M.E. Bda 2021
M.E. Bda 2021
M.E. Bda 2021
1. An ability to independently carry out research / investigation and development work to solve
practical problems.
2. An ability to write and present a substantial technical report/document.
3. Students should be able to demonstrate a degree of mastery over the area as per the
specialization of the program. The mastery should be at a level higher than the
requirements in the appropriate bachelor program.
4. Understand the impact of big data for business decisions and strategy.
5. Gain hands-on experience on large-scale analytics tools to solve some open big data
problems.
6. Understand the concept and challenge of big data and the inadequacy of existing
technologies to analyze big data.
1
ANNA UNIVERSITY, CHENNAI
NON - AUTONOMOUS COLLEGES AFFILIATED ANNA UNIVERSITY
M.E. BIG DATA ANALYTICS
REGULATIONS – 2021
CHOICE BASED CREDIT SYSTEM
I TO IV SEMESTERS CURRICULA AND SYLLABI
SEMESTER I
PERIODS TOTAL
S. COURSE CATE-
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. MA4109 Applied Probability and Statistics FC 4 0 0 4 4
2. RM4151 Research Methodology and IPR RMC 2 0 0 2 2
Advanced Data Structures and
3. CP4151 PCC 3 0 0 3 3
Algorithms
4. BD4151 Foundations of Data Science PCC 3 0 0 3 3
5. CP4252 Machine Learning PCC 3 0 2 5 4
6. CP4152 Database Practices PCC 3 0 2 5 4
7. Audit Course – I* AC 2 0 0 2 0
PRACTICALS
Advanced Data Structures and
8. CP4161 PCC 0 0 4 4 2
Algorithms Laboratory
9. BD4111 Big Data Computing Laboratory PCC 0 0 2 2 1
TOTAL 20 0 10 30 23
*Audit course is optional
SEMESTER II
PERIODS TOTAL
S. COURSE CATE-
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. BD4201 Big Data Security PCC 3 0 0 3 3
2. BD4251 Big Data Mining and Analytics PCC 3 0 0 3 3
3. MP4251 Cloud Computing Technologies PCC 3 0 0 3 3
4. BD4202 Information Storage Management PCC 3 0 0 3 3
5. MP4151 Embedded Systems and IIOT PCC 3 0 2 5 4
6. Professional Elective I PEC 3 0 0 3 3
7. Audit Course – II* ACC 2 0 0 2 0
PRACTICALS
Big Data Mining And Analytics
8. BD4211 PCC 0 0 4 4 2
Laboratory
9. BD4212 Term Paper Writing and Seminar EEC 0 0 2 2 1
TOTAL 20 0 8 28 22
*Audit course is optional
2
SEMESTER III
PERIODS TOTAL
S. COURSE CATE-
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. Professional Elective II PEC 3 0 0 3 3
2. Professional Elective III PEC 3 0 0 3 3
3. Professional Elective IV PEC 3 0 0 3 3
4. Open Elective OEC 3 0 0 3 3
PRACTICALS
5. BD4311 Project Work I EEC 0 0 12 12 6
TOTAL 12 0 12 24 18
SEMESTER IV
PERIODS TOTAL
S. COURSE CATE-
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
PRACTICALS
1. BD4411 Project Work II EEC 0 0 24 24 12
TOTAL 0 0 24 24 12
PROFESSIONAL ELECTIVES
SEMESTER II, ELECTIVE I
PERIODS TOTAL
S. COURSE CATE-
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
High Performance Computing
1. BD4071 PEC 3 0 0 3 3
for Big Data
2. MP4094 Web Services and API Design PEC 3 0 0 3 3
Information Retrieval
3. CP4093 PEC 3 0 0 3 3
Techniques
4. CP4092 Data Visualization Techniques PEC 3 0 0 3 3
Principles of Supply Chain
5. BD4001 PEC 3 0 0 3 3
Management
6. BD4002 Computational Geometry PEC 3 0 0 3 3
3
SEMESTER III, ELECTIVE II
PERIODS TOTAL
S. COURSE CATE-
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. MP4093 Soft Computing Techniques PEC 3 0 0 3 3
Multimedia Communication
2. MU4152 PEC 3 0 0 3 3
Networks
Parallel and Distributed
3. BD4003 PEC 3 0 0 3 3
Computing
4. BD4091 Predictive Modeling PEC 3 0 0 3 3
5. BD4004 Image Processing and Analysis PEC 3 0 0 3 3
PERIODS PER
SL.
COURSE COURSE TITLE WEEK
NO CREDITS
CODE L T P
1. AX4091 English for Research Paper Writing 2 0 0 0
2. AX4092 Disaster Management 2 0 0 0
3. AX4093 Constitution of India 2 0 0 0
4. AX4094 நற் றமிழ் இலக்கியம் 2 0 0 0
4
FOUNDATION COURSES (FC)
S. COURSE PERIODS PER WEEK
COURSE TITLE CREDITS SEMESTER
NO CODE Lecture Tutorial Practical
1. Applied Probability and
MA4109 4 0 0 4 I
Statistics
5
SUMMARY
I II III IV
1. FC 04 00 00 00 04
2. PCC 17 18 00 00 35
3. PEC 00 03 09 00 12
4. RMC 02 00 00 00 02
5. OEC 00 00 03 00 03
6. EEC 00 01 06 12 19
7. Non Credit/Audit Course 00 00
8. TOTAL CREDIT 23 22 18 12 74
6
MA4109 APPLIED PROBABILITY AND STATISTICS L T P C
4 0 0 4
COURSE OBJECTIVES:
To compute probabilities and moments of standard distributions.
To gain knowledge about regression and correlation.
To provide the most appropriate estimator of the parameter in statistical inference.
To decide whether to accept or reject specific values of a parameter.
To understand many real-world problems fall naturally within the framework of multivariate
normal theory.
7
2. Dallas E. Johnson, “Applied Multivariate Methods for Data Analysis”, Thomson and
Duxbury press, 1998.
3. Gupta S.C. and Kapoor V.K.,” Fundamentals of Mathematical Statistics”,
12th Edition, Sultan and Sons, New Delhi, 2020.
4. Johnson, R.A., Miller, I and Freund J., "Miller and Freund’s Probability and Statistics for
Engineers ", 9th Edition, Pearson Education, Asia, 2016.
5. Richard A. Johnson and Dean W. Wichern, “Applied Multivariate Statistical Analysis”, 6th
Edition, Pearson Education, Asia, 2012.
UNIT V PATENTS 6
Patents – objectives and benefits of patent, Concept, features of patent, Inventive step,
Specification, Types of patent application, process E-filing, Examination of patent, Grant of patent,
Revocation, Equitable Assignments, Licences, Licensing of related patents, patent agents,
Registration of patent agents.
TOTAL : 30 PERIODS
REFERENCES:
1. Cooper Donald R, Schindler Pamela S and Sharma JK, “Business Research Methods”,
Tata McGraw Hill Education, 11e (2012).
2. Catherine J. Holland, “Intellectual property: Patents, Trademarks, Copyrights, Trade
Secrets”, Entrepreneur Press, 2007.
3. David Hunt, Long Nguyen, Matthew Rodgers, “Patent searching: tools &
techniques”, Wiley, 2007.
4. The Institute of Company Secretaries of India, Statutory body under an Act of parliament,
“Professional Programme Intellectual Property Rights, Law and practice”, September 2013.
8
CP4151 ADVANCED DATA STRUCTURES AND ALGORITHMS LT P C
3 0 0 3
COURSE OBJECTIVES:
To understand the usage of algorithms in computing
To learn and use hierarchical data structures and its operations
To learn the usage of graphs and its applications
To select and design data structures and algorithms that is appropriate for problems
To study about NP Completeness of problems.
REFERENCES:
1. S.Sridhar,” Design and Analysis of Algorithms”, Oxford University Press, 1st Edition, 2014.
2. Adam Drozdex, “Data Structures and algorithms in C++”, Cengage Learning, 4th Edition,
2013.
3. T.H. Cormen, C.E.Leiserson, R.L. Rivest and C.Stein, "Introduction to Algorithms", Prentice
Hall of India, 3rd Edition, 2012.
4. Mark Allen Weiss, “Data Structures and Algorithms in C++”, Pearson Education, 3rd Edition,
2009.
5. E. Horowitz, S. Sahni and S. Rajasekaran, “Fundamentals of Computer Algorithms”,
University Press, 2nd Edition, 2008.
6. Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman, “Data Structures and Algorithms”,
Pearson Education, Reprint 2006.
COURSE OBJECTIVES:
To apply fundamental algorithms to process data.
Learn to apply hypotheses and data into actionable predictions.
Document and transfer the results and effectively communicate the findings using
visualization techniques.
To learn statistical methods and machine learning algorithms required for Data Science.
