ME (Information Technology) 2017 Syllabus - 14-7-17 PDF
ME (Information Technology) 2017 Syllabus - 14-7-17 PDF
ME (Information Technology) 2017 Syllabus - 14-7-17 PDF
Syllabus
M.E. (Information Technology) 2017 Course
(With effect from Academic Year 2017-18)
Savitribai Phule Pune University
INDEX
Page
Sr. No. Name of the Course
No.
Semester – I
1 Program Educational Objectives 3
2 Program Outcomes 4
3 Syllabus Structure 5
4 Mathematical Foundation of Information Technology 9
5 Advance Software Engineering and Project Management 11
6 Applied Algorithms 14
7 Research Methodology 17
8 Elective-I 20
9 Lab Practice-I 35
Semester – II
10 Cyber Security and Forensics 37
11 Cloud and Data Technologies 40
12 Information Technology Oriented Operations Research 43
13 Elective-II 47
14 Seminar-I 57
15 Lab Practice-II 58
Semester – III
16 Mobile Ad-Hoc Networks 60
17 Advanced Operating Systems 62
18 Elective-III 64
19 Seminar-II 77
20 Project Stage-I 78
Semester – IV
21 Seminar-III 80
22 Project Stage-II 82
Index
Index
Program Outcomes
Index
M.E. (Information Technology) 2017 Course to be implemented from Academic Year 2017-18
SYLLABUS STRUCTURE
SEMESTER – I
Teaching
Examination Scheme
Scheme
Subject Lecture /
Subject Paper OR/
Code Practical TW
Presentation Marks Credits
In-Sem. End-Sem.
Lecture
Paper Paper
Mathematical
514401 Foundation Of 04 50 50 ----- ----- 100 04
Information Technology
Advance Software
514402
Engineering and Project 04 50 50 ----- ----- 100 04
Management
514403
Applied Algorithms 04 50 50 ----- ----- 100 04
514404
Research Methodology 04 50 50 ----- ----- 100 04
514405
Elective I 05 50 50 ----- 100 05
514406
Lab Practice I 04 ----- ----- 50 50 100 04
SEMESTER – II
Teaching
Examination Scheme
Scheme
Subject Lecture /
Subject Paper OR/
Code Practical TW
Presentation Marks Credits
In-Sem. End-Sem.
Lecture
Paper Paper
514407 Cyber Security And
04 50 50 ----- ----- 100 04
Forensics
Index
SEMESTER – IV
Teaching
Examination Scheme
Scheme
Subject Lecture /
Subject Paper
Code Practical OR/
TW Marks Credits
In-Sem. End-Sem. Presentation
Lecture
Paper Paper
Index
Cognitive Advanced
Machine and Deep
Computing / 514405 E 5144011 E Computing 5144015 E Green ICT
Learning
Intelligence Intelligence
Institute Elective
Industry Specific( Multicore with Industry
Advanced Web
Multi core / Web 514405 F Architecture and 5144011 F 5144015 F Association /
Programming
Pgmg / Industry) Programming Interdisciplinary
Elective
SEMESTER-I
Course Outcomes:
By the end of the course, students should be able to:
1. Apply mathematical concept for Information Technology problem solving.
2. Learn and apply different mathematical models for real time projects and applications.
3. Analyze each learning model come from a different algorithmic approach and it will perform
differently under different conditions.
Text Books
1) Probability and Statistics with reliability, Queuing and Computer Science Applications by
Kishor S. Trivedi, WSE publication, ISBN:978-81-265-1853-1
2) Principles of Soft Computing by S.N. Sivanandam and S.N. Deepa , Wiley India , ISBN:10:81-
265-1075-7
Reference Books
1) Elements of discrete mathematics by C L Liu and D P Mohapatra, Tata McGraw Hill ISBN:
13:978-0-07-066913-0.
2) David Luenberger and Yinyu Ye, Linear and Nonlinear Programming, 3rd Edition, Springer,
2008.
3) Statistical Methods by S.P. Gupta, ISBN: 81-8054-739-6
4) NPTEL Course Statistical and Stochastic Random Processes.
Course Objectives:
1. To apply a systematic, disciplined, quantifiable approach to the cost-effective development,
operation and maintenance of software systems to the satisfaction of their beneficiaries.
2. To prepare a technologically competent computer by training them in the contemporary
software engineering principles and paradigms.
3. To illustrate core project management techniques so as to manage project schedule, expenses
and resources with the aid of suitable project management tools.
4. To analyze the various issues in each phase of project management and people management.
5. To provide the students with recent trends and practices in software engineering and
supporting tools.
6. To emphasize the importance of software project management skills in order to cater the
changing industry needs and constraints across the advancing domains of computing.
Course Outcomes:
By the end of the course, students should be able to
1. Identify the resources required for a software project and to produce a work plan and resource
schedule
2. Decide and justify the use of most appropriate software process model for a given project
definition
3. Apply risk management analysis techniques
4. Monitor the progress of a project and to assess the risk of slippage, revising targets counteract
drift
5. Use appropriate metrics to manage the software development outcome
6. Understand emerging trends in software engineering and project management.
Text Books
1. Roger S. Pressman, Software Engineering: A practitioners approach, TMH, Seventh Edition,
ISBN 978–0–07–337597–7, ISBN 0–07–337597–7.
2. Ian Sommerville, Software Engineering, Addison-Wesley, and Tenth Ed. ISBN-13:978-
0133943030 ISBN-10: 0133943038.
Reference Books
1. Linda I. Shafer, Robert T. Futrell, Donald F. Shafer, Quality Software Project Management,
Prentice Hall, ISBN 0130912972.
2. Scott Berkun, The Art of Project Management, O'Reilly, First Edition, ISBN 0596007868.
3. Orit Hazzan and Yael Dubinsky, Agile software engineering, Springer -Verlag London, First
Edition, ISBN 978-1-84800-199-2
4. Pankaj Jalote, Software Project Management in practice, Addison-Wesley Professional, ISBN
0201737213.
