HEAD
The objective of this course is to provide an introductory and broad overview of the field of AI and ML.
Introduction to Artificial Intelligence: The History of AI, AI and Society, Agents, Knowledge based systems; Fields and Applications of Artificial Intelligence, Propositional Logic: First order Predicate Logic: Limitations of Logic
Search, Games and Problem Solving: Uninformed Search, Heuristic Search, Games with Opponents, Heuristic Evaluation Functions, State of the Art; Reasoning with Uncertainty: Computing with Probabilities, The Principle of Maximum Entropy, Reasoning with Bayesian networks
Machine Learning: Preliminaries, Examples of Machine Learning Applications, Data Analysis, Regression, The Perceptron, A Linear Classifier, The Nearest Neighbor method, Decision Tree Learning, Cross-Validation and Overfitting, Learning of Bayesian networks, The Naïve Bayes Classifier, One-class learning, Clustering
Neural Networks: From Biology to Simulation, Hopfield Networks, Neural Associative Memory, Linear Networks with Minimal Errors, The Back Propagation Algorithm, Support Vector Machines, Deep Learning, Applications of Neural Networks, Reinforcement Learning
Design and Analysis of Machine Learning Experiments: Factors, response and strategy of experimentation, Guidelines for machine learning experiments, cross-validation and resampling methods, Measuring classifier performance, Hypothesis testing, comparing multiple algorithms, comparison over multiple datasets
Wolfgang Ertel, “Introduction to Artificial Intelligence”, Second Edition, Springer, 2017
Nils J. Nilsson, “ Artificial Intelligence: A New Synthesis”, Morgan Kaufmann Publishers
David Forsyth, “Applied Machine Learning”, Springer
Ethem Alpaydin, “Introduction to Machine Learning”, Third Edition, The MIT Press, 2014
Mohssen Mohammed, Muhammad Badruddin Khan, Eihab Bashier Mohammed Bashier, “Machine Learning Algorithms and Applications”, CRC Press Taylor & Francis Group, 2017
Zsolt Nagy, “Artificial Intelligence and Machine Learning Fundamentals, Packt Publishing, 2018
On successful completion of this course the students will be able to-
Demonstrate fundamental understanding of artificial intelligence (AI)
Apply basic principles of AI in solutions that require problem solving, inference, perception, knowledge representation, and learning
Demonstrate proficiency in using models of machine learning
Apply knowledge of neural networks to solve various problems
Perform machine learning experiments
The objective of this course is to make students to learn how cyber security for the IoT works along with key technical details, process flows, definitions of terms and practical examples.
Fundamentals of encryption for cyber security: Cryptography – Need and the Mathematical basics- History of cryptography, symmetric ciphers, block ciphers, DES – AES. Public-key cryptography: RSA, Diffie-Hellman Algorithm, Elliptic Curve Cryptosystems, Algebraic structure, Triple Data Encryption Algorithm (TDEA) Block cipher
IoT security framework : IOT security frame work, Security in hardware, Bootprocess, OS & Kernel, application, run time environment and containers. Need and methods of Edge Security, Network Security: Internet, Intranet, LAN, Wireless Networks, Wireless cellular networks, Cellular Networks and VOIP
Elementary blocks of IoT Security & Models for Identity Management: Vulnerability of IoT and elementary blocks of IoT Security, Threat modeling – Key elements. Identity management Models and Identity management in IoT, Approaches using User-centric, Device-centric and Hybrid
Identity Management and Trust Establishment: Trust management lifecycle, Identity and Trust, Web of trust models. Establishment: Cryptosystems – Mutual establishment phases – Comparison on security analysis. Identity management framework
Access Control in IoT and light weight cryptography: Capability-based access control schemes, Concepts, identity-based and identity-driven, Light weight cryptography, need and methods, IoT use cases
Security and Digital Identity in Cloud Computing: Security, Digital identity management in cloud, Classical solutions, alternative solutions, Management of privacy and personal data in Cloud; Cyber Crimes, Hackers and Forensics: Cyber Crimes and Laws – Hackers – Dealing with the rise tide of Cyber Crimes – Cyber Forensics and incident Response – Network Forensics
John R. Vacca, “Computer and Information Security Handbook”, Elsevier, 2013.
Parikshit Narendra Mahalle , Poonam N. Railkar, “Identity Management for Internet of Things”, River Publishers, 2015.
William Stallings, “Cryptography and Network security: Principles and Practice”, 5th Edition, 2014, Pearson Education, India.
Maryline Laurent, Samia Bouzefrane, “Digital Identity Management”, Elsevier, 2015.
Joseph Migga Kizza, “Computer Network Security”, Springer, 2005.
Christof Paar and Jan Pelzl, “Understanding Cryptography – A Textbook for Students and Practitioners”, Springer, 2014.
Behrouz A.Forouzan : Cryptography & Network Security – The McGraw Hill Company, 2007.
Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security: “Private Communication in a public World”, PTR Prentice Hall, Second Edition, 2002.
Alasdair Gilchrist, “IoT security Issues”, Oreilly publications, 2017.
On successful completion of this course the students will be able to-
Design and implement cryptography algorithms
Solve network security problems in various networks
Build security systems using elementary blocks
Build Trustable cloud based IoT systems
Solve IoT security problems using light weight cryptography and appreciate the need for cyber security laws and methods.
The objective of this course is to discuss cloud and fog computing as an increasingly viable means of achieving enhanced monitoring and control of industrial processes, differentiate between Cloud and edge-fog computing and what role the two technologies will increasingly play in process control and automation.
