HEAD
New Scheme Based On AICTE Flexible Curricula Artificial Intelligence and Data Science, VI-Semester AD-601Deep Learning
Course Outcomes: After completion of the course students will be able to
Introduction to Deep Learning: Basics: Biological Neuron, Idea of computational units, McCulloch–Pitts Neural Model, Linear Perceptron, Perceptron Learning, Feed Forward and Back Propagation Networks.
Feedforward Networks: Multilayer Perceptron, Gradient Descent, Backpropagation, Empirical Risk Minimization, regularization, auto encoders.
Convolutional Networks: The Convolution Operation, Variants of the Basic Convolution Function, Structured Outputs, Efficient Convolution Algorithms, Random or Unsupervised Features, LeNet, AlexNet
Recurrent Neural Networks: Bidirectional RNNs, Deep Recurrent Networks Recursive Neural Networks, The Long Short-Term Memory and Other Gated RNNs
Deep Generative Models: Boltzmann Machines, Restricted Boltzmann Machines, Introduction to MCMC and Gibbs Sampling, Gradient computations in RBMs, Deep Belief Networks, Deep Boltzmann Machines
Image Processing, Speech Recognition, Natural Language Processing REFERENCES
Ian Goodfellow, YoshuaBengio, Aaron Courville, “Deep Learning”, MIT Press, 2016.
Francois Chollet, “Deep Learning with Python”, Manning; Second Edition, 2021.
Navin Kumar Manaswi “Deep Learning with Applications Using Python”, Apress,2018.
Nikhil Buduma, “Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms”, O’Reilly publications,2017.
LAB Experiments-
Write a Program to implement Linear Perceptron.
Write a Program to implement Multi-Layer Perceptron.
Write a Program to implementAutoencoders.
Write a Program to implement basic Convolutional Neural Network for Image Classification.
Write a Program to implement LeNet for image classification
Write a Program to implement AlexNet for image classification
Write a Program to implement RNN for text classification
Write a Program to implement LSTM for text prediction.
Write a Program to implementBoltzmann Machines for any real world classification problem.
Write a Program to implement restricted Boltzmann Machines for any real world classification problem.
New Scheme Based On AICTE Flexible Curricula Artificial Intelligence and Data Science, VI-Semester AD-602 Computer Networks
Course Outcomes: After completion of the course students will be able to
Characterize and appreciate computer networks from the view point of components and from the view point of services (Knowledge & design of networks)
Understand the Concepts of Data link layerand its protocols and also about the working of MAC sublayer.
CO-3: Describe the essential principles of Network Layers and use IP addressing to createsubnets for any specific requirements.
CO-4. Design a Reliable Data Transfer Protocol and incrementally develop solutions for therequirements of Transport Layer.
CO-5: Select the most suitable Application Layer protocol (such as HTTP, FTP, SMTP, DNS,Bit torrent) as per the requirements of the network application and work with available tools to demonstrate the working of these protocols.
Unit –I:
Computer Network: Definitions, goals, components, Architecture, Classifications & Types.Layered Architecture: Protocol hierarchy, Design Issues, Interfaces and Services, ConnectionOriented & Connectionless Services, Service primitives, Design issues & its functionality. ISOOSI Reference Model: Principle, Model, Descriptions of various layers and its comparison withTCP/IP. Principals of physical layer: Media, Bandwidth, Data rate and Modulations.
Unit-II
Data Link Layer: Need, Services Provided, Framing, Flow Control, Error control. Data LinkLayer Protocol: Elementary &Sliding Window protocol: 1-bit, Go-Back-N, Selective Repeat,
Hybrid ARQ.
MAC Sub layer: MAC Addressing, Binary Exponential Back-off (BEB) Algorithm, DistributedRandom Access Schemes/Contention Schemes: for Data Services (ALOHA and SlottedALOHA), for Local-Area Networks (CSMA, CSMA/CD, CSMA/CA). IEEE Standards 802 series & their variant.
Unit-III
Network Layer: Need, Services Provided, Design issues, Routing algorithms: Least Cost- Routing algorithm, Dijkstra's algorithm, Bellman-ford algorithm, Hierarchical Routing,Broadcast Routing, Multicast Routing. IP Addresses, Header format, Packet forwarding,Fragmentation and reassembly, ICMP, Comparative study of IPv4 & IPv6.
Unit-IV
Transport Layer: Design Issues, UDP: Header Format, Per-Segment Checksum, CarryingUnicast/Multicast Real-Time Traffic, TCP: Connection Management, Reliability of DataTransfers, TCP Flow Control, TCP Congestion Control, TCP Header Format, TCP TimerManagement.
Unit-V
Application Layer: WWW and HTTP, FTP, SSH, Email (SMTP, MIME, IMAP),DNS, Network Management (SNMP).
Network Security: Introduction to security, Traditional Ciphers, Modern Ciphers, Message Integrity and Authentication.
References:
1.Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education.
2 Douglas E Comer, “Internetworking WithTcp/Ip Principles, Protocols, And Architecture - Volume I”6th Edition, Pearson Education
DimitriBertsekas, Robert Gallager, “Data Networks”, PHI Publication, Second Edition.
Behrouz A. Forouzan, “TCP/IP protocol Suite” Fourth Edition, Tata Mc Graw Hill
Uyless Black, “Computer Networks”, PHI Publication, Second Edition.
List of Experiments:
Study of Different Type of LAN& Network Equipment.
Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc.
