HEAD
Data-driven decisions, data pipeline infrastructure for data-driven decisions, role of the data engineer in data-driven organizations, Modern data strategies, Introduction to elements of Data, the five Vs of data – volume, velocity, variety, veracity, and value, Variety – data types & data sources, Activities to improve veracity and value.
The evolution of data architectures, Modern data architecture on various cloud platforms, Modern data architecture pipeline - Ingestion and storage, Modern data architecture pipeline - Processing and Consumption, Streaming analytics pipeline
Cloud security, Security of analytics workloads, ML security, Scaling Data Pipeline, creating a scalable infrastructure, Creating scalable components.
ETL and ELT comparison, Data wrangling, Data Discovery, Data structuring, Data Cleaning, Data enriching, Data validating, Data publishing
Comparing batch and stream ingestion, Batch ingestion processing, Purpose-built data ingestion tools, Scaling considerations for batch processing, stream processing, Scaling considerations for stream processing, Ingesting IoT data by stream
Storage in the modern data architecture, Data Lake storage, Data warehouse storage, Purpose-built databases, Storage in support of the pipeline, Securing storage.
Big data processing concepts, Apache Hadoop, Apache Spark, Amazon EMR
ML Concepts, ML Lifecycle, Framing the ML problem to meet the business goal, Collecting data, Applying labels to training data with known targets, Pre-processing data, Feature engineering, Developing a model, Deploying a model, ML infrastructure on AWS, AWS SageMaker, Automating the Pipeline, Automating infrastructure deployment, CI/CD, Automating with Step Functions.
7 - 10 experiments to be framed as per the syllabus.
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems, by Martin Kleppmann
T-SQL Querying (Developer Reference) by Itzik Ben-Gan
The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling by Margy Ross
Spark: The Definitive Guide: Big Data Processing Made Simple by Bill Chambers
Data Pipelines with Apache Airflow by Bas P. Harenslak
Streaming Systems: The What, Where, When, and How of Large-Scale Data Processing by Tyler Akidau
Kubernetes in Action by Marko Luksa
Joel Grus, Data Science from Scratch, Shroff Publisher Publisher /O’Reilly Publisher Media
Annalyn Ng, Kenneth Soo, Numsense! Data Science for the Layman, Shroff Publisher Publisher
Cathy O’Neil and Rachel Schutt. Doing Data Science, Straight Talk from The Frontline. O’Reilly Publisher Media.
Jure Leskovek, Anand Rajaraman and Jeffrey Ullman. Mining of Massive Datasets. v2.1, Cambridge University Press.
Jake VanderPlas, Python Data Science Handbook, Shroff Publisher Publisher /O’Reilly Publisher Media 6. Philipp Janert, Data Analysis with Open Source Tools, Shroff Publisher Publisher
/O’Reilly Publisher Media.
Review of traditional networks: Review of LAN, MAN, WAN, Intranet, Internet, and interconnectivity devices: bridges, Routers, etc. Review of TCP/IP Protocol Architecture: ARP/RARP, IP addressing, IP Datagram format and its Delivery, Routing table format, ICMP Messages, Subnetting, Super netting, and CIDR, DNS. NAT: Private addressing and NAT, SNAT, DNAT, NAT and firewalls, VLANS: Concepts, Comparison with Real LANS, Type of VLAN, Tagging, IPV6: address structure, address space and header.
Study of traditional routing and transport: Routing Protocols: BGP- Concept of hidden network and autonomous system, An Exterior gateway protocol, Different messages of BGP. Interior Gateway protocol: RIP, OSPF. Multiplexing and ports, TCP: Segment format, Sockets, Synchronization, Three Way Hand Shaking, Variable window size and Flow control, Timeout and Retransmission algorithms, Connection Control, Silly window Syndrome. Example of TCP: Taho, Reno, Sack etc. UDP: Message Encapsulation, Format and Pseudo header.
Wireless LAN: Transmission Medium For WLANs, MAC problems, Hidden and Exposed terminals, Near and Far terminals, Infrastructure and Ad hoc Networks, IEEE 802.11- System arch, Protocol arch, Physical layer, Concept of spread spectrum, MAC and its management, Power management, Security. Mobile IP: unsuitability of Traditional IP; Goals, Terminology, Agent advertisement and discovery, Registration, Tunneling techniques. Ad hoc network routing: Ad hoc Network routing v/s Traditional IP routing, types of routing protocols, Examples: OADV, DSDV, DSR, ZRP etc.
