HEAD
New Scheme Based On AICTE Flexible Curricula CSE-Data Science/Data Science, VI semester
CD 601- Deep Learning
Describe in-depth about theories, fundamentals, and techniques in Deep learning.
Identify the on-going research in computer vision and multimedia field.
Evaluate various deep networks using performance parameters.
Design and validate deep neural network as per requirements.
Ian Goodfellow, YoshuaBengio and Aaron Courville; Deep Learning, MIT Press.
Charu C. Aggarwal "Neural Networks and Deep Learning: A Textbook", Springer.
Francois Chollet, "Deep Learning with Python", Manning Publications.
Aurelien Geon, “Hands-On Machine Learning with Scikit-Learn and Tensorflow:Concepts, Tools, and Techniques to Build Intelligent Systems”, O'Reilly.
Andreas Muller, "Introduction to Machine Learning with Python: A Guide for DataScientists", O'Reilly.
Adam Gibson, Josh Patterson, "Deep Learning: A Practitioner's Approach", O'Reilly
Image Classification with CNN
Face Detection system with OpenCV library
Digit Recognition System with CNN
Music Genre Classification system (FMA: Free Music ArchiveDataset)
Image Compression and De-compression using Encoders and Decoders
Predicting Airline Passengers count based on LSTM and RNN
Diabetes detection in patients with functional and sequential implementation of Keras
Detecting customer churn on banking dataset with Deep Neural Network
Multiclass wine classification using Neural Networks
Breast Cancer Detection using Neural Network Architecture
CD 602- Computer Networks
Characterize and appreciate computer networks from the viewpoint of components andfrom the viewpoint of services
Display good understanding of the flow of a protocol in general and a network protocolin particular
Model a problem or situation in terms of layering concept and map it to the TCI/IP stack
Select the most suitable Application Layer protocol (such as HTTP, FTP, SMTP, DNS,Bit torrent) as per the requirements of the network application and work with availabletools to demonstrate the working of these protocols.
Design a Reliable Data Transfer Protocol and incrementally develop solutions for therequirements of Transport Layer
Describe the essential principles of Network Layers and use IP addressing to createsubnets for any specific requirements
Computer Network: Definitions, goals, components, Architecture, Classifications & Types.Layered Architecture: Protocol hierarchy, Design Issues, Interfaces and Services, ConnectionOriented & Connectionless Services, Service primitives, Design issues & its functionality. ISOOSI Reference Model: Principle, Model, Descriptions of various layers and its comparison withTCP/IP. Principals of physical layer: Media, Bandwidth, Data rate and Modulations
Data Link Layer: Need, Services Provided, Framing, Flow Control, Error control. Data LinkLayer Protocol: Elementary &Sliding Window protocol: 1-bit, Go-Back-N, Selective Repeat,Hybrid ARQ. Protocol verification: Finite State Machine Models & Petri net models.ARP/RARP/GARP
MAC Sub layer: MAC Addressing, Binary Exponential Back-off (BEB) Algorithm, DistributedRandom Access Schemes/Contention Schemes: for Data Services (ALOHA and SlottedALOHA), for Local-Area Networks (CSMA, CSMA/CD, CSMA/CA), Collision Free Protocols:Basic Bit Map, BRAP, Binary Count Down, MLMA Limited Contention Protocols: AdaptiveTree Walk, Performance Measuring Metrics. IEEE Standards 802 series & their variant.
Network Layer: Need, Services Provided, Design issues, Routing algorithms: Least CostRouting algorithm, Dijkstra's algorithm, Bellman-ford algorithm, Hierarchical Routing,Broadcast Routing, Multicast Routing. IP Addresses, Header format, Packet forwarding,Fragmentation, and reassembly, ICMP, Comparative study of IPv4 & IPv6
Transport Layer: Design Issues, UDP: Header Format, Per-Segment Checksum, CarryingUnicast/Multicast Real-Time Traffic, TCP: Connection Management, Reliability of DataTransfers, TCP Flow Control, TCP Congestion Control, TCP Header Format, TCP TimerManagement.Application Layer: WWW and HTTP, FTP, SSH, Email (SMTP, MIME, IMAP),DNS, Network Management (SNMP).
Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education.
Douglas E Comer, “Internetworking WithTcp/Ip Principles, Protocols, And Architecture - Volume I”6th Edition,Pearson Education
DimitriBertsekas, Robert Gallager, “Data Networks”, PHI Publication, Second Edition.
