MSC AI 2021
MSC AI 2021
Semester- I
Marks Credit
Course Code Paper
Sessional Final
21-344-0101 Mathematics for AI 50 50 4
21-344-0102 Computer System Design and Architecture 50 50 4
21-344-0103 Advanced Data Structures and Algorithms 50 50 4
21-344-0104 Data Science and Machine Learning 50 50 4
21-344-0105 Foundations of Artificial Intelligence 50 50 4
21-344-0106 Data Science and Machine Learning Lab 50 50 2
21-344-0107 Data Structure Lab 50 50 2
Total Credits 24
Semester - II
Marks Credit
Course Code Paper
Sessional Final
21-344-0201 Advanced Computer Networks 50 50 4
Emerging Technologies in Data Processing
21-344-0202 50 50 4
and Management
21-344-0203 Pattern Recognition 50 50 4
21-344-0204 Information Security 50 50 4
Elective I 50 50 3
21-344-0206 Data Management Lab 50 50 2
Total Credits 21
Semester- III
Marks Credit
Course Code Paper
Sessional Final
21-344-0301 Deep Learning 50 50 4
Elective II 50 50 3
Elective III 50 50 3
Elective IV 50 50 3
Elective V 50 50 3
21-344-0306 Seminar 50 1
21-344-0307 Internship/Project Phase - 1 50 3
Total Credits 20
Semester- IV
Marks Credit
Course Code Paper
Sessional Final
21-344-0401 Internship/Project Work 200 200 18
Total Credits 18
List of Electives
Course Outcomes
CO2 Apply Propositional logic and First order (Cognitive level : Apply)
logic to solve problems.
CO3 Solve the system of Linear equations using (Cognitive level : Apply)
Gauss Elimination method.
CO4 Apply different methods to find the Inverse (Cognitive level : Apply)
and Rank of a Matrix
CO5 Calculate Eigen values and Eigen vectors (Cognitive level : Apply)
using Linear transformation and power
methods.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2
CO2 3
CO3 3
CO4 3
CO5 3
CO6 3
CO7 3
UNIT I
Sets, Operations on sets, Venn Diagrams, Multi Sets, Binary Relations, Equivalence
Relations, Ordering Relations, Operations on Relations, Partial Orders. Statements and
Notation, Connectives, Quantified Propositions, Logical Inferences, Methods of Proof of
an Implication, First Order Logic and other Methods of Proof, Rules of Inference for
Quantified Propositions, Proof by Mathematical Induction.
UNIT II
UNIT III
UNIT IV
UNIT V
1. Marc Peter Deisenroth, A. Aldo Faisal, Cheng Soon Ong, “Mathematics for Machine
Learning”, Cambridge University Press, 2020.
2. Kenneth H. Rosen, “Discrete Mathematics and Its Applications”, 7th Ed, McGrawHill,
2012.
3. Bernard Kolman, Robert Busby and Sharon Cutler Ross, “Discrete Mathematical
Structures for Computer Science”, 6 th Ed, PHI, 2013.
**********
21-344-0102 - Computer System Design and Architecture
(July 2021)
Course Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3
CO2 3 2 2 2
CO3 3 3 3 3
CO4 2 2
CO5 3 3 3 3
CO6 2 2
CO7 2 2
UNIT I
Boolean Logic, Boolean Algebra - Boolean Laws and Theorems, Boolean Functions -
Simplification of Boolean Functions- Using Karnaugh- Map Method.
UNIT II
Logic gates , Combinational logic circuits- Binary adders and subtractors, Binary Parallel
adder, Carry look ahead adder, BCD adder, Code converter, Magnitude comparator,
Decoder, Demultiplexer, Encoder, Multiplexer, Parity generator/ Checker. MSequential
Logic Design - Latches and Flipflops, Registers, Counters.
UNIT III
Basic Structure of computers , operational concepts - bus structures. Memory locations and
addresses - memory operations,Instructions and instruction sequencing , addressing modes.
I/O organization: accessing of I/O devices – interrupts, interrupt hardware -Direct memory
access. The Memory System - Semiconductor RAM Memories Read-only Memories,
Memory Hierarchy,Cache Memories - Mapping Functions
UNIT IV
UNIT V
TEXT BOOK
1. M. Morris Mano, "Digital Design", 6th Edition, Prentice Hall of India Pvt. Ltd.2018.
2. Computer organization And Embedded Systems, Hamacher, Vranesic, Zaky,
Manjikian, 6Ed, McGraw-Hill , 2012
REFERENCES
1. Manish Saraswat, ‘Computer Architecture And Organisation’, 1st Ed. Vayu Education Of
India, 2011.
2. Tanenbaum A.S, ‘Structured Computer Organization’. 5/e, Prentice Hall of India, 2006.
3. Mano, M M, ‘Computer System Architecture’. 3rd Ed. Prentice Hall of India, 2007.
4. Hayes, ‘Computer Architecture and Organization’, 2nd Ed. McGraw Hill, 1998.
Hall, 2011
**********
21-344-0103 - Advanced Data Structures and Algorithms
(July 2021)
Course Outcomes
After the completion of this course, students will be able to
(Cognitive level: Understand)
CO1 Perform complexity analysis of algorithms.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3
CO2 2
CO3 2
CO4 2
CO4 2
UNIT I
Algorithm Analysis - Mathematical Background – Time and Space Complexity of
Algorithms – Computational and Asymptotic Complexity, Best average and Worst case
Analysis, Asymptotic Notations – Big O, Big ɵ and Big ω, Running time calculations –
General Rules, Solutions for the Maximum Subsequence Sum Problem, Logarithms in
Running time.