LAN installations and Configurations.
Write a program to implement various types of error correcting techniques.
Write a program to implement various types of framing methods.
Study of Tool Command Language (TCL).
Study and Installation of Standard Network Simulator: N.S-2, N.S3.OpNet, QualNetetc .
Study & Installation of ONE (Opportunistic Network Environment) Simulator for High Mobility Networks.
Configure 802.11 WLAN.
Implement &Simulate various types of routing algorithm.
Study & Simulation of MAC Protocols like Aloha, CSMA, CSMA/CD and CSMA/CA usingStandard Network Simulators.
Study of Application layer protocols-DNS, HTTP, HTTPS, FTP and TelNet.
New Scheme Based On AICTE Flexible Curricula Artificial Intelligence and Data Science, VI-Semester
COURSE OBJECTIVES
Student should understand the value of Historical data and data mining in solving real-worldproblems.
Student should become affluent with the basic Supervised and unsupervised learning algorithmscommonly used in data mining.
Student develops the skill in using data mining for solving real-world problems.
Unit-I: Data Warehousing: Introduction, Delivery Process, Data warehouse Architecture, DataPre-processing: Data cleaning, Data Integration and transformation, Data reduction. Data warehouseDesign: Data warehouse schema, Partitioning strategy Data warehouse Implementation, Data Marts,Meta Data, Example of a Multidimensional Data model. Introduction to Pattern Warehousing.
Unit-II: OLAP Systems: Basic concepts, OLAP queries, Types of OLAP servers, OLAP operations etc.Data Warehouse Hardware and Operational Design: Security, Backup And Recovery.
Unit-III: Introduction to Data& Data Mining :Data Types, Quality of data, Data Pre- processing, Similaritymeasures, Summary statistics, Data distributions, Basic data mining tasks, Data Mining V/sknowledge discovery in databases. Issues in Data mining. Introduction to Fuzzy sets and fuzzylogic.
Unit-IV: Supervised Learning: Classification: Statistical-based algorithms, Distance-based algorithms,Decision tree-based algorithms, Neural network-based algorithms, Rule-based algorithms,Probabilistic Classifiers
Unit-V: Clustering & Association Rule mining: Hierarchical algorithms, Partitional algorithms, Clusteringlarge databases – BIRCH, DBSCAN, CURE algorithms. Associationrules: Parallel and distributedalgorithms such as Apriori and FP growth algorithms.
Books Recommended:
Text Books:
Pang – ningTan , Steinbach & Kumar, “Introduction to Data Mining”, Pearson Edu, 2019.
Jaiwei Han, MichelineKamber, “Data Mining : Concepts and Techniques”, Morgan KaufmannPublishers.
Reference Books:
Margaret H. Dunham, “Data Mining : Introductory and Advanced topics”, Pearson Edu., 2009.
Anahory& Murray, “Data Warehousing in the Real World”, Pearson Edu., 2009.
COURSE OUTCOMES
After completion of this course, the students would be able to:
CO1. Understand the need of designing Enterprise data warehouses and will be enabled to approachbusiness problems analytically by identifying opportunities to derive business.
CO2. Compare and contrast, various methods for storing & retrieving data from different data Sources/repository.
CO3. Ascertain the application of data mining in various areas and Pre-process the given data andvisualize it for a given application or data exploration/mining task
CO4. Apply supervised learning methods to given data sets such as classification and its various types.
CO5. Apply Unsupervised learning methods to given data sets such as clustering and its various types.
CO6 Apply Association rule Mining to various domains
New Scheme Based On AICTE Flexible Curricula Artificial Intelligence and Data Science, VI-Semester
Course Outcomes: After completion of the course students will be able to
CO1: Develop a theoretical foundation of fundamental Digital Image Processing concepts. CO2: Apply transformation techniques for digital manipulation of images.
CO3: Understand and Apply Enhancement techniques on Digital Image.
CO4: Able to understand Segmentation & Compression Techniques on Digital Image.
CO5: Able to elaborate morphological techniques and advance techniques applicable for DIP
Unit-I Digital Image fundamentals, A simple image model, Sampling and Quantization. Relationship between pixels. Imaging geometry. Image acquisition systems, Different types of digital images
Unit-II Image transformations, Introduction to Fourier transforms, Discrete Fourier transforms, Fast Fourier transform, Walsh transformation, Hadmord transformation, Discrete Cosine Transformation.
Unit-III Image enhancement, Filters in spatial and frequency domains, Histogram based processing. Image subtraction, Averaging, Image smoothing, Nedion filtering, Low pass filtering, Image sharpening by High pass filtering.
Unit-IV Image encoding and segmentation, Encoding: Mapping, Quantizer, Coder. Error free compression, Lossy Compression schemes. JPEG Compression standard. Detection of discontinuation by point detection, Line detection, edge detection, Edge linking and boundary detection, Local analysis, Global processing via Hough transforms and graph theoretic techniques
Unit-V Mathematical morphology- Binary, Dilation, crosses, Opening and closing, Simple methods of representation, Signatures, Boundary segments, Skeleton of a region, Polynomial approximation, Recent advancement in DIP, Machine learning for image processing application
References:
Rafael C Gonzalez, Richard E Woods 3rd Edition, Digital Image Processing Pearson.
Rafael C Gonzalez, Richard E Woods 3rd Edition, Digital Image Processing using Matlab – TMH.
