0% found this document useful (0 votes)
39 views7 pages

7th Sem Electives

The document provides an overview of the Deep Learning course. It includes 5 units that cover topics like neural network architectures, learning processes, modern deep neural networks like convolutional networks, sequence modeling with recurrent networks, and deep learning research areas. It lists 2 textbooks and 2 references for the course and outlines 5 course outcomes related to understanding neural networks, illustrating learning processes, building deep learning models, analyzing sequential data, and developing applications using autoencoders.

Uploaded by

IPS Siddharth.B
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views7 pages

7th Sem Electives

The document provides an overview of the Deep Learning course. It includes 5 units that cover topics like neural network architectures, learning processes, modern deep neural networks like convolutional networks, sequence modeling with recurrent networks, and deep learning research areas. It lists 2 textbooks and 2 references for the course and outlines 5 course outcomes related to understanding neural networks, illustrating learning processes, building deep learning models, analyzing sequential data, and developing applications using autoencoders.

Uploaded by

IPS Siddharth.B
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

DEEP LEARNING

Course Code: ISE741 Credit: 3:0:0


Prerequisite: Nil Contact Hours: 42L
Course Coordinator: Ms. Rajeshwari S B

Course Content

UNIT-I
Introduction: Human brain, neuron models, neural nets as directed graphs,
feedback, neural architectures, knowledge representation, connection to artificial
intelligence

UNIT-II
Learning Process: Error-correction learning, memory based learning, Hebbian
learning, competitive learning, Boltzmann learning, credit assignment, learning with
and without a teacher, learning tasks, memory, and statistical learning theory.

UNIT-III
Modern practical deep neural networks: Deep feedforward networks,
regularization for deep learning, optimization for training deep models, convolutional
Networks.

UNIT-IV
Sequence Modelling: Recurrent and recursive nets, practical Methodology,
applications

UNIT-V
Deep Learning Research: Linear factor models, auto encoders, variational auto
encoders, restricted Boltzmann machine, generative adversarial networks.

Text Books:
1. Simon Haykin, Neural networks: A comprehensive foundation, Second
Edition, Prentice Hall, New Delhi, 1999, ISBN-81-203-2373-4.
2. Ian Goodfellow, Yoshua Bengio and Aaron Courville, Deep Learning, MIT
Press, 2016.

Reference:
1. Deng & Yu, Deep Learning: Methods and Applications, Now Publishers,
2013.
2. Josh Patterson & Adam Gibson, Deep Learning – A Practitioners Approach,
O’Reilly, 1st Edition 2017.
Course Outcomes (COs):
At the end of the course, students will be able to-

1. Understand the concepts of neural networks relating to artificial intelligence.


(PO-1) (PSO-3)
2. Illustrate the learning processes and their statistical properties. (PO-1,2)
(PSO-3)
3. Build deep learning models using regularization and optimization approaches..
(PO-1,2,3,5,9,10,11,12) (PSO-3)
4. Analyse sequential data to build recurrent and recurrsive models.. (PO-
1,2,3,5,9,10,11,12) (PSO-3)
5. Develop applications using Autoencoders (PO-1,2,3,5,9,10,11,12) (PSO-3)
BUSINESS ANALYTICS
Course Code: ISE744 Credit: 3:0:0
Prerequisite: Nil Contact Hours: 42L
Course Coordinator: Karthik V

Course Contents

UNIT-I
Business Analytics: Why Analytics, Business Analytics: The Science of data driven
decision making, Descriptive Analysis, Predictive Analytics, Prescriptive Analytics,
Big Data Analytics, Web and Social Media Analytics, Machine Learning Algorithms,
Framework for data driven decision making, Analytics Capability Building, Roadmap,
Challenges, Types (Descriptive, Predictive and Prescriptive).
UNIT-II
Descriptive Analytics: Data Types and Scales, Types of Data Measurement Scales,
Population and Sample, Measures of Central Tendency, Percentile, Decile, and
Quartile, Measures of Variation, Measures of Shape −Skewness and Kurtosis, Data
Visualization

UNIT-III
Data Warehousing: Introduction to warehousing, data Mart, Online Analytical
Processing- Tools, data Modelling, OLAP and OLTP, Schema – Star and snowflake.
Modeling Methods using python: Choosing and evaluating models: Mapping problems
to machine learning tasks, Evaluating models, Validating models.

UNIT-IV
Data Analytical Process: Introduction to analytical process, Types of analytical
techniques in BI- Descriptive, Predictive, Perspective, social media analytics,
Behavioral, Iris datasets.

UNIT-V
Implementation of Analytical Process: Business activity monitoring, complex Event
Processing, Business process management, metadata, root cause analysis.

Text Books:
1. U. Dinesh kumar, ”Business Analytical – The science of data driven decision
making”, Wiley 2017

2. Carlo-Vercellis,”Business intelligence datamining and optimization for decision


making”,First Edition.
INFORMATION SECURITY
Course Code: ISE751 Credit: 3:0:0
Prerequisite: Nil Contact Hours: 42L
Course Coordinator: Mrs. Deepthi K
Course Content

UNIT-I
Symmetric Ciphers: Symmetric cipher model, cryptography, cryptanalysis,
Substitution techniques, Transposition Techniques. Block Ciphers and the Data
Encryption Standard: Simplified DES, Block Cipher Principles, DES, Strength of
DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles, Block
Cipher modes of operation.