UNIT II
Queues - Single and Double Ended Priority Queues, Trees - Threaded Binary Trees,
Selection Trees, Forests and binary search trees, Counting Binary Trees, Red-Black Trees,
Splay Trees, Suffix Trees, Digital Search Trees, Tries- Binary Tries, Multiway Tries, k-d
Trees, Point Quadtrees
UNIT III
Heaps - Skew Heaps, Binomial Heaps, Fibonacci Heaps, Pairing Heaps, Symmetric Min-
Max Heaps, Interval Heaps, Data Structures for Disjoint Sets, Disjoint-set operations,
Linked-list representation of disjoint sets, Disjoint-set, forests, Analysis of union by rank
with path compression, Medians and Order Statistics, Minimum and maximum, Selection in
expected linear time, Selection in worst-case linear time.
UNIT IV
Maximum Flow-Flow Networks, Ford-Fulkerson method-analysis of Ford-Fulkerson,
Edmonds-Karp algorithm, Maximum bipartite matching, Bi-connected Components,
Finding strong components. Computational Geometry- Line segment properties, Finding the
convex hull, Finding the closest pair of points, Skip lists.
UNIT V
Algorithm Design Techniques - Greedy Algorithm – Scheduling problem, Huffman codes,
approximate bin packing, Divide and Conquer – Closest points problem, Selection problem,
Dynamic Programming – All pairs shortest path.
TEXT BOOK
1. Ellis Horowitz, Sartaj Sahni, Susan Anderson Freed, Fundamentals of Data
Structures in C, Second Edition, University Press, 2008.
2. Thomas Cormen, Charles E. Leiserson, Ronald Rivest, Introduction to algorithm,3rd
edition, PHI Learning.
3. Mark Allem Weiss, Data Structures and Algorithm Analysis in C, 2nd Edition,
Pearson.
REFERENCE BOOKS
*****************
21-344-0104 - Data Science and Machine Learning
(July 2021)
Course Outcomes:
CO6 Explain the concept of machine learning for (Cognitive level : Understand)
big data analytics
PO1 PO2 PO3 PO4 PO PO6 PO PO8 PO9 PO10 PO1 PO12
5 7 1
CO1 3 2
CO2 3 3 3 3
CO3 2 2
CO4 3 3 2 2 2
CO5 3 2 2 2 2
CO6 2
UNIT I
Data Definitions and Analysis Techniques - Elements, Variables, and Data categorization -
Levels of Measurement - Data management and indexing - Introduction to statistical
learning - Descriptive Statistics - Measures of central tendency, Measures of location of
dispersions - Basic analysis techniques - Statistical hypothesis generation and testing, Chi-
Square test, t-Test, Analysis of variance, Correlation analysis, Maximum likelihood test
UNIT II
Knowing data, Data Pre-processing: Data cleaning, Data reduction, Data transformation,
Data discretization
Visual encoding of data – Data types, Categorical scales and graph design, visual display
elements , design principles , Narrative structures , Dataviz Technology & Tools
UNIT III
UNIT IV
Supervised Learning: Regression, Linear and polynomial regression for univariate and
multivariate data, support vector regression,
Classification: Decision trees, Neural networks, Perceptron, Multi-Layer Perceptron, Back
propagation algorithm, Support Vector Machines, Naïve Bayes Classifiers
Ensemble Learning: Bagging, boosting, stacking, Random forest algorithm.
Mining Techniques: Frequent Item set, Association rule mining
UNIT V
1. Andy Kirk, Data Visualization A Handbook for Data Driven Design, Sage
Publications, 2016
2. Cathy O’Neil and Rachel Schutt. Doing Data Science, Straight Talk From The
Frontline. O’Reilly, 2013
REFERENCE BOOKS
1. Jure Leskovek, Anand Rajaraman and Jeffrey Ullman. Mining of Massive Datasets.
v2.1, Cambridge University Press, 2016.
2. Trevor Hastie, Robert Tibshirani, Jerome Friedman, The Elements of Statistical
Learning, Springer 2009 (freely available online)
3. Christopher Bishop, Pattern Recognition and Machine Learning, Springer, 2007.
*******************
21-344-0105 - Foundations of Artificial Intelligence
(July 2021)
Course Outcomes
CO4 Apply minimax and alpha beta pruning strategy in (Cognitive level : Apply)
game playing
CO5 Explain the concept of agents, behaviour and (Cognitive level : Understand)
environment of Intelligent agents.
CO7 Describe the generic concepts of Natural Language (Cognitive level : Understand)
processing and Robotics
CO1 3 3
CO2 3 2 2 2
CO3 3 3 3 3
CO4 2 2
CO5 3 3 3 3
CO6 2 2
CO7 2 2
UNIT I
Introduction to artificial intelligence - Artificial Intelligence- Definitions, Programming
Methodologies, Techniques, Intelligent Systems, Propositional calculus, Predicate Calculus, Rule-
Based Knowledge Representation. Unification, Resolution, Constraint Satisfaction Problem
UNIT II
Intelligent Agents – Agents and Environments, Good Behavior: The Concept of Rationality, The
Nature of Environments, The structure of Agents. The Present and Future of AI- Agent Components,
Agent Architectures
UNIT III
Heuristic search and state space search - Techniques for Heuristic Search, State Space Search-
Strategies for State Space Search -Applications of Search Techniques in Game Playing- Minimax
strategy and Alpha Beta Pruning, and Planning
UNIT IV
Artificial Neural Networks, Fuzzy Sets & Fuzzy Logic, Rough Set Theory, Swarm Intelligence –
Evolutionary Algorithms – Genetic Algorithms.
UNIT V
TEXT BOOKS
1. Stuart Russell, Peter Norvig: “Artificial Intelligence: A Modern Approach “, 3rd Ed, Pearson,
2016.
2. Elaine Rich, Kevin Knight, B.Nair: “ARTIFICIAL INTELLIGENCE “, 3rd Ed, Mc Graw Hill,
2017.
