MCS-2024-2025
MCS-2024-2025
Rewarding Co-creations: Active collaboration with national & international industries &
universities for productivity and economic development.
Service to Society: Service to the region and world through knowledge andcompassion.
To offer computing education programs with the goal that the students become
technically competent and develop lifelong learning skill.
PO_03: Having an ability to design a component or a product applying all the relevant
standards and with realistic constraints, including public health, safety, culture, society and
environment
PO_04: Having an ability to design and conduct experiments, as well as to analyze and interpret
data, and synthesis of information
PO_05: Having an ability to use techniques, skills, resources and modern engineering and IT
tools necessary for engineering practice
PO_06: Having problem solving ability- to assess social issues (societal, health, safety,
legal and cultural) and engineering problems
PO_07: Having adaptive thinking and adaptability in relation to environmental context and
sustainable development
PO_11: Having a good cognitive load management skills related to project management and
finance
M. Tech Computer Science and Engineering
APO_02: Having Sense-Making Skills of creating unique insights in what is being seen or
3. Ability to bring out the capabilities for research and development in contemporary issues
and to exhibit the outcomes as technical report.
M.Tech Computer Science and Engineering
5 SE - Skill Enhancement 5 5
Total Credits 70
Discipline Core
sl.no Course Code Course Title Course Type Ver L T P J Credits
sio
n
1 MCSE501L Data Structures and Algorithms Theory Only 1.0 3 0 0 0 3.0
2 MCSE501P Data Structures and Algorithms Lab Lab Only 1.0 0 0 2 0 1.0
3 MCSE502L Design and Analysis of Algorithms Theory Only 1.0 3 0 0 0 3.0
4 MCSE502P Design and Analysis of Algorithms Lab Lab Only 1.0 0 0 2 0 1.0
5 MCSE503L Computer Architecture and Organisation Theory Only 1.0 3 0 0 0 3.0
6 MCSE503P Computer Architecture and Organisation Lab Lab Only 1.0 0 0 2 0 1.0
7 MCSE504L Operating Systems Theory Only 1.0 3 0 0 0 3.0
8 MCSE504P Operating Systems Lab Lab Only 1.0 0 0 2 0 1.0
9 MCSE505L Computer Networks Theory Only 1.0 3 0 0 0 3.0
10 MCSE505P Computer Networks Lab Lab Only 1.0 0 0 2 0 1.0
Discipline Elective
sl.no Course Code Course Title Course Type Ver L T P J Credits
sio
n
1 MCSE601L Artificial Intelligence Theory Only 1.0 3 0 0 0 3.0
2 MCSE602L Machine Learning Theory Only 1.0 2 0 0 0 2.0
3 MCSE602P Machine Learning Lab Lab Only 1.0 0 0 2 0 1.0
4 MCSE603L Deep Learning Theory Only 1.0 2 0 0 0 2.0
5 MCSE603P Deep Learning Lab Lab Only 1.0 0 0 2 0 1.0
6 MCSE604L Speech and Natural Language Processing Theory Only 1.0 3 0 0 0 3.0
15 MCSE610P Penetration Testing and Vulnerability Assessment Lab Lab Only 1.0 0 0 2 0 1.0
16 MCSE611L Malware Analysis Theory Only 1.0 2 0 0 0 2.0
17 MCSE611P Malware Analysis Lab Lab Only 1.0 0 0 2 0 1.0
21 MCSE614P Big Data Frameworks and Technologies Lab Lab Only 1.0 0 0 2 0 1.0
22 MCSE615L Data Analytics Theory Only 1.0 2 0 0 0 2.0
23 MCSE615P Data Analytics Lab Lab Only 1.0 0 0 2 0 1.0
24 MCSE616L Data Visualization Theory Only 1.0 2 0 0 0 2.0
25 MCSE616P Data Visualization Lab Lab Only 1.0 0 0 2 0 1.0
26 MCSE617L Domain Specific Predictive Analytics Theory Only 1.0 2 0 0 0 2.0
27 MCSE617P Domain Specific Predictive Analytics Lab Lab Only 1.0 0 0 2 0 1.0
28 MCSE618L Social Network Analytics Theory Only 1.0 2 0 0 0 2.0
29 MCSE618P Social Network Analytics Lab Lab Only 1.0 0 0 2 0 1.0
30 MCSE619L Text and Speech Analytics Theory Only 1.0 2 0 0 0 2.0
31 MCSE619P Text and Speech Analytics Lab Lab Only 1.0 0 0 2 0 1.0
32 MCSE620L Analytics for Internet of Things Theory Only 1.0 2 0 0 0 2.0
33 MCSE620P Analytics for Internet of Things Lab Lab Only 1.0 0 0 2 0 1.0
34 MCSE621L Control Engineering Theory Only 1.0 3 0 0 0 3.0
35 MCSE621P Control Engineering Lab Lab Only 1.0 0 0 2 0 1.0
Open Elective
sl.no Course Code Course Title Course Type Ver L T P J Credits
sio
n
1 MFRE501L Francais Fonctionnel Theory Only 1.0 3 0 0 0 3.0
Skill Enhancement
sl.no Course Code Course Title Course Type Ver L T P J Credits
sio
n
1 MENG501P Technical Report Writing Lab Only 1.0 0 0 4 0 2.0
2 MSTS501P Qualitative Skills Practice Soft Skill 1.0 0 0 3 0 1.5
3 MSTS502P Quantitative Skills Practice Soft Skill 1.0 0 0 3 0 1.5
Item 67/28 - Annexure - 32
Course Outcomes
1. Understand and analyze the space and time complexity of the algorithms.
2. Identification of suitable data structure for a given problem.
3. Implementation of graph algorithms in various real-life applications.
4. Implementation of heaps and trees for querying and searching.
5. Use of basic data structures in advanced data structure operations.
6. Use of searching and sorting in various real-life applications.
Indicative Experiments
1. Analyzing the complexity of iterative and recursive algorithms
2. Implement Linear data structures (Stacks, Queues, Linked Lists)
3. Linear time sorting techniques
4. Interpolation search & Exponential search
5. Binary tree & Tree traversals
6. B-trees & B+ trees
7. Advanced Trees: 2-3 tree, splay tree, red black tree etc.
8. Advanced Trees: Threaded Binary trees, tournament trees
9. Graph traversals (BFS, DFS, Topological sorting)
10. Determining the Shortest path between pair of nodes in the given graph
11. Minimum Spanning trees- reverse delete & Boruvka’s algorithm
12. Heaps & Hashing
Total Laboratory Hours 30 hours
Text Book(s)
1. Cormen, Thomas H., Charles E. Leiserson, Ronald L. Rivest, and Clifford
Stein. Introduction to algorithms. MIT press, 2022.