To develop the fundamental knowledge and understand concepts to become a data
science professional.
10
manipulating objects – data distribution.
TOTAL : 45 PERIODS
COURSE OUTCOMES:
CO1: Obtain, clean/process and transform data.
CO2: Analyze and interpret data using an ethically responsible approach.
CO3: Use appropriate models of analysis, assess the quality of input, derive insight from
results, and investigate potential issues.
CO4: Apply computing theory, languages and algorithms, as well as mathematical and
statistical models, and the principles of optimization to appropriately formulate and use data
analyses.
CO5: Formulate and use appropriate models of data analysis to solve business-related
challenges.
REFERENCES
1. Nina Zumel, John Mount, “Practical Data Science with R”, Manning Publications, 2014.
2. Mark Gardener, “Beginning R - The Statistical Programming Language”, John Wiley &
Sons, Inc., 2012.
3. W. N. Venables, D. M. Smith and the R Core Team, “An Introduction to R”, 2013.
4. Tony Ojeda, Sean Patrick Murphy, Benjamin Bengfort, Abhijit Dasgupta, “Practical Data
Science Cookbook”, Packt Publishing Ltd., 2014.
5. Nathan Yau, “Visualize This: The FlowingData Guide to Design, Visualization, and
Statistics”, Wiley, 2011.
6. Boris Lublinsky, Kevin T. Smith, Alexey Yakubovich, “Professional Hadoop Solutions”,John
Wiley & Sons Inc., 2013.
11
UNIT I INTRODUCTION AND MATHEMATICAL FOUNDATIONS 9
What is Machine Learning? Need –History – Definitions – Applications - Advantages, Disadvantages
& Challenges -Types of Machine Learning Problems – Mathematical Foundations - Linear Algebra &
Analytical Geometry -Probability and Statistics- Bayesian Conditional Probability -Vector Calculus &
Optimization - Decision Theory - Information theory
12
the scikit-learn API and get comfortable with training/validation splits. Use California Housing
Dataset
4. In this exercise, you'll experiment with validation sets and test sets using the dataset. Split
a training set into a smaller training set and a validation set. Analyze deltas between training
set and validation set results. Test the trained model with a test set to determine whether your
trained model is overfitting. Detect and fix a common training problem.
5. Implement the k-means algorithm using https://archive.ics.uci.edu/ml/datasets/Codon+usage
dataset
6. Implement the Naïve Bayes Classifier using
https://archive.ics.uci.edu/ml/datasets/Gait+Classification dataset
7. Project - (in Pairs) Your project must implement one or more machine learning algorithms and
apply them to some data.
COURSE OUTCOMES:
Upon the completion of course, students will be able to
CO1: Understand and outline problems for each type of machine learning
CO2: Design a Decision tree and Random forest for an application
CO3: Implement Probabilistic Discriminative and Generative algorithms for an application and
analyze the results.
CO4: Use a tool to implement typical Clustering algorithms for different types of applications.
CO5: Design and implement an HMM for a Sequence Model type of application and identify
applications suitable for different types of Machine Learning with suitable justification.
TOTAL:75 PERIODS
REFERENCES
1. Stephen Marsland, “Machine Learning: An Algorithmic Perspective”, Chapman & Hall/CRC,
2nd Edition, 2014.
13
2. Kevin Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012
3. Ethem Alpaydin, “Introduction to Machine Learning”, Third Edition, Adaptive Computation and
Machine Learning Series, MIT Press, 2014
4. Tom M Mitchell, “Machine Learning”, McGraw Hill Education, 2013.
5. Peter Flach, “Machine Learning: The Art and Science of Algorithms that Make Sense of Data”,
First Edition, Cambridge University Press, 2012.
6. Shai Shalev-Shwartz and Shai Ben-David, “Understanding Machine Learning: From Theory to
Algorithms”, Cambridge University Press, 2015
7. Christopher Bishop, “Pattern Recognition and Machine Learning”, Springer, 2007.
8. Hal Daumé III, “A Course in Machine Learning”, 2017 (freely available online)
9. Trevor Hastie, Robert Tibshirani, Jerome Friedman, “The Elements of Statistical Learning”,
Springer, 2009 (freely available online)
10. Aurélien Géron , Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts,
Tools, and Techniques to Build Intelligent Systems 2nd Edition, o'reilly, (2017)
14
UNIT II DISTRIBUTED DATABASES, ACTIVE DATABASES AND OPEN DATABASE
CONNECTIVITY 15
Distributed Database Architecture – Distributed Data Storage – Distributed Transactions –
Distributed Query Processing – Distributed Transaction Management – Event Condition Action
Model – Design and Implementation Issues for Active Databases – Open Database Connectivity.
Suggested Activities:
Distributed Database Design and Implementation
Row Level and Statement Level Triggers
Accessing a Relational Database using PHP, Python and R
TOTAL : 75 PERIODS
COURSE OUTCOMES
At the end of the course, the students will be able to
15
Convert the ER-model to relational tables, populate relational database and formulate SQL
queries on data.
Understand and write well-formed XML documents
Be able to apply methods and techniques for distributed query processing.
Design and Implement secure database systems.
Use the data control, definition, and manipulation languages of the NoSQL databases
REFERENCES:
1. R. Elmasri, S.B. Navathe, “Fundamentals of Database Systems”, Seventh Edition, Pearson
Education 2016.
2. Henry F. Korth, Abraham Silberschatz, S. Sudharshan, “Database System Concepts”,
Seventh Edition, McGraw Hill, 2019.
3. C.J.Date, A.Kannan, S.Swamynathan, “An Introduction to Database Systems, Eighth
Edition, Pearson Education, 2006
4. Raghu Ramakrishnan , Johannes Gehrke “Database Management Systems”, Fourth
Edition, McGraw Hill Education, 2015.
5. Harrison, Guy, “Next Generation Databases, NoSQL and Big Data” , First Edition, Apress
publishers, 2015
6. Thomas Cannolly and Carolyn Begg, “Database Systems, A Practical Approach to Design,
Implementation and Management”, Sixth Edition, Pearson Education, 2015
LIST OF EXPERIMENTS:
1. Implementation of recursive function for tree traversal and Fibonacci
2. Implementation of iteration function for tree traversal and Fibonacci
3. Implementation of Merge Sort and Quick Sort
4. Implementation of a Binary Search Tree
5. Red-Black Tree Implementation
6. Heap Implementation
7. Fibonacci Heap Implementation
8. Graph Traversals
9. Spanning Tree Implementation
10. Shortest Path Algorithms (Dijkstra's algorithm, Bellman Ford Algorithm)
11. Implementation of Matrix Chain Multiplication
12. Activity Selection and Huffman Coding Implementation
16
HARDWARE/SOFTWARE REQUIREMENTS
1. 64-bit Open source Linux or its derivative
2. Open Source C++ Programming tool like G++/GCC
TOTAL : 60 PERIODS
COURSE OUTCOMES:
CO1: Design and implement basic and advanced data structures extensively
CO2: Design algorithms using graph structures
CO3: Design and develop efficient algorithms with minimum complexity using design techniques
CO4: Develop programs using various algorithms.
CO5: Choose appropriate data structures and algorithms, understand the ADT/libraries, and use it
to design algorithms for a specific problem.
REFERENCES:
1. Lipschutz Seymour, “Data Structures Schaum's Outlines Series”, Tata McGraw Hill, 3rd
Edition, 2014.
2. Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman, “Data Structures and Algorithms”,
Pearson Education, Reprint 2006.
3. http://www.coursera.org/specializations/data-structures-algorithms
4. http://www.tutorialspoint.com/data_structures_algorithms
5. http://www.geeksforgeeks.org/data-structures/
LIST OF EXPERIMENTS:
1. Set up a pseudo-distributed, single-node Hadoop cluster backed by the Hadoop Distributed File
System, running on Ubuntu Linux. After successful installation on one node, configuration of a
multi-node Hadoop cluster (one master and multiple slaves).
2. MapReduce application for word counting on Hadoop cluster.
3. Unstructured data into NoSQL data and do all operations such as NoSQL query with API.
4. K-means clustering using map reduce.
5. Page Rank Computation.
6. Mahout machine learning library to facilitate the knowledge build up in big data analysis.
7. Application of Recommendation Systems using Hadoop/mahout libraries.
17
HARDWARE/SOFTWARE REQUIREMENTS
1. Java
2. Hadoop
3. Mahout
4. HBase/MongoDB
COURSE OUTCOMES:
CO1: Set up single and multi-node Hadoop Clusters.
CO2: Apply Map Reduce technique for various algorithms.
CO3: Design new algorithms that use Map Reduce to apply on Unstructured and structured data.
CO4: Develop Scalable machine learning algorithms for various Big data applications using Mahout.
CO5: Represent NoSQL data.
