B Tech Cse Ai - Syllabus - Compressed
B Tech Cse Ai - Syllabus - Compressed
School of Engineering
Bachelor of Technology: Computer Science and Engineering
(Artificial Intelligence)
Branch Code: 39
Credits
Course
SEMESTER IV
Contact
Evaluation Scheme
Category
Credits
Course Hours
Course
Credits
Course
SEMESTER VI
Contact
Evaluation Scheme
Course Hours
Category
Credits
Course
Note: The students need to undergo a 4 to 6 weeks of industrial training that will be evaluated in the VII Semester.
SEMESTER VII
Contact
Evaluation Scheme
Credits
Category
Course
Course Hours
Code Code Title
L T P CIA ESE Course
Total
Natural Language Processing
C BAI3701 3 1 0 40 60 100 4
C BAI3702 Fuzzy Logic 3 1 0 40 60 100 4
GE Generic Elective II 3 1 0 40 60 100 4
GE Generic Elective III 3 1 0 40 60 100 4
OE Open Elective I* - - - 40 60 100 4
Natural Language Processing
C BAI3751 0 0 2 40 60 100 1
Lab
C BAI3752 Fuzzy Logic Lab 0 0 2 40 60 100 1
Industrial Training Evaluation
C BAI3758 0 0 2 100 - 100 1
#
C BAI3759
Project I 0 0 4 100 - 100 2
GP3701General Proficiency - - - 100 - 100 1
Total 12 4 10 580 420 1000 26
*Students will opt any one of the open elective from the list of open electives provided by the university.
#
Students need to submit an abstract for the project, select a guide and will complete the literature review related
to the project.
SEMESTER VIII
Contact
Evaluation Scheme
Course Hours
Category
Credits
Course
Category of Courses:
F Foundation Course
C Core Course
GE Generic Elective
OE Open Elective
List of Open Electives
B. Tech: Computer Science and Engineering
(Artificial Intelligence)
Course
Generic Elective I
Code
GE33911 Cyber Law and Security
GE33912 Introduction to Unmanned Aerial Vehicles
GE33913 Computer Vision
GE33914 Recommender Systems
Course
Generic Elective II
Code
GE33921 Block Chain Technology
GE33922 System Modeling & Simulation
GE33923 Embedded System Design
GE33924 Sentiment Analysis
Course
Generic Elective III
Code
GE33931 Evolutionary Multi-objective Optimization
GE33932 Bioinformatics
GE33933 Internet of Things
GE33934 Cloud Computing
Course
Generic Elective IV
Code
GE33941 Data Mining and Ware Housing
GE33942 Introduction to Drones
GE33943 Computer Forensics
GE33944 Augmented & Virtual Reality
Course
Generic Elective V
Code
GE33951 Wireless Sensor Networks
GE33952 Distributed Systems
GE33953 Gaming in Artificial Intelligence
GE33954 Pattern Recognition
BAI3301 Database Management Systems Course Objective:
Learning Outcome:
After completing the course, the students should be able to:
1. Understand the basic concepts of the database and data models.
2. Design a database using ER diagrams and map ER into Relations and normalize the
relations.
3. Develop a simple database application using normalization.
4. Acquire the knowledge about different special purpose databases and to critique
how they differ from traditional database systems.
Course Content:
Total
Module Course Topics Credits
Hours
Text/Reference Books:
Course Objective:
Learning Outcome:
Total
Module Course Topics Credits
Hours
Text/Reference Books:
1. Artificial Intelligence in Mechanical and Industrial Engineering Edited By
Kaushik Kumar Divya Zindani J. Paulo Davim
2. Artificial Intelligence: Implications for Cim (Artificial Intelligence in
Industry) by Andrew Kusiak.
BCS3301 Discrete Mathematics Course
Objective
Text/Reference Books:
1. Koshy, “Discrete Structures”, Elsevier Publication.
2. Kenneth H. Rosen, “Discrete Mathematics and Its Applications”, McGraw-Hill.
3. B. Kolman, R.C. Busby, and S.C. Ross, “Discrete Mathematical Structures”, Prentice Hall.
4. R.P. Grimaldi, “Discrete and Combinatorial Mathematics”, Addison Wesley.
5. Jean Paul Trembley, R Manohar, “Discrete Mathematical Structures with
Application toComputer Science,” McGraw-Hill.
BCS3303 Digital Logic Design Course
Objective:
1. To impart an understanding of basic concepts of Boolean algebra and digital System.
2. To impart familiarity with the design and implementation of different types of
practically usedsequential circuits.
3. To provide an introduction to use hardware description circuits
4. Introduce the concept of digital and binary systems
5. Be able to design and analyse combinational logic circuits.
6. Be able to design and analyse sequential logic circuits.
7. Reinforce theory and techniques taught in the classroom through experiments and projects
inthe laboratory.
Learning Outcome:
At the end of the course, the student should be able to:
1. Apply the basic concepts of Boolean algebra for the simplification and implementation of
logicfunctions using suitable gates namely NAND, NOR etc.
2. Design simple combinational circuits.
3. Define different number systems, binary addition and subtraction, 2’s
complement
representation and operations with this representation.
4. Understand the basic knowledge of flip-flops
5. Understand the different switching algebra theorems and apply them for logic
functions.
6. Define the Karnaugh map for a few variables and perform an algorithmic reduction of
logicfunctions.
7. Define the following combinational circuits: buses, encoders/decoders,
(de)multiplexers,exclusive-ORs, comparators, Arithmetic-logic; and to be able to build
simple applications.
Course Contents:
Total
Modul Course Topics Credit
e Hour s
s
Binary Numbers and Gate level Minimization
Digital system and binary numbers: Signed binary numbers,
Binary codes, Cyclic codes, Error detecting and correcting
codes, Hamming codes, Floating point representation.
