Department of computer Science & Information Technology
Syllabi for M. Tech. in Information Technology
Course Structure
Unit Course Name L T P CR
IT 401 Theoretical Foundation of IT 3 0 2 4
IT 402 Fundamentals of Computer Systems 3 0 2 4
IT 403 Fundamentals of Information Processing 3 0 2 4
IT 501 Advanced Database Systems 3 0 2 4
CS 521 Object Oriented Programming & Design 2 1 2 4
CS 507 Computer Networks 3 0 2 4
CS 505 Software Engineering 3 0 2 4
IT 502 Distributed Systems 3 0 0 3
IT 503 Multimedia Systems 3 0 2 4
CS 602 Image Processing 3 0 0 3
IT 504 E-Commerce 3 0 0 3
IT 505 Transmission of Information 3 0 0 3
CS 604 Optimization tTechniques 3 0 0 3
CS 506 Data Communication 3 0 0 3
CS 522 Computer Graphics 3 0 2 4
CS 523 Enterprise Resource Planning 3 0 0 3
CS 525 Artificial Intelligence 3 0 0 3
CS 601 Design & Analysis of Algorithms 3 0 0 3
IT 506 Logic Programming 3 0 0 3
IT 507 Computer Security & Cryptography 3 0 0 3
CS 526 Management Information System 3 0 0 3
IT 508 Micro Computer Based Design 2 0 4 4
IT 509 Data Mining & Data Warehousing 3 0 2 4
CS 606 Computer Architecture & Parallel Processing 3 0 0 3
IT 510 Advanced Operating Systems 3 0 2 4
CS 605 Simulation & Modelling 3 0 0 3
CS 603 Web Technology 2 0 2 3
IT 602 End-Term Project I 8
IT 603 End-Term Project II 16

IT 401 Theoretical Found.ation of IT 3-0-2 4
Unit 1 : Basics of Theory of Computation; Discrete Structure, Logic Automata, Computational Complexity
Unit 2 : Data Structure and Algorithms: Algorithm Design Techniques : Recursion, Iteration, etc. Static & Dynamic Data Structures
Unit 3 : Systems Software: Assembler, Debugger, Editors, Software Tools, etc.
[1] Trembley and Manohar, Discreta Mathematical Structues, Mc Gaw Hill
[2] C L Liu, Introduction to Mathematical Structues, Mc Gaw Hill
[3] C Papadimitou and C L Lewis, Elements of Theory of Computation, PHI, 1981
[4] Hopcroft & Ullman, Introduction to Automata Theory, Languages of Comp;utations, Add- Wesley, 1979
[5] R Kruse, B Leungf and C Tondo, Data Structure and Program Design in C, PHI (EEE)
[6] E Horowitz and S Sahni, Data Structure with Pascal, 3rd Ed. Galgotia, 1991
[7] Aho, Hopcroft and Ullman, Data Structures and Algorithms, Addison-Wesley Publishing Co.
[8] Thrembley and Sorenson, An Introduction to Data Structure with Aplications,McGraw Hill, 1985
[9] Dhamdhere, Systems Programming and Operating Systems, Tata Mc Graw Hill
IT 402 Fundamentals of Computer Systems 3-0-2 4
Unit 1 : Computer Organization and Architecture: CPU, Memory Organization, I/O Devices, Assembley Language Programming
Unit 2 : Operating Systems: Processor, I/O Management, File System, Memory Management Laboratory: Programming in Unix, Linux and NT
Unit 3 : Basics of Data Communications Techniques
[1] Hamacher, Vranesic and Zaky, computer Organization, McGraw Hill
[2] M M Mano, computer System Architecture, PHI (EEE)
[3] J Peterson, A Silberschatz and P Galvin, Operating System Concept, Addison-Wesley, 3rd Ed., 1989
[4] M J Bach, Design of Unix Operating System, PHI, 1986
[5] A Silberschatz and P Galvin, Operating System Concept, Addison-Wesley, 4th Ed., 1994
[6] Milenkovic, Operating System-Concept and Design, Mc Graw Hill
[7] Stalling, Data and Computer Communication, PHI (EEE)
[8] A S Tanenbaum, Computer Network, PHI (EEE)
IT 403 Fundamentals of Information Processing 3-0-2 4
Unit 1 : File Organization: Hashing, Indexing with B-Tree, B+ Tree, etc.
