<<<<<<< HEAD rgpv syllabus BTech Grading System 6th Semester Microsoft Word - AIML VI sem syllabus

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL


New Scheme Based On AICTE Flexible Curricula


CSE-Artificial Intelligence and Machine Learning/ Artificial Intelligence and Machine Learning, VI-Semester


AL-601 Theory of Computation

COURSE OBJECTIVE


LIST OF EXPERIMENTS

  1. Design a Program for creating machine that accepts three consecutive one.

  2. Design a Program for creating machine that accepts the string always ending with 101.

  3. Design a Program for Mode 3 Machine

  4. Design a program for accepting decimal number divisible by 2.

  5. Design a program for creating a machine which accepts string having equal no. of 1’s and 0’s.

  6. Design a program for creating a machine which count number of 1’s and 0’s in a given string.

  7. Design a Program to find 2’s complement of a given binary number.

  8. Design a Program which will increment the given binary number by 1.

  9. Design a Program to convert NDFA to DFA.

  10. Design a Program to create PDA machine that accept the well-formed parenthesis.

  11. Design a PDA to accept WCWR where w is any string and WR is reverse of that string and C is a Special symbol.

  12. Design a Turing machine that’s accepts the following language anbncn where n>0


    COURSE OUTCOMES

    After completion of this course, the students would be able to:

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL


New Scheme Based On AICTE Flexible Curricula


CSE-Artificial Intelligence and Machine Learning/ Artificial Intelligence and Machine Learning, VI-Semester


AL-602 Computer Networks

Course Outcomes:After completion of the course students will be able to

  1. Characterize and appreciate computer networks from the view point of components and from the view point of services

  2. Display good understanding of the flow of a protocol in general and a network protocol in particular

  3. Model a problem or situation in terms of layering concept and map it to the TCI/IP stack

  4. Select the most suitable Application Layer protocol (such as HTTP, FTP, SMTP, DNS, Bit torrent) as per the requirements of the network application and work with available tools to demonstrate the working of these protocols.

  5. Design a Reliable Data Transfer Protocol and incrementally develop solutions for the requirements of Transport Layer

  6. Describe the essential principles of Network Layers and use IP addressing to create subnets for any specific requirements


Unit –I Computer Network: Definitions, goals, components, Architecture, Classifications & Types. Layered Architecture: Protocol hierarchy, Design Issues, Interfaces and Services, Connection Oriented & Connectionless Services, Service primitives, Design issues & its functionality. ISOOSI Reference Model: Principle, Model, Descriptions of various layers and its comparison with TCP/IP. Principals of physical layer: Media, Bandwidth, Data rate and Modulations


Unit-II Data Link Layer: Need, Services Provided, Framing, Flow Control, Error control. Data Link Layer Protocol: Elementary & Sliding Window protocol: 1-bit, Go-Back-N, Selective Repeat, Hybrid ARQ. Protocol verification: Finite State Machine Models & Petri net models. ARP/RARP/GARP


Unit-III MAC Sub layer: MAC Addressing, Binary Exponential Back-off (BEB) Algorithm, Distributed Random Access Schemes/Contention Schemes: for Data Services (ALOHA and SlottedALOHA), for Local-Area Networks (CSMA, CSMA/CD, CSMA/CA), Collision Free Protocols: Basic Bit Map, BRAP, Binary Count Down, MLMA Limited Contention Protocols: Adaptive Tree Walk, Performance Measuring Metrics. IEEE Standards 802 series & their variant.


Unit-IV Network Layer: Need, Services Provided , Design issues, Routing algorithms: Least Cost Routing algorithm, Dijkstra's algorithm, Bellman-ford algorithm, Hierarchical Routing, Broadcast Routing, Multicast Routing. IP Addresses, Header format, Packet forwarding, Fragmentation and reassembly, ICMP, Comparative study of IPv4 & IPv6


Unit-V Transport Layer: Design Issues, UDP: Header Format, Per-Segment Checksum, Carrying Unicast/Multicast Real-Time Traffic, TCP: Connection Management, Reliability of Data Transfers, TCP Flow Control, TCP Congestion Control, TCP Header Format, TCP Timer Management. Application Layer: WWW and HTTP, FTP, SSH, Email (SMTP, MIME, IMAP), DNS, Network Management (SNMP).

References:

  1. Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education.

2 Douglas E Comer, “Internetworking WithTcp/Ip Principles, Protocols, And Architecture - Volume I” 6 th Edition,Pearson Education

3.DimitriBertsekas, Robert Gallager, “Data Networks”, PHI Publication, Second Edition. 4.KavehPahlavan, Prashant Krishnamurthy, “Networking Fundamentals”, Wiley Publication.

5.Uyless Black, “Computer Networks”, PHI Publication, Second Edition.

6.Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source Approach”, McGraw Hill.

List of Experiments:

  1. Study of Different Type of LAN& Network Equipments.

  2. Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc.

