HEAD
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
Understand the concepts of IoT Architecture
Apply knowledge of IoT Networking and its components to design IoT-based systems
Understand data link layer and network layer protocols ofIoT
Use the knowledge of IoT transport and session layer protocols in various applications of IoT 5. Design IoT-based systems for real-world problems
Unit I IoT definition, Characteristics, IoT conceptual and architectural framework, Physical and logical design of IoT, IoT enablers, Modern day IoT applications, M2M communications, IoT vs M2M, IoT vs WoT, IoT reference architecture, IoT Network configurations, IoT LAN, IoT WAN, IoT Node, IoT Gateway, IoT Proxy
Unit II Basics of IoT Networking, IoT Components, Functional components of IoT, IoT service oriented architecture, IoT challenges, 6LowPAN, IEEE 802.15.4, RFID Features, RFID working principle and applications, NFC (Near Field communication), Bluetooth, Wireless Sensor Networks and its Applications
Unit III IoT Data Link Layer & Network Layer Protocols: PHY/MAC Layer(3GPP MTC, IEEE 802.11, IEEE 802.15), Wireless HART,ZWave,Bluetooth Low Energy, Zigbee Smart Energy, DASH7 - Network Layer-IPv4,IPv6, 6LoWPAN, 6TiSCH,ND, DHCP, ICMP, RPL, CORPL, CARP
Unit IV IoT Transport & Session Layer Protocols: Transport Layer (TCP, MPTCP, UDP, DCCP, SCTP)-(TLS, DTLS) – Session Layer-HTTP, CoAP, CoAP message types, CoAP Request-Response model, XMPP, AMQP, MQTT, MQTT methods and components, MQTT communication, topics and applications, SMQTT
Unit V IoT Service Layer Protocols & Security Protocols: Service Layer -oneM2M, ETSI M2M, OMA, BBF – Security in IoT Protocols – MAC802.15.4 , 6LoWPAN, RPL, Application Layer IoT Platforms, Arduino, Raspberry Pi Board, Other IoT Platforms; Data Analytics for IoT, Cloud for IoT, Cloud storage models & communication APIs, IoT case studies
Reference Books:
Vijay Madisetti, ArshdeepBahga, “Ïnternet of Things, A Hands on Approach”, University Press
Dr. SRN Reddy, RachitThukral and Manasi Mishra, “Introduction to Internet of Things: A practical Approach”, ETI Labs
Pethuru Raj and Anupama C. Raman, “The Internet of Things: Enabling Technologies, Platforms, and Use Cases”, CRC Press
Jeeva Jose, “Internet of Things”, Khanna Publishing House, Delhi
Adrian McEwen, “Designing the Internet of Things”, Wiley
Raj Kamal, “Internet of Things: Architecture and Design”, McGraw Hill
CunoPfister, “Getting Started with the Internet of Things”, O Reilly Media
Daniel Minoli, “Building the Internet of Things with IPv6 and MIPv6: The EvolvingWorldof M2M Communications”, ISBN: 978-1-118-47347-4, Willy Publications ,2016
Jan Holler, VlasiosTsiatsis, Catherine Mulligan, Stefan Avesand,StamatisKarnouskos, David Boyle, “From Machineto-Machine to the Internet ofThings: Introduction to a New Age of Intelligence”, 1st Edition, Academic Press, 2015
Bernd Scholz-Reiter, Florian Michahelles, “Architecting the Internet of Things”,ISBN 978-3-642- 19156-5 e-ISBN 978-3-642-19157-2, Springer, 2016
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
Overview of Mobile App Development: Mobile Applications, A formula for designing engaging applications, Unique challenges for development of engaging applications, Enterprise mobile development, Mobile App Development Lifecycle Overview
Importance of Design, App Design issues and considerations, Scope of Design in Mobile App Development, Design Principles and Guidelines, Some Design Methods, Factors for choosing mobile app, Mobile App Architectural Components, Mobile App Flow, Mobile App Deployment Considerations
Building Mobile Apps Powered by Enterprise Backend, Connecting the Mobile App with Enterprise IT Services and Data, Types of IT Backend to Integrate from Mobile Apps, Type of API Protocols, Security Integration, Mobile Devices Security Considerations, Secured Data Store and Synchronization, Enterprise Mobile Application Management and Device Management, Special Challenges in Managing Mobile Applications and Devices
Quality, Cost of Quality, Automated versus Manual Testing, Preproduction versus Post release, Automated Mobile App Testing Considerations, Monetizing Apps, Publishing Apps
The Android Operating System, Working of Android Apps, Programming languages used for developing Android Apps, Android Studio, Emulators, General Procedure for developing an App
Leigh Williamson, Roland Barcia, Omkar Chandgadkar, Ashish Mathur, Soma Ray, Darrell Schrag, Roger Snook, Jianjun Zhang, “ Enterprise Class Mobile Application Development”, IBM Press Pearson plc, 2016
Jakob Iversen Michael Eierman, “Learning Mobile App Development”, Pearson Education, 2014
J. Paul Cardle, “Android App Development in Android Studio”, Manchester Academic Publishers
On successful completion of this course the students will be able to
Understand the entire lifecycle involved in mobile app development
Design a mobile app
Understand Security considerations in mobile app development
Know about the range of techniques available for testing of Mobile Apps and understand when one approach is better than the others.