KavehPahlavan, Prashant Krishnamurthy, “Networking Fundamentals”, WileyPublication.
Uyless Black, “Computer Networks”, PHI Publication, Second Edition.
Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open SourceApproach”, McGraw Hill.
Study of Different Type of LAN& Network Equipments.
Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc.
LAN installations and Configurations.
Write a program to implement various types of error correcting techniques.
Write a program to Implement various types of framing methods.
Study of Tool Command Language (TCL).
Study and Installation of Standard Network Simulator: N.S-2, N.S3.OpNet,QualNetetc .
Study & Installation of ONE (Opportunistic Network Environment) Simulator for HighMobility Networks .
Configure 802.11 WLAN.
Implement &Simulate various types of routing algorithm.
Study & Simulation of MAC Protocols like Aloha, CSMA, CSMA/CD and CSMA/CA usingStandard Network Simulators.
Study of Application layer protocols-DNS, HTTP, HTTPS, FTP and TelNet.
Students should be able to understand the concept and challenges of Big data.
Students should be able to demonstrate knowledge of big data analytics.
Students should be able to develop Big Data Solutions using Hadoop Eco System
Students should be able to gain hands-on experience on large-scale analytics tools.
Students should be able to analyse the social network graphs.
RadhaShankarmani, M. Vijaylakshmi, " Big Data Analytics", Wiley, Secondedition
Seema Acharya, SubhashiniChellappan, " Big Data and Analytics", Wiley, Firstedition
1.KaiHwang,Geoffrey C., Fox. Jack, J. Dongarra, “Distributed and Cloud Computing”, Elsevier, Firstedition
Michael Minelli, Michele Chambers, AmbigaDhiraj, “Big Data Big Analytics”,Wileyfor old question papers visit http://www.rgpvonline.com
Digital Data, Data Acquisition, Methods of Digital Data Systems, Control of Digital Data System, Cyber Crime Investigations, Analysis of Cyber Crime, Cyber Ethics and Landscapes.
Cybercheck Analyse True Back Image, Encase Image, Raw Disk Dumps, Virtual disk images and RAM, Dumps, Investigations on Report Analysis, cyber Laws in Secure Analysis, Extract unallocated and disk slack areas, Data carving of slack areas, Hash Files, File Signature.
File Systems CyberCheck FAT12/16/32, exFAT, NTFS, Linux EXT2/3/4 FS, UFS, CDFS, Sun Solaris, Reiser FS, Unix(Free BSD) and MAC, Dynamic Disks and Linux RAID Disks. Analysis - Introduction, File system category, Content category, Metadata category, File name category, The big picture, File recovery, determining the type, Consistency check, FAT data structure directory entries.
Cybercheck Recover Data, Deleted files/folders Recovery, Deleted Partitions, Data Formatted Partition Data, Add Data, Report Data Findings.
Introduction to Digital Communication, Input/ Output Interfacing, Digital Inputs, Data Isolation, Data Sheets, Smart Networks, Network Communication System Architecture, Wireless Networks, Network Protocols, Data Transmission.
Parasram, S. V. N. (2020), “Digital Forensics with Kali Linux” - Second Edition: Perform Data Acquisition, Data Recovery, Network Forensics, and Malware Analysis with Kali Linux. United Kingdom: Packt Publishing, Limited.
Carrier, B. (2005). “File System Forensic Analysis”, United Kingdom: Pearson Education.
1.Kruse, W. G., Heiser, J. G. (2001). Computer Forensics: Incident Response Essentials. (n.p.): Pearson Education.
Parasram, S. V. N., Joseph, D., Samm, A. (2017). Digital Forensics with Kali Linux: Perform Data Acquisition, Digital Investigation, and Threat Analysis Using Kali Linux Tools. United Kingdom: Packt Publishing.
New Scheme Based On AICTE Flexible Curricula CSE-Data Science/Data Science, VI semester
Objected Oriented and Object Relational Databases Modeling Complex Data Semantics, Specialization, Generalization, Aggregation and Association, Objects, Object Identity and its implementation, Clustering, Equality and Object Reference, Architecture of Object Oriented and Object Relational databases, Persistent Programming Languages, Cache Coherence. Case Studies: Gemstone, O2, Object Store, SQL3, Oracle xxi, DB2.