Cloud Computing Fundamentals: Motivation for Cloud Computing, Defining Cloud Computing, Principles of Cloud Computing , Five Essential Characteristics, Cloud Ecosystem, Requirements for Cloud Services, Cloud Applications, Benefits and Drawbacks, Cloud Architecture, Network Connectivity in Cloud Computing, Managing the Cloud, Migrating Application to Cloud
Cloud Deployment Models: Private Cloud, Public Cloud, Community Cloud, Hybrid Cloud; Cloud Service Models: Infrastructure as a Service, Platform as a Service, Software as a Service, Their characteristics, Suitability, Pros and Cons, Cloud Service Providers
Technological Drivers of Cloud Computing: Virtualization, Approaches in Virtualization, Hypervisor and Its Role, Types of Virtualization; Memory and Storage Technologies, Networking Technologies, Web 2.0 and Web 3.0, Agile SDLC for Cloud Computing, Programming Models for Cloud Computing
Security in Cloud Computing: Security Aspects, Data Security, Virtualization Security, Network Security, Security Issues in Cloud Service Models, Audit and Compliance, Data Protection in the Cloud, Cloud Security as a Service; Advanced Concepts in Cloud Computing: Intercloud, Cloud Management, Mobile Cloud, Cloud Governance, Green Cloud, Cloud Analytics
Introduction to Fog Computing, Difference between cloud computing and fog computing, Fog Computing benefits and drawbacks, Applications of Fog computing, Role of Fog computing in Internet of Things, Need for Fog computation, Fog data processing layers.
K. Chandrasekaran, “Essentials of Cloud Computing”, CRC Press, 2015
Arshdeep Bahga, Vijay Madisetti, “Cloud Computing: A Hands-on Approach”, 2013.
Rajkumar Buyya, James Broberg, Andrzej Goscinski, “Cloud Computing: Principles and Paradigms”, Wiley
Rajkumar Buyya, Satish Narayana Srirama, “ Fog and Edge Computing: Principles and Paradigms”, Wiley
Assad Abbas, Samee U. Khan, Albert Y. Zomaya “Fog Computing: Theory and Practice”, Wiley, 2020
On successful completion of this course the students will be able to-
Articulate the main concepts, key technologies, strengths, and limitations of cloud computing
Identify the architecture and infrastructure of cloud computing, including SaaS, PaaS, IaaS, public cloud, private cloud, hybrid cloud, etc.
Have understanding of the Technological Drivers of Cloud Computing
Explain the core issues of cloud computing such as security, privacy, and interoperability and provide the appropriate cloud computing solutions and recommendations according to the applications used.
Attempt to generate new ideas and innovations in cloud computing and Fog computing.
The objective of this course is to introduce big data technology platforms and how these can be applied to IoT data.
Introducing IoT Analytics: Types of Data Sources, Understanding Big Data, Applications of Big Data Analytics, IoT Data and Big Data, Defining IoT Analytics, Challenges of IoT Analytics, IoT Analytics Lifecycle and Techniques
IoT, Cloud and Big Data Integration for IoT Analytics: Cloud-based IoT Platform, Requirements of IoT Big Data Analytics Platform, Functional Architecture, Data Analytics for the IoT, Characteristics of IoT Generated Data, Data Analytic Techniques and Technologies, Data Collection Using Low-power, Long-range Radios, IoT Analytics for the cloud
Searching the Internet of Things: A Search Architecture for Social and Physical Sensors, Local Event Retrieval, Using Sensor Metadata Streams to Identify Topics of Local Events in the City, Venue Recommendation, Development Tools for IoT Analytics Applications; IoT Analytics as a Service: Architecture for IoT Analytics- as-a-Service, Sensing-as-a-Service, Scheduling, Metering and Service Delivery, Sensing-as-a-Service Example, From Sensing-as-a-Service to IoT-Analytics- as-a-Service
Data Science for IoT Analytics: Machine Learning, Feature Engineering with IoT Data, Validation Methods, Bias, Variance, Comparing different Models to find the Best fit, Anomaly Detection, Forecasting, Deep Learning with IoT data; Strategies to organize data for Analytics; The Economics of IoT Analytics: Cost Considerations for IoT Analytics
IoT Analytics Applications and Case Studies: Data Analytics in Smart Buildings, Internet-of-Things Analytics for Smart Cities, Ethical IoT
John Soldatos, “Building Blocks for IoT Analytics”, River Publishers, 2017
Andrew Minteer, “Analytics for the Internet of Things”, Packt Publishing, 2017
On successful completion of this course the students will be able to-
Understand IoT Analytics Lifecycle and Techniques
Know the characteristics of IoT Generated Data
Use development tools for IoT Analytics Applications
Learn Machine Learning for IoT data
Understand IoT Data Analytics applications
The objective of this course is to make students to understand basic concepts of mobile application development.