  3. LAN installations and Configurations.

  4. Write a program to implement various types of error correcting techniques.

  5. Write a program to implement various types of farming methods.

  6. Study of Tool Command Language (TCL).

  7. Study and Installation of Standard Network Simulator: N.S-2, N.S3.OpNet,QualNetetc .

  8. Study & Installation of ONE (Opportunistic Network Environment) Simulator for High Mobility Networks .

  9. Configure 802.11 WLAN.

  10. Implement &Simulate various types of routing algorithm.

  11. Study & Simulation of MAC Protocols like Aloha, CSMA, CSMA/CD and CSMA/CA using Standard Network Simulators.

  12. Study of Application layer protocols-DNS, HTTP, HTTPS, FTP and TelNet.

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL


New Scheme Based On AICTE Flexible Curricula


CSE-Artificial Intelligence and Machine Learning/ Artificial Intelligence and Machine Learning, VI-Semester


Departmental Elective AL603 (A) Image and Video Processing


Course Objective:

The students will be able to work with images and videos in several ways. These methods can be used as pre-processing steps for complex models.

Detailed Contents:

Module 1: Image representation and analysis, Introduction to computer Vision, Numerical representation of images, Image augmentation, enhancement, processing, color transforms, geometric transforms, feature recognition and

extraction

Module 2: Image Segmentation Object detection, breaking image into parts, finding contours and edges of various objects in image, Background subtraction for video.

Module 3: Object Motion and tracking Tracking a single point over time, motion models to define object movement over time, analyze

videos as sequences of individual image frames, methods to track a set of features over time,

matching features from image frame to other, tracking a moving car using optical flow Module 4: Robotic localization

Bayesian statistics to locate a robot in space, sensor measurements to safely navigate an environment, Gaussian uncertainty, histogram filter for robot localization in python.

Module 5: Image Restoration

Degradation model, noise models, estimation of degradation function by modeling, restoration

using Weiner filters and Inverse filters

Laboratory/ Practicals (if any): Mention list of Practicals

  1. Various forms of image representation

  2. Apply various image segmentation algorithms

  3. Apply object motion and tracking

  4. Apply object localization

  5. Apply image restoration


Text Books/Suggested References:

  1. Audio Video Systems, Bali & Bali, Khanna Book Publishing 2020.

  2. Handbook of Image and Video Processing by Alan C. Bovik, Academic Press, 2000.

  3. Python 3 Image Processing, Ashwin Pajankar, BPB Publication, 2019.

  4. https://www.coursera.org/learn/image-processing

Course Outcomes: After completion of course, students would be able to:

  1. Understand images and videos representation in a detailed manner.

  2. Apply ML techniques for image processing in different scenarios.

  3. Apply various object detection and image segmentation algorithms

  4. Apply various image restoration techniques and algorithm

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL


New Scheme Based On AICTE Flexible Curricula


CSE-Artificial Intelligence and Machine Learning/ Artificial Intelligence and Machine Learning, VI-Semester


Departmental Elective AL603 (B) Data and Visual Analytics


Unit 1 : Data Definitions and Analysis Techniques: Elements, Variables, and Data categorization Levels of Measurement Data management and indexing Introduction to Statistical Concepts: Sampling Distributions, Resampling, Statistical Inference and Descriptive Statistics, Measures of central tendency, Measures of location of dispersions


Unit 2: Advance Data analysis techniques: Statistical hypothesis generation and testing, Chi-Square test, t-Test, Analysis of variance, Correlation analysis, Maximum likelihood test, Regression Modelling, Multivariate Analysis, Bayesian Modelling, Inference and Bayesian Network, Regression analysis


Unit 3: Data Wrangling: Intro to Data Wrangling, Gathering Data, Assessing Data, Cleaning Data.


Data Visualization in Data Analysis: Design of Visualizations, Univariate Exploration of Data, Bivariate Exploration of Data, Multivariate Exploration of Data, Explanatory Visualizations.


Unit 4: Data Ecosystem: Overview of the Data Analyst Ecosystem, Types of Data, Understanding Different Types of File Formats, Sources of Data, Overview of Data Repositories, NoSQL, Data Marts, Data Lakes, ETL, and Data Pipelines, Foundations of Big Data, Big Data processing tools such as Hadoop, Hadoop Distributed File System (HDFS), Hive, and Spark


Unit 5: Data Visualization tools: Python visualization libraries (matplotlib, pandas, seaborn, ggplot, plotly), Introduction to PowerBI tools, Examples of inspiring (industry) projects- Exercise: create your own visualization of a complex dataset.


Text Books/References:

  1. Joel Grus, Data Science from Scratch, Shroff Publisher Publisher /O’Reilly Publisher Media

  2. Annalyn Ng, Kenneth Soo, Numsense! Data Science for the Layman, Shroff Publisher Publisher

  3. Cathy O’Neil and Rachel Schutt. Doing Data Science, Straight Talk from The Frontline. O’Reilly Publisher Media.

  4. Jure Leskovek, Anand Rajaraman and Jeffrey Ullman. Mining of Massive Datasets. v2.1, Cambridge

    University Press.