Mobile transport layer: unsuitability of Traditional TCP; I-TCP, S-TCP, M-TCP. Wireless Cellular networks: Cellular system, Cellular networks v/s WLAN, GSM – Services, system architecture, Localization and calling, handover and Roaming.
Mobile Device Operating Systems: Special Constraints & Requirements, Commercial Mobile Operating Systems. Software Development Kit: iOS, Android etc. MCommerce: Structure, Pros &Cons, Mobile Payment System, Security Issues
Comer, “Internetworking with TCP/ IP Vol-I”, 5th edition, Addison Wesley, 2006.
Jochen Schiller “Mobile communication”, 2nd edition, Pearson education, 2008
W. Richard Stevens, “TCP/IP Illustrated Vol-I”, Addison-Wesley.
C.K.Toh, “AdHoc Mobile Wireless Networks”, First Edition, Pearson Education.
Uwe Hansmann, LotharMerk, Martin S. Nicklons and Thomas Stober, “Principles of Mobile Computing”, Springer
Dr.Kumar Saurabh, “Cloud Computing”, Wiley India.
Ronald Krutz and Russell Dean Vines, “Cloud Security”, Wiley-India.
Judith Hurwitz, R.Bloor, M.Kanfman, F.Halper, “Computing for Dummies”, Wiley India Edition.
Anthony T.Velte Toby J.Velte, “Cloud Computing – A Practical Approach”, TMH.
Barrie Sosinsky, ‘Cloud Computing Bible”, Wiley India.
Explain the core concepts of the cloud computing paradigm
Demonstrate knowledge of virtualization
Explain the core issues of cloud computing such as security, privacy, and interoperability.
Choose the appropriate technologies, algorithms, and approaches for the related issues.
Identify problems, and explain, analyze, and evaluate various cloud computing solutions
Unit 1: Test of hypothesis: Concept & formulation, Type I and Type II errors, Neyman Pearson lemma, Procedures of testing, Basics of Time Series Analysis & Forecasting: Stationary, ARIMA Models: Identification, Estimation and Forecasting.
Unit 2: Non-parametric Inference: Comparison with parametric inference, Use of order statistics. Sign test, Wilcoxon signed rank test, Mann-Whitney test, Run test, Kolmogorov-Smirnov test. Spearman‘s and Kendall‘s test. Tolerance region.
Unit 3:Greatest Common Divisors and Prime Factorization: Greatest common divisors, The Euclidean algorithm, The fundamental theorem of arithmetic, Factorization of integers and the Fermat numbers Congruence: Introduction to congruence’s, Linear congruences, The Chinese remainder theorem, Systems of linear congruences
Unit 4: Stochastic Processes and Markov Chains: Introduction to Stochastic processesMarkov process. Transition Probability, Transition Probability Matrix, First order and Higher order Markov process, n step transition probabilities, Markov chain, Steady state condition, Markov analysis.
Unit 5: R statistical programming language: Introduction to R, Functions, Control flow and Loops, Working with Vectors and Matrices, Reading in Data, Writing Data, Working with Data, Manipulating Data, Simulation, Linear model, Data Frame, Graphics in R
TEXT BOOKS:
1 .S. D. Sharma, Operations Research, Kedarnath and Ramnath Publishers, Meerut, Delhi
. S C Gupta and V K Kapoor, Fundamentals of Mathematical statistics, Khanna publications
A. Goon, M. Gupta and B. Dasgupta, ―Fundamentals of Statistics, vol. I & II, World Press
Garrett Grolemund, “Hands-on Programming with R”, 1st edition, O′Reilly. Jared P. Lander, “R for
Everyone: Advanced Analytics and Graphics”, 2nd edition, Addison-Wesley Professional.
SP GUPTA,Statistical Methods 48TH EDITION
Security Concepts: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security, Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks.
Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.
Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme. Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure.
Transport-level Security: Web security considerations, Secure Socket Layer and Transport Layer Security, HTTPS, Secure Shell (SSH) Wireless Network Security: Wireless Security, Mobile Device Security, IEEE
802.11 Wireless LAN, IEEE 802.11i Wireless LAN Security.
E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP Security architecture, Authentication Header, Encapsulating security payload, Combining security associations, Internet Key Exchange Case Studies on Cryptography and security: Secure Multiparty Calculation, Virtual Elections, Single sign On, Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability.