Sonka, Digital Image Processing & Computer Vision , Cengage Learning
4 Jayaraman, Digital Image Processing, TMH.
5. Pratt, Digital Image Processing, Wiley India
6 Annadurai, Fundamentals of Digital ImageProcessing , Pearson Education .
New Scheme Based On AICTE Flexible Curricula Artificial Intelligence and Data Science, VI-Semester Departmental Elective – AD 603 (C) Information Retrieval
Course Outcomes: After completion of the course students will be able to
CO1: Understand the role of Information Retrieval on Web and Artificial Intelligence. CO2: Comprehend the different space retrieval models in IR and pre-processing.
CO3: Able to understand the web architectures and crawling techniques. CO4: Able to understand Link Analysis for Information Retrieval.
CO5: Able to elaborate text mining, Classification and clustering algorithms
Unit-I
Introduction - History of IR- Components of IR - Issues -Open source Search engine. Frameworks - The Impact of the web on IR - The role of artificial intelligence (AI) in IR – IR Versus Web Search - Components of a search engine, characterizing the web.
Unit -II
Boolean and Vector space retrieval models- Term weighting - TF-IDF weighting- cosinesimilarity - Pre-processing - Inverted indices - efficient processing with sparse vectors LanguageModel based IR - Probabilistic IR -Latent Semantic indexing - Relevance feedback and queryexpansion.
Unit- III
Web search overview, web structure the user paid placement search engine optimization, Web
Search Architectures - crawling - meta-crawlers, Focused Crawling - web indexes - Near duplicate detection - Index Compression - XML retrieval.
Unit -IV
Link Analysis -hubs and authorities - Page Rank and HITS algorithms -Searching and Ranking
Relevance Scoring and ranking for Web - Similarity - Hadoop & Map Reduce - Evaluation - Personalized search - Collaborative filtering and content-based recommendation of documents
And products - handling invisible Web - Snippet generation, Summarization. QuestionAnswering, Cross-Lingual Retrieval.
Unit -V
Information filtering: organization and relevance feedback - Text Mining- Text classification andclustering - Categorization algorithms, naive Bayes, decision trees and nearest neighbor - Clustering algorithms: agglomerative clustering, k-means, expectation maximization (EM).
References:
C. Manning, P. Raghvan and H Schutze: Introduction to Information Retrieval, Cambridge University Press, 2008.
Ricardo Baeza -Yates and Berthier Ribeiro –Neto, Modern Information Retrieval The Concepts and Technology behind Search 2nd Edition, ACM Press Books 2011.
Bruce Croft, Donald Metzler and Trevor Strohman Search Engines Information Retrieval in Practice 1st Edition Addison Wesley, 2009
MarkLevene, An Introduction to Search Engines and Web Navigation, 2nd Edition Wiley 2010.
New Scheme Based On AICTE Flexible Curricula Artificial Intelligence and Data Science, VI-Semester Open Elective AD 604 (A) Internet of Things
Course Objective:
The objective of this course is to provide an understanding of the technologies and the standardsrelating to the Internet of Things and to develop skills on IoT technical planning.
Unit I
IoT definition, Characteristics, IoT conceptual and architectural framework, Componentsof IoT ecosystems, Physical and logical design of IoT, IoT enablers, Modern day IoTapplications, M2M communications, IoT vs M2M, IoT vs WoT, IoT reference architecture, IoTNetwork configurations, IoT LAN, IoT WAN, IoT Node, IoT Gateway, IoT Proxy, Review ofBasic Microcontrollers and interfacing.
Unit II
Define Sensor, Basic components and challenges of a sensor node, Sensor features,Sensor resolution; Sensor classes: Analog, Digital, Scalar, Vector Sensors; Sensor Types, bias,drift, Hysteresis error, quantization error; Actuator; Actuator types: Hydraulic, Pneumatic,electrical, thermal/magnetic, mechanical actuators, soft actuators.
Unit III
Basics of IoT Networking, IoT Components, Functional components of IoT, IoT serviceoriented architecture, IoT challenges, 6LowPAN, IEEE 802.15.4, ZigBee and its types, RFIDFeatures, RFID working principle and applications, NFC (Near Field communication),Bluetooth, Wireless Sensor Networks and its ApplicationsUnit IV MQTT, MQTT methods and components, MQTT communication, topics andapplications, SMQTT, CoAP, CoAP message types, CoAP Request-Response model, XMPP,AMQP features and components, AMQP frame types.
Unit V
IoT Platforms, Arduino, Raspberry Pi Board, Other IoT Platforms; Data Analytics forIoT, Cloud for IoT, Cloud storage models & communication APIs, Attacks in IoT system,vulnerability analysis in IoT, IoT case studies: Smart Home, Smart framing etc.