Deductive Databases Data log and Recursion, Evaluation of Data log program, Recursive queries with negation. Parallel and Distributed Databases Parallel architectures, shared nothing/shared disk/shared memory based architectures, Data partitioning, Intra-operator parallelism, pipelining. Distributed Data Storage – Fragmentation & Replication, Location and Fragment Transparency Distributed Query Processing and Optimization, Distributed Transaction Modeling and concurrency Control, Distributed Deadlock, Commit Protocols, Design of Parallel Databases, and Parallel Query Evaluation.
Advanced Transaction Processing Advanced transaction models: Savepoints, Nested and Multilevel Transactions, Compensating Transactions and Saga, Long Duration Transactions, Weak Levels of Consistency, Transaction Work Flows, Transaction Processing Monitors, Shared disk systems.
Active Database and Real Time Databases Triggers in SQL, Event Constraint and Action: ECA Rules, Query Processing and Concurrency control, Recursive query processing, Compensation and Databases Recovery, multi-level recovery.
Image and Multimedia Databases Modeling and Storage of Image and Multimedia Data, Data Structures – R-tree, k-d tree, Quad trees, Content Based Retrieval: Color Histograms, Textures, etc., Image Features, Spatial and Topological Relationships, Multimedia Data Formats, Video Data Model, Audio & Handwritten Data, Geographic Information Systems (GIS).
Accessing Databases through WEB, WEB Servers, XML Databases, Commercial Systems – Oracle xxi, DB2.
Elmarsi, “Fundamentals of Database Systems”, 4 th Edition, Pearson Education
R. Ramakrishnan, “Database Management Systems”, 1998, McGraw Hill International Editions
Elmagarmid.A.K. “Database transaction models for advanced applications”, Morgan Kaufman.
Transaction Processing, Concepts and Techniques, J. Gray and A. Reuter, Morgan Kauffman..
S. Abiteboul, R. hull and V. Vianu, “Foundations of Databases”, 1995, Addison – Wesley Publishing Co., Reading Massachusetts.
W. Kim, “Modern Database Systems”, 1995, ACM Press, Addison – Wesley.
D. Maier, “The Theory of Relational Databases”, 1993, Computer Science Press, Rockville, Maryland
New Scheme Based On AICTE Flexible Curricula CSE-Data Science/Data Science, VI semester
Introduction - History of IR- Components of IR - Issues -Open source Search engine Frameworks - The Impact of the web on IR - The role of artificial intelligence (AI) in IR – IR Versus Web Search - Components of a search engine, Characterizing the web.
Boolean and Vector space retrieval models- Term weighting - TF-IDF weighting- cosine similarity - Preprocessing - Inverted indices - efficient processing with sparse vectors Language Model based IR - Probabilistic IR -Latent Semantic indexing - Relevance feedback and query expansion.
Web search overview, web structure the user paid placement search engine optimization, Web Search Architectures - crawling - meta-crawlers, Focused Crawling - web indexes - Nearduplicate detection - Index Compression - XML retrieval.
Link Analysis -hubs and authorities - Page Rank and HITS algorithms -Searching and Ranking - Relevance Scoring and ranking for Web - Similarity - Hadoop & Map Reduce - Evaluation - Personalized search - Collaborative filtering and content-based recommendation of documents And products - handling invisible Web - Snippet generation, Summarization. Question Answering, Cross- Lingual Retrieval.
Information filtering: organization and relevance feedback - Text Mining- Text classification and clustering - Categorization algorithms, naive Bayes, decision trees and nearest neighbor - Clustering algorithms: agglomerative clustering, k-means, expectation maximization (EM).
C. Manning, P. Raghvan and H Schutze: Introduction to Information Retrieval, Cambridge University Press, 2008.
Ricardo Baeza -Yates and Berthier Ribeiro –Neto, Modern Information Retrieval. The Concepts and Technology behind Search 2nd Edition, ACM Press Books 2011.
Bruce Croft, Donald Metzler and Trevor Strohman Search Engines Information Retrieval in Practice 1st Edition Addison Wesley, 2009
4.Mark Levene, An Introduction to Search Engines and Web Navigation, 2nd Edition Wiley 2010.
New Scheme Based On AICTE Flexible Curricula CSE-Data Science/Data Science, VI semester
After completing the course student should be able to:
Describe the fundamental principles and practices associated with each of the agile development methods.