  5. Jake VanderPlas, Python Data Science Handbook, Shroff Publisher Publisher /O’Reilly Publisher Media 6. Philipp Janert, Data Analysis with Open Source Tools, Shroff Publisher Publisher /O’Reilly Publisher Media.

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL


New Scheme Based On AICTE Flexible Curricula


CSE-Artificial Intelligence and Machine Learning/ Artificial Intelligence and Machine Learning, VI-Semester


Departmental Elective AL603 (C) Pattern Recognition


Course Objective: To help students understand basic mathematical and statistical techniques commonly used in pattern recognition. To introduce students to a variety of pattern recognition algorithms.

Detailed Contents:

Module 1: Introduction and mathematical Preliminaries Principles of pattern recognition: Uses, mathematics, Classification and Bayesian rules, Clustering vs classification, Basics of linear algebra and vector spaces, Eigen values and eigen vectors, Rank of matrix and SVD


Module 2: Pattern Recognition basics Bayesian decision theory, Classifiers, Discriminant functions, Decision surfaces, Parameter estimation methods, Hidden Markov models, dimension reduction methods, Fisher discriminant analysis, Principal component analysis, non-parametric techniques for density estimation, nonmetric methods for pattern classification, unsupervised learning, algorithms for clustering: Kmeans, Hierarchical and other methods


Module 3: Feature Selection and extraction Problem statement and uses, Branch and bound algorithm, Sequential forward and backward selection, Cauchy Schwartz inequality, Feature selection criteria function: Probabilistic separability based and Interclass distance based, Feature Extraction: principles


Module 4: Visual Recognition Human visual recognition system, Recognition methods: Low-level modelling (e.g. features), Midlevel abstraction (e.g. segmentation), High-level reasoning (e.g. scene understanding); Detection/Segmentation methods; Context and scenes, Importance and saliency, Large-scale search and recognition, Egocentric vision, systems, Human-in-the-loop interactive systems, 3D scene understanding.


Module 5: Recent advancements in Pattern Recognition Comparison between performance of classifiers, Basics of statistics, covariance and their properties, Data condensation, feature clustering, Data visualization, Probability density estimation, Visualization and Aggregation, FCM and soft- computing techniques, Examples of real-life datasets.


Laboratory/ Practicals:

  1. Data extraction

  2. Pre-processing of images

  3. Image segmentation

  4. Image classification AICTE


Text Books/Suggested References:

  1. Pattern Recognition and Machine Learning by Christopher M. Bishop, Springer, 2006.

  2. Pattern Classification by Richard O. Duda , Peter E. Hart, David G. Stork, Wiley, 1973.

  3. https://nptel.ac.in/courses/106/106/106106046/

Course Outcomes: After completion of course, students would be able to:

  1. Understand basic mathematical and statistical techniques commonly used in pattern recognition.

  2. Apply a variety of pattern recognition algorithms.

  3. Understand and apply various pre-processing algorithms.

  4. Apply various algorithms for image classification.

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL


New Scheme Based On AICTE Flexible Curricula


CSE-Artificial Intelligence and Machine Learning/ Artificial Intelligence and Machine Learning, VI-Semester


Open Elective AL604 (A) Cloud Computing


Course Objective: The objective of this course is to provide students with the comprehensive and in depth knowledge of Cloud Computing concepts, technologies, architecture and applications.


UNIT I Introduction of Grid and Cloud computing, characteristics, components, business and IT perspective, cloud services requirements, cloud models, Security in public model, public verses private clouds, Cloud computing platforms: Amazon EC2,Platform as Service: Google App Engine, Microsoft Azure, Utility Computing, Elastic Computing.


UNIT II Cloud services- SAAS, PAAS, IAAS, cloud design and implementation using SOA, conceptual cloud model, cloud stack, computing on demand, Information life cycle management, cloud analytics, information security, virtual desktop infrastructure, storage cloud.


UNIT III Virtualization technology: Definition, benefits, sensor virtualization, HVM, study of hypervisor, logical partitioning- LPAR, Storage virtualization, SAN, NAS, cloud server virtualization, virtualized data center.


UNIT IV Cloud security fundamentals, Vulnerability assessment tool for cloud, Privacy and Security in cloud, Cloud computing security architecture: Architectural Considerations- General Issues, Trusted Cloud computing, Secure Execution Environments and Communications, Micro- architectures; Identity Management and Access control-Identity management, Access control, Autonomic Security, Cloud computing security challenges: Virtualization security management- virtual threats, VM Security Recommendations, VM-Specific Security techniques, Secure Execution Environments and Communications in cloud.


UNIT V SOA and cloud, SOA and IAAS, cloud infrastructure benchmarks, OLAP, business intelligence, e-Business, ISV, Cloud performance monitoring commands, issues in cloud computing. QOS issues in cloud, mobile cloud computing, Inter cloud issues, Sky computing, Cloud Computing Platform, Xen Cloud Platform, Eucalyptus, OpenNebula, Nimbus, TPlatform, Apache Virtual Computing Lab (VCL), Anomaly Elastic Computing Platform.