Cryptography and Network Security - Principles and Practice: William Stallings, Pearson Education, 6th Edition
Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition
Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley India, 1st Edition.
Cryptography and Network Security: Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition
Information Security, Principles, and Practice: Mark Stamp, Wiley India.
Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH
Introduction to Network Security: Neal Krawetz, CENGAGE Learning
Network Security and Cryptography: Bernard Menezes, CENGAGE Learning
The students will be able to understand the basic concepts and fundamentals of robotics. They will also be able to use AI in the field of robotics.
Introduction: Introduction to Robotics Fundamentals of Robotics, Robot Kinematics: Position Analysis, Dynamic Analysis and Forces, Robot Programming languages & systems: Introduction, the three levels of robot programming, requirements of a robot programming language, problems peculiar to robot programming languages.
Need of AI in Robotics: History, state of the art, Need for AI in Robotics. Thinking and acting humanly, intelligent agents, structure of agents.
Game Playing: AI and game playing, plausible move generator, static evaluation move generator, game playing strategies, problems in game playing.
Robotics fundamentals: Robot Classification, Robot Specification, notation, kinematic representations and transformations, dynamics techniques; trajectory planning and control.
Robotics and Its applications: DDD concept, Intelligent robots, Robot anatomy-Definition, law of robotics, History and Terminology of Robotics-Accuracy and repeatability of Robotics-Simple problems- Specifications of Robot-Speed of Robot, Robot joints and links-Robot classifications Architecture of robotic systems-Robot Drive systems-Hydraulic, Pneumatic and Electric system
Robotics, Vision and Control: Fundamental Algorithms in MATLAB, Peter Corke, Springer, 2011.
Robotics: Everything You Need to Know About Robotics from Beginner to Expert, Peter McKinnon, Createspace Independent Publishing Platform, 2016.
Introduction to AI Robotics, Second Edition, By Robin R. Murphy, MIT press, 2001.
Artificial Intelligence for Robotics: Build intelligent robots that perform human tasks using AI techniques, Francis X. Govers, Packt Publishers, 2018
Introduction to Computer Vision and Basic Concepts of Image Formation: Introduction and Goals of Computer Vision and Image Processing, Image Formation Concepts. Fundamental Concepts of Image Formation: Radiometry, Geometric Transformations, Geometric Camera Models.
Fundamental Concepts of Image Formation: Camera Calibration, Image Formation in a Stereo Vision Setup, Image Reconstruction from a Series of Projections. Image Processing Concepts: Image Transforms.
Image Processing Concepts: Image Transforms, Image Enhancement. Image Processing Concepts: Image Filtering, Colour Image Processing, Image Segmentation. Image Descriptors and Features: Texture Descriptors, Colour Features, Edges/Boundaries.
Image Descriptors and Features: Object Boundary and Shape Representations. Image Descriptors and Features: Interest or Corner Point Detectors, Histogram of Oriented Gradients, Scale Invariant Feature Transform, Speeded up Robust Features, Saliency
Applications of Computer Vision: Artificial Neural Network for Pattern Classification, Convolutional Neural Networks, Autoencoders. Applications of Computer Vision: Gesture Recognition, Motion Estimation and Object Tracking, Programming Assignments.
Forsyth & Ponce, “Computer Vision-A Modern Approach”, Pearson Education.
M.K. Bhuyan , “ Computer Vision and Image Processing: Fundamentals and Applications”, CRC Press, USA, ISBN 9780815370840 - CAT# K338147.
Richard Szeliski, “Computer Vision- Algorithms & Applications”, Springer.
Online Lectures links https://onlinecourses.nptel.ac.in/noc23_ee39/preview https://onlinecourses.nptel.ac.in/noc19_cs58/preview https://onlinecourses.nptel.ac.in/noc23_ee78/preview
Write a python program for image enhancement.
Write a python program to perform compression operation on the input image.
Write a python program for color image processing on the input image.
Write a python program to perform image segmentation operation.
Write a python program to perform image morphology operation on the image.
Write a python program for Image Restoration operation.
Write a python program to implement Scaling, Rotating, Shifting and Edge Detection operations on input image.
