing of Speech Signals”, Pearson Education.
References:
1. B. Gold and N. Morgan, “Speech and Audio Signal Processing”, John Wiley.
2. D. Jurafsky and J.H. Martin, “Speech and Language Processing”, Pearson Education.
TERM WORK
5. Term work should consist of at least 10 practical experiments and two assignments
covering the topics of the syllabus.
ORAL EXAMINATION
An oral examination is to be conducted based on the above syllabus.
Page of 48 15
M Sc – Information Technology Year I, Paper IV, Term I
Objectives of the course: The data warehousing part of module aims to give students a good
overview of the ideas and techniques which are behind recent development in the data
warehousing and online analytical processing (OLAP) fields, in terms of data models, query
language, conceptual design methodologies, and storage techniques. Data mining part of the
model aims to motivate, define and characterize data mining as process; to motivate, define
and characterize data mining applications.
Pre-requisites: DBMS
DETAILED SYLLABUS
Data Warehousing:
1. Overview And Concepts: Need for data warehousing, Basic elements of data
warehousing, Trends in data warehousing.
2. Planning And Requirements: Project planning and management, Collecting the
requirements.
3. Architecture And Infrastructure: Architectural components, Infrastructure and
metadata.
4. Data Design And Data Representation: Principles of dimensional modeling,
Dimensional modeling advanced topics, data extraction, transformation and loading,
data quality.
5. Information Access And Delivery: Matching information to classes of users, OLAP
in data warehouse, Data warehousing and the web.
6. Implementation And Maintenance: Physical design process, data warehouse
deployment, growth and maintenance.
Data Mining:
1. Introduction: Basics of data mining, related concepts, Data mining techniques.
2. Data Mining Algorithms: Classification, Clustering, Association rules.
3. Knowledge Discovery : KDD Process
4. Web Mining: Web Content Mining, Web Structure Mining, Web Usage mining.
5. Advanced Topics: Spatial mining, Temporal mining.
6. Visualisation : Data generalization and summarization-based characterization,
Analytical characterization: analysis of attribute relevance, Mining class comparisons:
Discriminating between different classes, Mining descriptive statistical measures in
large databases
7. Data Mining Primitives, Languages, and System Architectures: Data mining
primitives, Query language, Designing GUI based on a data mining query language,
Architectures of data mining systems
8. Application and Trends in Data Mining: Applications, Systems products and
Page of 48 16
research prototypes, Additional themes in data mining, Trends in data mining
BOOKS
Text Books:
1. Paulraj Ponnian, “Data Warehousing Fundamentals”, John Wiley.
2. M.H. Dunham, “Data Mining Introductory and Advanced Topics”, Pearson Education.
3. Han, Kamber, “Data Mining Concepts and Techniques”, Morgan Kaufmann
References:
1. Ralph Kimball, “The Data Warehouse Lifecycle toolkit”, John Wiley.
2. M Berry and G. Linoff, “Mastering Data Mining”, John Wiley.
3. W.H. Inmon, “Building the Data Warehouses”, Wiley Dreamtech.
4. R. Kimpall, “The Data Warehouse Toolkit”, John Wiley.
5. E.G. Mallach, “Decision Support and Data Warehouse systems”, TMH.
TERM WORK
6. Term work should consist of at least 10 practical experiments and two assignments
covering the topics of the syllabus.
ORAL EXAMINATION
An oral examination is to be conducted based on the above syllabus.
Page of 48 17
M Sc – Information Technology Year I, Paper IV, Term II
DETAILED SYLLABUS
1. The Extended Entity Relationship Model and Object Model: The ER model revisited,
Motivation for complex data types, User defined abstract data types and structured types,
Subclasses, Super classes, Inheritance, Specialization and Generalization, Constraints and
characteristics of specialization and Generalization, Relationship types of degree higher
than two.