TOTAL: 30 PERIODS
REFERENCES:
1. Kristina Chodorow, “MongoDB: The Definitive Guide – Powerful and Scalable Data Storage”,
O'Reilly, 3rd Edition, 2019.
2. Lars George, “HBase: The Definitive Guide”, O'Reilly, 2015.
3. Tom White, “Hadoop: The Definitive Guide – Storage and Analysis at Internet Scale”, O'Reilly,
4th Edition, 2015.
4. Robin Anil, Sean Owen, Ellen G. Friedman, Ted Dunning, “Mahout in Action”, Manning
Publications, 2011.
18
UNIT V SECURITY ANALYTICS II 9
Access Analytics – Security Analysis with Text Mining – Security Intelligence – Security Breaches.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
After the completion of this course, students will be able to
CO1: Design algorithms in a secure manner for Big data applications
CO2: Use available security practices in big-data analytics.
CO3: Understand Mathematical foundations of security principles and different aspects of
encryption techniques.
CO4: Explain the role played by authentication in security.
CO5: Analyze and find solutions for Security concerns of big-data.
REFERENCES
WEB REFERENCES:
1. http://www.smartercomputingblog.com/category/big-data/
2. https://www.rd-alliance.org/group/big-data-ig-data-security-and-trust-wg/wiki/big-data-
security-issues-challenges-tech-concerns
ONLINE RESOURCES:
1. https://www.tutorialspoint.com/big_data_tutorials.htm
2. https://www.simplilearn.com/tutorials/big-data-tutorial
19
UNIT I DATA MINING AND LARGE SCALE FILES 9
Introduction to Statistical modeling – Machine Learning – Computational approaches to modeling –
Summarization – Feature Extraction – Statistical Limits on Data Mining - Distributed File Systems –
Map-reduce – Algorithms using Map Reduce – Efficiency of Cluster Computing Techniques.
UNIT V CLUSTERING 9
Introduction to Clustering Techniques – Hierarchical Clustering –Algorithms – K-Means – CURE –
Clustering in Non -– Euclidean Spaces – Streams and Parallelism – Case Study: Advertising on
the Web – Recommendation Systems.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
REFERENCES:
1. Jure Leskovec, AnandRajaraman, Jeffrey David Ullman, “Mining of Massive Datasets”,
Cambridge University Press, 3rd Edition, 2020.
2. Jiawei Han, MichelineKamber, Jian Pei, “Data Mining Concepts and Techniques”, Morgan
Kaufman Publications, Third Edition, 2012.
3. Ian H.Witten, Eibe Frank “Data Mining – Practical Machine Learning Tools and Techniques”,
Morgan Kaufman Publications, Third Edition, 2011.
4. David Hand, HeikkiMannila and Padhraic Smyth, “Principles of Data Mining”, MIT PRESS,
2001
WEB REFERENCES:
1. https://swayam.gov.in/nd2_arp19_ap60/preview
2. https://nptel.ac.in/content/storage2/nptel_data3/html/mhrd/ict/text/106104189/lec1.pdf
ONLINE RESOURCES:
1. https://examupdates.in/big-data-analytics/
2. https://www.tutorialspoint.com/big_data_analytics/index.htm
3. https://www.tutorialspoint.com/data_mining/index.htm
20
MP4251 CLOUD COMPUTING TECHNOLOGIES LT PC
3 0 03
COURSE OBJECTIVES:
To gain expertise in Virtualization, Virtual Machines and deploy practical virtualization
solution
To understand the architecture, infrastructure and delivery models of cloud computing.
To explore the roster of AWS services and illustrate the way to make applications in AWS
To gain knowledge in the working of Windows Azure and Storage services offered by
Windows Azure
To develop the cloud application using various programming model of Hadoop and Aneka
21
COURSE OUTCOMES:
CO1: Employ the concepts of virtualization in the cloud computing
CO2: Identify the architecture, infrastructure and delivery models of cloud computing
CO3: Develop the Cloud Application in AWS platform
CO4: Apply the concepts of Windows Azure to design Cloud Application
CO5: Develop services using various Cloud computing programming models.
TOTAL: 45 PERIODS
REFERENCES
1. Bernard Golden, Amazon Web Service for Dummies, John Wiley & Sons, 2013.
2. Raoul Alongi, AWS: The Most Complete Guide to Amazon Web Service from Beginner to
Advanced Level, Amazon Asia- Pacific Holdings Private Limited, 2019.
3. Sriram Krishnan, Programming: Windows Azure, O’Reilly,2010.
4. Rajkumar Buyya, Christian Vacchiola, S.Thamarai Selvi, Mastering Cloud Computing ,
MCGraw Hill Education (India) Pvt. Ltd., 2013.
5. Danielle Ruest, Nelson Ruest, ―Virtualization: A Beginner‟s Guide‖, McGraw-Hill Osborne
Media, 2009.
6. Jim Smith, Ravi Nair , "Virtual Machines: Versatile Platforms for Systems and Processes",
Elsevier/Morgan Kaufmann, 2005.
7. John W.Rittinghouse and James F.Ransome, "Cloud Computing:
Implementation, Management, and Security", CRC Press, 2010.
8. Toby Velte, Anthony Velte, Robert Elsenpeter, "Cloud Computing, A Practical Approach",
McGraw-Hill Osborne Media, 2009.
22
UNIT III INTRODUCTION TO NETWORKED STORAGE 9
Evolution of networked storage - Architecture - Components - Topologies of FC-SAN - NAS - IP-
SAN - Benefits of the different networked storage options - Understand the need for long-Term
archiving solutions - Describe how CAS fulfill the need - Understand the appropriateness - Different
networked storage options - Different application environments.
List reasons for planned or unplanned outages - Impact of downtime - Business continuity (BC) -
Disaster recovery (DR) - RTO - RPO - Identify single points of failure - List solutions to mitigate
failures - Architecture of backup/recovery - Different backup or recovery topologies - Replication
technologies - Role in ensuring information availability and business continuity - Remote replication
technologies - Role in providing disaster recovery and business continuity capabilities - Identify key
areas to monitor in a data center - Industry standards for data center monitoring and management
- Key metrics - Key management tasks.
Information security - Critical security attributes - Storage security domains - List and analyze the
common threats in each domain - Virtualization technologies - Block-level and file-level
virtualization technologies and processes.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the student should be able to:
CO1: Understand the basics of storage management for Information maintenance.
CO2: Study the requirements and strategies for the data center.
CO3: Learn various storage technologies for the required application.
CO4: Apply security measures to the data center.
CO5: Analyze Quality of Service in Storage.
REFERENCES:
1. EMC Corporation, "Information Storage and Management: Storing, Managing, and
Protecting Digital Information", 2nd Edition, Wiley, India, 2012.
2. Marc Farley, “Building Storage Networks”, Tata McGraw Hill” ,Osborne, 2001.
3. Ulf Troppens, Rainer Erkens, Wolfgang Muller-Friedt, Rainer Wolafka, Nils Haustein,
“Storage Networks Explained: Basics and Application of Fibre Channel SAN, NAS, ISCSI,
InfiniBand and FCoE”, Wiley, 2015.
4. Robert Spalding, “Storage Networks: The Complete Reference”, Tata McGraw Hill , 2017.
WEB REFERENCES:
1. https://nptel.ac.in/courses/106108058/.
ONLINE RESOURCES:
2. https://dokumen.tips/engineering/cp7029-information-storage-management-notes-
58f9ada4e0e17.html.
23
MP4151 EMBEDDED SYSTEMS AND IIOT LT PC
3 02 4
COURSE OBJECTIVES:
To learn the internal architecture of an embedded processor including timers and
interrupts.
To learn and use embedded C programming.
To provide exposure on architecture and components of IIOT.
To introduce the communication protocols of IIOT.
To study about visualization and data processing of IIOT.
TOTAL: 45 PERIODS
SUGGESTED ACTIVITIES:
1. A Study on the various embedded processors like virtual watches, PDAS, digital
cameras, mp3 players
2. Develop an application using embedded C programming in arduino
3. Build a project using IIOT components
4. Study of communication protocols and technology in IIOT
5. Presentation on most prominent IIOT visualization tools
24
PRACTICAL EXERCISES:
1. Experiments on Arduino, ESp8266, raspberry Pi
2. Measurement of temperature & pressure values of the process using raspberry pi/node
mcu.
3. Modules and Sensors Interfacing (IR sensor, Ultrasonic sensors, Soil moisture sensor)
using Raspberry pi/node mcu.
4. Modules and Actuators Interfacing (Relay, Motor, Buzzer) using Raspberry pi/node mcu.
5. Demonstration of MQTT communication
6. Demonstration of LoRa communication.
TOTAL: 30 PERIODS
HARDWARE/SOFTWARE REQUIREMENTS
1. Arduino
2. ESp8266
3. Raspberry Pi
COURSE OUTCOMES:
CO1: Describe the internal architecture of an embedded processor including timers and
interrupts.