5. Craig Larman, Applying UML and Patterns, Pearson Education, Third Edition.
6. Grady Booch, James Rambaugh, Ivar Jacobson, Unified Modeling Language Users Guide,
Addison-Wesley, Second Edition, ISBN 0321267974.
Course Objectives:
1. To equip the students with mathematical preliminaries required to analyze and design
computer algorithms.
2. To know the basics of computational complexity analysis and various algorithm design
paradigms.
3. To provide a thorough knowledge of the most common algorithms and data structures.
4. To introduce the concept of NP-complete problems and different techniques to deal with
them.
5. To study online and randomized algorithms.
6. To apply knowledge of advanced data structures to real world problems.
Course Outcomes:
By the end of the course, students should be able to
1. Apply knowledge of Mathematics to perform asymptotic analysis of algorithms.
2. Prove the correctness and analyze the running time of algorithms for problems in various
domains and estimate their worst case, average case and best case behavior
3. Identify and select appropriate data structures to offer suitable solution to real world
problems
4. Recommend appropriate design paradigm amongst various algorithmic strategies
5. Distinguish amongst P, NP, NP hard and NP complete problems.
6. Identify the need for approximation, parallel algorithms to solve NP Complete problems.
Text Books:
1. Thomas H Cormen and Charles E.L Leiserson, "Introduction to Algorithm" PHI, 3rd Edition,
ISBN:- 81-203-2141-3.
2. Horowitz and Sahani, "Fundamentals of computer Algorithms", Galgotia, ISBN: 81-7371-612-9.
3. Gilles Brassard, Paul Bratle, “Fundamentals of Algorithms “, Pearson, ISBN: 978-81-317-1244-3.
Reference Books:
1. R.C.T.Lee, S S Tseng, R C Chang, Y T Tsai, “ Introduction to Design and Analysis of Algorithms, A
Strategic approach”, Tata McGraw Hill, ISBN-13:978-1-25-902582-2, ISBN-10:1-25-902582-9.
2. Steven S Skiena, The Algorithm Design Manual, Springer, 2nd Edition, ISBN 978-81-8489-865-1.
3. George T. Heineman, Gary Pollice, Stanley, “Algorithms in a Nutshell, A Desktop Quick
Reference”, O’Reilly, ISBN 13:978-81-8404-608-3.
4. Rajiv Motwani & Prabhakar Raghavan, Randomized Algorithms, Cambridge University Press.
5. Dan Gusfield, “Algorithms on Strings, Trees and Sequences”, Cambridge University Press, ISBN:
978-0-521-67035-7.
6. S.Sridhar, “Design and Analysis of Algorithms”, Oxford, ISBN: 10:0-19-809369-1.
Course Objectives:
1. To enable to student to understand and work methods and concepts related Research.
2. To enable the student to develop research proposal and to work with research problem.
3. To develop broad comprehension of research area.
Course Outcomes:
By the end of the course, students should be able to
1. Perform the research work in a methodological way.
2. Use tools for organizing the literature survey.
3. Apply appropriate tools for paper writing
4. Apply data analysis methods to generate results, drawing conclusion etc. from the project
work
Text Books:
1. Research Methodology Methods and Techniques, Kothari, C. R., Wiley Eastern Ltd.
2. Research methodology: an introduction for science & engineering students', by Stuart Melville
and Wayne Goddard.
3. Practical Research Methods, Dawson, C., UBSPD Pvt. Ltd.
Course Objectives:
1. To define cluster, Grid and cloud computing.
2. To provide exposure of the frontier areas of cluster, Grid and Cloud computing.
3. To make awareness about the programming and software environments related to cluster,
grid and cloud computing.
4. To focus on the grid and cloud computing security related issues.
5. To provide depth knowledge of the cluster, grid and cloud computing technologies and
applications.
6. To explore the features of the grid and cloud computing technologies.
Course Outcomes:
By the end of the course, students should be able to
1. Identify distributed computing technologies based on cluster, grid and cloud computing
systems.
2. Provide detail descriptions about cluster computing basics and its use as parallel computing
techniques.
3. Articulate the main concepts and key technologies of Grid Computing.
4. Describe basic cloud computing architecture and infrastructure such as IaaS, PaaS and SaaS.
5. Explain the comparative study of Grid and Cloud computing technologies with descriptions of
core issues of Grid and Cloud security and privacy.
6. Provide details about the programming and software tools for cluster, grid and cloud
computing emerging software systems.
UNIT VI Software Environments for Cluster, Grid and Cloud Computing 08 Hours
Parallel and Distributed Programming Paradigms: Parallel Computing and Programming Paradigms,
Map Reduce, Twister, and Iterative MapReduce, Hadoop Library from Apache, Sawzall and Pig Latin
High-Level Languages, Mapping Applications to Parallel and Distributed Systems, Programming the
Google App Engine, BigTable, Google’s NOSQL System.
Emerging Cloud Software Environments: Programming on Amazon EC2, Amazon Simple Storage
Service (S3), Amazon Elastic Block Store (EBS) and SimpleDB, Microsoft Azure Programming Support,
Open Source Eucalyptus and Nimbus, OpenNebula, Sector/Sphere, and OpenStack, Manjrasoft Aneka
Cloud and Appliances.
Text Books:
1. Kai Hwang, Jack Dongarra Geoffrey Fox, Distributed and Cloud Computing: From Parallel
Processing to the Internet of Things, Morgan Kaufmann Publishers Inc. San Francisco, CA, USA ,
1st Edition, eBook ISBN:9780128002049, Paperback ISBN: 9780123858801.
2. Lizhe Wang, Rajiv Ranjan, Jinjun Chen, Boualem Benatallah, CLOUD COMPUTING Methodology,
Systems, and Applications, CRC Press , 1st Edition, ISBN:9781439856413.
Reference Books:
1. Thomas Sterling, Beowulf Cluster Computing with Linux, The MIT press Cambride, 2 nd Edition ,
ISBN No.: 9780262692748.
2. Frederic Magoules, Fundamentals of grid computing, Theory and applications, Chapman and
Hall/CRC , 1st Edition, ISBN No.: 9781439803677.