Compare agile software development model with traditional development models and identify the benefits and pitfalls.
Use techniques and skills to establish and mentor Agile Teams for effective software development.
Apply core values and principles of Agile Methods in software development.
programming: Issues and Challenges.
Robert C. Martin, Agile Software Development- Principles, Patterns and Practices, Prentice Hall, 2013.
Kenneth S. Rubin, Essential Scrum: A Practical Guide to the Most Popular Agile Process, Addison Wesley, 2012.
James Shore and Shane Warden, The Art of Agile Development, O’Reilly Media, 2007.
Craig Larman, ―Agile and Iterative Development: A manager’s Guide, Addison- Wesley, 2004.
Ken Schawber, Mike Beedle, Agile Software Development with Scrum, Pearson, 2001.
Cohn, Mike, Agile Estimating and Planning, Pearson Education, 2006.
Cohn, Mike, User Stories Applied: For Agile Software Development Addison Wisley, 2004.
IEEE Transactions on Software Engineering
IEEE Transactions on Dependable and Secure Computing
IET Software
ACM Transactions on Software Engineering and Methodology (TOSEM)
ACM SIGSOFT Software Engineering Notes
New Scheme Based On AICTE Flexible Curricula CSE-Data Science/Data Science, VI semester
processing methods and strategies and to evaluate the strengths and weaknesses of various Natural
Language Processing (NLP) methods & technologies and gain an insight into the application areas
of Natural language processing.
Daniel Jurafsky, James H. Martin―Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics and Speech, Pearson Publication.
Steven Bird, Ewan Klein and Edward Loper, ―Natural Language Processing with
Python, OReilly Media.
Manning and Schutze "Foundations of Statistical Natural Language Processing", MIT Press.
Breck Baldwin, Language Processing with Java and LingPipe Cookbook, Atlantic Publisher.
Richard M Reese, Natural Language Processing with Java, OReilly Media.
Nitin Indurkhya and Fred J. Damerau, Handbook of Natural Language Processing, Chapman and Hall/CRC Press.
Tanveer Siddiqui, U.S. Tiwary, Natural Language Processing and Information Retrieval, Oxford University Press.
New Scheme Based On AICTE Flexible Curricula CSE-Data Science/Data Science, VI semester
CD 601- Deep Learning
Describe in-depth about theories, fundamentals, and techniques in Deep learning.
Identify the on-going research in computer vision and multimedia field.
Evaluate various deep networks using performance parameters.
Design and validate deep neural network as per requirements.
Ian Goodfellow, YoshuaBengio and Aaron Courville; Deep Learning, MIT Press.
Charu C. Aggarwal "Neural Networks and Deep Learning: A Textbook", Springer.
Francois Chollet, "Deep Learning with Python", Manning Publications.
Aurelien Geon, “Hands-On Machine Learning with Scikit-Learn and Tensorflow:Concepts, Tools, and Techniques to Build Intelligent Systems”, O'Reilly.
Andreas Muller, "Introduction to Machine Learning with Python: A Guide for DataScientists", O'Reilly.
Adam Gibson, Josh Patterson, "Deep Learning: A Practitioner's Approach", O'Reilly
Image Classification with CNN
Face Detection system with OpenCV library
Digit Recognition System with CNN
Music Genre Classification system (FMA: Free Music ArchiveDataset)
Image Compression and De-compression using Encoders and Decoders
Predicting Airline Passengers count based on LSTM and RNN
Diabetes detection in patients with functional and sequential implementation of Keras
Detecting customer churn on banking dataset with Deep Neural Network
Multiclass wine classification using Neural Networks
Breast Cancer Detection using Neural Network Architecture
CD 602- Computer Networks
Characterize and appreciate computer networks from the viewpoint of components andfrom the viewpoint of services
Display good understanding of the flow of a protocol in general and a network protocolin particular
Model a problem or situation in terms of layering concept and map it to the TCI/IP stack
Select the most suitable Application Layer protocol (such as HTTP, FTP, SMTP, DNS,Bit torrent) as per the requirements of the network application and work with availabletools to demonstrate the working of these protocols.