Reference Books
1. Skiena, Steven S. "The Algorithm Design Manual (Texts in Computer Science)." 3rd
edition, 2020, Springer.
2. Brass, Peter. Advanced data structures. Vol. 193. Cambridge: Cambridge University
Press, 2008.
Mode of Evaluation: CAT / Mid-Term Lab/ FAT
Course Outcomes
On completion of this course, student should be able to:
1. Apply knowledge of computing and mathematics to algorithm design.
2. Apply various algorithm paradigms to solve scientific and real-life problems.
3. Demonstrate the string matching and network flow algorithms relating to real-life
problems.
4. Understand and apply geometric algorithms.
5. Apply linear optimization techniques to various real-world linear optimization
problems.
6. Explain the hardness of real-world problems with respect to algorithmic design.
Text Book(s)
1. Cormen, Thomas H., Charles E. Leiserson, Ronald L. Rivest, and Clifford
Stein. Introduction to algorithms. MIT press, 2022.
Reference Books
1. Rajeev Motwani, Prabhakar Raghavan; “Randomized Algorithms, Cambridge University
Press, 1995 (Online Print — 2013).
2. Ravindra K. Ahuja, Thomas L. Magnanti, and James B. Orlin, Network Flows: Theory,
Algorithms, and Applications, 1st Edition, Pearson Education, 2014.
3. Jon Kleinberg and EvaTardos, Algorithm Design, Pearson Education, 1“Edition, 2014.
Mode of Evaluation: CAT / Written Assignment / Quiz / FAT
Indicative Experiments
1. Greedy Strategy : Graph Coloring Problem, Job Sequencing Problem with Deadlines
2. Divide and Conquer : Karatsuba's fast multiplication method, the Strassen algorithm for
matrix multiplication
3. Dynamic Programming: Matrix Chain Multiplication, Longest Common Subsequence,
0-1 Knapsack
4. Backtracking: N-queens, Subset sum
5. Branch and Bound: Job selection
6. String Matching Algorithms: Rabin Karp Algorithm, KMP Algorithm
7. Network Flows : Ford -Fulkerson and Edmond – Karp, Cycle cancelling algorithm
8. Minimum Cost flows – Cycle Cancelling Algorithm
3 Jon Kleinberg and EvaTardos, Algorithm Design, Pearson Education, 1“Edition, 2014.
Mode of Evaluation: CAT / Mid-Term Lab/ FAT
Course Outcomes
1. Outline the developments in the evolution of computer architectures and parallel
programming paradigms
2. Comprehend the various programming languages and libraries for parallel computing
platforms
3. Use of profiling tools to analyze the performance of applications by interpreting the
given data
4. Evaluate efficiency trade-offs among alternative parallel computing architectures for
an efficient parallel application design
5. Develop parallel programs using OpenMP and CUDA and analyze performance
parameters such as speed-up, and efficiency for parallel programs against serial
programs
techniques
Module:8 Contemporary Issues 1 hours
Text Book(s)
1. William Stallings, Computer Organization and Architecture: Designing for
Performance, Pearson, 2022, 11th Edition, Pearson
2 Gerassimos Barlas, Multicore and GPU Programming: An Integrated Approach,
2022, 2nd edition, Morgan Kaufmann
Reference Books
1. J.L. Hennessy and D.A. Patterson. Computer Architecture: A Quantitative Approach. 5th
Edition, 2012, Morgan Kauffmann Publishers.
2. Shameem Akhter, Jason Roberts, Multi-core Programming: Increasing Performance
Through Software Multi-threading, 2010, Intel Press, BPB Publications
Mode of Evaluation: CAT / Written Assignment / Quiz / FAT
Recommended by Board of Studies 26-07-2022
Approved by Academic Council No. 67 Date 08-08-2022
Indicative Experiments
12. Write a CUDA C program for Matrix addition and Multiplication using Shared memory
Total Laboratory Hours 30 hours
Text Book(s)
1. Gerassimos Barlas, Multicore and GPU Programming: An Integrated Approach,
2022, 2nd edition, Morgan Kaufmann
Reference Books
1. Shameem Akhter, Jason Roberts, Multi-core Programming: Increasing Performance
Through Software Multi-threading, 2010, Intel Press, BPB Publications
Mode of Evaluation: CAT / Mid-Term Lab/ FAT
Course Outcomes
1. Understand the fundamental operating system abstractions, including processes,
threads, semaphores, and file systems.
2. Implement scheduling, devising and addressing synchronization issues.
3. Gain an understanding of memory management tasks.
4. Develop real-time working prototypes of different small-scale and medium-scale
embedded systems.
5. Comprehend the basics of virtualization and differentiate types of virtualization.
Text Book(s)
1. Abraham Silberschatz, Peter B. Galvin, Greg Gagne, “Operating System Concepts”,
2018, 10th Edition, Wiley, United States.
Reference Books
1. Arpaci-Dusseau, R. H., & Arpaci-Dusseau, A. C, “Operating Systems: Three easy
pieces, 2018, 1st Edition, Boston: Arpaci-Dusseau Books LLC.
2. Kamal, R, Embedded Systems: Architecture, Programming and Design, 2011, 1st
Edition, Tata McGraw-Hill Education.
3. Portnoy, M, “Virtualization Essentials”, 2012, 2nd Edition, John Wiley & Sons, New
Jersey, USA.
Mode of Evaluation: CAT / Written Assignment / Quiz / FAT
Recommended by Board of Studies 26-07-2022
Approved by Academic Council No.67 Date 08-08-2022
Course Outcome
Indicative Experiments
Reference Books
1. Stevens, W. R., & Rago, S. A. (2013). Advanced Programming in the UNIX
Environment: Advanc Progra UNIX Envir_p3. Addison-Wesley.
2. Love, Robert, “Linux System Programming: talking directly to the kernel and C library”,
2013, 2nd Edition, O’Reilly Media, Inc, United States.