Follow general procedure for developing an App
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques and Tools , Pearson Education
Raghavan, Compiler Design, TMH Pub.
Louden. Compiler Construction: Principles and Practice, Cengage Learning
A. C. Holub. Compiler Design in C , Prentice-Hall Inc., 1993.
Mak, writing compiler & Interpreters, Willey Pub.
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
The objective of this course is to discuss cloud and fog computing as an increasingly viable means of achieving enhanced monitoring and control of industrial processes, differentiate between Cloud and edge-fog computing and what role the two technologies will increasingly play in process control and automation.
Cloud Computing Fundamentals: Motivation for Cloud Computing, Defining Cloud Computing, Principles of Cloud Computing , Five Essential Characteristics, Cloud Ecosystem, Requirements for Cloud Services, Cloud Applications, Benefits and Drawbacks, Cloud Architecture, Network Connectivity in Cloud Computing, Managing the Cloud, Migrating Application to Cloud
Cloud Deployment Models: Private Cloud, Public Cloud, Community Cloud, Hybrid Cloud; Cloud Service Models: Infrastructure as a Service, Platform as a Service, Software as a Service, Their characteristics, Suitability, Pros and Cons, Cloud Service Providers
Technological Drivers of Cloud Computing: Virtualization, Approaches in Virtualization, Hypervisor and Its Role, Types of Virtualization; Memory and Storage Technologies, Networking Technologies, Web 2.0 and Web 3.0, Agile SDLC for Cloud Computing, Programming Models for Cloud Computing
Security in Cloud Computing: Security Aspects, Data Security, Virtualization Security, Network Security, Security Issues in Cloud Service Models, Audit and Compliance, Data Protection in the Cloud, Cloud Security as a Service; Advanced Concepts in Cloud Computing: Intercloud, Cloud Management, Mobile Cloud, Cloud Governance, Green Cloud, Cloud Analytics
Introduction to Fog Computing, Difference between cloud computing and fog computing, Fog Computing benefits and drawbacks, Applications of Fog computing, Role of Fog computing in Internet of Things, Need for Fog computation, Fog data processing layers.
K. Chandrasekaran, “Essentials of Cloud Computing”, CRC Press, 2015
Arshdeep Bahga, Vijay Madisetti, “Cloud Computing: A Hands-on Approach”, 2013.
Rajkumar Buyya, James Broberg, Andrzej Goscinski, “Cloud Computing: Principles and Paradigms”, Wiley
Rajkumar Buyya, Satish Narayana Srirama, “ Fog and Edge Computing: Principles and Paradigms”, Wiley
Assad Abbas, Samee U. Khan, Albert Y. Zomaya “Fog Computing: Theory and Practice”, Wiley, 2020
On successful completion of this course the students will be able to
Articulate the main concepts, key technologies, strengths, and limitations of cloud computing
Identify the architecture and infrastructure of cloud computing, including SaaS, PaaS, IaaS, public cloud, private cloud, hybrid cloud, etc.
Have understanding of the Technological Drivers of Cloud Computing
Explain the core issues of cloud computing such as security, privacy, and interoperability and provide the appropriate cloud computing solutions and recommendations according to the applications used.
Attempt to generate new ideas and innovations in cloud computing and Fog computing.
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
Describe in-depth about theories, methods, and algorithms in machine learning.
Find and analyze the optimal hyper parameters of the machine learning algorithms.
Examine the nature of a problem at hand and determine whether machine learning can solve it efficiently.
Solve and implement real world problems using machine learning.
Introduction to machine learning, Machine learning life cycle, Types of Machine Learning System (supervised and unsupervised learning, Batch and online learning, Instance-Based and Model based Learning), scope and limitations, Challenges of Machine learning, data visualization, hypothesis function and testing, data pre-processing, data augmentation, normalizing data sets, , Bias-Variance tradeoff, Relation between AI (Artificial Intelligence), ML (Machine Learning), DL (Deep Learning) and DS (Data Science).
Clustering in Machine Learning: Types of Clustering Method: Partitioning Clustering, Distribution Model-Based Clustering, Hierarchical Clustering, Fuzzy Clustering. Birch Algorithm, CURE Algorithm. Gaussian Mixture Models and Expectation Maximization. Parameters estimations – MLE, MAP. Applications of Clustering.
