Master of Technology
(Computer Science & Engineering)






















Guru Gobind Singh Indraprastha University

Kashmere Gate, Delhi – 110403 [INDIA]


Eligibility Condition


B. Tech / B.E in Electronics & Communication / Electronics / Computer Science / Information Technology or equivalent degree with 60% marks.


M Sc. In Electronics/Informatics with 60% marks.



Admission Procedure


Admission will be made on the basis of GATE score in the relevant field.


If seats remain vacant after admitting the students with valid GATE score, then the admission will be made on the basis of merit of the qualifying marks subject to minimum 60% marks in the qualifying degree.

Master of Technology

(Computer Science & Engineering)


First Semester


Code No.





Theory Papers




Algorithm Analysis & Design





Software Engineering





Advanced Computer Architecture





Advanced Computer Networks




Electives (chose any one)




DSD using VHDL





Data Base Management systems





Communication Systems





Advanced Computer Graphics





Programming Language








Algorithm Analysis Lab





Software Engineering Lab





Advanced Computer Network Lab





Lab based on Elective












NOTE:            The subject marked with (*) have been coded uniformly across M. Tech (IT) and M. Tech (CSE). Minor modifications have been done in the course contents and syllabi of these subjects.

Master of Technology

(Computer Science & Engineering)


Second Semester


Paper Code



Object Oriented software Engineering






Advanced Data Base Management System






Enterprise Computing in JAVA





Electives (Choose any Two)



Embedded System Design using 8051





Wireless Mobile Networks






Digital Signal Processing






Neural Networks






Network Programming






Fuzzy Logic & Design






Genetic Algorithms






AI and Applications






Project Work




















Java based lab






Lab based on elective














Master of Technology

(Computer Science & Engineering)


Third Semester


Paper Code


Multimedia Technology





Network Management & Security




Electives (Choose any Two)


Software Testing





Cellular & Mobile Communication





Distributed Computing





Digital Image Processing





Information Storage & Management





Advanced Software Project Management





Data Warehousing & Data Mining





Soft Computing





Bluetooth Technology





Cyber Crime Investigations and Cyber Forensics






Multimedia Lab










Lab based on Elective(s)





Minor Project Work













Master of Technology

(Computer Science & Engineering)

Fourth Semester


Paper Code

L / P


ITR - 752




ITR – 754*

Seminar & Progress Report










*Non University Exam System





  1. The total number of credits of the Programme M. Tech. = 104.
  2. Each student shall be required to appear for examination in all courses. However, for the award of the degree a student shall be required to earn the minimum of 100 credits.



ITR-601           Algorithm Analysis & Design                                  L          T/P      C

                                                                                                            4          0          4


Unit 1-  Introduction to Algorithm, The role of algorithms in computing, Asymptotic notation, asymptotic analysis of recurrence relations, probabilistic analysis and randomized algorithm, the hiring problem, indicator random variables

Divide and conquer paradigm – Merge sort, Inversion counting

Dynamic Programming – Matrix Chain multiplication, Longest Common subsequence, optimal binary search trees

Greedy Algorithm –Activity Selection problem, Theoretical foundation of greedy algorithm, Task Scheduling problem, Comparison of dynamic programming and Greedy algorithm with Knapsack as case study


Unit 2- Graphs: Review of Graphs (Representation, Depth First Search, Breath First search, Kruskal and Prim Algorithm, Dijkstra’s Algorithm)

Flow networks:  Ford-Fulkerson method, comparison Networks, Zero-one Principle, Bitonic Sorting Network, Merging Network, Sorting Network


Unit 3 : Matrix Operation (Properties, Strassen’s Algorithm, Solution of linear equation, Matrix inversion)

Polynomial and FFT, Representation of polynomials, The DFT and FFT, efficient FFT implementation

Number–Theoretic Algorithm, Elementary number-theoretic notion, Greatest common divisor, modular arithmetic, solving modular linear equation, the Chinese remainder theorem



Unit 4 - NP-Completeness, Polynomial time, Polynomial time verification, NP-completeness and reducibility, NP-Completeness proofs

Approximation Algorithms- the vertex-cover problem, The Traveling-Salesman Problem, The set covering problem




Text Books:

1.         T. H. Cormen, C. E. Leiserson, R.L. Rivest, C. Stein, “Introduction to Algorithms”, 2nd Edition, PHI.


Reference Books:

1.         A.V. Aho, J. E. Hopcroft, J.D. Ulman, “The Design & Analysis of Computer Algorithms”, Addison Wesley.

2.         V. Manber, “Introduction to Algorithms – A Creative Approach”, Addison Wesley.

3.         Ellis Harwitz and Sartaz Sahani, “Fundamentals of Computer Algorithms”, Galgotia.

ITR-603                      Software Engineering                                    L          T/P      C

                                                                                                            4          0          4


Software Crisis, Software Processes & Characteristics, Software life cycle models, Waterfall, Prototype, Evolutionary and Spiral Models, Overview of Quality Standards like ISO 9001, SEI – CMM.


Software Requirements analysis & specifications:

Requirement engineering, requirement elicitation techniques like FAST, QFD & Use case approach, requirements analysis using DFD, Data dictionaries & ER Diagrams, Requirements documentation, Nature of SRS, Characteristics & organization of SRS.


Software Project Planning:

Size Estimation like lines of Code & Function Count, Cost Estimation Models, Static single & Multivariable Models, COCOMO, COCOMO-II, Putnam resource allocation model, Risk Management.


Software Design:

Cohesion & Coupling, Classification of Cohesiveness & Coupling, Function Oriented Design, Object Oriented Design, User Interface Design.


Software Metrics:

Software measurements: What & Why, Token Count, Halstead Software Science Measures, Design Metrics, Data Structure Metrics, Information Flow Metrics


Software Testing:

Testing process, Design of test cases, functional testing: Boundary value analysis, Equivalence class testing, Decision table testing, Cause effect graphing, Structural testing, Path Testing, Data flow and mutation testing, Unit Testing, Integration and System Testing, Debugging, Alpha & Beta Testing, Regression Testing, Testing Tools & Standards.


Software Reliability:

Importance, Hardware Reliability & Software Reliability, Failure and Faults, Reliability Models, Basic Model, Logarithmic Poisson Model, Calender time Component.


Software Maintenance:

Management of Maintenance, Maintenance Process, Maintenance Models, Reverse Engineering, Software Re-engineering, Configuration Management, Documentation.


Test Books:

1.             K. K. Aggarwal & Yogesh Singh, “Software Engineering”, New Age International, 2001.

2.             R. S. Pressman, “Software Engineering – A practitioner’s approach”, 5th Ed., McGraw Hill Int. Ed., 2001.

Reference Books:

1.             R. Fairley, “Software Engineering Concepts”, Tata McGraw Hill, 1997.

2.             P. Jalote, “An Integrated approach to Software Engineering”, Narosa, 1991.

3.             Stephen R. Schach, “Classical & Object Oriented Software Engineering”, IRWIN, 1996.

4.             James Peter, W. Pedrycz, “Software Engineering”, John Wiley & Sons., 1999

5.             I. Sommerville, “Software Engineering”, Addison. Wesley, 1999

ITR-605                      Advanced Computer Architecture                L          T/P      C

                                                                                                4          0          4

Parallel computer models:

The state of computing, Classification of parallel computers, Multiprocessors and multicomputers, Multivector and SIMD computers.


Program and network properties:

Conditions of parallelism, Data and resource Dependences, Hardware and software parallelism, Program partitioning and scheduling, Grain Size and latency, Program flow mechanisms, Control flow versus data flow, Data flow Architecture, Demand driven mechanisms, Comparisons of flow mechanisms


System Interconnect Architectures:

Network properties and routing, Static interconnection Networks, Dynamic interconnection Networks, Multiprocessor system Interconnects, Hierarchical bus systems, Crossbar switch and multiport memory, Multistage and combining network.


Advanced processors:

Advanced processor technology, Instruction-set Architectures, CISC Scalar Processors, RISC Scalar Processors, Superscalar Processors, VLIW Architectures, Vector and Symbolic processors



Linear pipeline processor, nonlinear pipeline processor, Instruction pipeline Design, Mechanisms for instruction pipelining, Dynamic instruction scheduling, Branch Handling techniques, branch prediction, Arithmetic Pipeline Design, Computer arithmetic principles, Static Arithmetic pipeline, Multifunctional arithmetic pipelines


Memory Hierarchy Design:

Cache basics & cache performance, reducing miss rate and miss penalty, multilevel cache hierarchies, main memory organizations, design of memory hierarchies.


Multiprocessor architectures: 

Symmetric shared memory architectures, distributed shared memory architectures, models of memory consistency, cache coherence protocols (MSI, MESI, MOESI), scalable cache coherence, overview of directory based approaches, design challenges of directory protocols, memory based directory protocols, cache based directory protocols, protocol design tradeoffs, synchronization,


Scalable point – point interfaces:

Alpha364 and HT protocols, high performance signaling layer.


Enterprise Memory subsystem Architecture:

Enterprise RAS Feature set: Machine check, hot add/remove, domain partitioning, memory mirroring/migration, patrol scrubbing, fault tolerant system.


