|
|
|
1 Semester - 2018 - Batch | Course Code |
Course |
Type |
Hours Per Week |
Credits |
Marks |
RSC131 | RESEARCH METHODOLOGY | - | 4 | 4 | 100 |
2 Semester - 2018 - Batch | Course Code |
Course |
Type |
Hours Per Week |
Credits |
Marks |
RCS231 | ADVANCED COMPUTING TECHNIQUES | - | 6 | 4 | 100 |
RCS241A | MACHINE INTELLIGENCE | - | 6 | 4 | 100 |
RCS241B | MEDICAL IMAGE PROCESSING | - | 6 | 4 | 100 |
RCS241H | NETWORK AND CLOUD SECURITY ESSENTIALS | - | 6 | 4 | 100 |
RCS241J | CLOUD COMPUTING PRINCIPLES AND PARADIGMS | - | 4 | 4 | 100 |
RCS241K | NATURAL LANGUAGE PROCESSING | - | 6 | 4 | 100 |
3 Semester - 2017 - Batch | Course Code |
Course |
Type |
Hours Per Week |
Credits |
Marks |
RCS381 | DISSERTATION | - | 4 | 10 | 200 |
| ||||
Introduction to Program: | ||||
The Master of Philosophy in Computer Science Program is aimed at developing scholars into mature researchers, able to make original scientific contributions that have both practical significance and a rigorous, elegant theoretical grounding. | ||||
Assesment Pattern | ||||
CIA 1 - 20 marks CIA 2 - 50 marks CIA 3 - 20 marks Attendance - 10 marks
End Semester Examinations - 100 marks | ||||
Examination And Assesments | ||||
|
RSC131 - RESEARCH METHODOLOGY (2018 Batch) | |
Total Teaching Hours for Semester:60 |
No of Lecture Hours/Week:4 |
Max Marks:100 |
Credits:4 |
Course Objectives/Course Description |
|
This course is intended to assist students in planning and carrying out research projects. The students are exposed to the principles, procedures and techniques of implementing a research project. |
|
Course Outcome |
|
On successful completion of the course, the students should be able to |
Unit-1 |
Teaching Hours:15 |
||||||||||||||||||||||||||||
Research methodology
|
|||||||||||||||||||||||||||||
An introduction–meaning of research-objectives of research- motivation in research –types of research- research approaches-significance of research-research methods versus methodology-research and scientific method-importance of knowing how research done-research processes-criteria of good research-defining research problem-selecting the problem-necessity of defining the problem-technique involved in defining a problem-Research design- meaning of research design-need for research design-features of good design-different research design-basic principles of experimental design | |||||||||||||||||||||||||||||
Unit-2 |
Teaching Hours:15 |
||||||||||||||||||||||||||||
Sampling Design
|
|||||||||||||||||||||||||||||
Measurement and Scaling Techniques- Methods of Data Collection, - processing and Analysis of Data,- Sampling Fundamentals, Testing of Hypotheses - I (Parametric or Standard Tests of Hypotheses), Chi-square Test, Analysis of Variance and Covariance, Testing of Hypotheses - II (Nonparametric or Distribution - Free Test),Multivariate Analysis Techniques. | |||||||||||||||||||||||||||||
Unit-3 |
Teaching Hours:15 |
||||||||||||||||||||||||||||
Report Writing and Presentation
|
|||||||||||||||||||||||||||||
Interpretation and report writing, technique of report writing-precaution in interpretation-significance- different steps of report writing- layout of research report-oral presentation- mechanics of writing- Exposure to writing tools like Latex/PDF, Camera Ready Preparation | |||||||||||||||||||||||||||||
Unit-4 |
Teaching Hours:15 |
||||||||||||||||||||||||||||
Role of Scholar, Supervisor and Computer
|
|||||||||||||||||||||||||||||
Originality in research, resources for research, Research skills, Time management, Role of supervisor and Scholar, Interaction with subject expert, The Computer: Its Role in Research, Case study interpretation: minimum 5 case studies. | |||||||||||||||||||||||||||||
Text Books And Reference Books: . | |||||||||||||||||||||||||||||
Essential Reading / Recommended Reading