2. Object-Oriented Databases: Overview of Object-Oriented concepts, Object identity,
Object structure, and type constructors, Encapsulation of operations, Methods, and
Persistence, Type hierarchies and Inheritance, Type extents and queries, Complex objects;
Database schema design for OODBMS; OQL, Persistent programming languages;
OODBMS architecture and storage issues; Transactions and Concurrency control,
Example of ODBMS
3. Object Relational and Extended Relational Databases: Database design for an
ORDBMS - Nested relations and collections; Storage and access methods, Query
processing and Optimization; An overview of SQL3, Implementation issues for extended
type; Systems comparison of RDBMS, OODBMS, ORDBMS
4. Parallel and Distributed Databases and Client-Server Architecture: Architectures for
parallel databases, Parallel query evaluation; Parallelizing individual operations, Sorting,
Joins; Distributed database concepts, Data fragmentation, Replication, and allocation
techniques for distributed database design; Query processing in distributed databases;
Concurrency control and Recovery in distributed databases. An overview of Client-Server
architecture
5. Databases on the Web and Semi Structured Data: Web interfaces to the Web, Overview
of XML; Structure of XML data, Document schema, Querying XML data; Storage of
XML data, XML applications; The semi structured data model, Implementation issues,
Indexes for text data
6. Enhanced Data Models for Advanced Applications: Active database concepts. Temporal
database concepts.; Spatial databases, Concepts and architecture; Deductive databases and
Page of 48 18
Query processing; Mobile databases, Geographic information systems.
BOOKS
Text Books:
1. Elmasri and Navathe, “Fundamentals of Database Systems”, Pearson Education
2. Raghu Ramakrishnan, Johannes Gehrke, “Database Management Systems”, McGraw-Hill
References:
1. Korth, Silberchatz, Sudarshan , “Database System Concepts”, McGraw-Hill.
2. Peter Rob and Coronel, “Database Systems, Design, Implementation and Management”,
Thomson Learning.
3. C.J.Date, Longman, “Introduction To Database Systems”, Pearson Education
TERM WORK
7. Term work should consist of at least 10 practical experiments and two assignments
covering the topics of the syllabus.
ORAL EXAMINATION
An oral examination is to be conducted based on the above syllabus.
Page of 48 19
M Sc – Information Technology Year II
M Sc – Information Technology Year II, Paper I, Term I
SUBJECT: SOFTWARE TESTING
Lectures: 4 Hrs per week Theory: 100 Marks
Objectives To improve your understanding of software testing - its purpose and nature -
and raise your awareness of issues and constraints around testing. To provide a professional
qualification widely recognized by employers, customers and peers. To learn standard
terminology. Discover good sources of information. To provide a complete picture of the
test activities and processes from requirements review to system implementation.
Pre-requisites: Software Engineering, OOAD
DETAILED SYLLABUS
1. Introduction: Defect, Defect Vs failures, Process problems and defect rates, The
business perspective for testing
2. Building a Software Testing Strategy: Computer system strategic risk, Economics of
testing, Common computer problems, Economics of SDLC testing, Testing- an
organizational issue, Establishing a testing policy, Structured approach to testing, Test
strategy, Testing methodology
3. Establishing a Software Testing Methodology: Introduction, Verification and
validation, Functional and structural testing, Workbench concept, Considerations in
developing testing methodologies
4. Determining Software Testing Techniques: Testing techniques/tool selection process,
Selecting techniques/tools, Structural system testing techniques, Functional system
testing techniques, Unit testing techniques, Functional testing and analysis
5. Selecting and Installing Software Testing Tools: Testing tools-Hammers of testing,
Selecting and using the test tools, Appointing managers for testing tools
6. Software Testing Process: Cost of computer testing, Life cycle testing concept,
Verification and validation in the software development process, Software testing
process, Workbench skills
7. Software Testing Process: Access Project Management Development Estimate and
Status, Test Plan, Requirements Phase Testing, Design Phase Testing, Program Phase
Testing, Execute Test and Record Results, Acceptance Test, Report Test Result,
Testing Software Installation, Test Software Change, Evaluate Test Effectiveness
8. Testing Specialized Systems and Applications: Client/Server systems, RAD, System
documentation, Web based systems, Off-the-self software, Multi platform environment,
Security, Data Warehouse
9. Building Test Document: Uses, Types, Responsibility, Storage, Test plan
documentation, Test analysis report documentation
Books
Text Books:
1. W.E. Perry, “Effective Methods for Software Testing”, John Wiley.
2. Kaner C., Nguyen H., Falk J., “Testing Computer Software”, John Wiley.
References :
1. Boris Beizer, “Software Testing Techniques”, Dreamtech
2. Louise Tamres, “Introducing Software Testing”, Pearson Education.
Page of 48 20
Assignments: 10 assignments covering the syllabus has to be submitted
Page of 48 21
M Sc – Information Technology Year II, Paper I, Term II
SUBJECT: INFORMATION SECURITY
Lectures: 4 Hrs per week Theory: 100 Marks
Objectives of the course: Learn about the threats in computer security. Understand what
puts you at a risk and how to control it. Controlling a risk is not eliminating the risk but to
bring it to a tolerable level.
