Semester 1
20.03.09
CS641 - Advance Computer Networks
by Bhaskar Raman
Networking basics, OSI Model, LAN and WAN Technologies, Internet and Intranets. Network protocols, Medium access control, TCP/IP. Network programming, Client-Server architecture, Sockets, Remote Procedure Calls. Distributed applications, File-servers, three-tier applications, Distributed object systems. Synchronization issues in distributed systems. Network security and management.
CS653 - Mobile Computing
by Anirudha Sahoo
My Work : Study of Perormance of Regular TCP in MANETs
My Work : Simulation Of The DSR Ad-hoc Routing Protocol in Qualnet Simulator
Overview of wireless technologies. Wireless multiple access protocols. Cellular systems: Channel allocation. Location management. Wireless LANs: Medium access, Mobile IP routing. TCP over wireless. Mobile ad hoc networking. Energy efficiency. Impact of mobility on algorithms and applications. Disconnected operation of mobile hosts. Data broadcasting. Mobile agents
CS649 - Network Security
by Bernard Menezes
My Work : Performance Analysis of ECC vs RSA
My Work : Comparision of GSM Network Vs UMTS Network in prospective of security
Data security: Review of cryptography. Examples – RSA, DES, ECC, etc. Authentication, non–repudiation and message integrity. Digital signatures and certificates. Protocols using cryptography (example – Kerberos). Attacks on protocols. Network security: Firewalls, Proxy-Servers, Network intrusion detection. Transport security: Mechanisms of TLS, SSL, IPSec. Other topics: Biometric authentication, Secure E–Commerce (ex. SET), Smart Cards, Security in Wireless Communication.
CS615 - Formal Specification and Verification of Programs
by Supratik Chakraborty
Specification of Sequential and Reactive Programs: Pre-post conditions, Partial and Total Correctness, First Order Logic. Generalization of partial and total correctness specifications, Safety and Liveness Properties, Temporal Logic for specifying safety and Liveness properties. Verification of Sequential and Reactive Programs. Hoare Logic. Techniques for proving non deterministic programs: Dijkstra"s Weakest pre-condition semantics. Proving non deterministic programs with fairness constraints. Extension of Hoare Logic to deal with languages involving advanced constructs like procedures with parameters, nondeterminism, concurrency, communication and fairness. Axiomatic systems involving First order Logic and Temporal Logic, Techniques for proving safety and liveness properties. Computer-Aided Verification: Deductive and model-theoretic approach. Automatic verification of finite state systems. Case study of languages and systems like Z, B, spin, PVS, step.
CS699 - Software Lab
by Sivakumar G.
My Work : Mobile Application in Ruby on Rails With Database connectivity
Introduction to Unix, unix tools (shell programming, grep, awk, sed etc.), Programming tools (make, version control, debuggers), Document processing tools (latex) and web tools (html, cgi).
Semester 2
20.03.09
CS647 - Advanced Wireless Networks
by Purushottam Kulkarni
My Work : Flush : A Reliable Bulk Transport protocol For Multihop Wireless Networks
My Work : Exploring The Effect of Interference and Mitigating it Through Channel Hopping
Medium access control in wireless LANs. Case studies of 802.11, Hiperlan, Bluetooth. Performance analysis and quality of service. Single and multi-hop adhoc networks: Routing issues. Case studies of Mobile IP, IPv6, DSR, AODV and other protocols. Transport issues: TCP adaptations for wireless and mobility. Flat and hierarchical architectures, personal/session/user mobility and supporting architectures.
CS684 - Embedded Systems
by Kavi Arya and Krithi Ramamritham
My Work : Malti Storey Automated Car Parking System
Introduction to Embedded systems, hardware/software codesign, Embedded micro controller cores, embedded memories, Examples of embedded systems, sensors and interfacing techniques, Real-time concepts, real-time operating systems, Required RTOS services/capabilities (in contrast with traditional OS) Resource Management/scheduling paradigms: static priorities, static schedules, dynamic scheduling, best effort current best practice in scheduling (e.g. Rate Monotonic vs. static schedules), Real-world issues: blocking, unpredictability, interrupts, caching, Examples of OSs for embedded systems - RT Linux, VRTX Programming languages for embedded systems, system support for embedded systems, verification of embedded systems, selected embedded system-based applications: smart cards, process-control, robotics, network appliances, etc. Software Development Methodology: Real-time UML (RoseRT), DOORS, etc Case studies, Controlling an Injection molding process, Flight simulator, digital call center handler, codec.
cImportant contributions of Indians to the science of Mathematics and Astronomy. Division of time - year, month, fortnight, week, days - larger units like yuga, mah?yuga, manvantara, and kalpa. Need for numerals – different systems adopted for representing numbers - Katapay?di, Bh?tasankhy? and Aryabhat?yapaddhati. Introduction to celestial co-ordinate systems, elementary properties of spherical triangle, Ra?i and Naksatra divisions of the ecliptic - Indian calendar system (Pañc?nga). Calculation of Ahargan. a and mean motion of planets. Finding the direction, time and place from shadow measurements (simple experiments). Computation of longitudes and eclipses.