Write a program for object tracking using Open CV
COURSE OBJECTIVES
Students should understand the value of Historical data and data mining in solving real-world problems.
Students should become affluent with the basic Supervised and unsupervised learning algorithms commonly used in data mining .
Students develop the skill in using data mining for solving real-world problems.
Unit 1. Data Warehousing: Introduction, Delivery Process, Data warehouse Architecture, Data Preprocessing: Data cleaning, Data Integration and transformation, Data reduction. Data warehouse Design: Data Warehouse schema, Partitioning strategy Data warehouse Implementation, Data Marts, Meta Data, Example of a Multidimensional Data model. Introduction to Pattern Warehousing.
Unit 2. OLAP Systems: Basic concepts, OLAP queries, Types of OLAP servers, OLAP operations etc. Data Warehouse Hardware and Operational Design: Security, Backup And Recovery,
Unit 3. Introduction to Data & Data Mining :Data Types, Quality of data, Data Preprocessing, Similarity measures, Summary statistics, Data distributions, Basic data mining tasks, Data Mining V/s knowledge discovery in databases. Issues in Data mining. Introduction to Fuzzy sets and fuzzy logic.
Unit 4. Supervised Learning: Classification: Statistical-based algorithms, Distance-based algorithms, Decision tree-based algorithms, Neural network-based algorithms, Rule-based algorithms, Probabilistic Classifiers
Unit 5. Clustering & Association Rule mining : Hierarchical algorithms, Partitional algorithms, Clustering large databases – BIRCH, DBSCAN, CURE algorithms.Association rules : Parallel and distributed algorithms such as Apriori and FP growth algorithms.
Books Recommended: Text Books:
Pang – ningTan , Steinbach & Kumar, “Introduction to Data Mining”, Pearson Edu, 2019.
Jaiwei Han, Micheline Kamber, “Data Mining : Concepts and Techniques”, Morgan Kaufmann Publishers.
Reference Books:
Margaret H. Dunham, “Data Mining : Introductory and Advanced topics”, Pearson Edu., 2009.
Anahory& Murray, “Data Warehousing in the Real World”, Pearson Edu., 2009.
Data-driven decisions, data pipeline infrastructure for data-driven decisions, role of the data engineer in data-driven organizations, Modern data strategies, Introduction to elements of Data, the five Vs of data – volume, velocity, variety, veracity, and value, Variety – data types & data sources, Activities to improve veracity and value.
The evolution of data architectures, Modern data architecture on various cloud platforms, Modern data architecture pipeline - Ingestion and storage, Modern data architecture pipeline - Processing and Consumption, Streaming analytics pipeline
Cloud security, Security of analytics workloads, ML security, Scaling Data Pipeline, creating a scalable infrastructure, Creating scalable components.
ETL and ELT comparison, Data wrangling, Data Discovery, Data structuring, Data Cleaning, Data enriching, Data validating, Data publishing
Comparing batch and stream ingestion, Batch ingestion processing, Purpose-built data ingestion tools, Scaling considerations for batch processing, stream processing, Scaling considerations for stream processing, Ingesting IoT data by stream
Storage in the modern data architecture, Data Lake storage, Data warehouse storage, Purpose-built databases, Storage in support of the pipeline, Securing storage.
Big data processing concepts, Apache Hadoop, Apache Spark, Amazon EMR
ML Concepts, ML Lifecycle, Framing the ML problem to meet the business goal, Collecting data, Applying labels to training data with known targets, Pre-processing data, Feature engineering, Developing a model, Deploying a model, ML infrastructure on AWS, AWS SageMaker, Automating the Pipeline, Automating infrastructure deployment, CI/CD, Automating with Step Functions.
7 - 10 experiments to be framed as per the syllabus.
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems, by Martin Kleppmann
T-SQL Querying (Developer Reference) by Itzik Ben-Gan
The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling by Margy Ross
Spark: The Definitive Guide: Big Data Processing Made Simple by Bill Chambers
Data Pipelines with Apache Airflow by Bas P. Harenslak
Streaming Systems: The What, Where, When, and How of Large-Scale Data Processing by Tyler Akidau
Kubernetes in Action by Marko Luksa
Joel Grus, Data Science from Scratch, Shroff Publisher Publisher /O’Reilly Publisher Media
Annalyn Ng, Kenneth Soo, Numsense! Data Science for the Layman, Shroff Publisher Publisher
Cathy O’Neil and Rachel Schutt. Doing Data Science, Straight Talk from The Frontline. O’Reilly Publisher Media.
