Syllabus
Syllabus
Syllabus
VISION
The Institute strives to inculcate a sound knowledge in Engineering along with realized social
responsibilities to enable its students to combat the current and impending challenges faced by our country
and to extend their expertise to the global arena.
MISSION
The Mission of Coimbatore Institute of Technology (CIT) is to impart high quality education and training
to its students to make them World-Class Engineers with a foresight to the changes and problems, and
pioneers to offer innovative solutions to benefit the nation and the world at large.
1
COIMBATORE INSTITUTE OF TECHNOLOGY
(Government Aided Autonomous Institution Affiliated to Anna University, Chennai)
VISION
Department of Computing-Artificial Intelligence and Machine Learning endeavours to make the students,
world class software engineers, cutting edge researchers in Artificial Intelligence (AI) and Machine
Learning (ML) and data engineers with prudence of pioneering solutions to challengers of the nation and
the world.
MISSION
M1: To impart strong conceptual knowledge along with intensive practical training and real time
industry/research project exposure to the students.
M2: To provide a learning ambience to enhance innovations, problem solving skills, leadership qualities,
team spirit and ethical responsibilities.
M3: To establish Industry Institute Interaction program to provide exposure to a) latest AI, ML tools and
technologies used in the IT organizations and enhance the entrepreneurship skills b) domain specific
problems that will benefit from AI, ML solutions.
2
COIMBATORE INSTITUTE OF TECHNOLOGY
(Government Aided Autonomous Institution Affiliated to Anna University, Chennai)
3
COIMBATORE INSTITUTE OF TECHNOLOGY
(Government Aided Autonomous Institution Affiliated to Anna University, Chennai)
4
COIMBATORE INSTITUTE OF TECHNOLOGY
(Government Aided Autonomous Institution Affiliated to Anna University, Chennai)
Semester I
Semester II
5
Semester III
Semester IV
6
Semester V
Semester VI
THEORY
Elective – I 3 0 0 3 PE
PRACTICALS
Total Credits 23
7
Semester VII
Total Credits 18
Semester VIII
THEORY
Elective II 3 0 0 3 PE
Elective III 3 0 0 3 PE
PRACTICALS
Elective Lab I 0 0 4 2 PE
Elective Lab II 0 0 4 2 PE
Total Credits 22
8
Semester IX
Elective – IV 3 0 0 3 PE
Elective -V 3 0 0 3 PE
Elective -VI 3 0 0 3 PE
PRACTICALS
Semester X
Total Credits 18
9
Professional Electives- AI & ML
19MAME01 Ethics in AI 3 0 0 3 PE
19MAME02 Healthcare Analytics 2 0 2 3 PE
10
Professional Electives -Economics, Finance and Management
11
Professional Electives-Laboratory
12
19MAM11 - TECHNICAL ENGLISH
Contact Hours
L T P C
2 0 0 2
PRE-REQUISITES
Consent of the Instructor
COURSE OUTCOMES
CO1: Given a social context compose appropriate dialogues using functional words, Construct Descriptive
paragraphs using sequencing words and unity of thought
CO2: Given a communication context, categorize the barriers to communication and formulate solutions.
Plan and present a 15-minute presentation on technical topic.
CO3: Given short conversations and monologues for listening, specify appropriate responses and construct
a summary.
CO4: Interpret the given technical graphical representation and compose passages. Summarize
and paraphrase technical text sin about 250 to 300 words.
CO5: Apply the rules of the grammar viz, word formation, nouns, adjectives, adverbs, tenses, concord,
phrasal verbs and idioms and use appropriate patterns in the given sentence.
13
LISTENING
Meaning and Art of Listening-Importance of Listening & Empathy in Communication – Reasons for Poor
Listening – Traits of a good listener – Listening modes – Short Dialogues and Conversation- Listening to
monologues.
(4)
SPEAKING
Introducing oneself – Exchanging personal information – Asking for and giving information – Expressing
likes and dislikes – Making requests – Agreeing and Refusing Requests – Complaining, apologizing –
Giving excuses, instructions and suggestions- Describing positive and negative features, favourite snacks,
vacation plans, technology, holidays, festivals, customs and special events - – Making comparisons –
Talking about food – giving step by step instructions, travel advice - Achieving Confidence, Clarity &
Fluency – Vocal Cues - Barriers to Speaking – Types of Speaking – Persuasive Speaking – Public Speaking
- Effective Presentation Strategies – Planning - Outlining & Structuring – Nuances of Delivery –
Controlling Nervousness & Stage Fright – Visual Aids in Presentation – Applications of MS Power Point.
(6)
Practical sessions based on the above syllabus
TOTAL HOURS: 30
TEXTBOOKS
1. Jack C Richerds, ‘Interchange – 2’, CUP, Fourth Edition, Chennai, 2015.
2. Meenakshi Raman, Sangeeta Sharma, ‘Technical Communication – Principles and Practice’,
Oxford University Press, New Delhi, 2015.
EXTENSIVE READING
1. Abhijit Acharjee & Rakesh Ramamoorthy, ‘Frontiers of Communication – An Anthology of
Short Stories and Prose’, CUP, 2018. (Only Essay Questions)
REFERENCES
1. Sudharshana N. P. and Savitha C, ‘English for Technical Communication’, CUP, 2016.
2. Sudharshana N. P. and Savitha C, ‘English for Engineers’, CUP, 2018
3. Ronald Carter, Michael Mc Carthy, ‘Cambridge Grammar of English’, Cambridge University
Press, 2011.
4. Michael Mc Carthy and Felicity O’Dell, ‘English Vocabulary in Use’, Cambridge University Press,
2012.
5. Mark Ibbotson, ‘Cambridge English for Engineering’, Cambridge University Press, 2012.
14
19MAM12 - APPLIED ALGEBRA
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Gain knowledge in sequences and series to analyse and study their area of applications
CO2: Become familiar in linear algebra concepts for data analysis in economics
CO3: Identify and understand linear algebra techniques which are applied in AI and ML
CO4: To incorporate the concepts of numerical solutions of linear systems which are widely used in
Computer Applications.
CO5: Apply difference equation concepts in data modelling.
15
TEXTBOOKS
1. Srimanta pal and Subodh C. Bhunia, “Engineering Mathematics”, Oxford University Press India,
1stEdition, 2015. (Para I, Para IV).
2. Biswa Nath Datta, “Numerical Methods for Linear Control Systems Design and Analysis”,
Elsevier Academic press, 2004. (Para III).
3. David. C. Lay, “Linear Algebra and its Applications”, Addision Wesley, 2003. (Para II).
4. Curtis F Gerald and Patrick O Wheatly, “Applied Numerical Analysis”, Pearson Education, 2002.
(Para V).
5. Mehta B.C, and G.M.K. Madani, “Mathematics for Economists", Sultan Chand & Sons, New
Delhi, 2006. (Para III)
REFERENCES
1. Erwin Kreyszig, “Advanced Engineering Mathematics”, Eight Edition, John Wiley & Sons Asia
Private Limited, 2008.
2. Grewal, B.S., “Higher Engineering Mathematics”, Fourth Edition, Khanna Publishers, 2007.
3. Piskunov, ‘Differential and Integral Calculus”, MIR Publisher Moscow, 1974.
4. Wylie C. R. & Barret L. C “Advanced Engineering Mathematics” Sixth Edition, McGraw Hill,
New York, 1995.
16
19MAM13 - FUNDAMENTAL STATISTICAL METHODS
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: To describe and discuss the key terminologies, concepts, statistical tools and techniques used in
statistical analysis.
CO2: To calculate and apply measures of central tendency and measures of dispersion for grouped and
ungrouped data.
CO3: To analyze probability and probability distributions and moments of random variables.
CO4: To understand basic concepts in sampling.
CO5: To analyze bivariate data using correlation and simple regression.
INTRODUCTION TO STATISTICS
Definition -Data –Qualitative and Quantitative – Measurement of Data –Nominal and Ordinal - Raw data
and grouped data – Primary and Secondary Data – Methods of Collection –Classification of Data –
Tabulation –Frequency Distribution and Various Diagrammatic and Graphical Representations of Data.
(8)
SUMMARY STATISTICS
Measures of Central Tendency: Arithmetic Mean, median, mode, geometric mean and harmonic mean
Merits and demerits- Relationship between mean, median and mode-Relationship AM, GM and HM,
computation of the measures for grouped and ungrouped data-Weighted arithmetic mean
Measures of Dispersion: Range, Mean Deviation and Standard Deviation – Coefficient of Variation and
its Use- Quartiles and inter quartile range-Quintiles deciles and percentiles- Moving averages -Skewness
and Kurtosis and their uses.
(10)
PROBABILITY
Deterministic and Random Experiments –Definition of Sample Space and Events- Classical and
Axiomatic Definitions- Properties of Probability- Addition Theorem- Conditional Probability and
Multiplication Theorem of Probability- Definition of Independent Events – Random Variables and their
Probability Distributions-Discrete and Continuous Random Variables Probability Mass Function and
Cumulative Distribution Functions -Definition – Mathematical Expectation-Mean and Variance – Mean
and Variances of Linear Combination of Random Variables – Chebyshev’s Theorem- -Important Discrete
Distributions-Discrete Uniform Distribution, Binomial, Poisson, -Continuous Distributions: Probability
Density Functions and Cumulative Probability Distributions-Normal Distribution and its Properties and
Applications.
(12)
SAMPLING
Population and Sample- Sampling and its need –Sampling vs. Complete Enumeration –Parameter and
Statistics-Probability Sampling and - Random Sampling- Simple Random Sampling, Lottery Method and
17
Random Number Table Method- Stratified Random Sampling- Sampling distribution and standard error of
a statistic.
(8)
CORRELATION AND REGRESSION
Definition of correlation - Scatter plot –Karl Pearson’s correlation coefficient its properties– Definition of
Regression – Simple Regression-Regression of x on y and y on x.
(7)
TOTAL HOURS: 45
TEXTBOOK
1. S.C. Gupta, ‘Fundamentals of Statistics’, 7th and Enlarged Edition, Himalaya Publishing House,
2014.
REFERENCES
1. Ronald E.Walpole, Raymond H. Myers, Sharon L. Myers and Keying Ye , ‘Probability and
Statistics for Engineers and Scientists’, Seventh Edition, Pearson Education, Inc. ,2002.
2. D M Levine T C Krehbiel and M L Berensen, ‘Business Statistics: A First Course’, Pearson
Education, 2003.
18
19MAM14 - DATA STRUCTURES
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Understand the basics programming constructs of C language and write C programs to solve
problems.
CO2: Recognize the representation of arrays, stacks, queues and linked list in memory and demonstrate its
use in algorithms.
CO3: Solve computational problems using data structures such as arrays, stacks, queues and singly linked
list.
CO4: Compare and use appropriate data structures in programming real world applications.
CO5: Learn and apply basic searching and sorting techniques in applications.
INTRODUCTION TO C
Overview of C - Basic data types - Identifier Names - Variables and Initialization – Constants - Operators
– Expressions – Input/Output. Control Statements: Selection statements - Iteration statements - Branch
statements - Expression statements. Functions: General form of a function - Accessing a function - Scope
of a function – Passing Arguments to function - function prototype - Call by value - Call by reference -
Recursion. Arrays: Single Dimensional arrays - Multi Dimensional arrays - Passing arrays to a function -
Arrays and Strings. Pointers: Definition - Pointer type declaration - Pointer assignment - Pointer
initialization - Pointer variables - Pointer operators –Structures: Defining and Accessing Structures.
(12)
BASIC CONCEPTS
Algorithm Specification - Data Abstraction - Primitive Data Structures - Iterative and Recursive algorithms
- Performance Analysis: Space Complexity, Time Complexity, Asymptotic Notation.
(6)
ARRAYS
Array as an Abstract Data Type (ADT) – Implementation of One-Dimensional Array, Two Dimensional
Arrays - Sparse Matrices-Applications- Representation of Multidimensional Arrays -String ADT.
(8)
STACKS AND QUEUES
Stack Primitive Operations- Array Representation and Implementation-Applications: Subroutine Handling,
Recursion and Expression Processing. Queue Operations-Sequential Implementation - Circular Queues –
Dequeues-Applications.
(8)
LINKED LISTS
Singly linked lists- Operations- Applications
(4)
19
SEARCHING AND SORTING
Linear Search and Binary Search-Selection Sort-Insertion Sort and Bubble Sort.
(7)
TOTAL HOURS: 45
TEXTBOOKS
1. Ellis Horowitz, Sartaj Sahni, Anderson-Freed, ‘Fundamentals of Data Structures in C’, University
Press, Second Edition, 2008.
2. Yashavanth Kanetkar, ‘Let Us C’, BPB Publications, Fifteenth Edition, 2002. (Para I)
REFERENCES
1. Byron Gottfried, ‘Schaum’s Outline of Programming with C’, McGraw-Hill Fourth edition 2018
2. Mark Allen Weiss, ‘Data Structures and Algorithm Analysis in C’, Pearson Edition, 2014.
3. Aaron M. Tenenbaum, Yedidyah Langsam and Moshe J.Augenstein, , ‘Data structures using C &
C++’, Prentice Hall, 2012.
4. Krishnamoorthy R, ‘Data Structures using C’, Mc Graw-Hill Education Pvt. Ltd, 2010.
20
19MAM15 - THEORY OF PROGRAMMING LANGUAGES
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Identify the paradigms of programming languages.
CO2: Apply the concepts of imperative programming in program development
CO3: Analyze various components of object-oriented programming and apply them to real-world
applications.
CO4: Understand the concepts of functional, logical and assembly language programming and relate them
to apply in various programming languages.
CO5: Identify the suitable programming language and apply the concepts to solve the given real-world
problems.
21
Variables and Quantifiers - Special variable formulae involving Quantifiers- Theory of Inference for the
Predicate Calculus.
(6)
Computing with Relations. Prolog: Data Structures-Programming Techniques-Control.
(3)
ASSEMBLY LANGUAGE PROGRAMMING
Introduction to 8085 Instructions: Data Transfer Operations-Arithmetic Operations-Logic Operations-
Branch Operations-Writing Assembly Language Programs.
(6)
TOTAL HOURS: 45
TEXTBOOKS
1. Ravi Sethi, ‘Programming languages: Concepts and Constructs’, Second Edition, Addison Wesley
1995. (Para II-VI: Chapters 1, 3 to 11).
2. E.V. Krishnamoorthy, ‘Introduction to Theory of Computation’, East West Press, 1983. (Para I).
3. Ramesh Gaonkar, ‘Microprocessor Architecture, Programming and Applications with the 8085’, Sixth
Edition, PENRAM International Publishing Pvt. Ltd. (Para VII)
REFERENCES
1. Ellis Horowitz, ‘Fundamentals of Programming Languages’, Springer-Verlag, 1983.
2. Terrence W Pratt, Marvin Zelkowitz, ‘Programming Languages Design and Implementation’, Pearson
Education, Fourth edition, 2003.
22
19MAM16 - ALGEBRA AND STATISTICS LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
19MAM12, 19MAM13
ASSESSMENT: PRACTICALS
COURSE OUTCOMES
CO1: Solve problems in linear algebra using Scilab scripts and commands
CO2: Compute measures of central tendency and dispersion using Spreadsheets in built functions
CO3: Graphically represent statistical data using Spreadsheet tools
CO4: Analyze Bi-variate data using Spreadsheet's Data Analysis Tools
CO5: Develop skills in writing script files and analyze data using R and Spreadsheet's Data Analysis Pack
CONCEPTS TO BE COVERED
1. Scilab/R Fundamentals
2. Algebraic operations on matrices, Transpose of a matrix, Determinants, inverse of a matrix,
3. Solving System of linear equations and consistency,
4. Row reduced echelon form and normal form.
5. Eigen values, Eigen vectors, Rank of a matrix.
6. Solving algebraic and system of equations.
7. Estimating numerical values for given data by means of interpolation.
8. Perform data manipulation using spreadsheet.
9. Perform graphical and diagrammatic representation of statistical data, like bar diagram, pie,
histogram and line diagram
10. Construct the pivotal tables and apply statistical functions to calculate the descriptive statistics
11. Practice the theory behind the descriptive statistics, like measures of central tendency, dispersion,
skewness and kurtosis
12. Apply and implement the theory of probability in various applications
13. Simple probability and random sampling
14. Practicing the simple correlation and regression techniques.
REFERENCES
1. K.N.Berk and P.Carey, Data Analysis with Microsoft Excel, Brooks/Cole, USA,2010
2. Gilberto E.Urroz, Matrices and Linear Algebra with SCILAB,
http://www.tf.uns.ac.rs/~omorr/radovan_omorjan_003_prII/s_examples/Scilab/Gilberto/scilab5a.
pdf
3. Graeme Chandler and Stephen Roberts, Scilab Tutorials for Computational Science,
http://paginapessoal.utfpr.edu.br/previero/calculo-numerico-ma64a-em41-e-em42/informacoes-
da-disciplina/Scilab_Tutorials.pdf
23
19MAM17 - DATA STRUCTURES LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: PRACTICALS
COURSE OUTCOMES
CO1: Solve the given problem by devising an algorithm and implementing it into a program.
CO2: Develop reusable and efficient solutions using functions, pointers and structures.
CO3: Write programs to perform operations on strings using library functions.
CO4: Implement stacks, queues and singly linked list using Arrays
CO5: Write programs to implement linear search, binary search and sorting algorithms like selection,
insertion and bubble sort.
CONCEPTS TO BE COVERED
Basic Programming
1. Simple programs to understand the concepts of data types.
2. Writing algorithms and converting them to programs to get familiarity on using conditional,
control and Iterative statements.
3. Programs on recursion
4. Programs on string manipulations
5. Programs on one- and two-dimensional arrays
6. Declaring and defining functions, passing arguments, calling functions
7. Simple programs using pointers-variables and expressions
8. Creating and accessing structures
Data Structures
1. Sparse and dense matrix operations using arrays.
2. Stack implementation and operations using arrays.
3. Queue implementation and operations using arrays.
4. Singly linked list implementation and operations using arrays
5. Programs on linear search and binary search
6. Programs on selection sort, insertion sort and bubble sort
REFERENCES
1. Yashavanth Kanetkar, ‘Let Us C’, BPB Publications, Fifteenth Edition, 2002.
2. Richard F. Gilberg and Behrouz A. Forouzan, ‘Data Structures- A Pseudocode Approach with C’,
Cengage Learning, Second Edition, 2005.
3. Deitel H. M. and Deitel P. J., ‘C - How to Program’, Prentice-Hall, Fifth Edition, 2006.
24
19MAM18 - PYTHON PROGRAMMING LAB
Contact Hours
L T P C
1 0 4 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: PRACTICALS
COURSE OUTCOMES
CO1: To write, test, and debug simple Python programs.
CO2: To implement Python programs using conditional, control and repetition statements.
CO3: Use functions and recursive functions for structuring Python programs.
CO4: Represent compound data using lists, tuples, dictionaries.
CO5: Read and write data from or to files in Python.
CONCEPTS TO BE COVERED
1. Naming conventions, basic operators, data types
2. Use of conditional, control and repetition statements
3. String operations and using string functions
4. Demonstrate use of Lists and Tuples
5. Demonstrate use of Dictionaries
6. Implement simple search and sort techniques
7. Demonstrate usage of basic regular expression
8. Demonstrate use of advanced regular expressions for data validation.
9. Implement linear data structures – arrays, stack and queue
10. Read and write into a file.
11. Create Comma Separate Files (CSV), Load CSV files into internal Data Structure
12. Demonstrate Exceptions in Python
13. Use of Python Libraries such as numpy, pandas, matplotlib, etc.
25
19FYEL11 - EMPLOYABILITY SKILLS
Contact Hours
L T P C
0 0 2 1
COURSE OUTCOMES
CO1: Given strictly timed objective questions on logical reasoning and verbal ability solve within the
given time.
CO2: For a given specific speaking task on topics like describing a picture, movie reviews, storytelling,
and extempore generate ideas and speak confidently.
CO3: For a given social situation viz., greeting, thanking, congratulating, apologizing and
giving directions, demonstrate command over conversations using appropriate functional
expressions.
CO4: For a given 2 to5 minutes speaking activity like Extempore and Debate, produce language structures
accurately and fluently. For a given technical topic, prepare a power point presentation for 15 minutes.
CO5: Given short conversations and monologues for listening, specify appropriate responses
and construct a summary. Construct dialogues for a given social scenario and interpret the given graphic
information and write creative paragraphs.