REFERENCE BOOKS:
Tom M. Mitchell, “Machine Learning”, McGraw Hill Education, First edition, 2017.
Aurelien Geon, “Hands-On Machine Learning with Scikit-Learn and Tensorflow: Concepts, Tools, and Techniques to Build Intelligent Systems”, Shroff/O'Reilly; First edition (2017).
Andreas Muller, "Introduction to Machine Learning with Python: A Guide for Data Scientists", Shroff/O'Reilly; First edition (2016).
Leonard Kaufman and P. J. Rousseau. Finding groups in data: An introduction to cluster analysis, Wiley, 2005
NelloCristianini and John Shawe-Taylor, An Introduction to Support Vector Machines, Cambridge University Press, 2000.
PRACTICAL: Different problems to be framed to enable students to understand the concept learnt and get hands-on on various tools and software related to the subject. Such assignments are to be framed for ten to twelve lab sessions
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
The objective of this course is to provide conceptual understanding of how block chain technology can be used to innovate and improve business processes.
Introduction: Overview of Block chain, Public Ledgers, Bitcoin, Smart Contracts, Block in a Block chain, Transactions, Distributed Consensus, Public vs Private Block chain, Understanding Cryptocurrency to Block chain, Permissioned Model of Block chain, Overview of Security aspects of Block chain; Basic Crypto Primitives: Cryptographic Hash Function, Properties of a hash function, Hash pointer and Merkle tree, Digital Signature, Public Key Cryptography, A basic cryptocurrency
Understanding Block chain with Crypto currency: Bitcoin and Block chain: Creation of coins, Payments and double spending, Bitcoin Scripts, Bitcoin P2P Network, Transaction in Bitcoin Network, Block Mining, Block propagation and block relay. Working with Consensus in Bitcoin: Distributed consensus in open environments, Consensus in a Bitcoin network, Proof of Work (PoW) – basic introduction, HashCash PoW, Bitcoin PoW, Attacks on PoW and the monopoly problem, Proof of Stake, Proof of Burn and Proof of Elapsed Time, The life of a Bitcoin Miner, Mining Difficulty, Mining Pool
Understanding Block chain for Enterprises: Permissioned Block chain: Permissioned model and use cases, Design issues for Permissioned block chains, Execute contracts, State machine replication, Overview of Consensus models for permissioned block chain- Distributed consensus in closed environment, Paxos, RAFT Consensus, Byzantine general problem, Byzantine fault tolerant system, Lamport-Shostak-Pease BFT Algorithm, BFT over Asynchronous systems.
Enterprise application of Block chain: Cross border payments, Know Your Customer (KYC), Food Security, Mortgage over Block chain, Block chain enabled Trade, We Trade – Trade Finance Network, Supply Chain Financing, and Identity on Block chain
Block chain application development: Hyperledger Fabric- Architecture, Identities and Policies, Membership and Access Control, Channels, Transaction Validation, Writing smart contract using Hyperledger Fabric, Writing smart contract using Ethereum, Overview of Ripple and Corda
Melanie Swan, “Block Chain: Blueprint for a New Economy”, O’Reilly, 2015
Josh Thompsons, “Block Chain: The Block Chain for Beginners- Guide to Block chain Technology and Leveraging Block Chain Programming”
Daniel Drescher, “Block Chain Basics”, Apress; 1stedition, 2017
Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
Imran Bashir, “Mastering Block Chain: Distributed Ledger Technology, Decentralization and Smart Contracts Explained”, Packt Publishing
Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build Smart Contracts for Ethereum and Block Chain”, Packt Publishing
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O’Dowd, Venkatraman Ramakrishna, “Hands-On Block Chain with Hyperledger: Building Decentralized Applications with Hyperledger Fabric and Composer”, Import, 2018
After the completion of this course, the students will be able to:
Understand block chain technology
Acquire knowledge of cryptocurrencies
Develop block chain based solutions and write smart contract using Hyperledger Fabric and Ethereum frameworks
Build and deploy block chain application for on premise and cloud based architecture
Integrate ideas from various domains and implement them using block chain technology in different perspectives
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
Describe the basics of securing Internet of Things.
Explain architecture and threats in IoT.
Analyze various privacy schemes related to IoT
Describe the authentication mechanisms for IoT security and privacy.
Explain security issues for various applications using case studies
Shancang Li, Li Da Xu, “Securing the Internet of Things,” Syngress (Elsevier)publication, 2017, ISBN: 978-0-12-804458-2.
Fei Hu, “Security and Privacy in Internet of Things (IoTs): Models, Algorithms, andImplementations,” CRC Press (Taylor & Francis Group), 2016, ISBN:978-1-4987- 23190.
