HEAD
New Scheme Based On AICTE Flexible Curricula
To understand computability, decidability, and complexity through problem solving.
To analyze and design abstract model of computation & formal languages
To understand and conduct mathematical proofs for computation and algorithms.
After completion of this course, the students would be able to:
CO1.explain the basic concepts of switching and finite automata theory & languages.
CO2.relate practical problems to languages, automata, computability and complexity.
CO3.construct abstract models of computing and check their power to recognize the languages.
CO4.analyse the grammar, its types, simplification and normal form.
CO5.interpret rigorously formal mathematical methods to prove properties of languages, grammars and automata.
CO6.develop an overview of how automata theory, languages and computation are applicable in engineering application.
Introduction of Automata Theory: Examples of automata machines, Finite Automata as a language acceptor and translator, Moore machines and mealy machines, composite machine, Conversion from Mealy to Moore and vice versa.
Types of Finite Automata: Non Deterministic Finite Automata (NDFA), Deterministic finite automata machines, conversion of NDFA to DFA, minimization of automata machines, regular expression, Arden’s theorem. Meaning of union, intersection, concatenation and closure, 2 way DFA.
Grammars: Types of grammar, context sensitive grammar, and context free grammar, regular grammar. Derivation trees, ambiguity in grammar, simplification of context free grammar, conversion of grammar to automata machine and vice versa, Chomsky hierarchy of grammar, killing null and unit productions. Chomsky normal form and Greibach normal form.
Push down Automata: example of PDA, deterministic and non-deterministic PDA, conversion of PDA into context free grammar and vice versa, CFG equivalent to PDA, Petrinet model.
Turing Machine: Techniques for construction. Universal Turing machine Multitape, multihead and multidimensional Turing machine, N-P complete problems. Decidability and Recursively Enumerable Languages, decidability, decidable languages, undecidable languages, Halting problem of Turing machine & the post correspondence problem.
Introduction to Automata Theory Language & Computation, Hopcroft& Ullman, Narosa Publication.
Element of the Theory Computation, Lewis &Christors, Pearson.
Theory of Computation, Chandrasekhar & Mishra, PHI.
Theory of Computation, Wood, Harper & Row.
Introduction to Computing Theory, Daniel I-A Cohen, Wiley.
Design a Program for creating machine that accepts three consecutive one.
Design a Program for creating machine that accepts the string always ending with 101.
Design a Program for Mode 3 Machine
Design a program for accepting decimal number divisible by 2.
Design a program for creating a machine which accepts string having equal no. of 1’s and 0’s.
Design a program for creating a machine which count number of 1’s and 0’s in a given string.
Design a Program to find 2’s complement of a given binary number.
Design a Program which will increment the given binary number by 1.
Design a Program to convert NDFA to DFA.
Design a Program to create PDA machine that accept the well-formed parenthesis.
Design a PDA to accept WCWR where w is any string and WR is reverse of that string and C is a Special symbol.
Design a Turing machine that’s accepts the following language anbncn where n>0
After completion of this course, the students would be able to:
CO1: judge various computational models.
CO2: construct abstract models of computing.
CO3: justify the power of abstract models in computing to recognize the languages.
CO4: demonstrate analytical thinking and intuition for problem solving in the related areas.
CO5: discuss the limitations of computation in problem solving.
CO6: follow set of rules for syntax verification.
New Scheme Based On AICTE Flexible Curricula
Course Outcomes:After completion of the course students will be able to
Characterize and appreciate computer networks from the view point of components and from the view point of services
Display good understanding of the flow of a protocol in general and a network protocol in particular
Model a problem or situation in terms of layering concept and map it to the TCI/IP stack
Select the most suitable Application Layer protocol (such as HTTP, FTP, SMTP, DNS, Bit torrent) as per the requirements of the network application and work with available tools to demonstrate the working of these protocols.
Design a Reliable Data Transfer Protocol and incrementally develop solutions for the requirements of Transport Layer
Describe the essential principles of Network Layers and use IP addressing to create subnets for any specific requirements
Unit –I Computer Network: Definitions, goals, components, Architecture, Classifications & Types. Layered Architecture: Protocol hierarchy, Design Issues, Interfaces and Services, Connection Oriented & Connectionless Services, Service primitives, Design issues & its functionality. ISOOSI Reference Model: Principle, Model, Descriptions of various layers and its comparison with TCP/IP. Principals of physical layer: Media, Bandwidth, Data rate and Modulations
Unit-II Data Link Layer: Need, Services Provided, Framing, Flow Control, Error control. Data Link Layer Protocol: Elementary & Sliding Window protocol: 1-bit, Go-Back-N, Selective Repeat, Hybrid ARQ. Protocol verification: Finite State Machine Models & Petri net models. ARP/RARP/GARP
Unit-III MAC Sub layer: MAC Addressing, Binary Exponential Back-off (BEB) Algorithm, Distributed Random Access Schemes/Contention Schemes: for Data Services (ALOHA and SlottedALOHA), for Local-Area Networks (CSMA, CSMA/CD, CSMA/CA), Collision Free Protocols: Basic Bit Map, BRAP, Binary Count Down, MLMA Limited Contention Protocols: Adaptive Tree Walk, Performance Measuring Metrics. IEEE Standards 802 series & their variant.
