MnC Syllabus
MnC Syllabus
Third Year
5th Semester 6th Semester
SN Code Subject L T P Credits SN Code Subject L T P Credits
Real and Complex
1 MA-311 Operation Research 3 1 0 4 1 MA-321 3 1 0 4
Analysis
Advanced Differential
Number Theory and
2 MA-312 3 1 0 4 2 MA-322 Equations and 3 1 0 4
Abstract Algebra Applications
Time Series
Data Base Management
3 MA-313 3 1 0 4 3 MA-323 Analysis and 3 1 0 4
Systems
Forecasting
4 MA-314 Programming in Python 3 0 0 3 4 MA-324 Soft Computing 3 0 0 3
5 OET Open Elective-I 3 0 0 3 5 OET Open Elective-II 3 0 0 3
Data Base Management Numerical
6 MA-315 0 0 2 1 6 MA-325 0 0 2 1
Systems Lab Computation Lab
Programming in Python Time Series
7 MA-316 0 0 2 1 7 MA-326 0 0 2 1
Lab Analysis Lab
8 MA-317 Statistical Software Lab 0 0 2 1 8 MA-329 Seminar 0 0 2 1
Total Hours = 24 21 Total Hours = 24 21
Semester 1st 2nd 3rd 4th 5th 6th 7th 8th Total
Credits 24 24 22 22 21 21 19 19 172
Hours/week 28 28 25 25 24 24 26 24 204
Professional Elective-II
MA-450: Digital Image Processing
MA-451: Data Mining
MA-452: Parallel Algorithms
MA-453: Design and Analysis of Experiments
MA-454: Quantum Information and Computing
Professional Elective-III
MA-440: Mathematical Foundations for Machine Learning
MA-441: Data Analysis Using Python
MA-442: Theory of Computation
MA-443: Operator Theory
MA-444: Computer Networks
Professional Elective-IV
MA-460: Deep Learning
MA-461: Financial Mathematics
MA-462: Data Science and Big Data Analytics
MA-463: Software Engineering
MA-464: Topology
Open Elective-II
MA-380: Principles of Design of Experiments
MA-381: Numerical Methods for Partial Differential Equations
UNIT-03 Relations and Function: Definitions and properties; pigeonhole principle, Equivalence relations 08L
and equivalence classes; Representations of relations by binary matrices and digraphs;
operations on relations; Closure of a relation; reflexive, symmetric and transitive closures.
Warshall's algorithm to compute transitive closure of a relation, growth of function, big O, hash
function, discrete numeric functions; asymptotic behavior; generating functions.
UNIT-04 Partially Ordered Sets and Lattices: Partial order relations, POSETS, lattices, isomorphism of 07L
lattice
Boolean Algebra and Boolean Functions: Introduction to Boolean algebra and Boolean
functions; Different representations of Boolean functions; Application of Boolean functions to
synthesis of circuits, circuit minimization and simplification, Karnaugh map.
UNIT-05 Recurrence Relations: Linear recurrence relations with constant coefficients (homogeneous 07L
case); discussion of all the three sub-cases; linear recurrence relations with constant coefficients
(non-homogeneous case); discussion of several special cases to obtain particular solutions.
Solution of linear recurrence relations using generating functions.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Construct simple mathematical proofs and possess the ability to verify them.
CO2: Express mathematical properties via the formal language of propositional and predicate logic.
CO3: Understand and analyze recursive definitions.
CO4: Use graph algorithms to solve real life problems.
CO5: Evaluate Boolean functions and simplify expressions using the properties of Boolean algebra.
Books and References
1. Elements of Discrete Mathematics by C. L. Liu, Tata McGraw-Hill.
2. Introductory Combinatorics by R. A. Brualdi, Pearson.
3. Discrete Mathematics for Computer Scientists and Mathematicians by J. L. Mott, A. Kandel and T. P. Baker, Prentice Hall India.
4. Graph Theory by F. Harary, Narosa.
5. Discrete Mathematics with Applications by T. Koshy, Academic Press
6. Discrete Mathematics and Its Applications by K. H. Rosen, Tata McGraw-Hill.
7. Discrete mathematical structures with applications to computer science by J. Tremblay, R. Manohar, Tata McGraw-Hill.
Note: The concerned Course Coordinator will prepare the actual list of experiments/problems at the start of semester based on above
generic list.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Identify and abstract the programming task involved for a given problem.