Design a Reliable Data Transfer Protocol and incrementally develop solutions for therequirements of Transport Layer
Describe the essential principles of Network Layers and use IP addressing to createsubnets for any specific requirements
Computer Network: Definitions, goals, components, Architecture, Classifications & Types.Layered Architecture: Protocol hierarchy, Design Issues, Interfaces and Services, ConnectionOriented & Connectionless Services, Service primitives, Design issues & its functionality. ISOOSI Reference Model: Principle, Model, Descriptions of various layers and its comparison withTCP/IP. Principals of physical layer: Media, Bandwidth, Data rate and Modulations
Data Link Layer: Need, Services Provided, Framing, Flow Control, Error control. Data LinkLayer Protocol: Elementary &Sliding Window protocol: 1-bit, Go-Back-N, Selective Repeat,Hybrid ARQ. Protocol verification: Finite State Machine Models & Petri net models.ARP/RARP/GARP
MAC Sub layer: MAC Addressing, Binary Exponential Back-off (BEB) Algorithm, DistributedRandom Access Schemes/Contention Schemes: for Data Services (ALOHA and SlottedALOHA), for Local-Area Networks (CSMA, CSMA/CD, CSMA/CA), Collision Free Protocols:Basic Bit Map, BRAP, Binary Count Down, MLMA Limited Contention Protocols: AdaptiveTree Walk, Performance Measuring Metrics. IEEE Standards 802 series & their variant.
Network Layer: Need, Services Provided, Design issues, Routing algorithms: Least CostRouting algorithm, Dijkstra's algorithm, Bellman-ford algorithm, Hierarchical Routing,Broadcast Routing, Multicast Routing. IP Addresses, Header format, Packet forwarding,Fragmentation, and reassembly, ICMP, Comparative study of IPv4 & IPv6
Transport Layer: Design Issues, UDP: Header Format, Per-Segment Checksum, CarryingUnicast/Multicast Real-Time Traffic, TCP: Connection Management, Reliability of DataTransfers, TCP Flow Control, TCP Congestion Control, TCP Header Format, TCP TimerManagement.Application Layer: WWW and HTTP, FTP, SSH, Email (SMTP, MIME, IMAP),DNS, Network Management (SNMP).
Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education.
Douglas E Comer, “Internetworking WithTcp/Ip Principles, Protocols, And Architecture - Volume I”6th Edition,Pearson Education
DimitriBertsekas, Robert Gallager, “Data Networks”, PHI Publication, Second Edition.
KavehPahlavan, Prashant Krishnamurthy, “Networking Fundamentals”, WileyPublication.
Uyless Black, “Computer Networks”, PHI Publication, Second Edition.
Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open SourceApproach”, McGraw Hill.
Study of Different Type of LAN& Network Equipments.
Study and Verification of standard Network topologies i.e. Star, Bus, Ring etc.
LAN installations and Configurations.
Write a program to implement various types of error correcting techniques.
Write a program to Implement various types of framing methods.
Study of Tool Command Language (TCL).
Study and Installation of Standard Network Simulator: N.S-2, N.S3.OpNet,QualNetetc .
Study & Installation of ONE (Opportunistic Network Environment) Simulator for HighMobility Networks .
Configure 802.11 WLAN.
Implement &Simulate various types of routing algorithm.
Study & Simulation of MAC Protocols like Aloha, CSMA, CSMA/CD and CSMA/CA usingStandard Network Simulators.
Study of Application layer protocols-DNS, HTTP, HTTPS, FTP and TelNet.
Students should be able to understand the concept and challenges of Big data.
Students should be able to demonstrate knowledge of big data analytics.
Students should be able to develop Big Data Solutions using Hadoop Eco System
Students should be able to gain hands-on experience on large-scale analytics tools.
Students should be able to analyse the social network graphs.
RadhaShankarmani, M. Vijaylakshmi, " Big Data Analytics", Wiley, Secondedition
Seema Acharya, SubhashiniChellappan, " Big Data and Analytics", Wiley, Firstedition
1.KaiHwang,Geoffrey C., Fox. Jack, J. Dongarra, “Distributed and Cloud Computing”, Elsevier, Firstedition
Michael Minelli, Michele Chambers, AmbigaDhiraj, “Big Data Big Analytics”,Wileyfor old question papers visit http://www.rgpvonline.com
Digital Data, Data Acquisition, Methods of Digital Data Systems, Control of Digital Data System, Cyber Crime Investigations, Analysis of Cyber Crime, Cyber Ethics and Landscapes.