Unit-IV Network Layer: Need, Services Provided , Design issues, Routing algorithms: Least Cost Routing algorithm, Dijkstra's algorithm, Bellman-ford algorithm, Hierarchical Routing, Broadcast Routing, Multicast Routing. IP Addresses, Header format, Packet forwarding, Fragmentation and reassembly, ICMP, Comparative study of IPv4 & IPv6
Unit-V Transport Layer: Design Issues, UDP: Header Format, Per-Segment Checksum, Carrying Unicast/Multicast Real-Time Traffic, TCP: Connection Management, Reliability of Data Transfers, TCP Flow Control, TCP Congestion Control, TCP Header Format, TCP Timer Management. Application Layer: WWW and HTTP, FTP, SSH, Email (SMTP, MIME, IMAP), DNS, Network Management (SNMP).
References:
Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education.
2 Douglas E Comer, “Internetworking WithTcp/Ip Principles, Protocols, And Architecture - Volume I” 6 th Edition,Pearson Education
3.DimitriBertsekas, Robert Gallager, “Data Networks”, PHI Publication, Second Edition. 4.KavehPahlavan, Prashant Krishnamurthy, “Networking Fundamentals”, Wiley Publication.
5.Uyless Black, “Computer Networks”, PHI Publication, Second Edition.
6.Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source Approach”, McGraw Hill.
List of Experiments:
Study of Different Type of LAN& Network Equipments.
Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc.
LAN installations and Configurations.
Write a program to implement various types of error correcting techniques.
Write a program to implement various types of farming methods.
Study of Tool Command Language (TCL).
Study and Installation of Standard Network Simulator: N.S-2, N.S3.OpNet,QualNetetc .
Study & Installation of ONE (Opportunistic Network Environment) Simulator for High Mobility Networks .
Configure 802.11 WLAN.
Implement &Simulate various types of routing algorithm.
Study & Simulation of MAC Protocols like Aloha, CSMA, CSMA/CD and CSMA/CA using Standard Network Simulators.
Study of Application layer protocols-DNS, HTTP, HTTPS, FTP and TelNet.
New Scheme Based On AICTE Flexible Curricula
Course Objective:
The students will be able to work with images and videos in several ways. These methods can be used as pre-processing steps for complex models.
Detailed Contents:
Module 1: Image representation and analysis, Introduction to computer Vision, Numerical representation of images, Image augmentation, enhancement, processing, color transforms, geometric transforms, feature recognition and
extraction
Module 2: Image Segmentation Object detection, breaking image into parts, finding contours and edges of various objects in image, Background subtraction for video.
Module 3: Object Motion and tracking Tracking a single point over time, motion models to define object movement over time, analyze
videos as sequences of individual image frames, methods to track a set of features over time,
matching features from image frame to other, tracking a moving car using optical flow Module 4: Robotic localization
Bayesian statistics to locate a robot in space, sensor measurements to safely navigate an environment, Gaussian uncertainty, histogram filter for robot localization in python.
Module 5: Image Restoration
Degradation model, noise models, estimation of degradation function by modeling, restoration
using Weiner filters and Inverse filters
Laboratory/ Practicals (if any): Mention list of Practicals
Various forms of image representation
Apply various image segmentation algorithms
Apply object motion and tracking
Apply object localization
Apply image restoration
Text Books/Suggested References:
Audio Video Systems, Bali & Bali, Khanna Book Publishing 2020.
Handbook of Image and Video Processing by Alan C. Bovik, Academic Press, 2000.
Python 3 Image Processing, Ashwin Pajankar, BPB Publication, 2019.
Course Outcomes: After completion of course, students would be able to:
Understand images and videos representation in a detailed manner.
Apply ML techniques for image processing in different scenarios.