26
19MAMLE01- PROFESSIONAL ENGLISH
Contact Hours
L T P C
2 0 0 2
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Apply the rules of grammar namely Active and Passive voice, Direct and Indirect speech, Purpose
and Function, Articles and Prepositions, Conjunction, Conditional sentences and use suitable patterns in a
given sentence or passage.
CO2: Construct appropriate responses to greet, transfer, place the caller on hold, enquires, call backs,
unintentional disconnects, interruptions, using suitable language and telephoning etiquettes. Given a
business communication scenario construct a suitable strategy and action plan using specific negotiation
tactics consistent with the objectives of the negotiator.
CO3: Given a communication context, specify the type and barriers to listening provide solutions and
justify. For a given passage note the important points and summarize it.
CO4: Given a business communication scenario, compose a Business Letters, Memo, Emails, Reports,
Technical Proposals, Instructions and Recommendation and checklist using appropriate language and
format. For a given job requirement, prepare a job application letter with resume.
CO5: Generate valid points for and against the topic and present them with appropriate group behavior
for a given HR topic and for any job requirement, plan and prepare for a 20 min HR mock interview.
(6)
BUSINESS ENGLISH
Telephoning Skills: Understanding Telephone communication – Telephonic Conversations and Etiquettes
- Handling Calls – Leaving a Message – Making Requests –Asking for and Giving Information – Giving
Instructions - Negotiations: Types of Negotiation –Six Basic Steps of Negotiations – Informal and formal
Negotiations.
(4)
READING
Summarizing – SQ3R Reading Technique – Note Making: Outline/Linear Method- Sentence Method –
Schematic/Mapping Method – Understanding Discourse Coherence – Cloze Comprehension – Critical
Reading: Creative and Critical Thinking- Reading proverbs, online advice forum.
(4)
WRITING
Letter Writing – Business Letters – Cover Letters – Resumes – Memos – Emails – Reports – Technical
Proposals – Instructions & Recommendations – Technical Description – Checklist - Writing a paragraph –
Writing a description of a person’s past present and future, recent experiences, movie review, list of roles
27
– Writing a job application letter, Advice column list - Writing a guide book introduction – Writing about
people response to a survey.
(6)
LISTENING
Stress and Intonation -Types of Listening – Barriers of Effective Listening – Listening for Generic Content
and Specific Information - Listening & Note Taking – Intensive Listening - Listening to Descriptions -
Listening to predicaments, call in radio show and excuses.
(4)
SPEAKING
Group Communication: Forms of Group Communication – Using Body Language in Group – Discussions
– Group Discussions - Organizational GD – GD as a Part of Selection Process – Meetings – Conferences
– Symposia & Seminars – Interviews: Objectives of Interviews – Types of Interviews – Job Interviews –
Media Interviews – Press Conference - Describing abilities and Skills, acceptable and prohibited behaviour
in different situations, Personality Traits, Countries, a predicament, Recent past events and experiences,
movies and books – Giving Advice and suggestions- Making polite requests – Making invitations and
excuses- Speculating about past and future events.
(6)
Practical sessions based on theory
TOTAL HOURS: 30
TEXTBOOKS
1. Jack C Richerds, ‘Interchange – 2’, Fourth Edition, Cambridge University Press, 2015.
2. Meenakshi Raman, Sangeeta Sharma, ‘Technical Communication – Principles and Practice’,
Oxford University Press, 2015.
REFERENCES
1. Sudharshana N. P and Savitha C, ‘English for Technical Communication’, CUP, 2016.
2. Sudharshana N. P and Savitha C, ‘English for Engineers’, CUP, 2018.
3. Ronald Carter and Michael Mc Carthy, ‘Cambridge Grammar of English’, Cambridge University
Press, 2011.
4. Michael Mc Carthy and Felicity O’Dell, ‘English Vocabulary in Use, Cambridge University Press,
2012.
5. Mark Ibbotson, ‘Cambridge English for Engineering’, Cambridge University Press, 2012.
28
19FY22F - BASIC FRENCH
Contact Hours
L T P C
2 0 1 2
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Understand the basics of the Language
CO2: Write simple narration and description and speak to communicate idea.
CO3: Demonstrate confidence in Social Interactions.
INTRODUCTION
(2)
UNITÉ-1
Faire connaissance - inviter et répondre à une invitation - décrire les personnes- articles définis et indéfinis
- genre etnombre des noms et des adjectifs- interrogation et négation - conjugaison du présent. Paris
monuments et lieux publics - la vie de quatre parisiens de professions différentes.
(7)
UNITÉ-2
Exprimer l' ordre et l'obligation demander et commander - evaluer et apprécier- féliciter et remercier -
articles partitifs -adjectifs démonstratifs et possessifs prépositions et adverbes de quantité et de l'imperatif
verbes pronominaux - une région deFrance la Bourgogne - vie quotidienne à la compagne.
(6)
UNITÉ-3
Raconter et rapporter - donner son avis - se plaindre et réprimander - expliquer et justifier - pronoms
compléments -futur proche - passé composé et imparfait. Plusieurs régions de France - différents univers
sociaux.
(7)
UNITÉ-4
Demander l'autorisation - interdire - formuler des projects - discuter et débattre. Pronoms < en > et < y > -
pronoms relatifs et superlatifs - conjugaison du futur - présent continu et passé récent.La vie administrative
et régionale - problems economiques et écologiques - traditions et modernit.
(8)
29
REFERENCES
1. Dondo Modern French Course ---Mathurin Dondo.
2. Modern French Grammar---Margaret Lang and Isabelle Perez.
30
19FY22G - BASIC GERMAN
Contact Hours
L T P C
2 0 1 2
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Understand the fundamental concepts of the Language
CO2: Write simple narration and description and speak to communicate idea.
CO3: Demonstrate confidence in Social Interactions.
EINFUHRUNG
THEMA
Begegnungen
Im Supermarkt
GRAMMATIK-I
GRAMMATIK-II
31
Artikel als Pronomen Dative - Erganzung : Personalpronomen und Ortsangaben; Imperativ Modalverben;
Ortsangaben; Richtungsangaben; Zeitangaben; Ordinalzahlen Possessiv - Artikel; trennbare und nicht
trennbareVerben; Wechselprapositionen
(8)
Practical sessions based on theory
(15)
TOTAL HOURS: 45
TEXTBOOK
32
19MAM21 - APPLIED CALCULUS
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
19MAM12
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Become familiar in calculus tools to solve problems in optimization
CO2: Understand the concepts of integral calculus with a view towards applications.
CO3: Apply differential equations modeling.
CO4: Gain knowledge in Fourier series to analyze and study pattern recognition.
CO5: Get in-depth knowledge in numerical methods which are widely used in computer applications.
DIFFERENTIAL CALCULUS
Rate of change and limits-rules for finding limits-extensions of the limit concept-continuity-tangent lines-
the derivative of function--related rates of change-extreme values of functions-the mean value theorem-
first derivative test for local extreme values.
(7)
APPLICATIONS OF DIFFERENTIAL CALCULUS
Curvature–Evolutes–Envelopes–partial differentiation-Jacobians-Functions of several variables–-Hessian
Matrix-Expansions and extreme values– Constrained extrema using Lagrange’s multiplier method.
(8)
INTEGRAL CALCULUS
Integration–definition and geometrical meaning-double integrals as volumes-changing the order of
integration, triple integrals in rectangular coordinates-applications to areas and volumes--compound
interest. Special Functions: Beta and Gamma Functions- Double and triple integrals – Applications: Area
– Volume.
(7)
FOURIER SERIES
Dirichlet’s conditions-Full range series-Half range series-Complex form of series-Parseval’s identity –
Harmonic analysis.
(8)
ORDINARY DIFFERENTIAL EQUATIONS
Formation of differential equations-geometrical interpretation of ODE- Higher order differential equations
with constant coefficients-Euler Cauchy Type-Applications in microeconomics.
(7)
NUMERICAL METHODS
Solution of Algebraic and transcendental Equations-Bisection Method and Newton Raphson Method--Real
World Applications of Newton Raphson Method: Finding the Break Even Point of a Firm and finding the
interest rates of Annuities -Interpolations-Newton’s and Lagrange’s method. Numerical solution of system
of Equations. Numerical Integration-Numerical solution of ordinary differential equation of First order -
RK method of order four-Milne Thomson method.
33
(8)
TOTAL HOURS: 45
TEXTBOOKS
1. Thomas & Finney, ‘Calculus’, Pearson Education, Ninth Edition, 2006. (Para I,II, & III).
2. Srimanta Pal and Subodh C. Bhunia, ‘Engineering Mathematics’, Oxford University Press India,
First Edition, 2015. (Para IV, Para V).
3. Mehta B.C, and G.M.K. Madani, ‘Mathematics for Economists’, Sultan Chand & Sons, 2006. (Para
II, Para III, Para V)
4. Kandasamy P.et.al., ‘Numerical Methods’, First Revised Edition, Tata McGraw Hill Publishing
Company Ltd., 2008. (Para VI)
REFERENCES
1. Erwin Kreyszig, ‘Advanced Engineering Mathematics’, Eighth Edition, John Wiley & Sons Asia
Private Limited., 2008.
2. Grewal, B.S., ‘Higher Engineering Mathematics’, Fourth Edition, Khanna Publishers, 2007.
3. Piskunov, ‘Differential and Integral Calculus, MIR Publishers, Moscow 1974.
4. Wylie C. R. & Barret L. C, ‘Advanced Engineering Mathematics’, Sixth Edition, Mc
Graw Hill, New York, 1995.
5. Steven C. Chapra and Raymond P. Canale, ‘Numerical Methods for Engineers’, Sixth Edition,
McGraw Hill, 2002.
34
19MAM22 - PROBABILITY DISTRIBUTIONS AND APPLICATIONS
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
19MAM13
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: To understand the properties and applications of advanced probability distribution.
CO2: To determine the moments and moment generating functions of important probability distributions
and to impart knowledge on the functions of random variables.
CO3: To provide a good knowledge on the various methods of estimation of parameters.
CO4: To apply various tests of statistical hypothesis on a given statistical data.
CO5: Demonstrate the use and applications of Bayesian Analysis
PROBABILITY DISTRIBUTIONS
Discrete Random Variables: Geometric, negative binomial distributions and hyper geometric distributions.
Continuous Probability Distributions: uniform, exponential, gamma, Beta, Chi-square log normal
distributions and Weibull distributions and their properties.
(8)
FUNCTIONS OF RANDOM VARIABLES
Moments and Moment Generating functions of important distributions-Transformations of Variables and
finding their distributions -method of direct transformation and method of moment generating functions- -
Joint and Marginal Probability mass functions (for discrete) and density functions(for continuous).
Conditional probability distributions-conditional mean and variance-Independence of random variables.
(10)
ESTIMATION
Estimation of parameters using method of moments- Maximum Likelihood Point Estimation(MLE) –
Properties of estimators-Unbiasedness, minimum variance, efficience and sufficience-Mean Square Error-
Asymptotic properties-consistency-Fisher Information and Cramer-Rao’s Inequality – Interval Estimation.
(8)
SAMPLING AND TESTS OF HYPOTHESIS
Derivation of sampling distribution of mean and S2- t-distribution and F-distribution-Central limit
theorems- Test of significance – Basic concepts – null hypothesis – alternative hypothesis – level of
significance – Standard error and its importance – steps in testing-One and two tailed tests-The use of p-
values for Decision making – Large sample tests and Small sample tests for : Single sample: Testing on a
single mean with variance known and variance unknown-Two samples-tests on means –One sample test
on a single proportion-two sample tests of two proportions-Goodness of Fit tests, One and two sample tests
concerning variances-Tests of independence for categorical data, tests for homogeneity.
(12)
BAYES THEOREM AND BAYESIAN STATISTICS
Partition of a sample space and Bayes Theorem (with proof)-Simple applications –Bayesian Concepts-
Subjective Probability- Conditional Perspective-Bayesian Inferences-Prior and posterior distributions-
Point Estimation Using the Posterior Distribution- Bayesian Interval Estimation-Bayes Estimates using
35
Decision Theory framework: Bayes estimate under squared error loss function and absolute error loss
function.
(7)
Total: 45 Hours
TEXTBOOKS
1. S.C. Gupta, ‘Fundamentals of Statistics’, Seventh and Enlarged Edition, Himalaya Publishing
House, 2014. (Para I-IV).
2. Ronald E.Walpole, Raymond H. Myers, Sharon L. Myers and Keying Ye, ‘Probability and
Statistics for Engineers and Scientists’, Seventh Edition, Pearson Education, Inc. , 2002. (Para
V).
REFERENCES
1. S.C.Gupta and V.K.Kapoor, ‘Fundamentals of Mathematical Statistics’, Tenth Revised Edition,
Sultan Chand & Sons, 2002.
2. Meyer, Paul L., ‘Introductory Probability and Statistical Applications’, Addison Wesley, Second
Edition, 1970.
3. Anthony O’Hagan and Bryan R. Luce, ‘A Primer on Bayesian Statistics in Health Economics and
Outcomes Research’, MEDTAP International, Inc., 2003.
4. Michael Baron, ‘Probability and Statistics for Computer Scientists’, CRC Press, 2014.
5. Gianluca Bontempi, ‘Handbook Statistical Foundations of Machine Learning’, 2017
36
19MAM23 - COMPUTER SYSTEM ARCHITECTURE
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Understand the basic structure and operation of digital computer
CO2: Perform arithmetic operation on the various number systems and conversions among them
CO3: Apply Boolean algebra to solve logic functions.
CO4: Understand the basics of pipelining and I/O interfaces.
CO5: Evaluate the performance of memory systems.
CO6: Understand parallel processing architectures and GPUs.
37
PARALLELISIM
Parallel Processing Challenges – Flynn‘s classification: SISD, MIMD, SIMD, SPMD, and Vector
Architectures – Multi-Core Processors and other Shared Memory Multiprocessors – CUDA Basics-GPU
versus CPU-Overview of GPU Architecture-GPU as a Co-processor.
(7)
TOTAL HOURS: 45
TEXTBOOKS
1. David A. Patterson and John L. Hennessy, Computer Organization and Design: The
Hardware/Software Interface, Fifth Edition, Morgan Kaufmann / Elsevier, 2014. (Para I,V,VI).
2. A.P.Godse and Dr. D.A. Godse, ‘Digital Electronics’, Technical Publications, Pune, 2008. (Para
II, III, IV).
3. William Stallings, Computer Organization and Architecture – Designing for Performance, Tenth
Edition, Pearson India Education Services Pvt. Ltd., 2017. (Para VII)
REFERENCES
1. Carl Hamacher, Zvonko Vranesic, Safwat Zaky and Naraig Manjikian, ‘Computer Organization
and Embedded Systems’, Sixth Edition, Tata McGraw Hill, 2012.
2. John P. Hayes, ‘Computer Architecture and Organization’, Third Edition, Tata McGraw Hill, 2012.
38
19MAM24 - ADVANCED DATA STRUCTURES
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
19MAM14
COURSE OUTCOMES
CO1: Implement the linked representation and traversal operations on singly and doubly linked list.
CO2: Gain knowledge on non-linear data structures such as trees and graphs and use them in programming
applications.
CO3: Solve problems using data structures such as AVL search trees, heaps and m-way search trees.
CO4: Apply appropriate sorting techniques for solving real-time problems.
CO5: Understand the working principle of hashing and collision resolution techniques
LINKED LISTS
Doubly Linked List-Circular Linked List-Traversals-Applications: Addition of Polynomials, Sparse
matrix Representation-Linked Stacks-Linked Queues.
(4)
TREES AND BINARY SEARCH TREES
Representation of Trees-Binary Trees: Representation, Operations, Traversals, -Threaded Binary Trees.
Binary Search Trees: Searching, Insertion and Deletion of elements, Analysis-Forests.
(6)
GRAPHS
Graphs - Introduction - Isomorphism - Sub graphs - Walks, Paths, Circuits- Euler Graphs -Hamiltonian
Paths and Circuits. Elementary Graph Operations: Depth First Search, Breadth First Search, Connected
Components, Spanning Trees. Minimum Cost Spanning Trees: Kruskal’s Algorithm-Prim’s Algorithm-
Shortest Paths Algorithms: Single Source, Bellman Ford algorithm, All Pairs Shortest Paths.
(8)
HEAPS AND FORESTS
Priority Queues-Max Heap-Transforming a Forest into Binary Tree-Forest Traversals.
(5)
ADVANCED BINARY SEARCH TREES
AVL Trees: Balancing Trees- Searching, Insertion and Deletion of Elements-AVL Rotations, Analysis.
Splay Trees: Notations, Analysis.
(7)
MULTIWAY TREES
m- Way Search Trees - B Trees - Red Black Trees - B+ Trees.
(5)
SORTING
Shell Sort-Quick Sort-Merge Sort-Heap Sort-Radix Sort-Time Complexity Analysis.
(6)
39
HASHING
Static Hashing: Hash Tables, Hash Functions-Dynamic Hashing-Collision Resolution: Open addressing -
Linear Probing and Quadratic Probing.
(4)
TOTAL HOURS: 45
TEXTBOOK
1. Ellis Horowitz, Sartaj Sahni, Anderson-Freed, ‘Fundamentals of Data Structures in C’, University
Press, Second Edition, 2008.
REFERENCES
1. Thomas H.Cormen, Charles E.Leiserson, Ronald L. Rivert, Clifford Stein, ‘Introduction to
Algorithms’, Second Edition, Prentice Hall of India, Publications, New Delhi, 2007.
2. Mark Allen Weiss, ‘Data Structures and Algorithm Analysis in C++’, Addison Wesley, 2014.
3. Anany Levitin, ‘Introduction: The Design & Analysis of Algorithm’, Pearson Education Inc., 2003.
4. S.K.Basu, ‘Design Method & Analysis of Algorithm’, PHI, 2005.
40
19MAM25 - CALCULUS AND PROBABILITY LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
19MAM21,19MAM22
COURSE OUTCOMES
CO1: Solve Differential Equations of first and second order using R commands
CO2: Understand properties of probability distributions using R programming and MS-Excel Tools
CO3: Calculate definite integrals numerically using Trapezoidal and Simpson's methods
CO4: To perform statistical hypothesis testing using R programming.
CO5: To analyze the data using Bayesian data analysis technique with the aid of R programming.
CONCEPTS TO BE COVERED
1. Extreme Value of functions-finding local extrema
2. Numerical differentiation based on Newton’s formula, Lagrange’s formula.
3. Functions of several variables–-Hessian matrix-Expansions and extreme values– Constrained
extrema using Lagrange’s multiplier method-applications
4. Numerical integration-Trapezoidal and Simpson’s 1/3 rules.
5. Solution of Ordinary Differential Equations,
6. Discrete and Continuous probability distributions
7. Joint Probability Distributions
8. Estimation of population parameters
9. Statistical Hypothesis testing- Large Sample tests
10. Statistical Hypothesis testing – Small Sample tests
11. Bayesian Data Analysis
41
19MAM26 - PROGRAMMING PARADIGM LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
Consent of the Instructor
COURSE OUTCOMES
CO1: Understand the usage of different programming constructs of procedural programming
CO2: Apply the principles of object oriented programming to solve problems
CO3: Implement the concepts of logic programming and solve real world problems.
CO4: Develop solutions for problems using the concepts of functional programming paradigm.
CO5: Given a problem, develop solutions for it by applying all the four programming paradigms and
compare it.
CONCEPTS TO BE COVERED
1. Illustrate concepts of :
• Structured programming,
• Data and control abstractions,
• Programming with assertions (Programing with invariants)
2. Illustrate ideas of
• Typing, expressions,
• Pure functions,
• Recursion,
• Higher order functions,
• Encapsulation,
• Inheritance
Using
• Applicative programming and Python
• Object oriented programming paradigm
REFERENCES
1. Harold Abelson, Gerald Jay Sussman and July Sussman, Structure and Interpretation of Computer
Programs, 2nd edition, The MIT Press, 1996.
2. David A. Watt, Programming Language Concepts and Paradigms, Prentice-Hall, 1990.
3. Rajeev Sangal, Programming Paradigms in Lisp, McGraw Hill, 1991.
4. Ravi Sethi Concepts in Programming Languages
42
19MAM27 - ADVANCED DATA STRUCTURES LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
19MAM14
ASSESSMENT: PRACTICALS
COURSE OUTCOMES
CO1: Implement linked representation of linked list and its operations.
CO2: Implement and compare the complexities of various sorting algorithms including bubble sort, heap
sort and quick sort.
CO3: Ability to define and apply tree data structures and binary search trees for real time applications.
CO4: Perform operations on graphs and heaps for real time problems.
