B.Tech. AIDS (R2019)
B.Tech. AIDS (R2019)
UNIVERSITY DEPARTMENTS
B.TECH. ARTIFICIAL INTELLIGENCE AND DATA SCIENCE
REGULATIONS – 2019
CHOICE BASED CREDIT SYSTEM
To educate students with conceptual knowledge and technical skills in the field of Information
Technology with moral and ethical values to achieve excellence in academic, industry and research
centric environments.
1. To inculcate in students a firm foundation in theory and practice of IT skills coupled with the
thought process for disruptive innovation and research methodologies, to keep pace with
emerging technologies.
2. To provide a conducive environment for all academic, administrative and interdisciplinary
research activities using state-of-the-art technologies.
3. To stimulate the growth of graduates and doctorates, who will enter the workforce as
productive IT engineers, researchers and entrepreneurs with necessary soft skills and
continue higher professional education with competence in the global market.
4. To enable seamless collaboration with the IT industry and Government for consultancy and
sponsored research.
5. To cater to cross-cultural, multinational and demographic diversity of students.
6. To educate the students on the social, ethical and moral values needed to make significant
contributions to society.
ANNA UNIVERSITY, CHENNAI
UNIVERSITY DEPARTMENTS
B.TECH. ARTIFICIAL INTELLIGENCE AND DATA SCIENCE
REGULATIONS – 2019
CHOICE BASED CREDIT SYSTEM
After going through the four years of study, our Information Technology Graduates will exhibit
ability to:
PO# Graduate Attribute Programme Outcome
Apply knowledge of mathematics, basic science and
1 Engineering knowledge
engineering science.
11 Project management and finance Implement cost effective and improved system.
1. Apply the theoretical knowledge of AI and Data Science for effective decision making in
business and governance domains.
2. Develop the skills in data analytics and data visualization, pertaining to knowledge
acquisition, knowledge representation and knowledge engineering and hence capable of
coordinating complex projects.
3. Accomplish research to cater the critical needs of the society through cutting edge
technologies of AI.
ANNA UNIVERSITY, CHENNAI
UNIVERSITY DEPARTMENTS
B. TECH. ARTIFICIAL INTELLIGENCE AND DATA SCIENCE
REGULATIONS – 2019
CHOICE BASED CREDIT SYSTEM
CURRICULA AND SYLLABI FOR I - VIII SEMESTER
SEMESTER I
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. HS5151 Technical English HSMC 3 0 0 3 3
2. MA5158 Engineering Mathematics I BSC 3 1 0 4 4
3. PH5151 Engineering Physics BSC 3 0 0 3 3
4. CY5151 Engineering Chemistry BSC 3 0 0 3 3
Problem Solving and Python
5. GE5153 ESC 3 0 0 3 3
Programming
தமிழர் மரபு /Heritage of
6. GE5154 HSMC 1 0 0 1 1
Tamils
PRACTICALS
7. BS5161 Basic Sciences Laboratory BSC 0 0 4 4 2
Problem Solving and Python
8. GE5161 ESC 0 0 4 4 2
Programming Laboratory
9. GE5163 English Laboratory$ EEC 0 0 2 2 1
TOTAL 16 1 10 27 22
$
Skill Based Course
SEMESTER II
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. HS5251 Professional Communication HSMC 2 0 0 2 2
2. MA5252 Engineering Mathematics II BSC 3 1 0 4 4
Object Oriented Programming
3. AZ5201 PCC 3 0 0 3 3
and Data Structures
Basics of Electrical and
4. EE5251 ESC 3 0 0 3 3
Electronics Engineering
5. GE5151 Engineering Graphics ESC 1 0 4 5 3
தமிழரும்
6. GE5252 ததொழில் நுட்பமும் /Tamils HSMC 1 0 0 1 1
and Technology
PRACTICALS
7. AZ5211 Data Structures Laboratory PCC 0 0 4 4 2
Electrical and Electronics
8. EE5261 ESC 0 0 4 4 2
Engineering Laboratory
Communication Laboratory /
9. GE5262 EEC 0 0 4 4 2
Foreign Language#
TOTAL 13 1 16 30 22
#
Value Added Courses
SEMESTER III
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1 MA5302 Discrete Mathematics BSC 3 1 0 4 4
Digital Logic and Computer
2 AZ5301 ESC 2 0 2 4 3
Organization
3 IT5402 Design and Analysis of Algorithms PCC 3 0 0 3 3
4 IT5351 Database Management Systems PCC 3 0 0 3 3
5 AZ5302 Fundamentals of Data Science PCC 3 0 0 3 3
6 Electives – Humanities I HSMC 3 0 0 3 3
PRACTICALS
7 AZ5311 Data Science Laboratory PCC 0 0 4 4 2
Database Management Systems
8 IT5312 PCC 0 0 4 4 2
Lab
9 GE5361 Professional Development$ EEC 0 0 2 2 1
TOTAL 17 1 12 30 24
$
Skill Based Course
SEMESTER IV
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1 GE5251 Environmental Sciences BSC 3 0 0 3 3
Mathematical Foundations for
2 AZ5402 PCC 3 0 0 3 3
Data Science
3 IT5403 Operating Systems PCC 3 0 0 3 3
SEMESTER VI
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
AZ5601
1. Deep Learning Techniques PCC 3 0 0 3 3
SEMESTER VIII
TOTAL 3 0 16 19 11
1 HSMC 4 3 3 3 3 0 0 0 16
2 BSC 12 4 4 3 0 0 0 0 23
3 ESC 5 8 3 0 0 0 0 0 16
4 PCC 0 5 13 16 16 13 8 0 71
5 PEC 0 0 0 0 6 6 6 3 21
6 OEC 0 0 0 0 0 3 3 0 6
7 EEC 1 2 1 0 2 1 2 8 17
Non-Credit
8 ✔ ✔
/(Mandatory)
Total 22 22 24 22 27 23 19 11 170
PROFESSIONAL ELECTIVE COURSES: VERTICALS
Computational analytics Data analytics Media Processing Network Security & Cloud AI in Bio Informatics
Sl.No
Domain A Domain B Domain C Domain D Domain E
1. GPU architecture and Predictive Analytics AI based Mobile Applied Cryptography Bio-Informatics
programming VI application V V
V development
VII
2. Algorithmic Graph Theory Reinforcement Applied AI Cloud Security and Privacy Modeling Bio-
V Learning Techniques VI VI Informatics
V VI
3. Quantum Computing Full Stack Data Pattern Recognition Blockchain Technologies AI for Genomics and
VII Science V VI Proteomics
V VII
5. Cognitive Models for Digital Video Multimedia Ethical Hacking AI in Supply Chain
computing Processing Technologies V
VII VI VII VI
6. Service Oriented Information Retrieval Mixed Reality Artificial Intelligence in Cyber Ethics for AI
architecture V VI Security VII
V VII
LIST OF PROFESSIONAL ELECTIVES
COURSE CONTACT
S.NO COURSE TITLE CATE L T P C
CODE PERIODS
GORY
1. MA5158 Engineering Mathematics I BSC 3 1 0 4 4
2. PH5151 Engineering Physics BSC 3 0 0 3 3
3. CY5151 Engineering Chemistry BSC 3 0 0 3 3
4. BS5161 Basic Sciences Laboratory BSC 0 0 4 4 2
5. MA5252 Engineering Mathematics II BSC 0 0 4 4 2
6. MA5302 Discrete Mathematics BSC 3 1 0 4 4
COURSE CONTACT
S.NO COURSE TITLE CATE L T P C
CODE PERIODS
GORY
Problem Solving and Python
1. GE5153 ESC 3 0 0 3 3
Programming
Basics of Electrical and
2. EE5251 ESC 3 0 0 3 3
Electronics Engineering
3. GE5151 Engineering Graphics ESC 1 0 4 5 3
$
Skill Based Courses
LEARNING OUTCOMES:
On completion of the course, the students will be able to:
Use appropriate language structures and lexical items in authentic contexts.
Read both general and technical texts and comprehend their denotative and connotative
meanings.
Write different kinds of formal documents with grammatical and lexical appropriacy.
Assessment Pattern
Two written internal assessments to test learner’s progress in grammar, vocabulary,
reading and writing skills.
End Semester exam to be tested in two parts: Theory exam for three hours and listening
and speaking skills for two hours.
OBJECTIVES:
To develop the use of matrix algebra techniques that is needed by engineers for practical
applications.
To familiarize the students with differential calculus.
To familiarize the student with functions of several variables. This is needed in many
branches of engineering.
To make the students understand various techniques of integration.
To acquaint the student with mathematical tools needed in evaluating multiple integrals and
their applications.
UNIT I MATRICES 12
Eigenvalues and Eigenvectors of a Real Matrix – Characteristic Equation – Properties of
Eigenvalues and Eigenvectors – Cayley-Hamilton Theorem – Diagonalization of Matrices –
Reduction of a Quadratic Form to Canonical Form by Orthogonal Transformation – Nature of
Quadratic Forms.
TOTAL : 60 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1. Use the matrix algebra methods for solving practical problems.
2. Apply differential calculus tools in solving various application problems.
3. Able to use differential calculus ideas on several variable functions.
4. Apply different methods of integration in solving practical problems.
5. Apply multiple integral ideas in solving areas, volumes and other practical problems.
TEXTBOOKS:
1. Grewal B.S., “Higher Engineering Mathematics”, Khanna Publishers, Forty Fourth Edition,
New Delhi, 2017.
2. James Stewart, "Calculus with Early Transcendental Functions", Cengage Learning, Sixth
Edition, New Delhi,2013.
3. Joel Hass, Christopher Heil and Maurice D.Weir, "Thomas' Calculus", Pearson, Fourteenth
Edition, New Delhi, 2018.
4. Narayanan S. and Manicavachagom Pillai T. K., “Calculus" Volume I and II,
S. Viswanathan Publishers Pvt. Ltd., Chennai, 2009.
REFERENCES:
1. Bali N., Goyal M., Watkins C., “Advanced Engineering Mathematics”, Firewall Media (An
imprint of Lakshmi Publications Pvt., Ltd.,), Seventh Edition, New Delhi, 2009.
2. Erwin Kreyszig, "Advanced Engineering Mathematics", John Wiley and Sons, Tenth Edition,
New Delhi, 2015.
3. Greenberg M.D., “Advanced Engineering Mathematics”, Pearson Education, Second
Edition, Fifth Reprint, Delhi, 2009.
4. Jain R.K., Iyengar S.R.K., “Advanced Engineering Mathematics”,Narosa Publications, Fifth
Edition, New Delhi, 2017.
5. Peter V.O’Neil, “Advanced Engineering Mathematics”, Cengage Learning India Pvt., Ltd,
Seventh Edition, New Delhi , 2012.
6. Ramana B.V., “Higher Engineering Mathematics”, Tata McGraw Hill Co. Ltd., Eleventh
Reprint, New Delhi, 2010.
OBJECTIVE
To make the students in understanding the importance of mechanics.
To equip the students on the knowledge of electromagnetic waves.
To introduce the basics of oscillations, optics and lasers.
To enable the students in understanding the importance of quantum physics.
To elucidate the application of quantum mechanics towards the formation of energy bands
in crystalline materials.
UNIT I MECHANICS 9
Moment of Inertia (M.I) - Radius of Gyration - Theorems of M .I – M.I of Circular Disc, Solid Cylinder
, Hollow Cylinder , Solid Sphere and Hollow Sphere – K.E of a Rotating Body – M.I of a Diatomic
Molecule – Rotational Energy State of a Rigid Diatomic Molecule – Centre of Mass – Conservation
of Linear Momentum – Relation Between Torque and Angular momentum – Torsional pendulum.
TEXT BOOKS
1. D.Kleppner, R.Kolenkow., “An Introduction to Mechanics”, McGraw Hill Education, 2017.
2. D.Halliday, R.Resnick, J.Walker, “Principles of Physics”. John Wiley & Sons, 2015.
3. N.Garcia, A.Damask, S.Schwarz, “Physics for Computer Science Students”, Springer-
Verlag, 2012.
REFERENCES:
1. R.Wolfson, “Essential University Physics”, Volume 1 & 2, Pearson, 2016.
2. D.J.Griffiths, “Introduction to Electrodynamics. Pearson Education”, 2015.
3. K.Thyagarajan, A.Ghatak, “Lasers: Fundamentals and Applications”, Springer, 2012.
UNIT II NANOCHEMISTRY 9
Basics – Distinction Between Molecules, Nanomaterials and Bulk Materials; Size-Dependent
Properties. Types – Nanoparticle, Nanocluster, Nanorod, Nanowire and Nanotube. Preparation of
Nanomaterials: Sol-Gel, Solvothermal, Laser Ablation, Chemical Vapour Deposition,
Electrochemical Deposition and Electro Spinning. Characterization – Scanning Electron Microscope
and Transmission Electron Microscope – Principle and Instrumentation (Block Diagram). Properties
(Optical, Electrical, Mechanical and Magnetic) and Applications of Nanomaterials – Medicine,
Agriculture, Electronics and Catalysis.
TEXT BOOKS:
1. Jain P. C., Monica Jain., “Engineering Chemistry”, Sixteenth Edition, Dhanpat Rai Publishing
Company (P) Ltd, New Delhi, 2015.
2. Sivasankar B., “Engineering Chemistry”, Tata McGraw-Hill Publishing Company Ltd, New
Delhi, 2012.
3. S.S.Dara, “A text book of Engineering Chemistry”, Chand Publications, 2014.
REFERENCES:
1. Schdeva M V, “Basics of Nano Chemistry”, Anmol Publications Pvt Ltd
2. B.Sivasankar, “Instrumental Methods of Analysis”, Oxford University Press. 2012.
3. Friedrich Emich, “Engineering Chemistry”, Scientific International Ltd.
4. V RGowariker, N V Viswanathan, Jayadev Sreedhar, “Polymer Science”, New AGE
International Publishers, 2009.
OBJECTIVES:
To know the basics of algorithmic problem solving.
To develop Python programs with conditionals and loops.
To define Python functions and use function calls.
To use Python data structures - lists, tuples, dictionaries.
To do input/output with files in Python.
UNIT I INTRODUCTION TO COMPUTING AND PROBLEM SOLVING 9
Fundamentals of Computing – Computing Devices – Identification of Computational Problems –
Pseudocodes and Flowcharts – Instructions – Algorithms – Building Blocks of Algorithms –
Introduction to Python Programming – Python Interpreter and Interactive Mode – Variables and
Identifiers – Arithmetic Operators– Values and Types – Statements.
Suggested Activities:
Developing Pseudocodes and flowcharts for real life activities such as railway ticket booking
using IRCTC, admission process to undergraduate course, academic schedules during a
semester etc.
Developing algorithms for basic mathematical expressions using arithmetic operations.
Installing Python.
Simple programs on print statements, arithmetic operations.
Suggested Activities:
Simple Python program implementation using Operators, Conditionals, Iterative Constructs
and Functions.
Implementation of a simple calculator.
Developing simple applications like calendar, phone directory, to-do lists etc.
Flow charts for GCD, Exponent Functions, Fibonacci Series using conditionals and iterative
statements.
External learning - Recursion vs. Iteration.
Suggested Activities:
Implementing Python program by importing Time module, Math package etc.
Creation of any package (student’s choice) and importing into the application.
Suggested Activities:
Developing modules using Python to handle files and apply various operations on files.
Usage of exceptions, multiple except blocks - for applications that use delimiters like age,
range of numerals etc.
Implementing Python program to open a non-existent file using exceptions.
TEXT BOOKS:
1. Reema Thareja, “Python Programming: Using Problem Solving Approach”, Oxford University
Press, 2017.
2. Allen B. Downey, “Think Python: How to Think Like a Computer Scientist”, Second Edition,
Shroff/O‘Reilly Publishers, 2016.
(http://greenteapress.com/wp/thinkpython/).
REFERENCES:
1. Guido van Rossum, Fred L. Drake Jr., “An Introduction to Python – Revised and Updated for
Python 3.2”, Network Theory Ltd., 2011.
2. John V Guttag, “Introduction to Computation and Programming Using Python”, Revised and
Expanded Edition, MIT Press , 2013
3. Charles Dierbach, “Introduction to Computer Science using Python”, Wiley India Edition,
2016.
4. Timothy A. Budd, “Exploring Python”, Mc-Graw Hill Education (India) Private Ltd., 2015.
5. Kenneth A. Lambert, “Fundamentals of Python: First Programs”, Cengage Learning, 2012.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
TOTAL : 15 PERIODS
TEXT-CUM-REFERENCE BOOKS
1. தமிழக வரலொறு – மக்களும் பண்பொடும் – கக.கக. பிள் ளள (தவளியீடு:
தமிழ் நொடு பொடநூல் மற் றும்
கல் வியியல் பணிகள் கழகம் ).
2. கணினித் தமிழ் – முளனவர் இல. சுந்தரம் . (விகடன் பிரசுரம் ).
3. கீழடி – ளவளக நதிக்களரயில் சங் ககொல நகர நொகரிகம் (ததொல் லியல்
துளற தவளியீடு)
4. தபொருளந – ஆற் றங் களர நொகரிகம் . (ததொல் லியல் துளற தவளியீடு)
5. Social Life of Tamils (Dr.K.K.Pillay) A joint publication of TNTB & ESC and RMRL – (in print)
6. Social Life of the Tamils - The Classical Period (Dr.S.Singaravelu) (Published by:
International Institute of Tamil Studies.
7. Historical Heritage of the Tamils (Dr.S.V.Subatamanian, Dr.K.D. Thirunavukkarasu)
(Published by: International Institute of Tamil Studies).
8. The Contributions of the Tamils to Indian Culture (Dr.M.Valarmathi) (Published by:
International Institute of Tamil Studies.)
9. Keeladi - ‘Sangam City C ivilization on the banks of river Vaigai’ (Jointly Published by:
Department of Archaeology & Tamil Nadu Text Book and Educational Services Corporation,
Tamil Nadu)
10. Studies in the History of India with Special Reference to Tamil Nadu (Dr.K.K.Pillay)
(Published by: The Author)
11. Porunai Civilization (Jointly Published by: Department of Archaeology & Tamil Nadu Text
Book and Educational Services Corporation, Tamil Nadu)
12. Journey of Civilization Indus to Vaigai (R.Balakrishnan) (Published by: RMRL) – Reference
Book.
அலகு V இந் திய கதசிய இயக்கம் மற் றும் இந் திய பை்பொட்டிற் குத்
தமிழர்களின் பங் களிப் பு: 3
இந்திய விடுதளலப்கபொரில் தமிழர்களின் பங் கு – இந்தியொவின் பிறப் பகுதிகளில்
தமிழ் ப் பண்பொட்டின் தொக்கம் – சுயமரியொளத இயக்கம் – இந்திய மருத்துவத்தில் ,
சித்த மருத்துவத்தின் பங் கு – கல் தவட்டுகள் , ளகதயழுத்துப் படிகள் - தமிழ் ப்
புத்தகங் களின் அச்சு வரலொறு.
TOTAL : 15 PERIODS
TEXT-CUM-REFERENCE BOOKS
1. தமிழக வரலொறு – மக்களும் பண்பொடும் – கக.கக. பிள் ளள (தவளியீடு:
தமிழ் நொடு பொடநூல் மற் றும்
கல் வியியல் பணிகள் கழகம் ).
2. கணினித் தமிழ் – முளனவர் இல. சுந்தரம் . (விகடன் பிரசுரம் ).
3. கீழடி – ளவளக நதிக்களரயில் சங் ககொல நகர நொகரிகம் (ததொல் லியல்
துளற தவளியீடு)
4. தபொருளந – ஆற் றங் களர நொகரிகம் . (ததொல் லியல் துளற தவளியீடு)
5. Social Life of Tamils (Dr.K.K.Pillay) A joint publication of TNTB & ESC and RMRL – (in print)
6. Social Life of the Tamils - The Classical Period (Dr.S.Singaravelu) (Published by:
International Institute of Tamil Studies.
7. Historical Heritage of the Tamils (Dr.S.V.Subatamanian, Dr.K.D. Thirunavukkarasu)
(Published by: International Institute of Tamil Studies).
8. The Contributions of the Tamils to Indian Culture (Dr.M.Valarmathi) (Published by:
International Institute of Tamil Studies.)
9. Keeladi - ‘Sangam City C ivilization on the banks of river Vaigai’ (Jointly Published by:
Department of Archaeology & Tamil Nadu Text Book and Educational Services Corporation,
Tamil Nadu)
10. Studies in the History of India with Special Reference to Tamil Nadu (Dr.K.K.Pillay)
(Published by: The Author)
11. Porunai Civilization (Jointly Published by: Department of Archaeology & Tamil Nadu Text
Book and Educational Services Corporation, Tamil Nadu)
12. Journey of Civilization Indus to Vaigai (R.Balakrishnan) (Published by: RMRL) – Reference
Book.
OBJECTIVE
To inculcate experimental skills to test basic understanding of physics of materials including
properties of matter, thermal and optical properties.
To induce the students to familiarize with experimental determination of velocity of ultrasonic
waves and band gap determination.
LIST OF EXPERIMENTS:
1. Torsional pendulum – Determination of rigidity modulus of wire and moment of inertia of disc.
2. Non-uniform bending – Determination of young’s modulus.
3. Uniform bending – Determination of young’s modulus.
4. Lee’s disc Determination of thermal conductivity of a bad conductor.
5. Potentiometer – Determination of thermo e.m.f of a thermocouple.
6. Laser- Determination of the wave length of the laser using grating.
7. Air wedge – Determination of thickness of a thin sheet/wire.
8. Optical fibre – Determination of Numerical Aperture and acceptance angle.
9. Compact disc – Determination of width of the groove using laser..
10. Acoustic grating – Determination of velocity of ultrasonic waves in liquids.
11. Ultrasonic interferometer – determination of the velocity of sound and compressibility of
liquids.
12. Post office box – Determination of Band gap of a semiconductor.
13. Spectrometer – Determination of wavelength using gating.
14. Photoelectric effect.
15. Michelson Interferometer.
16. Estimation of laser parameters.
17. Melde’s string experiment.
TOTAL: 30 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1. Determine various moduli of elasticity and also various thermal and optical properties of
materials.
2. Determine the velocity of ultrasonic waves, band gap determination and viscosity of liquids.
BASIC SCIENCE LABORATORY
CHEMISTRY LABORATORY: (Minimum of 8 experiments to be conducted)
OBJECTIVES:
To inculcate experimental skills to test basic understanding of water quality parameters, such
as, acidity, alkalinity, hardness, DO, chloride and copper.
To induce the students to familiarize with electroanalytical techniques such as, pH metry,
potentiometry and conductometry in the determination of impurities in aqueous solutions.
LIST OF EXPERIMENTS:
1. Estimation of HCl using Na2CO3 as primary standard and Determination of alkalinity in water
sample.
2. Determination of total, temporary & permanent hardness of water by EDTA method.
3. Determination of DO content of water sample by Winkler‟s method.
4. Determination of chloride content of water sample by argentometric method.
5. Estimation of copper content of the given solution by Iodometry.
6. Determination of strength of given hydrochloric acid using pH meter.
7. Determination of strength of acids in a mixture of acids using conductivity meter.
8. Estimation of iron content of the given solution using potentiometer.
9. Estimation of iron content of the water sample using spectrophotometer (1, 10-
Phenanthroline / thiocyanate method).
10. Estimation of sodium and potassium present in water using flame photometer.
11. Determination of molecular weight of polyvinylalcohol using Ostwald viscometer.
12. Pseudo first order kinetics-ester hydrolysis.
13. Corrosion experiment-weight loss method.
14. Phase change in a solid.
TOTAL: 30 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1. Analyse the quality of water samples with respect to their acidity, alkalinity, hardness and
DO.
2. Determine the amount of metal ions through volumetric and spectroscopic techniques.
3. Determine the molecular weight of polymers by viscometric method.
4. Quantitatively analyse the impurities in solution by electroanalytical techniques.
5. Design and analyse the kinetics of reactions and corrosion of metals.
TEXT BOOKS:
1. Laboratory Manual- Department of Chemistry, CEGC, Anna University (2014).
2. Vogel‟s Textbook of Quantitative Chemical Analysis (Eighth Edition, 2014).
GE5161 PROBLEM SOLVING AND PYTHON PROGRAMMING LABORATORY LT PC
0 04 2
OBJECTIVES:
To understand the problem solving approaches.