Apply various object detection and image segmentation algorithms
Apply various image restoration techniques and algorithm
New Scheme Based On AICTE Flexible Curricula
Unit 1 : Data Definitions and Analysis Techniques: Elements, Variables, and Data categorization Levels of Measurement Data management and indexing Introduction to Statistical Concepts: Sampling Distributions, Resampling, Statistical Inference and Descriptive Statistics, Measures of central tendency, Measures of location of dispersions
Unit 2: Advance Data analysis techniques: Statistical hypothesis generation and testing, Chi-Square test, t-Test, Analysis of variance, Correlation analysis, Maximum likelihood test, Regression Modelling, Multivariate Analysis, Bayesian Modelling, Inference and Bayesian Network, Regression analysis
Unit 3: Data Wrangling: Intro to Data Wrangling, Gathering Data, Assessing Data, Cleaning Data.
Unit 5: Data Visualization tools: Python visualization libraries (matplotlib, pandas, seaborn, ggplot, plotly), Introduction to PowerBI tools, Examples of inspiring (industry) projects- Exercise: create your own visualization of a complex dataset.
Text Books/References:
Joel Grus, Data Science from Scratch, Shroff Publisher Publisher /O’Reilly Publisher Media
Annalyn Ng, Kenneth Soo, Numsense! Data Science for the Layman, Shroff Publisher Publisher
Cathy O’Neil and Rachel Schutt. Doing Data Science, Straight Talk from The Frontline. O’Reilly Publisher Media.
Jure Leskovek, Anand Rajaraman and Jeffrey Ullman. Mining of Massive Datasets. v2.1, Cambridge
University Press.
Jake VanderPlas, Python Data Science Handbook, Shroff Publisher Publisher /O’Reilly Publisher Media 6. Philipp Janert, Data Analysis with Open Source Tools, Shroff Publisher Publisher /O’Reilly Publisher Media.
New Scheme Based On AICTE Flexible Curricula
Course Objective: To help students understand basic mathematical and statistical techniques commonly used in pattern recognition. To introduce students to a variety of pattern recognition algorithms.
Detailed Contents:
Module 1: Introduction and mathematical Preliminaries Principles of pattern recognition: Uses, mathematics, Classification and Bayesian rules, Clustering vs classification, Basics of linear algebra and vector spaces, Eigen values and eigen vectors, Rank of matrix and SVD
Module 2: Pattern Recognition basics Bayesian decision theory, Classifiers, Discriminant functions, Decision surfaces, Parameter estimation methods, Hidden Markov models, dimension reduction methods, Fisher discriminant analysis, Principal component analysis, non-parametric techniques for density estimation, nonmetric methods for pattern classification, unsupervised learning, algorithms for clustering: Kmeans, Hierarchical and other methods
Module 3: Feature Selection and extraction Problem statement and uses, Branch and bound algorithm, Sequential forward and backward selection, Cauchy Schwartz inequality, Feature selection criteria function: Probabilistic separability based and Interclass distance based, Feature Extraction: principles
Module 4: Visual Recognition Human visual recognition system, Recognition methods: Low-level modelling (e.g. features), Midlevel abstraction (e.g. segmentation), High-level reasoning (e.g. scene understanding); Detection/Segmentation methods; Context and scenes, Importance and saliency, Large-scale search and recognition, Egocentric vision, systems, Human-in-the-loop interactive systems, 3D scene understanding.
Module 5: Recent advancements in Pattern Recognition Comparison between performance of classifiers, Basics of statistics, covariance and their properties, Data condensation, feature clustering, Data visualization, Probability density estimation, Visualization and Aggregation, FCM and soft- computing techniques, Examples of real-life datasets.
Laboratory/ Practicals:
Data extraction
Pre-processing of images
Image segmentation
Image classification AICTE
Text Books/Suggested References:
Pattern Recognition and Machine Learning by Christopher M. Bishop, Springer, 2006.
Pattern Classification by Richard O. Duda , Peter E. Hart, David G. Stork, Wiley, 1973.
https://nptel.ac.in/courses/106/106/106106046/
Course Outcomes: After completion of course, students would be able to:
Understand basic mathematical and statistical techniques commonly used in pattern recognition.
Apply a variety of pattern recognition algorithms.
Understand and apply various pre-processing algorithms.
Apply various algorithms for image classification.
New Scheme Based On AICTE Flexible Curricula
Course Objective: The objective of this course is to provide students with the comprehensive and in depth knowledge of Cloud Computing concepts, technologies, architecture and applications.
UNIT I Introduction of Grid and Cloud computing, characteristics, components, business and IT perspective, cloud services requirements, cloud models, Security in public model, public verses private clouds, Cloud computing platforms: Amazon EC2,Platform as Service: Google App Engine, Microsoft Azure, Utility Computing, Elastic Computing.