Overview of Mobile App Development: Mobile Applications, A formula for designing engaging applications, Unique challenges for development of engaging applications, Enterprise mobile development, Mobile App Development Lifecycle Overview
Importance of Design, App Design issues and considerations, Scope of Design in Mobile App Development, Design Principles and Guidelines, Some Design Methods, Factors for choosing mobile app, Mobile App Architectural Components, Mobile App Flow, Mobile App Deployment Considerations
Building Mobile Apps Powered by Enterprise Backend, Connecting the Mobile App with Enterprise IT Services and Data, Types of IT Backend to Integrate from Mobile Apps, Type of API Protocols, Security Integration, Mobile Devices Security Considerations, Secured Data Store and Synchronization, Enterprise Mobile Application Management and Device Management, Special Challenges in Managing Mobile Applications and Devices
Quality, Cost of Quality, Automated versus Manual Testing, Preproduction versus Post release, Automated Mobile App Testing Considerations, Monetizing Apps, Publishing Apps
The Android Operating System, Working of Android Apps, Programming languages used for developing Android Apps, Android Studio, Emulators, General Procedure for developing an App
Leigh Williamson, Roland Barcia, Omkar Chandgadkar, Ashish Mathur, Soma Ray, Darrell Schrag, Roger Snook, Jianjun Zhang, “ Enterprise Class Mobile Application Development”, IBM Press Pearson plc, 2016
Jakob Iversen Michael Eierman, “Learning Mobile App Development”, Pearson Education, 2014
J. Paul Cardle, “Android App Development in Android Studio”, Manchester Academic Publishers
On successful completion of this course the students will be able to-
Understand the entire lifecycle involved in mobile app development
Design a mobile app
Understand Security considerations in mobile app development
Know about the range of techniques available for testing of Mobile Apps and understand when one approach is better than the others.
Follow general procedure for developing an App
The objective of this course is to familiarize the students with the need for development of wearable devices and its implications on various sectors.
Introduction to Wearable Devices: Motivation for development of Wearable Devices, The emergence of wearable computing and wearable electronics, Types of wearable sensors: Invasive, Non-invasive; Intelligent clothing, Industry sectors’ overview – sports, healthcare, Fashion and entertainment, military, environment monitoring, mining industry, public sector and safety.
Wearable Inertial Sensors: Accelerometers, Gyroscopic sensors and Magnetic sensors; Modality of Measurement- Wearable Sensors, Invisible Sensors, In-Shoe Force and Pressure Measurement; Applications: Fall Risk Assessment, Fall Detection , Gait Analysis, Quantitative Evaluation of Hemiplegic and Parkinson’s Disease patients; Physical Activity monitoring: Human Kinetics, Cardiac Activity, Energy Expenditure measurement: Pedometers, Actigraphs.
Wearable Devices for Healthcare: Wearable ECG devices: Basics of ECG and its design, Wearable EEG devices: Principle and origin of EEG, Basic Measurement set-up, Wearable Blood Pressure (BP) Measurement: Cuff-Based Sphygmomanometer, Cuffless Blood Pressure Monitor. Study of flexible and wearable Piezoresistive sensors for cuffless blood pressure measurement. Wearable sensors for Body Temperature: Intermittent and Continuous temperature monitoring, Detection principles; Noninvasive Glucose Monitoring Devices, wearable pulse oximeter
Wearable Cameras and Microphones for Navigation: Cameras in wearable devices, Applications in safety and security, navigation, Enhancing sports media, Automatic digital diary. Cameras in smart-watches; Use of Wearable Microphones: MEMS microphones, Bioacoustics, Microphones and AI for respiratory diagnostics and clinical trials. Wearable Assistive Devices for the Blind - Hearing and Touch sensation, Assistive Devices for Fingers and Hands, Assistive Devices for wrist, for arm and feet, vests and belts, head-mounted devices
Other Wearable Devices: Wearable devices with Global Positioning System (GPS) integration for tracking and navigation. Wearable Optical Sensors -chemical sensors, optical glucose sensors, UV exposure indicators, speech recognition using lasers; Photoplethysmography (PPG), 3D imaging and motion capture.
“Seamless Healthcare Monitoring”, Toshiyo Tamura and Wenxi Chen, Springer 2018
“Wearable Sensors -Fundamentals, Implementation and Applications”, by Edward Sazonov and Michael
R. Neuman, Elsevier Inc., 2014.
“Wearable and Autonomous Biomedical Devices and Systems for Smart Environment”, by Aimé Lay- Ekuakille and Subhas Chandra Mukhopadhyay, Springer 2010
After the completion of this course, the students will be able to:
Identify and understand the need for development of wearable devices and its influence on various sectors.
Discus the applications of various wearable inertial sensors for biomedical applications.
Comprehend the design and development of various wearable activity monitoring devices for use in healthcare applications.
Acquaint the usage of wearable devices as assistive devices, diagnostic devices and other modern applications.
Design and develop various wearable devices for detection of biochemical and physiological body signals, environmental monitoring, safety and navigational assistive devices.
The objective of this course is to make students understand the methodologies used to visualize large data sets
Introduction: Context of data visualization – Definition, Methodology, Visualization design objectives. Key Factors – Purpose, visualization function and tone, visualization design options – Data representation, Data Presentation, Seven stages of data visualization, widgets, data visualization tools.
Visualizing Data Methods: Mapping - Time series - Connections and correlations – Indicator-Area chart-Pivot table- Scatter charts, Scatter maps - Tree maps, Space filling and non-space filling methods-Hierarchies and Recursion - Networks and Graphs-Displaying Arbitrary Graphs-node link graph-Matrix representation for graphs- Info graphics
Visualizing Data Process : Acquiring data, - Where to Find Data, Tools for Acquiring Data from the Internet, Locating Files for Use with Processing, Loading Text Data, Dealing with Files and Folders, Listing Files in a Folder ,Asynchronous Image Downloads, Advanced Web Techniques, Using a Database, Dealing with a Large Number of Files. Parsing data - Levels of Effort, Tools for Gathering Clues, Text Is Best, Text Markup Languages, Regular Expressions (regexps), Grammars and BNF Notation, Compressed Data, Vectors and Geometry, Binary Data Formats, Advanced Detective Work.
