M.Tech (CS) Syllabus SRIT R23
M.Tech (CS) Syllabus SRIT R23
M.Tech (CS) Syllabus SRIT R23
COURSE STRUCTURE
& SYLLABUS
M. Tech Regular Two Year Master’s Degree Program
(Applied for the Batches admitted from 2023-2024)
Page 1 of 67
M.Tech.[Computer Science]
COURSE STRUCTURE AND SYLLABI
SRIT-R23
Master of Technology
In
Computer Science
Page 2 of 67
M.Tech.[Computer Science]
M. Tech Course Structure
Semester 1
(Computer Science)
I Semester: I M.Tech I Semester (5 Theory + 2 Labs + 1 AC)
Scheme of
Periods
Course Subject Examination
Course Name per week Credits
Code Area (Max. Marks)
L T P CIA SEE Total
Advanced Data Structures and
23DCS101 PCC 3 0 0 3 40 60 100
Algorithms
23DCS102 Advanced Computer Networks PCC 3 0 0 3 40 60 100
Program Elective Course – I PEC 3 0 0 3 40 60 100
Program Elective Course – II PEC 3 0 0 3 40 60 100
Advanced Data Structures and
23DCS105 PCC 0 0 4 2 40 60 100
Algorithms Lab
23DCS106 Advanced Computer Networks Lab PCC 0 0 4 2 40 60 100
23DRM101 Research Methodology and IPR MCC 2 0 0 2 40 60 100
Audit Course – I AC 2 0 0 0 40 - 40
Total 18 320 420 740
Scheme of
Periods
Course Subject Examination
Course Name per week Credits
Code Area (Max. Marks)
L T P CIA SEE Total
23DCS201 Advanced Operating Systems PCC 3 0 0 3 40 60 100
23DCS202 Advanced Databases PCC 3 0 0 3 40 60 100
Program Elective Course – III PEC 3 0 0 3 40 60 100
Program Elective Course – IV PEC 3 0 0 3 40 60 100
23DCS205 Advanced Operating Systems Lab PCC 0 0 4 2 40 60 100
23DCS206 Advanced Databases Lab PCC 0 0 4 2 40 60 100
23DCS207 Technical Seminar PR 0 0 4 2 100 - 100
Audit Course – II AC 2 0 0 0 40 - 40
Total 18 380 360 740
Scheme of
Periods
Course Subject Examination
Course Name per week Credits
Code Area (Max. Marks)
L T P CIA SEE Total
Program Elective Course – V PEC 3 0 0 3 40 60 100
Open Elective – I OEC 3 0 0 3 40 60 100
23DCS302 Dissertation Phase – I PR 0 0 20 10 100 - 100
23DCS303 Co-Curricular Activities 0 0 0 2 40 - 40
Total 18 220 120 340
Page 3 of 67
M.Tech.[Computer Science]
IV Semester: II M. Tech II Semester (1 DP)
Scheme of
Periods
Course Subject Examination
Course Name per week Credits
Code Area (Max. Marks)
L T P CIA SEE Total
23DCS401 Dissertation Phase – II PR 0 0 32 16 - 100 100
Total 16 - 100 100
Page 4 of 67
M.Tech.[Computer Science]
Program Elective Course-I
Scheme of
Periods
Course Subject Examination
Course Name per week Credits
Code Area (Max. Marks)
L T P CIA SEE Total
23DCS103a Machine Learning PEC 3 0 0 3 40 60 100
23DCS103b Advanced Computer Architecture PEC 3 0 0 3 40 60 100
23DCS103c Object Oriented Software Engineering PEC 3 0 0 3 40 60 100
Scheme of
Periods
Course Subject Examination
Course Name per week Credits
Code Area (Max. Marks)
L T P CIA SEE Total
23DCS104a Data Science PEC 3 0 0 3 40 60 100
23DCS104b Distributed Computing PEC 3 0 0 3 40 60 100
23DCS104c Information Security PEC 3 0 0 3 40 60 100
Scheme of
Periods
Course Subject Examination
Course Name per week Credits
Code Area (Max. Marks)
L T P CIA SEE Total
23DCS203a Deep Learning PEC 3 0 0 3 40 60 100
23DCS203b Computer Vision PEC 3 0 0 3 40 60 100
23DCS203c Service Oriented Architecture PEC 3 0 0 3 40 60 100
Scheme of
Periods
Course Subject Examination
Course Name per week Credits
Code Area (Max. Marks)
L T P CIA SEE Total
23DCS204a Data Visualization Techniques PEC 3 0 0 3 40 60 100
23DCS204b Internet of Things PEC 3 0 0 3 40 60 100
23DCS204c Privacy Preserving Data Publishing PEC 3 0 0 3 40 60 100
Scheme of
Periods
Course Subject Examination
Course Name per week Credits
Code Area (Max. Marks)
L T P CIA SEE Total
23DCS301a Software Defined Networks PEC 3 0 0 3 40 60 100
23DCS301b Reinforcement Learning PEC 3 0 0 3 40 60 100
23DCS301c Data Analytics PEC 3 0 0 3 40 60 100
Page 5 of 67
M.Tech.[Computer Science]
Open Elective-I
Scheme of
Periods
Course Subject Examination
Course Name per week Credits
Code Area (Max. Marks)
L T P CIA SEE Total
23DOE301a Optimization Techniques OEC 3 0 0 3 40 60 100
23DOE301b Industrial Safety OEC 3 0 0 3 40 60 100
23DOE301c Business Analytics OEC 3 0 0 3 40 60 100
Audit Course-I
Scheme of
Periods
Course Subject Examination
Course Name per week Credits
Code Area (Max. Marks)
L T P CIA SEE Total
23DAC101a English for Research Paper Writing AC 2 0 0 0 40 - 40
23DAC101b Disaster Management AC 2 0 0 0 40 - 40
23DAC101c Sanskrit for Technical Knowledge AC 2 0 0 0 40 - 40
Audit Course-II
Scheme of
Periods
Course Subject Examination
Course Name per week Credits
Code Area (Max. Marks)
L T P CIA SEE Total
23DAC201a Pedagogy Studies AC 2 0 0 0 40 - 40
23DAC201b Yoga for Stress Management AC 2 0 0 0 40 - 40
Personality Development through Life
23DAC201c AC 2 0 0 0 40 - 40
Enlightenment Skills
Page 6 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Advanced data structures and algorithms
(Computer Science)
Text books:
1 Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, second Edition, Pearson,
2004.