Arshdeep Bahga, Vijay Madisetti, “Internet of Things – A Hands-on approach,” VPTPublishers, 2014, ISBN: 978-0996025515.
Alasdair Gilchris, “Iot Security Issues,” Walter de Gruyter GmbH & Co, 2017.
Sridipta Misra, Muthucumaru Maheswaran, Salman Hashmi, “Security Challenges andApproaches in Internet of Things,” Springer, 2016. 6. Brian Russell, Drew Van Duren,“Practical Internet of Things Security,” Packet Publishing Ltd, 2016.
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
Students are able to :
Understand the role of IIOT in manufacturing processes
Apply knowledge of IIoT design considerations and IIoT technologies to develop solutions for industries
Collect, communicate and leverage the IIoT data
Analyze the IIoT data by using various machine learning algorithms
Identify, formulate and solve engineering problems by using Industrial IoT.
Unit I: Introduction to Industrial Internet of Things and Industry 4.0: Basics of Industry 4.0, Basics of Industrial Internet of Things (IIoT), Evolution of IIoT – understanding the IT & OT (Operational Technology) convergence, OT components like Industrial control systems, PLC, SCADA, and DCS, Industrial Edge, Open loop and closed loop controls, Components of IIOT, Role of IIOT in Manufacturing Processes, Challenges & Benefits in implementing IIOT, Adoption of IIoT, Market trends and opportunities in IIoT
Unit II: Technological Aspects of Industry 4.0 and IIoT: Industrial processes, Industrial sensing and actuation, Industrial networks, Machine-to-machine networks, Business Models and Reference Architecture of IIoT, IIoT design considerations, Key Technologies: Off-site Technologies, On-site Technologies
Unit IV: IIoT Analytics: Big Data Analytics and Software Defined Networks, Machine Learning and Data Science in Industries, Security and Fog computing in IIoT
Unit V: Applications of IIoT and Case Studies: Healthcare Applications in Industries, Inventory Management and Quality Control, Plant Safety and Security, Oil, chemical and pharmaceutical industry, Integration of products, processes, and people, Smart factories and cyber-physical systems, Case Studies, IIoT Application Development, Protocols used in building IIoT applications
“Introduction to Industrial Internet of Things and Industry 4.0”, By Sudip Misra Chandana Roy,Anandarup Mukherjee, CRC Press, 2020
“Industrial Internet of Things for Developers”, Ryane Bohm, Wiley
“Handbook of Industry 4.0 and Smart Systems”, Diego Galar Pascual, Pasquale Daponte, UdayKumar, CRC Press, 2019
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
Data-driven decisions, data pipeline infrastructure for data-driven decisions, role of the data engineer in data-driven organizations, Modern data strategies, Introduction to elements of Data, the five Vs of data – volume, velocity, variety, veracity, and value, Variety – data types & data sources, Activities to improve veracity and value.
The evolution of data architectures, Modern data architecture on various cloud platforms, Modern data architecture pipeline - Ingestion and storage, Modern data architecture pipeline - Processing and Consumption, Streaming analytics pipeline
Cloud security, Security of analytics workloads, ML security, Scaling Data Pipeline, creating a scalable infrastructure, creating scalable components.
ETL and ELT comparison, Data wrangling, Data Discovery, Data structuring, Data Cleaning, Data enriching, Data validating, Data publishing
Comparing batch and stream ingestion, Batch ingestion processing, Purpose-built data ingestion tools, Scaling considerations for batch processing, stream processing, Scaling considerations for stream processing, Ingesting IoT data by stream
Storage in the modern data architecture, Data Lake storage, Data warehouse storage, Purpose-built databases, Storage in support of the pipeline, Securing storage.
Big data processing concepts, Apache Hadoop, Apache Spark, Amazon EMR
ML Concepts, ML Lifecycle, Framing the ML problem to meet the business goal, Collecting data, Applying labels to training data with known targets, Pre-processing data, Feature engineering, Developing a model, Deploying a model, ML infrastructure on AWS, AWS SageMaker, Automating the Pipeline, Automating infrastructure deployment, CI/CD, Automating with Step Functions.
7 - 10 experiments to be framed as per the syllabus.