CO5: Implement shortest path algorithms and hashing techniques for a given application.
CONCEPTS TO BE COVERED
1. Linked Lists Implementation -Singly linked lists, Doubly linked lists and Circular linked lists.
2. Programs on linked stacks.
3. Programs on linked queues.
4. Sorting algorithms-Bubble sort, Insertion sort, Selection sort, Quick sort, Heap sort and Radix sort.
5. Implementation of tree data structure and traversals
6. Applications of Binary search trees and its operations
7. Operations on AVL tree
8. B-Tree and its operations
9. Problems related to graphs and graph traversals
10. Construction of heap & its operation
11. Construction of minimum spanning tree algorithm.
12. Implementation of shortest path algorithms
13. Implementation of hashing techniques.
REFERENCES
1. Richard F. Gilbery, Behrouz A.Forouzan, ‘Data structures - A Pseudocode Approach with C’,
Thomson Asia Pvt. Ltd. ,2002.
2. Yashwant Kanetkar, ‘Data Structures Through C’, Ninth Edition, BPB Publication, 2010.
43
19FYEL21 - ENGLISH FOR EMPLOYABILITY
Contact Hours
L T P C
0 0 2 1
COURSE OUTCOMES
CO1: Given strictly timed objective questions on logical sequence of words, sequential order of things,
comparison, and sentence correction, solve within the given time.
CO2: For a given specific speaking task on topics like Just a Minute Describing an object, book review
and extempore generate ideas and speak confidently.
CO3: For a given social situation viz., Travel and Transport, complaining, giving instructions, advising
and sympathizing, requesting and warning people, communicate effectively to peer using appropriate
functional language.
CO4: For a given HR topic, generate valid points for and against the topic and present them with
appropriate group behavior. For any job requirement, plan and prepare a 20 min HR mock interview.
CO5: For any job requirement, plan and prepare a 20 min HR mock interview.
SPEAKING SKILLS
Ice Breakers - Just a Minute - Book Reviews - Describing an object – Extempore – Paraphrasing.
(6)
FUNCTIONAL ENGLISH
Spoken English - Travel and Transport, Complaining - Giving Instructions, Advising and Sympathizing –
Requesting and warning people.
(5)
VERBAL APTITUDE
Logical Sequence of Words- Exercises - Sequential Order of Things - Comparison Type Questions –
Introduction and Exercises - Idioms and Phrases - Types and Exercises - Vocabulary through Mythology -
One-word Substitutes, Word Power Exercises - Common Errors in English - Sentence Correction.
(7)
VOCABULARY IN CONTEXT
Activity based on newspaper articles - Vocabulary – Homophones and Homonyms - Reading Prose –
Reading Comprehension Activity.
(4)
GROUP DISCUSSION AND INTERVIEW SKILLS
Professional Communication - Mock Group Discussion – Mock Interview – Telephoning Skills –
Personality Development Activities.
(8)
Total: 30 Hours
44
19MAM31 - ARTIFICIAL INTELLIGENCE
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
19MAM24
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Apply various heuristic search strategies in optimal decision making
CO2: Understand uncertainty in real world situations.
CO3: Employ first order logic for building a knowledge base and demonstrate reasoning on this.
CO4: Express different planning strategies to deal with problems, describe and apply various
knowledge representation techniques.
CO5: Review knowledge based Artificial Intelligent systems and approaches.
INTRODUCTION
Foundation of AI – Agents and Environments- Concept of Rationality – Nature of Environments –
Structure of Agents.
(6)
PROBLEM SOLVING
Problem-Solving Agents and examples – Uninformed and Informed Search Strategies - Heuristic
Functions - Local Search Algorithms and Optimization Problems – Local search in Continuous spaces –
Searching with Nondeterministic actions and Partial Observations.
(12)
ADVERSARIAL SEARCH AND CONSTRAINT SATISFACTION PROBLEMS
Games - Optimal Decisions in Games - Alpha-Beta Pruning. Constraint Satisfaction Problems (CSP) -
Backtracking Search for CSPs - Local Search for Constraint Satisfaction Problems - Structure of
Problems.
(8)
KNOWLEDGE AND REASONING
Knowledge based Agents – The Wumpus World - Logic – Propositional Logic- Syntax and Semantics
of First-Order Logic - Using First-Order Logic - Knowledge Engineering in First-Order Logic -
Unification and Lifting - Forward Chaining – Backward Chaining - Resolution - Knowledge
Representation.
(12)
45
PLANNING
Definition of classical planning - Algorithms for Planning as State-Space Search - Planning Graphs -
Hierarchical Task Network Planning - Planning and Acting in Nondeterministic Domains – Multi agent
Planning.
(7)
TOTAL HOURS: 45
TEXTBOOK
1. Stuart J Russell and Peter Norvig, “Artificial Intelligence- A Modern Approach”, Pearson
Education Series, Third Edition, 2010. (Chapters 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
REFERENCES
1. Dan W.Patterson "Introduction to AI and ES", Pearson Education, First Edition , 2007
2. Nilis J Nilsson “AI A new Synthesis” Morgan Kaufmann publishers, 1998
46
19MAM32 - THEORY OF COMPUTING
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Develop designs for different machine types: finite automata, pushdown automata.
CO2: Illustrate the mechanism of Turing machine and state its applications
CO3: Recognize partial recursive functions and its relationship to programs
CO4: Design different types of grammars and develop grammars to produce specific solutions.
CO5: Formulate methods to check the correctness of algorithms
47
COMPUTATION
Approaches for checking correctness, Partial total correctness, Proof methods. Floyd Hoare Manna
Inductive assertion. Functional methods.
(8)
TOTAL HOURS: 45
TEXTBOOKS
REFERENCES
1. John E Hopcroft, Jeffrey D Ullman,"Introduction to Automata theory languages and
computation", Addision Wesley 2006.
2. Michael Sipser "Introduction to the theory of computation" PWS Publishing, 2006.
48
19MAM33 - DATABASE MANAGEMENT SYSTEMS
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Describe the purpose and architecture of database systems from the perspective of persistent storage
of real world data.
CO2: Analyze the problem statement, construct the Entity Relationship model and map it into relational
model by applying normalization.
CO3: Generate Relational Algebra, Relational Calculus and SQL statements to perform queries of real
world applications
CO4: Evaluate the indexing techniques and choose the suitable technique by analyzing the given
application
CO5: Determine the concurrency control and recovery mechanisms based on the criticality of the
transaction
INTRODUCTION
Database System Applications, Purpose of Database Systems, View of Data, Database Languages,
Relational Databases, Database Architecture, Database Users and Administrators.
Relational Model: Structure of Relational Databases, Database Schema, Keys, Schema Diagrams,
Relational Query Language, Relational operations.
(10)
DATABASE DESIGN
Database Design and the E-R Model, Overview of the Design Process, The Entity-Relationship Model,
Constraints, Removing Redundant Attributes in Entity Sets, Entity-Relationship Diagrams, Reduction to
Relational Schemas, Extended E-R Features. Relational Database Design: Atomic Domains and First
Normal Form, Decomposition Using Functional Dependencies, Functional-Dependency Theory.
(11)
INTRODUCTION TO SQL
Overview of the SQL Query Language, SQL Data Definition, Basic Structure of SQL Queries, Additional
Basic Operations, Set Operations, Null Values, Aggregate Functions, Nested Sub queries, Modification of
the Database. Intermediate SQL: Join Expressions, Views, Transactions, Integrity Constraints, SQL Data
Types and Schemas, Authorization.
Advanced SQL:Accessing SQL from a Programming Language, Functions and Procedures, Triggers.
Formal Relational Query Languages: The Relational Algebra, Tuple Relational Calculus, Domain
Relational Calculus.
(10)
49
DATA STORAGE AND INDEXING
File Organization, Organization of Records in Files, Data-Dictionary Storage, Database Buffer. Indexing
and Hashing: Basic Concepts, Ordered Indices, Overview of B+-Tree Index Files and Hashing Comparison
of Ordered Indexing and Hashing, Bitmap Indices, Index Definition in SQL.
(7)
Concept, Simple Transaction Model, Atomicity and Durability, Isolation, Serializability, Isolation and
Atomicity, Isolation Levels. Lock-based Concurrency Control, Time Stamp based Concurrency Control,
Failure Classification, Recovery and Atomicity.
(7)
TOTAL HOURS: 45
TEXTBOOK
1. Abraham Silberschatz, Henry F.Korth and S.Sudarshan, "Database System Concepts",
Sixth Edition, McGraw Hill, 2010.
REFERENCES
50
19MAM34 - PREDICTIVE ANALYTICS
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
19MAM13, 19MAM22
COURSE OUTCOMES
CO1: Analyze time series data and apply it to forecast the future.
CO2: Formulate and compute multiple linear regression model and understand its properties.
CO3: Classify objects into different groups using discriminant function, logistic regression equation.
CO4: Identify underlying factors in multivariate data sets using principal component analysis.
CO5: Understand the terminology of factor analysis, factor rotation and interpret factor loadings using R
programming.
51
FACTOR ANALYSIS
Factor Analysis -Definitions-The Orthogonal Factor Model-Its Covariance Structure- Estimation of
loadings and communalities-Principal component method and Principal factor method-Factor Loadings
and Interpretations- Rotation- Orthogonal and Oblique rotation-Exploratory and Confirmatory Factor
Analysis- Estimation of PCA and FA using R.
(7)
TOTAL HOURS: 45
TEXTBOOKS
1. Alvin C.Rencher, William F. Christensen "Methods of Multivariate Analysis",3rd Edition, Wiley
Inter-science, 2012
2. Dinesh Kumar U, " Business Analytics", Wiley, First Edition, 2017
3. Richard A.Johnsonand Dean W.Wichern, " Applied Multivariate Statistical Analysis", 6th Edition,
Pearson Prentice Hall, 2007.
REFERENCES
1. R.E.Walpole, R.H.Myers,S.L.Myers and K.Ye, "Probability and Statistics for Engineers and
Scientists", 9th Edition, Prentice Hal, 2012.
2. Joseph F. Hair Jr., William C. Black, Barry J.Babin and Rolph E.Anderson, "Multivariate Data
Analysis", 7th Edition, Pearson, 2010.
3. G.James,D.Witten, T.Hastie and R.Tibshirani, "An Introduction to Statistical Learning with
Applications in R", Springer, 2015.
52
19MAM35 - HUMAN COMPUTER INTERACTION
Contact Hours
L T P C
3 1 0 4
PRE-REQUISITES
Consent of instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Learn the foundations of Human Computer Interaction (HCI)
CO2: Be familiar with the design technologies for individuals and persons with disabilities
CO3: Be familiar with models and theories of HCI
CO4: Develop an understanding of the intricacies of mobile HCI
CO5: Develop an understanding of the intricacies of web HCI
FOUNDATIONS OF HCI
The Human: I/O channels – Memory – Reasoning and problem solving; The computer: Devices –Memory
– processing and networks; Interaction: Models – frameworks – Ergonomics – styles –elements –
interactivity- Paradigms.
(9)
DESIGN & SOFTWARE PROCESS
Interactive Design basics – process – scenarios – navigation – screen design – Iteration and prototyping.
HCI in software process – software life cycle – usability engineering – Prototyping in practice – design
rationale. Design rules – principles, standards, guidelines, rules. Evaluation Techniques – Universal
Design.
(9)
MODELS AND THEORIES
Cognitive models –Socio-Organizational issues and stakeholder requirements –Communication and
collaboration models-Hypertext, Multimedia and WWW.
(9)
MOBILE HCI
Mobile Ecosystem: Platforms, Application frameworks- Types of Mobile Applications: Widgets,
Applications, Games- Mobile Information Architecture, Mobile 2.0, Mobile Design: Elements of Mobile
Design, Tools.
(9)
WEB INTERFACE DESIGN
Designing Web Interfaces – Drag & Drop, Direct Selection, Contextual Tools, Overlays, Inlays and Virtual
Pages, Process Flow. Case Studies.
(9)
TOTAL HOURS: 45
53
TEXTBOOKS
1. Alan Dix, Janet Finlay, Gregory Abowd, Russell Beale, “Human Computer Interaction”, Third
Edition, Pearson Education, 2004.
2. Brian Fling, “Mobile Design and Development”, First Edition, O‟Reilly Media Inc., 2009.
3. Bill Scott and Theresa Neil, “Designing Web Interfaces”, First Edition, O‟Reilly, 2009.
54
19MAM36 - ARTIFICIAL INTELLIGENCE LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Design and implement heuristic search procedures
CO2: Develop solutions for constraint satisfaction problem
CO3: Design and implement solutions for classical Artificial Intelligence problems
CO4: Design and implement knowledge-based system
CO5: Become familiar with use of Artificial Intelligence tools.
CONCEPTS TO BE COVERED
1. Implementing state space search algorithms for solving puzzle problems.
a. A* Search
b. Hill-climbing Search.
2. Implementation of Min-Max Search Procedure with alpha beta pruning for finding the solutions of
games.
3. Implementation of Constraint Satisfaction Problem for solving Crypt-arithmetic.
4. Implementation of Unification algorithm by considering Resolution concept.
5. Solve the classical Water Jug problem.
6. Solve the classical Monkey Banana problem.
7. Solve the classical Blocks World problem.
8. Develop a knowledge base system/ expert system consisting of facts and rules about some
specialized knowledge domain of your choice.
9. Designing a Chatbot application
10. Development of programs for simulation of computer games like: Tic-Tac-Toe, N-queens
Problems, travelling salesman problem, Chess, etc.
55
19MMA37 - DATABASE MANAGEMENT SYSTEMS LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Design the conceptual data model as Entity Relationship diagram and create the database using DDL
statements for a given application.
CO2: Formulate simple DML SQL queries to retrieve the required data for real world applications.
CO3: Generate DML queries with Subqueries, Joins, Group By, Order By and Aggregate functions to filter
and aggregate the data of the real world applications.
CO4: Construct reusable PL/SQL blocks with Functions, Procedures, Packages, Triggers, Exception
Handling, and Cursors as required by OLTP applications.
CO5: Develop a database project by constructing the ER model, creating Tables and generating SQL and
PL/SQL blocks using RDBMS platform.
CONCEPTS TO BE COVERED
1. Designing a database for an application and representing it through ER diagram
2. Creating and managing tables
3. Basic SQL SELECT statements
4. Restricting and sorting data
5. Single row functions
6. Displaying data from multiple tables
7. Aggregating data using Group function - Group By
8. Subqueries
9. Views, Sequence, Index, Synonym
10. SET operators, Date and Time functions
11. PL / SQL Programs
12. Exception Handling, Cursors, Functions, Procedures, Package, Triggers
Softwares: MySQL/Oracle
56
19MAM38 - PREDICTIVE ANALYTICS LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Use R software to analyze multivariate data using multiple linear regression, discriminant function,
logistic regression equation models and cluster analysis tools.
CO2: Using R software to analyze Time Series Models
CO3: Identify underlying factors in multivariate data by applying factor analysis and principal
component analysis models using R software packages.
CO4: Use R software to retain the components and loading of the Principal Components.
CO5: Use R to verify the data and to estimate the parameters of a factor model.
CONCEPTS TO BE COVERED
1. Reading and plotting Multivariate Data–Matrix scatter plot and Scatter plot with the data points
labeled by their group.
2. Calculating summary statistics for Multivariate Data-Means and variances per group, Between-
groups Variance and within-groups variance for a variable.
3. Calculating Covariances, Correlations and Standardizing Multivariate data fitting Multiple
Regression Equation using MS-Excel and interpreting the output.
4. Writing Script files in R for Fitting Multiple Regression Equation: Summary, extracting β
coefficients, Covariance matrix, standard errors, residuals and fitted values and plotting, Normal
Probability Plot of residuals, Predictions-Compare the results using lm command.
5. Stepwise regression: forward, backward and stepwise.
6. Differencing a Time Series, selecting a Candidate ARIMA Model, Forecasting using ARIMA
Model.
7. Fitting logistic regression equation: Prediction, goodness of fit and Plotting ROC Curve.
8. Discriminant function analysis and loadings for the discriminant functions.
9. Principal component Analysis : screen plot to decide on the number of components to retain and
loadings for the PCs and Scatter Plots for PCs.
10. Factor Analysis using R
57
19MAM41 - OPERATIONS RESEARCH
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Solve Linear Programming, Transportation and Assignment based problems.
CO2: Discuss the elementary Inventory models, Price break models and Safety stock problems.
CO3: Solve Job sequencing and replacement problems.
CO4: Categorize the Queuing models and also simulate the problems using Monte - Carlo Technique.
CO5: Analyze the network models using CPM and PERT.
LINEAR PROGRAMMING
Linear programming problem - canonical and standard forms - formulation - graphical solution – simplex
method-Big M method using artificial variables- Transportation model – Initial Basic Feasible Solution
using Northwest Corner method, Matrix Minima method and Vogels approximation method – Optimal
solution by Modified Distribution Method-Unbalanced Transportation problems and Degeneracy -
Assignment model-Solution by using Hungarian method.
(12)
SEQUENCING AND REPLACEMENT
Sequencing: Basic assumptions – Johnson’s procedure for Sequencing of: i) n jobs on 2 machines ii) n
jobs in 3 machines and iii) n jobs on m machines. Replacement: Need for replacement of equipments -
failure mechanism of items - Replacement policy - Replacement of items that deteriorates gradually -
Replacement of items that fail suddenly.
(7)
INVENTORY
Need for the inventory - Costs involved in inventory - Concepts of average inventory, economic order
quantity - Deterministic model: Fixed ordering quantity models - EOQ model with uniform demand, finite
and infinite replacement with or without shortages -EOQ with one price break. Inventory control - Buffer
stock - Determination of optimum buffer stock - EOQ system of ordering - Multi item order model - ABC
analysis.
(9)
QUEUING THEORY
Queuing system characteristics-Describing a queuing system by input pattern, service mechanism, queue
discipline and customer behaviour- Steady, transient and explosive states in queuing systems-Designation
of queue and symbols used in queuing models- M/M/1 (∞/FIFO) model-Steady State solutions-Finite
Queue Length Model: (M / M / 1) : (N/FIFO).
(8)
58
PERT and CPM NETWORKS
Activities and events-Rules for forming a Network- Critical Path Method(CPM) for computing project
completion time- network – Time estimation in CPM-Project Cost Analysis- critical path -Crashing-Least
cost schedule algorithm- PERT - Network – Difference between PERT and CPM-Time estimates in PERT-
Critical Path estimation - Probability of meeting a scheduled date of completion of the project.
(9)
TOTAL HOURS: 45
TEXTBOOK
1. Hamdy, A Taha, "Operations Research - An introduction", Pearson Education India, 2004.
REFERENCES
1. Rama Murthy P. Operations Research, New Age International, Second Edition, 2007.
2. S. D. Sharma "Operations Research ", Kedar Nath Ram Nath & Co publishers, 10th edition, 1995.
3. Kanti Swarup, P.K. Gupta, Mani Mohan, "Operations Research", Sultan Chand & Sons, 2001.
4. Hillier & Lieberman, "Operations Research - An Introduction", Tata McGraw-Hill, 2004
59
19MAM42 - MACHINE LEARNING
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
19MAM13, 19MAM22
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Recognize fundamental issues and challenges of machine learning: data, model selection, model
complexity, supervised and unsupervised learning.
CO2: Apply Decision trees and Artificial Neural Networks in classification
CO3: Distinguish the strength and weakness of Bayesian learning.
CO4: Analyze and use Instance based learning and reinforcement learning in real time problems.
CO5: Learn association rules and clustering methods and apply to derive insights from data.
INTRODUCTION
Basics of Machine Learning-Examples of Machine Learning Applications-Designing a Learning System.
(3)
CONCEPT LEARNING AND GENERAL TO SPECIFIC ORDERING
Concept Learning Task- Concept Learning as Search- Find-S- Version Space and Candidate Eliminate
Algorithm-Inductive bias.
(5)
DECISION TREE LEARNING
Decision tree representation, Decision tree Learning Algorithm- Inductive bias-Issues in Decision Tree
learning.
(6)
ARTIFICIAL NEURAL NETWORKS
Introduction- Neural Network Representations- Perceptron- Multi-layer Networks and Back Propagation
Algorithm- Remarks on the Back propagation Algorithm- Face Recognition Example.
EVALUATING HYPOTHESIS
Motivation, Estimating Hypothesis Accuracy, Basis of Sampling Theory- Difference in Error of Two
Hypothesis- Comparing Learning Algorithms
(8)
BAYESIAN LEARNING
Bayes Theorem - Bayes theorem and Concept Learning- Maximum Likelihood and Least Square Error
Hypothesis- Bayes Optimal Classifier- Naive Bayes Classifier-Bayesian Belief Networks- EM Algorithm.