UNIT II Cloud services- SAAS, PAAS, IAAS, cloud design and implementation using SOA, conceptual cloud model, cloud stack, computing on demand, Information life cycle management, cloud analytics, information security, virtual desktop infrastructure, storage cloud.
UNIT III Virtualization technology: Definition, benefits, sensor virtualization, HVM, study of hypervisor, logical partitioning- LPAR, Storage virtualization, SAN, NAS, cloud server virtualization, virtualized data center.
UNIT IV Cloud security fundamentals, Vulnerability assessment tool for cloud, Privacy and Security in cloud, Cloud computing security architecture: Architectural Considerations- General Issues, Trusted Cloud computing, Secure Execution Environments and Communications, Micro- architectures; Identity Management and Access control-Identity management, Access control, Autonomic Security, Cloud computing security challenges: Virtualization security management- virtual threats, VM Security Recommendations, VM-Specific Security techniques, Secure Execution Environments and Communications in cloud.
UNIT V SOA and cloud, SOA and IAAS, cloud infrastructure benchmarks, OLAP, business intelligence, e-Business, ISV, Cloud performance monitoring commands, issues in cloud computing. QOS issues in cloud, mobile cloud computing, Inter cloud issues, Sky computing, Cloud Computing Platform, Xen Cloud Platform, Eucalyptus, OpenNebula, Nimbus, TPlatform, Apache Virtual Computing Lab (VCL), Anomaly Elastic Computing Platform.
References:
Dr.Kumar Saurabh, “Cloud Computing”, Wiley India.
Ronald Krutz and Russell Dean Vines, “Cloud Security”, Wiley-India.
Judith Hurwitz, R.Bloor, M.Kanfman, F.Halper, “Computing for Dummies”, Wiley India Edition.
Anthony T.Velte Toby J.Velte, “Cloud Computing – A Practical Approach”, TMH.
Barrie Sosinsky, ‘Cloud Computing Bible”, Wiley India.
Course Outcomes: After the completion of this course, the students will be able to:
Explain the core concepts of the cloud computing paradigm
Demonstrate knowledge of virtualization
Explain the core issues of cloud computing such as security, privacy, and interoperability.
Choose the appropriate technologies, algorithms, and approaches for the related issues.
Identify problems, and explain, analyze, and evaluate various cloud computing solutions
New Scheme Based On AICTE Flexible Curricula
Introduction: Needs for Security; Basic security terminologies e.g. threats, vulnerability, exploit etc.; Security principles(CIA), authentication, nonrepudiation; security attacks and their classifications; Mathematical foundation - Prime Number; Modular Arithmetic; Fermat’s and Euler’s Theorem; The Euclidean Algorithms; The Chinese Remainder Theorem; Discrete logarithms.
Symmetric Key Cryptography: Classical cryptography – substitution, transposition and their cryptanalysis; Symmetric Cryptography Algorithm – DES, 3DES, AES etc.; Modes of operation: ECB, CBC etc.; Cryptanalysis of Symmetric Key Ciphers: Linear Cryptanalysis, Differential Cryptanalysis.
Asymmetric Key Cryptography: Key Distribution and Management, Diffie-Hellman Key Exchange algorithm; Asymmetric Key Cryptography Algorithm– RSA, ECC etc.; Various types of attacks on Cryptosystems.
Authentication & Integrity – MAC, Hash function, SHA, MD5, HMAC, Digital signature and authentication protocols; Authorization; Access control mechanism; X.509 Digital Certificate.
E-mail, IP and Web Security: E-mail security – PGP, MIME, S/MIME; IP security protocols; Web security – TLS, SSL etc.; Secure Electronic Transaction(SET); Firewall and its types; Introduction to IDPS; Risk Management; Security Planning.
New Scheme Based On AICTE Flexible Curricula
Need of AI in Robotics: History, state of the art, Need for AI in Robotics. Thinking and acting humanly, intelligent agents, structure of agents.
Game Playing: AI and game playing, plausible move generator, static evaluation move generator, game playing strategies, problems in game playing.
Robotics fundamentals: Robot Classification, Robot Specification, notation, kinematic representations and transformations, dynamics techniques; trajectory planning and control.
Robotics and Its applications: DDD concept, Intelligent robots, Robot anatomy-Definition, law of robotics, History and Terminology of Robotics-Accuracy and repeatability of Robotics-Simple problems-Specifications of Robot-Speed of Robot, Robot joints and links-Robot classifications- Architecture of robotic systems-Robot Drive systems-Hydraulic, Pneumatic and Electric system
New Scheme Based On AICTE Flexible Curricula
To understand computability, decidability, and complexity through problem solving.