References:
Vijay Madisetti, ArshdeepBahga, “Ïnternet of Things, A Hands on Approach”, University Press
Dr. SRN Reddy, RachitThukral and Manasi Mishra, “Introduction to Internet of Things: A practical Approach”, ETI Labs
Pethuru Raj and Anupama C. Raman, “The Internet of Things: Enabling Technologies, Platforms, and Use Cases”, CRC Press
Jeeva Jose, “Internet of Things”, Khanna Publishing House, Delhi
Adrian McEwen, “Designing the Internet of Things”, Wiley
Raj Kamal, “Internet of Things: Architecture and Design”, McGraw Hill
CunoPfister, “Getting Started with the Internet of Things”, O Reilly Media
After the completion of this course, the students will be able to:
Understand Internet of Things and its hardware and software components
Interface I/O devices, sensors & communication modules
Analyze data from various sources in real-time and take necessary actions in anintelligent fashion
Remotely monitor data and control devices
Develop real life IoT based projects
New Scheme Based On AICTE Flexible Curricula Artificial Intelligence and Data Science, VI-Semester Open Elective AD 604 (B) Block Chain Technologies
Unit-I
Introduction: Overview of Block chain, Public Ledgers, Bit coin, Smart Contracts, Block in a Block chain, Transactions, Distributed Consensus, Public vs Private Block chain,Understanding Crypto currency to Block chain, Permissioned Model of Block chain,Overview of Security aspects of Block chain; Basic Crypto Primitives: Cryptographic HashFunction, Properties of a hash function, Hash pointer and Merkle tree, Digital Signature,Public Key Cryptography, A basic crypto currency
Unit-II
Understanding Block chain with Crypto currency: Bit coin and Block chain: Creation ofcoins, Payments and double spending, Bit coin Scripts, Bit coin P2P Network, Transaction inBit coin Network, Block Mining, Block propagation and block relay. Working withConsensus in Bit coin: Distributed consensus in open environments, Consensus in a Bitcoinnetwork, Proof of Work (PoW) – basic introduction, Hash Cash PoW, Bit coin PoW, Attackson PoW and the monopoly problem, Proof of Stake, Proof of Burn and Proof of ElapsedTime, The life of a Bitcoin Miner, Mining Difficulty, Mining Pool.
Unit-III
Understanding Block chain for Enterprises: Permissioned Block chain: Permissioned model and use cases, Design issues for Permissioned block chains, Execute contracts, State machinereplication, Overview of Consensus models for permissioned block chain- Distributedconsensus in closed environment, Paxos, RAFT Consensus, Byzantine general problem,Byzantine fault tolerant system, Lamport-Shostak-Pease BFT Algorithm, BFT overAsynchronous systems.
Unit-IV
Enterprise application of Block chain: Cross border payments, Know Your Customer (KYC), Food Security, Mortgage over Block chain, Block chain enabled Trade, We Trade – Trade Finance Network, Supply Chain Financing, and Identity on Block chain
Unit-V
Block chain application development: Hyperledger Fabric- Architecture, Identities andPolicies, Membership and Access Control, Channels, Transaction Validation, Writing smartcontract using Hyperledger Fabric, Writing smart contract using Ethereum, Overview ofRipple and Corda
References:
Melanie Swan, “Block Chain: Blueprint for a New Economy”, O’Reilly, 2015
Josh Thompsons, “Block Chain: The Block Chain for Beginners- Guide to BlockchainTechnology and Leveraging Block Chain Programming”
Daniel Drescher, “Block Chain Basics”, Apress; 1stedition, 2017
Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
Imran Bashir, “Mastering Block Chain: Distributed Ledger Technology, Decentralization andSmart Contracts Explained”, Packt Publishing
Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build SmartContractsfor Ethereum and Block Chain”, Packt Publishing
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O’Dowd,VenkatramanRamakrishna, “Hands-On Block Chain with Hyperledger: BuildingDecentralized Applications with Hyperledger Fabric and Composer”, Import, 2018
New Scheme Based On AICTE Flexible Curricula Artificial Intelligence and Data Science, VI-Semester Open Elective AD 604 (C) Compiler Design
Introduction of Compiler, Major data Structure in compiler, types of Compiler, Front-end and Back-endof compiler, Compiler structure: analysis-synthesis model of compilation, various phases of a compiler,Lexical analysis: Input buffering , Specification & Recognition of Tokens,Design of a Lexical AnalyzerGenerator, LEX.
Syntax analysis: CFGs, Top down parsing, Brute force approach, recursive descent parsing,transformation on the grammars, predictive parsing, bottom up parsing, operator precedence parsing, LRparsers (SLR, LALR, LR),Parser generation. Syntax directed definitions: Construction of Syntax trees,Bottom up evaluation of S-attributed definition, L- attribute definition, Top down translation, Bottom Upevaluation of inherited attributes Recursive Evaluation, Analysis of Syntax directed definition.
Unit-III Type Checking & Run Time Environment
Type checking: type system, specification of simple type checker, equivalence of expression, types, typeconversion, overloading of functions and operations, polymorphic functions. Run time Environment:storage organization, Storage allocation strategies, parameter passing, dynamic storage allocation, Symbol table, Error Detection & Recovery, Ad-Hoc and Systematic Methods.
Unit –IV Code Generation
Intermediate code generation: Declarations, Assignment statements, Boolean expressions, Casestatements, Back patching, Procedure calls Code Generation: Issues in the design of code generator, Basicblock and flow graphs, Register allocation and assignment, DAG representation of basic blocks, peepholeoptimization, generating code from DAG.
Unit –V Code Optimization
Introduction to Code optimization: sources of optimization of basic blocks, loops in flow graphs, deadcode elimination, loop optimization, Introduction to global data flow analysis, Code Improvingtransformations ,Data flow analysis of structure flow graph Symbolic debugging of optimized code.
References:s
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques and Tools , Pearson Education
2 Raghavan, Compiler Design, TMH Pub.
Louden. Compiler Construction: Principles and Practice, Cengage Learning
A. C. Holub. Compiler Design in C , Prentice-Hall Inc., 1993.
Mak, writing compiler & Interpreters, Willey Pub.