2 T.H.Cormen, C.E.Leiserson, R.L.Rivest, Introduction to Algorithms, Third Edition
PrenticeHall,2009
Reference Books:
1 T.H.Cormen, C.E.Leiserson, R.L.Rivest, Introduction to Algorithms, Third Edition Prentice
Hall,2009.
2 “Advanced Data Structures” by Peter Brass
3 “Data Structures and Algorithms Made Easy: Data Structures and Algorithmic Puzzles” by
Narasimha Karumanchi
Page 7 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Explain the concept of hashing and its role in efficient data retrieval from dictionaries.
CO2 Understand the need for randomizing data structures and algorithms to achieve efficient and
balanced performance.
CO3 Analyze the time complexity of search and update operations on 2-3 trees and understand
their efficiency.
CO4 Describe standard trees and their applications in storing and searching for strings efficiently.
CO5 Construct and analyze the Priority Search Tree data structure, which is used for efficient
range searching in multidimensional space.
CO6 Develop a comprehensive understanding of various data structures and algorithms
commonly used in computer science.
Page 8 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Advanced computer networks
(Computer Science)
Unit II – Switching
Circuit-Switched Networks, Datagram Networks, Virtual-Circuit Networks, Message-Switched
Networks, Asynchronous Transfer Mode: Evolution, Benefits, Concepts, Exploring Broadband
Integrated Services Digital Network, Layer and Adaptation Layer, IPv4: Address Space,
Notations, Classful, Classless, Network Address Translation, Datagram.
Unit IV – Internetworking
Intra-Domain and Inter-Domain Routings, Unicast Routing Protocols: RIP, OSPF and BGP,
Multicast Routing Protocols: DVMRP, PIM-DM, PIM-SM, CBT, MSDP and MOSPF, Spanning Tree
Algorithm, Optical Networking: SONET/SDH Standards, Traffic Engineering: Requirement, Traffic
Sizing, Characteristics, Protocols, Time and Delay Considerations, Connectivity, Availability,
Reliability and Maintainability and Throughput.
Text books:
1 Larry L. Peterson and Bruce S. Davie, Computer Networks: A System Approach, Fifth
Edition, Morgan Kaufmann, Elsevier, 2012.
2 Behrouz A. Forouzan, Data Communications and Networking, McGraw Hill, Fifth Edition,
2017.
Reference Books:
1 Satish Jain Advanced Computer Networking: Concepts and Applications
2 Chwan-Hwa (John) Wu, J. David Irwin, Introduction to Computer Networks and Cyber
3 Security, CRC press, Taylor & Francis Group,2014.
Page 9 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Analyze computer network architectures and estimate quality of service.
CO2 Design application-level protocols for emerging networks.
CO3 Analyze TCP and UDP traffic in data networks.
CO4 Design and analyze medium access methods, routing algorithms and IPv6 protocol for data
networks.
CO5 Analyze Data Center Networks and Optical Networks.
CO6 Understand, Analyze, design, and manage computer networks while considering
performance, reliability, security, and scalability aspects.
Page 10 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Machine learning
(Computer Science)
Text books:
1 Shalev-Shwartz S, Ben-David S. (2014), Understanding Machine Learning: From Theory to
Algorithms, Cambridge University Press.
2 R.O.Duda, P.E.Hart, D. G.Stork (2000),Pattern Classification, Wiley-Blackwell, 2ndEdition.
Reference Books:
1 Machine Learning Methods in the Environmental Sciences, Neural Networks, William WH
sieh, Cambridge University Press.
2 Richardo Duda, Peter E. Hart and David G. Stork, pattern classification, John Wiley & amp;
SonsInc.,2001.
3 Chris Bishop, Neural Networks for Pattern Recognition, Oxford University Press, 1995
Page 11 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Understand the definitions and fundamental concepts related to machine learning, including
datasets, different paradigms, and data normalization techniques.
CO2 Learn about parameter estimation methods, including maximum likelihood and Bayesian
parameter estimation.
CO3 Gain knowledge of feature selection and dimensionality reduction techniques such as PCA,
LDA, ICA, SFFS, and SBFS.
CO4 Understand semi-supervised learning techniques using labeled and unlabeled data in
combination with the EM algorithm.
CO5 Explore kernel tricks and support vector machines (SVMs) in both primal and dual forms,
as well as their extensions like K-SVR and K-PCA.
CO6 Apply various machine learning methods to solve real-world problems, perform data
analysis, make optimal decisions based on probabilistic models, and effectively work with
large datasets.
Page 12 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Advanced Computer Architecture
(Computer Science)
Multi Processors and Thread level Parallelism- Introduction, Characteristics of application domain,
Systematic shared memory architecture, distributed shared – memory architecture,
Synchronization, Inter Connection and Networks
Text books:
1 John L. Hennessy, David A. Patterson – Computer Architecture: A Quantitative Approach,
3rd Edition, An Imprint of Elsevier.
2 Hwang, Kai, and Naresh Jotwani. Advanced computer architecture: parallelism, scalability,
programmability. Vol. 199. New York: McGraw-Hill, 1993.
Reference Books:
1 John P. Shen and Miikko H. Lipasti – Modern Processor Design : Fundamentals of Super
Scalar Processors.
2 Computer Architecture and Parallel Processing – Kai Hwang, Faye A.Brigs., MC Graw Hill..
3 Advanced Computer Architecture – A Design Space Approach – Dezso Sima, Terence
Fountain, Peter Kacsuk , Pearson Ed.
Page 13 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Understand the basic concepts of computer architecture.
CO2 know the types of computers, and new trends and developments in computer
architecture.
CO3 Understand pipelining, instruction set architectures, memory addressing.
CO4 Understand exploiting ILP using dynamic scheduling, multiple issue, and Speculation.
CO5 Understand the various techniques to enhance a processors ability to exploit Instruction-
level parallelism (ILP), and its challenges.
CO6 Understand multithreading by using ILP and supporting thread-level parallelism (TLP).
Page 14 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Object Oriented Software Engineering
(Computer Science)
Software Testing Methods-White Box, Basis Path-Control Structure - Black Box- Unit Testing -
Integration testing - Validation & System Testing-Testing Tools–Software Maintenance &
Reengineering.
Text books:
1 Fairley R, “Software Engineering Concepts”, second edition, Tata McGraw Hill, New Delhi,
2003.