To analyze and design abstract model of computation & formal languages
To understand and conduct mathematical proofs for computation and algorithms.
After completion of this course, the students would be able to:
CO1.explain the basic concepts of switching and finite automata theory & languages.
CO2.relate practical problems to languages, automata, computability and complexity.
CO3.construct abstract models of computing and check their power to recognize the languages.
CO4.analyse the grammar, its types, simplification and normal form.
CO5.interpret rigorously formal mathematical methods to prove properties of languages, grammars and automata.
CO6.develop an overview of how automata theory, languages and computation are applicable in engineering application.
Introduction of Automata Theory: Examples of automata machines, Finite Automata as a language acceptor and translator, Moore machines and mealy machines, composite machine, Conversion from Mealy to Moore and vice versa.
Types of Finite Automata: Non Deterministic Finite Automata (NDFA), Deterministic finite automata machines, conversion of NDFA to DFA, minimization of automata machines, regular expression, Arden’s theorem. Meaning of union, intersection, concatenation and closure, 2 way DFA.
Grammars: Types of grammar, context sensitive grammar, and context free grammar, regular grammar. Derivation trees, ambiguity in grammar, simplification of context free grammar, conversion of grammar to automata machine and vice versa, Chomsky hierarchy of grammar, killing null and unit productions. Chomsky normal form and Greibach normal form.
Push down Automata: example of PDA, deterministic and non-deterministic PDA, conversion of PDA into context free grammar and vice versa, CFG equivalent to PDA, Petrinet model.
Turing Machine: Techniques for construction. Universal Turing machine Multitape, multihead and multidimensional Turing machine, N-P complete problems. Decidability and Recursively Enumerable Languages, decidability, decidable languages, undecidable languages, Halting problem of Turing machine & the post correspondence problem.
Introduction to Automata Theory Language & Computation, Hopcroft& Ullman, Narosa Publication.
Element of the Theory Computation, Lewis &Christors, Pearson.
Theory of Computation, Chandrasekhar & Mishra, PHI.
Theory of Computation, Wood, Harper & Row.
Introduction to Computing Theory, Daniel I-A Cohen, Wiley.
Design a Program for creating machine that accepts three consecutive one.
Design a Program for creating machine that accepts the string always ending with 101.
Design a Program for Mode 3 Machine
Design a program for accepting decimal number divisible by 2.
Design a program for creating a machine which accepts string having equal no. of 1’s and 0’s.
Design a program for creating a machine which count number of 1’s and 0’s in a given string.
Design a Program to find 2’s complement of a given binary number.
Design a Program which will increment the given binary number by 1.
Design a Program to convert NDFA to DFA.
Design a Program to create PDA machine that accept the well-formed parenthesis.
Design a PDA to accept WCWR where w is any string and WR is reverse of that string and C is a Special symbol.
Design a Turing machine that’s accepts the following language anbncn where n>0
After completion of this course, the students would be able to:
CO1: judge various computational models.
CO2: construct abstract models of computing.
CO3: justify the power of abstract models in computing to recognize the languages.
CO4: demonstrate analytical thinking and intuition for problem solving in the related areas.
CO5: discuss the limitations of computation in problem solving.
CO6: follow set of rules for syntax verification.
New Scheme Based On AICTE Flexible Curricula
Course Outcomes:After completion of the course students will be able to
Characterize and appreciate computer networks from the view point of components and from the view point of services
Display good understanding of the flow of a protocol in general and a network protocol in particular
Model a problem or situation in terms of layering concept and map it to the TCI/IP stack
Select the most suitable Application Layer protocol (such as HTTP, FTP, SMTP, DNS, Bit torrent) as per the requirements of the network application and work with available tools to demonstrate the working of these protocols.
Design a Reliable Data Transfer Protocol and incrementally develop solutions for the requirements of Transport Layer
Describe the essential principles of Network Layers and use IP addressing to create subnets for any specific requirements
Unit –I Computer Network: Definitions, goals, components, Architecture, Classifications & Types. Layered Architecture: Protocol hierarchy, Design Issues, Interfaces and Services, Connection Oriented & Connectionless Services, Service primitives, Design issues & its functionality. ISOOSI Reference Model: Principle, Model, Descriptions of various layers and its comparison with TCP/IP. Principals of physical layer: Media, Bandwidth, Data rate and Modulations
Unit-II Data Link Layer: Need, Services Provided, Framing, Flow Control, Error control. Data Link Layer Protocol: Elementary & Sliding Window protocol: 1-bit, Go-Back-N, Selective Repeat, Hybrid ARQ. Protocol verification: Finite State Machine Models & Petri net models. ARP/RARP/GARP
Unit-III MAC Sub layer: MAC Addressing, Binary Exponential Back-off (BEB) Algorithm, Distributed Random Access Schemes/Contention Schemes: for Data Services (ALOHA and SlottedALOHA), for Local-Area Networks (CSMA, CSMA/CD, CSMA/CA), Collision Free Protocols: Basic Bit Map, BRAP, Binary Count Down, MLMA Limited Contention Protocols: Adaptive Tree Walk, Performance Measuring Metrics. IEEE Standards 802 series & their variant.
