0% found this document useful (0 votes)
111 views19 pages

Cse 4-1 4-2

Uploaded by

kirrudec26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
111 views19 pages

Cse 4-1 4-2

Uploaded by

kirrudec26
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 19
ADIKAVI NANNAYA UNIVERSITY Course Structure TV B.Tech —I Semester CSE (From the admitted batch of 2016-20P under CBCS Scheme) HrsWeek | sub Code | SUBJECT enters 4 Cred cse701_| WEB TECHNOLOGIES [eagle 4 I ELECTIVE-II ' af | (SOFT COMPUTING aes e CSE GRID COMPUTING: - _ = 7 10 p CLOUD COMPUTIN \ ELECTIVE | je pee (SOFTWARE TESTING AND eros | QUALITY ASSURANCE Jee : CSETON | CYSER SECURITY AND _ ; ba i‘ FORENSICS, SOCIAL NETWORK ANALYSIS) CSE705 | WEB TECHNOLOGIES LAB aera 30 CSE706 | DATA ANALYTICS 1.AB fo = | 3 | 50. “INDUSTRIAL TRAINING | ASSESSMENT TOTAL 16 6 300 400 700 20 CSE707 *Industrial Trai ing Assessment marks will not be considered for SGPA/CGPA calculation. ca TV B.Tech — II Semester CSE rom the admitted batch of 2016-2017 under CBCS Seheme) [_HrsWeek. sub Code | sti [theory 1 bab_| Tate : inCode | SUBJECT [Theory T Lab i [Bi SS INTELL VISUALIZATION 7B | execrivesy Cc | INTERNET OF THINGS plese MACHINE LEARNINt BLOCK CHAIN TECHNOLOGIES CSE803_ | PROJECT BTCSE701 WEB TECHNOLOGIES Theory 24 Hrshweek Credits Int Marks _:25 Ext Marks UNIT- 1 Introduction: The World Wide Web, Web Browsers, Web Servers, Uniform Resource Locators, Introduction and Web Development Strategies, History of Web and Internet, Protocols governing Web, Connecting to Internet, Introduction to Internet services and tools. Introduction to client-server computing. Introduction to HTML/XHTML: Origins and Evolution of HTML and XHTML. Basic Syntax. of HTML, Standard HTML Document Structure, Basic Text Markup, Images. Hypertext Links, Lists, Tables, Forms, HTML: syntactic Differences between HTML and XHTML Introduction to Java Seript: Objects in Java Script. Dynamic HTML. Java Script — declaring variables, scope of variables, functions, even handlers (onclick, onsubmit....cte). form validations UNIT- IT XML: Introduction to XML, Defining XML tags, their attributes and values, Document Type Definition, XML Schemes, Document Object Model, XHTML Parsing XML Data — DOM and SAX Parsers in java. XML AJAX A New Approach: Introduction to AJAX Consuming WEB services in AJAX: (SOAP, WSDL). Introduction to PERL: Perl language elements, Interface with CGI- A form to mail program, ple page search UNIT- 1 Introduction to Servlets: Common Gateway Interface (CGI), Life cygle of a Servlet, deploying a servlet, The Servict API, Reading Servlet parameters. Reading Initialization parameters, Handling Hup Request & Responses, Using Cookies and Sessions, connecting to a database using JDBC. : Introduction to JSP: The Anatomy of a ISP Page, JSP Processing, Declarations. Directives, Expressions, Code Snippets, implicit objects, Using Cookies and session for session tracking, connecting to database in JSP. UNIT- IV Introduction to PHP: Declaring variables, data types. arrays, strings, operators. expressions, control structures, functions, Reading data from web form controls like text boxes, radio buttons, and lists etc., Handling File Uploads. Connecting to database (MySQL as reference). executing simple queries, handling results, Handling sessions and cookies File Handling in PHP: File operations like opening, closing, reading, writing, appending, deleting ete. on text and binary files, listing directories. TEXT BOOKS: |. Deitel H.M. and Deitel P.J., “Intemet and World Wide Web How to program”, Pearson International, 2012, 4th Edition, (Ch-1.4,5,6,12.14.26.27) Programming the World Wide Web, Robet W Sebesta, Jed, Pearson. Advanced Java 2 Platform How to Program, Deitel/Deitel/S 4. Java Server Pages Hans Bergsten, SPD O'Reilly 5. The Complete Reference PHP — Steven Holzner, Tata McGraw-Hill ntry 3 BTCSE702: BIG DATA ANALYTICS Hrs/week Credits 4 25 Ext Marks a ‘Theory Int Marks UNIT -1 Introduetion to Big Data: Big Data-definition, Characteristics of Big Data (Volume. Variety, Velocity, Veracity, Validity), Importance of Big Data , Patterns for Big Data Development, Data in the Warehouse and Data in Hadoop. Introduction to Hadoop: Hadoop- definition, Understanding distributed systems and Hadoop, Comparing SQL databases and Hadoop, Starting Hadoap - The building blocks of Hadoop, NameNode, DataNode, Secondary NameNode, JobTracker and Task Tracker UNIT I Real Time Analytics- Examles, What is Apache Spark, Why Spark when Hadoop is there, Spark Features, Getting started with Spark, Spark Eco System, Architecture and its working. Data Structures of Spark, Spark components, Using Spark with Hadoop. Usecase MapReduce Programming: Writing basic Map Reduce programs - Getting the patent data set, constructing