Mode of Evaluation: CAT / Mid-Term Lab/ FAT
Course Outcomes
1. Explore the basics of Computer Networks and various performance metrics.
2. Interpret the application layer services and their protocols.
3. Evaluate the requirements for reliable services and implications of congestion at the
transport layer services.
4. Analyse various functionalities required in the control and data plane at network layer
services.
5. Infer the characteristics of wireless as well as mobile networks and their security
standards.
Text Book(s)
1. James F. Kurose, Keith W. Ross, “Computer Networking: A Top-Down Approach”,
2022, 8th Edition(Paperback), Pearson, United Kingdom.
Reference Books
1. Larry Peterson and Bruce Davie, “Computer Networks: A Systems Approach”, 2019, 6th
Edition, Morgan Kaufmann, United States of America.
2. Andrew S. Tanenbaum, “Computer Networks”, 2013, 6th Edition, Pearson, Singapore.
Mode of Evaluation: CAT / Written Assignment / Quiz / FAT
Indicative Experiments
1. Hardware Demo(Demo session of all networking hardware and Functionalities)
OS Commands(Network configuration commands )
2. Error detection and correction mechanisms
Flow control mechanisms
3. IP addressing Classless addressing
4. Network Packet Analysis using Wireshark
i. Packet Capture Using Wire shark
ii. Starting Wire shark
iii. Viewing Captured Traffic
iv. Analysis and Statistics & Filters.
Reference Books
1. James F. Kuross, Keith W. Ross, “Computer Networking, A Top-Down Approach”,
8thEdition( Paperback), Pearson Education, 2022.
Mode of Evaluation: CAT / Mid-Term Lab/ FAT
Course Outcomes
On completion of this course, students must be able to
1. Design and implement a database depending on the business requirements,
considering various design issues
2. Understand the concepts of Indexing, Query optimization, transaction management,
concurrency control, and recovery mechanisms
3. Learn to apply parallel and distributed databases in Real-time scenarios
4. Categorize and design the structured, semi-structured, and unstructured databases
5. Characterize the database threats and their countermeasures
Text Book(s)
1 Abraham Silberschatz, Henry F. Korth, and S. Sudharsan, “Database System
Concepts”, 7h Edition, McGraw Hill, 2019.
2 R. Elmasri and S. Navathe, Fundamentals of Database Systems, 7th Edition, Addison-
Wesley, 2016
Reference Books
1 Fawcett, Joe, Danny Ayers, and Liam RE Quin. “Beginning XML”, Wiley India Private
Ltd., 5th Edition, 2012
2 Rigaux, Ph, Michel Scholl, and Agnes Voisard. “Spatial databases: with application to
GIS”. Morgan Kaufmann, 2002.
3 Dunckley L. Multimedia databases: An object relational approach. Addison-Wesley
Longman Publishing Co., Inc.; 2003 Jan 1.
Mode of Evaluation: CAT / Written Assignment / Quiz / FAT
Indicative Experiments
1. Study of Basic SQL Commands.
Model any given scenario into ER/EER Model
2. Table creation with constraints, alter schema, insert values, aggregate functions,
simple and complex queries with joins, Views, Subqueries.
3. PL/SQL-Procedures, Cursors, Functions, Triggers
4. Partition a given database based on the type of query and compares the execution
speed of the query with/without parallelism.
5. Create a distributed database scenario, insert values, fragment and replicate the
database Query the distributed database
6. Consider a schema that contains the following table with the key underlined:
Employee (Eno, Ename, Desg, Dno). Assume that we horizontally fragment the table
as follows:
Course Outcomes
At the end of the course the student will be able to
1. Understand the foundation of AI and apply various search algorithms to identify
optimal solutions in state spaces.
2. Represent and reason with knowledge and uncertainty to identify solutions for real
world problems.
3. Formulate plan as a state space and apply algorithms to find solutions.
4. To develop data driven learning agents.
Reference Books
1. Min Xin-She Yang., “Nature-Inspired Computation and Swarm Intelligence Algorithms,
Theory and Applications”, Elsevier, Academic Press, 2020.
2. Elaine Rich, Kevin Knight, Shivashankar B Nair., “Artificial Intelligence”, 3rd Edition,
McGraw Hill Education, 2017.
Course Outcomes
Indicative Experiments
1. Study of Machine Learning libraries in python
2. Data exploration and preprocessing in machine learning
3. Evaluate the classifier using various performance measures
4. Implement a probabilistic model to detect Spam Email with Naive Bayes
5. Implement regression algorithms to predict Stock Price
6. Implement PCA and classify the hand-written digits.
7. Implement a tree-based algorithm to predict ad click
8. Classify newsgroup Topics with Support Vector Machines
9. Implement multiclass classification for hand-written digits.
10. Implement Bagging using Random Forests for hand written digits.
11. Mining the 20 Newsgroups Dataset with Clustering and Topic Modeling Algorithms
12. Training on large datasets with online learning
Total Laboratory Hours 30 hours
Text Book(s)
1. Liu Yuxi, “Python Machine Learning By Example: Build intelligent systems using Python,
TensorFlow 2, PyTorch, and scikit-learn”, 2020, 3rd Edition, Packt Publishing, UK.
Reference Books
1. Aurélien Géron, “Hands-On Machine Learning with Scikit-Learn and TensorFlow:
Concepts, Tools, and Techniques to Build Intelligent Systems ", 2019, 2nd Edition,
O'Reilly Media, Inc, United States.
2. Wes McKinney, “Python for Data Analysis: Data Wrangling with Pandas, NumPy, and
IPython", 2017, 2nd Edition, O'Reilly Media, Inc, United States.
Mode of Evaluation: CAT / Mid-Term Lab/ FAT
Course Outcomes
At the end of this course, students will be able to:
1. Understand the methods and terminologies involved in deep neural network,
differentiate the learning methods used in Deep-nets.