CS694 - Seminar (MTech)
under Prof. D Manjunath
My Work : Click - A new programming language for devloping software routers
This is a must course for the Mtech students. The objective of this course is to improve the presentation skills of the student under the constant guidance of one of the professors of institute.
Semester 3
31.08.09
CS445 - Management Information Systems
by Kelkar Shashikant
Information Basics: Impact of IT; Basics of data processing; Basics of business and Information Systems; Classification of IS; Transaction Processing; Management Information Systems; Decision Support Systems; IS for Knowledge Work; Managing in 21st Century Managing with Information: Competing with IT; Strategic Planning and IS; Information Needs for Strategic Planning; IS for Decision Support; Expert Systems; Information systems in business and industry; information systems in governance; information systems in training and education; eBusiness and eCommerce; Quality and Privacy; Managing Information Resources: Information Resource Management; Justification for IS; Developing information systems; implementing information systems; IT/IS Facilities and Operations; Strategic Planning for IS Function; Audit, Security and Control; Ethical challenges in Information Systems
CS683 - Advanced Computer Architecture
by M.R. Bhujade
My Work : CS683 Seminar - Parallel Virtual Machine
Introduction to High Performance Computing: Overview, Pipeline vs Parallel ProcessingParallel Architectures : Classification and Performance.Pipeline Processing : Pipeline Performance, design of arithmetic pipelines, multifiction pipes, concept of reservation table, collision vector and hazards.Instruction Processing Pipes: Instruction and data hazard, hazard detection and resolution, delayed jumps, delayed execution. RISC Philosophy.Pipeline scheduling Theory: Greedy pipeline scheduling algorithm, state diagram, modified state diagram, Latency cycles, Optimal cycles, scheduling of static & dynamic Pipelines. Implementation of pipeline schedulers Interconnection Networks : Interconnection network classification, Single stage/ MultistageNetworks, crossbars, clos Networks, Benes Networks , Routing algorithms.Omega, Cub-connected and other networks.Introduction to Neurocomputing ArchitecturesTopics from the current literature as self study and presentations by students.
CS697 - MTech Project - Stage 1
Under Purushottam Kulkarni
My Work : CS697 Stage 1 - Report & Presentation
Abstract :
Battery powered sensor nodes can serve for very little life time. Prior studies have been done to improve the life time of the node by efficiently utilizing the battery power. Energy-harvesting, converting the ambient energy to electrical energy, has emerged as an alternative to empower the sensor nodes. With the increase of the effective energy per day from the harvesting module, we have opportunities to tune the sensor node parameters. We have studied about the most suitable ambient source and came up with the design to develop a hardware to get the energy from the source. We have been doing some initial measurements about the energy, harvested from the source and used by the application, with the use of the hardware we designed. With the use of all this measurements, in the later part of the paper we will propose an energy-aware algorithm for controlling the transmit power parameter for increasing the efficiency of the sensor node.
Semester 4
15.06.10
CS670 - Information Technology Project Management
by Kelkar Shashikant
CS698 - MTech Project - Stage 2
Under Purushottam Kulkarni
My Work : CS697 Stage 1 - Report & Presentation
Abstract :
Non rechargeable battery powered sensor nodes can serve for very little life time with their single charged battery life. Prior studies have been done to improve the life time of the node by efficiently utilizing the battery power. Energy-harvesting, converting the ambient energy to electrical energy, has emerged as an alternative to extend the life of the sensor nodes by recharging them simultaneously. With the increase of the effective energy 1 per day by getting extra energy from the harvesting module, we have opportunities to tune the sensor node parameters. As part of this work, we aim to exploit the availability of periodic energy harvesting opportunities to tune node-level transmit power. Towards this, we identified three main solution components, (i) harvesting-capable hardware prototype, (ii) accurate energy metering and prediction and (iii) formulation of a harvesting-aware transmit power control problem and its solution. We present the design of our hardware prototype and demonstrate its use to collect energy profiles for harvesting. Further, we present a simple model to predict available energy and present an initial result of its applicability. We identify issues that separate harvesting-aware transmit power control from traditional battery-limited nodes.