CO2: Involve in design, development and testing of modelling, rendering, shading and animation.
CO3: Implement various graphics drawing algorithms, 2D-3D transformations and clipping techniques.
Note: The concerned Course Coordinator will prepare the actual list of experiments/problems at the start of semester based on above
generic list.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Represent mathematical objects as data structures.
CO2: Translate mathematical methods to MATLAB code.
CO3: Break a complex task up into smaller, simpler tasks.
CO4: Tabulate results and represent data visually.
Note: The concerned Course Coordinator will prepare the actual list of experiments/problems at the start of semester based on above
generic list.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Identify and abstract the programming task involved for a given problem.
CO2: Ability to describe stack, queue and linked list operation.
CO3: Ability to analyze algorithms and algorithm correctness.
Note: The concerned Course Coordinator will prepare the actual list of experiments/problems at the start of semester based on above
generic list.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Identify and abstract the data type and suitable statistical tool for the data.
CO2: Design the data sheet as per the SPSS format so that student can run the experiment.
CO3: Do the statistical analysis using SPSS.
Note: The concerned Course Coordinator will prepare the actual list of experiments/problems at the start of semester based on above
generic list.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Describe the fundamental elements of relational database management systems.
CO2: Design ER-models to represent simple database application scenarios.
CO3: Improve the database design by normalization.
Note: The concerned Course Coordinator will prepare the actual list of experiments/problems at the start of semester based on above
generic list.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Write python basic programs using conditional and looping structures.
CO2: Execute programs in python for string handling, functions, create modules and work with packages.
UNIT-02 Fuzzy Logic: Introduction to Fuzzy Logic, Classical and Fuzzy Sets: Overview of Classical Sets, 09L
Membership Function, Fuzzy rule generation. Operations on Fuzzy Sets: Compliment,
Intersections, Unions, Combinations of Operations, Aggregation Operations. Fuzzy Arithmetic,
Fuzzy Logic: Classical Logic, Multivalued Logics, Fuzzy Propositions, Fuzzy Qualifiers,
Linguistic Hedges, Fuzzy Inference, Defuzzification techniques, Fuzzy logic controller design,
some applications of fuzzy logic.
UNIT-03 Genetic Algorithms: Concept of “Genetics” and “Evolution” and it’s applications to probabilistic 08L
search techniques, Basic GA framework and different GA architectures, GA operators:
Encoding, Crossover, Selection, Mutation etc., Single objective Optimization problem using GA.
UNIT-04 Artificial Neural Networks: Overview of biological Neuro-system, Mathematical Models of 07L
Neurons, ANN architecture, Learning rules, Learning Paradigms-Supervised, Unsupervised and
reinforcement Learning, ANN training Algorithms- Training rules, Delta, Back Propagation
Algorithm, Multilayer Perceptron Model, Hopfield Networks, Associative Memories, Applications
of Artificial Neural Networks.
UNIT-05 Neuro-fuzzy Modeling: Introduction of Neuro-Fuzzy Systems: Architecture of Neuro Fuzzy 06L
Networks, Neuro-fuzzy inference system, Rule base structure identification, Neuro fuzzy
controls, Application of Neuro-fuzzy hybrid systems.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Understand the concepts of fuzzy logic and fuzziness involved in various systems.
CO2: Solve single objective optimization problems using Genetic algorithm.
CO3: Analyze various neural network architectures.
CO4: Use soft computing methods to solve various engineering application problems.
Books and References
1. Principles of Soft Computing by S.N. Sivanandam, S. N. Deepa, John Wiley & Sons.
2. Neural Networks and Learning Machines by S. Haykin, Prentice Hall of India.
3. Genetic Algorithms in Search, Optimization and Machine Learning by D.E. Goldberg, Pearson.
4. Fuzzy Logic with Engineering Applications by T.J. Ross, John Wiley & Sons.
5. Foundations of Neural Networks, Fuzzy systems and Knowledge Engineering by N.K. Kasabov, MIT Press.
6. An Introduction to Genetic Algorithms by M. Mitchell, MIT Press.
Note: The concerned Course Coordinator will prepare the actual list of experiments/problems at the start of semester based on above
generic list.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Develop algorithms and consequently codes for various numerical methods.