I 30 Hours 1
Gate-level minimization: The map method up to five variable,
Don’t care conditions, Karnaugh maps, POS simplification,
NAND and NOR implementation, Quine
McClusky method (Tabular method).
Combinational Logic
II Combinational circuits: analysis procedure, design procedure; 30 Hours 1
Binary adder-subtractor; decimal adder; binary multiplier;
magnitude comparator; decoders; encoders; multiplexers.
Synchronous Sequential Logic
III Sequential circuits: Binary cell, Latches, Flip-flops- RS, JK, 30 Hours 1
Master-Slave JK, D F/F,T flip flops; Synchronous Sequential
Circuit Design: Fundamentals of Synchronous sequential
circuits;
Classification of synchronous machines; Analysis of
Synchronous Sequential circuits; Design of Synchronous and
Asynchronous Counters-Shift registers, Ring counters; Analysis
and design of Finite State Machines; Timing issues
in synchronous circuits.
Asynchronous Sequential Logic
Fundamentals of Asynchronous Sequential circuits: Analysis and
design of Asynchronous Sequential circuits; Pulse mode and
IV Fundamental-mode Circuits; Cycles; Races; Hazards in 30 Hours 1
asynchronous circuits; Programmable Logic Devices: PLAs,
PALs, CPLD; FPGA Architecture; Finite state machines:
Mealy,Moore design.
Text/Reference Books:
1. Raj Kamal, “Digital Systems Principle and Design”, Pearson Education.
2. Balbaniam, Carison, “Digital Logic Design Principles”, Wiley Publications.
3. Morris Mano, “Digital Design”, Pearson Education.
4. R.P. Jain, “Modern Digital Electronics”, McGraw Hill.
5. D.P. Leach, A .P. Malvino, “Digital Principles and Applications”, TMH.
6. Tocci, Digital systems, “Principles and applications”, Pearson.
7. Sudhakar Yalamachili, John M. Yarbrough, “Introductory VHDL”, Pearson Education.
BAI3351 Database Management System Lab
List of Experiments:
1.Write the queries for Data Definition and Data Manipulation Language.
2.Write SQL queries using logical operations (=, <,>, etc)
3.Write SQL queries using SQL operators.
4.Write SQL query using character, number, date and group functions.
5.Write SQL queries for extracting data from more than one table.
6.Write SQL queries for sub queries, nested queries.
7.Write programme by the use of PL/SQL.
8.Concepts for ROLL BACK, COMMIT.
9.Create VIEWS and understand its concept. 10.Create
CURSORS and understand its concept. 11.Create
TRGGERS and understand its concept.
BAI3352 Artificial intelligence in Mechanical Engineering Systems
1. Study of Artificial Intelligence for a Thermal System
2. Study of NC Machine
3. Study of CAD software
4. Study of Additive Manufacturing.
5. Study of 3 D printing
6. Study of Sensors
7. Study of Actuators
BCS3353 Digital Logic Design Lab
Note: Minimum 10 experiments to be performed by students
List of Experiments:
6. MUX/DEMUX use of 74153, 74139 for arithmetic circuits and code converter.
11. Perform Shift left; Shift right, SIPO, SISO, PISO, PIPO operations using 74S95.
Objective:
Learning Outcome:
Course Contents:
Total
Module Course Topics Credits
Hours
Unsupervised Learning
III Introduction to clustering, Hierarchical: AGNES, DIANA,
Partitional: K-means clustering, K-Mode Clustering, Self-
Organizing Map, Expectation Maximization, Gaussian
Mixture Models, Principal Component Analysis (PCA), 30 1
Locally Linear Embedding (LLE), Factor Analysis
Probabilistic Learning
Bayesian Learning, Bayes Optimal Classifier, Naïve Bayes
Classifier, Bayesian Belief Networks, Mining,
Frequent Patterns
Text/Reference Books:
Total
Module Course Topics Credits
Hours
Introduction
Introduction: Basic Terminology, Data
types and its classification, Algorithm
I complexity notations like big Oh, Time- Space
trade- off.Abstract Data Types 30
(ADT). Array: Array Definition, Hours 1
Representation and Analysis of Arrays,
Single and Multidimensional Arrays,
Address calculation, Array as Parameters, Sparse
Matrices, Recursion- definition and processes,
simulating recursion, Backtracking,
Recursive algorithms, Tail recursion, Removal of
recursion, Tower of
Hanoi.
Text/Reference Books:
Learning Outcome:
At the end of the course, the student should be able to:
1. Understanding of the concepts, structure and design of O.S.
2. Design various Scheduling algorithms.
3. Apply the principles of concurrency.
4. Design deadlock, prevention and avoidance algorithms.
5. Compare and contrast various memory management schemes.
6. Design and Implement a prototype file systems.
7. Demonstrate understanding of O.S design and its impact on
applicationsystem design and performance.