Text Books: 

1.         Kai Hwang, “Advanced computer architecture”; TMH. 2000

2.         D. A. Patterson and J. L. Hennessey, “Computer organization and design”, Morgan Kaufmann, 2nd Ed. 2002

Reference Books:

1.         J.P.Hayes, “computer Architecture and organization”; MGH. 1998

2.         Harvey G.Cragon,”Memory System and Pipelined processors”; Narosa Publication. 1998

3.         V.Rajaranam & C.S.R.Murthy, “Parallel computer”; PHI. 2002

4.         R.K.Ghose, Rajan Moona & Phalguni Gupta, “Foundation of Parallel Processing”, Narosa Publications, 2003

5.         Kai Hwang and Zu, “Scalable Parallel Computers Architecture”, MGH. 2001

6.         Stalling W,  “Computer Organisation & Architecture”, PHI. 2000

7.         D.Sima, T.Fountain, P.Kasuk, “Advanced Computer Architecture-A Design space Approach,”Addison Wesley,1997.

8.         M.J Flynn, “Computer Architecture, Pipelined and Parallel Processor Design”; Narosa Publishing. 1998

9.         D.A.Patterson, J.L.Hennessy, “Computer Architecture :A quantitative approach”; Morgan Kauffmann feb,2002.

10.        Hwan and Briggs, “ Computer Architecture and Parallel Processing”; MGH. 1999



ITR- 607                     Advanced Computer Networks                     L          T/P      C

                                                                                                            4          0          4




Introduction to Network models-ISO-OSI, SNA, Appletalk and TCP/IP models. Review of  Physical layer and Data link layers, Review of LAN (IEEE 802.3, 802.5, 802.11b/a/g, FDDI) and WAN (Frame Relay, ATM, ISDN) standards.


Network layer

ARP, RARP, Internet architecture and addressing, internetworking,  IPv4, overview of IPv6, ICMP,  Routing Protocols- RIP, OSPF, BGP, IP over ATM.


Transport  layer

Design issues, Connection management, Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Finite state machine model.


Application layer

WWW, DNS, e-mail, SNMP, RMON


Network Security: Cryptography, Firewalls, Secure Socket Layer (SSL)  and Virtual Private Networks (VPN).


Case study


Study of various network simulators, Network performance analysis using NS2



1.         Behrouz A. Forouzan, “TCP/IP Protocol Suit”, TMH, 2000.

2.         Tananbaum A. S., “Computer Networks”, 3rd Ed., PHI, 1999.



1.         Black U, “Computer Networks-Protocols, Standards and Interfaces”, PHI, 1996.

2.         Stallings W., “Data and Computer Communications”, 6th Ed., PHI, 2002.

3.         Stallings W., “SNMP, SNMPv2, SNMPv3, RMON 1 & 2”, 3rd Ed., Addison Wesley, 1999.

3.         Laurra Chappell (Ed), “Introduction to Cisco Router Configuration”, Techmedia, 1999.


ITR-609          DSD using VHDL                                                      L          T/P      C

                                                                                                            4          0          4                     


Gajski’s ‘Y’ chart, Introduction to HDL languages, VHDL, Verilog, key differences, structural, sequential construct, concurrent construct.

VHDL Overview and concept: VHDL object classes, VHDL Design Unit, identifier, operators, Data types, behavioral, and data flow modeling, Concurrent and sequential statements


VHDL for combinational circuits: Assignment statement, selected signal statement, conditional signal assignment, Designing of basic combinational circuit: Multiplexer, Decoders, Encoders, Code converter, Comparator, Structural modeling: component declaration & instantiation, Signal and Variables, Attributes, Block statements, Generics, Generate statement, VHDL Timing: WAIT statements, simulation engine, modeling with delta time delays,


Sequential Circuits: process, if, case, Loop, Designing FF, Mealy state model, Design of FSM using VHDL, VHDL code of moore-type FSMs, synthesis of VHDL code, Specifying the state assignment in VHDL code, Specification in Mealy FSM using VHDL, Mealy-type FSM for serial adder, Moore type FSM for serial adder, State minimization, Design of Counters using sequential circuit approach, Algorithm state Machine,


Testbenches: Testbench modeling, Testbench architecture,

Register Transfer Level Design: RTL Design Method, Organization of system, specification of RTL System, Data Subsystem, Control Subsystem, Microprogrammed controller: structure and format, Microinstruction timing, study of FIR filter Design Example



1.         Circuit Design with VHDL by Volnei A. Pedroni, PHI, 2005

2.         Digital Logic Design with VHDL by Stephen Brown and Zvonko Vranesic, TMH, 2007

Reference Books:

1.         A VHDL Primer by J. Bhaskar, Pearson Education, 1999.

2.         Digital Design by Frank Vahid, Wiley, 2006

3.         VHDL Coding Styles and Methodology by Ben Cohen, Springer India, 2005

4.         Digital System Design with VHDL and synthesis by K.C. Chang, Wiley, 2005

5.         Introduction to Digital Systems by M. Ercegovac, T. Lang and L.J. Moreno, Wiley,2000

6.         Digital System Design using VHDL by C. H. Roth, Thomson Learning, 2006


ITR-611          Data Base Management Systems                            L          T/P      C

                                                                                                            4          0          4

Basic concepts: 

Database & database users, characteristics of the database, database systems, concepts and architecture, date models, schemas & instances, DBMS architecture & data independence, database languages & interfaces, data modelling using the entity-relationship approach. Overview of hierarchical, Network & Relational Data Base Management Systems.


Relational model, languages & systems:

Relational data model & relational algebra: relational model concepts, relational model constraints, relational algebra, SQL- a relational database language: date definition in SQL, view and queries in SQL, specifying constraints and indexes in sql, a relational database management systems.


Oracle Architecture, Logical Data Structures Physical Data Structure, Instances, Table Spaces, Types of Tablespaces, Internal Memory Structure, Background Processes, Data Types, Roles & Privileges, Stored Procedures, User Defined Functions, Cursors, Error Handling, Triggers.


Relational data base design:

Function dependencies & normalization for relational dataases: functional dependencies, normal forms based on primary keys, (1NF, 2NF, 3NF & BCNF), lossless join and dependency preserving decomposition. 


Concurrency control & recovery techniques: 

Concurrency control techniques, locking techniques, time stamp ordering, granularity of data items, recovery techniques: recovery concepts, database backup and recovery from catastrophic failures.


Concepts of object oriented database management systems, Distributed Data Base Management Systems.


Text Books:

1.         Silberscatz, Korth, Sudarshan, “Database System Concepts”, Mcgraw Hill, 6th 

Edition, 2006

2.         Elmarsi, Navathe, Somayajulu, Gupta, “Fundamentals of Database Systems”, 4th

Edition, Pearson Education, 2007

 Reference Books:

1.         Date, Kannan, Swaminathan, “An Introduction to Database Systems”, 8th Edition

Pearson Education, 2007

2.         Singh S.K., “Database System Concepts, design and application”, Pearson


3.         Ullman, J. D., “Principals of database systems”, Galgotia publications, 1999

4.         Rob, Coronell, “Database Systems Design, Implementation and Management”, 5th edition, Thomson Course Technology, 2003. 

5.         Oracle Reference Manual.

6.         Michael J. Donahoo, Gregory D. Speegle,”SQL practical guide for developers”, Elsevier Inc., 2005

7.         Sams Teach yourself MySQL in 21 days, 2nd edition, Pearson Education, 2004.

ITR-613          Communication Systems                                           L          T/P      C

                                                                                      4        0        4                

Analog Modulation Methods:

Amplitude Modulation: Generation & Demodulation of AM waves, DSBSC waves, Coherent Detection of DSBSC signal, Angle Modulation: Frequency & Phase Modulation, BW of FM waves, Generation & Demodulation of FM waves, Comparison of AM, FM & PM.


Pulse Analog Modulation:

Sampling theorem, Sampling of Low Pass and Band pass signals, Aliening, Aperture effect, PAM, PWM and PPM generation and demodulation, TDM.


Pulse Digital Modulation:

Pulse code modulation signal to quantization noise ratio, companding, DPCM, Prediction Filter, DM and ADM modulators and demodulators, Data Modem, Data encoding methods, ASK, FSK, PSK, QAM, M-ary systems, line coding, Inter symbol Interference, Multiplexing methods: time division multiplexing (TDM), STDM, CDMA, FDM.


Introduction to Information Theory:

Discrete messages, The concept of amount of information, Entropy, Information rate, mutual information, Shannon’s source coding Theorem, Huffman code, Lempel –ziv code, .channel coding and channel capacity theorem. Coding to increase average information per bit, Shannon’s theorem, Capacity of a Gaussian channel, Bandwidth – S/N tradeoff, use of orthogonal signals to attain Shannon’s limit.