CO2: Learn to create and call function files.
CO3: Learn to control error in numerical computations
CO4: Use their computational skills efficiently with desired level of accuracy.
UNIT-03 Cryptanalysis: Linear, Differential and other Cryptanalysis Techniques, Overview on S-Box 08L
Design Principles, Modes of operation of Block Ciphers, Stream Ciphers, Pseudorandom
functions
Asymmetric Key Ciphers: Construction and Cryptanalysis.
UNIT-04 Primality Testing, Factoring Algorithms: The RSA Cryptosystem, Other attacks on RSA and 08L
Semantic Security of RSA, The Discrete Logarithm Problem (DLP) and the Diffie Hellman Key
Exchange algorithm The ElGamal Encryption Algorithm Cryptanalysis of DLP, Hash functions:
The Merkle Damgard Constructio Message Authentication Codes (MACs)
UNIT-05 Signature Schemes: Elliptic curve based cryptography, Secret Sharing Schemes. A Tutorial on 08L
Network Protocols, Kerberos, Pretty Good Privacy (PGP), Secure Socket Layer (SSL), Intruders
and Viruses, Firewalls.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Analyze the vulnerabilities in any computing system and hence be able to design a security solution.
CO2: Identify the security issues in the network and resolve it.
CO3: Implement various networking protocols.
Books and References
1. Cryptography Theory and Practice by D. Stinson, Chapman & Hall/CRC.
2. Cryptography & Network Security by B. A. Forouzan, Tata Mc Graw Hill.
3. Cryptography and Network Security by W. Stallings, Pearson Education.
4. Modern Cryptography, Theory & Practice by W. Mao, Pearson Education.
5. An Introduction to Mathematical Cryptography by J. Hoffstein, J. Pipher, J.H. Silvermman, Springer.
6. Number Theory by S. G. Telang, Tata Mc Graw Hill.
7. Protocols for Authentication and Key Establishment by C. Boyd, A. Mathuria, Springer.
UNIT-02 Problem Solving: Problem as a space, search, production system, problem characteristics, 08L
production system characteristics, issues in the design of search programs, Solving problems by
searching, Heuristic search techniques, constraint satisfaction problems, stochastic search
methods.
UNIT-04 Graph Coloring: vertex coloring, chromatic polynomials, edge coloring, planar graph coloring. 07L
UNIT-05 Matching and Factorizations: maximum matching in bipartite graphs, maximum matching in 09L
general graphs, Hall’s marriage theorem, factorization.
Networks: The Max-flow min-cut theorem, connectivity and edge connectivity, Menger’s
theorem; Graph and Matrices.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Apply principles and concepts of graph theory in practical situations.
CO2: Understand graphs as models.
CO3: Understand various types of trees and graph coloring.
Books and References
1. Introduction to graph theory by D.B. West, Pearson.
2. Applied and algorithmic graph theory by G Chatrand and O.R, Ollermann, McGraw Hill.
3. Graph Theory by J. A. Bondy and U.S.R. Murty, Springer.
4. Graph theory with applications to Engineering and computer science by N. Deo, Prentice Hall of India.
UNIT-04 Quantum Circuits: single qubit gates, multiple qubit gates, design of quantum circuits 06L
UNIT-05 Quantum Information, Cryptography and Algorithms: Comparison between classical and 10L
quantum information theory. Bell states. Quantum teleportation. Quantum Cryptography, no
cloning theorem, Deutsch’s algorithm, Deutsch’s-Jozsa algorithm
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Identify the applications of quantum computing.
CO2: Describe the quantum machines, measurements in quantum and qubit.
CO3: Descrive the advantages of quantum information theory and quantum cryptography and can
apply these concepts.
Books and References
1. Quantum Computation and Quantum Information by M A Nielsen, Cambridge University Press.
2. Quantum Physics by S Gasiorowicz, John Wiley & Sons.
3. A Text Book of Quantum Mechanics by P M Mathews , K Venkatesan, Tata McGraw Hill.
4. Quantum Mechanics, A. Ghatak A, S Lokanathan, Macmillan India Ltd.