New Scheme Based On AICTE Flexible Curricula Artificial Intelligence and Data Science, VI-Semester AD-601Deep Learning
Course Outcomes: After completion of the course students will be able to
Introduction to Deep Learning: Basics: Biological Neuron, Idea of computational units, McCulloch–Pitts Neural Model, Linear Perceptron, Perceptron Learning, Feed Forward and Back Propagation Networks.
Feedforward Networks: Multilayer Perceptron, Gradient Descent, Backpropagation, Empirical Risk Minimization, regularization, auto encoders.
Convolutional Networks: The Convolution Operation, Variants of the Basic Convolution Function, Structured Outputs, Efficient Convolution Algorithms, Random or Unsupervised Features, LeNet, AlexNet
Recurrent Neural Networks: Bidirectional RNNs, Deep Recurrent Networks Recursive Neural Networks, The Long Short-Term Memory and Other Gated RNNs
Deep Generative Models: Boltzmann Machines, Restricted Boltzmann Machines, Introduction to MCMC and Gibbs Sampling, Gradient computations in RBMs, Deep Belief Networks, Deep Boltzmann Machines
Image Processing, Speech Recognition, Natural Language Processing REFERENCES
Ian Goodfellow, YoshuaBengio, Aaron Courville, “Deep Learning”, MIT Press, 2016.
Francois Chollet, “Deep Learning with Python”, Manning; Second Edition, 2021.
Navin Kumar Manaswi “Deep Learning with Applications Using Python”, Apress,2018.
Nikhil Buduma, “Fundamentals of Deep Learning: Designing Next-Generation Machine Intelligence Algorithms”, O’Reilly publications,2017.
LAB Experiments-
Write a Program to implement Linear Perceptron.
Write a Program to implement Multi-Layer Perceptron.
Write a Program to implementAutoencoders.
Write a Program to implement basic Convolutional Neural Network for Image Classification.
Write a Program to implement LeNet for image classification
Write a Program to implement AlexNet for image classification
Write a Program to implement RNN for text classification
Write a Program to implement LSTM for text prediction.
Write a Program to implementBoltzmann Machines for any real world classification problem.
Write a Program to implement restricted Boltzmann Machines for any real world classification problem.
New Scheme Based On AICTE Flexible Curricula Artificial Intelligence and Data Science, VI-Semester AD-602 Computer Networks
Course Outcomes: After completion of the course students will be able to
Characterize and appreciate computer networks from the view point of components and from the view point of services (Knowledge & design of networks)
Understand the Concepts of Data link layerand its protocols and also about the working of MAC sublayer.
CO-3: Describe the essential principles of Network Layers and use IP addressing to createsubnets for any specific requirements.
CO-4. Design a Reliable Data Transfer Protocol and incrementally develop solutions for therequirements of Transport Layer.
CO-5: Select the most suitable Application Layer protocol (such as HTTP, FTP, SMTP, DNS,Bit torrent) as per the requirements of the network application and work with available tools to demonstrate the working of these protocols.
Unit –I:
Computer Network: Definitions, goals, components, Architecture, Classifications & Types.Layered Architecture: Protocol hierarchy, Design Issues, Interfaces and Services, ConnectionOriented & Connectionless Services, Service primitives, Design issues & its functionality. ISOOSI Reference Model: Principle, Model, Descriptions of various layers and its comparison withTCP/IP. Principals of physical layer: Media, Bandwidth, Data rate and Modulations.
Unit-II
Data Link Layer: Need, Services Provided, Framing, Flow Control, Error control. Data LinkLayer Protocol: Elementary &Sliding Window protocol: 1-bit, Go-Back-N, Selective Repeat,
Hybrid ARQ.
MAC Sub layer: MAC Addressing, Binary Exponential Back-off (BEB) Algorithm, DistributedRandom Access Schemes/Contention Schemes: for Data Services (ALOHA and SlottedALOHA), for Local-Area Networks (CSMA, CSMA/CD, CSMA/CA). IEEE Standards 802 series & their variant.
Unit-III
Network Layer: Need, Services Provided, Design issues, Routing algorithms: Least Cost- Routing algorithm, Dijkstra's algorithm, Bellman-ford algorithm, Hierarchical Routing,Broadcast Routing, Multicast Routing. IP Addresses, Header format, Packet forwarding,Fragmentation and reassembly, ICMP, Comparative study of IPv4 & IPv6.
Unit-IV
Transport Layer: Design Issues, UDP: Header Format, Per-Segment Checksum, CarryingUnicast/Multicast Real-Time Traffic, TCP: Connection Management, Reliability of DataTransfers, TCP Flow Control, TCP Congestion Control, TCP Header Format, TCP TimerManagement.
Unit-V
Application Layer: WWW and HTTP, FTP, SSH, Email (SMTP, MIME, IMAP),DNS, Network Management (SNMP).
Network Security: Introduction to security, Traditional Ciphers, Modern Ciphers, Message Integrity and Authentication.
References:
1.Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education.
2 Douglas E Comer, “Internetworking WithTcp/Ip Principles, Protocols, And Architecture - Volume I”6th Edition, Pearson Education
DimitriBertsekas, Robert Gallager, “Data Networks”, PHI Publication, Second Edition.
Behrouz A. Forouzan, “TCP/IP protocol Suite” Fourth Edition, Tata Mc Graw Hill
Uyless Black, “Computer Networks”, PHI Publication, Second Edition.
List of Experiments:
Study of Different Type of LAN& Network Equipment.
Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc.
LAN installations and Configurations.
Write a program to implement various types of error correcting techniques.
Write a program to implement various types of framing methods.
Study of Tool Command Language (TCL).
Study and Installation of Standard Network Simulator: N.S-2, N.S3.OpNet, QualNetetc .
Study & Installation of ONE (Opportunistic Network Environment) Simulator for High Mobility Networks.
Configure 802.11 WLAN.
Implement &Simulate various types of routing algorithm.
Study & Simulation of MAC Protocols like Aloha, CSMA, CSMA/CD and CSMA/CA usingStandard Network Simulators.
Study of Application layer protocols-DNS, HTTP, HTTPS, FTP and TelNet.
New Scheme Based On AICTE Flexible Curricula Artificial Intelligence and Data Science, VI-Semester
COURSE OBJECTIVES
Student should understand the value of Historical data and data mining in solving real-worldproblems.
Student should become affluent with the basic Supervised and unsupervised learning algorithmscommonly used in data mining.
Student develops the skill in using data mining for solving real-world problems.
Unit-I: Data Warehousing: Introduction, Delivery Process, Data warehouse Architecture, DataPre-processing: Data cleaning, Data Integration and transformation, Data reduction. Data warehouseDesign: Data warehouse schema, Partitioning strategy Data warehouse Implementation, Data Marts,Meta Data, Example of a Multidimensional Data model. Introduction to Pattern Warehousing.
Unit-II: OLAP Systems: Basic concepts, OLAP queries, Types of OLAP servers, OLAP operations etc.Data Warehouse Hardware and Operational Design: Security, Backup And Recovery.
Unit-III: Introduction to Data& Data Mining :Data Types, Quality of data, Data Pre- processing, Similaritymeasures, Summary statistics, Data distributions, Basic data mining tasks, Data Mining V/sknowledge discovery in databases. Issues in Data mining. Introduction to Fuzzy sets and fuzzylogic.
Unit-IV: Supervised Learning: Classification: Statistical-based algorithms, Distance-based algorithms,Decision tree-based algorithms, Neural network-based algorithms, Rule-based algorithms,Probabilistic Classifiers
Unit-V: Clustering & Association Rule mining: Hierarchical algorithms, Partitional algorithms, Clusteringlarge databases – BIRCH, DBSCAN, CURE algorithms. Associationrules: Parallel and distributedalgorithms such as Apriori and FP growth algorithms.
Books Recommended:
Text Books:
Pang – ningTan , Steinbach & Kumar, “Introduction to Data Mining”, Pearson Edu, 2019.
Jaiwei Han, MichelineKamber, “Data Mining : Concepts and Techniques”, Morgan KaufmannPublishers.
Reference Books:
Margaret H. Dunham, “Data Mining : Introductory and Advanced topics”, Pearson Edu., 2009.
Anahory& Murray, “Data Warehousing in the Real World”, Pearson Edu., 2009.
COURSE OUTCOMES
After completion of this course, the students would be able to:
CO1. Understand the need of designing Enterprise data warehouses and will be enabled to approachbusiness problems analytically by identifying opportunities to derive business.
CO2. Compare and contrast, various methods for storing & retrieving data from different data Sources/repository.
CO3. Ascertain the application of data mining in various areas and Pre-process the given data andvisualize it for a given application or data exploration/mining task
CO4. Apply supervised learning methods to given data sets such as classification and its various types.
CO5. Apply Unsupervised learning methods to given data sets such as clustering and its various types.
CO6 Apply Association rule Mining to various domains
New Scheme Based On AICTE Flexible Curricula Artificial Intelligence and Data Science, VI-Semester
Course Outcomes: After completion of the course students will be able to
CO1: Develop a theoretical foundation of fundamental Digital Image Processing concepts. CO2: Apply transformation techniques for digital manipulation of images.
CO3: Understand and Apply Enhancement techniques on Digital Image.
CO4: Able to understand Segmentation & Compression Techniques on Digital Image.
CO5: Able to elaborate morphological techniques and advance techniques applicable for DIP
Unit-I Digital Image fundamentals, A simple image model, Sampling and Quantization. Relationship between pixels. Imaging geometry. Image acquisition systems, Different types of digital images
Unit-II Image transformations, Introduction to Fourier transforms, Discrete Fourier transforms, Fast Fourier transform, Walsh transformation, Hadmord transformation, Discrete Cosine Transformation.
Unit-III Image enhancement, Filters in spatial and frequency domains, Histogram based processing. Image subtraction, Averaging, Image smoothing, Nedion filtering, Low pass filtering, Image sharpening by High pass filtering.
Unit-IV Image encoding and segmentation, Encoding: Mapping, Quantizer, Coder. Error free compression, Lossy Compression schemes. JPEG Compression standard. Detection of discontinuation by point detection, Line detection, edge detection, Edge linking and boundary detection, Local analysis, Global processing via Hough transforms and graph theoretic techniques
Unit-V Mathematical morphology- Binary, Dilation, crosses, Opening and closing, Simple methods of representation, Signatures, Boundary segments, Skeleton of a region, Polynomial approximation, Recent advancement in DIP, Machine learning for image processing application
References:
Rafael C Gonzalez, Richard E Woods 3rd Edition, Digital Image Processing Pearson.
Rafael C Gonzalez, Richard E Woods 3rd Edition, Digital Image Processing using Matlab – TMH.