CO2: Write the embedded C programming.
CO3: Use the components of IIOT for building applications.
CO4: Demonstrate and perform the communication by using the protocols.
CO5: Explain about visualization and data processing of IIOT.
TOTAL: 75 PERIODS
REFERENCES:
1. Michael J. Pont, "Embedded C", Pearson Education, 2007.
2. Muhammed Ali Mazidi, Janice Gillispie Mazidi, Rolin D. McKinlay, "The 8051
Microcontroller and Embedded Systems", Pearson Education, Second Edition, 2014.
3. Mahmood, Zaigham(Ed), “The Internet of Things in the Industrial Sector”, Springer
Publication, 2019.
4. Sabina Jeschke, Christian Brecher, Houbing Song, Danda B. Rawat, “Industrial Internet
of Things: Cyber manufacturing System (wireless Technology)”, Springer Publication,
2017.
5. Hakima Chaouchi, “The Internet of Things Connecting Objects to the Web” ISBN: 978-1-
84821-140-7, Willy Publications, 2010.
6. Robert Barton, Patrick Grossetete, David Hanes, Jerome Henry, Gonzalo Salgueiro, "loT
Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of
Things", CISCO Press, 2017.
7. Ismail Butun, “Industrial IoT Challenges, Design Principles, Applications, and Security”,
Springer Publications, 2020.
8. Wayne Wolf, "Computers as Components: Principles of Embedded Computer System
Design", Elsevier, 2006.
9. David Etter, “IOT (Internet of Things) Programming: A Simple and Fast Way of Learning,
IOT”, 2016.
10. Olivier Hersent, David Boswarthick, Omar Elloumi, The Internet of Things: Key
Applications and Protocols, ISBN: 978-1-119-99435-0, 2 nd Edition, Willy Publications.
11. Daniel Minoli, “Building the Internet of Things with IPv6 and MIPv6: The Evolving World
of M2M Communications”, ISBN: 978-1-118-47347-4, Willy Publications.
25
BD4211 BIG DATA MINING AND ANALYTICS LABORATORY L T PC
0 0 4 2
COURSE OBJECTIVES:
To learn to process big data using Hadoop framework and MapReduce.
To analyze big data using classification and clustering techniques.
To realize storage of big data using MongoDB and Hbase.
To develop big data applications for streaming data using Apache Spark.
LIST OF EXPERIMENTS:
1. Install, configure and run Hadoop and HDFS.
2. Implement word count / frequency programs using MapReduce(MR).
3. Implement an MR program that processes a weather dataset.
4. Implement SVM and clustering techniques using R.
5. Visualize data using any plotting framework.
6. Implement an application that stores big data in Hbase / MongoDB using Hadoop / R.
7. Install, deploy and configure Apache Spark cluster. Run an application using Apache
Spark.
TOTAL: 60 PERIODS
LAB REQUIREMENTS FOR A BATCH OF 30 STUDENTS
SOFTWARE
Hadoop, R Package, Hbase, MongoDB, Apache Spark
COURSE OUTCOMES:
Upon completion of this course, the students will be able to
CO1: Process big data using Hadoop framework.
CO2: Implement MapReduce framework for processing big data.
CO3: Perform data analysis using classification and clustering techniques.
CO4: Realize storage of big data using MongoDB , Hbase and Apache Spark
CO5: Perform graphical data analysis
In this course, students will develop their scientific and technical reading and writing skills that they
need to understand and construct research articles. A term paper requires a student to obtain
information from a variety of sources (i.e., Journals, dictionaries, reference books) and then place it
in logically developed ideas. The work involves the following steps:
Please keep a file where the work carried out by you is maintained.
Activities to be carried out
27
to each other and to your topic area
(classification scheme/categorization)
Mark in the hard copy of
papers whether complete work or
section/sections of the paper are
being considered
28
Reading and Repeat Reading Paper Process 7th week 8%
notes for final 5 ( the table given
papers should indicate
your
understanding
of the paper
and the
evaluation is
based on your
conclusions
about each
paper)
Draft outline 1 Prepare a draft Outline, your survey 8th week 8%
and Linking goals, along with a classification / ( this
papers categorization diagram component will
be evaluated
based on the
linking and
classification
among the
papers)
Abstract Prepare a draft abstract and give a 9th week 6%
presentation (Clarity,
purpose and
conclusion)
6%
Presentation &
Viva Voce
Introduction Write an introduction and background 10th week 5%
Background sections ( clarity)
Sections of the Write the sections of your paper 11thweek 10%
paper based on the classification / (this component
categorization diagram in keeping with will be
the goals of your survey evaluated
based on the
linking and
classification
among the
papers)
Your conclusions Write your conclusions and future 12th week 5% (
work conclusions –
clarity and your
ideas)
Final Draft Complete the final draft of your paper 13th week 10%
(formatting,
English, Clarity
and linking)
4% Plagiarism
29
Check Report
Seminar A brief 15 slides on your paper 14th & 15th week 10%
(based on
presentation
and Viva-voce)
TOTAL: 30 PERIODS
UNIT I INTRODUCTION 9
The Emerging IT Trends- IOT/IOE-Apache Hadoop for big data analytics-Big data into big insights
and actions – Emergence of BDA discipline – strategic implications of big data – BDA Challenges –
HPC paradigms – Cluster computing – Grid Computing – Cloud computing – Heterogeneous
computing – Mainframes for HPC - Supercomputing for BDA – Appliances for BDA.
30
UNIT V EMERGING BIG DATA APPLICATIONS 9
Deep learning Accelerators – Accelerators for clustering applications in machine learning -
Accelerators for classification algorithms in machine learning – Accelerators for Big data Genome
Sequencing
TOTAL: 45 PERIODS
COURSE OUTCOMES:
Upon completion of the course, the student should be able to:
CO1: Understand the basics concepts of High Performance computing systems.
CO2: Apply the concepts of network and software infrastructure for high performance computing
CO3: Use real time analytics using high performance computing.
CO4: Apply the security models and big data applications in high performance computing
CO5: Understand the emerging big data applications.
REFERENCES:
1. Pethuru Raj, Anupama Raman, Dhivya Nagaraj and Siddhartha Duggirala, "High-
Performance Big-Data Analytics: Computing Systems and Approaches", Springer, 1st
Edition, 2015.
2. "Big Data Management and Processing", Kuan-Ching Li , Hai Jiang, Albert Y. Zomaya,
CRC Press,1st Edition,2017.
3. "High Performance Computing for Big Data: Methodologies and Applications", Chao
wang ,CRC Press,1st Edition,2018
4. "High-Performance Data Mining And Big Data Analytics" , Khosrow Hassibi, Create
Space Independent Publishing Platform,!st Edition,2014
5. "High performance computing: Modern systems and practices", Thomas Sterling,
Matthew Anderson, Morgan Kaufmann publishers,1st Edition,2017
WEB REFERENCES:
1. https://www.hpcwire.com/
ONLINE RESOURCES:
1. http://hpc.fs.uni-lj.si/sites/default/files/HPC_for_dummies.pdf
2. https://www.nics.tennessee.edu/computing-resources/what-is-hpc
31
UNIT II WEB SERVICE BUILDING BLOCKS 9
Introduction to SOAP: SOAP Syntax- Sending SOAP Messages - SOAP Implementations -
Introduction to WSDL: WSDL Syntax - SOAP Binding - WSDL Implementations - Introduction to
UDDI: The UDDI API - Implementations - The Future of UDDI
COURSE OUTCOMES:
CO1: Explain how to write XML documents.
CO2: Apply the web service building blocks such as SOAP, WSDL and UDDI
CO3: Describe the RESTful web services.
CO4: Implement the RESTful web service with Spring Boot MVC
CO5: Discuss Resource-oriented Architecture.
TOTAL: 45 PERIODS
REFERENCES
1. Leonard Richardson and Sam Ruby, RESTful Web Services, O’Reilly Media, 2007
2. McGovern, et al., "Java Web Services Architecture", Morgan Kaufmann Publishers,2005.
3. Lindsay Bassett, Introduction to JavaScript Object Notation, O’Reilly Media, 2015
4. Craig Walls, “Spring in Action, Fifth Edition”, Manning Publications, 2018
5. Raja CSP Raman, Ludovic Dewailly, “Building A RESTful Web Service with Spring 5”,
Packt Publishing, 2018 .
6. Bogunuva Mohanram Balachandar, “Restful Java Web Services, Third Edition: A pragmatic
guide to designing and building RESTful APIs using Java”, Ingram short title, 3rd Edition,
2017.
7. Mario-Leander Reimer, “Building RESTful Web Services with Java EE 8: Create modern
RESTful web services with the Java EE 8 API”, Packt publishing, 2018.