Jure Leskovek, Anand Rajaraman and Jeffrey Ullman. Mining of Massive Datasets. v2.1, Cambridge University Press.
Jake VanderPlas, Python Data Science Handbook, Shroff Publisher Publisher /O’Reilly Publisher Media 6. Philipp Janert, Data Analysis with Open Source Tools, Shroff Publisher Publisher
/O’Reilly Publisher Media.
Review of traditional networks: Review of LAN, MAN, WAN, Intranet, Internet, and interconnectivity devices: bridges, Routers, etc. Review of TCP/IP Protocol Architecture: ARP/RARP, IP addressing, IP Datagram format and its Delivery, Routing table format, ICMP Messages, Subnetting, Super netting, and CIDR, DNS. NAT: Private addressing and NAT, SNAT, DNAT, NAT and firewalls, VLANS: Concepts, Comparison with Real LANS, Type of VLAN, Tagging, IPV6: address structure, address space and header.
Study of traditional routing and transport: Routing Protocols: BGP- Concept of hidden network and autonomous system, An Exterior gateway protocol, Different messages of BGP. Interior Gateway protocol: RIP, OSPF. Multiplexing and ports, TCP: Segment format, Sockets, Synchronization, Three Way Hand Shaking, Variable window size and Flow control, Timeout and Retransmission algorithms, Connection Control, Silly window Syndrome. Example of TCP: Taho, Reno, Sack etc. UDP: Message Encapsulation, Format and Pseudo header.
Wireless LAN: Transmission Medium For WLANs, MAC problems, Hidden and Exposed terminals, Near and Far terminals, Infrastructure and Ad hoc Networks, IEEE 802.11- System arch, Protocol arch, Physical layer, Concept of spread spectrum, MAC and its management, Power management, Security. Mobile IP: unsuitability of Traditional IP; Goals, Terminology, Agent advertisement and discovery, Registration, Tunneling techniques. Ad hoc network routing: Ad hoc Network routing v/s Traditional IP routing, types of routing protocols, Examples: OADV, DSDV, DSR, ZRP etc.
Mobile transport layer: unsuitability of Traditional TCP; I-TCP, S-TCP, M-TCP. Wireless Cellular networks: Cellular system, Cellular networks v/s WLAN, GSM – Services, system architecture, Localization and calling, handover and Roaming.
Mobile Device Operating Systems: Special Constraints & Requirements, Commercial Mobile Operating Systems. Software Development Kit: iOS, Android etc. MCommerce: Structure, Pros &Cons, Mobile Payment System, Security Issues
Comer, “Internetworking with TCP/ IP Vol-I”, 5th edition, Addison Wesley, 2006.
Jochen Schiller “Mobile communication”, 2nd edition, Pearson education, 2008
W. Richard Stevens, “TCP/IP Illustrated Vol-I”, Addison-Wesley.
C.K.Toh, “AdHoc Mobile Wireless Networks”, First Edition, Pearson Education.
Uwe Hansmann, LotharMerk, Martin S. Nicklons and Thomas Stober, “Principles of Mobile Computing”, Springer
Dr.Kumar Saurabh, “Cloud Computing”, Wiley India.
Ronald Krutz and Russell Dean Vines, “Cloud Security”, Wiley-India.
Judith Hurwitz, R.Bloor, M.Kanfman, F.Halper, “Computing for Dummies”, Wiley India Edition.
Anthony T.Velte Toby J.Velte, “Cloud Computing – A Practical Approach”, TMH.
Barrie Sosinsky, ‘Cloud Computing Bible”, Wiley India.
Explain the core concepts of the cloud computing paradigm
Demonstrate knowledge of virtualization
Explain the core issues of cloud computing such as security, privacy, and interoperability.
Choose the appropriate technologies, algorithms, and approaches for the related issues.
Identify problems, and explain, analyze, and evaluate various cloud computing solutions
Unit 1: Test of hypothesis: Concept & formulation, Type I and Type II errors, Neyman Pearson lemma, Procedures of testing, Basics of Time Series Analysis & Forecasting: Stationary, ARIMA Models: Identification, Estimation and Forecasting.