Text Books:

1.         Taub and Schiling, “Principles of Communication Systems”, TMH, 2nd Edition, 2001

2.         S. Haykin, “Analog and Digital Communication”, Wiley., 2002


Reference Books:

1.         Hancocok J. C., “An Introduction to the Principles of Communication Theory”, TMH, 2002

2.         Tomasi, “Electronic Communication Systems”, 4th ed., Pearson Education, 2001

3.         William Stallings – Data & Computer Communications, PHI (6th Ed.,),

4.         Forouzan – Data Communication & Networking, McGraw Hill, 2nd Edition, 1999


ITR – 615                   Advanced Computer Graphics                      L          T/P      C                                                                                                                     4          0          4                     


Line Drawing and transformation:

Basic raster graphical algorithm for 2D primitives, Line drawing algorithm, 2D and 3D transformation



Window, Viewport, Clipping algorithm,


Curves and Surfaces:

Circle drawing algorithm, Ellipse drawing algorithm, Bezier curve, b-spline curve, surfaces, Solid modelling



Parallel projection, Perspective projection , Computation of vanishing point



Visible surface determination:

Z-buffer algorithm, Scan line algorithm, Area subdivision algorithm, Raytracing algorithm



Illumination mode, Specular reflection model, Shading models for curve surfaces, Radiosity method, Rendering, Recursive ray tracing, Texture mapping


Advanced Modelling Techniques

Procedural  Models,Fractal Models,Grammar based models,particle systems.



3D animation, morphing, simulation of key frames 


Text Books:

1.         Foley - Computer Graphics Principles & Practice, 2nd ed. Pearson Education., 2000

2.         Hearn & Baker - Computer Graphics C version, 2nd ed. Pearson Education., 1986



1.         Roger and Adams - Mathematical Element for Computer Graphics, 2nd ed., Tata McGraw Hill, 1989

2.         David F. Rogers, “Procedural Element for computer graphics”, McGraw Hill Book Company, 1985.

ITR-617          Programming Languages                                           L          T/P      C

                                                                                                            4          0          4


Programming Domains. Language evaluation. Evolution of major programming languages. Describing Syntax and Semantics. Formal methods of Describing Syntax and semantics. Backus Naur Form. Attribute grammars. Describing semantics - Denotational semantics. Data types and ariables - Names - variables . Scope and lifetime. Expression and assignment Statements.


Control structures. Subprograms - parameter passing - overloading - generic subprograms, Data abstraction and Encapsulation. Polymorphism and inheritance. Features of object oriented Languages. Smalltalk, C++ and JAVA. Design and implementation issues. Exception handling. Constructs for concurrency


Functional programming languages - Lambda calculus- Introduction to pure LISP. Applications of functional programming languages.


Logic programming languages- a brief introduction to predicate calculus - Horn clauses - Logic programming. Introduction to prolog. Applications of Logic programming.


Text Books:

1.         Terence W. Pratt, "Programming Languages", Prentice Hall, Ninth edition 1996

2.         Ravi Sethi, "Programming Languages-concepts and constructs", Addison Wesely, Second Edition, 1996



1.         Bjarn Stroustrup, "Design and Evolution of C++", Addison Wesley, 1991

2.         Michael J.Gordon, "Programming language Theory and its implementation", Prentice Hall, 1991

ITR-651          Algorithm Analysis Lab                         L          P          C

                                                                                      0        2        1



ITR-653          Software Engineering Lab                                 L          P          C

                                                                                      0        2        1



ITR-655          Advanced Computer Network Lab                   L          P          C

                                                                                      0        2        1


ITR-657          Lab based on Elective                                       L          P          C

                                                                                      0        2        1                          



ITR 602                      Object Oriented Software Engineering         L          T/P      C

                                                                                                4          0          4


Introduction to Software Engineering:

Software Engineering Development, Software Life Cycle Models, Standards for developing life cycle models.


Object Methodology & Requirement Elicitation:

Introduction to Object Oriented Methodology, Overview of Requirements Elicitation, Requirements Model-Action & Use cases, Requirements Elicitation Activities, Managing Requirements Elicitation



Model Architecture, Requirements Model, Analysis Model, Design Model, Implementation Model, Test Model


Modeling with UML:

Basic Building Blocks of UML, A Conceptual Model of UML, Basic Structural Modeling, UML Diagrams


System Analysis:

Analysis Model, Dynamic Modelling & Testing


System Design:

Design concepts & activities, Design models, Block design, Testing


Testing Object Oriented Systems:

Introduction, Testing Activities & Techniques, The Testing Process, Managing Testing, State Based testing and Data flow testing for Classes.

Component Based Computing

Fundamentals: Definition and nature of components, components and interfaces, Interfaces as contracts, the benefits of components.

Basic Techniques: component design and assembly, Relationship with the client-server model and with patterns, Use of objects and object lifecycle services, use of object brokers


Case Studies


Text Books:

1.             Ivar Jacobson “Object Oriented Software Engineering: A Use Case Driven Approach”,  Addison-Wesley, 2002

2.             Grady Booch “Object-Oriented Analysis and Design with Applications”, 2/E, Addison-Wesley Professional, 2005

Reference Books:

1.             Stephen R. Scach, “Object Oriented and Classical Software Engineering” 7/E Tata McGraw Hill, 1999

2.             Booch, Rumbaugh & Jacobson “The Unified Modeling Language User Guide”, Addison-Wesley 2005

3.             Bernd Bruegge, Allen H. Dutoit “Object Oriented Software Engineering: Using UML, Patterns and Java” 2/E Pearson Education.

4.             Timothy C. Lethbridge, Robert Laganiere “Object oriented Software Engineering: Practical Software development using UML and Java” McGraw Hill

5.             Edwards Yourdon, Carl Argila “Case Studies in Object Oriented Analysis and Design” Prentice Hall.

ITR-614                      Advanced Database Management Systems L         T/P      C

                                                                                                 4         0          4                     


Relational Databases

Integrity Constraints revisited, Extended ER diagram, Relational Algebra & Calculus, Functional, Muiltivalued and Join Dependency, Normal Forms, Rules about functional dependencies.


Query Processing and Optimization

Valuation of Relational Operations, Transformation of Relational Expressions, Indexing and Query Optimization, Limitations of Relational Data Model, Null Values and Partial Information.


Deductive Databases

Datalog and Recursion, Evaluation of Datalog program, Recursive queries with negation.


Objected Oriented and Object Relational Databases

Modeling Complex Data Semantics, Specialization, Generalization, Aggregation and Association, Objects, Object Identity, Equality and Object Reference, Architecture of Object Oriented and Object Relational Databases


Parallel and Distributed Databases

Distributed Data Storage – Fragmentation & Replication, Location and Fragment Transparency Distributed Query Processing and Optimization, Distributed Transaction Modeling and concurrency Control, Distributed Deadlock, Commit Protocols, Design of Parallel Databases, Parallel Query Evaluation.


Advanced Transaction Processing

Nested and Multilevel Transactions, Compensating Transactions and Saga, Long Duration Transactions, Weak Levels of Consistency, Transaction Work Flows, Transaction Processing Monitors.


Active Database and Real Time Databases

Triggers in SQL, Event Constraint and Action: ECA Rules, Query Processing and Concurrency Control, Compensation and Databases Recovery


Image and Multimedia Databases

Modeling and Storage of Image and Multimedia Data, Data Structures – R-tree, k-d tree, Quad trees, Content Based Retrieval: Color Histograms, Textures, etc., Image Features, Spatial and Topological Relationships, Multimedia Data Formats, Video Data Model, Audio & Handwritten Data, Geographic Information Systems (GIS)


WEB Database

Accessing Databases through WEB, WEB Servers, XML Databases, Commercial Systems.


Data Mining

Knowledge Representation Using Rules, Association and Classification Rules, Sequential Patterns, Algorithms for Rule Discovery


Data Warehousing

Data Warehousing Architecture, Multidimensional Data Model, Update Propagation OLAP Queries.


Case Study: Oracle Xi


Text Books:

1.         Elmarsi, Navathe, Somayajulu, Gupta, “Fundamentals of Database Systems”, 4th

Edition, Pearson Education, 2007

2.         Garcia, Ullman, Widom, “Database Systems, The complete book”, Pearson

Education, 2007

3.         R. Ramakrishnan, “Database Management Systems”, McGraw Hill International Editions, 1998



1.         Date, Kannan, Swaminathan, “An Introduction to Database Systems”, 8th Edition

Pearson Education, 2007

2.         Singh S.K., “Database System Concepts, design and application”, Pearson

            Education, 2006.

3.         Silberscatz, Korth, Sudarshan, “Database System Concepts”, Mcgraw Hill, 6th 

Edition, 2006

4.         W. Kim, “Modern Database Systems”, 1995, ACM Press, Addision – Wesley,

5.         D. Maier, “The Theory of Relational Databases”, 1993, Computer Science Press, Rokville, Maryland

6.         Ullman, J. D., “Principals of database systems”, Galgotia publications, 1999

7.         Oracle Xi Reference Manual


ITR - 630                    Enterprise Computing in JAVA                    L          T/P      C                                                                                                         4          0          4         


J2EE: Introduction to J2EE, Building J2EE Applications, JDBC, Servlets and Web Applications, Java Server Pages and Model/View/Controller, J2EE Web Services Overview, Introduction to EJB, Session EJBs, Entity EJBs, JMS and message driven Beans, Transactions and Security, Application Servers (Case Study of any one of IBM Websphere, BEA Weblogic, JBoss)


Hibernate: Principles of Object Relational Mapping, Hibernate configuration, HQL making objects persistent, Hibernate semantics, Session management, flushing, concurrency and Hibernate, Optimistic and Pessimistic Locking, Object mapping Mapping simple properties, Single and multi valued associations, Bi-directional associations, Indexed collections, Using Hibernate Template, Querying, Session management, Transaction integration and demarcation.