Unit 2 : Theoretical Foundation of Database Systems: ER & Relational Model, Algebra, SQL, Concurrency Control, Distributed Database, etc. Database Application Design Using Oracle, MS-Access, JDBC, etc.
Unit 3 : Compiler Construction Techniques, Lexical Analyzer, Parser, Intermediate Code Generation & Optimization, etc.
[1] R. El. Masi and S B Navathe, fundamentals of Data Base Systems, Benjamin Cummings, 1989.
[2] H F Korth and S Silberschatz, Database concepts, 2nd Edition, Mc Graw Hill , 1991.
[3] J.D. Ullman, Principal of Database and Knowledge base Systems, Vol I & II, Computer Science Press, 1988.
[4] I Bayros, Oracle Developer 2000, BPB Publication.
[5] Aho, A V Shethi and Ullman J D : Compiler Design
[6] A C Holub, Compiler Design in C: PHI 1993
IT 501 Advanced Database System 3-0-2 4
Review of ER/EER and other semantic data models; Network, Hierarchical and Ralational Data Models.
Query Processing: Various Operations such as Join, Selection, sorting, expression evaluation, etc
Concurrency Control Mechanism: Protocols, Multiple Granularity, Multi-version schemes, Deadlock handling,
Recovery: Recovery and atomicity, various techniques, buffer management, Advanced Recovery Techniques;
Database Security : Authentication, Various Access Control Mechanisms, etc
Distributed Databases:Distributed Query Processing, Transaction Model, deadlock handling, multi-database systems;
Object Oriented Database: OO Data Model e.g. UML, OO DBMS architectures, Client-Server Approach, Query Processing, Object Relational Databases
Spatial Databases: Data Models, various representation schemes, architectures, Query Processing, Storage Structures; Image and Multimedia Databases
1. Silberschatz and Korth, Database system concepts, McGraw Hill.
2. Elmasri and Navathe, Fundamentals of database systems; Narosa Publishing Co.
3. John G Hughes, Object Oriented Databases; Prentice Hall Int nl Series in Computer Science
4. Andleigh and Thakrar, Multimedia Systems Design, Prentice Hall PTR
5. R Raghuramakrishnan & J Gehrke, Database Management System
6. Alhir, UML: In A Nutshell, O Reilly
IT 502 Distributed System 3-0-0 3
Characterization of Distributed Systems, Design issues and user requirements. Interprocess Communication-Synchronous and Asynchronous, Client-server communication, Group communication.
Remote rocedure Call-Design issues & Implementation. Distributed S-Design issues & Implementation. File Services Design issues, Implementations and case studies. Name Service-Design issues and case studies. Time and Co-ordination Physical & Logical Clocks, Distibuted Co-ordination. Replicaton issues and implementations. Shared data and Trransactions, Distibuted tansactions, concurrency control. Recovery and Fault Tolerance. Security-Design issues and case studies.
Coulouris, Dollimore and Kindberg, Distributed Systems-Concepts and Design, Pearson Education Asia
P K Sinha, Distibuted Operating System, PHI, IEEE Press
Singhal and Shivaratri, Advanced Concepts in Operating Systems, TMH
Tanenbaum, Distributed Systems: Principles and Paradigms, Pearson Education
IT 503 Multimedia Systems 3-0-2 4
Concept of Multimedia Data; Various File Formats; Multimedia data Model e.g. RMDM
Compression & Decompression:
Binary Image compression: Various CCITT standards Color Image compression : JPEG Methodology, DCT, MPEG Methodology
Storage & Retrieval Merthods: Magnetic Media Technology, RAID Technology, Optical Media, Hierarchical Strage Management; Cache Management;
Architectural Issues: Specialized processor, Memory System, LAN-WAN connectivity, Client-Server approach; Distributed Multimedia System: various components;
Multimedia Authoring; Authoring Tools and their design issues, Hypermedia Application Design issues;
User Interface: Hypermedia Interface Design Issues;
1. Andleigh and Thakrar, Multimedia Systems Design, Prentice Hall PTR
IT 504 E-Commerce 3-0-0 3
Introduction to E-Commerce; Networking; Web Tools, recommerder System, Web Auctions, Information Retrieval, Agents for E-Commerce;
Electronic Payment System: iKP Protocols and other related protocols, security analysis;
S Garfinkel, Web Security and Commerce, O Reilley & Associates
P Greenspun, Phillip and Alexe s Guide to Web Publishing, Ap Professional
IT 505 Transmission of Information 3-0-0 3
Information Measure- noiseless coding, construction of optimal codes, discrete memoryless channel- channel capacity;
Fundamentals of Information Theory; Error Correcting Codes- Minimum distance principles, Hamming Bound, general Binary Code, Group Code, Linear Group Code, Convolution Encoding- Algenraic structures, Gilbert Bound, Threshold decoding for Block Codes, Cyclic Binary Codes- BCH Codes, Generalised BCH Codes and Decoding, Optimum Codes- Information rate, High-rate Volume Bound, Elias Bound, Asymptotic Error Bound.