2. Identify and improve Hyper parameters for better Deep Network Performance
3. To understand and visualize Convolutional Neural Network for real-world applications
4. To demonstrate the use of Recurrent Neural Networks and Transformer based for
language modeling
5. To distinguish different types of Advanced Neural Networks
Text Book(s)
1. Fundamentals of Deep Learning, Nikhil Buduma and Nicholas Locasio, O-Reilly,
2017
2. Dive into Deep Learning, Aston Zhang, Zachary C. Lipton, Mu Li, and Alexander J.
Smola, Amazon Senior Scientists – Open source and Free Book, March 2022
Reference Books
1. Deep Learning, Ian Goodfellow Yoshua Bengio Aaron Courville, MIT Press, 2017
2. Deep Learning: A Practitioner's Approach, Josh Patterson, Adam Gibson, O'Reilly
Media, 2017
Mode of Evaluation: CAT / Written Assignment / Quiz / FAT
Course Outcome
Upon completion of this course, the student will be able to:
1. Understand the principles and policies of information security.
2. Analyze and explore the information security controls.
3. Assess and evaluate the risk management practices of information security.
4. Identify the disasters and recovering from them with appropriate decisions.
Text Book(s)
1. Andy Taylor, David Alexander, Amanda Finch and David Sutton, “Information
Security Principles”,2020, Third Edition, BCS, United Kingdom.
Course Outcome
Upon completion of this course, the student will be able to:
1. Understand the fundamental of Cryptosystems requirements.
2. Identify and apply the concept of Cryptographic algorithms.
3. Analyze and explore the use of authentication and hashing.
4. Gain a deep insight into attacks and emerging security algorithms.
5. Explore and analyze of signature and key exchange algorithms.
Text Book(s)
1. Douglas R. Stinson, “Cryptography: Theory and Practice”, 2018, 4th Edition, CRC
Press, United states.
Reference Books
1. Bruce Schneier, “Applied Cryptography: Protocols, Algorithms and Source code in C”,
2017, 20th edition, John Wiley & Sons, New York.
2. Behrouz A Forouzan, Debdeep Mukhopadhyay, “Cryptography and Network Security”,
2011, Tata Mcgraw Hill education private limited, India
Mode of Evaluation: CAT / Assignment / Quiz / FAT
Recommended by Board of Studies 26-07-2022
Approved by Academic Council No. 67 Date 08-08-2022
Course Outcome
Upon completion of this course, the student will be able to:
1. Gain a deep insight into attacks and emerging security algorithms.
2. Explore and analyze of signature and key exchange algorithms.
Indicative Experiments
1. Implement a client and a server on different computers. Perform the communication
between these two entities by using RSA cryptosystem.
2. Implement a client and a server on different computers. Perform the authentication of
sender between these two entities by using digital signature cryptosystem
3. Implement man-in-the middle attack in Diffie-Hellman key exchange algorithm
4. Implementing SHA-512 message digest algorithm
5. Demonstrate the classical cryptography algorithms
6. Implement Data Encryption Standard algorithm.
7. Implement a session key agreement algorithm.
8. Demonstrate the hash-based message authentication code (HMAC) algorithm.
9. Implement ElGamal cryptosystems on elliptic curves
10. Implement Advanced Encryption Standard algorithm
Text Book(s)
1. Douglas R. Stinson, “Cryptography: Theory and Practice”, 2018, 4th Edition, CRC
Press, United states.
Reference Books(s)
1. Bruce Schneier, “Applied Cryptography: Protocols, Algorithms and Source code in C”,
2017, 20th edition, John Wiley & Sons, New York.
2. Behrouz A Forouzan, Debdeep Mukhopadhyay, “Cryptography and Network Security”,
2011, Tata Mcgraw Hill education private limited, India
Mode of Evaluation: Continuous Assessment / FAT
Recommended by Board of Studies 26-07-2022
Approved by Academic Council No. 67 Date 08-08-2022
Course Outcome
Upon completion of this course, the student will be able to:
1. Identify flaws and vulnerabilities in applications, websites, networks, systems,
protocols, and configurations using both manual techniques and assistive tools.
2. Deploy and test exploits over targeting operating systems and services
3. Rich knowledge on legal and ethical issues related to vulnerability and
penetration testing.
4. Ability to perform pentest on target and generate a report based on the test and
determine the security threats and vulnerabilities in computer networks.
5. Using the acquired knowledge into practice for testing the vulnerabilities and
identifying threats.
Text Book(s)
1. Phillip L. Wylie, Kim Crawley, “The Pentester BluePrint: Starting a Career as an
Ethical Hacker”, 2020, Wiley, United States.
2. Sabih, Zaid, “Learn Ethical Hacking from Scratch: Your stepping stone to
penetration testing”, 2018 Packt Publishing Ltd, United Kingdom.
Reference Books
1. Diogenes, Yuri, and Erdal Ozkaya, “Cybersecurity??? Attack and Defense
Strategies: Infrastructure security with Red Team and Blue Team tactics”, 2018,
Packt Publishing Ltd, United Kingdom.
2. Andrew Whitaker, and Daniel P. Newman. “Penetration Testing and Network
Defense”, 2005, Cisco Press, New Jersey.
Mode of Evaluation: CAT / Assignment / Quiz / FAT
Recommended by Board of Studies 26-07-2022
Approved by Academic Council No. 67 Date 08-08-2022
Text Book(s)
1. Phillip L. Wylie, Kim Crawley, “The Pentester BluePrint: Starting a Career as an
Ethical Hacker”, 2020, Wiley, United States.
2. Sabih, Zaid, “Learn Ethical Hacking from Scratch: Your stepping stone to
penetration testing”, 2018 Packt Publishing Ltd, United Kingdom.
Reference Book(s)
1. Diogenes, Yuri, and Erdal Ozkaya, “Cybersecurity??? Attack and Defense
Strategies: Infrastructure security with Red Team and Blue Team tactics”, 2018,
Packt Publishing Ltd, United Kingdom.
2. Andrew Whitaker and Daniel P. Newman. “Penetration Testing and Network
Defense”, 2005, Cisco Press, New Jersey.
Mode of Evaluation: Continuous Assessment / FAT
Recommended by Board of Studies 26-07-2022
Approved by Academic Council No. 67 Date 08-08-2022
Course Outcomes
Upon completion of the course the student will be able to
1. Understand the need of new frame work to deal with huge amounts of Data.
2. Demonstrate the Hadoop framework Hadoop Distributed File System and
MapReduce.
3. Demonstrate the Pig architecture and evaluation of pig scripts.
4. Describe the Hive architecture and execute SQL queries on sample data sets.
5. Demonstrate spark programming with different programming languages and graph
algorithms.