UNIT-II
Public Key Algorithms: Introduction, Modular Arithmetic, RSA, Diffie-Hellman,
Digital Signature Standards, How Secure are RSA and Diffie-Hellman, Elliptic Curve
Cryptography. Hash and MAC Algorithms: Secure Hash Algorithm, Whirlpool,
HMAC and CMAC.

UNIT-III
Passive information Gathering: starting at the source, Mining Job ads and analyzing
Financial Data, Using Google to Mine sensitive information, Exploring Domain
Ownership. Detecting Live Systems: Detecting Active Systems, Port Scanning, OS
fingerprinting, Scanning countermeasures. Enumerating systems: Enumerating
systems, Advanced Enumeration.

UNIT-IV
Automated Attack and Penetration Tools: Why attack and penetration Tools are
Important, Automated Exploit Tools, Determining Which Tools to use
Defeating Malware: Evolving threat, viruses, and Worms, Trojans.
Malicious Software: Viruses and Related Threats, Virus Countermeasures, DDoS
Attacks
Firewalls: Firewall Design Principles, Trusted Systems

UNIT-V
Securing Wireless Systems: Wi-Fi Basics, Wi-Fi Security, Wireless LAN threats,
Exploiting wireless networks, Securing wireless Networks
Intrusion Detection: Overview ID detection and Prevention, IDS Types and
Components, an overview of Snort, Installing Snort on windows System, and Building
snort rules and interface.
Text Books:
1. William Stallings, “Cryptography and Network Security principles and practices”
4th Edition PHI.
2. Charlie Kaufman et. al , Network Security, 2nd Edition PHI.
3. Michael Gregg, “Building your own Security LAB, A field Guide for Network
Testing” Wiley India 2012.

Reference:
1. Forouzan, “Cryptography and Network Security” 3rd Edition, Tata McGraw Hill

Course Outcomes (COs):


At the end of the course, students will be able to-
1. Apply symmetric and block cipher technique to provide message confidentialy.
(PO-1,2) (PSO-2)
2. Apply asymmetric key algorithms to preserve message authentication and
confidentiality. (PO-1,2) (PSO-2)
3. Understand the different passive information gathering techniques. (PO-1)
(PSO-2)
4. Use the automated tools to detect various types of attacks.(PO-1,2,3,4,5,9,10,12)
(PSO-2)
5. Understand the security concepts of wireless networks. (PO-1) (PSO-2)
BIG DATA COMPUTING
Course Code: ISE754 Credit: 3:0:0
Prerequisite: Nil Contact Hours: 42L
Course Coordinator: Dr. Siddesh G M

Course Content

Unit-I
Types of Digital Data: Classification of Digital Data. Introduction to Big Data: Introduction
to Big Data, Characteristics of Data, Definition of Big Data, Challenges with Big Data,
Characteristics of Data Which are not Definitional Traits of Big Data, Need of Big Data,
Traditional Business Intelligence (BI) versus Big Data. Big Data Analytics: What is Big Data
Analytics?, What Big Data Analytics Isn’t?, Classification of Analytics, Greatest Challenges that
Prevent Businesses from Capitalizing on Big Data, Top Challenges Facing Big Data, Big Data
Analytics Important, Basically Available Soft State Eventual Consistency (BASE)

Unit-II
The Big Data Technology Landscape: NoSQL (Not Only SQL), Hadoop.
Introduction to Hadoop: Introducing Hadoop, Why Hadoop?, Why not RDBMS?, RDBMS
versus Hadoop, Distributed Computing Challenges, History of Hadoop, Hadoop Overview, Use
Case of Hadoop, Hadoop Distributors, HDFS (Hadoop Distributed File System), Processing Data
with Hadoop, Managing Resources and Applications with Hadoop YARN (Yet Another Resource
Negotiator), Interacting with Hadoop Ecosystem

Unit-III
Introduction to Hive: What is Hive?, Hive Architecture, Hive Data Types, Hive File Format,
Hive Query Language (HQL), RCFile Implementation, User-Defined Function (UDF).
Unit-IV
Introduction to Pig: What is Pig?, The Anatomy of Pig, Pig on Hadoop, Pig Philosophy, Use
Case for Pig: ETL Processing, Pig Latin Overview, Data Types in Pig, Running Pig, Execution
Modes of Pig, HDFS Commands, Relational Operators, Eval Function, Complex Data Types,
Piggy Bank, User-Defined Functions (UDF), Parameter Substitution, Diagnostic Operator, Word
Count Example using Pig, When to use Pig?, When not to use Pig?, Pig at Yahoo!, Pig versus
Hive.

Unit–V
Introduction to Cassandra: Apache Cassandra – An Introduction, Features of Cassandra, CQL
Data Types, CQLSH, Keyspaces, CRUD (Create, Read, Update, and Delete) Operations,
Collections, Using a Counter, Time to Live (TTL), Alter Commands, Import and Export,
Querying System Tables, Practice Examples.
Text Books:
Big Data Analytics, Seema Acharya and Subhashini Chellappan. Wiley India Pvt. Ltd. 2015.

References:
Network Data Analytics, Siddesh G M et.al., Springer, 2018.

You might also like