2 Jalote P, “An Integrated Approach to Software Engineering”, third edition, Narosa
Publishers, New Delhi,2013
Reference Books:
1 Machine Learning Methods in the Environmental Sciences, Neural Networks, William WH
sieh, Cambridge University Press.
2 Richardo Duda, Peter E. Hart and David G. Stork, pattern classification, John Wiley & amp;
SonsInc.,2001.
3 Chris Bishop, Neural Networks for Pattern Recognition, Oxford University Press, 1995
Page 15 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Understand the various software development process models and their characteristics,
including traditional models and Agile Development.
CO2 Develop skills in using software project management tools and software to aid in project
planning, estimation, scheduling, and risk management.
CO3 Apply structured analysis techniques to analyze and model system requirements and
processes.
CO4 Understand the principles and practices of object-oriented design and apply them to develop
well-structured and reusable software components.
CO5 Develop skills in identifying, documenting, and fixing software defects and issues.
CO6 Develop a comprehensive understanding of software development processes.
Page 16 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
DATA SCIENCE
(Computer Science)
Technologies for visualization, Bokeh (Python) Recent trends in various data collection and
analysis techniques, various visualization techniques, application development methods of used
in data science.
Text books:
1 Cathy O ’Neil and Rachel Schutt. Doing Data Science, Straight Talk from, The Frontline.
O’Reilly.
2 Jure Leskovek, Anand Raja Raman and Jeffrey Ullman. Mining of Massive Datasets.v2.1,
Cambridge University Press.
Reference Books:
1 Kevin P. Murphy. Machine Learning: A Probabilistic Perspective. MIT Press, 2013.
2 Foster Provost and Tom Fawcett. Data Science for Business: What You Need to Know
about Data Mining and Data-analytic Thinking. O′Reilly,2013.
3 Trevor Hastie, Robert Tibshirani and Jerome Friedman. Elements of Statistical Learning,
Second Edition. Springer,2009.
Page 17 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Develop skills to collect, analyze, visualize, and interpret data, and apply data science
methods in various domains.
CO2 Explore the tools and technologies commonly used in data science.
CO3 Acquire skills in exploring and examining data for quality, consistency, and accuracy.
CO4 Apply statistical techniques to solve real-world problems in various domains.
CO5 Understand solid foundation in data visualization principles, techniques, and best practices.
CO6 Apply data visualization techniques and tools in real-world data science projects.
Page 18 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Distributed Computing
(Computer Science)
Text books:
1 Kshemkalyani, Ajay D., and Mukesh Singhal, “Distributed computing: principles, algorithms,
and systems Cambridge University Press, 2011.
2 SunitaMahajan and Seema Shah, “Distributed Computing”, Oxford University Press, Second
Edition, 2011.
Reference Books:
1 Albert Y.Zomaya, “Parallel and Distributed Computing Hand book”, Second edition, McGrawl
Publications, 2005.
2 Francesco Pierfederici, “Distributed Computing with Python”, First Edition, Packt Publishing, 2016.
3 Mahajan, Sunita, and Seema Shah, “Distributed Computing”, Oxford University Press, Inc., 2013.
Page 19 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Understanding of Distributed System Models.
CO2 Develop proficiency in designing and analyzing distributed algorithms.
CO3 Understand message ordering and group communication in distributed systems.
CO4 Design and evaluate distributed mutual exclusion algorithms.
CO5 Understand models of deadlocks in distributed systems and various deadlock detection
algorithms.
CO6 Apply distributed computing concepts and algorithms to real-world scenarios.
Page 20 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
INFORMATION SECURITY
(Computer Science)
Public key cryptography algorithms, digital signatures, digital Certificates, Certificate Authority
and key management Kerberos, X.509 Directory Authentication Service.
Unit IV – Email privacy
Pretty Good Privacy (PGP) and S/MIME. IP Security Overview, IP Security Architecture,
Authentication Header, Encapsulating Security Payload, Combining Security Associations and Key
Management.
Unit V – Web Security Requirements
Secure Socket Layer (SSL) and Transport Layer Security (TLS), Secure Electronic Transaction
(SET). Basic concepts of SNMP, SNM Pv1 Community facility and SNM Pv3. Intruders, Viruses
and related threats.
Text books:
1 Network Security Essentials (Applications and Standards) by William Stallings Pearson
Education.
2 Hack Proofing your network by Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand,
David Ahmad, HalFlynnIdo Dubrawsky, Steve W. Manzuik and Ryan Permeh, Wiley Dream
tech.
Reference Books:
1 Network Security and Cryptography, Bernard Menezes, Cengage Learning.
2 Cryptography and Security, C. K. Shymala, N. Harini and Dr. T. R. Padmanabhan, Wiley-
India.
3 Applied Cryptography, Bruce Schiener, 2ndedition, John Wiley & Sons.
Page 21 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Implement appropriate security measures to protect networked systems and information
assets from threats and attacks.
CO2 Understand security services, mechanisms, and common attacks and vulnerabilities in
computer networks and systems.
CO3 Implement cryptographic solutions to protect sensitive information and ensure data integrity
in various contexts.
CO4 Develop a comprehensive understanding of public key cryptography algorithms.
CO5 Analyze security requirements, design and implement secure communication systems.
CO6 Design secure communication systems, implement protocols and mechanisms to protect
against threats.
Page 22 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Advanced data structures and algorithms lab
(Computer Science)
Course Outcomes: At the end of the course, the student should have acquire the ability to
CO1 Implement divide and conquer techniques to solve a given problem.
CO2 Implement hashing techniques like linear probing, quadratic probing, random probing and
double hashing/rehashing.
CO3 Perform Stack operations to convert in fix expression in to postfix expression and evaluate
the postfix expression.
CO4 Differentiate graph traversal techniques Like Depth First Search, Breadth First Search.
Identify shortest path to other vertices using various algorithms.
CO5 Understand how advanced data structures and algorithms are applied to solve real-world
problems in various domains
CO6 Analyze problems, devise efficient solutions, and critically evaluate their own algorithms
and data structures.
Page 23 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Advanced Computer Networks lab
(Computer Science)
Course Outcomes: At the end of the course, the student should have acquire the ability to
CO1 Develop programs for client-server applications.
CO2 Perform packet sniffing and analyze packets in network.
CO3 Identify and use various networking components Understand different transmission media
and design cables for establishing a network.