Cybercheck Analyse True Back Image, Encase Image, Raw Disk Dumps, Virtual disk images and RAM, Dumps, Investigations on Report Analysis, cyber Laws in Secure Analysis, Extract unallocated and disk slack areas, Data carving of slack areas, Hash Files, File Signature.
File Systems CyberCheck FAT12/16/32, exFAT, NTFS, Linux EXT2/3/4 FS, UFS, CDFS, Sun Solaris, Reiser FS, Unix(Free BSD) and MAC, Dynamic Disks and Linux RAID Disks. Analysis - Introduction, File system category, Content category, Metadata category, File name category, The big picture, File recovery, determining the type, Consistency check, FAT data structure directory entries.
Cybercheck Recover Data, Deleted files/folders Recovery, Deleted Partitions, Data Formatted Partition Data, Add Data, Report Data Findings.
Introduction to Digital Communication, Input/ Output Interfacing, Digital Inputs, Data Isolation, Data Sheets, Smart Networks, Network Communication System Architecture, Wireless Networks, Network Protocols, Data Transmission.
Parasram, S. V. N. (2020), “Digital Forensics with Kali Linux” - Second Edition: Perform Data Acquisition, Data Recovery, Network Forensics, and Malware Analysis with Kali Linux. United Kingdom: Packt Publishing, Limited.
Carrier, B. (2005). “File System Forensic Analysis”, United Kingdom: Pearson Education.
1.Kruse, W. G., Heiser, J. G. (2001). Computer Forensics: Incident Response Essentials. (n.p.): Pearson Education.
Parasram, S. V. N., Joseph, D., Samm, A. (2017). Digital Forensics with Kali Linux: Perform Data Acquisition, Digital Investigation, and Threat Analysis Using Kali Linux Tools. United Kingdom: Packt Publishing.
New Scheme Based On AICTE Flexible Curricula CSE-Data Science/Data Science, VI semester
Objected Oriented and Object Relational Databases Modeling Complex Data Semantics, Specialization, Generalization, Aggregation and Association, Objects, Object Identity and its implementation, Clustering, Equality and Object Reference, Architecture of Object Oriented and Object Relational databases, Persistent Programming Languages, Cache Coherence. Case Studies: Gemstone, O2, Object Store, SQL3, Oracle xxi, DB2.
Deductive Databases Data log and Recursion, Evaluation of Data log program, Recursive queries with negation. Parallel and Distributed Databases Parallel architectures, shared nothing/shared disk/shared memory based architectures, Data partitioning, Intra-operator parallelism, pipelining. Distributed Data Storage – Fragmentation & Replication, Location and Fragment Transparency Distributed Query Processing and Optimization, Distributed Transaction Modeling and concurrency Control, Distributed Deadlock, Commit Protocols, Design of Parallel Databases, and Parallel Query Evaluation.
Advanced Transaction Processing Advanced transaction models: Savepoints, Nested and Multilevel Transactions, Compensating Transactions and Saga, Long Duration Transactions, Weak Levels of Consistency, Transaction Work Flows, Transaction Processing Monitors, Shared disk systems.
Active Database and Real Time Databases Triggers in SQL, Event Constraint and Action: ECA Rules, Query Processing and Concurrency control, Recursive query processing, Compensation and Databases Recovery, multi-level recovery.
Image and Multimedia Databases Modeling and Storage of Image and Multimedia Data, Data Structures – R-tree, k-d tree, Quad trees, Content Based Retrieval: Color Histograms, Textures, etc., Image Features, Spatial and Topological Relationships, Multimedia Data Formats, Video Data Model, Audio & Handwritten Data, Geographic Information Systems (GIS).
Accessing Databases through WEB, WEB Servers, XML Databases, Commercial Systems – Oracle xxi, DB2.
Elmarsi, “Fundamentals of Database Systems”, 4 th Edition, Pearson Education
R. Ramakrishnan, “Database Management Systems”, 1998, McGraw Hill International Editions
Elmagarmid.A.K. “Database transaction models for advanced applications”, Morgan Kaufman.
Transaction Processing, Concepts and Techniques, J. Gray and A. Reuter, Morgan Kauffman..
S. Abiteboul, R. hull and V. Vianu, “Foundations of Databases”, 1995, Addison – Wesley Publishing Co., Reading Massachusetts.