References:

  1. Dr.Kumar Saurabh, “Cloud Computing”, Wiley India.

  2. Ronald Krutz and Russell Dean Vines, “Cloud Security”, Wiley-India.

  3. Judith Hurwitz, R.Bloor, M.Kanfman, F.Halper, “Computing for Dummies”, Wiley India Edition.

  4. Anthony T.Velte Toby J.Velte, “Cloud Computing – A Practical Approach”, TMH.

  5. Barrie Sosinsky, ‘Cloud Computing Bible”, Wiley India.


Course Outcomes: After the completion of this course, the students will be able to:

  1. Explain the core concepts of the cloud computing paradigm

  2. Demonstrate knowledge of virtualization

  3. Explain the core issues of cloud computing such as security, privacy, and interoperability.

  4. Choose the appropriate technologies, algorithms, and approaches for the related issues.

  5. Identify problems, and explain, analyze, and evaluate various cloud computing solutions

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL


New Scheme Based On AICTE Flexible Curricula


CSE-Artificial Intelligence and Machine Learning/ Artificial Intelligence and Machine Learning, VI-Semester


Open Elective AL604 (B) Information Security & Management


UNIT-I

Introduction: Needs for Security; Basic security terminologies e.g. threats, vulnerability, exploit etc.; Security principles(CIA), authentication, nonrepudiation; security attacks and their classifications; Mathematical foundation - Prime Number; Modular Arithmetic; Fermat’s and Euler’s Theorem; The Euclidean Algorithms; The Chinese Remainder Theorem; Discrete logarithms.


UNIT-II

Symmetric Key Cryptography: Classical cryptography – substitution, transposition and their cryptanalysis; Symmetric Cryptography Algorithm – DES, 3DES, AES etc.; Modes of operation: ECB, CBC etc.; Cryptanalysis of Symmetric Key Ciphers: Linear Cryptanalysis, Differential Cryptanalysis.


UNIT-III

Asymmetric Key Cryptography: Key Distribution and Management, Diffie-Hellman Key Exchange algorithm; Asymmetric Key Cryptography Algorithm– RSA, ECC etc.; Various types of attacks on Cryptosystems.


UNIT-IV

Authentication & Integrity – MAC, Hash function, SHA, MD5, HMAC, Digital signature and authentication protocols; Authorization; Access control mechanism; X.509 Digital Certificate.


UNIT-V

E-mail, IP and Web Security: E-mail security – PGP, MIME, S/MIME; IP security protocols; Web security – TLS, SSL etc.; Secure Electronic Transaction(SET); Firewall and its types; Introduction to IDPS; Risk Management; Security Planning.


TEXT BOOKS RECOMMENDED:

  1. Michael E. Whitman, Herbert J. Mattord, “Principles of Information Security”, 6th Edition, Cengage Learning.

  2. Stallings William, “Cryptography and Network Security - Principles and Practice”, 7th Edition, Pearson.

REFERENCE BOOKS:

  1. Roberta Bragge, Mark Rhodes, Keith Straggberg, “Network Security the Complete Reference”, Tata McGraw Hill Publication,

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL


New Scheme Based On AICTE Flexible Curricula


CSE-Artificial Intelligence and Machine Learning/ Artificial Intelligence and Machine Learning, VI-Semester


Open Elective AL604 (C) Intelligent Systems for Robotics


Course Objective:

The students will be able to understand the basic concepts and fundamentals of robotics. They will also be able to use AI in the field of robotics.

Detailed Contents:


Unit 1:

Introduction: Introduction to Robotics Fundamentals of Robotics, Robot Kinematics: Position Analysis, Dynamic Analysis and Forces, Robot Programming languages & systems: Introduction, the three levels of robot programming, requirements of a robot programming language, problems peculiar to robot programming languages.


Unit 2:

Need of AI in Robotics: History, state of the art, Need for AI in Robotics. Thinking and acting humanly, intelligent agents, structure of agents.


Unit 3:

Game Playing: AI and game playing, plausible move generator, static evaluation move generator, game playing strategies, problems in game playing.


Unit 4:

Robotics fundamentals: Robot Classification, Robot Specification, notation, kinematic representations and transformations, dynamics techniques; trajectory planning and control.


Unit 5:

Robotics and Its applications: DDD concept, Intelligent robots, Robot anatomy-Definition, law of robotics, History and Terminology of Robotics-Accuracy and repeatability of Robotics-Simple problems-Specifications of Robot-Speed of Robot, Robot joints and links-Robot classifications- Architecture of robotic systems-Robot Drive systems-Hydraulic, Pneumatic and Electric system


Suggested References:


  1. Robotics, Vision and Control: Fundamental Algorithms in MATLAB, Peter Corke, Springer, 2011.

  2. Robotics: Everything You Need to Know About Robotics from Beginner to Expert, Peter McKinnon, Createspace Independent Publishing Platform, 2016.