REFERENCES
************
21-344-0106 - Data Science and Machine Learning Lab
(July 2021)
Course Outcomes:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
LO1 3 3 3
LO2 3 2 3 3
LO3 3 3 2
LO4 3 3 3 2 2 3
LO5 3 3 3 2 2 3
LO6 3 3 2 2 3
*******************
21-344-0107 - Data Structure Lab
(July 2021)
Course Outcomes
After the completion of this course, students will be able to
Develop programs to implement advanced (Cognitive level: Create)
CO1
versions of queues, Trees and Heaps
Develop programs using data structures for (Cognitive level: Create)
CO2
applications in various domain specific areas.
(Cognitive level: Create)
CO3 Develop programs using Greedy approaches.
Course Outcomes
CO2 Analyze topological and routing strategies for (Cognitive level : (Analyze)
an IP based networking infrastructure
CO4 Explain congestion and flow control strategies (Cognitive level : Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2
CO2 2 2
CO3 3 3
CO4 2 2
CO5 2 2 3
UNIT I
The Services Provided by the Link Layer, Error-Detection and -Correction Techniques-
Parity Checks, Checksumming Methods, Cyclic Redundancy Check (CRC), Switched Local
Area Networks-Link-Layer Addressing and ARP, Ethernet, Link-Layer Switches, Virtual
Local Area Networks (VLANs), Wireless Links and Network Characteristics-CDMA,
802.11 Architecture, 802.11 MAC Protocol, IEEE 802.11 Frame, Mobility in the Same IP
Subnet
UNIT III
IPv4 and IPv6 Addressing, IP Address – Subnetting / Super netting, Packet Forwarding
with Classfull, Routing Algorithms-The Link-State (LS) Routing Algorithm, Distance-
Vector (DV) Routing Algorithm, OSPF, Routing Among the ISPs: BGP-The Role of BGP,
Advertising BGP Route Information, Determining the Best Routes, IP-Anycast, SDN
Control Plane-SDNController and SDN ControlApplications, OpenFlow Protocol, Data and
Control Plane Interaction, ICMP: The Internet Control Message Protocol, Simple Network
Management Protocol (SNMP)
UNIT IV
UNIT V
[1] Kurose and Ross, Computer Networks A systems approach , Pearson Education.
[6] W. R. Stevens.TCP/IP Illustrated, Volume 3: TCP for Transactions, HTTP, NNTP, and
the Unix Domain Protocols,Addison Wesley, 1996.
[7] B.A. Forouzan, Data communication & networking, 5th Edition, Tata Mc-Graw Hills.
*********
21-344-0202 - Emerging Technologies in Data Processing
and Management
(July 2021)
Course Outcomes
After completion of this course, students will be able to
CO3 Explain the concept of data ware housing (Cognitive level : Understand)
CO4 Experiment with SQL queries and construct (Cognitive level : Apply)
normalized databases
CO6 Explain the types of NoSQL databases and Map (Cognitive level : Understand)
reduce framework
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2
CO2 2 2
CO3 2 2
CO4 3 3 1
CO5 3 3 1
CO6 3 3
UNIT 1:
UNIT II:
UNIT III:
RDBMS and SQL: Relational Query Languages, The SQL Query Language, Querying
Multiple Relations, Creating Relations in SQL, Destroying and Altering Relations, Adding
and Deleting Tuples, Integrity Constraints (ICs), Primary and Candidate Keys in SQL,
Foreign Keys, Referential Integrity in SQL, Enforcing Referential Integrity, Categories of
SQL Commands, Data Definition, Data Manipulation Statements: SELECT - The Basic
Form Subqueries, Functions, GROUP BY Feature, Updating the Database, Data Definition
Facilities, Views,
Normalization: Functional Dependency, Anomalies in a Database, The normalization
process: Conversion to first normal form, Conversion to second normal form, Conversion to
third normal form, The boyce-code normal form(BCNF), Fourth Normal form and fifth
normal form, normalization and database design, Denormalization
UNIT IV:
Semi-Structured Data: XML database management system.XML databases, XML schema,
Storing XML in Databases, XML and SQL. XML Query processing: XML query languages,
XQuery, XPath. Approaches for XML query processing, Query processing on relational
structure and storage schema. JSON: Overview, Data Types, Objects, Schema, JSON with
Java/PHP/Ruby/Python.
UNIT V:
Reference Books
1. A Silberschatz, H Korth, S Sudarshan, “Database System and Concepts”, fifth
Edition McGraw-Hill , Rob, Coronel, “Database Systems”, Seventh Edition,
Cengage Learning.
2. Guy Harrison, “Next Generation Data Bases – NoSQL, NewSQL and Big Data”,
1stEd ,Apress, 2015.
3. Authored by DT Editorial Services , “Big Data, Black Book: Covers Hadoop 2,
MapReduce, Hive, YARN, Pig, R and Data Visualization WileyIndia, 2016
4. Ramakrishna R. & Gehrke J, Database Management Systems, 3e, Mc-Graw Hill,
2003.
5. Silberschatz A, Korth H F, & Sudarshan S, Database System Concepts, 5e, TMH,
2005.
6. Elmarsi R, & Navathe S B, Fundamental of Database System, 5e, Pearson
Education, 2008.
7. Robinson, I, Webber, J, & Eifrem E, Graph Databases, 2e, O’Reilly, 2015.
************
21-344-0203 - Pattern Recognition
(July 2021)
Course Outcomes
After the completion of this course, students will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2
CO2 2
CO3 2
CO4 2
CO5 2
UNIT I
Basics of Probability, Random Processes and Linear Algebra: Probability: independence of
events, conditional and joint probability, Bayes’ theorem; Random Processes: Stationary and
nonstationary processes, Expectation, Autocorrelation, Cross-Correlation, spectra; Linear
Algebra: Inner product, outer product, inverses, eigenvalues, eigen vectors, singular values,
singular vectors.