Pre-requisites: Computer Networks, Operating system.
DETAILED SYLLABUS
1. Introduction: Security, Attacks, Computer criminals, Method of defense
2. Program Security: Secure programs, Non-malicious program errors, Viruses and other
malicious code, Targeted malicious code, Controls against program threats
3. Operating System Security: Protected objects and methods of protection, Memory
address protection, Control of access to general objects, File protection mechanism,
Authentication: Authentication basics, Password, Challenge-response, Biometrics.
4. Database Security: Security requirements, Reliability and integrity, Sensitive data,
Interface, Multilevel database, Proposals for multilevel security
5. Security in Networks: Threats in networks, Network security control, Firewalls,
Intrusion detection systems, Secure e-mail, Networks and cryptography, Example
protocols: PEM, SSL, IPsec
6. Administrating Security: Security planning, Risk analysis, Organizational security
policies, Physical security.
7. Legal, Privacy, and Ethical Issues in Computer Security: Protecting programs and
data, Information and law, Rights of employees and employers, Software failures,
Computer crime, Privacy, Ethical issues in computer society, Case studies of ethics
Books
Text Books:
1. C. P. Pfleeger, and S. L. Pfleeger, “Security in Computing”, Pearson Education.
2. Matt Bishop, “Computer Security: Art and Science”, Pearson Education.
References :
1. Stallings, “Cryptography And Network Security: Principles and practice”
2. Kaufman, Perlman, Speciner, “Network Security”
3. Eric Maiwald, “Network Security : A Beginner’s Guide”, TMH
4. Macro Pistoia, “Java Network Security “, Pearson Education
5. Whitman, Mattord, “Principles of information security”, Thomson
Assignments: 10 assignments covering the syllabus has to be submitted
Page of 48 22
M Sc – Information Technology Year II, Paper II, Term I
SUBJECT: Artificial Intelligence
Lectures: 4 Hrs per week Theory: 100 Marks
2. Genetic Algorithms
A simple genetic algorithm, A simulation by hands, similarity templates(Schemata),
Mathematical foundations, Schema Processing at work, The two- armed and k-armed
Bandit Problem, The building block hypothesis, The minimal Deceptive Problem
Computer implementation of Genetic algorithm, Data Structures, Reproduction , Cross over
and Mutation, Time to reproduce and time to Cross Mapping objective function to fitness
form, Fitness scaling
Applications of genetic algorithm, De Jong and Function Optimization, Improvement in
basic techniques, Introduction to Genetics based machine learning, applications of genetic
based machine leaning
3. Data Mining
Introduction to Data Mining, Computer systems that can learn, Machine learning and
methodology of science, Concept learning, Data ware house, designing decision support
systems, Client server and data warehousing, Knowledge Discovery Process, Visualization
Page of 48 23
Techniques, K- nearest neighbor, Decision trees, OLAP tools, Neural networks, Genetic
algorithm, Setting up a KDD environment, Real life applications, Customer profiling,
Discovering foreign key relationships
Assignments
10 assignments covering the syllabus has to be submitted
Text book
Page of 48 24
M Sc – Information Technology Year II, Paper II, Term II
SUBJECT: ROBOTICS
Lectures: 4 Hrs per week Theory: 100 Marks
Objective: The goal of the course is to familiarize the students with the concepts and
techniques in robot manipulator control, enough to evaluate, chose, and incorporate robots in
engineering systems.
Pre-requisite: Exposure to linear algebra and matrix operations. Exposure to programming in
a high level language
DETAILED SYLLABUS
1. Robotic Manipulation: Automation and Robots, Classification, Application,
Specification, Notations.
2. Direct Kinematics: Dot and cross products, Co-ordinate frames, Rotations,
Homogeneous, Co-ordinates, Link co-ordination arm equation, (Five-axis robot, Four
axis robot, Six axis robot).