CO4 Implement network security algorithms.
CO5 Analyze performance of various communication protocols.
CO6 Implement error detecting and correcting codes.
Page 24 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Research Methodology and IPR
(Common to all Branches)
I M.Tech - I Semester SRIT R23
Course Code Category Hours/Week Credits Maximum Marks
23DRM101 MCC L T P C CIA SEE Total
2 0 0 2 40 60 100
Unit I – Meaning of research problem
Sources of research problem, Criteria Characteristics of a good research problem, Errors in
selecting a research problem, scope, and objectives of research problem. Approaches of
Investigation of solutions for research problem, data collection, analysis, interpretation, Necessary
instrumentations.
Unit II – Effective literature studies and approaches
Analysis Plagiarism, Research ethics, Effective technical writing, how to write report, Paper
Developing a Research Proposal, Format of research proposal, a presentation and assessment by
a review committee.
Unit III – Nature of Intellectual Property
Patents, Designs, Trade and Copyright. Process of Patenting and Development: technological
research, innovation, patenting, development. International Scenario: International cooperation
on Intellectual Property. Procedure for grants of patents, Patenting under PCT.
Administration of Patent System. New developments in IPR; IPR of Biological Systems, Computer
Software etc. Traditional knowledge Case Studies, IPR and IITs.
• Pedagogy/Course Delivery tools: ICT
• Links for online material:
Text books:
1 Stuart Melville and Wayne Goddard, “Research methodology: an introduction for science &
engineering students’”
2 Wayne Goddard and Stuart Melville, “Research Methodology: An Introduction”
Reference Books:
1 Ranjit Kumar, 2ndEdition, “Research Methodology: A Step by Step Guide for beginners”
2 Halbert, “Resisting Intellectual Property”, Taylor & Francis Ltd, 2007.
3 Mayall, “Industrial Design”, McGraw Hill, 1992.
Page 25 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Develop the skills required to contribute to the body of knowledge in their discipline while
understanding the importance of protecting intellectual property rights.
CO2 Analyze research related information.
CO3 Follow research ethics.
CO4 Understand that today’s world is controlled by Computer, Information Technology, but
tomorrow world will be ruled by ideas, concept, and creativity.
CO5 Understanding that when IPR would take such important place in growth of individuals &
nation, it is need less to emphasis the need of information about Intellectual Property Right
to be promoted among students in general & engineering in particular.
CO6 Understand that IPR protection provides an incentive to inventors for further research work
and investment in R & D, which leads to creation of new and better products, and in turn
brings about, economic growth and social benefits.
Page 26 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Advanced Operating Systems
(Computer Science)
Role - File Model -System Calls - Data Structures - Super Block, I node, File, dentry Objects -
entry Cache - Files Associated with a Process – File system Types - Special Files systems –File
system Type Registration–File system Handling-Name Spaces-Mounting–Un Mounting-
Implementation of VFS System Calls.
Unit V – Android
what is android, basic building blocks – activities, services, broadcast receivers & content, ui
components-views & notifications, components for communication -intents & intent filters,
android api levels launching emulator editing emulator settings emulator shortcuts log cat usage,
Applications of Android.
Text books:
1 Daniel P. Bovet and Marco Cesati, "Understanding the Linux Kernel", 3rd Edition, O'Reilly
Publications, 2005.
2 Harold Abelson, Gerald Jay Sussman and Julie Sussman, ―Structure and Interpretation of
Computer Programs, Second Edition, Universities Press,2013.
Reference Books:
1 Mark E. Russinovi Chand David A. Solomon, Microsoft Windows Internals, 4th Edition,
Microsoft Press, 2004.
2 Advanced Concepts In Operating Systems (McGraw-Hill Series in Computer Science)
Hardcover – Import, 30 November 1993 by Mukesh Singhal, Niranjan Shivaratri
3 OS: Advanced Concepts, Maekawa, Oldehoeft. Addison-Wesley.
Page 27 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Understand Unix file system, Unix kernel architecture, and functionality.
CO2 Develop skills in concurrent programming using threads and gain insights into the internal
mechanisms of process management in an operating system.
CO3 Understand of file system roles, file models, system calls, data structures and implement
VFS (Virtual File System) system calls.
CO4 Understand system requirements and design goals of windows operating system.
CO5 Design and develop Android applications, testing and debugging, and gaining a broader
perspective on the potential of Android in various domains.
CO6 Develop skills in analyzing and solving complex problems related to operating systems.
Page 28 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Advanced Databases
(Computer Science)
Technologies and Applications Multimedia database -Emergence, difference from other data types,
structure, deductive databases, GIS and spatial databases, Knowledge database, Information
Visualization, Wireless Networks and databases, Personal database, Digital libraries, web
databases, case studies.
Text books:
1 Advanced database management system by RiniChkrabarti and Shibhadra Dasgupta,
Dreamtech.
2 Ramez Elmasri, Shamkant B. Navathe, Database systems- Models, Languages, Design and
Application Programming.
Reference Books:
1 Thomas Cannolly and Carolyn Begg, “ Database Systems, A Practical Approach to Design,
Implementation and Management”, Third Edition, Pearson Education, 2007.
2 C.J.Date, A.Kannan and S.Swamynathan,”An Introduction to Database Systems”, Eighth
Edition, Pearson Education, 2006.
3 V.S.Subramanian, “Principles of Multimedia Database Systems”, Harcourt India Pvt Ltd.,
2001.
Page 29 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Explain the concepts of databases.
CO2 Understand Distributed Database Process, Architecture, and Design Principles.
CO3 Apply Distributed Query Optimization Techniques and Algorithms.
CO4 Analyze and apply Concurrency Control and Reliability Techniques.
CO5 Analyze Need of Complex Data type like ORDBMS and OODBMS.
CO6 Identify Emerging Database Models.
Page 30 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Deep Learning
(Computer Science)
Linear (PCA, LDA) and manifolds, metric learning - Auto encoders and dimensionality reduction in
networks - Introduction to Conv Net - Architectures – Alex Net, VGG, Inception, Res Net - Training
a Conv Net: weights initialization, batch normalization, hyper parameter optimization.
Unit IV – Optimization and Generalization
Optimization in deep learning– Non-convex optimization for deep networks- Stochastic
Optimization Generalization in neural networks- Spatial Transformer Networks-Recurrent
networks, LSTM - Recurrent Neural Network Language Models- Word-Level RNNs & Deep
Reinforcement Learning-Computational & Artificial Neuroscience.