Course Contents:
Total
Module Course Topics Hours Credit
s
Introduction to Operating System and Process
30
I Concept 1
Hours
Operating system and functions, Classification of
Operating systems, Operating System Structure,
Operating System Services, System call and System
program, Process concept, Process state, Process
control block, Context switching, Operation on process,
Threads and their management, Benefits of
multithreading, Types of threads, Threading issues,
CPU-scheduling, Scheduling criteria, Scheduling
Algorithms, Concurrent Processes, Inter
Process Communication models and
Schemes
Text/Reference Books:
1. Silberschatz, Galvin and Gagne, “Operating Systems Concepts”, Wiley Publication
2. Sibsankar Halder and Alex A Aravind, “Operating Systems”, Pearson Education
3. Harvey M Dietel, “An Introduction to Operating System”, Pearson Education
4. D M Dhamdhere, “Operating Systems: A Concept based Approach”, TMH
5. William Stallings, “Operating Systems: Internals and Design Principles”, Pearson
Education
BCS3404 Computer Organization & Architecture Course Objective:
Learning Outcome:
After completing the course, the students should be able to:
1. Identify the basic structure and function unit of a digital computer.
2. Analyze the effect of addressing modes on the execution time of a program.
3. Design processing unit using the concepts of ALU and control logic unit.
4. Select appropriate instruction standards for I/O devices.
Course Contents:
Total
Module Course Topics Credits
Hours
Computer Evolution & Arithmetic
A Brief History of computers: Von Neumann
Architecture, Hardware architecture, Computer
I Components, Interconnection Structures, Bus 30 1
Interconnection, Register Transfer Language, Bus Hours
and Memory Transfers, Bus Architecture, Bus
Arbitration Techniques, Arithmetic Logic, Shift
Micro operation, Arithmetic Logic Shift Unit,
Arithmetic Algorithms(addition, subtraction, Booth
Multiplication, Division)
Control Unit
Control Design: Hardwired & Micro Programmed ,
Performing of arithmetic or logical operations,
II Multiple-Bus organization, Hardwired Control, Micro 30 1
programmed control, Microinstruction, Hours
Microprogram sequencing, Wide-Branch addressing,
Microinstruction with Next-address field,
Prefetching, Microinstruction, Pipeline control:
Instruction pipelines, Pipeline performance.
Processor Organization and Input-
Output Organization
Processor Design: General register organization,
Stack organization,
Addressing mode, Instruction format, Data transfer &
III manipulations, Program Control, Reduced Instruction 30 1
Set Computer, Input- Output Organization: Peripheral Hours
devices, I/O interface I/O ports.
Interrupts: Interrupt hardware, Types of interrupts
and exceptions, Modes of Data Transfer:
Programmed I/O, Interrupt
initiated I/O, Direct Memory Access: I/O
channels and processors, Serial
Communication: Synchronous &
asynchronous communication,
Standard communication interfaces
Memory Organization
Basic concept and hierarchy, semiconductor RAM
memories,2D & 2 1/2D memory organization,
ROM memories, Cache 30 1
memories, Concept and design issues 9 performance, Hours
IV
Address mapping and replacement, Auxiliary
memories: Magnetic disk, Magnetic tape and optical
disks, Virtual memory, Concept implementation
Text/Reference Books:
Experiments:
List of Experiments:
Implement the following on LINUX or other UNIX like platform. Use C for
high level language implementation
1. Write programs using the following system calls of UNIX operating
system:fork, exec, getpid, exit, wait, close, stat, open dir, read dir
2. Write programs using the I/O system calls of UNIX operating system
(open,read, write, etc)
3. Write C programs to simulate UNIX commands like ls, grep, etc.
4. Given the list of processes, their CPU burst times and arrival times,
display/print the Gantt chart for FCFS and SJF. For each of the scheduling
policies, compute and print the average waiting time and average
turnaround time.
5. Given the list of processes, their CPU burst times and arrival times,
display/print the Gantt chart for Priority and Round robin. For each of the
scheduling policies, compute and print the average waiting time and
average turnaround time.
6. Developing Application using Inter Process communication (using shared
memory, pipes or message queues).
7. Implement the Producer – Consumer problem using semaphores (using
UNIX system calls).
8. Implement memory management scheme: Free space is maintained as a
linked list of nodes with each node having the starting byte address and the
ending byte address of a free block. Each memory request consists of the
process-id and the amount of storage space required in bytes. Allocated
memory space is again maintained as a linked list of nodes with each node
having the process- id, starting byte address and the ending byte address of
the allocated space.
9. Implement any file allocation technique (Linked, Indexed or Contiguous).
BAI3452 Data Structure Lab
Note: Minimum 15 experiments to be performed by students
List of Experiments:
List of Experiments:
Objective:
Total
Module Course Topics Credits
Hours
Text/Reference Books:
Course Contents :
Module Course Topics Total Credits
Hours
Introduction to Data Science Case for data science, data
science classification, data science algorithms; Data Science
Process, prior Knowledge, Data Preparation, Modeling,
I Application, Knowledge; Data Exploration, Objectives of data 30 Hours 1
Exploration; Datasets, Descriptive Statistics; Data Visualization,
Roadmap for data exploration.
Text/Reference Books:
Course Objective:
Learning Outcome:
After completing the course, the students should be able to:
Course Contents:
Total
Module Course Topics Credits
Hours
Text/Reference Books:
Total
Module Course Topics Credits
Hours
Introduction
Introduction: Network objectives and applications;
network structure and architecture; OSI reference
I model; network services; network standardization; 30 1
examples of network; Physical layer: Fundamentals of Hours
data communication; transmission media; analog
transmission; digital transmission; switching; ISDN;
terminal handling; Broadcast channels and medium
access: LAN protocols.
Data link layer and network layer
Data link layer: Design issues; error detection and
corrections; elementary data link protocols; sliding 30
II window protocols. Examples; Network layer: Design Hours 1
issues; routing algorithms; congestion control;
internetworking. Examples. CSMA with collision
detection; collision free protocols; IEEE standard 802
for LANs; comparison of LANs; Fiber optic networks
and FDDI.
Application Layer
Text/Reference Books:
1. Andrew S. Tanenbaum “Computer Networks” Prentice Hall of India.
2. William Stallings “Local Networks” Maxwell Macmillan International Edition.
3. B.A. Forouzan “Data Communication and Networking”. Tata McGraw Hill.
BCS3504 Automata Theory and Formal Languages
Course Objective:
Students will learn several formal mathematical models of computation along with their
relationships with formal languages. They will learn regular languages and content free languages
which are crucial to understand how compilers and programming languages are built. Also students
will learn that not all problems are solvable by computers and some problems do not admit efficient
algorithms. Throughout this course, students will strengthen their rigorous mathematical reasoning
skills.