32
CP4093 INFORMATION RETRIEVAL TECHNIQUES LT P C
3 0 0 3
COURSE OBJECTIVES:
To understand the basics of information retrieval with pertinence to modeling, query
operations and indexing
To get an understanding of machine learning techniques for text classification
and clustering.
To understand the various applications of information retrieval giving emphasis
to multimedia IR, web search
To get an understanding of machine learning techniques for text classification
and clustering.
To understand the concepts of digital libraries
UNIT II MODELING 9
Taxonomy and Characterization of IR Models – Boolean Model – Vector Model - Term Weighting –
Scoring and Ranking –Language Models – Set Theoretic Models - Probabilistic Models – Algebraic
Models – Structured Text Retrieval Models – Models for Browsing
COURSE OUTCOMES:
CO1: Build an Information Retrieval system using the available tools.
CO2: Identify and design the various components of an Information Retrieval system.
CO3: Categorize the different types of IR Models.
CO4: Apply machine learning techniques to text classification and clustering which is
used for efficient Information Retrieval.
CO5: Design an efficient search engine and analyze the Web content structure.
33
TOTAL: 45 PERIODS
REFERENCES
1. Christopher D. Manning, Prabhakar Raghavan, Hinrich Schutze, “Introduction to
Information Retrieval, Cambridge University Press, First South Asian Edition, 2008.
2. Stefan Buttcher, Implementing and Evaluating Search Engines, The MIT Press, Cambridge,
Massachusetts London, England, 2016.
3. Ricardo Baeza – Yates, Berthier Ribeiro – Neto, “Modern Information Retrieval: The
concepts and Technology behind Search (ACM Press Books), Second Edition, 2011.
4. Stefan Buttcher, Charles L. A. Clarke, Gordon V. Cormack, “Information Retrieval
34
UNIT V RESEARCH DIRECTIONS IN VISUALIZATIONS 9
Steps in designing Visualizations – Problems in designing effective Visualizations- Issues of Data.
Issues of Cognition, Perception, and Reasoning. Issues of System Design Evaluation , Hardware
and Applications
COURSE OUTCOMES:
CO1: Visualize the objects in different dimensions.
CO2: Design and process the data for Visualization.
CO3: Apply the visualization techniques in physical sciences, computer science, applied
mathematics and medical sciences.
CO4: Apply the virtualization techniques for research projects.
CO5: Identify appropriate data visualization techniques given particular requirements imposed by
the data.
TOTAL: 45 PERIODS
REFERENCES
1. Matthew Ward, Georges Grinstein and Daniel Keim, “Interactive Data Visualization
Foundations, Techniques, Applications”, 2010.
2. Colin Ware, “Information Visualization Perception for Design”, 4th edition, Morgan
Kaufmann Publishers, 2021.
3. Robert Spence “Information visualization – Design for interaction”, Pearson Education, 2nd
Edition, 2007.
4. Alexandru C. Telea, “Data Visualization: Principles and Practice,” A. K. Peters Ltd, 2008.
COURSE OBJECTIVES:
To analyze the supply chain scenario in India and its enabling factors.
To make students to get insights on supply chain process from sourcing to distribution.
To enhance the skills on supply chain integration and sustainable supply chain strategies
among the students.
To build knowledge in students to take care of any kinds of supply chain assignments in
business organizations.
UNIT I INTRODUCTION 9
Role of Logistics and Supply chain Management: Scope and Importance- Evolution of Supply
Chain - Decision Phases in Supply Chain - Competitive and Supply chain Strategies – Drivers of
Supply Chain Performance and Obstacles.
35
UNIT III LOGISTICS IN SUPPLY CHAIN 9
Role of transportation in supply chain – factors affecting transportations decision – Design option
for transportation network – Tailored transportation – Routing and scheduling in transportation.
COURSE OUTCOME:
Upon completion of the course, the student should be able to:
CO1:Understand the framework and scope of supply chain management.
CO2:Build and manage a competitive supply chain using strategies, models, techniques and
information technology.
CO3:Analyze the logistics in supply chain
CO4:Plan the demand, inventory and supply and optimize supply chain Network
CO5:Evaluate the impact of IT on the Supply chain.
REFERENCES:
1. Sunil Chopra, Peter Meindl and Kalra, “Supply Chain Management, Strategy, Planning, and
Operation”, Pearson Education,6th edition, 2015.
2. Jeremy F.Shapiro, “Modeling the Supply Chain”, Thomson Duxbury,2nd edition, 2006
3. David J.Bloomberg , Stephen Lemay and Joe B.Hanna, “Logistics”, PHI, 2002.
4. James B.Ayers, “Handbook of Supply Chain Management '', St.Lucie press,2nd edition,
2006.
UNIT I INTRODUCTION 9
Introduction – Application Domains – Line Segment Intersection – Intersection of Convex Polygons
– Polygon Triangulation.
36
UNIT III CONVEX HULL PROBLEM 9
Convex hull Problem – Preliminaries – Convex Hull Algorithms in the Plane – Graham‟s scan -
Jarvis’s March – Quick Hull – Divide-and-conquer – Dynamic Convex Hull Maintenance –
Delaunay Triangulation.
COURSE OUTCOMES:
Upon completion of this course, the student should be able to
CO1:Transform problems in different applications to geometric problems
CO2: Use algorithms and techniques to solve search and point location problems
CO3: Understand and solve the complex hull problem
CO4: Solve proximity problems using various techniques
CO5: Use the appropriate and relevant, fundamental and applied computational knowledge,
methodologies and modern tools in solving real -world problems.
REFERENCES:
1. Dr. Kalyanrao Takale , Dr. Shrikisan Gaikwad , Dr. Mrs. Nivedita Mahajan , Dr. Amjad
Shaikh , Prof. Mrs. Shamal Deshmukh , Prof. S.R. Patil,1st Edition,,”Computational
Geometry”,2021.
2. David Mount,CMSC 754: Computational Geometry, 2021.Lecture notes from his
Fall 2021 computational geometry course at Maryland.
3. Herbert Edelsbrunner, “Algorithms in Combinatorial Geometry, EATCS Monographs in
Computer Science”, Springer Verlag, 2011.
WEB REFRENCES:
1. https://nptel.ac.in/courses/106/102/106102011/
2. https://ocw.mit.edu/courses/mechanical-engineering/2-158j-computational-geometry-
spring-2003/
ONLINE RESOURCES:
1. https://www.hackerearth.com/practice/notes/computational-geometry-i-1/
2. https://algorithmtutor.com/Computational-Geometry/
37
MP4093 SOFT COMPUTING TECHNIQUES LTPC
3 003
COURSE OBJECTIVES:
38
COURSE OUTCOMES:
After completion of the course, the student will be able to:
CO1: Apply various soft computing concepts for practical applications
CO2: Choose and design suitable neural network for real time problems
CO3: Use fuzzy logic rules and reasoning to handle uncertainty and develop decision making and
expert system
CO4: Describe the importance of genetic algorithms for solving combinatorial optimization
problems
CO5: Analysis the various hybrid soft computing techniques and apply in real time problems
TOTAL: 45 PERIODS
REFERENCES:
1. S.N. Sivanandam, S.N. Deepa, “Principles of Soft Computing”, Wiley, Second Edition, 2011.
2. S. Rajasekaran, G.A.V Vijayalakshmi Pai, “Neural Networks, Fuzzy Systems and Evolutionary
Algorithms: Synthesis and Applications” Prentice Hall, Second Edition, 2017.
3. Timothy J. Ross, “Fuzzy Logic with Engineering Applications, 4th Edition, Wiley, 2016.
4. David E. Goldberg, Genetic Algorithm in Search Optimization and Machine Learning Pearson
Education India, 2013.
5. Simon Haykin, Neural Networks Comprehensive Foundation Third Edition, Pearson Education,
.2016.
6. James A. Freeman, David M. Skapura, Neural Networks Algorithms, Applications, and
Programming Techniques, Pearson Education India, 2011.
7. J. -S. R. Jang, C.-T. Sun, E. Mizutani, “Neuro Fuzzy and Soft Computing: A Computational
Approach to Learning and Machine Intelligence, Pearson, 2015.
UNIT I INTRODUCTION 9
Switched Networks and Shared media Networks – Circuit Switching, Packet Switching and Virtual
Circuits – Flow Control and Congestion Control – TCP/IP reference model – Network Externalities
– Service Integration – Elastic and Inelastic Traffic – Playback Applications – Additional
Requirements For Inelastic Traffic – Core Networks And Access/Edge Networks.
Suggested Activities:
Flipped classroom on network externalities and Economies of scale.
External learning – Inter-continental backbone network and Autonomous Systems model of
the Internet.
Assignments on computing the playout time of packets.