UNIT II
Machine perception, Pattern recognition systems, Design cycle, Learning and adaptation,
Bayes Decision Theory: Minimum-error-rate classification, Classifiers, Discriminant
functions, Decision surfaces, Normal density and discriminant functions, discrete features,
Parameter Estimation Methods: Maximum-Likelihood estimation: Gaussian case; Maximum
a Posteriori estimation; Bayesian estimation: Gaussian case.
UNIT III
Unsupervised learning and clustering: Criterion functions for clustering; Algorithms for
clustering: K-Means, Hierarchical and other methods; Cluster validation; Gaussian mixture
models; Expectation-Maximization method for parameter estimation; Maximum entropy
estimation.
UNIT IV
Sequential Pattern Recognition: Hidden Markov Models (HMMs); Discrete HMMs;
Continuous HMM, Nonparametric techniques for density estimation: Parzen-window
method; K-Nearest Neighbour method. Dimensionality reduction: Fisher discriminant
analysis; Principal component analysis; Factor Analysis.
UNIT V
Linear discriminant functions: Gradient descent procedures; Perceptron; Support vector
machines, Non-metric methods for pattern classification: Non-numeric data or nominal data;
Decision trees: CART, algorithm independent machine Learning, bias and variance
regression and classification classifiers.
TEXT BOOK
1. R.O.Duda, P.E.Hart and D.G.Stork, Pattern Classification, John Wiley, 2001
2. S.Theodoridis and K.Koutroumbas, Pattern Recognition, 4th Ed., Academic Press,
2009
3. C.M.Bishop, Pattern Recognition and Machine Learning, Springer, 2006
REFERENCE BOOKS
1. Earl Gose , Steve Jost, “Pattern Recognition and Image Analysis”, PEARSON,2015.
2. Robert J.Schalkoff, Pattern Recognition Statistical, Structural and Neural
Approaches,
John Wiley & Sons Inc., New York, 1992
3. V. S. Devi, M. N. Murty, “Pattern Recognition: An Introduction”, Universities Press,
Hyderabad, 2011.
4. Robert J. Schalkoff, “Pattern Recognition : Statistical Structural and Neural
Approaches”,
John Wiley & Sons Inc., New York, 1992.
5. Tou and Gonzales, “Pattern Recognition Principles”, Wesley Publications Company,
London 1974.
******************
21-344-0204 - INFORMATION SECURITY
(July 2021)
Course Outcomes
CO4 Examine various malwares and program flaws (Cognitive level : Analyze)
CO7 Discuss network threats and security techniques. (Cognitive level : Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2
CO2 3
CO3 3
CO4 3 3 3
CO5 3 3 3
CO6 3
CO7 3
CO8 3 3 3
UNIT I
Introduction and Basic concepts: threats, vulnerabilities, controls; risk;
Breaches;confidentiality, integrity, availability; Attacks, Exploits. Information Gathering
(Social Engineering, Foot Printing & Scanning).
Open Source/ Free/ Trial Tools: nmap, zenmap, Port Scanners, Network scanners.
Modular Arithmetic Basic cryptography - Basic cryptographic terms, Historical background,
Symmetric crypto Systems - Conventional systems, Asymmetric crypto primitives –RSA.
UNIT II
Explanation of Malware, Types of Malware: Virus, Worms, Trojans, Rootkits, Robots,
Adware’s, Spywares, Ransom wares, Zombies etc., , Malware Analysis.
Open Source/ Free/ Trial Tools: Antivirus Protection, Anti Spywares, System tuning tools,
AntiPhishing.
UNIT III
UNIT IV
UNIT V
Network security - Network threats: eavesdropping, spoofing, modification, denial of
service attacks, Introduction to network security techniques: firewalls, intrusion detection
systems. Cyber crimes and control measures.
TEXT BOOK
REFERENCES
******************
CO3 Apply Read, Write and Parsing operations on (Cognitive level : Apply)
JSON data using Python and java
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
LO1 3 2 3
LO2 3 2 3
LO3 3 2 3
LO4 3 2 3
LO5 3 3 3 2 2 2
Course Outcomes
After the completion of this course, students will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2
CO2 2 2 3
CO3 3 2 3
CO4 3 3 2
CO5 3 3 2 3 3
CO6 2 3
UNIT 1:
Introduction to Machine Learning and Neural Networks - Biological Neuron, Idea of
computational units, McCulloch–Pitts unit and Threshold logic, Linear Perceptron,
Multilayer Perceptron, Perceptron Learning Algorithm, Linear separability; loss functions –
various types, regularization and hyper parameter tuning, Feed Forward Neural Networks,
Forward propagation, activation functions and its derivatives, backpropagation and
optimization functions, batch normalization.
UNIT II:
Deep Neural Networks (DNN) and Convolutional Neural Networks (CNN) – Deep Neural
Network algorithm, Initialization of network parameters, Optimization – Gradient descent,
parameter updates and optimization, vanishing gradient problem, regularization techniques
to handle overfitting.
Convolutional Neural Networks – Convolutional operation, padding, strided convolution,
pooling, training single layered and multi layered CNNs, CNNs in image processing
applications.
UNIT III:
Recurrent Neural Networks (RNN) for sequence modelling – Introduction to RNN, RNN
architecture, Backpropagation in basic RNN, Applications of RNN; Long Short Term
Memory (LSTM) – Architecture, LSTM implementation, Case study related to NLP and
time series data analysis; Gated Recurrent Unit (GRU) – difference between LSTM & GRU,
architecture, implementation and applications.