the basic template of a Map Reduce program, Counting things. UNIT HT Streaming in Spark, Streaming features, Streaming Fundamentals, Use case on streaming, Machine Learning, Spark MLlib Overview, Tools, Algorithms-Classification, R Clustering, Dimensionality Reduction, Feature Extraction MapReduce Advanced Programming- Chaining Map Reduce jobs, joining data from different sources, Useease, ession, UNIT IV Graph Representation in MapReduce: Modeling data and solving problems with graphs. Shortest Path Algorithm, Friends-of-Friends Algorithm, PageRank Algorithm, Bloom Filters Graph Analyties in Spark, Spark GraphX, GraphX features, GraphX Examples. Usecase Programming with RDDs-Baises, Creating RDDs. Operations, Passing Functions to Spark, Common Transformations and Actions, Persistence, Adding Schemas to RDDs, RDDs as Relations, Creating Pairs in RDDs, Transformations and actions on RDDs. Spark SQL, Overview, Libraries, Features. Querying using Spark SQL TEXT BOOKS: 1. Understanding Big Data Analytics for Enterprise Class Hadoop and Streaming Data by Ditk deRoos, Chris Eaton, George Lapis, Paul Zikopoulos, Tom Deutsch, Ist Pdition, TMH,2012. Learning Spark: Learning Big Data Analysis: Karau etc., O"reilly Publications, !adoop in Action by Chuck Lam, MANNING Publishers. Hadoop in Practice by Alex Holmes, MANNING Publishers ERENCE BOOKS: Hadoop: The Definitive Guide by Tom White, 3rd Edition. O'reilly Big Java Fourth Edition Cay Horstmann Wiley, John Wiley & Sons 2 of massive datasets, AnandRajaraman, Jeffrey D Ullman, Wiley Publications DEPLETES TESTS TITTIES EES BTCSE703 OFT COMPUTING (Elective Theory Hrsiweek Credits 4 Int Marks _: 25 Ext Marks 3 UNITI Soft Computing: Introduction to Fuzzy Computing, Neural Computing, Genetic Algorithms, Associative Memory, Adaptive Resonance Theory, Different Tools and Techniques. Usefulness and Applications. Fuzzy Sets and Fuzzy Logie: Introduction, Fuzzy Sets Versus Crisp Sets. Operations on Fuzzy Sets, Extension Principle, Fuzzy Relations and Relation Equations, Fuzzy Numbers. Linguistic Variables, Fuzzy Logic, Linguistic Hedges, Applications, UNIT Interference in fuzzy logic: fuzzy if-then rules, Fuzzy implications and Fuzzy algorithms, Fuzzifications and Defuzzification, Fuzzy Controller, Fuzzy Controllers, Fuzzy Patten Recognition, Fuzzy Image Processin Artificia Neur: Fuzzy Database. 1 Neural Network: Introduction, Arti ‘al_network architecture: single layer and multilayer feed forward networks. re-current jal Neuron and its model, activation functions, networks. Various leaning techniques, perception and convergence rule, Auto-associative and hetro-associative memory , Hebb's Multilayer Feed Forward Network: Back Propagation Algorithms, Convergence of Multilayer Perceptron, Competitive Learning, Self-Organizing Adaptive Resonance Theory. arming, Adaline, Perceptron. UNIT UL ferent Issues Regarding Feature Maps, Associative Memories, Applications. Evolutionary and Stochastic Techniques: Genetic Algorithm (GA), Genetic Representations, (Encoding) Initialization and Selection, Different Operators of GA, Analysis of Selection Operations, Hypothesis of Building Blocks, Schema Theorem and Convergence of Cienetic Algorithm, Simulated Annealing and Stochastic Models, Boltzmann Machine. Applications. UNIT IV Rough Set; Introduction, Imprecise Categories Approximations and Rough Sets. Reduction of Knowledge, Decision Tables and Applications: Hybrid Systems: Neural-Network-Based Fuzzy Systems, Fuzzy Logic-Based Neural Networks, Genetic Algorithm for Neural Network Design and Learning, Fuzzy Logic and Genetic Algorithm for Optimization, Applications TEXT BOOKS: 1 REF 1 4 Neural Networks, Fuzzy Logic and Genetic Algorithm: Synthesis and Applications, S. Rajsekaran and G.A. VijayalakshmiPai, Prentice Hall of India. Rough Sets, Z.Pawlak, Kluwer Academic Publisher, 1991 Intelligent Hybrid Systems, D. Ruan, Kluwer Academie Publisher, 1997 ‘ERENCE BOOKS: Antificial Intelligence and Intelligent Systems, N.P,Padhy, Oxford University Press . Neural Fuzzy Systems, Chin-Teng Lin & C. S. George Lee, Prentice Hall PTR. Learning and Soft Computing, V. Keeman, MIT Press, 2001 Fuzzy Sets and Fuzzy Logic, Klir& Yuan, PHI, 1997 BTCSE703 GRID COMPUTING (Elective-H1) ‘Theory 24 Hrshweek Credits 4 Int Marks _:25 Ext_ Marks 27 UNIT troduction :Evolution of Distributed computing: Scalable computing over the Imemet = Tectmologies for network based systems ~ clusters of cooperative computers ~ Grid comput Infrastructures — cloud computing — service oriented architecture Introduction to Grid Architecture and standards ~ Elements of Grid — Overview of Grid Architecture UNIT Grid Services and virtualization : Introduction to Open Grid Services Architecture (US) Motivation — Functionality