To learn the basic programming constructs in Python.
To articulate where computing strategies support in providing Python-based solutions to real
world problems.
To use Python data structures - lists, tuples, dictionaries.
To do input/output with files in Python.
EXPERIMENTS:
1. Identification and solving of simple real life or scientific or technical problems, and developing
flow charts for the same.
2. Python programming using simple statements and expressions.
3. Scientific problems using Conditionals and Iterative loops.
4. Implementing real-time/technical applications using Lists, Tuples.
5. Implementing real-time/technical applications using Sets, Dictionaries.
6. Implementing programs using Functions.
7. Implementing programs using Strings.
8. Implementing programs using written modules and Python Standard Libraries.
9. Implementing real-time/technical applications using File handling.
10. Implementing real-time/technical applications using Exception handling.
11. Exploring Pygame tool.
12. Developing a game activity using Pygame like bouncing ball, car race etc.
TOTAL: 60 PERIODS
OUTCOMES:
On completion of the course, students will be able to:
CO1: Develop algorithmic solutions to simple computational problems
CO2: Develop and execute simple Python programs.
CO3: Structure simple Python programs for solving problems.
CO4: Decompose a Python program into functions.
CO5: Represent compound data using Python data structures.
CO6: Apply Python features in developing software applications.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
CO6
GE5163 ENGLISH LABORATORY L T P C
0 0 2 1
OBJECTIVES :
To improve the communicative competence of learners
To help learners use language effectively in academic /work contexts
To develop various listening strategies to comprehend various types of audio materials like
lectures, discussions, videos etc.
To build on students’ English language skills by engaging them in listening, speaking and
grammar learning activities that are relevant to authentic contexts.
To use language efficiently in expressing their opinions via various media.
UNIT V EXPRESSION 6
Listening – Listening to debates/ discussions; different viewpoints on an issue; and panel
discussions. Speaking –making predictions- talking about a given topic-giving opinions-
understanding a website-describing processes
TOTAL : 30 PERIODS
LEARNING OUTCOMES:
At the end of the course, learners will be able
To listen and comprehend complex academic texts
To speak fluently and accurately in formal and informal communicative contexts
To express their opinions effectively in both oral and written medium of communication
ASSESSMENT PATTERN
One online / app based assessment to test listening /speaking
End Semester ONLY listening and speaking will be conducted online.
Proficiency certification is given on successful completion of listening and speaking internal
test and end semester exam.
TOTAL : 30 PERIODS
LEARNING OUTCOMES
On completion of the course, the students will be able to:
OBJECTIVES:
To acquaint the students with the concepts of vector calculus which naturally arises in many
engineering problems.
To develop an understanding of the standard techniques of complex variable theory in
particular analytic function and its mapping property.
To familiarize the students with complex integration techniques and contour integration
techniques which can be used in real integrals.
To acquaint the students with Differential Equations which are significantly used in
Engineering problems.
To make the students appreciate the purpose of using transforms to create a new domain in
which it is easier to handle the problem that is being investigated.
TEXTBOOKS:
1. Erwin Kreyszig, "Advanced Engineering Mathematics", John Wiley and Sons, Tenth Edition,
New Delhi, 2015.
2. Grewal B.S., “Higher Engineering Mathematics”, Khanna Publishers, Forty fourth Edition,
New Delhi, 2017.
REFERENCES:
1. Bali N., Goyal M., Watkins C., “Advanced Engineering Mathematics”, Firewall Media (An
imprint of Lakshmi Publications Pvt., Ltd.,), Seventh Edition, New Delhi, 2009.
2. Glyn James, “Advanced Modern Engineering Mathematics”, Pearson Education, Fourth
Edition, New Delhi, 2011.
3. Jain R.K., Iyengar S.R.K., “Advanced Engineering Mathematics”, Narosa Publications, Fifth
Edition, New Delhi, 2017.
4. Peter V.O’Neil, “Advanced Engineering Mathematics”, Cengage Learning India Pvt., Ltd,
Seventh Edition, New Delhi, 2012.
5. Ramana B.V., “Higher Engineering Mathematics”, Tata McGraw Hill Co. Ltd., Eleventh
Reprint, New Delhi, 2010.
OBJECTIVES:
To understand the Object Oriented Programming(OOP) language concepts.
To learn and implement different data structures using OOP concepts.
To learn and use hierarchical data structures and its operations
To learn the usage of graphs in real world problems
To familiarize the techniques of Sorting, Searching and Hashing.
Suggested Activities:
Flipped Classroom on basics of exception handling.
External learning - STL Containers and Iterators.
Practical - Solve a given problem (such as Vector Manipulation, List Updation) by choosing
appropriate functions from STL.
Exploration on the usage of Virtual Functions and Abstract Classes.
Application development using exception handling.
Suggested Activities:
Flipped classroom on priority queue
Converting an algorithm from recursive to non-recursive using stack.
Demonstrating stack for Towers of Hanoi application
Developing any application using all the linear data structures.
Suggested Activities:
Flipped classroom on selection sort.
External learning - External sorting implementation.
Implementation of all sorting techniques.
Demonstration of searching techniques under best and worst case inputs.
Suggested Evaluation Methods:
Tutorials on External sorting.
Checking output of programs implemented.
TOTAL: 45 PERIODS
OUTCOMES:
Upon the completion of the course the student should be able to
Implement advanced data structures through ADTs using OOP.
Select and use appropriate linear/non–linear data structure for solving a given problem.
Apply suitable hierarchical data structures to solve practical problems.
Apply the graph data structures for a real world problem.
Appropriately use sort, search, hash techniques for a given application.
TEXT BOOKS:
1. Herbert Schildt, “C++ The Complete Reference”, Fourth Edition, McGraw Hill Education,
2003.
2. Mark Allen Weiss, “Data Structures and Algorithm Analysis in C++”, Fourth Edition, Pearson
Education, 2013.
REFERENCES:
1. Paul Deitel, Harvey Deitel, “C++ How to Program”, Tenth Edition, Pearson Education,
2017.
2. Michael T, Goodrich, Roberto Tamassia, David Mount, ““Data Structures and Algorithms
in C++”, Seventh Edition, Wiley Publishers, 2004.
3. Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman, “Data Structures and Algorithms”,
Pearson Education, 2006.
4. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein,
“Introduction to Algorithms”, Third Edition, Prentice-Hall, 2011.
OBJECTIVES:
To understand the basic concepts of electric circuits, magnetic circuits and wiring.
To understand the operation of AC and DC machines.
To understand the working principle of electronic devices and circuits.
REFERENCES:
1. Thomas L. Floyd, ‘Electronic Devices’, 10th Edition, Pearson Education, 2018.
2. Albert Malvino, David Bates, ‘Electronic Principles, McGraw Hill Education; 7th edition,
2017
3. Kothari DP and I.J Nagrath, “Basic Electrical Engineering”, McGraw Hill, 2010.
4. Muhammad H.Rashid, “Spice for Circuits and electronics”, 4th ed., Cengage India,2019.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
COURSE OBJECTIVES:
To draw free hand sketches of basic geometrical shapes and multiple views of objects.
To draw orthographic projections of lines and planes.
To draw orthographic projections of solids.
To draw the development of surfaces of objects.
To draw isometric and perspective views of simple solids.
COURSE OUTCOMES:
On completion of this course, the students will be able to:
1. Draw free hand sketching of basic geometrical shapes and multiple views of objects.
2. Draw orthographic projections of lines and planes
3. Draw orthographic projections of solids
4. Draw development of the surfaces of objects
5. Draw isometric and perspective views of simple solids.
TEXT BOOKS:
1. Bhatt, N. D.,Panchal V M and Pramod R. Ingle, “Engineering Drawing”, Charotar Publishing
House, 53rd Edition, 2014.
2. Parthasarathy, N. S. and Vela Murali, “Engineering Drawing”, Oxford University Press, 2015
REFERENCES:
1. Agrawal, B. and Agrawal C.M., “Engineering Drawing”, Tata McGraw, N.Delhi, 2008.
2. Gopalakrishna, K. R., “Engineering Drawing”, Subhas Stores, Bangalore, 2007.
3. Natarajan, K. V., “A text book of Engineering Graphics”, 28thEd., Dhanalakshmi Publishers,
Chennai, 2015.
4. Shah, M. B., and Rana, B. C., “Engineering Drawing”, Pearson, 2ndEd., 2009.
5. Venugopal, K. and Prabhu Raja, V., “Engineering Graphics”, New Age,2008.
Publication of Bureau of Indian Standards:
1. IS 10711 – 2001: Technical products Documentation – Size and lay out of drawing sheets
2. IS 9609 (Parts 0 & 1) – 2001: Technical products Documentation – Lettering.
3. IS 10714 (Part 20) – 2001 & SP 46 – 2003: Lines for technical drawings.
4. IS 11669 – 1986 & SP 46 – 2003: Dimensioning of Technical Drawings.
5. IS 15021 (Parts 1 to 4) – 2001: Technical drawings – Projection Methods.
TOTAL : 15 PERIODS
TEXT-CUM-REFERENCE BOOKS
1. தமிழக வரலொறு – மக்களும் பண்பொடும் – கக.கக. பிள் ளள (தவளியீடு:
தமிழ் நொடு பொடநூல் மற் றும்
கல் வியியல் பணிகள் கழகம் ).
2. கணினித் தமிழ் – முளனவர் இல. சுந்தரம் . (விகடன் பிரசுரம் ).
3. கீழடி – ளவளக நதிக்களரயில் சங் ககொல நகர நொகரிகம் (ததொல் லியல்
துளற தவளியீடு)
4. தபொருளந – ஆற் றங் களர நொகரிகம் . (ததொல் லியல் துளற தவளியீடு)
5. Social Life of Tamils (Dr.K.K.Pillay) A joint publication of TNTB & ESC and RMRL – (in print)
6. Social Life of the Tamils - The Classical Period (Dr.S.Singaravelu) (Published by:
International Institute of Tamil Studies.
7. Historical Heritage of the Tamils (Dr.S.V.Subatamanian, Dr.K.D. Thirunavukkarasu)
(Published by: International Institute of Tamil Studies).
8. The Contributions of the Tamils to Indian Culture (Dr.M.Valarmathi) (Published by:
International Institute of Tamil Studies.)
9. Keeladi - ‘Sangam City C ivilization on the banks of river Vaigai’ (Jointly Published by:
Department of Archaeology & Tamil Nadu Text Book and Educational Services Corporation,
Tamil Nadu)
10. Studies in the History of India with Special Reference to Tamil Nadu (Dr.K.K.Pillay)
(Published by: The Author)
11. Porunai Civilization (Jointly Published by: Department of Archaeology & Tamil Nadu Text
Book and Educational Services Corporation, Tamil Nadu)
12. Journey of Civilization Indus to Vaigai (R.Balakrishnan) (Published by: RMRL) – Reference
Book.
TEXT-CUM-REFERENCE BOOKS
1. தமிழக வரலொறு – மக்களும் பண்பொடும் – கக.கக. பிள் ளள (தவளியீடு:
தமிழ் நொடு பொடநூல் மற் றும்
கல் வியியல் பணிகள் கழகம் ).
2. கணினித் தமிழ் – முளனவர் இல. சுந்தரம் . (விகடன் பிரசுரம் ).
3. கீழடி – ளவளக நதிக்களரயில் சங் ககொல நகர நொகரிகம் (ததொல் லியல்
துளற தவளியீடு)
4. தபொருளந – ஆற் றங் களர நொகரிகம் . (ததொல் லியல் துளற தவளியீடு)
5. Social Life of Tamils (Dr.K.K.Pillay) A joint publication of TNTB & ESC and RMRL – (in print)
6. Social Life of the Tamils - The Classical Period (Dr.S.Singaravelu) (Published by:
International Institute of Tamil Studies.
7. Historical Heritage of the Tamils (Dr.S.V.Subatamanian, Dr.K.D. Thirunavukkarasu)
(Published by: International Institute of Tamil Studies).
8. The Contributions of the Tamils to Indian Culture (Dr.M.Valarmathi) (Published by:
International Institute of Tamil Studies.)
9. Keeladi - ‘Sangam City C ivilization on the banks of river Vaigai’ (Jointly Published by:
Department of Archaeology & Tamil Nadu Text Book and Educational Services Corporation,
Tamil Nadu)
10. Studies in the History of India with Special Reference to Tamil Nadu (Dr.K.K.Pillay)
(Published by: The Author)
11. Porunai Civilization (Jointly Published by: Department of Archaeology & Tamil Nadu Text
Book and Educational Services Corporation, Tamil Nadu)
12. Journey of Civilization Indus to Vaigai (R.Balakrishnan) (Published by: RMRL) – Reference
Book.
OBJECTIVES:
To understand the concepts of Object Oriented Programming.
To use standard template library in the implementation of standard data structures.
To learn the data structures using Object Oriented Programming (OOP) language.
To explore linear and non-linear structures using OOP concepts.
To understand various sorting, searching algorithms using OOP concepts.
LIST OF EXPERIMENTS
1. Verification of Kirchhoff’s Law.
2. Steady state response of AC and DC circuits (Mesh, Node Analysis)
3. Frequency response of RLC circuits.
4. Measurement power in three phase circuits by two-watt meter method.
5. Regulation of single phase transformer.
6. Performance characteristics of DC shunt generator.
7. Performance characteristics of single phase induction motor.
8. Characteristics of PN diode and Zener diode.
9. Characteristics of Zener diode.
10. Half wave and full wave Rectifiers
11. Application of Zener diode as shunt regulator.
12. Characteristics of BJT and JFET
TOTAL: 60 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1. Become familiar with the basic circuit components and know how to connect them to make
a real electrical circuit.
2. Perform speed characteristic of different electrical machines.
3. Use logic gates and Flip flops.
UNIT I 12
Speaking-Role Play Exercises Based on Workplace Contexts, - talking about competition-
discussing progress toward goals-talking about experiences- talking about events in life- discussing
past events-Writing: writing emails ( formal & semi-formal).
UNIT II 12
Speaking: discussing news stories-talking about frequency-talking about travel problems-
discussing travel procedures- talking about travel problems- making arrangements-describing
arrangements-discussing plans and decisions- discussing purposes and reasons- understanding
common technology terms-Writing: - writing different types of emails.
UNIT III 12
Speaking: discussing predictions-describing the climate-discussing forecasts and scenarios- talking
about purchasing-discussing advantages and disadvantages- making comparisons- discussing likes
and dislikes- discussing feelings about experiences-discussing imaginary scenarios Writing: short
essays and reports-formal/semi-formal letters.
UNIT IV 12
Speaking: discussing the natural environment-describing systems-describing position and
movement- explaining rules-( example- discussing rental arrangements)- understanding technical
instructions-Writing: writing instructions-writing a short article.
UNIT V 12
Speaking: describing things relatively-describing clothing-discussing safety issues( making
recommendations) talking about electrical devices-describing controlling actions- Writing: job
application( Cover letter + Curriculum vitae)-writing recommendations.
TOTAL: 60 PERIODS
LEARNING OUTCOMES
Speak effectively in group discussions held in a formal/semi formal contexts.
Write emails and effective job applications.
Assessment Pattern
One online / app based assessment to test speaking and writing skills
Proficiency certification is given on successful completion of speaking and writing.
UNIT II COMBINATORICS 12
Mathematical Induction – Strong Induction and Well Ordering – The Basics of Counting - The
Pigeonhole Principle – Permutations and Combinations – Recurrence Relations - Solving Linear
Recurrence Relations Using Generating Functions – Inclusion – Exclusion – Principle and Its
Applications.
TOTAL: 60 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1. Understand the validity of the logical arguments, mathematical proofs and correctness of the
algorithm.
2. Apply combinatorial counting techniques in solving combinatorial related problems.
3. Use graph models and their connectivity, traversability in solving real world problems.
4. Understand the significance of algebraic structural ideas used in coding theory and
cryptography.
5. Apply Boolean laws and Boolean functions in combinatorial circuit designs.
TEXTBOOKS:
1. Kenneth H.Rosen, “Discrete Mathematics and its Applications”, Tata Mc Graw Hill Pub.
Co.Ltd., Seventh Edition, Special Indian Edition, New Delhi, 2011.
2. Tremblay J.P. and Manohar R, “Discrete Mathematical Structures with Applications to
Computer Science”, Tata McGraw Hill Pub. Co. Ltd, Thirtieth Reprint, New Delhi, 2011.
REFERENCES:
1. Ralph. P. Grimaldi, “Discrete and Combinatorial Mathematics: An Applied Introduction”,
Pearson Education, Fifth Edition, New Delhi, 2014.
2. Seymour Lipschutz and Mark Lipson, ”Discrete Mathematics”, Schaum‘s Outlines, Tata
McGraw Hill Pub. Co. Ltd., Third Edition, New Delhi, 2013.
3. Thomas Koshy,” Discrete Mathematics with Applications”, Elsevier Publications, Boston,
2004.
Digital Systems – Binary Numbers Representation of Positive and Negative Numbers – 1’s and 2’s
Complements –– Boolean Algebra –Theorems and Postulates – Functions – Truth Table – Logic
Gates – Universal gates– Minterms and Maxterms Canonical and Standard Forms –– Simplification
using K-Maps. – Signed Binary Numbers. Commonly used weighted binary codes and its conversion
Functional Units of a Digital Computer – Von Neumann Architecture - Operation and Operands of
Computer Hardware – Software Interface –Instruction Set Architecture – RISC and CISC
Architectures – Addressing Modes –Performance Metrics – Power Law – Amdahl’s Law.
UNIT IV PROCESSOR 6
Instruction Execution – Building a Data Path – Designing a Control Unit – Hardwired Control,
Microprogrammed Control – Pipelining – Structural Hazards - Data Hazard – Control Hazards.
TOTAL:30 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
1. Verification of Boolean theorems using logic gates.
2. Design and implementation of combinational circuits using gates for arbitrary functions.
3. Implementation of 4-bit binary adder/subtractor circuits.
4. Implementation of code converters.
5. Implementation of BCD adder, encoder and decoder circuits
6. Implementation of functions using Multiplexers.
7. Implementation of the synchronous counters
8. Implementation of a Universal Shift register.
9. Simulator based study of Computer Architecture (MARS based basic exercises)
COURSE OUTCOMES:
At the end of this course, the students will be able to:
CO1 : To learn Boolean algebra and simplification of Boolean functions.
CO2 : Design various combinational digital circuits using logic gates
CO3 : Design sequential circuits and analyze the design procedures
CO4 : State the fundamentals of computer systems and analyze the execution of an instruction
CO5 : Analyze different types of control design and identify hazards
CO6 : Identify the characteristics of various memory systems and I/O communication
TOTAL: 60 PERIODS
TEXT BOOKS:
1. M. Morris Mano, Michael D. Ciletti, “Digital Design : With an Introduction to the Verilog
HDL, VHDL, and System Verilog”, Sixth Edition, Pearson Education, 2018.
2. Carl Hamacher, Zvonko Vranesic, Safwat Zaky, Naraig Manjikian, “Computer Organization
and Embedded Systems”, Sixth Edition, Tata McGraw-Hill, 2012.
REFERENCES:
1. David A. Patterson, John L. Hennessy, “Computer Organization and Design, The
Hardware/Software Interface”, Sixth Edition, Morgan Kaufmann/Elsevier, 2020
2. William Stallings, “Computer Organization and Architecture – Designing for
Performance”,Tenth Edition, Pearson Education, 2016.
3. G. K. Kharate, “Digital Electronics”, Oxford University Press 2010.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 1 - - - - 1 - - - - - -
2 3 3 3 2 2 1 1 - 2 1 - - 1 2 2
3 3 3 3 2 2 1 1 - 2 1 - - 1 2 2
4 3 3 3 2 1 - - - 1 - - - - - -
5 3 3 3 2 1 - - - 2 - - 1 - - -
6 3 3 3 1 1 - - - - - 1 - 1 1
Avg. 3 3 3 2 2 1 1 - 2 1 - 1 1 2 2
UNIT I FUNDAMENTALS 9
The Role of Algorithms in Computing – Algorithms – Designing Algorithms – Analysing Algorithms
– Iterative Algorithms – Step Count – Operation Count – Recursive Algorithms – Recurrence
Equations – Substitution Method – Recursion Tree Method – Master Theorem – Proof – Asymptotic
Notations – Growth of Functions.
Suggested Activities:
Discussion on role of algorithms in computer science.
External learning - Design of simple problems, sample problems in Hackerrank, like, diagonal
difference in matrices, staircase construction.
Computation of step count and operation count for merge sort and Quicksort.
Design of induction proofs for algorithm verification for recursive algorithms.
Practical - Implementation of time complexity in Python.
Suggested Activities:
Flipped classroom on algorithm design.
External learning - Greedy approach based algorithms like set cover and vertex. cover –
Hackerrank problems like Password cracker.
Computation of step count and operation count of Huffman code.
Design of greedy based proofs for set cover problems.
Practical - Implementation of matrix inverse using Gaussian Elimination problem.
Suggested Activities:
Flipped classroom on Linear Algebra, Linear Programming basics
External learning - Problems like Diet Problem in Hackerrank.
Formulation of Duality for simple Linear Programming problems like Diet Problem.
Practical - Implementation of Simplex algorithm.
Suggested Activities:
Flipped classroom on computational complexity.
External learning - NP complexity, Turing machines.
Computation and derivation of exponential complexity for set cover and vertex cover
problems.
Design of approximation bounds for randomized quicksort.
Practical - Implementation of approximation algorithm for set cover problem.
TEXT BOOKS:
1. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, “Introduction to
Algorithms”, Third Edition, McGraw Hill, 2009.
2. S. Sridhar, “Design and Analysis of Algorithms”, Oxford University Press, 2015.
REFERENCES:
1. Steven S. Skiena, “The Algorithm Design Manual”, Second Edition, Springer, 2010.
2. Robert Sedgewick, Kevin Wayne, “Algorithms”, Fourth Edition, Pearson Education, 2011.
3. Donald E. Knuth, “Art of Computer Programming, Volume I - Fundamental Algorithms”, Third
Edition, Addison Wesley, 1997.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 2 2 2 - 1 2 - - 2 2 2 2
2 3 3 3 2 2 2 1 - 2 - - 2 2 2 2
3 3 3 3 3 2 2 - 1 2 1 1 2 2 2 2
4 3 3 3 3 2 2 1 1 2 1 1 2 2 2 2
5 3 3 3 3 1 1 - - 2 1 1 2 2 2 2
6 3 3 3 3 2 - - - 2 - 2 2 2 2
Avg. 3 3 3 3 2 2 1 1 2 1 1 2 2 2 2
Suggested Activities:
Checking serializability among transactions.
Flipped classroom on concurrency control protocols.
Study of crash recovery algorithm (ARIES).
TEXT BOOKS:
1. Abraham Silberschatz, Henry F. Korth, S. Sudharshan, “Database System Concepts”, Sixth
Edition, Tata McGraw Hill, 2014.
2. Ramez Elmasri, Shamkant B. Navathe, “Fundamentals of Database Systems”, Seventh
Edition, Pearson Education, 2017.
REFERENCES:
1. C. J. Date, A. Kannan, S. Swamynathan, “An Introduction to Database Systems”, Eighth
Edition, Pearson Education, 2006.
2. Raghu Ramakrishnan, Johannes Gehrke, “Database Management Systems”, Fourth Edition,
Tata McGraw Hill, 2010.
3. G. K. Gupta, “Database Management Systems”, Tata McGraw Hill, 2011.
4. Carlos Coronel, Steven Morris, Peter Rob, “Database Systems: Design, Implementation and
Management”, Ninth Edition, Cengage Learning, 2011.
UNIT I INTRODUCTION 9
Introduction to Data Science - Overview of Data - Sources of Data - Types of Data - Small Data and
Big Data - Data collection methods - Surveys - Interviews - Log and Diary data - User studies in Lab
and Field - Web Scraping - Public datasets - Data cleaning - Tools for Data Science.