Unit V – Case Study and Applications
Text books:
1 Deep Learning”, Ian Good fellow, Yoshua Bengio, Aaron Courville, MIT Press2016.
2 Deep Learning (Adaptive Computation and Machine Learning series) by Ian Goodfellow,
Yoshua Bengio, Aaron Courville, Francis Bach
Reference Books:
1 “Neural Networks and Deep Learning A Text Book”, Charu C Aggarwal, Springer
International Publishing AG, Part of Springer Nature 2018.
2 Deep Learning: A Practitioner's Approach, by Adam Gibson and Josh Patterson
3 Machine Intelligence: Demystifying Machine Learning, Neural Networks and Deep Learning
by Suresh Samudrala.
Page 31 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Understand the main fundamentals that drive Deep Learning.
CO2 Understand of deep learning algorithms, their theoretical foundations, and their practical
applications in various domains.
CO3 Develop a strong understanding of advanced techniques in deep learning, including
dimensionality reduction, convolutional neural networks, and training optimization.
CO4 Acquire advanced knowledge and skills in optimization techniques for deep learning.
CO5 Implement deep learning algorithms and solve real-world problems.
CO6 Identify the deep learning algorithms which are more appropriate for various types of
learning tasks in various domains.
Page 32 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Computer Vision
(Computer Science)
Text books:
1 Computer Vision: Algorithms and Applications by Richard Szeliski.
2 Concise Computer Vision: An Introduction into Theory and Algorithms by Reinhard Klette
Reference Books:
1 Deep Learning, by Good fellow, Bengio, and Courville.
2 Dictionary of Computer Vision and Image Processing, by Fisheret al.
3 Computer Vision: Principles, Algorithms, Applications, Learning by E. R. Davies
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Identify basic terminology, theories and models in the field of Computer Vision.
CO2 Analyze different methods of Computer Vision related to multi-scale representation, edge
detection and detection of other primitives, stereo, motion and object recognition.
CO3 Use and apply appropriate image processing methods for image filtering, image
restoration, image reconstruction, segmentation, classification and representation.
CO4 Assess which methods to use for solving a given problem, and analyze the accuracy of the
methods.
CO5 Design of Computer Vision system for a specific problem.
CO6 Develop a strong foundation in computer vision, encompassing both theoretical
understanding and practical skills.
Page 33 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Service Oriented Architecture
(Computer Science)
Service Oriented Design (Part II-SOA Composition Guidelines): SOA Composing Steps,
Considerations for Choosing Service Layers, Considerations for Positioning Core SOA Standards,
Considerations for Choosing SOA Extensions.
Unit V – Service Oriented Design (Part III- Service Design)
Service Design Overview, Entity- Centric Business Service Design, Application Service Design,
Task-Centric Business Service Design, Service Design Guidelines.
Service Oriented Design (Part IV-Business Process Design): WS-BPEL Language Basics, WS-
Coordination Overview, Service Oriented Business Process Design.
Page 34 of 67
M.Tech.[Computer Science]
Text books:
1 Service-Oriented Architecture-Concepts, Technology, and Design, Thomas Erl, Pearson
Education, 2006.
2 Understanding SOA with Web Services, Eric New comer, Greg Lomow, Pearson Education,
2005.
Reference Books:
1 Thomas Erl; Service Oriented Architecture Concepts Technology & amp; Design, Pearson
Education Limited; 2015, ISBN-13:9788131714904.
2 Guido Schmutz, Peter Welkenbach, Daniel Liebhart; Service Oriented Architecture An
Integration Blueprint; Shroff Publishers & Distributors;2010, ISBN-
13:9789350231081.
3 Service Oriented Architecture analysis and Design for Services and Micro services 2nd
Edition by Thomas Erl, Pearson India.
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Comprehend the need for SOA and its systematic evolution.
CO2 Apply SOA technologies to enterprise domain.
CO3 Design and analyze various SOA patterns and techniques.
CO4 Compare and evaluate best strategies and practices of SOA.
CO5 Develop skills related to service design principles and service-oriented design concepts.
CO6 Gain practical skills in designing, implementing, and managing service-oriented systems to
enable flexible, interoperable, and scalable solutions.
Page 35 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Data Visualization Techniques
(Computer Science)
Introduction to Geo plot lib, Design Principles of Geo plot lib, Geospatial Visualizations, Plotting
Geospatial Data on a Map Web-Based Visualizations: Concepts of Bokeh, Interfaces-Plotting and
Model Interfaces, Output, Bokeh Server, Presentation, Integrating– HTML Document and Bokeh
Applications.
Text books:
1 BenFry, "Visualizing data: Exploring and explaining data with the processing environment",
O'Reilly, 2008.
2 Mario Dobler,Tim Grobmann, “Data Visualization with Python”, O’ Reilly, First Edition, 2019.
Reference Books:
1 Stephen Few, "Information dash board design: Displaying data for at-a-glance monitoring",
second edition, Analytics Press, 2013.
2 Dictionary of Computer Vision and Image Processing, by Fisheret al.
3 Data Visualization: A Handbook for Data Driven Design Paperback – 9 July 2016 by Andy
Kirk.
Page 36 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Explain principles of visual perception.
CO2 Apply core skills for visual analysis.
CO3 Apply visualization techniques for various data analysis tasks.
CO4 Design in formation dash board.
CO5 Understand of geospatial data visualization using Geo plot lib and Bokeh libraries.
CO6 Apply computer vision techniques to solve real-world problems.
Page 37 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Internet Of Things
(Common to all Branches)
Internet Communications: An Overview, IP Addresses, MAC Addresses, TCP and UDP Ports,
Application Layer Protocols Prototyping Online Components: Getting Started with an API, Writing
a New API, Real-Time Reactions, Other Protocols Protocol
Manufacturing printed circuit boards, Mass-producing the case and other fixtures, Certification,
Costs, Scaling up software. Ethics: Characterizing the Internet of Things, Privacy, Control,
Environment, Solutions.
Text books:
1 Adrian McEwen, Hakim Cassimally-Designing the Internet of Things, Wiley Publications, 2012
2 Haider Raad Fundamentals of IoT and Wearable Technology Design, Wiley Publications 2020.
Reference Books:
1 “The Internet of Things” by Samuel Greengard
2 Kashish Ara Shakil, Samiya Khan, Internet of Things (IoT) Concepts and Applications,
Springer Publications 2020.