Unit-IV Network Layer: Need, Services Provided , Design issues, Routing algorithms: Least Cost Routing algorithm, Dijkstra's algorithm, Bellman-ford algorithm, Hierarchical Routing, Broadcast Routing, Multicast Routing. IP Addresses, Header format, Packet forwarding, Fragmentation and reassembly, ICMP, Comparative study of IPv4 & IPv6
Unit-V Transport Layer: Design Issues, UDP: Header Format, Per-Segment Checksum, Carrying Unicast/Multicast Real-Time Traffic, TCP: Connection Management, Reliability of Data Transfers, TCP Flow Control, TCP Congestion Control, TCP Header Format, TCP Timer Management. Application Layer: WWW and HTTP, FTP, SSH, Email (SMTP, MIME, IMAP), DNS, Network Management (SNMP).
References:
Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education.
2 Douglas E Comer, “Internetworking WithTcp/Ip Principles, Protocols, And Architecture - Volume I” 6 th Edition,Pearson Education
3.DimitriBertsekas, Robert Gallager, “Data Networks”, PHI Publication, Second Edition. 4.KavehPahlavan, Prashant Krishnamurthy, “Networking Fundamentals”, Wiley Publication.
5.Uyless Black, “Computer Networks”, PHI Publication, Second Edition.
6.Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source Approach”, McGraw Hill.
List of Experiments:
Study of Different Type of LAN& Network Equipments.
Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc.
LAN installations and Configurations.
Write a program to implement various types of error correcting techniques.
Write a program to implement various types of farming methods.
Study of Tool Command Language (TCL).
Study and Installation of Standard Network Simulator: N.S-2, N.S3.OpNet,QualNetetc .
Study & Installation of ONE (Opportunistic Network Environment) Simulator for High Mobility Networks .
Configure 802.11 WLAN.
Implement &Simulate various types of routing algorithm.
Study & Simulation of MAC Protocols like Aloha, CSMA, CSMA/CD and CSMA/CA using Standard Network Simulators.
Study of Application layer protocols-DNS, HTTP, HTTPS, FTP and TelNet.
New Scheme Based On AICTE Flexible Curricula
Course Objective:
The students will be able to work with images and videos in several ways. These methods can be used as pre-processing steps for complex models.
Detailed Contents:
Module 1: Image representation and analysis, Introduction to computer Vision, Numerical representation of images, Image augmentation, enhancement, processing, color transforms, geometric transforms, feature recognition and
extraction
Module 2: Image Segmentation Object detection, breaking image into parts, finding contours and edges of various objects in image, Background subtraction for video.
Module 3: Object Motion and tracking Tracking a single point over time, motion models to define object movement over time, analyze
videos as sequences of individual image frames, methods to track a set of features over time,
matching features from image frame to other, tracking a moving car using optical flow Module 4: Robotic localization
Bayesian statistics to locate a robot in space, sensor measurements to safely navigate an environment, Gaussian uncertainty, histogram filter for robot localization in python.
Module 5: Image Restoration
Degradation model, noise models, estimation of degradation function by modeling, restoration
using Weiner filters and Inverse filters
Laboratory/ Practicals (if any): Mention list of Practicals
Various forms of image representation
Apply various image segmentation algorithms
Apply object motion and tracking
Apply object localization
Apply image restoration
Text Books/Suggested References:
Audio Video Systems, Bali & Bali, Khanna Book Publishing 2020.
Handbook of Image and Video Processing by Alan C. Bovik, Academic Press, 2000.
Python 3 Image Processing, Ashwin Pajankar, BPB Publication, 2019.
Course Outcomes: After completion of course, students would be able to:
Understand images and videos representation in a detailed manner.
Apply ML techniques for image processing in different scenarios.