Sonka, Digital Image Processing & Computer Vision , Cengage Learning
4 Jayaraman, Digital Image Processing, TMH.
5. Pratt, Digital Image Processing, Wiley India
6 Annadurai, Fundamentals of Digital ImageProcessing , Pearson Education .
New Scheme Based On AICTE Flexible Curricula Artificial Intelligence and Data Science, VI-Semester Departmental Elective – AD 603 (C) Information Retrieval
Course Outcomes: After completion of the course students will be able to
CO1: Understand the role of Information Retrieval on Web and Artificial Intelligence. CO2: Comprehend the different space retrieval models in IR and pre-processing.
CO3: Able to understand the web architectures and crawling techniques. CO4: Able to understand Link Analysis for Information Retrieval.
CO5: Able to elaborate text mining, Classification and clustering algorithms
Unit-I
Introduction - History of IR- Components of IR - Issues -Open source Search engine. Frameworks - The Impact of the web on IR - The role of artificial intelligence (AI) in IR – IR Versus Web Search - Components of a search engine, characterizing the web.
Unit -II
Boolean and Vector space retrieval models- Term weighting - TF-IDF weighting- cosinesimilarity - Pre-processing - Inverted indices - efficient processing with sparse vectors LanguageModel based IR - Probabilistic IR -Latent Semantic indexing - Relevance feedback and queryexpansion.
Unit- III
Web search overview, web structure the user paid placement search engine optimization, Web
Search Architectures - crawling - meta-crawlers, Focused Crawling - web indexes - Near duplicate detection - Index Compression - XML retrieval.
Unit -IV
Link Analysis -hubs and authorities - Page Rank and HITS algorithms -Searching and Ranking
Relevance Scoring and ranking for Web - Similarity - Hadoop & Map Reduce - Evaluation - Personalized search - Collaborative filtering and content-based recommendation of documents
And products - handling invisible Web - Snippet generation, Summarization. QuestionAnswering, Cross-Lingual Retrieval.
Unit -V
Information filtering: organization and relevance feedback - Text Mining- Text classification andclustering - Categorization algorithms, naive Bayes, decision trees and nearest neighbor - Clustering algorithms: agglomerative clustering, k-means, expectation maximization (EM).
References:
C. Manning, P. Raghvan and H Schutze: Introduction to Information Retrieval, Cambridge University Press, 2008.
Ricardo Baeza -Yates and Berthier Ribeiro –Neto, Modern Information Retrieval The Concepts and Technology behind Search 2nd Edition, ACM Press Books 2011.
Bruce Croft, Donald Metzler and Trevor Strohman Search Engines Information Retrieval in Practice 1st Edition Addison Wesley, 2009
MarkLevene, An Introduction to Search Engines and Web Navigation, 2nd Edition Wiley 2010.
New Scheme Based On AICTE Flexible Curricula Artificial Intelligence and Data Science, VI-Semester Open Elective AD 604 (A) Internet of Things
Course Objective:
The objective of this course is to provide an understanding of the technologies and the standardsrelating to the Internet of Things and to develop skills on IoT technical planning.
Unit I
IoT definition, Characteristics, IoT conceptual and architectural framework, Componentsof IoT ecosystems, Physical and logical design of IoT, IoT enablers, Modern day IoTapplications, M2M communications, IoT vs M2M, IoT vs WoT, IoT reference architecture, IoTNetwork configurations, IoT LAN, IoT WAN, IoT Node, IoT Gateway, IoT Proxy, Review ofBasic Microcontrollers and interfacing.
Unit II
Define Sensor, Basic components and challenges of a sensor node, Sensor features,Sensor resolution; Sensor classes: Analog, Digital, Scalar, Vector Sensors; Sensor Types, bias,drift, Hysteresis error, quantization error; Actuator; Actuator types: Hydraulic, Pneumatic,electrical, thermal/magnetic, mechanical actuators, soft actuators.
Unit III
Basics of IoT Networking, IoT Components, Functional components of IoT, IoT serviceoriented architecture, IoT challenges, 6LowPAN, IEEE 802.15.4, ZigBee and its types, RFIDFeatures, RFID working principle and applications, NFC (Near Field communication),Bluetooth, Wireless Sensor Networks and its ApplicationsUnit IV MQTT, MQTT methods and components, MQTT communication, topics andapplications, SMQTT, CoAP, CoAP message types, CoAP Request-Response model, XMPP,AMQP features and components, AMQP frame types.
Unit V
IoT Platforms, Arduino, Raspberry Pi Board, Other IoT Platforms; Data Analytics forIoT, Cloud for IoT, Cloud storage models & communication APIs, Attacks in IoT system,vulnerability analysis in IoT, IoT case studies: Smart Home, Smart framing etc.