Interactive Data Visualization: Drawing with data – Scales – Axes – Updates, Transition and Motion – Interactivity - Layouts – Geomapping – Exporting, Framework – T3, .js, tablo
Security Data Visualization: Port scan visualization - Vulnerability assessment and exploitation - Firewall log visualization - Intrusion detection log visualization -Attacking and defending visualization systems – Creating security visualization system
Scott Murray, “Interactive data visualization for the web”, O‟Reilly Media, Inc., 2013.
Ben Fry, “Visualizing Data”, O‟Reilly Media, Inc., 2007.
Greg Conti, “Security Data Visualization: Graphical Techniques for Network Analysis”, No Starch Press Inc, 2007.
After the completion of this course, the students will be able to:
Understand the representation of complex and voluminous data
Design and use various methodologies present in data visualization
Understand the various process and tools used for data visualization
Use interactive data visualization to make inferences
Discuss the process involved and security issues present in data visualization
The objective of this course is to provide conceptual understanding of how block chain technology can be used to innovate and improve business processes.
Working with Consensus in Bitcoin: Distributed consensus in open environments, Consensus in a Bitcoin network, Proof of Work (PoW) – basic introduction, HashCash PoW, Bitcoin PoW, Attacks on PoW and the monopoly problem, Proof of Stake, Proof of Burn and Proof of Elapsed Time, The life of a Bitcoin Miner, Mining Difficulty, Mining Pool
Melanie Swan, “Block Chain: Blueprint for a New Economy”, O’Reilly, 2015
Josh Thompsons, “Block Chain: The Block Chain for Beginners- Guide to Block chain Technology and Leveraging Block Chain Programming”
Daniel Drescher, “Block Chain Basics”, Apress; 1stedition, 2017
Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
Imran Bashir, “Mastering Block Chain: Distributed Ledger Technology, Decentralization and Smart Contracts Explained”, Packt Publishing
Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build Smart Contracts for Ethereum and Block Chain”, Packt Publishing
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O’Dowd, Venkatraman Ramakrishna, “Hands-On Block Chain with Hyperledger: Building Decentralized Applications with Hyperledger Fabric and Composer”, Import, 2018
After the completion of this course, the students will be able to:
Understand block chain technology
Acquire knowledge of cryptocurrencies
Develop block chain based solutions and write smart contract using Hyperledger Fabric and Ethereum frameworks
Build and deploy block chain application for on premise and cloud based architecture
Integrate ideas from various domains and implement them using block chain technology in different perspectives
Course Objectives:
The objective of this course is to develop understanding of the two most important network technologies that will transform networks operated by Carrier Service Providers: Software Defined Networking (SDN) and Network Functions Virtualization (NFV).
UNIT I
Software Defined Networks: Background and Motivation, Evolving Network Requirements, The SDN Approach, SDN Architecture, SDN- and NFV-Related Standards
UNIT II
SDN Data Plane and OpenFlow: SDN Data Plane Functions and Protocols, OpenFlow Logical Network Device, OpenFlow Protocol; SDN Control Plane: SDN Control Plane Architecture, ITU-T Model, OpenDaylight, REST, Cooperation and Coordination Among Controllers; SDN Application Plane: SDN Application Plane Architecture, Network Services Abstraction Layer, Traffic Engineering, Measurement and Monitoring, Security, Data Center Networking, Information-Centric Networking
UNIT III
Network Functions Virtualization: Concepts and Architecture, Background and Motivation for NFV, Virtual Machines, NFV Concepts, NFV Benefits and Requirements, NFV Reference Architecture; NFV Functionality: NFV Infrastructure, Virtualized Network Functions, NFV Management and Orchestration, NFV Use Cases, SDN and NFV; Network Virtualization: Virtual LANs, OpenFlow VLAN Support, Virtual Private Networks, Network Virtualization, Software-Defined Infrastructure
UNIT IV
Defining And Supporting User Needs: Quality of Service, QoS Architectural Framework, Integrated Services Architecture, Differentiated Services, Service Level Agreements, IP Performance Metrics, OpenFlow QoS Support; QoE: User Quality of Experience: QoE, Service Failures Due to Inadequate QoE Considerations, Definition of Quality of Experience, Factors Influencing QoE, Measurements of QoE, Applications of QoE
UNIT V
Security: Security Requirements, SDN Security, NFV Security, Cloud Security, IoT Security Reference Books:
William Stallings, “Foundations of Modern Networking”, Pearson Education, 2016
Paul Goransson, “Software Defined Networks A Comprehensive Approach”, Morgan Kaufmann, Elsevier
Thomas D. Nadeau, Ken Gray, “Software Defined Networks”, O’Reilly
Guy Pujolle, “Software Networks”, Wiley
Course Outcomes:
On successful completion of this course the students will be able to-
Have knowledge of SDN concepts and technology
Know about the application areas that can be supported by SDN and provides a number of examples of SDN applications
Discuss NFV concepts, technology, and applications, as well as network virtualization
Understand quality of service (QoS) and quality of experience (QoE) to determine customer needs and network design responses to those needs
Analyse the security issues that have emerged with the evolution of SDN and NFV
The objective of this course is to provide an introductory and broad overview of the field of AI and ML.