3. Barry Wilkinson, GRID COMPUTING Techniques and Applications, Chapman and Hall/CRC , 1st
Edition, ISBN No.9781439803677.
4. Grid Computing, Joshy Joseph, Craig Fellenstein, IBM Press, 1st Edition, ISBN No.:
9781420069532.
5. Maozhen Li, Mark Baker, The Grid: Core Technologies, John Wiley & Sons, 1st Edition, ISBN No.
978-0-470-09417-4.
6. Rajkumar Buyya, High Performance Cluster Computing: Architectures and Systems, Prentice
Hall, 1st Edition, ISBN No. 0130137847
Course Objectives:
1. To understand software metrics and measurement.
2. To emphasize the use of product and quality metrics.
3. To explain quality assurance and various tools used in quality management.
4. To learn in detail about various quality assurance models.
5. To understand the audit and assessment procedures to achieve quality.
6. To educate various metrics and models to assess software.
Course Outcomes:
By the end of the course, students should be able to
1. Knowledge on how to choose which metrics to collect and use them to make predictions.
2. Ken on product and quality metrics.
3. An ability to use the techniques, skills, and modern engineering tools necessary for
engineering practice.
4. Understand how to detect, classify, prevent and remove defects.
5. Choose appropriate quality assurance models and develop quality.
6. Ability to conduct formal inspections, record and evaluate results of inspections.
Text Books:
1. Stephen H. Kan, Metric and Models in software Quality Engineering, Addison Wesley.
2. Daniel Galin, Software Quality Assurance: From Theory to Implementation, Addison Wesley,
Reference Books:
1. Norman E-Fentor and Share Lawrence Pflieger, Software Metrics International, Thomson
Computer Press.
2. S. A. Kelkar, Software quality and Testing, PHI Learing, Pvt, Ltd., New Delhi.
3. Stephen H. Kan, Metrics and Models in Software Quality Engineering, Addison Wesley.
4. Mark Lorenz, Jeff Kidd, Object-Oriented Software Metrics, Prentice Hall.
5. Caper Jones, Applied Software Measurement: Global Analysis of Productivity and Quality,
McGraw Hill, Third Edition.
Reference Books:
1. Stephen P. Borgatti, Analyzing Social Networks Paperback, ISBN-13: 978-1446247419. ISBN-10:
1446247414.
2. John Scott, Social Network Analysis Paperback, ISBN-10: 1446209040, ISBN-13: 978-
1446209042.
3. Robert A. Hanneman and Mark Riddle, Introduction to social network methods, University of
California, Riverside ( published in digital form at http://faculty.ucr.edu/~hanneman/ ).
Course Objectives:
1. To introduce speech production and related parameters of speech.
2. To introduce pitch as well as speech perception.
3. To understand the Speech features and linear prediction.
4. To explore the automatic speech recognition system.
5. To introduce speech synthesis.
6. To understand the applications of speech processing.
Course Outcomes:
By the end of the course, students should be able to
1. Apply Knowledge of Mathematics to perform analysis of Speech.
2. Demonstrate a familiarity with Speech Psychoacoustics and Speech Perception.
3. Develop speech prediction models using variety of speech features.
4. Design and develop speech recognition systems.
5. Improve performance of speech processing systems using speech synthesis.
6. Design Real-time applications using audio processing and analysis.
Text Books:
1. Ben Gold and Nelson Morgan, Speech and Audio Signal Processing, Wiley, ISBN No. 9-814-
12655-1.
2. L.R. Rabiner and Schafer, Digital Processing of Speech Signals, Pearson, ISBN No. 978-81-317-
0513-1.
Reference Books:
1. Lawrence Rabiner and BH Juang, Fundamentals of Speech Recognition, Pearson.
2. Chris Rowden, Speech Processing, Mc Graw Hill.
3. JL Flanagan, Speech Analysis Synthesis and Perception, Sprenger Vertag, Second Edition.
Course Objectives:
1. To introduce machine learning techniques
2. To become aware of various parametric and non-parametric methods in machine learning
3. To learn state-of-art dimensionality reduction techniques
4. To become familiar with widely used kernel machines
5. To understand various techniques of deep learning
6. To acquaint with neural networks.
Course Outcomes:
By the end of the course, students should be able to
1. Devise/develop machine learning model for real time applications.
2. Propose solution to real world problems in the domain of data mining.
3. Develop skills of using recent machine learning techniques and solve practical problems.
4. Evaluate a given problem and apply appropriate machine learning technique to gain knowledge
from the problem.
5. Understand how to solve present-day problems using deep learning.
6. Understand models of deep neural network.
Text Books:
1. Ethem Alpaydın, Introduction to Machine Learning, PHI, Third Edition, ISBN No. 978-81-203-
5078-6.
2. Nikhil Buduma, Fundamentals of Deep Learning, O’Reilly, First Edition, ISBN No. 978-14-919-
2561-4.
Reference Books:
1. Shai shalev-Shwartz and Shai Ben-David, Understanding Machine Learning(From Theory to
Algorithms), Cambridge University Press, First Edition, ISBN No. 978-1-107-51282-5.
Course Objectives:
1. To understand the challenges in parallel and multi-threaded programming.
2. To understand the recent trends in the field of Computer Architecture and identify
performance related parameters.
3. To study the various parallel programming paradigms and solution.
4. To understand the different types of multicore architectures.
5. To study the warehouse scale as well as embedded architectures.
Course Outcomes:
By the end of the course, students should be able to
1. Identify the limitations of ILP and the need for multicore architectures.
2. Handle the issues related to multiprocessing.
3. Exploit the concept of parallelism.
4. Gain the knowledge of the architecture of warehouse scale computers and embedded
processors.
5. Program Parallel Processors and develop programs using OpenMP and MPI.
6. Compare and contrast programming for serial processors and programming for
parallel processors.
Text Books
1. John L. Hennessey and David A. Patterson, “ Computer Architecture – A quantitative
approach”, Morgan Kaufmann / Elsevier, 4th. Edition.