3 “Learning Internet of Things” by Peter Waher
Page 38 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Choose the sensors and actuators for an IoT application.
CO2 Select protocols for a specific IoT application.
CO3 Utilize the cloud platform and APIs for IoT applications.
CO4 Experiment with embedded boards for creating IoT prototypes.
CO5 Design a solution for a given IoT application.
CO6 Establish a startup.
Page 39 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Privacy Preserving Data Publishing
(Computer Science)
Use of Fragmentation and Encryption to Protect Data Privacy, Security and Privacy in OLAP
systems.
Continuous user activity monitoring (like in search logs, location traces, energy monitoring), social
networks, recommendation engines and targeted advertising.
Text books:
1 Benjamin C. M. Fung, KeWang, AdaWai-CheeFu and Philip S. Yu, Introduction to Privacy
Preserving Data Publishing: Concepts and Techniques, 1st Edition, Chapman & Hall/CRC,
2010.
2 Privacy-Preserving Data Publishing: An Overview – Import, 24 February 2010
by Raymond Chi-Wing Wong, Ada Wai-Chee Fu.
Reference Books:
1 Bee-Chung Chen, Daniel Kifer, Ashwin Machana vajjhala, Kristen Le Fevre Privacy-Preserving
Data Publishing, Now Publishers Inc., 2009.
2 Privacy-Preserving Data Publishing by Raymond Chi-Wing Wong, Ada Wai-Chee Fu
3 Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques:– Import, 16
August 2010 by Benjamin C.M. Fung, Ke Wang, Ada Wai-Chee Fu, Philip S. Yu.
Page 40 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Understand the importance of privacy in data publishing and the challenges associated with
protecting sensitive information.
CO2 Understand the challenges and considerations in developing privacy-preserving algorithms
and effectively addressing privacy issues.
CO3 Evaluate the privacy and utility of anonymized datasets, comply with privacy regulations,
and implement collaborative anonymization methods.
CO4 Implement techniques to enhance the security and privacy of data in various systems, with
a specific focus on OLAP systems.
CO5 Develop an in-depth understanding of extended data publishing scenarios and
anonymization techniques.
CO6 Design recommendation systems, and implementing targeted advertising strategies based
on user data.
Page 41 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Advanced Operating Systems Lab
(Computer Science)
Course Outcomes: At the end of the course, the student should have acquire the ability to
CO1 Revise any algorithm present in a system.
CO2 Design a new algorithm to replace an existing one.
CO3 Appropriately modify and use the data structures of the Linux kernel for a different software
system.
CO4 Developing Application using Inter Process communication.
CO5 Simulate and implement operating system concepts such as scheduling, file management,
and memory management.
CO6 Develop advanced practical skills in operating system design, implementation, and
optimization.
Page 42 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Advanced Databases Lab
(Computer Science)
Course Outcomes: At the end of the course, the student should have acquire the ability to
CO1 Understand the technology behind the IoT and associated technologies.
CO2 Use the IoT technologies in practical domains of society.
CO3 Gain knowledge about the state of the art methodologies in IoT application domains.
CO4 Conduct experiments on the HTTP-to-Co AP semantic mapping proxy in the IoT Toolkit.
CO5 Perform experiments on the application framework and embedded software agents in the
IoT Toolkit.
CO6 Develop proficiency in utilizing various IoT tools and frameworks to build IoT solutions.
Page 43 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Software Defined Networks
(Computer Science)
Control Plane Functions, South bound Interface, North bound Interface, Routing, ITU-T Model-
Open Daylight-REST-Cooperation and Coordination Among Controllers.
Virtual Machines- NFV Concepts: Simple Example of the Use of NFV, NFV Principles, High-Level NFV
Frame work, NFV Benefits and Requirements-NFV Reference Architecture:
NFV Management and Orchestration.
Text books:
1 Paul Goransson Chuck Black Timothy Culver: Software Defined Networks: A Comprehensive
Approach, Morgan Kaufmann, 2016.
2 Ken Gray Thomas Nadeau: Network Function Virtualization, Morgan Kaufmann, 2016.
Reference Books:
1 Larry Peterson, Carmelo Cascone, Bruce Davie: Software-Defined Networks: A Systems
Approach, Systems Approach, 2021.
2 Software Defined Networking (SDN) by Doug Marschke Jeff Doyle Pete Moyer, Lulu.com
3 Software Defined Networks: A Comprehensive Approach Paperback – 25 October 2016
by Paul Goransson, Chuck Black, Timothy Culver.
Page 44 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Differentiate between traditional networks and software defined networks and understand
the key benefits and use cases of SDN.
CO2 Interpret the SDN data plane devices and Open Flow Protocols.
CO3 Implement the operation of SDN control plane with different controllers.
CO4 Apply techniques that enable applications to control the underlying network using SDN.
CO5 Evaluate Network Functions Virtualization components and their roles in SDN.
CO6 Acquire knowledge of the key concepts, protocols, and architectures in SDN and explore
the benefits and challenges associated with SDN deployment.
Page 45 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Reinforcement Learning
(Computer Science)
State and action value functions, Bellman expectation equations, optimality of value functions and
policies, Bellman optimality equations. Dynamic Programming (DP): Overview of dynamic
programming for MDP, principle of optimality, Policy Evaluation, Policy Improvement, policy
iteration, value iteration, asynchronous DP, Generalized Policy Iteration.
n-Step TD Prediction, Forward and Backward view of TD(λ), Equivalence of forward and backward
view, Sarsa (λ), Watkins’s Q(λ), Off policy eligibility traces using importance of sampling. Function
Approximation Methods: Value prediction with function approximation, gradient descent methods,
Linear methods, control with function approximation.
Text books:
1 Richard S. Sutton and Andrew G. Barto, Reinforcement Learning: An Introduction", 2nd
Edition, The MIT Press.
2 Csaba Szepesvari–Algorithms for Reinforcement Learning–Morgan & Claypool, 2010.
Reference Books:
1 Reinforcement Learning By Richard S. (University Of Alberta) Sutton, Andrew G. (Co-
Director Autonomous Learning Laboratory) Barto.
2 Reinforcement Learning: An Introduction (Adaptive Computation and Machine Learning
series) Hardcover – Illustrated, 23 November 2018
by Richard S. Sutton, Andrew G. Barto, Francis Bach.