UNIT IV:
Pretrained models and Transfer Learning – Residual Network, Skip Connection, Alex Net,
VGG16, VGG19, Inception V3, Dense Net, Architecture differences, Case study;
Advantages of transfer learning, feature extraction using transfer learning, pretrained
models-based image classification.
UNIT V:
Advanced Deep Learning Architectures – Generative models, Restrictive Boltzmann
Machines (RBMs), Autoencoders, different autoencoder architectures, Generative
Adversarial Networks (GAN), image generation using GANs.
TEXTBOOK
1, Deep Learning with R, Abhijit Ghatak, Springer Nature Singapore Pte Ltd, 2019.
2. Deep Learning, Ian Goodfellow and Yoshua Bengio and Aaron Courville, MIT Press,
2016.
REFERENCES
1. Yuxi ( Hayden), Liu and Savansh Mehta, “Hands -on Deep Learning Architectures with
Python”, Packt,
2. Josh Patterson & Adam Gibson, “Deep Learning: A Practitioners Approach”, published
by O’Reilly Media.
3. Nikhil Ketkar, “Deep Learning with Python”, published by Apress Media
*****************
Elective Papers for Semester II
21-344-0211 - DISTRIBUTED COMPUTING
(July 2021)
Course Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2
CO2 2
CO3 2
CO4 2 2
CO5 2 2 3
CO6 2 2
CO7
UNIT I:
Distributed Computing System: Introduction to distributed computing systems, Examples,
Trends, Design challenges, System Models, Networking and Internetworking, Inter process
communication, Remote Invocation.
UNIT II:
UNIT III:
UNIT IV:
Web Services: Service descriptions and IDL for web services, A directory service for use
with web services, XML security, Coordination of web services, Applications of web
services, Security: Introduction, Overview of security techniques, Cryptographic
algorithms, Digital signatures, Cryptography pragmatics.
UNIT V:
Cluster Computing: Cluster computers and MPP architectures, Cluster job and resource
management. Grid Computing: Grid architecture and service modeling, Grid resource
management and brokering. Internet of Things: IoT for Ubiquitous computing, RFID,
Sensors and ZigBee technologies, Applications of IoT (smart buildings, cyber-physical
systems).
TEXT BOOKS:
REFERENCES:
1. A. S. Tanenbaum , “Distributed Operating Systems “ , Pearson, 2009.
2. “Fundamentals of Distributed Operating Systems” , S.K. Kataria& Sons, 2013.
***************
Course Outcomes
CO1 Describe about the basics of edge and cloud (Cognitive level : Understand)
computing
CO2 Explain the concept of various edge and cloud (Cognitive level : Understand)
computing models and services
CO3 Discuss about the objects and components of (Cognitive level : Understand)
cloud computing systems
CO4 Describe about the various public cloud platforms (Cognitive level : Understand))
and software environments
CO5 Examine how security is provided in cloud (Cognitive level Analyze)
computing systems.
CO6 Explain the use of various cloud services available (Cognitive level : Understand)
online
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2
CO2 2
CO3 2
CO4 2 2
CO5 2 2 3
CO6 2 2
UNIT I:
System Models for Edge and Cloud Computing – Software Environments for Cloud
computing–Edge computing characteristic and architecture-edge computing challenges- -
Cloud Computing Service Models – Public – Private – Hybrid Clouds – Infrastructure-as-a-
Service (IaaS) – Platform-as-aService (PaaS) - Software-as-a-Service (SaaS)-Different
Service Providers
UNIT II:
Basics of Virtualization, Types of Virtualization, Implementation Levels of Virtualization-
VMM Design Requirements and Providers, Virtualization Support at the OS Level,
Middleware Support for Virtualization- Virtualization Structures, Tools and Mechanisms-
Binary Translation with Full Virtualization, Para-Virtualization with Compiler Support-
Virtual Clusters and Resource management- Virtualization for Data-Center Automation-
Cloud OS for Virtualized Data Centers, Trust Management in Virtualized Data Centers
UNIT III:
Cloud Computing and Service Models-Architectural Design of Compute and Storage
Clouds-Inter-cloud Resource Management- Resource Provisioning and Platform
Deployment,Virtual Machine Creation and Management
UNIT IV:
Security Overview – Cloud Security Challenges – Security -as-a Service – Security
Governance – Risk Management – Security Monitoring – Security Architecture Design –
Data Security – Application Security – Virtual Machine Security
UNIT V:
Eucalyptus- Nimbus – Open Stack – Extended Cloud Computing Services ––- Public Cloud
Platforms: GAE – AWS – Azure,Emerging Cloud
TEXT BOOKS:
1. Kai Hwang , Geoffrey C Fox, Jack J Dongarra : “Distributed and Cloud Computing
– From Parallel Processing to the Internet of Things” , Morgan Kaufmann
Publishers –
2012
2. Mastering Cloud Computing – Rajkumar Buyya, Christian Vecchiola and S.
Thamarai Selvi – Tata McGraw Hill Education
REFERENCES:
1. Alex Amies, Harm Sluiman, Qiang Guo Tong and Guo Ning Liu: Developing and
Hosting Applications on the cloud, IBM Press, 2012.
2. George Reese, “Cloud Application Architectures: Building Applications and
Infrastructure in the Cloud (Theory in Practice)”, O’Reilly Publications, 2009.
3. Haley Beard, “Cloud Computing Best Practices for Managing and Measuring
Processes for On-demand Computing – applications and Data Centers in the Cloud
with SLAs”,
Emereo Pty Limited, July 2008
4. James E. Smith and Ravi Nair: Virtual Machines: Versatile Platforms for Systems
and Processes, Morgan Kaufmann, ELSEVIER Publication, 2006.
5. John W Rittinghouse and James F Ransome , “Cloud Computing: Implementation
-Management – and Security”, CRC Press, 2010.