Suggested Activities:
● Survey of Python tools for data science
● External Learning: Web scraping
Suggested Activities:
● Flipped classroom on qualitative and quantitative datasets
● Tutorial on Sampling and Frequency
● Problem solving using central tendency measures
● Tutorial on Data reduction techniques
Suggested Activities:
● Implement linear regression models using python
● Implementation of KNN models
Suggested Activities:
● Construct a contingency table for classifier evaluation
Suggested activities
● Learning based exercises
● Flipped classroom in learning models
OUTCOMES:
At the end of the course Students will be able to:
● Apply the skills of data inspecting and cleansing.
● Determine the relationship between data dependencies using statistics
● Can handle data using primary tools used for data science in Python
● Represent the useful information using mathematical skills
● Can apply the knowledge for data describing and visualization using tools.
TEXT BOOKS:
1. Grus, Joel, “Data science from scratch: first principles with python”, O'Reilly Media, 2019.
2. Chirag Shah, “A Hands-on Introduction to Data Science”, Cambridge University Press, UK,
2020.
3. Jake VanderPlas, “Python Data Science Handbook”, O’Reilly, 2016.
REFERENCES:
1. Allen B. Downey, “Think Stats: Exploratory Data Analysis in Python”, Green Tea Press, 2014.
2. Aragues, A. “Visualizing Streaming Data: Interactive Analysis beyond Static Limits”, O’Reilly
Media, Inc, 2018.
3. https://www.coursesidekick.com/statistics/study-guides/introstats1
4. Davy Cielen, Arno D. B. Meysman, and Mohamed Ali, “Introducing Data Science”, Manning
Publications, 2016.
5. Robert S. Witte and John S. Witte, “Statistics”, Eleventh Edition, Wiley Publications, 2017.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 2 2 3 2 1 1 2 1 2 3 2 3 2
2 3 2 3 2 3 2 1 1 2 1 2 3 2 2 3
3 3 2 3 2 3 2 1 1 2 2 2 3 2 2 1
4 3 2 3 2 3 2 1 1 2 2 2 3 3 3 2
5 3 2 3 2 3 2 1 1 2 2 2 3 3 3 2
Avg 3 2 3 2 3 2 1 1 2 2 2 3 3 3 2
.
LIST OF EXPERIMENTS:
1. Download, install and explore the features of NumPy, SciPy, Jupyter, Statsmodels and
Pandas packages.
2. Working with Numpy arrays
3. Working with Pandas data frames
4. Reading data from text files, Excel and the web and exploring various commands for doing
descriptive analytics on the Iris data set.
5. Use the diabetes data set from UCI and Pima Indians Diabetes data set for performing the
following:
a. Univariate analysis: Frequency, Mean, Median, Mode, Variance, Standard
6. Deviation, Skewness and Kurtosis.
a. Bivariate analysis: Linear and logistic regression modeling
b. Multiple Regression analysis
c. Also compare the results of the above analysis for the two data sets.
7. Apply and explore various plotting functions on UCI data sets.
a. Normal curves
b. Density and contour plots
c. Correlation and scatter plots
d. Histograms
e. Three-dimensional plotting
8. Visualizing Geographic Data with Basemap
List of Equipments:
Tools: Python, Numpy, Scipy, Matplotlib, Pandas, statmodels, seaborn, plotly, bokeh
Note: Example data sets like: UCI, Iris, Pima Indians Diabetes etc.
COURSE OUTCOMES:
At the end of this course, the students will be able to:
1. Make use of the python libraries for data science
2. Make use of the basic Statistical and Probability measures for data science.
3. Perform descriptive analytics on the benchmark data sets.
4. Perform correlation and regression analytics on standard data sets
5. Present and interpret data using visualization packages in Python.
TOTAL: 60 PERIODS
MAPPING of COs with PO’s and PSO’s
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 1 3 1 - - - 1 1 1 - 2 3 1
2 3 2 2 3 1 2 - 1 1 - 1 - 2 3 2
3 3 3 1 2 1 - - - 1 1 1 - 2 3 2
4 2 2 1 3 2 - - - 1 1 2 1 3 3 3
5 1 2 3 3 2 2 - 1 1 2 2 2 3 3 3
LABORATORY EXERCISES:
1. Create a database table, add constraints (primary key, unique, check, not null), insert rows,
update and delete rows using SQL DDL and DML commands.
2. Create set of tables, add foreign key constraints and incorporate referential integrity.
3. Query the database tables using different ‘where’ clause conditions and also implement
aggregate functions.
4. Query the database tables and explore sub queries and simple join operations.
5. Query the database tables and explore natural, equi and outer joins.
6. Write user defined functions and stored procedures in SQL.
7. Execute complex transactions and realize DCL and TCL commands.
8. Write SQL Triggers for insert, delete, and update operations in database table.
9. Create View and index for database tables with large number of records.
10. Create a XML database and validate it using XML schema.
11. Create Document, column and graph-based data using NOSQL database tools.
12. Develop a simple GUI based database application and incorporate all the above-mentioned
features.
COURSE OUTCOMES:
MS WORD: 10 Hours
Create and format a document
Working with tables
Working with Bullets and Lists
Working with styles, shapes, smart art, charts
Inserting objects, charts and importing objects from other office tools
Creating and Using document templates
Inserting equations, symbols and special characters
Working with Table of contents and References, citations
Insert and review comments
Create bookmarks, hyperlinks, endnotes footnote
Viewing document in different modes
Working with document protection and security
Inspect document for accessibility
MS EXCEL: 10 Hours
Create worksheets, insert and format data
Work with different types of data: text, currency, date, numeric etc.
Split, validate, consolidate, Convert data
Sort and filter data
Perform calculations and use functions: (Statistical, Logical, Mathematical, date, Time etc.,)
Work with Lookup and reference formulae
Create and Work with different types of charts
Use pivot tables to summarize and analyse data
Perform data analysis using own formulae and functions
Combine data from multiple worksheets using own formulae and built-in functions to generate
results
Export data and sheets to other file formats
Working with macros
Protecting data and Securing the workbook
MS POWERPOINT: 10 Hours
Select slide templates, layout and themes
Formatting slide content and using bullets and numbering
Insert and format images, smart art, tables, charts
Using Slide master, notes and handout master
Working with animation and transitions
Organize and Group slides
Import or create and use media objects: audio, video, animation
Perform slideshow recording and Record narration and create presentable videos
TOTAL: 30 PERIODS
OUTCOMES:
On successful completion the students will be able to
Use MS Word to create quality documents, by structuring and organizing content for their
day to day technical and academic requirements
Use MS EXCEL to perform data operations and analytics, record, retrieve data as per
requirements and visualize data for ease of understanding
Use MS PowerPoint to create high quality academic presentations by including common
tables, charts, graphs, interlinking other elements, and using media objects.
TOTAL: 45 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1. Recognize and understand the functions of environment, ecosystems and biodiversity and their
conservation.
2. Identify the causes, effects and environmental pollution and natural disasters and contribute to
the preventive measures in the immediate society.
3. Identify and apply the understanding of renewable and non-renewable resources and contribute
to the sustainable measures to preserve them for future generations.
4. Recognize different forms of energy and apply them for suitable applications in for technological
advancement and societal development.
5. Demonstrate the knowledge of societal activity on the long- and short-term environmental
issues and abide by the legal provisions, National and International laws and conventions in
professional and personal activities and to identify and analyze effect of population dynamics on
human value education, consumerism and role of technology in environmental issues.
TEXT BOOKS:
1. Anubha Kaushik, C. P. Kaushik’s, “Perspectives in Environmental Studies”, Sixth Edition, New
Age International Publishers, 2018.
2. Benny Joseph, “Environmental Science and Engineering”, Tata McGraw-Hill, New Delhi, 2016.
Suggested Activities:
● Exploring the Geometry of High Dimensions
● Application of Random Projection and Johnson-Linden Strauss Lemma
Suggested Evaluation Methods
● Assignments on high dimensional data representation and analysis
● Tutorials on Random Projection
TEXT BOOKS:
1. S. Axler, Linear algebra done right, Springer,2017.
2. Peter Olofsson, Mikael Andersson, Probability, Statistics, and Stochastic Processes, 2nd
Edition, Published by John Wiley & Sons, Inc., Hoboken, New Jersey 2012.
3. Avrim Blum, John Hopcroft, and Ravindran Kannan, Foundations of Data Science, Cambridge
University Press; 1st edition 2020.
REFERENCES:
1. E. Davis, Linear algebra and probability for computer science applications, CRC Press, 2012.
2. J. V. Kepner and J. R. Gilbert, Graph algorithms in the language of linear algebra, Society for
Industrial and Applied Mathematics,2011.
3. Elden Lars, Matrix methods in data-mining and pattern recognition, Society for Industrial and
Applied Mathematics,2007.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 3 2 2 1 1 1 1 1 3 2 3 2
2 3 3 3 3 2 2 1 1 1 1 1 3 2 2 3
3 3 3 3 3 2 2 1 1 1 1 1 3 2 2 2
4 3 3 3 3 2 2 1 1 1 1 1 3 3 3 2
5 3 3 3 3 2 2 1 1 1 1 1 3 3 3 2
6 3 3 3 3 2 2 1 1 1 1 1 3 3 3 3
Avg 3 3 3 3 2 2 1 1 1 1 1 3 3 3 3
.
Suggested Activities:
Introduction to Linux and shell programming.
External learning - Introduction to xv6: download, build, boot (in virtual machine if needed).
Implement a user program in xv6 to print “Hello World!!”.
Study and use of system calls in xv6: getpid, fork, clone, exit, wait.
Study of the following files in xv6:
• main.c[Bootstrap processor running, other CPU setup, starting running processes],
syscall.h[system call numbers], syscall.c[system call handler] sysproc.c[system call
definitions], proc.c[set up first user process, create new process, allocating process, exit of
process, process states and scheduling], swtch.S[context switch], proc.h [per-CPU state and
per-process state], vectors.S[trap handler], trapasm.S[build trap frame], trap.c[Interrupt
Descriptor Table], traps.h[Interrupt constants]
Exercises on Virtualization like the following may be given:
Given two C code snippets that compile and execute without any errors, queries like the
following may be asked: If the given code snippets are run on a machine with a single CPU
and a main memory of size 1 GB, what are the hardware resources that are being virtualized
- Only CPU OR only memory OR both?
Writing a user program to check and print the state of a process (current/all/specified) in xv6.
Give two C code snippets (assuming that these compile successfully and APIs like fork(),
exec(), and wait() never fails) and questions like the following may be given:
(a) After program 1 is executed, how many processes are created?
(b) After program 2 is executed, how many processes are created?
External learning - Mobile OS structure.
Suggested Evaluation Methods:
Quiz on understanding of Linux and shell programming.
Implementation evaluation of “Hello World!” user program.
Quizzes on xv6 system calls, study files and other topics of the unit.
Assignments to be appropriately evaluated.
Assignments and implementation evaluation.
Suggested Activities:
Add a new system call with parameters in xv6 and invoke it in user program.
Create thread and implement multi threading using pthread library in any language.
Implement at least one form of producer consumer problem in any language.
Implement process synchronization using lock variable method in any language.
Implement Dekker’s algorithms using thread in any language.
Implement semaphores in any language.
Computation of the response time and turnaround time when running three jobs of length
200 with the SJF, FIFO and RR (time–slice of 1) schedulers.
Study of the following files in xv6: main.c [Starting running processes], vm.c [allocating space
for scheduler processes], proc.h [process context and state], proc.c [scheduling], swtch.S
[context switch]
Study of the scheduling algorithm in xv6 and making appropriate changes in the Round
Robin scheduler in xv6 to print the process id and process name during scheduling.
Assignments on scheduling mechanisms.
Implementation evaluation of system call in xv6 using the implemented user program.
Implementation evaluation o f multi-threading.
Quiz on xv6 study files and other topics of the unit.
Quiz to check the understanding of the scheduling concepts in xv6.
Assignments to be appropriately evaluated.
Suggested Activities:
Demonstration of various combined actions using system calls and file such as the
followings: Is it possible to use file names only without using file descriptor (fd) or, given an
fd, is it possible to get the corresponding file name or can multiple directories “contain” the
same file?
Create a file in xv6 and perform read and write operations.
Study the following files in xv6: file.c, sysfile.c [file creation, reading and writing].
Change the existing xv6 file system to add high-performance support for small files. The
basic idea is as follows: If one has a small file that can be indexed with only 13 direct data
pointers, we use the 13th pointer as reserved for indirect data block as a direct data pointer,
thus speeding up access to the small file, as well as saving some disk space.
Suggested Evaluation Methods:
Checking the understanding of the file concepts in xv6.
Quiz on xv6 study files and other topics of the unit.
Assignment on xv6 to be appropriately evaluated.
Implementation evaluation of small file problem in xv6.
Suggested Activities:
Study files in xv6: umalloc.c and kalloc.c (kvalloc() [allocating space for kernel process],
allocuvm() [allocating page tables and physical memory], deallocuvm() [deallocating physical
memory], freevm() [free physical memory page table].
Practical - Implementation and use of functions malloc() and free() in xv6.
Practical - Implementation of at least one of the page replacement policies.
Assignments on computing page faults for LRU, FIFO and Optimal Page Replacement
algorithms.
Practical - Implementation of the program in any programming language to select free holes
from given memory partitions using first-fit, best-fit, and worst-fit dynamic storage allocation
strategies.
Suggested Activities:
Use I/O (open, read, write, ioctl) system calls in xv6.
External learning - Learn the differences between solid state drives and hard disk drive.
External learning - Understand the concepts of blocking and non-blocking I/O.
Practical - Write a chat program using blocking I/O (read/write) and non-blocking I/O using
any language.
Practical - Write a program to perform contiguous, linked and indexed allocation strategies
using any language.
Suggested Evaluation Methods:
Quizzes on I/O and other concepts in xv6 and other topics of the unit.
Implementation evaluation of the practical assignments.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1: Articulate the main concepts, key ideas, strengths and limitations of operating systems.
CO2: Analyze the structure and basic architectural components of OS.
CO3: Design various scheduling algorithms.
CO4: Understand various file management systems.
CO5: Design and implement memory management schemes.
Acquire a detailed understanding of various aspects of I/O management.
TEXT BOOK:
1. Silberschatz Abraham, Greg Gagne, Peter B. Galvin. “Operating System Concepts”, Ninth
Edition, Wiley, 2014.
WEBLINKS:
1. https://pdos.csail.mit.edu/6.828/2014/xv6/book–rev8.pdf
2. The xv6 source code: git clone git://pdos.csail.mit.edu/xv6/xv6.git
REFERENCES:
1. Andrew S. Tanenbaum, “Modern Operating Systems”, Adison Wesley, 2009.
2. D. M. Dhamdhere, “Operating Systems: A Concept–based Approach”, Second Edition. Tata
McGraw–Hill, 2006.
3. William Stallings, “Operating Systems: Internals and Design Principles”, Seventh Edition.
Prentice Hall, 2011.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 2 1 1 1 1 - 2 - - 2 1 2 -
2 3 3 2 2 1 1 1 - 2 2 - 2 1 2 -
3 3 3 2 2 1 2 1 3 1 3 2 2 2 - 1
4 3 3 2 2 1 - 1 - 2 - - 2 1 1 -
5 2 3 2 2 2 2 1 3 2 3 2 2 1 1 -
Avg. 2.8 3 2 2 1 2 1 3 1.8 3 2 2 1.5 1.8 1
Suggested Activities:
∙ Developing a framework for real life activities such as searching techniques
∙ Developing algorithms for basic mathematical expressions using simple game
program
∙ Simple program on tic-tac-toe game
∙ Simple program on 8 queen puzzles
Suggested Activities:
∙ Developing a framework for real life activities such as propositional theorem
∙ Developing algorithms for basic mathematical expressions using simple reasoning
systems
∙ Simple program on first order logic method
Suggested Activities:
∙ Developing a framework for real life activities such as monitoring and planning.
∙ Developing algorithms for basic Boolean satisfiability
∙ Simple program m – Graph Plan
Suggested Activities:
∙ Development of Chatbot
∙ Study of popular recommendation systems
Suggested Evaluation Methods:
∙ Evaluation of programming exercises
∙ Quiz on recent trends
∙ Assignment on HMM problems
TOTAL: 45 PERIODS
COURSE OUTCOMES:
1. Evaluate Artificial Intelligence (AI) methods and describe their foundations.
2. Apply basic principles of AI in solutions that require problem solving, inference, perception and
knowledge representation.
3. Demonstrate knowledge of reasoning and knowledge representation for solving real world
Problems.
4. Analyze and illustrate how search algorithms play vital role in problem solving
5. Illustrate the construction of learning and expert system.
6. Discuss current scope and limitations of AI and societal implications
TEXT BOOKS:
1. Russell, S. and Norvig, P. 2020. Artificial Intelligence - A Modern Approach, 4th edition,
Prentice Hall.
2. Efraim Turban and Jay E. 2002. Aronson Decision Support Systems and Intelligent Systems, 6 th
edition, Pearson Education
3. Castillo, E., Gutiérrez, J. M., and Hadi, A. S. 2012. Expert Systems and Probabilistic Network
Models, Springer-Verlag.
REFERENCES:
1. Ric, E., Knight, K and Shankar, B. 2017. Artificial Intelligence, 3rd edition, Tata McGraw Hill.
2. Luger, G.F. 2008. Artificial Intelligence -Structures and Strategies for Complex Problem
Solving, 6th edition, Pearson.
3. Brachman, R. and Levesque, H. 2004. Knowledge Representation and Reasoning, Morgan
Kaufmann.
4. Alpaydin, E. 2015. Introduction to Machine Learning. 3rd edition.
5. Sutton R.S. and Barto, A.G. 2018. Reinforcement Learning: An Introduction, 2nd Edition MIT
Press.
6. Padhy, N.P. 2009. Artificial Intelligence and Intelligent Systems, Oxford University Press.
PO PSO
CO
1 2 3 4 5 6 7 8 9 1 11 12 1 2 3
0
1 2 2 2 1 2 1 1 2 2 2 1 2 3 2 2
2 3 3 2 2 2 1 1 2 2 2 1 2 3 2 2
3 2 2 2 2 2 1 1 2 2 2 1 2 2 2 2
4 2 2 2 2 3 1 1 2 2 2 1 2 3 3 2
5 2 2 2 2 3 1 1 2 2 2 1 2 3 3 2
6 3 3 3 2 3 1 1 2 2 2 1 2 3 2 2
Av 2 2 2 2 3 1 1 2 2 2 1 2 3 2 2
g.
Suggested activities:
1. Explore your dataset
2. Extract important variables and leave useless variables
3. Identify outliers, missing values, or human error
Suggested Evaluation Methods:
1. Assignments on exploratory data analysis
Suggested activities:
1. Identify the relationship(s), or lack of, between variables
2. Discover patterns and Use correlation analysis to identify linear relationships between two
variables.
Suggested Evaluation Methods:
1. Creating an application and exploring real time analysis
Suggested activities:
1. Practice using the qnorm function.
Given a normal distribution with mean 650 and standard deviation 125. There exist two
quantiles, the lower quantile q1 and the upper quantile q2, that are equidistant from the mean
650, such that the area under the curve of the normal between q1 and q2 is 80%. Find q1
and q2.
Calculate the mean, variance, and the lower quantile q1 and the upper quantile q2, that are
equidistant and such that the range of probability between them is 80%.
2. Combine two of the techniques you’ve learned to visualise the combined distribution of cut,
carat, and price.
Suggested activities:
1. Scatter Plot with Matplotlib
2. Histogram with Plotnine (ggplot)
3. Boxplot with Seaborn
Suggested Evaluation Methods:
1. understanding 2D/3D data visualization with an application by a developmental model
2. Assignments of the problem
Suggested activities:
1. Emphasizing Fractions Using a Pie Chart
2. Plotting X/Y Data with a Scatter Chart
3. Add Magnitudes to X/Y Data with a Bubble Chart
4. Add Controls and Define data Structure for Interactive Charts
5. Integrate Charts to a web page and establish default style for the charts
6. Draw Composite charts and handle click events
7. Create Timeline chart
8. Visualize the Geographic data, incorporate label animation
TEXT BOOKS:
1. Suresh Kumar Mukhiya, Usman Ahmed, “Hands-On Exploratory Data Analysis with
Python”,Packt Publishing, 2020.
2. Thomas Cleff , “Exploratory Data Analysis in Business and Economics”, Springer
International, 2013.
3. Jake VanderPlas, “Python Data Science Handbook”, O’Reilly Media, 1st Edition, December
2016.
4. Matthew O. Ward, Georges Grinstein, Daniel Keim, “Interactive Data
Visualization:Foundations, Techniques, and Applications”, 2nd Edition, CRC press, 2015.
REFERENCES:
1. Glenn J. Myatt, Wayne P. Johnson,” Making Sense Of Data I”, John Wiley & Sons, 2nd
Edition, 2014.
2. Glenn J. Myatt, Wayne P. Johnson,” Making Sense Of Data Ii”, John Wiley & Sons, 2nd
Edition, 2009.
3. Claus O. Wilke, “Fundamentals of Data Visualization”, O’reilly publications, 2019
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 2 2 3 2 1 1 1 - 1 3 2 3 2
2 3 3 3 3 3 2 1 1 1 - 1 3 2 2 3
3 3 3 3 3 3 2 1 1 1 - 1 3 2 2 2
4 2 2 2 2 3 2 1 1 1 - 1 3 3 3 2
5 2 2 2 2 3 2 1 1 1 1 1 3 3 3 2
Avg 2 2 2 2 3 2 1 1 1 1 1 3 3 3 3
.
AZ5411 ARTIFICIAL INTELLIGENCE LAB LT PC
0 0 42
LIST OF EXPERIMENTS:
1. Study Experiment – AI tools: Working and Installation
2. Write a program to implement heuristic search procedure.
3. Design a program to implement depth limited search
4. Write a program to implement water jug problem.
5. Program to implement A* / AO* algorithm.
6. Write a program to implement Bidirectional Search
7. Implementation of n-Queen problem.
8. Write a program to optimize Travelling Sales Person problem.
9. Write a program to implement search problem of 3 x 3 puzzles.
10. Write a program to implement Hangman game using python.
11. Write a program to implement tic tac toe game for O and X.
12. Implement a program to perform abstractive text summarization
13. Implement a program to perform extractive text summarization.
14. Design and implement a Chat bot application.
15. Mini Project for societal application.
TOTAL: 60 PERIODS
COURSE OUTCOMES:
At the end of the course, the student will be able to
1. Implement simple PEAS descriptions for given AI tasks
2. Implement a program that can summarize the given text document .
3. Demonstrate the ability to solve problems using searching and backtracking
4. Ability to implement simple reasoning systems using either backward or forward inference
Mechanisms
5. Will be able to choose and implement suitable techniques for a given AI task
SOFTWARE:
Open-Source Software using Python
REFERENCES:
1. Richard Bosworth, 1995―A Practical Course in Functional Programming Using Standard ML‖,
McGraw-Hill
2. Rachel Harrison, 1993 ―Abstract Data Types in Standard ML‖, John Wiley & Sons.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 3 3 2 1 1 1 - 1 3 2 3 2
2 3 3 3 3 3 2 1 1 1 - 1 3 2 2 3
3 3 3 3 3 3 2 1 1 1 - 1 3 2 2 2
4 3 3 3 3 3 2 1 1 1 - 1 3 3 3 2
5 3 3 3 3 3 2 1 1 1 - 1 3 3 3 2
Avg. 3 3 3 3 3 2 1 1 1 - 1 3 3 3 3
AZ5412 DATA VISUALIZATION LAB LT P C
0042
LIST OF EXPERIMENTS:
1) Generate the data quality report in terms of identifying missing values, irregular cardinality
and outliers for an insurance company.
2) Descriptive feature identification for predicting a target feature by visualizing relationships.
3) Data preparation for Exploration using normalization, binning and sampling methods.
4) Design and create data visualizations.
5) Conduct exploratory data analysis using visualization.
6) Craft visual presentations of data for effective communication.
7) Use knowledge of perception and cognition to evaluate visualization design alternatives.
8) Design and evaluate color palettes for visualization based on principles of perception.
9) Apply data transformations such as aggregation and filtering for visualization.