Text Book(s)
1. Thomas Erl, Wajid Khattak, and Paul Buhler, Big Data Fundamentals: Concepts, Drivers
&Techniques, Pearson India Education Service Pvt. Ltd., First Edition, 2016.
2. Tom White, Hadoop: The Definitive Guide, O’Reilly Media, Inc., Fourth Edition, 2015.
Reference Books
1. Alan Gates, Programming Pig Dataflow Scripting with Hadoop, O’Reilly Media, Inc,
2011.
2. Jason Rutherglen, Dean Wampler, Edward Caprialo, Programming Hive, O’ReillyMedia
Inc,2012
3. Mike Frampton, “Mastering Apache Spark”, Packt Publishing, 2015.
Mode of Evaluation: CAT / written assignment / Quiz / FAT / Project / Seminar
Course Outcome
1. Implement and evaluate the data manipulation procedures using pig, hive and spark
on Hadoop frame work.
Indicative Experiments
1. Installing and configuring the Hadoop frame work. HDFS Commands,
2. Map Reduce Program to show the need of combiner
3. Map Reduce I/O Formats – Text, Key – Value
4. Map Reduce I/O Formats – NLine – Multiline
5. Installing and Configuring Apache PIG and HIVE
6 Sequence File Input / Output Formats
7. Distributed Cache & Map side Join, Reduce Side Join
8. Building and Running Spark Application
9. Word count in Hadoop and Spark
10. Manipulation RDD
11. Spark Implementation of Matrix algorithms in Spark Spark Sql
programming, Building Spark Streaming application
Total Laboratory Hours 30 hours
Reference Books
1. Mike Frampton “Mastering Apache Spark” – Pract Publishing 2015
2. Tom White, “Hadoop – The Definitive Guide”, O’Relly 4th Edition 2015
3. Nick Pentreath, “Machine Learning with Spark” Pract Publishing 2015
4. Mohammed Gulle , “Big Data Analytics with Spark: A Practitioner's Guide to Using
Spark for Large Scale Data Analysis” – Apress 2015
5. Adam Shook and Donald Mine,“MapReduce Design Patterns: Building Effective
Algorithms and Analytics for Hadoop and Other Systems” - O’Relly 2012
Mode of Assessment: Continuous Assessment / FAT / Oral examination and others
Recommended by Board of Studies 26-07-2022
Approved by Academic Council No. 67 Date 08-08-2022
for Predictive Data Analytics: Algorithms, Worked Examples, MIT Press 2020 , 2nd
Edition.
2. Jason Brownlee -Data Preparation for Machine Learning: Data Cleaning, Feature
Selection, and Data Transforms in Python, First Edition, 2020.
Reference Books
1. Pang-Ning Tan; Michael Steinbach; Anuj Karpatne; Vipin Kumar -Introduction to Data
Mining. By: Publisher: Pearson, Edition: 2nd, 2019.
1. Understand and analyze how information theory, similarity score and Probability
theory can be used to build prediction models.
Course Outcome
Upon completion of the course the student will be able to
1. Analyze the different data preprocessing techniques.
2. Apply the prediction model for decision making for a given set of problems.
3. Apply regression algorithms for finding relationships between data variables
Indicative Experiments
1. Find the statistical measures of central tendency and dispersion such as min(),
max(), mean(), meadian(), quantile(), sd() ,var() and summary() for real world datasets.
2. Demonstrate the different data visualization techniques. (Scatter Plot, Horizontal Bar
Chart, Histogram, Visualization of Time Series data (Line Graphs) for applications such
as weather analysis.
3. Perform the chi-square test and ANOVA F-test on datasets.
4. Implement the PCA method for dimensionality reduction on datasets.
5. Implement the RFE method and show the importance of features
6. Implement the Decision Tree for given datasets and compute the accuracy of model.
7. Implement the K-Nearest Neighbor Algorithm for given datasets and analyze the
results.
8. Implement the Naïve Bayes method.
9. Implement simple linear regression program to predict the future values and analyze
the goodness of fit.
10. Implement multivariate linear regression program to predict the future values analyze
the goodness of fit.
11. Implementation of Distributed Decision Trees
Total Laboratory Hours 30 hours
Text Book(s)
1. John D. Kelleher, Brian Mac Namee, Aoife D'Arcy -Fundamentals of Machine
Learning for Predictive Data Analytics: Algorithms, Worked Examples, MIT Press
2020, 2nd Edition.
Reference Books
1. Jason Brownlee -Data Preparation for Machine Learning: Data Cleaning, Feature
Selection, and Data Transforms in Python, First Edition, 2020.
2. Guanhua Wang-Distributed Machine Learning with Python, Packt Publishing, 2022.
Mode of Assessment: Continuous Assessment / FAT / Oral examination and others
Recommended by Board of Studies 26-07-2022
Approved by Academic Council No. 67 Date 08-08-2022
Course Outcomes
Upon completion of the course the student will be able to
1. Analyze the different data types, visualization types to bring out the insight.
2. Relate the visualization towards the problem based on the dataset to analyze and
bring out valuable insight on large dataset.
3. Design visualization dashboard to support the decision making on large scale data.
4. Demonstrate the analysis of large dataset using various visualization techniques and
tools.
Text Book(s)
1. Tamara Munzer, Visualization Analysis and Design, 1st edition, CRC Press, United
States, 2015.
2 Michael Fry, Jeffrey Ohlmann, Jeffrey Camm, James Cochran, Data Visualization:
Exploring and Explaining with Data, South-Western College Publishing, 2021
Reference Books
1. Dr. Chun-hauh Chen, W. K. Hardle, A. Unwin, Handbook of Data Visualization, 1st
edition, Springer publication, Germany, 2008.
2. Ben Fry, Visualizing Data, 1st edition, O'Reilly Media, United States, 2008.
3. Avril Coghlan, A little book of R for multivariate analysis, 1st edition, Welcome Trust
Sanger Institute, United Kingdom, 2013.
Mode of Evaluation: CAT / written assignment / Quiz / FAT / Project / Seminar
Course Outcome
Upon completion of the course the student will be able to
1. Integrate with Tableau for various data visualization scenarios.
2. Design visualization dashboard to support the decision making on large scale data.
3. Demonstrate the analysis of large dataset using various visualization techniques and
tools.