6. Michael Miller, “Cloud Computing: Web-Based Applications That Change the Way
You Work and Collaborate Online”, Pearson Education, 2009.
7. Richard N. Katz, “The Tower and The Cloud”, Higher Education in the Age of
Cloud Computing, 2008.
8. Toby Velte, Anthony Velte and Robert Elsenpeter: “Cloud Computing – A Practical
Approach”, TMH, 2009.
***********
21-344-0214 - Software Defined Networks
(July 2021)
Course Outcomes
CO5 Solve real world problems using SDN (Cognitive level : Apply)
CO1 3
CO2 3
CO3 3 3 3
CO4 3 3
CO5 3 3
CO6 3
UNIT I
UNIT II
Open flow & SDN controllers -Open Flow Specification, Drawbacks of Open SDN, SDN
via APIs, SDN via Hypervisor-Based Overlays – SDN via Opening up the Device – SDN
controllers and application models
UNIT III
Data centers- Data Center Demands, Tunneling Technologies for the Data Center, Path
Technologies in the Data Center, Ethernet Fabrics in the Data Center, SDN Use Cases in the
Data Center, Comparison of Open SDN, Overlays, and APIs
UNIT IV
UNIT V
TEXTBOOKS/ REFERENCES
1. Software Defined Networks: Paul Goransson, Chuck Black, Timothy Culver 2nd
Edition, 2014.
******************
21-344-0215 - Mobile Application Development using
Android
(July 2021)
Course Outcomes
After completion of the course the students will be able to
CO1 Explain the basics of Android Operating System (Cognitive level:Understand)
CO2 Show the installation and configuration of Android (Cognitive level: Apply)
application development tools.
CO3 Design good user interfaces for the mobile application (Cognitive level: Create)
CO4 Discuss the different mobile data management in (Cognitive level:
Android Understand)
CO5 Apply Java programming concepts to Android (Cognitive level: Apply)
application development.
CO6 Develop simple mobile applications, Location map- (Cognitive level: Create)
based services
Mapping of course outcomes with programme outcomes - Low=1, medium=2, High=3
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 1
CO2 2
CO3 3
CO4 1
CO5 3
CO6 3 2
UNIT I:
Introduction to Android
Introduction to Android Architecture: Introduction, History, Features and Android
Architecture. Application Environment and Tools, Android Studio, Android SDK, AVD.
Application Components- Activity, Content providers, Broadcast receivers, Services.
Intents- Explicit and Implicit Intents, Intent Filter, Manifest File. Debugging android
application.
UNIT II:
User Interface Design
User Interface Design: Views &View Groups, Views: Button, Text Field, Radio Button,
Toggle Button, Checkbox, Spinner, Image View, Image switcher, Event Handling, Listeners,
Layouts: Linear, Relative, ListView, Grid View, Table View, Web View, Adapters. Creating
the user interface programmatically, managing changes to screen orientation, displaying
notifications- Setting up notifications, Notification manager.
UNIT III:
UNIT IV
Native Capabilities, Location-based services
Camera, Audio, Sensors and Bluetooth, Maps & Location: Maps: Map-Based Activities,
how to load maps, to finding map API key, GPS, Working with Location Manager, working
with Google Maps extensions, Location Updates, location-based services (LBS), Location
Providers, selecting a Location Provider, Finding Your Location.
UNIT V:
Threading, Services, Web services
Tasks & Processes: Tasks, Switching between Task, Process, Process lifecycle. Threads:
Thread Life cycle, Worker Threads, Thread Handlers, Threads & Loopers. Services:
Services and Notifications – bound/unbound services, Starting and stopping services,
Android Interface Definition Language, Handler and Messenger, Passing objects over IPC,
Scheduling of services. Web Services – Android Server Communication: communication
protocols, server-side applications, client-side applications for web services.
Textbook:
● Android App Development for Dummies, 3ed, Michael Burton, Wiley
References:
● Head First Android Development 2e: A Brain-Friendly Guide, Dawn Griffiths &
David Griffiths,2017 – O’Reilly
● Android Programming for Beginners - Second Edition, John Horton,2018
● Java Programming for Android Developers for Dummies, Second Edition, Barry
Burd
*********************
Course Outcomes
CO4 Design IoT Applications using Arduino IDE. (Cognitive level : Create)
CO1 2
CO2 3 3 3
CO3 2
CO4 3 3 3 3 3 3
CO5 3 3 3
CO6 3
UNIT I
Introduction -Physical Design of IoT, Logical Design of IoT, IoT Levels, Deployment
templates, IoT enabling technologies.
IoT Applications, Sensing,Actuation, Basics of Networking, M2M and IoT Technology
Fundamentals- Devices and gateways, Data management, Business processes in IoT,
Everything as a Service(XaaS), Role of Cloud in IoT, Security aspects in IoT.
UNIT II
Networking IoT and Communication protocols – Link Layer, Network Layer, Transport
layer, Application Layer.Sensor Networks and Machine to Machine communication –
Differences and Similarities between M2M and IoT, Software defined networking , Network
function virtualization.
UNIT III
M2M and WSN Protocols – SCADA and RFID Protocols – Unified Data Standards –
Protocols – IEEE 802.15.4 – BACNet Protocol –Modbus– Zigbee Architecture – Network
layer –LowPAN - CoAP – Security
UNIT IV
Building IoT - RASPERRY PI- IoT Systems - Logical Design using Python – IoT Physical
Devices & Endpoints - IoT Device -Building blocks -Raspberry PiBoard - Linux on
Raspberry Pi- Raspberry Pi Interfaces -Programming Raspberry Pi with Python - Other IoT
Platforms - Arduino. Introduction to Arduino Programming, Integration of Sensors and
Actuators with Arduino, Implementation of IoT.