Requirements ~ Practical & Detailed view of OGSA/OGS! Data. Tmtensive grid service models - OGSA services. Cloud deployment models: public. private, hybrid, community Categories of Cloud Computing: Everything as a service: Infrastructure, platform. software - Pans nd Cons of cloud computing ~ Implementation levels of virtualization ~ viruali/allo structure — virtualization of CPU, Memory and I/O devices — virtual clusters and Resource Management ~ Virtualization for data centre automation. UNIT IIL Programming Model: Open source grid middleware packages Globus Toolkit (GTA) Architecture , Configuration ~ Usage of Globus ~ Main components and Prograrmimint, model ~ Ihneduction to Hadoop Framework ~ Mapreduce, Input splitting, map and reduce Tunctions, specifying input and output parameters. configuring and running a 39). Design of Hadoop file system, HDFS concepts, command Tine and java interface, dataflow of File read & File write UNIT IV. Seeurity: Trust models for Grid security environment — Authentication and Authorisation seehoke — Grid security infrastructure ~ Cloud Infrastructure security: network host and application level aspects of data security, provider data and its Set) Identity and access mnanagement architecture, IAM practices in the cloud, SaaS, PaaS, TsaS availability in the cloud, Key privacy issues in the cloud. TEXT BOOKS: Pe Nea Hwang, Geoffery C. Fox and Jack J. Dongarra, “Distributed and Cloud Computing! Clusters; Grids, Clouds and the Future of Intemet”, First Edition, Morgan Kaufinan Publisher, an Imprint of Elsevier, 2012. REFERENCE BOOKS: Reeeee Vener, “Pro Hadoop- Build Sealab, Distributed Applications inthe Cloud”. \ Press, 2009 Fem White, “Hadoop The Definitive Guide”, First Edition, OReilly. 2009 5 Bort Jacob (Editor), “Introduction to Grid Computing”, IBM Red Books, Vervante, 2008 + eeRoster, Carl Kesselman, “The Grid: Blueprint for a New Computing AA 4 Faederie Magoules and Jie Pan, “Introduction to Grid Computing CRC Press. 2009 OT 74 = = oe BICSE703 CLOUD COMPUTING Electiv ell) a i. Theory 24 Hrsveek Credits 4 2 Int Marks _:25 Ext_ Marks 37 ‘, UNIT -1 ned Introduction: Ove! Peer-to-Peer Systems, Cloud Computing-Delivery Models. service Ethical Issues and Vulnerabilities, Overview of Parallel and Distributed Systems . Cloud Infrastructure: Cloud Computing (At Amazon ‘At Google, Microsoft Windows \ure) > Private Clouds, Cloud Storage, Cloud Computing Interoperability (The Inter loud), Responsibility Sharing Between User and Cloud Service Provider. Cloud, Computing (Applications and Paradigms): Challenges. Architectural styles, Workflows, The Zoo Keeper, The MapReduce Patgrammings Modell High Performance Computing on Cloud. UNIT =U Layering and Virtualization, Virtual Mact ipport for Virtualization. T Policies and Mechanisms for Resource Scheduling on a Cloud, Stability of s Pull Cloud Resource Virtualization: ‘Virtualization and Para v irtualization, Hardware Suy Cloud Resource Management and Schedulin; gement, Applications of Control Theory to Task S Level Resource Allocation Architecture, Resource Bundlin ‘Combinatorial Auctions for Resources). Scheduling Algor ithms for Computing Clouds, Fair Queuir Start-fime Fair Queuing, Cloud Scheduling Subject to Deadlines. Scheduling MapReduce Applications Subject to Deadlines, UNIT - HI Storage System: The Evolution, Storage Models, File = General Parallel File Systems, Google File sms, and Databases. Distributed File ystems, Apache Hadoop. locks and Systen Chubby. BigTable, Megastore. ‘Cloud Security: Security Risks, Security (The Top Concern for Cloud Users), Privacy and Privacy Impact Assessment, Trust, OS. Seurity, VM Security, Security of Virtualization. Soar Breaking the Monolithic Design of the TCB UNIT -IV Amazon Web Services: EC2 Cloud Application How to (d Simulation of a Distributed Trust Cloud Application Development: install Hadoop in Eclipse on a Windows System, Cloud-Bas Algorithm. Case Study: The GrepTheWeb Application. Xen, a VMM Based on Para virt Migrating an enterprise IT System to Ia jon. ‘TEXT BOOKS: 1. Cloud Computing: Theory and Practice, Dan Elsevier C. Marinescu, Morgan Kaufmann REFERENCE BOOKS: 1. Distributed and Cloud Computing, Kai Hwang, Geoffrey C.Fox. Jack J.Dongarra. Monsan Kaufmann, 1° Edition, 2011 2, Cloud Computing-A Practical Approach, Raihanyarienveliny aobyed veil Elsenpeter. MeGrawHill RBICSE704 SOFTWARE TESTING AND QUAI ITY ASSURANCE(E! Theory 24 Hrsiweek Cre Int Marks _:25 UNITI Basic concepts of quality and testing: Quality revolution, Software Quality. Role of Verification and validation, Failure, Error, Fault and Defect, Objectives of testing. Whe veraae, Expected Outcome, Testing activities, Test Levels, Sources of information | Case selection Tait testing: Unit testing basies, Static