Introduction to Artificial Intelligence: The History of AI, AI and Society, Agents, Knowledge based systems; Fields and Applications of Artificial Intelligence, Propositional Logic: First order Predicate Logic: Limitations of Logic
Search, Games and Problem Solving: Uninformed Search, Heuristic Search, Games with Opponents, Heuristic Evaluation Functions, State of the Art; Reasoning with Uncertainty: Computing with Probabilities, The Principle of Maximum Entropy, Reasoning with Bayesian networks
Machine Learning: Preliminaries, Examples of Machine Learning Applications, Data Analysis, Regression, The Perceptron, A Linear Classifier, The Nearest Neighbor method, Decision Tree Learning, Cross-Validation and Overfitting, Learning of Bayesian networks, The Naïve Bayes Classifier, One-class learning, Clustering
Neural Networks: From Biology to Simulation, Hopfield Networks, Neural Associative Memory, Linear Networks with Minimal Errors, The Back Propagation Algorithm, Support Vector Machines, Deep Learning, Applications of Neural Networks, Reinforcement Learning
Design and Analysis of Machine Learning Experiments: Factors, response and strategy of experimentation, Guidelines for machine learning experiments, cross-validation and resampling methods, Measuring classifier performance, Hypothesis testing, comparing multiple algorithms, comparison over multiple datasets
Wolfgang Ertel, “Introduction to Artificial Intelligence”, Second Edition, Springer, 2017
Nils J. Nilsson, “ Artificial Intelligence: A New Synthesis”, Morgan Kaufmann Publishers
David Forsyth, “Applied Machine Learning”, Springer
Ethem Alpaydin, “Introduction to Machine Learning”, Third Edition, The MIT Press, 2014
Mohssen Mohammed, Muhammad Badruddin Khan, Eihab Bashier Mohammed Bashier, “Machine Learning Algorithms and Applications”, CRC Press Taylor & Francis Group, 2017
Zsolt Nagy, “Artificial Intelligence and Machine Learning Fundamentals, Packt Publishing, 2018
On successful completion of this course the students will be able to-
Demonstrate fundamental understanding of artificial intelligence (AI)
Apply basic principles of AI in solutions that require problem solving, inference, perception, knowledge representation, and learning
Demonstrate proficiency in using models of machine learning
Apply knowledge of neural networks to solve various problems
Perform machine learning experiments
The objective of this course is to make students to learn how cyber security for the IoT works along with key technical details, process flows, definitions of terms and practical examples.
Fundamentals of encryption for cyber security: Cryptography – Need and the Mathematical basics- History of cryptography, symmetric ciphers, block ciphers, DES – AES. Public-key cryptography: RSA, Diffie-Hellman Algorithm, Elliptic Curve Cryptosystems, Algebraic structure, Triple Data Encryption Algorithm (TDEA) Block cipher
IoT security framework : IOT security frame work, Security in hardware, Bootprocess, OS & Kernel, application, run time environment and containers. Need and methods of Edge Security, Network Security: Internet, Intranet, LAN, Wireless Networks, Wireless cellular networks, Cellular Networks and VOIP
Elementary blocks of IoT Security & Models for Identity Management: Vulnerability of IoT and elementary blocks of IoT Security, Threat modeling – Key elements. Identity management Models and Identity management in IoT, Approaches using User-centric, Device-centric and Hybrid
Identity Management and Trust Establishment: Trust management lifecycle, Identity and Trust, Web of trust models. Establishment: Cryptosystems – Mutual establishment phases – Comparison on security analysis. Identity management framework
Access Control in IoT and light weight cryptography: Capability-based access control schemes, Concepts, identity-based and identity-driven, Light weight cryptography, need and methods, IoT use cases
Security and Digital Identity in Cloud Computing: Security, Digital identity management in cloud, Classical solutions, alternative solutions, Management of privacy and personal data in Cloud; Cyber Crimes, Hackers and Forensics: Cyber Crimes and Laws – Hackers – Dealing with the rise tide of Cyber Crimes – Cyber Forensics and incident Response – Network Forensics
John R. Vacca, “Computer and Information Security Handbook”, Elsevier, 2013.
Parikshit Narendra Mahalle , Poonam N. Railkar, “Identity Management for Internet of Things”, River Publishers, 2015.
William Stallings, “Cryptography and Network security: Principles and Practice”, 5th Edition, 2014, Pearson Education, India.
Maryline Laurent, Samia Bouzefrane, “Digital Identity Management”, Elsevier, 2015.
Joseph Migga Kizza, “Computer Network Security”, Springer, 2005.
Christof Paar and Jan Pelzl, “Understanding Cryptography – A Textbook for Students and Practitioners”, Springer, 2014.
Behrouz A.Forouzan : Cryptography & Network Security – The McGraw Hill Company, 2007.
Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security: “Private Communication in a public World”, PTR Prentice Hall, Second Edition, 2002.
Alasdair Gilchrist, “IoT security Issues”, Oreilly publications, 2017.
On successful completion of this course the students will be able to-
Design and implement cryptography algorithms
Solve network security problems in various networks
Build security systems using elementary blocks
Build Trustable cloud based IoT systems
Solve IoT security problems using light weight cryptography and appreciate the need for cyber security laws and methods.
The objective of this course is to discuss cloud and fog computing as an increasingly viable means of achieving enhanced monitoring and control of industrial processes, differentiate between Cloud and edge-fog computing and what role the two technologies will increasingly play in process control and automation.