2. David E. Culler, Jaswinder Pal Singh, “Parallel Computing Architecture : A hardware/
software approach”, Morgan Kaufmann / Elsevier.
3. Darryl Gove, “Multicore Application Programming for Windows, Linux, and Oracle
Solaris”, Pearson, 2011.
Reference Books:
1. William Stallings, “Computer Organization and Architecture – Designing for Performance”,
Pearson Education, Seventh Edition.
2. Dezso Sima, Terence Fountain, Peter Kacsuk “Advanced Computer Architectures” A Design
space approach, Pearson Education.
3. Advanced Computer Architecture Parallelism, Scalability – Kai Hwang, Programmability, Tata
McGrawhill.
4. Michael J Quinn, “Parallel programming in C with MPI and OpenMP”, Tata McGraw Hill, 2003.
5. Shameem Akhter and Jason Roberts, “Multi-core Programming”, Intel Press, 2006.
The concerned faculty member should frame minimum two assignments having sufficient
complexity based on the subjects Mathematical Foundation of Information Technology(MFIT),
Advanced Software Engineering and Project Management(ASEPM), Applied Algorithms(AA),
Students should prepare a journal which will include necessary architecture/design, algorithm and its
analysis, test cases, mathematical model etc. The assessment of the assignment should be carried out
continuously throughout the semester and the record for the same should be produced at the time of
examination. The evaluation will be done by a pair of examiners appointed by Savitribai Phule Pune
University.
SEMESTER-II
Course Objectives:
Course Outcomes:
Text Books:
1. Dieter Gollmann, “Computer Security”, 3rd edition, Wiley Publication.
2. Egohan Casey, “Handbook of Digital Forensics and Investigation”, ELSEVIER-Academic Press, 2010. ISBN
13: 978-0-12-374267-4
Reference Books:
1. Ross J. Anderson, “Security Engineering: A Guide to Building Dependable Distributed Systems”, Wiley
Publication.
2. Nina Godbole, Sunit Belapure, “Cyber Security”, Wiley Publication.
3. Bill Nelson, Amelia Phillips, Christopher Steuart, Cengage Learning, “Guide to Computer Forensics &
Investigation”, Fourth Edition, ISBN 13 : 978-1-43-549883-9.
Text Books:
1. Thomas Erl, Zaigham Mahmood and Ricardo Puttini, Cloud Computing: Concepts, Technology
& Architecture, Pearson, First Edition, ISBN No. 789332535923, 9332535922.
2. Cathy O'Neil, Rachel Schutt, Doing Data Science, O’Reilly, First Edition, ISBN No.
9781449363871.
Reference Books:
1. Domenico Talia, Paolo Trunfio, Fabrizio Marozzo, Data Analysis in the Cloud Models,
Techniques and Applications, Elsevier, First Edition, ISBN No. 780128028810.
2. Wenhong Dr. Tian, Yong Dr. Zhao, Optimized Cloud Resource Management and Scheduling,
Elsevier, First Edition, ISBN No. 9780128014769.
3. Jack J. Dongarra, Kai Hwang, Geoffrey C. Fox, Distributed and Cloud Computing: From Parallel
Processing to the Internet of Things, Elsevier, First Edition, ISBN No. 9789381269237,
9381269238.
4. Rajkumar Buyya, Christian Vecchiola, S.Thamarai Selvi, Mastering Cloud Computing:
Foundations and Applications Programming, McGraw Hill, First Edition, ISBN No.
9781259029950, 1259029956.
UNIT VI Forecasting Models and Project Management (PERT and CPM) 08 Hours
Judgmental Techniques, Time Series, Forecasting Procedures for a Constant Level Model, A Forecasting
Procedure for a Linear Trend Model, A Forecasting Procedure for a Constant Level with Seasonal Effect
Model. Project Management: Introduction, Basic Difference between PERT and CPM, Phases of Project
Management, PERT / CPM Network Components and Precedence Relationships, Critical Path Analysis.
Text Books:
1. J K Sharma, Operations Research: Theory and Applications, Trinity Press 5th Edition ISBN No.
9789350593363.
2. Frederick S. Hillier, Gerald Lieberman, Introduction to Operations Research, McGraw Hill, 6th
Edition ISBN No. 0071139893.
Reference Books:
1. Gerald Lieberman, Operations Research: An Introduction, PHI, 9th Edition, ISBN No. 978-
9332518223.
2. Gupta Prem Kumar and Hira D.S, Problems in Operations Research, S. Chand, ISBN No.978-
8121909686.
3. Wayne L. Winston, Operations Research Applications and Algorithms, Cengage Learning, 4th
Edition, ISBN No. 978-8131501900.
4. P Sankara Iyer, Operations Research, Sigma Series, TMH, 1st Edition, ISBN No.978-0070669024.
Text Books:
1. Network Routing: Algorithms, Protocols, and Architectures Deepankar Medhi and Karthikeyan
Ramasamy (Morgan Kaufmann Series in Networking).
2. Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices
George Varghese (Morgan Kaufmann Series in Networking).
Reference Books:
Course Objectives:
1. To provide an overview of Information Experience and its evolution.
2. To approach a Design problem beyond Usability and Usefulness.
3. To provide an understanding of how users experience the products and services.
4. To address issues and challenges for achieving a human-centered design process with regard
to user experience design.
5. To introduce students to the critical elements of User Interface Design through Design Process,
User Research and Research Deliverables.
6. To introduce Effective Usability Testing Principles for great User Experience.
Course Outcomes:
By the end of the course, students should be able to
1. Understand and reproduce Elements of User Experience Design in summarizing Information
Experience.
2. Design and develop online services, from requirement gathering to production and testing with
end users from design point of view.
3. Provide a perspective about how user research can be done fast and results can be presented
effectively.
4. Develop, Analyze and Evaluate User centered application design.
5. Measure the effectiveness of Information Design through User Interaction and Data
Visualization.