Page 46 of 67
M.Tech.[Computer Science]
3 Reinforcement Learning An Introduction 1998 Edition by Richard S. Sutton, Andrew G.
Barto, MIT Press Ltd
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Formulate Reinforcement Learning problems.
CO2 Explore the gradient bandit algorithm and its application in solving the bandit problem.
CO3 Apply various Tabular Solution Methods to Markov Reward Process Problems.
CO4 Gain proficiency in state and action value functions, Bellman equations, and the optimality
of value functions and policies.
CO5 Understand the trade-offs between Monte Carlo methods and TD methods in terms of
sample efficiency and bias-variance trade-offs.
CO6 Develop skills in evaluating and comparing different policies and value functions.
Page 47 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Data Analytics
(Computer Science)
Unit III – One More Machine Learning Algorithm and Usage in Applications
Motivating application: Filtering Spam, Why Linear Regression and k-NN are poor choices for
Filtering Spam, Naive Bayes and why it works for Filtering Spam, Data Wrangling: APIs and other
tools for scrapping the Web, Feature Generation and Feature Selection (Extracting Meaning from
Data), Motivating application: user (customer) retention.
Basic principles, ideas and tools for data visualization, Case study on industry projects,
Exercise: create your own visualization of a complex dataset, Data Science and Ethical Issues:
Discussions on privacy, security, ethics, A look back at Data Science, Next-generation data
scientists.
Text books:
1 Cathy O' Neil and Rachel Schutt. Doing Data Science, Straight Talk from The Frontline. O'
Reilly, 2014.
2 Jure Leskovek, Anand Raja Raman and Jerey Ullman. Mining of Massive Datasets, Cambridge
University Press,2014.
Reference Books:
1 Kevin P. Murphy. Machine Learning: A Probabilistic Perspective. MIT Press, 2013.
2 Foster Provost and Tom Fawcett. Data Science for Business: What You Need to Know
about Data Mining and Data-analytic Thinking. O′ Reilly, 2013.
3 Trevor Hastie, Robert Tibshirani and Jerome Fried man. Elements of Statistical Learning,
Second Edition. Springer,2009.
4 Avrim Blum, John Hopcroft and Ravindran Kannan. Foundations of Data Science. 2018.
5 Mohammed J. Zaki and Wagner Miera Jr. Data Mining and Analysis: Fundamental
Page 48 of 67
M.Tech.[Computer Science]
Concepts and Algorithms. Cambridge University Press, 2014.
6 Jiawei Han, Micheline Kamber and JianPei. Data Mining: Concepts and Techniques,
Third Edition. Morgan Kaufmann, 2011.
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Understand the ideas of statistical approaches to learning.
CO2 Understand the significance of exploratory data analysis (EDA) in data science and apply
basic tools (plots, graphs, summary statistics) to perform EDA.
CO3 Apply basic machine learning algorithms (Linear Regression, k-Nearest Neighbors (k-NN), k-
means, Naïve Bayes) for predictive modeling. Explore the merits of Naïve Bayes technique.
CO4 Recognize the characteristics of machine learning techniques that are useful to solve real-
world Problems.
CO5 Demonstrate the ability to create custom visualizations for complex datasets.
CO6 Gain hands-on experience in working with real-world datasets and using data visualization
tools to communicate findings effectively.
Page 49 of 67
M.Tech.[Computer Science]
AUDIT COURSES – I
Page 50 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
ENGLISH FOR RESEARCH PAPER WRITING
Text books:
1 Goldbort R (2006) Writing for Science, Yale University Press (available on Google Books)
Model Curriculum of Engineering &Technology PG Courses [Volume-I]
2 Day R (2006) How to Write and Publish a Scientific Paper, Cambridge University Press
Reference Books:
1 Highman N (1998), Hand book of Writing for the Mathematical Sciences, SIAM. Highman’s
book
2 Adrian Wall work, English for Writing Research Papers, Springer New York Dordrecht
Heidelberg London, 2011
3 Adrian Wallwork, English for Writing Research Papers, Springer New York Dordrecht
Heidelberg, London, 2011.
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Demonstrate writing meaningful sentences and coherent paragraphs.
CO2 Show conciseness, clarity and avoid redundancy in writing.
CO3 Summarize, evaluate literature, and write methodology, results and conclusion.
CO4 Describe how to develop title, write abstract and introduction.
CO5 Apply correct style of referencing and use punctuation appropriately.
CO6 Develop skills to write research paper writing for English.
Page 51 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Disaster Management
Meaning, Concept and Strategies of Disaster Mitigation, Emerging Trends in Mitigation. Structural
Mitigation and Non-Structural Mitigation, Programs of Disaster Mitigation in India.
Text books:
1 R. Nishith, Singh AK, “Disaster Management in India: Perspectives, issues and strategies.
2 “New Royal Book Company. Sahni, Pardeep Et. Al.(Eds.),” Disaster Mitigation Experiences
and Reflections”, Prentice Hall Of India, New Delhi.
Page 52 of 67
M.Tech.[Computer Science]
Reference books:
1 Goel S. L., Disaster Administration and Management Text and Case Studies”, Deep & Deep
Publication Pvt. Ltd., New Delhi.
2 Disaster Management_18 by R Subramanian, Vikas Publishing House
3 Disaster Management Second Edition AICTE Recommended by S C Sharma, Khanna
Publishers
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Understand the need and significance of studying disaster management.
CO2 Understand the different types of disasters and causes for disasters.
CO3 Gain knowledge on the impacts Disasters on environment and society
CO4 Identify various methods of risk reduction measures and risk mitigation.
CO5 Apply knowledge about strategies of disaster mitigation and emerging trends.
CO6 Develop knowledge, skills, and strategies for effectively managing disasters and their
impacts.
Page 53 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
SANSKRIT FOR TECHNICAL KNOWLEDGE
Unit II
Past / Present / Future Tense, Simple Sentences.
Unit III
Order, Introduction of roots.
Unit IV
Technical information about Sanskrit Literature.
Unit V
Text books:
Reference books:
1 “India’s Glorious Scientific Tradition” Suresh Soni, Ocean books (P) Ltd., New Delhi.
2 Technical Literature in Sanskrit by S. Venkitasubramonia Iyer.
3 Scientific Knowledge in Sanskrit Literature by Nirmal Trikha
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Understanding basic Sanskrit language.