Non-Cyclic Codes, Residue Codes, Reed Muller Codes, Orthogonalizable Codes- condition for complete orthogonalization;
Non-binary BCH Codes- non-binary coding, modulation schemes, Weight Function;
Lin S and D J Costello, Error Control Coding, Prentice Hall, New Jersey
Hamming R W, Coding and Information Theory, PHI
Khinehin A., Mathematical Foundations of Information Theory, PHI
IT 506 Logic Programming 3-0-0 3
Logic as a Language for Problem Solving, Sentence structure, Implication and Interface, General Structure and Computational Behaviour of Logic Programs, Procedural interpretation of Logic, Algorithmic view of logic program execution; Pragmatic and Stylistic considerations for structuring of program and data; Specification, Verification and synthesis of logic programs; Elementary features of typical logic implementations, Contribution of Logic Programming to Theory, practice and technology of computing.
Hogger C J, Introduction to Logic Programming, Academic Press
Bundy A., Computer Modelling of Mathematical Reasoning, Academic Press
Lloyd, J W., Foundations of Logic Programming, Springer Verlag
IT 507 Computer Security & Cryptography 3-0-0 3
Introduction to Cryptography, Mathematical Foundation of Cryptography : Information Theory, Complexity Theory, Number Theory, Probability Theory;
Secret Key Cryptosystem : Stream and Block Ciphers; Pseudo-random pattern generators, LFSR based stream ciphers, other stream ciphers; Correlation attacks and other relevant attacks for steam ciphers; DES and Its Security, other Block Ciphers; Differential Cryptanalysis, Attacks on Block Ciphers;
One-Way Hash Functions and Data Integrity: Snefru, MD4, MD5, SHA, HAVAL; Cryptanalysis of hash functions;
Public Key Cryptography: Mathematical Foundation, RSA, Security Analysis of RSA
Key Establishment Protocols: Symmetric key based and Asymmetric Key based protocols, KERBEROS, EKE, DH-EKE, PAKE, etc; Secret Sharing;
Digital Signature Schemes: RSA and other related signature schemes, Possible Attacks, DSA and other related signature schemes;
Manezes, Oorschot and Vanstone, Handbook of Applied Cryptography, CRC Press
B Schnier, Applied Cryptography, PHI
IT 508 Micro Computer Based Design 2-0-4 4
Introduction to microprocessors; typical 8-bit and 16-bit microprocessors and their evaliuation;
Micro-computer programming methodologies;
Memory and I/O Interfacing; Peripheral Devices;
Introduction to DOS, Assembly Language Programming;
IBM PC: Architectural Issues, Intel family of processors, Concept of Co-processors; programming standards, typical uses;
Micro-controllers: Introduction, architecture, uses;
Typical examples of micro-computer based design for applications in Science, Business and Industries;
Yu-Cheng & Gibson G A, Microcomputer System- The 8086/8088 Family, PHI
Nyatt A L., Using Assembly Language, Microtech Publication
Hall, D V., Microprocessors and Interfacing, McGraw Hill
IT 509 Data Mining & Data Warehousing 3-0-2 4
Data Warehousing
Concept of Data Warehouse, Differences between Operational Databases and Date Warehouse, Multi-dimensional Data Model, Schemas for Multi-dimensional Databases, Data Cube Representations, Data Warehouse Architecture, OLTP vs OLAP, Efficient Query Processing in data Warehouses, Indexing of OLAP data, Meterialization concept;
Data Mining
Data Clustering: Partitioning, Hierarchical, Density-based, Grod Based and Model Based Methods;
Classification & Prediction: Decision Tree Techniques, Back-Propagation Method, Bayesian Method
Association Rule Mining Techniques: Frequent Itemset Generation, Apriori, Horizontal Method, Sampling Approach, Hashing Approach; Dynamic Association Rule Mining;
Mining of Complex Types of Data: Mining of Spatial Databases, Multimedia Databases, Time-series and sequence Data, Text Databases, WWW Data;
Jiawei Han and Micheline Kamber,
Data Mining: Concepts and Techniques, Morgan Kaufmann, India
A K Pujari, Data Mining Techniques, University Press, India
Han, Manilla and Smyth, Principles of Data Mining , PHI, India
IT 510 Advanced Operating Systems 3-0-2 4
Multirocessor issues: Threads-usage, design issues and Implementation, synchronization primitives. Processor Management & Scheduling, Memory management.