Unit testing. Defect prevention, Dynamic Mutation Testing, Debugging, Unit testing in extreme program Tools for unit testin: Control flow testing: Outline of Control flow testing. ‘Control flow graph and Paths. Path Scuetion Criteria: All-path coverage eriterion, Statement covert criterion, Branch coverage it testing, jon, Predicate coverage criterion, Generating test input, test data selection. UNIT IL Data flow testing: General idea, Data flow anomaly, Data flow graph, Data flow terms Data flow testing criteria, Domain testing: Domain error, Testing for domain errors, Sources of domains. Types of domain 1s. ON and OFF points, Test selection criterion Integration testing: Concept of integration testing, Different types of interfaces and interlace ror, System integration techniques: Incremental Top down, Bottom up. Sandwich asl Big Fang, Test plan for system integration, Off-the- shelf ‘component integration. UNIT HT Software Quality Assurance (SQA) :The uniqueness of SQA, The environments for hich SQA methods are developed, what is software, Software errors, faults and Failures. classification of the causes of software errors, software quality-definition, SQA ~definition and able Software quality factors: Classification of software requirements into software quali Product operation, product revision, Product transition Software quality assurance system: The SQA sytenae SQA architecture: Pre-proiect components, Software project life eyele components Infrastructure components, Management SQA components. y UNITIV CASE tools for software quality: What is a C ASE tool? The contribution of CASE tools software product quality, The contribution of C ASE tools to improved project mana Software quality metrics: Objectives of measurement, Classification of quality metric metres, Product metrics, Implementation of quality metrics Limitations of metries Quality management standards: The scope of quality management standards, 10 9001 and ISO 9000-3, Capability monly models CMM and CMMI assessment methodole The Bootstrap methodology. The SPICE project and the ISO/EC 15504 software process assessments standard Text books: 1. Software Testi Wiley Public 2, Software Quality Assurance: From theory 19 implementation. Daniel Galin. Parson Adison Wesley Publication. ‘and Quality Assurance. Kshirasagar Nail PriyadarshiTriparhy. John BTCSE704 CYBER SECURITY AND FORENSICS(Ele« Theory 24 Hrs/week Credits: Int Marks 25 Ext Marks UNITE Network and Security Concepts-Information Assurance Fundamentals, Basie Cryptogiphy. Symmetric Encryption, Public Key Eneryption, The Domain Name System (DNS). Firewalls, Virtualization, Radio-Frequency Identification, Microsoft Windows Security Principles-Windows Tokens, Window Messa Windows Program Execution, Windows Firewall UNIT IL Attacker Techniques and Motivations-How Hackers Cover Their Tracks (Antifore: ics), Tunneling Techniques. Fraud Techniques- Phishing, Smishing, Vishing and Mobile Malicious Code. R aunt virus, Click fraud, Threat infrastructure UNIT HT Exploitation Techniques to Gain a Foothold- Shelleode, Integer Overflow Vulnc ab lities, Format String Vulnerabilities, SQL Injection, Malicious PDF Files, Web Exploit Tools 1 Conditions, Brute Force and Dictionary Attacks, Misdirection, Reconnaissance, and Disruption Methods- Cross-Site Scripting (XSS), Social Engineering, WarXing, DNS Amplification Attacks. UNIT IV Computer Forensics-Introduction, The History of Forensies, The Objectives of Computer Forensi and Ri . Computer-Facilitated Crimes, Reasons for Cyber Attacks, Computer Forensic “Lins s, Computer Forensics, The Computer Forensics Lab, Laboratory Strategie Business, Elements of Facilities Build-out, Electrical and Power Plant Considerations. Fs ‘ial Laboratory To« TEXT BOOKS: 1. Cyber Security Essentials, James Graham, Ryan Olson & Richard Howard, CRC 11s. Taylor & Francis group The Official CHFI Study Guide for Computer Hacl Investigator by Dave Kleiman 2 Forensic REFERENCE BOOKS 1. Security Engineering, Ross J Anderson, 2/e . Wiley Publishing Inc. 2. Computer Forensics Investigating Network intrusion & Cyber erime, EC-Coum Pr 3, Digital Forensics with Open Source Tools. Cory Altheide, Harlan Carvey. Ray Davie on BTCSE704 SOCIAL NETWORK ANALYSIS(Elective-II1) Theory 24 Hrsiweek Credits Int Marks _:25 Ext_ Marks UNIT INTRODUCTION : Introduction to Semantic Web: Limitations of current Web - De of Semantic Web - Emergence of the Social Web - Social Network analysis: Deve Social Network Analysis - Key concepts and measures in network analysis - Fleetro ‘or network analysis: Electronic discussion networks, Blogs and online communit based networks - Applications of Social Network Analysis, UNIT Il MODELLING, AGGREGATING AND KNOWLEDGE REPRESENTATION : On and their role in