39
Suggested Evaluation Methods:
Quiz and discussion on network externalities and economies of scale.
Assignments on proprietary protocols used in IoT and M2M.
Assignments on problems related to playout time of multimedia applications.
Suggested Activities:
Flipped classroom on IntServ and DiffServ networks.
External learning – Exploring the ways of using DSCP in IP header.
Assignments on finish time problems related to WFQ and its variants.
Suggested Activities:
External learning – Exploring various media players available and the ways to customize
them.
Exploring the ways to configure RTP.
Flipped classroom on RTP and RTCP.
40
Suggested Activities:
Flipped classroom on IMSVoLTE architecture.
External learning – Multimedia support in 5G networks.
Analyzing the protocols of IP media subsystem.
Suggested Activities:
Flipped classroom on SCIBus and S.100.
External learning – Multimedia access networks and edge networks.
Exploring the ways to configure SIP.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
On completion of the course, the students will be able to:
CO1:Deploy the right multimedia communication models.
CO2:Apply QoS to multimedia network applications at the network level with efficient scheduling
and routing techniques.
CO3:Apply QoS to multimedia network applications at the end system level with efficient
scheduling and routing techniques.
CO4:Understand IP multimedia subsystem and IP initiatives in cellular networks to support
multimedia traffic.
CO5:Design and implement VoIP based solutions for multimedia transport.
CO6:Develop the real-time multimedia network applications.
REFERENCES:
1. Mario Marques da Silva, “Multimedia Communications and Networking”, CRC Press, 2012
2. K. R. Rao, Zoron S. Bojkovic, Bojan M. Bakmaz, “Wireless Multimedia Communication
Systems: Design, Analysis and Implementation”, CRC Press, 2017
3. Jim Kurose, Keith Ross, “Computer Networking: A Top Down Approach”, Pearson
Education, 2017
4. K. R. Rao, Zoran S. Bojkovic, Dragorad A. Milovanovic, “Introduction to Multimedia
Communications Applications, Middleware, Networking”, John Wiley and Sons, 2009
41
BD4003 PARALLEL AND DISTRIBUTED COMPUTING LTPC
3 003
COURSE OBJECTIVES:
To select the appropriate parallel programming model for the given application.
To practice the constructs of a parallel programming model to convert a sequential program
to parallel program.
To develop parallel programs using Open MP and MPI constructs.
To study software components of distributed computing systems. Know about the
communication and interconnection architecture of multiple computer systems.
To recognize the inherent difficulties that arise due to distributedness of computing
resources.
To understand the concepts of networks & protocols, mobile & wireless computing and their
applications in solving real world problems.
UNIT I FUNDAMENTALS 9
Introduction to Parallel and Distributed Computing - Parallel and Distributed Architectures, Socket
programming - Parallel Performance, Shared Memory and Threads – Parallel Algorithms - Parallel
Algorithms, OpenMP - Scalable Algorithms, Message Passing - Parallel,work sharing and
Synchronization constructs. MPI data types and tags, environment management routines. Data
level parallelism - Vector architecture- Graphics processing units-Programming the GPU.
REFERENCES:
1. David E. Culler, Jaswinder Pal Singh, ”Parallel Computing Architecture : A Hardware/Software
Approach “, Morgan Kaufmann / Elsevier Science (reprint Technical Science & Engineering) ,
2nd Edition,1998.
2. George Coulouris, Jean Dollimore and Tim Kindberg, “Distributed Systems Concepts and
Design”, Pearson Education, 5th Edition, 2017.
3. SapeMullender, “Distributed Systems”, Addison Wesley, 2nd Edition, 1993.
4. Brendan Burns, “ Designing Distributed Systems: Patterns and Paradigms for Scalable,
Reliable Services”,O′Reilly, 1st edition,2018.
WEB REFERENCES:
1. https://moodle.risc.jku.at/course/view.php?id=143
ONLINE RESOURCES:
1. https://www.youtube.com/watch?v=dlBVWMdGhqw&list=PLUJ7JmcrTifBROWODSG8wgyl
20XgBuE-N
2. https://www.youtube.com/watch?v=qbQCQ0U6H0o&list=PLbMVogVj5nJQRvzENlvMKA9q
70ScSRZBQ
43
UNIT IV PREDICTIVE MODELING MARKUP LANGUAGE 9
Introduction to PMML – PMML Converter - PMML Structure – Data Manipulation in PMML – PMML
Modeling Techniques - Multiple Model Support – Model Verification.
REFERENCES:
1. Kattamuri S. Sarma, “Predictive Modeling with SAS Enterprise Miner: Practical Solutions for
Business Applications”, 3rd Edition, SAS Publishing, 2017.
2. Alex Guazzelli, Wen-Ching Lin, Tridivesh Jena, James Taylor, “PMML in Action Unleashing
the Power of Open Standards for Data Mining and Predictive Analytics”, 2nd Edition,
Create Space Independent Publishing Platform,2012.
3. Ian H. Witten, Eibe Frank , “Data Mining: Practical Machine Learning Tools and
Techniques”, Morgan Kaufmann Series in Data Management Systems, Morgan Kaufmann,
3rd Edition, 2011.
4. Eric Siegel , “Predictive Analytics: The Power to Predict Who Will Click, Buy, Lie, or Die”,
2nd Edition, Wiley, 2016.
5. Conrad Carlberg, “Predictive Analytics: Microsoft Excel”, 1st Edition, Que Publishing, 2012.
6. Jeremy Howard, Margit Zwemer, Mike Loukides, “Designing Great Data Products- Inside
the Drivetrain train Approach, a Four-Step Process for Building Data Products – Ebook”, 1st
Edition, O'Reilly Media, March 2012.
WEB REFERENCES:
1. https://nptel.ac.in/courses/108108111/
2. https://www.coursera.org/learn/predictive-modeling-analytics
ONLINE RESOURCES:
1. https://bookdown.org/egarpor/PM-UC3M/
2. https://cics.nd.edu/research/applications/materials/
COURSE OBJECTIVES:
To understand the basics of digital images and noise models
To understand spatial domain filters and frequency domain filters
To understand the image processing techniques
To familiarize the image processing environment and their applications
To appreciate the use of image processing in various applications
44
UNIT I SPATIAL DOMAIN PROCESSING 9
Introduction to image processing – imaging modalities – image file formats – image sensing and
acquisition – image sampling and quantization – noise models – spatial filtering operations –
histograms – smoothing filters – sharpening filters – fuzzy techniques for spatial filtering – spatial
filters for noise removal.
REFERENCES:
1. E. R. Davies, “Computer & Machine Vision”, Fourth Edition, Academic Press, 2012.
2. S. Sridhar, “Digital Image Processing”, 2nd Edition, Oxford University Press, 2016.
3. W. Burger and M. Burge, “Digital Image Processing: An Algorithmic Introduction using
Java”, Springer,2nd edition, 2016.
4. John C. Russ, “The Image Processing Handbook”, Sixth Edition, CRC Press, 2011.
5. R. C. Gonzalez and R. E. Woods, “Digital Image Processing”, Third Edition, Pearson,2008.
6. Mark Nixon and Alberto S. Aquado, “Feature Extraction & Image Processing for Computer
Vision”, Third Edition, Academic Press, 2013.
45
7. D. L. Baggio et al., “Mastering OpenCV with Practical Computer Vision Projects”, Packt
Publishing, 2012.
8. Jan Erik Solem, “Programming Computer Vision with Python: Tools and algorithms for
analyzing images”, O'Reilly Media, 2012.
MP4091 LTPC
COGNITIVE COMPUTING
3 003
COURSE OBJECTIVES:
To familiarize Use the Innovation Canvas to justify potentially successful products.
To learn various ways in which to develop a product idea.
To understand about how Big Data can play vital role in Cognitive Computing
To know about the business applications of Cognitive Computing
To get into all applications of Cognitive Computing
46
UNIT V APPLICATION OF COGNITIVE COMPUTING 9
Building a cognitive health care application: Foundations of cognitive computing for healthcare,
constituents in healthcare ecosystem, learning from patterns in healthcare Data, Building on a
foundation of big data analytics, cognitive applications across the health care eco system, starting
with a cognitive application for healthcare, using cognitive applications to improve health and
wellness, using a cognitive application to enhance the electronic medical record Using cognitive
application to improve clinical teaching
COURSE OUTCOMES:
CO1: Explain applications in Cognitive Computing.
CO2: Describe Natural language processor role in Cognitive computing.
CO3: Explain future directions of Cognitive Computing
CO4: Evaluate the process of taking a product to market
CO5: Comprehend the applications involved in this domain.
TOTAL:45 PERIODS
REFERENCES
1. Judith H Hurwitz, Marcia Kaufman, Adrian Bowles, “Cognitive computing and Big Data
Analytics”, Wiley, 2015
2. Robert A. Wilson, Frank C. Keil, “The MIT Encyclopedia of the Cognitive Sciences”, The MIT
Press, 1999.