Spring: Introduction of Spring Framework: Spring Architecture, Spring Framework definition, Spring & MVC, Factory Pattern, BeanFactory, Spring Context definition, Inversion of Control (IoC), Spring AOP, Application Context and BeanFactory, Spring ORM, Mapping API for JDO, Hibernate, Hibernate Mapping, JDO Mapping, iBATIS, Spring Abstract Transaction layer, Employing Spring transaction, Using EJB declarative transactions, Integration process, integrating Spring MVC in web application, MVC in web application, MVC Framework.


Web Services: Introduction to XML, Service-Oriented Architectures SOAP, SOAP message structure, handling errors WSDL, UDDI, Java Web Service implementations JAX-RPC, Web service clients in Java, Introduction to Ajax.


Text Books:

1.         Jim Farley, William Crawford, O’Reilly and Associates, “Java Enterprise in a Nutshell”, 2005

2.         Brett McLaughlin, O’Reilly, “Java and XML, 2nd Edition, 2001

Reference Books:

3.         Elliott Rusty Harold and W. Scott Means, O’Reilly, “XML in a Nutshell”, 2001

4.         James Cooper, “Java Design Pattersn: A Tutorial”, Addison Wesley

5.         Govind Sesadri, “Enterprise java Computing: Application and Architectures”, Cambridge University Publications, 1999





ITR-604          Embedded System Design using 8051                      L          T/P      C

                                                                                                            4          0          4


Introduction to Embedded Realtime Systems: Fundamental components of ESD, Preprocessing, Compiling, cross compiling, Linking, Locating, compiler driver, Linker script, Program segments, Type of memory, Memory Management in Embedded realtime systems, Interrupt and ISR


Introduction to Real-time theory: Scheduling theory, Rate Monotonic Scheduling, Utilization bound theorem, RTOS, Task Management, Task management, Race condition, Priority inversion, ISRs and scheduling, Inter-Task communication, Timers



Microcontrollers: Role of processor selection in Embedded System (microprocessor vs microcontroller), 8051 microcontroller: architecture, assembly language programming, instruction set, addressing mode, logical operation, arithmetic operation, interrupt handling, Timing subroutines


Serial data communication, RS-232, USB, I2C, Interfacing with ADC & sensors, Interfacing with DAC, Interfacing with external ROM, Interfacing with 8255

IEEE 1149.1 (JTAG) testability: Boundary Scan Architecture




1.         Sriram V Iyer and Pankaj Gupta, “Embedded Real-time Systems Programming”, TMH 2006

2.         Mazidi and Mazidi, “The 8051 Microcontroller”, PHI, 2006



1.         Embedded System by Raj Kamal, TMH, 2004

2.         The 8051 Microcontroller by Kennth J. Ayala, Thomson DelMar Learning, 2006

3.         Microcontrollers by Deshmukh, TMH, 2006

4.         8051 Microcontroller & Embedded systems by Rajiv Kapadia, Jaico, 2006

5.         Computer as components by wayne wolf, Harcourt India Pvt. Ltd, 2002

6.         Real time System and Analysis by Philip A. Laplante, Wiley, 2006

7.         Microcontrollers and microcomputers by F. M. Cady, Oxford Press, 2006

8.         An Embedded Software Primer by David E. Simon, Pearson Education, 2005

9.         Designing Embedded Hardware by John Catsoulis, O’reily 2005

10.       Real time System & Software by Alan c. Shaw, Wiley, 2005

11.       Programming Embedded System by Michael Barr, O’reilly, 2005

12.       Networking and Internetworking with microcontrollers by Fred Eady, elsevier, 2005

ITR-606                      Wireless Mobile Networks                           L          T/P      C

                                                                                                            4          0          4



Introduction to Personal Communication Services (PCS): PCS architecture, Mobility management, Networks signaling.


Global system for Mobile Communication (GSM) system overview: GSM Architecture, Mobility Management, Network signaling.


General Packet Radio Services (GPRS): GPRS architecture, GPRS Network nodes.


Mobile Data Communication: WLANs (Wireless LANs) IEEE 802.11 standard, Mobile IP.


Wireless Application Protocol (WAP): The Mobile Internet standard, WAP Gateway and Protocols, Wireless Markup Languages (WML)


Third Generation (3G) Mobile Services: Introduction to International Mobile Telecommunications 2000 (IMT 2000) vision, Wideband Code Division Multiple Access (W-CDMA), and CDMA 2000, Quality of services in 3G.


Wireless local Loop (WLL): Introduction to WLL architecture, WLL technologies.


Global Mobile Satellite Systems: Case studies of IRIDIUM and GLOBALSTAR systems.


Bluetooth technology and Wi-Max


Text Books:

1.         “Wireless and mobile Networks Architecture,” by Yi –Bing Lin & Imrich Chlamatac, John Wiley & Sons, 2001.

2.         “Mobile  & Personnel communication Systems and Services”, By Raj Pandya, Prentice Hall India, 2001.

3.         “Wireless Communication- Principles and practices,” 2nd Ed., Theodore S. Rappaport, Pearson Education Pvt. Ltd, 2003.

4.         “Mobile communications,” Jochen Schiller, Pearson Education Pvt. Ltd., 2002.

5.         “ The Wireless Application Protocol,” Singhal & Bridgman et. al., Pearson Education, 2004.



1.         “Principles of Mobile Computing,” 2nd Ed., Hensmann, Merk, & Stober, Springer International Edition, 2003.

2.         Mobile Computing,” Talukdar & Yaragal, TMH, 2005.

3.         “3G Wireless Networks,” Smith & Collins, TMH, 2007.

ITR-610                      Digital Signal Processing                              L          T/P      C

                                                                                                            4          0          4



Signals and signal Processing, characterization & classification of signals, typical Signal Processing operations, example of typical Signals, typical Signals Processing applications.


Time Domain Representation of Signals & Systems

Discrete Time Signals, Operations on Sequences, Linear shift-invariant systems, Stability and Causality, Linear constant coefficient difference equations, Frequency domain representation of discrete-time systems, symmetry properties of the Fourier transform, Sampling of continuous-time systems.



Z-transforms, Inverse Z-transform, properties of Z-transform, & its applications in system analysis & design. Discrete Fourier Transform (DFT) & its properties, computation of the DFT of real sequences, Linear Convolution using the DFT.



Digital Filter Structure

Block Diagram representation, Signal Flow Graph Representation, Equivalent Structures, Basic FIR Digital Filter Structures: Direct forms, Transposed forms, Cascaded forms, Poly phase realization and Linear phase FIR structures. Basic IIR Filter Structures: Direct forms, Transposed forms, Cascaded realizations and Parallel realizations. All pass filters, Digital Sine-Cosine Generator.


Digital Filter Design

Design of IIR Digital filters from analog filters, Properties of FIR digital filters, Desgin of FIR filters using Windows, Computer aided design of  FIR filters, Comparison of IIR and FIR digital filters.


Computation of Discrete Fourier Transform


Complexity of the  DFT computation by direct method, Goertzel algorithm, Decimation –in-time FFT algorithms, Decimation-in frequency FFT algorithms.

Text Books:

1.         Alan V. Oppenheim & Ronald W. Schafer, “ Digital Signal Processing” PHI, 2002

2.         Sanjit K. Mitra, “ Digital Signal Processing: A computer based approach” TMH, Second Edition, 2003


1.         Chi-Tsong Chen, “ Digital Signal Processing, Spectral Computation and Filter Design” Oxford University Press, 2001.

2.         Monson H. Hayes, “ Schaum’s Outline of Digital Signal Processing”, Mcgraw Hill, 1999.

3.         Richard W. Hammming, “Digital Filters”, Dover Pubns, 1998.

4.         Lars Wanhammar, “ DSP Integrated Circuits”, Academic Press, First edition, 1999.

5.         Simon S. Haykin, “ Adaptive Filter Theory, “ Prentice Hall, 3rd Edition.

ITR-620                      Neural Network                                             L          T/P      C

                                                                                                            4          0          4


Biological analogy, Architecture classification, Neural Models, Learning Paradigm and Rule, single unit mapping and the perception.


Feed forward networks – Review of optimization methods, back propagation, variation on Backpropagation, FFANN mapping capability, properties of FFANN’s Generalization.



PCA, SOM, LVQ, Adaptive Resonance Networks.


Hopfield Networks, Associative Memories, RBF Networks.


Applications of Artificial Neural Networks: Regression, applications to function approximation, Classification, Blind Source Separation.