6. Apply Usability Testing Principles for testing design prototypes.
Text Books:
1. Jesse James Garrett, The Elements of User Experience: User-Centered Design for the Web and
Beyond, New Riders, Second Edition, ISBN No. 13: 978-0-321-68368-7.
2. Jeffrey Rubin, Handbook of Usability Testing: How to Plan, Design, and Conduct Effective Tests,
John Wiley and Sons, Second Edition, ISBN No. 9780470185483.
Reference Books:
1. Rex Hartson, Pardha Pyla, The UX book: process and guidelines for ensuring a quality user
experience, Morgan Kaufmann, ISBN No. 9780123852410.
2. Tom Bulls, Bill Albert, Measuring The User Experience: Collecting, Analyzing and Presenting
Usability Metrics, Elsevier Science, ISBN No. 9780124157811, 0124157815.
3. Russ Unger, Carolyn Chandler, A Project Guide to UX Design: For user experience designers in
the field or in the making (Voices That Matter), New Riders (Pearson Education), Second
Edition, ISBN No. 978-0-321-81538-5.
4. Theo Mandel, The Elements of User Interface Design, John Wiley and Sons.
5. Bill Buxton, Sketching User Experiences: Getting the Design Right and the Right Design Book,
Morgan Kaufmann, ISBN No. 978-0-12-374037-3.
Course Objectives:
1. To learn the basics of Natural Language Processing and its applications.
2. To learn linguistics essentials and building blocks of Natural Language Processing.
3. To learn the techniques in natural language processing.
4. Be familiar with natural language understanding and generation.
5. To understand the information retrieval techniques.
Course Outcomes:
By the end of the course, students should be able to
1. Understand different building blocks of NLP.
2. Design algorithms for NLP problems.
3. Understand machine translation and its techniques.
4. Learn and use different tools for NLP.
Text Books:
1. James Allen, Natural language understanding, Pearson, Second Edition, ISBN No.0-8053-0334-0
2. Christopher D. Manning Hinrich Schiitze, Foundations of Statistical Natural Language
Processing, The MIT Press, Second Edition, ISBN No. 0-262-13360-l.
Reference Books:
1. Charniack, Eugene, Statistical Language Learning, The MIT Press, Second Edition.
2. Jurafsky, Dan and Martin, James, Speech and Language Processing, Prentice Hall, Second
Edition.
Course Objectives:
1. To understand various Image Analysis and Interpretation techniques
2. To describe different methods of Feature generation, Representation, Description and
Interpretation.
3. To Analyze & Interpret Images and use for various applications
Course Outcomes:
By the end of the course, students should be able to
1. To experimentally evaluate different image analysis algorithms and summarize the results.
2. To choose appropriate image processing methods for image filtering, image Restoration,
image reconstruction, segmentation, classification and representation
3. To suggest a design of a computer vision system for a specific problem applications.
Text Books:
1. Rafael C. Gonzalez and Richard E.Woods, Digital Image Processing, Pearson Prentice Hall,
Second Edition.
2. S. Jayaraman, S. Esakkirajan, T. Veerakumar, Digital Image Processing, Tata McGraw-Hill
Education Private Limited.
3. Madhuri A. Joshi, Digital Image Processing An Algorithm Approach, PHI.
Reference Books:
1. Harley R. Myler, Arthur R. Weeks, The Pocket Handbook of Image processing algorithms in C,
Prentice Hall, ISBN No. 0-13-642240-3.
Course Objectives:
1. To introduce the different Computational Intelligence Paradigms.
2. To explain the feed-forward neural networks and its learning methods
3. To explain feed-back neural networks and its learning methods.
4. To summarize the Evolutionary Computation and Swarm Intelligent Systems.
5. To interpret different hybrid intelligent systems
6. To discuss the different applications of Computational Intelligence
Course Outcomes:
By the end of the course, students should be able to
1. Interpret the importance of Computational Intelligence for solving the different problems
2. Select the appropriate type of neural network architecture and learning method.
3. Optimize the solutions by using different optimization techniques.
4. Evaluate the importance of different hybrid intelligent systems.
5. Formulate the solution to the different real world problems with the use of advanced
computing techniques.
Text Books:
1. S. P. Simon, N. P. Padhye, Soft Computing with Matlab Programming, OXFORD UNIVERSITY
PRESS, 1st Edition, ISBN No. 978-0-19-945542-3.
2. Cognitive Computing and Big Data Analytics, John Wiley and Sons.
Reference Books:
1. Andries P. Engelbrecht, Computational Intelligence: An Introduction, PHI, 2nd Edition ISBN No.
978-0-470-03561-0.
2. J.-S. R. Jang, C.-T. Sun, E. Mizutani, Neuro-fuzzy and Soft Computing A Computational
Approach to Learning and Machine Intelligence, PHI, 2nd Edition, ISBN-978-81-203-2243-1
3. Kacprzyk,Pedrycz Editors, Springer Handbook of computational intelligence, Springer series,
ISBN-13: 978-3662435045.
Course Objectives:
1. To understand the concepts, principles, strategies, and methodologies of Web applications and
development
2. To design and construct webapp.
3. To understand the Web deployment processes
4. To understand the current of web technologies
5. To understand webapp testing.
6. To understand content management system.
Course Outcomes:
By the end of the course, students should be able to
1. Apply the concepts, principles and methods of Web engineering;
2. have a sufficient theoretical knowledge and analytical skills to develop Web applications
3. Design and develop website using current Web technologies
4. Demonstrate web deployment process
5. Use webapp testing methods.
6. Demonstrate the use of CMS.
Text Books:
1. Roger S. Pressman, David Lowe, Web Engineering, Tata Mcgraw Hill Publication, Sixth Edition,
ISBN No. 978-0073523293.
2. Achyt Godbole, Atul Kahate, Web Technologies, McGraw Hill, Second Edition, ISBN
No.9383286571.
3. Steven M. Schafer, HTML, XHTML and CSS, Wiley India Edition, Fourth Edition, ISBN No. 978-
81-265-1635-3.