| |||||||||||||||||||||||||||||
Evaluation Pattern
| |||||||||||||||||||||||||||||
RCS231 - ADVANCED COMPUTING TECHNIQUES (2018 Batch) | |||||||||||||||||||||||||||||
Total Teaching Hours for Semester:45 |
No of Lecture Hours/Week:6 |
||||||||||||||||||||||||||||
Max Marks:100 |
Credits:4 |
||||||||||||||||||||||||||||
Course Objectives/Course Description |
|||||||||||||||||||||||||||||
This paper gives insights into the underlying concepts of operating system, data structures, data base management and emerging technologies. |
|||||||||||||||||||||||||||||
Course Outcome |
|||||||||||||||||||||||||||||
|
Unit-1 |
Teaching Hours:11 |
Advanced Operating Systems
|
|
Description: Virtual memory management, Synchronization and communication, File systems, Distributed Operating System. | |
Unit-2 |
Teaching Hours:11 |
Advanced Database Systems
|
|
Description: Overview of emerging database applications and challenges, Mobile Database, Management, Spatial Indexing Techniques, Data Clustering Algorithms, Stream databases | |
Unit-3 |
Teaching Hours:12 |
Advanced Data structures
|
|
Description: AVL trees, B tree, Red-Black tree, Hashing techniques/Indexing techniques, Graph algorithms. | |
Unit-4 |
Teaching Hours:11 |
Emerging Technologies*
|
|
Description: Grid and cloud computing, Knowledge management and business intelligence, Mobile computing, Green computing, Storage technologies *Subjected to change based on recent trends. | |
Text Books And Reference Books: [1] A. Silberschatz ,P. B. Galvin,G. Gagne,Operating System ConceptsEssentials, 8th ed.John Wiley & Sons, Inc. 2010. [2] A. S. Tanenbaum, Distributed Operating system, 3rd ed. Prentice hall 2008. [3] Mark A. WeissAddison-Wesley, Data Structures and Algorithm Analysis in Java, 2/E,2007. | |
Essential Reading / Recommended Reading [1] Silberschatz, Korth and Sudarshan,Database System Concepts, 6thed.McGraw-Hill. [2] E. Bertino, L. Martino,Object- Oriented Database Systems: Concepts and Architectures, Addison-Wesley Publication, 2012. [3] R. L. Kruse,Data Structures and Program Design, PHI-2007. [4] DoeppnerOperating Systems in Depth: Design and Programming, 1st ed. Wiley: 2010. | |
Evaluation Pattern CIA (Weight) 50 ESE (Weight) 50 | |
RCS241A - MACHINE INTELLIGENCE (2018 Batch) | |
Total Teaching Hours for Semester:45 |
No of Lecture Hours/Week:6 |
Max Marks:100 |
Credits:4 |
Course Objectives/Course Description |
|
To understand the basics of machine learning To understand different techniques involved in pre-processing To implement feature selection and machine learning classification processes |
|
Course Outcome |
|
Upon completion of the course, the scholar will be able to To build and deploy machine learning classifier for predictor system. Use machine learning techniques to make better decisions. Know when to use different data preprocessing techniques. Know the strengths and weaknesses of diverse machine learning methods. |
Unit-1 |
Teaching Hours:11 |
Introduction Intelligent Methods
|
|
Introduction to machine learning – Supervised learning – Unsupervised learning – Machine learning and data mining. Neural Networks: Introduction – Use of NN – Working of NN, Genetic Algorithm: Introduction –Working of GA. Implementation of NN and GA using any open source tool.
| |
Unit-2 |
Teaching Hours:11 |
Preprocessing
|
|
Preprocessing: Data Cleaning - Missing Values – Noisy Data - Data Cleaning as a Process - Data Integration and Transformation - Data Reduction-Data Cube Aggregation-Attribute Subset Selection. Preprocessing can be done using any open source tool.
| |
Unit-3 |
Teaching Hours:11 |
supervised Learning
|
|
Supervised learning : Logistic regression. Perceptron. Exponential family. Generative learning algorithms. Gaussian discriminant analysis. Naive Bayes. Support vector machines.