(8)
60
INSTANCE BASED LEARNING
k-Nearest Neighbour Learning, locally weighted Regression- Radial Basis Functions- Case based
Reasoning. Reinforcement Learning: The learning task – Non-deterministic Rewards and Actions -
Relationship to Dynamic Programming.
(8)
UNSUPERVISED LEARNING
Introduction-k-means Clustering-Hierarchical Clustering. Association Rules - Apriori Algorithm.
(7)
TOTAL HOURS: 45
TEXTBOOKS
1. Tom M Mitchell, “Machine Learning”, Indian Edition, McGraw Hill, 2013.
2. Ethem Alpaydin, “Introduction to Machine Learning”, MIT Press, 3rd Edition, 2014. (First and Last
Para).
3. Jaiwei Han, Micheline Kamber Data Mining-concepts and techniques, 2/e, Morgan Kaufmann
Publishers, San Francisco,2006. (Last Para)
REFERENCES
1. Bishop, C. Pattern Recognition and Machine Learning. Berlin: Springer-Verlag, 2006.
2. Stephen Marsland, Machine Learning: An Algorithmic Perspective, Chapman and Hall,2014.
61
19MAM43 - DESIGN AND ANALYSIS OF ALGORITHMS
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
19MAM14, 19MAM24
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Able to apply divide and conquer, greedy methods in problem solving
CO2: Able to use dynamic programming in real time problems and derive efficient solutions.
CO3: Able to understand the concepts of backtracking and branch-bound techniques.
CO4: Able to differentiate between NP, NP hard and NP Complete problems.
CO5: Able to analyze the efficiency of different algorithm design techniques and their proper usage in
application problems.
INTRODUCTION
Fundamentals of algorithmic problem solving – Method of specifying an algorithm – proving the
correctness – Analyzing an algorithm - Asymptotic Notations.
(5)
DIVIDE AND CONQUER
General Method- Binary Search - Finding the Maximum and Minimum- Merge Sort - Quick Sort -
Strassen's Matrix Multiplication.
GREEDY METHOD
General Method - Knapsack Problem - Tree Vertex Splitting - Minimum-cost spanning trees- Single Source
Shortest Paths.
(7)
DYNAMIC PROGRAMMING
General Method - Multistage Graphs - All-Pairs Shortest Paths - Single Source Shortest Path - Traveling
Salesperson Problem.
(7)
BACKTRACKING
General Method - 8 Queens Problem – Sum of Subsets- Graph Coloring -Hamiltonian Cycles.
(7)
BRANCH AND BOUND
General Method - 0/1 Knapsack Problem - Traveling Salesperson Problem.
(5)
NP-HARD, NP-COMPLETE CLASSES
Basic concepts – Non-deterministic algorithms – Satisfiability Problem – NP-hard and NP-complete
Problems.
(7)
TOTAL HOURS: 45
62
TEXTBOOK
1. Ellis Horowitz, Sartaj Sahni, Sanguthevar Rajasekaran, “Fundamental of Computer Algorithms”,
Galgotia Publications, 1998.
REFERENCES
1. Thomas H.Cormen, Charles E.Leiserson, Ronald L. Rivert, Clifford Stein “Introduction to
Algorithms”, Second Edition, Prentice Hall of India, Publications, New Delhi, 2007.
2. Anany Levitin, “Introduction: The Design & Analysis of Algorithm”, Pearson Education Inc.,
2003.
3. Michael T.Goodrich, Roberto Tamassia, “Algorithm Design, Foundations, Analysis and Internet
Examples”, Wiley, 2011.
4. Jon Kleinberg and Eve Tardos, “Algorithm Design”, Pearson Education, 2012.
63
19MAM44 - DATA COMMUNICATIONS AND NETWORKING
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Enumerate the layers of the OSI model and TCP/IP and compare the models.
CO2: Describe the relationship between data and signals, and distinguish among their types, behavior,
properties, characterization, and transmission.
CO3: Given an inter-network topology configuration, can demonstrate how a packet reaches the
destination.
CO4: Explain the services offered by each layer of TCP/IP protocol suite and the role of each protocol.
CO5: Given an application, can explain the role of the protocols involved.
INTRODUCTION
Data Communications – Networks – The Internet – Protocols and Standards – OSI Model – TCP/IP
Protocol Suite – Addressing.
(9)
PHYSICAL LAYER AND MEDIA
Data and Signals – Digital Transmission: Digital to Digital Conversion – Analog to Digital Conversion –
Transmission Modes – Analog Transmission: Digital -to -Analog Conversion – Multiplexing Techniques.
(10)
DATA LINK CONTROL
Framing – Flow and Error Control – Protocols – Noiseless Channels – Noisy Channels. Multiple Access:
Random Access Protocols – Ethernet - IEEE 802.11.
(7)
NETWORK LAYER
Switching – Packet switching at Network Layer – Network layer Services – Issues – IP Addresses –
Delivery and Forwarding of Packets – Internet Protocol IPv4 - Address Resolution Protocol – Internet
Control Message Protocol.
(9)
HIGHER LAYERS
Transport Layer: Services – User Datagram Protocol: User Datagram – UDP services – Transmission
Control Protocol: TCP services – Features – Segment – TCP connection Management.
Application Layer: DNS – Worldwide Web.
(10)
TOTAL HOURS: 45
TEXTBOOKS
1. Behrouz A Forouzan, “Data Communications and Networking”, Tata McGrawHill, 5th Edition,
2017. (Para 1-III)
2. Behrouz A Forouzan, “TCP/ IP Protocol Suite”, Tata McGraw Hill, 2010. (Para IV-V)
64
REFERENCES
1. Kevin Fall R and Richard Stevens W, "TCP/IP Illustrated, Volume 1: The Protocols”, Addison-
Wesley, 2011.
2. James F Kurose and Keith Ross, “Computer Networking: A Top-Down Approach”, Pearson
Addison-Wesley, 2012.
3. Douglas Comer, “Internetworking with TCP/IP”, Prentice Hall, 2013. 4. William Stallings, "Data
and Computer Communications", Pearson, 2013.
65
19MAM45 - OPERATING SYSTEMS
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Demonstrate the structure of operating system, batch programming, system calls and virtual
machines.
CO2: Demonstration of Kernel Management specific to concurrent process for Inter Process
Communication systems.
CO3: Estimate system performance through scheduling algorithms - FIFO, round robin, priority,
shortest job first.
CO4: Recognize memory allocation and deallocation for both static and dynamic storage.
CO5: Design and develop a new simple File System using Disk and File System Management
INTRODUCTION
Abstract view of an Operating system - Extended view of resource manager - Overview: Simple Batch
system - Multi programmed batch systems - Time Sharing Systems - Parallel Systems - distributed systems
- Real time systems - System structure: IO structure- memory- CPU-Kernels and microkernels - Dual-
mode operation - operating - system services - system calls - Structure of Operating system- Various
components of Operating system.
(9)
PROCESS MANAGEMENT
Process Concepts - Process Creation - Process Termination - Process States - Process Description - Process
Control - Relationship between process and threads - Thread State - Thread Scheduling- Thread
Synchronization-Multithreading model - Concurrent Process -process synchronization: critical section
problem - Mutual Exclusion - Dekker's algorithm -synchronization hardware - semaphore - classical
problem of ynchronization - critical regions - monitors - atomic transaction - race condition. Deadlock
characterization - handling deadlocks - prevention - avoidance - detection and recovery - combined
approach.
(10)
PROCESSOR MANAGEMENT
Basic Concepts - Scheduling Criteria – Pre-emptive versus non-preemptive scheduling - Scheduling
algorithms: FIFO - Shortest job first, priority, round robin, multi-level queue - Multi level feedback queue
- multiprocessor scheduling.
(9)
66
MEMORY MANAGEMENT
Basic Concepts - Logical versus Physical address - Swapping - Fixed Partition and Dynamic Partition -
Simple Paging - Multi Level Paging - Inverted Paging – Paging algorithms-Simple segmentation- Virtual
Memory - Demand Paging - Thrashing-Working Set Model -Demand Segmentation.
(9)
I/O AND FILE MANAGEMENT
I/O: hardware - Application I/O interface - Logical Structure of I/O Functions -I/O Buffering - Disk I/O -
Disk Scheduling. File Management: File Concepts - Access methods - Directory Structure - File System
Structure - Allocation methods - Free Space Management.
CASE STUDIES
Mobile Operating System-Cloud and IoT Operating Systems.
(8)
TOTAL HOURS: 45
TEXTBOOKS
1. Abraham Silberschatz. A, Peter Baer Galvin, Greg Gagne, "Operating System Concepts", John
Wiley, 2013.
2. William Stallings, "Operating Systems: Internals and Design Principles", Prentice-Hall, Ninth
edition, 2018.
REFERENCES
1. H.M.Dietel, "An Introduction to Operating Systems", Addison Wesley, 2nd Edition,2007.
2. Andrew S. Tanenbaum, "Modern Operating Systems", Prentice Hall of India Pvt. Ltd, 2008.
67
19MAM46 - MACHINE LEARNING LAB
Contact Hours
L T P C
0 0 4 2
PREREQUISITES
19MAM18
COURSE OUTCOMES
CO1: Able to prepare the data for machine learning using data pre-processing and dimension reduction
techniques.
CO2: Able to build regression and classification models using benchmark datasets and give insights.
CO3: Able to evaluate the performance of models using different performance measures.
CO4: Able to use clustering techniques to group data and analyse the clusters.
CO5: Able to design and develop prediction systems by choosing appropriate machine learning
algorithms on real-time datasets.
CONCEPTS TO BE COVERED
1. Perform descriptive analysis on different types of datasets
2. Apply pre-processing techniques on the dataset.
3. Build Regression models to predict future values for datasets like rainfall, earthquake etc.
4. Build Classification models and infer the results
a. Decision tree classifier
b. Naïve Bayes Classifier
c. k-Nearest Neighbor Classifier
5. Apply cross validation techniques and evaluate the models using various performance metrics
6. Implement Perceptron and Artificial Neural Network for simple problems
7. Implement the non-parametric Locally Weighted Regression algorithm to fit data points.
8. Clustering
a. Implement K-Means Clustering
b. Implement Hierarchical clustering
9. Use market basket dataset and mine association rules using Apriori algorithm.
10. Build a complete Machine Learning pipeline with data visualization capabilities for a given
prediction problem.
Note: Benchmark datasets may be downloaded from UCI machine learning repository, Kaggle etc for
each of the above problems.
68
19MAM47 - DESIGN AND ANALYSIS OF ALGORITHMS LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
19MAM17,19MAM27
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Ability to analyze the efficiency of different algorithm design techniques and their proper usage in
application problems.
CO2: Implementing string matching and network flow algorithms.
CO3: Able to apply data structure concepts in any applications of the dynamic programming
CO4: Implement the design technique of backtracking in application to analyze the types of problem solved
using backtracking
CO5: Skill to compare, contrast, and understand the choice of various design techniques to solve a given
problem.
CONCEPTS TO BE COVERED
1. Problem using closest pair algorithm
2. Prim’s minimum cost spanning tree
3. Kruskal’s minimum cost spanning tree using min heap data structure, union and find operation
4. Problem related to greedy methods
5. Applications of dynamic programming
6. Application of all pairs shortest path problem
7. Application of graph coloring using backtracking
8. Applications of branch and bound technique
9. String matching algorithms
69
19MAM48 - NETWORK PROGRAMMING LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
19MAM14
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Understand key protocols that support communication.
CO2: Develop and implement connection-oriented and connectionless communication using Socket API
for a given set of requirements.
CO3: Develop and implement concurrent and iterative servers and analyze their functionality.
CO4: Apply advanced programming techniques such as Broadcasting and Multicasting.
CO5: Develop and implement simple network applications using NS-2 API for a given set of requirements
and demonstrate its working.
CONCEPTS TO BE COVERED
1. Basic networking commands
2. TCP one-way communication
3. TCP two-way communication
4. UDP one-way communication
5. UDP two-way communication
6. Concurrent, Iterative Server Implementation
7. IP header setting by kernel and displaying IP header
8. IP header setting by user and displaying IP header
9. IP Checksum Computation
10. Ping Implementation
11. Broadcasting using UDP
12. Multicast Communication using UDP
13. Simulations / Developing networking applications
70
19MAM51 - ADVANCED MACHINE LEARNING
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
19MAM42
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Use ensemble techniques and dimensionality reduction methods for building machine learning
models.
CO2: Understand the optimization techniques and regularization adopted in machine learning algorithms.
CO3: Learn the properties of kernels, kernel functions and apply them in pattern analysis.
CO4: Recognize the application of markov chain approaches for random sampling and model probabilities
and use them in applications.
CO5: Apply the concept of graphical models in machine learning problems
ENSEMBLE LEARNING
Introduction to multiple models-Bagging: Bagged Decision Tree-Random Subspaces-Random Forest.
Boosting: AdaBoost-Gradient Boosting Machines-Stochastic Gradient Boosting-XGBoost. Stacking:
Voting.
Dimensionality Reduction Techniques: Principal Component Analysis- Factor Analysis-
Multidimensional Scaling-Linear Discriminant Analysis- Singular Value Decomposition.
(10)
MODEL EVALUATION AND OPTIMIZATION
Classification Performance Metrics: ROC, PR Curves, Precision at K. Class Imbalance: Over and Under
sampling, SMOTE. Bias-Variance Trade-offs-Cross Validation: Stratified Splits and Temporal CV. Model
Tuning: Grid and Random Search Regularization: L1 and L2 Norm Methods-LASSO and Ridge
Regression.
(11)
KERNEL MACHINES
Kernels-Optimal Separating Hyperplane-Kernel Trick-Vectorial Kernels-Multiclass Kernel Machines.
Support Vector Classification-Support Vector Regression -Application of Support Vector Machines.
(9)
MARKOV CHAIN MONTE CARLO METHODS
Sampling-Markov Chains-The metropolis-Hastings Algorithm-Gibbs Sampling.
(7)
GRAPHICAL MODELS
Bayesian Networks-Belief Propagation-Undirected Graphs: Markov Random Fields-Hidden Markov
Models: Forward algorithm.
(8)
TOTAL HOURS: 45
71
TEXTBOOKS
1. Stephen Marsland, Machine Learning- An Algorithmic Perspective, CRC Press, Second Ed.,2015.
(Para-I)
2. Henrik Brink, Joseph Richards, Mark Fetherolf, Real World Machine Learning, Manning
Publishers,2016. (Para-II)
3. Ethem Alpaydin, Introduction to Machine Learning, Fourth Ed., PHI Publication,2015. (Para
III,IV,V)
REFERENCES
1. Scholkopf, B. and Smola, A. J., Learning with Kernels: Support Vector Machines, Regu- larization,
Optimization, and Beyond, The MIT Press 2001.
2. Koller D. and Friedman, N., Probabilistic Graphical Models: Principles and Techniques, The MIT
Press 2009.
3. C. M. Bishop, Pattern Recognition and Machine Learning, Springer, 2010
72
19MAM52-ARTIFICIAL NEURAL NETWORKS
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Learn the fundamentals concepts of the early Neural Network architectures and its applications.
CO2: Implement Perceptron and Backpropagation learning rules to solve problems.
CO3: Understand the different types of unsupervised learning techniques of Artificial Neural Networks.
CO4: Apply Radial Belief Network for Classification problems
CO5: Design and implement associative memories networks.
REFERENCES
1. L. Fausett, Fundamentals of Neural Networks, Prentice Hall,2004
2. Artificial Neural Networks-B. Yegnanarayana, PHI, New Delhi 1998.
3. C. Bishop, Neural Networks and Machine Learning, Springer, 1998.
73
19MAM53 - KNOWLEDGE BASED SYSTEMS
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Understand the concepts central to the creation of knowledge bases and expert systems.
CO2: Identify the components of a knowledge based systems (KBS)
CO3: Explore the issues involved in the design and development of Artificial Intelligence Based Decision
Support Systems and discuss the role these systems play in the business environment.
CO4: Select an appropriate knowledge representation and reasoning method, and anticipate potential
difficulties in developing and introducing the expert systems.
CO5: Examine properties of knowledge search techniques and understand the application domains of KBS.
74
TEXTBOOKS
REFERENCES
1. Joseph Giarrantano, Gary Riley, Expert Systems: Principles and Programming, PWS Publishing
Company,Paperback,2007
2. Dan.W. Patterson, Introduction to Artificial Intelligence and Expert Systems,PHI, 2007.
3. Rajendra Arvind Akerkar, Priti Srinivas Sajja, Knowledge Based Systems, Jones & Bartlette
Publishers,2010.
75
19MAM54 - AI SYSTEMS ENGINEERING
Contact hours
L T P C
3 0 0 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Understand the concept of an Intelligent System (IS) and goals of AI-Enabled Systems
CO2: Create intelligence using different approaches including machine learning
CO3: Implement production-quality systems that are robust to mistakes of AI components
CO4: Compare the intelligence and evaluate the accuracy of the AI-based systems using appropriate
methods.
CO5: Build an AI based system from end to end and leverage machine learning in practice.
76
REFERENCES
1. https://ckaestne.github.io/seai/F2020/
2. https://github.com/ckaestne/seai/blob/F2020/assignments/I1_case_study.md
77
19MAM55 - DISTRIBUTED AND CLOUD COMPUTING
Contact hours
L T P C
3 0 0 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Explain the core concepts of the cloud computing paradigm
CO2: Compare the service models offered by different service providers and choose appropriate platforms
for implementing cloud computing solutions considering management, security and trust requirements.
CO3: Analyze various cloud programming models and apply them to solve problems on the cloud.
CO4: Elucidate the concept, features, use cases, and benefits of containers, and the difference between
containers and virtual machines.
CO5: Explain the basic concepts of microservices and container orchestration.
78
MICROSERVICES AND CONTAINERS
Introduction to Microservices - Migrating and Implementing Microservices - Containerization: Docker
Container - Container Orchestration - Container Management.
(9)
TOTAL HOURS: 45
TEXTBOOKS
1. Kai Hwang,Geoffrey C Fox, John J Dongarra, Distributed and Cloud Computing From Parallel
Processing to the Internet of Things”, Morgan Kaufmann, 2012.(Para I-IV)
2. Parminder Singh Kocher, “Microservices and Containers”, Addison Wesley, 2018. (Para V)
REFERENCES
1. James E. Smith, Ravi Nair, "Virtual Machines: Versatile Platforms for Systems and Processes",
Elsevier/Morgan Kaufmann, 2005.
2. Chris Wolf, Erick M. Halter, "Virtualization: From the Desktop to the Enterprise", Apress Series
2005.
3. Anthony T. Velte, Toby J. Velte, and Robert Elsenpeter, "Cloud Computing - A practical
Approach", Tata McGrawHill, 2010.
79
19MAM56 - ADVANCED MACHINE LEARNING LAB
Contact hours
L T P C
0 0 4 2
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Implement bagging, boosting and Random Forest methods for classification and regression
problems.
CO2: Apply hyper-parameter tuning and dimensionality reduction techniques to improve the performance
of the models.
CO3: Use support vector machines, Hidden Markov Models and Bayesian Belief networks on real-time
datasets and draw insights.
CO4: Implement various neural network models like perceptron, associative nets, Self-organizing maps
(SOM) etc without using libraries for simple problems.
CO5: Design and implement Artificial Neural Networks and Radial Belief Network to classify images.
CONCEPTS TO BE COVERED
1. Ensemble learning methods in building classifiers
• Bagging
• Boosting and
• Stacking algorithms
2. Download a large dataset with more dimensions and apply dimensionality reduction techniques
like PCA, LDA, SVD etc on it and compare the classifier performance using various metrics.
3. Dealing with class imbalance in ML models using SMOTE methods
4. Improving model performance through hyper-parameter tuning methods
• Cross Validation
• GridSearchCV, Random SearchCV, Optimization algorithms etc
• Optimizing the models using L1 and L2 regression
5. Support Vector Machine for classification and Regression
6. Bayesian Belief network implementation
7. Sequence classification using Hidden Markov Model
Artificial Neural Networks (ANN)
1. Design a perceptron for logic gates
2. Implementing back propagation algorithm
3. Implement Auto-associative Neural network and
4. SOM
5. Classification using Radial Basis Networks
6. Design and implement an ANN model to classify images. (with and without library)
7. Simple image classification applications using ANN with datasets from Kaggle and performance
tuning.