Apply various object detection and image segmentation algorithms
Apply various image restoration techniques and algorithm
New Scheme Based On AICTE Flexible Curricula
Unit 1 : Data Definitions and Analysis Techniques: Elements, Variables, and Data categorization Levels of Measurement Data management and indexing Introduction to Statistical Concepts: Sampling Distributions, Resampling, Statistical Inference and Descriptive Statistics, Measures of central tendency, Measures of location of dispersions
Unit 2: Advance Data analysis techniques: Statistical hypothesis generation and testing, Chi-Square test, t-Test, Analysis of variance, Correlation analysis, Maximum likelihood test, Regression Modelling, Multivariate Analysis, Bayesian Modelling, Inference and Bayesian Network, Regression analysis
Unit 3: Data Wrangling: Intro to Data Wrangling, Gathering Data, Assessing Data, Cleaning Data.
Unit 5: Data Visualization tools: Python visualization libraries (matplotlib, pandas, seaborn, ggplot, plotly), Introduction to PowerBI tools, Examples of inspiring (industry) projects- Exercise: create your own visualization of a complex dataset.
Text Books/References:
Joel Grus, Data Science from Scratch, Shroff Publisher Publisher /O’Reilly Publisher Media
Annalyn Ng, Kenneth Soo, Numsense! Data Science for the Layman, Shroff Publisher Publisher
Cathy O’Neil and Rachel Schutt. Doing Data Science, Straight Talk from The Frontline. O’Reilly Publisher Media.
Jure Leskovek, Anand Rajaraman and Jeffrey Ullman. Mining of Massive Datasets. v2.1, Cambridge
University Press.
Jake VanderPlas, Python Data Science Handbook, Shroff Publisher Publisher /O’Reilly Publisher Media 6. Philipp Janert, Data Analysis with Open Source Tools, Shroff Publisher Publisher /O’Reilly Publisher Media.
New Scheme Based On AICTE Flexible Curricula
Course Objective: To help students understand basic mathematical and statistical techniques commonly used in pattern recognition. To introduce students to a variety of pattern recognition algorithms.
Detailed Contents:
Module 1: Introduction and mathematical Preliminaries Principles of pattern recognition: Uses, mathematics, Classification and Bayesian rules, Clustering vs classification, Basics of linear algebra and vector spaces, Eigen values and eigen vectors, Rank of matrix and SVD
Module 2: Pattern Recognition basics Bayesian decision theory, Classifiers, Discriminant functions, Decision surfaces, Parameter estimation methods, Hidden Markov models, dimension reduction methods, Fisher discriminant analysis, Principal component analysis, non-parametric techniques for density estimation, nonmetric methods for pattern classification, unsupervised learning, algorithms for clustering: Kmeans, Hierarchical and other methods
Module 3: Feature Selection and extraction Problem statement and uses, Branch and bound algorithm, Sequential forward and backward selection, Cauchy Schwartz inequality, Feature selection criteria function: Probabilistic separability based and Interclass distance based, Feature Extraction: principles
Module 4: Visual Recognition Human visual recognition system, Recognition methods: Low-level modelling (e.g. features), Midlevel abstraction (e.g. segmentation), High-level reasoning (e.g. scene understanding); Detection/Segmentation methods; Context and scenes, Importance and saliency, Large-scale search and recognition, Egocentric vision, systems, Human-in-the-loop interactive systems, 3D scene understanding.
Module 5: Recent advancements in Pattern Recognition Comparison between performance of classifiers, Basics of statistics, covariance and their properties, Data condensation, feature clustering, Data visualization, Probability density estimation, Visualization and Aggregation, FCM and soft- computing techniques, Examples of real-life datasets.
Laboratory/ Practicals:
Data extraction
Pre-processing of images
Image segmentation
Image classification AICTE
Text Books/Suggested References:
Pattern Recognition and Machine Learning by Christopher M. Bishop, Springer, 2006.
Pattern Classification by Richard O. Duda , Peter E. Hart, David G. Stork, Wiley, 1973.
https://nptel.ac.in/courses/106/106/106106046/
Course Outcomes: After completion of course, students would be able to:
Understand basic mathematical and statistical techniques commonly used in pattern recognition.
Apply a variety of pattern recognition algorithms.
Understand and apply various pre-processing algorithms.
Apply various algorithms for image classification.
New Scheme Based On AICTE Flexible Curricula
Course Objective: The objective of this course is to provide students with the comprehensive and in depth knowledge of Cloud Computing concepts, technologies, architecture and applications.
UNIT I Introduction of Grid and Cloud computing, characteristics, components, business and IT perspective, cloud services requirements, cloud models, Security in public model, public verses private clouds, Cloud computing platforms: Amazon EC2,Platform as Service: Google App Engine, Microsoft Azure, Utility Computing, Elastic Computing.