Text Book:

1.         Haykin S., “Neural Networks-A Comprehensive Foundations”, Prentice-Hall International, New Jersey, 1999.



1.         Anderson J.A., “An Introduction to Neural Networks”, PHI, 1999.

2.         Hertz J, Krogh A, R.G. Palmer, “Introduction to the Theory of Neural Computation”,

3.         Addison-Wesley, California, 1991.

4.         Hertz J, Krogh A, R.G. Palmer, “Introduction to the Theory of Neural Computation”, Addison-Wesley, California, 1991.

5.         Freeman J.A., D.M. Skapura, “Neural Networks: Algorithms, Applications and Programming Techniques”, Addison-Wesley, Reading, Mass, (1992).        

6.         Golden R.M., “Mathematical Methods for Neural Network Analysis and Design”, MIT Press, Cambridge, MA, 1996.

7.         Cherkassky V., F. Kulier, “Learning from Data-Concepts, Theory and Methods”, John Wiley, New York, 1998.

8.         Anderson J.A., E. Rosenfield, “Neurocomputing: Foundatiions of Research, MIT Press,  Cambridge, MA, 1988.

9.         Kohonen T., “Self-Organizing Maps”, 2nd Ed., Springer Verlag, Berlin, 1997.

10        Patterson D.W., “Artificial Neural Networks: Theory and Applications”, Prentice Hall, Singapore, 1995.

11.       Vapnik V.N., “Estimation of Dependencies Based on Empirical Data”, Springer Verlag, Berlin, 1982.

12.       Vapnik V.N., “The Nature of Statistical Learning Theory”, Springer Verlag, New York, 1995.

13.       Vapnik V.N., “Statistical Learning Theory: Inference from Small Samples”, John Wiley, 1998.

ITR–622         Network Programming                                              L          T/P      C

                                                                                                            4          0          4


Introduction to Systems Programming: Files, System Files, File Formats, Buffered I/O, Directories, File System, Inodes, links, fcntl, links, locks, Device I/O, Terminal I/O, ioctl(), Files and Devices ,Signals, video I/O ,Multi-Tasking


Processes and Inter-Process Communication: timers, polling vs interrupts, environment, fork, exec, wait, environment, exit and wait, pipe, fifos, message queues, semaphore


Network Programming: Sockets, Operation, Socket types, Domains Name Binding, Closing Sockets, I/O Multiplexing, Client/Server Models, Connection Based Services, Handling Out of Band Data, Connectionless Services, Design issues of Concurrent and iterative servers, Socket options


XDR and Remote Procedure Calls, Network Programming at the level of Programming Language (can use Java or Python as case study)


Text Book:

1.         Unix Network Programming, W. Richard Stevens, Prentice Hall, 1998



1.         Internetworking with TCP/IP, Volume3, Douglas Comer, Prentice Hall, 2000

2.         Internetworking with TCP/IP, Volume1, Douglas Comer, Prentice Hall, 2000


ITR-624                                  Fuzzy Logic & Design                        L          T/P      C

                                                                                                            4          0          4


Classical and Fuzzy Sets: Overview of Classical Sets, Membership Function, a-cuts, Properties of a-cuts, Decomposition Theorems, Extension Principle.


Operations on Fuzzy Sets: Compliment, Intersections, Unions, Combinations of Operations, Aggregation Operations.


Fuzzy Arithmetic: Fuzzy Numbers, Linguistic Variables, Arithmetic Operations on intervals & Numbers, Lattice of Fuzzy Numbers, Fuzzy Equations.


Fuzzy Relations: Crisp & Fuzzy Relations, Projections & Cylindric Extensions, Binary Fuzzy Relations, Binary Relations on  single set, Equivalence, Compatibility & Ordering Relations, Morphisms, Fuzzy Relation Equations.


Possibility Theory: Fuzzy Measures, Evidence & Possibility Theory, Possibility versus Probability Theory.


Fuzzy Logic: Classical Logic, Multivalued Logics, Fuzzy Propositions, Fuzzy Qualifiers, Linguistic Hedges.


Uncertainty based Information: Information & Uncertainty, Nonspecificity of Fuzzy & Crisp sets, Fuzziness of Fuzzy Sets.


Applications of Fuzzy Logic:


Text Book:

1.         G.J.Klir , Yuan,“Fuzzy Sets and fuzzy logic, Theory and applications”, Prentice

Hall India, 1995.


Reference Books:

1.         John Yen, Reza Langari, “Fuzzy Logic Intelligence, Control and Information”,

Pearson Education, 2006.

2.         Ross, “Fuzzy Logic with Engineering Applications”, 2nd Edition, John Wiley,


3.         H. Zimmermann, “Fuzzy Set Theory and its applications”, 2nd Edition, Allied Publishers, 1996.







ITR-626                      Genetic Algorithms                                        L          T/P      C

                                                                                                            4          0          4                                           



A brief history of evolutionary computation, Elements of Genetic Algorithms, A simple genetic algorithm, Applications of genetic algorithms


Genetic Algorithms in Scientific models

Evolving computer programs, data analysis & prediction, evolving neural networks, Modeling interaction between learning & evolution, modeling sexual selection, measuring evolutionary activity.


Theoretical Foundation of genetic algorithm

Schemas & Two-Armed and k-armed problem, royal roads, exact mathematical models of simple genetic algorithms, Statistical- Mechanics Approaches.


Computer Implementation of Genetic Algorithm

Data structures, Reproduction, crossover & mutation, mapping objective functions to fitness form, fitness scaling, coding, a multiparameter, mapped, fixed point coding, discretization and constraints.


Some applications of genetic algorithms

The risk of genetic algorithms, De Jong & function optimization, Improvement in basic techniques, current application of genetic algorithms


Advanced operators & techniques in genetic search

Dominance, duplicity, & abeyance, inversion & other reordering operators. Other micro operators, Niche & speciation, multiobjective optimization, knowledge based techniques, genetic algorithms & parallel processors.


Text Book:

1.         David E. Goldberg, “Genetic algorithms in search, optimization & Machine Learning” Pearson Education, 2006


Reference Books:

1.         Melanle Mitchell, “An introduction to genetic algorithms”, Prentice Hall India, 


2.         Michael D. Vose, “The simple genetic algorithm foundations and theory, Prentice  

            Hall India, 1999

3.         Masatoshi Sakawa, “Genetic Algorithms & Fuzzy Multiobjective Optimization”, Kluwer Academic Publisher, 2001

4.         D. Quagliarella, J Periaux, C Poloni & G Winter, “Genetic Algorithms in Engineering & Computer science”, John Wiley & Sons, First edition, 1997

5.         Pinaki Mzumder, Elizabeth M. Raudnick, “Genetic Algorithms for VLSI design, layout and test automation”, Pearson Education, 2006

ITR – 634                   AI and Applications                                       L          T/P      C

                                                                                                            4          0          4



Introduction to intelligent agents


Problem solving:

Solving problems by searching : state space formulation, depth first and breadth first search, iterative deepening


Intelligent search methods:

A* and its memory restricted variants


Production systems:

Design implementation and limitations, case studies


Game Playing:

Minimax, alpha-beta pruning


Knowledge and reasoning:

Propositional and first order logic, semantic networks, building a knowledge base, inference in first order logic, logical reasoning systems



STRIPS partial order planning, uncertain knowledge and reasoning, probabilistic reasoning systems, Baysian networks


Learning from observations:

Inductive learning, learning decision trees, computational learning theory, Explanation based learning



Environmental Science, Robotics, Aerospace, Medical Scioence etc.


Text Book:

1.         "AI" by Rich and Knight, Tata McGraw Hill, 1992

Reference Books:

1.         "Neural Networks in Computer Intelligence" by KM Fu, McGraw Hill

2.         "AI: A modern approach" by Russel and Norvig, Pearson Education


ITR - 632                    Project Work                                                  L          T/P      C

                                                                                                            0          4          4



The student will submit a synopsis at the beginning of the semester for the approval to the school project committee in a specified format. The student will have to present the progress of the work through seminars and progress report. A report must be submitted to the school for evaluation purpose at the end of the semester in a specified format.

ITR-652          OOSE Lab                                                                  L          P          C

                                                                                      0        2        1


ITR-654          ADBMS Lab                                                              L          P          C

                                                                                       0        2        1


ITR-656          Java based Lab                                                          L          P          C

                                                                                      0        2        1


ITR-658          Lab based on Elective                                               L          P          C

                                                                                      0        2        1       




ITR – 701       Multimedia Technology                                             L          T/P      C

                                                                                                            4          0          4                     



Concept of Multimedia ,Media & data stream, main properties of multimedia system ,

Data stream characteristics &for continuous media Multimedia Applications, Hardware Software requirements, Storage Technologies: RAID, Optical Media.


Components of multimedia and file formats:

Text, Basic sound concepts , MIDI , Speech ,Basic concept of Images, Graphics format ,Basic concepts of  Video & animation, Conventional system,Computer based animation, Authoring Tools, Categories of Authoring Tools.


Compression Techniques

Lossless and Lossy compression, Run length coding, Statistical Coding, Transform Coding, JPEG, MPEG, Text compression using static Huffmann  technique, Dynamic Huffmann Technique, Arithmetic Technique.