80
19MAM57 - FULL STACK WEB DEVELOPMENT LAB
Contact hours
L T P C
0 0 4 2
PRE-REQUISITES
19MAM17
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Develop web pages that function using external data -HTML and CSS.
CO2: Use Javascript to implement client-side validations and perform AJAX calls
CO3: Apply AngularJS and /ReactJS to develop frontend dynamic web UI
CO4: Implement CRUD operations on database (MongoDB) in NODE.js
CO5: Build end-to-end web applications handling all the areas of the tech-stack and any of the web
frameworks.
CONCEPTS TO BE COVERED
1. Front-End
• HTML Basics
• CSS-styling, selectors, box model, border, margin, padding
o Develop responsive websites using HTML and CSS. (Eg.Video Player,
Educational Game)
• JavaScript
o Fundamentals, Hoisting, Callbacks, Asynchronous JavaScript, DOM
Manipulation, JSON, AJAX Calls, JQuery etc.
2. Front-End Frameworks and Libraries
• Angular JS or React JS
o Single page web application development
3. Back-end
• Node.Js
• Building a HTTP Server with Node.JS using HTTP APIs
• Buffers, Streams, and Events
4. Work with MongoDB
• Create a database and set up function to interface with it in a CRUD pattern
5. Work with APIs
• Build an endpoint that can send out a tweet using the Twitter API
Note: Development of complete web application end-to end may be the final exercise
81
19MAM58- CLOUD COMPUTING LAB
Contact hours
L T P C
0 0 4 2
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Demonstrate knowledge on creating, cloning, migrating virtual machines using VirtualBox, a
virtualization tool.
CO2: For a given system configuration, can use EC2 to acquire instances.
CO3: Develop applications, launch it on Google App Engine, and access it with proper authentication
mechanisms.
CO4: Construct a private cloud using the open-source cloud technologies such as
OpenStack/CloudStack/OpenNebula for a given requirement.
CO5: Given an application, can create Micro services, can containerize, and deploy.
PRIVATE CLOUD
Use Eucalyptus or OpenStack or CloudStack or equivalent to set up a private cloud and
demonstrate:
• Create virtual machines of different configurations. Check how many virtual machines can be
utilized at a particular time.
• Attach a virtual block to the virtual machine and check whether it holds the data even after the
release of the virtual machine.
• Install a C compiler in the virtual machine and execute a sample program.
• Show the virtual machine migration from one node to the other.
• Install storage controller and interact with it.
PUBLIC CLOUD
Explore any public cloud to access various services provided by it.
CONTAINERIZATION
• Implement Docker and Kubernetes based application development and deployment
• Choose a ML Application, Containerize and deploy in Cloud.
• Adapt DevOps for basic testing (unit test) and deployment
82
19MAM59 - PERSONALITY DEVELOPMENT
Contact hours
L T P C
0 0 4 2
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Ascertain the various concepts of Self like the Physical Self – Energy Self – Intellectual Self –Mental
Self – Blissful Self with respect to the Western (Occidental) and Eastern (Oriental) theories of Self and
Personality Development.
CO2: Outline the significant effects of Self Confidence to build team confidence, given the foundation
principles of Self-Motivation and Confidence.
CO3: Assess the various personalities and Attitudes and choose the best attitude for making bold decisions
in personal and professional contexts.
CO4: Project the appropriate grooming and the right etiquette in the corporate context to excel in
professional life.
CO5: Set Career goals and formulate strategies by Prioritizing, organizing and scheduling the required
tasks. Project the appropriate grooming and the right etiquette in the corporate context to excel in
professional life.
PERSONALITY DEVELOPMENT
One’s Personality Sends Out a Signal That Others Read – Same Person: Consciously Different Personalities
can be Powerful – There isn’t One Right Personality; It Differs by Role – Learning about Personality
Development from the Three Cases – Personality Analysis – Freudian Analysis of Personality
Development – Swami Vivekananda’s Concept of Personality – Development: Physical Self – Energy Self
– Intellectual Self – Mental Self – Blissful Self – Personality Begets.
(7)
LEADERSHIP QUALITIES & INTERPERSONAL SKILLS
Resolving Conflict – A Smiling Face – Appreciative Attitude – Assertive Nature –Communication Skills
– Listening Skills – Developing Empathy – The Personality Attribute of Taking Bold Decisions –
Personality Types and Leadership Qualities – Mapping the Different Personality Types – Personality Tests:
Example of a Personality Test: Jung Typology Test – Personality Assessment.
(7)
ETIQUETTE
Social Etiquette – Corporate Etiquette - Personal Grooming – Using minimal Body Language –Leadership
and Entrepreneurship: Corporate Training – Professionalism - Self awareness –Creativity skills – Cognitive
Development – Assertiveness – Positive Thinking and Attitude.
(8)
GOAL SETTING AND TIME MANAGEMENT
Goal Setting – Immediate, Short Term and Long Term Goals – Smart Goals – Strategies to
Achieve Goals - Confidence Building, Self-esteem, Motivation - Time Management –Identifying Time
Wasters – Time Management Skills.
(8)
TOTAL HOURS: 30
83
REFERENCE BOOKS
1. Mitra K.Barun, “Personality Development and Soft Skills”, Oxford University Press, 2011.
2. Krishna Mohan, Meera Banerji. “Developing Communication Skills” Macmillan Publishers, 2012.
3. Sai Lakshmi. B, “Poly Skills- A Course in Communication and Life Skills” Cambridge
University Press, 2012.
4. Simon Sweeney, English for Business Communication, Cambridge University Press, 2013.
5. Meenakshi Raman, Sangeeta Sharma, Technical Communication - Principles and Practice,2nd Edition,
Oxford University Press, New Delhi, 2015.
84
19MAM61 - INTELLIGENT AGENTS
Contact Hours
L T P C
3 0 0 3
ASSESSMENT: THEORY
PRE-REQUISITES:
19MAM31,19MAM53
COURSE OUTCOMES
CO1: Understand agents. agent types, structure and their interactions
CO2: Appreciate the utility of different types of AI agents.
CO3: Learn and use multi agent systems and their interactions to reach agreements.
CO4: Demonstrate communication language used by the agents for their coordination and coherence.
CO5: Review the cooperative distributed problem-solving techniques used by agents with task and result
sharing.
INTELLIGENT AGENTS
Introduction-Environments of Intelligent Agents-Agents and Objects-Agents and Expert Systems-Agents
as Intentional Systems-Abstract Architectures for Intelligent Agents-Synthesizing Agents-Deductive
Reasoning Agents.
(8)
PRACTICAL REASONING AGENTS
Practical Reasoning- Means-Ends Reasoning-The Blocks World- Implementing a Practical Reasoning
Agent-Commitment to Ends and Means-The Procedural Reasoning System.
Reactive and Hybrid Agents: Brooks and the Subsumption Architecture-The Limitations of Reactive
Agents, Hybrid Agents.
(10)
MULTI-AGENT INTERACTIONS
Utilities and Preferences- Multiagent Encounters- Dominant Strategies and Nash Equilibria-Competitive
and Zero-Sum Interactions-The Prisoner’s Dilemma.
Reaching Agreements
Mechanism Design, Auctions, Negotiation, Task-Oriented Domains, Worth-Oriented Domains,
Argumentation.
(12)
COMMUNICATION AND CO-OPERATION
Speech Acts - Agent Communication Languages-KIF-KQML-The FIPA Agent Communication
Languages-Ontologies for Agent Communication-Coordination Languages.
Cooperative Distributed Problem Solving-Coherence and Coordination-Task Sharing and Result Sharing-
Task Sharing in the Contract Net-Result Sharing-Handling Inconsistency- Coordination-Multiagent
Planning and Synchronization.
(10)
CASE STUDY
Applications of Agents in Various Domains-Building multi-agent systems.
(5)
TOTAL HOURS: 45
85
TEXTBOOKS
1. Michael Wooldridge, “An Introduction to Multi Agent Systems”, 2nd Edition, John Wiley & Sons,
2009.
2. G. Weiss. “Multiagent Systems--A Modern Approach to Distributed Artificial Intelligence”, 2nd
Edition, MIT Press, Cambridge,2013. (Last Para)
REFERENCES
1. Praveen Palanisamy, “Hands-On Intelligent Agents with OpenAI Gym: Your Guide to Developing
AI Agents Using Deep Reinforcement Learning”, Packt, 2018.
2. Fabio Luigi Bellifemine, Giovanni Caire, Dominic Greenwood,
“Developing Multi-Agent Systems with JADE” , John Wiley & Sons, 2007.
3. Russell and P. Norvig, “Artificial Intelligence: A Modern Approach”, 3rd Edition, Pearson
Education, 2015.
86
19MAM62 - DEEP LEARNING
Contact Hours
L T P C
3 0 0 3
ASSESSMENT: THEORY
PRE-REQUISITES
19MAM52
COURSE OUTCOMES
CO1: Understand the concepts of feedforward and deep networks and regularization principles.
CO2: Implement and visualize Convolutional Neural Networks algorithms for classification problems.
CO3: Identify Recurrent Neural Network algorithms which are more appropriate for various types of
learning tasks in various domains.
CO4: Review the unsupervised deep learning models- deep generative models and autoencoders for
predictive learning.
CO5: Apply the optimization techniques and fine tune the deep neural networks while designing deep
learning algorithms for varied applications.
CO6: Learn the basics of transfer learning and its application in deep learning
87
TRANSFER LEARNING
Fundamentals of Transfer Learning: Definition-Transfer Learning Types-Methodologies-Need and
Challenges. Fundamentals of Pre-Trained Models-Examples-Image Classification using Pre-trained
Models.
(8)
TOTAL HOURS: 45
TEXTBOOKS
1. Ian Goodfellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2017. (Para I-
III).
2. Charu C Aggarwal, “Neural Networks and Deep Learning”, Springer, 2018. (Para IV,V)
3. Dipanjan Sarkar, Raghav Bali, “Transfer Learning in Action”, Manning. 2021.(Para VI)
REFERENCES
1. Nikhil Buduma, “Fundamentals of Deep Learning: Designing Next-Generation Machine
Intelligence Algorithms”, O’Reilly publications,2017
2. Dipanjan Sarkar, Raghav Bali, T. Ghosh, “Hands-on Transfer Learning with Python”, Packt,2018.
3. https://theaisummer.com/transformer/
88
19MAM63 - INFORMATION RETRIEVAL AND WEB SEARCH
Contact Hours
L T P C
3 0 0 3
ASSESSMENT: THEORY
PRE-REQUISITES
Consent of the Instructor
COURSE OUTCOMES
CO1: Understand the basic concepts and techniques in information retrieval
CO2: Apply the information retrieval models.
CO3: Evaluate an information retrieval system based on the relevance of the documents it retrieves.
CO4: Analyze the documents and query performances of system
CO5: Explore the techniques in text and multimedia retrieval process
(7)
89
TOTAL HOURS: 45
TEXTBOOK
1. Ricardo Baeza-Yate, Berthier Ribeiro-Neto, "Modern Information Retrieval", Second Edition,
ACM Press Books, 2011.
REFERENCES
1. C. Manning, P. Raghavan, and H. Schütze, “Introduction to Information Retrieval”, Cambridge
University Press, 2009.
2. Stefan Büttcher, Charles L. A. Clarke, Gordon V. Cormac, “Implementing and Evaluating Search
Engines”, MIT Press, 2016.
90
19MAM64 - BIG DATA ANALYTICS
Contact Hours
L T P C
3 0 0 3
ASSESSMENT: THEORY
PRE-REQUISITES
19MAM42
COURSE OUTCOMES
CO1: Learn the concepts of big data characteristics and its applications
CO2: Apply map-reduce programming to parallelize data centric problems using Hadoop and HDFS
CO3: Exposure to data analytics using various Hadoop ecosystem tools.
CO4: Understand stream processing and perform stream analytics on real-time problems.
CO5: Implement real-time streaming analytics using Spark Streaming API.
TOTAL HOURS: 45
TEXTBOOKS
1. Raj Kamal and Preeti Saxena, “Big Data Analytics: Introduction to Hadoop, Spark, and Machine-
Learning”, McGraw-Hill Education, 2019. (Para I, III-V)
2. Vignesh Prajapathi, “Big Data Analytics with R and Hadoop”, Packt Publishing, 2013. (Para II)
3. Data Science and Big Data Analytics, EMC Educational Services, Wiley, 2015. (Para I)
REFERENCES
1. Kai Hwang and Min Chen, “Big-Data Analytics: for Cloud, IoT and Cognitive Computing”, Wiley
Edition, 2018.
91
2. Bill Chambers and Matei Zaharia, “Spark: The Definitive Guide”, O’Reilly, 2018.
92
19MAM65 - DEEP LEARNING LAB
Contact Hours
L T P C
0 0 4 2
ASSESSMENT: PRACTICAL
PRE-REQUISITES
Consent of the Instructor
COURSE OUTCOMES
CO1: Design single and multi-layer feed-forward deep networks and tune various hyper-parameters.
CO2: Build classification models using convolutional neural networks, recurrent neural networks for real-time
applications.
CO3: Implement hyperparameter tuning and optimization techniques to improve the performance of the
Deep neural networks.
CO4: Use of LSTM network in real-time prediction problems.
CO5: Apply pretrained models in practice with large image datasets and perform classification efficiently.
CONCEPTS TO BE COVERED
• Image pre-processing for NN
• Data augmentation
• Convolutional NN
o Simple CNN with parameters settings.
o Classify images (faces, melanomas, etc.) based on patterns and objects that appear in them.
• Pre-trained models/Transfer learning (VGG-16, Resnet etc)
• Recurrent NN
o Text Translation
o Sentiment Analysis
• Predict the next word using a sample text
• Hyper parameter tuning and optimization of the model
o Demonstrate the use of different optimization techniques and hyper-parameter tuning
techniques
• Applications of Long Short-Term Memory Networks
Datasets: Benchmark datasets for image and text processing may be used. (Imagenet, CIFAR-10 etc)
REFERENCES
1. Francois Chollet, “Deep Learning with Python”, Kindle Edition,2021.
2. Dipanjan Sarkar, Raghav Bali, T. Ghosh, “Hands-on Transfer Learning with Python”, Packt,2018.
93
19MAM66 - MOBILE APPLICATION DEVELOPMENT LAB
Contact Hours
L T P C
0 0 4 2
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Understand the components and structure of mobile application development frameworks for
Android and windows OS-based mobiles.
CO2: Work with various mobile application development frameworks and develop mobile apps.
CO3: Apply the basic UI and important design concepts and issues of development in mobile
applications.
CO4: Develop mobile apps for Android OS using GPS, Storage and RSS feed.
CO5: Design mobile applications based on the capabilities and limitations of mobile devices.
CONCEPTS TO BE COVERED
1. Develop an application that uses GUI components, Font and Colors
2. Develop an application that uses Layout Managers and event listeners.
3. Write an application that draws basic graphical primitives on the screen.
4. Develop an application that makes use of databases or back-end storage for mobile apps.
5. Develop an application that makes use of notification manager
6. Implement an application that uses multi-threading
7. Develop a native application that uses GPS location information
8. Implement an application that writes data to the SD card.
9. Implement an application that creates an alert upon receiving a message
10. Write a mobile application that makes use of RSS feed
11. Develop a mobile application to send an email.
94
19MAM67 - BIG DATA ANALYTICS LAB
Contact Hours
L T P C
0 0 4 2
ASSESSMENT: PRACTICAL
PRE-REQUISITES
19MAM46
COURSE OUTCOMES
CO1: Write MapReduce programs to work on Hadoop clusters.
CO2: Work with NoSQL -MongoDB for learning basic CRUD operations.
CO3: Learn and apply basic Hadoop commands and read/write data to HDFS
CO4: Implement supervised and unsupervised machine learning algorithms using SparkML library.
CO5: Perform stream analytics using real time Spark framework.
CONCEPTS TO BE COVERED
1. MapReduce Programming exercises
2. NoSQL operations (MongoDB and Cassandra)
3. Preparing data with Hadoop
4. Basic HDFS commands, Direct file transfer to HDFS
5. Importing data (CSV,Jason) into Hive Tables, using Spark
6. Data import and export with Sqoop
7. Work with Data Streams using Flume (Eg.Web Log Creation)
8. Creating Visualizations using comparison charts, composition, distribution and relationship charts.
9. Data Modelling with SparkML
a. Applications of machine learning algorithms-Supervised and Unsupervised
b. Evaluate Model (Cross-Validation, Model Tuning) and Prediction
10. Real-Time Analytics using SparkStreaming
11. Real-Time Sentiment Analysis
12. Collaborative Filtering
REFERENCES
1. Anand Rajaraman and Jeffrey David Ullman, “Mining of Massive Datasets”, Cambridge
University Press, 2012.
95
19MAM68 - COMMUNICATION SKILLS
Contact Hours
L T P C
0 0 2 1
ASSESSMENT: PRACTICAL
PRE-REQUISITES:
Consent of the Instructor
COURSE OUTCOMES
CO1: Conceive appropriate verbal responses from the learners to a given social situation, using the
guidelines to effective speaking skills and body language.
CO2: Generate troubleshooting solutions to develop team building and interpersonal skills with case
studies that focus on body language and empathy.
CO3: Develop appropriate responses for business phone calls and formulate effective resolutions to
professional conflicts that arise out of cross-cultural communication gaps in a given managerial context.
CO4: Compose appropriate written responses to professional problems faced by a team at the workplace
arising out of ineffective communication skills.
CO5: Generate valid points for and against a HR topic and present them with appropriate group behavior.
For any job requirement, plan and prepare for a 20-minute mock interview.
INTRODUCTION
Introduction – Code and Content – Stimulus and Response: Source – The Encoding Process – The Channel
– The Decoding Process – The Receiver – Speaking Skills – Effective Speaking Guidelines –
Communicating Soft Skills: A Self-assessment – Closing Tips
(4)
SOFT SKILLS
Introduction to Soft Skills – Lessons from the Three Case Studies – Change in Today’s Workplace: Soft
Skills as a Competitive Weapon – Antiquity of Soft Skills – Classification of Soft Skills: Time Management
- Attitude – Responsibility – Ethics, Integrity, Values and Trust – Self-confidence and Courage –
Consistency and Predictability – Teamwork and Interpersonal Skills - Communication and Networking –
Empathy and Listening Skills – Problem Solving, Troubleshooting and Speed reading – Leadership – Body
Language
(8)
TELEPHONING SKILLS & NEGOTIATIONS
Preparing to make a telephone call – Receiving calls – Taking and leaving messages – Asking for and
giving repetition – The secretarial barrier – Cross-cultural communication on the telephone – Setting up
appointments – Changing arrangements – Ending a call – Cross-cultural communication on the telephone
– Problem-solving on the telephone – Complaints – Negotiations: Types of negotiation – Preparation for a
negotiation – Making an opening statement – Bargaining and making concessions – Accepting and
confirming – Summarizing and looking ahead – Types of negotiator – Dealing with conflict - Rejecting –
Ending the negotiation
(8)
WRITING SKILLS TO CREATE AN IMPRESSION
Fifteen Principle to Increase Clarity in Communication – Edit-Edit-Edit: The Reader’s Perspective –
Clarity of Thought – Clarity of Text.
(3)
96
SPEAKING
Job Interviews: Types of Interviews - Groundwork before the Interview -Importance of body Language
in Interview - Need for proper Articulation - Concluding an Interview - Telephonic or Video Interview - A
Mock Interview - Group Discussion: Introduction - Ability to Work as a Team – Communication Skills -
Active Listening - Non-verbal Communication - Leadership and Assertiveness - Reasoning – Ability to
Influence - Innovation. Creativity, and Lateral Thinking - Flexibility - Key Steps to Succeed in a Group
Discussion - The Responsibility of the First Speaker - Concluding the Discussion - Dos and Don'ts during
a Group Discussion
(7)
TOTAL HOURS:30
97
19MAM69 - HACKATHON
Contact Hours
L T P C
0 0 2 1
ASSESSMENT: PRACTICAL
PRE-REQUISITES:
Consent of the Instructor
COURSE OUTCOMES
CO1: To familiarize students about the various programming challenges in Hackathons and encourage the
students to participate in it.
CO2: To gain experience in devising solutions to real-time problems and challenges of industry in the
domain of AI/ML.
CO3: To explore research problems in the area of AI/ML and implement it.
• The evaluation is done as continuous assessment based on the participation, problem and the
solution implementation.