  3. Introduction to AI Robotics, Second Edition, By Robin R. Murphy, MIT press, 2001.

  4. Artificial Intelligence for Robotics: Build intelligent robots that perform human tasks using AI techniques, Francis X. Govers, Packt Publishers, 2018

======= rgpv syllabus BTech Grading System 6th Semester Microsoft Word - AIML VI sem syllabus

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL


New Scheme Based On AICTE Flexible Curricula


CSE-Artificial Intelligence and Machine Learning/ Artificial Intelligence and Machine Learning, VI-Semester


AL-601 Theory of Computation

COURSE OBJECTIVE


LIST OF EXPERIMENTS

  1. Design a Program for creating machine that accepts three consecutive one.

  2. Design a Program for creating machine that accepts the string always ending with 101.

  3. Design a Program for Mode 3 Machine

  4. Design a program for accepting decimal number divisible by 2.

  5. Design a program for creating a machine which accepts string having equal no. of 1’s and 0’s.

  6. Design a program for creating a machine which count number of 1’s and 0’s in a given string.

  7. Design a Program to find 2’s complement of a given binary number.

  8. Design a Program which will increment the given binary number by 1.

  9. Design a Program to convert NDFA to DFA.

  10. Design a Program to create PDA machine that accept the well-formed parenthesis.

  11. Design a PDA to accept WCWR where w is any string and WR is reverse of that string and C is a Special symbol.

  12. Design a Turing machine that’s accepts the following language anbncn where n>0


    COURSE OUTCOMES

    After completion of this course, the students would be able to:

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL


New Scheme Based On AICTE Flexible Curricula


CSE-Artificial Intelligence and Machine Learning/ Artificial Intelligence and Machine Learning, VI-Semester


AL-602 Computer Networks

Course Outcomes:After completion of the course students will be able to

  1. Characterize and appreciate computer networks from the view point of components and from the view point of services

  2. Display good understanding of the flow of a protocol in general and a network protocol in particular

  3. Model a problem or situation in terms of layering concept and map it to the TCI/IP stack

  4. Select the most suitable Application Layer protocol (such as HTTP, FTP, SMTP, DNS, Bit torrent) as per the requirements of the network application and work with available tools to demonstrate the working of these protocols.

  5. Design a Reliable Data Transfer Protocol and incrementally develop solutions for the requirements of Transport Layer

  6. Describe the essential principles of Network Layers and use IP addressing to create subnets for any specific requirements


Unit –I Computer Network: Definitions, goals, components, Architecture, Classifications & Types. Layered Architecture: Protocol hierarchy, Design Issues, Interfaces and Services, Connection Oriented & Connectionless Services, Service primitives, Design issues & its functionality. ISOOSI Reference Model: Principle, Model, Descriptions of various layers and its comparison with TCP/IP. Principals of physical layer: Media, Bandwidth, Data rate and Modulations


Unit-II Data Link Layer: Need, Services Provided, Framing, Flow Control, Error control. Data Link Layer Protocol: Elementary & Sliding Window protocol: 1-bit, Go-Back-N, Selective Repeat, Hybrid ARQ. Protocol verification: Finite State Machine Models & Petri net models. ARP/RARP/GARP


Unit-III MAC Sub layer: MAC Addressing, Binary Exponential Back-off (BEB) Algorithm, Distributed Random Access Schemes/Contention Schemes: for Data Services (ALOHA and SlottedALOHA), for Local-Area Networks (CSMA, CSMA/CD, CSMA/CA), Collision Free Protocols: Basic Bit Map, BRAP, Binary Count Down, MLMA Limited Contention Protocols: Adaptive Tree Walk, Performance Measuring Metrics. IEEE Standards 802 series & their variant.


Unit-IV Network Layer: Need, Services Provided , Design issues, Routing algorithms: Least Cost Routing algorithm, Dijkstra's algorithm, Bellman-ford algorithm, Hierarchical Routing, Broadcast Routing, Multicast Routing. IP Addresses, Header format, Packet forwarding, Fragmentation and reassembly, ICMP, Comparative study of IPv4 & IPv6


Unit-V Transport Layer: Design Issues, UDP: Header Format, Per-Segment Checksum, Carrying Unicast/Multicast Real-Time Traffic, TCP: Connection Management, Reliability of Data Transfers, TCP Flow Control, TCP Congestion Control, TCP Header Format, TCP Timer Management. Application Layer: WWW and HTTP, FTP, SSH, Email (SMTP, MIME, IMAP), DNS, Network Management (SNMP).

References:

  1. Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education.

2 Douglas E Comer, “Internetworking WithTcp/Ip Principles, Protocols, And Architecture - Volume I” 6 th Edition,Pearson Education

3.DimitriBertsekas, Robert Gallager, “Data Networks”, PHI Publication, Second Edition. 4.KavehPahlavan, Prashant Krishnamurthy, “Networking Fundamentals”, Wiley Publication.

5.Uyless Black, “Computer Networks”, PHI Publication, Second Edition.

6.Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source Approach”, McGraw Hill.

List of Experiments:

  1. Study of Different Type of LAN& Network Equipments.

  2. Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc.