Introduction, Basic Terminology techniques, tweaning & morphing, Motion Graphics 2D & 3D animation.


Introduction to MAYA(Animating Tool):


Fundamentals, Modeling: NURBS, Polygon, Organic,

Animation:Key frame animation,reactive animation,path animation,Skelton animationetc., deformers..

Dynamics: soft bodies, Rigid bodies and its usages in the scene etc.,

Rendering: soft,Hard renering. IPR rendering, Line and box rendering etc.,

Special Effects: Shading & Texturing Surfaces, Lighting, Special effects.

Working with MEL: Basics & Programming



Text Book:

1.         David Hillman, “Multimedia Technology & Applications”, Galgotia Publications, 2000


Reference Books:

1.         Nigel Chapman & Jenny Chapman, “Digital Multimedia”, Wiley Publications, 2000

2.         D.P. Mukherjee, “Fundamentals of Computer Graphics and Multimedia”, PHI, 2001

3.         Maya manuals.


ITR – 707       Network Management and Security                         L          T/P      C                                                                                                                     4          0          4



Classical security Techniques and Computer Network Security Concepts. Confidentiality and Security, Security Policy and Operations Life Cycle, Security System Development and Operations


Secure Networking Threats

The Attack Process. Attacker Types. Vulnerability Types. Attack Results. Attack Taxonomy. Threats to Security: Physical security, Biometric systems, monitoring controls, and Data security and intrusion and detection systems.


Encryption Techniques

Conventional techniques, Modern techniques, DES, DES chaining, Triple DES, RSA algorithm, Key management. Message Authentication and Hash Algorithm, Authentication requirements and functions secure Hash Algorithm, Message digest algorithm, digital signatures. AES Algorithms.


Designing Secure Networks

Components of a Hardening Strategy. Network Devices. Host Operating Systems. Applications. Appliance-Based Network Services. Rogue Device Detection, Network Security Technologies The Difficulties of Secure Networking. Security Technologies. Emerging Security Technologies General Design Considerations, Layer 2 Security Considerations. IP Addressing Design Considerations. ICMP Design Considerations. Routing Considerations. Transport Protocol Design Considerations


Network Security Platform Options

Network Security Platform Options. Network Security Device Best Practices, Common Application Design Considerations.  E-Mail. DNS. HTTP/HTTPS. FTP. Instant Messaging.


IPsec VPN Design Considerations

VPN Basics. Types of IPsec VPNs. IPsec Modes of Operation and Security Options. Topology Considerations. Design Considerations. Site-to-Site Deployment Examples.


Secure Network Management and Network Security Management

Organizational Realities. Protocol Capabilities. Tool Capabilities. Secure Management Design Options. Network Security Management, Firewalls, Trusted systems, IT act and cyber laws.


Text Books:

1.         Sean Convery, “ Network Security Architectures, Published by Cisco Press, First Ed. 2004

2.         William Stalling “Cryptography and Network Security” Fourth Ed., Prentice Hall, 2006

Reference Books:

1.         Charles P. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing” 3rd Edition, Prentice Hall, 2003

2.         Jeff Crume “Inside Internet Security” Addison Wesley, 2003

ITR-713                      Software Testing                                            L          T/P      C

                                                                                                            4          0          4         


Introduction: What is software testing and why it is so hard?, Error, Fault, Failure, Incident, Test Cases, Testing Process, Limitations of Testing, No absolute proof of correctness, Overview of Graph Theory.


Functional Testing: Boundary Value Analysis, Equivalence Class Testing, Decision Table Based Testing, Cause Effect Graphing Technique.


Structural Testing: Path testing, DD-Paths, Cyclomatic Complexity, Graph Metrics, Data Flow Testing, Mutation testing.


Reducing the number of test cases:

Prioritization guidelines, Priority category, Scheme, Risk Analysis, Regression Testing, Slice based testing


Testing Activities: Unit Testing, Levels of Testing, Integration Testing, System Testing, Debugging, Domain Testing.


Object Oriented Testing: Issues in Object Oriented Testing, Class Testing, GUI Testing, Object Oriented Integration and System Testing.


Testing Tools: Static Testing Tools, Dynamic Testing Tools, Characteristics of Modern Tools.

 Text Books:

1.         William Perry, “Effective Methods for Software Testing”, John Wiley & Sons, New York, 1995.

2.         Cem Kaner, Jack Falk, Nguyen Quoc, “Testing Computer Software”, Second Edition, Van Nostrand Reinhold, New York, 1993.

3.         Boris Beizer, “Software Testing Techniques”, Second Volume, Second Edition, Van Nostrand Reinhold, New York, 1990.

4.         Louise Tamres, “Software Testing”, Pearson Education Asia, 2002

 Reference Books:

1.         K.K. Aggarwal & Yogesh Singh, “Software Engineering”, New Age International Publishers, New Delhi, 2005

2.         Roger S. Pressman, “Software Engineering – A Practitioner’s Approach”, Fifth Edition, McGraw-Hill International Edition, New Delhi, 2001.

3.         Boris Beizer, “Black-Box Testing – Techniques for Functional Testing of Software and Systems”, John Wiley & Sons Inc., New York, 1995.

4.         Marc Roper, “Software Testing”, McGraw-Hill Book Co., London, 1994.

5.         Gordon Schulmeyer, “Zero Defect Software”, McGraw-Hill, New York, 1990.

6.         Watts Humphrey, “Managing the Software Process”, Addison Wesley Pub. Co. Inc., Massachusetts, 1989.

7.         Boris Beizer, “Software System Testing and Quality Assurance”, Van Nostrand Reinhold, New York, 1984.

8.         Glenford Myers, “The Art of Software Testing”, John Wiley & Sons Inc., New York, 1979.

ITR-719                    Cellular & Mobile Communication                 L          T/P      C

                                                                                      4        0        4

Introduction to Cellular Mobile Systems

A basic cellular system, performance criteria, uniqueness of mobile radio environment, operation of cellular systems, planning of cellular system, overview of generations of cellular systems.


Elements of Cellular Radio Systems Design and interference

General description of the problem, concept of frequency reuse channels, co-channel interference reduction factor, desired C/I from a normal case in an omni directional antenna system, cell splitting, consideration of the components of cellular systems, introduction to co-channel interference, co-channel measurement design of antenna system, antenna parameter and their effects.


Cell Coverage for Signal & antenna structures

General introduction, obtaining the mobile point to point mode, propagation over water or flat open area, foliage loss, propagation near in distance, long distance propagation, point to point prediction model-characteristics, cell site, antenna heights and signal coverage cells, mobile to mobile propagation, Characteristics of basic antenna structures, antenna at cell site, mobile antennas.


Frequency Management & Channel Assignment, Hand Off & Dropped Calls

Frequency management, fixed channel assignment, non-fixed channel assignment, traffic & channel assignment. Why hand off, types of hand off and their characteristics, dropped call rates & their evaluation.


Modulation method and coding for error detection and correction

Introduction to Digital modulation techniques, modulation methods in cellular wireless systems, OFDM. Block coding, convolution coding and Turbo coding.


Multiple access techniques: FDMA, TDMA, CDMA,

Time-division multiple access (TDMA), code division multiple access (CDMA), CDMA capacity, probability of bit error considerations, CDMA compared with TDMA


Spread spectrum Tecniques:

Direct sequence spread spectrum, Frequency Hopping Spread spectrum techniques.


1. C. Y. Lee and William, “Mobile Cellular Telecommunications”, 2nd Ed, McGraw Hill.


2. Mischa Schwartz, “Mobile Wireless Communications”, Cambridge Univ. Press, UK,



1. Mobile Communication Hand Book”, 2nd Edition, IEEE Press. 2002

2. Theodore S Rappaport, “Wireless Communication Principles and Practice”, 2nd Ed,

Pearson Education. 2002

3. Lawrence Harte, “3G Wireless Demystified”, McGraw Hill Publications. 2000

4. Kaveh Pahlavan and Prashant Krishnamurthy, “Principles of Wireless Networks”,


ITR-723          Distributed Computing                                              L          T/P      C

                                                                                                            4          0          4         

Fundamentals of Distributed Computing:

Architectural models for distributed and mobile computing systems. Basic concepts in distributed computing such as clocks, message ordering, consistent global states, and consensus.


Basic Algorithms in Message:

Passing Systems, Leader Election in Rings, and Mutual Exclusion in Shared Memory, Fault-Tolerant Consensus, Causality and Time. Message Passing: PVM and MPI.


Distributed Operating Systems:

OS and network operating systems, Distributed File systems.    Middleware, client/server model for computing, common layer application protocols (RPC, RMI, streams), distributed processes, network naming, distributed synchronization and distributed object-based systems.



A Formal Model for Simulations, Broadcast and Multicast, Distributed Shared Memory, Fault-Tolerant Simulations of Read/Write Objects Simulating Synchrony, Improving the Fault Tolerance of Algorithms, Fault-Tolerant Clock Synchronization.


Distributed Environments:

Current systems and developments (DCE, CORBA, JAVA).