Unit 2: Non-parametric Inference: Comparison with parametric inference, Use of order statistics. Sign test, Wilcoxon signed rank test, Mann-Whitney test, Run test, Kolmogorov-Smirnov test. Spearman‘s and Kendall‘s test. Tolerance region.
Unit 3:Greatest Common Divisors and Prime Factorization: Greatest common divisors, The Euclidean algorithm, The fundamental theorem of arithmetic, Factorization of integers and the Fermat numbers Congruence: Introduction to congruence’s, Linear congruences, The Chinese remainder theorem, Systems of linear congruences
Unit 4: Stochastic Processes and Markov Chains: Introduction to Stochastic processesMarkov process. Transition Probability, Transition Probability Matrix, First order and Higher order Markov process, n step transition probabilities, Markov chain, Steady state condition, Markov analysis.
Unit 5: R statistical programming language: Introduction to R, Functions, Control flow and Loops, Working with Vectors and Matrices, Reading in Data, Writing Data, Working with Data, Manipulating Data, Simulation, Linear model, Data Frame, Graphics in R
TEXT BOOKS:
1 .S. D. Sharma, Operations Research, Kedarnath and Ramnath Publishers, Meerut, Delhi
. S C Gupta and V K Kapoor, Fundamentals of Mathematical statistics, Khanna publications
A. Goon, M. Gupta and B. Dasgupta, ―Fundamentals of Statistics, vol. I & II, World Press
Garrett Grolemund, “Hands-on Programming with R”, 1st edition, O′Reilly. Jared P. Lander, “R for
Everyone: Advanced Analytics and Graphics”, 2nd edition, Addison-Wesley Professional.
SP GUPTA,Statistical Methods 48TH EDITION
Security Concepts: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security, Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks.
Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.
Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme. Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure.
Transport-level Security: Web security considerations, Secure Socket Layer and Transport Layer Security, HTTPS, Secure Shell (SSH) Wireless Network Security: Wireless Security, Mobile Device Security, IEEE
802.11 Wireless LAN, IEEE 802.11i Wireless LAN Security.
E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP Security architecture, Authentication Header, Encapsulating security payload, Combining security associations, Internet Key Exchange Case Studies on Cryptography and security: Secure Multiparty Calculation, Virtual Elections, Single sign On, Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability.
Cryptography and Network Security - Principles and Practice: William Stallings, Pearson Education, 6th Edition
Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition
Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley India, 1st Edition.
Cryptography and Network Security: Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition
Information Security, Principles, and Practice: Mark Stamp, Wiley India.
Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH
Introduction to Network Security: Neal Krawetz, CENGAGE Learning
Network Security and Cryptography: Bernard Menezes, CENGAGE Learning
The students will be able to understand the basic concepts and fundamentals of robotics. They will also be able to use AI in the field of robotics.
Introduction: Introduction to Robotics Fundamentals of Robotics, Robot Kinematics: Position Analysis, Dynamic Analysis and Forces, Robot Programming languages & systems: Introduction, the three levels of robot programming, requirements of a robot programming language, problems peculiar to robot programming languages.
Need of AI in Robotics: History, state of the art, Need for AI in Robotics. Thinking and acting humanly, intelligent agents, structure of agents.
Game Playing: AI and game playing, plausible move generator, static evaluation move generator, game playing strategies, problems in game playing.
Robotics fundamentals: Robot Classification, Robot Specification, notation, kinematic representations and transformations, dynamics techniques; trajectory planning and control.
Robotics and Its applications: DDD concept, Intelligent robots, Robot anatomy-Definition, law of robotics, History and Terminology of Robotics-Accuracy and repeatability of Robotics-Simple problems- Specifications of Robot-Speed of Robot, Robot joints and links-Robot classifications Architecture of robotic systems-Robot Drive systems-Hydraulic, Pneumatic and Electric system
Robotics, Vision and Control: Fundamental Algorithms in MATLAB, Peter Corke, Springer, 2011.
Robotics: Everything You Need to Know About Robotics from Beginner to Expert, Peter McKinnon, Createspace Independent Publishing Platform, 2016.
Introduction to AI Robotics, Second Edition, By Robin R. Murphy, MIT press, 2001.