the Semantic Web: Ontology-based knowledge Representation — On' log} languages for the Semantic Web: Resource Description Framework - Web Ontology | anp) ve = Modelling and aggregating social network data: State-of-the-art in network data represent on Ontological representation of social individuals - Ontological representati relationships - Aggregating and reasoning with social network data - Advanced represe tat ns UNIT EXTRACTION AND MINING COMMUNITIES IN WEB SOCIAL NETY OLS Fxtracting evolution of Web Commumity from a Series of Web Archive - Detecting comma ties in social networks - Definition of community - Evaluating communities - Mviho’s for community detection and mining - Applications of community mining algorithms - Toc's for detecting communities social network infrastructures and communities - Decentralized 9!ine social networks - MultiRelational characterization of dynamic social network commun ics UNIT IV PREDICTING HUMAN BEHAVIOUR AND PRIVACY ISSUES + Understoy din and predicting human behaviour for social communities - User data management - Inf‘cn ind Distribution - Enabling new human experiences - Reality mining - Context = Awarcves - Privacy in online social networks - Trust in online environment - Trust models >e: on subjective logic - Trust network analysis ~ Trust transitivity analySis - Combining tray and reputation - Trust derivation based on trust comparisons - Attack spectrum and counter nea: es. VISUALIZATION AND APPLICATIONS OF SOCIAL NETWORKS : Graph thos = Centrality « Clustering - Node-Edge Diagrams - Matrix representation - Visualizing oy/ine ia} networks, Visualizing social networks with matrix-based representations - Matrix and Sod | ink Diagrams. TEXT BOOKS: Peter Mika, —Social Networks and the Semantic Web|. First Edition, Springer 20) > Borko Furht, —Handbook of Social Network Technologies and Applications]. !s1 von. Springer. 2010 REFERENCES: 1. Guandong Xu .Yanchun Zhang and Lin Li, —Web Mining and Social Network iy Techniques and applications”), First Edition, Springer, 2011 2. Dion Goh and Schubert Foo, —Social information Retrieval Systems: Em nologies and Applications for Searching the Web Effeetively’ , IGI Global Snippet. 2008 3. Max Chevalier, Christine Julien and Chantal Soulé-Dupuy, —Collabor ial Information Retrieval and Access: Techniques for Improved user Modelling. 101 ( (bal Snippet, 2009. 4, John G. Breslin, Alexander Passant and Stefan Decker, —The Social Semar : Springer, 2009, aN BICSE70S WEB TECHNOLOGIES LAB Theory 24 Hrsiweek Credits Int Marks _:50 Ext Marks List of Experiments: 1. Create web pages for an application demonstrating the working of different satures of HTML and DHTML » Demonstrate the use of CSS in organizing the layout of Web? Tinplement at least two Java Seript programs 10 ‘demonstrate the working of 3, Conditional statements 4. Looping statements. Arrays 6. Functions. Event handling 8. Validation controls. Develop simple applications for the following ave xcrcige client server programming using Java Script Servlets, ASP. ISP 10, Create a web application with database connectivity and work on different queries data manipulation. 11, Implement the following: Perl scripting PHP Python. ages REFERENCE BOOK: 4 L.Web Technologies, Godbole, Kahate, 2™ Ea,, TMH internet & W ‘orld Wide Web How to program. Dietel & Deitel F ‘ourth Edition, PH! 3 Web Programming, building internet applications. 2" feg,, Chris Bates, Wiley Dream te 4.The complete Reference HTML and DHTML . Thomas A. Powey Core Servlets and Java Server Pages. Marty Hall Larry Brown, Sec ws BICSE706 DATA ANALYTICS LAB Theory 24 Hesiweeks Credits Int. Marks _:50 Ext. Marks : List of Experiments: |. Install Hadoop > Install Spark on top of Hadoop {Tarn Basic commands and funetions in Spark 4 Execute a Word Count example in Spark Shell by crestite RDDs, © Decian a Real Time Earthquake Detection Model to send life saving alerts. which > rove its machine learning to provide near real-time computation results. 6. Design a Twitter Sentiment Analysis System ‘where we populate real-time sentiments for <7 Sis » nagement, service adjusting and target marketing eptikd 2 Movie Recommendation System which fecommends movies based on a Us preferences using Apache Spark Pre vrite a User Defined Funetion to convert a given CX! to Uppercase, ‘vse Real-Time Flight data using Spark sraphX, provide near real-time comput soogle Data Studio to visualize above analysis Google Data Studio is a product « Analytics 360 Suite. Use Geo Map service 19 Tp the Airports on their respec!iv<¢ a pn the USA/India map and display the metries quantity Display the total number of flights per Airport Display the metric sum of Destination routes From eV Sty Airport Display the total delay ofall fights pet AirPort