TOTAL HOURS: 30
98
19MAM81 - GRAPH REPRESENTATION LEARNING
Contact Hours
L T P C
3 0 0 3
ASSESSMENT: THEORY
PRE-REQUISITES:
19MAM21,19MAM42, 19MAM61
COURSE OUTCOME
CO1 : Understand the fundamental concepts of graph theory.
CO2 : Familiarize with the different graph reconstruction methods.
CO3 : Model Graph Neural Networks to solve real-time problems
CO4 : Apply Graph Generative Models for finding solutions for complex data problems
CO5 : Learn about knowledge graph and its representation
(9)
TOTAL HOURS: 45
99
TEXTBOOKS
1. William L. Hamilton, ‘Graph Representation Learning’, Morgan & Claypool publishers, 2020. (Para I-
IV)
2. Sean Martin, Ben Szekely, and Dean Allemang, ‘The Rise of the Knowledge Graph: Toward Modern
Data Integration and the Data Fabric Architecture’, O’Reilly Media, Inc. I Edition, 2021. (Para V)
REFERENCES
1. Aldo Marzullo, Claudio Stamile, and Enrico Deusebio, Graph Machine Learning, Packt
Publishing, 2021.
2. Mark Needham, Amy E. Hodler, Graph Algorithms: Practical Examples in Apache Spark and
Neo4j, O’Reilly, 2019.
3. Mayank Kejriwal, Craig A. Knoblock and Pedro Szekely, ‘Knowledge Graphs: Fundamentals,
Techniques, and Applications, MIT Press, 2021.
100
19MAM82 - REINFORCEMENT LEARNING
Contact Hours
L T P C
3 0 2 4
ASSESSMENT:THEORY
PRE-REQUISITES
19MAM18,19MAM22
COURSE OUTCOMES
CO1: Familiarize with the fundamentals of Reinforcement Learning.
CO2: Understand and apply basic RL algorithms for simple sequential decision-making problems in
uncertain conditions.
CO3: Examine the various model-based and model-free methods for model planning and learning.
CO4: Review the application of approximation-based algorithms for Reinforcement Learning
CO5: Learn the applications and latest trends in Reinforcement Learning
CO6: Implement reinforcement learning algorithms to solve a cognitive task
PRATICALS
Implement the reinforcement learning algorithms using OpenAI Gym and Tensor flow or any RL platform.
(15)
TOTAL HOURS: 60
TEXTBOOKS
1. Richard Sutton & Andrew G. Barto, ‘Reinforcement Learning: An Introduction’, 1 st Edition,
MIT Press,2015.
2. Sudharshan Ravichandran, Sean Saito, Rajalingappa Shanmugamani and Yang Wenzhao, “Python
Reinforcement Learning”, Packt, 2019. (Practicals)
101
REFERENCES
1. Csaba Szepersvani, ‘Algorithms for Reinforcement Learning’, Morgan and Claypool Publishers,
2010.
2. Maxim Lapan, “Deep Reinforcement Learning”, Packt2, 2018.
3. Parag Kulkarni, “Reinforcement and System Machine Learning for Decision Making”, Wiley,
2012.
102
19MAM83 - META-HEURISTIC OPTIMIZATION TECHNIQUES
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1 : Understand the basic concepts of heuristic optimization .
CO2 : Familiarize with genetic and evolutionary algorithm and its applications in real world problem
solving.
CO3 : Apply Ant colony optimization algorithmic models for various optimization problems.
CO4 : Implement particle swam optimization algorithm and Firefly algorithms for problem solving.
CO5 : Solve computational problems using Honeybee optimization techniques.
OVERVIEW OF OPTIMIZATION
Optimization - Objective Function - Decision Variables - Solutions of an Optimization Problem - Decision
Space - Constraints or Restrictions - State Variables - Local and Global Optima - Near‐Optimal Solutions
(6)
INTRODUCTION TO META‐HEURISTIC AND EVOLUTIONARY ALGORITHMS
Searching the Decision Space for Optimal Solutions - Definition of Terms of Meta‐Heuristic
and Evolutionary Algorithms Principles of Meta‐Heuristic and Evolutionary Algorithms - Classification
of Meta‐Heuristic and Evolutionary Algorithms - Meta‐Heuristic and Evolutionary Algorithms in Discrete
or Continuous Domains - Generating Random Values of the Decision Variables - Dealing with Constraints
-Selection of Solutions in Each Iteration - General Algorithm - Performance Evaluation of Meta‐Heuristic
and Evolutionary Algorithms.
(8)
GENETIC ALGORITHMS
Introduction - Mapping the Genetic Algorithm (GA) to Natural Evolution - Creating an Initial Population
- Selection of Parents to Create a New Generation - Population Diversity and Selective Pressure -
Reproduction - Termination Criteria - User‐Defined Parameters of the GA.
(8)
103
(10)
HONEY‐BEE MATING OPTIMIZATION
Introduction - Mapping Honey‐Bee Mating Optimization (HBMO) to the Honey‐Bee Colony Structure -
Creating an Initial Population - The Queen - Drone Selection - Brood (New Solution) Production -
Improving Broods (New Solutions) by Workers - Termination Criteria - User‐Defined Parameters
of the HBMO.
(7)
FIREFLY ALGORITHM
Introduction - Mapping the Firefly Algorithm (FA) to the Flashing Characteristics of Fireflies - Creating
an Initial Population – Attractiveness - Distance and Movement - Termination Criteria 200 16.7 User‐
Defined Parameters of the FA
(6)
TOTAL HOURS : 45
TEXTBOOKS
1. Omid Bozorg‐Haddad, Iran Mohammad Solgi, Iran Hugo A. Loaiciga, “Meta‐Heuristic
and Evolutionary Algorithms for Engineering Optimization”, John Wiley & Sons, 2017.
2. Marco Dorrigo, Thomas Stutzle, “Ant Colony Optimization”, PHI,2005 (Para IV)
REFERENCES
1. Leandro Nunes de Castro, “Fundamentals of Natural Computing: Basic concepts, Algorithms and
Applications “, CRC Press,2007.
2. Carlos A. Coello Coello Gary B. Lamont David A. Van Veldhuizen, ”Evolutionary Algorithms for
Solving Multi-Objective Problems”, Second Edition, Springer, 2007.
3. Kwang Y. Lee and Mohamed A. El-Sharkawi, “Modern Heuristic Optimization Techniques Theory and
Applications to Power Systems”, Wiley, 2008.
104
19MAM84 - META-HEURISTIC OPTIMIZATION LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Implement optimization techniques on specific applications
CO2: Understand and perform Binary and Continuous Genetic Algorithm in real time application
CO3: Apply evolutionary computation methods to solve complex problems
CO4: Learn and use various Extreme Learning Machine techniques for real time application
CO5: Summarize current research in Genetic Algorithms and Evolutionary Computing
TOPICS TO BE COVERED
1. Implement ANT Colony Optimization.
2. Implement Particle Swarm Optimization (PSO).
3. Multi objective optimization in Genetic Algorithm.
4. Adaptive mutation in Genetic Algorithm.
5. Binary Genetic Algorithm
6. Continuous Genetic Algorithm
7. Build Extreme Learning Machine (ELM).
8. ELM for Multi-Class Classification.
9. Genetic Algorithm Based Approach in attribute weighting for a Medical Data Set.
10. Elementary Operations on L-R Fuzzy number.
REFERENCES
1. Fister Jr., X.-S. Yang, I. Fister, J. Brest, “Memetic firefly algorithm for combinatorial optimization
in Bioinspired Optimization Methods and their Applications”, Slovenia, 2012.
2. Marco Dorigo and Thomas Stützl, “Ant Colony Optimization”, The MIT Press, 2004.
105
19MAM91 - COMPUTER VISION
Contact hours
L T P C
3 0 0 3
PRE-REQUISITES:
19MAM42
ASSESSMENT : THEORY
COURSE OUTCOMES
CO1: Understand and use the vision technology in conjunction with real world applications.
CO2: Detecting features, discuss feature correspondences across different images and review image
segmentation techniques like Active contours, Split and merge, Mean shift and mode finding.
CO3: Investigate techniques like shading and focus, merging multiple range or depth images into 3D
models, and reconstructing them.
CO4: Perform pose estimation, camera's intrinsic calibration, estimate 3D point structure from 2D matches,
3D geometry, camera motion and the motion between two or more images.
CO5: Reconstruct the 3D shape of a scene from images taken from different views.
106
TEXTBOOK
1. Richard Szeliski, "Computer Vision: Algorithms and Applications", Springer-Verlag London
Limited, 2011.
REFERENCES
1. Forsyth, D. and Ponce, J, "Computer Vision: a modern approach", Prentice Hall, 2002.
2. Vaibhav Verdhan, “Computer Vision Using Deep Learning: Neural Network Architectures with
Python and Keras”, APress, 2021.
3. V Kishore Ayyadevara, Yeshwanth Reddy, “Modern Computer Vision with PyTorch”, 2020.
107
19MAM92 - CYBER THREAT INTELLIGENCE
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
19MAM42
COURSE OUTCOMES
CO1: Familiarize with the concepts of cyber threat intelligence and its requirements.
CO2: Identify methods to collect cyber threat intelligence Requirements
CO3: Analyze and Disseminate Cyber Threat Intelligence
CO4: Understand the role of cyber threat intelligence partner
CO5: Apply machine learning techniques to detect cyber security threats in web, network, emails etc.
108
DETECTING CYBER SECURITY THREATS WITH AI
Email Cyber Security Threats with AI: Detecting Spam with Perceptron, Support Vector Machines and
Naïve Bayes-Spam Detection with Logistic Regression and Decision Trees- Bayesian Spam Detector.
Malware Threat Detection: AI for Malware Analysis-Decision Tree Malware Detectors-Detecting
Metamorphic Malware with Hidden Markov Models-Malware and Deep Learning.
Network Anamoly Detection Techniques: Network Attacks-BotNet Topology-Machine Learning for
Botnet Detection.
(12)
TOTAL HOURS: 45
TEXTBOOKS
1. Jon Friedman. Mark Bouchard, CISSP. Foreword by John P. Watters, Cyber Threat Intelligence,
Definitive Guide TM, 2015. (Para I to IV).
2. Alessandro Parisi, “Hands-on Artificial Intelligence for Cyber Security”, Packt, 2019. (Para V)
REFERENCES
1. Christ Pace, Andrei Barysevich, Levi Gundert, Allan Liska, Maggie McDaniel, John Wetzel, “The
Threat Intelligence Handbook : A Practical Guide for Security Teams to unlocking the power of
Intelligence”, CyberEdge Group, 1997. (Para 4 : Chapters 2 and 4, Para 5 : Chapters 6,7, and 10)
2. Henry Dalziel, How to Define and Build an Effective Cyber Threat Intelligence Ca pability Elsevier
Science & Technology, 2014.
3. John Robertson , Ahmad Diab , Ericsson Marin , Eric Nunes , Vivin Paliath , Jana Shakarian , Paulo
Shakarian, DarkWeb Cyber Threat Intelligence Mining Cambridge University Press, 2017.
109
19MAM93 - COMPUTER VISION LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
19MAM65
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Explore the process of image construction and blending
CO2: Apply Image formation techniques and feature based process
CO3: Extract features from Images and do analysis of Images
CO4: Perform object detection and face recognition using CNNs and RCNNs.
CO5: Implement image classification using benchmark image datasets like CIFAR-10 and other types of
images.
CONCEPTS TO BE COVERED
1. Create a set of rectangles and then modify their “pose” (2D transform)
2. Image blending, Feature-based morphing, Edge editing and enhancement
3. Interest point detector Implement one or more keypoint detectors and compare their performance
4. Implement 2D and 3D multi-object detection and segmentation
5. Combine CV with NLP to perform OCR, image captioning
6. Perform Object Detection with YOLOv3, Object Detection with Mask R-CNN,
7. Develop a New Object Detection Model
8. Feature-based image alignment for flip-book animations ( Eg.Take a set of photos of an action
scene or portrait (preferably in motor-drive—continuous shooting—mode) and align them to make
a composite or flip-book animation.)
9. Deep Learning for Face Recognition: Detect Faces in Photographs, Face Identification and
Verification with VGGFace2
10. Face Classification with FaceNet
11. Classify Black and White Photos of Clothing
12. Classify Small Photos of Objects, Label Satellite Photographs of the Amazon Rainforest
REFERENCE
1. Jan Erik Solem, “Programming Computer Vision with Python”, O’Reilly, 2012.
2. Jason Brownee, “Deep Learning for Computer Vision”, Ebook, 2019.
110
19MAM94 - INTELLIGENT CYBER SECURITY LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
19MAM46,19MAM65
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Apply classification techniques for detection
CO2: Perform Preprocessing technique in face detection
CO3: Perform clustering technique for cyber security
CO4: Implement various techniques and security algorithms on specific problems.
CO5: Develop intelligent solutions/tools to detect and protect against cyber threat through data analytics
for an enterprise.
CONCEPTS TO BE COVERED
• Email Spam filtering using machine learning techniques, Bayesian spam detector
• Phishing detection using ML.
• Protection against credential stuffing campaigns, a common threat tactic in the ecommerce and
online services sector.
• Malware Detection using ML, PDF malware detection
• Windows Ransomware detection, Crypto Ransomware detection
• Communication Network Analysis to identify Anomalies, ML for Botnet detection
• Behavior Analytics
• Collect information from multiple sources(dark web, social media, cyber security research feeds
etc ) to create a reliable repository of threat-related knowledge and derive insights.
• Dynamic Intelligence feed
• Bio-metric authentication with facial recognition
REFERENCES
1. Ali Dehghantanha, Mauro Conti, Tooska Dargahi, Cyber Threat Intelligence, Springer, 2018
2. Alessandro Parisi, “Hands-on Artificial Intelligence for Cyber Security”, Packt, 2019. (Para V)
111
ELECTIVE
19MAME01 - ETHICS IN AI
Contact Hours
L T P C
3 0 0 3
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: THEORY
COURSE OUTCOMES
CO1: Understand the concept of building ethics in machines
CO2: Develop and designs test cases for hypothetical cases in Self driving cars
CO3: Able to build the methodologies for ethical AI
CO4: Identify Ethical priorities in AI systems
CO5: Design AI with rights, consciousness, and freedom
112
TEXTBOOKS
1. Y S. Matthew Liao, “Ethics of Artificial Intelligence”, First Edition, Oxford University
Press,2020.
2. John C. Havens, “Heartificial Intelligence: Embracing Our Humanity to Maximize Machines”,
Tarcher Perigee, 2016
REFERENCE
1. Mark Coeckelbergh, “AI Ethics”, The MIT Press, 2020.
113
19MAME02 – HEALTHCARE ANALYTICS
Contact Hours
L T P C
2 0 2 3
ASSESSMENT: THEORY
PRE-REQUISITES
Consent of the instructor
COURSE OUTCOMES
CO1: To understand the various sources of healthcare data analyze it.
CO2: To gain a overall understanding about the electronic healthcare records.
CO3: To process the different types of healthcare data stored in health data sources.
CO4: To apply the appropriate biomedical image and text analysis techniques for analyzing biomedical
image and clinical text data.
CO5: To generate the prediction health care model using temporal, sensor and text mining techniques.
INTRODUCTION
Introduction to Healthcare Data Analytics – Healthcare Data Sources and Basic Analytics - Advanced Data
Analytics for Healthcare - Applications and Practical Systems for Healthcare - Resources for Healthcare
Data Analytics.
(5)
HEALTHCARE DATA SOURCES AND BASIC ANALYTICS
Electronic Health Records: A Survey – History and components of EHR - Coding systems - Benefits of
EHR – Challenging of Using EHR Data.
(4)
HEALTHCARE DATA ANALYTICS
Biomedical Image Analysis – Biomedical Imaging Modalities – Object Detection - Image Segmentation -
Image Registration - Feature Extraction. Natural Language Processing and Data Mining for Clinical Text
– Natural Language Processing - Mining Information from Clinical Text - Challenges of Processing
Clinical Reports - Clinical Applications. Social Media Analytics for Healthcare – Social Media Analysis
for Detection and Tracking of Infectious Disease Outbreaks - Social Media Analysis for Public Health
Research - Analysis of Social Media Use in Healthcare.
(8)
ADVANCED DATA ANALYTICS FOR HEALTHCARE
Temporal Data Mining for Healthcare Data – Association Analysis, Temporal Pattern Mining - Sensor
Data Analysis - Other Temporal Modelling Methods. Information Retrieval for Healthcare – Knowledge-
Based Information in Healthcare and Biomedicine - Content of Knowledge-Based Information Resources
– Indexing – Retrieval - Evaluation. Privacy-Preserving Data Publishing Methods in Healthcare – Data
Overview and Pre-processing - Privacy-Preserving Publishing Methods - Challenges with Health Data
(8)
APPLICATIONS AND PRACTICAL SYSTEMS FOR HEALTHCARE
Fraud Detection in Healthcare, Mobile Imaging and Analytics for Biomedical Data – Image Formation,
Data Visualization - Image Analysis - Image Management and Communication
(5)
114
PRACTICALS
Analysis of Healthcare (EHR) Data-Analysis of prescriptions-Social Media Analysis for Detection and
Tracking of Infectious Disease Outbreaks-Analyzing healthcare images-Data Visualization of biomedical
data.
(15)
TOTAL HOURS: 45
TEXTBOOK
1. Chandan K. Reddy and Charu C. Aggarwal, “HealthCare Data Analytics”, CRC Press, 2015.
REFERENCES
1. Laura B. Madsen, “Data-Driven Healthcare: How Analytics and BI are Transforming the Industry”,
Wiley and SAS Business Series, 2014.
2. Trevor L. Strome, “Healthcare Analytics for Quality and Performance Improvement”, John Wiley &
Sons, Inc., 2013.
3. Surbi Bhatia, Ashutosh Kumar Dubey, Rita Chikara, Poonam Chaudhary, Abishek Kumar, “Intelligent
Healthcare-Applications of AI in eHealth”. EAI/Springer Innovations in Communication and
Computing, 2021.
115
19MAME03 - SMART APPLICATIONS
Contact Hours
L T P C
3 0 0 3
ASSESSMENT: THEORY
PRE-REQUISITES
Consent of the Instructor
COURSE OUTCOMES
CO1: Provides Comprehensive understanding of Artificial Intelligence and Intelligent Systems in the
context of Knowledge Engineering.
CO2: Recognize the technologies behind AI and software-defined network/network function
virtualization, highlighting the exciting opportunities to integrate those two worlds.
CO3: To get familiar with the various applications of these techniques in manufacturing systems.
CO4: Highlights the avionics and satellite communication systems and aerospace platforms
CO5: Provide an invaluable resource for artificial intelligence, and machine learning researchers.
116
ADVANCED TOPICS IN AI - PRESENT AND FUTURE
Introduction – AI and Concurrency – Agent-based Concurrent Engineering-Cloud computing and
Intelligent Agents- Planning and logic –Business Intelligence and Analytics- Sentiment Analysis- Big data
and sensory processing (SP) – Theory of Intelligence – Future of Intelligent Systems.
(9)
TOTAL HOURS: 45
TEXTBOOKS
1. Crina Grosan and Ajith Abraham , “Intelligent Systems: A Modern Approach (Intelligent Systems
Reference Library)”, Springer – Verlag Berlin Heidelberg, 2011.(Para I)
2. Mazin Gilbert, “Artificial Intelligence for Autonomous Networks", CRC press Publications,
2018.(Para II)
3. Parag Kulkarni and Prachi Joshi “Artificial Intelligence: Building Intelligent Systems”, PHI
Learning Private Limited, 2015. (Para III)
4. E. Oztemel, Lyes Benyoucef, Bernard Grabot , “Artificial Intelligence Techniques for Networked
Manufacturing Enterprises Management”, Springer-Verlag, 2010.(Para IV&V)
REFERENCES
1. Michael Negnevitsky “Artificial Intelligence A Guide to Intelligent Systems” , 2nd Edition Pearson
Education Limited, 2005.
2. Martin Osborne, “Introduction to Game Theory”, Oxford University Press, 2009.
117
19MAME04 - SPATIAL DATA MODELING AND ANALYSIS
Contact Hours
L T P C
3 0 0 3
ASSESSMENT: THEORY
PRE-REQUISITES
Consent of the Instructor
COURSE OUTCOMES
CO1: Use the fundamental concepts of Geographic Information Science and Technology
CO2: Design Geo Spatial Database
CO3: Describe the geospatial system and represent various data models.
CO4: Analyze Geospatial data using spatial and raster analysis techniques.