3. Noah D. Goodman, Joshua B. Tenenbaum, The ProbMods Contributors, “Probabilistic Models
of Cognition”, Second Edition, 2016, https://probmods.org/.
IF4095 LTPC
SOCIAL NETWORK ANALYSIS
3 003
COURSE OBJECTIVES:
Formalise different types of entities and relationships as nodes and edges and
represent this information as relational data.
Understand the fundamental concepts in analyzing the large-scale data that are derived
from social networks
Understand the basic concepts and principles of different theoretical models of social
networks analysis.
Transform data for analysis using graph-based and statistics-based social network
measures
Choose among social network designs based on research goals
47
UNIT II SOCIAL NETWORK GRAPH ANALYSIS 9
Social network exploration/ processing and properties: Finding overlapping communities, similarity
between graph nodes, counting triangles in graphs, neighborhood properties of graphs. Pregel
paradigm and Apache Giraph graph processing system.
SUGGESTED ACTIVITIES:
Twitter Intelligence project performs tracking and analysis of the Twitter
Large-Scale Network Embedding as Sparse Matrix Factorization
Implement how Information Propagation on Twitter
Social Network Analysis and Visualization software application.
Implement the Structure of Links in Networks
COURSE OUTCOMES:
CO1: Plan and execute network analytical computations.
CO2: Implement mining algorithms for social networks
CO3: Analyze and evaluate social communities.
CO4: Use social network analysis in behavior analytics
CO5: Perform mining on large social networks and illustrate the results.
TOTAL : 45 PERIODS
REFERENCES
1. Practical Social Network Analysis with Python, Krishna Raj P. M. Ankith Mohan and K. G.
Srinivasa. Springer, 2018
2. SOCIAL NETWORK ANALYSIS: METHODS AND APPLICATIONS, STANLEY
WASSERMAN, and KATHERINE F' AUST. CAMBRIDGE UNIVERSITY PRESS, 2012
3. Social Network Analysis: History, Theory and Methodology by Christina Prell, SAGE
Publications, 1st edition, 2011
4. Sentiment Analysis in Social Networks, Federico Alberto Pozzi, Elisabetta Fersini, Enza
Messina, and Bing. LiuElsevier Inc, 1st edition, 2016
5. Social Network Analysis, John Scott. SAGE Publications, 2012
48
BD4005 VIRTUALIZATION TECHNIQUES AND APPLICATIONS LT PC
3 00 3
COURSE OBJECTIVES:
To understand and deploy practical virtualization solutions and enterprise solutions.
Able to understand Server Virtualization and Virtualization Platform.
Understand the technologies of Virtualization and Network Virtualization.
To understand the concepts of Virtualization storage.
To study virtual machine products.
49
CO4:To explore the aspects of high level language virtual machines.
CO5:To gain expertise in server, network and storage virtualization.
REFERENCES:
1. William von Hagen, "Professional Xen Virtualization", Wrox Publications, January, 2008.
2. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and
Processes”, Elsevier/Morgan Kaufmann, 2012
3. David Marshall, Wade A. Reynolds, “Advanced Server Virtualization: VMware and Microsoft
Platform in the Virtual Data Center”, Auerbach Publications, 2006.
4. Kumar Reddy, Victor Moreno, “Network virtualization”, Cisco Press, July, 2006.
5. Chris Wolf, Erick M. Halter, “Virtualization: From the Desktop to the Enterprise”, APress 2005.
6. Kenneth Hess , Amy Newman, “Practical Virtualization Solutions: Virtualization from the
Trenches”, Prentice Hall, 2010
WEB REFERENCES:
1. lecturer.eepis-its.edu/ ~isbat/materikuliah/ .../ Virtualization. ppt
2. cs.nju.edu.cn/distribute-systems/lecture-notes/c11.ppt
3. https://edux.fit.cvut.cz/oppa/MI-POA/prednasky/MI-POA10.pdf
4.www.cs.otago.ac.nz/cosc440/lectures/lecture%2010.ppt
ONLINE RESOURCES:
1. https://www.simplilearn.com/virtualization
2. tutorialspoint.com/virtualization2.0/virtualization2.0_overview.htm
UNIT I INTRODUCTION 6
Natural Language Processing – Components - Basics of Linguistics and Probability and Statistics –
Words-Tokenization-Morphology-Finite State Automata
50
UNIT III CONTEXTUAL EMBEDDING 6
Constituency –Context Free Grammar –Lexicalized Grammars- CKY Parsing – Earley's algorithm-
Evaluating Parsers -Partial Parsing – Dependency Relations- Dependency Parsing -Transition
Based - Graph Based
30 PERIODS
SUGGESTED ACTIVITIES:
51
List of Possible Projects
1. Sentiment Analysis of Product Reviews
2. Information extraction from News articles
3. Customer support bot
4. Language identifier
5. Media Monitor
6. Paraphrase Detector
7. Identification of Toxic Comment
8. Spam Mail Identification
COURSE OUTCOMES:
CO1: Understand basics of linguistics, probability and statistics associated with NLP
CO 2: Implement a Part-of-Speech Tagger
CO 3: Design and implement a sequence labeling problem for a given domain
CO 4: Implement semantic processing tasks and simple document indexing and searching system
using the concepts of NLP
CO 5: Implement a simple chatbot using dialogue system concepts
TOTAL : 60 PERIODS
REFERENCES
1. Daniel Jurafsky and James H.Martin, “Speech and Language Processing: An Introduction
to Natural Language Processing, Computational Linguistics and Speech Recognition”
(Prentice Hall Series in Artificial Intelligence), 2020
2. Jacob Eisenstein. “Natural Language Processing “, MIT Press, 2019
3. Samuel Burns “Natural Language Processing: A Quick Introduction to NLP with Python and
NLTK, 2019
4. Christopher Manning, “Foundations of Statistical Natural Language Processing”, MIT Press,
2009.
5. Nitin Indurkhya,Fred J. Damerau, “Handbook of Natural Language Processing”, Second
edition, Chapman & Hall/CRC: Machine Learning & Pattern Recognition, Hardcover,2010
6. Deepti Chopra, Nisheeth Joshi, “Mastering Natural Language Processing with Python”,
Packt Publishing Limited, 2016
7. Mohamed Zakaria Kurdi “Natural Language Processing and Computational Linguistics:
Speech, Morphology and Syntax (Cognitive Science)”, ISTE Ltd., 2016
8. Atefeh Farzindar,Diana Inkpen, “Natural Language Processing for Social Media (Synthesis
Lectures on Human Language Technologies)”, Morgan and Claypool Life Sciences, 2015
52
UNIT I INTRODUCTION 9
Introduction to Distributed systems – Databases Vs. File Systems - Distributed file systems(HDFS)
– Distributed Machine-Learning System - Data Parallelism – Characteristics -Hadoop –Execution
Engines -Map Reduce- Distributed Storage System for Structured Data – NoSQL databases -
Casandra, Mongo DB-Developing a Distributed Application
UNIT IV SECURITY 9
Security in Data Intensive Computing Systems - Data Security and Privacy in Data-Intensive
Supercomputing Clusters - Information Security in Large Scale Distributed Systems -Privacy and
Security Requirements of Data Intensive Applications in Clouds
REFERENCES:
1. Tom White, “Hadoop: The Definitive Guide”, O'Reilly Media, 4th edition,2015.
2. Hector Garcia-Molina, Jeffrey D. Ullman, and Jennifer Widom., “Database Systems: The
Complete Book”, Pearson, 2013.
3. Furht, Borko, Escalante, Armando, “Handbook of Data Intensive Computing”, Springer
2011.
WEB REFERENCES:
1. https://en.wikipedia.org/wiki/Data-intensive_computing
53
2. https://www.computer.org/csdl/magazine/co/2008/04/mco2008040030/13rRUNvgyZ8
ONLINE RESOURCES:
1. https://www.slideshare.net/huda2018/dataintensive-technologies-for-cloudcomputing
REFERENCES:
1. Carlo Vercellis, Business Intelligence: Data mining and Optimization for Decision Making,
WILEY.
2. Han J., Kamber M. and Pei J, Data mining concepts and techniques, Morgan Kaufmann
Publishers (2011) 3rd ed.
3. Big Data Computing and Communications edited by Yu Wang, Hui Xiong, ShlomoArgamon,
XiangYang Li, JianZhong Li Springer
4. Andrea Cirillo,"R Data Mining: Implement data mining techniques through practical use cases
and real world datasets”,Packt Publication,1st Edition,2017.
5. Luis Torgo."Data Mining with R" Learning with Case Studies, Second Edition 2020,Chapman
and Hall/CRC.