Cloud Computing Fundamentals: Motivation for Cloud Computing, Defining Cloud Computing, Principles of Cloud Computing , Five Essential Characteristics, Cloud Ecosystem, Requirements for Cloud Services, Cloud Applications, Benefits and Drawbacks, Cloud Architecture, Network Connectivity in Cloud Computing, Managing the Cloud, Migrating Application to Cloud
Cloud Deployment Models: Private Cloud, Public Cloud, Community Cloud, Hybrid Cloud; Cloud Service Models: Infrastructure as a Service, Platform as a Service, Software as a Service, Their characteristics, Suitability, Pros and Cons, Cloud Service Providers
Technological Drivers of Cloud Computing: Virtualization, Approaches in Virtualization, Hypervisor and Its Role, Types of Virtualization; Memory and Storage Technologies, Networking Technologies, Web 2.0 and Web 3.0, Agile SDLC for Cloud Computing, Programming Models for Cloud Computing
Security in Cloud Computing: Security Aspects, Data Security, Virtualization Security, Network Security, Security Issues in Cloud Service Models, Audit and Compliance, Data Protection in the Cloud, Cloud Security as a Service; Advanced Concepts in Cloud Computing: Intercloud, Cloud Management, Mobile Cloud, Cloud Governance, Green Cloud, Cloud Analytics
Introduction to Fog Computing, Difference between cloud computing and fog computing, Fog Computing benefits and drawbacks, Applications of Fog computing, Role of Fog computing in Internet of Things, Need for Fog computation, Fog data processing layers.
K. Chandrasekaran, “Essentials of Cloud Computing”, CRC Press, 2015
Arshdeep Bahga, Vijay Madisetti, “Cloud Computing: A Hands-on Approach”, 2013.
Rajkumar Buyya, James Broberg, Andrzej Goscinski, “Cloud Computing: Principles and Paradigms”, Wiley
Rajkumar Buyya, Satish Narayana Srirama, “ Fog and Edge Computing: Principles and Paradigms”, Wiley
Assad Abbas, Samee U. Khan, Albert Y. Zomaya “Fog Computing: Theory and Practice”, Wiley, 2020
On successful completion of this course the students will be able to-
Articulate the main concepts, key technologies, strengths, and limitations of cloud computing
Identify the architecture and infrastructure of cloud computing, including SaaS, PaaS, IaaS, public cloud, private cloud, hybrid cloud, etc.
Have understanding of the Technological Drivers of Cloud Computing
Explain the core issues of cloud computing such as security, privacy, and interoperability and provide the appropriate cloud computing solutions and recommendations according to the applications used.
Attempt to generate new ideas and innovations in cloud computing and Fog computing.
The objective of this course is to introduce big data technology platforms and how these can be applied to IoT data.
Introducing IoT Analytics: Types of Data Sources, Understanding Big Data, Applications of Big Data Analytics, IoT Data and Big Data, Defining IoT Analytics, Challenges of IoT Analytics, IoT Analytics Lifecycle and Techniques
IoT, Cloud and Big Data Integration for IoT Analytics: Cloud-based IoT Platform, Requirements of IoT Big Data Analytics Platform, Functional Architecture, Data Analytics for the IoT, Characteristics of IoT Generated Data, Data Analytic Techniques and Technologies, Data Collection Using Low-power, Long-range Radios, IoT Analytics for the cloud
Searching the Internet of Things: A Search Architecture for Social and Physical Sensors, Local Event Retrieval, Using Sensor Metadata Streams to Identify Topics of Local Events in the City, Venue Recommendation, Development Tools for IoT Analytics Applications; IoT Analytics as a Service: Architecture for IoT Analytics- as-a-Service, Sensing-as-a-Service, Scheduling, Metering and Service Delivery, Sensing-as-a-Service Example, From Sensing-as-a-Service to IoT-Analytics- as-a-Service
Data Science for IoT Analytics: Machine Learning, Feature Engineering with IoT Data, Validation Methods, Bias, Variance, Comparing different Models to find the Best fit, Anomaly Detection, Forecasting, Deep Learning with IoT data; Strategies to organize data for Analytics; The Economics of IoT Analytics: Cost Considerations for IoT Analytics
IoT Analytics Applications and Case Studies: Data Analytics in Smart Buildings, Internet-of-Things Analytics for Smart Cities, Ethical IoT
John Soldatos, “Building Blocks for IoT Analytics”, River Publishers, 2017
Andrew Minteer, “Analytics for the Internet of Things”, Packt Publishing, 2017
On successful completion of this course the students will be able to-
Understand IoT Analytics Lifecycle and Techniques
Know the characteristics of IoT Generated Data
Use development tools for IoT Analytics Applications
Learn Machine Learning for IoT data
Understand IoT Data Analytics applications
The objective of this course is to make students to understand basic concepts of mobile application development.