Indicative Experiments
1. Acquiring and plotting data
2. Statistical Analysis
3. K-means and Hierarchical Cluster techniques
4. Multivariate Analysis, Correlation, regression and analysis of variance.
5. Financial analysis Clustering, Histogram and Heat Map.
6. Time-series analysis Stock Market.
7. Visualization of various massive dataset Healthcare, Census, Geospatial.
8. Visualization on Streaming dataset Stock market, weather forecasting.
9. Market-Basket Data analysis-visualization
10. Text visualization using web analytics
Total Laboratory Hours 30 hours
Text Book(s)
1. Tamara Munzer, Visualization Analysis and Design, 1st edition, CRC Press, United
States, 2015.
2. Michael Fry, Jeffrey Ohlmann, Jeffrey Camm, James Cochran, Data Visualization:
Exploring and Explaining with Data, South-Western College Publishing, 2021
Reference Books
1. Dr. Chun-hauh Chen, W. K. Hardle, A. Unwin, Handbook of Data Visualization, 1st
edition, Springer publication, Germany, 2008.
2. Ben Fry, Visualizing Data, 1st edition, O'Reilly Media, United States, 2008.
3. Avril, A little book of R for multivariate analysis, 1st edition, Welcome Trust Sanger
Institute, United Kingdom, 2013.
Mode of Assessment: Continuous Assessment / FAT / Oral examination and others
Recommended by Board of Studies 26-07-2022
Approved by Academic Council No. 67 Date 08-08-2022
Course Outcome
1. Formulate a mathematical model of physical systems.
2. Use different tools for control system design and analysis.
3. To understand the concept of time domain response, frequency domain response
and solution of the discrete system.
4. Employ or Design compensators/controllers for design specifications.
5. Understand the fundamental limitations and challenges associated with the control of
real-time physical systems.
Module 1 Systems and their Representations 5 hours
Review of Basic Elements in Control Systems – Mathematical Modeling of Systems- Open
Loop & Closed Loop Systems – Transfer Function and State Space Representation – State
Space to Transfer Function Conversion.
Module 2 Time Response and Stability Analysis 5 hours
Introduction - Review of Time Response of First and Second Order System - Time
Response Analysis- Concepts of Stability – Routh Hurwitz Criterion- Steady State Error.
Module 3 Design of Feedback Control System 7 hours
Introduction of Feedback Controllers-P, PI, PID and Compensator-Lag, Lead, Transient
Response Design using Root Locus and Bode Plot.
Module 4 State Variable Analysis 7 hours
State Equations- Solution, State Transition Equations, Relationship between State Equation
and Transfer Functions, Characteristic Equations- Eigen Value -Eigen Vector.
Module 5 State Space Model Transformation 7 hours
Diagonalization of Matrix – Canonical Forms, Methods of Computing State Transition Matrix,
Controllability and Observability of Linear Time Invariant Systems, Pole Placement
Techniques.
Module 6 Discrete Time Systems 6 hours
Overview of Design Approaches, Continuous Versus Digital Control, Sampling Process,
Sample and Hold Device, A/D, D/A Conversion, Calculus of Difference Equations, Z-
Transform, Pulse Transfer Function
Module 7 Introduction to digital control 6 hours
system
Mapping of S-Plane to Z-Plane, Stability Analysis of Closed Loop Systems in Z-Plane, Jury
Stability Test, State Diagram- Decomposition of Discrete Data Transfer Function.
Module 8 Contemporary Issues 2 hours
Text Book(s)
1. Norman S. Nise, ”Control System Engineering”, John Wiley & Sons, 8th Edition, 2019.
2. K.Ogata, ”Discrete-Time Control Systems”, Pearson, 2015.
Reference Books
Course Outcome
1. Formulate a mathematical model of Physical systems.
2. Use different tools for control system design and analysis.
3. To understand the concept of time domain response, frequency domain response
and solution of discrete system
4. Employ or Design compensators/controllers for design specifications.
5. Understand the fundamental limitations and challenges associated with control of
real-time physical systems.
Indicative Experiments
1. Block Diagram Reduction
2. Determination of Time Domain Specifications
3. Stability Analysis of Linear Systems
4. PID Controller Design using Bode Plot
5. PID Controller Design using Root Locus
6. Transfer Function to State Space Conversion with Controllability and Observability
Tests
7. Lag Compensator Design for Linear Servo Motor for Speed Control Application
8. Pole Placement Controller Design for Inverted Pendulum
9. PD Controller Design for Position Control of Servo Plant
10. Cascade Control Design for Ball and Beam System
11. PID Controller Design for Magnetic Levitation System
12. Determine the Response of First and Second Order System
13. Industrial Controller Design Using NI Systems for Vision Applications
14. Controller Design Using NI PITSCO Robotics Kit
15. Data Acquisition and Controller Design Using NI Educational Controller
Total Laboratory Hours 30 hours
Mode of assessment: Continuous Assessment / FAT
Recommended by Board of Studies 29-07-2022
Approved by Academic Council No. 67 Date 08-08-2022
Course Outcome
1. Comprehend the essential hardware devices required for the sensing and actuating
process.
2. Analyze the signal processing and interfacing through appropriate techniques.
3. Build smart CPS framework for industrial applications through Machine to Machine
(M2M) technologies.
4. Understand the various M2M communication technologies and protocols to deploy
the CPS framework.
5. Realize the impact of M2M communication in constrained devices through its
architectures and networks.
Module 1 Introduction 7 hours
Definitions - Classification of Sensors and Actuators - Units - Different Types of Sensors:
Temperature Sensors and Thermal Actuators, Optical Sensors and Actuators, Electric and
Magnetic Sensors and Actuators, Mechanical Sensors and Actuators, Acoustic Sensors and
Actuators, Chemical Sensors and Actuators, Radiation Sensors and Actuators, MEMS and
Smart Sensors.
Module 2 Signal Processing 7 hours
Modulation: Amplitude Modulation - Frequency Modulation - Phase Modulation - Amplitude
Shift Keying - Frequency Shift Keying - Phase Shift Keying - CPS Essentials - Demodulation:
Amplitude Demodulation - Frequency and Phase Demodulation - Encoding and Decoding:
Unipolar and Bipolar Encoding - Biphase Encoding - Manchester Code.