Learning Outcome:
At the end of the course, the student should be able to:
1. Demonstrate an understanding of abstract models of computing, including
deterministic (DFA), non deterministic (NFA) and Turing Machine (TM) models.
2. Understand the relative computing power of the different abstract machine
models.
3. Demonstrate an understanding of regular expression and grammars.
4. Understand the associations between language classes and machine models.
5. Understand the associations between language classes and language descriptors.
6. Understand decidable and undecidable problems.
7. Understand the application of machine models and descriptors to compiler theory
and parsing.
Course Contents:
Total
Module Course Topics Credits
Hours
Introduction to Automata
Introduction, Alphabets, Strings and Languages,
Automata and Grammars, Deterministic finite
I Automata (DFA)-Formal Definition- State transition
graph, Transition table, Language of DFA.
30 Hours 1
Nondeterministic finite Automata (NFA)-NFA with
epsilon transition, Language of NFA, Equivalence of
NFA and DFA, Minimization of Finite Automata,
Myhill-Nerode Theorem.
Regular expression
Operators of regular expression and their precedence,
Algebraic laws for Regular expressions, Kleen’s
Theorem, Regular expression to FA, Application and
II Limitations of FA, DFA to Regular expression- Arden 30Hours 1
Theorem, Non Regular Languages, Pumping Lemma
for regular Languages - Application of Pumping
Lemma, Closure and Decision properties of Regular
Languages, FA with output -Moore and Mealy
machine, Equivalence of Moore and Mealy Machine.
Experiments:
List of Experiments:
Objective:
1. Describe the Evolutionary algorithms and solve complex problem using evolutionary
algorithms.
2. Identify the issues in design and implementation of genetic algorithm.
3. Explain the concepts of Swarm Intelligence techniques.
4. Describe the social network structure.
5. Evolutionary Computation and Artificial Life for optimization of biological problems.
6. Describe the deferential evolutionary algorithms.
Course Contents:
Text/Reference Books:
Objective:
Learning Outcome:
Course Contents:
Total
Module Course Topics Credits
Hours
Text/Reference Books:
Objective:
Learning Outcome:
After completing the course, the students should be able to:
1. To model robot manipulators and mobile robots
2. Design and analyze robot controllers by using appropriate methods
3. Design basic robot intelligent sensor systems including static system
learning (kinematics) and dynamic learning; and intelligent course
recognition.
4. Acquire skill in robot task planning for problem solving.
5. Develop skills in identifying areas in manufacturing where robotics can be
deployed for enhancing productivity.
Course Contents:
Total
Module Course Topics Credits
Hours
Text/Reference Books:
Course Contents:
Total
Module Course Topics Credits
Hours
Introduction to Compiler
Introduction-Compiler and features, Analysis –
Synthesis model, Phases of compiler, Grouping of
Phase, Concept of pass, Bootstrapping. Lexical
30
I analyzer-Implementation and Role of lexical analyzer, Hours 1
Token, Pattern and Lexemes and function, Finite state
machine and Regular expression. Formal grammar and
their application to syntax analysis- CFG, derivation
and Parse trees
Basics Parsing Techniques –I: Top-Down Parser-
Back tracking, Predictive Parser
Basic parsing techniques-II: Bottom –Up Parser
Shift –Reduce Parser, Operator Precedence parsing,
Recursive descent parsing, LR Parser-LR(0) Parser ,
SLR parser , Canonical LR Parser, LALR Parser. 30
II 1
Syntax-Directed Translation-Syntax Directed definition Hours
and type, Construction of Syntax Tree and DAG
representation. Symbols Table- Storage Allocation
strategies, Runtime Storage Organization, Structure
Storage Allocation, Error detection and
Recovery-Lexical, syntax and semantic error.
Intermediate code Generator
Intermediate code- forms of intermediate code,
Implementation of 3-address code- Quadruple, direct
III
and triple, Translation of Assignment statements,
Translation of Boolean expression- Flow of Control
Statement, and Case statements. Code Generation- 30
1
Hours
Design issues, The Target code and addresses in target
code, Code generator algorithm.
Code Optimization
Machine-independent optimization, Basic Blocks, Flow
IV graph- DAG representation of basic blocks, Loop in 30 1
Hours
Flow graph .Transformation, Loop Optimization
,Peephole Optimization, Global Data
Flow-Control Flow Analysis, Data Flow Analysis
Text/Reference Books:
1. Aho, Sethi& Ullman, “Compilers: Principles, Techniques and Tools”, Pearson
Education
2. V Raghvan, “Principles of Compiler Design”, TMH
3. Kenneth Louden, “Compiler Construction”, Cengage Learning.
4. Charles Fischer and Ricard LeBlanc, “Crafting a Compiler with C”,
Pearson Education
BAI3651 Evolutionary Algorithms Lab
of Experiments:
of Experiments:
Course Objective:
1. To tag a given text with basic Language features
2. To design an innovative application using NLP components
3. To learn the fundamentals of natural language processing
4. To understand the use of CFG and PCFG in NLP
Learning Outcome:
After completing the course, the students should be able to:
1. Teach students the leading trends and systems in natural language processing.
2. Make them understand the concepts of morphology, syntax, semantics and pragmatics of
the language and that they are able to give the appropriate examples that will illustrate the
above mentioned concepts.
3. Enable students to be capable to describe the application based on natural language
processing and to show the points of syntactic, semantic and pragmatic processing.