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems, by Martin Kleppmann
T-SQL Querying (Developer Reference) by Itzik Ben-Gan
The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling by Margy Ross
Spark: The Definitive Guide: Big Data Processing Made Simple by Bill Chambers
Data Pipelines with Apache Airflow by Bas P. Harenslak
Streaming Systems: The What, Where, When, and How of Large-Scale Data Processing by Tyler Akidau
Kubernetes in Action by Marko Luksa
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
Understand the concepts of IoT Architecture
Apply knowledge of IoT Networking and its components to design IoT-based systems
Understand data link layer and network layer protocols ofIoT
Use the knowledge of IoT transport and session layer protocols in various applications of IoT 5. Design IoT-based systems for real-world problems
Unit I IoT definition, Characteristics, IoT conceptual and architectural framework, Physical and logical design of IoT, IoT enablers, Modern day IoT applications, M2M communications, IoT vs M2M, IoT vs WoT, IoT reference architecture, IoT Network configurations, IoT LAN, IoT WAN, IoT Node, IoT Gateway, IoT Proxy
Unit II Basics of IoT Networking, IoT Components, Functional components of IoT, IoT service oriented architecture, IoT challenges, 6LowPAN, IEEE 802.15.4, RFID Features, RFID working principle and applications, NFC (Near Field communication), Bluetooth, Wireless Sensor Networks and its Applications
Unit III IoT Data Link Layer & Network Layer Protocols: PHY/MAC Layer(3GPP MTC, IEEE 802.11, IEEE 802.15), Wireless HART,ZWave,Bluetooth Low Energy, Zigbee Smart Energy, DASH7 - Network Layer-IPv4,IPv6, 6LoWPAN, 6TiSCH,ND, DHCP, ICMP, RPL, CORPL, CARP
Unit IV IoT Transport & Session Layer Protocols: Transport Layer (TCP, MPTCP, UDP, DCCP, SCTP)-(TLS, DTLS) – Session Layer-HTTP, CoAP, CoAP message types, CoAP Request-Response model, XMPP, AMQP, MQTT, MQTT methods and components, MQTT communication, topics and applications, SMQTT
Unit V IoT Service Layer Protocols & Security Protocols: Service Layer -oneM2M, ETSI M2M, OMA, BBF – Security in IoT Protocols – MAC802.15.4 , 6LoWPAN, RPL, Application Layer IoT Platforms, Arduino, Raspberry Pi Board, Other IoT Platforms; Data Analytics for IoT, Cloud for IoT, Cloud storage models & communication APIs, IoT case studies
Reference Books:
Vijay Madisetti, ArshdeepBahga, “Ïnternet of Things, A Hands on Approach”, University Press
Dr. SRN Reddy, RachitThukral and Manasi Mishra, “Introduction to Internet of Things: A practical Approach”, ETI Labs
Pethuru Raj and Anupama C. Raman, “The Internet of Things: Enabling Technologies, Platforms, and Use Cases”, CRC Press
Jeeva Jose, “Internet of Things”, Khanna Publishing House, Delhi
Adrian McEwen, “Designing the Internet of Things”, Wiley
Raj Kamal, “Internet of Things: Architecture and Design”, McGraw Hill
CunoPfister, “Getting Started with the Internet of Things”, O Reilly Media
Daniel Minoli, “Building the Internet of Things with IPv6 and MIPv6: The EvolvingWorldof M2M Communications”, ISBN: 978-1-118-47347-4, Willy Publications ,2016
Jan Holler, VlasiosTsiatsis, Catherine Mulligan, Stefan Avesand,StamatisKarnouskos, David Boyle, “From Machineto-Machine to the Internet ofThings: Introduction to a New Age of Intelligence”, 1st Edition, Academic Press, 2015
Bernd Scholz-Reiter, Florian Michahelles, “Architecting the Internet of Things”,ISBN 978-3-642- 19156-5 e-ISBN 978-3-642-19157-2, Springer, 2016
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
Overview of Mobile App Development: Mobile Applications, A formula for designing engaging applications, Unique challenges for development of engaging applications, Enterprise mobile development, Mobile App Development Lifecycle Overview
Importance of Design, App Design issues and considerations, Scope of Design in Mobile App Development, Design Principles and Guidelines, Some Design Methods, Factors for choosing mobile app, Mobile App Architectural Components, Mobile App Flow, Mobile App Deployment Considerations
Building Mobile Apps Powered by Enterprise Backend, Connecting the Mobile App with Enterprise IT Services and Data, Types of IT Backend to Integrate from Mobile Apps, Type of API Protocols, Security Integration, Mobile Devices Security Considerations, Secured Data Store and Synchronization, Enterprise Mobile Application Management and Device Management, Special Challenges in Managing Mobile Applications and Devices
Quality, Cost of Quality, Automated versus Manual Testing, Preproduction versus Post release, Automated Mobile App Testing Considerations, Monetizing Apps, Publishing Apps
The Android Operating System, Working of Android Apps, Programming languages used for developing Android Apps, Android Studio, Emulators, General Procedure for developing an App
Leigh Williamson, Roland Barcia, Omkar Chandgadkar, Ashish Mathur, Soma Ray, Darrell Schrag, Roger Snook, Jianjun Zhang, “ Enterprise Class Mobile Application Development”, IBM Press Pearson plc, 2016
Jakob Iversen Michael Eierman, “Learning Mobile App Development”, Pearson Education, 2014
J. Paul Cardle, “Android App Development in Android Studio”, Manchester Academic Publishers
On successful completion of this course the students will be able to
Understand the entire lifecycle involved in mobile app development
Design a mobile app
Understand Security considerations in mobile app development
Know about the range of techniques available for testing of Mobile Apps and understand when one approach is better than the others.