3. Inverse Kinematics: General properties of solutions tool configuration Five axis robots,
Three-Four axis, Six axis robot (Inverse kinematics).
4. Workspace analysis and trajectory planning work envelop and examples, workspace
fixtures, Pick and place operations, Continuous path motion, Interpolated motion,
Straight-line motion.
5. Robot Vision: Image representation, Template matching, Polyhedral objects, Shane
analysis, Segmentation (Thresholding, region labeling, Shrink operators, Swell operators,
Euler numbers, Perspective transformation, Structured Illumination, Camera calibration).
6. Task Planning: Task level programming, Uncertainty, Configuration, Space, Gross
motion, Planning, Grasp planning, Fine-motion Planning, Simulation of Planer motion,
Source and goal scenes, Task planner simulation.
7. Moments of Inertia.
8. Principles of NC and CNC Machines.
BOOKS
Text Books:
1. Robert Shilling, “Fundamentals of Robotics-Analysis and control”, PHI.
2. Fu, Gonzales and Lee, “Robotics”, McGraw Hill
3. J.J, Craig, “Introduction to Robotics”, Pearson Education
References:
1. Staughard, “Robotics and AI”, PHI.
2. Grover, Wiess, Nagel, Oderey, “Industrial Robotics”, McGraw Hill
3. Walfram Stdder, “Robotics and Mecatronics”, TMH.
4. Niku, “Introduction to Robotics”, Pearson Education
5. Klafter, Chmielewski, Negin, “Robot Engineering”, PHI
6. Mittal, Nagrath, “Robotics and Control”, TMH
Page of 48 25
Assignments: 10 assignments covering the syllabus has to be submitted
Page of 48 26
M Sc – Information Technology Year II, Elective I, Term I
Page of 48 27
2. Wilson G.V., “Practical Parallel Programming”, PHI
3. D. E. Culler, J.P. Singh, A. Gupta, “Parallel Computer Architecture”, Morgan Kaufman
TERM WORK
8. Term work should consist of at least 10 practical experiments and two assignments
covering the topics of the syllabus.
ORAL EXAMINATION
An oral examination is to be conducted based on the above syllabus.
Page of 48 28
M Sc – Information Technology Year II, Elective I, Term II
Objective: This course aims to build concepts regarding the fundamental principles of
distributed systems. The design issues and distributed operating system concepts are covered.
Pre-requisites: Operating Systems and Computer Networks
DETAILED SYLLABUS
1. Introduction to Distributed System: Goals, Hardware concepts, Software concepts, and
Client-Server model. Examples of distributed systems.
2. Communication: Layered protocols, Remote procedures call, Remote object invocation,
Message-oriented communication, Stream-oriented communication.
3. Processes: Threads, Clients, Servers, Code Migration, Software agent.
4. Naming: Naming entities, Locating mobile entities, Removing un-referenced entities.
5. Synchronization: Clock synchronization, Logical clocks, Global state, Election
algorithms, Mutual exclusion, Distributed transactions.
6. Consistency and Replication: Introduction, Data centric consistency models, Client
centric consistency models, Distribution protocols, Consistency protocols.
7. Fault Tolerance: Introduction, Process resilience, Reliable client server communication,
Reliable group communication. Distributed commit, Recovery.
8. Security: Introduction, Secure channels, Access control, Security management.
9. Distributed File System: Sun network file system, CODA files system.
10. Case Study: CORBA, Distributed COM, Globe, Comparison of CORBA, DCOM, and
Globe.
BOOKS
Text Books:
1. A. Taunenbaum, “Distributed Systems: Principles and Paradigms”
2. G. Coulouris, J. Dollimore, and T. Kindberg, “Distributed Systems: Concepts and Design”,
Pearson Education
References:
1. M. Singhal, N. Shivaratri, “Advanced Concepts in Operating Systems”, TMH
TERM WORK
9. Term work should consist of at least 10 practical experiments and two assignments
covering the topics of the syllabus.
ORAL EXAMINATION
An oral examination is to be conducted based on the above syllabus.