| |
Unit-4 |
Teaching Hours:12 |
Unsupervised learning
|
|
Unsupervised learning: K-means Clustering, EM,Principle components analysis(PCA),Independent components analysis(ICA). Model selection and feature selection. Ensemble methods: Bagging, boosting. Evaluating and debugging learning algorithms. | |
Text Books And Reference Books: Ethem Alpaydin, Introduction to Machine Learning, Second Edition http://mitpress.mit.edu/catalog/item/default.asp?ttype=2&tid=12012 2. Jaiwei Han, Michelinne Kamber , “Data Mining : Concepts and Techniques “, Second Edition, Morgan Kaufmann Publication, 2006. 3. T.Sushmita Mitra, Tir ku Acharaya , “Data Mining Multimedia , Softcomputing & ` Bioinformatics”, Wiley Interscience Publications, 2004. 4. Bittles, Alan H., Carol Bower, RafatHussain, and Emma J. Glasson. "The four ages of Down syndrome." The European Journal of Public Health17, no. 2 (2007): 221-225. 5. Zhao, Qian, Kenneth Rosenbaum, Kazunori Okada, Dina J. Zand, Raymond Sze, Marshall Summar, and Marius George Linguraru. "Automated down syndrome detection using facial photographs." In 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 3670-3673. IEEE, 2013 | |
Essential Reading / Recommended Reading - | |
Evaluation Pattern CIA (Weight) 50 ESE (Weight) 50 | |
RCS241B - MEDICAL IMAGE PROCESSING (2018 Batch) | |
Total Teaching Hours for Semester:45 |
No of Lecture Hours/Week:6 |
Max Marks:100 |
Credits:4 |
Course Objectives/Course Description |
|
|
|
Course Outcome |
|
|
Unit-1 |
Teaching Hours:9 |
Image processing
|
|
Imaging modalities – image file formats – image sensing andacquisition – image sampling and quantization – noise models.Spatial Domain Processing - Frequency Domain Processing – filtering and smoothing techniques. | |
Unit-2 |
Teaching Hours:9 |
Image Analysis
|
|
Intensity Histogram - Classification- Connected Components Labelling - Feature Extraction-Region representation, texture based features. | |
Unit-3 |
Teaching Hours:9 |
Image Segmentation and Compression
|
|
Image Segmentation -Thresholding techniques – region growing methods – region splitting and merging.Image Compression– image compression models – basic compression methods. | |
Unit-4 |
Teaching Hours:9 |
Medical Image Processing
|
|
Fundamentals – Evolution –– Human body and Medical Imaging – Areas of challenges – Virtual reality - Medical Image Enhancement, Filtering Basic image processing algorithms. | |
Unit-5 |
Teaching Hours:9 |
Storage and Processing in Cloud
|
|
Cloud infrastructures - Service provider interfaces – Cloud in Healthcare domain – Implementation of Medical Image Processing in Cloud using Map Reduce Processing and Cloud Storage. | |
Text Books And Reference Books: 1. RajkumarBuyya, James Broberg,AndrzejGoscinski, “Cloud Computing – Principles and Paradigms”, John Wiley and Sons, 2011. 2. Digital Image Processing for Medical Applications by Geoff Dougherty, Cambridge university press, 2009. ISBN-13: 978-0521860857. 3. Paul Suetens, "Fundamentals of Medical Imaging", Second Edition, Cambridge University Press, 2009. | |
Essential Reading / Recommended Reading 1. Fundamentals of Digital Image Processing, Anil K. Jain, PHI, ISBN 81-203-0929-4. 2. H. K. Huang , “PACS and Imaging Informatics: Basic Principles and Applications”, 2010 3. Oleg S. Pianykh, “Digital Imaging and Communications in Medicine (DICOM): A Practical Introduction and Survival Guide”, Springer, 2012, ISBN-13: 978-3642108495 4. Handbook of Medical Imaging, Processing and Analysis, Academic Press, ISBN 0-12-077790-8 (PDF Book) 5. Digital Image Processing, S. Jayaraman, S. Esakkirajan, T. Veerakumar, McGraw Hill Education, 2009 | |
Evaluation Pattern CIA (Weight) 50 ESE (Weight) 50 | |
RCS241H - NETWORK AND CLOUD SECURITY ESSENTIALS (2018 Batch) | |
Total Teaching Hours for Semester:45 |
No of Lecture Hours/Week:6 |
Max Marks:100 |
Credits:4 |
Course Objectives/Course Description |
|
· Understand OSI security architecture and classical encryption techniques. · Understand various block cipher and stream cipher models. · Describe the principles of public key cryptosystems, hash functions and digital signature. · To describe and analyze security protocols using Scyther tool.