10) Develop data exploration and visualization for an application - Mini Project
SOFTWARE:
COURSE OUTCOMES:
Create data visualization by predicting relations among data
Perform EDA using visualization techniques.
Perform multivariate data visualization and analysis.
Implement visualization using principles of perception.
Implement visualization techniques in web for applications
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 2 2 3 2 1 1 1 - 1 3 2 3 2
2 2 2 2 2 3 2 1 1 1 - 1 3 2 2 3
3 2 2 2 2 3 2 1 1 1 - 1 3 2 2 2
4 2 2 2 2 3 2 1 1 1 2 1 3 3 3 2
5 2 2 2 2 3 2 1 1 1 2 1 3 3 3 2
Avg. 2 2 2 3 3 2 1 1 1 2 1 3 3 3 3
AZ5501 MACHINE LEARNING METHODS LTPC
3 003
9
UNIT IV PROBABILISTIC LEARNING MODEL
Bayesian Learning - Naive Bayes Algorithm - Introduction to Graphs – Bayesian Belief Networks -
Inference in Graphical Models - Markov Chain – Markov Model - Hidden Markov Models – Inference
– Learning - Generalization – Undirected Graphical Models -
Suggested Activities:
Discussion on importance of graphical models
Implementation of Naïve Bayes Algorithm
Suggested Evaluation Methods:
Assignment on Inference
Quiz on Bayesian Belief Network
9
UNIT V REINFORCEMENT LEARNING & ANN
Overview of Reinforcement Learning - Components of Reinforcement Learning - Markov decision
process - Model Based Learning - Model Free Learning - Q Learning – Artificial Neural Networks –
Structure and Activation functions – Perceptron – Multi Layer Perceptron - Back Propagation –
Gradient descent training - Radial Basis function Neural Network
Suggested Activities:
Case study on application of artificial neural networks in image/video data.
Discussion on different ANN based ML methods.
Suggested Evaluation Methods:
Implementation of basic ANN techniques
Quiz on future applications of ANN.
Assignments on reinforcement learning techniques for the real-time applications.
TOTAL: 45 PERIODS
OUTCOMES:
On completion of the course, the student will be able to:
1. Understand the basics of machine learning.
2. Solve analytical problems with relevant mathematics background knowledge.
3. Explain testing and evaluation machine learning algorithms.
4. Understand ANN model apply knowledge in data analytics.
5. Explore the knowledge of unsupervised learning in data analysis.
6. Apply ML techniques to various real time applications.
TEXT BOOKS:
1. Ameet V Joshi, “Machine Learning and Artificial Intelligence”, Springer Publications, 2020.
2. Sridhar S. and Vijayalakshmi M., “Machine Learning”, Oxford University Press, 2021.
REFERENCES:
1. Christopher M. Bishop, Pattern Recognition and Machine Learning, Springer Publications,
2011
2. John D. Kelleher, Brain Mac Namee, Aoife D’ Arcy, “Fundamentals of Machine learning for
Predictive Data Analytics, Algorithms, Worked Examples and case studies”, MIT press, 2015
3. Tom Mitchell, “Machine Learning”, McGraw-Hill, 1997
4. Stuart Jonathan Russell, Peter Norvig, John Canny, Artificial Intelligence: A Modern
Approach, Prentice Hall, 2020
5. Machine Learning Dummies, John Paul Muller, Luca Massaron, Wiley Publications, 2021
MAPPING of CO’s with PO’s and PSO’s
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 2 1 2 1 1 2 2 2 1 2 2 1 1
2 3 3 2 2 2 2 1 2 2 2 1 2 1 1 1
3 2 2 2 2 2 1 1 2 2 2 1 2 1 1 1
4 2 2 2 2 3 1 1 2 2 2 1 2 2 3 1
5 2 2 2 2 3 1 1 2 2 2 1 2 2 3 1
6 3 3 3 2 3 2 1 2 2 2 1 2 3 2 2
Avg. 2 2 2 2 3 1 1 2 2 2 1 2 2 2 1
Suggested Activities:
In-class activity - Solving problems on performance metrics.
In-class activity - HTTP problems.
Accessing HTTP and SMTP server through Telnet.
External learning - HTTP/DNS format using a tool like Wireshark.
External learning - POP3 and IMAP protocols of email application.
Suggested Activities:
Flipped Classroom on UDP Applications.
External learning - Wireshark for UDP, TCP packet formats.
External learning - Transport for Real Time Applications.
External learning - Understanding RFCs.
Assignments on flow control analysis in class.
Suggested Activities:
In-class activity - IP addressing.
External learning - IPV4 Packet Format using Wireshark.
In-class activity - Subnetting for different scenarios.
Flipped classroom on CIDR.
External learning - Ping and trace-route commands.
Mini-project on the implementation of a protocol based on an RFC.
UNIT IV ROUTING 9
Routing Principles – Distance Vector Routing – Link State Routing – RIP – OSPF – BGP – IPV6 –
Introduction to Quality of Service (QoS).
Suggested Activities:
In-class activity - Distance Vector Routing, Link State Routing.
External learning - RIP, OSPF packet formats.
Assignment on Link state routing for different network graphs.
In-class activity - Error Detection and Correction.
Flipped classroom on IPV6.
External learning - Study on global IP address assignment.
Suggested Evaluation Methods:
Quizzes on RIP, OSPF packet format.
Quiz on IPv6.
Suggested Activities:
In-class activity - Problems on encoding techniques.
External learning - Virtual LAN , Wireless LAN (802.11) formats.
Flipped Classroom on recent developments in transmission media.
Design a protocol for some application.
Trace the end-to-end flow of packets through the network.
Suggested Evaluation Methods:
Quizzes on VLAN and 802.11 formats.
Presentation/Implementation of design.
Demonstration of RFC implementation project.
TOTAL: 45 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1: Highlight the significance of the functions of each layer in the network.
2: Identify the devices and protocols to design a network and implement it.
3: Build network applications using the right set of protocols and estimate their performances.
4: Trace packet flows and interpret packet formats.
5: Apply addressing principles such as subnetting and VLSM for efficient routing.
6: Explain media access and communication techniques.
TEXT BOOKS:
1. James F. Kurose, Keith W. Ross, “Computer Networking: A Top-Down Approach”, Seventh
Edition, Pearson Education, 2017.
2. Larry L. Peterson, Bruce S. Davie, “Computer Networks: A Systems Approach”, Fifth Edition,
Morgan Kaufmann Publishers Inc., 2011.
REFERENCES:
1. William Stallings, “Data and Computer Communications”, Tenth Edition, Pearson Education,
2014.
2. Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source Approach”,
McGraw Hill, 2012.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 2 - - - - - - - 1 - - 1 1
2 3 3 3 3 2 2 2 - 2 - 1 - 1 2 1
3 3 3 2 3 2 - - - - - - 2 1 2 1
4 3 3 3 3 3 1 2 1 2 - 1 1 1 2 1
5 3 2 2 3 2 1 2 1 1 - 1 2 - 2 1
6 3 2 2 3 2 1 2 1 1 - - 2 1 2 1
Avg. 3 3 2 3 2 1 2 1 2 - 1 2 1 2 1
Suggested Activities:
Case studies on big data applications.
Challenges of big data in real-time and domain-specific problems.
Demonstration on data analytics tools.
Suggested Activities:
Practicing numerical problems based on descriptive and inferential statistics.
Demonstration of descriptive analysis using Python.
Demonstration of data visualization in Python.
Suggested Activities:
Solving problems in univariate, bivariate and multivariate analysis.
Demonstration on Graph Data using python.
Demonstrate PCA and KPCA using Iris data set in Python.
Suggested Activities:
Case studies on data analytical frameworks with real-time applications.
Hands-on session for Installation and configuring Hadoop and MapReduce.
Develop algorithms with Map Reduce framework.
Suggested Activities:
Case studies on real-time applications related to business analytics.
Demonstration of business analytical tools.
Demonstration of data analytics in business applications using python.
OUTCOMES:
TEXT BOOKS :
1. Mohammed J. Zaki and Wagner Meira, Data Mining and Analysis - Fundamental Concepts
and Algorithms, Cambridge University Press, 2014.
2. Rayan Wali&Quot;,” A Practical Guide to AI and Data Analytics”, Independently Published,
2022.
3. Jeffrey D. Camm, James J. Cochran, Michael J. Fry, Jeffrey W. Ohlmann, David R.
Anderson, “Essentials of Business Analytics”, Cengage Learning, Second Edition, 2016.
REFERENCES:
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 3 3 3 3 3 2 2 2 3 3 3 2
2 3 3 3 3 3 3 3 3 2 2 2 3 3 3 2
3 3 3 3 3 3 3 3 3 2 2 2 3 3 3 2
4 3 3 3 3 3 3 3 3 2 2 2 3 3 3 2
5 3 3 3 3 3 3 3 3 2 2 2 3 3 3 3
6 3 3 3 3 3 3 3 3 2 2 2 3 3 3 3
Avg. 3 3 3 3 3 3 3 3 2 2 2 3 3 3 2.33
Suggested Activities
Exploration on the usage of optimization techniques
Solving a problem by choosing appropriate representation for the given data.
Suggested Activities
Exploration on the usage of non-linear models
Implementation of different direct and indirect methods of optimization
Suggested Activities
Implementation of data science application using optimization techniques
Analysis of algorithms based on optimization using suitable dataset
Suggested Evaluation Methods
Assignments on optimization techniques for data science
Tutorials on data science optimization techniques
TEXT BOOKS:
1. Hamdy A Taha, Operations Research: An Introduction, Pearson, 10th Edition, 2017.
2. Engineering Optimization Theory and Practice, S.S.Rao, New Age International
(P),5thedition,2019
3. Beck, First-Order Methods in Optimization, MOS-SIAM Series on Optimization, 2017.(Unit
IV)
REFERENCES:
1. J.K. Sharma,”Operations Research Theory and Applications “, Trinity Press, Sixth Edition,
New Delhi, 2016.
2. Sukanta Nayak, Fundamentals of Optimization Techniques with Algorithms, 1st Edition,
Academic Press, Copyright © 2021 Elsevier Inc.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 2 - - 1 - 1 - 1 - 2 3 1
2 3 3 3 2 2 3 1 2 2 - 1 - 2 3 2
3 3 3 3 2 2 3 1 2 2 - 1 - 2 3 2
4 3 3 3 3 2 3 1 2 1 1 2 1 3 3 3
5 3 3 3 3 2 1 1 - 1 - 2 2 3 3 3
AVg. 3 3 3 2.4 2 2.5 1 2 1 1 1.4 1.5 2.4 3 2.2
LT PC
AZ5511 MACHINE LEARNING LABORATORY
0 04 2
LIST OF EXPERIMENTS:
1. Implement Naive Bayes learning algorithm for a sample training data set.
2. Implement a linear regression method.
3. Write a program to demonstrate the working of the decision tree based ID3 algorithm.
4. Write a program to handle overfitting.
5. Implement SVM algorithm for a given data set.
6. Implement Bagging, boosting, and DECORATE algorithms with performance evaluation
mechanisms.
7. Build an Artificial Neural Network by implementing the Backpropagation algorithm and test
the same using appropriate data sets.
8. Implement facial recognition application with artificial neural network
9. Choose best machine learning algorithm to implement online fraud detection
10. Write a program to implement k-Nearest Neighbour algorithm.
11. Implement a k-means partitional clustering
12. Implement sentiment analysis using random forest optimization algorithm.
TOTAL : 60 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1. Understand the implementation procedures for the machine learning algorithms.
2. Design Python/R/Java programs for various learning algorithms.
3. Implement ensemble and reinforcement learning techniques for a given data set and
evaluate them.
4. Implement artificial neural network for a given application and dataset.
5. Identify and apply machine learning algorithms to solve real world problems.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 2 3 2 1 2 2 2 1 2 2 2 1
2 3 3 3 2 3 2 1 2 2 2 1 2 2 2 1
3 3 3 3 3 3 2 1 2 2 2 1 2 2 3 1
4 3 3 3 3 3 2 1 2 2 2 1 2 2 3 1
5 3 3 3 3 3 2 2 2 3 2 2 3 3 3 2
Avg. 3 3 3 3 3 2 1 2 2 2 1 2 2 3 1
LIST OF EXERCISES:
1. Download, install and explore the features of NumPy, SciPy, Jupyter, Statsmodels and
Pandas packages. Read data from text file, excel and the web.
2. Choose a dataset from Kaggle and explore various commands for descriptive analytics.
3. Perform statistical operations - Mean, Median, Mode and Standard deviation, Variance,
Skewness, Kurtosis on the dataset.
4. Perform Z-test, T-test & ANOVA on the dataset.
5. Perform data pre-processing operations handling missing data and normalization on the
dataset.
6. Perform univariate analysis: Frequency, Mean, Median, Mode, Variance, Standard
Deviation, Skewness and Kurtosis on the dataset.
7. Perform Bivariate analysis: Linear and logistic regression on the dataset.
8. Perform Multiple Regression analysis on the dataset.
9. Load a graph dataset and perform basic analysis such as calculating node degree centrality,
identifying important nodes using between-ness centrality.
10. For the graph dataset chosen in previous question, find communities using graph clustering.
11. Implement page rank/HITS on large scale graph datasets.
12. Load a dataset and measure the regression performance using different kernel functions.
13. Perform kernel matrix operations on the dataset chosen
14. Implement PCA & KPCA - dimensionality reduction techniques on the dataset.
15. Choose any one business analytic tool (MS Excel/Power BI) and perform statistical
descriptive and inference analytics.
TOTAL : 60 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 3 2 3 3 2 2 3 2 2 2 3 2 2 2
2 2 3 3 3 3 2 2 3 2 2 2 3 2 3 2
3 3 3 3 3 3 2 3 3 2 2 2 3 2 3 2
4 3 3 3 3 3 2 3 3 2 2 2 3 2 2 2
5 3 3 3 3 3 2 3 3 2 2 2 3 2 2 2
6 3 3 2 3 3 2 3 3 2 2 2 3 2 3 3
Avg. 2.66 3 2.66 3 3 2 2.66 3 2 2 2 3 2 2.5 2.16
Suggested Activities:
Implement a multilayer perceptron
Experiment with different optimization methods
Test with regularization techniques
Suggested Activities:
Flipped classroom on CNN architectures
External learning – concept of convolution and pooling layer
Exploring on Transfer learning
Suggested Activities:
Implement and train a simple RNN
Build a sequence-to-sequence model
Use a pretrain RNN model and analyse their performance on different sequence modelling task.
Implement an LSTM network.
Suggested Activities:
Discussion on Building and training autoencoders
Understand the math behind the generative models
TEXT BOOKS
1. Ian Goodfellow, Yoshua Bengio and Aaron Courville, “ Deep Learning”, MIT Press, 2017.
2. Giancarlo Zaccone, Md. Rezaul Karim, Ahmed Menshawy "Deep Learning with TensorFlow:
Explore neural networks with Python", Packt Publisher, 2017.
REFERENCES
1. Josh Patterson, Adam Gibson "Deep Learning: A Practitioner's Approach", O'Reilly Media,
2017
2. Umberto Michelucci “Applied Deep Learning. A Case-based Approach to Understanding
Deep Neural Networks” Apress, 2018.
3. Kevin P. Murphy "Machine Learning: A Probabilistic Perspective", The MIT Press, 2012.
4. Ethem Alpaydin,"Introduction to Machine Learning”, MIT Press, Prentice Hall of India, Third
Edition 2014.
5. Francois Chollet, “Deep Learning with Python”, Manning Publications, 2018.
MAPPING of CO’s with PO’s and PSO’s
PO PSO
CO 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 3 1 - - - - 1 1 2 3 3 3
2 3 3 3 3 1 - - - - 1 1 2 3 3 3
3 3 3 3 3 3 3 2 2 3 3 3 2 3 3 3
4 3 3 3 3 3 3 2 2 3 3 3 2 3 3 3
5 3 3 3 3 3 3 2 2 3 3 3 2 3 3 3
AVg. 3 3 3 3 3 3 2 2 3 3 3 2 3 3 3
AZ5602 COMPUTER VISION LTPC
3 003
TOTAL: 45 PERIODS
OUTCOMES:
On completion of the course, the student will be able to:
1. Describe the concepts related to Image formation and processing.
2. Compare the concepts related to feature detection, matching and detection.
3. Understanding feature based alignment and motion estimation.
4. Study of 3D Reconstruction.
5. Perform image based rendering and recognition.
TEXT BOOKS:
1. Richard Szeliski, “Computer Vision: Algorithms and Applications”, Springer- Texts in
Computer Science, Second Edition, 2022.
2. Computer Vision: A Modern Approach, D. A. Forsyth, J. Ponce, Person Education, Second
Edition, 2015.
REFERENCES:
1. Richard Hartley and Andrew Zisserman, Multiple View Geometry in Computer Vision,
2. Second Edition, Cambridge University Press, March 2004.
3. Christopher M. Bishop; Pattern Recognition and Machine Learning, Springer, 2006
4. E. R. Davies, Computer and Machine Vision, Fourth Edition, Academic Press, 2012.
5. R.C. Gonzalez and R.E. Woods, Digital Image Processing, 4th Edition,Pearson,
2022.
PO PSO
CO 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 2 2 3 2 1 2 2 2 1 3 2 1 1
2 3 3 2 2 3 2 1 2 2 2 1 3 2 3 1
3 3 2 2 2 3 2 1 2 2 2 1 3 2 3 1
4 3 2 2 2 3 2 1 2 2 2 1 3 1 3 2
5 3 3 3 2 3 2 1 2 2 2 1 3 2 3 3
Avg. 3 3 2 2 3 2 1 2 2 2 1 3 2 3 2
AZ5603 IoT AND CLOUD LTPC
3 003
Suggested Activities
Interactive lectures and discussions on enabling technologies
Group projects exploring IoT and M2M proprietary protocols
Case study analysis on designing IoT-based ecosystems
Suggested Activities
Interactive lectures on open-source hardware and SDLC for embedded systems
Workshops exploring various IoT development platforms and tools
Guided projects on developing IoT applications using Arduino and Python
Suggested Evaluation Methods
Quizzes on open-source hardware and SDLC for embedded systems
Assignments on IoT development platforms and tools such as Atmega Microcontrollers,
Cypress Pioneer and NXP Freedom
Practical exams on developing IoT applications
Suggested Activities
Lectures and discussions on the role of IPv6 in IoT-based systems
Hands-on workshops exploring various IoT protocols and software tools such as Coap and
MQTT.
Case study analysis of IoT reference models (e.g., Cisco, IBM)
Suggested Evaluation Methods
Assignments on IoT protocol implementation and software tools
Quizzes on IPv6 and IoT protocols (CoAP and MQTT)
Group presentations on IoT reference model analysis
Suggested Activities
Interactive lectures on cloud models and types of cloud services
Flipped classroom on using Django and other IoT cloud platforms
Group projects on implementing IoT solutions using cloud offerings
Suggested Activities
Lectures and discussions on popular machine learning algorithms (both supervised and
unsupervised) and tools
Flipped Classroom on data processing techniques (e.g., MapReduce)
Guided projects on data analytics for IoT applications
TOTAL: 45 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1. Understand the enabling technologies and reference models of IoT.
2. Design portable IoT devices using Arduino IDE/ Raspberry Pi with Python.
3. Apply appropriate protocols in various parts of IoT based systems.
4. Understand Big Data tools and technologies and apply them in IoT based systems.
5. Design and deploy IoT based systems and connect
6. Design IoT systems for various real time applications.
TEXT BOOKS:
1. Arshdeep Bahga, Vijay Madisetti, “Internet of Things – A Hands-On Approach”, Universities
Press, 2015.
2. Manoel Carlos Ramon, “Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino
Projects for Linux Programmers”, Apress, 2014.
3. David Hanes, Gonzalo Salguerio, Patrick Grossetete, Rob Barton, Jerome Henry, “IoT
Fundamentals: Networking Technologies, Protocols, and Use Cases for Internet of Things”,
Cisco Press, 2017.
REFERENCES:
1. Cuno Pfister, "Getting Started with the Internet of Things: Connecting Sensors and
Microcontrollers to the Cloud", O'Reilly Media, 2021.
2. Olivier Hersent, David Boswarthick, Omar Elloumi, "The Internet of Things: Key Applications
and Protocols", Wiley, 2012.
3. Samuel Greengard, "The Internet of Things", MIT Press, 2021.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 3 3 1 2 1 1 1 1 3 2 2 3
2 3 3 2 - 3 1 3 2 - 1 1 3 3 2 1
3 2 1 2 - 3 2 3 2 - 2 1 1 2 3 1
4 3 1 3 3 1 2 - 3 3 - 2 2 3 3 2
5 3 3 3 2 2 2 1 2 2 - 2 2 1 1 3
6 2 1 1 2 1 1 - 1 1 2 2 1 2 1 3
Avg. 2.67 2.00 2.33 2.4 2.17 1.50 2.25 1.83 1.75 1.5 1.50 2.00 2.17 2.00 2.17
EXPERIMENTS
1. Write a program to generate following logic functions using McCulloch-Pitts neuron and
appropriate values for weights, bias and threshold.
a. AND logic function
b. OR logic function
c. NOT logic function
d. NOR logic function
e. XOR logic function
2. Write a program to build a logistic regression classifier with a Neural Network mindset.
Consider following guidelines.
a. Consider any convenient dataset (Cats dataset etc.) and pre-process the dataset.
b. Define the appropriate model structure.
c. Evaluate the model performance.
d. Analyse the obtained results
3. Design a neural network (NN) model with one hidden layer for classification problems. Use
Planar data set or any other suitable data set
a. Implement a 2-class classification neural network with a single hidden layer.
b. Use units with a non-linear activation function, such as tanh.
c. Compute the cross-entropy loss.
d. Implement forward and backward propagation.
e. Evaluate the model performance.
f. Analyse the results.
4. Build a Multiclass classifier using the CNN model. Use MNIST or any other suitable
dataset. Perform Exploratory Data Analysis
a. Prepare dataset
b. Build MLP model
c. Evaluate Model performance
d. Predict for test data
5. Implement the Face recognition using CNN
6. Implement a transfer learning concept for image classification
7. Implement an auto encoder for image denoising
8. Implement a dialogue generation using LSTM with attention mechanism
9. Implement an opinion mining in RNN
10. Machine Translation using Encoder-Decoder model.
11. Image augmentation using GANs
12. Mini project: Real world problems
TOTAL: 60 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1. Perform different pre-processing operations on structured or unstructured data
2. Design neural network for various learning problems.
3. Demonstrate binary as well as multi- class classification problems.
4. To design and implement deep learning models for real time problems
5. Interpret the model results and analyse the performance of the models.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 3 1 - - - - 1 1 2 3 3 3
2 3 3 3 3 1 - - - - 1 1 2 3 3 3
3 3 3 3 3 3 3 2 2 3 3 3 2 3 3 3
4 3 3 3 3 3 3 2 2 3 3 3 2 3 3 3
5 3 3 3 3 3 3 2 2 3 3 3 2 3 3 3
AVg. 3 3 3 3 3 3 2 2 3 3 3 2 3 3 3
EXPERIMENTS
1. Develop an Arduino sketch for a blinking LED.
2. Develop an Arduino sketch to control the LED brightness, including fading in and out.
3. Develop an Arduino sketch to calibrate a sensor by tracking the highest and lowest sensor
readings during startup.
4. Develop an Arduino sketch to control the LED blink rate using a variable resistor as an analog
input.
5. Develop an Arduino sketch to detect vibrations using a piezo element.
6. Develop a Python program to control an LED using Raspberry Pi.
7. Develop a Python program to interface an LED with a switch using Raspberry Pi.
8. Develop an application to store big data in HBase or MongoDB using Hadoop or R.
9. Explore IoT cloud platforms: Create and deploy an IoT application using platforms like IBM
Watson, AWS IoT, or Azure IoT Hub.
10. Implement IoT protocols: Develop a Python program using CoAP or MQTT to send sensor
data from Raspberry Pi to a cloud platform.
11. Perform data analytics on IoT data: Analyze and visualize IoT data using Python libraries or
cloud-based tools like Google Data Studio.
12. Investigate IoT security: Explore encryption, authentication, and authorization techniques for
IoT devices and applications.