Artificial Intelligence for Robotics: Build intelligent robots that perform human tasks using AI techniques, Francis X. Govers, Packt Publishers, 2018
Introduction to Computer Vision and Basic Concepts of Image Formation: Introduction and Goals of Computer Vision and Image Processing, Image Formation Concepts. Fundamental Concepts of Image Formation: Radiometry, Geometric Transformations, Geometric Camera Models.
Fundamental Concepts of Image Formation: Camera Calibration, Image Formation in a Stereo Vision Setup, Image Reconstruction from a Series of Projections. Image Processing Concepts: Image Transforms.
Image Processing Concepts: Image Transforms, Image Enhancement. Image Processing Concepts: Image Filtering, Colour Image Processing, Image Segmentation. Image Descriptors and Features: Texture Descriptors, Colour Features, Edges/Boundaries.
Image Descriptors and Features: Object Boundary and Shape Representations. Image Descriptors and Features: Interest or Corner Point Detectors, Histogram of Oriented Gradients, Scale Invariant Feature Transform, Speeded up Robust Features, Saliency
Applications of Computer Vision: Artificial Neural Network for Pattern Classification, Convolutional Neural Networks, Autoencoders. Applications of Computer Vision: Gesture Recognition, Motion Estimation and Object Tracking, Programming Assignments.
Forsyth & Ponce, “Computer Vision-A Modern Approach”, Pearson Education.
M.K. Bhuyan , “ Computer Vision and Image Processing: Fundamentals and Applications”, CRC Press, USA, ISBN 9780815370840 - CAT# K338147.
Richard Szeliski, “Computer Vision- Algorithms & Applications”, Springer.
Online Lectures links https://onlinecourses.nptel.ac.in/noc23_ee39/preview https://onlinecourses.nptel.ac.in/noc19_cs58/preview https://onlinecourses.nptel.ac.in/noc23_ee78/preview
Write a python program for image enhancement.
Write a python program to perform compression operation on the input image.
Write a python program for color image processing on the input image.
Write a python program to perform image segmentation operation.
Write a python program to perform image morphology operation on the image.
Write a python program for Image Restoration operation.
Write a python program to implement Scaling, Rotating, Shifting and Edge Detection operations on input image.
Write a program for object tracking using Open CV
COURSE OBJECTIVES
Students should understand the value of Historical data and data mining in solving real-world problems.
Students should become affluent with the basic Supervised and unsupervised learning algorithms commonly used in data mining .
Students develop the skill in using data mining for solving real-world problems.
Unit 1. Data Warehousing: Introduction, Delivery Process, Data warehouse Architecture, Data Preprocessing: Data cleaning, Data Integration and transformation, Data reduction. Data warehouse Design: Data Warehouse schema, Partitioning strategy Data warehouse Implementation, Data Marts, Meta Data, Example of a Multidimensional Data model. Introduction to Pattern Warehousing.
Unit 2. OLAP Systems: Basic concepts, OLAP queries, Types of OLAP servers, OLAP operations etc. Data Warehouse Hardware and Operational Design: Security, Backup And Recovery,
Unit 3. Introduction to Data & Data Mining :Data Types, Quality of data, Data Preprocessing, Similarity measures, Summary statistics, Data distributions, Basic data mining tasks, Data Mining V/s knowledge discovery in databases. Issues in Data mining. Introduction to Fuzzy sets and fuzzy logic.
Unit 4. Supervised Learning: Classification: Statistical-based algorithms, Distance-based algorithms, Decision tree-based algorithms, Neural network-based algorithms, Rule-based algorithms, Probabilistic Classifiers
Unit 5. Clustering & Association Rule mining : Hierarchical algorithms, Partitional algorithms, Clustering large databases – BIRCH, DBSCAN, CURE algorithms.Association rules : Parallel and distributed algorithms such as Apriori and FP growth algorithms.
Books Recommended: Text Books:
Pang – ningTan , Steinbach & Kumar, “Introduction to Data Mining”, Pearson Edu, 2019.
Jaiwei Han, Micheline Kamber, “Data Mining : Concepts and Techniques”, Morgan Kaufmann Publishers.
Reference Books:
Margaret H. Dunham, “Data Mining : Introductory and Advanced topics”, Pearson Edu., 2009.
Anahory& Murray, “Data Warehousing in the Real World”, Pearson Edu., 2009.