Real-time operation System: Design issues and Implementation
Advance Programming Laboratory in UNIX: Drivers, scheduler, threads, IPC, file system.
Tanenbaum, Modern Operating Systems, PHI (EEE)
Milenkovic, Operating Systems: Concepts and Design, McGraw Hill.
Sillberschatz et. al, Operating Systems.
W.R. Steveans, Advanced Progamming in the UNIX Environment, Addison Wesley.
M.J. Bach, The Design of the UNIX Operation System, PHI(EEE).
6. Singhal and Shivaratri, Advanced Concepts in Operating Systems, TMH
IT 512 Object Oriented Programming & Design 2-1-2 4
Part I: Object Oriented Programming
Structured Programming and Object Oriented Programming paradigms.
Data Abstraction : Class, object, constructors, destructors, memory allocations for objects, member functions, friend functions, templates.
Inheritance : Single & multiple inheritance, virtual base class.
Polymorphism : Compile time polymorphism : operator overloading, function overloading, static bending.
Runt-time polymorphism : Virtual function, pure virtual function, abstract class, dynamic binding.
Exception handling.
Part II: Object Oriented Design
Object Oriented Design Approaches, Object Modeling Techniques (OMT) tools : Object Model, Dynamic Model, and Functional Model. (Objet Diagram, State Diagram, and DFD).
Phases of Object-Oriented Development: Object Analysis, System Design, Object Design.
1. Herbert Schild : The Complete Reference to C++, Osborne McGrawHill.
2. Rambaugh et al. : Object Oriented Modeling and Design, PHI(EEE).
IT 513 Computer Networks 3-0-2 4
Review of Computer Network Architecture and the Subnet layers.
Transport Layer: Connection management, Quality of Service, TCP/IP Protocol, ATM.
Session Layer : Session establishment and maintenance, Dialogue management, Recovery.
Presentation Layer : XDR, ASN.1, NDR; Message Security and Authentication Techniques, Encryption algorithms, Data Compression Algorithms- Run length encoding, DPCM, Dictionary-based methods, Image compression- JPEG, Video compression- MPEG;
Applications: E-mail, Remote login, File transfer, Network file system, Network management.
UNIX network programming with TCP/IP; Network File System, Novell Netware, and Windows NT installation, configuration and use.
1. Tanenbaum A.S., Computer Network, 3e, PHI (EEE).
2. Stalling W, Data and Computer Communication, 5e, PHI (EEE).
3. Peterson L L, Davie B S, Computer Networks: A Systems Approach, Morgan Kaufmann Publishers Inc.
3. Stevens, UNIX Network Programming, PHI (EEE).
4. Comer, TCP/IP Programming Vol.- I, II, III, PHI(EEE).
IT 514 Software Engineering 3-0-2 4
Introduction to software engineering, concept of a software project, size factor, quality and productivity factor, different phase of a software development life cycle, managerial issues.