13. Mini-project: Design, develop, and present an end-to-end IoT solution using the skills
acquired from the lab sessions.
TOTAL: 60 PERIODS
Course Outcomes:
On completion of the course, the students will be able to:
1. Use arduino/ raspberry pi and various sensors to build simple IoT experiments
2. Use wireless peripherals for exchange of data and use of Cloud platform to upload and
analyse any sensor data
3. Use of Devices, Gateways and Data Management in IoT , to build a complete, working IoT
system
4. Configure various virtualization tools such as Virtual Box, VMware workstation.
5. Design and deploy a web application in a cloud environment.
6. Manipulate large data sets in a parallel environment using Hadoop, Mongo DB
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 3 3 1 2 1 1 1 1 3 2 2 3
2 3 3 2 - 3 1 3 2 - 1 1 3 3 2 1
3 2 2 2 3 3 2 3 1 - 2 1 1 3 3 3
4 3 3 3 3 3 3 - 3 3 - 2 2 3 3 2
5 3 3 2 2 2 2 1 2 3 - 1 2 2 1 3
6 2 1 1 2 1 1 - 1 1 2 2 1 2 1 3
Avg. 2.67 2.50 2.17 2.60 2.50 1.67 2.25 1.67 2.00 1.5 1.33 2.00 2.50 2.00 2.50
L T P C
AZ5613 SOCIALLY RELEVANT PROJECT LABORATORY
0 0 2 1
Students are expected to take up problems that would directly benefit society and design and implement
an IT based solution for the problem, based on the courses undertaken up to that semester. The
domains of the problems may reach out to sectors like but not limited to Energy, Education, Material,
Environment, Telecommunications, Defense, Healthcare, Banking, Entertainment and Agriculture. The
societal value of the project is to be evaluated based on the need of the hour and request from
stakeholders. The evaluation of the project would be based on the usefulness of the problem statement,
formulation of the problem, stakeholders need, and the usage statistics of the solution and the technical
merit of the solution.
The project design, development and testing phases can be as shown below:
REQUIREMENTS ENGINEERING PHASE:
● Problem identification.
● Feasibility study of domain.
● Requirement elicitation and analysis.
DESIGN PHASE:
● Architectural design.
● UI design.
● Component Design.
● Database design.
IMPLEMENTATION PHASE:
● Coding in a suitable language using necessary platforms and tools.
DOCUMENTATION:
● Report Generation
TOTAL: 30 PERIODS
COURSE OUTCOMES (COs)
Upon successful completion of the course, the student will reliably demonstrate the ability to:
CO1. Analyze social problems and provide IT based technical solutions in order to benefit society.
CO2. Design, develop and implement solutions for social problems.
CO3. Develop innovative technical solutions of social relevance.
CO4. Design, develop and implement standard solutions to social problems.
CO5. Apply Software engineering methodologies.
CO6. Evaluate the solution based on usefulness, effectiveness, and user satisfaction.
REFERENCES:
1. https://www.niti.gov.in/.
2. https://www.sih.gov.in/.
MAPPING of CO’s with PO’s and PSO’s
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 2 3 - 3 3 3 3 3 3 3 3 3 3
2 3 3 3 1 - 3 3 3 3 3 3 3 3 3 3
3 3 1 3 2 3 3 3 3 3 3 3 3 3 3 3
4 3 - 3 1 3 3 3 3 3 3 3 3 3 3 3
5 3 - 1 1 3 3 3 3 3 3 3 3 3 3 3
6 3 - 2 1 3 3 3 3 3 3 3 3 3 3 3
AZ5701 TEXT AND SPEECH ANALYTICS LTPC
3 00 3
UNIT I INTRODUCTION 9
Overview of text mining- General Architecture – Algorithms – Preprocessing – basics of document
classification - information retrieval - clustering and organizing documents - information extraction-
prediction and evaluation - Textual information to numerical vectors - document standardization-
tokenization - lemmatization vector generation for prediction - sentence boundary determination -
evaluation performance-Probabilistic language models based on sequences of words: N-grams.
Suggested Activities:
Discussion on applications of text mining.
Case study on text preprocessing and feature extraction techniques.
Suggested Evaluation Methods:
Quiz on text processing tools.
Program assignment of feature extraction and analysis.
TOTAL: 45 PERIODS
OUTCOMES
On completion of the course, the students will be able to
1. Identify the different features that can be mined from text and web documents.
2. Understand classification and clustering of text data.
3. Understand basics of digital speech processing.
4. Explore features in speech data for application development.
5. Apply concepts in speech recognition.
6. Perform speech analysis for different applications.
TEXT BOOKS:
1. Weiss S.M., Indurkhya N., Zhang T., Damerau F., “Text Mining: Predictive Methods for
Analyzing Unstructured Information”, Springer, 2005
2. Daniel Jurafsky and James H. Martin, “Speech and Language Processing: An Introduction
to Natural Language Processing, Computational Linguistics, and Speech Recognition”, Third
Edition, 2022.
REFERENCES:
1. Ronen Feldman, James Sanger “The Text Mining Handbook: Advanced Approaches in
Analyzing Unstructured Data”-Cambridge University press, 2009.
2. Michael Berry, ― “Survey of Text Mining: Clustering- Classification- and Retrieval”, Springer,
2004
3. Lawrence Rabinerand Biing-Hwang Juang, “Fundamentals of Speech Recognition”, Pearson
Education, 2003.
PO PSO
CO 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 2 2 3 2 1 2 2 3 1 3 2 3 2
2 3 3 2 2 3 2 1 2 2 3 1 3 2 3 2
3 3 2 1 2 2 1 1 2 2 3 1 3 1 1 1
4 3 2 2 3 3 1 1 2 2 3 1 3 1 3 2
5 3 3 3 3 3 2 1 2 2 3 2 3 1 1 2
6 3 3 3 3 3 2 1 2 2 3 2 3 1 3 2
AVg. 3 3 2 3 3 2 1 2 2 3 1 3 1 2 2
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 2 3 - - - 2 - - 3 2 2 2
2 3 3 3 3 3 - - - 2 - - 3 3 2 2
3 3 3 3 3 3 3 - 3 2 - - 3 3 2 2
4 3 1 3 1 3 3 - 3 2 - - 3 3 3 2
5 3 3 3 3 3 3 - 3 2 - - 3 3 3 2
6 3 3 3 1 3 3 - 3 2 - 3 3 3 3 2
AVg. 3 2.66 3 2.16 3 3 - 3 2 - 3 3 2.83 2.5 2
L T P C
AZ5711 INFORMATION SECURITY LABORATORY
0 0 4 2
LIST OF EXPERIMENTS
The following exercises are based on cryptographic algorithms, cryptanalysis. They can be
implemented using any Programming Language.
TOTAL: 45 PERIODS
COURSE OUTCOMES (COs)
Upon successful completion of the course, the student will reliably demonstrate the ability to:
CO1. Attain mathematical knowledge required for cryptography.
CO2. Implement specific encryption/decryption algorithms meant for Confidentiality, Integrity, and
Authentication and to perform security analysis of the same by implementing cryptanalysis.
CO3. Analyze the vulnerabilities in any application using penetration testing.
CO4. Explore and perform network analysis using various networking tools.
CO5. Configure a firewall.
CO6. Develop a Security system for an application
Suggested Activities
XML processing
Exploring the structure of SOAP, WSDL and UDDI
RESTful web services
Suggested Activities
Applications of SOA
Identifying simple services based on SOA
Suggested Activities
Study on various service design
SOA best practices case studies
Suggested Activities
Case study on SOA EA integration
Suggested Activities
External learning on AI and SOA
Analysis on SOA for Big Data
TEXT BOOK:
1. Shankar Kambhampaty, “Service-oriented Architecture & Microservice Architecture: For
Enterprise, Cloud, Big Data and Mobile”, Third Edition, Wiley, 2018.
2. Thomas Erl, “Service Oriented Architecture: Concepts, Technology, and Design”, Pearson
Education, 2005.
3. Service Oriented Architecture by IBM ICE Publications
4. Mark D. Hansen, “SOA using Java Web Services”, Practice Hall, 2007.
REFERENCES:
1. Ron Schmelzer et.al, “XML and Web Services”, Pearson education, 2002.
2. Leonard Richardson, Sam Ruby, “RESTful Web Services”, O'REILLY publication, 2007.
3. Nicolai M. Josuttis, “SOA in Design – The Art of Distributed System Design”, O'REILLY
publication, 2007.
4. Raj Balasubramanian, Benjamin Carlyle, Thomas Erl, Cesare Pautasso, “SOA with REST –
Principles, Patterns & Constraints for Building Enterprise Solutions with REST”, Prentice
Hall, 2013.
MAPPING of COs with PO’s and PSO’s
PO PSO
CO 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 3 1 1 1 - 1 1 1 - 2 3 1
2 3 2 2 3 1 1 - - 1 - 1 - 2 3 2
3 3 3 2 2 1 1 2 2 1 1 1 - 2 3 2
4 3 3 3 3 2 2 1 2 1 1 2 1 3 3 3
5 2 3 3 3 2 2 1 2 1 2 2 2 3 3 3
Avg. 2.4 3 3 2.4 1.8 2 1 - 1 - 1.4 1.5 2.4 3 2.2
Suggested Activities:
Flipped class on evolution of GPU.
External learning – GPU architecture.
Suggested Activities:
Flipped class on parallel programming.
Practical – Download the CUDA toolkit and setup the CUDA environment.
Practical – Write simple CUDA code and vary the parameters to understand the concept of
threads, blocks and grids
Suggested Activities:
Flipped class on basics OpenCL.
Practical – Execute sample OpenCL programs with different memory options
Suggested Activities:
Flipped class on Python tool kit for CUDA.
Practical – Write simple PyCUDA code with threads, blocks and grids
Suggested Activities:
Flipped class on Parallel patterns.
Discussion on different parallel programming applications.
TEXT BOOKS:
1. David B. Kirk, Wen-mei W. Hwu, Programming Massively Parallel Processors – A Hands-on
Approach, Fourth Edition, Morgan Kaufmann, 2022.
2. Gerassimos Barlas, Multicore and GPU Programming: An Integrated Approach, Second
Edition, Morgan Kaufmann, 2022
3. Brian Tuomanen, Hands-On Gpu Programming with Python and CUDA: Explore high-
performance parallel computing with CUDA, Packt Publishing Limited, 2018
REFERENCES:
1. Shane Cook, CUDA Programming: ―A Developer’s Guide to Parallel Computing with GPUs
(Applications of GPU Computing), First Edition, Morgan Kaufmann, 2012.
2. David R. Kaeli, Perhaad Mistry, Dana Schaa, Dong Ping Zhang, ―Heterogeneous
computing with OpenCL, 3rd Edition, Morgan Kauffman, 2015.
3. Nicholas Wilt, ―CUDA Handbook: A Comprehensive Guide to GPU Programming, Addison
– Wesley, 2013.
4. Jason Sanders, Edward Kandrot, ―CUDA by Example: An Introduction to General Purpose
GPU Programming, Addison – Wesley, 2010.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 2 1 2 1 1 1 2 2 1 2 - 1 -
2 2 2 2 1 2 1 1 1 2 2 1 2 - 1 -
3 2 2 2 2 3 1 1 1 2 2 1 2 - 1 -
4 2 2 2 2 3 1 1 1 2 2 1 2 - 1 -
5 2 2 2 2 3 1 1 1 2 2 1 2 - 1 -
6 2 2 2 2 3 1 1 1 2 2 1 2 - 2 -
Avg. 2 2 2 1.67 2.67 1 1 1 2 2 1 2 - 1.17 -
AZ5003 ALGORITHMIC GRAPH THEORY LTPC
3 003
UNIT I INTRODUCTION 9
Graphs: Introduction – Isomorphism – Sub Graphs – Walks, Paths, Circuits –Connectedness –
Components – Euler Graphs – Hamiltonian paths and circuits.
Suggested Activities:
Solving simple Graph problems.
Flipped classroom on isomorphism.
External learning - Traveling salesman problem.
Practical -
◦ Implement a program to determine isomorphic graphs.
◦ Implement a program to determine Hamiltonian circuits and Hamiltonian paths in a
graph.
Suggested Evaluation Methods:
Tutorials on graph algorithms.
Assignment problems on isomorphism, hamiltonian graphs.
Quizzes on connected components.
TEXTBOOKS:
1. Narsingh Deo, “Graph Theory: With Application to Engineering and Computer Science”,
Dover Publications Inc., 2016.
2. Hamilton, William L., “Graph Representation Learning”, Morgan and Claypool, 2020.
REFERENCES:
1. Clark J., Holton D. A., “A First Look at Graph Theory”, Allied Publishers, 1995.
2. Mott J. L., Kandel A., Baker T. P., “Discrete Mathematics for Computer Scientists and
Mathematicians”, Prentice Hall of India, 1996.
3. Liu C. L., “Elements of Discrete Mathematics”, McGraw Hill, 1985.
4. Rosen K. H., “Discrete Mathematics and Its Applications”, McGraw Hill, 2007.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 2 3 1 - - - - - 2 - 1 2 2
2 2 2 2 3 1 - - - - - 1 1 1 2 2
3 2 1 2 3 3 2 - 2 2 - 2 - 1 2 2
4 2 1 2 3 2 - 1 - - - 3 1 2 2 2
5 2 - 2 3 2 2 - 2 2 3 1 1 3 2 2
AVg. 2 1.5 2 3 1.8 2 1 2 2 3 1.8 1 1.3 2 2
UNIT I INTRODUCTION 9
Background and history of evolutionary computation - Behavioral Motivations for Fuzzy Logic, Myths
and Applications areas of Computational Intelligence. Adaption - Self organization and Evolution -
Historical Views of Computational Intelligence - Adaption and Self organization for Computational
Intelligence - Ability to Generalize - Computational Intelligence and Soft Computing Vs Artificial
Intelligence and Hard Computing.
Suggested Activities:
Flipped classroom on Applications areas of Computational Intelligence.
Suggested Activities:
Create and view custom neural networks using MatLab.
Implementation of XOR with backpropagation algorithm
Suggested Activities:
Flipped classroom on Evolution strategies.
Programming exercises on maximizing a function using Genetic algorithm.
Suggested Activities:
Flipped classroom on Modifications to Ant Colony Optimization.
Implementation of Particle Swarm Optimisation algorithm for solving a problem.
Suggested Activities:
Flipped classroom on Fuzzy Controllers.
Install MatLab Fuzzy Logic Toolbox and ANN toolbox to design and simulate systems.
Implementation of fuzzy control/ inference system
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 1 3 1 1 1 1 1 - 1 - - - 2 1 2
2 2 2 1 2 1 1 1 - 1 - - 1 2 2 2
3 1 3 2 3 3 1 1 - 1 - - 2 2 1 3
4 2 1 1 2 2 2 1 2 2 2 2 2 2 2 3
5 2 2 2 2 3 2 1 2 2 1 1 2 2 3 3
6 3 3 3 3 2 2 1 2 2 2 2 2 2 3 3
AVg. 2 3 2 2 2 2 1 2 2 2 2 2 2 2 3
Suggested Activities:
Group discussions to share their understanding and insights into reinforcement learning
concepts and brainstorm ideas
Coding exercises to implement and experiment with algorithms using any programming
language or a reinforcement-learning framework.
Suggested Activities:
Provide problem-solving exercises that involve deterministic shortest path problems and
discrete deterministic optimization.
Design and implement algorithms for sequential dynamic programming approximation and
Q-factor parametric approximation using programming languages or reinforcement learning
libraries to develop and test their solutions.
Suggested Activities:
Use simulation environments to observe the behavior and performance of different
algorithms in infinite horizon reinforcement learning.
Suggested Activities:
Literature review on recent advancements and research papers related to aggregation in
reinforcement learning.
Suggested Activities:
Invite guest speakers or industry professionals who have experience with RL projects to
share their insights and real-world examples.
Hands-on workshops to explore RL toolkits and frameworks, such as OpenAI Gym,
TensorFlow, or PyTorch
COURSE OUTCOMES:
On completion of the course, the student will be able to:
1. To recall the fundamental concepts of reinforcement learning and describe the basic
principles and algorithms used in tabular solution methods.
2. Apply dynamic programming approximation techniques to solve deterministic and stochastic
dynamic programming problems.
3. Analyze infinite horizon problems in reinforcement learning.
4. To evaluate the effectiveness of aggregation techniques, including aggregation with
representative states and features.
5. To design and implement reinforcement learning systems using Q-learning and DQN
algorithms.
6. To develop and refine RL projects, considering real-world implementation and deployment
challenges.
TEXT BOOKS
1. Richard S. Sutton and Andrew G. Barto; Reinforcement Learning: An Introduction; 2nd
Edition, MIT Press, 2022
2. Dimitri P. Bertsekas; Reinforcement Learning and Optimal Control; 1st Edition, Athena
Scientific, 2019.
3. D., Phil Winder Ph.. Reinforcement Learning. United States, O'Reilly Media, 2020.
REFERENCES
1. Deep Reinforcement Learning Frontiers of Artificial Intelligence By Mohit Sewak · 2019
2. Thomas G. Dietterich; Hierarchical Reinforcement Learning with the MAXQ Value Function
Decomposition; Journal of Artificial Intelligence Research, vol. 13, pp. 227-303, 2000.
3. Vincent Francois-Lavet, Peter Henderson, Riashat Islam, Marc G. Bellemare and Joelle Pineau;
An Introduction to Deep Reinforcement Learning; ArXiv ePrint, 2018.
4. Remi Munos, Reinforcement Learning and Stochastic Optimization: A Unified Frameword for
sequential Decisions, CRC Press, 2019.
MAPPING of CO’s with PO’s and PSO’s
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 2 2 2 1 1 1 2 2 1 2 1 1 1
2 3 3 3 2 3 2 2 2 2 2 2 3 2 3 2
3 2 3 2 3 2 2 2 2 2 2 2 3 2 3 2
4 2 2 3 3 2 2 2 2 3 1 3 2 2 3 2
5 3 3 3 2 3 2 2 2 3 3 2 3 2 3 3
6 3 2 3 2 3 2 1 2 2 2 2 3 3 2 3
Avg. 3 3 3 2 3 2 2 2 2 2 2 3 2 3 2
UNIT I INTRODUCTION 9
Introduction – Goals and History of IR – The Impact of the Web on IR – The Role of Artificial
Intelligence (AI) in IR – Basic IR Models – Boolean and Vector Space Retrieval Models – Ranked
Retrieval – Text similarity metrics – TF-IDF (term frequency/inverse document frequency) Weighting
– Cosine Similarity.
Suggested Activities:
Understanding the basics of IR.
Study of other retrieval models.
Practical – Implementation of the retrieval model with Lemur Tool kit and test the
performance of different retrieval algorithms.
UNIT II PREPROCESSING 9
Basic Tokenizing – Indexing and Implementation of Vector Space Retrieval – Simple Tokenizing –
Stop Word Removal and Stemming – Inverted Indices –Efficient Processing with Sparse Vectors –
Query Operations and Languages – Relevance Feedback – Query Expansion – Query Languages.
Suggested Activities:
Study of indexing techniques.
Practical – Implementation of vector space model.
Flipped classroom on query expansion with thesaurus.
Suggested Activities:
Practical – Implementation of evaluation metrics.
Study and implementation of PageRank algorithm.
Study of web page duplicate detection technique.
Suggested Activities:
Study of different classification techniques and its uses in different applications.
Practical – Implementation of classification and clustering techniques with WEKA tool.
Assignments on clustering algorithms.
Suggested Activities:
Study of types of collaborative filtering techniques.
Flipped classroom on semantic web.
TOTAL: 45 PERIODS
OUTCOMES:
On completion of the course, the student will be able to:
1. Build an Information Retrieval system using the available tools.
2. Apply indexing and query expansion techniques for efficient retrieval.
3. Apply performance metrics to validate any information retrieval system.
4. Apply machine learning techniques for text classification and clustering for efficient
Information Retrieval.
5. Design and analyze the Web content structures.
6. Design and implement recommender and information extraction system.
TEXT BOOKS:
1. Christopher D. Manning, Prabhakar Raghavan, Hinrich Schütze,” Introduction to Information
Retrieval”, Cambridge University Press, 2008.
2. Ricci, F. Rokach, L. Shapira, B. Kantor, P.B. “Recommender Systems Handbook”, Springer,
2011.
REFERENCES:
1. Brusilovsky, Peter, “The Adaptive Web Methods and Strategies of
Web Personalization”, Springer, 2007.
2. Jure Leskovec, Anand Rajaraman, Jeffrey David Ullman, “Mining of Massive Datasets”,
Second Edition, Cambridge University Press, 2014.
3. Ricardo Baeza-Yates, Berthier Ribeiro-Neto, “Modern Information Retrieval: The Concepts
and Technology behind Search”, Second Edition, ACM Press books, 2011.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 3 3 - 1 - 3 3 2 2 2 2 2
2 3 3 3 3 3 - - - 3 3 2 2 2 3 2
3 3 3 3 2 3 - - 3 2 - 1 3 2 2 2
4 3 3 3 3 3 - 2 - 2 - 2 3 3 3 3
5 3 3 3 3 2 3 3 3 1 - 2 3 2 2 2
6 3 3 3 3 3 - - 3 3 3 2 3 2 3 2
Avg. 3 3 3 3 3 3 2 3 2 3 2 3 2 3 2
Suggested Activities:
In-class activity - Problems based on Z transform Circular and linear convolution.
Testing of frequency transformation and convolution problems using Matlab.
Suggested Activities:
Develop a supervised model to train neural net that uses the AND/OR/XOR gate functions.
Create and view custom neural networks using MatLab.
TEXT BOOKS:
1. Andrew Webb, “Statistical Pattern Recognition”, Arnold publishers, London, 1999.
REFERENCES:
1. C. M. Bishop, “Pattern Recognition and Machine Learning”, Springer, 2006.
2. R. O. Duda, P. E. Hart, D. G. Stork, “Pattern Classification”, John Wiley, 2001.
3. M. Narasimha Murthy, V. Susheela Devi, “Pattern Recognition”, Springer 2011.
4. Menahem Friedman, Abraham Kandel, “Introduction to Pattern Recognition Statistical,
Structural, Neural and Fuzzy Logic Approaches”, World Scientific publishing Co. Ltd, 2000.
5. Robert J. Schalkoff, “Pattern Recognition Statistical, Structural and Neural Approaches”,
John Wiley & Sons Inc., 1992.
6. S. Theodoridis, K. Koutroumbas, “Pattern Recognition”, Fourth Edition, Academic Press,
2009.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 2 2 2 - - 3 3 3 3 2 3 2
2 3 3 3 - - 3 3 3 - - 3 3 2 3 2
3 3 3 3 - - - - 3 - - 3 3 2 3 2
4 3 3 3 - - 3 3 3 - - 3 3 2 2 2
5 3 3 3 3 3 3 3 - - - 3 3 2 3 2
6 3 3 3 3 3 - - 3 3 3 3 3 2 3 2
Avg. 3 3 3 3 3 3 3 3 3 3 3 3 2 3 2
UNIT I INTRODUCTION 9
Overview of Bioinformatics Technologies – Structural Bioinformatics – Data Format and Processing
– Secondary Resources and Applications – Role of Structural Bioinformatics – Biological Data
Integration System
Suggested Activities
Exploring about Biological Data Integration System
Understanding different data formats.
Suggested Activities
Analyzing biomedical data using data mining tool in MatLab
Suggested Activities:
Flipped classroom on statistical classification of biological data.
Suggested Activities:
Extract the key features for biological image in MatLab.
Implementing Spatial Transformations for imageinMatLab.
Suggested Evaluation Methods:
Quizzes on transformations used in bio-images.
Programming assignments on applying various image processing methods on a simple bio
application
Suggested Activities
Implementing sensitivity analysis for biology data in MatLab.
Suggested Evaluation Methods
Quizzes on system biology.