Reference Books:
1. Ivan Bayross, Web Enabled Commercial Application Development Using HTML, JavaScript,
DHTML and PHP, BPB Publication, Fourth Edition, ISBN No. 978-8183330084.
2. Jason Hunter, Java Servlet Programming, O’reilly Publication, Second Edition, ISBN No. 978-0-
596-00040-0.
3. Jim Keogh, J2EE: The Complete Reference, Tata McGraw Hill Pulishing Company, First Edition,
ISBN No. 978-0-07-052912-0.
4. Brad Williams, David Damstra, Hal Stern, Professional WordPress: Design and Development,
Wrox publications, Third Edition, ISBN No. 978-1-118-98724-7.
5. Ralpha Moseley, M.T. Savaliya, Developing Web Applications, Wrox publications, Second
Edition, ISBN No. 978- 81-265-3867-6.
6. Kogent Learning Solutions Inc, Web Technologies Black Book: HTML, JavaScript, PHP, Java, JSP,
XML and AJAX, Dreamtech Press, 2009, ISBN No. 8177229974.
7. Gerti Kappel, Birgit Proll, Web Engineering, John Willey and Sons Ltd, Third Edition, ISBN
No. 978-81-265-2162-3.
8. B. V. Kumar, S. Sangeetha, S. V. Subrahmanya, J2EE Architecture, an illustrative gateway to
enterprise solutions: concept to Application Design and deployment, Tata McGraw Hill
Publishing Company, ISBN No. 978-0070621633.
9. Stephanie Leary, WordPress for Web developers: An introduction to web professionals, Apress
Publications, Second Edition, ISBN No. 978-1-4302-5867-4.
10. Dr. Hiren Joshi, Web Technology and Application Development, DreamTech, ISBN No. 978-93-
5004-088-1.
The students will deliver a seminar on state-of-art topic of current interest in Information
Technology, Computer Science and Engineering field. The student is expected to study and review at
least five research papers from IEEE, ACM, Springer journals/transactions, reviewed international
conferences related to a topic he/she has chosen for seminar. The seminar guide shall maintain a
progressive record of seminar such as discussion agenda, weekly outcomes achieved, corrective
actions and comments on the progress report as per the plan submitted by the student etc. and
should be produced at the time of examination/presentation. The student shall submit the seminar
report in standard format, duly certified for satisfactory completion of the work by the concerned
guide and head of the Department/Institute during practical sessions. The evaluation of the seminar
would be carried out as per the Rules and Regulations for M.E. Programs under faculty of Engineering
effective from June 2013.
The concerned faculty member should frame minimum two assignments having sufficient
complexity based on the subjects Cyber Security and Forensics, Cloud and Data Technologies &
Information Technology Oriented Operations Research Students should prepare a journal which will
include necessary architecture/design, algorithm and its analysis, test cases, mathematical model etc.
The assessment of the assignment should be carried out continuously throughout the semester and
the record for the same should be produced at the time of examination. The evaluation will be done
by a pair of examiners appointed by Savitribai Phule Pune University.
SEMESTER-III
Course Objectives:
1. To study the Mobile adhoc networks and its applications
2. To study the routing algorithm in mobile adhoc network
3. To study the transport protocols used in mobile adhoc network
4. To study the security mechanism used in mobile adhoc network
5. To understand the quality of service for mobile adhoc network
Course Outcomes:
By the end of the course, students should be able to
1. To understand the routing algorithm used mobile adhoc network
2. To understand the Transport protocol of mobile adhoc network
3. To understand the security mechanism used in mobile adhoc network
4. To understand the quality of service.
Text Books:
1. Siva Ram Murthy C. and B.S. Manoj “Ad Hoc Wireless Networks: Architectures and Protocols”,
Prentice Hall PTR,2004
2. Toh C.K., Ad Hoc Mobile Wireless Networks: Protocols and Systems, Prentice Hall PTR ,2001
Reference Books:
1. Charles E. Perkins, Ad Hoc Networking, Addison Wesley, 2000
2. Holger Karl, Andreas Willig, Protocols and Architectures for Wireless Sensor Networks ISBN:
978-0-470-09510-2, Wiley.
3. Kazem Sohraby, Daniel Minoli, Taieb Znati Wireless Sensor Networks: Technology, Protocols,
and Applications, Wiley.
Course Objectives:
1. To study the fundamentals of OS and DOS
2. To understand the concept of Inter-process communication in distributed OS
3. To understand the synchronization in distributed OS
4. To understand the resource management distributed OS
5. To study and understand the recent type of advanced OS (Mobile OS)
Course Outcomes:
By the end of the course, students should be able to
1. Understand the general concept of OS and DOS.
2. Understand and apply inter-process communication in the distributed OS
3. Understand the synchronization in distributed OS.
4. Understand the resource management distributed OS.
5. Study and understand the recent type of advanced OS (Mobile OS)
Text Books:
1. Thomas W. Doeppner, Operating Systems in Depth, Wiley India, First Edition, ISBN No. 978-81-
2653709-9.
2. Dr. P. K. Sinha, Distributed Operating Systems: Concepts and Design, PHI, Second Edition, ISBN
No. 978-0780311190.
3. Michael J. Jipping, Smartphone Operating System Concepts with Symbian OS: A Tutorial Guide,
John Wiley & Sons, ISBN No. 978-0-470-06523-5.
Reference Books:
1. Mukesh Singhal and Niranjan Shivaratri, Advanced Concepts In Operating System, Tata
McGraw-Hill Education, ISBN No. 978-0070575721.
2. G.Coulouris, J. Dollimore, T. Kindberg & G. Blair, Distributed Systems concepts and design,
Addison Wesley, Fifth Edition, ISBN No. 978-0-13-214301-1.
Course Objectives:
1. To study Basic wireless Technologies in IoT
2. To study Security issues in IoT
3. To explore Identity management models
4. To study research, innovation and applications in IoT
5. To study fundamentals of SDN
6. To study the applications of SDN
Course Outcomes:
By the end of the course, students should be able to
1. Understand Basic wireless Technologies and security issues in IOT
2. Understand Identity management models.
3. Understand access control in IoT context.
4. Gain the knowledge of research opportunities in IoT.
5. Understand fundamentals of SDN.
6. Understand advances and applications in SDN.
Text Books:
1. Daniel minoli, Building the Internet of Things with Ipv6 and Mipv6, WILEY, ISBN No. 978-1-118-
47347-4.