Page of 48 29
M Sc – Information Technology Year II, Elective I, Term I
BOOKS
Text Books:
1. Struart Russell and Peter Norvig, “Artificial Intelligence: A Modern Approach”
2. George F.Luger, “Artificial Intelligence: Structures and Strategies for Complex Problem Solving”,
Pearson Education
References:
1. Nils J. Nillson, “Artificial Intelligence: A New Synthesis”, Harcourt Asia
Page of 48 30
2. Elaine Rich and Kevin Knight, “Artificial Intelligence”, TMH
3. Patrick Winston, “Artificial Intelligence”, Pearson Education
4. Ivan Brakto, “Prolog Programming for Artificial Intelligence”, Pearson Education
5. Efraim Turban Jay E.Aronson, “Decision Support Systems and Intelligent Systems”
6. Ed. M. Sasikumar and Others, “Artificial Intelligence : Theory and Practice” Proceedings of
the International Conference KBCS-2002, Vikas Publishing House
TERM WORK
10. Term work should consist of at least 10 practical experiments and two assignments
covering the topics of the syllabus.
ORAL EXAMINATION
An oral examination is to be conducted based on the above syllabus.
Page of 48 31
M Sc – Information Technology Year II, Elective I, Term II
Page of 48 32
ORAL EXAMINATION
An oral examination is to be conducted based on the above syllabus.
Page of 48 33
M Sc – Information Technology Year II, Elective I, Term I
Page of 48 34
5. S Sallivahanan, “Digital Signal Processing”, TMH.
6. Ashok Ambardar, “Analog and Digital Signal Processing”, Thompson Learning.
TERM WORK
12. Term work should consist of at least 10 practical experiments and two assignments
covering the topics of the syllabus.
ORAL EXAMINATION
An oral examination is to be conducted based on the above syllabus.
Page of 48 35
M Sc – Information Technology Year II, Elective I, Term I
Page of 48 36
LAN Wiring, Physical Topology, and Interface Hardware
Speeds of LANs and Computers, Network Interface Hardware, the Connection between A
NIC and A Network, Original Thick Ethernet Wiring, Connection Multiplexing, Thin
Ethernet Wiring
Twisted Pair Ethernet, the Topology Paradox, Network Interface Cards and Wiring
Schemes,
Extending LANs: Fiber Modems, Repeaters, Bridges and Switches
Distance Limitation and LAN Design, Fiber Optic Extensions, Repeaters, Bridges, Frame
Filtering
Startup and Steady State Behavior of Bridged Networks, Planning a Bridged Network,
Bridging Between Buildings, Bridging Across Longer Distances, A Cycle Of Bridges,
Distributed Spanning Tree, Switching, Combining Switches And Hubs, Bridging And
Switching With Other Technologies
Long-Distance Digital Connection Technologies
Digital Telephony, Synchronous Communication, Digital Circuits and DSU, Telephone
Standards
DS Terminology and Data Rates, Lower Capacity Circuits, Intermediate Capacity Digital
Circuits
Highest Capacity Circuits, Optical Carrier Standards, the C Suffix, Synchronous Optical
Network (SONET), the Local Subscriber Loop, ISDN, Asymmetric Digital Subscriber Line
Technology
Other DSL Technologies, Cable Modem Technology, Upstream Communication, Hybrid
Fiber Coax
Wan Technologies and Routing
Large Networks and Wide Areas, Packet Switches, Forming A WAN, Store and Forward
Physical Addressing In A WAN, Next-Hop Forwarding, Source Independence, Relationship
of Hierarchical Addresses to Routing, Routing In A WAN, Use of Defaults Routes, Routing
Table Computation, Shortest Path Computation in a Graph, Distributed Route
Computation, Distance Vector Routing
Network Ownership, Service Paradigm, and Performance
Network Ownership, Virtual Private Networks, Service Paradigm, Connection Duration and
Persistence, Examples of Service Paradigms, Addresses and Connection Identifiers,
Network Performance Characteristics
Protocols and Layering
The Need for Protocols, Protocol Suites, A Plan for Protocol Design, the Seven Layers,
Stacks: Layered Software, How Layered Software Works, Multiple, Nested Headers, the
Scientific Basis for Layering,
TERM WORK
Term work should consist of at least 10 assignments from the aforementioned topics. A
Seminar to be presented by each student as part of term works carrying 15 marks.
REFERENCE
Computer Network, Tuekeun, PHI
Networking Technology, Jaiswal, Galgotia.
Data Networking, Bertsekas, PHI
Computer Networks and Internets, Douglas E. Comer Pearson Education Asia
Page of 48 37
M Sc – Information Technology Year II, Elective II, Term I
Page of 48 38
TERM WORK
13. Term work should consist of at least 10 practical experiments and two assignments
covering the topics of the syllabus.