· Understand Cloud Computing Architecture and Security Issues in Cloud |
|
Course Outcome |
|
Upon completion of this course, the scholar will be able to · Understand the Methods of Conventional Encryption. · Know when to use different Cryptographic techniques. · Understand the strengths and weaknesses of various encryption mechanisms. · Analyze security of security protocols using Scyther tool |
Unit-1 |
Teaching Hours:11 |
Introduction to Network Security and Number Theory
|
|
Services, Mechanisms and attacks-the OSI security architecture-Network security model-Classical Encryption techniques: Symmetric cipher model, substitution techniques, transposition techniques, steganography). Number Theory: Groups, Rings, Fields. | |
Unit-2 |
Teaching Hours:11 |
Block Ciphers & Public Key Cryptography
|
|
Data Encryption Standard-Block cipher principles-block cipher modes of operation-Advanced Encryption Standard (AES)-Triple DES-Blowfish-RC5 algorithm. Public key Cryptography: Principles of public key cryptosystems-The RSA algorithm-Key management – Diffie Hellman Key exchange. | |
Unit-3 |
Teaching Hours:12 |
Message Digests & Digital Signatures
|
|
Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC –MD5 – SHA – HMAC – CMAC – Digital signature and authentication protocols – DSS – Schnorr | |
Unit-4 |
Teaching Hours:11 |
Cloud Computing Fundamentals & Scyther
|
|
What is Cloud computing?: Cloud computing Defined-The SPI Framework for Cloud computing, The Cloud Service Delivery Model, Cloud Deployment Models; Infrastructure Security: The Network Level, The Host Level and Application Level; Data Storage and Security: Aspects of Data Security, data Security Mitigation, Provider Data and its Security Scyther : Domain Analysis- Protocol Specification, Agent Model, Communication Model, Threat Model, Cryptographic Primitives, Security Requirements; Security Properties- Security properties as Claim Events. | |
Text Books And Reference Books: [1] William Stallings, Cryptography and Network Security, 5thEdition. Pearson Education,atio 2013 [2] Tim Mather, Subra Kumaraswamy and Shahed Latif, Cloud Security and Privacy, O’Reily, 2010
[3] Cremers C.J.F, Scyther :Ssemantics and Verification of Security Protocols, https://pure.tue.nl/ws/files/2425555/200612074.pdf | |
Essential Reading / Recommended Reading [1]Behrouz A. Ferouzan, Cryptography & Network Security, 1stEdition, Tata McGraw-Hill,2007.
[2] Ronald L. Kyutz and Rusell Dean Vines-Cloud Security, Wiley India Pvt. Ltd.,2012. | |
Evaluation Pattern CIA Weightage 50% ESE Weightage 50% | |
RCS241J - CLOUD COMPUTING PRINCIPLES AND PARADIGMS (2018 Batch) | |
Total Teaching Hours for Semester:45 |
No of Lecture Hours/Week:4 |
Max Marks:100 |
Credits:4 |
Course Objectives/Course Description |
|
|
|
Course Outcome |
|
|
Unit-1 |
Teaching Hours:9 |
INTRODUCTION TO CLOUD COMPUTING
|
|
Roots of Cloud Computing, Layers and Types of Clouds, Desired Features of a Cloud, Cloud Infrastructure Management, Infrastructure as a Service Providers, Platform as a Service Providers, Challenges and Risks. | |
Unit-2 |
Teaching Hours:9 |
INTEGRATION AS A SERVICE? PARADIGM
|
|
An Introduction, The Evolution of SaaS, The Challenges of SaaS Paradigm, Approaching the SaaS Integration Enigma, SaaS Integration Products and Platforms, SaaS Integration Services, SaaS Integration Appliances, The Enterprise Cloud Computing Paradigm - Issues for Enterprise Applications on the Cloud. | |
Unit-3 |
Teaching Hours:9 |
INFRASTRUCTURE AS A SERVICE (IAAS)
|
|