UNIT V
IoT case studies and mini projects based on Industrial automation, Transportation,
Agriculture,Healthcare, Home Automation
TEXT BOOK/REFERENCES
1. Adrian McEwen and Hakim Cassimally, “Designing the Internet of Things”, John
Wiley &Sons, 2013.
2. Cuno Pfister, “Getting Started with the Internet of Things: Connecting Sensors and
Microcontrollers to the Cloud”, Maker Media, 2011.
3. Pethuru Raj and Anupama C. Raman , “The Internet of Things: Enabling
Technologies, Platforms, and Use Cases", (CRC Press).
4. Arshdeep Bahga and Vijay Madisetti, "Internet of Things: A Hands-on Approach",
by (Universities Press)2015.
5. Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis
Karnouskos, David Boyle, “From Machine-to-Machine to the Internet of Things:
Introduction to a New Age of Intelligence”, 1st Edition, Academic Press, 2014.
******************
Course Outcomes
CO2 Describe state space search algorithms in AI. Cognitive Level: Understand
Apply Ant colony optimization for solving
CO3 Travelling Salesperson problem and to solve Cognitive Level: Apply
problems related to feature selection.
CO5 Apply ABC algorithm in solving knapsack problem Cognitive Level: Apply
Describe Krill Herd Optimization algorithm and its
CO6 Cognitive Level: Understand
application in solving real life problems.
TEXTBOOKS:
1. Xin-She Yang, Zhihua Cui, Renbin Xiao, Amir Hossein Gandomi, Mehmet
Karamanoglu, “Swarm Intelligence and Bio-Inspired Computation, Theory and
Applications”, Elsevier 2013.
2. Marco Dorigo and Thomas Stutzle, “Ant Colony Optimization”, MIT Press,
Cambridge, England, 2004.
3. Ben Coppin, “Artificial Intelligence Illuminated”, Jones and Bartlett Publishers,
2004.
4. Kennedy J and Russel C Eberhart, “Swarm Intelligence”, Morgan Kaufmann
Publishers, USA, 2001.
********************************
Course Outcomes
After the completion of this course, students will be able to
CO1 Describe Fuzzy systems, Classical sets, fuzzy sets. (Cognitive level: Understand)
(Cognitive level: Understand)
CO2 Describe Classical relations and fuzzy relations.
Perform fuzzification, defuzzification and describe (Cognitive level: Apply)
CO3
logic systems and fuzzy systems.
Develop membership function and apply the (Cognitive level: Apply)
CO4
extension principle.
Perform fuzzy classification and clustering and (Cognitive level: Apply)
C05
describe fuzzy arithmetic.
UNIT I
Introduction: Fuzzy systems – Historical perspective, Utility and limitations, uncertainity
and information, fuzzy sets and membership, Chance vs Fuzziness. Classical sets and Fuzzy
sets: Classical set - Operations, properties, mapping to functions. Fuzzy sets - operations,
properties, Alternative fuzzy set operations.
UNIT II
Classical Relations and Fuzzy relations: Cartesian product, crisp relations - cardinality,
operations, properties, composition, Fuzzy relations - cardinality, operations, properties,
Fuzzy Cartesian products and composition, Tolerance and equivalence relation, Crisp
equivalence and tolerance relations, Fuzzy tolerance and equivalence relations, value
assignments - Cosine amplitude, Max-min method, other similarity methods, other forms of
composition operation.
UNIT III
Properties of membership functions, Fuzzification and Defuzzification: Features of the
membership functions, various forms, Fuzzification, defuzzification to crisp sets, λ-cuts for
fuzzy relations, Defuzzification to scalars. Logic and Fuzzy systems: Classical logic - proof,
Fuzzy logic - approximate reasoning, other forms of the implication operation. Natural
language, Linguistic hedges, Fuzzy rule based systems, Fuzzy Inference System, Graphical
techniques for inference.
UNIT IV
Development of membership functions: Membership value assignments - intuition,
inference, rank ordering. Extension Principle: Crisp functions, Mapping and relations,
Functions of Fuzzy sets-Extension principle, Fuzzy transform, practical considerations.
UNIT V
Fuzzy Arithmetic: Interval analysis, Approximate methods of extension-DSW and restricted
DSW algorithms Fuzzy classification: Classification by equivalence relation- Crisp
Relations and Fuzzy Relations, Cluster analysis, cluster validity, C-means clustering - Hard
C- Means and Fuzzy C-Means, Fuzzy C-Means algorithm.
TEXT BOOK
1. Ross, Fuzzy Logic with Engineering Applications, 3rd Edn, Wiley India,2010.
2. Hajek P, Mathematics of Fuzzy Logic, Kluwer ,1998
REFERENCE BOOKS
1. Rajasekharan and Vijyayalakshmi pai, Neural Networks, Fuzzy Logic and Genetic
Algorithm, PHI, 2003.
2. Sivanandan and Deep, Principles of Soft Computing, John Wiley and Sons, 2007
******************
21-344-0313 - Computer Vision
(July 2021)
Course Outcomes
After the completion of this course, students will be able to
Describe digital image formation and (Cognitive level: Understand)
CO1 representation and perform low level image
processing
(Cognitive level: Apply)
CO2 Perform Feature detection
UNIT I
Digital Image Formation and Representation: Fundamentals of Image Formation, Geometric
Primitives and Transformations: Orthogonal, Euclidean, Affine, Projective; Photometric
Image Formation, Digital Camera, Low-level Image processing: Fourier Transform,
Convolution and Filtering, Image Enhancement, Restoration, Histogram Processing.