  3. LAN installations and Configurations.

  4. Write a program to implement various types of error correcting techniques.

  5. Write a program to implement various types of farming methods.

  6. Study of Tool Command Language (TCL).

  7. Study and Installation of Standard Network Simulator: N.S-2, N.S3.OpNet,QualNetetc .

  8. Study & Installation of ONE (Opportunistic Network Environment) Simulator for High Mobility Networks .

  9. Configure 802.11 WLAN.

  10. Implement &Simulate various types of routing algorithm.

  11. Study & Simulation of MAC Protocols like Aloha, CSMA, CSMA/CD and CSMA/CA using Standard Network Simulators.

  12. Study of Application layer protocols-DNS, HTTP, HTTPS, FTP and TelNet.

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL


New Scheme Based On AICTE Flexible Curricula


CSE-Artificial Intelligence and Machine Learning/ Artificial Intelligence and Machine Learning, VI-Semester


Departmental Elective AL603 (A) Image and Video Processing


Course Objective:

The students will be able to work with images and videos in several ways. These methods can be used as pre-processing steps for complex models.

Detailed Contents:

Module 1: Image representation and analysis, Introduction to computer Vision, Numerical representation of images, Image augmentation, enhancement, processing, color transforms, geometric transforms, feature recognition and

extraction

Module 2: Image Segmentation Object detection, breaking image into parts, finding contours and edges of various objects in image, Background subtraction for video.

Module 3: Object Motion and tracking Tracking a single point over time, motion models to define object movement over time, analyze

videos as sequences of individual image frames, methods to track a set of features over time,

matching features from image frame to other, tracking a moving car using optical flow Module 4: Robotic localization

Bayesian statistics to locate a robot in space, sensor measurements to safely navigate an environment, Gaussian uncertainty, histogram filter for robot localization in python.

Module 5: Image Restoration

Degradation model, noise models, estimation of degradation function by modeling, restoration

using Weiner filters and Inverse filters

Laboratory/ Practicals (if any): Mention list of Practicals

  1. Various forms of image representation

  2. Apply various image segmentation algorithms

  3. Apply object motion and tracking

  4. Apply object localization

  5. Apply image restoration


Text Books/Suggested References:

  1. Audio Video Systems, Bali & Bali, Khanna Book Publishing 2020.

  2. Handbook of Image and Video Processing by Alan C. Bovik, Academic Press, 2000.

  3. Python 3 Image Processing, Ashwin Pajankar, BPB Publication, 2019.

  4. https://www.coursera.org/learn/image-processing

Course Outcomes: After completion of course, students would be able to:

  1. Understand images and videos representation in a detailed manner.

  2. Apply ML techniques for image processing in different scenarios.

  3. Apply various object detection and image segmentation algorithms

  4. Apply various image restoration techniques and algorithm

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL


New Scheme Based On AICTE Flexible Curricula


CSE-Artificial Intelligence and Machine Learning/ Artificial Intelligence and Machine Learning, VI-Semester


Departmental Elective AL603 (B) Data and Visual Analytics


Unit 1 : Data Definitions and Analysis Techniques: Elements, Variables, and Data categorization Levels of Measurement Data management and indexing Introduction to Statistical Concepts: Sampling Distributions, Resampling, Statistical Inference and Descriptive Statistics, Measures of central tendency, Measures of location of dispersions


Unit 2: Advance Data analysis techniques: Statistical hypothesis generation and testing, Chi-Square test, t-Test, Analysis of variance, Correlation analysis, Maximum likelihood test, Regression Modelling, Multivariate Analysis, Bayesian Modelling, Inference and Bayesian Network, Regression analysis


Unit 3: Data Wrangling: Intro to Data Wrangling, Gathering Data, Assessing Data, Cleaning Data.


Data Visualization in Data Analysis: Design of Visualizations, Univariate Exploration of Data, Bivariate Exploration of Data, Multivariate Exploration of Data, Explanatory Visualizations.


Unit 4: Data Ecosystem: Overview of the Data Analyst Ecosystem, Types of Data, Understanding Different Types of File Formats, Sources of Data, Overview of Data Repositories, NoSQL, Data Marts, Data Lakes, ETL, and Data Pipelines, Foundations of Big Data, Big Data processing tools such as Hadoop, Hadoop Distributed File System (HDFS), Hive, and Spark


Unit 5: Data Visualization tools: Python visualization libraries (matplotlib, pandas, seaborn, ggplot, plotly), Introduction to PowerBI tools, Examples of inspiring (industry) projects- Exercise: create your own visualization of a complex dataset.


Text Books/References:

  1. Joel Grus, Data Science from Scratch, Shroff Publisher Publisher /O’Reilly Publisher Media

  2. Annalyn Ng, Kenneth Soo, Numsense! Data Science for the Layman, Shroff Publisher Publisher

  3. Cathy O’Neil and Rachel Schutt. Doing Data Science, Straight Talk from The Frontline. O’Reilly Publisher Media.

  4. Jure Leskovek, Anand Rajaraman and Jeffrey Ullman. Mining of Massive Datasets. v2.1, Cambridge

    University Press.