TOTAL: 45 PERIODS
OUTCOMES
On completion of the course, the students will be able to
1. Develop models for Biological Data.
2. Implement image processing Techniques to Bioinformatics Data.
3. Implement Micro Array analysis over Genome Expression.
4. Understand the study of simbiology.
5. Understand the pharmacokinetic modeling.
6. Understand the working model of biological data in Matlab.
TEXT BOOKS
1. Yi-Ping Phoebe Chen(Ed),”Bioinformatics Technologies”, Springer Publications, 2005
2. G. Alterovitz, M. F. Ramoni, “Systems Bioinformatics: An Engineering Case-Based
Approach”, Artech House, 2007.
REFERENCES
1. Michael R. King, Nipa A. Mody, “Numerical and Statistical Methods for Bioengineering:
Applications in MATLAB”, Cambridge University Press, 2011.
2. John L. Semmlow, “Bio signal and Medical Image Processing”, CRC Press, 2004.
3. Frank C. Hoppensteadt, Charles S. Peskin, “Modeling and Simulation in Medicine and Life
Sciences”, Springer, 2010.
4. C. Gibas, Per Jambeck, “Developing bio- informatics computer skills”, O’Reilly Media, 2001
PO PSO
CO 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 1 - 1 1 1 1 1 1 3 2 1 2 2
2 2 2 3 - 1 1 1 1 1 1 3 2 2 2 2
3 2 2 2 - 1 1 1 1 1 1 3 2 1 2 2
4 3 - 2 - 1 1 1 1 1 1 3 - 1 2 2
5 3 - 1 - 1 1 1 1 1 1 3 - 1 2 2
6 2 2 1 1 2 1 1 1 1 1 3 1 2 2
AVg. 2.5 2 1.8 1 1 1 1 1 1 1 3 2 1 2 2
TOTAL:45 PERIODS
OUTCOMES:
On completion of the course, the students will be able to
1. Understand the essential concepts of python for data science
2. Develop and Package Desktop GUI applications using PyQt6 python.
3. Learn and Develop Web Applications with Database using Flask
4. To practice the data science techniques using data processing and modeling, machine
learning
5. To practice the data science techniques using data visualization, data mining and natural
language processing.
TEXT BOOKS:
1. Jake VanderPlas "Python Data Science Handbook" Shroff/O'Reilly; First edition, 2016
2. Reema Thareja "Python Programming: Using Problem Solving Approach Python
Programming". Oxford University Press, First Edition 2017.
3. Wes McKinney "Python for Data Analysis". O′Reilly; 2nd edition, 2017.
4. Yuli Vasiliev "Python for Data Science: A Hands-On Introduction". No Starch Press, 2022.
5. Jack Chan, Ray Chung, & Jack Huang "Python API Development Fundamentals" Packt
Publishing, 2019.
6. Miquel Grinberg “Flask Web Development 2e: Developing Web Applications with Python”.
O′Reilly, 2nd edition, 2018.
7. S.Sridhar, J.Indumathi, V.M.Hariharan, Apr 2023, “Python Programming”, Pearson
REFERENCES:
1. Gareth Dwyer, “Flask by Example”, Packet Publishers, 2016.
2. “Hands-On Data Structures and Algorithms with Python” — By Dr. Basant Agarwal, 2018.
3. “The Art of Data Science” — by Roger D. Peng and Elizabeth Matsui, 2016.
4. “Hands-On Data Visualization: Interactive Storytelling From Spreadsheets to Code” by
Jack Dougherty, Ilya Ilyankou O’Reilly Media (1st edition) 2021.
5. “Data Mining and Machine Learning: Fundamental Concepts and Algorithms” — by
Mohammed J. Zaki, Wagner Meira, Jr. Cambridge University Press; 2nd Edition, 2020.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 1 1 2 - - - - - 2 1 - 3 1 1 1
2 1 3 3 1 3 1 1 - 3 1 2 2 1 1 2
3 1 3 3 1 3 1 1 - 3 1 2 2 3 1 2
4 1 3 3 2 2 2 1 - 3 1 2 2 2 3 3
5 1 3 3 2 2 2 1 - 3 1 2 2 2 2 3
Avg. 1 2.6 2.8 1.5 2.5 1.5 1 - 2.8 1 2 2.2 1.8 1.6 2.2
AZ5008 APPLIED CRYPTOGRAPHY LTPC
3 003
Suggested Activities:
Implement Classical cryptographic algorithms using any Cryptographic tool.
Practice cryptanalysis of classical cryptography and break them.
Practice exponentiation and multiplicative inverses in modular arithmetic
Suggested Activities:
Demonstrate the working of DES, AES and ECC algorithms using CrypTool.
Simulate and demonstrate various cryptographic attacks on DES, AES and ECC.
Suggested Activities:
Use open source or free tools to calculate hash values using SHA 512
Simulate the working of Digital signature schemes.
Suggested Activities:
Debate on the challenges faced by secret key and public key crypto systems
Simulate key agreement scheme using any open source tool
Suggested Activities:
Debate on database and cloud security
Deploy firewall in a system and analyze it's characteristics
TOTAL: 45 PERIODS
OUTCOMES:
On completion of the course, the students will be able to
1. Apply the basic security algorithms and policies required for a computing system.
2. Develop skills to use both symmetric and asymmetric key cryptography to ensure confidentiality.
3. Utilize specific hash functions and Mac algorithms for security applications.
4. Evaluate the application of different digital signature schemes in solving real world problems.
5. Critically analyze the challenges in symmetric and asymmetric key distribution.
TEXT BOOKS:
1. William Stallings, “Cryptography and Network security Principles and Practices”, Pearson/PHI,
Seventh Edition, 2017.
2. Douglas R. Stinson ,“Cryptography Theory and Practice ”, Fourth Edition, Chapman &
Hall/CRC,2019
REFERENCES:
1. Wenbo Mao, “Modern Cryptography Theory and Practice”, Pearson Education, 2004.
2. Pfleeger and Pfleeger, “Security in computing”, Third Edition , PHI/Pearson, 2003.
3. Behrouz Forouzan, Debdeep Mukhopadyay, “Cryptography and Network Security”, Tata
McGraw Hill Education Pvt. Ltd, New Delhi, 2010.
4. Gilles van Assche, “Quantum Cryptography and Secret-Key Distillation”, Cambridge University
Press, 2010.
5. Menges A. J , Oorschot P, Vanstone S.A,“Handbook of Appliled Cryptography” CRC Press, 2001
Reprint
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 3 2 2 2 1 2 3 1 3 3 3 3
2 3 3 3 3 2 2 2 1 2 3 1 3 3 3 3
3 3 3 3 3 2 2 2 1 3 3 1 3 3 3 3
4 3 3 3 3 2 2 2 1 3 3 1 3 3 3 3
5 3 3 3 3 2 2 2 1 3 3 1 3 3 3 3
Avg 3 3 3 3 2 2 2 1 2.6 3 1 3 3 3 3
Suggested Activities
Flipped classroom on supply chain performance
Discussion on the need of supply chain
Suggested Activities
Tutorial on network design and location intelligence.
External learning on framework for Network design decisions in supply chain
Suggested Activities
Demonstrate Predictive customer behavior using Python.
Demonstration of Demand and Sales Estimation using Python
Read a latest survey in AI for supply chain management
Suggested Activities
Exploring the dataset for AI in supply chain
OUTCOMES
On completion of the course, the students will be able to (5-6 outcomes)
1. Understand the need of supply chain management
2. Design a supply chain network
3. Plan based on inventory and supply
4. Use AI to solve supply chain problems
5. Write python programs with benchmark datasets and evaluation metrics.
TEXT BOOKS
1. Sunil Chopra, Peter Meindl and DharamVirKalra, Supply Chain Management-Strategy
Planning and Operation, Pearson Education, Seventh Edition, 2021
2. Kurt Y. Liu, “ Supply Chain Analytics : Concepts, Techniques and Applications, Palgrave
Macmillan Cham, 1st Edition, ISBN : 978-3-030-92223-8
REFERENCES
1. Atour Taghipour, “Demand Forecasting and order planning in supply chains and
Humanitarian Logistics”, IGI Global publications, ISBN : 9781799838067, 1799838064.
2. David Simchi-Levi, Philip Kaminsky, Edith Simchi-Levi, Designing and Managing the
Supply Chain: Concepts, Strategies, and Cases, Tata McGraw-Hill, 2007.
3. Nada R. Sanders, Big data driven supply chain management: A framework for implementing
analytics and turning information into intelligence, Pearson Education, 2014.
4. Research Papers on AI for supply chain.
PO PSO
CO 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 - - - 2 3 2 2 2 1 2 2 3 2 2
2 2 2 3 2 2 3 2 2 2 2 3 2 2 2 2
3 2 2 2 2 2 3 2 2 2 2 3 2 2 2 2
4 1 3 3 2 3 2 2 2 2 2 3 2 2 3 3
5 2 3 2 2 3 3 2 2 2 2 2 2 1 3 3
Avg 2 2.5 2.5 2 2 3 2 2 2 2 3 2 2 2 2
Suggested Activities:
Case studies on applications for predictive analytics.
Understanding of Challenges and issues of predictive analytics.
Implementation of statistical concepts using tools.
Suggested Activities:
Solving problems related to Exploratory Data Analysis.
Demonstration of tools for Data Pre-processing.
Implementation of Feature selection algorithms.
Suggested Evaluation Methods:
Assignment on Data Understanding and Data Preparation.
Group presentation on tool exploration of data preparation.
Quiz on concepts related to data preparation and feature selection.
Suggested Activities:
Case studies on Predictive modeling techniques.
Practicing problems for decision tree, neural network, KNN, NB.
Practicing problems for linear regression, multi-linear regression, etc.
Suggested Activities:
Case studies on applications of Time series data analysis.
Implement the ARIMA model.
Develop a LSTM forecasting model for an application.
Suggested Activities:
Case studies on deep learning applications for predictive analytics.
Demonstrate Clustering model using tool.
Implement Association rule mining using any analytical software.
TOTAL: 45 PERIODS
OUTCOMES
On completion of the course, the students will be able to
1. Grasp the fundamental concepts of predictive analytics and its applications.
2. Understand the pre-processing of the data and importance of feature selection.
3. Perform exploratory data analysis to gain insights into data patterns.
4. Get hands-on practice with various predictive modeling techniques.
5. Acquire skills in model evaluation, model selection and model validation.
6. Apply predictive analytics to real-world problems using analytics software.
TEXT BOOKS
1. Dean Abbott, “Applied Predictive Analytics-Principles and Techniques for the Professional
Data Analyst”, Wiley, 2014.
2. Daniel T. Larose, Chantal D. Larose, “Data Mining and Predictive Analytics”, Wiley, 2015.
REFERENCES
1. Anasse Bari, Mohammad Chaouchi, Tommy Jung, Predictive Analytics for Dummies, 2nd
Edition, 2017.
2. Alberto Cordoba, “Understanding the Predictive Analytics Lifecycle”, Wiley, 2014
3. Jiawei Han and Micheline Kamber, Data Minin g Concepts and Techniques, Third Edition,
Elsevier, 2012.
4. Conrad Carlberg, “Predictive Analytics: Microsoft Excel”, 1st Edition, Que Publishing, 2012.
5. Gareth James, Daniela Witten, Trevor Hastie, Robert Tibshirani. An Introduction to Statistical
Learning with Applications in R Springer 2013.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 3 3 3 2 2 2 2 3 3 3 3 2
2 3 3 3 3 3 3 2 2 2 2 3 3 3 3 2
3 3 2 2 3 3 2 2 2 2 2 2 2 3 3 2
4 3 3 3 3 3 3 3 3 3 2 3 3 2 3 3
5 3 3 3 3 3 3 3 3 3 2 3 3 2 3 3
6 3 3 3 3 3 3 3 3 3 2 3 3 2 3 3
AVg. 3 3 3 3 3 3 2.5 2.5 2.5 2 3 3 2.5 3 2.5
AZ5011 DIGITAL VIDEO PROCESSING LT P C
3 0 0 3
TEXT BOOK:
1. Milan Sonka, Vaclav Hlavac, Roger Boyle, “Image Processing, Analysis, and Machine
Vision”, 4nd edition, Thomson Learning, 2013.
2. Vaibhav Verdhan,(2021, Computer Vision Using Deep Learning Neural Network
Architectures with Python and Keras,Apress 2021
3. S.Sridhar, 2016, “Digital Image Processing”, Second Edition, Oxford University Press
REFERENCES
1. Richard Szeliski, “Computer Vision: Algorithms and Applications”, Springer Verlag London
Limited,2011.
2. Caifeng Shan, FatihPorikli, Tao Xiang, Shaogang Gong, “Video Analytics for Business
Intelligence”, Springer, 2012.
3. D. A. Forsyth, J. Ponce, “Computer Vision: A Modern Approach”, Pearson Education, 2003.
4. Murat Tekalp, “Digital Video Processing” Second Edition, Prentice Hall, 2015.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 2 3 2 1 2 3 2 2 3 1 1 1
2 3 2 2 1 3 1 - 1 2 2 1 2 - 1 1
3 3 3 3 2 3 2 1 2 3 2 2 3 1 2 2
4 3 3 2 2 2 2 1 2 2 2 1 2 1 2 2
5 2 2 3 2 3 2 1 2 2 2 1 3 2 2 3
Avg 3 3 3 2 3 2 1 2 2 2 1 3 1 2 2
UNIT I INTRODUCTION 9
Introduction to Virtual Reality – Components of VR System – Introduction to AR – System structure
of Augmented Reality – 3D Vision – Augmented Reality – Alternative interface paradigms – Spatial
AR – Input devices – 3D Position trackers – Performance parameters – Navigation and manipulation
interfaces – Gesture interfaces – Human visual system – Personal graphics displays – Large volume
displays – Human factor involving auditory system.
Suggested Activities:
Flipped classroom on different MR systems.
Demonstration of the virtual reality effect.
Assignment on comparison of VR with traditional multimedia applications.
Suggested Activities:
Flipped classroom on rendering requirements.
External learning – Different types of graphics architectures and workstations.
Demonstration of GPU programming.
UNIT IV MR PROGRAMMING 9
Programming for VR system – Toolkits and scene graphs – World Toolkit – Java 3D – Human factors
in VR – VR Health and safety issues – VR and society – MR programming framework – Trajectories
through MR Performance – Mobile interface design – Quantitative evaluation – Qualitative
evaluation.
Suggested Activities:
Case study – Different types of programming toolkits.
Practical – Create VR scenes using toolkits like World ToolKit, Java 3D, Ghost, PeopleShop,
Unity.
Suggested Evaluation Methods:
Tutorial on programming toolkits for MR.
Practical - Programming for scene creation in MR.
UNIT V APPLICATIONS 9
Implementation support: Unity and ARCore framework - AR Foundation – AR on Android devices –
Emerging applications of MR – Information visualization – Wearable computing.
Suggested Activities:
External learning – Different types of MR applications.
Practical – Development of MR applications in medicine, entertainment, etc.
Tutorials on MR applications
TEXTBOOKS:
1. Grigore C. Burdea, Philip Coiffet, “Virtual Reality Technology”, Second Edition, Wiley India,
2006.
2. Benford, S., Giannachi G., “Performing Mixed Reality”, MIT Press, 2011.
REFERENCES:
1. Charles Palmer, John Williamson, “Virtual Reality Blueprints: Create Compelling VR
Experiences for Mobile”, Packt Publisher, 2018.
2. John Vince, “Introduction to Virtual Reality”, Springer-Verlag, 2004.
3. William R. Sherman, Alan B.Craig: Understanding Virtual Reality – Interface, Application,
Design”, Morgan Kaufmann, 2003.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 3 2 2 - 1 1 2 2 - 2 1 2 1
2 3 3 3 2 3 1 1 1 2 2 2 1 2 2 2
3 2 2 2 2 3 1 - - 1 - - 1 2 2 2
4 2 2 2 2 3 1 - - 1 - - 1 2 3 2
5 3 2 3 2 2 1 - - - - - 1 2 2 2
6 3 2 3 2 2 1 - - 1 - - 1 2 2 2
Avg 3 2 3 2 3 1 1 1 1 2 2 1 2 2 2
Suggested Activities:
Transfer learning simple implementation
Quiz on AI categories
Evaluation methods:
Assignment on AI techniques
Suggested Activities:
Discussion on Applications of Object detection and analysis
Flipped class room on Deep learning models for image classification
Evaluation methods:
Assignment / implementation of image recognition techniques
OUTCOMES:
Upon completion of the course, the students will be able to
1. Understand the influence of AI in different domains
2. Identify the selection of image and neural algorithms for various image recognition tasks
3. Design and implement NLP based text and speech systems
4. Design and implement Autonomous driving Algorithms for various real time applications
5. Identify the scope of AI in smart systems
TEXT BOOK:
1. Yao, M., Zhou, A., & Jia, M. (2018). Applied Artificial Intelligence: A Handbook for Business
Leaders. Wiley.
2. Heaton, J. (2015). Artificial Intelligence for Humans: Fundamentals and Practical
Examples. Heaton Research, Inc.
REFERENCES
1. Simoudis, E., Patsalos-Fox, M., & Lotz, E. (2019). Autonomous Vehicles: Opportunities,
Strategies, and Disruptions. John Wiley & Sons.
2. Russell, S., & Norvig, P. (2010). Artificial Intelligence: A Modern Approach. Prentice Hall.
3. Raschka, S., & Mirjalili, V. (2017). Python Machine Learning: Machine Learning and Deep
Learning with Python, scikit-learn, and TensorFlow. Packt Publishing.
MAPPING of CO’s with PO’s and PSO’s
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 2 2 2 2 1 2 2 2 1 3 3 2 2
2 2 2 3 2 3 2 1 2 2 2 1 3 1 2 1
3 2 2 3 2 3 2 1 2 2 2 1 3 1 2 1
4 3 3 3 2 3 2 2 2 3 3 2 3 2 3 2
5 3 3 3 2 3 2 2 2 3 3 2 3 2 3 2
Avg 2 2 3 2 3 2 2 2 2 2 1 3 2 2 2
Suggested Activities:
Practical – Study of existing social networks
External learning – Problems on calculation of ties, density, path, length,
distance,betweenness, centrality, clique.
Suggested Activities:
Practical – Discovering communities in social networks and techniques.
External learning – Hands-on problems related to evaluating community metrics
Suggested Activities:
Practical – Analyzing user behavior in social networks.
External learning – Exploring the use of different social network analysis tools
Suggested Activities:
Practical – Use of the features available in various ontology tools like Protégé.
Flipped classroom on basic concepts of semantic web and ontology.
External learning – Knowledge on semantic technology.
Suggested Activities:
Practical – Exploring social networks and implementing innovative social network
visualizations using tools such as Gephi, Cytoscape.
Exploring applications in social networks.
External learning – Investigating the role of visualization in real-world applications.
TEXT BOOKS:
1. Social Network Modelling and Analysis, Niyati Aggrawal, Adarsh Anand, Taylor and
Francis, 2022
2. Social Networks and the Semantic Web, Peter Mika, Springer 2007
3. Mining of Massive Datasets by Cambridge University Press, Jure Leskovec, Anand
Rajaraman, Jeff Ullman, 2011
4. Social Network data Analytics, Charu C Aggarwal, Springer, 2011
REFERENCES:
1. Networks, Crowds, and Markets reasoning about a highly connected world
2. David Easley and Jon Kleinberg, Cambridge University Press, 2010
3. Social Network Analysis and Education, Theory Methods & Applications by Brain V, Carolan,
Sage Publications, 2014
4. Understanding Social Networks Theories, Concepts and Findings, Oxford University Press,
2012, Charles and Kadushin
5. Analyzing Social Networks, Stephan P Borgatti, Martin G Everett, Jeffrey C Johnson, Sage
Publications, 2017
6. Social Recommender Systems, Daniel Schall, Springer, 2015
Suggested Activities:
External learning - Programming to create your own Blockchain.
Flipped classroom on studying Blockchain security issues.
Suggested Activities:
External learning - Creating the Wallets.
Flipped classroom on showing the tracking process of transactions in Cryptocurrency.
Suggested Activities:
External learning - Exploring Ethereum tools like Ganache and GO.
Practical - Setup the Ethereum development environment.
Practical - Develop smart contract on private Blockchain.
Suggested Activities:
Practical - Creating and deploying a business network on Hyperledger Composer
Playground.
Practical - Implementation of business network in Blockchain using hyperledger Fabric.
Suggested Evaluation Methods:
Evaluation of developed business network on hyperledger fabric.
Suggested Activities:
External learning - Blockchain using multichain.
Assignments on Blockchain frameworks and business applications.
TOTAL: 45 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1. Understand the technology components of Blockchain and how it works behind the scenes.
2. Identify different approaches to developing decentralized applications.
3. Understand Bitcoin and its limitations by comparing with other alternative coins.
4. Devise solution using the Ethereum model.
5. Understand and use Hyperledger and its development framework.
6. Track alternative Blockchains and emerging trends in Blockchain.
TEXTBOOK:
1. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology, Decentralization and
Smart Contracts Explained”, Second Edition, Packt Publishing, 2018.
REFERENCES:
1. Arshdeep Bahga, Vijay Madisetti, “Blockchain Applications: A Hands On Approach”, VPT,
2017.
2. Andreas Antonopoulos, Satoshi Nakamoto, “Mastering Bitcoin”, O’Reilly, 2014.
3. Roger Wattenhofer, “The Science of the Blockchain” CreateSpace Independent Publishing,
2016.
4. A. Narayanan, J. Bonneau, E. Felten, A. Miller, S. Goldfeder, “Bitcoin and Cryptocurrency
Technologies: A Comprehensive Introduction”, Princeton University Press, 2016.
5. Alex Leverington, “Ethereum Programming” Packt Publishing, 2017.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 2 2 1 2 1 1 2 1 - 3 2 2 2
2 2 2 2 2 1 2 1 1 2 1 - 3 2 2 2
3 3 3 3 3 3 2 2 2 3 2 2 3 2 2 2
4 3 3 3 3 3 2 2 2 3 2 2 3 2 2 2
5 3 3 3 3 3 2 2 2 3 2 2 3 2 2 2
6 3 3 3 3 3 3 2 2 3 2 2 3 2 2 2
Avg 2.6 2.6 2.6 2.6 2.33 2.16 1.6 1.6 2.6 1.6 2 3 2 2 2
AZ5014 CLOUD SECURITY AND PRIVACY LTPC
300 3
UNIT IV PRIVACY 9
Key Privacy concerns in cloud-Data Life cycle-Changes to Risk and compliance to cloud- Legal and
Regulatory Implications-International laws and regulations- Key management- Audit and
compliance- Incremental CSP-COBIT-HIPAA - Cloud Security Alliance
Suggested Activities
Implementation of a privacy application by adopting cloud data life cycle
Analysis of privacy concerns in CSP
Suggested Evaluation Methods
Assignment on key management infrastructure
Assignment on risk and compliance to cloud.
UNIT V SECURITY AS A SERVICE 9
The Impact of Cloud security on the Role of Corporate IT- Potential Threats of Using CSPs- Program
Guidance for CSP Customers- SAS 70 Report Content Example- SysTrust Report Content
Example- Open Security Architecture for Cloud.
Suggested Activities
External learning on SAS report and analysis
Formulation of attack vectors of various
Suggested Evaluation Methods
Assignments on security levels in a corporate scenario
Total Periods:45
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
1. Appreciate cloud resource management.
2. Articulate the main concepts, key technologies, strengths and limitations of Cloud Security
3. Develop the ability to understand and use the architecture of compute and storage cloud,
service and delivery models.
4. Explain the core issues of cloud computing such as resource management and security.
5. Choose the appropriate technologies, algorithms and approaches for implementation and
use of cloud vulnerability tools
TEXT BOOKS:
1. Buyya R., Broberg J., Goscinski A., “Cloud Computing: Principles and Paradigm”, John
Wiley, 2011.
2. John W. Rittinghouse, James F. Ransome, “Cloud Computing: Implementation “Management
and Security”, CRC Press, 2010.