Advanced Topics:

Randomization, Wait-Free Simulations of Arbitrary Objects, Problems Solvable in Asynchronous Systems, Solving Consensus in Eventually Stable Systems, High Performance Computing-HPF, Distributed and mobile multimedia systems. Adaptability in Mobile Computing. Grid Computing and applications. Fault tolerant Computing Systems.

Parallel Processing:

Basic Concepts: Introduction to parallel processing, parallel processing terminology, Parallel & Distributed Programming: Parallel Programming environments


Text Books:

1.             Tannenbaum, A, Van Steen.  Distributed Systems, Principles and Paradigm , Prentice Hall India, 2002

2.             Tannenbaum, A. Distributed Operating Systems, Pearson Education. 2006

3.             Attiya, Welch, “Distributed Computing”, Wiley India, 2006

Reference Books:

1.             Ananth Grama, Anshul Gupta, George Karypis, Vipin Kumar, “Introduction to parallel computing”, 2nd Edition, Pearson Education, 2007

2.             Cameron Hughes, Tracey Hughes, “Parallel and distributed programming using C++”, Pearson Education, 2005

3.             Tanenbaum, A, “Modern Operating Systems”, 2nd Edition, Prentice Hall India, 2001.

4.             Singhal and Shivaratri, “Advanced Concepts in Operating Systems”, McGraw Hill, 1994

5.             Michael J. Quinn, “Parallel Computing – Theory and Practice, 2nd Edition, McGraw Hill, 1994

ITR - 727                    Digital Image Processing                              L          T/P      C

                                                                                                            4          0          4          


Introduction And Digital Image Fundamentals

The origins of Digital Image Processing, Examples of Fields that Use Digital Image Processing, Fundamentals Steps in Image Processing, Elements of Digital Image Processing Systems, Image Sampling and Quantization, Some basic relationships like Neighbours, Connectivity, Distance Measures between pixels, Linear and Non Linear Operations.


Image Enhancement in the Spatial Domain

Some basic Gray Level Transformations, Histogram Processing, Enhancement Using Arithmetic and Logic operations, Basics of Spatial Filters, Smoothening and Sharpening Spatial Filters, Combining Spatial Enhancement Methods.

Image Enhancement in the Frequency Domain


Introduction to Fourier Transform and the frequency Domain, Smoothing and Sharpening Frequency Domain Filters, Homomorphic Filtering.

Image Restoration


A model of The Image Degradation / Restoration Process, Noise Models, Restoration in the presence of Noise Only Spatial Filtering, Pereodic Noise Reduction by Frequency Domain Filtering, Linear Position-Invarient Dedradations, Estimation of Degradation Function, Inverse filtering, Wiener filtering, Constrained Least Square Filtering, Geometric Mean Filter, Geometric Transformations.

Image Compression

Coding, Interpixel and Psychovisual Redundancy, Image Compression models, Elements of Information Theory, Error free comparison, Lossy compression, Image compression standards.

Image Segmentation

Detection of Discontinuities, Edge linking and boundary detection, Thresholding, Region Oriented Segmentation, Motion based segmentation.

Representation and Description

Representation, Boundary Descriptors, Regional Descriptors, Use of Principal Components for Description, Introduction to Morphology, Some basic Morphological Algorithms.

Object Recoginition

Patterns and Pattern Classes, Decision-Theoretic Methods, Structural Methods.


Text Books:

1.         Rafael C. Conzalez & Richard E. Woods, “Digital Image Processing”, 2nd edition, Pearson Education, 2004

2.         A.K. Jain, “Fundamental of Digital Image Processing”, PHI, 2003

Reference Books:

1.         Rosefield Kak, “Digital Picture Processing”, 1999

2.        W.K. Pratt, “Digital Image Processing”, 2000

ITR – 729                   Information Storage & Management           L          T/P      C

                                                                                                            4          0          4


Complexity of Information Management: Proliferation of Data, Data Center Evolution, Managing Complexity, I/O and the five pillars of technology, Storage Infrastructure, Evolution of Storage  


Storage Systems Architecture: Modern Storage Systems, Storage Systems, Intelligent Disk Subsystems , Physical Disks , Back End ,Cache ,Front End , Host Environment

Introduction to Networked Storage: Storage Networking Overview, Direct Attached Storage, Storage Area Networks, Case study – Applying SAN concepts, Network Attached Storage, Case study – Applying NAS concepts, IP SAN, CAS, Hybrid Network Storage Based Solutions/ Emerging Technologies, Case study – Applying SAN, NAS, IP SAN concepts


Introduction to Information Availability: Business Continuity Overview, Data Availability, Business Continuity – Local, Case study – Applying local information availability strategies, Business Continuity – Remote, Case study – Applying remote information availability strategies, Disaster Recovery


Managing and Monitoring: Monitoring in the Data Center, Case study – Monitoring exercise, Management in the Data Center, Case study – Managing exercise


Case Studies must be supported by laboratory


Text Book:

1.         Marc Farley Osborne, "Building Storage Networks", Tata McGrawHill, 2001

2.         Robert Spalding, "Storage Networks: The Complete Reference", Tata Mcgraw Hill, 2003

3.       NIIT, "Introduction to Information Security Risk Management" , Prentice-Hall of India, 2000


ITR – 731       Advanced Software Project Management                L          T/P      C

                                                                                                4          0          4


Introduction to Software Project Management:

Software development as a project; Stakeholders in software project; Software product, process, resources, quality, and cost; Objectives, issues, and problems relating to software projects.


Overview of Project Planning:

Steps in project planning; Defining scope and objectives; work breakdown structure; Deliverables and other products; time, cost, and resource estimation; Alternatives in planning


Project Evaluation:

Strategic assessment; Technical assessment; Cost-benefit analysis; Cash flow forecasting; Cost-benefit evaluation techniques; Break-even analysis; Risk evaluation


Selection of Appropriate Project Approach:

Choosing development technology and methodology; choice of process model; Rapid application development; Waterfall model; V-process model; Spiral model; Prototyping,; Incremental delivery.


Software Effort Estimation

Problem in software estimation; Effort estimation techniques; Expert judgement; Estimation by analogy; Delphi technique; Algorithmic methods; Top-down and bottom-up estimation; Function point analysis; Object points; COCOMO model.


Activity Planning

Network planning model; Activity-on-arrow network; Precedence network; Forward pass; Backward pass; Critical path; Slack and float.


Risk Analysis and Management

Nature and categories of risk in software development; risk Identification; Risk assessment; Risk mitigation, monitoring, and management; Evaluating schedule risk using PERT.


Recourse Allocation

Nature of project resources; Identifying resource requirement of activities; Allocating and scheduling resources; cost of resources; Standard, planned, and actual cost; Cost variance; time-cost trade-off.


Project Tracking and Control

Measurement of physical and financial progress; Earned value analysis; Status reports; Milestone reports; Change control.


Contact Management

Outsourcing of products and services; Types of contracts; Stages in contract placement; Terms of contract; Contract monitoring; Acceptance testing


Managing People and Organizing Teams

Organizational behaviour; Recruitment and placement; Motivation; Group behaviour; Individual and group decision making; Leadership and leadership styles; forms of organizational structures.


Software Quality Assurance

Planning for quality; Product versus process quality management; Procedural and quantitative approaches; Defect analysis and prevention; Statistical process control; Pareto analysis; Causal analysis; Quality standards; ISO 9000; Capability Maturity Model; Quality audit.


Configuration Management

Configuration management process; Software configuration items; Version control; change control; Configuration audit; Status reporting.



1.         Bob Hughes and Mike Cotterell, “Software Project Management”, Third Edition 2002, McGraw-Hill

2.         Pankaj Jalote, “Software Project Management in Practice”, 2002, Pearson Education Asia.



1.         Roger S. Pressman, “Software Engineering: A practitioner’s Approach”, Fifth Edition 2001 McGraw-Hill

2.         Robert T. Futrell, Donald F. Shafer, and Linda I.. Shafer, “Quality Software Project Management” 2002, Pearson Education Asia.

3.         Ramesh Gopalaswamy, “Managing Global Software Projects”, 2003, Tata McGraw-Hill


ITR – 733       Data Warehousing & Data Mining                          L          T/P      C

                                                                                                            4          0          4

 Data Warehousing:

Introduction to Data Warehousing: Evolution of Data Warehousing, Data Warehousing concepts, Benefits of Data Warehousing, Comparison of OLTP and Data Warehousing, Problems of Data Warehousing.


Data Warehousing Architecture

Architecture: Operational Data and Datastore, Load Manager, Warehouse Manager, Query Manager, Detailed Data, Lightly and Highly summarised Data, Archive/Backup Data, Meta-Data, architecture model, 2-tier, 3-tier and 4-tier data warehouse, end user Access tools.


Data Warehousing Tools and Technology

Tools and Technologies: Extraction, cleaning and Transformation tools, Data Warehouse DBMS, Data Warehouse Meta-Data, Administration and management tolls, operational vs. information systems.

OLAP & DSS support in data warehouse.


Distributed Data Warehouse

Types of Distributed Data Warehouses, Nature of development Efforts, Distributed Data Warehouse Development, Building the Warehouse on multiple levels.