2. Paul Goransson, Chuck Black, Timouthy Culver, Software Defined Network- A comprehensive
Approach, Elsevier, ISBN No. 978-0-12-804555-8.
Reference Books:
M.E. (Information Technology) Syllabus 2017 Course 63
Savitribai Phule Pune University
1. Brian Russell, Drew Van Duren, Practical Internet of Things Security, PACKT, ISBN No.978-1-
75588-963-9.
2. Ovidiu Vermesan, Peter Friess, Internet of Things- From Research and Innovation to Market
Deployment, Rivers Publication, ISBN No.978-87-93102-94-1.
Course Objectives:
1. To focus on the basics and benefits of EAI with Integration Models.
2. To highlight on the importance and applications of EAI and Middleware Interfaces.
3. To present the association of EAI and various Information Systems scenario.
4. To focus on the Integration of Business Processes and Enterprise Application on various
software platforms.
5. To apply and strengthen the integration of EAI and Design Patterns.
6. To apply and extensify the practical implementation of EAI and XML services.
Course Outcomes:
By the end of the course, students should be able to
1. Learn the basics of EAI and Integration Models.
2. Inculcate the importance of EAI and Middleware Integration.
3. Learn the various EAI and Information Systems integration.
4. Focus on EAI and Business Process Integration on Software Platforms.
5. Apply the EAI and Design patterns integration.
6. Apply the EAI and XML integration through Web based applications.
Text Books:
1. William A. Ruh, Francis X. Maginnis and William J. Brown, Enterprise Application Integration, A
Wiley Tech Brief.
2. David S. Linthicum, Enterprise Application Integration, Addison-Wesley Information
Technology Series).
3. David S. Linthicum, Next Generation Application Integration: From Simple Information to Web
Services, Addison Wesley Pub Date: August 15, ISBN: 0-201-84456-7 Pages: 512.
4. http://www.eai.ittoolbox.com.
5. http://www.javaworld.com/javaworld/jw-08-2002/jw-0809eai.html (Enterprise application
integration using J2EE).
Reference Books:
1. S. Duke, P. Makey, N. Kiras, Application Integration Management Guide: Strategies and
Technologies, Butler Group Limited, Hull, UK.
2. J. Morgenthal, B. La Forge, Enterprise Application Integration with XML and Java, in: C.
Goldfarb (Ed.), Open Information Management, Prentice-Hall, Englewood Cliffs, NJ, USA.
3. D. Avison, G. Fitzgerald, Information Systems Development: Methodologies, Techniques, and
Tools, McGraw Hill, London, UK.
4. Martin Fowler, Patterns of Enterprise Application Architecture, 2003, Addison-Wesley
Professional, ISBN10: 0321127420 ISBN-13: 9780321127426.
5. Fred A. Cummins, Enterprise Integration: An Architecture for Enterprise Application and
Systems Integration, Wiley, ISBN-10: 0471400106 ISBN-13: 978-0471400103.
Course Outcomes:
By the end of the course, students should be able to
1. Gain knowledge about phases of PLM, PLM strategies and methodology for PLM feasibility
study and PDM implementation.
2. Illustrate various approaches and techniques for designing and developing products.
3. Apply product engineering guidelines / thumb rules in designing products for molding,
machining, sheet metal working etc.
4. Acquire knowledge in applying virtual product development tools for components, machining
and manufacturing plant.
UNIT VI Life Cycle Assessment and Life Cycle Cost Analysis 08 Hours
Properties, and Framework of Life Cycle Assessment, Phases of LCA in ISO Standards, Fields of
Application and Limitations of Life Cycle Assessment, Cost Analysis and the Life Cycle Approach,
General Framework for LCCA, Evolution of Models for Product Life Cycle Cost Analysis.
Reference Books:
1. John Stark, “Product Lifecycle Management: Paradigm for 21st Century Product Realization”,
2. Springer-Verlag, 2004. ISBN: 1852338105.
3. Fabio Giudice, Guido La Rosa, AntoninoRisitano, “Product Design for the environment-A life
4. cycle approach”, Taylor & Francis 2006, ISBN: 0849327229
5. SaaksvuoriAntti, ImmonenAnselmie, “Product Life Cycle Management”, Springer, Dreamtech,
6. ISBN: 3540257314
7. Michael Grieve, “Product Lifecycle Management: Driving the next generation of lean thinking”,
8. Tata McGraw Hill, 2006, ISBN: 0070636265
Course Outcomes:
By the end of the course, students should be able to
1. survey image processing techniques, FOSS tools and related mathematics
2. write image processing programs with applying concepts using open source tools;
3. solve Image Processing problems using different pattern recognition algorithms
4. select an efficient classifier to solve the image processing problem
Text Books:
1. Robert Haralick and Linda Shapiro, Computer and Robot Vision, Addison Wesley, Vol I & II.
2. David A. Forsyth, Jean Ponce, "Computer Vision: A Modern Approach, PHI.
Reference Books:
1. R Jain, R Kasturi, Machine Vision, McGraw Hill.
2. R. O. Duda, P. E. Hart, D. G. Stork, Pattern Classification, Wiley-Inter-science, John Wiley &
Sons, Second Edition.
3. David G. Stork and Elad Yom-Tov, Computer Manual in MATLAB to accompany Pattern
Classification, Wiley Inter-science.
Course Objectives:
1. To understand and Implement Green practices in Information and Communication
Technologies.
2. To recognize the green devices and hardware
3. To comprehend how green ICT can help improve environmental Sustainability
4. To understand the impact of Green networking on ICT
5. To monitor and analyze energy consumption in Green Data Centers and Green Data Storage
6. To follow the regulations of Green ICT
Course Outcomes:
By the end of the course, students should be able to
1. Acquire fundamental knowledge of energy efficiency and green communications exploring the
main challenges, mechanisms, and practice considering both wired and wireless systems.