CO5: Create and design principles, including thematic map display, map projections, and cartographic
design
INTRODUCTION TO GIS
Introduction – GIS Components – GIS in Organizations. Data Models - Introduction – Common Spatial
Data Models – Raster Data Models – Other Data Models – Data File and Structures. Geodesy, Datums,
Map Projections and Coordinate Systems
(9)
DESIGNING GIS DATABASE WITH DIGITAL DATA
Maps, Data Entry, Editing and Output – Building GIS Database – Digitizing Coordinate capture –
Coordinate
Transformation – Output : Maps – Data – Meta Data. Digital Data - Introduction –National and Global
Digital Data. Tables
(9)
GEOSPATIAL NAVIGATION SYSTEM AND DATA MODEL
Global Satellite Navigation System and Coordinate Surveying - Introduction – Differential Correction –
Optical and Laser Coordinate Surveying – GNSS Applications. Aerial and Satellite Images - Basic
Principles – Aerial Images – Satellite Images – Air born LiDAR
(9)
SPATIAL AND RASTER ANALYSIS
Basic Spatial Analysis - Introduction – Selection and Classification – Dissolve – Proximity Functions and
Buffering – Overlay – Network Analysis. Topics in Raster Analysis - Map Algebra – Local Functions –
Neighborhood, Zonal and Global Functions. Terrain Analysis
(9)
SPATIAL MODELING AND ESTIMATION
Spatial Estimation: Interpolation, Prediction, Core Area - Sampling – Spatial Interpolation Methods –
Spatial Prediction –Core Area Mapping. Spatial Models and Modelling - Cartographic Modeling. Data
Standards and Data Quality. New Developments in GNSS – GNSS – Datum Modernization–Improved
Remote Sensing – Cloud Based GIS–Open GIS
(9)
TOTAL HOURS: 45
118
TEXTBOOK
1. Paul Bolstad, “GIS Fundamentals: A First Text on Geographic Information Systems”, 6th edition, 2019
REFERENCES
1. Robert Haining, “Spatial Data Analysis Theory and Practice”, Cambridge University, 2010.
2. Jay Gao, “Fundamentals of Spatial Analysis and Modelling”, CRC Press, 2021.
119
19MAME05 – AUGMENTED AND VIRTUAL REALITY
Contact Hours
L T P C
3 0 0 3
ASSESSMENT: THEORY
PRE-REQUISITES
Consent of the Instructor
COURSE OUTCOMES
CO1: Learn the fundamentals of Augmented Reality(AR)
CO2: Implement AR tools and predict the approximate future direction of Mixed Reality.
CO3: Explore the concept of Virtual Reality
CO4: Demonstrate appropriate perceptual model for building a virtual reality system
CO5: Design various stages for Virtual reality process
(9)
VIRTULA REALITY(VR)
Introduction to VR: Definition of Virtual Reality-History of VR- Overview of Various Realities-
Immersion, Presence and Reality Trade-Offs- Design Guidelines.
(9)
PERCEPTION
Objective and Subjective Reality-Perceptual Models and Processes: Distal and Proximal Stimuli-Sensation
versus Perception - Bottom-Up and Top-Down Processing-Perceptual Modalities: Sight-Hearing-Touch-
Proprioception-Balance and Physical Motion.
(10)
ITERATIVE DESIGN
Philosophy of Iterative Design-The Define Stage- The Make Stage: Task Analysis- Design Specification-
System Considerations-Simulation-The Learn Stage.
(8)
TOTAL HOURS:45
TEXTBOOKS
1. Gregory Kipper, Joseph Rampolla Chris Katsaropoulos “Augmented Reality-An Emerging
Technologies Guide to AR”, 2013. [Para I, II]
2. Jason Jerald, “The VR Book-Human-Centered Design for Virtual Reality”, ACM Books,
2016 [Para III, IV, V]
120
REFERENCES
1. John Vince, “Virtual Reality Systems”, Pearson Education, 2002
2. Paul Mealy, “Virtual & Augmented Reality for Dummies”, Kindle Publication, 2018
121
19MAME06 - MEDICAL IMAGE PROCESSING
Contact Hours
L T P C
3 0 0 3
ASSESSMENT: THEORY
PRE-REQUISTES
19MAME17
COURSE OUTCOMES
CO1: Understand the fundamentals of medical imaging techniques
CO2: Learn various noise reduction filters and feature extraction for medical data analysis.
CO3: Apply various image restoration techniques on medical image data.
CO4: Familiarize with the bio-medical image segmentation methods
CO5: Use machine learning methods on MRI data to derive insights.
(8)
BIOMEDICAL IMAGE SEGMENTATION
Points Detection-Line Detection-Edge Detection and Methods-Histogram Based-Split and Merge Method-
Region Growing Method-k-Means Clustering Method
(10)
BIG DATA and Magnetic Resonance Imaging
Magnetic Resonance Imaging Techniques: MRI Signal Types-Machine Learning for Structural and
Functional Imaging Data.
(9)
TOTAL HOURS:45
TEXTBOOKS
1. G.R. Sinha, Bhagwati Charan Patel, “Medical Image Processing”, PHI India, 2014.
2. Ervin Sejdic, Tiago H.Falk, “Signal Processing and Machine Learning for Biomedical Big Data,
CRC,Press,2018.(Para V).
122
REFERENCES
1. AtamP.Dhawan, ‘Medical Image Analysis’, Wiley Interscience Publication, 2003.
2. KavyanNajarian and Robert Splerstor,” Biomedical signals and Image processing”,CRC,2006.
123
19MAME07 – NATURAL LANGUAGE PROCESSING
Contact Hours
L T P C
3 0 0 3
ASSESSMENT: THEORY
PRE-REQUISITES
19MAM51,19MAM62
COURSE OUTCOMES
CO1: Learn and understand the fundamental units of language and its models.
CO2: Use vector semantics and implement vector models for texts.
CO3: Design and develop NLP systems using machine learning models like Naïve Bayes, Neural
Networks.
CO4: Use Hidden Markov Model and Conditional Random fields in tagging parts-of-speech tagging
CO5: Apply the principles of deep learning techniques to process speech and texts based applications.
(7)
NAIVE BAYES AND SENTIMENT CLASSIFICATION
Naive Bayes Classifiers - Training the Naive Bayes Classifier-Worked Example-Optimizing for
Sentiment Analysis - Naive Bayes for other text classification tasks-Naive Bayes as a Language Model
- Evaluation: Precision, Recall, F-measure - Test sets and Cross-validation - Statistical Significance
Testing - Avoiding Harms in Classification-Applications.
(7)
124
POS Tagger-Features for POS Named Entities Recognizers-Inference and Training for CRFs-
Evaluation of Named Entity Recognition.
(8)
(8)
TOTAL HOURS:45
TEXTBOOK
1. Jurafsky and Martin, “Speech and Language Processing”, Pearson, 2022
REFERENCES
1. Manning and Schutze, "Foundations of Statistical Natural Language Processing" MIT Press
Cambridge, MA, 1999.
2. Denis Rothman “Transformers for Natural Language Processing”,Packt, 2021
125
19MAME08 - PROBABILISTIC GRAPHICAL MODELS
Contact Hours
L T P C
2 0 2 3
ASSESSMENT: THEORY
PRE-REQUISITES:
19MAM13, 19MAM22,19MAM47
COURSE OUTCOMES
CO1: Understand the mathematical framework of probabilistic graphical models
CO2: Apply various representation models
CO3: Understand the basic concepts of probabilistic inference in graphical models
CO4: Apply the inference of Probabilistic models
CO5: Familiarize with the learning process of graphical models like Bayesian and Hidden Markov Model.
CO6: Implement Probabilistic graphical Models and draw inference for real world problems using Python
libraries
FOUNDATIONS
Structured Probabilistic Models – Foundations: Probability Theory – Graphs. Bayesian Network
Representation: Exploiting Independence Properties – Bayesian Networks – Independencies in Graphs –
From Distributions to Graphs.
(5)
UNDIRECTED GRAPHICAL MODELS
Parameterization -Markov Network Independencies – Parameterization Revisited – Bayesian Networks
and Markov Networks – Partially Directed Models.
(5)
LOCAL PROBABILISTIC MODELS
Tabular CPDs – Deterministic CPDs – Context-Specific CPDs – Independence of Causal influence –
Continuous Variables – Conditional Bayesian Networks. Gaussian Network Models: Multivariate
Gaussians – Gaussian Bayesian Networks – Gaussian Markov Random Fields.
(6)
INFERENCE
Analysis of Complexity- Variable Elimination – Complexity and Graph Structure-Conditioning – Inference
with Structured CPDs. Variable Elimination and Clique Trees – Message Passing: Sum Product – Message
Passing : Belief Update – Constructing a Clique Tree
(6)
LEARNING GRAPHICAL MODELS
Goals of Learning – Learning as Optimization – Learning Tasks. Structure Learning in Bayesian Networks:
Constraint-based Approaches – Structure Scores – Structure Search – Bayesian Model Averaging –
Learning Models with Additional Structure. Specialized Models: Naïve Bayes and Hidden Markov Model.
(8)
PRACTICALS
Problems based on the above modules using Python library pgmpy and Tensorflow.
(15)
TOTAL HOURS: 45
126
TEXTBOOKS
1. Daphne Koller and Nir Friedman, “Probabilistic Graphical Models Principles and Techniques”, MIT
Press, Cambridge, Massachusetts, Lond, 2009.
2. Ankur Ankan and Abinash Panda, “Mastering Probabilistic Graphical Model in Python”, Packt,2015.
(Practicals)
REFERENCES
1. Qiang Ji, “Probabilistic Graphical Models for Computer Vision”, First Edition, Elsevier, 2019.
2. Luis Enrique Sucar, “Probabilistic Graphical Model”, Springer, 2015.
127
19MAME09 - COGNITIVE COMPUTING
CONTACT HOURS
L T P C
3 0 0 3
ASSESSMENT: THEORY
PRE-REQUISITES
Consent of the instructor
COURSE OUTCOMES
CO1: Learn and understand the basics concepts of cognitive computing and its applications.
CO2: Identify the building blocks of a cognitive system and use it to design cognitive system for various
business requirements.
CO3: Determine the role of NLP and knowledge representation in cognitive systems.
CO4: Build a complete cognitive system and test it successfully
CO5: Familiarize with the latest trends and case studies on cognitive computing systems.
(8)
DESIGN PRINCIPLES AND BUSINESS IMPLICATIONS
Components of a Cognitive System-Building the Corpus-Corpus Management Regulatory and Security
Considerations-Bringing Data into the Cognitive System-Leveraging Internal and External Data Sources-
Data Access and Feature Extraction Services-Analytics Services-Infrastructure.
Preparing for Change-Advantages of New Disruptive Models-The Difference with a Cognitive Systems
Approach-Using Business Knowledge to Plan for the Future-Answering Business Questions in New Ways-
Building Business Specific Solutions-Making Cognitive Computing a Reality.
(8)
NATURAL LANGUAGE PROCESSING IN COGNITIVE COMPUTING
The Role of NLP in a Cognitive System: Context-Connecting Words for Meaning-Understanding
Linguistics-Language Identification and Tokenization-Phonology-Morphology-Lexical Analysis-Syntax
and Syntactic Analysis-Construction Grammars-Discourse Analysis-Pragmatics-Techniques for Resolving
Structural Ambiguity-Importance of Hidden Markov Models-Word‐Sense Disambiguation (WSD)-
Semantic Web-Applying Natural Language Technologies-to Business Problems: Enhancing the Shopping
Experience-Leveraging the Connected World of Internet of Things-Voice of the Customer-Fraud
Detection.
(9)
128
REPRESENTING KNOWLEDGE IN TAXONOMIES AND ONTOLOGIES
Representing Knowledge-Developing a Cognitive System: Defining Taxonomies and Ontologies-
Representing Knowledge-Managing Multiple Views of Knowledge-Models for Knowledge
Representation-Taxonomies, Ontologies, Other Methods of Knowledge Representation: Simple Trees-
Persistence and State-Implementation Considerations.
(7)
BUILDING A COGNITIVE APPLICATION
The Emerging Cognitive Platform-Defining the Objective, Domain, Users and Attributes-Exploring
Insights-Typical Question‐Answer Pairs-Anticipatory Analytics-Acquiring the Relevant Data Sources-
Importance of Leveraging Structured Data Sources-Analyzing Dark Data -Leveraging External Data-
Creating and Refining the Corpora-Preparing the Data-Ingesting the Data-Refining and Expanding the
Corpora-Governance of Data-Training and Testing.
(7)
EMERGING COGNITIVE COMPUTING APPLICATIONS
Characteristics of Ideal Markets for Cognitive Computing-Vertical Markets and Industries-Retail-Travel-
Transportation and Logistics-Telecommunications-Security and Threat Detection-Other Areas That Are
Impacted by a Cognitive Approach.
Case Studies: IBM’S Watson as a Cognitive System- Building a Cognitive Healthcare Application-
Smarter Cities: Cognitive Computing in Government.
(6)
TOTAL HOURS: 45
TEXTBOOK
1. Judith S. Hurwitz, Marcia Kaufman, Andrian Bowles, “Cognitive Computing and Big Data Analytics”,
Wiley Publications, 2015
REFERENCES
1. Pradeep Kumar Mallick, Samarjeet Borah, “Emerging Trends and Applications in Cognitive
Computing”, IGI Global,2019.
2. Rob High, Tanmay Bakshi, “cognitive Computing with IBM Watson, Packt Publishers, 2019.
129
19MAME10- RECOMMENDER SYSTEMS
Contact Hours
L T P C
2 0 2 3
ASSESSMENT: THEORY
PRE-REQUISITES
19MAM42
COURSE OUTCOMES
CO1: Familiarize with the basics concepts and applications of recommender systems.
CO2: Review the different methods of neighborhood based collaborative filtering.
CO3: Demonstrate the use of machine learning models for collaborative filtering.
CO4: Examine content based and knowledge-based systems and its categories to build recommender
systems.
CO5: Develop new Recommender Systems for a number of domains like, Education, Health-care etc and
evaluate its performance.
130
TEXTBOOKS
1. Charu C.Aggarwal, “Recommender Systems”, Springer, 2016.
2. Rounak Banik, “Hands on Recommender System Using Python, Packt, 2019 (Practicals)
REFERENCES
1. Kim Falk, “Practical Recommender Systems”, Manning Publications,2019.
2. Frank Kane, “Building Recommender System with Machine Learning and AI”,2018.
3. Michael Schrage,“ Recommendation Engines”, 2020.
131
19MAME11 - ROBOTICS AND ITS APPLICATIONS
Contact Hours
L T P C
3 0 0 3
ASSESSMENT: THEORY
PRE-REQUISITES
19MAM12, 19MAM21
COURSE OUTCOMES
CO1: Learn the basic components and building blocks of Robots.
CO2: Develop the robot construction skills.
CO3: Acquire skills to program the robots.
CO4: Integrate the features and operations of automation products
CO5: Explore the broad scope of robotic applications
FUNDAMENTALS OF ROBOTICS
Robot Meaning – History of Robots – Classification of Robots - Fundamentals of Robot
Technology, Programming, and Applications - Robot Anatomy - Robot Drive Systems - Control
Systems - Precision of Movement - End Effectors - Robotic Sensors - Robot Programming and
Work Cell Control - Robot Applications
(9)
ROBOT TECHNOLOGY: THE ROBOT AND ITS PERIPHERALS
Control Systems and Components - Basic Control Systems Concepts and Models – Controllers - Control
System Analysis - Robot Sensors and Actuators - Velocity Sensors - Actuators - Power Transmissions
Systems - Modeling and Control of a Single Joint Robot
(9)
ROBOT PROGRAMMING AND LANGUAGES
Robot Programming - Methods of Robot Programming – Lead through Programming Methods - A Robot
Program as a Path in Space - Motion Interpolation - Wait, Signal, and Delay Commands – Branching.
Robot Languages – Artificial Intelligence
(9)
APPLICATIONS ENGINEERING FOR MANUFACTURING
Robot Cell Design and Control - Robot Cell Layouts - Multiple Robots and Machine Interference - Other
Considerations in Workcell Design - Workcell Control - Interlocks - Error Detection and Recovery - The
Workcell Controller - Robot Cycle Time Analysis. Economic Analysis for Robotics - Economic Analysis:
Basic Data Required - Methods of Economic Analysis - Subsequent use of the Robot - Differences in
Production Rates - Robot Project Analysis Form.
(9)
ROBOT APPLICATIONS IN MANUFACTURING
Material Transfer and Machine Loading/Unloading - General Considerations in Robot Material Handling
- Material Transfer Applications - Machine Loading and Unloading. Processing Operations - Spot Welding
- Continuous Arc Welding - Spray Coating - Other Processing Operations using Robots. Assembly and
Inspection
(9)
TOTAL HOURS: 45
132
TEXTBOOKS
1. Mikell P Groover, Mitchel Weiss, Roger N Nagel, Nicholas G Odrey, Ashish Dutta, “Industrial
Robotics Technology, Programming and Applications", 2nd Edition, 2012. (Para I-V)
2. S.K. Saha, “Introduction to Robotics”, Tata McGraw Hill Education, 4th Edition, 2011. (Para - I)
REFERENCES
1. Danny Staple, “Learn Robotics Programming: Build and Control AI-enabled Autonomous Robots
Using the Raspberry Pi and Python”, Packt Publishing, 2nd Edition, 2021
2. Robert J. Schilling, “Fundamentals of Robotics, Analysis & Control", PHI Learning, 2010.
3. Robin R. Murphy, “Introduction to AI Robotics”, Prentice, Hall of India, New Delhi, 2007.
133
19MAME12 - CONVERSATIONAL AI
Contact Hours
L T P C
3 0 0 3
ASSESMENT: THEORY
PRE-REQUISITES
19MAME07
COURSE OUTCOMES
CO1: Understand the basics of a dialogue system.
CO2: Learn rules to develop dialogue systems.
CO3: Develop statistical data driven dialogue systems
CO4: Design and evaluate the dialogue systems.
CO5: Explore the challenges and future scope.
134
REFERENCES
1. Andrew R. Freed, “Conversational AI”, Manning Publications, 2021
2. Srini Janarthanam, “Hands-On Chatbots and Conversational UI Development: Build chatbots and
Voice User Interfaces with Chatfuel, Dialogflow, Microsoft Bot Framework, Twilio, and Alexa
Skills”, Packt Publishing, 2017
135
19MAME13 – GAME THEORY
CONTACT HOURS
L T P C
3 0 0 3
ASSESSMENT: THEORY
PRE-REQUISITES
Consent of the Instructor
COURSE OUTCOMES
CO1: Model a 2 x2 evolutionary games in dynamical systems.
CO2: Develop model for applications using Network reciprocity
CO3: Analyse the evolution of communication in Constructivism Approach
CO4: Design and perform Cellular Automaton Model in realistic Traffic flow
CO5: Examine pandemic analysis as application to which evolutionary game theory can be applied.
(9)
PANDEMIC ANALYSIS AND EVOLUTIONARY GAMES
Modeling the Spread of Infectious Diseases and Vaccination Behavior - Vaccination Games in Complex
Social Networks.
(8)
TOTAL HOURS:45
TEXTBOOK
1. Jun Tanimoto, “Fundamentals of Evolutionary Game Theory and its Applications”, Springer 2016
136
REFERENCES
1. Michael Maschler, Eilon Solan, Shmuel Zamir, “Game Theory”, Cambridge University Press,
2013
2. Martin Osborne, “An Introduction to Game Theory”, Oxford University Press, 2003
137
19MAME14 - AGILE SOFTWARE DEVELOPMENT
Contact Hours
L T P C
3 0 0 3
ASSESSMENT: THEORY
PREREQUISITES
Consent of the Instructor
COURSE OUTCOMES
CO1: Understand the key principles of agile management.
CO2: Learn agile Project Management process and agile project planning.
CO3: Apply agile development management and product management in system development.
CO4: Identify the need for scrum and use scrum tools.
CO5: Compare scrum with conventional project management and waterfall methods.
138
TEXTBOOKS
1. Thomas Stober, Uwe Hansmann, “Agile Software Development - Best Practices for Large
Software Development Projects”, Springer, June 2009. (Para I, II, III)
2. David J. Anderson and Eli Schragenheim, “Agile Management for Software Engineering:
Applying the Theory of Constraints for Business Results”, Prentice Hall, 2003. (Para II, III)
3. Kim H. Pries, Jon M. Quigley, “Scrum Project Management”, CRC Press, 2011. (Para IV,V)
REFERENCES
1. Sudipta Malakar, “Agile Methodologies In – Depth: Delivering Proven Agile, SCRUM and
Kanban Practices for High – Quality Business Demands”, BPB Pubilcations, 2021
2. Mike Cohn, “Succeeding with Agile: Software Development Using Scrum”, Addison Wesley,
2010.