References:
Vijay Madisetti, ArshdeepBahga, “Ïnternet of Things, A Hands on Approach”, University Press
Dr. SRN Reddy, RachitThukral and Manasi Mishra, “Introduction to Internet of Things: A practical Approach”, ETI Labs
Pethuru Raj and Anupama C. Raman, “The Internet of Things: Enabling Technologies, Platforms, and Use Cases”, CRC Press
Jeeva Jose, “Internet of Things”, Khanna Publishing House, Delhi
Adrian McEwen, “Designing the Internet of Things”, Wiley
Raj Kamal, “Internet of Things: Architecture and Design”, McGraw Hill
CunoPfister, “Getting Started with the Internet of Things”, O Reilly Media
After the completion of this course, the students will be able to:
Understand Internet of Things and its hardware and software components
Interface I/O devices, sensors & communication modules
Analyze data from various sources in real-time and take necessary actions in anintelligent fashion
Remotely monitor data and control devices
Develop real life IoT based projects
New Scheme Based On AICTE Flexible Curricula Artificial Intelligence and Data Science, VI-Semester Open Elective AD 604 (B) Block Chain Technologies
Unit-I
Introduction: Overview of Block chain, Public Ledgers, Bit coin, Smart Contracts, Block in a Block chain, Transactions, Distributed Consensus, Public vs Private Block chain,Understanding Crypto currency to Block chain, Permissioned Model of Block chain,Overview of Security aspects of Block chain; Basic Crypto Primitives: Cryptographic HashFunction, Properties of a hash function, Hash pointer and Merkle tree, Digital Signature,Public Key Cryptography, A basic crypto currency
Unit-II
Understanding Block chain with Crypto currency: Bit coin and Block chain: Creation ofcoins, Payments and double spending, Bit coin Scripts, Bit coin P2P Network, Transaction inBit coin Network, Block Mining, Block propagation and block relay. Working withConsensus in Bit coin: Distributed consensus in open environments, Consensus in a Bitcoinnetwork, Proof of Work (PoW) – basic introduction, Hash Cash PoW, Bit coin PoW, Attackson PoW and the monopoly problem, Proof of Stake, Proof of Burn and Proof of ElapsedTime, The life of a Bitcoin Miner, Mining Difficulty, Mining Pool.
Unit-III
Understanding Block chain for Enterprises: Permissioned Block chain: Permissioned model and use cases, Design issues for Permissioned block chains, Execute contracts, State machinereplication, Overview of Consensus models for permissioned block chain- Distributedconsensus in closed environment, Paxos, RAFT Consensus, Byzantine general problem,Byzantine fault tolerant system, Lamport-Shostak-Pease BFT Algorithm, BFT overAsynchronous systems.
Unit-IV
Enterprise application of Block chain: Cross border payments, Know Your Customer (KYC), Food Security, Mortgage over Block chain, Block chain enabled Trade, We Trade – Trade Finance Network, Supply Chain Financing, and Identity on Block chain
Unit-V
Block chain application development: Hyperledger Fabric- Architecture, Identities andPolicies, Membership and Access Control, Channels, Transaction Validation, Writing smartcontract using Hyperledger Fabric, Writing smart contract using Ethereum, Overview ofRipple and Corda
References:
Melanie Swan, “Block Chain: Blueprint for a New Economy”, O’Reilly, 2015
Josh Thompsons, “Block Chain: The Block Chain for Beginners- Guide to BlockchainTechnology and Leveraging Block Chain Programming”
Daniel Drescher, “Block Chain Basics”, Apress; 1stedition, 2017
Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
Imran Bashir, “Mastering Block Chain: Distributed Ledger Technology, Decentralization andSmart Contracts Explained”, Packt Publishing
Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build SmartContractsfor Ethereum and Block Chain”, Packt Publishing
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O’Dowd,VenkatramanRamakrishna, “Hands-On Block Chain with Hyperledger: BuildingDecentralized Applications with Hyperledger Fabric and Composer”, Import, 2018
New Scheme Based On AICTE Flexible Curricula Artificial Intelligence and Data Science, VI-Semester Open Elective AD 604 (C) Compiler Design
Introduction of Compiler, Major data Structure in compiler, types of Compiler, Front-end and Back-endof compiler, Compiler structure: analysis-synthesis model of compilation, various phases of a compiler,Lexical analysis: Input buffering , Specification & Recognition of Tokens,Design of a Lexical AnalyzerGenerator, LEX.
Syntax analysis: CFGs, Top down parsing, Brute force approach, recursive descent parsing,transformation on the grammars, predictive parsing, bottom up parsing, operator precedence parsing, LRparsers (SLR, LALR, LR),Parser generation. Syntax directed definitions: Construction of Syntax trees,Bottom up evaluation of S-attributed definition, L- attribute definition, Top down translation, Bottom Upevaluation of inherited attributes Recursive Evaluation, Analysis of Syntax directed definition.
Unit-III Type Checking & Run Time Environment
Type checking: type system, specification of simple type checker, equivalence of expression, types, typeconversion, overloading of functions and operations, polymorphic functions. Run time Environment:storage organization, Storage allocation strategies, parameter passing, dynamic storage allocation, Symbol table, Error Detection & Recovery, Ad-Hoc and Systematic Methods.
Unit –IV Code Generation
Intermediate code generation: Declarations, Assignment statements, Boolean expressions, Casestatements, Back patching, Procedure calls Code Generation: Issues in the design of code generator, Basicblock and flow graphs, Register allocation and assignment, DAG representation of basic blocks, peepholeoptimization, generating code from DAG.
Unit –V Code Optimization
Introduction to Code optimization: sources of optimization of basic blocks, loops in flow graphs, deadcode elimination, loop optimization, Introduction to global data flow analysis, Code Improvingtransformations ,Data flow analysis of structure flow graph Symbolic debugging of optimized code.
References:s
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques and Tools , Pearson Education
2 Raghavan, Compiler Design, TMH Pub.
Louden. Compiler Construction: Principles and Practice, Cengage Learning
A. C. Holub. Compiler Design in C , Prentice-Hall Inc., 1993.
Mak, writing compiler & Interpreters, Willey Pub.