Module 3 Interface Methods and Circuits 6 hours
Amplifiers - Power Amplifiers - Digital Circuits - Bridge Circuits - Data Transmission -
Excitation Methods and Circuits - Noise and Interference - General Requirements for
Interfacing Sensors and Actuators.
Module 4 Industrial IoT (IIoT) Design Methodology 6 hours
Introduction to M2M, M2M Communication Technologies - Challenges of Industrial IoT -
Automation Framework Using IIoT System - Technologies in IIoT Solution - IIoT
Development Platform.
Module 5 M2M Communication Technologies 6 hours
M2M Communication - Standards and Protocols - Application using M2M Communication.
Module 6 M2M Communication Protocols 4 hours
Internet Protocol Stack and M2M Communication - IPv6 and IoT Application Protocols -
Constrained Application Protocols (CoAP)- MQTT Application Protocols - Standard Defining
Bodies.
Module 7 M2M Communication in 7 hours
Constrained Devices
Constrained Network and Constrained Devices - Internet Access - M2M Gateway Devices -
Network Domain - Personal Area Network - Constrained Devices and its Architecture -
Wireless Sensor Network - Multi-PHY Management and SUN WPAN - Network Architecture
for WPAN - Routing Protocols for Sensor Networks - Constrained Application Protocol
(CoRE).
Module:8 Contemporary Issues 2 hours
Text Book(s)
1. Nathan Ida, "Sensors, Actuators, and Their Interfaces: A Multidisciplinary
Introduction", IET, 2nd Edition, 2020
2. Veena S. Chakravarthi, "Internet of Things and M2M Communication Technologies:
Architecture and Practical Design Approach to IoT in Industry 4.0", Springer
International Publishing, 2021.
Reference Books
1. Griffor ER, Greer C, Wollman DA, Burns MJ. Framework for Cyber-Physical Systems:
Volume 1, overview. 2017 Jun 26.
2. Andre Platzer. Foundations of Cyber-Physical Systems. Lecture Notes, Computer
Science Department, Carnegie Mellon University.2013.
3. P.Venkata Krishna, V.Saritha and H.P.Sultana. Challenges, Opportunities, and
Dimensions of Cyber-Physical Systems. IGI Global, ISBN – 978-1466673120, 2014.
Mode of Evaluation: CAT / Assignment / Quiz / FAT
Recommended by Board of Studies 29-07-2022
Approved by Academic Council No. 67 Date 08-08-2022
Text Book(s)
1. Edward A. Lee and Sanjit A. Seshia, Introduction to Embedded Systems, A Cyber-
Physical Systems Approach, Second Edition, http://Leeseshia.org, ISBN 978-1-312-
42740-2, 2015.
Course Outcome
1. Design and develop the Cyber Physical System.
2. Verify and validate the developed Cyber Physical System.
3. Deploy Cyber Physical Systems in various practical applications.
Indicative Experiments
1. Embedded C/C++ Programming for CPS
• Port Handling, Timer Initialization
• Waveform Generation
• Serial Port Controller
• Interrupt Generation
• Motor Control using Embedded C
• PLC Emulation using Embedded C
• Pulse Width Modulation
2. Benchmark IoT for CPS
• Deployment of Sensors and IoT devices
• Control of Sensors using Open APIs like MQTT, COAP
• Addition of new sensors to CPS-IoT
• Control of Servo Motors using Embedded Software.
3. Modelling and Simulation of CPS using Ptolemy
• Computation Models
• Process Networks
• Discrete Events
• Data Flow
• Rendezvous Based models
• Synchronous/Reactive
• 3D Visualization
• Continuous Time Model
• Hybrid Systems Modeling using Hy Visual
• Scientific Workflows using Kepler
4. Additional Exercises
• Matlab and Simulink
• Robotic Control and Simulation
• Drone Control
• Automotive
Total Laboratory Hours 30 hours
Mode of assessment: Continuous assessment / FAT
Recommended by Board of Studies 29-07-2022
Approved by Academic Council No. 67 Date 08-08-2022
Text Book(s)
1. Phillip A. Laplante, Real-Time Systems Design and Analysis, 2013, 4th Edition, Prentice
Hall of India.
2. Rajib Mall, “Real-time Systems: Theory and Practice”, 2009, Pearson Education.
Reference Books
1. Kayhan Erciyes,” Distributed Real Time Systems: Theory and Practice”, 2019.
Springer.
2. Allen Buruns and Andy Wellings, “Real Time systems and Programming Languages”,
2003, Pearson Education.
3. R.J.A Buhr and D.L Bailey, “An Introduction to Real-Time Systems”, 1999, Prentice Hall
International.
4. Stuart Bennett, “Real Time Computer Control-An Introduction”, 1998, Prentice Hall of
India.
5. C.M Krishna and Kang G. Shin, “Real-Time Systems”, 1997, McGraw-Hill International
Editions.
Mode of Evaluation: CAT / Assignment / Quiz / FAT
Recommended by Board of Studies 29-07-2022
Approved by Academic Council No. 67 Date 08-08-2022
Course Outcome
1. Understand the risk of failures and their peculiarities with different system failures.
2. Be aware of the threat of software defects and human operator error as well as
hardware failures.
3. Know the different forms of redundancy and their applicability to different classes of
dependability requirements.
4. Be able to specify the use of fault tolerance in the design of application software.
5. Understand the relevant factors in evaluating alternative system designs for a specific
set of requirements towards Industry perceptions.
Text Book(s)
1. Elena Dubrova; Fault-Tolerant Design; Springer, 2013
2. Israel Koren and C. Mani Krishna; F ault-Tolerant Systems; Morgan-Kaufman Publishers,
2007.
Reference Books
1. Michael R. Lyu; Handbook of Software Reliability Engineering; IEEE Computer Society
Press (and McGraw-Hill), 1996.
2. Martin L. Shooman; Reliability of Computer Systems and Networks: Fault Tolerance,
Analysis, and Design; John Wiley & Sons Inc., 2002.
3. Fault Tolerant Computer System design by D. K. Pradhan, Prentice Hall.(1996)
Mode of Evaluation: CAT / Assignment / Quiz / FAT
Recommended by Board of Studies 29-07-2022
Approved by Academic Council No. 67 Date 08-08-2022
Text Book(s)
1. Diego Galar Pascual, Pasquale Daponte, Uday Kumar, "Handbook Of Industry 4.0 and
Smart Systems", CRC Press, 2020.