Course Structure and Syllabus IV BTech 1 Semester CSE (From the admitted batch of 2016-207 under CBCS Scheme) sop Coae SuWFET eck | Max Maria te SACSEROT (BUSINESS INTELLIGENCE AND [4 ies WVISUALIZATION | | is Seria ie te [ELECTIVE-V {INTERNET OF THINGS MACHINE LEARNING BLOCK CHAIN TECHNOLOGIES)| | BICSE802 BTCSESOS PROIECT ee SS TOTAL BTCSE 801 BUSSINESS INTELLIGENCE AND VISUAL Theory :4 Hrs/Week Credits Internal:25, Fxter UNITI Business intelligence Effective and timely decisions — Data, information and knowledge ~ Role of ma'hemaical ‘dels — Business intelligence architectures: Cycle of a business intelligence analy ng factors in business intelligence projects Development of a business intell ies nd business intelligence. UNIT IL Knowledge delivery The business intelligence user types, Standard reports, Interactive Analysis ani Ad loc Querying, Parameterized Reports and Self-Service Reporting, dimensional dali <8. SlertNetifications, Visualization: Charts, Graphs, Widgets, Scorecards. and boards, Geographic Visualization, Integrated Analytics, Considerations: Optimizing the Pr for he Right Message. UNIT HE Efficiency Efficiency measures — The CCR model: Definition of target objes Pe - Identification of good operating practices; eross efficiency analysis — virtual inputs « s- Other models. Pattem matching — cluster analysis, outlier analysis UNIT IV intelligence applications Marketing models — Logistic and Production models ~ Case studies Future of business intelligence Future of business intelligence — Emerging Technologies, Machine Learning. Predicting the Future, BI Search & Text Analytics ~ Advanced Visualization — Rich Report. Tu and. Technolog: TEXT BOOK: 1. Efraim Turban, Ramesh Sharda, Dursun Delen, “Decision ‘Support Bi oss Intelligence Systems”, 9th Edition, Pearson 2013: REFERENCE BOOKS: Larissa T. Moss, S. Atre, “Business Intelligence Roadmap: The Com ect Addison Wesley, 2003. Lifecycle of Decision Making Carlo Vercellis, “Business Intelligence: Data Mining and Optimization for Decvion Making”, Wiley Publications, 2009 David Loshin Morgan, Kaufman, “Business Intelligence: Th Second Edition, 2012 4. Cindi Howson, “Successful Business Intelligence: S: McGraw-Hill, 2007. Ralph Kimball , Margy Ross Warehouse Lifecycle Toolki wy Manager's Guile”, crets to Making Bla Kill: Warren Thornthwaite, Joy Mundy. Bob Becks! | Wiley Publication Inc..2007. Tlidddd ddd 00ST ES, BTCSE 802 INTERNET OF THINGS (Elective lV) Theory 4 Hrsiweek. Credits 1 Int Marks 5 Ext Marks Introduction to Internet of Things: Definition & Characteristics of lo. Physic IoT Logical Design of foT, JoT Enabling Technologies, 107 Levels & Deployme Home,Government, Citics, Environment, Energy systems, Logistics Io Use cases: Health & Life style UNIT =H 1OT & M2M: Introduction, M2M, Difference between IoT and M2M, SDN and N Need for [oT Systems Management, Simple Network Management Protocol Limitations of SNMP, Network Operator Requirements, NETCONF. YANG. | Management with NETCONF-YANG UNIT - IIL IoT Platforms Design Methodology: IoT Design Methodology. Case Study on Io! Weather Monitoring, , Motivation for Using Python , loT Systems - Logical De: Python , Python Data Types & Data Structures “Control Flow , Funetior vython Packages of Inte Installs Packages , File Handling 1, Date/Time Operations , Class UNIT -1V About the Board . Linux on | Jot Physical Devices & Endpoints: Raspberry Pi i with Python , Other loT Raspberry Pi Interfaces . Programming Raspberry Pi Phscical Servers & Cloud Offerings , Introduction to Cloud Storage Models & Ce Apis, WAMP - AutoBahn for loT , Xively Cloud for 1oT » Python ‘Web Applicatio, - Django ya and V.Madisetti, Univesity Press. 2015 REFERENCE BOOK: Ri rdamentals of Python, K.A.Lambert and B.LJuneja, Cengage l-earnin of tes jeull ae, al NMI’) Systems. stem for for Lo oT nies ion mework TELE SS ESTES TEESE TEE EE ELLOS BA BICSE802: MACHINE LEARNING (Elective-TV) Theory 24 Hrsweek Credits Int Marks _:25 Ext Marks UNIT -1 Introduction - Well-posed learning problems, Designing @ learnt suse in machine learning Concept learning and the general to spec A concept leaming, task, Coneept camming as search, Find-S finding a maxi system, Persp ordering - | didate elimination algorithm, Remarks on \ hypothesis, Version spaces and the and candidate elimination, Inductive bi UNIT -IT Decision Tree learning — Introduction, Decision tree representation, Appropriate P se sea tree learning, ‘The basic decision tree learning algorithm. Hypothesis sp ree learning, Issues in deeision tre cision tree leaming, Inductive bias in decision u artificial Neural Networks — Introduction, Neural network representétion. ates for neural network learning, Perceptions, Multilayer networks. a ation algorithm, Remarks on the back