HEAD
Introduction : Data Mining: Definitions, KDD v/s Data Mining, DBMS v/s Data Mining , DM techniques, Mining problems, Issues and Challenges in DM, DM Application areas.
Association Rules & Clustering Techniques: Introduction, Various association algorithms like A Priori, Partition, Pincer search etc., Generalized association rules. Clustering paradigms; Partitioning algorithms like K-Medioid, CLARA, CLARANS; Hierarchical clustering, DBSCAN, BIRCH, CURE; categorical clustering algorithms, STIRR, ROCK, CACTUS.
Other DM techniques & Web Mining: Application of Neural Network, AI, Fuzzy logic and Genetic algorithm, Decision tree in DM. Web Mining, Web content mining, Web structure Mining, Web Usage Mining.
Temporal and spatial DM: Temporal association rules, Sequence Mining, GSP, SPADE, SPIRIT, and WUM algorithms, Episode Discovery, Event prediction, Time series analysis.
Spatial Mining, Spatial Mining tasks, Spatial clustering, Spatial Trends.
Data Mining of Image and Video : A case study. Image and Video representation techniques, feature extraction, motion analysis, content based image and video retrieval, clustering and association paradigm, knowledge discovery.
Data Mining Techniques ; Arun K.Pujari ; University Press.
Data Mining; Adriaans & Zantinge; Pearson education.
Mastering Data Mining; Berry Linoff; Wiley.
Data Mining; Dunham; Pearson education.
Text Mining Applications, Konchandy, Cengage
Conventional Encryption
Convention Encryption : Conventional Encryption Model , Steganography , Classical Encryption Techniques, Simplified DES , Block Cipher Principles , The Data Encryption Standard, The Strength of DES , Differential and Linear Cryptanalysis, Block Cipher Design Principles, Block Cipher Modes of operation, Conventional Encryption algorithms
Public Key Encryption And Hash Functions
Public Key Cryptography , Principles of Public Key Cryptosystems , The RSA Algorithm , Key Management , Diffie Hellman Key Exchange , Elliptic Curve Cryptography
Message Authentication and Hash Functions
Authentication Requirements, Authentication Functions, Message Authentication Codes , Hash Functions , Security of Hash Functions
Hash And Mac Algorithms
MD5 Message Digest Algorithm , Secure Hash Algorithm (SHA-I) , RIPEMD , HMAC Digital Signatures and Authentication Protocols
Digital Signatures , Authentication Protocols -Digital Signature Standard Authentication Applications , IP Security , Web Security
Intruders, Viruses and Worms Intruders , Viruses and Related Threats Firewalls
Firewall Design Principles , Trusted Systems
William Stallings, “ Cryptography and Network Security”, Second edition, Prentice Hall, 1999.
Atul Kahate, “ Cryptography and Network Security,” TMH
William Stallings,"Cryptography and Network Security",Third Edition, Pearson Ed
Introduction to network security, Krawetz, Cengage
Introduction to modeling and simulation: Modeling and simulation methodology, system modeling , concept of simulation, continuous and discrete time simulation.
Basic concept of probability and random variables continuous and discrete random variables, distribution of random variables: discrete and continuous, Compartmental models: linear, nonlinear and stochastic models.
Introduction to Queuing Theory: Characteristics of queuing system, Poisson's formula, birth- death system, equilibrium of queuing system, analysis of M/M/1 queues. Application of queuing theory in computer system like operating systems, computer networks etc.
System Dynamics modeling: Identification of problem situation , preparation of causal loop diagrams and flow diagrams, equation writing, level and rate relationship. Simulation of system dynamics models.
Verification and validation: Design of simulation experiments, validation of experimental models, testing and analysis. Simulation languages comparison and selection, study of Simulation sw -SIMULA, DYNAMO, STELLA, POWERSIM.
Gorden G., System simulation, Printice Hall.
Payer T., Introduction to system simulation, McGraw Hill.
Seila, Applied Simulation Modeling, Cengage
Spriet, Computer Aided Modeling and Simulation, W.I.A.