2. Peter Matthews, Steven Greenspan, "Automation and Collaborative Robotics: A Guide
Course Outcome:
Course Outcome:
Upon successful completion of this course students will be able to
1. Formulate specific problem statements for ill-defined real life problems with
reasonable assumptions and constraints.
2. Perform literature search and / or patent search in the area of interest.
3. Conduct experiments / Design and Analysis / solution iterations and document the
results.
4. Perform error analysis / benchmarking / costing.
5. Synthesize the results and arrive at scientific conclusions / products / solution.
6. Document the results in the form of technical report / presentation.
Module Content (Project duration: one semester)
1. Dissertation may be a theoretical analysis, modeling & simulation, experimentation &
analysis, prototype design, fabrication of new equipment, correlation and analysis of
data, software development, applied research and any other related activities.
2. Dissertation should be individual work.
3. Carried out inside or outside the university, in any relevant industry or research
institution.
4. Publications in the peer reviewed journals / International Conferences will be an
added advantage.
leurs idées)
Décrivez La Famille -La Maison -L’université -Les Loisirs-La Vie quotidienne- La ville natale-
Un personnage célèbre
Module:7 Comment écrire un dialogue 5 hours
Dialogue
a) Réserver un billet de train
b) Entre deux amis qui se rencontrent au café
c) Parmi les membres de la famille
d) Entre le patient et le médecin
e) Entre le professeur et l’étudiant(e)
Module:8 Contemporary Topics 2 hours
Course Outcomes
At the end of the course the student should be able to
1. Provide a basic understanding of core Java concepts
2. Use linear and non-linear data structures to solve practical problems.
3. Identify Bitwise algorithms for solving real world problems.
4. Illustrate various techniques for searching, sorting and hashing
5. Understand and implement Dynamic Programming.
6. Design new algorithms or modify existing algorithms for new application.
Span problem, Priority Queue using DLL, Sort without extra Space, Max Sliding
Window, Stack permutations
Module:7 Trees, Graphs , Heaps, Maps 6 hours
Recover the BST, Views of tree Vertical order traversal ,Boundary traversal, BFS,
DFS, Dial's Algorithm ,Bellman-Ford Algorithm, Topological Sort ,Heap Sort
Binomial heap, K-array heap, Winner tree, Hash Map to Tree Map.
Module:8 Interview Preparation 3 hours
Networking, Security, Operating Systems, Data Base Management Systems.
Total Lecture hours 45 hours
Text Book
1. Mark Allen Weiss, “Data structures and algorithm analysis in C++”, 2019, 4th
Edition, Pearson Education.
Reference Books
1. J.P. Tremblay and P.G. Sorenson, “An Introduction to Data Structures with
applications”, 2017, Second Edition, Tata Mc Graw Hill.
2. Richard M. Reese, Jennifer L. Reese, Alexey Grigorev, Java: Data Science
Made Easy, 2019 Pocket Publishing.
Mode of Evaluation: CAT, Written assignment, Quiz, Project & FAT.
Recommended by Board of Studies 24-02-2023
Approved by Academic Council No. 69 Date 16-03-2023
Course Objectives
1.To develop writing skills for preparing technical reports.
2. To analyze and evaluate general and complex technical information.
3. To enable proficiency in drafting and presenting reports.
Course Outcome
At the end of the course, the student will be able to
1.Construct error free sentences using appropriate grammar, vocabulary and style.
2. Apply the advanced rules of grammar for proofreading reports.
3. Interpret information and concepts in preparing reports.
4. Demonstrate the structure and function of technical reports.
5. Improve the ability of presenting technical reports.
Indicative Experiments
Basics of Technical Communication
1. General and Technical communication,
Process of communication, Levels of communication
Vocabulary& Editing
2. Word usage: confusing words, Phrasal verbs
Punctuation and Proof reading
Advanced Grammar
3. Shifts: Voice, Tense, Person, Number
Clarity: Pronoun reference, Misplace and unclear modifiers
Elements of Technical writing
4. Developing paragraphs, Eliminating unnecessary words, Avoiding clichés and slang
Sentence clarity and combining
The Art of condensation
5. Steps to effective precis writing,
Paraphrasing and summarizing
6. Technical Reports: Meaning, Objectives, Characteristics and Categories
Formats of reports and Prewriting: purpose, audience, sources of information,
7.
organizing the material
Data Visualization
8.
Interpreting Data - Graphs - Tables – Charts - Imagery - Info graphics
Systematization of Information: Preparing Questionnaire
9.
Techniques to Converge Objective-Oriented data in Diverse Technical Reports
Research and Analyses: Writing introduction and literature review, Reference styles,
10.
Synchronize Technical Details from Magazines, Articles and e-content
Structure of Reports
11.. Title – Preface – Acknowledgement - Abstract/Summary – Introduction - Materials and
Methods – Results – Discussion - Conclusion - Suggestions/Recommendations
Writing the Report: First draft, Revising,
12.
Thesis statement, Developing unity and coherence
Writing scientific abstracts: Parts of the abstract, Revising the abstract
13.
Avoiding Plagiarism, Best practices for writers
Supplementary Texts
14.
Appendix – Index – Glossary – References – Bibliography - Notes
15 Presentation
Kumar, Sanjay and Pushpalatha, (2018). English Language and Communication Skills
3. for Engineers, Oxford University Press.
Course Outcome:
At the end of the course, the student will be able to
1. Execute appropriate analytical skills.
2. Solve problems pertaining to quantitative and reasoning ability.
3. Learn better vocabulary for workplace communication.
4. Demonstrate appropriate behavior in an organized environment.
Synonyms & Antonyms, One word substitutes, Word Pairs, Spellings, Idioms, Sentence
completion, Analogies.
Course Objectives:
1. To develop the students’ advanced problem solving skills.
2. To enhance critical thinking and innovative skills.
Course Outcome:
At the end of the course, the student will be able to
Syllogisms, Binary logic, Sequential output tracing, Crypto arithmetic, Data Sufficiency, Data
Interpretation-Advanced, Interpretation tables, pie charts & bar chats.