CO2 Use of spoken Sanskrit will be learnt.
CO3 Understanding of these will develop logical understanding in the students.
CO4 Gain the knowledge of Technical information about Sanskrit Literature.
CO5 Develop better understanding of the language in technical concepts of engineering.
CO6 Use of Sanskrit officially will be known.
Page 54 of 67
M.Tech.[Computer Science]
AUDIT COURSES – II
Page 55 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Pedagogy Studies
Text books:
Page 56 of 67
M.Tech.[Computer Science]
Reference books:
1 Akyeampong K (2003) Teacher training in Ghana –does it count? Multi-site teacher education
research project (MUSTER) country report1. London: DFID.
2 Akyeampong K, Lussier K, Pryor J, West brook J (2013) Improving teaching and learning of
basic maths and reading in Africa: Does teacher preparation count? International Journal
Educational Development,33 (3): 272–282.
3 Alexander R J (2001) Culture and pedagogy: International comparisons in primary education.
Oxford and Boston: Blackwell.
Chavan M (2003) Read India: Amassscale, rapid, ‘learning to read’ campaign.
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Understand the conceptual framework and terminology.
CO2 Use of Pedagogical practices are being used by developing countries.
CO3 Implement of effective utilization of pedagogical practices and approaches.
CO4 Apply optimum usage of pedagogical tools available.
CO5 Implement pedagogy study in research.
CO6 Develop knowledge, skills, and strategies related to effective pedagogy.
Page 57 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Unit IV
Asan and Pranayam.
Unit V
i) Various yog poses and their benefits for mind & body
ii) Regularization of breathing techniques and its Effects-Types of pranayam
Text books:
1 ‘Yogic Asanas for Group Training – Part-I”: Janardan Swami Yogabhyasi Mandal, Nagpur2.
“Raja yoga or conquering the Internal Nature” by Swami Vivekananda, Advaita Ashrama
(Publication Department), Kolkata.
2 Stress and Its Management by Yoga, January 2007 by K.N. Udupa, R.C. Prasad.
Reference books:
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Develop healthy mind in a healthy body thus improving social health also
Improve efficiency.
CO2 Develop body awareness. Learn how to use their bodies in a healthy way. Perform well in
sports and academics.
CO3 Gain the knowledge of Do’s and Don’ts in life.
CO4 Will balance, flexibility, and stamina, strengthen muscles and connective tissues enabling
good posture.
CO5 Manage stress through breathing, awareness, meditation and healthy movement.
CO6 Build concentration, confidence and positive self-image.
Page 58 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Unit II
Neeti satakam-Holistic development of
personality Verses-52,53,59(don’ts)
Verses-71,73,75,78 (do’s)
Unit III
Approach today work and duties.
Shrimad Bhagwat Gaeta:
Chapter2-Verses41,47,48,
Chapter3-Verses13,21,27,35,
Chapter6-Verses5,13,17,23,35,
Chapter18-Verses45,46,48.
Unit IV
Statements of basic knowledge.
Shrimad Bhagwad Geeta:
Chapter2-Verses 56,62,68
Chapter12-Verses13,14,15,16,17,18
Personality of Role model. Shrimad Bhagwad Geeta:
Unit V
Chapter2-Verses 17,
Chapter3-Verses36,37,42,
Chapter4-Verses18,38,39
Chapter18–Verses37,38,63
Text books:
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Study of Shrimad-Bhagwad-Geeta will help the student in developing his personality and
achieve the highest goal in life.
CO2 The person who has studied Geeta will lead the nation and mankind to peace and prosperity.
CO3 Study of Neeti shatakam will help in developing versatile personality of students.
CO4 Analyze and develop time management, team management, work ethics good manners and
personal and professional etiquettes.
CO5 Lead the nation and mankind to peace and prosperity and practice emotional self-
regulation.
CO6 Learn to develop coping mechanism to manage stress through yoga and meditation
techniques and develop a versatile personality.
Page 60 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
SRIT R23
OPEN ELECTIVES
MASTER OF TECHNOLOGY
in
COMPUTER SCIENCE & ENGINEERING
Page 61 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Optimizing Techniques
(Common to all Branches)
Text books:
Reference books:
Page 62 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Explain the fundamental knowledge of Linear Programming and Dynamic Programming
problems.
CO2 Use classical optimization techniques and numerical methods of optimization.
CO3 Describe the basics of different evolutionary algorithms.
CO4 Enumerate fundamentals of Integer programming technique and apply different techniques
to solve various optimization problems arising from engineering areas.
CO5 Apply optimization techniques to enhance engineering design, manufacturing processes,
and operational efficiency, contributing to improved performance and competitiveness in
engineering domains.
CO6 Understanding of various optimization techniques and their applications in solving complex
engineering and business problems.
Page 63 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Industrial Safety
(Common to all Branches)
Text books:
Reference books:
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Identify important legislations related to health, Safety and Environment.
CO2 identify and apply different types of maintenance strategies.
CO3 Create general sketches and explain the working principles and applications of these
lubrication methods.
CO4 Understand the sequence of fault-finding activities and be able to apply it in practical
scenarios.
CO5 Understand the complexities of repairs and their application in maintenance activities.
CO6 Develop the necessary knowledge and skills to create and maintain a safe working
environment, ensuring compliance with relevant laws and promoting a culture of safety.
Page 65 of 67
M.Tech.[Computer Science]
SRINIVASA RAMANUJAN INSTITUTE OF TECHNOLOGY
Business Analytics
(Common to all Branches)
Text books:
Reference books:
Page 66 of 67
M.Tech.[Computer Science]
Course Outcomes: At the end of the course, the student should have acquired the ability to
CO1 Develop an understanding of the role of a business analyst, including their responsibilities
and contributions to projects and organizational goals.
CO2 Understand the interrelationships between different life cycles and their impact on overall
project success and product delivery.
CO3 Apply appropriate life cycle methodologies and effectively manage projects, ensuring the
delivery of high-quality systems and products that meet stakeholder requirements and
objectives.
CO4 Develop effective communication and presentation skills to convey requirements clearly and
persuasively to diverse audiences.
CO5 Apply their knowledge and skills in data-driven decision-making, data communication, and
potentially pursue careers in data journalism.
CO6 Gain a comprehensive understanding of different analytics techniques and methods,
allowing them to extract insights from data and make informed business decisions.
Page 67 of 67
M.Tech.[Computer Science]