Virtual Machines Provisioning and Migration Services - Virtual Machines Provisioning and Manageability, Virtual Machine Migration Services, On the Management of Virtual Machines for Cloud Infrastructures - The Anatomy of Cloud Infrastructures, Distributed Management of Virtual Infrastructures, Enhancing Cloud Computing Environments Using a Cluster as a Service. | |
Unit-4 |
Teaching Hours:9 |
PLATFORM AND SOFTWARE AS A SERVICE (PAAS/IAAS)
|
|
Aneka—Integration of Private and Public Clouds – Introduction - Technologies and Tools for Cloud Computing - Aneka Cloud Platform, Hybrid Cloud Implementation, CometCloud: An Autonomic Cloud Engine, T-Systems’ Cloud-Based Solutions for Business Applications, Workflow Engine for Clouds - Workflow Management Systems and Clouds, Architecture of Workflow Management Systems. | |
Unit-5 |
Teaching Hours:9 |
MONITORING AND MANAGEMENT
|
|
An Architecture for Federated Cloud Computing, SLA Management in Cloud Computing: A Service Provider’s Perspective, Performance Prediction for HPC on Clouds. Best Practices in Architecting Cloud Applications in the AWS Cloud. | |
Text Books And Reference Books:
| |
Essential Reading / Recommended Reading
| |
Evaluation Pattern CIA weightage - 50% ESE weightage - 50% | |
RCS241K - NATURAL LANGUAGE PROCESSING (2018 Batch) | |
Total Teaching Hours for Semester:45 |
No of Lecture Hours/Week:6 |
Max Marks:100 |
Credits:4 |
Course Objectives/Course Description |
|
|
|
Course Outcome |
|
Upon completion of the course, the scholar will be able to: |
Unit-1 |
Teaching Hours:9 |
OVERVIEW AND LANGUAGE MODELING
|
|
Overview: Origins and challenges of NLP-Language and Grammar-Processing Indian Languages - NLP Applications-Information Retrieval. Language Modeling: Various Grammar- based Language Models-Statistical Language Model. | |
Unit-2 |
Teaching Hours:9 |
WORD LEVEL AND SYNTACTIC ANALYSIS
|
|
Word Level Analysis: Regular Expressions-Finite-State Automata-Morphological Parsing-Spelling Error Detection and correction-Words and Word classes-Part-of Speech Tagging. Syntactic Analysis: Context-free Grammar-Constituency- Parsing-Probabilistic Parsing. | |
Unit-3 |
Teaching Hours:9 |
SEMANTIC ANALYSIS AND DISCOURSE PROCESSING
|
|
Semantic Analysis: Meaning Representation-Lexical Semantics- Ambiguity-Word Sense Disambiguation. Discourse Processing: cohesion-Reference Resolution- Discourse Coherence and Structure. | |
Unit-4 |
Teaching Hours:9 |
NATURAL LANGUAGE GENERATION AND MACHINE TRANSLATION
|
|
Natural Language Generation: Architecture of NLG Systems- Generation Tasks and Representations- Application of NLG. Machine Translation: Problems in Machine Translation- Characteristics of Indian Languages- Machine Translation Approaches-Translation involving Indian Languages.
| |
Unit-5 |
Teaching Hours:9 |
INFORMATION RETRIEVAL AND LEXICAL RESOURCES
|
|
Information Retrieval: Design features of Information Retrieval Systems-Classical, Non-classical, Alternative Models of Information Retrieval – valuation Lexical Resources: World Net-Frame Net- Stemmers-POS Tagger- Research Corpora. | |
Text Books And Reference Books:
| |
Essential Reading / Recommended Reading
| |
Evaluation Pattern CIA Weightage - 50% ESE Weightage - 50% | |
RCS381 - DISSERTATION (2017 Batch) | |
Total Teaching Hours for Semester:120 |
No of Lecture Hours/Week:4 |
Max Marks:200 |
Credits:10 |
Course Objectives/Course Description |
|
|
|
Course Outcome |
|
Successful completion of writing dissertation. |
Unit-1 |
Teaching Hours:120 |
Dissertation
|
|
Completion of dissertation as per the format | |
Text Books And Reference Books: 1. Reserarch Center MPhil Research Dissertation Format. | |
Essential Reading / Recommended Reading 1. Reserarch Center MPhil Research Dissertation Format. | |
Evaluation Pattern Proposal 25 Pre-submission 25 Adjudication 100 Viva 50 |