UNIT II Cloud services- SAAS, PAAS, IAAS, cloud design and implementation using SOA, conceptual cloud model, cloud stack, computing on demand, Information life cycle management, cloud analytics, information security, virtual desktop infrastructure, storage cloud.
UNIT III Virtualization technology: Definition, benefits, sensor virtualization, HVM, study of hypervisor, logical partitioning- LPAR, Storage virtualization, SAN, NAS, cloud server virtualization, virtualized data center.
UNIT IV Cloud security fundamentals, Vulnerability assessment tool for cloud, Privacy and Security in cloud, Cloud computing security architecture: Architectural Considerations- General Issues, Trusted Cloud computing, Secure Execution Environments and Communications, Micro- architectures; Identity Management and Access control-Identity management, Access control, Autonomic Security, Cloud computing security challenges: Virtualization security management- virtual threats, VM Security Recommendations, VM-Specific Security techniques, Secure Execution Environments and Communications in cloud.
UNIT V SOA and cloud, SOA and IAAS, cloud infrastructure benchmarks, OLAP, business intelligence, e-Business, ISV, Cloud performance monitoring commands, issues in cloud computing. QOS issues in cloud, mobile cloud computing, Inter cloud issues, Sky computing, Cloud Computing Platform, Xen Cloud Platform, Eucalyptus, OpenNebula, Nimbus, TPlatform, Apache Virtual Computing Lab (VCL), Anomaly Elastic Computing Platform.
References:
Dr.Kumar Saurabh, “Cloud Computing”, Wiley India.
Ronald Krutz and Russell Dean Vines, “Cloud Security”, Wiley-India.
Judith Hurwitz, R.Bloor, M.Kanfman, F.Halper, “Computing for Dummies”, Wiley India Edition.
Anthony T.Velte Toby J.Velte, “Cloud Computing – A Practical Approach”, TMH.
Barrie Sosinsky, ‘Cloud Computing Bible”, Wiley India.
Course Outcomes: After the completion of this course, the students will be able to:
Explain the core concepts of the cloud computing paradigm
Demonstrate knowledge of virtualization
Explain the core issues of cloud computing such as security, privacy, and interoperability.
Choose the appropriate technologies, algorithms, and approaches for the related issues.
Identify problems, and explain, analyze, and evaluate various cloud computing solutions
New Scheme Based On AICTE Flexible Curricula
Introduction: Needs for Security; Basic security terminologies e.g. threats, vulnerability, exploit etc.; Security principles(CIA), authentication, nonrepudiation; security attacks and their classifications; Mathematical foundation - Prime Number; Modular Arithmetic; Fermat’s and Euler’s Theorem; The Euclidean Algorithms; The Chinese Remainder Theorem; Discrete logarithms.
Symmetric Key Cryptography: Classical cryptography – substitution, transposition and their cryptanalysis; Symmetric Cryptography Algorithm – DES, 3DES, AES etc.; Modes of operation: ECB, CBC etc.; Cryptanalysis of Symmetric Key Ciphers: Linear Cryptanalysis, Differential Cryptanalysis.
Asymmetric Key Cryptography: Key Distribution and Management, Diffie-Hellman Key Exchange algorithm; Asymmetric Key Cryptography Algorithm– RSA, ECC etc.; Various types of attacks on Cryptosystems.
Authentication & Integrity – MAC, Hash function, SHA, MD5, HMAC, Digital signature and authentication protocols; Authorization; Access control mechanism; X.509 Digital Certificate.
E-mail, IP and Web Security: E-mail security – PGP, MIME, S/MIME; IP security protocols; Web security – TLS, SSL etc.; Secure Electronic Transaction(SET); Firewall and its types; Introduction to IDPS; Risk Management; Security Planning.
New Scheme Based On AICTE Flexible Curricula
Need of AI in Robotics: History, state of the art, Need for AI in Robotics. Thinking and acting humanly, intelligent agents, structure of agents.
Game Playing: AI and game playing, plausible move generator, static evaluation move generator, game playing strategies, problems in game playing.
Robotics fundamentals: Robot Classification, Robot Specification, notation, kinematic representations and transformations, dynamics techniques; trajectory planning and control.
Robotics and Its applications: DDD concept, Intelligent robots, Robot anatomy-Definition, law of robotics, History and Terminology of Robotics-Accuracy and repeatability of Robotics-Simple problems-Specifications of Robot-Speed of Robot, Robot joints and links-Robot classifications- Architecture of robotic systems-Robot Drive systems-Hydraulic, Pneumatic and Electric system