7th Sem Electives
7th Sem Electives
Course Content
UNIT-I
Introduction: Human brain, neuron models, neural nets as directed graphs,
feedback, neural architectures, knowledge representation, connection to artificial
intelligence
UNIT-II
Learning Process: Error-correction learning, memory based learning, Hebbian
learning, competitive learning, Boltzmann learning, credit assignment, learning with
and without a teacher, learning tasks, memory, and statistical learning theory.
UNIT-III
Modern practical deep neural networks: Deep feedforward networks,
regularization for deep learning, optimization for training deep models, convolutional
Networks.
UNIT-IV
Sequence Modelling: Recurrent and recursive nets, practical Methodology,
applications
UNIT-V
Deep Learning Research: Linear factor models, auto encoders, variational auto
encoders, restricted Boltzmann machine, generative adversarial networks.
Text Books:
1. Simon Haykin, Neural networks: A comprehensive foundation, Second
Edition, Prentice Hall, New Delhi, 1999, ISBN-81-203-2373-4.
2. Ian Goodfellow, Yoshua Bengio and Aaron Courville, Deep Learning, MIT
Press, 2016.
Reference:
1. Deng & Yu, Deep Learning: Methods and Applications, Now Publishers,
2013.
2. Josh Patterson & Adam Gibson, Deep Learning – A Practitioners Approach,
O’Reilly, 1st Edition 2017.
Course Outcomes (COs):
At the end of the course, students will be able to-
Course Contents
UNIT-I
Business Analytics: Why Analytics, Business Analytics: The Science of data driven
decision making, Descriptive Analysis, Predictive Analytics, Prescriptive Analytics,
Big Data Analytics, Web and Social Media Analytics, Machine Learning Algorithms,
Framework for data driven decision making, Analytics Capability Building, Roadmap,
Challenges, Types (Descriptive, Predictive and Prescriptive).
UNIT-II
Descriptive Analytics: Data Types and Scales, Types of Data Measurement Scales,
Population and Sample, Measures of Central Tendency, Percentile, Decile, and
Quartile, Measures of Variation, Measures of Shape −Skewness and Kurtosis, Data
Visualization
UNIT-III
Data Warehousing: Introduction to warehousing, data Mart, Online Analytical
Processing- Tools, data Modelling, OLAP and OLTP, Schema – Star and snowflake.
Modeling Methods using python: Choosing and evaluating models: Mapping problems
to machine learning tasks, Evaluating models, Validating models.
UNIT-IV
Data Analytical Process: Introduction to analytical process, Types of analytical
techniques in BI- Descriptive, Predictive, Perspective, social media analytics,
Behavioral, Iris datasets.
UNIT-V
Implementation of Analytical Process: Business activity monitoring, complex Event
Processing, Business process management, metadata, root cause analysis.
Text Books:
1. U. Dinesh kumar, ”Business Analytical – The science of data driven decision
making”, Wiley 2017
UNIT-I
Symmetric Ciphers: Symmetric cipher model, cryptography, cryptanalysis,
Substitution techniques, Transposition Techniques. Block Ciphers and the Data
Encryption Standard: Simplified DES, Block Cipher Principles, DES, Strength of
DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles, Block
Cipher modes of operation.
UNIT-II
Public Key Algorithms: Introduction, Modular Arithmetic, RSA, Diffie-Hellman,
Digital Signature Standards, How Secure are RSA and Diffie-Hellman, Elliptic Curve
Cryptography. Hash and MAC Algorithms: Secure Hash Algorithm, Whirlpool,
HMAC and CMAC.
UNIT-III
Passive information Gathering: starting at the source, Mining Job ads and analyzing
Financial Data, Using Google to Mine sensitive information, Exploring Domain
Ownership. Detecting Live Systems: Detecting Active Systems, Port Scanning, OS
fingerprinting, Scanning countermeasures. Enumerating systems: Enumerating
systems, Advanced Enumeration.
UNIT-IV
Automated Attack and Penetration Tools: Why attack and penetration Tools are
Important, Automated Exploit Tools, Determining Which Tools to use
Defeating Malware: Evolving threat, viruses, and Worms, Trojans.
Malicious Software: Viruses and Related Threats, Virus Countermeasures, DDoS
Attacks
Firewalls: Firewall Design Principles, Trusted Systems
UNIT-V
Securing Wireless Systems: Wi-Fi Basics, Wi-Fi Security, Wireless LAN threats,
Exploiting wireless networks, Securing wireless Networks
Intrusion Detection: Overview ID detection and Prevention, IDS Types and
Components, an overview of Snort, Installing Snort on windows System, and Building
snort rules and interface.
Text Books:
1. William Stallings, “Cryptography and Network Security principles and practices”
4th Edition PHI.
2. Charlie Kaufman et. al , Network Security, 2nd Edition PHI.
3. Michael Gregg, “Building your own Security LAB, A field Guide for Network
Testing” Wiley India 2012.
Reference:
1. Forouzan, “Cryptography and Network Security” 3rd Edition, Tata McGraw Hill
Course Content
Unit-I
Types of Digital Data: Classification of Digital Data. Introduction to Big Data: Introduction
to Big Data, Characteristics of Data, Definition of Big Data, Challenges with Big Data,
Characteristics of Data Which are not Definitional Traits of Big Data, Need of Big Data,
Traditional Business Intelligence (BI) versus Big Data. Big Data Analytics: What is Big Data
Analytics?, What Big Data Analytics Isn’t?, Classification of Analytics, Greatest Challenges that
Prevent Businesses from Capitalizing on Big Data, Top Challenges Facing Big Data, Big Data
Analytics Important, Basically Available Soft State Eventual Consistency (BASE)
Unit-II
The Big Data Technology Landscape: NoSQL (Not Only SQL), Hadoop.
Introduction to Hadoop: Introducing Hadoop, Why Hadoop?, Why not RDBMS?, RDBMS
versus Hadoop, Distributed Computing Challenges, History of Hadoop, Hadoop Overview, Use
Case of Hadoop, Hadoop Distributors, HDFS (Hadoop Distributed File System), Processing Data
with Hadoop, Managing Resources and Applications with Hadoop YARN (Yet Another Resource
Negotiator), Interacting with Hadoop Ecosystem
Unit-III
Introduction to Hive: What is Hive?, Hive Architecture, Hive Data Types, Hive File Format,
Hive Query Language (HQL), RCFile Implementation, User-Defined Function (UDF).
Unit-IV
Introduction to Pig: What is Pig?, The Anatomy of Pig, Pig on Hadoop, Pig Philosophy, Use
Case for Pig: ETL Processing, Pig Latin Overview, Data Types in Pig, Running Pig, Execution
Modes of Pig, HDFS Commands, Relational Operators, Eval Function, Complex Data Types,
Piggy Bank, User-Defined Functions (UDF), Parameter Substitution, Diagnostic Operator, Word
Count Example using Pig, When to use Pig?, When not to use Pig?, Pig at Yahoo!, Pig versus
Hive.
Unit–V
Introduction to Cassandra: Apache Cassandra – An Introduction, Features of Cassandra, CQL
Data Types, CQLSH, Keyspaces, CRUD (Create, Read, Update, and Delete) Operations,
Collections, Using a Counter, Time to Live (TTL), Alter Commands, Import and Export,
Querying System Tables, Practice Examples.
Text Books:
Big Data Analytics, Seema Acharya and Subhashini Chellappan. Wiley India Pvt. Ltd. 2015.
References:
Network Data Analytics, Siddesh G M et.al., Springer, 2018.