  5. Jake VanderPlas, Python Data Science Handbook, Shroff Publisher Publisher /O’Reilly Publisher Media 6. Philipp Janert, Data Analysis with Open Source Tools, Shroff Publisher Publisher /O’Reilly Publisher Media.

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL


New Scheme Based On AICTE Flexible Curricula


CSE-Artificial Intelligence and Machine Learning/ Artificial Intelligence and Machine Learning, VI-Semester


Departmental Elective AL603 (C) Pattern Recognition


Course Objective: To help students understand basic mathematical and statistical techniques commonly used in pattern recognition. To introduce students to a variety of pattern recognition algorithms.

Detailed Contents:

Module 1: Introduction and mathematical Preliminaries Principles of pattern recognition: Uses, mathematics, Classification and Bayesian rules, Clustering vs classification, Basics of linear algebra and vector spaces, Eigen values and eigen vectors, Rank of matrix and SVD


Module 2: Pattern Recognition basics Bayesian decision theory, Classifiers, Discriminant functions, Decision surfaces, Parameter estimation methods, Hidden Markov models, dimension reduction methods, Fisher discriminant analysis, Principal component analysis, non-parametric techniques for density estimation, nonmetric methods for pattern classification, unsupervised learning, algorithms for clustering: Kmeans, Hierarchical and other methods


Module 3: Feature Selection and extraction Problem statement and uses, Branch and bound algorithm, Sequential forward and backward selection, Cauchy Schwartz inequality, Feature selection criteria function: Probabilistic separability based and Interclass distance based, Feature Extraction: principles


Module 4: Visual Recognition Human visual recognition system, Recognition methods: Low-level modelling (e.g. features), Midlevel abstraction (e.g. segmentation), High-level reasoning (e.g. scene understanding); Detection/Segmentation methods; Context and scenes, Importance and saliency, Large-scale search and recognition, Egocentric vision, systems, Human-in-the-loop interactive systems, 3D scene understanding.


Module 5: Recent advancements in Pattern Recognition Comparison between performance of classifiers, Basics of statistics, covariance and their properties, Data condensation, feature clustering, Data visualization, Probability density estimation, Visualization and Aggregation, FCM and soft- computing techniques, Examples of real-life datasets.


Laboratory/ Practicals:

  1. Data extraction

  2. Pre-processing of images

  3. Image segmentation

  4. Image classification AICTE


Text Books/Suggested References:

  1. Pattern Recognition and Machine Learning by Christopher M. Bishop, Springer, 2006.

  2. Pattern Classification by Richard O. Duda , Peter E. Hart, David G. Stork, Wiley, 1973.

  3. https://nptel.ac.in/courses/106/106/106106046/

Course Outcomes: After completion of course, students would be able to:

  1. Understand basic mathematical and statistical techniques commonly used in pattern recognition.

  2. Apply a variety of pattern recognition algorithms.

  3. Understand and apply various pre-processing algorithms.

  4. Apply various algorithms for image classification.

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL


New Scheme Based On AICTE Flexible Curricula


CSE-Artificial Intelligence and Machine Learning/ Artificial Intelligence and Machine Learning, VI-Semester


Open Elective AL604 (A) Cloud Computing


Course Objective: The objective of this course is to provide students with the comprehensive and in depth knowledge of Cloud Computing concepts, technologies, architecture and applications.


UNIT I Introduction of Grid and Cloud computing, characteristics, components, business and IT perspective, cloud services requirements, cloud models, Security in public model, public verses private clouds, Cloud computing platforms: Amazon EC2,Platform as Service: Google App Engine, Microsoft Azure, Utility Computing, Elastic Computing.


UNIT II Cloud services- SAAS, PAAS, IAAS, cloud design and implementation using SOA, conceptual cloud model, cloud stack, computing on demand, Information life cycle management, cloud analytics, information security, virtual desktop infrastructure, storage cloud.


UNIT III Virtualization technology: Definition, benefits, sensor virtualization, HVM, study of hypervisor, logical partitioning- LPAR, Storage virtualization, SAN, NAS, cloud server virtualization, virtualized data center.


UNIT IV Cloud security fundamentals, Vulnerability assessment tool for cloud, Privacy and Security in cloud, Cloud computing security architecture: Architectural Considerations- General Issues, Trusted Cloud computing, Secure Execution Environments and Communications, Micro- architectures; Identity Management and Access control-Identity management, Access control, Autonomic Security, Cloud computing security challenges: Virtualization security management- virtual threats, VM Security Recommendations, VM-Specific Security techniques, Secure Execution Environments and Communications in cloud.


UNIT V SOA and cloud, SOA and IAAS, cloud infrastructure benchmarks, OLAP, business intelligence, e-Business, ISV, Cloud performance monitoring commands, issues in cloud computing. QOS issues in cloud, mobile cloud computing, Inter cloud issues, Sky computing, Cloud Computing Platform, Xen Cloud Platform, Eucalyptus, OpenNebula, Nimbus, TPlatform, Apache Virtual Computing Lab (VCL), Anomaly Elastic Computing Platform.