WEB REFERENCES:
1. https://onlinecourses-archive.nptel.ac.in/noc18-mg11/announcements
2. https://swayam.gov.in/nd1_noc19_ma33/preview
3. www.datacamp.com/R-Tutorial
ONLINE RESOURCES:
1. https://www.youtube.com/watch?v=BB2O4VCu5j8
2. https://www.tutorialspoint.com/r/index.htm
3. http://www.rdatamining.com/
UNIT I INTRODUCTION 9
Definition, Process, Key terms: Site references, Keywords and Key phrases; building block
terms: Visit characterization terms, Content characterization terms, Conversion metrics;
Categories: Offsite web, on site web; Web analytics platform, Web analytics evolution, Need for
web analytics, Advantages, Limitations.
REFERENCES:
1. Clifton B., Advanced Web Metrics with Google Analytics, Wiley Publishing, Inc.2nd ed, 2012.
2. Kaushik A., Web Analytics 2.0, The Art of Online Accountability and Science of
Customer Centricity, Wiley Publishing, Inc. 1st ed, 2010.
3. Sterne J., Web Metrics: Proven methods for measuring web site success, John Wiley and
Sons, 2002
56
MP4071 HEALTHCARE ANALYTICS LT PC
3 00 3
COURSE OBJECTIVES:
To impart the fundamental concepts of Healthcare data analytics
To give the knowledge about the Health care Data Sources.
To familiarize Advanced Data Analytics for Healthcare
To learn the Health IoT data analytics
To implement the Applications and Practical Systems for Healthcare.
UNIT I INTRODUCTION 9
Introduction- Healthcare Data Sources and Basic Analytics - Healthcare Data Sources : Electronic
Health Records: Components of HER- Coding system- Biomedical Image Analysis: Biomedical
Imaging Modalities- Object Detection- Image Segmentation- Image Registration- Feature
Extraction- Mining of Sensor Data in Healthcare: Mining Sensor Data in Medical Informatics: Scope
and Challenges- Sensor Data Mining Applications
COURSE OUTCOMES:
CO1: Describe the basics of healthcare data analytics.
CO2: Explain the Healthcare Data Sources.
CO3: Discuss the Advanced Data Analytics for Healthcare.
CO4: Express the Health IoT data analytics.
CO5: Apply the practical Systems for Healthcare.
TOTAL: 45 PERIODS
REFERENCES
1. Chandan K. Reddy , Charu C. Aggarwal, Healthcare Data Analytics 1st Edition, Kindle
57
Edition, CRC press, 2020.
2. Sanjay Kumar Singh Ravi Shankar Singh Anil Kumar Pandey Udmale S.S. Ankit
Chaudhary , IoT-Based Data Analytics for the Healthcare Industry Techniques and
Applications 1st Edition, Elsevier, Academic Press
3. Prasant Kumar Pattnaik, Suneeta Mohanty (Editor), Satarupa
Mohanty (Editor) Format: Kindle Edition, Smart Healthcare Analytics in IoT Enabled
Environment 1st edition Kindle Edition, Springer Nature Switzerland AG 2020
4. Nilanjan Dey, Amira Ashour, Simon James Fong , Chintan Bhatt , Healthcare Data
Analytics and Management 1st Edition, Elsevier, Academic Press 2018.
5. Sanket Shah, Healthcare Analytics: A Comprehensive Guide, Kindly Edition, 2020
COURSE OBJECTIVES:
To provide the required skill to apply the statistical tools in engineering Problems.
To introduce the basic concepts of Time Series and Estimations.
To acquaint the knowledge of Statistical Inference and Decision Theory.
To provide the basic tools of Statistics for data analysis and Decision making on the
sampling and inference.
UNIT II ESTIMATION 9
Methods of estimation: Random samples, sampling distributions of estimators, Methods of
moments, Unbiasedness: Unbiased estimator, Illustration of unbiased estimator for the parameter
and parametric function. Definitions of Consistency, Sufficient condition for consistency, concept of
efficiency and sufficiency. Neyman- Factorization theorem (without proof), concept of likelihood
function, Maximum Likelihood, Properties of MLE (without proof), Estimation of the parameters of
normal distribution and other standard distributions by MLE.
58
UNIT IV REGRESSION AND RELIABILITY 9
Multiple linear regression, forward, backward & stepwise regression, Logistic Regression.
Reliability of system of independent components, association of random variables, bounds on
system reliability, improved bounds on system reliability using modular decompositions.
Replacement policy comparisons, preservation of life distribution classes under reliability
operations. Reversed hazard rate, cumulative reversed hazard function, relation between hazard
function and reversed hazard function. Reversed lack of memory property.
REFERENCES:
1. Johnson, R.A., Miller, I and Freund J., "Miller and Freund‘s Probability and Statistics for
Engineers", Pearson Education, Asia, 8th Edition, 2015.
2. Barlow, R. E. and Proschan F. (1996). Mathematical Theory of Reliability. John Wiley.
3. Statistical Inference: P. J. Bickel and K. A. Docksum, 2ndEdition, Prentice Hall
4. Duncan A.J. (1974): Quality Control and Industrial Statistics, IV Edition, Taraporewala and
Sons.
5. M. Mitzenmacher and E. Upfal. Probability and Computing: Randomized Algorithms and
Probabilistic Analysis. Cambridge University Press, 2005.
6. Devore. J.L., "Probability and Statistics for Engineering and the Sciences‖, Cengage
Learning, New Delhi, 8th Edition, 2014.
7. Douglas C. Montgomery, Elizabeth A. Peck, G. Geoffrey Vining, “ Introduction to Linear
Regression Analysis”,Wiley, 6th Edition, 2021.
8. Chris Chatfield “The Analysis of Time Series: An Introduction”, Chapman & Hall/CRC,Sixth
Edition, 2003.
9. George Casella, Roger L. Berger, “Statistical Inference”, 2nd ed., Thomson Learning,2007.
10. Mukhopadhay, Parimal, ”Theory and Methods of Survey Sampling”, Prentice Hall,2008.
11. Tobias, P. A. and Trindane, D. C, “Applied Reliability”, Second edition, CRC Press,1995.
12. Rao, C.R.,” Linear Statistical Inference and its Applications”, Wiley Eastern,2009.
59
AUDIT COURSES
REFERENCES:
1. Adrian Wallwork , English for Writing Research Papers, Springer New York Dordrecht
Heidelberg London, 2011
2. Day R How to Write and Publish a Scientific Paper, Cambridge University Press 2006
3. Goldbort R Writing for Science, Yale University Press (available on Google Books) 2006
4. Highman N, Handbook of Writing for the Mathematical Sciences, SIAM. Highman’s
book 1998.
60
AX4092 DISASTER MANAGEMENT L T P C
2 0 0 0
COURSE OBJECTIVES:
Summarize basics of disaster
Explain a critical understanding of key concepts in disaster risk reduction and
humanitarian response.
Illustrate disaster risk reduction and humanitarian response policy and practice from
multiple perspectives.
Describe an understanding of standards of humanitarian response and practical relevance
in specific types of disasters and conflict situations.
Develop the strengths and weaknesses of disaster management approaches
UNIT I INTRODUCTION 6
Disaster: Definition, Factors and Significance; Difference between Hazard And Disaster; Natural
and Manmade Disasters: Difference, Nature, Types and Magnitude.
61
REFERENCES:
1. Goel S. L., Disaster Administration And Management Text And Case Studies”,Deep &
Deep Publication Pvt. Ltd., New Delhi,2009.
2. NishithaRai, Singh AK, “Disaster Management in India: Perspectives, issues and
strategies “’NewRoyal book Company,2007.
3. Sahni, Pradeep Et.Al. ,” Disaster Mitigation Experiences And Reflections”, Prentice Hall
OfIndia, New Delhi,2001.
62
TOTAL: 30 PERIODS
COURSE OUTCOMES:
Students will be able to:
1. Discuss the growth of the demand for civil rights in India for the bulk of Indians before the
arrival of Gandhi in Indian politics.
2. Discuss the intellectual origins of the framework of argument that informed the
conceptualization of social reforms leading to revolution in India.
3. Discuss the circumstances surrounding the foundation of the Congress Socialist
Party[CSP] under the leadership of Jawaharlal Nehru and the eventual failure of the
proposal of direct elections through adult suffrage in the Indian Constitution.
4. Discuss the passage of the Hindu Code Bill of 1956.
SUGGESTED READING
1. The Constitution of India,1950(Bare Act),Government Publication.
2. Dr.S.N.Busi, Dr.B. R.Ambedkar framing of Indian Constitution,1st Edition, 2015.
3. M.P. Jain, Indian Constitution Law, 7th Edn., LexisNexis,2014.
4. D.D. Basu, Introduction to the Constitution of India, LexisNexis, 2015.