ORAL EXAMINATION
An oral examination is to be conducted based on the above syllabus.
Page of 48 39
M Sc – Information Technology Year II, Elective II, Term II
Page of 48 40
TERM WORK
14. Term work should consist of at least 10 practical experiments and two assignments
covering the topics of the syllabus.
ORAL EXAMINATION
An oral examination is to be conducted based on the above syllabus.
Page of 48 41
M Sc – Information Technology Year II, Elective II, Term I
SUBJECT: SYSTEM SECURITY
Lectures: 4 Hrs per week Theory: 100 Marks
Practical: 4 Hrs per week Term work/Practical: 50 Marks
Objectives of the course: Learn about the threats in computer security. Understand what
puts you at a risk and how to control it. Controlling a risk is not eliminating the risk but to
bring it to a tolerable level.
Pre-requisites: Computer Networks, Operating system.
DETAILED SYLLABUS
8. Introduction: Security, Attacks, Computer criminals, Method of defense
9. Cryptography: Basic Cryptography: Classical Cryptosystems, Public key
Cryptography, Cryptographic checksum, Key Management: Key exchange, Key
generation, Cryptographic key infrastructure, Storing and revoking keys, Hash
algorithm, Digital signature, Cipher Techniques: Problems, Stream and block ciphers:
AES, DES, RC4.
10. Program Security: Secure programs, Non-malicious program errors, Viruses and other
malicious code, Targeted malicious code, Controls against program threats
11. Operating System Security: Protected objects and methods of protection, Memory
address protection, Control of access to general objects, File protection mechanism,
Authentication: Authentication basics, Password, Challenge-response, Biometrics.
12. Database Security: Security requirements, Reliability and integrity, Sensitive data,
Interface, Multilevel database, Proposals for multilevel security
13. Security in Networks: Threats in networks, Network security control, Firewalls,
Intrusion detection systems, Secure e-mail, Networks and cryptography, Example
protocols: PEM, SSL, IPsec
14. Administrating Security: Security planning, Risk analysis, Organizational security
policies, Physical security.
15. Legal, Privacy, and Ethical Issues in Computer Security: Protecting programs and
data, Information and law, Rights of employees and employers, Software failures,
Computer crime, Privacy, Ethical issues in computer society, Case studies of ethics
Books
Text Books:
3. Stallings, “Cryptography And Network Security: Principles and practice”
4. C. P. Pfleeger, and S. L. Pfleeger, “Security in Computing”, Pearson Education.
5. Matt Bishop, “Computer Security: Art and Science”, Pearson Education.
References :
6. Kaufman, Perlman, Speciner, “Network Security”
7. Eric Maiwald, “Network Security : A Beginner’s Guide”, TMH
8. Bruce Schneier, “Applied Cryptography”, John Wiley.
9. Macro Pistoia, “Java network security “, Pearson Education
10. Whitman, Mattord, “Principles of information security”, Thomson
Page of 48 42
TERM WORK
15. Term work should consist of at least 10 practical experiments and two assignments
covering the topics of the syllabus.
ORAL EXAMINATION
An oral examination is to be conducted based on the above syllabus.