4. Understand approaches to discourse, generation, dialogue and summarization within NLP.
5. Understand approaches to syntax and semantics in NLP.
Course Contents:
Total
Module Course Topics Credits
Hours
Text/Reference Books:
1. Daniel Jurafsky, James H. Martin: "Speech and Language Processing", 2/E, Prentice Hall,
2008.
2. James Allen, "Natural Language Understanding", 2/E, Addison-Wesley, 199Christopher D.
Manning, Hinrich Schutze: "Foundations of Statistical Natural Language Processing", MIT
Press, 1999
3. Steven Bird, Natural Language Processing with Python, 1st Edition, O'Reilly, 2009.
4. Jacob Perkins, Python Text Processing with NLTK 2.0 Cookbook, Packt Publishing, 2010
BAI3702 Fuzzy Logic
Course Objectives:
Learning Outcomes:
After completing the course, the students should be able to:
Course Content:
Total
Module Course Topics Credits
Hours
IV 8 Hours 1
Text/ReferenceBooks:
Experiments:
1. Word Analysis
The objective of the experiment is to learn about morphological features of a word by
analysing it.
2. Word Generation
The objective of the experiment is to generate word forms from root and suffix
information.
3. Morphology
Understanding the morphology of a word by the use of Add-Delete table
4. N-Grams
The objective of this experiment is to learn to calculate bigrams from a given corpus and
calculate probability of a sentence.
5. N-Grams Smoothing
The objective of this experiment is to learn how to apply add-one smoothing on sparse
bigram table.
List of Experiments:
Text books:
1. Cosma Rohilla Shalizi, Advanced Data Analysis from an Elementary Point of View, 2015
2. Deng & Yu, Deep Learning: Methods and Applications, Now Publishers, 2013.
3. Ian Goodfellow, Yoshua Bengio, Aaron Courville, Deep Learning, MIT Press, 2016.
4. Michael Nielsen, Neural Networks and Deep Learning, Determination Press, 2015
Reference Books:
1. Wei Qi Yan - Computational Methods for Deep Learning_ Theoretic, Practice and
Applications-Springer (2021)
2. Hisham El-Amir and Mahmoud Hamdy, Deep Learning Pipeline: Building a Deep
Learning Model with TensorFlow,Apress,2020
BAI3851 Deep Learning Lab
List of Experiments:
1. Write a program to implement k-Nearest Neighbour algorithm to classify the iris data set. Print
both correct and wrong predictions.
2. Write a program to visualization of each species of iris dataset using Liner Regression Model.
3. Build a Logistic Regression model that answers the question: “what sorts of people were more
likely to survive?” using passenger data (ie name, age, gender, socio-economic class, etc). in
Titanic dataset.
4. Build a model to digit recognition of MNIST dataset using Support Vector Machine. Also print
the confusion matrix.
5. Write a program to implement the naïve Bayesian classifier for a sample training data set stored
as a .CSV file. Compute the accuracy of the classifier, considering few test data sets.
6. Build a CNN Model to identify Image from the CIFAR-10 Dataset. Calculate the accuracy,
precision, and recall for your data set.
7. The Pima Indians Diabetes Database can be used to train machine learning models to predict if a
given patient has diabetes. This dataset contains measurements relating to Pregnancies, Glucose,
Blood Pressure, Skin Thickness, Insulin, BMI, Diabetes Pedigree Function, and Age. Build a
predictive model and show the output in form of confusion matrix.
8. Write a program to generate images that never existed before. They learn about the world
(objects, animals and so forth) and create new versions of those images that never existed using
Generative Adversarial Networks (GAN) model.
9. Construct a Bayesian network considering medical data. Use this model to demonstrate the
diagnosis of heart patients using standard Heart Disease Data Set.
10. Write a program to classify retinal damage from OCT Scan dataset using a pre- trained VGG16
Model
11. Consider the “airline-passengers.csv“dataset. Write a program to implement LSTM (Short Long-
term Memory) Network, the task is to predict the number of international airline passengers in
units of 1,000. The data ranges from January 1949 to December 1960, or 12 years, with 144
observations.
OE33901 Principles of Industry 4.0 Course
Objective:
1. This course provides students with an introduction to Industry 4.0, its building blocks, its
applications and advantages compared to conventional production techniques.
2. Introduce the basic concepts of Industry 4.0, Artificial Intelligence, Big Data and Internet of
Things.
3. Learners will gain deep insights into how smartness is being harnessed from data and appreciate
what needs to be done in order to overcome some of the challenges.
4. Learn Application of Industry 4.0 and Business issues in Industry 4.0
Learning Outcomes:
On the successful completion of the course, student will be able to:
Course Contents:
Total
Module Course Topics Credits
Hours
Text/ReferenceBooks:
1. Alasdair Gilchrist. Industry 4.0: The Industrial Internet of Things, Apress Publications.
OE33902 Nature Inspired Algorithms Course
Objective:
By the end of the course, students will be able to
1. Study the basics Natural systems.
2. Study the concepts of Natural systems and its applications
3. Study the Basic Natural systems functions(operations)
4. Study the Natural design considerations
5. Study the Integration of Hardware and software in Natural applications.
Learning Outcome:
After completing the course, the students should be able to:
1. Explain the Concept of Basic Natural Systems.
2. Explain all the Basic Natural System Models(Operations)
3. Design the different Computing models.
4. Integration of Models in Computing Platform.
Course Contents:
Total
Module Course Topics Credits
Hours
TEXT BOOKS
1. Leandro Nunes de Castro, " Fundamentals of Natural Computing, Basic Concepts, Algorithms and
Applications", Chapman & Hall/ CRC, Taylor and Francis Group, 2007
REFERENCE BOOKS
1. Floreano D. and Mattiussi C., "Bio-Inspired Artificial Intelligence: Theories, Methods, and
Technologies", MIT Press, Cambridge, MA, 2008
2. Albert Y.Zomaya, "Handbook of Nature-Inspired and Innovative Computing", Springer, 2006. 4.
Marco Dorrigo, Thomas Stutzle,” Ant Colony Optimization”, PHI,2005
GE33911 Cyber Law and Security Course
Objective:
Learning Outcome:
After completing the course, the students should be able to:
1. Help the organization to continue its commercial activities in the event of significant
information security incidents
2. Establish responsibility and accountability for information security
in organizations
3. Be proficient in various forensic tools and usage of tools for disk imaging
and recovery processes
4. Design security procedures and policies
Course Contents:
Total
Module Course Topics Credits
Hours
Text/Reference Books:
Course Objective:
1. Describe the parts and functions of UAV & Indian Aviation regulations of UAV
2. Explain the concepts of Aerodynamics, Propulsion & Structures of Model
Aircrafts
3. Describe the working principle and components of UAV
4. Demonstrate the design process of UAV
5. Demonstrate design, fabrication and Flying of UAV
Learning Outcome:
Course Contents:
Total
Module Course Topics Credits
Hours
BASICS OF FLIGHT
Different types of flight vehicles, Components and functions
of an airplane Forces acting on Airplane Physical properties
I and structure of the atmosphere Aerodynamics, Airfoil 30 1
nomenclature, aerofoil characteristics, Angle of attack, Mach Hours
number, Lift and Drag, Propulsion and airplane structures.
Course Objective:
1. Identify basic concepts, terminology, theories, models and methods in the field of computer
vision.
2. Describe known principles of the human visual system.
3. Describe basic methods of computer vision related to multi-scale representation, edge detection
and detection of other primitives, stereo, motion and objectrecognition.
4. suggest a design of a computer vision system for a specific problem.
Learning Outcome:
Course Contents:
1. Forsyth, D. A. and Ponce, J., "Computer Vision: A Modern Approach", Prentice Hall, 2nd
Ed.
2. Richard Szeliki, R., "Computer Vision: Algorithms and Applications", Springer.
3. Hartley,R. and Zisserman, A.,"Multiple View Geometry in Computer Vision”,
Cambridge University Press.
4. Gonzalez, R. C. and Woods, R. E., "Digital Image Processing", Prentice Hall, 3rd Ed. Trucco,
E. and Verri, A., "Introductory Techniques for 3-D ComputerVision", Prentice Hall.
5. Pedram Azad, Tilo Gockel, R. Dillmann, Computer Vision: Principles and Practice, Elektor
Electronics Publishing, 2008.
6. Dana Harry Ballard, Christopher M. Brown, Computer vision, Prentice-Hall, 1982
GE33914 Recommender Systems Course
Objective:
Learning Outcome:
After completing the course, the students should be able to:
Course Contents:
Total
Module Course Topics Credits
Hours
Text/Reference Books:
1. Jannach D., Zanker M. and FelFering A., Recommender Systems: An
Introduction, Cambridge University Press (2011), 1.
2. Ricci F., Rokach L., Shapira D., Kantor B.P., Recommender Systems
Handbook, Springer (2011), 1.
3. Manouselis N., Drachsler H., Verbert K., Duval E., Recommender
Systems For Learning, Springer (2013), 1.
GE33921 Block Chain Technology Course
Objective:
1. Understand how block chain systems (mainly Bitcoin and Ethereum) work,
2. To securely interact with them,
3. Design, build, and deploy smart contracts and distributed applications,
4. Integrate ideas from block chain technology into their own projects,
5. Evaluate security, privacy, and efficiency of a given block chain system.
Learning Outcome:
After completing the course, the students should be able to:
Course Contents:
Total
Module Course Topics Credits
Hours
Text Books:
1. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller and Steven Goldfeder,
Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction, Princeton University Press
(July 19, 2016).
Reference Books
Objective:
Learning Outcome:
On the successful completion of the course, student should be able to:
Course Contents:
Total
Module Course Topics Credits
Hours
Text/Reference Books:
1. Zeigler B.P. Praehofer. H. and Kim I.G. "Theory of modeling and simulation", 2 nd Edition.
Academic press 2000
2. Shannon, R. E., “System Simulation: the Art and Science”, Prentice Hall Inc. 1990
GE33923 Embedded System Design Course
Objective:
Course Contents:
Text/Reference Books:
Objective:
1. Discuss the various algorithms to perform opinion mining, subjectivity and emotion
2. Identify the sentiment of any document, web-page or social networking
site
3. Recognize aspect-based opinion summary and entity extraction
4. Underline the opinion summarization using various approaches
5. Use the apt tools to perform sentiment analysis for any given application
Learning Outcome:
Course Contents:
Introduction
Text books:
1. Bing Liu, Sentiment Analysis and Opinion Mining: Morgan and Claypool publishers,
2012.
Reference books
1. Bo Pang and Lillian Lee, Opinion Mining and Sentiment Analysis: Now Publishers
Inc,2008.
2. Roy De Groot, Data mining for Tweet sentiment classification – Twitter sentiment,
2009
GE33931 - Evolutionary Multi-objective Optimization Course
Objective:
Learning Outcome:
After completing the course, the students should be able to:
1. Explain the difference between Single and Multi-Objective Optimization.
2. Discuss Classical Methods.
3. Explain the Evolutionary and Genetic Algorithms.
4. Differentiate between Elitist and Non Elitist Multi-Objective Evolutionary
Algorithms.
5. Explain the Constrained Multi-Objective Evolutionary Algo
6. Elaborate Salient Issues of Multi-Objective Evolutionary Algorithms:
7. Implement Applications of Multi-Objective Evolutionary Algorithms
Course Contents :
Total
Module Course Topics Credits
Hours
Text/Reference Books:
Course Objective:
1. Have a good working knowledge of basic bioinformatics tools and databases such as
GenBank, BLAST, multiple alignment, and phylogenetic tree construction.