2. Recognize the appropriate software and hardware for greening IT.
3. Understand different methodologies for sustainable software development.
4. Comprehend IT Infrastructure for green networking.
5. Analyze Energy Management in Green Data Centers and Green Data Storage.
6. Acquiring knowledge of laws, standards, and protocols in Green ICT.
Text Books:
1. San Murugesan, G.R. Gangadharan, Harnessing Green IT: Principles and Practices, Wiley, ISBN
No.13:9788126539680.
Reference Books:
1. Konstantinos Samdanis, Peter Rost, Andreas Maeder, Michela Meo, Christos Verikoukis , Green
Communications: Principles, Concepts and Practice, Wiley, , ISBN No.978-1-118-75926-4.
2. Ramjee Prasad, Shingo Ohmori, Dina Simunic, Towards Green ICT, River Publication, ISBN
No.978-87-92329-34-9.
Institute / Department will interact with Industry or vice a versa to offer a need based topic and will
prepare tentative contents of the syllabus and will get it approved from the BOS (Information Tech.)
Students of ME (Information Technology) can also select any subject from the list of open electives of
other branches (Elective III only) provided that the concerned college has informed it to the BOS
Chairman of IT and examination section of University of Pune well in time.
BOS (Information Technology) will declare the syllabus of such subject(s) before commencement of
the Semester/Academic Year.
Course Objectives:
1. To study recent research findings on important problems in the field of Information
Technology.
2. To acquaint students with sources of literature in the field of Information Technology and
Computer Engineering.
3. To provide an opportunity for students to review literature and personal communication.
4. To develop professional skills in the area of public speaking and an ability to present oneself
before his/her peers with credibility.
Course Outcomes:
By the end of the course, students should be able to
1. Search for literature on the specific topic of his/her interest
2. Summarize the findings and gaps in the problem identified.
3. Use presentation tools for creating effective multimedia presentations
Introduction
The students will deliver a seminar on state-of-art topic of current interest in Information Technology,
Computer Science and Engineering field preferably on elective subject. The student is expected to
study and review at least five research papers from IEEE, ACM, Springer journals/transactions,
reviewed international conferences related to a topic he/she has chosen for seminar.
The seminar guide shall maintain a progressive record of seminar such as discussion agenda, weekly
outcomes achieved, corrective actions and comments on the progress report as per the plan
submitted by the student etc. and should be produced at the time of examination/presentation.
Guidelines for Reviews
Faculty in-charge/ PG coordinator should conduct at-least three reviews in the semester to check the
progress of the seminar.
Guidelines for Report Submission
The student shall submit the seminar report in standard format, duly certified for satisfactory
completion of the work by the concerned guide and head of the Department/Institute during practical
sessions the seminar report (excluding preliminary pages like title page, certificate, index etc.) should
not have more than 15 percent of plagiarism. The plagiarism report should be attached as the last
page in the report.
The project stage-I should include Motivation, Problem statement, survey of reputed journal and/or
reviewed international conference papers (adequate in number) related to the problem selected
(problem modeling and design using set theory, NP-Hard analysis, SRS, UML, Classes, Signals, Test
scenarios and other necessary, problem specific UML, software engineering documents, project plan).
Student should publish at least one paper in reviewed International Journal having ISSN Number and
preferably with Citation Index II or International Journal recommended by the guide of the project or
reputed reviewed conferences. The term work should include the paper published, reviewer’s
comments and certificate of presenting the paper in the conference organized/sponsored by the
Board of Studies in Information Technology. The guides should maintain a progressive record of the
project work such as discussion agenda, weekly outcomes achieved during practical sessions,
corrective actions and comments on the progress report as per the plan submitted by the students
etc. and should be produced at time of examination.
SEMESTER-IV
Course Objectives:
1. To study recent research findings on important problems in the field of Information
Technology.
2. To acquaint students with sources of literature in the field of Information Technology and
Computer Engineering.
3. To provide an opportunity for students to review literature and personal communication.
4. To develop professional skills in the area of public speaking and an ability to present oneself
before his/her peers with credibility.
Course Outcomes:
By the end of the course, students should be able to
1. Search for literature on the specific topic of his/her interest
2. Summarize the findings and gaps in the problem identified
3. Describe the summary and list key (most essential) ideas of the reviewed papers.
4. Use presentation tools for creating effective multimedia presentations
Introduction
The students will deliver a seminar on state-of-art topic of current interest in Information Technology,
Computer Science and Engineering field preferably on elective subject. Students can take topic related
to their dissertation but should not be exactly same as their dissertation topic.
The student is expected to study and review at least five research papers from IEEE, ACM, Springer
journals/transactions, reviewed international conferences related to a topic he/she has chosen for
seminar.
The seminar guide shall maintain a progressive record of seminar such as discussion agenda, weekly
outcomes achieved, corrective actions and comments on the progress report as per the plan
submitted by the student etc. and should be produced at the time of examination/presentation.
Guidelines for Reviews
Faculty in-charge/ PG coordinator should conduct at-least three reviews in the semester to check the
progress of the seminar.
The student will select an appropriate Technology, implant a detailed design prepared in project
stage-I, test it manually and/or using tools, obtain desired results, discuss performance in terms of
improvement with existing known algorithms and comparative graphs to support the conclusions
drawn. Student should publish at least one paper in reviewed International Journal having ISSN
Number and preferably with Citation Index II or reviewed International Journal recommended by the
guide of the Dissertation or reviewed reputed international conference. The term work shall include
the paper published, reviewer’s comments and certificate of presenting the paper in the conference
organized/sponsored by the Board of Studies in Information Technology. The guides should maintain a
progressive record of the project work such as discussion agenda, weekly outcomes achieved during
practical sessions, corrective actions and comments on the progress report as per the plan submitted
by the students etc. and should be produced at time of examination. A maximum number of students
assigned to a guide should not be more than Eight (8).