Overview of Mobile App Development: Mobile Applications, A formula for designing engaging applications, Unique challenges for development of engaging applications, Enterprise mobile development, Mobile App Development Lifecycle Overview
Importance of Design, App Design issues and considerations, Scope of Design in Mobile App Development, Design Principles and Guidelines, Some Design Methods, Factors for choosing mobile app, Mobile App Architectural Components, Mobile App Flow, Mobile App Deployment Considerations
Building Mobile Apps Powered by Enterprise Backend, Connecting the Mobile App with Enterprise IT Services and Data, Types of IT Backend to Integrate from Mobile Apps, Type of API Protocols, Security Integration, Mobile Devices Security Considerations, Secured Data Store and Synchronization, Enterprise Mobile Application Management and Device Management, Special Challenges in Managing Mobile Applications and Devices
Quality, Cost of Quality, Automated versus Manual Testing, Preproduction versus Post release, Automated Mobile App Testing Considerations, Monetizing Apps, Publishing Apps
The Android Operating System, Working of Android Apps, Programming languages used for developing Android Apps, Android Studio, Emulators, General Procedure for developing an App
Leigh Williamson, Roland Barcia, Omkar Chandgadkar, Ashish Mathur, Soma Ray, Darrell Schrag, Roger Snook, Jianjun Zhang, “ Enterprise Class Mobile Application Development”, IBM Press Pearson plc, 2016
Jakob Iversen Michael Eierman, “Learning Mobile App Development”, Pearson Education, 2014
J. Paul Cardle, “Android App Development in Android Studio”, Manchester Academic Publishers
On successful completion of this course the students will be able to-
Understand the entire lifecycle involved in mobile app development
Design a mobile app
Understand Security considerations in mobile app development
Know about the range of techniques available for testing of Mobile Apps and understand when one approach is better than the others.
Follow general procedure for developing an App
The objective of this course is to familiarize the students with the need for development of wearable devices and its implications on various sectors.
Introduction to Wearable Devices: Motivation for development of Wearable Devices, The emergence of wearable computing and wearable electronics, Types of wearable sensors: Invasive, Non-invasive; Intelligent clothing, Industry sectors’ overview – sports, healthcare, Fashion and entertainment, military, environment monitoring, mining industry, public sector and safety.
Wearable Inertial Sensors: Accelerometers, Gyroscopic sensors and Magnetic sensors; Modality of Measurement- Wearable Sensors, Invisible Sensors, In-Shoe Force and Pressure Measurement; Applications: Fall Risk Assessment, Fall Detection , Gait Analysis, Quantitative Evaluation of Hemiplegic and Parkinson’s Disease patients; Physical Activity monitoring: Human Kinetics, Cardiac Activity, Energy Expenditure measurement: Pedometers, Actigraphs.
Wearable Devices for Healthcare: Wearable ECG devices: Basics of ECG and its design, Wearable EEG devices: Principle and origin of EEG, Basic Measurement set-up, Wearable Blood Pressure (BP) Measurement: Cuff-Based Sphygmomanometer, Cuffless Blood Pressure Monitor. Study of flexible and wearable Piezoresistive sensors for cuffless blood pressure measurement. Wearable sensors for Body Temperature: Intermittent and Continuous temperature monitoring, Detection principles; Noninvasive Glucose Monitoring Devices, wearable pulse oximeter
Wearable Cameras and Microphones for Navigation: Cameras in wearable devices, Applications in safety and security, navigation, Enhancing sports media, Automatic digital diary. Cameras in smart-watches; Use of Wearable Microphones: MEMS microphones, Bioacoustics, Microphones and AI for respiratory diagnostics and clinical trials. Wearable Assistive Devices for the Blind - Hearing and Touch sensation, Assistive Devices for Fingers and Hands, Assistive Devices for wrist, for arm and feet, vests and belts, head-mounted devices
Other Wearable Devices: Wearable devices with Global Positioning System (GPS) integration for tracking and navigation. Wearable Optical Sensors -chemical sensors, optical glucose sensors, UV exposure indicators, speech recognition using lasers; Photoplethysmography (PPG), 3D imaging and motion capture.
“Seamless Healthcare Monitoring”, Toshiyo Tamura and Wenxi Chen, Springer 2018
“Wearable Sensors -Fundamentals, Implementation and Applications”, by Edward Sazonov and Michael
R. Neuman, Elsevier Inc., 2014.
“Wearable and Autonomous Biomedical Devices and Systems for Smart Environment”, by Aimé Lay- Ekuakille and Subhas Chandra Mukhopadhyay, Springer 2010
After the completion of this course, the students will be able to:
Identify and understand the need for development of wearable devices and its influence on various sectors.
Discus the applications of various wearable inertial sensors for biomedical applications.
Comprehend the design and development of various wearable activity monitoring devices for use in healthcare applications.
Acquaint the usage of wearable devices as assistive devices, diagnostic devices and other modern applications.
Design and develop various wearable devices for detection of biochemical and physiological body signals, environmental monitoring, safety and navigational assistive devices.
The objective of this course is to make students understand the methodologies used to visualize large data sets
Introduction: Context of data visualization – Definition, Methodology, Visualization design objectives. Key Factors – Purpose, visualization function and tone, visualization design options – Data representation, Data Presentation, Seven stages of data visualization, widgets, data visualization tools.
Visualizing Data Methods: Mapping - Time series - Connections and correlations – Indicator-Area chart-Pivot table- Scatter charts, Scatter maps - Tree maps, Space filling and non-space filling methods-Hierarchies and Recursion - Networks and Graphs-Displaying Arbitrary Graphs-node link graph-Matrix representation for graphs- Info graphics
Visualizing Data Process : Acquiring data, - Where to Find Data, Tools for Acquiring Data from the Internet, Locating Files for Use with Processing, Loading Text Data, Dealing with Files and Folders, Listing Files in a Folder ,Asynchronous Image Downloads, Advanced Web Techniques, Using a Database, Dealing with a Large Number of Files. Parsing data - Levels of Effort, Tools for Gathering Clues, Text Is Best, Text Markup Languages, Regular Expressions (regexps), Grammars and BNF Notation, Compressed Data, Vectors and Geometry, Binary Data Formats, Advanced Detective Work.