REFERENCES:
1. Reese, G. Cloud Application Architectures: Building Applications and Infrastructure in the
Cloud. Sebastopol, CA: O'Reilly Media, Inc. 2009
2. Dave shackleford, “Virtualization Security”, SYBEX a wiley Brand 2013.
3. 3. Mather, Kumaraswamy and Latif, “Cloud Security and Privacy”, OREILLY 2011
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 3 1 1 1 - 1 1 1 - 2 3 1
2 3 3 3 3 1 - - - - - 1 - 2 3 2
3 3 3 3 2 1 1 1 1 1 1 1 - 2 3 2
4 3 3 3 3 2 2 1 2 1 1 2 1 3 3 3
5 3 3 3 3 2 2 1 2 1 2 2 2 3 3 3
Avg. 3 3 3 2.4 3.2 2 1 - 1 - 1.4 1.5 2.4 3 2.2
AZ5015 EXPLAINABLE AI LT P C
3 0 0 3
TOTAL: 45 PERIODS
OUTCOMES
On completion of the course, the student will be able to:
1. Recall Taxonomy of explanations.
2. Understand interpretable machine learning principles of decision tree, rule based and linear
models.
3. Apply Model Agnostic XAI techniques, interpret and explain predictions of machine learning
models.
4. Develop XAI techniques for deep learning models.
5. Evaluate XAI methods and Propose innovative solutions to address ethical considerations
6. Apply XAI techniques in practical scenarios, for real-world datasets and problems.
TEXT BOOKS:
1. Christoph Molnar, “Interpretable Machine Learning: A Guide for Making Black Box Models
Explainable”, 2022. (This is a comprehensive book available as a free online resource:
https://christophm.github.io/interpretable-ml-book/)”, Springer, 2019.
2. Uday Kamath, John Liu, “Explainable Artificial Intelligence: An Introduction to Interpretable
Machine Learning”, 2021.
REFERENCES:
1. Leonida Gianfagna, Antonio Di Cecco, Explainable AI with Python, Springer, 2021.
2. Denis Rothman, “Hands-On Explainable AI (XAI) with Python: Interpret, Visualize, Explain,
and Integrate Reliable AI for Fair, Secure, and Trustworthy AI Apps”, Packt Publishing Ltd,
2020
TOTAL: 45 PERIODS
OUTCOMES
On completion of the course, the students will be able to
1. Recall the fundamental concepts of probabilistic learning, computational issues related to
probabilistic learning algorithms and propose solutions.
2. Apply frequentist statistical inference techniques to analyze data and make probabilistic
predictions.
3. Implement computational intelligence methods for solving bioinformatics problems.
4. Analyze biological datasets using data mining techniques, evaluate the performance of
machine learning models, and interpret the results.
5. Develop deep learning models for protein sequence classification and analysis.
6. Understand the functionalities of libraries such as Numpy, SciPy, and Akando in
bioinformatics data processing and analysis.
TEXT BOOKS
1. “Introduction to Machine Learning and Bioinformatics”, CRC Computer Science & Data
Analysis, 2019, by Sushmita Mitra, Sujay Datta, Theodore Perkins), George Michailidis
2. Deep Learning in Bioinformatics: Techniques and Applications in practice”, 1st Edition -
January 8, 2022, Habib Izadkhah
3. “Data Mining for Bioinformatics”, Sumeet Dua, Pradeep Chowriappa, CRC Press Taylor &
Francis Group, 2013
REFERENCES
1. Python for Bio Informatics, Jason Kinser, Jones and Bartlett Publishers, 2009
2. “Introduction to Machine Learning and Bioinformatics”, CRC Computer Science & Data
Analysis, 2019, by Sushmita Mitra, Sujay Datta, Theodore Perkins), George Michailidis
PO PSO
CO 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 2 2 2 1 1 2 2 2 1 3 2 1 1
2 3 3 2 3 2 2 1 2 2 2 2 3 2 1 1
3 3 3 3 2 3 2 1 2 2 2 2 3 2 1 2
4 3 3 3 3 3 2 1 2 2 2 2 3 2 1 1
5 3 3 3 3 3 2 1 2 2 2 2 3 2 3 1
6 2 2 1 2 3 1 1 2 2 2 1 3 1 3 2
Avg. 3 3 2 3 3 2 1 2 2 2 2 3 2 2 1
Suggested Activities:
In-class activity to understand the penetration testing methodologies.
Practical - Use security tools in Kali Linux to assess the vulnerabilities.
Prepare Vulnerability Assessment summary reports.
UNIT IV EXPLOITATION 9
Introduction to Metasploit – Reconnaissance with Metasploit – Port Scanning with Metasploit –
Compromising a Windows Host with Metasploit – Client Side Exploitation Methods – E– Mails with
Malicious Attachments – Creating a Custom Executable – Creating a Backdoor with SET – PDF
Hacking – Social Engineering Toolkit – Browser Exploitation – Post– Exploitation – Acquiring
Situation Awareness – Hashing Algorithms – Windows Hashing Methods – Cracking the Hashes
– Brute force Dictionary Attacks – Password Salts – Rainbow Tables – John the Ripper – Gathering
OS Information – Harvesting Stored Credentials.
Suggested Activities:
Case studies: Understand the Metasploit and Exploitations.
Demonstrating email with malicious attachment and cracking the hashes.
Practical - Implementing hashing algorithms and cracking the hashes.
Suggested Activities:
Cracking the WEP and WPA/WPA2 passphrase using Cracking tool in Kali Linux.
Design a web application with different authentication mechanism.
Understand the protection mechanism to prevent against various server attacks.
TOTAL: 45 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1. Use the various security tools to assess the computing system.
2. Predict the vulnerabilities across any computing system using penetration testing.
3. Identify prediction mechanism to prevent any kind of attacks.
4. Protect the system from malicious software and worms.
5. Evaluate the wireless network flaws and able to apply security patches .
6. Analyze the risk and support the organization for effective security measures.
TEXT BOOKS:
1. Rafay Baloch, “Ethical Hacking and Penetration Testing Guide”, CRC Press, 2014.
REFERENCES:
1. Kevin Beaver, “Ethical Hacking for Dummies”, Sixth Edition, Wiley, 2018.
2. Jon Erickson , “Hacking: The Art of Exploitation”, Second Edition, Rogunix, 2007.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 2 3 1 1 - - - 1 2 1 2 1
2 3 3 3 2 1 1 1 1 3 3 2 3 - 2 1
3 3 3 3 2 2 3 3 1 3 3 2 3 1 2 1
4 3 3 3 2 3 3 3 3 - - 1 2 - 2 1
5 3 3 3 3 3 1 - - 3 3 2 2 1 2 1
6 3 3 3 2 3 3 3 3 3 3 2 3 1 2 1
Avg 3 3 3 2 3 2 2 2 3 3 2 2 1 2 1
AZ5017 MACHINE LEARNING OPERATIONS LTPC
3 003
Suggested Activities:
Flipped classroom on MLOps.
Learning – MLOps Tools, Types of ML Software.
Suggested Activities:
Flipped classroom on SQLite and MongoDB
Practical - Working with SQLite CRUD Examples using Python
Practical - Working with MongoDB CRUD Examples using Python
Suggested Activities:
Flipped classroom on Machine Learning Models
Implementation of Supervised Machine Learning Algorithms using Python
Implementation of Unsupervised Machine Learning Algorithms using Python
Suggested Activities:
Flipped classroom on Docker Container and MLflow
Java Application Deployment using Docker on Windows / Linux
Python Application Deployment using Docker on Windows / Linux
Tracking ML projects using MLflow.
Suggested Activities:
Flipped classroom on Cloud Machine Learning
Flipped classroom on deployment of ML models using cloud tools
Practical – Deployment of ML Models into Cloud Azure / AWS / GCP
TEXTBOOKS:
1. Mark Treveil and the Dataiku team “Introducing MLOps: How to Scale Machine Learning in
the Enterprise” Shroff/O'Reilly, First edition, 2020.
2. Oliver Theobald "Machine Learning for Absolute Beginners", Scatterplot Press, 2nd edition,
2017.
3. Reema Thareja "Python Programming: Using Problem Solving Approach Python
Programming".Oxford University Press, First Edition 2017.
4. Martin C. Brown “Python: The Complete Reference” McGraw Hill Education, Forth edition,
2018.
5. Yuxi (Hayden) Liu "Python Machine Learning By Example". Ingram short title, 2017.
6. M. N. Rao "Cloud Computing", PHI Learning, 2015.
7. Timothy Chou “Cloud Computing: Fundamentals”. Cloudbook, First Edition, 2015.
8. Andreas Muller “Introduction to Machine Learning with Python: A Guide for Data Scientists”
Shroff/O'Reilly, First Edition, 2016.
REFERENCES:
1. “ML Ops: Operationalizing Data Science” by David Sweenor, Steven Hillion, Dan Rope,
Dev Kannabiran, Thomas Hill, Michael O’Connell.
2. “Accelerated DevOps with AI, ML & RPA: Non-Programmer’s Guide to AIOPS & MLOPS”
by Stephen Fleming.
3. Francois Duval “Python Machine Learning-Practical Guide for Beginners”, 2017.
4. “Mastering Azure Infrastructure Servicesp” (1st edition), by John Savill, 2015.
5. "MongoDB in Action" (1st Edition), by Kyle Banker 2011.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 1 2 1 - 1 1 - - - 1 - 1 1 1 2
2 1 3 2 2 2 1 1 - 2 1 3 2 1 1 2
3 1 3 3 3 3 2 1 1 2 1 3 2 2 3 3
4 1 3 3 3 3 2 1 1 2 1 3 1 2 3 3
5 1 3 3 3 3 2 1 1 2 1 3 1 3 3 3
Avg 1 2.8 2.4 2.75 2.4 1.6 1 1 2 1 3 1.4 1.8 2.2 2.6
Suggested Activities:
Flipped classroom on quantum algorithms, information processing.
Tutorials on applications of algorithms.
Suggested Activities:
Flipped classroom on postulates, computational models.
Computational analysis of common problems like Travelling Salesman.
Suggested Activities:
Flipped classroom on simulation, Fourier transform.
Simulation Exercises.
Tutorials on quantum search algorithms.
Suggested Activities:
Flipped classroom on quantum machine learning.
Extra reading and discussion from reference books.
Suggested Evaluation Methods:
Quiz on quantum machine learning.
Problem solving assignment on text book exercise questions
TOTAL: 45 PERIODS
OUTCOMES
On completion of the course, the students will be able to
1. Understand the basics of quantum computing.
2. Understand the background of Quantum Mechanics.
3. Analyse the computation models.
4. Model the circuits using quantum computation.
5. Understand the quantum operations such as noise and error–correction.
6. Appreciate the need of quantum machine learning.
TEXT BOOK:
1. Michael A. Nielsen, Issac L. Chuang, “Quantum Computation and Quantum Information”,
Tenth Edition, Cambridge University Press, 2010.
2. Santanu Ganguly, “Quantum Machine Learning: an Applied Approach : The Theory and
Application of Quantum Machine Learning in Science and Industry”, Publisher Apress L. P.,
2021
REFERENCES:
1. Jack D. Hidary, “Quantum Computing: An Applied Approach” 1st edition, Springer, 2019
2. Scott Aaronson, “Quantum Computing Since Democritus”, Cambridge University Press,
2013.
3. N. David Mermin, “Quantum Computer Science: An Introduction”, Cambridge University
Press, 2007.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 2 - - - - - - - - - - 1 1
2 3 3 3 - - - - - - - - - - 1 1
3 3 3 3 3 2 - - - - - 3 1 2 2 2
4 3 3 3 3 2 1 - 1 - - 3 1 2 2 2
5 3 3 3 3 2 - - - - - - - 1 1 1
6 3 3 3 3 2 - - - - - - 2 3 3 3
AVg. 3 3 2.83 3 2 1 - 1 - - 3 1.33 2 1.67 1.67
Suggested Activities
Divide the students into groups and instruct them to review literatures related to cognitive
architectures
Group Presentation on the review carried out.
Suggested Activities
Choose a simple cognitive task and implement a rule based model to simulate this.
Choose a simple cognitive task and construct a connectionist neural network model using
TensorFlow or PyTorch.
Suggested Activities
Design an attention experiment and investigate the effects of different factors on attentional
processes.
Form groups and analyze different learning strategies.
Choose a memory experiment and investigate factors such as encoding processes
or interference effects.
Suggested Activities
Explore various cognitive biases influencing decision making such as confirmation bias,
availability heuristic etc.
1. Explore the fundamental concepts and principles of cognitive modeling and its role in
understanding human cognition.
2. Explain the differences between symbolic and connectionist approaches in cognitive
modeling.
3. Apply cognitive modeling techniques to analyze and simulate cognitive processes related
to perception, attention, memory and long term memory.
4. Apply techniques to simulate and interpret cognitive processes related to decision-
making, problem-solving in large scale systems.
5. Utilize cognitive modeling techniques to address and solve problems in various domains,
such as language processing and decision-making
TEXT BOOKS:
1. Jerome R Busemeyer and Adele Diederich, “Cognitive Modeling: A Computational
Approach” SAGE publications, 2009.
2. Thad Polk and Colleen Seifert , “Cognitive Modeling”, The MIT Press 2002
REFERENCES:
1. Jerome R. Busemeyer, Zheng Wang, James The Oxford Handbook of Computational and
Mathematical Psychology,Townsend, Ami Eidels (ed.), Oxford University Press (2015).
2. Emmanuel M. Pothos and Andy J. Wills, “Formal Approaches in Categorization” Cambridge
University Press,2011.
3. Jerome R. Busemeyer and Peter D. Bruza, Quantum Models of Cognition and Decision,
Cambridge University Press, 2014.
4. Nils J. Nilsson, The Quest for Artificial Intelligence, Cambridge University Press, 2009.
5. Bernard J. Bears and Nicole M. Gage, “Cognition, Brain and Consciousness: Introduction to
Cognitive Neuroscience”, Academic Press 2010.
6. O’Reilly, R. C., Munakata, Y., Frank, M. J and Hazy, T. E. Computational Cognitive
Neuroscience. Wiki Book, 4th Edition (2020). URL: https://CompCogNeuro.org
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 3 2 2 2 1 2 3 1 3 3 3 3
2 3 3 3 3 2 2 2 1 2 3 1 3 3 3 3
3 3 3 3 3 2 2 2 1 3 3 1 3 3 3 3
4 3 3 3 3 2 2 2 1 3 3 1 3 3 3 3
5 3 3 3 3 2 2 2 1 3 3 1 3 3 3 3
Avg 3 3 3 3 2 2 2 1 2.6 3 1 3 3 3 3
AZ5019 AI BASED MOBILE APPLICATION DEVELOPMENT LTPC
3 003
UNIT 1 INTRODUCTION 9
Mobile Applications – Types of Mobile Applications – Mobile Web, Native Applications, Hybrid
Applications - Characteristics and Benefits - Mobile Frameworks and Tools – Web Based Cross
Frameworks-Native Based Cross Frameworks-Xamarin-Codename One-Flutter-React Native-
Native Script-Pros and Cons; Mobile Platforms – Types: Mobile App UI/UX Design Tools.
Suggested Activities:
Flipped classroom on mobile applications and types of frameworks.
Theory – study about different types of mobile applications, frameworks, platforms and tools.
Suggested Evaluation Methods
Quiz on types of mobile applications and frameworks.
Assignments on mobile frameworks, UI/UX design tools.
Suggested Activities:
Flipped classroom on android architecture and tools.
Practical – Develop Native Android Smartphone Applications using Java / Kotlin.
Practical – Develop Android Application for Intents.
Practical – Working with SQLite CRUD examples using Android Application.
Suggested Evaluation Methods
Quiz on android app development, and components.
Program on SQLite Database with android.
Assignment on application components, types of intents.
TOTAL : 45 PERIODS
COURSE OUTCOMES:
At the end of the course the students will be able to
1. Understand the frameworks, platforms and tools of mobile application development.
2. Learn native Android application development using Java / kotlin.
3. Understand native iOS application development using Objective-C / Swift.
4. Learn implementation aspects of AI in mobile application development.
5. Develop AI based mobile application using Android / iOS.
TEXTBOOKS:
1. Laurence Moroney, “AI and Machine Learning for On-Device Development: A
Programmer's Guide”, O'Reilly Media, 1st Edition, 2021.
2. Dawn Griffiths and David Griffiths, “Head First Android Development: A Learner's Guide
to Building Android Apps with Kotlin”, Shroff/O'Reilly, 3rd edition, 2021.
3. Ahmad Sahar and Craig Clayton, “iOS 15 Programming for Beginners: Kickstart your
mobile app development journey by building iOS apps with Swift 5.5 and Xcode 13”,
Packt Publishing, 6th edition, 2021.
REFERENCES:
1. Jakob Iversen, Michael Eierman, “Mobile App Development for iOS and Android”,
Prospect Press, 2nd edition, 2017.
2. Reto Meier, “Professional Android 4 Development”, John Wiley and Sons, 2012
3. Professional mobile Application Development paperback,2012 Jeff Mcherter
(Author),Scott Gowell (Author), Wiley India Private Limited
4. https://www.apptunix.com/blog/artificial-intelligence-tools-for-mobile-app-development/
5. https://www.tensorflow.org/lite/examples
6. https://www.leewayhertz.com/how-to-build-ai-powered-mobile-apps/
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 1 1 1 - 1 - - - 1 1 - 1 1 1 1
2 1 3 3 2 3 1 1 2 3 1 3 2 3 3 3
3 1 3 3 2 3 1 1 2 3 1 3 2 3 3 3
4 1 2 3 2 3 1 1 2 1 1 1 2 1 1 1
5 1 3 3 3 3 1 1 3 3 1 3 2 2 3 3
AVG 1 2.4 2.6 2.25 2.6 1 1 2 2.2 1 2.5 1.8 2 2 2
UNIT V CHATGPT 9
Introduction to CHATGPT and AI Chatbots- Strategy for asking prompts-Advanced techniques for
prompts- Real world applications for asking prompts.
Suggested Activities
External learning on CHATGPT design
Formulation of prompts for any conversation in an application.
Suggested Evaluation Methods
Assignments on AI chatbots
TOTAL: 45 PERIODS
OUTCOMES:
Upon completion of the course, the students will be able to
1. Develop a conversational structure.
2. Articulate the main concepts, key technologies, strengths and limitations of Conversational
analytics
3. Develop the ability to understand and use the structure of conversation and delivery methods
4. Explain the formulation of prompts and deployment
5. Choose the appropriate technologies, algorithms and approaches for implementation of AI
chatbots
TEXT BOOK:
1. Jack Sidnell and Tanya Stivers, “The Handbook of Conversation Analysis”, John Wiley, 2012.
2. A.A.Kabir, “ChatGPT Handbook: Asking The Right
questions”(https://www.amazon.com/ChatGPT-Handbook-Asking-Right-Questions)
REFERENCES:
1. Jack Sidnell, Tanya Stivers “The Handbook of Conversation Analysis”, Blackwell Publishing Ltd.,
2012
2. Alexa Hepburn and Jonathan Potter,” Essentials of Conversation Analysis”, American
Psychological Association, 2021
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 3 1 1 1 - 1 1 1 - 2 3 1
2 3 2 2 3 1 1 - - 1 - 1 - 2 3 2
3 3 3 2 2 1 1 2 2 1 1 1 - 2 3 2
4 3 3 3 3 2 2 1 2 1 1 2 1 3 3 3
5 2 3 3 3 2 2 1 2 1 2 2 2 3 3 3
Avg. 2.4 3 3 2.4 1.8 2 1 - 1 - 1.4 1.5 2.4 3 2.2
IT5009 MULTIMEDIA TECHNOLOGIES LTPC
300 3
Suggested Activities:
Flipped classroom on concepts of Multimedia hardware architectures.
External learning - Digital Repositories.
Suggested Activities:
Flipped classroom on Multimedia Database and indexing structures.
External learning - Data structures for storing multimedia data.
TOTAL: 45 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1. Handle the multimedia elements effectively.
2. Encode and decode the multimedia elements.
3. Understand the underlying multimedia computing architectures used for media development.
4. Develop effective strategies to deliver Quality-of-Experience in multimedia
applications.
5. Design and implement algorithms and techniques related to multimedia objects.
6. Design and develop multimedia applications in various domains.
TEXT BOOKS
1. Ralf Steinmetz, Klara Nahrstedt, “Multimedia computing, communications, and applications”,
Pearson India, 2009.
2. Ranjan Parekh, “Principles of Multimedia”, Second Edition, McGraw Hill Education, 2017.
3. Ralf Steinmetz, Klara Nahrstedt, “Multimedia Systems”, Springer IE, 2004.
REFERENCES:
1. Tay Vaughan, “Multimedia: Making it Work”, McGraw – Hill Education, Ninth Edition, 2014.
2. Mark S Drew, Zee Nian Li, “Fundamentals of multimedia”, Prentice Hall, 2006.
3. Jerry D. Gibson, Toby Berger, Tom Lookabaugh, Dave Lindergh, Richard L. “Baker Digital
Compression for Multimedia: Principles and Standards”, Elsevier, 2006.
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 2 2 2 2 - - 1 1 1 - - 1 -
2 3 3 2 2 2 2 - - 1 1 1 - 1 1 -
3 3 3 3 3 3 2 - - 2 - - 1 1 2 1
4 3 3 3 2 2 2 - - 1 - - - 1 2 1
5 2 3 3 2 3 1 - - 1 - - 1 1 2 2
6 2 3 3 3 3 1 - - 3 1 1 1 1 2 1
Avg 3 3 3 2 3 2 - - 2 1 1 1 1 2 1
Suggested Activities
External learning on the statistics of cyber attacks
External learning on reconnaissance for cyber security
Introduction to Intrusion detection – Types of IDS– IDS threat taxonomy - IDS Evaluation Metrics -
AI based techniques for ID - Detecting DDos Attack – Credit Card fraud detection – Counterfeit bank
note detection – Ad blocker –IoT device type identification – Deepfake recognition. Anomaly
Detection – Types of anomalies – Anomaly detection with data and algorithms – Challenges in
Anomaly detection.
Suggested Activities
Discussion papers on Deepfake recognition
Demonstration of intrusion detection and anomaly detection.
Suggested Activities
Video lectures on Spam detection
Demonstration of email URL Phishing
Suggested Activities
Tutorial on Adversarial machine learning
Case studies
OUTCOMES
On completion of the course, the students will be able to (5-6 outcomes)
1. Grasp the fundamentals of Cyber security
2. Knowledge of malware and countermeasures
3. Ability to detect Intrusion and Anomaly detection using AI algorithms
4. Able to realize Application security using AI
5. Gain knowledge of other roles of AI in Cyber security
TEXT BOOKS
1. Anand Shinde, “Introduction to Cyber Security Guide to the World of Cyber Security”, Notion
Press, 2021 (Unit 1)
2. Clarence Chio, David Freeman, “ Machine Learning and Security : Protecting Systems with
Data and Algorithms”, O’Reilly publication, !st Edition, ISBN -1491979909
REFERENCES
1. Apruzzese, Giovanni, et al. "The role of machine learning in cybersecurity." Digital Threats:
Research and Practice 4.1 (2023): 1-38.
2. Sumeet Dua, Xian Du, “Data Mining and Machine Learning in Cybersecurity”, CRC Press
Publication, 1st Edition, ISBN 9781439839423
3. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives”, Wiley Publishers, 2011
4. Research papers on AI for Cyber Security
MAPPING of CO’s with PO’s and PSO’s
PO PSO
CO 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 1 - - - 1 1 - 1 - - 2 3 2 2
2 - 2 3 2 - 1 1 - - - - 1 2 2 2
3 2 2 2 2 1 2 2 2 2 2 2 2 3 2 2
4 2 2 3 2 2 2 2 2 2 2 2 2 3 2 2
5 2 2 1 - 1 2 1 1 - - - 2 3 2 2
Avg 2 2 3 2 1 2 1 2 2 2 2 2 3 2 2
Suggested Activities
Using dataset of microarray gene expression data, perform pre-processing and analyze the
impact on data.
Design a microarray experiment to investigate the gene expression differences between two
groups of samples.
Create a visualization of gene expression or protein expression data, explore various
visualization techniques and their effectiveness in representing data.
Suggested Evaluation Methods
Evaluate the students' engagement and participation in group discussions and activities
related to data pre-processing, microarray design, mass spectrometry data analysis, and
visualization techniques.
Assign a data analysis project that need to apply the techniques learnt to analyze a real-
world dataset.
Suggested Activities
Use case studies to demonstrate the application of these technique in real-world scenarios.