Follow general procedure for developing an App
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques and Tools , Pearson Education
Raghavan, Compiler Design, TMH Pub.
Louden. Compiler Construction: Principles and Practice, Cengage Learning
A. C. Holub. Compiler Design in C , Prentice-Hall Inc., 1993.
Mak, writing compiler & Interpreters, Willey Pub.
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
The objective of this course is to discuss cloud and fog computing as an increasingly viable means of achieving enhanced monitoring and control of industrial processes, differentiate between Cloud and edge-fog computing and what role the two technologies will increasingly play in process control and automation.
Cloud Computing Fundamentals: Motivation for Cloud Computing, Defining Cloud Computing, Principles of Cloud Computing , Five Essential Characteristics, Cloud Ecosystem, Requirements for Cloud Services, Cloud Applications, Benefits and Drawbacks, Cloud Architecture, Network Connectivity in Cloud Computing, Managing the Cloud, Migrating Application to Cloud
Cloud Deployment Models: Private Cloud, Public Cloud, Community Cloud, Hybrid Cloud; Cloud Service Models: Infrastructure as a Service, Platform as a Service, Software as a Service, Their characteristics, Suitability, Pros and Cons, Cloud Service Providers
Technological Drivers of Cloud Computing: Virtualization, Approaches in Virtualization, Hypervisor and Its Role, Types of Virtualization; Memory and Storage Technologies, Networking Technologies, Web 2.0 and Web 3.0, Agile SDLC for Cloud Computing, Programming Models for Cloud Computing
Security in Cloud Computing: Security Aspects, Data Security, Virtualization Security, Network Security, Security Issues in Cloud Service Models, Audit and Compliance, Data Protection in the Cloud, Cloud Security as a Service; Advanced Concepts in Cloud Computing: Intercloud, Cloud Management, Mobile Cloud, Cloud Governance, Green Cloud, Cloud Analytics
Introduction to Fog Computing, Difference between cloud computing and fog computing, Fog Computing benefits and drawbacks, Applications of Fog computing, Role of Fog computing in Internet of Things, Need for Fog computation, Fog data processing layers.
K. Chandrasekaran, “Essentials of Cloud Computing”, CRC Press, 2015
Arshdeep Bahga, Vijay Madisetti, “Cloud Computing: A Hands-on Approach”, 2013.
Rajkumar Buyya, James Broberg, Andrzej Goscinski, “Cloud Computing: Principles and Paradigms”, Wiley
Rajkumar Buyya, Satish Narayana Srirama, “ Fog and Edge Computing: Principles and Paradigms”, Wiley
Assad Abbas, Samee U. Khan, Albert Y. Zomaya “Fog Computing: Theory and Practice”, Wiley, 2020
On successful completion of this course the students will be able to
Articulate the main concepts, key technologies, strengths, and limitations of cloud computing
Identify the architecture and infrastructure of cloud computing, including SaaS, PaaS, IaaS, public cloud, private cloud, hybrid cloud, etc.
Have understanding of the Technological Drivers of Cloud Computing
Explain the core issues of cloud computing such as security, privacy, and interoperability and provide the appropriate cloud computing solutions and recommendations according to the applications used.
Attempt to generate new ideas and innovations in cloud computing and Fog computing.
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
Describe in-depth about theories, methods, and algorithms in machine learning.
Find and analyze the optimal hyper parameters of the machine learning algorithms.
Examine the nature of a problem at hand and determine whether machine learning can solve it efficiently.
Solve and implement real world problems using machine learning.
Introduction to machine learning, Machine learning life cycle, Types of Machine Learning System (supervised and unsupervised learning, Batch and online learning, Instance-Based and Model based Learning), scope and limitations, Challenges of Machine learning, data visualization, hypothesis function and testing, data pre-processing, data augmentation, normalizing data sets, , Bias-Variance tradeoff, Relation between AI (Artificial Intelligence), ML (Machine Learning), DL (Deep Learning) and DS (Data Science).
Clustering in Machine Learning: Types of Clustering Method: Partitioning Clustering, Distribution Model-Based Clustering, Hierarchical Clustering, Fuzzy Clustering. Birch Algorithm, CURE Algorithm. Gaussian Mixture Models and Expectation Maximization. Parameters estimations – MLE, MAP. Applications of Clustering.