2. Describe the contents and properties of the most important bioinformatic databases,
perform text- and sequence-based searches, and analyse and discuss the results in light
of molecular biological knowledge.
3. Explain the major steps in pairwise and multiple sequence alignment, explains the principle
for, and executes pairwise sequence alignment by dynamic programming.
4. Give examples of methods for describing and analysing genes, genomes and gene
expression
Course Contents:
Hours
Introduction
Text/Reference Books:
Course Objective:
Total
Module Course Topics Credits
Hours
Text/Reference Books:
Course Objective:
Learning Outcome:
After completing the course, the students should be able to:
1. Understand the concept of virtualization and how this has enabled
the development of Cloud Computing
2. Know the fundamentals of cloud, cloud Architectures and types of
services in cloud
3. Understand scaling, cloud security and disaster management
4. Design different Applications in cloud
5. Explore some important cloud computing driven commercial systems
Course Contents:
Total
Module Course Topics Credits
Hours
Text/Reference Books:
1. To introduce the concept of data mining with in detail coverage of basic tasks, metrics,
issues, and implication.
2. Understand and implement classical models and algorithms in data warehouses
and data mining
3. To introduce the concept of data warehousing with special emphasis on architecture
and design.
4. Characterize the kinds of patterns that can be discovered by association rule mining,
classification and clustering.
Learning Outcome:
After completing the course, the students should be able to:
1. Understand the functionality of the various data mining and data warehousing
components.
2. Appreciate the strengths and limitations of various data mining and data warehousing
models.
3. Explain the analyzing techniques of various data.
4. Describe different methodologies used in data mining and data
warehousing.
5. Compare different approaches of data warehousing and data mining with various
technologies.
Course Contents:
Total
Module Course Topics Credits
Hours
Text/ReferenceBooks:
1. Data Mining-Concepts and Techniques- Jiawei Han, Micheline Kamber, Morgan Kaufmann
Publishers, Elsevier, 2 Edition, 2006.
2. Introduction to Data Mining, Pang-Ning Tan, Vipin Kumar, Michael Steinbanch, Pearson
Education, 2016
3. Data Mining Techniques, Arun K Pujari, 3rd Edition, Universities Press, 2013
4. Data Ware Housing Fundamentals, Pualraj Ponnaiah, Wiley StudentEdition,2010
5. The Data Ware House Life Cycle Toolkit- Ralph Kimball, Wiley StudentEdition,2008
GE33942 Introduction to Drones Course
Objective:
1. To develop an overall understanding of UAS history, UAS types, and civilian small UAS
applications
2. To develop a firm understanding of UAS operational safety and rule-compliance
requirements
3. To understand basic UAS elements
4. To obtain basic knowledge of UAS aerodynamics and flight dynamics
5. To obtain basic knowledge of UAS guidance, navigation and control
6. To obtain basic knowledge of UAS payloads and the enabled ConOps (concept of
operations)
Learning Outcome:
At the end of the course, the student should be able to:
Course Contents:
1 Basics of Flights:-
Introductions , Understanding geospatial technology ,
UAS platform overview, UAS flight demo,
FAA regulations , UAS safety , Flight checklists,
Roles and responsibilities of personnel involved in flight
30Hours 1
operations ,Different types of flight vehicles, Components
and functions of an airplane , Forces acting on Airplane,
Physical properties and structure of the atmosphere,
Aerodynamics ,Airfoil nomenclature, aerofoil
characteristics, Angle of attack, Mach number, Lift and Drag
- Propulsion and airplane structures.
2 Unmanned Aerial Vehicle:- Difference between aircraft and
UAV, Parts and functions of Fixed, Rotorcraft and flapping
30Hours 1
wing UAV-various History of UAV’s, Types of
Drones, Applications and Uses. Characteristics of Multi
rotor vehicle, Fixed Wing vehicle, Flapping wing Vehicles
and their applications, Defense, Civil, Environmental
monitoring (physical, chemical and biological).
Reference Books:-
1. Andey Lennon “ Basics of R/C model Aircraft design” Model airplane news
publication, 2016
2. Theory, Design, and Applications of Unmanned Aerial Vehicles- by A. R. Jha Ph.D.
(Author), 2016.
3. Unmanned Aerial Vehicles- Editors: Valavanis, K., Vachtsevanos, George J. (Eds.), 2014.
4. Jane's Unmanned Aerial Vehicles and Targets -by Kenneth Munson (Editor), 2010
GE33943 Computer Forensics Course
Objective:
1. To know computer forensics and its issues, resources to forensics the data.
2. To understand the file logs, event file logs, working of the file system.
3. To understand the importance of identification of evidence with their impact, file
recovery process.
4. To understand the application of various computer forensics techniques in different
areas.
5. To know about the information hiding and steganography system.
Learning Outcome:
After completing the course, the students should be able to:
1. To create proper documentation over the forensics analysis process.
2. To describe the representation and organization of data and metadata in modern
computers.
3. To gain knowledge about the working process of Windows and Linux file systems and
its application.
4. To recover deleted files, extract hidden data, and also create disk images.
5. To develop effective solutions using various forensics techniques.
Course Contents:
Total
Module Course Topics Credits
Hours
Text/Reference Books:
1. Cory Altheide, Harlan Carvey, Digital Forensics with Open Source Tools, Syngress
imprint of Elsevier.
2. Bill Nelson, Amelia Phillips, Christopher Steuart, “Guide to Computer Forensics
and Investigations”, Fourth Edition, Course Technology.