propagation algorithm, An illustrative ¢ nition Advanced topics in artificial neural networks UNIT - 11 Bayesian learning — Introduction, Bayes theorem, Mosimum likelihood and least squared error hypotheses, Maximum likelihood h pe probabilities, Minimum description length principle. Bayes opty! al cla resifier, An example learning to classify text, Bayesian bel Bayes theorem and conce dict rithm, Naive Bayes The EM algorithm g- Introduction, k -Nearest Neighbour Leaming. Loe e-Based Reasoning, Remarks on Lav Instance-Based Leart Regression, Radial Basis Functions, C: L ning UNIT -IV Genetic Algorithms — Motivation, Genetic Algorithms, An illustrative Example. Space Search, Genetic Programming, Models of Evolution and Learning, Parallel Algorithms Learning Sets of Rules — Introduction, Sequential Covering Algorithms, Learnin: Saatmare, Learning First Order Rules, Learning Sets of First Order Rules: FOIL. | Inverted Deduction, Inverting Resolution TEXT BOOKS: | Machine Learning — Tom Mitchell, McGraw Hill Education: First edition (1 July 2 ISBN-10:1259096955 sae ine Leaming: An Algorithmie Perspective, Second Edition, Stephen Marslar Taylor & Francis (CRC) 2014, ISBN-13: 978-1-4665-8333-7 (eBook - PDP) REFERENCE BOOKS: 1 Machine Learning Methods in the Environmental Sciences, Neural Networks, Will Wuisieh, Cambridge Univ Press. 2009. ISBN-13 978-0-511-5955 > R ichard o. Duda, Peter E. Hart and David G. Stork, pattern class Sonsine,, 2001. ISBN: 978-0-471-05669-0 + Chris Bishop, Neural Networks for Pattern Recognition, Oxford University Press 1995,ISBN-10: 0-387-31073-8 t Mtachine Leaming by Peter Flach, Cambridge. 2012. ISBN 978-1-107-09639 cation. John Wi nd. ng. for ibs ks. EEE TTL EET STE BICSES02: BLOCKCHAIN TECHNOLOGY AND APPLICATIONS (Elec Theory 24 Hrshweek Credits Int Marks _: 25. Ext Marks uNIT=1 Introduction to BloeKchain: The History of Blockehain.. Decentralisation of Bloei« sare Blockehain, Distributed Ledger, Permission less and Permissioned Bloc Longest Chain of Blockchain, Basic Distributed System Concepts. Distribute Buvantine Fault Tolerant Consensus Methods. UNIT =I Cryptography in Blockchain: Objectives of CON aphy, Properties of a Hos Cryptographic Hash Function, Hash Pointer Merkle Tree, Symmetric Key Crypto yptography — RSA; Digital Signatures. SHA256. |! AES; Asymmetric Key Cryptography Algorithm UNIT =I Biteoin-Cryptocurreney : Bitcoin Transaction Life Cycle, Types of Transaction. benesls Block, Mining, Task of Miners, Proof of Work, Mining Algorithm, Bitco Bitcoin Scripts, Bitcoin Payments, Alternative Coins Hyperledger Fabrie: Architecture fansaction Flow in Fabric, Channels in 19 Network setup. UNIT -IV Usecases of Blockchain: Blockchain in Financial Service, Blockchain insu Blockehain in Healthcare, Blockchain in Energy Markets, Blockchain In Medi Cybercrime through Blockchait Blockchain for e-Governance, Blockehain for ha Blockchain for Land Registry Records, Blockchain in loT TEXT BOOK: 1S Shukla, M Dhawan, S Sharma, $ Venkatesan Spplications” Oxford University Press, 2019 J Aravind Narayanan, Joseph B. Edward F Princeton University Press. % Trecan Bashir, “Mastering Blockehain” Packt Publishines Birmingham, UK >. Blockchain Architecture Design and Usecases, NPTEL Course REFERENCE BOOKS: 1. Josh Thompson, “The Blockchain for Beginnings Guild to Blockehain Technolo. Blockehain Programming” , Create Space Independent Publishing Platform. 2017. > Andreas Antonopoulus, “Mastering. Bitcoin: Unlocking Digital Cryptocurrencies > Hyperiedger Fabric www hyperledger.ore/prolects Blockchain Technology: Cryptos -pitcoin and Cryptocurrency 4 1. Back he pals, on, re XO, fhe rie in, ping 6 PPP ilies SSS ESTE EET E Eee eee ADIKAVI NANNAYA UNIVERSITY UNIVERSITY COLLEGE OF ENGINEERING |OOCS Guidelines for B.Tech Course |. A student shall select any one course of his/her choice from the list of courses specified in the course structure as approved of 30 Hrs or 4 weeks duration, 'A student can complete the course at his/her own place, under the guidanee of a faculty member, The assessment of MOOC is through continuous internal assessment for 50 Marks with a b. d. the breakup as follows. Assignment - 5M or Certification — 10M (NPTEL, Swayam, Edx, Course era, Udemy or any other fine quiz - 10M ( Organized by the concerned faculty ) MOOC Platform) or participation certificate in any workshop/conference in IITs) NITs/Premier Institute/Industry of not less th 3 days. Internal Assessment — 25M (Exam to be conducted at the end cf the course) Marks acquired by the students will be submitted along with the Intermal Marks of Practical Exams duly signed by concemed faculty and Head of the Department ‘Though 2 credits of 50 marks are allotted for MOOCS Course they are not included in SGPA Calculation Producing