3. Robert C. Martin ,”Agile Software Development, Principles, Patterns, and Practices”, Alan Apt
Series,2011.
139
19MAME15 - SOA AND WEB SERVICES
Contact Hours
L T P C
2 0 2 3
ASSESSMENT: THEORY
PRE-REQUISITES
Consent of the instructor
COURSE OUTCOMES
CO1: Examine the requirements of distributed applications and design web services.
CO2: Apply the concepts of Service Oriented Architecture in designing platform independent real time
distributed applications.
CO3: Design and develop simple to complex web services that meet the specified requirements.
CO4: Develop web services based on requirements of the web application using Java APIs and also
consume them in web applications.
CO5: Determine the security requirements of web services and incorporate them in building web
applications.
INTRODUCTION TO SOA
Introducing SOA: Fundamental SOA - Common Characteristics of Contemporary SOA – Common
Misperceptions about SOA – Common Tangible Benefits of SOA – Common Pitfalls of Adopting SOA -
Evolution of SOA
(5)
WEB SERVICES AND SOA
Web Services and Primitive SOA: The Web Service Framework - Services (as Web Services) - Service
Descriptions (with WSDL) - Messaging (with SOAP); Web Services and Contemporary SOA (Part I:
Activity Management and Composition): Message Exchange Patterns - Service Activity - Coordination -
Atomic Transactions - Business Activities – Orchestration – Choreography
(7)
SOA AND SERVICE-ORIENTATION
Principles of Service-Orientation: Anatomy of a Service-Oriented Architecture - Common Principles of
Service-Orientation – How Service-Oriented Principles Inter-relate; Service Layers.
(6)
BUILDING SOA
Service Oriented Analysis: Introduction – Service Modelling Guidelines; Service Oriented Design:
Introduction to Service-Oriented Design, WSDL-Related XML Schema Language Basics - WSDL
Language Basics - SOAP Language Basics, SOA Composition Guidelines,
Service Design: Service Design Overview, Business Process Design: WS-BPEL Languages Basics - WS-
Coordination Overview - Service-Oriented Business Process Design; Fundamental WS-* Extensions: WS-
Security Language Basics.
(6)
WEB SERVICES IN JAVA
Building Web Services with JAX-WS - Binding between XML Schema and Java Classes – Streaming API
for XML - SOAP with Attachments API for Java - Generating Client-Support Code from a WSDL -
Building RESTful Web Service with JAX-RS.
(6)
140
PRACTICALS
Modelling the business services-Implement the Service Interface and Service Implementation Classes -
Write WSDL document to describe services-Publish web services. Create Web Service Client-Create and
send messages using SOAP Attachment API. Build RESTful APIs and Microservices using Flask/Django
(15)
TOTAL HOURS: 45
TEXTBOOKS
1. Thomas Eri, "Service-Oriented Architecture- Concepts, Technology and Design", Pearson
Education, Second Edition, 2008. (Para I to IV)
2. Eric Jendrock, Jennifer Ball, Debbie Carson, Ian Evans and Kim Haase, "The Java EE5 Tutorial",
Oracle Corporation Press, 2010 (Para V)
REFERENCES
1. Gaston C. Hillar, “Hands-On RESTful Python Web Services”,Packt,2018.
2. Martin Kalin, "Java Web Services: Up and Running", O'Reily Media Inc., First Edition, 2009.
3. Eric Newcomer, Greg Lemow, “Understanding SOA with Web Services”, Pearson Education, Inc,
2005.
141
19MAME16 – INTERNET OF THINGS
Contact Hours
L T P C
3 0 0 3
ASSESSMENT: THEORY
PRE-REQUISITES
Consent of the instructor
COURSE OUTCOMES
CO1: Assess the different IoT technologies that suits an application.
CO2: Recognize the challenges for smart object.
CO3: Demonstrate knowledge of main architectures and paradigms for the Internet of Things.
CO4: Demonstrate knowledge of MAC and routing protocols developed for Low Power and lossy
networks.
CO5: Design simple IoT systems for the given requirements comprising sensors- edge devices- wireless
network connections and data analytics capabilities.
INTRODUCTION
Definition and Characteristics of IoT - Physical Design of IoT - Logical Design of IoT – Enabling
Technologies - IoT Levels - Domain specific IoTs
(5)
SENSORS- PARTICIPATORY SENSING- RFIDS AND WIRELESS SENSOR NETWORK
Introduction-Sensor technology - Sensing the real world-Analog sensors- Examples of sensors – Reading
temperature from Resistance sensor- capacitive sensor-Examples of sensors-Temperature-humidity-
distance light-acceleration-vibrations and shocks-Gyroscope for angular acceleration- Magnetic sensors-
Magnetometer Sound -Sensing the Things-bar code-QR code- Motion sensors-Pressure sensors-Location
and LIDAR-Industrial IoT - in bicycle manufacturing process and Automotive IoT - Connected cars
technology
(10)
DEVELOPING INTERNET OF THINGS
IoT and M2M - IoT System Management with NETCONF-YANG - IoT Design Methodology - Case Study:
Weather monitoring - Motivation for using Python- Logical design using Python: Programming constructs
- Python packages for IoT
(6)
IOT PHYSICAL DEVICES AND ENDPOINTS
Building Blocks of an IoT device - Intel Galileo Board - Raspberry pi
(6)
IOT CLOUD BASED SERVICES USING THE XIVELY- NIMBITS
Cloud storage models and communication API - WAMP-AutoBahn for IoT - Xively cloud for IoT - Django
-Designing a RESTful Web API - Amazon Web services for IoT- Data collection-storage-Computing using
Xively and Nimbits- Data channels using advanced features-security tokens-Alerts-Jabbing-Subscriptions-
Public cloud IoT platforms like Paas and SaaS
(10)
142
DATA ANALYTICS FOR IOT
Apache Hadoop - Using map-reduce for batch data analytics
(4)
CASE STUDIES ILLUSTRATING IoT DESIGN
Home Automation - Cities - Environment - Agriculture - Productivity Applications
(4)
TOTAL HOURS: 45
TEXTBOOK
1. Arshdeep Bahga and Vijay Madisetti, “Internet of Things: A Hands-on Approach”, Universities Press,
2014.
REFERENCES
1. Andy King, “Programming the Internet of Things: An Introduction to Building Integrated Device-to-
Cloud IOT Solutions”, O’Reilly, 2021
2. Agus Kuniawa, “Getting started with Intel IoT and Intel Galileo”, Kindle edition, 2015.
3. Raj Kamal, “Internet of Things - Architecture and Design Principles”, McGraw Hill,2017
143
19MAME17 – DIGITAL SIGNAL AND IMAGE PROCESSING
Contact Hours
L T P C
2 0 2 3
ASSESSMENT: THEORY
PRE-REQUISITES:
Consent of the Instructor
COURSE OUTCOMES
CO1: Learn the basic concepts of Signals and Images
CO2: Illustrate various filtering methods.
CO3: Evaluate continuous and discrete spectra estimation
CO4: Understand steps in image processing such as Image perception and sensing
CO5: Explore Image estimation and restoration methods.
DETERMINISTIC SIGNALS
Signal Fundamentals: The concept of signal – The concept of system – Discrete Time Signals and sampling:
The sampling theorem – Plotting a signal as a function of time – Spectral representation – Fast Fourier
Transform
(8)
LINEAR FILTERS
Definitions and properties – The z-transform – Transforms and linear filtering – Different equations and
rational TF filters – Minimum phase filters – Filter Design methods – Oversampling and Undersampling.
(8)
CONTINUOUS SPECTRA ESTIMATION
Non-parametric estimation of the PSD – Parametric estimation – Discrete Spectra Estimation: Estimating
the amplitudes and the frequencies – High resolution methods
(9)
IMAGE PERCEPTION AND SENSING
Light and Luminance – Still Image Visual Properties – Time-variant Human Visual System Properties –
Color - Color spaces – Image Sensors and Displays – Image Enhancement and Analysis: Simple Image
processing filters – Image Enhancement – Image Analysis – Object detection.
(10)
IMAGE ESTIMATION AND RESTORATION
Two Dimensional random fields – Estimation for Random fields – Two-Dimensional Recursive Estimation
- Inhomogeneous Gaussian Estimation – Estimation in the Sub band or Wavelet Domain – Bayesian and
Maximum A Posteriori Estimation - Image Identification and Restoration.
(10)
PRACTICALS
Implementation of FFT, DFT of Signals-Wavelet Transformation-Image Enhancement -Histogram
Equalization-Smoothing-Sharpening-Compression-Segmentation-Morphology-Restoration-Edge
Detection-Restoration.
(15)
TOTAL HOURS: 45
144
TEXTBOOKS
1. Gérard Blanchet, Maurice Charbit, “Digital Signal and Image Processing Using MATLAB”, ISTE
Ltd, 2006. (Para I-III)
2. John W. Wood, “Multidimensional Signal, Image, and Video Processing and Coding”, Second
Edition, Academic Press. (Para IV).
REFERENCES
1. R.Ramanathan and K.P. Soman, “Digital Signal and Image Processing”, Elsevier Science, 2012.
2. Sandipan Dey, “Image Processing with Python”, BPB, 2021.
145
19MAME18 - CYBER SECURITY
Contact Hours
L T P C
3 0 0 3
ASSESSMENT: THEORY
PRE-REQUISITES
Consent of the Instructor
COURSE OUTCOMES
CO1 : Understand the theoretical concept of Cyber crime
CO2 : Enumerate the different legal responses to Cybercrime
CO3 : Understand and apply cyber forensics to detect threats and crimes.
CO4 : Analyze and evaluate the cyber security needs of an organization.
CO5 : Familiarize with case studies on cybercrimes and digital evidences
TEXTBOOKS
1. Dejey and S.Murugan, ‘Cyber Forensics’, Oxford University Press, 2018. (Para I, II, V)
146
2. Nina Godbole and Sunil Belapure, ‘Cyber Security: Understanding Cyber Crimes, Computer Forensics
and Legal Perspectives’, Wiley India. (Para III, IV, V)
REFERENCES
1. James Graham, Richard Howard and Ryan Otson, ‘Cyber Security Essentials’, CRC Press.
2. Mead, Nancy, R.Woody, Carol, ‘ Cyber Security Engineering : A Practical Approach for Systems and
Software Assurance’, Pearson Education Asia, 2017.
147
19MAME19 - BUSINESS INTELLIGENCE
Contact Hours
L T P C
3 0 0 3
ASSESSMENT: THEORY
PRE-REQUISITES
Consent of the instructor
COURSE OUTCOMES
CO1: Apply Engineering approach to make better business decisions by analyzing risk factors.
CO2: Devise efficient managerial decisions based on mathematical models for real time business
intelligence applications.
CO3: Develop strategic project planning by analyzing customer requirements in various dimensions with
cost and time efficiency.
CO4: Differentiate various prototyping models and their applicability for data modeling based on real time
requirements and infrastructure.
CO5: Specify ETL operations for real time business intelligence projects using tools and analyze the
feasibility in terms of strengths and weaknesses.
148
TOTAL HOURS: 45
TEXTBOOKS
1. Carlo Vercellis, "Business Intelligence: Data mining and Optimization for Decision Making", John
Wiley and Sons, 2009. (Para- I).
2. Larissa T.Moss and Shaku Atre, "Business Intelligence Roadmap: The Complete project life cycle
for decision support applications", Addison Wesley, 2003. (Para II, III, IV & V).
REFERENCE
1. Efraim Turban, Ramesh Sharda, DursunDelen and Janine E. Aronson, "Business Intelligence – A
Managerial Approach", Global Edition, Pearson, 2017
149
19MAMEL01 - SPATIAL DATA MODELLING AND ANALYSIS LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
Consent of the instructor
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Acquire skills to carry out analysis on spatial data.
CO2: Create databases for spatial data and onscreen digitization.
CO3: Demonstrate the applications of raster and vector data.
CO4: Implement raster analysis and vector analysis.
CO5: Model the spatial variability
CONCEPTS
1. Rectification and Spatial Referencing of Digital Map
2. Onscreen Digitization and Database Creation
3. Projection and Re-projection of spatial data
4. Data Conversion – Vector to Raster, Raster to Vector
5. Populating Attribute data base and querying on attribute data
6. Generation of DEM: from contours, spot heights, GRID and TIN, Isometric mapping
7. Vector Analysis – Buffering, Overlay and Network analysis, flood mapping
8. Raster Analysis – Measurement - Arithmetic overlaying, Logical overlaying, Class interval selection,
choropleth maps
9. Map Output - Bar charts, Pie charts and symbols
10. Map compilation
11. Modelling spatial variability
12. Weighted Theisson polygon and districting
13. Customization and scripting
Tools: Python,QGIS,Neighborvis
REFERENCE
1. Joel Lawhead, “Learning Geospatial Analysis with Python”, Second Edition, Packt Publications,
2015.
150
19MAMEL02 – AUGMENTED AND VIRTUAL REALITY LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
19MAME05
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Create and deploy a AR-VR application
CO2: Explore the physical principles of VR
CO3: Create a comfortable, high-performance VR application using Unity.
CO4: Identify, examine and develop software that reflects fundamental techniques for the design and
deployment of VR experiences.
CO5: Develop real time applications using AR/VR techniques
CONCEPTS TO BE COVERED
1. Simple programs on Unity for VR development, and Image blending
2. Demonstration of the working of HTC Vive, Google Cardboard, Google Daydream and Samsung
gear VR.
3. Develop a scene in Unity that includes: i. A cube, plane and sphere, apply transformations on the
3 game objects. ii. Add a video and audio source
4. Develop a scene in Unity that includes a cube, plane and sphere. Create a new material and texture
separately for three Game objects. Change the color, material and texture of each Game object
separately in the scene.
5. Create an immersive environment (living room/ battlefield/ tennis court) with only static game
objects. 3D game objects can be created using Blender or use available 3D models.
6. Include animation and interaction in the immersive environment created in 3D game objects.
7. Create a virtual environment for any use case. The application must include at least 4 scenes which
can be changed dynamically including good UI, animation and interaction with game objects. (e.g.
VR application to visit a zoo)
REFERENCE
1. Jeff W Murray, Taylor & Francis, “Building Virtual Reality with Unity And Steamvr”, 2nd Edition, 2020.
151
19MAMEL03 – NATURAL LANGUAGE PROCESSING LAB
Contact Hours
L T P C
0 0 4 2
ASSESSMENT: PRACTICAL
PRE-REQUISITES
19MAME07,19MAM65
COURSE OUTCOMES
CO1: Practice text and word representations in NLP
CO2: Use text segmentation, text summarization and categorization to process text data
CO3: Implement and evaluate different NLP applications using machine learning and deep learning
methods
CO4: Design and develop chatbot applications and machine translations
CO5: Develop NLP based applications for various domains
CONCEPTS TO BE COVERED
• Representing and computing with Text data: Simple statistics
• Accessing text corpora and lexical resources
• Processing raw text from web: regular expressions for finding patterns, tokenizing text
• Text segmentation
• Categorizing and tagging words: N-Gram
• Text classification using supervised machine learning algorithms like Naïve Bayes, Deep Neural
Networks etc.)
• Speech to text, Text to Speech
• Language modelling
• Analyzing meaning of sentence
• Building chatbots/Question answering
• Machine transaction, Text summarization
• Use of transformer models
REFERENCES
152
19MAMEL04- GRAPH ANALYTICS LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Implement Graph creation and detection
CO2: Implement machine learning techniques and algorithms in graph data
CO3: Use different node embedding methods for real time problems
CO4: Implement Graph Neural Networks and Implement Graph Convolution Network
CO5: Extracting data from social networks, financial transaction systems, and more and analyze it to
derive patterns.
CONCEPTS TO BE COVERED
• Graph Creation and Analysis (Statistical) , Plotting graphs and Graph properties, Extracting
features using graphs
• Node Embedding -Shallow Embedding and Random walk Embedding
• Implementation of graph algorithms-(Pathfinding & Graph Search, Centrality)
• Applications of Graph Neural Networks
• Graph Convolution Network (GCN) for graph-structured data
• Machine learning on graphs- Node Classification, Link Prediction, Clustering and Community
Detection.
• Social network analysis using Graphs (Yelp Social Network Data)
• Text Analytics and NLP using graphs
• Graph analysis for credit card transaction
REFERENCE:
1. Aldo Marzullo, Claudio Stamile, and Enrico Deusebio, Graph Machine Learning, Packt
Publishing, 2021.
2. Mark Needham, Amy E. Hodler, Graph Algorithms: Practical Examples in Apache Spark and
Neo4j, O’Reilly, 2019
153
19MAMEL05 - INTERNET OF THINGS LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1: Choose the required sensor and perform input output operations for a given requirement.
CO2: Devise interface circuit for connecting a chosen sensor to Arduino board.
CO3: Develop software for Arduino board to interact with the sensor to meet requirements.
CO4: Develop software to interact (send/receive data) with Web/Application server located in the
Internet.
CO5: Use data analytics tool to analyse the data collected and present the report to the end user.
CONCEPTS TO BE COVERED
1. Familiarize with Arduino/Raspberry Pi
2. To interface LED/Buzzer and turn on/off LED
3. To interface with digital sensor like IR/LDR and push button to on/off the LED
4. To interface with DTH11 sensor and read and print temperature and humidity readings.
5. To interface Bluetooth and send sensor data to smartphone using Bluetooth.
6. Program to interact with Thingspeak Cloud
7. Program to interact with MQTT broker
8. Perform analytics on sensor data and visualize the results in mobile UI
9. Develop end-to-end intelligent IoT applications
REFERENCE
1. Pooja Baraskar, “Practical Internet of Things for Beginners: IOT Projects with Realsense, Azure,
Arduino and Intel Edition”, Apress, 2020
154
19MAMEL06 - CYBER SECURITY LAB
Contact Hours
L T P C
0 0 4 2
PRE-REQUISITES
Consent of the Instructor
ASSESSMENT: PRACTICAL
COURSE OUTCOMES
CO1 : Perform Encryption and Decryption techniques
CO2 : Implement detection and prevention process
CO3 : Perform detection method against various attack mechanism
CO4 : Understand the implementation of various techniques and security algorithms
CO5 : Apply different tools used for secure data transmission and for creating digital signature.
TOPICS TO BE COVERED
1. Perform Encryption and Decryption using Substitution techniques
a) Caesar Cipher b) Playfair Cipher c) Hill Cipher
2. Perform Encryption and Decryption using Transposition techniques
a) Rail Fence row & Column Transformation
3. Implement Diffie-Hellman Key Exchange mechanism
4. Implement the following attacks
a) Dictionary Attack b) Brute- Force attack
5. Calculate the message digest of a text using the SHA-1 algorithm
6. Detect ARP Spoof Attack using Scapy in Python
7. Demonstrate Intrusion Detection System using any tool
8. Implement for providing secure storage and secure data transmission
9. Implement RSA Digital Signature Scheme
10. Defeating Malware - Building Trojans, Rootkit Hunter
155
ONE CREDIT COURSES
ECONOMETRICS
Review of Probability and Statistics-Fundamentals of Economics
Financial Institutions, Products and Markets-Introduction to Financial Institutions-Introduction to
Financial Products and Markets
(5)
MACHINE LEARNING IN FINANCE
Review of R programming language-Review of machine learning
Building a multiple linear regression model
Building a logistic regression model
Validating Regression Models – Performance Diagnostics
Building a regression model to forecast losses for a trading desk
Building a logistic regression model to assess the credit quality of the borrower
Building a model using KNN, K-means and Naive Bayes classifier and understanding the testing the
performance of the models
Building Prudential Life Insurance Assessment using Multinomial Logit and Random Forest.
Discussing resources for having a career in model development, validation, quantitative research and data
science.
(10)
TOTAL HOURS: 15
156
19MAMOC02 – JAVA PROGRAMMING
Contact Hours
L T P C
0 0 2 1
ASESSMENT: PRACTICALS
COURSE OUTCOMES
CO1: Able to learn and implement classes and objects in Java.
CO2: Able to apply inheritance and create interfaces for the given requirement.
CO3: Able to handle the different kinds of exceptions arising in a Java program.
CO4: Able to use IO streams for reading and writing data in Java.
CO5: Able to write socket programs in Java to create network applications.
TOTAL HOURS: 30
REFERENCES
1. Herbert Schildt, “Java The complete reference”, 11th Edition, McGraw Hill Education, 2020
157