W. Kim, “Modern Database Systems”, 1995, ACM Press, Addison – Wesley.
D. Maier, “The Theory of Relational Databases”, 1993, Computer Science Press, Rockville, Maryland
New Scheme Based On AICTE Flexible Curricula CSE-Data Science/Data Science, VI semester
Introduction - History of IR- Components of IR - Issues -Open source Search engine Frameworks - The Impact of the web on IR - The role of artificial intelligence (AI) in IR – IR Versus Web Search - Components of a search engine, Characterizing the web.
Boolean and Vector space retrieval models- Term weighting - TF-IDF weighting- cosine similarity - Preprocessing - Inverted indices - efficient processing with sparse vectors Language Model based IR - Probabilistic IR -Latent Semantic indexing - Relevance feedback and query expansion.
Web search overview, web structure the user paid placement search engine optimization, Web Search Architectures - crawling - meta-crawlers, Focused Crawling - web indexes - Nearduplicate detection - Index Compression - XML retrieval.
Link Analysis -hubs and authorities - Page Rank and HITS algorithms -Searching and Ranking - Relevance Scoring and ranking for Web - Similarity - Hadoop & Map Reduce - Evaluation - Personalized search - Collaborative filtering and content-based recommendation of documents And products - handling invisible Web - Snippet generation, Summarization. Question Answering, Cross- Lingual Retrieval.
Information filtering: organization and relevance feedback - Text Mining- Text classification and clustering - Categorization algorithms, naive Bayes, decision trees and nearest neighbor - Clustering algorithms: agglomerative clustering, k-means, expectation maximization (EM).
C. Manning, P. Raghvan and H Schutze: Introduction to Information Retrieval, Cambridge University Press, 2008.
Ricardo Baeza -Yates and Berthier Ribeiro –Neto, Modern Information Retrieval. The Concepts and Technology behind Search 2nd Edition, ACM Press Books 2011.
Bruce Croft, Donald Metzler and Trevor Strohman Search Engines Information Retrieval in Practice 1st Edition Addison Wesley, 2009
4.Mark Levene, An Introduction to Search Engines and Web Navigation, 2nd Edition Wiley 2010.
New Scheme Based On AICTE Flexible Curricula CSE-Data Science/Data Science, VI semester
After completing the course student should be able to:
Describe the fundamental principles and practices associated with each of the agile development methods.
Compare agile software development model with traditional development models and identify the benefits and pitfalls.
Use techniques and skills to establish and mentor Agile Teams for effective software development.
Apply core values and principles of Agile Methods in software development.
programming: Issues and Challenges.
Robert C. Martin, Agile Software Development- Principles, Patterns and Practices, Prentice Hall, 2013.
Kenneth S. Rubin, Essential Scrum: A Practical Guide to the Most Popular Agile Process, Addison Wesley, 2012.
James Shore and Shane Warden, The Art of Agile Development, O’Reilly Media, 2007.
Craig Larman, ―Agile and Iterative Development: A manager’s Guide, Addison- Wesley, 2004.
Ken Schawber, Mike Beedle, Agile Software Development with Scrum, Pearson, 2001.
Cohn, Mike, Agile Estimating and Planning, Pearson Education, 2006.
Cohn, Mike, User Stories Applied: For Agile Software Development Addison Wisley, 2004.
IEEE Transactions on Software Engineering
IEEE Transactions on Dependable and Secure Computing
IET Software
ACM Transactions on Software Engineering and Methodology (TOSEM)
ACM SIGSOFT Software Engineering Notes
New Scheme Based On AICTE Flexible Curricula CSE-Data Science/Data Science, VI semester
processing methods and strategies and to evaluate the strengths and weaknesses of various Natural
Language Processing (NLP) methods & technologies and gain an insight into the application areas
of Natural language processing.
Daniel Jurafsky, James H. Martin―Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics and Speech, Pearson Publication.
Steven Bird, Ewan Klein and Edward Loper, ―Natural Language Processing with
Python, OReilly Media.
Manning and Schutze "Foundations of Statistical Natural Language Processing", MIT Press.
Breck Baldwin, Language Processing with Java and LingPipe Cookbook, Atlantic Publisher.
Richard M Reese, Natural Language Processing with Java, OReilly Media.
Nitin Indurkhya and Fred J. Damerau, Handbook of Natural Language Processing, Chapman and Hall/CRC Press.
Tanveer Siddiqui, U.S. Tiwary, Natural Language Processing and Information Retrieval, Oxford University Press.