Sushil, System Dynamics, Wiley Eastern Ltd. 23
Shannon R.E., System simulation, Prentice Hall
Introduction : Data Mining: Definitions, KDD v/s Data Mining, DBMS v/s Data Mining , DM techniques, Mining problems, Issues and Challenges in DM, DM Application areas.
Association Rules & Clustering Techniques: Introduction, Various association algorithms like A Priori, Partition, Pincer search etc., Generalized association rules. Clustering paradigms; Partitioning algorithms like K-Medioid, CLARA, CLARANS; Hierarchical clustering, DBSCAN, BIRCH, CURE; categorical clustering algorithms, STIRR, ROCK, CACTUS.
Other DM techniques & Web Mining: Application of Neural Network, AI, Fuzzy logic and Genetic algorithm, Decision tree in DM. Web Mining, Web content mining, Web structure Mining, Web Usage Mining.
Temporal and spatial DM: Temporal association rules, Sequence Mining, GSP, SPADE, SPIRIT, and WUM algorithms, Episode Discovery, Event prediction, Time series analysis.
Spatial Mining, Spatial Mining tasks, Spatial clustering, Spatial Trends.
Data Mining of Image and Video : A case study. Image and Video representation techniques, feature extraction, motion analysis, content based image and video retrieval, clustering and association paradigm, knowledge discovery.
Data Mining Techniques ; Arun K.Pujari ; University Press.
Data Mining; Adriaans & Zantinge; Pearson education.
Mastering Data Mining; Berry Linoff; Wiley.
Data Mining; Dunham; Pearson education.
Text Mining Applications, Konchandy, Cengage
Conventional Encryption
Convention Encryption : Conventional Encryption Model , Steganography , Classical Encryption Techniques, Simplified DES , Block Cipher Principles , The Data Encryption Standard, The Strength of DES , Differential and Linear Cryptanalysis, Block Cipher Design Principles, Block Cipher Modes of operation, Conventional Encryption algorithms
Public Key Encryption And Hash Functions
Public Key Cryptography , Principles of Public Key Cryptosystems , The RSA Algorithm , Key Management , Diffie Hellman Key Exchange , Elliptic Curve Cryptography
Message Authentication and Hash Functions
Authentication Requirements, Authentication Functions, Message Authentication Codes , Hash Functions , Security of Hash Functions
Hash And Mac Algorithms
MD5 Message Digest Algorithm , Secure Hash Algorithm (SHA-I) , RIPEMD , HMAC Digital Signatures and Authentication Protocols
Digital Signatures , Authentication Protocols -Digital Signature Standard Authentication Applications , IP Security , Web Security
Intruders, Viruses and Worms Intruders , Viruses and Related Threats Firewalls
Firewall Design Principles , Trusted Systems
William Stallings, “ Cryptography and Network Security”, Second edition, Prentice Hall, 1999.
Atul Kahate, “ Cryptography and Network Security,” TMH
William Stallings,"Cryptography and Network Security",Third Edition, Pearson Ed
Introduction to network security, Krawetz, Cengage
Introduction to modeling and simulation: Modeling and simulation methodology, system modeling , concept of simulation, continuous and discrete time simulation.
Basic concept of probability and random variables continuous and discrete random variables, distribution of random variables: discrete and continuous, Compartmental models: linear, nonlinear and stochastic models.
Introduction to Queuing Theory: Characteristics of queuing system, Poisson's formula, birth- death system, equilibrium of queuing system, analysis of M/M/1 queues. Application of queuing theory in computer system like operating systems, computer networks etc.
System Dynamics modeling: Identification of problem situation , preparation of causal loop diagrams and flow diagrams, equation writing, level and rate relationship. Simulation of system dynamics models.
Verification and validation: Design of simulation experiments, validation of experimental models, testing and analysis. Simulation languages comparison and selection, study of Simulation sw -SIMULA, DYNAMO, STELLA, POWERSIM.
Gorden G., System simulation, Printice Hall.
Payer T., Introduction to system simulation, McGraw Hill.
Seila, Applied Simulation Modeling, Cengage
Spriet, Computer Aided Modeling and Simulation, W.I.A.
Sushil, System Dynamics, Wiley Eastern Ltd. 23
Shannon R.E., System simulation, Prentice Hall