REFERENCE BOOKS:
Tom M. Mitchell, “Machine Learning”, McGraw Hill Education, First edition, 2017.
Aurelien Geon, “Hands-On Machine Learning with Scikit-Learn and Tensorflow: Concepts, Tools, and Techniques to Build Intelligent Systems”, Shroff/O'Reilly; First edition (2017).
Andreas Muller, "Introduction to Machine Learning with Python: A Guide for Data Scientists", Shroff/O'Reilly; First edition (2016).
Leonard Kaufman and P. J. Rousseau. Finding groups in data: An introduction to cluster analysis, Wiley, 2005
NelloCristianini and John Shawe-Taylor, An Introduction to Support Vector Machines, Cambridge University Press, 2000.
PRACTICAL: Different problems to be framed to enable students to understand the concept learnt and get hands-on on various tools and software related to the subject. Such assignments are to be framed for ten to twelve lab sessions
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
The objective of this course is to provide conceptual understanding of how block chain technology can be used to innovate and improve business processes.
Introduction: Overview of Block chain, Public Ledgers, Bitcoin, Smart Contracts, Block in a Block chain, Transactions, Distributed Consensus, Public vs Private Block chain, Understanding Cryptocurrency to Block chain, Permissioned Model of Block chain, Overview of Security aspects of Block chain; Basic Crypto Primitives: Cryptographic Hash Function, Properties of a hash function, Hash pointer and Merkle tree, Digital Signature, Public Key Cryptography, A basic cryptocurrency
Understanding Block chain with Crypto currency: Bitcoin and Block chain: Creation of coins, Payments and double spending, Bitcoin Scripts, Bitcoin P2P Network, Transaction in Bitcoin Network, Block Mining, Block propagation and block relay. Working with Consensus in Bitcoin: Distributed consensus in open environments, Consensus in a Bitcoin network, Proof of Work (PoW) – basic introduction, HashCash PoW, Bitcoin PoW, Attacks on PoW and the monopoly problem, Proof of Stake, Proof of Burn and Proof of Elapsed Time, The life of a Bitcoin Miner, Mining Difficulty, Mining Pool
Understanding Block chain for Enterprises: Permissioned Block chain: Permissioned model and use cases, Design issues for Permissioned block chains, Execute contracts, State machine replication, Overview of Consensus models for permissioned block chain- Distributed consensus in closed environment, Paxos, RAFT Consensus, Byzantine general problem, Byzantine fault tolerant system, Lamport-Shostak-Pease BFT Algorithm, BFT over Asynchronous systems.
Enterprise application of Block chain: Cross border payments, Know Your Customer (KYC), Food Security, Mortgage over Block chain, Block chain enabled Trade, We Trade – Trade Finance Network, Supply Chain Financing, and Identity on Block chain
Block chain application development: Hyperledger Fabric- Architecture, Identities and Policies, Membership and Access Control, Channels, Transaction Validation, Writing smart contract using Hyperledger Fabric, Writing smart contract using Ethereum, Overview of Ripple and Corda
Melanie Swan, “Block Chain: Blueprint for a New Economy”, O’Reilly, 2015
Josh Thompsons, “Block Chain: The Block Chain for Beginners- Guide to Block chain Technology and Leveraging Block Chain Programming”
Daniel Drescher, “Block Chain Basics”, Apress; 1stedition, 2017
Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
Imran Bashir, “Mastering Block Chain: Distributed Ledger Technology, Decentralization and Smart Contracts Explained”, Packt Publishing
Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build Smart Contracts for Ethereum and Block Chain”, Packt Publishing
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O’Dowd, Venkatraman Ramakrishna, “Hands-On Block Chain with Hyperledger: Building Decentralized Applications with Hyperledger Fabric and Composer”, Import, 2018
After the completion of this course, the students will be able to:
Understand block chain technology
Acquire knowledge of cryptocurrencies
Develop block chain based solutions and write smart contract using Hyperledger Fabric and Ethereum frameworks
Build and deploy block chain application for on premise and cloud based architecture
Integrate ideas from various domains and implement them using block chain technology in different perspectives
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
Describe the basics of securing Internet of Things.
Explain architecture and threats in IoT.
Analyze various privacy schemes related to IoT
Describe the authentication mechanisms for IoT security and privacy.
Explain security issues for various applications using case studies
Shancang Li, Li Da Xu, “Securing the Internet of Things,” Syngress (Elsevier)publication, 2017, ISBN: 978-0-12-804458-2.
Fei Hu, “Security and Privacy in Internet of Things (IoTs): Models, Algorithms, andImplementations,” CRC Press (Taylor & Francis Group), 2016, ISBN:978-1-4987- 23190.