Page of 48 43
M Sc – Information Technology Year II, Elective II, Term II
Subject: Virtual Reality and Virtual Environment
Lectures: 4 Hrs per week Theory: 100 Marks
Practical: 4 Hrs per week Term work/Practical: 50 Marks
Real time computer graphics, Flight simulation, virtual environment, Benefits of virtual
reality, Evolution of Virtual Reality, Historical perspective, scientific land marks
3D Computer graphics
The virtual world space, positioning the virtual observer, the perspective projection, Human
vision, Stereo perspective projection, 3D clipping, colour theory, simple 3D modelling,
illumination models, shading algorithms, radiosity, hiddensurface removal, realism,
stereographic images
Geometric modelling
From 2D to 3D, 3D space curves, 3D boundary representation,
Geometrical Transformations
Frames of reference, Modelling transformations, instances, picking flying, Scaling the VE,
Collision detection
A generic VR Systems
The virtual Environment, The computer environment, VR Technology, Modes of
Interaction, VR systems
Animating the Virtual Environment
Dynamics of numbers, the animation of objects, shape and object inbetweening, free-form
deformation, particle systems
Physical Simulation
Objects falling in a gravitational field, rotating wheels, Elastic collisions, Projectiles, simple
pendulums, springs, flight dynamics of an aircraft
Human factors
The eye, The ear, the somatic senses, Equilibrium
Virtual Reality Hardware
Sensor hardware, Head-coupled displays, Acoustic hardware, Integrated VR Systems
Virtual Reality Software
Modelling Virtual worlds, Physical simulation, VR tool kits
Virtual Reality Applications
Engineering, Entertainment, science, Education, training
Future
Virtual Environment, Modes of Interaction
Text Books
Virtual Reality Systems John Vince- Pearson Education Asia
Page of 48 44
M Sc – Information Technology Year II, Elective III, Term I
Subject: Multimedia systems and convergence of technologies
Lectures: 4 Hrs per week Theory: 100 Marks
Practical: 4 Hrs per week Term work/Practical: 50 Marks
Page of 48 45
Quick time Movie File Format, QMFI, MHEG (Multimedia and Hypermedia Information
Encoding Expert Group), Format Function and representation, Track model and Object
model, Real Time Interchange
Multimedia conferencing
Teleconferencing Systems, Requirements of Multimedia Communications, Shared
Application Architecture and embedded Distributed objects, Multimedia Conferencing
Architecture
Multimedia Groupware
Computer and Video fusion approach to open shared wok place, High Definition Television
and desktop computing, HDTV standards, Knowledge based Multimedia systems, Anatomy
of an Intelligent Multimedia system
Text Book
Multimedia Systems by John F. Koegel Buford- Pearson Education
Page of 48 46
M Sc – Information Technology Year II, Elective II, Term I
SUBJECT: Java Technology
Lectures: 4 Hrs per week Theory: 100 Marks
Practical: 4 Hrs per week Term work/Practical: 50 Marks
Java Programming
Object oriented programming revisited, JDK, Java Virtual machine-Platform independent-
portability-scalability Operators and expressions-decision making, branching, looping,
Classes, Objects and methods, Arrays Strings and Vectors, Interfaces, Packages, Multi-
Threading, managing errors and exceptions, Applet programming, Managing files and
streams
Java Technology for Active Web Documents
An Early Form of Continuous Update, Active Documents and Server Overhead, Active
Document Representation and Translation, Java Technology, the Java Run-Time
Environment, The Java Library
A Graphics Toolkit, Using Java Graphics on a Particular Computer, Java Interpreters and
Browsers
Compiling a Java Program, Invoking an Applet, Example of Interaction with a Browser
RPC and Middleware
Programming Clients and Servers, Remote Procedure Call Paradigm, RPC Paradigm,
Communication Stubs, External Data Representation, Middleware and Object-Oriented
Middleware
Network Management (SNMP)
Managing an Internet, The Danger of Hidden Features, Network Management Software,
Clients, Servers, Managers and Agents, Simple Network Management Protocol, Fetch-Store
Paradigm, The MIP and Object Names, The Variety of MIB Variables, MIB variables that
correspond to arrays
Java technologies
Graphics, JFC-JAVA foundation classes, swing, images, java 2d graphics,
internationalization, Communication and Networking, TCP Sockets, UDP Sockets, java.net,
java security, Object serialization, Remote method serialization, JDBC: Java Data Base
Connectivity, Java beans, Java interface to CORBA, JAVA- COM Integration, Java Media
Framework, commerce and java wallet, Data structures and java utilities, JavaScript,
Servelets
TERM WORK
Term work should consist of at least 06 assignments including debugged java source code for
the applications from the aforementioned topics. A Seminar to be presented by each student
as part of term work carrying 15 marks.
REFERENCE
Using JAVA 2, Joseph L weber, PHI
JAVA 2 complete, Sybex, BPB
Java2 The complete Reference, Patrick Naughton, T M H
Computing concepts With JAVA2, Cay Horstmann, WILEY
Page of 48 47
JSP Java Server Pages, Barry Burd, IDG Books India(p) Ltd
Java2 Programming Bible, Aaron Walsh, IDG Books India(p) Ltd
Java2, swing, servlets, JDBC & JAVA Beans Programming Black Book Steven Holzner
dreamtech press
Page of 48 48