References:

  1. Dr.Kumar Saurabh, “Cloud Computing”, Wiley India.

  2. Ronald Krutz and Russell Dean Vines, “Cloud Security”, Wiley-India.

  3. Judith Hurwitz, R.Bloor, M.Kanfman, F.Halper, “Computing for Dummies”, Wiley India Edition.

  4. Anthony T.Velte Toby J.Velte, “Cloud Computing – A Practical Approach”, TMH.

  5. Barrie Sosinsky, ‘Cloud Computing Bible”, Wiley India.


Course Outcomes: After the completion of this course, the students will be able to:

  1. Explain the core concepts of the cloud computing paradigm

  2. Demonstrate knowledge of virtualization

  3. Explain the core issues of cloud computing such as security, privacy, and interoperability.

  4. Choose the appropriate technologies, algorithms, and approaches for the related issues.

  5. Identify problems, and explain, analyze, and evaluate various cloud computing solutions

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL


New Scheme Based On AICTE Flexible Curricula


CSE-Artificial Intelligence and Machine Learning/ Artificial Intelligence and Machine Learning, VI-Semester


Open Elective AL604 (B) Information Security & Management


UNIT-I

Introduction: Needs for Security; Basic security terminologies e.g. threats, vulnerability, exploit etc.; Security principles(CIA), authentication, nonrepudiation; security attacks and their classifications; Mathematical foundation - Prime Number; Modular Arithmetic; Fermat’s and Euler’s Theorem; The Euclidean Algorithms; The Chinese Remainder Theorem; Discrete logarithms.


UNIT-II

Symmetric Key Cryptography: Classical cryptography – substitution, transposition and their cryptanalysis; Symmetric Cryptography Algorithm – DES, 3DES, AES etc.; Modes of operation: ECB, CBC etc.; Cryptanalysis of Symmetric Key Ciphers: Linear Cryptanalysis, Differential Cryptanalysis.


UNIT-III

Asymmetric Key Cryptography: Key Distribution and Management, Diffie-Hellman Key Exchange algorithm; Asymmetric Key Cryptography Algorithm– RSA, ECC etc.; Various types of attacks on Cryptosystems.


UNIT-IV

Authentication & Integrity – MAC, Hash function, SHA, MD5, HMAC, Digital signature and authentication protocols; Authorization; Access control mechanism; X.509 Digital Certificate.


UNIT-V

E-mail, IP and Web Security: E-mail security – PGP, MIME, S/MIME; IP security protocols; Web security – TLS, SSL etc.; Secure Electronic Transaction(SET); Firewall and its types; Introduction to IDPS; Risk Management; Security Planning.


TEXT BOOKS RECOMMENDED:

  1. Michael E. Whitman, Herbert J. Mattord, “Principles of Information Security”, 6th Edition, Cengage Learning.

  2. Stallings William, “Cryptography and Network Security - Principles and Practice”, 7th Edition, Pearson.

REFERENCE BOOKS:

  1. Roberta Bragge, Mark Rhodes, Keith Straggberg, “Network Security the Complete Reference”, Tata McGraw Hill Publication,

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL


New Scheme Based On AICTE Flexible Curricula


CSE-Artificial Intelligence and Machine Learning/ Artificial Intelligence and Machine Learning, VI-Semester


Open Elective AL604 (C) Intelligent Systems for Robotics


Course Objective:

The students will be able to understand the basic concepts and fundamentals of robotics. They will also be able to use AI in the field of robotics.

Detailed Contents:


Unit 1:

Introduction: Introduction to Robotics Fundamentals of Robotics, Robot Kinematics: Position Analysis, Dynamic Analysis and Forces, Robot Programming languages & systems: Introduction, the three levels of robot programming, requirements of a robot programming language, problems peculiar to robot programming languages.


Unit 2:

Need of AI in Robotics: History, state of the art, Need for AI in Robotics. Thinking and acting humanly, intelligent agents, structure of agents.


Unit 3:

Game Playing: AI and game playing, plausible move generator, static evaluation move generator, game playing strategies, problems in game playing.


Unit 4:

Robotics fundamentals: Robot Classification, Robot Specification, notation, kinematic representations and transformations, dynamics techniques; trajectory planning and control.


Unit 5:

Robotics and Its applications: DDD concept, Intelligent robots, Robot anatomy-Definition, law of robotics, History and Terminology of Robotics-Accuracy and repeatability of Robotics-Simple problems-Specifications of Robot-Speed of Robot, Robot joints and links-Robot classifications- Architecture of robotic systems-Robot Drive systems-Hydraulic, Pneumatic and Electric system


Suggested References:


  1. Robotics, Vision and Control: Fundamental Algorithms in MATLAB, Peter Corke, Springer, 2011.

  2. Robotics: Everything You Need to Know About Robotics from Beginner to Expert, Peter McKinnon, Createspace Independent Publishing Platform, 2016.

  3. Introduction to AI Robotics, Second Edition, By Robin R. Murphy, MIT press, 2001.

  4. Artificial Intelligence for Robotics: Build intelligent robots that perform human tasks using AI techniques, Francis X. Govers, Packt Publishers, 2018

>>>>>>> html