Arshdeep Bahga, Vijay Madisetti, “Internet of Things – A Hands-on approach,” VPTPublishers, 2014, ISBN: 978-0996025515.
Alasdair Gilchris, “Iot Security Issues,” Walter de Gruyter GmbH & Co, 2017.
Sridipta Misra, Muthucumaru Maheswaran, Salman Hashmi, “Security Challenges andApproaches in Internet of Things,” Springer, 2016. 6. Brian Russell, Drew Van Duren,“Practical Internet of Things Security,” Packet Publishing Ltd, 2016.
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
Students are able to :
Understand the role of IIOT in manufacturing processes
Apply knowledge of IIoT design considerations and IIoT technologies to develop solutions for industries
Collect, communicate and leverage the IIoT data
Analyze the IIoT data by using various machine learning algorithms
Identify, formulate and solve engineering problems by using Industrial IoT.
Unit I: Introduction to Industrial Internet of Things and Industry 4.0: Basics of Industry 4.0, Basics of Industrial Internet of Things (IIoT), Evolution of IIoT – understanding the IT & OT (Operational Technology) convergence, OT components like Industrial control systems, PLC, SCADA, and DCS, Industrial Edge, Open loop and closed loop controls, Components of IIOT, Role of IIOT in Manufacturing Processes, Challenges & Benefits in implementing IIOT, Adoption of IIoT, Market trends and opportunities in IIoT
Unit II: Technological Aspects of Industry 4.0 and IIoT: Industrial processes, Industrial sensing and actuation, Industrial networks, Machine-to-machine networks, Business Models and Reference Architecture of IIoT, IIoT design considerations, Key Technologies: Off-site Technologies, On-site Technologies
Unit IV: IIoT Analytics: Big Data Analytics and Software Defined Networks, Machine Learning and Data Science in Industries, Security and Fog computing in IIoT
Unit V: Applications of IIoT and Case Studies: Healthcare Applications in Industries, Inventory Management and Quality Control, Plant Safety and Security, Oil, chemical and pharmaceutical industry, Integration of products, processes, and people, Smart factories and cyber-physical systems, Case Studies, IIoT Application Development, Protocols used in building IIoT applications
“Introduction to Industrial Internet of Things and Industry 4.0”, By Sudip Misra Chandana Roy,Anandarup Mukherjee, CRC Press, 2020
“Industrial Internet of Things for Developers”, Ryane Bohm, Wiley
“Handbook of Industry 4.0 and Smart Systems”, Diego Galar Pascual, Pasquale Daponte, UdayKumar, CRC Press, 2019
New Scheme Based On AICTE Flexible Curricula CSE-IOT/IOT, VII-Semester
Data-driven decisions, data pipeline infrastructure for data-driven decisions, role of the data engineer in data-driven organizations, Modern data strategies, Introduction to elements of Data, the five Vs of data – volume, velocity, variety, veracity, and value, Variety – data types & data sources, Activities to improve veracity and value.
The evolution of data architectures, Modern data architecture on various cloud platforms, Modern data architecture pipeline - Ingestion and storage, Modern data architecture pipeline - Processing and Consumption, Streaming analytics pipeline
Cloud security, Security of analytics workloads, ML security, Scaling Data Pipeline, creating a scalable infrastructure, creating scalable components.
ETL and ELT comparison, Data wrangling, Data Discovery, Data structuring, Data Cleaning, Data enriching, Data validating, Data publishing
Comparing batch and stream ingestion, Batch ingestion processing, Purpose-built data ingestion tools, Scaling considerations for batch processing, stream processing, Scaling considerations for stream processing, Ingesting IoT data by stream
Storage in the modern data architecture, Data Lake storage, Data warehouse storage, Purpose-built databases, Storage in support of the pipeline, Securing storage.
Big data processing concepts, Apache Hadoop, Apache Spark, Amazon EMR
ML Concepts, ML Lifecycle, Framing the ML problem to meet the business goal, Collecting data, Applying labels to training data with known targets, Pre-processing data, Feature engineering, Developing a model, Deploying a model, ML infrastructure on AWS, AWS SageMaker, Automating the Pipeline, Automating infrastructure deployment, CI/CD, Automating with Step Functions.
7 - 10 experiments to be framed as per the syllabus.
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems, by Martin Kleppmann
T-SQL Querying (Developer Reference) by Itzik Ben-Gan
The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling by Margy Ross
Spark: The Definitive Guide: Big Data Processing Made Simple by Bill Chambers
Data Pipelines with Apache Airflow by Bas P. Harenslak
Streaming Systems: The What, Where, When, and How of Large-Scale Data Processing by Tyler Akidau
Kubernetes in Action by Marko Luksa