3. MariE-Helen Maras, “Computer Forensics: Cybercriminals, Laws, and
Evidence”, Jones & Bartlett Learning; 2nd Edition, 2014.
GE33944 Augmented & Virtual Reality Course
Objective:
1. Introducing importance and applications of Augmented and Virtual Reality
Systems
2. To learn 3D User Interfaces and Hardware Technologies For 3d User
Interfaces.
3. To learn the difference between AR and VR.
Learning Outcome:
After completing the course, the students should be able to:
1. Understand Historical Overview, Current Trends and Future
applications of Immersive Technologies
2. Understand Overview of human physiology, psychology and
usability factors
3. Understand 3D interactive and procedural graphics
Course Contents:
Total
Module Course Topics Credits
Hours
Text/ReferenceBooks:
1. Alan B Craig, William R Sherman and Jeffrey D Will, “Developing Virtual Reality
Applications: Foundations of Effective Design”, Morgan Kaufmann, 2009.
2. Doug A Bowman, Ernest Kuijff, Joseph J LaViola, Jr and Ivan Poupyrev,
“3D User Interfaces, Theory and Practice”,
3. Burdea, Grigore C and Philippe Coiffet, “Virtual Reality Technology”, Wiley
Interscience, India, 2003.
GE33951: Wireless Sensor Networks
Course Objective:
1. Explain the fundamental concepts of WSN and its applications.
2. Explain basic technologies and systems.
3. Choose suitable MAC and routing algorithm and for wireless sensor actuator network.
4. Implement the elements of distributed computing and network protocol foran
application.
5. Suggest suitable hardware and software platforms for a application to setup
sensor networks.
Learning Outcome:
Course Contents:
Total
Module Course Topics Credits
Hours
Overview Of Wireless Sensor Networks: The vision of
Ambient Intelligence, Application examples, Types of
applications, Challenges for WSNs, Why are sensor
networks different?, Enabling technologies for wireless
sensor networks Challenges for Wireless Sensor Networks,
Enabling Technologies for Wireless Sensor Networks.
I Architectures: Single- Node Architecture - Hardware 30 Hours 1
Components, Energy Consumption of Sensor Nodes,
Operating Systems and Execution Environments, Some
examples of sensor nodes.
.
Network Architecture: Sensor Network Scenarios,
II optimization Goals and Figures of Merit, Design principles 30 Hours 1
for WSNs, Service interfaces of WSNs, Gateway Concepts.
Physical Layer - Wireless channel and communication
fundamentals, Physical layer and transceiver design
considerations in WSNs
MAC protocols - Fundamentals of (wireless) MAC
protocols, Low duty cycle protocols and wakeup concepts,
Contention-based protocols, Schedule-based protocols, The
IEEE 802.15.4 MAC protocol, How about IEEE 802.11
and Bluetooth. Link-layer protocols - tasks and
requirements, Error control, Framing, Link management
III 30 Hours 1
Course Objective:
1. To learn issues related to clock synchronization and the need for global state in distributed
systems.
2. Have knowledge and understanding of the main principles, techniquesand methods
involved when dealing with distributed systems.
3. To get the knowledge of how distributed objects communicate by means of remote
invocation.
4. To provide an in-depth overview of research topics in distributed systems.
5. To learn distributed mutual exclusion and Deadlock detection algorithms.
Learning Outcome:
After completing the course, the students should be able to:
1. Understand the foundations and issues of distributed systems.
2. Understand in detail how distributed applications work and what
requirements they aim to satisfy.
3. Understand the various synchronization issues and global state for distributed
systems.
4. Understand in detail how distributed applications work and what
architecture they exhibit.
5. Understand in detail how distributed applications work and what
techniques and infrastructures they are built upon.
Course Contents:
Text/Reference Books:
1. Singhal & Shivaratri, “Advanced Concept in Operating Systems”, McGraw Hill, 2001
2. Ramakrishna, Gehrke, “Database Management Systems”, McGrawhill, 2014
3. Coulouris, Dollimore, Kindberg, “Distributed System: Concepts and Design”,
Pearson Education. 2005
4. Tenanuanbaum, Steen, “Distributed Systems”, Prentice Hall of India, 2017
5. Gerald Tel, “Distributed Algorithms”, Cambridge University Press, 2010
GE33953 Gaming in Artificial Intelligence Course
Objective:
1. To understand the concepts of Artificial Intelligence.
2. To understand the issues and role of AI in the design of games.
3. To learn the designing and using path planning.
4. To develop the Capability for designing and implementing decision making and
coordinating action based on finite states, fuzzy sets, Markov sets, or rules.
5. To understand the concept of tactical and strategic AI.
Learning Outcome:
After completing the course, the students should be able to:
Total
Module Course Topics Credits
Hours
Text/Reference Books:
1. Artificial Intelligence for Games, Second Edition by Ian Millington and John Funge,
Morgan-Kaufman, 2009
2. Artificial Intelligence by Luger (Pearson Education), 2002
3. Russel Norvig, Artificial Intelligence: A Modern Approach, Pearson
Education, 2010
4. Introduction to AI & Expert System: Dan W.Patterson, PHI, 1990
5. Artificial Intelligence: Elaine Rich, Kevin Knight, Mc-GrawHill, 2008
GE33954 Pattern Recognition Course
Objective:
1. Explain classification, structural pattern recognition, and pattern classifier
combination techniques.
2. Analyze, and relate research in the pattern recognition area verbally and in writing.
Course Contents:
Text/Reference Books
1. Earl Gose, Richard Johnson baugh And Steve Jost, Pattern Recognition And Image
Analysis, Phi, 1996
2. Duda R.O. And Hart P.E., Pattern Classification And Scene Analysis, John Wiley, 2015
3. Fu. K. S., Syntactic Methods In Pattern Recognition, Academic Press, 1976