Create a protein network or metabolic network using graph definition.
Suggested Evaluation Methods
Evaluate the effectiveness and performance of methods for a given genomic or proteomic
dataset.
Evaluate the quality of the protein network or metabolic network created using graph
definition
OUTCOMES
On completion of the course, the students will be able to
1. Apply the techniques and tools of genomics and proteomics data analysis and identify the
principles.
2. Analyze genomic and proteomic data using feature selection and model assessment
techniques.
3. Apply statistical methods to analyze microarray investigations and mass spectrometry data.
4. Utilize text mining and ontology-based analysis to explore biomedical data.
5. Apply deep learning models for sequence analysis and protein structure prediction in
genomics and proteomics research and evaluate its effectiveness.
6. Identify the ethical and social implications of genomics and proteomics research and its
impact on society.
TEXT BOOKS
1. Werner Dubitzky , Martin Granzow , Daniel P. Berrar “Fundamentals of Data Mining in
Genomics and Proteomics”, Springer.
2. Francisco Azuaje , Joaquin Dopazo “Data Analysis and Visualization in Genomics and
Proteomics, Wiley
3. Faheem Masoodi, Mohammad Quasim, Syed Bukhari, Sarvottam Dixit, Shadab Alam
“Applications of Machine Learning and Deep Learning on Biological Data”, CRC Press, 2023
REFERENCES
1. Kenneth Baclawski and Tianhua Niu “Ontologies for Bioinformatics”, MIT Press
2. Soraj Hongladarom “Genomics and Bioethics: Interdisciplinary Perspectives, Technologies
and Advancements”, IGI Global
3. Upendra Kumar Devisetty “Deep Learning for Genomics”, O’Reilly, 2022
4. Paula Boddington “AI Ethics”, Springer, 2023.
5. Gary D. Miner, John Elder, Andrew Fast, Thomas Hill, Robert Nisbet, Dursun Delen
“Practical Text Mining and Statistical Analysis for Non-structured Text Data Applications”,
O’Reilly, 2012.
MAPPING of CO’s with PO’s and PSO’s
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 3 3 3 2 2 2 3 2 2 3 3 3 2
2 3 3 3 3 3 2 1 2 3 3 2 3 3 3 2
3 3 3 3 3 3 2 2 2 3 3 2 3 3 3 2
4 3 3 3 3 3 2 1 2 3 2 2 3 3 3 2
5 3 3 3 3 3 2 2 2 3 3 2 3 3 3 2
6 3 3 3 3 3 3 3 3 3 3 3 3 2 2 2
Avg. 3 3 3 3 3 2 2 2 3 3 2 3 3 3 2
UNIT I INTRODUCTION 9
Introduction to AI - Descriptive Ethics - Normative Ethics- Meta-ethics – Applied ethics - Relationship
Between Ethics and Law - Machine Ethics
Suggested Activities:
Flipped classroom on introduction to AI.
External learning – Learn about other type of ethics and their relation to AI.
Group discussion on workplace ethics conflicts.
Suggested Activities:
Case study on ethics in designing autonomous vehicle.
Flipped classroom learning on mistargeting by an autonomous weapon.
Reflect on how self-driving cars is going to continue to grow in the future.
Suggested Activities:
Present a business case for the importance of integrity and ethics in business.
Case study on the risks of AI to workers and how it affects them.
Flipped classroom learning on a privacy issue created by AI.
Suggested Activities:
Case study on how robots creates ethical issues in the society.
Flipped classroom learning on Ethical Issues in an ICT Society.
Suggested Activities:
Case study on ethical decisions that affect individuals and companies.
Flipped classroom learning on Artificial Intelligence in medicine and how it affects individuals.
TOTAL: 45 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1. Understand and differentiate the different ethics in AI.
2. Identify the Responsibility and Liability in AI Systems.
3. Understand the ethical risks of AI and the risks of companies and workers in AI.
4. To understand the privacy issues of the data.
5. Understand the concepts of Roboethics and Morality with professional responsibilities.
6. Learn about the societal issues in AI with National and International Strategies on AI
TEXT BOOKS:
1. Sean Welsh, Alan R. Wagner, Christoph Lütge, Christoph Bartneck , An Introduction to
Ethics in Robotics and AI, SpringerBriefs in Ethics, 2019.
2. Patrick Lin, Keith Abney, George A Bekey, Robot Ethics: The Ethical and Social Implications
of Robotics, The MIT Press- January 2014.
REFERENCES:
1. Towards a Code of Ethics for Artificial Intelligence (Artificial Intelligence: Foundations,
Theory, and Algorithms) by Paula Boddington, November 2017
2. Eleanor Bird, Jasmin Fox-Skelly, Nicola Jenner, Ruth Larbey, Emma Weitkamp and Alan
Winfield ,The ethics of artificial intelligence: Issues and initiatives, EPRS | European
Parliamentary Research Service Scientific Foresight Unit (STOA) PE 634.452 – March 2020
3. Mark Coeckelbergh,” AI Ethics”, The MIT Press Essential Knowledge series, April 2020
4. S.Matthew Liao, Ethics of Artificial Intelligence, Oxford University Press, 2020
MAPPING of CO’s with PO’s and CO’s
PO PSO
CO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 2 2 2 3 1 3 2 2 1 2 1 1 1
2 2 2 2 2 2 3 1 3 2 2 1 2 2 1 1
3 2 2 1 2 2 3 1 3 2 2 1 2 1 1 2
4 2 2 2 2 2 3 1 3 2 2 1 2 1 2 1
5 2 2 2 2 2 3 1 3 2 2 1 2 1 1 1
6 2 2 2 2 2 3 1 3 2 2 1 2 1 1 1
Avg 2 2 2 2 2 3 1 3 2 2 1 2 1 1 1
This course offers an introduction to language and communication. The primary goal of this course
is to familiarize students with key ideas related to communication using language as well as non
verbal means. Ideas related to the use of language and the underlying power structures are also
examined. The course also examines the role of media in communication and in the dissemination
of ideas as well as opinions.
Objectives
To familiarize students with the concept of communication using linguistic and non linguistic
resources.
To help students ask critical questions regarding facts and opinions.
To provide students with the material to discuss issues such as language and power
structures.
To help students think critically about false propaganda and fake news.
Learning Outcomes
Students will be able to use linguistic and non linguistic resources of language in an
integrated manner for communication.
Students will be able to analyse communication in terms of facts and opinions.
Students will be able to discuss, analyse and argue about issues related to language and
power.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
TEXTBOOKS:
1. AwadeshPradhan :MahamanakeVichara. (B.H.U., Vanarasi-2007)
2. Little, William, : An Introduction of Ethics (Allied Publisher, Indian Reprint 1955)
3. William, K Frankena : Ethics (Prentice Hall of India, 1988)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
TEXT BOOK:
1. Dubrien, A. J. (2017). Human Relations for Career and Personal Success: Concepts,
Applications, and Skills, 11th Ed. Upper Saddle River, NJ: Pearson.
REFERENCES:
1. Greenberg, J. S. (2017). Comprehensive stress management (14th edition), New York:
McGraw Hill.
2. Udai, Y. (2015). Yogasanaurpranayam. New Delhi: N.S. Publications.
HU5174 PSYCHOLOGICAL PROCESSES LTPC
3 003
COURSE DESCRIPTION
Psychological Processes course is designed for students to be aware of the basic principles of
psychology for the better understanding of people’s psyche and behaviour around them. This course
enables learners to use the optimal use of different forms of thinking skills and thereby results in
effective communication in diverse situations. Every unit of the syllabus highlights the psychological
process of people, the most powerful and constructive use of perceptions.
OBJECTIVES
The major objectives of this course is
To develop students’ awareness – on psychology, learning behavior and usage of perception
effectively.
To learn to use the various kinds of thinking in a formal context.
To critically evaluate content and comprehend the message on the bases of perception,
personality and intelligence.
UNIT 1: INTRODUCTION
What is psychology? - Why study psychology? - Psychology as science – Behavior and its role in
human communication – socio-cultural bases of behaviour – Biological bases of behavior - Brain
and its functions – Principles of Heredity – Cognition and its functions Fields of psychology –
Cognitve and Perceptual – Industrial and Organizational.
References
1. Morgan, C.T.and King, R.A (1994) Introduction to Psychology, Tata McGraw Hill Co Ltd,
New Delhi.
2. Robert A. Baron (2002), Psychology, 5th Edition, Prentice Hall, India.
3. Michael W.Passer, Ronald E.smith (2007), Psychology: The science of mind and
Behavior,3rd Edition Tata McGraw-Hill Edition.
4. Robert S.Feldman (2004) Understanding Psychology 6th Edition Tata McGraw – Hill.
5. Endler, N. S., & Summerfeldt, L. J. (1995). Intelligence. personality. psychopathology. and
adjustment. In D. H. Saklofske & M. Zeidner (Eds.). International handbook of personality
and intelligence (pp. 249-284). New York: Plenum Press.
6. Ford, M. E. (1994). A living systems approach to the integration of personality and
intelligence. In R. J. Sternberg. & P. Ruzgis (Eds.). Personality and intelligence
(pp. 188-21 7). New York: Cambridge University Press.
De Bono, E (1990) Lateral Thinking, Harper Perennial, New York.
COURSE OBJECTIVES:
The course aims
To help learners understand the basics of different types of technology utilised in the field of
education
To make them realize the impact of education in society
To make them evolve as responsible citizen in a technologically advanced society
LEARNING OUTCOMES
By the end of the course, learners will be able to
Understand the various apps of technology apps and use them to access, generate and
present information effectively.
Apply technology based resources and other media formats equitably, ethically and legally.
Integrate their technical education for betterment of society as well as their personal life.
EVALUATION
As this is course is not a content based course, it focuses more on the ethical use of technology in
education and society, and so, evaluation can be based on assignments and discussions. So there
is no need for an end semester examination. Internals marks can be taken for the total marks.
REFERENCES
1) Education and Social order by Bertrand Russel
2) Theories of learning by Bower and Hilgard
3) Technology and Society by Jan L Harrington
HU5176 PHILOSOPHY LT PC
3 0 03
OBJECTIVES
To create a new understanding by teaching philosophy through a comparison of Indian and
Western traditions.
To Fosters critical thinking and imagination by dealing with inter-related concepts in literature
and science.
To bridge the gap between the sciences and humanities through introspective analyses.
To nurture an understanding of the self and elucidates ways to progress towards a higher
understanding of one’s self and others.
UNIT I KNOWLEDGE 9
Knowledge (Vidya) Versus Ignorance (Avidya)- Brihadaranyaka Upanishad. Unity and Multiplicity –
Isha Upanishad. What is True Knowledge? Ways to True Knowledge. Introduction to Philosophy of
Yoga, Socratic Debate, Plato’s Views. Asking and Answering Questions to Stimulate Critical
Thinking and to Draw Ideas. Argumentative Dialogues. Dialectical Methods to Arrive at Conclusions.
UNIT II ORIGIN 9
Origin of Universe And Creation – ‘Nasidiya Sukta’ in Relation With Big Bang Theory. Greek Concept
of Chaos. The Concept of Space – Space as the Final Goal – Udgitha. Relationship Between
Teacher And Student – The Knowledge Of Combinations, Body And Speech – Siksha Valli –
Taittriya Upanishad.
REFERENCES:
1. Swami Nikhilananda: The Upanishads, Swami Nikhilananda, Advaita Ashrama, Kolkata.
2. Swamy Tapasyananda: Srimad Bhagavad Gita, The Scripture of Mankind, Sri Ramakrishna
Math, Chennai.
3. Subrahmanyam, Korada: Vakyapadiyam of Bhartrhari Brahmakanda, Sri Garib Dass series.
4. Swami Lokeswarananda: Chandogya Upanishad, Swami Lokeswarananda, Ramakrishna
Mission Institute of Culture, Kolkata.
5. Brahma, Apuruseya: The Four Vedas: Translated in English.
6. Haich, Elizabeth: Sexual Energy and Yoga.
7. Bacon, Francis: Power as Knowledge
8. Vlastos, Gregory: Socrates Ironist and Moral Philosopher.
9. Plato: The Republic, Penguin.
10. Gutting, Garry: Foucault A Very Short Introduction, Oxford.
HU5177 APPLICATIONS OF PSYCHOLOGY IN EVERYDAY LIFE LTPC
3 003
UNIT I INTRODUCTION 7
Nature and fields.
TEXTBOOKS
1. Schultz, D. & Schultz, S.E. (2009). Psychology and Work Today (10th ed.). New
Jersey:Pearson/Prentice Hall
2. Butcher, J. N., Mineka, S., & Hooley, J. M. (2010). Abnormal psychology (14th ed.). New York:
Pearson
3. Gladding, S. T. (2014). Counselling: A comprehensive profession. New Delhi: Pearson Education
4. Aronson, E., Wilson, T. D., & Akert, R. M. (2010). Social Psychology (7th Ed.).Upper Saddle
River, NJ: Prentice Hall
HSMC– ELECTIVES – HUMANITIES II (EVEN SEMESTER)
Objectives
To familiarize students with the concepts of sex and gender through literary and media
texts.
To help students ask critical questions regarding gender roles in society.
To provide students with the material to discuss gender issues such as gender based
discrimination, violence and development.
To help students think critically about gender based problems and solutions.
Learning Outcomes
Students will be able to critically read literary and media texts and understand the
underlying gender perspectives in them.
Students will be able to analyse current social events in the light of gender perspectives.
Students will be able to discuss, analyse and argue about issues related to gender and
their impact on society, culture and development.
Texts:
1. Mahanagar (Movie: Satyajit Ray)
2. Beti Bachao Beti Padhao Advertisements
READINGS: Relevant additional texts for readings will be announced in the class. Classes will
consist of a combination of activities: dialogue-based lectures, discussions, collaborative learning
activities, group work and in-class assignments.
ASSESSMENT AND GRADING:
Discussion & Classroom Participation: 20%
Project/Assignment: 30%
End Term Exam: 50%
TOTAL:45 PERIODS
OUTCOMES:
On completion of the course, the students will be able to:
1. Enable students to understand the concept of contemporary ethics at different levels:
Individual, local and Global and enable them to cross examine the ethical and social
consequences of the decisions of their life-view and world view.
2. Develop the ability of students to create a balance between their individual freedom and
social responsibilities and enable them to identify the personal, professional and social
values and integrate them in their personality after cross examination.
3. Enable students to cross examine their earlier decisions taken in life and understand the
meaning of ethical dilemma to overcome the ethical dilemmas and engage in critical
reflection.
4. Develop positive habits of thought and conduct and work cohesively with fellow beings who
have variety of strengths, experiences, shortcomings and challenges, hence to enable them
to handle diverse type of personalities.
5. Enable students to develop a method for making ethically sound decisions for themselves,
within hostels, classrooms, university campus and society.
HU5273 LAW AND ENGINEERING LTPC
3 003
UNIT I THE LEGAL SYSTEM: SOURCES OF LAW AND THE COURT STRUCTURE 9
Enacted law -Acts of Parliament are of primary legislation, Common Law or Case law- Principles
taken from decisions of judges constitute binding legal rules. The Court System in India and Foreign
Courtiers. (District Court, District Consumer Forum, Tribunals, High Courts, Supreme Court)
Arbitration: As an alternative to resolving disputes in the normal courts, parties who are in dispute
can agree that this will instead be referred to arbitration.
UNIT II LAWS 9
Basic principles of contract law, sale of goods law, laws relating to industrial pollution,
accident, environmental protection, health and safety at work, patent law, constitutional law: the
supreme law of the land, Information technology law and cyber crimes.
TOTAL: 45 PERIODS
OBJECTIVES:
To help learners understand the various movie genres and its types.
To understand various elements that contributes to film making.
To make them realize the impact of film in society.
To analyse the visual media and interpret the underlying messages.
UNIT I THE COMPONENTS OF FILMS 9
Story, Screenplay & Script – Actors – Director – Crew Members – Mis En Scene – Structure of A
Film – Narrative Elements – Linear & Non-Linear – Types of Movie Genres: Mysteries, Romantic
Comedies, Horror Etc.
Teaching Methods
Each unit consists of reading materials, learning activities videos, websites. Students are
expected to watch movies sometimes in class and at times at home and discuss in class.
Evaluation
As this is course is critical appreciation course on films, there is no written end semester
examination. The course is more on learning how to critically analyse a movie and
appreciate its finer elements. Therefore evaluation can be based on assignments and
discussions. Internals marks can be taken for the total marks.
REFERENCES
1. A Biographical Dictionary of Film by David Thomson, Secker & Warburg, 1975
2. Signs and Meaning in the Cinema by Peter Wollen, Secker & Warburg, 1969
3. The World Viewed by Stanley Cavell 1971
4. Film Style and Technology: History and Analysis by Barry Salt, Starword, 1983
5. The Encyclopedia of Indian Cinema Edited by Ashish Rajadhyaksha and Paul Willemen,
BFI, 1994.
OBJECTIVES
To broadly introduce students to the formal and theoretical aspects of linguistics.
To enable learners to understand the various practical applications of language and recent
findings in the field of applied linguistics.
CONTENTS : -
UNIT I LANGUAGE AND LINGUISTICS: AN OVERVIEW 9
Language and Linguistics-Linguistic Knowledge-Knowledge of Sound Systems & Words – Creativity
of Language – Relationship of form and meaning. Grammar – descriptive, prescriptive,universal-
Human Language – Animal Language – Sign Language- Computers and Language.
TOTAL : 45 PERIODS
Teaching Methods :
Lectures, discussion.
UNIT I INTRODUCTION
Why study literature? Tracing the origin – pictures. Tokens as precursors of writing. Movement
from three dimensions to two dimensions- Pictography. From visual to oral -Logography. Reading
out literature to young children- Edmund J Farrell.
Reading list
1. Bond, Ruskin: ‘Night train at Deoli’
2. Ezekiel, Nissim: ‘ The Night of the Scorpion’
3. Afrika,Tatamkhulu: ‘Nothing’s Changed’
4. Barthes, Roland: Mythologies
5. Shankaracharya: Viveka Chudamani
6. Camus, Albert- The Myth of Sisyphus
7. Calvino, Italo: If on a winter’s night a traveler
8. Farrell, Edmund J: ‘Listen, my children, and you shall read’
OUTCOME
Can identify the connections among language, literature and culture.
Is able to relate between seemingly different aspects of life.
Understands the fractions in modern life and can assimilate meanings.
UNIT I INTRODUCTION 9
History of Making of the Indian Constitution-Drafting Committee- (Composition & Working) -
Philosophy of the Indian Constitution-Preamble-Salient Features
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
REFERENCES:
1. Chakroborty , S.K. “Values and Ethics for organizations Theory and practice”, Oxford
University Press ,New Delhi
OBJECTIVES:
Understand the methodology of pedagogy.
Compare pedagogical practices used by teachers in formal and informal classrooms in
developing countries.
Infer how can teacher education (curriculum and practicum) and the school curriculum and
guidance materials best support effective pedagogy.
Illustrate the factors necessary for professional development.
Identify the Research gaps in pedagogy.
Aims and rationale, Policy background, Conceptual framework and terminology - Theories of
learning, Curriculum, Teacher education - Conceptual framework, Research questions - Overview
of methodology and Searching.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
REFERENCES:
1. Ackers J, Hardman F (2001) Classroom interaction in Kenyan primary schools, Compare, 31
(2): 245-261.
2. Agrawal M (2004) Curricular reform in schools: The importance of evaluation, Journal of
Curriculum Studies, 36 (3): 361-379.
3. Akyeampong K (2003) Teacher training in Ghana - does it count? Multi-site teacher
education research project (MUSTER) country report 1. London: DFID.
4. Akyeampong K, Lussier K, Pryor J, Westbrook J (2013) Improving teaching and learning of
basic maths and reading in Africa: Does teacher preparation count? International Journal
Educational Development, 33 (3): 272–282.
5. Alexander RJ (2001) Culture and pedagogy: International comparisons in primary education.
Oxford and Boston: Blackwell.
OBJECTIVES:
Develop healthy mind in a healthy body thus improving social health also improve efficiency
Invent Do’s and Don’t’s in life through Yam
Categorize Do’s and Don’t’s in life through Niyam
Develop a healthy mind and body through Yog Asans
Invent breathing techniques through Pranayam
UNIT II YAM 9
Do`s and Don’t’s in life.
Shaucha, santosh, tapa, swadhyay, ishwarpranidhan
UNIT IV ASAN 9
Various yog poses and their benefits for mind & body
UNIT V PRANAYAM 9
Regularization of breathing techniques and its effects-Types of pranayam
TOTAL: 45PERIODS
COURSE OUTCOMES:
CO1 – Develop healthy mind in a healthy body thus improving social health also improve
efficiency
CO2 – Learn Do’s and Don’t’s in life through Yam
CO3 – Learn Do’s and Don’t’s in life through Niyam
CO4 – Develop a healthy mind and body through Yog Asans
CO5 – Learn breathing techniques through Pranayam
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
REFERENCES:
1. “Rajayoga or conquering the Internal Nature” by Swami Vivekananda, Advaita Ashrama
(Publication Department), Kolkata
2. ‘Yogic Asanas for Group Tarining-Part-I” : Janardan Swami Yogabhyasi Mandal, Nagpur
OBJECTIVES:
Develop basic personality skills holistically
Develop deep personality skills holistically to achieve happy goals
Rewrite the responsibilities
Reframe a person with stable mind, pleasing personality and determination
Discover wisdom in students
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
REFERENCES:
1. Gopinath,Rashtriya Sanskrit Sansthanam P, Bhartrihari’s Three Satakam , Niti-sringar-
vairagya, New Delhi,2010
2. Swami Swarupananda , Srimad Bhagavad Gita, Advaita Ashram,Publication Department,
Kolkata,2016.
AD5097 ESSENCE OF INDIAN KNOWLEDGE TRADITION LT PC
3 0 00
COURSE OBJECTIVES
The course will introduce the students to
get a knowledge about Indian Culture
Know Indian Languages and Literature religion and philosophy and the fine arts in
India
Explore the Science and Scientists of Ancient, Medieval and Modern India
Understand education systems in India
COURSE OUTCOMES
After successful completion of the course the students will be able to
Understand philosophy of Indian culture.
Distinguish the Indian languages and literature.
Learn the philosophy of ancient, medieval and modern India.
Acquire the information about the fine arts in India.
Know the contribution of scientists of different eras.
Understand education systems in India
REFERENCES:
1. Kapil Kapoor, “Text and Interpretation: The India Tradition”,ISBN: 81246033375, 2005
2. “Science in Samskrit”, Samskrita Bharti Publisher, ISBN 13: 978-8187276333, 2007
3. NCERT, “Position paper on Arts, Music, Dance and Theatre”, ISBN 81-7450 494-X, 200
4. Narain, “Examinations in ancient India”, Arya Book Depot, 1993
5. Satya Prakash, “Founders of Sciences in Ancient India”, Vijay Kumar Publisher, 1989
6. M. Hiriyanna, “Essentials of Indian Philosophy”, Motilal Banarsidass Publishers, ISBN 13:
978- 8120810990, 2014
UNITIII ‘ATTRUPPADAI’. 9
Attruppadai Literature–Attruppadai in‘Puranaanuru’-Attruppadaiin ‘Pathitru paththu’-
Attruppadai in ‘Paththu aattu’.
UNITIV ‘PURANAANURU’ 9
Puranaanuru on Good Administration, Ruler and Subjects–Emotion & its Effect in Puranaanuru.
REFERENCES:
1. Sivaraja Pillai,The Chronology of the Early Tamils,Sagwan Press,2018.
2. Hank Heifetz and George L. Hart, The Purananuru, Penguin Books,2002.
3. Kamil Zvelebil,The Smile of Murugan:On Tamil Literature of South India, Brill Academic
Pub,1997.
4. George L. Hart, Poets of theTamil Anthologies: Ancient Poems of Love and War,
Princeton University Press,2015.
5. Xavier S.Thani Nayagam, Land scape and poetry:a study of nature in classical
Tamil poetry, Asia Pub.House, 1967.
PO PSO
CO 1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 0.9 0.6
2 0.9 0.6
3 0.9 0.6
4 0.9 0.6
5 0.9 0.6