Types of Data Warehouses & Data Warehouse Design

Host based, single stage, LAN based, Multistage, stationary distributed & virtual data-warehouses. Data warehousing Design: Designing Data warehouse Database, Database Design Methodology for Data Warehouses, Data Warehousing design Using Oracle,

OLAP and data mining: Online Analytical processing, Data mining.


Knowledge discovery

Knowledge discovery through statistical techniques, Knowledge discovery through neural networks, Fuzzy technology  & genetic algorithms.


“Building the Data Warehouse”, W.H.Inmon, 3rd Edition, John Wiley & Sons.

“Developing the Data Warehouse”, W.H.Inmon, C.Kelly, John Wiley & Sons.

Thomas Connoly, Carolyn Begg-“Database Systems-A practical approach to Design, Implementation and management” 3rd Edition Pearson Education



1.         Paul Raj Poonia, “Fundamentals of Data Warehousing”, John Wiley & Sons, 2003.

2.         Sam Anahony, “Data Warehousing in the real world: A practical guide for building decision support systems”, John Wiley, 2004


1.         W. H. Inmon, “Building the operational data store”, 2nd Ed., John Wiley, 1999.

2.         Kamber and Han, “Data Mining Concepts and Techniques”, Hartcourt India P. Ltd., 2001

ITR – 739       Soft Computing                                                          L          T/P      C

                                                                                      4        0        4


Neural Networks:

History, overview of biological Neuro-system, Mathematical Models of Neurons, ANN architecture, Learning rules, Learning Paradigms-Supervised, Unsupervised and reinforcement Learning, ANN training Algorithms-perceptions, Training rules, Delta, Back Propagation Algorithm, Multilayer Perceptron Model, Hopfield Networks, Associative Memories, Applications of Artificial Neural Networks.

Fuzzy Logic:

Introduction to Fuzzy Logic, Classical and Fuzzy Sets: Overview of Classical Sets, Membership Function, Fuzzy rule generation.

Operations on Fuzzy Sets:

Compliment, Intersections, Unions, Combinations of Operations, Aggregation Operations.

Fuzzy Arithmetic:

Fuzzy Numbers, Linguistic Variables, Arithmetic Operations on Intervals & Numbers, Lattice of Fuzzy Numbers, Fuzzy Equations.

Fuzzy Logic:

Classical Logic, Multivalued Logics, Fuzzy Propositions, Fuzzy Qualifiers, Linguistic Hedges.

Uncertainty based Information:

Information & Uncertainty, Nonspecificity of Fuzzy & Crisp Sets, Fuzziness of Fuzzy Sets.

Introduction of Neuro-Fuzzy Systems:

Architecture of Neuro Fuzzy Networks.

Application of Fuzzy Logic:

 Medicine, Economics etc.

Genetic Algorithm:

An Overview, GA in problem solving, Implementation of GA



1.         “An Introduction to Neural Networks”, Anderson J.A., PHI, 1999.

2.         “Introduction to the Theory of Neural Computation”, Hertz J. Krogh, R.G. Palmer, Addison-Wesley, California, 1991.

3.         “Fuzzy Sets & Fuzzy Logic”, G.J. Klir & B. Yuan, PHI, 1995.

4.         “An Introduction to Genetic Algorithm”, Melanie Mitchell, PHI, 1998.



1.         “Neural Networks-A Comprehensive Foundations”, Prentice-Hall International, New Jersey, 1999.

2.         “Neural Networks: Algorithms, Applications and Programming Techniques”, Freeman J.A. & D.M. Skapura, Addison Wesley, Reading, Mass, (1992).

Code No. ITR – 741                                                                          L          P          C        

Subject: Bluetooth Technology                                                        4          0          4         


Introduction to wireless technologies: WAP services, Serial and Parallel Communication, Asynchronous and synchronous Communication, FDM,TDM, TFM, Spread spectrum technology


Introduction to Bluetooth: Specification, Core protocols, Cable replacement protocol


Bluetooth Radio: Type of Antenna, Antenna Parameters, Frequency hoping


Bluetooth Networking: Wireless networking, wireless network types, devices roles and states, adhoc network, scatternet


Connection establishement procedure, notable aspects of connection establishement, Mode of connection, Bluetooth security, Security architecture, Security level of services, Profile and usage model: Generic access profile (GAP), SDA, Serial port profile, Secondary bluetooth profile


Hardware: Bluetooth Implementation, Baseband overview, packet format, Transmission buffers, Protocol Implementation: Link Manager Protocol, Logical Link Control Adaptation Protocol, Host control Interface, Protocol Interaction with layers


Programming with Java: Java Programming, J2ME architecture, Javax.bluetooth package Interface, classes, exceptions, Javax.obex Package: interfaces, classes


Bluetooth services registration and search application, bluetooth client and server application.

Overview of IrDA, HomeRF, Wireless LANs, JINI


Text Books:

1.         “Bluetooth Technology”, C.S.R. Prabhu and A.P. Reddi; PHI

2.         “Bluetooth Demystified”, Nathan J. Muller, Tata McGraw Hill, 2001


Reference Book:

1.         “Mobile Communications”, Jochen Schiller, Pearson Education, 5th Edition, 2002



Code No. ITR – 743                                                                          L          P          C        

Subject: Cyber Crime Investigations and Cyber Forensics            4          0          4



Unit 1 : Introduction : Review of TCP/IP and TCP, IP Header analysis , Introduction to Cyber World, Cyber attacks and cyber security , Information warfare and cyber terrorism, Types of cyber attacks, Cyber Crime and Digital Fraud ,

Overview of Types of computer forensics i.e. Media Forensics, Network forensics (internet forensics), Machine forensic, Email forensic (e-mail tracing and investigations)

Unit 2 : Live Data collection and investigating  windows environment :  windows Registry analysis , Gathering Tools to create a response toolkit ( Built in tools like netstat , cmd.exe , nbtstat , arp , md5sum ,regdmp  etc and tools available as freeware like Fport , Pslist etc) , Obtaining volatile Data ( tools like coffee , Helix can be used )

 Computer forensics in windows environment, Log analysis and event viewer, File auditing, identifying rogue machines, hidden files and unauthorized access points

Unit 3: Live Data collection and investigating  Unix/Linux environment :     /Proc file system overview , Gathering Tools to create a response toolkit ( Built in tools like losetup , Vnode , netstat , df , md5sum , strace etc  and tools available as freeware like Encase , Carbonite  etc  )

Handling Investigations in Unix/Linux Environment: Log Analysis (Network, host, user logging details), Recording incident time/date stamps, Identifying rogue processes, unauthorized access points, unauthorized user/group accounts,


Unit 4 : Forensic tools and report generation: Recovery of Deleted files in windows and Unix , Analyzing network traffic , sniffers  , Ethical Hacking , Hardware forensic tools like Port scanning and vulnerability assessment tools like Nmap , Netscan etc . Password recovery (tools like John the ripper, L0phtcrack, and THC-Hydra), Mobile forensic tools and analysis of called data record Template for computer forensic reports


Text Books:

  1. Incident Response & Computer Forensics.  Mandia, k., Prosise, c., Pepe, m. 2nd edition. Tata-McGraw Hill, 2003.
  2. Guide to Computer Forensics and Investigations, 2nd edition, Bill Nelson, Amelia Phillips, Frank Enfinger, and Chris Steuart  , Thomson Learning


1.       Digital Evidence and Computer Crime, 2nd Edition  ,  Eoghan Casey ,  academic Press File System Forensic Analysis by Brian Carrier ,  addition Wesley

 2.   Windows Forensic Analysis DVD Toolkit (Book with DVD-ROM),   Harlan Carvey,   syngress Publication

3         EnCE: The Official EnCase Certified Examiner Study Guide, 2nd Edition  ,  Steve  Bunting ,  sybex Publication


ITR-751          Multimedia lab                                                           L          P          C

                                                                                       0        4        2


ITR-753          NMS Lab                                                                   L          P          C

                                                                                      0        4        2


ITR-755          Lab based on Elective(s)                                           L          P          C

                                                                                      0        4        2                  


ITR – 757       Minor Project                                                 L          P          C

                                                                                      0        8        6


The student will submit a synopsis at the beginning of the semester for approval to the project committee in a specified format. The student will have to present the progress of the work through seminars and progress report. A report must be submitted to the project committee for evaluation purpose at the end of the semester in a specified format.




ITR – 752       Dissertation                                                                L          T/P      C

                                                                                      0        0        24     


The student will submit a synopsis at the beginning of the semester for the approval from the project committee in a specified format. Synopsis must be submitted within two weeks. The first defense, for the dissertation work, should be held with in two months time. Dissertation Report must be submitted in a specified format to the project committee for evaluation purpose at the end of semester.



ITR – 754       Seminar & Progress Report                                      L          T/P      C

                                                                                      0        0        4


Seminar is required to be given by the student on the topic of the dissertation. Progress of the dissertation will be evaluated based on the seminar given by the student during the semester. Evaluation will be done two times during the semester. Marks will be given based on the performance of the student during the seminar.