Software project planning: Problem definition, development of a solution strategy, development process planning, software development models and their comparative study; Organizational structure planning, project formats and team structures; Planning for quality assurance and configuration management; Planning for verification and validation.
Software economics: Cost estimation and evaluation techniques, cost estimation based on COCOMO model and Raleigh model.
Software requirements analysis and specifications techniques- their notations & languages .
Software design: Concept of fundamental design; Design approaches- top-down & bottom-up, structured, object-based & object oriented design; Design specification and notations.
Software implementation: Structured coding techniques, coding styles, and standards; Guidelines for coding and documentation.
Software verification and validation: Theoretical foundation, black box and white box approaches; Integration and system testing.
Software reliability: Definition and concept of reliability, software faults, errors, repair and availability, reliability and availability models.
Case studies.
1. Pressman, R.S., Software Engineering: A Practitioner s Approach, McGraw Hill.
2. Shooman, M, Software Engineering, McGraw Hill.
3. Fairley, R.E., Software Engineering Concepts, McGraw Hill.
IT 515 Artificial Intelligence 3-0-0 3
Introduction: AI problem; AI techniques, problem as a state space search, Production Systems, Issues in design of search programs.
Heuristic Search Techniques : Generate and test, Hill Climbing, Best-First Search, Problem reduction, Means- Ends analysis.
Knowledge Representation : Knowledge representation issues, Predicate logic, knowledge representation using rules, weak slot-and-Filler structure.
Natural Language Processing : Syntactic processing, semantic analysis, Discourse and pragmatic processing.
Expert Systems : Representation using domain knowledge, Expert System shell, knowledge acquisition.
1. Artificial Intelligence : E. Rich & K. Knight : Tata McGraw Hill.
2. Principles of Artificial Intelligence : N.J. Nilson; Narosa Pub. House.
IT 516 Design & Analysis of Algorithm 3-0-0 3
Review of basic data structures such as stack, queue, linked list, trees and graphs.
Concepts in algorithm analysis, Asymptotic complexity.
Domain independent algorithm design techniques such as divide and conquer, greedy method, dynamic programming, back tracking, branch and bound.
Example algorithms for above techniques from sets, graphs, text processing, internal and external sorting, height balanced trees, B-trees, hashing algorithms, dynamic storage allocation, garbage collection.
Lower bound theory and NP-hard problems.
1. Corman et al., Introduction to Algorithms, McGrawHill.
2. Aho A, Hopcroft J., Ullman J., The Design and Analysis of Algorithms, Addison- Wesley.
IT 517 Pattern Recognition 3-0-2 4
Unit 1 : Bayes Decision Rules for two Class problem, Bayes maximum likelihood rule, minimum distance classifier, error probabilities for classifier, Mahalanobis distance, Bound for error probabilities, Estimation of parameters, Learning.
Unit 2 : Single layer perceptron
Unit 3 : Clustering, Minimum within cluster distance critewrion, k-menas algorithm single linkage, complete linkage and average linkage algorithms, Isodata algorithm etc.
Unit 4 : Feature Selection
Algorithms for feature selection such as Branch and Bound, Sequential forward and backward selections, GSFS and GSBS, (L, R) algorithm.
Criterion function: Probabilistic Separability criterion, error probability based criterion, entropy based criterion, minimum within class distance based criterion, probabilistic independence.
Principal Component Analysis
Unit 5 : Fuzzy Set-theoretic Pattern Recognition
Usual Fuzzy set theoretic operations union, intersection etc.
Multitvalued Logic: Zade Compositional Rule of inference
Fuzzy C-means algorithm
Supervised Classification: Multitvalued Recognition System
Fuzzy set theoretic based feature selection criteria
Unit 6 : Applications will be dealt with appropriating classification errors such as commission and Omission.
Duda and Hart, Pattern Classification ad Scene Analysis , John Willey, 1990
P.A. Devijver and J. Kittler, Pattern Recognition: A Statistical Approach , 1983
K. Fukunga, Introduction to Statistical Pattern Recognition , Academic Press
S.K. Pal and Dutta Mazumdar, Fuzzy Set Theroetic Methods for Patern Recognition , John Willey, 1998.
IT 602 End-Term Project I 8
IT 603 End-Term Project II 16

Syllabus in Word Format