Interactive Data Visualization: Drawing with data – Scales – Axes – Updates, Transition and Motion – Interactivity - Layouts – Geomapping – Exporting, Framework – T3, .js, tablo
Security Data Visualization: Port scan visualization - Vulnerability assessment and exploitation - Firewall log visualization - Intrusion detection log visualization -Attacking and defending visualization systems – Creating security visualization system
Scott Murray, “Interactive data visualization for the web”, O‟Reilly Media, Inc., 2013.
Ben Fry, “Visualizing Data”, O‟Reilly Media, Inc., 2007.
Greg Conti, “Security Data Visualization: Graphical Techniques for Network Analysis”, No Starch Press Inc, 2007.
After the completion of this course, the students will be able to:
Understand the representation of complex and voluminous data
Design and use various methodologies present in data visualization
Understand the various process and tools used for data visualization
Use interactive data visualization to make inferences
Discuss the process involved and security issues present in data visualization
The objective of this course is to provide conceptual understanding of how block chain technology can be used to innovate and improve business processes.
Working with Consensus in Bitcoin: Distributed consensus in open environments, Consensus in a Bitcoin network, Proof of Work (PoW) – basic introduction, HashCash PoW, Bitcoin PoW, Attacks on PoW and the monopoly problem, Proof of Stake, Proof of Burn and Proof of Elapsed Time, The life of a Bitcoin Miner, Mining Difficulty, Mining Pool
Melanie Swan, “Block Chain: Blueprint for a New Economy”, O’Reilly, 2015
Josh Thompsons, “Block Chain: The Block Chain for Beginners- Guide to Block chain Technology and Leveraging Block Chain Programming”
Daniel Drescher, “Block Chain Basics”, Apress; 1stedition, 2017
Anshul Kaushik, “Block Chain and Crypto Currencies”, Khanna Publishing House, Delhi.
Imran Bashir, “Mastering Block Chain: Distributed Ledger Technology, Decentralization and Smart Contracts Explained”, Packt Publishing
Ritesh Modi, “Solidity Programming Essentials: A Beginner’s Guide to Build Smart Contracts for Ethereum and Block Chain”, Packt Publishing
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O’Dowd, Venkatraman Ramakrishna, “Hands-On Block Chain with Hyperledger: Building Decentralized Applications with Hyperledger Fabric and Composer”, Import, 2018
After the completion of this course, the students will be able to:
Understand block chain technology
Acquire knowledge of cryptocurrencies
Develop block chain based solutions and write smart contract using Hyperledger Fabric and Ethereum frameworks
Build and deploy block chain application for on premise and cloud based architecture
Integrate ideas from various domains and implement them using block chain technology in different perspectives
Course Objectives:
The objective of this course is to develop understanding of the two most important network technologies that will transform networks operated by Carrier Service Providers: Software Defined Networking (SDN) and Network Functions Virtualization (NFV).
UNIT I
Software Defined Networks: Background and Motivation, Evolving Network Requirements, The SDN Approach, SDN Architecture, SDN- and NFV-Related Standards
UNIT II
SDN Data Plane and OpenFlow: SDN Data Plane Functions and Protocols, OpenFlow Logical Network Device, OpenFlow Protocol; SDN Control Plane: SDN Control Plane Architecture, ITU-T Model, OpenDaylight, REST, Cooperation and Coordination Among Controllers; SDN Application Plane: SDN Application Plane Architecture, Network Services Abstraction Layer, Traffic Engineering, Measurement and Monitoring, Security, Data Center Networking, Information-Centric Networking
UNIT III
Network Functions Virtualization: Concepts and Architecture, Background and Motivation for NFV, Virtual Machines, NFV Concepts, NFV Benefits and Requirements, NFV Reference Architecture; NFV Functionality: NFV Infrastructure, Virtualized Network Functions, NFV Management and Orchestration, NFV Use Cases, SDN and NFV; Network Virtualization: Virtual LANs, OpenFlow VLAN Support, Virtual Private Networks, Network Virtualization, Software-Defined Infrastructure
UNIT IV
Defining And Supporting User Needs: Quality of Service, QoS Architectural Framework, Integrated Services Architecture, Differentiated Services, Service Level Agreements, IP Performance Metrics, OpenFlow QoS Support; QoE: User Quality of Experience: QoE, Service Failures Due to Inadequate QoE Considerations, Definition of Quality of Experience, Factors Influencing QoE, Measurements of QoE, Applications of QoE
UNIT V
Security: Security Requirements, SDN Security, NFV Security, Cloud Security, IoT Security Reference Books:
William Stallings, “Foundations of Modern Networking”, Pearson Education, 2016
Paul Goransson, “Software Defined Networks A Comprehensive Approach”, Morgan Kaufmann, Elsevier
Thomas D. Nadeau, Ken Gray, “Software Defined Networks”, O’Reilly
Guy Pujolle, “Software Networks”, Wiley
Course Outcomes:
On successful completion of this course the students will be able to-
Have knowledge of SDN concepts and technology
Know about the application areas that can be supported by SDN and provides a number of examples of SDN applications
Discuss NFV concepts, technology, and applications, as well as network virtualization
Understand quality of service (QoS) and quality of experience (QoE) to determine customer needs and network design responses to those needs
Analyse the security issues that have emerged with the evolution of SDN and NFV