of Course Completion Certificate is mandatory by every student by the end of semester where the MOOCS Course is opted As MOOC all s closer with Practical Exam, Pass or Fail status in the MOOC will be same as those of Practical Exam. It is not mandatory to specify in the marks memo the course in which certification is obtained as the courses change from year fo year. The above guidelines are subject to change from time to time to comply with the UGCIAICTE guidelines, a yy other academic regulatory body at tre state‘center and academic body of the University. ADIKAVI NANNAYA UNIV ERSITY UNIVERSITY COLLEGE OF ENGINEERE dustrial Internship/Technical Course Guidelines for B.Tech fer the end semester examination of IIL-Il every student should complete 30 - 45 days Industrial ‘mship or Technica: Course. The documentation work will be suomi at the end of LV-I which is for ral evaluation of 100 marks which are not included in SGPA calculation. > A student shall select any one course/industrial intemship of histher choice from reputed dustries/companies like Steel plants, Power plants, other Government Organizations Infosys. ent, Research institutes (Like DRDO, ISRO. IBM) ete. Wipro. TCS. student should submit the Indemnity Bond from parents in the Department and same Xerox copy ould be submitted in industry/company also. kup, he assessment of Industrial Internship/Technical Course for 100 Marks with the following bre: a Certificate- b. Documentation- PPT Presentation — S. Marks acquired by the students will be submitted along with the Intemal Marks of Practica! Exams duly ed by eoncemed faculty and Head of the Department, at the end 1V—{ semester avery student by the end 6. Produeing of Course/ Industrial Internship Completion Certificate is mancatory by © ll PWV. somester, failing which the student will not be allowed for project work in v . Pass or Fail status in the Course’ >. As Course! Industrial Internship aligns closer with Practical E dustrial Internship will be same as those of Practical Exam PIS EEE PEL EET EEE EEE §. ‘The above guidelines are subject to change from time to time to comply with the UGCIAICTE guidelines. ine ther academic regulatory body atthe state/centre and academic body of the University PPPre esis d dese eee: ADIKAVI NANNAYA. UNIVERSITY 9 UNIVERSITY COLLEGE OF ENGINEERING __ Project guidelines for B.Tech Project guidelines: Ail the students should complete the Project Work in IV-II as part of their B.Tech course completion. Students are advised to take individual or team (3-4 Students), if it is team work, minimum 2 modules should be developed by each student > Project work is done throughout the semester with 200 Marks (100 = Intemal + 100 - External) with 8 Credits. 5. All the students should follow the Project schedule given by the department that time a All the students are advised to do their Project within the Campus. In ease of doing the project surside ie, in reputed Industries like Steel plants, Power plants, other Government Organizations, Infosys, Cognizent, Research institutes (Like DRDO, ISRO. IBM) ete., stuclent should take prior semniscion from PrincipaliHOD by submitting the Intemship offer Letter < “Sudents with Internship Projects will Work under two Guides, External Guide from the Industry/Company, Internal Guide from the University «6. Every student is required to submit ABSTRACT within the given schedule. 7 Tg Guide shall monitor the progress of the project work from time to time. The Guide shall evaluate the project based on all the reviews, progress, presentations and quality of ‘work, Internal evaluation is for 100 marks The student should attend the reviews and presentation. so, one Paper should be published in Reputed Journals approved by uGc 4 of attendance compulsory for every student. sal viva voice with project report work and PowerPoint Internal evaluation: 100 marks «Reviews should he done in presence of guide, Head of the Department & all the faculty members of the Department. «Reviews should be in terms of PowerPoint presentation and updatec report sheet should be submitted by the student signed by guide in every review. ‘* Total numbers of reviews are 3t04 External evaluation: 100 marks «valuation is done in the presence of External Examiner, Guide and Head o° the department and ‘ul faculty members of the department. «Evaluation is based on nature of work, project report submitted by tne students, hardware software implementation and presentation. «Total four copies of project report with prescribed format should be submitted to the university college of engineering. NOTE: Every student should complete the project in the said semester ithout this the course pletion certificate / provisional certificate wil not be issued

You might also like