UNIT II
Feature Detection: Edges - Canny, Laplacian of Gaussian(LoG), Difference of
Gaussian(DoG); Lines - Hough Transform, Corners - Harris and Hessian Affine, Orientation
Histogram, SIFT, SURF, HOG, GLOH, Scale-Space Analysis- Image Pyramids and
Gaussian derivative filters, Gabor Filters and DWT.
UNIT III
Image Segmentation: Region Growing, Edge Based approaches to segmentation, Graph-Cut,
Mean-Shift, Markov Random Field Segmentation, Texture Segmentation; Feature-based
Alignment: 2D and 3D Feature-based alignment, Pose estimation, Geometric intrinsic
calibration.
UNIT IV
Structure from motion: Triangulation, Two-frame structure from motion, Factorization,
Bundle adjustment, constrained structure and motion; Dense motion estimation –
Translational alignment, Parametric motion, Spline-based motion, Optical flow, Layered
motion.
UNIT V
Depth estimation and Multi-camera views: Perspective, Binocular Stereopsis: Camera and
Epipolar Geometry; Homography, Rectification, 3-D reconstruction framework; Auto-
calibration.Stereo; Recognition - Object Detection, Face recognition, Instance recognition.
TEXT BOOK
1. Richard Szeliski, Computer Vision: Algorithms and Applications, Springer-Verlag
London Limited 2011.
2. Computer Vision: A Modern Approach, D. A. Forsyth, J. Ponce, Pearson Education,
2003.
REFERENCE BOOKS
***************
21-344-0314 - Computer Forensics
(July 2021)
Course Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 1 2
CO2 2 2
CO3 3 3 2
CO4 3 3 3
CO5 3 3 3
CO6 3 3 3
CO7 2 2
UNIT I
UNIT II
UNIT III
UNIT IV
Initial Response & Volatile Data Collection from Windows system - Initial Response &
Volatile Data Collection from Unix system - Forensic Duplication, Forensic Duplicates as
Admissible Evidence, Forensic Duplication Tool Requirements, Creating a Forensic
Duplicate, Forensic Duplicate of a Hard Drive.
UNIT V
TEXT BOOK
2. Aaron Philipp, David Cowen, Chris Davis , Computer Forensics Secrets &
Solutions , McGraw-Hill Osborne Media, 2006.
******************
21-344-0317 - NATURAL LANGUAGE PROCESSING
(July 2021)
Course Outcomes
After the completion of this course, students will be able to
UNIT I
Regular Expressions, Text Normalization, Edit Distance, Regular Expressions, Words,
Corpora, Text Normalization, Minimum Edit Distance, N-gram Language Models, N-
Grams, Evaluating Language Models
UNIT II
Preprocessing: Handling corpus-raw text - Stemming and Lemmatization for raw text, Stop
word removal, Feature Engineering: Understanding feature engineering, Basic feature of
NLP - Parsers and parsing, Types of grammar, POS tagging and POS taggers, n-grams, Bag
of words, TF-IDF, Encoders, and decoders, Probabilistic models
UNIT III
Advanced Feature Engineering: Word embedding, Understanding the basics of word2vec,
Understanding the components of the word2vec model, Main processing algorithms -
CBOW, Skip-gram, Applications of word2vec, and simple examples
UNIT IV
Neural Networks and Neural Language Models: Training Neural Nets, Neural Language
Models
Understanding ML algorithms for NLP: Supervised ML algorithms: Decision tree, Random
forest, Naive Bayes, Support vector machines
UNIT V
Deep Learning Architectures for Sequence Processing: Recurrent Neural Networks,
Managing Context in RNNs: LSTMs and GRUs, Self-Attention Networks: Transformers
Case studies: Word sense disambiguation system, Automatic Question Answering system
TEXTBOOK
1. Jurafsky, Dan. Speech & language processing. Pearson Education India, 2020.
2. Thanaki, Jalaj. Python natural language processing. Packt Publishing Ltd, 2017.
REFERENCE BOOKS
CO2 Explain the inner workings of blockchain and (Cognitive level : (Understand)
relevant mechanisms behind Bitcoin and
alternative cryptocurrencies
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3
CO2 3
CO3 3 2
CO4 3 2
CO5 3 2
UNIT 1:
UNIT 2:
UNIT 3:
Definitions, Types of Mining Algorithms, Proof of Work, Attacks on PoW and the monopoly
problem, Proof of Stake, Proof of Elapsed Time, Proof of Burn. Sharding Chains, The life of
a Bitcoin Miner, Mining Difficulty, Mining Pool
UNIT 4:
Setting up Ethereum Node using Geth Client, Smart Contracts and DApps, Truffle, Ganache
CLI, Metamask, Remix, Solidity, Writing and Deploying Smart Contracts in Solidity,
Connection to Web3.js Library, Vulnerabilities in Smart Contracts, Attacks, Prevention of
Attacks, Decentralized Autonomous Organization (DAO), Building an Initial Coin Offering
(ICO), Blockchain application development: Hyperledger Fabric- Architecture, Identities
and Policies, Membership and Access Control, Channels, Transaction Validation, Writing
smart contract using Hyperledger Fabric, Writing smart contract using Ethereum, Overview
of Ripple and Corda
UNIT 5:
Text Books
[2] Joseph J. Bambara and Paul R. Allen, Blockchain – A practical guide to developing business,
law, and technology solutions, McGraw Hill, 2018.
Reference Books
[1] Melanie Swan, Blockchain – Blueprint for a new economy, OReilly publishers, 2018.
[2] Mastering Blockchain, by Lorne Lantz, Daniel Cawrey, Publisher(s): O'Reilly Media, Inc.ISBN:
9781492054702
[3] Mastering Blockchain, Imran Bashir, Packt Publishing Ltd, ISBN-10 1787129292, 2017.
[4data science
] Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder. Bitcoin
and cryptocurrency technologies: a comprehensive introduction. Princeton University Press, 2016.
******************